%PDF- %PDF-
Direktori : /usr/local/share/emacs/27.2/lisp/ |
Current File : //usr/local/share/emacs/27.2/lisp/auth-source.elc |
;ELC ;;; Compiled ;;; in Emacs version 27.2 ;;; with all optimizations. ;;; This file uses dynamic docstrings, first added in Emacs 19.29. ;;; This file does not contain utf-8 non-ASCII characters, ;;; and so can be loaded in Emacs versions earlier than 23. ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; (byte-code "\300\301!\210\300\302!\210\300\303!\210\300\304!\210\305\306\307\"\210\305\310\307\"\210\305\311\307\"\210\305\312\307\"\210\305\313\307\"\210\305\314\307\"\210\305\315\307\"\210\305\316\317\"\210\305\320\321\"\210\305\322\321\"\210\305\323\321\"\210\305\324\321\"\210\305\325\321\"\210\305\326\321\"\210\305\327\330\"\210\305\331\330\"\210\305\332\330\"\210\305\333\330\"\210\305\334\335\336\337$\210\340\341\336\342\343\344\345\346&\210\347\350\351\352\353DD\354\343\355\356\357&\210\360\361\362\363!\"\210\360\364\365\363!\"\210\360\366\364\"\210\367\366\370\371#\210\372\363\373\364#\374\363\336\375\336$\207" [require json password-cache cl-lib eieio autoload secrets-create-item "secrets" secrets-delete-item secrets-get-alias secrets-get-attributes secrets-get-secret secrets-list-collections secrets-search-items rfc2104-hash "rfc2104" plstore-open "plstore" plstore-find plstore-put plstore-delete plstore-save plstore-get-file epg-make-context "epg" epg-context-set-passphrase-callback epg-decrypt-string epg-encrypt-string help-mode "help-mode" nil t custom-declare-group auth-source "Authentication sources." :version "23.1" :group gnus custom-declare-variable auth-source-cache-expiry funcall function #[0 "\300\207" [7200] 1] "How many seconds passwords are cached, or nil to disable\nexpiring. Overrides `password-cache-expiry' through a\nlet-binding." "24.1" :type (choice (const :tag "Never" nil) (const :tag "All Day" 86400) (const :tag "2 Hours" 7200) (const :tag "30 Minutes" 1800) (integer :tag "Seconds")) defalias auth-source-backend-p eieio-make-class-predicate auth-source-backend auth-source-backend--eieio-childp eieio-make-child-predicate auth-source-backend-child-p make-obsolete "use (cl-typep ... \\='auth-source-backend) instead" "25.1" define-symbol-prop cl-deftype-satisfies eieio-defclass-internal ((type :initarg :type :initform 'netrc :type symbol :custom symbol :documentation "The backend type.") (source :initarg :source :type string :custom string :documentation "The backend source.") (host :initarg :host :initform t :type t :custom string :documentation "The backend host.") (user :initarg :user :initform t :type t :custom string :documentation "The backend user.") (port :initarg :port :initform t :type t :custom string :documentation "The backend protocol.") (data :initarg :data :initform nil :documentation "Internal backend data.") (create-function :initarg :create-function :initform ignore :type function :custom function :documentation "The create function.") (search-function :initarg :search-function :initform ignore :type function :custom function :documentation "The search function."))] 8) #@76 Create a new object of class type `auth-source-backend'. (fn &rest SLOTS) (defalias 'auth-source-backend #[128 "\300\301\302#\207" [apply make-instance auth-source-backend] 5 (#$ . 3073)]) (byte-code "\300\301\302\303#\300\207" [function-put auth-source-backend compiler-macro auth-source-backend--anon-cmacro] 4) #@26 (fn WHOLE &rest SLOTS) (defalias 'auth-source-backend--anon-cmacro #[385 "\211@;\204 \207\300\301\302@@#@\303@DABB\"\207" [macroexp--warn-and-return format "Obsolete name arg %S to constructor %S" identity] 7 (#$ . 