cdocutils.nodes document q)q}q(U nametypesq}q(XdynamodbqNX precedenceqNXbotoqNX introductionq NXkeyringq X discussionq Xref-boto_configq Xswfq NXdbqNXkeyring documentationqXdetailsqNXsdbqNX notificationqNX credentialsqNXpyamiqNXsectionsqNX boto configqNuUsubstitution_defsq}qUparse_messagesq]qUcurrent_sourceqNU decorationqNUautofootnote_startqKUnameidsq}q(hUdynamodbq hU precedenceq!hUbotoq"h U introductionq#h Ukeyringq$h U discussionq%h Uref-boto-configq&h Uswfq'hUdbq(hUkeyring-documentationq)hUdetailsq*hUsdbq+hU notificationq,hU credentialsq-hUpyamiq.hUsectionsq/hU boto-configq0uUchildrenq1]q2(cdocutils.nodes target q3)q4}q5(U rawsourceq6X.. _ref-boto_config:Uparentq7hUsourceq8XE/Users/kyleknap/Documents/GitHub/boto/docs/source/boto_config_tut.rstq9Utagnameq:Utargetq;U attributesq<}q=(Uidsq>]Ubackrefsq?]Udupnamesq@]UclassesqA]UnamesqB]UrefidqCh&uUlineqDKUdocumentqEhh1]ubcdocutils.nodes section qF)qG}qH(h6Uh7hh8h9Uexpect_referenced_by_nameqI}qJh h4sh:UsectionqKh<}qL(h@]hA]h?]h>]qM(h0h&ehB]qN(hh euhDKhEhUexpect_referenced_by_idqO}qPh&h4sh1]qQ(cdocutils.nodes title qR)qS}qT(h6X Boto ConfigqUh7hGh8h9h:UtitleqVh<}qW(h@]hA]h?]h>]hB]uhDKhEhh1]qXcdocutils.nodes Text qYX Boto ConfigqZq[}q\(h6hUh7hSubaubhF)q]}q^(h6Uh7hGh8h9h:hKh<}q_(h@]hA]h?]h>]q`h#ahB]qah auhDKhEhh1]qb(hR)qc}qd(h6X Introductionqeh7h]h8h9h:hVh<}qf(h@]hA]h?]h>]hB]uhDKhEhh1]qghYX Introductionqhqi}qj(h6heh7hcubaubcdocutils.nodes paragraph qk)ql}qm(h6XThere is a growing list of configuration options for the boto library. Many of these options can be passed into the constructors for top-level objects such as connections. Some options, such as credentials, can also be read from environment variables (e.g. ``AWS_ACCESS_KEY_ID``, ``AWS_SECRET_ACCESS_KEY``, ``AWS_SECURITY_TOKEN`` and ``AWS_PROFILE``). It is also possible to manage these options in a central place through the use of boto config files.h7h]h8h9h:U paragraphqnh<}qo(h@]hA]h?]h>]hB]uhDK hEhh1]qp(hYXThere is a growing list of configuration options for the boto library. Many of these options can be passed into the constructors for top-level objects such as connections. Some options, such as credentials, can also be read from environment variables (e.g. qqqr}qs(h6XThere is a growing list of configuration options for the boto library. Many of these options can be passed into the constructors for top-level objects such as connections. Some options, such as credentials, can also be read from environment variables (e.g. h7hlubcdocutils.nodes literal qt)qu}qv(h6X``AWS_ACCESS_KEY_ID``h<}qw(h@]hA]h?]h>]hB]uh7hlh1]qxhYXAWS_ACCESS_KEY_IDqyqz}q{(h6Uh7huubah:Uliteralq|ubhYX, q}q~}q(h6X, h7hlubht)q}q(h6X``AWS_SECRET_ACCESS_KEY``h<}q(h@]hA]h?]h>]hB]uh7hlh1]qhYXAWS_SECRET_ACCESS_KEYqq}q(h6Uh7hubah:h|ubhYX, qq}q(h6X, h7hlubht)q}q(h6X``AWS_SECURITY_TOKEN``h<}q(h@]hA]h?]h>]hB]uh7hlh1]qhYXAWS_SECURITY_TOKENqq}q(h6Uh7hubah:h|ubhYX and qq}q(h6X and h7hlubht)q}q(h6X``AWS_PROFILE``h<}q(h@]hA]h?]h>]hB]uh7hlh1]qhYX AWS_PROFILEqq}q(h6Uh7hubah:h|ubhYXg). It is also possible to manage these options in a central place through the use of boto config files.qq}q(h6Xg). It is also possible to manage these options in a central place through the use of boto config files.h7hlubeubeubhF)q}q(h6Uh7hGh8h9h:hKh<}q(h@]hA]h?]h>]qh*ahB]qhauhDKhEhh1]q(hR)q}q(h6XDetailsqh7hh8h9h:hVh<}q(h@]hA]h?]h>]hB]uhDKhEhh1]qhYXDetailsqq}q(h6hh7hubaubhk)q}q(h6X%A boto config file is a text file formatted like an .ini configuration file that specifies values for options that control the behavior of the boto library. In Unix/Linux systems, on startup, the boto library looks for configuration files in the following locations and in the following order:qh7hh8h9h:hnh<}q(h@]hA]h?]h>]hB]uhDKhEhh1]qhYX%A boto config file is a text file formatted like an .ini configuration file that specifies values for options that control the behavior of the boto library. In Unix/Linux systems, on startup, the boto library looks for configuration files in the following locations and in the following order:qq}q(h6hh7hubaubcdocutils.nodes bullet_list q)q}q(h6Uh7hh8h9h:U bullet_listqh<}q(UbulletqX*h>]h?]h@]hA]hB]uhDKhEhh1]q(cdocutils.nodes list_item q)q}q(h6XN/etc/boto.cfg - for site-wide settings that all users on this machine will useqh7hh8h9h:U list_itemqh<}q(h@]hA]h?]h>]hB]uhDNhEhh1]qhk)q}q(h6hh7hh8h9h:hnh<}q(h@]hA]h?]h>]hB]uhDKh1]qhYXN/etc/boto.cfg - for site-wide settings that all users on this machine will useqƅq}q(h6hh7hubaubaubh)q}q(h6X$~/.boto - for user-specific settingsqh7hh8h9h:hh<}q(h@]hA]h?]h>]hB]uhDNhEhh1]qhk)q}q(h6hh7hh8h9h:hnh<}q(h@]hA]h?]h>]hB]uhDKh1]qhYX$~/.boto - for user-specific settingsq҅q}q(h6hh7hubaubaubh)q}q(h6X9~/.aws/credentials - for credentials shared between SDKs h7hh8h9h:hh<}q(h@]hA]h?]h>]hB]uhDNhEhh1]qhk)q}q(h6X8~/.aws/credentials - for credentials shared between SDKsqh7hh8h9h:hnh<}q(h@]hA]h?]h>]hB]uhDKh1]qhYX8~/.aws/credentials - for credentials shared between SDKsqޅq}q(h6hh7hubaubaubeubhk)q}q(h6XIn Windows, create a text file that has any name (e.g. boto.config). It's recommended that you put this file in your user folder. Then set a user environment variable named BOTO_CONFIG to the full path of that file.qh7hh8h9h:hnh<}q(h@]hA]h?]h>]hB]uhDKhEhh1]qhYXIn Windows, create a text file that has any name (e.g. boto.config). It's recommended that you put this file in your user folder. Then set a user environment variable named BOTO_CONFIG to the full path of that file.q慁q}q(h6hh7hubaubhk)q}q(h6XThe options in the config file are merged into a single, in-memory configuration that is available as :py:mod:`boto.config`. The :py:class:`boto.pyami.config.Config` class is a subclass of the standard Python :py:class:`ConfigParser.SafeConfigParser` object and inherits all of the methods of that object. In addition, the boto :py:class:`Config ` class defines additional methods that are described on the PyamiConfigMethods page.h7hh8h9h:hnh<}q(h@]hA]h?]h>]hB]uhDK!hEhh1]q(hYXfThe options in the config file are merged into a single, in-memory configuration that is available as q텁q}q(h6XfThe options in the config file are merged into a single, in-memory configuration that is available as h7hubcsphinx.addnodes pending_xref q)q}q(h6X:py:mod:`boto.config`qh7hh8h9h:U pending_xrefqh<}q(UreftypeXmodUrefwarnqU reftargetqX boto.configU refdomainXpyqh>]h?]U refexplicith@]hA]hB]UrefdocqXboto_config_tutqUpy:classqNU py:moduleqNuhDK!h1]qht)q}q(h6hh<}r(h@]hA]r(UxrefrhXpy-modreh?]h>]hB]uh7hh1]rhYX boto.configrr}r(h6Uh7hubah:h|ubaubhYX. The rr }r (h6X. The h7hubh)r }r (h6X$:py:class:`boto.pyami.config.Config`r h7hh8h9h:hh<}r(UreftypeXclasshhXboto.pyami.config.ConfigU refdomainXpyrh>]h?]U refexplicith@]hA]hB]hhhNhNuhDK!h1]rht)r}r(h6j h<}r(h@]hA]r(jjXpy-classreh?]h>]hB]uh7j h1]rhYXboto.pyami.config.Configrr}r(h6Uh7jubah:h|ubaubhYX, class is a subclass of the standard Python rr}r(h6X, class is a subclass of the standard Python h7hubh)r}r(h6X):py:class:`ConfigParser.SafeConfigParser`rh7hh8h9h:hh<}r (UreftypeXclasshhXConfigParser.SafeConfigParserU refdomainXpyr!h>]h?]U refexplicith@]hA]hB]hhhNhNuhDK!h1]r"ht)r#}r$(h6jh<}r%(h@]hA]r&(jj!Xpy-classr'eh?]h>]hB]uh7jh1]r(hYXConfigParser.SafeConfigParserr)r*}r+(h6Uh7j#ubah:h|ubaubhYXN object and inherits all of the methods of that object. In addition, the boto r,r-}r.