PK���ȼRY��������€��� �v3.phpUT �øŽg‰gñ“gux �õ��õ��½T]kÛ0}߯pEhìâÙM7X‰çv%”v0֐µ{)Aå:6S$!ÉMJèߕ?R÷!>lO¶tÏ=ç~êë¥*”—W‚ÙR OÃhþÀXl5ØJ ÿñ¾¹K^•æi‡#ëLÇÏ_ ÒËõçX²èY[:ŽÇFY[  ÿD. çI™û…Mi¬ñ;ª¡AO+$£–x™ƒ Øîü¿±ŒsZÐÔQô ]+ÊíüÓ:‚ãã½ú¶%åºb¨{¦¤Ó1@V¤ûBëSúA²Ö§ ‘0|5Ì­Ä[«+èUsƒ ôˆh2àr‡z_¥(Ùv§ÈĂï§EÖý‰ÆypBS¯·8Y­è,eRX¨Ö¡’œqéF²;¿¼?Ø?Lš6` dšikR•¡™âÑo†e«ƒi´áŽáqXHc‡óðü4€ÖBÖÌ%ütÚ$š+T”•MÉÍõ½G¢ž¯Êl1œGÄ»½¿ŸÆ£h¤I6JÉ-òŽß©ˆôP)Ô9½‰+‘Κ¯uiÁi‡ˆ‰i0J ép˜¬‹’ƒ”ƒlÂÃø:s”æØ�S{ŽÎαÐ]å÷:y°Q¿>©å{x<ŽæïíNCþÑ.Mf?¨«2ý}=ûõýî'=£§ÿu•Ü(—¾IIa­"éþ@¶�¿ä9?^-qìÇÞôvŠeÈc ðlacã®xèÄ'®âd¶ çˆSEæódP/ÍÆv{Ô)Ó ?>…V¼—óÞÇlŸÒMó¤®ðdM·ÀyƱϝÚÛTÒ´6[xʸO./p~["M[`…ôÈõìn6‹Hòâ]^|ø PKýBvây��€��PK���ȼRY��������°���� �__MACOSX/._v3.phpUT �øŽg‰gþ“gux �õ��õ��c`cg`b`ðMLVðVˆP€'qƒøˆŽ!!AP&HÇ %PDF-1.7 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R >> >> /MediaBox [0.000 0.000 595.280 841.890] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Producer (���d�o�m�p�d�f� �2�.�0�.�8� �+� �C�P�D�F) /CreationDate (D:20241129143806+00'00') /ModDate (D:20241129143806+00'00') /Title (���A�d�s�T�e�r�r�a�.�c�o�m� �i�n�v�o�i�c�e) >> endobj 6 0 obj << /Type /Page /MediaBox [0.000 0.000 595.280 841.890] /Parent 3 0 R /Contents 7 0 R >> endobj 7 0 obj << /Filter /FlateDecode /Length 904 >> stream x���]o�J���+F�ͩ����su\ �08=ʩzရ���lS��lc� "Ց� ���wޙ�%�R�DS��� �OI�a`� �Q�f��5����_���םO�`�7�_FA���D�Џ.j�a=�j����>��n���R+�P��l�rH�{0��w��0��=W�2D ����G���I�>�_B3ed�H�yJ�G>/��ywy�fk��%�$�2.��d_�h����&)b0��"[\B��*_.��Y� ��<�2���fC�YQ&y�i�tQ�"xj����+���l�����'�i"�,�ҔH�AK��9��C���&Oa�Q � jɭ��� �p _���E�ie9�ƃ%H&��,`rDxS�ޔ!�(�X!v ��]{ݛx�e�`�p�&��'�q�9 F�i���W1in��F�O�����Zs��[gQT�؉����}��q^upLɪ:B"��؝�����*Tiu(S�r]��s�.��s9n�N!K!L�M�?�*[��N�8��c��ۯ�b�� ��� �YZ���SR3�n�����lPN��P�;��^�]�!'�z-���ӊ���/��껣��4�l(M�E�QL��X ��~���G��M|�����*��~�;/=N4�-|y�`�i�\�e�T�<���L��G}�"В�J^���q��"X�?(V�ߣXۆ{��H[����P�� �c���kc�Z�9v�����? �a��R�h|��^�k�D4W���?Iӊ�]<��4�)$wdat���~�����������|�L��x�p|N�*��E� �/4�Qpi�x.>��d����,M�y|4^�Ż��8S/޾���uQe���D�y� ��ͧH�����j�wX � �&z� endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj xref 0 10 0000000000 65535 f 0000000009 00000 n 0000000074 00000 n 0000000120 00000 n 0000000284 00000 n 0000000313 00000 n 0000000514 00000 n 0000000617 00000 n 0000001593 00000 n 0000001700 00000 n trailer << /Size 10 /Root 1 0 R /Info 5 0 R /ID[] >> startxref 1812 %%EOF
Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 128

Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 129

Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 130

Warning: Cannot modify header information - headers already sent by (output started at /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php:1) in /home/u866776246/domains/wisatalogung.com/public_html/uploads/produk/1775157541_x.php on line 131
#!/usr/bin/env python from datetime import datetime, timedelta, timezone from tests.compat import mock, unittest import os from boto import provider from boto.compat import expanduser from boto.exception import InvalidInstanceMetadataError INSTANCE_CONFIG = { 'allowall': { u'AccessKeyId': u'iam_access_key', u'Code': u'Success', u'Expiration': u'2012-09-01T03:57:34Z', u'LastUpdated': u'2012-08-31T21:43:40Z', u'SecretAccessKey': u'iam_secret_key', u'Token': u'iam_token', u'Type': u'AWS-HMAC' } } class TestProvider(unittest.TestCase): def setUp(self): self.environ = {} self.config = {} self.shared_config = {} self.metadata_patch = mock.patch('boto.utils.get_instance_metadata') self.config_patch = mock.patch('boto.provider.config.get', self.get_config) self.has_config_patch = mock.patch('boto.provider.config.has_option', self.has_config) self.config_object_patch = mock.patch.object( provider.Config, 'get', self.get_shared_config) self.has_config_object_patch = mock.patch.object( provider.Config, 'has_option', self.has_shared_config) self.environ_patch = mock.patch('os.environ', self.environ) self.get_instance_metadata = self.metadata_patch.start() self.get_instance_metadata.return_value = None self.config_patch.start() self.has_config_patch.start() self.config_object_patch.start() self.has_config_object_patch.start() self.environ_patch.start() def tearDown(self): self.metadata_patch.stop() self.config_patch.stop() self.has_config_patch.stop() self.config_object_patch.stop() self.has_config_object_patch.stop() self.environ_patch.stop() def has_config(self, section_name, key): try: self.config[section_name][key] return True except KeyError: return False def get_config(self, section_name, key): try: return self.config[section_name][key] except KeyError: return None def has_shared_config(self, section_name, key): try: self.shared_config[section_name][key] return True except KeyError: return False def get_shared_config(self, section_name, key): try: return self.shared_config[section_name][key] except KeyError: return None def test_passed_in_values_are_used(self): p = provider.Provider('aws', 'access_key', 'secret_key', 'security_token') self.assertEqual(p.access_key, 'access_key') self.assertEqual(p.secret_key, 'secret_key') self.assertEqual(p.security_token, 'security_token') def test_environment_variables_are_used(self): self.environ['AWS_ACCESS_KEY_ID'] = 'env_access_key' self.environ['AWS_SECRET_ACCESS_KEY'] = 'env_secret_key' p = provider.Provider('aws') self.assertEqual(p.access_key, 'env_access_key') self.assertEqual(p.secret_key, 'env_secret_key') self.assertIsNone(p.security_token) def test_environment_variable_aws_security_token(self): self.environ['AWS_ACCESS_KEY_ID'] = 'env_access_key' self.environ['AWS_SECRET_ACCESS_KEY'] = 'env_secret_key' self.environ['AWS_SECURITY_TOKEN'] = 'env_security_token' p = provider.Provider('aws') self.assertEqual(p.access_key, 'env_access_key') self.assertEqual(p.secret_key, 'env_secret_key') self.assertEqual(p.security_token, 'env_security_token') def test_no_credentials_provided(self): p = provider.Provider( 'aws', provider.NO_CREDENTIALS_PROVIDED, provider.NO_CREDENTIALS_PROVIDED, provider.NO_CREDENTIALS_PROVIDED ) self.assertEqual(p.access_key, provider.NO_CREDENTIALS_PROVIDED) self.assertEqual(p.secret_key, provider.NO_CREDENTIALS_PROVIDED) self.assertEqual(p.security_token, provider.NO_CREDENTIALS_PROVIDED) def test_config_profile_values_are_used(self): self.config = { 'profile dev': { 'aws_access_key_id': 'dev_access_key', 'aws_secret_access_key': 'dev_secret_key', }, 'profile prod': { 'aws_access_key_id': 'prod_access_key', 'aws_secret_access_key': 'prod_secret_key', }, 'profile prod_withtoken': { 'aws_access_key_id': 'prod_access_key', 'aws_secret_access_key': 'prod_secret_key', 'aws_security_token': 'prod_token', }, 'Credentials': { 'aws_access_key_id': 'default_access_key', 'aws_secret_access_key': 'default_secret_key' } } p = provider.Provider('aws', profile_name='prod') self.assertEqual(p.access_key, 'prod_access_key') self.assertEqual(p.secret_key, 