3395)]) (byte-code "\300\301\302\303\304DD\305\306\307\310\311&\207" [custom-declare-variable auth-source-protocols funcall function #[0 "\300\207" [((imap "imap" "imaps" "143" "993") (pop3 "pop3" "pop" "pop3s" "110" "995") (ssh "ssh" "22") (sftp "sftp" "115") (smtp "smtp" "25"))] 1] "List of authentication protocols and their names." :version "23.2" :type (repeat :tag "Authentication Protocols" (cons :tag "Protocol Entry" (symbol :tag "Protocol") (repeat :tag "Names" (string :tag "Name"))))] 8) (defconst auth-source-protocols-customize (mapcar #[257 "\211\242\300\301\302!\226F\207" [const :tag symbol-name] 6 "\n\n(fn A)"] auth-source-protocols)) #@57 Defaults for creating token values. Usually let-bound. (defvar auth-source-creation-defaults nil (#$ . 4283)) #@55 Default prompts for token values. Usually let-bound. (defvar auth-source-creation-prompts nil (#$ . 4400)) (byte-code "\302\303\304\305#\210\306\307\310\311\312DD\313\314\315\316\317&\210\306\320\310\311\321DD\322\314\315\316\323\324\325\326\327\330\331\323\327\332\333\334\327\335\336\300!\2039 @\202: \337F\340BBBBB\341BBFF&\210\306\342\310\311\343DD\344\314\315\316\345&\210\306\346\310\311\347DD\350\314\315\316\351&\210\306\352\310\311\353DD\354\314\355\316\326\327\356\323\357\360\361\362\363\364\331\327\365\366\367\326\327\370\371\372\323\327\373\374\331\327\375\376\323\327\375\377 BBBB\257\201@ BBBBB\257\257\201A BBBBBBBBF&\210\306\201B \310\311\201C DD\201D \314\201E \316\201F &\207" [epa-file-auto-mode-alist-entry auth-source-protocols-customize make-obsolete auth-source-hide-passwords nil "Emacs 24.1" custom-declare-variable auth-source-save-behavior funcall function #[0 "\300\207" [ask] 1] "If set, auth-source will respect it for save behavior." :version "23.2" :type (choice :tag "auth-source new token save behavior" (const :tag "Always save" t) (const :tag "Never save" nil) (const :tag "Ask" ask)) auth-source-netrc-use-gpg-tokens #[0 "\300\207" [never] 1] "Set this to tell auth-source when to create GPG password\ntokens in netrc files. It's either an alist or `never'.\nNote that if EPA/EPG is not available, this should NOT be used." choice (const :tag "Always use GPG password tokens" (t gpg)) (const :tag "Never use GPG password tokens" never) repeat :tag "Use a lookup list" list "Matcher" (const :tag "Match anything" t) const "The EPA encrypted file extensions" boundp "\\.gpg\\'" ((regexp :tag "Regular expression")) ((choice :tag "What to do" (const :tag "Save GPG-encrypted password tokens" gpg) (const :tag "Don't encrypt tokens" never))) auth-source-do-cache #[0 "\300\207" [t] 1] "Whether auth-source should cache information with `password-cache'." boolean auth-source-debug #[0 "\300\207" [nil] 1] "Whether auth-source should log debug messages.\n\nIf the value is nil, debug messages are not logged.\n\nIf the value is t, debug messages are logged with `message'. In\nthat case, your authentication data will be in the clear (except\nfor passwords).\n\nIf the value is a function, debug messages are logged by calling\n that function using the same arguments as `message'." (choice :tag "auth-source debugging mode" (const :tag "Log using `message' to the *Messages* buffer" t) (const :tag "Log all trivia with `message' to the *Messages* buffer" trivia) (function :tag "Function that takes arguments like `message'") (const :tag "Don't log anything" nil)) auth-sources #[0 "\300\207" [("~/.authinfo" "~/.authinfo.gpg" "~/.netrc")] 1] "List of authentication sources.\nEach entry is the authentication type with optional properties.\nEntries are tried in the order in which they appear.\nSee Info node `(auth)Help for users' for details.\n\nIf an entry names a file with the \".gpg\" extension and you have\nEPA/EPG set up, the file will be encrypted and decrypted\nautomatically. See Info node `(epa)Encrypting/decrypting gpg files'\nfor details.