(h6XN object and inherits all of the methods of that object. In addition, the boto h7hubh)r/}r0(h6X-:py:class:`Config `r1h7hh8h9h:hh<}r2(UreftypeXclasshhXboto.pyami.config.ConfigU refdomainXpyr3h>]h?]U refexplicith@]hA]hB]hhhNhNuhDK!h1]r4ht)r5}r6(h6j1h<}r7(h@]hA]r8(jj3Xpy-classr9eh?]h>]hB]uh7j/h1]r:hYXConfigr;r<}r=(h6Uh7j5ubah:h|ubaubhYXT class defines additional methods that are described on the PyamiConfigMethods page.r>r?}r@(h6XT class defines additional methods that are described on the PyamiConfigMethods page.h7hubeubhk)rA}rB(h6X-An example boto config file might look like::rCh7hh8h9h:hnh<}rD(h@]hA]h?]h>]hB]uhDK)hEhh1]rEhYX,An example boto config file might look like:rFrG}rH(h6X,An example boto config file might look like:h7jAubaubcdocutils.nodes literal_block rI)rJ}rK(h6Xg[Credentials] aws_access_key_id = aws_secret_access_key = h7hh8h9h:U literal_blockrLh<}rM(U xml:spacerNUpreserverOh>]h?]h@]hA]hB]uhDK+hEhh1]rPhYXg[Credentials] aws_access_key_id = aws_secret_access_key = rQrR}rS(h6Uh7jJubaubeubhF)rT}rU(h6Uh7hGh8h9h:hKh<}rV(h@]hA]h?]h>]rWh/ahB]rXhauhDK1hEhh1]rY(hR)rZ}r[(h6XSectionsr\h7jTh8h9h:hVh<}r](h@]hA]h?]h>]hB]uhDK1hEhh1]r^hYXSectionsr_r`}ra(h6j\h7jZubaubhk)rb}rc(h6XXThe following sections and options are currently recognized within the boto config file.rdh7jTh8h9h:hnh<}re(h@]hA]h?]h>]hB]uhDK3hEhh1]rfhYXXThe following sections and options are currently recognized within the boto config file.rgrh}ri(h6jdh7jbubaubhF)rj}rk(h6Uh7jTh8h9h:hKh<}rl(h@]hA]h?]h>]rmh-ahB]rnhauhDK7hEhh1]ro(hR)rp}rq(h6X Credentialsrrh7jjh8h9h:hVh<}rs(h@]hA]h?]h>]hB]uhDK7hEhh1]rthYX Credentialsrurv}rw(h6jrh7jpubaubhk)rx}ry(h6XThe Credentials section is used to specify the AWS credentials used for all boto requests. The order of precedence for authentication credentials is:rzh7jjh8h9h:hnh<}r{(h@]hA]h?]h>]hB]uhDK9hEhh1]r|hYXThe Credentials section is used to specify the AWS credentials used for all boto requests. The order of precedence for authentication credentials is:r}r~}r(h6jzh7jxubaubh)r}r(h6Uh7jjh8h9h:hh<}r(hX*h>]h?]h@]hA]hB]uhDK]hB]uhDNhEhh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDK]hB]uhDNhEhh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDK=h1]rhYX.Credentials specified by environment variablesrr}r(h6jh7jubaubaubh)r}r(h6XFCredentials specified as named profiles in the shared credential file.rh7jh8h9h:hh<}r(h@]hA]h?]h>]hB]uhDNhEhh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDK>h1]rhYXFCredentials specified as named profiles in the shared credential file.rr}r(h6jh7jubaubaubh)r}r(h6X?Credentials specified by default in the shared credential file.rh7jh8h9h:hh<}r(h@]hA]h?]h>]hB]uhDNhEhh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDK?h1]rhYX?Credentials specified by default in the shared credential file.rr}r(h6jh7jubaubaubh)r}r(h6X;Credentials specified as named profiles in the config file.rh7jh8h9h:hh<}r(h@]hA]h?]h>]hB]uhDNhEhh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDK@h1]rhYX;Credentials specified as named profiles in the config file.rr}r(h6jh7jubaubaubh)r}r(h6X5Credentials specified by default in the config file. h7jh8h9h:hh<}r(h@]hA]h?]h>]hB]uhDNhEhh1]rhk)r}r(h6X4Credentials specified by default in the config file.rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKAh1]rhYX4Credentials specified by default in the config file.rr}r(h6jh7jubaubaubeubhk)r}r(h6XThis section defines the following options: ``aws_access_key_id`` and ``aws_secret_access_key``. The former being your AWS key id and the latter being the secret key.h7jjh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKChEhh1]r(hYX,This section defines the following options: rr}r(h6X,This section defines the following options: h7jubht)r}r(h6X``aws_access_key_id``h<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXaws_access_key_idrr}r(h6Uh7jubah:h|ubhYX and rr}r(h6X and h7jubht)r}r(h6X``aws_secret_access_key``h<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXaws_secret_access_keyrr}r(h6Uh7jubah:h|ubhYXG. The former being your AWS key id and the latter being the secret key.rr}r(h6XG. The former being your AWS key id and the latter being the secret key.h7jubeubhk)r}r(h6X For example::rh7jjh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKGhEhh1]rhYX For example:rr}r(h6X For example:h7jubaubjI)r}r(h6X[profile name_goes_here] aws_access_key_id = aws_secret_access_key = [Credentials] aws_access_key_id = aws_secret_access_key = h7jjh8h9h:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDKIhEhh1]rhYX[profile name_goes_here] aws_access_key_id = aws_secret_access_key = [Credentials] aws_access_key_id = aws_secret_access_key = rr}r(h6Uh7jubaubhk)r}r(h6XPlease notice that quote characters are not used to either side of the '=' operator even when both your AWS access key ID and secret key are strings.rh7jjh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKQhEhh1]rhYXPlease notice that quote characters are not used to either side of the '=' operator even when both your AWS access key ID and secret key are strings.rr}r(h6jh7jubaubhk)r}r(h6XIf you have multiple AWS keypairs that you use for different purposes, use the ``profile`` style shown above. You can set an arbitrary number of profiles within your configuration files and then reference them by name when you instantiate your connection. If you specify a profile that does not exist in the configuration, the keys used under the ``[Credentials]`` heading will be applied by default.h7jjh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKThEhh1]r(hYXOIf you have multiple AWS keypairs that you use for different purposes, use the rr}r(h6XOIf you have multiple AWS keypairs that you use for different purposes, use the h7jubht)r}r(h6X ``profile``h<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXprofiler r }r (h6Uh7jubah:h|ubhYX style shown above. You can set an arbitrary number of profiles within your configuration files and then reference them by name when you instantiate your connection. If you specify a profile that does not exist in the configuration, the keys used under the r r }r(h6X style shown above. You can set an arbitrary number of profiles within your configuration files and then reference them by name when you instantiate your connection. If you specify a profile that does not exist in the configuration, the keys used under the h7jubht)r}r(h6X``[Credentials]``h<}r(h@]hA]h?]h>]hB]uh7jh1]rhYX [Credentials]rr}r(h6Uh7jubah:h|ubhYX$ heading will be applied by default.rr}r(h6X$ heading will be applied by default.h7jubeubhk)r}r(h6XeThe shared credentials file in ``~/.aws/credentials`` uses a slightly different format. For example::h7jjh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDK[hEhh1]r(hYXThe shared credentials file in rr}r(h6XThe shared credentials file in h7jubht)r }r!