Python botocore.credentials() Examples
The following are 30
code examples of botocore.credentials().
You can vote up the ones you like or vote down the ones you don't like,
and go to the original project or source file by following the links above each example.
You may also want to check out all available functions/classes of the module
botocore
, or try the search function
.
Example #1
Source File: context_test.py From git-remote-codecommit with Apache License 2.0 | 6 votes |
def mock_session(region = None, available_profiles = None, credentials = DEFAULT_CREDS, resolver = mock_resolver): def decorator(func): session = Mock() session.get_config_variable.return_value = region session.available_profiles = available_profiles session.get_credentials.return_value = credentials session.get_available_partitions.return_value = get_available_partitions() session.get_available_regions.side_effect = get_available_regions session.get_component.return_value = resolver @functools.wraps(func) def wrapped(*args, **kwargs): with patch('botocore.session.Session', Mock(return_value = session)): with patch('awscli.plugin.load_plugins', Mock()): func(*args, **kwargs) return wrapped return decorator
Example #2
Source File: session.py From aws-builders-fair-projects with Apache License 2.0 | 6 votes |
def set_credentials(self, access_key, secret_key, token=None): """ Manually create credentials for this session. If you would prefer to use botocore without a config file, environment variables, or IAM roles, you can pass explicit credentials into this method to establish credentials for this session. :type access_key: str :param access_key: The access key part of the credentials. :type secret_key: str :param secret_key: The secret key part of the credentials. :type token: str :param token: An option session token used by STS session credentials. """ self._credentials = botocore.credentials.Credentials(access_key, secret_key, token)
Example #3
Source File: session.py From faces with GNU General Public License v2.0 | 6 votes |
def set_credentials(self, access_key, secret_key, token=None): """ Manually create credentials for this session. If you would prefer to use botocore without a config file, environment variables, or IAM roles, you can pass explicit credentials into this method to establish credentials for this session. :type access_key: str :param access_key: The access key part of the credentials. :type secret_key: str :param secret_key: The secret key part of the credentials. :type token: str :param token: An option session token used by STS session credentials. """ self._credentials = botocore.credentials.Credentials(access_key, secret_key, token)
Example #4
Source File: session.py From bash-lambda-layer with MIT License | 6 votes |
def set_credentials(self, access_key, secret_key, token=None): """ Manually create credentials for this session. If you would prefer to use botocore without a config file, environment variables, or IAM roles, you can pass explicit credentials into this method to establish credentials for this session. :type access_key: str :param access_key: The access key part of the credentials. :type secret_key: str :param secret_key: The secret key part of the credentials. :type token: str :param token: An option session token used by STS session credentials. """ self._credentials = botocore.credentials.Credentials(access_key, secret_key, token)
Example #5
Source File: session.py From faces with GNU General Public License v2.0 | 6 votes |
def set_credentials(self, access_key, secret_key, token=None): """ Manually create credentials for this session. If you would prefer to use botocore without a config file, environment variables, or IAM roles, you can pass explicit credentials into this method to establish credentials for this session. :type access_key: str :param access_key: The access key part of the credentials. :type secret_key: str :param secret_key: The secret key part of the credentials. :type token: str :param token: An option session token used by STS session credentials. """ self._credentials = botocore.credentials.Credentials(access_key, secret_key, token)
Example #6
Source File: session.py From aws-extender with MIT License | 6 votes |
def set_credentials(self, access_key, secret_key, token=None): """ Manually create credentials for this session. If you would prefer to use botocore without a config file, environment variables, or IAM roles, you can pass explicit credentials into this method to establish credentials for this session. :type access_key: str :param access_key: The access key part of the credentials. :type secret_key: str :param secret_key: The secret key part of the credentials. :type token: str :param token: An option session token used by STS session credentials. """ self._credentials = botocore.credentials.Credentials(access_key, secret_key, token)