'prod_secret_key') p = provider.Provider('aws', profile_name='prod_withtoken') self.assertEqual(p.access_key, 'prod_access_key') self.assertEqual(p.secret_key, 'prod_secret_key') self.assertEqual(p.security_token, 'prod_token') q = provider.Provider('aws', profile_name='dev') self.assertEqual(q.access_key, 'dev_access_key') self.assertEqual(q.secret_key, 'dev_secret_key') def test_config_missing_profile(self): # None of these default profiles should be loaded! self.shared_config = { 'default': { 'aws_access_key_id': 'shared_access_key', 'aws_secret_access_key': 'shared_secret_key', } } self.config = { 'Credentials': { 'aws_access_key_id': 'default_access_key', 'aws_secret_access_key': 'default_secret_key' } } with self.assertRaises(provider.ProfileNotFoundError): provider.Provider('aws', profile_name='doesntexist') def test_config_values_are_used(self): self.config = { 'Credentials': { 'aws_access_key_id': 'cfg_access_key', 'aws_secret_access_key': 'cfg_secret_key', } } p = provider.Provider('aws') self.assertEqual(p.access_key, 'cfg_access_key') self.assertEqual(p.secret_key, 'cfg_secret_key') self.assertIsNone(p.security_token) def test_config_value_security_token_is_used(self): self.config = { 'Credentials': { 'aws_access_key_id': 'cfg_access_key', 'aws_secret_access_key': 'cfg_secret_key', 'aws_security_token': 'cfg_security_token', } } p = provider.Provider('aws') self.assertEqual(p.access_key, 'cfg_access_key') self.assertEqual(p.secret_key, 'cfg_secret_key') self.assertEqual(p.security_token, 'cfg_security_token') def test_keyring_is_used(self): self.config = { 'Credentials': { 'aws_access_key_id': 'cfg_access_key', 'keyring': 'test', } } import sys try: import keyring imported = True except ImportError: sys.modules['keyring'] = keyring = type(mock)('keyring', '') imported = False try: with mock.patch('keyring.get_password', create=True): keyring.get_password.side_effect = ( lambda kr, login: kr+login+'pw') p = provider.Provider('aws') self.assertEqual(p.access_key, 'cfg_access_key') self.assertEqual(p.secret_key, 'testcfg_access_keypw') self.assertIsNone(p.security_token) finally: if not imported: del sys.modules['keyring'] def test_passed_in_values_beat_env_vars(self): self.environ['AWS_ACCESS_KEY_ID'] = 'env_access_key' self.environ['AWS_SECRET_ACCESS_KEY'] = 'env_secret_key' self.environ['AWS_SECURITY_TOKEN'] = 'env_security_token' p = provider.Provider('aws', 'access_key', 'secret_key') self.assertEqual(p.access_key, 'access_key') self.assertEqual(p.secret_key, 'secret_key') self.assertEqual(p.security_token, None) def test_env_vars_beat_shared_creds_values(self): self.environ['AWS_ACCESS_KEY_ID'] = 'env_access_key' self.environ['AWS_SECRET_ACCESS_KEY'] = 'env_secret_key' self.shared_config = { 'default': { 'aws_access_key_id': 'shared_access_key', 'aws_secret_access_key': 'shared_secret_key', } } p = provider.Provider('aws') self.assertEqual(p.access_key, 'env_access_key') self.assertEqual(p.secret_key, 'env_secret_key') self.assertIsNone(p.security_token) def test_shared_creds_beat_config_values(self): self.shared_config = { 'default': { 'aws_access_key_id': 'shared_access_key', 'aws_secret_access_key': 'shared_secret_key', } } self.config = { 'Credentials': { 'aws_access_key_id': 'cfg_access_key', 'aws_secret_access_key': 'cfg_secret_key', } } p = provider.Provider('aws') self.assertEqual(p.access_key, 'shared_access_key') self.assertEqual(p.secret_key, 