From b262898bf36ea0c3b99c07ca0e30e3bfb2a79531 Mon Sep 17 00:00:00 2001 From: DUOLabs333 Date: Mon, 24 Oct 2022 15:01:22 -0400 Subject: [PATCH] Mirror "Templates" and "Plugins" community pages --- Updater.py | 33 +- _vendor/certifi-2022.9.24.dist-info/INSTALLER | 1 + _vendor/certifi-2022.9.24.dist-info/LICENSE | 21 + _vendor/certifi-2022.9.24.dist-info/METADATA | 83 + _vendor/certifi-2022.9.24.dist-info/RECORD | 14 + _vendor/certifi-2022.9.24.dist-info/WHEEL | 5 + .../certifi-2022.9.24.dist-info/top_level.txt | 1 + _vendor/certifi/__init__.py | 4 + _vendor/certifi/__main__.py | 12 + .../__pycache__/__init__.cpython-310.pyc | Bin 0 -> 261 bytes .../__pycache__/__main__.cpython-310.pyc | Bin 0 -> 399 bytes .../certifi/__pycache__/core.cpython-310.pyc | Bin 0 -> 1869 bytes _vendor/certifi/cacert.pem | 4708 +++++++++ _vendor/certifi/core.py | 108 + _vendor/certifi/py.typed | 0 .../INSTALLER | 1 + .../LICENSE | 21 + .../METADATA | 269 + .../charset_normalizer-2.1.1.dist-info/RECORD | 33 + .../charset_normalizer-2.1.1.dist-info/WHEEL | 5 + .../entry_points.txt | 2 + .../top_level.txt | 1 + _vendor/charset_normalizer/__init__.py | 56 + .../__pycache__/__init__.cpython-310.pyc | Bin 0 -> 1695 bytes .../__pycache__/api.cpython-310.pyc | Bin 0 -> 11031 bytes .../__pycache__/cd.cpython-310.pyc | Bin 0 -> 8596 bytes .../__pycache__/constant.cpython-310.pyc | Bin 0 -> 17419 bytes .../__pycache__/legacy.cpython-310.pyc | Bin 0 -> 2875 bytes .../__pycache__/md.cpython-310.pyc | Bin 0 -> 13935 bytes .../__pycache__/models.cpython-310.pyc | Bin 0 -> 13234 bytes .../__pycache__/utils.cpython-310.pyc | Bin 0 -> 8883 bytes .../__pycache__/version.cpython-310.pyc | Bin 0 -> 243 bytes _vendor/charset_normalizer/api.py | 584 ++ _vendor/charset_normalizer/assets/__init__.py | 1122 +++ .../__pycache__/__init__.cpython-310.pyc | Bin 0 -> 7710 bytes _vendor/charset_normalizer/cd.py | 339 + _vendor/charset_normalizer/cli/__init__.py | 0 .../cli/__pycache__/__init__.cpython-310.pyc | Bin 0 -> 163 bytes .../__pycache__/normalizer.cpython-310.pyc | Bin 0 -> 6253 bytes _vendor/charset_normalizer/cli/normalizer.py | 295 + _vendor/charset_normalizer/constant.py | 497 + _vendor/charset_normalizer/legacy.py | 95 + _vendor/charset_normalizer/md.py | 553 ++ _vendor/charset_normalizer/models.py | 401 + _vendor/charset_normalizer/py.typed | 0 _vendor/charset_normalizer/utils.py | 424 + _vendor/charset_normalizer/version.py | 6 + _vendor/idna-3.4.dist-info/INSTALLER | 1 + _vendor/idna-3.4.dist-info/LICENSE.md | 29 + _vendor/idna-3.4.dist-info/METADATA | 242 + _vendor/idna-3.4.dist-info/RECORD | 22 + _vendor/idna-3.4.dist-info/WHEEL | 4 + _vendor/idna/__init__.py | 44 + .../idna/__pycache__/__init__.cpython-310.pyc | Bin 0 -> 804 bytes .../idna/__pycache__/codec.cpython-310.pyc | Bin 0 -> 2775 bytes .../idna/__pycache__/compat.cpython-310.pyc | Bin 0 -> 704 bytes _vendor/idna/__pycache__/core.cpython-310.pyc | Bin 0 -> 9661 bytes .../idna/__pycache__/idnadata.cpython-310.pyc | Bin 0 -> 38340 bytes .../__pycache__/intranges.cpython-310.pyc | Bin 0 -> 1941 bytes .../__pycache__/package_data.cpython-310.pyc | Bin 0 -> 168 bytes .../__pycache__/uts46data.cpython-310.pyc | Bin 0 -> 152355 bytes _vendor/idna/codec.py | 112 + _vendor/idna/compat.py | 13 + _vendor/idna/core.py | 400 + _vendor/idna/idnadata.py | 2151 +++++ _vendor/idna/intranges.py | 54 + _vendor/idna/package_data.py | 2 + _vendor/idna/py.typed | 0 _vendor/idna/uts46data.py | 8600 +++++++++++++++++ _vendor/requests-2.28.1.dist-info/INSTALLER | 1 + _vendor/requests-2.28.1.dist-info/LICENSE | 175 + _vendor/requests-2.28.1.dist-info/METADATA | 122 + _vendor/requests-2.28.1.dist-info/RECORD | 43 + _vendor/requests-2.28.1.dist-info/REQUESTED | 0 _vendor/requests-2.28.1.dist-info/WHEEL | 5 + .../requests-2.28.1.dist-info/top_level.txt | 1 + _vendor/requests/__init__.py | 180 + .../__pycache__/__init__.cpython-310.pyc | Bin 0 -> 3850 bytes .../__pycache__/__version__.cpython-310.pyc | Bin 0 -> 512 bytes .../_internal_utils.cpython-310.pyc | Bin 0 -> 1522 bytes .../__pycache__/adapters.cpython-310.pyc | Bin 0 -> 16784 bytes .../requests/__pycache__/api.cpython-310.pyc | Bin 0 -> 6611 bytes .../requests/__pycache__/auth.cpython-310.pyc | Bin 0 -> 8079 bytes .../__pycache__/certs.cpython-310.pyc | Bin 0 -> 584 bytes .../__pycache__/compat.cpython-310.pyc | Bin 0 -> 1481 bytes .../__pycache__/cookies.cpython-310.pyc | Bin 0 -> 18654 bytes .../__pycache__/exceptions.cpython-310.pyc | Bin 0 -> 5686 bytes .../requests/__pycache__/help.cpython-310.pyc | Bin 0 -> 2806 bytes .../__pycache__/hooks.cpython-310.pyc | Bin 0 -> 951 bytes .../__pycache__/models.cpython-310.pyc | Bin 0 -> 24152 bytes .../__pycache__/packages.cpython-310.pyc | Bin 0 -> 678 bytes .../__pycache__/sessions.cpython-310.pyc | Bin 0 -> 19543 bytes .../__pycache__/status_codes.cpython-310.pyc | Bin 0 -> 4630 bytes .../__pycache__/structures.cpython-310.pyc | Bin 0 -> 4395 bytes .../__pycache__/utils.cpython-310.pyc | Bin 0 -> 24281 bytes _vendor/requests/__version__.py | 14 + _vendor/requests/_internal_utils.py | 48 + _vendor/requests/adapters.py | 584 ++ _vendor/requests/api.py | 157 + _vendor/requests/auth.py | 315 + _vendor/requests/certs.py | 17 + _vendor/requests/compat.py | 79 + _vendor/requests/cookies.py | 561 ++ _vendor/requests/exceptions.py | 141 + _vendor/requests/help.py | 134 + _vendor/requests/hooks.py | 33 + _vendor/requests/models.py | 1034 ++ _vendor/requests/packages.py | 28 + _vendor/requests/sessions.py | 831 ++ _vendor/requests/status_codes.py | 128 + _vendor/requests/structures.py | 99 + _vendor/requests/utils.py | 1086 +++ _vendor/urllib3-1.26.12.dist-info/INSTALLER | 1 + _vendor/urllib3-1.26.12.dist-info/LICENSE.txt | 21 + _vendor/urllib3-1.26.12.dist-info/METADATA | 1448 +++ _vendor/urllib3-1.26.12.dist-info/RECORD | 82 + _vendor/urllib3-1.26.12.dist-info/WHEEL | 6 + .../urllib3-1.26.12.dist-info/top_level.txt | 1 + _vendor/urllib3/__init__.py | 102 + .../__pycache__/__init__.cpython-310.pyc | Bin 0 -> 2466 bytes .../__pycache__/_collections.cpython-310.pyc | Bin 0 -> 10820 bytes .../__pycache__/_version.cpython-310.pyc | Bin 0 -> 171 bytes .../__pycache__/connection.cpython-310.pyc | Bin 0 -> 13600 bytes .../connectionpool.cpython-310.pyc | Bin 0 -> 25362 bytes .../__pycache__/exceptions.cpython-310.pyc | Bin 0 -> 10951 bytes .../__pycache__/fields.cpython-310.pyc | Bin 0 -> 8142 bytes .../__pycache__/filepost.cpython-310.pyc | Bin 0 -> 2707 bytes .../__pycache__/poolmanager.cpython-310.pyc | Bin 0 -> 15176 bytes .../__pycache__/request.cpython-310.pyc | Bin 0 -> 5583 bytes .../__pycache__/response.cpython-310.pyc | Bin 0 -> 22157 bytes _vendor/urllib3/_collections.py | 337 + _vendor/urllib3/_version.py | 2 + _vendor/urllib3/connection.py | 567 ++ _vendor/urllib3/connectionpool.py | 1110 +++ _vendor/urllib3/contrib/__init__.py | 0 .../__pycache__/__init__.cpython-310.pyc | Bin 0 -> 156 bytes .../_appengine_environ.cpython-310.pyc | Bin 0 -> 1336 bytes .../__pycache__/appengine.cpython-310.pyc | Bin 0 -> 8128 bytes .../__pycache__/ntlmpool.cpython-310.pyc | Bin 0 -> 3591 bytes .../__pycache__/pyopenssl.cpython-310.pyc | Bin 0 -> 15736 bytes .../securetransport.cpython-310.pyc | Bin 0 -> 21859 bytes .../contrib/__pycache__/socks.cpython-310.pyc | Bin 0 -> 5558 bytes _vendor/urllib3/contrib/_appengine_environ.py | 36 + .../contrib/_securetransport/__init__.py | 0 .../__pycache__/__init__.cpython-310.pyc | Bin 0 -> 173 bytes .../__pycache__/bindings.cpython-310.pyc | Bin 0 -> 10669 bytes .../__pycache__/low_level.cpython-310.pyc | Bin 0 -> 9056 bytes .../contrib/_securetransport/bindings.py | 519 + .../contrib/_securetransport/low_level.py | 397 + _vendor/urllib3/contrib/appengine.py | 314 + _vendor/urllib3/contrib/ntlmpool.py | 130 + _vendor/urllib3/contrib/pyopenssl.py | 519 + _vendor/urllib3/contrib/securetransport.py | 921 ++ _vendor/urllib3/contrib/socks.py | 216 + _vendor/urllib3/exceptions.py | 323 + _vendor/urllib3/fields.py | 274 + _vendor/urllib3/filepost.py | 98 + _vendor/urllib3/packages/__init__.py | 0 .../__pycache__/__init__.cpython-310.pyc | Bin 0 -> 157 bytes .../packages/__pycache__/six.cpython-310.pyc | Bin 0 -> 27617 bytes .../urllib3/packages/backports/__init__.py | 0 .../__pycache__/__init__.cpython-310.pyc | Bin 0 -> 167 bytes .../__pycache__/makefile.cpython-310.pyc | Bin 0 -> 1267 bytes .../urllib3/packages/backports/makefile.py | 51 + _vendor/urllib3/packages/six.py | 1076 +++ _vendor/urllib3/poolmanager.py | 537 + _vendor/urllib3/request.py | 170 + _vendor/urllib3/response.py | 872 ++ _vendor/urllib3/util/__init__.py | 49 + .../util/__pycache__/__init__.cpython-310.pyc | Bin 0 -> 1066 bytes .../__pycache__/connection.cpython-310.pyc | Bin 0 -> 3394 bytes .../util/__pycache__/proxy.cpython-310.pyc | Bin 0 -> 1301 bytes .../util/__pycache__/queue.cpython-310.pyc | Bin 0 -> 1021 bytes .../util/__pycache__/request.cpython-310.pyc | Bin 0 -> 3483 bytes .../util/__pycache__/response.cpython-310.pyc | Bin 0 -> 2314 bytes .../util/__pycache__/retry.cpython-310.pyc | Bin 0 -> 16099 bytes .../util/__pycache__/ssl_.cpython-310.pyc | Bin 0 -> 11256 bytes .../ssl_match_hostname.cpython-310.pyc | Bin 0 -> 3218 bytes .../__pycache__/ssltransport.cpython-310.pyc | Bin 0 -> 7356 bytes .../util/__pycache__/timeout.cpython-310.pyc | Bin 0 -> 8898 bytes .../util/__pycache__/url.cpython-310.pyc | Bin 0 -> 10630 bytes .../util/__pycache__/wait.cpython-310.pyc | Bin 0 -> 3050 bytes _vendor/urllib3/util/connection.py | 149 + _vendor/urllib3/util/proxy.py | 57 + _vendor/urllib3/util/queue.py | 22 + _vendor/urllib3/util/request.py | 146 + _vendor/urllib3/util/response.py | 107 + _vendor/urllib3/util/retry.py | 620 ++ _vendor/urllib3/util/ssl_.py | 495 + _vendor/urllib3/util/ssl_match_hostname.py | 159 + _vendor/urllib3/util/ssltransport.py | 221 + _vendor/urllib3/util/timeout.py | 268 + _vendor/urllib3/util/url.py | 435 + _vendor/urllib3/util/wait.py | 152 + www.photopea.com/code/pp/pp.js | 4 +- www.photopea.com/img/nft.png | Bin 0 -> 8168 bytes www.photopea.com/papi/tpls.json | 296 +- www.photopea.com/plugins/gallery.json | 2 +- www.photopea.com/templates/?type=0.html | 236 + www.photopea.com/templates/?type=1.html | 236 + www.photopea.com/templates/?type=2.html | 236 + www.photopea.com/templates/?type=3.html | 236 + www.photopea.com/templates/templates.css | 56 + www.photopea.com/templates/templates.js | 309 + 204 files changed, 41649 insertions(+), 156 deletions(-) create mode 100644 _vendor/certifi-2022.9.24.dist-info/INSTALLER create mode 100644 _vendor/certifi-2022.9.24.dist-info/LICENSE create mode 100644 _vendor/certifi-2022.9.24.dist-info/METADATA create mode 100644 _vendor/certifi-2022.9.24.dist-info/RECORD create mode 100644 _vendor/certifi-2022.9.24.dist-info/WHEEL create mode 100644 _vendor/certifi-2022.9.24.dist-info/top_level.txt create mode 100644 _vendor/certifi/__init__.py create mode 100644 _vendor/certifi/__main__.py create mode 100644 _vendor/certifi/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/certifi/__pycache__/__main__.cpython-310.pyc create mode 100644 _vendor/certifi/__pycache__/core.cpython-310.pyc create mode 100644 _vendor/certifi/cacert.pem create mode 100644 _vendor/certifi/core.py create mode 100644 _vendor/certifi/py.typed create mode 100644 _vendor/charset_normalizer-2.1.1.dist-info/INSTALLER create mode 100644 _vendor/charset_normalizer-2.1.1.dist-info/LICENSE create mode 100644 _vendor/charset_normalizer-2.1.1.dist-info/METADATA create mode 100644 _vendor/charset_normalizer-2.1.1.dist-info/RECORD create mode 100644 _vendor/charset_normalizer-2.1.1.dist-info/WHEEL create mode 100644 _vendor/charset_normalizer-2.1.1.dist-info/entry_points.txt create mode 100644 _vendor/charset_normalizer-2.1.1.dist-info/top_level.txt create mode 100644 _vendor/charset_normalizer/__init__.py create mode 100644 _vendor/charset_normalizer/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/__pycache__/api.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/__pycache__/cd.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/__pycache__/constant.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/__pycache__/legacy.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/__pycache__/md.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/__pycache__/models.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/__pycache__/utils.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/__pycache__/version.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/api.py create mode 100644 _vendor/charset_normalizer/assets/__init__.py create mode 100644 _vendor/charset_normalizer/assets/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/cd.py create mode 100644 _vendor/charset_normalizer/cli/__init__.py create mode 100644 _vendor/charset_normalizer/cli/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/cli/__pycache__/normalizer.cpython-310.pyc create mode 100644 _vendor/charset_normalizer/cli/normalizer.py create mode 100644 _vendor/charset_normalizer/constant.py create mode 100644 _vendor/charset_normalizer/legacy.py create mode 100644 _vendor/charset_normalizer/md.py create mode 100644 _vendor/charset_normalizer/models.py create mode 100644 _vendor/charset_normalizer/py.typed create mode 100644 _vendor/charset_normalizer/utils.py create mode 100644 _vendor/charset_normalizer/version.py create mode 100644 _vendor/idna-3.4.dist-info/INSTALLER create mode 100644 _vendor/idna-3.4.dist-info/LICENSE.md create mode 100644 _vendor/idna-3.4.dist-info/METADATA create mode 100644 _vendor/idna-3.4.dist-info/RECORD create mode 100644 _vendor/idna-3.4.dist-info/WHEEL create mode 100644 _vendor/idna/__init__.py create mode 100644 _vendor/idna/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/idna/__pycache__/codec.cpython-310.pyc create mode 100644 _vendor/idna/__pycache__/compat.cpython-310.pyc create mode 100644 _vendor/idna/__pycache__/core.cpython-310.pyc create mode 100644 _vendor/idna/__pycache__/idnadata.cpython-310.pyc create mode 100644 _vendor/idna/__pycache__/intranges.cpython-310.pyc create mode 100644 _vendor/idna/__pycache__/package_data.cpython-310.pyc create mode 100644 _vendor/idna/__pycache__/uts46data.cpython-310.pyc create mode 100644 _vendor/idna/codec.py create mode 100644 _vendor/idna/compat.py create mode 100644 _vendor/idna/core.py create mode 100644 _vendor/idna/idnadata.py create mode 100644 _vendor/idna/intranges.py create mode 100644 _vendor/idna/package_data.py create mode 100644 _vendor/idna/py.typed create mode 100644 _vendor/idna/uts46data.py create mode 100644 _vendor/requests-2.28.1.dist-info/INSTALLER create mode 100644 _vendor/requests-2.28.1.dist-info/LICENSE create mode 100644 _vendor/requests-2.28.1.dist-info/METADATA create mode 100644 _vendor/requests-2.28.1.dist-info/RECORD create mode 100644 _vendor/requests-2.28.1.dist-info/REQUESTED create mode 100644 _vendor/requests-2.28.1.dist-info/WHEEL create mode 100644 _vendor/requests-2.28.1.dist-info/top_level.txt create mode 100644 _vendor/requests/__init__.py create mode 100644 _vendor/requests/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/__version__.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/_internal_utils.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/adapters.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/api.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/auth.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/certs.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/compat.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/cookies.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/exceptions.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/help.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/hooks.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/models.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/packages.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/sessions.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/status_codes.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/structures.cpython-310.pyc create mode 100644 _vendor/requests/__pycache__/utils.cpython-310.pyc create mode 100644 _vendor/requests/__version__.py create mode 100644 _vendor/requests/_internal_utils.py create mode 100644 _vendor/requests/adapters.py create mode 100644 _vendor/requests/api.py create mode 100644 _vendor/requests/auth.py create mode 100644 _vendor/requests/certs.py create mode 100644 _vendor/requests/compat.py create mode 100644 _vendor/requests/cookies.py create mode 100644 _vendor/requests/exceptions.py create mode 100644 _vendor/requests/help.py create mode 100644 _vendor/requests/hooks.py create mode 100644 _vendor/requests/models.py create mode 100644 _vendor/requests/packages.py create mode 100644 _vendor/requests/sessions.py create mode 100644 _vendor/requests/status_codes.py create mode 100644 _vendor/requests/structures.py create mode 100644 _vendor/requests/utils.py create mode 100644 _vendor/urllib3-1.26.12.dist-info/INSTALLER create mode 100644 _vendor/urllib3-1.26.12.dist-info/LICENSE.txt create mode 100644 _vendor/urllib3-1.26.12.dist-info/METADATA create mode 100644 _vendor/urllib3-1.26.12.dist-info/RECORD create mode 100644 _vendor/urllib3-1.26.12.dist-info/WHEEL create mode 100644 _vendor/urllib3-1.26.12.dist-info/top_level.txt create mode 100644 _vendor/urllib3/__init__.py create mode 100644 _vendor/urllib3/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/urllib3/__pycache__/_collections.cpython-310.pyc create mode 100644 _vendor/urllib3/__pycache__/_version.cpython-310.pyc create mode 100644 _vendor/urllib3/__pycache__/connection.cpython-310.pyc create mode 100644 _vendor/urllib3/__pycache__/connectionpool.cpython-310.pyc create mode 100644 _vendor/urllib3/__pycache__/exceptions.cpython-310.pyc create mode 100644 _vendor/urllib3/__pycache__/fields.cpython-310.pyc create mode 100644 _vendor/urllib3/__pycache__/filepost.cpython-310.pyc create mode 100644 _vendor/urllib3/__pycache__/poolmanager.cpython-310.pyc create mode 100644 _vendor/urllib3/__pycache__/request.cpython-310.pyc create mode 100644 _vendor/urllib3/__pycache__/response.cpython-310.pyc create mode 100644 _vendor/urllib3/_collections.py create mode 100644 _vendor/urllib3/_version.py create mode 100644 _vendor/urllib3/connection.py create mode 100644 _vendor/urllib3/connectionpool.py create mode 100644 _vendor/urllib3/contrib/__init__.py create mode 100644 _vendor/urllib3/contrib/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/urllib3/contrib/__pycache__/_appengine_environ.cpython-310.pyc create mode 100644 _vendor/urllib3/contrib/__pycache__/appengine.cpython-310.pyc create mode 100644 _vendor/urllib3/contrib/__pycache__/ntlmpool.cpython-310.pyc create mode 100644 _vendor/urllib3/contrib/__pycache__/pyopenssl.cpython-310.pyc create mode 100644 _vendor/urllib3/contrib/__pycache__/securetransport.cpython-310.pyc create mode 100644 _vendor/urllib3/contrib/__pycache__/socks.cpython-310.pyc create mode 100644 _vendor/urllib3/contrib/_appengine_environ.py create mode 100644 _vendor/urllib3/contrib/_securetransport/__init__.py create mode 100644 _vendor/urllib3/contrib/_securetransport/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/urllib3/contrib/_securetransport/__pycache__/bindings.cpython-310.pyc create mode 100644 _vendor/urllib3/contrib/_securetransport/__pycache__/low_level.cpython-310.pyc create mode 100644 _vendor/urllib3/contrib/_securetransport/bindings.py create mode 100644 _vendor/urllib3/contrib/_securetransport/low_level.py create mode 100644 _vendor/urllib3/contrib/appengine.py create mode 100644 _vendor/urllib3/contrib/ntlmpool.py create mode 100644 _vendor/urllib3/contrib/pyopenssl.py create mode 100644 _vendor/urllib3/contrib/securetransport.py create mode 100644 _vendor/urllib3/contrib/socks.py create mode 100644 _vendor/urllib3/exceptions.py create mode 100644 _vendor/urllib3/fields.py create mode 100644 _vendor/urllib3/filepost.py create mode 100644 _vendor/urllib3/packages/__init__.py create mode 100644 _vendor/urllib3/packages/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/urllib3/packages/__pycache__/six.cpython-310.pyc create mode 100644 _vendor/urllib3/packages/backports/__init__.py create mode 100644 _vendor/urllib3/packages/backports/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/urllib3/packages/backports/__pycache__/makefile.cpython-310.pyc create mode 100644 _vendor/urllib3/packages/backports/makefile.py create mode 100644 _vendor/urllib3/packages/six.py create mode 100644 _vendor/urllib3/poolmanager.py create mode 100644 _vendor/urllib3/request.py create mode 100644 _vendor/urllib3/response.py create mode 100644 _vendor/urllib3/util/__init__.py create mode 100644 _vendor/urllib3/util/__pycache__/__init__.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/connection.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/proxy.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/queue.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/request.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/response.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/retry.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/ssl_.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/ssl_match_hostname.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/ssltransport.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/timeout.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/url.cpython-310.pyc create mode 100644 _vendor/urllib3/util/__pycache__/wait.cpython-310.pyc create mode 100644 _vendor/urllib3/util/connection.py create mode 100644 _vendor/urllib3/util/proxy.py create mode 100644 _vendor/urllib3/util/queue.py create mode 100644 _vendor/urllib3/util/request.py create mode 100644 _vendor/urllib3/util/response.py create mode 100644 _vendor/urllib3/util/retry.py create mode 100644 _vendor/urllib3/util/ssl_.py create mode 100644 _vendor/urllib3/util/ssl_match_hostname.py create mode 100644 _vendor/urllib3/util/ssltransport.py create mode 100644 _vendor/urllib3/util/timeout.py create mode 100644 _vendor/urllib3/util/url.py create mode 100644 _vendor/urllib3/util/wait.py create mode 100644 www.photopea.com/img/nft.png create mode 100644 www.photopea.com/templates/?type=0.html create mode 100644 www.photopea.com/templates/?type=1.html create mode 100644 www.photopea.com/templates/?type=2.html create mode 100644 www.photopea.com/templates/?type=3.html create mode 100644 www.photopea.com/templates/templates.css create mode 100644 www.photopea.com/templates/templates.js diff --git a/Updater.py b/Updater.py index 0ff7410..4fa84fd 100755 --- a/Updater.py +++ b/Updater.py @@ -1,9 +1,12 @@ #!/bin/python3 + +import sys +sys.path.insert(0,"_vendor") + import requests -import os, sys +import os import re import json -sys.path.insert(0,"_vendor") from tqdm import tqdm from dataclasses import dataclass import glob @@ -30,13 +33,29 @@ urls = [ "code/storages/deviceStorage.html", "code/storages/googledriveStorage.html", "code/storages/dropboxStorage.html", - "rsrc/basic/fa_basic.csh" + "rsrc/basic/fa_basic.csh", + "img/nft.png", + ["templates/?type=0&rsrc=","templates/?type=0.html"], + ["templates/?type=1&rsrc=","templates/?type=1.html"], + ["templates/?type=2&rsrc=","templates/?type=2.html"], + ["templates/?type=3&rsrc=","templates/?type=3.html"], + "templates/templates.js", + "templates/templates.css" ] #Update files def dl_file(path): + if isinstance(path,list): + output=path[1] + path=path[0] + else: + output=path + path=path + outfn = root + output + if os.path.exists(outfn): + return with tqdm(desc=path, unit="B", unit_scale=True) as progress_bar: r = requests.get(website + path, stream=True) progress_bar.total = int(r.headers.get("Content-Length", 0)) @@ -44,8 +63,8 @@ def dl_file(path): if r.status_code != 200: progress_bar.desc += "ERROR: HTTP Status %d" % r.status_code return - - outfn = root + path + + os.makedirs(os.path.dirname(outfn), exist_ok=True) with open(outfn, "wb") as outf: for chunk in r.iter_content(chunk_size=1024): @@ -145,3 +164,7 @@ find_and_replace('code/storages/dropboxStorage.html', 'var redirectUri = window. find_and_replace('index.html','https://connect.facebook.net','') find_and_replace('index.html','https://www.facebook.com','') + +#Redirect dynamic pages to static equivalent +find_and_replace('code/pp/pp.js','"&rsrc="','".html"') +find_and_replace('code/pp/pp.js','"templates/?type="','"templates/%3Ftype="') diff --git a/_vendor/certifi-2022.9.24.dist-info/INSTALLER b/_vendor/certifi-2022.9.24.dist-info/INSTALLER new file mode 100644 index 0000000..a1b589e --- /dev/null +++ b/_vendor/certifi-2022.9.24.dist-info/INSTALLER @@ -0,0 +1 @@ +pip diff --git a/_vendor/certifi-2022.9.24.dist-info/LICENSE b/_vendor/certifi-2022.9.24.dist-info/LICENSE new file mode 100644 index 0000000..0a64774 --- /dev/null +++ b/_vendor/certifi-2022.9.24.dist-info/LICENSE @@ -0,0 +1,21 @@ +This package contains a modified version of ca-bundle.crt: + +ca-bundle.crt -- Bundle of CA Root Certificates + +Certificate data from Mozilla as of: Thu Nov 3 19:04:19 2011# +This is a bundle of X.509 certificates of public Certificate Authorities +(CA). These were automatically extracted from Mozilla's root certificates +file (certdata.txt). This file can be found in the mozilla source tree: +https://hg.mozilla.org/mozilla-central/file/tip/security/nss/lib/ckfw/builtins/certdata.txt +It contains the certificates in PEM format and therefore +can be directly used with curl / libcurl / php_curl, or with +an Apache+mod_ssl webserver for SSL client authentication. +Just configure this file as the SSLCACertificateFile.# + +***** BEGIN LICENSE BLOCK ***** +This Source Code Form is subject to the terms of the Mozilla Public License, +v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain +one at http://mozilla.org/MPL/2.0/. + +***** END LICENSE BLOCK ***** +@(#) $RCSfile: certdata.txt,v $ $Revision: 1.80 $ $Date: 2011/11/03 15:11:58 $ diff --git a/_vendor/certifi-2022.9.24.dist-info/METADATA b/_vendor/certifi-2022.9.24.dist-info/METADATA new file mode 100644 index 0000000..92ea6c8 --- /dev/null +++ b/_vendor/certifi-2022.9.24.dist-info/METADATA @@ -0,0 +1,83 @@ +Metadata-Version: 2.1 +Name: certifi +Version: 2022.9.24 +Summary: Python package for providing Mozilla's CA Bundle. +Home-page: https://github.com/certifi/python-certifi +Author: Kenneth Reitz +Author-email: me@kennethreitz.com +License: MPL-2.0 +Project-URL: Source, https://github.com/certifi/python-certifi +Platform: UNKNOWN +Classifier: Development Status :: 5 - Production/Stable +Classifier: Intended Audience :: Developers +Classifier: License :: OSI Approved :: Mozilla Public License 2.0 (MPL 2.0) +Classifier: Natural Language :: English +Classifier: Programming Language :: Python +Classifier: Programming Language :: Python :: 3 +Classifier: Programming Language :: Python :: 3 :: Only +Classifier: Programming Language :: Python :: 3.6 +Classifier: Programming Language :: Python :: 3.7 +Classifier: Programming Language :: Python :: 3.8 +Classifier: Programming Language :: Python :: 3.9 +Classifier: Programming Language :: Python :: 3.10 +Classifier: Programming Language :: Python :: 3.11 +Requires-Python: >=3.6 +License-File: LICENSE + +Certifi: Python SSL Certificates +================================ + +Certifi provides Mozilla's carefully curated collection of Root Certificates for +validating the trustworthiness of SSL certificates while verifying the identity +of TLS hosts. It has been extracted from the `Requests`_ project. + +Installation +------------ + +``certifi`` is available on PyPI. Simply install it with ``pip``:: + + $ pip install certifi + +Usage +----- + +To reference the installed certificate authority (CA) bundle, you can use the +built-in function:: + + >>> import certifi + + >>> certifi.where() + '/usr/local/lib/python3.7/site-packages/certifi/cacert.pem' + +Or from the command line:: + + $ python -m certifi + /usr/local/lib/python3.7/site-packages/certifi/cacert.pem + +Enjoy! + +1024-bit Root Certificates +~~~~~~~~~~~~~~~~~~~~~~~~~~ + +Browsers and certificate authorities have concluded that 1024-bit keys are +unacceptably weak for certificates, particularly root certificates. For this +reason, Mozilla has removed any weak (i.e. 1024-bit key) certificate from its +bundle, replacing it with an equivalent strong (i.e. 2048-bit or greater key) +certificate from the same CA. Because Mozilla removed these certificates from +its bundle, ``certifi`` removed them as well. + +In previous versions, ``certifi`` provided the ``certifi.old_where()`` function +to intentionally re-add the 1024-bit roots back into your bundle. This was not +recommended in production and therefore was removed at the end of 2018. + +.. _`Requests`: https://requests.readthedocs.io/en/master/ + +Addition/Removal of Certificates +-------------------------------- + +Certifi does not support any addition/removal or other modification of the +CA trust store content. This project is intended to provide a reliable and +highly portable root of trust to python deployments. Look to upstream projects +for methods to use alternate trust. + + diff --git a/_vendor/certifi-2022.9.24.dist-info/RECORD b/_vendor/certifi-2022.9.24.dist-info/RECORD new file mode 100644 index 0000000..7539e53 --- /dev/null +++ b/_vendor/certifi-2022.9.24.dist-info/RECORD @@ -0,0 +1,14 @@ +certifi-2022.9.24.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4 +certifi-2022.9.24.dist-info/LICENSE,sha256=oC9sY4-fuE0G93ZMOrCF2K9-2luTwWbaVDEkeQd8b7A,1052 +certifi-2022.9.24.dist-info/METADATA,sha256=33NAOmkqKTCb2u1Ys8Zth7ABWXfEuLgp-5gLp1yK_7A,2911 +certifi-2022.9.24.dist-info/RECORD,, +certifi-2022.9.24.dist-info/WHEEL,sha256=ewwEueio1C2XeHTvT17n8dZUJgOvyCWCt0WVNLClP9o,92 +certifi-2022.9.24.dist-info/top_level.txt,sha256=KMu4vUCfsjLrkPbSNdgdekS-pVJzBAJFO__nI8NF6-U,8 +certifi/__init__.py,sha256=luDjIGxDSrQ9O0zthdz5Lnt069Z_7eR1GIEefEaf-Ys,94 +certifi/__main__.py,sha256=xBBoj905TUWBLRGANOcf7oi6e-3dMP4cEoG9OyMs11g,243 +certifi/__pycache__/__init__.cpython-310.pyc,, +certifi/__pycache__/__main__.cpython-310.pyc,, +certifi/__pycache__/core.cpython-310.pyc,, +certifi/cacert.pem,sha256=3l8CcWt_qL42030rGieD3SLufICFX0bYtGhDl_EXVPI,286370 +certifi/core.py,sha256=lhewz0zFb2b4ULsQurElmloYwQoecjWzPqY67P8T7iM,4219 +certifi/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 diff --git a/_vendor/certifi-2022.9.24.dist-info/WHEEL b/_vendor/certifi-2022.9.24.dist-info/WHEEL new file mode 100644 index 0000000..5bad85f --- /dev/null +++ b/_vendor/certifi-2022.9.24.dist-info/WHEEL @@ -0,0 +1,5 @@ +Wheel-Version: 1.0 +Generator: bdist_wheel (0.37.0) +Root-Is-Purelib: true +Tag: py3-none-any + diff --git a/_vendor/certifi-2022.9.24.dist-info/top_level.txt b/_vendor/certifi-2022.9.24.dist-info/top_level.txt new file mode 100644 index 0000000..963eac5 --- /dev/null +++ b/_vendor/certifi-2022.9.24.dist-info/top_level.txt @@ -0,0 +1 @@ +certifi diff --git a/_vendor/certifi/__init__.py b/_vendor/certifi/__init__.py new file mode 100644 index 0000000..af4bcc1 --- /dev/null +++ b/_vendor/certifi/__init__.py @@ -0,0 +1,4 @@ +from .core import contents, where + +__all__ = ["contents", "where"] +__version__ = "2022.09.24" diff --git a/_vendor/certifi/__main__.py b/_vendor/certifi/__main__.py new file mode 100644 index 0000000..8945b5d --- /dev/null +++ b/_vendor/certifi/__main__.py @@ -0,0 +1,12 @@ +import argparse + +from certifi import contents, where + +parser = argparse.ArgumentParser() +parser.add_argument("-c", "--contents", action="store_true") +args = parser.parse_args() + +if args.contents: + print(contents()) +else: + print(where()) diff --git a/_vendor/certifi/__pycache__/__init__.cpython-310.pyc b/_vendor/certifi/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..665ee9a9be8fc555512abbe5600d4ef23de7112e GIT binary patch literal 261 zcmYk0!D<3A6h)KFj1HE8enPjia3Z5p3Z?i3ZiFso;ln1W1~N&SNiFt|{3FS>D}SLY zlbsjdxm@1k@=R4tP*in!XWQt1Dcp<1u!=K0MR3HiLOt$qPdb7TCp_DeF5`KZ^J0VQ z(G|zDnuL-W?S=M3D1HvY372|Y7V$f2XKmZeUYd5Xu8WW}bH5H_fSpnR;Q`<%+#rnx zI3qVs1quJp)c2NJX{UbY_QFpWUvepqb4Hc?p!VbsMpGu7m!FaXNG&};V^5)c?G67{ P;w?Qnj3ORUNlJVJUa~%x literal 0 HcmV?d00001 diff --git a/_vendor/certifi/__pycache__/__main__.cpython-310.pyc b/_vendor/certifi/__pycache__/__main__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..b4559f8e9cebabaf90a51662936ed9f53063df78 GIT binary patch literal 399 zcmYk0y-ve06oqZ4PE16jJ_S;SkO2@2Lhu3z35g*~6yi(kDnG_?LG9X^cPJxoguF5_ zvoUcUA>c|rSLgWnll$p3COFf#+xiptyEp%bqq)E{6eyBN+K|F;*3gy}tPP5Q5+J+D z3n@78WhetVkz9t)KIgj#a{*$>%mM5H+mbD%NVy^CfoCw z0Kx!$2ShCxYM7wM^u!Zv3}ecTZ}>@NOhAXf?vqn*(^jX+orkmNqN;5q8@D&Uy0@Kd z-QK>V(7*CQ*kG^Bi&1KJZT;epjqUHPr;W0;B!OI{N|IBe+PDS9`FhU`N4-%#S~aQK zk!JOypYxC9gY~R8$bagM4$W>^^rlhtvQkOF+4>K6rIPcoUk4z9pi^&9&J@mENgp9| z=`Vu<>0{DRy<=Cof{4T6c32PgQ^?l4zW<0}A_>3s! zJo*Z+unhpi#JO&OshTKSC|*E5i`C(^4vSM1!v>;wB^;y{0sIU7AbT8-F#o3`v<1K`iZSTo#dIZ)lr)5r#sRH zO6u}J0sTv`-BzShrP3J|+(pCSkUGckr=S>O=rK8h;(p40Z#?El{Dh6kcZ5OVbNG%u z3dQ{)(aR4hCHVaSUBFz#Hq|0{h&;>7kt`fMmLuJfuik+bg@m|R)O(;=E>fu48M0Ua z4vQZ_(G?JLl?r|T`Bj?X8HHG;Vc!77kUe?=)Q;)niO!Dz=`lQz7#7xL+puD*TNed%@1lTSk%|pIo4n7TBOCfl y5S#>+(3@kNalol_{gS>C@PHzE4a#ba@@I^)=Zvv`naBQt4bPY#{@to~{Qm$q?uAkS literal 0 HcmV?d00001 diff --git a/_vendor/certifi/cacert.pem b/_vendor/certifi/cacert.pem new file mode 100644 index 0000000..4005155 --- /dev/null +++ b/_vendor/certifi/cacert.pem @@ -0,0 +1,4708 @@ + +# Issuer: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA +# Subject: CN=GlobalSign Root CA O=GlobalSign nv-sa OU=Root CA +# Label: "GlobalSign Root CA" +# Serial: 4835703278459707669005204 +# MD5 Fingerprint: 3e:45:52:15:09:51:92:e1:b7:5d:37:9f:b1:87:29:8a +# SHA1 Fingerprint: b1:bc:96:8b:d4:f4:9d:62:2a:a8:9a:81:f2:15:01:52:a4:1d:82:9c +# SHA256 Fingerprint: eb:d4:10:40:e4:bb:3e:c7:42:c9:e3:81:d3:1e:f2:a4:1a:48:b6:68:5c:96:e7:ce:f3:c1:df:6c:d4:33:1c:99 +-----BEGIN CERTIFICATE----- +MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkG +A1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2ExEDAOBgNVBAsTB1Jv +b3QgQ0ExGzAZBgNVBAMTEkdsb2JhbFNpZ24gUm9vdCBDQTAeFw05ODA5MDExMjAw +MDBaFw0yODAxMjgxMjAwMDBaMFcxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9i +YWxTaWduIG52LXNhMRAwDgYDVQQLEwdSb290IENBMRswGQYDVQQDExJHbG9iYWxT +aWduIFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDaDuaZ +jc6j40+Kfvvxi4Mla+pIH/EqsLmVEQS98GPR4mdmzxzdzxtIK+6NiY6arymAZavp +xy0Sy6scTHAHoT0KMM0VjU/43dSMUBUc71DuxC73/OlS8pF94G3VNTCOXkNz8kHp +1Wrjsok6Vjk4bwY8iGlbKk3Fp1S4bInMm/k8yuX9ifUSPJJ4ltbcdG6TRGHRjcdG +snUOhugZitVtbNV4FpWi6cgKOOvyJBNPc1STE4U6G7weNLWLBYy5d4ux2x8gkasJ +U26Qzns3dLlwR5EiUWMWea6xrkEmCMgZK9FGqkjWZCrXgzT/LCrBbBlDSgeF59N8 +9iFo7+ryUp9/k5DPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBRge2YaRQ2XyolQL30EzTSo//z9SzANBgkqhkiG9w0B +AQUFAAOCAQEA1nPnfE920I2/7LqivjTFKDK1fPxsnCwrvQmeU79rXqoRSLblCKOz +yj1hTdNGCbM+w6DjY1Ub8rrvrTnhQ7k4o+YviiY776BQVvnGCv04zcQLcFGUl5gE +38NflNUVyRRBnMRddWQVDf9VMOyGj/8N7yy5Y0b2qvzfvGn9LhJIZJrglfCm7ymP +AbEVtQwdpf5pLGkkeB6zpxxxYu7KyJesF12KwvhHhm4qxFYxldBniYUr+WymXUad +DKqC5JlR3XC321Y9YeRq4VzW9v493kHMB65jUr9TU/Qr6cf9tveCX4XSQRjbgbME +HMUfpIBvFSDJ3gyICh3WZlXi/EjJKSZp4A== +-----END CERTIFICATE----- + +# Issuer: CN=Entrust.net Certification Authority (2048) O=Entrust.net OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)/(c) 1999 Entrust.net Limited +# Subject: CN=Entrust.net Certification Authority (2048) O=Entrust.net OU=www.entrust.net/CPS_2048 incorp. by ref. (limits liab.)/(c) 1999 Entrust.net Limited +# Label: "Entrust.net Premium 2048 Secure Server CA" +# Serial: 946069240 +# MD5 Fingerprint: ee:29:31:bc:32:7e:9a:e6:e8:b5:f7:51:b4:34:71:90 +# SHA1 Fingerprint: 50:30:06:09:1d:97:d4:f5:ae:39:f7:cb:e7:92:7d:7d:65:2d:34:31 +# SHA256 Fingerprint: 6d:c4:71:72:e0:1c:bc:b0:bf:62:58:0d:89:5f:e2:b8:ac:9a:d4:f8:73:80:1e:0c:10:b9:c8:37:d2:1e:b1:77 +-----BEGIN CERTIFICATE----- +MIIEKjCCAxKgAwIBAgIEOGPe+DANBgkqhkiG9w0BAQUFADCBtDEUMBIGA1UEChML +RW50cnVzdC5uZXQxQDA+BgNVBAsUN3d3dy5lbnRydXN0Lm5ldC9DUFNfMjA0OCBp +bmNvcnAuIGJ5IHJlZi4gKGxpbWl0cyBsaWFiLikxJTAjBgNVBAsTHChjKSAxOTk5 +IEVudHJ1c3QubmV0IExpbWl0ZWQxMzAxBgNVBAMTKkVudHJ1c3QubmV0IENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5ICgyMDQ4KTAeFw05OTEyMjQxNzUwNTFaFw0yOTA3 +MjQxNDE1MTJaMIG0MRQwEgYDVQQKEwtFbnRydXN0Lm5ldDFAMD4GA1UECxQ3d3d3 +LmVudHJ1c3QubmV0L0NQU18yMDQ4IGluY29ycC4gYnkgcmVmLiAobGltaXRzIGxp +YWIuKTElMCMGA1UECxMcKGMpIDE5OTkgRW50cnVzdC5uZXQgTGltaXRlZDEzMDEG +A1UEAxMqRW50cnVzdC5uZXQgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgKDIwNDgp +MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArU1LqRKGsuqjIAcVFmQq +K0vRvwtKTY7tgHalZ7d4QMBzQshowNtTK91euHaYNZOLGp18EzoOH1u3Hs/lJBQe +sYGpjX24zGtLA/ECDNyrpUAkAH90lKGdCCmziAv1h3edVc3kw37XamSrhRSGlVuX +MlBvPci6Zgzj/L24ScF2iUkZ/cCovYmjZy/Gn7xxGWC4LeksyZB2ZnuU4q941mVT +XTzWnLLPKQP5L6RQstRIzgUyVYr9smRMDuSYB3Xbf9+5CFVghTAp+XtIpGmG4zU/ +HoZdenoVve8AjhUiVBcAkCaTvA5JaJG/+EfTnZVCwQ5N328mz8MYIWJmQ3DW1cAH +4QIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUVeSB0RGAvtiJuQijMfmhJAkWuXAwDQYJKoZIhvcNAQEFBQADggEBADub +j1abMOdTmXx6eadNl9cZlZD7Bh/KM3xGY4+WZiT6QBshJ8rmcnPyT/4xmf3IDExo +U8aAghOY+rat2l098c5u9hURlIIM7j+VrxGrD9cv3h8Dj1csHsm7mhpElesYT6Yf +zX1XEC+bBAlahLVu2B064dae0Wx5XnkcFMXj0EyTO2U87d89vqbllRrDtRnDvV5b +u/8j72gZyxKTJ1wDLW8w0B62GqzeWvfRqqgnpv55gcR5mTNXuhKwqeBCbJPKVt7+ +bYQLCIt+jerXmCHG8+c8eS9enNFMFY3h7CI3zJpDC5fcgJCNs2ebb0gIFVbPv/Er +fF6adulZkMV8gzURZVE= +-----END CERTIFICATE----- + +# Issuer: CN=Baltimore CyberTrust Root O=Baltimore OU=CyberTrust +# Subject: CN=Baltimore CyberTrust Root O=Baltimore OU=CyberTrust +# Label: "Baltimore CyberTrust Root" +# Serial: 33554617 +# MD5 Fingerprint: ac:b6:94:a5:9c:17:e0:d7:91:52:9b:b1:97:06:a6:e4 +# SHA1 Fingerprint: d4:de:20:d0:5e:66:fc:53:fe:1a:50:88:2c:78:db:28:52:ca:e4:74 +# SHA256 Fingerprint: 16:af:57:a9:f6:76:b0:ab:12:60:95:aa:5e:ba:de:f2:2a:b3:11:19:d6:44:ac:95:cd:4b:93:db:f3:f2:6a:eb +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIEAgAAuTANBgkqhkiG9w0BAQUFADBaMQswCQYDVQQGEwJJ +RTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJlclRydXN0MSIwIAYD +VQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTAwMDUxMjE4NDYwMFoX +DTI1MDUxMjIzNTkwMFowWjELMAkGA1UEBhMCSUUxEjAQBgNVBAoTCUJhbHRpbW9y +ZTETMBEGA1UECxMKQ3liZXJUcnVzdDEiMCAGA1UEAxMZQmFsdGltb3JlIEN5YmVy +VHJ1c3QgUm9vdDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKMEuyKr +mD1X6CZymrV51Cni4eiVgLGw41uOKymaZN+hXe2wCQVt2yguzmKiYv60iNoS6zjr +IZ3AQSsBUnuId9Mcj8e6uYi1agnnc+gRQKfRzMpijS3ljwumUNKoUMMo6vWrJYeK +mpYcqWe4PwzV9/lSEy/CG9VwcPCPwBLKBsua4dnKM3p31vjsufFoREJIE9LAwqSu +XmD+tqYF/LTdB1kC1FkYmGP1pWPgkAx9XbIGevOF6uvUA65ehD5f/xXtabz5OTZy +dc93Uk3zyZAsuT3lySNTPx8kmCFcB5kpvcY67Oduhjprl3RjM71oGDHweI12v/ye +jl0qhqdNkNwnGjkCAwEAAaNFMEMwHQYDVR0OBBYEFOWdWTCCR1jMrPoIVDaGezq1 +BE3wMBIGA1UdEwEB/wQIMAYBAf8CAQMwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3 +DQEBBQUAA4IBAQCFDF2O5G9RaEIFoN27TyclhAO992T9Ldcw46QQF+vaKSm2eT92 +9hkTI7gQCvlYpNRhcL0EYWoSihfVCr3FvDB81ukMJY2GQE/szKN+OMY3EU/t3Wgx +jkzSswF07r51XgdIGn9w/xZchMB5hbgF/X++ZRGjD8ACtPhSNzkE1akxehi/oCr0 +Epn3o0WC4zxe9Z2etciefC7IpJ5OCBRLbf1wbWsaY71k5h+3zvDyny67G7fyUIhz +ksLi4xaNmjICq44Y3ekQEe5+NauQrz4wlHrQMz2nZQ/1/I6eYs9HRCwBXbsdtTLS +R9I4LtD+gdwyah617jzV/OeBHRnDJELqYzmp +-----END CERTIFICATE----- + +# Issuer: CN=Entrust Root Certification Authority O=Entrust, Inc. OU=www.entrust.net/CPS is incorporated by reference/(c) 2006 Entrust, Inc. +# Subject: CN=Entrust Root Certification Authority O=Entrust, Inc. OU=www.entrust.net/CPS is incorporated by reference/(c) 2006 Entrust, Inc. +# Label: "Entrust Root Certification Authority" +# Serial: 1164660820 +# MD5 Fingerprint: d6:a5:c3:ed:5d:dd:3e:00:c1:3d:87:92:1f:1d:3f:e4 +# SHA1 Fingerprint: b3:1e:b1:b7:40:e3:6c:84:02:da:dc:37:d4:4d:f5:d4:67:49:52:f9 +# SHA256 Fingerprint: 73:c1:76:43:4f:1b:c6:d5:ad:f4:5b:0e:76:e7:27:28:7c:8d:e5:76:16:c1:e6:e6:14:1a:2b:2c:bc:7d:8e:4c +-----BEGIN CERTIFICATE----- +MIIEkTCCA3mgAwIBAgIERWtQVDANBgkqhkiG9w0BAQUFADCBsDELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xOTA3BgNVBAsTMHd3dy5lbnRydXN0 +Lm5ldC9DUFMgaXMgaW5jb3Jwb3JhdGVkIGJ5IHJlZmVyZW5jZTEfMB0GA1UECxMW +KGMpIDIwMDYgRW50cnVzdCwgSW5jLjEtMCsGA1UEAxMkRW50cnVzdCBSb290IENl +cnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA2MTEyNzIwMjM0MloXDTI2MTEyNzIw +NTM0MlowgbAxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMTkw +NwYDVQQLEzB3d3cuZW50cnVzdC5uZXQvQ1BTIGlzIGluY29ycG9yYXRlZCBieSBy +ZWZlcmVuY2UxHzAdBgNVBAsTFihjKSAyMDA2IEVudHJ1c3QsIEluYy4xLTArBgNV +BAMTJEVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASIwDQYJ +KoZIhvcNAQEBBQADggEPADCCAQoCggEBALaVtkNC+sZtKm9I35RMOVcF7sN5EUFo +Nu3s/poBj6E4KPz3EEZmLk0eGrEaTsbRwJWIsMn/MYszA9u3g3s+IIRe7bJWKKf4 +4LlAcTfFy0cOlypowCKVYhXbR9n10Cv/gkvJrT7eTNuQgFA/CYqEAOwwCj0Yzfv9 +KlmaI5UXLEWeH25DeW0MXJj+SKfFI0dcXv1u5x609mhF0YaDW6KKjbHjKYD+JXGI +rb68j6xSlkuqUY3kEzEZ6E5Nn9uss2rVvDlUccp6en+Q3X0dgNmBu1kmwhH+5pPi +94DkZfs0Nw4pgHBNrziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOB +sDCBrTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zArBgNVHRAEJDAi +gA8yMDA2MTEyNzIwMjM0MlqBDzIwMjYxMTI3MjA1MzQyWjAfBgNVHSMEGDAWgBRo +kORnpKZTgMeGZqTx90tD+4S9bTAdBgNVHQ4EFgQUaJDkZ6SmU4DHhmak8fdLQ/uE +vW0wHQYJKoZIhvZ9B0EABBAwDhsIVjcuMTo0LjADAgSQMA0GCSqGSIb3DQEBBQUA +A4IBAQCT1DCw1wMgKtD5Y+iRDAUgqV8ZyntyTtSx29CW+1RaGSwMCPeyvIWonX9t +O1KzKtvn1ISMY/YPyyYBkVBs9F8U4pN0wBOeMDpQ47RgxRzwIkSNcUesyBrJ6Zua +AGAT/3B+XxFNSRuzFVJ7yVTav52Vr2ua2J7p8eRDjeIRRDq/r72DQnNSi6q7pynP +9WQcCk3RvKqsnyrQ/39/2n3qse0wJcGE2jTSW3iDVuycNsMm4hH2Z0kdkquM++v/ +eu6FSqdQgPCnXEqULl8FmTxSQeDNtGPPAUO6nIPcj2A781q0tHuu2guQOHXvgR1m +0vdXcDazv/wor3ElhVsT/h5/WrQ8 +-----END CERTIFICATE----- + +# Issuer: CN=AAA Certificate Services O=Comodo CA Limited +# Subject: CN=AAA Certificate Services O=Comodo CA Limited +# Label: "Comodo AAA Services root" +# Serial: 1 +# MD5 Fingerprint: 49:79:04:b0:eb:87:19:ac:47:b0:bc:11:51:9b:74:d0 +# SHA1 Fingerprint: d1:eb:23:a4:6d:17:d6:8f:d9:25:64:c2:f1:f1:60:17:64:d8:e3:49 +# SHA256 Fingerprint: d7:a7:a0:fb:5d:7e:27:31:d7:71:e9:48:4e:bc:de:f7:1d:5f:0c:3e:0a:29:48:78:2b:c8:3e:e0:ea:69:9e:f4 +-----BEGIN CERTIFICATE----- +MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEb +MBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRow +GAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDEhMB8GA1UEAwwYQUFBIENlcnRpZmlj +YXRlIFNlcnZpY2VzMB4XDTA0MDEwMTAwMDAwMFoXDTI4MTIzMTIzNTk1OVowezEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgMEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BwwHU2FsZm9yZDEaMBgGA1UECgwRQ29tb2RvIENBIExpbWl0ZWQxITAfBgNVBAMM +GEFBQSBDZXJ0aWZpY2F0ZSBTZXJ2aWNlczCCASIwDQYJKoZIhvcNAQEBBQADggEP +ADCCAQoCggEBAL5AnfRu4ep2hxxNRUSOvkbIgwadwSr+GB+O5AL686tdUIoWMQua +BtDFcCLNSS1UY8y2bmhGC1Pqy0wkwLxyTurxFa70VJoSCsN6sjNg4tqJVfMiWPPe +3M/vg4aijJRPn2jymJBGhCfHdr/jzDUsi14HZGWCwEiwqJH5YZ92IFCokcdmtet4 +YgNW8IoaE+oxox6gmf049vYnMlhvB/VruPsUK6+3qszWY19zjNoFmag4qMsXeDZR +rOme9Hg6jc8P2ULimAyrL58OAd7vn5lJ8S3frHRNG5i1R8XlKdH5kBjHYpy+g8cm +ez6KJcfA3Z3mNWgQIJ2P2N7Sw4ScDV7oL8kCAwEAAaOBwDCBvTAdBgNVHQ4EFgQU +oBEKIz6W8Qfs4q8p74Klf9AwpLQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQF +MAMBAf8wewYDVR0fBHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20v +QUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29t +b2RvLm5ldC9BQUFDZXJ0aWZpY2F0ZVNlcnZpY2VzLmNybDANBgkqhkiG9w0BAQUF +AAOCAQEACFb8AvCb6P+k+tZ7xkSAzk/ExfYAWMymtrwUSWgEdujm7l3sAg9g1o1Q +GE8mTgHj5rCl7r+8dFRBv/38ErjHT1r0iWAFf2C3BUrz9vHCv8S5dIa2LX1rzNLz +Rt0vxuBqw8M0Ayx9lt1awg6nCpnBBYurDC/zXDrPbDdVCYfeU0BsWO/8tqtlbgT2 +G9w84FoVxp7Z8VlIMCFlA2zs6SFz7JsDoeA3raAVGI/6ugLOpyypEBMs1OUIJqsi +l2D4kF501KKaU73yqWjgom7C12yxow+ev+to51byrvLjKzg6CYG1a4XXvi3tPxq3 +smPi9WIsgtRqAEFQ8TmDn5XpNpaYbg== +-----END CERTIFICATE----- + +# Issuer: CN=QuoVadis Root CA 2 O=QuoVadis Limited +# Subject: CN=QuoVadis Root CA 2 O=QuoVadis Limited +# Label: "QuoVadis Root CA 2" +# Serial: 1289 +# MD5 Fingerprint: 5e:39:7b:dd:f8:ba:ec:82:e9:ac:62:ba:0c:54:00:2b +# SHA1 Fingerprint: ca:3a:fb:cf:12:40:36:4b:44:b2:16:20:88:80:48:39:19:93:7c:f7 +# SHA256 Fingerprint: 85:a0:dd:7d:d7:20:ad:b7:ff:05:f8:3d:54:2b:20:9d:c7:ff:45:28:f7:d6:77:b1:83:89:fe:a5:e5:c4:9e:86 +-----BEGIN CERTIFICATE----- +MIIFtzCCA5+gAwIBAgICBQkwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMjAeFw0wNjExMjQxODI3MDBaFw0zMTExMjQxODIzMzNaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCa +GMpLlA0ALa8DKYrwD4HIrkwZhR0In6spRIXzL4GtMh6QRr+jhiYaHv5+HBg6XJxg +Fyo6dIMzMH1hVBHL7avg5tKifvVrbxi3Cgst/ek+7wrGsxDp3MJGF/hd/aTa/55J +WpzmM+Yklvc/ulsrHHo1wtZn/qtmUIttKGAr79dgw8eTvI02kfN/+NsRE8Scd3bB +rrcCaoF6qUWD4gXmuVbBlDePSHFjIuwXZQeVikvfj8ZaCuWw419eaxGrDPmF60Tp ++ARz8un+XJiM9XOva7R+zdRcAitMOeGylZUtQofX1bOQQ7dsE/He3fbE+Ik/0XX1 +ksOR1YqI0JDs3G3eicJlcZaLDQP9nL9bFqyS2+r+eXyt66/3FsvbzSUr5R/7mp/i +Ucw6UwxI5g69ybR2BlLmEROFcmMDBOAENisgGQLodKcftslWZvB1JdxnwQ5hYIiz +PtGo/KPaHbDRsSNU30R2be1B2MGyIrZTHN81Hdyhdyox5C315eXbyOD/5YDXC2Og +/zOhD7osFRXql7PSorW+8oyWHhqPHWykYTe5hnMz15eWniN9gqRMgeKh0bpnX5UH +oycR7hYQe7xFSkyyBNKr79X9DFHOUGoIMfmR2gyPZFwDwzqLID9ujWc9Otb+fVuI +yV77zGHcizN300QyNQliBJIWENieJ0f7OyHj+OsdWwIDAQABo4GwMIGtMA8GA1Ud +EwEB/wQFMAMBAf8wCwYDVR0PBAQDAgEGMB0GA1UdDgQWBBQahGK8SEwzJQTU7tD2 +A8QZRtGUazBuBgNVHSMEZzBlgBQahGK8SEwzJQTU7tD2A8QZRtGUa6FJpEcwRTEL +MAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMT +ElF1b1ZhZGlzIFJvb3QgQ0EgMoICBQkwDQYJKoZIhvcNAQEFBQADggIBAD4KFk2f +BluornFdLwUvZ+YTRYPENvbzwCYMDbVHZF34tHLJRqUDGCdViXh9duqWNIAXINzn +g/iN/Ae42l9NLmeyhP3ZRPx3UIHmfLTJDQtyU/h2BwdBR5YM++CCJpNVjP4iH2Bl +fF/nJrP3MpCYUNQ3cVX2kiF495V5+vgtJodmVjB3pjd4M1IQWK4/YY7yarHvGH5K +WWPKjaJW1acvvFYfzznB4vsKqBUsfU16Y8Zsl0Q80m/DShcK+JDSV6IZUaUtl0Ha +B0+pUNqQjZRG4T7wlP0QADj1O+hA4bRuVhogzG9Yje0uRY/W6ZM/57Es3zrWIozc +hLsib9D45MY56QSIPMO661V6bYCZJPVsAfv4l7CUW+v90m/xd2gNNWQjrLhVoQPR +TUIZ3Ph1WVaj+ahJefivDrkRoHy3au000LYmYjgahwz46P0u05B/B5EqHdZ+XIWD +mbA4CD/pXvk1B+TJYm5Xf6dQlfe6yJvmjqIBxdZmv3lh8zwc4bmCXF2gw+nYSL0Z +ohEUGW6yhhtoPkg3Goi3XZZenMfvJ2II4pEZXNLxId26F0KCl3GBUzGpn/Z9Yr9y +4aOTHcyKJloJONDO1w2AFrR4pTqHTI2KpdVGl/IsELm8VCLAAVBpQ570su9t+Oza +8eOx79+Rj1QqCyXBJhnEUhAFZdWCEOrCMc0u +-----END CERTIFICATE----- + +# Issuer: CN=QuoVadis Root CA 3 O=QuoVadis Limited +# Subject: CN=QuoVadis Root CA 3 O=QuoVadis Limited +# Label: "QuoVadis Root CA 3" +# Serial: 1478 +# MD5 Fingerprint: 31:85:3c:62:94:97:63:b9:aa:fd:89:4e:af:6f:e0:cf +# SHA1 Fingerprint: 1f:49:14:f7:d8:74:95:1d:dd:ae:02:c0:be:fd:3a:2d:82:75:51:85 +# SHA256 Fingerprint: 18:f1:fc:7f:20:5d:f8:ad:dd:eb:7f:e0:07:dd:57:e3:af:37:5a:9c:4d:8d:73:54:6b:f4:f1:fe:d1:e1:8d:35 +-----BEGIN CERTIFICATE----- +MIIGnTCCBIWgAwIBAgICBcYwDQYJKoZIhvcNAQEFBQAwRTELMAkGA1UEBhMCQk0x +GTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxGzAZBgNVBAMTElF1b1ZhZGlzIFJv +b3QgQ0EgMzAeFw0wNjExMjQxOTExMjNaFw0zMTExMjQxOTA2NDRaMEUxCzAJBgNV +BAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBMaW1pdGVkMRswGQYDVQQDExJRdW9W +YWRpcyBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDM +V0IWVJzmmNPTTe7+7cefQzlKZbPoFog02w1ZkXTPkrgEQK0CSzGrvI2RaNggDhoB +4hp7Thdd4oq3P5kazethq8Jlph+3t723j/z9cI8LoGe+AaJZz3HmDyl2/7FWeUUr +H556VOijKTVopAFPD6QuN+8bv+OPEKhyq1hX51SGyMnzW9os2l2ObjyjPtr7guXd +8lyyBTNvijbO0BNO/79KDDRMpsMhvVAEVeuxu537RR5kFd5VAYwCdrXLoT9Cabwv +vWhDFlaJKjdhkf2mrk7AyxRllDdLkgbvBNDInIjbC3uBr7E9KsRlOni27tyAsdLT +mZw67mtaa7ONt9XOnMK+pUsvFrGeaDsGb659n/je7Mwpp5ijJUMv7/FfJuGITfhe +btfZFG4ZM2mnO4SJk8RTVROhUXhA+LjJou57ulJCg54U7QVSWllWp5f8nT8KKdjc +T5EOE7zelaTfi5m+rJsziO+1ga8bxiJTyPbH7pcUsMV8eFLI8M5ud2CEpukqdiDt +WAEXMJPpGovgc2PZapKUSU60rUqFxKMiMPwJ7Wgic6aIDFUhWMXhOp8q3crhkODZ +c6tsgLjoC2SToJyMGf+z0gzskSaHirOi4XCPLArlzW1oUevaPwV/izLmE1xr/l9A +4iLItLRkT9a6fUg+qGkM17uGcclzuD87nSVL2v9A6wIDAQABo4IBlTCCAZEwDwYD +VR0TAQH/BAUwAwEB/zCB4QYDVR0gBIHZMIHWMIHTBgkrBgEEAb5YAAMwgcUwgZMG +CCsGAQUFBwICMIGGGoGDQW55IHVzZSBvZiB0aGlzIENlcnRpZmljYXRlIGNvbnN0 +aXR1dGVzIGFjY2VwdGFuY2Ugb2YgdGhlIFF1b1ZhZGlzIFJvb3QgQ0EgMyBDZXJ0 +aWZpY2F0ZSBQb2xpY3kgLyBDZXJ0aWZpY2F0aW9uIFByYWN0aWNlIFN0YXRlbWVu +dC4wLQYIKwYBBQUHAgEWIWh0dHA6Ly93d3cucXVvdmFkaXNnbG9iYWwuY29tL2Nw +czALBgNVHQ8EBAMCAQYwHQYDVR0OBBYEFPLAE+CCQz777i9nMpY1XNu4ywLQMG4G +A1UdIwRnMGWAFPLAE+CCQz777i9nMpY1XNu4ywLQoUmkRzBFMQswCQYDVQQGEwJC +TTEZMBcGA1UEChMQUXVvVmFkaXMgTGltaXRlZDEbMBkGA1UEAxMSUXVvVmFkaXMg +Um9vdCBDQSAzggIFxjANBgkqhkiG9w0BAQUFAAOCAgEAT62gLEz6wPJv92ZVqyM0 +7ucp2sNbtrCD2dDQ4iH782CnO11gUyeim/YIIirnv6By5ZwkajGxkHon24QRiSem +d1o417+shvzuXYO8BsbRd2sPbSQvS3pspweWyuOEn62Iix2rFo1bZhfZFvSLgNLd ++LJ2w/w4E6oM3kJpK27zPOuAJ9v1pkQNn1pVWQvVDVJIxa6f8i+AxeoyUDUSly7B +4f/xI4hROJ/yZlZ25w9Rl6VSDE1JUZU2Pb+iSwwQHYaZTKrzchGT5Or2m9qoXadN +t54CrnMAyNojA+j56hl0YgCUyyIgvpSnWbWCar6ZeXqp8kokUvd0/bpO5qgdAm6x +DYBEwa7TIzdfu4V8K5Iu6H6li92Z4b8nby1dqnuH/grdS/yO9SbkbnBCbjPsMZ57 +k8HkyWkaPcBrTiJt7qtYTcbQQcEr6k8Sh17rRdhs9ZgC06DYVYoGmRmioHfRMJ6s +zHXug/WwYjnPbFfiTNKRCw51KBuav/0aQ/HKd/s7j2G4aSgWQgRecCocIdiP4b0j +Wy10QJLZYxkNc91pvGJHvOB0K7Lrfb5BG7XARsWhIstfTsEokt4YutUqKLsRixeT +mJlglFwjz1onl14LBQaTNx47aTbrqZ5hHY8y2o4M1nQ+ewkk2gF3R8Q7zTSMmfXK +4SVhM7JZG+Ju1zdXtg2pEto= +-----END CERTIFICATE----- + +# Issuer: O=SECOM Trust.net OU=Security Communication RootCA1 +# Subject: O=SECOM Trust.net OU=Security Communication RootCA1 +# Label: "Security Communication Root CA" +# Serial: 0 +# MD5 Fingerprint: f1:bc:63:6a:54:e0:b5:27:f5:cd:e7:1a:e3:4d:6e:4a +# SHA1 Fingerprint: 36:b1:2b:49:f9:81:9e:d7:4c:9e:bc:38:0f:c6:56:8f:5d:ac:b2:f7 +# SHA256 Fingerprint: e7:5e:72:ed:9f:56:0e:ec:6e:b4:80:00:73:a4:3f:c3:ad:19:19:5a:39:22:82:01:78:95:97:4a:99:02:6b:6c +-----BEGIN CERTIFICATE----- +MIIDWjCCAkKgAwIBAgIBADANBgkqhkiG9w0BAQUFADBQMQswCQYDVQQGEwJKUDEY +MBYGA1UEChMPU0VDT00gVHJ1c3QubmV0MScwJQYDVQQLEx5TZWN1cml0eSBDb21t +dW5pY2F0aW9uIFJvb3RDQTEwHhcNMDMwOTMwMDQyMDQ5WhcNMjMwOTMwMDQyMDQ5 +WjBQMQswCQYDVQQGEwJKUDEYMBYGA1UEChMPU0VDT00gVHJ1c3QubmV0MScwJQYD +VQQLEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQCzs/5/022x7xZ8V6UMbXaKL0u/ZPtM7orw8yl8 +9f/uKuDp6bpbZCKamm8sOiZpUQWZJtzVHGpxxpp9Hp3dfGzGjGdnSj74cbAZJ6kJ +DKaVv0uMDPpVmDvY6CKhS3E4eayXkmmziX7qIWgGmBSWh9JhNrxtJ1aeV+7AwFb9 +Ms+k2Y7CI9eNqPPYJayX5HA49LY6tJ07lyZDo6G8SVlyTCMwhwFY9k6+HGhWZq/N +QV3Is00qVUarH9oe4kA92819uZKAnDfdDJZkndwi92SL32HeFZRSFaB9UslLqCHJ +xrHty8OVYNEP8Ktw+N/LTX7s1vqr2b1/VPKl6Xn62dZ2JChzAgMBAAGjPzA9MB0G +A1UdDgQWBBSgc0mZaNyFW2XjmygvV5+9M7wHSDALBgNVHQ8EBAMCAQYwDwYDVR0T +AQH/BAUwAwEB/zANBgkqhkiG9w0BAQUFAAOCAQEAaECpqLvkT115swW1F7NgE+vG +kl3g0dNq/vu+m22/xwVtWSDEHPC32oRYAmP6SBbvT6UL90qY8j+eG61Ha2POCEfr +Uj94nK9NrvjVT8+amCoQQTlSxN3Zmw7vkwGusi7KaEIkQmywszo+zenaSMQVy+n5 +Bw+SUEmK3TGXX8npN6o7WWWXlDLJs58+OmJYxUmtYg5xpTKqL8aJdkNAExNnPaJU +JRDL8Try2frbSVa7pv6nQTXD4IhhyYjH3zYQIphZ6rBK+1YWc26sTfcioU+tHXot +RSflMMFe8toTyyVCUZVHA4xsIcx0Qu1T/zOLjw9XARYvz6buyXAiFL39vmwLAw== +-----END CERTIFICATE----- + +# Issuer: CN=XRamp Global Certification Authority O=XRamp Security Services Inc OU=www.xrampsecurity.com +# Subject: CN=XRamp Global Certification Authority O=XRamp Security Services Inc OU=www.xrampsecurity.com +# Label: "XRamp Global CA Root" +# Serial: 107108908803651509692980124233745014957 +# MD5 Fingerprint: a1:0b:44:b3:ca:10:d8:00:6e:9d:0f:d8:0f:92:0a:d1 +# SHA1 Fingerprint: b8:01:86:d1:eb:9c:86:a5:41:04:cf:30:54:f3:4c:52:b7:e5:58:c6 +# SHA256 Fingerprint: ce:cd:dc:90:50:99:d8:da:df:c5:b1:d2:09:b7:37:cb:e2:c1:8c:fb:2c:10:c0:ff:0b:cf:0d:32:86:fc:1a:a2 +-----BEGIN CERTIFICATE----- +MIIEMDCCAxigAwIBAgIQUJRs7Bjq1ZxN1ZfvdY+grTANBgkqhkiG9w0BAQUFADCB +gjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3dy54cmFtcHNlY3VyaXR5LmNvbTEk +MCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2VydmljZXMgSW5jMS0wKwYDVQQDEyRY +UmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQxMTAxMTcx +NDA0WhcNMzUwMTAxMDUzNzE5WjCBgjELMAkGA1UEBhMCVVMxHjAcBgNVBAsTFXd3 +dy54cmFtcHNlY3VyaXR5LmNvbTEkMCIGA1UEChMbWFJhbXAgU2VjdXJpdHkgU2Vy +dmljZXMgSW5jMS0wKwYDVQQDEyRYUmFtcCBHbG9iYWwgQ2VydGlmaWNhdGlvbiBB +dXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCYJB69FbS6 +38eMpSe2OAtp87ZOqCwuIR1cRN8hXX4jdP5efrRKt6atH67gBhbim1vZZ3RrXYCP +KZ2GG9mcDZhtdhAoWORlsH9KmHmf4MMxfoArtYzAQDsRhtDLooY2YKTVMIJt2W7Q +DxIEM5dfT2Fa8OT5kavnHTu86M/0ay00fOJIYRyO82FEzG+gSqmUsE3a56k0enI4 +qEHMPJQRfevIpoy3hsvKMzvZPTeL+3o+hiznc9cKV6xkmxnr9A8ECIqsAxcZZPRa +JSKNNCyy9mgdEm3Tih4U2sSPpuIjhdV6Db1q4Ons7Be7QhtnqiXtRYMh/MHJfNVi +PvryxS3T/dRlAgMBAAGjgZ8wgZwwEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0P +BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMZPoj0GY4QJnM5i5ASs +jVy16bYbMDYGA1UdHwQvMC0wK6ApoCeGJWh0dHA6Ly9jcmwueHJhbXBzZWN1cml0 +eS5jb20vWEdDQS5jcmwwEAYJKwYBBAGCNxUBBAMCAQEwDQYJKoZIhvcNAQEFBQAD +ggEBAJEVOQMBG2f7Shz5CmBbodpNl2L5JFMn14JkTpAuw0kbK5rc/Kh4ZzXxHfAR +vbdI4xD2Dd8/0sm2qlWkSLoC295ZLhVbO50WfUfXN+pfTXYSNrsf16GBBEYgoyxt +qZ4Bfj8pzgCT3/3JknOJiWSe5yvkHJEs0rnOfc5vMZnT5r7SHpDwCRR5XCOrTdLa +IR9NmXmd4c8nnxCbHIgNsIpkQTG4DmyQJKSbXHGPurt+HBvbaoAPIbzp26a3QPSy +i6mx5O+aGtA9aZnuqCij4Tyz8LIRnM98QObd50N9otg6tamN8jSZxNQQ4Qb9CYQQ +O+7ETPTsJ3xCwnR8gooJybQDJbw= +-----END CERTIFICATE----- + +# Issuer: O=The Go Daddy Group, Inc. OU=Go Daddy Class 2 Certification Authority +# Subject: O=The Go Daddy Group, Inc. OU=Go Daddy Class 2 Certification Authority +# Label: "Go Daddy Class 2 CA" +# Serial: 0 +# MD5 Fingerprint: 91:de:06:25:ab:da:fd:32:17:0c:bb:25:17:2a:84:67 +# SHA1 Fingerprint: 27:96:ba:e6:3f:18:01:e2:77:26:1b:a0:d7:77:70:02:8f:20:ee:e4 +# SHA256 Fingerprint: c3:84:6b:f2:4b:9e:93:ca:64:27:4c:0e:c6:7c:1e:cc:5e:02:4f:fc:ac:d2:d7:40:19:35:0e:81:fe:54:6a:e4 +-----BEGIN CERTIFICATE----- +MIIEADCCAuigAwIBAgIBADANBgkqhkiG9w0BAQUFADBjMQswCQYDVQQGEwJVUzEh +MB8GA1UEChMYVGhlIEdvIERhZGR5IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBE +YWRkeSBDbGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTA0MDYyOTE3 +MDYyMFoXDTM0MDYyOTE3MDYyMFowYzELMAkGA1UEBhMCVVMxITAfBgNVBAoTGFRo +ZSBHbyBEYWRkeSBHcm91cCwgSW5jLjExMC8GA1UECxMoR28gRGFkZHkgQ2xhc3Mg +MiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTCCASAwDQYJKoZIhvcNAQEBBQADggEN +ADCCAQgCggEBAN6d1+pXGEmhW+vXX0iG6r7d/+TvZxz0ZWizV3GgXne77ZtJ6XCA +PVYYYwhv2vLM0D9/AlQiVBDYsoHUwHU9S3/Hd8M+eKsaA7Ugay9qK7HFiH7Eux6w +wdhFJ2+qN1j3hybX2C32qRe3H3I2TqYXP2WYktsqbl2i/ojgC95/5Y0V4evLOtXi +EqITLdiOr18SPaAIBQi2XKVlOARFmR6jYGB0xUGlcmIbYsUfb18aQr4CUWWoriMY +avx4A6lNf4DD+qta/KFApMoZFv6yyO9ecw3ud72a9nmYvLEHZ6IVDd2gWMZEewo+ +YihfukEHU1jPEX44dMX4/7VpkI+EdOqXG68CAQOjgcAwgb0wHQYDVR0OBBYEFNLE +sNKR1EwRcbNhyz2h/t2oatTjMIGNBgNVHSMEgYUwgYKAFNLEsNKR1EwRcbNhyz2h +/t2oatTjoWekZTBjMQswCQYDVQQGEwJVUzEhMB8GA1UEChMYVGhlIEdvIERhZGR5 +IEdyb3VwLCBJbmMuMTEwLwYDVQQLEyhHbyBEYWRkeSBDbGFzcyAyIENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQEFBQAD +ggEBADJL87LKPpH8EsahB4yOd6AzBhRckB4Y9wimPQoZ+YeAEW5p5JYXMP80kWNy +OO7MHAGjHZQopDH2esRU1/blMVgDoszOYtuURXO1v0XJJLXVggKtI3lpjbi2Tc7P +TMozI+gciKqdi0FuFskg5YmezTvacPd+mSYgFFQlq25zheabIZ0KbIIOqPjCDPoQ +HmyW74cNxA9hi63ugyuV+I6ShHI56yDqg+2DzZduCLzrTia2cyvk0/ZM/iZx4mER +dEr/VxqHD3VILs9RaRegAhJhldXRQLIQTO7ErBBDpqWeCtWVYpoNz4iCxTIM5Cuf +ReYNnyicsbkqWletNw+vHX/bvZ8= +-----END CERTIFICATE----- + +# Issuer: O=Starfield Technologies, Inc. OU=Starfield Class 2 Certification Authority +# Subject: O=Starfield Technologies, Inc. OU=Starfield Class 2 Certification Authority +# Label: "Starfield Class 2 CA" +# Serial: 0 +# MD5 Fingerprint: 32:4a:4b:bb:c8:63:69:9b:be:74:9a:c6:dd:1d:46:24 +# SHA1 Fingerprint: ad:7e:1c:28:b0:64:ef:8f:60:03:40:20:14:c3:d0:e3:37:0e:b5:8a +# SHA256 Fingerprint: 14:65:fa:20:53:97:b8:76:fa:a6:f0:a9:95:8e:55:90:e4:0f:cc:7f:aa:4f:b7:c2:c8:67:75:21:fb:5f:b6:58 +-----BEGIN CERTIFICATE----- +MIIEDzCCAvegAwIBAgIBADANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzEl +MCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMp +U3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDQw +NjI5MTczOTE2WhcNMzQwNjI5MTczOTE2WjBoMQswCQYDVQQGEwJVUzElMCMGA1UE +ChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMpU3RhcmZp +ZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwggEgMA0GCSqGSIb3 +DQEBAQUAA4IBDQAwggEIAoIBAQC3Msj+6XGmBIWtDBFk385N78gDGIc/oav7PKaf +8MOh2tTYbitTkPskpD6E8J7oX+zlJ0T1KKY/e97gKvDIr1MvnsoFAZMej2YcOadN ++lq2cwQlZut3f+dZxkqZJRRU6ybH838Z1TBwj6+wRir/resp7defqgSHo9T5iaU0 +X9tDkYI22WY8sbi5gv2cOj4QyDvvBmVmepsZGD3/cVE8MC5fvj13c7JdBmzDI1aa +K4UmkhynArPkPw2vCHmCuDY96pzTNbO8acr1zJ3o/WSNF4Azbl5KXZnJHoe0nRrA +1W4TNSNe35tfPe/W93bC6j67eA0cQmdrBNj41tpvi/JEoAGrAgEDo4HFMIHCMB0G +A1UdDgQWBBS/X7fRzt0fhvRbVazc1xDCDqmI5zCBkgYDVR0jBIGKMIGHgBS/X7fR +zt0fhvRbVazc1xDCDqmI56FspGowaDELMAkGA1UEBhMCVVMxJTAjBgNVBAoTHFN0 +YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAsTKVN0YXJmaWVsZCBD +bGFzcyAyIENlcnRpZmljYXRpb24gQXV0aG9yaXR5ggEAMAwGA1UdEwQFMAMBAf8w +DQYJKoZIhvcNAQEFBQADggEBAAWdP4id0ckaVaGsafPzWdqbAYcaT1epoXkJKtv3 +L7IezMdeatiDh6GX70k1PncGQVhiv45YuApnP+yz3SFmH8lU+nLMPUxA2IGvd56D +eruix/U0F47ZEUD0/CwqTRV/p2JdLiXTAAsgGh1o+Re49L2L7ShZ3U0WixeDyLJl +xy16paq8U4Zt3VekyvggQQto8PT7dL5WXXp59fkdheMtlb71cZBDzI0fmgAKhynp +VSJYACPq4xJDKVtHCN2MQWplBqjlIapBtJUhlbl90TSrE9atvNziPTnNvT51cKEY +WQPJIrSPnNVeKtelttQKbfi3QBFGmh95DmK/D5fs4C8fF5Q= +-----END CERTIFICATE----- + +# Issuer: CN=DigiCert Assured ID Root CA O=DigiCert Inc OU=www.digicert.com +# Subject: CN=DigiCert Assured ID Root CA O=DigiCert Inc OU=www.digicert.com +# Label: "DigiCert Assured ID Root CA" +# Serial: 17154717934120587862167794914071425081 +# MD5 Fingerprint: 87:ce:0b:7b:2a:0e:49:00:e1:58:71:9b:37:a8:93:72 +# SHA1 Fingerprint: 05:63:b8:63:0d:62:d7:5a:bb:c8:ab:1e:4b:df:b5:a8:99:b2:4d:43 +# SHA256 Fingerprint: 3e:90:99:b5:01:5e:8f:48:6c:00:bc:ea:9d:11:1e:e7:21:fa:ba:35:5a:89:bc:f1:df:69:56:1e:3d:c6:32:5c +-----BEGIN CERTIFICATE----- +MIIDtzCCAp+gAwIBAgIQDOfg5RfYRv6P5WD8G/AwOTANBgkqhkiG9w0BAQUFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgQ0EwHhcNMDYxMTEwMDAwMDAwWhcNMzExMTEwMDAwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgQ0EwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtDhXO5EOAXLGH87dg+XESpa7c +JpSIqvTO9SA5KFhgDPiA2qkVlTJhPLWxKISKityfCgyDF3qPkKyK53lTXDGEKvYP +mDI2dsze3Tyoou9q+yHyUmHfnyDXH+Kx2f4YZNISW1/5WBg1vEfNoTb5a3/UsDg+ +wRvDjDPZ2C8Y/igPs6eD1sNuRMBhNZYW/lmci3Zt1/GiSw0r/wty2p5g0I6QNcZ4 +VYcgoc/lbQrISXwxmDNsIumH0DJaoroTghHtORedmTpyoeb6pNnVFzF1roV9Iq4/ +AUaG9ih5yLHa5FcXxH4cDrC0kqZWs72yl+2qp/C3xag/lRbQ/6GW6whfGHdPAgMB +AAGjYzBhMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBRF66Kv9JLLgjEtUYunpyGd823IDzAfBgNVHSMEGDAWgBRF66Kv9JLLgjEtUYun +pyGd823IDzANBgkqhkiG9w0BAQUFAAOCAQEAog683+Lt8ONyc3pklL/3cmbYMuRC +dWKuh+vy1dneVrOfzM4UKLkNl2BcEkxY5NM9g0lFWJc1aRqoR+pWxnmrEthngYTf +fwk8lOa4JiwgvT2zKIn3X/8i4peEH+ll74fg38FnSbNd67IJKusm7Xi+fT8r87cm +NW1fiQG2SVufAQWbqz0lwcy2f8Lxb4bG+mRo64EtlOtCt/qMHt1i8b5QZ7dsvfPx +H2sMNgcWfzd8qVttevESRmCD1ycEvkvOl77DZypoEd+A5wwzZr8TDRRu838fYxAe ++o0bJW1sj6W3YQGx0qMmoRBxna3iw/nDmVG3KwcIzi7mULKn+gpFL6Lw8g== +-----END CERTIFICATE----- + +# Issuer: CN=DigiCert Global Root CA O=DigiCert Inc OU=www.digicert.com +# Subject: CN=DigiCert Global Root CA O=DigiCert Inc OU=www.digicert.com +# Label: "DigiCert Global Root CA" +# Serial: 10944719598952040374951832963794454346 +# MD5 Fingerprint: 79:e4:a9:84:0d:7d:3a:96:d7:c0:4f:e2:43:4c:89:2e +# SHA1 Fingerprint: a8:98:5d:3a:65:e5:e5:c4:b2:d7:d6:6d:40:c6:dd:2f:b1:9c:54:36 +# SHA256 Fingerprint: 43:48:a0:e9:44:4c:78:cb:26:5e:05:8d:5e:89:44:b4:d8:4f:96:62:bd:26:db:25:7f:89:34:a4:43:c7:01:61 +-----BEGIN CERTIFICATE----- +MIIDrzCCApegAwIBAgIQCDvgVpBCRrGhdWrJWZHHSjANBgkqhkiG9w0BAQUFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBD +QTAeFw0wNjExMTAwMDAwMDBaFw0zMTExMTAwMDAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IENBMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEA4jvhEXLeqKTTo1eqUKKPC3eQyaKl7hLOllsB +CSDMAZOnTjC3U/dDxGkAV53ijSLdhwZAAIEJzs4bg7/fzTtxRuLWZscFs3YnFo97 +nh6Vfe63SKMI2tavegw5BmV/Sl0fvBf4q77uKNd0f3p4mVmFaG5cIzJLv07A6Fpt +43C/dxC//AH2hdmoRBBYMql1GNXRor5H4idq9Joz+EkIYIvUX7Q6hL+hqkpMfT7P +T19sdl6gSzeRntwi5m3OFBqOasv+zbMUZBfHWymeMr/y7vrTC0LUq7dBMtoM1O/4 +gdW7jVg/tRvoSSiicNoxBN33shbyTApOB6jtSj1etX+jkMOvJwIDAQABo2MwYTAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUA95QNVbR +TLtm8KPiGxvDl7I90VUwHwYDVR0jBBgwFoAUA95QNVbRTLtm8KPiGxvDl7I90VUw +DQYJKoZIhvcNAQEFBQADggEBAMucN6pIExIK+t1EnE9SsPTfrgT1eXkIoyQY/Esr +hMAtudXH/vTBH1jLuG2cenTnmCmrEbXjcKChzUyImZOMkXDiqw8cvpOp/2PV5Adg +06O/nVsJ8dWO41P0jmP6P6fbtGbfYmbW0W5BjfIttep3Sp+dWOIrWcBAI+0tKIJF +PnlUkiaY4IBIqDfv8NZ5YBberOgOzW6sRBc4L0na4UU+Krk2U886UAb3LujEV0ls +YSEY1QSteDwsOoBrp+uvFRTp2InBuThs4pFsiv9kuXclVzDAGySj4dzp30d8tbQk +CAUw7C29C79Fv1C5qfPrmAESrciIxpg0X40KPMbp1ZWVbd4= +-----END CERTIFICATE----- + +# Issuer: CN=DigiCert High Assurance EV Root CA O=DigiCert Inc OU=www.digicert.com +# Subject: CN=DigiCert High Assurance EV Root CA O=DigiCert Inc OU=www.digicert.com +# Label: "DigiCert High Assurance EV Root CA" +# Serial: 3553400076410547919724730734378100087 +# MD5 Fingerprint: d4:74:de:57:5c:39:b2:d3:9c:85:83:c5:c0:65:49:8a +# SHA1 Fingerprint: 5f:b7:ee:06:33:e2:59:db:ad:0c:4c:9a:e6:d3:8f:1a:61:c7:dc:25 +# SHA256 Fingerprint: 74:31:e5:f4:c3:c1:ce:46:90:77:4f:0b:61:e0:54:40:88:3b:a9:a0:1e:d0:0b:a6:ab:d7:80:6e:d3:b1:18:cf +-----BEGIN CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIQAqxcJmoLQJuPC3nyrkYldzANBgkqhkiG9w0BAQUFADBs +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSswKQYDVQQDEyJEaWdpQ2VydCBIaWdoIEFzc3VyYW5j +ZSBFViBSb290IENBMB4XDTA2MTExMDAwMDAwMFoXDTMxMTExMDAwMDAwMFowbDEL +MAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQd3d3 +LmRpZ2ljZXJ0LmNvbTErMCkGA1UEAxMiRGlnaUNlcnQgSGlnaCBBc3N1cmFuY2Ug +RVYgUm9vdCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbM5XPm ++9S75S0tMqbf5YE/yc0lSbZxKsPVlDRnogocsF9ppkCxxLeyj9CYpKlBWTrT3JTW +PNt0OKRKzE0lgvdKpVMSOO7zSW1xkX5jtqumX8OkhPhPYlG++MXs2ziS4wblCJEM +xChBVfvLWokVfnHoNb9Ncgk9vjo4UFt3MRuNs8ckRZqnrG0AFFoEt7oT61EKmEFB +Ik5lYYeBQVCmeVyJ3hlKV9Uu5l0cUyx+mM0aBhakaHPQNAQTXKFx01p8VdteZOE3 +hzBWBOURtCmAEvF5OYiiAhF8J2a3iLd48soKqDirCmTCv2ZdlYTBoSUeh10aUAsg +EsxBu24LUTi4S8sCAwEAAaNjMGEwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFLE+w2kD+L9HAdSYJhoIAu9jZCvDMB8GA1UdIwQYMBaA +FLE+w2kD+L9HAdSYJhoIAu9jZCvDMA0GCSqGSIb3DQEBBQUAA4IBAQAcGgaX3Nec +nzyIZgYIVyHbIUf4KmeqvxgydkAQV8GK83rZEWWONfqe/EW1ntlMMUu4kehDLI6z +eM7b41N5cdblIZQB2lWHmiRk9opmzN6cN82oNLFpmyPInngiK3BD41VHMWEZ71jF +hS9OMPagMRYjyOfiZRYzy78aG6A9+MpeizGLYAiJLQwGXFK3xPkKmNEVX58Svnw2 +Yzi9RKR/5CYrCsSXaQ3pjOLAEFe4yHYSkVXySGnYvCoCWw9E1CAx2/S6cCZdkGCe +vEsXCS+0yx5DaMkHJ8HSXPfqIbloEpw8nL+e/IBcm2PN7EeqJSdnoDfzAIJ9VNep ++OkuE6N36B9K +-----END CERTIFICATE----- + +# Issuer: CN=SwissSign Gold CA - G2 O=SwissSign AG +# Subject: CN=SwissSign Gold CA - G2 O=SwissSign AG +# Label: "SwissSign Gold CA - G2" +# Serial: 13492815561806991280 +# MD5 Fingerprint: 24:77:d9:a8:91:d1:3b:fa:88:2d:c2:ff:f8:cd:33:93 +# SHA1 Fingerprint: d8:c5:38:8a:b7:30:1b:1b:6e:d4:7a:e6:45:25:3a:6f:9f:1a:27:61 +# SHA256 Fingerprint: 62:dd:0b:e9:b9:f5:0a:16:3e:a0:f8:e7:5c:05:3b:1e:ca:57:ea:55:c8:68:8f:64:7c:68:81:f2:c8:35:7b:95 +-----BEGIN CERTIFICATE----- +MIIFujCCA6KgAwIBAgIJALtAHEP1Xk+wMA0GCSqGSIb3DQEBBQUAMEUxCzAJBgNV +BAYTAkNIMRUwEwYDVQQKEwxTd2lzc1NpZ24gQUcxHzAdBgNVBAMTFlN3aXNzU2ln +biBHb2xkIENBIC0gRzIwHhcNMDYxMDI1MDgzMDM1WhcNMzYxMDI1MDgzMDM1WjBF +MQswCQYDVQQGEwJDSDEVMBMGA1UEChMMU3dpc3NTaWduIEFHMR8wHQYDVQQDExZT +d2lzc1NpZ24gR29sZCBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEAr+TufoskDhJuqVAtFkQ7kpJcyrhdhJJCEyq8ZVeCQD5XJM1QiyUqt2/8 +76LQwB8CJEoTlo8jE+YoWACjR8cGp4QjK7u9lit/VcyLwVcfDmJlD909Vopz2q5+ +bbqBHH5CjCA12UNNhPqE21Is8w4ndwtrvxEvcnifLtg+5hg3Wipy+dpikJKVyh+c +6bM8K8vzARO/Ws/BtQpgvd21mWRTuKCWs2/iJneRjOBiEAKfNA+k1ZIzUd6+jbqE +emA8atufK+ze3gE/bk3lUIbLtK/tREDFylqM2tIrfKjuvqblCqoOpd8FUrdVxyJd +MmqXl2MT28nbeTZ7hTpKxVKJ+STnnXepgv9VHKVxaSvRAiTysybUa9oEVeXBCsdt +MDeQKuSeFDNeFhdVxVu1yzSJkvGdJo+hB9TGsnhQ2wwMC3wLjEHXuendjIj3o02y +MszYF9rNt85mndT9Xv+9lz4pded+p2JYryU0pUHHPbwNUMoDAw8IWh+Vc3hiv69y +FGkOpeUDDniOJihC8AcLYiAQZzlG+qkDzAQ4embvIIO1jEpWjpEA/I5cgt6IoMPi +aG59je883WX0XaxR7ySArqpWl2/5rX3aYT+YdzylkbYcjCbaZaIJbcHiVOO5ykxM +gI93e2CaHt+28kgeDrpOVG2Y4OGiGqJ3UM/EY5LsRxmd6+ZrzsECAwEAAaOBrDCB +qTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUWyV7 +lqRlUX64OfPAeGZe6Drn8O4wHwYDVR0jBBgwFoAUWyV7lqRlUX64OfPAeGZe6Drn +8O4wRgYDVR0gBD8wPTA7BglghXQBWQECAQEwLjAsBggrBgEFBQcCARYgaHR0cDov +L3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIBACe6 +45R88a7A3hfm5djV9VSwg/S7zV4Fe0+fdWavPOhWfvxyeDgD2StiGwC5+OlgzczO +UYrHUDFu4Up+GC9pWbY9ZIEr44OE5iKHjn3g7gKZYbge9LgriBIWhMIxkziWMaa5 +O1M/wySTVltpkuzFwbs4AOPsF6m43Md8AYOfMke6UiI0HTJ6CVanfCU2qT1L2sCC +bwq7EsiHSycR+R4tx5M/nttfJmtS2S6K8RTGRI0Vqbe/vd6mGu6uLftIdxf+u+yv +GPUqUfA5hJeVbG4bwyvEdGB5JbAKJ9/fXtI5z0V9QkvfsywexcZdylU6oJxpmo/a +77KwPJ+HbBIrZXAVUjEaJM9vMSNQH4xPjyPDdEFjHFWoFN0+4FFQz/EbMFYOkrCC +hdiDyyJkvC24JdVUorgG6q2SpCSgwYa1ShNqR88uC1aVVMvOmttqtKay20EIhid3 +92qgQmwLOM7XdVAyksLfKzAiSNDVQTglXaTpXZ/GlHXQRf0wl0OPkKsKx4ZzYEpp +Ld6leNcG2mqeSz53OiATIgHQv2ieY2BrNU0LbbqhPcCT4H8js1WtciVORvnSFu+w +ZMEBnunKoGqYDs/YYPIvSbjkQuE4NRb0yG5P94FW6LqjviOvrv1vA+ACOzB2+htt +Qc8Bsem4yWb02ybzOqR08kkkW8mw0FfB+j564ZfJ +-----END CERTIFICATE----- + +# Issuer: CN=SwissSign Silver CA - G2 O=SwissSign AG +# Subject: CN=SwissSign Silver CA - G2 O=SwissSign AG +# Label: "SwissSign Silver CA - G2" +# Serial: 5700383053117599563 +# MD5 Fingerprint: e0:06:a1:c9:7d:cf:c9:fc:0d:c0:56:75:96:d8:62:13 +# SHA1 Fingerprint: 9b:aa:e5:9f:56:ee:21:cb:43:5a:be:25:93:df:a7:f0:40:d1:1d:cb +# SHA256 Fingerprint: be:6c:4d:a2:bb:b9:ba:59:b6:f3:93:97:68:37:42:46:c3:c0:05:99:3f:a9:8f:02:0d:1d:ed:be:d4:8a:81:d5 +-----BEGIN CERTIFICATE----- +MIIFvTCCA6WgAwIBAgIITxvUL1S7L0swDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UE +BhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMYU3dpc3NTaWdu +IFNpbHZlciBDQSAtIEcyMB4XDTA2MTAyNTA4MzI0NloXDTM2MTAyNTA4MzI0Nlow +RzELMAkGA1UEBhMCQ0gxFTATBgNVBAoTDFN3aXNzU2lnbiBBRzEhMB8GA1UEAxMY +U3dpc3NTaWduIFNpbHZlciBDQSAtIEcyMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A +MIICCgKCAgEAxPGHf9N4Mfc4yfjDmUO8x/e8N+dOcbpLj6VzHVxumK4DV644N0Mv +Fz0fyM5oEMF4rhkDKxD6LHmD9ui5aLlV8gREpzn5/ASLHvGiTSf5YXu6t+WiE7br +YT7QbNHm+/pe7R20nqA1W6GSy/BJkv6FCgU+5tkL4k+73JU3/JHpMjUi0R86TieF +nbAVlDLaYQ1HTWBCrpJH6INaUFjpiou5XaHc3ZlKHzZnu0jkg7Y360g6rw9njxcH +6ATK72oxh9TAtvmUcXtnZLi2kUpCe2UuMGoM9ZDulebyzYLs2aFK7PayS+VFheZt +eJMELpyCbTapxDFkH4aDCyr0NQp4yVXPQbBH6TCfmb5hqAaEuSh6XzjZG6k4sIN/ +c8HDO0gqgg8hm7jMqDXDhBuDsz6+pJVpATqJAHgE2cn0mRmrVn5bi4Y5FZGkECwJ +MoBgs5PAKrYYC51+jUnyEEp/+dVGLxmSo5mnJqy7jDzmDrxHB9xzUfFwZC8I+bRH +HTBsROopN4WSaGa8gzj+ezku01DwH/teYLappvonQfGbGHLy9YR0SslnxFSuSGTf +jNFusB3hB48IHpmccelM2KX3RxIfdNFRnobzwqIjQAtz20um53MGjMGg6cFZrEb6 +5i/4z3GcRm25xBWNOHkDRUjvxF3XCO6HOSKGsg0PWEP3calILv3q1h8CAwEAAaOB +rDCBqTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU +F6DNweRBtjpbO8tFnb0cwpj6hlgwHwYDVR0jBBgwFoAUF6DNweRBtjpbO8tFnb0c +wpj6hlgwRgYDVR0gBD8wPTA7BglghXQBWQEDAQEwLjAsBggrBgEFBQcCARYgaHR0 +cDovL3JlcG9zaXRvcnkuc3dpc3NzaWduLmNvbS8wDQYJKoZIhvcNAQEFBQADggIB +AHPGgeAn0i0P4JUw4ppBf1AsX19iYamGamkYDHRJ1l2E6kFSGG9YrVBWIGrGvShp +WJHckRE1qTodvBqlYJ7YH39FkWnZfrt4csEGDyrOj4VwYaygzQu4OSlWhDJOhrs9 +xCrZ1x9y7v5RoSJBsXECYxqCsGKrXlcSH9/L3XWgwF15kIwb4FDm3jH+mHtwX6WQ +2K34ArZv02DdQEsixT2tOnqfGhpHkXkzuoLcMmkDlm4fS/Bx/uNncqCxv1yL5PqZ +IseEuRuNI5c/7SXgz2W79WEE790eslpBIlqhn10s6FvJbakMDHiqYMZWjwFaDGi8 +aRl5xB9+lwW/xekkUV7U1UtT7dkjWjYDZaPBA61BMPNGG4WQr2W11bHkFlt4dR2X +em1ZqSqPe97Dh4kQmUlzeMg9vVE1dCrV8X5pGyq7O70luJpaPXJhkGaH7gzWTdQR +dAtq/gsD/KNVV4n+SsuuWxcFyPKNIzFTONItaj+CuY0IavdeQXRuwxF+B6wpYJE/ +OMpXEA29MC/HpeZBoNquBYeaoKRlbEwJDIm6uNO5wJOKMPqN5ZprFQFOZ6raYlY+ +hAhm0sQ2fac+EPyI4NSA5QC9qvNOBqN6avlicuMJT+ubDgEj8Z+7fNzcbBGXJbLy +tGMU0gYqZ4yD9c7qB9iaah7s5Aq7KkzrCWA5zspi2C5u +-----END CERTIFICATE----- + +# Issuer: CN=SecureTrust CA O=SecureTrust Corporation +# Subject: CN=SecureTrust CA O=SecureTrust Corporation +# Label: "SecureTrust CA" +# Serial: 17199774589125277788362757014266862032 +# MD5 Fingerprint: dc:32:c3:a7:6d:25:57:c7:68:09:9d:ea:2d:a9:a2:d1 +# SHA1 Fingerprint: 87:82:c6:c3:04:35:3b:cf:d2:96:92:d2:59:3e:7d:44:d9:34:ff:11 +# SHA256 Fingerprint: f1:c1:b5:0a:e5:a2:0d:d8:03:0e:c9:f6:bc:24:82:3d:d3:67:b5:25:57:59:b4:e7:1b:61:fc:e9:f7:37:5d:73 +-----BEGIN CERTIFICATE----- +MIIDuDCCAqCgAwIBAgIQDPCOXAgWpa1Cf/DrJxhZ0DANBgkqhkiG9w0BAQUFADBI +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +FzAVBgNVBAMTDlNlY3VyZVRydXN0IENBMB4XDTA2MTEwNzE5MzExOFoXDTI5MTIz +MTE5NDA1NVowSDELMAkGA1UEBhMCVVMxIDAeBgNVBAoTF1NlY3VyZVRydXN0IENv +cnBvcmF0aW9uMRcwFQYDVQQDEw5TZWN1cmVUcnVzdCBDQTCCASIwDQYJKoZIhvcN +AQEBBQADggEPADCCAQoCggEBAKukgeWVzfX2FI7CT8rU4niVWJxB4Q2ZQCQXOZEz +Zum+4YOvYlyJ0fwkW2Gz4BERQRwdbvC4u/jep4G6pkjGnx29vo6pQT64lO0pGtSO +0gMdA+9tDWccV9cGrcrI9f4Or2YlSASWC12juhbDCE/RRvgUXPLIXgGZbf2IzIao +wW8xQmxSPmjL8xk037uHGFaAJsTQ3MBv396gwpEWoGQRS0S8Hvbn+mPeZqx2pHGj +7DaUaHp3pLHnDi+BeuK1cobvomuL8A/b01k/unK8RCSc43Oz969XL0Imnal0ugBS +8kvNU3xHCzaFDmapCJcWNFfBZveA4+1wVMeT4C4oFVmHursCAwEAAaOBnTCBmjAT +BgkrBgEEAYI3FAIEBh4EAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQUQjK2FvoE/f5dS3rD/fdMQB1aQ68wNAYDVR0fBC0wKzApoCeg +JYYjaHR0cDovL2NybC5zZWN1cmV0cnVzdC5jb20vU1RDQS5jcmwwEAYJKwYBBAGC +NxUBBAMCAQAwDQYJKoZIhvcNAQEFBQADggEBADDtT0rhWDpSclu1pqNlGKa7UTt3 +6Z3q059c4EVlew3KW+JwULKUBRSuSceNQQcSc5R+DCMh/bwQf2AQWnL1mA6s7Ll/ +3XpvXdMc9P+IBWlCqQVxyLesJugutIxq/3HcuLHfmbx8IVQr5Fiiu1cprp6poxkm +D5kuCLDv/WnPmRoJjeOnnyvJNjR7JLN4TJUXpAYmHrZkUjZfYGfZnMUFdAvnZyPS +CPyI6a6Lf+Ew9Dd+/cYy2i2eRDAwbO4H3tI0/NL/QPZL9GZGBlSm8jIKYyYwa5vR +3ItHuuG51WLQoqD0ZwV4KWMabwTW+MZMo5qxN7SN5ShLHZ4swrhovO0C7jE= +-----END CERTIFICATE----- + +# Issuer: CN=Secure Global CA O=SecureTrust Corporation +# Subject: CN=Secure Global CA O=SecureTrust Corporation +# Label: "Secure Global CA" +# Serial: 9751836167731051554232119481456978597 +# MD5 Fingerprint: cf:f4:27:0d:d4:ed:dc:65:16:49:6d:3d:da:bf:6e:de +# SHA1 Fingerprint: 3a:44:73:5a:e5:81:90:1f:24:86:61:46:1e:3b:9c:c4:5f:f5:3a:1b +# SHA256 Fingerprint: 42:00:f5:04:3a:c8:59:0e:bb:52:7d:20:9e:d1:50:30:29:fb:cb:d4:1c:a1:b5:06:ec:27:f1:5a:de:7d:ac:69 +-----BEGIN CERTIFICATE----- +MIIDvDCCAqSgAwIBAgIQB1YipOjUiolN9BPI8PjqpTANBgkqhkiG9w0BAQUFADBK +MQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3QgQ29ycG9yYXRpb24x +GTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwHhcNMDYxMTA3MTk0MjI4WhcNMjkx +MjMxMTk1MjA2WjBKMQswCQYDVQQGEwJVUzEgMB4GA1UEChMXU2VjdXJlVHJ1c3Qg +Q29ycG9yYXRpb24xGTAXBgNVBAMTEFNlY3VyZSBHbG9iYWwgQ0EwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCvNS7YrGxVaQZx5RNoJLNP2MwhR/jxYDiJ +iQPpvepeRlMJ3Fz1Wuj3RSoC6zFh1ykzTM7HfAo3fg+6MpjhHZevj8fcyTiW89sa +/FHtaMbQbqR8JNGuQsiWUGMu4P51/pinX0kuleM5M2SOHqRfkNJnPLLZ/kG5VacJ +jnIFHovdRIWCQtBJwB1g8NEXLJXr9qXBkqPFwqcIYA1gBBCWeZ4WNOaptvolRTnI +HmX5k/Wq8VLcmZg9pYYaDDUz+kulBAYVHDGA76oYa8J719rO+TMg1fW9ajMtgQT7 +sFzUnKPiXB3jqUJ1XnvUd+85VLrJChgbEplJL4hL/VBi0XPnj3pDAgMBAAGjgZ0w +gZowEwYJKwYBBAGCNxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFK9EBMJBfkiD2045AuzshHrmzsmkMDQGA1UdHwQtMCsw +KaAnoCWGI2h0dHA6Ly9jcmwuc2VjdXJldHJ1c3QuY29tL1NHQ0EuY3JsMBAGCSsG +AQQBgjcVAQQDAgEAMA0GCSqGSIb3DQEBBQUAA4IBAQBjGghAfaReUw132HquHw0L +URYD7xh8yOOvaliTFGCRsoTciE6+OYo68+aCiV0BN7OrJKQVDpI1WkpEXk5X+nXO +H0jOZvQ8QCaSmGwb7iRGDBezUqXbpZGRzzfTb+cnCDpOGR86p1hcF895P4vkp9Mm +I50mD1hp/Ed+stCNi5O/KU9DaXR2Z0vPB4zmAve14bRDtUstFJ/53CYNv6ZHdAbY +iNE6KTCEztI5gGIbqMdXSbxqVVFnFUq+NQfk1XWYN3kwFNspnWzFacxHVaIw98xc +f8LDmBxrThaA63p4ZUWiABqvDA1VZDRIuJK58bRQKfJPIx/abKwfROHdI3hRW8cW +-----END CERTIFICATE----- + +# Issuer: CN=COMODO Certification Authority O=COMODO CA Limited +# Subject: CN=COMODO Certification Authority O=COMODO CA Limited +# Label: "COMODO Certification Authority" +# Serial: 104350513648249232941998508985834464573 +# MD5 Fingerprint: 5c:48:dc:f7:42:72:ec:56:94:6d:1c:cc:71:35:80:75 +# SHA1 Fingerprint: 66:31:bf:9e:f7:4f:9e:b6:c9:d5:a6:0c:ba:6a:be:d1:f7:bd:ef:7b +# SHA256 Fingerprint: 0c:2c:d6:3d:f7:80:6f:a3:99:ed:e8:09:11:6b:57:5b:f8:79:89:f0:65:18:f9:80:8c:86:05:03:17:8b:af:66 +-----BEGIN CERTIFICATE----- +MIIEHTCCAwWgAwIBAgIQToEtioJl4AsC7j41AkblPTANBgkqhkiG9w0BAQUFADCB +gTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxJzAlBgNV +BAMTHkNPTU9ETyBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0wNjEyMDEwMDAw +MDBaFw0yOTEyMzEyMzU5NTlaMIGBMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3Jl +YXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01P +RE8gQ0EgTGltaXRlZDEnMCUGA1UEAxMeQ09NT0RPIENlcnRpZmljYXRpb24gQXV0 +aG9yaXR5MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA0ECLi3LjkRv3 +UcEbVASY06m/weaKXTuH+7uIzg3jLz8GlvCiKVCZrts7oVewdFFxze1CkU1B/qnI +2GqGd0S7WWaXUF601CxwRM/aN5VCaTwwxHGzUvAhTaHYujl8HJ6jJJ3ygxaYqhZ8 +Q5sVW7euNJH+1GImGEaaP+vB+fGQV+useg2L23IwambV4EajcNxo2f8ESIl33rXp ++2dtQem8Ob0y2WIC8bGoPW43nOIv4tOiJovGuFVDiOEjPqXSJDlqR6sA1KGzqSX+ +DT+nHbrTUcELpNqsOO9VUCQFZUaTNE8tja3G1CEZ0o7KBWFxB3NH5YoZEr0ETc5O +nKVIrLsm9wIDAQABo4GOMIGLMB0GA1UdDgQWBBQLWOWLxkwVN6RAqTCpIb5HNlpW +/zAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zBJBgNVHR8EQjBAMD6g +PKA6hjhodHRwOi8vY3JsLmNvbW9kb2NhLmNvbS9DT01PRE9DZXJ0aWZpY2F0aW9u +QXV0aG9yaXR5LmNybDANBgkqhkiG9w0BAQUFAAOCAQEAPpiem/Yb6dc5t3iuHXIY +SdOH5EOC6z/JqvWote9VfCFSZfnVDeFs9D6Mk3ORLgLETgdxb8CPOGEIqB6BCsAv +IC9Bi5HcSEW88cbeunZrM8gALTFGTO3nnc+IlP8zwFboJIYmuNg4ON8qa90SzMc/ +RxdMosIGlgnW2/4/PEZB31jiVg88O8EckzXZOFKs7sjsLjBOlDW0JB9LeGna8gI4 +zJVSk/BwJVmcIGfE7vmLV2H0knZ9P4SNVbfo5azV8fUZVqZa+5Acr5Pr5RzUZ5dd +BA6+C4OmF4O5MBKgxTMVBbkN+8cFduPYSo38NBejxiEovjBFMR7HeL5YYTisO+IB +ZQ== +-----END CERTIFICATE----- + +# Issuer: CN=Network Solutions Certificate Authority O=Network Solutions L.L.C. +# Subject: CN=Network Solutions Certificate Authority O=Network Solutions L.L.C. +# Label: "Network Solutions Certificate Authority" +# Serial: 116697915152937497490437556386812487904 +# MD5 Fingerprint: d3:f3:a6:16:c0:fa:6b:1d:59:b1:2d:96:4d:0e:11:2e +# SHA1 Fingerprint: 74:f8:a3:c3:ef:e7:b3:90:06:4b:83:90:3c:21:64:60:20:e5:df:ce +# SHA256 Fingerprint: 15:f0:ba:00:a3:ac:7a:f3:ac:88:4c:07:2b:10:11:a0:77:bd:77:c0:97:f4:01:64:b2:f8:59:8a:bd:83:86:0c +-----BEGIN CERTIFICATE----- +MIID5jCCAs6gAwIBAgIQV8szb8JcFuZHFhfjkDFo4DANBgkqhkiG9w0BAQUFADBi +MQswCQYDVQQGEwJVUzEhMB8GA1UEChMYTmV0d29yayBTb2x1dGlvbnMgTC5MLkMu +MTAwLgYDVQQDEydOZXR3b3JrIFNvbHV0aW9ucyBDZXJ0aWZpY2F0ZSBBdXRob3Jp +dHkwHhcNMDYxMjAxMDAwMDAwWhcNMjkxMjMxMjM1OTU5WjBiMQswCQYDVQQGEwJV +UzEhMB8GA1UEChMYTmV0d29yayBTb2x1dGlvbnMgTC5MLkMuMTAwLgYDVQQDEydO +ZXR3b3JrIFNvbHV0aW9ucyBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkwggEiMA0GCSqG +SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDkvH6SMG3G2I4rC7xGzuAnlt7e+foS0zwz +c7MEL7xxjOWftiJgPl9dzgn/ggwbmlFQGiaJ3dVhXRncEg8tCqJDXRfQNJIg6nPP +OCwGJgl6cvf6UDL4wpPTaaIjzkGxzOTVHzbRijr4jGPiFFlp7Q3Tf2vouAPlT2rl +mGNpSAW+Lv8ztumXWWn4Zxmuk2GWRBXTcrA/vGp97Eh/jcOrqnErU2lBUzS1sLnF +BgrEsEX1QV1uiUV7PTsmjHTC5dLRfbIR1PtYMiKagMnc/Qzpf14Dl847ABSHJ3A4 +qY5usyd2mFHgBeMhqxrVhSI8KbWaFsWAqPS7azCPL0YCorEMIuDTAgMBAAGjgZcw +gZQwHQYDVR0OBBYEFCEwyfsA106Y2oeqKtCnLrFAMadMMA4GA1UdDwEB/wQEAwIB +BjAPBgNVHRMBAf8EBTADAQH/MFIGA1UdHwRLMEkwR6BFoEOGQWh0dHA6Ly9jcmwu +bmV0c29sc3NsLmNvbS9OZXR3b3JrU29sdXRpb25zQ2VydGlmaWNhdGVBdXRob3Jp +dHkuY3JsMA0GCSqGSIb3DQEBBQUAA4IBAQC7rkvnt1frf6ott3NHhWrB5KUd5Oc8 +6fRZZXe1eltajSU24HqXLjjAV2CDmAaDn7l2em5Q4LqILPxFzBiwmZVRDuwduIj/ +h1AcgsLj4DKAv6ALR8jDMe+ZZzKATxcheQxpXN5eNK4CtSbqUN9/GGUsyfJj4akH +/nxxH2szJGoeBfcFaMBqEssuXmHLrijTfsK0ZpEmXzwuJF/LWA/rKOyvEZbz3Htv +wKeI8lN3s2Berq4o2jUsbzRF0ybh3uxbTydrFny9RAQYgrOJeRcQcT16ohZO9QHN +pGxlaKFJdlxDydi8NmdspZS11My5vWo1ViHe2MPr+8ukYEywVaCge1ey +-----END CERTIFICATE----- + +# Issuer: CN=COMODO ECC Certification Authority O=COMODO CA Limited +# Subject: CN=COMODO ECC Certification Authority O=COMODO CA Limited +# Label: "COMODO ECC Certification Authority" +# Serial: 41578283867086692638256921589707938090 +# MD5 Fingerprint: 7c:62:ff:74:9d:31:53:5e:68:4a:d5:78:aa:1e:bf:23 +# SHA1 Fingerprint: 9f:74:4e:9f:2b:4d:ba:ec:0f:31:2c:50:b6:56:3b:8e:2d:93:c3:11 +# SHA256 Fingerprint: 17:93:92:7a:06:14:54:97:89:ad:ce:2f:8f:34:f7:f0:b6:6d:0f:3a:e3:a3:b8:4d:21:ec:15:db:ba:4f:ad:c7 +-----BEGIN CERTIFICATE----- +MIICiTCCAg+gAwIBAgIQH0evqmIAcFBUTAGem2OZKjAKBggqhkjOPQQDAzCBhTEL +MAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE +BxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMT +IkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwMzA2MDAw +MDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdy +ZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09N +T0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBFQ0MgQ2VydGlmaWNhdGlv +biBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQDR3svdcmCFYX7deSR +FtSrYpn1PlILBs5BAH+X4QokPB0BBO490o0JlwzgdeT6+3eKKvUDYEs2ixYjFq0J +cfRK9ChQtP6IHG4/bC8vCVlbpVsLM5niwz2J+Wos77LTBumjQjBAMB0GA1UdDgQW +BBR1cacZSBm8nZ3qQUfflMRId5nTeTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjEA7wNbeqy3eApyt4jf/7VGFAkK+qDm +fQjGGoe9GKhzvSbKYAydzpmfz1wPMOG+FDHqAjAU9JM8SaczepBGR7NjfRObTrdv +GDeAU/7dIOA1mjbRxwG55tzd8/8dLDoWV9mSOdY= +-----END CERTIFICATE----- + +# Issuer: CN=Certigna O=Dhimyotis +# Subject: CN=Certigna O=Dhimyotis +# Label: "Certigna" +# Serial: 18364802974209362175 +# MD5 Fingerprint: ab:57:a6:5b:7d:42:82:19:b5:d8:58:26:28:5e:fd:ff +# SHA1 Fingerprint: b1:2e:13:63:45:86:a4:6f:1a:b2:60:68:37:58:2d:c4:ac:fd:94:97 +# SHA256 Fingerprint: e3:b6:a2:db:2e:d7:ce:48:84:2f:7a:c5:32:41:c7:b7:1d:54:14:4b:fb:40:c1:1f:3f:1d:0b:42:f5:ee:a1:2d +-----BEGIN CERTIFICATE----- +MIIDqDCCApCgAwIBAgIJAP7c4wEPyUj/MA0GCSqGSIb3DQEBBQUAMDQxCzAJBgNV +BAYTAkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hMB4X +DTA3MDYyOTE1MTMwNVoXDTI3MDYyOTE1MTMwNVowNDELMAkGA1UEBhMCRlIxEjAQ +BgNVBAoMCURoaW15b3RpczERMA8GA1UEAwwIQ2VydGlnbmEwggEiMA0GCSqGSIb3 +DQEBAQUAA4IBDwAwggEKAoIBAQDIaPHJ1tazNHUmgh7stL7qXOEm7RFHYeGifBZ4 +QCHkYJ5ayGPhxLGWkv8YbWkj4Sti993iNi+RB7lIzw7sebYs5zRLcAglozyHGxny +gQcPOJAZ0xH+hrTy0V4eHpbNgGzOOzGTtvKg0KmVEn2lmsxryIRWijOp5yIVUxbw +zBfsV1/pogqYCd7jX5xv3EjjhQsVWqa6n6xI4wmy9/Qy3l40vhx4XUJbzg4ij02Q +130yGLMLLGq/jj8UEYkgDncUtT2UCIf3JR7VsmAA7G8qKCVuKj4YYxclPz5EIBb2 +JsglrgVKtOdjLPOMFlN+XPsRGgjBRmKfIrjxwo1p3Po6WAbfAgMBAAGjgbwwgbkw +DwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUGu3+QTmQtCRZvgHyUtVF9lo53BEw +ZAYDVR0jBF0wW4AUGu3+QTmQtCRZvgHyUtVF9lo53BGhOKQ2MDQxCzAJBgNVBAYT +AkZSMRIwEAYDVQQKDAlEaGlteW90aXMxETAPBgNVBAMMCENlcnRpZ25hggkA/tzj +AQ/JSP8wDgYDVR0PAQH/BAQDAgEGMBEGCWCGSAGG+EIBAQQEAwIABzANBgkqhkiG +9w0BAQUFAAOCAQEAhQMeknH2Qq/ho2Ge6/PAD/Kl1NqV5ta+aDY9fm4fTIrv0Q8h +bV6lUmPOEvjvKtpv6zf+EwLHyzs+ImvaYS5/1HI93TDhHkxAGYwP15zRgzB7mFnc +fca5DClMoTOi62c6ZYTTluLtdkVwj7Ur3vkj1kluPBS1xp81HlDQwY9qcEQCYsuu +HWhBp6pX6FOqB9IG9tUUBguRA3UsbHK1YZWaDYu5Def131TN3ubY1gkIl2PlwS6w +t0QmwCbAr1UwnjvVNioZBPRcHv/PLLf/0P2HQBHVESO7SMAhqaQoLf0V+LBOK/Qw +WyH8EZE0vkHve52Xdf+XlcCWWC/qu0bXu+TZLg== +-----END CERTIFICATE----- + +# Issuer: O=Chunghwa Telecom Co., Ltd. OU=ePKI Root Certification Authority +# Subject: O=Chunghwa Telecom Co., Ltd. OU=ePKI Root Certification Authority +# Label: "ePKI Root Certification Authority" +# Serial: 28956088682735189655030529057352760477 +# MD5 Fingerprint: 1b:2e:00:ca:26:06:90:3d:ad:fe:6f:15:68:d3:6b:b3 +# SHA1 Fingerprint: 67:65:0d:f1:7e:8e:7e:5b:82:40:a4:f4:56:4b:cf:e2:3d:69:c6:f0 +# SHA256 Fingerprint: c0:a6:f4:dc:63:a2:4b:fd:cf:54:ef:2a:6a:08:2a:0a:72:de:35:80:3e:2f:f5:ff:52:7a:e5:d8:72:06:df:d5 +-----BEGIN CERTIFICATE----- +MIIFsDCCA5igAwIBAgIQFci9ZUdcr7iXAF7kBtK8nTANBgkqhkiG9w0BAQUFADBe +MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 +ZC4xKjAoBgNVBAsMIWVQS0kgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAe +Fw0wNDEyMjAwMjMxMjdaFw0zNDEyMjAwMjMxMjdaMF4xCzAJBgNVBAYTAlRXMSMw +IQYDVQQKDBpDaHVuZ2h3YSBUZWxlY29tIENvLiwgTHRkLjEqMCgGA1UECwwhZVBL +SSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5MIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA4SUP7o3biDN1Z82tH306Tm2d0y8U82N0ywEhajfqhFAH +SyZbCUNsIZ5qyNUD9WBpj8zwIuQf5/dqIjG3LBXy4P4AakP/h2XGtRrBp0xtInAh +ijHyl3SJCRImHJ7K2RKilTza6We/CKBk49ZCt0Xvl/T29de1ShUCWH2YWEtgvM3X +DZoTM1PRYfl61dd4s5oz9wCGzh1NlDivqOx4UXCKXBCDUSH3ET00hl7lSM2XgYI1 +TBnsZfZrxQWh7kcT1rMhJ5QQCtkkO7q+RBNGMD+XPNjX12ruOzjjK9SXDrkb5wdJ +fzcq+Xd4z1TtW0ado4AOkUPB1ltfFLqfpo0kR0BZv3I4sjZsN/+Z0V0OWQqraffA +sgRFelQArr5T9rXn4fg8ozHSqf4hUmTFpmfwdQcGlBSBVcYn5AGPF8Fqcde+S/uU +WH1+ETOxQvdibBjWzwloPn9s9h6PYq2lY9sJpx8iQkEeb5mKPtf5P0B6ebClAZLS +nT0IFaUQAS2zMnaolQ2zepr7BxB4EW/hj8e6DyUadCrlHJhBmd8hh+iVBmoKs2pH +dmX2Os+PYhcZewoozRrSgx4hxyy/vv9haLdnG7t4TY3OZ+XkwY63I2binZB1NJip +NiuKmpS5nezMirH4JYlcWrYvjB9teSSnUmjDhDXiZo1jDiVN1Rmy5nk3pyKdVDEC +AwEAAaNqMGgwHQYDVR0OBBYEFB4M97Zn8uGSJglFwFU5Lnc/QkqiMAwGA1UdEwQF +MAMBAf8wOQYEZyoHAAQxMC8wLQIBADAJBgUrDgMCGgUAMAcGBWcqAwAABBRFsMLH +ClZ87lt4DJX5GFPBphzYEDANBgkqhkiG9w0BAQUFAAOCAgEACbODU1kBPpVJufGB +uvl2ICO1J2B01GqZNF5sAFPZn/KmsSQHRGoqxqWOeBLoR9lYGxMqXnmbnwoqZ6Yl +PwZpVnPDimZI+ymBV3QGypzqKOg4ZyYr8dW1P2WT+DZdjo2NQCCHGervJ8A9tDkP +JXtoUHRVnAxZfVo9QZQlUgjgRywVMRnVvwdVxrsStZf0X4OFunHB2WyBEXYKCrC/ +gpf36j36+uwtqSiUO1bd0lEursC9CBWMd1I0ltabrNMdjmEPNXubrjlpC2JgQCA2 +j6/7Nu4tCEoduL+bXPjqpRugc6bY+G7gMwRfaKonh+3ZwZCc7b3jajWvY9+rGNm6 +5ulK6lCKD2GTHuItGeIwlDWSXQ62B68ZgI9HkFFLLk3dheLSClIKF5r8GrBQAuUB +o2M3IUxExJtRmREOc5wGj1QupyheRDmHVi03vYVElOEMSyycw5KFNGHLD7ibSkNS +/jQ6fbjpKdx2qcgw+BRxgMYeNkh0IkFch4LoGHGLQYlE535YW6i4jRPpp2zDR+2z +Gp1iro2C6pSe3VkQw63d4k3jMdXH7OjysP6SHhYKGvzZ8/gntsm+HbRsZJB/9OTE +W9c3rkIO3aQab3yIVMUWbuF6aC74Or8NpDyJO3inTmODBCEIZ43ygknQW/2xzQ+D +hNQ+IIX3Sj0rnP0qCglN6oH4EZw= +-----END CERTIFICATE----- + +# Issuer: O=certSIGN OU=certSIGN ROOT CA +# Subject: O=certSIGN OU=certSIGN ROOT CA +# Label: "certSIGN ROOT CA" +# Serial: 35210227249154 +# MD5 Fingerprint: 18:98:c0:d6:e9:3a:fc:f9:b0:f5:0c:f7:4b:01:44:17 +# SHA1 Fingerprint: fa:b7:ee:36:97:26:62:fb:2d:b0:2a:f6:bf:03:fd:e8:7c:4b:2f:9b +# SHA256 Fingerprint: ea:a9:62:c4:fa:4a:6b:af:eb:e4:15:19:6d:35:1c:cd:88:8d:4f:53:f3:fa:8a:e6:d7:c4:66:a9:4e:60:42:bb +-----BEGIN CERTIFICATE----- +MIIDODCCAiCgAwIBAgIGIAYFFnACMA0GCSqGSIb3DQEBBQUAMDsxCzAJBgNVBAYT +AlJPMREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBD +QTAeFw0wNjA3MDQxNzIwMDRaFw0zMTA3MDQxNzIwMDRaMDsxCzAJBgNVBAYTAlJP +MREwDwYDVQQKEwhjZXJ0U0lHTjEZMBcGA1UECxMQY2VydFNJR04gUk9PVCBDQTCC +ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALczuX7IJUqOtdu0KBuqV5Do +0SLTZLrTk+jUrIZhQGpgV2hUhE28alQCBf/fm5oqrl0Hj0rDKH/v+yv6efHHrfAQ +UySQi2bJqIirr1qjAOm+ukbuW3N7LBeCgV5iLKECZbO9xSsAfsT8AzNXDe3i+s5d +RdY4zTW2ssHQnIFKquSyAVwdj1+ZxLGt24gh65AIgoDzMKND5pCCrlUoSe1b16kQ +OA7+j0xbm0bqQfWwCHTD0IgztnzXdN/chNFDDnU5oSVAKOp4yw4sLjmdjItuFhwv +JoIQ4uNllAoEwF73XVv4EOLQunpL+943AAAaWyjj0pxzPjKHmKHJUS/X3qwzs08C +AwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAcYwHQYDVR0O +BBYEFOCMm9slSbPxfIbWskKHC9BroNnkMA0GCSqGSIb3DQEBBQUAA4IBAQA+0hyJ +LjX8+HXd5n9liPRyTMks1zJO890ZeUe9jjtbkw9QSSQTaxQGcu8J06Gh40CEyecY +MnQ8SG4Pn0vU9x7Tk4ZkVJdjclDVVc/6IJMCopvDI5NOFlV2oHB5bc0hH88vLbwZ +44gx+FkagQnIl6Z0x2DEW8xXjrJ1/RsCCdtZb3KTafcxQdaIOL+Hsr0Wefmq5L6I +Jd1hJyMctTEHBDa0GpC9oHRxUIltvBTjD4au8as+x6AJzKNI0eDbZOeStc+vckNw +i/nDhDwTqn6Sm1dTk/pwwpEOMfmbZ13pljheX7NzTogVZ96edhBiIL5VaZVDADlN +9u6wWk5JRFRYX0KD +-----END CERTIFICATE----- + +# Issuer: CN=NetLock Arany (Class Gold) F\u0151tan\xfas\xedtv\xe1ny O=NetLock Kft. OU=Tan\xfas\xedtv\xe1nykiad\xf3k (Certification Services) +# Subject: CN=NetLock Arany (Class Gold) F\u0151tan\xfas\xedtv\xe1ny O=NetLock Kft. OU=Tan\xfas\xedtv\xe1nykiad\xf3k (Certification Services) +# Label: "NetLock Arany (Class Gold) F\u0151tan\xfas\xedtv\xe1ny" +# Serial: 80544274841616 +# MD5 Fingerprint: c5:a1:b7:ff:73:dd:d6:d7:34:32:18:df:fc:3c:ad:88 +# SHA1 Fingerprint: 06:08:3f:59:3f:15:a1:04:a0:69:a4:6b:a9:03:d0:06:b7:97:09:91 +# SHA256 Fingerprint: 6c:61:da:c3:a2:de:f0:31:50:6b:e0:36:d2:a6:fe:40:19:94:fb:d1:3d:f9:c8:d4:66:59:92:74:c4:46:ec:98 +-----BEGIN CERTIFICATE----- +MIIEFTCCAv2gAwIBAgIGSUEs5AAQMA0GCSqGSIb3DQEBCwUAMIGnMQswCQYDVQQG +EwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFTATBgNVBAoMDE5ldExvY2sgS2Z0LjE3 +MDUGA1UECwwuVGFuw7pzw610dsOhbnlraWFkw7NrIChDZXJ0aWZpY2F0aW9uIFNl +cnZpY2VzKTE1MDMGA1UEAwwsTmV0TG9jayBBcmFueSAoQ2xhc3MgR29sZCkgRsWR +dGFuw7pzw610dsOhbnkwHhcNMDgxMjExMTUwODIxWhcNMjgxMjA2MTUwODIxWjCB +pzELMAkGA1UEBhMCSFUxETAPBgNVBAcMCEJ1ZGFwZXN0MRUwEwYDVQQKDAxOZXRM +b2NrIEtmdC4xNzA1BgNVBAsMLlRhbsO6c8OtdHbDoW55a2lhZMOzayAoQ2VydGlm +aWNhdGlvbiBTZXJ2aWNlcykxNTAzBgNVBAMMLE5ldExvY2sgQXJhbnkgKENsYXNz +IEdvbGQpIEbFkXRhbsO6c8OtdHbDoW55MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A +MIIBCgKCAQEAxCRec75LbRTDofTjl5Bu0jBFHjzuZ9lk4BqKf8owyoPjIMHj9DrT +lF8afFttvzBPhCf2nx9JvMaZCpDyD/V/Q4Q3Y1GLeqVw/HpYzY6b7cNGbIRwXdrz +AZAj/E4wqX7hJ2Pn7WQ8oLjJM2P+FpD/sLj916jAwJRDC7bVWaaeVtAkH3B5r9s5 +VA1lddkVQZQBr17s9o3x/61k/iCa11zr/qYfCGSji3ZVrR47KGAuhyXoqq8fxmRG +ILdwfzzeSNuWU7c5d+Qa4scWhHaXWy+7GRWF+GmF9ZmnqfI0p6m2pgP8b4Y9VHx2 +BJtr+UBdADTHLpl1neWIA6pN+APSQnbAGwIDAKiLo0UwQzASBgNVHRMBAf8ECDAG +AQH/AgEEMA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUzPpnk/C2uNClwB7zU/2M +U9+D15YwDQYJKoZIhvcNAQELBQADggEBAKt/7hwWqZw8UQCgwBEIBaeZ5m8BiFRh +bvG5GK1Krf6BQCOUL/t1fC8oS2IkgYIL9WHxHG64YTjrgfpioTtaYtOUZcTh5m2C ++C8lcLIhJsFyUR+MLMOEkMNaj7rP9KdlpeuY0fsFskZ1FSNqb4VjMIDw1Z4fKRzC +bLBQWV2QWzuoDTDPv31/zvGdg73JRm4gpvlhUbohL3u+pRVjodSVh/GeufOJ8z2F +uLjbvrW5KfnaNwUASZQDhETnv0Mxz3WLJdH0pmT1kvarBes96aULNmLazAZfNou2 +XjG4Kvte9nHfRCaexOYNkbQudZWAUWpLMKawYqGT8ZvYzsRjdT9ZR7E= +-----END CERTIFICATE----- + +# Issuer: CN=Hongkong Post Root CA 1 O=Hongkong Post +# Subject: CN=Hongkong Post Root CA 1 O=Hongkong Post +# Label: "Hongkong Post Root CA 1" +# Serial: 1000 +# MD5 Fingerprint: a8:0d:6f:39:78:b9:43:6d:77:42:6d:98:5a:cc:23:ca +# SHA1 Fingerprint: d6:da:a8:20:8d:09:d2:15:4d:24:b5:2f:cb:34:6e:b2:58:b2:8a:58 +# SHA256 Fingerprint: f9:e6:7d:33:6c:51:00:2a:c0:54:c6:32:02:2d:66:dd:a2:e7:e3:ff:f1:0a:d0:61:ed:31:d8:bb:b4:10:cf:b2 +-----BEGIN CERTIFICATE----- +MIIDMDCCAhigAwIBAgICA+gwDQYJKoZIhvcNAQEFBQAwRzELMAkGA1UEBhMCSEsx +FjAUBgNVBAoTDUhvbmdrb25nIFBvc3QxIDAeBgNVBAMTF0hvbmdrb25nIFBvc3Qg +Um9vdCBDQSAxMB4XDTAzMDUxNTA1MTMxNFoXDTIzMDUxNTA0NTIyOVowRzELMAkG +A1UEBhMCSEsxFjAUBgNVBAoTDUhvbmdrb25nIFBvc3QxIDAeBgNVBAMTF0hvbmdr +b25nIFBvc3QgUm9vdCBDQSAxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEArP84tulmAknjorThkPlAj3n54r15/gK97iSSHSL22oVyaf7XPwnU3ZG1ApzQ +jVrhVcNQhrkpJsLj2aDxaQMoIIBFIi1WpztUlVYiWR8o3x8gPW2iNr4joLFutbEn +PzlTCeqrauh0ssJlXI6/fMN4hM2eFvz1Lk8gKgifd/PFHsSaUmYeSF7jEAaPIpjh +ZY4bXSNmO7ilMlHIhqqhqZ5/dpTCpmy3QfDVyAY45tQM4vM7TG1QjMSDJ8EThFk9 +nnV0ttgCXjqQesBCNnLsak3c78QA3xMYV18meMjWCnl3v/evt3a5pQuEF10Q6m/h +q5URX208o1xNg1vysxmKgIsLhwIDAQABoyYwJDASBgNVHRMBAf8ECDAGAQH/AgED +MA4GA1UdDwEB/wQEAwIBxjANBgkqhkiG9w0BAQUFAAOCAQEADkbVPK7ih9legYsC +mEEIjEy82tvuJxuC52pF7BaLT4Wg87JwvVqWuspube5Gi27nKi6Wsxkz67SfqLI3 +7piol7Yutmcn1KZJ/RyTZXaeQi/cImyaT/JaFTmxcdcrUehtHJjA2Sr0oYJ71clB +oiMBdDhViw+5LmeiIAQ32pwL0xch4I+XeTRvhEgCIDMb5jREn5Fw9IBehEPCKdJs +EhTkYY2sEJCehFC78JZvRZ+K88psT/oROhUVRsPNH4NbLUES7VBnQRM9IauUiqpO +fMGx+6fWtScvl6tu4B3i0RwsH0Ti/L6RoZz71ilTc4afU9hDDl3WY4JxHYB0yvbi +AmvZWg== +-----END CERTIFICATE----- + +# Issuer: CN=SecureSign RootCA11 O=Japan Certification Services, Inc. +# Subject: CN=SecureSign RootCA11 O=Japan Certification Services, Inc. +# Label: "SecureSign RootCA11" +# Serial: 1 +# MD5 Fingerprint: b7:52:74:e2:92:b4:80:93:f2:75:e4:cc:d7:f2:ea:26 +# SHA1 Fingerprint: 3b:c4:9f:48:f8:f3:73:a0:9c:1e:bd:f8:5b:b1:c3:65:c7:d8:11:b3 +# SHA256 Fingerprint: bf:0f:ee:fb:9e:3a:58:1a:d5:f9:e9:db:75:89:98:57:43:d2:61:08:5c:4d:31:4f:6f:5d:72:59:aa:42:16:12 +-----BEGIN CERTIFICATE----- +MIIDbTCCAlWgAwIBAgIBATANBgkqhkiG9w0BAQUFADBYMQswCQYDVQQGEwJKUDEr +MCkGA1UEChMiSmFwYW4gQ2VydGlmaWNhdGlvbiBTZXJ2aWNlcywgSW5jLjEcMBoG +A1UEAxMTU2VjdXJlU2lnbiBSb290Q0ExMTAeFw0wOTA0MDgwNDU2NDdaFw0yOTA0 +MDgwNDU2NDdaMFgxCzAJBgNVBAYTAkpQMSswKQYDVQQKEyJKYXBhbiBDZXJ0aWZp +Y2F0aW9uIFNlcnZpY2VzLCBJbmMuMRwwGgYDVQQDExNTZWN1cmVTaWduIFJvb3RD +QTExMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA/XeqpRyQBTvLTJsz +i1oURaTnkBbR31fSIRCkF/3frNYfp+TbfPfs37gD2pRY/V1yfIw/XwFndBWW4wI8 +h9uuywGOwvNmxoVF9ALGOrVisq/6nL+k5tSAMJjzDbaTj6nU2DbysPyKyiyhFTOV +MdrAG/LuYpmGYz+/3ZMqg6h2uRMft85OQoWPIucuGvKVCbIFtUROd6EgvanyTgp9 +UK31BQ1FT0Zx/Sg+U/sE2C3XZR1KG/rPO7AxmjVuyIsG0wCR8pQIZUyxNAYAeoni +8McDWc/V1uinMrPmmECGxc0nEovMe863ETxiYAcjPitAbpSACW22s293bzUIUPsC +h8U+iQIDAQABo0IwQDAdBgNVHQ4EFgQUW/hNT7KlhtQ60vFjmqC+CfZXt94wDgYD +VR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEFBQADggEB +AKChOBZmLqdWHyGcBvod7bkixTgm2E5P7KN/ed5GIaGHd48HCJqypMWvDzKYC3xm +KbabfSVSSUOrTC4rbnpwrxYO4wJs+0LmGJ1F2FXI6Dvd5+H0LgscNFxsWEr7jIhQ +X5Ucv+2rIrVls4W6ng+4reV6G4pQOh29Dbx7VFALuUKvVaAYga1lme++5Jy/xIWr +QbJUb9wlze144o4MjQlJ3WN7WmmWAiGovVJZ6X01y8hSyn+B/tlr0/cR7SXf+Of5 +pPpyl4RTDaXQMhhRdlkUbA/r7F+AjHVDg8OFmP9Mni0N5HeDk061lgeLKBObjBmN +QSdJQO7e5iNEOdyhIta6A/I= +-----END CERTIFICATE----- + +# Issuer: CN=Microsec e-Szigno Root CA 2009 O=Microsec Ltd. +# Subject: CN=Microsec e-Szigno Root CA 2009 O=Microsec Ltd. +# Label: "Microsec e-Szigno Root CA 2009" +# Serial: 14014712776195784473 +# MD5 Fingerprint: f8:49:f4:03:bc:44:2d:83:be:48:69:7d:29:64:fc:b1 +# SHA1 Fingerprint: 89:df:74:fe:5c:f4:0f:4a:80:f9:e3:37:7d:54:da:91:e1:01:31:8e +# SHA256 Fingerprint: 3c:5f:81:fe:a5:fa:b8:2c:64:bf:a2:ea:ec:af:cd:e8:e0:77:fc:86:20:a7:ca:e5:37:16:3d:f3:6e:db:f3:78 +-----BEGIN CERTIFICATE----- +MIIECjCCAvKgAwIBAgIJAMJ+QwRORz8ZMA0GCSqGSIb3DQEBCwUAMIGCMQswCQYD +VQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3QxFjAUBgNVBAoMDU1pY3Jvc2VjIEx0 +ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3ppZ25vIFJvb3QgQ0EgMjAwOTEfMB0G +CSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5odTAeFw0wOTA2MTYxMTMwMThaFw0y +OTEyMzAxMTMwMThaMIGCMQswCQYDVQQGEwJIVTERMA8GA1UEBwwIQnVkYXBlc3Qx +FjAUBgNVBAoMDU1pY3Jvc2VjIEx0ZC4xJzAlBgNVBAMMHk1pY3Jvc2VjIGUtU3pp +Z25vIFJvb3QgQ0EgMjAwOTEfMB0GCSqGSIb3DQEJARYQaW5mb0BlLXN6aWduby5o +dTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAOn4j/NjrdqG2KfgQvvP +kd6mJviZpWNwrZuuyjNAfW2WbqEORO7hE52UQlKavXWFdCyoDh2Tthi3jCyoz/tc +cbna7P7ofo/kLx2yqHWH2Leh5TvPmUpG0IMZfcChEhyVbUr02MelTTMuhTlAdX4U +fIASmFDHQWe4oIBhVKZsTh/gnQ4H6cm6M+f+wFUoLAKApxn1ntxVUwOXewdI/5n7 +N4okxFnMUBBjjqqpGrCEGob5X7uxUG6k0QrM1XF+H6cbfPVTbiJfyyvm1HxdrtbC +xkzlBQHZ7Vf8wSN5/PrIJIOV87VqUQHQd9bpEqH5GoP7ghu5sJf0dgYzQ0mg/wu1 ++rUCAwEAAaOBgDB+MA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBTLD8bfQkPMPcu1SCOhGnqmKrs0aDAfBgNVHSMEGDAWgBTLD8bfQkPM +Pcu1SCOhGnqmKrs0aDAbBgNVHREEFDASgRBpbmZvQGUtc3ppZ25vLmh1MA0GCSqG +SIb3DQEBCwUAA4IBAQDJ0Q5eLtXMs3w+y/w9/w0olZMEyL/azXm4Q5DwpL7v8u8h +mLzU1F0G9u5C7DBsoKqpyvGvivo/C3NqPuouQH4frlRheesuCDfXI/OMn74dseGk +ddug4lQUsbocKaQY9hK6ohQU4zE1yED/t+AFdlfBHFny+L/k7SViXITwfn4fs775 +tyERzAMBVnCnEJIeGzSBHq2cGsMEPO0CYdYeBvNfOofyK/FFh+U9rNHHV4S9a67c +2Pm2G2JwCz02yULyMtd6YebS2z3PyKnJm9zbWETXbzivf3jTo60adbocwTZ8jx5t +HMN1Rq41Bab2XD0h7lbwyYIiLXpUq3DDfSJlgnCW +-----END CERTIFICATE----- + +# Issuer: CN=GlobalSign O=GlobalSign OU=GlobalSign Root CA - R3 +# Subject: CN=GlobalSign O=GlobalSign OU=GlobalSign Root CA - R3 +# Label: "GlobalSign Root CA - R3" +# Serial: 4835703278459759426209954 +# MD5 Fingerprint: c5:df:b8:49:ca:05:13:55:ee:2d:ba:1a:c3:3e:b0:28 +# SHA1 Fingerprint: d6:9b:56:11:48:f0:1c:77:c5:45:78:c1:09:26:df:5b:85:69:76:ad +# SHA256 Fingerprint: cb:b5:22:d7:b7:f1:27:ad:6a:01:13:86:5b:df:1c:d4:10:2e:7d:07:59:af:63:5a:7c:f4:72:0d:c9:63:c5:3b +-----BEGIN CERTIFICATE----- +MIIDXzCCAkegAwIBAgILBAAAAAABIVhTCKIwDQYJKoZIhvcNAQELBQAwTDEgMB4G +A1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjMxEzARBgNVBAoTCkdsb2JhbFNp +Z24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMDkwMzE4MTAwMDAwWhcNMjkwMzE4 +MTAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSMzETMBEG +A1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAMwldpB5BngiFvXAg7aEyiie/QV2EcWtiHL8 +RgJDx7KKnQRfJMsuS+FggkbhUqsMgUdwbN1k0ev1LKMPgj0MK66X17YUhhB5uzsT +gHeMCOFJ0mpiLx9e+pZo34knlTifBtc+ycsmWQ1z3rDI6SYOgxXG71uL0gRgykmm +KPZpO/bLyCiR5Z2KYVc3rHQU3HTgOu5yLy6c+9C7v/U9AOEGM+iCK65TpjoWc4zd +QQ4gOsC0p6Hpsk+QLjJg6VfLuQSSaGjlOCZgdbKfd/+RFO+uIEn8rUAVSNECMWEZ +XriX7613t2Saer9fwRPvm2L7DWzgVGkWqQPabumDk3F2xmmFghcCAwEAAaNCMEAw +DgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI/wS3+o +LkUkrk1Q+mOai97i3Ru8MA0GCSqGSIb3DQEBCwUAA4IBAQBLQNvAUKr+yAzv95ZU +RUm7lgAJQayzE4aGKAczymvmdLm6AC2upArT9fHxD4q/c2dKg8dEe3jgr25sbwMp +jjM5RcOO5LlXbKr8EpbsU8Yt5CRsuZRj+9xTaGdWPoO4zzUhw8lo/s7awlOqzJCK +6fBdRoyV3XpYKBovHd7NADdBj+1EbddTKJd+82cEHhXXipa0095MJ6RMG3NzdvQX +mcIfeg7jLQitChws/zyrVQ4PkX4268NXSb7hLi18YIvDQVETI53O9zJrlAGomecs +Mx86OyXShkDOOyyGeMlhLxS67ttVb9+E7gUJTb0o2HLO02JQZR7rkpeDMdmztcpH +WD9f +-----END CERTIFICATE----- + +# Issuer: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 +# Subject: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 +# Label: "Autoridad de Certificacion Firmaprofesional CIF A62634068" +# Serial: 6047274297262753887 +# MD5 Fingerprint: 73:3a:74:7a:ec:bb:a3:96:a6:c2:e4:e2:c8:9b:c0:c3 +# SHA1 Fingerprint: ae:c5:fb:3f:c8:e1:bf:c4:e5:4f:03:07:5a:9a:e8:00:b7:f7:b6:fa +# SHA256 Fingerprint: 04:04:80:28:bf:1f:28:64:d4:8f:9a:d4:d8:32:94:36:6a:82:88:56:55:3f:3b:14:30:3f:90:14:7f:5d:40:ef +-----BEGIN CERTIFICATE----- +MIIGFDCCA/ygAwIBAgIIU+w77vuySF8wDQYJKoZIhvcNAQEFBQAwUTELMAkGA1UE +BhMCRVMxQjBABgNVBAMMOUF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIEZpcm1h +cHJvZmVzaW9uYWwgQ0lGIEE2MjYzNDA2ODAeFw0wOTA1MjAwODM4MTVaFw0zMDEy +MzEwODM4MTVaMFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUg +Q2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjgwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKlmuO6vj78aI14H9M2uDDUtd9 +thDIAl6zQyrET2qyyhxdKJp4ERppWVevtSBC5IsP5t9bpgOSL/UR5GLXMnE42QQM +cas9UX4PB99jBVzpv5RvwSmCwLTaUbDBPLutN0pcyvFLNg4kq7/DhHf9qFD0sefG +L9ItWY16Ck6WaVICqjaY7Pz6FIMMNx/Jkjd/14Et5cS54D40/mf0PmbR0/RAz15i +NA9wBj4gGFrO93IbJWyTdBSTo3OxDqqHECNZXyAFGUftaI6SEspd/NYrspI8IM/h +X68gvqB2f3bl7BqGYTM+53u0P6APjqK5am+5hyZvQWyIplD9amML9ZMWGxmPsu2b +m8mQ9QEM3xk9Dz44I8kvjwzRAv4bVdZO0I08r0+k8/6vKtMFnXkIoctXMbScyJCy +Z/QYFpM6/EfY0XiWMR+6KwxfXZmtY4laJCB22N/9q06mIqqdXuYnin1oKaPnirja +EbsXLZmdEyRG98Xi2J+Of8ePdG1asuhy9azuJBCtLxTa/y2aRnFHvkLfuwHb9H/T +KI8xWVvTyQKmtFLKbpf7Q8UIJm+K9Lv9nyiqDdVF8xM6HdjAeI9BZzwelGSuewvF +6NkBiDkal4ZkQdU7hwxu+g/GvUgUvzlN1J5Bto+WHWOWk9mVBngxaJ43BjuAiUVh +OSPHG0SjFeUc+JIwuwIDAQABo4HvMIHsMBIGA1UdEwEB/wQIMAYBAf8CAQEwDgYD +VR0PAQH/BAQDAgEGMB0GA1UdDgQWBBRlzeurNR4APn7VdMActHNHDhpkLzCBpgYD +VR0gBIGeMIGbMIGYBgRVHSAAMIGPMC8GCCsGAQUFBwIBFiNodHRwOi8vd3d3LmZp +cm1hcHJvZmVzaW9uYWwuY29tL2NwczBcBggrBgEFBQcCAjBQHk4AUABhAHMAZQBv +ACAAZABlACAAbABhACAAQgBvAG4AYQBuAG8AdgBhACAANAA3ACAAQgBhAHIAYwBl +AGwAbwBuAGEAIAAwADgAMAAxADcwDQYJKoZIhvcNAQEFBQADggIBABd9oPm03cXF +661LJLWhAqvdpYhKsg9VSytXjDvlMd3+xDLx51tkljYyGOylMnfX40S2wBEqgLk9 +am58m9Ot/MPWo+ZkKXzR4Tgegiv/J2Wv+xYVxC5xhOW1//qkR71kMrv2JYSiJ0L1 +ILDCExARzRAVukKQKtJE4ZYm6zFIEv0q2skGz3QeqUvVhyj5eTSSPi5E6PaPT481 +PyWzOdxjKpBrIF/EUhJOlywqrJ2X3kjyo2bbwtKDlaZmp54lD+kLM5FlClrD2VQS +3a/DTg4fJl4N3LON7NWBcN7STyQF82xO9UxJZo3R/9ILJUFI/lGExkKvgATP0H5k +SeTy36LssUzAKh3ntLFlosS88Zj0qnAHY7S42jtM+kAiMFsRpvAFDsYCA0irhpuF +3dvd6qJ2gHN99ZwExEWN57kci57q13XRcrHedUTnQn3iV2t93Jm8PYMo6oCTjcVM +ZcFwgbg4/EMxsvYDNEeyrPsiBsse3RdHHF9mudMaotoRsaS8I8nkvof/uZS2+F0g +StRf571oe2XyFR7SOqkt6dhrJKyXWERHrVkY8SFlcN7ONGCoQPHzPKTDKCOM/icz +Q0CgFzzr6juwcqajuUpLXhZI9LK8yIySxZ2frHI2vDSANGupi5LAuBft7HZT9SQB +jLMi6Et8Vcad+qMUu2WFbm5PEn4KPJ2V +-----END CERTIFICATE----- + +# Issuer: CN=Izenpe.com O=IZENPE S.A. +# Subject: CN=Izenpe.com O=IZENPE S.A. +# Label: "Izenpe.com" +# Serial: 917563065490389241595536686991402621 +# MD5 Fingerprint: a6:b0:cd:85:80:da:5c:50:34:a3:39:90:2f:55:67:73 +# SHA1 Fingerprint: 2f:78:3d:25:52:18:a7:4a:65:39:71:b5:2c:a2:9c:45:15:6f:e9:19 +# SHA256 Fingerprint: 25:30:cc:8e:98:32:15:02:ba:d9:6f:9b:1f:ba:1b:09:9e:2d:29:9e:0f:45:48:bb:91:4f:36:3b:c0:d4:53:1f +-----BEGIN CERTIFICATE----- +MIIF8TCCA9mgAwIBAgIQALC3WhZIX7/hy/WL1xnmfTANBgkqhkiG9w0BAQsFADA4 +MQswCQYDVQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6 +ZW5wZS5jb20wHhcNMDcxMjEzMTMwODI4WhcNMzcxMjEzMDgyNzI1WjA4MQswCQYD +VQQGEwJFUzEUMBIGA1UECgwLSVpFTlBFIFMuQS4xEzARBgNVBAMMCkl6ZW5wZS5j +b20wggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ03rKDx6sp4boFmVq +scIbRTJxldn+EFvMr+eleQGPicPK8lVx93e+d5TzcqQsRNiekpsUOqHnJJAKClaO +xdgmlOHZSOEtPtoKct2jmRXagaKH9HtuJneJWK3W6wyyQXpzbm3benhB6QiIEn6H +LmYRY2xU+zydcsC8Lv/Ct90NduM61/e0aL6i9eOBbsFGb12N4E3GVFWJGjMxCrFX +uaOKmMPsOzTFlUFpfnXCPCDFYbpRR6AgkJOhkEvzTnyFRVSa0QUmQbC1TR0zvsQD +yCV8wXDbO/QJLVQnSKwv4cSsPsjLkkxTOTcj7NMB+eAJRE1NZMDhDVqHIrytG6P+ +JrUV86f8hBnp7KGItERphIPzidF0BqnMC9bC3ieFUCbKF7jJeodWLBoBHmy+E60Q +rLUk9TiRodZL2vG70t5HtfG8gfZZa88ZU+mNFctKy6lvROUbQc/hhqfK0GqfvEyN +BjNaooXlkDWgYlwWTvDjovoDGrQscbNYLN57C9saD+veIR8GdwYDsMnvmfzAuU8L +hij+0rnq49qlw0dpEuDb8PYZi+17cNcC1u2HGCgsBCRMd+RIihrGO5rUD8r6ddIB +QFqNeb+Lz0vPqhbBleStTIo+F5HUsWLlguWABKQDfo2/2n+iD5dPDNMN+9fR5XJ+ +HMh3/1uaD7euBUbl8agW7EekFwIDAQABo4H2MIHzMIGwBgNVHREEgagwgaWBD2lu +Zm9AaXplbnBlLmNvbaSBkTCBjjFHMEUGA1UECgw+SVpFTlBFIFMuQS4gLSBDSUYg +QTAxMzM3MjYwLVJNZXJjLlZpdG9yaWEtR2FzdGVpeiBUMTA1NSBGNjIgUzgxQzBB +BgNVBAkMOkF2ZGEgZGVsIE1lZGl0ZXJyYW5lbyBFdG9yYmlkZWEgMTQgLSAwMTAx +MCBWaXRvcmlhLUdhc3RlaXowDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFB0cZQ6o8iV7tJHP5LGx5r1VdGwFMA0GCSqGSIb3DQEBCwUA +A4ICAQB4pgwWSp9MiDrAyw6lFn2fuUhfGI8NYjb2zRlrrKvV9pF9rnHzP7MOeIWb +laQnIUdCSnxIOvVFfLMMjlF4rJUT3sb9fbgakEyrkgPH7UIBzg/YsfqikuFgba56 +awmqxinuaElnMIAkejEWOVt+8Rwu3WwJrfIxwYJOubv5vr8qhT/AQKM6WfxZSzwo +JNu0FXWuDYi6LnPAvViH5ULy617uHjAimcs30cQhbIHsvm0m5hzkQiCeR7Csg1lw +LDXWrzY0tM07+DKo7+N4ifuNRSzanLh+QBxh5z6ikixL8s36mLYp//Pye6kfLqCT +VyvehQP5aTfLnnhqBbTFMXiJ7HqnheG5ezzevh55hM6fcA5ZwjUukCox2eRFekGk +LhObNA5me0mrZJfQRsN5nXJQY6aYWwa9SG3YOYNw6DXwBdGqvOPbyALqfP2C2sJb +UjWumDqtujWTI6cfSN01RpiyEGjkpTHCClguGYEQyVB1/OpaFs4R1+7vUIgtYf8/ +QnMFlEPVjjxOAToZpR9GTnfQXeWBIiGH/pR9hNiTrdZoQ0iy2+tzJOeRf1SktoA+ +naM8THLCV8Sg1Mw4J87VBp6iSNnpn86CcDaTmjvfliHjWbcM2pE38P1ZWrOZyGls +QyYBNWNgVYkDOnXYukrZVP/u3oDYLdE41V4tC5h9Pmzb/CaIxw== +-----END CERTIFICATE----- + +# Issuer: CN=Go Daddy Root Certificate Authority - G2 O=GoDaddy.com, Inc. +# Subject: CN=Go Daddy Root Certificate Authority - G2 O=GoDaddy.com, Inc. +# Label: "Go Daddy Root Certificate Authority - G2" +# Serial: 0 +# MD5 Fingerprint: 80:3a:bc:22:c1:e6:fb:8d:9b:3b:27:4a:32:1b:9a:01 +# SHA1 Fingerprint: 47:be:ab:c9:22:ea:e8:0e:78:78:34:62:a7:9f:45:c2:54:fd:e6:8b +# SHA256 Fingerprint: 45:14:0b:32:47:eb:9c:c8:c5:b4:f0:d7:b5:30:91:f7:32:92:08:9e:6e:5a:63:e2:74:9d:d3:ac:a9:19:8e:da +-----BEGIN CERTIFICATE----- +MIIDxTCCAq2gAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxGjAYBgNVBAoT +EUdvRGFkZHkuY29tLCBJbmMuMTEwLwYDVQQDEyhHbyBEYWRkeSBSb290IENlcnRp +ZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAwMFoXDTM3MTIzMTIz +NTk1OVowgYMxCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6b25hMRMwEQYDVQQH +EwpTY290dHNkYWxlMRowGAYDVQQKExFHb0RhZGR5LmNvbSwgSW5jLjExMC8GA1UE +AxMoR28gRGFkZHkgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIw +DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL9xYgjx+lk09xvJGKP3gElY6SKD +E6bFIEMBO4Tx5oVJnyfq9oQbTqC023CYxzIBsQU+B07u9PpPL1kwIuerGVZr4oAH +/PMWdYA5UXvl+TW2dE6pjYIT5LY/qQOD+qK+ihVqf94Lw7YZFAXK6sOoBJQ7Rnwy +DfMAZiLIjWltNowRGLfTshxgtDj6AozO091GB94KPutdfMh8+7ArU6SSYmlRJQVh +GkSBjCypQ5Yj36w6gZoOKcUcqeldHraenjAKOc7xiID7S13MMuyFYkMlNAJWJwGR +tDtwKj9useiciAF9n9T521NtYJ2/LOdYq7hfRvzOxBsDPAnrSTFcaUaz4EcCAwEA +AaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FDqahQcQZyi27/a9BUFuIMGU2g/eMA0GCSqGSIb3DQEBCwUAA4IBAQCZ21151fmX +WWcDYfF+OwYxdS2hII5PZYe096acvNjpL9DbWu7PdIxztDhC2gV7+AJ1uP2lsdeu +9tfeE8tTEH6KRtGX+rcuKxGrkLAngPnon1rpN5+r5N9ss4UXnT3ZJE95kTXWXwTr +gIOrmgIttRD02JDHBHNA7XIloKmf7J6raBKZV8aPEjoJpL1E/QYVN8Gb5DKj7Tjo +2GTzLH4U/ALqn83/B2gX2yKQOC16jdFU8WnjXzPKej17CuPKf1855eJ1usV2GDPO +LPAvTK33sefOT6jEm0pUBsV/fdUID+Ic/n4XuKxe9tQWskMJDE32p2u0mYRlynqI +4uJEvlz36hz1 +-----END CERTIFICATE----- + +# Issuer: CN=Starfield Root Certificate Authority - G2 O=Starfield Technologies, Inc. +# Subject: CN=Starfield Root Certificate Authority - G2 O=Starfield Technologies, Inc. +# Label: "Starfield Root Certificate Authority - G2" +# Serial: 0 +# MD5 Fingerprint: d6:39:81:c6:52:7e:96:69:fc:fc:ca:66:ed:05:f2:96 +# SHA1 Fingerprint: b5:1c:06:7c:ee:2b:0c:3d:f8:55:ab:2d:92:f4:fe:39:d4:e7:0f:0e +# SHA256 Fingerprint: 2c:e1:cb:0b:f9:d2:f9:e1:02:99:3f:be:21:51:52:c3:b2:dd:0c:ab:de:1c:68:e5:31:9b:83:91:54:db:b7:f5 +-----BEGIN CERTIFICATE----- +MIID3TCCAsWgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xMjAwBgNVBAMTKVN0YXJmaWVs +ZCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5MDkwMTAwMDAw +MFoXDTM3MTIzMTIzNTk1OVowgY8xCzAJBgNVBAYTAlVTMRAwDgYDVQQIEwdBcml6 +b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFyZmllbGQgVGVj +aG5vbG9naWVzLCBJbmMuMTIwMAYDVQQDEylTdGFyZmllbGQgUm9vdCBDZXJ0aWZp +Y2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC +ggEBAL3twQP89o/8ArFvW59I2Z154qK3A2FWGMNHttfKPTUuiUP3oWmb3ooa/RMg +nLRJdzIpVv257IzdIvpy3Cdhl+72WoTsbhm5iSzchFvVdPtrX8WJpRBSiUZV9Lh1 +HOZ/5FSuS/hVclcCGfgXcVnrHigHdMWdSL5stPSksPNkN3mSwOxGXn/hbVNMYq/N +Hwtjuzqd+/x5AJhhdM8mgkBj87JyahkNmcrUDnXMN/uLicFZ8WJ/X7NfZTD4p7dN +dloedl40wOiWVpmKs/B/pM293DIxfJHP4F8R+GuqSVzRmZTRouNjWwl2tVZi4Ut0 +HZbUJtQIBFnQmA4O5t78w+wfkPECAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAO +BgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFHwMMh+n2TB/xH1oo2Kooc6rB1snMA0G +CSqGSIb3DQEBCwUAA4IBAQARWfolTwNvlJk7mh+ChTnUdgWUXuEok21iXQnCoKjU +sHU48TRqneSfioYmUeYs0cYtbpUgSpIB7LiKZ3sx4mcujJUDJi5DnUox9g61DLu3 +4jd/IroAow57UvtruzvE03lRTs2Q9GcHGcg8RnoNAX3FWOdt5oUwF5okxBDgBPfg +8n/Uqgr/Qh037ZTlZFkSIHc40zI+OIF1lnP6aI+xy84fxez6nH7PfrHxBy22/L/K +pL/QlwVKvOoYKAKQvVR4CSFx09F9HdkWsKlhPdAKACL8x3vLCWRFCztAgfd9fDL1 +mMpYjn0q7pBZc2T5NnReJaH1ZgUufzkVqSr7UIuOhWn0 +-----END CERTIFICATE----- + +# Issuer: CN=Starfield Services Root Certificate Authority - G2 O=Starfield Technologies, Inc. +# Subject: CN=Starfield Services Root Certificate Authority - G2 O=Starfield Technologies, Inc. +# Label: "Starfield Services Root Certificate Authority - G2" +# Serial: 0 +# MD5 Fingerprint: 17:35:74:af:7b:61:1c:eb:f4:f9:3c:e2:ee:40:f9:a2 +# SHA1 Fingerprint: 92:5a:8f:8d:2c:6d:04:e0:66:5f:59:6a:ff:22:d8:63:e8:25:6f:3f +# SHA256 Fingerprint: 56:8d:69:05:a2:c8:87:08:a4:b3:02:51:90:ed:cf:ed:b1:97:4a:60:6a:13:c6:e5:29:0f:cb:2a:e6:3e:da:b5 +-----BEGIN CERTIFICATE----- +MIID7zCCAtegAwIBAgIBADANBgkqhkiG9w0BAQsFADCBmDELMAkGA1UEBhMCVVMx +EDAOBgNVBAgTB0FyaXpvbmExEzARBgNVBAcTClNjb3R0c2RhbGUxJTAjBgNVBAoT +HFN0YXJmaWVsZCBUZWNobm9sb2dpZXMsIEluYy4xOzA5BgNVBAMTMlN0YXJmaWVs +ZCBTZXJ2aWNlcyBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAtIEcyMB4XDTA5 +MDkwMTAwMDAwMFoXDTM3MTIzMTIzNTk1OVowgZgxCzAJBgNVBAYTAlVTMRAwDgYD +VQQIEwdBcml6b25hMRMwEQYDVQQHEwpTY290dHNkYWxlMSUwIwYDVQQKExxTdGFy +ZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTswOQYDVQQDEzJTdGFyZmllbGQgU2Vy +dmljZXMgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgLSBHMjCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBANUMOsQq+U7i9b4Zl1+OiFOxHz/Lz58gE20p +OsgPfTz3a3Y4Y9k2YKibXlwAgLIvWX/2h/klQ4bnaRtSmpDhcePYLQ1Ob/bISdm2 +8xpWriu2dBTrz/sm4xq6HZYuajtYlIlHVv8loJNwU4PahHQUw2eeBGg6345AWh1K +Ts9DkTvnVtYAcMtS7nt9rjrnvDH5RfbCYM8TWQIrgMw0R9+53pBlbQLPLJGmpufe +hRhJfGZOozptqbXuNC66DQO4M99H67FrjSXZm86B0UVGMpZwh94CDklDhbZsc7tk +6mFBrMnUVN+HL8cisibMn1lUaJ/8viovxFUcdUBgF4UCVTmLfwUCAwEAAaNCMEAw +DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFJxfAN+q +AdcwKziIorhtSpzyEZGDMA0GCSqGSIb3DQEBCwUAA4IBAQBLNqaEd2ndOxmfZyMI +bw5hyf2E3F/YNoHN2BtBLZ9g3ccaaNnRbobhiCPPE95Dz+I0swSdHynVv/heyNXB +ve6SbzJ08pGCL72CQnqtKrcgfU28elUSwhXqvfdqlS5sdJ/PHLTyxQGjhdByPq1z +qwubdQxtRbeOlKyWN7Wg0I8VRw7j6IPdj/3vQQF3zCepYoUz8jcI73HPdwbeyBkd +iEDPfUYd/x7H4c7/I9vG+o1VTqkC50cRRj70/b17KSa7qWFiNyi2LSr2EIZkyXCn +0q23KXB56jzaYyWf/Wi3MOxw+3WKt21gZ7IeyLnp2KhvAotnDU0mV3HaIPzBSlCN +sSi6 +-----END CERTIFICATE----- + +# Issuer: CN=AffirmTrust Commercial O=AffirmTrust +# Subject: CN=AffirmTrust Commercial O=AffirmTrust +# Label: "AffirmTrust Commercial" +# Serial: 8608355977964138876 +# MD5 Fingerprint: 82:92:ba:5b:ef:cd:8a:6f:a6:3d:55:f9:84:f6:d6:b7 +# SHA1 Fingerprint: f9:b5:b6:32:45:5f:9c:be:ec:57:5f:80:dc:e9:6e:2c:c7:b2:78:b7 +# SHA256 Fingerprint: 03:76:ab:1d:54:c5:f9:80:3c:e4:b2:e2:01:a0:ee:7e:ef:7b:57:b6:36:e8:a9:3c:9b:8d:48:60:c9:6f:5f:a7 +-----BEGIN CERTIFICATE----- +MIIDTDCCAjSgAwIBAgIId3cGJyapsXwwDQYJKoZIhvcNAQELBQAwRDELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz +dCBDb21tZXJjaWFsMB4XDTEwMDEyOTE0MDYwNloXDTMwMTIzMTE0MDYwNlowRDEL +MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp +cm1UcnVzdCBDb21tZXJjaWFsMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEA9htPZwcroRX1BiLLHwGy43NFBkRJLLtJJRTWzsO3qyxPxkEylFf6EqdbDuKP +Hx6GGaeqtS25Xw2Kwq+FNXkyLbscYjfysVtKPcrNcV/pQr6U6Mje+SJIZMblq8Yr +ba0F8PrVC8+a5fBQpIs7R6UjW3p6+DM/uO+Zl+MgwdYoic+U+7lF7eNAFxHUdPAL +MeIrJmqbTFeurCA+ukV6BfO9m2kVrn1OIGPENXY6BwLJN/3HR+7o8XYdcxXyl6S1 +yHp52UKqK39c/s4mT6NmgTWvRLpUHhwwMmWd5jyTXlBOeuM61G7MGvv50jeuJCqr +VwMiKA1JdX+3KNp1v47j3A55MQIDAQABo0IwQDAdBgNVHQ4EFgQUnZPGU4teyq8/ +nx4P5ZmVvCT2lI8wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ +KoZIhvcNAQELBQADggEBAFis9AQOzcAN/wr91LoWXym9e2iZWEnStB03TX8nfUYG +XUPGhi4+c7ImfU+TqbbEKpqrIZcUsd6M06uJFdhrJNTxFq7YpFzUf1GO7RgBsZNj +vbz4YYCanrHOQnDiqX0GJX0nof5v7LMeJNrjS1UaADs1tDvZ110w/YETifLCBivt +Z8SOyUOyXGsViQK8YvxO8rUzqrJv0wqiUOP2O+guRMLbZjipM1ZI8W0bM40NjD9g +N53Tym1+NH4Nn3J2ixufcv1SNUFFApYvHLKac0khsUlHRUe072o0EclNmsxZt9YC +nlpOZbWUrhvfKbAW8b8Angc6F2S1BLUjIZkKlTuXfO8= +-----END CERTIFICATE----- + +# Issuer: CN=AffirmTrust Networking O=AffirmTrust +# Subject: CN=AffirmTrust Networking O=AffirmTrust +# Label: "AffirmTrust Networking" +# Serial: 8957382827206547757 +# MD5 Fingerprint: 42:65:ca:be:01:9a:9a:4c:a9:8c:41:49:cd:c0:d5:7f +# SHA1 Fingerprint: 29:36:21:02:8b:20:ed:02:f5:66:c5:32:d1:d6:ed:90:9f:45:00:2f +# SHA256 Fingerprint: 0a:81:ec:5a:92:97:77:f1:45:90:4a:f3:8d:5d:50:9f:66:b5:e2:c5:8f:cd:b5:31:05:8b:0e:17:f3:f0:b4:1b +-----BEGIN CERTIFICATE----- +MIIDTDCCAjSgAwIBAgIIfE8EORzUmS0wDQYJKoZIhvcNAQEFBQAwRDELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZpcm1UcnVz +dCBOZXR3b3JraW5nMB4XDTEwMDEyOTE0MDgyNFoXDTMwMTIzMTE0MDgyNFowRDEL +MAkGA1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MR8wHQYDVQQDDBZBZmZp +cm1UcnVzdCBOZXR3b3JraW5nMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC +AQEAtITMMxcua5Rsa2FSoOujz3mUTOWUgJnLVWREZY9nZOIG41w3SfYvm4SEHi3y +YJ0wTsyEheIszx6e/jarM3c1RNg1lho9Nuh6DtjVR6FqaYvZ/Ls6rnla1fTWcbua +kCNrmreIdIcMHl+5ni36q1Mr3Lt2PpNMCAiMHqIjHNRqrSK6mQEubWXLviRmVSRL +QESxG9fhwoXA3hA/Pe24/PHxI1Pcv2WXb9n5QHGNfb2V1M6+oF4nI979ptAmDgAp +6zxG8D1gvz9Q0twmQVGeFDdCBKNwV6gbh+0t+nvujArjqWaJGctB+d1ENmHP4ndG +yH329JKBNv3bNPFyfvMMFr20FQIDAQABo0IwQDAdBgNVHQ4EFgQUBx/S55zawm6i +QLSwelAQUHTEyL0wDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwDQYJ +KoZIhvcNAQEFBQADggEBAIlXshZ6qML91tmbmzTCnLQyFE2npN/svqe++EPbkTfO +tDIuUFUaNU52Q3Eg75N3ThVwLofDwR1t3Mu1J9QsVtFSUzpE0nPIxBsFZVpikpzu +QY0x2+c06lkh1QF612S4ZDnNye2v7UsDSKegmQGA3GWjNq5lWUhPgkvIZfFXHeVZ +Lgo/bNjR9eUJtGxUAArgFU2HdW23WJZa3W3SAKD0m0i+wzekujbgfIeFlxoVot4u +olu9rxj5kFDNcFn4J2dHy8egBzp90SxdbBk6ZrV9/ZFvgrG+CJPbFEfxojfHRZ48 +x3evZKiT3/Zpg4Jg8klCNO1aAFSFHBY2kgxc+qatv9s= +-----END CERTIFICATE----- + +# Issuer: CN=AffirmTrust Premium O=AffirmTrust +# Subject: CN=AffirmTrust Premium O=AffirmTrust +# Label: "AffirmTrust Premium" +# Serial: 7893706540734352110 +# MD5 Fingerprint: c4:5d:0e:48:b6:ac:28:30:4e:0a:bc:f9:38:16:87:57 +# SHA1 Fingerprint: d8:a6:33:2c:e0:03:6f:b1:85:f6:63:4f:7d:6a:06:65:26:32:28:27 +# SHA256 Fingerprint: 70:a7:3f:7f:37:6b:60:07:42:48:90:45:34:b1:14:82:d5:bf:0e:69:8e:cc:49:8d:f5:25:77:eb:f2:e9:3b:9a +-----BEGIN CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIIbYwURrGmCu4wDQYJKoZIhvcNAQEMBQAwQTELMAkGA1UE +BhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1UcnVz +dCBQcmVtaXVtMB4XDTEwMDEyOTE0MTAzNloXDTQwMTIzMTE0MTAzNlowQTELMAkG +A1UEBhMCVVMxFDASBgNVBAoMC0FmZmlybVRydXN0MRwwGgYDVQQDDBNBZmZpcm1U +cnVzdCBQcmVtaXVtMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxBLf +qV/+Qd3d9Z+K4/as4Tx4mrzY8H96oDMq3I0gW64tb+eT2TZwamjPjlGjhVtnBKAQ +JG9dKILBl1fYSCkTtuG+kU3fhQxTGJoeJKJPj/CihQvL9Cl/0qRY7iZNyaqoe5rZ ++jjeRFcV5fiMyNlI4g0WJx0eyIOFJbe6qlVBzAMiSy2RjYvmia9mx+n/K+k8rNrS +s8PhaJyJ+HoAVt70VZVs+7pk3WKL3wt3MutizCaam7uqYoNMtAZ6MMgpv+0GTZe5 +HMQxK9VfvFMSF5yZVylmd2EhMQcuJUmdGPLu8ytxjLW6OQdJd/zvLpKQBY0tL3d7 +70O/Nbua2Plzpyzy0FfuKE4mX4+QaAkvuPjcBukumj5Rp9EixAqnOEhss/n/fauG +V+O61oV4d7pD6kh/9ti+I20ev9E2bFhc8e6kGVQa9QPSdubhjL08s9NIS+LI+H+S +qHZGnEJlPqQewQcDWkYtuJfzt9WyVSHvutxMAJf7FJUnM7/oQ0dG0giZFmA7mn7S +5u046uwBHjxIVkkJx0w3AJ6IDsBz4W9m6XJHMD4Q5QsDyZpCAGzFlH5hxIrff4Ia +C1nEWTJ3s7xgaVY5/bQGeyzWZDbZvUjthB9+pSKPKrhC9IK31FOQeE4tGv2Bb0TX +OwF0lkLgAOIua+rF7nKsu7/+6qqo+Nz2snmKtmcCAwEAAaNCMEAwHQYDVR0OBBYE +FJ3AZ6YMItkm9UWrpmVSESfYRaxjMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgEGMA0GCSqGSIb3DQEBDAUAA4ICAQCzV00QYk465KzquByvMiPIs0laUZx2 +KI15qldGF9X1Uva3ROgIRL8YhNILgM3FEv0AVQVhh0HctSSePMTYyPtwni94loMg +Nt58D2kTiKV1NpgIpsbfrM7jWNa3Pt668+s0QNiigfV4Py/VpfzZotReBA4Xrf5B +8OWycvpEgjNC6C1Y91aMYj+6QrCcDFx+LmUmXFNPALJ4fqENmS2NuB2OosSw/WDQ +MKSOyARiqcTtNd56l+0OOF6SL5Nwpamcb6d9Ex1+xghIsV5n61EIJenmJWtSKZGc +0jlzCFfemQa0W50QBuHCAKi4HEoCChTQwUHK+4w1IX2COPKpVJEZNZOUbWo6xbLQ +u4mGk+ibyQ86p3q4ofB4Rvr8Ny/lioTz3/4E2aFooC8k4gmVBtWVyuEklut89pMF +u+1z6S3RdTnX5yTb2E5fQ4+e0BQ5v1VwSJlXMbSc7kqYA5YwH2AG7hsj/oFgIxpH +YoWlzBk0gG+zrBrjn/B7SK3VAdlntqlyk+otZrWyuOQ9PLLvTIzq6we/qzWaVYa8 +GKa1qF60g2xraUDTn9zxw2lrueFtCfTxqlB2Cnp9ehehVZZCmTEJ3WARjQUwfuaO +RtGdFNrHF+QFlozEJLUbzxQHskD4o55BhrwE0GuWyCqANP2/7waj3VjFhT0+j/6e +KeC2uAloGRwYQw== +-----END CERTIFICATE----- + +# Issuer: CN=AffirmTrust Premium ECC O=AffirmTrust +# Subject: CN=AffirmTrust Premium ECC O=AffirmTrust +# Label: "AffirmTrust Premium ECC" +# Serial: 8401224907861490260 +# MD5 Fingerprint: 64:b0:09:55:cf:b1:d5:99:e2:be:13:ab:a6:5d:ea:4d +# SHA1 Fingerprint: b8:23:6b:00:2f:1d:16:86:53:01:55:6c:11:a4:37:ca:eb:ff:c3:bb +# SHA256 Fingerprint: bd:71:fd:f6:da:97:e4:cf:62:d1:64:7a:dd:25:81:b0:7d:79:ad:f8:39:7e:b4:ec:ba:9c:5e:84:88:82:14:23 +-----BEGIN CERTIFICATE----- +MIIB/jCCAYWgAwIBAgIIdJclisc/elQwCgYIKoZIzj0EAwMwRTELMAkGA1UEBhMC +VVMxFDASBgNVBAoMC0FmZmlybVRydXN0MSAwHgYDVQQDDBdBZmZpcm1UcnVzdCBQ +cmVtaXVtIEVDQzAeFw0xMDAxMjkxNDIwMjRaFw00MDEyMzExNDIwMjRaMEUxCzAJ +BgNVBAYTAlVTMRQwEgYDVQQKDAtBZmZpcm1UcnVzdDEgMB4GA1UEAwwXQWZmaXJt +VHJ1c3QgUHJlbWl1bSBFQ0MwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQNMF4bFZ0D +0KF5Nbc6PJJ6yhUczWLznCZcBz3lVPqj1swS6vQUX+iOGasvLkjmrBhDeKzQN8O9 +ss0s5kfiGuZjuD0uL3jET9v0D6RoTFVya5UdThhClXjMNzyR4ptlKymjQjBAMB0G +A1UdDgQWBBSaryl6wBE1NSZRMADDav5A1a7WPDAPBgNVHRMBAf8EBTADAQH/MA4G +A1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNnADBkAjAXCfOHiFBar8jAQr9HX/Vs +aobgxCd05DhT1wV/GzTjxi+zygk8N53X57hG8f2h4nECMEJZh0PUUd+60wkyWs6I +flc9nF9Ca/UHLbXwgpP5WW+uZPpY5Yse42O+tYHNbwKMeQ== +-----END CERTIFICATE----- + +# Issuer: CN=Certum Trusted Network CA O=Unizeto Technologies S.A. OU=Certum Certification Authority +# Subject: CN=Certum Trusted Network CA O=Unizeto Technologies S.A. OU=Certum Certification Authority +# Label: "Certum Trusted Network CA" +# Serial: 279744 +# MD5 Fingerprint: d5:e9:81:40:c5:18:69:fc:46:2c:89:75:62:0f:aa:78 +# SHA1 Fingerprint: 07:e0:32:e0:20:b7:2c:3f:19:2f:06:28:a2:59:3a:19:a7:0f:06:9e +# SHA256 Fingerprint: 5c:58:46:8d:55:f5:8e:49:7e:74:39:82:d2:b5:00:10:b6:d1:65:37:4a:cf:83:a7:d4:a3:2d:b7:68:c4:40:8e +-----BEGIN CERTIFICATE----- +MIIDuzCCAqOgAwIBAgIDBETAMA0GCSqGSIb3DQEBBQUAMH4xCzAJBgNVBAYTAlBM +MSIwIAYDVQQKExlVbml6ZXRvIFRlY2hub2xvZ2llcyBTLkEuMScwJQYDVQQLEx5D +ZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxIjAgBgNVBAMTGUNlcnR1bSBU +cnVzdGVkIE5ldHdvcmsgQ0EwHhcNMDgxMDIyMTIwNzM3WhcNMjkxMjMxMTIwNzM3 +WjB+MQswCQYDVQQGEwJQTDEiMCAGA1UEChMZVW5pemV0byBUZWNobm9sb2dpZXMg +Uy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MSIw +IAYDVQQDExlDZXJ0dW0gVHJ1c3RlZCBOZXR3b3JrIENBMIIBIjANBgkqhkiG9w0B +AQEFAAOCAQ8AMIIBCgKCAQEA4/t9o3K6wvDJFIf1awFO4W5AB7ptJ11/91sts1rH +UV+rpDKmYYe2bg+G0jACl/jXaVehGDldamR5xgFZrDwxSjh80gTSSyjoIF87B6LM +TXPb865Px1bVWqeWifrzq2jUI4ZZJ88JJ7ysbnKDHDBy3+Ci6dLhdHUZvSqeexVU +BBvXQzmtVSjF4hq79MDkrjhJM8x2hZ85RdKknvISjFH4fOQtf/WsX+sWn7Et0brM +kUJ3TCXJkDhv2/DM+44el1k+1WBO5gUo7Ul5E0u6SNsv+XLTOcr+H9g0cvW0QM8x +AcPs3hEtF10fuFDRXhmnad4HMyjKUJX5p1TLVIZQRan5SQIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBQIds3LB/8k9sXN7buQvOKEN0Z19zAOBgNV +HQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEFBQADggEBAKaorSLOAT2mo/9i0Eidi15y +sHhE49wcrwn9I0j6vSrEuVUEtRCjjSfeC4Jj0O7eDDd5QVsisrCaQVymcODU0HfL +I9MA4GxWL+FpDQ3Zqr8hgVDZBqWo/5U30Kr+4rP1mS1FhIrlQgnXdAIv94nYmem8 +J9RHjboNRhx3zxSkHLmkMcScKHQDNP8zGSal6Q10tz6XxnboJ5ajZt3hrvJBW8qY +VoNzcOSGGtIxQbovvi0TWnZvTuhOgQ4/WwMioBK+ZlgRSssDxLQqKi2WF+A5VLxI +03YnnZotBqbJ7DnSq9ufmgsnAjUpsUCV5/nonFWIGUbWtzT1fs45mtk48VH3Tyw= +-----END CERTIFICATE----- + +# Issuer: CN=TWCA Root Certification Authority O=TAIWAN-CA OU=Root CA +# Subject: CN=TWCA Root Certification Authority O=TAIWAN-CA OU=Root CA +# Label: "TWCA Root Certification Authority" +# Serial: 1 +# MD5 Fingerprint: aa:08:8f:f6:f9:7b:b7:f2:b1:a7:1e:9b:ea:ea:bd:79 +# SHA1 Fingerprint: cf:9e:87:6d:d3:eb:fc:42:26:97:a3:b5:a3:7a:a0:76:a9:06:23:48 +# SHA256 Fingerprint: bf:d8:8f:e1:10:1c:41:ae:3e:80:1b:f8:be:56:35:0e:e9:ba:d1:a6:b9:bd:51:5e:dc:5c:6d:5b:87:11:ac:44 +-----BEGIN CERTIFICATE----- +MIIDezCCAmOgAwIBAgIBATANBgkqhkiG9w0BAQUFADBfMQswCQYDVQQGEwJUVzES +MBAGA1UECgwJVEFJV0FOLUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFU +V0NBIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMDgwODI4MDcyNDMz +WhcNMzAxMjMxMTU1OTU5WjBfMQswCQYDVQQGEwJUVzESMBAGA1UECgwJVEFJV0FO +LUNBMRAwDgYDVQQLDAdSb290IENBMSowKAYDVQQDDCFUV0NBIFJvb3QgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQCwfnK4pAOU5qfeCTiRShFAh6d8WWQUe7UREN3+v9XAu1bihSX0NXIP+FPQQeFE +AcK0HMMxQhZHhTMidrIKbw/lJVBPhYa+v5guEGcevhEFhgWQxFnQfHgQsIBct+HH +K3XLfJ+utdGdIzdjp9xCoi2SBBtQwXu4PhvJVgSLL1KbralW6cH/ralYhzC2gfeX +RfwZVzsrb+RH9JlF/h3x+JejiB03HFyP4HYlmlD4oFT/RJB2I9IyxsOrBr/8+7/z +rX2SYgJbKdM1o5OaQ2RgXbL6Mv87BK9NQGr5x+PvI/1ry+UPizgN7gr8/g+YnzAx +3WxSZfmLgb4i4RxYA7qRG4kHAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqOFsmjd6LWvJPelSDGRjjCDWmujANBgkq +hkiG9w0BAQUFAAOCAQEAPNV3PdrfibqHDAhUaiBQkr6wQT25JmSDCi/oQMCXKCeC +MErJk/9q56YAf4lCmtYR5VPOL8zy2gXE/uJQxDqGfczafhAJO5I1KlOy/usrBdls +XebQ79NqZp4VKIV66IIArB6nCWlWQtNoURi+VJq/REG6Sb4gumlc7rh3zc5sH62D +lhh9DrUUOYTxKOkto557HnpyWoOzeW/vtPzQCqVYT0bf+215WfKEIlKuD8z7fDvn +aspHYcN6+NOSBB+4IIThNlQWx0DeO4pz3N/GCUzf7Nr/1FNCocnyYh0igzyXxfkZ +YiesZSLX0zzG5Y6yU8xJzrww/nsOM5D77dIUkR8Hrw== +-----END CERTIFICATE----- + +# Issuer: O=SECOM Trust Systems CO.,LTD. OU=Security Communication RootCA2 +# Subject: O=SECOM Trust Systems CO.,LTD. OU=Security Communication RootCA2 +# Label: "Security Communication RootCA2" +# Serial: 0 +# MD5 Fingerprint: 6c:39:7d:a4:0e:55:59:b2:3f:d6:41:b1:12:50:de:43 +# SHA1 Fingerprint: 5f:3b:8c:f2:f8:10:b3:7d:78:b4:ce:ec:19:19:c3:73:34:b9:c7:74 +# SHA256 Fingerprint: 51:3b:2c:ec:b8:10:d4:cd:e5:dd:85:39:1a:df:c6:c2:dd:60:d8:7b:b7:36:d2:b5:21:48:4a:a4:7a:0e:be:f6 +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIBADANBgkqhkiG9w0BAQsFADBdMQswCQYDVQQGEwJKUDEl +MCMGA1UEChMcU0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UECxMe +U2VjdXJpdHkgQ29tbXVuaWNhdGlvbiBSb290Q0EyMB4XDTA5MDUyOTA1MDAzOVoX +DTI5MDUyOTA1MDAzOVowXTELMAkGA1UEBhMCSlAxJTAjBgNVBAoTHFNFQ09NIFRy +dXN0IFN5c3RlbXMgQ08uLExURC4xJzAlBgNVBAsTHlNlY3VyaXR5IENvbW11bmlj +YXRpb24gUm9vdENBMjCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANAV +OVKxUrO6xVmCxF1SrjpDZYBLx/KWvNs2l9amZIyoXvDjChz335c9S672XewhtUGr +zbl+dp+++T42NKA7wfYxEUV0kz1XgMX5iZnK5atq1LXaQZAQwdbWQonCv/Q4EpVM +VAX3NuRFg3sUZdbcDE3R3n4MqzvEFb46VqZab3ZpUql6ucjrappdUtAtCms1FgkQ +hNBqyjoGADdH5H5XTz+L62e4iKrFvlNVspHEfbmwhRkGeC7bYRr6hfVKkaHnFtWO +ojnflLhwHyg/i/xAXmODPIMqGplrz95Zajv8bxbXH/1KEOtOghY6rCcMU/Gt1SSw +awNQwS08Ft1ENCcadfsCAwEAAaNCMEAwHQYDVR0OBBYEFAqFqXdlBZh8QIH4D5cs +OPEK7DzPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3 +DQEBCwUAA4IBAQBMOqNErLlFsceTfsgLCkLfZOoc7llsCLqJX2rKSpWeeo8HxdpF +coJxDjrSzG+ntKEju/Ykn8sX/oymzsLS28yN/HH8AynBbF0zX2S2ZTuJbxh2ePXc +okgfGT+Ok+vx+hfuzU7jBBJV1uXk3fs+BXziHV7Gp7yXT2g69ekuCkO2r1dcYmh8 +t/2jioSgrGK+KwmHNPBqAbubKVY8/gA3zyNs8U6qtnRGEmyR7jTV7JqR50S+kDFy +1UkC9gLl9B/rfNmWVan/7Ir5mUf/NVoCqgTLiluHcSmRvaS0eg29mvVXIwAHIRc/ +SjnRBUkLp7Y3gaVdjKozXoEofKd9J+sAro03 +-----END CERTIFICATE----- + +# Issuer: CN=Actalis Authentication Root CA O=Actalis S.p.A./03358520967 +# Subject: CN=Actalis Authentication Root CA O=Actalis S.p.A./03358520967 +# Label: "Actalis Authentication Root CA" +# Serial: 6271844772424770508 +# MD5 Fingerprint: 69:c1:0d:4f:07:a3:1b:c3:fe:56:3d:04:bc:11:f6:a6 +# SHA1 Fingerprint: f3:73:b3:87:06:5a:28:84:8a:f2:f3:4a:ce:19:2b:dd:c7:8e:9c:ac +# SHA256 Fingerprint: 55:92:60:84:ec:96:3a:64:b9:6e:2a:be:01:ce:0b:a8:6a:64:fb:fe:bc:c7:aa:b5:af:c1:55:b3:7f:d7:60:66 +-----BEGIN CERTIFICATE----- +MIIFuzCCA6OgAwIBAgIIVwoRl0LE48wwDQYJKoZIhvcNAQELBQAwazELMAkGA1UE +BhMCSVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8w +MzM1ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290 +IENBMB4XDTExMDkyMjExMjIwMloXDTMwMDkyMjExMjIwMlowazELMAkGA1UEBhMC +SVQxDjAMBgNVBAcMBU1pbGFuMSMwIQYDVQQKDBpBY3RhbGlzIFMucC5BLi8wMzM1 +ODUyMDk2NzEnMCUGA1UEAwweQWN0YWxpcyBBdXRoZW50aWNhdGlvbiBSb290IENB +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAp8bEpSmkLO/lGMWwUKNv +UTufClrJwkg4CsIcoBh/kbWHuUA/3R1oHwiD1S0eiKD4j1aPbZkCkpAW1V8IbInX +4ay8IMKx4INRimlNAJZaby/ARH6jDuSRzVju3PvHHkVH3Se5CAGfpiEd9UEtL0z9 +KK3giq0itFZljoZUj5NDKd45RnijMCO6zfB9E1fAXdKDa0hMxKufgFpbOr3JpyI/ +gCczWw63igxdBzcIy2zSekciRDXFzMwujt0q7bd9Zg1fYVEiVRvjRuPjPdA1Yprb +rxTIW6HMiRvhMCb8oJsfgadHHwTrozmSBp+Z07/T6k9QnBn+locePGX2oxgkg4YQ +51Q+qDp2JE+BIcXjDwL4k5RHILv+1A7TaLndxHqEguNTVHnd25zS8gebLra8Pu2F +be8lEfKXGkJh90qX6IuxEAf6ZYGyojnP9zz/GPvG8VqLWeICrHuS0E4UT1lF9gxe +KF+w6D9Fz8+vm2/7hNN3WpVvrJSEnu68wEqPSpP4RCHiMUVhUE4Q2OM1fEwZtN4F +v6MGn8i1zeQf1xcGDXqVdFUNaBr8EBtiZJ1t4JWgw5QHVw0U5r0F+7if5t+L4sbn +fpb2U8WANFAoWPASUHEXMLrmeGO89LKtmyuy/uE5jF66CyCU3nuDuP/jVo23Eek7 +jPKxwV2dpAtMK9myGPW1n0sCAwEAAaNjMGEwHQYDVR0OBBYEFFLYiDrIn3hm7Ynz +ezhwlMkCAjbQMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUUtiIOsifeGbt +ifN7OHCUyQICNtAwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAL +e3KHwGCmSUyIWOYdiPcUZEim2FgKDk8TNd81HdTtBjHIgT5q1d07GjLukD0R0i70 +jsNjLiNmsGe+b7bAEzlgqqI0JZN1Ut6nna0Oh4lScWoWPBkdg/iaKWW+9D+a2fDz +WochcYBNy+A4mz+7+uAwTc+G02UQGRjRlwKxK3JCaKygvU5a2hi/a5iB0P2avl4V +SM0RFbnAKVy06Ij3Pjaut2L9HmLecHgQHEhb2rykOLpn7VU+Xlff1ANATIGk0k9j +pwlCCRT8AKnCgHNPLsBA2RF7SOp6AsDT6ygBJlh0wcBzIm2Tlf05fbsq4/aC4yyX +X04fkZT6/iyj2HYauE2yOE+b+h1IYHkm4vP9qdCa6HCPSXrW5b0KDtst842/6+Ok +fcvHlXHo2qN8xcL4dJIEG4aspCJTQLas/kx2z/uUMsA1n3Y/buWQbqCmJqK4LL7R +K4X9p2jIugErsWx0Hbhzlefut8cl8ABMALJ+tguLHPPAUJ4lueAI3jZm/zel0btU +ZCzJJ7VLkn5l/9Mt4blOvH+kQSGQQXemOR/qnuOf0GZvBeyqdn6/axag67XH/JJU +LysRJyU3eExRarDzzFhdFPFqSBX/wge2sY0PjlxQRrM9vwGYT7JZVEc+NHt4bVaT +LnPqZih4zR0Uv6CPLy64Lo7yFIrM6bV8+2ydDKXhlg== +-----END CERTIFICATE----- + +# Issuer: CN=Buypass Class 2 Root CA O=Buypass AS-983163327 +# Subject: CN=Buypass Class 2 Root CA O=Buypass AS-983163327 +# Label: "Buypass Class 2 Root CA" +# Serial: 2 +# MD5 Fingerprint: 46:a7:d2:fe:45:fb:64:5a:a8:59:90:9b:78:44:9b:29 +# SHA1 Fingerprint: 49:0a:75:74:de:87:0a:47:fe:58:ee:f6:c7:6b:eb:c6:0b:12:40:99 +# SHA256 Fingerprint: 9a:11:40:25:19:7c:5b:b9:5d:94:e6:3d:55:cd:43:79:08:47:b6:46:b2:3c:df:11:ad:a4:a0:0e:ff:15:fb:48 +-----BEGIN CERTIFICATE----- +MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd +MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg +Q2xhc3MgMiBSb290IENBMB4XDTEwMTAyNjA4MzgwM1oXDTQwMTAyNjA4MzgwM1ow +TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw +HgYDVQQDDBdCdXlwYXNzIENsYXNzIDIgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBANfHXvfBB9R3+0Mh9PT1aeTuMgHbo4Yf5FkNuud1g1Lr +6hxhFUi7HQfKjK6w3Jad6sNgkoaCKHOcVgb/S2TwDCo3SbXlzwx87vFKu3MwZfPV +L4O2fuPn9Z6rYPnT8Z2SdIrkHJasW4DptfQxh6NR/Md+oW+OU3fUl8FVM5I+GC91 +1K2GScuVr1QGbNgGE41b/+EmGVnAJLqBcXmQRFBoJJRfuLMR8SlBYaNByyM21cHx +MlAQTn/0hpPshNOOvEu/XAFOBz3cFIqUCqTqc/sLUegTBxj6DvEr0VQVfTzh97QZ +QmdiXnfgolXsttlpF9U6r0TtSsWe5HonfOV116rLJeffawrbD02TTqigzXsu8lkB +arcNuAeBfos4GzjmCleZPe4h6KP1DBbdi+w0jpwqHAAVF41og9JwnxgIzRFo1clr +Us3ERo/ctfPYV3Me6ZQ5BL/T3jjetFPsaRyifsSP5BtwrfKi+fv3FmRmaZ9JUaLi +FRhnBkp/1Wy1TbMz4GHrXb7pmA8y1x1LPC5aAVKRCfLf6o3YBkBjqhHk/sM3nhRS +P/TizPJhk9H9Z2vXUq6/aKtAQ6BXNVN48FP4YUIHZMbXb5tMOA1jrGKvNouicwoN +9SG9dKpN6nIDSdvHXx1iY8f93ZHsM+71bbRuMGjeyNYmsHVee7QHIJihdjK4TWxP +AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFMmAd+BikoL1Rpzz +uvdMw964o605MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAU18h +9bqwOlI5LJKwbADJ784g7wbylp7ppHR/ehb8t/W2+xUbP6umwHJdELFx7rxP462s +A20ucS6vxOOto70MEae0/0qyexAQH6dXQbLArvQsWdZHEIjzIVEpMMpghq9Gqx3t +OluwlN5E40EIosHsHdb9T7bWR9AUC8rmyrV7d35BH16Dx7aMOZawP5aBQW9gkOLo ++fsicdl9sz1Gv7SEr5AcD48Saq/v7h56rgJKihcrdv6sVIkkLE8/trKnToyokZf7 +KcZ7XC25y2a2t6hbElGFtQl+Ynhw/qlqYLYdDnkM/crqJIByw5c/8nerQyIKx+u2 +DISCLIBrQYoIwOula9+ZEsuK1V6ADJHgJgg2SMX6OBE1/yWDLfJ6v9r9jv6ly0Us +H8SIU653DtmadsWOLB2jutXsMq7Aqqz30XpN69QH4kj3Io6wpJ9qzo6ysmD0oyLQ +I+uUWnpp3Q+/QFesa1lQ2aOZ4W7+jQF5JyMV3pKdewlNWudLSDBaGOYKbeaP4NK7 +5t98biGCwWg5TbSYWGZizEqQXsP6JwSxeRV0mcy+rSDeJmAc61ZRpqPq5KM/p/9h +3PFaTWwyI0PurKju7koSCTxdccK+efrCh2gdC/1cacwG0Jp9VJkqyTkaGa9LKkPz +Y11aWOIv4x3kqdbQCtCev9eBCfHJxyYNrJgWVqA= +-----END CERTIFICATE----- + +# Issuer: CN=Buypass Class 3 Root CA O=Buypass AS-983163327 +# Subject: CN=Buypass Class 3 Root CA O=Buypass AS-983163327 +# Label: "Buypass Class 3 Root CA" +# Serial: 2 +# MD5 Fingerprint: 3d:3b:18:9e:2c:64:5a:e8:d5:88:ce:0e:f9:37:c2:ec +# SHA1 Fingerprint: da:fa:f7:fa:66:84:ec:06:8f:14:50:bd:c7:c2:81:a5:bc:a9:64:57 +# SHA256 Fingerprint: ed:f7:eb:bc:a2:7a:2a:38:4d:38:7b:7d:40:10:c6:66:e2:ed:b4:84:3e:4c:29:b4:ae:1d:5b:93:32:e6:b2:4d +-----BEGIN CERTIFICATE----- +MIIFWTCCA0GgAwIBAgIBAjANBgkqhkiG9w0BAQsFADBOMQswCQYDVQQGEwJOTzEd +MBsGA1UECgwUQnV5cGFzcyBBUy05ODMxNjMzMjcxIDAeBgNVBAMMF0J1eXBhc3Mg +Q2xhc3MgMyBSb290IENBMB4XDTEwMTAyNjA4Mjg1OFoXDTQwMTAyNjA4Mjg1OFow +TjELMAkGA1UEBhMCTk8xHTAbBgNVBAoMFEJ1eXBhc3MgQVMtOTgzMTYzMzI3MSAw +HgYDVQQDDBdCdXlwYXNzIENsYXNzIDMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEB +BQADggIPADCCAgoCggIBAKXaCpUWUOOV8l6ddjEGMnqb8RB2uACatVI2zSRHsJ8Y +ZLya9vrVediQYkwiL944PdbgqOkcLNt4EemOaFEVcsfzM4fkoF0LXOBXByow9c3E +N3coTRiR5r/VUv1xLXA+58bEiuPwKAv0dpihi4dVsjoT/Lc+JzeOIuOoTyrvYLs9 +tznDDgFHmV0ST9tD+leh7fmdvhFHJlsTmKtdFoqwNxxXnUX/iJY2v7vKB3tvh2PX +0DJq1l1sDPGzbjniazEuOQAnFN44wOwZZoYS6J1yFhNkUsepNxz9gjDthBgd9K5c +/3ATAOux9TN6S9ZV+AWNS2mw9bMoNlwUxFFzTWsL8TQH2xc519woe2v1n/MuwU8X +KhDzzMro6/1rqy6any2CbgTUUgGTLT2G/H783+9CHaZr77kgxve9oKeV/afmiSTY +zIw0bOIjL9kSGiG5VZFvC5F5GQytQIgLcOJ60g7YaEi7ghM5EFjp2CoHxhLbWNvS +O1UQRwUVZ2J+GGOmRj8JDlQyXr8NYnon74Do29lLBlo3WiXQCBJ31G8JUJc9yB3D +34xFMFbG02SrZvPAXpacw8Tvw3xrizp5f7NJzz3iiZ+gMEuFuZyUJHmPfWupRWgP +K9Dx2hzLabjKSWJtyNBjYt1gD1iqj6G8BaVmos8bdrKEZLFMOVLAMLrwjEsCsLa3 +AgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFEe4zf/lb+74suwv +Tg75JbCOPGvDMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAACAj +QTUEkMJAYmDv4jVM1z+s4jSQuKFvdvoWFqRINyzpkMLyPPgKn9iB5btb2iUspKdV +cSQy9sgL8rxq+JOssgfCX5/bzMiKqr5qb+FJEMwx14C7u8jYog5kV+qi9cKpMRXS +IGrs/CIBKM+GuIAeqcwRpTzyFrNHnfzSgCHEy9BHcEGhyoMZCCxt8l13nIoUE9Q2 +HJLw5QY33KbmkJs4j1xrG0aGQ0JfPgEHU1RdZX33inOhmlRaHylDFCfChQ+1iHsa +O5S3HWCntZznKWlXWpuTekMwGwPXYshApqr8ZORK15FTAaggiG6cX0S5y2CBNOxv +033aSF/rtJC8LakcC6wc1aJoIIAE1vyxjy+7SjENSoYc6+I2KSb12tjE8nVhz36u +dmNKekBlk4f4HoCMhuWG1o8O/FMsYOgWYRqiPkN7zTlgVGr18okmAWiDSKIz6MkE +kbIRNBE+6tBDGR8Dk5AM/1E9V/RBbuHLoL7ryWPNbczk+DaqaJ3tvV2XcEQNtg41 +3OEMXbugUZTLfhbrES+jkkXITHHZvMmZUldGL1DPvTVp9D0VzgalLA8+9oG6lLvD +u79leNKGef9JOxqDDPDeeOzI8k1MGt6CKfjBWtrt7uYnXuhF0J0cUahoq0Tj0Itq +4/g7u9xN12TyUb7mqqta6THuBrxzvxNiCp/HuZc= +-----END CERTIFICATE----- + +# Issuer: CN=T-TeleSec GlobalRoot Class 3 O=T-Systems Enterprise Services GmbH OU=T-Systems Trust Center +# Subject: CN=T-TeleSec GlobalRoot Class 3 O=T-Systems Enterprise Services GmbH OU=T-Systems Trust Center +# Label: "T-TeleSec GlobalRoot Class 3" +# Serial: 1 +# MD5 Fingerprint: ca:fb:40:a8:4e:39:92:8a:1d:fe:8e:2f:c4:27:ea:ef +# SHA1 Fingerprint: 55:a6:72:3e:cb:f2:ec:cd:c3:23:74:70:19:9d:2a:be:11:e3:81:d1 +# SHA256 Fingerprint: fd:73:da:d3:1c:64:4f:f1:b4:3b:ef:0c:cd:da:96:71:0b:9c:d9:87:5e:ca:7e:31:70:7a:f3:e9:6d:52:2b:bd +-----BEGIN CERTIFICATE----- +MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx +KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd +BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl +YyBHbG9iYWxSb290IENsYXNzIDMwHhcNMDgxMDAxMTAyOTU2WhcNMzMxMDAxMjM1 +OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy +aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 +ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDMwggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC9dZPwYiJvJK7genasfb3ZJNW4t/zN +8ELg63iIVl6bmlQdTQyK9tPPcPRStdiTBONGhnFBSivwKixVA9ZIw+A5OO3yXDw/ +RLyTPWGrTs0NvvAgJ1gORH8EGoel15YUNpDQSXuhdfsaa3Ox+M6pCSzyU9XDFES4 +hqX2iys52qMzVNn6chr3IhUciJFrf2blw2qAsCTz34ZFiP0Zf3WHHx+xGwpzJFu5 +ZeAsVMhg02YXP+HMVDNzkQI6pn97djmiH5a2OK61yJN0HZ65tOVgnS9W0eDrXltM +EnAMbEQgqxHY9Bn20pxSN+f6tsIxO0rUFJmtxxr1XV/6B7h8DR/Wgx6zAgMBAAGj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS1 +A/d2O2GCahKqGFPrAyGUv/7OyjANBgkqhkiG9w0BAQsFAAOCAQEAVj3vlNW92nOy +WL6ukK2YJ5f+AbGwUgC4TeQbIXQbfsDuXmkqJa9c1h3a0nnJ85cp4IaH3gRZD/FZ +1GSFS5mvJQQeyUapl96Cshtwn5z2r3Ex3XsFpSzTucpH9sry9uetuUg/vBa3wW30 +6gmv7PO15wWeph6KU1HWk4HMdJP2udqmJQV0eVp+QD6CSyYRMG7hP0HHRwA11fXT +91Q+gT3aSWqas+8QPebrb9HIIkfLzM8BMZLZGOMivgkeGj5asuRrDFR6fUNOuIml +e9eiPZaGzPImNC1qkp2aGtAw4l1OBLBfiyB+d8E9lYLRRpo7PHi4b6HQDWSieB4p +TpPDpFQUWw== +-----END CERTIFICATE----- + +# Issuer: CN=D-TRUST Root Class 3 CA 2 2009 O=D-Trust GmbH +# Subject: CN=D-TRUST Root Class 3 CA 2 2009 O=D-Trust GmbH +# Label: "D-TRUST Root Class 3 CA 2 2009" +# Serial: 623603 +# MD5 Fingerprint: cd:e0:25:69:8d:47:ac:9c:89:35:90:f7:fd:51:3d:2f +# SHA1 Fingerprint: 58:e8:ab:b0:36:15:33:fb:80:f7:9b:1b:6d:29:d3:ff:8d:5f:00:f0 +# SHA256 Fingerprint: 49:e7:a4:42:ac:f0:ea:62:87:05:00:54:b5:25:64:b6:50:e4:f4:9e:42:e3:48:d6:aa:38:e0:39:e9:57:b1:c1 +-----BEGIN CERTIFICATE----- +MIIEMzCCAxugAwIBAgIDCYPzMA0GCSqGSIb3DQEBCwUAME0xCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMMHkQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIgMjAwOTAeFw0wOTExMDUwODM1NThaFw0yOTExMDUwODM1NTha +ME0xCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxJzAlBgNVBAMM +HkQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgMjAwOTCCASIwDQYJKoZIhvcNAQEB +BQADggEPADCCAQoCggEBANOySs96R+91myP6Oi/WUEWJNTrGa9v+2wBoqOADER03 +UAifTUpolDWzU9GUY6cgVq/eUXjsKj3zSEhQPgrfRlWLJ23DEE0NkVJD2IfgXU42 +tSHKXzlABF9bfsyjxiupQB7ZNoTWSPOSHjRGICTBpFGOShrvUD9pXRl/RcPHAY9R +ySPocq60vFYJfxLLHLGvKZAKyVXMD9O0Gu1HNVpK7ZxzBCHQqr0ME7UAyiZsxGsM +lFqVlNpQmvH/pStmMaTJOKDfHR+4CS7zp+hnUquVH+BGPtikw8paxTGA6Eian5Rp +/hnd2HN8gcqW3o7tszIFZYQ05ub9VxC1X3a/L7AQDcUCAwEAAaOCARowggEWMA8G +A1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFP3aFMSfMN4hvR5COfyrYyNJ4PGEMA4G +A1UdDwEB/wQEAwIBBjCB0wYDVR0fBIHLMIHIMIGAoH6gfIZ6bGRhcDovL2RpcmVj +dG9yeS5kLXRydXN0Lm5ldC9DTj1ELVRSVVNUJTIwUm9vdCUyMENsYXNzJTIwMyUy +MENBJTIwMiUyMDIwMDksTz1ELVRydXN0JTIwR21iSCxDPURFP2NlcnRpZmljYXRl +cmV2b2NhdGlvbmxpc3QwQ6BBoD+GPWh0dHA6Ly93d3cuZC10cnVzdC5uZXQvY3Js +L2QtdHJ1c3Rfcm9vdF9jbGFzc18zX2NhXzJfMjAwOS5jcmwwDQYJKoZIhvcNAQEL +BQADggEBAH+X2zDI36ScfSF6gHDOFBJpiBSVYEQBrLLpME+bUMJm2H6NMLVwMeni +acfzcNsgFYbQDfC+rAF1hM5+n02/t2A7nPPKHeJeaNijnZflQGDSNiH+0LS4F9p0 +o3/U37CYAqxva2ssJSRyoWXuJVrl5jLn8t+rSfrzkGkj2wTZ51xY/GXUl77M/C4K +zCUqNQT4YJEVdT1B/yMfGchs64JTBKbkTCJNjYy6zltz7GRUUG3RnFX7acM2w4y8 +PIWmawomDeCTmGCufsYkl4phX5GOZpIJhzbNi5stPvZR1FDUWSi9g/LMKHtThm3Y +Johw1+qRzT65ysCQblrGXnRl11z+o+I= +-----END CERTIFICATE----- + +# Issuer: CN=D-TRUST Root Class 3 CA 2 EV 2009 O=D-Trust GmbH +# Subject: CN=D-TRUST Root Class 3 CA 2 EV 2009 O=D-Trust GmbH +# Label: "D-TRUST Root Class 3 CA 2 EV 2009" +# Serial: 623604 +# MD5 Fingerprint: aa:c6:43:2c:5e:2d:cd:c4:34:c0:50:4f:11:02:4f:b6 +# SHA1 Fingerprint: 96:c9:1b:0b:95:b4:10:98:42:fa:d0:d8:22:79:fe:60:fa:b9:16:83 +# SHA256 Fingerprint: ee:c5:49:6b:98:8c:e9:86:25:b9:34:09:2e:ec:29:08:be:d0:b0:f3:16:c2:d4:73:0c:84:ea:f1:f3:d3:48:81 +-----BEGIN CERTIFICATE----- +MIIEQzCCAyugAwIBAgIDCYP0MA0GCSqGSIb3DQEBCwUAMFAxCzAJBgNVBAYTAkRF +MRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNVBAMMIUQtVFJVU1QgUm9vdCBD +bGFzcyAzIENBIDIgRVYgMjAwOTAeFw0wOTExMDUwODUwNDZaFw0yOTExMDUwODUw +NDZaMFAxCzAJBgNVBAYTAkRFMRUwEwYDVQQKDAxELVRydXN0IEdtYkgxKjAoBgNV +BAMMIUQtVFJVU1QgUm9vdCBDbGFzcyAzIENBIDIgRVYgMjAwOTCCASIwDQYJKoZI +hvcNAQEBBQADggEPADCCAQoCggEBAJnxhDRwui+3MKCOvXwEz75ivJn9gpfSegpn +ljgJ9hBOlSJzmY3aFS3nBfwZcyK3jpgAvDw9rKFs+9Z5JUut8Mxk2og+KbgPCdM0 +3TP1YtHhzRnp7hhPTFiu4h7WDFsVWtg6uMQYZB7jM7K1iXdODL/ZlGsTl28So/6Z +qQTMFexgaDbtCHu39b+T7WYxg4zGcTSHThfqr4uRjRxWQa4iN1438h3Z0S0NL2lR +p75mpoo6Kr3HGrHhFPC+Oh25z1uxav60sUYgovseO3Dvk5h9jHOW8sXvhXCtKSb8 +HgQ+HKDYD8tSg2J87otTlZCpV6LqYQXY+U3EJ/pure3511H3a6UCAwEAAaOCASQw +ggEgMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFNOUikxiEyoZLsyvcop9Ntea +HNxnMA4GA1UdDwEB/wQEAwIBBjCB3QYDVR0fBIHVMIHSMIGHoIGEoIGBhn9sZGFw +Oi8vZGlyZWN0b3J5LmQtdHJ1c3QubmV0L0NOPUQtVFJVU1QlMjBSb290JTIwQ2xh +c3MlMjAzJTIwQ0ElMjAyJTIwRVYlMjAyMDA5LE89RC1UcnVzdCUyMEdtYkgsQz1E +RT9jZXJ0aWZpY2F0ZXJldm9jYXRpb25saXN0MEagRKBChkBodHRwOi8vd3d3LmQt +dHJ1c3QubmV0L2NybC9kLXRydXN0X3Jvb3RfY2xhc3NfM19jYV8yX2V2XzIwMDku +Y3JsMA0GCSqGSIb3DQEBCwUAA4IBAQA07XtaPKSUiO8aEXUHL7P+PPoeUSbrh/Yp +3uDx1MYkCenBz1UbtDDZzhr+BlGmFaQt77JLvyAoJUnRpjZ3NOhk31KxEcdzes05 +nsKtjHEh8lprr988TlWvsoRlFIm5d8sqMb7Po23Pb0iUMkZv53GMoKaEGTcH8gNF +CSuGdXzfX2lXANtu2KZyIktQ1HWYVt+3GP9DQ1CuekR78HlR10M9p9OB0/DJT7na +xpeG0ILD5EJt/rDiZE4OJudANCa1CInXCGNjOCd1HjPqbqjdn5lPdE2BiYBL3ZqX +KVwvvoFBuYz/6n1gBp7N1z3TLqMVvKjmJuVvw9y4AyHqnxbxLFS1 +-----END CERTIFICATE----- + +# Issuer: CN=CA Disig Root R2 O=Disig a.s. +# Subject: CN=CA Disig Root R2 O=Disig a.s. +# Label: "CA Disig Root R2" +# Serial: 10572350602393338211 +# MD5 Fingerprint: 26:01:fb:d8:27:a7:17:9a:45:54:38:1a:43:01:3b:03 +# SHA1 Fingerprint: b5:61:eb:ea:a4:de:e4:25:4b:69:1a:98:a5:57:47:c2:34:c7:d9:71 +# SHA256 Fingerprint: e2:3d:4a:03:6d:7b:70:e9:f5:95:b1:42:20:79:d2:b9:1e:df:bb:1f:b6:51:a0:63:3e:aa:8a:9d:c5:f8:07:03 +-----BEGIN CERTIFICATE----- +MIIFaTCCA1GgAwIBAgIJAJK4iNuwisFjMA0GCSqGSIb3DQEBCwUAMFIxCzAJBgNV +BAYTAlNLMRMwEQYDVQQHEwpCcmF0aXNsYXZhMRMwEQYDVQQKEwpEaXNpZyBhLnMu +MRkwFwYDVQQDExBDQSBEaXNpZyBSb290IFIyMB4XDTEyMDcxOTA5MTUzMFoXDTQy +MDcxOTA5MTUzMFowUjELMAkGA1UEBhMCU0sxEzARBgNVBAcTCkJyYXRpc2xhdmEx +EzARBgNVBAoTCkRpc2lnIGEucy4xGTAXBgNVBAMTEENBIERpc2lnIFJvb3QgUjIw +ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCio8QACdaFXS1tFPbCw3Oe +NcJxVX6B+6tGUODBfEl45qt5WDza/3wcn9iXAng+a0EE6UG9vgMsRfYvZNSrXaNH +PWSb6WiaxswbP7q+sos0Ai6YVRn8jG+qX9pMzk0DIaPY0jSTVpbLTAwAFjxfGs3I +x2ymrdMxp7zo5eFm1tL7A7RBZckQrg4FY8aAamkw/dLukO8NJ9+flXP04SXabBbe +QTg06ov80egEFGEtQX6sx3dOy1FU+16SGBsEWmjGycT6txOgmLcRK7fWV8x8nhfR +yyX+hk4kLlYMeE2eARKmK6cBZW58Yh2EhN/qwGu1pSqVg8NTEQxzHQuyRpDRQjrO +QG6Vrf/GlK1ul4SOfW+eioANSW1z4nuSHsPzwfPrLgVv2RvPN3YEyLRa5Beny912 +H9AZdugsBbPWnDTYltxhh5EF5EQIM8HauQhl1K6yNg3ruji6DOWbnuuNZt2Zz9aJ +QfYEkoopKW1rOhzndX0CcQ7zwOe9yxndnWCywmZgtrEE7snmhrmaZkCo5xHtgUUD +i/ZnWejBBhG93c+AAk9lQHhcR1DIm+YfgXvkRKhbhZri3lrVx/k6RGZL5DJUfORs +nLMOPReisjQS1n6yqEm70XooQL6iFh/f5DcfEXP7kAplQ6INfPgGAVUzfbANuPT1 +rqVCV3w2EYx7XsQDnYx5nQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1Ud +DwEB/wQEAwIBBjAdBgNVHQ4EFgQUtZn4r7CU9eMg1gqtzk5WpC5uQu0wDQYJKoZI +hvcNAQELBQADggIBACYGXnDnZTPIgm7ZnBc6G3pmsgH2eDtpXi/q/075KMOYKmFM +tCQSin1tERT3nLXK5ryeJ45MGcipvXrA1zYObYVybqjGom32+nNjf7xueQgcnYqf +GopTpti72TVVsRHFqQOzVju5hJMiXn7B9hJSi+osZ7z+Nkz1uM/Rs0mSO9MpDpkb +lvdhuDvEK7Z4bLQjb/D907JedR+Zlais9trhxTF7+9FGs9K8Z7RiVLoJ92Owk6Ka ++elSLotgEqv89WBW7xBci8QaQtyDW2QOy7W81k/BfDxujRNt+3vrMNDcTa/F1bal +TFtxyegxvug4BkihGuLq0t4SOVga/4AOgnXmt8kHbA7v/zjxmHHEt38OFdAlab0i +nSvtBfZGR6ztwPDUO+Ls7pZbkBNOHlY667DvlruWIxG68kOGdGSVyCh13x01utI3 +gzhTODY7z2zp+WsO0PsE6E9312UBeIYMej4hYvF/Y3EMyZ9E26gnonW+boE+18Dr +G5gPcFw0sorMwIUY6256s/daoQe/qUKS82Ail+QUoQebTnbAjn39pCXHR+3/H3Os +zMOl6W8KjptlwlCFtaOgUxLMVYdh84GuEEZhvUQhuMI9dM9+JDX6HAcOmz0iyu8x +L4ysEr3vQCj8KWefshNPZiTEUxnpHikV7+ZtsH8tZ/3zbBt1RqPlShfppNcL +-----END CERTIFICATE----- + +# Issuer: CN=ACCVRAIZ1 O=ACCV OU=PKIACCV +# Subject: CN=ACCVRAIZ1 O=ACCV OU=PKIACCV +# Label: "ACCVRAIZ1" +# Serial: 6828503384748696800 +# MD5 Fingerprint: d0:a0:5a:ee:05:b6:09:94:21:a1:7d:f1:b2:29:82:02 +# SHA1 Fingerprint: 93:05:7a:88:15:c6:4f:ce:88:2f:fa:91:16:52:28:78:bc:53:64:17 +# SHA256 Fingerprint: 9a:6e:c0:12:e1:a7:da:9d:be:34:19:4d:47:8a:d7:c0:db:18:22:fb:07:1d:f1:29:81:49:6e:d1:04:38:41:13 +-----BEGIN CERTIFICATE----- +MIIH0zCCBbugAwIBAgIIXsO3pkN/pOAwDQYJKoZIhvcNAQEFBQAwQjESMBAGA1UE +AwwJQUNDVlJBSVoxMRAwDgYDVQQLDAdQS0lBQ0NWMQ0wCwYDVQQKDARBQ0NWMQsw +CQYDVQQGEwJFUzAeFw0xMTA1MDUwOTM3MzdaFw0zMDEyMzEwOTM3MzdaMEIxEjAQ +BgNVBAMMCUFDQ1ZSQUlaMTEQMA4GA1UECwwHUEtJQUNDVjENMAsGA1UECgwEQUND +VjELMAkGA1UEBhMCRVMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCb +qau/YUqXry+XZpp0X9DZlv3P4uRm7x8fRzPCRKPfmt4ftVTdFXxpNRFvu8gMjmoY +HtiP2Ra8EEg2XPBjs5BaXCQ316PWywlxufEBcoSwfdtNgM3802/J+Nq2DoLSRYWo +G2ioPej0RGy9ocLLA76MPhMAhN9KSMDjIgro6TenGEyxCQ0jVn8ETdkXhBilyNpA +lHPrzg5XPAOBOp0KoVdDaaxXbXmQeOW1tDvYvEyNKKGno6e6Ak4l0Squ7a4DIrhr +IA8wKFSVf+DuzgpmndFALW4ir50awQUZ0m/A8p/4e7MCQvtQqR0tkw8jq8bBD5L/ +0KIV9VMJcRz/RROE5iZe+OCIHAr8Fraocwa48GOEAqDGWuzndN9wrqODJerWx5eH +k6fGioozl2A3ED6XPm4pFdahD9GILBKfb6qkxkLrQaLjlUPTAYVtjrs78yM2x/47 +4KElB0iryYl0/wiPgL/AlmXz7uxLaL2diMMxs0Dx6M/2OLuc5NF/1OVYm3z61PMO +m3WR5LpSLhl+0fXNWhn8ugb2+1KoS5kE3fj5tItQo05iifCHJPqDQsGH+tUtKSpa +cXpkatcnYGMN285J9Y0fkIkyF/hzQ7jSWpOGYdbhdQrqeWZ2iE9x6wQl1gpaepPl +uUsXQA+xtrn13k/c4LOsOxFwYIRKQ26ZIMApcQrAZQIDAQABo4ICyzCCAscwfQYI +KwYBBQUHAQEEcTBvMEwGCCsGAQUFBzAChkBodHRwOi8vd3d3LmFjY3YuZXMvZmls +ZWFkbWluL0FyY2hpdm9zL2NlcnRpZmljYWRvcy9yYWl6YWNjdjEuY3J0MB8GCCsG +AQUFBzABhhNodHRwOi8vb2NzcC5hY2N2LmVzMB0GA1UdDgQWBBTSh7Tj3zcnk1X2 +VuqB5TbMjB4/vTAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFNKHtOPfNyeT +VfZW6oHlNsyMHj+9MIIBcwYDVR0gBIIBajCCAWYwggFiBgRVHSAAMIIBWDCCASIG +CCsGAQUFBwICMIIBFB6CARAAQQB1AHQAbwByAGkAZABhAGQAIABkAGUAIABDAGUA +cgB0AGkAZgBpAGMAYQBjAGkA8wBuACAAUgBhAO0AegAgAGQAZQAgAGwAYQAgAEEA +QwBDAFYAIAAoAEEAZwBlAG4AYwBpAGEAIABkAGUAIABUAGUAYwBuAG8AbABvAGcA +7QBhACAAeQAgAEMAZQByAHQAaQBmAGkAYwBhAGMAaQDzAG4AIABFAGwAZQBjAHQA +cgDzAG4AaQBjAGEALAAgAEMASQBGACAAUQA0ADYAMAAxADEANQA2AEUAKQAuACAA +QwBQAFMAIABlAG4AIABoAHQAdABwADoALwAvAHcAdwB3AC4AYQBjAGMAdgAuAGUA +czAwBggrBgEFBQcCARYkaHR0cDovL3d3dy5hY2N2LmVzL2xlZ2lzbGFjaW9uX2Mu +aHRtMFUGA1UdHwROMEwwSqBIoEaGRGh0dHA6Ly93d3cuYWNjdi5lcy9maWxlYWRt +aW4vQXJjaGl2b3MvY2VydGlmaWNhZG9zL3JhaXphY2N2MV9kZXIuY3JsMA4GA1Ud +DwEB/wQEAwIBBjAXBgNVHREEEDAOgQxhY2N2QGFjY3YuZXMwDQYJKoZIhvcNAQEF +BQADggIBAJcxAp/n/UNnSEQU5CmH7UwoZtCPNdpNYbdKl02125DgBS4OxnnQ8pdp +D70ER9m+27Up2pvZrqmZ1dM8MJP1jaGo/AaNRPTKFpV8M9xii6g3+CfYCS0b78gU +JyCpZET/LtZ1qmxNYEAZSUNUY9rizLpm5U9EelvZaoErQNV/+QEnWCzI7UiRfD+m +AM/EKXMRNt6GGT6d7hmKG9Ww7Y49nCrADdg9ZuM8Db3VlFzi4qc1GwQA9j9ajepD +vV+JHanBsMyZ4k0ACtrJJ1vnE5Bc5PUzolVt3OAJTS+xJlsndQAJxGJ3KQhfnlms +tn6tn1QwIgPBHnFk/vk4CpYY3QIUrCPLBhwepH2NDd4nQeit2hW3sCPdK6jT2iWH +7ehVRE2I9DZ+hJp4rPcOVkkO1jMl1oRQQmwgEh0q1b688nCBpHBgvgW1m54ERL5h +I6zppSSMEYCUWqKiuUnSwdzRp+0xESyeGabu4VXhwOrPDYTkF7eifKXeVSUG7szA +h1xA2syVP1XgNce4hL60Xc16gwFy7ofmXx2utYXGJt/mwZrpHgJHnyqobalbz+xF +d3+YJ5oyXSrjhO7FmGYvliAd3djDJ9ew+f7Zfc3Qn48LFFhRny+Lwzgt3uiP1o2H +pPVWQxaZLPSkVrQ0uGE3ycJYgBugl6H8WY3pEfbRD0tVNEYqi4Y7 +-----END CERTIFICATE----- + +# Issuer: CN=TWCA Global Root CA O=TAIWAN-CA OU=Root CA +# Subject: CN=TWCA Global Root CA O=TAIWAN-CA OU=Root CA +# Label: "TWCA Global Root CA" +# Serial: 3262 +# MD5 Fingerprint: f9:03:7e:cf:e6:9e:3c:73:7a:2a:90:07:69:ff:2b:96 +# SHA1 Fingerprint: 9c:bb:48:53:f6:a4:f6:d3:52:a4:e8:32:52:55:60:13:f5:ad:af:65 +# SHA256 Fingerprint: 59:76:90:07:f7:68:5d:0f:cd:50:87:2f:9f:95:d5:75:5a:5b:2b:45:7d:81:f3:69:2b:61:0a:98:67:2f:0e:1b +-----BEGIN CERTIFICATE----- +MIIFQTCCAymgAwIBAgICDL4wDQYJKoZIhvcNAQELBQAwUTELMAkGA1UEBhMCVFcx +EjAQBgNVBAoTCVRBSVdBTi1DQTEQMA4GA1UECxMHUm9vdCBDQTEcMBoGA1UEAxMT +VFdDQSBHbG9iYWwgUm9vdCBDQTAeFw0xMjA2MjcwNjI4MzNaFw0zMDEyMzExNTU5 +NTlaMFExCzAJBgNVBAYTAlRXMRIwEAYDVQQKEwlUQUlXQU4tQ0ExEDAOBgNVBAsT +B1Jvb3QgQ0ExHDAaBgNVBAMTE1RXQ0EgR2xvYmFsIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCwBdvI64zEbooh745NnHEKH1Jw7W2CnJfF +10xORUnLQEK1EjRsGcJ0pDFfhQKX7EMzClPSnIyOt7h52yvVavKOZsTuKwEHktSz +0ALfUPZVr2YOy+BHYC8rMjk1Ujoog/h7FsYYuGLWRyWRzvAZEk2tY/XTP3VfKfCh +MBwqoJimFb3u/Rk28OKRQ4/6ytYQJ0lM793B8YVwm8rqqFpD/G2Gb3PpN0Wp8DbH +zIh1HrtsBv+baz4X7GGqcXzGHaL3SekVtTzWoWH1EfcFbx39Eb7QMAfCKbAJTibc +46KokWofwpFFiFzlmLhxpRUZyXx1EcxwdE8tmx2RRP1WKKD+u4ZqyPpcC1jcxkt2 +yKsi2XMPpfRaAok/T54igu6idFMqPVMnaR1sjjIsZAAmY2E2TqNGtz99sy2sbZCi +laLOz9qC5wc0GZbpuCGqKX6mOL6OKUohZnkfs8O1CWfe1tQHRvMq2uYiN2DLgbYP +oA/pyJV/v1WRBXrPPRXAb94JlAGD1zQbzECl8LibZ9WYkTunhHiVJqRaCPgrdLQA +BDzfuBSO6N+pjWxnkjMdwLfS7JLIvgm/LCkFbwJrnu+8vyq8W8BQj0FwcYeyTbcE +qYSjMq+u7msXi7Kx/mzhkIyIqJdIzshNy/MGz19qCkKxHh53L46g5pIOBvwFItIm +4TFRfTLcDwIDAQABoyMwITAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zANBgkqhkiG9w0BAQsFAAOCAgEAXzSBdu+WHdXltdkCY4QWwa6gcFGn90xHNcgL +1yg9iXHZqjNB6hQbbCEAwGxCGX6faVsgQt+i0trEfJdLjbDorMjupWkEmQqSpqsn +LhpNgb+E1HAerUf+/UqdM+DyucRFCCEK2mlpc3INvjT+lIutwx4116KD7+U4x6WF +H6vPNOw/KP4M8VeGTslV9xzU2KV9Bnpv1d8Q34FOIWWxtuEXeZVFBs5fzNxGiWNo +RI2T9GRwoD2dKAXDOXC4Ynsg/eTb6QihuJ49CcdP+yz4k3ZB3lLg4VfSnQO8d57+ +nile98FRYB/e2guyLXW3Q0iT5/Z5xoRdgFlglPx4mI88k1HtQJAH32RjJMtOcQWh +15QaiDLxInQirqWm2BJpTGCjAu4r7NRjkgtevi92a6O2JryPA9gK8kxkRr05YuWW +6zRjESjMlfGt7+/cgFhI6Uu46mWs6fyAtbXIRfmswZ/ZuepiiI7E8UuDEq3mi4TW +nsLrgxifarsbJGAzcMzs9zLzXNl5fe+epP7JI8Mk7hWSsT2RTyaGvWZzJBPqpK5j +wa19hAM8EHiGG3njxPPyBJUgriOCxLM6AGK/5jYk4Ve6xx6QddVfP5VhK8E7zeWz +aGHQRiapIVJpLesux+t3zqY6tQMzT3bR51xUAV3LePTJDL/PEo4XLSNolOer/qmy +KwbQBM0= +-----END CERTIFICATE----- + +# Issuer: CN=TeliaSonera Root CA v1 O=TeliaSonera +# Subject: CN=TeliaSonera Root CA v1 O=TeliaSonera +# Label: "TeliaSonera Root CA v1" +# Serial: 199041966741090107964904287217786801558 +# MD5 Fingerprint: 37:41:49:1b:18:56:9a:26:f5:ad:c2:66:fb:40:a5:4c +# SHA1 Fingerprint: 43:13:bb:96:f1:d5:86:9b:c1:4e:6a:92:f6:cf:f6:34:69:87:82:37 +# SHA256 Fingerprint: dd:69:36:fe:21:f8:f0:77:c1:23:a1:a5:21:c1:22:24:f7:22:55:b7:3e:03:a7:26:06:93:e8:a2:4b:0f:a3:89 +-----BEGIN CERTIFICATE----- +MIIFODCCAyCgAwIBAgIRAJW+FqD3LkbxezmCcvqLzZYwDQYJKoZIhvcNAQEFBQAw +NzEUMBIGA1UECgwLVGVsaWFTb25lcmExHzAdBgNVBAMMFlRlbGlhU29uZXJhIFJv +b3QgQ0EgdjEwHhcNMDcxMDE4MTIwMDUwWhcNMzIxMDE4MTIwMDUwWjA3MRQwEgYD +VQQKDAtUZWxpYVNvbmVyYTEfMB0GA1UEAwwWVGVsaWFTb25lcmEgUm9vdCBDQSB2 +MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMK+6yfwIaPzaSZVfp3F +VRaRXP3vIb9TgHot0pGMYzHw7CTww6XScnwQbfQ3t+XmfHnqjLWCi65ItqwA3GV1 +7CpNX8GH9SBlK4GoRz6JI5UwFpB/6FcHSOcZrr9FZ7E3GwYq/t75rH2D+1665I+X +Z75Ljo1kB1c4VWk0Nj0TSO9P4tNmHqTPGrdeNjPUtAa9GAH9d4RQAEX1jF3oI7x+ +/jXh7VB7qTCNGdMJjmhnXb88lxhTuylixcpecsHHltTbLaC0H2kD7OriUPEMPPCs +81Mt8Bz17Ww5OXOAFshSsCPN4D7c3TxHoLs1iuKYaIu+5b9y7tL6pe0S7fyYGKkm +dtwoSxAgHNN/Fnct7W+A90m7UwW7XWjH1Mh1Fj+JWov3F0fUTPHSiXk+TT2YqGHe +Oh7S+F4D4MHJHIzTjU3TlTazN19jY5szFPAtJmtTfImMMsJu7D0hADnJoWjiUIMu +sDor8zagrC/kb2HCUQk5PotTubtn2txTuXZZNp1D5SDgPTJghSJRt8czu90VL6R4 +pgd7gUY2BIbdeTXHlSw7sKMXNeVzH7RcWe/a6hBle3rQf5+ztCo3O3CLm1u5K7fs +slESl1MpWtTwEhDcTwK7EpIvYtQ/aUN8Ddb8WHUBiJ1YFkveupD/RwGJBmr2X7KQ +arMCpgKIv7NHfirZ1fpoeDVNAgMBAAGjPzA9MA8GA1UdEwEB/wQFMAMBAf8wCwYD +VR0PBAQDAgEGMB0GA1UdDgQWBBTwj1k4ALP1j5qWDNXr+nuqF+gTEjANBgkqhkiG +9w0BAQUFAAOCAgEAvuRcYk4k9AwI//DTDGjkk0kiP0Qnb7tt3oNmzqjMDfz1mgbl +dxSR651Be5kqhOX//CHBXfDkH1e3damhXwIm/9fH907eT/j3HEbAek9ALCI18Bmx +0GtnLLCo4MBANzX2hFxc469CeP6nyQ1Q6g2EdvZR74NTxnr/DlZJLo961gzmJ1Tj +TQpgcmLNkQfWpb/ImWvtxBnmq0wROMVvMeJuScg/doAmAyYp4Db29iBT4xdwNBed +Y2gea+zDTYa4EzAvXUYNR0PVG6pZDrlcjQZIrXSHX8f8MVRBE+LHIQ6e4B4N4cB7 +Q4WQxYpYxmUKeFfyxiMPAdkgS94P+5KFdSpcc41teyWRyu5FrgZLAMzTsVlQ2jqI +OylDRl6XK1TOU2+NSueW+r9xDkKLfP0ooNBIytrEgUy7onOTJsjrDNYmiLbAJM+7 +vVvrdX3pCI6GMyx5dwlppYn8s3CQh3aP0yK7Qs69cwsgJirQmz1wHiRszYd2qReW +t88NkvuOGKmYSdGe/mBEciG5Ge3C9THxOUiIkCR1VBatzvT4aRRkOfujuLpwQMcn +HL/EVlP6Y2XQ8xwOFvVrhlhNGNTkDY6lnVuR3HYkUD/GKvvZt5y11ubQ2egZixVx +SK236thZiNSQvxaz2emsWWFUyBy6ysHK4bkgTI86k4mloMy/0/Z1pHWWbVY= +-----END CERTIFICATE----- + +# Issuer: CN=E-Tugra Certification Authority O=E-Tu\u011fra EBG Bili\u015fim Teknolojileri ve Hizmetleri A.\u015e. OU=E-Tugra Sertifikasyon Merkezi +# Subject: CN=E-Tugra Certification Authority O=E-Tu\u011fra EBG Bili\u015fim Teknolojileri ve Hizmetleri A.\u015e. OU=E-Tugra Sertifikasyon Merkezi +# Label: "E-Tugra Certification Authority" +# Serial: 7667447206703254355 +# MD5 Fingerprint: b8:a1:03:63:b0:bd:21:71:70:8a:6f:13:3a:bb:79:49 +# SHA1 Fingerprint: 51:c6:e7:08:49:06:6e:f3:92:d4:5c:a0:0d:6d:a3:62:8f:c3:52:39 +# SHA256 Fingerprint: b0:bf:d5:2b:b0:d7:d9:bd:92:bf:5d:4d:c1:3d:a2:55:c0:2c:54:2f:37:83:65:ea:89:39:11:f5:5e:55:f2:3c +-----BEGIN CERTIFICATE----- +MIIGSzCCBDOgAwIBAgIIamg+nFGby1MwDQYJKoZIhvcNAQELBQAwgbIxCzAJBgNV +BAYTAlRSMQ8wDQYDVQQHDAZBbmthcmExQDA+BgNVBAoMN0UtVHXEn3JhIEVCRyBC +aWxpxZ9pbSBUZWtub2xvamlsZXJpIHZlIEhpem1ldGxlcmkgQS7Fni4xJjAkBgNV +BAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBNZXJrZXppMSgwJgYDVQQDDB9FLVR1 +Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTEzMDMwNTEyMDk0OFoXDTIz +MDMwMzEyMDk0OFowgbIxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHDAZBbmthcmExQDA+ +BgNVBAoMN0UtVHXEn3JhIEVCRyBCaWxpxZ9pbSBUZWtub2xvamlsZXJpIHZlIEhp +em1ldGxlcmkgQS7Fni4xJjAkBgNVBAsMHUUtVHVncmEgU2VydGlmaWthc3lvbiBN +ZXJrZXppMSgwJgYDVQQDDB9FLVR1Z3JhIENlcnRpZmljYXRpb24gQXV0aG9yaXR5 +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA4vU/kwVRHoViVF56C/UY +B4Oufq9899SKa6VjQzm5S/fDxmSJPZQuVIBSOTkHS0vdhQd2h8y/L5VMzH2nPbxH +D5hw+IyFHnSOkm0bQNGZDbt1bsipa5rAhDGvykPL6ys06I+XawGb1Q5KCKpbknSF +Q9OArqGIW66z6l7LFpp3RMih9lRozt6Plyu6W0ACDGQXwLWTzeHxE2bODHnv0ZEo +q1+gElIwcxmOj+GMB6LDu0rw6h8VqO4lzKRG+Bsi77MOQ7osJLjFLFzUHPhdZL3D +k14opz8n8Y4e0ypQBaNV2cvnOVPAmJ6MVGKLJrD3fY185MaeZkJVgkfnsliNZvcH +fC425lAcP9tDJMW/hkd5s3kc91r0E+xs+D/iWR+V7kI+ua2oMoVJl0b+SzGPWsut +dEcf6ZG33ygEIqDUD13ieU/qbIWGvaimzuT6w+Gzrt48Ue7LE3wBf4QOXVGUnhMM +ti6lTPk5cDZvlsouDERVxcr6XQKj39ZkjFqzAQqptQpHF//vkUAqjqFGOjGY5RH8 +zLtJVor8udBhmm9lbObDyz51Sf6Pp+KJxWfXnUYTTjF2OySznhFlhqt/7x3U+Lzn +rFpct1pHXFXOVbQicVtbC/DP3KBhZOqp12gKY6fgDT+gr9Oq0n7vUaDmUStVkhUX +U8u3Zg5mTPj5dUyQ5xJwx0UCAwEAAaNjMGEwHQYDVR0OBBYEFC7j27JJ0JxUeVz6 +Jyr+zE7S6E5UMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAULuPbsknQnFR5 +XPonKv7MTtLoTlQwDgYDVR0PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4ICAQAF +Nzr0TbdF4kV1JI+2d1LoHNgQk2Xz8lkGpD4eKexd0dCrfOAKkEh47U6YA5n+KGCR +HTAduGN8qOY1tfrTYXbm1gdLymmasoR6d5NFFxWfJNCYExL/u6Au/U5Mh/jOXKqY +GwXgAEZKgoClM4so3O0409/lPun++1ndYYRP0lSWE2ETPo+Aab6TR7U1Q9Jauz1c +77NCR807VRMGsAnb/WP2OogKmW9+4c4bU2pEZiNRCHu8W1Ki/QY3OEBhj0qWuJA3 ++GbHeJAAFS6LrVE1Uweoa2iu+U48BybNCAVwzDk/dr2l02cmAYamU9JgO3xDf1WK +vJUawSg5TB9D0pH0clmKuVb8P7Sd2nCcdlqMQ1DujjByTd//SffGqWfZbawCEeI6 +FiWnWAjLb1NBnEg4R2gz0dfHj9R0IdTDBZB6/86WiLEVKV0jq9BgoRJP3vQXzTLl +yb/IQ639Lo7xr+L0mPoSHyDYwKcMhcWQ9DstliaxLL5Mq+ux0orJ23gTDx4JnW2P +AJ8C2sH6H3p6CcRK5ogql5+Ji/03X186zjhZhkuvcQu02PJwT58yE+Owp1fl2tpD +y4Q08ijE6m30Ku/Ba3ba+367hTzSU8JNvnHhRdH9I2cNE3X7z2VnIp2usAnRCf8d +NL/+I5c30jn6PQ0GC7TbO6Orb1wdtn7os4I07QZcJA== +-----END CERTIFICATE----- + +# Issuer: CN=T-TeleSec GlobalRoot Class 2 O=T-Systems Enterprise Services GmbH OU=T-Systems Trust Center +# Subject: CN=T-TeleSec GlobalRoot Class 2 O=T-Systems Enterprise Services GmbH OU=T-Systems Trust Center +# Label: "T-TeleSec GlobalRoot Class 2" +# Serial: 1 +# MD5 Fingerprint: 2b:9b:9e:e4:7b:6c:1f:00:72:1a:cc:c1:77:79:df:6a +# SHA1 Fingerprint: 59:0d:2d:7d:88:4f:40:2e:61:7e:a5:62:32:17:65:cf:17:d8:94:e9 +# SHA256 Fingerprint: 91:e2:f5:78:8d:58:10:eb:a7:ba:58:73:7d:e1:54:8a:8e:ca:cd:01:45:98:bc:0b:14:3e:04:1b:17:05:25:52 +-----BEGIN CERTIFICATE----- +MIIDwzCCAqugAwIBAgIBATANBgkqhkiG9w0BAQsFADCBgjELMAkGA1UEBhMCREUx +KzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnByaXNlIFNlcnZpY2VzIEdtYkgxHzAd +BgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50ZXIxJTAjBgNVBAMMHFQtVGVsZVNl +YyBHbG9iYWxSb290IENsYXNzIDIwHhcNMDgxMDAxMTA0MDE0WhcNMzMxMDAxMjM1 +OTU5WjCBgjELMAkGA1UEBhMCREUxKzApBgNVBAoMIlQtU3lzdGVtcyBFbnRlcnBy +aXNlIFNlcnZpY2VzIEdtYkgxHzAdBgNVBAsMFlQtU3lzdGVtcyBUcnVzdCBDZW50 +ZXIxJTAjBgNVBAMMHFQtVGVsZVNlYyBHbG9iYWxSb290IENsYXNzIDIwggEiMA0G +CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCqX9obX+hzkeXaXPSi5kfl82hVYAUd +AqSzm1nzHoqvNK38DcLZSBnuaY/JIPwhqgcZ7bBcrGXHX+0CfHt8LRvWurmAwhiC +FoT6ZrAIxlQjgeTNuUk/9k9uN0goOA/FvudocP05l03Sx5iRUKrERLMjfTlH6VJi +1hKTXrcxlkIF+3anHqP1wvzpesVsqXFP6st4vGCvx9702cu+fjOlbpSD8DT6Iavq +jnKgP6TeMFvvhk1qlVtDRKgQFRzlAVfFmPHmBiiRqiDFt1MmUUOyCxGVWOHAD3bZ +wI18gfNycJ5v/hqO2V81xrJvNHy+SE/iWjnX2J14np+GPgNeGYtEotXHAgMBAAGj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBS/ +WSA2AHmgoCJrjNXyYdK4LMuCSjANBgkqhkiG9w0BAQsFAAOCAQEAMQOiYQsfdOhy +NsZt+U2e+iKo4YFWz827n+qrkRk4r6p8FU3ztqONpfSO9kSpp+ghla0+AGIWiPAC +uvxhI+YzmzB6azZie60EI4RYZeLbK4rnJVM3YlNfvNoBYimipidx5joifsFvHZVw +IEoHNN/q/xWA5brXethbdXwFeilHfkCoMRN3zUA7tFFHei4R40cR3p1m0IvVVGb6 +g1XqfMIpiRvpb7PO4gWEyS8+eIVibslfwXhjdFjASBgMmTnrpMwatXlajRWc2BQN +9noHV8cigwUtPJslJj0Ys6lDfMjIq2SPDqO/nBudMNva0Bkuqjzx+zOAduTNrRlP +BSeOE6Fuwg== +-----END CERTIFICATE----- + +# Issuer: CN=Atos TrustedRoot 2011 O=Atos +# Subject: CN=Atos TrustedRoot 2011 O=Atos +# Label: "Atos TrustedRoot 2011" +# Serial: 6643877497813316402 +# MD5 Fingerprint: ae:b9:c4:32:4b:ac:7f:5d:66:cc:77:94:bb:2a:77:56 +# SHA1 Fingerprint: 2b:b1:f5:3e:55:0c:1d:c5:f1:d4:e6:b7:6a:46:4b:55:06:02:ac:21 +# SHA256 Fingerprint: f3:56:be:a2:44:b7:a9:1e:b3:5d:53:ca:9a:d7:86:4a:ce:01:8e:2d:35:d5:f8:f9:6d:df:68:a6:f4:1a:a4:74 +-----BEGIN CERTIFICATE----- +MIIDdzCCAl+gAwIBAgIIXDPLYixfszIwDQYJKoZIhvcNAQELBQAwPDEeMBwGA1UE +AwwVQXRvcyBUcnVzdGVkUm9vdCAyMDExMQ0wCwYDVQQKDARBdG9zMQswCQYDVQQG +EwJERTAeFw0xMTA3MDcxNDU4MzBaFw0zMDEyMzEyMzU5NTlaMDwxHjAcBgNVBAMM +FUF0b3MgVHJ1c3RlZFJvb3QgMjAxMTENMAsGA1UECgwEQXRvczELMAkGA1UEBhMC +REUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCVhTuXbyo7LjvPpvMp +Nb7PGKw+qtn4TaA+Gke5vJrf8v7MPkfoepbCJI419KkM/IL9bcFyYie96mvr54rM +VD6QUM+A1JX76LWC1BTFtqlVJVfbsVD2sGBkWXppzwO3bw2+yj5vdHLqqjAqc2K+ +SZFhyBH+DgMq92og3AIVDV4VavzjgsG1xZ1kCWyjWZgHJ8cblithdHFsQ/H3NYkQ +4J7sVaE3IqKHBAUsR320HLliKWYoyrfhk/WklAOZuXCFteZI6o1Q/NnezG8HDt0L +cp2AMBYHlT8oDv3FdU9T1nSatCQujgKRz3bFmx5VdJx4IbHwLfELn8LVlhgf8FQi +eowHAgMBAAGjfTB7MB0GA1UdDgQWBBSnpQaxLKYJYO7Rl+lwrrw7GWzbITAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFKelBrEspglg7tGX6XCuvDsZbNshMBgG +A1UdIAQRMA8wDQYLKwYBBAGwLQMEAQEwDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3 +DQEBCwUAA4IBAQAmdzTblEiGKkGdLD4GkGDEjKwLVLgfuXvTBznk+j57sj1O7Z8j +vZfza1zv7v1Apt+hk6EKhqzvINB5Ab149xnYJDE0BAGmuhWawyfc2E8PzBhj/5kP +DpFrdRbhIfzYJsdHt6bPWHJxfrrhTZVHO8mvbaG0weyJ9rQPOLXiZNwlz6bb65pc +maHFCN795trV1lpFDMS3wrUU77QR/w4VtfX128a961qn8FYiqTxlVMYVqL2Gns2D +lmh6cYGJ4Qvh6hEbaAjMaZ7snkGeRDImeuKHCnE96+RapNLbxc3G3mB/ufNPRJLv +KrcYPqcZ2Qt9sTdBQrC6YB3y/gkRsPCHe6ed +-----END CERTIFICATE----- + +# Issuer: CN=QuoVadis Root CA 1 G3 O=QuoVadis Limited +# Subject: CN=QuoVadis Root CA 1 G3 O=QuoVadis Limited +# Label: "QuoVadis Root CA 1 G3" +# Serial: 687049649626669250736271037606554624078720034195 +# MD5 Fingerprint: a4:bc:5b:3f:fe:37:9a:fa:64:f0:e2:fa:05:3d:0b:ab +# SHA1 Fingerprint: 1b:8e:ea:57:96:29:1a:c9:39:ea:b8:0a:81:1a:73:73:c0:93:79:67 +# SHA256 Fingerprint: 8a:86:6f:d1:b2:76:b5:7e:57:8e:92:1c:65:82:8a:2b:ed:58:e9:f2:f2:88:05:41:34:b7:f1:f4:bf:c9:cc:74 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIUeFhfLq0sGUvjNwc1NBMotZbUZZMwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMSBHMzAeFw0xMjAxMTIxNzI3NDRaFw00 +MjAxMTIxNzI3NDRaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDEgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCgvlAQjunybEC0BJyFuTHK3C3kEakEPBtV +wedYMB0ktMPvhd6MLOHBPd+C5k+tR4ds7FtJwUrVu4/sh6x/gpqG7D0DmVIB0jWe +rNrwU8lmPNSsAgHaJNM7qAJGr6Qc4/hzWHa39g6QDbXwz8z6+cZM5cOGMAqNF341 +68Xfuw6cwI2H44g4hWf6Pser4BOcBRiYz5P1sZK0/CPTz9XEJ0ngnjybCKOLXSoh +4Pw5qlPafX7PGglTvF0FBM+hSo+LdoINofjSxxR3W5A2B4GbPgb6Ul5jxaYA/qXp +UhtStZI5cgMJYr2wYBZupt0lwgNm3fME0UDiTouG9G/lg6AnhF4EwfWQvTA9xO+o +abw4m6SkltFi2mnAAZauy8RRNOoMqv8hjlmPSlzkYZqn0ukqeI1RPToV7qJZjqlc +3sX5kCLliEVx3ZGZbHqfPT2YfF72vhZooF6uCyP8Wg+qInYtyaEQHeTTRCOQiJ/G +KubX9ZqzWB4vMIkIG1SitZgj7Ah3HJVdYdHLiZxfokqRmu8hqkkWCKi9YSgxyXSt +hfbZxbGL0eUQMk1fiyA6PEkfM4VZDdvLCXVDaXP7a3F98N/ETH3Goy7IlXnLc6KO +Tk0k+17kBL5yG6YnLUlamXrXXAkgt3+UuU/xDRxeiEIbEbfnkduebPRq34wGmAOt +zCjvpUfzUwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUo5fW816iEOGrRZ88F2Q87gFwnMwwDQYJKoZIhvcNAQELBQAD +ggIBABj6W3X8PnrHX3fHyt/PX8MSxEBd1DKquGrX1RUVRpgjpeaQWxiZTOOtQqOC +MTaIzen7xASWSIsBx40Bz1szBpZGZnQdT+3Btrm0DWHMY37XLneMlhwqI2hrhVd2 +cDMT/uFPpiN3GPoajOi9ZcnPP/TJF9zrx7zABC4tRi9pZsMbj/7sPtPKlL92CiUN +qXsCHKnQO18LwIE6PWThv6ctTr1NxNgpxiIY0MWscgKCP6o6ojoilzHdCGPDdRS5 +YCgtW2jgFqlmgiNR9etT2DGbe+m3nUvriBbP+V04ikkwj+3x6xn0dxoxGE1nVGwv +b2X52z3sIexe9PSLymBlVNFxZPT5pqOBMzYzcfCkeF9OrYMh3jRJjehZrJ3ydlo2 +8hP0r+AJx2EqbPfgna67hkooby7utHnNkDPDs3b69fBsnQGQ+p6Q9pxyz0fawx/k +NSBT8lTR32GDpgLiJTjehTItXnOQUl1CxM49S+H5GYQd1aJQzEH7QRTDvdbJWqNj +ZgKAvQU6O0ec7AAmTPWIUb+oI38YB7AL7YsmoWTTYUrrXJ/es69nA7Mf3W1daWhp +q1467HxpvMc7hU6eFbm0FU/DlXpY18ls6Wy58yljXrQs8C097Vpl4KlbQMJImYFt +nh8GKjwStIsPm6Ik8KaN1nrgS7ZklmOVhMJKzRwuJIczYOXD +-----END CERTIFICATE----- + +# Issuer: CN=QuoVadis Root CA 2 G3 O=QuoVadis Limited +# Subject: CN=QuoVadis Root CA 2 G3 O=QuoVadis Limited +# Label: "QuoVadis Root CA 2 G3" +# Serial: 390156079458959257446133169266079962026824725800 +# MD5 Fingerprint: af:0c:86:6e:bf:40:2d:7f:0b:3e:12:50:ba:12:3d:06 +# SHA1 Fingerprint: 09:3c:61:f3:8b:8b:dc:7d:55:df:75:38:02:05:00:e1:25:f5:c8:36 +# SHA256 Fingerprint: 8f:e4:fb:0a:f9:3a:4d:0d:67:db:0b:eb:b2:3e:37:c7:1b:f3:25:dc:bc:dd:24:0e:a0:4d:af:58:b4:7e:18:40 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIURFc0JFuBiZs18s64KztbpybwdSgwDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMiBHMzAeFw0xMjAxMTIxODU5MzJaFw00 +MjAxMTIxODU5MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDIgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQChriWyARjcV4g/Ruv5r+LrI3HimtFhZiFf +qq8nUeVuGxbULX1QsFN3vXg6YOJkApt8hpvWGo6t/x8Vf9WVHhLL5hSEBMHfNrMW +n4rjyduYNM7YMxcoRvynyfDStNVNCXJJ+fKH46nafaF9a7I6JaltUkSs+L5u+9ym +c5GQYaYDFCDy54ejiK2toIz/pgslUiXnFgHVy7g1gQyjO/Dh4fxaXc6AcW34Sas+ +O7q414AB+6XrW7PFXmAqMaCvN+ggOp+oMiwMzAkd056OXbxMmO7FGmh77FOm6RQ1 +o9/NgJ8MSPsc9PG/Srj61YxxSscfrf5BmrODXfKEVu+lV0POKa2Mq1W/xPtbAd0j +IaFYAI7D0GoT7RPjEiuA3GfmlbLNHiJuKvhB1PLKFAeNilUSxmn1uIZoL1NesNKq +IcGY5jDjZ1XHm26sGahVpkUG0CM62+tlXSoREfA7T8pt9DTEceT/AFr2XK4jYIVz +8eQQsSWu1ZK7E8EM4DnatDlXtas1qnIhO4M15zHfeiFuuDIIfR0ykRVKYnLP43eh +vNURG3YBZwjgQQvD6xVu+KQZ2aKrr+InUlYrAoosFCT5v0ICvybIxo/gbjh9Uy3l +7ZizlWNof/k19N+IxWA1ksB8aRxhlRbQ694Lrz4EEEVlWFA4r0jyWbYW8jwNkALG +cC4BrTwV1wIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQU7edvdlq/YOxJW8ald7tyFnGbxD0wDQYJKoZIhvcNAQELBQAD +ggIBAJHfgD9DCX5xwvfrs4iP4VGyvD11+ShdyLyZm3tdquXK4Qr36LLTn91nMX66 +AarHakE7kNQIXLJgapDwyM4DYvmL7ftuKtwGTTwpD4kWilhMSA/ohGHqPHKmd+RC +roijQ1h5fq7KpVMNqT1wvSAZYaRsOPxDMuHBR//47PERIjKWnML2W2mWeyAMQ0Ga +W/ZZGYjeVYg3UQt4XAoeo0L9x52ID8DyeAIkVJOviYeIyUqAHerQbj5hLja7NQ4n +lv1mNDthcnPxFlxHBlRJAHpYErAK74X9sbgzdWqTHBLmYF5vHX/JHyPLhGGfHoJE ++V+tYlUkmlKY7VHnoX6XOuYvHxHaU4AshZ6rNRDbIl9qxV6XU/IyAgkwo1jwDQHV +csaxfGl7w/U2Rcxhbl5MlMVerugOXou/983g7aEOGzPuVBj+D77vfoRrQ+NwmNtd +dbINWQeFFSM51vHfqSYP1kjHs6Yi9TM3WpVHn3u6GBVv/9YUZINJ0gpnIdsPNWNg +KCLjsZWDzYWm3S8P52dSbrsvhXz1SnPnxT7AvSESBT/8twNJAlvIJebiVDj1eYeM +HVOyToV7BjjHLPj4sHKNJeV3UvQDHEimUF+IIDBu8oJDqz2XhOdT+yHBTw8imoa4 +WSr2Rz0ZiC3oheGe7IUIarFsNMkd7EgrO3jtZsSOeWmD3n+M +-----END CERTIFICATE----- + +# Issuer: CN=QuoVadis Root CA 3 G3 O=QuoVadis Limited +# Subject: CN=QuoVadis Root CA 3 G3 O=QuoVadis Limited +# Label: "QuoVadis Root CA 3 G3" +# Serial: 268090761170461462463995952157327242137089239581 +# MD5 Fingerprint: df:7d:b9:ad:54:6f:68:a1:df:89:57:03:97:43:b0:d7 +# SHA1 Fingerprint: 48:12:bd:92:3c:a8:c4:39:06:e7:30:6d:27:96:e6:a4:cf:22:2e:7d +# SHA256 Fingerprint: 88:ef:81:de:20:2e:b0:18:45:2e:43:f8:64:72:5c:ea:5f:bd:1f:c2:d9:d2:05:73:07:09:c5:d8:b8:69:0f:46 +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIULvWbAiin23r/1aOp7r0DoM8Sah0wDQYJKoZIhvcNAQEL +BQAwSDELMAkGA1UEBhMCQk0xGTAXBgNVBAoTEFF1b1ZhZGlzIExpbWl0ZWQxHjAc +BgNVBAMTFVF1b1ZhZGlzIFJvb3QgQ0EgMyBHMzAeFw0xMjAxMTIyMDI2MzJaFw00 +MjAxMTIyMDI2MzJaMEgxCzAJBgNVBAYTAkJNMRkwFwYDVQQKExBRdW9WYWRpcyBM +aW1pdGVkMR4wHAYDVQQDExVRdW9WYWRpcyBSb290IENBIDMgRzMwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCzyw4QZ47qFJenMioKVjZ/aEzHs286IxSR +/xl/pcqs7rN2nXrpixurazHb+gtTTK/FpRp5PIpM/6zfJd5O2YIyC0TeytuMrKNu +FoM7pmRLMon7FhY4futD4tN0SsJiCnMK3UmzV9KwCoWdcTzeo8vAMvMBOSBDGzXR +U7Ox7sWTaYI+FrUoRqHe6okJ7UO4BUaKhvVZR74bbwEhELn9qdIoyhA5CcoTNs+c +ra1AdHkrAj80//ogaX3T7mH1urPnMNA3I4ZyYUUpSFlob3emLoG+B01vr87ERROR +FHAGjx+f+IdpsQ7vw4kZ6+ocYfx6bIrc1gMLnia6Et3UVDmrJqMz6nWB2i3ND0/k +A9HvFZcba5DFApCTZgIhsUfei5pKgLlVj7WiL8DWM2fafsSntARE60f75li59wzw +eyuxwHApw0BiLTtIadwjPEjrewl5qW3aqDCYz4ByA4imW0aucnl8CAMhZa634Ryl +sSqiMd5mBPfAdOhx3v89WcyWJhKLhZVXGqtrdQtEPREoPHtht+KPZ0/l7DxMYIBp +VzgeAVuNVejH38DMdyM0SXV89pgR6y3e7UEuFAUCf+D+IOs15xGsIs5XPd7JMG0Q +A4XN8f+MFrXBsj6IbGB/kE+V9/YtrQE5BwT6dYB9v0lQ7e/JxHwc64B+27bQ3RP+ +ydOc17KXqQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +BjAdBgNVHQ4EFgQUxhfQvKjqAkPyGwaZXSuQILnXnOQwDQYJKoZIhvcNAQELBQAD +ggIBADRh2Va1EodVTd2jNTFGu6QHcrxfYWLopfsLN7E8trP6KZ1/AvWkyaiTt3px +KGmPc+FSkNrVvjrlt3ZqVoAh313m6Tqe5T72omnHKgqwGEfcIHB9UqM+WXzBusnI +FUBhynLWcKzSt/Ac5IYp8M7vaGPQtSCKFWGafoaYtMnCdvvMujAWzKNhxnQT5Wvv +oxXqA/4Ti2Tk08HS6IT7SdEQTXlm66r99I0xHnAUrdzeZxNMgRVhvLfZkXdxGYFg +u/BYpbWcC/ePIlUnwEsBbTuZDdQdm2NnL9DuDcpmvJRPpq3t/O5jrFc/ZSXPsoaP +0Aj/uHYUbt7lJ+yreLVTubY/6CD50qi+YUbKh4yE8/nxoGibIh6BJpsQBJFxwAYf +3KDTuVan45gtf4Od34wrnDKOMpTwATwiKp9Dwi7DmDkHOHv8XgBCH/MyJnmDhPbl +8MFREsALHgQjDFSlTC9JxUrRtm5gDWv8a4uFJGS3iQ6rJUdbPM9+Sb3H6QrG2vd+ +DhcI00iX0HGS8A85PjRqHH3Y8iKuu2n0M7SmSFXRDw4m6Oy2Cy2nhTXN/VnIn9HN +PlopNLk9hM6xZdRZkZFWdSHBd575euFgndOtBBj0fOtek49TSiIp+EgrPk2GrFt/ +ywaZWWDYWGWVjUTR939+J399roD1B0y2PpxxVJkES/1Y+Zj0 +-----END CERTIFICATE----- + +# Issuer: CN=DigiCert Assured ID Root G2 O=DigiCert Inc OU=www.digicert.com +# Subject: CN=DigiCert Assured ID Root G2 O=DigiCert Inc OU=www.digicert.com +# Label: "DigiCert Assured ID Root G2" +# Serial: 15385348160840213938643033620894905419 +# MD5 Fingerprint: 92:38:b9:f8:63:24:82:65:2c:57:33:e6:fe:81:8f:9d +# SHA1 Fingerprint: a1:4b:48:d9:43:ee:0a:0e:40:90:4f:3c:e0:a4:c0:91:93:51:5d:3f +# SHA256 Fingerprint: 7d:05:eb:b6:82:33:9f:8c:94:51:ee:09:4e:eb:fe:fa:79:53:a1:14:ed:b2:f4:49:49:45:2f:ab:7d:2f:c1:85 +-----BEGIN CERTIFICATE----- +MIIDljCCAn6gAwIBAgIQC5McOtY5Z+pnI7/Dr5r0SzANBgkqhkiG9w0BAQsFADBl +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJv +b3QgRzIwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQG +EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNl +cnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzIwggEi +MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDZ5ygvUj82ckmIkzTz+GoeMVSA +n61UQbVH35ao1K+ALbkKz3X9iaV9JPrjIgwrvJUXCzO/GU1BBpAAvQxNEP4Htecc +biJVMWWXvdMX0h5i89vqbFCMP4QMls+3ywPgym2hFEwbid3tALBSfK+RbLE4E9Hp +EgjAALAcKxHad3A2m67OeYfcgnDmCXRwVWmvo2ifv922ebPynXApVfSr/5Vh88lA +bx3RvpO704gqu52/clpWcTs/1PPRCv4o76Pu2ZmvA9OPYLfykqGxvYmJHzDNw6Yu +YjOuFgJ3RFrngQo8p0Quebg/BLxcoIfhG69Rjs3sLPr4/m3wOnyqi+RnlTGNAgMB +AAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQW +BBTOw0q5mVXyuNtgv6l+vVa1lzan1jANBgkqhkiG9w0BAQsFAAOCAQEAyqVVjOPI +QW5pJ6d1Ee88hjZv0p3GeDgdaZaikmkuOGybfQTUiaWxMTeKySHMq2zNixya1r9I +0jJmwYrA8y8678Dj1JGG0VDjA9tzd29KOVPt3ibHtX2vK0LRdWLjSisCx1BL4Gni +lmwORGYQRI+tBev4eaymG+g3NJ1TyWGqolKvSnAWhsI6yLETcDbYz+70CjTVW0z9 +B5yiutkBclzzTcHdDrEcDcRjvq30FPuJ7KJBDkzMyFdA0G4Dqs0MjomZmWzwPDCv +ON9vvKO+KSAnq3T/EyJ43pdSVR6DtVQgA+6uwE9W3jfMw3+qBCe703e4YtsXfJwo +IhNzbM8m9Yop5w== +-----END CERTIFICATE----- + +# Issuer: CN=DigiCert Assured ID Root G3 O=DigiCert Inc OU=www.digicert.com +# Subject: CN=DigiCert Assured ID Root G3 O=DigiCert Inc OU=www.digicert.com +# Label: "DigiCert Assured ID Root G3" +# Serial: 15459312981008553731928384953135426796 +# MD5 Fingerprint: 7c:7f:65:31:0c:81:df:8d:ba:3e:99:e2:5c:ad:6e:fb +# SHA1 Fingerprint: f5:17:a2:4f:9a:48:c6:c9:f8:a2:00:26:9f:dc:0f:48:2c:ab:30:89 +# SHA256 Fingerprint: 7e:37:cb:8b:4c:47:09:0c:ab:36:55:1b:a6:f4:5d:b8:40:68:0f:ba:16:6a:95:2d:b1:00:71:7f:43:05:3f:c2 +-----BEGIN CERTIFICATE----- +MIICRjCCAc2gAwIBAgIQC6Fa+h3foLVJRK/NJKBs7DAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3Qg +RzMwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBlMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSQwIgYDVQQDExtEaWdpQ2VydCBBc3N1cmVkIElEIFJvb3QgRzMwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAAQZ57ysRGXtzbg/WPuNsVepRC0FFfLvC/8QdJ+1YlJf +Zn4f5dwbRXkLzMZTCp2NXQLZqVneAlr2lSoOjThKiknGvMYDOAdfVdp+CW7if17Q +RSAPWXYQ1qAk8C3eNvJsKTmjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/ +BAQDAgGGMB0GA1UdDgQWBBTL0L2p4ZgFUaFNN6KDec6NHSrkhDAKBggqhkjOPQQD +AwNnADBkAjAlpIFFAmsSS3V0T8gj43DydXLefInwz5FyYZ5eEJJZVrmDxxDnOOlY +JjZ91eQ0hjkCMHw2U/Aw5WJjOpnitqM7mzT6HtoQknFekROn3aRukswy1vUhZscv +6pZjamVFkpUBtA== +-----END CERTIFICATE----- + +# Issuer: CN=DigiCert Global Root G2 O=DigiCert Inc OU=www.digicert.com +# Subject: CN=DigiCert Global Root G2 O=DigiCert Inc OU=www.digicert.com +# Label: "DigiCert Global Root G2" +# Serial: 4293743540046975378534879503202253541 +# MD5 Fingerprint: e4:a6:8a:c8:54:ac:52:42:46:0a:fd:72:48:1b:2a:44 +# SHA1 Fingerprint: df:3c:24:f9:bf:d6:66:76:1b:26:80:73:fe:06:d1:cc:8d:4f:82:a4 +# SHA256 Fingerprint: cb:3c:cb:b7:60:31:e5:e0:13:8f:8d:d3:9a:23:f9:de:47:ff:c3:5e:43:c1:14:4c:ea:27:d4:6a:5a:b1:cb:5f +-----BEGIN CERTIFICATE----- +MIIDjjCCAnagAwIBAgIQAzrx5qcRqaC7KGSxHQn65TANBgkqhkiG9w0BAQsFADBh +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBH +MjAeFw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVT +MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j +b20xIDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEcyMIIBIjANBgkqhkiG +9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuzfNNNx7a8myaJCtSnX/RrohCgiN9RlUyfuI +2/Ou8jqJkTx65qsGGmvPrC3oXgkkRLpimn7Wo6h+4FR1IAWsULecYxpsMNzaHxmx +1x7e/dfgy5SDN67sH0NO3Xss0r0upS/kqbitOtSZpLYl6ZtrAGCSYP9PIUkY92eQ +q2EGnI/yuum06ZIya7XzV+hdG82MHauVBJVJ8zUtluNJbd134/tJS7SsVQepj5Wz +tCO7TG1F8PapspUwtP1MVYwnSlcUfIKdzXOS0xZKBgyMUNGPHgm+F6HmIcr9g+UQ +vIOlCsRnKPZzFBQ9RnbDhxSJITRNrw9FDKZJobq7nMWxM4MphQIDAQABo0IwQDAP +BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAdBgNVHQ4EFgQUTiJUIBiV +5uNu5g/6+rkS7QYXjzkwDQYJKoZIhvcNAQELBQADggEBAGBnKJRvDkhj6zHd6mcY +1Yl9PMWLSn/pvtsrF9+wX3N3KjITOYFnQoQj8kVnNeyIv/iPsGEMNKSuIEyExtv4 +NeF22d+mQrvHRAiGfzZ0JFrabA0UWTW98kndth/Jsw1HKj2ZL7tcu7XUIOGZX1NG +Fdtom/DzMNU+MeKNhJ7jitralj41E6Vf8PlwUHBHQRFXGU7Aj64GxJUTFy8bJZ91 +8rGOmaFvE7FBcf6IKshPECBV1/MUReXgRPTqh5Uykw7+U0b6LJ3/iyK5S9kJRaTe +pLiaWN0bfVKfjllDiIGknibVb63dDcY3fe0Dkhvld1927jyNxF1WW6LZZm6zNTfl +MrY= +-----END CERTIFICATE----- + +# Issuer: CN=DigiCert Global Root G3 O=DigiCert Inc OU=www.digicert.com +# Subject: CN=DigiCert Global Root G3 O=DigiCert Inc OU=www.digicert.com +# Label: "DigiCert Global Root G3" +# Serial: 7089244469030293291760083333884364146 +# MD5 Fingerprint: f5:5d:a4:50:a5:fb:28:7e:1e:0f:0d:cc:96:57:56:ca +# SHA1 Fingerprint: 7e:04:de:89:6a:3e:66:6d:00:e6:87:d3:3f:fa:d9:3b:e8:3d:34:9e +# SHA256 Fingerprint: 31:ad:66:48:f8:10:41:38:c7:38:f3:9e:a4:32:01:33:39:3e:3a:18:cc:02:29:6e:f9:7c:2a:c9:ef:67:31:d0 +-----BEGIN CERTIFICATE----- +MIICPzCCAcWgAwIBAgIQBVVWvPJepDU1w6QP1atFcjAKBggqhkjOPQQDAzBhMQsw +CQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cu +ZGlnaWNlcnQuY29tMSAwHgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBHMzAe +Fw0xMzA4MDExMjAwMDBaFw0zODAxMTUxMjAwMDBaMGExCzAJBgNVBAYTAlVTMRUw +EwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20x +IDAeBgNVBAMTF0RpZ2lDZXJ0IEdsb2JhbCBSb290IEczMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAE3afZu4q4C/sLfyHS8L6+c/MzXRq8NOrexpu80JX28MzQC7phW1FG +fp4tn+6OYwwX7Adw9c+ELkCDnOg/QW07rdOkFFk2eJ0DQ+4QE2xy3q6Ip6FrtUPO +Z9wj/wMco+I+o0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBhjAd +BgNVHQ4EFgQUs9tIpPmhxdiuNkHMEWNpYim8S8YwCgYIKoZIzj0EAwMDaAAwZQIx +AK288mw/EkrRLTnDCgmXc/SINoyIJ7vmiI1Qhadj+Z4y3maTD/HMsQmP3Wyr+mt/ +oAIwOWZbwmSNuJ5Q3KjVSaLtx9zRSX8XAbjIho9OjIgrqJqpisXRAL34VOKa5Vt8 +sycX +-----END CERTIFICATE----- + +# Issuer: CN=DigiCert Trusted Root G4 O=DigiCert Inc OU=www.digicert.com +# Subject: CN=DigiCert Trusted Root G4 O=DigiCert Inc OU=www.digicert.com +# Label: "DigiCert Trusted Root G4" +# Serial: 7451500558977370777930084869016614236 +# MD5 Fingerprint: 78:f2:fc:aa:60:1f:2f:b4:eb:c9:37:ba:53:2e:75:49 +# SHA1 Fingerprint: dd:fb:16:cd:49:31:c9:73:a2:03:7d:3f:c8:3a:4d:7d:77:5d:05:e4 +# SHA256 Fingerprint: 55:2f:7b:dc:f1:a7:af:9e:6c:e6:72:01:7f:4f:12:ab:f7:72:40:c7:8e:76:1a:c2:03:d1:d9:d2:0a:c8:99:88 +-----BEGIN CERTIFICATE----- +MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBi +MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 +d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3Qg +RzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBiMQswCQYDVQQGEwJV +UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu +Y29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3y +ithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1If +xp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDV +ySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiO +DCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQ +jdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/ +CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCi +EhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADM +fRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QY +uKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXK +chYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t +9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB +hjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD +ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2 +SV1EY+CtnJYYZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd ++SeuMIW59mdNOj6PWTkiU0TryF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWc +fFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy7zBZLq7gcfJW5GqXb5JQbZaNaHqa +sjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iahixTXTBmyUEFxPT9N +cCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN5r5N +0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie +4u1Ki7wb/UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mI +r/OSmbaz5mEP0oUA51Aa5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1 +/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tKG48BtieVU+i2iW1bvGjUI+iLUaJW+fCm +gKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP82Z+ +-----END CERTIFICATE----- + +# Issuer: CN=COMODO RSA Certification Authority O=COMODO CA Limited +# Subject: CN=COMODO RSA Certification Authority O=COMODO CA Limited +# Label: "COMODO RSA Certification Authority" +# Serial: 101909084537582093308941363524873193117 +# MD5 Fingerprint: 1b:31:b0:71:40:36:cc:14:36:91:ad:c4:3e:fd:ec:18 +# SHA1 Fingerprint: af:e5:d2:44:a8:d1:19:42:30:ff:47:9f:e2:f8:97:bb:cd:7a:8c:b4 +# SHA256 Fingerprint: 52:f0:e1:c4:e5:8e:c6:29:29:1b:60:31:7f:07:46:71:b8:5d:7e:a8:0d:5b:07:27:34:63:53:4b:32:b4:02:34 +-----BEGIN CERTIFICATE----- +MIIF2DCCA8CgAwIBAgIQTKr5yttjb+Af907YWwOGnTANBgkqhkiG9w0BAQwFADCB +hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G +A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV +BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMTE5 +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBhTELMAkGA1UEBhMCR0IxGzAZBgNVBAgT +EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR +Q09NT0RPIENBIExpbWl0ZWQxKzApBgNVBAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNh +dGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCR +6FSS0gpWsawNJN3Fz0RndJkrN6N9I3AAcbxT38T6KhKPS38QVr2fcHK3YX/JSw8X +pz3jsARh7v8Rl8f0hj4K+j5c+ZPmNHrZFGvnnLOFoIJ6dq9xkNfs/Q36nGz637CC +9BR++b7Epi9Pf5l/tfxnQ3K9DADWietrLNPtj5gcFKt+5eNu/Nio5JIk2kNrYrhV +/erBvGy2i/MOjZrkm2xpmfh4SDBF1a3hDTxFYPwyllEnvGfDyi62a+pGx8cgoLEf +Zd5ICLqkTqnyg0Y3hOvozIFIQ2dOciqbXL1MGyiKXCJ7tKuY2e7gUYPDCUZObT6Z ++pUX2nwzV0E8jVHtC7ZcryxjGt9XyD+86V3Em69FmeKjWiS0uqlWPc9vqv9JWL7w +qP/0uK3pN/u6uPQLOvnoQ0IeidiEyxPx2bvhiWC4jChWrBQdnArncevPDt09qZah +SL0896+1DSJMwBGB7FY79tOi4lu3sgQiUpWAk2nojkxl8ZEDLXB0AuqLZxUpaVIC +u9ffUGpVRr+goyhhf3DQw6KqLCGqR84onAZFdr+CGCe01a60y1Dma/RMhnEw6abf +Fobg2P9A3fvQQoh/ozM6LlweQRGBY84YcWsr7KaKtzFcOmpH4MN5WdYgGq/yapiq +crxXStJLnbsQ/LBMQeXtHT1eKJ2czL+zUdqnR+WEUwIDAQABo0IwQDAdBgNVHQ4E +FgQUu69+Aj36pvE8hI6t7jiY7NkyMtQwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB +/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAArx1UaEt65Ru2yyTUEUAJNMnMvl +wFTPoCWOAvn9sKIN9SCYPBMtrFaisNZ+EZLpLrqeLppysb0ZRGxhNaKatBYSaVqM +4dc+pBroLwP0rmEdEBsqpIt6xf4FpuHA1sj+nq6PK7o9mfjYcwlYRm6mnPTXJ9OV +2jeDchzTc+CiR5kDOF3VSXkAKRzH7JsgHAckaVd4sjn8OoSgtZx8jb8uk2Intzna +FxiuvTwJaP+EmzzV1gsD41eeFPfR60/IvYcjt7ZJQ3mFXLrrkguhxuhoqEwWsRqZ +CuhTLJK7oQkYdQxlqHvLI7cawiiFwxv/0Cti76R7CZGYZ4wUAc1oBmpjIXUDgIiK +boHGhfKppC3n9KUkEEeDys30jXlYsQab5xoq2Z0B15R97QNKyvDb6KkBPvVWmcke +jkk9u+UJueBPSZI9FoJAzMxZxuY67RIuaTxslbH9qh17f4a+Hg4yRvv7E491f0yL +S0Zj/gA0QHDBw7mh3aZw4gSzQbzpgJHqZJx64SIDqZxubw5lT2yHh17zbqD5daWb +QOhTsiedSrnAdyGN/4fy3ryM7xfft0kL0fJuMAsaDk527RH89elWsn2/x20Kk4yl +0MC2Hb46TpSi125sC8KKfPog88Tk5c0NqMuRkrF8hey1FGlmDoLnzc7ILaZRfyHB +NVOFBkpdn627G190 +-----END CERTIFICATE----- + +# Issuer: CN=USERTrust RSA Certification Authority O=The USERTRUST Network +# Subject: CN=USERTrust RSA Certification Authority O=The USERTRUST Network +# Label: "USERTrust RSA Certification Authority" +# Serial: 2645093764781058787591871645665788717 +# MD5 Fingerprint: 1b:fe:69:d1:91:b7:19:33:a3:72:a8:0f:e1:55:e5:b5 +# SHA1 Fingerprint: 2b:8f:1b:57:33:0d:bb:a2:d0:7a:6c:51:f7:0e:e9:0d:da:b9:ad:8e +# SHA256 Fingerprint: e7:93:c9:b0:2f:d8:aa:13:e2:1c:31:22:8a:cc:b0:81:19:64:3b:74:9c:89:89:64:b1:74:6d:46:c3:d4:cb:d2 +-----BEGIN CERTIFICATE----- +MIIF3jCCA8agAwIBAgIQAf1tMPyjylGoG7xkDjUDLTANBgkqhkiG9w0BAQwFADCB +iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0pl +cnNleSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNV +BAMTJVVTRVJUcnVzdCBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAw +MjAxMDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNV +BAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVU +aGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBSU0EgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCAEmUXNg7D2wiz0KxXDXbtzSfTTK1Qg2HiqiBNCS1kCdzOiZ/MPans9s/B +3PHTsdZ7NygRK0faOca8Ohm0X6a9fZ2jY0K2dvKpOyuR+OJv0OwWIJAJPuLodMkY +tJHUYmTbf6MG8YgYapAiPLz+E/CHFHv25B+O1ORRxhFnRghRy4YUVD+8M/5+bJz/ +Fp0YvVGONaanZshyZ9shZrHUm3gDwFA66Mzw3LyeTP6vBZY1H1dat//O+T23LLb2 +VN3I5xI6Ta5MirdcmrS3ID3KfyI0rn47aGYBROcBTkZTmzNg95S+UzeQc0PzMsNT +79uq/nROacdrjGCT3sTHDN/hMq7MkztReJVni+49Vv4M0GkPGw/zJSZrM233bkf6 +c0Plfg6lZrEpfDKEY1WJxA3Bk1QwGROs0303p+tdOmw1XNtB1xLaqUkL39iAigmT +Yo61Zs8liM2EuLE/pDkP2QKe6xJMlXzzawWpXhaDzLhn4ugTncxbgtNMs+1b/97l +c6wjOy0AvzVVdAlJ2ElYGn+SNuZRkg7zJn0cTRe8yexDJtC/QV9AqURE9JnnV4ee +UB9XVKg+/XRjL7FQZQnmWEIuQxpMtPAlR1n6BB6T1CZGSlCBst6+eLf8ZxXhyVeE +Hg9j1uliutZfVS7qXMYoCAQlObgOK6nyTJccBz8NUvXt7y+CDwIDAQABo0IwQDAd +BgNVHQ4EFgQUU3m/WqorSs9UgOHYm8Cd8rIDZsswDgYDVR0PAQH/BAQDAgEGMA8G +A1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEMBQADggIBAFzUfA3P9wF9QZllDHPF +Up/L+M+ZBn8b2kMVn54CVVeWFPFSPCeHlCjtHzoBN6J2/FNQwISbxmtOuowhT6KO +VWKR82kV2LyI48SqC/3vqOlLVSoGIG1VeCkZ7l8wXEskEVX/JJpuXior7gtNn3/3 +ATiUFJVDBwn7YKnuHKsSjKCaXqeYalltiz8I+8jRRa8YFWSQEg9zKC7F4iRO/Fjs +8PRF/iKz6y+O0tlFYQXBl2+odnKPi4w2r78NBc5xjeambx9spnFixdjQg3IM8WcR +iQycE0xyNN+81XHfqnHd4blsjDwSXWXavVcStkNr/+XeTWYRUc+ZruwXtuhxkYze +Sf7dNXGiFSeUHM9h4ya7b6NnJSFd5t0dCy5oGzuCr+yDZ4XUmFF0sbmZgIn/f3gZ +XHlKYC6SQK5MNyosycdiyA5d9zZbyuAlJQG03RoHnHcAP9Dc1ew91Pq7P8yF1m9/ +qS3fuQL39ZeatTXaw2ewh0qpKJ4jjv9cJ2vhsE/zB+4ALtRZh8tSQZXq9EfX7mRB +VXyNWQKV3WKdwrnuWih0hKWbt5DHDAff9Yk2dDLWKMGwsAvgnEzDHNb842m1R0aB +L6KCq9NjRHDEjf8tM7qtj3u1cIiuPhnPQCjY/MiQu12ZIvVS5ljFH4gxQ+6IHdfG +jjxDah2nGN59PRbxYvnKkKj9 +-----END CERTIFICATE----- + +# Issuer: CN=USERTrust ECC Certification Authority O=The USERTRUST Network +# Subject: CN=USERTrust ECC Certification Authority O=The USERTRUST Network +# Label: "USERTrust ECC Certification Authority" +# Serial: 123013823720199481456569720443997572134 +# MD5 Fingerprint: fa:68:bc:d9:b5:7f:ad:fd:c9:1d:06:83:28:cc:24:c1 +# SHA1 Fingerprint: d1:cb:ca:5d:b2:d5:2a:7f:69:3b:67:4d:e5:f0:5a:1d:0c:95:7d:f0 +# SHA256 Fingerprint: 4f:f4:60:d5:4b:9c:86:da:bf:bc:fc:57:12:e0:40:0d:2b:ed:3f:bc:4d:4f:bd:aa:86:e0:6a:dc:d2:a9:ad:7a +-----BEGIN CERTIFICATE----- +MIICjzCCAhWgAwIBAgIQXIuZxVqUxdJxVt7NiYDMJjAKBggqhkjOPQQDAzCBiDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCk5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNl +eSBDaXR5MR4wHAYDVQQKExVUaGUgVVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMT +JVVTRVJUcnVzdCBFQ0MgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTAwMjAx +MDAwMDAwWhcNMzgwMTE4MjM1OTU5WjCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgT +Ck5ldyBKZXJzZXkxFDASBgNVBAcTC0plcnNleSBDaXR5MR4wHAYDVQQKExVUaGUg +VVNFUlRSVVNUIE5ldHdvcmsxLjAsBgNVBAMTJVVTRVJUcnVzdCBFQ0MgQ2VydGlm +aWNhdGlvbiBBdXRob3JpdHkwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAAQarFRaqflo +I+d61SRvU8Za2EurxtW20eZzca7dnNYMYf3boIkDuAUU7FfO7l0/4iGzzvfUinng +o4N+LZfQYcTxmdwlkWOrfzCjtHDix6EznPO/LlxTsV+zfTJ/ijTjeXmjQjBAMB0G +A1UdDgQWBBQ64QmG1M8ZwpZ2dEl23OA1xmNjmjAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjA2Z6EWCNzklwBBHU6+4WMB +zzuqQhFkoJ2UOQIReVx7Hfpkue4WQrO/isIJxOzksU0CMQDpKmFHjFJKS04YcPbW +RNZu9YO6bVi9JNlWSOrvxKJGgYhqOkbRqZtNyWHa0V1Xahg= +-----END CERTIFICATE----- + +# Issuer: CN=GlobalSign O=GlobalSign OU=GlobalSign ECC Root CA - R5 +# Subject: CN=GlobalSign O=GlobalSign OU=GlobalSign ECC Root CA - R5 +# Label: "GlobalSign ECC Root CA - R5" +# Serial: 32785792099990507226680698011560947931244 +# MD5 Fingerprint: 9f:ad:3b:1c:02:1e:8a:ba:17:74:38:81:0c:a2:bc:08 +# SHA1 Fingerprint: 1f:24:c6:30:cd:a4:18:ef:20:69:ff:ad:4f:dd:5f:46:3a:1b:69:aa +# SHA256 Fingerprint: 17:9f:bc:14:8a:3d:d0:0f:d2:4e:a1:34:58:cc:43:bf:a7:f5:9c:81:82:d7:83:a5:13:f6:eb:ec:10:0c:89:24 +-----BEGIN CERTIFICATE----- +MIICHjCCAaSgAwIBAgIRYFlJ4CYuu1X5CneKcflK2GwwCgYIKoZIzj0EAwMwUDEk +MCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBDQSAtIFI1MRMwEQYDVQQKEwpH +bG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWduMB4XDTEyMTExMzAwMDAwMFoX +DTM4MDExOTAzMTQwN1owUDEkMCIGA1UECxMbR2xvYmFsU2lnbiBFQ0MgUm9vdCBD +QSAtIFI1MRMwEQYDVQQKEwpHbG9iYWxTaWduMRMwEQYDVQQDEwpHbG9iYWxTaWdu +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAER0UOlvt9Xb/pOdEh+J8LttV7HpI6SFkc +8GIxLcB6KP4ap1yztsyX50XUWPrRd21DosCHZTQKH3rd6zwzocWdTaRvQZU4f8ke +hOvRnkmSh5SHDDqFSmafnVmTTZdhBoZKo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYD +VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUPeYpSJvqB8ohREom3m7e0oPQn1kwCgYI +KoZIzj0EAwMDaAAwZQIxAOVpEslu28YxuglB4Zf4+/2a4n0Sye18ZNPLBSWLVtmg +515dTguDnFt2KaAJJiFqYgIwcdK1j1zqO+F4CYWodZI7yFz9SO8NdCKoCOJuxUnO +xwy8p2Fp8fc74SrL+SvzZpA3 +-----END CERTIFICATE----- + +# Issuer: CN=Staat der Nederlanden EV Root CA O=Staat der Nederlanden +# Subject: CN=Staat der Nederlanden EV Root CA O=Staat der Nederlanden +# Label: "Staat der Nederlanden EV Root CA" +# Serial: 10000013 +# MD5 Fingerprint: fc:06:af:7b:e8:1a:f1:9a:b4:e8:d2:70:1f:c0:f5:ba +# SHA1 Fingerprint: 76:e2:7e:c1:4f:db:82:c1:c0:a6:75:b5:05:be:3d:29:b4:ed:db:bb +# SHA256 Fingerprint: 4d:24:91:41:4c:fe:95:67:46:ec:4c:ef:a6:cf:6f:72:e2:8a:13:29:43:2f:9d:8a:90:7a:c4:cb:5d:ad:c1:5a +-----BEGIN CERTIFICATE----- +MIIFcDCCA1igAwIBAgIEAJiWjTANBgkqhkiG9w0BAQsFADBYMQswCQYDVQQGEwJO +TDEeMBwGA1UECgwVU3RhYXQgZGVyIE5lZGVybGFuZGVuMSkwJwYDVQQDDCBTdGFh +dCBkZXIgTmVkZXJsYW5kZW4gRVYgUm9vdCBDQTAeFw0xMDEyMDgxMTE5MjlaFw0y +MjEyMDgxMTEwMjhaMFgxCzAJBgNVBAYTAk5MMR4wHAYDVQQKDBVTdGFhdCBkZXIg +TmVkZXJsYW5kZW4xKTAnBgNVBAMMIFN0YWF0IGRlciBOZWRlcmxhbmRlbiBFViBS +b290IENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA48d+ifkkSzrS +M4M1LGns3Amk41GoJSt5uAg94JG6hIXGhaTK5skuU6TJJB79VWZxXSzFYGgEt9nC +UiY4iKTWO0Cmws0/zZiTs1QUWJZV1VD+hq2kY39ch/aO5ieSZxeSAgMs3NZmdO3d +Z//BYY1jTw+bbRcwJu+r0h8QoPnFfxZpgQNH7R5ojXKhTbImxrpsX23Wr9GxE46p +rfNeaXUmGD5BKyF/7otdBwadQ8QpCiv8Kj6GyzyDOvnJDdrFmeK8eEEzduG/L13l +pJhQDBXd4Pqcfzho0LKmeqfRMb1+ilgnQ7O6M5HTp5gVXJrm0w912fxBmJc+qiXb +j5IusHsMX/FjqTf5m3VpTCgmJdrV8hJwRVXj33NeN/UhbJCONVrJ0yPr08C+eKxC +KFhmpUZtcALXEPlLVPxdhkqHz3/KRawRWrUgUY0viEeXOcDPusBCAUCZSCELa6fS +/ZbV0b5GnUngC6agIk440ME8MLxwjyx1zNDFjFE7PZQIZCZhfbnDZY8UnCHQqv0X +cgOPvZuM5l5Tnrmd74K74bzickFbIZTTRTeU0d8JOV3nI6qaHcptqAqGhYqCvkIH +1vI4gnPah1vlPNOePqc7nvQDs/nxfRN0Av+7oeX6AHkcpmZBiFxgV6YuCcS6/ZrP +px9Aw7vMWgpVSzs4dlG4Y4uElBbmVvMCAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFP6rAJCYniT8qcwaivsnuL8wbqg7 +MA0GCSqGSIb3DQEBCwUAA4ICAQDPdyxuVr5Os7aEAJSrR8kN0nbHhp8dB9O2tLsI +eK9p0gtJ3jPFrK3CiAJ9Brc1AsFgyb/E6JTe1NOpEyVa/m6irn0F3H3zbPB+po3u +2dfOWBfoqSmuc0iH55vKbimhZF8ZE/euBhD/UcabTVUlT5OZEAFTdfETzsemQUHS +v4ilf0X8rLiltTMMgsT7B/Zq5SWEXwbKwYY5EdtYzXc7LMJMD16a4/CrPmEbUCTC +wPTxGfARKbalGAKb12NMcIxHowNDXLldRqANb/9Zjr7dn3LDWyvfjFvO5QxGbJKy +CqNMVEIYFRIYvdr8unRu/8G2oGTYqV9Vrp9canaW2HNnh/tNf1zuacpzEPuKqf2e +vTY4SUmH9A4U8OmHuD+nT3pajnnUk+S7aFKErGzp85hwVXIy+TSrK0m1zSBi5Dp6 +Z2Orltxtrpfs/J92VoguZs9btsmksNcFuuEnL5O7Jiqik7Ab846+HUCjuTaPPoIa +Gl6I6lD4WeKDRikL40Rc4ZW2aZCaFG+XroHPaO+Zmr615+F/+PoTRxZMzG0IQOeL +eG9QgkRQP2YGiqtDhFZKDyAthg710tvSeopLzaXoTvFeJiUBWSOgftL2fiFX1ye8 +FVdMpEbB4IMeDExNH08GGeL5qPQ6gqGyeUN51q1veieQA6TqJIc/2b3Z6fJfUEkc +7uzXLg== +-----END CERTIFICATE----- + +# Issuer: CN=IdenTrust Commercial Root CA 1 O=IdenTrust +# Subject: CN=IdenTrust Commercial Root CA 1 O=IdenTrust +# Label: "IdenTrust Commercial Root CA 1" +# Serial: 13298821034946342390520003877796839426 +# MD5 Fingerprint: b3:3e:77:73:75:ee:a0:d3:e3:7e:49:63:49:59:bb:c7 +# SHA1 Fingerprint: df:71:7e:aa:4a:d9:4e:c9:55:84:99:60:2d:48:de:5f:bc:f0:3a:25 +# SHA256 Fingerprint: 5d:56:49:9b:e4:d2:e0:8b:cf:ca:d0:8a:3e:38:72:3d:50:50:3b:de:70:69:48:e4:2f:55:60:30:19:e5:28:ae +-----BEGIN CERTIFICATE----- +MIIFYDCCA0igAwIBAgIQCgFCgAAAAUUjyES1AAAAAjANBgkqhkiG9w0BAQsFADBK +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScwJQYDVQQDEx5JZGVu +VHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwHhcNMTQwMTE2MTgxMjIzWhcNMzQw +MTE2MTgxMjIzWjBKMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MScw +JQYDVQQDEx5JZGVuVHJ1c3QgQ29tbWVyY2lhbCBSb290IENBIDEwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQCnUBneP5k91DNG8W9RYYKyqU+PZ4ldhNlT +3Qwo2dfw/66VQ3KZ+bVdfIrBQuExUHTRgQ18zZshq0PirK1ehm7zCYofWjK9ouuU ++ehcCuz/mNKvcbO0U59Oh++SvL3sTzIwiEsXXlfEU8L2ApeN2WIrvyQfYo3fw7gp +S0l4PJNgiCL8mdo2yMKi1CxUAGc1bnO/AljwpN3lsKImesrgNqUZFvX9t++uP0D1 +bVoE/c40yiTcdCMbXTMTEl3EASX2MN0CXZ/g1Ue9tOsbobtJSdifWwLziuQkkORi +T0/Br4sOdBeo0XKIanoBScy0RnnGF7HamB4HWfp1IYVl3ZBWzvurpWCdxJ35UrCL +vYf5jysjCiN2O/cz4ckA82n5S6LgTrx+kzmEB/dEcH7+B1rlsazRGMzyNeVJSQjK +Vsk9+w8YfYs7wRPCTY/JTw436R+hDmrfYi7LNQZReSzIJTj0+kuniVyc0uMNOYZK +dHzVWYfCP04MXFL0PfdSgvHqo6z9STQaKPNBiDoT7uje/5kdX7rL6B7yuVBgwDHT +c+XvvqDtMwt0viAgxGds8AgDelWAf0ZOlqf0Hj7h9tgJ4TNkK2PXMl6f+cB7D3hv +l7yTmvmcEpB4eoCHFddydJxVdHixuuFucAS6T6C6aMN7/zHwcz09lCqxC0EOoP5N +iGVreTO01wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB +/zAdBgNVHQ4EFgQU7UQZwNPwBovupHu+QucmVMiONnYwDQYJKoZIhvcNAQELBQAD +ggIBAA2ukDL2pkt8RHYZYR4nKM1eVO8lvOMIkPkp165oCOGUAFjvLi5+U1KMtlwH +6oi6mYtQlNeCgN9hCQCTrQ0U5s7B8jeUeLBfnLOic7iPBZM4zY0+sLj7wM+x8uwt +LRvM7Kqas6pgghstO8OEPVeKlh6cdbjTMM1gCIOQ045U8U1mwF10A0Cj7oV+wh93 +nAbowacYXVKV7cndJZ5t+qntozo00Fl72u1Q8zW/7esUTTHHYPTa8Yec4kjixsU3 ++wYQ+nVZZjFHKdp2mhzpgq7vmrlR94gjmmmVYjzlVYA211QC//G5Xc7UI2/YRYRK +W2XviQzdFKcgyxilJbQN+QHwotL0AMh0jqEqSI5l2xPE4iUXfeu+h1sXIFRRk0pT +AwvsXcoz7WL9RccvW9xYoIA55vrX/hMUpu09lEpCdNTDd1lzzY9GvlU47/rokTLq +l1gEIt44w8y8bckzOmoKaT+gyOpyj4xjhiO9bTyWnpXgSUyqorkqG5w2gXjtw+hG +4iZZRHUe2XWJUc0QhJ1hYMtd+ZciTY6Y5uN/9lu7rs3KSoFrXgvzUeF0K+l+J6fZ +mUlO+KWA2yUPHGNiiskzZ2s8EIPGrd6ozRaOjfAHN3Gf8qv8QfXBi+wAN10J5U6A +7/qxXDgGpRtK4dw4LTzcqx+QGtVKnO7RcGzM7vRX+Bi6hG6H +-----END CERTIFICATE----- + +# Issuer: CN=IdenTrust Public Sector Root CA 1 O=IdenTrust +# Subject: CN=IdenTrust Public Sector Root CA 1 O=IdenTrust +# Label: "IdenTrust Public Sector Root CA 1" +# Serial: 13298821034946342390521976156843933698 +# MD5 Fingerprint: 37:06:a5:b0:fc:89:9d:ba:f4:6b:8c:1a:64:cd:d5:ba +# SHA1 Fingerprint: ba:29:41:60:77:98:3f:f4:f3:ef:f2:31:05:3b:2e:ea:6d:4d:45:fd +# SHA256 Fingerprint: 30:d0:89:5a:9a:44:8a:26:20:91:63:55:22:d1:f5:20:10:b5:86:7a:ca:e1:2c:78:ef:95:8f:d4:f4:38:9f:2f +-----BEGIN CERTIFICATE----- +MIIFZjCCA06gAwIBAgIQCgFCgAAAAUUjz0Z8AAAAAjANBgkqhkiG9w0BAQsFADBN +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0MSowKAYDVQQDEyFJZGVu +VHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwHhcNMTQwMTE2MTc1MzMyWhcN +MzQwMTE2MTc1MzMyWjBNMQswCQYDVQQGEwJVUzESMBAGA1UEChMJSWRlblRydXN0 +MSowKAYDVQQDEyFJZGVuVHJ1c3QgUHVibGljIFNlY3RvciBSb290IENBIDEwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC2IpT8pEiv6EdrCvsnduTyP4o7 +ekosMSqMjbCpwzFrqHd2hCa2rIFCDQjrVVi7evi8ZX3yoG2LqEfpYnYeEe4IFNGy +RBb06tD6Hi9e28tzQa68ALBKK0CyrOE7S8ItneShm+waOh7wCLPQ5CQ1B5+ctMlS +bdsHyo+1W/CD80/HLaXIrcuVIKQxKFdYWuSNG5qrng0M8gozOSI5Cpcu81N3uURF +/YTLNiCBWS2ab21ISGHKTN9T0a9SvESfqy9rg3LvdYDaBjMbXcjaY8ZNzaxmMc3R +3j6HEDbhuaR672BQssvKplbgN6+rNBM5Jeg5ZuSYeqoSmJxZZoY+rfGwyj4GD3vw +EUs3oERte8uojHH01bWRNszwFcYr3lEXsZdMUD2xlVl8BX0tIdUAvwFnol57plzy +9yLxkA2T26pEUWbMfXYD62qoKjgZl3YNa4ph+bz27nb9cCvdKTz4Ch5bQhyLVi9V +GxyhLrXHFub4qjySjmm2AcG1hp2JDws4lFTo6tyePSW8Uybt1as5qsVATFSrsrTZ +2fjXctscvG29ZV/viDUqZi/u9rNl8DONfJhBaUYPQxxp+pu10GFqzcpL2UyQRqsV +WaFHVCkugyhfHMKiq3IXAAaOReyL4jM9f9oZRORicsPfIsbyVtTdX5Vy7W1f90gD +W/3FKqD2cyOEEBsB5wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQU43HgntinQtnbcZFrlJPrw6PRFKMwDQYJKoZIhvcN +AQELBQADggIBAEf63QqwEZE4rU1d9+UOl1QZgkiHVIyqZJnYWv6IAcVYpZmxI1Qj +t2odIFflAWJBF9MJ23XLblSQdf4an4EKwt3X9wnQW3IV5B4Jaj0z8yGa5hV+rVHV +DRDtfULAj+7AmgjVQdZcDiFpboBhDhXAuM/FSRJSzL46zNQuOAXeNf0fb7iAaJg9 +TaDKQGXSc3z1i9kKlT/YPyNtGtEqJBnZhbMX73huqVjRI9PHE+1yJX9dsXNw0H8G +lwmEKYBhHfpe/3OsoOOJuBxxFcbeMX8S3OFtm6/n6J91eEyrRjuazr8FGF1NFTwW +mhlQBJqymm9li1JfPFgEKCXAZmExfrngdbkaqIHWchezxQMxNRF4eKLg6TCMf4Df +WN88uieW4oA0beOY02QnrEh+KHdcxiVhJfiFDGX6xDIvpZgF5PgLZxYWxoK4Mhn5 ++bl53B/N66+rDt0b20XkeucC4pVd/GnwU2lhlXV5C15V5jgclKlZM57IcXR5f1GJ +tshquDDIajjDbp7hNxbqBWJMWxJH7ae0s1hWx0nzfxJoCTFx8G34Tkf71oXuxVhA +GaQdp/lLQzfcaFpPz+vCZHTetBXZ9FRUGi8c15dxVJCO2SCdUyt/q4/i6jC8UDfv +8Ue1fXwsBOxonbRJRBD0ckscZOf85muQ3Wl9af0AVqW3rLatt8o+Ae+c +-----END CERTIFICATE----- + +# Issuer: CN=Entrust Root Certification Authority - G2 O=Entrust, Inc. OU=See www.entrust.net/legal-terms/(c) 2009 Entrust, Inc. - for authorized use only +# Subject: CN=Entrust Root Certification Authority - G2 O=Entrust, Inc. OU=See www.entrust.net/legal-terms/(c) 2009 Entrust, Inc. - for authorized use only +# Label: "Entrust Root Certification Authority - G2" +# Serial: 1246989352 +# MD5 Fingerprint: 4b:e2:c9:91:96:65:0c:f4:0e:5a:93:92:a0:0a:fe:b2 +# SHA1 Fingerprint: 8c:f4:27:fd:79:0c:3a:d1:66:06:8d:e8:1e:57:ef:bb:93:22:72:d4 +# SHA256 Fingerprint: 43:df:57:74:b0:3e:7f:ef:5f:e4:0d:93:1a:7b:ed:f1:bb:2e:6b:42:73:8c:4e:6d:38:41:10:3d:3a:a7:f3:39 +-----BEGIN CERTIFICATE----- +MIIEPjCCAyagAwIBAgIESlOMKDANBgkqhkiG9w0BAQsFADCBvjELMAkGA1UEBhMC +VVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50 +cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3Qs +IEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVz +dCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRzIwHhcNMDkwNzA3MTcy +NTU0WhcNMzAxMjA3MTc1NTU0WjCBvjELMAkGA1UEBhMCVVMxFjAUBgNVBAoTDUVu +dHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3d3cuZW50cnVzdC5uZXQvbGVnYWwt +dGVybXMxOTA3BgNVBAsTMChjKSAyMDA5IEVudHJ1c3QsIEluYy4gLSBmb3IgYXV0 +aG9yaXplZCB1c2Ugb25seTEyMDAGA1UEAxMpRW50cnVzdCBSb290IENlcnRpZmlj +YXRpb24gQXV0aG9yaXR5IC0gRzIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQC6hLZy254Ma+KZ6TABp3bqMriVQRrJ2mFOWHLP/vaCeb9zYQYKpSfYs1/T +RU4cctZOMvJyig/3gxnQaoCAAEUesMfnmr8SVycco2gvCoe9amsOXmXzHHfV1IWN +cCG0szLni6LVhjkCsbjSR87kyUnEO6fe+1R9V77w6G7CebI6C1XiUJgWMhNcL3hW +wcKUs/Ja5CeanyTXxuzQmyWC48zCxEXFjJd6BmsqEZ+pCm5IO2/b1BEZQvePB7/1 +U1+cPvQXLOZprE4yTGJ36rfo5bs0vBmLrpxR57d+tVOxMyLlbc9wPBr64ptntoP0 +jaWvYkxN4FisZDQSA/i2jZRjJKRxAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBRqciZ60B7vfec7aVHUbI2fkBJmqzAN +BgkqhkiG9w0BAQsFAAOCAQEAeZ8dlsa2eT8ijYfThwMEYGprmi5ZiXMRrEPR9RP/ +jTkrwPK9T3CMqS/qF8QLVJ7UG5aYMzyorWKiAHarWWluBh1+xLlEjZivEtRh2woZ +Rkfz6/djwUAFQKXSt/S1mja/qYh2iARVBCuch38aNzx+LaUa2NSJXsq9rD1s2G2v +1fN2D807iDginWyTmsQ9v4IbZT+mD12q/OWyFcq1rca8PdCE6OoGcrBNOTJ4vz4R +nAuknZoh8/CbCzB428Hch0P+vGOaysXCHMnHjf87ElgI5rY97HosTvuDls4MPGmH +VHOkc8KT/1EQrBVUAdj8BbGJoX90g5pJ19xOe4pIb4tF9g== +-----END CERTIFICATE----- + +# Issuer: CN=Entrust Root Certification Authority - EC1 O=Entrust, Inc. OU=See www.entrust.net/legal-terms/(c) 2012 Entrust, Inc. - for authorized use only +# Subject: CN=Entrust Root Certification Authority - EC1 O=Entrust, Inc. OU=See www.entrust.net/legal-terms/(c) 2012 Entrust, Inc. - for authorized use only +# Label: "Entrust Root Certification Authority - EC1" +# Serial: 51543124481930649114116133369 +# MD5 Fingerprint: b6:7e:1d:f0:58:c5:49:6c:24:3b:3d:ed:98:18:ed:bc +# SHA1 Fingerprint: 20:d8:06:40:df:9b:25:f5:12:25:3a:11:ea:f7:59:8a:eb:14:b5:47 +# SHA256 Fingerprint: 02:ed:0e:b2:8c:14:da:45:16:5c:56:67:91:70:0d:64:51:d7:fb:56:f0:b2:ab:1d:3b:8e:b0:70:e5:6e:df:f5 +-----BEGIN CERTIFICATE----- +MIIC+TCCAoCgAwIBAgINAKaLeSkAAAAAUNCR+TAKBggqhkjOPQQDAzCBvzELMAkG +A1UEBhMCVVMxFjAUBgNVBAoTDUVudHJ1c3QsIEluYy4xKDAmBgNVBAsTH1NlZSB3 +d3cuZW50cnVzdC5uZXQvbGVnYWwtdGVybXMxOTA3BgNVBAsTMChjKSAyMDEyIEVu +dHJ1c3QsIEluYy4gLSBmb3IgYXV0aG9yaXplZCB1c2Ugb25seTEzMDEGA1UEAxMq +RW50cnVzdCBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IC0gRUMxMB4XDTEy +MTIxODE1MjUzNloXDTM3MTIxODE1NTUzNlowgb8xCzAJBgNVBAYTAlVTMRYwFAYD +VQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1c3QubmV0 +L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxMiBFbnRydXN0LCBJbmMuIC0g +Zm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMzAxBgNVBAMTKkVudHJ1c3QgUm9vdCBD +ZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEVDMTB2MBAGByqGSM49AgEGBSuBBAAi +A2IABIQTydC6bUF74mzQ61VfZgIaJPRbiWlH47jCffHyAsWfoPZb1YsGGYZPUxBt +ByQnoaD41UcZYUx9ypMn6nQM72+WCf5j7HBdNq1nd67JnXxVRDqiY1Ef9eNi1KlH +Bz7MIKNCMEAwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O +BBYEFLdj5xrdjekIplWDpOBqUEFlEUJJMAoGCCqGSM49BAMDA2cAMGQCMGF52OVC +R98crlOZF7ZvHH3hvxGU0QOIdeSNiaSKd0bebWHvAvX7td/M/k7//qnmpwIwW5nX +hTcGtXsI/esni0qU+eH6p44mCOh8kmhtc9hvJqwhAriZtyZBWyVgrtBIGu4G +-----END CERTIFICATE----- + +# Issuer: CN=CFCA EV ROOT O=China Financial Certification Authority +# Subject: CN=CFCA EV ROOT O=China Financial Certification Authority +# Label: "CFCA EV ROOT" +# Serial: 407555286 +# MD5 Fingerprint: 74:e1:b6:ed:26:7a:7a:44:30:33:94:ab:7b:27:81:30 +# SHA1 Fingerprint: e2:b8:29:4b:55:84:ab:6b:58:c2:90:46:6c:ac:3f:b8:39:8f:84:83 +# SHA256 Fingerprint: 5c:c3:d7:8e:4e:1d:5e:45:54:7a:04:e6:87:3e:64:f9:0c:f9:53:6d:1c:cc:2e:f8:00:f3:55:c4:c5:fd:70:fd +-----BEGIN CERTIFICATE----- +MIIFjTCCA3WgAwIBAgIEGErM1jANBgkqhkiG9w0BAQsFADBWMQswCQYDVQQGEwJD +TjEwMC4GA1UECgwnQ2hpbmEgRmluYW5jaWFsIENlcnRpZmljYXRpb24gQXV0aG9y +aXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJPT1QwHhcNMTIwODA4MDMwNzAxWhcNMjkx +MjMxMDMwNzAxWjBWMQswCQYDVQQGEwJDTjEwMC4GA1UECgwnQ2hpbmEgRmluYW5j +aWFsIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MRUwEwYDVQQDDAxDRkNBIEVWIFJP +T1QwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDXXWvNED8fBVnVBU03 +sQ7smCuOFR36k0sXgiFxEFLXUWRwFsJVaU2OFW2fvwwbwuCjZ9YMrM8irq93VCpL +TIpTUnrD7i7es3ElweldPe6hL6P3KjzJIx1qqx2hp/Hz7KDVRM8Vz3IvHWOX6Jn5 +/ZOkVIBMUtRSqy5J35DNuF++P96hyk0g1CXohClTt7GIH//62pCfCqktQT+x8Rgp +7hZZLDRJGqgG16iI0gNyejLi6mhNbiyWZXvKWfry4t3uMCz7zEasxGPrb382KzRz +EpR/38wmnvFyXVBlWY9ps4deMm/DGIq1lY+wejfeWkU7xzbh72fROdOXW3NiGUgt +hxwG+3SYIElz8AXSG7Ggo7cbcNOIabla1jj0Ytwli3i/+Oh+uFzJlU9fpy25IGvP +a931DfSCt/SyZi4QKPaXWnuWFo8BGS1sbn85WAZkgwGDg8NNkt0yxoekN+kWzqot +aK8KgWU6cMGbrU1tVMoqLUuFG7OA5nBFDWteNfB/O7ic5ARwiRIlk9oKmSJgamNg +TnYGmE69g60dWIolhdLHZR4tjsbftsbhf4oEIRUpdPA+nJCdDC7xij5aqgwJHsfV +PKPtl8MeNPo4+QgO48BdK4PRVmrJtqhUUy54Mmc9gn900PvhtgVguXDbjgv5E1hv +cWAQUhC5wUEJ73IfZzF4/5YFjQIDAQABo2MwYTAfBgNVHSMEGDAWgBTj/i39KNAL +tbq2osS/BqoFjJP7LzAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAd +BgNVHQ4EFgQU4/4t/SjQC7W6tqLEvwaqBYyT+y8wDQYJKoZIhvcNAQELBQADggIB +ACXGumvrh8vegjmWPfBEp2uEcwPenStPuiB/vHiyz5ewG5zz13ku9Ui20vsXiObT +ej/tUxPQ4i9qecsAIyjmHjdXNYmEwnZPNDatZ8POQQaIxffu2Bq41gt/UP+TqhdL +jOztUmCypAbqTuv0axn96/Ua4CUqmtzHQTb3yHQFhDmVOdYLO6Qn+gjYXB74BGBS +ESgoA//vU2YApUo0FmZ8/Qmkrp5nGm9BC2sGE5uPhnEFtC+NiWYzKXZUmhH4J/qy +P5Hgzg0b8zAarb8iXRvTvyUFTeGSGn+ZnzxEk8rUQElsgIfXBDrDMlI1Dlb4pd19 +xIsNER9Tyx6yF7Zod1rg1MvIB671Oi6ON7fQAUtDKXeMOZePglr4UeWJoBjnaH9d +Ci77o0cOPaYjesYBx4/IXr9tgFa+iiS6M+qf4TIRnvHST4D2G0CvOJ4RUHlzEhLN +5mydLIhyPDCBBpEi6lmt2hkuIsKNuYyH4Ga8cyNfIWRjgEj1oDwYPZTISEEdQLpe +/v5WOaHIz16eGWRGENoXkbcFgKyLmZJ956LYBws2J+dIeWCKw9cTXPhyQN9Ky8+Z +AAoACxGV2lZFA4gKn2fQ1XmxqI1AbQ3CekD6819kR5LLU7m7Wc5P/dAVUwHY3+vZ +5nbv0CO7O6l5s9UCKc2Jo5YPSjXnTkLAdc0Hz+Ys63su +-----END CERTIFICATE----- + +# Issuer: CN=OISTE WISeKey Global Root GB CA O=WISeKey OU=OISTE Foundation Endorsed +# Subject: CN=OISTE WISeKey Global Root GB CA O=WISeKey OU=OISTE Foundation Endorsed +# Label: "OISTE WISeKey Global Root GB CA" +# Serial: 157768595616588414422159278966750757568 +# MD5 Fingerprint: a4:eb:b9:61:28:2e:b7:2f:98:b0:35:26:90:99:51:1d +# SHA1 Fingerprint: 0f:f9:40:76:18:d3:d7:6a:4b:98:f0:a8:35:9e:0c:fd:27:ac:cc:ed +# SHA256 Fingerprint: 6b:9c:08:e8:6e:b0:f7:67:cf:ad:65:cd:98:b6:21:49:e5:49:4a:67:f5:84:5e:7b:d1:ed:01:9f:27:b8:6b:d6 +-----BEGIN CERTIFICATE----- +MIIDtTCCAp2gAwIBAgIQdrEgUnTwhYdGs/gjGvbCwDANBgkqhkiG9w0BAQsFADBt +MQswCQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUg +Rm91bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9i +YWwgUm9vdCBHQiBDQTAeFw0xNDEyMDExNTAwMzJaFw0zOTEyMDExNTEwMzFaMG0x +CzAJBgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBG +b3VuZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2Jh +bCBSb290IEdCIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2Be3 +HEokKtaXscriHvt9OO+Y9bI5mE4nuBFde9IllIiCFSZqGzG7qFshISvYD06fWvGx +WuR51jIjK+FTzJlFXHtPrby/h0oLS5daqPZI7H17Dc0hBt+eFf1Biki3IPShehtX +1F1Q/7pn2COZH8g/497/b1t3sWtuuMlk9+HKQUYOKXHQuSP8yYFfTvdv37+ErXNk +u7dCjmn21HYdfp2nuFeKUWdy19SouJVUQHMD9ur06/4oQnc/nSMbsrY9gBQHTC5P +99UKFg29ZkM3fiNDecNAhvVMKdqOmq0NpQSHiB6F4+lT1ZvIiwNjeOvgGUpuuy9r +M2RYk61pv48b74JIxwIDAQABo1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUNQ/INmNe4qPs+TtmFc5RUuORmj0wEAYJKwYBBAGCNxUB +BAMCAQAwDQYJKoZIhvcNAQELBQADggEBAEBM+4eymYGQfp3FsLAmzYh7KzKNbrgh +cViXfa43FK8+5/ea4n32cZiZBKpDdHij40lhPnOMTZTg+XHEthYOU3gf1qKHLwI5 +gSk8rxWYITD+KJAAjNHhy/peyP34EEY7onhCkRd0VQreUGdNZtGn//3ZwLWoo4rO +ZvUPQ82nK1d7Y0Zqqi5S2PTt4W2tKZB4SLrhI6qjiey1q5bAtEuiHZeeevJuQHHf +aPFlTc58Bd9TZaml8LGXBHAVRgOY1NK/VLSgWH1Sb9pWJmLU2NuJMW8c8CLC02Ic +Nc1MaRVUGpCY3useX8p3x8uOPUNpnJpY0CQ73xtAln41rYHHTnG6iBM= +-----END CERTIFICATE----- + +# Issuer: CN=SZAFIR ROOT CA2 O=Krajowa Izba Rozliczeniowa S.A. +# Subject: CN=SZAFIR ROOT CA2 O=Krajowa Izba Rozliczeniowa S.A. +# Label: "SZAFIR ROOT CA2" +# Serial: 357043034767186914217277344587386743377558296292 +# MD5 Fingerprint: 11:64:c1:89:b0:24:b1:8c:b1:07:7e:89:9e:51:9e:99 +# SHA1 Fingerprint: e2:52:fa:95:3f:ed:db:24:60:bd:6e:28:f3:9c:cc:cf:5e:b3:3f:de +# SHA256 Fingerprint: a1:33:9d:33:28:1a:0b:56:e5:57:d3:d3:2b:1c:e7:f9:36:7e:b0:94:bd:5f:a7:2a:7e:50:04:c8:de:d7:ca:fe +-----BEGIN CERTIFICATE----- +MIIDcjCCAlqgAwIBAgIUPopdB+xV0jLVt+O2XwHrLdzk1uQwDQYJKoZIhvcNAQEL +BQAwUTELMAkGA1UEBhMCUEwxKDAmBgNVBAoMH0tyYWpvd2EgSXpiYSBSb3psaWN6 +ZW5pb3dhIFMuQS4xGDAWBgNVBAMMD1NaQUZJUiBST09UIENBMjAeFw0xNTEwMTkw +NzQzMzBaFw0zNTEwMTkwNzQzMzBaMFExCzAJBgNVBAYTAlBMMSgwJgYDVQQKDB9L +cmFqb3dhIEl6YmEgUm96bGljemVuaW93YSBTLkEuMRgwFgYDVQQDDA9TWkFGSVIg +Uk9PVCBDQTIwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3vD5QqEvN +QLXOYeeWyrSh2gwisPq1e3YAd4wLz32ohswmUeQgPYUM1ljj5/QqGJ3a0a4m7utT +3PSQ1hNKDJA8w/Ta0o4NkjrcsbH/ON7Dui1fgLkCvUqdGw+0w8LBZwPd3BucPbOw +3gAeqDRHu5rr/gsUvTaE2g0gv/pby6kWIK05YO4vdbbnl5z5Pv1+TW9NL++IDWr6 +3fE9biCloBK0TXC5ztdyO4mTp4CEHCdJckm1/zuVnsHMyAHs6A6KCpbns6aH5db5 +BSsNl0BwPLqsdVqc1U2dAgrSS5tmS0YHF2Wtn2yIANwiieDhZNRnvDF5YTy7ykHN +XGoAyDw4jlivAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQD +AgEGMB0GA1UdDgQWBBQuFqlKGLXLzPVvUPMjX/hd56zwyDANBgkqhkiG9w0BAQsF +AAOCAQEAtXP4A9xZWx126aMqe5Aosk3AM0+qmrHUuOQn/6mWmc5G4G18TKI4pAZw +8PRBEew/R40/cof5O/2kbytTAOD/OblqBw7rHRz2onKQy4I9EYKL0rufKq8h5mOG +nXkZ7/e7DDWQw4rtTw/1zBLZpD67oPwglV9PJi8RI4NOdQcPv5vRtB3pEAT+ymCP +oky4rc/hkA/NrgrHXXu3UNLUYfrVFdvXn4dRVOul4+vJhaAlIDf7js4MNIThPIGy +d05DpYhfhmehPea0XGG2Ptv+tyjFogeutcrKjSoS75ftwjCkySp6+/NNIxuZMzSg +LvWpCz/UXeHPhJ/iGcJfitYgHuNztw== +-----END CERTIFICATE----- + +# Issuer: CN=Certum Trusted Network CA 2 O=Unizeto Technologies S.A. OU=Certum Certification Authority +# Subject: CN=Certum Trusted Network CA 2 O=Unizeto Technologies S.A. OU=Certum Certification Authority +# Label: "Certum Trusted Network CA 2" +# Serial: 44979900017204383099463764357512596969 +# MD5 Fingerprint: 6d:46:9e:d9:25:6d:08:23:5b:5e:74:7d:1e:27:db:f2 +# SHA1 Fingerprint: d3:dd:48:3e:2b:bf:4c:05:e8:af:10:f5:fa:76:26:cf:d3:dc:30:92 +# SHA256 Fingerprint: b6:76:f2:ed:da:e8:77:5c:d3:6c:b0:f6:3c:d1:d4:60:39:61:f4:9e:62:65:ba:01:3a:2f:03:07:b6:d0:b8:04 +-----BEGIN CERTIFICATE----- +MIIF0jCCA7qgAwIBAgIQIdbQSk8lD8kyN/yqXhKN6TANBgkqhkiG9w0BAQ0FADCB +gDELMAkGA1UEBhMCUEwxIjAgBgNVBAoTGVVuaXpldG8gVGVjaG5vbG9naWVzIFMu +QS4xJzAlBgNVBAsTHkNlcnR1bSBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTEkMCIG +A1UEAxMbQ2VydHVtIFRydXN0ZWQgTmV0d29yayBDQSAyMCIYDzIwMTExMDA2MDgz +OTU2WhgPMjA0NjEwMDYwODM5NTZaMIGAMQswCQYDVQQGEwJQTDEiMCAGA1UEChMZ +VW5pemV0byBUZWNobm9sb2dpZXMgUy5BLjEnMCUGA1UECxMeQ2VydHVtIENlcnRp +ZmljYXRpb24gQXV0aG9yaXR5MSQwIgYDVQQDExtDZXJ0dW0gVHJ1c3RlZCBOZXR3 +b3JrIENBIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC9+Xj45tWA +DGSdhhuWZGc/IjoedQF97/tcZ4zJzFxrqZHmuULlIEub2pt7uZld2ZuAS9eEQCsn +0+i6MLs+CRqnSZXvK0AkwpfHp+6bJe+oCgCXhVqqndwpyeI1B+twTUrWwbNWuKFB +OJvR+zF/j+Bf4bE/D44WSWDXBo0Y+aomEKsq09DRZ40bRr5HMNUuctHFY9rnY3lE +fktjJImGLjQ/KUxSiyqnwOKRKIm5wFv5HdnnJ63/mgKXwcZQkpsCLL2puTRZCr+E +Sv/f/rOf69me4Jgj7KZrdxYq28ytOxykh9xGc14ZYmhFV+SQgkK7QtbwYeDBoz1m +o130GO6IyY0XRSmZMnUCMe4pJshrAua1YkV/NxVaI2iJ1D7eTiew8EAMvE0Xy02i +sx7QBlrd9pPPV3WZ9fqGGmd4s7+W/jTcvedSVuWz5XV710GRBdxdaeOVDUO5/IOW +OZV7bIBaTxNyxtd9KXpEulKkKtVBRgkg/iKgtlswjbyJDNXXcPiHUv3a76xRLgez +Tv7QCdpw75j6VuZt27VXS9zlLCUVyJ4ueE742pyehizKV/Ma5ciSixqClnrDvFAS +adgOWkaLOusm+iPJtrCBvkIApPjW/jAux9JG9uWOdf3yzLnQh1vMBhBgu4M1t15n +3kfsmUjxpKEV/q2MYo45VU85FrmxY53/twIDAQABo0IwQDAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBS2oVQ5AsOgP46KvPrU+Bym0ToO/TAOBgNVHQ8BAf8EBAMC +AQYwDQYJKoZIhvcNAQENBQADggIBAHGlDs7k6b8/ONWJWsQCYftMxRQXLYtPU2sQ +F/xlhMcQSZDe28cmk4gmb3DWAl45oPePq5a1pRNcgRRtDoGCERuKTsZPpd1iHkTf +CVn0W3cLN+mLIMb4Ck4uWBzrM9DPhmDJ2vuAL55MYIR4PSFk1vtBHxgP58l1cb29 +XN40hz5BsA72udY/CROWFC/emh1auVbONTqwX3BNXuMp8SMoclm2q8KMZiYcdywm +djWLKKdpoPk79SPdhRB0yZADVpHnr7pH1BKXESLjokmUbOe3lEu6LaTaM4tMpkT/ +WjzGHWTYtTHkpjx6qFcL2+1hGsvxznN3Y6SHb0xRONbkX8eftoEq5IVIeVheO/jb +AoJnwTnbw3RLPTYe+SmTiGhbqEQZIfCn6IENLOiTNrQ3ssqwGyZ6miUfmpqAnksq +P/ujmv5zMnHCnsZy4YpoJ/HkD7TETKVhk/iXEAcqMCWpuchxuO9ozC1+9eB+D4Ko +b7a6bINDd82Kkhehnlt4Fj1F4jNy3eFmypnTycUm/Q1oBEauttmbjL4ZvrHG8hnj +XALKLNhvSgfZyTXaQHXyxKcZb55CEJh15pWLYLztxRLXis7VmFxWlgPF7ncGNf/P +5O4/E2Hu29othfDNrp2yGAlFw5Khchf8R7agCyzxxN5DaAhqXzvwdmP7zAYspsbi +DrW5viSP +-----END CERTIFICATE----- + +# Issuer: CN=Hellenic Academic and Research Institutions RootCA 2015 O=Hellenic Academic and Research Institutions Cert. Authority +# Subject: CN=Hellenic Academic and Research Institutions RootCA 2015 O=Hellenic Academic and Research Institutions Cert. Authority +# Label: "Hellenic Academic and Research Institutions RootCA 2015" +# Serial: 0 +# MD5 Fingerprint: ca:ff:e2:db:03:d9:cb:4b:e9:0f:ad:84:fd:7b:18:ce +# SHA1 Fingerprint: 01:0c:06:95:a6:98:19:14:ff:bf:5f:c6:b0:b6:95:ea:29:e9:12:a6 +# SHA256 Fingerprint: a0:40:92:9a:02:ce:53:b4:ac:f4:f2:ff:c6:98:1c:e4:49:6f:75:5e:6d:45:fe:0b:2a:69:2b:cd:52:52:3f:36 +-----BEGIN CERTIFICATE----- +MIIGCzCCA/OgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBpjELMAkGA1UEBhMCR1Ix +DzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5k +IFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxQDA+BgNVBAMT +N0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgUm9v +dENBIDIwMTUwHhcNMTUwNzA3MTAxMTIxWhcNNDAwNjMwMTAxMTIxWjCBpjELMAkG +A1UEBhMCR1IxDzANBgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNh +ZGVtaWMgYW5kIFJlc2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkx +QDA+BgNVBAMTN0hlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1 +dGlvbnMgUm9vdENBIDIwMTUwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC +AQDC+Kk/G4n8PDwEXT2QNrCROnk8ZlrvbTkBSRq0t89/TSNTt5AA4xMqKKYx8ZEA +4yjsriFBzh/a/X0SWwGDD7mwX5nh8hKDgE0GPt+sr+ehiGsxr/CL0BgzuNtFajT0 +AoAkKAoCFZVedioNmToUW/bLy1O8E00BiDeUJRtCvCLYjqOWXjrZMts+6PAQZe10 +4S+nfK8nNLspfZu2zwnI5dMK/IhlZXQK3HMcXM1AsRzUtoSMTFDPaI6oWa7CJ06C +ojXdFPQf/7J31Ycvqm59JCfnxssm5uX+Zwdj2EUN3TpZZTlYepKZcj2chF6IIbjV +9Cz82XBST3i4vTwri5WY9bPRaM8gFH5MXF/ni+X1NYEZN9cRCLdmvtNKzoNXADrD +gfgXy5I2XdGj2HUb4Ysn6npIQf1FGQatJ5lOwXBH3bWfgVMS5bGMSF0xQxfjjMZ6 +Y5ZLKTBOhE5iGV48zpeQpX8B653g+IuJ3SWYPZK2fu/Z8VFRfS0myGlZYeCsargq +NhEEelC9MoS+L9xy1dcdFkfkR2YgP/SWxa+OAXqlD3pk9Q0Yh9muiNX6hME6wGko +LfINaFGq46V3xqSQDqE3izEjR8EJCOtu93ib14L8hCCZSRm2Ekax+0VVFqmjZayc +Bw/qa9wfLgZy7IaIEuQt218FL+TwA9MmM+eAws1CoRc0CwIDAQABo0IwQDAPBgNV +HRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAdBgNVHQ4EFgQUcRVnyMjJvXVd +ctA4GGqd83EkVAswDQYJKoZIhvcNAQELBQADggIBAHW7bVRLqhBYRjTyYtcWNl0I +XtVsyIe9tC5G8jH4fOpCtZMWVdyhDBKg2mF+D1hYc2Ryx+hFjtyp8iY/xnmMsVMI +M4GwVhO+5lFc2JsKT0ucVlMC6U/2DWDqTUJV6HwbISHTGzrMd/K4kPFox/la/vot +9L/J9UUbzjgQKjeKeaO04wlshYaT/4mWJ3iBj2fjRnRUjtkNaeJK9E10A/+yd+2V +Z5fkscWrv2oj6NSU4kQoYsRL4vDY4ilrGnB+JGGTe08DMiUNRSQrlrRGar9KC/ea +j8GsGsVn82800vpzY4zvFrCopEYq+OsS7HK07/grfoxSwIuEVPkvPuNVqNxmsdnh +X9izjFk0WaSrT2y7HxjbdavYy5LNlDhhDgcGH0tGEPEVvo2FXDtKK4F5D7Rpn0lQ +l033DlZdwJVqwjbDG2jJ9SrcR5q+ss7FJej6A7na+RZukYT1HCjI/CbM1xyQVqdf +bzoEvM14iQuODy+jqk+iGxI9FghAD/FGTNeqewjBCvVtJ94Cj8rDtSvK6evIIVM4 +pcw72Hc3MKJP2W/R8kCtQXoXxdZKNYm3QdV8hn9VTYNKpXMgwDqvkPGaJI7ZjnHK +e7iG2rKPmT4dEw0SEe7Uq/DpFXYC5ODfqiAeW2GFZECpkJcNrVPSWh2HagCXZWK0 +vm9qp/UsQu0yrbYhnr68 +-----END CERTIFICATE----- + +# Issuer: CN=Hellenic Academic and Research Institutions ECC RootCA 2015 O=Hellenic Academic and Research Institutions Cert. Authority +# Subject: CN=Hellenic Academic and Research Institutions ECC RootCA 2015 O=Hellenic Academic and Research Institutions Cert. Authority +# Label: "Hellenic Academic and Research Institutions ECC RootCA 2015" +# Serial: 0 +# MD5 Fingerprint: 81:e5:b4:17:eb:c2:f5:e1:4b:0d:41:7b:49:92:fe:ef +# SHA1 Fingerprint: 9f:f1:71:8d:92:d5:9a:f3:7d:74:97:b4:bc:6f:84:68:0b:ba:b6:66 +# SHA256 Fingerprint: 44:b5:45:aa:8a:25:e6:5a:73:ca:15:dc:27:fc:36:d2:4c:1c:b9:95:3a:06:65:39:b1:15:82:dc:48:7b:48:33 +-----BEGIN CERTIFICATE----- +MIICwzCCAkqgAwIBAgIBADAKBggqhkjOPQQDAjCBqjELMAkGA1UEBhMCR1IxDzAN +BgNVBAcTBkF0aGVuczFEMEIGA1UEChM7SGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDZXJ0LiBBdXRob3JpdHkxRDBCBgNVBAMTO0hl +bGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgRUNDIFJv +b3RDQSAyMDE1MB4XDTE1MDcwNzEwMzcxMloXDTQwMDYzMDEwMzcxMlowgaoxCzAJ +BgNVBAYTAkdSMQ8wDQYDVQQHEwZBdGhlbnMxRDBCBgNVBAoTO0hlbGxlbmljIEFj +YWRlbWljIGFuZCBSZXNlYXJjaCBJbnN0aXR1dGlvbnMgQ2VydC4gQXV0aG9yaXR5 +MUQwQgYDVQQDEztIZWxsZW5pYyBBY2FkZW1pYyBhbmQgUmVzZWFyY2ggSW5zdGl0 +dXRpb25zIEVDQyBSb290Q0EgMjAxNTB2MBAGByqGSM49AgEGBSuBBAAiA2IABJKg +QehLgoRc4vgxEZmGZE4JJS+dQS8KrjVPdJWyUWRrjWvmP3CV8AVER6ZyOFB2lQJa +jq4onvktTpnvLEhvTCUp6NFxW98dwXU3tNf6e3pCnGoKVlp8aQuqgAkkbH7BRqNC +MEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFLQi +C4KZJAEOnLvkDv2/+5cgk5kqMAoGCCqGSM49BAMCA2cAMGQCMGfOFmI4oqxiRaep +lSTAGiecMjvAwNW6qef4BENThe5SId6d9SWDPp5YSy/XZxMOIQIwBeF1Ad5o7Sof +TUwJCA3sS61kFyjndc5FZXIhF8siQQ6ME5g4mlRtm8rifOoCWCKR +-----END CERTIFICATE----- + +# Issuer: CN=ISRG Root X1 O=Internet Security Research Group +# Subject: CN=ISRG Root X1 O=Internet Security Research Group +# Label: "ISRG Root X1" +# Serial: 172886928669790476064670243504169061120 +# MD5 Fingerprint: 0c:d2:f9:e0:da:17:73:e9:ed:86:4d:a5:e3:70:e7:4e +# SHA1 Fingerprint: ca:bd:2a:79:a1:07:6a:31:f2:1d:25:36:35:cb:03:9d:43:29:a5:e8 +# SHA256 Fingerprint: 96:bc:ec:06:26:49:76:f3:74:60:77:9a:cf:28:c5:a7:cf:e8:a3:c0:aa:e1:1a:8f:fc:ee:05:c0:bd:df:08:c6 +-----BEGIN CERTIFICATE----- +MIIFazCCA1OgAwIBAgIRAIIQz7DSQONZRGPgu2OCiwAwDQYJKoZIhvcNAQELBQAw +TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh +cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMTUwNjA0MTEwNDM4 +WhcNMzUwNjA0MTEwNDM4WjBPMQswCQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJu +ZXQgU2VjdXJpdHkgUmVzZWFyY2ggR3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBY +MTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK3oJHP0FDfzm54rVygc +h77ct984kIxuPOZXoHj3dcKi/vVqbvYATyjb3miGbESTtrFj/RQSa78f0uoxmyF+ +0TM8ukj13Xnfs7j/EvEhmkvBioZxaUpmZmyPfjxwv60pIgbz5MDmgK7iS4+3mX6U +A5/TR5d8mUgjU+g4rk8Kb4Mu0UlXjIB0ttov0DiNewNwIRt18jA8+o+u3dpjq+sW +T8KOEUt+zwvo/7V3LvSye0rgTBIlDHCNAymg4VMk7BPZ7hm/ELNKjD+Jo2FR3qyH +B5T0Y3HsLuJvW5iB4YlcNHlsdu87kGJ55tukmi8mxdAQ4Q7e2RCOFvu396j3x+UC +B5iPNgiV5+I3lg02dZ77DnKxHZu8A/lJBdiB3QW0KtZB6awBdpUKD9jf1b0SHzUv +KBds0pjBqAlkd25HN7rOrFleaJ1/ctaJxQZBKT5ZPt0m9STJEadao0xAH0ahmbWn +OlFuhjuefXKnEgV4We0+UXgVCwOPjdAvBbI+e0ocS3MFEvzG6uBQE3xDk3SzynTn +jh8BCNAw1FtxNrQHusEwMFxIt4I7mKZ9YIqioymCzLq9gwQbooMDQaHWBfEbwrbw +qHyGO0aoSCqI3Haadr8faqU9GY/rOPNk3sgrDQoo//fb4hVC1CLQJ13hef4Y53CI +rU7m2Ys6xt0nUW7/vGT1M0NPAgMBAAGjQjBAMA4GA1UdDwEB/wQEAwIBBjAPBgNV +HRMBAf8EBTADAQH/MB0GA1UdDgQWBBR5tFnme7bl5AFzgAiIyBpY9umbbjANBgkq +hkiG9w0BAQsFAAOCAgEAVR9YqbyyqFDQDLHYGmkgJykIrGF1XIpu+ILlaS/V9lZL +ubhzEFnTIZd+50xx+7LSYK05qAvqFyFWhfFQDlnrzuBZ6brJFe+GnY+EgPbk6ZGQ +3BebYhtF8GaV0nxvwuo77x/Py9auJ/GpsMiu/X1+mvoiBOv/2X/qkSsisRcOj/KK +NFtY2PwByVS5uCbMiogziUwthDyC3+6WVwW6LLv3xLfHTjuCvjHIInNzktHCgKQ5 +ORAzI4JMPJ+GslWYHb4phowim57iaztXOoJwTdwJx4nLCgdNbOhdjsnvzqvHu7Ur +TkXWStAmzOVyyghqpZXjFaH3pO3JLF+l+/+sKAIuvtd7u+Nxe5AW0wdeRlN8NwdC +jNPElpzVmbUq4JUagEiuTDkHzsxHpFKVK7q4+63SM1N95R1NbdWhscdCb+ZAJzVc +oyi3B43njTOQ5yOf+1CceWxG1bQVs5ZufpsMljq4Ui0/1lvh+wjChP4kqKOJ2qxq +4RgqsahDYVvTH9w7jXbyLeiNdd8XM2w9U/t7y0Ff/9yi0GE44Za4rF2LN9d11TPA +mRGunUHBcnWEvgJBQl9nJEiU0Zsnvgc/ubhPgXRR4Xq37Z0j4r7g1SgEEzwxA57d +emyPxgcYxn/eR44/KJ4EBs+lVDR3veyJm+kXQ99b21/+jh5Xos1AnX5iItreGCc= +-----END CERTIFICATE----- + +# Issuer: O=FNMT-RCM OU=AC RAIZ FNMT-RCM +# Subject: O=FNMT-RCM OU=AC RAIZ FNMT-RCM +# Label: "AC RAIZ FNMT-RCM" +# Serial: 485876308206448804701554682760554759 +# MD5 Fingerprint: e2:09:04:b4:d3:bd:d1:a0:14:fd:1a:d2:47:c4:57:1d +# SHA1 Fingerprint: ec:50:35:07:b2:15:c4:95:62:19:e2:a8:9a:5b:42:99:2c:4c:2c:20 +# SHA256 Fingerprint: eb:c5:57:0c:29:01:8c:4d:67:b1:aa:12:7b:af:12:f7:03:b4:61:1e:bc:17:b7:da:b5:57:38:94:17:9b:93:fa +-----BEGIN CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIPXZONMGc2yAYdGsdUhGkHMA0GCSqGSIb3DQEBCwUAMDsx +CzAJBgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJ +WiBGTk1ULVJDTTAeFw0wODEwMjkxNTU5NTZaFw0zMDAxMDEwMDAwMDBaMDsxCzAJ +BgNVBAYTAkVTMREwDwYDVQQKDAhGTk1ULVJDTTEZMBcGA1UECwwQQUMgUkFJWiBG +Tk1ULVJDTTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALpxgHpMhm5/ +yBNtwMZ9HACXjywMI7sQmkCpGreHiPibVmr75nuOi5KOpyVdWRHbNi63URcfqQgf +BBckWKo3Shjf5TnUV/3XwSyRAZHiItQDwFj8d0fsjz50Q7qsNI1NOHZnjrDIbzAz +WHFctPVrbtQBULgTfmxKo0nRIBnuvMApGGWn3v7v3QqQIecaZ5JCEJhfTzC8PhxF +tBDXaEAUwED653cXeuYLj2VbPNmaUtu1vZ5Gzz3rkQUCwJaydkxNEJY7kvqcfw+Z +374jNUUeAlz+taibmSXaXvMiwzn15Cou08YfxGyqxRxqAQVKL9LFwag0Jl1mpdIC +IfkYtwb1TplvqKtMUejPUBjFd8g5CSxJkjKZqLsXF3mwWsXmo8RZZUc1g16p6DUL +mbvkzSDGm0oGObVo/CK67lWMK07q87Hj/LaZmtVC+nFNCM+HHmpxffnTtOmlcYF7 +wk5HlqX2doWjKI/pgG6BU6VtX7hI+cL5NqYuSf+4lsKMB7ObiFj86xsc3i1w4peS +MKGJ47xVqCfWS+2QrYv6YyVZLag13cqXM7zlzced0ezvXg5KkAYmY6252TUtB7p2 +ZSysV4999AeU14ECll2jB0nVetBX+RvnU0Z1qrB5QstocQjpYL05ac70r8NWQMet +UqIJ5G+GR4of6ygnXYMgrwTJbFaai0b1AgMBAAGjgYMwgYAwDwYDVR0TAQH/BAUw +AwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYEFPd9xf3E6Jobd2Sn9R2gzL+H +YJptMD4GA1UdIAQ3MDUwMwYEVR0gADArMCkGCCsGAQUFBwIBFh1odHRwOi8vd3d3 +LmNlcnQuZm5tdC5lcy9kcGNzLzANBgkqhkiG9w0BAQsFAAOCAgEAB5BK3/MjTvDD +nFFlm5wioooMhfNzKWtN/gHiqQxjAb8EZ6WdmF/9ARP67Jpi6Yb+tmLSbkyU+8B1 +RXxlDPiyN8+sD8+Nb/kZ94/sHvJwnvDKuO+3/3Y3dlv2bojzr2IyIpMNOmqOFGYM +LVN0V2Ue1bLdI4E7pWYjJ2cJj+F3qkPNZVEI7VFY/uY5+ctHhKQV8Xa7pO6kO8Rf +77IzlhEYt8llvhjho6Tc+hj507wTmzl6NLrTQfv6MooqtyuGC2mDOL7Nii4LcK2N +JpLuHvUBKwrZ1pebbuCoGRw6IYsMHkCtA+fdZn71uSANA+iW+YJF1DngoABd15jm +fZ5nc8OaKveri6E6FO80vFIOiZiaBECEHX5FaZNXzuvO+FB8TxxuBEOb+dY7Ixjp +6o7RTUaN8Tvkasq6+yO3m/qZASlaWFot4/nUbQ4mrcFuNLwy+AwF+mWj2zs3gyLp +1txyM/1d8iC9djwj2ij3+RvrWWTV3F9yfiD8zYm1kGdNYno/Tq0dwzn+evQoFt9B +9kiABdcPUXmsEKvU7ANm5mqwujGSQkBqvjrTcuFqN1W8rB2Vt2lh8kORdOag0wok +RqEIr9baRRmW1FMdW4R58MD3R++Lj8UGrp1MYp3/RgT408m2ECVAdf4WqslKYIYv +uu8wd+RU4riEmViAqhOLUTpPSPaLtrM= +-----END CERTIFICATE----- + +# Issuer: CN=Amazon Root CA 1 O=Amazon +# Subject: CN=Amazon Root CA 1 O=Amazon +# Label: "Amazon Root CA 1" +# Serial: 143266978916655856878034712317230054538369994 +# MD5 Fingerprint: 43:c6:bf:ae:ec:fe:ad:2f:18:c6:88:68:30:fc:c8:e6 +# SHA1 Fingerprint: 8d:a7:f9:65:ec:5e:fc:37:91:0f:1c:6e:59:fd:c1:cc:6a:6e:de:16 +# SHA256 Fingerprint: 8e:cd:e6:88:4f:3d:87:b1:12:5b:a3:1a:c3:fc:b1:3d:70:16:de:7f:57:cc:90:4f:e1:cb:97:c6:ae:98:19:6e +-----BEGIN CERTIFICATE----- +MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj +ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM +9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw +IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6 +VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08p8kDi1L +93FcXmn/6pUCyziKrlA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm +jgSubJrIqg0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIb3DQEBCwUA +A4IBAQCY8jdaQZChGsV2USggNiMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI +U5PMCCjjmCXPI6T53iHTfIUJrU6adTrCC2qJeHZERxhlbI1Bjjt/msv0tadQ1wUs +N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv +o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU +5MsI+yMRQ+hDKXJioaldXgjUkK642M4UwtBV8ob2xJNDd2ZhwLnoQdeXeGADbkpy +rqXRfboQnoZsG4q5WTP468SQvvG5 +-----END CERTIFICATE----- + +# Issuer: CN=Amazon Root CA 2 O=Amazon +# Subject: CN=Amazon Root CA 2 O=Amazon +# Label: "Amazon Root CA 2" +# Serial: 143266982885963551818349160658925006970653239 +# MD5 Fingerprint: c8:e5:8d:ce:a8:42:e2:7a:c0:2a:5c:7c:9e:26:bf:66 +# SHA1 Fingerprint: 5a:8c:ef:45:d7:a6:98:59:76:7a:8c:8b:44:96:b5:78:cf:47:4b:1a +# SHA256 Fingerprint: 1b:a5:b2:aa:8c:65:40:1a:82:96:01:18:f8:0b:ec:4f:62:30:4d:83:ce:c4:71:3a:19:c3:9c:01:1e:a4:6d:b4 +-----BEGIN CERTIFICATE----- +MIIFQTCCAymgAwIBAgITBmyf0pY1hp8KD+WGePhbJruKNzANBgkqhkiG9w0BAQwF +ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6 +b24gUm9vdCBDQSAyMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTEL +MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv +b3QgQ0EgMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAK2Wny2cSkxK +gXlRmeyKy2tgURO8TW0G/LAIjd0ZEGrHJgw12MBvIITplLGbhQPDW9tK6Mj4kHbZ +W0/jTOgGNk3Mmqw9DJArktQGGWCsN0R5hYGCrVo34A3MnaZMUnbqQ523BNFQ9lXg +1dKmSYXpN+nKfq5clU1Imj+uIFptiJXZNLhSGkOQsL9sBbm2eLfq0OQ6PBJTYv9K +8nu+NQWpEjTj82R0Yiw9AElaKP4yRLuH3WUnAnE72kr3H9rN9yFVkE8P7K6C4Z9r +2UXTu/Bfh+08LDmG2j/e7HJV63mjrdvdfLC6HM783k81ds8P+HgfajZRRidhW+me +z/CiVX18JYpvL7TFz4QuK/0NURBs+18bvBt+xa47mAExkv8LV/SasrlX6avvDXbR +8O70zoan4G7ptGmh32n2M8ZpLpcTnqWHsFcQgTfJU7O7f/aS0ZzQGPSSbtqDT6Zj +mUyl+17vIWR6IF9sZIUVyzfpYgwLKhbcAS4y2j5L9Z469hdAlO+ekQiG+r5jqFoz +7Mt0Q5X5bGlSNscpb/xVA1wf+5+9R+vnSUeVC06JIglJ4PVhHvG/LopyboBZ/1c6 ++XUyo05f7O0oYtlNc/LMgRdg7c3r3NunysV+Ar3yVAhU/bQtCSwXVEqY0VThUWcI +0u1ufm8/0i2BWSlmy5A5lREedCf+3euvAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMB +Af8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSwDPBMMPQFWAJI/TPlUq9LhONm +UjANBgkqhkiG9w0BAQwFAAOCAgEAqqiAjw54o+Ci1M3m9Zh6O+oAA7CXDpO8Wqj2 +LIxyh6mx/H9z/WNxeKWHWc8w4Q0QshNabYL1auaAn6AFC2jkR2vHat+2/XcycuUY ++gn0oJMsXdKMdYV2ZZAMA3m3MSNjrXiDCYZohMr/+c8mmpJ5581LxedhpxfL86kS +k5Nrp+gvU5LEYFiwzAJRGFuFjWJZY7attN6a+yb3ACfAXVU3dJnJUH/jWS5E4ywl +7uxMMne0nxrpS10gxdr9HIcWxkPo1LsmmkVwXqkLN1PiRnsn/eBG8om3zEK2yygm +btmlyTrIQRNg91CMFa6ybRoVGld45pIq2WWQgj9sAq+uEjonljYE1x2igGOpm/Hl +urR8FLBOybEfdF849lHqm/osohHUqS0nGkWxr7JOcQ3AWEbWaQbLU8uz/mtBzUF+ +fUwPfHJ5elnNXkoOrJupmHN5fLT0zLm4BwyydFy4x2+IoZCn9Kr5v2c69BoVYh63 +n749sSmvZ6ES8lgQGVMDMBu4Gon2nL2XA46jCfMdiyHxtN/kHNGfZQIG6lzWE7OE +76KlXIx3KadowGuuQNKotOrN8I1LOJwZmhsoVLiJkO/KdYE+HvJkJMcYr07/R54H +9jVlpNMKVv/1F2Rs76giJUmTtt8AF9pYfl3uxRuw0dFfIRDH+fO6AgonB8Xx1sfT +4PsJYGw= +-----END CERTIFICATE----- + +# Issuer: CN=Amazon Root CA 3 O=Amazon +# Subject: CN=Amazon Root CA 3 O=Amazon +# Label: "Amazon Root CA 3" +# Serial: 143266986699090766294700635381230934788665930 +# MD5 Fingerprint: a0:d4:ef:0b:f7:b5:d8:49:95:2a:ec:f5:c4:fc:81:87 +# SHA1 Fingerprint: 0d:44:dd:8c:3c:8c:1a:1a:58:75:64:81:e9:0f:2e:2a:ff:b3:d2:6e +# SHA256 Fingerprint: 18:ce:6c:fe:7b:f1:4e:60:b2:e3:47:b8:df:e8:68:cb:31:d0:2e:bb:3a:da:27:15:69:f5:03:43:b4:6d:b3:a4 +-----BEGIN CERTIFICATE----- +MIIBtjCCAVugAwIBAgITBmyf1XSXNmY/Owua2eiedgPySjAKBggqhkjOPQQDAjA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSAzMB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgMzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCmXp8ZBf8ANm+gBG1bG8lKl +ui2yEujSLtf6ycXYqm0fc4E7O5hrOXwzpcVOho6AF2hiRVd9RFgdszflZwjrZt6j +QjBAMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBSr +ttvXBp43rDCGB5Fwx5zEGbF4wDAKBggqhkjOPQQDAgNJADBGAiEA4IWSoxe3jfkr +BqWTrBqYaGFy+uGh0PsceGCmQ5nFuMQCIQCcAu/xlJyzlvnrxir4tiz+OpAUFteM +YyRIHN8wfdVoOw== +-----END CERTIFICATE----- + +# Issuer: CN=Amazon Root CA 4 O=Amazon +# Subject: CN=Amazon Root CA 4 O=Amazon +# Label: "Amazon Root CA 4" +# Serial: 143266989758080763974105200630763877849284878 +# MD5 Fingerprint: 89:bc:27:d5:eb:17:8d:06:6a:69:d5:fd:89:47:b4:cd +# SHA1 Fingerprint: f6:10:84:07:d6:f8:bb:67:98:0c:c2:e2:44:c2:eb:ae:1c:ef:63:be +# SHA256 Fingerprint: e3:5d:28:41:9e:d0:20:25:cf:a6:90:38:cd:62:39:62:45:8d:a5:c6:95:fb:de:a3:c2:2b:0b:fb:25:89:70:92 +-----BEGIN CERTIFICATE----- +MIIB8jCCAXigAwIBAgITBmyf18G7EEwpQ+Vxe3ssyBrBDjAKBggqhkjOPQQDAzA5 +MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6b24g +Um9vdCBDQSA0MB4XDTE1MDUyNjAwMDAwMFoXDTQwMDUyNjAwMDAwMFowOTELMAkG +A1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJvb3Qg +Q0EgNDB2MBAGByqGSM49AgEGBSuBBAAiA2IABNKrijdPo1MN/sGKe0uoe0ZLY7Bi +9i0b2whxIdIA6GO9mif78DluXeo9pcmBqqNbIJhFXRbb/egQbeOc4OO9X4Ri83Bk +M6DLJC9wuoihKqB1+IGuYgbEgds5bimwHvouXKNCMEAwDwYDVR0TAQH/BAUwAwEB +/zAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0OBBYEFNPsxzplbszh2naaVvuc84ZtV+WB +MAoGCCqGSM49BAMDA2gAMGUCMDqLIfG9fhGt0O9Yli/W651+kI0rz2ZVwyzjKKlw +CkcO8DdZEv8tmZQoTipPNU0zWgIxAOp1AE47xDqUEpHJWEadIRNyp4iciuRMStuW +1KyLa2tJElMzrdfkviT8tQp21KW8EA== +-----END CERTIFICATE----- + +# Issuer: CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK OU=Kamu Sertifikasyon Merkezi - Kamu SM +# Subject: CN=TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1 O=Turkiye Bilimsel ve Teknolojik Arastirma Kurumu - TUBITAK OU=Kamu Sertifikasyon Merkezi - Kamu SM +# Label: "TUBITAK Kamu SM SSL Kok Sertifikasi - Surum 1" +# Serial: 1 +# MD5 Fingerprint: dc:00:81:dc:69:2f:3e:2f:b0:3b:f6:3d:5a:91:8e:49 +# SHA1 Fingerprint: 31:43:64:9b:ec:ce:27:ec:ed:3a:3f:0b:8f:0d:e4:e8:91:dd:ee:ca +# SHA256 Fingerprint: 46:ed:c3:68:90:46:d5:3a:45:3f:b3:10:4a:b8:0d:ca:ec:65:8b:26:60:ea:16:29:dd:7e:86:79:90:64:87:16 +-----BEGIN CERTIFICATE----- +MIIEYzCCA0ugAwIBAgIBATANBgkqhkiG9w0BAQsFADCB0jELMAkGA1UEBhMCVFIx +GDAWBgNVBAcTD0dlYnplIC0gS29jYWVsaTFCMEAGA1UEChM5VHVya2l5ZSBCaWxp +bXNlbCB2ZSBUZWtub2xvamlrIEFyYXN0aXJtYSBLdXJ1bXUgLSBUVUJJVEFLMS0w +KwYDVQQLEyRLYW11IFNlcnRpZmlrYXN5b24gTWVya2V6aSAtIEthbXUgU00xNjA0 +BgNVBAMTLVRVQklUQUsgS2FtdSBTTSBTU0wgS29rIFNlcnRpZmlrYXNpIC0gU3Vy +dW0gMTAeFw0xMzExMjUwODI1NTVaFw00MzEwMjUwODI1NTVaMIHSMQswCQYDVQQG +EwJUUjEYMBYGA1UEBxMPR2ViemUgLSBLb2NhZWxpMUIwQAYDVQQKEzlUdXJraXll +IEJpbGltc2VsIHZlIFRla25vbG9qaWsgQXJhc3Rpcm1hIEt1cnVtdSAtIFRVQklU +QUsxLTArBgNVBAsTJEthbXUgU2VydGlmaWthc3lvbiBNZXJrZXppIC0gS2FtdSBT +TTE2MDQGA1UEAxMtVFVCSVRBSyBLYW11IFNNIFNTTCBLb2sgU2VydGlmaWthc2kg +LSBTdXJ1bSAxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAr3UwM6q7 +a9OZLBI3hNmNe5eA027n/5tQlT6QlVZC1xl8JoSNkvoBHToP4mQ4t4y86Ij5iySr +LqP1N+RAjhgleYN1Hzv/bKjFxlb4tO2KRKOrbEz8HdDc72i9z+SqzvBV96I01INr +N3wcwv61A+xXzry0tcXtAA9TNypN9E8Mg/uGz8v+jE69h/mniyFXnHrfA2eJLJ2X +YacQuFWQfw4tJzh03+f92k4S400VIgLI4OD8D62K18lUUMw7D8oWgITQUVbDjlZ/ +iSIzL+aFCr2lqBs23tPcLG07xxO9WSMs5uWk99gL7eqQQESolbuT1dCANLZGeA4f +AJNG4e7p+exPFwIDAQABo0IwQDAdBgNVHQ4EFgQUZT/HiobGPN08VFw1+DrtUgxH +V8gwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL +BQADggEBACo/4fEyjq7hmFxLXs9rHmoJ0iKpEsdeV31zVmSAhHqT5Am5EM2fKifh +AHe+SMg1qIGf5LgsyX8OsNJLN13qudULXjS99HMpw+0mFZx+CFOKWI3QSyjfwbPf +IPP54+M638yclNhOT8NrF7f3cuitZjO1JVOr4PhMqZ398g26rrnZqsZr+ZO7rqu4 +lzwDGrpDxpa5RXI4s6ehlj2Re37AIVNMh+3yC1SVUZPVIqUNivGTDj5UDrDYyU7c +8jEyVupk+eq1nRZmQnLzf9OxMUP8pI4X8W0jq5Rm+K37DwhuJi1/FwcJsoz7UMCf +lo3Ptv0AnVoUmr8CRPXBwp8iXqIPoeM= +-----END CERTIFICATE----- + +# Issuer: CN=GDCA TrustAUTH R5 ROOT O=GUANG DONG CERTIFICATE AUTHORITY CO.,LTD. +# Subject: CN=GDCA TrustAUTH R5 ROOT O=GUANG DONG CERTIFICATE AUTHORITY CO.,LTD. +# Label: "GDCA TrustAUTH R5 ROOT" +# Serial: 9009899650740120186 +# MD5 Fingerprint: 63:cc:d9:3d:34:35:5c:6f:53:a3:e2:08:70:48:1f:b4 +# SHA1 Fingerprint: 0f:36:38:5b:81:1a:25:c3:9b:31:4e:83:ca:e9:34:66:70:cc:74:b4 +# SHA256 Fingerprint: bf:ff:8f:d0:44:33:48:7d:6a:8a:a6:0c:1a:29:76:7a:9f:c2:bb:b0:5e:42:0f:71:3a:13:b9:92:89:1d:38:93 +-----BEGIN CERTIFICATE----- +MIIFiDCCA3CgAwIBAgIIfQmX/vBH6nowDQYJKoZIhvcNAQELBQAwYjELMAkGA1UE +BhMCQ04xMjAwBgNVBAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZ +IENPLixMVEQuMR8wHQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMB4XDTE0 +MTEyNjA1MTMxNVoXDTQwMTIzMTE1NTk1OVowYjELMAkGA1UEBhMCQ04xMjAwBgNV +BAoMKUdVQU5HIERPTkcgQ0VSVElGSUNBVEUgQVVUSE9SSVRZIENPLixMVEQuMR8w +HQYDVQQDDBZHRENBIFRydXN0QVVUSCBSNSBST09UMIICIjANBgkqhkiG9w0BAQEF +AAOCAg8AMIICCgKCAgEA2aMW8Mh0dHeb7zMNOwZ+Vfy1YI92hhJCfVZmPoiC7XJj +Dp6L3TQsAlFRwxn9WVSEyfFrs0yw6ehGXTjGoqcuEVe6ghWinI9tsJlKCvLriXBj +TnnEt1u9ol2x8kECK62pOqPseQrsXzrj/e+APK00mxqriCZ7VqKChh/rNYmDf1+u +KU49tm7srsHwJ5uu4/Ts765/94Y9cnrrpftZTqfrlYwiOXnhLQiPzLyRuEH3FMEj +qcOtmkVEs7LXLM3GKeJQEK5cy4KOFxg2fZfmiJqwTTQJ9Cy5WmYqsBebnh52nUpm +MUHfP/vFBu8btn4aRjb3ZGM74zkYI+dndRTVdVeSN72+ahsmUPI2JgaQxXABZG12 +ZuGR224HwGGALrIuL4xwp9E7PLOR5G62xDtw8mySlwnNR30YwPO7ng/Wi64HtloP +zgsMR6flPri9fcebNaBhlzpBdRfMK5Z3KpIhHtmVdiBnaM8Nvd/WHwlqmuLMc3Gk +L30SgLdTMEZeS1SZD2fJpcjyIMGC7J0R38IC+xo70e0gmu9lZJIQDSri3nDxGGeC +jGHeuLzRL5z7D9Ar7Rt2ueQ5Vfj4oR24qoAATILnsn8JuLwwoC8N9VKejveSswoA +HQBUlwbgsQfZxw9cZX08bVlX5O2ljelAU58VS6Bx9hoh49pwBiFYFIeFd3mqgnkC +AwEAAaNCMEAwHQYDVR0OBBYEFOLJQJ9NzuiaoXzPDj9lxSmIahlRMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQDRSVfg +p8xoWLoBDysZzY2wYUWsEe1jUGn4H3++Fo/9nesLqjJHdtJnJO29fDMylyrHBYZm +DRd9FBUb1Ov9H5r2XpdptxolpAqzkT9fNqyL7FeoPueBihhXOYV0GkLH6VsTX4/5 +COmSdI31R9KrO9b7eGZONn356ZLpBN79SWP8bfsUcZNnL0dKt7n/HipzcEYwv1ry +L3ml4Y0M2fmyYzeMN2WFcGpcWwlyua1jPLHd+PwyvzeG5LuOmCd+uh8W4XAR8gPf +JWIyJyYYMoSf/wA6E7qaTfRPuBRwIrHKK5DOKcFw9C+df/KQHtZa37dG/OaG+svg +IHZ6uqbL9XzeYqWxi+7egmaKTjowHz+Ay60nugxe19CxVsp3cbK1daFQqUBDF8Io +2c9Si1vIY9RCPqAzekYu9wogRlR+ak8x8YF+QnQ4ZXMn7sZ8uI7XpTrXmKGcjBBV +09tL7ECQ8s1uV9JiDnxXk7Gnbc2dg7sq5+W2O3FYrf3RRbxake5TFW/TRQl1brqQ +XR4EzzffHqhmsYzmIGrv/EhOdJhCrylvLmrH+33RZjEizIYAfmaDDEL0vTSSwxrq +T8p+ck0LcIymSLumoRT2+1hEmRSuqguTaaApJUqlyyvdimYHFngVV3Eb7PVHhPOe +MTd61X8kreS8/f3MboPoDKi3QWwH3b08hpcv0g== +-----END CERTIFICATE----- + +# Issuer: CN=TrustCor RootCert CA-1 O=TrustCor Systems S. de R.L. OU=TrustCor Certificate Authority +# Subject: CN=TrustCor RootCert CA-1 O=TrustCor Systems S. de R.L. OU=TrustCor Certificate Authority +# Label: "TrustCor RootCert CA-1" +# Serial: 15752444095811006489 +# MD5 Fingerprint: 6e:85:f1:dc:1a:00:d3:22:d5:b2:b2:ac:6b:37:05:45 +# SHA1 Fingerprint: ff:bd:cd:e7:82:c8:43:5e:3c:6f:26:86:5c:ca:a8:3a:45:5b:c3:0a +# SHA256 Fingerprint: d4:0e:9c:86:cd:8f:e4:68:c1:77:69:59:f4:9e:a7:74:fa:54:86:84:b6:c4:06:f3:90:92:61:f4:dc:e2:57:5c +-----BEGIN CERTIFICATE----- +MIIEMDCCAxigAwIBAgIJANqb7HHzA7AZMA0GCSqGSIb3DQEBCwUAMIGkMQswCQYD +VQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEgQ2l0eTEk +MCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYDVQQLDB5U +cnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxHzAdBgNVBAMMFlRydXN0Q29y +IFJvb3RDZXJ0IENBLTEwHhcNMTYwMjA0MTIzMjE2WhcNMjkxMjMxMTcyMzE2WjCB +pDELMAkGA1UEBhMCUEExDzANBgNVBAgMBlBhbmFtYTEUMBIGA1UEBwwLUGFuYW1h +IENpdHkxJDAiBgNVBAoMG1RydXN0Q29yIFN5c3RlbXMgUy4gZGUgUi5MLjEnMCUG +A1UECwweVHJ1c3RDb3IgQ2VydGlmaWNhdGUgQXV0aG9yaXR5MR8wHQYDVQQDDBZU +cnVzdENvciBSb290Q2VydCBDQS0xMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB +CgKCAQEAv463leLCJhJrMxnHQFgKq1mqjQCj/IDHUHuO1CAmujIS2CNUSSUQIpid +RtLByZ5OGy4sDjjzGiVoHKZaBeYei0i/mJZ0PmnK6bV4pQa81QBeCQryJ3pS/C3V +seq0iWEk8xoT26nPUu0MJLq5nux+AHT6k61sKZKuUbS701e/s/OojZz0JEsq1pme +9J7+wH5COucLlVPat2gOkEz7cD+PSiyU8ybdY2mplNgQTsVHCJCZGxdNuWxu72CV +EY4hgLW9oHPY0LJ3xEXqWib7ZnZ2+AYfYW0PVcWDtxBWcgYHpfOxGgMFZA6dWorW +hnAbJN7+KIor0Gqw/Hqi3LJ5DotlDwIDAQABo2MwYTAdBgNVHQ4EFgQU7mtJPHo/ +DeOxCbeKyKsZn3MzUOcwHwYDVR0jBBgwFoAU7mtJPHo/DeOxCbeKyKsZn3MzUOcw +DwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQELBQAD +ggEBACUY1JGPE+6PHh0RU9otRCkZoB5rMZ5NDp6tPVxBb5UrJKF5mDo4Nvu7Zp5I +/5CQ7z3UuJu0h3U/IJvOcs+hVcFNZKIZBqEHMwwLKeXx6quj7LUKdJDHfXLy11yf +ke+Ri7fc7Waiz45mO7yfOgLgJ90WmMCV1Aqk5IGadZQ1nJBfiDcGrVmVCrDRZ9MZ +yonnMlo2HD6CqFqTvsbQZJG2z9m2GM/bftJlo6bEjhcxwft+dtvTheNYsnd6djts +L1Ac59v2Z3kf9YKVmgenFK+P3CghZwnS1k1aHBkcjndcw5QkPTJrS37UeJSDvjdN +zl/HHk484IkzlQsPpTLWPFp5LBk= +-----END CERTIFICATE----- + +# Issuer: CN=TrustCor RootCert CA-2 O=TrustCor Systems S. de R.L. OU=TrustCor Certificate Authority +# Subject: CN=TrustCor RootCert CA-2 O=TrustCor Systems S. de R.L. OU=TrustCor Certificate Authority +# Label: "TrustCor RootCert CA-2" +# Serial: 2711694510199101698 +# MD5 Fingerprint: a2:e1:f8:18:0b:ba:45:d5:c7:41:2a:bb:37:52:45:64 +# SHA1 Fingerprint: b8:be:6d:cb:56:f1:55:b9:63:d4:12:ca:4e:06:34:c7:94:b2:1c:c0 +# SHA256 Fingerprint: 07:53:e9:40:37:8c:1b:d5:e3:83:6e:39:5d:ae:a5:cb:83:9e:50:46:f1:bd:0e:ae:19:51:cf:10:fe:c7:c9:65 +-----BEGIN CERTIFICATE----- +MIIGLzCCBBegAwIBAgIIJaHfyjPLWQIwDQYJKoZIhvcNAQELBQAwgaQxCzAJBgNV +BAYTAlBBMQ8wDQYDVQQIDAZQYW5hbWExFDASBgNVBAcMC1BhbmFtYSBDaXR5MSQw +IgYDVQQKDBtUcnVzdENvciBTeXN0ZW1zIFMuIGRlIFIuTC4xJzAlBgNVBAsMHlRy +dXN0Q29yIENlcnRpZmljYXRlIEF1dGhvcml0eTEfMB0GA1UEAwwWVHJ1c3RDb3Ig +Um9vdENlcnQgQ0EtMjAeFw0xNjAyMDQxMjMyMjNaFw0zNDEyMzExNzI2MzlaMIGk +MQswCQYDVQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEg +Q2l0eTEkMCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYD +VQQLDB5UcnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxHzAdBgNVBAMMFlRy +dXN0Q29yIFJvb3RDZXJ0IENBLTIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCnIG7CKqJiJJWQdsg4foDSq8GbZQWU9MEKENUCrO2fk8eHyLAnK0IMPQo+ +QVqedd2NyuCb7GgypGmSaIwLgQ5WoD4a3SwlFIIvl9NkRvRUqdw6VC0xK5mC8tkq +1+9xALgxpL56JAfDQiDyitSSBBtlVkxs1Pu2YVpHI7TYabS3OtB0PAx1oYxOdqHp +2yqlO/rOsP9+aij9JxzIsekp8VduZLTQwRVtDr4uDkbIXvRR/u8OYzo7cbrPb1nK +DOObXUm4TOJXsZiKQlecdu/vvdFoqNL0Cbt3Nb4lggjEFixEIFapRBF37120Hape +az6LMvYHL1cEksr1/p3C6eizjkxLAjHZ5DxIgif3GIJ2SDpxsROhOdUuxTTCHWKF +3wP+TfSvPd9cW436cOGlfifHhi5qjxLGhF5DUVCcGZt45vz27Ud+ez1m7xMTiF88 +oWP7+ayHNZ/zgp6kPwqcMWmLmaSISo5uZk3vFsQPeSghYA2FFn3XVDjxklb9tTNM +g9zXEJ9L/cb4Qr26fHMC4P99zVvh1Kxhe1fVSntb1IVYJ12/+CtgrKAmrhQhJ8Z3 +mjOAPF5GP/fDsaOGM8boXg25NSyqRsGFAnWAoOsk+xWq5Gd/bnc/9ASKL3x74xdh +8N0JqSDIvgmk0H5Ew7IwSjiqqewYmgeCK9u4nBit2uBGF6zPXQIDAQABo2MwYTAd +BgNVHQ4EFgQU2f4hQG6UnrybPZx9mCAZ5YwwYrIwHwYDVR0jBBgwFoAU2f4hQG6U +nrybPZx9mCAZ5YwwYrIwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYw +DQYJKoZIhvcNAQELBQADggIBAJ5Fngw7tu/hOsh80QA9z+LqBrWyOrsGS2h60COX +dKcs8AjYeVrXWoSK2BKaG9l9XE1wxaX5q+WjiYndAfrs3fnpkpfbsEZC89NiqpX+ +MWcUaViQCqoL7jcjx1BRtPV+nuN79+TMQjItSQzL/0kMmx40/W5ulop5A7Zv2wnL +/V9lFDfhOPXzYRZY5LVtDQsEGz9QLX+zx3oaFoBg+Iof6Rsqxvm6ARppv9JYx1RX +CI/hOWB3S6xZhBqI8d3LT3jX5+EzLfzuQfogsL7L9ziUwOHQhQ+77Sxzq+3+knYa +ZH9bDTMJBzN7Bj8RpFxwPIXAz+OQqIN3+tvmxYxoZxBnpVIt8MSZj3+/0WvitUfW +2dCFmU2Umw9Lje4AWkcdEQOsQRivh7dvDDqPys/cA8GiCcjl/YBeyGBCARsaU1q7 +N6a3vLqE6R5sGtRk2tRD/pOLS/IseRYQ1JMLiI+h2IYURpFHmygk71dSTlxCnKr3 +Sewn6EAes6aJInKc9Q0ztFijMDvd1GpUk74aTfOTlPf8hAs/hCBcNANExdqtvArB +As8e5ZTZ845b2EzwnexhF7sUMlQMAimTHpKG9n/v55IFDlndmQguLvqcAFLTxWYp +5KeXRKQOKIETNcX2b2TmQcTVL8w0RSXPQQCWPUouwpaYT05KnJe32x+SMsj/D1Fu +1uwJ +-----END CERTIFICATE----- + +# Issuer: CN=TrustCor ECA-1 O=TrustCor Systems S. de R.L. OU=TrustCor Certificate Authority +# Subject: CN=TrustCor ECA-1 O=TrustCor Systems S. de R.L. OU=TrustCor Certificate Authority +# Label: "TrustCor ECA-1" +# Serial: 9548242946988625984 +# MD5 Fingerprint: 27:92:23:1d:0a:f5:40:7c:e9:e6:6b:9d:d8:f5:e7:6c +# SHA1 Fingerprint: 58:d1:df:95:95:67:6b:63:c0:f0:5b:1c:17:4d:8b:84:0b:c8:78:bd +# SHA256 Fingerprint: 5a:88:5d:b1:9c:01:d9:12:c5:75:93:88:93:8c:af:bb:df:03:1a:b2:d4:8e:91:ee:15:58:9b:42:97:1d:03:9c +-----BEGIN CERTIFICATE----- +MIIEIDCCAwigAwIBAgIJAISCLF8cYtBAMA0GCSqGSIb3DQEBCwUAMIGcMQswCQYD +VQQGEwJQQTEPMA0GA1UECAwGUGFuYW1hMRQwEgYDVQQHDAtQYW5hbWEgQ2l0eTEk +MCIGA1UECgwbVHJ1c3RDb3IgU3lzdGVtcyBTLiBkZSBSLkwuMScwJQYDVQQLDB5U +cnVzdENvciBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkxFzAVBgNVBAMMDlRydXN0Q29y +IEVDQS0xMB4XDTE2MDIwNDEyMzIzM1oXDTI5MTIzMTE3MjgwN1owgZwxCzAJBgNV +BAYTAlBBMQ8wDQYDVQQIDAZQYW5hbWExFDASBgNVBAcMC1BhbmFtYSBDaXR5MSQw +IgYDVQQKDBtUcnVzdENvciBTeXN0ZW1zIFMuIGRlIFIuTC4xJzAlBgNVBAsMHlRy +dXN0Q29yIENlcnRpZmljYXRlIEF1dGhvcml0eTEXMBUGA1UEAwwOVHJ1c3RDb3Ig +RUNBLTEwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDPj+ARtZ+odnbb +3w9U73NjKYKtR8aja+3+XzP4Q1HpGjORMRegdMTUpwHmspI+ap3tDvl0mEDTPwOA +BoJA6LHip1GnHYMma6ve+heRK9jGrB6xnhkB1Zem6g23xFUfJ3zSCNV2HykVh0A5 +3ThFEXXQmqc04L/NyFIduUd+Dbi7xgz2c1cWWn5DkR9VOsZtRASqnKmcp0yJF4Ou +owReUoCLHhIlERnXDH19MURB6tuvsBzvgdAsxZohmz3tQjtQJvLsznFhBmIhVE5/ +wZ0+fyCMgMsq2JdiyIMzkX2woloPV+g7zPIlstR8L+xNxqE6FXrntl019fZISjZF +ZtS6mFjBAgMBAAGjYzBhMB0GA1UdDgQWBBREnkj1zG1I1KBLf/5ZJC+Dl5mahjAf +BgNVHSMEGDAWgBREnkj1zG1I1KBLf/5ZJC+Dl5mahjAPBgNVHRMBAf8EBTADAQH/ +MA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAQEABT41XBVwm8nHc2Fv +civUwo/yQ10CzsSUuZQRg2dd4mdsdXa/uwyqNsatR5Nj3B5+1t4u/ukZMjgDfxT2 +AHMsWbEhBuH7rBiVDKP/mZb3Kyeb1STMHd3BOuCYRLDE5D53sXOpZCz2HAF8P11F +hcCF5yWPldwX8zyfGm6wyuMdKulMY/okYWLW2n62HGz1Ah3UKt1VkOsqEUc8Ll50 +soIipX1TH0XsJ5F95yIW6MBoNtjG8U+ARDL54dHRHareqKucBK+tIA5kmE2la8BI +WJZpTdwHjFGTot+fDz2LYLSCjaoITmJF4PkL0uDgPFveXHEnJcLmA4GLEFPjx1Wi +tJ/X5g== +-----END CERTIFICATE----- + +# Issuer: CN=SSL.com Root Certification Authority RSA O=SSL Corporation +# Subject: CN=SSL.com Root Certification Authority RSA O=SSL Corporation +# Label: "SSL.com Root Certification Authority RSA" +# Serial: 8875640296558310041 +# MD5 Fingerprint: 86:69:12:c0:70:f1:ec:ac:ac:c2:d5:bc:a5:5b:a1:29 +# SHA1 Fingerprint: b7:ab:33:08:d1:ea:44:77:ba:14:80:12:5a:6f:bd:a9:36:49:0c:bb +# SHA256 Fingerprint: 85:66:6a:56:2e:e0:be:5c:e9:25:c1:d8:89:0a:6f:76:a8:7e:c1:6d:4d:7d:5f:29:ea:74:19:cf:20:12:3b:69 +-----BEGIN CERTIFICATE----- +MIIF3TCCA8WgAwIBAgIIeyyb0xaAMpkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UE +BhMCVVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQK +DA9TU0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBSU0EwHhcNMTYwMjEyMTczOTM5WhcNNDEwMjEyMTcz +OTM5WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNv +bSBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IFJTQTCCAiIwDQYJKoZIhvcN +AQEBBQADggIPADCCAgoCggIBAPkP3aMrfcvQKv7sZ4Wm5y4bunfh4/WvpOz6Sl2R +xFdHaxh3a3by/ZPkPQ/CFp4LZsNWlJ4Xg4XOVu/yFv0AYvUiCVToZRdOQbngT0aX +qhvIuG5iXmmxX9sqAn78bMrzQdjt0Oj8P2FI7bADFB0QDksZ4LtO7IZl/zbzXmcC +C52GVWH9ejjt/uIZALdvoVBidXQ8oPrIJZK0bnoix/geoeOy3ZExqysdBP+lSgQ3 +6YWkMyv94tZVNHwZpEpox7Ko07fKoZOI68GXvIz5HdkihCR0xwQ9aqkpk8zruFvh +/l8lqjRYyMEjVJ0bmBHDOJx+PYZspQ9AhnwC9FwCTyjLrnGfDzrIM/4RJTXq/LrF +YD3ZfBjVsqnTdXgDciLKOsMf7yzlLqn6niy2UUb9rwPW6mBo6oUWNmuF6R7As93E +JNyAKoFBbZQ+yODJgUEAnl6/f8UImKIYLEJAs/lvOCdLToD0PYFH4Ih86hzOtXVc +US4cK38acijnALXRdMbX5J+tB5O2UzU1/Dfkw/ZdFr4hc96SCvigY2q8lpJqPvi8 +ZVWb3vUNiSYE/CUapiVpy8JtynziWV+XrOvvLsi81xtZPCvM8hnIk2snYxnP/Okm ++Mpxm3+T/jRnhE6Z6/yzeAkzcLpmpnbtG3PrGqUNxCITIJRWCk4sbE6x/c+cCbqi +M+2HAgMBAAGjYzBhMB0GA1UdDgQWBBTdBAkHovV6fVJTEpKV7jiAJQ2mWTAPBgNV +HRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFN0ECQei9Xp9UlMSkpXuOIAlDaZZMA4G +A1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAIBgRlCn7Jp0cHh5wYfGV +cpNxJK1ok1iOMq8bs3AD/CUrdIWQPXhq9LmLpZc7tRiRux6n+UBbkflVma8eEdBc +Hadm47GUBwwyOabqG7B52B2ccETjit3E+ZUfijhDPwGFpUenPUayvOUiaPd7nNgs +PgohyC0zrL/FgZkxdMF1ccW+sfAjRfSda/wZY52jvATGGAslu1OJD7OAUN5F7kR/ +q5R4ZJjT9ijdh9hwZXT7DrkT66cPYakylszeu+1jTBi7qUD3oFRuIIhxdRjqerQ0 +cuAjJ3dctpDqhiVAq+8zD8ufgr6iIPv2tS0a5sKFsXQP+8hlAqRSAUfdSSLBv9jr +a6x+3uxjMxW3IwiPxg+NQVrdjsW5j+VFP3jbutIbQLH+cU0/4IGiul607BXgk90I +H37hVZkLId6Tngr75qNJvTYw/ud3sqB1l7UtgYgXZSD32pAAn8lSzDLKNXz1PQ/Y +K9f1JmzJBjSWFupwWRoyeXkLtoh/D1JIPb9s2KJELtFOt3JY04kTlf5Eq/jXixtu +nLwsoFvVagCvXzfh1foQC5ichucmj87w7G6KVwuA406ywKBjYZC6VWg3dGq2ktuf +oYYitmUnDuy2n0Jg5GfCtdpBC8TTi2EbvPofkSvXRAdeuims2cXp71NIWuuA8ShY +Ic2wBlX7Jz9TkHCpBB5XJ7k= +-----END CERTIFICATE----- + +# Issuer: CN=SSL.com Root Certification Authority ECC O=SSL Corporation +# Subject: CN=SSL.com Root Certification Authority ECC O=SSL Corporation +# Label: "SSL.com Root Certification Authority ECC" +# Serial: 8495723813297216424 +# MD5 Fingerprint: 2e:da:e4:39:7f:9c:8f:37:d1:70:9f:26:17:51:3a:8e +# SHA1 Fingerprint: c3:19:7c:39:24:e6:54:af:1b:c4:ab:20:95:7a:e2:c3:0e:13:02:6a +# SHA256 Fingerprint: 34:17:bb:06:cc:60:07:da:1b:96:1c:92:0b:8a:b4:ce:3f:ad:82:0e:4a:a3:0b:9a:cb:c4:a7:4e:bd:ce:bc:65 +-----BEGIN CERTIFICATE----- +MIICjTCCAhSgAwIBAgIIdebfy8FoW6gwCgYIKoZIzj0EAwIwfDELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xMTAvBgNVBAMMKFNTTC5jb20gUm9vdCBDZXJ0aWZpY2F0 +aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNDAzWhcNNDEwMjEyMTgxNDAz +WjB8MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hvdXN0 +b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjExMC8GA1UEAwwoU1NMLmNvbSBS +b290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49AgEGBSuB +BAAiA2IABEVuqVDEpiM2nl8ojRfLliJkP9x6jh3MCLOicSS6jkm5BBtHllirLZXI +7Z4INcgn64mMU1jrYor+8FsPazFSY0E7ic3s7LaNGdM0B9y7xgZ/wkWV7Mt/qCPg +CemB+vNH06NjMGEwHQYDVR0OBBYEFILRhXMw5zUE044CkvvlpNHEIejNMA8GA1Ud +EwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUgtGFczDnNQTTjgKS++Wk0cQh6M0wDgYD +VR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2cAMGQCMG/n61kRpGDPYbCWe+0F+S8T +kdzt5fxQaxFGRrMcIQBiu77D5+jNB5n5DQtdcj7EqgIwH7y6C+IwJPt8bYBVCpk+ +gA0z5Wajs6O7pdWLjwkspl1+4vAHCGht0nxpbl/f5Wpl +-----END CERTIFICATE----- + +# Issuer: CN=SSL.com EV Root Certification Authority RSA R2 O=SSL Corporation +# Subject: CN=SSL.com EV Root Certification Authority RSA R2 O=SSL Corporation +# Label: "SSL.com EV Root Certification Authority RSA R2" +# Serial: 6248227494352943350 +# MD5 Fingerprint: e1:1e:31:58:1a:ae:54:53:02:f6:17:6a:11:7b:4d:95 +# SHA1 Fingerprint: 74:3a:f0:52:9b:d0:32:a0:f4:4a:83:cd:d4:ba:a9:7b:7c:2e:c4:9a +# SHA256 Fingerprint: 2e:7b:f1:6c:c2:24:85:a7:bb:e2:aa:86:96:75:07:61:b0:ae:39:be:3b:2f:e9:d0:cc:6d:4e:f7:34:91:42:5c +-----BEGIN CERTIFICATE----- +MIIF6zCCA9OgAwIBAgIIVrYpzTS8ePYwDQYJKoZIhvcNAQELBQAwgYIxCzAJBgNV +BAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4GA1UEBwwHSG91c3RvbjEYMBYGA1UE +CgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQDDC5TU0wuY29tIEVWIFJvb3QgQ2Vy +dGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIyMB4XDTE3MDUzMTE4MTQzN1oXDTQy +MDUzMDE4MTQzN1owgYIxCzAJBgNVBAYTAlVTMQ4wDAYDVQQIDAVUZXhhczEQMA4G +A1UEBwwHSG91c3RvbjEYMBYGA1UECgwPU1NMIENvcnBvcmF0aW9uMTcwNQYDVQQD +DC5TU0wuY29tIEVWIFJvb3QgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgUlNBIFIy +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAjzZlQOHWTcDXtOlG2mvq +M0fNTPl9fb69LT3w23jhhqXZuglXaO1XPqDQCEGD5yhBJB/jchXQARr7XnAjssuf +OePPxU7Gkm0mxnu7s9onnQqG6YE3Bf7wcXHswxzpY6IXFJ3vG2fThVUCAtZJycxa +4bH3bzKfydQ7iEGonL3Lq9ttewkfokxykNorCPzPPFTOZw+oz12WGQvE43LrrdF9 +HSfvkusQv1vrO6/PgN3B0pYEW3p+pKk8OHakYo6gOV7qd89dAFmPZiw+B6KjBSYR +aZfqhbcPlgtLyEDhULouisv3D5oi53+aNxPN8k0TayHRwMwi8qFG9kRpnMphNQcA +b9ZhCBHqurj26bNg5U257J8UZslXWNvNh2n4ioYSA0e/ZhN2rHd9NCSFg83XqpyQ +Gp8hLH94t2S42Oim9HizVcuE0jLEeK6jj2HdzghTreyI/BXkmg3mnxp3zkyPuBQV +PWKchjgGAGYS5Fl2WlPAApiiECtoRHuOec4zSnaqW4EWG7WK2NAAe15itAnWhmMO +pgWVSbooi4iTsjQc2KRVbrcc0N6ZVTsj9CLg+SlmJuwgUHfbSguPvuUCYHBBXtSu +UDkiFCbLsjtzdFVHB3mBOagwE0TlBIqulhMlQg+5U8Sb/M3kHN48+qvWBkofZ6aY +MBzdLNvcGJVXZsb/XItW9XcCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAfBgNV +HSMEGDAWgBT5YLvU49U09rj1BoAlp3PbRmmonjAdBgNVHQ4EFgQU+WC71OPVNPa4 +9QaAJadz20ZpqJ4wDgYDVR0PAQH/BAQDAgGGMA0GCSqGSIb3DQEBCwUAA4ICAQBW +s47LCp1Jjr+kxJG7ZhcFUZh1++VQLHqe8RT6q9OKPv+RKY9ji9i0qVQBDb6Thi/5 +Sm3HXvVX+cpVHBK+Rw82xd9qt9t1wkclf7nxY/hoLVUE0fKNsKTPvDxeH3jnpaAg +cLAExbf3cqfeIg29MyVGjGSSJuM+LmOW2puMPfgYCdcDzH2GguDKBAdRUNf/ktUM +79qGn5nX67evaOI5JpS6aLe/g9Pqemc9YmeuJeVy6OLk7K4S9ksrPJ/psEDzOFSz +/bdoyNrGj1E8svuR3Bznm53htw1yj+KkxKl4+esUrMZDBcJlOSgYAsOCsp0FvmXt +ll9ldDz7CTUue5wT/RsPXcdtgTpWD8w74a8CLyKsRspGPKAcTNZEtF4uXBVmCeEm +Kf7GUmG6sXP/wwyc5WxqlD8UykAWlYTzWamsX0xhk23RO8yilQwipmdnRC652dKK +QbNmC1r7fSOl8hqw/96bg5Qu0T/fkreRrwU7ZcegbLHNYhLDkBvjJc40vG93drEQ +w/cFGsDWr3RiSBd3kmmQYRzelYB0VI8YHMPzA9C/pEN1hlMYegouCRw2n5H9gooi +S9EOUCXdywMMF8mDAAhONU2Ki+3wApRmLER/y5UnlhetCTCstnEXbosX9hwJ1C07 +mKVx01QT2WDz9UtmT/rx7iASjbSsV7FFY6GsdqnC+w== +-----END CERTIFICATE----- + +# Issuer: CN=SSL.com EV Root Certification Authority ECC O=SSL Corporation +# Subject: CN=SSL.com EV Root Certification Authority ECC O=SSL Corporation +# Label: "SSL.com EV Root Certification Authority ECC" +# Serial: 3182246526754555285 +# MD5 Fingerprint: 59:53:22:65:83:42:01:54:c0:ce:42:b9:5a:7c:f2:90 +# SHA1 Fingerprint: 4c:dd:51:a3:d1:f5:20:32:14:b0:c6:c5:32:23:03:91:c7:46:42:6d +# SHA256 Fingerprint: 22:a2:c1:f7:bd:ed:70:4c:c1:e7:01:b5:f4:08:c3:10:88:0f:e9:56:b5:de:2a:4a:44:f9:9c:87:3a:25:a7:c8 +-----BEGIN CERTIFICATE----- +MIIClDCCAhqgAwIBAgIILCmcWxbtBZUwCgYIKoZIzj0EAwIwfzELMAkGA1UEBhMC +VVMxDjAMBgNVBAgMBVRleGFzMRAwDgYDVQQHDAdIb3VzdG9uMRgwFgYDVQQKDA9T +U0wgQ29ycG9yYXRpb24xNDAyBgNVBAMMK1NTTC5jb20gRVYgUm9vdCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eSBFQ0MwHhcNMTYwMjEyMTgxNTIzWhcNNDEwMjEyMTgx +NTIzWjB/MQswCQYDVQQGEwJVUzEOMAwGA1UECAwFVGV4YXMxEDAOBgNVBAcMB0hv +dXN0b24xGDAWBgNVBAoMD1NTTCBDb3Jwb3JhdGlvbjE0MDIGA1UEAwwrU1NMLmNv +bSBFViBSb290IENlcnRpZmljYXRpb24gQXV0aG9yaXR5IEVDQzB2MBAGByqGSM49 +AgEGBSuBBAAiA2IABKoSR5CYG/vvw0AHgyBO8TCCogbR8pKGYfL2IWjKAMTH6kMA +VIbc/R/fALhBYlzccBYy3h+Z1MzFB8gIH2EWB1E9fVwHU+M1OIzfzZ/ZLg1Kthku +WnBaBu2+8KGwytAJKaNjMGEwHQYDVR0OBBYEFFvKXuXe0oGqzagtZFG22XKbl+ZP +MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAUW8pe5d7SgarNqC1kUbbZcpuX +5k8wDgYDVR0PAQH/BAQDAgGGMAoGCCqGSM49BAMCA2gAMGUCMQCK5kCJN+vp1RPZ +ytRrJPOwPYdGWBrssd9v+1a6cGvHOMzosYxPD/fxZ3YOg9AeUY8CMD32IygmTMZg +h5Mmm7I1HrrW9zzRHM76JTymGoEVW/MSD2zuZYrJh6j5B+BimoxcSg== +-----END CERTIFICATE----- + +# Issuer: CN=GlobalSign O=GlobalSign OU=GlobalSign Root CA - R6 +# Subject: CN=GlobalSign O=GlobalSign OU=GlobalSign Root CA - R6 +# Label: "GlobalSign Root CA - R6" +# Serial: 1417766617973444989252670301619537 +# MD5 Fingerprint: 4f:dd:07:e4:d4:22:64:39:1e:0c:37:42:ea:d1:c6:ae +# SHA1 Fingerprint: 80:94:64:0e:b5:a7:a1:ca:11:9c:1f:dd:d5:9f:81:02:63:a7:fb:d1 +# SHA256 Fingerprint: 2c:ab:ea:fe:37:d0:6c:a2:2a:ba:73:91:c0:03:3d:25:98:29:52:c4:53:64:73:49:76:3a:3a:b5:ad:6c:cf:69 +-----BEGIN CERTIFICATE----- +MIIFgzCCA2ugAwIBAgIORea7A4Mzw4VlSOb/RVEwDQYJKoZIhvcNAQEMBQAwTDEg +MB4GA1UECxMXR2xvYmFsU2lnbiBSb290IENBIC0gUjYxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTQxMjEwMDAwMDAwWhcNMzQx +MjEwMDAwMDAwWjBMMSAwHgYDVQQLExdHbG9iYWxTaWduIFJvb3QgQ0EgLSBSNjET +MBEGA1UEChMKR2xvYmFsU2lnbjETMBEGA1UEAxMKR2xvYmFsU2lnbjCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAJUH6HPKZvnsFMp7PPcNCPG0RQssgrRI +xutbPK6DuEGSMxSkb3/pKszGsIhrxbaJ0cay/xTOURQh7ErdG1rG1ofuTToVBu1k +ZguSgMpE3nOUTvOniX9PeGMIyBJQbUJmL025eShNUhqKGoC3GYEOfsSKvGRMIRxD +aNc9PIrFsmbVkJq3MQbFvuJtMgamHvm566qjuL++gmNQ0PAYid/kD3n16qIfKtJw +LnvnvJO7bVPiSHyMEAc4/2ayd2F+4OqMPKq0pPbzlUoSB239jLKJz9CgYXfIWHSw +1CM69106yqLbnQneXUQtkPGBzVeS+n68UARjNN9rkxi+azayOeSsJDa38O+2HBNX +k7besvjihbdzorg1qkXy4J02oW9UivFyVm4uiMVRQkQVlO6jxTiWm05OWgtH8wY2 +SXcwvHE35absIQh1/OZhFj931dmRl4QKbNQCTXTAFO39OfuD8l4UoQSwC+n+7o/h +bguyCLNhZglqsQY6ZZZZwPA1/cnaKI0aEYdwgQqomnUdnjqGBQCe24DWJfncBZ4n +WUx2OVvq+aWh2IMP0f/fMBH5hc8zSPXKbWQULHpYT9NLCEnFlWQaYw55PfWzjMpY +rZxCRXluDocZXFSxZba/jJvcE+kNb7gu3GduyYsRtYQUigAZcIN5kZeR1Bonvzce +MgfYFGM8KEyvAgMBAAGjYzBhMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMBAf8EBTAD +AQH/MB0GA1UdDgQWBBSubAWjkxPioufi1xzWx/B/yGdToDAfBgNVHSMEGDAWgBSu +bAWjkxPioufi1xzWx/B/yGdToDANBgkqhkiG9w0BAQwFAAOCAgEAgyXt6NH9lVLN +nsAEoJFp5lzQhN7craJP6Ed41mWYqVuoPId8AorRbrcWc+ZfwFSY1XS+wc3iEZGt +Ixg93eFyRJa0lV7Ae46ZeBZDE1ZXs6KzO7V33EByrKPrmzU+sQghoefEQzd5Mr61 +55wsTLxDKZmOMNOsIeDjHfrYBzN2VAAiKrlNIC5waNrlU/yDXNOd8v9EDERm8tLj +vUYAGm0CuiVdjaExUd1URhxN25mW7xocBFymFe944Hn+Xds+qkxV/ZoVqW/hpvvf +cDDpw+5CRu3CkwWJ+n1jez/QcYF8AOiYrg54NMMl+68KnyBr3TsTjxKM4kEaSHpz +oHdpx7Zcf4LIHv5YGygrqGytXm3ABdJ7t+uA/iU3/gKbaKxCXcPu9czc8FB10jZp +nOZ7BN9uBmm23goJSFmH63sUYHpkqmlD75HHTOwY3WzvUy2MmeFe8nI+z1TIvWfs +pA9MRf/TuTAjB0yPEL+GltmZWrSZVxykzLsViVO6LAUP5MSeGbEYNNVMnbrt9x+v +JJUEeKgDu+6B5dpffItKoZB0JaezPkvILFa9x8jvOOJckvB595yEunQtYQEgfn7R +8k8HWV+LLUNS60YMlOH1Zkd5d9VUWx+tJDfLRVpOoERIyNiwmcUVhAn21klJwGW4 +5hpxbqCo8YLoRT5s1gLXCmeDBVrJpBA= +-----END CERTIFICATE----- + +# Issuer: CN=OISTE WISeKey Global Root GC CA O=WISeKey OU=OISTE Foundation Endorsed +# Subject: CN=OISTE WISeKey Global Root GC CA O=WISeKey OU=OISTE Foundation Endorsed +# Label: "OISTE WISeKey Global Root GC CA" +# Serial: 44084345621038548146064804565436152554 +# MD5 Fingerprint: a9:d6:b9:2d:2f:93:64:f8:a5:69:ca:91:e9:68:07:23 +# SHA1 Fingerprint: e0:11:84:5e:34:de:be:88:81:b9:9c:f6:16:26:d1:96:1f:c3:b9:31 +# SHA256 Fingerprint: 85:60:f9:1c:36:24:da:ba:95:70:b5:fe:a0:db:e3:6f:f1:1a:83:23:be:94:86:85:4f:b3:f3:4a:55:71:19:8d +-----BEGIN CERTIFICATE----- +MIICaTCCAe+gAwIBAgIQISpWDK7aDKtARb8roi066jAKBggqhkjOPQQDAzBtMQsw +CQYDVQQGEwJDSDEQMA4GA1UEChMHV0lTZUtleTEiMCAGA1UECxMZT0lTVEUgRm91 +bmRhdGlvbiBFbmRvcnNlZDEoMCYGA1UEAxMfT0lTVEUgV0lTZUtleSBHbG9iYWwg +Um9vdCBHQyBDQTAeFw0xNzA1MDkwOTQ4MzRaFw00MjA1MDkwOTU4MzNaMG0xCzAJ +BgNVBAYTAkNIMRAwDgYDVQQKEwdXSVNlS2V5MSIwIAYDVQQLExlPSVNURSBGb3Vu +ZGF0aW9uIEVuZG9yc2VkMSgwJgYDVQQDEx9PSVNURSBXSVNlS2V5IEdsb2JhbCBS +b290IEdDIENBMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAETOlQwMYPchi82PG6s4ni +eUqjFqdrVCTbUf/q9Akkwwsin8tqJ4KBDdLArzHkdIJuyiXZjHWd8dvQmqJLIX4W +p2OQ0jnUsYd4XxiWD1AbNTcPasbc2RNNpI6QN+a9WzGRo1QwUjAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUSIcUrOPDnpBgOtfKie7T +rYy0UGYwEAYJKwYBBAGCNxUBBAMCAQAwCgYIKoZIzj0EAwMDaAAwZQIwJsdpW9zV +57LnyAyMjMPdeYwbY9XJUpROTYJKcx6ygISpJcBMWm1JKWB4E+J+SOtkAjEA2zQg +Mgj/mkkCtojeFK9dbJlxjRo/i9fgojaGHAeCOnZT/cKi7e97sIBPWA9LUzm9 +-----END CERTIFICATE----- + +# Issuer: CN=UCA Global G2 Root O=UniTrust +# Subject: CN=UCA Global G2 Root O=UniTrust +# Label: "UCA Global G2 Root" +# Serial: 124779693093741543919145257850076631279 +# MD5 Fingerprint: 80:fe:f0:c4:4a:f0:5c:62:32:9f:1c:ba:78:a9:50:f8 +# SHA1 Fingerprint: 28:f9:78:16:19:7a:ff:18:25:18:aa:44:fe:c1:a0:ce:5c:b6:4c:8a +# SHA256 Fingerprint: 9b:ea:11:c9:76:fe:01:47:64:c1:be:56:a6:f9:14:b5:a5:60:31:7a:bd:99:88:39:33:82:e5:16:1a:a0:49:3c +-----BEGIN CERTIFICATE----- +MIIFRjCCAy6gAwIBAgIQXd+x2lqj7V2+WmUgZQOQ7zANBgkqhkiG9w0BAQsFADA9 +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxGzAZBgNVBAMMElVDQSBH +bG9iYWwgRzIgUm9vdDAeFw0xNjAzMTEwMDAwMDBaFw00MDEyMzEwMDAwMDBaMD0x +CzAJBgNVBAYTAkNOMREwDwYDVQQKDAhVbmlUcnVzdDEbMBkGA1UEAwwSVUNBIEds +b2JhbCBHMiBSb290MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAxeYr +b3zvJgUno4Ek2m/LAfmZmqkywiKHYUGRO8vDaBsGxUypK8FnFyIdK+35KYmToni9 +kmugow2ifsqTs6bRjDXVdfkX9s9FxeV67HeToI8jrg4aA3++1NDtLnurRiNb/yzm +VHqUwCoV8MmNsHo7JOHXaOIxPAYzRrZUEaalLyJUKlgNAQLx+hVRZ2zA+te2G3/R +VogvGjqNO7uCEeBHANBSh6v7hn4PJGtAnTRnvI3HLYZveT6OqTwXS3+wmeOwcWDc +C/Vkw85DvG1xudLeJ1uK6NjGruFZfc8oLTW4lVYa8bJYS7cSN8h8s+1LgOGN+jIj +tm+3SJUIsUROhYw6AlQgL9+/V087OpAh18EmNVQg7Mc/R+zvWr9LesGtOxdQXGLY +D0tK3Cv6brxzks3sx1DoQZbXqX5t2Okdj4q1uViSukqSKwxW/YDrCPBeKW4bHAyv +j5OJrdu9o54hyokZ7N+1wxrrFv54NkzWbtA+FxyQF2smuvt6L78RHBgOLXMDj6Dl +NaBa4kx1HXHhOThTeEDMg5PXCp6dW4+K5OXgSORIskfNTip1KnvyIvbJvgmRlld6 +iIis7nCs+dwp4wwcOxJORNanTrAmyPPZGpeRaOrvjUYG0lZFWJo8DA+DuAUlwznP +O6Q0ibd5Ei9Hxeepl2n8pndntd978XplFeRhVmUCAwEAAaNCMEAwDgYDVR0PAQH/ +BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFIHEjMz15DD/pQwIX4wV +ZyF0Ad/fMA0GCSqGSIb3DQEBCwUAA4ICAQATZSL1jiutROTL/7lo5sOASD0Ee/oj +L3rtNtqyzm325p7lX1iPyzcyochltq44PTUbPrw7tgTQvPlJ9Zv3hcU2tsu8+Mg5 +1eRfB70VVJd0ysrtT7q6ZHafgbiERUlMjW+i67HM0cOU2kTC5uLqGOiiHycFutfl +1qnN3e92mI0ADs0b+gO3joBYDic/UvuUospeZcnWhNq5NXHzJsBPd+aBJ9J3O5oU +b3n09tDh05S60FdRvScFDcH9yBIw7m+NESsIndTUv4BFFJqIRNow6rSn4+7vW4LV +PtateJLbXDzz2K36uGt/xDYotgIVilQsnLAXc47QN6MUPJiVAAwpBVueSUmxX8fj +y88nZY41F7dXyDDZQVu5FLbowg+UMaeUmMxq67XhJ/UQqAHojhJi6IjMtX9Gl8Cb +EGY4GjZGXyJoPd/JxhMnq1MGrKI8hgZlb7F+sSlEmqO6SWkoaY/X5V+tBIZkbxqg +DMUIYs6Ao9Dz7GjevjPHF1t/gMRMTLGmhIrDO7gJzRSBuhjjVFc2/tsvfEehOjPI ++Vg7RE+xygKJBJYoaMVLuCaJu9YzL1DV/pqJuhgyklTGW+Cd+V7lDSKb9triyCGy +YiGqhkCyLmTTX8jjfhFnRR8F/uOi77Oos/N9j/gMHyIfLXC0uAE0djAA5SN4p1bX +UB+K+wb1whnw0A== +-----END CERTIFICATE----- + +# Issuer: CN=UCA Extended Validation Root O=UniTrust +# Subject: CN=UCA Extended Validation Root O=UniTrust +# Label: "UCA Extended Validation Root" +# Serial: 106100277556486529736699587978573607008 +# MD5 Fingerprint: a1:f3:5f:43:c6:34:9b:da:bf:8c:7e:05:53:ad:96:e2 +# SHA1 Fingerprint: a3:a1:b0:6f:24:61:23:4a:e3:36:a5:c2:37:fc:a6:ff:dd:f0:d7:3a +# SHA256 Fingerprint: d4:3a:f9:b3:54:73:75:5c:96:84:fc:06:d7:d8:cb:70:ee:5c:28:e7:73:fb:29:4e:b4:1e:e7:17:22:92:4d:24 +-----BEGIN CERTIFICATE----- +MIIFWjCCA0KgAwIBAgIQT9Irj/VkyDOeTzRYZiNwYDANBgkqhkiG9w0BAQsFADBH +MQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNVBAMMHFVDQSBF +eHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwHhcNMTUwMzEzMDAwMDAwWhcNMzgxMjMx +MDAwMDAwWjBHMQswCQYDVQQGEwJDTjERMA8GA1UECgwIVW5pVHJ1c3QxJTAjBgNV +BAMMHFVDQSBFeHRlbmRlZCBWYWxpZGF0aW9uIFJvb3QwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCpCQcoEwKwmeBkqh5DFnpzsZGgdT6o+uM4AHrsiWog +D4vFsJszA1qGxliG1cGFu0/GnEBNyr7uaZa4rYEwmnySBesFK5pI0Lh2PpbIILvS +sPGP2KxFRv+qZ2C0d35qHzwaUnoEPQc8hQ2E0B92CvdqFN9y4zR8V05WAT558aop +O2z6+I9tTcg1367r3CTueUWnhbYFiN6IXSV8l2RnCdm/WhUFhvMJHuxYMjMR83dk +sHYf5BA1FxvyDrFspCqjc/wJHx4yGVMR59mzLC52LqGj3n5qiAno8geK+LLNEOfi +c0CTuwjRP+H8C5SzJe98ptfRr5//lpr1kXuYC3fUfugH0mK1lTnj8/FtDw5lhIpj +VMWAtuCeS31HJqcBCF3RiJ7XwzJE+oJKCmhUfzhTA8ykADNkUVkLo4KRel7sFsLz +KuZi2irbWWIQJUoqgQtHB0MGcIfS+pMRKXpITeuUx3BNr2fVUbGAIAEBtHoIppB/ +TuDvB0GHr2qlXov7z1CymlSvw4m6WC31MJixNnI5fkkE/SmnTHnkBVfblLkWU41G +sx2VYVdWf6/wFlthWG82UBEL2KwrlRYaDh8IzTY0ZRBiZtWAXxQgXy0MoHgKaNYs +1+lvK9JKBZP8nm9rZ/+I8U6laUpSNwXqxhaN0sSZ0YIrO7o1dfdRUVjzyAfd5LQD +fwIDAQABo0IwQDAdBgNVHQ4EFgQU2XQ65DA9DfcS3H5aBZ8eNJr34RQwDwYDVR0T +AQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAYYwDQYJKoZIhvcNAQELBQADggIBADaN +l8xCFWQpN5smLNb7rhVpLGsaGvdftvkHTFnq88nIua7Mui563MD1sC3AO6+fcAUR +ap8lTwEpcOPlDOHqWnzcSbvBHiqB9RZLcpHIojG5qtr8nR/zXUACE/xOHAbKsxSQ +VBcZEhrxH9cMaVr2cXj0lH2RC47skFSOvG+hTKv8dGT9cZr4QQehzZHkPJrgmzI5 +c6sq1WnIeJEmMX3ixzDx/BR4dxIOE/TdFpS/S2d7cFOFyrC78zhNLJA5wA3CXWvp +4uXViI3WLL+rG761KIcSF3Ru/H38j9CHJrAb+7lsq+KePRXBOy5nAliRn+/4Qh8s +t2j1da3Ptfb/EX3C8CSlrdP6oDyp+l3cpaDvRKS+1ujl5BOWF3sGPjLtx7dCvHaj +2GU4Kzg1USEODm8uNBNA4StnDG1KQTAYI1oyVZnJF+A83vbsea0rWBmirSwiGpWO +vpaQXUJXxPkUAzUrHC1RVwinOt4/5Mi0A3PCwSaAuwtCH60NryZy2sy+s6ODWA2C +xR9GUeOcGMyNm43sSet1UNWMKFnKdDTajAshqx7qG+XH/RU+wBeq+yNuJkbL+vmx +cmtpzyKEC2IPrNkZAJSidjzULZrtBJ4tBmIQN1IchXIbJ+XMxjHsN+xjWZsLHXbM +fjKaiJUINlK73nZfdklJrX+9ZSCyycErdhh2n1ax +-----END CERTIFICATE----- + +# Issuer: CN=Certigna Root CA O=Dhimyotis OU=0002 48146308100036 +# Subject: CN=Certigna Root CA O=Dhimyotis OU=0002 48146308100036 +# Label: "Certigna Root CA" +# Serial: 269714418870597844693661054334862075617 +# MD5 Fingerprint: 0e:5c:30:62:27:eb:5b:bc:d7:ae:62:ba:e9:d5:df:77 +# SHA1 Fingerprint: 2d:0d:52:14:ff:9e:ad:99:24:01:74:20:47:6e:6c:85:27:27:f5:43 +# SHA256 Fingerprint: d4:8d:3d:23:ee:db:50:a4:59:e5:51:97:60:1c:27:77:4b:9d:7b:18:c9:4d:5a:05:95:11:a1:02:50:b9:31:68 +-----BEGIN CERTIFICATE----- +MIIGWzCCBEOgAwIBAgIRAMrpG4nxVQMNo+ZBbcTjpuEwDQYJKoZIhvcNAQELBQAw +WjELMAkGA1UEBhMCRlIxEjAQBgNVBAoMCURoaW15b3RpczEcMBoGA1UECwwTMDAw +MiA0ODE0NjMwODEwMDAzNjEZMBcGA1UEAwwQQ2VydGlnbmEgUm9vdCBDQTAeFw0x +MzEwMDEwODMyMjdaFw0zMzEwMDEwODMyMjdaMFoxCzAJBgNVBAYTAkZSMRIwEAYD +VQQKDAlEaGlteW90aXMxHDAaBgNVBAsMEzAwMDIgNDgxNDYzMDgxMDAwMzYxGTAX +BgNVBAMMEENlcnRpZ25hIFJvb3QgQ0EwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw +ggIKAoICAQDNGDllGlmx6mQWDoyUJJV8g9PFOSbcDO8WV43X2KyjQn+Cyu3NW9sO +ty3tRQgXstmzy9YXUnIo245Onoq2C/mehJpNdt4iKVzSs9IGPjA5qXSjklYcoW9M +CiBtnyN6tMbaLOQdLNyzKNAT8kxOAkmhVECe5uUFoC2EyP+YbNDrihqECB63aCPu +I9Vwzm1RaRDuoXrC0SIxwoKF0vJVdlB8JXrJhFwLrN1CTivngqIkicuQstDuI7pm +TLtipPlTWmR7fJj6o0ieD5Wupxj0auwuA0Wv8HT4Ks16XdG+RCYyKfHx9WzMfgIh +C59vpD++nVPiz32pLHxYGpfhPTc3GGYo0kDFUYqMwy3OU4gkWGQwFsWq4NYKpkDf +ePb1BHxpE4S80dGnBs8B92jAqFe7OmGtBIyT46388NtEbVncSVmurJqZNjBBe3Yz +IoejwpKGbvlw7q6Hh5UbxHq9MfPU0uWZ/75I7HX1eBYdpnDBfzwboZL7z8g81sWT +Co/1VTp2lc5ZmIoJlXcymoO6LAQ6l73UL77XbJuiyn1tJslV1c/DeVIICZkHJC1k +JWumIWmbat10TWuXekG9qxf5kBdIjzb5LdXF2+6qhUVB+s06RbFo5jZMm5BX7CO5 +hwjCxAnxl4YqKE3idMDaxIzb3+KhF1nOJFl0Mdp//TBt2dzhauH8XwIDAQABo4IB +GjCCARYwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYDVR0OBBYE +FBiHVuBud+4kNTxOc5of1uHieX4rMB8GA1UdIwQYMBaAFBiHVuBud+4kNTxOc5of +1uHieX4rMEQGA1UdIAQ9MDswOQYEVR0gADAxMC8GCCsGAQUFBwIBFiNodHRwczov +L3d3d3cuY2VydGlnbmEuZnIvYXV0b3JpdGVzLzBtBgNVHR8EZjBkMC+gLaArhilo +dHRwOi8vY3JsLmNlcnRpZ25hLmZyL2NlcnRpZ25hcm9vdGNhLmNybDAxoC+gLYYr +aHR0cDovL2NybC5kaGlteW90aXMuY29tL2NlcnRpZ25hcm9vdGNhLmNybDANBgkq +hkiG9w0BAQsFAAOCAgEAlLieT/DjlQgi581oQfccVdV8AOItOoldaDgvUSILSo3L +6btdPrtcPbEo/uRTVRPPoZAbAh1fZkYJMyjhDSSXcNMQH+pkV5a7XdrnxIxPTGRG +HVyH41neQtGbqH6mid2PHMkwgu07nM3A6RngatgCdTer9zQoKJHyBApPNeNgJgH6 +0BGM+RFq7q89w1DTj18zeTyGqHNFkIwgtnJzFyO+B2XleJINugHA64wcZr+shncB +lA2c5uk5jR+mUYyZDDl34bSb+hxnV29qao6pK0xXeXpXIs/NX2NGjVxZOob4Mkdi +o2cNGJHc+6Zr9UhhcyNZjgKnvETq9Emd8VRY+WCv2hikLyhF3HqgiIZd8zvn/yk1 +gPxkQ5Tm4xxvvq0OKmOZK8l+hfZx6AYDlf7ej0gcWtSS6Cvu5zHbugRqh5jnxV/v +faci9wHYTfmJ0A6aBVmknpjZbyvKcL5kwlWj9Omvw5Ip3IgWJJk8jSaYtlu3zM63 +Nwf9JtmYhST/WSMDmu2dnajkXjjO11INb9I/bbEFa0nOipFGc/T2L/Coc3cOZayh +jWZSaX5LaAzHHjcng6WMxwLkFM1JAbBzs/3GkDpv0mztO+7skb6iQ12LAEpmJURw +3kAP+HwV96LOPNdeE4yBFxgX0b3xdxA61GU5wSesVywlVP+i2k+KYTlerj1KjL0= +-----END CERTIFICATE----- + +# Issuer: CN=emSign Root CA - G1 O=eMudhra Technologies Limited OU=emSign PKI +# Subject: CN=emSign Root CA - G1 O=eMudhra Technologies Limited OU=emSign PKI +# Label: "emSign Root CA - G1" +# Serial: 235931866688319308814040 +# MD5 Fingerprint: 9c:42:84:57:dd:cb:0b:a7:2e:95:ad:b6:f3:da:bc:ac +# SHA1 Fingerprint: 8a:c7:ad:8f:73:ac:4e:c1:b5:75:4d:a5:40:f4:fc:cf:7c:b5:8e:8c +# SHA256 Fingerprint: 40:f6:af:03:46:a9:9a:a1:cd:1d:55:5a:4e:9c:ce:62:c7:f9:63:46:03:ee:40:66:15:83:3d:c8:c8:d0:03:67 +-----BEGIN CERTIFICATE----- +MIIDlDCCAnygAwIBAgIKMfXkYgxsWO3W2DANBgkqhkiG9w0BAQsFADBnMQswCQYD +VQQGEwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBU +ZWNobm9sb2dpZXMgTGltaXRlZDEcMBoGA1UEAxMTZW1TaWduIFJvb3QgQ0EgLSBH +MTAeFw0xODAyMTgxODMwMDBaFw00MzAyMTgxODMwMDBaMGcxCzAJBgNVBAYTAklO +MRMwEQYDVQQLEwplbVNpZ24gUEtJMSUwIwYDVQQKExxlTXVkaHJhIFRlY2hub2xv +Z2llcyBMaW1pdGVkMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEcxMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAk0u76WaK7p1b1TST0Bsew+eeuGQz +f2N4aLTNLnF115sgxk0pvLZoYIr3IZpWNVrzdr3YzZr/k1ZLpVkGoZM0Kd0WNHVO +8oG0x5ZOrRkVUkr+PHB1cM2vK6sVmjM8qrOLqs1D/fXqcP/tzxE7lM5OMhbTI0Aq +d7OvPAEsbO2ZLIvZTmmYsvePQbAyeGHWDV/D+qJAkh1cF+ZwPjXnorfCYuKrpDhM +tTk1b+oDafo6VGiFbdbyL0NVHpENDtjVaqSW0RM8LHhQ6DqS0hdW5TUaQBw+jSzt +Od9C4INBdN+jzcKGYEho42kLVACL5HZpIQ15TjQIXhTCzLG3rdd8cIrHhQIDAQAB +o0IwQDAdBgNVHQ4EFgQU++8Nhp6w492pufEhF38+/PB3KxowDgYDVR0PAQH/BAQD +AgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAFn/8oz1h31x +PaOfG1vR2vjTnGs2vZupYeveFix0PZ7mddrXuqe8QhfnPZHr5X3dPpzxz5KsbEjM +wiI/aTvFthUvozXGaCocV685743QNcMYDHsAVhzNixl03r4PEuDQqqE/AjSxcM6d +GNYIAwlG7mDgfrbESQRRfXBgvKqy/3lyeqYdPV8q+Mri/Tm3R7nrft8EI6/6nAYH +6ftjk4BAtcZsCjEozgyfz7MjNYBBjWzEN3uBL4ChQEKF6dk4jeihU80Bv2noWgby +RQuQ+q7hv53yrlc8pa6yVvSLZUDp/TGBLPQ5Cdjua6e0ph0VpZj3AYHYhX3zUVxx +iN66zB+Afko= +-----END CERTIFICATE----- + +# Issuer: CN=emSign ECC Root CA - G3 O=eMudhra Technologies Limited OU=emSign PKI +# Subject: CN=emSign ECC Root CA - G3 O=eMudhra Technologies Limited OU=emSign PKI +# Label: "emSign ECC Root CA - G3" +# Serial: 287880440101571086945156 +# MD5 Fingerprint: ce:0b:72:d1:9f:88:8e:d0:50:03:e8:e3:b8:8b:67:40 +# SHA1 Fingerprint: 30:43:fa:4f:f2:57:dc:a0:c3:80:ee:2e:58:ea:78:b2:3f:e6:bb:c1 +# SHA256 Fingerprint: 86:a1:ec:ba:08:9c:4a:8d:3b:be:27:34:c6:12:ba:34:1d:81:3e:04:3c:f9:e8:a8:62:cd:5c:57:a3:6b:be:6b +-----BEGIN CERTIFICATE----- +MIICTjCCAdOgAwIBAgIKPPYHqWhwDtqLhDAKBggqhkjOPQQDAzBrMQswCQYDVQQG +EwJJTjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNo +bm9sb2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0g +RzMwHhcNMTgwMjE4MTgzMDAwWhcNNDMwMjE4MTgzMDAwWjBrMQswCQYDVQQGEwJJ +TjETMBEGA1UECxMKZW1TaWduIFBLSTElMCMGA1UEChMcZU11ZGhyYSBUZWNobm9s +b2dpZXMgTGltaXRlZDEgMB4GA1UEAxMXZW1TaWduIEVDQyBSb290IENBIC0gRzMw +djAQBgcqhkjOPQIBBgUrgQQAIgNiAAQjpQy4LRL1KPOxst3iAhKAnjlfSU2fySU0 +WXTsuwYc58Byr+iuL+FBVIcUqEqy6HyC5ltqtdyzdc6LBtCGI79G1Y4PPwT01xyS +fvalY8L1X44uT6EYGQIrMgqCZH0Wk9GjQjBAMB0GA1UdDgQWBBR8XQKEE9TMipuB +zhccLikenEhjQjAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggq +hkjOPQQDAwNpADBmAjEAvvNhzwIQHWSVB7gYboiFBS+DCBeQyh+KTOgNG3qxrdWB +CUfvO6wIBHxcmbHtRwfSAjEAnbpV/KlK6O3t5nYBQnvI+GDZjVGLVTv7jHvrZQnD ++JbNR6iC8hZVdyR+EhCVBCyj +-----END CERTIFICATE----- + +# Issuer: CN=emSign Root CA - C1 O=eMudhra Inc OU=emSign PKI +# Subject: CN=emSign Root CA - C1 O=eMudhra Inc OU=emSign PKI +# Label: "emSign Root CA - C1" +# Serial: 825510296613316004955058 +# MD5 Fingerprint: d8:e3:5d:01:21:fa:78:5a:b0:df:ba:d2:ee:2a:5f:68 +# SHA1 Fingerprint: e7:2e:f1:df:fc:b2:09:28:cf:5d:d4:d5:67:37:b1:51:cb:86:4f:01 +# SHA256 Fingerprint: 12:56:09:aa:30:1d:a0:a2:49:b9:7a:82:39:cb:6a:34:21:6f:44:dc:ac:9f:39:54:b1:42:92:f2:e8:c8:60:8f +-----BEGIN CERTIFICATE----- +MIIDczCCAlugAwIBAgILAK7PALrEzzL4Q7IwDQYJKoZIhvcNAQELBQAwVjELMAkG +A1UEBhMCVVMxEzARBgNVBAsTCmVtU2lnbiBQS0kxFDASBgNVBAoTC2VNdWRocmEg +SW5jMRwwGgYDVQQDExNlbVNpZ24gUm9vdCBDQSAtIEMxMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowVjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMRwwGgYDVQQDExNlbVNpZ24gUm9v +dCBDQSAtIEMxMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAz+upufGZ +BczYKCFK83M0UYRWEPWgTywS4/oTmifQz/l5GnRfHXk5/Fv4cI7gklL35CX5VIPZ +HdPIWoU/Xse2B+4+wM6ar6xWQio5JXDWv7V7Nq2s9nPczdcdioOl+yuQFTdrHCZH +3DspVpNqs8FqOp099cGXOFgFixwR4+S0uF2FHYP+eF8LRWgYSKVGczQ7/g/IdrvH +GPMF0Ybzhe3nudkyrVWIzqa2kbBPrH4VI5b2P/AgNBbeCsbEBEV5f6f9vtKppa+c +xSMq9zwhbL2vj07FOrLzNBL834AaSaTUqZX3noleoomslMuoaJuvimUnzYnu3Yy1 +aylwQ6BpC+S5DwIDAQABo0IwQDAdBgNVHQ4EFgQU/qHgcB4qAzlSWkK+XJGFehiq +TbUwDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQEL +BQADggEBAMJKVvoVIXsoounlHfv4LcQ5lkFMOycsxGwYFYDGrK9HWS8mC+M2sO87 +/kOXSTKZEhVb3xEp/6tT+LvBeA+snFOvV71ojD1pM/CjoCNjO2RnIkSt1XHLVip4 +kqNPEjE2NuLe/gDEo2APJ62gsIq1NnpSob0n9CAnYuhNlCQT5AoE6TyrLshDCUrG +YQTlSTR+08TI9Q/Aqum6VF7zYytPT1DU/rl7mYw9wC68AivTxEDkigcxHpvOJpkT ++xHqmiIMERnHXhuBUDDIlhJu58tBf5E7oke3VIAb3ADMmpDqw8NQBmIMMMAVSKeo +WXzhriKi4gp6D/piq1JM4fHfyr6DDUI= +-----END CERTIFICATE----- + +# Issuer: CN=emSign ECC Root CA - C3 O=eMudhra Inc OU=emSign PKI +# Subject: CN=emSign ECC Root CA - C3 O=eMudhra Inc OU=emSign PKI +# Label: "emSign ECC Root CA - C3" +# Serial: 582948710642506000014504 +# MD5 Fingerprint: 3e:53:b3:a3:81:ee:d7:10:f8:d3:b0:1d:17:92:f5:d5 +# SHA1 Fingerprint: b6:af:43:c2:9b:81:53:7d:f6:ef:6b:c3:1f:1f:60:15:0c:ee:48:66 +# SHA256 Fingerprint: bc:4d:80:9b:15:18:9d:78:db:3e:1d:8c:f4:f9:72:6a:79:5d:a1:64:3c:a5:f1:35:8e:1d:db:0e:dc:0d:7e:b3 +-----BEGIN CERTIFICATE----- +MIICKzCCAbGgAwIBAgIKe3G2gla4EnycqDAKBggqhkjOPQQDAzBaMQswCQYDVQQG +EwJVUzETMBEGA1UECxMKZW1TaWduIFBLSTEUMBIGA1UEChMLZU11ZGhyYSBJbmMx +IDAeBgNVBAMTF2VtU2lnbiBFQ0MgUm9vdCBDQSAtIEMzMB4XDTE4MDIxODE4MzAw +MFoXDTQzMDIxODE4MzAwMFowWjELMAkGA1UEBhMCVVMxEzARBgNVBAsTCmVtU2ln +biBQS0kxFDASBgNVBAoTC2VNdWRocmEgSW5jMSAwHgYDVQQDExdlbVNpZ24gRUND +IFJvb3QgQ0EgLSBDMzB2MBAGByqGSM49AgEGBSuBBAAiA2IABP2lYa57JhAd6bci +MK4G9IGzsUJxlTm801Ljr6/58pc1kjZGDoeVjbk5Wum739D+yAdBPLtVb4Ojavti +sIGJAnB9SMVK4+kiVCJNk7tCDK93nCOmfddhEc5lx/h//vXyqaNCMEAwHQYDVR0O +BBYEFPtaSNCAIEDyqOkAB2kZd6fmw/TPMA4GA1UdDwEB/wQEAwIBBjAPBgNVHRMB +Af8EBTADAQH/MAoGCCqGSM49BAMDA2gAMGUCMQC02C8Cif22TGK6Q04ThHK1rt0c +3ta13FaPWEBaLd4gTCKDypOofu4SQMfWh0/434UCMBwUZOR8loMRnLDRWmFLpg9J +0wD8ofzkpf9/rdcw0Md3f76BB1UwUCAU9Vc4CqgxUQ== +-----END CERTIFICATE----- + +# Issuer: CN=Hongkong Post Root CA 3 O=Hongkong Post +# Subject: CN=Hongkong Post Root CA 3 O=Hongkong Post +# Label: "Hongkong Post Root CA 3" +# Serial: 46170865288971385588281144162979347873371282084 +# MD5 Fingerprint: 11:fc:9f:bd:73:30:02:8a:fd:3f:f3:58:b9:cb:20:f0 +# SHA1 Fingerprint: 58:a2:d0:ec:20:52:81:5b:c1:f3:f8:64:02:24:4e:c2:8e:02:4b:02 +# SHA256 Fingerprint: 5a:2f:c0:3f:0c:83:b0:90:bb:fa:40:60:4b:09:88:44:6c:76:36:18:3d:f9:84:6e:17:10:1a:44:7f:b8:ef:d6 +-----BEGIN CERTIFICATE----- +MIIFzzCCA7egAwIBAgIUCBZfikyl7ADJk0DfxMauI7gcWqQwDQYJKoZIhvcNAQEL +BQAwbzELMAkGA1UEBhMCSEsxEjAQBgNVBAgTCUhvbmcgS29uZzESMBAGA1UEBxMJ +SG9uZyBLb25nMRYwFAYDVQQKEw1Ib25na29uZyBQb3N0MSAwHgYDVQQDExdIb25n +a29uZyBQb3N0IFJvb3QgQ0EgMzAeFw0xNzA2MDMwMjI5NDZaFw00MjA2MDMwMjI5 +NDZaMG8xCzAJBgNVBAYTAkhLMRIwEAYDVQQIEwlIb25nIEtvbmcxEjAQBgNVBAcT +CUhvbmcgS29uZzEWMBQGA1UEChMNSG9uZ2tvbmcgUG9zdDEgMB4GA1UEAxMXSG9u +Z2tvbmcgUG9zdCBSb290IENBIDMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIK +AoICAQCziNfqzg8gTr7m1gNt7ln8wlffKWihgw4+aMdoWJwcYEuJQwy51BWy7sFO +dem1p+/l6TWZ5Mwc50tfjTMwIDNT2aa71T4Tjukfh0mtUC1Qyhi+AViiE3CWu4mI +VoBc+L0sPOFMV4i707mV78vH9toxdCim5lSJ9UExyuUmGs2C4HDaOym71QP1mbpV +9WTRYA6ziUm4ii8F0oRFKHyPaFASePwLtVPLwpgchKOesL4jpNrcyCse2m5FHomY +2vkALgbpDDtw1VAliJnLzXNg99X/NWfFobxeq81KuEXryGgeDQ0URhLj0mRiikKY +vLTGCAj4/ahMZJx2Ab0vqWwzD9g/KLg8aQFChn5pwckGyuV6RmXpwtZQQS4/t+Tt +bNe/JgERohYpSms0BpDsE9K2+2p20jzt8NYt3eEV7KObLyzJPivkaTv/ciWxNoZb +x39ri1UbSsUgYT2uy1DhCDq+sI9jQVMwCFk8mB13umOResoQUGC/8Ne8lYePl8X+ +l2oBlKN8W4UdKjk60FSh0Tlxnf0h+bV78OLgAo9uliQlLKAeLKjEiafv7ZkGL7YK +TE/bosw3Gq9HhS2KX8Q0NEwA/RiTZxPRN+ZItIsGxVd7GYYKecsAyVKvQv83j+Gj +Hno9UKtjBucVtT+2RTeUN7F+8kjDf8V1/peNRY8apxpyKBpADwIDAQABo2MwYTAP +BgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIBBjAfBgNVHSMEGDAWgBQXnc0e +i9Y5K3DTXNSguB+wAPzFYTAdBgNVHQ4EFgQUF53NHovWOStw01zUoLgfsAD8xWEw +DQYJKoZIhvcNAQELBQADggIBAFbVe27mIgHSQpsY1Q7XZiNc4/6gx5LS6ZStS6LG +7BJ8dNVI0lkUmcDrudHr9EgwW62nV3OZqdPlt9EuWSRY3GguLmLYauRwCy0gUCCk +MpXRAJi70/33MvJJrsZ64Ee+bs7Lo3I6LWldy8joRTnU+kLBEUx3XZL7av9YROXr +gZ6voJmtvqkBZss4HTzfQx/0TW60uhdG/H39h4F5ag0zD/ov+BS5gLNdTaqX4fnk +GMX41TiMJjz98iji7lpJiCzfeT2OnpA8vUFKOt1b9pq0zj8lMH8yfaIDlNDceqFS +3m6TjRgm/VWsvY+b0s+v54Ysyx8Jb6NvqYTUc79NoXQbTiNg8swOqn+knEwlqLJm +Ozj/2ZQw9nKEvmhVEA/GcywWaZMH/rFF7buiVWqw2rVKAiUnhde3t4ZEFolsgCs+ +l6mc1X5VTMbeRRAc6uk7nwNT7u56AQIWeNTowr5GdogTPyK7SBIdUgC0An4hGh6c +JfTzPV4e0hz5sy229zdcxsshTrD3mUcYhcErulWuBurQB7Lcq9CClnXO0lD+mefP +L5/ndtFhKvshuzHQqp9HpLIiyhY6UFfEW0NnxWViA0kB60PZ2Pierc+xYw5F9KBa +LJstxabArahH9CdMOA0uG0k7UvToiIMrVCjU8jVStDKDYmlkDJGcn5fqdBb9HxEG +mpv0 +-----END CERTIFICATE----- + +# Issuer: CN=Entrust Root Certification Authority - G4 O=Entrust, Inc. OU=See www.entrust.net/legal-terms/(c) 2015 Entrust, Inc. - for authorized use only +# Subject: CN=Entrust Root Certification Authority - G4 O=Entrust, Inc. OU=See www.entrust.net/legal-terms/(c) 2015 Entrust, Inc. - for authorized use only +# Label: "Entrust Root Certification Authority - G4" +# Serial: 289383649854506086828220374796556676440 +# MD5 Fingerprint: 89:53:f1:83:23:b7:7c:8e:05:f1:8c:71:38:4e:1f:88 +# SHA1 Fingerprint: 14:88:4e:86:26:37:b0:26:af:59:62:5c:40:77:ec:35:29:ba:96:01 +# SHA256 Fingerprint: db:35:17:d1:f6:73:2a:2d:5a:b9:7c:53:3e:c7:07:79:ee:32:70:a6:2f:b4:ac:42:38:37:24:60:e6:f0:1e:88 +-----BEGIN CERTIFICATE----- +MIIGSzCCBDOgAwIBAgIRANm1Q3+vqTkPAAAAAFVlrVgwDQYJKoZIhvcNAQELBQAw +gb4xCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQL +Ex9TZWUgd3d3LmVudHJ1c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykg +MjAxNSBFbnRydXN0LCBJbmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAw +BgNVBAMTKUVudHJ1c3QgUm9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0 +MB4XDTE1MDUyNzExMTExNloXDTM3MTIyNzExNDExNlowgb4xCzAJBgNVBAYTAlVT +MRYwFAYDVQQKEw1FbnRydXN0LCBJbmMuMSgwJgYDVQQLEx9TZWUgd3d3LmVudHJ1 +c3QubmV0L2xlZ2FsLXRlcm1zMTkwNwYDVQQLEzAoYykgMjAxNSBFbnRydXN0LCBJ +bmMuIC0gZm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxMjAwBgNVBAMTKUVudHJ1c3Qg +Um9vdCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eSAtIEc0MIICIjANBgkqhkiG9w0B +AQEFAAOCAg8AMIICCgKCAgEAsewsQu7i0TD/pZJH4i3DumSXbcr3DbVZwbPLqGgZ +2K+EbTBwXX7zLtJTmeH+H17ZSK9dE43b/2MzTdMAArzE+NEGCJR5WIoV3imz/f3E +T+iq4qA7ec2/a0My3dl0ELn39GjUu9CH1apLiipvKgS1sqbHoHrmSKvS0VnM1n4j +5pds8ELl3FFLFUHtSUrJ3hCX1nbB76W1NhSXNdh4IjVS70O92yfbYVaCNNzLiGAM +C1rlLAHGVK/XqsEQe9IFWrhAnoanw5CGAlZSCXqc0ieCU0plUmr1POeo8pyvi73T +DtTUXm6Hnmo9RR3RXRv06QqsYJn7ibT/mCzPfB3pAqoEmh643IhuJbNsZvc8kPNX +wbMv9W3y+8qh+CmdRouzavbmZwe+LGcKKh9asj5XxNMhIWNlUpEbsZmOeX7m640A +2Vqq6nPopIICR5b+W45UYaPrL0swsIsjdXJ8ITzI9vF01Bx7owVV7rtNOzK+mndm +nqxpkCIHH2E6lr7lmk/MBTwoWdPBDFSoWWG9yHJM6Nyfh3+9nEg2XpWjDrk4JFX8 +dWbrAuMINClKxuMrLzOg2qOGpRKX/YAr2hRC45K9PvJdXmd0LhyIRyk0X+IyqJwl +N4y6mACXi0mWHv0liqzc2thddG5msP9E36EYxr5ILzeUePiVSj9/E15dWf10hkNj +c0kCAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFJ84xFYjwznooHFs6FRM5Og6sb9nMA0GCSqGSIb3DQEBCwUAA4ICAQAS +5UKme4sPDORGpbZgQIeMJX6tuGguW8ZAdjwD+MlZ9POrYs4QjbRaZIxowLByQzTS +Gwv2LFPSypBLhmb8qoMi9IsabyZIrHZ3CL/FmFz0Jomee8O5ZDIBf9PD3Vht7LGr +hFV0d4QEJ1JrhkzO3bll/9bGXp+aEJlLdWr+aumXIOTkdnrG0CSqkM0gkLpHZPt/ +B7NTeLUKYvJzQ85BK4FqLoUWlFPUa19yIqtRLULVAJyZv967lDtX/Zr1hstWO1uI +AeV8KEsD+UmDfLJ/fOPtjqF/YFOOVZ1QNBIPt5d7bIdKROf1beyAN/BYGW5KaHbw +H5Lk6rWS02FREAutp9lfx1/cH6NcjKF+m7ee01ZvZl4HliDtC3T7Zk6LERXpgUl+ +b7DUUH8i119lAg2m9IUe2K4GS0qn0jFmwvjO5QimpAKWRGhXxNUzzxkvFMSUHHuk +2fCfDrGA4tGeEWSpiBE6doLlYsKA2KSD7ZPvfC+QsDJMlhVoSFLUmQjAJOgc47Ol +IQ6SwJAfzyBfyjs4x7dtOvPmRLgOMWuIjnDrnBdSqEGULoe256YSxXXfW8AKbnuk +5F6G+TaU33fD6Q3AOfF5u0aOq0NZJ7cguyPpVkAh7DE9ZapD8j3fcEThuk0mEDuY +n/PIjhs4ViFqUZPTkcpG2om3PVODLAgfi49T3f+sHw== +-----END CERTIFICATE----- + +# Issuer: CN=Microsoft ECC Root Certificate Authority 2017 O=Microsoft Corporation +# Subject: CN=Microsoft ECC Root Certificate Authority 2017 O=Microsoft Corporation +# Label: "Microsoft ECC Root Certificate Authority 2017" +# Serial: 136839042543790627607696632466672567020 +# MD5 Fingerprint: dd:a1:03:e6:4a:93:10:d1:bf:f0:19:42:cb:fe:ed:67 +# SHA1 Fingerprint: 99:9a:64:c3:7f:f4:7d:9f:ab:95:f1:47:69:89:14:60:ee:c4:c3:c5 +# SHA256 Fingerprint: 35:8d:f3:9d:76:4a:f9:e1:b7:66:e9:c9:72:df:35:2e:e1:5c:fa:c2:27:af:6a:d1:d7:0e:8e:4a:6e:dc:ba:02 +-----BEGIN CERTIFICATE----- +MIICWTCCAd+gAwIBAgIQZvI9r4fei7FK6gxXMQHC7DAKBggqhkjOPQQDAzBlMQsw +CQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYD +VQQDEy1NaWNyb3NvZnQgRUNDIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIw +MTcwHhcNMTkxMjE4MjMwNjQ1WhcNNDIwNzE4MjMxNjA0WjBlMQswCQYDVQQGEwJV +UzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYDVQQDEy1NaWNy +b3NvZnQgRUNDIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTcwdjAQBgcq +hkjOPQIBBgUrgQQAIgNiAATUvD0CQnVBEyPNgASGAlEvaqiBYgtlzPbKnR5vSmZR +ogPZnZH6thaxjG7efM3beaYvzrvOcS/lpaso7GMEZpn4+vKTEAXhgShC48Zo9OYb +hGBKia/teQ87zvH2RPUBeMCjVDBSMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8E +BTADAQH/MB0GA1UdDgQWBBTIy5lycFIM+Oa+sgRXKSrPQhDtNTAQBgkrBgEEAYI3 +FQEEAwIBADAKBggqhkjOPQQDAwNoADBlAjBY8k3qDPlfXu5gKcs68tvWMoQZP3zV +L8KxzJOuULsJMsbG7X7JNpQS5GiFBqIb0C8CMQCZ6Ra0DvpWSNSkMBaReNtUjGUB +iudQZsIxtzm6uBoiB078a1QWIP8rtedMDE2mT3M= +-----END CERTIFICATE----- + +# Issuer: CN=Microsoft RSA Root Certificate Authority 2017 O=Microsoft Corporation +# Subject: CN=Microsoft RSA Root Certificate Authority 2017 O=Microsoft Corporation +# Label: "Microsoft RSA Root Certificate Authority 2017" +# Serial: 40975477897264996090493496164228220339 +# MD5 Fingerprint: 10:ff:00:ff:cf:c9:f8:c7:7a:c0:ee:35:8e:c9:0f:47 +# SHA1 Fingerprint: 73:a5:e6:4a:3b:ff:83:16:ff:0e:dc:cc:61:8a:90:6e:4e:ae:4d:74 +# SHA256 Fingerprint: c7:41:f7:0f:4b:2a:8d:88:bf:2e:71:c1:41:22:ef:53:ef:10:eb:a0:cf:a5:e6:4c:fa:20:f4:18:85:30:73:e0 +-----BEGIN CERTIFICATE----- +MIIFqDCCA5CgAwIBAgIQHtOXCV/YtLNHcB6qvn9FszANBgkqhkiG9w0BAQwFADBl +MQswCQYDVQQGEwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYw +NAYDVQQDEy1NaWNyb3NvZnQgUlNBIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 +IDIwMTcwHhcNMTkxMjE4MjI1MTIyWhcNNDIwNzE4MjMwMDIzWjBlMQswCQYDVQQG +EwJVUzEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTYwNAYDVQQDEy1N +aWNyb3NvZnQgUlNBIFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTcwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKW76UM4wplZEWCpW9R2LBifOZ +Nt9GkMml7Xhqb0eRaPgnZ1AzHaGm++DlQ6OEAlcBXZxIQIJTELy/xztokLaCLeX0 +ZdDMbRnMlfl7rEqUrQ7eS0MdhweSE5CAg2Q1OQT85elss7YfUJQ4ZVBcF0a5toW1 +HLUX6NZFndiyJrDKxHBKrmCk3bPZ7Pw71VdyvD/IybLeS2v4I2wDwAW9lcfNcztm +gGTjGqwu+UcF8ga2m3P1eDNbx6H7JyqhtJqRjJHTOoI+dkC0zVJhUXAoP8XFWvLJ +jEm7FFtNyP9nTUwSlq31/niol4fX/V4ggNyhSyL71Imtus5Hl0dVe49FyGcohJUc +aDDv70ngNXtk55iwlNpNhTs+VcQor1fznhPbRiefHqJeRIOkpcrVE7NLP8TjwuaG +YaRSMLl6IE9vDzhTyzMMEyuP1pq9KsgtsRx9S1HKR9FIJ3Jdh+vVReZIZZ2vUpC6 +W6IYZVcSn2i51BVrlMRpIpj0M+Dt+VGOQVDJNE92kKz8OMHY4Xu54+OU4UZpyw4K +UGsTuqwPN1q3ErWQgR5WrlcihtnJ0tHXUeOrO8ZV/R4O03QK0dqq6mm4lyiPSMQH ++FJDOvTKVTUssKZqwJz58oHhEmrARdlns87/I6KJClTUFLkqqNfs+avNJVgyeY+Q +W5g5xAgGwax/Dj0ApQIDAQABo1QwUjAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/ +BAUwAwEB/zAdBgNVHQ4EFgQUCctZf4aycI8awznjwNnpv7tNsiMwEAYJKwYBBAGC +NxUBBAMCAQAwDQYJKoZIhvcNAQEMBQADggIBAKyvPl3CEZaJjqPnktaXFbgToqZC +LgLNFgVZJ8og6Lq46BrsTaiXVq5lQ7GPAJtSzVXNUzltYkyLDVt8LkS/gxCP81OC +gMNPOsduET/m4xaRhPtthH80dK2Jp86519efhGSSvpWhrQlTM93uCupKUY5vVau6 +tZRGrox/2KJQJWVggEbbMwSubLWYdFQl3JPk+ONVFT24bcMKpBLBaYVu32TxU5nh +SnUgnZUP5NbcA/FZGOhHibJXWpS2qdgXKxdJ5XbLwVaZOjex/2kskZGT4d9Mozd2 +TaGf+G0eHdP67Pv0RR0Tbc/3WeUiJ3IrhvNXuzDtJE3cfVa7o7P4NHmJweDyAmH3 +pvwPuxwXC65B2Xy9J6P9LjrRk5Sxcx0ki69bIImtt2dmefU6xqaWM/5TkshGsRGR +xpl/j8nWZjEgQRCHLQzWwa80mMpkg/sTV9HB8Dx6jKXB/ZUhoHHBk2dxEuqPiApp +GWSZI1b7rCoucL5mxAyE7+WL85MB+GqQk2dLsmijtWKP6T+MejteD+eMuMZ87zf9 +dOLITzNy4ZQ5bb0Sr74MTnB8G2+NszKTc0QWbej09+CVgI+WXTik9KveCjCHk9hN +AHFiRSdLOkKEW39lt2c0Ui2cFmuqqNh7o0JMcccMyj6D5KbvtwEwXlGjefVwaaZB +RA+GsCyRxj3qrg+E +-----END CERTIFICATE----- + +# Issuer: CN=e-Szigno Root CA 2017 O=Microsec Ltd. +# Subject: CN=e-Szigno Root CA 2017 O=Microsec Ltd. +# Label: "e-Szigno Root CA 2017" +# Serial: 411379200276854331539784714 +# MD5 Fingerprint: de:1f:f6:9e:84:ae:a7:b4:21:ce:1e:58:7d:d1:84:98 +# SHA1 Fingerprint: 89:d4:83:03:4f:9e:9a:48:80:5f:72:37:d4:a9:a6:ef:cb:7c:1f:d1 +# SHA256 Fingerprint: be:b0:0b:30:83:9b:9b:c3:2c:32:e4:44:79:05:95:06:41:f2:64:21:b1:5e:d0:89:19:8b:51:8a:e2:ea:1b:99 +-----BEGIN CERTIFICATE----- +MIICQDCCAeWgAwIBAgIMAVRI7yH9l1kN9QQKMAoGCCqGSM49BAMCMHExCzAJBgNV +BAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMgTHRk +LjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25vIFJv +b3QgQ0EgMjAxNzAeFw0xNzA4MjIxMjA3MDZaFw00MjA4MjIxMjA3MDZaMHExCzAJ +BgNVBAYTAkhVMREwDwYDVQQHDAhCdWRhcGVzdDEWMBQGA1UECgwNTWljcm9zZWMg +THRkLjEXMBUGA1UEYQwOVkFUSFUtMjM1ODQ0OTcxHjAcBgNVBAMMFWUtU3ppZ25v +IFJvb3QgQ0EgMjAxNzBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABJbcPYrYsHtv +xie+RJCxs1YVe45DJH0ahFnuY2iyxl6H0BVIHqiQrb1TotreOpCmYF9oMrWGQd+H +Wyx7xf58etqjYzBhMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0G +A1UdDgQWBBSHERUI0arBeAyxr87GyZDvvzAEwDAfBgNVHSMEGDAWgBSHERUI0arB +eAyxr87GyZDvvzAEwDAKBggqhkjOPQQDAgNJADBGAiEAtVfd14pVCzbhhkT61Nlo +jbjcI4qKDdQvfepz7L9NbKgCIQDLpbQS+ue16M9+k/zzNY9vTlp8tLxOsvxyqltZ ++efcMQ== +-----END CERTIFICATE----- + +# Issuer: O=CERTSIGN SA OU=certSIGN ROOT CA G2 +# Subject: O=CERTSIGN SA OU=certSIGN ROOT CA G2 +# Label: "certSIGN Root CA G2" +# Serial: 313609486401300475190 +# MD5 Fingerprint: 8c:f1:75:8a:c6:19:cf:94:b7:f7:65:20:87:c3:97:c7 +# SHA1 Fingerprint: 26:f9:93:b4:ed:3d:28:27:b0:b9:4b:a7:e9:15:1d:a3:8d:92:e5:32 +# SHA256 Fingerprint: 65:7c:fe:2f:a7:3f:aa:38:46:25:71:f3:32:a2:36:3a:46:fc:e7:02:09:51:71:07:02:cd:fb:b6:ee:da:33:05 +-----BEGIN CERTIFICATE----- +MIIFRzCCAy+gAwIBAgIJEQA0tk7GNi02MA0GCSqGSIb3DQEBCwUAMEExCzAJBgNV +BAYTAlJPMRQwEgYDVQQKEwtDRVJUU0lHTiBTQTEcMBoGA1UECxMTY2VydFNJR04g +Uk9PVCBDQSBHMjAeFw0xNzAyMDYwOTI3MzVaFw00MjAyMDYwOTI3MzVaMEExCzAJ +BgNVBAYTAlJPMRQwEgYDVQQKEwtDRVJUU0lHTiBTQTEcMBoGA1UECxMTY2VydFNJ +R04gUk9PVCBDQSBHMjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAMDF +dRmRfUR0dIf+DjuW3NgBFszuY5HnC2/OOwppGnzC46+CjobXXo9X69MhWf05N0Iw +vlDqtg+piNguLWkh59E3GE59kdUWX2tbAMI5Qw02hVK5U2UPHULlj88F0+7cDBrZ +uIt4ImfkabBoxTzkbFpG583H+u/E7Eu9aqSs/cwoUe+StCmrqzWaTOTECMYmzPhp +n+Sc8CnTXPnGFiWeI8MgwT0PPzhAsP6CRDiqWhqKa2NYOLQV07YRaXseVO6MGiKs +cpc/I1mbySKEwQdPzH/iV8oScLumZfNpdWO9lfsbl83kqK/20U6o2YpxJM02PbyW +xPFsqa7lzw1uKA2wDrXKUXt4FMMgL3/7FFXhEZn91QqhngLjYl/rNUssuHLoPj1P +rCy7Lobio3aP5ZMqz6WryFyNSwb/EkaseMsUBzXgqd+L6a8VTxaJW732jcZZroiF +DsGJ6x9nxUWO/203Nit4ZoORUSs9/1F3dmKh7Gc+PoGD4FapUB8fepmrY7+EF3fx +DTvf95xhszWYijqy7DwaNz9+j5LP2RIUZNoQAhVB/0/E6xyjyfqZ90bp4RjZsbgy +LcsUDFDYg2WD7rlcz8sFWkz6GZdr1l0T08JcVLwyc6B49fFtHsufpaafItzRUZ6C +eWRgKRM+o/1Pcmqr4tTluCRVLERLiohEnMqE0yo7AgMBAAGjQjBAMA8GA1UdEwEB +/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgEGMB0GA1UdDgQWBBSCIS1mxteg4BXrzkwJ +d8RgnlRuAzANBgkqhkiG9w0BAQsFAAOCAgEAYN4auOfyYILVAzOBywaK8SJJ6ejq +kX/GM15oGQOGO0MBzwdw5AgeZYWR5hEit/UCI46uuR59H35s5r0l1ZUa8gWmr4UC +b6741jH/JclKyMeKqdmfS0mbEVeZkkMR3rYzpMzXjWR91M08KCy0mpbqTfXERMQl +qiCA2ClV9+BB/AYm/7k29UMUA2Z44RGx2iBfRgB4ACGlHgAoYXhvqAEBj500mv/0 +OJD7uNGzcgbJceaBxXntC6Z58hMLnPddDnskk7RI24Zf3lCGeOdA5jGokHZwYa+c +NywRtYK3qq4kNFtyDGkNzVmf9nGvnAvRCjj5BiKDUyUM/FHE5r7iOZULJK2v0ZXk +ltd0ZGtxTgI8qoXzIKNDOXZbbFD+mpwUHmUUihW9o4JFWklWatKcsWMy5WHgUyIO +pwpJ6st+H6jiYoD2EEVSmAYY3qXNL3+q1Ok+CHLsIwMCPKaq2LxndD0UF/tUSxfj +03k9bWtJySgOLnRQvwzZRjoQhsmnP+mg7H/rpXdYaXHmgwo38oZJar55CJD2AhZk +PuXaTH4MNMn5X7azKFGnpyuqSfqNZSlO42sTp5SjLVFteAxEy9/eCG/Oo2Sr05WE +1LlSVHJ7liXMvGnjSG4N0MedJ5qq+BOS3R7fY581qRY27Iy4g/Q9iY/NtBde17MX +QRBdJ3NghVdJIgc= +-----END CERTIFICATE----- + +# Issuer: CN=Trustwave Global Certification Authority O=Trustwave Holdings, Inc. +# Subject: CN=Trustwave Global Certification Authority O=Trustwave Holdings, Inc. +# Label: "Trustwave Global Certification Authority" +# Serial: 1846098327275375458322922162 +# MD5 Fingerprint: f8:1c:18:2d:2f:ba:5f:6d:a1:6c:bc:c7:ab:91:c7:0e +# SHA1 Fingerprint: 2f:8f:36:4f:e1:58:97:44:21:59:87:a5:2a:9a:d0:69:95:26:7f:b5 +# SHA256 Fingerprint: 97:55:20:15:f5:dd:fc:3c:87:88:c0:06:94:45:55:40:88:94:45:00:84:f1:00:86:70:86:bc:1a:2b:b5:8d:c8 +-----BEGIN CERTIFICATE----- +MIIF2jCCA8KgAwIBAgIMBfcOhtpJ80Y1LrqyMA0GCSqGSIb3DQEBCwUAMIGIMQsw +CQYDVQQGEwJVUzERMA8GA1UECAwISWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28x +ITAfBgNVBAoMGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1 +c3R3YXZlIEdsb2JhbCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0xNzA4MjMx +OTM0MTJaFw00MjA4MjMxOTM0MTJaMIGIMQswCQYDVQQGEwJVUzERMA8GA1UECAwI +SWxsaW5vaXMxEDAOBgNVBAcMB0NoaWNhZ28xITAfBgNVBAoMGFRydXN0d2F2ZSBI +b2xkaW5ncywgSW5jLjExMC8GA1UEAwwoVHJ1c3R3YXZlIEdsb2JhbCBDZXJ0aWZp +Y2F0aW9uIEF1dGhvcml0eTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB +ALldUShLPDeS0YLOvR29zd24q88KPuFd5dyqCblXAj7mY2Hf8g+CY66j96xz0Xzn +swuvCAAJWX/NKSqIk4cXGIDtiLK0thAfLdZfVaITXdHG6wZWiYj+rDKd/VzDBcdu +7oaJuogDnXIhhpCujwOl3J+IKMujkkkP7NAP4m1ET4BqstTnoApTAbqOl5F2brz8 +1Ws25kCI1nsvXwXoLG0R8+eyvpJETNKXpP7ScoFDB5zpET71ixpZfR9oWN0EACyW +80OzfpgZdNmcc9kYvkHHNHnZ9GLCQ7mzJ7Aiy/k9UscwR7PJPrhq4ufogXBeQotP +JqX+OsIgbrv4Fo7NDKm0G2x2EOFYeUY+VM6AqFcJNykbmROPDMjWLBz7BegIlT1l +RtzuzWniTY+HKE40Cz7PFNm73bZQmq131BnW2hqIyE4bJ3XYsgjxroMwuREOzYfw +hI0Vcnyh78zyiGG69Gm7DIwLdVcEuE4qFC49DxweMqZiNu5m4iK4BUBjECLzMx10 +coos9TkpoNPnG4CELcU9402x/RpvumUHO1jsQkUm+9jaJXLE9gCxInm943xZYkqc +BW89zubWR2OZxiRvchLIrH+QtAuRcOi35hYQcRfO3gZPSEF9NUqjifLJS3tBEW1n +twiYTOURGa5CgNz7kAXU+FDKvuStx8KU1xad5hePrzb7AgMBAAGjQjBAMA8GA1Ud +EwEB/wQFMAMBAf8wHQYDVR0OBBYEFJngGWcNYtt2s9o9uFvo/ULSMQ6HMA4GA1Ud +DwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAmHNw4rDT7TnsTGDZqRKGFx6W +0OhUKDtkLSGm+J1WE2pIPU/HPinbbViDVD2HfSMF1OQc3Og4ZYbFdada2zUFvXfe +uyk3QAUHw5RSn8pk3fEbK9xGChACMf1KaA0HZJDmHvUqoai7PF35owgLEQzxPy0Q +lG/+4jSHg9bP5Rs1bdID4bANqKCqRieCNqcVtgimQlRXtpla4gt5kNdXElE1GYhB +aCXUNxeEFfsBctyV3lImIJgm4nb1J2/6ADtKYdkNy1GTKv0WBpanI5ojSP5RvbbE +sLFUzt5sQa0WZ37b/TjNuThOssFgy50X31ieemKyJo90lZvkWx3SD92YHJtZuSPT +MaCm/zjdzyBP6VhWOmfD0faZmZ26NraAL4hHT4a/RDqA5Dccprrql5gR0IRiR2Qe +qu5AvzSxnI9O4fKSTx+O856X3vOmeWqJcU9LJxdI/uz0UA9PSX3MReO9ekDFQdxh +VicGaeVyQYHTtgGJoC86cnn+OjC/QezHYj6RS8fZMXZC+fc8Y+wmjHMMfRod6qh8 +h6jCJ3zhM0EPz8/8AKAigJ5Kp28AsEFFtyLKaEjFQqKu3R3y4G5OBVixwJAWKqQ9 +EEC+j2Jjg6mcgn0tAumDMHzLJ8n9HmYAsC7TIS+OMxZsmO0QqAfWzJPP29FpHOTK +yeC2nOnOcXHebD8WpHk= +-----END CERTIFICATE----- + +# Issuer: CN=Trustwave Global ECC P256 Certification Authority O=Trustwave Holdings, Inc. +# Subject: CN=Trustwave Global ECC P256 Certification Authority O=Trustwave Holdings, Inc. +# Label: "Trustwave Global ECC P256 Certification Authority" +# Serial: 4151900041497450638097112925 +# MD5 Fingerprint: 5b:44:e3:8d:5d:36:86:26:e8:0d:05:d2:59:a7:83:54 +# SHA1 Fingerprint: b4:90:82:dd:45:0c:be:8b:5b:b1:66:d3:e2:a4:08:26:cd:ed:42:cf +# SHA256 Fingerprint: 94:5b:bc:82:5e:a5:54:f4:89:d1:fd:51:a7:3d:df:2e:a6:24:ac:70:19:a0:52:05:22:5c:22:a7:8c:cf:a8:b4 +-----BEGIN CERTIFICATE----- +MIICYDCCAgegAwIBAgIMDWpfCD8oXD5Rld9dMAoGCCqGSM49BAMCMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM1MTBaFw00MjA4MjMxOTM1MTBaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDI1NiBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTBZMBMGByqGSM49AgEGCCqG +SM49AwEHA0IABH77bOYj43MyCMpg5lOcunSNGLB4kFKA3TjASh3RqMyTpJcGOMoN +FWLGjgEqZZ2q3zSRLoHB5DOSMcT9CTqmP62jQzBBMA8GA1UdEwEB/wQFMAMBAf8w +DwYDVR0PAQH/BAUDAwcGADAdBgNVHQ4EFgQUo0EGrJBt0UrrdaVKEJmzsaGLSvcw +CgYIKoZIzj0EAwIDRwAwRAIgB+ZU2g6gWrKuEZ+Hxbb/ad4lvvigtwjzRM4q3wgh +DDcCIC0mA6AFvWvR9lz4ZcyGbbOcNEhjhAnFjXca4syc4XR7 +-----END CERTIFICATE----- + +# Issuer: CN=Trustwave Global ECC P384 Certification Authority O=Trustwave Holdings, Inc. +# Subject: CN=Trustwave Global ECC P384 Certification Authority O=Trustwave Holdings, Inc. +# Label: "Trustwave Global ECC P384 Certification Authority" +# Serial: 2704997926503831671788816187 +# MD5 Fingerprint: ea:cf:60:c4:3b:b9:15:29:40:a1:97:ed:78:27:93:d6 +# SHA1 Fingerprint: e7:f3:a3:c8:cf:6f:c3:04:2e:6d:0e:67:32:c5:9e:68:95:0d:5e:d2 +# SHA256 Fingerprint: 55:90:38:59:c8:c0:c3:eb:b8:75:9e:ce:4e:25:57:22:5f:f5:75:8b:bd:38:eb:d4:82:76:60:1e:1b:d5:80:97 +-----BEGIN CERTIFICATE----- +MIICnTCCAiSgAwIBAgIMCL2Fl2yZJ6SAaEc7MAoGCCqGSM49BAMDMIGRMQswCQYD +VQQGEwJVUzERMA8GA1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAf +BgNVBAoTGFRydXN0d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3 +YXZlIEdsb2JhbCBFQ0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTAeFw0x +NzA4MjMxOTM2NDNaFw00MjA4MjMxOTM2NDNaMIGRMQswCQYDVQQGEwJVUzERMA8G +A1UECBMISWxsaW5vaXMxEDAOBgNVBAcTB0NoaWNhZ28xITAfBgNVBAoTGFRydXN0 +d2F2ZSBIb2xkaW5ncywgSW5jLjE6MDgGA1UEAxMxVHJ1c3R3YXZlIEdsb2JhbCBF +Q0MgUDM4NCBDZXJ0aWZpY2F0aW9uIEF1dGhvcml0eTB2MBAGByqGSM49AgEGBSuB +BAAiA2IABGvaDXU1CDFHBa5FmVXxERMuSvgQMSOjfoPTfygIOiYaOs+Xgh+AtycJ +j9GOMMQKmw6sWASr9zZ9lCOkmwqKi6vr/TklZvFe/oyujUF5nQlgziip04pt89ZF +1PKYhDhloKNDMEEwDwYDVR0TAQH/BAUwAwEB/zAPBgNVHQ8BAf8EBQMDBwYAMB0G +A1UdDgQWBBRVqYSJ0sEyvRjLbKYHTsjnnb6CkDAKBggqhkjOPQQDAwNnADBkAjA3 +AZKXRRJ+oPM+rRk6ct30UJMDEr5E0k9BpIycnR+j9sKS50gU/k6bpZFXrsY3crsC +MGclCrEMXu6pY5Jv5ZAL/mYiykf9ijH3g/56vxC+GCsej/YpHpRZ744hN8tRmKVu +Sw== +-----END CERTIFICATE----- + +# Issuer: CN=NAVER Global Root Certification Authority O=NAVER BUSINESS PLATFORM Corp. +# Subject: CN=NAVER Global Root Certification Authority O=NAVER BUSINESS PLATFORM Corp. +# Label: "NAVER Global Root Certification Authority" +# Serial: 9013692873798656336226253319739695165984492813 +# MD5 Fingerprint: c8:7e:41:f6:25:3b:f5:09:b3:17:e8:46:3d:bf:d0:9b +# SHA1 Fingerprint: 8f:6b:f2:a9:27:4a:da:14:a0:c4:f4:8e:61:27:f9:c0:1e:78:5d:d1 +# SHA256 Fingerprint: 88:f4:38:dc:f8:ff:d1:fa:8f:42:91:15:ff:e5:f8:2a:e1:e0:6e:0c:70:c3:75:fa:ad:71:7b:34:a4:9e:72:65 +-----BEGIN CERTIFICATE----- +MIIFojCCA4qgAwIBAgIUAZQwHqIL3fXFMyqxQ0Rx+NZQTQ0wDQYJKoZIhvcNAQEM +BQAwaTELMAkGA1UEBhMCS1IxJjAkBgNVBAoMHU5BVkVSIEJVU0lORVNTIFBMQVRG +T1JNIENvcnAuMTIwMAYDVQQDDClOQVZFUiBHbG9iYWwgUm9vdCBDZXJ0aWZpY2F0 +aW9uIEF1dGhvcml0eTAeFw0xNzA4MTgwODU4NDJaFw0zNzA4MTgyMzU5NTlaMGkx +CzAJBgNVBAYTAktSMSYwJAYDVQQKDB1OQVZFUiBCVVNJTkVTUyBQTEFURk9STSBD +b3JwLjEyMDAGA1UEAwwpTkFWRVIgR2xvYmFsIFJvb3QgQ2VydGlmaWNhdGlvbiBB +dXRob3JpdHkwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC21PGTXLVA +iQqrDZBbUGOukJR0F0Vy1ntlWilLp1agS7gvQnXp2XskWjFlqxcX0TM62RHcQDaH +38dq6SZeWYp34+hInDEW+j6RscrJo+KfziFTowI2MMtSAuXaMl3Dxeb57hHHi8lE +HoSTGEq0n+USZGnQJoViAbbJAh2+g1G7XNr4rRVqmfeSVPc0W+m/6imBEtRTkZaz +kVrd/pBzKPswRrXKCAfHcXLJZtM0l/aM9BhK4dA9WkW2aacp+yPOiNgSnABIqKYP +szuSjXEOdMWLyEz59JuOuDxp7W87UC9Y7cSw0BwbagzivESq2M0UXZR4Yb8Obtoq +vC8MC3GmsxY/nOb5zJ9TNeIDoKAYv7vxvvTWjIcNQvcGufFt7QSUqP620wbGQGHf +nZ3zVHbOUzoBppJB7ASjjw2i1QnK1sua8e9DXcCrpUHPXFNwcMmIpi3Ua2FzUCaG +YQ5fG8Ir4ozVu53BA0K6lNpfqbDKzE0K70dpAy8i+/Eozr9dUGWokG2zdLAIx6yo +0es+nPxdGoMuK8u180SdOqcXYZaicdNwlhVNt0xz7hlcxVs+Qf6sdWA7G2POAN3a +CJBitOUt7kinaxeZVL6HSuOpXgRM6xBtVNbv8ejyYhbLgGvtPe31HzClrkvJE+2K +AQHJuFFYwGY6sWZLxNUxAmLpdIQM201GLQIDAQABo0IwQDAdBgNVHQ4EFgQU0p+I +36HNLL3s9TsBAZMzJ7LrYEswDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMB +Af8wDQYJKoZIhvcNAQEMBQADggIBADLKgLOdPVQG3dLSLvCkASELZ0jKbY7gyKoN +qo0hV4/GPnrK21HUUrPUloSlWGB/5QuOH/XcChWB5Tu2tyIvCZwTFrFsDDUIbatj +cu3cvuzHV+YwIHHW1xDBE1UBjCpD5EHxzzp6U5LOogMFDTjfArsQLtk70pt6wKGm ++LUx5vR1yblTmXVHIloUFcd4G7ad6Qz4G3bxhYTeodoS76TiEJd6eN4MUZeoIUCL +hr0N8F5OSza7OyAfikJW4Qsav3vQIkMsRIz75Sq0bBwcupTgE34h5prCy8VCZLQe +lHsIJchxzIdFV4XTnyliIoNRlwAYl3dqmJLJfGBs32x9SuRwTMKeuB330DTHD8z7 +p/8Dvq1wkNoL3chtl1+afwkyQf3NosxabUzyqkn+Zvjp2DXrDige7kgvOtB5CTh8 +piKCk5XQA76+AqAF3SAi428diDRgxuYKuQl1C/AH6GmWNcf7I4GOODm4RStDeKLR +LBT/DShycpWbXgnbiUSYqqFJu3FS8r/2/yehNq+4tneI3TqkbZs0kNwUXTC/t+sX +5Ie3cdCh13cV1ELX8vMxmV2b3RZtP+oGI/hGoiLtk/bdmuYqh7GYVPEi92tF4+KO +dh2ajcQGjTa3FPOdVGm3jjzVpG2Tgbet9r1ke8LJaDmgkpzNNIaRkPpkUZ3+/uul +9XXeifdy +-----END CERTIFICATE----- + +# Issuer: CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS O=FNMT-RCM OU=Ceres +# Subject: CN=AC RAIZ FNMT-RCM SERVIDORES SEGUROS O=FNMT-RCM OU=Ceres +# Label: "AC RAIZ FNMT-RCM SERVIDORES SEGUROS" +# Serial: 131542671362353147877283741781055151509 +# MD5 Fingerprint: 19:36:9c:52:03:2f:d2:d1:bb:23:cc:dd:1e:12:55:bb +# SHA1 Fingerprint: 62:ff:d9:9e:c0:65:0d:03:ce:75:93:d2:ed:3f:2d:32:c9:e3:e5:4a +# SHA256 Fingerprint: 55:41:53:b1:3d:2c:f9:dd:b7:53:bf:be:1a:4e:0a:e0:8d:0a:a4:18:70:58:fe:60:a2:b8:62:b2:e4:b8:7b:cb +-----BEGIN CERTIFICATE----- +MIICbjCCAfOgAwIBAgIQYvYybOXE42hcG2LdnC6dlTAKBggqhkjOPQQDAzB4MQsw +CQYDVQQGEwJFUzERMA8GA1UECgwIRk5NVC1SQ00xDjAMBgNVBAsMBUNlcmVzMRgw +FgYDVQRhDA9WQVRFUy1RMjgyNjAwNEoxLDAqBgNVBAMMI0FDIFJBSVogRk5NVC1S +Q00gU0VSVklET1JFUyBTRUdVUk9TMB4XDTE4MTIyMDA5MzczM1oXDTQzMTIyMDA5 +MzczM1oweDELMAkGA1UEBhMCRVMxETAPBgNVBAoMCEZOTVQtUkNNMQ4wDAYDVQQL +DAVDZXJlczEYMBYGA1UEYQwPVkFURVMtUTI4MjYwMDRKMSwwKgYDVQQDDCNBQyBS +QUlaIEZOTVQtUkNNIFNFUlZJRE9SRVMgU0VHVVJPUzB2MBAGByqGSM49AgEGBSuB +BAAiA2IABPa6V1PIyqvfNkpSIeSX0oNnnvBlUdBeh8dHsVnyV0ebAAKTRBdp20LH +sbI6GA60XYyzZl2hNPk2LEnb80b8s0RpRBNm/dfF/a82Tc4DTQdxz69qBdKiQ1oK +Um8BA06Oi6NCMEAwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwHQYD +VR0OBBYEFAG5L++/EYZg8k/QQW6rcx/n0m5JMAoGCCqGSM49BAMDA2kAMGYCMQCu +SuMrQMN0EfKVrRYj3k4MGuZdpSRea0R7/DjiT8ucRRcRTBQnJlU5dUoDzBOQn5IC +MQD6SmxgiHPz7riYYqnOK8LZiqZwMR2vsJRM60/G49HzYqc8/5MuB1xJAWdpEgJy +v+c= +-----END CERTIFICATE----- + +# Issuer: CN=GlobalSign Root R46 O=GlobalSign nv-sa +# Subject: CN=GlobalSign Root R46 O=GlobalSign nv-sa +# Label: "GlobalSign Root R46" +# Serial: 1552617688466950547958867513931858518042577 +# MD5 Fingerprint: c4:14:30:e4:fa:66:43:94:2a:6a:1b:24:5f:19:d0:ef +# SHA1 Fingerprint: 53:a2:b0:4b:ca:6b:d6:45:e6:39:8a:8e:c4:0d:d2:bf:77:c3:a2:90 +# SHA256 Fingerprint: 4f:a3:12:6d:8d:3a:11:d1:c4:85:5a:4f:80:7c:ba:d6:cf:91:9d:3a:5a:88:b0:3b:ea:2c:63:72:d9:3c:40:c9 +-----BEGIN CERTIFICATE----- +MIIFWjCCA0KgAwIBAgISEdK7udcjGJ5AXwqdLdDfJWfRMA0GCSqGSIb3DQEBDAUA +MEYxCzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYD +VQQDExNHbG9iYWxTaWduIFJvb3QgUjQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMy +MDAwMDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYt +c2ExHDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCsrHQy6LNl5brtQyYdpokNRbopiLKkHWPd08EsCVeJ +OaFV6Wc0dwxu5FUdUiXSE2te4R2pt32JMl8Nnp8semNgQB+msLZ4j5lUlghYruQG +vGIFAha/r6gjA7aUD7xubMLL1aa7DOn2wQL7Id5m3RerdELv8HQvJfTqa1VbkNud +316HCkD7rRlr+/fKYIje2sGP1q7Vf9Q8g+7XFkyDRTNrJ9CG0Bwta/OrffGFqfUo +0q3v84RLHIf8E6M6cqJaESvWJ3En7YEtbWaBkoe0G1h6zD8K+kZPTXhc+CtI4wSE +y132tGqzZfxCnlEmIyDLPRT5ge1lFgBPGmSXZgjPjHvjK8Cd+RTyG/FWaha/LIWF +zXg4mutCagI0GIMXTpRW+LaCtfOW3T3zvn8gdz57GSNrLNRyc0NXfeD412lPFzYE ++cCQYDdF3uYM2HSNrpyibXRdQr4G9dlkbgIQrImwTDsHTUB+JMWKmIJ5jqSngiCN +I/onccnfxkF0oE32kRbcRoxfKWMxWXEM2G/CtjJ9++ZdU6Z+Ffy7dXxd7Pj2Fxzs +x2sZy/N78CsHpdlseVR2bJ0cpm4O6XkMqCNqo98bMDGfsVR7/mrLZqrcZdCinkqa +ByFrgY/bxFn63iLABJzjqls2k+g9vXqhnQt2sQvHnf3PmKgGwvgqo6GDoLclcqUC +4wIDAQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQUA1yrc4GHqMywptWU4jaWSf8FmSwwDQYJKoZIhvcNAQEMBQADggIBAHx4 +7PYCLLtbfpIrXTncvtgdokIzTfnvpCo7RGkerNlFo048p9gkUbJUHJNOxO97k4Vg +JuoJSOD1u8fpaNK7ajFxzHmuEajwmf3lH7wvqMxX63bEIaZHU1VNaL8FpO7XJqti +2kM3S+LGteWygxk6x9PbTZ4IevPuzz5i+6zoYMzRx6Fcg0XERczzF2sUyQQCPtIk +pnnpHs6i58FZFZ8d4kuaPp92CC1r2LpXFNqD6v6MVenQTqnMdzGxRBF6XLE+0xRF +FRhiJBPSy03OXIPBNvIQtQ6IbbjhVp+J3pZmOUdkLG5NrmJ7v2B0GbhWrJKsFjLt +rWhV/pi60zTe9Mlhww6G9kuEYO4Ne7UyWHmRVSyBQ7N0H3qqJZ4d16GLuc1CLgSk +ZoNNiTW2bKg2SnkheCLQQrzRQDGQob4Ez8pn7fXwgNNgyYMqIgXQBztSvwyeqiv5 +u+YfjyW6hY0XHgL+XVAEV8/+LbzvXMAaq7afJMbfc2hIkCwU9D9SGuTSyxTDYWnP +4vkYxboznxSjBF25cfe1lNj2M8FawTSLfJvdkzrnE6JwYZ+vj+vYxXX4M2bUdGc6 +N3ec592kD3ZDZopD8p/7DEJ4Y9HiD2971KE9dJeFt0g5QdYg/NA6s/rob8SKunE3 +vouXsXgxT7PntgMTzlSdriVZzH81Xwj3QEUxeCp6 +-----END CERTIFICATE----- + +# Issuer: CN=GlobalSign Root E46 O=GlobalSign nv-sa +# Subject: CN=GlobalSign Root E46 O=GlobalSign nv-sa +# Label: "GlobalSign Root E46" +# Serial: 1552617690338932563915843282459653771421763 +# MD5 Fingerprint: b5:b8:66:ed:de:08:83:e3:c9:e2:01:34:06:ac:51:6f +# SHA1 Fingerprint: 39:b4:6c:d5:fe:80:06:eb:e2:2f:4a:bb:08:33:a0:af:db:b9:dd:84 +# SHA256 Fingerprint: cb:b9:c4:4d:84:b8:04:3e:10:50:ea:31:a6:9f:51:49:55:d7:bf:d2:e2:c6:b4:93:01:01:9a:d6:1d:9f:50:58 +-----BEGIN CERTIFICATE----- +MIICCzCCAZGgAwIBAgISEdK7ujNu1LzmJGjFDYQdmOhDMAoGCCqGSM49BAMDMEYx +CzAJBgNVBAYTAkJFMRkwFwYDVQQKExBHbG9iYWxTaWduIG52LXNhMRwwGgYDVQQD +ExNHbG9iYWxTaWduIFJvb3QgRTQ2MB4XDTE5MDMyMDAwMDAwMFoXDTQ2MDMyMDAw +MDAwMFowRjELMAkGA1UEBhMCQkUxGTAXBgNVBAoTEEdsb2JhbFNpZ24gbnYtc2Ex +HDAaBgNVBAMTE0dsb2JhbFNpZ24gUm9vdCBFNDYwdjAQBgcqhkjOPQIBBgUrgQQA +IgNiAAScDrHPt+ieUnd1NPqlRqetMhkytAepJ8qUuwzSChDH2omwlwxwEwkBjtjq +R+q+soArzfwoDdusvKSGN+1wCAB16pMLey5SnCNoIwZD7JIvU4Tb+0cUB+hflGdd +yXqBPCCjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1Ud +DgQWBBQxCpCPtsad0kRLgLWi5h+xEk8blTAKBggqhkjOPQQDAwNoADBlAjEA31SQ +7Zvvi5QCkxeCmb6zniz2C5GMn0oUsfZkvLtoURMMA/cVi4RguYv/Uo7njLwcAjA8 ++RHUjE7AwWHCFUyqqx0LMV87HOIAl0Qx5v5zli/altP+CAezNIm8BZ/3Hobui3A= +-----END CERTIFICATE----- + +# Issuer: CN=GLOBALTRUST 2020 O=e-commerce monitoring GmbH +# Subject: CN=GLOBALTRUST 2020 O=e-commerce monitoring GmbH +# Label: "GLOBALTRUST 2020" +# Serial: 109160994242082918454945253 +# MD5 Fingerprint: 8a:c7:6f:cb:6d:e3:cc:a2:f1:7c:83:fa:0e:78:d7:e8 +# SHA1 Fingerprint: d0:67:c1:13:51:01:0c:aa:d0:c7:6a:65:37:31:16:26:4f:53:71:a2 +# SHA256 Fingerprint: 9a:29:6a:51:82:d1:d4:51:a2:e3:7f:43:9b:74:da:af:a2:67:52:33:29:f9:0f:9a:0d:20:07:c3:34:e2:3c:9a +-----BEGIN CERTIFICATE----- +MIIFgjCCA2qgAwIBAgILWku9WvtPilv6ZeUwDQYJKoZIhvcNAQELBQAwTTELMAkG +A1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9uaXRvcmluZyBHbWJIMRkw +FwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMB4XDTIwMDIxMDAwMDAwMFoXDTQwMDYx +MDAwMDAwMFowTTELMAkGA1UEBhMCQVQxIzAhBgNVBAoTGmUtY29tbWVyY2UgbW9u +aXRvcmluZyBHbWJIMRkwFwYDVQQDExBHTE9CQUxUUlVTVCAyMDIwMIICIjANBgkq +hkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAri5WrRsc7/aVj6B3GyvTY4+ETUWiD59b +RatZe1E0+eyLinjF3WuvvcTfk0Uev5E4C64OFudBc/jbu9G4UeDLgztzOG53ig9Z +YybNpyrOVPu44sB8R85gfD+yc/LAGbaKkoc1DZAoouQVBGM+uq/ufF7MpotQsjj3 +QWPKzv9pj2gOlTblzLmMCcpL3TGQlsjMH/1WljTbjhzqLL6FLmPdqqmV0/0plRPw +yJiT2S0WR5ARg6I6IqIoV6Lr/sCMKKCmfecqQjuCgGOlYx8ZzHyyZqjC0203b+J+ +BlHZRYQfEs4kUmSFC0iAToexIiIwquuuvuAC4EDosEKAA1GqtH6qRNdDYfOiaxaJ +SaSjpCuKAsR49GiKweR6NrFvG5Ybd0mN1MkGco/PU+PcF4UgStyYJ9ORJitHHmkH +r96i5OTUawuzXnzUJIBHKWk7buis/UDr2O1xcSvy6Fgd60GXIsUf1DnQJ4+H4xj0 +4KlGDfV0OoIu0G4skaMxXDtG6nsEEFZegB31pWXogvziB4xiRfUg3kZwhqG8k9Me +dKZssCz3AwyIDMvUclOGvGBG85hqwvG/Q/lwIHfKN0F5VVJjjVsSn8VoxIidrPIw +q7ejMZdnrY8XD2zHc+0klGvIg5rQmjdJBKuxFshsSUktq6HQjJLyQUp5ISXbY9e2 +nKd+Qmn7OmMCAwEAAaNjMGEwDwYDVR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMC +AQYwHQYDVR0OBBYEFNwuH9FhN3nkq9XVsxJxaD1qaJwiMB8GA1UdIwQYMBaAFNwu +H9FhN3nkq9XVsxJxaD1qaJwiMA0GCSqGSIb3DQEBCwUAA4ICAQCR8EICaEDuw2jA +VC/f7GLDw56KoDEoqoOOpFaWEhCGVrqXctJUMHytGdUdaG/7FELYjQ7ztdGl4wJC +XtzoRlgHNQIw4Lx0SsFDKv/bGtCwr2zD/cuz9X9tAy5ZVp0tLTWMstZDFyySCstd +6IwPS3BD0IL/qMy/pJTAvoe9iuOTe8aPmxadJ2W8esVCgmxcB9CpwYhgROmYhRZf ++I/KARDOJcP5YBugxZfD0yyIMaK9MOzQ0MAS8cE54+X1+NZK3TTN+2/BT+MAi1bi +kvcoskJ3ciNnxz8RFbLEAwW+uxF7Cr+obuf/WEPPm2eggAe2HcqtbepBEX4tdJP7 +wry+UUTF72glJ4DjyKDUEuzZpTcdN3y0kcra1LGWge9oXHYQSa9+pTeAsRxSvTOB +TI/53WXZFM2KJVj04sWDpQmQ1GwUY7VA3+vA/MRYfg0UFodUJ25W5HCEuGwyEn6C +MUO+1918oa2u1qsgEu8KwxCMSZY13At1XrFP1U80DhEgB3VDRemjEdqso5nCtnkn +4rnvyOL2NSl6dPrFf4IFYqYK6miyeUcGbvJXqBUzxvd4Sj1Ce2t+/vdG6tHrju+I +aFvowdlxfv1k7/9nR4hYJS8+hge9+6jlgqispdNpQ80xiEmEU5LAsTkbOYMBMMTy +qfrQA71yN2BWHzZ8vTmR9W0Nv3vXkg== +-----END CERTIFICATE----- + +# Issuer: CN=ANF Secure Server Root CA O=ANF Autoridad de Certificacion OU=ANF CA Raiz +# Subject: CN=ANF Secure Server Root CA O=ANF Autoridad de Certificacion OU=ANF CA Raiz +# Label: "ANF Secure Server Root CA" +# Serial: 996390341000653745 +# MD5 Fingerprint: 26:a6:44:5a:d9:af:4e:2f:b2:1d:b6:65:b0:4e:e8:96 +# SHA1 Fingerprint: 5b:6e:68:d0:cc:15:b6:a0:5f:1e:c1:5f:ae:02:fc:6b:2f:5d:6f:74 +# SHA256 Fingerprint: fb:8f:ec:75:91:69:b9:10:6b:1e:51:16:44:c6:18:c5:13:04:37:3f:6c:06:43:08:8d:8b:ef:fd:1b:99:75:99 +-----BEGIN CERTIFICATE----- +MIIF7zCCA9egAwIBAgIIDdPjvGz5a7EwDQYJKoZIhvcNAQELBQAwgYQxEjAQBgNV +BAUTCUc2MzI4NzUxMDELMAkGA1UEBhMCRVMxJzAlBgNVBAoTHkFORiBBdXRvcmlk +YWQgZGUgQ2VydGlmaWNhY2lvbjEUMBIGA1UECxMLQU5GIENBIFJhaXoxIjAgBgNV +BAMTGUFORiBTZWN1cmUgU2VydmVyIFJvb3QgQ0EwHhcNMTkwOTA0MTAwMDM4WhcN +MzkwODMwMTAwMDM4WjCBhDESMBAGA1UEBRMJRzYzMjg3NTEwMQswCQYDVQQGEwJF +UzEnMCUGA1UEChMeQU5GIEF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uMRQwEgYD +VQQLEwtBTkYgQ0EgUmFpejEiMCAGA1UEAxMZQU5GIFNlY3VyZSBTZXJ2ZXIgUm9v +dCBDQTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANvrayvmZFSVgpCj +cqQZAZ2cC4Ffc0m6p6zzBE57lgvsEeBbphzOG9INgxwruJ4dfkUyYA8H6XdYfp9q +yGFOtibBTI3/TO80sh9l2Ll49a2pcbnvT1gdpd50IJeh7WhM3pIXS7yr/2WanvtH +2Vdy8wmhrnZEE26cLUQ5vPnHO6RYPUG9tMJJo8gN0pcvB2VSAKduyK9o7PQUlrZX +H1bDOZ8rbeTzPvY1ZNoMHKGESy9LS+IsJJ1tk0DrtSOOMspvRdOoiXsezx76W0OL +zc2oD2rKDF65nkeP8Nm2CgtYZRczuSPkdxl9y0oukntPLxB3sY0vaJxizOBQ+OyR +p1RMVwnVdmPF6GUe7m1qzwmd+nxPrWAI/VaZDxUse6mAq4xhj0oHdkLePfTdsiQz +W7i1o0TJrH93PB0j7IKppuLIBkwC/qxcmZkLLxCKpvR/1Yd0DVlJRfbwcVw5Kda/ +SiOL9V8BY9KHcyi1Swr1+KuCLH5zJTIdC2MKF4EA/7Z2Xue0sUDKIbvVgFHlSFJn +LNJhiQcND85Cd8BEc5xEUKDbEAotlRyBr+Qc5RQe8TZBAQIvfXOn3kLMTOmJDVb3 +n5HUA8ZsyY/b2BzgQJhdZpmYgG4t/wHFzstGH6wCxkPmrqKEPMVOHj1tyRRM4y5B +u8o5vzY8KhmqQYdOpc5LMnndkEl/AgMBAAGjYzBhMB8GA1UdIwQYMBaAFJxf0Gxj +o1+TypOYCK2Mh6UsXME3MB0GA1UdDgQWBBScX9BsY6Nfk8qTmAitjIelLFzBNzAO +BgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC +AgEATh65isagmD9uw2nAalxJUqzLK114OMHVVISfk/CHGT0sZonrDUL8zPB1hT+L +9IBdeeUXZ701guLyPI59WzbLWoAAKfLOKyzxj6ptBZNscsdW699QIyjlRRA96Gej +rw5VD5AJYu9LWaL2U/HANeQvwSS9eS9OICI7/RogsKQOLHDtdD+4E5UGUcjohybK +pFtqFiGS3XNgnhAY3jyB6ugYw3yJ8otQPr0R4hUDqDZ9MwFsSBXXiJCZBMXM5gf0 +vPSQ7RPi6ovDj6MzD8EpTBNO2hVWcXNyglD2mjN8orGoGjR0ZVzO0eurU+AagNjq +OknkJjCb5RyKqKkVMoaZkgoQI1YS4PbOTOK7vtuNknMBZi9iPrJyJ0U27U1W45eZ +/zo1PqVUSlJZS2Db7v54EX9K3BR5YLZrZAPbFYPhor72I5dQ8AkzNqdxliXzuUJ9 +2zg/LFis6ELhDtjTO0wugumDLmsx2d1Hhk9tl5EuT+IocTUW0fJz/iUrB0ckYyfI ++PbZa/wSMVYIwFNCr5zQM378BvAxRAMU8Vjq8moNqRGyg77FGr8H6lnco4g175x2 +MjxNBiLOFeXdntiP2t7SxDnlF4HPOEfrf4htWRvfn0IUrn7PqLBmZdo3r5+qPeoo +tt7VMVgWglvquxl1AnMaykgaIZOQCo6ThKd9OyMYkomgjaw= +-----END CERTIFICATE----- + +# Issuer: CN=Certum EC-384 CA O=Asseco Data Systems S.A. OU=Certum Certification Authority +# Subject: CN=Certum EC-384 CA O=Asseco Data Systems S.A. OU=Certum Certification Authority +# Label: "Certum EC-384 CA" +# Serial: 160250656287871593594747141429395092468 +# MD5 Fingerprint: b6:65:b3:96:60:97:12:a1:ec:4e:e1:3d:a3:c6:c9:f1 +# SHA1 Fingerprint: f3:3e:78:3c:ac:df:f4:a2:cc:ac:67:55:69:56:d7:e5:16:3c:e1:ed +# SHA256 Fingerprint: 6b:32:80:85:62:53:18:aa:50:d1:73:c9:8d:8b:da:09:d5:7e:27:41:3d:11:4c:f7:87:a0:f5:d0:6c:03:0c:f6 +-----BEGIN CERTIFICATE----- +MIICZTCCAeugAwIBAgIQeI8nXIESUiClBNAt3bpz9DAKBggqhkjOPQQDAzB0MQsw +CQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEuMScw +JQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAXBgNVBAMT +EENlcnR1bSBFQy0zODQgQ0EwHhcNMTgwMzI2MDcyNDU0WhcNNDMwMzI2MDcyNDU0 +WjB0MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBT +LkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxGTAX +BgNVBAMTEENlcnR1bSBFQy0zODQgQ0EwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATE +KI6rGFtqvm5kN2PkzeyrOvfMobgOgknXhimfoZTy42B4mIF4Bk3y7JoOV2CDn7Tm +Fy8as10CW4kjPMIRBSqniBMY81CE1700LCeJVf/OTOffph8oxPBUw7l8t1Ot68Kj +QjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFI0GZnQkdjrzife81r1HfS+8 +EF9LMA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNoADBlAjADVS2m5hjEfO/J +UG7BJw+ch69u1RsIGL2SKcHvlJF40jocVYli5RsJHrpka/F2tNQCMQC0QoSZ/6vn +nvuRlydd3LBbMHHOXjgaatkl5+r3YZJW+OraNsKHZZYuciUvf9/DE8k= +-----END CERTIFICATE----- + +# Issuer: CN=Certum Trusted Root CA O=Asseco Data Systems S.A. OU=Certum Certification Authority +# Subject: CN=Certum Trusted Root CA O=Asseco Data Systems S.A. OU=Certum Certification Authority +# Label: "Certum Trusted Root CA" +# Serial: 40870380103424195783807378461123655149 +# MD5 Fingerprint: 51:e1:c2:e7:fe:4c:84:af:59:0e:2f:f4:54:6f:ea:29 +# SHA1 Fingerprint: c8:83:44:c0:18:ae:9f:cc:f1:87:b7:8f:22:d1:c5:d7:45:84:ba:e5 +# SHA256 Fingerprint: fe:76:96:57:38:55:77:3e:37:a9:5e:7a:d4:d9:cc:96:c3:01:57:c1:5d:31:76:5b:a9:b1:57:04:e1:ae:78:fd +-----BEGIN CERTIFICATE----- +MIIFwDCCA6igAwIBAgIQHr9ZULjJgDdMBvfrVU+17TANBgkqhkiG9w0BAQ0FADB6 +MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEgU3lzdGVtcyBTLkEu +MScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkxHzAdBgNV +BAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwHhcNMTgwMzE2MTIxMDEzWhcNNDMw +MzE2MTIxMDEzWjB6MQswCQYDVQQGEwJQTDEhMB8GA1UEChMYQXNzZWNvIERhdGEg +U3lzdGVtcyBTLkEuMScwJQYDVQQLEx5DZXJ0dW0gQ2VydGlmaWNhdGlvbiBBdXRo +b3JpdHkxHzAdBgNVBAMTFkNlcnR1bSBUcnVzdGVkIFJvb3QgQ0EwggIiMA0GCSqG +SIb3DQEBAQUAA4ICDwAwggIKAoICAQDRLY67tzbqbTeRn06TpwXkKQMlzhyC93yZ +n0EGze2jusDbCSzBfN8pfktlL5On1AFrAygYo9idBcEq2EXxkd7fO9CAAozPOA/q +p1x4EaTByIVcJdPTsuclzxFUl6s1wB52HO8AU5853BSlLCIls3Jy/I2z5T4IHhQq +NwuIPMqw9MjCoa68wb4pZ1Xi/K1ZXP69VyywkI3C7Te2fJmItdUDmj0VDT06qKhF +8JVOJVkdzZhpu9PMMsmN74H+rX2Ju7pgE8pllWeg8xn2A1bUatMn4qGtg/BKEiJ3 +HAVz4hlxQsDsdUaakFjgao4rpUYwBI4Zshfjvqm6f1bxJAPXsiEodg42MEx51UGa +mqi4NboMOvJEGyCI98Ul1z3G4z5D3Yf+xOr1Uz5MZf87Sst4WmsXXw3Hw09Omiqi +7VdNIuJGmj8PkTQkfVXjjJU30xrwCSss0smNtA0Aq2cpKNgB9RkEth2+dv5yXMSF +ytKAQd8FqKPVhJBPC/PgP5sZ0jeJP/J7UhyM9uH3PAeXjA6iWYEMspA90+NZRu0P +qafegGtaqge2Gcu8V/OXIXoMsSt0Puvap2ctTMSYnjYJdmZm/Bo/6khUHL4wvYBQ +v3y1zgD2DGHZ5yQD4OMBgQ692IU0iL2yNqh7XAjlRICMb/gv1SHKHRzQ+8S1h9E6 +Tsd2tTVItQIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBSM+xx1 +vALTn04uSNn5YFSqxLNP+jAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQENBQAD +ggIBAEii1QALLtA/vBzVtVRJHlpr9OTy4EA34MwUe7nJ+jW1dReTagVphZzNTxl4 +WxmB82M+w85bj/UvXgF2Ez8sALnNllI5SW0ETsXpD4YN4fqzX4IS8TrOZgYkNCvo +zMrnadyHncI013nR03e4qllY/p0m+jiGPp2Kh2RX5Rc64vmNueMzeMGQ2Ljdt4NR +5MTMI9UGfOZR0800McD2RrsLrfw9EAUqO0qRJe6M1ISHgCq8CYyqOhNf6DR5UMEQ +GfnTKB7U0VEwKbOukGfWHwpjscWpxkIxYxeU72nLL/qMFH3EQxiJ2fAyQOaA4kZf +5ePBAFmo+eggvIksDkc0C+pXwlM2/KfUrzHN/gLldfq5Jwn58/U7yn2fqSLLiMmq +0Uc9NneoWWRrJ8/vJ8HjJLWG965+Mk2weWjROeiQWMODvA8s1pfrzgzhIMfatz7D +P78v3DSk+yshzWePS/Tj6tQ/50+6uaWTRRxmHyH6ZF5v4HaUMst19W7l9o/HuKTM +qJZ9ZPskWkoDbGs4xugDQ5r3V7mzKWmTOPQD8rv7gmsHINFSH5pkAnuYZttcTVoP +0ISVoDwUQwbKytu4QTbaakRnh6+v40URFWkIsr4WOZckbxJF0WddCajJFdr60qZf +E2Efv4WstK2tBZQIgx51F9NxO5NQI1mg7TyRVJ12AMXDuDjb +-----END CERTIFICATE----- + +# Issuer: CN=TunTrust Root CA O=Agence Nationale de Certification Electronique +# Subject: CN=TunTrust Root CA O=Agence Nationale de Certification Electronique +# Label: "TunTrust Root CA" +# Serial: 108534058042236574382096126452369648152337120275 +# MD5 Fingerprint: 85:13:b9:90:5b:36:5c:b6:5e:b8:5a:f8:e0:31:57:b4 +# SHA1 Fingerprint: cf:e9:70:84:0f:e0:73:0f:9d:f6:0c:7f:2c:4b:ee:20:46:34:9c:bb +# SHA256 Fingerprint: 2e:44:10:2a:b5:8c:b8:54:19:45:1c:8e:19:d9:ac:f3:66:2c:af:bc:61:4b:6a:53:96:0a:30:f7:d0:e2:eb:41 +-----BEGIN CERTIFICATE----- +MIIFszCCA5ugAwIBAgIUEwLV4kBMkkaGFmddtLu7sms+/BMwDQYJKoZIhvcNAQEL +BQAwYTELMAkGA1UEBhMCVE4xNzA1BgNVBAoMLkFnZW5jZSBOYXRpb25hbGUgZGUg +Q2VydGlmaWNhdGlvbiBFbGVjdHJvbmlxdWUxGTAXBgNVBAMMEFR1blRydXN0IFJv +b3QgQ0EwHhcNMTkwNDI2MDg1NzU2WhcNNDQwNDI2MDg1NzU2WjBhMQswCQYDVQQG +EwJUTjE3MDUGA1UECgwuQWdlbmNlIE5hdGlvbmFsZSBkZSBDZXJ0aWZpY2F0aW9u +IEVsZWN0cm9uaXF1ZTEZMBcGA1UEAwwQVHVuVHJ1c3QgUm9vdCBDQTCCAiIwDQYJ +KoZIhvcNAQEBBQADggIPADCCAgoCggIBAMPN0/y9BFPdDCA61YguBUtB9YOCfvdZ +n56eY+hz2vYGqU8ftPkLHzmMmiDQfgbU7DTZhrx1W4eI8NLZ1KMKsmwb60ksPqxd +2JQDoOw05TDENX37Jk0bbjBU2PWARZw5rZzJJQRNmpA+TkBuimvNKWfGzC3gdOgF +VwpIUPp6Q9p+7FuaDmJ2/uqdHYVy7BG7NegfJ7/Boce7SBbdVtfMTqDhuazb1YMZ +GoXRlJfXyqNlC/M4+QKu3fZnz8k/9YosRxqZbwUN/dAdgjH8KcwAWJeRTIAAHDOF +li/LQcKLEITDCSSJH7UP2dl3RxiSlGBcx5kDPP73lad9UKGAwqmDrViWVSHbhlnU +r8a83YFuB9tgYv7sEG7aaAH0gxupPqJbI9dkxt/con3YS7qC0lH4Zr8GRuR5KiY2 +eY8fTpkdso8MDhz/yV3A/ZAQprE38806JG60hZC/gLkMjNWb1sjxVj8agIl6qeIb +MlEsPvLfe/ZdeikZjuXIvTZxi11Mwh0/rViizz1wTaZQmCXcI/m4WEEIcb9PuISg +jwBUFfyRbVinljvrS5YnzWuioYasDXxU5mZMZl+QviGaAkYt5IPCgLnPSz7ofzwB +7I9ezX/SKEIBlYrilz0QIX32nRzFNKHsLA4KUiwSVXAkPcvCFDVDXSdOvsC9qnyW +5/yeYa1E0wCXAgMBAAGjYzBhMB0GA1UdDgQWBBQGmpsfU33x9aTI04Y+oXNZtPdE +ITAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFAaamx9TffH1pMjThj6hc1m0 +90QhMA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAqgVutt0Vyb+z +xiD2BkewhpMl0425yAA/l/VSJ4hxyXT968pk21vvHl26v9Hr7lxpuhbI87mP0zYu +QEkHDVneixCwSQXi/5E/S7fdAo74gShczNxtr18UnH1YeA32gAm56Q6XKRm4t+v4 +FstVEuTGfbvE7Pi1HE4+Z7/FXxttbUcoqgRYYdZ2vyJ/0Adqp2RT8JeNnYA/u8EH +22Wv5psymsNUk8QcCMNE+3tjEUPRahphanltkE8pjkcFwRJpadbGNjHh/PqAulxP +xOu3Mqz4dWEX1xAZufHSCe96Qp1bWgvUxpVOKs7/B9dPfhgGiPEZtdmYu65xxBzn +dFlY7wyJz4sfdZMaBBSSSFCp61cpABbjNhzI+L/wM9VBD8TMPN3pM0MBkRArHtG5 +Xc0yGYuPjCB31yLEQtyEFpslbei0VXF/sHyz03FJuc9SpAQ/3D2gu68zngowYI7b +nV2UqL1g52KAdoGDDIzMMEZJ4gzSqK/rYXHv5yJiqfdcZGyfFoxnNidF9Ql7v/YQ +CvGwjVRDjAS6oz/v4jXH+XTgbzRB0L9zZVcg+ZtnemZoJE6AZb0QmQZZ8mWvuMZH +u/2QeItBcy6vVR/cO5JyboTT0GFMDcx2V+IthSIVNg3rAZ3r2OvEhJn7wAzMMujj +d9qDRIueVSjAi1jTkD5OGwDxFa2DK5o= +-----END CERTIFICATE----- + +# Issuer: CN=HARICA TLS RSA Root CA 2021 O=Hellenic Academic and Research Institutions CA +# Subject: CN=HARICA TLS RSA Root CA 2021 O=Hellenic Academic and Research Institutions CA +# Label: "HARICA TLS RSA Root CA 2021" +# Serial: 76817823531813593706434026085292783742 +# MD5 Fingerprint: 65:47:9b:58:86:dd:2c:f0:fc:a2:84:1f:1e:96:c4:91 +# SHA1 Fingerprint: 02:2d:05:82:fa:88:ce:14:0c:06:79:de:7f:14:10:e9:45:d7:a5:6d +# SHA256 Fingerprint: d9:5d:0e:8e:da:79:52:5b:f9:be:b1:1b:14:d2:10:0d:32:94:98:5f:0c:62:d9:fa:bd:9c:d9:99:ec:cb:7b:1d +-----BEGIN CERTIFICATE----- +MIIFpDCCA4ygAwIBAgIQOcqTHO9D88aOk8f0ZIk4fjANBgkqhkiG9w0BAQsFADBs +MQswCQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJl +c2VhcmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBSU0Eg +Um9vdCBDQSAyMDIxMB4XDTIxMDIxOTEwNTUzOFoXDTQ1MDIxMzEwNTUzN1owbDEL +MAkGA1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNl +YXJjaCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgUlNBIFJv +b3QgQ0EgMjAyMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIvC569l +mwVnlskNJLnQDmT8zuIkGCyEf3dRywQRNrhe7Wlxp57kJQmXZ8FHws+RFjZiPTgE +4VGC/6zStGndLuwRo0Xua2s7TL+MjaQenRG56Tj5eg4MmOIjHdFOY9TnuEFE+2uv +a9of08WRiFukiZLRgeaMOVig1mlDqa2YUlhu2wr7a89o+uOkXjpFc5gH6l8Cct4M +pbOfrqkdtx2z/IpZ525yZa31MJQjB/OCFks1mJxTuy/K5FrZx40d/JiZ+yykgmvw +Kh+OC19xXFyuQnspiYHLA6OZyoieC0AJQTPb5lh6/a6ZcMBaD9YThnEvdmn8kN3b +LW7R8pv1GmuebxWMevBLKKAiOIAkbDakO/IwkfN4E8/BPzWr8R0RI7VDIp4BkrcY +AuUR0YLbFQDMYTfBKnya4dC6s1BG7oKsnTH4+yPiAwBIcKMJJnkVU2DzOFytOOqB +AGMUuTNe3QvboEUHGjMJ+E20pwKmafTCWQWIZYVWrkvL4N48fS0ayOn7H6NhStYq +E613TBoYm5EPWNgGVMWX+Ko/IIqmhaZ39qb8HOLubpQzKoNQhArlT4b4UEV4AIHr +W2jjJo3Me1xR9BQsQL4aYB16cmEdH2MtiKrOokWQCPxrvrNQKlr9qEgYRtaQQJKQ +CoReaDH46+0N0x3GfZkYVVYnZS6NRcUk7M7jAgMBAAGjQjBAMA8GA1UdEwEB/wQF +MAMBAf8wHQYDVR0OBBYEFApII6ZgpJIKM+qTW8VX6iVNvRLuMA4GA1UdDwEB/wQE +AwIBhjANBgkqhkiG9w0BAQsFAAOCAgEAPpBIqm5iFSVmewzVjIuJndftTgfvnNAU +X15QvWiWkKQUEapobQk1OUAJ2vQJLDSle1mESSmXdMgHHkdt8s4cUCbjnj1AUz/3 +f5Z2EMVGpdAgS1D0NTsY9FVqQRtHBmg8uwkIYtlfVUKqrFOFrJVWNlar5AWMxaja +H6NpvVMPxP/cyuN+8kyIhkdGGvMA9YCRotxDQpSbIPDRzbLrLFPCU3hKTwSUQZqP +JzLB5UkZv/HywouoCjkxKLR9YjYsTewfM7Z+d21+UPCfDtcRj88YxeMn/ibvBZ3P +zzfF0HvaO7AWhAw6k9a+F9sPPg4ZeAnHqQJyIkv3N3a6dcSFA1pj1bF1BcK5vZSt +jBWZp5N99sXzqnTPBIWUmAD04vnKJGW/4GKvyMX6ssmeVkjaef2WdhW+o45WxLM0 +/L5H9MG0qPzVMIho7suuyWPEdr6sOBjhXlzPrjoiUevRi7PzKzMHVIf6tLITe7pT +BGIBnfHAT+7hOtSLIBD6Alfm78ELt5BGnBkpjNxvoEppaZS3JGWg/6w/zgH7IS79 +aPib8qXPMThcFarmlwDB31qlpzmq6YR/PFGoOtmUW4y/Twhx5duoXNTSpv4Ao8YW +xw/ogM4cKGR0GQjTQuPOAF1/sdwTsOEFy9EgqoZ0njnnkf3/W9b3raYvAwtt41dU +63ZTGI0RmLo= +-----END CERTIFICATE----- + +# Issuer: CN=HARICA TLS ECC Root CA 2021 O=Hellenic Academic and Research Institutions CA +# Subject: CN=HARICA TLS ECC Root CA 2021 O=Hellenic Academic and Research Institutions CA +# Label: "HARICA TLS ECC Root CA 2021" +# Serial: 137515985548005187474074462014555733966 +# MD5 Fingerprint: ae:f7:4c:e5:66:35:d1:b7:9b:8c:22:93:74:d3:4b:b0 +# SHA1 Fingerprint: bc:b0:c1:9d:e9:98:92:70:19:38:57:e9:8d:a7:b4:5d:6e:ee:01:48 +# SHA256 Fingerprint: 3f:99:cc:47:4a:cf:ce:4d:fe:d5:87:94:66:5e:47:8d:15:47:73:9f:2e:78:0f:1b:b4:ca:9b:13:30:97:d4:01 +-----BEGIN CERTIFICATE----- +MIICVDCCAdugAwIBAgIQZ3SdjXfYO2rbIvT/WeK/zjAKBggqhkjOPQQDAzBsMQsw +CQYDVQQGEwJHUjE3MDUGA1UECgwuSGVsbGVuaWMgQWNhZGVtaWMgYW5kIFJlc2Vh +cmNoIEluc3RpdHV0aW9ucyBDQTEkMCIGA1UEAwwbSEFSSUNBIFRMUyBFQ0MgUm9v +dCBDQSAyMDIxMB4XDTIxMDIxOTExMDExMFoXDTQ1MDIxMzExMDEwOVowbDELMAkG +A1UEBhMCR1IxNzA1BgNVBAoMLkhlbGxlbmljIEFjYWRlbWljIGFuZCBSZXNlYXJj +aCBJbnN0aXR1dGlvbnMgQ0ExJDAiBgNVBAMMG0hBUklDQSBUTFMgRUNDIFJvb3Qg +Q0EgMjAyMTB2MBAGByqGSM49AgEGBSuBBAAiA2IABDgI/rGgltJ6rK9JOtDA4MM7 +KKrxcm1lAEeIhPyaJmuqS7psBAqIXhfyVYf8MLA04jRYVxqEU+kw2anylnTDUR9Y +STHMmE5gEYd103KUkE+bECUqqHgtvpBBWJAVcqeht6NCMEAwDwYDVR0TAQH/BAUw +AwEB/zAdBgNVHQ4EFgQUyRtTgRL+BNUW0aq8mm+3oJUZbsowDgYDVR0PAQH/BAQD +AgGGMAoGCCqGSM49BAMDA2cAMGQCMBHervjcToiwqfAircJRQO9gcS3ujwLEXQNw +SaSS6sUUiHCm0w2wqsosQJz76YJumgIwK0eaB8bRwoF8yguWGEEbo/QwCZ61IygN +nxS2PFOiTAZpffpskcYqSUXm7LcT4Tps +-----END CERTIFICATE----- + +# Issuer: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 +# Subject: CN=Autoridad de Certificacion Firmaprofesional CIF A62634068 +# Label: "Autoridad de Certificacion Firmaprofesional CIF A62634068" +# Serial: 1977337328857672817 +# MD5 Fingerprint: 4e:6e:9b:54:4c:ca:b7:fa:48:e4:90:b1:15:4b:1c:a3 +# SHA1 Fingerprint: 0b:be:c2:27:22:49:cb:39:aa:db:35:5c:53:e3:8c:ae:78:ff:b6:fe +# SHA256 Fingerprint: 57:de:05:83:ef:d2:b2:6e:03:61:da:99:da:9d:f4:64:8d:ef:7e:e8:44:1c:3b:72:8a:fa:9b:cd:e0:f9:b2:6a +-----BEGIN CERTIFICATE----- +MIIGFDCCA/ygAwIBAgIIG3Dp0v+ubHEwDQYJKoZIhvcNAQELBQAwUTELMAkGA1UE +BhMCRVMxQjBABgNVBAMMOUF1dG9yaWRhZCBkZSBDZXJ0aWZpY2FjaW9uIEZpcm1h +cHJvZmVzaW9uYWwgQ0lGIEE2MjYzNDA2ODAeFw0xNDA5MjMxNTIyMDdaFw0zNjA1 +MDUxNTIyMDdaMFExCzAJBgNVBAYTAkVTMUIwQAYDVQQDDDlBdXRvcmlkYWQgZGUg +Q2VydGlmaWNhY2lvbiBGaXJtYXByb2Zlc2lvbmFsIENJRiBBNjI2MzQwNjgwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDKlmuO6vj78aI14H9M2uDDUtd9 +thDIAl6zQyrET2qyyhxdKJp4ERppWVevtSBC5IsP5t9bpgOSL/UR5GLXMnE42QQM +cas9UX4PB99jBVzpv5RvwSmCwLTaUbDBPLutN0pcyvFLNg4kq7/DhHf9qFD0sefG +L9ItWY16Ck6WaVICqjaY7Pz6FIMMNx/Jkjd/14Et5cS54D40/mf0PmbR0/RAz15i +NA9wBj4gGFrO93IbJWyTdBSTo3OxDqqHECNZXyAFGUftaI6SEspd/NYrspI8IM/h +X68gvqB2f3bl7BqGYTM+53u0P6APjqK5am+5hyZvQWyIplD9amML9ZMWGxmPsu2b +m8mQ9QEM3xk9Dz44I8kvjwzRAv4bVdZO0I08r0+k8/6vKtMFnXkIoctXMbScyJCy +Z/QYFpM6/EfY0XiWMR+6KwxfXZmtY4laJCB22N/9q06mIqqdXuYnin1oKaPnirja +EbsXLZmdEyRG98Xi2J+Of8ePdG1asuhy9azuJBCtLxTa/y2aRnFHvkLfuwHb9H/T +KI8xWVvTyQKmtFLKbpf7Q8UIJm+K9Lv9nyiqDdVF8xM6HdjAeI9BZzwelGSuewvF +6NkBiDkal4ZkQdU7hwxu+g/GvUgUvzlN1J5Bto+WHWOWk9mVBngxaJ43BjuAiUVh +OSPHG0SjFeUc+JIwuwIDAQABo4HvMIHsMB0GA1UdDgQWBBRlzeurNR4APn7VdMAc +tHNHDhpkLzASBgNVHRMBAf8ECDAGAQH/AgEBMIGmBgNVHSAEgZ4wgZswgZgGBFUd +IAAwgY8wLwYIKwYBBQUHAgEWI2h0dHA6Ly93d3cuZmlybWFwcm9mZXNpb25hbC5j +b20vY3BzMFwGCCsGAQUFBwICMFAeTgBQAGEAcwBlAG8AIABkAGUAIABsAGEAIABC +AG8AbgBhAG4AbwB2AGEAIAA0ADcAIABCAGEAcgBjAGUAbABvAG4AYQAgADAAOAAw +ADEANzAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggIBAHSHKAIrdx9m +iWTtj3QuRhy7qPj4Cx2Dtjqn6EWKB7fgPiDL4QjbEwj4KKE1soCzC1HA01aajTNF +Sa9J8OA9B3pFE1r/yJfY0xgsfZb43aJlQ3CTkBW6kN/oGbDbLIpgD7dvlAceHabJ +hfa9NPhAeGIQcDq+fUs5gakQ1JZBu/hfHAsdCPKxsIl68veg4MSPi3i1O1ilI45P +Vf42O+AMt8oqMEEgtIDNrvx2ZnOorm7hfNoD6JQg5iKj0B+QXSBTFCZX2lSX3xZE +EAEeiGaPcjiT3SC3NL7X8e5jjkd5KAb881lFJWAiMxujX6i6KtoaPc1A6ozuBRWV +1aUsIC+nmCjuRfzxuIgALI9C2lHVnOUTaHFFQ4ueCyE8S1wF3BqfmI7avSKecs2t +CsvMo2ebKHTEm9caPARYpoKdrcd7b/+Alun4jWq9GJAd/0kakFI3ky88Al2CdgtR +5xbHV/g4+afNmyJU72OwFW1TZQNKXkqgsqeOSQBZONXH9IBk9W6VULgRfhVwOEqw +f9DEMnDAGf/JOC0ULGb0QkTmVXYbgBVX/8Cnp6o5qtjTcNAuuuuUavpfNIbnYrX9 +ivAwhZTJryQCL2/W3Wf+47BVTwSYT6RBVuKT0Gro1vP7ZeDOdcQxWQzugsgMYDNK +GbqEZycPvEJdvSRUDewdcAZfpLz6IHxV +-----END CERTIFICATE----- + +# Issuer: CN=vTrus ECC Root CA O=iTrusChina Co.,Ltd. +# Subject: CN=vTrus ECC Root CA O=iTrusChina Co.,Ltd. +# Label: "vTrus ECC Root CA" +# Serial: 630369271402956006249506845124680065938238527194 +# MD5 Fingerprint: de:4b:c1:f5:52:8c:9b:43:e1:3e:8f:55:54:17:8d:85 +# SHA1 Fingerprint: f6:9c:db:b0:fc:f6:02:13:b6:52:32:a6:a3:91:3f:16:70:da:c3:e1 +# SHA256 Fingerprint: 30:fb:ba:2c:32:23:8e:2a:98:54:7a:f9:79:31:e5:50:42:8b:9b:3f:1c:8e:eb:66:33:dc:fa:86:c5:b2:7d:d3 +-----BEGIN CERTIFICATE----- +MIICDzCCAZWgAwIBAgIUbmq8WapTvpg5Z6LSa6Q75m0c1towCgYIKoZIzj0EAwMw +RzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28uLEx0ZC4xGjAY +BgNVBAMTEXZUcnVzIEVDQyBSb290IENBMB4XDTE4MDczMTA3MjY0NFoXDTQzMDcz +MTA3MjY0NFowRzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28u +LEx0ZC4xGjAYBgNVBAMTEXZUcnVzIEVDQyBSb290IENBMHYwEAYHKoZIzj0CAQYF +K4EEACIDYgAEZVBKrox5lkqqHAjDo6LN/llWQXf9JpRCux3NCNtzslt188+cToL0 +v/hhJoVs1oVbcnDS/dtitN9Ti72xRFhiQgnH+n9bEOf+QP3A2MMrMudwpremIFUd +e4BdS49nTPEQo0IwQDAdBgNVHQ4EFgQUmDnNvtiyjPeyq+GtJK97fKHbH88wDwYD +VR0TAQH/BAUwAwEB/zAOBgNVHQ8BAf8EBAMCAQYwCgYIKoZIzj0EAwMDaAAwZQIw +V53dVvHH4+m4SVBrm2nDb+zDfSXkV5UTQJtS0zvzQBm8JsctBp61ezaf9SXUY2sA +AjEA6dPGnlaaKsyh2j/IZivTWJwghfqrkYpwcBE4YGQLYgmRWAD5Tfs0aNoJrSEG +GJTO +-----END CERTIFICATE----- + +# Issuer: CN=vTrus Root CA O=iTrusChina Co.,Ltd. +# Subject: CN=vTrus Root CA O=iTrusChina Co.,Ltd. +# Label: "vTrus Root CA" +# Serial: 387574501246983434957692974888460947164905180485 +# MD5 Fingerprint: b8:c9:37:df:fa:6b:31:84:64:c5:ea:11:6a:1b:75:fc +# SHA1 Fingerprint: 84:1a:69:fb:f5:cd:1a:25:34:13:3d:e3:f8:fc:b8:99:d0:c9:14:b7 +# SHA256 Fingerprint: 8a:71:de:65:59:33:6f:42:6c:26:e5:38:80:d0:0d:88:a1:8d:a4:c6:a9:1f:0d:cb:61:94:e2:06:c5:c9:63:87 +-----BEGIN CERTIFICATE----- +MIIFVjCCAz6gAwIBAgIUQ+NxE9izWRRdt86M/TX9b7wFjUUwDQYJKoZIhvcNAQEL +BQAwQzELMAkGA1UEBhMCQ04xHDAaBgNVBAoTE2lUcnVzQ2hpbmEgQ28uLEx0ZC4x +FjAUBgNVBAMTDXZUcnVzIFJvb3QgQ0EwHhcNMTgwNzMxMDcyNDA1WhcNNDMwNzMx +MDcyNDA1WjBDMQswCQYDVQQGEwJDTjEcMBoGA1UEChMTaVRydXNDaGluYSBDby4s +THRkLjEWMBQGA1UEAxMNdlRydXMgUm9vdCBDQTCCAiIwDQYJKoZIhvcNAQEBBQAD +ggIPADCCAgoCggIBAL1VfGHTuB0EYgWgrmy3cLRB6ksDXhA/kFocizuwZotsSKYc +IrrVQJLuM7IjWcmOvFjai57QGfIvWcaMY1q6n6MLsLOaXLoRuBLpDLvPbmyAhykU +AyyNJJrIZIO1aqwTLDPxn9wsYTwaP3BVm60AUn/PBLn+NvqcwBauYv6WTEN+VRS+ +GrPSbcKvdmaVayqwlHeFXgQPYh1jdfdr58tbmnDsPmcF8P4HCIDPKNsFxhQnL4Z9 +8Cfe/+Z+M0jnCx5Y0ScrUw5XSmXX+6KAYPxMvDVTAWqXcoKv8R1w6Jz1717CbMdH +flqUhSZNO7rrTOiwCcJlwp2dCZtOtZcFrPUGoPc2BX70kLJrxLT5ZOrpGgrIDajt +J8nU57O5q4IikCc9Kuh8kO+8T/3iCiSn3mUkpF3qwHYw03dQ+A0Em5Q2AXPKBlim +0zvc+gRGE1WKyURHuFE5Gi7oNOJ5y1lKCn+8pu8fA2dqWSslYpPZUxlmPCdiKYZN +pGvu/9ROutW04o5IWgAZCfEF2c6Rsffr6TlP9m8EQ5pV9T4FFL2/s1m02I4zhKOQ +UqqzApVg+QxMaPnu1RcN+HFXtSXkKe5lXa/R7jwXC1pDxaWG6iSe4gUH3DRCEpHW +OXSuTEGC2/KmSNGzm/MzqvOmwMVO9fSddmPmAsYiS8GVP1BkLFTltvA8Kc9XAgMB +AAGjQjBAMB0GA1UdDgQWBBRUYnBj8XWEQ1iO0RYgscasGrz2iTAPBgNVHRMBAf8E +BTADAQH/MA4GA1UdDwEB/wQEAwIBBjANBgkqhkiG9w0BAQsFAAOCAgEAKbqSSaet +8PFww+SX8J+pJdVrnjT+5hpk9jprUrIQeBqfTNqK2uwcN1LgQkv7bHbKJAs5EhWd +nxEt/Hlk3ODg9d3gV8mlsnZwUKT+twpw1aA08XXXTUm6EdGz2OyC/+sOxL9kLX1j +bhd47F18iMjrjld22VkE+rxSH0Ws8HqA7Oxvdq6R2xCOBNyS36D25q5J08FsEhvM +Kar5CKXiNxTKsbhm7xqC5PD48acWabfbqWE8n/Uxy+QARsIvdLGx14HuqCaVvIiv +TDUHKgLKeBRtRytAVunLKmChZwOgzoy8sHJnxDHO2zTlJQNgJXtxmOTAGytfdELS +S8VZCAeHvsXDf+eW2eHcKJfWjwXj9ZtOyh1QRwVTsMo554WgicEFOwE30z9J4nfr +I8iIZjs9OXYhRvHsXyO466JmdXTBQPfYaJqT4i2pLr0cox7IdMakLXogqzu4sEb9 +b91fUlV1YvCXoHzXOP0l382gmxDPi7g4Xl7FtKYCNqEeXxzP4padKar9mK5S4fNB +UvupLnKWnyfjqnN9+BojZns7q2WwMgFLFT49ok8MKzWixtlnEjUwzXYuFrOZnk1P +Ti07NEPhmg4NpGaXutIcSkwsKouLgU9xGqndXHt7CMUADTdA43x7VF8vhV929ven +sBxXVsFy6K2ir40zSbofitzmdHxghm+Hl3s= +-----END CERTIFICATE----- + +# Issuer: CN=ISRG Root X2 O=Internet Security Research Group +# Subject: CN=ISRG Root X2 O=Internet Security Research Group +# Label: "ISRG Root X2" +# Serial: 87493402998870891108772069816698636114 +# MD5 Fingerprint: d3:9e:c4:1e:23:3c:a6:df:cf:a3:7e:6d:e0:14:e6:e5 +# SHA1 Fingerprint: bd:b1:b9:3c:d5:97:8d:45:c6:26:14:55:f8:db:95:c7:5a:d1:53:af +# SHA256 Fingerprint: 69:72:9b:8e:15:a8:6e:fc:17:7a:57:af:b7:17:1d:fc:64:ad:d2:8c:2f:ca:8c:f1:50:7e:34:45:3c:cb:14:70 +-----BEGIN CERTIFICATE----- +MIICGzCCAaGgAwIBAgIQQdKd0XLq7qeAwSxs6S+HUjAKBggqhkjOPQQDAzBPMQsw +CQYDVQQGEwJVUzEpMCcGA1UEChMgSW50ZXJuZXQgU2VjdXJpdHkgUmVzZWFyY2gg +R3JvdXAxFTATBgNVBAMTDElTUkcgUm9vdCBYMjAeFw0yMDA5MDQwMDAwMDBaFw00 +MDA5MTcxNjAwMDBaME8xCzAJBgNVBAYTAlVTMSkwJwYDVQQKEyBJbnRlcm5ldCBT +ZWN1cml0eSBSZXNlYXJjaCBHcm91cDEVMBMGA1UEAxMMSVNSRyBSb290IFgyMHYw +EAYHKoZIzj0CAQYFK4EEACIDYgAEzZvVn4CDCuwJSvMWSj5cz3es3mcFDR0HttwW ++1qLFNvicWDEukWVEYmO6gbf9yoWHKS5xcUy4APgHoIYOIvXRdgKam7mAHf7AlF9 +ItgKbppbd9/w+kHsOdx1ymgHDB/qo0IwQDAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0T +AQH/BAUwAwEB/zAdBgNVHQ4EFgQUfEKWrt5LSDv6kviejM9ti6lyN5UwCgYIKoZI +zj0EAwMDaAAwZQIwe3lORlCEwkSHRhtFcP9Ymd70/aTSVaYgLXTWNLxBo1BfASdW +tL4ndQavEi51mI38AjEAi/V3bNTIZargCyzuFJ0nN6T5U6VR5CmD1/iQMVtCnwr1 +/q4AaOeMSQ+2b1tbFfLn +-----END CERTIFICATE----- + +# Issuer: CN=HiPKI Root CA - G1 O=Chunghwa Telecom Co., Ltd. +# Subject: CN=HiPKI Root CA - G1 O=Chunghwa Telecom Co., Ltd. +# Label: "HiPKI Root CA - G1" +# Serial: 60966262342023497858655262305426234976 +# MD5 Fingerprint: 69:45:df:16:65:4b:e8:68:9a:8f:76:5f:ff:80:9e:d3 +# SHA1 Fingerprint: 6a:92:e4:a8:ee:1b:ec:96:45:37:e3:29:57:49:cd:96:e3:e5:d2:60 +# SHA256 Fingerprint: f0:15:ce:3c:c2:39:bf:ef:06:4b:e9:f1:d2:c4:17:e1:a0:26:4a:0a:94:be:1f:0c:8d:12:18:64:eb:69:49:cc +-----BEGIN CERTIFICATE----- +MIIFajCCA1KgAwIBAgIQLd2szmKXlKFD6LDNdmpeYDANBgkqhkiG9w0BAQsFADBP +MQswCQYDVQQGEwJUVzEjMCEGA1UECgwaQ2h1bmdod2EgVGVsZWNvbSBDby4sIEx0 +ZC4xGzAZBgNVBAMMEkhpUEtJIFJvb3QgQ0EgLSBHMTAeFw0xOTAyMjIwOTQ2MDRa +Fw0zNzEyMzExNTU5NTlaME8xCzAJBgNVBAYTAlRXMSMwIQYDVQQKDBpDaHVuZ2h3 +YSBUZWxlY29tIENvLiwgTHRkLjEbMBkGA1UEAwwSSGlQS0kgUm9vdCBDQSAtIEcx +MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA9B5/UnMyDHPkvRN0o9Qw +qNCuS9i233VHZvR85zkEHmpwINJaR3JnVfSl6J3VHiGh8Ge6zCFovkRTv4354twv +Vcg3Px+kwJyz5HdcoEb+d/oaoDjq7Zpy3iu9lFc6uux55199QmQ5eiY29yTw1S+6 +lZgRZq2XNdZ1AYDgr/SEYYwNHl98h5ZeQa/rh+r4XfEuiAU+TCK72h8q3VJGZDnz +Qs7ZngyzsHeXZJzA9KMuH5UHsBffMNsAGJZMoYFL3QRtU6M9/Aes1MU3guvklQgZ +KILSQjqj2FPseYlgSGDIcpJQ3AOPgz+yQlda22rpEZfdhSi8MEyr48KxRURHH+CK +FgeW0iEPU8DtqX7UTuybCeyvQqww1r/REEXgphaypcXTT3OUM3ECoWqj1jOXTyFj +HluP2cFeRXF3D4FdXyGarYPM+l7WjSNfGz1BryB1ZlpK9p/7qxj3ccC2HTHsOyDr +y+K49a6SsvfhhEvyovKTmiKe0xRvNlS9H15ZFblzqMF8b3ti6RZsR1pl8w4Rm0bZ +/W3c1pzAtH2lsN0/Vm+h+fbkEkj9Bn8SV7apI09bA8PgcSojt/ewsTu8mL3WmKgM +a/aOEmem8rJY5AIJEzypuxC00jBF8ez3ABHfZfjcK0NVvxaXxA/VLGGEqnKG/uY6 +fsI/fe78LxQ+5oXdUG+3Se0CAwEAAaNCMEAwDwYDVR0TAQH/BAUwAwEB/zAdBgNV +HQ4EFgQU8ncX+l6o/vY9cdVouslGDDjYr7AwDgYDVR0PAQH/BAQDAgGGMA0GCSqG +SIb3DQEBCwUAA4ICAQBQUfB13HAE4/+qddRxosuej6ip0691x1TPOhwEmSKsxBHi +7zNKpiMdDg1H2DfHb680f0+BazVP6XKlMeJ45/dOlBhbQH3PayFUhuaVevvGyuqc +SE5XCV0vrPSltJczWNWseanMX/mF+lLFjfiRFOs6DRfQUsJ748JzjkZ4Bjgs6Fza +ZsT0pPBWGTMpWmWSBUdGSquEwx4noR8RkpkndZMPvDY7l1ePJlsMu5wP1G4wB9Tc +XzZoZjmDlicmisjEOf6aIW/Vcobpf2Lll07QJNBAsNB1CI69aO4I1258EHBGG3zg +iLKecoaZAeO/n0kZtCW+VmWuF2PlHt/o/0elv+EmBYTksMCv5wiZqAxeJoBF1Pho +L5aPruJKHJwWDBNvOIf2u8g0X5IDUXlwpt/L9ZlNec1OvFefQ05rLisY+GpzjLrF +Ne85akEez3GoorKGB1s6yeHvP2UEgEcyRHCVTjFnanRbEEV16rCf0OY1/k6fi8wr +kkVbbiVghUbN0aqwdmaTd5a+g744tiROJgvM7XpWGuDpWsZkrUx6AEhEL7lAuxM+ +vhV4nYWBSipX3tUZQ9rbyltHhoMLP7YNdnhzeSJesYAfz77RP1YQmCuVh6EfnWQU +YDksswBVLuT1sw5XxJFBAJw/6KXf6vb/yPCtbVKoF6ubYfwSUTXkJf2vqmqGOQ== +-----END CERTIFICATE----- + +# Issuer: CN=GlobalSign O=GlobalSign OU=GlobalSign ECC Root CA - R4 +# Subject: CN=GlobalSign O=GlobalSign OU=GlobalSign ECC Root CA - R4 +# Label: "GlobalSign ECC Root CA - R4" +# Serial: 159662223612894884239637590694 +# MD5 Fingerprint: 26:29:f8:6d:e1:88:bf:a2:65:7f:aa:c4:cd:0f:7f:fc +# SHA1 Fingerprint: 6b:a0:b0:98:e1:71:ef:5a:ad:fe:48:15:80:77:10:f4:bd:6f:0b:28 +# SHA256 Fingerprint: b0:85:d7:0b:96:4f:19:1a:73:e4:af:0d:54:ae:7a:0e:07:aa:fd:af:9b:71:dd:08:62:13:8a:b7:32:5a:24:a2 +-----BEGIN CERTIFICATE----- +MIIB3DCCAYOgAwIBAgINAgPlfvU/k/2lCSGypjAKBggqhkjOPQQDAjBQMSQwIgYD +VQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0gUjQxEzARBgNVBAoTCkdsb2Jh +bFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wHhcNMTIxMTEzMDAwMDAwWhcNMzgw +MTE5MDMxNDA3WjBQMSQwIgYDVQQLExtHbG9iYWxTaWduIEVDQyBSb290IENBIC0g +UjQxEzARBgNVBAoTCkdsb2JhbFNpZ24xEzARBgNVBAMTCkdsb2JhbFNpZ24wWTAT +BgcqhkjOPQIBBggqhkjOPQMBBwNCAAS4xnnTj2wlDp8uORkcA6SumuU5BwkWymOx +uYb4ilfBV85C+nOh92VC/x7BALJucw7/xyHlGKSq2XE/qNS5zowdo0IwQDAOBgNV +HQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUVLB7rUW44kB/ ++wpu+74zyTyjhNUwCgYIKoZIzj0EAwIDRwAwRAIgIk90crlgr/HmnKAWBVBfw147 +bmF0774BxL4YSFlhgjICICadVGNA3jdgUM/I2O2dgq43mLyjj0xMqTQrbO/7lZsm +-----END CERTIFICATE----- + +# Issuer: CN=GTS Root R1 O=Google Trust Services LLC +# Subject: CN=GTS Root R1 O=Google Trust Services LLC +# Label: "GTS Root R1" +# Serial: 159662320309726417404178440727 +# MD5 Fingerprint: 05:fe:d0:bf:71:a8:a3:76:63:da:01:e0:d8:52:dc:40 +# SHA1 Fingerprint: e5:8c:1c:c4:91:3b:38:63:4b:e9:10:6e:e3:ad:8e:6b:9d:d9:81:4a +# SHA256 Fingerprint: d9:47:43:2a:bd:e7:b7:fa:90:fc:2e:6b:59:10:1b:12:80:e0:e1:c7:e4:e4:0f:a3:c6:88:7f:ff:57:a7:f4:cf +-----BEGIN CERTIFICATE----- +MIIFVzCCAz+gAwIBAgINAgPlk28xsBNJiGuiFzANBgkqhkiG9w0BAQwFADBHMQsw +CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU +MBIGA1UEAxMLR1RTIFJvb3QgUjEwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw +MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp +Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjEwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQC2EQKLHuOhd5s73L+UPreVp0A8of2C+X0yBoJx9vaMf/vo +27xqLpeXo4xL+Sv2sfnOhB2x+cWX3u+58qPpvBKJXqeqUqv4IyfLpLGcY9vXmX7w +Cl7raKb0xlpHDU0QM+NOsROjyBhsS+z8CZDfnWQpJSMHobTSPS5g4M/SCYe7zUjw +TcLCeoiKu7rPWRnWr4+wB7CeMfGCwcDfLqZtbBkOtdh+JhpFAz2weaSUKK0Pfybl +qAj+lug8aJRT7oM6iCsVlgmy4HqMLnXWnOunVmSPlk9orj2XwoSPwLxAwAtcvfaH +szVsrBhQf4TgTM2S0yDpM7xSma8ytSmzJSq0SPly4cpk9+aCEI3oncKKiPo4Zor8 +Y/kB+Xj9e1x3+naH+uzfsQ55lVe0vSbv1gHR6xYKu44LtcXFilWr06zqkUspzBmk +MiVOKvFlRNACzqrOSbTqn3yDsEB750Orp2yjj32JgfpMpf/VjsPOS+C12LOORc92 +wO1AK/1TD7Cn1TsNsYqiA94xrcx36m97PtbfkSIS5r762DL8EGMUUXLeXdYWk70p +aDPvOmbsB4om3xPXV2V4J95eSRQAogB/mqghtqmxlbCluQ0WEdrHbEg8QOB+DVrN +VjzRlwW5y0vtOUucxD/SVRNuJLDWcfr0wbrM7Rv1/oFB2ACYPTrIrnqYNxgFlQID +AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQU5K8rJnEaK0gnhS9SZizv8IkTcT4wDQYJKoZIhvcNAQEMBQADggIBAJ+qQibb +C5u+/x6Wki4+omVKapi6Ist9wTrYggoGxval3sBOh2Z5ofmmWJyq+bXmYOfg6LEe +QkEzCzc9zolwFcq1JKjPa7XSQCGYzyI0zzvFIoTgxQ6KfF2I5DUkzps+GlQebtuy +h6f88/qBVRRiClmpIgUxPoLW7ttXNLwzldMXG+gnoot7TiYaelpkttGsN/H9oPM4 +7HLwEXWdyzRSjeZ2axfG34arJ45JK3VmgRAhpuo+9K4l/3wV3s6MJT/KYnAK9y8J +ZgfIPxz88NtFMN9iiMG1D53Dn0reWVlHxYciNuaCp+0KueIHoI17eko8cdLiA6Ef +MgfdG+RCzgwARWGAtQsgWSl4vflVy2PFPEz0tv/bal8xa5meLMFrUKTX5hgUvYU/ +Z6tGn6D/Qqc6f1zLXbBwHSs09dR2CQzreExZBfMzQsNhFRAbd03OIozUhfJFfbdT +6u9AWpQKXCBfTkBdYiJ23//OYb2MI3jSNwLgjt7RETeJ9r/tSQdirpLsQBqvFAnZ +0E6yove+7u7Y/9waLd64NnHi/Hm3lCXRSHNboTXns5lndcEZOitHTtNCjv0xyBZm +2tIMPNuzjsmhDYAPexZ3FL//2wmUspO8IFgV6dtxQ/PeEMMA3KgqlbbC1j+Qa3bb +bP6MvPJwNQzcmRk13NfIRmPVNnGuV/u3gm3c +-----END CERTIFICATE----- + +# Issuer: CN=GTS Root R2 O=Google Trust Services LLC +# Subject: CN=GTS Root R2 O=Google Trust Services LLC +# Label: "GTS Root R2" +# Serial: 159662449406622349769042896298 +# MD5 Fingerprint: 1e:39:c0:53:e6:1e:29:82:0b:ca:52:55:36:5d:57:dc +# SHA1 Fingerprint: 9a:44:49:76:32:db:de:fa:d0:bc:fb:5a:7b:17:bd:9e:56:09:24:94 +# SHA256 Fingerprint: 8d:25:cd:97:22:9d:bf:70:35:6b:da:4e:b3:cc:73:40:31:e2:4c:f0:0f:af:cf:d3:2d:c7:6e:b5:84:1c:7e:a8 +-----BEGIN CERTIFICATE----- +MIIFVzCCAz+gAwIBAgINAgPlrsWNBCUaqxElqjANBgkqhkiG9w0BAQwFADBHMQsw +CQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEU +MBIGA1UEAxMLR1RTIFJvb3QgUjIwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAw +MDAwWjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZp +Y2VzIExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjIwggIiMA0GCSqGSIb3DQEBAQUA +A4ICDwAwggIKAoICAQDO3v2m++zsFDQ8BwZabFn3GTXd98GdVarTzTukk3LvCvpt +nfbwhYBboUhSnznFt+4orO/LdmgUud+tAWyZH8QiHZ/+cnfgLFuv5AS/T3KgGjSY +6Dlo7JUle3ah5mm5hRm9iYz+re026nO8/4Piy33B0s5Ks40FnotJk9/BW9BuXvAu +MC6C/Pq8tBcKSOWIm8Wba96wyrQD8Nr0kLhlZPdcTK3ofmZemde4wj7I0BOdre7k +RXuJVfeKH2JShBKzwkCX44ofR5GmdFrS+LFjKBC4swm4VndAoiaYecb+3yXuPuWg +f9RhD1FLPD+M2uFwdNjCaKH5wQzpoeJ/u1U8dgbuak7MkogwTZq9TwtImoS1mKPV ++3PBV2HdKFZ1E66HjucMUQkQdYhMvI35ezzUIkgfKtzra7tEscszcTJGr61K8Yzo +dDqs5xoic4DSMPclQsciOzsSrZYuxsN2B6ogtzVJV+mSSeh2FnIxZyuWfoqjx5RW +Ir9qS34BIbIjMt/kmkRtWVtd9QCgHJvGeJeNkP+byKq0rxFROV7Z+2et1VsRnTKa +G73VululycslaVNVJ1zgyjbLiGH7HrfQy+4W+9OmTN6SpdTi3/UGVN4unUu0kzCq +gc7dGtxRcw1PcOnlthYhGXmy5okLdWTK1au8CcEYof/UVKGFPP0UJAOyh9OktwID +AQABo0IwQDAOBgNVHQ8BAf8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQUu//KjiOfT5nK2+JopqUVJxce2Q4wDQYJKoZIhvcNAQEMBQADggIBAB/Kzt3H +vqGf2SdMC9wXmBFqiN495nFWcrKeGk6c1SuYJF2ba3uwM4IJvd8lRuqYnrYb/oM8 +0mJhwQTtzuDFycgTE1XnqGOtjHsB/ncw4c5omwX4Eu55MaBBRTUoCnGkJE+M3DyC +B19m3H0Q/gxhswWV7uGugQ+o+MePTagjAiZrHYNSVc61LwDKgEDg4XSsYPWHgJ2u +NmSRXbBoGOqKYcl3qJfEycel/FVL8/B/uWU9J2jQzGv6U53hkRrJXRqWbTKH7QMg +yALOWr7Z6v2yTcQvG99fevX4i8buMTolUVVnjWQye+mew4K6Ki3pHrTgSAai/Gev +HyICc/sgCq+dVEuhzf9gR7A/Xe8bVr2XIZYtCtFenTgCR2y59PYjJbigapordwj6 +xLEokCZYCDzifqrXPW+6MYgKBesntaFJ7qBFVHvmJ2WZICGoo7z7GJa7Um8M7YNR +TOlZ4iBgxcJlkoKM8xAfDoqXvneCbT+PHV28SSe9zE8P4c52hgQjxcCMElv924Sg +JPFI/2R80L5cFtHvma3AH/vLrrw4IgYmZNralw4/KBVEqE8AyvCazM90arQ+POuV +7LXTWtiBmelDGDfrs7vRWGJB82bSj6p4lVQgw1oudCvV0b4YacCs1aTPObpRhANl +6WLAYv7YTVWW4tAR+kg0Eeye7QUd5MjWHYbL +-----END CERTIFICATE----- + +# Issuer: CN=GTS Root R3 O=Google Trust Services LLC +# Subject: CN=GTS Root R3 O=Google Trust Services LLC +# Label: "GTS Root R3" +# Serial: 159662495401136852707857743206 +# MD5 Fingerprint: 3e:e7:9d:58:02:94:46:51:94:e5:e0:22:4a:8b:e7:73 +# SHA1 Fingerprint: ed:e5:71:80:2b:c8:92:b9:5b:83:3c:d2:32:68:3f:09:cd:a0:1e:46 +# SHA256 Fingerprint: 34:d8:a7:3e:e2:08:d9:bc:db:0d:95:65:20:93:4b:4e:40:e6:94:82:59:6e:8b:6f:73:c8:42:6b:01:0a:6f:48 +-----BEGIN CERTIFICATE----- +MIICCTCCAY6gAwIBAgINAgPluILrIPglJ209ZjAKBggqhkjOPQQDAzBHMQswCQYD +VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG +A1UEAxMLR1RTIFJvb3QgUjMwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw +WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz +IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjMwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AAQfTzOHMymKoYTey8chWEGJ6ladK0uFxh1MJ7x/JlFyb+Kf1qPKzEUURout736G +jOyxfi//qXGdGIRFBEFVbivqJn+7kAHjSxm65FSWRQmx1WyRRK2EE46ajA2ADDL2 +4CejQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBTB8Sa6oC2uhYHP0/EqEr24Cmf9vDAKBggqhkjOPQQDAwNpADBmAjEA9uEglRR7 +VKOQFhG/hMjqb2sXnh5GmCCbn9MN2azTL818+FsuVbu/3ZL3pAzcMeGiAjEA/Jdm +ZuVDFhOD3cffL74UOO0BzrEXGhF16b0DjyZ+hOXJYKaV11RZt+cRLInUue4X +-----END CERTIFICATE----- + +# Issuer: CN=GTS Root R4 O=Google Trust Services LLC +# Subject: CN=GTS Root R4 O=Google Trust Services LLC +# Label: "GTS Root R4" +# Serial: 159662532700760215368942768210 +# MD5 Fingerprint: 43:96:83:77:19:4d:76:b3:9d:65:52:e4:1d:22:a5:e8 +# SHA1 Fingerprint: 77:d3:03:67:b5:e0:0c:15:f6:0c:38:61:df:7c:e1:3b:92:46:4d:47 +# SHA256 Fingerprint: 34:9d:fa:40:58:c5:e2:63:12:3b:39:8a:e7:95:57:3c:4e:13:13:c8:3f:e6:8f:93:55:6c:d5:e8:03:1b:3c:7d +-----BEGIN CERTIFICATE----- +MIICCTCCAY6gAwIBAgINAgPlwGjvYxqccpBQUjAKBggqhkjOPQQDAzBHMQswCQYD +VQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2VzIExMQzEUMBIG +A1UEAxMLR1RTIFJvb3QgUjQwHhcNMTYwNjIyMDAwMDAwWhcNMzYwNjIyMDAwMDAw +WjBHMQswCQYDVQQGEwJVUzEiMCAGA1UEChMZR29vZ2xlIFRydXN0IFNlcnZpY2Vz +IExMQzEUMBIGA1UEAxMLR1RTIFJvb3QgUjQwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AATzdHOnaItgrkO4NcWBMHtLSZ37wWHO5t5GvWvVYRg1rkDdc/eJkTBa6zzuhXyi +QHY7qca4R9gq55KRanPpsXI5nymfopjTX15YhmUPoYRlBtHci8nHc8iMai/lxKvR +HYqjQjBAMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQW +BBSATNbrdP9JNqPV2Py1PsVq8JQdjDAKBggqhkjOPQQDAwNpADBmAjEA6ED/g94D +9J+uHXqnLrmvT/aDHQ4thQEd0dlq7A/Cr8deVl5c1RxYIigL9zC2L7F8AjEA8GE8 +p/SgguMh1YQdc4acLa/KNJvxn7kjNuK8YAOdgLOaVsjh4rsUecrNIdSUtUlD +-----END CERTIFICATE----- + +# Issuer: CN=Telia Root CA v2 O=Telia Finland Oyj +# Subject: CN=Telia Root CA v2 O=Telia Finland Oyj +# Label: "Telia Root CA v2" +# Serial: 7288924052977061235122729490515358 +# MD5 Fingerprint: 0e:8f:ac:aa:82:df:85:b1:f4:dc:10:1c:fc:99:d9:48 +# SHA1 Fingerprint: b9:99:cd:d1:73:50:8a:c4:47:05:08:9c:8c:88:fb:be:a0:2b:40:cd +# SHA256 Fingerprint: 24:2b:69:74:2f:cb:1e:5b:2a:bf:98:89:8b:94:57:21:87:54:4e:5b:4d:99:11:78:65:73:62:1f:6a:74:b8:2c +-----BEGIN CERTIFICATE----- +MIIFdDCCA1ygAwIBAgIPAWdfJ9b+euPkrL4JWwWeMA0GCSqGSIb3DQEBCwUAMEQx +CzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZMBcGA1UE +AwwQVGVsaWEgUm9vdCBDQSB2MjAeFw0xODExMjkxMTU1NTRaFw00MzExMjkxMTU1 +NTRaMEQxCzAJBgNVBAYTAkZJMRowGAYDVQQKDBFUZWxpYSBGaW5sYW5kIE95ajEZ +MBcGA1UEAwwQVGVsaWEgUm9vdCBDQSB2MjCCAiIwDQYJKoZIhvcNAQEBBQADggIP +ADCCAgoCggIBALLQPwe84nvQa5n44ndp586dpAO8gm2h/oFlH0wnrI4AuhZ76zBq +AMCzdGh+sq/H1WKzej9Qyow2RCRj0jbpDIX2Q3bVTKFgcmfiKDOlyzG4OiIjNLh9 +vVYiQJ3q9HsDrWj8soFPmNB06o3lfc1jw6P23pLCWBnglrvFxKk9pXSW/q/5iaq9 +lRdU2HhE8Qx3FZLgmEKnpNaqIJLNwaCzlrI6hEKNfdWV5Nbb6WLEWLN5xYzTNTOD +n3WhUidhOPFZPY5Q4L15POdslv5e2QJltI5c0BE0312/UqeBAMN/mUWZFdUXyApT +7GPzmX3MaRKGwhfwAZ6/hLzRUssbkmbOpFPlob/E2wnW5olWK8jjfN7j/4nlNW4o +6GwLI1GpJQXrSPjdscr6bAhR77cYbETKJuFzxokGgeWKrLDiKca5JLNrRBH0pUPC +TEPlcDaMtjNXepUugqD0XBCzYYP2AgWGLnwtbNwDRm41k9V6lS/eINhbfpSQBGq6 +WT0EBXWdN6IOLj3rwaRSg/7Qa9RmjtzG6RJOHSpXqhC8fF6CfaamyfItufUXJ63R +DolUK5X6wK0dmBR4M0KGCqlztft0DbcbMBnEWg4cJ7faGND/isgFuvGqHKI3t+ZI +pEYslOqodmJHixBTB0hXbOKSTbauBcvcwUpej6w9GU7C7WB1K9vBykLVAgMBAAGj +YzBhMB8GA1UdIwQYMBaAFHKs5DN5qkWH9v2sHZ7Wxy+G2CQ5MB0GA1UdDgQWBBRy +rOQzeapFh/b9rB2e1scvhtgkOTAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUw +AwEB/zANBgkqhkiG9w0BAQsFAAOCAgEAoDtZpwmUPjaE0n4vOaWWl/oRrfxn83EJ +8rKJhGdEr7nv7ZbsnGTbMjBvZ5qsfl+yqwE2foH65IRe0qw24GtixX1LDoJt0nZi +0f6X+J8wfBj5tFJ3gh1229MdqfDBmgC9bXXYfef6xzijnHDoRnkDry5023X4blMM +A8iZGok1GTzTyVR8qPAs5m4HeW9q4ebqkYJpCh3DflminmtGFZhb069GHWLIzoBS +SRE/yQQSwxN8PzuKlts8oB4KtItUsiRnDe+Cy748fdHif64W1lZYudogsYMVoe+K +TTJvQS8TUoKU1xrBeKJR3Stwbbca+few4GeXVtt8YVMJAygCQMez2P2ccGrGKMOF +6eLtGpOg3kuYooQ+BXcBlj37tCAPnHICehIv1aO6UXivKitEZU61/Qrowc15h2Er +3oBXRb9n8ZuRXqWk7FlIEA04x7D6w0RtBPV4UBySllva9bguulvP5fBqnUsvWHMt +Ty3EHD70sz+rFQ47GUGKpMFXEmZxTPpT41frYpUJnlTd0cI8Vzy9OK2YZLe4A5pT +VmBds9hCG1xLEooc6+t9xnppxyd/pPiL8uSUZodL6ZQHCRJ5irLrdATczvREWeAW +ysUsWNc8e89ihmpQfTU2Zqf7N+cox9jQraVplI/owd8k+BsHMYeB2F326CjYSlKA +rBPuUBQemMc= +-----END CERTIFICATE----- + +# Issuer: CN=D-TRUST BR Root CA 1 2020 O=D-Trust GmbH +# Subject: CN=D-TRUST BR Root CA 1 2020 O=D-Trust GmbH +# Label: "D-TRUST BR Root CA 1 2020" +# Serial: 165870826978392376648679885835942448534 +# MD5 Fingerprint: b5:aa:4b:d5:ed:f7:e3:55:2e:8f:72:0a:f3:75:b8:ed +# SHA1 Fingerprint: 1f:5b:98:f0:e3:b5:f7:74:3c:ed:e6:b0:36:7d:32:cd:f4:09:41:67 +# SHA256 Fingerprint: e5:9a:aa:81:60:09:c2:2b:ff:5b:25:ba:d3:7d:f3:06:f0:49:79:7c:1f:81:d8:5a:b0:89:e6:57:bd:8f:00:44 +-----BEGIN CERTIFICATE----- +MIIC2zCCAmCgAwIBAgIQfMmPK4TX3+oPyWWa00tNljAKBggqhkjOPQQDAzBIMQsw +CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlELVRS +VVNUIEJSIFJvb3QgQ0EgMSAyMDIwMB4XDTIwMDIxMTA5NDUwMFoXDTM1MDIxMTA5 +NDQ1OVowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEiMCAG +A1UEAxMZRC1UUlVTVCBCUiBSb290IENBIDEgMjAyMDB2MBAGByqGSM49AgEGBSuB +BAAiA2IABMbLxyjR+4T1mu9CFCDhQ2tuda38KwOE1HaTJddZO0Flax7mNCq7dPYS +zuht56vkPE4/RAiLzRZxy7+SmfSk1zxQVFKQhYN4lGdnoxwJGT11NIXe7WB9xwy0 +QVK5buXuQqOCAQ0wggEJMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFHOREKv/ +VbNafAkl1bK6CKBrqx9tMA4GA1UdDwEB/wQEAwIBBjCBxgYDVR0fBIG+MIG7MD6g +PKA6hjhodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X2JyX3Jvb3Rf +Y2FfMV8yMDIwLmNybDB5oHegdYZzbGRhcDovL2RpcmVjdG9yeS5kLXRydXN0Lm5l +dC9DTj1ELVRSVVNUJTIwQlIlMjBSb290JTIwQ0ElMjAxJTIwMjAyMCxPPUQtVHJ1 +c3QlMjBHbWJILEM9REU/Y2VydGlmaWNhdGVyZXZvY2F0aW9ubGlzdDAKBggqhkjO +PQQDAwNpADBmAjEAlJAtE/rhY/hhY+ithXhUkZy4kzg+GkHaQBZTQgjKL47xPoFW +wKrY7RjEsK70PvomAjEA8yjixtsrmfu3Ubgko6SUeho/5jbiA1czijDLgsfWFBHV +dWNbFJWcHwHP2NVypw87 +-----END CERTIFICATE----- + +# Issuer: CN=D-TRUST EV Root CA 1 2020 O=D-Trust GmbH +# Subject: CN=D-TRUST EV Root CA 1 2020 O=D-Trust GmbH +# Label: "D-TRUST EV Root CA 1 2020" +# Serial: 126288379621884218666039612629459926992 +# MD5 Fingerprint: 8c:2d:9d:70:9f:48:99:11:06:11:fb:e9:cb:30:c0:6e +# SHA1 Fingerprint: 61:db:8c:21:59:69:03:90:d8:7c:9c:12:86:54:cf:9d:3d:f4:dd:07 +# SHA256 Fingerprint: 08:17:0d:1a:a3:64:53:90:1a:2f:95:92:45:e3:47:db:0c:8d:37:ab:aa:bc:56:b8:1a:a1:00:dc:95:89:70:db +-----BEGIN CERTIFICATE----- +MIIC2zCCAmCgAwIBAgIQXwJB13qHfEwDo6yWjfv/0DAKBggqhkjOPQQDAzBIMQsw +CQYDVQQGEwJERTEVMBMGA1UEChMMRC1UcnVzdCBHbWJIMSIwIAYDVQQDExlELVRS +VVNUIEVWIFJvb3QgQ0EgMSAyMDIwMB4XDTIwMDIxMTEwMDAwMFoXDTM1MDIxMTA5 +NTk1OVowSDELMAkGA1UEBhMCREUxFTATBgNVBAoTDEQtVHJ1c3QgR21iSDEiMCAG +A1UEAxMZRC1UUlVTVCBFViBSb290IENBIDEgMjAyMDB2MBAGByqGSM49AgEGBSuB +BAAiA2IABPEL3YZDIBnfl4XoIkqbz52Yv7QFJsnL46bSj8WeeHsxiamJrSc8ZRCC +/N/DnU7wMyPE0jL1HLDfMxddxfCxivnvubcUyilKwg+pf3VlSSowZ/Rk99Yad9rD +wpdhQntJraOCAQ0wggEJMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFH8QARY3 +OqQo5FD4pPfsazK2/umLMA4GA1UdDwEB/wQEAwIBBjCBxgYDVR0fBIG+MIG7MD6g +PKA6hjhodHRwOi8vY3JsLmQtdHJ1c3QubmV0L2NybC9kLXRydXN0X2V2X3Jvb3Rf +Y2FfMV8yMDIwLmNybDB5oHegdYZzbGRhcDovL2RpcmVjdG9yeS5kLXRydXN0Lm5l +dC9DTj1ELVRSVVNUJTIwRVYlMjBSb290JTIwQ0ElMjAxJTIwMjAyMCxPPUQtVHJ1 +c3QlMjBHbWJILEM9REU/Y2VydGlmaWNhdGVyZXZvY2F0aW9ubGlzdDAKBggqhkjO +PQQDAwNpADBmAjEAyjzGKnXCXnViOTYAYFqLwZOZzNnbQTs7h5kXO9XMT8oi96CA +y/m0sRtW9XLS/BnRAjEAkfcwkz8QRitxpNA7RJvAKQIFskF3UfN5Wp6OFKBOQtJb +gfM0agPnIjhQW+0ZT0MW +-----END CERTIFICATE----- + +# Issuer: CN=DigiCert TLS ECC P384 Root G5 O=DigiCert, Inc. +# Subject: CN=DigiCert TLS ECC P384 Root G5 O=DigiCert, Inc. +# Label: "DigiCert TLS ECC P384 Root G5" +# Serial: 13129116028163249804115411775095713523 +# MD5 Fingerprint: d3:71:04:6a:43:1c:db:a6:59:e1:a8:a3:aa:c5:71:ed +# SHA1 Fingerprint: 17:f3:de:5e:9f:0f:19:e9:8e:f6:1f:32:26:6e:20:c4:07:ae:30:ee +# SHA256 Fingerprint: 01:8e:13:f0:77:25:32:cf:80:9b:d1:b1:72:81:86:72:83:fc:48:c6:e1:3b:e9:c6:98:12:85:4a:49:0c:1b:05 +-----BEGIN CERTIFICATE----- +MIICGTCCAZ+gAwIBAgIQCeCTZaz32ci5PhwLBCou8zAKBggqhkjOPQQDAzBOMQsw +CQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJjAkBgNVBAMTHURp +Z2lDZXJ0IFRMUyBFQ0MgUDM4NCBSb290IEc1MB4XDTIxMDExNTAwMDAwMFoXDTQ2 +MDExNDIzNTk1OVowTjELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJ +bmMuMSYwJAYDVQQDEx1EaWdpQ2VydCBUTFMgRUNDIFAzODQgUm9vdCBHNTB2MBAG +ByqGSM49AgEGBSuBBAAiA2IABMFEoc8Rl1Ca3iOCNQfN0MsYndLxf3c1TzvdlHJS +7cI7+Oz6e2tYIOyZrsn8aLN1udsJ7MgT9U7GCh1mMEy7H0cKPGEQQil8pQgO4CLp +0zVozptjn4S1mU1YoI71VOeVyaNCMEAwHQYDVR0OBBYEFMFRRVBZqz7nLFr6ICIS +B4CIfBFqMA4GA1UdDwEB/wQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MAoGCCqGSM49 +BAMDA2gAMGUCMQCJao1H5+z8blUD2WdsJk6Dxv3J+ysTvLd6jLRl0mlpYxNjOyZQ +LgGheQaRnUi/wr4CMEfDFXuxoJGZSZOoPHzoRgaLLPIxAJSdYsiJvRmEFOml+wG4 +DXZDjC5Ty3zfDBeWUA== +-----END CERTIFICATE----- + +# Issuer: CN=DigiCert TLS RSA4096 Root G5 O=DigiCert, Inc. +# Subject: CN=DigiCert TLS RSA4096 Root G5 O=DigiCert, Inc. +# Label: "DigiCert TLS RSA4096 Root G5" +# Serial: 11930366277458970227240571539258396554 +# MD5 Fingerprint: ac:fe:f7:34:96:a9:f2:b3:b4:12:4b:e4:27:41:6f:e1 +# SHA1 Fingerprint: a7:88:49:dc:5d:7c:75:8c:8c:de:39:98:56:b3:aa:d0:b2:a5:71:35 +# SHA256 Fingerprint: 37:1a:00:dc:05:33:b3:72:1a:7e:eb:40:e8:41:9e:70:79:9d:2b:0a:0f:2c:1d:80:69:31:65:f7:ce:c4:ad:75 +-----BEGIN CERTIFICATE----- +MIIFZjCCA06gAwIBAgIQCPm0eKj6ftpqMzeJ3nzPijANBgkqhkiG9w0BAQwFADBN +MQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xJTAjBgNVBAMT +HERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzUwHhcNMjEwMTE1MDAwMDAwWhcN +NDYwMTE0MjM1OTU5WjBNMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQs +IEluYy4xJTAjBgNVBAMTHERpZ2lDZXJ0IFRMUyBSU0E0MDk2IFJvb3QgRzUwggIi +MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCz0PTJeRGd/fxmgefM1eS87IE+ +ajWOLrfn3q/5B03PMJ3qCQuZvWxX2hhKuHisOjmopkisLnLlvevxGs3npAOpPxG0 +2C+JFvuUAT27L/gTBaF4HI4o4EXgg/RZG5Wzrn4DReW+wkL+7vI8toUTmDKdFqgp +wgscONyfMXdcvyej/Cestyu9dJsXLfKB2l2w4SMXPohKEiPQ6s+d3gMXsUJKoBZM +pG2T6T867jp8nVid9E6P/DsjyG244gXazOvswzH016cpVIDPRFtMbzCe88zdH5RD +nU1/cHAN1DrRN/BsnZvAFJNY781BOHW8EwOVfH/jXOnVDdXifBBiqmvwPXbzP6Po +sMH976pXTayGpxi0KcEsDr9kvimM2AItzVwv8n/vFfQMFawKsPHTDU9qTXeXAaDx +Zre3zu/O7Oyldcqs4+Fj97ihBMi8ez9dLRYiVu1ISf6nL3kwJZu6ay0/nTvEF+cd +Lvvyz6b84xQslpghjLSR6Rlgg/IwKwZzUNWYOwbpx4oMYIwo+FKbbuH2TbsGJJvX +KyY//SovcfXWJL5/MZ4PbeiPT02jP/816t9JXkGPhvnxd3lLG7SjXi/7RgLQZhNe +XoVPzthwiHvOAbWWl9fNff2C+MIkwcoBOU+NosEUQB+cZtUMCUbW8tDRSHZWOkPL +tgoRObqME2wGtZ7P6wIDAQABo0IwQDAdBgNVHQ4EFgQUUTMc7TZArxfTJc1paPKv +TiM+s0EwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcN +AQEMBQADggIBAGCmr1tfV9qJ20tQqcQjNSH/0GEwhJG3PxDPJY7Jv0Y02cEhJhxw +GXIeo8mH/qlDZJY6yFMECrZBu8RHANmfGBg7sg7zNOok992vIGCukihfNudd5N7H +PNtQOa27PShNlnx2xlv0wdsUpasZYgcYQF+Xkdycx6u1UQ3maVNVzDl92sURVXLF +O4uJ+DQtpBflF+aZfTCIITfNMBc9uPK8qHWgQ9w+iUuQrm0D4ByjoJYJu32jtyoQ +REtGBzRj7TG5BO6jm5qu5jF49OokYTurWGT/u4cnYiWB39yhL/btp/96j1EuMPik +AdKFOV8BmZZvWltwGUb+hmA+rYAQCd05JS9Yf7vSdPD3Rh9GOUrYU9DzLjtxpdRv +/PNn5AeP3SYZ4Y1b+qOTEZvpyDrDVWiakuFSdjjo4bq9+0/V77PnSIMx8IIh47a+ +p6tv75/fTM8BuGJqIz3nCU2AG3swpMPdB380vqQmsvZB6Akd4yCYqjdP//fx4ilw +MUc/dNAUFvohigLVigmUdy7yWSiLfFCSCmZ4OIN1xLVaqBHG5cGdZlXPU8Sv13WF +qUITVuwhd4GTWgzqltlJyqEI8pc7bZsEGCREjnwB8twl2F6GmrE52/WRMmrRpnCK +ovfepEWFJqgejF0pW8hL2JpqA15w8oVPbEtoL8pU9ozaMv7Da4M/OMZ+ +-----END CERTIFICATE----- + +# Issuer: CN=Certainly Root R1 O=Certainly +# Subject: CN=Certainly Root R1 O=Certainly +# Label: "Certainly Root R1" +# Serial: 188833316161142517227353805653483829216 +# MD5 Fingerprint: 07:70:d4:3e:82:87:a0:fa:33:36:13:f4:fa:33:e7:12 +# SHA1 Fingerprint: a0:50:ee:0f:28:71:f4:27:b2:12:6d:6f:50:96:25:ba:cc:86:42:af +# SHA256 Fingerprint: 77:b8:2c:d8:64:4c:43:05:f7:ac:c5:cb:15:6b:45:67:50:04:03:3d:51:c6:0c:62:02:a8:e0:c3:34:67:d3:a0 +-----BEGIN CERTIFICATE----- +MIIFRzCCAy+gAwIBAgIRAI4P+UuQcWhlM1T01EQ5t+AwDQYJKoZIhvcNAQELBQAw +PTELMAkGA1UEBhMCVVMxEjAQBgNVBAoTCUNlcnRhaW5seTEaMBgGA1UEAxMRQ2Vy +dGFpbmx5IFJvb3QgUjEwHhcNMjEwNDAxMDAwMDAwWhcNNDYwNDAxMDAwMDAwWjA9 +MQswCQYDVQQGEwJVUzESMBAGA1UEChMJQ2VydGFpbmx5MRowGAYDVQQDExFDZXJ0 +YWlubHkgUm9vdCBSMTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANA2 +1B/q3avk0bbm+yLA3RMNansiExyXPGhjZjKcA7WNpIGD2ngwEc/csiu+kr+O5MQT +vqRoTNoCaBZ0vrLdBORrKt03H2As2/X3oXyVtwxwhi7xOu9S98zTm/mLvg7fMbed +aFySpvXl8wo0tf97ouSHocavFwDvA5HtqRxOcT3Si2yJ9HiG5mpJoM610rCrm/b0 +1C7jcvk2xusVtyWMOvwlDbMicyF0yEqWYZL1LwsYpfSt4u5BvQF5+paMjRcCMLT5 +r3gajLQ2EBAHBXDQ9DGQilHFhiZ5shGIXsXwClTNSaa/ApzSRKft43jvRl5tcdF5 +cBxGX1HpyTfcX35pe0HfNEXgO4T0oYoKNp43zGJS4YkNKPl6I7ENPT2a/Z2B7yyQ +wHtETrtJ4A5KVpK8y7XdeReJkd5hiXSSqOMyhb5OhaRLWcsrxXiOcVTQAjeZjOVJ +6uBUcqQRBi8LjMFbvrWhsFNunLhgkR9Za/kt9JQKl7XsxXYDVBtlUrpMklZRNaBA +2CnbrlJ2Oy0wQJuK0EJWtLeIAaSHO1OWzaMWj/Nmqhexx2DgwUMFDO6bW2BvBlyH +Wyf5QBGenDPBt+U1VwV/J84XIIwc/PH72jEpSe31C4SnT8H2TsIonPru4K8H+zMR +eiFPCyEQtkA6qyI6BJyLm4SGcprSp6XEtHWRqSsjAgMBAAGjQjBAMA4GA1UdDwEB +/wQEAwIBBjAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTgqj8ljZ9EXME66C6u +d0yEPmcM9DANBgkqhkiG9w0BAQsFAAOCAgEAuVevuBLaV4OPaAszHQNTVfSVcOQr +PbA56/qJYv331hgELyE03fFo8NWWWt7CgKPBjcZq91l3rhVkz1t5BXdm6ozTaw3d +8VkswTOlMIAVRQdFGjEitpIAq5lNOo93r6kiyi9jyhXWx8bwPWz8HA2YEGGeEaIi +1wrykXprOQ4vMMM2SZ/g6Q8CRFA3lFV96p/2O7qUpUzpvD5RtOjKkjZUbVwlKNrd +rRT90+7iIgXr0PK3aBLXWopBGsaSpVo7Y0VPv+E6dyIvXL9G+VoDhRNCX8reU9di +taY1BMJH/5n9hN9czulegChB8n3nHpDYT3Y+gjwN/KUD+nsa2UUeYNrEjvn8K8l7 +lcUq/6qJ34IxD3L/DCfXCh5WAFAeDJDBlrXYFIW7pw0WwfgHJBu6haEaBQmAupVj +yTrsJZ9/nbqkRxWbRHDxakvWOF5D8xh+UG7pWijmZeZ3Gzr9Hb4DJqPb1OG7fpYn +Kx3upPvaJVQTA945xsMfTZDsjxtK0hzthZU4UHlG1sGQUDGpXJpuHfUzVounmdLy +yCwzk5Iwx06MZTMQZBf9JBeW0Y3COmor6xOLRPIh80oat3df1+2IpHLlOR+Vnb5n +wXARPbv0+Em34yaXOp/SX3z7wJl8OSngex2/DaeP0ik0biQVy96QXr8axGbqwua6 +OV+KmalBWQewLK8= +-----END CERTIFICATE----- + +# Issuer: CN=Certainly Root E1 O=Certainly +# Subject: CN=Certainly Root E1 O=Certainly +# Label: "Certainly Root E1" +# Serial: 8168531406727139161245376702891150584 +# MD5 Fingerprint: 0a:9e:ca:cd:3e:52:50:c6:36:f3:4b:a3:ed:a7:53:e9 +# SHA1 Fingerprint: f9:e1:6d:dc:01:89:cf:d5:82:45:63:3e:c5:37:7d:c2:eb:93:6f:2b +# SHA256 Fingerprint: b4:58:5f:22:e4:ac:75:6a:4e:86:12:a1:36:1c:5d:9d:03:1a:93:fd:84:fe:bb:77:8f:a3:06:8b:0f:c4:2d:c2 +-----BEGIN CERTIFICATE----- +MIIB9zCCAX2gAwIBAgIQBiUzsUcDMydc+Y2aub/M+DAKBggqhkjOPQQDAzA9MQsw +CQYDVQQGEwJVUzESMBAGA1UEChMJQ2VydGFpbmx5MRowGAYDVQQDExFDZXJ0YWlu +bHkgUm9vdCBFMTAeFw0yMTA0MDEwMDAwMDBaFw00NjA0MDEwMDAwMDBaMD0xCzAJ +BgNVBAYTAlVTMRIwEAYDVQQKEwlDZXJ0YWlubHkxGjAYBgNVBAMTEUNlcnRhaW5s +eSBSb290IEUxMHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE3m/4fxzf7flHh4axpMCK ++IKXgOqPyEpeKn2IaKcBYhSRJHpcnqMXfYqGITQYUBsQ3tA3SybHGWCA6TS9YBk2 +QNYphwk8kXr2vBMj3VlOBF7PyAIcGFPBMdjaIOlEjeR2o0IwQDAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQU8ygYy2R17ikq6+2uI1g4 +hevIIgcwCgYIKoZIzj0EAwMDaAAwZQIxALGOWiDDshliTd6wT99u0nCK8Z9+aozm +ut6Dacpps6kFtZaSF4fC0urQe87YQVt8rgIwRt7qy12a7DLCZRawTDBcMPPaTnOG +BtjOiQRINzf43TNRnXCve1XYAS59BWQOhriR +-----END CERTIFICATE----- + +# Issuer: CN=E-Tugra Global Root CA RSA v3 O=E-Tugra EBG A.S. OU=E-Tugra Trust Center +# Subject: CN=E-Tugra Global Root CA RSA v3 O=E-Tugra EBG A.S. OU=E-Tugra Trust Center +# Label: "E-Tugra Global Root CA RSA v3" +# Serial: 75951268308633135324246244059508261641472512052 +# MD5 Fingerprint: 22:be:10:f6:c2:f8:03:88:73:5f:33:29:47:28:47:a4 +# SHA1 Fingerprint: e9:a8:5d:22:14:52:1c:5b:aa:0a:b4:be:24:6a:23:8a:c9:ba:e2:a9 +# SHA256 Fingerprint: ef:66:b0:b1:0a:3c:db:9f:2e:36:48:c7:6b:d2:af:18:ea:d2:bf:e6:f1:17:65:5e:28:c4:06:0d:a1:a3:f4:c2 +-----BEGIN CERTIFICATE----- +MIIF8zCCA9ugAwIBAgIUDU3FzRYilZYIfrgLfxUGNPt5EDQwDQYJKoZIhvcNAQEL +BQAwgYAxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHEwZBbmthcmExGTAXBgNVBAoTEEUt +VHVncmEgRUJHIEEuUy4xHTAbBgNVBAsTFEUtVHVncmEgVHJ1c3QgQ2VudGVyMSYw +JAYDVQQDEx1FLVR1Z3JhIEdsb2JhbCBSb290IENBIFJTQSB2MzAeFw0yMDAzMTgw +OTA3MTdaFw00NTAzMTIwOTA3MTdaMIGAMQswCQYDVQQGEwJUUjEPMA0GA1UEBxMG +QW5rYXJhMRkwFwYDVQQKExBFLVR1Z3JhIEVCRyBBLlMuMR0wGwYDVQQLExRFLVR1 +Z3JhIFRydXN0IENlbnRlcjEmMCQGA1UEAxMdRS1UdWdyYSBHbG9iYWwgUm9vdCBD +QSBSU0EgdjMwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCiZvCJt3J7 +7gnJY9LTQ91ew6aEOErxjYG7FL1H6EAX8z3DeEVypi6Q3po61CBxyryfHUuXCscx +uj7X/iWpKo429NEvx7epXTPcMHD4QGxLsqYxYdE0PD0xesevxKenhOGXpOhL9hd8 +7jwH7eKKV9y2+/hDJVDqJ4GohryPUkqWOmAalrv9c/SF/YP9f4RtNGx/ardLAQO/ +rWm31zLZ9Vdq6YaCPqVmMbMWPcLzJmAy01IesGykNz709a/r4d+ABs8qQedmCeFL +l+d3vSFtKbZnwy1+7dZ5ZdHPOrbRsV5WYVB6Ws5OUDGAA5hH5+QYfERaxqSzO8bG +wzrwbMOLyKSRBfP12baqBqG3q+Sx6iEUXIOk/P+2UNOMEiaZdnDpwA+mdPy70Bt4 +znKS4iicvObpCdg604nmvi533wEKb5b25Y08TVJ2Glbhc34XrD2tbKNSEhhw5oBO +M/J+JjKsBY04pOZ2PJ8QaQ5tndLBeSBrW88zjdGUdjXnXVXHt6woq0bM5zshtQoK +5EpZ3IE1S0SVEgpnpaH/WwAH0sDM+T/8nzPyAPiMbIedBi3x7+PmBvrFZhNb/FAH +nnGGstpvdDDPk1Po3CLW3iAfYY2jLqN4MpBs3KwytQXk9TwzDdbgh3cXTJ2w2Amo +DVf3RIXwyAS+XF1a4xeOVGNpf0l0ZAWMowIDAQABo2MwYTAPBgNVHRMBAf8EBTAD +AQH/MB8GA1UdIwQYMBaAFLK0ruYt9ybVqnUtdkvAG1Mh0EjvMB0GA1UdDgQWBBSy +tK7mLfcm1ap1LXZLwBtTIdBI7zAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQEL +BQADggIBAImocn+M684uGMQQgC0QDP/7FM0E4BQ8Tpr7nym/Ip5XuYJzEmMmtcyQ +6dIqKe6cLcwsmb5FJ+Sxce3kOJUxQfJ9emN438o2Fi+CiJ+8EUdPdk3ILY7r3y18 +Tjvarvbj2l0Upq7ohUSdBm6O++96SmotKygY/r+QLHUWnw/qln0F7psTpURs+APQ +3SPh/QMSEgj0GDSz4DcLdxEBSL9htLX4GdnLTeqjjO/98Aa1bZL0SmFQhO3sSdPk +vmjmLuMxC1QLGpLWgti2omU8ZgT5Vdps+9u1FGZNlIM7zR6mK7L+d0CGq+ffCsn9 +9t2HVhjYsCxVYJb6CH5SkPVLpi6HfMsg2wY+oF0Dd32iPBMbKaITVaA9FCKvb7jQ +mhty3QUBjYZgv6Rn7rWlDdF/5horYmbDB7rnoEgcOMPpRfunf/ztAmgayncSd6YA +VSgU7NbHEqIbZULpkejLPoeJVF3Zr52XnGnnCv8PWniLYypMfUeUP95L6VPQMPHF +9p5J3zugkaOj/s1YzOrfr28oO6Bpm4/srK4rVJ2bBLFHIK+WEj5jlB0E5y67hscM +moi/dkfv97ALl2bSRM9gUgfh1SxKOidhd8rXj+eHDjD/DLsE4mHDosiXYY60MGo8 +bcIHX0pzLz/5FooBZu+6kcpSV3uu1OYP3Qt6f4ueJiDPO++BcYNZ +-----END CERTIFICATE----- + +# Issuer: CN=E-Tugra Global Root CA ECC v3 O=E-Tugra EBG A.S. OU=E-Tugra Trust Center +# Subject: CN=E-Tugra Global Root CA ECC v3 O=E-Tugra EBG A.S. OU=E-Tugra Trust Center +# Label: "E-Tugra Global Root CA ECC v3" +# Serial: 218504919822255052842371958738296604628416471745 +# MD5 Fingerprint: 46:bc:81:bb:f1:b5:1e:f7:4b:96:bc:14:e2:e7:27:64 +# SHA1 Fingerprint: 8a:2f:af:57:53:b1:b0:e6:a1:04:ec:5b:6a:69:71:6d:f6:1c:e2:84 +# SHA256 Fingerprint: 87:3f:46:85:fa:7f:56:36:25:25:2e:6d:36:bc:d7:f1:6f:c2:49:51:f2:64:e4:7e:1b:95:4f:49:08:cd:ca:13 +-----BEGIN CERTIFICATE----- +MIICpTCCAiqgAwIBAgIUJkYZdzHhT28oNt45UYbm1JeIIsEwCgYIKoZIzj0EAwMw +gYAxCzAJBgNVBAYTAlRSMQ8wDQYDVQQHEwZBbmthcmExGTAXBgNVBAoTEEUtVHVn +cmEgRUJHIEEuUy4xHTAbBgNVBAsTFEUtVHVncmEgVHJ1c3QgQ2VudGVyMSYwJAYD +VQQDEx1FLVR1Z3JhIEdsb2JhbCBSb290IENBIEVDQyB2MzAeFw0yMDAzMTgwOTQ2 +NThaFw00NTAzMTIwOTQ2NThaMIGAMQswCQYDVQQGEwJUUjEPMA0GA1UEBxMGQW5r +YXJhMRkwFwYDVQQKExBFLVR1Z3JhIEVCRyBBLlMuMR0wGwYDVQQLExRFLVR1Z3Jh +IFRydXN0IENlbnRlcjEmMCQGA1UEAxMdRS1UdWdyYSBHbG9iYWwgUm9vdCBDQSBF +Q0MgdjMwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAASOmCm/xxAeJ9urA8woLNheSBkQ +KczLWYHMjLiSF4mDKpL2w6QdTGLVn9agRtwcvHbB40fQWxPa56WzZkjnIZpKT4YK +fWzqTTKACrJ6CZtpS5iB4i7sAnCWH/31Rs7K3IKjYzBhMA8GA1UdEwEB/wQFMAMB +Af8wHwYDVR0jBBgwFoAU/4Ixcj75xGZsrTie0bBRiKWQzPUwHQYDVR0OBBYEFP+C +MXI++cRmbK04ntGwUYilkMz1MA4GA1UdDwEB/wQEAwIBBjAKBggqhkjOPQQDAwNp +ADBmAjEA5gVYaWHlLcoNy/EZCL3W/VGSGn5jVASQkZo1kTmZ+gepZpO6yGjUij/6 +7W4WAie3AjEA3VoXK3YdZUKWpqxdinlW2Iob35reX8dQj7FbcQwm32pAAOwzkSFx +vmjkI6TZraE3 +-----END CERTIFICATE----- + +# Issuer: CN=Security Communication RootCA3 O=SECOM Trust Systems CO.,LTD. +# Subject: CN=Security Communication RootCA3 O=SECOM Trust Systems CO.,LTD. +# Label: "Security Communication RootCA3" +# Serial: 16247922307909811815 +# MD5 Fingerprint: 1c:9a:16:ff:9e:5c:e0:4d:8a:14:01:f4:35:5d:29:26 +# SHA1 Fingerprint: c3:03:c8:22:74:92:e5:61:a2:9c:5f:79:91:2b:1e:44:13:91:30:3a +# SHA256 Fingerprint: 24:a5:5c:2a:b0:51:44:2d:06:17:76:65:41:23:9a:4a:d0:32:d7:c5:51:75:aa:34:ff:de:2f:bc:4f:5c:52:94 +-----BEGIN CERTIFICATE----- +MIIFfzCCA2egAwIBAgIJAOF8N0D9G/5nMA0GCSqGSIb3DQEBDAUAMF0xCzAJBgNV +BAYTAkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMScw +JQYDVQQDEx5TZWN1cml0eSBDb21tdW5pY2F0aW9uIFJvb3RDQTMwHhcNMTYwNjE2 +MDYxNzE2WhcNMzgwMTE4MDYxNzE2WjBdMQswCQYDVQQGEwJKUDElMCMGA1UEChMc +U0VDT00gVHJ1c3QgU3lzdGVtcyBDTy4sTFRELjEnMCUGA1UEAxMeU2VjdXJpdHkg +Q29tbXVuaWNhdGlvbiBSb290Q0EzMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC +CgKCAgEA48lySfcw3gl8qUCBWNO0Ot26YQ+TUG5pPDXC7ltzkBtnTCHsXzW7OT4r +CmDvu20rhvtxosis5FaU+cmvsXLUIKx00rgVrVH+hXShuRD+BYD5UpOzQD11EKzA +lrenfna84xtSGc4RHwsENPXY9Wk8d/Nk9A2qhd7gCVAEF5aEt8iKvE1y/By7z/MG +TfmfZPd+pmaGNXHIEYBMwXFAWB6+oHP2/D5Q4eAvJj1+XCO1eXDe+uDRpdYMQXF7 +9+qMHIjH7Iv10S9VlkZ8WjtYO/u62C21Jdp6Ts9EriGmnpjKIG58u4iFW/vAEGK7 +8vknR+/RiTlDxN/e4UG/VHMgly1s2vPUB6PmudhvrvyMGS7TZ2crldtYXLVqAvO4 +g160a75BflcJdURQVc1aEWEhCmHCqYj9E7wtiS/NYeCVvsq1e+F7NGcLH7YMx3we +GVPKp7FKFSBWFHA9K4IsD50VHUeAR/94mQ4xr28+j+2GaR57GIgUssL8gjMunEst ++3A7caoreyYn8xrC3PsXuKHqy6C0rtOUfnrQq8PsOC0RLoi/1D+tEjtCrI8Cbn3M +0V9hvqG8OmpI6iZVIhZdXw3/JzOfGAN0iltSIEdrRU0id4xVJ/CvHozJgyJUt5rQ +T9nO/NkuHJYosQLTA70lUhw0Zk8jq/R3gpYd0VcwCBEF/VfR2ccCAwEAAaNCMEAw +HQYDVR0OBBYEFGQUfPxYchamCik0FW8qy7z8r6irMA4GA1UdDwEB/wQEAwIBBjAP +BgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDAUAA4ICAQDcAiMI4u8hOscNtybS +YpOnpSNyByCCYN8Y11StaSWSntkUz5m5UoHPrmyKO1o5yGwBQ8IibQLwYs1OY0PA +FNr0Y/Dq9HHuTofjcan0yVflLl8cebsjqodEV+m9NU1Bu0soo5iyG9kLFwfl9+qd +9XbXv8S2gVj/yP9kaWJ5rW4OH3/uHWnlt3Jxs/6lATWUVCvAUm2PVcTJ0rjLyjQI +UYWg9by0F1jqClx6vWPGOi//lkkZhOpn2ASxYfQAW0q3nHE3GYV5v4GwxxMOdnE+ +OoAGrgYWp421wsTL/0ClXI2lyTrtcoHKXJg80jQDdwj98ClZXSEIx2C/pHF7uNke +gr4Jr2VvKKu/S7XuPghHJ6APbw+LP6yVGPO5DtxnVW5inkYO0QR4ynKudtml+LLf +iAlhi+8kTtFZP1rUPcmTPCtk9YENFpb3ksP+MW/oKjJ0DvRMmEoYDjBU1cXrvMUV +nuiZIesnKwkK2/HmcBhWuwzkvvnoEKQTkrgc4NtnHVMDpCKn3F2SEDzq//wbEBrD +2NCcnWXL0CsnMQMeNuE9dnUM/0Umud1RvCPHX9jYhxBAEg09ODfnRDwYwFMJZI// +1ZqmfHAuc1Uh6N//g7kdPjIe1qZ9LPFm6Vwdp6POXiUyK+OVrCoHzrQoeIY8Laad +TdJ0MN1kURXbg4NR16/9M51NZg== +-----END CERTIFICATE----- + +# Issuer: CN=Security Communication ECC RootCA1 O=SECOM Trust Systems CO.,LTD. +# Subject: CN=Security Communication ECC RootCA1 O=SECOM Trust Systems CO.,LTD. +# Label: "Security Communication ECC RootCA1" +# Serial: 15446673492073852651 +# MD5 Fingerprint: 7e:43:b0:92:68:ec:05:43:4c:98:ab:5d:35:2e:7e:86 +# SHA1 Fingerprint: b8:0e:26:a9:bf:d2:b2:3b:c0:ef:46:c9:ba:c7:bb:f6:1d:0d:41:41 +# SHA256 Fingerprint: e7:4f:bd:a5:5b:d5:64:c4:73:a3:6b:44:1a:a7:99:c8:a6:8e:07:74:40:e8:28:8b:9f:a1:e5:0e:4b:ba:ca:11 +-----BEGIN CERTIFICATE----- +MIICODCCAb6gAwIBAgIJANZdm7N4gS7rMAoGCCqGSM49BAMDMGExCzAJBgNVBAYT +AkpQMSUwIwYDVQQKExxTRUNPTSBUcnVzdCBTeXN0ZW1zIENPLixMVEQuMSswKQYD +VQQDEyJTZWN1cml0eSBDb21tdW5pY2F0aW9uIEVDQyBSb290Q0ExMB4XDTE2MDYx +NjA1MTUyOFoXDTM4MDExODA1MTUyOFowYTELMAkGA1UEBhMCSlAxJTAjBgNVBAoT +HFNFQ09NIFRydXN0IFN5c3RlbXMgQ08uLExURC4xKzApBgNVBAMTIlNlY3VyaXR5 +IENvbW11bmljYXRpb24gRUNDIFJvb3RDQTEwdjAQBgcqhkjOPQIBBgUrgQQAIgNi +AASkpW9gAwPDvTH00xecK4R1rOX9PVdu12O/5gSJko6BnOPpR27KkBLIE+Cnnfdl +dB9sELLo5OnvbYUymUSxXv3MdhDYW72ixvnWQuRXdtyQwjWpS4g8EkdtXP9JTxpK +ULGjQjBAMB0GA1UdDgQWBBSGHOf+LaVKiwj+KBH6vqNm+GBZLzAOBgNVHQ8BAf8E +BAMCAQYwDwYDVR0TAQH/BAUwAwEB/zAKBggqhkjOPQQDAwNoADBlAjAVXUI9/Lbu +9zuxNuie9sRGKEkz0FhDKmMpzE2xtHqiuQ04pV1IKv3LsnNdo4gIxwwCMQDAqy0O +be0YottT6SXbVQjgUMzfRGEWgqtJsLKB7HOHeLRMsmIbEvoWTSVLY70eN9k= +-----END CERTIFICATE----- diff --git a/_vendor/certifi/core.py b/_vendor/certifi/core.py new file mode 100644 index 0000000..de02898 --- /dev/null +++ b/_vendor/certifi/core.py @@ -0,0 +1,108 @@ +""" +certifi.py +~~~~~~~~~~ + +This module returns the installation location of cacert.pem or its contents. +""" +import sys + + +if sys.version_info >= (3, 11): + + from importlib.resources import as_file, files + + _CACERT_CTX = None + _CACERT_PATH = None + + def where() -> str: + # This is slightly terrible, but we want to delay extracting the file + # in cases where we're inside of a zipimport situation until someone + # actually calls where(), but we don't want to re-extract the file + # on every call of where(), so we'll do it once then store it in a + # global variable. + global _CACERT_CTX + global _CACERT_PATH + if _CACERT_PATH is None: + # This is slightly janky, the importlib.resources API wants you to + # manage the cleanup of this file, so it doesn't actually return a + # path, it returns a context manager that will give you the path + # when you enter it and will do any cleanup when you leave it. In + # the common case of not needing a temporary file, it will just + # return the file system location and the __exit__() is a no-op. + # + # We also have to hold onto the actual context manager, because + # it will do the cleanup whenever it gets garbage collected, so + # we will also store that at the global level as well. + _CACERT_CTX = as_file(files("certifi").joinpath("cacert.pem")) + _CACERT_PATH = str(_CACERT_CTX.__enter__()) + + return _CACERT_PATH + + def contents() -> str: + return files("certifi").joinpath("cacert.pem").read_text(encoding="ascii") + +elif sys.version_info >= (3, 7): + + from importlib.resources import path as get_path, read_text + + _CACERT_CTX = None + _CACERT_PATH = None + + def where() -> str: + # This is slightly terrible, but we want to delay extracting the + # file in cases where we're inside of a zipimport situation until + # someone actually calls where(), but we don't want to re-extract + # the file on every call of where(), so we'll do it once then store + # it in a global variable. + global _CACERT_CTX + global _CACERT_PATH + if _CACERT_PATH is None: + # This is slightly janky, the importlib.resources API wants you + # to manage the cleanup of this file, so it doesn't actually + # return a path, it returns a context manager that will give + # you the path when you enter it and will do any cleanup when + # you leave it. In the common case of not needing a temporary + # file, it will just return the file system location and the + # __exit__() is a no-op. + # + # We also have to hold onto the actual context manager, because + # it will do the cleanup whenever it gets garbage collected, so + # we will also store that at the global level as well. + _CACERT_CTX = get_path("certifi", "cacert.pem") + _CACERT_PATH = str(_CACERT_CTX.__enter__()) + + return _CACERT_PATH + + def contents() -> str: + return read_text("certifi", "cacert.pem", encoding="ascii") + +else: + import os + import types + from typing import Union + + Package = Union[types.ModuleType, str] + Resource = Union[str, "os.PathLike"] + + # This fallback will work for Python versions prior to 3.7 that lack the + # importlib.resources module but relies on the existing `where` function + # so won't address issues with environments like PyOxidizer that don't set + # __file__ on modules. + def read_text( + package: Package, + resource: Resource, + encoding: str = 'utf-8', + errors: str = 'strict' + ) -> str: + with open(where(), encoding=encoding) as data: + return data.read() + + # If we don't have importlib.resources, then we will just do the old logic + # of assuming we're on the filesystem and munge the path directly. + def where() -> str: + f = os.path.dirname(__file__) + + return os.path.join(f, "cacert.pem") + + def contents() -> str: + return read_text("certifi", "cacert.pem", encoding="ascii") diff --git a/_vendor/certifi/py.typed b/_vendor/certifi/py.typed new file mode 100644 index 0000000..e69de29 diff --git a/_vendor/charset_normalizer-2.1.1.dist-info/INSTALLER b/_vendor/charset_normalizer-2.1.1.dist-info/INSTALLER new file mode 100644 index 0000000..a1b589e --- /dev/null +++ b/_vendor/charset_normalizer-2.1.1.dist-info/INSTALLER @@ -0,0 +1 @@ +pip diff --git a/_vendor/charset_normalizer-2.1.1.dist-info/LICENSE b/_vendor/charset_normalizer-2.1.1.dist-info/LICENSE new file mode 100644 index 0000000..ad82355 --- /dev/null +++ b/_vendor/charset_normalizer-2.1.1.dist-info/LICENSE @@ -0,0 +1,21 @@ +MIT License + +Copyright (c) 2019 TAHRI Ahmed R. + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. \ No newline at end of file diff --git a/_vendor/charset_normalizer-2.1.1.dist-info/METADATA b/_vendor/charset_normalizer-2.1.1.dist-info/METADATA new file mode 100644 index 0000000..c6ebd7d --- /dev/null +++ b/_vendor/charset_normalizer-2.1.1.dist-info/METADATA @@ -0,0 +1,269 @@ +Metadata-Version: 2.1 +Name: charset-normalizer +Version: 2.1.1 +Summary: The Real First Universal Charset Detector. Open, modern and actively maintained alternative to Chardet. +Home-page: https://github.com/ousret/charset_normalizer +Author: Ahmed TAHRI @Ousret +Author-email: ahmed.tahri@cloudnursery.dev +License: MIT +Project-URL: Bug Reports, https://github.com/Ousret/charset_normalizer/issues +Project-URL: Documentation, https://charset-normalizer.readthedocs.io/en/latest +Keywords: encoding,i18n,txt,text,charset,charset-detector,normalization,unicode,chardet +Classifier: Development Status :: 5 - Production/Stable +Classifier: License :: OSI Approved :: MIT License +Classifier: Intended Audience :: Developers +Classifier: Topic :: Software Development :: Libraries :: Python Modules +Classifier: Operating System :: OS Independent +Classifier: Programming Language :: Python +Classifier: Programming Language :: Python :: 3 +Classifier: Programming Language :: Python :: 3.6 +Classifier: Programming Language :: Python :: 3.7 +Classifier: Programming Language :: Python :: 3.8 +Classifier: Programming Language :: Python :: 3.9 +Classifier: Programming Language :: Python :: 3.10 +Classifier: Programming Language :: Python :: 3.11 +Classifier: Topic :: Text Processing :: Linguistic +Classifier: Topic :: Utilities +Classifier: Programming Language :: Python :: Implementation :: PyPy +Classifier: Typing :: Typed +Requires-Python: >=3.6.0 +Description-Content-Type: text/markdown +License-File: LICENSE +Provides-Extra: unicode_backport +Requires-Dist: unicodedata2 ; extra == 'unicode_backport' + + +

