Files
ServerSync/lib/jeepney/__pycache__/auth.cpython-314.pyc

61 lines
7.8 KiB
Plaintext
Raw Normal View History

2026-02-19 00:55:27 +02:00
+
<00>;<3B>i!<00><00><><00>^RIHt^RIHt^RIt^RIHtRRltRRltR t R
t
!R R ]4t !R R] 4t !RR] 4t!RR4t]tR#)<13>)<01>hexlify)<01>EnumN)<01>Optionalc<00>$<00>V^8<>dQhR\/#<00><02><00>return<72><01>bytes)<01>formats"<22>3/tmp/pip-target-ugtna5l2/lib/python/jeepney/auth.py<70> __annotate__rs<00><00>-<2D>-<2D>E<EFBFBD>-<2D>c<04><><00>\\\P!44P R44pRV,#)z<>Prepare an AUTH command line with the current effective user ID.
This is the preferred authentication method for typical D-Bus connections
over a Unix domain socket.
<EFBFBD>asciisAUTH EXTERNAL %b
)r<00>str<74>os<6F>geteuid<69>encode)<01>hex_uids r <00>make_auth_externalrs/<00><00> <16>c<EFBFBD>"<22>*<2A>*<2A>,<2C>'<27>.<2E>.<2E>w<EFBFBD>7<>8<>G<EFBFBD> "<22>W<EFBFBD> ,<2C>,rc<00>$<00>V^8<>dQhR\/#rr
)r s"r rrs<00><00>
,<2C>
,<2C>U<EFBFBD>
,rc<04>b<00>^RIHp\RV,PR44pRV,#)z<>Format an AUTH command line for the ANONYMOUS mechanism
Jeepney's higher-level wrappers don't currently use this mechanism,
but third-party code may choose to.
See <https://tools.ietf.org/html/rfc4505> for details.
)<01> __version__z
Jeepney %srsAUTH ANONYMOUS %s
)<04>rrr)r<00>traces r <00>make_auth_anonymousrs,<00><00><1E> <13>\<5C>K<EFBFBD>/<2F>7<>7<><07>@<40> A<>E<EFBFBD> #<23>e<EFBFBD> +<2B>+rsBEGIN
sNEGOTIATE_UNIX_FD
c<00>*<00>]tRt^t^t^t^t^t^tRt R#)<03> ClientState<74>N)
<EFBFBD>__name__<5F>
__module__<EFBFBD> __qualname__<5F>__firstlineno__<5F>WaitingForData<74> WaitingForOk<4F>WaitingForReject<63>WaitingForAgreeUnixFD<46>Success<73>__static_attributes__r rr rrs<00><00><16>N<EFBFBD><14>L<EFBFBD><18><14><1D><19><0F>Grrc<00>4a<00>]tRt^&toRtRRltRtRtVtR#)<07>AuthenticationErrorz%Raised when DBus authentication failsc<08><00>W nWnR#<00>N<><02>msg<73>data)<03>selfr1r0s&&&r <00>__init__<5F>AuthenticationError.__init__(s <00><00><16><08><18> rc<08>:<00>VP RVP: 2#)z . Bus sent: r/<00>r2s&r <00>__str__<5F>AuthenticationError.__str__,s<00><00><16>(<28>(<28><1A><<3C><04> <09> <09>}<7D>5<>5r)r1r0N)zAuthentication failed) r!r"r#r$<00>__doc__r3r7r*<00>__classdictcell__<5F><01> __classdict__s@r r,r,&s<00><><00><00>/<2F><19>6<>6rr,c<00>6aa<01>]tRt^/toRtV3RltRtVtV;t#)<04>FDNegotiationErrorzBRaised when file descriptor support is requested but not availablec<08>*<<01>\SV`VRR7R#)z%File descriptor support not available)r0N)<02>superr3)r2r1<00> __class__s&&<26>r r3<00>FDNegotiationError.__init__1s<00><><00> <0A><07><18><14>#J<><18>Krr ) r!r"r#r$r9r3r*r:<00> __classcell__)rAr<s@@r r>r>/s<00><><00><00>L<>L<01>Lrr>c<00>na<00>]tRt^5toRtR Rlt]R4tRtV3RlRlt Rt
V3RlR lt R
t Vt R #) <0A> Authenticatora<72>Process data for the SASL authentication conversation
If enable_fds is True, this includes negotiating support for passing
file descriptors. If inc_null_byte is True, sends the '' byte
at the beginning of the negotiations, which was the past behavior,
but which prevents sending the SCM_CREDS ancillary data over the socket,
breaking authentication on *BSD; the caller should rather send that
null byte and ancillary data and pass inc_null_byte=False to prevent
it being done here.
