| Index: third_party/boto/sts/credentials.py
|
| diff --git a/third_party/boto/sts/credentials.py b/third_party/boto/sts/credentials.py
|
| new file mode 100644
|
| index 0000000000000000000000000000000000000000..33fe4ee7ff40940e51757ebddff07f677779cfc5
|
| --- /dev/null
|
| +++ b/third_party/boto/sts/credentials.py
|
| @@ -0,0 +1,215 @@
|
| +# Copyright (c) 2011 Mitch Garnaat http://garnaat.org/
|
| +# Copyright (c) 2011, Eucalyptus Systems, Inc.
|
| +#
|
| +# Permission is hereby granted, free of charge, to any person obtaining a
|
| +# copy of this software and associated documentation files (the
|
| +# "Software"), to deal in the Software without restriction, including
|
| +# without limitation the rights to use, copy, modify, merge, publish, dis-
|
| +# tribute, sublicense, and/or sell copies of the Software, and to permit
|
| +# persons to whom the Software is furnished to do so, subject to the fol-
|
| +# lowing conditions:
|
| +#
|
| +# The above copyright notice and this permission notice shall be included
|
| +# in all copies or substantial portions of the Software.
|
| +#
|
| +# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
|
| +# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
|
| +# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
|
| +# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
|
| +# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
| +# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
| +# IN THE SOFTWARE.
|
| +
|
| +import os
|
| +import datetime
|
| +
|
| +import boto.utils
|
| +from boto.compat import json
|
| +
|
| +
|
| +class Credentials(object):
|
| + """
|
| + :ivar access_key: The AccessKeyID.
|
| + :ivar secret_key: The SecretAccessKey.
|
| + :ivar session_token: The session token that must be passed with
|
| + requests to use the temporary credentials
|
| + :ivar expiration: The timestamp for when the credentials will expire
|
| + """
|
| +
|
| + def __init__(self, parent=None):
|
| + self.parent = parent
|
| + self.access_key = None
|
| + self.secret_key = None
|
| + self.session_token = None
|
| + self.expiration = None
|
| +
|
| + @classmethod
|
| + def from_json(cls, json_doc):
|
| + """
|
| + Create and return a new Session Token based on the contents
|
| + of a JSON document.
|
| +
|
| + :type json_doc: str
|
| + :param json_doc: A string containing a JSON document with a
|
| + previously saved Credentials object.
|
| + """
|
| + d = json.loads(json_doc)
|
| + token = cls()
|
| + token.__dict__.update(d)
|
| + return token
|
| +
|
| + @classmethod
|
| + def load(cls, file_path):
|
| + """
|
| + Create and return a new Session Token based on the contents
|
| + of a previously saved JSON-format file.
|
| +
|
| + :type file_path: str
|
| + :param file_path: The fully qualified path to the JSON-format
|
| + file containing the previously saved Session Token information.
|
| + """
|
| + fp = open(file_path)
|
| + json_doc = fp.read()
|
| + fp.close()
|
| + return cls.from_json(json_doc)
|
| +
|
| + def startElement(self, name, attrs, connection):
|
| + return None
|
| +
|
| + def endElement(self, name, value, connection):
|
| + if name == 'AccessKeyId':
|
| + self.access_key = value
|
| + elif name == 'SecretAccessKey':
|
| + self.secret_key = value
|
| + elif name == 'SessionToken':
|
| + self.session_token = value
|
| + elif name == 'Expiration':
|
| + self.expiration = value
|
| + elif name == 'RequestId':
|
| + self.request_id = value
|
| + else:
|
| + pass
|
| +
|
| + def to_dict(self):
|
| + """
|
| + Return a Python dict containing the important information
|
| + about this Session Token.
|
| + """
|
| + return {'access_key': self.access_key,
|
| + 'secret_key': self.secret_key,
|
| + 'session_token': self.session_token,
|
| + 'expiration': self.expiration,
|
| + 'request_id': self.request_id}
|
| +
|
| + def save(self, file_path):
|
| + """
|
| + Persist a Session Token to a file in JSON format.