Charset Detection, for Everyone 👋

+ +

+ The Real First Universal Charset Detector
+ + + + + + + + Download Count Total + +

+ +> A library that helps you read text from an unknown charset encoding.
Motivated by `chardet`, +> I'm trying to resolve the issue by taking a new approach. +> All IANA character set names for which the Python core library provides codecs are supported. + +

+ >>>>> 👉 Try Me Online Now, Then Adopt Me 👈 <<<<< +

+ +This project offers you an alternative to **Universal Charset Encoding Detector**, also known as **Chardet**. + +| Feature | [Chardet](https://github.com/chardet/chardet) | Charset Normalizer | [cChardet](https://github.com/PyYoshi/cChardet) | +| ------------- | :-------------: | :------------------: | :------------------: | +| `Fast` | ❌
| ✅
| ✅
| +| `Universal**` | ❌ | ✅ | ❌ | +| `Reliable` **without** distinguishable standards | ❌ | ✅ | ✅ | +| `Reliable` **with** distinguishable standards | ✅ | ✅ | ✅ | +| `License` | LGPL-2.1
_restrictive_ | MIT | MPL-1.1
_restrictive_ | +| `Native Python` | ✅ | ✅ | ❌ | +| `Detect spoken language` | ❌ | ✅ | N/A | +| `UnicodeDecodeError Safety` | ❌ | ✅ | ❌ | +| `Whl Size` | 193.6 kB | 39.5 kB | ~200 kB | +| `Supported Encoding` | 33 | :tada: [93](https://charset-normalizer.readthedocs.io/en/latest/user/support.html#supported-encodings) | 40 + +

