summaryrefslogtreecommitdiff
path: root/keystoneclient/generic
diff options
context:
space:
mode:
authorlin-hua-cheng <os.lcheng@gmail.com>2016-01-13 13:03:51 -0800
committerlin-hua-cheng <os.lcheng@gmail.com>2016-01-13 13:03:51 -0800
commit77ed0d4d0c3413b15aa348613b8b40373bd5765b (patch)
tree01e67a56791a4575eb28ee25de46cd6111035bde /keystoneclient/generic
parent7327067f98f5e118790817f7c81e444c7fe7c25b (diff)
downloadpython-keystoneclient-77ed0d4d0c3413b15aa348613b8b40373bd5765b.tar.gz
Address hacking check H405
Previously, there were a string of commits to keystone that addresed ignored hacking checks. This commit does the same for H405 in keystoneclient. This also modifies our tox.ini so that we no longer ignore H405 violations. Change-Id: I2af152e5425a0e9c82314039fdbb90d661c22680 Closes-Bug: 1482773
Diffstat (limited to 'keystoneclient/generic')
-rw-r--r--keystoneclient/generic/shell.py3
1 files changed, 1 insertions, 2 deletions
diff --git a/keystoneclient/generic/shell.py b/keystoneclient/generic/shell.py
index e5330a5..d1b7b7e 100644
--- a/keystoneclient/generic/shell.py
+++ b/keystoneclient/generic/shell.py
@@ -25,8 +25,7 @@ CLIENT_CLASS = client.Client
@utils.unauthenticated
def do_discover(cs, args):
- """Discover Keystone servers, supported API versions and extensions.
- """
+ """Discover Keystone servers, supported API versions and extensions."""
if cs.endpoint:
versions = cs.discover(cs.endpoint)
elif cs.auth_url: