diff --git a/awx/main/credential_plugins/hashivault.py b/awx/main/credential_plugins/hashivault.py index 5593a81484..4ccc244330 100644 --- a/awx/main/credential_plugins/hashivault.py +++ b/awx/main/credential_plugins/hashivault.py @@ -60,9 +60,7 @@ base_inputs = { 'type': 'string', 'multiline': False, 'default': 'approle', - 'help_text': _( - 'The Authentication path to use if one isn\'t provided in the metadata when linking to an input field. Defaults to \'approle\'' - ), + 'help_text': _('The Authentication path to use if one isn\'t provided in the metadata when linking to an input field. Defaults to \'approle\''), }, ], 'metadata': [ diff --git a/awx/main/tests/functional/test_credential_plugins.py b/awx/main/tests/functional/test_credential_plugins.py index 6bd4f9cdb2..3ea31fce42 100644 --- a/awx/main/tests/functional/test_credential_plugins.py +++ b/awx/main/tests/functional/test_credential_plugins.py @@ -14,12 +14,12 @@ def test_imported_azure_cloud_sdk_vars(): def test_hashivault_approle_auth(): kwargs = { - 'role_id': 'the_role_id', - 'secret_id': 'the_secret_id', + 'role_id': 'the_role_id', + 'secret_id': 'the_secret_id', } expected_res = { - 'role_id': 'the_role_id', - 'secret_id': 'the_secret_id', + 'role_id': 'the_role_id', + 'secret_id': 'the_secret_id', } res = hashivault.approle_auth(**kwargs) assert res == expected_res @@ -27,7 +27,7 @@ def test_hashivault_approle_auth(): def test_hashivault_kubernetes_auth(): kwargs = { - 'kubernetes_role': 'the_kubernetes_role', + 'kubernetes_role': 'the_kubernetes_role', } expected_res = { 'role': 'the_kubernetes_role', @@ -42,7 +42,7 @@ def test_hashivault_kubernetes_auth(): def test_hashivault_handle_auth_token(): kwargs = { - 'token': 'the_token', + 'token': 'the_token', } token = hashivault.handle_auth(**kwargs) assert token == kwargs['token']