+Reading Normalized TextCat Reading Text + +*\*\* : They are clearly using specific code for a specific encoding even if covering most of used one*
+Did you got there because of the logs? See [https://charset-normalizer.readthedocs.io/en/latest/user/miscellaneous.html](https://charset-normalizer.readthedocs.io/en/latest/user/miscellaneous.html) + +## ⭐ Your support + +*Fork, test-it, star-it, submit your ideas! We do listen.* + +## ⚡ Performance + +This package offer better performance than its counterpart Chardet. Here are some numbers. + +| Package | Accuracy | Mean per file (ms) | File per sec (est) | +| ------------- | :-------------: | :------------------: | :------------------: | +| [chardet](https://github.com/chardet/chardet) | 86 % | 200 ms | 5 file/sec | +| charset-normalizer | **98 %** | **39 ms** | 26 file/sec | + +| Package | 99th percentile | 95th percentile | 50th percentile | +| ------------- | :-------------: | :------------------: | :------------------: | +| [chardet](https://github.com/chardet/chardet) | 1200 ms | 287 ms | 23 ms | +| charset-normalizer | 400 ms | 200 ms | 15 ms | + +Chardet's performance on larger file (1MB+) are very poor. Expect huge difference on large payload. + +> Stats are generated using 400+ files using default parameters. More details on used files, see GHA workflows. +> And yes, these results might change at any time. The dataset can be updated to include more files. +> The actual delays heavily depends on your CPU capabilities. The factors should remain the same. +> Keep in mind that the stats are generous and that Chardet accuracy vs our is measured using Chardet initial capability +> (eg. Supported Encoding) Challenge-them if you want. + +[cchardet](https://github.com/PyYoshi/cChardet) is a non-native (cpp binding) and unmaintained faster alternative with +a better accuracy than chardet but lower than this package. If speed is the most important factor, you should try it. + +## ✨ Installation + +Using PyPi for latest stable +```sh +pip install charset-normalizer -U +``` + +If you want a more up-to-date `unicodedata` than the one available in your Python setup. +```sh +pip install charset-normalizer[unicode_backport] -U +``` + +## 🚀 Basic Usage + +### CLI +This package comes with a CLI. + +``` +usage: normalizer [-h] [-v] [-a] [-n] [-m] [-r] [-f] [-t THRESHOLD] + file [file ...] + +The Real First Universal Charset Detector. Discover originating encoding used +on text file. Normalize text to unicode. + +positional arguments: + files File(s) to be analysed + +optional arguments: + -h, --help show this help message and exit + -v, --verbose Display complementary information about file if any. + Stdout will contain logs about the detection process. + -a, --with-alternative + Output complementary possibilities if any. Top-level + JSON WILL be a list. + -n, --normalize Permit to normalize input file. If not set, program + does not write anything. + -m, --minimal Only output the charset detected to STDOUT. Disabling + JSON output. + -r, --replace Replace file when trying to normalize it instead of + creating a new one. + -f, --force Replace file without asking if you are sure, use this + flag with caution. + -t THRESHOLD, --threshold THRESHOLD + Define a custom maximum amount of chaos allowed in + decoded content. 0. <= chaos <= 1. + --version Show version information and exit. +``` + +```bash +normalizer ./data/sample.1.fr.srt +``` + +:tada: Since version 1.4.0 the CLI produce easily usable stdout result in JSON format. + +```json +{ + "path": "/home/default/projects/charset_normalizer/data/sample.1.fr.srt", + "encoding": "cp1252", + "encoding_aliases": [ + "1252", + "windows_1252" + ], + "alternative_encodings": [ + "cp1254", + "cp1256", + "cp1258", + "iso8859_14", + "iso8859_15", + "iso8859_16", + "iso8859_3", + "iso8859_9", + "latin_1", + "mbcs" + ], + "language": "French", + "alphabets": [ + "Basic Latin", + "Latin-1 Supplement" + ], + "has_sig_or_bom": false, + "chaos": 0.149, + "coherence": 97.152, + "unicode_path": null, + "is_preferred": true +} +``` + +### Python +*Just print out normalized text* +```python +from charset_normalizer import from_path + +results = from_path('./my_subtitle.srt') + +print(str(results.best())) +``` + +*Normalize any text file* +```python +from charset_normalizer import normalize +try: + normalize('./my_subtitle.srt') # should write to disk my_subtitle-***.srt +except IOError as e: + print('Sadly, we are unable to perform charset normalization.', str(e)) +``` + +*Upgrade your code without effort* +```python +from charset_normalizer import detect +``` + +The above code will behave the same as **chardet**. We ensure that we offer the best (reasonable) BC result possible. + +See the docs for advanced usage : [readthedocs.io](https://charset-normalizer.readthedocs.io/en/latest/) + +## 😇 Why + +When I started using Chardet, I noticed that it was not suited to my expectations, and I wanted to propose a +reliable alternative using a completely different method. Also! I never back down on a good challenge! + +I **don't care** about the **originating charset** encoding, because **two different tables** can +produce **two identical rendered string.** +What I want is to get readable text, the best I can. + +In a way, **I'm brute forcing text decoding.** How cool is that ? 😎 + +Don't confuse package **ftfy** with charset-normalizer or chardet. ftfy goal is to repair unicode string whereas charset-normalizer to convert raw file in unknown encoding to unicode. + +## 🍰 How + + - Discard all charset encoding table that could not fit the binary content. + - Measure chaos, or the mess once opened (by chunks) with a corresponding charset encoding. + - Extract matches with the lowest mess detected. + - Additionally, we measure coherence / probe for a language. + +**Wait a minute**, what is chaos/mess and coherence according to **YOU ?** + +*Chaos :* I opened hundred of text files, **written by humans**, with the wrong encoding table. **I observed**, then +**I established** some ground rules about **what is obvious** when **it seems like** a mess. + I know that my interpretation of what is chaotic is very subjective, feel free to contribute in order to + improve or rewrite it. + +*Coherence :* For each language there is on earth, we have computed ranked letter appearance occurrences (the best we can). So I thought +that intel is worth something here. So I use those records against decoded text to check if I can detect intelligent design. + +## ⚡ Known limitations + + - Language detection is unreliable when text contains two or more languages sharing identical letters. (eg. HTML (english tags) + Turkish content (Sharing Latin characters)) + - Every charset detector heavily depends on sufficient content. In common cases, do not bother run detection on very tiny content. + +## 👤 Contributing + +Contributions, issues and feature requests are very much welcome.
+Feel free to check [issues page](https://github.com/ousret/charset_normalizer/issues) if you want to contribute. + +## 📝 License + +Copyright © 2019 [Ahmed TAHRI @Ousret](https://github.com/Ousret).
+This project is [MIT](https://github.com/Ousret/charset_normalizer/blob/master/LICENSE) licensed. + +Characters frequencies used in this project © 2012 [Denny Vrandečić](http://simia.net/letters/) diff --git a/_vendor/charset_normalizer-2.1.1.dist-info/RECORD b/_vendor/charset_normalizer-2.1.1.dist-info/RECORD new file mode 100644 index 0000000..4c1c3da --- /dev/null +++ b/_vendor/charset_normalizer-2.1.1.dist-info/RECORD @@ -0,0 +1,33 @@ +../../bin/normalizer,sha256=qSpvGsyLwjZW3uUUIySX3JlQOmSuDLIwdxOnC53iQiU,243 +charset_normalizer-2.1.1.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4 +charset_normalizer-2.1.1.dist-info/LICENSE,sha256=6zGgxaT7Cbik4yBV0lweX5w1iidS_vPNcgIT0cz-4kE,1070 +charset_normalizer-2.1.1.dist-info/METADATA,sha256=C99l12g4d1E9_UiW-mqPCWx7v2M_lYGWxy1GTOjXSsA,11942 +charset_normalizer-2.1.1.dist-info/RECORD,, +charset_normalizer-2.1.1.dist-info/WHEEL,sha256=G16H4A3IeoQmnOrYV4ueZGKSjhipXx8zc8nu9FGlvMA,92 +charset_normalizer-2.1.1.dist-info/entry_points.txt,sha256=uYo8aIGLWv8YgWfSna5HnfY_En4pkF1w4bgawNAXzP0,76 +charset_normalizer-2.1.1.dist-info/top_level.txt,sha256=7ASyzePr8_xuZWJsnqJjIBtyV8vhEo0wBCv1MPRRi3Q,19 +charset_normalizer/__init__.py,sha256=jGhhf1IcOgCpZsr593E9fPvjWKnflVqHe_LwkOJjInU,1790 +charset_normalizer/__pycache__/__init__.cpython-310.pyc,, +charset_normalizer/__pycache__/api.cpython-310.pyc,, +charset_normalizer/__pycache__/cd.cpython-310.pyc,, +charset_normalizer/__pycache__/constant.cpython-310.pyc,, +charset_normalizer/__pycache__/legacy.cpython-310.pyc,, +charset_normalizer/__pycache__/md.cpython-310.pyc,, +charset_normalizer/__pycache__/models.cpython-310.pyc,, +charset_normalizer/__pycache__/utils.cpython-310.pyc,, +charset_normalizer/__pycache__/version.cpython-310.pyc,, +charset_normalizer/api.py,sha256=euVPmjAMbjpqhEHPjfKtyy1mK52U0TOUBUQgM_Qy6eE,19191 +charset_normalizer/assets/__init__.py,sha256=r7aakPaRIc2FFG2mw2V8NOTvkl25_euKZ3wPf5SAVa4,15222 +charset_normalizer/assets/__pycache__/__init__.cpython-310.pyc,, +charset_normalizer/cd.py,sha256=Pxdkbn4cy0iZF42KTb1FiWIqqKobuz_fDjGwc6JMNBc,10811 +charset_normalizer/cli/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 +charset_normalizer/cli/__pycache__/__init__.cpython-310.pyc,, +charset_normalizer/cli/__pycache__/normalizer.cpython-310.pyc,, +charset_normalizer/cli/normalizer.py,sha256=FmD1RXeMpRBg_mjR0MaJhNUpM2qZ8wz2neAE7AayBeg,9521 +charset_normalizer/constant.py,sha256=NgU-pY8JH2a9lkVT8oKwAFmIUYNKOuSBwZgF9MrlNCM,19157 +charset_normalizer/legacy.py,sha256=XKeZOts_HdYQU_Jb3C9ZfOjY2CiUL132k9_nXer8gig,3384 +charset_normalizer/md.py,sha256=pZP8IVpSC82D8INA9Tf_y0ijJSRI-UIncZvLdfTWEd4,17642 +charset_normalizer/models.py,sha256=i68YdlSLTEI3EEBVXq8TLNAbyyjrLC2OWszc-OBAk9I,13167 +charset_normalizer/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 +charset_normalizer/utils.py,sha256=ykOznhcAeH-ODLBWJuI7t1nbwa1SAfN_bDYTCJGyh4U,11771 +charset_normalizer/version.py,sha256=_eh2MA3qS__IajlePQxKBmlw6zaBDvPYlLdEgxgIojw,79 diff --git a/_vendor/charset_normalizer-2.1.1.dist-info/WHEEL b/_vendor/charset_normalizer-2.1.1.dist-info/WHEEL new file mode 100644 index 0000000..becc9a6 --- /dev/null +++ b/_vendor/charset_normalizer-2.1.1.dist-info/WHEEL @@ -0,0 +1,5 @@ +Wheel-Version: 1.0 +Generator: bdist_wheel (0.37.1) +Root-Is-Purelib: true +Tag: py3-none-any + diff --git a/_vendor/charset_normalizer-2.1.1.dist-info/entry_points.txt b/_vendor/charset_normalizer-2.1.1.dist-info/entry_points.txt new file mode 100644 index 0000000..a06d360 --- /dev/null +++ b/_vendor/charset_normalizer-2.1.1.dist-info/entry_points.txt @@ -0,0 +1,2 @@ +[console_scripts] +normalizer = charset_normalizer.cli.normalizer:cli_detect diff --git a/_vendor/charset_normalizer-2.1.1.dist-info/top_level.txt b/_vendor/charset_normalizer-2.1.1.dist-info/top_level.txt new file mode 100644 index 0000000..66958f0 --- /dev/null +++ b/_vendor/charset_normalizer-2.1.1.dist-info/top_level.txt @@ -0,0 +1 @@ +charset_normalizer diff --git a/_vendor/charset_normalizer/__init__.py b/_vendor/charset_normalizer/__init__.py new file mode 100644 index 0000000..2dcaf56 --- /dev/null +++ b/_vendor/charset_normalizer/__init__.py @@ -0,0 +1,56 @@ +# -*- coding: utf-8 -*- +""" +Charset-Normalizer +~~~~~~~~~~~~~~ +The Real First Universal Charset Detector. +A library that helps you read text from an unknown charset encoding. +Motivated by chardet, This package is trying to resolve the issue by taking a new approach. +All IANA character set names for which the Python core library provides codecs are supported. + +Basic usage: + >>> from charset_normalizer import from_bytes + >>> results = from_bytes('Bсеки човек има право на образование. Oбразованието!'.encode('utf_8')) + >>> best_guess = results.best() + >>> str(best_guess) + 'Bсеки човек има право на образование. Oбразованието!' + +Others methods and usages are available - see the full documentation +at . +:copyright: (c) 2021 by Ahmed TAHRI +:license: MIT, see LICENSE for more details. +""" +import logging + +from .api import from_bytes, from_fp, from_path, normalize +from .legacy import ( + CharsetDetector, + CharsetDoctor, + CharsetNormalizerMatch, + CharsetNormalizerMatches, + detect, +) +from .models import CharsetMatch, CharsetMatches +from .utils import set_logging_handler +from .version import VERSION, __version__ + +__all__ = ( + "from_fp", + "from_path", + "from_bytes", + "normalize", + "detect", + "CharsetMatch", + "CharsetMatches", + "CharsetNormalizerMatch", + "CharsetNormalizerMatches", + "CharsetDetector", + "CharsetDoctor", + "__version__", + "VERSION", + "set_logging_handler", +) + +# Attach a NullHandler to the top level logger by default +# https://docs.python.org/3.3/howto/logging.html#configuring-logging-for-a-library + +logging.getLogger("charset_normalizer").addHandler(logging.NullHandler()) diff --git a/_vendor/charset_normalizer/__pycache__/__init__.cpython-310.pyc b/_vendor/charset_normalizer/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..d8a2f035d708265eab40e2481b3061f8450de8e2 GIT binary patch literal 1695 zcmcIkOK;>v5Vj}t^kkB35|$wCp*STYZDwEr35}MBWC_|xn+Zz79(=KS?9SLqw{5!H z6NUqVy}-}d9JvLg6%m5)7n~dFE2sSn91zu>$peuqmi(!!x~uE!dL^xvW8v5OLZiQFfs%@dZ!fL$k)_KEi zaL09c({1uucedE8vKF6n=lHxkU&uAK!0);DigleW@+EhPFT2YqH{3U<{qla`oZ2tn z#MR2Fb!wx&bYQic*^3#=a-M`lNUGNRiQt4qUs2(F{jbkC3@PkW!r;?LNCltA(TEC( z^3)VQp^Ew{5glg}STqnsj6sD&K}cCDVVq$g$Zb z5YrPNX(|%phe(hy*xBrF7WWcgQ33dPhzX|>juHVUVdRI!RiBMjm>|DI(Cb&>HKQoN zqsW!|5(w_eEKL)EbUTi-MP%edCXr*$0f3E-jmd+juk_;UC_}`JS+VU6#)`@-1AI@$ zl!T9N?X9hDU4EOt%74kv;qtruBLB$3t${$ru}xj1=- z%JckH2lnn#U%tpM-d^n#@uzF6nL6@5Ty3|n*bJyt-Y}!m5Smi!80Fga5vj!5&9OrL zf75lGJxsTdz$s=az)Zx!B<_=>kP(R(888a#nBYlm9A%jNAn`L!V?|Vy#17Wz<4~zo z_PX6+q{3{_@e|(N%cP*H``@H(bex`_q+<~cL)C*dzYUMxdGxL+xXqAb#U5@x-QRI~ zEb?hAX%BXH4j&c-p6xu@?jLLyHO5UzVNoMR*>PUuP_X*1ZNzq2JElJ-^`L9T`Y6?n zVv!OR>c({iwJUml+JRRMs9RTx#Pp-SKNW9!dzUCb)GK%Esnk`Zg}vM^>DlR-iN)M) ziOROEm#}XGmwdaJHfudpnhmIw1Oj@F8 zVAep(K*NBUq@re^ZeYQ{yn#6cchR3ri(7rveoNOp57X*-x;EvbXGj`N9NqXeE_IdB zA@RqzJluFSbaa(tXES+2OII?5c`E$t+Vn{iN`{PcX5Vx(_;GEQG#91i{eOmUMC&v g`eUS4Cjao3$70a%pAxACvG=oB#j- literal 0 HcmV?d00001 diff --git a/_vendor/charset_normalizer/__pycache__/api.cpython-310.pyc b/_vendor/charset_normalizer/__pycache__/api.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..76f060718288273edc7695e6a67c2e07228379fd GIT binary patch literal 11031 zcmb_iNo*WfdakOjUfHCY`zom@iIQ3(n-XP@m+{z^wT&iPoFNs#<#;;9u4=NxT3WAO zi)OnzF~Ug#1Q|p*43G>EfXvO9TTaO#mn=XG5oV$!qqr$OB~x3cFSvbrpIg+6=u4X!r{5jW2i!yY zA-ANL+(CU%v}c_mcUT{GNAwYQR3CN6^fA$%bH?2XeL_6vok@2}pK_=5X;CjYGwxyi zuzN&5;vUtHx|*)Jv-+%iOh4ux*N@ARCGDIr`*vl04o@d{CH<6jYUebb%Vu#`-j!u3 z-=81IAIi)4mhywaz;g!lX1QndAGOC#;G&iQkkpT^};1 z&6yvj^~GnP9k%k{0NN4rD4?Bt2AXEhegkO7%;SJ|em^wxl=*dFO<7a*l6k_M1DqvO zUY5$IACa!yD$7ysO@puBus5u-66IEn!14^&igH22vAOjwFQ=o_MQ+q!-` zQg7G+k8-yg-1a@giBiiJe7`D~Lwj z)#?{CkGU3Gv#L))2mp29`o&uptIK!ZeDn7ASFT)+N-MW-SKqjPt-5^Wm+xG;b?Hhp zL@moVFW$J(YfG$YWf5sijxObHYxt$`NT zb_^Dcq3SjrZdX^gxYdI_9<2LK$E*gN*)+N{UmvQ)$W}d{xrSr6EY>Q|oi>6Rw_U3o zXrVTD+OZy34&jj0iCi$c96U-xDvu=W|9}6_Z2J5!0 zD9_iK1#}!UDgtvm@EsDQCu-KaHK!R+ZKT00%Y_O&u&S%py79pFn=Hy&?=~F6_M!~4 zc$0ax9BEndS-^iEewXkI{t!J}3MDRcrLJr%L5ZhKc}L~xP};`E-j;t;4zuhi&)mzl zb3C(?<9XWdcq(uh1UwaKWIG?`O=Ux2*U-~%rl<$=zKz;IZ$_AFyu=UPD~Wl7d?=Jm zl}y>1WM;QBYglbr3RN@Ll-WC&In4Xayjj>82~`*wGLd~|@rM|3nO0OiWld_UVOorD zCgc0X_;fOUK#Wg|@o6zW9p*zNlt-iunf-1u=TIo4Ex((_3Z=Fj=Gz!ymNr!O6O5Lp zrBKF0Yoy`5?w4W}O}{!lm}v<6QYH31#T zL(5^|9xCi`0v8e!x;TmvN4I73=rrxfS$-;lMW5D(}bo2y%bFG*7=@1+W zk7B1yhEw5KI1Si&&~m1IGCTpwPYPX|+nMC$@MM_UR^qxj3(lrC(pdei@R(V8L24fh zkA<_;64XJF!qyXM;z@8px&InuFiSFcsBHaS!vB#3_hScmJ_|f&+Q)kw_h3(m^Th8E z^MeneJqr7fcoTfsIs}=In#V!2komnckU9=@(hsb8JX!N^lQqYZHBTN`^M93dIENK~ z#?OXx+cG$ea$16QNViXgr(#|N|B~<^#b&}%M{knVPJz$I_=kI9s866i=qV_Ngg(V~ z3H$!3wMdtz0egurh}~NDR9=an!ZP4qN${M9B_#bXL;n@Blh736=jcWXqpa`*v}3G& zk}rlQ%>^;@ZL@;Ypu8(=B{cSIcm}keB~5vlx_^tG3(r6g=fio-e~_%Qh*jpHuVRI8 z1o{Fsx4`QQyVAY$&|spWG$E1A@Y1691u;5{(ceS; z8GeQ%aE@OzELD;U8a~(H;CPy$F=JCBpDoZj-qXAm`#2h3x3pC&;9A2E0(;fLn8a(- znt_43#(j+SOp9r7@HBt*o>k*PMZmvar}@m%>_GEqSOE7hnAdDhEe1{Sy*17DOuJ@q zpJB9t(+5iiaJXt>-m37-7d;;x@YrL(Z)|C%RW|@_UJP$AzXrch+q4}=!zgCdxc0oZ z>iD%l^XuC4=a+oVGHUCDtq}w?mX;xBQZqbL>-yz1+R)YnV>--;*Sv^f0zP$W%?5@w z494wR6V5LHm=@}5mS)sBc(HVDjzGDV5j2@)ij^wb%DNv|T8$z2V78$dU`?$VaNo6C zf|sD4mZ%g2`&NKq&l80hgeS_h%eSvAYqxH%fT3_m!6qUFG@EuDw177pLVzc$ZTf7Z z?)aO6=M852SQ?J-m*6f|U2SsBgVPOZ7#k1)*XoeW8Z$g@nHBAl;c2!DhJy*TZo^{e zcMU{E3EFS@P0cm7v`x$)e%F1_sBJ-_n!!1R5kL&>f$xI+F5i5%NRl8y`vA1iz#fE;_3A&AsWADe{8KpaMD;%#Z`pv(bB z1z{Kr9un_vH67=>aTf$sCmvyU`J^MnA1mGqr;@nilpvD(YiseYTVYKh9-)+mLs~~b z9Sp!@&G+i|T2ln7g58E`LhQ?&S%#Y|N|=bP7&L7z6p%!1TC2^qHAJ;Bm6wEq3b1G+ zj=PvdqUump139bMv%nX6&@>!pE1ueV?#jD}HK8|&U7#(&w;C`h!rEXldN3F>w&t}p zpTDfVcdpGS+-|*cC5f%~X*1+NVcAwZeV%r5(U#8R9fi^ygt$b7gX93w&!z+a0aAzvTYeoE3#DE${#5Am1XGz`RWHUn?U~uN~BcIMM|ylfyB?=3zXM=u%;yVBT-3a=2#HQ#N# z`Zgg!7>!A-BX#DxB1{h|ufRwePVg!oIzw9qSk>EP|39n}@XQXczLZbwEKp?gR8UOK zDpU|F;$n%OE}*E>!*eKFKY%G>3<(PCZv_0>={dU`TM9~Jh`>K-!`bBv9qH}SI_w)J z2#q=&lw-?ZCd-bL1GZF9VU&q%y}H7-NYk({W9!<}0pcZg7Pqm{8$M11s3~;h^n2}c z2W+Kv{Z2sB9iz1+&PmgXGe_7sHG}M&u%)pnqQmh%b|m&P$$b7PP_JJW<{g{_5R5nu=2*Xs#}ZJqN>fm(C^91X!f&UX58UjvK?dOw3094Mh?(rZl$cK+=KhK}Q#kP^8)55MfcmAm*b9!$%6~EeP@|kKhwZk4TJ<_V8&LH=wCF zEVLUq8!_-@?V|8&Ze9jBY%9_|@C^pKP=segOZ=hX=Y=(XJV>*N1IEt^sTX zNz83DNrrIqykr7oHCNZ><|>a&VrB{j2+P97U9)-6`VLlZkOvBpeeps!30Bu{jIrnd zZJm6tt;Ok7cxQATK(V%9CgSWf88A@rUVAOhi2nI&PvrTQcGpU578dOc#h^q3-fOoi z-M!TH9O*zK)pmU-k%I)f1D6Qi1@x)X^1s%2>~(E(9|~fJlg%O1vuWe-jlH2&3r>ee zN(mZht*$9+-M$6SiF)88Xg(a&WJDKTk`qM$6)m>27nd(xzrILL+l!0KopiTW$8o)C z)HW)u7rul7;Y-0v!6K85!nW(ofptVmz4h`JO^n@-Z#Gxh&p5F7MeDxvMeAPmo7nnf zU7%DBju8sbw9~6Fu?uj@OxrZLRTfTia`2I1cfJVx9j_DM5uX`6 zEi$Yy$sKPo@jEKz=c0lQa}sb01EPG_sf*IWxX}gri?K;+K19taAjW2>I!)E# zo4(m}ENG<=K}=cSb(fC+xRQcRi-zuaHrdDc{7FXL5Y|gn*c1UvBeYtxqLgdA%f@L5 zy4;L1v4I65O&3E*(yU0m{Z!CZ0~?^?MHEpV3?rO=1b7~gRFZ#rfoaq|OT{rNj#F`h zia9DyQgI4}K8hHVZa9K!ER1R_iwyX?#@F>xT}&1?nZ4_! zKp%Sc&PmV2u7Exs|5p)sLe|Wz)(zW1(0rgH@aw$WG0@qRRk3^YzHYtwqCV8Ebk~fs zN$No_()E*-L>77<)f%zWrT2H5t90$9ABy>JcKb(gFfRazd`k0?dCh@UF@#Q43;=W2$Y z;+p!onjJ_fdpVU>O6Go+!3caY3pgo7r6BO2USKGzpBA#zGN6<&f_{bgr{v@u_3xF` z9xOGj0E40Z(9_BjC08P7%E;c30-8QmvKb|}H-P8Nr|SD78Q_fmctxz28IW`DD<7$S zIiiNXpJ%#j5JqZ7Q3xWa_$-sn0EdF22s#85;u&xjGf^s7=h<)Wqe5Rv82}ZS3kU>7 zP37J%9l%A+ln9r{O24|NDC*}*O8rbpAAyX%0OQ9~g%QFjUJXzOWc5k0kjzv;%U&Tx z(#BeZU4j=zeVWOV24o0Z%m-ihNLB@vI6Q`V18T1qV?^&$G(A!Gibc=?ELCs|Pbt!? zAt5h}Rluus+@gLo(ASX>c$c@qA5m?jg7)NkT&U{wL zWS|+K7}qDz?MSIN4%`>h-EkhjOQiU84A6b?j=YP+0Pb>9A#Py9OqkuyA!94Iep{q| zmJyP|F(N;xn?mX)xO#g@qYPf`-NSvc;Sn@&+QsRiINg(k9EiCn@DQ*?yhTZ?nj_Lr zaKH9XjR%zzVpN(~&M_N!e}xm~>3yFSxYip#N3JBGLs=Q1?X>@^K4u%}h|~t&-)QxB z-r{)sqPO+V0X`BBDL@x|yo?9pqbYAIzdwwdbvevE&Ck1dW585YNtL#dH(!>{OTqLe zGWqm<3qKPHnR2T2MgwHq56O;I8@Fv2ULF*DF|sD%%ntlAqryh9tneT zP{o1$f=HeppV(tQI%`=Joe#MqT^;^QR5&!)#5)hWxYgk)+<@)VCRz+UK}#vM~l5gA|r89a)P3Kh!vR{1A7Na>v)WZNz`YH>j^|rBAFa- zNfDF8(rhhtUwnzP2yn!34?>X#;CI4_*tMl_QM*t%7bi!*-E+-*AdbD)J~mJHEFE7$ z1pbtj4UnGz5=h0{yz)d|XesZt*%=5dQZ}JaLs4$iV5Fx(q|#F~blHk=K`!fV+$F@% zQZz}WL?Ki0$Zk?So9HOJN=-E?$SY+Y6*>y?zr;-iqfBU&-lPkVD1$%_;d8n8RW#V5 zi8+!0y$hrdCY}fwZF%(0PC#$v(DhPml%7`eE|;d@V+5}Qm|7&&#<7(?sP5{=xdJ&0 zbl9K=Zb&XOhI4WT#|9m(h0oM<=@T{0LI5de*rf= z1T1kxBVrp7EGe#;gcW3CoIu1vA}XR(xs3*je&X-EZ7hb|>$U9L{L;HL~R|C8lF1_GA+&U%S~Lt{umg@@31rkrQ;;O=qdO9EmZ> z8C`O0YnB6~wHHa+21S9swA%*>MS(TY=K_5z(5Lx8ULf+w{Ru@plce}xE^XQ{jyMx zn9Fpkm%>tHxQ477p&41OCF^EbM!OwV+)7k+tI?D@71i7t`Yc`!r=uBnM%L|cHkxzi zqIq{ds=M`Q!CjE;mGDS()IBQe)o?L7<{p#vsqlDo!aWh4bWcX7+*8q#yA(a;K83!T z|1_WWtNzm`w6?)#`0NA2Jz{2i`MeYSq#Sdua*D6;CAAO!lz(=#CyPJLPd_l-XXR|C7%}ZX*S7c> z{tWhYo}ZoA?K%D|S}*YDF!tC94J#ePo1Nzu(Aw}V-k`lybpDc@_dWkP{(?V6?=MH% z{6)U}z{EQ}&-D$h@$w@&+x3Q?*WZgse+2E&u)x&XhpRvSXm$PSd#f7_Bey@e z*<8PJV|61xe*Mb&J0D$nXSKQU(T{#~^TS)K*P2&vezblouiv_Pv$=8O%Ju8b4K;T) zx7~NuJS^!1Ni*ps-Jlh8dP%s8n^wzDlHiWt6kfdLW6a#u&bBZ7xaHsQQfxVCnE4Fm zc^Da|JumfnZsR`m(jd+kQHy$E8Z-4 zJYOxxG@ z^-s-#p6R^Ajj!|p3$!nFZhony7TL*tc1`jNV*#ClrEpsxcn zGr8T<#A`dJ(`ts(<`vwnXXY3B9bLT5@tc_!H7ZRFno)fn8^gVj)r5=tW;vhk)CS&KWB_$9)t(^F26E7BdVbJ%*N{cUdck}AS5GK~@MBPiT(%x$* zERC@lo&A>S)|3A8L)lDf>+;30)AGXP5-P(58Z|-hpO@dexk`eA;zlHS>?5C6)n?S; zy%2ibrj4Y6wmH8+FQkCbF{%j=~alAJ!YR7hIk##6EY*?ApnyyyNHScu>l}#0HcAdssn&nRszV>v(f-$ z01~n@#&y8YNe-ym&{92P5=xBzUrC8=NRUwGKGcPg*hUBgpjdV`I?))AIG*sGZQr{S zgu6}{#J3^ev;&M0Y0&D0o*1oiA!#Tf-`Wlmr#%E7-ode?+q5LkD(M2*v4H}h)?M>D zIft*OE7Y++^Aw*x0_FEXW#Ew5XL-jT=zkMQ+j|$PpIW zPiHugJDNDl%iP`q=EDdPmE3;c>w2-D_&M9!1i9G`=%zn^HH0S%fR#?sbg;&4 zky{_Y)p&8ElvfkrcbbqDiy6pVOrdD#QV|Xx@zH2=#3T+*`S&p)A-lB8>X z8Flo*@Wc|J4ENF?m&j~ko@j5Aw=4Cxm}@a;6I> zEAtY7(Ak;IELl6BmBjg-+0-D8Hn3CUbFHm&gPRZR%q&)|WR=W5r46cCm0MsZtKfZR zW@Od2bV8VI0bpUh4>Vrk)vo}%U~T3DEdx)KKwImtj=QEY&Ne(joYeu51B7mYO2^K~ znI!7eCKQmwL+~TzdmNQNfZ}~pCLfxCDt-*_xWhO=lmvU&RP4$)ck{CF@A%-D z6I-H{NL;if>3^iSEE#|RN`_Qe5^TArLRjtsF;ck5&5(>z5sE{bmcsiREG+kXL~E4u zk{9nP+kYAD(gyQV=*Qv}x<$qTZblu!JJj$h3U?vt^hC>_00jvb?!xfF%>!)}*J$D@ z6%NflI_heI&bGFjlBE-)MfjmMe4PeMqE!E;Kp&tpIfufq>THeyL?rEGaLbH{=o3&> z;^Lpx*$fjd2IlpSK>Q5nKYDcX4M3rg@G33+0+a&IRs(CAqHu7JQ4mN$p#=1jf^+}` z03E>Ir%+FFtfif!s*e}2kMPmh*MEWJ1HeZ*0#&MZUXnfFtKew**jRwm@V*#hrvzT* z`#MTM(^~+NK}ELNvdt>mswqNExDy6yaXYJkV(9o~+>9!}=9}!kO zO9soSK;nfWWg@R?vvAb%<>@tiP*vH*;mKu;jYr)8g8|caT44vh#iYb}dAT74*`NFQ zKrZgx@q*BUO-qAce?-tAk*NT*f4PhpPev-$kG-(x%P3MjM_OM(^osZeEc%}KT{OUu z$)}6oL*X7DnL-mn7o9s~9Wq=#K9(XH0SPiKsq_?M6O-nqkC@bNDmZYDjg~}Wr%fSw z(J?>Pp{BTVV@-0bTQ3$H!vuF;Ei=}12+;DU#@6X}x)f#v=`P*`P$>Lg;Z2iu6t+DB z9#@k*9wEAf39Ce4!AjsD!_vU0Crp+{5a%-e2t~U3Oo=_2A#P|eo&Ba(7C*z1`J9TW zIYhJ5BR!sgae|W(r2IK<0tB=fF~Q3S&e)!|4^IR3F}-7`5RAfG&d{>BV*qFj2`1l)UoLbl;IA!*hzaa#H^u@<7F_y#Vu~BpPf>8gQrWB&k?-K2q5@m1S~PoFQ6c zBIHki9xDr7y|;|Ha?OI6lJc)29~C6qD=MTbg7Hm|SI>FZ-xU5`1n6Nne0F-b17eG4 zoU&PDYRcqkA==cN(r|8qCyzaWhJ_S2I-#FJB^3>()(#4Rc$FSg(BSokm6wA=zJ$u9 z%+f)dVdt(da)Ta{TX)FH5*VF_KGzDpU974|6y;Ogx@;NpUYVwG=Xj8`U}EHgWXoYS zUXafmrHhho7^MG-)skfthGkPCg_IYb4#^k!iv-LQ1L+s`8@o&aDvel#FBEM|A!Gy=Tr;%F&p|p1t zLxxL1R#NhA=qs|Alqm)OHM#Xwi5x`#kLB4+hWn9^)LU_eh)KYORQ|Z2yKoV7Oe3&u z4Kv7)AoOY+_@!p1yIr5qpC%>9`+`G55sIwy_?!umDBe~iAxYShZ7q;EQiS4oVbDSN zST?LtQu00mv=I;cDJCHlH3h(v19N+k0^5RJ6XHJ9-354+12C0upmLFt=15+)2uqZq z5psz(`x>W-6GiUlF=Z5`umEcl?~{yiZ&FT~lAL%wEIH!0;s$O6p`p^go1@w&FC~7A zwlkO{K18K|;eUT>!Dt1sRS?kw(rAe-G*R-M^w6y)z0IboD<||5>NVv9)OJ2agW`OP z-~L#eg4}?gY+@6CfLx z${ZTuuZl^B{$bg5=5xEo63(-#Pg z9y*d_MdD=<@~$Zo^tJwi_#qDI)`YIpdD4~8br1pr%_tqp4nkn@E=EYDdstE-@CRtf z^&6DvIb?lf#y1Rnzp)=;Yh)T@fn2el;+w{pBM=xjc6)|ypF!~! z?cifn`e*;=9gNJspoNbvtMHZ3=@Cg~Vry9O{|pNov<(RhXTD<_3J(+<)N)fgG6I2! zydSw7^{H}-*gmnes1u8Tny0CtU`>)M1ti;a`#g%qjP$mmLk(Rj2wcQFDBQ)Q*KXt6 zBb0MIo^xro(_3i8HmQRa`U#n+L#bl@}0VsPBxo*03k6%HQ%V4P@$bN{Sf61!NSp|1g0 zW7O6g-xCz~<`#XtYbEMS&{V4vhAON`lyEE3XLdSaB1r#o3$76)$(_0d7g>Bj7Q_Pt z5mZs8g22zUkaqIZM1~Wt4Hkv;YMjcXs-TZt>W~O4a~5$S$&rPxQ$C(FN3CWr4N#w_ zv2`jIs5n9eeVT%IOvORQUMA6HZZ$VHv0a&bPyxHy4m_6z4d;H(jrL80Y literal 0 HcmV?d00001 diff --git a/_vendor/charset_normalizer/__pycache__/constant.cpython-310.pyc b/_vendor/charset_normalizer/__pycache__/constant.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..6223fe07a2e9e60cb49cfb68af8bd3e66966b05a GIT binary patch literal 17419 zcma)D31Ae}`Ja6xo6TeiA>48;r$h)Ofk05ioRC0{H5*V?FibMT?jw6Sy9;DRjpD7f zsI}f2@2a(8t+j`3>FHH1-n!a~J*;S}RI9bL)&KAN_9eSf+rQG8-|zc<-@JMAX5RbW zd)Y=ukJdH(H~Qs`y)UfOv_FuM``=g?wK(F>PSCUsnyHzNkQR3M9bw@Y;Zgok;XHp{ zINzV|AfE_1!v+2V=A%NcaG}32tow`D&I`H2qy3}9#s1>(82^}XiN6GTzUd5&4VU^$ z9h&6`XlB8!4%21jS@{8B32Rh9n1wgw`^Q&H& zO$K+b(yYnm=sgbq6t;`u8{Bf!Ulk25DQp9ns| zoWy)G_#|@*^P|A0m{XZg1D|S6XFdabx;c}%2YjYEi}`HuS>_z(bHV4B^O(;EpJyJ; zd;$2;W*PHiz{|{q%ol+#G|QPU1}`_4Fs}e#VpbBzvsA&VG?%hx8TeAOn)!0@YI6ni z8t@h7O6JFcA7`#&emwXpb2al5z*n2K%99_nE55(7n_$d z{|fk}=4H&k3VxZnm-*%3SD05a{~Gv}=2gtU4t|w+HS=r0uQsnG&d+ll>}$>I*>?l@ z_2!MtZvwy3yqWnR_|4`m%x?w1#k`IA?cleWcQC&b{0{Rj=HCFn%eYkn_cH$` z_`T+R%)bSGpLsv?ec<<-4>12W_ygvH%)bNvp!pE7*>>rvxV&9L!e`NlI`F`-9m_KFyGw`39KWF|6@SmH%Wd1AgUz(3He+>Ll^Ks@+ zfIn_N$^6&gPnu6Le;WKL^Eb>7fd9sPhWWGL&zR3Ke;)if^9ANFg1=zC#QbIOm&{j~ zr@>z_UuFIp_^ak`iSzUP4)$-&*V%Uv{B`pU=D!Dj!~6sDKZ5_se3SW~!QV9BVtxqx zE%R;W?|{E;{)PEp!T(~u%ltj?cg@4h{|0{8e4qIT;P0D%XZ|7h-_4Jh{{#FZ^JC`! z1pnAP!u((0N6ddS{}1@T%}snC<~NQ#>xUH$0%hXE5|@tq?B@27C~98lqIYzhEk!FN>(bMR4HXC zD^*aIDW#f~Wl)wYWd$qCq0}g4B`Y;hj#bKWtQ-qvl~RspWfhdwN;!d*)lh1cQpZXy zlzOE!uu>1DkrdTxO{_LTU8CaGva$wBvr<}EX@;^+DeGBT2c=ahZLG9HX;(@IEA3Fc zN;#1gFO*KD_*m(L(xsFQtaL%ysFagf*$CxirEFs5WGH^6oWhD9%4Vf(VP!LvQ?e#Z-#L$~GtgQdFx2Sq(syDsDR~5=x&^Lag*b2`eSSN*GF1 zDKS=}P)<{d&B|#|;z~)d5{Hsh$_`d`LfNI1epYrtNh#%YR#H%QE9DGUc0)N+DQB^A zCX@lCoXyGrlyj7_hm~`ooTrrYS-Akpg-W@Il?$O_FspobSW& zEp@N^S=k4LGdmEu9p?vee1~FGt3AZ(ccF522O__dg@bcE5Luoq9GvNa$n#|3;9L(x zwkHb*XM7-XK3O<8?*ozf$-=?eABg-<77m^R05J=|`B5B?sV8}ymB*kwp_C_Cc>>C> zmGTrTPebAP01z_*vT*RM0El@3&d=d^US0J9E6+oDQ7JF6@*U{m48AxqLhEJ@^2{rQOYN* ze7aX;<`6&!6j(R}#|WN32r~~#zEYeVlMkhU6mB(vH7H$Kh(lL#MXb1?j8;l9E2E)| zQA!CbW1x&xN+~Pjpo~|_1XjjF$;=OgN%I3?PR21s#T>;7sne7)ot0@&W+-JQD;_Ab zlro!@Sy1LEWiBgopv+Usd{&NzvOpP} zaAY#LFe!t>!jZ|~f>yL-;mBlgVNwPc=E*oV(cSOJe4l>Ur|c2zI|Uq>oB3w&EsAde zKUMK=@U4m);KDWmbuk;}H zO^TpPt8kC-&#-1%^i^%g(RZ$9&9Y`&1%q>L(e^m-PhfXtZqBtKTszO23w1v2v*4OA z?X&dKr1I>5XQ%S)0`JF>3ZSikr*q_P6?q1fGgahS zBRm7}oUJ_PuxF3D=3KVUQ`Y%xU7)NB*}6zs7qfMVvMy!oE6Tczt*?^BPr8@w%a!*E zwyspx*VwvBSzl-CYGuVyPg~XV8unbPJlDZkAVG%*-o$@Gy4hHer7)f`x!HO;-5471=uf{{R-?+W{-hA&g==WCz<^k z>?vkXgZ&1_0UXcZcoxTVIG)Gx0*)7PyoBRr9IxO=<9HRvYdC&;!x*%~0&a)#!)@@p zRa%f*_VwEw{xWOKaIZY5^f#a%lcWD$>3@K}Fh~ER>cxLTUtEMfSqdyyee%s!bca9t z7c2WMwh#HV1#b&YJ4744W%+4WeMejOhORX=X}4mP%e(8Fa;?^^wX`bN2dlNI%#kiI zLehv^@iLLtTh_LBbT&2A`I^!Nz0q(?hODx@bY7$EO{DW$Wjv7{<+Bp${0$KqjT~}N zB^>FZHJwc-ZfI(6Xle45<;U}&E?lysW{9jDA`6Gel6by~DQD^2%Bz;*Ve*rSZQV5) zSdlIW^iH4-v%XaEJLN|~2edVI-PEM$ePNaB!&7D<(`!_%}YVMR>KEU%LT zUnJK{FJ5G-xW!wSiH)O4<8mK~lYKFxS4IM!wx}t$Nz3-MS_xDmF11l`Pi=^Xdt`(H z8l}-|%Y^JTLY_9m?u*M9MULxkuI|yBBg{Yg}XzjqA z0w`7vK=2pTTaf@haH-*sCVto2q#aK71>scYcD&#OyhZTlci6JukOR!SjIazz%?;hz zWrdP~q#PilV7(EE7^tQ;8dhPO5i$13+)<;2Be2A)GZl_MrAEo`Sr=5H04&}F2wa1k)3EscC8PF zEn8}n;VNv4Mgma`HxaoHc53mLs@8B0u#h z$%CYf=6mA-!#&XuI?qv5z4{~`+lpJ#12cu%N)O&sSneZp?*HgoIrW&z1>w8mf(FPe z^d<52vb~?|{CXo{^hs?RxUBTLvy;5v^lXvA=P zZ9e1)BkMfeQI5uwyBbkskCBMW{V-E=M~04Q33VM(-C+uyko`>XWSItpPg_70skaTJ zAj{)5D5D|cX=VTIl6pBnzAtmLWxEQGo!s*^55ly){gy-6OJES5=L$6mJfa0fF zc~WY3fR5UT*+%W12>X0aDX*7<@K9C?C&N;^3sDn>XO~?_7(-1UJ>>iBB(_m%-+=5! zeWD5JX~(ljSwYeiv`!dbOG|{3(TD-Gmi#Vn&DPTm(l+A31crfw34Qo+wuL%t>l}SGc_8%44q_vB3Ywwk<`9PWvFM)eiQp%g8aozfk%89&N0n05JcffVgVz8&uHLP zs8d<>+Hwap&xSbCU^YT~4H3ny(VZj2gAhw{uc)&vbm@OWp7yyu;>q?1sr?Hf(>Zft z-iuGfi{yvJ5~qEYX}uIPwT{;nU*M;~?-N9f+lYyB<~pAhvU)l9mXN1-qh)9EXeM=g zNF1M?6f_&5ZEAf~K`tIAM|A6#Tr< zNqnZaVJbo5gt|ztM8kSAbFLxZUh<6@@(pG91Eh{d*TkAW8pkp+j#<8NpqI7wqiPX3 z07DM4(m<^qkq2Q=o6>~E(}V?TV)*{rD7f^Fkm+ejV8YWYDC_2&-*4Nz99um;(v@DagFjC{&uy&)S@ib%Y9}R^1W5`DXaLGaPmkj$c8;;8z zcxs&rU5`0r6hkZ4w_72k#!{R5qDg#<+_zBvz_8vPwR7}AE&vN~iFFE9d_M#%i&1Pr z-3}|xi*#72i7k=g83NkDYoHXW_*QaG_^dM+!u!IC8on{!xDmpP50_-reWdb7)0MRQ z&=#5-xAfwa8ch{%PGaTGU)}&Yw9#;k??m#V&yLp*Lm%_jV)zGe@;foR42H3u#}5_d z08TW4kklXtU?6=(Z38WWw}?cdjU|6W(CEXf^pfFfGlB+^45~~feQq|b^$)^IO;T%n zv}G^)%}}mGm&7k2ai3sxJJxhwG78#~A!;!>088#8sc?NTX&O5*HIv#n3R#OUB7t%S z$jZag6{G2Rsx?luNni()3EY`2pEONMRRa?cpiQI;D0j=Pp!iyb7S*{)WPqabyNo{M z=>vR4T`-EoKM5t&;*=^n3D1U!NdrDKIXIaLo&veVkEvRZk-~W7J1uG0__mIM&x;e< zBifIhrzn=nRDjn=;_8T}*+|O$6r@c>P+>hDsxO{ITWHfD#&Dvo9W)xg`2Da_qubCq zX)d%jib;dirXy@CPX5A%B>E86YpAG)3Y?4RS;OMcc*7%W?!0q=;wCp4cBtRe*dHa)(6pzZ{FA$^fY6l6p(u%;RQJmxEvcF*c!svcpO=VKpP)vI?Gh2{e3YtJWHYX?Xp4QRCdbsT8 zQ1(`wQWF}YNxFZ)(-}2~1`CXz>41g5q=8Hk)jxe70D zUz+ZaT@{XK-h;TZ0w;XowD;>-FZ+zXB);&s;5dkrKflhT%|h)ERTihzd>)y5F*(WE zS;(0!4L{zyRIB&6Y$LcG-;t*ayYqO{hv}v`rQD6^;E|}(2T2<3#r7n%1ai2E*uO#Z z3@>~}K7P(;@;<_{>!T50W=_-xh?@7`m(jG*ky%&b#vdVeVpAAvhhFS*duZgb7Qo&v z%cPf_<2vk!L7V9KT!uFu2FNp|3(@fyzPZfm%!p-Q)j!}btqWmj!Mq~pLmME+l+W&Y z3@-q%{}2BcZc{X1P7B}MY_G`{n;Caoj$D*0rx~@^v?KwAHt?H#L@x!IE+Kqr(Qc`m>5(&n~`@ zx7FWC{Q3MxkaST_c0k(7?Em`nc@FL`9Nr4@j~?;)V#=A>NW(Ij_R#Rx4c;sByR$Vg zLN+%0wDioO`udt0I@%lSIyYr%-o3tQ(@7njjj2-?oNz4uhrLSFEfOf(4FmHAJ8mU1 zJR_GuK4tT<$9uM%Ub(2U;*5+vd-Ks-PAFS&icy}bEB9BFuiRYTy=7spuh)TE4E;wO zfA-NDaKy21ukFSLg6X&gKf+CFQGK^&j@seyX=QoserGr8WA(0CP4Q`G0@HXIPdn{s zqPucwIxpPQ8^@pYTo}IMJ27zrckH@bv$4me9jRZE2*;MhWUM@4*a0h1zU(wvZS7dv zyCfugmc;rK*mz!|p0PVZxgjJ|mc4|!Jf=g5#j*ahYZb=79@ALuMWy+#f5n>1VPo@3 zOBc7)wbym~Hh8@qon1|h>G30Nd=nemyVCi+v5KWD@MlS9Z>+MSYB^)&vI=rktyoG> zT~T3Uj|UHIV>d{%v6G|O*tXH^YMe3`R8>=C&GO~!9g3u@J`-70U6C%7@n}s=^~!Gi z84`D`s;*2s`%;w^%WBdEu>_RrWy(=iHY%+TMORj5uUwff2x09S>Bgm8#L}#9g_4E} zS&>u3Qm)R3`tjrNli&%Kp)CsdQBY5MqH6pJl^!f(Ew9X2RT<#ssaaml4e|LxxsBGM z4d7ZsO~nPSu$!q_u$`sZ*tOEiM%fgTqmo};l5tU3=7JV-<#TEFI#Sousdd;-+K``O zKkKLP5q>Ttdp)tw`}rnZVLFw$GWX|NbJh5P_;w@fl+*AP_>*+@O)j%nqoC|7TV|gC z+pZ-s8&#PuKzHh1UR7ax;VE<49TdfvW}}v8i&>g2hNDo^67tb#*p|^3#OoG04m?!M5mMJbTXY* z(aDEXdg5os5MN7MOKV*xzq6`}s;cfj{Bgg<*HKPJ`T88k_E?T%oj2{YlD!n|Y}(L( zz*Iq3i?5vC^f=rn<;0H(%IQ}M6opGUimvL5%9?ImwZ5aJro1!z<||V=-Ihj`@?2h( z4XMrv$r(wO=g7HyMfS>?oRAuO{BQ;F^9kSdrh<;I_p|r*J>*yl<*rvp1!RV3G!qZi%eg;N z)8QWJi4DzlosCUh$VZ)>O+GKuKYo(Zw0aCKJmT1W#Bs_I$Ce|G)khr1A92h+;#hRV zQGUcR|A=GB5y!D<$LVRu8AlwejyR4>Ps1#yt)so$SGT6AyUy3p($Y<3*EMuCb^16% z+X<@I7OGPI_Gr-PNxRl}bhp>FHThQOkt%|zbRj)PurJ;lw@>3p)Dy|TBg`iYlZi-L^38;GYv=%F!Rge8|?xTSO-}okmlf z6KiKH5x1!&ZT!Diwe+ZX!cOP+^keHfJ*K-Gzr9dv!FYGKjh`1FLSpfW9}{Ty6f*O9 zX<^SLVLnd&nVn7D-VUFyrM|VPd-$hAE$xjhnP2;)opCHJEHmxgCTV{vofqQYIiVtH z=ME#3#3L=Cl1GKCh+RSD`stLU(|L5dfKHd-vM|Izcrzx90aFWo7Q=mp}Rx=Vbl7m9!Ay7)*h5+CYr@ppZ+_&_ff@9Sg4-}Dl3 zSRb4Bo?a^6)yIjy>f^;<^aZgc1^v&XSeT%qFKULhScZ*x}tzu9&#Laq-xJmC7 zH|nOiLAS*9`ZnivdO%#O2gNnI6j$rp#n<&dag`ntU(>_lNi?8SjajBjZm*_jh#qOQXi%NEh3rqUN1tlqQe#z$fIo{}@gIVER_ zv$eBI9NO99Q=kBT0vrYW4=@k-Z(u&~UqC1D2(SS7PoN9hps&jZVW&jA+$p9L-fJ_D=(9spJX ze*>%nJ`G$7d_-kM_@JZlu;1j?Vz{i0#z{h|qfsX=@1^xTxTu8}=>0t-wK`0lXR51H1{? z3%n6%0&f6X!0UnAfY$*7z-xg);59%Ayc)P2_;p|(@G4*k_%&b{cqK3byaE_SJuU~v zVDAN<2K*|}23`h?1HS@H051h5ftLVx051ma1YQK(1-ua054-@F0-g^%9e5saH}G8G z8NfZjGlAy-&jO;~gE_RbQI}7dqxVBc|A&qd032fgI7R_*j04~p3BWNHfMYZO$9Mpa z5dj=y0ystmaEuG!7#YAZHh^Pv0LSi+;$-s?Ng-$=OlbRgWts{aHc9KkXtqF*;-xf{8;7kRlK`OFcX@UvDPL_yw; z+Ibj-c_-@F{Z`h^*P=Dc2U#!gNBw*d4IsDWB@s$ju1in)ps!8bYtA)?=)@Nt(S7Vk z8y`7hP4pf+q9^;OUUV69Uko4*$j?nIUOcz>Z~ZQ7QfRHkE@D%La8DN2>cS$Zso z%v{;|#m^t??mZmu+5AaM zRrjG=19e6FXAbPSx_8Lbr%Si+bZ?2`Exn~L!asOOd?)@3F4yIF668ck%`-WTlLgPE zo|VFCcBPhy=6WW%ERs^B#gvy5D^JryS#U}iN5Y`k;=k0qo|W@V@O{bivewyx@5jl( z5zOCA${dAC_cOU=P4AuAE8<-8qcqESPDSBV6N;uhD)^B~HTgW6$wD4V#jCQetquP6 zsKlA#MO@a-yr}0@RVpnJ#Db@KXq`Qrr8S?-i-dZMgBP+=GKuL}T!;%{&ueVylIQ7E zLCqKC99~uV8RbF7b($@1@T7#BtjUWglX)%+jl040q*T`7WUi1j#nS>ixEFL=oFcBW zxG3NP+g!=KJdCrgu6^ZB6{|S68KoAyLzUqVk@+Ua^3fb6kQAHzJkHZ%mB-`Td!JVb z4mQhu8zmKJQ8n+?9Dc|^tW=E1r=`Bbe|zg>WZIt;2L*C$oGDrv&)+{Zt+}3z-!uNW zPN$g2@T}%0MAXxHJe8)4yH8Rll*hoVzhCVr$cRh%ok)Dltz@8jMeo zsQ~Vbzb|pk%V5fKzg;cR#l<%DHs*bN4i9R(Y4fdWVFL6SQb$-?Uk4dmZ^<{9z5@%Yg^&Kixq?FGW&K)nfa3+uTL5;{J!J70;) zgZ3^~{XWQ9R1!!f+{Zwo$On%Pgymb{TOzQ00KP3k%eO@bc+oXiUwsQ%zvR`0BZ}!B z*7NUzXy*wNK*^^rbF{Z~QfJBj$bJv-f98&k570e2O&ZMMD`3CTFt&?UJb}C&)$>B~ zSjn%1%)4|$>QtW^!}b3)XdPShLce{f(z4!KUF~agrG5-c>L(yWU)>=7CXp>7 zG%sqK2sM5~IB}%-fS8|x9KZQ>1!|nzbbc%UA-Q;!e^PvO?*EN%_D?1JR_-j~_EywBAA;@j4dIKbM2sGUAYz>&z zzjRj|bIu?_y#WD#MlP-L)qG`3HBvu>;zEsI_#eS(*LyHKeJvY`WtOiAOGgu zHc7+p*bX!S&>F*{Xr`4%geKc~ag{bnqA^hCnTkUCFyd>VEr6Qc;iXwPb5={7h1CSq3B5V3+gw7_r>h{<=yY8*OweGK9-}L_r Dy2Qyy literal 0 HcmV?d00001 diff --git a/_vendor/charset_normalizer/__pycache__/md.cpython-310.pyc b/_vendor/charset_normalizer/__pycache__/md.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..b00ac874aa84788dcbbd9b3b091c537a68fb90cc GIT binary patch literal 13935 zcmb_jYiu0Xb>4aG?1SWLMN*=k)>xKouM*HZ35-XaM~v0tEfh6zGqpKl=DpplDIduRekV>|Y@Tsy0@? zbMEYec{o3q40@yKoS zmR3E2c8924;ZgCVIP4u3k9kMM5$`c^z&kpZ7e~e8x3g&XxOieFQ>m;H#VcA|sLQrf zb88D;MUTzb{VzMotb|5ob%ebciz5u>1?GOm;BIiYc(&3+HT~D zI8XVo=KFCOZ#6gcoa?Ui-PyVqTU2s&F&@IxYcwOj)(qkTG7D}n->!4{f-l{9H*h(# z=tk}$WvJJ>8~Fi`*J=kf8V)mwhfx!HEmyixQ*vkFQe(DRk8`Mq7F?gdXa_Cn2N7d2 zA~E)LFTpwg{q%8phW3RkGnZ}e zX5tL`PsWz?qP7fbIws!z(L3#&Nu+y3 znke&YT18tv%>xtGG!@zK1JCy7k`a1c+TlX8T^IJOXU}0CexUHB&+cmR*mN^G-$l+7 z=cH`PyV$s)SD%x6G1lFTwDGuq;&{|(9dG%qrz2O+d(qR+UGty!u0LBlUiW8@x0W!U z;5ZE$dXW<}Wy7ue%bq;m5XV|eao(%@^FFrYA@p^RCS;n+`!}w_v2MHRO(`Jv<7>?R zR=#mah6Z*oF=ng#*7xnv*2Y``$gn-=xkK!#h=R8jw#aqZz&Mr@+Oqtr$ zXnngsdhf1xceXF}X8Q)MG_Y>k(gUp-SG5zVj3(m;e&oA#JB%P4)}eV6;&wBHQC()Z5*v}mMsy)pFh@@X5kz~(DDD91{mV_w3ai)aC zmr$eD#7dtlHM*WjG{s z2+kd`eYx4Z;08-GEbcGLH~LCJiBUzd4ZDQ4KZ&o92qLsj#!*n?cU@#q0^ts5iVQ|F zrX_K}R3#gaIs=-=sWsa{6puJc-z3?x)8p=>WE_esjGUhS;Re;+&Ybih>APS1fpeoN zg-qKgSaISb$2mc0lL=*M{HGVS<;qrMIM)4|W#|T3)+NWiJo@cucQT)1(s#9K2xO?~ z9@c3xg}2mMe0GmI$!`aju1wv4hJhY`yBs=S!du{s^B(N%5Hkk59sNWZSh zXCtGd-O}U%Zil_Z?aW{T=x0BLA=%ELjm2%AjdJu?H6k02vhm+9Q%z|!^4^JZBq z>gv5{=sz!Ii~91>EmtvBGIg9_A-`ISNpdD`Vpo)HO4t*tFdT!2hHx$ylIbN zhdsU}ZX3lhA=X3g8Dy}8KyXo)IbvU0P$YeV%lBtiw2mf>#jM=j(PprKYDtLgeu~7u z`Dgj}kEbvZo&(Q@CQ{K^k5tE5raR5KK`xaxS}4H6jHKK*kV0C!qHbzM!_>^r%jR~b zNs?GTi4X4%%L*RyDFR<0@FIby2^=GEm_Se1%HxzJGHfnoNez4zDUq^8Z8Se>6i4+e zq%75KDrMy_p%(IRPqIvB`o{RSy8bu!s-X zFyyWC=w>)=Qz*$VqdWP_065No_uP65W?dSy5y6|(m}KPg=HqTHfXMP#D}W;GPKcXv zE`{yS;sc5TJC$T57>tBRcVChml~V-L@Z>##%8;5tDCnb_`C$3rrgVBJ+e;F@yj1cW zy=}(PH>r|D(efjk4zvXi(@sz2;miQ{j;-fjc?O@&&++e{Pcf2RZr#=6*52lV?Ucr@ z9rVHEB6c0t%G$$b(PL5h5{sH^AE|#2ud3qGsGMN!-_cu5+7=P4gbjVXbi^Lg@=5N08=6jH)5RMLJCPU<+YMF zsx9x{NRNl|3)@bKsOt*3ilzomqyFO<>Ju81=mAYQv2nbOY(q4s_Dpx0$wsyj#(1Lm z`ihQOWtF4?IE1Od^hiUCblC4Av63dHDC?=HZG#tHMK`yR*78DDH^2*2wb6QyOSnoN;f1;R3=qEL)WdGUA<1*oI0ALwG9&*d^Yj>}vK3^^NXS z8Ax38$27~HRiiIIxdq}|a8`GPL(-ngY;NY1qJZ{fjit+1P$#KDswy~)iqDXEcR{Lc ziP6@)7ooegx{E9=k!fr4`ABD;q$kS2ozDYp<5Or2%6H$up*@2-%F-8r+#a^u^W1l@ zzHdM)KDN}prBk1zjZ7N5-NGSLUZEmd>Qq7yYkvL36FOLsJYeRQU!#(QxtStqNDy=X zkUn`6U>itmgUK(Ur$0jKGr0wYS7OtW>b7L^9eq+p+%QloKbmN7AWb5L zWO%LPN9~UGX(k*~+!(@Qij3>2b=%!6=#tmuj-R}36)^^S2% zmoIYvxkSg}u-kQ9D4xtK6CRuxw%nShjy|+kp_$2xQmzPP>k+5Pa zcimq4WXBq(x#O-cm>saZ*yti2|9d3%x|B34ISk|Zb1REem~LqV^GM)!eR+KSs&13J zyH+@1tfrX8WW?$JMlDVQEbm%B)<(`IaZia?l}>nArFG}ozEbDYthtzxyZEdNv#XL_ zF9+uT@DJ$s!&6;>z$8vivWI%MaerCV^@P(7UGSd`3>0AElFaxC5-TGz2=aWW&6_yd z>M7IPhRpany8A2YQaSx_9L+*zOt8$Lx-De}77&vEZO@nDZ8)~JWetSHiEECcw3~Hy z#&unCRFdU3mN4*+oe!Arx^Xo0Fcrgx6A!UNO-Yz|hcoMn!GbXdw6JeLOA4#J97g9J1 z&~@(N39hin$#*b~m|F-sq6BSM`8t6M1Z)DE2|8T5X5=(lY%*G^v@_72Bp&m{KcEL? z3dvVkD&gF$EdRvz*v+LzBCD`^kaXm%n^IDZ-ov9w+bQM1OX~Yhyr~F|yTqY46%_{F zi~V=r8C_|rg%@ad0J9-T-gly5YKP|tJ>}n$bwd!APbtBy6z!l=lDAx5?&v%ZJcS7_ z)$gI!=;-@1BD-kH6&`J;va5u(H-lcOg+}jpMqyzghu+7M-p5pX^p!(j-$P52U`mV3 z)t&M$xn?~1R{0=yb@5}YAZ5S-I}?|69`Bkc02*r6q6nAizhm~h6W8dEBREQd<4+Pi zXyo2X(KmysGL*PRFR#)%&;Rw$o_zN^Kl-Ors}Jy7C4)_VlK}0ulR1F>xlwM~)Nt6#_d65Nk*mAU5hS z4ETs7sO)V5B#-1QfjI&v35)?iAMhm;X|3u=!jJfVK3Z5WMM*^=(m-i#I$?5xF$!<( z=j6F1Z*9@k|F@Xc{|Ekp`?v%7Z>wO!ONvBBtEQ5Pwk4yemGnH6nWY^t2$t|i>|D~u z`AH5k`igsJH8`pb-(TLF%IXi*e&KV#JQ16;72xd#)OmRghPbFkNtR((Y+|9wJpCrV zo#N%IC~?g`Dj5C8AcPuA0*hm)M;&0wCJF(XlX^j z9;9eBIm|4j;}|k540a)7mRF7aY96aawC&s4Fjg3E#+LEs{gQ?^DbJS)ZwoKuus zr6(sBaAh5OmE>O33lJCK2lIAw4$%X+;|*}@%y+0EzQ^5etqE0Gi|R|bKScw&@Wtgc z+D5i$dZ8UOBYO@P#0Wd!A!@iU#qFu*hCaSg(F>k9X3u!8tYPeV4sD=r5T79t>wuB% zCw~0rA3ed53wXQzgt}PW>I8BYvr2r}a3I`}q~i(co}xz>O5bU)g=W5j-Ju+C2h&LS z3)aK$&}d2zr;e7YhsicIkS3ABF9YB{MZ>vbgtZ55R9I86WKX==`?vT3 zSICp|It4y#&z3)i&Qp{Usiv+i50dwkk`m)e6J4(4Vv~&L_|SSLbwY?8Pr3dO_7xu- zJgl;_2?jlIOc?#KhgLgtK0@J?EnilB@(mLL%Dez}fA=WB@oY{rs4u1NKeFDNL}W5s zNX09=oh^5J6YBkfg+>R%E1|LJfT?nWv`FC8kmGYs2)0VR0K4wt~%=eN9|o^JA3mQWa3>eLwI zc+7l&GYQ6q?F_to_#_fiVF&Li<4yZCH?8*R>S>UVCF5n~+#6A5F54n>ZKdqc59sY% z1Xc*VPvBPxuuW2+H?m>LUCMiR(9=?-_(mvIxNZVZR1u!n4i+ikG0l2?pEltXx+;_H z3hPr@mxw%ICyVvKGL=C_mZ+)k#__U<3rMnC^GHS5sd>0xVWTRS>w(QS??Xj)IKcTt zGiV|}>?1&&NdR%`1MHfkiu2ian*!%6sxbAKTuit=%|0M!}5Od2_sanql*M%w=>KbSIq0{nY3PB>Pi( z0j4I^tzt9ty?MjE8Bze`dnlCOAVBJFO$bg71tbgDewan49p>o}XKm(f*py^)cPN6R zOy;)$AHu%ahbP$?`?w7JdmSD=@D!CD>9-5Nn6!IASls40JgLnK%9Ou@ceaHk9B`ehFxV-Mw_7sXD_Jl8-o;pd zLCkO!FXbFeP8eS0Zi3iLj^+jq=OpfQ3xQY=dJuS2r)R0u%3AmH`F`6xOxLnrCP>NP z8XWG+aI8{^sY@Eyhh>%dsdDK4-KnX#EIbM*7ZB6e+Bigc@lLRy-)J`wkPeBn(5#C% zE40Ny#x03G|cpqLVbP9K}9Wb9f zfj5iZw9K_EYUG1i2Ic27?;pgFr>=OOFf z%aR}eR^}7^8c^-;H|%fy*fZ69LpU6h->>2DlDK%Hj{mf%A>#OC0UfJ5XEF;PEI&d~ z``G(H=h%sQv*y;rlX&SiXG?;w3Vrf{tlB_F-XicJ!0HD8u~uZ2vjKgYLP&{jSwAH7 zEkgfl<}Ji;U*qFl5=X@$Xkg+`s5@Om>+vs~nD-!VTJoe#=#y5^KNyEsI2HMB+f~}g zm0=DDj!O>A?pdae7dnn4#A0LFZ^c=4pL7@n93F=N<#r>^a+qmca1=%H1u083Mue@X z49VZ7=HDUkI{?*!@*Low8)8ej^6=k3o*OuQ46BdgzdaD0?g`(OOQ={=i+@Y0*Ek$D z&iZg_+>GKIk9hjkad(XQdkKwdx& zIOJF;4g!&MNi4rkfLvITj*V<#3SoczIuWPx)y1Is6~jq5SJQ%Vn0$`taxZDP1=okc{pnz5MzA0S?mku(&_b>Eqtoqg~rij+u6mPhhKT3ezVJ93;@mMKxPqu8QtJ>q5?cQV|2NiI3N zv$``Ynd@cZm?~PdO`8OL0Zm%zLkb8*^QA!1f1w}xsRde0ivn$d7Vei8aFaG^6ZLn_ z-I;xmbetvj?wxz@+{d}+p7T5BTn1xfr3^k}fA_^|@LVSIFZ9s=$>L!F-|!!ih>S4& zOoe_;->91v)1Z9T&(^Jq#d*um)$NMS`JA7x7b*qL+kUZLs+2gN_ebiZl~KGuRv)j7 z*C#3y^~uU)eP3l?eX255-(T5}b_G%Nr|UD7nfigs0e&v|2kWzyS8zM@naVLaDUadzI9g1KeQ2={ zEglob^-Ou{L##2gR5s%LV$f3PYhEZrWbJUxd-m+}$mK+<-lU>z*jg?Z;_QXS zrZVwzY+b5VqquMdFMCm-V(axNT4DcZ91jclh9@z7nW-2e zQ!$H%cvYA(E3(oOmduHqw1qA5q9F6qn#-(=ilQjp%~c9wL>9%Uv{x)KCdThtl~P~H zgqTFhh#W6l23P8O-z$sx^lETopmAkD2(Y71(a z=aK@a#g2`VlE^?1m`neL&iGRvi3`ctak00mNvvpaStYl(jtO^YjT7#`F%09p>r3yp z3@bCbqiV8neYWEXH)uu8R+NrCnG~caJMV^(!Vxd$V=I*YiaLN9tAmuxQZh%$Axe%Q zd5}?M{QP*~OjK{4Y1W#jBTuc$==7&=)y~S>&sER(wdFI-&1fxXoT=)~bsK@IL;kg; zI#b6k_~CqW6ZCLvjauZoG)hQ=+C|&6jqV@i@GY6`nSLIbPu_}iL4-|?Z6%|YYE)?h zlMm%>e0f99BNJguBV*eP_eZ8M?qwsZW31=44g6;4_rAGpe1NT7w^43yn88ux^T_8n zOy0=$lddaoxvo?78jT=wmZei`+zvLRaDs;O-j?Gv1b*fr#7niX)(9gH+^1$Rc3ix% z*_4-+f*7|~h!PRxeWbt!Zq@f7hTXW3?#9RpwnC~Vb|iXWs*~tIouY)Ou9K&zQ(MpH zQ^@$G=9!@K*o)XI@`$#bHl=~DY6@;Iz!~7R^7ZNr*$1?rCYA^-17#V5v%=H$?1Ns z)S=Vr5*kxDQQ*|Q4e5k|qDSwxSM$APUplQO2;RRs89KE{*2DRJhB4oLBSs(VJ5GqUX1|yOQ;m!#D?K4Z^sXo}hTLPYkX2v2Q7xQ1ZD z5R+{xS@oDJ#M$tsbkw&Gk^`qIx&{&T%^hVG#*srye%eU=1Sb%E%4krFyZyOMYR zF5~n!1+N9*{=!ySy|&Tsl-aeEIN_WbY>~9T8zh02|xJJ^OxUJG*5>&_nkM z$dhf6ZM!Mq-wu=j*RzEI9@Q#`$lrfvetz;kd&f;X{e&$2W5X#Ihe=8bSWQsE0w;%~ zCY82sa$(c2MP;qtDl-~?xUBO?#=Ako-yCN4VmhsL^x545%dj3!TacLt1~@!zIzagW zv3VSwKv2T&Y-Q9q3D0%Fz4fdxwh8cY9czA=Yk)`92*UqFvKV!ga*tB7K*`X#%)11s zT=!kng+zvuIR#kLo*tNFx6$5Hq>~4*LQ~=C-S0w?N6z*4x4tbT6prkt@8PD zRy{*=f)$=opQdDilA$RAd?|<<*ZnFgKO&x-G zm#S+{u!5)lWtR&*Wv)JhiRe{7OF7=B$B~O|ui2Chq0UnA5D7*xrkf1#buG~&W@cU2BTyB5$!n^jAcGB;0M@~Q+ShpgWe#z+QU#c0fhqt5%tp@ zxP*t*3}ghmHn+?z0&ix=#BR($c4RwQqWUcuCMYGC_9&N{-BOY(M*D+Q zu3YZg{0=z;98XDSqY>PJ(%b|jYix4yDW?ULyV}*LLCY7;n)I8_oi*8TLg}gM8dU@C zI#(`Uec|j`T~murgpLna20^;eS$q>UJqd*)mc@eN9OF67!AmIU;;zb==ZAsIlX1N; zHd?XK9NyK*glKNp;qpy%z&mT@CXEshRtbOR`<5|;Ylhz&AUf@Avb*X{JSbALz)vJb zc0FKOn55sO%4w z+75)lP?x}mV7_B7IVWy5m|afv1|Fb7BF?T86{eApRsW8?Wpp66<}%+hZ;{M36zx58 z8oX@g{4=oupI%a=*d8mLquCO1&i@H&_&`r*+D{E^NHXhi{+u6F!OiE9NnQgt9iu)M z(vEou>YdH+?;#V?geUDGb(eNKur?AB=?*vXKoTkZ6nQMxjoTSjA|xlW!t%{JU`E~A zB8<+0dfQM($osKwZyOERYC5--1r*5wze9wCPm5e9i(XC(8`d3Md~=X?Gy>)HQ#s%M zcFI9l1MDUCYMCW|GUJco6z9qcp+`V?m{&c}2!T>-z~WL;5T2L4{b#hTnIIkYcz6Gg z_x3-|d119ytK=^?RzdqU-dk+zR4M?H$%XMueK~d2^xQJ-k=Ge=UW7ka#QE+JP)M|W z@eII|FWhD6uBf2yR<#SHGSkiU`9kKaLVX3VD36l;l(5n!hecv)euYZ8o;@%_Ojk&z z`lo0Xk{`vkOIa9{*@89tuwa@$nYJyXV2%%KmgKzwhB5FyeMuzrgdDivp@IcU2FF*Q zMcH3cISaX|0ba*?gK$UxDMQj^iCw}Rc>jB#V=bfkcM$7B*U`Vkr8Y&XMJokmbXWWRy4@xWU8P@v{RQcCcd=NqE7T8lz3 zOHPr5 zmoYr4xOfgB1=htMp*!^sl6HB3`*)jE@(yJ0WAqxEt+sYR#un-6#9~D>LHjUtG%W1R zNrQo6+Wo(yBkiB<`m^navldLjL3=fAK0ppSe?*Q&>LZbttKi2jP~*Km2x`GA@DJ(P zyaAoK1EVFn4I0yn932v1?J3{&s*!X3!qv+TOjcm15V1dYW|MPW0>4vl1n+^tNZkhd z=)>i*nhu%t-aGy`$U#RGb3{P?*+$iG3Ee@`xX+~vpqQe#6G{EYLAI1hNN_V`%MoN- z?*g`jd7ndV$|UunO=8ad36Yjg+*GFh`~ZXOs>OGMZ5V(Z0egufRYmtdOvahbw~znq zadxmlB8opE$T-eCc4 zr*pOef7EcGLATnmuc-u@#H*we$$mmbJ255wf1R;gPP6ar%P>NqgzFejNCV5B@zAL#d z;+idZF5P(4b#KA6?bhTN7j-?LD+p~zv9%loz8azao<h7^ zMqQ$c%TzH!k;Fyq@l{u-_%%vir{oPvNaCpyC10fE7by7>C5I>xln`du_;G`BbxH`4 zsRkvtD7ixki7oXWC0mpbnYBBy$6e`xX2Kjqi;zfD$e0D|N2Y21)XbVcF)j1|%$)hZ zrfvS%&X;~PH8)i>_aji5#dj3nk!fRmY#errIYOn=x|C`upU3ZE%Hs7I~P z*@t>dOmWYAZw2>HdL?{s1$R)$?JygU_w%U?+keJqZ4rSk#K<5nIQWGVhe%d`OC1k| zs)k6>GDdVo6q%$>eZUll)FQp^+$5oA2Heo`{^UY^cDf1>m4$WCPpm85!$b_j=2o4_2*$8 z)5H?z-*3{u3zYQE1nW1t+5n2V?g^R#i7E4axRQ671hrD{(*hflJTHSy8Gfk$p&CCfeCbiwdXJkEc#j-}LcTlLDVPc&)DWgKxevP=-Rtd@ZVW%p;(CN)`jaYDgacV( z#f4-j=m)+$@hw!*B@tr5;e8r$U8sFpvFkoXTSfhpa^xY_e+7yI3>odrJ?U$^@(%AB ziDA;0>oBSko-wuYxF_Qva)b!I>%Ne%ZfVF=;K8}co&&3Zh|#3vcPUw*WG91?7INJe zlY!ti*~y-|%?`#SVaiJ+^p-GYI5Bv&MhAZ)x&e~Mt%Smcp`HOTieSzIU`}(rgqjlH z6EW9EkRQ?cd!sr?grf!_cx#T{xi_ZEqH%g+k)Ix?{kJA?QErH%!{o$xyv-W8;BvGgXO<>w?42z?3=zdV{ zER`pA4O=l26P(rj!TNZT9+^`(ipP4JmHZM_kSH8r@f@#rXrmRiJx_Z~BDR#HJ3`FU z520|4S#Y_HSjZ^u4GjkWz-HaZ8G)cZS&iKX*peYH9%Jm@wVvx5@^=06q-^xvfbIre z=kTh72tf^EflfZi#&t6M#b@5>(ONrT)Nf%%yD>H6lxwtBc17S`4Gz!1Jt(Y-jElXO zL+BU)H`9f-Z>GF;O$zw?Jj_k&wo|wV28Bm!(FHJ%!{}sr9+GaSEtYlz?8snhftE0M zBpGT|lG9kQ27|?zInzul!fCZl9o(hlmyzHWpeuqZLb{A98UHbOC48xhlzfwtF-pEo z3G>_UQ116A`Bh4OpAzORo+CrQ-W)kc%1u$c@+eJ|d_#qdWz6QLvWK$c?9}vu z0=KB5a^Q0SPYd`mMC>6j+zvK@zc^?B6h^;<#^@I*kde;kfueA07-%XlO5OG&z+eZu zsH=ec!{fkbSwdort@ze3ZV8W~obJK$tzlrb{ou~&cxutFU1BE=^x8F64zbnrqBRYn z2|dR%o)7ihfUo~{?;>=lQ8Yv3Ikf8G>3B4`n@Rn|qqs;7*`h-g)loD}K9oR%2!Wwe67^(M12Q6sz0QJ ztpPR!zDth`|96?V`XkhqN42`-w?FBNJPN%%%*@1iE5swT>-KnhsWZ9UNk{YW&Mo*E zu#5=DdWR$>i5+|y@Zgt>d%nzxUkY@CQ0wF{1(DWE!uZYzw%uHM&?V2$zrcGKayO|% zR-nN35Z8U5)=O?W3lW%|fA$adSh0S4hfqqDEa?G_BgpfI&;1U0j}M6) zEkSzXh9$_a&^Rn}evNV@O;w%}p2hbl*PBI8p!@+UBoXgF*Tv6kMiSu1t}h>2EGrA8YesC`$m<0iL(Z3 zP5&E)zG#q#7k&-*mD!UJTSN~gTWl(+NQ=aFwAlny(98IBl;~9zDaUe_NkELr(zQ~+ zl|VuOk-qsvdl#E^!58_+sa5ks4OaKlDHDF|CGhfSmZM-$XpQ>P*||TcgqwJ(7&u_HhWj8vAgk?W^1xmw{^VLN}_7mhHR--l2y|-Wm&JJs%bkd%ZW-) zHDhOF*{JkZ`|Q4IzujLQum`FK>;u(7d$4-Y#*7#*SsAJxvJatb@>FHGde}Z(Jz^iJ z9<`5FkJ-nn$L-_Q6ZQ$FxM}wUPk+jIk9(45+*9*9@8x|T>l@5|Y!B}wc>R1p@~l0) z0r%ul1^feiQ1Tz&!>4f%@*&Cl);_#Ld|2|H*oSwRACbH#_u(Do$0YCcKD^`ngycQ7 z5AP&DC3$D|;XTGJ$$NU&nLN(F^|5Ye_i6nEe^R!7W*^>Z{*>fByASUSe_HaM+lQCs z&q&_ceR$9E=Ok|gymRic4JM^`wj;d}eopeA->2{M{Ji9y=Oup8y}(~^FGA+A>Ab{W@AMeuZ=mL7{yrZ= z-J9+y%yV+y;NyG(b6ny%*|NW-HIw`bTED`tqBbu%ucGZ+{2FRs+f{oCwNv~$YA^GG ztKWH@PtR+d)_DUvd7FB2HgED7Uc@Y;DaIW>i+$b%=a%~hzl~P!U@hP^!)wolsWQ{0w#jUx*3F;!!r#wH1%;`qp)oV^A(u!^nC1#tAiW?n8o5_`KOc#s!H>Yx?PM>^XB0oMho1ZR3hi?}07%5kp87o}L6-(pO*Wb(+ zaud;GZALLSK3$j?n|U{GQo5FV_xAM61bWU+Uc&V67s6Og8LB~Vun#6bEk0Jf+A zLe-G1D2*)FT5rAePPE=e>z$-GL}(T!*V4E1vsbMvGh?@Mt@7CT&Dq>qM%It#Ch}8L zV{3i#Ya&0Eo5>aP#kKyJo1YoKd3|y!_fD(pY<_AYcTbCYnl+E~fIEQ`={2Y7M(JBl zrRnB`sEd25ID{=lJ>2!n!jmGur-+lN+kWF*P;H!Rc#X4xBNp7?>Ef7`hV;N>J z^`WT|HB|M1p{ZXPy85M&P`AZnXw)SGI4?!VBV{mx!j1$&=BGlOV8}LA&L9&t&;mVF zIZU5x8|nrbh+f!cmLRF#9{|ZF1Ubg2m%~J=jk@oVsz(XGQSpLED=&&j^J+m>lZRuc z+s#}aCFm@Dc|b8aB?p4d)mPlsZl6PyPkuSA>P%;8bx;*&@Y%H`+74}N*Oo$M11c3@ zBU{RZ@?Pe<>bklP1q!tlMGS?i3Qt{BmQ88%>e{umg})g$5T3i@TEU`g!8&PumT+nd zu2r9(_sX7Au}JFHyr@?#$MU_}LdCT@IzJ*uDP*-ss|zj;U`bKJ3*4%o)#L5=cG{NE zB1+4_OEjjPLPbe_KXM{1wTrngV^lu_VkQPulbH~@u8C(+(RC)fP3`k%z+Fr42>N!* zsEW`87~D{|!DY3=q@9=oUKGS(^c2U5kRI<6lL>{aIDuEop>RWr=gG7m@%1p=t< z^^n4JO#dl-teK&*2@~I9Ou>3IxfZrM*jbB8#t(Ii5{_T?yvfDdj*lga{blnT)i?6Zfm6jyI1-;>bq7-I!wB$o5T|g7mXl313`6P1n-N_&Q4`)Q*=9%C?jx2>Bi>z`C%A zO8qW;Hww*0!xiE@+U}iv0F##y0+m)A;W={^_qWl=CpitM;u>CEQ&W9s>Op+$Xd9%+ zmS9U+wGgS}b%=^QiQK%Hq|zS9If#iH!drm>m718pUaPGB6zzP%|1>mSTu0%N+1sci z$d{0oMB4aU*CevF&e-nTF*U;Cy%QU><2y^gkN%$%@=B!BGha!hyYY?Yw9TvenXxMf z+G0qZMz6iokUlPY!dY-?&R-D!Z6Y(@aQtgyvt!qO?f6RwU6wHZ&pYE6zuEZ4Rm6)o zr@nsmWZ#SMmCedObjGF-@7K%2)@QGd<-dMpXk#f@bi9A=jC+$x0{$>Q z0_78B9!kd5kIjHhAS93xj8^FC*4EIA=;4zFegyM)FS!o1|BwoTUUn+}=t!q8rqP_*svxrw@3be6OLCfHUq9Tx(Y&;^VO4wwudXfANfB=xkN-4C zj0c=GmHNRL720L4E@@Q9HNpwFDyEC#QC`d64Nx&H{73&TXB1T@$eGssspYn?X# zLGzNY%4q4Gp!G}fJyhLS08o+XyUR^DdpGLwT}PA`OKbI-Tc$;~|B@)sBR8>$0(pmk zZK!@SP=CMzE%wlX9wZ2%10zHtv7!DJg4sJsu5yj*pQ;;(3ei$SZkz zndaJU86oCA2q;OiniN16-9}bUl4AiLSBjxU1UMBN%20F9S}PSp_MR7loYOyoYuDo zJG&^gcM)?+aWBP+kg1!dWK*B^? zM34GV{Yp24K-2plf{3Faj~D|vXsJgQ3b8+L^as!;Btq&YG-(TQ>K$m(2Kg&(?QJQ? zTdwftS1r%CoVK{iyQD?cRZ8tGI%^C1Yt6xLa+EADuqcC<>4Y3>G=-U?L^GH#U9wa1 zRr0-sNER<%z_G@~^DmX=c8cv`E-L z@%<>}A!ic-ve2kEE|#iw-o&`ZJf)$5Ad?g1^$=0f**zj4n6}(yiFVl$^A~8^N>kMI z08^RzK>b2|gxapdCuAg@lZXEn3IU~S7E(84p+^;Dpe$4an5h^D)dggvp$dLKQaJ@; z(YBa)oRYeEnb5V8xY^mVeS1#iWzS#7|H z4GJ;I=U5E@PY_Ot1tN~!%%FvQ0oUFX(?;3l|IY2~g9qf%sR)Nhpt zg;5Y5jj?w*hyBHRv%*V065qzIC7q-t(J&?xpWrncCCd$&r$z>~EeBmtOj4vrN^uH> z*q>}l-wWtO60xaC=R+L0zpg-(NqIHAIzK*NA9D2&cp`A|HZ4Xg{JdMXjPiWSPjG zSTiL>O2OdcbQFY$gert7lyCPjT@^n@Wi${YB#yA(%+IiX$X*FpYZV-T-8A=;|Mg#S9HePaef6R3WoWQDMwm-o~oSFG1ne7Hc zE(BHFi=MRK7M=o42~V-}*bg&!TTOaoww~bdtwDkt8wlCnJG7pJ=T0tQ)O8acIT@N; zEKJ02c;B%Q-uY!^-B^AOCG$8bOsYWUD*r@?mzX0`CPH>|{~?unsq_FOYf4xWzd^N> zOi4A7xECej%$p2fRH$uA{4SM$55!Kj+;z#>DbCrt$5BCa&OWr0R{%;8#FXpJS`abM z?hWcd>{3g4_G(`*jLr9|UIiIeu=)nci=tgh@N`HF$bf4;U2B)pdK&c^pvDmC=ZBEx zAE9}d#K@S*8l;I5*dSIybX!k_1hvXhlyP!w?WYnlCtO_NA^>nLZ{7;-)-8Dz)^KnW z<_J82RdF2zA(x&%jax9e&=Kj-9=(#bIMBkn>-ZLh#K>6T0A=7KC!(9SdAh{F6^Yfg z>lO|((T~L<(CnQ1BZmbCwA1q)IxKSMrh(A%f%sz-ZF#-YeYLulJ^eK9g#xeYW_>HP zPCs42&0mEqzV%&oeIFan`iOpr74^m*QG#V{p-iXQ{v%uH*hANy3Tzt|4Q*#QZvsIX zSL!I^4u!0MA>Q0X)JUaHmXS?H$x3};0a0I+!hP`+%E-$R6$exCT8e>io$6J%G=$ty z1`N7?aRRz}Pwf=bK#Eo)+|)|{{U=zf_*0O`peZQbN8U!m>^<3obY!h%P;N(U2;Slg zS)4D0T769XB@LEp1E4PfHA>>j6#e}uU0!U~mY~o0eP9Ugj=UZ@KWD{(f&Q^$J?cmg_xXPYiclJ*+J0;@q+oDqZ7bLLI=A zkaGc`!pvc1Jric`Af*hG;wsl_jO#q{sfrns;ugV9@;-$YF?>pYNyjNMRQObS9OORvxcd+B2VZoDY6&RC5|KXu$@YuC zqO$a|e@&&oA@Xw~_lW#0k-sDI_eA~>1V0Us&e-@liB!j}aXV9P1|1)3562ALfCade zm%3FdFD^yw&LcX!yC2$MJb#&VcoOrdA7(NpLM=(g$Dwxl6=j^?t0A5v=V*#wdg{8`P-A1(YCy= zj{VJ_(QXYw*Rn5Nj(uP!T5tW-D5IDtC1J8&ulRyaJW_=#v$eB6KS!ZV;IvQY1n*LqcBTNR^=*3Yq=O7+ajCPeJ4( zB0nVZ36UQYk#S059@r2_KPNFh(({GMX$eJA?W9n4DT9pfPN92bUXC-IQD}kU|09Ts zdkBbCij#82_}_w{E!9lJr}pDXA7N%M-e&9R!<(K|{0!=*vGdig%@9`~Vkgq3HN;L0 z4GtdBhX;oHhL5Tls1MV>LSiJnITY+GRZoAZ9@c-^U8jDjCe&Z4hPtgL)&E1F_P<6- L{beTI_r?DMn+hH~ literal 0 HcmV?d00001 diff --git a/_vendor/charset_normalizer/__pycache__/version.cpython-310.pyc b/_vendor/charset_normalizer/__pycache__/version.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..5c0a3b9e5b995ea5ef2688d3f7fc828cfa3b8748 GIT binary patch literal 243 zcmd1j<>g`k0^S>8$^Jn4F^GcKWc*)brD1xy2qIpOT*(AAgHGJ|3z9$YCum z$jL0Z#UADw6zu8mx00cV4QL0L_~ocyl3So(kXfKxl30|UTB2)Gm}#0?W}K{_lbNJn zP+5|ZpQoRkkyuomS`wd^UzD4elUbEoqz^S+ub}c4hfQvNN@-529V5v3Afs6rSXlTN E0W9i4PXGV_ literal 0 HcmV?d00001 diff --git a/_vendor/charset_normalizer/api.py b/_vendor/charset_normalizer/api.py new file mode 100644 index 0000000..72907f9 --- /dev/null +++ b/_vendor/charset_normalizer/api.py @@ -0,0 +1,584 @@ +import logging +import warnings +from os import PathLike +from os.path import basename, splitext +from typing import Any, BinaryIO, List, Optional, Set + +from .cd import ( + coherence_ratio, + encoding_languages, + mb_encoding_languages, + merge_coherence_ratios, +) +from .constant import IANA_SUPPORTED, TOO_BIG_SEQUENCE, TOO_SMALL_SEQUENCE, TRACE +from .md import mess_ratio +from .models import CharsetMatch, CharsetMatches +from .utils import ( + any_specified_encoding, + cut_sequence_chunks, + iana_name, + identify_sig_or_bom, + is_cp_similar, + is_multi_byte_encoding, + should_strip_sig_or_bom, +) + +# Will most likely be controversial +# logging.addLevelName(TRACE, "TRACE") +logger = logging.getLogger("charset_normalizer") +explain_handler = logging.StreamHandler() +explain_handler.setFormatter( + logging.Formatter("%(asctime)s | %(levelname)s | %(message)s") +) + + +def from_bytes( + sequences: bytes, + steps: int = 5, + chunk_size: int = 512, + threshold: float = 0.2, + cp_isolation: Optional[List[str]] = None, + cp_exclusion: Optional[List[str]] = None, + preemptive_behaviour: bool = True, + explain: bool = False, +) -> CharsetMatches: + """ + Given a raw bytes sequence, return the best possibles charset usable to render str objects. + If there is no results, it is a strong indicator that the source is binary/not text. + By default, the process will extract 5 blocs of 512o each to assess the mess and coherence of a given sequence. + And will give up a particular code page after 20% of measured mess. Those criteria are customizable at will. + + The preemptive behavior DOES NOT replace the traditional detection workflow, it prioritize a particular code page + but never take it for granted. Can improve the performance. + + You may want to focus your attention to some code page or/and not others, use cp_isolation and cp_exclusion for that + purpose. + + This function will strip the SIG in the payload/sequence every time except on UTF-16, UTF-32. + By default the library does not setup any handler other than the NullHandler, if you choose to set the 'explain' + toggle to True it will alter the logger configuration to add a StreamHandler that is suitable for debugging. + Custom logging format and handler can be set manually. + """ + + if not isinstance(sequences, (bytearray, bytes)): + raise TypeError( + "Expected object of type bytes or bytearray, got: {0}".format( + type(sequences) + ) + ) + + if explain: + previous_logger_level: int = logger.level + logger.addHandler(explain_handler) + logger.setLevel(TRACE) + + length: int = len(sequences) + + if length == 0: + logger.debug("Encoding detection on empty bytes, assuming utf_8 intention.") + if explain: + logger.removeHandler(explain_handler) + logger.setLevel(previous_logger_level or logging.WARNING) + return CharsetMatches([CharsetMatch(sequences, "utf_8", 0.0, False, [], "")]) + + if cp_isolation is not None: + logger.log( + TRACE, + "cp_isolation is set. use this flag for debugging purpose. " + "limited list of encoding allowed : %s.", + ", ".join(cp_isolation), + ) + cp_isolation = [iana_name(cp, False) for cp in cp_isolation] + else: + cp_isolation = [] + + if cp_exclusion is not None: + logger.log( + TRACE, + "cp_exclusion is set. use this flag for debugging purpose. " + "limited list of encoding excluded : %s.", + ", ".join(cp_exclusion), + ) + cp_exclusion = [iana_name(cp, False) for cp in cp_exclusion] + else: + cp_exclusion = [] + + if length <= (chunk_size * steps): + logger.log( + TRACE, + "override steps (%i) and chunk_size (%i) as content does not fit (%i byte(s) given) parameters.", + steps, + chunk_size, + length, + ) + steps = 1 + chunk_size = length + + if steps > 1 and length / steps < chunk_size: + chunk_size = int(length / steps) + + is_too_small_sequence: bool = len(sequences) < TOO_SMALL_SEQUENCE + is_too_large_sequence: bool = len(sequences) >= TOO_BIG_SEQUENCE + + if is_too_small_sequence: + logger.log( + TRACE, + "Trying to detect encoding from a tiny portion of ({}) byte(s).".format( + length + ), + ) + elif is_too_large_sequence: + logger.log( + TRACE, + "Using lazy str decoding because the payload is quite large, ({}) byte(s).".format( + length + ), + ) + + prioritized_encodings: List[str] = [] + + specified_encoding: Optional[str] = ( + any_specified_encoding(sequences) if preemptive_behaviour else None + ) + + if specified_encoding is not None: + prioritized_encodings.append(specified_encoding) + logger.log( + TRACE, + "Detected declarative mark in sequence. Priority +1 given for %s.", + specified_encoding, + ) + + tested: Set[str] = set() + tested_but_hard_failure: List[str] = [] + tested_but_soft_failure: List[str] = [] + + fallback_ascii: Optional[CharsetMatch] = None + fallback_u8: Optional[CharsetMatch] = None + fallback_specified: Optional[CharsetMatch] = None + + results: CharsetMatches = CharsetMatches() + + sig_encoding, sig_payload = identify_sig_or_bom(sequences) + + if sig_encoding is not None: + prioritized_encodings.append(sig_encoding) + logger.log( + TRACE, + "Detected a SIG or BOM mark on first %i byte(s). Priority +1 given for %s.", + len(sig_payload), + sig_encoding, + ) + + prioritized_encodings.append("ascii") + + if "utf_8" not in prioritized_encodings: + prioritized_encodings.append("utf_8") + + for encoding_iana in prioritized_encodings + IANA_SUPPORTED: + + if cp_isolation and encoding_iana not in cp_isolation: + continue + + if cp_exclusion and encoding_iana in cp_exclusion: + continue + + if encoding_iana in tested: + continue + + tested.add(encoding_iana) + + decoded_payload: Optional[str] = None + bom_or_sig_available: bool = sig_encoding == encoding_iana + strip_sig_or_bom: bool = bom_or_sig_available and should_strip_sig_or_bom( + encoding_iana + ) + + if encoding_iana in {"utf_16", "utf_32"} and not bom_or_sig_available: + logger.log( + TRACE, + "Encoding %s wont be tested as-is because it require a BOM. Will try some sub-encoder LE/BE.", + encoding_iana, + ) + continue + + try: + is_multi_byte_decoder: bool = is_multi_byte_encoding(encoding_iana) + except (ModuleNotFoundError, ImportError): + logger.log( + TRACE, + "Encoding %s does not provide an IncrementalDecoder", + encoding_iana, + ) + continue + + try: + if is_too_large_sequence and is_multi_byte_decoder is False: + str( + sequences[: int(50e4)] + if strip_sig_or_bom is False + else sequences[len(sig_payload) : int(50e4)], + encoding=encoding_iana, + ) + else: + decoded_payload = str( + sequences + if strip_sig_or_bom is False + else sequences[len(sig_payload) :], + encoding=encoding_iana, + ) + except (UnicodeDecodeError, LookupError) as e: + if not isinstance(e, LookupError): + logger.log( + TRACE, + "Code page %s does not fit given bytes sequence at ALL. %s", + encoding_iana, + str(e), + ) + tested_but_hard_failure.append(encoding_iana) + continue + + similar_soft_failure_test: bool = False + + for encoding_soft_failed in tested_but_soft_failure: + if is_cp_similar(encoding_iana, encoding_soft_failed): + similar_soft_failure_test = True + break + + if similar_soft_failure_test: + logger.log( + TRACE, + "%s is deemed too similar to code page %s and was consider unsuited already. Continuing!", + encoding_iana, + encoding_soft_failed, + ) + continue + + r_ = range( + 0 if not bom_or_sig_available else len(sig_payload), + length, + int(length / steps), + ) + + multi_byte_bonus: bool = ( + is_multi_byte_decoder + and decoded_payload is not None + and len(decoded_payload) < length + ) + + if multi_byte_bonus: + logger.log( + TRACE, + "Code page %s is a multi byte encoding table and it appear that at least one character " + "was encoded using n-bytes.", + encoding_iana, + ) + + max_chunk_gave_up: int = int(len(r_) / 4) + + max_chunk_gave_up = max(max_chunk_gave_up, 2) + early_stop_count: int = 0 + lazy_str_hard_failure = False + + md_chunks: List[str] = [] + md_ratios = [] + + try: + for chunk in cut_sequence_chunks( + sequences, + encoding_iana, + r_, + chunk_size, + bom_or_sig_available, + strip_sig_or_bom, + sig_payload, + is_multi_byte_decoder, + decoded_payload, + ): + md_chunks.append(chunk) + + md_ratios.append(mess_ratio(chunk, threshold)) + + if md_ratios[-1] >= threshold: + early_stop_count += 1 + + if (early_stop_count >= max_chunk_gave_up) or ( + bom_or_sig_available and strip_sig_or_bom is False + ): + break + except UnicodeDecodeError as e: # Lazy str loading may have missed something there + logger.log( + TRACE, + "LazyStr Loading: After MD chunk decode, code page %s does not fit given bytes sequence at ALL. %s", + encoding_iana, + str(e), + ) + early_stop_count = max_chunk_gave_up + lazy_str_hard_failure = True + + # We might want to check the sequence again with the whole content + # Only if initial MD tests passes + if ( + not lazy_str_hard_failure + and is_too_large_sequence + and not is_multi_byte_decoder + ): + try: + sequences[int(50e3) :].decode(encoding_iana, errors="strict") + except UnicodeDecodeError as e: + logger.log( + TRACE, + "LazyStr Loading: After final lookup, code page %s does not fit given bytes sequence at ALL. %s", + encoding_iana, + str(e), + ) + tested_but_hard_failure.append(encoding_iana) + continue + + mean_mess_ratio: float = sum(md_ratios) / len(md_ratios) if md_ratios else 0.0 + if mean_mess_ratio >= threshold or early_stop_count >= max_chunk_gave_up: + tested_but_soft_failure.append(encoding_iana) + logger.log( + TRACE, + "%s was excluded because of initial chaos probing. Gave up %i time(s). " + "Computed mean chaos is %f %%.", + encoding_iana, + early_stop_count, + round(mean_mess_ratio * 100, ndigits=3), + ) + # Preparing those fallbacks in case we got nothing. + if ( + encoding_iana in ["ascii", "utf_8", specified_encoding] + and not lazy_str_hard_failure + ): + fallback_entry = CharsetMatch( + sequences, encoding_iana, threshold, False, [], decoded_payload + ) + if encoding_iana == specified_encoding: + fallback_specified = fallback_entry + elif encoding_iana == "ascii": + fallback_ascii = fallback_entry + else: + fallback_u8 = fallback_entry + continue + + logger.log( + TRACE, + "%s passed initial chaos probing. Mean measured chaos is %f %%", + encoding_iana, + round(mean_mess_ratio * 100, ndigits=3), + ) + + if not is_multi_byte_decoder: + target_languages: List[str] = encoding_languages(encoding_iana) + else: + target_languages = mb_encoding_languages(encoding_iana) + + if target_languages: + logger.log( + TRACE, + "{} should target any language(s) of {}".format( + encoding_iana, str(target_languages) + ), + ) + + cd_ratios = [] + + # We shall skip the CD when its about ASCII + # Most of the time its not relevant to run "language-detection" on it. + if encoding_iana != "ascii": + for chunk in md_chunks: + chunk_languages = coherence_ratio( + chunk, 0.1, ",".join(target_languages) if target_languages else None + ) + + cd_ratios.append(chunk_languages) + + cd_ratios_merged = merge_coherence_ratios(cd_ratios) + + if cd_ratios_merged: + logger.log( + TRACE, + "We detected language {} using {}".format( + cd_ratios_merged, encoding_iana + ), + ) + + results.append( + CharsetMatch( + sequences, + encoding_iana, + mean_mess_ratio, + bom_or_sig_available, + cd_ratios_merged, + decoded_payload, + ) + ) + + if ( + encoding_iana in [specified_encoding, "ascii", "utf_8"] + and mean_mess_ratio < 0.1 + ): + logger.debug( + "Encoding detection: %s is most likely the one.", encoding_iana + ) + if explain: + logger.removeHandler(explain_handler) + logger.setLevel(previous_logger_level) + return CharsetMatches([results[encoding_iana]]) + + if encoding_iana == sig_encoding: + logger.debug( + "Encoding detection: %s is most likely the one as we detected a BOM or SIG within " + "the beginning of the sequence.", + encoding_iana, + ) + if explain: + logger.removeHandler(explain_handler) + logger.setLevel(previous_logger_level) + return CharsetMatches([results[encoding_iana]]) + + if len(results) == 0: + if fallback_u8 or fallback_ascii or fallback_specified: + logger.log( + TRACE, + "Nothing got out of the detection process. Using ASCII/UTF-8/Specified fallback.", + ) + + if fallback_specified: + logger.debug( + "Encoding detection: %s will be used as a fallback match", + fallback_specified.encoding, + ) + results.append(fallback_specified) + elif ( + (fallback_u8 and fallback_ascii is None) + or ( + fallback_u8 + and fallback_ascii + and fallback_u8.fingerprint != fallback_ascii.fingerprint + ) + or (fallback_u8 is not None) + ): + logger.debug("Encoding detection: utf_8 will be used as a fallback match") + results.append(fallback_u8) + elif fallback_ascii: + logger.debug("Encoding detection: ascii will be used as a fallback match") + results.append(fallback_ascii) + + if results: + logger.debug( + "Encoding detection: Found %s as plausible (best-candidate) for content. With %i alternatives.", + results.best().encoding, # type: ignore + len(results) - 1, + ) + else: + logger.debug("Encoding detection: Unable to determine any suitable charset.") + + if explain: + logger.removeHandler(explain_handler) + logger.setLevel(previous_logger_level) + + return results + + +def from_fp( + fp: BinaryIO, + steps: int = 5, + chunk_size: int = 512, + threshold: float = 0.20, + cp_isolation: Optional[List[str]] = None, + cp_exclusion: Optional[List[str]] = None, + preemptive_behaviour: bool = True, + explain: bool = False, +) -> CharsetMatches: + """ + Same thing than the function from_bytes but using a file pointer that is already ready. + Will not close the file pointer. + """ + return from_bytes( + fp.read(), + steps, + chunk_size, + threshold, + cp_isolation, + cp_exclusion, + preemptive_behaviour, + explain, + ) + + +def from_path( + path: "PathLike[Any]", + steps: int = 5, + chunk_size: int = 512, + threshold: float = 0.20, + cp_isolation: Optional[List[str]] = None, + cp_exclusion: Optional[List[str]] = None, + preemptive_behaviour: bool = True, + explain: bool = False, +) -> CharsetMatches: + """ + Same thing than the function from_bytes but with one extra step. Opening and reading given file path in binary mode. + Can raise IOError. + """ + with open(path, "rb") as fp: + return from_fp( + fp, + steps, + chunk_size, + threshold, + cp_isolation, + cp_exclusion, + preemptive_behaviour, + explain, + ) + + +def normalize( + path: "PathLike[Any]", + steps: int = 5, + chunk_size: int = 512, + threshold: float = 0.20, + cp_isolation: Optional[List[str]] = None, + cp_exclusion: Optional[List[str]] = None, + preemptive_behaviour: bool = True, +) -> CharsetMatch: + """ + Take a (text-based) file path and try to create another file next to it, this time using UTF-8. + """ + warnings.warn( + "normalize is deprecated and will be removed in 3.0", + DeprecationWarning, + ) + + results = from_path( + path, + steps, + chunk_size, + threshold, + cp_isolation, + cp_exclusion, + preemptive_behaviour, + ) + + filename = basename(path) + target_extensions = list(splitext(filename)) + + if len(results) == 0: + raise IOError( + 'Unable to normalize "{}", no encoding charset seems to fit.'.format( + filename + ) + ) + + result = results.best() + + target_extensions[0] += "-" + result.encoding # type: ignore + + with open( + "{}".format(str(path).replace(filename, "".join(target_extensions))), "wb" + ) as fp: + fp.write(result.output()) # type: ignore + + return result # type: ignore diff --git a/_vendor/charset_normalizer/assets/__init__.py b/_vendor/charset_normalizer/assets/__init__.py new file mode 100644 index 0000000..3c33ba3 --- /dev/null +++ b/_vendor/charset_normalizer/assets/__init__.py @@ -0,0 +1,1122 @@ +# -*- coding: utf-8 -*- +from typing import Dict, List + +FREQUENCIES: Dict[str, List[str]] = { + "English": [ + "e", + "a", + "t", + "i", + "o", + "n", + "s", + "r", + "h", + "l", + "d", + "c", + "u", + "m", + "f", + "p", + "g", + "w", + "y", + "b", + "v", + "k", + "x", + "j", + "z", + "q", + ], + "German": [ + "e", + "n", + "i", + "r", + "s", + "t", + "a", + "d", + "h", + "u", + "l", + "g", + "o", + "c", + "m", + "b", + "f", + "k", + "w", + "z", + "p", + "v", + "ü", + "ä", + "ö", + "j", + ], + "French": [ + "e", + "a", + "s", + "n", + "i", + "t", + "r", + "l", + "u", + "o", + "d", + "c", + "p", + "m", + "é", + "v", + "g", + "f", + "b", + "h", + "q", + "à", + "x", + "è", + "y", + "j", + ], + "Dutch": [ + "e", + "n", + "a", + "i", + "r", + "t", + "o", + "d", + "s", + "l", + "g", + "h", + "v", + "m", + "u", + "k", + "c", + "p", + "b", + "w", + "j", + "z", + "f", + "y", + "x", + "ë", + ], + "Italian": [ + "e", + "i", + "a", + "o", + "n", + "l", + "t", + "r", + "s", + "c", + "d", + "u", + "p", + "m", + "g", + "v", + "f", + "b", + "z", + "h", + "q", + "è", + "à", + "k", + "y", + "ò", + ], + "Polish": [ + "a", + "i", + "o", + "e", + "n", + "r", + "z", + "w", + "s", + "c", + "t", + "k", + "y", + "d", + "p", + "m", + "u", + "l", + "j", + "ł", + "g", + "b", + "h", + "ą", + "ę", + "ó", + ], + "Spanish": [ + "e", + "a", + "o", + "n", + "s", + "r", + "i", + "l", + "d", + "t", + "c", + "u", + "m", + "p", + "b", + "g", + "v", + "f", + "y", + "ó", + "h", + "q", + "í", + "j", + "z", + "á", + ], + "Russian": [ + "о", + "а", + "е", + "и", + "н", + "с", + "т", + "р", + "в", + "л", + "к", + "м", + "д", + "п", + "у", + "г", + "я", + "ы", + "з", + "б", + "й", + "ь", + "ч", + "х", + "ж", + "ц", + ], + "Japanese": [ + "の", + "に", + "る", + "た", + "は", + "ー", + "と", + "し", + "を", + "で", + "て", + "が", + "い", + "ン", + "れ", + "な", + "年", + "ス", + "っ", + "ル", + "か", + "ら", + "あ", + "さ", + "も", + "り", + ], + "Portuguese": [ + "a", + "e", + "o", + "s", + "i", + "r", + "d", + "n", + "t", + "m", + "u", + "c", + "l", + "p", + "g", + "v", + "b", + "f", + "h", + "ã", + "q", + "é", + "ç", + "á", + "z", + "í", + ], + "Swedish": [ + "e", + "a", + "n", + "r", + "t", + "s", + "i", + "l", + "d", + "o", + "m", + "k", + "g", + "v", + "h", + "f", + "u", + "p", + "ä", + "c", + "b", + "ö", + "å", + "y", + "j", + "x", + ], + "Chinese": [ + "的", + "一", + "是", + "不", + "了", + "在", + "人", + "有", + "我", + "他", + "这", + "个", + "们", + "中", + "来", + "上", + "大", + "为", + "和", + "国", + "地", + "到", + "以", + "说", + "时", + "要", + "就", + "出", + "会", + ], + "Ukrainian": [ + "о", + "а", + "н", + "і", + "и", + "р", + "в", + "т", + "е", + "с", + "к", + "л", + "у", + "д", + "м", + "п", + "з", + "я", + "ь", + "б", + "г", + "й", + "ч", + "х", + "ц", + "ї", + ], + "Norwegian": [ + "e", + "r", + "n", + "t", + "a", + "s", + "i", + "o", + "l", + "d", + "g", + "k", + "m", + "v", + "f", + "p", + "u", + "b", + "h", + "å", + "y", + "j", + "ø", + "c", + "æ", + "w", + ], + "Finnish": [ + "a", + "i", + "n", + "t", + "e", + "s", + "l", + "o", + "u", + "k", + "ä", + "m", + "r", + "v", + "j", + "h", + "p", + "y", + "d", + "ö", + "g", + "c", + "b", + "f", + "w", + "z", + ], + "Vietnamese": [ + "n", + "h", + "t", + "i", + "c", + "g", + "a", + "o", + "u", + "m", + "l", + "r", + "à", + "đ", + "s", + "e", + "v", + "p", + "b", + "y", + "ư", + "d", + "á", + "k", + "ộ", + "ế", + ], + "Czech": [ + "o", + "e", + "a", + "n", + "t", + "s", + "i", + "l", + "v", + "r", + "k", + "d", + "u", + "m", + "p", + "í", + "c", + "h", + "z", + "á", + "y", + "j", + "b", + "ě", + "é", + "ř", + ], + "Hungarian": [ + "e", + "a", + "t", + "l", + "s", + "n", + "k", + "r", + "i", + "o", + "z", + "á", + "é", + "g", + "m", + "b", + "y", + "v", + "d", + "h", + "u", + "p", + "j", + "ö", + "f", + "c", + ], + "Korean": [ + "이", + "다", + "에", + "의", + "는", + "로", + "하", + "을", + "가", + "고", + "지", + "서", + "한", + "은", + "기", + "으", + "년", + "대", + "사", + "시", + "를", + "리", + "도", + "인", + "스", + "일", + ], + "Indonesian": [ + "a", + "n", + "e", + "i", + "r", + "t", + "u", + "s", + "d", + "k", + "m", + "l", + "g", + "p", + "b", + "o", + "h", + "y", + "j", + "c", + "w", + "f", + "v", + "z", + "x", + "q", + ], + "Turkish": [ + "a", + "e", + "i", + "n", + "r", + "l", + "ı", + "k", + "d", + "t", + "s", + "m", + "y", + "u", + "o", + "b", + "ü", + "ş", + "v", + "g", + "z", + "h", + "c", + "p", + "ç", + "ğ", + ], + "Romanian": [ + "e", + "i", + "a", + "r", + "n", + "t", + "u", + "l", + "o", + "c", + "s", + "d", + "p", + "m", + "ă", + "f", + "v", + "î", + "g", + "b", + "ș", + "ț", + "z", + "h", + "â", + "j", + ], + "Farsi": [ + "ا", + "ی", + "ر", + "د", + "ن", + "ه", + "و", + "م", + "ت", + "ب", + "س", + "ل", + "ک", + "ش", + "ز", + "ف", + "گ", + "ع", + "خ", + "ق", + "ج", + "آ", + "پ", + "ح", + "ط", + "ص", + ], + "Arabic": [ + "ا", + "ل", + "ي", + "م", + "و", + "ن", + "ر", + "ت", + "ب", + "ة", + "ع", + "د", + "س", + "ف", + "ه", + "ك", + "ق", + "أ", + "ح", + "ج", + "ش", + "ط", + "ص", + "ى", + "خ", + "إ", + ], + "Danish": [ + "e", + "r", + "n", + "t", + "a", + "i", + "s", + "d", + "l", + "o", + "g", + "m", + "k", + "f", + "v", + "u", + "b", + "h", + "p", + "å", + "y", + "ø", + "æ", + "c", + "j", + "w", + ], + "Serbian": [ + "а", + "и", + "о", + "е", + "н", + "р", + "с", + "у", + "т", + "к", + "ј", + "в", + "д", + "м", + "п", + "л", + "г", + "з", + "б", + "a", + "i", + "e", + "o", + "n", + "ц", + "ш", + ], + "Lithuanian": [ + "i", + "a", + "s", + "o", + "r", + "e", + "t", + "n", + "u", + "k", + "m", + "l", + "p", + "v", + "d", + "j", + "g", + "ė", + "b", + "y", + "ų", + "š", + "ž", + "c", + "ą", + "į", + ], + "Slovene": [ + "e", + "a", + "i", + "o", + "n", + "r", + "s", + "l", + "t", + "j", + "v", + "k", + "d", + "p", + "m", + "u", + "z", + "b", + "g", + "h", + "č", + "c", + "š", + "ž", + "f", + "y", + ], + "Slovak": [ + "o", + "a", + "e", + "n", + "i", + "r", + "v", + "t", + "s", + "l", + "k", + "d", + "m", + "p", + "u", + "c", + "h", + "j", + "b", + "z", + "á", + "y", + "ý", + "í", + "č", + "é", + ], + "Hebrew": [ + "י", + "ו", + "ה", + "ל", + "ר", + "ב", + "ת", + "מ", + "א", + "ש", + "נ", + "ע", + "ם", + "ד", + "ק", + "ח", + "פ", + "ס", + "כ", + "ג", + "ט", + "צ", + "ן", + "ז", + "ך", + ], + "Bulgarian": [ + "а", + "и", + "о", + "е", + "н", + "т", + "р", + "с", + "в", + "л", + "к", + "д", + "п", + "м", + "з", + "г", + "я", + "ъ", + "у", + "б", + "ч", + "ц", + "й", + "ж", + "щ", + "х", + ], + "Croatian": [ + "a", + "i", + "o", + "e", + "n", + "r", + "j", + "s", + "t", + "u", + "k", + "l", + "v", + "d", + "m", + "p", + "g", + "z", + "b", + "c", + "č", + "h", + "š", + "ž", + "ć", + "f", + ], + "Hindi": [ + "क", + "र", + "स", + "न", + "त", + "म", + "ह", + "प", + "य", + "ल", + "व", + "ज", + "द", + "ग", + "ब", + "श", + "ट", + "अ", + "ए", + "थ", + "भ", + "ड", + "च", + "ध", + "ष", + "इ", + ], + "Estonian": [ + "a", + "i", + "e", + "s", + "t", + "l", + "u", + "n", + "o", + "k", + "r", + "d", + "m", + "v", + "g", + "p", + "j", + "h", + "ä", + "b", + "õ", + "ü", + "f", + "c", + "ö", + "y", + ], + "Simple English": [ + "e", + "a", + "t", + "i", + "o", + "n", + "s", + "r", + "h", + "l", + "d", + "c", + "m", + "u", + "f", + "p", + "g", + "w", + "b", + "y", + "v", + "k", + "j", + "x", + "z", + "q", + ], + "Thai": [ + "า", + "น", + "ร", + "อ", + "ก", + "เ", + "ง", + "ม", + "ย", + "ล", + "ว", + "ด", + "ท", + "ส", + "ต", + "ะ", + "ป", + "บ", + "ค", + "ห", + "แ", + "จ", + "พ", + "ช", + "ข", + "ใ", + ], + "Greek": [ + "α", + "τ", + "ο", + "ι", + "ε", + "ν", + "ρ", + "σ", + "κ", + "η", + "π", + "ς", + "υ", + "μ", + "λ", + "ί", + "ό", + "ά", + "γ", + "έ", + "δ", + "ή", + "ω", + "χ", + "θ", + "ύ", + ], + "Tamil": [ + "க", + "த", + "ப", + "ட", + "ர", + "ம", + "ல", + "ன", + "வ", + "ற", + "ய", + "ள", + "ச", + "ந", + "இ", + "ண", + "அ", + "ஆ", + "ழ", + "ங", + "எ", + "உ", + "ஒ", + "ஸ", + ], + "Classical Chinese": [ + "之", + "年", + "為", + "也", + "以", + "一", + "人", + "其", + "者", + "國", + "有", + "二", + "十", + "於", + "曰", + "三", + "不", + "大", + "而", + "子", + "中", + "五", + "四", + ], + "Kazakh": [ + "а", + "ы", + "е", + "н", + "т", + "р", + "л", + "і", + "д", + "с", + "м", + "қ", + "к", + "о", + "б", + "и", + "у", + "ғ", + "ж", + "ң", + "з", + "ш", + "й", + "п", + "г", + "ө", + ], +} diff --git a/_vendor/charset_normalizer/assets/__pycache__/__init__.cpython-310.pyc b/_vendor/charset_normalizer/assets/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..5a0791188aefc5d597b28e278ddf562f3404fec9 GIT binary patch literal 7710 zcmZ`;YjjlA6`ngJlYj!gl?WOiRYx8HK^}@P-Uy=daIH=s>5#c5Bgss-nSij`N)nK_ zpeU~-A}~CK35eh%fczk|wm(qpY8h_-T$f3tLVvVf^hf`+XMf+BITO}uvaI+{F9$@8?rL{WEV=EP2-F`(6t9KgFu>qWY^lX8C*zd=X#7s`k}bA*;q8@>{;B zFXFHCMf&Wqwpft@Wfj5-D60rov9kKY>Zhz*VBM;${;&opYap!Klyy6-JCt=Nth`Ve>mgVVE9()l6xK(T{S(warmV+dJ)x{1 ztS6N<6xJ|h4Tm*CS!J+BDr*$1r<64s))-|y4Qs5j#=#n|tO>B5QP#7tCMxSWSkEi# z1z0aC>m^u|lr;l_w7Yy>f z=^x~?3nQ;g^hM^(^95i1o5V8ccMGOOD-v$O>}XvgR5UeKSsksb3YNH*?OI{iO1M_k zwc@T7bFDhpa$Kv*wW?h!;#w81Rqt9guJxvC)w))tYb|xHWv;c*wU)TnBG-D`wcc{A z<*v0j6qs&1HQ`vW#3@j-I(ZJ2?pKwez%<8>Rj4;5B1{Y%1{)9oARqt?AOIk6 zU?u^>u@7NZf(0-@#H$R+b^639$=L^;dz4K?g;VMi1`uEXmGKh*83cf9yn|`vt?3=W zg<}j-z=5B{2Xq#20)>I~X{cysB3vCc5d#Ro!Tdmnsg08W2Xnzcm_O$q`UL2VV-T#I zcbrEA)59VFTQJeBpM?Ui#mP%D1ZV)n&E}BugHJjCTM4pnw+6f@6ROe!|?KGVowN5Z(9*fq7hflJgVi zKMK+ygsj-@7R{}%t3%9C^Uar3$EZ$HrK!$BU233eq*}qY&!|pQbx<*hzWJP`b5NI> zSUSPdCaU$U{DSH@RXf`@P_3p~#kNx{z3Udg99Ay1>+E1jeINDC-#4VR{*=0Ly)N(4 zx{bQ&j4mJ4dK-1)2fBPf>-}19(0V0x(+TRvZ2jRIGJkjb=eoX~x?wMMlg87a@iea0 z?TuQ0MBS*%jq5`FUW+@4`pSB|9a#+Sf-v9;Xad53CP*=G1q=aKz#1?KgfUzJb&yy> z6ZrG|UPsm(=b>E10VgOG$dM3Dy3!q}@BV=7=x#pCa?3I5 zHOJ7u>olLg+D6v&Y&(VatNR<+@7Qtb)f}(u%+65X1&f?;G{%K?sCa6ah_bAcE^T#2 zNX1hkMvE9FVz`KrBAym8M#KaW<3x-VFPD}(C;2*HyJpc&19}oZ)5FqJF1rT1rFcy5y9WFxs z-iX?XSh$9X3=|j%*#eK?Q4C@>OyB_uU<4G|>frUx_jv@uivS>C!B2t>oql(WTUSsZ z%A0{q-<>9@zw0;`DxAFB#sLBzz+eDiJatntV=6#_r{Dnt6c}WkVD{oAv33AKE^0W2 z@im&U*ucK9Bh+_BeXKI<z(C)?aVsmhs~;E=oV1 z_=L|LVEOvWY=7$Ot-4>Di^cU8ZdKP-ahz)#^mC0zIL>-LcWs~Ux1aUbHnIQp)-?OA z)3{sDg!;{lMdE7Vq^C{D!2q+X!13@A91p+2@rITlt>GSc1lO8qgWSjlxE2&bsO0pB z9mg%2U+*m9wgNB)2ZD__3js))<2>yFj@fa539|w*kRb36WFNe+EAOxk1V9RWc!e3+ zo}Ifw#dG88`jJOPxCQ6{$D|0RGwTS3GycNBf{oal$S-li4Ou?Vr_9L_J-*sO)y!R2 z5VGSQedeDQcIu+R5>#dmpz~jONXqc!lxaiTm3OIla=NmHB_5zMhf&HLq~dAp%F22{ z=O|@(w7b&4HV&QP*({Sn&nr9&W{&WIJy2J8l*}AOmkf_~nUikdB`3TvTA?mc zKUH%%6-u!GI;UJJektPTB0?g5B_gZ@$3En|DHT5xu~399;ulJAkS3=pYiIU4Z%JcR zL`1|Q5!Fht?^>raYiIU_0#kaO%x?-Y!VUtMz?z672S7h0hhaIGVfHRiVWyw}P3MU< zUj!(F6-d%V9kOg^A(=N!nn#EjDq^^ZG7(RS7%5_ch*2VBXUDr;+RmMSoYamLFBOoC$0^a_n;{kvU(!*JWt%(Ol&h-aOYE3B{^#AO0MNV%umLJU z27s6tH~8QglvFrV1~WWv6lu1!I_u2uw4F# zr4OlEs18!SPj#5;W2((mhp0ZGVwPWSWoZi)SEI|@SV~gurfR18fNDF{eyUwmTd8)s zeJ9md=gtBDHwD0XlLw>ay+Luw1D)0Zz8Uc^-5p=Q^#$ zc{fx%*@=e}dHbaynF%mr3u+;(2(ZZlu+MPcL>c@tbVIxmMFc&^Gl1?~4Z4L2XGCKW zwGCiv_maFldPyD`yd<}LFUi}jm*m#(C3!pclDwUIN#1L`ByYuD@-sc&Nv(Ob@RGa* zdr97sy(EtqUXu3}FUi}rmt3Wv+oUz`H(rwWB`>*K*YDJt_a!g+g)XlS6;G{8#Pz;= z)8b^D3Rl9jNGv29@&^$>Hp9K}Hr$JJLTKPr9PuTSZeSBW>Bu3$9Q~Y9DN1VfT38TJ z6L`!GP?#120~r7yj6eaPSR{Y~cyJy2ShKuT0f_~p5CL&Ix1=H{WK4*URp<2-*&yUW|cmOdg*5UypCR)2TU)` zZyR2_ovM zNWG`$;dc!$#jjdkDjmEREnV&FooOlpDE!dap(}SeuL~PziFhU3+`USFl~}=9yIa;f zbFz(H9r_c;Mh3rUD{mn^&2&LmdaW~ChI=jh#MKr0iKCmHSF@E}9pqqlbF<30Ve-I4 z5yM54i5MjUt3B5Exl$Y_Vx$OJ;}N58oB4rbsMKO*A0gI+T>BO$x3+(~m!CUg(gWW& zuwTe7fwBH{C>U5iU|zJQw%RV$|L1TE=2wNIZsBytwiks8=Z9;e)yr?6Tpd>5Q7gjL zrTT+ZC@?F$JiMsNy=B_msjn}XI%o3Csq^Lp18yL(tTq~}bcFtnd`oiPR>JL5mvG#H z<>ld6ES^yNOgvUsUVg~u{91a5_|MF;L``j3ZM1fHBJ5P!iQ!`wN1wKrjIJoFjxH># zU6!bd$I2?I)aAfVl*i)ge<#(^<+f9%fZ2(zmJ8Z-xk9(M z>he3f+`zILaWHGtm|eNL@wvLMa&_}_bw_e_wYj>@**Z01|7@)q^Iv)O!Mys*dG%BC z>QCp@hx6)p<<qoi<-NqSKHWLZGY_5_Ij_jwq9*Dz1p_qx2YNX<+rLi e|9w;YW4+r8+}`bhNrA!mEeQ@27 literal 0 HcmV?d00001 diff --git a/_vendor/charset_normalizer/cd.py b/_vendor/charset_normalizer/cd.py new file mode 100644 index 0000000..ee4b742 --- /dev/null +++ b/_vendor/charset_normalizer/cd.py @@ -0,0 +1,339 @@ +import importlib +from codecs import IncrementalDecoder +from collections import Counter +from functools import lru_cache +from typing import Counter as TypeCounter, Dict, List, Optional, Tuple + +from .assets import FREQUENCIES +from .constant import KO_NAMES, LANGUAGE_SUPPORTED_COUNT, TOO_SMALL_SEQUENCE, ZH_NAMES +from .md import is_suspiciously_successive_range +from .models import CoherenceMatches +from .utils import ( + is_accentuated, + is_latin, + is_multi_byte_encoding, + is_unicode_range_secondary, + unicode_range, +) + + +def encoding_unicode_range(iana_name: str) -> List[str]: + """ + Return associated unicode ranges in a single byte code page. + """ + if is_multi_byte_encoding(iana_name): + raise IOError("Function not supported on multi-byte code page") + + decoder = importlib.import_module( + "encodings.{}".format(iana_name) + ).IncrementalDecoder + + p: IncrementalDecoder = decoder(errors="ignore") + seen_ranges: Dict[str, int] = {} + character_count: int = 0 + + for i in range(0x40, 0xFF): + chunk: str = p.decode(bytes([i])) + + if chunk: + character_range: Optional[str] = unicode_range(chunk) + + if character_range is None: + continue + + if is_unicode_range_secondary(character_range) is False: + if character_range not in seen_ranges: + seen_ranges[character_range] = 0 + seen_ranges[character_range] += 1 + character_count += 1 + + return sorted( + [ + character_range + for character_range in seen_ranges + if seen_ranges[character_range] / character_count >= 0.15 + ] + ) + + +def unicode_range_languages(primary_range: str) -> List[str]: + """ + Return inferred languages used with a unicode range. + """ + languages: List[str] = [] + + for language, characters in FREQUENCIES.items(): + for character in characters: + if unicode_range(character) == primary_range: + languages.append(language) + break + + return languages + + +@lru_cache() +def encoding_languages(iana_name: str) -> List[str]: + """ + Single-byte encoding language association. Some code page are heavily linked to particular language(s). + This function does the correspondence. + """ + unicode_ranges: List[str] = encoding_unicode_range(iana_name) + primary_range: Optional[str] = None + + for specified_range in unicode_ranges: + if "Latin" not in specified_range: + primary_range = specified_range + break + + if primary_range is None: + return ["Latin Based"] + + return unicode_range_languages(primary_range) + + +@lru_cache() +def mb_encoding_languages(iana_name: str) -> List[str]: + """ + Multi-byte encoding language association. Some code page are heavily linked to particular language(s). + This function does the correspondence. + """ + if ( + iana_name.startswith("shift_") + or iana_name.startswith("iso2022_jp") + or iana_name.startswith("euc_j") + or iana_name == "cp932" + ): + return ["Japanese"] + if iana_name.startswith("gb") or iana_name in ZH_NAMES: + return ["Chinese", "Classical Chinese"] + if iana_name.startswith("iso2022_kr") or iana_name in KO_NAMES: + return ["Korean"] + + return [] + + +@lru_cache(maxsize=LANGUAGE_SUPPORTED_COUNT) +def get_target_features(language: str) -> Tuple[bool, bool]: + """ + Determine main aspects from a supported language if it contains accents and if is pure Latin. + """ + target_have_accents: bool = False + target_pure_latin: bool = True + + for character in FREQUENCIES[language]: + if not target_have_accents and is_accentuated(character): + target_have_accents = True + if target_pure_latin and is_latin(character) is False: + target_pure_latin = False + + return target_have_accents, target_pure_latin + + +def alphabet_languages( + characters: List[str], ignore_non_latin: bool = False +) -> List[str]: + """ + Return associated languages associated to given characters. + """ + languages: List[Tuple[str, float]] = [] + + source_have_accents = any(is_accentuated(character) for character in characters) + + for language, language_characters in FREQUENCIES.items(): + + target_have_accents, target_pure_latin = get_target_features(language) + + if ignore_non_latin and target_pure_latin is False: + continue + + if target_have_accents is False and source_have_accents: + continue + + character_count: int = len(language_characters) + + character_match_count: int = len( + [c for c in language_characters if c in characters] + ) + + ratio: float = character_match_count / character_count + + if ratio >= 0.2: + languages.append((language, ratio)) + + languages = sorted(languages, key=lambda x: x[1], reverse=True) + + return [compatible_language[0] for compatible_language in languages] + + +def characters_popularity_compare( + language: str, ordered_characters: List[str] +) -> float: + """ + Determine if a ordered characters list (by occurrence from most appearance to rarest) match a particular language. + The result is a ratio between 0. (absolutely no correspondence) and 1. (near perfect fit). + Beware that is function is not strict on the match in order to ease the detection. (Meaning close match is 1.) + """ + if language not in FREQUENCIES: + raise ValueError("{} not available".format(language)) + + character_approved_count: int = 0 + FREQUENCIES_language_set = set(FREQUENCIES[language]) + + for character in ordered_characters: + if character not in FREQUENCIES_language_set: + continue + + characters_before_source: List[str] = FREQUENCIES[language][ + 0 : FREQUENCIES[language].index(character) + ] + characters_after_source: List[str] = FREQUENCIES[language][ + FREQUENCIES[language].index(character) : + ] + characters_before: List[str] = ordered_characters[ + 0 : ordered_characters.index(character) + ] + characters_after: List[str] = ordered_characters[ + ordered_characters.index(character) : + ] + + before_match_count: int = len( + set(characters_before) & set(characters_before_source) + ) + + after_match_count: int = len( + set(characters_after) & set(characters_after_source) + ) + + if len(characters_before_source) == 0 and before_match_count <= 4: + character_approved_count += 1 + continue + + if len(characters_after_source) == 0 and after_match_count <= 4: + character_approved_count += 1 + continue + + if ( + before_match_count / len(characters_before_source) >= 0.4 + or after_match_count / len(characters_after_source) >= 0.4 + ): + character_approved_count += 1 + continue + + return character_approved_count / len(ordered_characters) + + +def alpha_unicode_split(decoded_sequence: str) -> List[str]: + """ + Given a decoded text sequence, return a list of str. Unicode range / alphabet separation. + Ex. a text containing English/Latin with a bit a Hebrew will return two items in the resulting list; + One containing the latin letters and the other hebrew. + """ + layers: Dict[str, str] = {} + + for character in decoded_sequence: + if character.isalpha() is False: + continue + + character_range: Optional[str] = unicode_range(character) + + if character_range is None: + continue + + layer_target_range: Optional[str] = None + + for discovered_range in layers: + if ( + is_suspiciously_successive_range(discovered_range, character_range) + is False + ): + layer_target_range = discovered_range + break + + if layer_target_range is None: + layer_target_range = character_range + + if layer_target_range not in layers: + layers[layer_target_range] = character.lower() + continue + + layers[layer_target_range] += character.lower() + + return list(layers.values()) + + +def merge_coherence_ratios(results: List[CoherenceMatches]) -> CoherenceMatches: + """ + This function merge results previously given by the function coherence_ratio. + The return type is the same as coherence_ratio. + """ + per_language_ratios: Dict[str, List[float]] = {} + for result in results: + for sub_result in result: + language, ratio = sub_result + if language not in per_language_ratios: + per_language_ratios[language] = [ratio] + continue + per_language_ratios[language].append(ratio) + + merge = [ + ( + language, + round( + sum(per_language_ratios[language]) / len(per_language_ratios[language]), + 4, + ), + ) + for language in per_language_ratios + ] + + return sorted(merge, key=lambda x: x[1], reverse=True) + + +@lru_cache(maxsize=2048) +def coherence_ratio( + decoded_sequence: str, threshold: float = 0.1, lg_inclusion: Optional[str] = None +) -> CoherenceMatches: + """ + Detect ANY language that can be identified in given sequence. The sequence will be analysed by layers. + A layer = Character extraction by alphabets/ranges. + """ + + results: List[Tuple[str, float]] = [] + ignore_non_latin: bool = False + + sufficient_match_count: int = 0 + + lg_inclusion_list = lg_inclusion.split(",") if lg_inclusion is not None else [] + if "Latin Based" in lg_inclusion_list: + ignore_non_latin = True + lg_inclusion_list.remove("Latin Based") + + for layer in alpha_unicode_split(decoded_sequence): + sequence_frequencies: TypeCounter[str] = Counter(layer) + most_common = sequence_frequencies.most_common() + + character_count: int = sum(o for c, o in most_common) + + if character_count <= TOO_SMALL_SEQUENCE: + continue + + popular_character_ordered: List[str] = [c for c, o in most_common] + + for language in lg_inclusion_list or alphabet_languages( + popular_character_ordered, ignore_non_latin + ): + ratio: float = characters_popularity_compare( + language, popular_character_ordered + ) + + if ratio < threshold: + continue + elif ratio >= 0.8: + sufficient_match_count += 1 + + results.append((language, round(ratio, 4))) + + if sufficient_match_count >= 3: + break + + return sorted(results, key=lambda x: x[1], reverse=True) diff --git a/_vendor/charset_normalizer/cli/__init__.py b/_vendor/charset_normalizer/cli/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/_vendor/charset_normalizer/cli/__pycache__/__init__.cpython-310.pyc b/_vendor/charset_normalizer/cli/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..bff486519a486bb9e90133b452a60ed1bb75546f GIT binary patch literal 163 zcmd1j<>g`k0^S>8$sqbMh(HF6K#l_t7qb9~6oz01O-8?!3`HPe1o6vFza+OnzaXTZlX-=vg$oyg^Ai=@_00h(~_5c6? literal 0 HcmV?d00001 diff --git a/_vendor/charset_normalizer/cli/__pycache__/normalizer.cpython-310.pyc b/_vendor/charset_normalizer/cli/__pycache__/normalizer.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..eb507ba255de8062774dd639ec38bbb54bfa0adb GIT binary patch literal 6253 zcmb_g%X1q?dY@?wo&+DFBudoFW3Frxk^t!CU0JJ#Wl@spl_|xN>@pG+YKU%vLk?!Z zo(3tvV4@1Q%JP95C8xxd16h@eHjGzGmkYA zm4r!i3D0UID@onAyi_AyN$Y;n%QUi;Y$I36nMNlA$dotG$XD{F@u}etTZR~HziS%w z=(VAE?K8tSS7|2g4L3$ABYHLC?Q4uyMs+{y?Qa~Y968J&Chnj7*5ct&oE;!wn3qALI^V?V z=uOX^7E06z{$mlgJcZeTY9G2<4yVM0>?`Y}aqL)KtNCd~U~r+G;_#5)5WMH5XaLg6dHZ57aVyA{$_y|brAy^)p(w$%V=Ou%;McXrr| ztx(wut_tldw}4Jwi*XR18D%$Ubxzn5kYmE0B4j<}g){bqA57SRv}Xff*i#MR_+U_T zK)W4(hg=9Tms_p`2f;4sLQl|#Kspg~HqqC|isQ8eiTP0Ce;!0)4$!&ncwuh}^m{mN z0=KK|dLTm5$5gFgFDTUvFPF=qa%xKf%y`}lR!g;@QSK`?EMGW#@!Y$Yeq45%s)&^a zPNe9$z9_n+ig~9dFkBKvNMG~=%;Mm*fDdmMl5zk>7@6&ewME4IATs^gPTKy{cG-Vy z>qQ!Urbqh#8n4YhwmZjM9|F3(ugjjIF58oDg_Dudxp3bT4ur(9H3JyQs;d_4NiZ=< z>Ynt2NqdSq?cR72sw||U+$W^9TT%uxN`&n&N`;CCEfpnKrK?1g)ci+D=s`&Ep9fQN z5KSei*@;q3IByf~S6c|&n)up~$FTbHgR*Kg%T2dgRF13*RlKLEKpym!L@dN6tYL~Ch&%TV;P1r7AY#Q4Rg)x!moKk8Jh`iZJ9jDQ#`$4 znTDRv@GQ^q0iNfBd}t%pn;qsOdKQ6m&+L8#U4lKx$M(z~;)nI@I6tyy_9#E5XOHs} zduHFjQ4@wY`NW>tAMum?E&jH$_#~g=g$<+-&D$w{nxENBs+3Bv8!EGv;6+}FIp557 z5u*_6*kX>C5$(P}Z-5U_Pv!YpHMls$&uuV-`SXZVY;jmaeWl?E>MKB9cnxZVUtBW6 ze*n}7e`m>({{*NXzY0}1))H9XH*GvOAOG2xOpQJxE=KU~=RespRvV*J-mke4ZrN0{HI%N7k4+YIi?P&!vwc(@=JB2ZtyF32lzYuBEQ7T z>jM;5pPT;JtFX_E#c{kxzA)xZewAPQc?P4S(}?Q$KZf@>-V=D=z-#YfQg3!GP&&V4 zJvZggz}tlWx2BE9r@u6xVfRu3Gc(_#W`ddtY9^>%*VN1&H51fKP%}Zz1T|Ar8|d@B z{03+Y&^bJ3G6`PBH-E(6gGJJeDVxyKjaW}x=B{3#kCSw+fC!$k&9}CYx|hEpEp5Kd z--it(ffY8TA%4+KZcg%>gnJ8Tzi018f3JTW@WVa$e^gU^x=)keT4(+FJv)Ed-?{uv z=bSpsZ*L~~`!#Vttpw``1sBz2>#r@A?rxczPe9ARBHIkO-DKnn_}MOcp|P9F571*feU0b zRA__+X>uM(>kKgUW(1{3q+G|dl?+;Qp3oRNE0k+L7MQ;6N@Vs&zDxBT#y8{eZN~*$ zAWQbN8`daoBIUSs*LM_=5`Hb<)Iqg@WbWHaJW-(Ti4w|yUZ{^Jk%mzo0$h}+?BgP= zNmtj7QIa-<5tDN-&C{K++ZauS1xnl~H5}BIZD21XB1^TKNLxO15JuL5@R}V~T&Q0hE))_C2m-#HIV48SI4Ki~ zE7=cpvP81=JZ!`k*SEc(j@nDZ#2vrnXcj#jyk~#-;NGnL z>CD}`T4S~ct15w@-x(;PQ0bjRl-=oe?%o%&feHya-kFRG(cbCJ%ws{>Na1HlxH{P$ zr*evBb^WkoUPP%ur_gYH7s)T@A+QahGt13QdqAlK%qm5i;L9<52x=vdZ-P| znM1WzkEMxs5pGGirN9Z+M3nAzI(I&fXW~O!T@Wxn*{1EU%7p6J50!9qtyz;IHeAQ{ z#VQO|5P|tlx>$rQ0DV&bbv}3%IgX6X!wHuNKh)n2TJS_+hb;*|gYiQ;ay!qd$JJTQ zX^~wKc14Gv7Ert`1Rjr)+C=ML{T=;&bv?@NEOj1D3vyf(_chenLBno1PuxZePTvSx z2oflkp}+tZ=uyqaAsIADF2%Kl!mdm9*^+(bY7Y*bb0t)E1=ydqM|qNZr>N038M_W$ z=(M*`r&H?resRZvrTzJuU9|7(8(`c=q#(K&bS54w1gkd14RWMcoC=XlJaJX2kce40 z-zWUAQ+foY?Hnsf;&7DggaTsjv05CG*QStRQIvQ=s>sxyk5^t;nUjKTX z|GeHQ?l}(olN)y*-Li2sEsvA)%n7wBU`tTrjoE2ZACu>RAWDlTus|0z{l!N<3>8Nn z*e-|8-Fevf4+TZ=XHR^-Hc=uq6+d#?zz-V*$7F{(;{TBoF3J6x<|BW}4_5tGid?z` zqqH>$;=hlesT*D6ah3{PBzzPr64%ndX3OkBT(5s^Mwxz`{+dOsbT(o&x{&AQ5SyxX z+_pnq*vsQU7Uix`^q@$2?VpJP-3n3$V;PhEftji8&I#1<)!2bcSG=Hx``0ye`kVeJ zukt6r6cf5cy~}981ry#bb$JbwzoymeXre?*&38T|6~zus-=Org52YxkRXliq9T(&6SXn$Asb*XP`R;m2? znj{m9%+*d3+!ZfL66OUR%4?F-HRJ)_kghiRl#==yV(d8`XdqLqa<`_c)vuZSDIn#0 z)X-Jydy2ugA0s46qs9xe0DOeW3!g-&I$_Oqqm=8DL3Y>~`!#0hdkL9LNRF?W8IGAz zWHxNw#1{=1&SIiD!g~yYw`>a-DJXGdHjBOmNs=nEd?;7Gi>|zb29W7SyGkDVJ)Vye z&wU#jf(_wbw_P|NWst;C(I96Jy;|%bA97yBsxE+{3{?XUb>7E?-N9uPUWKGB>EoRw zEyy&QD5sIpzEGBE_6*G?oA^kg-C%d|=^E#IVu?u>E@O=OWj$d9O-a+*!y zbD5<@5?G5`8R`2`6<1o^$ivFP8U>E(oT%y#UA_DkWjx2Px174DWF4=$;2^4mQDQD= zR0f*@dB#^&9my;Ec80-%kU%e@geQD?nz%qU<46@!#eh4whXM!bL;oX-G*JxDfulZD zz5DQD;QEz(uga>@VMSH|IpiV2mVj_kdgh+~ARvn*6xouzji!*1ZxBpMYf~7%u*9akKN#K0h8e`ar{<_;)azPqBg0+(=zwA7R$3ymchfY0$7&X#%G6btyH`p zdw=NpU1r-FVZcm#a;C+s@2n*C>Crp>%i110kfAk<|8F?!Y5u@yk3NH*Qs3rNL^luK zhRi(i|1`ra@TIXs7WOSmv6t3&`JCpD9Wlr7rR2o6^>l=d>K*uI@|4ARp5nU+u$|O= zS%0v$t^K**k+eAz7{6oNkR>OVaAp*b8c1~2YQfZ>tqSIB;i$YvXRIB`S_}hU+fI}Y z!qRR~$RJ`Wa!>7-Q3~Zc;-{p@BU5O0Y?D3`pO5`^V5ZRwq>8^%4fJf6)+?huXWH`# zNjqz0{Pl%W1I36JYJaU9`GNIbc@jqrPEuNPLEy!Xlb{&U7o7rIwYn$#>OicGJ97nO pTAsKDqc%c{85si~r1UcaHIAT%|LuH&<_;&0y=nYKM&a bool: + """Ask a yes/no question via input() and return their answer. + + "question" is a string that is presented to the user. + "default" is the presumed answer if the user just hits . + It must be "yes" (the default), "no" or None (meaning + an answer is required of the user). + + The "answer" return value is True for "yes" or False for "no". + + Credit goes to (c) https://stackoverflow.com/questions/3041986/apt-command-line-interface-like-yes-no-input + """ + valid = {"yes": True, "y": True, "ye": True, "no": False, "n": False} + if default is None: + prompt = " [y/n] " + elif default == "yes": + prompt = " [Y/n] " + elif default == "no": + prompt = " [y/N] " + else: + raise ValueError("invalid default answer: '%s'" % default) + + while True: + sys.stdout.write(question + prompt) + choice = input().lower() + if default is not None and choice == "": + return valid[default] + elif choice in valid: + return valid[choice] + else: + sys.stdout.write("Please respond with 'yes' or 'no' " "(or 'y' or 'n').\n") + + +def cli_detect(argv: Optional[List[str]] = None) -> int: + """ + CLI assistant using ARGV and ArgumentParser + :param argv: + :return: 0 if everything is fine, anything else equal trouble + """ + parser = argparse.ArgumentParser( + description="The Real First Universal Charset Detector. " + "Discover originating encoding used on text file. " + "Normalize text to unicode." + ) + + parser.add_argument( + "files", type=argparse.FileType("rb"), nargs="+", help="File(s) to be analysed" + ) + parser.add_argument( + "-v", + "--verbose", + action="store_true", + default=False, + dest="verbose", + help="Display complementary information about file if any. " + "Stdout will contain logs about the detection process.", + ) + parser.add_argument( + "-a", + "--with-alternative", + action="store_true", + default=False, + dest="alternatives", + help="Output complementary possibilities if any. Top-level JSON WILL be a list.", + ) + parser.add_argument( + "-n", + "--normalize", + action="store_true", + default=False, + dest="normalize", + help="Permit to normalize input file. If not set, program does not write anything.", + ) + parser.add_argument( + "-m", + "--minimal", + action="store_true", + default=False, + dest="minimal", + help="Only output the charset detected to STDOUT. Disabling JSON output.", + ) + parser.add_argument( + "-r", + "--replace", + action="store_true", + default=False, + dest="replace", + help="Replace file when trying to normalize it instead of creating a new one.", + ) + parser.add_argument( + "-f", + "--force", + action="store_true", + default=False, + dest="force", + help="Replace file without asking if you are sure, use this flag with caution.", + ) + parser.add_argument( + "-t", + "--threshold", + action="store", + default=0.2, + type=float, + dest="threshold", + help="Define a custom maximum amount of chaos allowed in decoded content. 0. <= chaos <= 1.", + ) + parser.add_argument( + "--version", + action="version", + version="Charset-Normalizer {} - Python {} - Unicode {}".format( + __version__, python_version(), unidata_version + ), + help="Show version information and exit.", + ) + + args = parser.parse_args(argv) + + if args.replace is True and args.normalize is False: + print("Use --replace in addition of --normalize only.", file=sys.stderr) + return 1 + + if args.force is True and args.replace is False: + print("Use --force in addition of --replace only.", file=sys.stderr) + return 1 + + if args.threshold < 0.0 or args.threshold > 1.0: + print("--threshold VALUE should be between 0. AND 1.", file=sys.stderr) + return 1 + + x_ = [] + + for my_file in args.files: + + matches = from_fp(my_file, threshold=args.threshold, explain=args.verbose) + + best_guess = matches.best() + + if best_guess is None: + print( + 'Unable to identify originating encoding for "{}". {}'.format( + my_file.name, + "Maybe try increasing maximum amount of chaos." + if args.threshold < 1.0 + else "", + ), + file=sys.stderr, + ) + x_.append( + CliDetectionResult( + abspath(my_file.name), + None, + [], + [], + "Unknown", + [], + False, + 1.0, + 0.0, + None, + True, + ) + ) + else: + x_.append( + CliDetectionResult( + abspath(my_file.name), + best_guess.encoding, + best_guess.encoding_aliases, + [ + cp + for cp in best_guess.could_be_from_charset + if cp != best_guess.encoding + ], + best_guess.language, + best_guess.alphabets, + best_guess.bom, + best_guess.percent_chaos, + best_guess.percent_coherence, + None, + True, + ) + ) + + if len(matches) > 1 and args.alternatives: + for el in matches: + if el != best_guess: + x_.append( + CliDetectionResult( + abspath(my_file.name), + el.encoding, + el.encoding_aliases, + [ + cp + for cp in el.could_be_from_charset + if cp != el.encoding + ], + el.language, + el.alphabets, + el.bom, + el.percent_chaos, + el.percent_coherence, + None, + False, + ) + ) + + if args.normalize is True: + + if best_guess.encoding.startswith("utf") is True: + print( + '"{}" file does not need to be normalized, as it already came from unicode.'.format( + my_file.name + ), + file=sys.stderr, + ) + if my_file.closed is False: + my_file.close() + continue + + o_: List[str] = my_file.name.split(".") + + if args.replace is False: + o_.insert(-1, best_guess.encoding) + if my_file.closed is False: + my_file.close() + elif ( + args.force is False + and query_yes_no( + 'Are you sure to normalize "{}" by replacing it ?'.format( + my_file.name + ), + "no", + ) + is False + ): + if my_file.closed is False: + my_file.close() + continue + + try: + x_[0].unicode_path = abspath("./{}".format(".".join(o_))) + + with open(x_[0].unicode_path, "w", encoding="utf-8") as fp: + fp.write(str(best_guess)) + except IOError as e: + print(str(e), file=sys.stderr) + if my_file.closed is False: + my_file.close() + return 2 + + if my_file.closed is False: + my_file.close() + + if args.minimal is False: + print( + dumps( + [el.__dict__ for el in x_] if len(x_) > 1 else x_[0].__dict__, + ensure_ascii=True, + indent=4, + ) + ) + else: + for my_file in args.files: + print( + ", ".join( + [ + el.encoding or "undefined" + for el in x_ + if el.path == abspath(my_file.name) + ] + ) + ) + + return 0 + + +if __name__ == "__main__": + cli_detect() diff --git a/_vendor/charset_normalizer/constant.py b/_vendor/charset_normalizer/constant.py new file mode 100644 index 0000000..ac840c4 --- /dev/null +++ b/_vendor/charset_normalizer/constant.py @@ -0,0 +1,497 @@ +from codecs import BOM_UTF8, BOM_UTF16_BE, BOM_UTF16_LE, BOM_UTF32_BE, BOM_UTF32_LE +from encodings.aliases import aliases +from re import IGNORECASE, compile as re_compile +from typing import Dict, List, Set, Union + +from .assets import FREQUENCIES + +# Contain for each eligible encoding a list of/item bytes SIG/BOM +ENCODING_MARKS: Dict[str, Union[bytes, List[bytes]]] = { + "utf_8": BOM_UTF8, + "utf_7": [ + b"\x2b\x2f\x76\x38", + b"\x2b\x2f\x76\x39", + b"\x2b\x2f\x76\x2b", + b"\x2b\x2f\x76\x2f", + b"\x2b\x2f\x76\x38\x2d", + ], + "gb18030": b"\x84\x31\x95\x33", + "utf_32": [BOM_UTF32_BE, BOM_UTF32_LE], + "utf_16": [BOM_UTF16_BE, BOM_UTF16_LE], +} + +TOO_SMALL_SEQUENCE: int = 32 +TOO_BIG_SEQUENCE: int = int(10e6) + +UTF8_MAXIMAL_ALLOCATION: int = 1112064 + +UNICODE_RANGES_COMBINED: Dict[str, range] = { + "Control character": range(31 + 1), + "Basic Latin": range(32, 127 + 1), + "Latin-1 Supplement": range(128, 255 + 1), + "Latin Extended-A": range(256, 383 + 1), + "Latin Extended-B": range(384, 591 + 1), + "IPA Extensions": range(592, 687 + 1), + "Spacing Modifier Letters": range(688, 767 + 1), + "Combining Diacritical Marks": range(768, 879 + 1), + "Greek and Coptic": range(880, 1023 + 1), + "Cyrillic": range(1024, 1279 + 1), + "Cyrillic Supplement": range(1280, 1327 + 1), + "Armenian": range(1328, 1423 + 1), + "Hebrew": range(1424, 1535 + 1), + "Arabic": range(1536, 1791 + 1), + "Syriac": range(1792, 1871 + 1), + "Arabic Supplement": range(1872, 1919 + 1), + "Thaana": range(1920, 1983 + 1), + "NKo": range(1984, 2047 + 1), + "Samaritan": range(2048, 2111 + 1), + "Mandaic": range(2112, 2143 + 1), + "Syriac Supplement": range(2144, 2159 + 1), + "Arabic Extended-A": range(2208, 2303 + 1), + "Devanagari": range(2304, 2431 + 1), + "Bengali": range(2432, 2559 + 1), + "Gurmukhi": range(2560, 2687 + 1), + "Gujarati": range(2688, 2815 + 1), + "Oriya": range(2816, 2943 + 1), + "Tamil": range(2944, 3071 + 1), + "Telugu": range(3072, 3199 + 1), + "Kannada": range(3200, 3327 + 1), + "Malayalam": range(3328, 3455 + 1), + "Sinhala": range(3456, 3583 + 1), + "Thai": range(3584, 3711 + 1), + "Lao": range(3712, 3839 + 1), + "Tibetan": range(3840, 4095 + 1), + "Myanmar": range(4096, 4255 + 1), + "Georgian": range(4256, 4351 + 1), + "Hangul Jamo": range(4352, 4607 + 1), + "Ethiopic": range(4608, 4991 + 1), + "Ethiopic Supplement": range(4992, 5023 + 1), + "Cherokee": range(5024, 5119 + 1), + "Unified Canadian Aboriginal Syllabics": range(5120, 5759 + 1), + "Ogham": range(5760, 5791 + 1), + "Runic": range(5792, 5887 + 1), + "Tagalog": range(5888, 5919 + 1), + "Hanunoo": range(5920, 5951 + 1), + "Buhid": range(5952, 5983 + 1), + "Tagbanwa": range(5984, 6015 + 1), + "Khmer": range(6016, 6143 + 1), + "Mongolian": range(6144, 6319 + 1), + "Unified Canadian Aboriginal Syllabics Extended": range(6320, 6399 + 1), + "Limbu": range(6400, 6479 + 1), + "Tai Le": range(6480, 6527 + 1), + "New Tai Lue": range(6528, 6623 + 1), + "Khmer Symbols": range(6624, 6655 + 1), + "Buginese": range(6656, 6687 + 1), + "Tai Tham": range(6688, 6831 + 1), + "Combining Diacritical Marks Extended": range(6832, 6911 + 1), + "Balinese": range(6912, 7039 + 1), + "Sundanese": range(7040, 7103 + 1), + "Batak": range(7104, 7167 + 1), + "Lepcha": range(7168, 7247 + 1), + "Ol Chiki": range(7248, 7295 + 1), + "Cyrillic Extended C": range(7296, 7311 + 1), + "Sundanese Supplement": range(7360, 7375 + 1), + "Vedic Extensions": range(7376, 7423 + 1), + "Phonetic Extensions": range(7424, 7551 + 1), + "Phonetic Extensions Supplement": range(7552, 7615 + 1), + "Combining Diacritical Marks Supplement": range(7616, 7679 + 1), + "Latin Extended Additional": range(7680, 7935 + 1), + "Greek Extended": range(7936, 8191 + 1), + "General Punctuation": range(8192, 8303 + 1), + "Superscripts and Subscripts": range(8304, 8351 + 1), + "Currency Symbols": range(8352, 8399 + 1), + "Combining Diacritical Marks for Symbols": range(8400, 8447 + 1), + "Letterlike Symbols": range(8448, 8527 + 1), + "Number Forms": range(8528, 8591 + 1), + "Arrows": range(8592, 8703 + 1), + "Mathematical Operators": range(8704, 8959 + 1), + "Miscellaneous Technical": range(8960, 9215 + 1), + "Control Pictures": range(9216, 9279 + 1), + "Optical Character Recognition": range(9280, 9311 + 1), + "Enclosed Alphanumerics": range(9312, 9471 + 1), + "Box Drawing": range(9472, 9599 + 1), + "Block Elements": range(9600, 9631 + 1), + "Geometric Shapes": range(9632, 9727 + 1), + "Miscellaneous Symbols": range(9728, 9983 + 1), + "Dingbats": range(9984, 10175 + 1), + "Miscellaneous Mathematical Symbols-A": range(10176, 10223 + 1), + "Supplemental Arrows-A": range(10224, 10239 + 1), + "Braille Patterns": range(10240, 10495 + 1), + "Supplemental Arrows-B": range(10496, 10623 + 1), + "Miscellaneous Mathematical Symbols-B": range(10624, 10751 + 1), + "Supplemental Mathematical Operators": range(10752, 11007 + 1), + "Miscellaneous Symbols and Arrows": range(11008, 11263 + 1), + "Glagolitic": range(11264, 11359 + 1), + "Latin Extended-C": range(11360, 11391 + 1), + "Coptic": range(11392, 11519 + 1), + "Georgian Supplement": range(11520, 11567 + 1), + "Tifinagh": range(11568, 11647 + 1), + "Ethiopic Extended": range(11648, 11743 + 1), + "Cyrillic Extended-A": range(11744, 11775 + 1), + "Supplemental Punctuation": range(11776, 11903 + 1), + "CJK Radicals Supplement": range(11904, 12031 + 1), + "Kangxi Radicals": range(12032, 12255 + 1), + "Ideographic Description Characters": range(12272, 12287 + 1), + "CJK Symbols and Punctuation": range(12288, 12351 + 1), + "Hiragana": range(12352, 12447 + 1), + "Katakana": range(12448, 12543 + 1), + "Bopomofo": range(12544, 12591 + 1), + "Hangul Compatibility Jamo": range(12592, 12687 + 1), + "Kanbun": range(12688, 12703 + 1), + "Bopomofo Extended": range(12704, 12735 + 1), + "CJK Strokes": range(12736, 12783 + 1), + "Katakana Phonetic Extensions": range(12784, 12799 + 1), + "Enclosed CJK Letters and Months": range(12800, 13055 + 1), + "CJK Compatibility": range(13056, 13311 + 1), + "CJK Unified Ideographs Extension A": range(13312, 19903 + 1), + "Yijing Hexagram Symbols": range(19904, 19967 + 1), + "CJK Unified Ideographs": range(19968, 40959 + 1), + "Yi Syllables": range(40960, 42127 + 1), + "Yi Radicals": range(42128, 42191 + 1), + "Lisu": range(42192, 42239 + 1), + "Vai": range(42240, 42559 + 1), + "Cyrillic Extended-B": range(42560, 42655 + 1), + "Bamum": range(42656, 42751 + 1), + "Modifier Tone Letters": range(42752, 42783 + 1), + "Latin Extended-D": range(42784, 43007 + 1), + "Syloti Nagri": range(43008, 43055 + 1), + "Common Indic Number Forms": range(43056, 43071 + 1), + "Phags-pa": range(43072, 43135 + 1), + "Saurashtra": range(43136, 43231 + 1), + "Devanagari Extended": range(43232, 43263 + 1), + "Kayah Li": range(43264, 43311 + 1), + "Rejang": range(43312, 43359 + 1), + "Hangul Jamo Extended-A": range(43360, 43391 + 1), + "Javanese": range(43392, 43487 + 1), + "Myanmar Extended-B": range(43488, 43519 + 1), + "Cham": range(43520, 43615 + 1), + "Myanmar Extended-A": range(43616, 43647 + 1), + "Tai Viet": range(43648, 43743 + 1), + "Meetei Mayek Extensions": range(43744, 43775 + 1), + "Ethiopic Extended-A": range(43776, 43823 + 1), + "Latin Extended-E": range(43824, 43887 + 1), + "Cherokee Supplement": range(43888, 43967 + 1), + "Meetei Mayek": range(43968, 44031 + 1), + "Hangul Syllables": range(44032, 55215 + 1), + "Hangul Jamo Extended-B": range(55216, 55295 + 1), + "High Surrogates": range(55296, 56191 + 1), + "High Private Use Surrogates": range(56192, 56319 + 1), + "Low Surrogates": range(56320, 57343 + 1), + "Private Use Area": range(57344, 63743 + 1), + "CJK Compatibility Ideographs": range(63744, 64255 + 1), + "Alphabetic Presentation Forms": range(64256, 64335 + 1), + "Arabic Presentation Forms-A": range(64336, 65023 + 1), + "Variation Selectors": range(65024, 65039 + 1), + "Vertical Forms": range(65040, 65055 + 1), + "Combining Half Marks": range(65056, 65071 + 1), + "CJK Compatibility Forms": range(65072, 65103 + 1), + "Small Form Variants": range(65104, 65135 + 1), + "Arabic Presentation Forms-B": range(65136, 65279 + 1), + "Halfwidth and Fullwidth Forms": range(65280, 65519 + 1), + "Specials": range(65520, 65535 + 1), + "Linear B Syllabary": range(65536, 65663 + 1), + "Linear B Ideograms": range(65664, 65791 + 1), + "Aegean Numbers": range(65792, 65855 + 1), + "Ancient Greek Numbers": range(65856, 65935 + 1), + "Ancient Symbols": range(65936, 65999 + 1), + "Phaistos Disc": range(66000, 66047 + 1), + "Lycian": range(66176, 66207 + 1), + "Carian": range(66208, 66271 + 1), + "Coptic Epact Numbers": range(66272, 66303 + 1), + "Old Italic": range(66304, 66351 + 1), + "Gothic": range(66352, 66383 + 1), + "Old Permic": range(66384, 66431 + 1), + "Ugaritic": range(66432, 66463 + 1), + "Old Persian": range(66464, 66527 + 1), + "Deseret": range(66560, 66639 + 1), + "Shavian": range(66640, 66687 + 1), + "Osmanya": range(66688, 66735 + 1), + "Osage": range(66736, 66815 + 1), + "Elbasan": range(66816, 66863 + 1), + "Caucasian Albanian": range(66864, 66927 + 1), + "Linear A": range(67072, 67455 + 1), + "Cypriot Syllabary": range(67584, 67647 + 1), + "Imperial Aramaic": range(67648, 67679 + 1), + "Palmyrene": range(67680, 67711 + 1), + "Nabataean": range(67712, 67759 + 1), + "Hatran": range(67808, 67839 + 1), + "Phoenician": range(67840, 67871 + 1), + "Lydian": range(67872, 67903 + 1), + "Meroitic Hieroglyphs": range(67968, 67999 + 1), + "Meroitic Cursive": range(68000, 68095 + 1), + "Kharoshthi": range(68096, 68191 + 1), + "Old South Arabian": range(68192, 68223 + 1), + "Old North Arabian": range(68224, 68255 + 1), + "Manichaean": range(68288, 68351 + 1), + "Avestan": range(68352, 68415 + 1), + "Inscriptional Parthian": range(68416, 68447 + 1), + "Inscriptional Pahlavi": range(68448, 68479 + 1), + "Psalter Pahlavi": range(68480, 68527 + 1), + "Old Turkic": range(68608, 68687 + 1), + "Old Hungarian": range(68736, 68863 + 1), + "Rumi Numeral Symbols": range(69216, 69247 + 1), + "Brahmi": range(69632, 69759 + 1), + "Kaithi": range(69760, 69839 + 1), + "Sora Sompeng": range(69840, 69887 + 1), + "Chakma": range(69888, 69967 + 1), + "Mahajani": range(69968, 70015 + 1), + "Sharada": range(70016, 70111 + 1), + "Sinhala Archaic Numbers": range(70112, 70143 + 1), + "Khojki": range(70144, 70223 + 1), + "Multani": range(70272, 70319 + 1), + "Khudawadi": range(70320, 70399 + 1), + "Grantha": range(70400, 70527 + 1), + "Newa": range(70656, 70783 + 1), + "Tirhuta": range(70784, 70879 + 1), + "Siddham": range(71040, 71167 + 1), + "Modi": range(71168, 71263 + 1), + "Mongolian Supplement": range(71264, 71295 + 1), + "Takri": range(71296, 71375 + 1), + "Ahom": range(71424, 71487 + 1), + "Warang Citi": range(71840, 71935 + 1), + "Zanabazar Square": range(72192, 72271 + 1), + "Soyombo": range(72272, 72367 + 1), + "Pau Cin Hau": range(72384, 72447 + 1), + "Bhaiksuki": range(72704, 72815 + 1), + "Marchen": range(72816, 72895 + 1), + "Masaram Gondi": range(72960, 73055 + 1), + "Cuneiform": range(73728, 74751 + 1), + "Cuneiform Numbers and Punctuation": range(74752, 74879 + 1), + "Early Dynastic Cuneiform": range(74880, 75087 + 1), + "Egyptian Hieroglyphs": range(77824, 78895 + 1), + "Anatolian Hieroglyphs": range(82944, 83583 + 1), + "Bamum Supplement": range(92160, 92735 + 1), + "Mro": range(92736, 92783 + 1), + "Bassa Vah": range(92880, 92927 + 1), + "Pahawh Hmong": range(92928, 93071 + 1), + "Miao": range(93952, 94111 + 1), + "Ideographic Symbols and Punctuation": range(94176, 94207 + 1), + "Tangut": range(94208, 100351 + 1), + "Tangut Components": range(100352, 101119 + 1), + "Kana Supplement": range(110592, 110847 + 1), + "Kana Extended-A": range(110848, 110895 + 1), + "Nushu": range(110960, 111359 + 1), + "Duployan": range(113664, 113823 + 1), + "Shorthand Format Controls": range(113824, 113839 + 1), + "Byzantine Musical Symbols": range(118784, 119039 + 1), + "Musical Symbols": range(119040, 119295 + 1), + "Ancient Greek Musical Notation": range(119296, 119375 + 1), + "Tai Xuan Jing Symbols": range(119552, 119647 + 1), + "Counting Rod Numerals": range(119648, 119679 + 1), + "Mathematical Alphanumeric Symbols": range(119808, 120831 + 1), + "Sutton SignWriting": range(120832, 121519 + 1), + "Glagolitic Supplement": range(122880, 122927 + 1), + "Mende Kikakui": range(124928, 125151 + 1), + "Adlam": range(125184, 125279 + 1), + "Arabic Mathematical Alphabetic Symbols": range(126464, 126719 + 1), + "Mahjong Tiles": range(126976, 127023 + 1), + "Domino Tiles": range(127024, 127135 + 1), + "Playing Cards": range(127136, 127231 + 1), + "Enclosed Alphanumeric Supplement": range(127232, 127487 + 1), + "Enclosed Ideographic Supplement": range(127488, 127743 + 1), + "Miscellaneous Symbols and Pictographs": range(127744, 128511 + 1), + "Emoticons range(Emoji)": range(128512, 128591 + 1), + "Ornamental Dingbats": range(128592, 128639 + 1), + "Transport and Map Symbols": range(128640, 128767 + 1), + "Alchemical Symbols": range(128768, 128895 + 1), + "Geometric Shapes Extended": range(128896, 129023 + 1), + "Supplemental Arrows-C": range(129024, 129279 + 1), + "Supplemental Symbols and Pictographs": range(129280, 129535 + 1), + "CJK Unified Ideographs Extension B": range(131072, 173791 + 1), + "CJK Unified Ideographs Extension C": range(173824, 177983 + 1), + "CJK Unified Ideographs Extension D": range(177984, 178207 + 1), + "CJK Unified Ideographs Extension E": range(178208, 183983 + 1), + "CJK Unified Ideographs Extension F": range(183984, 191471 + 1), + "CJK Compatibility Ideographs Supplement": range(194560, 195103 + 1), + "Tags": range(917504, 917631 + 1), + "Variation Selectors Supplement": range(917760, 917999 + 1), +} + + +UNICODE_SECONDARY_RANGE_KEYWORD: List[str] = [ + "Supplement", + "Extended", + "Extensions", + "Modifier", + "Marks", + "Punctuation", + "Symbols", + "Forms", + "Operators", + "Miscellaneous", + "Drawing", + "Block", + "Shapes", + "Supplemental", + "Tags", +] + +RE_POSSIBLE_ENCODING_INDICATION = re_compile( + r"(?:(?:encoding)|(?:charset)|(?:coding))(?:[\:= ]{1,10})(?:[\"\']?)([a-zA-Z0-9\-_]+)(?:[\"\']?)", + IGNORECASE, +) + +IANA_SUPPORTED: List[str] = sorted( + filter( + lambda x: x.endswith("_codec") is False + and x not in {"rot_13", "tactis", "mbcs"}, + list(set(aliases.values())), + ) +) + +IANA_SUPPORTED_COUNT: int = len(IANA_SUPPORTED) + +# pre-computed code page that are similar using the function cp_similarity. +IANA_SUPPORTED_SIMILAR: Dict[str, List[str]] = { + "cp037": ["cp1026", "cp1140", "cp273", "cp500"], + "cp1026": ["cp037", "cp1140", "cp273", "cp500"], + "cp1125": ["cp866"], + "cp1140": ["cp037", "cp1026", "cp273", "cp500"], + "cp1250": ["iso8859_2"], + "cp1251": ["kz1048", "ptcp154"], + "cp1252": ["iso8859_15", "iso8859_9", "latin_1"], + "cp1253": ["iso8859_7"], + "cp1254": ["iso8859_15", "iso8859_9", "latin_1"], + "cp1257": ["iso8859_13"], + "cp273": ["cp037", "cp1026", "cp1140", "cp500"], + "cp437": ["cp850", "cp858", "cp860", "cp861", "cp862", "cp863", "cp865"], + "cp500": ["cp037", "cp1026", "cp1140", "cp273"], + "cp850": ["cp437", "cp857", "cp858", "cp865"], + "cp857": ["cp850", "cp858", "cp865"], + "cp858": ["cp437", "cp850", "cp857", "cp865"], + "cp860": ["cp437", "cp861", "cp862", "cp863", "cp865"], + "cp861": ["cp437", "cp860", "cp862", "cp863", "cp865"], + "cp862": ["cp437", "cp860", "cp861", "cp863", "cp865"], + "cp863": ["cp437", "cp860", "cp861", "cp862", "cp865"], + "cp865": ["cp437", "cp850", "cp857", "cp858", "cp860", "cp861", "cp862", "cp863"], + "cp866": ["cp1125"], + "iso8859_10": ["iso8859_14", "iso8859_15", "iso8859_4", "iso8859_9", "latin_1"], + "iso8859_11": ["tis_620"], + "iso8859_13": ["cp1257"], + "iso8859_14": [ + "iso8859_10", + "iso8859_15", + "iso8859_16", + "iso8859_3", + "iso8859_9", + "latin_1", + ], + "iso8859_15": [ + "cp1252", + "cp1254", + "iso8859_10", + "iso8859_14", + "iso8859_16", + "iso8859_3", + "iso8859_9", + "latin_1", + ], + "iso8859_16": [ + "iso8859_14", + "iso8859_15", + "iso8859_2", + "iso8859_3", + "iso8859_9", + "latin_1", + ], + "iso8859_2": ["cp1250", "iso8859_16", "iso8859_4"], + "iso8859_3": ["iso8859_14", "iso8859_15", "iso8859_16", "iso8859_9", "latin_1"], + "iso8859_4": ["iso8859_10", "iso8859_2", "iso8859_9", "latin_1"], + "iso8859_7": ["cp1253"], + "iso8859_9": [ + "cp1252", + "cp1254", + "cp1258", + "iso8859_10", + "iso8859_14", + "iso8859_15", + "iso8859_16", + "iso8859_3", + "iso8859_4", + "latin_1", + ], + "kz1048": ["cp1251", "ptcp154"], + "latin_1": [ + "cp1252", + "cp1254", + "cp1258", + "iso8859_10", + "iso8859_14", + "iso8859_15", + "iso8859_16", + "iso8859_3", + "iso8859_4", + "iso8859_9", + ], + "mac_iceland": ["mac_roman", "mac_turkish"], + "mac_roman": ["mac_iceland", "mac_turkish"], + "mac_turkish": ["mac_iceland", "mac_roman"], + "ptcp154": ["cp1251", "kz1048"], + "tis_620": ["iso8859_11"], +} + + +CHARDET_CORRESPONDENCE: Dict[str, str] = { + "iso2022_kr": "ISO-2022-KR", + "iso2022_jp": "ISO-2022-JP", + "euc_kr": "EUC-KR", + "tis_620": "TIS-620", + "utf_32": "UTF-32", + "euc_jp": "EUC-JP", + "koi8_r": "KOI8-R", + "iso8859_1": "ISO-8859-1", + "iso8859_2": "ISO-8859-2", + "iso8859_5": "ISO-8859-5", + "iso8859_6": "ISO-8859-6", + "iso8859_7": "ISO-8859-7", + "iso8859_8": "ISO-8859-8", + "utf_16": "UTF-16", + "cp855": "IBM855", + "mac_cyrillic": "MacCyrillic", + "gb2312": "GB2312", + "gb18030": "GB18030", + "cp932": "CP932", + "cp866": "IBM866", + "utf_8": "utf-8", + "utf_8_sig": "UTF-8-SIG", + "shift_jis": "SHIFT_JIS", + "big5": "Big5", + "cp1250": "windows-1250", + "cp1251": "windows-1251", + "cp1252": "Windows-1252", + "cp1253": "windows-1253", + "cp1255": "windows-1255", + "cp1256": "windows-1256", + "cp1254": "Windows-1254", + "cp949": "CP949", +} + + +COMMON_SAFE_ASCII_CHARACTERS: Set[str] = { + "<", + ">", + "=", + ":", + "/", + "&", + ";", + "{", + "}", + "[", + "]", + ",", + "|", + '"', + "-", +} + + +KO_NAMES: Set[str] = {"johab", "cp949", "euc_kr"} +ZH_NAMES: Set[str] = {"big5", "cp950", "big5hkscs", "hz"} + +NOT_PRINTABLE_PATTERN = re_compile(r"[0-9\W\n\r\t]+") + +LANGUAGE_SUPPORTED_COUNT: int = len(FREQUENCIES) + +# Logging LEVEL bellow DEBUG +TRACE: int = 5 diff --git a/_vendor/charset_normalizer/legacy.py b/_vendor/charset_normalizer/legacy.py new file mode 100644 index 0000000..cdebe2b --- /dev/null +++ b/_vendor/charset_normalizer/legacy.py @@ -0,0 +1,95 @@ +import warnings +from typing import Dict, Optional, Union + +from .api import from_bytes, from_fp, from_path, normalize +from .constant import CHARDET_CORRESPONDENCE +from .models import CharsetMatch, CharsetMatches + + +def detect(byte_str: bytes) -> Dict[str, Optional[Union[str, float]]]: + """ + chardet legacy method + Detect the encoding of the given byte string. It should be mostly backward-compatible. + Encoding name will match Chardet own writing whenever possible. (Not on encoding name unsupported by it) + This function is deprecated and should be used to migrate your project easily, consult the documentation for + further information. Not planned for removal. + + :param byte_str: The byte sequence to examine. + """ + if not isinstance(byte_str, (bytearray, bytes)): + raise TypeError( # pragma: nocover + "Expected object of type bytes or bytearray, got: " + "{0}".format(type(byte_str)) + ) + + if isinstance(byte_str, bytearray): + byte_str = bytes(byte_str) + + r = from_bytes(byte_str).best() + + encoding = r.encoding if r is not None else None + language = r.language if r is not None and r.language != "Unknown" else "" + confidence = 1.0 - r.chaos if r is not None else None + + # Note: CharsetNormalizer does not return 'UTF-8-SIG' as the sig get stripped in the detection/normalization process + # but chardet does return 'utf-8-sig' and it is a valid codec name. + if r is not None and encoding == "utf_8" and r.bom: + encoding += "_sig" + + return { + "encoding": encoding + if encoding not in CHARDET_CORRESPONDENCE + else CHARDET_CORRESPONDENCE[encoding], + "language": language, + "confidence": confidence, + } + + +class CharsetNormalizerMatch(CharsetMatch): + pass + + +class CharsetNormalizerMatches(CharsetMatches): + @staticmethod + def from_fp(*args, **kwargs): # type: ignore + warnings.warn( # pragma: nocover + "staticmethod from_fp, from_bytes, from_path and normalize are deprecated " + "and scheduled to be removed in 3.0", + DeprecationWarning, + ) + return from_fp(*args, **kwargs) # pragma: nocover + + @staticmethod + def from_bytes(*args, **kwargs): # type: ignore + warnings.warn( # pragma: nocover + "staticmethod from_fp, from_bytes, from_path and normalize are deprecated " + "and scheduled to be removed in 3.0", + DeprecationWarning, + ) + return from_bytes(*args, **kwargs) # pragma: nocover + + @staticmethod + def from_path(*args, **kwargs): # type: ignore + warnings.warn( # pragma: nocover + "staticmethod from_fp, from_bytes, from_path and normalize are deprecated " + "and scheduled to be removed in 3.0", + DeprecationWarning, + ) + return from_path(*args, **kwargs) # pragma: nocover + + @staticmethod + def normalize(*args, **kwargs): # type: ignore + warnings.warn( # pragma: nocover + "staticmethod from_fp, from_bytes, from_path and normalize are deprecated " + "and scheduled to be removed in 3.0", + DeprecationWarning, + ) + return normalize(*args, **kwargs) # pragma: nocover + + +class CharsetDetector(CharsetNormalizerMatches): + pass + + +class CharsetDoctor(CharsetNormalizerMatches): + pass diff --git a/_vendor/charset_normalizer/md.py b/_vendor/charset_normalizer/md.py new file mode 100644 index 0000000..31808af --- /dev/null +++ b/_vendor/charset_normalizer/md.py @@ -0,0 +1,553 @@ +from functools import lru_cache +from typing import List, Optional + +from .constant import COMMON_SAFE_ASCII_CHARACTERS, UNICODE_SECONDARY_RANGE_KEYWORD +from .utils import ( + is_accentuated, + is_ascii, + is_case_variable, + is_cjk, + is_emoticon, + is_hangul, + is_hiragana, + is_katakana, + is_latin, + is_punctuation, + is_separator, + is_symbol, + is_thai, + is_unprintable, + remove_accent, + unicode_range, +) + + +class MessDetectorPlugin: + """ + Base abstract class used for mess detection plugins. + All detectors MUST extend and implement given methods. + """ + + def eligible(self, character: str) -> bool: + """ + Determine if given character should be fed in. + """ + raise NotImplementedError # pragma: nocover + + def feed(self, character: str) -> None: + """ + The main routine to be executed upon character. + Insert the logic in witch the text would be considered chaotic. + """ + raise NotImplementedError # pragma: nocover + + def reset(self) -> None: # pragma: no cover + """ + Permit to reset the plugin to the initial state. + """ + raise NotImplementedError + + @property + def ratio(self) -> float: + """ + Compute the chaos ratio based on what your feed() has seen. + Must NOT be lower than 0.; No restriction gt 0. + """ + raise NotImplementedError # pragma: nocover + + +class TooManySymbolOrPunctuationPlugin(MessDetectorPlugin): + def __init__(self) -> None: + self._punctuation_count: int = 0 + self._symbol_count: int = 0 + self._character_count: int = 0 + + self._last_printable_char: Optional[str] = None + self._frenzy_symbol_in_word: bool = False + + def eligible(self, character: str) -> bool: + return character.isprintable() + + def feed(self, character: str) -> None: + self._character_count += 1 + + if ( + character != self._last_printable_char + and character not in COMMON_SAFE_ASCII_CHARACTERS + ): + if is_punctuation(character): + self._punctuation_count += 1 + elif ( + character.isdigit() is False + and is_symbol(character) + and is_emoticon(character) is False + ): + self._symbol_count += 2 + + self._last_printable_char = character + + def reset(self) -> None: # pragma: no cover + self._punctuation_count = 0 + self._character_count = 0 + self._symbol_count = 0 + + @property + def ratio(self) -> float: + if self._character_count == 0: + return 0.0 + + ratio_of_punctuation: float = ( + self._punctuation_count + self._symbol_count + ) / self._character_count + + return ratio_of_punctuation if ratio_of_punctuation >= 0.3 else 0.0 + + +class TooManyAccentuatedPlugin(MessDetectorPlugin): + def __init__(self) -> None: + self._character_count: int = 0 + self._accentuated_count: int = 0 + + def eligible(self, character: str) -> bool: + return character.isalpha() + + def feed(self, character: str) -> None: + self._character_count += 1 + + if is_accentuated(character): + self._accentuated_count += 1 + + def reset(self) -> None: # pragma: no cover + self._character_count = 0 + self._accentuated_count = 0 + + @property + def ratio(self) -> float: + if self._character_count == 0: + return 0.0 + ratio_of_accentuation: float = self._accentuated_count / self._character_count + return ratio_of_accentuation if ratio_of_accentuation >= 0.35 else 0.0 + + +class UnprintablePlugin(MessDetectorPlugin): + def __init__(self) -> None: + self._unprintable_count: int = 0 + self._character_count: int = 0 + + def eligible(self, character: str) -> bool: + return True + + def feed(self, character: str) -> None: + if is_unprintable(character): + self._unprintable_count += 1 + self._character_count += 1 + + def reset(self) -> None: # pragma: no cover + self._unprintable_count = 0 + + @property + def ratio(self) -> float: + if self._character_count == 0: + return 0.0 + + return (self._unprintable_count * 8) / self._character_count + + +class SuspiciousDuplicateAccentPlugin(MessDetectorPlugin): + def __init__(self) -> None: + self._successive_count: int = 0 + self._character_count: int = 0 + + self._last_latin_character: Optional[str] = None + + def eligible(self, character: str) -> bool: + return character.isalpha() and is_latin(character) + + def feed(self, character: str) -> None: + self._character_count += 1 + if ( + self._last_latin_character is not None + and is_accentuated(character) + and is_accentuated(self._last_latin_character) + ): + if character.isupper() and self._last_latin_character.isupper(): + self._successive_count += 1 + # Worse if its the same char duplicated with different accent. + if remove_accent(character) == remove_accent(self._last_latin_character): + self._successive_count += 1 + self._last_latin_character = character + + def reset(self) -> None: # pragma: no cover + self._successive_count = 0 + self._character_count = 0 + self._last_latin_character = None + + @property + def ratio(self) -> float: + if self._character_count == 0: + return 0.0 + + return (self._successive_count * 2) / self._character_count + + +class SuspiciousRange(MessDetectorPlugin): + def __init__(self) -> None: + self._suspicious_successive_range_count: int = 0 + self._character_count: int = 0 + self._last_printable_seen: Optional[str] = None + + def eligible(self, character: str) -> bool: + return character.isprintable() + + def feed(self, character: str) -> None: + self._character_count += 1 + + if ( + character.isspace() + or is_punctuation(character) + or character in COMMON_SAFE_ASCII_CHARACTERS + ): + self._last_printable_seen = None + return + + if self._last_printable_seen is None: + self._last_printable_seen = character + return + + unicode_range_a: Optional[str] = unicode_range(self._last_printable_seen) + unicode_range_b: Optional[str] = unicode_range(character) + + if is_suspiciously_successive_range(unicode_range_a, unicode_range_b): + self._suspicious_successive_range_count += 1 + + self._last_printable_seen = character + + def reset(self) -> None: # pragma: no cover + self._character_count = 0 + self._suspicious_successive_range_count = 0 + self._last_printable_seen = None + + @property + def ratio(self) -> float: + if self._character_count == 0: + return 0.0 + + ratio_of_suspicious_range_usage: float = ( + self._suspicious_successive_range_count * 2 + ) / self._character_count + + if ratio_of_suspicious_range_usage < 0.1: + return 0.0 + + return ratio_of_suspicious_range_usage + + +class SuperWeirdWordPlugin(MessDetectorPlugin): + def __init__(self) -> None: + self._word_count: int = 0 + self._bad_word_count: int = 0 + self._foreign_long_count: int = 0 + + self._is_current_word_bad: bool = False + self._foreign_long_watch: bool = False + + self._character_count: int = 0 + self._bad_character_count: int = 0 + + self._buffer: str = "" + self._buffer_accent_count: int = 0 + + def eligible(self, character: str) -> bool: + return True + + def feed(self, character: str) -> None: + if character.isalpha(): + self._buffer += character + if is_accentuated(character): + self._buffer_accent_count += 1 + if ( + self._foreign_long_watch is False + and (is_latin(character) is False or is_accentuated(character)) + and is_cjk(character) is False + and is_hangul(character) is False + and is_katakana(character) is False + and is_hiragana(character) is False + and is_thai(character) is False + ): + self._foreign_long_watch = True + return + if not self._buffer: + return + if ( + character.isspace() or is_punctuation(character) or is_separator(character) + ) and self._buffer: + self._word_count += 1 + buffer_length: int = len(self._buffer) + + self._character_count += buffer_length + + if buffer_length >= 4: + if self._buffer_accent_count / buffer_length > 0.34: + self._is_current_word_bad = True + # Word/Buffer ending with a upper case accentuated letter are so rare, + # that we will consider them all as suspicious. Same weight as foreign_long suspicious. + if is_accentuated(self._buffer[-1]) and self._buffer[-1].isupper(): + self._foreign_long_count += 1 + self._is_current_word_bad = True + if buffer_length >= 24 and self._foreign_long_watch: + self._foreign_long_count += 1 + self._is_current_word_bad = True + + if self._is_current_word_bad: + self._bad_word_count += 1 + self._bad_character_count += len(self._buffer) + self._is_current_word_bad = False + + self._foreign_long_watch = False + self._buffer = "" + self._buffer_accent_count = 0 + elif ( + character not in {"<", ">", "-", "=", "~", "|", "_"} + and character.isdigit() is False + and is_symbol(character) + ): + self._is_current_word_bad = True + self._buffer += character + + def reset(self) -> None: # pragma: no cover + self._buffer = "" + self._is_current_word_bad = False + self._foreign_long_watch = False + self._bad_word_count = 0 + self._word_count = 0 + self._character_count = 0 + self._bad_character_count = 0 + self._foreign_long_count = 0 + + @property + def ratio(self) -> float: + if self._word_count <= 10 and self._foreign_long_count == 0: + return 0.0 + + return self._bad_character_count / self._character_count + + +class CjkInvalidStopPlugin(MessDetectorPlugin): + """ + GB(Chinese) based encoding often render the stop incorrectly when the content does not fit and + can be easily detected. Searching for the overuse of '丅' and '丄'. + """ + + def __init__(self) -> None: + self._wrong_stop_count: int = 0 + self._cjk_character_count: int = 0 + + def eligible(self, character: str) -> bool: + return True + + def feed(self, character: str) -> None: + if character in {"丅", "丄"}: + self._wrong_stop_count += 1 + return + if is_cjk(character): + self._cjk_character_count += 1 + + def reset(self) -> None: # pragma: no cover + self._wrong_stop_count = 0 + self._cjk_character_count = 0 + + @property + def ratio(self) -> float: + if self._cjk_character_count < 16: + return 0.0 + return self._wrong_stop_count / self._cjk_character_count + + +class ArchaicUpperLowerPlugin(MessDetectorPlugin): + def __init__(self) -> None: + self._buf: bool = False + + self._character_count_since_last_sep: int = 0 + + self._successive_upper_lower_count: int = 0 + self._successive_upper_lower_count_final: int = 0 + + self._character_count: int = 0 + + self._last_alpha_seen: Optional[str] = None + self._current_ascii_only: bool = True + + def eligible(self, character: str) -> bool: + return True + + def feed(self, character: str) -> None: + is_concerned = character.isalpha() and is_case_variable(character) + chunk_sep = is_concerned is False + + if chunk_sep and self._character_count_since_last_sep > 0: + if ( + self._character_count_since_last_sep <= 64 + and character.isdigit() is False + and self._current_ascii_only is False + ): + self._successive_upper_lower_count_final += ( + self._successive_upper_lower_count + ) + + self._successive_upper_lower_count = 0 + self._character_count_since_last_sep = 0 + self._last_alpha_seen = None + self._buf = False + self._character_count += 1 + self._current_ascii_only = True + + return + + if self._current_ascii_only is True and is_ascii(character) is False: + self._current_ascii_only = False + + if self._last_alpha_seen is not None: + if (character.isupper() and self._last_alpha_seen.islower()) or ( + character.islower() and self._last_alpha_seen.isupper() + ): + if self._buf is True: + self._successive_upper_lower_count += 2 + self._buf = False + else: + self._buf = True + else: + self._buf = False + + self._character_count += 1 + self._character_count_since_last_sep += 1 + self._last_alpha_seen = character + + def reset(self) -> None: # pragma: no cover + self._character_count = 0 + self._character_count_since_last_sep = 0 + self._successive_upper_lower_count = 0 + self._successive_upper_lower_count_final = 0 + self._last_alpha_seen = None + self._buf = False + self._current_ascii_only = True + + @property + def ratio(self) -> float: + if self._character_count == 0: + return 0.0 + + return self._successive_upper_lower_count_final / self._character_count + + +@lru_cache(maxsize=1024) +def is_suspiciously_successive_range( + unicode_range_a: Optional[str], unicode_range_b: Optional[str] +) -> bool: + """ + Determine if two Unicode range seen next to each other can be considered as suspicious. + """ + if unicode_range_a is None or unicode_range_b is None: + return True + + if unicode_range_a == unicode_range_b: + return False + + if "Latin" in unicode_range_a and "Latin" in unicode_range_b: + return False + + if "Emoticons" in unicode_range_a or "Emoticons" in unicode_range_b: + return False + + # Latin characters can be accompanied with a combining diacritical mark + # eg. Vietnamese. + if ("Latin" in unicode_range_a or "Latin" in unicode_range_b) and ( + "Combining" in unicode_range_a or "Combining" in unicode_range_b + ): + return False + + keywords_range_a, keywords_range_b = unicode_range_a.split( + " " + ), unicode_range_b.split(" ") + + for el in keywords_range_a: + if el in UNICODE_SECONDARY_RANGE_KEYWORD: + continue + if el in keywords_range_b: + return False + + # Japanese Exception + range_a_jp_chars, range_b_jp_chars = ( + unicode_range_a + in ( + "Hiragana", + "Katakana", + ), + unicode_range_b in ("Hiragana", "Katakana"), + ) + if (range_a_jp_chars or range_b_jp_chars) and ( + "CJK" in unicode_range_a or "CJK" in unicode_range_b + ): + return False + if range_a_jp_chars and range_b_jp_chars: + return False + + if "Hangul" in unicode_range_a or "Hangul" in unicode_range_b: + if "CJK" in unicode_range_a or "CJK" in unicode_range_b: + return False + if unicode_range_a == "Basic Latin" or unicode_range_b == "Basic Latin": + return False + + # Chinese/Japanese use dedicated range for punctuation and/or separators. + if ("CJK" in unicode_range_a or "CJK" in unicode_range_b) or ( + unicode_range_a in ["Katakana", "Hiragana"] + and unicode_range_b in ["Katakana", "Hiragana"] + ): + if "Punctuation" in unicode_range_a or "Punctuation" in unicode_range_b: + return False + if "Forms" in unicode_range_a or "Forms" in unicode_range_b: + return False + + return True + + +@lru_cache(maxsize=2048) +def mess_ratio( + decoded_sequence: str, maximum_threshold: float = 0.2, debug: bool = False +) -> float: + """ + Compute a mess ratio given a decoded bytes sequence. The maximum threshold does stop the computation earlier. + """ + + detectors: List[MessDetectorPlugin] = [ + md_class() for md_class in MessDetectorPlugin.__subclasses__() + ] + + length: int = len(decoded_sequence) + 1 + + mean_mess_ratio: float = 0.0 + + if length < 512: + intermediary_mean_mess_ratio_calc: int = 32 + elif length <= 1024: + intermediary_mean_mess_ratio_calc = 64 + else: + intermediary_mean_mess_ratio_calc = 128 + + for character, index in zip(decoded_sequence + "\n", range(length)): + for detector in detectors: + if detector.eligible(character): + detector.feed(character) + + if ( + index > 0 and index % intermediary_mean_mess_ratio_calc == 0 + ) or index == length - 1: + mean_mess_ratio = sum(dt.ratio for dt in detectors) + + if mean_mess_ratio >= maximum_threshold: + break + + if debug: + for dt in detectors: # pragma: nocover + print(dt.__class__, dt.ratio) + + return round(mean_mess_ratio, 3) diff --git a/_vendor/charset_normalizer/models.py b/_vendor/charset_normalizer/models.py new file mode 100644 index 0000000..ccb0d47 --- /dev/null +++ b/_vendor/charset_normalizer/models.py @@ -0,0 +1,401 @@ +import warnings +from collections import Counter +from encodings.aliases import aliases +from hashlib import sha256 +from json import dumps +from re import sub +from typing import ( + Any, + Counter as TypeCounter, + Dict, + Iterator, + List, + Optional, + Tuple, + Union, +) + +from .constant import NOT_PRINTABLE_PATTERN, TOO_BIG_SEQUENCE +from .md import mess_ratio +from .utils import iana_name, is_multi_byte_encoding, unicode_range + + +class CharsetMatch: + def __init__( + self, + payload: bytes, + guessed_encoding: str, + mean_mess_ratio: float, + has_sig_or_bom: bool, + languages: "CoherenceMatches", + decoded_payload: Optional[str] = None, + ): + self._payload: bytes = payload + + self._encoding: str = guessed_encoding + self._mean_mess_ratio: float = mean_mess_ratio + self._languages: CoherenceMatches = languages + self._has_sig_or_bom: bool = has_sig_or_bom + self._unicode_ranges: Optional[List[str]] = None + + self._leaves: List[CharsetMatch] = [] + self._mean_coherence_ratio: float = 0.0 + + self._output_payload: Optional[bytes] = None + self._output_encoding: Optional[str] = None + + self._string: Optional[str] = decoded_payload + + def __eq__(self, other: object) -> bool: + if not isinstance(other, CharsetMatch): + raise TypeError( + "__eq__ cannot be invoked on {} and {}.".format( + str(other.__class__), str(self.__class__) + ) + ) + return self.encoding == other.encoding and self.fingerprint == other.fingerprint + + def __lt__(self, other: object) -> bool: + """ + Implemented to make sorted available upon CharsetMatches items. + """ + if not isinstance(other, CharsetMatch): + raise ValueError + + chaos_difference: float = abs(self.chaos - other.chaos) + coherence_difference: float = abs(self.coherence - other.coherence) + + # Bellow 1% difference --> Use Coherence + if chaos_difference < 0.01 and coherence_difference > 0.02: + # When having a tough decision, use the result that decoded as many multi-byte as possible. + if chaos_difference == 0.0 and self.coherence == other.coherence: + return self.multi_byte_usage > other.multi_byte_usage + return self.coherence > other.coherence + + return self.chaos < other.chaos + + @property + def multi_byte_usage(self) -> float: + return 1.0 - len(str(self)) / len(self.raw) + + @property + def chaos_secondary_pass(self) -> float: + """ + Check once again chaos in decoded text, except this time, with full content. + Use with caution, this can be very slow. + Notice: Will be removed in 3.0 + """ + warnings.warn( + "chaos_secondary_pass is deprecated and will be removed in 3.0", + DeprecationWarning, + ) + return mess_ratio(str(self), 1.0) + + @property + def coherence_non_latin(self) -> float: + """ + Coherence ratio on the first non-latin language detected if ANY. + Notice: Will be removed in 3.0 + """ + warnings.warn( + "coherence_non_latin is deprecated and will be removed in 3.0", + DeprecationWarning, + ) + return 0.0 + + @property + def w_counter(self) -> TypeCounter[str]: + """ + Word counter instance on decoded text. + Notice: Will be removed in 3.0 + """ + warnings.warn( + "w_counter is deprecated and will be removed in 3.0", DeprecationWarning + ) + + string_printable_only = sub(NOT_PRINTABLE_PATTERN, " ", str(self).lower()) + + return Counter(string_printable_only.split()) + + def __str__(self) -> str: + # Lazy Str Loading + if self._string is None: + self._string = str(self._payload, self._encoding, "strict") + return self._string + + def __repr__(self) -> str: + return "".format(self.encoding, self.fingerprint) + + def add_submatch(self, other: "CharsetMatch") -> None: + if not isinstance(other, CharsetMatch) or other == self: + raise ValueError( + "Unable to add instance <{}> as a submatch of a CharsetMatch".format( + other.__class__ + ) + ) + + other._string = None # Unload RAM usage; dirty trick. + self._leaves.append(other) + + @property + def encoding(self) -> str: + return self._encoding + + @property + def encoding_aliases(self) -> List[str]: + """ + Encoding name are known by many name, using this could help when searching for IBM855 when it's listed as CP855. + """ + also_known_as: List[str] = [] + for u, p in aliases.items(): + if self.encoding == u: + also_known_as.append(p) + elif self.encoding == p: + also_known_as.append(u) + return also_known_as + + @property + def bom(self) -> bool: + return self._has_sig_or_bom + + @property + def byte_order_mark(self) -> bool: + return self._has_sig_or_bom + + @property + def languages(self) -> List[str]: + """ + Return the complete list of possible languages found in decoded sequence. + Usually not really useful. Returned list may be empty even if 'language' property return something != 'Unknown'. + """ + return [e[0] for e in self._languages] + + @property + def language(self) -> str: + """ + Most probable language found in decoded sequence. If none were detected or inferred, the property will return + "Unknown". + """ + if not self._languages: + # Trying to infer the language based on the given encoding + # Its either English or we should not pronounce ourselves in certain cases. + if "ascii" in self.could_be_from_charset: + return "English" + + # doing it there to avoid circular import + from charset_normalizer.cd import encoding_languages, mb_encoding_languages + + languages = ( + mb_encoding_languages(self.encoding) + if is_multi_byte_encoding(self.encoding) + else encoding_languages(self.encoding) + ) + + if len(languages) == 0 or "Latin Based" in languages: + return "Unknown" + + return languages[0] + + return self._languages[0][0] + + @property + def chaos(self) -> float: + return self._mean_mess_ratio + + @property + def coherence(self) -> float: + if not self._languages: + return 0.0 + return self._languages[0][1] + + @property + def percent_chaos(self) -> float: + return round(self.chaos * 100, ndigits=3) + + @property + def percent_coherence(self) -> float: + return round(self.coherence * 100, ndigits=3) + + @property + def raw(self) -> bytes: + """ + Original untouched bytes. + """ + return self._payload + + @property + def submatch(self) -> List["CharsetMatch"]: + return self._leaves + + @property + def has_submatch(self) -> bool: + return len(self._leaves) > 0 + + @property + def alphabets(self) -> List[str]: + if self._unicode_ranges is not None: + return self._unicode_ranges + # list detected ranges + detected_ranges: List[Optional[str]] = [ + unicode_range(char) for char in str(self) + ] + # filter and sort + self._unicode_ranges = sorted(list({r for r in detected_ranges if r})) + return self._unicode_ranges + + @property + def could_be_from_charset(self) -> List[str]: + """ + The complete list of encoding that output the exact SAME str result and therefore could be the originating + encoding. + This list does include the encoding available in property 'encoding'. + """ + return [self._encoding] + [m.encoding for m in self._leaves] + + def first(self) -> "CharsetMatch": + """ + Kept for BC reasons. Will be removed in 3.0. + """ + return self + + def best(self) -> "CharsetMatch": + """ + Kept for BC reasons. Will be removed in 3.0. + """ + return self + + def output(self, encoding: str = "utf_8") -> bytes: + """ + Method to get re-encoded bytes payload using given target encoding. Default to UTF-8. + Any errors will be simply ignored by the encoder NOT replaced. + """ + if self._output_encoding is None or self._output_encoding != encoding: + self._output_encoding = encoding + self._output_payload = str(self).encode(encoding, "replace") + + return self._output_payload # type: ignore + + @property + def fingerprint(self) -> str: + """ + Retrieve the unique SHA256 computed using the transformed (re-encoded) payload. Not the original one. + """ + return sha256(self.output()).hexdigest() + + +class CharsetMatches: + """ + Container with every CharsetMatch items ordered by default from most probable to the less one. + Act like a list(iterable) but does not implements all related methods. + """ + + def __init__(self, results: Optional[List[CharsetMatch]] = None): + self._results: List[CharsetMatch] = sorted(results) if results else [] + + def __iter__(self) -> Iterator[CharsetMatch]: + yield from self._results + + def __getitem__(self, item: Union[int, str]) -> CharsetMatch: + """ + Retrieve a single item either by its position or encoding name (alias may be used here). + Raise KeyError upon invalid index or encoding not present in results. + """ + if isinstance(item, int): + return self._results[item] + if isinstance(item, str): + item = iana_name(item, False) + for result in self._results: + if item in result.could_be_from_charset: + return result + raise KeyError + + def __len__(self) -> int: + return len(self._results) + + def __bool__(self) -> bool: + return len(self._results) > 0 + + def append(self, item: CharsetMatch) -> None: + """ + Insert a single match. Will be inserted accordingly to preserve sort. + Can be inserted as a submatch. + """ + if not isinstance(item, CharsetMatch): + raise ValueError( + "Cannot append instance '{}' to CharsetMatches".format( + str(item.__class__) + ) + ) + # We should disable the submatch factoring when the input file is too heavy (conserve RAM usage) + if len(item.raw) <= TOO_BIG_SEQUENCE: + for match in self._results: + if match.fingerprint == item.fingerprint and match.chaos == item.chaos: + match.add_submatch(item) + return + self._results.append(item) + self._results = sorted(self._results) + + def best(self) -> Optional["CharsetMatch"]: + """ + Simply return the first match. Strict equivalent to matches[0]. + """ + if not self._results: + return None + return self._results[0] + + def first(self) -> Optional["CharsetMatch"]: + """ + Redundant method, call the method best(). Kept for BC reasons. + """ + return self.best() + + +CoherenceMatch = Tuple[str, float] +CoherenceMatches = List[CoherenceMatch] + + +class CliDetectionResult: + def __init__( + self, + path: str, + encoding: Optional[str], + encoding_aliases: List[str], + alternative_encodings: List[str], + language: str, + alphabets: List[str], + has_sig_or_bom: bool, + chaos: float, + coherence: float, + unicode_path: Optional[str], + is_preferred: bool, + ): + self.path: str = path + self.unicode_path: Optional[str] = unicode_path + self.encoding: Optional[str] = encoding + self.encoding_aliases: List[str] = encoding_aliases + self.alternative_encodings: List[str] = alternative_encodings + self.language: str = language + self.alphabets: List[str] = alphabets + self.has_sig_or_bom: bool = has_sig_or_bom + self.chaos: float = chaos + self.coherence: float = coherence + self.is_preferred: bool = is_preferred + + @property + def __dict__(self) -> Dict[str, Any]: # type: ignore + return { + "path": self.path, + "encoding": self.encoding, + "encoding_aliases": self.encoding_aliases, + "alternative_encodings": self.alternative_encodings, + "language": self.language, + "alphabets": self.alphabets, + "has_sig_or_bom": self.has_sig_or_bom, + "chaos": self.chaos, + "coherence": self.coherence, + "unicode_path": self.unicode_path, + "is_preferred": self.is_preferred, + } + + def to_json(self) -> str: + return dumps(self.__dict__, ensure_ascii=True, indent=4) diff --git a/_vendor/charset_normalizer/py.typed b/_vendor/charset_normalizer/py.typed new file mode 100644 index 0000000..e69de29 diff --git a/_vendor/charset_normalizer/utils.py b/_vendor/charset_normalizer/utils.py new file mode 100644 index 0000000..859f212 --- /dev/null +++ b/_vendor/charset_normalizer/utils.py @@ -0,0 +1,424 @@ +try: + # WARNING: unicodedata2 support is going to be removed in 3.0 + # Python is quickly catching up. + import unicodedata2 as unicodedata +except ImportError: + import unicodedata # type: ignore[no-redef] + +import importlib +import logging +from codecs import IncrementalDecoder +from encodings.aliases import aliases +from functools import lru_cache +from re import findall +from typing import Generator, List, Optional, Set, Tuple, Union + +from _multibytecodec import MultibyteIncrementalDecoder + +from .constant import ( + ENCODING_MARKS, + IANA_SUPPORTED_SIMILAR, + RE_POSSIBLE_ENCODING_INDICATION, + UNICODE_RANGES_COMBINED, + UNICODE_SECONDARY_RANGE_KEYWORD, + UTF8_MAXIMAL_ALLOCATION, +) + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_accentuated(character: str) -> bool: + try: + description: str = unicodedata.name(character) + except ValueError: + return False + return ( + "WITH GRAVE" in description + or "WITH ACUTE" in description + or "WITH CEDILLA" in description + or "WITH DIAERESIS" in description + or "WITH CIRCUMFLEX" in description + or "WITH TILDE" in description + ) + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def remove_accent(character: str) -> str: + decomposed: str = unicodedata.decomposition(character) + if not decomposed: + return character + + codes: List[str] = decomposed.split(" ") + + return chr(int(codes[0], 16)) + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def unicode_range(character: str) -> Optional[str]: + """ + Retrieve the Unicode range official name from a single character. + """ + character_ord: int = ord(character) + + for range_name, ord_range in UNICODE_RANGES_COMBINED.items(): + if character_ord in ord_range: + return range_name + + return None + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_latin(character: str) -> bool: + try: + description: str = unicodedata.name(character) + except ValueError: + return False + return "LATIN" in description + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_ascii(character: str) -> bool: + try: + character.encode("ascii") + except UnicodeEncodeError: + return False + return True + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_punctuation(character: str) -> bool: + character_category: str = unicodedata.category(character) + + if "P" in character_category: + return True + + character_range: Optional[str] = unicode_range(character) + + if character_range is None: + return False + + return "Punctuation" in character_range + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_symbol(character: str) -> bool: + character_category: str = unicodedata.category(character) + + if "S" in character_category or "N" in character_category: + return True + + character_range: Optional[str] = unicode_range(character) + + if character_range is None: + return False + + return "Forms" in character_range + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_emoticon(character: str) -> bool: + character_range: Optional[str] = unicode_range(character) + + if character_range is None: + return False + + return "Emoticons" in character_range + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_separator(character: str) -> bool: + if character.isspace() or character in {"|", "+", ",", ";", "<", ">"}: + return True + + character_category: str = unicodedata.category(character) + + return "Z" in character_category + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_case_variable(character: str) -> bool: + return character.islower() != character.isupper() + + +def is_private_use_only(character: str) -> bool: + character_category: str = unicodedata.category(character) + + return character_category == "Co" + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_cjk(character: str) -> bool: + try: + character_name = unicodedata.name(character) + except ValueError: + return False + + return "CJK" in character_name + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_hiragana(character: str) -> bool: + try: + character_name = unicodedata.name(character) + except ValueError: + return False + + return "HIRAGANA" in character_name + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_katakana(character: str) -> bool: + try: + character_name = unicodedata.name(character) + except ValueError: + return False + + return "KATAKANA" in character_name + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_hangul(character: str) -> bool: + try: + character_name = unicodedata.name(character) + except ValueError: + return False + + return "HANGUL" in character_name + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_thai(character: str) -> bool: + try: + character_name = unicodedata.name(character) + except ValueError: + return False + + return "THAI" in character_name + + +@lru_cache(maxsize=len(UNICODE_RANGES_COMBINED)) +def is_unicode_range_secondary(range_name: str) -> bool: + return any(keyword in range_name for keyword in UNICODE_SECONDARY_RANGE_KEYWORD) + + +@lru_cache(maxsize=UTF8_MAXIMAL_ALLOCATION) +def is_unprintable(character: str) -> bool: + return ( + character.isspace() is False # includes \n \t \r \v + and character.isprintable() is False + and character != "\x1A" # Why? Its the ASCII substitute character. + and character != "\ufeff" # bug discovered in Python, + # Zero Width No-Break Space located in Arabic Presentation Forms-B, Unicode 1.1 not acknowledged as space. + ) + + +def any_specified_encoding(sequence: bytes, search_zone: int = 4096) -> Optional[str]: + """ + Extract using ASCII-only decoder any specified encoding in the first n-bytes. + """ + if not isinstance(sequence, bytes): + raise TypeError + + seq_len: int = len(sequence) + + results: List[str] = findall( + RE_POSSIBLE_ENCODING_INDICATION, + sequence[: min(seq_len, search_zone)].decode("ascii", errors="ignore"), + ) + + if len(results) == 0: + return None + + for specified_encoding in results: + specified_encoding = specified_encoding.lower().replace("-", "_") + + encoding_alias: str + encoding_iana: str + + for encoding_alias, encoding_iana in aliases.items(): + if encoding_alias == specified_encoding: + return encoding_iana + if encoding_iana == specified_encoding: + return encoding_iana + + return None + + +@lru_cache(maxsize=128) +def is_multi_byte_encoding(name: str) -> bool: + """ + Verify is a specific encoding is a multi byte one based on it IANA name + """ + return name in { + "utf_8", + "utf_8_sig", + "utf_16", + "utf_16_be", + "utf_16_le", + "utf_32", + "utf_32_le", + "utf_32_be", + "utf_7", + } or issubclass( + importlib.import_module("encodings.{}".format(name)).IncrementalDecoder, + MultibyteIncrementalDecoder, + ) + + +def identify_sig_or_bom(sequence: bytes) -> Tuple[Optional[str], bytes]: + """ + Identify and extract SIG/BOM in given sequence. + """ + + for iana_encoding in ENCODING_MARKS: + marks: Union[bytes, List[bytes]] = ENCODING_MARKS[iana_encoding] + + if isinstance(marks, bytes): + marks = [marks] + + for mark in marks: + if sequence.startswith(mark): + return iana_encoding, mark + + return None, b"" + + +def should_strip_sig_or_bom(iana_encoding: str) -> bool: + return iana_encoding not in {"utf_16", "utf_32"} + + +def iana_name(cp_name: str, strict: bool = True) -> str: + cp_name = cp_name.lower().replace("-", "_") + + encoding_alias: str + encoding_iana: str + + for encoding_alias, encoding_iana in aliases.items(): + if cp_name in [encoding_alias, encoding_iana]: + return encoding_iana + + if strict: + raise ValueError("Unable to retrieve IANA for '{}'".format(cp_name)) + + return cp_name + + +def range_scan(decoded_sequence: str) -> List[str]: + ranges: Set[str] = set() + + for character in decoded_sequence: + character_range: Optional[str] = unicode_range(character) + + if character_range is None: + continue + + ranges.add(character_range) + + return list(ranges) + + +def cp_similarity(iana_name_a: str, iana_name_b: str) -> float: + + if is_multi_byte_encoding(iana_name_a) or is_multi_byte_encoding(iana_name_b): + return 0.0 + + decoder_a = importlib.import_module( + "encodings.{}".format(iana_name_a) + ).IncrementalDecoder + decoder_b = importlib.import_module( + "encodings.{}".format(iana_name_b) + ).IncrementalDecoder + + id_a: IncrementalDecoder = decoder_a(errors="ignore") + id_b: IncrementalDecoder = decoder_b(errors="ignore") + + character_match_count: int = 0 + + for i in range(255): + to_be_decoded: bytes = bytes([i]) + if id_a.decode(to_be_decoded) == id_b.decode(to_be_decoded): + character_match_count += 1 + + return character_match_count / 254 + + +def is_cp_similar(iana_name_a: str, iana_name_b: str) -> bool: + """ + Determine if two code page are at least 80% similar. IANA_SUPPORTED_SIMILAR dict was generated using + the function cp_similarity. + """ + return ( + iana_name_a in IANA_SUPPORTED_SIMILAR + and iana_name_b in IANA_SUPPORTED_SIMILAR[iana_name_a] + ) + + +def set_logging_handler( + name: str = "charset_normalizer", + level: int = logging.INFO, + format_string: str = "%(asctime)s | %(levelname)s | %(message)s", +) -> None: + + logger = logging.getLogger(name) + logger.setLevel(level) + + handler = logging.StreamHandler() + handler.setFormatter(logging.Formatter(format_string)) + logger.addHandler(handler) + + +def cut_sequence_chunks( + sequences: bytes, + encoding_iana: str, + offsets: range, + chunk_size: int, + bom_or_sig_available: bool, + strip_sig_or_bom: bool, + sig_payload: bytes, + is_multi_byte_decoder: bool, + decoded_payload: Optional[str] = None, +) -> Generator[str, None, None]: + + if decoded_payload and is_multi_byte_decoder is False: + for i in offsets: + chunk = decoded_payload[i : i + chunk_size] + if not chunk: + break + yield chunk + else: + for i in offsets: + chunk_end = i + chunk_size + if chunk_end > len(sequences) + 8: + continue + + cut_sequence = sequences[i : i + chunk_size] + + if bom_or_sig_available and strip_sig_or_bom is False: + cut_sequence = sig_payload + cut_sequence + + chunk = cut_sequence.decode( + encoding_iana, + errors="ignore" if is_multi_byte_decoder else "strict", + ) + + # multi-byte bad cutting detector and adjustment + # not the cleanest way to perform that fix but clever enough for now. + if is_multi_byte_decoder and i > 0 and sequences[i] >= 0x80: + + chunk_partial_size_chk: int = min(chunk_size, 16) + + if ( + decoded_payload + and chunk[:chunk_partial_size_chk] not in decoded_payload + ): + for j in range(i, i - 4, -1): + cut_sequence = sequences[j:chunk_end] + + if bom_or_sig_available and strip_sig_or_bom is False: + cut_sequence = sig_payload + cut_sequence + + chunk = cut_sequence.decode(encoding_iana, errors="ignore") + + if chunk[:chunk_partial_size_chk] in decoded_payload: + break + + yield chunk diff --git a/_vendor/charset_normalizer/version.py b/_vendor/charset_normalizer/version.py new file mode 100644 index 0000000..64c0dbd --- /dev/null +++ b/_vendor/charset_normalizer/version.py @@ -0,0 +1,6 @@ +""" +Expose version +""" + +__version__ = "2.1.1" +VERSION = __version__.split(".") diff --git a/_vendor/idna-3.4.dist-info/INSTALLER b/_vendor/idna-3.4.dist-info/INSTALLER new file mode 100644 index 0000000..a1b589e --- /dev/null +++ b/_vendor/idna-3.4.dist-info/INSTALLER @@ -0,0 +1 @@ +pip diff --git a/_vendor/idna-3.4.dist-info/LICENSE.md b/_vendor/idna-3.4.dist-info/LICENSE.md new file mode 100644 index 0000000..b6f8732 --- /dev/null +++ b/_vendor/idna-3.4.dist-info/LICENSE.md @@ -0,0 +1,29 @@ +BSD 3-Clause License + +Copyright (c) 2013-2021, Kim Davies +All rights reserved. + +Redistribution and use in source and binary forms, with or without +modification, are permitted provided that the following conditions are met: + +1. Redistributions of source code must retain the above copyright notice, this + list of conditions and the following disclaimer. + +2. Redistributions in binary form must reproduce the above copyright notice, + this list of conditions and the following disclaimer in the documentation + and/or other materials provided with the distribution. + +3. Neither the name of the copyright holder nor the names of its + contributors may be used to endorse or promote products derived from + this software without specific prior written permission. + +THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" +AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE +IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE +DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE +FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL +DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR +SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER +CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, +OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. diff --git a/_vendor/idna-3.4.dist-info/METADATA b/_vendor/idna-3.4.dist-info/METADATA new file mode 100644 index 0000000..07f6193 --- /dev/null +++ b/_vendor/idna-3.4.dist-info/METADATA @@ -0,0 +1,242 @@ +Metadata-Version: 2.1 +Name: idna +Version: 3.4 +Summary: Internationalized Domain Names in Applications (IDNA) +Author-email: Kim Davies +Requires-Python: >=3.5 +Description-Content-Type: text/x-rst +Classifier: Development Status :: 5 - Production/Stable +Classifier: Intended Audience :: Developers +Classifier: Intended Audience :: System Administrators +Classifier: License :: OSI Approved :: BSD License +Classifier: Operating System :: OS Independent +Classifier: Programming Language :: Python +Classifier: Programming Language :: Python :: 3 +Classifier: Programming Language :: Python :: 3 :: Only +Classifier: Programming Language :: Python :: 3.5 +Classifier: Programming Language :: Python :: 3.6 +Classifier: Programming Language :: Python :: 3.7 +Classifier: Programming Language :: Python :: 3.8 +Classifier: Programming Language :: Python :: 3.9 +Classifier: Programming Language :: Python :: 3.10 +Classifier: Programming Language :: Python :: 3.11 +Classifier: Programming Language :: Python :: Implementation :: CPython +Classifier: Programming Language :: Python :: Implementation :: PyPy +Classifier: Topic :: Internet :: Name Service (DNS) +Classifier: Topic :: Software Development :: Libraries :: Python Modules +Classifier: Topic :: Utilities +Project-URL: Changelog, https://github.com/kjd/idna/blob/master/HISTORY.rst +Project-URL: Issue tracker, https://github.com/kjd/idna/issues +Project-URL: Source, https://github.com/kjd/idna + +Internationalized Domain Names in Applications (IDNA) +===================================================== + +Support for the Internationalized Domain Names in +Applications (IDNA) protocol as specified in `RFC 5891 +`_. This is the latest version of +the protocol and is sometimes referred to as “IDNA 2008”. + +This library also provides support for Unicode Technical +Standard 46, `Unicode IDNA Compatibility Processing +`_. + +This acts as a suitable replacement for the “encodings.idna” +module that comes with the Python standard library, but which +only supports the older superseded IDNA specification (`RFC 3490 +`_). + +Basic functions are simply executed: + +.. code-block:: pycon + + >>> import idna + >>> idna.encode('ドメイン.テスト') + b'xn--eckwd4c7c.xn--zckzah' + >>> print(idna.decode('xn--eckwd4c7c.xn--zckzah')) + ドメイン.テスト + + +Installation +------------ + +This package is available for installation from PyPI: + +.. code-block:: bash + + $ python3 -m pip install idna + + +Usage +----- + +For typical usage, the ``encode`` and ``decode`` functions will take a +domain name argument and perform a conversion to A-labels or U-labels +respectively. + +.. code-block:: pycon + + >>> import idna + >>> idna.encode('ドメイン.テスト') + b'xn--eckwd4c7c.xn--zckzah' + >>> print(idna.decode('xn--eckwd4c7c.xn--zckzah')) + ドメイン.テスト + +You may use the codec encoding and decoding methods using the +``idna.codec`` module: + +.. code-block:: pycon + + >>> import idna.codec + >>> print('домен.испытание'.encode('idna')) + b'xn--d1acufc.xn--80akhbyknj4f' + >>> print(b'xn--d1acufc.xn--80akhbyknj4f'.decode('idna')) + домен.испытание + +Conversions can be applied at a per-label basis using the ``ulabel`` or +``alabel`` functions if necessary: + +.. code-block:: pycon + + >>> idna.alabel('测试') + b'xn--0zwm56d' + +Compatibility Mapping (UTS #46) ++++++++++++++++++++++++++++++++ + +As described in `RFC 5895 `_, the +IDNA specification does not normalize input from different potential +ways a user may input a domain name. This functionality, known as +a “mapping”, is considered by the specification to be a local +user-interface issue distinct from IDNA conversion functionality. + +This library provides one such mapping, that was developed by the +Unicode Consortium. Known as `Unicode IDNA Compatibility Processing +`_, it provides for both a regular +mapping for typical applications, as well as a transitional mapping to +help migrate from older IDNA 2003 applications. + +For example, “Königsgäßchen” is not a permissible label as *LATIN +CAPITAL LETTER K* is not allowed (nor are capital letters in general). +UTS 46 will convert this into lower case prior to applying the IDNA +conversion. + +.. code-block:: pycon + + >>> import idna + >>> idna.encode('Königsgäßchen') + ... + idna.core.InvalidCodepoint: Codepoint U+004B at position 1 of 'Königsgäßchen' not allowed + >>> idna.encode('Königsgäßchen', uts46=True) + b'xn--knigsgchen-b4a3dun' + >>> print(idna.decode('xn--knigsgchen-b4a3dun')) + königsgäßchen + +Transitional processing provides conversions to help transition from +the older 2003 standard to the current standard. For example, in the +original IDNA specification, the *LATIN SMALL LETTER SHARP S* (ß) was +converted into two *LATIN SMALL LETTER S* (ss), whereas in the current +IDNA specification this conversion is not performed. + +.. code-block:: pycon + + >>> idna.encode('Königsgäßchen', uts46=True, transitional=True) + 'xn--knigsgsschen-lcb0w' + +Implementors should use transitional processing with caution, only in +rare cases where conversion from legacy labels to current labels must be +performed (i.e. IDNA implementations that pre-date 2008). For typical +applications that just need to convert labels, transitional processing +is unlikely to be beneficial and could produce unexpected incompatible +results. + +``encodings.idna`` Compatibility +++++++++++++++++++++++++++++++++ + +Function calls from the Python built-in ``encodings.idna`` module are +mapped to their IDNA 2008 equivalents using the ``idna.compat`` module. +Simply substitute the ``import`` clause in your code to refer to the new +module name. + +Exceptions +---------- + +All errors raised during the conversion following the specification +should raise an exception derived from the ``idna.IDNAError`` base +class. + +More specific exceptions that may be generated as ``idna.IDNABidiError`` +when the error reflects an illegal combination of left-to-right and +right-to-left characters in a label; ``idna.InvalidCodepoint`` when +a specific codepoint is an illegal character in an IDN label (i.e. +INVALID); and ``idna.InvalidCodepointContext`` when the codepoint is +illegal based on its positional context (i.e. it is CONTEXTO or CONTEXTJ +but the contextual requirements are not satisfied.) + +Building and Diagnostics +------------------------ + +The IDNA and UTS 46 functionality relies upon pre-calculated lookup +tables for performance. These tables are derived from computing against +eligibility criteria in the respective standards. These tables are +computed using the command-line script ``tools/idna-data``. + +This tool will fetch relevant codepoint data from the Unicode repository +and perform the required calculations to identify eligibility. There are +three main modes: + +* ``idna-data make-libdata``. Generates ``idnadata.py`` and + ``uts46data.py``, the pre-calculated lookup tables using for IDNA and + UTS 46 conversions. Implementors who wish to track this library against + a different Unicode version may use this tool to manually generate a + different version of the ``idnadata.py`` and ``uts46data.py`` files. + +* ``idna-data make-table``. Generate a table of the IDNA disposition + (e.g. PVALID, CONTEXTJ, CONTEXTO) in the format found in Appendix + B.1 of RFC 5892 and the pre-computed tables published by `IANA + `_. + +* ``idna-data U+0061``. Prints debugging output on the various + properties associated with an individual Unicode codepoint (in this + case, U+0061), that are used to assess the IDNA and UTS 46 status of a + codepoint. This is helpful in debugging or analysis. + +The tool accepts a number of arguments, described using ``idna-data +-h``. Most notably, the ``--version`` argument allows the specification +of the version of Unicode to use in computing the table data. For +example, ``idna-data --version 9.0.0 make-libdata`` will generate +library data against Unicode 9.0.0. + + +Additional Notes +---------------- + +* **Packages**. The latest tagged release version is published in the + `Python Package Index `_. + +* **Version support**. This library supports Python 3.5 and higher. + As this library serves as a low-level toolkit for a variety of + applications, many of which strive for broad compatibility with older + Python versions, there is no rush to remove older intepreter support. + Removing support for older versions should be well justified in that the + maintenance burden has become too high. + +* **Python 2**. Python 2 is supported by version 2.x of this library. + While active development of the version 2.x series has ended, notable + issues being corrected may be backported to 2.x. Use "idna<3" in your + requirements file if you need this library for a Python 2 application. + +* **Testing**. The library has a test suite based on each rule of the + IDNA specification, as well as tests that are provided as part of the + Unicode Technical Standard 46, `Unicode IDNA Compatibility Processing + `_. + +* **Emoji**. It is an occasional request to support emoji domains in + this library. Encoding of symbols like emoji is expressly prohibited by + the technical standard IDNA 2008 and emoji domains are broadly phased + out across the domain industry due to associated security risks. For + now, applications that wish need to support these non-compliant labels + may wish to consider trying the encode/decode operation in this library + first, and then falling back to using `encodings.idna`. See `the Github + project `_ for more discussion. + diff --git a/_vendor/idna-3.4.dist-info/RECORD b/_vendor/idna-3.4.dist-info/RECORD new file mode 100644 index 0000000..1fb2fdd --- /dev/null +++ b/_vendor/idna-3.4.dist-info/RECORD @@ -0,0 +1,22 @@ +idna-3.4.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4 +idna-3.4.dist-info/LICENSE.md,sha256=otbk2UC9JNvnuWRc3hmpeSzFHbeuDVrNMBrIYMqj6DY,1523 +idna-3.4.dist-info/METADATA,sha256=8aLSf9MFS7oB26pZh2hprg7eJp0UJSc-3rpf_evp4DA,9830 +idna-3.4.dist-info/RECORD,, +idna-3.4.dist-info/WHEEL,sha256=4TfKIB_xu-04bc2iKz6_zFt-gEFEEDU_31HGhqzOCE8,81 +idna/__init__.py,sha256=KJQN1eQBr8iIK5SKrJ47lXvxG0BJ7Lm38W4zT0v_8lk,849 +idna/__pycache__/__init__.cpython-310.pyc,, +idna/__pycache__/codec.cpython-310.pyc,, +idna/__pycache__/compat.cpython-310.pyc,, +idna/__pycache__/core.cpython-310.pyc,, +idna/__pycache__/idnadata.cpython-310.pyc,, +idna/__pycache__/intranges.cpython-310.pyc,, +idna/__pycache__/package_data.cpython-310.pyc,, +idna/__pycache__/uts46data.cpython-310.pyc,, +idna/codec.py,sha256=6ly5odKfqrytKT9_7UrlGklHnf1DSK2r9C6cSM4sa28,3374 +idna/compat.py,sha256=0_sOEUMT4CVw9doD3vyRhX80X19PwqFoUBs7gWsFME4,321 +idna/core.py,sha256=1JxchwKzkxBSn7R_oCE12oBu3eVux0VzdxolmIad24M,12950 +idna/idnadata.py,sha256=xUjqKqiJV8Ho_XzBpAtv5JFoVPSupK-SUXvtjygUHqw,44375 +idna/intranges.py,sha256=YBr4fRYuWH7kTKS2tXlFjM24ZF1Pdvcir-aywniInqg,1881 +idna/package_data.py,sha256=C_jHJzmX8PI4xq0jpzmcTMxpb5lDsq4o5VyxQzlVrZE,21 +idna/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 +idna/uts46data.py,sha256=zvjZU24s58_uAS850Mcd0NnD0X7_gCMAMjzWNIeUJdc,206539 diff --git a/_vendor/idna-3.4.dist-info/WHEEL b/_vendor/idna-3.4.dist-info/WHEEL new file mode 100644 index 0000000..668ba4d --- /dev/null +++ b/_vendor/idna-3.4.dist-info/WHEEL @@ -0,0 +1,4 @@ +Wheel-Version: 1.0 +Generator: flit 3.7.1 +Root-Is-Purelib: true +Tag: py3-none-any diff --git a/_vendor/idna/__init__.py b/_vendor/idna/__init__.py new file mode 100644 index 0000000..a40eeaf --- /dev/null +++ b/_vendor/idna/__init__.py @@ -0,0 +1,44 @@ +from .package_data import __version__ +from .core import ( + IDNABidiError, + IDNAError, + InvalidCodepoint, + InvalidCodepointContext, + alabel, + check_bidi, + check_hyphen_ok, + check_initial_combiner, + check_label, + check_nfc, + decode, + encode, + ulabel, + uts46_remap, + valid_contextj, + valid_contexto, + valid_label_length, + valid_string_length, +) +from .intranges import intranges_contain + +__all__ = [ + "IDNABidiError", + "IDNAError", + "InvalidCodepoint", + "InvalidCodepointContext", + "alabel", + "check_bidi", + "check_hyphen_ok", + "check_initial_combiner", + "check_label", + "check_nfc", + "decode", + "encode", + "intranges_contain", + "ulabel", + "uts46_remap", + "valid_contextj", + "valid_contexto", + "valid_label_length", + "valid_string_length", +] diff --git a/_vendor/idna/__pycache__/__init__.cpython-310.pyc b/_vendor/idna/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..8ccedc0ecb40413f61111e1db14495891880080c GIT binary patch literal 804 zcmbu7&5qMB5XX~#q)n6bd%K7?=wa!B!U-W@;jot#2#JF)mYbN=)MIBIx1z7ZjW


=<)5vKm}EOH-6-Gl{6Kd;otw1w{#@<3qWa)gZ9pht z1(P(_uoH?Km$dOVL)<#*WA37Y=f1RyxN5)0_Lt;n>+Mr&IIzl%8;L$yBjnRPU%Pp` z-t453tJ3b>qK(zo2vzD$Ys3Gm^gpY*_|Hijjc!0GlakV} zfq9715I?sY3)Q9))s>f3a(lJC6HoZ*alVmax2eu{uhm8rift&xo>Ka#I=kUB(8W>m R=lI%cyreXE8>Y*&^9$vT)++!2 literal 0 HcmV?d00001 diff --git a/_vendor/idna/__pycache__/codec.cpython-310.pyc b/_vendor/idna/__pycache__/codec.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..be3795a41c754f96808fa80b9e56aaacc232375e GIT binary patch literal 2775 zcmb7F&2QX96!+NUkKODh=_YMyDUgJMSV|L0Tgq3f(56C_&>~SjB%`u&c4kutuXp=A z3rcY$)bt8}LvqZGBM10D&|G`!sfV2C1>PHH#0 zSm{;6Dzl`&IVRjK7S=wogeUxmmhh#wTHkQOIwFCnAW}hO9FYk`s$vY0F+?U2Ifh70 z)Dfx6I%16t9ySmg7ZZq07;Fl$DKUxO>8>q~iN-@79v9ASt2yhMI7p-pJ{zdGpGL{BhK_IMAN};;$?v~B z`D5!&hrZljD%e@Xnth5!S|JlwXyblt=?Diamt4Bi>)NNRt|wgKJ#>*T^1FL}XV348 z0R6}h?qf{5H*onK?PUt$j?!F2D#BgSiZktjR6|HR4$eC&)aF=kVBMKVliPxQ=fIf4 zBim%Ty~Q@z1D3OFf~ZnJ$N)0LUI zAJ^xa_6~k#fsdxi!NZsKx_#(H3T)~)iA=X0%`=&Ffj9)zo3(Ah34A@hu%LQ_g+V+x zuOe8H>ing9@n!k_#m+(!FE0$%)ZKo%5Q{WgpmXcY57x}6B;Fk|0UKxB=4{fwUo#ZV z7bpE(E?@%x8to1yv9oRK1Ivd7f-PYB1yVn=Pgxa-s``$20c0CTBCw!YxB32`SJw-CqVxdWnnsntzbAiz$M@{-DfIv5Hr5%txnW`wcY2pXU z1JrIe#;AaC9KJ(B8x@+9vWF4guh{r6;ccSmw%9tZW!=p=oXfdzPg&WV@Tf1`t5#ac zoy_1@E&75yE7m$@lXXAmOV*v^>p|{qa^>d129Cw7+=s;+Bj}2SU--%+oZ9y;2yfHR zy)BlzC$060@wtUB#~w+4yHZHshyzaH4&XGJ$A4qdY~CmxOkN3$+>KuJWP6y#q|vtM ztE>%DyV)R#mG+{+K&AqSBO@rySNn0gU4`R>>_r5;ie2rQe3a>$f+(gSqv0sPvtfc^ zpT+laVDn8_Ex-RhYhMUn9vJMPr* zeSh|_1m+Kp-D(E#A`T5_$k0siG8)a7`~AcS8)gW6hfKN5Qp|JcpnrFWpul>a0U^(o zGR&g)8F4O|q`ps_hRc7KCY;4_;59Q?d5rJ|p-nPxk|7}%S>PPC-Xc?O;vm;W_+P_M z{x8?|A+C3Kw8!-*wH(PcT%=`D4k@U9_uwi^sxPDCDmgEaq23{yN!N>5cSx6I#=v}F z>)LGvGU|N|v69f*cAh==l9+PJ_i&hRX}sceIRiqTJ1ty6Z#mWHG7>lyypQNU-pk=X zM8`5YKOjTB;?%KmpwQKP18X*eMp>&&FlBF8tB$dlIFzS+6$txhN_|dCbGmbyzUGvs z&6Q))v2Mg=PAq~84q(MWfv#axB3C~cu0}mXa65Q0c;+(8bj4g*w^F<>DQ%YXm>4i8 zWcVs}b_BnA4DU>kE108UtxFrE%ZuAK^YF2EAMY<%Lb!QC^G+Z3ZKp^|M&xvrz;!g* z#@ywpwE-rdLR3Va_B;LFAWmcvA+%b3`npLnQXEbaX8lKgu&eB6_eO_f7J1Y$>)@l} e_Pj>&%!r3Gn9Bk-$*Ok4ZcI03r)Q`6H2(*!ratHZ literal 0 HcmV?d00001 diff --git a/_vendor/idna/__pycache__/compat.cpython-310.pyc b/_vendor/idna/__pycache__/compat.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..f01fbe8a12fe09dfeb18218ed634661b47f52741 GIT binary patch literal 704 zcmZ{izi-n(6vyxUD|S*BC~v(R1SZj3n|Qn;4}9StVr9ESkMffHAA3_F)nW|O6&XF7S<@xZB% zoWQ&Jy{C7(w+ep4fAHL!e|tImIG<*xCns++p`gp8GTFw|P2E8z%N8_(&NM2cD%B9t zdSw%rmxyIQyb#?nd+pe}@?ERMrh)hF`*yA#Q^OzfBk#HY)c*(83YQB2 literal 0 HcmV?d00001 diff --git a/_vendor/idna/__pycache__/core.cpython-310.pyc b/_vendor/idna/__pycache__/core.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..1b171a27ee3d631e2372f49e89022892d5ce6166 GIT binary patch literal 9661 zcmbVS+jCq+dOx>0bJ6HxS(asx&9N5@V~`BkU|{>G>O7^2m*{Cz<-CNg#rgfZXGRy> zKt-qp~N{Nnd4!w`lrYsQi}Ynq0z zgk7^{E%mi$ZS{3#9ekZyX33p(m$I{2z!@S_%Pr++^QgPC1(BWY3!L?$$ZeRj{TB?8 z7lls@Q3wXs?AbxI`$Q4#VlasI5Ze7>0PO+Q-h=j_7(#nUwTH!?V6PYs_Rc$EuNe8n znH@pTKCutK;b3&$6{BK5diRSl)iVaT1L7g{96%3e?nBSRVjMjWiGzU~0B+toV5r%S zI3ymy$iq8EykNAm_F-`ZqvPT{#`lRwd;O1zqn~7E52{{b;fTk@6M#Ilt*0c8q303Z zBW%DtDV{=)r+Ow7Zp43597pfr&K~T4y0cGCJR_dPK1VRa4fX-^@6Fr9T&;FOoW#6G zJ3Er@=fv~qd2BbdI)PK-1&kdP)8Zvi@_p=ZTJ5rLJ||uluV9zQ#RZ($_I-W;h*$C3 zf*zYMiZkLYpq~)0eFHR4y&$H4I@0PP8*MEcP}5Lc@8DDlH+Gfx(EP~3_pCYnW5es}WAk3RnOKmF;i|9Rts zD%v~#xZA7v-5Ej=7_+7@z{w`L7}(fp{^Ggvne$TCW$To8){g@(xK#}l2Ht#KdVa0u z5o98Ws&x@Y3!V&Wei8_;A?tIsU@7*>x1BUssYL!#P^qMaN@b}onl;vomCAC{uXRSU zm5QiWE0x=Z90W3|`0DB7$x`EZBWz40zFY{BiIdCWbHR-h)#J5r?s#J*S*%CLc~r-% zbs0=HRwNIAWZ!X75(q#^SAhn-#oDD^&$$i;7-=p;AVi0+A7?MF%A3n%j zZlbvqL`m%VGVr2$;>CUv#`7VlFH35ZEkbmShb)It>|sR}Y<(+gLl>hPek~MJbrCe` zxb)U5yRq{<5yrTU`c3SPi)n&GYW1qR3fzpI=7q7>jK3MZy+CNRhaOwsir)U+=uLqc zgIh`K{BA6h#lYKv4Npyx=7o``N7Ym>Ouh@UBS7!r9qlu=|$nY3?PGtF1)OLJia=}7JBqD&ofd|G(NuQdb3Y$Z$X!^)|7 zV;jeiS<)d0c4uy-TJz)BLvKvp8ZdJve_-!}gmmMo3>!(6bawxC(9F|GjKn0xiFM6x zn+J?FO1W7sIg-+n+I1-;C#6}vTHL`*9zy4C+zOR2u4uT&F&uN^h$#c&u*DY6AU`R5mG2iDAG*Lp9^aDY)4cSdHS4r z%HSwR=BP=PZg;6T@Z+ea zMX3I;2Bw1Ay!YCB=!^q40qtvGVwn|YWC{yt6^W8?aQ>O{=GTDP{4I*<8Tk}GxOIgY z#bh^ndo_A-BDuB3?-bw^ej^&c6I=>xzZg`nS89pe!IV_cq(vRpWpIWtS1n=)QM1k& z9~}HWYt>$L5_8>ZI}puGJ0om}=ApzE&bpIi6fO3K7R-#u+%V*$!d;iad%E3`{zE|m&ftH~F*q;Y-^ufEy3 z&@nDs3o6HB%ZltopOpEY3>OxYiKISJ3+59|DRf+q2>BAp;okC96rfMl+1q+{%8!&W zUkYz|QFAGfe$7i(8bSQvrE~H{uBBG}K5M60yv*Vi78HB6)Blee5o#K1!dV}&9I$hyi$2#Jwj9eb3E@~d3s%r#zk{zs2+Y9@d#m622ylRvuVd+ZGE7}bW=gg` z?;KsTg}T%ZtDMBvyU%4*p9>s^B=lO`cNAnwV&v)ZDh{$J<@b#gzt} zWF;dfr11PmcqhS$UB#kK>??C(^Dh2cCB1}F70PdhbDvN)?GEv;T&x?!3)_ndd4pI7-mk2Yi0sq4l!|(E6FCmH6Nui{-HB zLBuE*$~MkS%irNSn=?w0rsg?i9>RV=m2&bC!YRLcf8|Cf{Uv|5Bc5hd+N9GokfN1ZGg)mtxK?`w0gZ_Dq*0_bZmveTre=vtZ>c zU@o`K9qX05EiiSNVHw$$^P!;VR_mGY<>L3SLIEo*bl4*3LQ?=l-!|wXpnlpm!1M=J zowg(T(N30^0Pl!_H7j0IwZUF(Xw8zJf-11l@)CCxd)l_5-jqKR!`Dsu50M2C*ssh&eED-l_1@kpzfutY-aWhCI(v4k^Dk){>TZTLSZQunoBP6ju_-@w5qgz@Ft7isP_ z@cDut`DyMA1hLmyvtRS0@P|-4VaVdYS^O^wC^{t}Dl|Hb1xlGMMwfF$%Rg>OuJ0RK4d!f6JL{=bJjQvykic*aPv!}4zq3^f`Pa0I@TE4qo}*6k6MnK`%Sk6 zGk*=s?NIvU=sx_W@QY7(xEhMXnn%nbi-<1K$_(FJ zr=8~)e6)<%fH6#=4Z{KD+Sj&|;Rx{5%%zLx(%jTr<(c#E&Ai?^_BwPU zawLc}XzRN=lsm3c5Rz;xRo;u7E}5iLt}SAmW31EMXxURz*h{C% zAq=E_ow%I$^`Gd78Mh3;nT7;**pc{A zz-UQSu|K4AheTq{T-)4l;H%d>y|pGxzf(>#eq0U1)_`{6l6u{%)uV-0u3YynMvZ2I z@a9pVnYzsy4@Koy)SacnNV@Y*&NIEOlXa<$+=n7s9_6Hgimzr>8Zwv=Npj2;LPpGped3tR7_(iD7a zp@Bb#kqi|kQYsmJ$yiarTs43V>n@cnu;~Lf#g!j+lp5Z`I1lPeT`=*&#pTMf394Gp zz3JDOq(k2N%!E4Cr=Ur^%blE|7u3Rq5N{0#ci}5RNzB)qkx=fPyvzlTbf$T|fa9Jx zLw=8dgWX(1XF{o8*3mB;ES6dDw&YC~0B3?BOdh|l2;5r8GLm0TsstfUQ zVc@c@588G+i#s>ucst7k8WUCM$;?|DmN4mZt>)S}#?PyHq^t_KS8@?uyi@4Up})}1 zGYJ>JfiE4mGi^(alD45mRW=5F(kuzMhPkzMuAF%kC1@}nZdNYBFR5m4b z_~elms0%CVAu7!&N@V>e9v~7wX~tYWViy|19 z28T=!S5GmtGDXVOv%uo6Wqobo$8W(Nx~IROGDFTsjD?sNg8sZ~-7RM1&lCl`8k`M$ z7HnQ+gwy?_i1sYif1$Bmh02GvsnD*{a#jv>m?xvvAXKL%kI*7P1e`T{m7;$`LN&_w+wM9Tbpuv(`3=lQFpk+72m$&rX_;+ym#$;>ooKjeD>$FL}SK%uC*|oywluM;~S!q{wznQpE3llt* zb>7_g9ukAcl*LS4ztMoYPaXP=@&vYpwLgN7{5gw1W3k2Z2#CP)GKibCBy|`06*`PJ*0Z%&r!HP(My+FXr{ym|wc;iD zIcv<*%*a1SSt{e5 zr_NlxUQ_S2+QXqct1ZKE)+j3~tkChw6*g52CK&zmx-{UmicTSuvC zLl{kSr}h5(Nk)>P8>ciGNsWX_gK<9yEiHrA zh7iKI4}%bLAKJF1B{sCQwxwm3|MPwGxxVNBc>KQK$G%?A*ZXswbFOpF^m)IpIcJ>P zp+mbA|JPyDq%%)>IFDMRF6|FQ$1dFyr@3X37RLUo~Sxe^(57D)ss~xsh*;bG+Fgj)hVi{saB|-u6l;* zR8f7TX_}|2&QLv5HKRIHb(ZQ`sG?dXDN`)pJ$niRvSrr+L2W0@Z5O z^HmqBUZA>2^+MH)R4-PoQC+NhiRu#7TGdNM^^q>qe7S0!>J_S2s$Qjfwdysh*Q#Ep zTCaM&>J6$l>N8%de3RKfI@wEnp26RM4> zPm1azJ*CGzt@@1Wv#QVOanCESReeGAMb(#7n^a#`eMR+E)pdH?*OXsR9_bCu>vio- z<+oJd*2)IeceL`Z>U*m1tA3#Rq3TDf8&yA6{Y3RsQGHIE^uGS0x>@zFdc+phzo~wv z`nl>>)xWELq57rjHr20GzgGQ+>UL3mq;E8TtB>)W>JF{^Q}uh*A5?eh>c5nKRQ|W> zF0K4W^(WPzwZ2>Rzf#dh`bF1%Rc%)NpXzU_zl$zykx99?aF5(uy2tLV+*`Z1ac}Fs zhkHA5d3^4>z1MQwJGggr-_yO5`(EyQyYJ(k>%OmhXZJ4d+Fy9Q{XA=rAs-;w&n3^- z4s<`ry_hEpG&?)}{R zyC3d;g!_^1#qLM>eGl+F(DNYoqusSvac)CoZ@^3Z_@Ux{F2lSw+&%5bYUkoMBfUP# z?^F91b?sod_AvZdUmxQ>)_t7&aqeaA$GeXg_j5VHYZKg0bf4&cl6$%P$?lWfwaalX zll{Fs)qRTlY5rU){5hWPeumeliu<`t^V)Rx8SdKsc#MqScBcC*Uq8!zwtJ=f9Cz)8 z+`h{5Iqq}a&vlaN|H*XuFQkGntN-YD+p@}$?Ea@StXZM9qD&wBki z_vhW$y1(H5qWeqkP3|wdzvBL?`#Sg6#Qj`e_u3oo>)qdUf6M)C_YLmvxWDWEp1XE; zp2G*8wZoIO$KxBl{;~Tf;(jjL?>T0Zul>b+v-@A&x48e!{WJH^-M6~`-Te#qFWtAf zf93wQ`#;3}T(*1d8~1PBzjNQ={!jlI|K9xv_nq$la{p1LI-c9V-FNxz|Kt9X`_JyX z#r<6V>$P9pe|2wm|DXGB?!T)?K08EQMRH$DBd#UQTe`>Yt=wC?w{dUlzK6J;OO$En zwf62g?j77ay6@?3vjdOp*=C0*W3xk)$@Tia?w#Gc=<60`x@vETm>r}?Mw$J^{ag<4 zTAurX?g#mObaT&lKiIvy`yuWH?uWYfa6inw(7mU7FZbT!elA5`>*L7U3*9erzu3LT zpT%O&mv~;{xz_Wg;{MuP=C#ZHm^$|>+^_WYt2|%revQ|!^?aS@diU$SeuHPd9_LkC z>iH)3o5lTHZt>eJbN_=s|67w+`!-)$?*2#j+uiSQZ*afU{Vw;r-B-B($^9PpKa2a> ztn}Kw?)SOh@4m|Y0rv;pA97#q{;>Na?vJ|L>=60v5M>_s`V;Pr;(jhqdhIFqr`@0N zSMgcT&$&PEzSjK(Kkh}(FS$3lzwG{s`>XEj++P#-b9vosZ@8~_f7AUf_qW|QxWD86 zuKRob?%M1S`Rov7KJ@jE{G2y>{@DE!aX*(&y|&4Z)!!BH)3Vv?e|6vD{x|o}+&_2U z>i&24FWkR$-{$_6``7OOkmum%vfXRnxa)5dI2ZkW0=~n~(PoDz^SvMUgV%Su|I6z? zy6f*3xcx5A|8f7xU%#I{@0Q#9x%}7f>la`9)sJm<|DXGB?!W8tEq!)qnUTHlM0UiM zOb^n5Tk`v8^H}e(CBK{IU7+6Dy^VWY_dUe*Y+CyC(9(bN&@z+b$8>P-=)R}BO%E-7 zdT7b-vF)+;anE(%*S)iQ7x%92`?>Eg?&orV*YeyCbU(U{}NIzo?EiZj6K^A*pQs$mn@yilv1yK$y9iU)zy437b84abA|i+AuqsmWk^ zu^u}G%otXHRfcDP)rOaVHHJ@usY~=`uYsEkH-cT4XmtxX*>ERVZTKH>z2WcRrX^K8 z!_;91^DN>PDGjrFw@5AP)5^k)EuvJaRa*;xBGk6_aLh!`eoV(y&wce)xA*0K2K!y? zB2%_-#`8EqJ3MJE6H35i)Ho zY$h~Sdf0Yul)8F&d%J@l2~8nv?a_+6>tri~2NLr3wQ$fN!s#CF8Q&^ZJI%x2&u*1! z8r<0)=b(!?Y+4t)&2js*=H9wmSaV40RQmX?sh)f2JFuSPN;~h6H~Bj--9@Ya0oQiX z*KFX$EmGB0e#S!yTSFL5*d4-1Lh2kpY&0P!gb9SMgr2SSg}RMbEgs=7)CxlNNDujk zw@k(94tAPH64sY`IEj!R-NBw(i}~`N?wRV@QSa|pc}v1wqz+G|c8&74By|LD%dvjv zzZ25Od6;}8Pq)m&yd^DC%NP5Z-$htQ(7WE%uO)AZpF=ZYV+g+!b`kUyYSEt);=DB+ z!l~AV^PWT~=e+gaW)qeYdbZl!>e%@+XP&*e<(TPnH@6-$bH@Cc7i?}jrgHxDv!>6T zzPasj)2pYS4OOOi-@ZASbFFLvRYoE$MPiXwB5g(5i{vBUl*+*eOYAOjqD0>CRAqt4 zp&~s*4ihO9=_%4nq_;?sNFR~DBK<`AiySU;gvgO1#Ue+E3=kP8GDzfTk-;KEL`p=4 ziVPDOE|NyR86~GSLgGk~Q6i-xqeYGpIaXwh$XJnaB6CH~6**62zQ_WRYLW9r7K&UT zvPk4Yk&8qw7O4?gEOLp+5|LVwOGPddxm=`9^F$io785 zqR2}kO(HLgydv_d$U2eNL|zwpLu9?kn<8(Cye+apy{ zBHxSrAo7dIuOiJNzl-eIh99nS`QhpWRqidak4Ub_z9OAPx`=cY*-vDDkpo2XL=F@= zNTi!czR1BM-9-)&DG)hSq=(31B84J7MS6+!7AX?xBhpu-pUCkd<3&yonILka$V8Eo zM9M`@7MUb+ipXSORS0Z1F{6l2B$TuS2iu@vyZi|c%87VSKq*P?I$T1?vii{B%D>6>xIFT}u z<3+}coFFnmT9HddE)%(2q)y}tkt;>661iIB z8j)*7t`n&jxnAT3k)FOa<9mJBKM1|5_v%6L6L_Kpd?C`BFE3TL5ossVQ6yjFV3F=3hlmu294gX7y!k)9&GM0$%9iS!ZaE7DJ- zzsTVtM~ECLQY>ws6SL8mC`$blXJSdWrk8}{}Co)Uq zERoqFl_Kd?$Ow^o{wlIXnqsX2jokaE$ z*;`~EkzA2|MLLUg5$P(jpUD0q2Z-c}94K;-NH>vuk%L9LiyR`-e^2Cakt0No6e$)t zN@Re@K#@TrM~e&=86r|5GE`)k$Z(Og$Ow^0|L>7r$C~}d=#UeE#i$yLGSt3#^a;eA~k;gc}C<} zk>^C77g;Ovg2;;^FNrjXye#sH$g3jjL|zklUE~ds^&)SIye0Cs$P1m2cSKU(AT2~9 zk(MH{NGp-nB5g$4itHiMPNcm^jz|ZQjv{-CbQ0N1WN(puL~=#;73nO}MWn09ej@ve z93YY>a-hgTBHcvtMGh9}E^>%SfykjEJwy%@DHQ1`(o3YbNRdb%k-j4RMEZ*yE^>s( zks`$+M~Ms&87MLc>6ue`wD4e&AtEIrLq&#(3>Qg@j1U7ze z8V&}V3@--jTIc~kgEcJ`Q~XkAt6>Dju~zvdTq?(~HJEGI7R)nbw@DQk=72?p9l>Hl z-s@C};oe}WVJ=u^*cmK0>VRx|3umG$#>;Wz_ECd@2 zdx0wri@?=}eZfY<{@_}}Bfxcr1Hg@jM}u1ohk)A+hk`o|hl9Hf`TbO?Z7Y2xM}wUV z`9)Q#tKnEM-;iHYrHTy4gT;muz!JlWV5wm_SY|j0EH|7CRv1nJGlmslmEjp+wc#|d z#&8B$XP5!&4QGMN3}=H4hI7D`hE?Ed!?|Fi;XH7y;e2qNVKunHa3Q$Sa1pr0P=2Mj z-Ec9u(~#fLrFI)$3Z`1?D_IBT7+wkH8eRkD8{Po+H@pQLV|XiAZrA{34DSXP8Qufd z8LkBD4etY&89o56FkB6;GJFJVG<*zfGJFzz-|%U0li^x$o8dZem*IQhpf>v4J^<5( zAAw^GKL#flehN-D{0lhE@UP%(!_UBZhFifJ!!N)(!);)_;n(0Y!|h;$;kV#Q!yVvi z!|%aH!+(Km4SxbR8vX)qGi(NT82$$CGEDKS`)0!kjN94{1LhdE26GMDf_aARzyiY@ zu*k3@SZvq{EHT_0EH%sp%M3e%<%V6s3d8-ujA0&FWq1%+ZI}<%7<_LrJOW&2I2hbuI27DzI09@o90j(u-{g-0^9;v<1%_o{ zk>Pl-*l-P4V)zQUt)0H=AA()mEB+H)WB3F3jA2?nCdknPT*Xz2Vp3GQ;g)gWbnK!+NmD@CLBha4A?~cr#dPxC|^aycH}rTn<(k-VSCA z8^9{VyTEG06=03wJz$;TO0eGWK5&`gDzL%uL2#wvYH+pTBVeQ98gQ-Qj zt~8X-u2vg<4>lU^1lJn=2(B~S1#U3>3EXJ78{A^}3%Jd&8Qfv`8@S6b#Rregh7lO& z>WdnKIfkvlT*J0to?$z%z%U0aGVBNz8+HOq4EF|04RgUV!_Hv2VOOxiaDOmkm+0G1g(2Cg!E0$gwS9JtBwHE^fln_%8ydS~x}MTVQe3d3z+t>KU0a>M_D zI}LvacN@n1?QC4Ach(-vHQWm#2`69xO7P2$mY24$d=N2rf6Q1LIzLvm3x%!<)ep!w0}J!^gl?hK=BQ!{@+_hOdJ= z4c`Ludh7kZ3lSc@J?`^;Rs4?Po74SZMeGm^R!5Rv7LCmm7A- z;a_2Yz1d#iAj6*E7{kHfD#Ov>PQ$Ta*Te0F0t*dK0m}_f1E(3D0ahDkz*@t3;Bvz{ zFm;69+4W$q;Z5Km!w0}IhK=AV!{@+_hOdD;4c`R29%-)wSZMeuSZ??^SZ%lstTo&T zE;rl-t~2b=fio+%R|gzq$k#nmV+_ZFU60ZOP5=uHCxa6VGhmJ3JaD;TEx6sV4vYur zJ=_N78a@urHe3sCFnkf*W%ve|8mKpW8!R;Z7%VaT6r60h6`W?c6I^b%3tVq_WJk_n zklxu4@O{G*z|_%NodTu}FPCEnYxN4Sli_t>SHqQHf5ZF0Wrk0H4Tdj*?;E}briSR9 zy#aPLd=Jbw+zh4-w}OidTkOfrO7vzqV3Fbe;55TtV6EW*aHHWMaEsw!aGT*MaJM1f zKT35Ps`q<5SYS929AtP3SY}uOPBW|os}0WqR~aq<*BPDPOU z)Ny+3>tI{MPr-b{z4qbJ3_F8k%JkUNq-r<~tUg|=OTpB5#h<`h!*e?GLpwpMwcy%Q z74MMh6vgkrTEqW>>rT^Z=Puk?h2l|QjbXV|PuJ=>V6EYK;4_BR;CjPGIra=ab|bjS za1&TDRjZ$Y^9;WQYYq43bG`I5J>WvH*6<-PHAAaEflY?p_M@87Y7tm#SOPW~&IP;9 z)C10!s^MxdHA|~+N!4&Om_AFZdHZv~Y{jWyt>I$9O08ZCHXGg!rsrsN71&_-BG_d3 zo*Zj<`~lo=l^#0YzMup5i#c^As-uiw!>l(+jlvD>%Whi0{Ml z^+uV0`-5u@OTZn5CxC;_*8>)Ts}1h}w;84m;)4!5YKvV4YzBSZ~+^ zTxM7ZHW>B-R~i<9s}1{tjfVZfwT4H4>kNy*4Tb~2jfR83Erx@^ZH6V_4#Q#KF2gj~ zY&a5(FVxq!6wEO^2Fx`a1Lhfy0}Bkxz#_x(V6ou@u*7g8SZY`fmKjb0%MB-k6^2v5 zj9~>>Wq1ZyZ8#0AF`NO`8D_wG!&%@m!`Wbi;T&+KVHLRAa4y(rI1gNFI3HYRSPgD4 zTnKJ7Tm)`0ya?Q8SOe}byae23SPM2AUIxY&>FZku<``ZH<{DlN<{4fK78urpMTR$k z#fD4462qIpQp06nnc?kVx#3;lJi`@Wjp03Do#9Hb-tazfnc*t1!SF$FrQvFDwc#UR zqv0BGt>NR~I>SbAgW*%)M#E>oEr!p5+YHx&I}Be0cNsQ;&4#al@x}V`tpjrmUk7sy z*MoV6Z-E7d8^9vNcfn%A_rVgw55ZEyjbNGKCt$hZCa}VAGng^l0#+G*238wx1#1ky z0P765f%S%8gUbxJgAIn?f-4PofU6C^2OAA{f@=+b1lJkv0yh}`1a36k4Q?^~1>9!X z4DK-e4cukemOlV!Hk3bDNZ07=TL}7JDGUOetSW!IkXkICFs1aU*>cok#q;DS!v)}a z!}G!S4KDyU8D0o(HM|(yZnzlSY4|wUbcx>Y)1d!Z!yBOgS;I$QdWjye3G}~k_!6wO z>UMCc;m@G|g~JI4(`#D!*V3;bbZYHkS`m-Phmi6M;?xX6-Qgb2A}kA`lCUC#vk9w0 zIESz%g!zPZA)HUx5JC-MQwWz4Vm|KF2dyLIgm5JxH-xJRc_Ca&CxLs&tm3E>_>T?i`)^ xSQf%6 zLPH1-5>|$=ny@;AM+l7}tRbuo;c>#c5E=;^LU@X>F@$FbTS9n_uq}kOgdHKgNZ1uZ z6QMbTR|xTu{{E~ZmA{2zMflw5}yM*Ep-Y1lV@FAfzgpGu<5I!N4 zhp>rI5yECdCWI}7st`USREMyYP!qxzgt`#EBGiZQPr{lIek42-!Y;yw5PJ0CUq`XO zAccg65c(1tLzqoy3gI?F^HF}A`w6uJJUmKR5yI1Qn-E?iYz^TJLTaGj<~>4w2%i$t zA$(4l7DB2oj}toLkM#SD?_LvtPWuw zp)rI@2=9kbOK1+^GD6Hp4f=}K5pqJfl8_t1)r7ndt|b(NP){fd;RZr+2uleiA>2$T z4PhCfEQDJL28G>0&f z5FZ$Rt_e9I97D(rVGJQJgmHv|5XuNeA&e&!hcJOq62e46X$a+nvJfT_%0rk;s0d*S zArnFcp(=zk2-P7>Bh-X2gHRVjhEN~EEW)x7W)m7hm_t|@LKR_k2y+RIAWB6T&@&x)4?p>O;7Xuq=dCgoY3vB&-Z!4Pk8vPZ2hT z@C;!~2+t9=g|L>eBZL7mCA@1fc;yOZ32yYVdLwK7|7{Z5y(hxQh%0l>r zP#(f2LPZFh37HW7Ls%ceZo;Mz3i)>3_7M6I*5v!SRTEMNdw5*}ADrr2znPFe#KUev zZ3xYT9U=7X$!icoIiZPHzaymj`CWfcSQEl8a+?rVp2A^#l&ojai9bCa#9w@A*qcxq!oGyE5b_B% zA#^9yg>WdLK7?L`h7h{(O}$0oFM<1C!in;iVEQ=Kgbn;fn1-B`%o_fu*@qE|Ll{C> z5yCLS&Je~EnnO5)kZ$33@GBt|dHAhG#5c-3+$rBAYv_CPj)xJ1 z#t_C4+IH}jiwWrv?vmSd^p$ml+7R9+<%H8F9sI+N*h9M2)Ts*A#^2_hcJMU31J9fYY1sVa|nwG zwLSf=?EA)G^49>V#ArVx&kZ`DrlyPiTw zpXgx*VNnRL%V86JWj!J9BoCYAHX%Hp^?G#@bA>ZGf>|r#a)2SY& z5Yiz$D~C<-mA53E=HY-Y1io3M|K^Ga)gcTfG=*@i9Co@NHblNDJk7(m63+C{WdUl3-WO&YVUuvH1D`N2V~4?EG)LkW9(_*Xw}Gt5K(Vph@~CP_Ha!?DK@I<>PqIC>5tzrBU2 z68KV+z6Ns$wIRGjXbRyiIjpxI_B|mT!hhtj5C)#jVMTsesf0crrV!F0EF#p0u#~VX zgxa~B!O?!3iQug@j=qz97`{pTg0n@D-t+Am1mq%I-E`+Lu4cA>`-S z${rmE#W|_@d_f^KU%o6bUq0m5`;q@Ji~Ltw=68@X-w;X7&lTA>9MF73%T!bNkIbB1 z!qI#UM{l~A&~%=MYh;Bx(Usc?=@9NFREN-4z7=26(GEM7&=kVJDXh%)m2(I?LRd)H zSm`TQ5IW8Au!2w(!Wu$d2;HV~Z#8~cZ^E(=+Dv05wWpoIeuVrGx)Z8GIFwKyLT|$I z5atq^LRd;DiTvLBOy{m+55oveA&iriR=#oqVNeK<&fukL=PSPuQtd;?u(FSbf1JgC zKc}0A9fTDj{6J_7;deq)2(QiN-tzr6pAyoCcqprEnYy~b!xTdL&^=T0<(H@P`QmFz z{_8O*`A=G;*pCptb(xya*9cQRTj<-{F`r2+#h>1_*3WXDVP#9CxR6Km|E!n%w~{t= z(dr!TuXaC0`A?HH9iaEp%r9bh@Qc`kytaY3{tJ~aAk+#}i?9~S*3E{rzCJ)=+K zUePCU@95*WDB2kJi9U+^Mjyugq7UN!(fje?(R=X`(Yx`Ht>1}@qYd#<(cAHW=&g8Q z^kzILS|1-By%7(NUXO=Fuf-+Nx_D^xYCJ4@B_1BV9H*nEctrG4JTiJQ9u>V1m$qIT zkB**?kBOd(kBy#<$3)M>W22|zanV!panX};S=1OGA3YI|j~p^gABmzu_(M|KTy-jJLvn#arXQ;BD~# z;%)KW_#UZCTmOu=BmacA$Nz)p;Jfe+_`mUv_>cIW_`mQ@_)dH;{0Dq*{Cj*K{GWI( zz60ME{|@hre~Wj)zrnlW+wuMIf8hIb9$(`JkiWw7@NM{k_?P%W_!oFL{O@=^z7;7H{yNpkMO?u zhj>5y1H3=}K7Kg<9)1M=E`B8b4ql9Jz>mV;#s}bU;REqE@j>`{{Am0Qd@%kxJ_LUa zFX24a;X}!<;=}M)@ZtE&cp7iQN8m5vBk>pUQTPjZDZUmTjX#ecgFlBKi$9Bx!Jom$ z;!oq_@Tc(O@F(#yyb(X1^LPRuPktOf0e=jifUm(%#2>{c;*a1b;Sb~G_-g!Q{2_c2 z{vdt|{s2B1UxlBF-;Ynh@54{S@5L+dmH6rSpYby|k9+W`(eiwcw zekY#68}OO<9r!H#cKj^-kN9kSIbMn1hR?xo#m~n7fLGzm@N@86@VWTS__>_NP53QPQcGGd#IMCKz^}m<;aB4q;#c7p;aB1p<5%D{cpbhN zzZ|~=zYJf3^Y0#Nk-C&~`CXZR{nYvQPn{hAW)Fbb1z`38n4JJ-FM!z%VD>n^Y2zB-lm|X;BAA#9PVD=K2-2`Sof!R@D_7s?11!iA?*;!!r7MR@y zW`BX%VPN(cm|X^DpMlwFVD=iA-3DgAf!T3j_8gd92WH=a4_5wMncasv`ww+?Af5|* z5X>$_oqY&qCxY3FV0I&z{Rn19g4vT`b|sj731(-4*_&W?Cz$;SW`}~=qhNL^n0*Rn zr-Iq5V0J5*{R(Esg4wfRb}g8F3ufnn*}GtNFPQxcW(R}W!(etXo(uaJ%uYs~y$ohI zgW1nub~Knh4Q5w^+1FrpHkiE)W_N?x-(Yq)m^}_=mxI~oV0Jo~y$)u#gW2z3c08Cp z4`$bc+4tZP$}cIi`%!2Aqs|Tpvj@WLf-w6a%udL2VK0Q)4XLvq!t97Jdm_xP2(vH3 z?2IsbBh2myvp>S@kT82B%q|JDPr~e!FncA;ZV9tr!t9tZdnU}T3A1m)?3^%rC(P~% zvwyQ;@Y+khNQowO^36W019HkhN=&wQrEMbC9)n zkhOb|wSSPcgOIg{khP1DwU3aslaRHSkhPnTwV#l+qmZ?ykhQCjwXcx1vyip7khQz; zdT4(kYlmT7dkk5-3|adOSvw6`dkwjpzrWgV$l7sO*PcT@*w;Vz_g^~?>)Lx**X~2s z{zKLdMAjZe)-FWWK19||MAlwJ)^0@Beni%eMAn`})~-a>zC_l}MAqI!*6u{s{zTRe z#p|IximY9Vb?sAR?Nns#Rb=f}WbIdE?O0^(S!C^6WbIpI?ObH-U1aTEWbI#M?O zVPx%MWbI>Q?PO%_Wn}GUWbJ2U?Pz4}X=LqcWbJEY?QCT2ZDj3kWbJQc?Qmr6ab)ds zydK);$lB>x*Iq{+?(eVmJF<2>*0tx6NBH_n{{Cy{V_kb6>)QRu+W*Mf0m<3}$=U_U z+6T$n3CY?E$=VIc+7HRv5y{#U$=Vgk+84>%8Ohok$=V&s+8@c7e-TwY-=Ve`cFYDTU$=ZL(+JVX1gUQ;3$=Zj>+KI{9i^2B79s05zWjsQDy7&1V5>J`GUwd4QTv z1k`*cpypEnHJ=Np`D8%NX9H?J9Z>W6fSOMT)O<#u=2HSSpA)G0q(IGQ1!_JmQ1f|# znokVWd}g5LQv)@h8>so@z-#KW12vx>IL_w>YCb_w^BIDgPZ897j-cj~1T~)}sQENO z&F2YfK2cEfnSz>671VsLpyrbWHJ>f0`E)_e=L>2+VNmlKgPKnn)O^mM)-CzD@>zqL zPa7QP^9D7aIH>u|LCvQQYCd;R^T~sn&mPo#`rtM7`GcBIAROm22sNKVsQDa1%_k9R zK8sNEX@r{3Bh-8%q2@CQHJ?hT`CLNHClhKun^5!VgqqJM)O2`KQ1fYpn$IiLd}5*IGYd7JTB!NlLd_=^YCgMA^XY|}&o9(`g5fpw8HSoqF&yV} z3^ku*sQD~I&8Hb^KF?6|iH4fbG}L^mq2_Z9HJ@y#`D{bYryFWM-%#@jhnmkg)O^aJ z=5r3U;mOaR&pOn6+Tl2#cc}TqL(OL%YCiQ)^SOtbPd?Oq_Mzs}4>g~EsQCm$&1WEL zJ_Yfb`W!^fCn1jWS%{iXL)3g8N-b&Y6A?9^i8#)uB5FPtQS-@&n$Jemd^)1$^AR$DUS1riki<<)O@O<=5rM_pRB0)Y(>qd zD{4MpQS%9ln$K9&e9EHca~8F!$_yF|FKRx2QS%9mn$KX=dQI=Cd0$pWdkX{6@_uIBGt_QS&K|n$L06e3GN)vm7;_=BW8RN6jZXUQ?gxsQFaK zaX!~k^U02y&vw*&x})av9W|fusQHXX&8IwSKIc(elKlK7vmVuC+T++{-lLvOeAJVf zk9sooQBUSR>dE9sJ(>NeC(|GGWd5U`On}sr8IXE11yWDuKdDMVJ((J*Cvzk9WOAgQ%#PHP>5+OeKT=O7Nb1Q9Nj;e&sV8$J z^<dCB0J()JCC-WxtWa6Zr%$(Gdsgrs#cT!I#PwL6+Nj;f9sVDO% z^<)C2p3I=slPQ#XGKW%6CQ<6iEJ{6@MyV(BDD`9_rJl^B)RU={dNP+%PbO39$!tnJ znNE3MlKGT+GNE#OGNV#Yrc~<5oJu{JRH-MkD)nSqrJl^I)RT#odNQ+8Po`Gt$=pgk znOvzSvn%yvdZnJsuhf$XmU=S7QctE>>d72SJ(*;wC$lW|WSXU(%(K*!iI#dY(^5~S zTI$JMOFfxvsVB27^<=uGp3Jw@lL?piC7E%l56}AfPv%_e$)wBuB(pB{WZI>k%)8W+ ziI;jZ^HNWyUh2u*OFfx2h)RT#rdNLDJPo`q($y`i5nT)9?voZB#I;Nh?$JCPvnR+rKQ%|O3-j`%frk+g7 z9G}d})RSqMdNMClPbOyS$;?bWnVP95b2Ig1a;Bcl&eW6XnR+rmQ%@#n>d6dEJ(;4Z zCv!CQWRj+y%+l18X_|U6Pg74OYU;^MO+A^asV8$a^<=W9p3K(Nlj)jzGG9|qCT!}- zj7@!N*3W-3XH!omZQhq;)~23J+uTnwZ&ObuZtBU*O+A^qsV8$c^3{E|n!l@^7IQ3)_r=HB>)RSqPdNPkwPbPBe$xKc?naZgrb2;^7GN+!* z=G2qvoO&{!Q%@#z>dA~wJ(<#}Cv!UWWKyS|%<9yWX`S~anb)Z&6FbKzGduNUYNwve z?bMUWoq966Q%|OM>dE|0J(=LCCo??tWQwPr%<d9Yu0BiYuaZm zYu;xqYvSiU%9{CE%bNPRUDn*sTGr&xTGs5(TGsT>TGsr}TGkZ+YgyL-tYuvVu$FZl zz*^Ro0Bc#-0<2|S4X~DVJ-}Ml6#;8m*95F(T@|pFbzQ(()|CNkS=R=vWnCSxmUVr= zTGkZ;YgyL_tYuv#u$Fb5z*^Ro0&7{<3an*aEwGk#y}(-56$5Ko*9@#>T{ZCDW?eV1 zmUZR8?Xs>NSj)P4U@hzVfwinF2-dQ$Ay~`0ieN44I)b&VD+$)Jt|eH@x|(1u>w1E< ztSbuEvaTsu%etyyE$h01wX7=(*0QcGSj)P)U@hzVg0*h{_b-gKtZNL`vaT{%%eu~B zE$d2ywXACm*0QcPSj)QJU@hy4gSD({4%V`+I#|oP?qDtJ%7gbd>)M00tg8=hmv#NY zTGkZ^YgyMItYuw=u$FZl!dljq2y0o_BCKUyjj)z=J;GYn6$xuu*CecEU6rtwbzQ<* z)|ClsS=T14WnG=HmUVr?TGkZ`YgyMQtYuxLu$Fb5!dljq3Ts){Dy(H)t+1ALy~0}7 z6$@)w*DS1MUA3^5b=|^R)|CruS=TPCWnI0bE{(IUUs6k=fl-V9*Z*h#)V9l-==sj* V= zq}mk^X{A2&N5EtMQ8ll9%3tV9`W;U$P~nw5KF8wcHL z(uGW9p4C>CeVG+j545S*~|9;kGt(nwP~uno&`A zL8N6->vUvc_5)jKIjlxjL)qxc=vo&xu~}J=y4}&TUz%Zeb+xvMv3J&_F4Uc9O}6x1 zN8gQPuh)xu^5qW2Thy=NoK*Klx^||nzfNlTMjo5*W`#R0O*Y7iBzG5ld>t`Kn+>)6 zVKpxYt2bQSQPk@m0w4A)5{>^oGSLJtM^&zyfYK5-q0x3^ie8G0oeqK)kh5p!qq zHf9HW!Ut?36rXsOTQTMb_&sI6+?n`eUx~}COs~eV9I)3XY9EPuQgSqrP7M7P-n#;KdZCjf{_~= z^4?uJCR+%xC@sla0<`WqYllY|hXkgfB?_CcE{)Zy30xi;FV{sACRGI!&0LHm!DZZ@ z17H2=N7Zim%+l~uP; z^#g5heYuz2*RSrS>v^`lUhN}Q#d@ZSWF47o4fm@3X7QAY`=%T^$1|{3U&7Mq_}u3U z_$_n6m-sav@{TYUDbm1Yy76$ORDf|ZXiwAC@hmoDJW`KPmtQl~l6ZC~!E+%;!jKbl z`Gn!PW{F5rl$bS{n&pmexcR7KDAyjQ^R$2sd3sE%c*6ShD0$D!GWa=39lbqz>m57h zW(Azq9VO5C1TadU0doU<=Y4^jE7&(aG8LP1*nV_h>RE!$Mezz7>RZJR#6(#B4jnrd z@5RJJ2l8Ft+_YZXjmzlJ1OBs^_~=D{3=vEoK)tNI7Yuz!9g2Pj=RvD?suPk9 zy88i1Dj#bcT2beoso zMnRkKa67~6Ynz$&8|S)jT`~;)O+{1YDn2eHP3X!vZoI0j8=nMG{Mlf~Haz}+qR*ez z9Nu@EWW^V-QxjBOG0QvN62E}D6GyY&0`Fkwb3<@MGtE>St1^vaa}6|{?pNqpLq%c; yg`k0^S>8$)Z5|F^Gc<7=auIATH(r5-AK(3@MDk44O<;%*J{qewvK8xZ~r? zQj3Z+^Yh~4S27ea0abyCUl#f$xdr+KnFYEfiACwDCAubsnWm{_#>x6QnMwKul_eSZ sdHR_td5QW3iOJcC>8bH4i6x181(mlrY;yBcN^?@}Kz0{{Oypny0PaaBH2?qr literal 0 HcmV?d00001 diff --git a/_vendor/idna/__pycache__/uts46data.cpython-310.pyc b/_vendor/idna/__pycache__/uts46data.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..262caf8d58179e4f6bcc7fb886efe7867593820b GIT binary patch literal 152355 zcma&P2b>he_Wr%hqGA9AbH)rPIVV986%Ygg!6m~GhRl#bWZ4CF$vG`)$vNk=7)dH% z)-@rpNxfdL;a;=<^Hg=!oOArWFT>|Lx9aJH9;XBFp`nYWG3g1n(H^gOIGJFr&-WZqdz2W=F_NKUO?+-sf zwl~LR`(XGXvb`lP+fw1uWP58|wq?Q(lkIJB**+33OSZSiWm_&>o^0=k%eF$eBH7*< zmu;nRWwO01F54>Ms$_e2T(;H1)ycMGT(&jBHOcm#xNK{MYm@E0aoN@h*CpHg;<9}- zT#sz;kIS}x_%X75ATHa-!wtyx!MJRn2sb3#hvKq*GW-v>2M>mEghF_<8TwQ zEfbgRGvTIW`*2*g&BD);?IUs7HV?NT+p=-lJ{N9Dw&mioZ53`!w&mlpeLmcVY%9cN z+cx|H*;b6pHYwbWY%9fO+dkZZY%9lQ+cDgUY^%g&+d15YY^%m)+cn&cY^%j(8xD6T z+v;)I_6YYR+Zu7%_6kSHwq{(my~BOTwpLuWeZ&38wsu^${lf#uwoY8O1H*&Jwr*Uu z(ePlheKaoHA>pB9TQ4r#Vd3FqTR$$_5#f?T zyEeRzY}zi<;kJ=J#6jd!6|$ZhlLc-|Nlq z4d(Yo^Lvx|z1jTUVt#Kmzqgs++s*GC=J!tXdzbmW+x(U^zxSBmd(H2C=J$T{`+)g< z(EL7ReoL9((&o2}`F+^@K4N~$n%{Efx4ikSV16r_-%94UviYrIeyf__YUa1P`K@7o zYntC$=C`)_tz&-cn%_swZ$0x{-~2viejhi#4b1No=C`5webW3sWqzMFzm3dqWAod@ z{61rTo0{Kd=J#3i+uZ!NFu%{4-z)S zm4}|R;IOg~?K0G?bhvaVT8LP7p~|I01xQ7&pdU(O6PHe8>B2018B1Tz(%6OD7DsgH zD_I&VB#vLr($}zbQI;;o($}&yt)Te*6lduYEPXvo-@wv0vh+ zg`TI@P!6;z{ZP6*v#7v$MV79_(v?}d3QJ>mZlBdyx;jhOVCkAHT?^@;rPgNYIxJn6 zr5|PKdMsVvrxObvqjYwmrrCwMluj&o971D5x>6RMC&+fA>=UtUn6eFH+3u8mGM4Q@ z*{5RJo|Jt$mhDB^MzL&!vN&XLpx%^i63h0X>@%@!U&=O(W&2UKSuES1vd_k{11Q@( zmK{jh7P0Ig%03s%Mk(7emK{vlRzZQaQ`mlhYlHBrCPYlkS^s0j?BKi z)8OtsJ5_)S`w>2~NTKK?`ac{<{DWp%5gcXUdJDpocE#+@(mhzZCrkHY=?F{rX6ZgG z-It~Nv2=fy9>CHAS$YslM_GC>OAle`p)5U&rH8Zh2$mkn(xX^_!>18av+@})@GLgoW z`>jw(s`eGg27PcPORr+-)hxY+rPs3bI-gD~z?CqE7@A0_l5eHcaW*i0Bhto)!gG?i z$%~jWhV!?tVP!+r1tt*x}QO1v`<(p|T5AB1g8%Wo_F{ zEZ7ae_BD=-_Bf-T;SNq8rrqxa3TkPePbU`aM;e<4XS$9yKLBPAS&^~_T{ha2Qnar_ z0A^o_1&5tD^fF3SJU?!H724#;KPbwcC1_=18!9*o8tm<5XJHEdS|)AuibN|2y(-a4 zLa#}*iqPv4ttRw_L~95glV~lW;}WflId7IiCk>o(MdPX_W2?XEryKnz{^1%lp#P$m z(~ot@i3KMBP{;O6*VA!NO09GoiO7+Cu2GL|X}+k!TyCvl4A5 z^o~S32)!%OPD1ZVw2RRD6744Rfkb-vh=@L`a72XH%oud(*I%UA6WWFmi~#Qe`e|bvh@F0`WKe|m8E}U z>EBuU50?IurT=1S^eopT5())*Gp?B87l#i;0A!oJum?>-KVCDNi8zGA3Ux z!du3}zFU(e(l zq&$!08<~8QloybEGm~$T@*$qzf3MT<1FUh~7^ zMkV8+Ox$>mwuvilL>`d`+(HK|>ke2tF;Y&-+ej|YEhg8NGL2Fqb(maN%2^~o%H(=p#;NpubsrV? zG0)%_-bkTM9%q|0kTQ+BB2O^6p_C_*{3Mf~k}?emBTqBAk(W`PQ-^749BJ&BXK#2A!DPS<3JRU6|Ze%J2r=m>iZeyg_#+ z_mDEYK~E<4k}|wOgvq_73~$hf$$h1azT1z<{iTe)JAlaprM!dWK}?QHc^AopnLI?w z=*dHwJWR^y$-|jE!pWu~zjl<`_DF|p148E>#kLqNWpwTrnLI|y=-e+cd90J81E@2R zn9Rg+PBeu%Ifn|9;*crKF@*e7w#9fUBjitD@hh zUMdb%Hh$5>A#}a?;?P`q5OlM7tPJy|OmmsY0*PqG6ItkxJrTH(MQkTaoNP~orYDi5 z678fdma#3COPQt@kxYl|G2kv%uq{?f8RxNz$*ZLdcd>@aYn^OLcq*BWx6UDZy!Euj zdbY&|C)+L1Qa3Vrvy<)Ca1mRWyw%Be>vTHaHizsM+i8pKY>OREwp&c5Ep|#Yh0rdC z>`r#mPIj}M?2$4}(IR`9ywAz@7_(`I`yH}7JV09BCli#F#h~(dy{D+j$=>KH$Us66w^50BOpdqap z&zTcAF^=RyKyK12W%!juCKr}6BH(3AzFf+f7F@yPB2qS!UM629Wejt#X7V*so_48t zRAm!R+r%S`p5lo|G>v8lEG7?#f%COYzD~+!8qMSqQa00QCf^`s44iLd@=a1U(`Y8& zB4tFpTbX>Dl+84n$#+QEOrx26mz2#kn#m=Fd~6vV`yM9W>*Sv)k#GX8;65hb?_}Hl z;0hjK@`F-_D|m>>rKD`8(M&EQWw?Tenf!>9;R?z!xtx^Y3d%FNf|N0EuE^v{QpUi! zGLvh08L{a64q7yh)b@-L2`9|Vm2Fa2$j35hi$^`Ods$0IsmC^X%ftpL)53%84EIR zp`AS@5#r9{K*1Ibq>Rbf6CM?&gT9si7OK0UgXZF%M(BLf?}i!%(pdH<-rV!V$UwK5 zDev26(#zzil+C1<$wP#E3J1mYb7dbUG zZo!8hU{#1p^$|c&c`|n6EL~s=e6l-Jg;hmX;3Q07JP)MTLmx^-LM*Ap-1;1|O zsl-206B^Ke{LzL;qC5zO1cfES3hQMKnYR57X55!cgjLlm95U7Q4tjMFhwO$630>)s zwZgLLRT5zgezio430))65<*2K!m4aBiIx$%)*)Mn<%F&i=qx=s5h*SaLRJZh5VEe9 z2qEhRi4d}Gln5c~CW#QTZk7lk>lTR+vTk+A)Yn-Ins0N+oX}YWt=lC+Tf9Rew8c9m zLR-8`B808GB|_LLDbPE~gzk|DN+EQgM2KGZON8k4fJBI14@!jS^^in}UZo^L z^eXL;ZC{99WgM~%0MYAViLkEvh(wr?m6ZqspK=mSCsf`cdqm8gDgXsxrL&ab+Pg5h ztCMZv;M%(}IqYP+bGY{IOzt6Nxb~h*?j>co_6U=EOBt@c50m>!8Lqt_llw~2_|&X6*OPm7tnM9LUGEp_sxB42egbvE-m+{=hB z@-34G#DHwMJ0NxHOev$+u3+*?DWlh}V)AM!qt~us@>(gQ*REsodMTsVZea38C)=gy z_e&YQ_5hO)N*TTO5R(r}8NK!hle46ZUVGHbp~%Zf2UD(Bgz0-&;Ct1ZCPrS9G9FEN zoyl)V8IPtMWAbq+<8Ji{CZCk@WRg!Y`AsQfrv4U_--wkcd|WiGrMB)*G{(QZDvRq| zZzg{)Wpw8MF!={5qci`=Rq|JCpyAGCK30 zO#VyC=*)jJIf2&EViTD6VGmHB!caq9~J#Nf`r*YngnVl;JUoGr5G6;W4gf z@(ogk$GDNnH%S>D<7Ot`B4v1tTbX>Dl;JUMXYw6VhR3**$#+Q^9^-B%my|L*#yw2F zSIY1h_c8f?DZ^ttz~l#|43F^;lS@e%9-}mq%Sag><6$O0B4v1tvP>=~Wq6G8UZ#l) z(m@!kC`><~w>ct}B%-%DB9$egw>ctJB%-%DB2^{Ajk#(P;TBSLiRk^7NDYZ_Kc=Qc zcwVWNL>md!mWbZHh}4k?E9!M6!t(i}5@Gqgoc%_PDK z!m|=#1);e>A7TZeg+y3Ecupd$AheVSD+sM5!U{rbiLiq3yhIp>wE;4%o1TG1ItU19 z-jsq!!UtuD8_*1mZ8(kbnT*e3`~>4?8UKdye>097KdxYx)2m0eV4=tzNCySJ z)A37%tD3ufxH=kVxJrx+#oo<5D^$V9>pnp%946o==>`sW5QBk)Ptyz>;owlfPbL$j zDL0_0VpA=1T<4qag$@t5R|IYZIjF&4C+kXY5gZ-#6zu3F2qQ}KyUV0;?mGZ>%6_#DPJFusxT z9gOc}d>7+;89&JQVaDHJ{5az$8Gn=UGmL-4_{W~pLjp+0uHV`f=hou-eXj6IV0u)5 zZTY1#*=9}70S6U((VK@Nxs3nKc%iFe_JxrSF2rSwU(NWnj2CD8dd5pLUWW0Cj92oU z#sWw;rUn3Sl5lSQ&U5Q=wpEyURc2mIneVse)tPw>Z%*%{FkXl8x{N={cmu|tV!RRK zO&D*+cnij#^PKu4(v4$hI3Gn$j3g<%z~XiaFR>@s9yqwP9gxPQ`v3OoSD4QURIG42 zxmG(1c_nVQ-cglclPy6fcT~DMJy>amGd_;-@r+Mkd^+PZ7@y7f9L6^=zLD`AjPGQ8 zH{*L4KgjrD#*Z<6obgkPzsdM%#?LbT4&&z-zsPtl<3BL|E8_`Q2UnNsxe(I9RWHo= zWsDbP{949~Gk!her5P{7ctyr5FP}JjIUyR4dd$>-^BP<#t$-{#rSKCA7lI^0&FU_6=eag2{=d;;SO7|&pQC*!*qKg{?M#t)hc*po!+>SAemF8u4C_3yLj2~nCIO8W6Kg0N0#h%!k&mxVhuy}b!N zw1ISR8iPDfj0{$r?l^Y@t!fA}8TwBXvoIua*3NTTSkW8qF-=Sp&JjMc!zv@ZVk$dp zm&GGJwj1mUHlX*Dp#)cQoVT)9%Iq@~Nns{)q)FCnTTyepNhq=q>7W)Cc}}mXs!f;J zO_wo~mC9s=HCe?>)+v*<)?__1*{n=9S(7cy@Dm4_zMB40!-q%Fhca`(IaYy0=)8AG)ZYrGiI=!8Vba1i$aJG09GvTY$C1m@j z*J%)6+#Q#mgF-qO&^Ia(rwv4~PcoO3s8Sl*aB*rH*KArKIjPGE4 zC*yk=-_Q6_#$RUq6~

{21dW82^azj~Oq1eXQO}AdPyvWIU*BmenW2^o_XV!AA*K>M(6KUThznXy?EWav-J1oB`hFdJZD~5Y4e<%ho z_NQX-n}2}?-7Db+N(ap_`KA~jhjhS~GM>r!uZ+_-d%gWlNC*4BoAK(5*Jr#Hyg>=wvJ2Bpw@iB~#WqdN@Ga1idJd^RQ zjBjWB4C4v6$I87f3bGd`B_WX6AD{13)!+!5PPZKQ+qZOnL6&l4lbNW;%W7n2{n zq~EM^2zTm?-#iwl-%N~*^T)s^G05?xcz};m5J>d^-<%*Y-UEDbg1|%%@RbMxX&&J7 z4g}I2FoE~$MHuf+0yDKrA1878P#c)>+QBTv@ZP~}#by(mqZr;3n5)=aV)GQkn*#F{ z!>a-d6vMj$3l+o50*e&GlpsSfye_aDTc=;_A7?xCJrcu2PY0HhEFLS0t-6X5vAh+i7dtNgv3$B@C4h-V1c_j zfpp*w&ocfy;|X^T;?j8h%?cqW2#%)gzf`aw( zAb1xu;z3Zb-X55O(d$D1K{FcRMSO;fy6Q+KE_R}AlNe+yaVYw%tww)4g6TSk zY!ldn=jhfuX3S2ZEp2ef77C$sqeo_ZwinN^ZSo8q;1tTf*&%yO1kEiD*_|P_ZgnWy z%@%c=1J(vHbh|_dp*tLkhV5oM9k81rEbem16yOxR)^3NQJ?v(C959<5!-!(9L(zWL zW}gT6QX^UHcOd9J@KXmIi$<)`K@a*{aL9u(_Ie+7z#RJ&obM5d;C!O z5IEDXQM!2woax1sZXN??`gKY-&w(?&gwoA};7q?k>E=mrrr)G=^C&peZ&A8=7M$s~ zDcw8_&h$H!Zk`5b`dvylkApM4q|(jv;7q?)>E?lOr(ZJoRh#02A3k0eU+}wM9nw5x z?hZ)}{6VFgr_7mNO6le?bEcP3x_Qo=>5nMgJZR4Ja!NN(nlrtE((!UiMW$C$I^IsH z%=9Ws$KqX8rdLxs?(I}(dJU!H1(ljiucdUnp;DXab(D@*RO&MQQKe&qUytearG5Y| z2N6xnf|2G;ZmMr`qN5>OKHUP#!81vX~Ohpln$5Dl0O;}qu~L#lx|E9D;@p6JJWk89sR#2(|ai${XfF=-bzRR z@5A)IN=N_i$MpV6NBG9JrKA6kVfsr-NB;IwV}mBzH&(Nt2ZhmokOvQ9ds% zmokUxbCnL4GLPvQLho`43ptA&i{c}*w80X#!7?wFx8iapW;)S!@PlvwE114g>2Lt6 zn7&%+Z~$wVzEZE8<@UP>2Ls>n7&!*Z~$AFzE$aP0Na?pUFmQDJD9#x z>2LtMn7&)-Z~%LlzE|mR0Q;D}U+HiF2bg|P>2Lstn0{F4Z~#Y`o~3j+fTK)*S?Y)2 z0A6AGt4fChc#Y|=D;*Bt4W=JcIvl`prk_wcdh1E1pHez{>zhn}OX=vXZ!`V0($QPb zF#W93(OchP`nyU;Z+(yH?<*a>^#i7VsB{bfK4SXEO2+`;6Q*Y?9Rq+*nf{s5F#!0S z>0c-v1As4?eopD=|6eivywcJCFEIV0($W8On4YV2^#44j=PMokzkumqD;@p+8>WA& zboBp!G5tHGqyPV#>EA1T$0dVOjdpmk%iMg!C%fYbO7y}zJLC`QkZ>tKGW{o|!=?Pp z^#3XyF6Dnr|3&F=DZeuPH>Ja+{Lb`0ln$5jC)58@I$X-%OfPb`Sf)6fOabaj#qgTt zRf=H^=W509qUAM;;Z4h;ieZ_mm}2-^)3u7h{agoTmP|sCn~)Cfn%tsnv1W6tVpz1f zO);z*-mVyKP2QmxZcW~)7~I8OV8LCMl1K;3Ii-|sCT(9@F)SLEQ4Dwc9##x@`yNpY zcl*jJh84$his5cwdBxC;D}V)Mt)X`%Sa8jsL^`$Z>MyGruIzlpmemgj!f^QbcCkPV8J!*rF68vh+=4ey%j_I>!TRj zUth)0{`x6~_SauAw7&t0q5Ta63(7jk>Cqu}j2mU*U@s1{;t(bd_2O_V4rAhQFOIO{ z2qup7;z%owV&Z5on$LpL-?Cxi7%z^tTfPJkG|6Nq;&tqVuMQ{Ehkohl4MoQpnxbfm zp{a_d8aiIl@rF)Nbb_H16`g2knxbi^4_q=@)_l!J%P;9%2Awe_}AQCn}T6t(rXT2WhX zYZSHhwpLMFZ|fAb^|s#8DE&Aj0fL zI@s?%Z*2CPwb$%ozo%v$FbnbffMST>2PHcKyF-py-!Y7^9;s zZxnn4`=~RD;xDm~#mf$urHPVnBjA?wdDL3?0x38eCcAIm0%~4xd`wV>DL0eZ_ zO$VtbdCdAMm8*;#|s~o`q=1s?-32_iaz(FBrWK6rAaY z%=BY#YR>5>#=f5@hOuw9WJfUG`qZF|eX2%_2NNV7AVYtHD4e^8v!mztV0ItLn@ z(FLSqXM{gpb&<*WUbbhENjoi23?r7WB|CyI&wS%pH29A9w+`4VcoajEe}S>HNjGQn zoukpg_A>t4f!_*srXqfiY)~IRAZ^aTcI(5YRsQIxX{u)?8TgZfrm3EpZkp=PeqZ!e zX{1pzmx{ubDm+|-tjwGhf5WI7Z6p5upAWYD&mZ5me(NcI@zl0{+>HO#v8Wjd(ev;Q z1g#&hR{!o;)C_v)VR#Slra$+s|Bzs2jJ$o)tM z`+bP!t$ir2kP}RPp#qkD<`*MJPe(t9dKC@t*U^ zm=#s`*lr9AB^0T_Hm-v-iZv>9&po8oW!j@o``Mm0<}CG?{*=>4h3eI#BR(*A zr~(ygkjqBR^Gcyel-Uk(Vs@b_WIHsLtxDNpv1~QU4v%H4Q+7lwTZ6JAW7(RN9fd4T z5Av-= ziU(g;nMw^WH0Dqs1zyuF|vtXhJzgv*z0sc-IZIbT6pB7B=;4cd%1DGrNw*^zY z1^!wY?PIF9z~3q(FwKLI1=Br91fZKQ0H!6-ibsQoAZK~dk|^zOwg){enB&1n z3+8&z&K7c>2QOHQ`5tt#V1Wl+ELiA4HwzYd5L~nj4Q;ULmEm#@h7!2K z6)I{TISoaMxDt_gr4xe^_aJtaWA^z|T7L8(xYE~p(4vqz@#{PYo_Q?cK^H1DRl^Mc z!Iinui@{aD$${)p{{dutGc&%`Y3>2h+dSxlUDGO~2j=-oS~_H#mvmxwXmCF=zQ^Yi zhji~t;9d_xL;BIN?_(R^@3iO`dlnBc@j)-nDr8RaAtsjcVz6atCYJGH&`}=t;5U0p zk9g43g0dc%rWT5n0|@G~ycdJsT+xHpw%nBfOnax$>cyZFR`DR{`&AtJWE+fdgjsww2h0L|B>p}3`YdsGF zi~0_j7JNP(>w%Af1;=RU^k@rPl}~vP)Yj7;1dX?m2OVtnH3kUw*W8I_GE(vUxbcW} zE&f3fDq0`K#J!WOiRpp^sKR?sQ|eL+y{ z7ZE&3(5eA#Cn#(Y&)W-%qk(o16ng;eC}{P7cJh=yfMBYJOglSh8%$!Piv!v85DXb~ z^?6!&1?c8MC^C%lVV92%#pO$kbax;-Gz=T`@cG1HW)D3*C`;E#0@ z80-Q5R40KU9t5>9)C2qhPqG;1L2(O)dw{>;NfskKz+Y=4Fw%pdI!1Ybzw1dBqdmCM zf)_pLLiKUUU|8vQ9}MxQK;sLBWBf6KDt^g>po+(OV5*q@_#1%f+Vlty(!r=;yyvve z>NYZ6z5=!0%H(7wdkgw=+zMOSqz2TI+VcE zl=oI<8k4^Dd^%p?s^GER7#IpYqUkrLTNX%T^g_G~3!K``j<<-uRpBH}=H$T;QRE}s;tSdq%vhvh3#zAwweG52G6OpW@p zJe=_WmWOK{$nuC7gIFFeGRpFZ9fM=}N(dT5khjCpQWZ-R7|K8;fME<&1{lsj6@U>8 zR0SBxKsA6-3{(dg%|H!+7a6DtFvf$zrKl!}yu^tq>sU@qVUsyAr5(qKDQ*fUro5?~ zm;#UI#FTgfC#J{~IWc8UV}xp#+I2dJY0LDoi&K9~EY$@kw3LCa0LvKY2C$rgFhC{) z-2qlG&;wv413dv&G0+QOH3JcVH4O9ySj#{kfOQP?1z68OKY$Gk^at3;zyN?v3=9O= z%)lUkEeu2fwlXjnU>gHN0JbwQ6krDf!vJyD1!T9iy2d%9OJM2Ll0+$SBmAjFnw)46wp?E{t5r2$e&Xwgs zFcvuKff=RJodFMmX~ioZbg>10)dLg#=+C8i5X{70_aK-Hyx~E_?&FvT!Sw662WI+} z7&+m=0K3Ua4+dFq%7eicyy?ME3*PczxCL)}5R5oZdobEsobkX+x#-VUdJr^*cRUCh z!@C{?jp02Hg2wQ^2SH=_z=NPMeCPoh1GT}AJP5Ab#~uV%?h_A!E0^s-aOFPrAh>d$ zc@SK=&pimP+!r1MSMEy>f-85e59t2k| z&x7E~<$DlZxdIP@EBCbrzaUuCvuyxXZT((TCg|fs%|fXeQw1X{`iL0Bz;FoCHe%MQ zg$2Z+9)#*5Kg{P7>k^=6(An0XA>Eh`X$F1gH!Xb&f0OcaZ$aPUdYCMN;mjAL9g5+v z9^R?gG-7uthQE7ww_-Dhl~fGtI`=4sg`Im9!^+Nmip?Q*zhZNVJ)qb;Vh<`dpV&i+ zEg)7(v4xk6tX0gH;3rdWidKy~vX)kdSwx2}qZqzh@~~p~ZpkBx;WgN@iY+BpPBDDC zq`YEy=C}e_;I29=9nTzhVR~1mo5i)0m`8SV$gF*RwFkW^?3gvfW2)WRUV1v&E|=|C zPkJw=N0h#i^xjPGqx8+B_houNr$Cqt8j`3iqjVCWTFqE25!U=equ>zfhqe=G2IPaa~=s4rRf^w!P z9d87rGJU+#aqDmb(&FpcTcm5w(8W-xuG z(y`1si|MnKK8N%GPG2$1WEzeWB9vM!+JbXDA(S1T1Fy5~bsffTc`d zrgZeqFo$CM72a-8WWln$42lIf?E4wv#K)8A4$T*})_Kdp4Qlru~}t8}=O zcbNXJ(&19xWBU6_hfDc@=^rW`F6ASpf2?%4luwwRt#tE}5z{|YI$X-SK8{-cl zZ9-ruQi}1ijF)4)0^_|rr`1xV&1}nr*FC6Ntb(#h%mpBhtS9a<`!` zW-|Rpp%-MKE&c=+EO{oB54JbU{}=aT$WzEMGxWN+AK$GDDTcXZqGA|96?V+-?*Inb zmpNwlcMx-{%N?_J2QkOF!m+?ElUNbQ0z1q(uXN1V<&4L1uaay69#6d5F|%#X1dN=o zam;Qz5p%?%iea8oOfhVGtz>B^-*t}JW29l;UEDEyjC9m#3CFD6WK1fqcg)&N!5sSr z$);i+b)#Y#mz*C}TYME=Ruf|C#~EU1x~mR@Wq_L>?EaNX)ib`(oQbp^{! zN1J?9F|^%!j+rv&PD1(WJ7&t9I~SkYd`vN%@8gcyZRcYtsexm5+xckYPbh{L#TqIG z*YTue3*erfa?BoM0j}@Uj@e@@#&TpM$E@8FoNr^r5C)n!X1CppV>~0-7PQl*j@kWf zLHU|FX1Cpnx_?%(ZK%KIieY)Fg<@#C&q-$bOiRVEZ7auYS+=9@TML#q4nE>}$4vS1 z((&cEHj3ezw^i&Au@@9W8&8sK60UDM#Sk9bD~5CHAlYPm>b0X})3I#XNii%lc9v`o z{Bsw@@DgEH$>uI3*3B_fS9x>cPs5JcdYOxM&|NXKp&pXW$F=OK7?u=!Nwx@e8c_@j zTD>L9fM4sQ80xvNWQ$?fPqO8x)BcK~oeoe8ZE~PwtKq{2NwyY#H>w!?)nLgspsfvY z%+~29)XPxEY@KdG{}?9O4wPlMWV>+O5t1E7{f(6D$gE2a5vnI%?S=>~;vOQ5l84Dc z$QX&hs!=rvJ^D^6v@&sY)DlM z-Fm!YIK~9UaMxm@Wa%h#nqp{L>58G-Op^igSD?%@6+^wua?D4vQ@a2`xHZ8-7neN`NR$=hERP_ zvCYH|NwyKkJuKO#g~X01hT~>Qwi&~-ql#hp__AW~8?Pt^fAy+lTW~w;HOY427_Uoq z0B!dT$87sM03UnIG27M-V%y`6S-XRWh@EiE+8x3W`lMp;VW$*B8+y|*yT3zde{VS! z><=;JZOIN#Cw5w~ImFH=h9T-%$Lui;OpLV%x;^7^LSq|^sNsZ zv-``+q?MKr!Q4tq1xn+ogy>1!f1n3FlES@hM{LI#jpxp+n0;JF@kikiuf4g3m9MIIr(v< zQ9tJW&XN~W(BYP7m_bKb%C=gLv|0bcv$7Xb(l4Y;CX-BN^0zYCbs;sKOcE-_%6A#k z!Ae^N&uQ9=H1=+;{a54RS1Tz7-&0w#i5O#4k!*Ylv8s|yg#W0f7<^uJ$;P8U)ldxA zpr&FIh}Dv8BI03f#dZ*@qZoWjUB%#QA5{!P+Iot?f7F+3Jbce%iXqNDu9%tjDwa-m zPbh}zdqc$#OP^E>{rD-x5L=#B4Dq#*V(8nA6@#B?q8OHEo>6Qjv8IZ_zco_~KIK`- zCg9wfD~7n)LNScno>L5Cpq7fkPq$JGQ@+-UVJYi*#Sp*RD2905Rxz~k7Zk&oDoHW4 z@pg)#jki|}YPo|2`ZZTC_PZ9AeE+G20T(C+#uhWOT3F)R`FQw*-NzhvVPqXtNphB5U( z#V{@zB-wb_MHRzXZ?IyBwL=s`J07YS+VL>O&=!X)hIThXF|@IfilL2-QVeZuv|?yu zFDiyMHbybDotG5DSb3~u6A%xQ6~i?jrx>npiezbMv#E;VxZ@?8u;7v*z2 z@a7`YL4AGiIX$FWiMSbl;oZbi80*lk3Tc`G8qzcsG*QzDpoKM^2zr^OX`q*DItla& zO{ahs(R3>4m6}cmy-L#=pjT@;6Z9HQXMq;gbT())Nx$B1>g-xcze!mL+v^mavKq9w zqDv2hmQZwEI_UL^Zl4Q!gQVZ4YzDni(Rt%RZ&GxbIpdoZ-M${Swh1L3l3djZE9c zU2H1rJ&MvjW}^2hO5L95eUhT%6TM&3iw8}OKOkw&ge|arP|}P0O`mv3Qrv?k+ftHV zJg^kBw4^!H#(|cRG?#A85Peuu+`u6Eh@`o6tAl7+MVFZCTTaq~G}F$@OPWJBRA~-It4NwNa~fz>N%JNh0Ieoz{>~Mk)g{eaV`{R7 zq&bsKJ=B!+;-OX8LoG>jW|{U_ThT3RVOvMiyv1e@btS!c*j%?qCC%SuJX}3VbEcUV zRbSG)HKs*9Ch5h)<_bM7X?~ii^#+>mLV2G6HIrjJT$3{o)0T#k9l)~Dla587rhsv& z@kZqewXY$o$+XMpaKQAIFKEx zRFU$}xqMQnQYFf_WckXJZ^iOeDBqgpt5W`Xmaj(nHZD*5uTJ^4E>HWfLHQS0z9!|9 zV)@DyDBq6dQNH#pkMeb3d6cgs%cFdqSRUo;?DEm>h}txH@t~IlT|MYyK{pTjSrGOB z&ot9Mx_dCpf*u}>w4kR4qb=y=!HX6|Jb1~1-X4s#ppOU17WDOCoCWu<2!?1$vlGcER?_T5GK!QmJCTgy zB+X7FqbNzU6TuK8X?7wRMM#>RNJjCIW+$FuJ?q=;`@i0mNqCIJs}6s=6xJ_!j1K;7 z2EG6{7A)vg$xe5J;Bg)VgWwbo7TF7v>OqDD;~g+p3NeuGl{xmaaV!)8Y4YHhwWIh) zlLyD5b?wg59k50e_-N+fm|4IiFxi8~cB?5KG_zo;2Td)Q=0Ot+rhCxdf*Bq>Zoy0s z8d)&Q0aLbI3TJdf%rSGKxfIN3A|V(;8Ql!o_&|=4;4eW_6alq`XVB7{WS}Iu1c%1Aq$)=gPgkZV5 z(B?A*E6Bw3Z-ropRdhE@u$+mQ*Q^pOcMDbmRy!75Yzw@`gC!QM^l`q3ma`9w zTk9p8fyJH;j@f#giiQ7;l5NET$|lJu+|x}k!4T}}CYWFd^>h`>(zl;6$rh;w^fJ}FcMac(cm zBhKw(dBnN>ERQ&MfaR-D{vgXE&K+WT#Nop%kMbRH`Rq^?lrM|rQNE)tpA@Q!^1bZx z=DtBi43O#On1Gcmd{w~87QQB66$@V%u&RY`2w2U+V**yU@VJ0AEIc7#O$$$Yh?z^p z3YMOdG&rX>B@IsMEl0CMy?WA_zwPo#iQS_Br#%RDA4d5zKA+fkNSMG`2TWhOkb(uf zcN9a|eOEE`k@pmXdw5?lxRwtT!y?{?iXn)6q!63U(Z%-53x@bgMa)? zG5F=r6@#DnLa`&nzEli1NzX}^3ZL+mVi;1KS8O7&3yPubUQ`V0O*x8TZ7EkV3@P#y zLmbLi3=7KzieYB(wPLf0eWTbsV&5u;IP@>Yux|F9VpzfZw_;dq{$4SRcmAUo;^YsC zp`HGy7~1JiilLqUtQgwqe-%Sm{GVcIyT2%gw)?AM7)Ji47~1piilIIK;h2d@7g7;s z|5OZZ{4d9Bzf9dp>~F`+cZDtP5%7F_h+ssK|&{f3i_JHf5q|kX_@PDNj?EyEMqM%=2 z^-qP)04?llrEI#8LgmEuzQ!x|P;?L~WU8&qqW=`P&}OzA#k^?CvH3zOi8#G$|EW-w zphsNi6?+4F>jg6>Deke|)mBr%IN1_jvBje!tnnqdUWv3B6+hV)?*=d0L(!IKqc?hN zs~(sxq&e%%OO8n@U0sygo>>g|H109UP5zK2%+)rBOkII%nwoA~*v;OAl`54QL~tQ) z@w%;`puBWGw|d2H87OAYxE8l5o%Tr=pIQ@Lf7HkAUbhuYI+c$~24{MQ7wutpKuJMU zyHhE2eW~inXt|;ogl){rQq#_iR z_Slp(b-KUAWt1|*Tq1Qu0HtO_uk%-7V?CwW{D1TS27Ylq)Jc#~!DW$M!hz#m>pV*;V$sEhOoyOgV9G zRlI07o{#!U*>@pjo!xm=uiHY-GkZp9s(Hn3xe&!qIcoNd)35GzdlD1{Fy^V@vE5;Y zaYYy%)KtnsD#3+RRC6t*&^FXC(M@XqQ=tyDpOiXES%iY6V1!lIE4DtCnub6f4E6D- z7j5yDm_k6Q=M{TCi)}ls@3Gxrsp%T1_s5h%8&F3@)ja-xDyY;3Ua@6c=DILk$rE0* zhccqsVZ(nYaBLWcJ^4?C+!F>4PkF^&zh$OUsoT?)M^T>kx-H6b(>%#{L2TqjTN%r3 zuxsqG-6!ycpjY6;n|R%Bw!(&|XFRrt0`?BJ=|4nNW8l}DdC^u0Ib9M_`_KNL3JTF& zDKu=L5f09(g;#7jsO*Rj_M$!KMO$_fH_$dMJ+>vFCOel3K}svH*u9ZLWup#;LbUdx z-5Z@RyzuiL+X^I%hIt`nr!8R{uiK-M!w4c+Tdx$RAXp*KbdMJVtY~49fR!w4Ctzg@ z+Y4C5!VUsfwXmar)hz5JV08;S3s}R#E&|rHu&al5Hfw1&NrQ6=OB$S1cS(b@>LF=x zT0JEV&a0QC!HGpA4bH5$q`|56ku*5BzJgW?E>}NEgLCUIX>e`>Bn{4OprpaM4RSO) zvDd&Z)XbtDgu=)Vj^(=yrTh?|Pwd(yN?@o5p#hlo4~yjocBB08SU%j3@*`Y6DKXry z5`mE%RKDamu<~F(4!jWeIB=9Z27TfeXEEC4&GaVcz^>f%nS@^yICtR|JL?%EaL(#= zb~*7SfpZs5&)tdX{8*3CxoLSf=kSb+hcoQ@ZL$-yL#DdN#q#}8-6<|_=4_`AgQYr_ z9qNbt_*lLV@)KCTE9ED~^8Juci{*PFpYHRC-MaK8Fv)?W!hI~6>$I4Hw5&+(`R*@B}K+ntaU8i>N~aC!Q;Kk_?WKDanwyBwpcM1FTHKM-DP zPb}Xb`MoY5>;r6{W3&(C_s8;mkU!w^(ZY1Mioih!s22^V{GnLBKk|oNJ~#;25y$8t z$Y;g!eULxu^3fvpATK*$cGBkzMmVns){j^y@+w&H9LsA?&kl7RME0-8^4;LG-(Y!M zqGK*^++{bq5Y&6=TQ9)DE>Ad<>`)j^=4342b0pAswAm!hR%yL|L_+w{&jkR9qXgbdEQd{U?{y4O1{pB?Ip9lq=HiG2sa_q^vpsP72M zzwh$Vuk8^&a3DLeUj$y^LkFnG4gmPb0lL7ws6swQKB$mSyp}j{APSW2L1sySHS8P<_TEC!h8X1T3Fy=aQnlQ{%c8tbNWWo z;H18lG&rk&NgABicajF@^>0ao6Z>A$;LQFbX>e*kNE)2mkAhaJV9)p`NrQ9yS<>L# z{wry4ZvT@sIJaLU4bJUXNrQ9yP14}pewQ>jw?8Be&h1Y@D+lNHm!!eD{q1N{Vow^@ z(2F-!s5b^rqfT4xdS)mx6X}2-XZ$SVkF0g}^uh_!{^_Q#7mcHRKL!>&{P4Ka@nyaS zOn*Y@c!8-Q)1Op2KBM&%)1Ov4ym=$0H+FjTxc$6g6DB_6L=zsqrZ;>;k)}*G*C@C#H8+Ivxe@!t}06$2YXPF+Hqwe3q{}(|af#pXKYx z^j=EeKzfAfy_Js7^7UbQU!~)-eEpc7EcFaD?r}^{Q92rTD$~a+9gTYe(lMqxv5Yx?x;Ck9THt;hC3t$ z#hFSsU$SKSY^9^i%whUmrK8KtWBPohn=e^1eWB9Lmn@l{p>*>lOQtVzdUS{Ve(F*W zc3B6r%v*;dzaVYKJmhiL#k}IZNXNY95_F9Fn0~*~(J>xi`h!ll4Pyy9#zRam<#gLH zmY`#lW_lT=qhmbG^hcDAj!~BB<&?gS^zuxvq;!1Tt}@fBC>^hQRb_fLrQ>^))tO#H z>G&RHO{UjUI=)9)o9T6wj_*;{W%{E^$M-1fF}=Rjmzt=@^v9KMq8`(qP`ZhFOn*}8 zCh9T$X{DQ}$MnWZhhu2M^kHVE<{mWAH?*U97==A8l6d6by#Ke(Kw9aSgLDEMteYDaK zUosL^+vFqBeQ`#jP~=5+$T8xOU+uv?u$Kh;dMWz&Shh{F)R&py&-4_fo8Zs%@k%$r zpXn2oZh}A4rzm|Ym2WE3r#U@(+6JEKOq}UNdkvPEFw6AWN;hGa>GPFt!YI=hD&2%p zre`SKgi)q1Q93%{Ql>9cIy&HTre`W09dHHHS1KJHa23;6D;*th4b#^u9UX8T)7L8< z9dHBFH#$8!zz!2Od2q^t%^tjM!4?PXr{gzM6W!`i^o+g4+W>-@)pjSEFQ=cvV=Ox) zN+Yz>q3BtAm|YIoma%0H8SR#A8N%@%u;5U8m5y+{kLmlBj&OW{=?9gLaD0gAhn0?S ze1z#)N=H{c%Ji3|z8qck6{f$cbad6%nEtxdm*GL-Hyn$;Yb)-U1E%7>+Ka~~jtlnn za(vR_1XxgUCzXz`Vx00ieb5={U`_0-vPGADhuOaCZRtbIjK9zL2cFY{9MZ8d=5lo5 zkC^_k($R%K@p>qdjdW19ADnIUS(@n5iT~(9YYTqzppOMVJ7C+{a{Ot4|AGZo^NZ7? zEo}Y%>Om{p*njiZH29=~xPf#9q|IJJky?z`XM6#!2{wd@CW4zF&*m18wIyml?j9<%mamH_Eyd>ifFV8yk61^?qSfrWb|(h{_lOVubOsBWZN%$jpKuBT=iXkXKgNNyIazvZ z%A3;h6TX^`2Neb>wt`qxv6aLID~8t|hA6h0*igl=?mSGfwZw)iwvN~c#nuxWsTdyB z7^N5<&m657p3QhsF+{L2iftkGl44tlja3X!+9WH6r&`A;hDUT$6x&HGRk2;f#w)g) z*aXG!xcWrJ_7Y1|3~eV}F+4ssNihsGCo6_eSx!+5_r|9xhKFIMDTYVErYnY5pJphA z2exKPHY1tXEXBqVo2^(1u{nyR5}T_S9xLl3lzi9WT9esT5OSGxM7!} z7@p=_tk@J{OB9<*Y^h??h%HkLfqc1Qcm^y}F+2pZLa|xIRw_1|*eb;^%37@$Mj2}q z!=wFc6`N0Noni}!tyc`M0Blff5wVSmUGmH2m1~UlvG2h+V;{Y}r4EC)4>l{dgxD6v z@Cfc!#W0xNrWoE**sd5{>JG)=Qg!KLm|3@&xAVsNSZ6oX6MuNYkF z0ma}_4=M(idPp(2)WeFwr5;fXE;UOrxYVPHVGjQ?STNrB4(T8+f6w@Dj3;c4*{}X6 zX1^WjU_Zwhf0OY)Jf~M9ekFUvViQ&Kcc7~m5-fKy+;PaU=nFO+Cpus^+=UGb3zmBb zeeg2DF78JRxLmND8Mu&FI2P?{4{)Ue<^VZsu(PWiiw3W)UhRN2G9L-QMzS?1Sy9J+ zM#RreL*yvtnAtXO5ib9=l4ZebUME=oLU{1vk}X5zC?VM@M4jseD@cL&y1_A9mi6%J zH#%m@lDivS^d`abQsFUfmTU&P<1K>a&qO4;Rj`5yXvVimwhj^ccEK(lL|N_-EN2=b z@126>ZbpQ;OR&6jl=*JK@)x2DloYIBKgxWMU^#o>!S59;_b9sAeS+mLK$N&&vNdoG z4+xe!1<~n2!Sd7Kg&&eE6RxY2W9E9~n6KQH7A$uOym}eO>^0hhI(=BMyeSwNJR(?u zd5XWRU>CCxdCLiwGZ7<~@{&zKT~!b)cMj^lqGX#8#VQGwXC4i#EZJhX!YYnMTiTvh z)d6#2`3q6FYL1yo$zO!{P~96Jq$|g5|72t7stEVeIS) z!SZ&XAPoh}AD4B>`D@J!K8BZ#JBB|g4wE+taq}t3R$=({v|#zW(4iX%R@wl|AdTfy>Yz)8L!SivGV#3aG;&0j8QCs^(j z)Iod4qNV6s6X@W8Y4rJ07t-85GBiUEXwz z-@8gS5A(Bbg5^wwM+-Y<_LsK`bDi#jUCcrU>>*fA79wR&!7lEHXYM6f?k-e(M6!8^ zioFHP+l_|SN3fh3nAh}`Yz4ewKf&^rV4l=pu>4tY1_K;3^^(64-g=;5xm)3c200c@ zvJN8ZfUV@67(NV^Yzi*g5XbBRreF{=)G@oQSy&h*Sl&F?4HxX zdC(le@+P1K%$005*gVPBAr{Pc%(T$FeHh0taLk-<{y4OXg_0e{9BPqdbI?LF1S?2J z`4&qy4aZ#~SWY@F#!|^9W7}nt&BnlWxnOzb6}C*l@>ikdt#B+_+4|L$4g@U^m9k2* zqiDvf1yA6WnEIx3lF+r6IO|GMP*kqcU zM61U=CfMi>6D@D+V3Py34)(&oZ5Avy8G&z$V0qIqXxl2;tPRArNtT61x?QmRap*8R z1S?2KL)$6YV$8U9NwyTOb+=@h7>Mi<>|z!I{a(TH*5VrN6Rcn&j=Nv748)rQg5{=S zA>yE57Z2h*4hfc%it{}z*)|;ah-BLlBeNVcoh^4hW@|?sbHV>*2h0V^OPfwcuSm8C zt@~BM^5+~T_L^V?@>FA$dNH!Cp`%B4oV7PHku-t_h#D68(QZ&W$ zlC4}%?1E(G?_*pPEN>>tmm}E%1jt;;j$mAyCs_U}lsR89^v?pvqV4RJ{n`OrDT{G{ zZv@MkijMfLV7Uk31pg&i&P=RqekWL78k*R@C7TUr^u1vD3$VZc2v(4RX!e6-J8)%x zl&0jew;#jnmtVyK))BwLLxURJWbXu0Ji zGatq&FImPuva8^jIhTuB2!0g>%Spx5u##jGFn6yknOQ-tq8P@uRVAB-W%+87&4+uf zE}2d- zvx*^bHh0VvIByNQY757rYwQ7@bHE;8Et*|R#c(BBIc9gZ0RgAAV|Lq(7<4}Gn6=vm zyEcwRtJ$$sTLh74`-)>y79*$YNEJW*` zjzt^Tit6Qn*|5NT&od&~a*VHfOO}agLLbM>0dmJ-qTScC!W859FsW zB+uC&%srVS^o#p3HW=iXDOk=#>^$n2Ibe?I)Pn`Pn1$vrM6jF*xPn6^n+UsMj@e^O z!8m2OVi?bia4g!GPT-Q^ywdH($;wRY!(`u$&RP7Ue(}#wfsb^@u;(^!9vyd-W43%| zb~)NHYiAtMi;hL>(D7))F%DRxmAi<&B-t9wOU5b&&zUUQ26&Qjl5K`JO_A&n2Arvi zVJOahrQL9`1I8#X z8RNGljzwEpqood*z2_~%7-N}ZcEfb^+U1T}yZ_hRUB_Ed{Qm>L91aq;v`8qTqNsF> zn5Za%Ee0rvUK1Cw`=V4z$5to(DlGd`*RSx8ZvoVOQc9vW$h1NKbLiVpfuXUE(CWY1!&J$Sg zKo`j~^6eBvm4?>(W2!qmx4(&ej=i_Yq$eBHYojK^cKXzuz?aVd6nOkg!>D(ggFSCq~I&DvN z=wQkh@SbNMb||majYIiUW}ofMc7lKZb0|-FyLiy-vLK%q?9d_GK-veCC`3qgddwU^ zVLaCZDDKwTHv44hCrGpsG2&{vWQ@2lC>7#*`|{EuF8u^wI4c9xot6&@Y#F^7cMK{3 z^#Z$MSYYvHT+~z|qFuIN=5VT`q?n9arxA`8sO-RgZ)OXoAg70fp07$s7=q6T33+&C zNSLOa71C@&RY8SK4U_-ms}5(g3?{8xW^F+)cTS954OSx_WlL^eYs;Q{D5LawWV_v5 z+eqifh)$<^jOaOPggAIJux5xuEY=EfsKweL4zpM%#Nig}hB(5Y`F<}@)1iJ?V3d7T zgAhksY#8Dgi;Y4YYq4>N;|!WF{Q`BTO~L{bY=H~C0!_mLd3LiGg*eH+>SFIzmxKkT z*jHT|;#B*p%e+@z9u}BxU)3zc85XYyai+y9L!4#tst{*eY#!q9&FD9;4sq~ijHcIw zIM!l|5T{zaHpJX5IDJ|Yak6g1yyUu&FblaUB+M^b2ecg%pF0EEhHIv~Lqdf+goFdT zKcMZnz4LHLxE4%8!qD`1NEiv84hgf8=R?BvUDuFsH==t;n6>o`$zFGagv*Y;Az{?( z9};f43=9d^KSM&o)&^<-f&9 z!2&TNz^Mqgp~(t5OuCqsH;{JV_KPWJp%7=hONThm?!8Qewq)55=i8DeJCw@Lw>v85P%1y)zWkIBm)Mt=j}i5(5F;A7 zVuW^^l|o!*_kL=Gw&ZCcF1LHH93%FAdW_h6l?d%N&j@ja-TRpl+LC95xYAj?Fj8Q z>%@p{){PO{tQTT8+jG{B5q(mF7;%^lW5i)Lif|id5shO+?{z_psArQHQO^rQ>~34W zX^g1SMKPjE7e{DY>5>?+_e*2M-Y*NWhu!<-F=Fq{V#MCBh|uo+N{9B;-qyno5Ld;B zy*GDg&-ZOT?cT4B5qrNTM(n*sgm&-O#)xBY86)=ID#TuP@7G0Ww|TuoIig%wgd4c;E&B8zu8ltb@h@lGHvlkE>~R@&Bo8)ma@A{}70ZKMOO-WBN}t9M75YqedZ zgKZt!LopGNLzuo5li+(|#4WlG4wLRO=eXB_zH}R=O7}T*Gm~sW4|&=B4&-Gs?H(V9 z5qo^lVbVul`j7*Csomql4wJr8>JdUefsPL3WwY%bAB_=vOdKYIz&63Q9(Hu<<1l$$ zO7(RhrFz;n?iVB4xWB{XZF%Vc2l`Um#seKD??|aZgm(pU30njPJCN=4wN)4rBdRde zVe+xObeIEusjb3rhsh^WY6M}kz(_(@fl-8R0;3(+4V#N1^mAhzx^s7|g9Cbo6wPxW8=koh8=mAa=`SyvOc)?Ag)mTHDnZZ0X%1w=v+ahb zJ9KBy48m~P&P>7xfmwu+0<#ID1m+M%3(O^q5tv69D=?ohPGA9Hyud=j1c60_i2{oq zNZ^*)z%6l@L+2$Kbt6Q&5PAWRilNth$ zhLhkQ?tfik{!egEw`!_I)%GSS)^H!Q%xes+CCnCBN0=k9o-kKn17V)PM#6l77YPdl zULq_Oc$u(7;1$9OfmaDD1zsbp5_p}U9pxJY?I_uD>u z#bNTEylgAseSvKb4>tnuFgFGzY&YXhQu!&>;Ru_)HFEKS7)IC&K4a;%5i;uK{e!*(Nj7Ut*T2 z>8~-%-1LBBIrJ6w8sfJYG3EX}#8tNBA2FijpCPWcB@f1kl7EG`#FqR!MwI*~#HF_6 zzcHfZe<9AZCA0p~$+jHkylp61AjG-0WGY6KEEwW^TQVIZN)`%nnJsx#j3`++#O1bR zkr+|3XoySg)myO`aXor;jF^HP<1qPB66aV4(ilta?1tYR~@;?XVirmMKveQb0{Q{>FeiAs1@UuW=!Y=}+ z6Mhw_Lcm8COmdt-_)XwU!tVlS5j1_O68?}9XA}MuIEQdhpc>&XfpZC3kMjsxkMjvy zkLm=iM-9RkveBA^9Rjro(*l-6BmwC9~c+;Vb zF6HJ!+1|ei*;LQo9c>-*Jad~3J=krBGH&hM9`cf{ayWOyEcg5GJcMnR*(PGG$z6vs zj`Hq9*fv%BkjTLoE`IAd+_&1Y$}KreDDyq z8+kb7~$ ztF`pghcb5g%%O~pJR7jN-!Dh`yklFzZC&*!UvO+I2)6akaV({~YjnCemeOF|9`cOvcF%g?^qkYC6 z$|yZ9iljV64Yg5b*xvy?yLCms|g%RsU7KLnj4!g_6A)`w{1($@3v<5GAoct%#iDiT= z)83}UatF54*@`|CFI*AuwrDg<0MhFnR^cFNWMjkL;y@&1omwe%W!7mO8vb_*Yu= zRl+|4uQ`xfA`j7`uLq3x>;=n>kFpr}JyD0z-rOAD@dl5UjwCksxNpZ{dnX=8i;f`=;*i z;fhse*K&L1k6^{N-sTnE?WX?Z3Z21px2NqvuzdsUR2+rb^|n5h+`&{b)vz0`%ms)lY)y@KiigyrC&x!aYqA`4Ck}2L}tBYSx#^JiX97Esdx4%{JLO zzQ0l?GW=?JS(xTaB`j;jtJBSASKaGyL6G%z4nEdf(^+RRd~vN73D%D)~A1a8%>S@NVY?k>M;f1$Iav{bVxp^U&q4s3(u=kzzPx;U}{#x8NDH5+K`(#Y`VUoL~`g-|mrOP1Vb zieHg=dWU&>rF)wEE?IC5;b`elS`rEgv;v?RlcNBs?CSuUWH+$1X4Q>^!t(N)2t@^M zCKM641z>kjOyE|Q(7?AQXy9)n93wBeop7wc9RR!0;|v^j;BW8?2mTVKd^>Zv!9NqX zL*Ev-llwSccG||(;$VTwrm@>*o}OWz-sPTdFL1VbdbfM(K6%~_fGQs>aIRV3-mO1a zps{&+Pv&V8^R$C|niN1znZLaT(5T$!Rvs*HyD6KUd3w5edVl6=74!6g%+sc3I}hTi zZl|MLW%I9+x#%|E#e|`j_DbB`LqD zC!>Ocj6D?>1U?-V#7X^3ToCwdR1jzSb8$i7^HISe#$JdE0&|GSnyr%zbqNVyhUgX& zem|r~NK*~<3Tc|5J|RsvG{BMl!0FZ*h6aT+)6h^y_OqQ^XBisqNM1PG(CCoxwUO~5 z;c8}5NVxAYEhJpA&k6}c_?(dNDU^93VFs`uB)l!XC?tF)dRa(I4Xp|ZUpZVC6239> zVo3P9%Bvyadl+wqgpa7d8xlTp{Xsz6x)}N-Bz*g0TS)kb`sX3xBWPcRgqh8*knp*c zeIa2k@qI}6%@~YW^7`GV!k%@t1i10ov0# zmHi)+FAt2@8V1d)jh6}ob-0KyAXK0(A(T1nLqx3)CY#AyA+2 zlt2T*GXf0>&j~aF*c?1bLfM#5PT&GUae*cd4i>o6G|z?ZX`-{+ri5Q4&o2V_*>N#J zv*QwiX2+!j&5p|mnjM!DG&`CRG&`;!Xm(sl(CoO1pxM!!&_B7-5k>XToBE#|cXWo**n0 zc#^P8;3>j#fu{*81fC(R6nK`fO5i!dYJukoYYZHAT&(dj$Hj|HZXDUT_yYH_R(6_0 zSSQehuwI}mVS_+7!bXAagck*R5MC1KNqAYH7vU9w-h@{L`Vd|d=u3EApdaB4f&PRy z1qKk_5*SE$TVN339f4fJy8?p=?+FYcye}}6ut{JT;RAu;gbxKq5IzzZN%&Y`6yXzr z(S*$cV+dOW#uBy)j3aCl81F#)3S8+-2+jUbV^lf#rm!1y&HA5m-rhR$vw3If2!L=LOafUJzJI z$Prja=pwM5&=p|*1Sdc<;U%u@CZ%5{bQgGq&_m!=LQjF$2)zVeC-erGcMbr$$G5n$ zkCc9!&{yCcLO+3b3H=4$BMcCDpD+-R%H9OfJ$}fQgQWCFgj|7-34;YbAq)}NOc*M# zg)j_|%H9glJ#Od9;Zpij!U%!S2qWd?pL;Lg;Z`0n>#|SSLcah;egYQEdk!S3O&_?33LO;Unp_*F}Sq1n$#W7e`Ki2azJwMCy zMxHnJyou)*dfvkGmY(0~d5-6Qd7f1uQ_q4})_NB9yte1{JRjtFuIJ-D&+~ke=bJqL z*YliIrat4bto6zB`~%N-c>cHNSp_rOIUUQoopU{J?s-ekpYc4$^9i0$^!ydi-|&1h z-F(A6ZR%jJ1Wd|i?a$4{-O>UvV)~ql5qC@r#)x~S=@@b97K#z~O^=EZcTNk(hJuXJvNj*MB+)F(nM%+z3F-F`^Jt;=q zQ7s-Lu9ix~h%1efF|IRMDn|U6Md=vv8zf~S9GqjYY>c?0dvc8E9m~at3!+nE#C_fJ zG2&XYLX5cBtQaHi?pBHs_jgZ?5g#r&Ek?XYSvf|$V{>|pcn`8ljCd3Bj2Q7g%$YIb zZOF5LbucKUvL|5K^$(uUrkkG=!LoPW4aJY9EQ)co!NoC-F}Nhgu?CmMIL_d*7{?!W zAgeW$1KE{FJdiDq_cOuld_{~C4X%t4^jF>5`i4k*!wK3uiq;)Z3F0ejE z%o#Ssh-?0hF`{dHF-CNaFU5$i@#PrNHNFxfy2e*yMA!IQjOZF)j}cwt8!@75d^1LL zjc>(>uJP>{(KWskBf7?SV?@{ZUX17(-;WVpYlgv{1Ljj$Ae|>G#xS0)a20^aqcED;@s^NBhKB&V#K-I zIYykjkH?7Lc6%a5oM=zRh!gFp7;&OK9pfa^jL!gVvzRx9;{rIpo{JIZ*Yh#r{CXiq zoL@OH;{56oBhIg`G2;B{79-BD?lI#0>JcN(ubwgD{OT1W&ad7v;{56pBhIhBF)lLA z*bk`9*gr0S(`rDBIIRZ8h|_9Nj5w`wW5j7SI7XaSLto>@+RssPi@f{OpKzE`%QFogF-^@lN-=mIAsS1^d@RBBqWUGLmee|NF9bbkXA&`INVXvO3I9IAZ5@| zjtuBc^e&?UdaJvk(IKG|850t^kg<-E(@oe6jB{W=DX@RM{bQ)(i8i(qFfp7!vyFug zWg^L5UX5Ri*>4`v1`IEqMACAY5KnfPRFWf~;=msHo9GgzhJ+4bnxjPD#+vRxUWUPR z21)maY4uEpNj+0B1G5~+3vn?q+fj0l)M<_bi3a-cxglWym`9RR0TG%{v&{fn;3&CQ zw!YAT+__nVUUm^o&$`82Z?`eXY-34Cm`5%R37NMnBqa9ofL_lrv?3&24y_Cc7elK^ z+L*ZVSRLa8Q}s1KTXl0MrifYAKJ6$hs~7RSsOQBzuj_d|&l`B&*z*fKztHoWJipoV ziJs5!e4*z%JpaY>Up@cL^S?YlrD*1OD`HvOp`qs&dfwFY9M4yJzSi?io`2|hx>#nv zg|MvqE$sO*o|o{vq~~QkFY9?-&+B{M$ny(5ztZ!Tp5N+uThH@6-{}0Xqe`82rQD6l z<|aeinVvlOhg0Vg^S}4I59a=;x2td6u1pI5?s?YHnI^1@WliA*p5Ns8EuMGs{7KJ; zcs|5;mHWhqn;m^)M3>VqM%?V^A0uvd42TgoI|jyxfoV{T=wfqY#H4C) zjF>+Ri4pg*hsKDT*~4NSW^j0n!wrszafHEBiZB_F_uk<5tGlUF=7ffEk;Zhr^ko^dq#{H zo@d60(SBBpnEuU<5tFSsF=DzkH%45s&5IFNZ1ZEp1ZzQzxMEuvBd*vM#fUp1i(_1D zy0|4k?aDS{Sx1RqJU{69S;uC|SI4p&%{*^=T*hC(vTi@e^Vy!y@qE7L3q4=#`9GeY zb$n*~)v>JgY3+GO&-;45(DQdZ-{JZ1o@bqq*?tQw>v3J@`Qx6y;Q2bw*E>J#Xjb=a zj%HUM@o4t4x2sKVS0>c^Jm2s6LC>>J%p77JEbAfG_52FYTYCP4=Q*D5@cb*!4|tw+ zQf9v=VOjTE-1Cb)&+)vM=e<4e<9T1t2YNop^9i0$^nAAG3qAkV^ZlM5^gOG0=D5;W z*5fMV`LUiK@A-+I7x%oX=VyCf!}FS+*Y>=Q=M6n?f6Mc%(wY61!?NzTyyw+CukLv>&$G&8 zw$m8Pb~|SD#&TwMId}?Ymy=?|>~eC9m|aeZ5wpvwF=BQ(Ek?{Pr^ndyusvwKTBY6f zz%@tMgPI9JydO+hXU2#L>#P_tVVxZ#CaiN}#DsNjjF_;_ixCsn`7vU`x*$eOSQo~K z3G1R5F=1UCBPOg%V#I`XX^fb#E{hQp*5xr`!nz_xOjuXOhzaYe7%^d89U~^JYhuKN zb#088u&#>{6V~-HV#2y1#))Rw+z52DA}s4E^`Ga3%VxYNmbH8_&yVrEgy$taFYS35 z&+B?#&+`VJH}brh=Pf;N?RlQ(Gd-W}`Bu-jd%nx_tdldxdj*zVSLgW@&lh_Br{`Ja zGTSMJW!+BJDH$({W%Xj7*Ymu-=a+ll(({Kr@9251=R-W7>G>?rS9qRPK2y)aSk`(L z@w}MlM|)n+^M;-`^1QL3M6<+j`!?^Lstd_WXX&2YH_B`4G>CdOq6o zJkMu)zN12>-TuU~i+e@&!}js@$Fh%aafE%m`BT~0yzc5Gw<~kHH}brR=dC?o==mbg zH+ufF=l^*=rgCP#S*PnEn*Bb4Wvx#~&pUgbA3Wdh`EQu-f5 zBu3oRxHLxG)3_`~+|#%`M%>eA79;LyToEJgXh

