diff options
| author | Tang Chen <chen.tang@easystack.cn> | 2016-04-16 10:59:37 +0800 |
|---|---|---|
| committer | Tang Chen <chen.tang@easystack.cn> | 2016-04-18 10:31:01 +0800 |
| commit | 89445855acffc5ae4cf87dc501c09f3434d08bad (patch) | |
| tree | c55932e315ae6714775614fb3f9e4cdb2f726085 /openstackclient/network/v2/security_group_rule.py | |
| parent | 8eade18624ad4a141424caa7e8cbb22294c2239f (diff) | |
| download | python-openstackclient-89445855acffc5ae4cf87dc501c09f3434d08bad.tar.gz | |
State i18() changes and help messages improved
Add _() to wrap help message in network commands.
And also some improvement for help message.
Change-Id: Ib3e498f5976ba98c44fd4eec2d1623263b3db53e
Partial-bug: 1570924
Diffstat (limited to 'openstackclient/network/v2/security_group_rule.py')
| -rw-r--r-- | openstackclient/network/v2/security_group_rule.py | 28 |
1 files changed, 14 insertions, 14 deletions
diff --git a/openstackclient/network/v2/security_group_rule.py b/openstackclient/network/v2/security_group_rule.py index 509b1974..67472de0 100644 --- a/openstackclient/network/v2/security_group_rule.py +++ b/openstackclient/network/v2/security_group_rule.py @@ -23,6 +23,7 @@ except ImportError: from openstackclient.common import exceptions from openstackclient.common import parseractions from openstackclient.common import utils +from openstackclient.i18n import _ from openstackclient.identity import common as identity_common from openstackclient.network import common from openstackclient.network import utils as network_utils @@ -78,27 +79,27 @@ class CreateSecurityGroupRule(common.NetworkAndComputeShowOne): default="tcp", choices=['icmp', 'tcp', 'udp'], type=_convert_to_lowercase, - help="IP protocol (icmp, tcp, udp; default: tcp)", + help=_("IP protocol (icmp, tcp, udp; default: tcp)") ) source_group = parser.add_mutually_exclusive_group() source_group.add_argument( "--src-ip", metavar="<ip-address>", - help="Source IP address block (may use CIDR notation; " - "default for IPv4 rule: 0.0.0.0/0)", + help=_("Source IP address block (may use CIDR notation; " + "default for IPv4 rule: 0.0.0.0/0)") ) source_group.add_argument( "--src-group", metavar="<group>", - help="Source security group (name or ID)", + help=_("Source security group (name or ID)") ) parser.add_argument( "--dst-port", metavar="<port-range>", default=(0, 0), action=parseractions.RangeAction, - help="Destination port, may be a single port or port range: " - "137:139 (only required for IP protocols tcp and udp)", + help=_("Destination port, may be a single port or port range: " + "137:139 (only required for IP protocols tcp and udp)") ) return parser @@ -107,24 +108,23 @@ class CreateSecurityGroupRule(common.NetworkAndComputeShowOne): direction_group.add_argument( '--ingress', action='store_true', - help='Rule applies to incoming network traffic (default)', + help=_("Rule applies to incoming network traffic (default)") ) direction_group.add_argument( '--egress', action='store_true', - help='Rule applies to outgoing network traffic', + help=_("Rule applies to outgoing network traffic") ) parser.add_argument( '--ethertype', metavar='<ethertype>', choices=['IPv4', 'IPv6'], - help='Ethertype of network traffic ' - '(IPv4, IPv6; default: IPv4)', + help=_("Ethertype of network traffic (IPv4, IPv6; default: IPv4)") ) parser.add_argument( '--project', metavar='<project>', - help="Owner's project (name or ID)" + help=_("Owner's project (name or ID)") ) identity_common.add_project_domain_option_to_parser(parser) return parser @@ -218,7 +218,7 @@ class DeleteSecurityGroupRule(common.NetworkAndComputeCommand): parser.add_argument( 'rule', metavar='<rule>', - help='Security group rule to delete (ID only)', + help=_("Security group rule to delete (ID only)") ) return parser @@ -238,7 +238,7 @@ class ListSecurityGroupRule(common.NetworkAndComputeLister): 'group', metavar='<group>', nargs='?', - help='List all rules in this security group (name or ID)', + help=_("List all rules in this security group (name or ID)") ) return parser @@ -333,7 +333,7 @@ class ShowSecurityGroupRule(common.NetworkAndComputeShowOne): parser.add_argument( 'rule', metavar="<rule>", - help="Security group rule to display (ID only)" + help=_("Security group rule to display (ID only)") ) return parser |
