autopep8
[sfa.git] / sfa / methods / GetSelfCredential.py
index f3a9612..385d501 100644 (file)
@@ -6,6 +6,7 @@ from sfa.trust.certificate import Certificate
 
 from sfa.storage.parameter import Parameter, Mixed
 
+
 class GetSelfCredential(Method):
     """
     Retrive a credential for an object
@@ -17,13 +18,13 @@ class GetSelfCredential(Method):
     """
 
     interfaces = ['registry']
-    
+
     accepts = [
         Parameter(str, "certificate"),
         Parameter(str, "Human readable name (hrn or urn)"),
         Mixed(Parameter(str, "Record type"),
               Parameter(None, "Type not specified")),
-        ]
+    ]
 
     returns = Parameter(str, "String representation of a credential object")
 
@@ -46,28 +47,28 @@ class GetSelfCredential(Method):
         if type:
             hrn = urn_to_hrn(xrn)[0]
         else:
-            hrn, type = urn_to_hrn(xrn) 
+            hrn, type = urn_to_hrn(xrn)
         self.api.auth.verify_object_belongs_to_me(hrn)
 
         origin_hrn = Certificate(string=cert).get_subject()
-        self.api.logger.info("interface: %s\tcaller-hrn: %s\ttarget-hrn: %s\tmethod-name: %s"%(self.api.interface, origin_hrn, hrn, self.name))
-        
-        ### authenticate the gid
+        self.api.logger.info("interface: %s\tcaller-hrn: %s\ttarget-hrn: %s\tmethod-name: %s" %
+                             (self.api.interface, origin_hrn, hrn, self.name))
+
+        # authenticate the gid
         # import here so we can load this module at build-time for sfa2wsdl
         #from sfa.storage.alchemy import dbsession
         from sfa.storage.model import RegRecord
 
-        # xxx-local - the current code runs Resolve, which would forward to 
+        # xxx-local - the current code runs Resolve, which would forward to
         # another registry if needed
-        # I wonder if this is truly the intention, or shouldn't we instead 
+        # I wonder if this is truly the intention, or shouldn't we instead
         # only look in the local db ?
         records = self.api.manager.Resolve(self.api, xrn, type, details=False)
         if not records:
             raise RecordNotFound(hrn)
 
-        record_obj = RegRecord (dict=records[0])
-        # xxx-local the local-only version would read 
+        record_obj = RegRecord(dict=records[0])
+        # xxx-local the local-only version would read
         #record_obj = dbsession.query(RegRecord).filter_by(hrn=hrn).first()
         #if not record_obj: raise RecordNotFound(hrn)
         gid = record_obj.get_gid_object()
@@ -76,11 +77,14 @@ class GetSelfCredential(Method):
         # authenticate the certificate against the gid in the db
         certificate = Certificate(string=cert)
         if not certificate.is_pubkey(gid.get_pubkey()):
-            for (obj,name) in [ (certificate,"CERT"), (gid,"GID"), ]:
-                self.api.logger.debug("ConnectionKeyGIDMismatch, %s pubkey: %s"%(name,obj.get_pubkey().get_pubkey_string()))
-                self.api.logger.debug("ConnectionKeyGIDMismatch, %s dump: %s"%(name,obj.dump_string()))
-                if hasattr (obj,'filename'): 
-                    self.api.logger.debug("ConnectionKeyGIDMismatch, %s filename: %s"%(name,obj.filename))
+            for (obj, name) in [(certificate, "CERT"), (gid, "GID"), ]:
+                self.api.logger.debug("ConnectionKeyGIDMismatch, %s pubkey: %s" % (
+                    name, obj.get_pubkey().get_pubkey_string()))
+                self.api.logger.debug(
+                    "ConnectionKeyGIDMismatch, %s dump: %s" % (name, obj.dump_string()))
+                if hasattr(obj, 'filename'):
+                    self.api.logger.debug(
+                        "ConnectionKeyGIDMismatch, %s filename: %s" % (name, obj.filename))
             raise ConnectionKeyGIDMismatch(gid.get_subject())
-        
+
         return self.api.manager.GetCredential(self.api, xrn, type)