%PDF- %PDF-
Direktori : /proc/self/root/lib/python2.7/site-packages/euca2ools/commands/misc/ |
Current File : //proc/self/root/lib/python2.7/site-packages/euca2ools/commands/misc/releaserole.pyo |
� ��Xc @ st d d l Z d d l Z d d l Z d d l m Z m Z d d l m Z d d l m Z d e f d � � YZ d S( i����N( t Argt MutuallyExclusiveArgList( t BaseCommand( t Euca2oolst ReleaseRolec B sk e Z d Z e Z e e d d d d d d d d d �e d d d d d d d d d �� g Z d � Z RS( s Release IAM role credentials The %(prog)s utility removes the credentials created by euare-assumerole(1) by outputting shellcode that deletes the environment variables it creates. Use it inside an eval command to make this process seamless: $ eval `euare-releaserole` Note that if the credentials used to initially assume the role were supplied in the form of environment variables those environment variables will need to be reset: $ source eucarcs -ct destt csh_outputt route_tot actiont store_truet helpsf generate C-shell commands on stdout (default if SHELL looks like a csh-style shells -st sh_outputs� generate Bourne shell commands on stdout (default if SHELL does not look like a csh-style shellc C s� xk d D]c } | j j d � sM | j j d � rV t j d d � j d � rV d } n d } | j | � GHq WHd GHd j d j d � t j D� � � GHd S( Nt AWS_ACCESS_KEY_IDt AWS_ACCESS_KEYt EC2_ACCESS_KEYt AWS_SECRET_ACCESS_KEYt AWS_SECRET_KEYt EC2_SECRET_KEYt AWS_SESSION_TOKENt AWS_SECURITY_TOKENt AWS_CREDENTIAL_EXPIRATIONt EC2_USER_IDt AWS_CREDENTIAL_FILER R t SHELLt t cshs unsetenv {0};s unset {0};s5 # If you can read this, rerun this program with eval:s # eval `{0}`t c s s | ] } t j | � Vq d S( N( t pipest quote( t .0t arg( ( sG /usr/lib/python2.7/site-packages/euca2ools/commands/misc/releaserole.pys <genexpr>O s ( R R R R R R R R R R R ( t argst gett ost getenvt endswitht formatt joint syst argv( t selft _t vart fmt( ( sG /usr/lib/python2.7/site-packages/euca2ools/commands/misc/releaserole.pyt print_result>