\n\nIt's best to customize this with `\\[customize-variable]' because the choices\ncan get pretty complex." "26.1" "Authentication Sources" (string :tag "Just a file") (const :tag "Default Secrets API Collection" default) (const :tag "Login Secrets API Collection" "secrets:Login") (const :tag "Temp Secrets API Collection" "secrets:session") (const :tag "Default internet Mac OS Keychain" macos-keychain-internet) (const :tag "Default generic Mac OS Keychain" macos-keychain-generic) "Source definition" (const :format #1="" :value :source) (choice :tag "Authentication backend choice" (string :tag "Authentication Source (file)") (list :tag "Secret Service API/KWallet/GNOME Keyring" (const :format #1# :value :secrets) (choice :tag "Collection to use" (string :tag "Collection name") (const :tag "Default" default) (const :tag "Login" "Login") (const :tag "Temporary" "session"))) (list :tag "Mac OS internet Keychain" (const :format #1# :value :macos-keychain-internet) (choice :tag "Collection to use" (string :tag "internet Keychain path") (const :tag "default" default))) (list :tag "Mac OS generic Keychain" (const :format #1# :value :macos-keychain-generic) (choice :tag "Collection to use" (string :tag "generic Keychain path") (const :tag "default" default)))) "Extra Parameters" :inline t "Extra parameter" (list :tag "Host" (const :format #1# :value :host) (choice :tag "Host (machine) choice" (const :tag "Any" t) (regexp :tag "Regular expression"))) "Protocol" (const :format #1# :value :port) (const :tag "Any" t) ((list :tag "User" :inline t (const :format #1# :value :user) (choice :tag "Personality/Username" (const :tag "Any" t) (string :tag "Name")))) ((sexp :tag "A data structure (external provider)")) auth-source-gpg-encrypt-to #[0 "\300\207" [t] 1] "List of recipient keys that `authinfo.gpg' encrypted to.\nIf the value is not a list, symmetric encryption will be used." "24.1" (choice (const :tag "Symmetric encryption" t) (repeat :tag "Recipient public keys" (string :tag "Recipient public key")))] 40) #@18 (fn &rest MSG) (defalias 'auth-source-do-debug #[128 "\205 \301\302\"\207" [auth-source-debug apply auth-source-do-warn] 4 (#$ . 9542)]) #@18 (fn &rest MSG) (defalias 'auth-source-do-trivia #[128 "\301=\204\f \302!\205 \303\304\"\207" [auth-source-debug trivia functionp apply auth-source-do-warn] 4 (#$ . 9690)]) #@18 (fn &rest MSG) (defalias 'auth-source-do-warn #[128 "\301\302!\203 \202\f \303\"\207" [auth-source-debug apply functionp message] 4 (#$ . 9874)]) #@256 Read one of CHOICES by `read-char-choice', or `read-char'. `dropdown-list' support is disabled because it doesn't work reliably. Only one of CHOICES will be returned. The PROMPT is augmented with "[a/b/c] " if CHOICES is (?a ?b ?c). (fn PROMPT CHOICES) (defalias 'auth-source-read-char-choice #[514 "\211\205D \300\301\302\211:\203! @\262\303\304\"B\262A\262\202 \211\237\266\203\"\305\306\307\310#\311QP\302\211>\204B \312\"\262\2022 \266\203\207" [apply concat nil format "%c/" "[" substring 0 -1 "] " read-char-choice] 10 (#$ . 10033)]) #@330 List of auth-source parser functions. Each function takes an entry from `auth-sources' as parameter and returns a backend or nil if the entry is not supported. Add a parser function to this list with `add-hook'. Searching for a backend starts with the first element on the list and stops as soon as a function returns non-nil. (defvar auth-source-backend-parser-functions nil (#$ . 10600)) #@76 Create an auth-source-backend from an ENTRY in `auth-sources'. (fn ENTRY) (defalias 'auth-source-backend-parse #[257 "\300\301\"\211\204 \302\303\"\210\304\305\306\307\310\311%\262\312\"\207" [run-hook-with-args-until-success auth-source-backend-parser-functions auth-source-do-warn "auth-source-backend-parse: invalid backend spec: %S" make-instance auth-source-backend :source "" :type ignore auth-source-backend-parse-parameters] 8 (#$ . 10998)]) #@14 (fn ENTRY) (defalias 'auth-source-backends-parser-file #[257 "\211;\203\n \300D\262\301\300\"\211;\203! \302!\303\232\203! \304!\202&