(h6X``~/.aws/credentials``h<}r"(h@]hA]h?]h>]hB]uh7jh1]r#hYX~/.aws/credentialsr$r%}r&(h6Uh7j ubah:h|ubhYX/ uses a slightly different format. For example:r'r(}r)(h6X/ uses a slightly different format. For example:h7jubeubjI)r*}r+(h6X[default] aws_access_key_id = aws_secret_access_key = [name_goes_here] aws_access_key_id = aws_secret_access_key = [another_profile] aws_access_key_id = aws_secret_access_key = aws_security_token = h7jjh8h9h:jLh<}r,(jNjOh>]h?]h@]hA]hB]uhDK^hEhh1]r-hYX[default] aws_access_key_id = aws_secret_access_key = [name_goes_here] aws_access_key_id = aws_secret_access_key = [another_profile] aws_access_key_id = aws_secret_access_key = aws_security_token = r.r/}r0(h6Uh7j*ubaubhk)r1}r2(h6XFor greater security, the secret key can be stored in a keyring and retrieved via the keyring package. To use a keyring, use ``keyring``, rather than ``aws_secret_access_key``::h7jjh8h9h:hnh<}r3(h@]hA]h?]h>]hB]uhDKkhEhh1]r4(hYX~For greater security, the secret key can be stored in a keyring and retrieved via the keyring package. To use a keyring, use r5r6}r7(h6X~For greater security, the secret key can be stored in a keyring and retrieved via the keyring package. To use a keyring, use h7j1ubht)r8}r9(h6X ``keyring``h<}r:(h@]hA]h?]h>]hB]uh7j1h1]r;hYXkeyringr<r=}r>(h6Uh7j8ubah:h|ubhYX, rather than r?r@}rA(h6X, rather than h7j1ubht)rB}rC(h6X``aws_secret_access_key``h<}rD(h@]hA]h?]h>]hB]uh7j1h1]rEhYXaws_secret_access_keyrFrG}rH(h6Uh7jBubah:h|ubhYX:rI}rJ(h6X:h7j1ubeubjI)rK}rL(h6XL[Credentials] aws_access_key_id = keyring = h7jjh8h9h:jLh<}rM(jNjOh>]h?]h@]hA]hB]uhDKohEhh1]rNhYXL[Credentials] aws_access_key_id = keyring = rOrP}rQ(h6Uh7jKubaubhk)rR}rS(h6XTo use a keyring, you must have the Python `keyring `_ package installed and in the Python path. To learn about setting up keyrings, see the `keyring documentation `_h7jjh8h9h:hnh<}rT(h@]hA]h?]h>]hB]uhDKshEhh1]rU(hYX+To use a keyring, you must have the Python rVrW}rX(h6X+To use a keyring, you must have the Python h7jRubcdocutils.nodes reference rY)rZ}r[(h6X0`keyring `_h<}r\(Unameh Urefurir]X#http://pypi.python.org/pypi/keyringr^h>]h?]h@]hA]hB]uh7jRh1]r_hYXkeyringr`ra}rb(h6Uh7jZubah:U referencercubh3)rd}re(h6X& U referencedrfKh7jRh:h;h<}rg(Urefurij^h>]rhh$ah?]h@]hA]hB]rih auh1]ubhYXW package installed and in the Python path. To learn about setting up keyrings, see the rjrk}rl(h6XW package installed and in the Python path. To learn about setting up keyrings, see the h7jRubjY)rm}rn(h6Xf`keyring documentation `_h<}ro(UnameXkeyring documentationj]XKhttp://pypi.python.org/pypi/keyring#installing-and-using-python-keyring-librph>]h?]h@]hA]hB]uh7jRh1]rqhYXkeyring documentationrrrs}rt(h6Uh7jmubah:jcubh3)ru}rv(h6XN jfKh7jRh:h;h<}rw(Urefurijph>]rxh)ah?]h@]hA]hB]ryhauh1]ubeubhk)rz}r{(h6X;Credentials can also be supplied for a Eucalyptus service::r|h7jjh8h9h:hnh<}r}(h@]hA]h?]h>]hB]uhDKyhEhh1]r~hYX:Credentials can also be supplied for a Eucalyptus service:rr}r(h6X:Credentials can also be supplied for a Eucalyptus service:h7jzubaubjI)r}r(h6X_[Credentials] euca_access_key_id = euca_secret_access_key = h7jjh8h9h:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDK{hEhh1]rhYX_[Credentials] euca_access_key_id = euca_secret_access_key = rr}r(h6Uh7jubaubhk)r}r(h6X[Finally, this section is also be used to provide credentials for the Internet Archive API::rh7jjh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]rhYXZFinally, this section is also be used to provide credentials for the Internet Archive API:rr}r(h6XZFinally, this section is also be used to provide credentials for the Internet Archive API:h7jubaubjI)r}r(h6X[[Credentials] ia_access_key_id = ia_secret_access_key = h7jjh8h9h:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDKhEhh1]rhYX[[Credentials] ia_access_key_id = ia_secret_access_key = rr}r(h6Uh7jubaubeubhF)r}r(h6Uh7jTh8h9h:hKh<}r(h@]hA]h?]h>]rh"ahB]rhauhDKhEhh1]r(hR)r}r(h6XBotorh7jh8h9h:hVh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]rhYXBotorr}r(h6jh7jubaubhk)r}r(h6XThe Boto section is used to specify options that control the operation of boto itself. This section defines the following options:rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]rhYXThe Boto section is used to specify options that control the operation of boto itself. This section defines the following options:rr}r(h6jh7jubaubcdocutils.nodes field_list r)r}r(h6Uh7jh8h9h:U field_listrh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(cdocutils.nodes field r)r}r(h6Uh7jh8h9h:Ufieldrh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(cdocutils.nodes field_name r)r}r(h6Xdebugrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXdebugrr}r(h6jh7jubah:U field_namerubcdocutils.nodes field_body r)r}r(h6XControls the level of debug messages that will be printed by the boto library. The following values are defined:: 0 - no debug messages are printed 1 - basic debug messages from boto are printed 2 - all boto debugging messages plus request/response messages from httplib h<}r(h@]hA]h?]h>]hB]uh7jh1]r(hk)r}r(h6XqControls the level of debug messages that will be printed by the boto library. The following values are defined::h7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]rhYXpControls the level of debug messages that will be printed by the boto library. The following values are defined:rr}r(h6XpControls the level of debug messages that will be printed by the boto library. The following values are defined:h7jubaubjI)r}r(h6X0 - no debug messages are printed 1 - basic debug messages from boto are printed 2 - all boto debugging messages plus request/response messages from httplibh7jh:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDKh1]rhYX0 - no debug messages are printed 1 - basic debug messages from boto are printed 2 - all boto debugging messages plus request/response messages from httplibrr}r(h6Uh7jubaubeh:U field_bodyrubeubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6Xproxyrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXproxyrr}r(h6jh7jubah:jubj)r}r(h6X8The name of the proxy host to use for connecting to AWS.rh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]rhYX8The name of the proxy host to use for connecting to AWS.rr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6X proxy_portrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYX proxy_portrr}r(h6jh7jubah:jubj)r}r(h6X4The port number to use to connect to the proxy host.rh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]rhYX4The port number to use to connect to the proxy host.rr}r(h6jh7jubaubah:jubeubj)r}r (h6Uh7jh8h9h:jh<}r (h@]hA]h?]h>]hB]uhDKhEhh1]r (j)r }r (h6X proxy_userrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYX proxy_userrr}r(h6jh7j ubah:jubj)r}r(h6X9The user name to use when authenticating with proxy host.rh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]rhYX9The user name to use when authenticating with proxy host.rr}r(h6jh7jubaubah:jubeubj)r }r!(h6Uh7jh8h9h:jh<}r"(h@]hA]h?]h>]hB]uhDKhEhh1]r#(j)r$}r%(h6X proxy_passr&h<}r'(h@]hA]h?]h>]hB]uh7j h1]r(hYX proxy_passr)r*}r+(h6j&h7j$ubah:jubj)r,}r-(h6X8The password to use when authenticating with proxy host.r.h<}r/(h@]hA]h?]h>]hB]uh7j h1]r0hk)r1}r2(h6j.h7j,h8h9h:hnh<}r3(h@]hA]h?]h>]hB]uhDKh1]r4hYX8The password to use when authenticating with proxy host.r5r6}r7(h6j.h7j1ubaubah:jubeubj)r8}r9(h6Uh7jh8h9h:jh<}r:(h@]hA]h?]h>]hB]uhDKhEhh1]r;(j)r<}r=(h6X num_retriesr>h<}r?