#)x|wEn~zzjaD(@p2l@C;!_^i$B4J1Z-^0ZN8cDD-j2R0M!ffQbBuWR z>6RE*8oV{eRR&wfh&QHgixKZj-yY*ygLlM;55V0SBi^%W6XOQcx3mT7c{&!$u77wW z-EXH~05^K*oz=S?jrff%;*G zhz14AxXXZRk9dgq6`R*x9dNrc&H1)yrt*Ydw!$m zH+kOP^ZPvS==tA^GyBb2o7wLJSk~j}==pP==Xl=7^IXrzcs|baJS=Z9Z?c%Sn(CFw zdOuT#^RTRSsP1_)&s%!_isxCIGTZqL%etMc4>Eoxmes4$%}Il0+f^4a72H3*$4K)( zdeJuVicz|vEms^Pudpl3N_1a${a-85jotl!tweX$?*CeeZms?QwGy{%@4-q0TK^ubyXpl-bVBSk~>d_53Ni`GEMxrVNrJ(XWsf zAn2EbQw05za6y88NjOc=F9{bS+=x@cd=Q*)vp`{jeo43pLBAwil%QV{E=Fi0+c=tV zm%uRuya#G_dn`e}Bzzn}za)G-LBAw?0zp4raUwy#BzzJCFqxgPbO&O$`Lejrw}x9=&P@SO3P=lb!P?Mm^P>Z0+P@AC1P=}z&P?w;|P>-O= zP@ka5(14)H(2$^~aU+68t}#I)cL6~o*My*vyO5xfYf8|_T}05xT};r(T|&^vT}sf% zT}IHzT~5%*H6v)`t{`aSt|VyWt|DmUniDi~R}(aH*AO&vEeIO9YY7^;mIRGlD}qMu zI)X;-dV)so27--TD*Hx&9UIK-pDQ(JHxo2yw-7XFw-PjHtqB^m+Xx!8+X))9I|v%I zI|&-JHUte?TY?7dE`kQ_Zh{7_9YKTEo}fXyhoC|0K+vGwOVFU*N6?^U6EtY|6EtWK z5Hx5H5;SNJ5j1EI6ZCX@grKKeM}kJ~QG!M;A!y_}5j1j-5j1k02^zV_2^zU42pYL3 z2^zVl2pYMk2^zU)2pYL(2^zWQ2pYNP2^zT<2pYK@f<~?jK_l0dppolF(8zTsAaaKt z@oId;5wFz|k9a+}4^4)i1Wkrs1WktC1WkrM1Wks%1Wks11Wkti1Wkqk1Wks41WkrP z1Wkrqf+oXYf+oWdf+oXIf+oW-f+oXof+oWVf+oXAf+oW#f+oXgf+oWlf+oXQf+oW_ zf=z~0_IQByiW9g}&)|s!8#MEi1YYUMTxr9T%AVq_oW_+Ji0K3yh*b6ruka8H?skf4#O}>htO}-kS$F+tl?J1JVUhAz~$CY|^tS9K%v4NmL*+|f{<3)m=9WN2| z?0A`ALzT*Y1)%kNl`Az$uMzabc%7gp#v23;)tdwj)msD&)!PIO)jI?Y)w=`@)q4aD z)%yeu)h2?5>H~s?>O+Et>LY>;Rl)3!3EHK7La^~Fn7x@`&l&S))Cn52tpp9)Hi8Ci zJ3)i?DM5qw89{^gIYG~_F9>>meM!*B?I396z9MMkz9wko@(CKbodk{CE`mmGH$fw} zhoF($OVG&eBWUElA!y{jB_MK#9nNYtDr-vhMbYbycsTox`_N?go}kI_13{DFM}j89 zeu5^$PXtYdp9z`_zYsJTekEu!93W^i{6^4Z_?@81@CQMY;ZK4l!$E>3!(RkVhQA4# z4F3=`8U7_`GWpvjOXXfhNc*wZ+beH1|ZtHNBV zK`TPgpcN%((25ak&{Ek)19W@Ga;1jnID&@fc!GxK1cHX=M1qFrB!Y&gI6=cxf?&gw z$}S1eI+fx|jZA5RMy3owBU6^3kvW;5kts*e$ecp3kx6Bj2WS;4aHR&NBEbg5d?}uw zr_-qfjm&8TjZ9^NM&@*ao=#N=dODp!(9`Kmg2wACg2t;VLF08cLF07}LE}}8pz%7F zpz%77pr_OM1U;Rq6EtWw2pY7S1Pxj(f(ETNL4#I@ph2rk(9@|NK~Jap1dUt+f}Tzd z0UGBbO)Dn zr43aoyP3E0Dz4NRG$&{bt|n*)hWEd)ImZzbrt*qWfRy^Wx;y`7-3y@Q~! zy_2BlVjF^snXdc`{&^+is&^)-8pm}f~LGvJ+pm}gV zLC?hp2zo9)NYHcfA%aHkVS+~P5rRgpBS9ngC_y8a5Hxa~2pYM^2pYN01dZI|1dZGi z1dZI21dZHN1dZI&1dZG?1dZIY1dZHt1dZJD1dZGa1dUt{K_l0NppolJ(8zToXym#R zG;%!%8o8bXja)B+My@wOBiDzZk?Tv)$n_&=-785jbO9&ddr38)KGJ-~KIRTM7?66n+=#$;Bcf%16 zdn>pPO@@^OO@>tjO@`G3O@=iDO@_4uO@?&@O@{RZO@<8wO@@sGO@2Wf}oN6lAw{>LD0y3MbOB7P0+~Y6Et!=2^zUw1dZHof<|r+K_j=9ppn~0(8zs5 z(8zsD(8zs9(8zsH(8&Ej(8&Er(8%p4Xykq(Xykq-Xykq&Xykq+XygtMG;+TYG;+Ta zG;)6sG;)6uG;#+C8o9p+8o9p-8o7T68o7T78oB=n8o8{^=K8_jMbXF=AZX-L1dUul zf<`V)(8v`cXylF}XyghLG;&1<8o8nbja)H;M(${WM(!AbM($XGM(#L*M(%imM(zZH zM(#v{M(!knMy@zPBUgf;kt<2i$dw{! zE}Ni{yPu$udw`&kdyt@!dx)Tsdzhe+dxW5o>qyYZJxb8XB?OIJCxS-qF@i>}GeINw zI6))#1VJPBBtawh6hR~RG(jWx3_&CJEI}jp96=-ZJOPnA?66n&Qx1DK9r3XD0{5ZG zkVDX9=t9tB=t|IJ=tj_F=uXgN=t0nA=tj3Vf1Jer`9 z8$-~@jU{O0#t}4f;|UtM2?UMYM1n>xkD!s8M9|1hCTQfQ5HxaA9oQd|dj%i)pBB&? zE6m5^r-Sr<|4g?!dA5N3ULD~%f!T!T1?CW55SUBI5tv8lA~2uORbT<3o4`VX`3?_0 zR=$YPU0^Yxhrkj-zB!A{OO_IPN{M9z^JO5ESWYnC2m-7i^buG|=qs>_pfz1h=qDxC z5X@JLu+g;y^PM8VI>JDK^@KqJ8wj}q8wrC2UUYDvpgG#Fd*i1AUUKGw_cB3)_X&MB?|p&>Zxca-_W?nJ z_aQ-p_Ypy3^$9^^wV9x?+CtD+Z6#=|wh=T|+X))0PaSBi@DmlEIZL#iKPPA_enHSi z`;wql*+J0b`--3~@HIhC=X`=@#7+V-;;>_1y-UiuJDs;4@z}SE`_LrYP0)kiL(nAK zOVA|SN6_Z^hM-CIEkWDsJAx+J_XJI{9|)RcKN2*__7gP8ej;cS|4h&z{6f&0{z}lS zJ3!E^`;DMk_d7vD{Rcs_?oWbd-9dt8-Cu;8O{7f9{Y}th_=lj$@Gn8ThyMr~xvVYj z-i}7D06`;{B533a60|+i1dUuFf=2Erf<~?|K_gd$pph#|(8v`dXylG2XylF|XylG1 zXrPWKXrN9YXrN9cXrN9aXrPJ{G*Bf78mN+lTO?4W2-?V{3EG5Z2-;$030jYn33_nl z2zvOZ5Huai6Eqzv5HuYs5;Pqu5wxbK5;Pr7BWOBQCg`!8PSA9yLePUdgP`efCPCBT zEP|#(Rf49&*#u38a|qfV)d<>R=MuE0=MgkN&L?PoR3~VD)F5bFY7#U*Y7sO)Y7;a+ z>Jaoqu1nC!)gx%+>Jv0_4G0>!h6IgVBZ5Y*F+n4D0YTfN2|*)wAweV8l%SEjh@g?X zn4pongrJeTl%SEjjG&RboS>0wM$kZANzg!DML?hqJM7h;!(p%W5f6LKxetx~)dY?G zH3W@)3xdY}T7vcsEeRU8Rs@a8bp#E<^#rZQ4Fqkk8wuK?HxV?$ZYF4k-9pd|yOp3B z)|#L-y^Ww5b~`~c><)q+%bf(xur>rexV8k%u)7GFVRsWW!`cxv!`c%x!|owydvqXZ zi``4mn%+myl*=Y)%H2=UzTp9a#^phR=Ep+>&5wr(njeo4v~TE0(8xVX(8whOja(;! zM(#0!My@kKBlkE#BliSB+v7=sM(!zsM($~XM(!DcM($aHM(#O+M(%lnM(zcIMlOe- zk?TUxKy@Q%pt=(@P(275sGbB3R4;-Csy9Ic)rX)ba$kZrazBDLVSj?Q*Z_joV<15f zZV*8aKbN5CFqoj}FodA#FqEL_FpQuz9Zt}67(vi<7)j7$8AZ@^7){WF8$-}^7)#J} z7)Q`_7*Ei2m_X2Um`Kp}$RlWrO(JMbClfS3rVungrV=zirV%tQ(+Qd%GYFa=GYOg> zvj}=3&n9T(<`6V;a|s%`c?6Bze1b-90RfRa?6B9M_$lsc@3tcz_7-vtB|^x)nk=;6Ob7>avJsqA+EdL!^X zuKWWl&EKCQ?3LSVn+RVBd_X8H@FC$(*~UkNg90BD{u20v@VCHb!ao9A2>%LfC1_2z z5wxb;30l)n30l+72wKz630l)H2wKxG30l(~1g+^;1g+`U1g&X4L2J5`pf%k^(3ht?7P(*7PTW*7RqB*7O&G z*7R3`*7N{DYx)~OYx+AuYx)O4Yx*ZaYkH8NHT{dAHT|2QHT{R6HT{>MHT{oZYij;D z$yRfA)xnvO%I?42ooT7;u~=5m^L&!$3q8;JGE=@HmS@T~t9X8n=UF>4%ew4A0M@7tF4XW&1Ip(Q=~JAdC^HNf>M3aHCPZ>d$aAy8Vbpqgvd@ zIN51!!gzr?gb4z52@?hC5%L7;6DA2XAWRl$NSGqfh%i;4F=4vE1%w#_O$ajuE+otn zXiAtZa1mjSz{P~Q0+$fx30z8;FK`)QfxzX2g#yh8iv_MAEETwtuuR}8LdAl1IB8B; zD+%ETL^iw(OU_cGOY=kGPe;lWo{>EhTK8W47rn_3DJh2@o!7e_}@j)_}@*? z__rfy{M!>W{`U|T$-#9XXhPgeSRp0uBWQH93B#qt{e)2h4-i%fJV>Y@IrI==4N9c4 z9|mamHVDhwt>${3^;O2t#j=*K?s*f>n|gkg=Pf*M>3Qzgne8vYvTlE)=LbFi&-1MO zO!-YaGut_cW!=t>JsIDFW%a$Df9Lu4p8x3ie$W5&JZo=e`>$eIxBt55Tj=J;%=Vcw z=;q~5xlNdgpBgO?BYtW$6(fFXv|x<*k-T(__^HuCG2*92kBSjLHCi}E{M2ZX81Yl1 zMPr(NRffS*#KtaM8fK+xG zpxZ0Nl?|lyQG}`jg$bt%6d{}^P?XS6pctXHz|n*{0>=>Q3LHzQCvY6$Y=Pqm)dfx< z)D$?8P)*<@LM?&fgtG)n5Y7=ONjO!Y6yY?1(u67kWe8^qlqH-ia5CY1fpUZz0;f1Q zfWI%d4P8TdN6GUtC{}P_%WTK5L01fD8-5bA5=eu4s#~3CZk$H2xsl4Q?3F&9E9;|D zsq8A=$}_prW`X$|?%v9(T&W3gHbE2M9D*i5HG(FyZxDLyoM_^ge?df!fOdOgsJS7-pgBYrAF^Mf=2Ipuk;OEX`^R;gU?%eGgoSy zZt+&$%9R?Y*51n7xKiVEySMTVuC%9QD*H}vWgD(+E2mFeZ{=NFsb}Kd1PysRuXKB^ z)HCrOZ{@vQsr~VN1nrNr33@u-Pq3$BD*FL|rtO1Vsb}It1P$ZE1P$XO1U(Zw67)=b zl%TOp2pY>y0IkAfT&ZVbXM&!Ij}!Dve1f16eiESDdx|Ty1AdyI9q=;*?SP*p+$qs} z4xrn6o-5nP$``zqIb5kDauiwGLb#RLuJ z5`qSEDFMMe?2uGz35TS+P5C1ml9q8Fnjgyvnjb3&njb3(njfnOnjfnPnjdQjnjdQc zw*6Dt`?0JS13!D7wLjz4u&m{)dp^wbJkJ++zR2^9p1lm3FQP%BAg;noKRk%1fhaJNkT<|QiMtZr3t4B zlp&lZP?k_x;AFz-0_6x*1WqBGAyA%hra%S4SppRaRRt;$&K5Y8aE`!fglYnn3Fiu& zPB>4X3gLW#GYHiM&Lq?jIEzqIpemu3z}WzM-w3IepEImeeh&V!+d0k?{Vqv0f_}T= zT*5JO$#b5A)~P3+HVJY*o@;_sckA45?bjgamse^MbceMF`sJ0{1pV?#9m0*K?xxap z3Hs%gdIbIQN_~QUd8GkCzr50rpkH2TM7T@#(wKlg&+PUBf_{0W3E^HTaUns!ywa4Q zUtYP0pv`+RLBG6m2|>TSaw$Q-ymA?#v+VYAf_{0W89~3ias@%ZymBQ$zr1plgVw40 z9ybTu+&xdy685VdY)^G+Zwg%Fo+sza4dWILS{Llt5u3Qy!S>V>?M$My#B)uQ``xN;Fizk+!VH1) z9Y|~SM^aRGmfRwRYB-QWeeefCYX-JwI_|#K3T+l{64wrFS1$f$YMsD#ug)=6*I6<} zc3O{cl|X$5wibJa;Y?}Z?10VvKDd3}(3vf_YXok8HwtWDj{)YSY7EnpswvkO#rc^t zZ1=diGU#0tui3e>kF2@)kTt9O%bH8#HM{2PYc7q~?CH8nUUONzW_O>VvgY!5&7QF% zWlghq&8~jqWz7}wn%%?gYf{-)VvQbkOO~>&w;nx5tI!7FmgIGOjrmJrShgK=D!YT{ zS-)g_>u+u!sqD|NtmVJ=e81=ac%Jopru-9F*533P&$oNN!}ISv-|zWPo@bd4qqzDU zgJs?R37%i!c}ve*d*0Ub-k#@rKHu|&o-g)1%Y3lK)#rwTnfkQFvbNj9&JR1-)#=8; z?tvp5>{8hsy`&Nr-Z%oR5BJ7pP(9Z<@0Mai6{Q%Oh1QRE0;{d_b4DcJlEC7Bd z=m(JgAm|5>{v_xJkPZU$XtJ_WJjxxWAE%oh+Z}zw6&Y`eWlfX{X1?IcSHiOT|q%GG<9(z8YzDWCJrS6 z+tmZ_rk8YiF#NgBk}IXqc@DG?=G*5-hKWw~$Z&SnhzxI)*QQBY%tRRL5Y0}r_H@CFwQgX$ z24VhKFEYfaK20__53~OUL~L-^Ap9BFhLPdp4UIy}MLRVP&7OQ0gqDkbrb%dndmnc2 ztNSenzXwfa+nK5b|4edbU1I)Ea1B;9)uJjcO)rdggHNe64Q&W|vx`C-idp5wp$*G5 zc1dW%F;~7cGBn|3p^fNnteLaq9@DM{u5cjPF#_#;Wn{>Xt3n%z9}+F8SH9EuAF|Wn--z$i}ANP4MeNn>f(e^^sv?H-wglE4dp( zn}8nfrqJ>*;lDXDWZo^IO~z?(E6t|zq@m~vTNBMeWbK-Q4c-!+C|z*%?W}?CfCuuDQ5`yFW5~cIQEw9MudIe28cdU;)O0ha*G9 z9&whOFWJ=5fwbiU9C3MAjNL|gS`Xq@M0S`Z<6o+t%z zYP}E{I)|Ld@Zqa2p{=i!rV-2>aT0>e&^&{iUMdq#$Gy+T`sdndgE z%b$e(_MzDWp4=0y(3gk<&Yy$>=@;0p)fmS5M}{mJ5E;7afzFbuW`hO>Igpvm?14iJ z<~mF+m*@_5Af+bvN8d8k;Q`cbZ*SzvFlUkmYjI#B0?VI*dn+Sp_F$*<#ZWgY#Ob{- z3m8qbAzz0rj)@E*9~)Ty6bvro0^7A7+Z!L+1|;Q#$k6>yj0`imEPpEI z%abF+40npN$PN|}&J1 zD`|2P&qXV)BAUu&?e33WVRdNzaAL0sZ2)?dwV@3}r?4)xL1?=5G}-Y2)OrKa?l>3c z&c@INVIKctXamtjy%bpfOmwv`2ex}K%Doa9M!;7?8-iASEwsUyOuQag{w$2@Z#YY? zl~BIvKteejh2Emsqn(n2Y5Utmd$c3b1H2R3SadV*hBg`(B<}^5KNr`~?>kFcN=-I7 zur`Jb8-uQ6b6|VB&NH?pu$_ZY;jPY+ zv!%k@2=@wXcOY#!4rAb_p^e80_E}_@y?;)VHXnpk{DO!!&!303{4%iJ6VWB?2yFtg z?yJxyp_#sRmb8)@=R1&Ia>`&F{7xeFx_dHa)4M{;!$sTf(5B+7-Qz4l8yMK@K-y$l zS7ZA^n~qfaCbSutmVO)BY@D&*(WITm;Kkn)ZH?!k@A)CH{Dqjr{TSHpxd_mHnrv_~ zCbd5i?FQ%J(0&dqe-WDHm%w($pU{?I*Z+pL2o3XJXiIUum-VNA zPjB~9^ic(zCD+LTrw9!M3ObM$Sccv%9U1zQLZK~3ZXZRH!&-{7sxZ+W*3zZMiiEZj zLtfF)R-x-H7Fhn$C5OEYP=5_40Ub>x+66NJ^W=X{0*-dON$!(IIL3iA!WvB8j-|=L ztr=|aIHEnc6__s_AKE$`$O$xg@jA53i4m?x>YhZjTik$4&EkRW$-!PqI7_mn&Lth# zI`7HB$yO?`{N+fC(t+)?lvO z1*i5w7g2#|3-%mmuGK2S^jfV_xV|^~np2%6_sgN5=0Fa;59TD5X|lIby$zmDw0rA| zv8PI87^BXh$&1G=Gk9i%dFXx4BHAquz!_gPw1Mav&JHYpHOBLE0^2hX4OcC&{M9(s z&I@eMU}WR@kzvHF?kssg+NFjAX_q00Le0>IVh&L&u>7@1o!Wuz8HORg4o#Y6Aug`! z5^W0%LpM{8CIuH`l&kMBsUg*C;6SehdZJ5iNVJ<9g;+MC$>!E$fM^^en(BfOr*-LW zun7^H%-?{{_QJq+<{&$oI!hju3SQ(uDmbkhE-){S5rfMm5q8JSBKJ+2O|D>{K|XtqVCLa-+QR1_#=_W5$?LH%2%XNqdvSq^Z30 zW(RWYGjJ_@OJF;@V^F!(S#p!Su(bnu;Vh*8ZIKN!b~{auU>cIkQ`vT=k%NE#a~hCvH}?3Z+rg$&gndx)$A~!S zoda;Tcc#g!`vD&(+SXZz;o%9I6zq>4^GTvDxE`a>Q=x6Zi=TFu++qqEc*cR8MAL`j zBziW&VTj6eMC@X37o@}UG^xu7)y>+_rP}MVvy_+*xv4Fn4W>{nvIdT7fotC0jEXp7*VoMh*JjQnyzn*7(DwqOdc{D zHPGLI?J4&5#z-JY*WR2N z78%M7j|}s;5ux=%S3Hs?4LBFQ+bD-g9Z9Xx4x|P8qjqCL8-T|2j8Rkn1Y4YOrsN$j!XLQ53v6v`Z#PKZ&Z0~4H%a%Gz&M^fIEOQ`n8jWBsj||t7 zD?%FsTNxQ9WUE3OhY88*(8l8K-Wq4gBT|vI4x}RE(5tNrZ9I-@eP|Q#PSFOKj^`W0 z^%K#KFNT(f!R@8Mc8H2ihWw5xb9xwnY{rcAtc{q|4zZ1@)`tM-F|?VE_R^)H(2B^MV* ze-rHnXQPV$(4^oHjAH*fOgfp82C@$N_aFD=p_eZ}lULf$XQznR#l9)%(hCN*b1uft zbYT0YVuOW3n~ovpsL*EMvZ8Qg=*5ZzwsXNiV?}9F!MQl=iaAUklS4b&fgNA=Ey^*4 zjtOlEW;e$MwsQ&ga9m_K<&F<*-!dG<2{c=i+1>Es6Nxq&OK{qpM3aKuamiFX!rpjw zi3shyw4}r2PU(S5Ij{$}a~XnL+F8;@3YBpnEwBddSvIt_sK?2X;o7=fWZ1ze&XTsW zgYpifznVQN$BfMtfOc#)zuT8pkRN4jUfe9Jx5To3#C2iijAs=%E-Tq$63lF8KbBGc zuwzDzUn;pVqmyag7FBQCe$-=6bpCLTV;Lp~nL zn`22T;lZ?8R#F8IXW-#nJk-NOBRsUn!&7*80S_PI;Zr>PjfVoJF_IE^Xo81}@o)tm zuEfJtcxaA?tMPCR9$MhxT0FGGLn}O7hllI&a04E0#KTQ^z+X2>TH^t~e4F402NV3> zQ*sv`@V(;%U-U}w0r&(T1WfQ*fCTRaB)AihAXo`PxxLV1ojX2w&-S97AL~@RZu`3) zyDLtH-Uw@v#t%KxzVn0kG%;0;&Jfsnoye zf~kMf>D1rpLaD#fN2Ly?3#a}}7fJn*E}Hs1T`cum`smbw^f9Sl)5oTMNgtQ`IemQU zr}PP_{pk}^Kc-Jg{g5u6`aWGE^f3aw)HmtUseS1(slDm4sXghFQ@hjUQoGWp zq;{sur}EPkQeUSlroKv7O6^FWn))(*TI!2*<<#ft(^H?NtE4_npOM<0J~Oo~eO78~ zx@u}m`s~!^^f{?d($!KQr_W7&ls+%@Vfy^k2kGjmP3an`_tP~~@1<*{-c8p|y_2q! zdOKY=^;WuG>dkch)Ensrsn^pDQ?I2PrCv=pPQ8-8AoX&(N$REag{c?QO;a1w7o|3& zFHWsbUy@pvzBIKqeOYQv`tsE3bhFf|^cAU<=_^w!(pROHr< Tuple[bytes, int]: + if errors != 'strict': + raise IDNAError('Unsupported error handling \"{}\"'.format(errors)) + + if not data: + return b"", 0 + + return encode(data), len(data) + + def decode(self, data: bytes, errors: str = 'strict') -> Tuple[str, int]: + if errors != 'strict': + raise IDNAError('Unsupported error handling \"{}\"'.format(errors)) + + if not data: + return '', 0 + + return decode(data), len(data) + +class IncrementalEncoder(codecs.BufferedIncrementalEncoder): + def _buffer_encode(self, data: str, errors: str, final: bool) -> Tuple[str, int]: # type: ignore + if errors != 'strict': + raise IDNAError('Unsupported error handling \"{}\"'.format(errors)) + + if not data: + return "", 0 + + labels = _unicode_dots_re.split(data) + trailing_dot = '' + if labels: + if not labels[-1]: + trailing_dot = '.' + del labels[-1] + elif not final: + # Keep potentially unfinished label until the next call + del labels[-1] + if labels: + trailing_dot = '.' + + result = [] + size = 0 + for label in labels: + result.append(alabel(label)) + if size: + size += 1 + size += len(label) + + # Join with U+002E + result_str = '.'.join(result) + trailing_dot # type: ignore + size += len(trailing_dot) + return result_str, size + +class IncrementalDecoder(codecs.BufferedIncrementalDecoder): + def _buffer_decode(self, data: str, errors: str, final: bool) -> Tuple[str, int]: # type: ignore + if errors != 'strict': + raise IDNAError('Unsupported error handling \"{}\"'.format(errors)) + + if not data: + return ('', 0) + + labels = _unicode_dots_re.split(data) + trailing_dot = '' + if labels: + if not labels[-1]: + trailing_dot = '.' + del labels[-1] + elif not final: + # Keep potentially unfinished label until the next call + del labels[-1] + if labels: + trailing_dot = '.' + + result = [] + size = 0 + for label in labels: + result.append(ulabel(label)) + if size: + size += 1 + size += len(label) + + result_str = '.'.join(result) + trailing_dot + size += len(trailing_dot) + return (result_str, size) + + +class StreamWriter(Codec, codecs.StreamWriter): + pass + + +class StreamReader(Codec, codecs.StreamReader): + pass + + +def getregentry() -> codecs.CodecInfo: + # Compatibility as a search_function for codecs.register() + return codecs.CodecInfo( + name='idna', + encode=Codec().encode, # type: ignore + decode=Codec().decode, # type: ignore + incrementalencoder=IncrementalEncoder, + incrementaldecoder=IncrementalDecoder, + streamwriter=StreamWriter, + streamreader=StreamReader, + ) diff --git a/_vendor/idna/compat.py b/_vendor/idna/compat.py new file mode 100644 index 0000000..786e6bd --- /dev/null +++ b/_vendor/idna/compat.py @@ -0,0 +1,13 @@ +from .core import * +from .codec import * +from typing import Any, Union + +def ToASCII(label: str) -> bytes: + return encode(label) + +def ToUnicode(label: Union[bytes, bytearray]) -> str: + return decode(label) + +def nameprep(s: Any) -> None: + raise NotImplementedError('IDNA 2008 does not utilise nameprep protocol') + diff --git a/_vendor/idna/core.py b/_vendor/idna/core.py new file mode 100644 index 0000000..4f30037 --- /dev/null +++ b/_vendor/idna/core.py @@ -0,0 +1,400 @@ +from . import idnadata +import bisect +import unicodedata +import re +from typing import Union, Optional +from .intranges import intranges_contain + +_virama_combining_class = 9 +_alabel_prefix = b'xn--' +_unicode_dots_re = re.compile('[\u002e\u3002\uff0e\uff61]') + +class IDNAError(UnicodeError): + """ Base exception for all IDNA-encoding related problems """ + pass + + +class IDNABidiError(IDNAError): + """ Exception when bidirectional requirements are not satisfied """ + pass + + +class InvalidCodepoint(IDNAError): + """ Exception when a disallowed or unallocated codepoint is used """ + pass + + +class InvalidCodepointContext(IDNAError): + """ Exception when the codepoint is not valid in the context it is used """ + pass + + +def _combining_class(cp: int) -> int: + v = unicodedata.combining(chr(cp)) + if v == 0: + if not unicodedata.name(chr(cp)): + raise ValueError('Unknown character in unicodedata') + return v + +def _is_script(cp: str, script: str) -> bool: + return intranges_contain(ord(cp), idnadata.scripts[script]) + +def _punycode(s: str) -> bytes: + return s.encode('punycode') + +def _unot(s: int) -> str: + return 'U+{:04X}'.format(s) + + +def valid_label_length(label: Union[bytes, str]) -> bool: + if len(label) > 63: + return False + return True + + +def valid_string_length(label: Union[bytes, str], trailing_dot: bool) -> bool: + if len(label) > (254 if trailing_dot else 253): + return False + return True + + +def check_bidi(label: str, check_ltr: bool = False) -> bool: + # Bidi rules should only be applied if string contains RTL characters + bidi_label = False + for (idx, cp) in enumerate(label, 1): + direction = unicodedata.bidirectional(cp) + if direction == '': + # String likely comes from a newer version of Unicode + raise IDNABidiError('Unknown directionality in label {} at position {}'.format(repr(label), idx)) + if direction in ['R', 'AL', 'AN']: + bidi_label = True + if not bidi_label and not check_ltr: + return True + + # Bidi rule 1 + direction = unicodedata.bidirectional(label[0]) + if direction in ['R', 'AL']: + rtl = True + elif direction == 'L': + rtl = False + else: + raise IDNABidiError('First codepoint in label {} must be directionality L, R or AL'.format(repr(label))) + + valid_ending = False + number_type = None # type: Optional[str] + for (idx, cp) in enumerate(label, 1): + direction = unicodedata.bidirectional(cp) + + if rtl: + # Bidi rule 2 + if not direction in ['R', 'AL', 'AN', 'EN', 'ES', 'CS', 'ET', 'ON', 'BN', 'NSM']: + raise IDNABidiError('Invalid direction for codepoint at position {} in a right-to-left label'.format(idx)) + # Bidi rule 3 + if direction in ['R', 'AL', 'EN', 'AN']: + valid_ending = True + elif direction != 'NSM': + valid_ending = False + # Bidi rule 4 + if direction in ['AN', 'EN']: + if not number_type: + number_type = direction + else: + if number_type != direction: + raise IDNABidiError('Can not mix numeral types in a right-to-left label') + else: + # Bidi rule 5 + if not direction in ['L', 'EN', 'ES', 'CS', 'ET', 'ON', 'BN', 'NSM']: + raise IDNABidiError('Invalid direction for codepoint at position {} in a left-to-right label'.format(idx)) + # Bidi rule 6 + if direction in ['L', 'EN']: + valid_ending = True + elif direction != 'NSM': + valid_ending = False + + if not valid_ending: + raise IDNABidiError('Label ends with illegal codepoint directionality') + + return True + + +def check_initial_combiner(label: str) -> bool: + if unicodedata.category(label[0])[0] == 'M': + raise IDNAError('Label begins with an illegal combining character') + return True + + +def check_hyphen_ok(label: str) -> bool: + if label[2:4] == '--': + raise IDNAError('Label has disallowed hyphens in 3rd and 4th position') + if label[0] == '-' or label[-1] == '-': + raise IDNAError('Label must not start or end with a hyphen') + return True + + +def check_nfc(label: str) -> None: + if unicodedata.normalize('NFC', label) != label: + raise IDNAError('Label must be in Normalization Form C') + + +def valid_contextj(label: str, pos: int) -> bool: + cp_value = ord(label[pos]) + + if cp_value == 0x200c: + + if pos > 0: + if _combining_class(ord(label[pos - 1])) == _virama_combining_class: + return True + + ok = False + for i in range(pos-1, -1, -1): + joining_type = idnadata.joining_types.get(ord(label[i])) + if joining_type == ord('T'): + continue + if joining_type in [ord('L'), ord('D')]: + ok = True + break + + if not ok: + return False + + ok = False + for i in range(pos+1, len(label)): + joining_type = idnadata.joining_types.get(ord(label[i])) + if joining_type == ord('T'): + continue + if joining_type in [ord('R'), ord('D')]: + ok = True + break + return ok + + if cp_value == 0x200d: + + if pos > 0: + if _combining_class(ord(label[pos - 1])) == _virama_combining_class: + return True + return False + + else: + + return False + + +def valid_contexto(label: str, pos: int, exception: bool = False) -> bool: + cp_value = ord(label[pos]) + + if cp_value == 0x00b7: + if 0 < pos < len(label)-1: + if ord(label[pos - 1]) == 0x006c and ord(label[pos + 1]) == 0x006c: + return True + return False + + elif cp_value == 0x0375: + if pos < len(label)-1 and len(label) > 1: + return _is_script(label[pos + 1], 'Greek') + return False + + elif cp_value == 0x05f3 or cp_value == 0x05f4: + if pos > 0: + return _is_script(label[pos - 1], 'Hebrew') + return False + + elif cp_value == 0x30fb: + for cp in label: + if cp == '\u30fb': + continue + if _is_script(cp, 'Hiragana') or _is_script(cp, 'Katakana') or _is_script(cp, 'Han'): + return True + return False + + elif 0x660 <= cp_value <= 0x669: + for cp in label: + if 0x6f0 <= ord(cp) <= 0x06f9: + return False + return True + + elif 0x6f0 <= cp_value <= 0x6f9: + for cp in label: + if 0x660 <= ord(cp) <= 0x0669: + return False + return True + + return False + + +def check_label(label: Union[str, bytes, bytearray]) -> None: + if isinstance(label, (bytes, bytearray)): + label = label.decode('utf-8') + if len(label) == 0: + raise IDNAError('Empty Label') + + check_nfc(label) + check_hyphen_ok(label) + check_initial_combiner(label) + + for (pos, cp) in enumerate(label): + cp_value = ord(cp) + if intranges_contain(cp_value, idnadata.codepoint_classes['PVALID']): + continue + elif intranges_contain(cp_value, idnadata.codepoint_classes['CONTEXTJ']): + try: + if not valid_contextj(label, pos): + raise InvalidCodepointContext('Joiner {} not allowed at position {} in {}'.format( + _unot(cp_value), pos+1, repr(label))) + except ValueError: + raise IDNAError('Unknown codepoint adjacent to joiner {} at position {} in {}'.format( + _unot(cp_value), pos+1, repr(label))) + elif intranges_contain(cp_value, idnadata.codepoint_classes['CONTEXTO']): + if not valid_contexto(label, pos): + raise InvalidCodepointContext('Codepoint {} not allowed at position {} in {}'.format(_unot(cp_value), pos+1, repr(label))) + else: + raise InvalidCodepoint('Codepoint {} at position {} of {} not allowed'.format(_unot(cp_value), pos+1, repr(label))) + + check_bidi(label) + + +def alabel(label: str) -> bytes: + try: + label_bytes = label.encode('ascii') + ulabel(label_bytes) + if not valid_label_length(label_bytes): + raise IDNAError('Label too long') + return label_bytes + except UnicodeEncodeError: + pass + + if not label: + raise IDNAError('No Input') + + label = str(label) + check_label(label) + label_bytes = _punycode(label) + label_bytes = _alabel_prefix + label_bytes + + if not valid_label_length(label_bytes): + raise IDNAError('Label too long') + + return label_bytes + + +def ulabel(label: Union[str, bytes, bytearray]) -> str: + if not isinstance(label, (bytes, bytearray)): + try: + label_bytes = label.encode('ascii') + except UnicodeEncodeError: + check_label(label) + return label + else: + label_bytes = label + + label_bytes = label_bytes.lower() + if label_bytes.startswith(_alabel_prefix): + label_bytes = label_bytes[len(_alabel_prefix):] + if not label_bytes: + raise IDNAError('Malformed A-label, no Punycode eligible content found') + if label_bytes.decode('ascii')[-1] == '-': + raise IDNAError('A-label must not end with a hyphen') + else: + check_label(label_bytes) + return label_bytes.decode('ascii') + + try: + label = label_bytes.decode('punycode') + except UnicodeError: + raise IDNAError('Invalid A-label') + check_label(label) + return label + + +def uts46_remap(domain: str, std3_rules: bool = True, transitional: bool = False) -> str: + """Re-map the characters in the string according to UTS46 processing.""" + from .uts46data import uts46data + output = '' + + for pos, char in enumerate(domain): + code_point = ord(char) + try: + uts46row = uts46data[code_point if code_point < 256 else + bisect.bisect_left(uts46data, (code_point, 'Z')) - 1] + status = uts46row[1] + replacement = None # type: Optional[str] + if len(uts46row) == 3: + replacement = uts46row[2] # type: ignore + if (status == 'V' or + (status == 'D' and not transitional) or + (status == '3' and not std3_rules and replacement is None)): + output += char + elif replacement is not None and (status == 'M' or + (status == '3' and not std3_rules) or + (status == 'D' and transitional)): + output += replacement + elif status != 'I': + raise IndexError() + except IndexError: + raise InvalidCodepoint( + 'Codepoint {} not allowed at position {} in {}'.format( + _unot(code_point), pos + 1, repr(domain))) + + return unicodedata.normalize('NFC', output) + + +def encode(s: Union[str, bytes, bytearray], strict: bool = False, uts46: bool = False, std3_rules: bool = False, transitional: bool = False) -> bytes: + if isinstance(s, (bytes, bytearray)): + try: + s = s.decode('ascii') + except UnicodeDecodeError: + raise IDNAError('should pass a unicode string to the function rather than a byte string.') + if uts46: + s = uts46_remap(s, std3_rules, transitional) + trailing_dot = False + result = [] + if strict: + labels = s.split('.') + else: + labels = _unicode_dots_re.split(s) + if not labels or labels == ['']: + raise IDNAError('Empty domain') + if labels[-1] == '': + del labels[-1] + trailing_dot = True + for label in labels: + s = alabel(label) + if s: + result.append(s) + else: + raise IDNAError('Empty label') + if trailing_dot: + result.append(b'') + s = b'.'.join(result) + if not valid_string_length(s, trailing_dot): + raise IDNAError('Domain too long') + return s + + +def decode(s: Union[str, bytes, bytearray], strict: bool = False, uts46: bool = False, std3_rules: bool = False) -> str: + try: + if isinstance(s, (bytes, bytearray)): + s = s.decode('ascii') + except UnicodeDecodeError: + raise IDNAError('Invalid ASCII in A-label') + if uts46: + s = uts46_remap(s, std3_rules, False) + trailing_dot = False + result = [] + if not strict: + labels = _unicode_dots_re.split(s) + else: + labels = s.split('.') + if not labels or labels == ['']: + raise IDNAError('Empty domain') + if not labels[-1]: + del labels[-1] + trailing_dot = True + for label in labels: + s = ulabel(label) + if s: + result.append(s) + else: + raise IDNAError('Empty label') + if trailing_dot: + result.append('') + return '.'.join(result) diff --git a/_vendor/idna/idnadata.py b/_vendor/idna/idnadata.py new file mode 100644 index 0000000..67db462 --- /dev/null +++ b/_vendor/idna/idnadata.py @@ -0,0 +1,2151 @@ +# This file is automatically generated by tools/idna-data + +__version__ = '15.0.0' +scripts = { + 'Greek': ( + 0x37000000374, + 0x37500000378, + 0x37a0000037e, + 0x37f00000380, + 0x38400000385, + 0x38600000387, + 0x3880000038b, + 0x38c0000038d, + 0x38e000003a2, + 0x3a3000003e2, + 0x3f000000400, + 0x1d2600001d2b, + 0x1d5d00001d62, + 0x1d6600001d6b, + 0x1dbf00001dc0, + 0x1f0000001f16, + 0x1f1800001f1e, + 0x1f2000001f46, + 0x1f4800001f4e, + 0x1f5000001f58, + 0x1f5900001f5a, + 0x1f5b00001f5c, + 0x1f5d00001f5e, + 0x1f5f00001f7e, + 0x1f8000001fb5, + 0x1fb600001fc5, + 0x1fc600001fd4, + 0x1fd600001fdc, + 0x1fdd00001ff0, + 0x1ff200001ff5, + 0x1ff600001fff, + 0x212600002127, + 0xab650000ab66, + 0x101400001018f, + 0x101a0000101a1, + 0x1d2000001d246, + ), + 'Han': ( + 0x2e8000002e9a, + 0x2e9b00002ef4, + 0x2f0000002fd6, + 0x300500003006, + 0x300700003008, + 0x30210000302a, + 0x30380000303c, + 0x340000004dc0, + 0x4e000000a000, + 0xf9000000fa6e, + 0xfa700000fada, + 0x16fe200016fe4, + 0x16ff000016ff2, + 0x200000002a6e0, + 0x2a7000002b73a, + 0x2b7400002b81e, + 0x2b8200002cea2, + 0x2ceb00002ebe1, + 0x2f8000002fa1e, + 0x300000003134b, + 0x31350000323b0, + ), + 'Hebrew': ( + 0x591000005c8, + 0x5d0000005eb, + 0x5ef000005f5, + 0xfb1d0000fb37, + 0xfb380000fb3d, + 0xfb3e0000fb3f, + 0xfb400000fb42, + 0xfb430000fb45, + 0xfb460000fb50, + ), + 'Hiragana': ( + 0x304100003097, + 0x309d000030a0, + 0x1b0010001b120, + 0x1b1320001b133, + 0x1b1500001b153, + 0x1f2000001f201, + ), + 'Katakana': ( + 0x30a1000030fb, + 0x30fd00003100, + 0x31f000003200, + 0x32d0000032ff, + 0x330000003358, + 0xff660000ff70, + 0xff710000ff9e, + 0x1aff00001aff4, + 0x1aff50001affc, + 0x1affd0001afff, + 0x1b0000001b001, + 0x1b1200001b123, + 0x1b1550001b156, + 0x1b1640001b168, + ), +} +joining_types = { + 0x600: 85, + 0x601: 85, + 0x602: 85, + 0x603: 85, + 0x604: 85, + 0x605: 85, + 0x608: 85, + 0x60b: 85, + 0x620: 68, + 0x621: 85, + 0x622: 82, + 0x623: 82, + 0x624: 82, + 0x625: 82, + 0x626: 68, + 0x627: 82, + 0x628: 68, + 0x629: 82, + 0x62a: 68, + 0x62b: 68, + 0x62c: 68, + 0x62d: 68, + 0x62e: 68, + 0x62f: 82, + 0x630: 82, + 0x631: 82, + 0x632: 82, + 0x633: 68, + 0x634: 68, + 0x635: 68, + 0x636: 68, + 0x637: 68, + 0x638: 68, + 0x639: 68, + 0x63a: 68, + 0x63b: 68, + 0x63c: 68, + 0x63d: 68, + 0x63e: 68, + 0x63f: 68, + 0x640: 67, + 0x641: 68, + 0x642: 68, + 0x643: 68, + 0x644: 68, + 0x645: 68, + 0x646: 68, + 0x647: 68, + 0x648: 82, + 0x649: 68, + 0x64a: 68, + 0x66e: 68, + 0x66f: 68, + 0x671: 82, + 0x672: 82, + 0x673: 82, + 0x674: 85, + 0x675: 82, + 0x676: 82, + 0x677: 82, + 0x678: 68, + 0x679: 68, + 0x67a: 68, + 0x67b: 68, + 0x67c: 68, + 0x67d: 68, + 0x67e: 68, + 0x67f: 68, + 0x680: 68, + 0x681: 68, + 0x682: 68, + 0x683: 68, + 0x684: 68, + 0x685: 68, + 0x686: 68, + 0x687: 68, + 0x688: 82, + 0x689: 82, + 0x68a: 82, + 0x68b: 82, + 0x68c: 82, + 0x68d: 82, + 0x68e: 82, + 0x68f: 82, + 0x690: 82, + 0x691: 82, + 0x692: 82, + 0x693: 82, + 0x694: 82, + 0x695: 82, + 0x696: 82, + 0x697: 82, + 0x698: 82, + 0x699: 82, + 0x69a: 68, + 0x69b: 68, + 0x69c: 68, + 0x69d: 68, + 0x69e: 68, + 0x69f: 68, + 0x6a0: 68, + 0x6a1: 68, + 0x6a2: 68, + 0x6a3: 68, + 0x6a4: 68, + 0x6a5: 68, + 0x6a6: 68, + 0x6a7: 68, + 0x6a8: 68, + 0x6a9: 68, + 0x6aa: 68, + 0x6ab: 68, + 0x6ac: 68, + 0x6ad: 68, + 0x6ae: 68, + 0x6af: 68, + 0x6b0: 68, + 0x6b1: 68, + 0x6b2: 68, + 0x6b3: 68, + 0x6b4: 68, + 0x6b5: 68, + 0x6b6: 68, + 0x6b7: 68, + 0x6b8: 68, + 0x6b9: 68, + 0x6ba: 68, + 0x6bb: 68, + 0x6bc: 68, + 0x6bd: 68, + 0x6be: 68, + 0x6bf: 68, + 0x6c0: 82, + 0x6c1: 68, + 0x6c2: 68, + 0x6c3: 82, + 0x6c4: 82, + 0x6c5: 82, + 0x6c6: 82, + 0x6c7: 82, + 0x6c8: 82, + 0x6c9: 82, + 0x6ca: 82, + 0x6cb: 82, + 0x6cc: 68, + 0x6cd: 82, + 0x6ce: 68, + 0x6cf: 82, + 0x6d0: 68, + 0x6d1: 68, + 0x6d2: 82, + 0x6d3: 82, + 0x6d5: 82, + 0x6dd: 85, + 0x6ee: 82, + 0x6ef: 82, + 0x6fa: 68, + 0x6fb: 68, + 0x6fc: 68, + 0x6ff: 68, + 0x70f: 84, + 0x710: 82, + 0x712: 68, + 0x713: 68, + 0x714: 68, + 0x715: 82, + 0x716: 82, + 0x717: 82, + 0x718: 82, + 0x719: 82, + 0x71a: 68, + 0x71b: 68, + 0x71c: 68, + 0x71d: 68, + 0x71e: 82, + 0x71f: 68, + 0x720: 68, + 0x721: 68, + 0x722: 68, + 0x723: 68, + 0x724: 68, + 0x725: 68, + 0x726: 68, + 0x727: 68, + 0x728: 82, + 0x729: 68, + 0x72a: 82, + 0x72b: 68, + 0x72c: 82, + 0x72d: 68, + 0x72e: 68, + 0x72f: 82, + 0x74d: 82, + 0x74e: 68, + 0x74f: 68, + 0x750: 68, + 0x751: 68, + 0x752: 68, + 0x753: 68, + 0x754: 68, + 0x755: 68, + 0x756: 68, + 0x757: 68, + 0x758: 68, + 0x759: 82, + 0x75a: 82, + 0x75b: 82, + 0x75c: 68, + 0x75d: 68, + 0x75e: 68, + 0x75f: 68, + 0x760: 68, + 0x761: 68, + 0x762: 68, + 0x763: 68, + 0x764: 68, + 0x765: 68, + 0x766: 68, + 0x767: 68, + 0x768: 68, + 0x769: 68, + 0x76a: 68, + 0x76b: 82, + 0x76c: 82, + 0x76d: 68, + 0x76e: 68, + 0x76f: 68, + 0x770: 68, + 0x771: 82, + 0x772: 68, + 0x773: 82, + 0x774: 82, + 0x775: 68, + 0x776: 68, + 0x777: 68, + 0x778: 82, + 0x779: 82, + 0x77a: 68, + 0x77b: 68, + 0x77c: 68, + 0x77d: 68, + 0x77e: 68, + 0x77f: 68, + 0x7ca: 68, + 0x7cb: 68, + 0x7cc: 68, + 0x7cd: 68, + 0x7ce: 68, + 0x7cf: 68, + 0x7d0: 68, + 0x7d1: 68, + 0x7d2: 68, + 0x7d3: 68, + 0x7d4: 68, + 0x7d5: 68, + 0x7d6: 68, + 0x7d7: 68, + 0x7d8: 68, + 0x7d9: 68, + 0x7da: 68, + 0x7db: 68, + 0x7dc: 68, + 0x7dd: 68, + 0x7de: 68, + 0x7df: 68, + 0x7e0: 68, + 0x7e1: 68, + 0x7e2: 68, + 0x7e3: 68, + 0x7e4: 68, + 0x7e5: 68, + 0x7e6: 68, + 0x7e7: 68, + 0x7e8: 68, + 0x7e9: 68, + 0x7ea: 68, + 0x7fa: 67, + 0x840: 82, + 0x841: 68, + 0x842: 68, + 0x843: 68, + 0x844: 68, + 0x845: 68, + 0x846: 82, + 0x847: 82, + 0x848: 68, + 0x849: 82, + 0x84a: 68, + 0x84b: 68, + 0x84c: 68, + 0x84d: 68, + 0x84e: 68, + 0x84f: 68, + 0x850: 68, + 0x851: 68, + 0x852: 68, + 0x853: 68, + 0x854: 82, + 0x855: 68, + 0x856: 82, + 0x857: 82, + 0x858: 82, + 0x860: 68, + 0x861: 85, + 0x862: 68, + 0x863: 68, + 0x864: 68, + 0x865: 68, + 0x866: 85, + 0x867: 82, + 0x868: 68, + 0x869: 82, + 0x86a: 82, + 0x870: 82, + 0x871: 82, + 0x872: 82, + 0x873: 82, + 0x874: 82, + 0x875: 82, + 0x876: 82, + 0x877: 82, + 0x878: 82, + 0x879: 82, + 0x87a: 82, + 0x87b: 82, + 0x87c: 82, + 0x87d: 82, + 0x87e: 82, + 0x87f: 82, + 0x880: 82, + 0x881: 82, + 0x882: 82, + 0x883: 67, + 0x884: 67, + 0x885: 67, + 0x886: 68, + 0x887: 85, + 0x888: 85, + 0x889: 68, + 0x88a: 68, + 0x88b: 68, + 0x88c: 68, + 0x88d: 68, + 0x88e: 82, + 0x890: 85, + 0x891: 85, + 0x8a0: 68, + 0x8a1: 68, + 0x8a2: 68, + 0x8a3: 68, + 0x8a4: 68, + 0x8a5: 68, + 0x8a6: 68, + 0x8a7: 68, + 0x8a8: 68, + 0x8a9: 68, + 0x8aa: 82, + 0x8ab: 82, + 0x8ac: 82, + 0x8ad: 85, + 0x8ae: 82, + 0x8af: 68, + 0x8b0: 68, + 0x8b1: 82, + 0x8b2: 82, + 0x8b3: 68, + 0x8b4: 68, + 0x8b5: 68, + 0x8b6: 68, + 0x8b7: 68, + 0x8b8: 68, + 0x8b9: 82, + 0x8ba: 68, + 0x8bb: 68, + 0x8bc: 68, + 0x8bd: 68, + 0x8be: 68, + 0x8bf: 68, + 0x8c0: 68, + 0x8c1: 68, + 0x8c2: 68, + 0x8c3: 68, + 0x8c4: 68, + 0x8c5: 68, + 0x8c6: 68, + 0x8c7: 68, + 0x8c8: 68, + 0x8e2: 85, + 0x1806: 85, + 0x1807: 68, + 0x180a: 67, + 0x180e: 85, + 0x1820: 68, + 0x1821: 68, + 0x1822: 68, + 0x1823: 68, + 0x1824: 68, + 0x1825: 68, + 0x1826: 68, + 0x1827: 68, + 0x1828: 68, + 0x1829: 68, + 0x182a: 68, + 0x182b: 68, + 0x182c: 68, + 0x182d: 68, + 0x182e: 68, + 0x182f: 68, + 0x1830: 68, + 0x1831: 68, + 0x1832: 68, + 0x1833: 68, + 0x1834: 68, + 0x1835: 68, + 0x1836: 68, + 0x1837: 68, + 0x1838: 68, + 0x1839: 68, + 0x183a: 68, + 0x183b: 68, + 0x183c: 68, + 0x183d: 68, + 0x183e: 68, + 0x183f: 68, + 0x1840: 68, + 0x1841: 68, + 0x1842: 68, + 0x1843: 68, + 0x1844: 68, + 0x1845: 68, + 0x1846: 68, + 0x1847: 68, + 0x1848: 68, + 0x1849: 68, + 0x184a: 68, + 0x184b: 68, + 0x184c: 68, + 0x184d: 68, + 0x184e: 68, + 0x184f: 68, + 0x1850: 68, + 0x1851: 68, + 0x1852: 68, + 0x1853: 68, + 0x1854: 68, + 0x1855: 68, + 0x1856: 68, + 0x1857: 68, + 0x1858: 68, + 0x1859: 68, + 0x185a: 68, + 0x185b: 68, + 0x185c: 68, + 0x185d: 68, + 0x185e: 68, + 0x185f: 68, + 0x1860: 68, + 0x1861: 68, + 0x1862: 68, + 0x1863: 68, + 0x1864: 68, + 0x1865: 68, + 0x1866: 68, + 0x1867: 68, + 0x1868: 68, + 0x1869: 68, + 0x186a: 68, + 0x186b: 68, + 0x186c: 68, + 0x186d: 68, + 0x186e: 68, + 0x186f: 68, + 0x1870: 68, + 0x1871: 68, + 0x1872: 68, + 0x1873: 68, + 0x1874: 68, + 0x1875: 68, + 0x1876: 68, + 0x1877: 68, + 0x1878: 68, + 0x1880: 85, + 0x1881: 85, + 0x1882: 85, + 0x1883: 85, + 0x1884: 85, + 0x1885: 84, + 0x1886: 84, + 0x1887: 68, + 0x1888: 68, + 0x1889: 68, + 0x188a: 68, + 0x188b: 68, + 0x188c: 68, + 0x188d: 68, + 0x188e: 68, + 0x188f: 68, + 0x1890: 68, + 0x1891: 68, + 0x1892: 68, + 0x1893: 68, + 0x1894: 68, + 0x1895: 68, + 0x1896: 68, + 0x1897: 68, + 0x1898: 68, + 0x1899: 68, + 0x189a: 68, + 0x189b: 68, + 0x189c: 68, + 0x189d: 68, + 0x189e: 68, + 0x189f: 68, + 0x18a0: 68, + 0x18a1: 68, + 0x18a2: 68, + 0x18a3: 68, + 0x18a4: 68, + 0x18a5: 68, + 0x18a6: 68, + 0x18a7: 68, + 0x18a8: 68, + 0x18aa: 68, + 0x200c: 85, + 0x200d: 67, + 0x202f: 85, + 0x2066: 85, + 0x2067: 85, + 0x2068: 85, + 0x2069: 85, + 0xa840: 68, + 0xa841: 68, + 0xa842: 68, + 0xa843: 68, + 0xa844: 68, + 0xa845: 68, + 0xa846: 68, + 0xa847: 68, + 0xa848: 68, + 0xa849: 68, + 0xa84a: 68, + 0xa84b: 68, + 0xa84c: 68, + 0xa84d: 68, + 0xa84e: 68, + 0xa84f: 68, + 0xa850: 68, + 0xa851: 68, + 0xa852: 68, + 0xa853: 68, + 0xa854: 68, + 0xa855: 68, + 0xa856: 68, + 0xa857: 68, + 0xa858: 68, + 0xa859: 68, + 0xa85a: 68, + 0xa85b: 68, + 0xa85c: 68, + 0xa85d: 68, + 0xa85e: 68, + 0xa85f: 68, + 0xa860: 68, + 0xa861: 68, + 0xa862: 68, + 0xa863: 68, + 0xa864: 68, + 0xa865: 68, + 0xa866: 68, + 0xa867: 68, + 0xa868: 68, + 0xa869: 68, + 0xa86a: 68, + 0xa86b: 68, + 0xa86c: 68, + 0xa86d: 68, + 0xa86e: 68, + 0xa86f: 68, + 0xa870: 68, + 0xa871: 68, + 0xa872: 76, + 0xa873: 85, + 0x10ac0: 68, + 0x10ac1: 68, + 0x10ac2: 68, + 0x10ac3: 68, + 0x10ac4: 68, + 0x10ac5: 82, + 0x10ac6: 85, + 0x10ac7: 82, + 0x10ac8: 85, + 0x10ac9: 82, + 0x10aca: 82, + 0x10acb: 85, + 0x10acc: 85, + 0x10acd: 76, + 0x10ace: 82, + 0x10acf: 82, + 0x10ad0: 82, + 0x10ad1: 82, + 0x10ad2: 82, + 0x10ad3: 68, + 0x10ad4: 68, + 0x10ad5: 68, + 0x10ad6: 68, + 0x10ad7: 76, + 0x10ad8: 68, + 0x10ad9: 68, + 0x10ada: 68, + 0x10adb: 68, + 0x10adc: 68, + 0x10add: 82, + 0x10ade: 68, + 0x10adf: 68, + 0x10ae0: 68, + 0x10ae1: 82, + 0x10ae2: 85, + 0x10ae3: 85, + 0x10ae4: 82, + 0x10aeb: 68, + 0x10aec: 68, + 0x10aed: 68, + 0x10aee: 68, + 0x10aef: 82, + 0x10b80: 68, + 0x10b81: 82, + 0x10b82: 68, + 0x10b83: 82, + 0x10b84: 82, + 0x10b85: 82, + 0x10b86: 68, + 0x10b87: 68, + 0x10b88: 68, + 0x10b89: 82, + 0x10b8a: 68, + 0x10b8b: 68, + 0x10b8c: 82, + 0x10b8d: 68, + 0x10b8e: 82, + 0x10b8f: 82, + 0x10b90: 68, + 0x10b91: 82, + 0x10ba9: 82, + 0x10baa: 82, + 0x10bab: 82, + 0x10bac: 82, + 0x10bad: 68, + 0x10bae: 68, + 0x10baf: 85, + 0x10d00: 76, + 0x10d01: 68, + 0x10d02: 68, + 0x10d03: 68, + 0x10d04: 68, + 0x10d05: 68, + 0x10d06: 68, + 0x10d07: 68, + 0x10d08: 68, + 0x10d09: 68, + 0x10d0a: 68, + 0x10d0b: 68, + 0x10d0c: 68, + 0x10d0d: 68, + 0x10d0e: 68, + 0x10d0f: 68, + 0x10d10: 68, + 0x10d11: 68, + 0x10d12: 68, + 0x10d13: 68, + 0x10d14: 68, + 0x10d15: 68, + 0x10d16: 68, + 0x10d17: 68, + 0x10d18: 68, + 0x10d19: 68, + 0x10d1a: 68, + 0x10d1b: 68, + 0x10d1c: 68, + 0x10d1d: 68, + 0x10d1e: 68, + 0x10d1f: 68, + 0x10d20: 68, + 0x10d21: 68, + 0x10d22: 82, + 0x10d23: 68, + 0x10f30: 68, + 0x10f31: 68, + 0x10f32: 68, + 0x10f33: 82, + 0x10f34: 68, + 0x10f35: 68, + 0x10f36: 68, + 0x10f37: 68, + 0x10f38: 68, + 0x10f39: 68, + 0x10f3a: 68, + 0x10f3b: 68, + 0x10f3c: 68, + 0x10f3d: 68, + 0x10f3e: 68, + 0x10f3f: 68, + 0x10f40: 68, + 0x10f41: 68, + 0x10f42: 68, + 0x10f43: 68, + 0x10f44: 68, + 0x10f45: 85, + 0x10f51: 68, + 0x10f52: 68, + 0x10f53: 68, + 0x10f54: 82, + 0x10f70: 68, + 0x10f71: 68, + 0x10f72: 68, + 0x10f73: 68, + 0x10f74: 82, + 0x10f75: 82, + 0x10f76: 68, + 0x10f77: 68, + 0x10f78: 68, + 0x10f79: 68, + 0x10f7a: 68, + 0x10f7b: 68, + 0x10f7c: 68, + 0x10f7d: 68, + 0x10f7e: 68, + 0x10f7f: 68, + 0x10f80: 68, + 0x10f81: 68, + 0x10fb0: 68, + 0x10fb1: 85, + 0x10fb2: 68, + 0x10fb3: 68, + 0x10fb4: 82, + 0x10fb5: 82, + 0x10fb6: 82, + 0x10fb7: 85, + 0x10fb8: 68, + 0x10fb9: 82, + 0x10fba: 82, + 0x10fbb: 68, + 0x10fbc: 68, + 0x10fbd: 82, + 0x10fbe: 68, + 0x10fbf: 68, + 0x10fc0: 85, + 0x10fc1: 68, + 0x10fc2: 82, + 0x10fc3: 82, + 0x10fc4: 68, + 0x10fc5: 85, + 0x10fc6: 85, + 0x10fc7: 85, + 0x10fc8: 85, + 0x10fc9: 82, + 0x10fca: 68, + 0x10fcb: 76, + 0x110bd: 85, + 0x110cd: 85, + 0x1e900: 68, + 0x1e901: 68, + 0x1e902: 68, + 0x1e903: 68, + 0x1e904: 68, + 0x1e905: 68, + 0x1e906: 68, + 0x1e907: 68, + 0x1e908: 68, + 0x1e909: 68, + 0x1e90a: 68, + 0x1e90b: 68, + 0x1e90c: 68, + 0x1e90d: 68, + 0x1e90e: 68, + 0x1e90f: 68, + 0x1e910: 68, + 0x1e911: 68, + 0x1e912: 68, + 0x1e913: 68, + 0x1e914: 68, + 0x1e915: 68, + 0x1e916: 68, + 0x1e917: 68, + 0x1e918: 68, + 0x1e919: 68, + 0x1e91a: 68, + 0x1e91b: 68, + 0x1e91c: 68, + 0x1e91d: 68, + 0x1e91e: 68, + 0x1e91f: 68, + 0x1e920: 68, + 0x1e921: 68, + 0x1e922: 68, + 0x1e923: 68, + 0x1e924: 68, + 0x1e925: 68, + 0x1e926: 68, + 0x1e927: 68, + 0x1e928: 68, + 0x1e929: 68, + 0x1e92a: 68, + 0x1e92b: 68, + 0x1e92c: 68, + 0x1e92d: 68, + 0x1e92e: 68, + 0x1e92f: 68, + 0x1e930: 68, + 0x1e931: 68, + 0x1e932: 68, + 0x1e933: 68, + 0x1e934: 68, + 0x1e935: 68, + 0x1e936: 68, + 0x1e937: 68, + 0x1e938: 68, + 0x1e939: 68, + 0x1e93a: 68, + 0x1e93b: 68, + 0x1e93c: 68, + 0x1e93d: 68, + 0x1e93e: 68, + 0x1e93f: 68, + 0x1e940: 68, + 0x1e941: 68, + 0x1e942: 68, + 0x1e943: 68, + 0x1e94b: 84, +} +codepoint_classes = { + 'PVALID': ( + 0x2d0000002e, + 0x300000003a, + 0x610000007b, + 0xdf000000f7, + 0xf800000100, + 0x10100000102, + 0x10300000104, + 0x10500000106, + 0x10700000108, + 0x1090000010a, + 0x10b0000010c, + 0x10d0000010e, + 0x10f00000110, + 0x11100000112, + 0x11300000114, + 0x11500000116, + 0x11700000118, + 0x1190000011a, + 0x11b0000011c, + 0x11d0000011e, + 0x11f00000120, + 0x12100000122, + 0x12300000124, + 0x12500000126, + 0x12700000128, + 0x1290000012a, + 0x12b0000012c, + 0x12d0000012e, + 0x12f00000130, + 0x13100000132, + 0x13500000136, + 0x13700000139, + 0x13a0000013b, + 0x13c0000013d, + 0x13e0000013f, + 0x14200000143, + 0x14400000145, + 0x14600000147, + 0x14800000149, + 0x14b0000014c, + 0x14d0000014e, + 0x14f00000150, + 0x15100000152, + 0x15300000154, + 0x15500000156, + 0x15700000158, + 0x1590000015a, + 0x15b0000015c, + 0x15d0000015e, + 0x15f00000160, + 0x16100000162, + 0x16300000164, + 0x16500000166, + 0x16700000168, + 0x1690000016a, + 0x16b0000016c, + 0x16d0000016e, + 0x16f00000170, + 0x17100000172, + 0x17300000174, + 0x17500000176, + 0x17700000178, + 0x17a0000017b, + 0x17c0000017d, + 0x17e0000017f, + 0x18000000181, + 0x18300000184, + 0x18500000186, + 0x18800000189, + 0x18c0000018e, + 0x19200000193, + 0x19500000196, + 0x1990000019c, + 0x19e0000019f, + 0x1a1000001a2, + 0x1a3000001a4, + 0x1a5000001a6, + 0x1a8000001a9, + 0x1aa000001ac, + 0x1ad000001ae, + 0x1b0000001b1, + 0x1b4000001b5, + 0x1b6000001b7, + 0x1b9000001bc, + 0x1bd000001c4, + 0x1ce000001cf, + 0x1d0000001d1, + 0x1d2000001d3, + 0x1d4000001d5, + 0x1d6000001d7, + 0x1d8000001d9, + 0x1da000001db, + 0x1dc000001de, + 0x1df000001e0, + 0x1e1000001e2, + 0x1e3000001e4, + 0x1e5000001e6, + 0x1e7000001e8, + 0x1e9000001ea, + 0x1eb000001ec, + 0x1ed000001ee, + 0x1ef000001f1, + 0x1f5000001f6, + 0x1f9000001fa, + 0x1fb000001fc, + 0x1fd000001fe, + 0x1ff00000200, + 0x20100000202, + 0x20300000204, + 0x20500000206, + 0x20700000208, + 0x2090000020a, + 0x20b0000020c, + 0x20d0000020e, + 0x20f00000210, + 0x21100000212, + 0x21300000214, + 0x21500000216, + 0x21700000218, + 0x2190000021a, + 0x21b0000021c, + 0x21d0000021e, + 0x21f00000220, + 0x22100000222, + 0x22300000224, + 0x22500000226, + 0x22700000228, + 0x2290000022a, + 0x22b0000022c, + 0x22d0000022e, + 0x22f00000230, + 0x23100000232, + 0x2330000023a, + 0x23c0000023d, + 0x23f00000241, + 0x24200000243, + 0x24700000248, + 0x2490000024a, + 0x24b0000024c, + 0x24d0000024e, + 0x24f000002b0, + 0x2b9000002c2, + 0x2c6000002d2, + 0x2ec000002ed, + 0x2ee000002ef, + 0x30000000340, + 0x34200000343, + 0x3460000034f, + 0x35000000370, + 0x37100000372, + 0x37300000374, + 0x37700000378, + 0x37b0000037e, + 0x39000000391, + 0x3ac000003cf, + 0x3d7000003d8, + 0x3d9000003da, + 0x3db000003dc, + 0x3dd000003de, + 0x3df000003e0, + 0x3e1000003e2, + 0x3e3000003e4, + 0x3e5000003e6, + 0x3e7000003e8, + 0x3e9000003ea, + 0x3eb000003ec, + 0x3ed000003ee, + 0x3ef000003f0, + 0x3f3000003f4, + 0x3f8000003f9, + 0x3fb000003fd, + 0x43000000460, + 0x46100000462, + 0x46300000464, + 0x46500000466, + 0x46700000468, + 0x4690000046a, + 0x46b0000046c, + 0x46d0000046e, + 0x46f00000470, + 0x47100000472, + 0x47300000474, + 0x47500000476, + 0x47700000478, + 0x4790000047a, + 0x47b0000047c, + 0x47d0000047e, + 0x47f00000480, + 0x48100000482, + 0x48300000488, + 0x48b0000048c, + 0x48d0000048e, + 0x48f00000490, + 0x49100000492, + 0x49300000494, + 0x49500000496, + 0x49700000498, + 0x4990000049a, + 0x49b0000049c, + 0x49d0000049e, + 0x49f000004a0, + 0x4a1000004a2, + 0x4a3000004a4, + 0x4a5000004a6, + 0x4a7000004a8, + 0x4a9000004aa, + 0x4ab000004ac, + 0x4ad000004ae, + 0x4af000004b0, + 0x4b1000004b2, + 0x4b3000004b4, + 0x4b5000004b6, + 0x4b7000004b8, + 0x4b9000004ba, + 0x4bb000004bc, + 0x4bd000004be, + 0x4bf000004c0, + 0x4c2000004c3, + 0x4c4000004c5, + 0x4c6000004c7, + 0x4c8000004c9, + 0x4ca000004cb, + 0x4cc000004cd, + 0x4ce000004d0, + 0x4d1000004d2, + 0x4d3000004d4, + 0x4d5000004d6, + 0x4d7000004d8, + 0x4d9000004da, + 0x4db000004dc, + 0x4dd000004de, + 0x4df000004e0, + 0x4e1000004e2, + 0x4e3000004e4, + 0x4e5000004e6, + 0x4e7000004e8, + 0x4e9000004ea, + 0x4eb000004ec, + 0x4ed000004ee, + 0x4ef000004f0, + 0x4f1000004f2, + 0x4f3000004f4, + 0x4f5000004f6, + 0x4f7000004f8, + 0x4f9000004fa, + 0x4fb000004fc, + 0x4fd000004fe, + 0x4ff00000500, + 0x50100000502, + 0x50300000504, + 0x50500000506, + 0x50700000508, + 0x5090000050a, + 0x50b0000050c, + 0x50d0000050e, + 0x50f00000510, + 0x51100000512, + 0x51300000514, + 0x51500000516, + 0x51700000518, + 0x5190000051a, + 0x51b0000051c, + 0x51d0000051e, + 0x51f00000520, + 0x52100000522, + 0x52300000524, + 0x52500000526, + 0x52700000528, + 0x5290000052a, + 0x52b0000052c, + 0x52d0000052e, + 0x52f00000530, + 0x5590000055a, + 0x56000000587, + 0x58800000589, + 0x591000005be, + 0x5bf000005c0, + 0x5c1000005c3, + 0x5c4000005c6, + 0x5c7000005c8, + 0x5d0000005eb, + 0x5ef000005f3, + 0x6100000061b, + 0x62000000640, + 0x64100000660, + 0x66e00000675, + 0x679000006d4, + 0x6d5000006dd, + 0x6df000006e9, + 0x6ea000006f0, + 0x6fa00000700, + 0x7100000074b, + 0x74d000007b2, + 0x7c0000007f6, + 0x7fd000007fe, + 0x8000000082e, + 0x8400000085c, + 0x8600000086b, + 0x87000000888, + 0x8890000088f, + 0x898000008e2, + 0x8e300000958, + 0x96000000964, + 0x96600000970, + 0x97100000984, + 0x9850000098d, + 0x98f00000991, + 0x993000009a9, + 0x9aa000009b1, + 0x9b2000009b3, + 0x9b6000009ba, + 0x9bc000009c5, + 0x9c7000009c9, + 0x9cb000009cf, + 0x9d7000009d8, + 0x9e0000009e4, + 0x9e6000009f2, + 0x9fc000009fd, + 0x9fe000009ff, + 0xa0100000a04, + 0xa0500000a0b, + 0xa0f00000a11, + 0xa1300000a29, + 0xa2a00000a31, + 0xa3200000a33, + 0xa3500000a36, + 0xa3800000a3a, + 0xa3c00000a3d, + 0xa3e00000a43, + 0xa4700000a49, + 0xa4b00000a4e, + 0xa5100000a52, + 0xa5c00000a5d, + 0xa6600000a76, + 0xa8100000a84, + 0xa8500000a8e, + 0xa8f00000a92, + 0xa9300000aa9, + 0xaaa00000ab1, + 0xab200000ab4, + 0xab500000aba, + 0xabc00000ac6, + 0xac700000aca, + 0xacb00000ace, + 0xad000000ad1, + 0xae000000ae4, + 0xae600000af0, + 0xaf900000b00, + 0xb0100000b04, + 0xb0500000b0d, + 0xb0f00000b11, + 0xb1300000b29, + 0xb2a00000b31, + 0xb3200000b34, + 0xb3500000b3a, + 0xb3c00000b45, + 0xb4700000b49, + 0xb4b00000b4e, + 0xb5500000b58, + 0xb5f00000b64, + 0xb6600000b70, + 0xb7100000b72, + 0xb8200000b84, + 0xb8500000b8b, + 0xb8e00000b91, + 0xb9200000b96, + 0xb9900000b9b, + 0xb9c00000b9d, + 0xb9e00000ba0, + 0xba300000ba5, + 0xba800000bab, + 0xbae00000bba, + 0xbbe00000bc3, + 0xbc600000bc9, + 0xbca00000bce, + 0xbd000000bd1, + 0xbd700000bd8, + 0xbe600000bf0, + 0xc0000000c0d, + 0xc0e00000c11, + 0xc1200000c29, + 0xc2a00000c3a, + 0xc3c00000c45, + 0xc4600000c49, + 0xc4a00000c4e, + 0xc5500000c57, + 0xc5800000c5b, + 0xc5d00000c5e, + 0xc6000000c64, + 0xc6600000c70, + 0xc8000000c84, + 0xc8500000c8d, + 0xc8e00000c91, + 0xc9200000ca9, + 0xcaa00000cb4, + 0xcb500000cba, + 0xcbc00000cc5, + 0xcc600000cc9, + 0xcca00000cce, + 0xcd500000cd7, + 0xcdd00000cdf, + 0xce000000ce4, + 0xce600000cf0, + 0xcf100000cf4, + 0xd0000000d0d, + 0xd0e00000d11, + 0xd1200000d45, + 0xd4600000d49, + 0xd4a00000d4f, + 0xd5400000d58, + 0xd5f00000d64, + 0xd6600000d70, + 0xd7a00000d80, + 0xd8100000d84, + 0xd8500000d97, + 0xd9a00000db2, + 0xdb300000dbc, + 0xdbd00000dbe, + 0xdc000000dc7, + 0xdca00000dcb, + 0xdcf00000dd5, + 0xdd600000dd7, + 0xdd800000de0, + 0xde600000df0, + 0xdf200000df4, + 0xe0100000e33, + 0xe3400000e3b, + 0xe4000000e4f, + 0xe5000000e5a, + 0xe8100000e83, + 0xe8400000e85, + 0xe8600000e8b, + 0xe8c00000ea4, + 0xea500000ea6, + 0xea700000eb3, + 0xeb400000ebe, + 0xec000000ec5, + 0xec600000ec7, + 0xec800000ecf, + 0xed000000eda, + 0xede00000ee0, + 0xf0000000f01, + 0xf0b00000f0c, + 0xf1800000f1a, + 0xf2000000f2a, + 0xf3500000f36, + 0xf3700000f38, + 0xf3900000f3a, + 0xf3e00000f43, + 0xf4400000f48, + 0xf4900000f4d, + 0xf4e00000f52, + 0xf5300000f57, + 0xf5800000f5c, + 0xf5d00000f69, + 0xf6a00000f6d, + 0xf7100000f73, + 0xf7400000f75, + 0xf7a00000f81, + 0xf8200000f85, + 0xf8600000f93, + 0xf9400000f98, + 0xf9900000f9d, + 0xf9e00000fa2, + 0xfa300000fa7, + 0xfa800000fac, + 0xfad00000fb9, + 0xfba00000fbd, + 0xfc600000fc7, + 0x10000000104a, + 0x10500000109e, + 0x10d0000010fb, + 0x10fd00001100, + 0x120000001249, + 0x124a0000124e, + 0x125000001257, + 0x125800001259, + 0x125a0000125e, + 0x126000001289, + 0x128a0000128e, + 0x1290000012b1, + 0x12b2000012b6, + 0x12b8000012bf, + 0x12c0000012c1, + 0x12c2000012c6, + 0x12c8000012d7, + 0x12d800001311, + 0x131200001316, + 0x13180000135b, + 0x135d00001360, + 0x138000001390, + 0x13a0000013f6, + 0x14010000166d, + 0x166f00001680, + 0x16810000169b, + 0x16a0000016eb, + 0x16f1000016f9, + 0x170000001716, + 0x171f00001735, + 0x174000001754, + 0x17600000176d, + 0x176e00001771, + 0x177200001774, + 0x1780000017b4, + 0x17b6000017d4, + 0x17d7000017d8, + 0x17dc000017de, + 0x17e0000017ea, + 0x18100000181a, + 0x182000001879, + 0x1880000018ab, + 0x18b0000018f6, + 0x19000000191f, + 0x19200000192c, + 0x19300000193c, + 0x19460000196e, + 0x197000001975, + 0x1980000019ac, + 0x19b0000019ca, + 0x19d0000019da, + 0x1a0000001a1c, + 0x1a2000001a5f, + 0x1a6000001a7d, + 0x1a7f00001a8a, + 0x1a9000001a9a, + 0x1aa700001aa8, + 0x1ab000001abe, + 0x1abf00001acf, + 0x1b0000001b4d, + 0x1b5000001b5a, + 0x1b6b00001b74, + 0x1b8000001bf4, + 0x1c0000001c38, + 0x1c4000001c4a, + 0x1c4d00001c7e, + 0x1cd000001cd3, + 0x1cd400001cfb, + 0x1d0000001d2c, + 0x1d2f00001d30, + 0x1d3b00001d3c, + 0x1d4e00001d4f, + 0x1d6b00001d78, + 0x1d7900001d9b, + 0x1dc000001e00, + 0x1e0100001e02, + 0x1e0300001e04, + 0x1e0500001e06, + 0x1e0700001e08, + 0x1e0900001e0a, + 0x1e0b00001e0c, + 0x1e0d00001e0e, + 0x1e0f00001e10, + 0x1e1100001e12, + 0x1e1300001e14, + 0x1e1500001e16, + 0x1e1700001e18, + 0x1e1900001e1a, + 0x1e1b00001e1c, + 0x1e1d00001e1e, + 0x1e1f00001e20, + 0x1e2100001e22, + 0x1e2300001e24, + 0x1e2500001e26, + 0x1e2700001e28, + 0x1e2900001e2a, + 0x1e2b00001e2c, + 0x1e2d00001e2e, + 0x1e2f00001e30, + 0x1e3100001e32, + 0x1e3300001e34, + 0x1e3500001e36, + 0x1e3700001e38, + 0x1e3900001e3a, + 0x1e3b00001e3c, + 0x1e3d00001e3e, + 0x1e3f00001e40, + 0x1e4100001e42, + 0x1e4300001e44, + 0x1e4500001e46, + 0x1e4700001e48, + 0x1e4900001e4a, + 0x1e4b00001e4c, + 0x1e4d00001e4e, + 0x1e4f00001e50, + 0x1e5100001e52, + 0x1e5300001e54, + 0x1e5500001e56, + 0x1e5700001e58, + 0x1e5900001e5a, + 0x1e5b00001e5c, + 0x1e5d00001e5e, + 0x1e5f00001e60, + 0x1e6100001e62, + 0x1e6300001e64, + 0x1e6500001e66, + 0x1e6700001e68, + 0x1e6900001e6a, + 0x1e6b00001e6c, + 0x1e6d00001e6e, + 0x1e6f00001e70, + 0x1e7100001e72, + 0x1e7300001e74, + 0x1e7500001e76, + 0x1e7700001e78, + 0x1e7900001e7a, + 0x1e7b00001e7c, + 0x1e7d00001e7e, + 0x1e7f00001e80, + 0x1e8100001e82, + 0x1e8300001e84, + 0x1e8500001e86, + 0x1e8700001e88, + 0x1e8900001e8a, + 0x1e8b00001e8c, + 0x1e8d00001e8e, + 0x1e8f00001e90, + 0x1e9100001e92, + 0x1e9300001e94, + 0x1e9500001e9a, + 0x1e9c00001e9e, + 0x1e9f00001ea0, + 0x1ea100001ea2, + 0x1ea300001ea4, + 0x1ea500001ea6, + 0x1ea700001ea8, + 0x1ea900001eaa, + 0x1eab00001eac, + 0x1ead00001eae, + 0x1eaf00001eb0, + 0x1eb100001eb2, + 0x1eb300001eb4, + 0x1eb500001eb6, + 0x1eb700001eb8, + 0x1eb900001eba, + 0x1ebb00001ebc, + 0x1ebd00001ebe, + 0x1ebf00001ec0, + 0x1ec100001ec2, + 0x1ec300001ec4, + 0x1ec500001ec6, + 0x1ec700001ec8, + 0x1ec900001eca, + 0x1ecb00001ecc, + 0x1ecd00001ece, + 0x1ecf00001ed0, + 0x1ed100001ed2, + 0x1ed300001ed4, + 0x1ed500001ed6, + 0x1ed700001ed8, + 0x1ed900001eda, + 0x1edb00001edc, + 0x1edd00001ede, + 0x1edf00001ee0, + 0x1ee100001ee2, + 0x1ee300001ee4, + 0x1ee500001ee6, + 0x1ee700001ee8, + 0x1ee900001eea, + 0x1eeb00001eec, + 0x1eed00001eee, + 0x1eef00001ef0, + 0x1ef100001ef2, + 0x1ef300001ef4, + 0x1ef500001ef6, + 0x1ef700001ef8, + 0x1ef900001efa, + 0x1efb00001efc, + 0x1efd00001efe, + 0x1eff00001f08, + 0x1f1000001f16, + 0x1f2000001f28, + 0x1f3000001f38, + 0x1f4000001f46, + 0x1f5000001f58, + 0x1f6000001f68, + 0x1f7000001f71, + 0x1f7200001f73, + 0x1f7400001f75, + 0x1f7600001f77, + 0x1f7800001f79, + 0x1f7a00001f7b, + 0x1f7c00001f7d, + 0x1fb000001fb2, + 0x1fb600001fb7, + 0x1fc600001fc7, + 0x1fd000001fd3, + 0x1fd600001fd8, + 0x1fe000001fe3, + 0x1fe400001fe8, + 0x1ff600001ff7, + 0x214e0000214f, + 0x218400002185, + 0x2c3000002c60, + 0x2c6100002c62, + 0x2c6500002c67, + 0x2c6800002c69, + 0x2c6a00002c6b, + 0x2c6c00002c6d, + 0x2c7100002c72, + 0x2c7300002c75, + 0x2c7600002c7c, + 0x2c8100002c82, + 0x2c8300002c84, + 0x2c8500002c86, + 0x2c8700002c88, + 0x2c8900002c8a, + 0x2c8b00002c8c, + 0x2c8d00002c8e, + 0x2c8f00002c90, + 0x2c9100002c92, + 0x2c9300002c94, + 0x2c9500002c96, + 0x2c9700002c98, + 0x2c9900002c9a, + 0x2c9b00002c9c, + 0x2c9d00002c9e, + 0x2c9f00002ca0, + 0x2ca100002ca2, + 0x2ca300002ca4, + 0x2ca500002ca6, + 0x2ca700002ca8, + 0x2ca900002caa, + 0x2cab00002cac, + 0x2cad00002cae, + 0x2caf00002cb0, + 0x2cb100002cb2, + 0x2cb300002cb4, + 0x2cb500002cb6, + 0x2cb700002cb8, + 0x2cb900002cba, + 0x2cbb00002cbc, + 0x2cbd00002cbe, + 0x2cbf00002cc0, + 0x2cc100002cc2, + 0x2cc300002cc4, + 0x2cc500002cc6, + 0x2cc700002cc8, + 0x2cc900002cca, + 0x2ccb00002ccc, + 0x2ccd00002cce, + 0x2ccf00002cd0, + 0x2cd100002cd2, + 0x2cd300002cd4, + 0x2cd500002cd6, + 0x2cd700002cd8, + 0x2cd900002cda, + 0x2cdb00002cdc, + 0x2cdd00002cde, + 0x2cdf00002ce0, + 0x2ce100002ce2, + 0x2ce300002ce5, + 0x2cec00002ced, + 0x2cee00002cf2, + 0x2cf300002cf4, + 0x2d0000002d26, + 0x2d2700002d28, + 0x2d2d00002d2e, + 0x2d3000002d68, + 0x2d7f00002d97, + 0x2da000002da7, + 0x2da800002daf, + 0x2db000002db7, + 0x2db800002dbf, + 0x2dc000002dc7, + 0x2dc800002dcf, + 0x2dd000002dd7, + 0x2dd800002ddf, + 0x2de000002e00, + 0x2e2f00002e30, + 0x300500003008, + 0x302a0000302e, + 0x303c0000303d, + 0x304100003097, + 0x30990000309b, + 0x309d0000309f, + 0x30a1000030fb, + 0x30fc000030ff, + 0x310500003130, + 0x31a0000031c0, + 0x31f000003200, + 0x340000004dc0, + 0x4e000000a48d, + 0xa4d00000a4fe, + 0xa5000000a60d, + 0xa6100000a62c, + 0xa6410000a642, + 0xa6430000a644, + 0xa6450000a646, + 0xa6470000a648, + 0xa6490000a64a, + 0xa64b0000a64c, + 0xa64d0000a64e, + 0xa64f0000a650, + 0xa6510000a652, + 0xa6530000a654, + 0xa6550000a656, + 0xa6570000a658, + 0xa6590000a65a, + 0xa65b0000a65c, + 0xa65d0000a65e, + 0xa65f0000a660, + 0xa6610000a662, + 0xa6630000a664, + 0xa6650000a666, + 0xa6670000a668, + 0xa6690000a66a, + 0xa66b0000a66c, + 0xa66d0000a670, + 0xa6740000a67e, + 0xa67f0000a680, + 0xa6810000a682, + 0xa6830000a684, + 0xa6850000a686, + 0xa6870000a688, + 0xa6890000a68a, + 0xa68b0000a68c, + 0xa68d0000a68e, + 0xa68f0000a690, + 0xa6910000a692, + 0xa6930000a694, + 0xa6950000a696, + 0xa6970000a698, + 0xa6990000a69a, + 0xa69b0000a69c, + 0xa69e0000a6e6, + 0xa6f00000a6f2, + 0xa7170000a720, + 0xa7230000a724, + 0xa7250000a726, + 0xa7270000a728, + 0xa7290000a72a, + 0xa72b0000a72c, + 0xa72d0000a72e, + 0xa72f0000a732, + 0xa7330000a734, + 0xa7350000a736, + 0xa7370000a738, + 0xa7390000a73a, + 0xa73b0000a73c, + 0xa73d0000a73e, + 0xa73f0000a740, + 0xa7410000a742, + 0xa7430000a744, + 0xa7450000a746, + 0xa7470000a748, + 0xa7490000a74a, + 0xa74b0000a74c, + 0xa74d0000a74e, + 0xa74f0000a750, + 0xa7510000a752, + 0xa7530000a754, + 0xa7550000a756, + 0xa7570000a758, + 0xa7590000a75a, + 0xa75b0000a75c, + 0xa75d0000a75e, + 0xa75f0000a760, + 0xa7610000a762, + 0xa7630000a764, + 0xa7650000a766, + 0xa7670000a768, + 0xa7690000a76a, + 0xa76b0000a76c, + 0xa76d0000a76e, + 0xa76f0000a770, + 0xa7710000a779, + 0xa77a0000a77b, + 0xa77c0000a77d, + 0xa77f0000a780, + 0xa7810000a782, + 0xa7830000a784, + 0xa7850000a786, + 0xa7870000a789, + 0xa78c0000a78d, + 0xa78e0000a790, + 0xa7910000a792, + 0xa7930000a796, + 0xa7970000a798, + 0xa7990000a79a, + 0xa79b0000a79c, + 0xa79d0000a79e, + 0xa79f0000a7a0, + 0xa7a10000a7a2, + 0xa7a30000a7a4, + 0xa7a50000a7a6, + 0xa7a70000a7a8, + 0xa7a90000a7aa, + 0xa7af0000a7b0, + 0xa7b50000a7b6, + 0xa7b70000a7b8, + 0xa7b90000a7ba, + 0xa7bb0000a7bc, + 0xa7bd0000a7be, + 0xa7bf0000a7c0, + 0xa7c10000a7c2, + 0xa7c30000a7c4, + 0xa7c80000a7c9, + 0xa7ca0000a7cb, + 0xa7d10000a7d2, + 0xa7d30000a7d4, + 0xa7d50000a7d6, + 0xa7d70000a7d8, + 0xa7d90000a7da, + 0xa7f20000a7f5, + 0xa7f60000a7f8, + 0xa7fa0000a828, + 0xa82c0000a82d, + 0xa8400000a874, + 0xa8800000a8c6, + 0xa8d00000a8da, + 0xa8e00000a8f8, + 0xa8fb0000a8fc, + 0xa8fd0000a92e, + 0xa9300000a954, + 0xa9800000a9c1, + 0xa9cf0000a9da, + 0xa9e00000a9ff, + 0xaa000000aa37, + 0xaa400000aa4e, + 0xaa500000aa5a, + 0xaa600000aa77, + 0xaa7a0000aac3, + 0xaadb0000aade, + 0xaae00000aaf0, + 0xaaf20000aaf7, + 0xab010000ab07, + 0xab090000ab0f, + 0xab110000ab17, + 0xab200000ab27, + 0xab280000ab2f, + 0xab300000ab5b, + 0xab600000ab69, + 0xabc00000abeb, + 0xabec0000abee, + 0xabf00000abfa, + 0xac000000d7a4, + 0xfa0e0000fa10, + 0xfa110000fa12, + 0xfa130000fa15, + 0xfa1f0000fa20, + 0xfa210000fa22, + 0xfa230000fa25, + 0xfa270000fa2a, + 0xfb1e0000fb1f, + 0xfe200000fe30, + 0xfe730000fe74, + 0x100000001000c, + 0x1000d00010027, + 0x100280001003b, + 0x1003c0001003e, + 0x1003f0001004e, + 0x100500001005e, + 0x10080000100fb, + 0x101fd000101fe, + 0x102800001029d, + 0x102a0000102d1, + 0x102e0000102e1, + 0x1030000010320, + 0x1032d00010341, + 0x103420001034a, + 0x103500001037b, + 0x103800001039e, + 0x103a0000103c4, + 0x103c8000103d0, + 0x104280001049e, + 0x104a0000104aa, + 0x104d8000104fc, + 0x1050000010528, + 0x1053000010564, + 0x10597000105a2, + 0x105a3000105b2, + 0x105b3000105ba, + 0x105bb000105bd, + 0x1060000010737, + 0x1074000010756, + 0x1076000010768, + 0x1078000010786, + 0x10787000107b1, + 0x107b2000107bb, + 0x1080000010806, + 0x1080800010809, + 0x1080a00010836, + 0x1083700010839, + 0x1083c0001083d, + 0x1083f00010856, + 0x1086000010877, + 0x108800001089f, + 0x108e0000108f3, + 0x108f4000108f6, + 0x1090000010916, + 0x109200001093a, + 0x10980000109b8, + 0x109be000109c0, + 0x10a0000010a04, + 0x10a0500010a07, + 0x10a0c00010a14, + 0x10a1500010a18, + 0x10a1900010a36, + 0x10a3800010a3b, + 0x10a3f00010a40, + 0x10a6000010a7d, + 0x10a8000010a9d, + 0x10ac000010ac8, + 0x10ac900010ae7, + 0x10b0000010b36, + 0x10b4000010b56, + 0x10b6000010b73, + 0x10b8000010b92, + 0x10c0000010c49, + 0x10cc000010cf3, + 0x10d0000010d28, + 0x10d3000010d3a, + 0x10e8000010eaa, + 0x10eab00010ead, + 0x10eb000010eb2, + 0x10efd00010f1d, + 0x10f2700010f28, + 0x10f3000010f51, + 0x10f7000010f86, + 0x10fb000010fc5, + 0x10fe000010ff7, + 0x1100000011047, + 0x1106600011076, + 0x1107f000110bb, + 0x110c2000110c3, + 0x110d0000110e9, + 0x110f0000110fa, + 0x1110000011135, + 0x1113600011140, + 0x1114400011148, + 0x1115000011174, + 0x1117600011177, + 0x11180000111c5, + 0x111c9000111cd, + 0x111ce000111db, + 0x111dc000111dd, + 0x1120000011212, + 0x1121300011238, + 0x1123e00011242, + 0x1128000011287, + 0x1128800011289, + 0x1128a0001128e, + 0x1128f0001129e, + 0x1129f000112a9, + 0x112b0000112eb, + 0x112f0000112fa, + 0x1130000011304, + 0x113050001130d, + 0x1130f00011311, + 0x1131300011329, + 0x1132a00011331, + 0x1133200011334, + 0x113350001133a, + 0x1133b00011345, + 0x1134700011349, + 0x1134b0001134e, + 0x1135000011351, + 0x1135700011358, + 0x1135d00011364, + 0x113660001136d, + 0x1137000011375, + 0x114000001144b, + 0x114500001145a, + 0x1145e00011462, + 0x11480000114c6, + 0x114c7000114c8, + 0x114d0000114da, + 0x11580000115b6, + 0x115b8000115c1, + 0x115d8000115de, + 0x1160000011641, + 0x1164400011645, + 0x116500001165a, + 0x11680000116b9, + 0x116c0000116ca, + 0x117000001171b, + 0x1171d0001172c, + 0x117300001173a, + 0x1174000011747, + 0x118000001183b, + 0x118c0000118ea, + 0x118ff00011907, + 0x119090001190a, + 0x1190c00011914, + 0x1191500011917, + 0x1191800011936, + 0x1193700011939, + 0x1193b00011944, + 0x119500001195a, + 0x119a0000119a8, + 0x119aa000119d8, + 0x119da000119e2, + 0x119e3000119e5, + 0x11a0000011a3f, + 0x11a4700011a48, + 0x11a5000011a9a, + 0x11a9d00011a9e, + 0x11ab000011af9, + 0x11c0000011c09, + 0x11c0a00011c37, + 0x11c3800011c41, + 0x11c5000011c5a, + 0x11c7200011c90, + 0x11c9200011ca8, + 0x11ca900011cb7, + 0x11d0000011d07, + 0x11d0800011d0a, + 0x11d0b00011d37, + 0x11d3a00011d3b, + 0x11d3c00011d3e, + 0x11d3f00011d48, + 0x11d5000011d5a, + 0x11d6000011d66, + 0x11d6700011d69, + 0x11d6a00011d8f, + 0x11d9000011d92, + 0x11d9300011d99, + 0x11da000011daa, + 0x11ee000011ef7, + 0x11f0000011f11, + 0x11f1200011f3b, + 0x11f3e00011f43, + 0x11f5000011f5a, + 0x11fb000011fb1, + 0x120000001239a, + 0x1248000012544, + 0x12f9000012ff1, + 0x1300000013430, + 0x1344000013456, + 0x1440000014647, + 0x1680000016a39, + 0x16a4000016a5f, + 0x16a6000016a6a, + 0x16a7000016abf, + 0x16ac000016aca, + 0x16ad000016aee, + 0x16af000016af5, + 0x16b0000016b37, + 0x16b4000016b44, + 0x16b5000016b5a, + 0x16b6300016b78, + 0x16b7d00016b90, + 0x16e6000016e80, + 0x16f0000016f4b, + 0x16f4f00016f88, + 0x16f8f00016fa0, + 0x16fe000016fe2, + 0x16fe300016fe5, + 0x16ff000016ff2, + 0x17000000187f8, + 0x1880000018cd6, + 0x18d0000018d09, + 0x1aff00001aff4, + 0x1aff50001affc, + 0x1affd0001afff, + 0x1b0000001b123, + 0x1b1320001b133, + 0x1b1500001b153, + 0x1b1550001b156, + 0x1b1640001b168, + 0x1b1700001b2fc, + 0x1bc000001bc6b, + 0x1bc700001bc7d, + 0x1bc800001bc89, + 0x1bc900001bc9a, + 0x1bc9d0001bc9f, + 0x1cf000001cf2e, + 0x1cf300001cf47, + 0x1da000001da37, + 0x1da3b0001da6d, + 0x1da750001da76, + 0x1da840001da85, + 0x1da9b0001daa0, + 0x1daa10001dab0, + 0x1df000001df1f, + 0x1df250001df2b, + 0x1e0000001e007, + 0x1e0080001e019, + 0x1e01b0001e022, + 0x1e0230001e025, + 0x1e0260001e02b, + 0x1e0300001e06e, + 0x1e08f0001e090, + 0x1e1000001e12d, + 0x1e1300001e13e, + 0x1e1400001e14a, + 0x1e14e0001e14f, + 0x1e2900001e2af, + 0x1e2c00001e2fa, + 0x1e4d00001e4fa, + 0x1e7e00001e7e7, + 0x1e7e80001e7ec, + 0x1e7ed0001e7ef, + 0x1e7f00001e7ff, + 0x1e8000001e8c5, + 0x1e8d00001e8d7, + 0x1e9220001e94c, + 0x1e9500001e95a, + 0x200000002a6e0, + 0x2a7000002b73a, + 0x2b7400002b81e, + 0x2b8200002cea2, + 0x2ceb00002ebe1, + 0x300000003134b, + 0x31350000323b0, + ), + 'CONTEXTJ': ( + 0x200c0000200e, + ), + 'CONTEXTO': ( + 0xb7000000b8, + 0x37500000376, + 0x5f3000005f5, + 0x6600000066a, + 0x6f0000006fa, + 0x30fb000030fc, + ), +} diff --git a/_vendor/idna/intranges.py b/_vendor/idna/intranges.py new file mode 100644 index 0000000..6a43b04 --- /dev/null +++ b/_vendor/idna/intranges.py @@ -0,0 +1,54 @@ +""" +Given a list of integers, made up of (hopefully) a small number of long runs +of consecutive integers, compute a representation of the form +((start1, end1), (start2, end2) ...). Then answer the question "was x present +in the original list?" in time O(log(# runs)). +""" + +import bisect +from typing import List, Tuple + +def intranges_from_list(list_: List[int]) -> Tuple[int, ...]: + """Represent a list of integers as a sequence of ranges: + ((start_0, end_0), (start_1, end_1), ...), such that the original + integers are exactly those x such that start_i <= x < end_i for some i. + + Ranges are encoded as single integers (start << 32 | end), not as tuples. + """ + + sorted_list = sorted(list_) + ranges = [] + last_write = -1 + for i in range(len(sorted_list)): + if i+1 < len(sorted_list): + if sorted_list[i] == sorted_list[i+1]-1: + continue + current_range = sorted_list[last_write+1:i+1] + ranges.append(_encode_range(current_range[0], current_range[-1] + 1)) + last_write = i + + return tuple(ranges) + +def _encode_range(start: int, end: int) -> int: + return (start << 32) | end + +def _decode_range(r: int) -> Tuple[int, int]: + return (r >> 32), (r & ((1 << 32) - 1)) + + +def intranges_contain(int_: int, ranges: Tuple[int, ...]) -> bool: + """Determine if `int_` falls into one of the ranges in `ranges`.""" + tuple_ = _encode_range(int_, 0) + pos = bisect.bisect_left(ranges, tuple_) + # we could be immediately ahead of a tuple (start, end) + # with start < int_ <= end + if pos > 0: + left, right = _decode_range(ranges[pos-1]) + if left <= int_ < right: + return True + # or we could be immediately behind a tuple (int_, end) + if pos < len(ranges): + left, _ = _decode_range(ranges[pos]) + if left == int_: + return True + return False diff --git a/_vendor/idna/package_data.py b/_vendor/idna/package_data.py new file mode 100644 index 0000000..8501893 --- /dev/null +++ b/_vendor/idna/package_data.py @@ -0,0 +1,2 @@ +__version__ = '3.4' + diff --git a/_vendor/idna/py.typed b/_vendor/idna/py.typed new file mode 100644 index 0000000..e69de29 diff --git a/_vendor/idna/uts46data.py b/_vendor/idna/uts46data.py new file mode 100644 index 0000000..186796c --- /dev/null +++ b/_vendor/idna/uts46data.py @@ -0,0 +1,8600 @@ +# This file is automatically generated by tools/idna-data +# vim: set fileencoding=utf-8 : + +from typing import List, Tuple, Union + + +"""IDNA Mapping Table from UTS46.""" + + +__version__ = '15.0.0' +def _seg_0() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x0, '3'), + (0x1, '3'), + (0x2, '3'), + (0x3, '3'), + (0x4, '3'), + (0x5, '3'), + (0x6, '3'), + (0x7, '3'), + (0x8, '3'), + (0x9, '3'), + (0xA, '3'), + (0xB, '3'), + (0xC, '3'), + (0xD, '3'), + (0xE, '3'), + (0xF, '3'), + (0x10, '3'), + (0x11, '3'), + (0x12, '3'), + (0x13, '3'), + (0x14, '3'), + (0x15, '3'), + (0x16, '3'), + (0x17, '3'), + (0x18, '3'), + (0x19, '3'), + (0x1A, '3'), + (0x1B, '3'), + (0x1C, '3'), + (0x1D, '3'), + (0x1E, '3'), + (0x1F, '3'), + (0x20, '3'), + (0x21, '3'), + (0x22, '3'), + (0x23, '3'), + (0x24, '3'), + (0x25, '3'), + (0x26, '3'), + (0x27, '3'), + (0x28, '3'), + (0x29, '3'), + (0x2A, '3'), + (0x2B, '3'), + (0x2C, '3'), + (0x2D, 'V'), + (0x2E, 'V'), + (0x2F, '3'), + (0x30, 'V'), + (0x31, 'V'), + (0x32, 'V'), + (0x33, 'V'), + (0x34, 'V'), + (0x35, 'V'), + (0x36, 'V'), + (0x37, 'V'), + (0x38, 'V'), + (0x39, 'V'), + (0x3A, '3'), + (0x3B, '3'), + (0x3C, '3'), + (0x3D, '3'), + (0x3E, '3'), + (0x3F, '3'), + (0x40, '3'), + (0x41, 'M', 'a'), + (0x42, 'M', 'b'), + (0x43, 'M', 'c'), + (0x44, 'M', 'd'), + (0x45, 'M', 'e'), + (0x46, 'M', 'f'), + (0x47, 'M', 'g'), + (0x48, 'M', 'h'), + (0x49, 'M', 'i'), + (0x4A, 'M', 'j'), + (0x4B, 'M', 'k'), + (0x4C, 'M', 'l'), + (0x4D, 'M', 'm'), + (0x4E, 'M', 'n'), + (0x4F, 'M', 'o'), + (0x50, 'M', 'p'), + (0x51, 'M', 'q'), + (0x52, 'M', 'r'), + (0x53, 'M', 's'), + (0x54, 'M', 't'), + (0x55, 'M', 'u'), + (0x56, 'M', 'v'), + (0x57, 'M', 'w'), + (0x58, 'M', 'x'), + (0x59, 'M', 'y'), + (0x5A, 'M', 'z'), + (0x5B, '3'), + (0x5C, '3'), + (0x5D, '3'), + (0x5E, '3'), + (0x5F, '3'), + (0x60, '3'), + (0x61, 'V'), + (0x62, 'V'), + (0x63, 'V'), + ] + +def _seg_1() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x64, 'V'), + (0x65, 'V'), + (0x66, 'V'), + (0x67, 'V'), + (0x68, 'V'), + (0x69, 'V'), + (0x6A, 'V'), + (0x6B, 'V'), + (0x6C, 'V'), + (0x6D, 'V'), + (0x6E, 'V'), + (0x6F, 'V'), + (0x70, 'V'), + (0x71, 'V'), + (0x72, 'V'), + (0x73, 'V'), + (0x74, 'V'), + (0x75, 'V'), + (0x76, 'V'), + (0x77, 'V'), + (0x78, 'V'), + (0x79, 'V'), + (0x7A, 'V'), + (0x7B, '3'), + (0x7C, '3'), + (0x7D, '3'), + (0x7E, '3'), + (0x7F, '3'), + (0x80, 'X'), + (0x81, 'X'), + (0x82, 'X'), + (0x83, 'X'), + (0x84, 'X'), + (0x85, 'X'), + (0x86, 'X'), + (0x87, 'X'), + (0x88, 'X'), + (0x89, 'X'), + (0x8A, 'X'), + (0x8B, 'X'), + (0x8C, 'X'), + (0x8D, 'X'), + (0x8E, 'X'), + (0x8F, 'X'), + (0x90, 'X'), + (0x91, 'X'), + (0x92, 'X'), + (0x93, 'X'), + (0x94, 'X'), + (0x95, 'X'), + (0x96, 'X'), + (0x97, 'X'), + (0x98, 'X'), + (0x99, 'X'), + (0x9A, 'X'), + (0x9B, 'X'), + (0x9C, 'X'), + (0x9D, 'X'), + (0x9E, 'X'), + (0x9F, 'X'), + (0xA0, '3', ' '), + (0xA1, 'V'), + (0xA2, 'V'), + (0xA3, 'V'), + (0xA4, 'V'), + (0xA5, 'V'), + (0xA6, 'V'), + (0xA7, 'V'), + (0xA8, '3', ' ̈'), + (0xA9, 'V'), + (0xAA, 'M', 'a'), + (0xAB, 'V'), + (0xAC, 'V'), + (0xAD, 'I'), + (0xAE, 'V'), + (0xAF, '3', ' ̄'), + (0xB0, 'V'), + (0xB1, 'V'), + (0xB2, 'M', '2'), + (0xB3, 'M', '3'), + (0xB4, '3', ' ́'), + (0xB5, 'M', 'μ'), + (0xB6, 'V'), + (0xB7, 'V'), + (0xB8, '3', ' ̧'), + (0xB9, 'M', '1'), + (0xBA, 'M', 'o'), + (0xBB, 'V'), + (0xBC, 'M', '1⁄4'), + (0xBD, 'M', '1⁄2'), + (0xBE, 'M', '3⁄4'), + (0xBF, 'V'), + (0xC0, 'M', 'à'), + (0xC1, 'M', 'á'), + (0xC2, 'M', 'â'), + (0xC3, 'M', 'ã'), + (0xC4, 'M', 'ä'), + (0xC5, 'M', 'å'), + (0xC6, 'M', 'æ'), + (0xC7, 'M', 'ç'), + ] + +def _seg_2() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xC8, 'M', 'è'), + (0xC9, 'M', 'é'), + (0xCA, 'M', 'ê'), + (0xCB, 'M', 'ë'), + (0xCC, 'M', 'ì'), + (0xCD, 'M', 'í'), + (0xCE, 'M', 'î'), + (0xCF, 'M', 'ï'), + (0xD0, 'M', 'ð'), + (0xD1, 'M', 'ñ'), + (0xD2, 'M', 'ò'), + (0xD3, 'M', 'ó'), + (0xD4, 'M', 'ô'), + (0xD5, 'M', 'õ'), + (0xD6, 'M', 'ö'), + (0xD7, 'V'), + (0xD8, 'M', 'ø'), + (0xD9, 'M', 'ù'), + (0xDA, 'M', 'ú'), + (0xDB, 'M', 'û'), + (0xDC, 'M', 'ü'), + (0xDD, 'M', 'ý'), + (0xDE, 'M', 'þ'), + (0xDF, 'D', 'ss'), + (0xE0, 'V'), + (0xE1, 'V'), + (0xE2, 'V'), + (0xE3, 'V'), + (0xE4, 'V'), + (0xE5, 'V'), + (0xE6, 'V'), + (0xE7, 'V'), + (0xE8, 'V'), + (0xE9, 'V'), + (0xEA, 'V'), + (0xEB, 'V'), + (0xEC, 'V'), + (0xED, 'V'), + (0xEE, 'V'), + (0xEF, 'V'), + (0xF0, 'V'), + (0xF1, 'V'), + (0xF2, 'V'), + (0xF3, 'V'), + (0xF4, 'V'), + (0xF5, 'V'), + (0xF6, 'V'), + (0xF7, 'V'), + (0xF8, 'V'), + (0xF9, 'V'), + (0xFA, 'V'), + (0xFB, 'V'), + (0xFC, 'V'), + (0xFD, 'V'), + (0xFE, 'V'), + (0xFF, 'V'), + (0x100, 'M', 'ā'), + (0x101, 'V'), + (0x102, 'M', 'ă'), + (0x103, 'V'), + (0x104, 'M', 'ą'), + (0x105, 'V'), + (0x106, 'M', 'ć'), + (0x107, 'V'), + (0x108, 'M', 'ĉ'), + (0x109, 'V'), + (0x10A, 'M', 'ċ'), + (0x10B, 'V'), + (0x10C, 'M', 'č'), + (0x10D, 'V'), + (0x10E, 'M', 'ď'), + (0x10F, 'V'), + (0x110, 'M', 'đ'), + (0x111, 'V'), + (0x112, 'M', 'ē'), + (0x113, 'V'), + (0x114, 'M', 'ĕ'), + (0x115, 'V'), + (0x116, 'M', 'ė'), + (0x117, 'V'), + (0x118, 'M', 'ę'), + (0x119, 'V'), + (0x11A, 'M', 'ě'), + (0x11B, 'V'), + (0x11C, 'M', 'ĝ'), + (0x11D, 'V'), + (0x11E, 'M', 'ğ'), + (0x11F, 'V'), + (0x120, 'M', 'ġ'), + (0x121, 'V'), + (0x122, 'M', 'ģ'), + (0x123, 'V'), + (0x124, 'M', 'ĥ'), + (0x125, 'V'), + (0x126, 'M', 'ħ'), + (0x127, 'V'), + (0x128, 'M', 'ĩ'), + (0x129, 'V'), + (0x12A, 'M', 'ī'), + (0x12B, 'V'), + ] + +def _seg_3() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x12C, 'M', 'ĭ'), + (0x12D, 'V'), + (0x12E, 'M', 'į'), + (0x12F, 'V'), + (0x130, 'M', 'i̇'), + (0x131, 'V'), + (0x132, 'M', 'ij'), + (0x134, 'M', 'ĵ'), + (0x135, 'V'), + (0x136, 'M', 'ķ'), + (0x137, 'V'), + (0x139, 'M', 'ĺ'), + (0x13A, 'V'), + (0x13B, 'M', 'ļ'), + (0x13C, 'V'), + (0x13D, 'M', 'ľ'), + (0x13E, 'V'), + (0x13F, 'M', 'l·'), + (0x141, 'M', 'ł'), + (0x142, 'V'), + (0x143, 'M', 'ń'), + (0x144, 'V'), + (0x145, 'M', 'ņ'), + (0x146, 'V'), + (0x147, 'M', 'ň'), + (0x148, 'V'), + (0x149, 'M', 'ʼn'), + (0x14A, 'M', 'ŋ'), + (0x14B, 'V'), + (0x14C, 'M', 'ō'), + (0x14D, 'V'), + (0x14E, 'M', 'ŏ'), + (0x14F, 'V'), + (0x150, 'M', 'ő'), + (0x151, 'V'), + (0x152, 'M', 'œ'), + (0x153, 'V'), + (0x154, 'M', 'ŕ'), + (0x155, 'V'), + (0x156, 'M', 'ŗ'), + (0x157, 'V'), + (0x158, 'M', 'ř'), + (0x159, 'V'), + (0x15A, 'M', 'ś'), + (0x15B, 'V'), + (0x15C, 'M', 'ŝ'), + (0x15D, 'V'), + (0x15E, 'M', 'ş'), + (0x15F, 'V'), + (0x160, 'M', 'š'), + (0x161, 'V'), + (0x162, 'M', 'ţ'), + (0x163, 'V'), + (0x164, 'M', 'ť'), + (0x165, 'V'), + (0x166, 'M', 'ŧ'), + (0x167, 'V'), + (0x168, 'M', 'ũ'), + (0x169, 'V'), + (0x16A, 'M', 'ū'), + (0x16B, 'V'), + (0x16C, 'M', 'ŭ'), + (0x16D, 'V'), + (0x16E, 'M', 'ů'), + (0x16F, 'V'), + (0x170, 'M', 'ű'), + (0x171, 'V'), + (0x172, 'M', 'ų'), + (0x173, 'V'), + (0x174, 'M', 'ŵ'), + (0x175, 'V'), + (0x176, 'M', 'ŷ'), + (0x177, 'V'), + (0x178, 'M', 'ÿ'), + (0x179, 'M', 'ź'), + (0x17A, 'V'), + (0x17B, 'M', 'ż'), + (0x17C, 'V'), + (0x17D, 'M', 'ž'), + (0x17E, 'V'), + (0x17F, 'M', 's'), + (0x180, 'V'), + (0x181, 'M', 'ɓ'), + (0x182, 'M', 'ƃ'), + (0x183, 'V'), + (0x184, 'M', 'ƅ'), + (0x185, 'V'), + (0x186, 'M', 'ɔ'), + (0x187, 'M', 'ƈ'), + (0x188, 'V'), + (0x189, 'M', 'ɖ'), + (0x18A, 'M', 'ɗ'), + (0x18B, 'M', 'ƌ'), + (0x18C, 'V'), + (0x18E, 'M', 'ǝ'), + (0x18F, 'M', 'ə'), + (0x190, 'M', 'ɛ'), + (0x191, 'M', 'ƒ'), + (0x192, 'V'), + (0x193, 'M', 'ɠ'), + ] + +def _seg_4() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x194, 'M', 'ɣ'), + (0x195, 'V'), + (0x196, 'M', 'ɩ'), + (0x197, 'M', 'ɨ'), + (0x198, 'M', 'ƙ'), + (0x199, 'V'), + (0x19C, 'M', 'ɯ'), + (0x19D, 'M', 'ɲ'), + (0x19E, 'V'), + (0x19F, 'M', 'ɵ'), + (0x1A0, 'M', 'ơ'), + (0x1A1, 'V'), + (0x1A2, 'M', 'ƣ'), + (0x1A3, 'V'), + (0x1A4, 'M', 'ƥ'), + (0x1A5, 'V'), + (0x1A6, 'M', 'ʀ'), + (0x1A7, 'M', 'ƨ'), + (0x1A8, 'V'), + (0x1A9, 'M', 'ʃ'), + (0x1AA, 'V'), + (0x1AC, 'M', 'ƭ'), + (0x1AD, 'V'), + (0x1AE, 'M', 'ʈ'), + (0x1AF, 'M', 'ư'), + (0x1B0, 'V'), + (0x1B1, 'M', 'ʊ'), + (0x1B2, 'M', 'ʋ'), + (0x1B3, 'M', 'ƴ'), + (0x1B4, 'V'), + (0x1B5, 'M', 'ƶ'), + (0x1B6, 'V'), + (0x1B7, 'M', 'ʒ'), + (0x1B8, 'M', 'ƹ'), + (0x1B9, 'V'), + (0x1BC, 'M', 'ƽ'), + (0x1BD, 'V'), + (0x1C4, 'M', 'dž'), + (0x1C7, 'M', 'lj'), + (0x1CA, 'M', 'nj'), + (0x1CD, 'M', 'ǎ'), + (0x1CE, 'V'), + (0x1CF, 'M', 'ǐ'), + (0x1D0, 'V'), + (0x1D1, 'M', 'ǒ'), + (0x1D2, 'V'), + (0x1D3, 'M', 'ǔ'), + (0x1D4, 'V'), + (0x1D5, 'M', 'ǖ'), + (0x1D6, 'V'), + (0x1D7, 'M', 'ǘ'), + (0x1D8, 'V'), + (0x1D9, 'M', 'ǚ'), + (0x1DA, 'V'), + (0x1DB, 'M', 'ǜ'), + (0x1DC, 'V'), + (0x1DE, 'M', 'ǟ'), + (0x1DF, 'V'), + (0x1E0, 'M', 'ǡ'), + (0x1E1, 'V'), + (0x1E2, 'M', 'ǣ'), + (0x1E3, 'V'), + (0x1E4, 'M', 'ǥ'), + (0x1E5, 'V'), + (0x1E6, 'M', 'ǧ'), + (0x1E7, 'V'), + (0x1E8, 'M', 'ǩ'), + (0x1E9, 'V'), + (0x1EA, 'M', 'ǫ'), + (0x1EB, 'V'), + (0x1EC, 'M', 'ǭ'), + (0x1ED, 'V'), + (0x1EE, 'M', 'ǯ'), + (0x1EF, 'V'), + (0x1F1, 'M', 'dz'), + (0x1F4, 'M', 'ǵ'), + (0x1F5, 'V'), + (0x1F6, 'M', 'ƕ'), + (0x1F7, 'M', 'ƿ'), + (0x1F8, 'M', 'ǹ'), + (0x1F9, 'V'), + (0x1FA, 'M', 'ǻ'), + (0x1FB, 'V'), + (0x1FC, 'M', 'ǽ'), + (0x1FD, 'V'), + (0x1FE, 'M', 'ǿ'), + (0x1FF, 'V'), + (0x200, 'M', 'ȁ'), + (0x201, 'V'), + (0x202, 'M', 'ȃ'), + (0x203, 'V'), + (0x204, 'M', 'ȅ'), + (0x205, 'V'), + (0x206, 'M', 'ȇ'), + (0x207, 'V'), + (0x208, 'M', 'ȉ'), + (0x209, 'V'), + (0x20A, 'M', 'ȋ'), + (0x20B, 'V'), + (0x20C, 'M', 'ȍ'), + ] + +def _seg_5() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x20D, 'V'), + (0x20E, 'M', 'ȏ'), + (0x20F, 'V'), + (0x210, 'M', 'ȑ'), + (0x211, 'V'), + (0x212, 'M', 'ȓ'), + (0x213, 'V'), + (0x214, 'M', 'ȕ'), + (0x215, 'V'), + (0x216, 'M', 'ȗ'), + (0x217, 'V'), + (0x218, 'M', 'ș'), + (0x219, 'V'), + (0x21A, 'M', 'ț'), + (0x21B, 'V'), + (0x21C, 'M', 'ȝ'), + (0x21D, 'V'), + (0x21E, 'M', 'ȟ'), + (0x21F, 'V'), + (0x220, 'M', 'ƞ'), + (0x221, 'V'), + (0x222, 'M', 'ȣ'), + (0x223, 'V'), + (0x224, 'M', 'ȥ'), + (0x225, 'V'), + (0x226, 'M', 'ȧ'), + (0x227, 'V'), + (0x228, 'M', 'ȩ'), + (0x229, 'V'), + (0x22A, 'M', 'ȫ'), + (0x22B, 'V'), + (0x22C, 'M', 'ȭ'), + (0x22D, 'V'), + (0x22E, 'M', 'ȯ'), + (0x22F, 'V'), + (0x230, 'M', 'ȱ'), + (0x231, 'V'), + (0x232, 'M', 'ȳ'), + (0x233, 'V'), + (0x23A, 'M', 'ⱥ'), + (0x23B, 'M', 'ȼ'), + (0x23C, 'V'), + (0x23D, 'M', 'ƚ'), + (0x23E, 'M', 'ⱦ'), + (0x23F, 'V'), + (0x241, 'M', 'ɂ'), + (0x242, 'V'), + (0x243, 'M', 'ƀ'), + (0x244, 'M', 'ʉ'), + (0x245, 'M', 'ʌ'), + (0x246, 'M', 'ɇ'), + (0x247, 'V'), + (0x248, 'M', 'ɉ'), + (0x249, 'V'), + (0x24A, 'M', 'ɋ'), + (0x24B, 'V'), + (0x24C, 'M', 'ɍ'), + (0x24D, 'V'), + (0x24E, 'M', 'ɏ'), + (0x24F, 'V'), + (0x2B0, 'M', 'h'), + (0x2B1, 'M', 'ɦ'), + (0x2B2, 'M', 'j'), + (0x2B3, 'M', 'r'), + (0x2B4, 'M', 'ɹ'), + (0x2B5, 'M', 'ɻ'), + (0x2B6, 'M', 'ʁ'), + (0x2B7, 'M', 'w'), + (0x2B8, 'M', 'y'), + (0x2B9, 'V'), + (0x2D8, '3', ' ̆'), + (0x2D9, '3', ' ̇'), + (0x2DA, '3', ' ̊'), + (0x2DB, '3', ' ̨'), + (0x2DC, '3', ' ̃'), + (0x2DD, '3', ' ̋'), + (0x2DE, 'V'), + (0x2E0, 'M', 'ɣ'), + (0x2E1, 'M', 'l'), + (0x2E2, 'M', 's'), + (0x2E3, 'M', 'x'), + (0x2E4, 'M', 'ʕ'), + (0x2E5, 'V'), + (0x340, 'M', '̀'), + (0x341, 'M', '́'), + (0x342, 'V'), + (0x343, 'M', '̓'), + (0x344, 'M', '̈́'), + (0x345, 'M', 'ι'), + (0x346, 'V'), + (0x34F, 'I'), + (0x350, 'V'), + (0x370, 'M', 'ͱ'), + (0x371, 'V'), + (0x372, 'M', 'ͳ'), + (0x373, 'V'), + (0x374, 'M', 'ʹ'), + (0x375, 'V'), + (0x376, 'M', 'ͷ'), + (0x377, 'V'), + ] + +def _seg_6() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x378, 'X'), + (0x37A, '3', ' ι'), + (0x37B, 'V'), + (0x37E, '3', ';'), + (0x37F, 'M', 'ϳ'), + (0x380, 'X'), + (0x384, '3', ' ́'), + (0x385, '3', ' ̈́'), + (0x386, 'M', 'ά'), + (0x387, 'M', '·'), + (0x388, 'M', 'έ'), + (0x389, 'M', 'ή'), + (0x38A, 'M', 'ί'), + (0x38B, 'X'), + (0x38C, 'M', 'ό'), + (0x38D, 'X'), + (0x38E, 'M', 'ύ'), + (0x38F, 'M', 'ώ'), + (0x390, 'V'), + (0x391, 'M', 'α'), + (0x392, 'M', 'β'), + (0x393, 'M', 'γ'), + (0x394, 'M', 'δ'), + (0x395, 'M', 'ε'), + (0x396, 'M', 'ζ'), + (0x397, 'M', 'η'), + (0x398, 'M', 'θ'), + (0x399, 'M', 'ι'), + (0x39A, 'M', 'κ'), + (0x39B, 'M', 'λ'), + (0x39C, 'M', 'μ'), + (0x39D, 'M', 'ν'), + (0x39E, 'M', 'ξ'), + (0x39F, 'M', 'ο'), + (0x3A0, 'M', 'π'), + (0x3A1, 'M', 'ρ'), + (0x3A2, 'X'), + (0x3A3, 'M', 'σ'), + (0x3A4, 'M', 'τ'), + (0x3A5, 'M', 'υ'), + (0x3A6, 'M', 'φ'), + (0x3A7, 'M', 'χ'), + (0x3A8, 'M', 'ψ'), + (0x3A9, 'M', 'ω'), + (0x3AA, 'M', 'ϊ'), + (0x3AB, 'M', 'ϋ'), + (0x3AC, 'V'), + (0x3C2, 'D', 'σ'), + (0x3C3, 'V'), + (0x3CF, 'M', 'ϗ'), + (0x3D0, 'M', 'β'), + (0x3D1, 'M', 'θ'), + (0x3D2, 'M', 'υ'), + (0x3D3, 'M', 'ύ'), + (0x3D4, 'M', 'ϋ'), + (0x3D5, 'M', 'φ'), + (0x3D6, 'M', 'π'), + (0x3D7, 'V'), + (0x3D8, 'M', 'ϙ'), + (0x3D9, 'V'), + (0x3DA, 'M', 'ϛ'), + (0x3DB, 'V'), + (0x3DC, 'M', 'ϝ'), + (0x3DD, 'V'), + (0x3DE, 'M', 'ϟ'), + (0x3DF, 'V'), + (0x3E0, 'M', 'ϡ'), + (0x3E1, 'V'), + (0x3E2, 'M', 'ϣ'), + (0x3E3, 'V'), + (0x3E4, 'M', 'ϥ'), + (0x3E5, 'V'), + (0x3E6, 'M', 'ϧ'), + (0x3E7, 'V'), + (0x3E8, 'M', 'ϩ'), + (0x3E9, 'V'), + (0x3EA, 'M', 'ϫ'), + (0x3EB, 'V'), + (0x3EC, 'M', 'ϭ'), + (0x3ED, 'V'), + (0x3EE, 'M', 'ϯ'), + (0x3EF, 'V'), + (0x3F0, 'M', 'κ'), + (0x3F1, 'M', 'ρ'), + (0x3F2, 'M', 'σ'), + (0x3F3, 'V'), + (0x3F4, 'M', 'θ'), + (0x3F5, 'M', 'ε'), + (0x3F6, 'V'), + (0x3F7, 'M', 'ϸ'), + (0x3F8, 'V'), + (0x3F9, 'M', 'σ'), + (0x3FA, 'M', 'ϻ'), + (0x3FB, 'V'), + (0x3FD, 'M', 'ͻ'), + (0x3FE, 'M', 'ͼ'), + (0x3FF, 'M', 'ͽ'), + (0x400, 'M', 'ѐ'), + (0x401, 'M', 'ё'), + (0x402, 'M', 'ђ'), + ] + +def _seg_7() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x403, 'M', 'ѓ'), + (0x404, 'M', 'є'), + (0x405, 'M', 'ѕ'), + (0x406, 'M', 'і'), + (0x407, 'M', 'ї'), + (0x408, 'M', 'ј'), + (0x409, 'M', 'љ'), + (0x40A, 'M', 'њ'), + (0x40B, 'M', 'ћ'), + (0x40C, 'M', 'ќ'), + (0x40D, 'M', 'ѝ'), + (0x40E, 'M', 'ў'), + (0x40F, 'M', 'џ'), + (0x410, 'M', 'а'), + (0x411, 'M', 'б'), + (0x412, 'M', 'в'), + (0x413, 'M', 'г'), + (0x414, 'M', 'д'), + (0x415, 'M', 'е'), + (0x416, 'M', 'ж'), + (0x417, 'M', 'з'), + (0x418, 'M', 'и'), + (0x419, 'M', 'й'), + (0x41A, 'M', 'к'), + (0x41B, 'M', 'л'), + (0x41C, 'M', 'м'), + (0x41D, 'M', 'н'), + (0x41E, 'M', 'о'), + (0x41F, 'M', 'п'), + (0x420, 'M', 'р'), + (0x421, 'M', 'с'), + (0x422, 'M', 'т'), + (0x423, 'M', 'у'), + (0x424, 'M', 'ф'), + (0x425, 'M', 'х'), + (0x426, 'M', 'ц'), + (0x427, 'M', 'ч'), + (0x428, 'M', 'ш'), + (0x429, 'M', 'щ'), + (0x42A, 'M', 'ъ'), + (0x42B, 'M', 'ы'), + (0x42C, 'M', 'ь'), + (0x42D, 'M', 'э'), + (0x42E, 'M', 'ю'), + (0x42F, 'M', 'я'), + (0x430, 'V'), + (0x460, 'M', 'ѡ'), + (0x461, 'V'), + (0x462, 'M', 'ѣ'), + (0x463, 'V'), + (0x464, 'M', 'ѥ'), + (0x465, 'V'), + (0x466, 'M', 'ѧ'), + (0x467, 'V'), + (0x468, 'M', 'ѩ'), + (0x469, 'V'), + (0x46A, 'M', 'ѫ'), + (0x46B, 'V'), + (0x46C, 'M', 'ѭ'), + (0x46D, 'V'), + (0x46E, 'M', 'ѯ'), + (0x46F, 'V'), + (0x470, 'M', 'ѱ'), + (0x471, 'V'), + (0x472, 'M', 'ѳ'), + (0x473, 'V'), + (0x474, 'M', 'ѵ'), + (0x475, 'V'), + (0x476, 'M', 'ѷ'), + (0x477, 'V'), + (0x478, 'M', 'ѹ'), + (0x479, 'V'), + (0x47A, 'M', 'ѻ'), + (0x47B, 'V'), + (0x47C, 'M', 'ѽ'), + (0x47D, 'V'), + (0x47E, 'M', 'ѿ'), + (0x47F, 'V'), + (0x480, 'M', 'ҁ'), + (0x481, 'V'), + (0x48A, 'M', 'ҋ'), + (0x48B, 'V'), + (0x48C, 'M', 'ҍ'), + (0x48D, 'V'), + (0x48E, 'M', 'ҏ'), + (0x48F, 'V'), + (0x490, 'M', 'ґ'), + (0x491, 'V'), + (0x492, 'M', 'ғ'), + (0x493, 'V'), + (0x494, 'M', 'ҕ'), + (0x495, 'V'), + (0x496, 'M', 'җ'), + (0x497, 'V'), + (0x498, 'M', 'ҙ'), + (0x499, 'V'), + (0x49A, 'M', 'қ'), + (0x49B, 'V'), + (0x49C, 'M', 'ҝ'), + (0x49D, 'V'), + ] + +def _seg_8() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x49E, 'M', 'ҟ'), + (0x49F, 'V'), + (0x4A0, 'M', 'ҡ'), + (0x4A1, 'V'), + (0x4A2, 'M', 'ң'), + (0x4A3, 'V'), + (0x4A4, 'M', 'ҥ'), + (0x4A5, 'V'), + (0x4A6, 'M', 'ҧ'), + (0x4A7, 'V'), + (0x4A8, 'M', 'ҩ'), + (0x4A9, 'V'), + (0x4AA, 'M', 'ҫ'), + (0x4AB, 'V'), + (0x4AC, 'M', 'ҭ'), + (0x4AD, 'V'), + (0x4AE, 'M', 'ү'), + (0x4AF, 'V'), + (0x4B0, 'M', 'ұ'), + (0x4B1, 'V'), + (0x4B2, 'M', 'ҳ'), + (0x4B3, 'V'), + (0x4B4, 'M', 'ҵ'), + (0x4B5, 'V'), + (0x4B6, 'M', 'ҷ'), + (0x4B7, 'V'), + (0x4B8, 'M', 'ҹ'), + (0x4B9, 'V'), + (0x4BA, 'M', 'һ'), + (0x4BB, 'V'), + (0x4BC, 'M', 'ҽ'), + (0x4BD, 'V'), + (0x4BE, 'M', 'ҿ'), + (0x4BF, 'V'), + (0x4C0, 'X'), + (0x4C1, 'M', 'ӂ'), + (0x4C2, 'V'), + (0x4C3, 'M', 'ӄ'), + (0x4C4, 'V'), + (0x4C5, 'M', 'ӆ'), + (0x4C6, 'V'), + (0x4C7, 'M', 'ӈ'), + (0x4C8, 'V'), + (0x4C9, 'M', 'ӊ'), + (0x4CA, 'V'), + (0x4CB, 'M', 'ӌ'), + (0x4CC, 'V'), + (0x4CD, 'M', 'ӎ'), + (0x4CE, 'V'), + (0x4D0, 'M', 'ӑ'), + (0x4D1, 'V'), + (0x4D2, 'M', 'ӓ'), + (0x4D3, 'V'), + (0x4D4, 'M', 'ӕ'), + (0x4D5, 'V'), + (0x4D6, 'M', 'ӗ'), + (0x4D7, 'V'), + (0x4D8, 'M', 'ә'), + (0x4D9, 'V'), + (0x4DA, 'M', 'ӛ'), + (0x4DB, 'V'), + (0x4DC, 'M', 'ӝ'), + (0x4DD, 'V'), + (0x4DE, 'M', 'ӟ'), + (0x4DF, 'V'), + (0x4E0, 'M', 'ӡ'), + (0x4E1, 'V'), + (0x4E2, 'M', 'ӣ'), + (0x4E3, 'V'), + (0x4E4, 'M', 'ӥ'), + (0x4E5, 'V'), + (0x4E6, 'M', 'ӧ'), + (0x4E7, 'V'), + (0x4E8, 'M', 'ө'), + (0x4E9, 'V'), + (0x4EA, 'M', 'ӫ'), + (0x4EB, 'V'), + (0x4EC, 'M', 'ӭ'), + (0x4ED, 'V'), + (0x4EE, 'M', 'ӯ'), + (0x4EF, 'V'), + (0x4F0, 'M', 'ӱ'), + (0x4F1, 'V'), + (0x4F2, 'M', 'ӳ'), + (0x4F3, 'V'), + (0x4F4, 'M', 'ӵ'), + (0x4F5, 'V'), + (0x4F6, 'M', 'ӷ'), + (0x4F7, 'V'), + (0x4F8, 'M', 'ӹ'), + (0x4F9, 'V'), + (0x4FA, 'M', 'ӻ'), + (0x4FB, 'V'), + (0x4FC, 'M', 'ӽ'), + (0x4FD, 'V'), + (0x4FE, 'M', 'ӿ'), + (0x4FF, 'V'), + (0x500, 'M', 'ԁ'), + (0x501, 'V'), + (0x502, 'M', 'ԃ'), + ] + +def _seg_9() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x503, 'V'), + (0x504, 'M', 'ԅ'), + (0x505, 'V'), + (0x506, 'M', 'ԇ'), + (0x507, 'V'), + (0x508, 'M', 'ԉ'), + (0x509, 'V'), + (0x50A, 'M', 'ԋ'), + (0x50B, 'V'), + (0x50C, 'M', 'ԍ'), + (0x50D, 'V'), + (0x50E, 'M', 'ԏ'), + (0x50F, 'V'), + (0x510, 'M', 'ԑ'), + (0x511, 'V'), + (0x512, 'M', 'ԓ'), + (0x513, 'V'), + (0x514, 'M', 'ԕ'), + (0x515, 'V'), + (0x516, 'M', 'ԗ'), + (0x517, 'V'), + (0x518, 'M', 'ԙ'), + (0x519, 'V'), + (0x51A, 'M', 'ԛ'), + (0x51B, 'V'), + (0x51C, 'M', 'ԝ'), + (0x51D, 'V'), + (0x51E, 'M', 'ԟ'), + (0x51F, 'V'), + (0x520, 'M', 'ԡ'), + (0x521, 'V'), + (0x522, 'M', 'ԣ'), + (0x523, 'V'), + (0x524, 'M', 'ԥ'), + (0x525, 'V'), + (0x526, 'M', 'ԧ'), + (0x527, 'V'), + (0x528, 'M', 'ԩ'), + (0x529, 'V'), + (0x52A, 'M', 'ԫ'), + (0x52B, 'V'), + (0x52C, 'M', 'ԭ'), + (0x52D, 'V'), + (0x52E, 'M', 'ԯ'), + (0x52F, 'V'), + (0x530, 'X'), + (0x531, 'M', 'ա'), + (0x532, 'M', 'բ'), + (0x533, 'M', 'գ'), + (0x534, 'M', 'դ'), + (0x535, 'M', 'ե'), + (0x536, 'M', 'զ'), + (0x537, 'M', 'է'), + (0x538, 'M', 'ը'), + (0x539, 'M', 'թ'), + (0x53A, 'M', 'ժ'), + (0x53B, 'M', 'ի'), + (0x53C, 'M', 'լ'), + (0x53D, 'M', 'խ'), + (0x53E, 'M', 'ծ'), + (0x53F, 'M', 'կ'), + (0x540, 'M', 'հ'), + (0x541, 'M', 'ձ'), + (0x542, 'M', 'ղ'), + (0x543, 'M', 'ճ'), + (0x544, 'M', 'մ'), + (0x545, 'M', 'յ'), + (0x546, 'M', 'ն'), + (0x547, 'M', 'շ'), + (0x548, 'M', 'ո'), + (0x549, 'M', 'չ'), + (0x54A, 'M', 'պ'), + (0x54B, 'M', 'ջ'), + (0x54C, 'M', 'ռ'), + (0x54D, 'M', 'ս'), + (0x54E, 'M', 'վ'), + (0x54F, 'M', 'տ'), + (0x550, 'M', 'ր'), + (0x551, 'M', 'ց'), + (0x552, 'M', 'ւ'), + (0x553, 'M', 'փ'), + (0x554, 'M', 'ք'), + (0x555, 'M', 'օ'), + (0x556, 'M', 'ֆ'), + (0x557, 'X'), + (0x559, 'V'), + (0x587, 'M', 'եւ'), + (0x588, 'V'), + (0x58B, 'X'), + (0x58D, 'V'), + (0x590, 'X'), + (0x591, 'V'), + (0x5C8, 'X'), + (0x5D0, 'V'), + (0x5EB, 'X'), + (0x5EF, 'V'), + (0x5F5, 'X'), + (0x606, 'V'), + (0x61C, 'X'), + (0x61D, 'V'), + ] + +def _seg_10() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x675, 'M', 'اٴ'), + (0x676, 'M', 'وٴ'), + (0x677, 'M', 'ۇٴ'), + (0x678, 'M', 'يٴ'), + (0x679, 'V'), + (0x6DD, 'X'), + (0x6DE, 'V'), + (0x70E, 'X'), + (0x710, 'V'), + (0x74B, 'X'), + (0x74D, 'V'), + (0x7B2, 'X'), + (0x7C0, 'V'), + (0x7FB, 'X'), + (0x7FD, 'V'), + (0x82E, 'X'), + (0x830, 'V'), + (0x83F, 'X'), + (0x840, 'V'), + (0x85C, 'X'), + (0x85E, 'V'), + (0x85F, 'X'), + (0x860, 'V'), + (0x86B, 'X'), + (0x870, 'V'), + (0x88F, 'X'), + (0x898, 'V'), + (0x8E2, 'X'), + (0x8E3, 'V'), + (0x958, 'M', 'क़'), + (0x959, 'M', 'ख़'), + (0x95A, 'M', 'ग़'), + (0x95B, 'M', 'ज़'), + (0x95C, 'M', 'ड़'), + (0x95D, 'M', 'ढ़'), + (0x95E, 'M', 'फ़'), + (0x95F, 'M', 'य़'), + (0x960, 'V'), + (0x984, 'X'), + (0x985, 'V'), + (0x98D, 'X'), + (0x98F, 'V'), + (0x991, 'X'), + (0x993, 'V'), + (0x9A9, 'X'), + (0x9AA, 'V'), + (0x9B1, 'X'), + (0x9B2, 'V'), + (0x9B3, 'X'), + (0x9B6, 'V'), + (0x9BA, 'X'), + (0x9BC, 'V'), + (0x9C5, 'X'), + (0x9C7, 'V'), + (0x9C9, 'X'), + (0x9CB, 'V'), + (0x9CF, 'X'), + (0x9D7, 'V'), + (0x9D8, 'X'), + (0x9DC, 'M', 'ড়'), + (0x9DD, 'M', 'ঢ়'), + (0x9DE, 'X'), + (0x9DF, 'M', 'য়'), + (0x9E0, 'V'), + (0x9E4, 'X'), + (0x9E6, 'V'), + (0x9FF, 'X'), + (0xA01, 'V'), + (0xA04, 'X'), + (0xA05, 'V'), + (0xA0B, 'X'), + (0xA0F, 'V'), + (0xA11, 'X'), + (0xA13, 'V'), + (0xA29, 'X'), + (0xA2A, 'V'), + (0xA31, 'X'), + (0xA32, 'V'), + (0xA33, 'M', 'ਲ਼'), + (0xA34, 'X'), + (0xA35, 'V'), + (0xA36, 'M', 'ਸ਼'), + (0xA37, 'X'), + (0xA38, 'V'), + (0xA3A, 'X'), + (0xA3C, 'V'), + (0xA3D, 'X'), + (0xA3E, 'V'), + (0xA43, 'X'), + (0xA47, 'V'), + (0xA49, 'X'), + (0xA4B, 'V'), + (0xA4E, 'X'), + (0xA51, 'V'), + (0xA52, 'X'), + (0xA59, 'M', 'ਖ਼'), + (0xA5A, 'M', 'ਗ਼'), + (0xA5B, 'M', 'ਜ਼'), + (0xA5C, 'V'), + (0xA5D, 'X'), + ] + +def _seg_11() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xA5E, 'M', 'ਫ਼'), + (0xA5F, 'X'), + (0xA66, 'V'), + (0xA77, 'X'), + (0xA81, 'V'), + (0xA84, 'X'), + (0xA85, 'V'), + (0xA8E, 'X'), + (0xA8F, 'V'), + (0xA92, 'X'), + (0xA93, 'V'), + (0xAA9, 'X'), + (0xAAA, 'V'), + (0xAB1, 'X'), + (0xAB2, 'V'), + (0xAB4, 'X'), + (0xAB5, 'V'), + (0xABA, 'X'), + (0xABC, 'V'), + (0xAC6, 'X'), + (0xAC7, 'V'), + (0xACA, 'X'), + (0xACB, 'V'), + (0xACE, 'X'), + (0xAD0, 'V'), + (0xAD1, 'X'), + (0xAE0, 'V'), + (0xAE4, 'X'), + (0xAE6, 'V'), + (0xAF2, 'X'), + (0xAF9, 'V'), + (0xB00, 'X'), + (0xB01, 'V'), + (0xB04, 'X'), + (0xB05, 'V'), + (0xB0D, 'X'), + (0xB0F, 'V'), + (0xB11, 'X'), + (0xB13, 'V'), + (0xB29, 'X'), + (0xB2A, 'V'), + (0xB31, 'X'), + (0xB32, 'V'), + (0xB34, 'X'), + (0xB35, 'V'), + (0xB3A, 'X'), + (0xB3C, 'V'), + (0xB45, 'X'), + (0xB47, 'V'), + (0xB49, 'X'), + (0xB4B, 'V'), + (0xB4E, 'X'), + (0xB55, 'V'), + (0xB58, 'X'), + (0xB5C, 'M', 'ଡ଼'), + (0xB5D, 'M', 'ଢ଼'), + (0xB5E, 'X'), + (0xB5F, 'V'), + (0xB64, 'X'), + (0xB66, 'V'), + (0xB78, 'X'), + (0xB82, 'V'), + (0xB84, 'X'), + (0xB85, 'V'), + (0xB8B, 'X'), + (0xB8E, 'V'), + (0xB91, 'X'), + (0xB92, 'V'), + (0xB96, 'X'), + (0xB99, 'V'), + (0xB9B, 'X'), + (0xB9C, 'V'), + (0xB9D, 'X'), + (0xB9E, 'V'), + (0xBA0, 'X'), + (0xBA3, 'V'), + (0xBA5, 'X'), + (0xBA8, 'V'), + (0xBAB, 'X'), + (0xBAE, 'V'), + (0xBBA, 'X'), + (0xBBE, 'V'), + (0xBC3, 'X'), + (0xBC6, 'V'), + (0xBC9, 'X'), + (0xBCA, 'V'), + (0xBCE, 'X'), + (0xBD0, 'V'), + (0xBD1, 'X'), + (0xBD7, 'V'), + (0xBD8, 'X'), + (0xBE6, 'V'), + (0xBFB, 'X'), + (0xC00, 'V'), + (0xC0D, 'X'), + (0xC0E, 'V'), + (0xC11, 'X'), + (0xC12, 'V'), + (0xC29, 'X'), + (0xC2A, 'V'), + ] + +def _seg_12() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xC3A, 'X'), + (0xC3C, 'V'), + (0xC45, 'X'), + (0xC46, 'V'), + (0xC49, 'X'), + (0xC4A, 'V'), + (0xC4E, 'X'), + (0xC55, 'V'), + (0xC57, 'X'), + (0xC58, 'V'), + (0xC5B, 'X'), + (0xC5D, 'V'), + (0xC5E, 'X'), + (0xC60, 'V'), + (0xC64, 'X'), + (0xC66, 'V'), + (0xC70, 'X'), + (0xC77, 'V'), + (0xC8D, 'X'), + (0xC8E, 'V'), + (0xC91, 'X'), + (0xC92, 'V'), + (0xCA9, 'X'), + (0xCAA, 'V'), + (0xCB4, 'X'), + (0xCB5, 'V'), + (0xCBA, 'X'), + (0xCBC, 'V'), + (0xCC5, 'X'), + (0xCC6, 'V'), + (0xCC9, 'X'), + (0xCCA, 'V'), + (0xCCE, 'X'), + (0xCD5, 'V'), + (0xCD7, 'X'), + (0xCDD, 'V'), + (0xCDF, 'X'), + (0xCE0, 'V'), + (0xCE4, 'X'), + (0xCE6, 'V'), + (0xCF0, 'X'), + (0xCF1, 'V'), + (0xCF4, 'X'), + (0xD00, 'V'), + (0xD0D, 'X'), + (0xD0E, 'V'), + (0xD11, 'X'), + (0xD12, 'V'), + (0xD45, 'X'), + (0xD46, 'V'), + (0xD49, 'X'), + (0xD4A, 'V'), + (0xD50, 'X'), + (0xD54, 'V'), + (0xD64, 'X'), + (0xD66, 'V'), + (0xD80, 'X'), + (0xD81, 'V'), + (0xD84, 'X'), + (0xD85, 'V'), + (0xD97, 'X'), + (0xD9A, 'V'), + (0xDB2, 'X'), + (0xDB3, 'V'), + (0xDBC, 'X'), + (0xDBD, 'V'), + (0xDBE, 'X'), + (0xDC0, 'V'), + (0xDC7, 'X'), + (0xDCA, 'V'), + (0xDCB, 'X'), + (0xDCF, 'V'), + (0xDD5, 'X'), + (0xDD6, 'V'), + (0xDD7, 'X'), + (0xDD8, 'V'), + (0xDE0, 'X'), + (0xDE6, 'V'), + (0xDF0, 'X'), + (0xDF2, 'V'), + (0xDF5, 'X'), + (0xE01, 'V'), + (0xE33, 'M', 'ํา'), + (0xE34, 'V'), + (0xE3B, 'X'), + (0xE3F, 'V'), + (0xE5C, 'X'), + (0xE81, 'V'), + (0xE83, 'X'), + (0xE84, 'V'), + (0xE85, 'X'), + (0xE86, 'V'), + (0xE8B, 'X'), + (0xE8C, 'V'), + (0xEA4, 'X'), + (0xEA5, 'V'), + (0xEA6, 'X'), + (0xEA7, 'V'), + (0xEB3, 'M', 'ໍາ'), + (0xEB4, 'V'), + ] + +def _seg_13() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xEBE, 'X'), + (0xEC0, 'V'), + (0xEC5, 'X'), + (0xEC6, 'V'), + (0xEC7, 'X'), + (0xEC8, 'V'), + (0xECF, 'X'), + (0xED0, 'V'), + (0xEDA, 'X'), + (0xEDC, 'M', 'ຫນ'), + (0xEDD, 'M', 'ຫມ'), + (0xEDE, 'V'), + (0xEE0, 'X'), + (0xF00, 'V'), + (0xF0C, 'M', '་'), + (0xF0D, 'V'), + (0xF43, 'M', 'གྷ'), + (0xF44, 'V'), + (0xF48, 'X'), + (0xF49, 'V'), + (0xF4D, 'M', 'ཌྷ'), + (0xF4E, 'V'), + (0xF52, 'M', 'དྷ'), + (0xF53, 'V'), + (0xF57, 'M', 'བྷ'), + (0xF58, 'V'), + (0xF5C, 'M', 'ཛྷ'), + (0xF5D, 'V'), + (0xF69, 'M', 'ཀྵ'), + (0xF6A, 'V'), + (0xF6D, 'X'), + (0xF71, 'V'), + (0xF73, 'M', 'ཱི'), + (0xF74, 'V'), + (0xF75, 'M', 'ཱུ'), + (0xF76, 'M', 'ྲྀ'), + (0xF77, 'M', 'ྲཱྀ'), + (0xF78, 'M', 'ླྀ'), + (0xF79, 'M', 'ླཱྀ'), + (0xF7A, 'V'), + (0xF81, 'M', 'ཱྀ'), + (0xF82, 'V'), + (0xF93, 'M', 'ྒྷ'), + (0xF94, 'V'), + (0xF98, 'X'), + (0xF99, 'V'), + (0xF9D, 'M', 'ྜྷ'), + (0xF9E, 'V'), + (0xFA2, 'M', 'ྡྷ'), + (0xFA3, 'V'), + (0xFA7, 'M', 'ྦྷ'), + (0xFA8, 'V'), + (0xFAC, 'M', 'ྫྷ'), + (0xFAD, 'V'), + (0xFB9, 'M', 'ྐྵ'), + (0xFBA, 'V'), + (0xFBD, 'X'), + (0xFBE, 'V'), + (0xFCD, 'X'), + (0xFCE, 'V'), + (0xFDB, 'X'), + (0x1000, 'V'), + (0x10A0, 'X'), + (0x10C7, 'M', 'ⴧ'), + (0x10C8, 'X'), + (0x10CD, 'M', 'ⴭ'), + (0x10CE, 'X'), + (0x10D0, 'V'), + (0x10FC, 'M', 'ნ'), + (0x10FD, 'V'), + (0x115F, 'X'), + (0x1161, 'V'), + (0x1249, 'X'), + (0x124A, 'V'), + (0x124E, 'X'), + (0x1250, 'V'), + (0x1257, 'X'), + (0x1258, 'V'), + (0x1259, 'X'), + (0x125A, 'V'), + (0x125E, 'X'), + (0x1260, 'V'), + (0x1289, 'X'), + (0x128A, 'V'), + (0x128E, 'X'), + (0x1290, 'V'), + (0x12B1, 'X'), + (0x12B2, 'V'), + (0x12B6, 'X'), + (0x12B8, 'V'), + (0x12BF, 'X'), + (0x12C0, 'V'), + (0x12C1, 'X'), + (0x12C2, 'V'), + (0x12C6, 'X'), + (0x12C8, 'V'), + (0x12D7, 'X'), + (0x12D8, 'V'), + (0x1311, 'X'), + (0x1312, 'V'), + ] + +def _seg_14() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1316, 'X'), + (0x1318, 'V'), + (0x135B, 'X'), + (0x135D, 'V'), + (0x137D, 'X'), + (0x1380, 'V'), + (0x139A, 'X'), + (0x13A0, 'V'), + (0x13F6, 'X'), + (0x13F8, 'M', 'Ᏸ'), + (0x13F9, 'M', 'Ᏹ'), + (0x13FA, 'M', 'Ᏺ'), + (0x13FB, 'M', 'Ᏻ'), + (0x13FC, 'M', 'Ᏼ'), + (0x13FD, 'M', 'Ᏽ'), + (0x13FE, 'X'), + (0x1400, 'V'), + (0x1680, 'X'), + (0x1681, 'V'), + (0x169D, 'X'), + (0x16A0, 'V'), + (0x16F9, 'X'), + (0x1700, 'V'), + (0x1716, 'X'), + (0x171F, 'V'), + (0x1737, 'X'), + (0x1740, 'V'), + (0x1754, 'X'), + (0x1760, 'V'), + (0x176D, 'X'), + (0x176E, 'V'), + (0x1771, 'X'), + (0x1772, 'V'), + (0x1774, 'X'), + (0x1780, 'V'), + (0x17B4, 'X'), + (0x17B6, 'V'), + (0x17DE, 'X'), + (0x17E0, 'V'), + (0x17EA, 'X'), + (0x17F0, 'V'), + (0x17FA, 'X'), + (0x1800, 'V'), + (0x1806, 'X'), + (0x1807, 'V'), + (0x180B, 'I'), + (0x180E, 'X'), + (0x180F, 'I'), + (0x1810, 'V'), + (0x181A, 'X'), + (0x1820, 'V'), + (0x1879, 'X'), + (0x1880, 'V'), + (0x18AB, 'X'), + (0x18B0, 'V'), + (0x18F6, 'X'), + (0x1900, 'V'), + (0x191F, 'X'), + (0x1920, 'V'), + (0x192C, 'X'), + (0x1930, 'V'), + (0x193C, 'X'), + (0x1940, 'V'), + (0x1941, 'X'), + (0x1944, 'V'), + (0x196E, 'X'), + (0x1970, 'V'), + (0x1975, 'X'), + (0x1980, 'V'), + (0x19AC, 'X'), + (0x19B0, 'V'), + (0x19CA, 'X'), + (0x19D0, 'V'), + (0x19DB, 'X'), + (0x19DE, 'V'), + (0x1A1C, 'X'), + (0x1A1E, 'V'), + (0x1A5F, 'X'), + (0x1A60, 'V'), + (0x1A7D, 'X'), + (0x1A7F, 'V'), + (0x1A8A, 'X'), + (0x1A90, 'V'), + (0x1A9A, 'X'), + (0x1AA0, 'V'), + (0x1AAE, 'X'), + (0x1AB0, 'V'), + (0x1ACF, 'X'), + (0x1B00, 'V'), + (0x1B4D, 'X'), + (0x1B50, 'V'), + (0x1B7F, 'X'), + (0x1B80, 'V'), + (0x1BF4, 'X'), + (0x1BFC, 'V'), + (0x1C38, 'X'), + (0x1C3B, 'V'), + (0x1C4A, 'X'), + (0x1C4D, 'V'), + (0x1C80, 'M', 'в'), + ] + +def _seg_15() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1C81, 'M', 'д'), + (0x1C82, 'M', 'о'), + (0x1C83, 'M', 'с'), + (0x1C84, 'M', 'т'), + (0x1C86, 'M', 'ъ'), + (0x1C87, 'M', 'ѣ'), + (0x1C88, 'M', 'ꙋ'), + (0x1C89, 'X'), + (0x1C90, 'M', 'ა'), + (0x1C91, 'M', 'ბ'), + (0x1C92, 'M', 'გ'), + (0x1C93, 'M', 'დ'), + (0x1C94, 'M', 'ე'), + (0x1C95, 'M', 'ვ'), + (0x1C96, 'M', 'ზ'), + (0x1C97, 'M', 'თ'), + (0x1C98, 'M', 'ი'), + (0x1C99, 'M', 'კ'), + (0x1C9A, 'M', 'ლ'), + (0x1C9B, 'M', 'მ'), + (0x1C9C, 'M', 'ნ'), + (0x1C9D, 'M', 'ო'), + (0x1C9E, 'M', 'პ'), + (0x1C9F, 'M', 'ჟ'), + (0x1CA0, 'M', 'რ'), + (0x1CA1, 'M', 'ს'), + (0x1CA2, 'M', 'ტ'), + (0x1CA3, 'M', 'უ'), + (0x1CA4, 'M', 'ფ'), + (0x1CA5, 'M', 'ქ'), + (0x1CA6, 'M', 'ღ'), + (0x1CA7, 'M', 'ყ'), + (0x1CA8, 'M', 'შ'), + (0x1CA9, 'M', 'ჩ'), + (0x1CAA, 'M', 'ც'), + (0x1CAB, 'M', 'ძ'), + (0x1CAC, 'M', 'წ'), + (0x1CAD, 'M', 'ჭ'), + (0x1CAE, 'M', 'ხ'), + (0x1CAF, 'M', 'ჯ'), + (0x1CB0, 'M', 'ჰ'), + (0x1CB1, 'M', 'ჱ'), + (0x1CB2, 'M', 'ჲ'), + (0x1CB3, 'M', 'ჳ'), + (0x1CB4, 'M', 'ჴ'), + (0x1CB5, 'M', 'ჵ'), + (0x1CB6, 'M', 'ჶ'), + (0x1CB7, 'M', 'ჷ'), + (0x1CB8, 'M', 'ჸ'), + (0x1CB9, 'M', 'ჹ'), + (0x1CBA, 'M', 'ჺ'), + (0x1CBB, 'X'), + (0x1CBD, 'M', 'ჽ'), + (0x1CBE, 'M', 'ჾ'), + (0x1CBF, 'M', 'ჿ'), + (0x1CC0, 'V'), + (0x1CC8, 'X'), + (0x1CD0, 'V'), + (0x1CFB, 'X'), + (0x1D00, 'V'), + (0x1D2C, 'M', 'a'), + (0x1D2D, 'M', 'æ'), + (0x1D2E, 'M', 'b'), + (0x1D2F, 'V'), + (0x1D30, 'M', 'd'), + (0x1D31, 'M', 'e'), + (0x1D32, 'M', 'ǝ'), + (0x1D33, 'M', 'g'), + (0x1D34, 'M', 'h'), + (0x1D35, 'M', 'i'), + (0x1D36, 'M', 'j'), + (0x1D37, 'M', 'k'), + (0x1D38, 'M', 'l'), + (0x1D39, 'M', 'm'), + (0x1D3A, 'M', 'n'), + (0x1D3B, 'V'), + (0x1D3C, 'M', 'o'), + (0x1D3D, 'M', 'ȣ'), + (0x1D3E, 'M', 'p'), + (0x1D3F, 'M', 'r'), + (0x1D40, 'M', 't'), + (0x1D41, 'M', 'u'), + (0x1D42, 'M', 'w'), + (0x1D43, 'M', 'a'), + (0x1D44, 'M', 'ɐ'), + (0x1D45, 'M', 'ɑ'), + (0x1D46, 'M', 'ᴂ'), + (0x1D47, 'M', 'b'), + (0x1D48, 'M', 'd'), + (0x1D49, 'M', 'e'), + (0x1D4A, 'M', 'ə'), + (0x1D4B, 'M', 'ɛ'), + (0x1D4C, 'M', 'ɜ'), + (0x1D4D, 'M', 'g'), + (0x1D4E, 'V'), + (0x1D4F, 'M', 'k'), + (0x1D50, 'M', 'm'), + (0x1D51, 'M', 'ŋ'), + (0x1D52, 'M', 'o'), + (0x1D53, 'M', 'ɔ'), + ] + +def _seg_16() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D54, 'M', 'ᴖ'), + (0x1D55, 'M', 'ᴗ'), + (0x1D56, 'M', 'p'), + (0x1D57, 'M', 't'), + (0x1D58, 'M', 'u'), + (0x1D59, 'M', 'ᴝ'), + (0x1D5A, 'M', 'ɯ'), + (0x1D5B, 'M', 'v'), + (0x1D5C, 'M', 'ᴥ'), + (0x1D5D, 'M', 'β'), + (0x1D5E, 'M', 'γ'), + (0x1D5F, 'M', 'δ'), + (0x1D60, 'M', 'φ'), + (0x1D61, 'M', 'χ'), + (0x1D62, 'M', 'i'), + (0x1D63, 'M', 'r'), + (0x1D64, 'M', 'u'), + (0x1D65, 'M', 'v'), + (0x1D66, 'M', 'β'), + (0x1D67, 'M', 'γ'), + (0x1D68, 'M', 'ρ'), + (0x1D69, 'M', 'φ'), + (0x1D6A, 'M', 'χ'), + (0x1D6B, 'V'), + (0x1D78, 'M', 'н'), + (0x1D79, 'V'), + (0x1D9B, 'M', 'ɒ'), + (0x1D9C, 'M', 'c'), + (0x1D9D, 'M', 'ɕ'), + (0x1D9E, 'M', 'ð'), + (0x1D9F, 'M', 'ɜ'), + (0x1DA0, 'M', 'f'), + (0x1DA1, 'M', 'ɟ'), + (0x1DA2, 'M', 'ɡ'), + (0x1DA3, 'M', 'ɥ'), + (0x1DA4, 'M', 'ɨ'), + (0x1DA5, 'M', 'ɩ'), + (0x1DA6, 'M', 'ɪ'), + (0x1DA7, 'M', 'ᵻ'), + (0x1DA8, 'M', 'ʝ'), + (0x1DA9, 'M', 'ɭ'), + (0x1DAA, 'M', 'ᶅ'), + (0x1DAB, 'M', 'ʟ'), + (0x1DAC, 'M', 'ɱ'), + (0x1DAD, 'M', 'ɰ'), + (0x1DAE, 'M', 'ɲ'), + (0x1DAF, 'M', 'ɳ'), + (0x1DB0, 'M', 'ɴ'), + (0x1DB1, 'M', 'ɵ'), + (0x1DB2, 'M', 'ɸ'), + (0x1DB3, 'M', 'ʂ'), + (0x1DB4, 'M', 'ʃ'), + (0x1DB5, 'M', 'ƫ'), + (0x1DB6, 'M', 'ʉ'), + (0x1DB7, 'M', 'ʊ'), + (0x1DB8, 'M', 'ᴜ'), + (0x1DB9, 'M', 'ʋ'), + (0x1DBA, 'M', 'ʌ'), + (0x1DBB, 'M', 'z'), + (0x1DBC, 'M', 'ʐ'), + (0x1DBD, 'M', 'ʑ'), + (0x1DBE, 'M', 'ʒ'), + (0x1DBF, 'M', 'θ'), + (0x1DC0, 'V'), + (0x1E00, 'M', 'ḁ'), + (0x1E01, 'V'), + (0x1E02, 'M', 'ḃ'), + (0x1E03, 'V'), + (0x1E04, 'M', 'ḅ'), + (0x1E05, 'V'), + (0x1E06, 'M', 'ḇ'), + (0x1E07, 'V'), + (0x1E08, 'M', 'ḉ'), + (0x1E09, 'V'), + (0x1E0A, 'M', 'ḋ'), + (0x1E0B, 'V'), + (0x1E0C, 'M', 'ḍ'), + (0x1E0D, 'V'), + (0x1E0E, 'M', 'ḏ'), + (0x1E0F, 'V'), + (0x1E10, 'M', 'ḑ'), + (0x1E11, 'V'), + (0x1E12, 'M', 'ḓ'), + (0x1E13, 'V'), + (0x1E14, 'M', 'ḕ'), + (0x1E15, 'V'), + (0x1E16, 'M', 'ḗ'), + (0x1E17, 'V'), + (0x1E18, 'M', 'ḙ'), + (0x1E19, 'V'), + (0x1E1A, 'M', 'ḛ'), + (0x1E1B, 'V'), + (0x1E1C, 'M', 'ḝ'), + (0x1E1D, 'V'), + (0x1E1E, 'M', 'ḟ'), + (0x1E1F, 'V'), + (0x1E20, 'M', 'ḡ'), + (0x1E21, 'V'), + (0x1E22, 'M', 'ḣ'), + (0x1E23, 'V'), + ] + +def _seg_17() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1E24, 'M', 'ḥ'), + (0x1E25, 'V'), + (0x1E26, 'M', 'ḧ'), + (0x1E27, 'V'), + (0x1E28, 'M', 'ḩ'), + (0x1E29, 'V'), + (0x1E2A, 'M', 'ḫ'), + (0x1E2B, 'V'), + (0x1E2C, 'M', 'ḭ'), + (0x1E2D, 'V'), + (0x1E2E, 'M', 'ḯ'), + (0x1E2F, 'V'), + (0x1E30, 'M', 'ḱ'), + (0x1E31, 'V'), + (0x1E32, 'M', 'ḳ'), + (0x1E33, 'V'), + (0x1E34, 'M', 'ḵ'), + (0x1E35, 'V'), + (0x1E36, 'M', 'ḷ'), + (0x1E37, 'V'), + (0x1E38, 'M', 'ḹ'), + (0x1E39, 'V'), + (0x1E3A, 'M', 'ḻ'), + (0x1E3B, 'V'), + (0x1E3C, 'M', 'ḽ'), + (0x1E3D, 'V'), + (0x1E3E, 'M', 'ḿ'), + (0x1E3F, 'V'), + (0x1E40, 'M', 'ṁ'), + (0x1E41, 'V'), + (0x1E42, 'M', 'ṃ'), + (0x1E43, 'V'), + (0x1E44, 'M', 'ṅ'), + (0x1E45, 'V'), + (0x1E46, 'M', 'ṇ'), + (0x1E47, 'V'), + (0x1E48, 'M', 'ṉ'), + (0x1E49, 'V'), + (0x1E4A, 'M', 'ṋ'), + (0x1E4B, 'V'), + (0x1E4C, 'M', 'ṍ'), + (0x1E4D, 'V'), + (0x1E4E, 'M', 'ṏ'), + (0x1E4F, 'V'), + (0x1E50, 'M', 'ṑ'), + (0x1E51, 'V'), + (0x1E52, 'M', 'ṓ'), + (0x1E53, 'V'), + (0x1E54, 'M', 'ṕ'), + (0x1E55, 'V'), + (0x1E56, 'M', 'ṗ'), + (0x1E57, 'V'), + (0x1E58, 'M', 'ṙ'), + (0x1E59, 'V'), + (0x1E5A, 'M', 'ṛ'), + (0x1E5B, 'V'), + (0x1E5C, 'M', 'ṝ'), + (0x1E5D, 'V'), + (0x1E5E, 'M', 'ṟ'), + (0x1E5F, 'V'), + (0x1E60, 'M', 'ṡ'), + (0x1E61, 'V'), + (0x1E62, 'M', 'ṣ'), + (0x1E63, 'V'), + (0x1E64, 'M', 'ṥ'), + (0x1E65, 'V'), + (0x1E66, 'M', 'ṧ'), + (0x1E67, 'V'), + (0x1E68, 'M', 'ṩ'), + (0x1E69, 'V'), + (0x1E6A, 'M', 'ṫ'), + (0x1E6B, 'V'), + (0x1E6C, 'M', 'ṭ'), + (0x1E6D, 'V'), + (0x1E6E, 'M', 'ṯ'), + (0x1E6F, 'V'), + (0x1E70, 'M', 'ṱ'), + (0x1E71, 'V'), + (0x1E72, 'M', 'ṳ'), + (0x1E73, 'V'), + (0x1E74, 'M', 'ṵ'), + (0x1E75, 'V'), + (0x1E76, 'M', 'ṷ'), + (0x1E77, 'V'), + (0x1E78, 'M', 'ṹ'), + (0x1E79, 'V'), + (0x1E7A, 'M', 'ṻ'), + (0x1E7B, 'V'), + (0x1E7C, 'M', 'ṽ'), + (0x1E7D, 'V'), + (0x1E7E, 'M', 'ṿ'), + (0x1E7F, 'V'), + (0x1E80, 'M', 'ẁ'), + (0x1E81, 'V'), + (0x1E82, 'M', 'ẃ'), + (0x1E83, 'V'), + (0x1E84, 'M', 'ẅ'), + (0x1E85, 'V'), + (0x1E86, 'M', 'ẇ'), + (0x1E87, 'V'), + ] + +def _seg_18() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1E88, 'M', 'ẉ'), + (0x1E89, 'V'), + (0x1E8A, 'M', 'ẋ'), + (0x1E8B, 'V'), + (0x1E8C, 'M', 'ẍ'), + (0x1E8D, 'V'), + (0x1E8E, 'M', 'ẏ'), + (0x1E8F, 'V'), + (0x1E90, 'M', 'ẑ'), + (0x1E91, 'V'), + (0x1E92, 'M', 'ẓ'), + (0x1E93, 'V'), + (0x1E94, 'M', 'ẕ'), + (0x1E95, 'V'), + (0x1E9A, 'M', 'aʾ'), + (0x1E9B, 'M', 'ṡ'), + (0x1E9C, 'V'), + (0x1E9E, 'M', 'ss'), + (0x1E9F, 'V'), + (0x1EA0, 'M', 'ạ'), + (0x1EA1, 'V'), + (0x1EA2, 'M', 'ả'), + (0x1EA3, 'V'), + (0x1EA4, 'M', 'ấ'), + (0x1EA5, 'V'), + (0x1EA6, 'M', 'ầ'), + (0x1EA7, 'V'), + (0x1EA8, 'M', 'ẩ'), + (0x1EA9, 'V'), + (0x1EAA, 'M', 'ẫ'), + (0x1EAB, 'V'), + (0x1EAC, 'M', 'ậ'), + (0x1EAD, 'V'), + (0x1EAE, 'M', 'ắ'), + (0x1EAF, 'V'), + (0x1EB0, 'M', 'ằ'), + (0x1EB1, 'V'), + (0x1EB2, 'M', 'ẳ'), + (0x1EB3, 'V'), + (0x1EB4, 'M', 'ẵ'), + (0x1EB5, 'V'), + (0x1EB6, 'M', 'ặ'), + (0x1EB7, 'V'), + (0x1EB8, 'M', 'ẹ'), + (0x1EB9, 'V'), + (0x1EBA, 'M', 'ẻ'), + (0x1EBB, 'V'), + (0x1EBC, 'M', 'ẽ'), + (0x1EBD, 'V'), + (0x1EBE, 'M', 'ế'), + (0x1EBF, 'V'), + (0x1EC0, 'M', 'ề'), + (0x1EC1, 'V'), + (0x1EC2, 'M', 'ể'), + (0x1EC3, 'V'), + (0x1EC4, 'M', 'ễ'), + (0x1EC5, 'V'), + (0x1EC6, 'M', 'ệ'), + (0x1EC7, 'V'), + (0x1EC8, 'M', 'ỉ'), + (0x1EC9, 'V'), + (0x1ECA, 'M', 'ị'), + (0x1ECB, 'V'), + (0x1ECC, 'M', 'ọ'), + (0x1ECD, 'V'), + (0x1ECE, 'M', 'ỏ'), + (0x1ECF, 'V'), + (0x1ED0, 'M', 'ố'), + (0x1ED1, 'V'), + (0x1ED2, 'M', 'ồ'), + (0x1ED3, 'V'), + (0x1ED4, 'M', 'ổ'), + (0x1ED5, 'V'), + (0x1ED6, 'M', 'ỗ'), + (0x1ED7, 'V'), + (0x1ED8, 'M', 'ộ'), + (0x1ED9, 'V'), + (0x1EDA, 'M', 'ớ'), + (0x1EDB, 'V'), + (0x1EDC, 'M', 'ờ'), + (0x1EDD, 'V'), + (0x1EDE, 'M', 'ở'), + (0x1EDF, 'V'), + (0x1EE0, 'M', 'ỡ'), + (0x1EE1, 'V'), + (0x1EE2, 'M', 'ợ'), + (0x1EE3, 'V'), + (0x1EE4, 'M', 'ụ'), + (0x1EE5, 'V'), + (0x1EE6, 'M', 'ủ'), + (0x1EE7, 'V'), + (0x1EE8, 'M', 'ứ'), + (0x1EE9, 'V'), + (0x1EEA, 'M', 'ừ'), + (0x1EEB, 'V'), + (0x1EEC, 'M', 'ử'), + (0x1EED, 'V'), + (0x1EEE, 'M', 'ữ'), + (0x1EEF, 'V'), + (0x1EF0, 'M', 'ự'), + ] + +def _seg_19() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1EF1, 'V'), + (0x1EF2, 'M', 'ỳ'), + (0x1EF3, 'V'), + (0x1EF4, 'M', 'ỵ'), + (0x1EF5, 'V'), + (0x1EF6, 'M', 'ỷ'), + (0x1EF7, 'V'), + (0x1EF8, 'M', 'ỹ'), + (0x1EF9, 'V'), + (0x1EFA, 'M', 'ỻ'), + (0x1EFB, 'V'), + (0x1EFC, 'M', 'ỽ'), + (0x1EFD, 'V'), + (0x1EFE, 'M', 'ỿ'), + (0x1EFF, 'V'), + (0x1F08, 'M', 'ἀ'), + (0x1F09, 'M', 'ἁ'), + (0x1F0A, 'M', 'ἂ'), + (0x1F0B, 'M', 'ἃ'), + (0x1F0C, 'M', 'ἄ'), + (0x1F0D, 'M', 'ἅ'), + (0x1F0E, 'M', 'ἆ'), + (0x1F0F, 'M', 'ἇ'), + (0x1F10, 'V'), + (0x1F16, 'X'), + (0x1F18, 'M', 'ἐ'), + (0x1F19, 'M', 'ἑ'), + (0x1F1A, 'M', 'ἒ'), + (0x1F1B, 'M', 'ἓ'), + (0x1F1C, 'M', 'ἔ'), + (0x1F1D, 'M', 'ἕ'), + (0x1F1E, 'X'), + (0x1F20, 'V'), + (0x1F28, 'M', 'ἠ'), + (0x1F29, 'M', 'ἡ'), + (0x1F2A, 'M', 'ἢ'), + (0x1F2B, 'M', 'ἣ'), + (0x1F2C, 'M', 'ἤ'), + (0x1F2D, 'M', 'ἥ'), + (0x1F2E, 'M', 'ἦ'), + (0x1F2F, 'M', 'ἧ'), + (0x1F30, 'V'), + (0x1F38, 'M', 'ἰ'), + (0x1F39, 'M', 'ἱ'), + (0x1F3A, 'M', 'ἲ'), + (0x1F3B, 'M', 'ἳ'), + (0x1F3C, 'M', 'ἴ'), + (0x1F3D, 'M', 'ἵ'), + (0x1F3E, 'M', 'ἶ'), + (0x1F3F, 'M', 'ἷ'), + (0x1F40, 'V'), + (0x1F46, 'X'), + (0x1F48, 'M', 'ὀ'), + (0x1F49, 'M', 'ὁ'), + (0x1F4A, 'M', 'ὂ'), + (0x1F4B, 'M', 'ὃ'), + (0x1F4C, 'M', 'ὄ'), + (0x1F4D, 'M', 'ὅ'), + (0x1F4E, 'X'), + (0x1F50, 'V'), + (0x1F58, 'X'), + (0x1F59, 'M', 'ὑ'), + (0x1F5A, 'X'), + (0x1F5B, 'M', 'ὓ'), + (0x1F5C, 'X'), + (0x1F5D, 'M', 'ὕ'), + (0x1F5E, 'X'), + (0x1F5F, 'M', 'ὗ'), + (0x1F60, 'V'), + (0x1F68, 'M', 'ὠ'), + (0x1F69, 'M', 'ὡ'), + (0x1F6A, 'M', 'ὢ'), + (0x1F6B, 'M', 'ὣ'), + (0x1F6C, 'M', 'ὤ'), + (0x1F6D, 'M', 'ὥ'), + (0x1F6E, 'M', 'ὦ'), + (0x1F6F, 'M', 'ὧ'), + (0x1F70, 'V'), + (0x1F71, 'M', 'ά'), + (0x1F72, 'V'), + (0x1F73, 'M', 'έ'), + (0x1F74, 'V'), + (0x1F75, 'M', 'ή'), + (0x1F76, 'V'), + (0x1F77, 'M', 'ί'), + (0x1F78, 'V'), + (0x1F79, 'M', 'ό'), + (0x1F7A, 'V'), + (0x1F7B, 'M', 'ύ'), + (0x1F7C, 'V'), + (0x1F7D, 'M', 'ώ'), + (0x1F7E, 'X'), + (0x1F80, 'M', 'ἀι'), + (0x1F81, 'M', 'ἁι'), + (0x1F82, 'M', 'ἂι'), + (0x1F83, 'M', 'ἃι'), + (0x1F84, 'M', 'ἄι'), + (0x1F85, 'M', 'ἅι'), + (0x1F86, 'M', 'ἆι'), + (0x1F87, 'M', 'ἇι'), + ] + +def _seg_20() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1F88, 'M', 'ἀι'), + (0x1F89, 'M', 'ἁι'), + (0x1F8A, 'M', 'ἂι'), + (0x1F8B, 'M', 'ἃι'), + (0x1F8C, 'M', 'ἄι'), + (0x1F8D, 'M', 'ἅι'), + (0x1F8E, 'M', 'ἆι'), + (0x1F8F, 'M', 'ἇι'), + (0x1F90, 'M', 'ἠι'), + (0x1F91, 'M', 'ἡι'), + (0x1F92, 'M', 'ἢι'), + (0x1F93, 'M', 'ἣι'), + (0x1F94, 'M', 'ἤι'), + (0x1F95, 'M', 'ἥι'), + (0x1F96, 'M', 'ἦι'), + (0x1F97, 'M', 'ἧι'), + (0x1F98, 'M', 'ἠι'), + (0x1F99, 'M', 'ἡι'), + (0x1F9A, 'M', 'ἢι'), + (0x1F9B, 'M', 'ἣι'), + (0x1F9C, 'M', 'ἤι'), + (0x1F9D, 'M', 'ἥι'), + (0x1F9E, 'M', 'ἦι'), + (0x1F9F, 'M', 'ἧι'), + (0x1FA0, 'M', 'ὠι'), + (0x1FA1, 'M', 'ὡι'), + (0x1FA2, 'M', 'ὢι'), + (0x1FA3, 'M', 'ὣι'), + (0x1FA4, 'M', 'ὤι'), + (0x1FA5, 'M', 'ὥι'), + (0x1FA6, 'M', 'ὦι'), + (0x1FA7, 'M', 'ὧι'), + (0x1FA8, 'M', 'ὠι'), + (0x1FA9, 'M', 'ὡι'), + (0x1FAA, 'M', 'ὢι'), + (0x1FAB, 'M', 'ὣι'), + (0x1FAC, 'M', 'ὤι'), + (0x1FAD, 'M', 'ὥι'), + (0x1FAE, 'M', 'ὦι'), + (0x1FAF, 'M', 'ὧι'), + (0x1FB0, 'V'), + (0x1FB2, 'M', 'ὰι'), + (0x1FB3, 'M', 'αι'), + (0x1FB4, 'M', 'άι'), + (0x1FB5, 'X'), + (0x1FB6, 'V'), + (0x1FB7, 'M', 'ᾶι'), + (0x1FB8, 'M', 'ᾰ'), + (0x1FB9, 'M', 'ᾱ'), + (0x1FBA, 'M', 'ὰ'), + (0x1FBB, 'M', 'ά'), + (0x1FBC, 'M', 'αι'), + (0x1FBD, '3', ' ̓'), + (0x1FBE, 'M', 'ι'), + (0x1FBF, '3', ' ̓'), + (0x1FC0, '3', ' ͂'), + (0x1FC1, '3', ' ̈͂'), + (0x1FC2, 'M', 'ὴι'), + (0x1FC3, 'M', 'ηι'), + (0x1FC4, 'M', 'ήι'), + (0x1FC5, 'X'), + (0x1FC6, 'V'), + (0x1FC7, 'M', 'ῆι'), + (0x1FC8, 'M', 'ὲ'), + (0x1FC9, 'M', 'έ'), + (0x1FCA, 'M', 'ὴ'), + (0x1FCB, 'M', 'ή'), + (0x1FCC, 'M', 'ηι'), + (0x1FCD, '3', ' ̓̀'), + (0x1FCE, '3', ' ̓́'), + (0x1FCF, '3', ' ̓͂'), + (0x1FD0, 'V'), + (0x1FD3, 'M', 'ΐ'), + (0x1FD4, 'X'), + (0x1FD6, 'V'), + (0x1FD8, 'M', 'ῐ'), + (0x1FD9, 'M', 'ῑ'), + (0x1FDA, 'M', 'ὶ'), + (0x1FDB, 'M', 'ί'), + (0x1FDC, 'X'), + (0x1FDD, '3', ' ̔̀'), + (0x1FDE, '3', ' ̔́'), + (0x1FDF, '3', ' ̔͂'), + (0x1FE0, 'V'), + (0x1FE3, 'M', 'ΰ'), + (0x1FE4, 'V'), + (0x1FE8, 'M', 'ῠ'), + (0x1FE9, 'M', 'ῡ'), + (0x1FEA, 'M', 'ὺ'), + (0x1FEB, 'M', 'ύ'), + (0x1FEC, 'M', 'ῥ'), + (0x1FED, '3', ' ̈̀'), + (0x1FEE, '3', ' ̈́'), + (0x1FEF, '3', '`'), + (0x1FF0, 'X'), + (0x1FF2, 'M', 'ὼι'), + (0x1FF3, 'M', 'ωι'), + (0x1FF4, 'M', 'ώι'), + (0x1FF5, 'X'), + (0x1FF6, 'V'), + ] + +def _seg_21() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1FF7, 'M', 'ῶι'), + (0x1FF8, 'M', 'ὸ'), + (0x1FF9, 'M', 'ό'), + (0x1FFA, 'M', 'ὼ'), + (0x1FFB, 'M', 'ώ'), + (0x1FFC, 'M', 'ωι'), + (0x1FFD, '3', ' ́'), + (0x1FFE, '3', ' ̔'), + (0x1FFF, 'X'), + (0x2000, '3', ' '), + (0x200B, 'I'), + (0x200C, 'D', ''), + (0x200E, 'X'), + (0x2010, 'V'), + (0x2011, 'M', '‐'), + (0x2012, 'V'), + (0x2017, '3', ' ̳'), + (0x2018, 'V'), + (0x2024, 'X'), + (0x2027, 'V'), + (0x2028, 'X'), + (0x202F, '3', ' '), + (0x2030, 'V'), + (0x2033, 'M', '′′'), + (0x2034, 'M', '′′′'), + (0x2035, 'V'), + (0x2036, 'M', '‵‵'), + (0x2037, 'M', '‵‵‵'), + (0x2038, 'V'), + (0x203C, '3', '!!'), + (0x203D, 'V'), + (0x203E, '3', ' ̅'), + (0x203F, 'V'), + (0x2047, '3', '??'), + (0x2048, '3', '?!'), + (0x2049, '3', '!?'), + (0x204A, 'V'), + (0x2057, 'M', '′′′′'), + (0x2058, 'V'), + (0x205F, '3', ' '), + (0x2060, 'I'), + (0x2061, 'X'), + (0x2064, 'I'), + (0x2065, 'X'), + (0x2070, 'M', '0'), + (0x2071, 'M', 'i'), + (0x2072, 'X'), + (0x2074, 'M', '4'), + (0x2075, 'M', '5'), + (0x2076, 'M', '6'), + (0x2077, 'M', '7'), + (0x2078, 'M', '8'), + (0x2079, 'M', '9'), + (0x207A, '3', '+'), + (0x207B, 'M', '−'), + (0x207C, '3', '='), + (0x207D, '3', '('), + (0x207E, '3', ')'), + (0x207F, 'M', 'n'), + (0x2080, 'M', '0'), + (0x2081, 'M', '1'), + (0x2082, 'M', '2'), + (0x2083, 'M', '3'), + (0x2084, 'M', '4'), + (0x2085, 'M', '5'), + (0x2086, 'M', '6'), + (0x2087, 'M', '7'), + (0x2088, 'M', '8'), + (0x2089, 'M', '9'), + (0x208A, '3', '+'), + (0x208B, 'M', '−'), + (0x208C, '3', '='), + (0x208D, '3', '('), + (0x208E, '3', ')'), + (0x208F, 'X'), + (0x2090, 'M', 'a'), + (0x2091, 'M', 'e'), + (0x2092, 'M', 'o'), + (0x2093, 'M', 'x'), + (0x2094, 'M', 'ə'), + (0x2095, 'M', 'h'), + (0x2096, 'M', 'k'), + (0x2097, 'M', 'l'), + (0x2098, 'M', 'm'), + (0x2099, 'M', 'n'), + (0x209A, 'M', 'p'), + (0x209B, 'M', 's'), + (0x209C, 'M', 't'), + (0x209D, 'X'), + (0x20A0, 'V'), + (0x20A8, 'M', 'rs'), + (0x20A9, 'V'), + (0x20C1, 'X'), + (0x20D0, 'V'), + (0x20F1, 'X'), + (0x2100, '3', 'a/c'), + (0x2101, '3', 'a/s'), + (0x2102, 'M', 'c'), + (0x2103, 'M', '°c'), + (0x2104, 'V'), + ] + +def _seg_22() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x2105, '3', 'c/o'), + (0x2106, '3', 'c/u'), + (0x2107, 'M', 'ɛ'), + (0x2108, 'V'), + (0x2109, 'M', '°f'), + (0x210A, 'M', 'g'), + (0x210B, 'M', 'h'), + (0x210F, 'M', 'ħ'), + (0x2110, 'M', 'i'), + (0x2112, 'M', 'l'), + (0x2114, 'V'), + (0x2115, 'M', 'n'), + (0x2116, 'M', 'no'), + (0x2117, 'V'), + (0x2119, 'M', 'p'), + (0x211A, 'M', 'q'), + (0x211B, 'M', 'r'), + (0x211E, 'V'), + (0x2120, 'M', 'sm'), + (0x2121, 'M', 'tel'), + (0x2122, 'M', 'tm'), + (0x2123, 'V'), + (0x2124, 'M', 'z'), + (0x2125, 'V'), + (0x2126, 'M', 'ω'), + (0x2127, 'V'), + (0x2128, 'M', 'z'), + (0x2129, 'V'), + (0x212A, 'M', 'k'), + (0x212B, 'M', 'å'), + (0x212C, 'M', 'b'), + (0x212D, 'M', 'c'), + (0x212E, 'V'), + (0x212F, 'M', 'e'), + (0x2131, 'M', 'f'), + (0x2132, 'X'), + (0x2133, 'M', 'm'), + (0x2134, 'M', 'o'), + (0x2135, 'M', 'א'), + (0x2136, 'M', 'ב'), + (0x2137, 'M', 'ג'), + (0x2138, 'M', 'ד'), + (0x2139, 'M', 'i'), + (0x213A, 'V'), + (0x213B, 'M', 'fax'), + (0x213C, 'M', 'π'), + (0x213D, 'M', 'γ'), + (0x213F, 'M', 'π'), + (0x2140, 'M', '∑'), + (0x2141, 'V'), + (0x2145, 'M', 'd'), + (0x2147, 'M', 'e'), + (0x2148, 'M', 'i'), + (0x2149, 'M', 'j'), + (0x214A, 'V'), + (0x2150, 'M', '1⁄7'), + (0x2151, 'M', '1⁄9'), + (0x2152, 'M', '1⁄10'), + (0x2153, 'M', '1⁄3'), + (0x2154, 'M', '2⁄3'), + (0x2155, 'M', '1⁄5'), + (0x2156, 'M', '2⁄5'), + (0x2157, 'M', '3⁄5'), + (0x2158, 'M', '4⁄5'), + (0x2159, 'M', '1⁄6'), + (0x215A, 'M', '5⁄6'), + (0x215B, 'M', '1⁄8'), + (0x215C, 'M', '3⁄8'), + (0x215D, 'M', '5⁄8'), + (0x215E, 'M', '7⁄8'), + (0x215F, 'M', '1⁄'), + (0x2160, 'M', 'i'), + (0x2161, 'M', 'ii'), + (0x2162, 'M', 'iii'), + (0x2163, 'M', 'iv'), + (0x2164, 'M', 'v'), + (0x2165, 'M', 'vi'), + (0x2166, 'M', 'vii'), + (0x2167, 'M', 'viii'), + (0x2168, 'M', 'ix'), + (0x2169, 'M', 'x'), + (0x216A, 'M', 'xi'), + (0x216B, 'M', 'xii'), + (0x216C, 'M', 'l'), + (0x216D, 'M', 'c'), + (0x216E, 'M', 'd'), + (0x216F, 'M', 'm'), + (0x2170, 'M', 'i'), + (0x2171, 'M', 'ii'), + (0x2172, 'M', 'iii'), + (0x2173, 'M', 'iv'), + (0x2174, 'M', 'v'), + (0x2175, 'M', 'vi'), + (0x2176, 'M', 'vii'), + (0x2177, 'M', 'viii'), + (0x2178, 'M', 'ix'), + (0x2179, 'M', 'x'), + (0x217A, 'M', 'xi'), + (0x217B, 'M', 'xii'), + (0x217C, 'M', 'l'), + ] + +def _seg_23() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x217D, 'M', 'c'), + (0x217E, 'M', 'd'), + (0x217F, 'M', 'm'), + (0x2180, 'V'), + (0x2183, 'X'), + (0x2184, 'V'), + (0x2189, 'M', '0⁄3'), + (0x218A, 'V'), + (0x218C, 'X'), + (0x2190, 'V'), + (0x222C, 'M', '∫∫'), + (0x222D, 'M', '∫∫∫'), + (0x222E, 'V'), + (0x222F, 'M', '∮∮'), + (0x2230, 'M', '∮∮∮'), + (0x2231, 'V'), + (0x2260, '3'), + (0x2261, 'V'), + (0x226E, '3'), + (0x2270, 'V'), + (0x2329, 'M', '〈'), + (0x232A, 'M', '〉'), + (0x232B, 'V'), + (0x2427, 'X'), + (0x2440, 'V'), + (0x244B, 'X'), + (0x2460, 'M', '1'), + (0x2461, 'M', '2'), + (0x2462, 'M', '3'), + (0x2463, 'M', '4'), + (0x2464, 'M', '5'), + (0x2465, 'M', '6'), + (0x2466, 'M', '7'), + (0x2467, 'M', '8'), + (0x2468, 'M', '9'), + (0x2469, 'M', '10'), + (0x246A, 'M', '11'), + (0x246B, 'M', '12'), + (0x246C, 'M', '13'), + (0x246D, 'M', '14'), + (0x246E, 'M', '15'), + (0x246F, 'M', '16'), + (0x2470, 'M', '17'), + (0x2471, 'M', '18'), + (0x2472, 'M', '19'), + (0x2473, 'M', '20'), + (0x2474, '3', '(1)'), + (0x2475, '3', '(2)'), + (0x2476, '3', '(3)'), + (0x2477, '3', '(4)'), + (0x2478, '3', '(5)'), + (0x2479, '3', '(6)'), + (0x247A, '3', '(7)'), + (0x247B, '3', '(8)'), + (0x247C, '3', '(9)'), + (0x247D, '3', '(10)'), + (0x247E, '3', '(11)'), + (0x247F, '3', '(12)'), + (0x2480, '3', '(13)'), + (0x2481, '3', '(14)'), + (0x2482, '3', '(15)'), + (0x2483, '3', '(16)'), + (0x2484, '3', '(17)'), + (0x2485, '3', '(18)'), + (0x2486, '3', '(19)'), + (0x2487, '3', '(20)'), + (0x2488, 'X'), + (0x249C, '3', '(a)'), + (0x249D, '3', '(b)'), + (0x249E, '3', '(c)'), + (0x249F, '3', '(d)'), + (0x24A0, '3', '(e)'), + (0x24A1, '3', '(f)'), + (0x24A2, '3', '(g)'), + (0x24A3, '3', '(h)'), + (0x24A4, '3', '(i)'), + (0x24A5, '3', '(j)'), + (0x24A6, '3', '(k)'), + (0x24A7, '3', '(l)'), + (0x24A8, '3', '(m)'), + (0x24A9, '3', '(n)'), + (0x24AA, '3', '(o)'), + (0x24AB, '3', '(p)'), + (0x24AC, '3', '(q)'), + (0x24AD, '3', '(r)'), + (0x24AE, '3', '(s)'), + (0x24AF, '3', '(t)'), + (0x24B0, '3', '(u)'), + (0x24B1, '3', '(v)'), + (0x24B2, '3', '(w)'), + (0x24B3, '3', '(x)'), + (0x24B4, '3', '(y)'), + (0x24B5, '3', '(z)'), + (0x24B6, 'M', 'a'), + (0x24B7, 'M', 'b'), + (0x24B8, 'M', 'c'), + (0x24B9, 'M', 'd'), + (0x24BA, 'M', 'e'), + (0x24BB, 'M', 'f'), + (0x24BC, 'M', 'g'), + ] + +def _seg_24() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x24BD, 'M', 'h'), + (0x24BE, 'M', 'i'), + (0x24BF, 'M', 'j'), + (0x24C0, 'M', 'k'), + (0x24C1, 'M', 'l'), + (0x24C2, 'M', 'm'), + (0x24C3, 'M', 'n'), + (0x24C4, 'M', 'o'), + (0x24C5, 'M', 'p'), + (0x24C6, 'M', 'q'), + (0x24C7, 'M', 'r'), + (0x24C8, 'M', 's'), + (0x24C9, 'M', 't'), + (0x24CA, 'M', 'u'), + (0x24CB, 'M', 'v'), + (0x24CC, 'M', 'w'), + (0x24CD, 'M', 'x'), + (0x24CE, 'M', 'y'), + (0x24CF, 'M', 'z'), + (0x24D0, 'M', 'a'), + (0x24D1, 'M', 'b'), + (0x24D2, 'M', 'c'), + (0x24D3, 'M', 'd'), + (0x24D4, 'M', 'e'), + (0x24D5, 'M', 'f'), + (0x24D6, 'M', 'g'), + (0x24D7, 'M', 'h'), + (0x24D8, 'M', 'i'), + (0x24D9, 'M', 'j'), + (0x24DA, 'M', 'k'), + (0x24DB, 'M', 'l'), + (0x24DC, 'M', 'm'), + (0x24DD, 'M', 'n'), + (0x24DE, 'M', 'o'), + (0x24DF, 'M', 'p'), + (0x24E0, 'M', 'q'), + (0x24E1, 'M', 'r'), + (0x24E2, 'M', 's'), + (0x24E3, 'M', 't'), + (0x24E4, 'M', 'u'), + (0x24E5, 'M', 'v'), + (0x24E6, 'M', 'w'), + (0x24E7, 'M', 'x'), + (0x24E8, 'M', 'y'), + (0x24E9, 'M', 'z'), + (0x24EA, 'M', '0'), + (0x24EB, 'V'), + (0x2A0C, 'M', '∫∫∫∫'), + (0x2A0D, 'V'), + (0x2A74, '3', '::='), + (0x2A75, '3', '=='), + (0x2A76, '3', '==='), + (0x2A77, 'V'), + (0x2ADC, 'M', '⫝̸'), + (0x2ADD, 'V'), + (0x2B74, 'X'), + (0x2B76, 'V'), + (0x2B96, 'X'), + (0x2B97, 'V'), + (0x2C00, 'M', 'ⰰ'), + (0x2C01, 'M', 'ⰱ'), + (0x2C02, 'M', 'ⰲ'), + (0x2C03, 'M', 'ⰳ'), + (0x2C04, 'M', 'ⰴ'), + (0x2C05, 'M', 'ⰵ'), + (0x2C06, 'M', 'ⰶ'), + (0x2C07, 'M', 'ⰷ'), + (0x2C08, 'M', 'ⰸ'), + (0x2C09, 'M', 'ⰹ'), + (0x2C0A, 'M', 'ⰺ'), + (0x2C0B, 'M', 'ⰻ'), + (0x2C0C, 'M', 'ⰼ'), + (0x2C0D, 'M', 'ⰽ'), + (0x2C0E, 'M', 'ⰾ'), + (0x2C0F, 'M', 'ⰿ'), + (0x2C10, 'M', 'ⱀ'), + (0x2C11, 'M', 'ⱁ'), + (0x2C12, 'M', 'ⱂ'), + (0x2C13, 'M', 'ⱃ'), + (0x2C14, 'M', 'ⱄ'), + (0x2C15, 'M', 'ⱅ'), + (0x2C16, 'M', 'ⱆ'), + (0x2C17, 'M', 'ⱇ'), + (0x2C18, 'M', 'ⱈ'), + (0x2C19, 'M', 'ⱉ'), + (0x2C1A, 'M', 'ⱊ'), + (0x2C1B, 'M', 'ⱋ'), + (0x2C1C, 'M', 'ⱌ'), + (0x2C1D, 'M', 'ⱍ'), + (0x2C1E, 'M', 'ⱎ'), + (0x2C1F, 'M', 'ⱏ'), + (0x2C20, 'M', 'ⱐ'), + (0x2C21, 'M', 'ⱑ'), + (0x2C22, 'M', 'ⱒ'), + (0x2C23, 'M', 'ⱓ'), + (0x2C24, 'M', 'ⱔ'), + (0x2C25, 'M', 'ⱕ'), + (0x2C26, 'M', 'ⱖ'), + (0x2C27, 'M', 'ⱗ'), + (0x2C28, 'M', 'ⱘ'), + ] + +def _seg_25() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x2C29, 'M', 'ⱙ'), + (0x2C2A, 'M', 'ⱚ'), + (0x2C2B, 'M', 'ⱛ'), + (0x2C2C, 'M', 'ⱜ'), + (0x2C2D, 'M', 'ⱝ'), + (0x2C2E, 'M', 'ⱞ'), + (0x2C2F, 'M', 'ⱟ'), + (0x2C30, 'V'), + (0x2C60, 'M', 'ⱡ'), + (0x2C61, 'V'), + (0x2C62, 'M', 'ɫ'), + (0x2C63, 'M', 'ᵽ'), + (0x2C64, 'M', 'ɽ'), + (0x2C65, 'V'), + (0x2C67, 'M', 'ⱨ'), + (0x2C68, 'V'), + (0x2C69, 'M', 'ⱪ'), + (0x2C6A, 'V'), + (0x2C6B, 'M', 'ⱬ'), + (0x2C6C, 'V'), + (0x2C6D, 'M', 'ɑ'), + (0x2C6E, 'M', 'ɱ'), + (0x2C6F, 'M', 'ɐ'), + (0x2C70, 'M', 'ɒ'), + (0x2C71, 'V'), + (0x2C72, 'M', 'ⱳ'), + (0x2C73, 'V'), + (0x2C75, 'M', 'ⱶ'), + (0x2C76, 'V'), + (0x2C7C, 'M', 'j'), + (0x2C7D, 'M', 'v'), + (0x2C7E, 'M', 'ȿ'), + (0x2C7F, 'M', 'ɀ'), + (0x2C80, 'M', 'ⲁ'), + (0x2C81, 'V'), + (0x2C82, 'M', 'ⲃ'), + (0x2C83, 'V'), + (0x2C84, 'M', 'ⲅ'), + (0x2C85, 'V'), + (0x2C86, 'M', 'ⲇ'), + (0x2C87, 'V'), + (0x2C88, 'M', 'ⲉ'), + (0x2C89, 'V'), + (0x2C8A, 'M', 'ⲋ'), + (0x2C8B, 'V'), + (0x2C8C, 'M', 'ⲍ'), + (0x2C8D, 'V'), + (0x2C8E, 'M', 'ⲏ'), + (0x2C8F, 'V'), + (0x2C90, 'M', 'ⲑ'), + (0x2C91, 'V'), + (0x2C92, 'M', 'ⲓ'), + (0x2C93, 'V'), + (0x2C94, 'M', 'ⲕ'), + (0x2C95, 'V'), + (0x2C96, 'M', 'ⲗ'), + (0x2C97, 'V'), + (0x2C98, 'M', 'ⲙ'), + (0x2C99, 'V'), + (0x2C9A, 'M', 'ⲛ'), + (0x2C9B, 'V'), + (0x2C9C, 'M', 'ⲝ'), + (0x2C9D, 'V'), + (0x2C9E, 'M', 'ⲟ'), + (0x2C9F, 'V'), + (0x2CA0, 'M', 'ⲡ'), + (0x2CA1, 'V'), + (0x2CA2, 'M', 'ⲣ'), + (0x2CA3, 'V'), + (0x2CA4, 'M', 'ⲥ'), + (0x2CA5, 'V'), + (0x2CA6, 'M', 'ⲧ'), + (0x2CA7, 'V'), + (0x2CA8, 'M', 'ⲩ'), + (0x2CA9, 'V'), + (0x2CAA, 'M', 'ⲫ'), + (0x2CAB, 'V'), + (0x2CAC, 'M', 'ⲭ'), + (0x2CAD, 'V'), + (0x2CAE, 'M', 'ⲯ'), + (0x2CAF, 'V'), + (0x2CB0, 'M', 'ⲱ'), + (0x2CB1, 'V'), + (0x2CB2, 'M', 'ⲳ'), + (0x2CB3, 'V'), + (0x2CB4, 'M', 'ⲵ'), + (0x2CB5, 'V'), + (0x2CB6, 'M', 'ⲷ'), + (0x2CB7, 'V'), + (0x2CB8, 'M', 'ⲹ'), + (0x2CB9, 'V'), + (0x2CBA, 'M', 'ⲻ'), + (0x2CBB, 'V'), + (0x2CBC, 'M', 'ⲽ'), + (0x2CBD, 'V'), + (0x2CBE, 'M', 'ⲿ'), + (0x2CBF, 'V'), + (0x2CC0, 'M', 'ⳁ'), + (0x2CC1, 'V'), + (0x2CC2, 'M', 'ⳃ'), + ] + +def _seg_26() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x2CC3, 'V'), + (0x2CC4, 'M', 'ⳅ'), + (0x2CC5, 'V'), + (0x2CC6, 'M', 'ⳇ'), + (0x2CC7, 'V'), + (0x2CC8, 'M', 'ⳉ'), + (0x2CC9, 'V'), + (0x2CCA, 'M', 'ⳋ'), + (0x2CCB, 'V'), + (0x2CCC, 'M', 'ⳍ'), + (0x2CCD, 'V'), + (0x2CCE, 'M', 'ⳏ'), + (0x2CCF, 'V'), + (0x2CD0, 'M', 'ⳑ'), + (0x2CD1, 'V'), + (0x2CD2, 'M', 'ⳓ'), + (0x2CD3, 'V'), + (0x2CD4, 'M', 'ⳕ'), + (0x2CD5, 'V'), + (0x2CD6, 'M', 'ⳗ'), + (0x2CD7, 'V'), + (0x2CD8, 'M', 'ⳙ'), + (0x2CD9, 'V'), + (0x2CDA, 'M', 'ⳛ'), + (0x2CDB, 'V'), + (0x2CDC, 'M', 'ⳝ'), + (0x2CDD, 'V'), + (0x2CDE, 'M', 'ⳟ'), + (0x2CDF, 'V'), + (0x2CE0, 'M', 'ⳡ'), + (0x2CE1, 'V'), + (0x2CE2, 'M', 'ⳣ'), + (0x2CE3, 'V'), + (0x2CEB, 'M', 'ⳬ'), + (0x2CEC, 'V'), + (0x2CED, 'M', 'ⳮ'), + (0x2CEE, 'V'), + (0x2CF2, 'M', 'ⳳ'), + (0x2CF3, 'V'), + (0x2CF4, 'X'), + (0x2CF9, 'V'), + (0x2D26, 'X'), + (0x2D27, 'V'), + (0x2D28, 'X'), + (0x2D2D, 'V'), + (0x2D2E, 'X'), + (0x2D30, 'V'), + (0x2D68, 'X'), + (0x2D6F, 'M', 'ⵡ'), + (0x2D70, 'V'), + (0x2D71, 'X'), + (0x2D7F, 'V'), + (0x2D97, 'X'), + (0x2DA0, 'V'), + (0x2DA7, 'X'), + (0x2DA8, 'V'), + (0x2DAF, 'X'), + (0x2DB0, 'V'), + (0x2DB7, 'X'), + (0x2DB8, 'V'), + (0x2DBF, 'X'), + (0x2DC0, 'V'), + (0x2DC7, 'X'), + (0x2DC8, 'V'), + (0x2DCF, 'X'), + (0x2DD0, 'V'), + (0x2DD7, 'X'), + (0x2DD8, 'V'), + (0x2DDF, 'X'), + (0x2DE0, 'V'), + (0x2E5E, 'X'), + (0x2E80, 'V'), + (0x2E9A, 'X'), + (0x2E9B, 'V'), + (0x2E9F, 'M', '母'), + (0x2EA0, 'V'), + (0x2EF3, 'M', '龟'), + (0x2EF4, 'X'), + (0x2F00, 'M', '一'), + (0x2F01, 'M', '丨'), + (0x2F02, 'M', '丶'), + (0x2F03, 'M', '丿'), + (0x2F04, 'M', '乙'), + (0x2F05, 'M', '亅'), + (0x2F06, 'M', '二'), + (0x2F07, 'M', '亠'), + (0x2F08, 'M', '人'), + (0x2F09, 'M', '儿'), + (0x2F0A, 'M', '入'), + (0x2F0B, 'M', '八'), + (0x2F0C, 'M', '冂'), + (0x2F0D, 'M', '冖'), + (0x2F0E, 'M', '冫'), + (0x2F0F, 'M', '几'), + (0x2F10, 'M', '凵'), + (0x2F11, 'M', '刀'), + (0x2F12, 'M', '力'), + (0x2F13, 'M', '勹'), + (0x2F14, 'M', '匕'), + (0x2F15, 'M', '匚'), + ] + +def _seg_27() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x2F16, 'M', '匸'), + (0x2F17, 'M', '十'), + (0x2F18, 'M', '卜'), + (0x2F19, 'M', '卩'), + (0x2F1A, 'M', '厂'), + (0x2F1B, 'M', '厶'), + (0x2F1C, 'M', '又'), + (0x2F1D, 'M', '口'), + (0x2F1E, 'M', '囗'), + (0x2F1F, 'M', '土'), + (0x2F20, 'M', '士'), + (0x2F21, 'M', '夂'), + (0x2F22, 'M', '夊'), + (0x2F23, 'M', '夕'), + (0x2F24, 'M', '大'), + (0x2F25, 'M', '女'), + (0x2F26, 'M', '子'), + (0x2F27, 'M', '宀'), + (0x2F28, 'M', '寸'), + (0x2F29, 'M', '小'), + (0x2F2A, 'M', '尢'), + (0x2F2B, 'M', '尸'), + (0x2F2C, 'M', '屮'), + (0x2F2D, 'M', '山'), + (0x2F2E, 'M', '巛'), + (0x2F2F, 'M', '工'), + (0x2F30, 'M', '己'), + (0x2F31, 'M', '巾'), + (0x2F32, 'M', '干'), + (0x2F33, 'M', '幺'), + (0x2F34, 'M', '广'), + (0x2F35, 'M', '廴'), + (0x2F36, 'M', '廾'), + (0x2F37, 'M', '弋'), + (0x2F38, 'M', '弓'), + (0x2F39, 'M', '彐'), + (0x2F3A, 'M', '彡'), + (0x2F3B, 'M', '彳'), + (0x2F3C, 'M', '心'), + (0x2F3D, 'M', '戈'), + (0x2F3E, 'M', '戶'), + (0x2F3F, 'M', '手'), + (0x2F40, 'M', '支'), + (0x2F41, 'M', '攴'), + (0x2F42, 'M', '文'), + (0x2F43, 'M', '斗'), + (0x2F44, 'M', '斤'), + (0x2F45, 'M', '方'), + (0x2F46, 'M', '无'), + (0x2F47, 'M', '日'), + (0x2F48, 'M', '曰'), + (0x2F49, 'M', '月'), + (0x2F4A, 'M', '木'), + (0x2F4B, 'M', '欠'), + (0x2F4C, 'M', '止'), + (0x2F4D, 'M', '歹'), + (0x2F4E, 'M', '殳'), + (0x2F4F, 'M', '毋'), + (0x2F50, 'M', '比'), + (0x2F51, 'M', '毛'), + (0x2F52, 'M', '氏'), + (0x2F53, 'M', '气'), + (0x2F54, 'M', '水'), + (0x2F55, 'M', '火'), + (0x2F56, 'M', '爪'), + (0x2F57, 'M', '父'), + (0x2F58, 'M', '爻'), + (0x2F59, 'M', '爿'), + (0x2F5A, 'M', '片'), + (0x2F5B, 'M', '牙'), + (0x2F5C, 'M', '牛'), + (0x2F5D, 'M', '犬'), + (0x2F5E, 'M', '玄'), + (0x2F5F, 'M', '玉'), + (0x2F60, 'M', '瓜'), + (0x2F61, 'M', '瓦'), + (0x2F62, 'M', '甘'), + (0x2F63, 'M', '生'), + (0x2F64, 'M', '用'), + (0x2F65, 'M', '田'), + (0x2F66, 'M', '疋'), + (0x2F67, 'M', '疒'), + (0x2F68, 'M', '癶'), + (0x2F69, 'M', '白'), + (0x2F6A, 'M', '皮'), + (0x2F6B, 'M', '皿'), + (0x2F6C, 'M', '目'), + (0x2F6D, 'M', '矛'), + (0x2F6E, 'M', '矢'), + (0x2F6F, 'M', '石'), + (0x2F70, 'M', '示'), + (0x2F71, 'M', '禸'), + (0x2F72, 'M', '禾'), + (0x2F73, 'M', '穴'), + (0x2F74, 'M', '立'), + (0x2F75, 'M', '竹'), + (0x2F76, 'M', '米'), + (0x2F77, 'M', '糸'), + (0x2F78, 'M', '缶'), + (0x2F79, 'M', '网'), + ] + +def _seg_28() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x2F7A, 'M', '羊'), + (0x2F7B, 'M', '羽'), + (0x2F7C, 'M', '老'), + (0x2F7D, 'M', '而'), + (0x2F7E, 'M', '耒'), + (0x2F7F, 'M', '耳'), + (0x2F80, 'M', '聿'), + (0x2F81, 'M', '肉'), + (0x2F82, 'M', '臣'), + (0x2F83, 'M', '自'), + (0x2F84, 'M', '至'), + (0x2F85, 'M', '臼'), + (0x2F86, 'M', '舌'), + (0x2F87, 'M', '舛'), + (0x2F88, 'M', '舟'), + (0x2F89, 'M', '艮'), + (0x2F8A, 'M', '色'), + (0x2F8B, 'M', '艸'), + (0x2F8C, 'M', '虍'), + (0x2F8D, 'M', '虫'), + (0x2F8E, 'M', '血'), + (0x2F8F, 'M', '行'), + (0x2F90, 'M', '衣'), + (0x2F91, 'M', '襾'), + (0x2F92, 'M', '見'), + (0x2F93, 'M', '角'), + (0x2F94, 'M', '言'), + (0x2F95, 'M', '谷'), + (0x2F96, 'M', '豆'), + (0x2F97, 'M', '豕'), + (0x2F98, 'M', '豸'), + (0x2F99, 'M', '貝'), + (0x2F9A, 'M', '赤'), + (0x2F9B, 'M', '走'), + (0x2F9C, 'M', '足'), + (0x2F9D, 'M', '身'), + (0x2F9E, 'M', '車'), + (0x2F9F, 'M', '辛'), + (0x2FA0, 'M', '辰'), + (0x2FA1, 'M', '辵'), + (0x2FA2, 'M', '邑'), + (0x2FA3, 'M', '酉'), + (0x2FA4, 'M', '釆'), + (0x2FA5, 'M', '里'), + (0x2FA6, 'M', '金'), + (0x2FA7, 'M', '長'), + (0x2FA8, 'M', '門'), + (0x2FA9, 'M', '阜'), + (0x2FAA, 'M', '隶'), + (0x2FAB, 'M', '隹'), + (0x2FAC, 'M', '雨'), + (0x2FAD, 'M', '靑'), + (0x2FAE, 'M', '非'), + (0x2FAF, 'M', '面'), + (0x2FB0, 'M', '革'), + (0x2FB1, 'M', '韋'), + (0x2FB2, 'M', '韭'), + (0x2FB3, 'M', '音'), + (0x2FB4, 'M', '頁'), + (0x2FB5, 'M', '風'), + (0x2FB6, 'M', '飛'), + (0x2FB7, 'M', '食'), + (0x2FB8, 'M', '首'), + (0x2FB9, 'M', '香'), + (0x2FBA, 'M', '馬'), + (0x2FBB, 'M', '骨'), + (0x2FBC, 'M', '高'), + (0x2FBD, 'M', '髟'), + (0x2FBE, 'M', '鬥'), + (0x2FBF, 'M', '鬯'), + (0x2FC0, 'M', '鬲'), + (0x2FC1, 'M', '鬼'), + (0x2FC2, 'M', '魚'), + (0x2FC3, 'M', '鳥'), + (0x2FC4, 'M', '鹵'), + (0x2FC5, 'M', '鹿'), + (0x2FC6, 'M', '麥'), + (0x2FC7, 'M', '麻'), + (0x2FC8, 'M', '黃'), + (0x2FC9, 'M', '黍'), + (0x2FCA, 'M', '黑'), + (0x2FCB, 'M', '黹'), + (0x2FCC, 'M', '黽'), + (0x2FCD, 'M', '鼎'), + (0x2FCE, 'M', '鼓'), + (0x2FCF, 'M', '鼠'), + (0x2FD0, 'M', '鼻'), + (0x2FD1, 'M', '齊'), + (0x2FD2, 'M', '齒'), + (0x2FD3, 'M', '龍'), + (0x2FD4, 'M', '龜'), + (0x2FD5, 'M', '龠'), + (0x2FD6, 'X'), + (0x3000, '3', ' '), + (0x3001, 'V'), + (0x3002, 'M', '.'), + (0x3003, 'V'), + (0x3036, 'M', '〒'), + (0x3037, 'V'), + (0x3038, 'M', '十'), + ] + +def _seg_29() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x3039, 'M', '卄'), + (0x303A, 'M', '卅'), + (0x303B, 'V'), + (0x3040, 'X'), + (0x3041, 'V'), + (0x3097, 'X'), + (0x3099, 'V'), + (0x309B, '3', ' ゙'), + (0x309C, '3', ' ゚'), + (0x309D, 'V'), + (0x309F, 'M', 'より'), + (0x30A0, 'V'), + (0x30FF, 'M', 'コト'), + (0x3100, 'X'), + (0x3105, 'V'), + (0x3130, 'X'), + (0x3131, 'M', 'ᄀ'), + (0x3132, 'M', 'ᄁ'), + (0x3133, 'M', 'ᆪ'), + (0x3134, 'M', 'ᄂ'), + (0x3135, 'M', 'ᆬ'), + (0x3136, 'M', 'ᆭ'), + (0x3137, 'M', 'ᄃ'), + (0x3138, 'M', 'ᄄ'), + (0x3139, 'M', 'ᄅ'), + (0x313A, 'M', 'ᆰ'), + (0x313B, 'M', 'ᆱ'), + (0x313C, 'M', 'ᆲ'), + (0x313D, 'M', 'ᆳ'), + (0x313E, 'M', 'ᆴ'), + (0x313F, 'M', 'ᆵ'), + (0x3140, 'M', 'ᄚ'), + (0x3141, 'M', 'ᄆ'), + (0x3142, 'M', 'ᄇ'), + (0x3143, 'M', 'ᄈ'), + (0x3144, 'M', 'ᄡ'), + (0x3145, 'M', 'ᄉ'), + (0x3146, 'M', 'ᄊ'), + (0x3147, 'M', 'ᄋ'), + (0x3148, 'M', 'ᄌ'), + (0x3149, 'M', 'ᄍ'), + (0x314A, 'M', 'ᄎ'), + (0x314B, 'M', 'ᄏ'), + (0x314C, 'M', 'ᄐ'), + (0x314D, 'M', 'ᄑ'), + (0x314E, 'M', 'ᄒ'), + (0x314F, 'M', 'ᅡ'), + (0x3150, 'M', 'ᅢ'), + (0x3151, 'M', 'ᅣ'), + (0x3152, 'M', 'ᅤ'), + (0x3153, 'M', 'ᅥ'), + (0x3154, 'M', 'ᅦ'), + (0x3155, 'M', 'ᅧ'), + (0x3156, 'M', 'ᅨ'), + (0x3157, 'M', 'ᅩ'), + (0x3158, 'M', 'ᅪ'), + (0x3159, 'M', 'ᅫ'), + (0x315A, 'M', 'ᅬ'), + (0x315B, 'M', 'ᅭ'), + (0x315C, 'M', 'ᅮ'), + (0x315D, 'M', 'ᅯ'), + (0x315E, 'M', 'ᅰ'), + (0x315F, 'M', 'ᅱ'), + (0x3160, 'M', 'ᅲ'), + (0x3161, 'M', 'ᅳ'), + (0x3162, 'M', 'ᅴ'), + (0x3163, 'M', 'ᅵ'), + (0x3164, 'X'), + (0x3165, 'M', 'ᄔ'), + (0x3166, 'M', 'ᄕ'), + (0x3167, 'M', 'ᇇ'), + (0x3168, 'M', 'ᇈ'), + (0x3169, 'M', 'ᇌ'), + (0x316A, 'M', 'ᇎ'), + (0x316B, 'M', 'ᇓ'), + (0x316C, 'M', 'ᇗ'), + (0x316D, 'M', 'ᇙ'), + (0x316E, 'M', 'ᄜ'), + (0x316F, 'M', 'ᇝ'), + (0x3170, 'M', 'ᇟ'), + (0x3171, 'M', 'ᄝ'), + (0x3172, 'M', 'ᄞ'), + (0x3173, 'M', 'ᄠ'), + (0x3174, 'M', 'ᄢ'), + (0x3175, 'M', 'ᄣ'), + (0x3176, 'M', 'ᄧ'), + (0x3177, 'M', 'ᄩ'), + (0x3178, 'M', 'ᄫ'), + (0x3179, 'M', 'ᄬ'), + (0x317A, 'M', 'ᄭ'), + (0x317B, 'M', 'ᄮ'), + (0x317C, 'M', 'ᄯ'), + (0x317D, 'M', 'ᄲ'), + (0x317E, 'M', 'ᄶ'), + (0x317F, 'M', 'ᅀ'), + (0x3180, 'M', 'ᅇ'), + (0x3181, 'M', 'ᅌ'), + (0x3182, 'M', 'ᇱ'), + (0x3183, 'M', 'ᇲ'), + (0x3184, 'M', 'ᅗ'), + ] + +def _seg_30() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x3185, 'M', 'ᅘ'), + (0x3186, 'M', 'ᅙ'), + (0x3187, 'M', 'ᆄ'), + (0x3188, 'M', 'ᆅ'), + (0x3189, 'M', 'ᆈ'), + (0x318A, 'M', 'ᆑ'), + (0x318B, 'M', 'ᆒ'), + (0x318C, 'M', 'ᆔ'), + (0x318D, 'M', 'ᆞ'), + (0x318E, 'M', 'ᆡ'), + (0x318F, 'X'), + (0x3190, 'V'), + (0x3192, 'M', '一'), + (0x3193, 'M', '二'), + (0x3194, 'M', '三'), + (0x3195, 'M', '四'), + (0x3196, 'M', '上'), + (0x3197, 'M', '中'), + (0x3198, 'M', '下'), + (0x3199, 'M', '甲'), + (0x319A, 'M', '乙'), + (0x319B, 'M', '丙'), + (0x319C, 'M', '丁'), + (0x319D, 'M', '天'), + (0x319E, 'M', '地'), + (0x319F, 'M', '人'), + (0x31A0, 'V'), + (0x31E4, 'X'), + (0x31F0, 'V'), + (0x3200, '3', '(ᄀ)'), + (0x3201, '3', '(ᄂ)'), + (0x3202, '3', '(ᄃ)'), + (0x3203, '3', '(ᄅ)'), + (0x3204, '3', '(ᄆ)'), + (0x3205, '3', '(ᄇ)'), + (0x3206, '3', '(ᄉ)'), + (0x3207, '3', '(ᄋ)'), + (0x3208, '3', '(ᄌ)'), + (0x3209, '3', '(ᄎ)'), + (0x320A, '3', '(ᄏ)'), + (0x320B, '3', '(ᄐ)'), + (0x320C, '3', '(ᄑ)'), + (0x320D, '3', '(ᄒ)'), + (0x320E, '3', '(가)'), + (0x320F, '3', '(나)'), + (0x3210, '3', '(다)'), + (0x3211, '3', '(라)'), + (0x3212, '3', '(마)'), + (0x3213, '3', '(바)'), + (0x3214, '3', '(사)'), + (0x3215, '3', '(아)'), + (0x3216, '3', '(자)'), + (0x3217, '3', '(차)'), + (0x3218, '3', '(카)'), + (0x3219, '3', '(타)'), + (0x321A, '3', '(파)'), + (0x321B, '3', '(하)'), + (0x321C, '3', '(주)'), + (0x321D, '3', '(오전)'), + (0x321E, '3', '(오후)'), + (0x321F, 'X'), + (0x3220, '3', '(一)'), + (0x3221, '3', '(二)'), + (0x3222, '3', '(三)'), + (0x3223, '3', '(四)'), + (0x3224, '3', '(五)'), + (0x3225, '3', '(六)'), + (0x3226, '3', '(七)'), + (0x3227, '3', '(八)'), + (0x3228, '3', '(九)'), + (0x3229, '3', '(十)'), + (0x322A, '3', '(月)'), + (0x322B, '3', '(火)'), + (0x322C, '3', '(水)'), + (0x322D, '3', '(木)'), + (0x322E, '3', '(金)'), + (0x322F, '3', '(土)'), + (0x3230, '3', '(日)'), + (0x3231, '3', '(株)'), + (0x3232, '3', '(有)'), + (0x3233, '3', '(社)'), + (0x3234, '3', '(名)'), + (0x3235, '3', '(特)'), + (0x3236, '3', '(財)'), + (0x3237, '3', '(祝)'), + (0x3238, '3', '(労)'), + (0x3239, '3', '(代)'), + (0x323A, '3', '(呼)'), + (0x323B, '3', '(学)'), + (0x323C, '3', '(監)'), + (0x323D, '3', '(企)'), + (0x323E, '3', '(資)'), + (0x323F, '3', '(協)'), + (0x3240, '3', '(祭)'), + (0x3241, '3', '(休)'), + (0x3242, '3', '(自)'), + (0x3243, '3', '(至)'), + (0x3244, 'M', '問'), + (0x3245, 'M', '幼'), + (0x3246, 'M', '文'), + ] + +def _seg_31() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x3247, 'M', '箏'), + (0x3248, 'V'), + (0x3250, 'M', 'pte'), + (0x3251, 'M', '21'), + (0x3252, 'M', '22'), + (0x3253, 'M', '23'), + (0x3254, 'M', '24'), + (0x3255, 'M', '25'), + (0x3256, 'M', '26'), + (0x3257, 'M', '27'), + (0x3258, 'M', '28'), + (0x3259, 'M', '29'), + (0x325A, 'M', '30'), + (0x325B, 'M', '31'), + (0x325C, 'M', '32'), + (0x325D, 'M', '33'), + (0x325E, 'M', '34'), + (0x325F, 'M', '35'), + (0x3260, 'M', 'ᄀ'), + (0x3261, 'M', 'ᄂ'), + (0x3262, 'M', 'ᄃ'), + (0x3263, 'M', 'ᄅ'), + (0x3264, 'M', 'ᄆ'), + (0x3265, 'M', 'ᄇ'), + (0x3266, 'M', 'ᄉ'), + (0x3267, 'M', 'ᄋ'), + (0x3268, 'M', 'ᄌ'), + (0x3269, 'M', 'ᄎ'), + (0x326A, 'M', 'ᄏ'), + (0x326B, 'M', 'ᄐ'), + (0x326C, 'M', 'ᄑ'), + (0x326D, 'M', 'ᄒ'), + (0x326E, 'M', '가'), + (0x326F, 'M', '나'), + (0x3270, 'M', '다'), + (0x3271, 'M', '라'), + (0x3272, 'M', '마'), + (0x3273, 'M', '바'), + (0x3274, 'M', '사'), + (0x3275, 'M', '아'), + (0x3276, 'M', '자'), + (0x3277, 'M', '차'), + (0x3278, 'M', '카'), + (0x3279, 'M', '타'), + (0x327A, 'M', '파'), + (0x327B, 'M', '하'), + (0x327C, 'M', '참고'), + (0x327D, 'M', '주의'), + (0x327E, 'M', '우'), + (0x327F, 'V'), + (0x3280, 'M', '一'), + (0x3281, 'M', '二'), + (0x3282, 'M', '三'), + (0x3283, 'M', '四'), + (0x3284, 'M', '五'), + (0x3285, 'M', '六'), + (0x3286, 'M', '七'), + (0x3287, 'M', '八'), + (0x3288, 'M', '九'), + (0x3289, 'M', '十'), + (0x328A, 'M', '月'), + (0x328B, 'M', '火'), + (0x328C, 'M', '水'), + (0x328D, 'M', '木'), + (0x328E, 'M', '金'), + (0x328F, 'M', '土'), + (0x3290, 'M', '日'), + (0x3291, 'M', '株'), + (0x3292, 'M', '有'), + (0x3293, 'M', '社'), + (0x3294, 'M', '名'), + (0x3295, 'M', '特'), + (0x3296, 'M', '財'), + (0x3297, 'M', '祝'), + (0x3298, 'M', '労'), + (0x3299, 'M', '秘'), + (0x329A, 'M', '男'), + (0x329B, 'M', '女'), + (0x329C, 'M', '適'), + (0x329D, 'M', '優'), + (0x329E, 'M', '印'), + (0x329F, 'M', '注'), + (0x32A0, 'M', '項'), + (0x32A1, 'M', '休'), + (0x32A2, 'M', '写'), + (0x32A3, 'M', '正'), + (0x32A4, 'M', '上'), + (0x32A5, 'M', '中'), + (0x32A6, 'M', '下'), + (0x32A7, 'M', '左'), + (0x32A8, 'M', '右'), + (0x32A9, 'M', '医'), + (0x32AA, 'M', '宗'), + (0x32AB, 'M', '学'), + (0x32AC, 'M', '監'), + (0x32AD, 'M', '企'), + (0x32AE, 'M', '資'), + (0x32AF, 'M', '協'), + (0x32B0, 'M', '夜'), + (0x32B1, 'M', '36'), + ] + +def _seg_32() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x32B2, 'M', '37'), + (0x32B3, 'M', '38'), + (0x32B4, 'M', '39'), + (0x32B5, 'M', '40'), + (0x32B6, 'M', '41'), + (0x32B7, 'M', '42'), + (0x32B8, 'M', '43'), + (0x32B9, 'M', '44'), + (0x32BA, 'M', '45'), + (0x32BB, 'M', '46'), + (0x32BC, 'M', '47'), + (0x32BD, 'M', '48'), + (0x32BE, 'M', '49'), + (0x32BF, 'M', '50'), + (0x32C0, 'M', '1月'), + (0x32C1, 'M', '2月'), + (0x32C2, 'M', '3月'), + (0x32C3, 'M', '4月'), + (0x32C4, 'M', '5月'), + (0x32C5, 'M', '6月'), + (0x32C6, 'M', '7月'), + (0x32C7, 'M', '8月'), + (0x32C8, 'M', '9月'), + (0x32C9, 'M', '10月'), + (0x32CA, 'M', '11月'), + (0x32CB, 'M', '12月'), + (0x32CC, 'M', 'hg'), + (0x32CD, 'M', 'erg'), + (0x32CE, 'M', 'ev'), + (0x32CF, 'M', 'ltd'), + (0x32D0, 'M', 'ア'), + (0x32D1, 'M', 'イ'), + (0x32D2, 'M', 'ウ'), + (0x32D3, 'M', 'エ'), + (0x32D4, 'M', 'オ'), + (0x32D5, 'M', 'カ'), + (0x32D6, 'M', 'キ'), + (0x32D7, 'M', 'ク'), + (0x32D8, 'M', 'ケ'), + (0x32D9, 'M', 'コ'), + (0x32DA, 'M', 'サ'), + (0x32DB, 'M', 'シ'), + (0x32DC, 'M', 'ス'), + (0x32DD, 'M', 'セ'), + (0x32DE, 'M', 'ソ'), + (0x32DF, 'M', 'タ'), + (0x32E0, 'M', 'チ'), + (0x32E1, 'M', 'ツ'), + (0x32E2, 'M', 'テ'), + (0x32E3, 'M', 'ト'), + (0x32E4, 'M', 'ナ'), + (0x32E5, 'M', 'ニ'), + (0x32E6, 'M', 'ヌ'), + (0x32E7, 'M', 'ネ'), + (0x32E8, 'M', 'ノ'), + (0x32E9, 'M', 'ハ'), + (0x32EA, 'M', 'ヒ'), + (0x32EB, 'M', 'フ'), + (0x32EC, 'M', 'ヘ'), + (0x32ED, 'M', 'ホ'), + (0x32EE, 'M', 'マ'), + (0x32EF, 'M', 'ミ'), + (0x32F0, 'M', 'ム'), + (0x32F1, 'M', 'メ'), + (0x32F2, 'M', 'モ'), + (0x32F3, 'M', 'ヤ'), + (0x32F4, 'M', 'ユ'), + (0x32F5, 'M', 'ヨ'), + (0x32F6, 'M', 'ラ'), + (0x32F7, 'M', 'リ'), + (0x32F8, 'M', 'ル'), + (0x32F9, 'M', 'レ'), + (0x32FA, 'M', 'ロ'), + (0x32FB, 'M', 'ワ'), + (0x32FC, 'M', 'ヰ'), + (0x32FD, 'M', 'ヱ'), + (0x32FE, 'M', 'ヲ'), + (0x32FF, 'M', '令和'), + (0x3300, 'M', 'アパート'), + (0x3301, 'M', 'アルファ'), + (0x3302, 'M', 'アンペア'), + (0x3303, 'M', 'アール'), + (0x3304, 'M', 'イニング'), + (0x3305, 'M', 'インチ'), + (0x3306, 'M', 'ウォン'), + (0x3307, 'M', 'エスクード'), + (0x3308, 'M', 'エーカー'), + (0x3309, 'M', 'オンス'), + (0x330A, 'M', 'オーム'), + (0x330B, 'M', 'カイリ'), + (0x330C, 'M', 'カラット'), + (0x330D, 'M', 'カロリー'), + (0x330E, 'M', 'ガロン'), + (0x330F, 'M', 'ガンマ'), + (0x3310, 'M', 'ギガ'), + (0x3311, 'M', 'ギニー'), + (0x3312, 'M', 'キュリー'), + (0x3313, 'M', 'ギルダー'), + (0x3314, 'M', 'キロ'), + (0x3315, 'M', 'キログラム'), + ] + +def _seg_33() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x3316, 'M', 'キロメートル'), + (0x3317, 'M', 'キロワット'), + (0x3318, 'M', 'グラム'), + (0x3319, 'M', 'グラムトン'), + (0x331A, 'M', 'クルゼイロ'), + (0x331B, 'M', 'クローネ'), + (0x331C, 'M', 'ケース'), + (0x331D, 'M', 'コルナ'), + (0x331E, 'M', 'コーポ'), + (0x331F, 'M', 'サイクル'), + (0x3320, 'M', 'サンチーム'), + (0x3321, 'M', 'シリング'), + (0x3322, 'M', 'センチ'), + (0x3323, 'M', 'セント'), + (0x3324, 'M', 'ダース'), + (0x3325, 'M', 'デシ'), + (0x3326, 'M', 'ドル'), + (0x3327, 'M', 'トン'), + (0x3328, 'M', 'ナノ'), + (0x3329, 'M', 'ノット'), + (0x332A, 'M', 'ハイツ'), + (0x332B, 'M', 'パーセント'), + (0x332C, 'M', 'パーツ'), + (0x332D, 'M', 'バーレル'), + (0x332E, 'M', 'ピアストル'), + (0x332F, 'M', 'ピクル'), + (0x3330, 'M', 'ピコ'), + (0x3331, 'M', 'ビル'), + (0x3332, 'M', 'ファラッド'), + (0x3333, 'M', 'フィート'), + (0x3334, 'M', 'ブッシェル'), + (0x3335, 'M', 'フラン'), + (0x3336, 'M', 'ヘクタール'), + (0x3337, 'M', 'ペソ'), + (0x3338, 'M', 'ペニヒ'), + (0x3339, 'M', 'ヘルツ'), + (0x333A, 'M', 'ペンス'), + (0x333B, 'M', 'ページ'), + (0x333C, 'M', 'ベータ'), + (0x333D, 'M', 'ポイント'), + (0x333E, 'M', 'ボルト'), + (0x333F, 'M', 'ホン'), + (0x3340, 'M', 'ポンド'), + (0x3341, 'M', 'ホール'), + (0x3342, 'M', 'ホーン'), + (0x3343, 'M', 'マイクロ'), + (0x3344, 'M', 'マイル'), + (0x3345, 'M', 'マッハ'), + (0x3346, 'M', 'マルク'), + (0x3347, 'M', 'マンション'), + (0x3348, 'M', 'ミクロン'), + (0x3349, 'M', 'ミリ'), + (0x334A, 'M', 'ミリバール'), + (0x334B, 'M', 'メガ'), + (0x334C, 'M', 'メガトン'), + (0x334D, 'M', 'メートル'), + (0x334E, 'M', 'ヤード'), + (0x334F, 'M', 'ヤール'), + (0x3350, 'M', 'ユアン'), + (0x3351, 'M', 'リットル'), + (0x3352, 'M', 'リラ'), + (0x3353, 'M', 'ルピー'), + (0x3354, 'M', 'ルーブル'), + (0x3355, 'M', 'レム'), + (0x3356, 'M', 'レントゲン'), + (0x3357, 'M', 'ワット'), + (0x3358, 'M', '0点'), + (0x3359, 'M', '1点'), + (0x335A, 'M', '2点'), + (0x335B, 'M', '3点'), + (0x335C, 'M', '4点'), + (0x335D, 'M', '5点'), + (0x335E, 'M', '6点'), + (0x335F, 'M', '7点'), + (0x3360, 'M', '8点'), + (0x3361, 'M', '9点'), + (0x3362, 'M', '10点'), + (0x3363, 'M', '11点'), + (0x3364, 'M', '12点'), + (0x3365, 'M', '13点'), + (0x3366, 'M', '14点'), + (0x3367, 'M', '15点'), + (0x3368, 'M', '16点'), + (0x3369, 'M', '17点'), + (0x336A, 'M', '18点'), + (0x336B, 'M', '19点'), + (0x336C, 'M', '20点'), + (0x336D, 'M', '21点'), + (0x336E, 'M', '22点'), + (0x336F, 'M', '23点'), + (0x3370, 'M', '24点'), + (0x3371, 'M', 'hpa'), + (0x3372, 'M', 'da'), + (0x3373, 'M', 'au'), + (0x3374, 'M', 'bar'), + (0x3375, 'M', 'ov'), + (0x3376, 'M', 'pc'), + (0x3377, 'M', 'dm'), + (0x3378, 'M', 'dm2'), + (0x3379, 'M', 'dm3'), + ] + +def _seg_34() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x337A, 'M', 'iu'), + (0x337B, 'M', '平成'), + (0x337C, 'M', '昭和'), + (0x337D, 'M', '大正'), + (0x337E, 'M', '明治'), + (0x337F, 'M', '株式会社'), + (0x3380, 'M', 'pa'), + (0x3381, 'M', 'na'), + (0x3382, 'M', 'μa'), + (0x3383, 'M', 'ma'), + (0x3384, 'M', 'ka'), + (0x3385, 'M', 'kb'), + (0x3386, 'M', 'mb'), + (0x3387, 'M', 'gb'), + (0x3388, 'M', 'cal'), + (0x3389, 'M', 'kcal'), + (0x338A, 'M', 'pf'), + (0x338B, 'M', 'nf'), + (0x338C, 'M', 'μf'), + (0x338D, 'M', 'μg'), + (0x338E, 'M', 'mg'), + (0x338F, 'M', 'kg'), + (0x3390, 'M', 'hz'), + (0x3391, 'M', 'khz'), + (0x3392, 'M', 'mhz'), + (0x3393, 'M', 'ghz'), + (0x3394, 'M', 'thz'), + (0x3395, 'M', 'μl'), + (0x3396, 'M', 'ml'), + (0x3397, 'M', 'dl'), + (0x3398, 'M', 'kl'), + (0x3399, 'M', 'fm'), + (0x339A, 'M', 'nm'), + (0x339B, 'M', 'μm'), + (0x339C, 'M', 'mm'), + (0x339D, 'M', 'cm'), + (0x339E, 'M', 'km'), + (0x339F, 'M', 'mm2'), + (0x33A0, 'M', 'cm2'), + (0x33A1, 'M', 'm2'), + (0x33A2, 'M', 'km2'), + (0x33A3, 'M', 'mm3'), + (0x33A4, 'M', 'cm3'), + (0x33A5, 'M', 'm3'), + (0x33A6, 'M', 'km3'), + (0x33A7, 'M', 'm∕s'), + (0x33A8, 'M', 'm∕s2'), + (0x33A9, 'M', 'pa'), + (0x33AA, 'M', 'kpa'), + (0x33AB, 'M', 'mpa'), + (0x33AC, 'M', 'gpa'), + (0x33AD, 'M', 'rad'), + (0x33AE, 'M', 'rad∕s'), + (0x33AF, 'M', 'rad∕s2'), + (0x33B0, 'M', 'ps'), + (0x33B1, 'M', 'ns'), + (0x33B2, 'M', 'μs'), + (0x33B3, 'M', 'ms'), + (0x33B4, 'M', 'pv'), + (0x33B5, 'M', 'nv'), + (0x33B6, 'M', 'μv'), + (0x33B7, 'M', 'mv'), + (0x33B8, 'M', 'kv'), + (0x33B9, 'M', 'mv'), + (0x33BA, 'M', 'pw'), + (0x33BB, 'M', 'nw'), + (0x33BC, 'M', 'μw'), + (0x33BD, 'M', 'mw'), + (0x33BE, 'M', 'kw'), + (0x33BF, 'M', 'mw'), + (0x33C0, 'M', 'kω'), + (0x33C1, 'M', 'mω'), + (0x33C2, 'X'), + (0x33C3, 'M', 'bq'), + (0x33C4, 'M', 'cc'), + (0x33C5, 'M', 'cd'), + (0x33C6, 'M', 'c∕kg'), + (0x33C7, 'X'), + (0x33C8, 'M', 'db'), + (0x33C9, 'M', 'gy'), + (0x33CA, 'M', 'ha'), + (0x33CB, 'M', 'hp'), + (0x33CC, 'M', 'in'), + (0x33CD, 'M', 'kk'), + (0x33CE, 'M', 'km'), + (0x33CF, 'M', 'kt'), + (0x33D0, 'M', 'lm'), + (0x33D1, 'M', 'ln'), + (0x33D2, 'M', 'log'), + (0x33D3, 'M', 'lx'), + (0x33D4, 'M', 'mb'), + (0x33D5, 'M', 'mil'), + (0x33D6, 'M', 'mol'), + (0x33D7, 'M', 'ph'), + (0x33D8, 'X'), + (0x33D9, 'M', 'ppm'), + (0x33DA, 'M', 'pr'), + (0x33DB, 'M', 'sr'), + (0x33DC, 'M', 'sv'), + (0x33DD, 'M', 'wb'), + ] + +def _seg_35() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x33DE, 'M', 'v∕m'), + (0x33DF, 'M', 'a∕m'), + (0x33E0, 'M', '1日'), + (0x33E1, 'M', '2日'), + (0x33E2, 'M', '3日'), + (0x33E3, 'M', '4日'), + (0x33E4, 'M', '5日'), + (0x33E5, 'M', '6日'), + (0x33E6, 'M', '7日'), + (0x33E7, 'M', '8日'), + (0x33E8, 'M', '9日'), + (0x33E9, 'M', '10日'), + (0x33EA, 'M', '11日'), + (0x33EB, 'M', '12日'), + (0x33EC, 'M', '13日'), + (0x33ED, 'M', '14日'), + (0x33EE, 'M', '15日'), + (0x33EF, 'M', '16日'), + (0x33F0, 'M', '17日'), + (0x33F1, 'M', '18日'), + (0x33F2, 'M', '19日'), + (0x33F3, 'M', '20日'), + (0x33F4, 'M', '21日'), + (0x33F5, 'M', '22日'), + (0x33F6, 'M', '23日'), + (0x33F7, 'M', '24日'), + (0x33F8, 'M', '25日'), + (0x33F9, 'M', '26日'), + (0x33FA, 'M', '27日'), + (0x33FB, 'M', '28日'), + (0x33FC, 'M', '29日'), + (0x33FD, 'M', '30日'), + (0x33FE, 'M', '31日'), + (0x33FF, 'M', 'gal'), + (0x3400, 'V'), + (0xA48D, 'X'), + (0xA490, 'V'), + (0xA4C7, 'X'), + (0xA4D0, 'V'), + (0xA62C, 'X'), + (0xA640, 'M', 'ꙁ'), + (0xA641, 'V'), + (0xA642, 'M', 'ꙃ'), + (0xA643, 'V'), + (0xA644, 'M', 'ꙅ'), + (0xA645, 'V'), + (0xA646, 'M', 'ꙇ'), + (0xA647, 'V'), + (0xA648, 'M', 'ꙉ'), + (0xA649, 'V'), + (0xA64A, 'M', 'ꙋ'), + (0xA64B, 'V'), + (0xA64C, 'M', 'ꙍ'), + (0xA64D, 'V'), + (0xA64E, 'M', 'ꙏ'), + (0xA64F, 'V'), + (0xA650, 'M', 'ꙑ'), + (0xA651, 'V'), + (0xA652, 'M', 'ꙓ'), + (0xA653, 'V'), + (0xA654, 'M', 'ꙕ'), + (0xA655, 'V'), + (0xA656, 'M', 'ꙗ'), + (0xA657, 'V'), + (0xA658, 'M', 'ꙙ'), + (0xA659, 'V'), + (0xA65A, 'M', 'ꙛ'), + (0xA65B, 'V'), + (0xA65C, 'M', 'ꙝ'), + (0xA65D, 'V'), + (0xA65E, 'M', 'ꙟ'), + (0xA65F, 'V'), + (0xA660, 'M', 'ꙡ'), + (0xA661, 'V'), + (0xA662, 'M', 'ꙣ'), + (0xA663, 'V'), + (0xA664, 'M', 'ꙥ'), + (0xA665, 'V'), + (0xA666, 'M', 'ꙧ'), + (0xA667, 'V'), + (0xA668, 'M', 'ꙩ'), + (0xA669, 'V'), + (0xA66A, 'M', 'ꙫ'), + (0xA66B, 'V'), + (0xA66C, 'M', 'ꙭ'), + (0xA66D, 'V'), + (0xA680, 'M', 'ꚁ'), + (0xA681, 'V'), + (0xA682, 'M', 'ꚃ'), + (0xA683, 'V'), + (0xA684, 'M', 'ꚅ'), + (0xA685, 'V'), + (0xA686, 'M', 'ꚇ'), + (0xA687, 'V'), + (0xA688, 'M', 'ꚉ'), + (0xA689, 'V'), + (0xA68A, 'M', 'ꚋ'), + (0xA68B, 'V'), + (0xA68C, 'M', 'ꚍ'), + (0xA68D, 'V'), + ] + +def _seg_36() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xA68E, 'M', 'ꚏ'), + (0xA68F, 'V'), + (0xA690, 'M', 'ꚑ'), + (0xA691, 'V'), + (0xA692, 'M', 'ꚓ'), + (0xA693, 'V'), + (0xA694, 'M', 'ꚕ'), + (0xA695, 'V'), + (0xA696, 'M', 'ꚗ'), + (0xA697, 'V'), + (0xA698, 'M', 'ꚙ'), + (0xA699, 'V'), + (0xA69A, 'M', 'ꚛ'), + (0xA69B, 'V'), + (0xA69C, 'M', 'ъ'), + (0xA69D, 'M', 'ь'), + (0xA69E, 'V'), + (0xA6F8, 'X'), + (0xA700, 'V'), + (0xA722, 'M', 'ꜣ'), + (0xA723, 'V'), + (0xA724, 'M', 'ꜥ'), + (0xA725, 'V'), + (0xA726, 'M', 'ꜧ'), + (0xA727, 'V'), + (0xA728, 'M', 'ꜩ'), + (0xA729, 'V'), + (0xA72A, 'M', 'ꜫ'), + (0xA72B, 'V'), + (0xA72C, 'M', 'ꜭ'), + (0xA72D, 'V'), + (0xA72E, 'M', 'ꜯ'), + (0xA72F, 'V'), + (0xA732, 'M', 'ꜳ'), + (0xA733, 'V'), + (0xA734, 'M', 'ꜵ'), + (0xA735, 'V'), + (0xA736, 'M', 'ꜷ'), + (0xA737, 'V'), + (0xA738, 'M', 'ꜹ'), + (0xA739, 'V'), + (0xA73A, 'M', 'ꜻ'), + (0xA73B, 'V'), + (0xA73C, 'M', 'ꜽ'), + (0xA73D, 'V'), + (0xA73E, 'M', 'ꜿ'), + (0xA73F, 'V'), + (0xA740, 'M', 'ꝁ'), + (0xA741, 'V'), + (0xA742, 'M', 'ꝃ'), + (0xA743, 'V'), + (0xA744, 'M', 'ꝅ'), + (0xA745, 'V'), + (0xA746, 'M', 'ꝇ'), + (0xA747, 'V'), + (0xA748, 'M', 'ꝉ'), + (0xA749, 'V'), + (0xA74A, 'M', 'ꝋ'), + (0xA74B, 'V'), + (0xA74C, 'M', 'ꝍ'), + (0xA74D, 'V'), + (0xA74E, 'M', 'ꝏ'), + (0xA74F, 'V'), + (0xA750, 'M', 'ꝑ'), + (0xA751, 'V'), + (0xA752, 'M', 'ꝓ'), + (0xA753, 'V'), + (0xA754, 'M', 'ꝕ'), + (0xA755, 'V'), + (0xA756, 'M', 'ꝗ'), + (0xA757, 'V'), + (0xA758, 'M', 'ꝙ'), + (0xA759, 'V'), + (0xA75A, 'M', 'ꝛ'), + (0xA75B, 'V'), + (0xA75C, 'M', 'ꝝ'), + (0xA75D, 'V'), + (0xA75E, 'M', 'ꝟ'), + (0xA75F, 'V'), + (0xA760, 'M', 'ꝡ'), + (0xA761, 'V'), + (0xA762, 'M', 'ꝣ'), + (0xA763, 'V'), + (0xA764, 'M', 'ꝥ'), + (0xA765, 'V'), + (0xA766, 'M', 'ꝧ'), + (0xA767, 'V'), + (0xA768, 'M', 'ꝩ'), + (0xA769, 'V'), + (0xA76A, 'M', 'ꝫ'), + (0xA76B, 'V'), + (0xA76C, 'M', 'ꝭ'), + (0xA76D, 'V'), + (0xA76E, 'M', 'ꝯ'), + (0xA76F, 'V'), + (0xA770, 'M', 'ꝯ'), + (0xA771, 'V'), + (0xA779, 'M', 'ꝺ'), + (0xA77A, 'V'), + (0xA77B, 'M', 'ꝼ'), + ] + +def _seg_37() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xA77C, 'V'), + (0xA77D, 'M', 'ᵹ'), + (0xA77E, 'M', 'ꝿ'), + (0xA77F, 'V'), + (0xA780, 'M', 'ꞁ'), + (0xA781, 'V'), + (0xA782, 'M', 'ꞃ'), + (0xA783, 'V'), + (0xA784, 'M', 'ꞅ'), + (0xA785, 'V'), + (0xA786, 'M', 'ꞇ'), + (0xA787, 'V'), + (0xA78B, 'M', 'ꞌ'), + (0xA78C, 'V'), + (0xA78D, 'M', 'ɥ'), + (0xA78E, 'V'), + (0xA790, 'M', 'ꞑ'), + (0xA791, 'V'), + (0xA792, 'M', 'ꞓ'), + (0xA793, 'V'), + (0xA796, 'M', 'ꞗ'), + (0xA797, 'V'), + (0xA798, 'M', 'ꞙ'), + (0xA799, 'V'), + (0xA79A, 'M', 'ꞛ'), + (0xA79B, 'V'), + (0xA79C, 'M', 'ꞝ'), + (0xA79D, 'V'), + (0xA79E, 'M', 'ꞟ'), + (0xA79F, 'V'), + (0xA7A0, 'M', 'ꞡ'), + (0xA7A1, 'V'), + (0xA7A2, 'M', 'ꞣ'), + (0xA7A3, 'V'), + (0xA7A4, 'M', 'ꞥ'), + (0xA7A5, 'V'), + (0xA7A6, 'M', 'ꞧ'), + (0xA7A7, 'V'), + (0xA7A8, 'M', 'ꞩ'), + (0xA7A9, 'V'), + (0xA7AA, 'M', 'ɦ'), + (0xA7AB, 'M', 'ɜ'), + (0xA7AC, 'M', 'ɡ'), + (0xA7AD, 'M', 'ɬ'), + (0xA7AE, 'M', 'ɪ'), + (0xA7AF, 'V'), + (0xA7B0, 'M', 'ʞ'), + (0xA7B1, 'M', 'ʇ'), + (0xA7B2, 'M', 'ʝ'), + (0xA7B3, 'M', 'ꭓ'), + (0xA7B4, 'M', 'ꞵ'), + (0xA7B5, 'V'), + (0xA7B6, 'M', 'ꞷ'), + (0xA7B7, 'V'), + (0xA7B8, 'M', 'ꞹ'), + (0xA7B9, 'V'), + (0xA7BA, 'M', 'ꞻ'), + (0xA7BB, 'V'), + (0xA7BC, 'M', 'ꞽ'), + (0xA7BD, 'V'), + (0xA7BE, 'M', 'ꞿ'), + (0xA7BF, 'V'), + (0xA7C0, 'M', 'ꟁ'), + (0xA7C1, 'V'), + (0xA7C2, 'M', 'ꟃ'), + (0xA7C3, 'V'), + (0xA7C4, 'M', 'ꞔ'), + (0xA7C5, 'M', 'ʂ'), + (0xA7C6, 'M', 'ᶎ'), + (0xA7C7, 'M', 'ꟈ'), + (0xA7C8, 'V'), + (0xA7C9, 'M', 'ꟊ'), + (0xA7CA, 'V'), + (0xA7CB, 'X'), + (0xA7D0, 'M', 'ꟑ'), + (0xA7D1, 'V'), + (0xA7D2, 'X'), + (0xA7D3, 'V'), + (0xA7D4, 'X'), + (0xA7D5, 'V'), + (0xA7D6, 'M', 'ꟗ'), + (0xA7D7, 'V'), + (0xA7D8, 'M', 'ꟙ'), + (0xA7D9, 'V'), + (0xA7DA, 'X'), + (0xA7F2, 'M', 'c'), + (0xA7F3, 'M', 'f'), + (0xA7F4, 'M', 'q'), + (0xA7F5, 'M', 'ꟶ'), + (0xA7F6, 'V'), + (0xA7F8, 'M', 'ħ'), + (0xA7F9, 'M', 'œ'), + (0xA7FA, 'V'), + (0xA82D, 'X'), + (0xA830, 'V'), + (0xA83A, 'X'), + (0xA840, 'V'), + (0xA878, 'X'), + (0xA880, 'V'), + (0xA8C6, 'X'), + ] + +def _seg_38() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xA8CE, 'V'), + (0xA8DA, 'X'), + (0xA8E0, 'V'), + (0xA954, 'X'), + (0xA95F, 'V'), + (0xA97D, 'X'), + (0xA980, 'V'), + (0xA9CE, 'X'), + (0xA9CF, 'V'), + (0xA9DA, 'X'), + (0xA9DE, 'V'), + (0xA9FF, 'X'), + (0xAA00, 'V'), + (0xAA37, 'X'), + (0xAA40, 'V'), + (0xAA4E, 'X'), + (0xAA50, 'V'), + (0xAA5A, 'X'), + (0xAA5C, 'V'), + (0xAAC3, 'X'), + (0xAADB, 'V'), + (0xAAF7, 'X'), + (0xAB01, 'V'), + (0xAB07, 'X'), + (0xAB09, 'V'), + (0xAB0F, 'X'), + (0xAB11, 'V'), + (0xAB17, 'X'), + (0xAB20, 'V'), + (0xAB27, 'X'), + (0xAB28, 'V'), + (0xAB2F, 'X'), + (0xAB30, 'V'), + (0xAB5C, 'M', 'ꜧ'), + (0xAB5D, 'M', 'ꬷ'), + (0xAB5E, 'M', 'ɫ'), + (0xAB5F, 'M', 'ꭒ'), + (0xAB60, 'V'), + (0xAB69, 'M', 'ʍ'), + (0xAB6A, 'V'), + (0xAB6C, 'X'), + (0xAB70, 'M', 'Ꭰ'), + (0xAB71, 'M', 'Ꭱ'), + (0xAB72, 'M', 'Ꭲ'), + (0xAB73, 'M', 'Ꭳ'), + (0xAB74, 'M', 'Ꭴ'), + (0xAB75, 'M', 'Ꭵ'), + (0xAB76, 'M', 'Ꭶ'), + (0xAB77, 'M', 'Ꭷ'), + (0xAB78, 'M', 'Ꭸ'), + (0xAB79, 'M', 'Ꭹ'), + (0xAB7A, 'M', 'Ꭺ'), + (0xAB7B, 'M', 'Ꭻ'), + (0xAB7C, 'M', 'Ꭼ'), + (0xAB7D, 'M', 'Ꭽ'), + (0xAB7E, 'M', 'Ꭾ'), + (0xAB7F, 'M', 'Ꭿ'), + (0xAB80, 'M', 'Ꮀ'), + (0xAB81, 'M', 'Ꮁ'), + (0xAB82, 'M', 'Ꮂ'), + (0xAB83, 'M', 'Ꮃ'), + (0xAB84, 'M', 'Ꮄ'), + (0xAB85, 'M', 'Ꮅ'), + (0xAB86, 'M', 'Ꮆ'), + (0xAB87, 'M', 'Ꮇ'), + (0xAB88, 'M', 'Ꮈ'), + (0xAB89, 'M', 'Ꮉ'), + (0xAB8A, 'M', 'Ꮊ'), + (0xAB8B, 'M', 'Ꮋ'), + (0xAB8C, 'M', 'Ꮌ'), + (0xAB8D, 'M', 'Ꮍ'), + (0xAB8E, 'M', 'Ꮎ'), + (0xAB8F, 'M', 'Ꮏ'), + (0xAB90, 'M', 'Ꮐ'), + (0xAB91, 'M', 'Ꮑ'), + (0xAB92, 'M', 'Ꮒ'), + (0xAB93, 'M', 'Ꮓ'), + (0xAB94, 'M', 'Ꮔ'), + (0xAB95, 'M', 'Ꮕ'), + (0xAB96, 'M', 'Ꮖ'), + (0xAB97, 'M', 'Ꮗ'), + (0xAB98, 'M', 'Ꮘ'), + (0xAB99, 'M', 'Ꮙ'), + (0xAB9A, 'M', 'Ꮚ'), + (0xAB9B, 'M', 'Ꮛ'), + (0xAB9C, 'M', 'Ꮜ'), + (0xAB9D, 'M', 'Ꮝ'), + (0xAB9E, 'M', 'Ꮞ'), + (0xAB9F, 'M', 'Ꮟ'), + (0xABA0, 'M', 'Ꮠ'), + (0xABA1, 'M', 'Ꮡ'), + (0xABA2, 'M', 'Ꮢ'), + (0xABA3, 'M', 'Ꮣ'), + (0xABA4, 'M', 'Ꮤ'), + (0xABA5, 'M', 'Ꮥ'), + (0xABA6, 'M', 'Ꮦ'), + (0xABA7, 'M', 'Ꮧ'), + (0xABA8, 'M', 'Ꮨ'), + (0xABA9, 'M', 'Ꮩ'), + (0xABAA, 'M', 'Ꮪ'), + ] + +def _seg_39() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xABAB, 'M', 'Ꮫ'), + (0xABAC, 'M', 'Ꮬ'), + (0xABAD, 'M', 'Ꮭ'), + (0xABAE, 'M', 'Ꮮ'), + (0xABAF, 'M', 'Ꮯ'), + (0xABB0, 'M', 'Ꮰ'), + (0xABB1, 'M', 'Ꮱ'), + (0xABB2, 'M', 'Ꮲ'), + (0xABB3, 'M', 'Ꮳ'), + (0xABB4, 'M', 'Ꮴ'), + (0xABB5, 'M', 'Ꮵ'), + (0xABB6, 'M', 'Ꮶ'), + (0xABB7, 'M', 'Ꮷ'), + (0xABB8, 'M', 'Ꮸ'), + (0xABB9, 'M', 'Ꮹ'), + (0xABBA, 'M', 'Ꮺ'), + (0xABBB, 'M', 'Ꮻ'), + (0xABBC, 'M', 'Ꮼ'), + (0xABBD, 'M', 'Ꮽ'), + (0xABBE, 'M', 'Ꮾ'), + (0xABBF, 'M', 'Ꮿ'), + (0xABC0, 'V'), + (0xABEE, 'X'), + (0xABF0, 'V'), + (0xABFA, 'X'), + (0xAC00, 'V'), + (0xD7A4, 'X'), + (0xD7B0, 'V'), + (0xD7C7, 'X'), + (0xD7CB, 'V'), + (0xD7FC, 'X'), + (0xF900, 'M', '豈'), + (0xF901, 'M', '更'), + (0xF902, 'M', '車'), + (0xF903, 'M', '賈'), + (0xF904, 'M', '滑'), + (0xF905, 'M', '串'), + (0xF906, 'M', '句'), + (0xF907, 'M', '龜'), + (0xF909, 'M', '契'), + (0xF90A, 'M', '金'), + (0xF90B, 'M', '喇'), + (0xF90C, 'M', '奈'), + (0xF90D, 'M', '懶'), + (0xF90E, 'M', '癩'), + (0xF90F, 'M', '羅'), + (0xF910, 'M', '蘿'), + (0xF911, 'M', '螺'), + (0xF912, 'M', '裸'), + (0xF913, 'M', '邏'), + (0xF914, 'M', '樂'), + (0xF915, 'M', '洛'), + (0xF916, 'M', '烙'), + (0xF917, 'M', '珞'), + (0xF918, 'M', '落'), + (0xF919, 'M', '酪'), + (0xF91A, 'M', '駱'), + (0xF91B, 'M', '亂'), + (0xF91C, 'M', '卵'), + (0xF91D, 'M', '欄'), + (0xF91E, 'M', '爛'), + (0xF91F, 'M', '蘭'), + (0xF920, 'M', '鸞'), + (0xF921, 'M', '嵐'), + (0xF922, 'M', '濫'), + (0xF923, 'M', '藍'), + (0xF924, 'M', '襤'), + (0xF925, 'M', '拉'), + (0xF926, 'M', '臘'), + (0xF927, 'M', '蠟'), + (0xF928, 'M', '廊'), + (0xF929, 'M', '朗'), + (0xF92A, 'M', '浪'), + (0xF92B, 'M', '狼'), + (0xF92C, 'M', '郎'), + (0xF92D, 'M', '來'), + (0xF92E, 'M', '冷'), + (0xF92F, 'M', '勞'), + (0xF930, 'M', '擄'), + (0xF931, 'M', '櫓'), + (0xF932, 'M', '爐'), + (0xF933, 'M', '盧'), + (0xF934, 'M', '老'), + (0xF935, 'M', '蘆'), + (0xF936, 'M', '虜'), + (0xF937, 'M', '路'), + (0xF938, 'M', '露'), + (0xF939, 'M', '魯'), + (0xF93A, 'M', '鷺'), + (0xF93B, 'M', '碌'), + (0xF93C, 'M', '祿'), + (0xF93D, 'M', '綠'), + (0xF93E, 'M', '菉'), + (0xF93F, 'M', '錄'), + (0xF940, 'M', '鹿'), + (0xF941, 'M', '論'), + (0xF942, 'M', '壟'), + (0xF943, 'M', '弄'), + (0xF944, 'M', '籠'), + (0xF945, 'M', '聾'), + ] + +def _seg_40() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xF946, 'M', '牢'), + (0xF947, 'M', '磊'), + (0xF948, 'M', '賂'), + (0xF949, 'M', '雷'), + (0xF94A, 'M', '壘'), + (0xF94B, 'M', '屢'), + (0xF94C, 'M', '樓'), + (0xF94D, 'M', '淚'), + (0xF94E, 'M', '漏'), + (0xF94F, 'M', '累'), + (0xF950, 'M', '縷'), + (0xF951, 'M', '陋'), + (0xF952, 'M', '勒'), + (0xF953, 'M', '肋'), + (0xF954, 'M', '凜'), + (0xF955, 'M', '凌'), + (0xF956, 'M', '稜'), + (0xF957, 'M', '綾'), + (0xF958, 'M', '菱'), + (0xF959, 'M', '陵'), + (0xF95A, 'M', '讀'), + (0xF95B, 'M', '拏'), + (0xF95C, 'M', '樂'), + (0xF95D, 'M', '諾'), + (0xF95E, 'M', '丹'), + (0xF95F, 'M', '寧'), + (0xF960, 'M', '怒'), + (0xF961, 'M', '率'), + (0xF962, 'M', '異'), + (0xF963, 'M', '北'), + (0xF964, 'M', '磻'), + (0xF965, 'M', '便'), + (0xF966, 'M', '復'), + (0xF967, 'M', '不'), + (0xF968, 'M', '泌'), + (0xF969, 'M', '數'), + (0xF96A, 'M', '索'), + (0xF96B, 'M', '參'), + (0xF96C, 'M', '塞'), + (0xF96D, 'M', '省'), + (0xF96E, 'M', '葉'), + (0xF96F, 'M', '說'), + (0xF970, 'M', '殺'), + (0xF971, 'M', '辰'), + (0xF972, 'M', '沈'), + (0xF973, 'M', '拾'), + (0xF974, 'M', '若'), + (0xF975, 'M', '掠'), + (0xF976, 'M', '略'), + (0xF977, 'M', '亮'), + (0xF978, 'M', '兩'), + (0xF979, 'M', '凉'), + (0xF97A, 'M', '梁'), + (0xF97B, 'M', '糧'), + (0xF97C, 'M', '良'), + (0xF97D, 'M', '諒'), + (0xF97E, 'M', '量'), + (0xF97F, 'M', '勵'), + (0xF980, 'M', '呂'), + (0xF981, 'M', '女'), + (0xF982, 'M', '廬'), + (0xF983, 'M', '旅'), + (0xF984, 'M', '濾'), + (0xF985, 'M', '礪'), + (0xF986, 'M', '閭'), + (0xF987, 'M', '驪'), + (0xF988, 'M', '麗'), + (0xF989, 'M', '黎'), + (0xF98A, 'M', '力'), + (0xF98B, 'M', '曆'), + (0xF98C, 'M', '歷'), + (0xF98D, 'M', '轢'), + (0xF98E, 'M', '年'), + (0xF98F, 'M', '憐'), + (0xF990, 'M', '戀'), + (0xF991, 'M', '撚'), + (0xF992, 'M', '漣'), + (0xF993, 'M', '煉'), + (0xF994, 'M', '璉'), + (0xF995, 'M', '秊'), + (0xF996, 'M', '練'), + (0xF997, 'M', '聯'), + (0xF998, 'M', '輦'), + (0xF999, 'M', '蓮'), + (0xF99A, 'M', '連'), + (0xF99B, 'M', '鍊'), + (0xF99C, 'M', '列'), + (0xF99D, 'M', '劣'), + (0xF99E, 'M', '咽'), + (0xF99F, 'M', '烈'), + (0xF9A0, 'M', '裂'), + (0xF9A1, 'M', '說'), + (0xF9A2, 'M', '廉'), + (0xF9A3, 'M', '念'), + (0xF9A4, 'M', '捻'), + (0xF9A5, 'M', '殮'), + (0xF9A6, 'M', '簾'), + (0xF9A7, 'M', '獵'), + (0xF9A8, 'M', '令'), + (0xF9A9, 'M', '囹'), + ] + +def _seg_41() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xF9AA, 'M', '寧'), + (0xF9AB, 'M', '嶺'), + (0xF9AC, 'M', '怜'), + (0xF9AD, 'M', '玲'), + (0xF9AE, 'M', '瑩'), + (0xF9AF, 'M', '羚'), + (0xF9B0, 'M', '聆'), + (0xF9B1, 'M', '鈴'), + (0xF9B2, 'M', '零'), + (0xF9B3, 'M', '靈'), + (0xF9B4, 'M', '領'), + (0xF9B5, 'M', '例'), + (0xF9B6, 'M', '禮'), + (0xF9B7, 'M', '醴'), + (0xF9B8, 'M', '隸'), + (0xF9B9, 'M', '惡'), + (0xF9BA, 'M', '了'), + (0xF9BB, 'M', '僚'), + (0xF9BC, 'M', '寮'), + (0xF9BD, 'M', '尿'), + (0xF9BE, 'M', '料'), + (0xF9BF, 'M', '樂'), + (0xF9C0, 'M', '燎'), + (0xF9C1, 'M', '療'), + (0xF9C2, 'M', '蓼'), + (0xF9C3, 'M', '遼'), + (0xF9C4, 'M', '龍'), + (0xF9C5, 'M', '暈'), + (0xF9C6, 'M', '阮'), + (0xF9C7, 'M', '劉'), + (0xF9C8, 'M', '杻'), + (0xF9C9, 'M', '柳'), + (0xF9CA, 'M', '流'), + (0xF9CB, 'M', '溜'), + (0xF9CC, 'M', '琉'), + (0xF9CD, 'M', '留'), + (0xF9CE, 'M', '硫'), + (0xF9CF, 'M', '紐'), + (0xF9D0, 'M', '類'), + (0xF9D1, 'M', '六'), + (0xF9D2, 'M', '戮'), + (0xF9D3, 'M', '陸'), + (0xF9D4, 'M', '倫'), + (0xF9D5, 'M', '崙'), + (0xF9D6, 'M', '淪'), + (0xF9D7, 'M', '輪'), + (0xF9D8, 'M', '律'), + (0xF9D9, 'M', '慄'), + (0xF9DA, 'M', '栗'), + (0xF9DB, 'M', '率'), + (0xF9DC, 'M', '隆'), + (0xF9DD, 'M', '利'), + (0xF9DE, 'M', '吏'), + (0xF9DF, 'M', '履'), + (0xF9E0, 'M', '易'), + (0xF9E1, 'M', '李'), + (0xF9E2, 'M', '梨'), + (0xF9E3, 'M', '泥'), + (0xF9E4, 'M', '理'), + (0xF9E5, 'M', '痢'), + (0xF9E6, 'M', '罹'), + (0xF9E7, 'M', '裏'), + (0xF9E8, 'M', '裡'), + (0xF9E9, 'M', '里'), + (0xF9EA, 'M', '離'), + (0xF9EB, 'M', '匿'), + (0xF9EC, 'M', '溺'), + (0xF9ED, 'M', '吝'), + (0xF9EE, 'M', '燐'), + (0xF9EF, 'M', '璘'), + (0xF9F0, 'M', '藺'), + (0xF9F1, 'M', '隣'), + (0xF9F2, 'M', '鱗'), + (0xF9F3, 'M', '麟'), + (0xF9F4, 'M', '林'), + (0xF9F5, 'M', '淋'), + (0xF9F6, 'M', '臨'), + (0xF9F7, 'M', '立'), + (0xF9F8, 'M', '笠'), + (0xF9F9, 'M', '粒'), + (0xF9FA, 'M', '狀'), + (0xF9FB, 'M', '炙'), + (0xF9FC, 'M', '識'), + (0xF9FD, 'M', '什'), + (0xF9FE, 'M', '茶'), + (0xF9FF, 'M', '刺'), + (0xFA00, 'M', '切'), + (0xFA01, 'M', '度'), + (0xFA02, 'M', '拓'), + (0xFA03, 'M', '糖'), + (0xFA04, 'M', '宅'), + (0xFA05, 'M', '洞'), + (0xFA06, 'M', '暴'), + (0xFA07, 'M', '輻'), + (0xFA08, 'M', '行'), + (0xFA09, 'M', '降'), + (0xFA0A, 'M', '見'), + (0xFA0B, 'M', '廓'), + (0xFA0C, 'M', '兀'), + (0xFA0D, 'M', '嗀'), + ] + +def _seg_42() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFA0E, 'V'), + (0xFA10, 'M', '塚'), + (0xFA11, 'V'), + (0xFA12, 'M', '晴'), + (0xFA13, 'V'), + (0xFA15, 'M', '凞'), + (0xFA16, 'M', '猪'), + (0xFA17, 'M', '益'), + (0xFA18, 'M', '礼'), + (0xFA19, 'M', '神'), + (0xFA1A, 'M', '祥'), + (0xFA1B, 'M', '福'), + (0xFA1C, 'M', '靖'), + (0xFA1D, 'M', '精'), + (0xFA1E, 'M', '羽'), + (0xFA1F, 'V'), + (0xFA20, 'M', '蘒'), + (0xFA21, 'V'), + (0xFA22, 'M', '諸'), + (0xFA23, 'V'), + (0xFA25, 'M', '逸'), + (0xFA26, 'M', '都'), + (0xFA27, 'V'), + (0xFA2A, 'M', '飯'), + (0xFA2B, 'M', '飼'), + (0xFA2C, 'M', '館'), + (0xFA2D, 'M', '鶴'), + (0xFA2E, 'M', '郞'), + (0xFA2F, 'M', '隷'), + (0xFA30, 'M', '侮'), + (0xFA31, 'M', '僧'), + (0xFA32, 'M', '免'), + (0xFA33, 'M', '勉'), + (0xFA34, 'M', '勤'), + (0xFA35, 'M', '卑'), + (0xFA36, 'M', '喝'), + (0xFA37, 'M', '嘆'), + (0xFA38, 'M', '器'), + (0xFA39, 'M', '塀'), + (0xFA3A, 'M', '墨'), + (0xFA3B, 'M', '層'), + (0xFA3C, 'M', '屮'), + (0xFA3D, 'M', '悔'), + (0xFA3E, 'M', '慨'), + (0xFA3F, 'M', '憎'), + (0xFA40, 'M', '懲'), + (0xFA41, 'M', '敏'), + (0xFA42, 'M', '既'), + (0xFA43, 'M', '暑'), + (0xFA44, 'M', '梅'), + (0xFA45, 'M', '海'), + (0xFA46, 'M', '渚'), + (0xFA47, 'M', '漢'), + (0xFA48, 'M', '煮'), + (0xFA49, 'M', '爫'), + (0xFA4A, 'M', '琢'), + (0xFA4B, 'M', '碑'), + (0xFA4C, 'M', '社'), + (0xFA4D, 'M', '祉'), + (0xFA4E, 'M', '祈'), + (0xFA4F, 'M', '祐'), + (0xFA50, 'M', '祖'), + (0xFA51, 'M', '祝'), + (0xFA52, 'M', '禍'), + (0xFA53, 'M', '禎'), + (0xFA54, 'M', '穀'), + (0xFA55, 'M', '突'), + (0xFA56, 'M', '節'), + (0xFA57, 'M', '練'), + (0xFA58, 'M', '縉'), + (0xFA59, 'M', '繁'), + (0xFA5A, 'M', '署'), + (0xFA5B, 'M', '者'), + (0xFA5C, 'M', '臭'), + (0xFA5D, 'M', '艹'), + (0xFA5F, 'M', '著'), + (0xFA60, 'M', '褐'), + (0xFA61, 'M', '視'), + (0xFA62, 'M', '謁'), + (0xFA63, 'M', '謹'), + (0xFA64, 'M', '賓'), + (0xFA65, 'M', '贈'), + (0xFA66, 'M', '辶'), + (0xFA67, 'M', '逸'), + (0xFA68, 'M', '難'), + (0xFA69, 'M', '響'), + (0xFA6A, 'M', '頻'), + (0xFA6B, 'M', '恵'), + (0xFA6C, 'M', '𤋮'), + (0xFA6D, 'M', '舘'), + (0xFA6E, 'X'), + (0xFA70, 'M', '並'), + (0xFA71, 'M', '况'), + (0xFA72, 'M', '全'), + (0xFA73, 'M', '侀'), + (0xFA74, 'M', '充'), + (0xFA75, 'M', '冀'), + (0xFA76, 'M', '勇'), + (0xFA77, 'M', '勺'), + (0xFA78, 'M', '喝'), + ] + +def _seg_43() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFA79, 'M', '啕'), + (0xFA7A, 'M', '喙'), + (0xFA7B, 'M', '嗢'), + (0xFA7C, 'M', '塚'), + (0xFA7D, 'M', '墳'), + (0xFA7E, 'M', '奄'), + (0xFA7F, 'M', '奔'), + (0xFA80, 'M', '婢'), + (0xFA81, 'M', '嬨'), + (0xFA82, 'M', '廒'), + (0xFA83, 'M', '廙'), + (0xFA84, 'M', '彩'), + (0xFA85, 'M', '徭'), + (0xFA86, 'M', '惘'), + (0xFA87, 'M', '慎'), + (0xFA88, 'M', '愈'), + (0xFA89, 'M', '憎'), + (0xFA8A, 'M', '慠'), + (0xFA8B, 'M', '懲'), + (0xFA8C, 'M', '戴'), + (0xFA8D, 'M', '揄'), + (0xFA8E, 'M', '搜'), + (0xFA8F, 'M', '摒'), + (0xFA90, 'M', '敖'), + (0xFA91, 'M', '晴'), + (0xFA92, 'M', '朗'), + (0xFA93, 'M', '望'), + (0xFA94, 'M', '杖'), + (0xFA95, 'M', '歹'), + (0xFA96, 'M', '殺'), + (0xFA97, 'M', '流'), + (0xFA98, 'M', '滛'), + (0xFA99, 'M', '滋'), + (0xFA9A, 'M', '漢'), + (0xFA9B, 'M', '瀞'), + (0xFA9C, 'M', '煮'), + (0xFA9D, 'M', '瞧'), + (0xFA9E, 'M', '爵'), + (0xFA9F, 'M', '犯'), + (0xFAA0, 'M', '猪'), + (0xFAA1, 'M', '瑱'), + (0xFAA2, 'M', '甆'), + (0xFAA3, 'M', '画'), + (0xFAA4, 'M', '瘝'), + (0xFAA5, 'M', '瘟'), + (0xFAA6, 'M', '益'), + (0xFAA7, 'M', '盛'), + (0xFAA8, 'M', '直'), + (0xFAA9, 'M', '睊'), + (0xFAAA, 'M', '着'), + (0xFAAB, 'M', '磌'), + (0xFAAC, 'M', '窱'), + (0xFAAD, 'M', '節'), + (0xFAAE, 'M', '类'), + (0xFAAF, 'M', '絛'), + (0xFAB0, 'M', '練'), + (0xFAB1, 'M', '缾'), + (0xFAB2, 'M', '者'), + (0xFAB3, 'M', '荒'), + (0xFAB4, 'M', '華'), + (0xFAB5, 'M', '蝹'), + (0xFAB6, 'M', '襁'), + (0xFAB7, 'M', '覆'), + (0xFAB8, 'M', '視'), + (0xFAB9, 'M', '調'), + (0xFABA, 'M', '諸'), + (0xFABB, 'M', '請'), + (0xFABC, 'M', '謁'), + (0xFABD, 'M', '諾'), + (0xFABE, 'M', '諭'), + (0xFABF, 'M', '謹'), + (0xFAC0, 'M', '變'), + (0xFAC1, 'M', '贈'), + (0xFAC2, 'M', '輸'), + (0xFAC3, 'M', '遲'), + (0xFAC4, 'M', '醙'), + (0xFAC5, 'M', '鉶'), + (0xFAC6, 'M', '陼'), + (0xFAC7, 'M', '難'), + (0xFAC8, 'M', '靖'), + (0xFAC9, 'M', '韛'), + (0xFACA, 'M', '響'), + (0xFACB, 'M', '頋'), + (0xFACC, 'M', '頻'), + (0xFACD, 'M', '鬒'), + (0xFACE, 'M', '龜'), + (0xFACF, 'M', '𢡊'), + (0xFAD0, 'M', '𢡄'), + (0xFAD1, 'M', '𣏕'), + (0xFAD2, 'M', '㮝'), + (0xFAD3, 'M', '䀘'), + (0xFAD4, 'M', '䀹'), + (0xFAD5, 'M', '𥉉'), + (0xFAD6, 'M', '𥳐'), + (0xFAD7, 'M', '𧻓'), + (0xFAD8, 'M', '齃'), + (0xFAD9, 'M', '龎'), + (0xFADA, 'X'), + (0xFB00, 'M', 'ff'), + (0xFB01, 'M', 'fi'), + ] + +def _seg_44() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFB02, 'M', 'fl'), + (0xFB03, 'M', 'ffi'), + (0xFB04, 'M', 'ffl'), + (0xFB05, 'M', 'st'), + (0xFB07, 'X'), + (0xFB13, 'M', 'մն'), + (0xFB14, 'M', 'մե'), + (0xFB15, 'M', 'մի'), + (0xFB16, 'M', 'վն'), + (0xFB17, 'M', 'մխ'), + (0xFB18, 'X'), + (0xFB1D, 'M', 'יִ'), + (0xFB1E, 'V'), + (0xFB1F, 'M', 'ײַ'), + (0xFB20, 'M', 'ע'), + (0xFB21, 'M', 'א'), + (0xFB22, 'M', 'ד'), + (0xFB23, 'M', 'ה'), + (0xFB24, 'M', 'כ'), + (0xFB25, 'M', 'ל'), + (0xFB26, 'M', 'ם'), + (0xFB27, 'M', 'ר'), + (0xFB28, 'M', 'ת'), + (0xFB29, '3', '+'), + (0xFB2A, 'M', 'שׁ'), + (0xFB2B, 'M', 'שׂ'), + (0xFB2C, 'M', 'שּׁ'), + (0xFB2D, 'M', 'שּׂ'), + (0xFB2E, 'M', 'אַ'), + (0xFB2F, 'M', 'אָ'), + (0xFB30, 'M', 'אּ'), + (0xFB31, 'M', 'בּ'), + (0xFB32, 'M', 'גּ'), + (0xFB33, 'M', 'דּ'), + (0xFB34, 'M', 'הּ'), + (0xFB35, 'M', 'וּ'), + (0xFB36, 'M', 'זּ'), + (0xFB37, 'X'), + (0xFB38, 'M', 'טּ'), + (0xFB39, 'M', 'יּ'), + (0xFB3A, 'M', 'ךּ'), + (0xFB3B, 'M', 'כּ'), + (0xFB3C, 'M', 'לּ'), + (0xFB3D, 'X'), + (0xFB3E, 'M', 'מּ'), + (0xFB3F, 'X'), + (0xFB40, 'M', 'נּ'), + (0xFB41, 'M', 'סּ'), + (0xFB42, 'X'), + (0xFB43, 'M', 'ףּ'), + (0xFB44, 'M', 'פּ'), + (0xFB45, 'X'), + (0xFB46, 'M', 'צּ'), + (0xFB47, 'M', 'קּ'), + (0xFB48, 'M', 'רּ'), + (0xFB49, 'M', 'שּ'), + (0xFB4A, 'M', 'תּ'), + (0xFB4B, 'M', 'וֹ'), + (0xFB4C, 'M', 'בֿ'), + (0xFB4D, 'M', 'כֿ'), + (0xFB4E, 'M', 'פֿ'), + (0xFB4F, 'M', 'אל'), + (0xFB50, 'M', 'ٱ'), + (0xFB52, 'M', 'ٻ'), + (0xFB56, 'M', 'پ'), + (0xFB5A, 'M', 'ڀ'), + (0xFB5E, 'M', 'ٺ'), + (0xFB62, 'M', 'ٿ'), + (0xFB66, 'M', 'ٹ'), + (0xFB6A, 'M', 'ڤ'), + (0xFB6E, 'M', 'ڦ'), + (0xFB72, 'M', 'ڄ'), + (0xFB76, 'M', 'ڃ'), + (0xFB7A, 'M', 'چ'), + (0xFB7E, 'M', 'ڇ'), + (0xFB82, 'M', 'ڍ'), + (0xFB84, 'M', 'ڌ'), + (0xFB86, 'M', 'ڎ'), + (0xFB88, 'M', 'ڈ'), + (0xFB8A, 'M', 'ژ'), + (0xFB8C, 'M', 'ڑ'), + (0xFB8E, 'M', 'ک'), + (0xFB92, 'M', 'گ'), + (0xFB96, 'M', 'ڳ'), + (0xFB9A, 'M', 'ڱ'), + (0xFB9E, 'M', 'ں'), + (0xFBA0, 'M', 'ڻ'), + (0xFBA4, 'M', 'ۀ'), + (0xFBA6, 'M', 'ہ'), + (0xFBAA, 'M', 'ھ'), + (0xFBAE, 'M', 'ے'), + (0xFBB0, 'M', 'ۓ'), + (0xFBB2, 'V'), + (0xFBC3, 'X'), + (0xFBD3, 'M', 'ڭ'), + (0xFBD7, 'M', 'ۇ'), + (0xFBD9, 'M', 'ۆ'), + (0xFBDB, 'M', 'ۈ'), + (0xFBDD, 'M', 'ۇٴ'), + (0xFBDE, 'M', 'ۋ'), + ] + +def _seg_45() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFBE0, 'M', 'ۅ'), + (0xFBE2, 'M', 'ۉ'), + (0xFBE4, 'M', 'ې'), + (0xFBE8, 'M', 'ى'), + (0xFBEA, 'M', 'ئا'), + (0xFBEC, 'M', 'ئە'), + (0xFBEE, 'M', 'ئو'), + (0xFBF0, 'M', 'ئۇ'), + (0xFBF2, 'M', 'ئۆ'), + (0xFBF4, 'M', 'ئۈ'), + (0xFBF6, 'M', 'ئې'), + (0xFBF9, 'M', 'ئى'), + (0xFBFC, 'M', 'ی'), + (0xFC00, 'M', 'ئج'), + (0xFC01, 'M', 'ئح'), + (0xFC02, 'M', 'ئم'), + (0xFC03, 'M', 'ئى'), + (0xFC04, 'M', 'ئي'), + (0xFC05, 'M', 'بج'), + (0xFC06, 'M', 'بح'), + (0xFC07, 'M', 'بخ'), + (0xFC08, 'M', 'بم'), + (0xFC09, 'M', 'بى'), + (0xFC0A, 'M', 'بي'), + (0xFC0B, 'M', 'تج'), + (0xFC0C, 'M', 'تح'), + (0xFC0D, 'M', 'تخ'), + (0xFC0E, 'M', 'تم'), + (0xFC0F, 'M', 'تى'), + (0xFC10, 'M', 'تي'), + (0xFC11, 'M', 'ثج'), + (0xFC12, 'M', 'ثم'), + (0xFC13, 'M', 'ثى'), + (0xFC14, 'M', 'ثي'), + (0xFC15, 'M', 'جح'), + (0xFC16, 'M', 'جم'), + (0xFC17, 'M', 'حج'), + (0xFC18, 'M', 'حم'), + (0xFC19, 'M', 'خج'), + (0xFC1A, 'M', 'خح'), + (0xFC1B, 'M', 'خم'), + (0xFC1C, 'M', 'سج'), + (0xFC1D, 'M', 'سح'), + (0xFC1E, 'M', 'سخ'), + (0xFC1F, 'M', 'سم'), + (0xFC20, 'M', 'صح'), + (0xFC21, 'M', 'صم'), + (0xFC22, 'M', 'ضج'), + (0xFC23, 'M', 'ضح'), + (0xFC24, 'M', 'ضخ'), + (0xFC25, 'M', 'ضم'), + (0xFC26, 'M', 'طح'), + (0xFC27, 'M', 'طم'), + (0xFC28, 'M', 'ظم'), + (0xFC29, 'M', 'عج'), + (0xFC2A, 'M', 'عم'), + (0xFC2B, 'M', 'غج'), + (0xFC2C, 'M', 'غم'), + (0xFC2D, 'M', 'فج'), + (0xFC2E, 'M', 'فح'), + (0xFC2F, 'M', 'فخ'), + (0xFC30, 'M', 'فم'), + (0xFC31, 'M', 'فى'), + (0xFC32, 'M', 'في'), + (0xFC33, 'M', 'قح'), + (0xFC34, 'M', 'قم'), + (0xFC35, 'M', 'قى'), + (0xFC36, 'M', 'قي'), + (0xFC37, 'M', 'كا'), + (0xFC38, 'M', 'كج'), + (0xFC39, 'M', 'كح'), + (0xFC3A, 'M', 'كخ'), + (0xFC3B, 'M', 'كل'), + (0xFC3C, 'M', 'كم'), + (0xFC3D, 'M', 'كى'), + (0xFC3E, 'M', 'كي'), + (0xFC3F, 'M', 'لج'), + (0xFC40, 'M', 'لح'), + (0xFC41, 'M', 'لخ'), + (0xFC42, 'M', 'لم'), + (0xFC43, 'M', 'لى'), + (0xFC44, 'M', 'لي'), + (0xFC45, 'M', 'مج'), + (0xFC46, 'M', 'مح'), + (0xFC47, 'M', 'مخ'), + (0xFC48, 'M', 'مم'), + (0xFC49, 'M', 'مى'), + (0xFC4A, 'M', 'مي'), + (0xFC4B, 'M', 'نج'), + (0xFC4C, 'M', 'نح'), + (0xFC4D, 'M', 'نخ'), + (0xFC4E, 'M', 'نم'), + (0xFC4F, 'M', 'نى'), + (0xFC50, 'M', 'ني'), + (0xFC51, 'M', 'هج'), + (0xFC52, 'M', 'هم'), + (0xFC53, 'M', 'هى'), + (0xFC54, 'M', 'هي'), + (0xFC55, 'M', 'يج'), + (0xFC56, 'M', 'يح'), + ] + +def _seg_46() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFC57, 'M', 'يخ'), + (0xFC58, 'M', 'يم'), + (0xFC59, 'M', 'يى'), + (0xFC5A, 'M', 'يي'), + (0xFC5B, 'M', 'ذٰ'), + (0xFC5C, 'M', 'رٰ'), + (0xFC5D, 'M', 'ىٰ'), + (0xFC5E, '3', ' ٌّ'), + (0xFC5F, '3', ' ٍّ'), + (0xFC60, '3', ' َّ'), + (0xFC61, '3', ' ُّ'), + (0xFC62, '3', ' ِّ'), + (0xFC63, '3', ' ّٰ'), + (0xFC64, 'M', 'ئر'), + (0xFC65, 'M', 'ئز'), + (0xFC66, 'M', 'ئم'), + (0xFC67, 'M', 'ئن'), + (0xFC68, 'M', 'ئى'), + (0xFC69, 'M', 'ئي'), + (0xFC6A, 'M', 'بر'), + (0xFC6B, 'M', 'بز'), + (0xFC6C, 'M', 'بم'), + (0xFC6D, 'M', 'بن'), + (0xFC6E, 'M', 'بى'), + (0xFC6F, 'M', 'بي'), + (0xFC70, 'M', 'تر'), + (0xFC71, 'M', 'تز'), + (0xFC72, 'M', 'تم'), + (0xFC73, 'M', 'تن'), + (0xFC74, 'M', 'تى'), + (0xFC75, 'M', 'تي'), + (0xFC76, 'M', 'ثر'), + (0xFC77, 'M', 'ثز'), + (0xFC78, 'M', 'ثم'), + (0xFC79, 'M', 'ثن'), + (0xFC7A, 'M', 'ثى'), + (0xFC7B, 'M', 'ثي'), + (0xFC7C, 'M', 'فى'), + (0xFC7D, 'M', 'في'), + (0xFC7E, 'M', 'قى'), + (0xFC7F, 'M', 'قي'), + (0xFC80, 'M', 'كا'), + (0xFC81, 'M', 'كل'), + (0xFC82, 'M', 'كم'), + (0xFC83, 'M', 'كى'), + (0xFC84, 'M', 'كي'), + (0xFC85, 'M', 'لم'), + (0xFC86, 'M', 'لى'), + (0xFC87, 'M', 'لي'), + (0xFC88, 'M', 'ما'), + (0xFC89, 'M', 'مم'), + (0xFC8A, 'M', 'نر'), + (0xFC8B, 'M', 'نز'), + (0xFC8C, 'M', 'نم'), + (0xFC8D, 'M', 'نن'), + (0xFC8E, 'M', 'نى'), + (0xFC8F, 'M', 'ني'), + (0xFC90, 'M', 'ىٰ'), + (0xFC91, 'M', 'ير'), + (0xFC92, 'M', 'يز'), + (0xFC93, 'M', 'يم'), + (0xFC94, 'M', 'ين'), + (0xFC95, 'M', 'يى'), + (0xFC96, 'M', 'يي'), + (0xFC97, 'M', 'ئج'), + (0xFC98, 'M', 'ئح'), + (0xFC99, 'M', 'ئخ'), + (0xFC9A, 'M', 'ئم'), + (0xFC9B, 'M', 'ئه'), + (0xFC9C, 'M', 'بج'), + (0xFC9D, 'M', 'بح'), + (0xFC9E, 'M', 'بخ'), + (0xFC9F, 'M', 'بم'), + (0xFCA0, 'M', 'به'), + (0xFCA1, 'M', 'تج'), + (0xFCA2, 'M', 'تح'), + (0xFCA3, 'M', 'تخ'), + (0xFCA4, 'M', 'تم'), + (0xFCA5, 'M', 'ته'), + (0xFCA6, 'M', 'ثم'), + (0xFCA7, 'M', 'جح'), + (0xFCA8, 'M', 'جم'), + (0xFCA9, 'M', 'حج'), + (0xFCAA, 'M', 'حم'), + (0xFCAB, 'M', 'خج'), + (0xFCAC, 'M', 'خم'), + (0xFCAD, 'M', 'سج'), + (0xFCAE, 'M', 'سح'), + (0xFCAF, 'M', 'سخ'), + (0xFCB0, 'M', 'سم'), + (0xFCB1, 'M', 'صح'), + (0xFCB2, 'M', 'صخ'), + (0xFCB3, 'M', 'صم'), + (0xFCB4, 'M', 'ضج'), + (0xFCB5, 'M', 'ضح'), + (0xFCB6, 'M', 'ضخ'), + (0xFCB7, 'M', 'ضم'), + (0xFCB8, 'M', 'طح'), + (0xFCB9, 'M', 'ظم'), + (0xFCBA, 'M', 'عج'), + ] + +def _seg_47() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFCBB, 'M', 'عم'), + (0xFCBC, 'M', 'غج'), + (0xFCBD, 'M', 'غم'), + (0xFCBE, 'M', 'فج'), + (0xFCBF, 'M', 'فح'), + (0xFCC0, 'M', 'فخ'), + (0xFCC1, 'M', 'فم'), + (0xFCC2, 'M', 'قح'), + (0xFCC3, 'M', 'قم'), + (0xFCC4, 'M', 'كج'), + (0xFCC5, 'M', 'كح'), + (0xFCC6, 'M', 'كخ'), + (0xFCC7, 'M', 'كل'), + (0xFCC8, 'M', 'كم'), + (0xFCC9, 'M', 'لج'), + (0xFCCA, 'M', 'لح'), + (0xFCCB, 'M', 'لخ'), + (0xFCCC, 'M', 'لم'), + (0xFCCD, 'M', 'له'), + (0xFCCE, 'M', 'مج'), + (0xFCCF, 'M', 'مح'), + (0xFCD0, 'M', 'مخ'), + (0xFCD1, 'M', 'مم'), + (0xFCD2, 'M', 'نج'), + (0xFCD3, 'M', 'نح'), + (0xFCD4, 'M', 'نخ'), + (0xFCD5, 'M', 'نم'), + (0xFCD6, 'M', 'نه'), + (0xFCD7, 'M', 'هج'), + (0xFCD8, 'M', 'هم'), + (0xFCD9, 'M', 'هٰ'), + (0xFCDA, 'M', 'يج'), + (0xFCDB, 'M', 'يح'), + (0xFCDC, 'M', 'يخ'), + (0xFCDD, 'M', 'يم'), + (0xFCDE, 'M', 'يه'), + (0xFCDF, 'M', 'ئم'), + (0xFCE0, 'M', 'ئه'), + (0xFCE1, 'M', 'بم'), + (0xFCE2, 'M', 'به'), + (0xFCE3, 'M', 'تم'), + (0xFCE4, 'M', 'ته'), + (0xFCE5, 'M', 'ثم'), + (0xFCE6, 'M', 'ثه'), + (0xFCE7, 'M', 'سم'), + (0xFCE8, 'M', 'سه'), + (0xFCE9, 'M', 'شم'), + (0xFCEA, 'M', 'شه'), + (0xFCEB, 'M', 'كل'), + (0xFCEC, 'M', 'كم'), + (0xFCED, 'M', 'لم'), + (0xFCEE, 'M', 'نم'), + (0xFCEF, 'M', 'نه'), + (0xFCF0, 'M', 'يم'), + (0xFCF1, 'M', 'يه'), + (0xFCF2, 'M', 'ـَّ'), + (0xFCF3, 'M', 'ـُّ'), + (0xFCF4, 'M', 'ـِّ'), + (0xFCF5, 'M', 'طى'), + (0xFCF6, 'M', 'طي'), + (0xFCF7, 'M', 'عى'), + (0xFCF8, 'M', 'عي'), + (0xFCF9, 'M', 'غى'), + (0xFCFA, 'M', 'غي'), + (0xFCFB, 'M', 'سى'), + (0xFCFC, 'M', 'سي'), + (0xFCFD, 'M', 'شى'), + (0xFCFE, 'M', 'شي'), + (0xFCFF, 'M', 'حى'), + (0xFD00, 'M', 'حي'), + (0xFD01, 'M', 'جى'), + (0xFD02, 'M', 'جي'), + (0xFD03, 'M', 'خى'), + (0xFD04, 'M', 'خي'), + (0xFD05, 'M', 'صى'), + (0xFD06, 'M', 'صي'), + (0xFD07, 'M', 'ضى'), + (0xFD08, 'M', 'ضي'), + (0xFD09, 'M', 'شج'), + (0xFD0A, 'M', 'شح'), + (0xFD0B, 'M', 'شخ'), + (0xFD0C, 'M', 'شم'), + (0xFD0D, 'M', 'شر'), + (0xFD0E, 'M', 'سر'), + (0xFD0F, 'M', 'صر'), + (0xFD10, 'M', 'ضر'), + (0xFD11, 'M', 'طى'), + (0xFD12, 'M', 'طي'), + (0xFD13, 'M', 'عى'), + (0xFD14, 'M', 'عي'), + (0xFD15, 'M', 'غى'), + (0xFD16, 'M', 'غي'), + (0xFD17, 'M', 'سى'), + (0xFD18, 'M', 'سي'), + (0xFD19, 'M', 'شى'), + (0xFD1A, 'M', 'شي'), + (0xFD1B, 'M', 'حى'), + (0xFD1C, 'M', 'حي'), + (0xFD1D, 'M', 'جى'), + (0xFD1E, 'M', 'جي'), + ] + +def _seg_48() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFD1F, 'M', 'خى'), + (0xFD20, 'M', 'خي'), + (0xFD21, 'M', 'صى'), + (0xFD22, 'M', 'صي'), + (0xFD23, 'M', 'ضى'), + (0xFD24, 'M', 'ضي'), + (0xFD25, 'M', 'شج'), + (0xFD26, 'M', 'شح'), + (0xFD27, 'M', 'شخ'), + (0xFD28, 'M', 'شم'), + (0xFD29, 'M', 'شر'), + (0xFD2A, 'M', 'سر'), + (0xFD2B, 'M', 'صر'), + (0xFD2C, 'M', 'ضر'), + (0xFD2D, 'M', 'شج'), + (0xFD2E, 'M', 'شح'), + (0xFD2F, 'M', 'شخ'), + (0xFD30, 'M', 'شم'), + (0xFD31, 'M', 'سه'), + (0xFD32, 'M', 'شه'), + (0xFD33, 'M', 'طم'), + (0xFD34, 'M', 'سج'), + (0xFD35, 'M', 'سح'), + (0xFD36, 'M', 'سخ'), + (0xFD37, 'M', 'شج'), + (0xFD38, 'M', 'شح'), + (0xFD39, 'M', 'شخ'), + (0xFD3A, 'M', 'طم'), + (0xFD3B, 'M', 'ظم'), + (0xFD3C, 'M', 'اً'), + (0xFD3E, 'V'), + (0xFD50, 'M', 'تجم'), + (0xFD51, 'M', 'تحج'), + (0xFD53, 'M', 'تحم'), + (0xFD54, 'M', 'تخم'), + (0xFD55, 'M', 'تمج'), + (0xFD56, 'M', 'تمح'), + (0xFD57, 'M', 'تمخ'), + (0xFD58, 'M', 'جمح'), + (0xFD5A, 'M', 'حمي'), + (0xFD5B, 'M', 'حمى'), + (0xFD5C, 'M', 'سحج'), + (0xFD5D, 'M', 'سجح'), + (0xFD5E, 'M', 'سجى'), + (0xFD5F, 'M', 'سمح'), + (0xFD61, 'M', 'سمج'), + (0xFD62, 'M', 'سمم'), + (0xFD64, 'M', 'صحح'), + (0xFD66, 'M', 'صمم'), + (0xFD67, 'M', 'شحم'), + (0xFD69, 'M', 'شجي'), + (0xFD6A, 'M', 'شمخ'), + (0xFD6C, 'M', 'شمم'), + (0xFD6E, 'M', 'ضحى'), + (0xFD6F, 'M', 'ضخم'), + (0xFD71, 'M', 'طمح'), + (0xFD73, 'M', 'طمم'), + (0xFD74, 'M', 'طمي'), + (0xFD75, 'M', 'عجم'), + (0xFD76, 'M', 'عمم'), + (0xFD78, 'M', 'عمى'), + (0xFD79, 'M', 'غمم'), + (0xFD7A, 'M', 'غمي'), + (0xFD7B, 'M', 'غمى'), + (0xFD7C, 'M', 'فخم'), + (0xFD7E, 'M', 'قمح'), + (0xFD7F, 'M', 'قمم'), + (0xFD80, 'M', 'لحم'), + (0xFD81, 'M', 'لحي'), + (0xFD82, 'M', 'لحى'), + (0xFD83, 'M', 'لجج'), + (0xFD85, 'M', 'لخم'), + (0xFD87, 'M', 'لمح'), + (0xFD89, 'M', 'محج'), + (0xFD8A, 'M', 'محم'), + (0xFD8B, 'M', 'محي'), + (0xFD8C, 'M', 'مجح'), + (0xFD8D, 'M', 'مجم'), + (0xFD8E, 'M', 'مخج'), + (0xFD8F, 'M', 'مخم'), + (0xFD90, 'X'), + (0xFD92, 'M', 'مجخ'), + (0xFD93, 'M', 'همج'), + (0xFD94, 'M', 'همم'), + (0xFD95, 'M', 'نحم'), + (0xFD96, 'M', 'نحى'), + (0xFD97, 'M', 'نجم'), + (0xFD99, 'M', 'نجى'), + (0xFD9A, 'M', 'نمي'), + (0xFD9B, 'M', 'نمى'), + (0xFD9C, 'M', 'يمم'), + (0xFD9E, 'M', 'بخي'), + (0xFD9F, 'M', 'تجي'), + (0xFDA0, 'M', 'تجى'), + (0xFDA1, 'M', 'تخي'), + (0xFDA2, 'M', 'تخى'), + (0xFDA3, 'M', 'تمي'), + (0xFDA4, 'M', 'تمى'), + (0xFDA5, 'M', 'جمي'), + (0xFDA6, 'M', 'جحى'), + ] + +def _seg_49() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFDA7, 'M', 'جمى'), + (0xFDA8, 'M', 'سخى'), + (0xFDA9, 'M', 'صحي'), + (0xFDAA, 'M', 'شحي'), + (0xFDAB, 'M', 'ضحي'), + (0xFDAC, 'M', 'لجي'), + (0xFDAD, 'M', 'لمي'), + (0xFDAE, 'M', 'يحي'), + (0xFDAF, 'M', 'يجي'), + (0xFDB0, 'M', 'يمي'), + (0xFDB1, 'M', 'ممي'), + (0xFDB2, 'M', 'قمي'), + (0xFDB3, 'M', 'نحي'), + (0xFDB4, 'M', 'قمح'), + (0xFDB5, 'M', 'لحم'), + (0xFDB6, 'M', 'عمي'), + (0xFDB7, 'M', 'كمي'), + (0xFDB8, 'M', 'نجح'), + (0xFDB9, 'M', 'مخي'), + (0xFDBA, 'M', 'لجم'), + (0xFDBB, 'M', 'كمم'), + (0xFDBC, 'M', 'لجم'), + (0xFDBD, 'M', 'نجح'), + (0xFDBE, 'M', 'جحي'), + (0xFDBF, 'M', 'حجي'), + (0xFDC0, 'M', 'مجي'), + (0xFDC1, 'M', 'فمي'), + (0xFDC2, 'M', 'بحي'), + (0xFDC3, 'M', 'كمم'), + (0xFDC4, 'M', 'عجم'), + (0xFDC5, 'M', 'صمم'), + (0xFDC6, 'M', 'سخي'), + (0xFDC7, 'M', 'نجي'), + (0xFDC8, 'X'), + (0xFDCF, 'V'), + (0xFDD0, 'X'), + (0xFDF0, 'M', 'صلے'), + (0xFDF1, 'M', 'قلے'), + (0xFDF2, 'M', 'الله'), + (0xFDF3, 'M', 'اكبر'), + (0xFDF4, 'M', 'محمد'), + (0xFDF5, 'M', 'صلعم'), + (0xFDF6, 'M', 'رسول'), + (0xFDF7, 'M', 'عليه'), + (0xFDF8, 'M', 'وسلم'), + (0xFDF9, 'M', 'صلى'), + (0xFDFA, '3', 'صلى الله عليه وسلم'), + (0xFDFB, '3', 'جل جلاله'), + (0xFDFC, 'M', 'ریال'), + (0xFDFD, 'V'), + (0xFE00, 'I'), + (0xFE10, '3', ','), + (0xFE11, 'M', '、'), + (0xFE12, 'X'), + (0xFE13, '3', ':'), + (0xFE14, '3', ';'), + (0xFE15, '3', '!'), + (0xFE16, '3', '?'), + (0xFE17, 'M', '〖'), + (0xFE18, 'M', '〗'), + (0xFE19, 'X'), + (0xFE20, 'V'), + (0xFE30, 'X'), + (0xFE31, 'M', '—'), + (0xFE32, 'M', '–'), + (0xFE33, '3', '_'), + (0xFE35, '3', '('), + (0xFE36, '3', ')'), + (0xFE37, '3', '{'), + (0xFE38, '3', '}'), + (0xFE39, 'M', '〔'), + (0xFE3A, 'M', '〕'), + (0xFE3B, 'M', '【'), + (0xFE3C, 'M', '】'), + (0xFE3D, 'M', '《'), + (0xFE3E, 'M', '》'), + (0xFE3F, 'M', '〈'), + (0xFE40, 'M', '〉'), + (0xFE41, 'M', '「'), + (0xFE42, 'M', '」'), + (0xFE43, 'M', '『'), + (0xFE44, 'M', '』'), + (0xFE45, 'V'), + (0xFE47, '3', '['), + (0xFE48, '3', ']'), + (0xFE49, '3', ' ̅'), + (0xFE4D, '3', '_'), + (0xFE50, '3', ','), + (0xFE51, 'M', '、'), + (0xFE52, 'X'), + (0xFE54, '3', ';'), + (0xFE55, '3', ':'), + (0xFE56, '3', '?'), + (0xFE57, '3', '!'), + (0xFE58, 'M', '—'), + (0xFE59, '3', '('), + (0xFE5A, '3', ')'), + (0xFE5B, '3', '{'), + (0xFE5C, '3', '}'), + (0xFE5D, 'M', '〔'), + ] + +def _seg_50() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFE5E, 'M', '〕'), + (0xFE5F, '3', '#'), + (0xFE60, '3', '&'), + (0xFE61, '3', '*'), + (0xFE62, '3', '+'), + (0xFE63, 'M', '-'), + (0xFE64, '3', '<'), + (0xFE65, '3', '>'), + (0xFE66, '3', '='), + (0xFE67, 'X'), + (0xFE68, '3', '\\'), + (0xFE69, '3', '$'), + (0xFE6A, '3', '%'), + (0xFE6B, '3', '@'), + (0xFE6C, 'X'), + (0xFE70, '3', ' ً'), + (0xFE71, 'M', 'ـً'), + (0xFE72, '3', ' ٌ'), + (0xFE73, 'V'), + (0xFE74, '3', ' ٍ'), + (0xFE75, 'X'), + (0xFE76, '3', ' َ'), + (0xFE77, 'M', 'ـَ'), + (0xFE78, '3', ' ُ'), + (0xFE79, 'M', 'ـُ'), + (0xFE7A, '3', ' ِ'), + (0xFE7B, 'M', 'ـِ'), + (0xFE7C, '3', ' ّ'), + (0xFE7D, 'M', 'ـّ'), + (0xFE7E, '3', ' ْ'), + (0xFE7F, 'M', 'ـْ'), + (0xFE80, 'M', 'ء'), + (0xFE81, 'M', 'آ'), + (0xFE83, 'M', 'أ'), + (0xFE85, 'M', 'ؤ'), + (0xFE87, 'M', 'إ'), + (0xFE89, 'M', 'ئ'), + (0xFE8D, 'M', 'ا'), + (0xFE8F, 'M', 'ب'), + (0xFE93, 'M', 'ة'), + (0xFE95, 'M', 'ت'), + (0xFE99, 'M', 'ث'), + (0xFE9D, 'M', 'ج'), + (0xFEA1, 'M', 'ح'), + (0xFEA5, 'M', 'خ'), + (0xFEA9, 'M', 'د'), + (0xFEAB, 'M', 'ذ'), + (0xFEAD, 'M', 'ر'), + (0xFEAF, 'M', 'ز'), + (0xFEB1, 'M', 'س'), + (0xFEB5, 'M', 'ش'), + (0xFEB9, 'M', 'ص'), + (0xFEBD, 'M', 'ض'), + (0xFEC1, 'M', 'ط'), + (0xFEC5, 'M', 'ظ'), + (0xFEC9, 'M', 'ع'), + (0xFECD, 'M', 'غ'), + (0xFED1, 'M', 'ف'), + (0xFED5, 'M', 'ق'), + (0xFED9, 'M', 'ك'), + (0xFEDD, 'M', 'ل'), + (0xFEE1, 'M', 'م'), + (0xFEE5, 'M', 'ن'), + (0xFEE9, 'M', 'ه'), + (0xFEED, 'M', 'و'), + (0xFEEF, 'M', 'ى'), + (0xFEF1, 'M', 'ي'), + (0xFEF5, 'M', 'لآ'), + (0xFEF7, 'M', 'لأ'), + (0xFEF9, 'M', 'لإ'), + (0xFEFB, 'M', 'لا'), + (0xFEFD, 'X'), + (0xFEFF, 'I'), + (0xFF00, 'X'), + (0xFF01, '3', '!'), + (0xFF02, '3', '"'), + (0xFF03, '3', '#'), + (0xFF04, '3', '$'), + (0xFF05, '3', '%'), + (0xFF06, '3', '&'), + (0xFF07, '3', '\''), + (0xFF08, '3', '('), + (0xFF09, '3', ')'), + (0xFF0A, '3', '*'), + (0xFF0B, '3', '+'), + (0xFF0C, '3', ','), + (0xFF0D, 'M', '-'), + (0xFF0E, 'M', '.'), + (0xFF0F, '3', '/'), + (0xFF10, 'M', '0'), + (0xFF11, 'M', '1'), + (0xFF12, 'M', '2'), + (0xFF13, 'M', '3'), + (0xFF14, 'M', '4'), + (0xFF15, 'M', '5'), + (0xFF16, 'M', '6'), + (0xFF17, 'M', '7'), + (0xFF18, 'M', '8'), + (0xFF19, 'M', '9'), + (0xFF1A, '3', ':'), + ] + +def _seg_51() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFF1B, '3', ';'), + (0xFF1C, '3', '<'), + (0xFF1D, '3', '='), + (0xFF1E, '3', '>'), + (0xFF1F, '3', '?'), + (0xFF20, '3', '@'), + (0xFF21, 'M', 'a'), + (0xFF22, 'M', 'b'), + (0xFF23, 'M', 'c'), + (0xFF24, 'M', 'd'), + (0xFF25, 'M', 'e'), + (0xFF26, 'M', 'f'), + (0xFF27, 'M', 'g'), + (0xFF28, 'M', 'h'), + (0xFF29, 'M', 'i'), + (0xFF2A, 'M', 'j'), + (0xFF2B, 'M', 'k'), + (0xFF2C, 'M', 'l'), + (0xFF2D, 'M', 'm'), + (0xFF2E, 'M', 'n'), + (0xFF2F, 'M', 'o'), + (0xFF30, 'M', 'p'), + (0xFF31, 'M', 'q'), + (0xFF32, 'M', 'r'), + (0xFF33, 'M', 's'), + (0xFF34, 'M', 't'), + (0xFF35, 'M', 'u'), + (0xFF36, 'M', 'v'), + (0xFF37, 'M', 'w'), + (0xFF38, 'M', 'x'), + (0xFF39, 'M', 'y'), + (0xFF3A, 'M', 'z'), + (0xFF3B, '3', '['), + (0xFF3C, '3', '\\'), + (0xFF3D, '3', ']'), + (0xFF3E, '3', '^'), + (0xFF3F, '3', '_'), + (0xFF40, '3', '`'), + (0xFF41, 'M', 'a'), + (0xFF42, 'M', 'b'), + (0xFF43, 'M', 'c'), + (0xFF44, 'M', 'd'), + (0xFF45, 'M', 'e'), + (0xFF46, 'M', 'f'), + (0xFF47, 'M', 'g'), + (0xFF48, 'M', 'h'), + (0xFF49, 'M', 'i'), + (0xFF4A, 'M', 'j'), + (0xFF4B, 'M', 'k'), + (0xFF4C, 'M', 'l'), + (0xFF4D, 'M', 'm'), + (0xFF4E, 'M', 'n'), + (0xFF4F, 'M', 'o'), + (0xFF50, 'M', 'p'), + (0xFF51, 'M', 'q'), + (0xFF52, 'M', 'r'), + (0xFF53, 'M', 's'), + (0xFF54, 'M', 't'), + (0xFF55, 'M', 'u'), + (0xFF56, 'M', 'v'), + (0xFF57, 'M', 'w'), + (0xFF58, 'M', 'x'), + (0xFF59, 'M', 'y'), + (0xFF5A, 'M', 'z'), + (0xFF5B, '3', '{'), + (0xFF5C, '3', '|'), + (0xFF5D, '3', '}'), + (0xFF5E, '3', '~'), + (0xFF5F, 'M', '⦅'), + (0xFF60, 'M', '⦆'), + (0xFF61, 'M', '.'), + (0xFF62, 'M', '「'), + (0xFF63, 'M', '」'), + (0xFF64, 'M', '、'), + (0xFF65, 'M', '・'), + (0xFF66, 'M', 'ヲ'), + (0xFF67, 'M', 'ァ'), + (0xFF68, 'M', 'ィ'), + (0xFF69, 'M', 'ゥ'), + (0xFF6A, 'M', 'ェ'), + (0xFF6B, 'M', 'ォ'), + (0xFF6C, 'M', 'ャ'), + (0xFF6D, 'M', 'ュ'), + (0xFF6E, 'M', 'ョ'), + (0xFF6F, 'M', 'ッ'), + (0xFF70, 'M', 'ー'), + (0xFF71, 'M', 'ア'), + (0xFF72, 'M', 'イ'), + (0xFF73, 'M', 'ウ'), + (0xFF74, 'M', 'エ'), + (0xFF75, 'M', 'オ'), + (0xFF76, 'M', 'カ'), + (0xFF77, 'M', 'キ'), + (0xFF78, 'M', 'ク'), + (0xFF79, 'M', 'ケ'), + (0xFF7A, 'M', 'コ'), + (0xFF7B, 'M', 'サ'), + (0xFF7C, 'M', 'シ'), + (0xFF7D, 'M', 'ス'), + (0xFF7E, 'M', 'セ'), + ] + +def _seg_52() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFF7F, 'M', 'ソ'), + (0xFF80, 'M', 'タ'), + (0xFF81, 'M', 'チ'), + (0xFF82, 'M', 'ツ'), + (0xFF83, 'M', 'テ'), + (0xFF84, 'M', 'ト'), + (0xFF85, 'M', 'ナ'), + (0xFF86, 'M', 'ニ'), + (0xFF87, 'M', 'ヌ'), + (0xFF88, 'M', 'ネ'), + (0xFF89, 'M', 'ノ'), + (0xFF8A, 'M', 'ハ'), + (0xFF8B, 'M', 'ヒ'), + (0xFF8C, 'M', 'フ'), + (0xFF8D, 'M', 'ヘ'), + (0xFF8E, 'M', 'ホ'), + (0xFF8F, 'M', 'マ'), + (0xFF90, 'M', 'ミ'), + (0xFF91, 'M', 'ム'), + (0xFF92, 'M', 'メ'), + (0xFF93, 'M', 'モ'), + (0xFF94, 'M', 'ヤ'), + (0xFF95, 'M', 'ユ'), + (0xFF96, 'M', 'ヨ'), + (0xFF97, 'M', 'ラ'), + (0xFF98, 'M', 'リ'), + (0xFF99, 'M', 'ル'), + (0xFF9A, 'M', 'レ'), + (0xFF9B, 'M', 'ロ'), + (0xFF9C, 'M', 'ワ'), + (0xFF9D, 'M', 'ン'), + (0xFF9E, 'M', '゙'), + (0xFF9F, 'M', '゚'), + (0xFFA0, 'X'), + (0xFFA1, 'M', 'ᄀ'), + (0xFFA2, 'M', 'ᄁ'), + (0xFFA3, 'M', 'ᆪ'), + (0xFFA4, 'M', 'ᄂ'), + (0xFFA5, 'M', 'ᆬ'), + (0xFFA6, 'M', 'ᆭ'), + (0xFFA7, 'M', 'ᄃ'), + (0xFFA8, 'M', 'ᄄ'), + (0xFFA9, 'M', 'ᄅ'), + (0xFFAA, 'M', 'ᆰ'), + (0xFFAB, 'M', 'ᆱ'), + (0xFFAC, 'M', 'ᆲ'), + (0xFFAD, 'M', 'ᆳ'), + (0xFFAE, 'M', 'ᆴ'), + (0xFFAF, 'M', 'ᆵ'), + (0xFFB0, 'M', 'ᄚ'), + (0xFFB1, 'M', 'ᄆ'), + (0xFFB2, 'M', 'ᄇ'), + (0xFFB3, 'M', 'ᄈ'), + (0xFFB4, 'M', 'ᄡ'), + (0xFFB5, 'M', 'ᄉ'), + (0xFFB6, 'M', 'ᄊ'), + (0xFFB7, 'M', 'ᄋ'), + (0xFFB8, 'M', 'ᄌ'), + (0xFFB9, 'M', 'ᄍ'), + (0xFFBA, 'M', 'ᄎ'), + (0xFFBB, 'M', 'ᄏ'), + (0xFFBC, 'M', 'ᄐ'), + (0xFFBD, 'M', 'ᄑ'), + (0xFFBE, 'M', 'ᄒ'), + (0xFFBF, 'X'), + (0xFFC2, 'M', 'ᅡ'), + (0xFFC3, 'M', 'ᅢ'), + (0xFFC4, 'M', 'ᅣ'), + (0xFFC5, 'M', 'ᅤ'), + (0xFFC6, 'M', 'ᅥ'), + (0xFFC7, 'M', 'ᅦ'), + (0xFFC8, 'X'), + (0xFFCA, 'M', 'ᅧ'), + (0xFFCB, 'M', 'ᅨ'), + (0xFFCC, 'M', 'ᅩ'), + (0xFFCD, 'M', 'ᅪ'), + (0xFFCE, 'M', 'ᅫ'), + (0xFFCF, 'M', 'ᅬ'), + (0xFFD0, 'X'), + (0xFFD2, 'M', 'ᅭ'), + (0xFFD3, 'M', 'ᅮ'), + (0xFFD4, 'M', 'ᅯ'), + (0xFFD5, 'M', 'ᅰ'), + (0xFFD6, 'M', 'ᅱ'), + (0xFFD7, 'M', 'ᅲ'), + (0xFFD8, 'X'), + (0xFFDA, 'M', 'ᅳ'), + (0xFFDB, 'M', 'ᅴ'), + (0xFFDC, 'M', 'ᅵ'), + (0xFFDD, 'X'), + (0xFFE0, 'M', '¢'), + (0xFFE1, 'M', '£'), + (0xFFE2, 'M', '¬'), + (0xFFE3, '3', ' ̄'), + (0xFFE4, 'M', '¦'), + (0xFFE5, 'M', '¥'), + (0xFFE6, 'M', '₩'), + (0xFFE7, 'X'), + (0xFFE8, 'M', '│'), + (0xFFE9, 'M', '←'), + ] + +def _seg_53() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0xFFEA, 'M', '↑'), + (0xFFEB, 'M', '→'), + (0xFFEC, 'M', '↓'), + (0xFFED, 'M', '■'), + (0xFFEE, 'M', '○'), + (0xFFEF, 'X'), + (0x10000, 'V'), + (0x1000C, 'X'), + (0x1000D, 'V'), + (0x10027, 'X'), + (0x10028, 'V'), + (0x1003B, 'X'), + (0x1003C, 'V'), + (0x1003E, 'X'), + (0x1003F, 'V'), + (0x1004E, 'X'), + (0x10050, 'V'), + (0x1005E, 'X'), + (0x10080, 'V'), + (0x100FB, 'X'), + (0x10100, 'V'), + (0x10103, 'X'), + (0x10107, 'V'), + (0x10134, 'X'), + (0x10137, 'V'), + (0x1018F, 'X'), + (0x10190, 'V'), + (0x1019D, 'X'), + (0x101A0, 'V'), + (0x101A1, 'X'), + (0x101D0, 'V'), + (0x101FE, 'X'), + (0x10280, 'V'), + (0x1029D, 'X'), + (0x102A0, 'V'), + (0x102D1, 'X'), + (0x102E0, 'V'), + (0x102FC, 'X'), + (0x10300, 'V'), + (0x10324, 'X'), + (0x1032D, 'V'), + (0x1034B, 'X'), + (0x10350, 'V'), + (0x1037B, 'X'), + (0x10380, 'V'), + (0x1039E, 'X'), + (0x1039F, 'V'), + (0x103C4, 'X'), + (0x103C8, 'V'), + (0x103D6, 'X'), + (0x10400, 'M', '𐐨'), + (0x10401, 'M', '𐐩'), + (0x10402, 'M', '𐐪'), + (0x10403, 'M', '𐐫'), + (0x10404, 'M', '𐐬'), + (0x10405, 'M', '𐐭'), + (0x10406, 'M', '𐐮'), + (0x10407, 'M', '𐐯'), + (0x10408, 'M', '𐐰'), + (0x10409, 'M', '𐐱'), + (0x1040A, 'M', '𐐲'), + (0x1040B, 'M', '𐐳'), + (0x1040C, 'M', '𐐴'), + (0x1040D, 'M', '𐐵'), + (0x1040E, 'M', '𐐶'), + (0x1040F, 'M', '𐐷'), + (0x10410, 'M', '𐐸'), + (0x10411, 'M', '𐐹'), + (0x10412, 'M', '𐐺'), + (0x10413, 'M', '𐐻'), + (0x10414, 'M', '𐐼'), + (0x10415, 'M', '𐐽'), + (0x10416, 'M', '𐐾'), + (0x10417, 'M', '𐐿'), + (0x10418, 'M', '𐑀'), + (0x10419, 'M', '𐑁'), + (0x1041A, 'M', '𐑂'), + (0x1041B, 'M', '𐑃'), + (0x1041C, 'M', '𐑄'), + (0x1041D, 'M', '𐑅'), + (0x1041E, 'M', '𐑆'), + (0x1041F, 'M', '𐑇'), + (0x10420, 'M', '𐑈'), + (0x10421, 'M', '𐑉'), + (0x10422, 'M', '𐑊'), + (0x10423, 'M', '𐑋'), + (0x10424, 'M', '𐑌'), + (0x10425, 'M', '𐑍'), + (0x10426, 'M', '𐑎'), + (0x10427, 'M', '𐑏'), + (0x10428, 'V'), + (0x1049E, 'X'), + (0x104A0, 'V'), + (0x104AA, 'X'), + (0x104B0, 'M', '𐓘'), + (0x104B1, 'M', '𐓙'), + (0x104B2, 'M', '𐓚'), + (0x104B3, 'M', '𐓛'), + (0x104B4, 'M', '𐓜'), + (0x104B5, 'M', '𐓝'), + ] + +def _seg_54() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x104B6, 'M', '𐓞'), + (0x104B7, 'M', '𐓟'), + (0x104B8, 'M', '𐓠'), + (0x104B9, 'M', '𐓡'), + (0x104BA, 'M', '𐓢'), + (0x104BB, 'M', '𐓣'), + (0x104BC, 'M', '𐓤'), + (0x104BD, 'M', '𐓥'), + (0x104BE, 'M', '𐓦'), + (0x104BF, 'M', '𐓧'), + (0x104C0, 'M', '𐓨'), + (0x104C1, 'M', '𐓩'), + (0x104C2, 'M', '𐓪'), + (0x104C3, 'M', '𐓫'), + (0x104C4, 'M', '𐓬'), + (0x104C5, 'M', '𐓭'), + (0x104C6, 'M', '𐓮'), + (0x104C7, 'M', '𐓯'), + (0x104C8, 'M', '𐓰'), + (0x104C9, 'M', '𐓱'), + (0x104CA, 'M', '𐓲'), + (0x104CB, 'M', '𐓳'), + (0x104CC, 'M', '𐓴'), + (0x104CD, 'M', '𐓵'), + (0x104CE, 'M', '𐓶'), + (0x104CF, 'M', '𐓷'), + (0x104D0, 'M', '𐓸'), + (0x104D1, 'M', '𐓹'), + (0x104D2, 'M', '𐓺'), + (0x104D3, 'M', '𐓻'), + (0x104D4, 'X'), + (0x104D8, 'V'), + (0x104FC, 'X'), + (0x10500, 'V'), + (0x10528, 'X'), + (0x10530, 'V'), + (0x10564, 'X'), + (0x1056F, 'V'), + (0x10570, 'M', '𐖗'), + (0x10571, 'M', '𐖘'), + (0x10572, 'M', '𐖙'), + (0x10573, 'M', '𐖚'), + (0x10574, 'M', '𐖛'), + (0x10575, 'M', '𐖜'), + (0x10576, 'M', '𐖝'), + (0x10577, 'M', '𐖞'), + (0x10578, 'M', '𐖟'), + (0x10579, 'M', '𐖠'), + (0x1057A, 'M', '𐖡'), + (0x1057B, 'X'), + (0x1057C, 'M', '𐖣'), + (0x1057D, 'M', '𐖤'), + (0x1057E, 'M', '𐖥'), + (0x1057F, 'M', '𐖦'), + (0x10580, 'M', '𐖧'), + (0x10581, 'M', '𐖨'), + (0x10582, 'M', '𐖩'), + (0x10583, 'M', '𐖪'), + (0x10584, 'M', '𐖫'), + (0x10585, 'M', '𐖬'), + (0x10586, 'M', '𐖭'), + (0x10587, 'M', '𐖮'), + (0x10588, 'M', '𐖯'), + (0x10589, 'M', '𐖰'), + (0x1058A, 'M', '𐖱'), + (0x1058B, 'X'), + (0x1058C, 'M', '𐖳'), + (0x1058D, 'M', '𐖴'), + (0x1058E, 'M', '𐖵'), + (0x1058F, 'M', '𐖶'), + (0x10590, 'M', '𐖷'), + (0x10591, 'M', '𐖸'), + (0x10592, 'M', '𐖹'), + (0x10593, 'X'), + (0x10594, 'M', '𐖻'), + (0x10595, 'M', '𐖼'), + (0x10596, 'X'), + (0x10597, 'V'), + (0x105A2, 'X'), + (0x105A3, 'V'), + (0x105B2, 'X'), + (0x105B3, 'V'), + (0x105BA, 'X'), + (0x105BB, 'V'), + (0x105BD, 'X'), + (0x10600, 'V'), + (0x10737, 'X'), + (0x10740, 'V'), + (0x10756, 'X'), + (0x10760, 'V'), + (0x10768, 'X'), + (0x10780, 'V'), + (0x10781, 'M', 'ː'), + (0x10782, 'M', 'ˑ'), + (0x10783, 'M', 'æ'), + (0x10784, 'M', 'ʙ'), + (0x10785, 'M', 'ɓ'), + (0x10786, 'X'), + (0x10787, 'M', 'ʣ'), + (0x10788, 'M', 'ꭦ'), + ] + +def _seg_55() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x10789, 'M', 'ʥ'), + (0x1078A, 'M', 'ʤ'), + (0x1078B, 'M', 'ɖ'), + (0x1078C, 'M', 'ɗ'), + (0x1078D, 'M', 'ᶑ'), + (0x1078E, 'M', 'ɘ'), + (0x1078F, 'M', 'ɞ'), + (0x10790, 'M', 'ʩ'), + (0x10791, 'M', 'ɤ'), + (0x10792, 'M', 'ɢ'), + (0x10793, 'M', 'ɠ'), + (0x10794, 'M', 'ʛ'), + (0x10795, 'M', 'ħ'), + (0x10796, 'M', 'ʜ'), + (0x10797, 'M', 'ɧ'), + (0x10798, 'M', 'ʄ'), + (0x10799, 'M', 'ʪ'), + (0x1079A, 'M', 'ʫ'), + (0x1079B, 'M', 'ɬ'), + (0x1079C, 'M', '𝼄'), + (0x1079D, 'M', 'ꞎ'), + (0x1079E, 'M', 'ɮ'), + (0x1079F, 'M', '𝼅'), + (0x107A0, 'M', 'ʎ'), + (0x107A1, 'M', '𝼆'), + (0x107A2, 'M', 'ø'), + (0x107A3, 'M', 'ɶ'), + (0x107A4, 'M', 'ɷ'), + (0x107A5, 'M', 'q'), + (0x107A6, 'M', 'ɺ'), + (0x107A7, 'M', '𝼈'), + (0x107A8, 'M', 'ɽ'), + (0x107A9, 'M', 'ɾ'), + (0x107AA, 'M', 'ʀ'), + (0x107AB, 'M', 'ʨ'), + (0x107AC, 'M', 'ʦ'), + (0x107AD, 'M', 'ꭧ'), + (0x107AE, 'M', 'ʧ'), + (0x107AF, 'M', 'ʈ'), + (0x107B0, 'M', 'ⱱ'), + (0x107B1, 'X'), + (0x107B2, 'M', 'ʏ'), + (0x107B3, 'M', 'ʡ'), + (0x107B4, 'M', 'ʢ'), + (0x107B5, 'M', 'ʘ'), + (0x107B6, 'M', 'ǀ'), + (0x107B7, 'M', 'ǁ'), + (0x107B8, 'M', 'ǂ'), + (0x107B9, 'M', '𝼊'), + (0x107BA, 'M', '𝼞'), + (0x107BB, 'X'), + (0x10800, 'V'), + (0x10806, 'X'), + (0x10808, 'V'), + (0x10809, 'X'), + (0x1080A, 'V'), + (0x10836, 'X'), + (0x10837, 'V'), + (0x10839, 'X'), + (0x1083C, 'V'), + (0x1083D, 'X'), + (0x1083F, 'V'), + (0x10856, 'X'), + (0x10857, 'V'), + (0x1089F, 'X'), + (0x108A7, 'V'), + (0x108B0, 'X'), + (0x108E0, 'V'), + (0x108F3, 'X'), + (0x108F4, 'V'), + (0x108F6, 'X'), + (0x108FB, 'V'), + (0x1091C, 'X'), + (0x1091F, 'V'), + (0x1093A, 'X'), + (0x1093F, 'V'), + (0x10940, 'X'), + (0x10980, 'V'), + (0x109B8, 'X'), + (0x109BC, 'V'), + (0x109D0, 'X'), + (0x109D2, 'V'), + (0x10A04, 'X'), + (0x10A05, 'V'), + (0x10A07, 'X'), + (0x10A0C, 'V'), + (0x10A14, 'X'), + (0x10A15, 'V'), + (0x10A18, 'X'), + (0x10A19, 'V'), + (0x10A36, 'X'), + (0x10A38, 'V'), + (0x10A3B, 'X'), + (0x10A3F, 'V'), + (0x10A49, 'X'), + (0x10A50, 'V'), + (0x10A59, 'X'), + (0x10A60, 'V'), + (0x10AA0, 'X'), + (0x10AC0, 'V'), + ] + +def _seg_56() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x10AE7, 'X'), + (0x10AEB, 'V'), + (0x10AF7, 'X'), + (0x10B00, 'V'), + (0x10B36, 'X'), + (0x10B39, 'V'), + (0x10B56, 'X'), + (0x10B58, 'V'), + (0x10B73, 'X'), + (0x10B78, 'V'), + (0x10B92, 'X'), + (0x10B99, 'V'), + (0x10B9D, 'X'), + (0x10BA9, 'V'), + (0x10BB0, 'X'), + (0x10C00, 'V'), + (0x10C49, 'X'), + (0x10C80, 'M', '𐳀'), + (0x10C81, 'M', '𐳁'), + (0x10C82, 'M', '𐳂'), + (0x10C83, 'M', '𐳃'), + (0x10C84, 'M', '𐳄'), + (0x10C85, 'M', '𐳅'), + (0x10C86, 'M', '𐳆'), + (0x10C87, 'M', '𐳇'), + (0x10C88, 'M', '𐳈'), + (0x10C89, 'M', '𐳉'), + (0x10C8A, 'M', '𐳊'), + (0x10C8B, 'M', '𐳋'), + (0x10C8C, 'M', '𐳌'), + (0x10C8D, 'M', '𐳍'), + (0x10C8E, 'M', '𐳎'), + (0x10C8F, 'M', '𐳏'), + (0x10C90, 'M', '𐳐'), + (0x10C91, 'M', '𐳑'), + (0x10C92, 'M', '𐳒'), + (0x10C93, 'M', '𐳓'), + (0x10C94, 'M', '𐳔'), + (0x10C95, 'M', '𐳕'), + (0x10C96, 'M', '𐳖'), + (0x10C97, 'M', '𐳗'), + (0x10C98, 'M', '𐳘'), + (0x10C99, 'M', '𐳙'), + (0x10C9A, 'M', '𐳚'), + (0x10C9B, 'M', '𐳛'), + (0x10C9C, 'M', '𐳜'), + (0x10C9D, 'M', '𐳝'), + (0x10C9E, 'M', '𐳞'), + (0x10C9F, 'M', '𐳟'), + (0x10CA0, 'M', '𐳠'), + (0x10CA1, 'M', '𐳡'), + (0x10CA2, 'M', '𐳢'), + (0x10CA3, 'M', '𐳣'), + (0x10CA4, 'M', '𐳤'), + (0x10CA5, 'M', '𐳥'), + (0x10CA6, 'M', '𐳦'), + (0x10CA7, 'M', '𐳧'), + (0x10CA8, 'M', '𐳨'), + (0x10CA9, 'M', '𐳩'), + (0x10CAA, 'M', '𐳪'), + (0x10CAB, 'M', '𐳫'), + (0x10CAC, 'M', '𐳬'), + (0x10CAD, 'M', '𐳭'), + (0x10CAE, 'M', '𐳮'), + (0x10CAF, 'M', '𐳯'), + (0x10CB0, 'M', '𐳰'), + (0x10CB1, 'M', '𐳱'), + (0x10CB2, 'M', '𐳲'), + (0x10CB3, 'X'), + (0x10CC0, 'V'), + (0x10CF3, 'X'), + (0x10CFA, 'V'), + (0x10D28, 'X'), + (0x10D30, 'V'), + (0x10D3A, 'X'), + (0x10E60, 'V'), + (0x10E7F, 'X'), + (0x10E80, 'V'), + (0x10EAA, 'X'), + (0x10EAB, 'V'), + (0x10EAE, 'X'), + (0x10EB0, 'V'), + (0x10EB2, 'X'), + (0x10EFD, 'V'), + (0x10F28, 'X'), + (0x10F30, 'V'), + (0x10F5A, 'X'), + (0x10F70, 'V'), + (0x10F8A, 'X'), + (0x10FB0, 'V'), + (0x10FCC, 'X'), + (0x10FE0, 'V'), + (0x10FF7, 'X'), + (0x11000, 'V'), + (0x1104E, 'X'), + (0x11052, 'V'), + (0x11076, 'X'), + (0x1107F, 'V'), + (0x110BD, 'X'), + (0x110BE, 'V'), + ] + +def _seg_57() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x110C3, 'X'), + (0x110D0, 'V'), + (0x110E9, 'X'), + (0x110F0, 'V'), + (0x110FA, 'X'), + (0x11100, 'V'), + (0x11135, 'X'), + (0x11136, 'V'), + (0x11148, 'X'), + (0x11150, 