
    )Jf+                     >     G d  de           Z ed          Zd ZdS )c                   j   e Zd Zd Zd Zed             Zed             Zed             Zd Z	ed             Z
ed             Zed	             Zed
             Zed             Zed             Zed             Zed             Zed             Zed             Zed             Zed             ZdS )AppSettingsc                     || _         d S N)prefix)selfr   s     e/home/alex/cs2snipeproduction/venv/lib/python3.11/site-packages/allauth/socialaccount/app_settings.py__init__zAppSettings.__init__   s        c                 6    ddl m}  || j        |z   |          S )N    )get_setting)allauth.utilsr   r   )r   namedfltr   s       r   _settingzAppSettings._setting   s-    ------{4;-t444r
   c                 D    ddl m} |                     d|j                  S )ze
        Request email address from 3rd party account provider?
        E.g. using OpenID AX
        r   app_settingsQUERY_EMAILallauth.accountr   r   EMAIL_REQUIREDr   account_settingss     r   r   zAppSettings.QUERY_EMAIL
   s/     	EDDDDD}}],<,KLLLr
   c                 .    |                      dd          S )z
        Attempt to bypass the signup form by using fields (e.g. username,
        email) retrieved from the social account provider. If a conflict
        arises due to a duplicate email signup form will still kick in.
        AUTO_SIGNUPTr   r   s    r   r   zAppSettings.AUTO_SIGNUP   s     }}]D111r
   c                     |                      di           }|                    d          }|r|                     |          |d<   |S )z,
        Provider specific settings
        	PROVIDERSopenid_connect)r   get_migrate_oidc)r   retoidcs      r   r    zAppSettings.PROVIDERS   sO    
 mmK,,ww'(( 	=$($6$6t$<$<C !
r
   c                 T   |                     d          }||S i }g }|D ]}t          di |d         }i }d|v r|d         |d<   |d         |d<   |                    |                     dd          |d         |d           |d	         sJ |                    |           ||d
<   |S )NSERVERSAPPtoken_auth_method
server_urlr    id)r   provider_idsettingsr-   APPS )r"   dictupdateappend)r   r%   serversr$   appsserverappr   s           r   r#   zAppSettings._migrate_oidc(   s    ((9%%?K 	 	F''''CL"f,,4:;N4O01)/)=L&JJ"JJvr22#)$< ,    }%%%%KKF
r
   c                 D    ddl m} |                     d|j                  S )zT
        The user is required to hand over an email address when signing up
        r   r   r   r   r   s     r   r   zAppSettings.EMAIL_REQUIRED@   s0    
 	EDDDDD}}-/?/NOOOr
   c                 D    ddl m} |                     d|j                  S )z/
        See email verification method
        r   r   EMAIL_VERIFICATION)r   r   r   r:   r   s     r   r:   zAppSettings.EMAIL_VERIFICATIONI   s0    
 	EDDDDD}}13C3VWWWr
   c                 .    |                      dd          S )a
  Consider a scenario where a social login occurs, and the social
        account comes with a verified email address (verified by the account
        provider), but that email address is already taken by a local user
        account. Additionally, assume that the local user account does not have
        any social account connected. Now, if the provider can be fully trusted,
        you can argue that we should treat this scenario as a login to the
        existing local user account even if the local account does not already
        have the social account connected, because -- according to the provider
        -- the user logging in has ownership of the email address.  This is how
        this scenario is handled when `EMAIL_AUTHENTICATION` is set to
        `True`. As this implies that an untrustworthy provider can login to any
        local account by fabricating social account data, this setting defaults
        to `False`. Only set it to `True` if you are using providers that can be
        fully trusted.
        EMAIL_AUTHENTICATIONFr   r   s    r   r<   z AppSettings.EMAIL_AUTHENTICATIONR   s    " }}3U;;;r
   c                 .    |                      dd          S )aq  In case email authentication is applied, this setting controls
        whether or not the social account is automatically connected to the
        local account. In case of ``False`` (the default) the local account
        remains unchanged during the login. In case of ``True``, the social
        account for which the email matched, is automatically added to the list
        of social accounts connected to the local account. As a result, even if
        the user were to change the email address afterwards, social login
        would still be possible when using ``True``, but not in case of
        ``False``.
        !EMAIL_AUTHENTICATION_AUTO_CONNECTFr   r   s    r   r>   z-AppSettings.EMAIL_AUTHENTICATION_AUTO_CONNECTe   s     }}@%HHHr
   c                 .    |                      dd          S )NADAPTERz9allauth.socialaccount.adapter.DefaultSocialAccountAdapterr   r   s    r   r@   zAppSettings.ADAPTERs   s    }}G
 
 	
r
   c                 .    |                      di           S )NFORMSr   r   s    r   rB   zAppSettings.FORMSz   s    }}Wb)))r
   c                 .    |                      dd          S )NLOGIN_ON_GETFr   r   s    r   rD   zAppSettings.LOGIN_ON_GET~       }}^U333r
   c                 .    |                      dd          S )NSTORE_TOKENSFr   r   s    r   rG   zAppSettings.STORE_TOKENS   rE   r
   c                     dS )N   r0   r   s    r   UID_MAX_LENGTHzAppSettings.UID_MAX_LENGTH   s    sr
   c                 .    |                      dd           S )NSOCIALACCOUNT_STRr   r   s    r   rL   zAppSettings.SOCIALACCOUNT_STR   s    }}0$777r
   c                 .    |                      dd          S )NREQUESTS_TIMEOUT   r   r   s    r   rN   zAppSettings.REQUESTS_TIMEOUT   s    }}/333r
   c                 .    |                      dd          S )NOPENID_CONNECT_URL_PREFIXr%   r   r   s    r   rQ   z%AppSettings.OPENID_CONNECT_URL_PREFIX   s    }}8&AAAr
   N)__name__
__module____qualname__r	   r   propertyr   r   r    r#   r   r:   r<   r>   r@   rB   rD   rG   rJ   rL   rN   rQ   r0   r
   r   r   r      s         5 5 5
 M M XM 2 2 X2   X  0 P P XP X X XX < < X<$ I I XI 
 
 X
 * * X* 4 4 X4 4 4 X4   X 8 8 X8 4 4 X4 B B XB B Br
   r   SOCIALACCOUNT_c                 ,    t          t          |           S r   )getattr_app_settings)r   s    r   __getattr__rZ      s    =$'''r
   N)objectr   rY   rZ   r0   r
   r   <module>r\      sk   SB SB SB SB SB& SB SB SBl ,--( ( ( ( (r
   