� M�g�<���ddlmZddlmZddlZddlZddlm Z ddl m Z ddl m Z ddl mZddl mZejr2ddlZejd ejeefejeef� ��Znejd ejeef� ��ZGd �d eje��Zdd�ZGd�deje��ZdS)�)� annotationsN�)� want_bytes)� BadPayload)� BadSignature)�_make_keys_list)�Signer� _TSerialized)�bound�default)r c��eZdZd d�Zd d�ZdS) �_PDataSerializer�payloadr �return�t.Anyc��dS�N�)�selfrs �g/home/asafur/pinokio/api/open-webui.git/app/env/lib/python3.11/site-packages/itsdangerous/serializer.py�loadsz_PDataSerializer.loads������objc��dSrr�rrs r�dumpsz_PDataSerializer.dumpsrrN)rr rr)rrrr )�__name__� __module__� __qualname__rrrrrrrs*������;�;�;�;�8�7�7�7�7�7rr� serializer�_PDataSerializer[t.Any]r�#te.TypeGuard[_PDataSerializer[str]]c�R�t|�i��t��S)z5Checks whether a serializer generates text or binary.)� isinstancer�str)r!s r�is_text_serializerr'#s"�� �j�&�&�r�*�*�C� 0� 0�0rc���eZdZUdZeZded<eZded<gZ ded<e j dAdBd���Z e j dCdDd���Z e j dEd d d d d�dDd���Z e j dCdFd ���Z e j dEd d d d d�dFd!���Z dAdGd#�Z e dHd&���Z dIdJd)�ZdKd+�ZdIdLd-�ZdIdMd/�ZdIdNd1�ZdIdOd5�Z dIdPd9�ZdIdQd:�Z dIdRd<�Z dSdTd?�Z dIdUd@�Zd S)V� Serializera: A serializer wraps a :class:`~itsdangerous.signer.Signer` to enable serializing and securely signing data other than bytes. It can unsign to verify that the data hasn't been changed. The serializer provides :meth:`dumps` and :meth:`loads`, similar to :mod:`json`, and by default uses :mod:`json` internally to serialize the data to bytes. The secret key should be a random string of ``bytes`` and should not be saved to code or version control. Different salts should be used to distinguish signing in different contexts. See :doc:`/concepts` for information about the security of the secret key and salt. :param secret_key: The secret key to sign and verify with. Can be a list of keys, oldest to newest, to support key rotation. :param salt: Extra key to combine with ``secret_key`` to distinguish signatures in different contexts. :param serializer: An object that provides ``dumps`` and ``loads`` methods for serializing data to a string. Defaults to :attr:`default_serializer`, which defaults to :mod:`json`. :param serializer_kwargs: Keyword arguments to pass when calling ``serializer.dumps``. :param signer: A ``Signer`` class to instantiate when signing data. Defaults to :attr:`default_signer`, which defaults to :class:`~itsdangerous.signer.Signer`. :param signer_kwargs: Keyword arguments to pass when instantiating the ``Signer`` class. :param fallback_signers: List of signer parameters to try when unsigning with the default signer fails. Each item can be a dict of ``signer_kwargs``, a ``Signer`` class, or a tuple of ``(signer, signer_kwargs)``. Defaults to :attr:`default_fallback_signers`. .. versionchanged:: 2.0 Added support for key rotation by passing a list to ``secret_key``. .. versionchanged:: 2.0 Removed the default SHA-512 fallback signer from ``default_fallback_signers``. .. versionchanged:: 1.1 Added support for ``fallback_signers`` and configured a default SHA-512 fallback. This fallback is for users who used the yanked 1.0.0 release which defaulted to SHA-512. .. versionchanged:: 0.14 The ``signer`` and ``signer_kwargs`` parameters were added to the constructor. r"�default_serializerz type[Signer]�default_signerzMlist[dict[str, t.Any] | tuple[type[Signer], dict[str, t.Any]] | type[Signer]]�default_fallback_signers� itsdangerousNr�Serializer[str]� secret_key�7str | bytes | cabc.Iterable[str] | cabc.Iterable[bytes]�salt�str | bytes | Noner!�None | _PDataSerializer[str]�serializer_kwargs�dict[str, t.Any] | None�signer�type[Signer] | None� signer_kwargs�fallback_signers�Tlist[dict[str, t.Any] | tuple[type[Signer], dict[str, t.Any]] | type[Signer]] | Nonec��dSrr�rr/r1r!r4r6r8r9s r�__init__zSerializer.__init__m� �� �sr�Serializer[bytes]�_PDataSerializer[bytes]c��dSrrr<s rr=zSerializer.__init__}r>r)r4r6r8r9c��dSrrr<s rr=zSerializer.__init__�� �� �srrc��dSrrr<s rr=zSerializer.__init__�r>rc��dSrrr<s rr=zSerializer.__init__�rCr� t.Any | Nonec�$�t|��|_|�t|��}||_|�|j}||_t |��|_|�|j}||_|pi|_ |�t|j ��}||_ |pi|_ dSr)r� secret_keysrr1r*r!r'r+r6r8�listr,r9r4r<s rr=zSerializer.__init__�s���$)8� �(C�(C��� � ��d�#�#�D��� � � ��0�J�:D���(:�:�(F�(F��� �>��(�F�$*�� �/<�/B���� � #�#�D�$A�B�B� � � ��4E�3J�����rr�bytesc��|jdS)z�The newest (last) entry in the :attr:`secret_keys` list. This is for compatibility from before key rotation support was added. �����)rH)rs rr/zSerializer.secret_key�s�� ���#�#rr�_PDataSerializer[t.Any] | Nonec��|�|j}|j}n|}t|��} |r(|�|�d����S|�|��S#t$r}t d|���|�d}~wwxYw)aLoads the encoded object. This function raises :class:`.BadPayload` if the payload is not valid. The ``serializer`` parameter can be used to override the serializer stored on the class. The encoded ``payload`` should always be bytes. N�utf-8zSCould not load the payload because an exception occurred on unserializing the data.)�original_error)r!r'r�decode� Exceptionr)rrr!�use_serializer�is_text�es r� load_payloadzSerializer.load_payload�s��� � �!�_�N��-�G�G�'�N�(��4�4�G� �� E�%�+�+�G�N�N�7�,C�,C�D�D�D�!�'�'��0�0� 0��� � � ��7� �����  ����� ���s�)A#�A#�# B�-A?�?Brc�L�t|jj|fi|j����S)z�Dumps the encoded object. The return value is always bytes. If the internal serializer returns text, the value will be encoded as UTF-8. )rr!rr4rs r� dump_payloadzSerializer.dump_payloads-�� �/�$�/�/��N�N�t�7M�N�N�O�O�Orr c�H�|�|j}|j|jfd|i|j��S)z�Creates a new instance of the signer to be used. The default implementation uses the :class:`.Signer` base class. Nr1)r1r6rHr8)rr1s r� make_signerzSerializer.make_signers5�� �<��9�D��t�{�4�+�M�M�$�M�$�:L�M�M�Mr�cabc.Iterator[Signer]c#�K�|�|j}|�|��V�|jD]Z}t|t��r |}|j}n"t|t ��r|\}}n|j}|jD]}||fd|i|��V���[dS)z�Iterates over all signers to be tried for unsigning. Starts with the configured signer, then constructs each signer specified in ``fallback_signers``. Nr1) r1rZr9r%�dictr6�tupler8rH)rr1�fallback�kwargsr/s r�iter_unsignerszSerializer.iter_unsigners!s����� �<��9�D����t�$�$�$�$�$��-� @� @�H��(�D�)�)� ,�!���;����H�e�,�,� ,�#+� ��&�&��+��"�.� @� @� ��h�z�?�?��?��?�?�?�?�?�?� @� @� @rr c���t|�|����}|�|���|��}|jr|�d��S|S)z�Returns a signed string serialized with the internal serializer. The return value can be either a byte or unicode string depending on the format of the internal serializer. rO)rrXrZ�signr'rQ)rrr1r�rvs rrzSerializer.dumps7sb�� �T�.�.