'shared_secret_key') self.assertIsNone(p.security_token) def test_shared_creds_profile_beats_defaults(self): self.shared_config = { 'default': { 'aws_access_key_id': 'shared_access_key', 'aws_secret_access_key': 'shared_secret_key', }, 'foo': { 'aws_access_key_id': 'foo_access_key', 'aws_secret_access_key': 'foo_secret_key', } } p = provider.Provider('aws', profile_name='foo') self.assertEqual(p.access_key, 'foo_access_key') self.assertEqual(p.secret_key, 'foo_secret_key') self.assertIsNone(p.security_token) def test_env_profile_loads_profile(self): self.environ['AWS_PROFILE'] = 'foo' self.shared_config = { 'default': { 'aws_access_key_id': 'shared_access_key', 'aws_secret_access_key': 'shared_secret_key', }, 'foo': { 'aws_access_key_id': 'shared_access_key_foo', 'aws_secret_access_key': 'shared_secret_key_foo', } } self.config = { 'profile foo': { 'aws_access_key_id': 'cfg_access_key_foo', 'aws_secret_access_key': 'cfg_secret_key_foo', }, 'Credentials': { 'aws_access_key_id': 'cfg_access_key', 'aws_secret_access_key': 'cfg_secret_key', } } p = provider.Provider('aws') self.assertEqual(p.access_key, 'shared_access_key_foo') self.assertEqual(p.secret_key, 'shared_secret_key_foo') self.assertIsNone(p.security_token) self.shared_config = {} p = provider.Provider('aws') self.assertEqual(p.access_key, 'cfg_access_key_foo') self.assertEqual(p.secret_key, 'cfg_secret_key_foo') self.assertIsNone(p.security_token) def test_env_vars_security_token_beats_config_values(self): self.environ['AWS_ACCESS_KEY_ID'] = 'env_access_key' self.environ['AWS_SECRET_ACCESS_KEY'] = 'env_secret_key' self.environ['AWS_SECURITY_TOKEN'] = 'env_security_token' self.shared_config = { 'default': { 'aws_access_key_id': 'shared_access_key', 'aws_secret_access_key': 'shared_secret_key', 'aws_security_token': 'shared_security_token', } } self.config = { 'Credentials': { 'aws_access_key_id': 'cfg_access_key', 'aws_secret_access_key': 'cfg_secret_key', 'aws_security_token': 'cfg_security_token', } } p = provider.Provider('aws') self.assertEqual(p.access_key, 'env_access_key') self.assertEqual(p.secret_key, 'env_secret_key') self.assertEqual(p.security_token, 'env_security_token') self.environ.clear() p = provider.Provider('aws') self.assertEqual(p.security_token, 'shared_security_token') self.shared_config.clear() p = provider.Provider('aws') self.assertEqual(p.security_token, 'cfg_security_token') def test_metadata_server_credentials(self): self.get_instance_metadata.return_value = INSTANCE_CONFIG p = provider.Provider('aws') self.assertEqual(p.access_key, 'iam_access_key') self.assertEqual(p.secret_key, 'iam_secret_key') self.assertEqual(p.security_token, 'iam_token') self.assertEqual( self.get_instance_metadata.call_args[1]['data'], 'meta-data/iam/security-credentials/') def test_metadata_server_returns_bad_type(self): self.get_instance_metadata.return_value = { 'rolename': [], } with self.assertRaises(InvalidInstanceMetadataError): p = provider.Provider('aws') def test_metadata_server_returns_empty_string(self): self.get_instance_metadata.return_value = { 'rolename': '' } with self.assertRaises(InvalidInstanceMetadataError): p = provider.Provider('aws') def test_metadata_server_returns_missing_keys(self): self.get_instance_metadata.return_value = { 'allowall': { u'AccessKeyId': u'iam_access_key', # Missing