Example #7
Source File: session.py From AWS-Transit-Gateway-Demo-MultiAccount with MIT License | 6 votes |
def set_credentials(self, access_key, secret_key, token=None): """ Manually create credentials for this session. If you would prefer to use botocore without a config file, environment variables, or IAM roles, you can pass explicit credentials into this method to establish credentials for this session. :type access_key: str :param access_key: The access key part of the credentials. :type secret_key: str :param secret_key: The secret key part of the credentials. :type token: str :param token: An option session token used by STS session credentials. """ self._credentials = botocore.credentials.Credentials(access_key, secret_key, token)
Example #8
Source File: session.py From AWS-Transit-Gateway-Demo-MultiAccount with MIT License | 6 votes |
def set_credentials(self, access_key, secret_key, token=None): """ Manually create credentials for this session. If you would prefer to use botocore without a config file, environment variables, or IAM roles, you can pass explicit credentials into this method to establish credentials for this session. :type access_key: str :param access_key: The access key part of the credentials. :type secret_key: str :param secret_key: The secret key part of the credentials. :type token: str :param token: An option session token used by STS session credentials. """ self._credentials = botocore.credentials.Credentials(access_key, secret_key, token)
Example #9
Source File: session.py From deepWordBug with Apache License 2.0 | 6 votes |
def set_credentials(self, access_key, secret_key, token=None): """ Manually create credentials for this session. If you would prefer to use botocore without a config file, environment variables, or IAM roles, you can pass explicit credentials into this method to establish credentials for this session. :type access_key: str :param access_key: The access key part of the credentials. :type secret_key: str :param secret_key: The secret key part of the credentials. :type token: str :param token: An option session token used by STS session credentials. """ self._credentials = botocore.credentials.Credentials(access_key, secret_key, token)
Example #10
Source File: session.py From AWS-Transit-Gateway-Demo-MultiAccount with MIT License | 5 votes |
def _register_credential_provider(self): self._components.lazy_register_component( 'credential_provider', lambda: botocore.credentials.create_credential_resolver(self))
Example #11
Source File: session.py From aws-builders-fair-projects with Apache License 2.0 | 5 votes |
def get_credentials(self): """ Return the :class:`botocore.credential.Credential` object associated with this session. If the credentials have not yet been loaded, this will attempt to load them. If they have already been loaded, this will return the cached credentials. """ if self._credentials is None: self._credentials = self._components.get_component( 'credential_provider').load_credentials() return self._credentials
Example #12
Source File: session.py From AWS-Transit-Gateway-Demo-MultiAccount with MIT License | 5 votes |
def full_config(self): """Return the parsed config file. The ``get_config`` method returns the config associated with the specified profile. This property returns the contents of the **entire** config file. :rtype: dict """ if self._config is None: try: config_file = self.get_config_variable('config_file') self._config = botocore.configloader.load_config(config_file) except ConfigNotFound: self._config = {'profiles': {}} try: # Now we need to inject the profiles from the # credentials file. We don't actually need the values # in the creds file, only the profile names so that we # can validate the user is not referring to a nonexistent # profile. cred_file = self.get_config_variable('credentials_file') cred_profiles = botocore.configloader.raw_config_parse( cred_file) for profile in cred_profiles: cred_vars = cred_profiles[profile] if profile not in self._config['profiles']: self._config['profiles'][profile] = cred_vars else: self._config['profiles'][profile].update(cred_vars) except ConfigNotFound: pass return self._config
Example #13
Source File: session.py From AWS-Transit-Gateway-Demo-MultiAccount with MIT License | 5 votes |
def get_credentials(self): """ Return the :class:`botocore.credential.Credential` object associated with this session. If the credentials have not yet been loaded, this will attempt to load them. If they have already been loaded, this will return the cached credentials. """ if self._credentials is None: self._credentials = self._components.get_component( 'credential_provider').load_credentials() return self._credentials
Example #14
Source File: session.py From AWS-Transit-Gateway-Demo-MultiAccount with MIT License | 5 votes |