�s�3�3�4�4�� � � �d� #� #� (� (�� 1� 1�� � "� &��9�9�W�%�%� %�� r�f� t.IO[t.Any]�Nonec�X�|�|�||����dS)z�Like :meth:`dumps` but dumps into a file. The file handle has to be compatible with what the internal serializer expects. N)�writer)rrrer1s r�dumpzSerializer.dumpDs*�� ���� � �3��%�%�&�&�&�&�&r�s� str | bytesr`c ��t|��}d}|�|��D]E} |�|�|����cS#t$r }|}Yd}~�>d}~wwxYwt jt|���)ziReverse of :meth:`dumps`. Raises :exc:`.BadSignature` if the signature validation fails. N)rrarV�unsignr�t�cast)rrkr1r`�last_exceptionr6�errs rrzSerializer.loadsJs��� �q�M�M�����)�)�$�/�/� %� %�F� %��(�(����q�)9�)9�:�:�:�:�:��� %� %� %�!$����������� %�����f�\�>�2�2�2s�'A� A*�A%�%A*c�R�|�|���|��S)z)Like :meth:`loads` but loads from a file.)r�read�rrer1s r�loadzSerializer.load[s���z�z�!�&�&�(�(�D�)�)�)r�tuple[bool, t.Any]c�.�|�||��S)a9Like :meth:`loads` but without verifying the signature. This is potentially very dangerous to use depending on how your serializer works. The return value is ``(signature_valid, payload)`` instead of just the payload. The first item will be a boolean that indicates if the signature is valid. This function never fails. Use it for debugging only and if you know that your serializer module is not exploitable (for example, do not use it with a pickle serializer). .. versionadded:: 0.15 )�_loads_unsafe_impl)rrkr1s r� loads_unsafezSerializer.loads_unsafe_s�� �&�&�q�$�/�/�/r� load_kwargs�load_payload_kwargsc���|�i} d|j|fd|i|��fS#t$rF}|j�Yd}~dS|�i} d|j|jfi|��fcYd}~S#t$rYYd}~dSwxYwd}~wwxYw)zfLow level helper function to implement :meth:`loads_unsafe` in serializer subclasses. NTr1)FNF)rrrrVr)rrkr1r{r|rUs rryzSerializer._loads_unsafe_implqs��� � ��K� #�����A�@�@�D�@�K�@�@�@� @��� #� #� #��y� �"�{�{�{�{�{�"�*�&(�#� #��%�D�%�a�i�G�G�3F�G�G���������� #� #� #�"�{�{�{�{�{�{� #�������� #���s<�� A(�A#�A#�A�A(� A �A#�A � A#�#A(c�T�|�|���|���S)zYLike :meth:`loads_unsafe` but loads from a file. .. versionadded:: 0.15 )r1)rzrtrus r� load_unsafezSerializer.load_unsafe�s%��� � ������� �5�5�5r)r-NNNNN)rr.r/r0r1r2r!r3r4r5r6r7r8r5r9r:)NNNN)rr?r/r0r1r2r!r@r4r5r6r7r8r5r9r:)r-)r/r0r1r2r!rr4r5r6r7r8r5r9r:)r/r0r1r2r!rFr4r5r6r7r8r5r9r:)rrJr)rrJr!rMrr)rrrrJ)r1r2rr )r1r2rr[)rrr1r2rr )rrrerfr1r2rrg)rkrlr1r2r`rrr)rerfr1r2rr)rkrlr1r2rrw)NN) rkrlr1r2r{r5r|r5rrw)rerfr1r2rrw)rrr �__doc__�jsonr*�__annotations__r r+r,ro�overloadr=�propertyr/rVrXrZrarrjrrvrzryrrrrr)r)*s,�������1�1�l37��6�6�6�6�$*�N�)�)�)�)� �� � � � � �Z�$3�37�59�&*�15��  �  �  �  ��Z�  ��Z� 6:�&*�15��  �  �  �  ��Z�  ��Z�$3�  � 6:�&*�15��  �  �  �  �  ��Z�  �$�Z� 6:�&*�15��  �  �  �  ��Z�  ��Z�$3�  � 6:�&*�15��  �  �  �  �  ��Z�  �$$3�#'�59�&*�15��,K�,K�,K�,K�,K�\�$�$�$��X�$�LP������8P�P�P�P�N�N�N�N�N�@�@�@�@�@�, � � � � �'�'�'�'�'�:>�3�3�3�3�3�"*�*�*�*�*� :>�0�0�0�0�0�,04�7;� #�#�#�#�#�>:>�6�6�6�6�6�6�6rr))r!r"rr#)� __future__r�collections.abc�abc�cabcr��typingro�encodingr�excrrr6rr � TYPE_CHECKING�typing_extensions�te�TypeVar�Unionr&rJr �Protocolrr'�Genericr)rrr�<module>r�s���"�"�"�"�"�"������� � � � ����� � � � � � �������������#�#�#�#�#�#��������?� H�"�"�"�"��2�:��a�g�c�5�j�1�1�7�3��:�;N����L�L� �1�9�^�1�7�3��:�3F�G�G�G�L�8�8�8�8�8�q�z�,�/�8�8�8�1�1�1�1�l6�l6�l6�l6�l6���<�(�l6�l6�l6�l6�l6r
Memory