'V'), + (0x11177, 'X'), + (0x11180, 'V'), + (0x111E0, 'X'), + (0x111E1, 'V'), + (0x111F5, 'X'), + (0x11200, 'V'), + (0x11212, 'X'), + (0x11213, 'V'), + (0x11242, 'X'), + (0x11280, 'V'), + (0x11287, 'X'), + (0x11288, 'V'), + (0x11289, 'X'), + (0x1128A, 'V'), + (0x1128E, 'X'), + (0x1128F, 'V'), + (0x1129E, 'X'), + (0x1129F, 'V'), + (0x112AA, 'X'), + (0x112B0, 'V'), + (0x112EB, 'X'), + (0x112F0, 'V'), + (0x112FA, 'X'), + (0x11300, 'V'), + (0x11304, 'X'), + (0x11305, 'V'), + (0x1130D, 'X'), + (0x1130F, 'V'), + (0x11311, 'X'), + (0x11313, 'V'), + (0x11329, 'X'), + (0x1132A, 'V'), + (0x11331, 'X'), + (0x11332, 'V'), + (0x11334, 'X'), + (0x11335, 'V'), + (0x1133A, 'X'), + (0x1133B, 'V'), + (0x11345, 'X'), + (0x11347, 'V'), + (0x11349, 'X'), + (0x1134B, 'V'), + (0x1134E, 'X'), + (0x11350, 'V'), + (0x11351, 'X'), + (0x11357, 'V'), + (0x11358, 'X'), + (0x1135D, 'V'), + (0x11364, 'X'), + (0x11366, 'V'), + (0x1136D, 'X'), + (0x11370, 'V'), + (0x11375, 'X'), + (0x11400, 'V'), + (0x1145C, 'X'), + (0x1145D, 'V'), + (0x11462, 'X'), + (0x11480, 'V'), + (0x114C8, 'X'), + (0x114D0, 'V'), + (0x114DA, 'X'), + (0x11580, 'V'), + (0x115B6, 'X'), + (0x115B8, 'V'), + (0x115DE, 'X'), + (0x11600, 'V'), + (0x11645, 'X'), + (0x11650, 'V'), + (0x1165A, 'X'), + (0x11660, 'V'), + (0x1166D, 'X'), + (0x11680, 'V'), + (0x116BA, 'X'), + (0x116C0, 'V'), + (0x116CA, 'X'), + (0x11700, 'V'), + (0x1171B, 'X'), + (0x1171D, 'V'), + (0x1172C, 'X'), + (0x11730, 'V'), + (0x11747, 'X'), + (0x11800, 'V'), + (0x1183C, 'X'), + (0x118A0, 'M', '𑣀'), + (0x118A1, 'M', '𑣁'), + (0x118A2, 'M', '𑣂'), + (0x118A3, 'M', '𑣃'), + (0x118A4, 'M', '𑣄'), + (0x118A5, 'M', '𑣅'), + (0x118A6, 'M', '𑣆'), + ] + +def _seg_58() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x118A7, 'M', '𑣇'), + (0x118A8, 'M', '𑣈'), + (0x118A9, 'M', '𑣉'), + (0x118AA, 'M', '𑣊'), + (0x118AB, 'M', '𑣋'), + (0x118AC, 'M', '𑣌'), + (0x118AD, 'M', '𑣍'), + (0x118AE, 'M', '𑣎'), + (0x118AF, 'M', '𑣏'), + (0x118B0, 'M', '𑣐'), + (0x118B1, 'M', '𑣑'), + (0x118B2, 'M', '𑣒'), + (0x118B3, 'M', '𑣓'), + (0x118B4, 'M', '𑣔'), + (0x118B5, 'M', '𑣕'), + (0x118B6, 'M', '𑣖'), + (0x118B7, 'M', '𑣗'), + (0x118B8, 'M', '𑣘'), + (0x118B9, 'M', '𑣙'), + (0x118BA, 'M', '𑣚'), + (0x118BB, 'M', '𑣛'), + (0x118BC, 'M', '𑣜'), + (0x118BD, 'M', '𑣝'), + (0x118BE, 'M', '𑣞'), + (0x118BF, 'M', '𑣟'), + (0x118C0, 'V'), + (0x118F3, 'X'), + (0x118FF, 'V'), + (0x11907, 'X'), + (0x11909, 'V'), + (0x1190A, 'X'), + (0x1190C, 'V'), + (0x11914, 'X'), + (0x11915, 'V'), + (0x11917, 'X'), + (0x11918, 'V'), + (0x11936, 'X'), + (0x11937, 'V'), + (0x11939, 'X'), + (0x1193B, 'V'), + (0x11947, 'X'), + (0x11950, 'V'), + (0x1195A, 'X'), + (0x119A0, 'V'), + (0x119A8, 'X'), + (0x119AA, 'V'), + (0x119D8, 'X'), + (0x119DA, 'V'), + (0x119E5, 'X'), + (0x11A00, 'V'), + (0x11A48, 'X'), + (0x11A50, 'V'), + (0x11AA3, 'X'), + (0x11AB0, 'V'), + (0x11AF9, 'X'), + (0x11B00, 'V'), + (0x11B0A, 'X'), + (0x11C00, 'V'), + (0x11C09, 'X'), + (0x11C0A, 'V'), + (0x11C37, 'X'), + (0x11C38, 'V'), + (0x11C46, 'X'), + (0x11C50, 'V'), + (0x11C6D, 'X'), + (0x11C70, 'V'), + (0x11C90, 'X'), + (0x11C92, 'V'), + (0x11CA8, 'X'), + (0x11CA9, 'V'), + (0x11CB7, 'X'), + (0x11D00, 'V'), + (0x11D07, 'X'), + (0x11D08, 'V'), + (0x11D0A, 'X'), + (0x11D0B, 'V'), + (0x11D37, 'X'), + (0x11D3A, 'V'), + (0x11D3B, 'X'), + (0x11D3C, 'V'), + (0x11D3E, 'X'), + (0x11D3F, 'V'), + (0x11D48, 'X'), + (0x11D50, 'V'), + (0x11D5A, 'X'), + (0x11D60, 'V'), + (0x11D66, 'X'), + (0x11D67, 'V'), + (0x11D69, 'X'), + (0x11D6A, 'V'), + (0x11D8F, 'X'), + (0x11D90, 'V'), + (0x11D92, 'X'), + (0x11D93, 'V'), + (0x11D99, 'X'), + (0x11DA0, 'V'), + (0x11DAA, 'X'), + (0x11EE0, 'V'), + (0x11EF9, 'X'), + (0x11F00, 'V'), + ] + +def _seg_59() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x11F11, 'X'), + (0x11F12, 'V'), + (0x11F3B, 'X'), + (0x11F3E, 'V'), + (0x11F5A, 'X'), + (0x11FB0, 'V'), + (0x11FB1, 'X'), + (0x11FC0, 'V'), + (0x11FF2, 'X'), + (0x11FFF, 'V'), + (0x1239A, 'X'), + (0x12400, 'V'), + (0x1246F, 'X'), + (0x12470, 'V'), + (0x12475, 'X'), + (0x12480, 'V'), + (0x12544, 'X'), + (0x12F90, 'V'), + (0x12FF3, 'X'), + (0x13000, 'V'), + (0x13430, 'X'), + (0x13440, 'V'), + (0x13456, 'X'), + (0x14400, 'V'), + (0x14647, 'X'), + (0x16800, 'V'), + (0x16A39, 'X'), + (0x16A40, 'V'), + (0x16A5F, 'X'), + (0x16A60, 'V'), + (0x16A6A, 'X'), + (0x16A6E, 'V'), + (0x16ABF, 'X'), + (0x16AC0, 'V'), + (0x16ACA, 'X'), + (0x16AD0, 'V'), + (0x16AEE, 'X'), + (0x16AF0, 'V'), + (0x16AF6, 'X'), + (0x16B00, 'V'), + (0x16B46, 'X'), + (0x16B50, 'V'), + (0x16B5A, 'X'), + (0x16B5B, 'V'), + (0x16B62, 'X'), + (0x16B63, 'V'), + (0x16B78, 'X'), + (0x16B7D, 'V'), + (0x16B90, 'X'), + (0x16E40, 'M', '𖹠'), + (0x16E41, 'M', '𖹡'), + (0x16E42, 'M', '𖹢'), + (0x16E43, 'M', '𖹣'), + (0x16E44, 'M', '𖹤'), + (0x16E45, 'M', '𖹥'), + (0x16E46, 'M', '𖹦'), + (0x16E47, 'M', '𖹧'), + (0x16E48, 'M', '𖹨'), + (0x16E49, 'M', '𖹩'), + (0x16E4A, 'M', '𖹪'), + (0x16E4B, 'M', '𖹫'), + (0x16E4C, 'M', '𖹬'), + (0x16E4D, 'M', '𖹭'), + (0x16E4E, 'M', '𖹮'), + (0x16E4F, 'M', '𖹯'), + (0x16E50, 'M', '𖹰'), + (0x16E51, 'M', '𖹱'), + (0x16E52, 'M', '𖹲'), + (0x16E53, 'M', '𖹳'), + (0x16E54, 'M', '𖹴'), + (0x16E55, 'M', '𖹵'), + (0x16E56, 'M', '𖹶'), + (0x16E57, 'M', '𖹷'), + (0x16E58, 'M', '𖹸'), + (0x16E59, 'M', '𖹹'), + (0x16E5A, 'M', '𖹺'), + (0x16E5B, 'M', '𖹻'), + (0x16E5C, 'M', '𖹼'), + (0x16E5D, 'M', '𖹽'), + (0x16E5E, 'M', '𖹾'), + (0x16E5F, 'M', '𖹿'), + (0x16E60, 'V'), + (0x16E9B, 'X'), + (0x16F00, 'V'), + (0x16F4B, 'X'), + (0x16F4F, 'V'), + (0x16F88, 'X'), + (0x16F8F, 'V'), + (0x16FA0, 'X'), + (0x16FE0, 'V'), + (0x16FE5, 'X'), + (0x16FF0, 'V'), + (0x16FF2, 'X'), + (0x17000, 'V'), + (0x187F8, 'X'), + (0x18800, 'V'), + (0x18CD6, 'X'), + (0x18D00, 'V'), + (0x18D09, 'X'), + (0x1AFF0, 'V'), + ] + +def _seg_60() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1AFF4, 'X'), + (0x1AFF5, 'V'), + (0x1AFFC, 'X'), + (0x1AFFD, 'V'), + (0x1AFFF, 'X'), + (0x1B000, 'V'), + (0x1B123, 'X'), + (0x1B132, 'V'), + (0x1B133, 'X'), + (0x1B150, 'V'), + (0x1B153, 'X'), + (0x1B155, 'V'), + (0x1B156, 'X'), + (0x1B164, 'V'), + (0x1B168, 'X'), + (0x1B170, 'V'), + (0x1B2FC, 'X'), + (0x1BC00, 'V'), + (0x1BC6B, 'X'), + (0x1BC70, 'V'), + (0x1BC7D, 'X'), + (0x1BC80, 'V'), + (0x1BC89, 'X'), + (0x1BC90, 'V'), + (0x1BC9A, 'X'), + (0x1BC9C, 'V'), + (0x1BCA0, 'I'), + (0x1BCA4, 'X'), + (0x1CF00, 'V'), + (0x1CF2E, 'X'), + (0x1CF30, 'V'), + (0x1CF47, 'X'), + (0x1CF50, 'V'), + (0x1CFC4, 'X'), + (0x1D000, 'V'), + (0x1D0F6, 'X'), + (0x1D100, 'V'), + (0x1D127, 'X'), + (0x1D129, 'V'), + (0x1D15E, 'M', '𝅗𝅥'), + (0x1D15F, 'M', '𝅘𝅥'), + (0x1D160, 'M', '𝅘𝅥𝅮'), + (0x1D161, 'M', '𝅘𝅥𝅯'), + (0x1D162, 'M', '𝅘𝅥𝅰'), + (0x1D163, 'M', '𝅘𝅥𝅱'), + (0x1D164, 'M', '𝅘𝅥𝅲'), + (0x1D165, 'V'), + (0x1D173, 'X'), + (0x1D17B, 'V'), + (0x1D1BB, 'M', '𝆹𝅥'), + (0x1D1BC, 'M', '𝆺𝅥'), + (0x1D1BD, 'M', '𝆹𝅥𝅮'), + (0x1D1BE, 'M', '𝆺𝅥𝅮'), + (0x1D1BF, 'M', '𝆹𝅥𝅯'), + (0x1D1C0, 'M', '𝆺𝅥𝅯'), + (0x1D1C1, 'V'), + (0x1D1EB, 'X'), + (0x1D200, 'V'), + (0x1D246, 'X'), + (0x1D2C0, 'V'), + (0x1D2D4, 'X'), + (0x1D2E0, 'V'), + (0x1D2F4, 'X'), + (0x1D300, 'V'), + (0x1D357, 'X'), + (0x1D360, 'V'), + (0x1D379, 'X'), + (0x1D400, 'M', 'a'), + (0x1D401, 'M', 'b'), + (0x1D402, 'M', 'c'), + (0x1D403, 'M', 'd'), + (0x1D404, 'M', 'e'), + (0x1D405, 'M', 'f'), + (0x1D406, 'M', 'g'), + (0x1D407, 'M', 'h'), + (0x1D408, 'M', 'i'), + (0x1D409, 'M', 'j'), + (0x1D40A, 'M', 'k'), + (0x1D40B, 'M', 'l'), + (0x1D40C, 'M', 'm'), + (0x1D40D, 'M', 'n'), + (0x1D40E, 'M', 'o'), + (0x1D40F, 'M', 'p'), + (0x1D410, 'M', 'q'), + (0x1D411, 'M', 'r'), + (0x1D412, 'M', 's'), + (0x1D413, 'M', 't'), + (0x1D414, 'M', 'u'), + (0x1D415, 'M', 'v'), + (0x1D416, 'M', 'w'), + (0x1D417, 'M', 'x'), + (0x1D418, 'M', 'y'), + (0x1D419, 'M', 'z'), + (0x1D41A, 'M', 'a'), + (0x1D41B, 'M', 'b'), + (0x1D41C, 'M', 'c'), + (0x1D41D, 'M', 'd'), + (0x1D41E, 'M', 'e'), + (0x1D41F, 'M', 'f'), + (0x1D420, 'M', 'g'), + ] + +def _seg_61() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D421, 'M', 'h'), + (0x1D422, 'M', 'i'), + (0x1D423, 'M', 'j'), + (0x1D424, 'M', 'k'), + (0x1D425, 'M', 'l'), + (0x1D426, 'M', 'm'), + (0x1D427, 'M', 'n'), + (0x1D428, 'M', 'o'), + (0x1D429, 'M', 'p'), + (0x1D42A, 'M', 'q'), + (0x1D42B, 'M', 'r'), + (0x1D42C, 'M', 's'), + (0x1D42D, 'M', 't'), + (0x1D42E, 'M', 'u'), + (0x1D42F, 'M', 'v'), + (0x1D430, 'M', 'w'), + (0x1D431, 'M', 'x'), + (0x1D432, 'M', 'y'), + (0x1D433, 'M', 'z'), + (0x1D434, 'M', 'a'), + (0x1D435, 'M', 'b'), + (0x1D436, 'M', 'c'), + (0x1D437, 'M', 'd'), + (0x1D438, 'M', 'e'), + (0x1D439, 'M', 'f'), + (0x1D43A, 'M', 'g'), + (0x1D43B, 'M', 'h'), + (0x1D43C, 'M', 'i'), + (0x1D43D, 'M', 'j'), + (0x1D43E, 'M', 'k'), + (0x1D43F, 'M', 'l'), + (0x1D440, 'M', 'm'), + (0x1D441, 'M', 'n'), + (0x1D442, 'M', 'o'), + (0x1D443, 'M', 'p'), + (0x1D444, 'M', 'q'), + (0x1D445, 'M', 'r'), + (0x1D446, 'M', 's'), + (0x1D447, 'M', 't'), + (0x1D448, 'M', 'u'), + (0x1D449, 'M', 'v'), + (0x1D44A, 'M', 'w'), + (0x1D44B, 'M', 'x'), + (0x1D44C, 'M', 'y'), + (0x1D44D, 'M', 'z'), + (0x1D44E, 'M', 'a'), + (0x1D44F, 'M', 'b'), + (0x1D450, 'M', 'c'), + (0x1D451, 'M', 'd'), + (0x1D452, 'M', 'e'), + (0x1D453, 'M', 'f'), + (0x1D454, 'M', 'g'), + (0x1D455, 'X'), + (0x1D456, 'M', 'i'), + (0x1D457, 'M', 'j'), + (0x1D458, 'M', 'k'), + (0x1D459, 'M', 'l'), + (0x1D45A, 'M', 'm'), + (0x1D45B, 'M', 'n'), + (0x1D45C, 'M', 'o'), + (0x1D45D, 'M', 'p'), + (0x1D45E, 'M', 'q'), + (0x1D45F, 'M', 'r'), + (0x1D460, 'M', 's'), + (0x1D461, 'M', 't'), + (0x1D462, 'M', 'u'), + (0x1D463, 'M', 'v'), + (0x1D464, 'M', 'w'), + (0x1D465, 'M', 'x'), + (0x1D466, 'M', 'y'), + (0x1D467, 'M', 'z'), + (0x1D468, 'M', 'a'), + (0x1D469, 'M', 'b'), + (0x1D46A, 'M', 'c'), + (0x1D46B, 'M', 'd'), + (0x1D46C, 'M', 'e'), + (0x1D46D, 'M', 'f'), + (0x1D46E, 'M', 'g'), + (0x1D46F, 'M', 'h'), + (0x1D470, 'M', 'i'), + (0x1D471, 'M', 'j'), + (0x1D472, 'M', 'k'), + (0x1D473, 'M', 'l'), + (0x1D474, 'M', 'm'), + (0x1D475, 'M', 'n'), + (0x1D476, 'M', 'o'), + (0x1D477, 'M', 'p'), + (0x1D478, 'M', 'q'), + (0x1D479, 'M', 'r'), + (0x1D47A, 'M', 's'), + (0x1D47B, 'M', 't'), + (0x1D47C, 'M', 'u'), + (0x1D47D, 'M', 'v'), + (0x1D47E, 'M', 'w'), + (0x1D47F, 'M', 'x'), + (0x1D480, 'M', 'y'), + (0x1D481, 'M', 'z'), + (0x1D482, 'M', 'a'), + (0x1D483, 'M', 'b'), + (0x1D484, 'M', 'c'), + ] + +def _seg_62() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D485, 'M', 'd'), + (0x1D486, 'M', 'e'), + (0x1D487, 'M', 'f'), + (0x1D488, 'M', 'g'), + (0x1D489, 'M', 'h'), + (0x1D48A, 'M', 'i'), + (0x1D48B, 'M', 'j'), + (0x1D48C, 'M', 'k'), + (0x1D48D, 'M', 'l'), + (0x1D48E, 'M', 'm'), + (0x1D48F, 'M', 'n'), + (0x1D490, 'M', 'o'), + (0x1D491, 'M', 'p'), + (0x1D492, 'M', 'q'), + (0x1D493, 'M', 'r'), + (0x1D494, 'M', 's'), + (0x1D495, 'M', 't'), + (0x1D496, 'M', 'u'), + (0x1D497, 'M', 'v'), + (0x1D498, 'M', 'w'), + (0x1D499, 'M', 'x'), + (0x1D49A, 'M', 'y'), + (0x1D49B, 'M', 'z'), + (0x1D49C, 'M', 'a'), + (0x1D49D, 'X'), + (0x1D49E, 'M', 'c'), + (0x1D49F, 'M', 'd'), + (0x1D4A0, 'X'), + (0x1D4A2, 'M', 'g'), + (0x1D4A3, 'X'), + (0x1D4A5, 'M', 'j'), + (0x1D4A6, 'M', 'k'), + (0x1D4A7, 'X'), + (0x1D4A9, 'M', 'n'), + (0x1D4AA, 'M', 'o'), + (0x1D4AB, 'M', 'p'), + (0x1D4AC, 'M', 'q'), + (0x1D4AD, 'X'), + (0x1D4AE, 'M', 's'), + (0x1D4AF, 'M', 't'), + (0x1D4B0, 'M', 'u'), + (0x1D4B1, 'M', 'v'), + (0x1D4B2, 'M', 'w'), + (0x1D4B3, 'M', 'x'), + (0x1D4B4, 'M', 'y'), + (0x1D4B5, 'M', 'z'), + (0x1D4B6, 'M', 'a'), + (0x1D4B7, 'M', 'b'), + (0x1D4B8, 'M', 'c'), + (0x1D4B9, 'M', 'd'), + (0x1D4BA, 'X'), + (0x1D4BB, 'M', 'f'), + (0x1D4BC, 'X'), + (0x1D4BD, 'M', 'h'), + (0x1D4BE, 'M', 'i'), + (0x1D4BF, 'M', 'j'), + (0x1D4C0, 'M', 'k'), + (0x1D4C1, 'M', 'l'), + (0x1D4C2, 'M', 'm'), + (0x1D4C3, 'M', 'n'), + (0x1D4C4, 'X'), + (0x1D4C5, 'M', 'p'), + (0x1D4C6, 'M', 'q'), + (0x1D4C7, 'M', 'r'), + (0x1D4C8, 'M', 's'), + (0x1D4C9, 'M', 't'), + (0x1D4CA, 'M', 'u'), + (0x1D4CB, 'M', 'v'), + (0x1D4CC, 'M', 'w'), + (0x1D4CD, 'M', 'x'), + (0x1D4CE, 'M', 'y'), + (0x1D4CF, 'M', 'z'), + (0x1D4D0, 'M', 'a'), + (0x1D4D1, 'M', 'b'), + (0x1D4D2, 'M', 'c'), + (0x1D4D3, 'M', 'd'), + (0x1D4D4, 'M', 'e'), + (0x1D4D5, 'M', 'f'), + (0x1D4D6, 'M', 'g'), + (0x1D4D7, 'M', 'h'), + (0x1D4D8, 'M', 'i'), + (0x1D4D9, 'M', 'j'), + (0x1D4DA, 'M', 'k'), + (0x1D4DB, 'M', 'l'), + (0x1D4DC, 'M', 'm'), + (0x1D4DD, 'M', 'n'), + (0x1D4DE, 'M', 'o'), + (0x1D4DF, 'M', 'p'), + (0x1D4E0, 'M', 'q'), + (0x1D4E1, 'M', 'r'), + (0x1D4E2, 'M', 's'), + (0x1D4E3, 'M', 't'), + (0x1D4E4, 'M', 'u'), + (0x1D4E5, 'M', 'v'), + (0x1D4E6, 'M', 'w'), + (0x1D4E7, 'M', 'x'), + (0x1D4E8, 'M', 'y'), + (0x1D4E9, 'M', 'z'), + (0x1D4EA, 'M', 'a'), + (0x1D4EB, 'M', 'b'), + ] + +def _seg_63() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D4EC, 'M', 'c'), + (0x1D4ED, 'M', 'd'), + (0x1D4EE, 'M', 'e'), + (0x1D4EF, 'M', 'f'), + (0x1D4F0, 'M', 'g'), + (0x1D4F1, 'M', 'h'), + (0x1D4F2, 'M', 'i'), + (0x1D4F3, 'M', 'j'), + (0x1D4F4, 'M', 'k'), + (0x1D4F5, 'M', 'l'), + (0x1D4F6, 'M', 'm'), + (0x1D4F7, 'M', 'n'), + (0x1D4F8, 'M', 'o'), + (0x1D4F9, 'M', 'p'), + (0x1D4FA, 'M', 'q'), + (0x1D4FB, 'M', 'r'), + (0x1D4FC, 'M', 's'), + (0x1D4FD, 'M', 't'), + (0x1D4FE, 'M', 'u'), + (0x1D4FF, 'M', 'v'), + (0x1D500, 'M', 'w'), + (0x1D501, 'M', 'x'), + (0x1D502, 'M', 'y'), + (0x1D503, 'M', 'z'), + (0x1D504, 'M', 'a'), + (0x1D505, 'M', 'b'), + (0x1D506, 'X'), + (0x1D507, 'M', 'd'), + (0x1D508, 'M', 'e'), + (0x1D509, 'M', 'f'), + (0x1D50A, 'M', 'g'), + (0x1D50B, 'X'), + (0x1D50D, 'M', 'j'), + (0x1D50E, 'M', 'k'), + (0x1D50F, 'M', 'l'), + (0x1D510, 'M', 'm'), + (0x1D511, 'M', 'n'), + (0x1D512, 'M', 'o'), + (0x1D513, 'M', 'p'), + (0x1D514, 'M', 'q'), + (0x1D515, 'X'), + (0x1D516, 'M', 's'), + (0x1D517, 'M', 't'), + (0x1D518, 'M', 'u'), + (0x1D519, 'M', 'v'), + (0x1D51A, 'M', 'w'), + (0x1D51B, 'M', 'x'), + (0x1D51C, 'M', 'y'), + (0x1D51D, 'X'), + (0x1D51E, 'M', 'a'), + (0x1D51F, 'M', 'b'), + (0x1D520, 'M', 'c'), + (0x1D521, 'M', 'd'), + (0x1D522, 'M', 'e'), + (0x1D523, 'M', 'f'), + (0x1D524, 'M', 'g'), + (0x1D525, 'M', 'h'), + (0x1D526, 'M', 'i'), + (0x1D527, 'M', 'j'), + (0x1D528, 'M', 'k'), + (0x1D529, 'M', 'l'), + (0x1D52A, 'M', 'm'), + (0x1D52B, 'M', 'n'), + (0x1D52C, 'M', 'o'), + (0x1D52D, 'M', 'p'), + (0x1D52E, 'M', 'q'), + (0x1D52F, 'M', 'r'), + (0x1D530, 'M', 's'), + (0x1D531, 'M', 't'), + (0x1D532, 'M', 'u'), + (0x1D533, 'M', 'v'), + (0x1D534, 'M', 'w'), + (0x1D535, 'M', 'x'), + (0x1D536, 'M', 'y'), + (0x1D537, 'M', 'z'), + (0x1D538, 'M', 'a'), + (0x1D539, 'M', 'b'), + (0x1D53A, 'X'), + (0x1D53B, 'M', 'd'), + (0x1D53C, 'M', 'e'), + (0x1D53D, 'M', 'f'), + (0x1D53E, 'M', 'g'), + (0x1D53F, 'X'), + (0x1D540, 'M', 'i'), + (0x1D541, 'M', 'j'), + (0x1D542, 'M', 'k'), + (0x1D543, 'M', 'l'), + (0x1D544, 'M', 'm'), + (0x1D545, 'X'), + (0x1D546, 'M', 'o'), + (0x1D547, 'X'), + (0x1D54A, 'M', 's'), + (0x1D54B, 'M', 't'), + (0x1D54C, 'M', 'u'), + (0x1D54D, 'M', 'v'), + (0x1D54E, 'M', 'w'), + (0x1D54F, 'M', 'x'), + (0x1D550, 'M', 'y'), + (0x1D551, 'X'), + (0x1D552, 'M', 'a'), + ] + +def _seg_64() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D553, 'M', 'b'), + (0x1D554, 'M', 'c'), + (0x1D555, 'M', 'd'), + (0x1D556, 'M', 'e'), + (0x1D557, 'M', 'f'), + (0x1D558, 'M', 'g'), + (0x1D559, 'M', 'h'), + (0x1D55A, 'M', 'i'), + (0x1D55B, 'M', 'j'), + (0x1D55C, 'M', 'k'), + (0x1D55D, 'M', 'l'), + (0x1D55E, 'M', 'm'), + (0x1D55F, 'M', 'n'), + (0x1D560, 'M', 'o'), + (0x1D561, 'M', 'p'), + (0x1D562, 'M', 'q'), + (0x1D563, 'M', 'r'), + (0x1D564, 'M', 's'), + (0x1D565, 'M', 't'), + (0x1D566, 'M', 'u'), + (0x1D567, 'M', 'v'), + (0x1D568, 'M', 'w'), + (0x1D569, 'M', 'x'), + (0x1D56A, 'M', 'y'), + (0x1D56B, 'M', 'z'), + (0x1D56C, 'M', 'a'), + (0x1D56D, 'M', 'b'), + (0x1D56E, 'M', 'c'), + (0x1D56F, 'M', 'd'), + (0x1D570, 'M', 'e'), + (0x1D571, 'M', 'f'), + (0x1D572, 'M', 'g'), + (0x1D573, 'M', 'h'), + (0x1D574, 'M', 'i'), + (0x1D575, 'M', 'j'), + (0x1D576, 'M', 'k'), + (0x1D577, 'M', 'l'), + (0x1D578, 'M', 'm'), + (0x1D579, 'M', 'n'), + (0x1D57A, 'M', 'o'), + (0x1D57B, 'M', 'p'), + (0x1D57C, 'M', 'q'), + (0x1D57D, 'M', 'r'), + (0x1D57E, 'M', 's'), + (0x1D57F, 'M', 't'), + (0x1D580, 'M', 'u'), + (0x1D581, 'M', 'v'), + (0x1D582, 'M', 'w'), + (0x1D583, 'M', 'x'), + (0x1D584, 'M', 'y'), + (0x1D585, 'M', 'z'), + (0x1D586, 'M', 'a'), + (0x1D587, 'M', 'b'), + (0x1D588, 'M', 'c'), + (0x1D589, 'M', 'd'), + (0x1D58A, 'M', 'e'), + (0x1D58B, 'M', 'f'), + (0x1D58C, 'M', 'g'), + (0x1D58D, 'M', 'h'), + (0x1D58E, 'M', 'i'), + (0x1D58F, 'M', 'j'), + (0x1D590, 'M', 'k'), + (0x1D591, 'M', 'l'), + (0x1D592, 'M', 'm'), + (0x1D593, 'M', 'n'), + (0x1D594, 'M', 'o'), + (0x1D595, 'M', 'p'), + (0x1D596, 'M', 'q'), + (0x1D597, 'M', 'r'), + (0x1D598, 'M', 's'), + (0x1D599, 'M', 't'), + (0x1D59A, 'M', 'u'), + (0x1D59B, 'M', 'v'), + (0x1D59C, 'M', 'w'), + (0x1D59D, 'M', 'x'), + (0x1D59E, 'M', 'y'), + (0x1D59F, 'M', 'z'), + (0x1D5A0, 'M', 'a'), + (0x1D5A1, 'M', 'b'), + (0x1D5A2, 'M', 'c'), + (0x1D5A3, 'M', 'd'), + (0x1D5A4, 'M', 'e'), + (0x1D5A5, 'M', 'f'), + (0x1D5A6, 'M', 'g'), + (0x1D5A7, 'M', 'h'), + (0x1D5A8, 'M', 'i'), + (0x1D5A9, 'M', 'j'), + (0x1D5AA, 'M', 'k'), + (0x1D5AB, 'M', 'l'), + (0x1D5AC, 'M', 'm'), + (0x1D5AD, 'M', 'n'), + (0x1D5AE, 'M', 'o'), + (0x1D5AF, 'M', 'p'), + (0x1D5B0, 'M', 'q'), + (0x1D5B1, 'M', 'r'), + (0x1D5B2, 'M', 's'), + (0x1D5B3, 'M', 't'), + (0x1D5B4, 'M', 'u'), + (0x1D5B5, 'M', 'v'), + (0x1D5B6, 'M', 'w'), + ] + +def _seg_65() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D5B7, 'M', 'x'), + (0x1D5B8, 'M', 'y'), + (0x1D5B9, 'M', 'z'), + (0x1D5BA, 'M', 'a'), + (0x1D5BB, 'M', 'b'), + (0x1D5BC, 'M', 'c'), + (0x1D5BD, 'M', 'd'), + (0x1D5BE, 'M', 'e'), + (0x1D5BF, 'M', 'f'), + (0x1D5C0, 'M', 'g'), + (0x1D5C1, 'M', 'h'), + (0x1D5C2, 'M', 'i'), + (0x1D5C3, 'M', 'j'), + (0x1D5C4, 'M', 'k'), + (0x1D5C5, 'M', 'l'), + (0x1D5C6, 'M', 'm'), + (0x1D5C7, 'M', 'n'), + (0x1D5C8, 'M', 'o'), + (0x1D5C9, 'M', 'p'), + (0x1D5CA, 'M', 'q'), + (0x1D5CB, 'M', 'r'), + (0x1D5CC, 'M', 's'), + (0x1D5CD, 'M', 't'), + (0x1D5CE, 'M', 'u'), + (0x1D5CF, 'M', 'v'), + (0x1D5D0, 'M', 'w'), + (0x1D5D1, 'M', 'x'), + (0x1D5D2, 'M', 'y'), + (0x1D5D3, 'M', 'z'), + (0x1D5D4, 'M', 'a'), + (0x1D5D5, 'M', 'b'), + (0x1D5D6, 'M', 'c'), + (0x1D5D7, 'M', 'd'), + (0x1D5D8, 'M', 'e'), + (0x1D5D9, 'M', 'f'), + (0x1D5DA, 'M', 'g'), + (0x1D5DB, 'M', 'h'), + (0x1D5DC, 'M', 'i'), + (0x1D5DD, 'M', 'j'), + (0x1D5DE, 'M', 'k'), + (0x1D5DF, 'M', 'l'), + (0x1D5E0, 'M', 'm'), + (0x1D5E1, 'M', 'n'), + (0x1D5E2, 'M', 'o'), + (0x1D5E3, 'M', 'p'), + (0x1D5E4, 'M', 'q'), + (0x1D5E5, 'M', 'r'), + (0x1D5E6, 'M', 's'), + (0x1D5E7, 'M', 't'), + (0x1D5E8, 'M', 'u'), + (0x1D5E9, 'M', 'v'), + (0x1D5EA, 'M', 'w'), + (0x1D5EB, 'M', 'x'), + (0x1D5EC, 'M', 'y'), + (0x1D5ED, 'M', 'z'), + (0x1D5EE, 'M', 'a'), + (0x1D5EF, 'M', 'b'), + (0x1D5F0, 'M', 'c'), + (0x1D5F1, 'M', 'd'), + (0x1D5F2, 'M', 'e'), + (0x1D5F3, 'M', 'f'), + (0x1D5F4, 'M', 'g'), + (0x1D5F5, 'M', 'h'), + (0x1D5F6, 'M', 'i'), + (0x1D5F7, 'M', 'j'), + (0x1D5F8, 'M', 'k'), + (0x1D5F9, 'M', 'l'), + (0x1D5FA, 'M', 'm'), + (0x1D5FB, 'M', 'n'), + (0x1D5FC, 'M', 'o'), + (0x1D5FD, 'M', 'p'), + (0x1D5FE, 'M', 'q'), + (0x1D5FF, 'M', 'r'), + (0x1D600, 'M', 's'), + (0x1D601, 'M', 't'), + (0x1D602, 'M', 'u'), + (0x1D603, 'M', 'v'), + (0x1D604, 'M', 'w'), + (0x1D605, 'M', 'x'), + (0x1D606, 'M', 'y'), + (0x1D607, 'M', 'z'), + (0x1D608, 'M', 'a'), + (0x1D609, 'M', 'b'), + (0x1D60A, 'M', 'c'), + (0x1D60B, 'M', 'd'), + (0x1D60C, 'M', 'e'), + (0x1D60D, 'M', 'f'), + (0x1D60E, 'M', 'g'), + (0x1D60F, 'M', 'h'), + (0x1D610, 'M', 'i'), + (0x1D611, 'M', 'j'), + (0x1D612, 'M', 'k'), + (0x1D613, 'M', 'l'), + (0x1D614, 'M', 'm'), + (0x1D615, 'M', 'n'), + (0x1D616, 'M', 'o'), + (0x1D617, 'M', 'p'), + (0x1D618, 'M', 'q'), + (0x1D619, 'M', 'r'), + (0x1D61A, 'M', 's'), + ] + +def _seg_66() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D61B, 'M', 't'), + (0x1D61C, 'M', 'u'), + (0x1D61D, 'M', 'v'), + (0x1D61E, 'M', 'w'), + (0x1D61F, 'M', 'x'), + (0x1D620, 'M', 'y'), + (0x1D621, 'M', 'z'), + (0x1D622, 'M', 'a'), + (0x1D623, 'M', 'b'), + (0x1D624, 'M', 'c'), + (0x1D625, 'M', 'd'), + (0x1D626, 'M', 'e'), + (0x1D627, 'M', 'f'), + (0x1D628, 'M', 'g'), + (0x1D629, 'M', 'h'), + (0x1D62A, 'M', 'i'), + (0x1D62B, 'M', 'j'), + (0x1D62C, 'M', 'k'), + (0x1D62D, 'M', 'l'), + (0x1D62E, 'M', 'm'), + (0x1D62F, 'M', 'n'), + (0x1D630, 'M', 'o'), + (0x1D631, 'M', 'p'), + (0x1D632, 'M', 'q'), + (0x1D633, 'M', 'r'), + (0x1D634, 'M', 's'), + (0x1D635, 'M', 't'), + (0x1D636, 'M', 'u'), + (0x1D637, 'M', 'v'), + (0x1D638, 'M', 'w'), + (0x1D639, 'M', 'x'), + (0x1D63A, 'M', 'y'), + (0x1D63B, 'M', 'z'), + (0x1D63C, 'M', 'a'), + (0x1D63D, 'M', 'b'), + (0x1D63E, 'M', 'c'), + (0x1D63F, 'M', 'd'), + (0x1D640, 'M', 'e'), + (0x1D641, 'M', 'f'), + (0x1D642, 'M', 'g'), + (0x1D643, 'M', 'h'), + (0x1D644, 'M', 'i'), + (0x1D645, 'M', 'j'), + (0x1D646, 'M', 'k'), + (0x1D647, 'M', 'l'), + (0x1D648, 'M', 'm'), + (0x1D649, 'M', 'n'), + (0x1D64A, 'M', 'o'), + (0x1D64B, 'M', 'p'), + (0x1D64C, 'M', 'q'), + (0x1D64D, 'M', 'r'), + (0x1D64E, 'M', 's'), + (0x1D64F, 'M', 't'), + (0x1D650, 'M', 'u'), + (0x1D651, 'M', 'v'), + (0x1D652, 'M', 'w'), + (0x1D653, 'M', 'x'), + (0x1D654, 'M', 'y'), + (0x1D655, 'M', 'z'), + (0x1D656, 'M', 'a'), + (0x1D657, 'M', 'b'), + (0x1D658, 'M', 'c'), + (0x1D659, 'M', 'd'), + (0x1D65A, 'M', 'e'), + (0x1D65B, 'M', 'f'), + (0x1D65C, 'M', 'g'), + (0x1D65D, 'M', 'h'), + (0x1D65E, 'M', 'i'), + (0x1D65F, 'M', 'j'), + (0x1D660, 'M', 'k'), + (0x1D661, 'M', 'l'), + (0x1D662, 'M', 'm'), + (0x1D663, 'M', 'n'), + (0x1D664, 'M', 'o'), + (0x1D665, 'M', 'p'), + (0x1D666, 'M', 'q'), + (0x1D667, 'M', 'r'), + (0x1D668, 'M', 's'), + (0x1D669, 'M', 't'), + (0x1D66A, 'M', 'u'), + (0x1D66B, 'M', 'v'), + (0x1D66C, 'M', 'w'), + (0x1D66D, 'M', 'x'), + (0x1D66E, 'M', 'y'), + (0x1D66F, 'M', 'z'), + (0x1D670, 'M', 'a'), + (0x1D671, 'M', 'b'), + (0x1D672, 'M', 'c'), + (0x1D673, 'M', 'd'), + (0x1D674, 'M', 'e'), + (0x1D675, 'M', 'f'), + (0x1D676, 'M', 'g'), + (0x1D677, 'M', 'h'), + (0x1D678, 'M', 'i'), + (0x1D679, 'M', 'j'), + (0x1D67A, 'M', 'k'), + (0x1D67B, 'M', 'l'), + (0x1D67C, 'M', 'm'), + (0x1D67D, 'M', 'n'), + (0x1D67E, 'M', 'o'), + ] + +def _seg_67() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D67F, 'M', 'p'), + (0x1D680, 'M', 'q'), + (0x1D681, 'M', 'r'), + (0x1D682, 'M', 's'), + (0x1D683, 'M', 't'), + (0x1D684, 'M', 'u'), + (0x1D685, 'M', 'v'), + (0x1D686, 'M', 'w'), + (0x1D687, 'M', 'x'), + (0x1D688, 'M', 'y'), + (0x1D689, 'M', 'z'), + (0x1D68A, 'M', 'a'), + (0x1D68B, 'M', 'b'), + (0x1D68C, 'M', 'c'), + (0x1D68D, 'M', 'd'), + (0x1D68E, 'M', 'e'), + (0x1D68F, 'M', 'f'), + (0x1D690, 'M', 'g'), + (0x1D691, 'M', 'h'), + (0x1D692, 'M', 'i'), + (0x1D693, 'M', 'j'), + (0x1D694, 'M', 'k'), + (0x1D695, 'M', 'l'), + (0x1D696, 'M', 'm'), + (0x1D697, 'M', 'n'), + (0x1D698, 'M', 'o'), + (0x1D699, 'M', 'p'), + (0x1D69A, 'M', 'q'), + (0x1D69B, 'M', 'r'), + (0x1D69C, 'M', 's'), + (0x1D69D, 'M', 't'), + (0x1D69E, 'M', 'u'), + (0x1D69F, 'M', 'v'), + (0x1D6A0, 'M', 'w'), + (0x1D6A1, 'M', 'x'), + (0x1D6A2, 'M', 'y'), + (0x1D6A3, 'M', 'z'), + (0x1D6A4, 'M', 'ı'), + (0x1D6A5, 'M', 'ȷ'), + (0x1D6A6, 'X'), + (0x1D6A8, 'M', 'α'), + (0x1D6A9, 'M', 'β'), + (0x1D6AA, 'M', 'γ'), + (0x1D6AB, 'M', 'δ'), + (0x1D6AC, 'M', 'ε'), + (0x1D6AD, 'M', 'ζ'), + (0x1D6AE, 'M', 'η'), + (0x1D6AF, 'M', 'θ'), + (0x1D6B0, 'M', 'ι'), + (0x1D6B1, 'M', 'κ'), + (0x1D6B2, 'M', 'λ'), + (0x1D6B3, 'M', 'μ'), + (0x1D6B4, 'M', 'ν'), + (0x1D6B5, 'M', 'ξ'), + (0x1D6B6, 'M', 'ο'), + (0x1D6B7, 'M', 'π'), + (0x1D6B8, 'M', 'ρ'), + (0x1D6B9, 'M', 'θ'), + (0x1D6BA, 'M', 'σ'), + (0x1D6BB, 'M', 'τ'), + (0x1D6BC, 'M', 'υ'), + (0x1D6BD, 'M', 'φ'), + (0x1D6BE, 'M', 'χ'), + (0x1D6BF, 'M', 'ψ'), + (0x1D6C0, 'M', 'ω'), + (0x1D6C1, 'M', '∇'), + (0x1D6C2, 'M', 'α'), + (0x1D6C3, 'M', 'β'), + (0x1D6C4, 'M', 'γ'), + (0x1D6C5, 'M', 'δ'), + (0x1D6C6, 'M', 'ε'), + (0x1D6C7, 'M', 'ζ'), + (0x1D6C8, 'M', 'η'), + (0x1D6C9, 'M', 'θ'), + (0x1D6CA, 'M', 'ι'), + (0x1D6CB, 'M', 'κ'), + (0x1D6CC, 'M', 'λ'), + (0x1D6CD, 'M', 'μ'), + (0x1D6CE, 'M', 'ν'), + (0x1D6CF, 'M', 'ξ'), + (0x1D6D0, 'M', 'ο'), + (0x1D6D1, 'M', 'π'), + (0x1D6D2, 'M', 'ρ'), + (0x1D6D3, 'M', 'σ'), + (0x1D6D5, 'M', 'τ'), + (0x1D6D6, 'M', 'υ'), + (0x1D6D7, 'M', 'φ'), + (0x1D6D8, 'M', 'χ'), + (0x1D6D9, 'M', 'ψ'), + (0x1D6DA, 'M', 'ω'), + (0x1D6DB, 'M', '∂'), + (0x1D6DC, 'M', 'ε'), + (0x1D6DD, 'M', 'θ'), + (0x1D6DE, 'M', 'κ'), + (0x1D6DF, 'M', 'φ'), + (0x1D6E0, 'M', 'ρ'), + (0x1D6E1, 'M', 'π'), + (0x1D6E2, 'M', 'α'), + (0x1D6E3, 'M', 'β'), + (0x1D6E4, 'M', 'γ'), + ] + +def _seg_68() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D6E5, 'M', 'δ'), + (0x1D6E6, 'M', 'ε'), + (0x1D6E7, 'M', 'ζ'), + (0x1D6E8, 'M', 'η'), + (0x1D6E9, 'M', 'θ'), + (0x1D6EA, 'M', 'ι'), + (0x1D6EB, 'M', 'κ'), + (0x1D6EC, 'M', 'λ'), + (0x1D6ED, 'M', 'μ'), + (0x1D6EE, 'M', 'ν'), + (0x1D6EF, 'M', 'ξ'), + (0x1D6F0, 'M', 'ο'), + (0x1D6F1, 'M', 'π'), + (0x1D6F2, 'M', 'ρ'), + (0x1D6F3, 'M', 'θ'), + (0x1D6F4, 'M', 'σ'), + (0x1D6F5, 'M', 'τ'), + (0x1D6F6, 'M', 'υ'), + (0x1D6F7, 'M', 'φ'), + (0x1D6F8, 'M', 'χ'), + (0x1D6F9, 'M', 'ψ'), + (0x1D6FA, 'M', 'ω'), + (0x1D6FB, 'M', '∇'), + (0x1D6FC, 'M', 'α'), + (0x1D6FD, 'M', 'β'), + (0x1D6FE, 'M', 'γ'), + (0x1D6FF, 'M', 'δ'), + (0x1D700, 'M', 'ε'), + (0x1D701, 'M', 'ζ'), + (0x1D702, 'M', 'η'), + (0x1D703, 'M', 'θ'), + (0x1D704, 'M', 'ι'), + (0x1D705, 'M', 'κ'), + (0x1D706, 'M', 'λ'), + (0x1D707, 'M', 'μ'), + (0x1D708, 'M', 'ν'), + (0x1D709, 'M', 'ξ'), + (0x1D70A, 'M', 'ο'), + (0x1D70B, 'M', 'π'), + (0x1D70C, 'M', 'ρ'), + (0x1D70D, 'M', 'σ'), + (0x1D70F, 'M', 'τ'), + (0x1D710, 'M', 'υ'), + (0x1D711, 'M', 'φ'), + (0x1D712, 'M', 'χ'), + (0x1D713, 'M', 'ψ'), + (0x1D714, 'M', 'ω'), + (0x1D715, 'M', '∂'), + (0x1D716, 'M', 'ε'), + (0x1D717, 'M', 'θ'), + (0x1D718, 'M', 'κ'), + (0x1D719, 'M', 'φ'), + (0x1D71A, 'M', 'ρ'), + (0x1D71B, 'M', 'π'), + (0x1D71C, 'M', 'α'), + (0x1D71D, 'M', 'β'), + (0x1D71E, 'M', 'γ'), + (0x1D71F, 'M', 'δ'), + (0x1D720, 'M', 'ε'), + (0x1D721, 'M', 'ζ'), + (0x1D722, 'M', 'η'), + (0x1D723, 'M', 'θ'), + (0x1D724, 'M', 'ι'), + (0x1D725, 'M', 'κ'), + (0x1D726, 'M', 'λ'), + (0x1D727, 'M', 'μ'), + (0x1D728, 'M', 'ν'), + (0x1D729, 'M', 'ξ'), + (0x1D72A, 'M', 'ο'), + (0x1D72B, 'M', 'π'), + (0x1D72C, 'M', 'ρ'), + (0x1D72D, 'M', 'θ'), + (0x1D72E, 'M', 'σ'), + (0x1D72F, 'M', 'τ'), + (0x1D730, 'M', 'υ'), + (0x1D731, 'M', 'φ'), + (0x1D732, 'M', 'χ'), + (0x1D733, 'M', 'ψ'), + (0x1D734, 'M', 'ω'), + (0x1D735, 'M', '∇'), + (0x1D736, 'M', 'α'), + (0x1D737, 'M', 'β'), + (0x1D738, 'M', 'γ'), + (0x1D739, 'M', 'δ'), + (0x1D73A, 'M', 'ε'), + (0x1D73B, 'M', 'ζ'), + (0x1D73C, 'M', 'η'), + (0x1D73D, 'M', 'θ'), + (0x1D73E, 'M', 'ι'), + (0x1D73F, 'M', 'κ'), + (0x1D740, 'M', 'λ'), + (0x1D741, 'M', 'μ'), + (0x1D742, 'M', 'ν'), + (0x1D743, 'M', 'ξ'), + (0x1D744, 'M', 'ο'), + (0x1D745, 'M', 'π'), + (0x1D746, 'M', 'ρ'), + (0x1D747, 'M', 'σ'), + (0x1D749, 'M', 'τ'), + (0x1D74A, 'M', 'υ'), + ] + +def _seg_69() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D74B, 'M', 'φ'), + (0x1D74C, 'M', 'χ'), + (0x1D74D, 'M', 'ψ'), + (0x1D74E, 'M', 'ω'), + (0x1D74F, 'M', '∂'), + (0x1D750, 'M', 'ε'), + (0x1D751, 'M', 'θ'), + (0x1D752, 'M', 'κ'), + (0x1D753, 'M', 'φ'), + (0x1D754, 'M', 'ρ'), + (0x1D755, 'M', 'π'), + (0x1D756, 'M', 'α'), + (0x1D757, 'M', 'β'), + (0x1D758, 'M', 'γ'), + (0x1D759, 'M', 'δ'), + (0x1D75A, 'M', 'ε'), + (0x1D75B, 'M', 'ζ'), + (0x1D75C, 'M', 'η'), + (0x1D75D, 'M', 'θ'), + (0x1D75E, 'M', 'ι'), + (0x1D75F, 'M', 'κ'), + (0x1D760, 'M', 'λ'), + (0x1D761, 'M', 'μ'), + (0x1D762, 'M', 'ν'), + (0x1D763, 'M', 'ξ'), + (0x1D764, 'M', 'ο'), + (0x1D765, 'M', 'π'), + (0x1D766, 'M', 'ρ'), + (0x1D767, 'M', 'θ'), + (0x1D768, 'M', 'σ'), + (0x1D769, 'M', 'τ'), + (0x1D76A, 'M', 'υ'), + (0x1D76B, 'M', 'φ'), + (0x1D76C, 'M', 'χ'), + (0x1D76D, 'M', 'ψ'), + (0x1D76E, 'M', 'ω'), + (0x1D76F, 'M', '∇'), + (0x1D770, 'M', 'α'), + (0x1D771, 'M', 'β'), + (0x1D772, 'M', 'γ'), + (0x1D773, 'M', 'δ'), + (0x1D774, 'M', 'ε'), + (0x1D775, 'M', 'ζ'), + (0x1D776, 'M', 'η'), + (0x1D777, 'M', 'θ'), + (0x1D778, 'M', 'ι'), + (0x1D779, 'M', 'κ'), + (0x1D77A, 'M', 'λ'), + (0x1D77B, 'M', 'μ'), + (0x1D77C, 'M', 'ν'), + (0x1D77D, 'M', 'ξ'), + (0x1D77E, 'M', 'ο'), + (0x1D77F, 'M', 'π'), + (0x1D780, 'M', 'ρ'), + (0x1D781, 'M', 'σ'), + (0x1D783, 'M', 'τ'), + (0x1D784, 'M', 'υ'), + (0x1D785, 'M', 'φ'), + (0x1D786, 'M', 'χ'), + (0x1D787, 'M', 'ψ'), + (0x1D788, 'M', 'ω'), + (0x1D789, 'M', '∂'), + (0x1D78A, 'M', 'ε'), + (0x1D78B, 'M', 'θ'), + (0x1D78C, 'M', 'κ'), + (0x1D78D, 'M', 'φ'), + (0x1D78E, 'M', 'ρ'), + (0x1D78F, 'M', 'π'), + (0x1D790, 'M', 'α'), + (0x1D791, 'M', 'β'), + (0x1D792, 'M', 'γ'), + (0x1D793, 'M', 'δ'), + (0x1D794, 'M', 'ε'), + (0x1D795, 'M', 'ζ'), + (0x1D796, 'M', 'η'), + (0x1D797, 'M', 'θ'), + (0x1D798, 'M', 'ι'), + (0x1D799, 'M', 'κ'), + (0x1D79A, 'M', 'λ'), + (0x1D79B, 'M', 'μ'), + (0x1D79C, 'M', 'ν'), + (0x1D79D, 'M', 'ξ'), + (0x1D79E, 'M', 'ο'), + (0x1D79F, 'M', 'π'), + (0x1D7A0, 'M', 'ρ'), + (0x1D7A1, 'M', 'θ'), + (0x1D7A2, 'M', 'σ'), + (0x1D7A3, 'M', 'τ'), + (0x1D7A4, 'M', 'υ'), + (0x1D7A5, 'M', 'φ'), + (0x1D7A6, 'M', 'χ'), + (0x1D7A7, 'M', 'ψ'), + (0x1D7A8, 'M', 'ω'), + (0x1D7A9, 'M', '∇'), + (0x1D7AA, 'M', 'α'), + (0x1D7AB, 'M', 'β'), + (0x1D7AC, 'M', 'γ'), + (0x1D7AD, 'M', 'δ'), + (0x1D7AE, 'M', 'ε'), + (0x1D7AF, 'M', 'ζ'), + ] + +def _seg_70() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1D7B0, 'M', 'η'), + (0x1D7B1, 'M', 'θ'), + (0x1D7B2, 'M', 'ι'), + (0x1D7B3, 'M', 'κ'), + (0x1D7B4, 'M', 'λ'), + (0x1D7B5, 'M', 'μ'), + (0x1D7B6, 'M', 'ν'), + (0x1D7B7, 'M', 'ξ'), + (0x1D7B8, 'M', 'ο'), + (0x1D7B9, 'M', 'π'), + (0x1D7BA, 'M', 'ρ'), + (0x1D7BB, 'M', 'σ'), + (0x1D7BD, 'M', 'τ'), + (0x1D7BE, 'M', 'υ'), + (0x1D7BF, 'M', 'φ'), + (0x1D7C0, 'M', 'χ'), + (0x1D7C1, 'M', 'ψ'), + (0x1D7C2, 'M', 'ω'), + (0x1D7C3, 'M', '∂'), + (0x1D7C4, 'M', 'ε'), + (0x1D7C5, 'M', 'θ'), + (0x1D7C6, 'M', 'κ'), + (0x1D7C7, 'M', 'φ'), + (0x1D7C8, 'M', 'ρ'), + (0x1D7C9, 'M', 'π'), + (0x1D7CA, 'M', 'ϝ'), + (0x1D7CC, 'X'), + (0x1D7CE, 'M', '0'), + (0x1D7CF, 'M', '1'), + (0x1D7D0, 'M', '2'), + (0x1D7D1, 'M', '3'), + (0x1D7D2, 'M', '4'), + (0x1D7D3, 'M', '5'), + (0x1D7D4, 'M', '6'), + (0x1D7D5, 'M', '7'), + (0x1D7D6, 'M', '8'), + (0x1D7D7, 'M', '9'), + (0x1D7D8, 'M', '0'), + (0x1D7D9, 'M', '1'), + (0x1D7DA, 'M', '2'), + (0x1D7DB, 'M', '3'), + (0x1D7DC, 'M', '4'), + (0x1D7DD, 'M', '5'), + (0x1D7DE, 'M', '6'), + (0x1D7DF, 'M', '7'), + (0x1D7E0, 'M', '8'), + (0x1D7E1, 'M', '9'), + (0x1D7E2, 'M', '0'), + (0x1D7E3, 'M', '1'), + (0x1D7E4, 'M', '2'), + (0x1D7E5, 'M', '3'), + (0x1D7E6, 'M', '4'), + (0x1D7E7, 'M', '5'), + (0x1D7E8, 'M', '6'), + (0x1D7E9, 'M', '7'), + (0x1D7EA, 'M', '8'), + (0x1D7EB, 'M', '9'), + (0x1D7EC, 'M', '0'), + (0x1D7ED, 'M', '1'), + (0x1D7EE, 'M', '2'), + (0x1D7EF, 'M', '3'), + (0x1D7F0, 'M', '4'), + (0x1D7F1, 'M', '5'), + (0x1D7F2, 'M', '6'), + (0x1D7F3, 'M', '7'), + (0x1D7F4, 'M', '8'), + (0x1D7F5, 'M', '9'), + (0x1D7F6, 'M', '0'), + (0x1D7F7, 'M', '1'), + (0x1D7F8, 'M', '2'), + (0x1D7F9, 'M', '3'), + (0x1D7FA, 'M', '4'), + (0x1D7FB, 'M', '5'), + (0x1D7FC, 'M', '6'), + (0x1D7FD, 'M', '7'), + (0x1D7FE, 'M', '8'), + (0x1D7FF, 'M', '9'), + (0x1D800, 'V'), + (0x1DA8C, 'X'), + (0x1DA9B, 'V'), + (0x1DAA0, 'X'), + (0x1DAA1, 'V'), + (0x1DAB0, 'X'), + (0x1DF00, 'V'), + (0x1DF1F, 'X'), + (0x1DF25, 'V'), + (0x1DF2B, 'X'), + (0x1E000, 'V'), + (0x1E007, 'X'), + (0x1E008, 'V'), + (0x1E019, 'X'), + (0x1E01B, 'V'), + (0x1E022, 'X'), + (0x1E023, 'V'), + (0x1E025, 'X'), + (0x1E026, 'V'), + (0x1E02B, 'X'), + (0x1E030, 'M', 'а'), + (0x1E031, 'M', 'б'), + (0x1E032, 'M', 'в'), + ] + +def _seg_71() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1E033, 'M', 'г'), + (0x1E034, 'M', 'д'), + (0x1E035, 'M', 'е'), + (0x1E036, 'M', 'ж'), + (0x1E037, 'M', 'з'), + (0x1E038, 'M', 'и'), + (0x1E039, 'M', 'к'), + (0x1E03A, 'M', 'л'), + (0x1E03B, 'M', 'м'), + (0x1E03C, 'M', 'о'), + (0x1E03D, 'M', 'п'), + (0x1E03E, 'M', 'р'), + (0x1E03F, 'M', 'с'), + (0x1E040, 'M', 'т'), + (0x1E041, 'M', 'у'), + (0x1E042, 'M', 'ф'), + (0x1E043, 'M', 'х'), + (0x1E044, 'M', 'ц'), + (0x1E045, 'M', 'ч'), + (0x1E046, 'M', 'ш'), + (0x1E047, 'M', 'ы'), + (0x1E048, 'M', 'э'), + (0x1E049, 'M', 'ю'), + (0x1E04A, 'M', 'ꚉ'), + (0x1E04B, 'M', 'ә'), + (0x1E04C, 'M', 'і'), + (0x1E04D, 'M', 'ј'), + (0x1E04E, 'M', 'ө'), + (0x1E04F, 'M', 'ү'), + (0x1E050, 'M', 'ӏ'), + (0x1E051, 'M', 'а'), + (0x1E052, 'M', 'б'), + (0x1E053, 'M', 'в'), + (0x1E054, 'M', 'г'), + (0x1E055, 'M', 'д'), + (0x1E056, 'M', 'е'), + (0x1E057, 'M', 'ж'), + (0x1E058, 'M', 'з'), + (0x1E059, 'M', 'и'), + (0x1E05A, 'M', 'к'), + (0x1E05B, 'M', 'л'), + (0x1E05C, 'M', 'о'), + (0x1E05D, 'M', 'п'), + (0x1E05E, 'M', 'с'), + (0x1E05F, 'M', 'у'), + (0x1E060, 'M', 'ф'), + (0x1E061, 'M', 'х'), + (0x1E062, 'M', 'ц'), + (0x1E063, 'M', 'ч'), + (0x1E064, 'M', 'ш'), + (0x1E065, 'M', 'ъ'), + (0x1E066, 'M', 'ы'), + (0x1E067, 'M', 'ґ'), + (0x1E068, 'M', 'і'), + (0x1E069, 'M', 'ѕ'), + (0x1E06A, 'M', 'џ'), + (0x1E06B, 'M', 'ҫ'), + (0x1E06C, 'M', 'ꙑ'), + (0x1E06D, 'M', 'ұ'), + (0x1E06E, 'X'), + (0x1E08F, 'V'), + (0x1E090, 'X'), + (0x1E100, 'V'), + (0x1E12D, 'X'), + (0x1E130, 'V'), + (0x1E13E, 'X'), + (0x1E140, 'V'), + (0x1E14A, 'X'), + (0x1E14E, 'V'), + (0x1E150, 'X'), + (0x1E290, 'V'), + (0x1E2AF, 'X'), + (0x1E2C0, 'V'), + (0x1E2FA, 'X'), + (0x1E2FF, 'V'), + (0x1E300, 'X'), + (0x1E4D0, 'V'), + (0x1E4FA, 'X'), + (0x1E7E0, 'V'), + (0x1E7E7, 'X'), + (0x1E7E8, 'V'), + (0x1E7EC, 'X'), + (0x1E7ED, 'V'), + (0x1E7EF, 'X'), + (0x1E7F0, 'V'), + (0x1E7FF, 'X'), + (0x1E800, 'V'), + (0x1E8C5, 'X'), + (0x1E8C7, 'V'), + (0x1E8D7, 'X'), + (0x1E900, 'M', '𞤢'), + (0x1E901, 'M', '𞤣'), + (0x1E902, 'M', '𞤤'), + (0x1E903, 'M', '𞤥'), + (0x1E904, 'M', '𞤦'), + (0x1E905, 'M', '𞤧'), + (0x1E906, 'M', '𞤨'), + (0x1E907, 'M', '𞤩'), + (0x1E908, 'M', '𞤪'), + (0x1E909, 'M', '𞤫'), + ] + +def _seg_72() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1E90A, 'M', '𞤬'), + (0x1E90B, 'M', '𞤭'), + (0x1E90C, 'M', '𞤮'), + (0x1E90D, 'M', '𞤯'), + (0x1E90E, 'M', '𞤰'), + (0x1E90F, 'M', '𞤱'), + (0x1E910, 'M', '𞤲'), + (0x1E911, 'M', '𞤳'), + (0x1E912, 'M', '𞤴'), + (0x1E913, 'M', '𞤵'), + (0x1E914, 'M', '𞤶'), + (0x1E915, 'M', '𞤷'), + (0x1E916, 'M', '𞤸'), + (0x1E917, 'M', '𞤹'), + (0x1E918, 'M', '𞤺'), + (0x1E919, 'M', '𞤻'), + (0x1E91A, 'M', '𞤼'), + (0x1E91B, 'M', '𞤽'), + (0x1E91C, 'M', '𞤾'), + (0x1E91D, 'M', '𞤿'), + (0x1E91E, 'M', '𞥀'), + (0x1E91F, 'M', '𞥁'), + (0x1E920, 'M', '𞥂'), + (0x1E921, 'M', '𞥃'), + (0x1E922, 'V'), + (0x1E94C, 'X'), + (0x1E950, 'V'), + (0x1E95A, 'X'), + (0x1E95E, 'V'), + (0x1E960, 'X'), + (0x1EC71, 'V'), + (0x1ECB5, 'X'), + (0x1ED01, 'V'), + (0x1ED3E, 'X'), + (0x1EE00, 'M', 'ا'), + (0x1EE01, 'M', 'ب'), + (0x1EE02, 'M', 'ج'), + (0x1EE03, 'M', 'د'), + (0x1EE04, 'X'), + (0x1EE05, 'M', 'و'), + (0x1EE06, 'M', 'ز'), + (0x1EE07, 'M', 'ح'), + (0x1EE08, 'M', 'ط'), + (0x1EE09, 'M', 'ي'), + (0x1EE0A, 'M', 'ك'), + (0x1EE0B, 'M', 'ل'), + (0x1EE0C, 'M', 'م'), + (0x1EE0D, 'M', 'ن'), + (0x1EE0E, 'M', 'س'), + (0x1EE0F, 'M', 'ع'), + (0x1EE10, 'M', 'ف'), + (0x1EE11, 'M', 'ص'), + (0x1EE12, 'M', 'ق'), + (0x1EE13, 'M', 'ر'), + (0x1EE14, 'M', 'ش'), + (0x1EE15, 'M', 'ت'), + (0x1EE16, 'M', 'ث'), + (0x1EE17, 'M', 'خ'), + (0x1EE18, 'M', 'ذ'), + (0x1EE19, 'M', 'ض'), + (0x1EE1A, 'M', 'ظ'), + (0x1EE1B, 'M', 'غ'), + (0x1EE1C, 'M', 'ٮ'), + (0x1EE1D, 'M', 'ں'), + (0x1EE1E, 'M', 'ڡ'), + (0x1EE1F, 'M', 'ٯ'), + (0x1EE20, 'X'), + (0x1EE21, 'M', 'ب'), + (0x1EE22, 'M', 'ج'), + (0x1EE23, 'X'), + (0x1EE24, 'M', 'ه'), + (0x1EE25, 'X'), + (0x1EE27, 'M', 'ح'), + (0x1EE28, 'X'), + (0x1EE29, 'M', 'ي'), + (0x1EE2A, 'M', 'ك'), + (0x1EE2B, 'M', 'ل'), + (0x1EE2C, 'M', 'م'), + (0x1EE2D, 'M', 'ن'), + (0x1EE2E, 'M', 'س'), + (0x1EE2F, 'M', 'ع'), + (0x1EE30, 'M', 'ف'), + (0x1EE31, 'M', 'ص'), + (0x1EE32, 'M', 'ق'), + (0x1EE33, 'X'), + (0x1EE34, 'M', 'ش'), + (0x1EE35, 'M', 'ت'), + (0x1EE36, 'M', 'ث'), + (0x1EE37, 'M', 'خ'), + (0x1EE38, 'X'), + (0x1EE39, 'M', 'ض'), + (0x1EE3A, 'X'), + (0x1EE3B, 'M', 'غ'), + (0x1EE3C, 'X'), + (0x1EE42, 'M', 'ج'), + (0x1EE43, 'X'), + (0x1EE47, 'M', 'ح'), + (0x1EE48, 'X'), + (0x1EE49, 'M', 'ي'), + (0x1EE4A, 'X'), + ] + +def _seg_73() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1EE4B, 'M', 'ل'), + (0x1EE4C, 'X'), + (0x1EE4D, 'M', 'ن'), + (0x1EE4E, 'M', 'س'), + (0x1EE4F, 'M', 'ع'), + (0x1EE50, 'X'), + (0x1EE51, 'M', 'ص'), + (0x1EE52, 'M', 'ق'), + (0x1EE53, 'X'), + (0x1EE54, 'M', 'ش'), + (0x1EE55, 'X'), + (0x1EE57, 'M', 'خ'), + (0x1EE58, 'X'), + (0x1EE59, 'M', 'ض'), + (0x1EE5A, 'X'), + (0x1EE5B, 'M', 'غ'), + (0x1EE5C, 'X'), + (0x1EE5D, 'M', 'ں'), + (0x1EE5E, 'X'), + (0x1EE5F, 'M', 'ٯ'), + (0x1EE60, 'X'), + (0x1EE61, 'M', 'ب'), + (0x1EE62, 'M', 'ج'), + (0x1EE63, 'X'), + (0x1EE64, 'M', 'ه'), + (0x1EE65, 'X'), + (0x1EE67, 'M', 'ح'), + (0x1EE68, 'M', 'ط'), + (0x1EE69, 'M', 'ي'), + (0x1EE6A, 'M', 'ك'), + (0x1EE6B, 'X'), + (0x1EE6C, 'M', 'م'), + (0x1EE6D, 'M', 'ن'), + (0x1EE6E, 'M', 'س'), + (0x1EE6F, 'M', 'ع'), + (0x1EE70, 'M', 'ف'), + (0x1EE71, 'M', 'ص'), + (0x1EE72, 'M', 'ق'), + (0x1EE73, 'X'), + (0x1EE74, 'M', 'ش'), + (0x1EE75, 'M', 'ت'), + (0x1EE76, 'M', 'ث'), + (0x1EE77, 'M', 'خ'), + (0x1EE78, 'X'), + (0x1EE79, 'M', 'ض'), + (0x1EE7A, 'M', 'ظ'), + (0x1EE7B, 'M', 'غ'), + (0x1EE7C, 'M', 'ٮ'), + (0x1EE7D, 'X'), + (0x1EE7E, 'M', 'ڡ'), + (0x1EE7F, 'X'), + (0x1EE80, 'M', 'ا'), + (0x1EE81, 'M', 'ب'), + (0x1EE82, 'M', 'ج'), + (0x1EE83, 'M', 'د'), + (0x1EE84, 'M', 'ه'), + (0x1EE85, 'M', 'و'), + (0x1EE86, 'M', 'ز'), + (0x1EE87, 'M', 'ح'), + (0x1EE88, 'M', 'ط'), + (0x1EE89, 'M', 'ي'), + (0x1EE8A, 'X'), + (0x1EE8B, 'M', 'ل'), + (0x1EE8C, 'M', 'م'), + (0x1EE8D, 'M', 'ن'), + (0x1EE8E, 'M', 'س'), + (0x1EE8F, 'M', 'ع'), + (0x1EE90, 'M', 'ف'), + (0x1EE91, 'M', 'ص'), + (0x1EE92, 'M', 'ق'), + (0x1EE93, 'M', 'ر'), + (0x1EE94, 'M', 'ش'), + (0x1EE95, 'M', 'ت'), + (0x1EE96, 'M', 'ث'), + (0x1EE97, 'M', 'خ'), + (0x1EE98, 'M', 'ذ'), + (0x1EE99, 'M', 'ض'), + (0x1EE9A, 'M', 'ظ'), + (0x1EE9B, 'M', 'غ'), + (0x1EE9C, 'X'), + (0x1EEA1, 'M', 'ب'), + (0x1EEA2, 'M', 'ج'), + (0x1EEA3, 'M', 'د'), + (0x1EEA4, 'X'), + (0x1EEA5, 'M', 'و'), + (0x1EEA6, 'M', 'ز'), + (0x1EEA7, 'M', 'ح'), + (0x1EEA8, 'M', 'ط'), + (0x1EEA9, 'M', 'ي'), + (0x1EEAA, 'X'), + (0x1EEAB, 'M', 'ل'), + (0x1EEAC, 'M', 'م'), + (0x1EEAD, 'M', 'ن'), + (0x1EEAE, 'M', 'س'), + (0x1EEAF, 'M', 'ع'), + (0x1EEB0, 'M', 'ف'), + (0x1EEB1, 'M', 'ص'), + (0x1EEB2, 'M', 'ق'), + (0x1EEB3, 'M', 'ر'), + (0x1EEB4, 'M', 'ش'), + ] + +def _seg_74() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1EEB5, 'M', 'ت'), + (0x1EEB6, 'M', 'ث'), + (0x1EEB7, 'M', 'خ'), + (0x1EEB8, 'M', 'ذ'), + (0x1EEB9, 'M', 'ض'), + (0x1EEBA, 'M', 'ظ'), + (0x1EEBB, 'M', 'غ'), + (0x1EEBC, 'X'), + (0x1EEF0, 'V'), + (0x1EEF2, 'X'), + (0x1F000, 'V'), + (0x1F02C, 'X'), + (0x1F030, 'V'), + (0x1F094, 'X'), + (0x1F0A0, 'V'), + (0x1F0AF, 'X'), + (0x1F0B1, 'V'), + (0x1F0C0, 'X'), + (0x1F0C1, 'V'), + (0x1F0D0, 'X'), + (0x1F0D1, 'V'), + (0x1F0F6, 'X'), + (0x1F101, '3', '0,'), + (0x1F102, '3', '1,'), + (0x1F103, '3', '2,'), + (0x1F104, '3', '3,'), + (0x1F105, '3', '4,'), + (0x1F106, '3', '5,'), + (0x1F107, '3', '6,'), + (0x1F108, '3', '7,'), + (0x1F109, '3', '8,'), + (0x1F10A, '3', '9,'), + (0x1F10B, 'V'), + (0x1F110, '3', '(a)'), + (0x1F111, '3', '(b)'), + (0x1F112, '3', '(c)'), + (0x1F113, '3', '(d)'), + (0x1F114, '3', '(e)'), + (0x1F115, '3', '(f)'), + (0x1F116, '3', '(g)'), + (0x1F117, '3', '(h)'), + (0x1F118, '3', '(i)'), + (0x1F119, '3', '(j)'), + (0x1F11A, '3', '(k)'), + (0x1F11B, '3', '(l)'), + (0x1F11C, '3', '(m)'), + (0x1F11D, '3', '(n)'), + (0x1F11E, '3', '(o)'), + (0x1F11F, '3', '(p)'), + (0x1F120, '3', '(q)'), + (0x1F121, '3', '(r)'), + (0x1F122, '3', '(s)'), + (0x1F123, '3', '(t)'), + (0x1F124, '3', '(u)'), + (0x1F125, '3', '(v)'), + (0x1F126, '3', '(w)'), + (0x1F127, '3', '(x)'), + (0x1F128, '3', '(y)'), + (0x1F129, '3', '(z)'), + (0x1F12A, 'M', '〔s〕'), + (0x1F12B, 'M', 'c'), + (0x1F12C, 'M', 'r'), + (0x1F12D, 'M', 'cd'), + (0x1F12E, 'M', 'wz'), + (0x1F12F, 'V'), + (0x1F130, 'M', 'a'), + (0x1F131, 'M', 'b'), + (0x1F132, 'M', 'c'), + (0x1F133, 'M', 'd'), + (0x1F134, 'M', 'e'), + (0x1F135, 'M', 'f'), + (0x1F136, 'M', 'g'), + (0x1F137, 'M', 'h'), + (0x1F138, 'M', 'i'), + (0x1F139, 'M', 'j'), + (0x1F13A, 'M', 'k'), + (0x1F13B, 'M', 'l'), + (0x1F13C, 'M', 'm'), + (0x1F13D, 'M', 'n'), + (0x1F13E, 'M', 'o'), + (0x1F13F, 'M', 'p'), + (0x1F140, 'M', 'q'), + (0x1F141, 'M', 'r'), + (0x1F142, 'M', 's'), + (0x1F143, 'M', 't'), + (0x1F144, 'M', 'u'), + (0x1F145, 'M', 'v'), + (0x1F146, 'M', 'w'), + (0x1F147, 'M', 'x'), + (0x1F148, 'M', 'y'), + (0x1F149, 'M', 'z'), + (0x1F14A, 'M', 'hv'), + (0x1F14B, 'M', 'mv'), + (0x1F14C, 'M', 'sd'), + (0x1F14D, 'M', 'ss'), + (0x1F14E, 'M', 'ppv'), + (0x1F14F, 'M', 'wc'), + (0x1F150, 'V'), + (0x1F16A, 'M', 'mc'), + (0x1F16B, 'M', 'md'), + ] + +def _seg_75() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1F16C, 'M', 'mr'), + (0x1F16D, 'V'), + (0x1F190, 'M', 'dj'), + (0x1F191, 'V'), + (0x1F1AE, 'X'), + (0x1F1E6, 'V'), + (0x1F200, 'M', 'ほか'), + (0x1F201, 'M', 'ココ'), + (0x1F202, 'M', 'サ'), + (0x1F203, 'X'), + (0x1F210, 'M', '手'), + (0x1F211, 'M', '字'), + (0x1F212, 'M', '双'), + (0x1F213, 'M', 'デ'), + (0x1F214, 'M', '二'), + (0x1F215, 'M', '多'), + (0x1F216, 'M', '解'), + (0x1F217, 'M', '天'), + (0x1F218, 'M', '交'), + (0x1F219, 'M', '映'), + (0x1F21A, 'M', '無'), + (0x1F21B, 'M', '料'), + (0x1F21C, 'M', '前'), + (0x1F21D, 'M', '後'), + (0x1F21E, 'M', '再'), + (0x1F21F, 'M', '新'), + (0x1F220, 'M', '初'), + (0x1F221, 'M', '終'), + (0x1F222, 'M', '生'), + (0x1F223, 'M', '販'), + (0x1F224, 'M', '声'), + (0x1F225, 'M', '吹'), + (0x1F226, 'M', '演'), + (0x1F227, 'M', '投'), + (0x1F228, 'M', '捕'), + (0x1F229, 'M', '一'), + (0x1F22A, 'M', '三'), + (0x1F22B, 'M', '遊'), + (0x1F22C, 'M', '左'), + (0x1F22D, 'M', '中'), + (0x1F22E, 'M', '右'), + (0x1F22F, 'M', '指'), + (0x1F230, 'M', '走'), + (0x1F231, 'M', '打'), + (0x1F232, 'M', '禁'), + (0x1F233, 'M', '空'), + (0x1F234, 'M', '合'), + (0x1F235, 'M', '満'), + (0x1F236, 'M', '有'), + (0x1F237, 'M', '月'), + (0x1F238, 'M', '申'), + (0x1F239, 'M', '割'), + (0x1F23A, 'M', '営'), + (0x1F23B, 'M', '配'), + (0x1F23C, 'X'), + (0x1F240, 'M', '〔本〕'), + (0x1F241, 'M', '〔三〕'), + (0x1F242, 'M', '〔二〕'), + (0x1F243, 'M', '〔安〕'), + (0x1F244, 'M', '〔点〕'), + (0x1F245, 'M', '〔打〕'), + (0x1F246, 'M', '〔盗〕'), + (0x1F247, 'M', '〔勝〕'), + (0x1F248, 'M', '〔敗〕'), + (0x1F249, 'X'), + (0x1F250, 'M', '得'), + (0x1F251, 'M', '可'), + (0x1F252, 'X'), + (0x1F260, 'V'), + (0x1F266, 'X'), + (0x1F300, 'V'), + (0x1F6D8, 'X'), + (0x1F6DC, 'V'), + (0x1F6ED, 'X'), + (0x1F6F0, 'V'), + (0x1F6FD, 'X'), + (0x1F700, 'V'), + (0x1F777, 'X'), + (0x1F77B, 'V'), + (0x1F7DA, 'X'), + (0x1F7E0, 'V'), + (0x1F7EC, 'X'), + (0x1F7F0, 'V'), + (0x1F7F1, 'X'), + (0x1F800, 'V'), + (0x1F80C, 'X'), + (0x1F810, 'V'), + (0x1F848, 'X'), + (0x1F850, 'V'), + (0x1F85A, 'X'), + (0x1F860, 'V'), + (0x1F888, 'X'), + (0x1F890, 'V'), + (0x1F8AE, 'X'), + (0x1F8B0, 'V'), + (0x1F8B2, 'X'), + (0x1F900, 'V'), + (0x1FA54, 'X'), + (0x1FA60, 'V'), + (0x1FA6E, 'X'), + ] + +def _seg_76() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x1FA70, 'V'), + (0x1FA7D, 'X'), + (0x1FA80, 'V'), + (0x1FA89, 'X'), + (0x1FA90, 'V'), + (0x1FABE, 'X'), + (0x1FABF, 'V'), + (0x1FAC6, 'X'), + (0x1FACE, 'V'), + (0x1FADC, 'X'), + (0x1FAE0, 'V'), + (0x1FAE9, 'X'), + (0x1FAF0, 'V'), + (0x1FAF9, 'X'), + (0x1FB00, 'V'), + (0x1FB93, 'X'), + (0x1FB94, 'V'), + (0x1FBCB, 'X'), + (0x1FBF0, 'M', '0'), + (0x1FBF1, 'M', '1'), + (0x1FBF2, 'M', '2'), + (0x1FBF3, 'M', '3'), + (0x1FBF4, 'M', '4'), + (0x1FBF5, 'M', '5'), + (0x1FBF6, 'M', '6'), + (0x1FBF7, 'M', '7'), + (0x1FBF8, 'M', '8'), + (0x1FBF9, 'M', '9'), + (0x1FBFA, 'X'), + (0x20000, 'V'), + (0x2A6E0, 'X'), + (0x2A700, 'V'), + (0x2B73A, 'X'), + (0x2B740, 'V'), + (0x2B81E, 'X'), + (0x2B820, 'V'), + (0x2CEA2, 'X'), + (0x2CEB0, 'V'), + (0x2EBE1, 'X'), + (0x2F800, 'M', '丽'), + (0x2F801, 'M', '丸'), + (0x2F802, 'M', '乁'), + (0x2F803, 'M', '𠄢'), + (0x2F804, 'M', '你'), + (0x2F805, 'M', '侮'), + (0x2F806, 'M', '侻'), + (0x2F807, 'M', '倂'), + (0x2F808, 'M', '偺'), + (0x2F809, 'M', '備'), + (0x2F80A, 'M', '僧'), + (0x2F80B, 'M', '像'), + (0x2F80C, 'M', '㒞'), + (0x2F80D, 'M', '𠘺'), + (0x2F80E, 'M', '免'), + (0x2F80F, 'M', '兔'), + (0x2F810, 'M', '兤'), + (0x2F811, 'M', '具'), + (0x2F812, 'M', '𠔜'), + (0x2F813, 'M', '㒹'), + (0x2F814, 'M', '內'), + (0x2F815, 'M', '再'), + (0x2F816, 'M', '𠕋'), + (0x2F817, 'M', '冗'), + (0x2F818, 'M', '冤'), + (0x2F819, 'M', '仌'), + (0x2F81A, 'M', '冬'), + (0x2F81B, 'M', '况'), + (0x2F81C, 'M', '𩇟'), + (0x2F81D, 'M', '凵'), + (0x2F81E, 'M', '刃'), + (0x2F81F, 'M', '㓟'), + (0x2F820, 'M', '刻'), + (0x2F821, 'M', '剆'), + (0x2F822, 'M', '割'), + (0x2F823, 'M', '剷'), + (0x2F824, 'M', '㔕'), + (0x2F825, 'M', '勇'), + (0x2F826, 'M', '勉'), + (0x2F827, 'M', '勤'), + (0x2F828, 'M', '勺'), + (0x2F829, 'M', '包'), + (0x2F82A, 'M', '匆'), + (0x2F82B, 'M', '北'), + (0x2F82C, 'M', '卉'), + (0x2F82D, 'M', '卑'), + (0x2F82E, 'M', '博'), + (0x2F82F, 'M', '即'), + (0x2F830, 'M', '卽'), + (0x2F831, 'M', '卿'), + (0x2F834, 'M', '𠨬'), + (0x2F835, 'M', '灰'), + (0x2F836, 'M', '及'), + (0x2F837, 'M', '叟'), + (0x2F838, 'M', '𠭣'), + (0x2F839, 'M', '叫'), + (0x2F83A, 'M', '叱'), + (0x2F83B, 'M', '吆'), + (0x2F83C, 'M', '咞'), + (0x2F83D, 'M', '吸'), + (0x2F83E, 'M', '呈'), + ] + +def _seg_77() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x2F83F, 'M', '周'), + (0x2F840, 'M', '咢'), + (0x2F841, 'M', '哶'), + (0x2F842, 'M', '唐'), + (0x2F843, 'M', '啓'), + (0x2F844, 'M', '啣'), + (0x2F845, 'M', '善'), + (0x2F847, 'M', '喙'), + (0x2F848, 'M', '喫'), + (0x2F849, 'M', '喳'), + (0x2F84A, 'M', '嗂'), + (0x2F84B, 'M', '圖'), + (0x2F84C, 'M', '嘆'), + (0x2F84D, 'M', '圗'), + (0x2F84E, 'M', '噑'), + (0x2F84F, 'M', '噴'), + (0x2F850, 'M', '切'), + (0x2F851, 'M', '壮'), + (0x2F852, 'M', '城'), + (0x2F853, 'M', '埴'), + (0x2F854, 'M', '堍'), + (0x2F855, 'M', '型'), + (0x2F856, 'M', '堲'), + (0x2F857, 'M', '報'), + (0x2F858, 'M', '墬'), + (0x2F859, 'M', '𡓤'), + (0x2F85A, 'M', '売'), + (0x2F85B, 'M', '壷'), + (0x2F85C, 'M', '夆'), + (0x2F85D, 'M', '多'), + (0x2F85E, 'M', '夢'), + (0x2F85F, 'M', '奢'), + (0x2F860, 'M', '𡚨'), + (0x2F861, 'M', '𡛪'), + (0x2F862, 'M', '姬'), + (0x2F863, 'M', '娛'), + (0x2F864, 'M', '娧'), + (0x2F865, 'M', '姘'), + (0x2F866, 'M', '婦'), + (0x2F867, 'M', '㛮'), + (0x2F868, 'X'), + (0x2F869, 'M', '嬈'), + (0x2F86A, 'M', '嬾'), + (0x2F86C, 'M', '𡧈'), + (0x2F86D, 'M', '寃'), + (0x2F86E, 'M', '寘'), + (0x2F86F, 'M', '寧'), + (0x2F870, 'M', '寳'), + (0x2F871, 'M', '𡬘'), + (0x2F872, 'M', '寿'), + (0x2F873, 'M', '将'), + (0x2F874, 'X'), + (0x2F875, 'M', '尢'), + (0x2F876, 'M', '㞁'), + (0x2F877, 'M', '屠'), + (0x2F878, 'M', '屮'), + (0x2F879, 'M', '峀'), + (0x2F87A, 'M', '岍'), + (0x2F87B, 'M', '𡷤'), + (0x2F87C, 'M', '嵃'), + (0x2F87D, 'M', '𡷦'), + (0x2F87E, 'M', '嵮'), + (0x2F87F, 'M', '嵫'), + (0x2F880, 'M', '嵼'), + (0x2F881, 'M', '巡'), + (0x2F882, 'M', '巢'), + (0x2F883, 'M', '㠯'), + (0x2F884, 'M', '巽'), + (0x2F885, 'M', '帨'), + (0x2F886, 'M', '帽'), + (0x2F887, 'M', '幩'), + (0x2F888, 'M', '㡢'), + (0x2F889, 'M', '𢆃'), + (0x2F88A, 'M', '㡼'), + (0x2F88B, 'M', '庰'), + (0x2F88C, 'M', '庳'), + (0x2F88D, 'M', '庶'), + (0x2F88E, 'M', '廊'), + (0x2F88F, 'M', '𪎒'), + (0x2F890, 'M', '廾'), + (0x2F891, 'M', '𢌱'), + (0x2F893, 'M', '舁'), + (0x2F894, 'M', '弢'), + (0x2F896, 'M', '㣇'), + (0x2F897, 'M', '𣊸'), + (0x2F898, 'M', '𦇚'), + (0x2F899, 'M', '形'), + (0x2F89A, 'M', '彫'), + (0x2F89B, 'M', '㣣'), + (0x2F89C, 'M', '徚'), + (0x2F89D, 'M', '忍'), + (0x2F89E, 'M', '志'), + (0x2F89F, 'M', '忹'), + (0x2F8A0, 'M', '悁'), + (0x2F8A1, 'M', '㤺'), + (0x2F8A2, 'M', '㤜'), + (0x2F8A3, 'M', '悔'), + (0x2F8A4, 'M', '𢛔'), + (0x2F8A5, 'M', '惇'), + (0x2F8A6, 'M', '慈'), + ] + +def _seg_78() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x2F8A7, 'M', '慌'), + (0x2F8A8, 'M', '慎'), + (0x2F8A9, 'M', '慌'), + (0x2F8AA, 'M', '慺'), + (0x2F8AB, 'M', '憎'), + (0x2F8AC, 'M', '憲'), + (0x2F8AD, 'M', '憤'), + (0x2F8AE, 'M', '憯'), + (0x2F8AF, 'M', '懞'), + (0x2F8B0, 'M', '懲'), + (0x2F8B1, 'M', '懶'), + (0x2F8B2, 'M', '成'), + (0x2F8B3, 'M', '戛'), + (0x2F8B4, 'M', '扝'), + (0x2F8B5, 'M', '抱'), + (0x2F8B6, 'M', '拔'), + (0x2F8B7, 'M', '捐'), + (0x2F8B8, 'M', '𢬌'), + (0x2F8B9, 'M', '挽'), + (0x2F8BA, 'M', '拼'), + (0x2F8BB, 'M', '捨'), + (0x2F8BC, 'M', '掃'), + (0x2F8BD, 'M', '揤'), + (0x2F8BE, 'M', '𢯱'), + (0x2F8BF, 'M', '搢'), + (0x2F8C0, 'M', '揅'), + (0x2F8C1, 'M', '掩'), + (0x2F8C2, 'M', '㨮'), + (0x2F8C3, 'M', '摩'), + (0x2F8C4, 'M', '摾'), + (0x2F8C5, 'M', '撝'), + (0x2F8C6, 'M', '摷'), + (0x2F8C7, 'M', '㩬'), + (0x2F8C8, 'M', '敏'), + (0x2F8C9, 'M', '敬'), + (0x2F8CA, 'M', '𣀊'), + (0x2F8CB, 'M', '旣'), + (0x2F8CC, 'M', '書'), + (0x2F8CD, 'M', '晉'), + (0x2F8CE, 'M', '㬙'), + (0x2F8CF, 'M', '暑'), + (0x2F8D0, 'M', '㬈'), + (0x2F8D1, 'M', '㫤'), + (0x2F8D2, 'M', '冒'), + (0x2F8D3, 'M', '冕'), + (0x2F8D4, 'M', '最'), + (0x2F8D5, 'M', '暜'), + (0x2F8D6, 'M', '肭'), + (0x2F8D7, 'M', '䏙'), + (0x2F8D8, 'M', '朗'), + (0x2F8D9, 'M', '望'), + (0x2F8DA, 'M', '朡'), + (0x2F8DB, 'M', '杞'), + (0x2F8DC, 'M', '杓'), + (0x2F8DD, 'M', '𣏃'), + (0x2F8DE, 'M', '㭉'), + (0x2F8DF, 'M', '柺'), + (0x2F8E0, 'M', '枅'), + (0x2F8E1, 'M', '桒'), + (0x2F8E2, 'M', '梅'), + (0x2F8E3, 'M', '𣑭'), + (0x2F8E4, 'M', '梎'), + (0x2F8E5, 'M', '栟'), + (0x2F8E6, 'M', '椔'), + (0x2F8E7, 'M', '㮝'), + (0x2F8E8, 'M', '楂'), + (0x2F8E9, 'M', '榣'), + (0x2F8EA, 'M', '槪'), + (0x2F8EB, 'M', '檨'), + (0x2F8EC, 'M', '𣚣'), + (0x2F8ED, 'M', '櫛'), + (0x2F8EE, 'M', '㰘'), + (0x2F8EF, 'M', '次'), + (0x2F8F0, 'M', '𣢧'), + (0x2F8F1, 'M', '歔'), + (0x2F8F2, 'M', '㱎'), + (0x2F8F3, 'M', '歲'), + (0x2F8F4, 'M', '殟'), + (0x2F8F5, 'M', '殺'), + (0x2F8F6, 'M', '殻'), + (0x2F8F7, 'M', '𣪍'), + (0x2F8F8, 'M', '𡴋'), + (0x2F8F9, 'M', '𣫺'), + (0x2F8FA, 'M', '汎'), + (0x2F8FB, 'M', '𣲼'), + (0x2F8FC, 'M', '沿'), + (0x2F8FD, 'M', '泍'), + (0x2F8FE, 'M', '汧'), + (0x2F8FF, 'M', '洖'), + (0x2F900, 'M', '派'), + (0x2F901, 'M', '海'), + (0x2F902, 'M', '流'), + (0x2F903, 'M', '浩'), + (0x2F904, 'M', '浸'), + (0x2F905, 'M', '涅'), + (0x2F906, 'M', '𣴞'), + (0x2F907, 'M', '洴'), + (0x2F908, 'M', '港'), + (0x2F909, 'M', '湮'), + (0x2F90A, 'M', '㴳'), + ] + +def _seg_79() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x2F90B, 'M', '滋'), + (0x2F90C, 'M', '滇'), + (0x2F90D, 'M', '𣻑'), + (0x2F90E, 'M', '淹'), + (0x2F90F, 'M', '潮'), + (0x2F910, 'M', '𣽞'), + (0x2F911, 'M', '𣾎'), + (0x2F912, 'M', '濆'), + (0x2F913, 'M', '瀹'), + (0x2F914, 'M', '瀞'), + (0x2F915, 'M', '瀛'), + (0x2F916, 'M', '㶖'), + (0x2F917, 'M', '灊'), + (0x2F918, 'M', '災'), + (0x2F919, 'M', '灷'), + (0x2F91A, 'M', '炭'), + (0x2F91B, 'M', '𠔥'), + (0x2F91C, 'M', '煅'), + (0x2F91D, 'M', '𤉣'), + (0x2F91E, 'M', '熜'), + (0x2F91F, 'X'), + (0x2F920, 'M', '爨'), + (0x2F921, 'M', '爵'), + (0x2F922, 'M', '牐'), + (0x2F923, 'M', '𤘈'), + (0x2F924, 'M', '犀'), + (0x2F925, 'M', '犕'), + (0x2F926, 'M', '𤜵'), + (0x2F927, 'M', '𤠔'), + (0x2F928, 'M', '獺'), + (0x2F929, 'M', '王'), + (0x2F92A, 'M', '㺬'), + (0x2F92B, 'M', '玥'), + (0x2F92C, 'M', '㺸'), + (0x2F92E, 'M', '瑇'), + (0x2F92F, 'M', '瑜'), + (0x2F930, 'M', '瑱'), + (0x2F931, 'M', '璅'), + (0x2F932, 'M', '瓊'), + (0x2F933, 'M', '㼛'), + (0x2F934, 'M', '甤'), + (0x2F935, 'M', '𤰶'), + (0x2F936, 'M', '甾'), + (0x2F937, 'M', '𤲒'), + (0x2F938, 'M', '異'), + (0x2F939, 'M', '𢆟'), + (0x2F93A, 'M', '瘐'), + (0x2F93B, 'M', '𤾡'), + (0x2F93C, 'M', '𤾸'), + (0x2F93D, 'M', '𥁄'), + (0x2F93E, 'M', '㿼'), + (0x2F93F, 'M', '䀈'), + (0x2F940, 'M', '直'), + (0x2F941, 'M', '𥃳'), + (0x2F942, 'M', '𥃲'), + (0x2F943, 'M', '𥄙'), + (0x2F944, 'M', '𥄳'), + (0x2F945, 'M', '眞'), + (0x2F946, 'M', '真'), + (0x2F948, 'M', '睊'), + (0x2F949, 'M', '䀹'), + (0x2F94A, 'M', '瞋'), + (0x2F94B, 'M', '䁆'), + (0x2F94C, 'M', '䂖'), + (0x2F94D, 'M', '𥐝'), + (0x2F94E, 'M', '硎'), + (0x2F94F, 'M', '碌'), + (0x2F950, 'M', '磌'), + (0x2F951, 'M', '䃣'), + (0x2F952, 'M', '𥘦'), + (0x2F953, 'M', '祖'), + (0x2F954, 'M', '𥚚'), + (0x2F955, 'M', '𥛅'), + (0x2F956, 'M', '福'), + (0x2F957, 'M', '秫'), + (0x2F958, 'M', '䄯'), + (0x2F959, 'M', '穀'), + (0x2F95A, 'M', '穊'), + (0x2F95B, 'M', '穏'), + (0x2F95C, 'M', '𥥼'), + (0x2F95D, 'M', '𥪧'), + (0x2F95F, 'X'), + (0x2F960, 'M', '䈂'), + (0x2F961, 'M', '𥮫'), + (0x2F962, 'M', '篆'), + (0x2F963, 'M', '築'), + (0x2F964, 'M', '䈧'), + (0x2F965, 'M', '𥲀'), + (0x2F966, 'M', '糒'), + (0x2F967, 'M', '䊠'), + (0x2F968, 'M', '糨'), + (0x2F969, 'M', '糣'), + (0x2F96A, 'M', '紀'), + (0x2F96B, 'M', '𥾆'), + (0x2F96C, 'M', '絣'), + (0x2F96D, 'M', '䌁'), + (0x2F96E, 'M', '緇'), + (0x2F96F, 'M', '縂'), + (0x2F970, 'M', '繅'), + (0x2F971, 'M', '䌴'), + ] + +def _seg_80() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x2F972, 'M', '𦈨'), + (0x2F973, 'M', '𦉇'), + (0x2F974, 'M', '䍙'), + (0x2F975, 'M', '𦋙'), + (0x2F976, 'M', '罺'), + (0x2F977, 'M', '𦌾'), + (0x2F978, 'M', '羕'), + (0x2F979, 'M', '翺'), + (0x2F97A, 'M', '者'), + (0x2F97B, 'M', '𦓚'), + (0x2F97C, 'M', '𦔣'), + (0x2F97D, 'M', '聠'), + (0x2F97E, 'M', '𦖨'), + (0x2F97F, 'M', '聰'), + (0x2F980, 'M', '𣍟'), + (0x2F981, 'M', '䏕'), + (0x2F982, 'M', '育'), + (0x2F983, 'M', '脃'), + (0x2F984, 'M', '䐋'), + (0x2F985, 'M', '脾'), + (0x2F986, 'M', '媵'), + (0x2F987, 'M', '𦞧'), + (0x2F988, 'M', '𦞵'), + (0x2F989, 'M', '𣎓'), + (0x2F98A, 'M', '𣎜'), + (0x2F98B, 'M', '舁'), + (0x2F98C, 'M', '舄'), + (0x2F98D, 'M', '辞'), + (0x2F98E, 'M', '䑫'), + (0x2F98F, 'M', '芑'), + (0x2F990, 'M', '芋'), + (0x2F991, 'M', '芝'), + (0x2F992, 'M', '劳'), + (0x2F993, 'M', '花'), + (0x2F994, 'M', '芳'), + (0x2F995, 'M', '芽'), + (0x2F996, 'M', '苦'), + (0x2F997, 'M', '𦬼'), + (0x2F998, 'M', '若'), + (0x2F999, 'M', '茝'), + (0x2F99A, 'M', '荣'), + (0x2F99B, 'M', '莭'), + (0x2F99C, 'M', '茣'), + (0x2F99D, 'M', '莽'), + (0x2F99E, 'M', '菧'), + (0x2F99F, 'M', '著'), + (0x2F9A0, 'M', '荓'), + (0x2F9A1, 'M', '菊'), + (0x2F9A2, 'M', '菌'), + (0x2F9A3, 'M', '菜'), + (0x2F9A4, 'M', '𦰶'), + (0x2F9A5, 'M', '𦵫'), + (0x2F9A6, 'M', '𦳕'), + (0x2F9A7, 'M', '䔫'), + (0x2F9A8, 'M', '蓱'), + (0x2F9A9, 'M', '蓳'), + (0x2F9AA, 'M', '蔖'), + (0x2F9AB, 'M', '𧏊'), + (0x2F9AC, 'M', '蕤'), + (0x2F9AD, 'M', '𦼬'), + (0x2F9AE, 'M', '䕝'), + (0x2F9AF, 'M', '䕡'), + (0x2F9B0, 'M', '𦾱'), + (0x2F9B1, 'M', '𧃒'), + (0x2F9B2, 'M', '䕫'), + (0x2F9B3, 'M', '虐'), + (0x2F9B4, 'M', '虜'), + (0x2F9B5, 'M', '虧'), + (0x2F9B6, 'M', '虩'), + (0x2F9B7, 'M', '蚩'), + (0x2F9B8, 'M', '蚈'), + (0x2F9B9, 'M', '蜎'), + (0x2F9BA, 'M', '蛢'), + (0x2F9BB, 'M', '蝹'), + (0x2F9BC, 'M', '蜨'), + (0x2F9BD, 'M', '蝫'), + (0x2F9BE, 'M', '螆'), + (0x2F9BF, 'X'), + (0x2F9C0, 'M', '蟡'), + (0x2F9C1, 'M', '蠁'), + (0x2F9C2, 'M', '䗹'), + (0x2F9C3, 'M', '衠'), + (0x2F9C4, 'M', '衣'), + (0x2F9C5, 'M', '𧙧'), + (0x2F9C6, 'M', '裗'), + (0x2F9C7, 'M', '裞'), + (0x2F9C8, 'M', '䘵'), + (0x2F9C9, 'M', '裺'), + (0x2F9CA, 'M', '㒻'), + (0x2F9CB, 'M', '𧢮'), + (0x2F9CC, 'M', '𧥦'), + (0x2F9CD, 'M', '䚾'), + (0x2F9CE, 'M', '䛇'), + (0x2F9CF, 'M', '誠'), + (0x2F9D0, 'M', '諭'), + (0x2F9D1, 'M', '變'), + (0x2F9D2, 'M', '豕'), + (0x2F9D3, 'M', '𧲨'), + (0x2F9D4, 'M', '貫'), + (0x2F9D5, 'M', '賁'), + ] + +def _seg_81() -> List[Union[Tuple[int, str], Tuple[int, str, str]]]: + return [ + (0x2F9D6, 'M', '贛'), + (0x2F9D7, 'M', '起'), + (0x2F9D8, 'M', '𧼯'), + (0x2F9D9, 'M', '𠠄'), + (0x2F9DA, 'M', '跋'), + (0x2F9DB, 'M', '趼'), + (0x2F9DC, 'M', '跰'), + (0x2F9DD, 'M', '𠣞'), + (0x2F9DE, 'M', '軔'), + (0x2F9DF, 'M', '輸'), + (0x2F9E0, 'M', '𨗒'), + (0x2F9E1, 'M', '𨗭'), + (0x2F9E2, 'M', '邔'), + (0x2F9E3, 'M', '郱'), + (0x2F9E4, 'M', '鄑'), + (0x2F9E5, 'M', '𨜮'), + (0x2F9E6, 'M', '鄛'), + (0x2F9E7, 'M', '鈸'), + (0x2F9E8, 'M', '鋗'), + (0x2F9E9, 'M', '鋘'), + (0x2F9EA, 'M', '鉼'), + (0x2F9EB, 'M', '鏹'), + (0x2F9EC, 'M', '鐕'), + (0x2F9ED, 'M', '𨯺'), + (0x2F9EE, 'M', '開'), + (0x2F9EF, 'M', '䦕'), + (0x2F9F0, 'M', '閷'), + (0x2F9F1, 'M', '𨵷'), + (0x2F9F2, 'M', '䧦'), + (0x2F9F3, 'M', '雃'), + (0x2F9F4, 'M', '嶲'), + (0x2F9F5, 'M', '霣'), + (0x2F9F6, 'M', '𩅅'), + (0x2F9F7, 'M', '𩈚'), + (0x2F9F8, 'M', '䩮'), + (0x2F9F9, 'M', '䩶'), + (0x2F9FA, 'M', '韠'), + (0x2F9FB, 'M', '𩐊'), + (0x2F9FC, 'M', '䪲'), + (0x2F9FD, 'M', '𩒖'), + (0x2F9FE, 'M', '頋'), + (0x2FA00, 'M', '頩'), + (0x2FA01, 'M', '𩖶'), + (0x2FA02, 'M', '飢'), + (0x2FA03, 'M', '䬳'), + (0x2FA04, 'M', '餩'), + (0x2FA05, 'M', '馧'), + (0x2FA06, 'M', '駂'), + (0x2FA07, 'M', '駾'), + (0x2FA08, 'M', '䯎'), + (0x2FA09, 'M', '𩬰'), + (0x2FA0A, 'M', '鬒'), + (0x2FA0B, 'M', '鱀'), + (0x2FA0C, 'M', '鳽'), + (0x2FA0D, 'M', '䳎'), + (0x2FA0E, 'M', '䳭'), + (0x2FA0F, 'M', '鵧'), + (0x2FA10, 'M', '𪃎'), + (0x2FA11, 'M', '䳸'), + (0x2FA12, 'M', '𪄅'), + (0x2FA13, 'M', '𪈎'), + (0x2FA14, 'M', '𪊑'), + (0x2FA15, 'M', '麻'), + (0x2FA16, 'M', '䵖'), + (0x2FA17, 'M', '黹'), + (0x2FA18, 'M', '黾'), + (0x2FA19, 'M', '鼅'), + (0x2FA1A, 'M', '鼏'), + (0x2FA1B, 'M', '鼖'), + (0x2FA1C, 'M', '鼻'), + (0x2FA1D, 'M', '𪘀'), + (0x2FA1E, 'X'), + (0x30000, 'V'), + (0x3134B, 'X'), + (0x31350, 'V'), + (0x323B0, 'X'), + (0xE0100, 'I'), + (0xE01F0, 'X'), + ] + +uts46data = tuple( + _seg_0() + + _seg_1() + + _seg_2() + + _seg_3() + + _seg_4() + + _seg_5() + + _seg_6() + + _seg_7() + + _seg_8() + + _seg_9() + + _seg_10() + + _seg_11() + + _seg_12() + + _seg_13() + + _seg_14() + + _seg_15() + + _seg_16() + + _seg_17() + + _seg_18() + + _seg_19() + + _seg_20() + + _seg_21() + + _seg_22() + + _seg_23() + + _seg_24() + + _seg_25() + + _seg_26() + + _seg_27() + + _seg_28() + + _seg_29() + + _seg_30() + + _seg_31() + + _seg_32() + + _seg_33() + + _seg_34() + + _seg_35() + + _seg_36() + + _seg_37() + + _seg_38() + + _seg_39() + + _seg_40() + + _seg_41() + + _seg_42() + + _seg_43() + + _seg_44() + + _seg_45() + + _seg_46() + + _seg_47() + + _seg_48() + + _seg_49() + + _seg_50() + + _seg_51() + + _seg_52() + + _seg_53() + + _seg_54() + + _seg_55() + + _seg_56() + + _seg_57() + + _seg_58() + + _seg_59() + + _seg_60() + + _seg_61() + + _seg_62() + + _seg_63() + + _seg_64() + + _seg_65() + + _seg_66() + + _seg_67() + + _seg_68() + + _seg_69() + + _seg_70() + + _seg_71() + + _seg_72() + + _seg_73() + + _seg_74() + + _seg_75() + + _seg_76() + + _seg_77() + + _seg_78() + + _seg_79() + + _seg_80() + + _seg_81() +) # type: Tuple[Union[Tuple[int, str], Tuple[int, str, str]], ...] diff --git a/_vendor/requests-2.28.1.dist-info/INSTALLER b/_vendor/requests-2.28.1.dist-info/INSTALLER new file mode 100644 index 0000000..a1b589e --- /dev/null +++ b/_vendor/requests-2.28.1.dist-info/INSTALLER @@ -0,0 +1 @@ +pip diff --git a/_vendor/requests-2.28.1.dist-info/LICENSE b/_vendor/requests-2.28.1.dist-info/LICENSE new file mode 100644 index 0000000..67db858 --- /dev/null +++ b/_vendor/requests-2.28.1.dist-info/LICENSE @@ -0,0 +1,175 @@ + + Apache License + Version 2.0, January 2004 + http://www.apache.org/licenses/ + + TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION + + 1. Definitions. + + "License" shall mean the terms and conditions for use, reproduction, + and distribution as defined by Sections 1 through 9 of this document. + + "Licensor" shall mean the copyright owner or entity authorized by + the copyright owner that is granting the License. + + "Legal Entity" shall mean the union of the acting entity and all + other entities that control, are controlled by, or are under common + control with that entity. For the purposes of this definition, + "control" means (i) the power, direct or indirect, to cause the + direction or management of such entity, whether by contract or + otherwise, or (ii) ownership of fifty percent (50%) or more of the + outstanding shares, or (iii) beneficial ownership of such entity. + + "You" (or "Your") shall mean an individual or Legal Entity + exercising permissions granted by this License. + + "Source" form shall mean the preferred form for making modifications, + including but not limited to software source code, documentation + source, and configuration files. + + "Object" form shall mean any form resulting from mechanical + transformation or translation of a Source form, including but + not limited to compiled object code, generated documentation, + and conversions to other media types. + + "Work" shall mean the work of authorship, whether in Source or + Object form, made available under the License, as indicated by a + copyright notice that is included in or attached to the work + (an example is provided in the Appendix below). + + "Derivative Works" shall mean any work, whether in Source or Object + form, that is based on (or derived from) the Work and for which the + editorial revisions, annotations, elaborations, or other modifications + represent, as a whole, an original work of authorship. For the purposes + of this License, Derivative Works shall not include works that remain + separable from, or merely link (or bind by name) to the interfaces of, + the Work and Derivative Works thereof. + + "Contribution" shall mean any work of authorship, including + the original version of the Work and any modifications or additions + to that Work or Derivative Works thereof, that is intentionally + submitted to Licensor for inclusion in the Work by the copyright owner + or by an individual or Legal Entity authorized to submit on behalf of + the copyright owner. For the purposes of this definition, "submitted" + means any form of electronic, verbal, or written communication sent + to the Licensor or its representatives, including but not limited to + communication on electronic mailing lists, source code control systems, + and issue tracking systems that are managed by, or on behalf of, the + Licensor for the purpose of discussing and improving the Work, but + excluding communication that is conspicuously marked or otherwise + designated in writing by the copyright owner as "Not a Contribution." + + "Contributor" shall mean Licensor and any individual or Legal Entity + on behalf of whom a Contribution has been received by Licensor and + subsequently incorporated within the Work. + + 2. Grant of Copyright License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + copyright license to reproduce, prepare Derivative Works of, + publicly display, publicly perform, sublicense, and distribute the + Work and such Derivative Works in Source or Object form. + + 3. Grant of Patent License. Subject to the terms and conditions of + this License, each Contributor hereby grants to You a perpetual, + worldwide, non-exclusive, no-charge, royalty-free, irrevocable + (except as stated in this section) patent license to make, have made, + use, offer to sell, sell, import, and otherwise transfer the Work, + where such license applies only to those patent claims licensable + by such Contributor that are necessarily infringed by their + Contribution(s) alone or by combination of their Contribution(s) + with the Work to which such Contribution(s) was submitted. If You + institute patent litigation against any entity (including a + cross-claim or counterclaim in a lawsuit) alleging that the Work + or a Contribution incorporated within the Work constitutes direct + or contributory patent infringement, then any patent licenses + granted to You under this License for that Work shall terminate + as of the date such litigation is filed. + + 4. Redistribution. You may reproduce and distribute copies of the + Work or Derivative Works thereof in any medium, with or without + modifications, and in Source or Object form, provided that You + meet the following conditions: + + (a) You must give any other recipients of the Work or + Derivative Works a copy of this License; and + + (b) You must cause any modified files to carry prominent notices + stating that You changed the files; and + + (c) You must retain, in the Source form of any Derivative Works + that You distribute, all copyright, patent, trademark, and + attribution notices from the Source form of the Work, + excluding those notices that do not pertain to any part of + the Derivative Works; and + + (d) If the Work includes a "NOTICE" text file as part of its + distribution, then any Derivative Works that You distribute must + include a readable copy of the attribution notices contained + within such NOTICE file, excluding those notices that do not + pertain to any part of the Derivative Works, in at least one + of the following places: within a NOTICE text file distributed + as part of the Derivative Works; within the Source form or + documentation, if provided along with the Derivative Works; or, + within a display generated by the Derivative Works, if and + wherever such third-party notices normally appear. The contents + of the NOTICE file are for informational purposes only and + do not modify the License. You may add Your own attribution + notices within Derivative Works that You distribute, alongside + or as an addendum to the NOTICE text from the Work, provided + that such additional attribution notices cannot be construed + as modifying the License. + + You may add Your own copyright statement to Your modifications and + may provide additional or different license terms and conditions + for use, reproduction, or distribution of Your modifications, or + for any such Derivative Works as a whole, provided Your use, + reproduction, and distribution of the Work otherwise complies with + the conditions stated in this License. + + 5. Submission of Contributions. Unless You explicitly state otherwise, + any Contribution intentionally submitted for inclusion in the Work + by You to the Licensor shall be under the terms and conditions of + this License, without any additional terms or conditions. + Notwithstanding the above, nothing herein shall supersede or modify + the terms of any separate license agreement you may have executed + with Licensor regarding such Contributions. + + 6. Trademarks. This License does not grant permission to use the trade + names, trademarks, service marks, or product names of the Licensor, + except as required for reasonable and customary use in describing the + origin of the Work and reproducing the content of the NOTICE file. + + 7. Disclaimer of Warranty. Unless required by applicable law or + agreed to in writing, Licensor provides the Work (and each + Contributor provides its Contributions) on an "AS IS" BASIS, + WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or + implied, including, without limitation, any warranties or conditions + of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A + PARTICULAR PURPOSE. You are solely responsible for determining the + appropriateness of using or redistributing the Work and assume any + risks associated with Your exercise of permissions under this License. + + 8. Limitation of Liability. In no event and under no legal theory, + whether in tort (including negligence), contract, or otherwise, + unless required by applicable law (such as deliberate and grossly + negligent acts) or agreed to in writing, shall any Contributor be + liable to You for damages, including any direct, indirect, special, + incidental, or consequential damages of any character arising as a + result of this License or out of the use or inability to use the + Work (including but not limited to damages for loss of goodwill, + work stoppage, computer failure or malfunction, or any and all + other commercial damages or losses), even if such Contributor + has been advised of the possibility of such damages. + + 9. Accepting Warranty or Additional Liability. While redistributing + the Work or Derivative Works thereof, You may choose to offer, + and charge a fee for, acceptance of support, warranty, indemnity, + or other liability obligations and/or rights consistent with this + License. However, in accepting such obligations, You may act only + on Your own behalf and on Your sole responsibility, not on behalf + of any other Contributor, and only if You agree to indemnify, + defend, and hold each Contributor harmless for any liability + incurred by, or claims asserted against, such Contributor by reason + of your accepting any such warranty or additional liability. diff --git a/_vendor/requests-2.28.1.dist-info/METADATA b/_vendor/requests-2.28.1.dist-info/METADATA new file mode 100644 index 0000000..17b5413 --- /dev/null +++ b/_vendor/requests-2.28.1.dist-info/METADATA @@ -0,0 +1,122 @@ +Metadata-Version: 2.1 +Name: requests +Version: 2.28.1 +Summary: Python HTTP for Humans. +Home-page: https://requests.readthedocs.io +Author: Kenneth Reitz +Author-email: me@kennethreitz.org +License: Apache 2.0 +Project-URL: Documentation, https://requests.readthedocs.io +Project-URL: Source, https://github.com/psf/requests +Platform: UNKNOWN +Classifier: Development Status :: 5 - Production/Stable +Classifier: Environment :: Web Environment +Classifier: Intended Audience :: Developers +Classifier: License :: OSI Approved :: Apache Software License +Classifier: Natural Language :: English +Classifier: Operating System :: OS Independent +Classifier: Programming Language :: Python +Classifier: Programming Language :: Python :: 3 +Classifier: Programming Language :: Python :: 3.7 +Classifier: Programming Language :: Python :: 3.8 +Classifier: Programming Language :: Python :: 3.9 +Classifier: Programming Language :: Python :: 3.10 +Classifier: Programming Language :: Python :: 3.11 +Classifier: Programming Language :: Python :: 3 :: Only +Classifier: Programming Language :: Python :: Implementation :: CPython +Classifier: Programming Language :: Python :: Implementation :: PyPy +Classifier: Topic :: Internet :: WWW/HTTP +Classifier: Topic :: Software Development :: Libraries +Requires-Python: >=3.7, <4 +Description-Content-Type: text/markdown +License-File: LICENSE +Requires-Dist: charset-normalizer (<3,>=2) +Requires-Dist: idna (<4,>=2.5) +Requires-Dist: urllib3 (<1.27,>=1.21.1) +Requires-Dist: certifi (>=2017.4.17) +Provides-Extra: security +Provides-Extra: socks +Requires-Dist: PySocks (!=1.5.7,>=1.5.6) ; extra == 'socks' +Provides-Extra: use_chardet_on_py3 +Requires-Dist: chardet (<6,>=3.0.2) ; extra == 'use_chardet_on_py3' + +# Requests + +**Requests** is a simple, yet elegant, HTTP library. + +```python +>>> import requests +>>> r = requests.get('https://httpbin.org/basic-auth/user/pass', auth=('user', 'pass')) +>>> r.status_code +200 +>>> r.headers['content-type'] +'application/json; charset=utf8' +>>> r.encoding +'utf-8' +>>> r.text +'{"authenticated": true, ...' +>>> r.json() +{'authenticated': True, ...} +``` + +Requests allows you to send HTTP/1.1 requests extremely easily. There’s no need to manually add query strings to your URLs, or to form-encode your `PUT` & `POST` data — but nowadays, just use the `json` method! + +Requests is one of the most downloaded Python packages today, pulling in around `30M downloads / week`— according to GitHub, Requests is currently [depended upon](https://github.com/psf/requests/network/dependents?package_id=UGFja2FnZS01NzA4OTExNg%3D%3D) by `1,000,000+` repositories. You may certainly put your trust in this code. + +[![Downloads](https://pepy.tech/badge/requests/month)](https://pepy.tech/project/requests) +[![Supported Versions](https://img.shields.io/pypi/pyversions/requests.svg)](https://pypi.org/project/requests) +[![Contributors](https://img.shields.io/github/contributors/psf/requests.svg)](https://github.com/psf/requests/graphs/contributors) + +## Installing Requests and Supported Versions + +Requests is available on PyPI: + +```console +$ python -m pip install requests +``` + +Requests officially supports Python 3.7+. + +## Supported Features & Best–Practices + +Requests is ready for the demands of building robust and reliable HTTP–speaking applications, for the needs of today. + +- Keep-Alive & Connection Pooling +- International Domains and URLs +- Sessions with Cookie Persistence +- Browser-style TLS/SSL Verification +- Basic & Digest Authentication +- Familiar `dict`–like Cookies +- Automatic Content Decompression and Decoding +- Multi-part File Uploads +- SOCKS Proxy Support +- Connection Timeouts +- Streaming Downloads +- Automatic honoring of `.netrc` +- Chunked HTTP Requests + +## API Reference and User Guide available on [Read the Docs](https://requests.readthedocs.io) + +[![Read the Docs](https://raw.githubusercontent.com/psf/requests/main/ext/ss.png)](https://requests.readthedocs.io) + +## Cloning the repository + +When cloning the Requests repository, you may need to add the `-c +fetch.fsck.badTimezone=ignore` flag to avoid an error about a bad commit (see +[this issue](https://github.com/psf/requests/issues/2690) for more background): + +```shell +git clone -c fetch.fsck.badTimezone=ignore https://github.com/psf/requests.git +``` + +You can also apply this setting to your global Git config: + +```shell +git config --global fetch.fsck.badTimezone ignore +``` + +--- + +[![Kenneth Reitz](https://raw.githubusercontent.com/psf/requests/main/ext/kr.png)](https://kennethreitz.org) [![Python Software Foundation](https://raw.githubusercontent.com/psf/requests/main/ext/psf.png)](https://www.python.org/psf) + + diff --git a/_vendor/requests-2.28.1.dist-info/RECORD b/_vendor/requests-2.28.1.dist-info/RECORD new file mode 100644 index 0000000..577a075 --- /dev/null +++ b/_vendor/requests-2.28.1.dist-info/RECORD @@ -0,0 +1,43 @@ +requests-2.28.1.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4 +requests-2.28.1.dist-info/LICENSE,sha256=CeipvOyAZxBGUsFoaFqwkx54aPnIKEtm9a5u2uXxEws,10142 +requests-2.28.1.dist-info/METADATA,sha256=eoNYSJuPWbql7Til9dKPb--KRU2ouGR4g7UxtZFoHNU,4641 +requests-2.28.1.dist-info/RECORD,, +requests-2.28.1.dist-info/REQUESTED,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 +requests-2.28.1.dist-info/WHEEL,sha256=G16H4A3IeoQmnOrYV4ueZGKSjhipXx8zc8nu9FGlvMA,92 +requests-2.28.1.dist-info/top_level.txt,sha256=fMSVmHfb5rbGOo6xv-O_tUX6j-WyixssE-SnwcDRxNQ,9 +requests/__init__.py,sha256=S2K0jnVP6CSrT51SctFyiB0XfI8H9Nt7EqzERAD44gg,4972 +requests/__pycache__/__init__.cpython-310.pyc,, +requests/__pycache__/__version__.cpython-310.pyc,, +requests/__pycache__/_internal_utils.cpython-310.pyc,, +requests/__pycache__/adapters.cpython-310.pyc,, +requests/__pycache__/api.cpython-310.pyc,, +requests/__pycache__/auth.cpython-310.pyc,, +requests/__pycache__/certs.cpython-310.pyc,, +requests/__pycache__/compat.cpython-310.pyc,, +requests/__pycache__/cookies.cpython-310.pyc,, +requests/__pycache__/exceptions.cpython-310.pyc,, +requests/__pycache__/help.cpython-310.pyc,, +requests/__pycache__/hooks.cpython-310.pyc,, +requests/__pycache__/models.cpython-310.pyc,, +requests/__pycache__/packages.cpython-310.pyc,, +requests/__pycache__/sessions.cpython-310.pyc,, +requests/__pycache__/status_codes.cpython-310.pyc,, +requests/__pycache__/structures.cpython-310.pyc,, +requests/__pycache__/utils.cpython-310.pyc,, +requests/__version__.py,sha256=nJVa3ef2yRyeYMhy7yHnRyjjpnNTDykZsE4Sp9irBC4,440 +requests/_internal_utils.py,sha256=aSPlF4uDhtfKxEayZJJ7KkAxtormeTfpwKSBSwtmAUw,1397 +requests/adapters.py,sha256=sEnHGl4mJz4QHBT8jG6bU5aPinUtdoH3BIuAIzT-X74,21287 +requests/api.py,sha256=dyvkDd5itC9z2g0wHl_YfD1yf6YwpGWLO7__8e21nks,6377 +requests/auth.py,sha256=h-HLlVx9j8rKV5hfSAycP2ApOSglTz77R0tz7qCbbEE,10187 +requests/certs.py,sha256=Z9Sb410Anv6jUFTyss0jFFhU6xst8ctELqfy8Ev23gw,429 +requests/compat.py,sha256=yxntVOSEHGMrn7FNr_32EEam1ZNAdPRdSE13_yaHzTk,1451 +requests/cookies.py,sha256=kD3kNEcCj-mxbtf5fJsSaT86eGoEYpD3X0CSgpzl7BM,18560 +requests/exceptions.py,sha256=DhveFBclVjTRxhRduVpO-GbMYMID2gmjdLfNEqNpI_U,3811 +requests/help.py,sha256=gPX5d_H7Xd88aDABejhqGgl9B1VFRTt5BmiYvL3PzIQ,3875 +requests/hooks.py,sha256=CiuysiHA39V5UfcCBXFIx83IrDpuwfN9RcTUgv28ftQ,733 +requests/models.py,sha256=OiVxiOdlhzpbZoxut2OhKtpYlB7WW4iHQcfqSVmT4H4,35222 +requests/packages.py,sha256=DXgv-FJIczZITmv0vEBAhWj4W-5CGCIN_ksvgR17Dvs,957 +requests/sessions.py,sha256=KUqJcRRLovNefUs7ScOXSUVCcfSayTFWtbiJ7gOSlTI,30180 +requests/status_codes.py,sha256=FvHmT5uH-_uimtRz5hH9VCbt7VV-Nei2J9upbej6j8g,4235 +requests/structures.py,sha256=-IbmhVz06S-5aPSZuUthZ6-6D9XOjRuTXHOabY041XM,2912 +requests/utils.py,sha256=5_ws-bsKI9EHl7j27yi-6HFzPBKultPgd7HfPrUToWI,33228 diff --git a/_vendor/requests-2.28.1.dist-info/REQUESTED b/_vendor/requests-2.28.1.dist-info/REQUESTED new file mode 100644 index 0000000..e69de29 diff --git a/_vendor/requests-2.28.1.dist-info/WHEEL b/_vendor/requests-2.28.1.dist-info/WHEEL new file mode 100644 index 0000000..becc9a6 --- /dev/null +++ b/_vendor/requests-2.28.1.dist-info/WHEEL @@ -0,0 +1,5 @@ +Wheel-Version: 1.0 +Generator: bdist_wheel (0.37.1) +Root-Is-Purelib: true +Tag: py3-none-any + diff --git a/_vendor/requests-2.28.1.dist-info/top_level.txt b/_vendor/requests-2.28.1.dist-info/top_level.txt new file mode 100644 index 0000000..f229360 --- /dev/null +++ b/_vendor/requests-2.28.1.dist-info/top_level.txt @@ -0,0 +1 @@ +requests diff --git a/_vendor/requests/__init__.py b/_vendor/requests/__init__.py new file mode 100644 index 0000000..7ac8e29 --- /dev/null +++ b/_vendor/requests/__init__.py @@ -0,0 +1,180 @@ +# __ +# /__) _ _ _ _ _/ _ +# / ( (- (/ (/ (- _) / _) +# / + +""" +Requests HTTP Library +~~~~~~~~~~~~~~~~~~~~~ + +Requests is an HTTP library, written in Python, for human beings. +Basic GET usage: + + >>> import requests + >>> r = requests.get('https://www.python.org') + >>> r.status_code + 200 + >>> b'Python is a programming language' in r.content + True + +... or POST: + + >>> payload = dict(key1='value1', key2='value2') + >>> r = requests.post('https://httpbin.org/post', data=payload) + >>> print(r.text) + { + ... + "form": { + "key1": "value1", + "key2": "value2" + }, + ... + } + +The other HTTP methods are supported - see `requests.api`. Full documentation +is at . + +:copyright: (c) 2017 by Kenneth Reitz. +:license: Apache 2.0, see LICENSE for more details. +""" + +import warnings + +import urllib3 + +from .exceptions import RequestsDependencyWarning + +try: + from charset_normalizer import __version__ as charset_normalizer_version +except ImportError: + charset_normalizer_version = None + +try: + from chardet import __version__ as chardet_version +except ImportError: + chardet_version = None + + +def check_compatibility(urllib3_version, chardet_version, charset_normalizer_version): + urllib3_version = urllib3_version.split(".") + assert urllib3_version != ["dev"] # Verify urllib3 isn't installed from git. + + # Sometimes, urllib3 only reports its version as 16.1. + if len(urllib3_version) == 2: + urllib3_version.append("0") + + # Check urllib3 for compatibility. + major, minor, patch = urllib3_version # noqa: F811 + major, minor, patch = int(major), int(minor), int(patch) + # urllib3 >= 1.21.1, <= 1.26 + assert major == 1 + assert minor >= 21 + assert minor <= 26 + + # Check charset_normalizer for compatibility. + if chardet_version: + major, minor, patch = chardet_version.split(".")[:3] + major, minor, patch = int(major), int(minor), int(patch) + # chardet_version >= 3.0.2, < 6.0.0 + assert (3, 0, 2) <= (major, minor, patch) < (6, 0, 0) + elif charset_normalizer_version: + major, minor, patch = charset_normalizer_version.split(".")[:3] + major, minor, patch = int(major), int(minor), int(patch) + # charset_normalizer >= 2.0.0 < 3.0.0 + assert (2, 0, 0) <= (major, minor, patch) < (3, 0, 0) + else: + raise Exception("You need either charset_normalizer or chardet installed") + + +def _check_cryptography(cryptography_version): + # cryptography < 1.3.4 + try: + cryptography_version = list(map(int, cryptography_version.split("."))) + except ValueError: + return + + if cryptography_version < [1, 3, 4]: + warning = "Old version of cryptography ({}) may cause slowdown.".format( + cryptography_version + ) + warnings.warn(warning, RequestsDependencyWarning) + + +# Check imported dependencies for compatibility. +try: + check_compatibility( + urllib3.__version__, chardet_version, charset_normalizer_version + ) +except (AssertionError, ValueError): + warnings.warn( + "urllib3 ({}) or chardet ({})/charset_normalizer ({}) doesn't match a supported " + "version!".format( + urllib3.__version__, chardet_version, charset_normalizer_version + ), + RequestsDependencyWarning, + ) + +# Attempt to enable urllib3's fallback for SNI support +# if the standard library doesn't support SNI or the +# 'ssl' library isn't available. +try: + try: + import ssl + except ImportError: + ssl = None + + if not getattr(ssl, "HAS_SNI", False): + from urllib3.contrib import pyopenssl + + pyopenssl.inject_into_urllib3() + + # Check cryptography version + from cryptography import __version__ as cryptography_version + + _check_cryptography(cryptography_version) +except ImportError: + pass + +# urllib3's DependencyWarnings should be silenced. +from urllib3.exceptions import DependencyWarning + +warnings.simplefilter("ignore", DependencyWarning) + +# Set default logging handler to avoid "No handler found" warnings. +import logging +from logging import NullHandler + +from . import packages, utils +from .__version__ import ( + __author__, + __author_email__, + __build__, + __cake__, + __copyright__, + __description__, + __license__, + __title__, + __url__, + __version__, +) +from .api import delete, get, head, options, patch, post, put, request +from .exceptions import ( + ConnectionError, + ConnectTimeout, + FileModeWarning, + HTTPError, + JSONDecodeError, + ReadTimeout, + RequestException, + Timeout, + TooManyRedirects, + URLRequired, +) +from .models import PreparedRequest, Request, Response +from .sessions import Session, session +from .status_codes import codes + +logging.getLogger(__name__).addHandler(NullHandler()) + +# FileModeWarnings go off per the default. +warnings.simplefilter("default", FileModeWarning, append=True) diff --git a/_vendor/requests/__pycache__/__init__.cpython-310.pyc b/_vendor/requests/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..c2b565438251c62942079cd8b05670f7333a3298 GIT binary patch literal 3850 zcmbVPTXWpD6(&gTMbyfYZN;{1H-=@$(kAk*EMKG8N_>%HCywH=)TF_5WMUk^&|M{C$?pAi&>m-J0y%`qs?sYa5r?M%UojZRe@UyOR~%=#QM^T z#$8KPdl!g>f81u3udImd4&=r_&Kr@tIh6BqIbPSNRx>wY@PhF6`%J;fczD zlkGeSCrpSVTXyg3e77KnliWL;8pyqLg!|GaR&jD;ubf$alpP(~r-$br&85UKag>kq z+JU401kw}XaXHPVi6y2F-+GCjpqD4W`jfz`iIWE;vt=yv_QzaX;Q`@C!c%gF&4461 zJk2M?3|f=faE6_MaVk6`&$6??bNJElSMqK4wmiqqW$(wrvZRd4^X$BwWwY`EyC5&J zi}D@zj=aP!$vHMB=h-}1QqJU$hjsZbdsn{4-jfS#L0)E;WrH5#;%4eo9>9GyL=)A#dDX zx9Vs7pP;0?XX2Z#&_>fo8yipQlVDT%s^|Ugzdhb-;XqSA%D061mIb=20%Jr(gNQ!u znVmRVpj)w`J6#E)n<9v|b;G;o>!3|PUfrNw?Qe@^&!d#CtgO&LCb2S973K`siryLW z8r#Cm&+QnK=;dZ}cXzjuWal(uwLMoK?r3P^o33uPV=j=nw757}+nmcSqi8=(RJ^Tx zDZw%t`q6e544OmpRihn8;EKV08>%ZjuhD2waOUaf>l?3aPW)aN`y5Q~1Q43(g|n_%Vyr?uN(AXHw-C{+g%9(^-T~*9!B5L+k;FFHz?tA zI0S@sBZyZTp10hNlb#B;cg!-KZ`UE0S8meH9{p5A5!gVViNNeNyyY-xi%5%QdN=Xg zVCzz2aUrwj$>aO0YwN37CCV7g<-+(u2$lE>VRr2m0a_>N%%Be*h(ttOMD5;}zKWnU zU~#*61Z;Up_F=~DZPIac?Gx*JVo2XQAl&KL z>Lke6+{M1^TfcSooqcz|WSqWpK!Ca#EgcZYv5U37!%H1oFQT5l%gddTzER989ine% zbD}zZlAp~jUj4zI`JZ(2u|AyHFKs!lD&K@_VNGF z{%2kT?LYofyK(u%0r{TPkF2Gnkvd$wcm>F0rDRdz`06brr;%Xn>y8?SL1E%lC1bq8 zJmicloleI81>^M=l-RrZRotbKfTD#0!m@7f_(}`YilB4+FxUeYv^#R4U;q;UQ^HX2 zdMPdGBn(XIgd$4IeuCAKI?#~m*y^`!kzj$>%jslSg@BA#2ZfVP7P^Lv({CO*Tq{Zc zd92bBKobs$Z`wP5v(zat{ij<^Ba>zlB$th^01+==`zE+9UR-TA;k;&!h|NJuHCwG9 z3QVg7P?;Ww&S-Z47bPeRHUn^@w+t%vMIatILTZjjJm)N_*)>ulu5*fV?&WU*a!#q0W z)oP_v!?}=vy1*H0wKls!$YELqF!ehEW)m2_mVB*J|n{U6WRd76FSV@5gYP zw6SyZ%pWNj8-Wxt$WA^CLh%`VP83%{I))!hx$NX8>z}VZ5csi?Gsd66xr3ck#kDeo zhO{zV+KA)N{HXU#@Ib-oIvxM@vnMDIue|Q0lTVdM;D+Uej!+Z7^4F&vemwo*?Fpi5`v&5pfUSXq$O zH0~RJoPDh2{#FWLQ}FMLl_5k{xapC*S_?G{s(Krj&m%d9Ivgmrv;v9pjZtg>m)VDx zf-lNTD04iBoM$$miM6!tF3X&xxSCL!;k~;8RqpsuY4J0>_+(LpSrrt+_sH#3d zavRAVBr8ZhMDh`myGZUKLF`lykgNhp%My|oYV{B~A0v5$>}ru-tsW!q6XexKzI3(v z6j@^s(I?<0xC{Li`4aoY^Eoeib_AF3Hc=TkRd2(Y-B7F`v}*;#Embd6?V4@dQ-DlW zKqlK6%&KnnoIPm+w~9Cgc!hJ6sQwdZ&4wNMo|*%rU303o`+K-g5Z~OIT?Ouxy-4P3 Oi)6ZnT94V&&c6YPVkrUu literal 0 HcmV?d00001 diff --git a/_vendor/requests/__pycache__/__version__.cpython-310.pyc b/_vendor/requests/__pycache__/__version__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..7f628d21e4a8ae63633f36bd1cd68e5cbaf817ba GIT binary patch literal 512 zcmY*WO-sZu5KY&*+pQJ_1uud*Drl=!K~zNXA_yWX9&!n_8Mnc<$tJ0={SW>F!K>ap z`cq_&`UgCFGW83ckm1csUU)MRLEs}B!Si|gtR0oGpmS8e`0^HQ~Q~|qJUyN#qP^ez* z@5v<10LS5SJ-aXDK=EE?aJ(GH_@BHQw;jFQ-s88sn@4QH(SkqhQfj!#fzsgwr3`ec zxHMdpmgrDgsoa7wO0PlbFV-q9DxNdT`;;b??NeDi`HP`Q__r$ODU`Z-JfJlF@n%cU zmdTYpctEPL^_kwcB2&mna=By@)dRD%*5~VRy_!Zjzlh}LNPho+vK{g^M85H2dWjHjQ{`u literal 0 HcmV?d00001 diff --git a/_vendor/requests/__pycache__/_internal_utils.cpython-310.pyc b/_vendor/requests/__pycache__/_internal_utils.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..e7a398a940b84e9b45245351e756f05eb72ee8ce GIT binary patch literal 1522 zcmZux&5|265SGScdopY9X1PG%qQf3AMeHgFmn{ldvIdqSA!TnuWwP1Hc+_4ij5QNU zv&JsN0rDWpkqal@f)}9X$|ASJ>f-Le4B@S>oJX5yv5s(Nz~@vkaTtyzl91Om7tC8#zGoUGRfl7h)jn+y|Tja zmdeis2hHrUFmpC8Wokq&H8YdMutWh%Q7Wgv*~V8kXQMeAtYd_;iAX1mLjjVrTr&8< zD3}6TjbUabmjIhUR)Es%U0tGiqS5cPNK7YuhWL=1&nVIkt+qy`$c&J&HcIcJ?)2X2 z{)xVCsXCGO-`iX4zNXSU*6?I_?{samJl$LDTu@Z?M5jWe9@=hJ4H>(y6XXg78l*`qyl4?JTn^;5A0bf$Ceh#=HqKXWK&Cmju@Z!s!&;b4K!I~3A;qwX zns?dpL|`~=JEqye@cPjaE2T@y81;&|ndGv!nZ(|ON$eK$ z>axk>RkgO+Sl*lHR$Jd;-KV}EKKDJ|b2i|^ximB}sE7uk5Uvy-0mQEo3zRPZu+OQF944el$0=A_xH|&-JjD5f!pu-2N z_UtR$|9v*f^UPgPJ{ElZMaNh6_fpl+v}(BSK=sD$RSkVREYMdfSNNWSO=_-bE3#$p zUS5|R3mvi{jbyv&(U3N13%B==vX8JsUF6Po)r@1Fr*T|)3aZBH4X@^=X$6r% z^mcsb;G3hv_^bZGVSfg=oqt*Tw1K_e& literal 0 HcmV?d00001 diff --git a/_vendor/requests/__pycache__/adapters.cpython-310.pyc b/_vendor/requests/__pycache__/adapters.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..67f2c8b2cc2e41409d19823df30b2da57f2f523d GIT binary patch literal 16784 zcmeHOS&$pYd7c>zj-AC~Pm&@jN~4p6MPjMTk~b8k<#K5;rj|5!B_~r>z*)>J7a#@z zdj?!C3aiLk`A8-7QGQAJh)KsuMX8jNs+^UoyySSuLy}k5yyi)H$%Ct$ilhqj{eRC4 z23R_g;2kp2|#@DhIh_fUBKltpew>$d6eD=X1!9TjO5QDtZ&vgjcdkT%Jey zq&3C)0`k+=v^QhT@beg+XRSHT8_j**ervyXz&gOsQgQBgj=ZfnM|L&q44xiv9>mjw?wQ?; zwd824O4;oFiXq(VUDpr%itX5)z!kpn#^}c|);89w71(=}`DR$$j#z8P$~W+3dA z-)W1$jJu=Q4$R9DRI}^5XxTO$ccb2N4ZG!-9(of5g4A+rLA~AbE5^HYs8-5aIJwkp z`>u1T-EJ-m(H7zCl5DqD_uO_j;KH&Rj=j9Lb}4?CIN!QqH|x&JuI;#@tcNof+BKU% zzh*bPt^_pkihc948;EWBIJ4qzMWE3xYH~@mgLW+%8lxB}xG6heZc~>5KRu6d;{!PZz8kg6 z@}%DdeJQA#tghRBy;ilm!DiJD1g2%61bZmzt*c=Hu(>mu?ssougK9yw)^1;`yM8rj zR~xn{8$fb`d%5t^Fp@e6EM%&RMBFDzFtEv~&B&c$o# z)jJ*6sdnsO(+{Vwx`D(*jMwlW6}hci+W|Txx;Ob$_~CsW;db1XQ}t>7ZneHqZMm-F zI$_awn>dP9-lK2=IK+V!_EkbM5IMbiap_a5jD~1CYgkb7(U7CxMf`kXhyl3VuKJc* z)>e8)U#a^(rUDY6u`x63gt^fcCIdD7Zifh{QdY(N=!)&sZE@8PbJw=${~bjfNAY{l z&j(&-zEkg<2vF<>C!V=pf7ZS6bZx#_U!U)62b=BId`!&qF*Q~?+oFu_FW~3X6bmXp zpL>_~YiJR8Rx*^}<3EGMRV)<@9gN({d{Nl|TX!;V7c6}&>x?^jr|`CFWt}m{01L`} zQPCAE50+94$IoD27bP?49a;mEpaOF(;S^C_jm~rYp*&5GCg7Kl1j?>*TfIYEPFYpn zQHe8TfhrJEp<1oC>Or;ojvDINw+;M{Rjak8?fca#V@sR>2=Nq>pC^C>xuo{yQZuW> zK+dhK)$*v1Ka{80EaCS<9Z8^IA60t^Q(MLU`Q{}YB3rml#N*8NdILwN0-hIi1^8lo z#^VaZFr&```q`ct?b3ot$XVcdFI*XgdTONL^c8d6rDFtw2`Zx?LHw@mEttpJ9b$TR zvuu85(*=hX#C&BfGwf(==HmAP6i6mJ1nK4Wmf37$Xn@+X>j58L;{LuXZbTyhGs&E2 zwT>Owm@tmHYhJD2pow=o$4%QeZF8g9wu9p)D8M!sguAhDonb5;6AeVW>7!Vpcgr;;qy#=Ke}J8%zPWZ`)vUQ9sBhFEliX0l8>LH&=6bi~Kony?AYYRf(ZXn`p=B+$wyB*s0q%CA4t8fkMx|#&fG}Vn zFtY2U@F~wLF-7pKA((5}{;1q^z`5zriERR8cREeZ5Duc_HUJ4)on2`M=RItkhXd$3 zQds5%v79g;bqI6v%!c`BH^ZF7a;Vet!hAHgq;_JEO!CAJTFxtYWSZBfdsAter^-ES zCnk3B9J-a&-a|{Y^*)Yktkal&$F0%k;Q+XvUlGsKcu!NpBM*kp)<}1`f*Lu#)|*a` z&$aJl!E#ns$^~L%EgNE}8XDEA)UJ>(R;$;$b~CEUSF29D2DV1bOuR(NB9d?-Vt6&T z*^HSU&*NEY!t8GzxliKf7m*YcT`g*wZrq)k6;xBhZ|Fn3jz0dkkfeG4RmIW1t6I97 z#W&~XH*}T;8ApG6%qlopCkF{I#u7oX4AiSE6;x{+a-xX3qBG%?@IOH+HvUVF>C8B@ zkROxIoU;!lQ_gVm3GECdlh*fp2?T#hwZXjVQ> zH*2v({m`f62+(Dj^k}$M6Jz-1`nFk*Pd2eUB7r@E4@@N*r~(N9#hN96xm9mA8D7`N z_Jf2#ku|VBkO;vgP_e97l~XcLMHz5H2?K0_`0=LX3AHw82C6kfjhI6RoDJ$=qIgRo z)arWc=-A$%We}=Ty17YR0WSAwdrCqsaYmW(BEu#n~rG*Ak_|}GMEiGZa{b@&P2LbyCoUa zhFxz0xo1~aA>P{8x*h+x>9=dw+#rFLo;=wugXdVxpij#Mo@s3n^J3uuxyLea)Akc+ z9*h$bB4|q6DaB{SJhM&ak=<=VC??0wX=A3Xb^xHTSWG$B1kzw0e#Jb$VQ#m(m3(uX^U7;nREttG<0#GXwymNW0Js<0uFLaj%3HnfN1jAw2RIJB-xcKmuWUv;`2r* z=|JsDV6pKB<1m289@<$xck4}HcVVEJ00)DG@HsQ1?cfq@M|t zYnmtqDtrV`&2MRarK+`ZfqFaB&)iYzsjeW^In4$+Xw-SqsQXk`=u`W#zK+!BD~)lK zYJJ_&Z)K#;UCyoul8xtJ|LCNGL3C$%UQqHUV=L|Q^4jI|%d27*EyZ~xVSz0%@Hj!b zcQ`?kdb{dLD_A^9?O2w5igFhyA$c86u})98h?60PV3F3b~~{P_UH+Oct$?KVF?Jdzg_r}(ooJSyDH>T zW@V@oSsi3e5NiBGNN68kAKOv;YM^`xyWl9hnXhZt;fWC^Q4KujVc3Clkxj2vPQnmG zKBZ`oSPzX;q;J*QUgz|82r>dDSi9e)F&}m)5&p(TV&!9}P{@dCeAnkSIv)YcflL<0? z1!pg_i<5Vq&LYlaBa2@Szr3R+CsJDxWMY>KVikY#d}UcD3-i9joLHlp;j>lNWA?^;^u`Qa*lhyyzj&zC?a zktZUO?__mIHy!Mfwi7c_k|3l=K%;K`gOtaI|S5gy>Eta2JAEDJpz#>liQ>h~YAp?ul|9SExzBoKXo`Nqg;N7 zYY@GV`;2Mk8^{pNG?W{PDAIplJ*ezJwyh#ZzMmDRTYLZ+6XR2khu@_tw0VFvcbawDY!(dqJ|SW zpbJo7q}xR9<pAMp!82gNvU@=(5x=M?`ip| zf7R!VA2AK1CMthl%T2wfkM)kEsd>)`Ln>1($YkS!EeknMB*jCjt` zcC!79lj*8rx}QNl>mLXp7z@Y6t5u^l!T;l}F(*eY9F0mj9q;R+9~Ap~FtMxom!a(D4}z6cOUM;CH`&U8b)baX zPxjSDNi?E4AdguzFbgn>Mk$^L@{{6?q|GGSyoojjmB(!;*cSiFo2nQcHpHc#)lk%5RAkNCDR zgC_LKVc@;_AJY*^&^;*znmQDCD5!%Yx)8>pImmtbXSDRm{+%i6S|I}-suf^EM0(L({cbK>L`fksLUqkh z4YjC}Njk?o89mTyPS;S5+z$)I-hnjdO^sE{V4V0vCP-p2-^OUr2X+}JQZI(o} zNO+!z;_eZ{jQmC)+T4jbWCD)@vXJ@z{pL>Wr%DVIoKnf#Vl<3I`pkQT{$k@mI;;b! z2qh>;77=MzR58qotC+wi>uY~zX(RnZ14K_|ZU!E2w z4w(1_B;mMh1lKY=&<|1Z7btm*>I!i*KFkPvE6l-}3B(~-=m@+x0{7zVimp4k1C5j0+;0yAO#xWd1_Qd3jQf4Mogk2A+ z)22X&r3_j5y4E|Crn2GgD?^k;!2?armHqZBj5&!XdnfD#AaAZ{1jxBCkPC662-l9mk>Av2SJbot^!t# zS!prP2jpb&>?U}O2Teu>5-3Um&x{w{4k2N>+4gY{#1Kbun#ALj%pd`Hl#9dkEa-W5 zu+_SC`N9VUh_F!-8V0e)L7GqyEtd>)GVCEil!kUY!%o5+ zIZS2gb;BV)tJeGO**Yj1kvR%k*$8iQNDbE>aMc0YWy;K6>Iwn(N^?7k0dWWx(JZnf zv4@cX$Xh~i5Zr^cK4d`-?jl4t0Vu=^!b5BFpIg;x9(7#PYv4o#slsh9O=whPDYNui$}rQ6u6;;6KRks*MbI zP^LW%Ye&5XTMM>V4xH*?$)6gT+dB9S@tv$gdbKJrilpk>}zoZ6j~{ECZVnbMTlEbPY=;dM0AKo1~*(#Bih}oo2D&; zt$b=}4-uX1Hk(9PCPHf%G64r-B66;n7tu;=)qN76X(I&h98*T^!+_^7%lpPIlSD-N!GOPs zZ{smMQ1|&NUmX_(i8qsFK(}1O=`LNxtFo6Ty6hMER-(~({1HdWc+{JQ4u~|#a443F zP#wrQLL{1lG7lc84J+xXenWmvB2~bVeooTZC0nx}21zYCBp|lUNY~=1E_h6I17N^v zD&`_{zZ*|gPU8H6cqn3=pcaboCea`IC9&o8E(@ZjyCJV|QD|7y>6#=p18oRmjJUlU zd;1e;L?5xXn&L!1iL3wr3_*bj+StQ*|L&o$#BR?uV0CXCfbAVZIO%1?Qt8&xvGRaA zBfowob^M>e85$8J;W%bdjb`yRI<+`liaugSrrHdh&^Xe(gg!or=DM<@kx*ejI|~vq zO)73*-_^*pgg2dTlxubY!wi(uVXcc+HNXp_iLiy!9#INkZcLrJSOhRbiIiBlVz1$b z1-Xwvk9=9hv#;WE7C_-HvGfw-5MwaNb1}FcS8GERs6iFrQK&i1ClV|Itc5R1*exg% zkUBvZcVswd7SFA|k<4uA;>ybM(%L{|vEUh4dLOyN&R9rH##kguJ}xB$tuQhy{v%bH zHatO7Z}t)?n`*5nF7(Z*K(qJ68w1=56d$_+t$Jn4_JVA;k zMPz#iQ~apH6OIr4x#5ewG+q%uKGHYAf_r1I!K9v)yQA&o@p{FKt_0flVO80|%PGAa z0!s)EApotx->mHv-Y9J0MGN%O`>YL7nCT82+ic6JeS!j*2wOw*BGP~-I){rHcA zP?3XAJM&G&$$uLbPcQl0ae+N$oJF@6Kt#PW9q0NpaZZ+9|8uU7OYeuyIvX5mJkX!To|Jffv$wK46Tn>&xO;H> z1BpBIGHD)fDO(Ea{uFf&1rKj%Usbp9lFklZAi{n>(#QIe{hoVcZVLg!;8C=>5}k=f zV7$kuJ;i+Vbd;X_`QX^#yhJr+Zg(p9*q)jvxaNFtd{4~@u6Zq}q-q`+ z!u%s6A`a1{-c0x}L~9bLWM0FllTcZJ%UhH`@iqG)h{IRzNj0!P+Slx3Yb(-S{K_7; zE?zex%V`B7_~-C1PEnFXIoP1;(Mw?gyeB6vxUH*r5lSPkEMFZKD`?)Eir)W<@4}ir zyJB8KkPqmKU+Fjw-OhH(NfUk-BYp(}rUzVe@;wb89apLF>IKCG<&k1zl9V(bfq0XB zCzW$}do3r!qtbb-ueY6TRvyR?j2I7eyl@JWplA$rtdd72lHa7{w<-AoCFD8} zvy95H7}4LV-L1Ky@!H^h$2=&sjd#w(Z&9D~)F%(0312GwJ$f3WJAUlo3+LhsotG|N zyii>`|H|^kSJ!}rE?z8R(^>oy_dtQv;6nraJ5uJwOH`NHbZ>^4rrSbzj$XgRWmbTX zeeYt5+7$V6D4FC?+{3Zun}kC+Vc6{@$c-hoDLF_ zWm&`IAfS8&ajY7@fXOc%3fc?2UqM=;Y&A}u$%`45s?qs<87CB`Fzu4~I+F6flx_9n zs6%{?V5qJnUZsq zd=^PKl|HJg=dES&X)2yh7oWL+7dGWR=2JhCqj4~HLpDO9yn!+JqjZs{Bzpx)DDj9bRhYODvK4CmoI8re1D{1>@?h5Kz zKFiAq^KHLEJ}q$rg^089y9d@xBv>nMOdUR-Vo3!$nu@=sgpcdrP>wkUQw!4wlM$Io z;x8%T1J5KgL63ih#F~xAAZ8R_Cn{0(Bvntv)kD;4731P=P;ZK9YW|0mP?TaYZK|vg zGu`G};kd;No*~HmqI>Wj7R-@%j#!80?#2k_6R#JWrFHE^j zUzjMN%T=OVL+HcxIrtbNLRm-U!_@o{N*<-;F-jh%&rBI-I07MA) nsl^YkTRjC=#F-{}pZji-Ol23ZHW+dTD=ec1ek{>^g=6s6bZO<$UdXZ{GX8 zk69%P3uO=2!asfzK6%sgKBvyftBB5zaGM8s2=Bfpd{Kz}Ug3Vh_e4>YKJo4s#Z@sQ zW;7TEH2@9Mtnoeiv`TgV$Ef-h}IlhuZh>ux+t!QH?XQKF0{PrwMTz0 zYxz-M8f)r2RpsBDxXR_-t}?8bh<+rQ>ZOtF$=DiZyOMpFzr|K}?$pcWW|*Wyt@gXN z$(F(@yK()U8>~HKAILbCwu|M;KB||SkqTvOWRtC?JnYIFHD;t_TX)trwp$yllW4Hh zk_lL_e1QK z#{xpe0xi}IBW_GH$al|f<&Bj9I$*e(Dc8Kmdf0O!n)$EW7bz{4gVQ7emb4$r5NZp8 zA8+giK@E+&JG*!8Znv_|=EmxJ*4nw-$`|b18#h*W*EVSunhS#UjjfH{jR3-&kfpDq zCcF3H){96n^`hH~fjyJdLiIeVvUL@@rXJQN=rhuJ=WVMu`X(4t`zr!FS~iJ@W# z7=TO<8I-Ex{fQ{2^f@iK;FiB2_gco=siC7Hxg4njIgudK@K~_1KPjx8ewNNj+RfeF9k!V*o3I%uxEKNK zx%&u{z@ud{4iiBT0_qYjGQbkdg20h>?}28>W7d{%*&EAl2=hx7TH)lV zIXNIfm3-&sbC=XuB}`(A$hT*QsjT3YV`OP?c=t=aUSnb3*rd0Y+uBJm=t@LAXesBk z>^NZ?h`&5{nh8@OJ1Qm>kj3*C7`-q?^S(NivD={wUO_O;5o9?N@MPyDV}lbRp3&t( zsLbP8F64waoEx(f|0RV^#SGrJ-DzLJKo%kht%WZB{*jQKl$UBWSr;ZHRt5`in z&#InG`jk|TgV1I&U_Blqm`DhXxD3JruIxlAIOd_$6YronGTA^|BFRVw6=fi*F-|J( z08G|}4+MEFJI!DTv||KjmWxnh8eTV{laE%}t-NJcf^46;{LUZ~@g03~GzUgUB~KMR ziju*emO^Q8n|7kxNfJpO*V%^CTSF-0^oK;z$a6%4l0pOdps_=#ppm731|RaJZXlMyc$^V`Y`#YEdeBv27d~xJhggSsokRx1$g@~HkSwD#F%Lxq zVwpjqV%Y9hi-l5K)lnh0GB|Ecv)63-7|b&Hk(<8v6Yn-sx%Ws`tb|7@@WP` z?1z(ydcI<*0)HS`yVjF|PtyHH;=!q#U;pKb8?F{cGgmY%8lkN3%KGYDpI{p{WQR%^VE4-Z!J!yiU~@Xo?>HzS*$7w2`WG z*y=s8sp72P=wb}NzdZV%ec)99_89q|NH-OW7|{pFYzb# zRR4Z)4G)W>!jac0h{BPt{H*FlO*{RD9Ridk3jYln>+Rl5U5>=&$)Mdz?3*{V5zYhDIcCM=!`x$OS z4m5x1imz!Tq|iCOXofn5FXm2i(Af*!)^f&22KsYm8Q=;9+?ZWk&^P2k4 zOw0NbW|4sZdJ;GHzJ|>Ue|`+PtRz|HR4P zPvV45bYBOU7yV9mj*xNz=dG}Nj1~PBY=1g4eFtN|qw#OkgL==bO!OjVQR4k`T*GI_ z{8x;PbELo-AtPy}i^^xF_3uI`$XS#3Z? zwk!W!{&zv!d8AXkBXGh#?({~r`DpG|_WzF+_@!s4bSQcA<+)<{`rPHY`SK$D%`g5J DZ6>)9 literal 0 HcmV?d00001 diff --git a/_vendor/requests/__pycache__/auth.cpython-310.pyc b/_vendor/requests/__pycache__/auth.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..4b28362644f70812603fe6f248aad7e35dcbe050 GIT binary patch literal 8079 zcmdT}&5s*ba_?_8dq~drhd!)r&3bLqJ0F%-k{v~|rIoancWp|L#&MQ`)9K;snQ0E$ zO}%bP8m74cG74g6;lK&7hmB!?0|W@>mRtUZa>5URAxS>abX}B>alM`J>vuy)H?=rOLsdhRQWO(Z2#PsVXso$ z#9OVZ;;mIR@z$%lcpFs%Z?%zYnpIPln8x%*zG+o0Q8pSQ%|f-%ELMxnQne)7a*fgE zSanR4&Bl0hqB?J%Gcg(p&V`hAHNS?P(yO4~|x2DMQ(hT51nv#nNVQ6Fa$ zs84vasL!E3$)-@B68$Hba$hP>cRsba_n_@XakS*N;|=Q<2Y;5evf)Q|Gi2?CXV=0Y zcKsl-;|CeJ7wSVkJe$Bp)6S6aAE_ME;5(bM|#coF)58S2~*^m52!wy2b5eDlXw^uzo zYPVV;k3DAl!QMIAKU#VVfBSC3!}*XLJoI=h#2{R)d$ri!3fr$g^z4=!McLFh{`@TO zmhCtMIsIiJ7^_<`R_)Kh0whR*=W=_k4ca|1{9))byT!xRhS!XiaJnW$%v%rn*3c$s zsYfAa{~tDy8Vv|~aIRxyC-aO{;BvW`T7Cq5irt{*aUE@``N-t~q(4eEDy0TVrW>ad zH@z13GF|&58^R5mpv7A)FEuim=47TgiEygbLqAA$VtosWWe(0fH3y7KbELu;uq*Ks znDYF>a@=e!xBS*(?DBOlUcB(Yzvw;uQEj>5uP(Q?;*Bs^9vF*dn!ME7N=F^&tY34e zPKr#Zq6GlU(qu(8R6O69IZL6MHK?hUY$=wkDO0lXLeuyuOsL@*`q4(N;dwR(;7KsH z5*b<;S%s-EfEv>v`Fd)Sq=U0w=K?{y)_`n4w%piuA>Txq?KfMHCm1YYt|A*Y0+z>K z<6(11=V?uPgwC5N#4z>S@?XkjrP4V~3)vemKd_1IC?Z&v8=AaWZp^ za=~#PwB1I(C+9dUtT_&!2c`pS(TQ+ckiPB8T9a3fL)c_RNiYiz?#7^_<{D8n~1mOBfoQxO0K;UfxFV&_pdOySy6#z(^OvThpv!HV7so@#=5v#7@;imy$ zwSBKkp(9s^bwqTCD|}c-+?QwwVITacJm59|160U%O$v;QL!9M*h|ZTXag92! z0%WSNN9w*|;@_tsLNfM&ur%+YgE+uRDfpm<^8RnYkLWJizMYL>Bd|3lE3hKoc~)Yh zcw20YjpIGSCLl$VX^B+eroRqtXBtPpMapcRUhp1K1|;AmuzggTY= z1M-`XH#po>@^bY?2x&}U<`g# z9*9G96O~N$aIGo02gyLm4lY#jRvBDc)HPoiGDm0G+vvY@v>|%RdL`A!BCezo7aqL{ zwR9t4x_*pB_zi&6!c`nQK?nyY9T6{h@9iK?wb}-@t+v7_Ee7qTbK$LX;xdfNa%QfF z1uC5u*0<&H0i)nG#a@gxBDw<#iYX8N1zCIEdG!!yj-5VquaFBef`?cY{X3)+i~uW` zd_w9HbEvGKObkM~2bRHK*Y|4Vy(0qX_vxtRnDM!k7|dux23W3Z23lf}WOU8MWVuZx zx`em6sqm{T&#Wg>H=pD`mjWBDBWS&yNqE;vEVNFewS?CDS(w)yNk-6Wp>-UspRx%y z2@Hj#@VWHY(wfYs*z^;#Tl`EC>-)^W!5Q6BtR=XCx}(WxU2jEfraOj`!T%x|W3yEH zO8Q!PTSBW;&wVAaxkMFEs+;K1yW@#0>SL&>-HFenWE|Kg@t(kYD#^H$2SvNY3r(t9 z?8Mu+upKMV*a>QLEWss?8g>d?n@MI8Eh~c#)Z${Vv?C3*jP}OZ z=^dH+wu_R3$;8O`?j`g_ndDd^P%oTWVwy@?)ulN6K5Bx|3d-E1q} zxnMrg*_ln{OF1&xnMChRvG48352Y_X)v$NP6 zadBR7@%sY9s|k3=evr%ozV`J<_hga-_V<#L?Dd4kzV@|>eVt4UwEh&WZzMRAz19+1 zKSpagDII9l(ON_6n+Z|(!vy=p44v?>h2$itq!@9r^NMBnf0sE04wor5+iOd8SfxfY z)iZrnAB3$m?=}#6`SC_GHNuvQOhF}8Ke~CbV*)JRzjgn9?KoQ_e3E%+k_d5OX*doY zDuW;x0Wv~j3Y>fT4lK#8QhBboF%A&D^LLmkTwDYha!Kx7IAjY}+kS%~TR>MsKVPtPMHt@b-K7DNRK0)u z`b+o5?-8N2%OgbdkBM?E+HlYDPiWL16F6kfOmquce@&g_N_{&j2h%$_P`P;i;-&9S zsR3L-@N!y5vH^nJojr2j{x(cKfFYy!;<@wxH;RGaf2J4%1jW1Gnc@M4BYrG7mL#6h z1OP0I1Z|VaF2aUn9_(}ZvN-XwlFCskGstTmm*a+@D3gUO^tjS+o2$%y_n!$Jc|;T6 zQV<3Rp3BS6<@dPox#$L~s&BpXn6IGpl%m+DbV;U~3%~lgywEW&Q|WTY8l(lT&UdW& z1zYHUzbuRZ$|l;|+()S>MntVJh`g)w&t=S6urs4Ty$gu8`?i8mEZCWbp*+4|!mjV|f*XGDihE1WH{8Ji8s)_svl7w;j6t}5nG(ChJELD*tUp&kWk;kh7VQPvQ?Z zOEr}lO_8-1$nm^TUKrXK+|t1_18kl7|J_OqsTYYZslm@^7ZkB0G?aKA>P23uLOE-Z zw^lpldtT(l_K@$0%p`nEBr=hZ<{tBrF+*CL6VeKjU?YCy44N}Z`zd!EZIOhTL{)5Y9+xNC4)T;#X;bDSOxc8C z31p=EGnX9EF+2)vA2G7lmibwX*6MnXd`-0NU?f^{$Q2_Sv!irXmP^!Len)yJ@n4ED z3Vh6d8U7gjR^g8+u~i>o$ScLq3*DpT3W7qDf5>7&4o4-v>lkMBrg zEv+{JA6AdyMb)Q>8a&h6D*E)^47CZGq~0vbb9hedD1bRupa{QyvVJPj*JK13%0J3~ zOFpwvKizvJfonh*62pO)jAK5q`*N`p?s+LI?j{mR`%xO{3Rxr@8g3)qiO$UMERwld zu>Ccpm_6pPC2J4I!220wGnXJt0?FP8|4W>V|DOPv_;kkT69QrE$KxKSP%1UDwVsmD zc5+$8Mk-KWYq;wOW?+R#Ci!Lbm(Qdl6t=V@1VKnZ3S&ni$Uh)d(0cJ92D%=yEy@~t zoBRrOx2PMD;v@hL>6&ykEI<@79g$_iyn$4N{}_Di`(>W1tF%wDejd zj64KfVQY)iU4Ud_{|id0a`#a>ip(;sls9PQpV69I1UfX_0;T|(gwH%gRKVbt`B997 zd}`n;3mVEfVL&;l5dRyRV?-h$i~tYGYmF9273W9-%j)Y1g1`U3ERk)T%bPG*Fgc`DGC)cD?LU_S`4K4z6c}n#*ue*( zy;_lKeSt2CB$rkZ5|Nq%=@n8|9_3^eGQkiR+wf6j((v~fg1oU55)vESUv0;p zNI0iO?yci|5Gqrqn*S4F{3QV)YA;Kfoq?!Fl$e9%hlN)Jy9>JVP07G*0A?SPY{>Fx zN7zgjj@Zl>2`mvup=z;Z0AYKE~2wDedsK+1m}?j=q$womk8sVduWeafO2@3 zX@Pf8IA#ILR94D`muCXSiHLI$Ocd;#rzQ7Og!_9ECAypWdjOkwqA7rWcF-^_Gca{? z(VQxnVnq35mUE<-fj=bhD+1RDP;!Hp08)c4|4SFLFFT`1MB{J+w*ha`Z$#pw4_pVB z1UD96kupz+PJt|i_*R-JKEf=TAS}h{8+R%zw<;^n%FplKa(;5>-bc>I_ddK;xpC*_ zt()oWQ13?{f4K62bNBka74e})d@~S9PLbIY8#!>Udptm1{9&f7XSbN literal 0 HcmV?d00001 diff --git a/_vendor/requests/__pycache__/certs.cpython-310.pyc b/_vendor/requests/__pycache__/certs.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..8bce5a22647b333bc0714e39dcc3b37c5550cd3c GIT binary patch literal 584 zcmY*X!EV$r5OvaBb>*^L_<=dHXqz0MH-tb)NJxl7sW|i!dE-f9HL=~XUC5M!&s zdfB50$V4R;d%0XvjXb}i~ zAnm|62$rxyB9tJp5~20*_6>{>s#2x!2)m$Viy53XNC?VtquU;gM)>jVc7hns6`5{I z=2ozxybv{JoWHN2HvvTK-WQdw;dI`13z*f}7Aiv^;DgfPD@f%$sa^2OXqf7q&=E^= z)K`j(?oj*f1X>CWWg~Qr)9^?^X|?aG;LEu2(+zktGmaA+T0xOk+w*xtITD^p@?Y`k z*(Mp5Q}3`UicTn96dyOs;jk#ADT`t_oH^2{*my^a4r6_3Nojw_Xcg;I_aEQ}iqP7sbBz$-mH-c9v2ag#^!@Ih+|TcXn2EyO9G|_pkT)9}UO(+ZxMP2*xXT z)O*))3I{n?&B84_>LT|Shj#-9d$XIaWA9q`k^8H|-OITZpa2J_4b;RCwe1xCnTJ{n z9sm!E25Mi0b!3D(MH99E&-!X9YX^1aS#evw0q+)#Sd3!V;dVAH+L>FxL)v9M)T?LH zrhT@8R@f?9Wou}y)*^a?ts|H*_;%<9+eDi+kLecMM%y*-(p&5{y3Kab4!eWyu)F9k zyNB+v1SRY~y3Zb<2kaqw$R43bwSSL(!5*W>>NGdGSks-pI=e*Zc0?bL{U+kloDSM zQ7Jl0rWr3NE)v2@A$2m3CSyX0o+U&nNE(f?zQmX(KhN}3@MJH6n2*N(FgehP#4ICR zB@-c&ah9K5X0lMx=gBIr2~G4ACmes!3Cm8w`2tHt1RqA%cGJAQ_5iPafS=wCT+@GZ zeDwA;&P9QLlu}5LI!Cg=5*M#Yt_Qvef5<4!#uS^@VOExepP1fZrLD5CA*P)RaYpcI zW)n0Ig;baV3y-ygfPbVXTdyEmv#P>6~sK~VG@`_I`CaO=V=e1hfN{N0f+ZE6eud^6Il9F?Tp)tQ8y zu>10ye2p*m^AY^nsI0qf^s%u=^KKfJGZTJ0@8j>_NOjcr0Dgd`Tzg?m+$Ta@#p-5ubV3is5kE)LcK%5k=??|QCuJP7jV50%xoSDoLzh6xPQby zidHB5WBzgcp7c-nC-HmAcl~?(d(q21{%QX{+_~4ct{AoV4t~9&f*buHilcfn46nC> zsPcmof0fFmu+#J6)>^CGinrZn=m%~bx@&>!t+nN}9|i8JZr^UL)h|g;pY+tKyVZ)X zx%n$9!?*S0Ry%TAonENo$X!=q$GsM)V9|}F=ccEE^?qBoPixgHe-B0(%YSd8teMGt z95%Wb*Ug|2#j4fas1=ja z3z}e5e60npb>l#-d(8l6Zm9e~@g>brDb#6iOP3w5>us=C3YFUn+pQ*qYte1hgZiTD z2k4>G>IUxCwIBxLF}Sp9)9X^Sq99&$H^AF2-Wf=je%SF^-N+5sc`K7D*X#Ont=o^x zC{(SDR@ZCiHN&+{4A8|4RN(m+!ft!JuIJuv1>N*P)C;>&i-Nr#Dh#UKMjMEb41w?M z23rtS53`Qkn=KG^BZwQg*+_4mudT|Mgi1XXurUYNaUqK;?5UO)2YmBOVP87M%{9pC zw!7tF5YnBVOWNZq>9r1G`5;U?+^S2frUk*w{&>#g5{}44v19HS4WnhCG-GSW*fcf^ zyXK~i>!NR5G2S$nYo)|$sH8eNc2!2(qyRBVN>LMI4iY=w?gcd~v9YYylX5CwZyM?_ zs=oc9i*cuSvDfNdh&=^DTzKS0>x03~4>T`A&Mx-0<7;8}VkVOp^|YdTZ#!`sjaIi6 zHyZb&o2Z1MWR}b$=HSSPXxFn!O)mNDkLNr%*|*q|)4O6QYWte04&vucQ_bT?#;A)0 zTqX`##rd4a)mtQ3Y2t-hg*`9KsXK>OF<)tJTA*kld$BFFQwQ)^&7w$3-5_pw2AFl2DavUX<#sXHZv0cFY_c8y(rO%5szZ%KpaWiuBcEx^2mb3i4~+ z!N1{}8;dWv_eyR(&k(8l1y?#61GfeVROV6iJPlkDFVwl4!dq$aS0}5FTuI-wy znKf&0S!+1xJ{Oa8yP?|-Hd=A31C{U6OQKB?8`^={3;hqfp6|P@*j@9Q*WK2-yB+pj zsCwTGyFq>M*d=W~GjkJN3;S(a0XBm<5bp}75C|3cEt=oJPp5Uhh84509LAsM^x9D5 zu-X2{lnPZQ?}h8Zc2c-A-cFafN zWT%{isuD@kOHZ?^h@oI*PH4*G`%I5&N8N*BaQ~=i?NfW-MW>FkA6gFeK^9Y290g&- zz`w|fCs2&9w~1PNUYW^^x|i)!V@3Tx^`+I(HNJvcZ?U~&jVqSXO5fQF@7wQ%2Pdq< z_p{=MQH;-WqSkltQgwQtSE_S(u$I4Oew2^Y#hOM7bQP#+8jYmVXmmoq-{yI>(YVp~ z+Ub*Wqv40mMnfH8f5%yfEtKijcqx>o$x{!qc!b6Gu=rjSi9^pUQ1P}};=M;%aCjr) zD1u2hLd~GyE20NbI8eOK0jKB`#dj8D zz%b4vRZS{!RfEB|a_9eA9QPQ2J#+QyvzLP?f(Jg$|F2_}w7TmdOxbGcFW2k!t!rNV zQTItNYBjxfdwbD^&mTf%(dU&I$#>ar?)ys2#)na$V2+$4{@|L$f5>2eKKPV`~ z5FwgKznyn;Ww}bI{2O8zp_?}_9GV&sM=0l_pG5zjr}dZ32!9Tkx@6h*9Ub_) zySF3iiRyH!rm%&Td@4HW(AXRJY>(wHpfbCQ=p)m{-ZppOxdEog^fRXP6rLp&D7Do1 zs72fuSq`!ip2odbaLDxL&B5`pmk%2+*UIWKw*Lr=kFt22g{)S3Fp52m^gdi{PvXG_ zj)<}#i>>68s|CgTV|J&A8+4&$W?b3u(&3TrT8iGK8C3{*AQpnHzEy||ytirN9A4_} z;*PyjxMP6=ghdL2fBe`hvGNcrQohruMS~Q)kx4oO;n4M5ZKXfysZ`=pY1{PFQreh{ zGOy*H?}jnL$R<~)Y9a9R+%zDM@=7(4wX~-+fLd~~WZiJ9n?k7wm*bMF zgZ>YQR(LL5q@xXz!)avTwGkWWR*VkIaACYSR_fy*rYJBWdQ#{_8_B^yQ>c+r2iQvi z6IO>%H*vCVk^+X#A{ybXgkr}g+BX2^p#2V-3#aGHP^(tenm5&FaBob83%J4K5-YnX zz-e+7eg-7jq9pHFx2-$I?E)hbaMT)X3T>WMFdx7zfH8~&<0%8vRqkpqDTTNq0t4b_ zt)^T+I1WXzOb1P)CrdCJyvJ-D_3ycq}XSF^wxL?aRxZqFeu_r884r^Rop3Vf>hTFs(Qob z;^>>|7~HesChr}?JrE4{+?@jMS-9uoo_(8FChy=d)(a#s@1xJ^XA8HiTZLQD(YMhf z+L?C>cv@#51F~O#z6&IW$dsOiySDApWH0h0_08Ro<^wjz%@7_!I*i$(l)~D;X{vIW zHQRxw&ewn@Meb+LcWc^=EZ2(KlPu|e)cu%!QUarcuAda85yU!$0x7Hv5tMk6Qneyg z7*s_`Nso7uAxBlv!EiI4tZj>H^0VkCqV~0mjtQf09!`%F<{Tv0zN_fLHF1pnG5UKP zhv?yP^G_|5Ea(|u3cKro&tmc32fuWcIH?PK)Qz`@x(R9vMdihACkRrNrCI>kTAmxh zdJUi- z0-o!lm&5*h{WJJokUIDK-}Sn)azxJ0`VZjzD0(^PpU3!);jHGr4`;{y_xp=zbHcyi z*YSJOzvw@R-&6iW{=@ja=kqXREB8VMKA0TZV;Q{Pwy?U#A^El!MIYvB$ky4I!NFqd z$EiEVDn5isG*u4drt9pgpu0qQgP~D#w_pO{Pa%RGS+fjeQ-z2wv0fusvlgIJkwod; z54-2$R5G?1&;s0Vb)kKuu!AlIbB){%yhQC8=5{sPieSIeQ`&capB`kt$E^dIi%ZuX z8v%HGI+2WM5a57ecr3v;r^UI`Zs!0t&fxR4w?V%6T;y){qnHk*ytg?a?Uwk=D%j|^JvHR)B6tOvX;OM9 zJiS))Iy5WvU)r=@2PUn$@Pe0?gmNIUr@+gc-okBBM%_?#NJl8-hibxA=!OyH+@yb& z{qda8$t4^T{0tlz5W4z>9s5q;*&T6YIWvqh4N4DG-km%5Br0+D?d zC*m`}Z6^RuX5Ge)=^gzGufVszU~{ii+-xf@!1cZlATVI^TXuH_&@Y^`bqkvkgQgVUjR;z?qZc9SAc?lyQQP9(;{zVSLk3 z1di<=I0Z^TwKO=kclxX{HuX_qQR`?2kN>BK(u3v0_4<$$`;Z~${T>SZx0pXZ z`$^WTHs=$vm7rF`_7Dw4#8rfW9A77ZcI} zVsfx_cG)H z*d1lsf&t#(p1nlNYmd=wnxOp4P*A2*B$tyt#K?(|PoGMH4r#bW*N%w|7qXNc0=w?& zst*V1{GRdFR(0Nj1cP~RH@$AF-S%9)m7luX>n=#@YM%7Gmdf02GG>hWBb3)7G^(Xx zF-0JVyC9Op%l?TW7jJhs$#wbjw%z(hR7I6Ut#H3OdBQ^_|2+-e-dDB!2 zJJ_`5l^`0W9by*d;NjzJ;W<9K|%neAw7fuE0sNUWLWJZ|{Uh8|^!972)le%Y*MS7eQGvY=AQX zASHV8ezaGd32w+tic)pzJSs9Id43wRP(*~Msm@`wea9Vf=VgpvM>W3$mpYnq&QPEh zq1ti&`AEj7*@K(UrH;o{)klhwWDBK;$)uA$I`drQv*u63=Lp;oELU5tD2s_G;~C<& z7KZJ-+49w=RZOb&Sxi`$`RvUZyU$Xp=`Gl$DjhXod0_XMz3iTBxW_@yL_H#e-ZFq~ zXQF-zz#pX0^d#C zH#nSq?jX~Z+ds5|H_5#XgsK>qVGa6D96Tbx(k!WzSj039s9l{0o9hF-iL|+1&auB z1Ey^uLg>a!h{LWYAv4*a!M@ZCo-m@v?IFtcIaGLpgO?x>!d8{RPtz}>9q$=7hkOZ# z^rJ&|0ocvK-KQ{39hNs5m^SrtqXFBl)96MsNCimIrYXfwu3l3xS2_2BSDJxD@Dr<- zNF)462;ndgm(D0mb@vm5I01t;y(n1BJ7d}f)wbZ2K$@6|7`qrD#+GV$#%JRjhW~?* z-Bd4UT$o(_2SzCJadLqYP$>^i?_KUAHOE#u37@ZYD&!O|K{kvIxv^&dYLo>C>@*Ah zml!~BvCVB&ZdYkHT?1MmILSY%N;6L6JP?lL7~D7~FwiNSpql01a?Ml$>H6I)CbTN( znoslDjIQ&=>2%F&?l07Hc!!2Ic864LKNYl*u8Qer)7ELJo=m&$>dlGORZWvI;B|HN z+)$`jSEueBAYBxj@OrX(x&j^0Z<#V(KY(Y#h4o@K-8p;ubn}{H)1?UUIEW)!MuF)f zq?c{dQ#?Zw9}pd-&ynn$pWB4l?_m2B38lqdV-w!e2JoD(n9niIR1h6vILk=|048#} zxh~%}&kU^3o=FSx@s zvKZ<#R(+XdVC9Ns-No^rm4fvj^F^d`O$pr~0V%99MiVYA?wIj6T0%jZ#7ytB)X^OR z9~IeJEW|eVxbA3g(Gi>rl(-E_(0@z;ktd$-`NZm=bFgIKQfaI=4Q#c$?g5cz((@&O ze?CblQHfy`{mISp28N+HsAMLuB(zEFX4u;nS|z2vyejw5q*HCcUS<0sslI^Ab&`te zziK(KUH0Ai!n9CN_c^wuNVJwP;3XWO)-uzx?U)+eME4vA1WC)h?0GV{exi zWw-aST4^K-&%HCPG?8jvz~ZlQQ@wc0 zhSzPYhY5nmC9DRn2`Czr#gR2p^8OXmc@m2pA-uQ=4Q&e2xP6sh4&YpZd{I8@{jRvR zgiW!v)eW%Eo-+b#%69`qIQRksZWV&rY`OhEl0*-2TjYK!-82CmGK7(vFWeSH5?s2+ z$aTJ?bOWt&FOBZIOIs>!z4e|&WvSj7T6uP(_u{>{c}=fWqLSHK#0FWq^mvy`DCfx1 zJ1?BU16TKby|yu2Sc|UuamcFr2^L>M0b?S8(8QvVh(W+mSy`o#ZH9bhB~BdbV0cI*~-e5G+6krnbx8LA;}`Z2sODfGf# zx^;k{D~3&<^v4i`Vads(M&lPr3F-{&w_w)OBdcNcF%M*Hvgh;3W_|^y4z%iUY~3#0 z0U;VtAy?8=HT6@du6`N?L*Ad^1&w_&1M>rC9o8Z#KKE%%Q0l0kV}%JX8q9T+5@BGw6kJt#FJ9LdeL{Tth-pdM1Dyut@F{!PL>W(NP7~ z=U$Nl{GCW#&K?=@0Vro2^E3b7Hc>+HYiYELn39S}<$MW(S8d zHa9fNKRc4VOu%aoq$6j1sb%|Fe(AOibqabi*MVxbj!gV=HpVFsy!u6S{W}~K1)*e3 z^Iai1X%Dr+^71mi5m~OCo|tGXYx_&$d_$So{EsTPz3@sMlER zvUr`v8Vkyl`bicN_H^$RaW61i!krEa1uR&g1MZP zLr&FMaAq7QJ$U9+W~&F0Ks|#z&r)@!;#7_}r=7A>nlDQaV_cz*;Hncn!GLDR@Qprv zXXdifT1#kiQ18g$j)@FG$ez|Bcfe3djiZBa-Y&?~%)v(pL?mokrU=QC07jqW^3|Gt%6@U34k2G2Oibe)%1GyQS{^E>UPne<7U5qFs(74);NUg(q`E|JQ4^l z4E`)l)lNNgokr2+XOnqOnq+13Q_##~e=<)Bq~>Pcc}w<;S83Yx_Qb0All-z6aJ>Fd zR1gkUPc7@Yb7E6zU?qJsgj){RXB+UOeCzC<7xxG%hM7qCItM-iy(TzBo_j{{H9hDv z>7KIU+Fw?mNBOpS@#(9H^9(ZWKZEZ_YqLoiT{BZeXA{aEz0K65VLAZ5r3{*V6(nWA zPe3puYzwp^B$)e287W2tG?N4A3BNB(Y}APn7_T=Ue(1sP9Xvdi9ssapg9%Mtoi&9) zW0wVaMi_hw(?(0KdJ|(!<~WWa>RZUUolo6?w0cj-oem#PHYz#nlhvxx}yPS)9Q#UEmGzH=1l(!VHlxla$vyUjls5 z6jF$$@KEVbxK19%iB-0cPdWJy;Hz1BYkuCwZxx2BV$YlNSVbr;#rAvj1VInc6W_uK zym_o7-#Tfi2L^MoXofplW8mJdc^tot7P zk2^*5^C7>4uNv*!Md*=|zK8XN6^8AnGOo)fjTm`O{M|Kup3R)ZT84R_!8z6+{+j@N zJ;}9(wd_dUSy^KSzKk^dxsyikWo9paVHTR{(BMgUs1QED^7tNtDJ5xEH>}S{UOJ4b z;KU3Zxk!keUcY!#)>eIaQ0{oIT)>ASgPHVX$sNqQ9j3uybum+J19=p`28s<%p7j>p zv;Kv%YZuPGFnjDvsc`YU%sk-9nYU0O1%0NTqh1cvfx+N>g%{vzsiCusWvP1 z)o<{|H&}?v$#-Zuxu0j0VD+0UXfkvcB0%h?b|5KWZ1_4Et2e2pa*CJvS} z047f*C05wzBo3lzK+5=Fk)ok~j|F8*WD?F_NhjsVM3Y%oYyf8iFtx|+Q>$q9kC|-R z_yp84?}Y>&;bs6lzhjh3Mw&#}q0?FNijGDF5-aVmj)A*W@_DHF94_>>jgoBv5mRPm zpQF-$9nYSkXhIBuOdW=Dx1xLb`2sw|2Vlhbxi|8?cWelbDEAvj#E{wEC5&17E5tH$ zS3HHJs6{S{ZWSa-?}ntIUs1W3m zHtI#(OJ;J?C3Cc?k?s_|>y;-OSPH7)WMRt7XE-=kab`;RL}L!FiwHl0J@u!!J?6fU zG!BkSI3hZmbjdWf8dac7@!7^}bX3gP2HJW;as;82@v(T}7HWzMmtnCVmL$;>ZGBOm zLN%ASm$Yi;x_G%PNG(42p<8p~;!9GC3K|O29{lAKkSjeUk=A^6l1iqsd^Kzf;r}x5 zhf8GIG7t&AGz4(h!_@Lsql25dn_ zKC%3sMo2{Ft3O6jn;Bxu>PLC^4^bpGBVS>k4j<>9z=uCAq>ZOql|cX`Ok@Z?i$JGH zTh!v!>WcF_Av?1&mMqA=k5c2JmueZGNI+_Ar~0pAxQo?)rvzC@RkZ%yw$-1blKKh@ z+3`HB9_RTtS%~-j2RKU(;(w3O5O72OCmH$fpC4^-pHb2*6_u)XL8w|4rBJ=Wwg>P< zH2fkl7b^$-ey6kD$fM=qcTV!%k$hhx$(%{`xqg>+L7N%DPlSH5>b}a}#j>pOjO##8 zWJnY_lU3zBs=s3W2o$pRaBM6l#sF38UZ5vckb?x7v*(_5jym&|1M>?<1RH^c<$k@h)8F)T_jDtuRx1`h z)qj8G{y1q_KN1-Ji~-!lSN+SjEN(R{Zu4B*?&KPI+v0g%XcszTjiPP+&f;Ud_`>2v zQF@+llz~gU3|tmv;Bnw_UIDI%aZ!9;XpBK}fKNa&VMgSDt9%l8(%=g46t4l-Lrh2$6{mw6qMx_Rd~@G`#we8u1sz#sCD zfIku^q2m|paI{z4wkHsmBSmeLhu$DgQKdMOaBos=kx_IV_uJ!_7 zRla%qQ>kpWJjFTz58Hydfv+9US4_7AQ$n*~o2|zaooBCRs#ks@|5>sJ~aG295NVZ-Bc+-~H*wYK4RJpZEHD12)bti~AD zQW(@?2Dg)i^fxzKLJGF$DCYRg>1=sBVGycU1i{|{dDji46rAm~JS?u|_`L1;JFFLk zvcm9*ZB#eFCH~2$fE)Tw;j8|L%YN=}CMtf&eVyOW?^{jVNb)@QLk=jnkGs&83;Wh? zPAzDR;rZt|gY8{2LKmJ}yJP#dhq?Y?e{UnQa0n>Sx#ixV_A2)%U!Q~S!0aQm#;nX zu8XHv-Q~8owcPFLR^Ttk4Akx007x9fS54qDkt^Dh_PkxO=j{HG^~lN6b=OmB zMWX3D9nowKD$Qo(sJNeKHlKt}JAP7XHhJJSn?}c=8Z&l9yA2uXj4rgDa+)rb@`#2a z^OUWEJyS5Ux4f0S;wHX7*Kis3Ry5wn=T;a2CMYUWC#+n!W9@_VPMUxso+tDAtS6I)@E0OPS??ISirch*=JdW zwU_de{L|b^9NNQ1ZIY4_*fm@y5aHTb~0T#u%Br~lEEr)cgZIwo?) ziQe+SBswH{ASjbZ_7AW4jE;r3B0wI+<98~g_b$^z@_I8%ma4%N{K-f5!^sxK-SHK2 zu~_sTx=%pmhpBEtnYt?vWbmvPsXe@ceFl0DjVGbwda997rpEHd#+Q-4Ian9qJ=D=o zewwNyl&P+?>2*X9>i$0wamhK!G=!W%T(6jjSar19q7zk94H3n}p4Vp#PH)(YdOU6CU{6GUD+c|!ZaYs8y&}Ko%$${3CD?35xn+lQK zqCUd-l%?*a+z4fJd$|53naM->*1x#I%n{2Vq_j$YL=VV19p|xNPU4}XSe%C5-={1H zWwNMk2EjcTU|n$NL!s3_1POG)CeR+#d^rKJ} z5?&H*7087?%FJ#c;Vh$Qodc0Sr?d!V(yGL?V3+>cgi}g}+5#1HL@U@!=#0{T9vYog zKcP(h)mZ=M$V5W+>qMbt?#WR@K`|W}<~_MwfOe5`A(Y8wD(3Ql&LA?#BC!DhoJiz1 zDHZHdyg8$+u>_r7%79QNgPGM<=synC}7=aBopyawiTK* zqp6RJ*+qj!al8mtos=V?|AQksTj6U{prsra?>J}-O&*DB;-rl-oiN6aqVWL~KS^m2 z%A|2iKt7IuR;>WfTIOZTonV2rOjn{b36uR`{C|Z|5Bur@$%A{3U zr!yvEb8IzK8s#hja&>!n%=Won&$=u5HZ`P|uRi(3JY3H&lW z9?45^#GuuuV<@RFr~`O)+(t7n2gL^OjWSCel)g?063Qevl`#2(BYikc|L83Ttp}Q8 zLT0Oy5u-FOL)VK`GoftFci@-z@C!nDK;0WUVsXg?QbGm| z9*oxU%qXqcmghUN$J)Z*(XCNTsmuFo%9Kzh)1-4(p9#?7*s@;2`6dcguM-^rpp-mj zJP?XHu8t`ZHJo2OL$gIS1!^RPdY(zg-x*m_P`&N|`#%~cG4{L?xy3v&chZKa+gz@&PBH8xMH&P_3^j1jNP?B5E&D)Fw<{eb9?2~C zq?~dB0;sR;KhQkbkNuC@eeILqi#!BKl;13QXW2oIw>!JD!A$#ff;0D9c4H(iU?OapR#t?REV zxi#qPqpd@}bz1wp9<6KZeXMxQ|C?Z+nip{Y7?e8NSQ7I_?F z+A8No$@8kp#w510xeRZsu=;V}Ubb_Cs4bNA8iQ zdtdj#Bm3OcqZV_HZLz`JhwVkfIkX;`(C{2Ic+l|fN@oWgADj4~ zHM$d~s#$Y>SMb5Q4S=5?}nbeUR7l;qerIs@%5S2e9NNKI@b&pf|CM`?=1Hau<<(BA_7fMC|9O6#7pM8qQVxYv`Ar0e z9ThB1sOL+)z4+<;P-_jlc}02TPa>6F%`0`SoR{-e;iUONq1xsw;TL zlM3Al&y;giq~y%nGp1g6dcM^AFGIYFQv3eyrks|WWm;~?L>zLtarevgZGLiRyqTr@ zo3)#pf`2)~IaHfe=%aG3`p<0WS5&%hq6<2K)iwjuF+Ke_KXhHkY@5!d^-W;Y3dUC3 z62E}(Qz$?v+(XkS@I3}+of-$~x@6|J);S^Fnqx?N{_+y(81R=?YFw1g1#p7d63CF6 z=N4fvsNGOU`rQA~K+hcJFqe7I<;s@0FI&Kt)=~SY!~B0bH6OBF*#l;} z7dEs4*)d;R&3)NF>YNA6UIfgUnSz7j-5f{_=@uc%q9xa9O_GGMa2M9XS=bA2;X~K8 zln|#&h;#PF$2{jEkyHY8ZV;?c4kuTDcZBoykTQ}_mEUB8=pc52BDpQ-+cgA$f~bB2 zy~_kp=2ya|^{!Y05igTayH*whqNDz-0=~p6%#L2F8RJPJDlTJW;xx(9GcFWu`#i2;b$y_-p%M%qWvut?1_UM=7*6ZY!zq7X` z1WKE-M%<*1To=Eg?$_ubQQMDfa^i)Z-K}j5;xD!y?A_nlj<-Mm^rNi@%144HQVQ_~ zy*Qv3ZERIIG+JNUUq)!yj(W>Nj_DYp8_(2|W_Ft$*CH?ee7E&Nw~0qR0{|?~Lo2y< zH6XP}i=v{3g32rEKRKJ4OZBUZSiDC5JEUj}qw3G-EX%Vzv;AY&u`CPJy7W9MKPpX> zAev=cruU=cpd3L_rk7pEx%8Zu^a|GSSXUk>y7c}hHlcis_SDbA>>gV63OZ>>^T?9+ zg}!z$`|tLJi3^T{#CFeyyZ8{v`9>+yyoPMLN093Tfco26g`e#0Y>z&BOcw)Wc&ox4 zBR=MUMla17K7ZRoN4Z)9V6Q52<+9ndth8@+M4pY!6qlB7$U)NiiY49wQ9&FNA9s`I zl^@5f7{{@=iR#SPw5s^XDDSON~bP@5nY!=x~~&V z{FdI(nWxj30=e>oz92CE#BDv&=Nh~})pxHC=u%aEgw8Pni%t>`Xcq_EHM^KumzMox Xv<{ww2mBub7qWJ6Gx&Yr5*Ysk%FP1v literal 0 HcmV?d00001 diff --git a/_vendor/requests/__pycache__/hooks.cpython-310.pyc b/_vendor/requests/__pycache__/hooks.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..4ebc5a848e201b08a248b7813a95967fc043233d GIT binary patch literal 951 zcmY*YO>Yx15ViLs35G&d1V>~JAmz{m3Cf|WDiA#&RcaBbI8>@O?%GMLZsLvY1f|*_ zr1s2(KL8RJj{F;Bi4*^V6Js|~(~)L8`#c`|J$u#K8bM%dzdz)EB82|>k5vNGNRkv zCKT)lnl3Tg7bBsW6`c088d63Vom<2;mPI)bykVaD8*pM$f7-Tfq`m#kmHqN zUz&h-z|95(i7IrG&T)nN=xa2NI_M|TzN#6ysP)XHVk$;9AR+wQYTIGiE@ioCneGd_ z`C=@$#PoUIF63#uoY{dIwU^?y1MOBhb7Y6h+~#Un?ymd2{T3VO{4p0jHYsd&Rk%~A zoE2ubbzR-WE`57=xZk-x!&R0-2e)=({k>)9yI40M&tnKnt3l$|?1P(k5Gq{85_#(1 zK!oquXZopy$niy_?}H=(+e0Vo^Q20usE0wW_y_)i=V_JlXoB^VDxF8;2Nej{jL%>0 zNmDYL58!REaOc$1mTJWGjH(fUeF=inQi@zq)uWtQ)^d$31KvfJ9f0gHsOstiW|+0Q zS#$B3n7K3vV>?2%&afyc<2?~ap6`>XyEe;h*9(wvdG$Mi%OmGc1@H%*c yqt6M}{!tt>6IahNuJSC?bpV2zVQQthzd{{$XzX15DZBou8LxbTYPTElo%(8%2o;y3cSS;Qk*Z^Nx5Ey{qL(~d{0OBEnj|BxRNpVDab}-$$JBxWN zZubD(@hn9Wj6^A>tXPVYl1es^a(>XMauikKN>wUVQ7TEf^23Rpm(s2zRkHJ7?8J#B zTQ15X@_pxa_s;ABlI2R3lLh+D?c4X>zK?UyIrlr~c4u_7kiy^ScV4W2_4BFJ@9<{u zFO8cMxcuKYQYkl8Nx6n=HjRoQzh=e4uhq0$=}Ow*GrO5-Wh>cMu99ozEBRKTQfQ4- zM&wz#S!|6~MkStUmRe(#F^OlJ4VO^D~*d~>3;xw5%6S(%jkLUT)NYh|m%N1EGO z+bi2!J1RR`J1aX|yDGa{yDPg}cUA6c?WydMJVoTWyW&WE6!E>4y{&zfeXV;c_eff) zd2j2!%6+Z-EBCh^s5~HPW6k}osmfIAK;=N|!ODZJgO!7=LzP3Va-}TK$MJke<*>vz zA%3KCMB)>Ok5nF#_-4e9R*p)1viWf9k;)?y-_m@v^;qRGiEnLwr1f~^afxqhezY}R znQnco^0C&j%CXiHl_y%qE5}~jvU0NZWaY`$smduMt^LS+}-8w!QCF*&EW2C*TJ3R&0M!C z=W)N+-G}>q-g8K?E6*e49`|0P+>895bj^#Ysr!0!1?64odVb)STOHSH`i0kr{|bfK z#fI6;3?csmp`sYs!z(MxR%mpi}QOb(Zl9 zUd^3tw7gC?&?&i#7oU|F-cpR-e74~=UEJ^R+N{0W>NbPMa!m!*`HpJ2wV;NFc_jE= zwX2%%gYr{TW;h;ns%cYH0Y?nqO};P;T_8+1clxtoe=l$!@SX zl?`*JYRzWtQqv2^p1yc~X0S)u=W5H#tf+9Q=3|_t(veHu2HMl+OTuh@v8G%v2=nz$ z=Q7&exP*7uOFo9j3iD{4?n9VE)L(8kg0O&Cw=Jzlmho!6v%G?UrK?Ld6>ipXM62_v z)2h0SdJt|}@PatgBF4~DQ<-q`)MB@N*>lfun9xi;qGP8z?Kb8VGo%wHkq~(8Kzf#B z%X1ubhVgUltF>msW%qSTAxe4S!n0F`8t3?8LE z72Wk3=1LC-MlUQafa?9~d;_CfYkBcKN4?q&=EIRj;Hj$LY}7qJoX~_4RoiT|FZIyAamFF*`D|n`fC(MKNQ61hDj)BB3dn;^Qwb}54_xE538mavZ z%v7q5yP-b|cPDW9M-X@^aOG6R^vILVw^P@RitVLc%e5t*K|JkdB%XD%SmC*FGFlPw z3_sU+tbESad)WPSA0>zE}RhIQ)U}@h~-& zQQPtA(BkCS%g7aGuyVY%8>Yda)CyKar$L5c`(ATieT12fW%W3I)ii?lQtCKEfq!Q2uG=(Tb0`=0C6 zd{jmj<#ZHcTokA^sqW~Zpu61k{IYW%Y*IOpM#`fULeYkPIn$DYPF%pb)D4`Py3`01 z#8grr$_(_RraZKD8Ekd1CFLY{Xk%f!VXj&ghESdPAPx3#=I`}wCm8!Z}RhsWFA`Wxip4Sj^dG z@1EOI?r^Pj@Sx<6TsxuPUj)zSr+m;A=+$`32#h``8T2)V6q6~SSre3LEN^LmZb7f0 z?d4q(2jzl7kAsfw)ig?`S<*ig*nMy>#E$gSpyPBuja&y-GyRNfgN|Q8&Wup}$pC4n zGecTNs?AjO9B4S_riHRW)ySJc>Zkgd8~G?T6H)fjD|h!(sM|#gva6_lHHRxNWeUNF ztjBkQBH!U=E}N>?&md=Eb)>y3O3fnmvq-g=x|(Z`A#UsVYQCKdMp<_G7y8-NLO-)Q zf|^GHv^^-zqkrl~e`K}T-h}>+xH;VaN`K_W*v%BuvPiMJDfPFn%rQ?e-p}@n{X#$Q z=HInfNBg5ooBBDo@UC#&8`=ISx$Bj=V4{yPM;lA4WBpQpY@YhuNbPT8lGd2*rH;Ge zK;gmSNED#MRDceV;;@W_3;tP_F6E@}{1mJ9r(Cl-`~Q^{I}6n`s;*UAaV~jl3}JsP z?hiVQL2;cr=sXRS#_>9T+c1{cAn?&uR{M3bdxOdJ+qAMx8?VKG*5{76Nq=!IT}^)MM1s zxCwJ{Kf!@S)1%5%r1FlwRHZkY!@`TTW>@Rj>I~}<{v@30Dc*j9!C3~HXKCF=okL2P zmH`fJ^6JonTB8myIZw7%Q>wNijZ)+tVX0NSJfMK9JQAnI!!+CI>-HAf-ZiLVP}%)3 z6aC^j?n4WDlA=R^^9{gW^wY$caXz>1%X}2 zfoFnKnneTu%$Rc)Os3_m;w_UL^iPF@eo!2c2+|1yfwU{U~9@UgH zd;5MYua$<(Ks$q6;j~q&VWC>pn=HhO)#{aQtr zs`E%v4F=SH1_Fu<^)P~2Tz&~bE@h&n<|MAWN`^eEBYEhLRCNNEzZ*fUZE9T;IDqJx z728dN*JQ#?Q5T=0a<0`%(qsI`xQ*)+F5gAaH=t6ct{Q4I0JP9Iz7DbR4NF7`l+1u^ zayN7IjUA~Qc3)HyHv<(Z-8U&D)RE*V7`U5$8w$>82pUm0k&k(yuI#{m5yJ(wLwO6J zPpAwvhZ~4;uRO2^b-b%s4359-)f*r+_n>pF0o7Eea^#(T9~k>&#SQ6n93ghg=SAK9 zO-RL83!*VYCZd^U-*_G#1y*RG2@u;I+Nimeuj^ zuwuT!d}DX2cXY!bm*Z~9uBd#hi7j)}KVD8Mn8A)TEjuRlBC1(?xh!PG#SIPQHShxW zJxd+qZCbh=+AOucWursy`xnSA)Ksv>p$$)hqV^c}t=`=~p`G>hq(R;wq;U|D-bgaF z&`~*|FG0(=h=C5wl`RHF(@4Dxa=DngmYTA9jniJ-D9r7$@~$>IU4LN4q07mPCp`Ot z7jzYHi&@q6s5KJ5U=GK7jUM_{^ZY2I`%j^eC>u6^)A8OERl1rC zqKAd;DO#uYEv)ruJy`hmJhBECi6y1}P@?%@;?8kzXvEl|$G*h&I zx=+HKBgHA23cdf)Qzdb|DdlJgVi1o8V21Kv=tvN9nsx{hI*YZo+k_}W5BGDa9F*Pf zl%9p5;nUciKTJ2uIR$Rj@Sd)rig~D|yb*dCBmfLsOaX&*EwW&^K2!n7@=~pSS=gX2 z^Nejhq-DF-#A2>3U{a-$7Z{(Oj`#P+j~{m$E#kQGyZneC_yn(ao=6^)qt(0rflr*7 zec+(;z+wDtUGAub!@y`Bh?VQ8igLsc_Q&bR)~$Z$)2Q&(=gd^DWrK-h#4&f-(hAES3!)s{2T0t;XQui@VNu*vz5T*e~w0w~a zVJ6ZAKfk0CTTZLCHzpg84#Iq6CqkuwR#_F{+@{(rJ*M1 zheJ(ZCJJ()Db`6EScL|=#HL_&moT@O`P35TbqVvigxOreTrL6PTf!_ajesHwfJ_O8 zn!QgE=MGetMw6dL;%RoOYHhzo7#;i-Oa+Tgt2T|GJXN^!WXi<7fyS?!(WzoMwr+KW z*=YU!^tHWb>Op^kFB&Ee^_P*hpLDSs5e=*oTpj+G`D44-8;dC-YR7wpndEOOyG}a_ zv(>8GsaLD&I$z4|oxEz`_0ka85Ut|rf5GMNL6A$?*b150x()v;{88?nqNSL(j%(=8 z!rcj6{#OwU>QFBBDA11V{B8cZdqjsa26U*rTR`rtJK`4coAdJSs9O@?zTl3z<47BE zH@Oq|EyA$3*`0jbsEoQ>+^t9{xsJQt-GP)bcc;4xDdX;L_b&Wya&1u9UiAeut~Ld_ zB^aVH*j6{7h3cnJup(9Mpm14&2f$pZ15luQuhoFp3d)Il*!`#&5XZQqDh6YX0Hh#! zD0IRrH_nU}e=h@HPgycfpjBH#f*t2rc zb70jF--Vl&dbopJ zPssdJC>P0f7(V+(Rm*mxD)JpVprN)vl3O?Io6rP8jDIHUmfM_fyN0~#JBzX2VO z(%*oV2cpo+p&)E|{hF|8yjMHfub*ciD??PRFY)&07_1xfzmBxeaLkF=YHQC<;0v_+ z(C*WlTtDu7#gJi#y^aT6Y)GQ1g7BB1UZJNGFkc{k!=!$TMJ-?q0U2m7cSp5r^44TL zu(1XmTe^=_nZh(|Yw$FP)B;g8*Y)PFAlnz%n;d&%7GS{wp0sCuAC@&OMJr>7gxDJv zCJFhEBLHBTYC=QnjcOf@viV)}hDjsnDxf7AHf_w{lC`o+gG+(^mH}ufJ)_W)lofOJ72yS0|2wCIyr+`a_;aYD(RM`}ED!jf@KmzmGfN=TIqnqqGad-jrRnXu(^}z>1bz z&A*gtZvsY_UpZ-{R-xeb(m|nLSQ`0a>Mi(*trlJ{T*I)!ci?+QbNvLQ+l+Au0V{(&(K>cQ4{rdN!-X9SMw9iDb(fG^Q$1{zjmtu8yydup+^ z>^m!+E>Nu+FfbOz_F6p(66j4xDN!Sb%b;0-q4N-b#`P6;W)p4*_4tG zCW&@(0yi<#&^KTh!Roz93-)HQv4c9Hg_wXHupS92EE%vZ!9>Cf zsT9kN7}AZkf!H`&C$+?XG!iC!?B`IYYpmM1z(f3_fNUtFj=JV*x(7f8;#zD|@4~wP zoMJ+(2Jrh_&443i!0RBK-SoRAcoIAaUeAyxVYI}D0JYiRAQ`N2JIIRnOZK{nr$&$u z;297U=k4oeF||N`knLyH&!a|&72M_Ut`go=3dVx*d28im&71I!+{;iAz?)d-CIC)3 zcueRvuYjxBHzsaE1XVYq{3yy#uDlj;wJoAYZ;ncv>NCOCh^OV$=Ywti9EI`HcDHaW z)qdQi&1Abf7!Z>xQZB+k~p{mhofo8$z3R3tesM?Yk3Q3DQdpw>;Au2OJ9r zI&tVcOg#83%+Pu4&pOv&^=#uN8>z)2X2sSP+JV<>_8z(@4t3ZcqCz5_L^?D^%S+BhyFqd|1>}{GQWHJx)#F@y;QLNLwy@Snr?a;Mr z*A5BTjdiIVZQNdLGe1O|d9N71VV3>?cZDPMP79t%ud!=z2I{t!eQh4v3+f%(PAn1{( zrZ2FtdDRQ^@Q8&BfZHR4fi63&@2J0utbag$Fo%ep1wSysPt6I+;G{N%xLNO9cr2Abm!bBZqFmt^+JD-XZF(pAbA-KBImOErfKo0C|V@Q)f<|4viyV z%_NzDnWbtSTA&c9-@>(Jw*Cn-t(%r_Bkc(glsGv;>_OyBSoV){Y4cXeG(Rk5avyBe zJ?}s*R2GI5PztbQY}>ezu?3Z5Y{958x)zXg2r4z!x3G^AB~(31g){)8Rr|1~LN3>Y zyVX88eHmXAq?L}45OhFRZ{+&+Qa0L>3%(j}y=A7hY88oV+x-DNN~PjUS8GKu8ln@KHn(XPsN+feI={j13J9EW`p zk(^ziT!gw$y`yA}TlV+wOu?-2&J=ta^=UPKiSBp>QQNI{nhaldZ+f2!jQTpH*^St-IovtfUV)Z=3I3#AFk^XBY*%yG^SQaT6)3hpjHPsQv3Au17U}?x#lSln z(mV*L6W&#Ni@r|}{=TG3dbG47EqxjwWIc4pqm6RS^7p&yd2mAPDn14R%Nk zSM1`G-3%ySV&3x>vyST7iuAkn%i$}?LYkJHZ*hcba}m4sdr;xZE3?dnVjzKFn#IzRor;BQ} zHEta*{cCt|jlCfLkW1$vzR>==?$my%UA@cN1R*tKw>34f&ZMEf$Q;)h5MR?a4Wd4Z zV2L7I)jKHeVieVGk+qsLkt5lin8CQSOoU`yGGT=%;VNa<~e?{}vpzTG|GK8UyOK-xj~ zkfiN&%kE*M?Q)N}58-#Wdk?U&hr?V9t@jpZ!5d;e5U0|rp-+Y+jxezo3$-vgSyhu| zs=ZjiPpB16y`h-6Ki{|s(ueI*=-aL5t>;SB*_g|QuBVhKPzx4;w_ z(Gg-lMQ?D#ioxiO5|t;!$K=_#n7yr;vx2})ZBoC5w}qSHuJKpS28HP={Nw`lukd(n z=Nek7c1|Ar6#HG_Z4Kp2$pqa3AofRkfko*_=V0kimb%)@Tq7FFgF{4$p}@!801 zZROILG%ODm!-7@J73|)ocwQ63!-i4hNS?wau6+a`g#+m2c^g1G%vS*tLffcT|1leY z3+uEuG4P`3@z9%?jTg}xaX!PoE_D;$b8A)^o}y~v;6jYa{tB`Va0xO9Dm{>nPe5 zfHy!huja|f15^e@GIibhvUvqwfHC*{hscV4DEt6o;z^6Op_Gmkj!}8zKJEB##9i5$ z>P-y{BUEOt8u;K2_);dNAOXI^+Tk>zml)=SFY;k;UVE3slNP2&c@4YAkG_$T-kYqgcfW?U87r2u+Omd9NVzOtX z?XxOGJs76f@e^i!y@{N%Wt$MDrSk&osBa;|dQw1#P$C+kf5{F})Qxiw2M^GpF0JJo zn%9^xNd1Y0XCz^T&Zot+1Bok3dTmhG9AuINZRsZb@H} zeQu5~IseSu+?oRUo)MaGC%(;ulD}N)beh%bZ(~-)2`7^q;xGE?1~Q80RsA>8()$el zJA>Q3V+5}Cop#Stooe+zlX(6Ia`tc>QcGZP>g4f;_mGE?T>Sz9vQQdM#QJscB;hNK zxnt7c%7-CRv5<~{b+GLk;CZshz7x|{({DR+U;)H!%u|GF(E-K9NJcE22 zz|tBlr9xP`aOU*63ujKvRxi$;oIQ8D0mG4PKdIBSqO~-c9$4}N88(a?3g~g;W;PkO zQ9W);0IimAN;Vq56Sp6~PCMcIuzAB5iOd_$==8|(>9!m9xUBvVF9C)(iytlaxN!|P z$!@%w6mG8I=y_aI(zn}oehd1xF>9W~Kt@rr=w_Gsu(v0k?ec94Y#5dyjyq-aW@753djA1EWsWJvPtA6#2hFNgI0#@|Mwh;+p%$*)oqHWGh_8e zlOFKNh6X3|IF1?vdi6lzBuKkM)BbsG%z*sEj6l&ESp?vY9UZ`fQ=8yA{3-(!8VCu@ zWU~P|LJ1sws{yFbB^)Y-VWOfrT?EwJTX=~iIajUm8 z>Dq>DioQ!{hoIIhQm8Jn$3Att&!s*G`?XfHSFLx9CE&w>fnR;NYBTp}ZyE34Y(4!0(adk9N8qzp=oV>)~Ik06H=H+Zs^l2Inl&ATb^^_OTa4R+WM&PCgHC4Njpr zRHpO@56-Lf1(F8KA7aHr0as3GM77H~tb@8%jH^~sWt@_Z)KF=AfuEz{91dvb=kPfI z{RNKb!yB9#l2~$(S8Kk2a&pnCQsp)KKS%nDlaX(G4f6d=3;ER z{a4zsAjnb1i>~>OQ7uNhO1NVPY0yoo6b*Q!+`@I^DRftMoa%>+aWkv#Vn9Bn?qb40Qm8TeDvvI?z^#T{Z(d3%T&K-hK04Ipv_##E-}o-K>tCqRGP=kH;Sfd z(3=CE8gFb2&0D5jgj|Gw2hRBxGQ9^920W;-ui*mm8)kYBuC+s-)do#r^`6g3;~Gl;E%pfqmOD*F?LD+mPW=N(9*6--&@gc; z;3`1bm4{7;Tb1_s;i#UP_%@@H^``z7Yb8pd{uhE>93|pfrA-stG61gW*<#-++8MKC z(!Po>MyvrAgX1w%r`U=AVlh-lg8vl+Z$f<%TOF_qSewjuO`sQ#$jKX8o+jZ)klqG? z(zoE&l7@hWv)O6}w3eoe3x$dL2u|TxJAhuo86k@Eo*#?Yk%DCqX*_$gYQuSf@5*2W z8C*eE3UIgJTb}CMq+ITN1nswbfAkY1(?O~t5bOvbQECn`LNItrtAs5KazIS+n$!YA z5Pj#4(kiJUS}1ptTJXjimR9k(E5|99DP?dJOQR5xofyra>`_p{@tqS01HU#OoyQ|! z!DB=u9+gJ${w@3g_~G;e_|e~zk{@>453S|S@*u@Yp)e1mw9z5~;9!Ur7V1N(K}xL$ zj0!?3^5_MU*gj-6->?g|iBFW=%GvtBea^gBNDMX~{@&_s9$tD!TPQWcFCuZLJ%W&-RYaLJY){sf~e{idZga04FjuB9}ndf^5%x4^4-M zX-)uc4K5Zhbm1l5ihMn|;n58AV~ojUO`JMEGka!cwtDKR7iONRUOZPhb31KW6whlM z^>Gv}U@7N-JLd2y7&^=Iq*VldL=7JrU=)K4h;~7j5W&*oVB)JT9ALjdV1f5C=o5$m zknD}{D=+ZCf{U$dziX`;aIeLpgP?+c)x5cKB=T*NT$0CJHC~oHbhxdBpvxaO-jO69 zmhwqIV*Q;Amm1H(HF+%>3b?X-=nD#j*p!oHI5)RZ!JotFWCbWIQu2vqCHXnq$;;N! zMM4H>1UCSxB_Ai!o*mfhdeF0=U2!*^)ED{R@!TZ=B`RPS&Yp6PKK9UK#M(%9O)o%Q zq8rh}lZI$f4r}gJtaBX71brs;0n0ih+x5%s&NUdR@s!#yPw3VN1fnKA5@bBAJ?_jw zaUWf$=#sI`&8c#n2_u6Y3BIeKc+Ljh(FS7}ovHD%@d7I{2R~G?rWMVIfs=k-a!wcu zLq^a{AK&{DL(O+VXX*n6XAy)W&%#llyDUCUA`oK>tmKmtBJkIwKK#XA3%)>-r!2Ee zu+osx0B|=g7-I|LKN!#2rul<`eIrW@Q9i{P)wO4E`Tq<7soZ~(bgiC*y9$2cl44x8 zaVK=ForGKyg67FyDX`_>AHKOoU*UNJb_?T|jW1#)$U4Zb9EyRs_7<#*oOnxHQ19~C zL0LE;Xf2K4Dqgps=mFw?-J*vgR+g@JbVH4~l}k|Leqs&yQo@ho?K-ENerozCH%N*e%~RWKal%fuTVV%#3kbWUN>8ovEWwBW$qX$dBnJVl$F)1E(-z3>mKJLsF;5%R%yW#L=r%QB#gL|B5 zZG}oUVIlsb0rF)Zhsc-eG)edrE}zSYAt%gpKV;7;^C!&Ni#Cbn156#k2zaj;By z>Dut|MebD`EWvNu1{8DIP-QoLIi;Rx!_}ls{4fnv1)KpP4+rt&K^kW;c2M<5$~@)f zQ07G`!(-$ulV4v3)A%z%mhN5n9vHouM=(jn-h&s2Df@}H0mXn&FFuh0q>Wl_r(W+W zpm5r|U%YL5_-I|{(BqFk`q4uVHFyN2@qGlnG3S&vI!O)FPOl)i9{k#-oyMn3$#GFW zvEf8Hz|(W_I>jfA^ae*v@1MZ<%FEO; z9&jl_akhs=RVyu6C)c6azyM8#za8s{I}5B3`4WoN`_2Wg32zEa0oMW;QuOUqKnC^8 zu{2-CW)Gh*Bv2)?GE(1p7J~qK!m}bDGuFi8s`!o(#Vdqy?HYKh_VOM6I+(~{A|wmo zg9DuVzzlZ_&c(IkvKq^T_-=d15B&h@QS?51dI+xC4M0NW14&!LBGxZ^M(>OE40s#& zpOq`*a3%z<&LvzJ1T%{Z z_t4KjR=8#E!`%cttnM@SA{;N?rC8(C1?>g)+lYsySP}EfJU$lYll#zYbi_NnGJ!P; zSo+}sxvC)-iUtkCP*4cuQYpom_1D(qOKp|$wZx_effmTO+A763xf?W^ih5EwhR-}e zqr|5|@Uh%R)7PhXMp^xv3`)$Dq1#0*P-9FXr`E3S6O3(UFv(yGgRKlGkmZw@@+DX~ z38X(fLB&q{@$5znr+N~_K?6&B`221L4uic6_A%JW$-9TKA2GO>L6^aO2=s^4B4;UI z-OnT(W8!BSy5MKxTZH3_(!KpGB+kMI7!&11t@;rT_o{ literal 0 HcmV?d00001 diff --git a/_vendor/requests/__pycache__/packages.cpython-310.pyc b/_vendor/requests/__pycache__/packages.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..21bcf8a5589d9d5ede441300cef86cf60d2cd164 GIT binary patch literal 678 zcmY+BPiqu06u@6H)0yea?z9xq?#Y56F4&zzD|lE$L=PVHqF5Y|VVpd7vz>pNWV`I1 zggyHSN})aaA^aYat0%7>6~)Y~Ej1x8dH;SdFR8j+AI#`}eUp8$0KPTK_2C)iv03tm z5eyi~A%>;Xo=8lNpzPUzba973Gh4eATkUSg1g*&iqs(G9+xTP=cnc+&19P6jyL+*N zE;=iM-U`qe0&XHq{1q|2UL0V6&M}owFgWj^a|+BoqZdTHXkswvL9;UtgHt%8Lzo^; z?;@FWp1%3a!=^I{ZhmXoi;Bx!5 zSnzVRr>Z@M3Nxj5vT-UTs>Jw8 zrd%t2K8#dRM>Vha*HQb2Q~m%?4zkEJ7}X0kuFB}Lx#+67dZE4Hy7nVtVDi2Z9#GmL g9pVv>-k|iC=Z7S;cF9dbKhi&r9g26feP7qn)y3{+^PGEjr}mub-5GMUYfHP#>_D?Kv)Yk%Ig=q*wpv;@n_We+ zn|;lz>fx|mlw@&@D2msR5y&=TDIz5~!6X4eZ`P@BH8Y|6_Z6Je$IA{I@#yz3=h-i?xhyU{S4=~7x_9kXFIGo=jjY1eAl&9Ty$%x4Z zbB&YDQ>9bQ)1}kRGo>@lv!%1LJl}Y%`FQE^=DE^2`8?imnopFTXg*nbviVf$spiwA zr)7De@l5mC(z7x@(Kz3{P`V)VlZ|5YxzcmZ=S$BwFP1JgFO@De=Sp+U`OmEb? zrH`fD*<&B!}G}~^s;W-`AzF%`a->EoD>Jz8ETKB4f6SSRXrBzw?oJz}e zI-c-re&G0C5Y$@hs9zOr-|u(mT&T9&n>EkB=v2DF#zi*#0FTAF?0W=`#iADFZVT5F zo_nKK4e&S?)S8~_HG;}}0F)F;CWCglRS9bMy|Nz&bi6-PvCK)yjt;V z)iOI_rJ@;S-mG*ws2q){Av9{MQKl;z^>(cl*~oM%!uL>d>TbL`*X2+@UJ=oZ`lMbF z;r$Y*qS{Kn1KuD$ifa{2Df8@KM>yuMt1JBCmD7CfcoXyzNneg)J`-YOA6gA+sHL<*ukj6Tpcaop$xcm;15Jab&5>}X6 zN`)XY$mc_CDHY&NpzZ47IC3fG{FAbd9_XRAi@zNsH1-TUrFOM_4T!G0#ycsLnfs|5 zDBCeZ^G53J^iDc7!t^VtdzV84NND!HeZvE&Hft>+RR=Tdh*~A^63lVd+5*V7jwNq7 zToj<|MJK3i0)CuY3s_gFR@>cHkah42Hay3B&}r1FwLb1S?H0-_!Qg8mC~L;ZiDu$Q zNdxAbTWd~5HrKB}d?&1fL{!8!`rq)jovm7<;jDU&1aq|5#vX2X!s+@P+Y0NKs}1bQ zifnALO0-RW+y*ZF5-$HNl65TX+u6_PJKByO>TU{4kEQ(?{T^u5Lv8V4s%S*|+~r8y zjI{gW0=|&R_gOG;*HlF+3l}5W-Y4}%>Nop6|L0LBa9Na8h@ zl^`NH4VX>KtAe=z(g0r7O4s+Ct&IWrD|+X=@{050=Rp}dU|Zh#1?SUm??}LuEy%cG3n&ssR9!D+FL0PxdY*ugT8INAV&S>fnat6y(SX zpXO>(@Hvj{IF9Ye>*5L?tGGsfT>g*Z@;{EmOF`^ODUk<^+Heim#N8ZAk6B|GT-I3H zopfz?49q_5X5Ad#T5jGQ$35c~+zH%m*TN=DMYBtaLnl1r&Dw)nt4b(Oe(amqbzDAC zD%9#JF^v>-@KlP3xTg~YcJ#miQX0EJM%P5^>E1`~Vv|6XNE+_OyD*1b&=oC~fuBfD z<-B$GmIE5Lva$$hURjB3A`~e}WHoSaeJC=!!P-lU;8?kuUrxS@G8-`uu{`oiPoyzG z?2GApjkU<+u8FHCI=Bmxza*`c6;asa1i2fQoz=3LtY&Jx3r8)_9Qn|Jk4LbD$lhle ze*q6<4J7}#>ypeHbuBdO+NL2UU9gVOsACC%LC+$G4ZWX2&P16h%S@D|S;kFc4ZJfp z4YG;4&U(mOfw?E2-ORr3X4dqbOlbMHWbF*Ty~S@rnUk%gJ8y&p0lW7agbIjjL?20- zuR#oIi&{^vzoQn|QT&sXTzJj)ea}s>O>H2E`Eq1#1VN{$zjp^SUX0Rwf(TOk6_E7B z*A|PG$l*m~Z?yfORcU&W4i zWmy>K^VN+?Yu&>;G!zw*r?~liB5%lU`b^zwh2R^G^K)0(ai%FVQG^qxHuSPpgY+TwC`4DBbsS!4)y68>HV>iq=x z+)kGCGlZD1lM6sI>wufOv6ByTU)IDqpd3Voo$)Y>J(r?Hn572vllm!qQ?`02twZbi zkyLBOOa*o@7G&3q?U%I_|L`tX&y#Gtt7)lErCQonDi}wpwF?SeFKnj8o56&eX8spa zuJtto)IRgB{sj%xesZ5JI|X-aZ#tL>3-wvFl3OQ1;K*}$HxW(% zg0q0-tuT*kqJAvQySaDqre*P+*kOv?6QyXy=VDM@eO^SN8i9V;96?$ zLVq0N^`fhHwf1-1LO6Xt)%lJ)!TZikI3vCrJQt4d^6PPsPFwtsQ2!)WwB=y6pAYpl z4WgeJrb8>tV238ZYK3Fp(tcXo(J(HIfqkfP4d5fx*g}}|F*lH2>TOfKS3iLCu6r#{ zR00s)_FA7d`y|45V~u7`kcKV32Eo4IQtzOeBDIj-*v$u34|GSj7(-tDCU-p`)tT(|ewPh3h=pU6^5 zmG~4I6(uB)mMmbZS7}BWYI^N%5Lx#DmK39G%8gPLogK*I|~X9n4cg; z5Kpj9L3pd(8Yo{A^ttUuIkXpaeQXB!-D%dCh9n8%23e>-glHO~6?AQ^e7{V*%F0Hk z-HA+UMWVoGJ5fHx1RpVTsdGmY9i{OluPLXhaU@HePYS3wM+K>Afdo_cYq!KxYz=(4 zarKOiQw;;ItU@_PrvC67b z7~lO`8w-(uSTq?Ax!*vPQyii!qr7df-YX+SK0%|Iv~^^S|r1_1`9Q zS;NxuKmQ0$bZGb^Ld%Gr`$^0RgeC=z6>{E=>4Gdlh&TqK19`75#g}~@&oH>X0zz0f z#n~Von!8#HYzTr$ngmc3!7!{at#sX(G#S13euRShsz(hlSxO2N&=M=q7%MGlD3Tmm z8h$8@D{0W7fq;so6w4j_Vo0H7sdB$vbDajHc{W@{%lr^(*_@-SQxbis4||P94fHR7 z>Y=0=zuz9U4q$Z$>M^BO0QOMtkdOq-Td+~p03L%r2YorfcwZ?E99=X%B1|n7GZM%o z01N7qQ6`=MELWoIOPhyq_#&U6AIAXMi6W7BhY3mSpqa>~AjC=sz*U5(cLuVTPXWV9 z1270W?*r%z8z5-D-+SUnfn^x0M<9e^Eib7FJU~W4NFoA&ft!Iz1rP9$-i3G?L(K^V zCB19_SP0EiuyjC$w{|iRPsSmhWVYv&VB+ekT!|#1B^JVrSO{z~!(E-NTuFs#us5Uf zOPJX3t_tsx2P;k&nzb(t6(myI4#@agZM_Rd2a@Eh$^sw4E)9Vra1`5`$f=zB6LR~WAPf+amdgX9nR9Ma z+}^7Bo~rBxPO}EkYOVKMQ)sch2=n~r4Zz&l* zY^VLQ;q?QWv@u7?i_`+%;R0S7f!{~59(L!%^cC@Lw#|v zIHus4yjkG}nWK1;$-7KwvWVWmLh2hf zZGT&B;U2`4AIF#T#1wKbskOZ3W<1vU=2NR0%Q~Fvn;39cP1`BGgO{N`FWJ{yYsRf4aD7TK2!%p*@>_OxCNS-pJ3u z(?@an{~F1_*i$mrA=`gLE19vuCrzK0H0@+uTbg#p+$>EyW4V#P{P2_eJoKCb3`1k? zggc4aS$E2v#y#iGxU;zD-HYxq_c&^dyO-P(?n&ed$enUeBRAomanGXGr2ClrIPO#K zIoH8`+I_-(689PRDfemIXWeJqXK_E~o_8eMJV_pRQE7{E8a^Gbpe{#-oT3&j{aWCfamE}WNEj)nPo-dAg_xwcrJ$BXkx z)hmhJ%lY&RmoLA4RrP)w_Iet?FxUW|AqYP7iiy#|QDZn_4E)kxh(|IvH%CFk@&Ayc z;kU)SqMh4-x5$*D#0s-%Wz@7FHdmVdKva+HSSt6GATLSuCcYRk-eY42Mlj-RklKZ$ zScdHqsa|7h1g0!Y%O?x+LaLmBVxB77vKGu1$me89J{Ye-a=>#Tn2=vhLK>ZNjbM5= zCDngEnaPt2uR$@r_}X&MPPV9*VGes$oDq*&tyK%k<)0)0JBx~T+A=Lzk078KRu*~7 zGP4#L&a~E>i~(;h`RvdNbCs{-^2upvei!GFQAFt%`?)@4ipI)ttHGC4F8?}5z_FWJ zZ)(s_{C1=x*5dUsTz(!2Z4a~qagk+*(EJ-HFY0pE03s-BLzGdvA~1LF0q6c3NzeI_ z8LF2fwr8#+7h2Bnm)S9Nl8#w})tN>yvQT*0CLndv1f>UQ{8@yJdJ6KQ4x;u|aM(MSZ0XA6|WYudvTPvbZL2P2!pgXzQNAcQe7PtGx?& z!!tCY`mtRddA2R3)8IJDPv8k|byt5k3zLkJRsS63dmRo4NceEd0_zu~$7^Bb&Ztk- zxpJW3>I%ia7}Mdnqk%+}BsaryNOrm8$>sU1k4q zK)Iw}3ZqEeSh80bA$%{E8v2bTQ;Gp;Wmp!J^dli;3kUldY8`@gto6We2--(^x8H-L za>`k8elVMX?2(9^u^i*i9azkMLx5E}W{O!MrHfVMA%@f-??)y)a}^kAeAq8uMY$pb zd(25x-$$-^Qsw7ZN;_^erp#0yuLvQj0_`Y*Xd?EQNb=|~$F9UlBs5b=ce)%xl%Yq6uQ8z$PL1LWbKhWcg^3(RtP%bc3nbxA9D}j_M)nvJeE z!s)sh=3oddgcJK|7*)q${MNs!@63j?Fo(}5(`?-er`I&JH!IDj$HHS$Z`{I;9f^yF zp`P(3a+7=qj&kLWY`J_G0A1qBO2EI*?E7pV*rS494r7E8Mi=1zq+Ku8@H{v+w+`b- z(gv}BzXgRiZHiq4I`|DKlM)orOwx9RqQAuj+O zkez@mh=Iz>;ZXa8MxBgeupE+tfEut8fAP49XOHOkqC+3Lq%YkLkn*A$#zhW@SbC{Z z+Z@<`*ybR(h}OnrkhE|ny3GfUhZsLH9v0BR^N1Gv^O19k$$1Pyhi4lb8b>-9UgoB~*tSI+@tsLqrb~TK2_j-E^#y(n++AvvyKqRma%@|gp zWD`evCDa3#P}5_uj+z~`7Rm%`m?eUCFm%WV!dqKdLG+u{aGbdNiz98(^^m+NI#=R4 zKFEz+gP}Rl5|h-#F0dbVBdhhBjPde-(`01EOE6Gjvdg0D(UKN>RS$M_sD)K1X9v59 zO(i4E4ezX7PPDF28Y|vgAn(dBiJPFWR8s#koK|Iq`_|D5DwOi=LlK_2hvF2 zFlf;l!6s@=1Q0T~3dUi#z11S{$#!8qmr*1molE_#1@Y^K3bTXhtPQY#4dyh2F$}GZ zBG<}QHPZD>2s-E)aDjF5Dy@s8Ut1fs>V~rL0kYVMXgB=6haRRy)zZjVIC%wpkdKz% zSdxaD+8RygP?sfODKdRT7fql5sXQ!)m0)AESz0@gWACf6DTlWN1C7@ zX<`{h8tE^|#Y7IoY#17bz%;Kz?z(+&$mG6cI-~Yg?&DyhO5>Le)z(`?t3EV9PHr;L zkyiYcJCErj<_*CnqrgMkR=h-DG-}ypbIr=8=WMsT*cti)V)w)SZi8M^MOQ{92nGI9 zt#t`QyVR_?T&N3g)`B;SP9+E`)lHa^fj*3KjdyMYP7buhh$aNcd28K<<07^ZAIbPK zpxk}0(e6kiH8B{(3oj2r87DOYW3@GBNit}NG}vDD?fVU<3LgiUI;%_K>|B`ZcuiP{ zxyZ>67Vu>f)r-!B^Q?LPqH`Vw>GMT2RU0z>9TLA2QK;YAu)wY4+5-ZwlyLVT9}WrI zx^fd%PzvYCDZc#cOsEV-r&TP~knKJRi}RJNJwC(;#lVttpEajxgPura?pS^w(U%RhM?=6TaDCT7f5`54APgUUW*ukciFRe^|n3$$?@fWxY#Sr#}KbYh@*#@(Oqy&~wPo_QAj>xS7l1XOTYC;ga`)n19L5cxWi_pn?`z zY9I$U?Pa{Xtz%uez*bQIfW7aL+aUfHs$-eoOP2Zeo#k7%7nlCHFLjiOCo29n z7C`)6CI^gR8KrmlC9JCWd#Eq~?)c3IuIle3t4hDaAM+)BO?-um_{ilnrJB)S%X|Wz zEUpr0lV2JcUZfJzLjlSFDnZHsjohFv9hxzHFe<+ZLY1sCT{?ectNj1F&Ui?vA28Zj zGX23*!JosH!${jVGQmtuW>icM=-=R__!Yc5h_ndS^n(tdOxli5=X!lOa>?*fjg2_=pV05~{ z4q)KBxKbyx15SwYM}mO(N2rX@jjiFWzP5b*^*^B~|F7^rO5fpv54KzUWA5_-zMPgP z#QrSyR{RED_r?=WBFi7ilVzOI0L6!dOuhH*goE6;`NqxVn}1|G{)0y+OU+RH8W;8` zsmH?cM4aaO3YJ%r&{?}zNETSV8d+g_6l`3QS$_$rqeOZN^ZSfPrhw0YD;d=+pA0-1 zeCNU~hA8N#WKb4DvQTdA@`#3c1wmIhtY+h|+QneZP48-m?bi3QuEo;>j6>PWxr{wW zI9ELn_gJdVxZ{FrBWBy8`<15)=pK_McBxG4*wQVVIhooS3#P&`ckEp)w9AMIce60_ z+iOMw5j%)}sLzUkDPps8JK2ElwBunG?z3$DB%`kHZNz10LzRSv_%dppf`ed4h1tou zIX90(bUAr|F5l7-JD*3C`F@z+JME5#wp^wBUKVlXc9_SAW<$gO)!tNaX3!cA#bm&a zQvF z^GJ&4#NT25fGYhY%T}03Uzzl*QPq#KpF~KXintc{`JPIc^nXP;C|%_^4na;`1}r0d z93~!|C~Q|ZrQ$C*;V9!ZDjkF~iDUfUV^UzU&4dDw*kJM{B#{MYC+r-N*+O7Ol*WNm z+{TxJcIOuS<}#2_tf69YT**xGbIBwtY(q|MpABW=(M4$)03K;V{7crj$(J}p)=~o* zCBAadU+3yBqFN!tU|}0!!&w~7qwmeq3WjA&8(D+}&mxyKX0=I#56|k8unzDTA0yXf zfUtI4%fer0GISVW!LS|lMK$hJmCp6#mqmsu!F62zFChVLV6{OjG=%ZyK@Vs|U~n(- zA7>*%%QfERxrfZ2!NaR>^Hiq2GlrTbFm#Mqckg6qx@I@!KaV?)$-W$<>lRu&$PP*DN4%E#nyBr!xN8fFon>;=sXVrZkAlm}zXo5Mabx zk8c=XjW|KLBH*0C|2n9Ge$p(DSYr5Y;0#k+h{Fdw*fh}V4{ZsjHp6K-NF@8s<75}Y zA$E~|5#eo{LnqoLFo4$7Q8!`8L}DoI{}wj|D;Jr&gyb16Ft9k~;COlh9x@>9D4x8C z2EWNq$yO8fU$#mxjPi^*=l`f+T(0;qD@vmA@0gQaehayC?2@b_o5sNwL`x6vtL*yF z0^kd^ue1jYcJqtLZUQo~W5(j44>PDQSB^2-kR*Ag50$xUIGvcg!=+rhHoa6c)$Jly|$vU;ae{X@Tqx7_oByAJK&PZ4N6fF<1>&jyM@CzDOp{!4h%F6R^QU!yQyA78cbH zVb%PJFSCpDNDwadRp!6OQDS>vxV_Yau- zLni-($!{|GXH4kX5#(NibW)Nb@h#@Q&E!8Zk&_xE5_G?g7lbeWb!2SBKibpwgniXE zaKd+f5T$)Em;KN7r|q1b%jUAEI1#UyF7O}iEDNc3&?-Q zqoRr!`nT%gyw%_X2WL#G(uK@_=c7KB(h0W zqZVw>Ig5x@;yJ|Rd^o(8eKY50`wSI~MgHTUB#wFz_W{C-!&8`rQ-L6+)QEWaI0^s2$irbAg@I1)N9of!)*t?4cbKMeo}X$W{69S>YhYk()viNKTSWZ)^Z7I-SH1D;01 zz|-jr;F)w5@N8NSJcrKRYu}@1I*-oB_yW2RcoAI;yo5%8m(pdxH_@Ac8)zf&Ep$2X zt@JkF+i4T<3fc_ZLhk^&Gz#=+3|Jrn3Mv9iG+v)c(v=u*B_CL(02opQxQ!xUObM_` z6Tt1X12{=jz<1I#a3{SB_-@(-yo#;{?xsD!_t1NR*U+`V>*#%YrcD{a=z6;0Mtc*d z8|kJ!)~2k;?zU`;Zr)(^-QvwjGXf~ZoJHi6ECU8BF-nFlZ*=)IYG57B3bZ!Xu$3&$14;> z9Lq6ZI6^`uay%GMl1PqK6WD?&5J(mh83tZ7nU{$u#{>ENIXk>^#TRSW=JO7I!^6Xl zELXxPaU!v;D&iz=(i?<bKJ?V zBXz~f&Ea6(*6~9_`TT~kEX+!sac@F6<*J`Zcx?iO)d%E^g~_;6tyDzRpN{=-J6;Q3 zESw1u#aK3?P|PDX_3(O;a6Dg&(SUO<0whc*RyDFU5N;hEof%zvkse{Hd_9}sdy_~h zjKH}l5^*JjBPL0+GncyVU?l_j8aBJtXRG|hVYszgS&xL&$dFnKVUWn6Dr&+Iy5sFK zDU72y+)5NCVIlP6TCuJVN}BPYR4dgg~XS_x&4)TT6vsrG6l-6RZMKMYE$r=CD} zHnsMU7Hv^1+^V=#c&NK4};&vg~4~l3ay6Bh6h+{la)Ckuce>85uRN98L&wQLSY!z|#Cll}$-H z#Qk!>sAr2|H6S^tM@+TFLb#}M5vgqYkV8hSJqQ!G9Fi#kLUdVx$~1@AY~T@`P#jM$_a=r5#@%9JAa8nrgG$T3MI0{H=>)22g_ zMr|t7k3fFVkmr{L%8y*lt?zj?XVyU8W(>|vX=(j>=%w;@P0pyLX&loUhCk@Lx&&>ObsQi#|qqDIC6Im8vHBl|~7kP)7U-y8bueN4LYaUZQ z)d1<#eOCMDnxLtUS5W0AjGdex7PcZJpERoTj6*JoiU?4kg-Mm4d6)M#CkP`FsBN?> z-^XfDSgNfW)T#1QMy{(`DMcQMX6jW-ogzPNBzkA3yD1ippfAbK)Lqgi0osjjTjpq2 ztqqd=tdUtbj=m-$7oEhXc&0v7*Q+V=KBIwc1bh1Ei-qE7=|bLbIQd8wP=IQK#k|LXr;}{iSFZ6DadEE9e2PFG|ovPmbY+ z>UhOaKBbjx)m!i-W^fCBhz{L|fqYtXx$4ESDWU*YViDoO;EE^;Bh@~8G?f_)H`kB9 z+vPLHY^QD+xH9=d_bL>?vxc7bx)Kh??cSt(PScp`*4A(gxU>9Mb7l?X^L3+jMYqu( zUN8n0k0(jRt>0(N{%Pz-)jpdi4;VuWC%i~{SheTJp&N)&h_ewFLiwWM_ekvMVo?^- z(8LMub7%$!&1{RtaNF4~2`$H$Wtq5QM?nbOwpCk`BVRIx(lbcxz%dQJd|4ASYFQwX z?P0X_bvtMKYyn&pUQ--NNH4(HBDm`!lU(1A3#jboPhUxL`0HnUH6XF}+54^a)|Mrk z*-mSxJ#FK?cPC3&l9^`H*6xgLO|yNR?EQAU%ux4b_gjXuEx(Nuqs$)bIxESMRkfqj z@Z<|E;`>^zv5M)3*`C&EXv&>|PJ#8HZr?t7AHt}g|+AgvM5bev3OtDqYA%^rvWUT*709V2LEp1SQ z+MV#@?#$)*6xqheh5pYq2%80v7?946MUeNAV30 zP*|85G*u%;Hh%7^AU``V(LAgQwHhnH%>1y+Bascc%*Dvzi}iN2trSEgSvs>OA&MAwaO z)Oxu%J$3sssVg|sWa5ihWz(l|X)okVY_h2rW$oEwK$qQ$_~h*_o9$u;TeG>AoiJgdGK)-@h40dlLo zhcV9BOFY94a?bw8v+PBlV+VK(dx5vI=Xo1@j_294d=7htx3i~t2YZUoW&h=!>_5DV z{hQBc|Ki>JpS*|tgZHw(^9Ag0d?BmxMeMKqF!mR|nEjbM?2r6#_6L3h`#nFB{f;kZ zzvU~~Z}?Fto0aU>{Al(B@5}v)AH#mhk7d8$tJvebpZ%NFj=f2Kx>_lYN_?#lFSQX5ZxN z*?s(6_6>d>`#L|LeT`qhzRE9TU*Q+AFY}Apm-r>@i+qHAfnUl#&o9e;F2A8QlkfgN D{Was1 literal 0 HcmV?d00001 diff --git a/_vendor/requests/__pycache__/structures.cpython-310.pyc b/_vendor/requests/__pycache__/structures.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..f067becc8126d71d579bfef4dd1dc9449f3392d7 GIT binary patch literal 4395 zcmaJ^TW=gm6|U-@n`dmVNwVHJz-|i!;{kiT>;**dhK-zESdn!QiSjT@)YI-N+a33G zkE?2IJaQ1ok@k&0fRGZ27yluI`jw}B-Z!53PWAL$;xRqy>aM9%=lY#fr_-gSI>WW} z@26q6!PtLjGJTaW`4qQ)fI+Yh6I?hk?>QZZGvSI-?Dk5XQm@=8bM_l1%A)d;iHa;= zxSa~-RZ+vdCaaj&#KL3Nst+I4l{_9uZFE~3H3-c>NnQW*)vI2A5SYN55P9Y>FkU}B zmCE}=!K3~SRAVikH6AG;l@t%6(0s$`KPRhx8T9*6a*!>5IWWOqEJyQ@_Do+cCZFQg zdl)3^a2V?d-f_h{WadlWDdom>%DGXUidYc!m#kA24Y7!4O)QCJJQu`UVg=8-_>Q=N zXG7c+xA0sPZ;MqtmxKd1+|F+91X_NPXqo89L?@Ee4*mr_?t39tHlxXs*X;_dcDtK# zbR@lW@3{<3yI%KjebMX3vL_Rxy&#Ugo-~K4zO(sz zJd=8RlA;Iy>$dmg&`$DrdkQ-D_N3B?skAc4Xy{3EFAlUJjs*{CHmpV6E(EJ}xW)uY zC|lj`#>g%bzfN*i2gj36ajD^}HW?Pt+jyGqH~&ZPuYji|D5W6?B&Q=cz(41Hu=1 z^-u;#Fa1@MYzE#oWfGlj}lUhT)rDRs4T@r<%VkO?{Mp%U@+{0oim@Gqwoxvsz>YvKWERKbH2|b zcJBO>|Ba*Kvd8R_@3ve;%(9AaP0uR1buBk5X&LWlCD#1$jtz7FS{O4*t-q7|!{*v+ux4yuISD*|xP$Rk3vGD3X$ut(Rdh9aEW$ zM9#_)7+gq4W5Af2eLQ#9bE;#(+?#^tY4RmX|Z)5l?Hax5T(RsmN z0Mt(zXU7h~*@oLX5Ab!`?`JhS2n0pC(L>dfVs5+_whv^2qek7kOA;uToWHEH;nw_k z!vzY!*pAaMi1oepcz0_Aw2GCYFL@qO%9ts15&kWQUy?9#;;rkEZwY6dK^~+{JG7e+ zW5|1){ASHZqvFOgv5;5qVf{@oRec}pzQ0Wjh*O;pzdPSjOLs+j5kIwt%`JD>en^c3 z*+k&L$+_X}4GgNdIkatrO*;xie)`SuBVOch8(I%9Hnfc*wC4!x8rye9Atr1%Hf454 zQC4@bC#zWz6y^#Bc>fKX)%QVlANMG>@3P?s^DMS(@_yw1gtu(Xoa@`h6o+4vJR4qT zexgp%UP)B)iH-34ctM1@;TI?n25`UNFL>e@_c1f2bM~tI8aabEp1&QTA+s^RL zJXhw#GqIk|eNBZnNA4?!EGV>gt&%x<-v!NFHU5_B<7c=!ybk$5I6} z%-~?m6_`>Xb8%v+7D@lnbt)i>mF%MqJR%AzO4prUIawZ)Wjg(+?eP7q?)$w|3}Sj; z^nGdtMk~lrk%kcP7V)MkspyDP@6h1U@BOH}bM|D9vo?tg#ZW z->Fq<<(fPCm1+x%x!Xff&0ORyx-=DwnJ<~f*KD8LubG88Uo#E+J;OWIuaVuI8q#(# zt3OQBqd}iOO@?bU;$tFEXI^aoEj6Ghtm{U2Rv%;ICC?UoKg7p?hGQqrAs0U-?qq6(14}n2dQN%|!ftV0!Lgw3iv67l z=O4&QoL<8P91dix*Bm;{do6BNmtsvO8RzF?-TNkn4+!-p2_vE&bdXOILKPjhZam%w$#cuE8KS zQ{c3?{1piIaOb8kPst~psdH;BD5`(zXEc0319d-nT3EQ-v>-m&(kQqgzCViq+bI8n zc362I;q5VQy@-MGVA-jaYVM7)qLp0;BkoxvOyd||o%F3cYK?7cZ}J*i22Eb0Y=NMy dQ-+O!mDRTM?7l~Eu?KaDEml{Y75CQX{{w3ZArSxo literal 0 HcmV?d00001 diff --git a/_vendor/requests/__pycache__/utils.cpython-310.pyc b/_vendor/requests/__pycache__/utils.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..b9442706188ed781611c0a9e99c779debf0730c1 GIT binary patch literal 24281 zcmc(HdyE`Me%|zBW_o95AAE|Wbh;MxAeY)*zVx70e282wB}&wiM=qt~h}38})w`VC zd912?N$%Y2Stnis1c_`U$RCN%c9ynd`<&P?V89OG#6S*)lM4bT$RCE$2n@sq>cz%TX~^O`-1=~1q%_hPEsf$jt8(=%jjg4vlFrw+HMW(uN!qJ#Z|o@T zXzVQQlFG@dOz+jy?@oRlfn_civH_Dg!GKGrx;I?#B&^n7EyG~SpfO-TN5 zeX?<|bP(y0(xG7M`r-ST(h)VPwy3Q?WtWbsZR;-t+4UFI_FzQqP&+@d)ML9d_wD;u z>7~G1d|B;Uvh{DM-D=ObGo@qdarFewzWR!K66aUcSCxNp%qCGwP5!jPo?=IiilDp0nx& z^&)a+)Jy7RoX@Fa>J^+{S5xX$oZnE#)d`%>tCQ*!&Tp#M)M=dGQfJgO&KH8W)mgl8 zR?Vn$xW1@fS8w2aNu5`3;`}xBmb!rRW%ah2#rcZ5s4n3=C++>3x-9Lzs;;OxV6fKtTdKc*<|5U z&dk{{D;~V4RiFcPwpNYC?6}ydECuCTK?Rv%Jg{8RVNhPt^-nF7NAYYm&{6nZJXbE? zMiEq2F5|f^Z_J!NJ9D}G&gl#1&z_#Uc=<{^8nw#JN>sZYl*35ZnhRsOIRAEKc^S#L zaI+GkOPC#JZ>~l`7#9|T2%mqqhV;&jbUA3=uIW~@5j3NCsMd^vg+Q01)#V^WdqzwP zZ$;5^xn2vSv3y))C9CC|tIL%zjCXCm>ZvRH;YuqCVh62=^D9kr<>6bU%D8~kN>kGK z+-=oXYpE72R&;q@w;E-|?sDUibG3T#c1s2CR&3ySLUMWa@`ZTE z)us;a)S9YtvmTsjsnr>+TN>Z6Z5n-Xz8MD1u*U8(L($GnHiJl4<6K$JpI*WU)P4)& zfbMqr!Eu(yux*d~ZFl^7cwmklQmIyhQ;!W>+fQyT6eY zgTvC`B@*0BljB+%l8cL&8yfTYf%R%Tf4ttRR_Z5XYjUn_U!RPv18sZqzys^l*if9q zVCY~W9z5SzZs|x!BFpW(nd#eS)KY*_|(A)-_7V(@aTgV4@QmUgUhw$iKwD6XD43xu=Zkb`)KuGy>|29 z@@jOe)jXKO-$8-D$>r5}hg6wN(K5atGgq&^jvB)$9BiwIe>uy3XgjXuTDIkWzCF9$ z9+f=LcCA9zvpvhhHA@yPbH}yyt9ZPJv^l^8nnyXD|8Tt=39i`8NaKfJ&ey3k5&oEqPz)5eN5WvYQ_1Ku)@6>w!*Y-MXJy%XBi}Tz31Q>5Lgh0T5MX&lR%c>FulX12d1&t8+l)qI8D^aBNal8nqWU0QU#-n_^3>J~r zcPDLk!SO7NcQs{%YJ3($l1DjV$|Hlw;`HIGQ1gS^K&nMDgZW0K<{ z=e2eY-)ZAJodl4aMK{UMvWtYxZ%~3sjCARU9t4nJ80*%OmhtN@+pr`$-NAo-iG#!0B{FbE7Gh9 z^tnFLv6mxd-M6d^>K&ANKQ{H^yDijb-N_`i{2k^*qsr=79eY>i9%YY$fwwqcF4qI_ z>Da+3&dq~oHCwTDv+^u@F_j>E44JP2AVH(n1mThrAu>dOz6q3Hh;E5E0jVPdg^EA} zF#`Z7C2!V*5W-qJ@LOi;@HJDIKz9Ow;kcAymb~X?5H$T3P!2DG6ca&6p#&88`)iZI zqzE^yl}Mi1cXOXVU#~1kIkbtz#wL9uG*wppIykK#wG53`TfpjS)YtGy|NMre)M|ca|IXJYukDEFAGJ3$zB$vKe8We^=!L{@>|^^P}qLx z0jGy;J%{SfRoOr3-!Ky0NqZ9H7GXNBLqY&|w;?Uqm>k0$dmhq4Gp`)wemfI6XGMBw zuZgneHnMAO!(GdQbK7gV4({G~YAxUPP!p$U9yNK%MD{kM3Qid#sYtnjj(6YE(;aUu zXJOiWxVMwTyEFPNQz|Nu4Xh2Q{8}LzgtSn^1bwelSf>0i^G_Xh5LYl-I=w) z_E#ZOpY=?hJAZyEF3uhIav~JhD|TWSnRV zAm<;XFrk0^W5`x%n=#e5M%!@zXHrNq-!eAXel-PUPSEb;jaHU1wJIygEUowp5G0#E zWLU$2M1%xD&(6$Uo}TT&RSp;VLCD`89KHn%xEqnrn9)v=WrO?u1UsmKH;#jgBQhv@}=c-=P%4$(Iu9> z#zO8g7;{`e^D0dRElI~71TFKHTyPh1NT?rU!9oq#hB*pOr*|+TrvgaSL7YQdAkgU} z%pB&I03mDDO4QP!nWoRQ$XaD4W*IN z+_V_mtKa3j9F&3>SBpIn?I1B38Nlbwe7&_$YnE&MgE8FO>EA=y@B$7+Fj)^%)`n2! z+L+A{p^8>ProD(}FyNkT4+ADf?d_KLgHhLYY|DFS|6nvvAx(dX3co;7 z9Cr~hW|0u42XoIo2aL_qUj?JKBC_nKz`mT_8RafH`e~#wgH#UbXCp9W=o7$+D>7q9 z|LJcm-##>_p(hge7ob{GISvH3o0UeF0huY#y159B00ieP!w?@>$3K0DzX#Sy>ZIr* zkyR8Ls*603p7aMe#2)ojJ_)jPP?gra)hl+z!_o#BQ5OB*C=$}zRkWX@Z2C~I;-aU6 zc$Yuvp#O!0fyGV+AO#f%aw%cb;q`TUjZkT6$TWmbc1dW`P_UBwPR9wKZbF7wcRNnU zUVufY{~5h2%C6_+=~v_pS%4>D*zMRxl-uw2pA zTL3;0AcQ8;nI*-VG=}I(H3Flrww6~@NyX?c<36n=^)Qf{7FQtnYoig6xFFxtFr%bx zK8!NAD$NBd0#pMYSO;~4QJftc-k=>_MUH_9cd=D##(A_-W<9W_oTl@o+VVL_zdM3^-qqk~zV-N2# zaN|H*i-)_NP!=#OvQ1@tj;aHp`bc|wQkd;s4wO6*LQ2hqllZz~*0o37QQ!jv1!veA zeNgZyOcZhLIlG7`_ExL#5T!ncNdNcnNY6ANMsOOir@}T4-x9))>_rEJ4B}VTC&>h8 z?~QEYfwJ%0KQRc~fycQk%*U{2 zfD|X*Wv7Cg*de4bj=QRbOOyqn0+|8u=PThYU^TQFhvQ=3xj8#Fpg%(E<9uTY1l(BO zAc8oLG8|cm-HJn}kFwy<8NkZSU0P}=A?A$u39-)OyQTav#;OcUU{%+a!COETxRyJE zOg(zM^v9@uABTsE9oQ~_dKf_e#KWx^lmawq`*SJNGYsUb)EKAnlX0a!2;m4uAR-aO zA%Jz{MD9HGr)^OdKyH0(MbM+DLytL?JcNijSPt1u25^yrSPoMGI}&0u73vxUa}*G9 z8?*^vMP1ekDKbTyY95FzrmS6WJqT(F3;=2DiyR z%zH;BL?R5kbv?Ry-;i&fGT*$m(a10VWT|vY(*`@WxpyRg_QCUijrNV@wXj`^Sb7MD z*uB|m)iu#YALfDL>33mx#;CyP)dx>o#2CAI9A6;u7x0X?)wQVYgO|9ePZ+wF+0^zul`3M2jF=xRqB6?+)YF|$V=L`VwaEVpX7BP zZI1Ny+eK0)^T)`fw zk~;6u5-Q9zs0Vc8grHyPZ8BJ)=LQTpwPv-x0uzupV$_5I&T!KAPxofwEwIMQ^R!P@ z$ehiar7Yyg2~&k{sxakYc7j|eH;irPmXY%sH3hi`PkxQwAanqlni_+k+_hjbhjLf1 zulkjF*v8~T0qAKjfG<_Tq`;k)h9OvF)hW8|raq8ffrT?lJZc~KB36p8PE4ip75sR( z#e$0V8!PpwMom7dHP{&N&?+PaFi_(gqDK(+H({O{_Nt^AbLhuJRu!0JnF>B1&sVha zr>bBq;nWB0>JJh|NPb|N$K0fS`}akyrJy~0=+Blt*qzdVSq{9>(l-<5cU7yKEPLZk_zBFk{K98K$i24;n zM&`AKX-=6And<#|^Rk3>@yjJ+)>soL!auO~jydsG2)guqZt9zOd*UNZ+DFM@1!5gX zuBl+5{|=s}Bo|@~W0%9*j|f}7P-%mhK$X*dtZ3~Q9o)6_KSf3lB2Z55BEnr<)HWl+ z(KQ=pUmNP%7KJ(9v5#jkzwLEM&-BeffplonPmusA*Pus&8PBUMFyqApGaxSmQ``hI z@EmG%q(&k}uJS$@@+EeTbUCN84<<8i#swr*(?1G|khG=iF@<3s7E^Bn5FnbJ@f(SQ zVH33~|3pHu;yN&6y?@_)t94?p(EEHXytQ{66H=ep3mm%xi)~7}q;`rch;889URj ztXyF~QKC(4&L7M|<^AG(?D;zKZ@T(n4L1ar%thhBeRrmOR=D<~&qluKgTIm4$eR5x zosIHt>H1WVWR7G!uug26koup1-Z8z_aT0A>-)Dv^^G*L8bAO(PM;T_43CEg~S^Ehm z+;)_AchYhV+chQ~Ctd+6tNumY=rLbY_~hi9#xHyyhfYRMP*?=(#f0jz-BIOW3QaT} z*fn6i*_dLOcoqy>5_iNY1vj?C8rG4bgBs@nPEtOD=~Za|=~WYnKmborRDcE?YX4<= zQbPFPFy|7$6d>+Fqz}dn{)vM`wZKKF4eMs~eRI|AU2O zg)C1-!}xeez+6MMa`Mg1rPi0=WeUeeT>wv(YQ@$oMiUue0pMA&=fX#R{eg8I zr@e4-%(LY zUP%wNX#u+K57>3=oPwu+6{jAmB1LtnY7Q3>oaqXN6I!2W%~mj>EM}GS2@JY&?RKwm zXWdm<7-JbT1GCC~P@p+KmgzWYiu|`-PrE-2=rM$oID8V1Z6f;ib-nTCPC>4xVMe5< zO=Q?xpXt8#&qK~n<2Q`wln#Y%Q43t7UVw2w??Kl zN&zfv)s>KuWIq1a!f++Ep%*zhM0 zoPt#rl1X&py}j4>-8is+^7&I^OrE>}Yh9LJ~W0zDBXX}WW z&|`%-XPOx2L@Nv9V$uqUeuR0S?+W8Vb2f}%SY%g;tC1SBax-=yM;abFf;R+r%dPn` zVmJ^h`USE|G@s3{O5}^rNLJ*R1#b@+D@^<_V8Gl@(n8F@PMG`ck338N4vO@U7I{gR zpD>JZGiikbbnDR}crP*aD|oPOXY?K#H$Wf^DFhov4333dU%_vr;JHHjIprCrAP8bD zC5UvM_6+|Ub90ycHzX!gct|fWnr;rKHna3c0OKPVbSllX)1jFl9nNA-8z5@i`}Q(+ zMklLq7T3C&9sp^9K(@E0<2is763nT{**1DL!B6$MzR z92g+)95r`X7k_Z-K7J*FeA<8oik^1JqF@J@N_4GH&Wa=mLvYTx(f=6XKTsQBgXs(D3)lqd)87$AAo8OakXPTmLX)amwELvqR=)zH2;6zTr)>$`sN+ql>)G>O?0KJZ0XjF+~4ww;d{i3j7x zJp|Mw?!0G=I}d_W;?6U1aqWS$tk5T7{iOWB>Qqu5_2e?wkSor=KT7d~noJ_`z=E0L zzBp`PX-o&Zhm+_j1mYNK*d*SA_|oFtYAA{)*fWO!29=mM4o~_CU>HFel@R1{v za67_5B+Z~zFbV7RnVGans-SZlyeHviy((Ax=N>7{C6626NU6GOr1*a=%gHp?{|=-u zR@e}$^sga9;7b2nro>(J>qy1Lt7iI12#@|*W(~{%gXJ1{`k$CH0y2j4It7SO{~jxO z6pTKyGtQHs_u>(^Xyhq(py0TOnHdIY4>L^J-AZ3KV`2Uf#oA|1pP4>8bMEyw&cFHA zg|}xfUi#YQD|1)hdH3trN|l>c70fT(sx2+*)BrS-z>v}y{fCYq8h>n8OSEkROH~LWG zPEAefsZ}cF@DHqKjggq}C3cEW332Vc$qJ7j)^zw*A6WZlW0JEG^)v%V1YzTR4c46I zN+WivxAZ3W(pOM(JbZQb@(e=$-D-rQqtx3?n%RR0+Y^iW<8Ku_T=m=h>&%?1Tg zXoFvgI>9F?9NVi;B+(V1Q3`OM*qcE1pI;7)Z$`X9CO!*;nj#`Yi&LXNB<=P?7HQlVsW6y$ z1=103Z-46PXP$j--~O=!&yOFRdiBJq*WSDF&Gt6r_Gdy2al^`d0KB1XQMyrc5Rvhx zIK^9dSIo8Lgv8_R-7MO6lidD+93&@#UkXdGYCp~qr2o)Gj15K)p|_)m*VBKFtR9gf zkBlx;t>YqPswSWet8p-Ii4(9nKui<=fV)v9$|A4>EcYJfXi^rTV8)hV1Ur-4$-YKS z&*mB08;(oV&D{2X6Ro{FkeGq6E&8ji6&eMrTrR<25Dek@ONi>Iw-E2lI~5Wom9XGk!~GW-FDUpX>)_@!f$hbIr4ISrn>Irq@PBQFR^ zh;qh5TFp7=J|-yTN2uq}p-HK!hpjSBK{DF*i3>)@YooKV0*zwRN;QgeTt8M_!gZ^< zgqYL;1lC7oh_g)t1;eU^@Gixm*hVE>5&*#CHZ(y8d2z0`3_BErQ(Q>Gy;;Mo=OxQa zf*saRHCtI2;WK4KgrY2q{5*+=D*jGy*m~01gNd(yfXklAjxrl@K-65}K*AL6WOijv z!rHwnb6VU^>o97qLzV}K!f^d?pF9s0o4P{M`LHfl z^nd3yB7v(*i0X8u>mMMiuN(FMMBcBn-zcAN&u_IPr>Dor47yW|J;tzfm^7djr2*(* ztM=+v1B%zsqatrQ?VXRNrE_zD47OMQ4;~KT0B{*Fa(KD6+}Fl<1Sav?^6eMO$&mjx z+e?R{4R~;!;^)vl9%={e>}fYgy4&uLaghoX%7&P5sy#?(H(~k&3y267LhQK^&`ALv z-{SCFsHrSv!e?=Imt4J%x$U8d!MkY<2A28CVIxe`y_j2KwJS(kJg=X`3I` zIO`L%fQmw?yjoLOoM9*mqIk1aHjA!qS9FbQ@A`1OJ3lq2r4YqA{W+5ywK+_*EFuY- zk>R`K%_iWeulMbEIO+XlDrpRDKdoS4YDoWFO_kZo?{gHMM2*8aTkIkng;58vZSS<) zZ1FQ*yN4}2dSMn*>rHg5zQM!$I2fye`3hqm8Yd zE8}PTAkU((@*`3t<+1X^+t8&%(7+xyJK+Ur99aC4{$%G3CTSP(0K`)%RP z9AM>OAh9||Q2|aOfM_~dG6 zj2_yBux_lC#r13C@*p5+0QwY6I;iWzLna3h@J5=`e2RJC^X_6E%h+;ikSWUeFf<^F z2z8FadW$kpzhUDI7hvs`lwM5gC`AKc7Fdk;6Hi(hsPF}r#ustb&M@F$Fe)w%VXe#G zHlU!2Yo1ZzzYyK~_curPc0B!)Y_%!^JcimAgjP~59x+EC8;u}<)NNpvZh|Uhg*jur zK^8v@GJ3!g<02-SD;yp#Nd53KPA*3>x! z$;%QOkBe&=(QI^nL11z!fklx{z@!nALCc;B83iFTNLIA!|IBt0s$&n)L}C*})ZQ)T z4zrFS9O7cyGi9t!7K1sqPKZ6}Y_QFEm@P=ea=b{sJI)zO=^v&Yj~tM{L=VdVjF`A;iD%$bMvsO+xl@d zy+@$uD3UV>OzcF0)Rkz0T%=nRY6}$-Kprj04h#<{B}dAll2-PDy9WLTkfcLuh}!~)r{EY2 z5?r|F!ba)>=$_{ha_g^LK}aH8$`!!{?6v_|AiKe;Em@?U*y%S37vfLh{V6O#m4eV= z=pjlUO>BoU5Q(QL>GCQ6^kxqO#wCO{#5g~^HBHhoL8=s$NC*{Xj|;||G#fimrrOTb z!GrA_QaA%^IF~d8OvBQkY)GYJIT^G#pS(OycD8{2P>^aF8jN+QlBTUN!#{kuB*AWxQg=KKQg=SsMGmnBpVGT z(zHwn#v;~aL-K^lX^}nxtbpQ}V-%sPid)gv$7r^~b`UTugvY?blC-Qpa*VT({vxbX zg7Z)x12Y11!s1Uj;bp~9w(?78m}sc*)7@%ekpk8&r0e%L`Ki;8hGaZNZh`S&zP7Mp z*7eE=*P6>*r`)16)2c)2!MY?64GDr$t89vp@|?slC0=qdLtu{;M0T28B&0U3Xh03K z7t5C}U;O$t)=SxQIib#;*M}+ZG8CCKla^?+HXAf`307jnv#KQPZ-OKf3WvT6AO#Lg z`DdUO2T<2J&^)$YN@(8Y zYAyp<1e>^kUWJvlf=JA<0q%hzU7~&78|b#xR3)_#^5Vf}a3{sEc%%>1^wWG>-{crc zMm>G%8s`TAdUP;{`9Z(vDAwI<1wY`DC_Rok9*mgq#)+g=VGq+rfelwF!M6i@Dxyee zRi%<-w=c>t8aW5FVssObA4F&_s9}c_!IIBs;1@y~PlhKZ7GlG1gaq9ob ztw~j7R#ld&B7P^i(r`{=(*#jhaJBK*o#!-%(NK5~TClMu{1k*)e2CkA#n5A7bxV6= z677QR1opdd@)7&u$TMx{z`+CU!cq_{PeA9o9iX@-&&*C=JbQlj^-WzNBR_>F;*qpJ z5+~~#JA*@oNDKG`_z!USP#@2I64@ zteqb~Oa*j>`?UReYgk2>sP-3AwH&JlicklWcEP&mnHIv%KSeO^VDTpwg>RGixPkV+ z?2;n`ripyO9qv+9uQivFxIhE35DyaEl8qiN;Qo| zsOu*r<5daXMVM~`R9!eZ^)FiRy+kskX z;O4hcmWxK3OZs2)72o5b4_3BH@1;?lQsLhvksUx;7=LX@m_U2Q3WII9X&Xc!rtts z{O)#+aTiCA=vUBJ?EwkGmx64=O&K*5czA&@->dZ{+CHIbX^AEqYxfHI>%xFlinK)Z+u3#Gy z>q?7j(QjS?^GcAiLE>y;B8~u>Z7b=r8+}S%J|sdNU5rr=MrA*`(f?Ek9>=A z9k2QGxJdx?7ST@5p&>om3D-iAeN5vQ8g~QTLLBewc`Q8uB(3Eb28Qr28>WOprw~5Y z$#<~V$XbD>1MOqoIzqcT1zEQasFSTZp2MCwPA4zvapkP#BSe*S3dnH~7B(=Cb?3rI ze))CT>VodU3t)XPH*-M^#2=m*`z$MeDv5-R@Iy>ZD3rn_jSI?1%qHUTY#K40Okkg? zfpFHO0<++REEeV^3T9?mI9IV^A(CELVX#RmoAtSr9$2rWV%adm1@U52W8bJ_4?Owgq|S0} z9&UjEi`jpliM#f3BD!?k%H3>yQ4Lc!S#-2 z2|tIgyI{nG>m_k`6jNwb7^epjzK?#7?tVbPIDTe%2b5cZdLE!NiC{?y4*F7359|d= zMY5@fSRNof7&(*!ah`|1F5g1Em;+|QD)3={!M>);*h5q#tibN*4|3>j`v)3ax3`Z; z8k|+r_=Tb$XTYdMPyhqp104yLTJ|%R{P>is;HrmqjNMx3t+8^i$Pp z?ql4xS%SxHn2fNGNT3kD6|=5}Q-?nKO~EO$&w}ynY|2e%4C+P%n0e8ZS>y^$99u+T z!X>u<{W7}7teh-%Xb-(%g8SGse}CH>GwRzn9@tZU`Rv1%@U%1_pUi;1zMj#SQO!>F!&X!z8x>HFe#jsH z$^9N6BFpKr9ZEMKVX&R+IZl+6?R4yL3z!C?c9@4=qWFS{d^!F_CUqTGa` zWZUnGz_1yUOc0cz!31biKSn=P@tadx?n8h5I=<0Jmo$GEM&KA*Xim$fK86kC4Y-JA zDjebi7N_K>-((eU@z6(ELx314CTJZ|=SlV?Jqz1&E`kxUZx1ZHc&eudZQS?p6Dqol z1bdK%w{)K#uwDy0@qm&RvH1i11kbiT7}9WcZ?k(dyPAaHMLC5#j21#lC=VvK`L_{m zXtvZ?#x5ubPcu<$um-@H4dTL{ZQNG{t5va_7}{&Pf0>K|_Oji)YXr7>!v});uu=eq zjT$$5GkjY%N1JWGdK#O&aGxc=Rh13Vuv4yaHgV@wR-Y)E{!Q$_Dn`3*J?-bO${wD^ zoWt^8QWzT-5Sh7Mfm+py$>B278~d*j?9Gl)bOplIJW4)HgA9U4#Uc?8$P?UEu75lc z`N0-Ql?OSRWYfdgjfu!$JKU{FG)-WHm(}lKY{#r~V#yz~5EiSU7G}n7aqBn$2CZlv4*nmdMT6(&yW&a1UIGf!rrT@0@ z#ySrK2D1YujS40Nkeu4^Y<3TqQpi#&y@yxWB{Vzf5x*rYM{_`6CF+_Qj4hzd z+^j5Dk9Vdff$7ubGgoKNUYIFgIz9JBJe1~Nx_Ei+ijm!pu-?PyaEJ=^N<=m#yL8GP zma-|HY>_3~K*=UJ@o+K_jY<<5t(GlWWSa`v4L}wE%VI=Xye12@^sn+IzsbYz@bG;e zexHY!hd;z29)PmkM(`7MPx}*Q{uvK{&I3a|Bzi$Y0gQu%-pCD`nb>Q^KqV#-v0jJ< ziGXXGQ3CxM%b(`q3=h-;L_8GvMR=5ewBU>o` being sent. + :param stream: (optional) Whether to stream the request content. + :param timeout: (optional) How long to wait for the server to send + data before giving up, as a float, or a :ref:`(connect timeout, + read timeout) ` tuple. + :type timeout: float or tuple + :param verify: (optional) Either a boolean, in which case it controls whether we verify + the server's TLS certificate, or a string, in which case it must be a path + to a CA bundle to use + :param cert: (optional) Any user-provided SSL certificate to be trusted. + :param proxies: (optional) The proxies dictionary to apply to the request. + """ + raise NotImplementedError + + def close(self): + """Cleans up adapter specific items.""" + raise NotImplementedError + + +class HTTPAdapter(BaseAdapter): + """The built-in HTTP Adapter for urllib3. + + Provides a general-case interface for Requests sessions to contact HTTP and + HTTPS urls by implementing the Transport Adapter interface. This class will + usually be created by the :class:`Session ` class under the + covers. + + :param pool_connections: The number of urllib3 connection pools to cache. + :param pool_maxsize: The maximum number of connections to save in the pool. + :param max_retries: The maximum number of retries each connection + should attempt. Note, this applies only to failed DNS lookups, socket + connections and connection timeouts, never to requests where data has + made it to the server. By default, Requests does not retry failed + connections. If you need granular control over the conditions under + which we retry a request, import urllib3's ``Retry`` class and pass + that instead. + :param pool_block: Whether the connection pool should block for connections. + + Usage:: + + >>> import requests + >>> s = requests.Session() + >>> a = requests.adapters.HTTPAdapter(max_retries=3) + >>> s.mount('http://', a) + """ + + __attrs__ = [ + "max_retries", + "config", + "_pool_connections", + "_pool_maxsize", + "_pool_block", + ] + + def __init__( + self, + pool_connections=DEFAULT_POOLSIZE, + pool_maxsize=DEFAULT_POOLSIZE, + max_retries=DEFAULT_RETRIES, + pool_block=DEFAULT_POOLBLOCK, + ): + if max_retries == DEFAULT_RETRIES: + self.max_retries = Retry(0, read=False) + else: + self.max_retries = Retry.from_int(max_retries) + self.config = {} + self.proxy_manager = {} + + super().__init__() + + self._pool_connections = pool_connections + self._pool_maxsize = pool_maxsize + self._pool_block = pool_block + + self.init_poolmanager(pool_connections, pool_maxsize, block=pool_block) + + def __getstate__(self): + return {attr: getattr(self, attr, None) for attr in self.__attrs__} + + def __setstate__(self, state): + # Can't handle by adding 'proxy_manager' to self.__attrs__ because + # self.poolmanager uses a lambda function, which isn't pickleable. + self.proxy_manager = {} + self.config = {} + + for attr, value in state.items(): + setattr(self, attr, value) + + self.init_poolmanager( + self._pool_connections, self._pool_maxsize, block=self._pool_block + ) + + def init_poolmanager( + self, connections, maxsize, block=DEFAULT_POOLBLOCK, **pool_kwargs + ): + """Initializes a urllib3 PoolManager. + + This method should not be called from user code, and is only + exposed for use when subclassing the + :class:`HTTPAdapter `. + + :param connections: The number of urllib3 connection pools to cache. + :param maxsize: The maximum number of connections to save in the pool. + :param block: Block when no free connections are available. + :param pool_kwargs: Extra keyword arguments used to initialize the Pool Manager. + """ + # save these values for pickling + self._pool_connections = connections + self._pool_maxsize = maxsize + self._pool_block = block + + self.poolmanager = PoolManager( + num_pools=connections, + maxsize=maxsize, + block=block, + strict=True, + **pool_kwargs, + ) + + def proxy_manager_for(self, proxy, **proxy_kwargs): + """Return urllib3 ProxyManager for the given proxy. + + This method should not be called from user code, and is only + exposed for use when subclassing the + :class:`HTTPAdapter `. + + :param proxy: The proxy to return a urllib3 ProxyManager for. + :param proxy_kwargs: Extra keyword arguments used to configure the Proxy Manager. + :returns: ProxyManager + :rtype: urllib3.ProxyManager + """ + if proxy in self.proxy_manager: + manager = self.proxy_manager[proxy] + elif proxy.lower().startswith("socks"): + username, password = get_auth_from_url(proxy) + manager = self.proxy_manager[proxy] = SOCKSProxyManager( + proxy, + username=username, + password=password, + num_pools=self._pool_connections, + maxsize=self._pool_maxsize, + block=self._pool_block, + **proxy_kwargs, + ) + else: + proxy_headers = self.proxy_headers(proxy) + manager = self.proxy_manager[proxy] = proxy_from_url( + proxy, + proxy_headers=proxy_headers, + num_pools=self._pool_connections, + maxsize=self._pool_maxsize, + block=self._pool_block, + **proxy_kwargs, + ) + + return manager + + def cert_verify(self, conn, url, verify, cert): + """Verify a SSL certificate. This method should not be called from user + code, and is only exposed for use when subclassing the + :class:`HTTPAdapter `. + + :param conn: The urllib3 connection object associated with the cert. + :param url: The requested URL. + :param verify: Either a boolean, in which case it controls whether we verify + the server's TLS certificate, or a string, in which case it must be a path + to a CA bundle to use + :param cert: The SSL certificate to verify. + """ + if url.lower().startswith("https") and verify: + + cert_loc = None + + # Allow self-specified cert location. + if verify is not True: + cert_loc = verify + + if not cert_loc: + cert_loc = extract_zipped_paths(DEFAULT_CA_BUNDLE_PATH) + + if not cert_loc or not os.path.exists(cert_loc): + raise OSError( + f"Could not find a suitable TLS CA certificate bundle, " + f"invalid path: {cert_loc}" + ) + + conn.cert_reqs = "CERT_REQUIRED" + + if not os.path.isdir(cert_loc): + conn.ca_certs = cert_loc + else: + conn.ca_cert_dir = cert_loc + else: + conn.cert_reqs = "CERT_NONE" + conn.ca_certs = None + conn.ca_cert_dir = None + + if cert: + if not isinstance(cert, basestring): + conn.cert_file = cert[0] + conn.key_file = cert[1] + else: + conn.cert_file = cert + conn.key_file = None + if conn.cert_file and not os.path.exists(conn.cert_file): + raise OSError( + f"Could not find the TLS certificate file, " + f"invalid path: {conn.cert_file}" + ) + if conn.key_file and not os.path.exists(conn.key_file): + raise OSError( + f"Could not find the TLS key file, invalid path: {conn.key_file}" + ) + + def build_response(self, req, resp): + """Builds a :class:`Response ` object from a urllib3 + response. This should not be called from user code, and is only exposed + for use when subclassing the + :class:`HTTPAdapter ` + + :param req: The :class:`PreparedRequest ` used to generate the response. + :param resp: The urllib3 response object. + :rtype: requests.Response + """ + response = Response() + + # Fallback to None if there's no status_code, for whatever reason. + response.status_code = getattr(resp, "status", None) + + # Make headers case-insensitive. + response.headers = CaseInsensitiveDict(getattr(resp, "headers", {})) + + # Set encoding. + response.encoding = get_encoding_from_headers(response.headers) + response.raw = resp + response.reason = response.raw.reason + + if isinstance(req.url, bytes): + response.url = req.url.decode("utf-8") + else: + response.url = req.url + + # Add new cookies from the server. + extract_cookies_to_jar(response.cookies, req, resp) + + # Give the Response some context. + response.request = req + response.connection = self + + return response + + def get_connection(self, url, proxies=None): + """Returns a urllib3 connection for the given URL. This should not be + called from user code, and is only exposed for use when subclassing the + :class:`HTTPAdapter `. + + :param url: The URL to connect to. + :param proxies: (optional) A Requests-style dictionary of proxies used on this request. + :rtype: urllib3.ConnectionPool + """ + proxy = select_proxy(url, proxies) + + if proxy: + proxy = prepend_scheme_if_needed(proxy, "http") + proxy_url = parse_url(proxy) + if not proxy_url.host: + raise InvalidProxyURL( + "Please check proxy URL. It is malformed " + "and could be missing the host." + ) + proxy_manager = self.proxy_manager_for(proxy) + conn = proxy_manager.connection_from_url(url) + else: + # Only scheme should be lower case + parsed = urlparse(url) + url = parsed.geturl() + conn = self.poolmanager.connection_from_url(url) + + return conn + + def close(self): + """Disposes of any internal state. + + Currently, this closes the PoolManager and any active ProxyManager, + which closes any pooled connections. + """ + self.poolmanager.clear() + for proxy in self.proxy_manager.values(): + proxy.clear() + + def request_url(self, request, proxies): + """Obtain the url to use when making the final request. + + If the message is being sent through a HTTP proxy, the full URL has to + be used. Otherwise, we should only use the path portion of the URL. + + This should not be called from user code, and is only exposed for use + when subclassing the + :class:`HTTPAdapter `. + + :param request: The :class:`PreparedRequest ` being sent. + :param proxies: A dictionary of schemes or schemes and hosts to proxy URLs. + :rtype: str + """ + proxy = select_proxy(request.url, proxies) + scheme = urlparse(request.url).scheme + + is_proxied_http_request = proxy and scheme != "https" + using_socks_proxy = False + if proxy: + proxy_scheme = urlparse(proxy).scheme.lower() + using_socks_proxy = proxy_scheme.startswith("socks") + + url = request.path_url + if is_proxied_http_request and not using_socks_proxy: + url = urldefragauth(request.url) + + return url + + def add_headers(self, request, **kwargs): + """Add any headers needed by the connection. As of v2.0 this does + nothing by default, but is left for overriding by users that subclass + the :class:`HTTPAdapter `. + + This should not be called from user code, and is only exposed for use + when subclassing the + :class:`HTTPAdapter `. + + :param request: The :class:`PreparedRequest ` to add headers to. + :param kwargs: The keyword arguments from the call to send(). + """ + pass + + def proxy_headers(self, proxy): + """Returns a dictionary of the headers to add to any request sent + through a proxy. This works with urllib3 magic to ensure that they are + correctly sent to the proxy, rather than in a tunnelled request if + CONNECT is being used. + + This should not be called from user code, and is only exposed for use + when subclassing the + :class:`HTTPAdapter `. + + :param proxy: The url of the proxy being used for this request. + :rtype: dict + """ + headers = {} + username, password = get_auth_from_url(proxy) + + if username: + headers["Proxy-Authorization"] = _basic_auth_str(username, password) + + return headers + + def send( + self, request, stream=False, timeout=None, verify=True, cert=None, proxies=None + ): + """Sends PreparedRequest object. Returns Response object. + + :param request: The :class:`PreparedRequest ` being sent. + :param stream: (optional) Whether to stream the request content. + :param timeout: (optional) How long to wait for the server to send + data before giving up, as a float, or a :ref:`(connect timeout, + read timeout) ` tuple. + :type timeout: float or tuple or urllib3 Timeout object + :param verify: (optional) Either a boolean, in which case it controls whether + we verify the server's TLS certificate, or a string, in which case it + must be a path to a CA bundle to use + :param cert: (optional) Any user-provided SSL certificate to be trusted. + :param proxies: (optional) The proxies dictionary to apply to the request. + :rtype: requests.Response + """ + + try: + conn = self.get_connection(request.url, proxies) + except LocationValueError as e: + raise InvalidURL(e, request=request) + + self.cert_verify(conn, request.url, verify, cert) + url = self.request_url(request, proxies) + self.add_headers( + request, + stream=stream, + timeout=timeout, + verify=verify, + cert=cert, + proxies=proxies, + ) + + chunked = not (request.body is None or "Content-Length" in request.headers) + + if isinstance(timeout, tuple): + try: + connect, read = timeout + timeout = TimeoutSauce(connect=connect, read=read) + except ValueError: + raise ValueError( + f"Invalid timeout {timeout}. Pass a (connect, read) timeout tuple, " + f"or a single float to set both timeouts to the same value." + ) + elif isinstance(timeout, TimeoutSauce): + pass + else: + timeout = TimeoutSauce(connect=timeout, read=timeout) + + try: + if not chunked: + resp = conn.urlopen( + method=request.method, + url=url, + body=request.body, + headers=request.headers, + redirect=False, + assert_same_host=False, + preload_content=False, + decode_content=False, + retries=self.max_retries, + timeout=timeout, + ) + + # Send the request. + else: + if hasattr(conn, "proxy_pool"): + conn = conn.proxy_pool + + low_conn = conn._get_conn(timeout=DEFAULT_POOL_TIMEOUT) + + try: + skip_host = "Host" in request.headers + low_conn.putrequest( + request.method, + url, + skip_accept_encoding=True, + skip_host=skip_host, + ) + + for header, value in request.headers.items(): + low_conn.putheader(header, value) + + low_conn.endheaders() + + for i in request.body: + low_conn.send(hex(len(i))[2:].encode("utf-8")) + low_conn.send(b"\r\n") + low_conn.send(i) + low_conn.send(b"\r\n") + low_conn.send(b"0\r\n\r\n") + + # Receive the response from the server + r = low_conn.getresponse() + + resp = HTTPResponse.from_httplib( + r, + pool=conn, + connection=low_conn, + preload_content=False, + decode_content=False, + ) + except Exception: + # If we hit any problems here, clean up the connection. + # Then, raise so that we can handle the actual exception. + low_conn.close() + raise + + except (ProtocolError, OSError) as err: + raise ConnectionError(err, request=request) + + except MaxRetryError as e: + if isinstance(e.reason, ConnectTimeoutError): + # TODO: Remove this in 3.0.0: see #2811 + if not isinstance(e.reason, NewConnectionError): + raise ConnectTimeout(e, request=request) + + if isinstance(e.reason, ResponseError): + raise RetryError(e, request=request) + + if isinstance(e.reason, _ProxyError): + raise ProxyError(e, request=request) + + if isinstance(e.reason, _SSLError): + # This branch is for urllib3 v1.22 and later. + raise SSLError(e, request=request) + + raise ConnectionError(e, request=request) + + except ClosedPoolError as e: + raise ConnectionError(e, request=request) + + except _ProxyError as e: + raise ProxyError(e) + + except (_SSLError, _HTTPError) as e: + if isinstance(e, _SSLError): + # This branch is for urllib3 versions earlier than v1.22 + raise SSLError(e, request=request) + elif isinstance(e, ReadTimeoutError): + raise ReadTimeout(e, request=request) + elif isinstance(e, _InvalidHeader): + raise InvalidHeader(e, request=request) + else: + raise + + return self.build_response(request, resp) diff --git a/_vendor/requests/api.py b/_vendor/requests/api.py new file mode 100644 index 0000000..2f71aae --- /dev/null +++ b/_vendor/requests/api.py @@ -0,0 +1,157 @@ +""" +requests.api +~~~~~~~~~~~~ + +This module implements the Requests API. + +:copyright: (c) 2012 by Kenneth Reitz. +:license: Apache2, see LICENSE for more details. +""" + +from . import sessions + + +def request(method, url, **kwargs): + """Constructs and sends a :class:`Request `. + + :param method: method for the new :class:`Request` object: ``GET``, ``OPTIONS``, ``HEAD``, ``POST``, ``PUT``, ``PATCH``, or ``DELETE``. + :param url: URL for the new :class:`Request` object. + :param params: (optional) Dictionary, list of tuples or bytes to send + in the query string for the :class:`Request`. + :param data: (optional) Dictionary, list of tuples, bytes, or file-like + object to send in the body of the :class:`Request`. + :param json: (optional) A JSON serializable Python object to send in the body of the :class:`Request`. + :param headers: (optional) Dictionary of HTTP Headers to send with the :class:`Request`. + :param cookies: (optional) Dict or CookieJar object to send with the :class:`Request`. + :param files: (optional) Dictionary of ``'name': file-like-objects`` (or ``{'name': file-tuple}``) for multipart encoding upload. + ``file-tuple`` can be a 2-tuple ``('filename', fileobj)``, 3-tuple ``('filename', fileobj, 'content_type')`` + or a 4-tuple ``('filename', fileobj, 'content_type', custom_headers)``, where ``'content-type'`` is a string + defining the content type of the given file and ``custom_headers`` a dict-like object containing additional headers + to add for the file. + :param auth: (optional) Auth tuple to enable Basic/Digest/Custom HTTP Auth. + :param timeout: (optional) How many seconds to wait for the server to send data + before giving up, as a float, or a :ref:`(connect timeout, read + timeout) ` tuple. + :type timeout: float or tuple + :param allow_redirects: (optional) Boolean. Enable/disable GET/OPTIONS/POST/PUT/PATCH/DELETE/HEAD redirection. Defaults to ``True``. + :type allow_redirects: bool + :param proxies: (optional) Dictionary mapping protocol to the URL of the proxy. + :param verify: (optional) Either a boolean, in which case it controls whether we verify + the server's TLS certificate, or a string, in which case it must be a path + to a CA bundle to use. Defaults to ``True``. + :param stream: (optional) if ``False``, the response content will be immediately downloaded. + :param cert: (optional) if String, path to ssl client cert file (.pem). If Tuple, ('cert', 'key') pair. + :return: :class:`Response ` object + :rtype: requests.Response + + Usage:: + + >>> import requests + >>> req = requests.request('GET', 'https://httpbin.org/get') + >>> req + + """ + + # By using the 'with' statement we are sure the session is closed, thus we + # avoid leaving sockets open which can trigger a ResourceWarning in some + # cases, and look like a memory leak in others. + with sessions.Session() as session: + return session.request(method=method, url=url, **kwargs) + + +def get(url, params=None, **kwargs): + r"""Sends a GET request. + + :param url: URL for the new :class:`Request` object. + :param params: (optional) Dictionary, list of tuples or bytes to send + in the query string for the :class:`Request`. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :return: :class:`Response ` object + :rtype: requests.Response + """ + + return request("get", url, params=params, **kwargs) + + +def options(url, **kwargs): + r"""Sends an OPTIONS request. + + :param url: URL for the new :class:`Request` object. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :return: :class:`Response ` object + :rtype: requests.Response + """ + + return request("options", url, **kwargs) + + +def head(url, **kwargs): + r"""Sends a HEAD request. + + :param url: URL for the new :class:`Request` object. + :param \*\*kwargs: Optional arguments that ``request`` takes. If + `allow_redirects` is not provided, it will be set to `False` (as + opposed to the default :meth:`request` behavior). + :return: :class:`Response ` object + :rtype: requests.Response + """ + + kwargs.setdefault("allow_redirects", False) + return request("head", url, **kwargs) + + +def post(url, data=None, json=None, **kwargs): + r"""Sends a POST request. + + :param url: URL for the new :class:`Request` object. + :param data: (optional) Dictionary, list of tuples, bytes, or file-like + object to send in the body of the :class:`Request`. + :param json: (optional) json data to send in the body of the :class:`Request`. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :return: :class:`Response ` object + :rtype: requests.Response + """ + + return request("post", url, data=data, json=json, **kwargs) + + +def put(url, data=None, **kwargs): + r"""Sends a PUT request. + + :param url: URL for the new :class:`Request` object. + :param data: (optional) Dictionary, list of tuples, bytes, or file-like + object to send in the body of the :class:`Request`. + :param json: (optional) json data to send in the body of the :class:`Request`. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :return: :class:`Response ` object + :rtype: requests.Response + """ + + return request("put", url, data=data, **kwargs) + + +def patch(url, data=None, **kwargs): + r"""Sends a PATCH request. + + :param url: URL for the new :class:`Request` object. + :param data: (optional) Dictionary, list of tuples, bytes, or file-like + object to send in the body of the :class:`Request`. + :param json: (optional) json data to send in the body of the :class:`Request`. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :return: :class:`Response ` object + :rtype: requests.Response + """ + + return request("patch", url, data=data, **kwargs) + + +def delete(url, **kwargs): + r"""Sends a DELETE request. + + :param url: URL for the new :class:`Request` object. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :return: :class:`Response ` object + :rtype: requests.Response + """ + + return request("delete", url, **kwargs) diff --git a/_vendor/requests/auth.py b/_vendor/requests/auth.py new file mode 100644 index 0000000..9733686 --- /dev/null +++ b/_vendor/requests/auth.py @@ -0,0 +1,315 @@ +""" +requests.auth +~~~~~~~~~~~~~ + +This module contains the authentication handlers for Requests. +""" + +import hashlib +import os +import re +import threading +import time +import warnings +from base64 import b64encode + +from ._internal_utils import to_native_string +from .compat import basestring, str, urlparse +from .cookies import extract_cookies_to_jar +from .utils import parse_dict_header + +CONTENT_TYPE_FORM_URLENCODED = "application/x-www-form-urlencoded" +CONTENT_TYPE_MULTI_PART = "multipart/form-data" + + +def _basic_auth_str(username, password): + """Returns a Basic Auth string.""" + + # "I want us to put a big-ol' comment on top of it that + # says that this behaviour is dumb but we need to preserve + # it because people are relying on it." + # - Lukasa + # + # These are here solely to maintain backwards compatibility + # for things like ints. This will be removed in 3.0.0. + if not isinstance(username, basestring): + warnings.warn( + "Non-string usernames will no longer be supported in Requests " + "3.0.0. Please convert the object you've passed in ({!r}) to " + "a string or bytes object in the near future to avoid " + "problems.".format(username), + category=DeprecationWarning, + ) + username = str(username) + + if not isinstance(password, basestring): + warnings.warn( + "Non-string passwords will no longer be supported in Requests " + "3.0.0. Please convert the object you've passed in ({!r}) to " + "a string or bytes object in the near future to avoid " + "problems.".format(type(password)), + category=DeprecationWarning, + ) + password = str(password) + # -- End Removal -- + + if isinstance(username, str): + username = username.encode("latin1") + + if isinstance(password, str): + password = password.encode("latin1") + + authstr = "Basic " + to_native_string( + b64encode(b":".join((username, password))).strip() + ) + + return authstr + + +class AuthBase: + """Base class that all auth implementations derive from""" + + def __call__(self, r): + raise NotImplementedError("Auth hooks must be callable.") + + +class HTTPBasicAuth(AuthBase): + """Attaches HTTP Basic Authentication to the given Request object.""" + + def __init__(self, username, password): + self.username = username + self.password = password + + def __eq__(self, other): + return all( + [ + self.username == getattr(other, "username", None), + self.password == getattr(other, "password", None), + ] + ) + + def __ne__(self, other): + return not self == other + + def __call__(self, r): + r.headers["Authorization"] = _basic_auth_str(self.username, self.password) + return r + + +class HTTPProxyAuth(HTTPBasicAuth): + """Attaches HTTP Proxy Authentication to a given Request object.""" + + def __call__(self, r): + r.headers["Proxy-Authorization"] = _basic_auth_str(self.username, self.password) + return r + + +class HTTPDigestAuth(AuthBase): + """Attaches HTTP Digest Authentication to the given Request object.""" + + def __init__(self, username, password): + self.username = username + self.password = password + # Keep state in per-thread local storage + self._thread_local = threading.local() + + def init_per_thread_state(self): + # Ensure state is initialized just once per-thread + if not hasattr(self._thread_local, "init"): + self._thread_local.init = True + self._thread_local.last_nonce = "" + self._thread_local.nonce_count = 0 + self._thread_local.chal = {} + self._thread_local.pos = None + self._thread_local.num_401_calls = None + + def build_digest_header(self, method, url): + """ + :rtype: str + """ + + realm = self._thread_local.chal["realm"] + nonce = self._thread_local.chal["nonce"] + qop = self._thread_local.chal.get("qop") + algorithm = self._thread_local.chal.get("algorithm") + opaque = self._thread_local.chal.get("opaque") + hash_utf8 = None + + if algorithm is None: + _algorithm = "MD5" + else: + _algorithm = algorithm.upper() + # lambdas assume digest modules are imported at the top level + if _algorithm == "MD5" or _algorithm == "MD5-SESS": + + def md5_utf8(x): + if isinstance(x, str): + x = x.encode("utf-8") + return hashlib.md5(x).hexdigest() + + hash_utf8 = md5_utf8 + elif _algorithm == "SHA": + + def sha_utf8(x): + if isinstance(x, str): + x = x.encode("utf-8") + return hashlib.sha1(x).hexdigest() + + hash_utf8 = sha_utf8 + elif _algorithm == "SHA-256": + + def sha256_utf8(x): + if isinstance(x, str): + x = x.encode("utf-8") + return hashlib.sha256(x).hexdigest() + + hash_utf8 = sha256_utf8 + elif _algorithm == "SHA-512": + + def sha512_utf8(x): + if isinstance(x, str): + x = x.encode("utf-8") + return hashlib.sha512(x).hexdigest() + + hash_utf8 = sha512_utf8 + + KD = lambda s, d: hash_utf8(f"{s}:{d}") # noqa:E731 + + if hash_utf8 is None: + return None + + # XXX not implemented yet + entdig = None + p_parsed = urlparse(url) + #: path is request-uri defined in RFC 2616 which should not be empty + path = p_parsed.path or "/" + if p_parsed.query: + path += f"?{p_parsed.query}" + + A1 = f"{self.username}:{realm}:{self.password}" + A2 = f"{method}:{path}" + + HA1 = hash_utf8(A1) + HA2 = hash_utf8(A2) + + if nonce == self._thread_local.last_nonce: + self._thread_local.nonce_count += 1 + else: + self._thread_local.nonce_count = 1 + ncvalue = f"{self._thread_local.nonce_count:08x}" + s = str(self._thread_local.nonce_count).encode("utf-8") + s += nonce.encode("utf-8") + s += time.ctime().encode("utf-8") + s += os.urandom(8) + + cnonce = hashlib.sha1(s).hexdigest()[:16] + if _algorithm == "MD5-SESS": + HA1 = hash_utf8(f"{HA1}:{nonce}:{cnonce}") + + if not qop: + respdig = KD(HA1, f"{nonce}:{HA2}") + elif qop == "auth" or "auth" in qop.split(","): + noncebit = f"{nonce}:{ncvalue}:{cnonce}:auth:{HA2}" + respdig = KD(HA1, noncebit) + else: + # XXX handle auth-int. + return None + + self._thread_local.last_nonce = nonce + + # XXX should the partial digests be encoded too? + base = ( + f'username="{self.username}", realm="{realm}", nonce="{nonce}", ' + f'uri="{path}", response="{respdig}"' + ) + if opaque: + base += f', opaque="{opaque}"' + if algorithm: + base += f', algorithm="{algorithm}"' + if entdig: + base += f', digest="{entdig}"' + if qop: + base += f', qop="auth", nc={ncvalue}, cnonce="{cnonce}"' + + return f"Digest {base}" + + def handle_redirect(self, r, **kwargs): + """Reset num_401_calls counter on redirects.""" + if r.is_redirect: + self._thread_local.num_401_calls = 1 + + def handle_401(self, r, **kwargs): + """ + Takes the given response and tries digest-auth, if needed. + + :rtype: requests.Response + """ + + # If response is not 4xx, do not auth + # See https://github.com/psf/requests/issues/3772 + if not 400 <= r.status_code < 500: + self._thread_local.num_401_calls = 1 + return r + + if self._thread_local.pos is not None: + # Rewind the file position indicator of the body to where + # it was to resend the request. + r.request.body.seek(self._thread_local.pos) + s_auth = r.headers.get("www-authenticate", "") + + if "digest" in s_auth.lower() and self._thread_local.num_401_calls < 2: + + self._thread_local.num_401_calls += 1 + pat = re.compile(r"digest ", flags=re.IGNORECASE) + self._thread_local.chal = parse_dict_header(pat.sub("", s_auth, count=1)) + + # Consume content and release the original connection + # to allow our new request to reuse the same one. + r.content + r.close() + prep = r.request.copy() + extract_cookies_to_jar(prep._cookies, r.request, r.raw) + prep.prepare_cookies(prep._cookies) + + prep.headers["Authorization"] = self.build_digest_header( + prep.method, prep.url + ) + _r = r.connection.send(prep, **kwargs) + _r.history.append(r) + _r.request = prep + + return _r + + self._thread_local.num_401_calls = 1 + return r + + def __call__(self, r): + # Initialize per-thread state, if needed + self.init_per_thread_state() + # If we have a saved nonce, skip the 401 + if self._thread_local.last_nonce: + r.headers["Authorization"] = self.build_digest_header(r.method, r.url) + try: + self._thread_local.pos = r.body.tell() + except AttributeError: + # In the case of HTTPDigestAuth being reused and the body of + # the previous request was a file-like object, pos has the + # file position of the previous body. Ensure it's set to + # None. + self._thread_local.pos = None + r.register_hook("response", self.handle_401) + r.register_hook("response", self.handle_redirect) + self._thread_local.num_401_calls = 1 + + return r + + def __eq__(self, other): + return all( + [ + self.username == getattr(other, "username", None), + self.password == getattr(other, "password", None), + ] + ) + + def __ne__(self, other): + return not self == other diff --git a/_vendor/requests/certs.py b/_vendor/requests/certs.py new file mode 100644 index 0000000..be422c3 --- /dev/null +++ b/_vendor/requests/certs.py @@ -0,0 +1,17 @@ +#!/usr/bin/env python + +""" +requests.certs +~~~~~~~~~~~~~~ + +This module returns the preferred default CA certificate bundle. There is +only one — the one from the certifi package. + +If you are packaging Requests, e.g., for a Linux distribution or a managed +environment, you can change the definition of where() to return a separately +packaged CA bundle. +""" +from certifi import where + +if __name__ == "__main__": + print(where()) diff --git a/_vendor/requests/compat.py b/_vendor/requests/compat.py new file mode 100644 index 0000000..6776163 --- /dev/null +++ b/_vendor/requests/compat.py @@ -0,0 +1,79 @@ +""" +requests.compat +~~~~~~~~~~~~~~~ + +This module previously handled import compatibility issues +between Python 2 and Python 3. It remains for backwards +compatibility until the next major version. +""" + +try: + import chardet +except ImportError: + import charset_normalizer as chardet + +import sys + +# ------- +# Pythons +# ------- + +# Syntax sugar. +_ver = sys.version_info + +#: Python 2.x? +is_py2 = _ver[0] == 2 + +#: Python 3.x? +is_py3 = _ver[0] == 3 + +# json/simplejson module import resolution +has_simplejson = False +try: + import simplejson as json + + has_simplejson = True +except ImportError: + import json + +if has_simplejson: + from simplejson import JSONDecodeError +else: + from json import JSONDecodeError + +# Keep OrderedDict for backwards compatibility. +from collections import OrderedDict +from collections.abc import Callable, Mapping, MutableMapping +from http import cookiejar as cookielib +from http.cookies import Morsel +from io import StringIO + +# -------------- +# Legacy Imports +# -------------- +from urllib.parse import ( + quote, + quote_plus, + unquote, + unquote_plus, + urldefrag, + urlencode, + urljoin, + urlparse, + urlsplit, + urlunparse, +) +from urllib.request import ( + getproxies, + getproxies_environment, + parse_http_list, + proxy_bypass, + proxy_bypass_environment, +) + +builtin_str = str +str = str +bytes = bytes +basestring = (str, bytes) +numeric_types = (int, float) +integer_types = (int,) diff --git a/_vendor/requests/cookies.py b/_vendor/requests/cookies.py new file mode 100644 index 0000000..bf54ab2 --- /dev/null +++ b/_vendor/requests/cookies.py @@ -0,0 +1,561 @@ +""" +requests.cookies +~~~~~~~~~~~~~~~~ + +Compatibility code to be able to use `cookielib.CookieJar` with requests. + +requests.utils imports from here, so be careful with imports. +""" + +import calendar +import copy +import time + +from ._internal_utils import to_native_string +from .compat import Morsel, MutableMapping, cookielib, urlparse, urlunparse + +try: + import threading +except ImportError: + import dummy_threading as threading + + +class MockRequest: + """Wraps a `requests.Request` to mimic a `urllib2.Request`. + + The code in `cookielib.CookieJar` expects this interface in order to correctly + manage cookie policies, i.e., determine whether a cookie can be set, given the + domains of the request and the cookie. + + The original request object is read-only. The client is responsible for collecting + the new headers via `get_new_headers()` and interpreting them appropriately. You + probably want `get_cookie_header`, defined below. + """ + + def __init__(self, request): + self._r = request + self._new_headers = {} + self.type = urlparse(self._r.url).scheme + + def get_type(self): + return self.type + + def get_host(self): + return urlparse(self._r.url).netloc + + def get_origin_req_host(self): + return self.get_host() + + def get_full_url(self): + # Only return the response's URL if the user hadn't set the Host + # header + if not self._r.headers.get("Host"): + return self._r.url + # If they did set it, retrieve it and reconstruct the expected domain + host = to_native_string(self._r.headers["Host"], encoding="utf-8") + parsed = urlparse(self._r.url) + # Reconstruct the URL as we expect it + return urlunparse( + [ + parsed.scheme, + host, + parsed.path, + parsed.params, + parsed.query, + parsed.fragment, + ] + ) + + def is_unverifiable(self): + return True + + def has_header(self, name): + return name in self._r.headers or name in self._new_headers + + def get_header(self, name, default=None): + return self._r.headers.get(name, self._new_headers.get(name, default)) + + def add_header(self, key, val): + """cookielib has no legitimate use for this method; add it back if you find one.""" + raise NotImplementedError( + "Cookie headers should be added with add_unredirected_header()" + ) + + def add_unredirected_header(self, name, value): + self._new_headers[name] = value + + def get_new_headers(self): + return self._new_headers + + @property + def unverifiable(self): + return self.is_unverifiable() + + @property + def origin_req_host(self): + return self.get_origin_req_host() + + @property + def host(self): + return self.get_host() + + +class MockResponse: + """Wraps a `httplib.HTTPMessage` to mimic a `urllib.addinfourl`. + + ...what? Basically, expose the parsed HTTP headers from the server response + the way `cookielib` expects to see them. + """ + + def __init__(self, headers): + """Make a MockResponse for `cookielib` to read. + + :param headers: a httplib.HTTPMessage or analogous carrying the headers + """ + self._headers = headers + + def info(self): + return self._headers + + def getheaders(self, name): + self._headers.getheaders(name) + + +def extract_cookies_to_jar(jar, request, response): + """Extract the cookies from the response into a CookieJar. + + :param jar: cookielib.CookieJar (not necessarily a RequestsCookieJar) + :param request: our own requests.Request object + :param response: urllib3.HTTPResponse object + """ + if not (hasattr(response, "_original_response") and response._original_response): + return + # the _original_response field is the wrapped httplib.HTTPResponse object, + req = MockRequest(request) + # pull out the HTTPMessage with the headers and put it in the mock: + res = MockResponse(response._original_response.msg) + jar.extract_cookies(res, req) + + +def get_cookie_header(jar, request): + """ + Produce an appropriate Cookie header string to be sent with `request`, or None. + + :rtype: str + """ + r = MockRequest(request) + jar.add_cookie_header(r) + return r.get_new_headers().get("Cookie") + + +def remove_cookie_by_name(cookiejar, name, domain=None, path=None): + """Unsets a cookie by name, by default over all domains and paths. + + Wraps CookieJar.clear(), is O(n). + """ + clearables = [] + for cookie in cookiejar: + if cookie.name != name: + continue + if domain is not None and domain != cookie.domain: + continue + if path is not None and path != cookie.path: + continue + clearables.append((cookie.domain, cookie.path, cookie.name)) + + for domain, path, name in clearables: + cookiejar.clear(domain, path, name) + + +class CookieConflictError(RuntimeError): + """There are two cookies that meet the criteria specified in the cookie jar. + Use .get and .set and include domain and path args in order to be more specific. + """ + + +class RequestsCookieJar(cookielib.CookieJar, MutableMapping): + """Compatibility class; is a cookielib.CookieJar, but exposes a dict + interface. + + This is the CookieJar we create by default for requests and sessions that + don't specify one, since some clients may expect response.cookies and + session.cookies to support dict operations. + + Requests does not use the dict interface internally; it's just for + compatibility with external client code. All requests code should work + out of the box with externally provided instances of ``CookieJar``, e.g. + ``LWPCookieJar`` and ``FileCookieJar``. + + Unlike a regular CookieJar, this class is pickleable. + + .. warning:: dictionary operations that are normally O(1) may be O(n). + """ + + def get(self, name, default=None, domain=None, path=None): + """Dict-like get() that also supports optional domain and path args in + order to resolve naming collisions from using one cookie jar over + multiple domains. + + .. warning:: operation is O(n), not O(1). + """ + try: + return self._find_no_duplicates(name, domain, path) + except KeyError: + return default + + def set(self, name, value, **kwargs): + """Dict-like set() that also supports optional domain and path args in + order to resolve naming collisions from using one cookie jar over + multiple domains. + """ + # support client code that unsets cookies by assignment of a None value: + if value is None: + remove_cookie_by_name( + self, name, domain=kwargs.get("domain"), path=kwargs.get("path") + ) + return + + if isinstance(value, Morsel): + c = morsel_to_cookie(value) + else: + c = create_cookie(name, value, **kwargs) + self.set_cookie(c) + return c + + def iterkeys(self): + """Dict-like iterkeys() that returns an iterator of names of cookies + from the jar. + + .. seealso:: itervalues() and iteritems(). + """ + for cookie in iter(self): + yield cookie.name + + def keys(self): + """Dict-like keys() that returns a list of names of cookies from the + jar. + + .. seealso:: values() and items(). + """ + return list(self.iterkeys()) + + def itervalues(self): + """Dict-like itervalues() that returns an iterator of values of cookies + from the jar. + + .. seealso:: iterkeys() and iteritems(). + """ + for cookie in iter(self): + yield cookie.value + + def values(self): + """Dict-like values() that returns a list of values of cookies from the + jar. + + .. seealso:: keys() and items(). + """ + return list(self.itervalues()) + + def iteritems(self): + """Dict-like iteritems() that returns an iterator of name-value tuples + from the jar. + + .. seealso:: iterkeys() and itervalues(). + """ + for cookie in iter(self): + yield cookie.name, cookie.value + + def items(self): + """Dict-like items() that returns a list of name-value tuples from the + jar. Allows client-code to call ``dict(RequestsCookieJar)`` and get a + vanilla python dict of key value pairs. + + .. seealso:: keys() and values(). + """ + return list(self.iteritems()) + + def list_domains(self): + """Utility method to list all the domains in the jar.""" + domains = [] + for cookie in iter(self): + if cookie.domain not in domains: + domains.append(cookie.domain) + return domains + + def list_paths(self): + """Utility method to list all the paths in the jar.""" + paths = [] + for cookie in iter(self): + if cookie.path not in paths: + paths.append(cookie.path) + return paths + + def multiple_domains(self): + """Returns True if there are multiple domains in the jar. + Returns False otherwise. + + :rtype: bool + """ + domains = [] + for cookie in iter(self): + if cookie.domain is not None and cookie.domain in domains: + return True + domains.append(cookie.domain) + return False # there is only one domain in jar + + def get_dict(self, domain=None, path=None): + """Takes as an argument an optional domain and path and returns a plain + old Python dict of name-value pairs of cookies that meet the + requirements. + + :rtype: dict + """ + dictionary = {} + for cookie in iter(self): + if (domain is None or cookie.domain == domain) and ( + path is None or cookie.path == path + ): + dictionary[cookie.name] = cookie.value + return dictionary + + def __contains__(self, name): + try: + return super().__contains__(name) + except CookieConflictError: + return True + + def __getitem__(self, name): + """Dict-like __getitem__() for compatibility with client code. Throws + exception if there are more than one cookie with name. In that case, + use the more explicit get() method instead. + + .. warning:: operation is O(n), not O(1). + """ + return self._find_no_duplicates(name) + + def __setitem__(self, name, value): + """Dict-like __setitem__ for compatibility with client code. Throws + exception if there is already a cookie of that name in the jar. In that + case, use the more explicit set() method instead. + """ + self.set(name, value) + + def __delitem__(self, name): + """Deletes a cookie given a name. Wraps ``cookielib.CookieJar``'s + ``remove_cookie_by_name()``. + """ + remove_cookie_by_name(self, name) + + def set_cookie(self, cookie, *args, **kwargs): + if ( + hasattr(cookie.value, "startswith") + and cookie.value.startswith('"') + and cookie.value.endswith('"') + ): + cookie.value = cookie.value.replace('\\"', "") + return super().set_cookie(cookie, *args, **kwargs) + + def update(self, other): + """Updates this jar with cookies from another CookieJar or dict-like""" + if isinstance(other, cookielib.CookieJar): + for cookie in other: + self.set_cookie(copy.copy(cookie)) + else: + super().update(other) + + def _find(self, name, domain=None, path=None): + """Requests uses this method internally to get cookie values. + + If there are conflicting cookies, _find arbitrarily chooses one. + See _find_no_duplicates if you want an exception thrown if there are + conflicting cookies. + + :param name: a string containing name of cookie + :param domain: (optional) string containing domain of cookie + :param path: (optional) string containing path of cookie + :return: cookie.value + """ + for cookie in iter(self): + if cookie.name == name: + if domain is None or cookie.domain == domain: + if path is None or cookie.path == path: + return cookie.value + + raise KeyError(f"name={name!r}, domain={domain!r}, path={path!r}") + + def _find_no_duplicates(self, name, domain=None, path=None): + """Both ``__get_item__`` and ``get`` call this function: it's never + used elsewhere in Requests. + + :param name: a string containing name of cookie + :param domain: (optional) string containing domain of cookie + :param path: (optional) string containing path of cookie + :raises KeyError: if cookie is not found + :raises CookieConflictError: if there are multiple cookies + that match name and optionally domain and path + :return: cookie.value + """ + toReturn = None + for cookie in iter(self): + if cookie.name == name: + if domain is None or cookie.domain == domain: + if path is None or cookie.path == path: + if toReturn is not None: + # if there are multiple cookies that meet passed in criteria + raise CookieConflictError( + f"There are multiple cookies with name, {name!r}" + ) + # we will eventually return this as long as no cookie conflict + toReturn = cookie.value + + if toReturn: + return toReturn + raise KeyError(f"name={name!r}, domain={domain!r}, path={path!r}") + + def __getstate__(self): + """Unlike a normal CookieJar, this class is pickleable.""" + state = self.