diff --git a/rhodecode/model/db.py b/rhodecode/model/db.py --- a/rhodecode/model/db.py +++ b/rhodecode/model/db.py @@ -1130,10 +1130,10 @@ class UserApiKeys(Base, BaseModel): def _get_scope(self): if self.repo: - return repr(self.repo) + return 'Repository: {}'.format(self.repo.repo_name) if self.repo_group: - return repr(self.repo_group) + ' (recursive)' - return 'global' + return 'RepositoryGroup: {} (recursive)'.format(self.repo_group.group_name) + return 'Global' @property def scope_humanized(self): diff --git a/rhodecode/templates/admin/my_account/my_account_auth_tokens.mako b/rhodecode/templates/admin/my_account/my_account_auth_tokens.mako --- a/rhodecode/templates/admin/my_account/my_account_auth_tokens.mako +++ b/rhodecode/templates/admin/my_account/my_account_auth_tokens.mako @@ -1,35 +1,36 @@
-
+

${_('Authentication Tokens')}

-
-
+
+

- ${_('Each token can have a role. Token with a role can be used only in given context, ' + ${_('Authentication tokens can be used to interact with the API, or VCS-over-http. ' + 'Each token can have a role. Token with a role can be used only in given context, ' 'e.g. VCS tokens can be used together with the authtoken auth plugin for git/hg/svn operations only.')}

- + %if c.user_auth_tokens: %for auth_token in c.user_auth_tokens: - + - +
${_('Token')}${_('Scope')} ${_('Description')} ${_('Role')}${_('Repository Scope')} ${_('Expiration')} ${_('Action')}
${auth_token.api_key}
${auth_token.scope_humanized} ${auth_token.description} ${auth_token.role_humanized} ${auth_token.scope_humanized} %if auth_token.expires == -1: ${_('never')} @@ -58,40 +59,41 @@
-
- ${h.secure_form(h.route_path('my_account_auth_tokens_add'), request=request)} -
- -
-
-
- -
-
- ${h.text('description', class_='medium', placeholder=_('Description'))} - ${h.hidden('lifetime')} - ${h.select('role', '', c.role_options)} +
+ ${h.secure_form(h.route_path('my_account_auth_tokens_add'), request=request)} +
+ +
+
+
+ +
+
+ ${h.text('description', class_='medium', placeholder=_('Description'))} + ${h.hidden('lifetime')} + ${h.select('role', '', c.role_options)} - % if c.allow_scoped_tokens: - ${h.hidden('scope_repo_id')} - % else: - ${h.select('scope_repo_id_disabled', '', ['Scopes available in EE edition'], disabled='disabled')} - % endif -
-

- ${_('Repository scope works only with tokens with VCS type.')} -

-
-
- ${h.submit('save',_('Add'),class_="btn")} - ${h.reset('reset',_('Reset'),class_="btn")} + % if c.allow_scoped_tokens: + ${h.hidden('scope_repo_id')} + % else: + ${h.select('scope_repo_id_disabled', '', ['Scopes available in EE edition'], disabled='disabled')} + % endif
+

+ ${_('Repository scope works only with tokens with VCS type.')} +

+
+
+ ${h.submit('save',_('Add'),class_="btn")} + ${h.reset('reset',_('Reset'),class_="btn")}
- ${h.end_form()}
+ ${h.end_form()} +
+