def _register_credential_provider(self): self._components.lazy_register_component( 'credential_provider', lambda: botocore.credentials.create_credential_resolver(self))
Example #15
Source File: session.py From AWS-Transit-Gateway-Demo-MultiAccount with MIT License | 5 votes |
def get_credentials(self): """ Return the :class:`botocore.credential.Credential` object associated with this session. If the credentials have not yet been loaded, this will attempt to load them. If they have already been loaded, this will return the cached credentials. """ if self._credentials is None: self._credentials = self._components.get_component( 'credential_provider').load_credentials() return self._credentials
Example #16
Source File: botocore.py From pytest-localstack with MIT License | 5 votes |
def create_credential_resolver(): """Create a credentials resolver for Localstack.""" env_provider = botocore.credentials.EnvProvider() default = DefaultCredentialProvider() resolver = botocore.credentials.CredentialResolver( providers=[env_provider, default] ) return resolver
Example #17
Source File: botocore.py From pytest-localstack with MIT License | 5 votes |
def load(self): """Return credentials.""" return botocore.credentials.Credentials( access_key=constants.DEFAULT_AWS_ACCESS_KEY_ID, secret_key=constants.DEFAULT_AWS_SECRET_ACCESS_KEY, token=constants.DEFAULT_AWS_SESSION_TOKEN, method=self.METHOD, )
Example #18
Source File: session.py From aws-extender with MIT License | 5 votes |
def _register_credential_provider(self): self._components.lazy_register_component( 'credential_provider', lambda: botocore.credentials.create_credential_resolver(self))
Example #19
Source File: session.py From aws-extender with MIT License | 5 votes |
def full_config(self): """Return the parsed config file. The ``get_config`` method returns the config associated with the specified profile. This property returns the contents of the **entire** config file. :rtype: dict """ if self._config is None: try: config_file = self.get_config_variable('config_file') self._config = botocore.configloader.load_config(config_file) except ConfigNotFound: self._config = {'profiles': {}} try: # Now we need to inject the profiles from the # credentials file. We don't actually need the values # in the creds file, only the profile names so that we # can validate the user is not referring to a nonexistent # profile. cred_file = self.get_config_variable('credentials_file') cred_profiles = botocore.configloader.raw_config_parse( cred_file) for profile in cred_profiles: cred_vars = cred_profiles[profile] if profile not in self._config['profiles']: self._config['profiles'][profile] = cred_vars else: self._config['profiles'][profile].update(cred_vars) except ConfigNotFound: pass return self._config
Example #20
Source File: session.py From aws-extender with MIT License | 5 votes |
def get_credentials(self): """ Return the :class:`botocore.credential.Credential` object associated with this session. If the credentials have not yet been loaded, this will attempt to load them. If they have already been loaded, this will return the cached credentials. """ if self._credentials is None: self._credentials = self._components.get_component( 'credential_provider').load_credentials() return self._credentials
Example #21
Source File: session.py From aws-builders-fair-projects with Apache License 2.0 | 5 votes |
def _register_credential_provider(self): self._components.lazy_register_component( 'credential_provider', lambda: botocore.credentials.create_credential_resolver(self))
Example #22
Source File: session.py From aws-builders-fair-projects with Apache License 2.0 | 5 votes |
def full_config(self): """Return the parsed config file. The ``get_config`` method returns the config associated with the specified profile. This property returns the contents of the **entire** config file. :rtype: dict """ if self._config is None: try: config_file = self.get_config_variable('config_file') self._config = botocore.configloader.load_config(config_file) except ConfigNotFound: self._config = {'profiles': {}} try: # Now we need to inject the profiles from the # credentials file. We don't actually need the values # in the creds file, only the profile names so that we # can validate the user is not referring to a nonexistent # profile. cred_file = self.get_config_variable('credentials_file') cred_profiles = botocore.configloader.raw_config_parse( cred_file) for profile in cred_profiles: cred_vars = cred_profiles[profile] if profile not in self._config['profiles']: self._config['profiles'][profile] = cred_vars else: self._config['profiles'][profile].update(cred_vars) except ConfigNotFound: pass return self._config
Example #23
Source File: image.py From sagemaker-python-sdk with Apache License 2.0 | 5 votes |