__dict__.copy() + # remove the unpickleable RLock object + state.pop("_cookies_lock") + return state + + def __setstate__(self, state): + """Unlike a normal CookieJar, this class is pickleable.""" + self.__dict__.update(state) + if "_cookies_lock" not in self.__dict__: + self._cookies_lock = threading.RLock() + + def copy(self): + """Return a copy of this RequestsCookieJar.""" + new_cj = RequestsCookieJar() + new_cj.set_policy(self.get_policy()) + new_cj.update(self) + return new_cj + + def get_policy(self): + """Return the CookiePolicy instance used.""" + return self._policy + + +def _copy_cookie_jar(jar): + if jar is None: + return None + + if hasattr(jar, "copy"): + # We're dealing with an instance of RequestsCookieJar + return jar.copy() + # We're dealing with a generic CookieJar instance + new_jar = copy.copy(jar) + new_jar.clear() + for cookie in jar: + new_jar.set_cookie(copy.copy(cookie)) + return new_jar + + +def create_cookie(name, value, **kwargs): + """Make a cookie from underspecified parameters. + + By default, the pair of `name` and `value` will be set for the domain '' + and sent on every request (this is sometimes called a "supercookie"). + """ + result = { + "version": 0, + "name": name, + "value": value, + "port": None, + "domain": "", + "path": "/", + "secure": False, + "expires": None, + "discard": True, + "comment": None, + "comment_url": None, + "rest": {"HttpOnly": None}, + "rfc2109": False, + } + + badargs = set(kwargs) - set(result) + if badargs: + raise TypeError( + f"create_cookie() got unexpected keyword arguments: {list(badargs)}" + ) + + result.update(kwargs) + result["port_specified"] = bool(result["port"]) + result["domain_specified"] = bool(result["domain"]) + result["domain_initial_dot"] = result["domain"].startswith(".") + result["path_specified"] = bool(result["path"]) + + return cookielib.Cookie(**result) + + +def morsel_to_cookie(morsel): + """Convert a Morsel object into a Cookie containing the one k/v pair.""" + + expires = None + if morsel["max-age"]: + try: + expires = int(time.time() + int(morsel["max-age"])) + except ValueError: + raise TypeError(f"max-age: {morsel['max-age']} must be integer") + elif morsel["expires"]: + time_template = "%a, %d-%b-%Y %H:%M:%S GMT" + expires = calendar.timegm(time.strptime(morsel["expires"], time_template)) + return create_cookie( + comment=morsel["comment"], + comment_url=bool(morsel["comment"]), + discard=False, + domain=morsel["domain"], + expires=expires, + name=morsel.key, + path=morsel["path"], + port=None, + rest={"HttpOnly": morsel["httponly"]}, + rfc2109=False, + secure=bool(morsel["secure"]), + value=morsel.value, + version=morsel["version"] or 0, + ) + + +def cookiejar_from_dict(cookie_dict, cookiejar=None, overwrite=True): + """Returns a CookieJar from a key/value dictionary. + + :param cookie_dict: Dict of key/values to insert into CookieJar. + :param cookiejar: (optional) A cookiejar to add the cookies to. + :param overwrite: (optional) If False, will not replace cookies + already in the jar with new ones. + :rtype: CookieJar + """ + if cookiejar is None: + cookiejar = RequestsCookieJar() + + if cookie_dict is not None: + names_from_jar = [cookie.name for cookie in cookiejar] + for name in cookie_dict: + if overwrite or (name not in names_from_jar): + cookiejar.set_cookie(create_cookie(name, cookie_dict[name])) + + return cookiejar + + +def merge_cookies(cookiejar, cookies): + """Add cookies to cookiejar and returns a merged CookieJar. + + :param cookiejar: CookieJar object to add the cookies to. + :param cookies: Dictionary or CookieJar object to be added. + :rtype: CookieJar + """ + if not isinstance(cookiejar, cookielib.CookieJar): + raise ValueError("You can only merge into CookieJar") + + if isinstance(cookies, dict): + cookiejar = cookiejar_from_dict(cookies, cookiejar=cookiejar, overwrite=False) + elif isinstance(cookies, cookielib.CookieJar): + try: + cookiejar.update(cookies) + except AttributeError: + for cookie_in_jar in cookies: + cookiejar.set_cookie(cookie_in_jar) + + return cookiejar diff --git a/_vendor/requests/exceptions.py b/_vendor/requests/exceptions.py new file mode 100644 index 0000000..e1cedf8 --- /dev/null +++ b/_vendor/requests/exceptions.py @@ -0,0 +1,141 @@ +""" +requests.exceptions +~~~~~~~~~~~~~~~~~~~ + +This module contains the set of Requests' exceptions. +""" +from urllib3.exceptions import HTTPError as BaseHTTPError + +from .compat import JSONDecodeError as CompatJSONDecodeError + + +class RequestException(IOError): + """There was an ambiguous exception that occurred while handling your + request. + """ + + def __init__(self, *args, **kwargs): + """Initialize RequestException with `request` and `response` objects.""" + response = kwargs.pop("response", None) + self.response = response + self.request = kwargs.pop("request", None) + if response is not None and not self.request and hasattr(response, "request"): + self.request = self.response.request + super().__init__(*args, **kwargs) + + +class InvalidJSONError(RequestException): + """A JSON error occurred.""" + + +class JSONDecodeError(InvalidJSONError, CompatJSONDecodeError): + """Couldn't decode the text into json""" + + def __init__(self, *args, **kwargs): + """ + Construct the JSONDecodeError instance first with all + args. Then use it's args to construct the IOError so that + the json specific args aren't used as IOError specific args + and the error message from JSONDecodeError is preserved. + """ + CompatJSONDecodeError.__init__(self, *args) + InvalidJSONError.__init__(self, *self.args, **kwargs) + + +class HTTPError(RequestException): + """An HTTP error occurred.""" + + +class ConnectionError(RequestException): + """A Connection error occurred.""" + + +class ProxyError(ConnectionError): + """A proxy error occurred.""" + + +class SSLError(ConnectionError): + """An SSL error occurred.""" + + +class Timeout(RequestException): + """The request timed out. + + Catching this error will catch both + :exc:`~requests.exceptions.ConnectTimeout` and + :exc:`~requests.exceptions.ReadTimeout` errors. + """ + + +class ConnectTimeout(ConnectionError, Timeout): + """The request timed out while trying to connect to the remote server. + + Requests that produced this error are safe to retry. + """ + + +class ReadTimeout(Timeout): + """The server did not send any data in the allotted amount of time.""" + + +class URLRequired(RequestException): + """A valid URL is required to make a request.""" + + +class TooManyRedirects(RequestException): + """Too many redirects.""" + + +class MissingSchema(RequestException, ValueError): + """The URL scheme (e.g. http or https) is missing.""" + + +class InvalidSchema(RequestException, ValueError): + """The URL scheme provided is either invalid or unsupported.""" + + +class InvalidURL(RequestException, ValueError): + """The URL provided was somehow invalid.""" + + +class InvalidHeader(RequestException, ValueError): + """The header value provided was somehow invalid.""" + + +class InvalidProxyURL(InvalidURL): + """The proxy URL provided is invalid.""" + + +class ChunkedEncodingError(RequestException): + """The server declared chunked encoding but sent an invalid chunk.""" + + +class ContentDecodingError(RequestException, BaseHTTPError): + """Failed to decode response content.""" + + +class StreamConsumedError(RequestException, TypeError): + """The content for this response was already consumed.""" + + +class RetryError(RequestException): + """Custom retries logic failed""" + + +class UnrewindableBodyError(RequestException): + """Requests encountered an error when trying to rewind a body.""" + + +# Warnings + + +class RequestsWarning(Warning): + """Base warning for Requests.""" + + +class FileModeWarning(RequestsWarning, DeprecationWarning): + """A file was opened in text mode, but Requests determined its binary length.""" + + +class RequestsDependencyWarning(RequestsWarning): + """An imported dependency doesn't match the expected version range.""" diff --git a/_vendor/requests/help.py b/_vendor/requests/help.py new file mode 100644 index 0000000..8fbcd65 --- /dev/null +++ b/_vendor/requests/help.py @@ -0,0 +1,134 @@ +"""Module containing bug report helper(s).""" + +import json +import platform +import ssl +import sys + +import idna +import urllib3 + +from . import __version__ as requests_version + +try: + import charset_normalizer +except ImportError: + charset_normalizer = None + +try: + import chardet +except ImportError: + chardet = None + +try: + from urllib3.contrib import pyopenssl +except ImportError: + pyopenssl = None + OpenSSL = None + cryptography = None +else: + import cryptography + import OpenSSL + + +def _implementation(): + """Return a dict with the Python implementation and version. + + Provide both the name and the version of the Python implementation + currently running. For example, on CPython 3.10.3 it will return + {'name': 'CPython', 'version': '3.10.3'}. + + This function works best on CPython and PyPy: in particular, it probably + doesn't work for Jython or IronPython. Future investigation should be done + to work out the correct shape of the code for those platforms. + """ + implementation = platform.python_implementation() + + if implementation == "CPython": + implementation_version = platform.python_version() + elif implementation == "PyPy": + implementation_version = "{}.{}.{}".format( + sys.pypy_version_info.major, + sys.pypy_version_info.minor, + sys.pypy_version_info.micro, + ) + if sys.pypy_version_info.releaselevel != "final": + implementation_version = "".join( + [implementation_version, sys.pypy_version_info.releaselevel] + ) + elif implementation == "Jython": + implementation_version = platform.python_version() # Complete Guess + elif implementation == "IronPython": + implementation_version = platform.python_version() # Complete Guess + else: + implementation_version = "Unknown" + + return {"name": implementation, "version": implementation_version} + + +def info(): + """Generate information for a bug report.""" + try: + platform_info = { + "system": platform.system(), + "release": platform.release(), + } + except OSError: + platform_info = { + "system": "Unknown", + "release": "Unknown", + } + + implementation_info = _implementation() + urllib3_info = {"version": urllib3.__version__} + charset_normalizer_info = {"version": None} + chardet_info = {"version": None} + if charset_normalizer: + charset_normalizer_info = {"version": charset_normalizer.__version__} + if chardet: + chardet_info = {"version": chardet.__version__} + + pyopenssl_info = { + "version": None, + "openssl_version": "", + } + if OpenSSL: + pyopenssl_info = { + "version": OpenSSL.__version__, + "openssl_version": f"{OpenSSL.SSL.OPENSSL_VERSION_NUMBER:x}", + } + cryptography_info = { + "version": getattr(cryptography, "__version__", ""), + } + idna_info = { + "version": getattr(idna, "__version__", ""), + } + + system_ssl = ssl.OPENSSL_VERSION_NUMBER + system_ssl_info = {"version": f"{system_ssl:x}" if system_ssl is not None else ""} + + return { + "platform": platform_info, + "implementation": implementation_info, + "system_ssl": system_ssl_info, + "using_pyopenssl": pyopenssl is not None, + "using_charset_normalizer": chardet is None, + "pyOpenSSL": pyopenssl_info, + "urllib3": urllib3_info, + "chardet": chardet_info, + "charset_normalizer": charset_normalizer_info, + "cryptography": cryptography_info, + "idna": idna_info, + "requests": { + "version": requests_version, + }, + } + + +def main(): + """Pretty-print the bug information as JSON.""" + print(json.dumps(info(), sort_keys=True, indent=2)) + + +if __name__ == "__main__": + main() diff --git a/_vendor/requests/hooks.py b/_vendor/requests/hooks.py new file mode 100644 index 0000000..d181ba2 --- /dev/null +++ b/_vendor/requests/hooks.py @@ -0,0 +1,33 @@ +""" +requests.hooks +~~~~~~~~~~~~~~ + +This module provides the capabilities for the Requests hooks system. + +Available hooks: + +``response``: + The response generated from a Request. +""" +HOOKS = ["response"] + + +def default_hooks(): + return {event: [] for event in HOOKS} + + +# TODO: response is the only one + + +def dispatch_hook(key, hooks, hook_data, **kwargs): + """Dispatches a hook dictionary on a given piece of data.""" + hooks = hooks or {} + hooks = hooks.get(key) + if hooks: + if hasattr(hooks, "__call__"): + hooks = [hooks] + for hook in hooks: + _hook_data = hook(hook_data, **kwargs) + if _hook_data is not None: + hook_data = _hook_data + return hook_data diff --git a/_vendor/requests/models.py b/_vendor/requests/models.py new file mode 100644 index 0000000..3cd49f5 --- /dev/null +++ b/_vendor/requests/models.py @@ -0,0 +1,1034 @@ +""" +requests.models +~~~~~~~~~~~~~~~ + +This module contains the primary objects that power Requests. +""" + +import datetime + +# Import encoding now, to avoid implicit import later. +# Implicit import within threads may cause LookupError when standard library is in a ZIP, +# such as in Embedded Python. See https://github.com/psf/requests/issues/3578. +import encodings.idna # noqa: F401 +from io import UnsupportedOperation + +from urllib3.exceptions import ( + DecodeError, + LocationParseError, + ProtocolError, + ReadTimeoutError, + SSLError, +) +from urllib3.fields import RequestField +from urllib3.filepost import encode_multipart_formdata +from urllib3.util import parse_url + +from ._internal_utils import to_native_string, unicode_is_ascii +from .auth import HTTPBasicAuth +from .compat import ( + Callable, + JSONDecodeError, + Mapping, + basestring, + builtin_str, + chardet, + cookielib, +) +from .compat import json as complexjson +from .compat import urlencode, urlsplit, urlunparse +from .cookies import _copy_cookie_jar, cookiejar_from_dict, get_cookie_header +from .exceptions import ( + ChunkedEncodingError, + ConnectionError, + ContentDecodingError, + HTTPError, + InvalidJSONError, + InvalidURL, +) +from .exceptions import JSONDecodeError as RequestsJSONDecodeError +from .exceptions import MissingSchema +from .exceptions import SSLError as RequestsSSLError +from .exceptions import StreamConsumedError +from .hooks import default_hooks +from .status_codes import codes +from .structures import CaseInsensitiveDict +from .utils import ( + check_header_validity, + get_auth_from_url, + guess_filename, + guess_json_utf, + iter_slices, + parse_header_links, + requote_uri, + stream_decode_response_unicode, + super_len, + to_key_val_list, +) + +#: The set of HTTP status codes that indicate an automatically +#: processable redirect. +REDIRECT_STATI = ( + codes.moved, # 301 + codes.found, # 302 + codes.other, # 303 + codes.temporary_redirect, # 307 + codes.permanent_redirect, # 308 +) + +DEFAULT_REDIRECT_LIMIT = 30 +CONTENT_CHUNK_SIZE = 10 * 1024 +ITER_CHUNK_SIZE = 512 + + +class RequestEncodingMixin: + @property + def path_url(self): + """Build the path URL to use.""" + + url = [] + + p = urlsplit(self.url) + + path = p.path + if not path: + path = "/" + + url.append(path) + + query = p.query + if query: + url.append("?") + url.append(query) + + return "".join(url) + + @staticmethod + def _encode_params(data): + """Encode parameters in a piece of data. + + Will successfully encode parameters when passed as a dict or a list of + 2-tuples. Order is retained if data is a list of 2-tuples but arbitrary + if parameters are supplied as a dict. + """ + + if isinstance(data, (str, bytes)): + return data + elif hasattr(data, "read"): + return data + elif hasattr(data, "__iter__"): + result = [] + for k, vs in to_key_val_list(data): + if isinstance(vs, basestring) or not hasattr(vs, "__iter__"): + vs = [vs] + for v in vs: + if v is not None: + result.append( + ( + k.encode("utf-8") if isinstance(k, str) else k, + v.encode("utf-8") if isinstance(v, str) else v, + ) + ) + return urlencode(result, doseq=True) + else: + return data + + @staticmethod + def _encode_files(files, data): + """Build the body for a multipart/form-data request. + + Will successfully encode files when passed as a dict or a list of + tuples. Order is retained if data is a list of tuples but arbitrary + if parameters are supplied as a dict. + The tuples may be 2-tuples (filename, fileobj), 3-tuples (filename, fileobj, contentype) + or 4-tuples (filename, fileobj, contentype, custom_headers). + """ + if not files: + raise ValueError("Files must be provided.") + elif isinstance(data, basestring): + raise ValueError("Data must not be a string.") + + new_fields = [] + fields = to_key_val_list(data or {}) + files = to_key_val_list(files or {}) + + for field, val in fields: + if isinstance(val, basestring) or not hasattr(val, "__iter__"): + val = [val] + for v in val: + if v is not None: + # Don't call str() on bytestrings: in Py3 it all goes wrong. + if not isinstance(v, bytes): + v = str(v) + + new_fields.append( + ( + field.decode("utf-8") + if isinstance(field, bytes) + else field, + v.encode("utf-8") if isinstance(v, str) else v, + ) + ) + + for (k, v) in files: + # support for explicit filename + ft = None + fh = None + if isinstance(v, (tuple, list)): + if len(v) == 2: + fn, fp = v + elif len(v) == 3: + fn, fp, ft = v + else: + fn, fp, ft, fh = v + else: + fn = guess_filename(v) or k + fp = v + + if isinstance(fp, (str, bytes, bytearray)): + fdata = fp + elif hasattr(fp, "read"): + fdata = fp.read() + elif fp is None: + continue + else: + fdata = fp + + rf = RequestField(name=k, data=fdata, filename=fn, headers=fh) + rf.make_multipart(content_type=ft) + new_fields.append(rf) + + body, content_type = encode_multipart_formdata(new_fields) + + return body, content_type + + +class RequestHooksMixin: + def register_hook(self, event, hook): + """Properly register a hook.""" + + if event not in self.hooks: + raise ValueError(f'Unsupported event specified, with event name "{event}"') + + if isinstance(hook, Callable): + self.hooks[event].append(hook) + elif hasattr(hook, "__iter__"): + self.hooks[event].extend(h for h in hook if isinstance(h, Callable)) + + def deregister_hook(self, event, hook): + """Deregister a previously registered hook. + Returns True if the hook existed, False if not. + """ + + try: + self.hooks[event].remove(hook) + return True + except ValueError: + return False + + +class Request(RequestHooksMixin): + """A user-created :class:`Request ` object. + + Used to prepare a :class:`PreparedRequest `, which is sent to the server. + + :param method: HTTP method to use. + :param url: URL to send. + :param headers: dictionary of headers to send. + :param files: dictionary of {filename: fileobject} files to multipart upload. + :param data: the body to attach to the request. If a dictionary or + list of tuples ``[(key, value)]`` is provided, form-encoding will + take place. + :param json: json for the body to attach to the request (if files or data is not specified). + :param params: URL parameters to append to the URL. If a dictionary or + list of tuples ``[(key, value)]`` is provided, form-encoding will + take place. + :param auth: Auth handler or (user, pass) tuple. + :param cookies: dictionary or CookieJar of cookies to attach to this request. + :param hooks: dictionary of callback hooks, for internal usage. + + Usage:: + + >>> import requests + >>> req = requests.Request('GET', 'https://httpbin.org/get') + >>> req.prepare() + + """ + + def __init__( + self, + method=None, + url=None, + headers=None, + files=None, + data=None, + params=None, + auth=None, + cookies=None, + hooks=None, + json=None, + ): + + # Default empty dicts for dict params. + data = [] if data is None else data + files = [] if files is None else files + headers = {} if headers is None else headers + params = {} if params is None else params + hooks = {} if hooks is None else hooks + + self.hooks = default_hooks() + for (k, v) in list(hooks.items()): + self.register_hook(event=k, hook=v) + + self.method = method + self.url = url + self.headers = headers + self.files = files + self.data = data + self.json = json + self.params = params + self.auth = auth + self.cookies = cookies + + def __repr__(self): + return f"" + + def prepare(self): + """Constructs a :class:`PreparedRequest ` for transmission and returns it.""" + p = PreparedRequest() + p.prepare( + method=self.method, + url=self.url, + headers=self.headers, + files=self.files, + data=self.data, + json=self.json, + params=self.params, + auth=self.auth, + cookies=self.cookies, + hooks=self.hooks, + ) + return p + + +class PreparedRequest(RequestEncodingMixin, RequestHooksMixin): + """The fully mutable :class:`PreparedRequest ` object, + containing the exact bytes that will be sent to the server. + + Instances are generated from a :class:`Request ` object, and + should not be instantiated manually; doing so may produce undesirable + effects. + + Usage:: + + >>> import requests + >>> req = requests.Request('GET', 'https://httpbin.org/get') + >>> r = req.prepare() + >>> r + + + >>> s = requests.Session() + >>> s.send(r) + + """ + + def __init__(self): + #: HTTP verb to send to the server. + self.method = None + #: HTTP URL to send the request to. + self.url = None + #: dictionary of HTTP headers. + self.headers = None + # The `CookieJar` used to create the Cookie header will be stored here + # after prepare_cookies is called + self._cookies = None + #: request body to send to the server. + self.body = None + #: dictionary of callback hooks, for internal usage. + self.hooks = default_hooks() + #: integer denoting starting position of a readable file-like body. + self._body_position = None + + def prepare( + self, + method=None, + url=None, + headers=None, + files=None, + data=None, + params=None, + auth=None, + cookies=None, + hooks=None, + json=None, + ): + """Prepares the entire request with the given parameters.""" + + self.prepare_method(method) + self.prepare_url(url, params) + self.prepare_headers(headers) + self.prepare_cookies(cookies) + self.prepare_body(data, files, json) + self.prepare_auth(auth, url) + + # Note that prepare_auth must be last to enable authentication schemes + # such as OAuth to work on a fully prepared request. + + # This MUST go after prepare_auth. Authenticators could add a hook + self.prepare_hooks(hooks) + + def __repr__(self): + return f"" + + def copy(self): + p = PreparedRequest() + p.method = self.method + p.url = self.url + p.headers = self.headers.copy() if self.headers is not None else None + p._cookies = _copy_cookie_jar(self._cookies) + p.body = self.body + p.hooks = self.hooks + p._body_position = self._body_position + return p + + def prepare_method(self, method): + """Prepares the given HTTP method.""" + self.method = method + if self.method is not None: + self.method = to_native_string(self.method.upper()) + + @staticmethod + def _get_idna_encoded_host(host): + import idna + + try: + host = idna.encode(host, uts46=True).decode("utf-8") + except idna.IDNAError: + raise UnicodeError + return host + + def prepare_url(self, url, params): + """Prepares the given HTTP URL.""" + #: Accept objects that have string representations. + #: We're unable to blindly call unicode/str functions + #: as this will include the bytestring indicator (b'') + #: on python 3.x. + #: https://github.com/psf/requests/pull/2238 + if isinstance(url, bytes): + url = url.decode("utf8") + else: + url = str(url) + + # Remove leading whitespaces from url + url = url.lstrip() + + # Don't do any URL preparation for non-HTTP schemes like `mailto`, + # `data` etc to work around exceptions from `url_parse`, which + # handles RFC 3986 only. + if ":" in url and not url.lower().startswith("http"): + self.url = url + return + + # Support for unicode domain names and paths. + try: + scheme, auth, host, port, path, query, fragment = parse_url(url) + except LocationParseError as e: + raise InvalidURL(*e.args) + + if not scheme: + raise MissingSchema( + f"Invalid URL {url!r}: No scheme supplied. " + f"Perhaps you meant http://{url}?" + ) + + if not host: + raise InvalidURL(f"Invalid URL {url!r}: No host supplied") + + # In general, we want to try IDNA encoding the hostname if the string contains + # non-ASCII characters. This allows users to automatically get the correct IDNA + # behaviour. For strings containing only ASCII characters, we need to also verify + # it doesn't start with a wildcard (*), before allowing the unencoded hostname. + if not unicode_is_ascii(host): + try: + host = self._get_idna_encoded_host(host) + except UnicodeError: + raise InvalidURL("URL has an invalid label.") + elif host.startswith(("*", ".")): + raise InvalidURL("URL has an invalid label.") + + # Carefully reconstruct the network location + netloc = auth or "" + if netloc: + netloc += "@" + netloc += host + if port: + netloc += f":{port}" + + # Bare domains aren't valid URLs. + if not path: + path = "/" + + if isinstance(params, (str, bytes)): + params = to_native_string(params) + + enc_params = self._encode_params(params) + if enc_params: + if query: + query = f"{query}&{enc_params}" + else: + query = enc_params + + url = requote_uri(urlunparse([scheme, netloc, path, None, query, fragment])) + self.url = url + + def prepare_headers(self, headers): + """Prepares the given HTTP headers.""" + + self.headers = CaseInsensitiveDict() + if headers: + for header in headers.items(): + # Raise exception on invalid header value. + check_header_validity(header) + name, value = header + self.headers[to_native_string(name)] = value + + def prepare_body(self, data, files, json=None): + """Prepares the given HTTP body data.""" + + # Check if file, fo, generator, iterator. + # If not, run through normal process. + + # Nottin' on you. + body = None + content_type = None + + if not data and json is not None: + # urllib3 requires a bytes-like body. Python 2's json.dumps + # provides this natively, but Python 3 gives a Unicode string. + content_type = "application/json" + + try: + body = complexjson.dumps(json, allow_nan=False) + except ValueError as ve: + raise InvalidJSONError(ve, request=self) + + if not isinstance(body, bytes): + body = body.encode("utf-8") + + is_stream = all( + [ + hasattr(data, "__iter__"), + not isinstance(data, (basestring, list, tuple, Mapping)), + ] + ) + + if is_stream: + try: + length = super_len(data) + except (TypeError, AttributeError, UnsupportedOperation): + length = None + + body = data + + if getattr(body, "tell", None) is not None: + # Record the current file position before reading. + # This will allow us to rewind a file in the event + # of a redirect. + try: + self._body_position = body.tell() + except OSError: + # This differentiates from None, allowing us to catch + # a failed `tell()` later when trying to rewind the body + self._body_position = object() + + if files: + raise NotImplementedError( + "Streamed bodies and files are mutually exclusive." + ) + + if length: + self.headers["Content-Length"] = builtin_str(length) + else: + self.headers["Transfer-Encoding"] = "chunked" + else: + # Multi-part file uploads. + if files: + (body, content_type) = self._encode_files(files, data) + else: + if data: + body = self._encode_params(data) + if isinstance(data, basestring) or hasattr(data, "read"): + content_type = None + else: + content_type = "application/x-www-form-urlencoded" + + self.prepare_content_length(body) + + # Add content-type if it wasn't explicitly provided. + if content_type and ("content-type" not in self.headers): + self.headers["Content-Type"] = content_type + + self.body = body + + def prepare_content_length(self, body): + """Prepare Content-Length header based on request method and body""" + if body is not None: + length = super_len(body) + if length: + # If length exists, set it. Otherwise, we fallback + # to Transfer-Encoding: chunked. + self.headers["Content-Length"] = builtin_str(length) + elif ( + self.method not in ("GET", "HEAD") + and self.headers.get("Content-Length") is None + ): + # Set Content-Length to 0 for methods that can have a body + # but don't provide one. (i.e. not GET or HEAD) + self.headers["Content-Length"] = "0" + + def prepare_auth(self, auth, url=""): + """Prepares the given HTTP auth data.""" + + # If no Auth is explicitly provided, extract it from the URL first. + if auth is None: + url_auth = get_auth_from_url(self.url) + auth = url_auth if any(url_auth) else None + + if auth: + if isinstance(auth, tuple) and len(auth) == 2: + # special-case basic HTTP auth + auth = HTTPBasicAuth(*auth) + + # Allow auth to make its changes. + r = auth(self) + + # Update self to reflect the auth changes. + self.__dict__.update(r.__dict__) + + # Recompute Content-Length + self.prepare_content_length(self.body) + + def prepare_cookies(self, cookies): + """Prepares the given HTTP cookie data. + + This function eventually generates a ``Cookie`` header from the + given cookies using cookielib. Due to cookielib's design, the header + will not be regenerated if it already exists, meaning this function + can only be called once for the life of the + :class:`PreparedRequest ` object. Any subsequent calls + to ``prepare_cookies`` will have no actual effect, unless the "Cookie" + header is removed beforehand. + """ + if isinstance(cookies, cookielib.CookieJar): + self._cookies = cookies + else: + self._cookies = cookiejar_from_dict(cookies) + + cookie_header = get_cookie_header(self._cookies, self) + if cookie_header is not None: + self.headers["Cookie"] = cookie_header + + def prepare_hooks(self, hooks): + """Prepares the given hooks.""" + # hooks can be passed as None to the prepare method and to this + # method. To prevent iterating over None, simply use an empty list + # if hooks is False-y + hooks = hooks or [] + for event in hooks: + self.register_hook(event, hooks[event]) + + +class Response: + """The :class:`Response ` object, which contains a + server's response to an HTTP request. + """ + + __attrs__ = [ + "_content", + "status_code", + "headers", + "url", + "history", + "encoding", + "reason", + "cookies", + "elapsed", + "request", + ] + + def __init__(self): + self._content = False + self._content_consumed = False + self._next = None + + #: Integer Code of responded HTTP Status, e.g. 404 or 200. + self.status_code = None + + #: Case-insensitive Dictionary of Response Headers. + #: For example, ``headers['content-encoding']`` will return the + #: value of a ``'Content-Encoding'`` response header. + self.headers = CaseInsensitiveDict() + + #: File-like object representation of response (for advanced usage). + #: Use of ``raw`` requires that ``stream=True`` be set on the request. + #: This requirement does not apply for use internally to Requests. + self.raw = None + + #: Final URL location of Response. + self.url = None + + #: Encoding to decode with when accessing r.text. + self.encoding = None + + #: A list of :class:`Response ` objects from + #: the history of the Request. Any redirect responses will end + #: up here. The list is sorted from the oldest to the most recent request. + self.history = [] + + #: Textual reason of responded HTTP Status, e.g. "Not Found" or "OK". + self.reason = None + + #: A CookieJar of Cookies the server sent back. + self.cookies = cookiejar_from_dict({}) + + #: The amount of time elapsed between sending the request + #: and the arrival of the response (as a timedelta). + #: This property specifically measures the time taken between sending + #: the first byte of the request and finishing parsing the headers. It + #: is therefore unaffected by consuming the response content or the + #: value of the ``stream`` keyword argument. + self.elapsed = datetime.timedelta(0) + + #: The :class:`PreparedRequest ` object to which this + #: is a response. + self.request = None + + def __enter__(self): + return self + + def __exit__(self, *args): + self.close() + + def __getstate__(self): + # Consume everything; accessing the content attribute makes + # sure the content has been fully read. + if not self._content_consumed: + self.content + + return {attr: getattr(self, attr, None) for attr in self.__attrs__} + + def __setstate__(self, state): + for name, value in state.items(): + setattr(self, name, value) + + # pickled objects do not have .raw + setattr(self, "_content_consumed", True) + setattr(self, "raw", None) + + def __repr__(self): + return f"" + + def __bool__(self): + """Returns True if :attr:`status_code` is less than 400. + + This attribute checks if the status code of the response is between + 400 and 600 to see if there was a client error or a server error. If + the status code, is between 200 and 400, this will return True. This + is **not** a check to see if the response code is ``200 OK``. + """ + return self.ok + + def __nonzero__(self): + """Returns True if :attr:`status_code` is less than 400. + + This attribute checks if the status code of the response is between + 400 and 600 to see if there was a client error or a server error. If + the status code, is between 200 and 400, this will return True. This + is **not** a check to see if the response code is ``200 OK``. + """ + return self.ok + + def __iter__(self): + """Allows you to use a response as an iterator.""" + return self.iter_content(128) + + @property + def ok(self): + """Returns True if :attr:`status_code` is less than 400, False if not. + + This attribute checks if the status code of the response is between + 400 and 600 to see if there was a client error or a server error. If + the status code is between 200 and 400, this will return True. This + is **not** a check to see if the response code is ``200 OK``. + """ + try: + self.raise_for_status() + except HTTPError: + return False + return True + + @property + def is_redirect(self): + """True if this Response is a well-formed HTTP redirect that could have + been processed automatically (by :meth:`Session.resolve_redirects`). + """ + return "location" in self.headers and self.status_code in REDIRECT_STATI + + @property + def is_permanent_redirect(self): + """True if this Response one of the permanent versions of redirect.""" + return "location" in self.headers and self.status_code in ( + codes.moved_permanently, + codes.permanent_redirect, + ) + + @property + def next(self): + """Returns a PreparedRequest for the next request in a redirect chain, if there is one.""" + return self._next + + @property + def apparent_encoding(self): + """The apparent encoding, provided by the charset_normalizer or chardet libraries.""" + return chardet.detect(self.content)["encoding"] + + def iter_content(self, chunk_size=1, decode_unicode=False): + """Iterates over the response data. When stream=True is set on the + request, this avoids reading the content at once into memory for + large responses. The chunk size is the number of bytes it should + read into memory. This is not necessarily the length of each item + returned as decoding can take place. + + chunk_size must be of type int or None. A value of None will + function differently depending on the value of `stream`. + stream=True will read data as it arrives in whatever size the + chunks are received. If stream=False, data is returned as + a single chunk. + + If decode_unicode is True, content will be decoded using the best + available encoding based on the response. + """ + + def generate(): + # Special case for urllib3. + if hasattr(self.raw, "stream"): + try: + yield from self.raw.stream(chunk_size, decode_content=True) + except ProtocolError as e: + raise ChunkedEncodingError(e) + except DecodeError as e: + raise ContentDecodingError(e) + except ReadTimeoutError as e: + raise ConnectionError(e) + except SSLError as e: + raise RequestsSSLError(e) + else: + # Standard file-like object. + while True: + chunk = self.raw.read(chunk_size) + if not chunk: + break + yield chunk + + self._content_consumed = True + + if self._content_consumed and isinstance(self._content, bool): + raise StreamConsumedError() + elif chunk_size is not None and not isinstance(chunk_size, int): + raise TypeError( + f"chunk_size must be an int, it is instead a {type(chunk_size)}." + ) + # simulate reading small chunks of the content + reused_chunks = iter_slices(self._content, chunk_size) + + stream_chunks = generate() + + chunks = reused_chunks if self._content_consumed else stream_chunks + + if decode_unicode: + chunks = stream_decode_response_unicode(chunks, self) + + return chunks + + def iter_lines( + self, chunk_size=ITER_CHUNK_SIZE, decode_unicode=False, delimiter=None + ): + """Iterates over the response data, one line at a time. When + stream=True is set on the request, this avoids reading the + content at once into memory for large responses. + + .. note:: This method is not reentrant safe. + """ + + pending = None + + for chunk in self.iter_content( + chunk_size=chunk_size, decode_unicode=decode_unicode + ): + + if pending is not None: + chunk = pending + chunk + + if delimiter: + lines = chunk.split(delimiter) + else: + lines = chunk.splitlines() + + if lines and lines[-1] and chunk and lines[-1][-1] == chunk[-1]: + pending = lines.pop() + else: + pending = None + + yield from lines + + if pending is not None: + yield pending + + @property + def content(self): + """Content of the response, in bytes.""" + + if self._content is False: + # Read the contents. + if self._content_consumed: + raise RuntimeError("The content for this response was already consumed") + + if self.status_code == 0 or self.raw is None: + self._content = None + else: + self._content = b"".join(self.iter_content(CONTENT_CHUNK_SIZE)) or b"" + + self._content_consumed = True + # don't need to release the connection; that's been handled by urllib3 + # since we exhausted the data. + return self._content + + @property + def text(self): + """Content of the response, in unicode. + + If Response.encoding is None, encoding will be guessed using + ``charset_normalizer`` or ``chardet``. + + The encoding of the response content is determined based solely on HTTP + headers, following RFC 2616 to the letter. If you can take advantage of + non-HTTP knowledge to make a better guess at the encoding, you should + set ``r.encoding`` appropriately before accessing this property. + """ + + # Try charset from content-type + content = None + encoding = self.encoding + + if not self.content: + return "" + + # Fallback to auto-detected encoding. + if self.encoding is None: + encoding = self.apparent_encoding + + # Decode unicode from given encoding. + try: + content = str(self.content, encoding, errors="replace") + except (LookupError, TypeError): + # A LookupError is raised if the encoding was not found which could + # indicate a misspelling or similar mistake. + # + # A TypeError can be raised if encoding is None + # + # So we try blindly encoding. + content = str(self.content, errors="replace") + + return content + + def json(self, **kwargs): + r"""Returns the json-encoded content of a response, if any. + + :param \*\*kwargs: Optional arguments that ``json.loads`` takes. + :raises requests.exceptions.JSONDecodeError: If the response body does not + contain valid json. + """ + + if not self.encoding and self.content and len(self.content) > 3: + # No encoding set. JSON RFC 4627 section 3 states we should expect + # UTF-8, -16 or -32. Detect which one to use; If the detection or + # decoding fails, fall back to `self.text` (using charset_normalizer to make + # a best guess). + encoding = guess_json_utf(self.content) + if encoding is not None: + try: + return complexjson.loads(self.content.decode(encoding), **kwargs) + except UnicodeDecodeError: + # Wrong UTF codec detected; usually because it's not UTF-8 + # but some other 8-bit codec. This is an RFC violation, + # and the server didn't bother to tell us what codec *was* + # used. + pass + except JSONDecodeError as e: + raise RequestsJSONDecodeError(e.msg, e.doc, e.pos) + + try: + return complexjson.loads(self.text, **kwargs) + except JSONDecodeError as e: + # Catch JSON-related errors and raise as requests.JSONDecodeError + # This aliases json.JSONDecodeError and simplejson.JSONDecodeError + raise RequestsJSONDecodeError(e.msg, e.doc, e.pos) + + @property + def links(self): + """Returns the parsed header links of the response, if any.""" + + header = self.headers.get("link") + + resolved_links = {} + + if header: + links = parse_header_links(header) + + for link in links: + key = link.get("rel") or link.get("url") + resolved_links[key] = link + + return resolved_links + + def raise_for_status(self): + """Raises :class:`HTTPError`, if one occurred.""" + + http_error_msg = "" + if isinstance(self.reason, bytes): + # We attempt to decode utf-8 first because some servers + # choose to localize their reason strings. If the string + # isn't utf-8, we fall back to iso-8859-1 for all other + # encodings. (See PR #3538) + try: + reason = self.reason.decode("utf-8") + except UnicodeDecodeError: + reason = self.reason.decode("iso-8859-1") + else: + reason = self.reason + + if 400 <= self.status_code < 500: + http_error_msg = ( + f"{self.status_code} Client Error: {reason} for url: {self.url}" + ) + + elif 500 <= self.status_code < 600: + http_error_msg = ( + f"{self.status_code} Server Error: {reason} for url: {self.url}" + ) + + if http_error_msg: + raise HTTPError(http_error_msg, response=self) + + def close(self): + """Releases the connection back to the pool. Once this method has been + called the underlying ``raw`` object must not be accessed again. + + *Note: Should not normally need to be called explicitly.* + """ + if not self._content_consumed: + self.raw.close() + + release_conn = getattr(self.raw, "release_conn", None) + if release_conn is not None: + release_conn() diff --git a/_vendor/requests/packages.py b/_vendor/requests/packages.py new file mode 100644 index 0000000..77c45c9 --- /dev/null +++ b/_vendor/requests/packages.py @@ -0,0 +1,28 @@ +import sys + +try: + import chardet +except ImportError: + import warnings + + import charset_normalizer as chardet + + warnings.filterwarnings("ignore", "Trying to detect", module="charset_normalizer") + +# This code exists for backwards compatibility reasons. +# I don't like it either. Just look the other way. :) + +for package in ("urllib3", "idna"): + locals()[package] = __import__(package) + # This traversal is apparently necessary such that the identities are + # preserved (requests.packages.urllib3.* is urllib3.*) + for mod in list(sys.modules): + if mod == package or mod.startswith(f"{package}."): + sys.modules[f"requests.packages.{mod}"] = sys.modules[mod] + +target = chardet.__name__ +for mod in list(sys.modules): + if mod == target or mod.startswith(f"{target}."): + target = target.replace(target, "chardet") + sys.modules[f"requests.packages.{target}"] = sys.modules[mod] +# Kinda cool, though, right? diff --git a/_vendor/requests/sessions.py b/_vendor/requests/sessions.py new file mode 100644 index 0000000..6cb3b4d --- /dev/null +++ b/_vendor/requests/sessions.py @@ -0,0 +1,831 @@ +""" +requests.sessions +~~~~~~~~~~~~~~~~~ + +This module provides a Session object to manage and persist settings across +requests (cookies, auth, proxies). +""" +import os +import sys +import time +from collections import OrderedDict +from datetime import timedelta + +from ._internal_utils import to_native_string +from .adapters import HTTPAdapter +from .auth import _basic_auth_str +from .compat import Mapping, cookielib, urljoin, urlparse +from .cookies import ( + RequestsCookieJar, + cookiejar_from_dict, + extract_cookies_to_jar, + merge_cookies, +) +from .exceptions import ( + ChunkedEncodingError, + ContentDecodingError, + InvalidSchema, + TooManyRedirects, +) +from .hooks import default_hooks, dispatch_hook + +# formerly defined here, reexposed here for backward compatibility +from .models import ( # noqa: F401 + DEFAULT_REDIRECT_LIMIT, + REDIRECT_STATI, + PreparedRequest, + Request, +) +from .status_codes import codes +from .structures import CaseInsensitiveDict +from .utils import ( # noqa: F401 + DEFAULT_PORTS, + default_headers, + get_auth_from_url, + get_environ_proxies, + get_netrc_auth, + requote_uri, + resolve_proxies, + rewind_body, + should_bypass_proxies, + to_key_val_list, +) + +# Preferred clock, based on which one is more accurate on a given system. +if sys.platform == "win32": + preferred_clock = time.perf_counter +else: + preferred_clock = time.time + + +def merge_setting(request_setting, session_setting, dict_class=OrderedDict): + """Determines appropriate setting for a given request, taking into account + the explicit setting on that request, and the setting in the session. If a + setting is a dictionary, they will be merged together using `dict_class` + """ + + if session_setting is None: + return request_setting + + if request_setting is None: + return session_setting + + # Bypass if not a dictionary (e.g. verify) + if not ( + isinstance(session_setting, Mapping) and isinstance(request_setting, Mapping) + ): + return request_setting + + merged_setting = dict_class(to_key_val_list(session_setting)) + merged_setting.update(to_key_val_list(request_setting)) + + # Remove keys that are set to None. Extract keys first to avoid altering + # the dictionary during iteration. + none_keys = [k for (k, v) in merged_setting.items() if v is None] + for key in none_keys: + del merged_setting[key] + + return merged_setting + + +def merge_hooks(request_hooks, session_hooks, dict_class=OrderedDict): + """Properly merges both requests and session hooks. + + This is necessary because when request_hooks == {'response': []}, the + merge breaks Session hooks entirely. + """ + if session_hooks is None or session_hooks.get("response") == []: + return request_hooks + + if request_hooks is None or request_hooks.get("response") == []: + return session_hooks + + return merge_setting(request_hooks, session_hooks, dict_class) + + +class SessionRedirectMixin: + def get_redirect_target(self, resp): + """Receives a Response. Returns a redirect URI or ``None``""" + # Due to the nature of how requests processes redirects this method will + # be called at least once upon the original response and at least twice + # on each subsequent redirect response (if any). + # If a custom mixin is used to handle this logic, it may be advantageous + # to cache the redirect location onto the response object as a private + # attribute. + if resp.is_redirect: + location = resp.headers["location"] + # Currently the underlying http module on py3 decode headers + # in latin1, but empirical evidence suggests that latin1 is very + # rarely used with non-ASCII characters in HTTP headers. + # It is more likely to get UTF8 header rather than latin1. + # This causes incorrect handling of UTF8 encoded location headers. + # To solve this, we re-encode the location in latin1. + location = location.encode("latin1") + return to_native_string(location, "utf8") + return None + + def should_strip_auth(self, old_url, new_url): + """Decide whether Authorization header should be removed when redirecting""" + old_parsed = urlparse(old_url) + new_parsed = urlparse(new_url) + if old_parsed.hostname != new_parsed.hostname: + return True + # Special case: allow http -> https redirect when using the standard + # ports. This isn't specified by RFC 7235, but is kept to avoid + # breaking backwards compatibility with older versions of requests + # that allowed any redirects on the same host. + if ( + old_parsed.scheme == "http" + and old_parsed.port in (80, None) + and new_parsed.scheme == "https" + and new_parsed.port in (443, None) + ): + return False + + # Handle default port usage corresponding to scheme. + changed_port = old_parsed.port != new_parsed.port + changed_scheme = old_parsed.scheme != new_parsed.scheme + default_port = (DEFAULT_PORTS.get(old_parsed.scheme, None), None) + if ( + not changed_scheme + and old_parsed.port in default_port + and new_parsed.port in default_port + ): + return False + + # Standard case: root URI must match + return changed_port or changed_scheme + + def resolve_redirects( + self, + resp, + req, + stream=False, + timeout=None, + verify=True, + cert=None, + proxies=None, + yield_requests=False, + **adapter_kwargs, + ): + """Receives a Response. Returns a generator of Responses or Requests.""" + + hist = [] # keep track of history + + url = self.get_redirect_target(resp) + previous_fragment = urlparse(req.url).fragment + while url: + prepared_request = req.copy() + + # Update history and keep track of redirects. + # resp.history must ignore the original request in this loop + hist.append(resp) + resp.history = hist[1:] + + try: + resp.content # Consume socket so it can be released + except (ChunkedEncodingError, ContentDecodingError, RuntimeError): + resp.raw.read(decode_content=False) + + if len(resp.history) >= self.max_redirects: + raise TooManyRedirects( + f"Exceeded {self.max_redirects} redirects.", response=resp + ) + + # Release the connection back into the pool. + resp.close() + + # Handle redirection without scheme (see: RFC 1808 Section 4) + if url.startswith("//"): + parsed_rurl = urlparse(resp.url) + url = ":".join([to_native_string(parsed_rurl.scheme), url]) + + # Normalize url case and attach previous fragment if needed (RFC 7231 7.1.2) + parsed = urlparse(url) + if parsed.fragment == "" and previous_fragment: + parsed = parsed._replace(fragment=previous_fragment) + elif parsed.fragment: + previous_fragment = parsed.fragment + url = parsed.geturl() + + # Facilitate relative 'location' headers, as allowed by RFC 7231. + # (e.g. '/path/to/resource' instead of 'http://domain.tld/path/to/resource') + # Compliant with RFC3986, we percent encode the url. + if not parsed.netloc: + url = urljoin(resp.url, requote_uri(url)) + else: + url = requote_uri(url) + + prepared_request.url = to_native_string(url) + + self.rebuild_method(prepared_request, resp) + + # https://github.com/psf/requests/issues/1084 + if resp.status_code not in ( + codes.temporary_redirect, + codes.permanent_redirect, + ): + # https://github.com/psf/requests/issues/3490 + purged_headers = ("Content-Length", "Content-Type", "Transfer-Encoding") + for header in purged_headers: + prepared_request.headers.pop(header, None) + prepared_request.body = None + + headers = prepared_request.headers + headers.pop("Cookie", None) + + # Extract any cookies sent on the response to the cookiejar + # in the new request. Because we've mutated our copied prepared + # request, use the old one that we haven't yet touched. + extract_cookies_to_jar(prepared_request._cookies, req, resp.raw) + merge_cookies(prepared_request._cookies, self.cookies) + prepared_request.prepare_cookies(prepared_request._cookies) + + # Rebuild auth and proxy information. + proxies = self.rebuild_proxies(prepared_request, proxies) + self.rebuild_auth(prepared_request, resp) + + # A failed tell() sets `_body_position` to `object()`. This non-None + # value ensures `rewindable` will be True, allowing us to raise an + # UnrewindableBodyError, instead of hanging the connection. + rewindable = prepared_request._body_position is not None and ( + "Content-Length" in headers or "Transfer-Encoding" in headers + ) + + # Attempt to rewind consumed file-like object. + if rewindable: + rewind_body(prepared_request) + + # Override the original request. + req = prepared_request + + if yield_requests: + yield req + else: + + resp = self.send( + req, + stream=stream, + timeout=timeout, + verify=verify, + cert=cert, + proxies=proxies, + allow_redirects=False, + **adapter_kwargs, + ) + + extract_cookies_to_jar(self.cookies, prepared_request, resp.raw) + + # extract redirect url, if any, for the next loop + url = self.get_redirect_target(resp) + yield resp + + def rebuild_auth(self, prepared_request, response): + """When being redirected we may want to strip authentication from the + request to avoid leaking credentials. This method intelligently removes + and reapplies authentication where possible to avoid credential loss. + """ + headers = prepared_request.headers + url = prepared_request.url + + if "Authorization" in headers and self.should_strip_auth( + response.request.url, url + ): + # If we get redirected to a new host, we should strip out any + # authentication headers. + del headers["Authorization"] + + # .netrc might have more auth for us on our new host. + new_auth = get_netrc_auth(url) if self.trust_env else None + if new_auth is not None: + prepared_request.prepare_auth(new_auth) + + def rebuild_proxies(self, prepared_request, proxies): + """This method re-evaluates the proxy configuration by considering the + environment variables. If we are redirected to a URL covered by + NO_PROXY, we strip the proxy configuration. Otherwise, we set missing + proxy keys for this URL (in case they were stripped by a previous + redirect). + + This method also replaces the Proxy-Authorization header where + necessary. + + :rtype: dict + """ + headers = prepared_request.headers + scheme = urlparse(prepared_request.url).scheme + new_proxies = resolve_proxies(prepared_request, proxies, self.trust_env) + + if "Proxy-Authorization" in headers: + del headers["Proxy-Authorization"] + + try: + username, password = get_auth_from_url(new_proxies[scheme]) + except KeyError: + username, password = None, None + + if username and password: + headers["Proxy-Authorization"] = _basic_auth_str(username, password) + + return new_proxies + + def rebuild_method(self, prepared_request, response): + """When being redirected we may want to change the method of the request + based on certain specs or browser behavior. + """ + method = prepared_request.method + + # https://tools.ietf.org/html/rfc7231#section-6.4.4 + if response.status_code == codes.see_other and method != "HEAD": + method = "GET" + + # Do what the browsers do, despite standards... + # First, turn 302s into GETs. + if response.status_code == codes.found and method != "HEAD": + method = "GET" + + # Second, if a POST is responded to with a 301, turn it into a GET. + # This bizarre behaviour is explained in Issue 1704. + if response.status_code == codes.moved and method == "POST": + method = "GET" + + prepared_request.method = method + + +class Session(SessionRedirectMixin): + """A Requests session. + + Provides cookie persistence, connection-pooling, and configuration. + + Basic Usage:: + + >>> import requests + >>> s = requests.Session() + >>> s.get('https://httpbin.org/get') + + + Or as a context manager:: + + >>> with requests.Session() as s: + ... s.get('https://httpbin.org/get') + + """ + + __attrs__ = [ + "headers", + "cookies", + "auth", + "proxies", + "hooks", + "params", + "verify", + "cert", + "adapters", + "stream", + "trust_env", + "max_redirects", + ] + + def __init__(self): + + #: A case-insensitive dictionary of headers to be sent on each + #: :class:`Request ` sent from this + #: :class:`Session `. + self.headers = default_headers() + + #: Default Authentication tuple or object to attach to + #: :class:`Request `. + self.auth = None + + #: Dictionary mapping protocol or protocol and host to the URL of the proxy + #: (e.g. {'http': 'foo.bar:3128', 'http://host.name': 'foo.bar:4012'}) to + #: be used on each :class:`Request `. + self.proxies = {} + + #: Event-handling hooks. + self.hooks = default_hooks() + + #: Dictionary of querystring data to attach to each + #: :class:`Request `. The dictionary values may be lists for + #: representing multivalued query parameters. + self.params = {} + + #: Stream response content default. + self.stream = False + + #: SSL Verification default. + #: Defaults to `True`, requiring requests to verify the TLS certificate at the + #: remote end. + #: If verify is set to `False`, requests will accept any TLS certificate + #: presented by the server, and will ignore hostname mismatches and/or + #: expired certificates, which will make your application vulnerable to + #: man-in-the-middle (MitM) attacks. + #: Only set this to `False` for testing. + self.verify = True + + #: SSL client certificate default, if String, path to ssl client + #: cert file (.pem). If Tuple, ('cert', 'key') pair. + self.cert = None + + #: Maximum number of redirects allowed. If the request exceeds this + #: limit, a :class:`TooManyRedirects` exception is raised. + #: This defaults to requests.models.DEFAULT_REDIRECT_LIMIT, which is + #: 30. + self.max_redirects = DEFAULT_REDIRECT_LIMIT + + #: Trust environment settings for proxy configuration, default + #: authentication and similar. + self.trust_env = True + + #: A CookieJar containing all currently outstanding cookies set on this + #: session. By default it is a + #: :class:`RequestsCookieJar `, but + #: may be any other ``cookielib.CookieJar`` compatible object. + self.cookies = cookiejar_from_dict({}) + + # Default connection adapters. + self.adapters = OrderedDict() + self.mount("https://", HTTPAdapter()) + self.mount("http://", HTTPAdapter()) + + def __enter__(self): + return self + + def __exit__(self, *args): + self.close() + + def prepare_request(self, request): + """Constructs a :class:`PreparedRequest ` for + transmission and returns it. The :class:`PreparedRequest` has settings + merged from the :class:`Request ` instance and those of the + :class:`Session`. + + :param request: :class:`Request` instance to prepare with this + session's settings. + :rtype: requests.PreparedRequest + """ + cookies = request.cookies or {} + + # Bootstrap CookieJar. + if not isinstance(cookies, cookielib.CookieJar): + cookies = cookiejar_from_dict(cookies) + + # Merge with session cookies + merged_cookies = merge_cookies( + merge_cookies(RequestsCookieJar(), self.cookies), cookies + ) + + # Set environment's basic authentication if not explicitly set. + auth = request.auth + if self.trust_env and not auth and not self.auth: + auth = get_netrc_auth(request.url) + + p = PreparedRequest() + p.prepare( + method=request.method.upper(), + url=request.url, + files=request.files, + data=request.data, + json=request.json, + headers=merge_setting( + request.headers, self.headers, dict_class=CaseInsensitiveDict + ), + params=merge_setting(request.params, self.params), + auth=merge_setting(auth, self.auth), + cookies=merged_cookies, + hooks=merge_hooks(request.hooks, self.hooks), + ) + return p + + def request( + self, + method, + url, + params=None, + data=None, + headers=None, + cookies=None, + files=None, + auth=None, + timeout=None, + allow_redirects=True, + proxies=None, + hooks=None, + stream=None, + verify=None, + cert=None, + json=None, + ): + """Constructs a :class:`Request `, prepares it and sends it. + Returns :class:`Response ` object. + + :param method: method for the new :class:`Request` object. + :param url: URL for the new :class:`Request` object. + :param params: (optional) Dictionary or bytes to be sent in the query + string for the :class:`Request`. + :param data: (optional) Dictionary, list of tuples, bytes, or file-like + object to send in the body of the :class:`Request`. + :param json: (optional) json to send in the body of the + :class:`Request`. + :param headers: (optional) Dictionary of HTTP Headers to send with the + :class:`Request`. + :param cookies: (optional) Dict or CookieJar object to send with the + :class:`Request`. + :param files: (optional) Dictionary of ``'filename': file-like-objects`` + for multipart encoding upload. + :param auth: (optional) Auth tuple or callable to enable + Basic/Digest/Custom HTTP Auth. + :param timeout: (optional) How long to wait for the server to send + data before giving up, as a float, or a :ref:`(connect timeout, + read timeout) ` tuple. + :type timeout: float or tuple + :param allow_redirects: (optional) Set to True by default. + :type allow_redirects: bool + :param proxies: (optional) Dictionary mapping protocol or protocol and + hostname to the URL of the proxy. + :param stream: (optional) whether to immediately download the response + content. Defaults to ``False``. + :param verify: (optional) Either a boolean, in which case it controls whether we verify + the server's TLS certificate, or a string, in which case it must be a path + to a CA bundle to use. Defaults to ``True``. When set to + ``False``, requests will accept any TLS certificate presented by + the server, and will ignore hostname mismatches and/or expired + certificates, which will make your application vulnerable to + man-in-the-middle (MitM) attacks. Setting verify to ``False`` + may be useful during local development or testing. + :param cert: (optional) if String, path to ssl client cert file (.pem). + If Tuple, ('cert', 'key') pair. + :rtype: requests.Response + """ + # Create the Request. + req = Request( + method=method.upper(), + url=url, + headers=headers, + files=files, + data=data or {}, + json=json, + params=params or {}, + auth=auth, + cookies=cookies, + hooks=hooks, + ) + prep = self.prepare_request(req) + + proxies = proxies or {} + + settings = self.merge_environment_settings( + prep.url, proxies, stream, verify, cert + ) + + # Send the request. + send_kwargs = { + "timeout": timeout, + "allow_redirects": allow_redirects, + } + send_kwargs.update(settings) + resp = self.send(prep, **send_kwargs) + + return resp + + def get(self, url, **kwargs): + r"""Sends a GET request. Returns :class:`Response` object. + + :param url: URL for the new :class:`Request` object. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :rtype: requests.Response + """ + + kwargs.setdefault("allow_redirects", True) + return self.request("GET", url, **kwargs) + + def options(self, url, **kwargs): + r"""Sends a OPTIONS request. Returns :class:`Response` object. + + :param url: URL for the new :class:`Request` object. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :rtype: requests.Response + """ + + kwargs.setdefault("allow_redirects", True) + return self.request("OPTIONS", url, **kwargs) + + def head(self, url, **kwargs): + r"""Sends a HEAD request. Returns :class:`Response` object. + + :param url: URL for the new :class:`Request` object. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :rtype: requests.Response + """ + + kwargs.setdefault("allow_redirects", False) + return self.request("HEAD", url, **kwargs) + + def post(self, url, data=None, json=None, **kwargs): + r"""Sends a POST request. Returns :class:`Response` object. + + :param url: URL for the new :class:`Request` object. + :param data: (optional) Dictionary, list of tuples, bytes, or file-like + object to send in the body of the :class:`Request`. + :param json: (optional) json to send in the body of the :class:`Request`. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :rtype: requests.Response + """ + + return self.request("POST", url, data=data, json=json, **kwargs) + + def put(self, url, data=None, **kwargs): + r"""Sends a PUT request. Returns :class:`Response` object. + + :param url: URL for the new :class:`Request` object. + :param data: (optional) Dictionary, list of tuples, bytes, or file-like + object to send in the body of the :class:`Request`. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :rtype: requests.Response + """ + + return self.request("PUT", url, data=data, **kwargs) + + def patch(self, url, data=None, **kwargs): + r"""Sends a PATCH request. Returns :class:`Response` object. + + :param url: URL for the new :class:`Request` object. + :param data: (optional) Dictionary, list of tuples, bytes, or file-like + object to send in the body of the :class:`Request`. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :rtype: requests.Response + """ + + return self.request("PATCH", url, data=data, **kwargs) + + def delete(self, url, **kwargs): + r"""Sends a DELETE request. Returns :class:`Response` object. + + :param url: URL for the new :class:`Request` object. + :param \*\*kwargs: Optional arguments that ``request`` takes. + :rtype: requests.Response + """ + + return self.request("DELETE", url, **kwargs) + + def send(self, request, **kwargs): + """Send a given PreparedRequest. + + :rtype: requests.Response + """ + # Set defaults that the hooks can utilize to ensure they always have + # the correct parameters to reproduce the previous request. + kwargs.setdefault("stream", self.stream) + kwargs.setdefault("verify", self.verify) + kwargs.setdefault("cert", self.cert) + if "proxies" not in kwargs: + kwargs["proxies"] = resolve_proxies(request, self.proxies, self.trust_env) + + # It's possible that users might accidentally send a Request object. + # Guard against that specific failure case. + if isinstance(request, Request): + raise ValueError("You can only send PreparedRequests.") + + # Set up variables needed for resolve_redirects and dispatching of hooks + allow_redirects = kwargs.pop("allow_redirects", True) + stream = kwargs.get("stream") + hooks = request.hooks + + # Get the appropriate adapter to use + adapter = self.get_adapter(url=request.url) + + # Start time (approximately) of the request + start = preferred_clock() + + # Send the request + r = adapter.send(request, **kwargs) + + # Total elapsed time of the request (approximately) + elapsed = preferred_clock() - start + r.elapsed = timedelta(seconds=elapsed) + + # Response manipulation hooks + r = dispatch_hook("response", hooks, r, **kwargs) + + # Persist cookies + if r.history: + + # If the hooks create history then we want those cookies too + for resp in r.history: + extract_cookies_to_jar(self.cookies, resp.request, resp.raw) + + extract_cookies_to_jar(self.cookies, request, r.raw) + + # Resolve redirects if allowed. + if allow_redirects: + # Redirect resolving generator. + gen = self.resolve_redirects(r, request, **kwargs) + history = [resp for resp in gen] + else: + history = [] + + # Shuffle things around if there's history. + if history: + # Insert the first (original) request at the start + history.insert(0, r) + # Get the last request made + r = history.pop() + r.history = history + + # If redirects aren't being followed, store the response on the Request for Response.next(). + if not allow_redirects: + try: + r._next = next( + self.resolve_redirects(r, request, yield_requests=True, **kwargs) + ) + except StopIteration: + pass + + if not stream: + r.content + + return r + + def merge_environment_settings(self, url, proxies, stream, verify, cert): + """ + Check the environment and merge it with some settings. + + :rtype: dict + """ + # Gather clues from the surrounding environment. + if self.trust_env: + # Set environment's proxies. + no_proxy = proxies.get("no_proxy") if proxies is not None else None + env_proxies = get_environ_proxies(url, no_proxy=no_proxy) + for (k, v) in env_proxies.items(): + proxies.setdefault(k, v) + + # Look for requests environment configuration + # and be compatible with cURL. + if verify is True or verify is None: + verify = ( + os.environ.get("REQUESTS_CA_BUNDLE") + or os.environ.get("CURL_CA_BUNDLE") + or verify + ) + + # Merge all the kwargs. + proxies = merge_setting(proxies, self.proxies) + stream = merge_setting(stream, self.stream) + verify = merge_setting(verify, self.verify) + cert = merge_setting(cert, self.cert) + + return {"proxies": proxies, "stream": stream, "verify": verify, "cert": cert} + + def get_adapter(self, url): + """ + Returns the appropriate connection adapter for the given URL. + + :rtype: requests.adapters.BaseAdapter + """ + for (prefix, adapter) in self.adapters.items(): + + if url.lower().startswith(prefix.lower()): + return adapter + + # Nothing matches :-/ + raise InvalidSchema(f"No connection adapters were found for {url!r}") + + def close(self): + """Closes all adapters and as such the session""" + for v in self.adapters.values(): + v.close() + + def mount(self, prefix, adapter): + """Registers a connection adapter to a prefix. + + Adapters are sorted in descending order by prefix length. + """ + self.adapters[prefix] = adapter + keys_to_move = [k for k in self.adapters if len(k) < len(prefix)] + + for key in keys_to_move: + self.adapters[key] = self.adapters.pop(key) + + def __getstate__(self): + state = {attr: getattr(self, attr, None) for attr in self.__attrs__} + return state + + def __setstate__(self, state): + for attr, value in state.items(): + setattr(self, attr, value) + + +def session(): + """ + Returns a :class:`Session` for context-management. + + .. deprecated:: 1.0.0 + + This method has been deprecated since version 1.0.0 and is only kept for + backwards compatibility. New code should use :class:`~requests.sessions.Session` + to create a session. This may be removed at a future date. + + :rtype: Session + """ + return Session() diff --git a/_vendor/requests/status_codes.py b/_vendor/requests/status_codes.py new file mode 100644 index 0000000..4bd072b --- /dev/null +++ b/_vendor/requests/status_codes.py @@ -0,0 +1,128 @@ +r""" +The ``codes`` object defines a mapping from common names for HTTP statuses +to their numerical codes, accessible either as attributes or as dictionary +items. + +Example:: + + >>> import requests + >>> requests.codes['temporary_redirect'] + 307 + >>> requests.codes.teapot + 418 + >>> requests.codes['\o/'] + 200 + +Some codes have multiple names, and both upper- and lower-case versions of +the names are allowed. For example, ``codes.ok``, ``codes.OK``, and +``codes.okay`` all correspond to the HTTP status code 200. +""" + +from .structures import LookupDict + +_codes = { + # Informational. + 100: ("continue",), + 101: ("switching_protocols",), + 102: ("processing",), + 103: ("checkpoint",), + 122: ("uri_too_long", "request_uri_too_long"), + 200: ("ok", "okay", "all_ok", "all_okay", "all_good", "\\o/", "✓"), + 201: ("created",), + 202: ("accepted",), + 203: ("non_authoritative_info", "non_authoritative_information"), + 204: ("no_content",), + 205: ("reset_content", "reset"), + 206: ("partial_content", "partial"), + 207: ("multi_status", "multiple_status", "multi_stati", "multiple_stati"), + 208: ("already_reported",), + 226: ("im_used",), + # Redirection. + 300: ("multiple_choices",), + 301: ("moved_permanently", "moved", "\\o-"), + 302: ("found",), + 303: ("see_other", "other"), + 304: ("not_modified",), + 305: ("use_proxy",), + 306: ("switch_proxy",), + 307: ("temporary_redirect", "temporary_moved", "temporary"), + 308: ( + "permanent_redirect", + "resume_incomplete", + "resume", + ), # "resume" and "resume_incomplete" to be removed in 3.0 + # Client Error. + 400: ("bad_request", "bad"), + 401: ("unauthorized",), + 402: ("payment_required", "payment"), + 403: ("forbidden",), + 404: ("not_found", "-o-"), + 405: ("method_not_allowed", "not_allowed"), + 406: ("not_acceptable",), + 407: ("proxy_authentication_required", "proxy_auth", "proxy_authentication"), + 408: ("request_timeout", "timeout"), + 409: ("conflict",), + 410: ("gone",), + 411: ("length_required",), + 412: ("precondition_failed", "precondition"), + 413: ("request_entity_too_large",), + 414: ("request_uri_too_large",), + 415: ("unsupported_media_type", "unsupported_media", "media_type"), + 416: ( + "requested_range_not_satisfiable", + "requested_range", + "range_not_satisfiable", + ), + 417: ("expectation_failed",), + 418: ("im_a_teapot", "teapot", "i_am_a_teapot"), + 421: ("misdirected_request",), + 422: ("unprocessable_entity", "unprocessable"), + 423: ("locked",), + 424: ("failed_dependency", "dependency"), + 425: ("unordered_collection", "unordered"), + 426: ("upgrade_required", "upgrade"), + 428: ("precondition_required", "precondition"), + 429: ("too_many_requests", "too_many"), + 431: ("header_fields_too_large", "fields_too_large"), + 444: ("no_response", "none"), + 449: ("retry_with", "retry"), + 450: ("blocked_by_windows_parental_controls", "parental_controls"), + 451: ("unavailable_for_legal_reasons", "legal_reasons"), + 499: ("client_closed_request",), + # Server Error. + 500: ("internal_server_error", "server_error", "/o\\", "✗"), + 501: ("not_implemented",), + 502: ("bad_gateway",), + 503: ("service_unavailable", "unavailable"), + 504: ("gateway_timeout",), + 505: ("http_version_not_supported", "http_version"), + 506: ("variant_also_negotiates",), + 507: ("insufficient_storage",), + 509: ("bandwidth_limit_exceeded", "bandwidth"), + 510: ("not_extended",), + 511: ("network_authentication_required", "network_auth", "network_authentication"), +} + +codes = LookupDict(name="status_codes") + + +def _init(): + for code, titles in _codes.items(): + for title in titles: + setattr(codes, title, code) + if not title.startswith(("\\", "/")): + setattr(codes, title.upper(), code) + + def doc(code): + names = ", ".join(f"``{n}``" for n in _codes[code]) + return "* %d: %s" % (code, names) + + global __doc__ + __doc__ = ( + __doc__ + "\n" + "\n".join(doc(code) for code in sorted(_codes)) + if __doc__ is not None + else None + ) + + +_init() diff --git a/_vendor/requests/structures.py b/_vendor/requests/structures.py new file mode 100644 index 0000000..188e13e --- /dev/null +++ b/_vendor/requests/structures.py @@ -0,0 +1,99 @@ +""" +requests.structures +~~~~~~~~~~~~~~~~~~~ + +Data structures that power Requests. +""" + +from collections import OrderedDict + +from .compat import Mapping, MutableMapping + + +class CaseInsensitiveDict(MutableMapping): + """A case-insensitive ``dict``-like object. + + Implements all methods and operations of + ``MutableMapping`` as well as dict's ``copy``. Also + provides ``lower_items``. + + All keys are expected to be strings. The structure remembers the + case of the last key to be set, and ``iter(instance)``, + ``keys()``, ``items()``, ``iterkeys()``, and ``iteritems()`` + will contain case-sensitive keys. However, querying and contains + testing is case insensitive:: + + cid = CaseInsensitiveDict() + cid['Accept'] = 'application/json' + cid['aCCEPT'] == 'application/json' # True + list(cid) == ['Accept'] # True + + For example, ``headers['content-encoding']`` will return the + value of a ``'Content-Encoding'`` response header, regardless + of how the header name was originally stored. + + If the constructor, ``.update``, or equality comparison + operations are given keys that have equal ``.lower()``s, the + behavior is undefined. + """ + + def __init__(self, data=None, **kwargs): + self._store = OrderedDict() + if data is None: + data = {} + self.update(data, **kwargs) + + def __setitem__(self, key, value): + # Use the lowercased key for lookups, but store the actual + # key alongside the value. + self._store[key.lower()] = (key, value) + + def __getitem__(self, key): + return self._store[key.lower()][1] + + def __delitem__(self, key): + del self._store[key.lower()] + + def __iter__(self): + return (casedkey for casedkey, mappedvalue in self._store.values()) + + def __len__(self): + return len(self._store) + + def lower_items(self): + """Like iteritems(), but with all lowercase keys.""" + return ((lowerkey, keyval[1]) for (lowerkey, keyval) in self._store.items()) + + def __eq__(self, other): + if isinstance(other, Mapping): + other = CaseInsensitiveDict(other) + else: + return NotImplemented + # Compare insensitively + return dict(self.lower_items()) == dict(other.lower_items()) + + # Copy is required + def copy(self): + return CaseInsensitiveDict(self._store.values()) + + def __repr__(self): + return str(dict(self.items())) + + +class LookupDict(dict): + """Dictionary lookup object.""" + + def __init__(self, name=None): + self.name = name + super().__init__() + + def __repr__(self): + return f"" + + def __getitem__(self, key): + # We allow fall-through here, so values default to None + + return self.__dict__.get(key, None) + + def get(self, key, default=None): + return self.__dict__.get(key, default) diff --git a/_vendor/requests/utils.py b/_vendor/requests/utils.py new file mode 100644 index 0000000..ad53583 --- /dev/null +++ b/_vendor/requests/utils.py @@ -0,0 +1,1086 @@ +""" +requests.utils +~~~~~~~~~~~~~~ + +This module provides utility functions that are used within Requests +that are also useful for external consumption. +""" + +import codecs +import contextlib +import io +import os +import re +import socket +import struct +import sys +import tempfile +import warnings +import zipfile +from collections import OrderedDict + +from urllib3.util import make_headers, parse_url + +from . import certs +from .__version__ import __version__ + +# to_native_string is unused here, but imported here for backwards compatibility +from ._internal_utils import HEADER_VALIDATORS, to_native_string # noqa: F401 +from .compat import ( + Mapping, + basestring, + bytes, + getproxies, + getproxies_environment, + integer_types, +) +from .compat import parse_http_list as _parse_list_header +from .compat import ( + proxy_bypass, + proxy_bypass_environment, + quote, + str, + unquote, + urlparse, + urlunparse, +) +from .cookies import cookiejar_from_dict +from .exceptions import ( + FileModeWarning, + InvalidHeader, + InvalidURL, + UnrewindableBodyError, +) +from .structures import CaseInsensitiveDict + +NETRC_FILES = (".netrc", "_netrc") + +DEFAULT_CA_BUNDLE_PATH = certs.where() + +DEFAULT_PORTS = {"http": 80, "https": 443} + +# Ensure that ', ' is used to preserve previous delimiter behavior. +DEFAULT_ACCEPT_ENCODING = ", ".join( + re.split(r",\s*", make_headers(accept_encoding=True)["accept-encoding"]) +) + + +if sys.platform == "win32": + # provide a proxy_bypass version on Windows without DNS lookups + + def proxy_bypass_registry(host): + try: + import winreg + except ImportError: + return False + + try: + internetSettings = winreg.OpenKey( + winreg.HKEY_CURRENT_USER, + r"Software\Microsoft\Windows\CurrentVersion\Internet Settings", + ) + # ProxyEnable could be REG_SZ or REG_DWORD, normalizing it + proxyEnable = int(winreg.QueryValueEx(internetSettings, "ProxyEnable")[0]) + # ProxyOverride is almost always a string + proxyOverride = winreg.QueryValueEx(internetSettings, "ProxyOverride")[0] + except (OSError, ValueError): + return False + if not proxyEnable or not proxyOverride: + return False + + # make a check value list from the registry entry: replace the + # '' string by the localhost entry and the corresponding + # canonical entry. + proxyOverride = proxyOverride.split(";") + # now check if we match one of the registry values. + for test in proxyOverride: + if test == "": + if "." not in host: + return True + test = test.replace(".", r"\.") # mask dots + test = test.replace("*", r".*") # change glob sequence + test = test.replace("?", r".") # change glob char + if re.match(test, host, re.I): + return True + return False + + def proxy_bypass(host): # noqa + """Return True, if the host should be bypassed. + + Checks proxy settings gathered from the environment, if specified, + or the registry. + """ + if getproxies_environment(): + return proxy_bypass_environment(host) + else: + return proxy_bypass_registry(host) + + +def dict_to_sequence(d): + """Returns an internal sequence dictionary update.""" + + if hasattr(d, "items"): + d = d.items() + + return d + + +def super_len(o): + total_length = None + current_position = 0 + + if hasattr(o, "__len__"): + total_length = len(o) + + elif hasattr(o, "len"): + total_length = o.len + + elif hasattr(o, "fileno"): + try: + fileno = o.fileno() + except (io.UnsupportedOperation, AttributeError): + # AttributeError is a surprising exception, seeing as how we've just checked + # that `hasattr(o, 'fileno')`. It happens for objects obtained via + # `Tarfile.extractfile()`, per issue 5229. + pass + else: + total_length = os.fstat(fileno).st_size + + # Having used fstat to determine the file length, we need to + # confirm that this file was opened up in binary mode. + if "b" not in o.mode: + warnings.warn( + ( + "Requests has determined the content-length for this " + "request using the binary size of the file: however, the " + "file has been opened in text mode (i.e. without the 'b' " + "flag in the mode). This may lead to an incorrect " + "content-length. In Requests 3.0, support will be removed " + "for files in text mode." + ), + FileModeWarning, + ) + + if hasattr(o, "tell"): + try: + current_position = o.tell() + except OSError: + # This can happen in some weird situations, such as when the file + # is actually a special file descriptor like stdin. In this + # instance, we don't know what the length is, so set it to zero and + # let requests chunk it instead. + if total_length is not None: + current_position = total_length + else: + if hasattr(o, "seek") and total_length is None: + # StringIO and BytesIO have seek but no usable fileno + try: + # seek to end of file + o.seek(0, 2) + total_length = o.tell() + + # seek back to current position to support + # partially read file-like objects + o.seek(current_position or 0) + except OSError: + total_length = 0 + + if total_length is None: + total_length = 0 + + return max(0, total_length - current_position) + + +def get_netrc_auth(url, raise_errors=False): + """Returns the Requests tuple auth for a given url from netrc.""" + + netrc_file = os.environ.get("NETRC") + if netrc_file is not None: + netrc_locations = (netrc_file,) + else: + netrc_locations = (f"~/{f}" for f in NETRC_FILES) + + try: + from netrc import NetrcParseError, netrc + + netrc_path = None + + for f in netrc_locations: + try: + loc = os.path.expanduser(f) + except KeyError: + # os.path.expanduser can fail when $HOME is undefined and + # getpwuid fails. See https://bugs.python.org/issue20164 & + # https://github.com/psf/requests/issues/1846 + return + + if os.path.exists(loc): + netrc_path = loc + break + + # Abort early if there isn't one. + if netrc_path is None: + return + + ri = urlparse(url) + + # Strip port numbers from netloc. This weird `if...encode`` dance is + # used for Python 3.2, which doesn't support unicode literals. + splitstr = b":" + if isinstance(url, str): + splitstr = splitstr.decode("ascii") + host = ri.netloc.split(splitstr)[0] + + try: + _netrc = netrc(netrc_path).authenticators(host) + if _netrc: + # Return with login / password + login_i = 0 if _netrc[0] else 1 + return (_netrc[login_i], _netrc[2]) + except (NetrcParseError, OSError): + # If there was a parsing error or a permissions issue reading the file, + # we'll just skip netrc auth unless explicitly asked to raise errors. + if raise_errors: + raise + + # App Engine hackiness. + except (ImportError, AttributeError): + pass + + +def guess_filename(obj): + """Tries to guess the filename of the given object.""" + name = getattr(obj, "name", None) + if name and isinstance(name, basestring) and name[0] != "<" and name[-1] != ">": + return os.path.basename(name) + + +def extract_zipped_paths(path): + """Replace nonexistent paths that look like they refer to a member of a zip + archive with the location of an extracted copy of the target, or else + just return the provided path unchanged. + """ + if os.path.exists(path): + # this is already a valid path, no need to do anything further + return path + + # find the first valid part of the provided path and treat that as a zip archive + # assume the rest of the path is the name of a member in the archive + archive, member = os.path.split(path) + while archive and not os.path.exists(archive): + archive, prefix = os.path.split(archive) + if not prefix: + # If we don't check for an empty prefix after the split (in other words, archive remains unchanged after the split), + # we _can_ end up in an infinite loop on a rare corner case affecting a small number of users + break + member = "/".join([prefix, member]) + + if not zipfile.is_zipfile(archive): + return path + + zip_file = zipfile.ZipFile(archive) + if member not in zip_file.namelist(): + return path + + # we have a valid zip archive and a valid member of that archive + tmp = tempfile.gettempdir() + extracted_path = os.path.join(tmp, member.split("/")[-1]) + if not os.path.exists(extracted_path): + # use read + write to avoid the creating nested folders, we only want the file, avoids mkdir racing condition + with atomic_open(extracted_path) as file_handler: + file_handler.write(zip_file.read(member)) + return extracted_path + + +@contextlib.contextmanager +def atomic_open(filename): + """Write a file to the disk in an atomic fashion""" + tmp_descriptor, tmp_name = tempfile.mkstemp(dir=os.path.dirname(filename)) + try: + with os.fdopen(tmp_descriptor, "wb") as tmp_handler: + yield tmp_handler + os.replace(tmp_name, filename) + except BaseException: + os.remove(tmp_name) + raise + + +def from_key_val_list(value): + """Take an object and test to see if it can be represented as a + dictionary. Unless it can not be represented as such, return an + OrderedDict, e.g., + + :: + + >>> from_key_val_list([('key', 'val')]) + OrderedDict([('key', 'val')]) + >>> from_key_val_list('string') + Traceback (most recent call last): + ... + ValueError: cannot encode objects that are not 2-tuples + >>> from_key_val_list({'key': 'val'}) + OrderedDict([('key', 'val')]) + + :rtype: OrderedDict + """ + if value is None: + return None + + if isinstance(value, (str, bytes, bool, int)): + raise ValueError("cannot encode objects that are not 2-tuples") + + return OrderedDict(value) + + +def to_key_val_list(value): + """Take an object and test to see if it can be represented as a + dictionary. If it can be, return a list of tuples, e.g., + + :: + + >>> to_key_val_list([('key', 'val')]) + [('key', 'val')] + >>> to_key_val_list({'key': 'val'}) + [('key', 'val')] + >>> to_key_val_list('string') + Traceback (most recent call last): + ... + ValueError: cannot encode objects that are not 2-tuples + + :rtype: list + """ + if value is None: + return None + + if isinstance(value, (str, bytes, bool, int)): + raise ValueError("cannot encode objects that are not 2-tuples") + + if isinstance(value, Mapping): + value = value.items() + + return list(value) + + +# From mitsuhiko/werkzeug (used with permission). +def parse_list_header(value): + """Parse lists as described by RFC 2068 Section 2. + + In particular, parse comma-separated lists where the elements of + the list may include quoted-strings. A quoted-string could + contain a comma. A non-quoted string could have quotes in the + middle. Quotes are removed automatically after parsing. + + It basically works like :func:`parse_set_header` just that items + may appear multiple times and case sensitivity is preserved. + + The return value is a standard :class:`list`: + + >>> parse_list_header('token, "quoted value"') + ['token', 'quoted value'] + + To create a header from the :class:`list` again, use the + :func:`dump_header` function. + + :param value: a string with a list header. + :return: :class:`list` + :rtype: list + """ + result = [] + for item in _parse_list_header(value): + if item[:1] == item[-1:] == '"': + item = unquote_header_value(item[1:-1]) + result.append(item) + return result + + +# From mitsuhiko/werkzeug (used with permission). +def parse_dict_header(value): + """Parse lists of key, value pairs as described by RFC 2068 Section 2 and + convert them into a python dict: + + >>> d = parse_dict_header('foo="is a fish", bar="as well"') + >>> type(d) is dict + True + >>> sorted(d.items()) + [('bar', 'as well'), ('foo', 'is a fish')] + + If there is no value for a key it will be `None`: + + >>> parse_dict_header('key_without_value') + {'key_without_value': None} + + To create a header from the :class:`dict` again, use the + :func:`dump_header` function. + + :param value: a string with a dict header. + :return: :class:`dict` + :rtype: dict + """ + result = {} + for item in _parse_list_header(value): + if "=" not in item: + result[item] = None + continue + name, value = item.split("=", 1) + if value[:1] == value[-1:] == '"': + value = unquote_header_value(value[1:-1]) + result[name] = value + return result + + +# From mitsuhiko/werkzeug (used with permission). +def unquote_header_value(value, is_filename=False): + r"""Unquotes a header value. (Reversal of :func:`quote_header_value`). + This does not use the real unquoting but what browsers are actually + using for quoting. + + :param value: the header value to unquote. + :rtype: str + """ + if value and value[0] == value[-1] == '"': + # this is not the real unquoting, but fixing this so that the + # RFC is met will result in bugs with internet explorer and + # probably some other browsers as well. IE for example is + # uploading files with "C:\foo\bar.txt" as filename + value = value[1:-1] + + # if this is a filename and the starting characters look like + # a UNC path, then just return the value without quotes. Using the + # replace sequence below on a UNC path has the effect of turning + # the leading double slash into a single slash and then + # _fix_ie_filename() doesn't work correctly. See #458. + if not is_filename or value[:2] != "\\\\": + return value.replace("\\\\", "\\").replace('\\"', '"') + return value + + +def dict_from_cookiejar(cj): + """Returns a key/value dictionary from a CookieJar. + + :param cj: CookieJar object to extract cookies from. + :rtype: dict + """ + + cookie_dict = {} + + for cookie in cj: + cookie_dict[cookie.name] = cookie.value + + return cookie_dict + + +def add_dict_to_cookiejar(cj, cookie_dict): + """Returns a CookieJar from a key/value dictionary. + + :param cj: CookieJar to insert cookies into. + :param cookie_dict: Dict of key/values to insert into CookieJar. + :rtype: CookieJar + """ + + return cookiejar_from_dict(cookie_dict, cj) + + +def get_encodings_from_content(content): + """Returns encodings from given content string. + + :param content: bytestring to extract encodings from. + """ + warnings.warn( + ( + "In requests 3.0, get_encodings_from_content will be removed. For " + "more information, please see the discussion on issue #2266. (This" + " warning should only appear once.)" + ), + DeprecationWarning, + ) + + charset_re = re.compile(r']', flags=re.I) + pragma_re = re.compile(r']', flags=re.I) + xml_re = re.compile(r'^<\?xml.*?encoding=["\']*(.+?)["\'>]') + + return ( + charset_re.findall(content) + + pragma_re.findall(content) + + xml_re.findall(content) + ) + + +def _parse_content_type_header(header): + """Returns content type and parameters from given header + + :param header: string + :return: tuple containing content type and dictionary of + parameters + """ + + tokens = header.split(";") + content_type, params = tokens[0].strip(), tokens[1:] + params_dict = {} + items_to_strip = "\"' " + + for param in params: + param = param.strip() + if param: + key, value = param, True + index_of_equals = param.find("=") + if index_of_equals != -1: + key = param[:index_of_equals].strip(items_to_strip) + value = param[index_of_equals + 1 :].strip(items_to_strip) + params_dict[key.lower()] = value + return content_type, params_dict + + +def get_encoding_from_headers(headers): + """Returns encodings from given HTTP Header Dict. + + :param headers: dictionary to extract encoding from. + :rtype: str + """ + + content_type = headers.get("content-type") + + if not content_type: + return None + + content_type, params = _parse_content_type_header(content_type) + + if "charset" in params: + return params["charset"].strip("'\"") + + if "text" in content_type: + return "ISO-8859-1" + + if "application/json" in content_type: + # Assume UTF-8 based on RFC 4627: https://www.ietf.org/rfc/rfc4627.txt since the charset was unset + return "utf-8" + + +def stream_decode_response_unicode(iterator, r): + """Stream decodes an iterator.""" + + if r.encoding is None: + yield from iterator + return + + decoder = codecs.getincrementaldecoder(r.encoding)(errors="replace") + for chunk in iterator: + rv = decoder.decode(chunk) + if rv: + yield rv + rv = decoder.decode(b"", final=True) + if rv: + yield rv + + +def iter_slices(string, slice_length): + """Iterate over slices of a string.""" + pos = 0 + if slice_length is None or slice_length <= 0: + slice_length = len(string) + while pos < len(string): + yield string[pos : pos + slice_length] + pos += slice_length + + +def get_unicode_from_response(r): + """Returns the requested content back in unicode. + + :param r: Response object to get unicode content from. + + Tried: + + 1. charset from content-type + 2. fall back and replace all unicode characters + + :rtype: str + """ + warnings.warn( + ( + "In requests 3.0, get_unicode_from_response will be removed. For " + "more information, please see the discussion on issue #2266. (This" + " warning should only appear once.)" + ), + DeprecationWarning, + ) + + tried_encodings = [] + + # Try charset from content-type + encoding = get_encoding_from_headers(r.headers) + + if encoding: + try: + return str(r.content, encoding) + except UnicodeError: + tried_encodings.append(encoding) + + # Fall back: + try: + return str(r.content, encoding, errors="replace") + except TypeError: + return r.content + + +# The unreserved URI characters (RFC 3986) +UNRESERVED_SET = frozenset( + "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz" + "0123456789-._~" +) + + +def unquote_unreserved(uri): + """Un-escape any percent-escape sequences in a URI that are unreserved + characters. This leaves all reserved, illegal and non-ASCII bytes encoded. + + :rtype: str + """ + parts = uri.split("%") + for i in range(1, len(parts)): + h = parts[i][0:2] + if len(h) == 2 and h.isalnum(): + try: + c = chr(int(h, 16)) + except ValueError: + raise InvalidURL(f"Invalid percent-escape sequence: '{h}'") + + if c in UNRESERVED_SET: + parts[i] = c + parts[i][2:] + else: + parts[i] = f"%{parts[i]}" + else: + parts[i] = f"%{parts[i]}" + return "".join(parts) + + +def requote_uri(uri): + """Re-quote the given URI. + + This function passes the given URI through an unquote/quote cycle to + ensure that it is fully and consistently quoted. + + :rtype: str + """ + safe_with_percent = "!#$%&'()*+,/:;=?@[]~" + safe_without_percent = "!#$&'()*+,/:;=?@[]~" + try: + # Unquote only the unreserved characters + # Then quote only illegal characters (do not quote reserved, + # unreserved, or '%') + return quote(unquote_unreserved(uri), safe=safe_with_percent) + except InvalidURL: + # We couldn't unquote the given URI, so let's try quoting it, but + # there may be unquoted '%'s in the URI. We need to make sure they're + # properly quoted so they do not cause issues elsewhere. + return quote(uri, safe=safe_without_percent) + + +def address_in_network(ip, net): + """This function allows you to check if an IP belongs to a network subnet + + Example: returns True if ip = 192.168.1.1 and net = 192.168.1.0/24 + returns False if ip = 192.168.1.1 and net = 192.168.100.0/24 + + :rtype: bool + """ + ipaddr = struct.unpack("=L", socket.inet_aton(ip))[0] + netaddr, bits = net.split("/") + netmask = struct.unpack("=L", socket.inet_aton(dotted_netmask(int(bits))))[0] + network = struct.unpack("=L", socket.inet_aton(netaddr))[0] & netmask + return (ipaddr & netmask) == (network & netmask) + + +def dotted_netmask(mask): + """Converts mask from /xx format to xxx.xxx.xxx.xxx + + Example: if mask is 24 function returns 255.255.255.0 + + :rtype: str + """ + bits = 0xFFFFFFFF ^ (1 << 32 - mask) - 1 + return socket.inet_ntoa(struct.pack(">I", bits)) + + +def is_ipv4_address(string_ip): + """ + :rtype: bool + """ + try: + socket.inet_aton(string_ip) + except OSError: + return False + return True + + +def is_valid_cidr(string_network): + """ + Very simple check of the cidr format in no_proxy variable. + + :rtype: bool + """ + if string_network.count("/") == 1: + try: + mask = int(string_network.split("/")[1]) + except ValueError: + return False + + if mask < 1 or mask > 32: + return False + + try: + socket.inet_aton(string_network.split("/")[0]) + except OSError: + return False + else: + return False + return True + + +@contextlib.contextmanager +def set_environ(env_name, value): + """Set the environment variable 'env_name' to 'value' + + Save previous value, yield, and then restore the previous value stored in + the environment variable 'env_name'. + + If 'value' is None, do nothing""" + value_changed = value is not None + if value_changed: + old_value = os.environ.get(env_name) + os.environ[env_name] = value + try: + yield + finally: + if value_changed: + if old_value is None: + del os.environ[env_name] + else: + os.environ[env_name] = old_value + + +def should_bypass_proxies(url, no_proxy): + """ + Returns whether we should bypass proxies or not. + + :rtype: bool + """ + # Prioritize lowercase environment variables over uppercase + # to keep a consistent behaviour with other http projects (curl, wget). + def get_proxy(key): + return os.environ.get(key) or os.environ.get(key.upper()) + + # First check whether no_proxy is defined. If it is, check that the URL + # we're getting isn't in the no_proxy list. + no_proxy_arg = no_proxy + if no_proxy is None: + no_proxy = get_proxy("no_proxy") + parsed = urlparse(url) + + if parsed.hostname is None: + # URLs don't always have hostnames, e.g. file:/// urls. + return True + + if no_proxy: + # We need to check whether we match here. We need to see if we match + # the end of the hostname, both with and without the port. + no_proxy = (host for host in no_proxy.replace(" ", "").split(",") if host) + + if is_ipv4_address(parsed.hostname): + for proxy_ip in no_proxy: + if is_valid_cidr(proxy_ip): + if address_in_network(parsed.hostname, proxy_ip): + return True + elif parsed.hostname == proxy_ip: + # If no_proxy ip was defined in plain IP notation instead of cidr notation & + # matches the IP of the index + return True + else: + host_with_port = parsed.hostname + if parsed.port: + host_with_port += f":{parsed.port}" + + for host in no_proxy: + if parsed.hostname.endswith(host) or host_with_port.endswith(host): + # The URL does match something in no_proxy, so we don't want + # to apply the proxies on this URL. + return True + + with set_environ("no_proxy", no_proxy_arg): + # parsed.hostname can be `None` in cases such as a file URI. + try: + bypass = proxy_bypass(parsed.hostname) + except (TypeError, socket.gaierror): + bypass = False + + if bypass: + return True + + return False + + +def get_environ_proxies(url, no_proxy=None): + """ + Return a dict of environment proxies. + + :rtype: dict + """ + if should_bypass_proxies(url, no_proxy=no_proxy): + return {} + else: + return getproxies() + + +def select_proxy(url, proxies): + """Select a proxy for the url, if applicable. + + :param url: The url being for the request + :param proxies: A dictionary of schemes or schemes and hosts to proxy URLs + """ + proxies = proxies or {} + urlparts = urlparse(url) + if urlparts.hostname is None: + return proxies.get(urlparts.scheme, proxies.get("all")) + + proxy_keys = [ + urlparts.scheme + "://" + urlparts.hostname, + urlparts.scheme, + "all://" + urlparts.hostname, + "all", + ] + proxy = None + for proxy_key in proxy_keys: + if proxy_key in proxies: + proxy = proxies[proxy_key] + break + + return proxy + + +def resolve_proxies(request, proxies, trust_env=True): + """This method takes proxy information from a request and configuration + input to resolve a mapping of target proxies. This will consider settings + such a NO_PROXY to strip proxy configurations. + + :param request: Request or PreparedRequest + :param proxies: A dictionary of schemes or schemes and hosts to proxy URLs + :param trust_env: Boolean declaring whether to trust environment configs + + :rtype: dict + """ + proxies = proxies if proxies is not None else {} + url = request.url + scheme = urlparse(url).scheme + no_proxy = proxies.get("no_proxy") + new_proxies = proxies.copy() + + if trust_env and not should_bypass_proxies(url, no_proxy=no_proxy): + environ_proxies = get_environ_proxies(url, no_proxy=no_proxy) + + proxy = environ_proxies.get(scheme, environ_proxies.get("all")) + + if proxy: + new_proxies.setdefault(scheme, proxy) + return new_proxies + + +def default_user_agent(name="python-requests"): + """ + Return a string representing the default user agent. + + :rtype: str + """ + return f"{name}/{__version__}" + + +def default_headers(): + """ + :rtype: requests.structures.CaseInsensitiveDict + """ + return CaseInsensitiveDict( + { + "User-Agent": default_user_agent(), + "Accept-Encoding": DEFAULT_ACCEPT_ENCODING, + "Accept": "*/*", + "Connection": "keep-alive", + } + ) + + +def parse_header_links(value): + """Return a list of parsed link headers proxies. + + i.e. Link: ; rel=front; type="image/jpeg",; rel=back;type="image/jpeg" + + :rtype: list + """ + + links = [] + + replace_chars = " '\"" + + value = value.strip(replace_chars) + if not value: + return links + + for val in re.split(", *<", value): + try: + url, params = val.split(";", 1) + except ValueError: + url, params = val, "" + + link = {"url": url.strip("<> '\"")} + + for param in params.split(";"): + try: + key, value = param.split("=") + except ValueError: + break + + link[key.strip(replace_chars)] = value.strip(replace_chars) + + links.append(link) + + return links + + +# Null bytes; no need to recreate these on each call to guess_json_utf +_null = "\x00".encode("ascii") # encoding to ASCII for Python 3 +_null2 = _null * 2 +_null3 = _null * 3 + + +def guess_json_utf(data): + """ + :rtype: str + """ + # JSON always starts with two ASCII characters, so detection is as + # easy as counting the nulls and from their location and count + # determine the encoding. Also detect a BOM, if present. + sample = data[:4] + if sample in (codecs.BOM_UTF32_LE, codecs.BOM_UTF32_BE): + return "utf-32" # BOM included + if sample[:3] == codecs.BOM_UTF8: + return "utf-8-sig" # BOM included, MS style (discouraged) + if sample[:2] in (codecs.BOM_UTF16_LE, codecs.BOM_UTF16_BE): + return "utf-16" # BOM included + nullcount = sample.count(_null) + if nullcount == 0: + return "utf-8" + if nullcount == 2: + if sample[::2] == _null2: # 1st and 3rd are null + return "utf-16-be" + if sample[1::2] == _null2: # 2nd and 4th are null + return "utf-16-le" + # Did not detect 2 valid UTF-16 ascii-range characters + if nullcount == 3: + if sample[:3] == _null3: + return "utf-32-be" + if sample[1:] == _null3: + return "utf-32-le" + # Did not detect a valid UTF-32 ascii-range character + return None + + +def prepend_scheme_if_needed(url, new_scheme): + """Given a URL that may or may not have a scheme, prepend the given scheme. + Does not replace a present scheme with the one provided as an argument. + + :rtype: str + """ + parsed = parse_url(url) + scheme, auth, host, port, path, query, fragment = parsed + + # A defect in urlparse determines that there isn't a netloc present in some + # urls. We previously assumed parsing was overly cautious, and swapped the + # netloc and path. Due to a lack of tests on the original defect, this is + # maintained with parse_url for backwards compatibility. + netloc = parsed.netloc + if not netloc: + netloc, path = path, netloc + + if auth: + # parse_url doesn't provide the netloc with auth + # so we'll add it ourselves. + netloc = "@".join([auth, netloc]) + if scheme is None: + scheme = new_scheme + if path is None: + path = "" + + return urlunparse((scheme, netloc, path, "", query, fragment)) + + +def get_auth_from_url(url): + """Given a url with authentication components, extract them into a tuple of + username,password. + + :rtype: (str,str) + """ + parsed = urlparse(url) + + try: + auth = (unquote(parsed.username), unquote(parsed.password)) + except (AttributeError, TypeError): + auth = ("", "") + + return auth + + +def check_header_validity(header): + """Verifies that header parts don't contain leading whitespace + reserved characters, or return characters. + + :param header: tuple, in the format (name, value). + """ + name, value = header + + for part in header: + if type(part) not in HEADER_VALIDATORS: + raise InvalidHeader( + f"Header part ({part!r}) from {{{name!r}: {value!r}}} must be " + f"of type str or bytes, not {type(part)}" + ) + + _validate_header_part(name, "name", HEADER_VALIDATORS[type(name)][0]) + _validate_header_part(value, "value", HEADER_VALIDATORS[type(value)][1]) + + +def _validate_header_part(header_part, header_kind, validator): + if not validator.match(header_part): + raise InvalidHeader( + f"Invalid leading whitespace, reserved character(s), or return" + f"character(s) in header {header_kind}: {header_part!r}" + ) + + +def urldefragauth(url): + """ + Given a url remove the fragment and the authentication part. + + :rtype: str + """ + scheme, netloc, path, params, query, fragment = urlparse(url) + + # see func:`prepend_scheme_if_needed` + if not netloc: + netloc, path = path, netloc + + netloc = netloc.rsplit("@", 1)[-1] + + return urlunparse((scheme, netloc, path, params, query, "")) + + +def rewind_body(prepared_request): + """Move file pointer back to its recorded starting position + so it can be read again on redirect. + """ + body_seek = getattr(prepared_request.body, "seek", None) + if body_seek is not None and isinstance( + prepared_request._body_position, integer_types + ): + try: + body_seek(prepared_request._body_position) + except OSError: + raise UnrewindableBodyError( + "An error occurred when rewinding request body for redirect." + ) + else: + raise UnrewindableBodyError("Unable to rewind request body for redirect.") diff --git a/_vendor/urllib3-1.26.12.dist-info/INSTALLER b/_vendor/urllib3-1.26.12.dist-info/INSTALLER new file mode 100644 index 0000000..a1b589e --- /dev/null +++ b/_vendor/urllib3-1.26.12.dist-info/INSTALLER @@ -0,0 +1 @@ +pip diff --git a/_vendor/urllib3-1.26.12.dist-info/LICENSE.txt b/_vendor/urllib3-1.26.12.dist-info/LICENSE.txt new file mode 100644 index 0000000..429a176 --- /dev/null +++ b/_vendor/urllib3-1.26.12.dist-info/LICENSE.txt @@ -0,0 +1,21 @@ +MIT License + +Copyright (c) 2008-2020 Andrey Petrov and contributors (see CONTRIBUTORS.txt) + +Permission is hereby granted, free of charge, to any person obtaining a copy +of this software and associated documentation files (the "Software"), to deal +in the Software without restriction, including without limitation the rights +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +copies of the Software, and to permit persons to whom the Software is +furnished to do so, subject to the following conditions: + +The above copyright notice and this permission notice shall be included in all +copies or substantial portions of the Software. + +THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +SOFTWARE. diff --git a/_vendor/urllib3-1.26.12.dist-info/METADATA b/_vendor/urllib3-1.26.12.dist-info/METADATA new file mode 100644 index 0000000..1239f90 --- /dev/null +++ b/_vendor/urllib3-1.26.12.dist-info/METADATA @@ -0,0 +1,1448 @@ +Metadata-Version: 2.1 +Name: urllib3 +Version: 1.26.12 +Summary: HTTP library with thread-safe connection pooling, file post, and more. +Home-page: https://urllib3.readthedocs.io/ +Author: Andrey Petrov +Author-email: andrey.petrov@shazow.net +License: MIT +Project-URL: Documentation, https://urllib3.readthedocs.io/ +Project-URL: Code, https://github.com/urllib3/urllib3 +Project-URL: Issue tracker, https://github.com/urllib3/urllib3/issues +Keywords: urllib httplib threadsafe filepost http https ssl pooling +Classifier: Environment :: Web Environment +Classifier: Intended Audience :: Developers +Classifier: License :: OSI Approved :: MIT License +Classifier: Operating System :: OS Independent +Classifier: Programming Language :: Python +Classifier: Programming Language :: Python :: 2 +Classifier: Programming Language :: Python :: 2.7 +Classifier: Programming Language :: Python :: 3 +Classifier: Programming Language :: Python :: 3.6 +Classifier: Programming Language :: Python :: 3.7 +Classifier: Programming Language :: Python :: 3.8 +Classifier: Programming Language :: Python :: 3.9 +Classifier: Programming Language :: Python :: 3.10 +Classifier: Programming Language :: Python :: 3.11 +Classifier: Programming Language :: Python :: Implementation :: CPython +Classifier: Programming Language :: Python :: Implementation :: PyPy +Classifier: Topic :: Internet :: WWW/HTTP +Classifier: Topic :: Software Development :: Libraries +Requires-Python: >=2.7, !=3.0.*, !=3.1.*, !=3.2.*, !=3.3.*, !=3.4.*, !=3.5.*, <4 +Description-Content-Type: text/x-rst +License-File: LICENSE.txt +Provides-Extra: brotli +Requires-Dist: brotlicffi (>=0.8.0) ; ((os_name != "nt" or python_version >= "3") and platform_python_implementation != "CPython") and extra == 'brotli' +Requires-Dist: brotli (>=1.0.9) ; ((os_name != "nt" or python_version >= "3") and platform_python_implementation == "CPython") and extra == 'brotli' +Requires-Dist: brotlipy (>=0.6.0) ; (os_name == "nt" and python_version < "3") and extra == 'brotli' +Provides-Extra: secure +Requires-Dist: pyOpenSSL (>=0.14) ; extra == 'secure' +Requires-Dist: cryptography (>=1.3.4) ; extra == 'secure' +Requires-Dist: idna (>=2.0.0) ; extra == 'secure' +Requires-Dist: certifi ; extra == 'secure' +Requires-Dist: urllib3-secure-extra ; extra == 'secure' +Requires-Dist: ipaddress ; (python_version == "2.7") and extra == 'secure' +Provides-Extra: socks +Requires-Dist: PySocks (!=1.5.7,<2.0,>=1.5.6) ; extra == 'socks' + + +urllib3 is a powerful, *user-friendly* HTTP client for Python. Much of the +Python ecosystem already uses urllib3 and you should too. +urllib3 brings many critical features that are missing from the Python +standard libraries: + +- Thread safety. +- Connection pooling. +- Client-side SSL/TLS verification. +- File uploads with multipart encoding. +- Helpers for retrying requests and dealing with HTTP redirects. +- Support for gzip, deflate, and brotli encoding. +- Proxy support for HTTP and SOCKS. +- 100% test coverage. + +urllib3 is powerful and easy to use: + +.. code-block:: python + + >>> import urllib3 + >>> http = urllib3.PoolManager() + >>> r = http.request('GET', 'http://httpbin.org/robots.txt') + >>> r.status + 200 + >>> r.data + 'User-agent: *\nDisallow: /deny\n' + + +Installing +---------- + +urllib3 can be installed with `pip `_:: + + $ python -m pip install urllib3 + +Alternatively, you can grab the latest source code from `GitHub `_:: + + $ git clone https://github.com/urllib3/urllib3.git + $ cd urllib3 + $ git checkout 1.26.x + $ pip install . + + +Documentation +------------- + +urllib3 has usage and reference documentation at `urllib3.readthedocs.io `_. + + +Contributing +------------ + +urllib3 happily accepts contributions. Please see our +`contributing documentation `_ +for some tips on getting started. + + +Security Disclosures +-------------------- + +To report a security vulnerability, please use the +`Tidelift security contact `_. +Tidelift will coordinate the fix and disclosure with maintainers. + + +Maintainers +----------- + +- `@sethmlarson `__ (Seth M. Larson) +- `@pquentin `__ (Quentin Pradet) +- `@theacodes `__ (Thea Flowers) +- `@haikuginger `__ (Jess Shapiro) +- `@lukasa `__ (Cory Benfield) +- `@sigmavirus24 `__ (Ian Stapleton Cordasco) +- `@shazow `__ (Andrey Petrov) + +👋 + + +Sponsorship +----------- + +If your company benefits from this library, please consider `sponsoring its +development `_. + + +For Enterprise +-------------- + +.. |tideliftlogo| image:: https://nedbatchelder.com/pix/Tidelift_Logos_RGB_Tidelift_Shorthand_On-White_small.png + :width: 75 + :alt: Tidelift + +.. list-table:: + :widths: 10 100 + + * - |tideliftlogo| + - Professional support for urllib3 is available as part of the `Tidelift + Subscription`_. Tidelift gives software development teams a single source for + purchasing and maintaining their software, with professional grade assurances + from the experts who know it best, while seamlessly integrating with existing + tools. + +.. _Tidelift Subscription: https://tidelift.com/subscription/pkg/pypi-urllib3?utm_source=pypi-urllib3&utm_medium=referral&utm_campaign=readme + + +Changes +======= + +1.26.12 (2022-08-22) +-------------------- + +* Deprecated the `urllib3[secure]` extra and the `urllib3.contrib.pyopenssl` module. + Both will be removed in v2.x. See this `GitHub issue `_ + for justification and info on how to migrate. + + +1.26.11 (2022-07-25) +-------------------- + +* Fixed an issue where reading more than 2 GiB in a call to ``HTTPResponse.read`` would + raise an ``OverflowError`` on Python 3.9 and earlier. + + +1.26.10 (2022-07-07) +-------------------- + +* Removed support for Python 3.5 +* Fixed an issue where a ``ProxyError`` recommending configuring the proxy as HTTP + instead of HTTPS could appear even when an HTTPS proxy wasn't configured. + + +1.26.9 (2022-03-16) +------------------- + +* Changed ``urllib3[brotli]`` extra to favor installing Brotli libraries that are still + receiving updates like ``brotli`` and ``brotlicffi`` instead of ``brotlipy``. + This change does not impact behavior of urllib3, only which dependencies are installed. +* Fixed a socket leaking when ``HTTPSConnection.connect()`` raises an exception. +* Fixed ``server_hostname`` being forwarded from ``PoolManager`` to ``HTTPConnectionPool`` + when requesting an HTTP URL. Should only be forwarded when requesting an HTTPS URL. + + +1.26.8 (2022-01-07) +------------------- + +* Added extra message to ``urllib3.exceptions.ProxyError`` when urllib3 detects that + a proxy is configured to use HTTPS but the proxy itself appears to only use HTTP. +* Added a mention of the size of the connection pool when discarding a connection due to the pool being full. +* Added explicit support for Python 3.11. +* Deprecated the ``Retry.MAX_BACKOFF`` class property in favor of ``Retry.DEFAULT_MAX_BACKOFF`` + to better match the rest of the default parameter names. ``Retry.MAX_BACKOFF`` is removed in v2.0. +* Changed location of the vendored ``ssl.match_hostname`` function from ``urllib3.packages.ssl_match_hostname`` + to ``urllib3.util.ssl_match_hostname`` to ensure Python 3.10+ compatibility after being repackaged + by downstream distributors. +* Fixed absolute imports, all imports are now relative. + + +1.26.7 (2021-09-22) +------------------- + +* Fixed a bug with HTTPS hostname verification involving IP addresses and lack + of SNI. (Issue #2400) +* Fixed a bug where IPv6 braces weren't stripped during certificate hostname + matching. (Issue #2240) + + +1.26.6 (2021-06-25) +------------------- + +* Deprecated the ``urllib3.contrib.ntlmpool`` module. urllib3 is not able to support + it properly due to `reasons listed in this issue `_. + If you are a user of this module please leave a comment. +* Changed ``HTTPConnection.request_chunked()`` to not erroneously emit multiple + ``Transfer-Encoding`` headers in the case that one is already specified. +* Fixed typo in deprecation message to recommend ``Retry.DEFAULT_ALLOWED_METHODS``. + + +1.26.5 (2021-05-26) +------------------- + +* Fixed deprecation warnings emitted in Python 3.10. +* Updated vendored ``six`` library to 1.16.0. +* Improved performance of URL parser when splitting + the authority component. + + +1.26.4 (2021-03-15) +------------------- + +* Changed behavior of the default ``SSLContext`` when connecting to HTTPS proxy + during HTTPS requests. The default ``SSLContext`` now sets ``check_hostname=True``. + + +1.26.3 (2021-01-26) +------------------- + +* Fixed bytes and string comparison issue with headers (Pull #2141) + +* Changed ``ProxySchemeUnknown`` error message to be + more actionable if the user supplies a proxy URL without + a scheme. (Pull #2107) + + +1.26.2 (2020-11-12) +------------------- + +* Fixed an issue where ``wrap_socket`` and ``CERT_REQUIRED`` wouldn't + be imported properly on Python 2.7.8 and earlier (Pull #2052) + + +1.26.1 (2020-11-11) +------------------- + +* Fixed an issue where two ``User-Agent`` headers would be sent if a + ``User-Agent`` header key is passed as ``bytes`` (Pull #2047) + + +1.26.0 (2020-11-10) +------------------- + +* **NOTE: urllib3 v2.0 will drop support for Python 2**. + `Read more in the v2.0 Roadmap `_. + +* Added support for HTTPS proxies contacting HTTPS servers (Pull #1923, Pull #1806) + +* Deprecated negotiating TLSv1 and TLSv1.1 by default. Users that + still wish to use TLS earlier than 1.2 without a deprecation warning + should opt-in explicitly by setting ``ssl_version=ssl.PROTOCOL_TLSv1_1`` (Pull #2002) + **Starting in urllib3 v2.0: Connections that receive a ``DeprecationWarning`` will fail** + +* Deprecated ``Retry`` options ``Retry.DEFAULT_METHOD_WHITELIST``, ``Retry.DEFAULT_REDIRECT_HEADERS_BLACKLIST`` + and ``Retry(method_whitelist=...)`` in favor of ``Retry.DEFAULT_ALLOWED_METHODS``, + ``Retry.DEFAULT_REMOVE_HEADERS_ON_REDIRECT``, and ``Retry(allowed_methods=...)`` + (Pull #2000) **Starting in urllib3 v2.0: Deprecated options will be removed** + +* Added default ``User-Agent`` header to every request (Pull #1750) + +* Added ``urllib3.util.SKIP_HEADER`` for skipping ``User-Agent``, ``Accept-Encoding``, + and ``Host`` headers from being automatically emitted with requests (Pull #2018) + +* Collapse ``transfer-encoding: chunked`` request data and framing into + the same ``socket.send()`` call (Pull #1906) + +* Send ``http/1.1`` ALPN identifier with every TLS handshake by default (Pull #1894) + +* Properly terminate SecureTransport connections when CA verification fails (Pull #1977) + +* Don't emit an ``SNIMissingWarning`` when passing ``server_hostname=None`` + to SecureTransport (Pull #1903) + +* Disabled requesting TLSv1.2 session tickets as they weren't being used by urllib3 (Pull #1970) + +* Suppress ``BrokenPipeError`` when writing request body after the server + has closed the socket (Pull #1524) + +* Wrap ``ssl.SSLError`` that can be raised from reading a socket (e.g. "bad MAC") + into an ``urllib3.exceptions.SSLError`` (Pull #1939) + + +1.25.11 (2020-10-19) +-------------------- + +* Fix retry backoff time parsed from ``Retry-After`` header when given + in the HTTP date format. The HTTP date was parsed as the local timezone + rather than accounting for the timezone in the HTTP date (typically + UTC) (Pull #1932, Pull #1935, Pull #1938, Pull #1949) + +* Fix issue where an error would be raised when the ``SSLKEYLOGFILE`` + environment variable was set to the empty string. Now ``SSLContext.keylog_file`` + is not set in this situation (Pull #2016) + + +1.25.10 (2020-07-22) +-------------------- + +* Added support for ``SSLKEYLOGFILE`` environment variable for + logging TLS session keys with use with programs like + Wireshark for decrypting captured web traffic (Pull #1867) + +* Fixed loading of SecureTransport libraries on macOS Big Sur + due to the new dynamic linker cache (Pull #1905) + +* Collapse chunked request bodies data and framing into one + call to ``send()`` to reduce the number of TCP packets by 2-4x (Pull #1906) + +* Don't insert ``None`` into ``ConnectionPool`` if the pool + was empty when requesting a connection (Pull #1866) + +* Avoid ``hasattr`` call in ``BrotliDecoder.decompress()`` (Pull #1858) + + +1.25.9 (2020-04-16) +------------------- + +* Added ``InvalidProxyConfigurationWarning`` which is raised when + erroneously specifying an HTTPS proxy URL. urllib3 doesn't currently + support connecting to HTTPS proxies but will soon be able to + and we would like users to migrate properly without much breakage. + + See `this GitHub issue `_ + for more information on how to fix your proxy config. (Pull #1851) + +* Drain connection after ``PoolManager`` redirect (Pull #1817) + +* Ensure ``load_verify_locations`` raises ``SSLError`` for all backends (Pull #1812) + +* Rename ``VerifiedHTTPSConnection`` to ``HTTPSConnection`` (Pull #1805) + +* Allow the CA certificate data to be passed as a string (Pull #1804) + +* Raise ``ValueError`` if method contains control characters (Pull #1800) + +* Add ``__repr__`` to ``Timeout`` (Pull #1795) + + +1.25.8 (2020-01-20) +------------------- + +* Drop support for EOL Python 3.4 (Pull #1774) + +* Optimize _encode_invalid_chars (Pull #1787) + + +1.25.7 (2019-11-11) +------------------- + +* Preserve ``chunked`` parameter on retries (Pull #1715, Pull #1734) + +* Allow unset ``SERVER_SOFTWARE`` in App Engine (Pull #1704, Issue #1470) + +* Fix issue where URL fragment was sent within the request target. (Pull #1732) + +* Fix issue where an empty query section in a URL would fail to parse. (Pull #1732) + +* Remove TLS 1.3 support in SecureTransport due to Apple removing support (Pull #1703) + + +1.25.6 (2019-09-24) +------------------- + +* Fix issue where tilde (``~``) characters were incorrectly + percent-encoded in the path. (Pull #1692) + + +1.25.5 (2019-09-19) +------------------- + +* Add mitigation for BPO-37428 affecting Python <3.7.4 and OpenSSL 1.1.1+ which + caused certificate verification to be enabled when using ``cert_reqs=CERT_NONE``. + (Issue #1682) + + +1.25.4 (2019-09-19) +------------------- + +* Propagate Retry-After header settings to subsequent retries. (Pull #1607) + +* Fix edge case where Retry-After header was still respected even when + explicitly opted out of. (Pull #1607) + +* Remove dependency on ``rfc3986`` for URL parsing. + +* Fix issue where URLs containing invalid characters within ``Url.auth`` would + raise an exception instead of percent-encoding those characters. + +* Add support for ``HTTPResponse.auto_close = False`` which makes HTTP responses + work well with BufferedReaders and other ``io`` module features. (Pull #1652) + +* Percent-encode invalid characters in URL for ``HTTPConnectionPool.request()`` (Pull #1673) + + +1.25.3 (2019-05-23) +------------------- + +* Change ``HTTPSConnection`` to load system CA certificates + when ``ca_certs``, ``ca_cert_dir``, and ``ssl_context`` are + unspecified. (Pull #1608, Issue #1603) + +* Upgrade bundled rfc3986 to v1.3.2. (Pull #1609, Issue #1605) + + +1.25.2 (2019-04-28) +------------------- + +* Change ``is_ipaddress`` to not detect IPvFuture addresses. (Pull #1583) + +* Change ``parse_url`` to percent-encode invalid characters within the + path, query, and target components. (Pull #1586) + + +1.25.1 (2019-04-24) +------------------- + +* Add support for Google's ``Brotli`` package. (Pull #1572, Pull #1579) + +* Upgrade bundled rfc3986 to v1.3.1 (Pull #1578) + + +1.25 (2019-04-22) +----------------- + +* Require and validate certificates by default when using HTTPS (Pull #1507) + +* Upgraded ``urllib3.utils.parse_url()`` to be RFC 3986 compliant. (Pull #1487) + +* Added support for ``key_password`` for ``HTTPSConnectionPool`` to use + encrypted ``key_file`` without creating your own ``SSLContext`` object. (Pull #1489) + +* Add TLSv1.3 support to CPython, pyOpenSSL, and SecureTransport ``SSLContext`` + implementations. (Pull #1496) + +* Switched the default multipart header encoder from RFC 2231 to HTML 5 working draft. (Issue #303, Pull #1492) + +* Fixed issue where OpenSSL would block if an encrypted client private key was + given and no password was given. Instead an ``SSLError`` is raised. (Pull #1489) + +* Added support for Brotli content encoding. It is enabled automatically if + ``brotlipy`` package is installed which can be requested with + ``urllib3[brotli]`` extra. (Pull #1532) + +* Drop ciphers using DSS key exchange from default TLS cipher suites. + Improve default ciphers when using SecureTransport. (Pull #1496) + +* Implemented a more efficient ``HTTPResponse.__iter__()`` method. (Issue #1483) + +1.24.3 (2019-05-01) +------------------- + +* Apply fix for CVE-2019-9740. (Pull #1591) + +1.24.2 (2019-04-17) +------------------- + +* Don't load system certificates by default when any other ``ca_certs``, ``ca_certs_dir`` or + ``ssl_context`` parameters are specified. + +* Remove Authorization header regardless of case when redirecting to cross-site. (Issue #1510) + +* Add support for IPv6 addresses in subjectAltName section of certificates. (Issue #1269) + + +1.24.1 (2018-11-02) +------------------- + +* Remove quadratic behavior within ``GzipDecoder.decompress()`` (Issue #1467) + +* Restored functionality of ``ciphers`` parameter for ``create_urllib3_context()``. (Issue #1462) + + +1.24 (2018-10-16) +----------------- + +* Allow key_server_hostname to be specified when initializing a PoolManager to allow custom SNI to be overridden. (Pull #1449) + +* Test against Python 3.7 on AppVeyor. (Pull #1453) + +* Early-out ipv6 checks when running on App Engine. (Pull #1450) + +* Change ambiguous description of backoff_factor (Pull #1436) + +* Add ability to handle multiple Content-Encodings (Issue #1441 and Pull #1442) + +* Skip DNS names that can't be idna-decoded when using pyOpenSSL (Issue #1405). + +* Add a server_hostname parameter to HTTPSConnection which allows for + overriding the SNI hostname sent in the handshake. (Pull #1397) + +* Drop support for EOL Python 2.6 (Pull #1429 and Pull #1430) + +* Fixed bug where responses with header Content-Type: message/* erroneously + raised HeaderParsingError, resulting in a warning being logged. (Pull #1439) + +* Move urllib3 to src/urllib3 (Pull #1409) + + +1.23 (2018-06-04) +----------------- + +* Allow providing a list of headers to strip from requests when redirecting + to a different host. Defaults to the ``Authorization`` header. Different + headers can be set via ``Retry.remove_headers_on_redirect``. (Issue #1316) + +* Fix ``util.selectors._fileobj_to_fd`` to accept ``long`` (Issue #1247). + +* Dropped Python 3.3 support. (Pull #1242) + +* Put the connection back in the pool when calling stream() or read_chunked() on + a chunked HEAD response. (Issue #1234) + +* Fixed pyOpenSSL-specific ssl client authentication issue when clients + attempted to auth via certificate + chain (Issue #1060) + +* Add the port to the connectionpool connect print (Pull #1251) + +* Don't use the ``uuid`` module to create multipart data boundaries. (Pull #1380) + +* ``read_chunked()`` on a closed response returns no chunks. (Issue #1088) + +* Add Python 2.6 support to ``contrib.securetransport`` (Pull #1359) + +* Added support for auth info in url for SOCKS proxy (Pull #1363) + + +1.22 (2017-07-20) +----------------- + +* Fixed missing brackets in ``HTTP CONNECT`` when connecting to IPv6 address via + IPv6 proxy. (Issue #1222) + +* Made the connection pool retry on ``SSLError``. The original ``SSLError`` + is available on ``MaxRetryError.reason``. (Issue #1112) + +* Drain and release connection before recursing on retry/redirect. Fixes + deadlocks with a blocking connectionpool. (Issue #1167) + +* Fixed compatibility for cookiejar. (Issue #1229) + +* pyopenssl: Use vendored version of ``six``. (Issue #1231) + + +1.21.1 (2017-05-02) +------------------- + +* Fixed SecureTransport issue that would cause long delays in response body + delivery. (Pull #1154) + +* Fixed regression in 1.21 that threw exceptions when users passed the + ``socket_options`` flag to the ``PoolManager``. (Issue #1165) + +* Fixed regression in 1.21 that threw exceptions when users passed the + ``assert_hostname`` or ``assert_fingerprint`` flag to the ``PoolManager``. + (Pull #1157) + + +1.21 (2017-04-25) +----------------- + +* Improved performance of certain selector system calls on Python 3.5 and + later. (Pull #1095) + +* Resolved issue where the PyOpenSSL backend would not wrap SysCallError + exceptions appropriately when sending data. (Pull #1125) + +* Selectors now detects a monkey-patched select module after import for modules + that patch the select module like eventlet, greenlet. (Pull #1128) + +* Reduced memory consumption when streaming zlib-compressed responses + (as opposed to raw deflate streams). (Pull #1129) + +* Connection pools now use the entire request context when constructing the + pool key. (Pull #1016) + +* ``PoolManager.connection_from_*`` methods now accept a new keyword argument, + ``pool_kwargs``, which are merged with the existing ``connection_pool_kw``. + (Pull #1016) + +* Add retry counter for ``status_forcelist``. (Issue #1147) + +* Added ``contrib`` module for using SecureTransport on macOS: + ``urllib3.contrib.securetransport``. (Pull #1122) + +* urllib3 now only normalizes the case of ``http://`` and ``https://`` schemes: + for schemes it does not recognise, it assumes they are case-sensitive and + leaves them unchanged. + (Issue #1080) + + +1.20 (2017-01-19) +----------------- + +* Added support for waiting for I/O using selectors other than select, + improving urllib3's behaviour with large numbers of concurrent connections. + (Pull #1001) + +* Updated the date for the system clock check. (Issue #1005) + +* ConnectionPools now correctly consider hostnames to be case-insensitive. + (Issue #1032) + +* Outdated versions of PyOpenSSL now cause the PyOpenSSL contrib module + to fail when it is injected, rather than at first use. (Pull #1063) + +* Outdated versions of cryptography now cause the PyOpenSSL contrib module + to fail when it is injected, rather than at first use. (Issue #1044) + +* Automatically attempt to rewind a file-like body object when a request is + retried or redirected. (Pull #1039) + +* Fix some bugs that occur when modules incautiously patch the queue module. + (Pull #1061) + +* Prevent retries from occurring on read timeouts for which the request method + was not in the method whitelist. (Issue #1059) + +* Changed the PyOpenSSL contrib module to lazily load idna to avoid + unnecessarily bloating the memory of programs that don't need it. (Pull + #1076) + +* Add support for IPv6 literals with zone identifiers. (Pull #1013) + +* Added support for socks5h:// and socks4a:// schemes when working with SOCKS + proxies, and controlled remote DNS appropriately. (Issue #1035) + + +1.19.1 (2016-11-16) +------------------- + +* Fixed AppEngine import that didn't function on Python 3.5. (Pull #1025) + + +1.19 (2016-11-03) +----------------- + +* urllib3 now respects Retry-After headers on 413, 429, and 503 responses when + using the default retry logic. (Pull #955) + +* Remove markers from setup.py to assist ancient setuptools versions. (Issue + #986) + +* Disallow superscripts and other integerish things in URL ports. (Issue #989) + +* Allow urllib3's HTTPResponse.stream() method to continue to work with + non-httplib underlying FPs. (Pull #990) + +* Empty filenames in multipart headers are now emitted as such, rather than + being suppressed. (Issue #1015) + +* Prefer user-supplied Host headers on chunked uploads. (Issue #1009) + + +1.18.1 (2016-10-27) +------------------- + +* CVE-2016-9015. Users who are using urllib3 version 1.17 or 1.18 along with + PyOpenSSL injection and OpenSSL 1.1.0 *must* upgrade to this version. This + release fixes a vulnerability whereby urllib3 in the above configuration + would silently fail to validate TLS certificates due to erroneously setting + invalid flags in OpenSSL's ``SSL_CTX_set_verify`` function. These erroneous + flags do not cause a problem in OpenSSL versions before 1.1.0, which + interprets the presence of any flag as requesting certificate validation. + + There is no PR for this patch, as it was prepared for simultaneous disclosure + and release. The master branch received the same fix in Pull #1010. + + +1.18 (2016-09-26) +----------------- + +* Fixed incorrect message for IncompleteRead exception. (Pull #973) + +* Accept ``iPAddress`` subject alternative name fields in TLS certificates. + (Issue #258) + +* Fixed consistency of ``HTTPResponse.closed`` between Python 2 and 3. + (Issue #977) + +* Fixed handling of wildcard certificates when using PyOpenSSL. (Issue #979) + + +1.17 (2016-09-06) +----------------- + +* Accept ``SSLContext`` objects for use in SSL/TLS negotiation. (Issue #835) + +* ConnectionPool debug log now includes scheme, host, and port. (Issue #897) + +* Substantially refactored documentation. (Issue #887) + +* Used URLFetch default timeout on AppEngine, rather than hardcoding our own. + (Issue #858) + +* Normalize the scheme and host in the URL parser (Issue #833) + +* ``HTTPResponse`` contains the last ``Retry`` object, which now also + contains retries history. (Issue #848) + +* Timeout can no longer be set as boolean, and must be greater than zero. + (Pull #924) + +* Removed pyasn1 and ndg-httpsclient from dependencies used for PyOpenSSL. We + now use cryptography and idna, both of which are already dependencies of + PyOpenSSL. (Pull #930) + +* Fixed infinite loop in ``stream`` when amt=None. (Issue #928) + +* Try to use the operating system's certificates when we are using an + ``SSLContext``. (Pull #941) + +* Updated cipher suite list to allow ChaCha20+Poly1305. AES-GCM is preferred to + ChaCha20, but ChaCha20 is then preferred to everything else. (Pull #947) + +* Updated cipher suite list to remove 3DES-based cipher suites. (Pull #958) + +* Removed the cipher suite fallback to allow HIGH ciphers. (Pull #958) + +* Implemented ``length_remaining`` to determine remaining content + to be read. (Pull #949) + +* Implemented ``enforce_content_length`` to enable exceptions when + incomplete data chunks are received. (Pull #949) + +* Dropped connection start, dropped connection reset, redirect, forced retry, + and new HTTPS connection log levels to DEBUG, from INFO. (Pull #967) + + +1.16 (2016-06-11) +----------------- + +* Disable IPv6 DNS when IPv6 connections are not possible. (Issue #840) + +* Provide ``key_fn_by_scheme`` pool keying mechanism that can be + overridden. (Issue #830) + +* Normalize scheme and host to lowercase for pool keys, and include + ``source_address``. (Issue #830) + +* Cleaner exception chain in Python 3 for ``_make_request``. + (Issue #861) + +* Fixed installing ``urllib3[socks]`` extra. (Issue #864) + +* Fixed signature of ``ConnectionPool.close`` so it can actually safely be + called by subclasses. (Issue #873) + +* Retain ``release_conn`` state across retries. (Issues #651, #866) + +* Add customizable ``HTTPConnectionPool.ResponseCls``, which defaults to + ``HTTPResponse`` but can be replaced with a subclass. (Issue #879) + + +1.15.1 (2016-04-11) +------------------- + +* Fix packaging to include backports module. (Issue #841) + + +1.15 (2016-04-06) +----------------- + +* Added Retry(raise_on_status=False). (Issue #720) + +* Always use setuptools, no more distutils fallback. (Issue #785) + +* Dropped support for Python 3.2. (Issue #786) + +* Chunked transfer encoding when requesting with ``chunked=True``. + (Issue #790) + +* Fixed regression with IPv6 port parsing. (Issue #801) + +* Append SNIMissingWarning messages to allow users to specify it in + the PYTHONWARNINGS environment variable. (Issue #816) + +* Handle unicode headers in Py2. (Issue #818) + +* Log certificate when there is a hostname mismatch. (Issue #820) + +* Preserve order of request/response headers. (Issue #821) + + +1.14 (2015-12-29) +----------------- + +* contrib: SOCKS proxy support! (Issue #762) + +* Fixed AppEngine handling of transfer-encoding header and bug + in Timeout defaults checking. (Issue #763) + + +1.13.1 (2015-12-18) +------------------- + +* Fixed regression in IPv6 + SSL for match_hostname. (Issue #761) + + +1.13 (2015-12-14) +----------------- + +* Fixed ``pip install urllib3[secure]`` on modern pip. (Issue #706) + +* pyopenssl: Fixed SSL3_WRITE_PENDING error. (Issue #717) + +* pyopenssl: Support for TLSv1.1 and TLSv1.2. (Issue #696) + +* Close connections more defensively on exception. (Issue #734) + +* Adjusted ``read_chunked`` to handle gzipped, chunk-encoded bodies without + repeatedly flushing the decoder, to function better on Jython. (Issue #743) + +* Accept ``ca_cert_dir`` for SSL-related PoolManager configuration. (Issue #758) + + +1.12 (2015-09-03) +----------------- + +* Rely on ``six`` for importing ``httplib`` to work around + conflicts with other Python 3 shims. (Issue #688) + +* Add support for directories of certificate authorities, as supported by + OpenSSL. (Issue #701) + +* New exception: ``NewConnectionError``, raised when we fail to establish + a new connection, usually ``ECONNREFUSED`` socket error. + + +1.11 (2015-07-21) +----------------- + +* When ``ca_certs`` is given, ``cert_reqs`` defaults to + ``'CERT_REQUIRED'``. (Issue #650) + +* ``pip install urllib3[secure]`` will install Certifi and + PyOpenSSL as dependencies. (Issue #678) + +* Made ``HTTPHeaderDict`` usable as a ``headers`` input value + (Issues #632, #679) + +* Added `urllib3.contrib.appengine `_ + which has an ``AppEngineManager`` for using ``URLFetch`` in a + Google AppEngine environment. (Issue #664) + +* Dev: Added test suite for AppEngine. (Issue #631) + +* Fix performance regression when using PyOpenSSL. (Issue #626) + +* Passing incorrect scheme (e.g. ``foo://``) will raise + ``ValueError`` instead of ``AssertionError`` (backwards + compatible for now, but please migrate). (Issue #640) + +* Fix pools not getting replenished when an error occurs during a + request using ``release_conn=False``. (Issue #644) + +* Fix pool-default headers not applying for url-encoded requests + like GET. (Issue #657) + +* log.warning in Python 3 when headers are skipped due to parsing + errors. (Issue #642) + +* Close and discard connections if an error occurs during read. + (Issue #660) + +* Fix host parsing for IPv6 proxies. (Issue #668) + +* Separate warning type SubjectAltNameWarning, now issued once + per host. (Issue #671) + +* Fix ``httplib.IncompleteRead`` not getting converted to + ``ProtocolError`` when using ``HTTPResponse.stream()`` + (Issue #674) + +1.10.4 (2015-05-03) +------------------- + +* Migrate tests to Tornado 4. (Issue #594) + +* Append default warning configuration rather than overwrite. + (Issue #603) + +* Fix streaming decoding regression. (Issue #595) + +* Fix chunked requests losing state across keep-alive connections. + (Issue #599) + +* Fix hanging when chunked HEAD response has no body. (Issue #605) + + +1.10.3 (2015-04-21) +------------------- + +* Emit ``InsecurePlatformWarning`` when SSLContext object is missing. + (Issue #558) + +* Fix regression of duplicate header keys being discarded. + (Issue #563) + +* ``Response.stream()`` returns a generator for chunked responses. + (Issue #560) + +* Set upper-bound timeout when waiting for a socket in PyOpenSSL. + (Issue #585) + +* Work on platforms without `ssl` module for plain HTTP requests. + (Issue #587) + +* Stop relying on the stdlib's default cipher list. (Issue #588) + + +1.10.2 (2015-02-25) +------------------- + +* Fix file descriptor leakage on retries. (Issue #548) + +* Removed RC4 from default cipher list. (Issue #551) + +* Header performance improvements. (Issue #544) + +* Fix PoolManager not obeying redirect retry settings. (Issue #553) + + +1.10.1 (2015-02-10) +------------------- + +* Pools can be used as context managers. (Issue #545) + +* Don't re-use connections which experienced an SSLError. (Issue #529) + +* Don't fail when gzip decoding an empty stream. (Issue #535) + +* Add sha256 support for fingerprint verification. (Issue #540) + +* Fixed handling of header values containing commas. (Issue #533) + + +1.10 (2014-12-14) +----------------- + +* Disabled SSLv3. (Issue #473) + +* Add ``Url.url`` property to return the composed url string. (Issue #394) + +* Fixed PyOpenSSL + gevent ``WantWriteError``. (Issue #412) + +* ``MaxRetryError.reason`` will always be an exception, not string. + (Issue #481) + +* Fixed SSL-related timeouts not being detected as timeouts. (Issue #492) + +* Py3: Use ``ssl.create_default_context()`` when available. (Issue #473) + +* Emit ``InsecureRequestWarning`` for *every* insecure HTTPS request. + (Issue #496) + +* Emit ``SecurityWarning`` when certificate has no ``subjectAltName``. + (Issue #499) + +* Close and discard sockets which experienced SSL-related errors. + (Issue #501) + +* Handle ``body`` param in ``.request(...)``. (Issue #513) + +* Respect timeout with HTTPS proxy. (Issue #505) + +* PyOpenSSL: Handle ZeroReturnError exception. (Issue #520) + + +1.9.1 (2014-09-13) +------------------ + +* Apply socket arguments before binding. (Issue #427) + +* More careful checks if fp-like object is closed. (Issue #435) + +* Fixed packaging issues of some development-related files not + getting included. (Issue #440) + +* Allow performing *only* fingerprint verification. (Issue #444) + +* Emit ``SecurityWarning`` if system clock is waaay off. (Issue #445) + +* Fixed PyOpenSSL compatibility with PyPy. (Issue #450) + +* Fixed ``BrokenPipeError`` and ``ConnectionError`` handling in Py3. + (Issue #443) + + + +1.9 (2014-07-04) +---------------- + +* Shuffled around development-related files. If you're maintaining a distro + package of urllib3, you may need to tweak things. (Issue #415) + +* Unverified HTTPS requests will trigger a warning on the first request. See + our new `security documentation + `_ for details. + (Issue #426) + +* New retry logic and ``urllib3.util.retry.Retry`` configuration object. + (Issue #326) + +* All raised exceptions should now wrapped in a + ``urllib3.exceptions.HTTPException``-extending exception. (Issue #326) + +* All errors during a retry-enabled request should be wrapped in + ``urllib3.exceptions.MaxRetryError``, including timeout-related exceptions + which were previously exempt. Underlying error is accessible from the + ``.reason`` property. (Issue #326) + +* ``urllib3.exceptions.ConnectionError`` renamed to + ``urllib3.exceptions.ProtocolError``. (Issue #326) + +* Errors during response read (such as IncompleteRead) are now wrapped in + ``urllib3.exceptions.ProtocolError``. (Issue #418) + +* Requesting an empty host will raise ``urllib3.exceptions.LocationValueError``. + (Issue #417) + +* Catch read timeouts over SSL connections as + ``urllib3.exceptions.ReadTimeoutError``. (Issue #419) + +* Apply socket arguments before connecting. (Issue #427) + + +1.8.3 (2014-06-23) +------------------ + +* Fix TLS verification when using a proxy in Python 3.4.1. (Issue #385) + +* Add ``disable_cache`` option to ``urllib3.util.make_headers``. (Issue #393) + +* Wrap ``socket.timeout`` exception with + ``urllib3.exceptions.ReadTimeoutError``. (Issue #399) + +* Fixed proxy-related bug where connections were being reused incorrectly. + (Issues #366, #369) + +* Added ``socket_options`` keyword parameter which allows to define + ``setsockopt`` configuration of new sockets. (Issue #397) + +* Removed ``HTTPConnection.tcp_nodelay`` in favor of + ``HTTPConnection.default_socket_options``. (Issue #397) + +* Fixed ``TypeError`` bug in Python 2.6.4. (Issue #411) + + +1.8.2 (2014-04-17) +------------------ + +* Fix ``urllib3.util`` not being included in the package. + + +1.8.1 (2014-04-17) +------------------ + +* Fix AppEngine bug of HTTPS requests going out as HTTP. (Issue #356) + +* Don't install ``dummyserver`` into ``site-packages`` as it's only needed + for the test suite. (Issue #362) + +* Added support for specifying ``source_address``. (Issue #352) + + +1.8 (2014-03-04) +---------------- + +* Improved url parsing in ``urllib3.util.parse_url`` (properly parse '@' in + username, and blank ports like 'hostname:'). + +* New ``urllib3.connection`` module which contains all the HTTPConnection + objects. + +* Several ``urllib3.util.Timeout``-related fixes. Also changed constructor + signature to a more sensible order. [Backwards incompatible] + (Issues #252, #262, #263) + +* Use ``backports.ssl_match_hostname`` if it's installed. (Issue #274) + +* Added ``.tell()`` method to ``urllib3.response.HTTPResponse`` which + returns the number of bytes read so far. (Issue #277) + +* Support for platforms without threading. (Issue #289) + +* Expand default-port comparison in ``HTTPConnectionPool.is_same_host`` + to allow a pool with no specified port to be considered equal to to an + HTTP/HTTPS url with port 80/443 explicitly provided. (Issue #305) + +* Improved default SSL/TLS settings to avoid vulnerabilities. + (Issue #309) + +* Fixed ``urllib3.poolmanager.ProxyManager`` not retrying on connect errors. + (Issue #310) + +* Disable Nagle's Algorithm on the socket for non-proxies. A subset of requests + will send the entire HTTP request ~200 milliseconds faster; however, some of + the resulting TCP packets will be smaller. (Issue #254) + +* Increased maximum number of SubjectAltNames in ``urllib3.contrib.pyopenssl`` + from the default 64 to 1024 in a single certificate. (Issue #318) + +* Headers are now passed and stored as a custom + ``urllib3.collections_.HTTPHeaderDict`` object rather than a plain ``dict``. + (Issue #329, #333) + +* Headers no longer lose their case on Python 3. (Issue #236) + +* ``urllib3.contrib.pyopenssl`` now uses the operating system's default CA + certificates on inject. (Issue #332) + +* Requests with ``retries=False`` will immediately raise any exceptions without + wrapping them in ``MaxRetryError``. (Issue #348) + +* Fixed open socket leak with SSL-related failures. (Issue #344, #348) + + +1.7.1 (2013-09-25) +------------------ + +* Added granular timeout support with new ``urllib3.util.Timeout`` class. + (Issue #231) + +* Fixed Python 3.4 support. (Issue #238) + + +1.7 (2013-08-14) +---------------- + +* More exceptions are now pickle-able, with tests. (Issue #174) + +* Fixed redirecting with relative URLs in Location header. (Issue #178) + +* Support for relative urls in ``Location: ...`` header. (Issue #179) + +* ``urllib3.response.HTTPResponse`` now inherits from ``io.IOBase`` for bonus + file-like functionality. (Issue #187) + +* Passing ``assert_hostname=False`` when creating a HTTPSConnectionPool will + skip hostname verification for SSL connections. (Issue #194) + +* New method ``urllib3.response.HTTPResponse.stream(...)`` which acts as a + generator wrapped around ``.read(...)``. (Issue #198) + +* IPv6 url parsing enforces brackets around the hostname. (Issue #199) + +* Fixed thread race condition in + ``urllib3.poolmanager.PoolManager.connection_from_host(...)`` (Issue #204) + +* ``ProxyManager`` requests now include non-default port in ``Host: ...`` + header. (Issue #217) + +* Added HTTPS proxy support in ``ProxyManager``. (Issue #170 #139) + +* New ``RequestField`` object can be passed to the ``fields=...`` param which + can specify headers. (Issue #220) + +* Raise ``urllib3.exceptions.ProxyError`` when connecting to proxy fails. + (Issue #221) + +* Use international headers when posting file names. (Issue #119) + +* Improved IPv6 support. (Issue #203) + + +1.6 (2013-04-25) +---------------- + +* Contrib: Optional SNI support for Py2 using PyOpenSSL. (Issue #156) + +* ``ProxyManager`` automatically adds ``Host: ...`` header if not given. + +* Improved SSL-related code. ``cert_req`` now optionally takes a string like + "REQUIRED" or "NONE". Same with ``ssl_version`` takes strings like "SSLv23" + The string values reflect the suffix of the respective constant variable. + (Issue #130) + +* Vendored ``socksipy`` now based on Anorov's fork which handles unexpectedly + closed proxy connections and larger read buffers. (Issue #135) + +* Ensure the connection is closed if no data is received, fixes connection leak + on some platforms. (Issue #133) + +* Added SNI support for SSL/TLS connections on Py32+. (Issue #89) + +* Tests fixed to be compatible with Py26 again. (Issue #125) + +* Added ability to choose SSL version by passing an ``ssl.PROTOCOL_*`` constant + to the ``ssl_version`` parameter of ``HTTPSConnectionPool``. (Issue #109) + +* Allow an explicit content type to be specified when encoding file fields. + (Issue #126) + +* Exceptions are now pickleable, with tests. (Issue #101) + +* Fixed default headers not getting passed in some cases. (Issue #99) + +* Treat "content-encoding" header value as case-insensitive, per RFC 2616 + Section 3.5. (Issue #110) + +* "Connection Refused" SocketErrors will get retried rather than raised. + (Issue #92) + +* Updated vendored ``six``, no longer overrides the global ``six`` module + namespace. (Issue #113) + +* ``urllib3.exceptions.MaxRetryError`` contains a ``reason`` property holding + the exception that prompted the final retry. If ``reason is None`` then it + was due to a redirect. (Issue #92, #114) + +* Fixed ``PoolManager.urlopen()`` from not redirecting more than once. + (Issue #149) + +* Don't assume ``Content-Type: text/plain`` for multi-part encoding parameters + that are not files. (Issue #111) + +* Pass `strict` param down to ``httplib.HTTPConnection``. (Issue #122) + +* Added mechanism to verify SSL certificates by fingerprint (md5, sha1) or + against an arbitrary hostname (when connecting by IP or for misconfigured + servers). (Issue #140) + +* Streaming decompression support. (Issue #159) + + +1.5 (2012-08-02) +---------------- + +* Added ``urllib3.add_stderr_logger()`` for quickly enabling STDERR debug + logging in urllib3. + +* Native full URL parsing (including auth, path, query, fragment) available in + ``urllib3.util.parse_url(url)``. + +* Built-in redirect will switch method to 'GET' if status code is 303. + (Issue #11) + +* ``urllib3.PoolManager`` strips the scheme and host before sending the request + uri. (Issue #8) + +* New ``urllib3.exceptions.DecodeError`` exception for when automatic decoding, + based on the Content-Type header, fails. + +* Fixed bug with pool depletion and leaking connections (Issue #76). Added + explicit connection closing on pool eviction. Added + ``urllib3.PoolManager.clear()``. + +* 99% -> 100% unit test coverage. + + +1.4 (2012-06-16) +---------------- + +* Minor AppEngine-related fixes. + +* Switched from ``mimetools.choose_boundary`` to ``uuid.uuid4()``. + +* Improved url parsing. (Issue #73) + +* IPv6 url support. (Issue #72) + + +1.3 (2012-03-25) +---------------- + +* Removed pre-1.0 deprecated API. + +* Refactored helpers into a ``urllib3.util`` submodule. + +* Fixed multipart encoding to support list-of-tuples for keys with multiple + values. (Issue #48) + +* Fixed multiple Set-Cookie headers in response not getting merged properly in + Python 3. (Issue #53) + +* AppEngine support with Py27. (Issue #61) + +* Minor ``encode_multipart_formdata`` fixes related to Python 3 strings vs + bytes. + + +1.2.2 (2012-02-06) +------------------ + +* Fixed packaging bug of not shipping ``test-requirements.txt``. (Issue #47) + + +1.2.1 (2012-02-05) +------------------ + +* Fixed another bug related to when ``ssl`` module is not available. (Issue #41) + +* Location parsing errors now raise ``urllib3.exceptions.LocationParseError`` + which inherits from ``ValueError``. + + +1.2 (2012-01-29) +---------------- + +* Added Python 3 support (tested on 3.2.2) + +* Dropped Python 2.5 support (tested on 2.6.7, 2.7.2) + +* Use ``select.poll`` instead of ``select.select`` for platforms that support + it. + +* Use ``Queue.LifoQueue`` instead of ``Queue.Queue`` for more aggressive + connection reusing. Configurable by overriding ``ConnectionPool.QueueCls``. + +* Fixed ``ImportError`` during install when ``ssl`` module is not available. + (Issue #41) + +* Fixed ``PoolManager`` redirects between schemes (such as HTTP -> HTTPS) not + completing properly. (Issue #28, uncovered by Issue #10 in v1.1) + +* Ported ``dummyserver`` to use ``tornado`` instead of ``webob`` + + ``eventlet``. Removed extraneous unsupported dummyserver testing backends. + Added socket-level tests. + +* More tests. Achievement Unlocked: 99% Coverage. + + +1.1 (2012-01-07) +---------------- + +* Refactored ``dummyserver`` to its own root namespace module (used for + testing). + +* Added hostname verification for ``VerifiedHTTPSConnection`` by vendoring in + Py32's ``ssl_match_hostname``. (Issue #25) + +* Fixed cross-host HTTP redirects when using ``PoolManager``. (Issue #10) + +* Fixed ``decode_content`` being ignored when set through ``urlopen``. (Issue + #27) + +* Fixed timeout-related bugs. (Issues #17, #23) + + +1.0.2 (2011-11-04) +------------------ + +* Fixed typo in ``VerifiedHTTPSConnection`` which would only present as a bug if + you're using the object manually. (Thanks pyos) + +* Made RecentlyUsedContainer (and consequently PoolManager) more thread-safe by + wrapping the access log in a mutex. (Thanks @christer) + +* Made RecentlyUsedContainer more dict-like (corrected ``__delitem__`` and + ``__getitem__`` behaviour), with tests. Shouldn't affect core urllib3 code. + + +1.0.1 (2011-10-10) +------------------ + +* Fixed a bug where the same connection would get returned into the pool twice, + causing extraneous "HttpConnectionPool is full" log warnings. + + +1.0 (2011-10-08) +---------------- + +* Added ``PoolManager`` with LRU expiration of connections (tested and + documented). +* Added ``ProxyManager`` (needs tests, docs, and confirmation that it works + with HTTPS proxies). +* Added optional partial-read support for responses when + ``preload_content=False``. You can now make requests and just read the headers + without loading the content. +* Made response decoding optional (default on, same as before). +* Added optional explicit boundary string for ``encode_multipart_formdata``. +* Convenience request methods are now inherited from ``RequestMethods``. Old + helpers like ``get_url`` and ``post_url`` should be abandoned in favour of + the new ``request(method, url, ...)``. +* Refactored code to be even more decoupled, reusable, and extendable. +* License header added to ``.py`` files. +* Embiggened the documentation: Lots of Sphinx-friendly docstrings in the code + and docs in ``docs/`` and on https://urllib3.readthedocs.io/. +* Embettered all the things! +* Started writing this file. + + +0.4.1 (2011-07-17) +------------------ + +* Minor bug fixes, code cleanup. + + +0.4 (2011-03-01) +---------------- + +* Better unicode support. +* Added ``VerifiedHTTPSConnection``. +* Added ``NTLMConnectionPool`` in contrib. +* Minor improvements. + + +0.3.1 (2010-07-13) +------------------ + +* Added ``assert_host_name`` optional parameter. Now compatible with proxies. + + +0.3 (2009-12-10) +---------------- + +* Added HTTPS support. +* Minor bug fixes. +* Refactored, broken backwards compatibility with 0.2. +* API to be treated as stable from this version forward. + + +0.2 (2008-11-17) +---------------- + +* Added unit tests. +* Bug fixes. + + +0.1 (2008-11-16) +---------------- + +* First release. diff --git a/_vendor/urllib3-1.26.12.dist-info/RECORD b/_vendor/urllib3-1.26.12.dist-info/RECORD new file mode 100644 index 0000000..4894a4f --- /dev/null +++ b/_vendor/urllib3-1.26.12.dist-info/RECORD @@ -0,0 +1,82 @@ +urllib3-1.26.12.dist-info/INSTALLER,sha256=zuuue4knoyJ-UwPPXg8fezS7VCrXJQrAP7zeNuwvFQg,4 +urllib3-1.26.12.dist-info/LICENSE.txt,sha256=w3vxhuJ8-dvpYZ5V7f486nswCRzrPaY8fay-Dm13kHs,1115 +urllib3-1.26.12.dist-info/METADATA,sha256=z8RtNpb9x1iDCVZ86eU_xDg9pmSf4QXBddRTVPUh4bM,47076 +urllib3-1.26.12.dist-info/RECORD,, +urllib3-1.26.12.dist-info/WHEEL,sha256=z9j0xAa_JmUKMpmz72K0ZGALSM_n-wQVmGbleXx2VHg,110 +urllib3-1.26.12.dist-info/top_level.txt,sha256=EMiXL2sKrTcmrMxIHTqdc3ET54pQI2Y072LexFEemvo,8 +urllib3/__init__.py,sha256=iXLcYiJySn0GNbWOOZDDApgBL1JgP44EZ8i1760S8Mc,3333 +urllib3/__pycache__/__init__.cpython-310.pyc,, +urllib3/__pycache__/_collections.cpython-310.pyc,, +urllib3/__pycache__/_version.cpython-310.pyc,, +urllib3/__pycache__/connection.cpython-310.pyc,, +urllib3/__pycache__/connectionpool.cpython-310.pyc,, +urllib3/__pycache__/exceptions.cpython-310.pyc,, +urllib3/__pycache__/fields.cpython-310.pyc,, +urllib3/__pycache__/filepost.cpython-310.pyc,, +urllib3/__pycache__/poolmanager.cpython-310.pyc,, +urllib3/__pycache__/request.cpython-310.pyc,, +urllib3/__pycache__/response.cpython-310.pyc,, +urllib3/_collections.py,sha256=Rp1mVyBgc_UlAcp6M3at1skJBXR5J43NawRTvW2g_XY,10811 +urllib3/_version.py,sha256=GhuGBUT_MtRxHEHDb-LYs5yLPeYWlCwFBPjGZmVJbVg,64 +urllib3/connection.py,sha256=8976wL6sGeVMW0JnXvx5mD00yXu87uQjxtB9_VL8dx8,20070 +urllib3/connectionpool.py,sha256=vEzk1iJEw1qR2vHBo7m3Y98iDfna6rKkUz3AyK5lJKQ,39093 +urllib3/contrib/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 +urllib3/contrib/__pycache__/__init__.cpython-310.pyc,, +urllib3/contrib/__pycache__/_appengine_environ.cpython-310.pyc,, +urllib3/contrib/__pycache__/appengine.cpython-310.pyc,, +urllib3/contrib/__pycache__/ntlmpool.cpython-310.pyc,, +urllib3/contrib/__pycache__/pyopenssl.cpython-310.pyc,, +urllib3/contrib/__pycache__/securetransport.cpython-310.pyc,, +urllib3/contrib/__pycache__/socks.cpython-310.pyc,, +urllib3/contrib/_appengine_environ.py,sha256=bDbyOEhW2CKLJcQqAKAyrEHN-aklsyHFKq6vF8ZFsmk,957 +urllib3/contrib/_securetransport/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 +urllib3/contrib/_securetransport/__pycache__/__init__.cpython-310.pyc,, +urllib3/contrib/_securetransport/__pycache__/bindings.cpython-310.pyc,, +urllib3/contrib/_securetransport/__pycache__/low_level.cpython-310.pyc,, +urllib3/contrib/_securetransport/bindings.py,sha256=4Xk64qIkPBt09A5q-RIFUuDhNc9mXilVapm7WnYnzRw,17632 +urllib3/contrib/_securetransport/low_level.py,sha256=B2JBB2_NRP02xK6DCa1Pa9IuxrPwxzDzZbixQkb7U9M,13922 +urllib3/contrib/appengine.py,sha256=jz515jZYBDFTnhR4zqfeaCo6JdDgAQqYbqzHK9sDkfw,11010 +urllib3/contrib/ntlmpool.py,sha256=ej9gGvfAb2Gt00lafFp45SIoRz-QwrQ4WChm6gQmAlM,4538 +urllib3/contrib/pyopenssl.py,sha256=YeK9CA7D4MfdaqorAWZ8oGHfKnhHzASSUXa2GIftxsI,17156 +urllib3/contrib/securetransport.py,sha256=QOhVbWrFQTKbmV-vtyG69amekkKVxXkdjk9oymaO0Ag,34416 +urllib3/contrib/socks.py,sha256=aRi9eWXo9ZEb95XUxef4Z21CFlnnjbEiAo9HOseoMt4,7097 +urllib3/exceptions.py,sha256=0Mnno3KHTNfXRfY7638NufOPkUb6mXOm-Lqj-4x2w8A,8217 +urllib3/fields.py,sha256=kvLDCg_JmH1lLjUUEY_FLS8UhY7hBvDPuVETbY8mdrM,8579 +urllib3/filepost.py,sha256=5b_qqgRHVlL7uLtdAYBzBh-GHmU5AfJVt_2N0XS3PeY,2440 +urllib3/packages/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 +urllib3/packages/__pycache__/__init__.cpython-310.pyc,, +urllib3/packages/__pycache__/six.cpython-310.pyc,, +urllib3/packages/backports/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0 +urllib3/packages/backports/__pycache__/__init__.cpython-310.pyc,, +urllib3/packages/backports/__pycache__/makefile.cpython-310.pyc,, +urllib3/packages/backports/makefile.py,sha256=nbzt3i0agPVP07jqqgjhaYjMmuAi_W5E0EywZivVO8E,1417 +urllib3/packages/six.py,sha256=b9LM0wBXv7E7SrbCjAm4wwN-hrH-iNxv18LgWNMMKPo,34665 +urllib3/poolmanager.py,sha256=0KOOJECoeLYVjUHvv-0h4Oq3FFQQ2yb-Fnjkbj8gJO0,19786 +urllib3/request.py,sha256=ZFSIqX0C6WizixecChZ3_okyu7BEv0lZu1VT0s6h4SM,5985 +urllib3/response.py,sha256=B0MM0o8p1i8IQ7QShnRZJzU-8mHCn2Aw3mEhCoE3994,30229 +urllib3/util/__init__.py,sha256=JEmSmmqqLyaw8P51gUImZh8Gwg9i1zSe-DoqAitn2nc,1155 +urllib3/util/__pycache__/__init__.cpython-310.pyc,, +urllib3/util/__pycache__/connection.cpython-310.pyc,, +urllib3/util/__pycache__/proxy.cpython-310.pyc,, +urllib3/util/__pycache__/queue.cpython-310.pyc,, +urllib3/util/__pycache__/request.cpython-310.pyc,, +urllib3/util/__pycache__/response.cpython-310.pyc,, +urllib3/util/__pycache__/retry.cpython-310.pyc,, +urllib3/util/__pycache__/ssl_.cpython-310.pyc,, +urllib3/util/__pycache__/ssl_match_hostname.cpython-310.pyc,, +urllib3/util/__pycache__/ssltransport.cpython-310.pyc,, +urllib3/util/__pycache__/timeout.cpython-310.pyc,, +urllib3/util/__pycache__/url.cpython-310.pyc,, +urllib3/util/__pycache__/wait.cpython-310.pyc,, +urllib3/util/connection.py,sha256=5Lx2B1PW29KxBn2T0xkN1CBgRBa3gGVJBKoQoRogEVk,4901 +urllib3/util/proxy.py,sha256=zUvPPCJrp6dOF0N4GAVbOcl6o-4uXKSrGiTkkr5vUS4,1605 +urllib3/util/queue.py,sha256=nRgX8_eX-_VkvxoX096QWoz8Ps0QHUAExILCY_7PncM,498 +urllib3/util/request.py,sha256=fWiAaa8pwdLLIqoTLBxCC2e4ed80muzKU3e3HWWTzFQ,4225 +urllib3/util/response.py,sha256=GJpg3Egi9qaJXRwBh5wv-MNuRWan5BIu40oReoxWP28,3510 +urllib3/util/retry.py,sha256=iESg2PvViNdXBRY4MpL4h0kqwOOkHkxmLn1kkhFHPU8,22001 +urllib3/util/ssl_.py,sha256=c0sYiSC6272r6uPkxQpo5rYPP9QC1eR6oI7004gYqZo,17165 +urllib3/util/ssl_match_hostname.py,sha256=Ir4cZVEjmAk8gUAIHWSi7wtOO83UCYABY2xFD1Ql_WA,5758 +urllib3/util/ssltransport.py,sha256=NA-u5rMTrDFDFC8QzRKUEKMG0561hOD4qBTr3Z4pv6E,6895 +urllib3/util/timeout.py,sha256=QSbBUNOB9yh6AnDn61SrLQ0hg5oz0I9-uXEG91AJuIg,10003 +urllib3/util/url.py,sha256=m8crWKyNGjnxmqw0FZ4CpzHVIjv8DornwW22IJIOq-g,14270 +urllib3/util/wait.py,sha256=fOX0_faozG2P7iVojQoE1mbydweNyTcm-hXEfFrTtLI,5403 diff --git a/_vendor/urllib3-1.26.12.dist-info/WHEEL b/_vendor/urllib3-1.26.12.dist-info/WHEEL new file mode 100644 index 0000000..0b18a28 --- /dev/null +++ b/_vendor/urllib3-1.26.12.dist-info/WHEEL @@ -0,0 +1,6 @@ +Wheel-Version: 1.0 +Generator: bdist_wheel (0.37.1) +Root-Is-Purelib: true +Tag: py2-none-any +Tag: py3-none-any + diff --git a/_vendor/urllib3-1.26.12.dist-info/top_level.txt b/_vendor/urllib3-1.26.12.dist-info/top_level.txt new file mode 100644 index 0000000..a42590b --- /dev/null +++ b/_vendor/urllib3-1.26.12.dist-info/top_level.txt @@ -0,0 +1 @@ +urllib3 diff --git a/_vendor/urllib3/__init__.py b/_vendor/urllib3/__init__.py new file mode 100644 index 0000000..c6fa382 --- /dev/null +++ b/_vendor/urllib3/__init__.py @@ -0,0 +1,102 @@ +""" +Python HTTP library with thread-safe connection pooling, file post support, user friendly, and more +""" +from __future__ import absolute_import + +# Set default logging handler to avoid "No handler found" warnings. +import logging +import warnings +from logging import NullHandler + +from . import exceptions +from ._version import __version__ +from .connectionpool import HTTPConnectionPool, HTTPSConnectionPool, connection_from_url +from .filepost import encode_multipart_formdata +from .poolmanager import PoolManager, ProxyManager, proxy_from_url +from .response import HTTPResponse +from .util.request import make_headers +from .util.retry import Retry +from .util.timeout import Timeout +from .util.url import get_host + +# === NOTE TO REPACKAGERS AND VENDORS === +# Please delete this block, this logic is only +# for urllib3 being distributed via PyPI. +# See: https://github.com/urllib3/urllib3/issues/2680 +try: + import urllib3_secure_extra # type: ignore # noqa: F401 +except ImportError: + pass +else: + warnings.warn( + "'urllib3[secure]' extra is deprecated and will be removed " + "in a future release of urllib3 2.x. Read more in this issue: " + "https://github.com/urllib3/urllib3/issues/2680", + category=DeprecationWarning, + stacklevel=2, + ) + +__author__ = "Andrey Petrov (andrey.petrov@shazow.net)" +__license__ = "MIT" +__version__ = __version__ + +__all__ = ( + "HTTPConnectionPool", + "HTTPSConnectionPool", + "PoolManager", + "ProxyManager", + "HTTPResponse", + "Retry", + "Timeout", + "add_stderr_logger", + "connection_from_url", + "disable_warnings", + "encode_multipart_formdata", + "get_host", + "make_headers", + "proxy_from_url", +) + +logging.getLogger(__name__).addHandler(NullHandler()) + + +def add_stderr_logger(level=logging.DEBUG): + """ + Helper for quickly adding a StreamHandler to the logger. Useful for + debugging. + + Returns the handler after adding it. + """ + # This method needs to be in this __init__.py to get the __name__ correct + # even if urllib3 is vendored within another package. + logger = logging.getLogger(__name__) + handler = logging.StreamHandler() + handler.setFormatter(logging.Formatter("%(asctime)s %(levelname)s %(message)s")) + logger.addHandler(handler) + logger.setLevel(level) + logger.debug("Added a stderr logging handler to logger: %s", __name__) + return handler + + +# ... Clean up. +del NullHandler + + +# All warning filters *must* be appended unless you're really certain that they +# shouldn't be: otherwise, it's very hard for users to use most Python +# mechanisms to silence them. +# SecurityWarning's always go off by default. +warnings.simplefilter("always", exceptions.SecurityWarning, append=True) +# SubjectAltNameWarning's should go off once per host +warnings.simplefilter("default", exceptions.SubjectAltNameWarning, append=True) +# InsecurePlatformWarning's don't vary between requests, so we keep it default. +warnings.simplefilter("default", exceptions.InsecurePlatformWarning, append=True) +# SNIMissingWarnings should go off only once. +warnings.simplefilter("default", exceptions.SNIMissingWarning, append=True) + + +def disable_warnings(category=exceptions.HTTPWarning): + """ + Helper for quickly disabling all urllib3 warnings. + """ + warnings.simplefilter("ignore", category) diff --git a/_vendor/urllib3/__pycache__/__init__.cpython-310.pyc b/_vendor/urllib3/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..3de9ed24c80968ac7ed3c3c80549266e2349486d GIT binary patch literal 2466 zcmZ`)S#R4$5auO`x_roX9Ov8~POQe3(xexHplzC?agi8C>@+BYf}pi4iO%xK?$Wjd z=cz^C`XB6vKJ*_IeC<>ILi^CptR%;2P!clFj8`XAqS3U$Ny6NS^4 z3&Pj1WNI1)H9Uiw)Z%7jd6tR1&27)tPselM>2NzLcm;S@phaGcN?u9xCGJLLudI2O zSE8y{jcQ&ks(W>LQ(W1Ag`8q!v zEqP0tpW^4D^WJ&QPxA}WMem|%42wFtOWvhtMqG9bc6kt*2Hrn_yl*gPm(UsZ9-XC) zUv1bs=eKD<~(Rt-_fkSqiLOJO1o|Fdx2gAzt^d~Wi&4hS!Hve`bkV4Zf|cA9`1-h z49I?{`b6~w3+S2*x{P#^IA$Fcf?=8@JdAs*q#JSul2k-yX_^SNN;1g=>57oWln+)( z5K|H*f>mB)$(v?A9qh=2XNvh@ggZ7sSKY`se+Z_WiPz8sXjfqe9hTzfBwG0X9upEI z-*4J^14F%g63`~Zlh2`U>%Yo3QTttyM1CeXxLaazC!x%bGOofj5X$c+BBFr`z5+(2^aOg!9Ne#&qk{KkkK=RpuQeP^_q40UqgF=Wh>St&ugB{NN z{XoRffl?r}hz62rB!DkQ2RmqT*}xQF-GwC|08z$~sjOr3l?j}EY`n4#ts@8c0yU4} zHjP8`sCWn#nkyaZfdrjPE!YQ;bZEiY*u!5c1g?jSr`Yg`ATP5Jaxx$gJA?++*-|h) z(YUXPN}vRcjDDv@o=VouIBwK_DBH<;J=oW(Xc^ij6S34=`lHDpL07@2#_mJa(uTw3 z<&{9fTt=)Z$?}RWN*s)(h)D^3+?2!BJCtH8kx^Q892n-rIfOR~?G{;<&2nBs2@LWw zbn7EsgWUCf^z8e2{jGn?Ym%u4FhPNW2=nqAwgSVb4#Xnt z{t7FOeN`#D=8Rc^yJkA3ewP;mz8?(aHcVqNNK*i-yhK?y06ciBeXx}rSh{_%Ke2tN z2~B}#)2I<{|6e1FnpO7#%!akp5Q)eg%wpcSH-=9*GMv>@War5Flp(=a8p!5SBQP*pc!(AdXS9UE77Gu30s69-g=+w^c;WF|B_b+cGU!#lIcb0gYodW~Xdxu2E`O H`nLZCHG9T9 literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/__pycache__/_collections.cpython-310.pyc b/_vendor/urllib3/__pycache__/_collections.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..f17316e63cd1bf1451a4cbd1ee6c340c0558277f GIT binary patch literal 10820 zcmaJ{TW=gkcJA9;I2>L?Q5RCO+>#}eKUshu)!{$^|9CBuQ zRNW(rlTqN94mK|fBX4=g1Bn0$j6CEuKwkDQuGsT(OY;hLXlOq4n zDjxIa4vgY)j5;MIG3uo69N5KqTu+NUuJh{pgqXQ!6lT8zhepASXS~fYs5T?NRH-!r z85OKJ^P$&hRO%1o=?|Ncw^{X*YqUpm-!hR%=m4skM#3z=a-f(nkLHpN;0Nx2m5H~e^lwZ~qyiE1Rh zvcKt-cYDOkN!1)LdQyo>r5O%1g`zdxr9eGcFQnpZsZ{rBeyJ4aN~KyLnpM{GrP8CO zSJh7>nUKd=bmgOKe2GwYV_#-_6#~#rW z8}GV_Bm5LaPfv=r?-WyFUabbRm=ZBG zu9Uak8h9Z;q1$Y@QJ@Cd*r<6=!b;2E*l;NfHm&*`FxbONalJinA6LFx^}R4!m5Fp# zn-Gugu<7pybum2HT29@$+VG@T!<*GRuBv;a{X_3brPi#u^=56;mu|4->XBW)>enFu z5cJ^|sT~|iRKi9O`lYRAz1$n_oyWcenU$LFdUY4mS#v9)>pzAlK<1VVYKn)hKvueh zY;5$8xU96G09l}W*~1zWYp#0>6)Jop#=T0l>SBc^4b)KIalx#YsRo@N>s*MpaD*37 zw9U3rGTIhO)DEp912sEx4tP${HmD_7NMns80*mwg)W!L(Lf)!EZD9ox{Z#rNJ5`vl zf~^;CCK*D$h*$Tmqs~&T)VWkIlQ=H2w3#+@R^Du#8@m8tM0AHTS?c`AB0DPpIT&i$84L|!1`y9h%g-d4{Q?*zh;DI_Dt(v*d;Jcqm{Y}iEM((UX}wvk_Dc)=#CFxM z%X6SQ&OmrdT-1X?N-2kYnNL#Mpid>sB(d*K2@)P7+pr_s>*yPvMB$iObK1(8v(B7p zeR=kOr*qS0_Sy60+#TWhI`l^v7BVotnI6=k5vk1&NzJCLF(X#LwDfXvda{w1Fuqz4 zi8?7k$Ti;OTE;faOlhTibg{EQ6DzLN4$HI>Msg9a)wV2Eh9i~z zIvA%l^cbgx@(MbBfg_wl!R3}W&;F230rQy7kB-?oGk!MJO9rGsFw|AQpWs4CVP;SY zV^r`&Kkq#iOcoXGtXyF6Ts?G%Dz?xhQNlcxaB)1@Y+A773uwJwn3m*O9%nI+B8Enb zpj;}+6TIcJxX5Ce#cM2HXYmG$w^&ek@~13%YeUr(j3k(%O;oll3v1>~<*aN5{}~)k zHkHqn@p$0Z0np+9;C4UE6RW>6woDZeOfVo2X~4D=!yKH`VnXC_&M=(8Ig2o68s`Zy zBW7{V`I9?&x#mypOc$q7BK+}Z5%3%n$HW|-0|bhBoR9m*@QxGW(h zm_>ZIRq?B0RjIn$@G3G~b3bf`ky{S{q%@9kYt3p@fnCszT}A_87pd)S`*pOe0Z{_e zmA%kk1(fycVI`_OhN&6EiMxA@V!3rL&c|vS#sIfqV z=T?KDk#PI|){yQc9C5xBH)HfoO(xX_lL=lR`-DsoCYxm_1Q_LOJBqZTVvtRL+k0HW z6Xhj^zlHcxYeN_yd{M#0rXH#qgi%7^jT<-IWQDocm6r8_(dB}AabFX1y1aA`NrYQL zuv_t$R@|knAh^Ei$))Es#w@RvyNx%!*7ZltCr?IOf4;=UiU@5Lc;R8Rz4QR|EL~X| zCgJm?d+&VQ8S#O7+96@Z?G8WMixCb-{~#G%_e{oLA3=_E?kX4XF)ES5QU?}8D>yb= z1y)WQIUAtq7o!yLx_My9ML6v=V-wS;r%=!6dfSrA>S_#z1k4Vb4PPqLr@fAHLMlAT zRj^jVi0f3vWR3k2BhEPOKLIPE6S-uP`HR!qHhpU{ZKDtqd|J;h(Wm_yhjRHq)cEJ% z?sJv{^a<>9YEZ>{kr`#t`LRxCbqh!6qCoIzJtW*g?a(|j5RG-~3!TvOTPp!6)nLz; z-|9$G2MabVcb^+o9+W=!ulWMLX%5u27Ds67T91*bV}R8ouaB6gNU$Mzw1g#$zpxgJ zBNJZ7UjN=&aV6sp(52AEZPa6DC#clrJE#s*M_BMTI23i$=G-{ydZAx`Sj##EsHmGo zr6;QEDh$)9GCqdH7-s4?qK7h+c!)+0afBRicHHZGk;3rnd97YQjS6PWV6tGxeB7BS zpd_-d1;MCkh&GB9>-mLCeM3vOdLne*|^uWDiUwoq`=(Yp=%UZfrgtme0hshko6E(vUa)fkQhe ztS`?Qt>qE%_>W4ZwQESNc-8R6TDKb#zSq!6lDasv?S)b286bC&rRAGFK$z7KdP@3W;O3j?8?YNIu1V zNjo{_{dFW^{}GRV%UMSjX!MIle^zcWHrK>eT4Pibb( zY@Hn8b2KF73(07i{ah5(haH0!4FOpOVH^~5!BF~;ramB4m8294Mi~u;KB$x4*nv$8 zhlHUbhkwRXl@+tTWW+Vz=;}z5#B_dCBH92o3s+HTrQ4W=1tgC2rb=Y&pVG-LofK;# zy!i@gv9xg?r0#*0wt3xXGudml{{HqFQa8)HpRb4q1$Xs^`xy4muOZlW!-ik303WFg ztU@?Ql{O{ND*#{_!L*MgXiUYSly$EH@bq(kUq$Jvp@%!7HzZT(o#*kX(%>W_#qS}>E|V<1InJ17kcBOKQv3_)qUup$KWf+_!HMn@}pehUh@VaXf_xHH74?b!f|Nh)aW!93VuZFmW3DcZ5{wKCgQRE#nDjbxEO?IEz4lxy(@B z=NN-dIko|f{}uOjK5v346=wCY#D^6N4F~KUx5qekG>(KM(2$bvJwSbs~k%%J71 zwhiN!qnfA|P!pgcwz^Wk5M|pow^`*cG2VnSgX3C$P@mGHsCU6GsgcrZlw#XD%;}zE zo>oK}ikE5q=3O{USt+}EJJsb5j7tA8ru6Da^TnBLfc~x6Bw88>6B*{qNNwx%r2`NVBc`oxQSG|XAYQNT^@XinU02|-^;3?Q-)ha%+gQ+}B*}D|J!?$Q?BGHq`Q;zWP+#!-Dc7TA!FyS}#m02NzF#491mt zjMI=s&5JZLV45VJU;-0IEtH$MR&YUn#2UwlQ|eJ6lQ<;iEaXi-{e;EKEU4dOE#(b7 z_%9qG^Vj(lQ=>U#1y4IUYZfYPJwrMRu$Sk&I_HtNp0$*+5Bqm5lmVkP;LYB{D_RqD zwK{xAeA+zBskQ$?pHH*l(-t0Lq0poCc{ZDyAVl-fCA(F-tNa!181tjl8tk$4tQGPK zP%3&eS~=|CF^96|c6-&klj_$R(Y_u87LGmW-#Ug+nYT4H@iZ#kutA&p&%so`W0GIs z##pP7L7+fFZ9s{T5rJjTDaXX<%=#gp8gTFNFnA_{XGcj>TOT_gIX}`6FL0{RZ;oKp7fVEt+HEMcrn=YjU!?q*1X{ zf_qV8Y$mv2xJ(!>3x;M6@E=KY?t4ANy;DSBs55zfZ2*O*jPN5LBe8(ue(6X=nzO3fXVS8n%HK58p@bQ8AnJN6T8B&FR0Cj-oj$& zn=BT!$pG2XeYEW)&Y62;Gwdojt)ILP%p!BK8gS)D<)rH__N^<@^OWEOwxne$`o^bq%5vo|0D8y)FK zl?aHC6A_#mCxQihn56Om_{>J<0TKb=8tkW9SD(W^IA_>J_&dlq@^o02h``n~>+gaB zZ5-r#tiHoyh-ogiH8QPmpJMtPtn7#il3^X}4RDN}y<7tIm@3F{r9Vzmi-Xb~x2ok9 z9=wThwDAv-kfM%eot*JAh4-N zm3mX}IWi%R7{+Z#Y+nb>Fd6--dnx?x8Gf<~#=keOs_6w@`~zIZIb`W%6tb^8#TzN4 zYAX$#KtLo*xK+r+b{QX6WD;uP#b7fmZ3R`K@+o+~FR-zy_B!;S*x`ePP%DRycu0TZ zJad7igvTpXB;o=m?I5E^yJ0zLpwGN>8t!}6numoONzwF=phN4IhxW!K*OI)*f=M~O zCH6XNKWCvL|Ib*X5sdAR?!PW+iS*VTJyD$2QkV3JeOqXkc=>>ZLNByh%BaUVwUCq; z;uEOD_yG8nx3TDwdB#^7xF6GXmheB`}AmkqJOeM+D zvR|!s5~ONvzRm6`!$wJRu<#}dZsARz&rV|N&dJ*NPo!;r)snWdR@Tm^vd6ON>}>w5 zGli`_)3JFso6V-M*_Wm}UoV{GCuv(vMAFE0NIH*rrvF1bZ?mlN8)X+yVhbCe6>8u& z+1C!A$f?hTT!wC-ga_@oH>9;!(x<~x^b_&lv|VzBE8>4Bbo zyi~rzf;*Qw6Wy~_sz#y2*=zc%x*Ie-A@wqESWv9IIS*590UH7hTGo>pqY^77CZP JXYKh9{vYQU+$8`2 literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/__pycache__/_version.cpython-310.pyc b/_vendor/urllib3/__pycache__/_version.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..2f3477c074bff0628ddedb22a5fed97e5b46937f GIT binary patch literal 171 zcmd1j<>g`k0^S>8$qqpJF^Gc<7=auIATH(r5-AK(3@MDk44O<;?1p+qW_pH3ewvK8 zxZ~r?Qj3Z+^Yh~4S27ea0ab#DU*`HHxdr+KnFYEfiACwDCAubsnWm{_#>x6QnMwKu ol_eSZdHSVAIY6GVKFkcgg34PQHo5sJr8%i~AnS`k268Y008m3H=l}o! literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/__pycache__/connection.cpython-310.pyc b/_vendor/urllib3/__pycache__/connection.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..0aacfe71a97b6b78b92dda6e8268fd6dc34b8dde GIT binary patch literal 13600 zcma)Dd2Afld7o={XAdq9QPg2s8rhPiwZxTt#kQ;{rYXu&EmMj}Tk$x~aJVx|E;+li zdNV7En`JJ#$RCN*3q^Va30b6vfYxYwp>5DMJ%9p5f%d-^0~7^XpsiCBXwe`+?ZoQu z`)2ka`MjqfQl#rL$C=6lA>;I4Yh=^*!buS!!pw#c^}o9begNPTZ6ldo{`3=kBj6>kG0(e~w~~ zzbH95C;z78@O zKWRQGORl>0l>4D=*?iiWaP~R-zoMAWxXRYE&H;=jwXK@x+|<@{&Oy{Tj~PDT9Kxs% zxg+j}H#Kt@B@a4>QF7QF#+)xWM;zl#$^3|O)OiT^=kfkw=NR4}Lw(hpa>svC4peu_ zyx?9iUvQK;sdW4u;*^pc4cm)>@3lhLs@0pm2xn22a)s~(GMTVecl}oQjvQB3gW4Sw z7cbAxU!V3H4Yv~3{02&fsAT3&#cd`9`zyk=(P&fnch;>S@T`j82;Dnjh58-*QPa=k z`tJe~S2ATs0%yt?qY@Qfumg8)?&=JUXZEfd>6X>7>#k)*Im@d1PRpZw!Ln|(Y%hLu zR}v#=iIaDqJrmZOXPULeH=KO(R_!VG_7jyeUTyJAb3I)48)sU=!_yOIFv4U; z<>tD`qmlhIE)9t;X)>4m(BTV`MGSekPnUSqg67p9Qk)y5vOP$SQf93C^rKsULHMg~ z<9e;>{;1Z+(deVS*6FFca+h7(amB@2CA=#~dCR)(iU7-KStTvnlMH`8UU=>#8k=?3 zc1+;Oh#hDwZfrsl; zFI=5TO6HckrR)eDu2RS=zQwzjrT)LxH)g{@?I+~etQfA&sI~fRg!5wmRC;O(f zDVs&NxH1fNnLIgpr+^wG&X7~YebgCtMsOc{%jZ}~A8LRI4nlBuqX$!1d2R>I?PFCq65 z@Eap}V^n<+PogCR`o3>6abv{qmd|QB=r$HK-3sx(k(ASji5#s4Nbape4vkn)%Epzd z(eOhf`NDNhQ^f`k)-W8mYPY;Frnl!q%Q!|=_;t`|CufwCnu+}N$78H5*DA|KLgT=2 zYJt7zVE{=Fv-Xnbo6$F4U$_q0)~8tZ<`SgQrg)STPEAYAIic*%8}#*|mP z?P8EbdgeN+LBkB{$JEG zP8qK!{g7bdcQRR}xocOgxogue&CH+fF5KKT>!q2Q>r+>+ygG9l^y!WeU%k=o_?qBZ z*X?y<%?1NuQZfA#rtYrp;yO=<*n(ub-XvMA1)*`$EiaW%W3^v@V_~6G=D~@RP#+?N z5qB14Ms8m^#pEL+DQfT6EcGjpGA)HHa&@gacWvK>Mq z95$dV3thuWG6y!f^wEp6Jz+D9D-C1GZMeerP8$Gt23hRH{6gye#tCYT6)iV5*jcw5 z=D*%ht1Zu4pClNFW}tT*zivZ9$#kD)s}U}@0@haRN&B}^)q%MuMbIQY2j$aKWrk5% zcEJo#6ia9a%xw=g*_|(sFxE041Jq+*Cy?mX-QM^BX$XE8BweII-8)daEMvm0xTH@= zf$W$k4X0~9odMci_Samr#gj35WL|?h-1$8SUxAXul6WM`7iZ@TMnf&KO3z_BJ1OY- z{%WfUrAO`DHab3GfL=-h5C#`f}yKhhP_T2d)Is3d z0_vZ74;V*6)hA`~diKak`lf8m^P1K|RExcrL~X5-mZnxg2$#hI)SFKqm_26@x`cCvl_0&? z>p5aWl&>>Y}w=j42=04TAD2t`W=bGAbvEOIE{Uozd3i9`Ph2gUD3w8y?0Th?Cm@9PlVXW1)NTYTmc{hhZFflsvP#fF$E_fV?mP*Sx zIj!VmMbYGLmeAIk4(?-$c3#XJ2o%DwjfT|(MxbO*6lg+?8z#_K{vu36?Q5Q)UHC2w@0~keIlPhbWVbCCb{Z(1)ww zHtxm}DrnZb=P-njlM8nZK>)14U!VqSurw&ED>+5`e*4hwi41do`ues!F%yCC08lw#h?V?wkVS@;a}q+pcT`>2JMMmLrE%CsMGF` z&?doW#>p3u2|+~ad?VFKiO~>f8N^L(soPRjfw;?`lS6GK)gh8AOKL|=FtA4IgqY%8 z*=SF_97DQ_-5@Z6enUn}eq%DE029y;yypr#&&P#vvdV@Ns@sER4UOZXgh0&!Yx>&k z{M41%InLaG*D-y0>V|b=1_+xid6avVbZ8tN^!o;$b(y?HrW0V=G zFbv{DR4GkS0l?rCM`CtSRJ?*Je~T+1O6N4KFG%+erP>E}QMTXT4n8G9>$qN|h8B>7 zBt6QT(76{u%1t@g8_Fxt$sKt~=_o|XFA?9S=A=;F(mL{1YFpZt!}M)gl*5dpI@%W8 zk1)5A4+~)$Ex>)L%JH($SD5W}baNk@5lb+xe+Ze+g3;b6Y{(F1IYbkF0e59pc@Npd>$UE?FARgy)WCRx-ksENUuB)*^AA3&}x!;4U7}VgA;A-#A)NiY-uP` z;WETapT$zdt;dd3&TRyU##k7Al!8@ug?JDH6LUx+Z3T!ZQtNh8yiU)luoikQ*b7~_ zPDxEzCvGoFv&9Z}Opp z16RTjhop9C7egeX`T^|lZtfKt^AwGl0;7w*vmRyQ^$1ESGLp^pXrBeMV|Be_nx)0F zj8b41EI5T2qfA#Jq=hGX{uLKHw7Lvsua3c} z9=cz{CVlK!S$3uIHLLk!us|KHsnV+UlmV~hCNwT!SL(L3kp{G)djs1$jq z7Ti@Q-;%`_LWG1vy(;gMHgaJWyp!8h#K$^nRo;M(N6Tk7@|}EO-7@huAL^S*Q0wHk za!vu3A|FB>b@HUp5E#z?ID*U@g>a}-*vf5#OE-o(2p2ys(Y=$8@5!^YRqPCrp}S>b zMA$uJqnC#w8)Zke!9gTTq)4+n<>aT7TfoyX^Q@qb zSfzxFNS~pi+<9^^DI9&_dw9bb=%Cbo{DbAfO2#}OAHC1p!!`$zC%f}ud(*%-s;~+S=-gIGz7uOLi7bbm? z=AppqEW39i)pHwBmfqSz*y|L;YB;6h50&F6ANOJ*Rv(Bp8p|C@mMHl!H9s783{Se- zH_tB0peHsJ8DK%`W%tSrCmh#Zlm9|%0Xc1YYK$)E(-ATo0R+<#LL+2YAbiem z361CE@wlAd7uELR|9jzqv}a2P#1IXiw22r-0_198BLMr8MY4$2BKAQMRI0mCp{oh0 zoQxSo9iu$9#co`izh)uM9OVZh+Jan&C=a}is1HZCqR}`cIZz}hG8pM`EGt}(y%@kS z3gE@ql+bhxPzg#7Z~$pf@df&PC{eBz*YmmxmL(&kDy(WrRTIDs9zjCeqWXamO;a^Z zSCrA5tc~SlJ*ywlHC@LwRLqU#SiM(JeaDYr*Ymi74w4Vr1anlJKu~e|KsB)uhD|UP zn_wz7!8Ee~pq2c&Ln}qfS9Lm#fUT?Hth)OTIxpkscsJreyJFjGG}$H_bI469M#Hqc zbJIQNwEeTJU|yy;XRBM%nxy+BT){;o6h@E1e^q6(B!5Ne zu)zJ;_#iDQPwO}l9 zCBH(+&ee`|s5b6snwFf5y$I|t&Fk1VWRbPxF;M($=*#loWOk_ za9!#xVnJfnv5ic(w3D&+qvSxahV&q(4M6=9y6F6C+#U za*9xd56Ad+<(T-R@EE;WIS!vG{}%OrY!mZsOm;FW`@=_8POPfp+u=!!v;bjKgKwio zi3O2z^44(#WAu)`^(Y;8*j9pn;vR>$Mmli2!&B5xc$!q)N~!s89gW&fTAo~0n%|-R zXe}_OGON9j*-P^rf@12!-QJ z7??J-VsninC3Fe^X4n@2fFCPHyrMHVf*3yxrUdN>l(uyBhqNiP=&3br%zSLbd&R(>o>ai;x^S$D|~v1LObn~TmQHON9G z5QXOMxQLL^!5D0Y0gLl|p?;FRVFz0%MmLy$`|wS)(% zIP6A8N_hvEThg{`(hxrZtFHA>jvu+sl3J+jj8aWmovcECaEyY%uH zC4E!DR^m5M7L8p@$Ou8Y84n<~OnF2bny!muGl17BI4H_a&)k^D36a?u@gg<1Mag57 zkmbOR{LaH((Gb_aG4s(^uH2ZpC}=OIl#PuRS%*mPnZjSEMwn0p(1}hK^hC6$3-Je0 z5Cwth3?!l=7}+k1CJ2=~WX#@1rU>)`Y>jk`?i!4ms$u^iEf=wafM6%goFZ%QX*pnS znf49v_kKE6khK)TT8i?%rYb*BH0AqxN_kJuC{%mkFWz_1zpIQY_ki5r&!Kh!wb7AW zXkflxo& zSE3vAFSe^XDgYJYXJR;ng@g@44DBu8a*CD3n_{?={bMV-nS#xvdIM$rjq+9+_ETHo z;4AFL%ZPYr6p)48c)63>8iK6=C_@YbegbU8o!Jc&1ZuPJGxQW`jN|Lm-nywx`As zCgy^jf)Qh1mZ#qY`7ViXAdT7Rw~#AM@cEKh;8<$1^qvKdWo=h$EP8)JRlY?D3&tN) zjs@cnDEEhye3KHA6Y-~%{23)bgQS#+CF0MifEIP2`=6l4zocX*ZWF(QvWU3+GBRn6 zxLi?VZcP6`Ne}Sod)Tf?IF{b0-z{cQ`<|X2~S?Ui}I<+`z$BH#M?E?1i>P_0R1x)ChW-2IU z5D=!54B{w8D=5Msjw3;Q$zO^xiIKt4Z&L0I{;?}dOcssC9*XPq!N4fD)Ep=h7pcKr z{75Xl2lyyBj7(0W_>iJdWGJRL=>CIr2Kx0g%J-Q4E2y^PN7#xfOsdU6NPdDGXl1rN z8XxPM>>BOkftWy*fdTaS;1*t#XcW|%E^|=szMjA*((|}@$7?WR!YBIGX!v5QUSID* zFTc^AL~NeHC;$Q-HnIV4csIRYXWHu?ohi?Pm^&j_u~_s8)*tWRU>K7$-ZV1Ax0)iT ztTasr^Q$caLkJ+zY{c&(LEO$?!bzMZu}x2ka9Mx^D;bq)O;JJ|E1pM!Ko$TP_6P!w zLz;)Xk7fJ^LYdB>1!clX*bAV8$8luh3Hq8=!OZdA6zgEYI*_znq<8<5fKT!x-p2p% zFhjUJDo%9|1IN!pbk4c=4-I@&KgtsFi(hB^ug0nA0`v`>asGFRKMowk5V~%j5BAe3L23){abZB+B0Dxip(yMX{;A z&{fr<*l5noTC+R50lXM&5ai}fNMr-V$OQ<3Y?2LvY_NF=HrTu+K|Lg!%x1G*ED&U7 zHW_>DalY?ARn^rbHEUpA(qx~mI(6z?|NH-+(-|AfCGZ*h&u`ZM>0e7EzR#QZCxx3= z@OA%-mPl9$OKT=tT1C@%tvB_GF2Bi2Qhtq!A-}0gN`BLowESi&8T=-jsaCc!BJUcw z&Q(TnowCx+d~2*S)+$sAt?|lut5_+vCMpxH$;xDFUu9owsxl?zGR^(11C;}xs$}a-D0QZB19E<$APPYCTzbQm*sObFK50^Kw1boN1LSWw|aiFSMSjJSErT z&8J(>RGyLRV)J6_*~+tWJ<$%Evay{AneCzqj^K!kf`GwY{$|bp;YJRcxLgj_l ziTG4!PHtVXuWoCVYxZjo6P4FrOIQc3 zL*GeQhj5>)T(|YrU%>ZED|+Pyo*lN1;Mo!Tx;_2SsJwxkqt-Fx9JAj*={f7Tb>cgT z%1!H}W#acGOTV2co%(<)U()>X+LGI8c0Ie=XsvY|Zw`4W+i^P1`XJ(~Ec<#g88Yzq%g z#&R8uvEkTmb;a}6s$LiC)I^by8;#}8mxHDzT-&QIH=1^Jt>ZR01FXH~x;7SIMW(d6 zrsfn6QZgU7D9++JmJXAqW(#?lU{odDPu_8wexYi&>mAFkdNt>+?V-eYwcT-AwPvGd zS68q!D4E3*x%Nlcj9u+I%{pN<{z>BI6@1-Sk=TifW+gzKG*BkJV%RBAqA@FJ8Q;-B zi$HS#^;s)pW$`;=jaWJS=B!aGkKa+jhJs%htRz9G_C-K^&cufhZ`PZb0CTzHn6+lp z9L%V>hO+K?)9uz*%$h4NT#~|<7Ry|r;aV5XTH7**3dEqF?JkycQc1aNwmY7E>5|-` z8^aZqF)5ujyFFbpt&Z)oEWW`^n&{@5?bPkIH=`!pR1>x4zI-1luqYHy$QFu*lp;EsB&uy?Wg%aS)&=Mse3|?)oGH}nJjvt&65n81Kh^B4+m1h4T_YkYxH34BQqnhEySePJJI+NU?RTv z`XyB6lHnR!Rx9c`EvNMk?pVgKY@PHq{O~%OtwXr6G!OIfP+OIG!dxYnlLt5}`dn}7 zj62PdzIett4`_6FQ7Rd};ccwh>`c4Xva8kDFg52{)G1?C$#b~%Gu5i=Io0ZI-26~S za!BhP*wtGpva7S~uq-Wm-ABjX*XC5!myofurI9MgfM=tvH}TYETZYyA zA71kXX)TY7eqt-Jod74*WIC>arljg*3?)N`>1XW+^{UK8hFAA%O+PJJOFR38xw0Q{ z;l6@;UAC0f41JF!Q>7j`3qRzmsy`oH2@%8;ZY9)%fMQ!QBH{{Fuo`Y{scD?-vnW&HyoeH|yz>S8__=De)v>xD?^Qovt-jr@H5G&q z0<2CQphEOlH@HHMsmRj|hKJ8l)N3H%nVNoyZ|C#)%JKYl0eeU`DTTL-Lzcx%c!WF1EC ze(Q*J6u$?oW7cu}9t>JMVVyvEwvJw)bqZEm<&c#G5T5oYcN6~FrICQ0EUY--p)+o6 z8C)ge*RtZmUpj4Ds9eAYE`bNuT9Om70`qlJL6B`r-tbmH#MxwwN0`%g`EJ=f-GmU+ zBzZVp0(Br0x6DS{>qKA~@*)ZZ<$ALLq}#!_LXH&lgd}FrlX>!lzn~{`91^-n*#qc@ z7EG^WKL1qIqo_0NS;QSbbB{oi8ueJ8W^3q>3%+gL_G(_&z0pAXsCdaXomxX?U|F!t zmB(h2&+9dEITR6@BjRh|>1NGDuN#(3@r9?$Pm#SoU4Gh(z5esgEwOwT$7klvc5}mA z?>P5dESotmyvKZ|Y%Xxk1vG3>QqFGUF8IH!ZdmN%FbD;b{9x^Fck1_Stc8+DSw95f zPTNv)j$Na4(6$=)8y09p3|52IF=NrfVcu%yaqXkq(ltJldjBn*b>Dk zQaOQHilh*`&qsCPVXciiFum=%ZFZI;hzNLYx$8BWvxHxQ{i50Asc=4N+yw zSlgMqSoXG}xSrE#njH!@LA&Ab-LiRknN!J*VHN;X-MWXqtOQaWS7XVx+W~-_M?uay zz@xcd+aQ!I?%lu6(khgp;k9Vh9=H&B2Wv6cZ7rd340b>hFlimrt=%U}z{Fy{1%z#) zTiJXA!{mdu`Sd`Di^h$`Y;~Jn!xL(Qu|tyYiaLXVUSBpB7neX9?kz6zT`Ulrx>jqt z_W9xYi}z-|0nryLT?Ya4P~}n=udUdCPd=aoiihm4Wp=o7e0KK!U@c_!r1MI|4G4;K zWH1xxT+p8dr;F~iJJKUH)WyYM=FsuIx+avU=0(#`ljSX&Z>?bAP}8zw$Ehw>4U<^A zUu!hUdby^g1Q?APE2k)`tJ?z78gcl|Mjas_~ zs<*gD>w(%F8{=iu0?&eOU2}*(m{ZlEVETS`ry>|4kqkSxi%LGaQ(t@XNdj^8-uhr# zE?bu9`k?d?TT!bh6N33yXipS!S9UcvK#HBx!+@~woV6YA#1vsrrGWgqN(zQD2l-^~ znv;fXSf|_{ehRpt*;16P|A-4Ou>~y&8l}FS)DoU9cbRQnOZ1b}E}Ixapxj75i!=xIVzi&yMvc{cKaF&(KZ3N-&#gVzppH7; zA4OX9CipC=#}k*-!AT zw33nhTmz;s#aNxQe2`mqI<2a3Zs!a$GFPr%yL{)yg2PGmGXZiszrZ`_&7G#75`yi_ zF=tFQ8$hjdlX>X}4$W(Ra;@w6`20JBR4rJqK6xigPy zgZ=~r&Y|Y$XTo+Dq+NySFft8w${!2v)!aB=V_B^l(_2Jkp?>o|zG9syjOVqqo`cGs z)zi32YkB$2X}C%jv~&`=$S)Xqy{H)<_KxnB_{)2$_S9W7_|CGaTS)rQ^jD!RejaLV zHQ{MnFoR(62?PMwRby?^N^Tnf-oz^GSYa-H)2kVzS<842;JP~UTiUN{n=qt60m<~f z5K#!w(yr46HyTFU;qF4hr*y-QAXsnuHY^_=_=DND*OizyKvr}5j8(d1o^daoaeW + + + + diff --git a/www.photopea.com/templates/?type=1.html b/www.photopea.com/templates/?type=1.html new file mode 100644 index 0000000..b938884 --- /dev/null +++ b/www.photopea.com/templates/?type=1.html @@ -0,0 +1,236 @@ + + + + + + + + + + + + PSD Templates + + + + + + + + + + + +
+
+ +
+ +
+ < Back +
+
+
+ + diff --git a/www.photopea.com/templates/?type=2.html b/www.photopea.com/templates/?type=2.html new file mode 100644 index 0000000..b938884 --- /dev/null +++ b/www.photopea.com/templates/?type=2.html @@ -0,0 +1,236 @@ + + + + + + + + + + + + PSD Templates + + + + + + + + + + + +
+
+ +
+ +
+ < Back +
+
+
+ + diff --git a/www.photopea.com/templates/?type=3.html b/www.photopea.com/templates/?type=3.html new file mode 100644 index 0000000..b938884 --- /dev/null +++ b/www.photopea.com/templates/?type=3.html @@ -0,0 +1,236 @@ + + + + + + + + + + + + PSD Templates + + + + + + + + + + + +
+
+ +
+ +
+ < Back +
+
+
+ + diff --git a/www.photopea.com/templates/templates.css b/www.photopea.com/templates/templates.css new file mode 100644 index 0000000..2fda53f --- /dev/null +++ b/www.photopea.com/templates/templates.css @@ -0,0 +1,56 @@ + + + body { background-color:#333333; font-family:"Open Sans"; color:#a5a5a5; padding:0; margin:0; font-size:14px; } + + #cont { background-color:#1d1d1d; padding: 26px 0 0 30px; width:100%; } + + a { /*text-decoration: inherit;*/ color: inherit; } + + .title { display:block; color:white; } + .item { position:relative; display:inline-block; margin:0 14px 20px 0; overflow:hidden; } + .item img { height: 100%; width: 100%; object-fit: contain; cursor:pointer; } + .item img:hover { object-fit: cover; } + .cat { margin:9px; padding:2px 0px; cursor:pointer; } + .top { margin-left: 0px; } + .clickable: { cursor:pointer; } + .blue { border-bottom: 3px solid #00eeff; margin-bottom:-3px; } + .clickable:hover {color:#00eeff;} + .back { display:inline-block; background-color:rgba(0,0,0,0.5); cursor:pointer; padding:6px 1em; margin: 0.2em 0 0.6em 0; font-size:1.5em; } + .count { float:right; } + .cat_title {font-size:1.6em; display:inline-block; margin:4px 0 10px 0;} + .t2 {font-size:1.2em; } + .openimg {opacity:0; text-align:center; font-size:4em; position:absolute; top:0; left:0; cursor:pointer; + color:white; background-color:rgba(0,0,0,0.5); text-shadow: 0 0 8px black; } + .openimg:hover {opacity:1;} + h1 {font-size:2em; margin-top:0; margin-bottom:0.4em; font-weight:normal; } + #cats { padding:0px 20px; min-width:180px; color:white; } + #cats a { text-decoration:none; } + #search { font-size:1.3em; margin-bottom: 24px; line-height:2em; } + #kwds { font-size:1.0em; background-color: black; border:none; color:white; padding:3px; margin-left:0.5em; } + + .order { margin-right:1.5em; cursor:pointer; } + + .post {min-width:1000px; margin-top:4px;} + .post_big { padding:24px; } + .clc { text-decoration:none; } + .clc:hover { color:#00eeff; } + + .scrollable { + overflow-y: scroll; + /* for Firefox: */ + scrollbar-color: #222222 #1d1d1d; + scrollbar-width: thin; + } + .scrollable::-webkit-scrollbar { + width: 8px; + background: #1d1d1d; + } + .scrollable::-webkit-scrollbar-thumb { + background: rgba(255,255,255,0.5); + border-radius: 6px; + margin:4px; + } + .flexrow { + display:flex; + flex-flow:row; + } \ No newline at end of file diff --git a/www.photopea.com/templates/templates.js b/www.photopea.com/templates/templates.js new file mode 100644 index 0000000..81051ba --- /dev/null +++ b/www.photopea.com/templates/templates.js @@ -0,0 +1,309 @@ + + function printInstalled(tpls,out) { + + console.log(OTPLS,RSRC); + var list = OTPLS.list; + + out.push("

