Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(82)

Unified Diff: tools/telemetry/third_party/gsutilz/third_party/boto/boto/sts/credentials.py

Issue 1493973002: Remove telemetry/third_party/gsutilz (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@gsutil_changes
Patch Set: rebase Created 5 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: tools/telemetry/third_party/gsutilz/third_party/boto/boto/sts/credentials.py
diff --git a/tools/telemetry/third_party/gsutilz/third_party/boto/boto/sts/credentials.py b/tools/telemetry/third_party/gsutilz/third_party/boto/boto/sts/credentials.py
deleted file mode 100644
index 7ab631942cdaa15479592d5d268df0e6ccd0f6de..0000000000000000000000000000000000000000
--- a/tools/telemetry/third_party/gsutilz/third_party/boto/boto/sts/credentials.py
+++ /dev/null
@@ -1,237 +0,0 @@
-# Copyright (c) 2011 Mitch Garnaat http://garnaat.org/
-# Copyright (c) 2011, Eucalyptus Systems, Inc.
-#
-# Permission is hereby granted, free of charge, to any person obtaining a
-# copy of this software and associated documentation files (the
-# "Software"), to deal in the Software without restriction, including
-# without limitation the rights to use, copy, modify, merge, publish, dis-
-# tribute, sublicense, and/or sell copies of the Software, and to permit
-# persons to whom the Software is furnished to do so, subject to the fol-
-# lowing conditions:
-#
-# The above copyright notice and this permission notice shall be included
-# in all copies or substantial portions of the Software.
-#
-# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
-# OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABIL-
-# ITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
-# SHALL THE AUTHOR BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
-# WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
-# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
-# IN THE SOFTWARE.
-
-import os
-import datetime
-
-import boto.utils
-from boto.compat import json
-
-
-class Credentials(object):
- """
- :ivar access_key: The AccessKeyID.
- :ivar secret_key: The SecretAccessKey.
- :ivar session_token: The session token that must be passed with
- requests to use the temporary credentials
- :ivar expiration: The timestamp for when the credentials will expire
- """
-
- def __init__(self, parent=None):
- self.parent = parent
- self.access_key = None
- self.secret_key = None
- self.session_token = None
- self.expiration = None
- self.request_id = None
-
- @classmethod
- def from_json(cls, json_doc):
- """
- Create and return a new Session Token based on the contents
- of a JSON document.
-
- :type json_doc: str
- :param json_doc: A string containing a JSON document with a
- previously saved Credentials object.
- """
- d = json.loads(json_doc)
- token = cls()
- token.__dict__.update(d)
- return token
-
- @classmethod
- def load(cls, file_path):
- """
- Create and return a new Session Token based on the contents
- of a previously saved JSON-format file.
-
- :type file_path: str
- :param file_path: The fully qualified path to the JSON-format
- file containing the previously saved Session Token information.
- """
- fp = open(file_path)
- json_doc = fp.read()
- fp.close()
- return cls.from_json(json_doc)
-
- def startElement(self, name, attrs, connection):
- return None
-
- def endElement(self, name, value, connection):
- if name == 'AccessKeyId':
- self.access_key = value
- elif name == 'SecretAccessKey':
- self.secret_key = value
- elif name == 'SessionToken':
- self.session_token = value
- elif name == 'Expiration':
- self.expiration = value
- elif name == 'RequestId':
- self.request_id = value
- else:
- pass
-
- def to_dict(self):
- """
- Return a Python dict containing the important information
- about this Session Token.
- """
- return {'access_key': self.access_key,
- 'secret_key': self.secret_key,
- 'session_token': self.session_token,
- 'expiration': self.expiration,
- 'request_id': self.request_id}
-
- def save(self, file_path):
- """
- Persist a Session Token to a file in JSON format.
-
- :type path: str
- :param path: The fully qualified path to the file where the
- the Session Token data should be written. Any previous
- data in the file will be overwritten. To help protect
- the credentials contained in the file, the permissions
- of the file will be set to readable/writable by owner only.
- """
- fp = open(file_path, 'w')
- json.dump(self.to_dict(), fp)
- fp.close()
- os.chmod(file_path, 0o600)
-
- def is_expired(self, time_offset_seconds=0):
- """
- Checks to see if the Session Token is expired or not. By default
- it will check to see if the Session Token is expired as of the
- moment the method is called. However, you can supply an
- optional parameter which is the number of seconds of offset
- into the future for the check. For example, if you supply
- a value of 5, this method will return a True if the Session
- Token will be expired 5 seconds from this moment.
-
- :type time_offset_seconds: int
- :param time_offset_seconds: The number of seconds into the future
- to test the Session Token for expiration.
- """
- now = datetime.datetime.utcnow()
- if time_offset_seconds:
- now = now + datetime.timedelta(seconds=time_offset_seconds)
- ts = boto.utils.parse_ts(self.expiration)
- delta = ts - now
- return delta.total_seconds() <= 0
-
-
-class FederationToken(object):
- """
- :ivar credentials: A Credentials object containing the credentials.
- :ivar federated_user_arn: ARN specifying federated user using credentials.
- :ivar federated_user_id: The ID of the federated user using credentials.
- :ivar packed_policy_size: A percentage value indicating the size of
- the policy in packed form
- """
-
- def __init__(self, parent=None):
- self.parent = parent
- self.credentials = None
- self.federated_user_arn = None
- self.federated_user_id = None
- self.packed_policy_size = None
- self.request_id = None
-
- def startElement(self, name, attrs, connection):
- if name == 'Credentials':
- self.credentials = Credentials()
- return self.credentials
- else:
- return None
-
- def endElement(self, name, value, connection):
- if name == 'Arn':
- self.federated_user_arn = value
- elif name == 'FederatedUserId':
- self.federated_user_id = value
- elif name == 'PackedPolicySize':
- self.packed_policy_size = int(value)
- elif name == 'RequestId':
- self.request_id = value
- else:
- pass
-
-
-class AssumedRole(object):
- """
- :ivar user: The assumed role user.
- :ivar credentials: A Credentials object containing the credentials.
- """
- def __init__(self, connection=None, credentials=None, user=None):
- self._connection = connection
- self.credentials = credentials
- self.user = user
-
- def startElement(self, name, attrs, connection):
- if name == 'Credentials':
- self.credentials = Credentials()
- return self.credentials
- elif name == 'AssumedRoleUser':
- self.user = User()
- return self.user
-
- def endElement(self, name, value, connection):
- pass
-
-
-class User(object):
- """
- :ivar arn: The arn of the user assuming the role.
- :ivar assume_role_id: The identifier of the assumed role.
- """
- def __init__(self, arn=None, assume_role_id=None):
- self.arn = arn
- self.assume_role_id = assume_role_id
-
- def startElement(self, name, attrs, connection):
- pass
-
- def endElement(self, name, value, connection):
- if name == 'Arn':
- self.arn = value
- elif name == 'AssumedRoleId':
- self.assume_role_id = value
-
-
-class DecodeAuthorizationMessage(object):
- """
- :ivar request_id: The request ID.
- :ivar decoded_message: The decoded authorization message (may be JSON).
- """
- def __init__(self, request_id=None, decoded_message=None):
- self.request_id = request_id
- self.decoded_message = decoded_message
-
- def startElement(self, name, attrs, connection):
- pass
-
- def endElement(self, name, value, connection):
- if name == 'requestId':
- self.request_id = value
- elif name == 'DecodedMessage':
- self.decoded_message = value

Powered by Google App Engine
This is Rietveld 408576698