(h@]hA]h?]h>]hB]uh7j8h1]r@hYX num_retriesrArB}rC(h6j>h7j<ubah:jubj)rD}rE(h6XThe number of times to retry failed requests to an AWS server. If boto receives an error from AWS, it will attempt to recover and retry the request. The default number of retries is 5 but you can change the default with this option. h<}rF(h@]hA]h?]h>]hB]uh7j8h1]rGhk)rH}rI(h6XThe number of times to retry failed requests to an AWS server. If boto receives an error from AWS, it will attempt to recover and retry the request. The default number of retries is 5 but you can change the default with this option.rJh7jDh8h9h:hnh<}rK(h@]hA]h?]h>]hB]uhDKh1]rLhYXThe number of times to retry failed requests to an AWS server. If boto receives an error from AWS, it will attempt to recover and retry the request. The default number of retries is 5 but you can change the default with this option.rMrN}rO(h6jJh7jHubaubah:jubeubeubhk)rP}rQ(h6X For example::rRh7jh8h9h:hnh<}rS(h@]hA]h?]h>]hB]uhDKhEhh1]rThYX For example:rUrV}rW(h6X For example:h7jPubaubjI)rX}rY(h6Xj[Boto] debug = 0 num_retries = 10 proxy = myproxy.com proxy_port = 8080 proxy_user = foo proxy_pass = barh7jh8h9h:jLh<}rZ(jNjOh>]h?]h@]hA]hB]uhDKhEhh1]r[hYXj[Boto] debug = 0 num_retries = 10 proxy = myproxy.com proxy_port = 8080 proxy_user = foo proxy_pass = barr\r]}r^(h6Uh7jXubaubj)r_}r`(h6Uh7jh8h9h:jh<}ra(h@]hA]h?]h>]hB]uhDKhEhh1]rb(j)rc}rd(h6Uh7j_h8h9h:jh<}re(h@]hA]h?]h>]hB]uhDKhEhh1]rf(j)rg}rh(h6Xconnection_stale_durationrih<}rj(h@]hA]h?]h>]hB]uh7jch1]rkhYXconnection_stale_durationrlrm}rn(h6jih7jgubah:jubj)ro}rp(h6XAmount of time to wait in seconds before a connection will stop getting reused. AWS will disconnect connections which have been idle for 180 seconds.h<}rq(h@]hA]h?]h>]hB]uh7jch1]rrhk)rs}rt(h6XAmount of time to wait in seconds before a connection will stop getting reused. AWS will disconnect connections which have been idle for 180 seconds.ruh7joh8h9h:hnh<}rv(h@]hA]h?]h>]hB]uhDKh1]rwhYXAmount of time to wait in seconds before a connection will stop getting reused. AWS will disconnect connections which have been idle for 180 seconds.rxry}rz(h6juh7jsubaubah:jubeubj)r{}r|(h6Uh7j_h8h9h:jh<}r}(h@]hA]h?]h>]hB]uhDKhEhh1]r~(j)r}r(h6X is_securerh<}r(h@]hA]h?]h>]hB]uh7j{h1]rhYX is_securerr}r(h6jh7jubah:jubj)r}r(h6XGIs the connection over SSL. This setting will overide passed in values.h<}r(h@]hA]h?]h>]hB]uh7j{h1]rhk)r}r(h6XGIs the connection over SSL. This setting will overide passed in values.rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]rhYXGIs the connection over SSL. This setting will overide passed in values.rr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7j_h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6Xhttps_validate_certificatesrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXhttps_validate_certificatesrr}r(h6jh7jubah:jubj)r}r(h6X2Validate HTTPS certificates. This is on by defaultrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]rhYX2Validate HTTPS certificates. This is on by defaultrr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7j_h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6Xca_certificates_filerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXca_certificates_filerr}r(h6jh7jubah:jubj)r}r(h6XLocation of CA certificates or the keyword "system". Using the system keyword lets boto get out of the way and makes the SSL certificate validation the responsibility the underlying SSL implementation provided by the system.h<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6XLocation of CA certificates or the keyword "system". Using the system keyword lets boto get out of the way and makes the SSL certificate validation the responsibility the underlying SSL implementation provided by the system.rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]rhYXLocation of CA certificates or the keyword "system". Using the system keyword lets boto get out of the way and makes the SSL certificate validation the responsibility the underlying SSL implementation provided by the system.rr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7j_h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6Xhttp_socket_timeoutrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXhttp_socket_timeoutrr}r(h6jh7jubah:jubj)r}r(h6XITimeout used to overwrite the system default socket timeout for httplib .h<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6XITimeout used to overwrite the system default socket timeout for httplib .rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]rhYXITimeout used to overwrite the system default socket timeout for httplib .rr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7j_h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6X"send_crlf_after_proxy_auth_headersrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYX"send_crlf_after_proxy_auth_headersrr}r(h6jh7jubah:jubj)r}r(h6XChange line ending behaviour with proxies. For more details see this `discussion `_h<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6XChange line ending behaviour with proxies. For more details see this `discussion `_h7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]r(hYXEChange line ending behaviour with proxies. For more details see this rr}r(h6XEChange line ending behaviour with proxies. For more details see this h7jubjY)r}r(h6XX`discussion `_h<}r(Unameh j]XHhttps://groups.google.com/forum/?fromgroups=#!topic/boto-dev/teenFvOq2Ccrh>]h?]h@]hA]hB]uh7jh1]rhYX discussionrr}r(h6Uh7jubah:jcubh3)r}r(h6XK jfKh7jh:h;h<}r(Urefurijh>]rh%ah?]h@]hA]hB]rh auh1]ubeubah:jubeubj)r}r(h6Uh7j_h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6Xendpoints_pathrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXendpoints_pathrr }r (h6jh7jubah:jubj)r }r (h6XAllows customizing the regions/endpoints available in Boto. Provide an absolute path to a custom JSON file, which gets merged into the defaults. (This can also be specified with the ``BOTO_ENDPOINTS`` environment variable instead.) h<}r (h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6XAllows customizing the regions/endpoints available in Boto. Provide an absolute path to a custom JSON file, which gets merged into the defaults. (This can also be specified with the ``BOTO_ENDPOINTS`` environment variable instead.)h7j h8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]r(hYXAllows customizing the regions/endpoints available in Boto. Provide an absolute path to a custom JSON file, which gets merged into the defaults. (This can also be specified with the rr}r(h6XAllows customizing the regions/endpoints available in Boto. Provide an absolute path to a custom JSON file, which gets merged into the defaults. (This can also be specified with the h7jubht)r}r(h6X``BOTO_ENDPOINTS``h<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXBOTO_ENDPOINTSrr}r(h6Uh7jubah:h|ubhYX environment variable instead.)rr}r(h6X environment variable instead.)h7jubeubah:jubeubeubhk)r }r!(h6X These settings will default to::r"h7jh8h9h:hnh<}r#(h@]hA]h?]h>]hB]uhDKhEhh1]r$hYXThese settings will default to:r%r&}r'(h6XThese settings will default to:h7j ubaubjI)r(}r)(h6X[Boto] connection_stale_duration = 180 is_secure = True https_validate_certificates = True ca_certificates_file = cacerts.txt http_socket_timeout = 60 send_crlf_after_proxy_auth_headers = False endpoints_path = /path/to/my/boto/endpoints.jsonh7jh8h9h:jLh<}r*(jNjOh>]h?]h@]hA]hB]uhDKhEhh1]r+hYX[Boto] connection_stale_duration = 180 is_secure = True https_validate_certificates = True ca_certificates_file = cacerts.txt http_socket_timeout = 60 send_crlf_after_proxy_auth_headers = False endpoints_path = /path/to/my/boto/endpoints.jsonr,r-}r.(h6Uh7j(ubaubhk)r/}r0(h6XYou can control the timeouts and number of retries used when retrieving information from the Metadata Service (this is used for retrieving credentials for IAM roles on EC2 instances):r1h7jh8h9h:hnh<}r2(h@]hA]h?]h>]hB]uhDKhEhh1]r3hYXYou can control the timeouts and number of retries used when retrieving information from the Metadata Service (this is used for retrieving credentials for IAM roles on EC2 instances):r4r5}r6(h6j1h7j/ubaubj)r7}r8(h6Uh7jh8h9h:jh<}r9(h@]hA]h?]h>]hB]uhDKhEhh1]r:(j)r;}r<(h6Uh7j7h8h9h:jh<}r=(h@]hA]h?]h>]hB]uhDKhEhh1]r>(j)r?