|
| +
|
| + :type path: str
|
| + :param path: The fully qualified path to the file where the
|
| + the Session Token data should be written. Any previous
|
| + data in the file will be overwritten. To help protect
|
| + the credentials contained in the file, the permissions
|
| + of the file will be set to readable/writable by owner only.
|
| + """
|
| + fp = open(file_path, 'wb')
|
| + json.dump(self.to_dict(), fp)
|
| + fp.close()
|
| + os.chmod(file_path, 0600)
|
| +
|
| + def is_expired(self, time_offset_seconds=0):
|
| + """
|
| + Checks to see if the Session Token is expired or not. By default
|
| + it will check to see if the Session Token is expired as of the
|
| + moment the method is called. However, you can supply an
|
| + optional parameter which is the number of seconds of offset
|
| + into the future for the check. For example, if you supply
|
| + a value of 5, this method will return a True if the Session
|
| + Token will be expired 5 seconds from this moment.
|
| +
|
| + :type time_offset_seconds: int
|
| + :param time_offset_seconds: The number of seconds into the future
|
| + to test the Session Token for expiration.
|
| + """
|
| + now = datetime.datetime.utcnow()
|
| + if time_offset_seconds:
|
| + now = now + datetime.timedelta(seconds=time_offset_seconds)
|
| + ts = boto.utils.parse_ts(self.expiration)
|
| + delta = ts - now
|
| + return delta.total_seconds() <= 0
|
| +
|
| +class FederationToken(object):
|
| + """
|
| + :ivar credentials: A Credentials object containing the credentials.
|
| + :ivar federated_user_arn: ARN specifying federated user using credentials.
|
| + :ivar federated_user_id: The ID of the federated user using credentials.
|
| + :ivar packed_policy_size: A percentage value indicating the size of
|
| + the policy in packed form
|
| + """
|
| +
|
| + def __init__(self, parent=None):
|
| + self.parent = parent
|
| + self.credentials = None
|
| + self.federated_user_arn = None
|
| + self.federated_user_id = None
|
| + self.packed_policy_size = None
|
| +
|
| + def startElement(self, name, attrs, connection):
|
| + if name == 'Credentials':
|
| + self.credentials = Credentials()
|
| + return self.credentials
|
| + else:
|
| + return None
|
| +
|
| + def endElement(self, name, value, connection):
|
| + if name == 'Arn':
|
| + self.federated_user_arn = value
|
| + elif name == 'FederatedUserId':
|
| + self.federated_user_id = value
|
| + elif name == 'PackedPolicySize':
|
| + self.packed_policy_size = int(value)
|
| + elif name == 'RequestId':
|
| + self.request_id = value
|
| + else:
|
| + pass
|
| +
|
| +
|
| +class AssumedRole(object):
|
| + """
|
| + :ivar user: The assumed role user.
|
| + :ivar credentials: A Credentials object containing the credentials.
|
| + """
|
| + def __init__(self, connection=None, credentials=None, user=None):
|
| + self._connection = connection
|
| + self.credentials = credentials
|
| + self.user = user
|
| +
|
| + def startElement(self, name, attrs, connection):
|
| + if name == 'Credentials':
|
| + self.credentials = Credentials()
|
| + return self.credentials
|
| + elif name == 'AssumedRoleUser':
|
| + self.user = User()
|
| + return self.user
|
| +
|
| + def endElement(self, name, value, connection):
|
| + pass
|
| +
|
| +
|
| +class User(object):
|
| + """
|
| + :ivar arn: The arn of the user assuming the role.
|
| + :ivar assume_role_id: The identifier of the assumed role.
|
| + """
|
| + def __init__(self, arn=None, assume_role_id=None):
|
| + self.arn = arn
|
| + self.assume_role_id = assume_role_id
|
| +
|
| + def startElement(self, name, attrs, connection):
|
| + pass
|
| +
|
| + def endElement(self, name, value, connection):
|
| + if name == 'Arn':
|
| + self.arn = value
|
| + elif name == 'AssumedRoleId':
|
| + self.assume_role_id = value
|
|
|