c<08><><00>Wn\4VnV'dR\4,VnM\4Vn\
P VnRVnR#)<02>N) <09>
enable_fds<EFBFBD> bytearray<61>bufferr<00>_to_sendrr&<00>state<74>error)r2rH<00> inc_null_bytes&&&r r3<00>Authenticator.__init__@sA<00><00>$<24><0F><1F>k<EFBFBD><04> <0B> <18>!<21>$6<>$8<>8<>D<EFBFBD>M<EFBFBD>.<2E>0<>D<EFBFBD>M<EFBFBD> <20>-<2D>-<2D><04>
<EFBFBD><19><04>
rc<08>:<00>VP\PJ#r.)rLrr)r6s&r <00> authenticated<65>Authenticator.authenticatedJs<00><00><13>z<EFBFBD>z<EFBFBD>[<5B>0<>0<>0<>0rc<08>.<00>\VPR4#r.)<02>iter<65> data_to_sendr6s&r <00>__iter__<5F>Authenticator.__iter__Ns<00><00><13>D<EFBFBD>%<25>%<25>t<EFBFBD>,<2C>,rc<00>0<<01>V^8<>dQhRS[S[,/#r)rr )r r<s"<22>r r<00>Authenticator.__annotate__Qs<00><><00> <17> <17>h<EFBFBD>u<EFBFBD>o<EFBFBD> rc <0C>z<00>VP'gVP'dR#RVPuVnpV#)alGet a line of data to send to the server
The data returned should be sent before waiting to receive data.
Returns empty bytes if waiting for more data from the server, and None
if authentication is finished (success or error).
Iterating over the Authenticator object will also yield these lines;
:meth:`feed` should be called with received data inside the loop.
Nr)rQrMrK)r2<00>to_sends& r rU<00>Authenticator.data_to_sendQs2<00><00> <10> <1D> <1D> <1D><14><1A><1A><1A><17>!$<24>d<EFBFBD>m<EFBFBD>m<EFBFBD><1E><04> <0A>w<EFBFBD><16>rc<08><><00>VP\PJdWVPR4'd?VP'd\
\P 3#\\P3#M\VP\P Jd?VPR4'd\\P3#Wn \V4hWn \V4h)sOK s AGREE_UNIX_FD) rLrr&<00>
startswithrH<00>NEGOTIATE_UNIX_FDr(<00>BEGINr)rMr>r,)r2<00>lines&&r <00> process_line<6E>Authenticator.process_line`s<><00><00> <0F>:<3A>:<3A><1B>1<>1<> 1<><13><EFBFBD><EFBFBD>v<EFBFBD>&<26>&<26><17>?<3F>?<3F>?<3F>,<2C>k<EFBFBD>.O<>.O<>O<>O<> <20>+<2B>"5<>"5<>5<>5<> '<27><12>Z<EFBFBD>Z<EFBFBD>;<3B><<3C><<3C> <<3C><13><EFBFBD><EFBFBD>/<2F>0<>0<><1C>k<EFBFBD>1<>1<>1<>1<><1E>J<EFBFBD>$<24>T<EFBFBD>*<2A> *<2A><19>
<EFBFBD>!<21>$<24>'<27>'rc<00> <<01>V^8<>dQhRS[/#)rr1r
)r r<s"<22>r rrYvs<00><><00><0E><0E><15>rc <0C><><00>V;PV, unRVP9dlVPPR^4wq nVP'd\VPR4hVPV4wVnVnR#\ VP4R8<>d\VPR4hR#)z<>Process received data
Raises AuthenticationError if the incoming data is not as expected for
successful authentication. The connection should then be abandoned.
s
zUnexpected data receivedi z*Too much data received without line endingN)rJ<00>splitr,rbrKrL<00>len)r2r1ras&& r <00>feed<65>Authenticator.feedvs<><00><00> <0A> <0B> <0B>t<EFBFBD><1B> <0B> <12>d<EFBFBD>k<EFBFBD>k<EFBFBD> !<21> $<24> <0B> <0B> 1<> 1<>'<27>1<EFBFBD> =<3D> <1D>D<EFBFBD>+<2B><13>{<7B>{<7B>{<7B>)<29>$<24>+<2B>+<2B>7Q<37>R<>R<>(,<2C>(9<>(9<>$<24>(?<3F> %<25>D<EFBFBD>M<EFBFBD>4<EFBFBD>:<3A> <11><14><1B><1B> <1D><04> $<24>%<25><14> <0B> <0B>I<><0E> <0E>%r)rKrJrHrMrLN)FT)r!r"r#r$r9r3<00>propertyrQrVrUrbrhr*r:r;s@r rErE5sA<00><><00><00> <08><1A><0E>1<><0E>1<>-<2D> <17> <17>(<28>,<0E>rrE)<11>binasciir<00>enumrr<00>typingrrrr`r_r<00>
ValueErrorr,r>rE<00>
SASLParserr rr <00><module>rpsc<00><01><1C><15> <09><1B>-<2D>
,<2C> <15><05>,<2C><11><10>$<24><10>6<>*<2A>6<>L<01>,<2C>L<01> W<0E>W<0E>v<1B>
r