}r@(h6Xmetadata_service_timeoutrAh<}rB(h@]hA]h?]h>]hB]uh7j;h1]rChYXmetadata_service_timeoutrDrE}rF(h6jAh7j?ubah:jubj)rG}rH(h6XNNumber of seconds until requests to the metadata service will timeout (float).h<}rI(h@]hA]h?]h>]hB]uh7j;h1]rJhk)rK}rL(h6XNNumber of seconds until requests to the metadata service will timeout (float).rMh7jGh8h9h:hnh<}rN(h@]hA]h?]h>]hB]uhDKh1]rOhYXNNumber of seconds until requests to the metadata service will timeout (float).rPrQ}rR(h6jMh7jKubaubah:jubeubj)rS}rT(h6Uh7j7h8h9h:jh<}rU(h@]hA]h?]h>]hB]uhDKhEhh1]rV(j)rW}rX(h6Xmetadata_service_num_attemptsrYh<}rZ(h@]hA]h?]h>]hB]uh7jSh1]r[hYXmetadata_service_num_attemptsr\r]}r^(h6jYh7jWubah:jubj)r_}r`(h6XeNumber of times to attempt to retrieve information from the metadata service before giving up (int). h<}ra(h@]hA]h?]h>]hB]uh7jSh1]rbhk)rc}rd(h6XdNumber of times to attempt to retrieve information from the metadata service before giving up (int).reh7j_h8h9h:hnh<}rf(h@]hA]h?]h>]hB]uhDKh1]rghYXdNumber of times to attempt to retrieve information from the metadata service before giving up (int).rhri}rj(h6jeh7jcubaubah:jubeubeubhk)rk}rl(h6X These settings will default to::rmh7jh8h9h:hnh<}rn(h@]hA]h?]h>]hB]uhDKhEhh1]rohYXThese settings will default to:rprq}rr(h6XThese settings will default to:h7jkubaubjI)rs}rt(h6XG[Boto] metadata_service_timeout = 1.0 metadata_service_num_attempts = 1h7jh8h9h:jLh<}ru(jNjOh>]h?]h@]hA]hB]uhDKhEhh1]rvhYXG[Boto] metadata_service_timeout = 1.0 metadata_service_num_attempts = 1rwrx}ry(h6Uh7jsubaubhk)rz}r{(h6XfThis section is also used for specifying endpoints for non-AWS services such as Eucalyptus and Walrus.r|h7jh8h9h:hnh<}r}(h@]hA]h?]h>]hB]uhDKhEhh1]r~hYXfThis section is also used for specifying endpoints for non-AWS services such as Eucalyptus and Walrus.rr}r(h6j|h7jzubaubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6Xeucalyptus_hostrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXeucalyptus_hostrr}r(h6jh7jubah:jubj)r}r(h6X-Select a default endpoint host for eucalyptusrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]rhYX-Select a default endpoint host for eucalyptusrr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6X walrus_hostrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYX walrus_hostrr}r(h6jh7jubah:jubj)r}r(h6X!Select a default host for Walrus h<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6X Select a default host for Walrusrh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKh1]rhYX Select a default host for Walrusrr}r(h6jh7jubaubah:jubeubeubhk)r}r(h6X For example::rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]rhYX For example:rr}r(h6X For example:h7jubaubjI)r}r(h6XP[Boto] eucalyptus_host = somehost.example.com walrus_host = somehost.example.comh7jh8h9h:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDKhEhh1]rhYXP[Boto] eucalyptus_host = somehost.example.com walrus_host = somehost.example.comrr}r(h6Uh7jubaubhk)r}r(h6XPFinally, the Boto section is used to set defaults versions for many AWS servicesrh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]rhYXPFinally, the Boto section is used to set defaults versions for many AWS servicesrr}r(h6jh7jubaubhk)r}r(h6XAutoScale settings:rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]rhYXAutoScale settings:rr}r(h6jh7jubaubhk)r}r(h6Xoptions: :autoscale_version: Set the API version :autoscale_endpoint: Endpoint to use :autoscale_region_name: Default region to userh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]rhYXoptions: :autoscale_version: Set the API version :autoscale_endpoint: Endpoint to use :autoscale_region_name: Default region to userr}r(h6jh7jubaubhk)r}r(h6X For example::rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]rhYX For example:rr}r(h6X For example:h7jubaubjI)r}r(h6X[Boto] autoscale_version = 2011-01-01 autoscale_endpoint = autoscaling.us-west-2.amazonaws.com autoscale_region_name = us-west-2h7jh8h9h:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDKhEhh1]rhYX[Boto] autoscale_version = 2011-01-01 autoscale_endpoint = autoscaling.us-west-2.amazonaws.com autoscale_region_name = us-west-2rr}r(h6Uh7jubaubhk)r}r(h6X,Cloudformation settings can also be defined:rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]rhYX,Cloudformation settings can also be defined:rr}r(h6jh7jubaubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6X cfn_versionrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYX cfn_versionrr}r(h6jh7jubah:jubj)r}r(h6XCloud formation API versionrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r }r (h6jh7jh8h9h:hnh<}r (h@]hA]h?]h>]hB]uhDKh1]r hYXCloud formation API versionr r}r(h6jh7j ubaubah:jubeubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDKhEhh1]r(j)r}r(h6Xcfn_region_namerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXcfn_region_namerr}r(h6jh7jubah:jubj)r}r(h6XDefault region namerh<}r(h@]hA]h?]h>]hB]uh7jh1]r hk)r!}r"(h6jh7jh8h9h:hnh<}r#(h@]hA]h?]h>]hB]uhDKh1]r$hYXDefault region namer%r&}r'(h6jh7j!ubaubah:jubeubj)r(}r)(h6Uh7jh8h9h:jh<}r*(h@]hA]h?]h>]hB]uhDKhEhh1]r+(j)r,}r-(h6Xcfn_region_endpointr.h<}r/(h@]hA]h?]h>]hB]uh7j(h1]r0hYXcfn_region_endpointr1r2}r3(h6j.h7j,ubah:jubj)r4}r5(h6XDefault endpoint h<}r6(h@]hA]h?]h>]hB]uh7j(h1]r7hk)r8}r9(h6XDefault endpointr:h7j4h8h9h:hnh<}r;(h@]hA]h?]h>]hB]uhDKh1]r<hYXDefault endpointr=r>}r?(h6j:h7j8ubaubah:jubeubeubhk)r@}rA(h6X For example::rBh7jh8h9h:hnh<}rC(h@]hA]h?]h>]hB]uhDKhEhh1]rDhYX For example:rErF}rG(h6X For example:h7j@ubaubjI)rH}rI(h6Xx[Boto] cfn_version = 2010-05-15 cfn_region_name = us-west-2 cfn_region_endpoint = cloudformation.us-west-2.amazonaws.comh7jh8h9h:jLh<}rJ(jNjOh>]h?]h@]hA]hB]uhDKhEhh1]rKhYXx[Boto] cfn_version = 2010-05-15 cfn_region_name = us-west-2 cfn_region_endpoint = cloudformation.us-west-2.amazonaws.comrLrM}rN(h6Uh7jHubaubhk)rO}rP(h6XCloudsearch settings:rQh7jh8h9h:hnh<}rR(h@]hA]h?]h>]hB]uhDMhEhh1]rShYXCloudsearch settings:rTrU}rV(h6jQh7jOubaubj)rW}rX(h6Uh7jh8h9h:jh<}rY(h@]hA]h?]h>]hB]uhDMhEhh1]rZ(j)r[}r\(h6Uh7jWh8h9h:jh<}r](h@]hA]h?]h>]hB]uhDMhEhh1]r^(j)r_}r`(h6Xcs_region_namerah<}rb(h@]hA]h?]h>]hB]uh7j[h1]rchYXcs_region_namerdre}rf(h6jah7j_ubah:jubj)rg}rh(h6XDefault cloudsearch regionrih<}rj(h@]hA]h?]h>]hB]uh7j[h1]rkhk)rl}rm(h6jih7jgh8h9h:hnh<}rn(h@]hA]h?]h>]hB]uhDMh1]rohYXDefault cloudsearch regionrprq}rr(h6jih7jlubaubah:jubeubj)rs}rt(h6Uh7jWh8h9h:jh<}ru(h@]hA]h?]h>]hB]uhDMhEhh1]rv(j)rw}rx(h6Xcs_region_endpointryh<}rz(h@]hA]h?]h>]hB]uh7jsh1]r{hYXcs_region_endpointr|r}}r~(h6jyh7jwubah:jubj)r}r(h6XDefault cloudsearch endpoint h<}r(h@]hA]h?]h>]hB]uh7jsh1]rhk)r}r(h6XDefault cloudsearch endpointrh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMh1]rhYXDefault cloudsearch endpointrr}r(h6jh7jubaubah:jubeubeubhk)r}r(h6X For example::rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]rhYX For example:rr}r(h6X For example:h7jubaubjI)r}r(h6XZ[Boto] cs_region_name = us-west-2 cs_region_endpoint = cloudsearch.us-west-2.amazonaws.comh7jh8h9h:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDMhEhh1]rhYXZ[Boto] cs_region_name = us-west-2 cs_region_endpoint = cloudsearch.us-west-2.amazonaws.comrr}r(h6Uh7jubaubhk)r}r(h6XCloudwatch settings:rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM hEhh1]rhYXCloudwatch settings:rr}r(h6jh7jubaubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDM hEhh1]r(j)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDM hEhh1]r(j)r}r(h6Xcloudwatch_versionrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXcloudwatch_versionrr}r(h6jh7jubah:jubj)r}r(h6XCloudwatch API versionrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM h1]rhYXCloudwatch API versionrr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]r(j)r}r(h6Xcloudwatch_region_namerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXcloudwatch_region_namerr}r(h6jh7jubah:jubj)r}r(h6XDefault region namerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMh1]rhYXDefault region namerr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]r(j)r}r(h6Xcloudwatch_region_endpointrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXcloudwatch_region_endpointrr}r(h6jh7jubah:jubj)r}r(h6XDefault endpoint h<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6XDefault endpointrh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMh1]rhYXDefault endpointrr}r(h6jh7jubaubah:jubeubeubhk)r}r(h6X For example::rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]rhYX For example:rr}r(h6X For example:h7jubaubjI)r}r(h6X[Boto] cloudwatch_version = 2010-08-01 cloudwatch_region_name = us-west-2 cloudwatch_region_endpoint = monitoring.us-west-2.amazonaws.comh7jh8h9h:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDMhEhh1]rhYX[Boto] cloudwatch_version = 2010-08-01 cloudwatch_region_name = us-west-2 cloudwatch_region_endpoint = monitoring.us-west-2.amazonaws.comrr}r(h6Uh7jubaubhk)r}r(h6X EC2 settings:rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]rhYX EC2 settings:rr}r(h6jh7jubaubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]r(j)r }r (h6Uh7jh8h9h:jh<}r (h@]hA]h?]h>]hB]uhDMhEhh1]r (j)r }r(h6X ec2_versionrh<}r(h@]hA]h?]h>]hB]uh7j h1]rhYX ec2_versionrr}r(h6jh7j ubah:jubj)r}r(h6XEC2 API versionrh<}r(h@]hA]h?]h>]hB]uh7j h1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMh1]rhYXEC2 API versionrr}r (h6jh7jubaubah:jubeubj)r!}r"(h6Uh7jh8h9h:jh<}r#(h@]hA]h?]h>]hB]uhDMhEhh1]r$(j)r%}r&(h6Xec2_region_namer'h<}r((h@]hA]h?]h>]hB]uh7j!h1]r)hYXec2_region_namer*r+}r,(h6j'h7j%ubah:jubj)r-}r.(h6XDefault region namer/h<}r0(h@]hA]h?]h>]hB]uh7j!h1]r1hk)r2}r3(h6j/h7j-h8h9h:hnh<}r4(h@]hA]h?]h>]hB]uhDMh1]r5hYXDefault region namer6r7}r8(h6j/h7j2ubaubah:jubeubj)r9}r:(h6Uh7jh8h9h:jh<}r;(h@]hA]h?]h>]hB]uhDMhEhh1]r<(j)r=}r>(h6Xec2_region_endpointr?h<}r@(h@]hA]h?]h>]hB]uh7j9h1]rAhYXec2_region_endpointrBrC}rD(h6j?h7j=ubah:jubj)rE}rF(h6XDefault endpoint h<}rG(h@]hA]h?]h>]hB]uh7j9h1]rHhk)rI}rJ(h6XDefault endpointrKh7jEh8h9h:hnh<}rL(h@]hA]h?]h>]hB]uhDMh1]rMhYXDefault endpointrNrO}rP(h6jKh7jIubaubah:jubeubeubhk)rQ}rR(h6X For example::rSh7jh8h9h:hnh<}rT(h@]hA]h?]h>]hB]uhDMhEhh1]rUhYX For example:rVrW}rX(h6X For example:h7jQubaubjI)rY}rZ(h6Xm[Boto] ec2_version = 2012-12-01 ec2_region_name = us-west-2 ec2_region_endpoint = ec2.us-west-2.amazonaws.comh7jh8h9h:jLh<}r[(jNjOh>]h?]h@]hA]hB]uhDM hEhh1]r\hYXm[Boto] ec2_version = 2012-12-01 ec2_region_name = us-west-2 ec2_region_endpoint = ec2.us-west-2.amazonaws.comr]r^}r_(h6Uh7jYubaubhk)r`}ra(h6X ELB settings:rbh7jh8h9h:hnh<}rc(h@]hA]h?]h>]hB]uhDM%hEhh1]rdhYX ELB settings:rerf}rg(h6jbh7j`ubaubj)rh}ri(h6Uh7jh8h9h:jh<}rj(h@]hA]h?]h>]hB]uhDM'hEhh1]rk(j)rl}rm(h6Uh7jhh8h9h:jh<}rn(h@]hA]h?]h>]hB]uhDM'hEhh1]ro(j)rp}rq(h6X elb_versionrrh<}rs(h@]hA]h?]h>]hB]uh7jlh1]rthYX elb_versionrurv}rw(h6jrh7jpubah:jubj)rx}ry(h6XELB API versionrzh<}r{(h@]hA]h?]h>]hB]uh7jlh1]r|hk)r}}r~(h6jzh7jxh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM'h1]rhYXELB API versionrr}r(h6jzh7j}ubaubah:jubeubj)r}r(h6Uh7jhh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDM(hEhh1]r(j)r}r(h6Xelb_region_namerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXelb_region_namerr}r(h6jh7jubah:jubj)r}r(h6XDefault region namerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM(h1]rhYXDefault region namerr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7jhh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDM)hEhh1]r(j)r}r(h6Xelb_region_endpointrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXelb_region_endpointrr}r(h6jh7jubah:jubj)r}r(h6XDefault endpoint h<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6XDefault endpointrh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM)h1]rhYXDefault endpointrr}r(h6jh7jubaubah:jubeubeubhk)r}r(h6X For example::rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM+hEhh1]rhYX For example:rr}r(h6X For example:h7jubaubjI)r}r(h6X~[Boto] elb_version = 2012-06-01 elb_region_name = us-west-2 elb_region_endpoint = elasticloadbalancing.us-west-2.amazonaws.comh7jh8h9h:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDM-hEhh1]rhYX~[Boto] elb_version = 2012-06-01 elb_region_name = us-west-2 elb_region_endpoint = elasticloadbalancing.us-west-2.amazonaws.comrr}r(h6Uh7jubaubhk)r}r(h6X EMR settings:rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM2hEhh1]rhYX EMR settings:rr}r(h6jh7jubaubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDM4hEhh1]r(j)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDM4hEhh1]r(j)r}r(h6X emr_versionrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYX emr_versionrr}r(h6jh7jubah:jubj)r}r(h6XEMR API versionrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM4h1]rhYXEMR API versionrr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDM5hEhh1]r(j)r}r(h6Xemr_region_namerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXemr_region_namerr}r(h6jh7jubah:jubj)r}r(h6XDefault region namerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM5h1]rhYXDefault region namerr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDM6hEhh1]r(j)r}r(h6Xemr_region_endpointrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXemr_region_endpointrr }r (h6jh7jubah:jubj)r }r (h6XDefault endpoint h<}r (h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6XDefault endpointrh7j h8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM6h1]rhYXDefault endpointrr}r(h6jh7jubaubah:jubeubeubhk)r}r(h6X For example::rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM8hEhh1]rhYX For example:rr}r(h6X For example:h7jubaubjI)r}r (h6Xz[Boto] emr_version = 2009-03-31 emr_region_name = us-west-2 emr_region_endpoint = elasticmapreduce.us-west-2.amazonaws.comh7jh8h9h:jLh<}r!(jNjOh>]h?]h@]hA]hB]uhDM:hEhh1]r"hYXz[Boto] emr_version = 2009-03-31 emr_region_name = us-west-2 emr_region_endpoint = elasticmapreduce.us-west-2.amazonaws.comr#r$}r%(h6Uh7jubaubeubeubhF)r&}r'(h6Uh7hGh8h9h:hKh<}r((h@]hA]h?]h>]r)h!ahB]r*hauhDMAhEhh1]r+(hR)r,}r-(h6X Precedencer.h7j&h8h9h:hVh<}r/(h@]hA]h?]h>]hB]uhDMAhEhh1]r0hYX Precedencer1r2}r3(h6j.h7j,ubaubhk)r4}r5(h6XEven if you have your boto config setup, you can also have credentials and options stored in environmental variables or you can explicitly pass them to method calls i.e.::h7j&h8h9h:hnh<}r6(h@]hA]h?]h>]hB]uhDMChEhh1]r7hYXEven if you have your boto config setup, you can also have credentials and options stored in environmental variables or you can explicitly pass them to method calls i.e.:r8r9}r:(h6XEven if you have your boto config setup, you can also have credentials and options stored in environmental variables or you can explicitly pass them to method calls i.e.:h7j4ubaubjI)r;}r<(h6Xz>>> boto.ec2.connect_to_region( ... 'us-west-2', ... aws_access_key_id='foo', ... aws_secret_access_key='bar')h7j&h8h9h:jLh<}r=(jNjOh>]h?]h@]hA]hB]uhDMGhEhh1]r>hYXz>>> boto.ec2.connect_to_region( ... 