Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1128)

Unified Diff: third_party/gsutil/boto/boto/sts/credentials.py

Issue 12317103: Added gsutil to depot tools (Closed) Base URL: https://chromium.googlesource.com/chromium/tools/depot_tools.git@master
Patch Set: Created 7 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « third_party/gsutil/boto/boto/sts/connection.py ('k') | third_party/gsutil/boto/boto/utils.py » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: third_party/gsutil/boto/boto/sts/credentials.py
diff --git a/third_party/gsutil/boto/boto/sts/credentials.py b/third_party/gsutil/boto/boto/sts/credentials.py
new file mode 100644
index 0000000000000000000000000000000000000000..33fe4ee7ff40940e51757ebddff07f677779cfc5
--- /dev/null
+++ b/third_party/gsutil/boto/boto/sts/credentials.py
@@ -0,0 +1,215 @@
+# Copyright (c) 2011 Mitch Garnaat http://garnaat.org/
+# Copyright (c) 2011, Eucalyptus Systems, Inc.
+#
+# Permission is hereby granted, free of charge, to any person obtaining a
+# copy of this software and associated documentation files (the
+# "Software"), to deal in the Software without restriction, including
+# without limitation the rights to use, copy, modify, merge, publish, dis-
+# tribute, sublicense, and/or sell copies of the Software, and to permit
+# persons to whom the Software is furnished to do so, subject to the fol-
+# lowing conditions:
+#
+# The above copyright notice and this permission notice shall be included
+# in all copies or substantial portions of the Software.
+#
+# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
+# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
+# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
+# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
+# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
+# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
+# IN THE SOFTWARE.
+
+import os
+import datetime
+
+import boto.utils
+from boto.compat import json
+
+
+class Credentials(object):
+ """
+ :ivar access_key: The AccessKeyID.
+ :ivar secret_key: The SecretAccessKey.
+ :ivar session_token: The session token that must be passed with
+ requests to use the temporary credentials
+ :ivar expiration: The timestamp for when the credentials will expire
+ """
+
+ def __init__(self, parent=None):
+ self.parent = parent
+ self.access_key = None
+ self.secret_key = None
+ self.session_token = None
+ self.expiration = None
+
+ @classmethod
+ def from_json(cls, json_doc):
+ """
+ Create and return a new Session Token based on the contents
+ of a JSON document.
+
+ :type json_doc: str
+ :param json_doc: A string containing a JSON document with a
+ previously saved Credentials object.
+ """
+ d = json.loads(json_doc)
+ token = cls()
+ token.__dict__.update(d)
+ return token
+
+ @classmethod
+ def load(cls, file_path):
+ """
+ Create and return a new Session Token based on the contents
+ of a previously saved JSON-format file.
+
+ :type file_path: str
+ :param file_path: The fully qualified path to the JSON-format
+ file containing the previously saved Session Token information.
+ """
+ fp = open(file_path)
+ json_doc = fp.read()
+ fp.close()
+ return cls.from_json(json_doc)
+
+ def startElement(self, name, attrs, connection):
+ return None
+
+ def endElement(self, name, value, connection):
+ if name == 'AccessKeyId':
+ self.access_key = value
+ elif name == 'SecretAccessKey':
+ self.secret_key = value
+ elif name == 'SessionToken':
+ self.session_token = value
+ elif name == 'Expiration':
+ self.expiration = value
+ elif name == 'RequestId':
+ self.request_id = value
+ else:
+ pass
+
+ def to_dict(self):
+ """
+ Return a Python dict containing the important information
+ about this Session Token.
+ """
+ return {'access_key': self.access_key,
+ 'secret_key': self.secret_key,
+ 'session_token': self.session_token,
+ 'expiration': self.expiration,
+ 'request_id': self.request_id}
+
+ def save(self, file_path):
+ """
+ Persist a Session Token to a file in JSON format.
+
+ :type path: str
+ :param path: The fully qualified path to the file where the
+ the Session Token data should be written. Any previous
+ data in the file will be overwritten. To help protect
+ the credentials contained in the file, the permissions
+ of the file will be set to readable/writable by owner only.
+ """
+ fp = open(file_path, 'wb')
+ json.dump(self.to_dict(), fp)
+ fp.close()
+ os.chmod(file_path, 0600)
+
+ def is_expired(self, time_offset_seconds=0):
+ """
+ Checks to see if the Session Token is expired or not. By default
+ it will check to see if the Session Token is expired as of the
+ moment the method is called. However, you can supply an
+ optional parameter which is the number of seconds of offset
+ into the future for the check. For example, if you supply
+ a value of 5, this method will return a True if the Session
+ Token will be expired 5 seconds from this moment.
+
+ :type time_offset_seconds: int
+ :param time_offset_seconds: The number of seconds into the future
+ to test the Session Token for expiration.
+ """
+ now = datetime.datetime.utcnow()
+ if time_offset_seconds:
+ now = now + datetime.timedelta(seconds=time_offset_seconds)
+ ts = boto.utils.parse_ts(self.expiration)
+ delta = ts - now
+ return delta.total_seconds() <= 0
+
+class FederationToken(object):
+ """
+ :ivar credentials: A Credentials object containing the credentials.
+ :ivar federated_user_arn: ARN specifying federated user using credentials.
+ :ivar federated_user_id: The ID of the federated user using credentials.
+ :ivar packed_policy_size: A percentage value indicating the size of
+ the policy in packed form
+ """
+
+ def __init__(self, parent=None):
+ self.parent = parent
+ self.credentials = None
+ self.federated_user_arn = None
+ self.federated_user_id = None
+ self.packed_policy_size = None
+
+ def startElement(self, name, attrs, connection):
+ if name == 'Credentials':
+ self.credentials = Credentials()
+ return self.credentials
+ else:
+ return None
+
+ def endElement(self, name, value, connection):
+ if name == 'Arn':
+ self.federated_user_arn = value
+ elif name == 'FederatedUserId':
+ self.federated_user_id = value
+ elif name == 'PackedPolicySize':
+ self.packed_policy_size = int(value)
+ elif name == 'RequestId':
+ self.request_id = value
+ else:
+ pass
+
+
+class AssumedRole(object):
+ """
+ :ivar user: The assumed role user.
+ :ivar credentials: A Credentials object containing the credentials.
+ """
+ def __init__(self, connection=None, credentials=None, user=None):
+ self._connection = connection
+ self.credentials = credentials
+ self.user = user
+
+ def startElement(self, name, attrs, connection):
+ if name == 'Credentials':
+ self.credentials = Credentials()
+ return self.credentials
+ elif name == 'AssumedRoleUser':
+ self.user = User()
+ return self.user
+
+ def endElement(self, name, value, connection):
+ pass
+
+
+class User(object):
+ """
+ :ivar arn: The arn of the user assuming the role.
+ :ivar assume_role_id: The identifier of the assumed role.
+ """
+ def __init__(self, arn=None, assume_role_id=None):
+ self.arn = arn
+ self.assume_role_id = assume_role_id
+
+ def startElement(self, name, attrs, connection):
+ pass
+
+ def endElement(self, name, value, connection):
+ if name == 'Arn':
+ self.arn = value
+ elif name == 'AssumedRoleId':
+ self.assume_role_id = value
« no previous file with comments | « third_party/gsutil/boto/boto/sts/connection.py ('k') | third_party/gsutil/boto/boto/utils.py » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698