From 2ee03b552db1e82602f29812ae6d714ae83253a8 Mon Sep 17 00:00:00 2001 From: olia-dev Date: Tue, 9 Jul 2019 14:14:29 +0200 Subject: [PATCH] related #4274 - added option to verify server certificate with a specific CA (fixed errors) --- awx/main/credential_plugins/hashivault.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/awx/main/credential_plugins/hashivault.py b/awx/main/credential_plugins/hashivault.py index 2b21ccba78..3f12aad4b4 100644 --- a/awx/main/credential_plugins/hashivault.py +++ b/awx/main/credential_plugins/hashivault.py @@ -106,7 +106,7 @@ def kv_backend(**kwargs): cacert = kwargs.get('cacert', None) api_version = kwargs['api_version'] - request_kwargs = { 'timeout': 30 } + request_kwargs = {'timeout': 30} if cacert: request_kwargs['verify'] = create_temporary_fifo(cacert.encode()) @@ -115,7 +115,7 @@ def kv_backend(**kwargs): if api_version == 'v2': if kwargs.get('secret_version'): - request_kwargs['params'] = { 'version': kwargs['secret_version'] } + request_kwargs['params'] = {'version': kwargs['secret_version']} try: mount_point, *path = pathlib.Path(secret_path.lstrip(os.sep)).parts '/'.join(path) @@ -151,11 +151,11 @@ def ssh_backend(**kwargs): role = kwargs['role'] cacert = kwargs.get('cacert', None) - request_kwargs = { 'timeout': 30 } + request_kwargs = {'timeout': 30} if cacert: request_kwargs['verify'] = create_temporary_fifo(cacert.encode()) - request_kwargs['json'] = { 'public_key': kwargs['public_key'] } + request_kwargs['json'] = {'public_key': kwargs['public_key']} if kwargs.get('valid_principals'): request_kwargs['json']['valid_principals'] = kwargs['valid_principals']