'us-west-2', ... aws_access_key_id='foo', ... aws_secret_access_key='bar')r?r@}rA(h6Uh7j;ubaubhk)rB}rC(h6XIn these cases where these options can be found in more than one place boto will first use the explicitly supplied arguments, if none found it will then look for them amidst environment variables and if that fails it will use the ones in boto config.rDh7j&h8h9h:hnh<}rE(h@]hA]h?]h>]hB]uhDMLhEhh1]rFhYXIn these cases where these options can be found in more than one place boto will first use the explicitly supplied arguments, if none found it will then look for them amidst environment variables and if that fails it will use the ones in boto config.rGrH}rI(h6jDh7jBubaubhF)rJ}rK(h6Uh7j&h8h9h:hKh<}rL(h@]hA]h?]h>]rMh,ahB]rNhauhDMRhEhh1]rO(hR)rP}rQ(h6X NotificationrRh7jJh8h9h:hVh<}rS(h@]hA]h?]h>]hB]uhDMRhEhh1]rThYX NotificationrUrV}rW(h6jRh7jPubaubhk)rX}rY(h6XqIf you are using notifications for boto.pyami, you can specify the email details through the following variables.rZh7jJh8h9h:hnh<}r[(h@]hA]h?]h>]hB]uhDMThEhh1]r\hYXqIf you are using notifications for boto.pyami, you can specify the email details through the following variables.r]r^}r_(h6jZh7jXubaubj)r`}ra(h6Uh7jJh8h9h:jh<}rb(h@]hA]h?]h>]hB]uhDMWhEhh1]rc(j)rd}re(h6Uh7j`h8h9h:jh<}rf(h@]hA]h?]h>]hB]uhDMWhEhh1]rg(j)rh}ri(h6X smtp_fromrjh<}rk(h@]hA]h?]h>]hB]uh7jdh1]rlhYX smtp_fromrmrn}ro(h6jjh7jhubah:jubj)rp}rq(h6X*Used as the sender in notification emails.rrh<}rs(h@]hA]h?]h>]hB]uh7jdh1]rthk)ru}rv(h6jrh7jph8h9h:hnh<}rw(h@]hA]h?]h>]hB]uhDMWh1]rxhYX*Used as the sender in notification emails.ryrz}r{(h6jrh7juubaubah:jubeubj)r|}r}(h6Uh7j`h8h9h:jh<}r~(h@]hA]h?]h>]hB]uhDMXhEhh1]r(j)r}r(h6Xsmtp_torh<}r(h@]hA]h?]h>]hB]uh7j|h1]rhYXsmtp_torr}r(h6jh7jubah:jubj)r}r(h6X*Destination to which emails should be sentrh<}r(h@]hA]h?]h>]hB]uh7j|h1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMXh1]rhYX*Destination to which emails should be sentrr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7j`h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMYhEhh1]r(j)r}r(h6X smtp_hostrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYX smtp_hostrr}r(h6jh7jubah:jubj)r}r(h6X4Host to connect to when sending notification emails.rh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMYh1]rhYX4Host to connect to when sending notification emails.rr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7j`h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMZhEhh1]r(j)r}r(h6X smtp_portrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYX smtp_portrr}r(h6jh7jubah:jubj)r}r(h6X6Port to connect to when connecting to the :smtp_host: h<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6X5Port to connect to when connecting to the :smtp_host:rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMZh1]rhYX5Port to connect to when connecting to the :smtp_host:rr}r(h6jh7jubaubah:jubeubeubhk)r}r(h6XDefault values are::rh7jJh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDM\hEhh1]rhYXDefault values are:rr}r(h6XDefault values are:h7jubaubjI)r}r(h6X[notification] smtp_from = boto smtp_to = None smtp_host = localhost smtp_port = 25 smtp_tls = True smtp_user = john smtp_pass = hunter2h7jJh8h9h:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDM^hEhh1]rhYX[notification] smtp_from = boto smtp_to = None smtp_host = localhost smtp_port = 25 smtp_tls = True smtp_user = john smtp_pass = hunter2rr}r(h6Uh7jubaubeubhF)r}r(h6Uh7j&h8h9h:hKh<}r(h@]hA]h?]h>]rh'ahB]rh auhDMhhEhh1]r(hR)r}r(h6XSWFrh7jh8h9h:hVh<}r(h@]hA]h?]h>]hB]uhDMhhEhh1]rhYXSWFrr}r(h6jh7jubaubhk)r}r(h6XmThe SWF section allows you to configure the default region to be used for the Amazon Simple Workflow service.rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMjhEhh1]rhYXmThe SWF section allows you to configure the default region to be used for the Amazon Simple Workflow service.rr}r(h6jh7jubaubj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMmhEhh1]rj)r}r(h6Uh7jh8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMmhEhh1]r(j)r}r(h6Xregionrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXregionrr}r(h6jh7jubah:jubj)r}r(h6XSet the default region h<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6XSet the default regionrh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMmh1]rhYXSet the default regionrr}r(h6jh7jubaubah:jubeubaubhk)r}r(h6X Example::rh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMohEhh1]r hYXExample:r r }r (h6XExample:h7jubaubjI)r }r(h6X[SWF] region = us-west-2h7jh8h9h:jLh<}r(jNjOh>]h?]h@]hA]hB]uhDMqhEhh1]rhYX[SWF] region = us-west-2rr}r(h6Uh7j ubaubeubhF)r}r(h6Uh7j&h8h9h:hKh<}r(h@]hA]h?]h>]rh.ahB]rhauhDMuhEhh1]r(hR)r}r(h6XPyamirh7jh8h9h:hVh<}r(h@]hA]h?]h>]hB]uhDMuhEhh1]rhYXPyamirr }r!(h6jh7jubaubhk)r"}r#(h6XGThe Pyami section is used to configure the working directory for PyAMI.r$h7jh8h9h:hnh<}r%(h@]hA]h?]h>]hB]uhDMwhEhh1]r&hYXGThe Pyami section is used to configure the working directory for PyAMI.r'r(}r)(h6j$h7j"ubaubj)r*}r+(h6Uh7jh8h9h:jh<}r,(h@]hA]h?]h>]hB]uhDMyhEhh1]r-j)r.}r/(h6Uh7j*h8h9h:jh<}r0(h@]hA]h?]h>]hB]uhDMyhEhh1]r1(j)r2}r3(h6X working_dirr4h<}r5(h@]hA]h?]h>]hB]uh7j.h1]r6hYX working_dirr7r8}r9(h6j4h7j2ubah:jubj)r:}r;(h6X Working directory used by PyAMI h<}r<(h@]hA]h?]h>]hB]uh7j.h1]r=hk)r>}r?(h6XWorking directory used by PyAMIr@h7j:h8h9h:hnh<}rA(h@]hA]h?]h>]hB]uhDMyh1]rBhYXWorking directory used by PyAMIrCrD}rE(h6j@h7j>ubaubah:jubeubaubhk)rF}rG(h6X Example::rHh7jh8h9h:hnh<}rI(h@]hA]h?]h>]hB]uhDM{hEhh1]rJhYXExample:rKrL}rM(h6XExample:h7jFubaubjI)rN}rO(h6X [Pyami] working_dir = /home/foo/h7jh8h9h:jLh<}rP(jNjOh>]h?]h@]hA]hB]uhDM}hEhh1]rQhYX [Pyami] working_dir = /home/foo/rRrS}rT(h6Uh7jNubaubeubhF)rU}rV(h6Uh7j&h8h9h:hKh<}rW(h@]hA]h?]h>]rXh(ahB]rYhauhDMhEhh1]rZ(hR)r[}r\(h6XDBr]h7jUh8h9h:hVh<}r^(h@]hA]h?]h>]hB]uhDMhEhh1]r_hYXDBr`ra}rb(h6j]h7j[ubaubhk)rc}rd(h6XuThe DB section is used to configure access to databases through the :func:`boto.sdb.db.manager.get_manager` function.h7jUh8h9h:hnh<}re(h@]hA]h?]h>]hB]uhDMhEhh1]rf(hYXDThe DB section is used to configure access to databases through the rgrh}ri(h6XDThe DB section is used to configure access to databases through the h7jcubh)rj}rk(h6X':func:`boto.sdb.db.manager.get_manager`rlh7jch8h9h:hh<}rm(UreftypeXfunchhXboto.sdb.db.manager.get_managerU refdomainXpyrnh>]h?]U refexplicith@]hA]hB]hhhNhNuhDMh1]roht)rp}rq(h6jlh<}rr(h@]hA]rs(jjnXpy-funcrteh?]h>]hB]uh7jjh1]ruhYX!boto.sdb.db.manager.get_manager()rvrw}rx(h6Uh7jpubah:h|ubaubhYX function.ryrz}r{(h6X function.h7jcubeubj)r|}r}(h6Uh7jUh8h9h:jh<}r~(h@]hA]h?]h>]hB]uhDMhEhh1]r(j)r}r(h6Uh7j|h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]r(j)r}r(h6Xdb_typerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXdb_typerr}r(h6jh7jubah:jubj)r}r(h6XFType of the database. Current allowed values are `SimpleDB` and `XML`.h<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6XFType of the database. Current allowed values are `SimpleDB` and `XML`.h7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMh1]r(hYX1Type of the database. Current allowed values are rr}r(h6X1Type of the database. Current allowed values are h7jubcdocutils.nodes title_reference r)r}r(h6X `SimpleDB`h<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXSimpleDBrr}r(h6Uh7jubah:Utitle_referencerubhYX and rr}r(h6X and h7jubj)r}r(h6X`XML`h<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXXMLrr}r(h6Uh7jubah:jubhYX.r}r(h6X.h7jubeubah:jubeubj)r}r(h6Uh7j|h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]r(j)r}r(h6Xdb_userrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXdb_userrr}r(h6jh7jubah:jubj)r}r(h6XAWS access