SecretAccessKey. u'Token': u'iam_token', u'Expiration': u'2012-09-01T03:57:34Z', } } with self.assertRaises(InvalidInstanceMetadataError): p = provider.Provider('aws') def test_refresh_credentials(self): now = datetime.now(tz=timezone.utc).replace(tzinfo=None) first_expiration = (now + timedelta(seconds=10)).strftime( "%Y-%m-%dT%H:%M:%SZ") credentials = { u'AccessKeyId': u'first_access_key', u'Code': u'Success', u'Expiration': first_expiration, u'LastUpdated': u'2012-08-31T21:43:40Z', u'SecretAccessKey': u'first_secret_key', u'Token': u'first_token', u'Type': u'AWS-HMAC' } instance_config = {'allowall': credentials} self.get_instance_metadata.return_value = instance_config p = provider.Provider('aws') self.assertEqual(p.access_key, 'first_access_key') self.assertEqual(p.secret_key, 'first_secret_key') self.assertEqual(p.security_token, 'first_token') self.assertIsNotNone(p._credential_expiry_time) # Now set the expiration to something in the past. expired = now - timedelta(seconds=20) p._credential_expiry_time = expired credentials['AccessKeyId'] = 'second_access_key' credentials['SecretAccessKey'] = 'second_secret_key' credentials['Token'] = 'second_token' self.get_instance_metadata.return_value = instance_config # Now upon attribute access, the credentials should be updated. self.assertEqual(p.access_key, 'second_access_key') self.assertEqual(p.secret_key, 'second_secret_key') self.assertEqual(p.security_token, 'second_token') @mock.patch('boto.provider.config.getint') @mock.patch('boto.provider.config.getfloat') def test_metadata_config_params(self, config_float, config_int): config_int.return_value = 10 config_float.return_value = 4.0 self.get_instance_metadata.return_value = INSTANCE_CONFIG p = provider.Provider('aws') self.assertEqual(p.access_key, 'iam_access_key') self.assertEqual(p.secret_key, 'iam_secret_key') self.assertEqual(p.security_token, 'iam_token') self.get_instance_metadata.assert_called_with( timeout=4.0, num_retries=10, data='meta-data/iam/security-credentials/') def test_provider_google(self): self.environ['GS_ACCESS_KEY_ID'] = 'env_access_key' self.environ['GS_SECRET_ACCESS_KEY'] = 'env_secret_key' self.shared_config = { 'default': { 'gs_access_key_id': 'shared_access_key', 'gs_secret_access_key': 'shared_secret_key', } } self.config = { 'Credentials': { 'gs_access_key_id': 'cfg_access_key', 'gs_secret_access_key': 'cfg_secret_key', } } p = provider.Provider('google') self.assertEqual(p.access_key, 'env_access_key') self.assertEqual(p.secret_key, 'env_secret_key') self.environ.clear() p = provider.Provider('google') self.assertEqual(p.access_key, 'shared_access_key') self.assertEqual(p.secret_key, 'shared_secret_key') self.shared_config.clear() p = provider.Provider('google') self.assertEqual(p.access_key, 'cfg_access_key') self.assertEqual(p.secret_key, 'cfg_secret_key') @mock.patch('os.path.isfile', return_value=True) @mock.patch.object(provider.Config, 'load_from_path') def test_shared_config_loading(self, load_from_path, exists): provider.Provider('aws') path = os.path.join(expanduser('~'), '.aws', 'credentials') exists.assert_called_once_with(path) load_from_path.assert_called_once_with(path) exists.reset_mock() load_from_path.reset_mock() provider.Provider('google') path = os.path.join(expanduser('~'), '.google', 'credentials') exists.assert_called_once_with(path) load_from_path.assert_called_once_with(path) if __name__ == '__main__': unittest.main()