def _aws_credentials_available_in_metadata_service(): """Placeholder docstring""" import botocore from botocore.credentials import InstanceMetadataProvider from botocore.utils import InstanceMetadataFetcher session = botocore.session.Session() instance_metadata_provider = InstanceMetadataProvider( iam_role_fetcher=InstanceMetadataFetcher( timeout=session.get_config_variable("metadata_service_timeout"), num_attempts=session.get_config_variable("metadata_service_num_attempts"), user_agent=session.user_agent(), ) ) return not instance_metadata_provider.load() is None
Example #24
Source File: session.py From faces with GNU General Public License v2.0 | 5 votes |
def _register_credential_provider(self): self._components.lazy_register_component( 'credential_provider', lambda: botocore.credentials.create_credential_resolver(self))
Example #25
Source File: session.py From faces with GNU General Public License v2.0 | 5 votes |
def full_config(self): """Return the parsed config file. The ``get_config`` method returns the config associated with the specified profile. This property returns the contents of the **entire** config file. :rtype: dict """ if self._config is None: try: config_file = self.get_config_variable('config_file') self._config = botocore.configloader.load_config(config_file) except ConfigNotFound: self._config = {'profiles': {}} try: # Now we need to inject the profiles from the # credentials file. We don't actually need the values # in the creds file, only the profile names so that we # can validate the user is not referring to a nonexistent # profile. cred_file = self.get_config_variable('credentials_file') cred_profiles = botocore.configloader.raw_config_parse( cred_file) for profile in cred_profiles: cred_vars = cred_profiles[profile] if profile not in self._config['profiles']: self._config['profiles'][profile] = cred_vars else: self._config['profiles'][profile].update(cred_vars) except ConfigNotFound: pass return self._config
Example #26
Source File: session.py From faces with GNU General Public License v2.0 | 5 votes |
def get_credentials(self): """ Return the :class:`botocore.credential.Credential` object associated with this session. If the credentials have not yet been loaded, this will attempt to load them. If they have already been loaded, this will return the cached credentials. """ if self._credentials is None: self._credentials = self._components.get_component( 'credential_provider').load_credentials() return self._credentials
Example #27
Source File: session.py From faces with GNU General Public License v2.0 | 5 votes |
def _register_credential_provider(self): self._components.lazy_register_component( 'credential_provider', lambda: botocore.credentials.create_credential_resolver(self))
Example #28
Source File: session.py From faces with GNU General Public License v2.0 | 5 votes |
def get_credentials(self): """ Return the :class:`botocore.credential.Credential` object associated with this session. If the credentials have not yet been loaded, this will attempt to load them. If they have already been loaded, this will return the cached credentials. """ if self._credentials is None: self._credentials = self._components.get_component( 'credential_provider').load_credentials() return self._credentials
Example #29
Source File: base.py From tornado-botocore with MIT License | 5 votes |
def __init__(self, service, operation, region_name, endpoint_url=None, session=None, connect_timeout=None, request_timeout=None): # set credentials manually session = session or botocore.session.get_session() # get_session accepts access_key, secret_key self.client = session.create_client( service, region_name=region_name, endpoint_url=endpoint_url ) try: self.endpoint = self.client.endpoint except AttributeError: self.endpoint = self.client._endpoint self.operation = operation self.http_client = AsyncHTTPClient() self.proxy_host = None self.proxy_port = None https_proxy = getproxies_environment().get('https') if https_proxy: self._enable_curl_httpclient() proxy_parts = https_proxy.split(':') if len(proxy_parts) == 2 and proxy_parts[-1].isdigit(): self.proxy_host, self.proxy_port = proxy_parts self.proxy_port = int(self.proxy_port) else: proxy = urlparse(https_proxy) self.proxy_host = proxy.hostname self.proxy_port = proxy.port self.request_timeout = request_timeout self.connect_timeout = connect_timeout
Example #30
Source File: session.py From bash-lambda-layer with MIT License | 5 votes |
def get_credentials(self): """ Return the :class:`botocore.credential.Credential` object associated with this session. If the credentials have not yet been loaded, this will attempt to load them. If they have already been loaded, this will return the cached credentials. """ if self._credentials is None: self._credentials = self._components.get_component( 'credential_provider').load_credentials() return self._credentials