key id.rh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMh1]rhYXAWS access key id.rr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7j|h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]r(j)r}r(h6X db_passwdrh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYX db_passwdrr}r(h6jh7jubah:jubj)r}r(h6XAWS secret access key.rh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMh1]rhYXAWS secret access key.rr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7j|h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]r(j)r}r(h6Xdb_namerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXdb_namerr}r(h6jh7jubah:jubj)r}r(h6X#Database that will be connected to.rh<}r(h@]hA]h?]h>]hB]uh7jh1]rhk)r}r(h6jh7jh8h9h:hnh<}r(h@]hA]h?]h>]hB]uhDMh1]rhYX#Database that will be connected to.rr}r(h6jh7jubaubah:jubeubj)r}r(h6Uh7j|h8h9h:jh<}r(h@]hA]h?]h>]hB]uhDMhEhh1]r(j)r}r(h6Xdb_tablerh<}r(h@]hA]h?]h>]hB]uh7jh1]rhYXdb_tablerr}r(h6jh7jubah:jubj)r }r (h6X1Table name :note: This doesn't appear to be used.r h<}r (h@]hA]h?]h>]hB]uh7jh1]r hk)r }r (h6j h7j h8h9h:hnh<}r (h@]hA]h?]h>]hB]uhDMh1]r hYX1Table name :note: This doesn't appear to be used.r r }r (h6j h7j ubaubah:jubeubj)r }r (h6Uh7j|h8h9h:jh<}r (h@]hA]h?]h>]hB]uhDMhEhh1]r (j)r }r (h6Xdb_hostr h<}r (h@]hA]h?]h>]hB]uh7j h1]r hYXdb_hostr r }r (h6j h7j ubah:jubj)r }r (h6XHost to connect tor h<}r (h@]hA]h?]h>]hB]uh7j h1]r hk)r }r (h6j h7j h8h9h:hnh<}r (h@]hA]h?]h>]hB]uhDMh1]r hYXHost to connect tor! r" }r# (h6j h7j ubaubah:jubeubj)r$ }r% (h6Uh7j|h8h9h:jh<}r& (h@]hA]h?]h>]hB]uhDMhEhh1]r' (j)r( }r) (h6Xdb_portr* h<}r+ (h@]hA]h?]h>]hB]uh7j$ h1]r, hYXdb_portr- r. }r/ (h6j* h7j( ubah:jubj)r0 }r1 (h6XPort to connect tor2 h<}r3 (h@]hA]h?]h>]hB]uh7j$ h1]r4 hk)r5 }r6 (h6j2 h7j0 h8h9h:hnh<}r7 (h@]hA]h?]h>]hB]uhDMh1]r8 hYXPort to connect tor9 r: }r; (h6j2 h7j5 ubaubah:jubeubj)r< }r= (h6Uh7j|h8h9h:jh<}r> (h@]hA]h?]h>]hB]uhDMhEhh1]r? (j)r@ }rA (h6X enable_sslrB h<}rC (h@]hA]h?]h>]hB]uh7j< h1]rD hYX enable_sslrE rF }rG (h6jB h7j@ ubah:jubj)rH }rI (h6XUse SSL h<}rJ (h@]hA]h?]h>]hB]uh7j< h1]rK hk)rL }rM (h6XUse SSLrN h7jH h8h9h:hnh<}rO (h@]hA]h?]h>]hB]uhDMh1]rP hYXUse SSLrQ rR }rS (h6jN h7jL ubaubah:jubeubeubhk)rT }rU (h6XMore examples::rV h7jUh8h9h:hnh<}rW (h@]hA]h?]h>]hB]uhDMhEhh1]rX hYXMore examples:rY rZ }r[ (h6XMore examples:h7jT ubaubjI)r\ }r] (h6XT[DB] db_type = SimpleDB db_user = db_passwd = db_name = my_domain db_table = table db_host = sdb.amazonaws.com enable_ssl = True debug = True [DB_TestBasic] db_type = SimpleDB db_user = db_passwd = db_name = basic_domain db_port = 1111h7jUh8h9h:jLh<}r^ (jNjOh>]h?]h@]hA]hB]uhDMhEhh1]r_ hYXT[DB] db_type = SimpleDB db_user = db_passwd = db_name = my_domain db_table = table db_host = sdb.amazonaws.com enable_ssl = True debug = True [DB_TestBasic] db_type = SimpleDB db_user = db_passwd = db_name = basic_domain db_port = 1111r` ra }rb (h6Uh7j\ ubaubeubhF)rc }rd (h6Uh7j&h8h9h:hKh<}re (h@]hA]h?]h>]rf h+ahB]rg hauhDMhEhh1]rh (hR)ri }rj (h6XSDBrk h7jc h8h9h:hVh<}rl (h@]hA]h?]h>]hB]uhDMhEhh1]rm hYXSDBrn ro }rp (h6jk h7ji ubaubhk)rq }rr (h6X*This section is used to configure SimpleDBrs h7jc h8h9h:hnh<}rt (h@]hA]h?]h>]hB]uhDMhEhh1]ru hYX*This section is used to configure SimpleDBrv rw }rx (h6js h7jq ubaubj)ry }rz (h6Uh7jc h8h9h:jh<}r{ (h@]hA]h?]h>]hB]uhDMhEhh1]r| j)r} }r~ (h6Uh7jy h8h9h:jh<}r (h@]hA]h?]h>]hB]uhDMhEhh1]r (j)r }r (h6Xregionr h<}r (h@]hA]h?]h>]hB]uh7j} h1]r hYXregionr r }r (h6j h7j ubah:jubj)r }r (h6X+Set the region to which SDB should connect h<}r (h@]hA]h?]h>]hB]uh7j} h1]r hk)r }r (h6X*Set the region to which SDB should connectr h7j h8h9h:hnh<}r (h@]hA]h?]h>]hB]uhDMh1]r hYX*Set the region to which SDB should connectr r }r (h6j h7j ubaubah:jubeubaubhk)r }r (h6X Example::r h7jc h8h9h:hnh<}r (h@]hA]h?]h>]hB]uhDMhEhh1]r hYXExample:r r }r (h6XExample:h7j ubaubjI)r }r (h6X[SDB] region = us-west-2h7jc h8h9h:jLh<}r (jNjOh>]h?]h@]hA]hB]uhDMhEhh1]r hYX[SDB] region = us-west-2r r }r (h6Uh7j ubaubeubhF)r }r (h6Uh7j&h8h9h:hKh<}r (h@]hA]h?]h>]r h ahB]r hauhDMhEhh1]r (hR)r }r (h6XDynamoDBr h7j h8h9h:hVh<}r (h@]hA]h?]h>]hB]uhDMhEhh1]r hYXDynamoDBr r }r (h6j h7j ubaubhk)r }r (h6X*This section is used to configure DynamoDBr h7j h8h9h:hnh<}r (h@]hA]h?]h>]hB]uhDMhEhh1]r hYX*This section is used to configure DynamoDBr r }r (h6j h7j ubaubj)r }r (h6Uh7j h8h9h:jh<}r (h@]hA]h?]h>]hB]uhDMhEhh1]r (j)r }r (h6Uh7j h8h9h:jh<}r (h@]hA]h?]h>]hB]uhDMhEhh1]r (j)r }r (h6Xregionr h<}r (h@]hA]h?]h>]hB]uh7j h1]r hYXregionr r }r (h6j h7j ubah:jubj)r }r (h6XChoose the default regionr h<}r (h@]hA]h?]h>]hB]uh7j h1]r hk)r }r (h6j h7j h8h9h:hnh<}r (h@]hA]h?]h>]hB]uhDMh1]r hYXChoose the default regionr r }r (h6j h7j ubaubah:jubeubj)r }r (h6Uh7j h8h9h:jh<}r (h@]hA]h?]h>]hB]uhDMhEhh1]r (j)r }r (h6Xvalidate_checksumsr h<}r (h@]hA]h?]h>]hB]uh7j h1]r hYXvalidate_checksumsr r }r (h6j h7j ubah:jubj)r }r (h6X%Check checksums returned by DynamoDB h<}r (h@]hA]h?]h>]hB]uh7j h1]r hk)r }r (h6X$Check checksums returned by DynamoDBr h7j h8h9h:hnh<}r (h@]hA]h?]h>]hB]uhDMh1]r hYX$Check checksums returned by DynamoDBr r }r (h6j h7j ubaubah:jubeubeubhk)r }r (h6X Example::r h7j h8h9h:hnh<}r (h@]hA]h?]h>]hB]uhDMhEhh1]r hYXExample:r r }r (h6XExample:h7j ubaubjI)r }r (h6X7[DynamoDB] region = us-west-2 validate_checksums = Trueh7j h8h9h:jLh<}r (jNjOh>]h?]h@]hA]hB]uhDMhEhh1]r hYX7[DynamoDB] region = us-west-2 validate_checksums = Truer r }r (h6Uh7j ubaubeubeubeubeh6UU transformerr NU footnote_refsr }r Urefnamesr }r Usymbol_footnotesr ]r Uautofootnote_refsr ]r Usymbol_footnote_refsr ]r U citationsr ]r hEhU current_liner NUtransform_messagesr ]r cdocutils.nodes system_message r )r }r (h6Uh<}r (h@]UlevelKh>]h?]Usourceh9hA]hB]UlineKUtypeUINFOr uh1]r hk)r }r (h6Uh<}r (h@]hA]h?]h>]hB]uh7j h1]r hYX5Hyperlink target "ref-boto-config" is not referenced.r r }r (h6Uh7j ubah:hnubah:Usystem_messager ubaUreporterr NUid_startr KU autofootnotesr ]r U citation_refsr }r Uindirect_targetsr! ]r" Usettingsr# (cdocutils.frontend Values r$ or% }r& (Ufootnote_backlinksr' KUrecord_dependenciesr( NU rfc_base_urlr) Uhttp://tools.ietf.org/html/r* U tracebackr+ Upep_referencesr, NUstrip_commentsr- NU toc_backlinksr. Uentryr/ U language_coder0 Uenr1 U datestampr2 NU report_levelr3 KU _destinationr4 NU halt_levelr5 KU strip_classesr6 NhVNUerror_encoding_error_handlerr7 Ubackslashreplacer8 Udebugr9 NUembed_stylesheetr: Uoutput_encoding_error_handlerr; Ustrictr< U sectnum_xformr= KUdump_transformsr> NU docinfo_xformr? KUwarning_streamr@ NUpep_file_url_templaterA Upep-%04drB Uexit_status_levelrC KUconfigrD NUstrict_visitorrE NUcloak_email_addressesrF Utrim_footnote_reference_spacerG UenvrH NUdump_pseudo_xmlrI NUexpose_internalsrJ NUsectsubtitle_xformrK U source_linkrL NUrfc_referencesrM NUoutput_encodingrN Uutf-8rO U source_urlrP NUinput_encodingrQ U utf-8-sigrR U_disable_configrS NU id_prefixrT UU tab_widthrU KUerror_encodingrV UUTF-8rW U_sourcerX h9Ugettext_compactrY U generatorrZ NUdump_internalsr[ NU smart_quotesr\ U pep_base_urlr] Uhttp://www.python.org/dev/peps/r^ Usyntax_highlightr_ Ulongr` Uinput_encoding_error_handlerra j< Uauto_id_prefixrb Uidrc Udoctitle_xformrd Ustrip_elements_with_classesre NU _config_filesrf ]Ufile_insertion_enabledrg U raw_enabledrh KU dump_settingsri NubUsymbol_footnote_startrj KUidsrk }rl (h j h!j&h"jh#h]h,jJh0hGh$jdh)juh(jUh*hh+jc h-jjh'jh/jTh%jh&hGh.juUsubstitution_namesrm }rn h:hEh<}ro (h@]h>]h?]Usourceh9hA]hB]uU footnotesrp ]rq Urefidsrr }rs h&]rt h4asub.