Installed

"); + out.push(""); + out.push(""); + + for(var ri=0; ri"); + out.push(""); + } + + out.push("
Name
") + if(cr) { + if(cr[0]==TYPE) out.push(""+shorten(cr[9],24)+""); + else out.push(shorten(cr[9],24)); + } + else out.push("????"); + //out.push("Uninstall
Uninstall
"); + } + + function printAuthors(tps, out) { + var as = JSON.parse(JSON.stringify(tps.authors)), list=tps.list; + + var to = [0,"Total:",0,0,0,0]; + for(var i=0; i"; + var thr = ""; + + out.push("

Best Contributors

"); + out.push(""); + out.push(""+thr+"#Templates"+thr+"Usages"+thr+"Total Size"+thr+"Last One"); + + + for(var i=0; i" : ""); + + if(!last) out.push(""); + else out.push(""); + out.push(""); + out.push(tdr+ca[2]+""); + out.push(tdr+printNum(ca[3])+""); + out.push(tdr+printBytes(ca[4])+""); + out.push(tdr+""+printAge(ca[5])+" ago"); + out.push(""); + } + out.push("
Name
"+(i+1)+"."+shorten(ca[1],24)+"
"); + } + + function makeView(tps,out,twds,wds,curc,caut,cit) { + var list = tps.list, cts=tps.categories; + if(cit==-1) { + if(caut!=-1) out.push("

× "+escapeHtml(tps.authors[caut][1])+"

"); + var oi = out.length; out.push(""); + var N=0, U=0, S=0; + for(var i=0; i"; + } + else { + var tpl = list[cit]; + makeItem(tps,cit,cts,out, true); + out.push(""); + } + } + + function uses() { return TYPE==0?"uses":"installs"; } + function shorten(str, lim) { + return (str.length300) num++; + var cc = Math.floor(rst/num); //console.log(cc); + var isz = cc-16; //console.log(isz); + + var tit = escapeHtml(tpl[9]); + var lim = ~~(isz/9); //console.log(tpl); + + if(big) isz=rst/2; + var wi = (isz+"px"); + var hi = ((isz*9.3/16)+"px"); + + lst.push("
"); + + var iurl = tpl[4]; //(Math.random()<0.5?"wide.png":"tall.png"); // tpl[3] + //* + + + lst.push("
"); // ict + if(!big) lst.push(""); + lst.push(""); + //if(big) lst.push("


Open
"); + if(!big) lst.push("
"); + lst.push("
"); // ict + lst.push("
"); // cmt + + if(!big) lst.push(""); + var tag = big?"h1":"span"; + lst.push("<"+tag+" class=\"title "+(big?"t1":"t2")+"\" "+(big?"onclick=\"labelClicked()\"":"")+">" + + (big?tit:shorten(tit,lim)) + (gotR?" ✅":"") + ""); + if(!big) lst.push(""); + + var au = tps.authors[tpl[1]]; + var cat = cts["c"+tpl[5]]; + lst.push("") + lst.push( "By " +escapeHtml(big?au[1]:shorten(au[1],~~(lim*0.7)))+""); + lst.push(" in " + cat+""); + lst.push(""); + + if(big) { + lst.push("

"+findLinks(escapeHtml(tpl[10]))+"

"); + lst.push("

"); + var dstr = printDate(tpl[2]); + + lst.push(""+printNum(tpl[7])+" "+uses()+"") + lst.push(" • "+printBytes(tpl[8])); + lst.push(" • "+dstr+"");// lst.push("
"); + + lst.push("

"); + lst.push("

"); + var aurl = "//www.Photopea.com#t"+tempID(tpl); + if(TYPE==0) lst.push("photopea.com#t"+tempID(tpl)+""); + else lst.push(""+(gotR?"Uninstall":"Install")+""); + lst.push("

"); + } + else { + lst.push("
"); + + var us=tpl[7], ss=""; //us = Math.floor(Math.random()*1e9); + if(us<1000) ss=us+""; + else if(us<1e6) ss=(us/1e3).toFixed(us<1e4 ? 1 : 0)+"K"; + else if(us<1e9) ss=(us/1e6).toFixed(us<1e7 ? 1 : 0)+"M"; + + var sl=ss.length-3; + if(ss[sl]=="." && ss[sl+1]=="0") ss=ss.slice(0,sl)+ss[sl+2]; + + lst.push(ss+" "+uses()); + + + var ts = printAge(tpl[2]); + + lst.push(" • "+ts+" ago"); + lst.push(""); + } + lst.push("
"); // cmt + lst.push("
"); + } + + function OC(tgt) { // onclick + if(IFR) return "onclick=\"rebuild('"+tgt+"')\" style=\"cursor:pointer;\""; + if(tgt[0]=="-") tgt=""; + return "href=\""+(tgt==""?"/templates/":tgt)+"\""; + } + + function printAge(time) { + var sts = [60, 60, 24, 30, 12,10000]; + var uns = ["sec","min","hour","day","month","year"]; + var td = (Date.now()/1000) - time, ts=""; + var lim = 1; + for(var i=0; i1?"s":""); break; } + } + return ts; + } + function printBytes(bs) { + var bst = bs.toString(2); + var zrs=0; while(zrs+1099 || fxd[fxd.length-1]=="0") ? rn : fxd; + + var ext = ["B","KB","MB","GB","TB","PB"][Math.floor(zrs/10)]; + return num+" "+ext; + } + + function printDate(d) { + var dt = new Date(d*1000); + var mon = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sept","Oct","Nov","Dec"][dt.getMonth()]; + return mon+" "+(dt.getDate())+", "+dt.getFullYear(); + } + function printNum(f) { return f.toLocaleString('en-US', {maximumFractionDigits:2}); } + function tempID(tpl) { return tpl[3].split("").reverse().join(""); } + function isWhite(c) { return c==" " || c=="\n" || c=="\t"; } + function isChar(c) { c=c.charCodeAt(0); return (65<=c && c<=90) || (97<=c && c<=122); } + + function findLinks(str) { + //return str; + var iod = []; + for(var i=0; imin) continue; + + while(i0>0 && !isWhite(str[i0-1])) i0--; + while(i1"+mid+""+str.slice(i1+1); + min=i0; + } + return str//.replaceAll("\n","
"); + } + + function escapeHtml(unsafe) { + return unsafe + .replace(/&/g, "&") + .replace(//g, ">") + .replace(/"/g, """) + .replace(/'/g, "'"); + } + + function getCatCounts(tps) { + var list = tps.list, cts=tps.categories; + var ccnt = JSON.parse(JSON.stringify(cts)); + for(var cat in ccnt) ccnt[cat]=0; + for(var i=0; i"); + out.push("AUTHORS"); + out.push("CATEGORIES"); + for(var cat in cts) { + if(ccnt[cat]==0) continue; + var cw = parseInt(cat.slice(1)), isTop = (cw%10)==0; //console.log(cw); + out.push(""); + out.push("
"); // onclick=\"catClicked("+cw+")\" + out.push(cts[cat]); + out.push(""+ccnt[cat]+""); + out.push("
"); + out.push("
"); + } + if(TYPE!=0) out.push("
INSTALLED ("+RSRC.length+")"); + } + function toCat(cat) { + var ioa=cat.indexOf(" &"); + if(ioa!=-1) cat=cat.slice(0,ioa)+cat.slice(ioa+2); + var ioa=cat.indexOf(" /"); + if(ioa!=-1) cat=cat.slice(0,ioa)+cat.slice(ioa+2); + return cat.toLowerCase().replace(/\s+/g, "-"); + } + + + function cost0(v) { + var age = (Date.now()*0.001 - v[2]) / (60*60*24); // age in days + var cst = (v[7]+1) / age; // usages per day + var ext = 20*Math.pow(Math.PI,-age*0.15); + + return cst+ext; + } + function cost1(v) { return v[2]; } + function cost2(v) { return v[7]; } + + \ No newline at end of file

Hb1E35pKNyS`YFp^>fRj`_Qz%;{f8>1K-_rHP&E)1)#7u}-q)2v zZ?MFU;j^o|YB!aVIaQ8jh0 zRQO5aB8#uA8XPBBuT8xN#9vJWCK-*!t4;l_MEkgr@RA#cHP|FTey}!H@}d5YhTPO@ zdISCj{^3pCnf9=PmcgfANwl@~L|=EVdD*`HP{Z%Y7L;6+8x``PZ{@dH-&kL#s{1f$ zW$&Rh`_b3ez63H=*rq{fr1sZACZgqh4U%14Vu2(?Sq)gNpkkLPf>yvlU5mt`fL#+j zAe=#p8o9h?a|sB47a;qy8zV9Ms3ss&kN~6eDG`futCK z#DHn>+3i4Q0f$So? z$k}2KZTcBl?{Iy4jGH3tVhp|JO1h9Pf%V=vL5>xQmBuRfUXl!m*YI&zCTLxw)onp^ z??Fg~-8dA52lExof0IT|yl=uEV0(hNf&D+WRzz8Uq}KI1U>hDgM6Q>$XEo_rNN(L`VpSGPapwV)eeB>=ClInt}cJZPYpx=C_hr5F;z2AWN!oxD;q*! zA~Osy3W3?%2zfP2P*+R51w_3KV(jS~a6s}8NV%WLylQN~Wyn8D3>L{PNpE5+yPcqn z5g@PTJPphB$TrHcCb0#jYJU_*$9ZT>adb47YV~`NbpX56JP2RAp`J4{4Dz$cQT{bk zDVKp62)awxaVX!5yibs!wT3o~5UC(R4+Cur4kaLKME4e{z+Vb;!^sS7K*Sr+fUvWK z-CC3OtPK+`gl3>X4Z0V>w!kkeob{Sx*#o>;vgAbK%O|dLBoM6h%9k84i99&IIq30 z3GU4GZp4-+q!?;)g5HxZ4eBRamgAN?c}J`Rcmf7W+;nJ?cG^q?4UKDChx;K)AmFz+? z%BbX$&J`pj{i8e4;><#=#_BqayDJfqt^qE^`a?i!!C8CWtVKo`CFlxyR0fB^WCsTE zy#`pIg}-6JKp~@q|2^ScLtlEQ_Tu(KWgj^h@dZ#47el(5(!JY;ehuvjo>OXk5!0>Wc42WWFCYEXA)FLK-qEbWvD7#C28?vaC(r_DHQEIjl%IHyP+s>EK5m6f)O0HmK&oV;@`wlS6 z3r!FB^%c$ot@~N}!1Sz^GkPcYS`AX0;GJDgAGRX1K^6jU7`%oU`<`Qwy z?({}Deks&DXu;-8t6II&T5H10tKKTjl`^st{+Kf028}s~F)>hyYOb)}Z}P5K6(I}+ zr;6UUJ1*i1JSX&wC6VVRA^!Md!K@Q^y7o?*QK*X9JY1T2E++{`E~&$%X?!}BR=>rJ zuBAWKlgu+d*&F1CYO1GEOZXYX1;3)m|02+4STllztBJCn>1PP;kfAfskhH4N12a~D zPbS_z1eTrlGRykLMJ=(J)e=1@@vB*=^C-P)Ku!nCeh2J%GyBc#I;8I2;eN__70*WC zZcZ-iQ0vpwrnE#mhuqxGT(t27+8Eth?OfbTfI#g*iJ z&1t-Y-hCx#x1Acak8w!5dN>o7zR_7nikoc;*!dKY_H+#g}Y!@JsM4n3Ym507sAf$DJ&rMHf3C*%p| z>)6Kc2Yt_b$G1+v9FnBgv3Gx!xHFh(@8oiF<4=P3NubnRkL;dl86%=E9ws+OJ#*`n zMGfjSzK`MiIOiG0l-%kWe4p4x$Ee5Ng~lB8KL5=;-^6_5itAk})b<0sBE~dtJJ1+fK;4iTb*M0l z@zPYvL5y985|>v);1i^fP74?vv+90E5pGBdRJFj$3-doCFb2Ybh=lGyZ26gr(9d+| zP^byUH}K!kU_VgCOne^Y!x4M9*yT}=i->~IZ$jT#*B-KLvmQ1VFz{eBA~?meNdeDO z*c^8DM9acjc3KRF*i`6V8ut8{agWbXW$4Gi`=cUV6qycejBHSpB4{iRL5Q61F!^O9 zbBGkd`)(xKL#5fqOpRh zbyoO5`0xW>eTxaLOwO+$@yCO8uhv((?R&OGtDZ<*4s9BK=K4*EMstK^q^{0ipTFvl zT)qAJorNnm-~s5{RwdTz}go+8buZ?%M#7zk1QZ|MLOk=G5qRksG2*+q)Np_h&KMHVuES} zHv2;LPK7XtM#{(@+CS+D_S5h_--S=?ab_l4?p2r`>BsyiVw8mP^TPdZSX}q}OnXFeRroPYT!}II>ZRGtSX4QEC7kl?Q4ij}0jXp_S zMK-~C+@Q~}3xYdm82h8{bR9NX*mZk_5s0j-8UseakzuoQj`ejV$Glwx2d0tXY$#9g zeekK2a~0LjEnIUP{NnZwew-E)nps2>bUJ*bOe}u3)3gw@*=g=&XOVZlPY~i1=Kvf9 z9Um%wT)s~VDOg%Q?H$@fFc-~tXvv5JjB=7CBh7(8fx&NU7(9ZD8PWGp`&x2S-%P^0 zf;gG3<{W~2orJ7zz)(ulcG7vQZ@70?KJPvc7b;=Wf%Lo%?WQD?a==< z(I1DPIN6_cztK0gCLylEbGHSNcy)?GF3Rt-(wkG>en3_Jp}v{#{b}z8dT^khMSb+L zK^(R+K(}Il|LUQBv3i&_qvu-Zp?9QTM68(hFquzm9_Sx%-tAA~o7g(qFS2%&Jk~GL zi`ZxVMt{^Ac{j6pu%B~(vtMk3ByAqT(=jV2{<`CSO|aK?-L#rs9P&3DIwGN*zv$Gyj_3H7X>S}n=!9O);#C%4XRC#=cC32WcG zDL_YR>-;tqv?H7QL>U)}dy^j_<*ZRe+8LVy*^D@z&Kp(!0 zbttQKXdjT0-;k1D-Bt4LpyWD8CQG@$>Rs4+%9;Yi?gK0;*BLCciiQXrXO=Ti2S@rj zs2h1}|9dI5S|HkK^yk<6hqsT#^UN8ZbZ{q??px-MBqw?S<;kE6aX;yv`Ye|$UnJ>B`-&+MzdQH=Wf z0!rt@em$bE=VN^Z^V+6IUGy>2&uk*Z1>tIp;$ff}Bq$nOYoYdo(25S@#LhBi2^MEc;3}XTHl1cO zs*U|{YU_wM@gS)~M~I#b0`;OSs16d31yfC{gOEMMjd*8aXj`LC$Z5bD8Ah;(;)k#p z1X|V+!6R}dV?PjO7qg3_K7_i2>QDKWlGoo*n?K-23$`1ChWbFBk6Y>Y?&M++s3e*L zLg(lVWPhOut}xIHo&tpFz_);TX)MQww+Le;;`=PV>A~*)qH^is#mIsmh9*&F{VcC? zhQnwcX}>|`*X_UnR@=ZY)NnFaSjghFEkOm56{YV4wr_+h(m;kVp`}K%;f29Pn8DC( zs3v*Xg+eJOgotnzro&l%?drmLbN=RSrgxCoUcFoztbd?{L$DaGa{=Q)K#{0)0o)1@ z1t#uJI|f5x>|4j$7_Q_>&4XnTAZf#UBT-F}-fk|TGBm@7k0cS`Z!eRrajYa+=D@4DHgjJo6_M z!VaXz5rNR%4z8>^4lmLQ5V zD9n`vQR%D$PsA-9IHGr0UBXrPCSZ!YO3E=`^c(RlXN%${lhB`72icK%?oV1=%`~vY zkyVA-S`AuC=$GU^3`7bpOYac$HxR9(F^D-x;)lcOj0S@SLcb?W*BysqI|5@{Ttuqe z?(pI>J{2x=6_*&btlkX94p$jmuN^P~6%vf`?U+}9-p=raaBT^H!KMuhfW+^{V14Mg z5=NJGmG8jTrKL5VvCsVIzkgfePnBcCO@ zia?Jc&*vr1L^%JKBEk`Y-mdjN9|i`8wz@EunZpU_SlGE?f`GYGF}w^qXn{hLDQ_TZ zwrydbOZbj!PAlsS0LTJ#Tzu;3^GKc^34+h6w6EL<#D%q|s*v9G zs8t%a14&9elmfLuSBTFxHW5f)hbzJREgIJ4So3Plw1Bqkrg76rUwhQXndD zvKjH+=)|KPA}p0Cb>$cz>L)NYi2e`81kS29n8w24>5B~HN12&HcZTZP9n%8xMOKTK z1M)=DsMwKZPLoUv-h_1z3!VYpOF%*ToNIb-(t@H0=mNJdI>LS!6WRthzh&!#gZ;IpM*ePF{b!yG?-c8AP=_Po$@ zbaOX81@`b=sH89@kZaV0h-k}kP@aVZM;aZxZhD9vb|EYbO_c0mMyaxS6R$bzaI|CB zffAJ-T_sxpV`*E^5r(P@mTN}&0*IZhvKhoXV19y)FuR9{I4$Wi_r(v7b3WK8&zG@J z;2wX0kOMhdMjD`~+JOOP5U?uHwW02XObwv9u@(=k*X zdGE|xXAL_|sD)xu)anyMq_Sb@K!X2G>=1|n!|-4qy;C6AUl`k6C?W!h<0aZ*MYIj; zm3;!Y0*EV17<%9#S&aIRa7jNK&WE1~IEp{M11=YwzYnYCHHQ{yaXP_EAYK}S^X^oc zy^X{#1gxg2=r!!-G^zW!0YW(o$f(Ed{0!isFOB=6-6xS)FmfL9-=+Z@ z*8M($O4g%wGDd->A*>zTTT!cRB!dFiARm0_nC_gio&BS;xMz;NXZ- z$~RU!jkd2lwx4q0T=JZE(5~||5=_X5>oytAf%7*qka=BhIvMtB_-Cp#0*A#gS}9eH zCRxQN{cjA-rQ_v@0aw7Mz3Y3J{;_Hd7A?OZ8%f=l%AcubKgFeVd;bDN5Fs$K)dsc@ z8;(w*hFBaZn1~im21r`Vo7)h1V7e9kaOWnepct*wG@ zMCV|)rDVCcZ+4)D)Rqum2?Y9pPy%pD;>S;k4+cjLfcn($fuhyz-qW|JJ8?+U*q$Fm zxedV1T#|!SX!JRI#yKm#-;{#kd|Ymz19rf}6;NjhHD_L;dpRrM?))S6y0}x!RSxBUjc3m9G9d;z{{~5KR0cC6`z3oLaw9!{ z(K*jD;@uFWlYp@^$n&!Td!V4IMe&XNLl&N7@(-9CW4WB&rsPaNx>I7V_)AXlYL3ZG z7QzkyoU@Sbt})Edd5igvG3hgTo5{c-zQ)@PCVvl!kFKj}!G;4rA0Y%NlZt6R%95i@ z{w9-yOvICZgjY{6q5I4^fW#k>$kG-B5yVw(xXxc<1*kG0y)8#FIDZG7 z@F(yRcX&kfxe)e+K&Xtxagat1!|t76|!o+Y_s=+i8t;oxMC z|D`|77qZDTb3dgA7S8pLb!E4hPr3LhGySv_0OKShAW)nXZ-K$-%dYYfbS6dnG9V2NL}agemZR+i~zmg(Len| zJsY-d{74^5|FAG20mA6l0fY%i=mCAkA7|5u(1#~7EUjZ4(Y54;?@!`x_q+5xN97;! zu2JkAc{F2EM_U}0qb;1*xahAlxz0rBP>xr3nVe+u@0grr@|T%#*O%;4P-H{!mF{ds zF@&D{3U7N%NI)cHKq0q~FM>)8e1s1_$2|I28~C~;TXF=(7a2mq`H78LMxXmp_PN~t z?Ah$eY&wgmYvV}n)9gBq%9zv-N3#>nQ{jhFcOBIZeMm_8aY^y^IzEGrS{oZ2hmX!c z?$F=zWN?(mNN|)!P7c!GIZ5gujr?~L%WyT~FpX?w?7MJbRtk`GivB*~-viz_4`Nh1 z3M>+7?lzt6FwcbM#T~muSr}Gqs)ABYAbby%9@-xY=>f{03YlA63|JSek&uPpZ)tnj zYb5PP&uD?+IVVu2C~zz;G6OdvltUlwU|#~Fr8^YQ8p{wtA|@XgDa8;NG!&~0uLhbk zOpWp`Pr#ylhbI<#7z||rg7@O$J$plr*5X#E#lmbJx1fP;a9gXg0PljK)KyLu z^h_0@h!=>HDueY?3de~N7Doy-HWaq#(1E|GV_jOrYf8pO7Y9}ZP77aHrte1%;usd( z#W2Vg*PYs0RYh`%rMbI?0~Rc0)1iJbm^wId{u%0juGz-YG(F z@F5fAE?fcC$fUs@j&~D1Z9OKXReELV}aoPXMJ+ShJgRNvUWei1$ z(St3p6pzCXuSu0>@pWH85=HZ$K!_AKzcS8;yR5kVF^u=YZfpc-CvftQ_AY|DaW#tI zZ+t;~^xm&VD&xG`fgy@6Ff77iU<1UZ&|wG^XtyYx`X2&whc4xH- zg@gY+E+}Q!Tv|o&#nbeUvpAPY1?ulwI_TK4m4&qo#eQ-92#>OU&)|ZwUsw-Bzo^v< zVi*uLWNC;<*@q3y8n92>$}kc__Qe^!{}4^t)o_ME(c$`(GYR7~1mRVk?%froEY9AX zo4Y!@5Hrp!?0Nx<60I6&8MIDua4SExc!Ov`65SDUKTg-d=?_tFa0Vt^_BLOkdF6HB zD%4Cwy(;b?%MO#@_4!NOS~pmDA!Q455*Nm8EYd57)1%N>v=mWcD3DW80AG5MrZ`fvX7l{uXYAcUk=G z{pW~T1X6lw#5kH>20NE=cpq|-jB#8w5Y@>2=qZHyArNde8{}t$Cn+l< z9Fu@Ak4q?6>Gv4aH!eX_K>w{GWBGyF+1|BiX`pDTUCYCJ*{MOqPp*nVa%|_V+Sp#Y zy>nyx?Kr5#ceW>=efDB+7FGb*+yXK}@j&KV-29>CjdX#GO`WPnwoki3#8=DQuQMR$ zLdk`ue;>0SLw8c+(u8c6-?^z)VhTlu9pO8oiV7%6Wh>0vt41O6f5vKqqwq%6<|TCq zVt7L^-ZNhG9^U+80^IYs7~V|Joj%|NpF;D1zCnE;EgFk#uZMh#zYmRU`p3D^-tj#F zG~BGei?9$r(PqM3MB*`!H1QB|vfS2&Fe%vAxLx;Q(&eT%gX9D(Bjuj((hNkzb@o8Q z8`(x^l9a`6AMBJ*0ba{eBCVb=L{(1x%sA_4Moflty?=hEt>ib*47JKcOi&Uo>5@&u z3AZQ`2q^!-P~)D33m506;0Z;9;PBI3QXp&@u=|0azz7AxgLs9X-*yGLVkX%5>G~5& zBZhh$4&YkvpY0mWfES8f%5enFz}tao>;H$rlyb13bU}cf|Hh>eWo(UC{|kvf8XKdZ zjV8e0l|r(8EKB-{qd{@dr0ns>k%j}sj5X!}X0C~gqJfBb054QB9cnNl<&6)E;E7Pc zQ`rx(`*m;n3JdyRiz&9xe*snPseMw0Rodqcos(#(luV+T3=^DNb+>Len_-uw-#=y% z(JDD7zeJqmooJO~d+U@trMKLlWuMMYWyhx;mw6rH38W&#I}x@?R~UaE3*R=@3gipi zW{E&w1Y=t|*!po`SQ45bLjM{F_a@~=;5UN3cjlFh+P5Jy2pNBkCqkJx8_U67ahRrr zp0@{D;cO(YiAD%L1i}HGhj5oP;O-;hMG6(r68|;s^me>DR7VPUq`e4bBTfRq)z%tB zkcsrBPKrG*wP2?)q&pHn=~&>KN58^I9XalZ)c{E%J@iri3-wjyJwYu4m&xVebZy}o zAO+Gh30pyc6b7h{)glv7-9uywI>nKxBYtY(kpO`c7p|H3xlN4wq2RRV@lBY4Kp{iJ z>NvY#ps~orh`&B+lx6dd@{MwSgHTB|3ZyQMPmG281M z>gzeu7K&JfsUjHT6n5k|pWt>Et0SA6#aH%s6XmdHLf^#i7ML8O5 zV(JcRpIHVc0@20e{5G@x3X^}&)@qhB*Ke$7F6!a)oOy@4Hc*vNiQ32l zc`Kn%&%U7K>6g%rgiD`99_I&8)Kq_Y7`vzS7jk(V)wS0j f4D>LD;8)V$jDFzzmb3a#yMtXGXG8@{p$m94_EN(TqYwjB3sSWvWwYlM&v}k znycj(3)#%$j3|h{A2Om(_WdTmSOi@Z{h<40Kj;C_17Z;Lpe%wO1U)47f!-$vK@Wi* z79*fX^z(h7N5y{7`!zibx+D&OKA`Cl&|~5t=!2Rbm7|OM(Kjv*q3@6!!k8t{hs6=l zM>Kr^^igpP^fCR-80h2T1n3i*J_z~)@ge9B!@i2PMh_mQ9tJiS^^he?x=yRGr3i@Ml9`t$1SqqED(Q`pepl3oJ$CxKTe+Y1#t)nYa%6x~5Nq z{#<+k`U_2;0ewT<1btJFcNX-txCQ!_rauCGTigMCM~=#4Kzt58cg2_J`BEeL81y}H zAM|}$lm)zzN6!N>gPxhF=RA5Iidpo`>TfQ9ek2})ek>>C2l(a_^gI!B=$XST`NfN% ze|FElm1FY_)ewr zE~ADqv2OnR=2Td#Pu1P}<e^I-Bbcmj zsv-s%;4;ijAzR4lzFpU=xQnsAeO%wSw(?wWwRu{vaKlhLuTS;IaNEGu2>bS<8Rd;` zNOesPdtsPu;ii+>BL72Xv0!Y*VxK62`TecI=e}Px%%9rE{1snWl41!g$JUbAa3KiK zvaLEknsoA*BL4B7jG4g|oJ6yg-O5xlVfLro7VHXtp_)ENC(w%Ap3v zKi-o`8Yr#sR^~eZT%j)J%J{GRF54QcRGg|E1kj$W8pli9=B3&xDH;w`@B|(Q9C0Yu z98XUkzfgWxR8$-_$c9s@eQbzb9b=Q|r@7OzK7a?D`8_`!$P}^zx#5ChuY;@O7t366 zgF&Xl^YZ(K3_>H;8#{T zkZUYoNH_mBZzTIJTZZWJ*h3nuUgbo=Fp;8ER1S5BO?%mT#pK6XT#+otvdu&3h3qa) zV$--dz7{82n3P+6gG!A|g9gTB*TP-L8$rY`shO$bx5mHAEXyBtl$YHln4x7qp3 zUuLpK(egAJMv#S8U(l$-FrCI{TD@AMzH(Px&#qR`?WH^y@sdY2@&>&Cu^ z((#2ftiF|IwcQB)njN~1CHM;binR>KDJ;0m8Q%+~7hZm`S&#H)F9n$ZuxVUIK}hw4 zH3Alez7uyW+AkmT5}KpzeDCy!r0R`w7t8 zOR$mZ!bTP1D*^XpT6smE$cw@cS@=5|_F`+~nf-cRhRSHJJq%{2fm3;F_G`D+s99d4 zwk(z9uUHBnxDp#L&@qV=QcMmFS@=!YZDrTAADp&cbZS1GnRzLs3`kB})7qa*Fa0_S zE+*R>m@iCnS3`8so~C_XN>3C32)U{-6sL>$NK>t%$qb@Y%rcvVQA*l@@0l+fo{*}# z$8#Vk=K$4>yi|NjLtcU>rO5>Q><`l9AY{Ujd&Jz7Y(WW-)Lu z;Liotg&7k~Ag(*7Cg3cJ2A{T=#$WVp_ZQlT?dCMTr3MghF*}?a&ovKs$U51_+I+n0 z+uawpcW>K7T*R=?;_>N*M+X)A{vWDXOjMB;w7*q);s@c(n(eJhVK(=dX;p-Ym#^I* zq=cv%7Q)oPvSX2349je`(p~keHH%h^{=5RZ|@5GMk;` zG>He5WIW0#r`YG<>iBK9vIkzcHR(6Pg%FO`h~sKn9Cd_66a~cMdh2%86;{Akje`r# z$9q_@tC)Qam$9&1ao5)CYd}iI=q4)06q#kY$-q0<2 zxQr4&XoaF;Ur!E|wnJ<_+LKF$KZvc|Ds87D-F3=T*dcb3@@vraK&o}A_5gbgz+U4r zf+W=w=D{7<(!BSFBXuH&0H`{g>WT3)p!%}}BdMMk$I5aef{9?#sN9n@#0?Wh5CL)u zd%5ZcYv7kBH&Wr=r1dgD>RsKmW@o-Gm*;06ymj?UKV;U;~f zfjN_gX_8V)H4tfFJJWr~>_ecT71;ApLr_R`cvY+Z2Hg1`0{Bw{93K)e)K%M#|-(Sz*;@e6?Zs{|sco)E{L`mh5K^*464 z5gEMOX+{DE_=AwA9n5VgA1bJwxNWVv>%fK#5%#d&2={__1AzWIfk&zfUJjl2a0N%v zbVP7WJ#@VSPP4C-z*iXfinxvnykr} z-Yd`F@S2~d*=x5srxg_L5Ie0=XCV+w2=teeT|DJ1yn-`m+B`M69!f*Gw1F2hVn7y@%=GnW5#kcuDvv`M8?{|3EjyH16W80UUFjz6@ zO~o1QY>qSkmJctmA=Sm%IKtRLrIC*0QF<$Al^&Uok|1Nv9=>D-hrMspaD}$(!6@ip z4*?<5S~xC-@tQYPhH1JK*BR?JkA^<1ob7EU-8D zAQ92H;bvSny}}!;S(itU{ev+zy6_-+56nS1P6ukbDiZ8r*zW_u-{Uf#oK#OdhZY*k z-yxm7Uk%GBJjbXWq*2B0Cid3a8bwAkUCgPuQABAi+%NBCJ|6(t?-QJ)dg44hhol;u zLnU690Arw2X`nUxRTR-SJj6UGGJ&zCtQ0w@y->{n$3G;fNcBW@U|}-|WsNao45&k% zfqtxGTJ3lmK~y?`>0XwWc0YT_^C2+&V}giOPeeyzK0UA6A$2LnHJ4@-rG|ZIy?DAX zrAucLdm>+k~zizKTr@aWNid$Dj95dS#=OsXf~0}JK3XGU>is5jG4 zW0`i!QTuF0L-@K4bT4R+0Ons3Xry{Wdnl1C3h6n?Zgq6zpT-A&VTaIxdPu(2Y@rh< zbC3kCnKK*{V#NEy*JnVsDQ}2)4%B0M<`s_t``>WAFQQ@6Ug%To>$#M%*d)UT&8#)N zS5h=@#eE2Qr9i=4>!f3z(gynq6%}^FKEo(OBXD5C$H88Vo&%o$z-5dOsh;SLKJdjR zkUa^*Iu592aOeh2gyuDW)codSD_HXzRUDehq~x@Q*C!o#3@_AWrg%L|R@Hqa^_LgS z0f1+%)F~$AF5{Sw=@Rlq5LfHctm{1GT+$gClL)9lXrVCBFs!7otPP92=BQ_{y$(W5?9L+L7}b_AF7%9c;19a zeBTt)OlZ{Vk1(|cVm9nl4*wrckwbGh+k}x!AM7U4QP+7Ian0b;C%lOAaH7To7*+}) zAjEW2og-a1=i*d1L}isLzGQ*aiCGM60;e@kF`i=OO))b_#TP89^O#V{x~f!gKwyr@ za#?KiZ1I10KyBW9*S~w^?`uxM)1TBl?U;|O{4ZQd95dWs%4@B2(A)7NC-_rep+VVs zY|hk-X1H;TwlyzCeP%bsnyQ1jXgh%|QF(lKHQ*jetHDqCw+N)aDMJx|KkU0o`N z_h9C|rY(yuIPT>}zQyoIxuQ|dL#hi!qLUV$BGVhwXI!1R-c{ZA%=UQ3uC1nyZK5JAhYHw zW9Q~w4N51TYw)Zn-Jm+?aLL^sQmeXx73$vIDQ z)HsY8FK8TH65g(7hdZWAa_Q!sM=~l6$I*V^HM z&mW*M1aX6Mpm$KDy5z83R}Q`Ol-zJV!4!rOq!Go<=$sOzO2==oT#3aah&Po8orU8t zm1(37d^rH*u*?8;_Y++n(A-PZgj9KAl7CCH(m;%fzok)(JQh#ZZRZsXQ7{>}uP1B% zI_|is@i#dPVzuXO9cB-r;7Vs`(HcySJ~6>A>qKAQ(@ zX4pJr!`x3X%hLIYVj7@hW9?70Id6^L*IOYj&Kpa_EvDtG$iJs?o#3b z9o}#TuBxw8#J^$uE0zXI#X>*+KUNwn6~~5317mzv)a_7dsKjTE&MZ0N z?9S@UEM>CGAT0${c}RnxuSHAt&5uR@g#H744CXaJ0R0Ii;HbavoSD5)l;8vbf-E^_ z&YU^tJD2bGT_+kFs~Gr={pKg${#%CeTY4D$74h&PuJ~V22t%;YXtGttsLn&aYO1@n zYN>l+wIEDkg~euRwS+!rMNyQVvemLEi;<_s>WHX_QBnOjzFP4s2cu$4j6XH}D#lLi z^P9##J0!}J;uQLhi77FS`?x>8I`IQToEB%E8sdyUxo@tX68yeV`_6N$$*8e(!d;J} zu#@;s&}>ICS$WR%3o{PBIy&dJ+hO3jNf5ObA}{fi`8bij+w?e%&wf-laoxZbzk#A_ z$kD_&U|r*o33lFSSGw%JL066M{;p!<_k)ff$9A&m+cP(!R^qpk`3E~~f5wg)wre+n z(63ii$ECI_-KJ`3xlMmbH4=pf7)$-A)lMRN<24jJanRbZmzt4ST5ASPKfzS-T77T= z;Wyk)nDpu2Y1pmk`06~jWv}~sE?>;q*(jQSEvsi_r8-BRj`ZeBD{6@jO*uXqb#u)fgVNjAZajtud1WuX!Hp@{44 zopef*_w;e9X^31*IJ8Eln8joj)gjgq+eUEFJ^ptTiSf)x*dxBr<>)ixz!bpMFO01!mCS7ei_>|qZfHuXqkNvRiOS{o&c?3^l zK_ik)H?iH8upf7##0Qdy@u6>T`mR7{g(W{hO(O#MQ?vkTH}N-ih@U~r7k1FH@7=y( zFD_nrJHz2;u1o^26S^|o!DzqH32DBUD984b&A{8Vo599rViPmmprs~hMXmYk_ix;} zV{f}5z&dA#!Is9bO(2fzz;qCUY8XaOVl`$>t>Vi2@7wo%z0G&(@7T+mNz#s&78a5y z3gddvvPTlxJEb`~z(kVl_+Pa_ z4=00Th5+b&M6GaVNQl(N`XWRks+vfuk5O*RXgd%f=*ITi+WJlcfn2k3plg_MEtgH{ z4@l&7#guts%DiSZEvVB9yh!-jLiKWv3Z0}e|Gq~unE!Gubp;LaITZg0J@sX2k9FBI zW83%%Ao`dKfb46wqT~=V%IlX??rna}(t_HDYL}xJoQ^DS_${1@y!L$}XrbUgKWpsP z^~xNLI7gkOLp&iUEr*fkhViv}Z}6@)^Kh(kRJs^now*p#qy;zjf?&6JG5+4wi*c=* zRsujcPTZE~OPVAdT@PBW+)?tK7KKlnPffSAlNSA!dYJmLK9XDN@s^a4O!Kyzs=sbC zKl@@aE%;402vZzb5XR}aCXp|=W~LS)Lr&4mMd`;-k@^r$p+%p>o3Gh1opU^cqB>b& zXL*%zR%Mno`HjW+i(;X|#;qzV@(Q!Kynt@I=EcRuUH%2;VM6(y)wQsT;>yrr5Vi>r z(?oh4#WNhn0Vz^gT-x-CHbKDdhKxFG82bXWqeAn!mhX$uj~%E=NBZs1_53Dma6AC; za@H>I(*z_v<81dr-rH#c2|*iXx`*k!{}JmBEtH1RIVd`3QQ61@FXz^;6_?c1By-XS zl4H*$E2;TW)XRODCt(n4o_r3nYK@S&4Wmru4z7mu9_(cM2y!ym^*cFRB(${sCHtAVSAO z@KB(hLnVQyl$+o#(`+N`J>7oajU2xfS{|f~E$8A?pjY0VJl-mT9*xqjo;-CHXU?n5WMMIDrED*fD7(&taIM0Eb|Iv5g{ zQB6kS-&?~2Oe0Si zV$(Mg-sSu7^R~D=)#VS(J!`M9S8Pq74u5H{kl-Zt8Cr@0&$xKTJ+it*Vf~UZqg#SGEx7-k3nVe`y1nFuZX7SI{Va>O>sh=#xcD`@0o@kK9lIf; zrX7U>S&|(>O$QFr%W_MU?|0giZiz|YVP-oB?kGd??PkL)J$&_oH4+3kFPXIJur0Q) zuiR9v#BQ~mIyTjNAUwJ~QkQZ}Ag=*T%-MJE+`VP1bVat6C!4+`VetE}h(s>*T0PMA zZbNzbU%5@}e`!fuI%=lhY$J+hm+aYfSI*A$=GJfAEyUlUkJp!|8`bN{SIO+0J)5O9 zFj)g)tzOO6j*UlVD(sC1{ekgO+izW(?RBWtQ5BbJ$0^We#Q=$2MFJ5QmY_+jyQ*zA zr+}peO?Sgzc+~bcURn`ieu!H}aA*(xH(ER4EP98bOoPq|Xcd#`(%5dEq`m3vo|6l? z0^_Kpk^~a|eswSx1b>zcZCX$;NKItUR6ZyjZ{pZ9e;yu6t(=-3LctM*bXvZ)wMxhp zbtU~D6RojKtLrfLxC$60ad6ah@qeJZ$_-Ygst5tgD&(`E3pg($e5#rj-#s@dRP}+u z9&IlFQJs{8QiT+TQPcym=7$vOG4~Dvquxn=y6sCD2&Ka}U!5>|RhsBEnw(4nWiCi5 z){kpT%3t)>aH5$eo{@p2^Ht6g>OE2Z_IVc~lhHqxd&wvGHu)Df_XdWNC`6&glyXPB zd802SYlkcHGCqhqJ z&BR2lKP~868G|Ir=c~arHVB*ee?clH@823FPom7K&>&Nc|GdI?-*_e3;-Qqp5ZwL= zv;a4@f!xV|GQf@lU}pd{;}LzsfbW0E%w`EojgB@#DC zNBwQLfJ=`9FezeJBQB^mi|WDxXpylY*JJl;j|caZFzFCBbIdYd7S=Y?xr0tE@uOxQ zO`m|KqiWvx0JiODGJpC6nMgw0ZOSz+*%#woK30K^_=q@V;;Vzo`$$S+3^B0~B0&!8 z5W{VZd5vToC?%tG$xl(~vNpbB5Ss*FhPj}7!8mUq_r`<;y}{{A#v`-AMG<$a!5h#U z8@S#>W(FhRUt>%OHN}2WUN*!CSXObngL>sI>?rZk;s3`K?ETLvmk;48ZOf|-oS^X zet1MsBg56xTr~S^Zo+c1{a}&$A0tRfaDv`zi012l1>xRCcSk6WQu!1~td>7Qk!FTU zIV)dK>ne(s4BQIMk`jjU@2L0?Ma|M0YC7Mu=&NI?Je|q>O}_YJ&W`*c$owC!n35Xf z6XS4f6nJ0o-`8Q~hq+)f3wcK{SEqKVW z&he1TrgHsqnMM{nZ3G*BT99sQ!&iA9wXt;iga|n;>Y!gO=cN6lF@U6kEW%B5ODLC_*aqA5^Ri51mmcI-_inajrZ zq}gbKTD3xb;x{CZ{RjLMG_O4MnK#4(=XiFLv{0#dW&0eDeSCZ_-`T9u@CmfW@Atx| z(}eti%;{zW^96ME6b4Q>jY&eglp<}#R@XAK-L=i^bRC%OxR$tG7xp;37EdK!*E6&m zPbYrYH}q6IlhnI)N`!sb;NB7C)8|Qdmiv6>3F*%9I&Z){&u94@%nN*x&+~;Rw7bZy zyQF#MIcP(gw44k2DvNV1dQmdWq+WxysV_%bsMR~qX|<>Rz1Ycx(qBg+=J4HC(H=~+ zzhBGspmqH@zA;3BlZFRt(7%GN-hn}rL#nMqo6{rs9T4qo)zo}J4qa{`Ul35r-e2<> zv^%+EBIyTG21-TgMm%aM&@L8CieVgtA`z)(gG{m{N`%g`Shd5=EK{P_&+?Q9a@010 zp3lS8Wi3!)6g8(xuOFp`E~hrdUK|ZZrIo32DwjdZvqZYM+y3^)4@#GdFyjIq=}ja) zBXSYG|MkhTPKL|FXxP$$+z`6;;ZF3C*u54m$5DTIIMSP0x}3`xxNFOUC>Fy^>Gp6` z&b_4K97t0h4D*gled z3VM^=UpTN}m!)g4>tbQuBb4kc>e`lDSih2r;}pzo?f+t|w5o*+v|!n;kZgcHR&C#W zxtk9$CKQV!rCBy$SGJefZj%c&ZxC z;QmEC+B2VeS$|7_%IDFf=uqpS@71Yid6rK-I%_$9%Zsr5f*;T)=m!(dOF$fZVUAO7 zJs}fc+ypP&h5W^}f>d1730fe)Sf$-&TnwcM!QQ;nVOQH9SC(FVr4N4C6fEF8(ovS8 z3tr2xED5&3L3%S%Y>=lR9ySVOnC(J~Hd_U2i-0e&TnW~}O`Y|Bn`wQCJ=l!GO~^c* z%T&F-Z`s(;|1*@T#C^f~m<8As^grK%;St#O{`61Q0X?t^T3CZB#sNw1l4o?yIR2Sk zTJ85sx?R%Um&0LtWkaN5ZzykcP$YWRdU%2CUpjfeYOlmu7{uyE`*`y!m6Df0f_xhX zj3~*DDZ^q2N(8|bBre0ybmSXIpThxBN4|-xR9-;Z96CN(&YaS!1>Y4O@atzGR^_`u zh87HyhTpK8Nc{~6O&$}p5~n$lJ|G7<03b%R0HnBnU>ATQ+TpO{9IPEdUDCC}dQ1UZ z>_hhm@P(4X-kLgav{yKK8Zf1;{lWpXsa9sT>aezQe9FNSDaZf`hDM6pxVketzRfvx zo6l<%cYtRaN2I6?utK@PcayBSl_D6kz<>=zGT=LA!uooZ_v`Br!%!w5+yzVWSVzM^ z>Sd@8Ns9+MV7FIq-@je%XXh0>+#uT)tr@>ho(*$kSuEt5S--{td?#? zm$Oo&9N=~n&_zhVZS;YO_tK714gVgr9D}j`Go|0_4RQcI(d$XHm7Ia0bTJe|B^$_CQC3;R`uJww({<6_kl3-E L?fKr>*~NbVeIB(x literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/__pycache__/poolmanager.cpython-310.pyc b/_vendor/urllib3/__pycache__/poolmanager.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..b0f5ccc0391290a70c832c93f016f555d556712d GIT binary patch literal 15176 zcmbtbU2q%Mb;d3hzycsailQjVlC8C4N1`H8v7KfdMpom<@=t8jiYVJPnhvznwE{lVKYqLYwKocdf91{ir-YlY;6M7JQ7Cu?&j<@0 zqiGl{o1xh><-6D{%D2_DyrO4?rB1n7MxCNp3M(DEX?Lp4YNyt$$+L1;?@TqPI@8VR zPNUiA%rs{@v&~s~R|yYw=9+U-w!_1n`R2TotKpH(LUTdNweV=?So4^a>*4XvBh5#o zJQbekoNS&n3Y!IQ`j3p}qrSEOn1AY?(R92<^Koyc`Gjxof5w~jpSWi>pY#qjpOX7I z|0&#m);sLYzgK9U_KW*x{L}uE_smhrJM#NxbJ4f`s+7*YT<{jWqwf{GqyEC(V)Jvj zKjt0B{c-U-5cHBPB&RN@GKhi*|F~> zvu|B{{Xk7jyBGzx@l_e9aJv_DQEXiEZw~w@e#4KqdR~Mlr`q}KTM91&-il%GJca;p09C{iNFV zL5Q&;28|NC?Y8(LO6pM*wr=?<0%ekV`ncr999Y zZNKGu9>^5wS@5~6XO<=Y=kuE8-Dtt1TUoTMAz%0m>y9s89*h$puaOZ!*3fZpN5P)2 z7qsQO9%!f6(2{M?6W8Td_WlqDOP`^)jbJldU;Bn1w|adtW|TIKu>2^0c9=~;cy41x z?_^=@;YQE}OY~LHjT5Onu{lYFob#H$yJ)JDIA6)J0hnr|r*>TBp)HHTfnWw-7TKb`@`HcS^$&Mm5y0dKP*|>ziL67Q9M;S$@y> zt^rYGyZ?@5)*O5;E8mTM$94LkmIL}a;8dr#fhRntIK)oM2aX3;#eTVJcc~_AUud^+ zEI>;q?m5?9y6imrrRTnQ&ROrpTTZ;?JNjHWZr5|Tg^sIyr|m}m`Jfy5-6)8ITmF*t zbbZTLJ~qTZhlWAqYz(?GmecL2jvIpUBHit})Z&z)SPf8zgJUSpUV7pR&=Cf8L_lV% zSaM$7aCUnGXD5g-yPnhDa=}1)xOIQay%pflopZp;atU>}>hn2iJj?OQ;JHL|eT< z=sD}$8wwjQ9`r*!FZQ<+q(oj@(_~&-6GE@8k<_?BPm$w-=uRi-2Ax4iQ+hex?fcHy z3@1BJmym9LE8YCjLS7i-gY#iMT&$6UrkXM5;&ic!t6g@SR20bANja6*7AXZ4Q^~|t zV?um2S_fp(O48u{nBcOw(f13BwZv-o`nyRf?Cn5JRiTphz~FwIl!DmrL`iXzW!b^R z3InJJHpTOPub)&P*ZmM`vaA(>ut_pAL7b$L(laTdDb!Rxl_)7m2kJ5;lwAIE`9j?3 zU+4$@^RcTi_W3W|41USK^=$h>7_49D??NqiFF?WK?%4}GI~}cIm#~PVEzjR@2VpEq zCO?4cO$xy$aIuff8ncF7oHynT^IJ8`Hl~bOYu>08ZNtWshN<2{wfkmbQNt%CUZXZ1 z9rzS+_Z9p{-@(N%G!3r+9BBYUn!t}{v*bA*MB;l!v+R|<3UE}#v%M<5ZSQff=GF10 z>P>mmcvAD8@MgSOJgIw!yg59XLLDMGqdASz5pMydhIiCEhIcdGaqkg)&w3}kllVU5 zea3stJB1o^g4CW=hcPAhNz70<=7kXZ3ZX=?qSk|0K?G*}9N{1Xa5#9_jd1z}zu|cK zeGyH{ZQp=2m2SYJ(B^DA!LYh(2&aQmq&w)exHn@`WM$A<_Z7wS16@$0xxjEZ8Wf~B zN>N*DIysD???$mqgVIB#KvN$g4svkl^hAtK{VQ7IQ+Ng4b~x}Lz$k$r7jsISa|T_A z$jE{G$0XA}MCxxs(s%RG{oDO8Xa@kg2S@$J*|Vc%$FR~?tq-XLid;Xcld;+YlP%%4W>A^m8`sFLvPoHy6^LQ*@xUkvl zZH7Lk*ST=|7irvagYeULuda?dmh07ZqC85f6!XLu&8rQ-W0o>%}pg;psp6X>8+_6mS1)=Hb!QTAaO z&;@VMv5m{HKt#4$xNoe`hG>Vq$Vb8GkEEfxj(UlGF?2iYo_pyp*_3_Qg}u*m&(qCY zYPFy!<5p|wB9OQnMwd{~P0-;K&Ql+Kw+KxZZ8al(W=)d05m#l5t4M&PBs5DF_@yxc z44>RUO9af1LkaaFS}j_M75U*tQq37kUBYv<#>?gW!iA|8E`N^yh`TUll#Mx~Y&DF% z`G>9T0b-J%>@ebNhajYCq99}3H5_FO*X5WMT}IG<8ltpiSb zPOmEf8|W1_=Q&5?n{&j2`5Li59yrY^b`kEXs1}WBYpyQmPvBA9S@*epenUUN87xs(NPn) z7db%k9;pDsWqsFKW^c=DqguI#KoIg+H=VxQg+6ig@DWS|Sr9BrUpmB`firtB`BmU~ zfa^p6?LidxI>DYeRW!^by;c^B>LS=jJ&#LbaU;|_C@z*1xk{hh7g>6p6{c2KUvIs3 z<=uDQy!PTM#EBfVyuIqMA^}%or-CC=U+1lPV`q}}t1a-22%W!2jc5*+TFo|UhFxwL zwrLv;W6qp7pIM6s#6f;O8|a2dfi`Y-Lic`{6Yol=AJbG+4yXYQ3`D|-LLI}{gBwK~ z1b#;V0yQ(`a;i~DE-`U-0-%R(4>roi1{(z3^BZBXxg};qis&QQlh{}6|1J+DxP$p`-Gf8mo=Il{ zp1@2W8u%{byRZ)v{vL&5#r@v6q7PR5fXb`q`u0HY3o3Lz_~HZQ^%1W(Da$(__&4~J(-vj*ErKgoRd zitZfkI71jfs}@Xff=5)0hW~;8h~rFE$PQ$NhPn5dt7CY1a{QFC2MhsnGg)24O-VG+^Yv63SR4ViFdREEpmcRXAo0RBpp)|nbuaw7&^25N3ce@4n?nhKK3myt{`O0HQ>xfZ-!ra#niqmkU2bX^t(?>%n^tu$TA5HIvj3 zlUn@(PykqC)EQ7D=P}}C;Bi6G0;&h#28cysV|9y{ zgK9IgH;dRv#kz?xm=KD|;fHMcDRMH!n_ag6v&$dtox1u70usGHpe(CsEev}N1rdn= z+`xo}I*nixtWMaJC%$3cDN107_UIFPVo^R1QFpU$72@LVJ(`nTC|=Ln=|z zJvz?fZxA>WB6@MunC6Gw$lii%{1ycWIb*wcw>Sm$2>|ss`2l&g z3j!dN1p;qm$LhBBVlx&mk5cQ206#)xO)Ojo0snMQ^1jmJxdf|M!gEkt619VD5FMtm zv5s)jyc3%M93T-n=kl8?D_1UG&wJAe0Ari-65L-Uoci0lY8DGkrld^hf&jAU7ld>@ zzNty3fXC?n1pSl8(^wAYD#-?@)5;SsAZR+5xjXck)ymirfLp9n7U*(qZYb3O|H+ffAB?9z}19>ZlYS7J7JREo?06t(w z(USu=2jYkB^ijgIE^W$QA&ze-+e~?CZEx`P<32#X5bEM=rhR-PttWLv`e`{ zS0mrFAh6P`8u9}*#9YZTrc4NQ)5M9jKC(aB`}_gE_&;=Z{eb6_IGSog+~L26aez!< z`2f+a3%J#HZ zhGX+xuW|?OjQxgZ1FKi#nPD}ay=z9>@$B}YVRcyas_&b3s>AB`ocdr`-akA<)rK`FvqN|4!}|VFxcE^Yxe?#hHTI7U>t0P9s(1G4cz2wu7*^nB ztpnj#-zjttL)ksD`va})P~(KUkJ+ER2UPzXg<+)(e7{^RfdO%=KyDQk7oY_|qcBfY}^(cZ{7%yFVFd1tJuX=sIJMuEfsnV`O zpqpM4ohJ|nut|MmVQ({Ni&7MciF63!zY+8~KTttF52AJYDWURMMVu;m$^lR1bvzX} zP4;dSARC#YY0??o!-F>SGhlH*B)feaPh`bWA`#38hd(t8e2XiEG@wq@F4^$b}#|g0MMK)%1R~7!l$g zDEdW_K>)!xh{PC5Y5`ncI%cR2@vSWxY0OJ{M1zqmAF9>s<~=4;LDb5rpuWc0h=j9| zF`$Tqw9)@Md#obnimo7!74c$nNVx%^$ar@(56`+(lHH^T?ncGU+g9(r)S-(@`#EGg@N?u2Yrzk_!!MJHWcc6G{FFzIx*%?7+j z3%H{wwU8V@$Wt?Gz{#}|#p)c=1sZ@w=C@4LW8jJa3I9K{%XBu_=De|YcwF$NrwknR zF2-7sNY(w~in!TU?i<$^4>JzLWSLegskK^wq=S&Euu^q zLsOf)guLA3Ws4W#9Qs2PEm!qTUI^`kbChrx2{1+!f_aHJN)iESt&=7YB(qMC0(Q+V z)=Kt?TGc*Uo2ebMXYF}=x^YPAw^9GV$4c)a+6UuV5>>NWlt0Ux`F3H$@ZdXsuZqlx zS-E4TL=`y{htf=mvNtEsr@aQASH2A}*|Z_@4y$=|>|TQ5Ea(5LOof87-lhXg(t9## zFt!u$C(tRcrPg=~K&JVnE6OUQk|2lGqY-y|7YPFN4vP>=QD7Q-5z9{l3E<5v4wa@N zX&8phAEg3N;1QUn5>aZTwxqTKWdaA1GuFm ziw?VR5M-t#%IBavl2kXn^?Hx_7>F>nCDU!fG9H?qIhxv;7j zS@FSj1;?v|C_oD)d1kbh>SRV4d}40e0ntG|EATP4Y|9N{4{Jr+4g+p`>e}E_aa3?u zT`oNDN`qO4_?F{j`=^EOl5_U#l`csptPi}q5xSdTd?XB^I@EBgcJl7%9Lh9Z&W?O2 zyMY;HftXuRJq%^!ftV3_ch8>9`vd(EMa5u}YRzddKPk$_6&UhKdLF)aD;D50c7APxZ#cq+diFd-XDmcT7|2cc^w~lLfUW? zi&7{BiXr)eu28slq-~aylXt`v8_jFaI~h#7%43=(=444WlG#Bhw*2hV&ph`)qRrDt z(~*9b(mnYUNjlH`ytd5qSr58PJ+(PGFq3TbxPADKqEU*?(+8HQp8dozB4iPL!XWAk zKeu%ZK?V5nad|)wo#L~4Pqa>csZEc6_Nk#j1x7P1`VlVl$i~K9Q_Xk=92MfMz_+zg zTqxWzkN`wG0k#ONA7(H=io9o(B}Qa#ThaNrg1l$GEh2DQMG01iXT2|NkTO&oTK#8{ zXi;d@5gjPBrs8Qv3GSLGGmWD*tY~X#yN;5CTDKc0RbVB|#IwV~T@w~fmab7@x&~t3 zbfwrUd$p%XUtFFF)Z18#Qn&z|65S?cZCI*b=FN0!W#YKPW3f1=ewWotyiA1nX>KY~ zX%zMYgi(G!bdk?b+c%jOqGu2?IizpLM7R1f+Y`nlC0Nl&R-i_gw4lYBhJRJv2q#1N zd?x_-FIf5kFJelsvBVK&LHF@9jF!$<0#F)Z8Um$%B-%TJLah!QCx7MtwoAlzWuQJF zIhN?l$9K(mjL8RMXED#SdN8O?648TS#DDZ6F0d^PSfI19IJmGo;27=?EIX4P{ITbV z3Bh*e6+4eBl5}*PMIb~vEwEMM2CgV(fN3HLypu&wIE2#>+QFyNUi~#&k0`<}enN`S zGLWUJiJAn zPr#rVLTK83z`&NZ_uIL^SoLG1#-w?hsY?#&F=Pek-eo6^Q!}+4$c%am`TTyLR-xy- z0uh<_ly!|}9 z@nE}y?iz|P3;!avc+@j@jd)ohOb|wbqvmcgItjN(38Dx!m6GOx75Bc9xfrOp&#W$9&RK+LJ98^A{DZR#M|U1qPL25`eUxcs zEY`KvJB#v|Wg`OT6+V+g|932n_@A~*7RdWUzIup(s2fgjJsZ~H?i2^AZO$1DYnCT{ z{s5sdX&TnpSTWdER$fwn%u$-Wd=Hn!s`@_5f5OY3^73cAP|9f2OXkbLAXK$DYWrcB zi6kBreICgWa-_dc4p_jQ4TH-(OAj9Z8b573RjVz`NS!w7)Pi5cZ~cTNHSlWwLu(&OOz$r zNuNHT%Vt-+AWd6pQ02&3htUl|16#Zbzsl=aAM})L{U2~zT~4bmKRD1a>7+LL&5QaH z-_9RUs_9QAwC;P0?<<%qW1l)rVx7G*i(kum?!cJ%5WW!^Vqerwf=gtHh=*mWAnprz sfai^q2D2ZsKih;0!?YSxrz}JZV8nkBYVLn(rP*TPn}u)Ao|uaM7Zw7=6aWAK literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/__pycache__/request.cpython-310.pyc b/_vendor/urllib3/__pycache__/request.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..18b569fb57a33ecc36409385892b119a77c98f5b GIT binary patch literal 5583 zcmb_gTW=f372aJgFQVm3Z6{8Gw3(z26jO>qkzN47abq}2Y&4<;OKAb206F9grLp%y z&+dw%O1;#5ZGJ%?9JDBqU(lESkYeA8KIJDQ4|TsYdm$yuy`Wv0SIoKVxqfxOiu3A$ zybq9E@ik;vZ9Bcnhf(MyvFs~<66*MCJG=j;3`U`leLwMH zHQ_q$k3;PX9&^03l4vh`o?dw*pC&Sjw`F`7ifBY)myZfAKEf~B#~`hJTUh&!u=gv6 zQ2P(|zALT@7wXyj)s+hVYAY3SP1HpLcWUB0VnsA@R>#>Tv5K?C(yYtk3hu0k3O00I z*RTNpGuCS|9QVTDNCpa8O6IF$6)@<}MjnqM8L{bM$gp2e`Z9go91OR$y37*y7%|?cCbnyN3jZnoiOwUj0eI@KR=hAZu5X2NImE_ z&6FJ-9w`A`hVqafDJVw@`uvFs4%jI4{V-thY=Q~ln9*8HXO_;Di^|1>92r5=Lp3@y z@6ap7?6H!bV8&Y{ISyG8$y|rs30@tm5%;`VCsQl8L^prEpN9b~Ghiw*Iz}=OBr2a` ztQkpW7J^n2#7!nToM^>kx$quo#u2cP0WY#Jz%Sbp zABIPg#nZ414|p2uX2O;>om=`rpkl>6bs{xGdUHg))X`=h1m+Gqlw6pblu&fs&u&l< zsbJ(KLPGZ#E`|O@G;~-JcrrrRVo_blps-*E3MpweN5bUs#8V>`d$X>&cZcvTtspki zS{4 zdSktciCjo6=TOw?pO=K4U!>pyy`ek_kZ7;PZGHzqScK(K)@plsjBx7VG_ z(ni0pV7-2Sjg}@IuGlBH9-YC#ZZT(XRL6wkXyAli_&I(NUBrO#XZCOGw$nS=zL%qu zJdX1eJ1Z2C8pTVv1p_P1!fC(;C3F?o)y3{_^uqW-fpSu8X&vfzLtn*Z;G7$$+>dX_p*rpAWZaFqnsA&9{92edW9VyEfY?u(Px&+eg{ zPa9P+r8sChT^qCXa5A@_TVGnI_S~6Qg?$^>bL+8vWa+o?zk@4h?93~3S2(}Nj6d36 z*t_ujKN6f&QySP$3V4#k?c9g)V@h|Q2MPDe z_2n3-5O>*wn2mUVa$=Sv-1S4e7pXYmRH32{%AWEhi(=u9? zCMdE9MMC6ml$VMUUZ#gKU?_e_bwor~DuL~#TDd)QBQMvHPGReF&kV|UN&&!G3B1Tm z5Kh4{V2LB?6>sN(gnCN4(~({(B;pxTzLq)01a{j^tI1>{b$Vk-mwx7=D7{|1xu|#P zjdS-%zjn=}kG_r|)i-E(iw1&~w3%zvzaTksQJa_-y@#Q3se$}(ZP#{QV0_`&wHL0t zeDzY|HDdg!( zT%p5cJX$!tXN>=?{j;{4xuKR!KvShAK+$htXxCrqGyM*prwstE<}bTVe-}?5;b-bg zqgu1!G~0Eq**Be&cORVv{9O5^;5vi+mmsF})EBro?$Y@9m)O^k0^&)vCeJm0`s z-JDsEs~J$j-;Lbg4gMFPaOtN1x63Ja{&Sz7=U2JQOYMG1*fSWMFI6Az=|lo<*MuB% z^eycUfyaVzY>ty)v>@>3UoSfx!`le63H`EJ<|=z?g0jUyqlWfm(J<)>V@g+;)Z43uviuV27ZTU1UKYiCrBmfS9S zxCN0kOrj_i2FfQW7E}<%C=nY-cnao1Dq_kSO{Md0d>pqrtd%?8^o#kUR{H`O@Pt>&z&cAZh`+71$_Z_B zfn2P$FOov7saO(oV#Ewp097(ELvHT13MntEQfw>xzomTi#~Y6)^58#PjY2kVfrOggo$+#AgZ8 ztaUF-_Vqn@qLueqrj;zULw=(v)Kjfuzyj7Daq1e8vO>bs0-=)8D>1{4p`Aw7hdwK4 zex5?5yzB!5qP)OH>=Lj+8cVz+W<@ia*Fpk(G}~u|meR8PEI8|;8)T8BmKbd%i3N); z(5q}eV2{!x=ZS#6iQ0PdNkJtJ!k8I2$Ua>R0aVB_`Xmyy492xcZ^SH7=P>YQInl*d z0!ckoqcFzFyZ;t|Pga+G0;*_e;R-p(^j?|>K*mdm17_sp(yPhIYc%O~8i=Oo@6$lr zOIPz;?^70@YsB>TFk^^cMD1x~ok)x8G;9ZdE;uGed-X-F3dZ@5Ms?M`0!jlq^WMLv zGh`)A9H#B|dV4*ztG#xUI$=tcem`yY`+g`AkIq;7{ikS9@+b9vUxcH6U%!pF^)(uZ zlxao-5iFzd(k7@k*VIy)FM2CDi5P~4<=Tz6n~qbboj7*$o95N#8_vz_>dH60_6lh+ zPU1vE3+>>Yv_YsumCcxb|D6dRJpsr>-AEmGeI!RjwHFP3R)~#nQfQ118rVoJ96rX^ fJ)_4(3Z{+Q*{1K%N7IPD-mY4!&Z=E=ZdU#Yt(;Wh literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/__pycache__/response.cpython-310.pyc b/_vendor/urllib3/__pycache__/response.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..e8dbd77f3631780d8d670f5f1310b9b9ff3289e0 GIT binary patch literal 22157 zcmeHveQX?Odf(3M?Cx;6Tv61w8k}TcXlta>Xyvb#`+!>Nf z?g#bGtSBy4j&1pHm&^ICEm9OIt}S&r6m@{6NdM>u(hn3U(iBaaHfWKZyiNG7QGex>+*iH(g50uT`?-H&e>sH(k#*a;2Q)wd!_bq?DI< z2Jz8S!AN!Xce0XytWjxSKO9vZ=N{1SUONSdrN=F)xlpbk3 zT6(ncSn09G>i}bycK85>z z?ta|wm;2N10r%hssnQvwA94>P{jg`QK8qI4y5?MJ^2h_O(WDXXsx11gdOPsSwZ?i& z1v5x1R$I-$yAw1j&C0T;kdpC~YB7=vY7MW|4jy1JS=?#|wK|JjpPzsIx>s>Mb){Af zCe5&Lx#D|sbFW@y$#9I%uimM8>p`v6oXm#@FSp#ynO1N;2-fSh#pzaKy%N+G>s~l| z#jCblPnR2!a#BU{Mze}sbuaK{(NH*Xqj|ehuesAJ?dIC6UUNBE3CE%|-IH+ab=3-5 z)mB|sHqLVMdH_0QV%GE5TTS0XPoy5t4ehwo7*^V^-QiejetBuVT&=f!WY~i{6_qOo zt?~+Lt#UdC|4iJxjO*hk5qPPR;ij@ zJpro9IgbArXPwiy{KE)bqnj$@2q82Ab1Qv6g%}PGYD&+{e~cWd$xN6pFV&PElmoRH zX3B0QsDxGr^Bs=4nB~Sg#^JXXS3|3e@FT3J@70$+N~xnL{>k~%L1X>&dTsqwP*KZX zaO$~RwdcLt=c=bs!|CR7a5T&Hx`d zqf_Xn&;n|{Z@dMf#?sl;+bFH$8>x-dq&ahK(pE>%J(-a(-(Owz2vZ+rU@>?MK{)c- zrJpLlb@|5p++;eMJlPwCemTz_no4yFC7;FRb4y!>Wn|5QQ8Z1Xz_|Pu5sn*7*=w4g zbPf$oa=-SOkFwk)T(NQ)yR_VBx$QdRg>v~;yHeLr6q{0?W5Cu2dc+N?xWeiXf)luW zavD2j8+N9UmeeW|5`R2IFXQqLBIqAV97q#~F^z+0;rL|2@mD&v^(#V#)EqXNr&v;P zBR}B&nVHP0vrIY1;5h_g;o6Pax%u*IS6{n)bv7KkIe-1?Y;-pl7Utf%^y;fO-zs0Z zG=FKwK|GH-uH%XZVVRa;8;Ysh2Eh)zj7xD4pcOg4kAJ7UJ9oYr#CQH z(`%+bigUdyu)5|woaB*IC*S4M%vP3X`#kbOfH;Elnp?FupVuM;OW#eiJkM#Dv5_@X zJ*R8YXY_rXPS&%UzY7B9zZ|!~yet*uwnkkOwHBf!$=n(z{Z^kxCnv|kk;Toxt0-03 zR2Pw=SK&p(!VI7IdTr!v^pE%pd_LN4w!y80=F6d%wVbr%xU195l2%?27Qq8<*II2q zTGgQiWz}!t^0_8F+%}H4Y3v0x&l_<;80H^#_75(}z?oO19s{c> zP06;ofCo3(O79F?IKxb>;!6CPxO*9wPrBAW!^4af`#BqqT?YTJ*P@fW?Qo<~gX{>N zWgZUUp=N;fTm`SbXQ~OtRxPZQa8|kFfzf={oDr&ohO&#&P^rMCBCe{LQ&{Gri@_}y#|lE zPmV#+FFg}xmg;SPMKL4j{}ue`eRPd6hr!S;;DZh>;pGJ*4}#y>lkAsNIWw6VB8-}X zOU3;0@j7nQ^#US2RA*YyD#g+IoarZJV{{({mvXgYXX_2KMO^GZ8aUQ=AhDK0k5fzz!umwjiY za@%tjJ+J9h)*-HXt`oGJilaOVP+k+{5K`?)Cs^@%bs-tTFp?@kztGBHrLVm)H}5Qa zO;3TtptfmB-Ob?C)u`ECRTMB$)l$u?qhVH9ula$`<{S~#n*n}xPisv{ZYh?)&BjWt zy3(r&B{rQ64`YkQF(r=@5)WsZ^m3ZB%`Kv()~>Myh3vj@C3R2a5@8wEOyW?nXa?6D zi;_JpgZO>Lz6+j%;y7OSj6ZMQ!X}jcMZucFS(zjP-3>E-pla(#HmA;nMq_9bhWU#e zHqX~f-(Ul5?O>`iIk>{T<1uxy-l|sW{!56&r9LrEqVkN76%4|WxLJQPk{>gWK|oQD zqFNmsV~mIL=W$7MhmFp@9h*x`15YD6Co@wJTW9I<;rEZRV|kXXoGOD{>)2ErvDW*^Ddhr z%3wq6v~4>L-oW%vpY#iON^$#kO4%fZWa?dzKd|RrfpHHTGyv`ZJ^CYZ-E2Xf7&{H8v<5NpV?)NQsb1C72s$c;8${uD^)O=LR5av`w&2Tv=1` zSru2}kE{1GF8|MAa|~0sWeBJq#8Y&6j|WP(44I^4Ed#Llu2IU4IF{H4E``pJ}2f6mUPq;_%d%!#B9&?}k01Hw&O-lOhG_mt#&%$;&iBj4lhP4|rZES@^}>0b#0@fT>lj5mPR<7jasncT&UJ7zJFn11pvrY6+ERGObxcM;4HQSq2;k= z?JO)T0yJ4zaB99(UT=XfxK5?%I+}#KU|*+P54epB!Vhjm4zaL6)efZ~daQdY*hF!s zQl%8)xl@iazYH2zlD(``^&0c7nR?E_}_FfD6pYLRZ*MAedhv>z=efcYe71u zmARABvudU3pet4KPbW|wcpbWo9)NpR+zJpM2hf984alu}9PLivw3cvN38ca$1x0bA zrPiWpy?Q556=%J|WN2r;vjm>K=z&c`l2uN#6=1Z&nOWfFyGjuu>VDLaUbN3>N9u&|=rz`{ z6i4Nwd^wK!rvQ;`yrpW(wPvN>gR=VLd`oW~Y?Hwa z>1-$n4U{VUp48$xOBAHA#6Nb9d;Qa^ebT7~m^$?Jw%6q5=lE*PYQ61Zn_#cS{gb72 zy~Xyjv))$gK;Zl-=LX95D@1m+QS&`Vt31hZLdQ`x&+m_J9+gLl@p09n6wYJN8^=2l zt~Et~bBg&lr)C*0^mip^djngUdRDyJ?7H%9wLL#b_QPvpk5;{SwaaxuEc@NMs-H`j zI34=AQ(f_@YuH9p4gphkysesOZgJD`Jq5n)G}`EPqY?~=dB8>6n8Br!ugQ`t2IL+W3gXa*0DUoaD zuT>|IG5*_&NKYzx1lholO)z0ojZnufo6SsMQ152EOI`i$#=CVHrrRGD_{oZ@>K6MtDnYvCL|w9hZG(}b)?k&9;NOa0f(*B{nVSVh1@dPfEM@+bpv@I ze0~W(VH#9oNOTEDE>bJGv#wr3Q4Qso@9s}^P7IQRoh0qJn3kS$RU-4AI}cpBn51=+ zPMELxH4w%MID?|T3q@I|lpkgZFSY$JN2wG9xm)XFvUkbuBw4N|iZ$T4NGg6zz%k`NL z$Mr87Z9tYlE9z&EX>xCb)N%ld;-hjIcnp>pEF%ba4Y4mhTf4W9)RNxj2RggXN>&)u zSW__`GR&;S-)9?nO2EngM9N-~kh3~p zItxH)uW2KHA)QZ881}=?z8yDV;y_^2_R$c+L^yA}44g|)1f1fuD~P?uLn<~3^tj2~ zN~;YudxK=$ttkp7kvIjdIcR-RiwY$D7c?>UFF242f)x_yr~p+@ECOs0ar<8tI(2qsNguE)6;%xGqdz@W2+`LJ_fu+vlhyxSIoJaQVB zPjrEsMK+J#IELCq!a%6&Lo5xq4PkgF_hZ!xWUyFl129rYY1LpLqj4A$yh4IwygiNJ znYgQ2P%&D{tcRW5$*y9hwsjJvq>~@>q_C6m{xxLl?leK_9b}~t=2H^LnnN?vU&d{X zF~7_Rr<6De!J@c9Q|(8p9;w4va*&~o%_s)(^KsKS8%gRM=h)V8JWBNosCd%o{P*5o zzquG-v1R)-+l@uYw-956A4B}F*QxGM=;ij>0CjetsV-I2l=E6;({XD{kd#Cv>D9-K zl}4)#i5eAQE(oz=yY|KC3uJE>78YWGKRz@GZ5$dv#a+e)9{lC(T_GJ~lZRx=eRuEv2rw=3TRs3ut&Kphl}#;?1bU z$X!c&<#a7Ke>>%`x}#mo0?%GEz%~kNNNE}dgmrfe*j(Km;aG4Yi=Eec3p?i#F{lN# zNpk77!pNaSC-c;vQg1iliv^$~kq9lk-z4OA*n7L|1(Of9E zu-?Gu2dcfOxSRr6X5TsSls_5a=nsAiJ*k~RR~}Gec|eIXw60&hbY*gEKvoesJY8=s zhdE$!6s+Ok1D#$(@HDo7qWwEeuea92{F~IFHGBFNQbiO32YZ6?pJTSH-ZNoN|N4?+ zc#7^I=VeY25$S?O4A`0n#^^+FnCZ;wbzAW$6A;}gJ=!-rbj{w zaRO%qIAZ@`elpH207{)ydo?Vd7;(Iz_i)7IP_m)NV&xYj#B%3n9)6E}(w?FJ8S%qGmNa5UR z=fhQ}$_hn*-e7Ev!Czr;odGwb`b!96@0@r#sBMX%Prc799Ix&rI~a~7TE5M$(tbCQ z&BJ0_#CFQl2=OC3Q#7nUveH(zb9jdn8+E+OeH8yu7@>?XjmvK$=$hIKszV~5Qb1(L zcIYc{7hX!uM=dfUbMvH;x@*Br69~*I*$>1k?86N9VJ64|TgmKCb*+2m`-W@XwcfEd z3^0*2cP1p|-2D{%E>I^3f2K3j+fP@-S}6NTWZiYZ=%5r38c2}WTiiBa3Z%KTa_fxR z!r0$n>N^;OKq;N8pF;A7ci;u*DgUH^@=IVOXt58-)`F=SEUK&`Em`5dXg8Iw&d%PP zElM~)NY``to7FH8i(j<1tLBePNZqKnpi3T=djjtRzVObvqibIts;O!Sbeisn^rl9 zx(+NTcRG$sZwdzqqEk@xF#_-9D|o2C#5zIXsHJvCp8SXE8I)JZ{SIK6GHo46USq>YiY-z z+lD#;vI_G0zLCsNnd%*LgXOY8ZpqwyB`TYPjD`|8NPsPIkfMAWFb(o3!s+NMXm>=t z!Eh^oA3Z~CR55k5cR!-mZi&(MPQnoKN8Va>7}2Y-UzI}{o!AGIdccv9a@?zArMA2h^`f#~8_Kqhhn-(|?4fP&%_Dv7esak7Z6QoAXPZq;5tt3Y-%ZjMF zMlq-`Lw11!EM+*YI)9z9-3&;e!;C0rT50?yQ@@5F<|p|o=Av2V@H9agq9w($SOLm_ zv7r2_U*$2mjPmBY)`$s*FS>md(?zpj+Gf$T-<^=q{82V*Sy?M@WHWhVobt>=>ks?) za2t9!e83XzBvhLm+UrrB@8bp=E9Gatl)@&ba$~45P#ts4^7rA1Asbrm)mP|~=QFfG zax$w~82(d8&28D>JdknjLc)P9J>^f~H?x*jZ_B-*E(Rm06CCL-B%*HS1@NDy*|l&- zT9@x;z~8dntpDW^@Tn~v7NAb)tw;Fwe;##w{!Sb-Y@d&w?Q#e00MG;@Z5!MzX-77e| z@hQkT6dzdjVC?Pn29$lF(g+slU$sC#^C>Mk_i=9En@zWdO~^)hGWe zG(*OwROsT+wmfH`lYN_-<2(cP>ILWG7o6$Hc6|{EFHW6D533b$5P|{~F!kkLFIgdN z^8SU>r2y1oar+s z_9H5Y5z^QVsvyg{zIhX4!K|MmH9;z)etVs-VkFBC4&d1{F#3XPij7~-soTQpkjQb3 z`^(#}qxSIO!=IZpAMi*$Ambv&KOT7^jcJ%?6G@8a4lh^CmFKQbzcG7te)iJL-0L@I z=feWhUVr=M>sM#cNl>3nKP*Hh8VH_Ct*XYAKJLAjQJ;4*8IfgWm`G=u~I6w2+Tn)veWq=na21Z*`tr8hd`{j z{)9lxNut~^jmxL~Acl5E1Q38skq35rDE%~s@G3b)03X_A#K>wfCnKLMVc z@sHyUWaqxoq&Q4s!kW&wnY&i=F_gut1#T9^Y6b*ohBa?xg-hc(?s7;^t=eu5GQo`3c_s3WLAL;BPP>%~wL@i;M{jO`Jh}k3k(l zM4Z*%VM2w$HyHdff^ekw4%|+ZScv_82r~XfWVT`Jr4^UxRT00i-QwOdL6jd7@5<*b zyi8CWG2eaUzgmw@fD})_x`yY-GX#2b79XTQsjB2%@gI?ILKIb8{vv|+v|4%q)X9Jr zgWpvMiKNFLns9*4fPSXM7h)G-Dxt&HJ;OhZd=&OfSbjjCyOui9wU{r?p&seMT2@j} zyA=CDL7<79qliB1&CR8EwCQ}xxr74`|1j+&Mq?TPO*j_y);8V%+NjWXH|N;3j}zv0g0$&#|xdUfE7E{?AF@Jlc*N)j3ppy6MB~5ZFuFo`r^LU}hXuSX+}BDV@f&XZ!5@KO?B@AOF+>HZy>W-U;N}W&&OBj|4+sOGkLQhuZ^E7=Pll z0jnMDlQCr7t1YzZ^iLIh=_oR2dFmKq;$P!c8b8Z3Ouf>4w>ZvoYdy@T368)U<4-$# z5&#J%8YL2XTZ|Qc88yhk>>8`kx&UY34XJyke;`P&T531mSLS;mQ8V42ZE%hs~;1CY%dGmdm z%t3`i`yhb?tAz#X`s6N7rB_$Ar8M^yZ7X(j{7hpZG@L~W`2(A4wr8#Hi!XvpMCc_r z3lI3<-14+zdf_@>zc>VGE|F6mt~H6Jwo@d%hEx|1 zW@IZ&jw8@>`g<1%-zPP`E{Ivbhbrt5xa zC^`>m2Zi$5hVI5PiqOr?Ump_b)jz?LJKTiC8nYvG87cs3D9|v1f3Ot%OYDzLJNv(^ z{E&HMu$NVG$M}zNUemb5^ei569~rts4pWDYL>@{@0KxlKc3Bge0wQomJ%hM7T~;9d40mXx*VuQ^7d4B#o&AH`W~!Ir z&oFfL&rp8A&LN{e#`Z00bX#oVpR63`Isq?l8GAGK&fMkE*d?TFKv`ZdJD?2Vh30Z8oBb&+(whn~xv zLk5BO1+Q_UPZNo$5)S$41L2FTGLU>=;59%PFxXXrZt!&q=w`dA)dh4x0_F>+(MK4g z;i8wCM(Wc{U8QLZx$$nvyb?T)1BB6Fl>_6L)NeCjYKRwPu!?v=M%+xUFkOl`jL91H z7D@{IDo0CnFiTkrhl8)^(S8V7DoL-kOz`PLK7&d)WEtK_07@)SG!uNcf;#`v`X z3=wpgPcfvV=@$|(u?Q`BgR)^PPDSpR2oe%zDU>%`otu;_7(YcmAHN6?;EjYNDa5@N zuv`#LICHp(CZGsZ@!}ZhBwW@wWnu2dO>MfBx%(YXo5Nse?)c!>Id_zXVH}frBfg29 zlAJf)-)-~OJKpi0$GjQpfI#^T0d`z&rAp!k-Lnb}?ma8$nDCeGWx7sEG|K%{WLIYLM@W z>6bSCC0oUn!WK(9{lqyELIH^bC3YbYKY<9ObZj7+o$0B97;GM{!S}P+31ACw-P5UG zH7`an5Qm>cQOHJ=Y!U`iW09^iaJG@2OK=Q%bbkRbwSJfV%_9k*H4ex)oJx1-H*;>A zBKBSST|h*8NpWd$md#2I^Vbs#Y_t%AW5_8nJBg>B34RRyc3L zK1P87#{%9Yz}ujbLeXuhURNkgEUowL>;hj9@%0JJ@|9J3q{4FAhMtXdE%x|$1zi2=8!&|Jd1o7&@9_OFBK8d?wa50LizTnb#NLauWxL63Kq zZxai`ayBkmke@|FP8UyIj;9HCAl0N#;sFp@oZa*x+;>LkvETyT2UtZPOysvfzBlnI z1OKrlLAs&%fp76+Bk#i+J(-#Lm`CLE;;16BlzugTM75Eu59+@~Oz$)it!Mb)TMT}Q zfv~S#h(*Ro^^cf(v=_)e-CJ(2LurDap@5wl82>MvC<@~FG)X!?tiewz@U46Ehn*)9 zQ@2z3#0li->+R&fjT@IAK)@*jAH!RaBAGyAra<0J3vwA5cVP#_)Zo<&?05*{$OB^v zwPulJke}!yYC5QMSt#4jX{uL-at_xT=O65WkWB5xHrP78P@zaWASely&zJqmk|#=# ztj3_OL+^Es6X_|1J&ZFOW(0yBp8m1&3Y-V<{SnFZKRNFw(Gb6B0L2G$4p^d?|G0n{ zWY2v52aF-jurkFT>e#R^#bAXAv5@)^cW@P#e-@jIz=ie;##9-80k5VC*F`G!vA;L4 zzZdx_n5xnWcVO!y~u8h;Q1!qP4XPXN~F0I-NDL z#jSCqLp$?tHM8A}Yoq4dP2<)I`>ejkQ1^Jazr*){tN+3vT+J~}j#PeQknnB?nGpB8L{KQKpW7^8(>zUlPPg7>=l18dZVGZA8GF_%GjLg`PkBXFAeJ@drT?++>9 zgCatLdvnG>Ts8N81`*H!NS)x`6Iy0orDq|(x&oHsnup*uCKSxVnNN5AX-~YF722+i zC2!2W3Q-8wV!nz=xyQ#Vz}3hSfZY)T4}Dw&b`j=_UT4yU|aFp`wK^wC#>t>%BCiZZVg` z;Ak%pi6INE3MkYJ7ndw$Ki-Id?|)Kl(RmU}Ksle6u%Ew-$a`>^gs>zF!M7iPm7l*0 zFQu*t$H~vbI~-~rWpvllpN{}D$Q**3mzzG2B2KQE!&k9bD4C=55I?!~G@j)SrPK@h zcNzXsw?^37EkJo&Xn~496MDj4;kiAc06 zPG>kO-vZEEUEnzNo6Pzz82lCkpzGspdK6M`yOtZwNO2km#b8fF{&Km(5{`r z#Cc4Z5j6^IAo!c$>z=;AyQQ({HFu5CY8wI>R7kw>RSX%{%CoHS7nzvVil}`5M1PWu z_=o-`$}5arXYkt$xUf5|cxYeLUx|2$JVBhx3P3RALn&A`{u79aVh^o%;c5o6VF3(i d+&E(t3ga*;j;F_+@tpnGxH-Pt-nW13e*@a;YZ?Fm literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/_collections.py b/_vendor/urllib3/_collections.py new file mode 100644 index 0000000..da9857e --- /dev/null +++ b/_vendor/urllib3/_collections.py @@ -0,0 +1,337 @@ +from __future__ import absolute_import + +try: + from collections.abc import Mapping, MutableMapping +except ImportError: + from collections import Mapping, MutableMapping +try: + from threading import RLock +except ImportError: # Platform-specific: No threads available + + class RLock: + def __enter__(self): + pass + + def __exit__(self, exc_type, exc_value, traceback): + pass + + +from collections import OrderedDict + +from .exceptions import InvalidHeader +from .packages import six +from .packages.six import iterkeys, itervalues + +__all__ = ["RecentlyUsedContainer", "HTTPHeaderDict"] + + +_Null = object() + + +class RecentlyUsedContainer(MutableMapping): + """ + Provides a thread-safe dict-like container which maintains up to + ``maxsize`` keys while throwing away the least-recently-used keys beyond + ``maxsize``. + + :param maxsize: + Maximum number of recent elements to retain. + + :param dispose_func: + Every time an item is evicted from the container, + ``dispose_func(value)`` is called. Callback which will get called + """ + + ContainerCls = OrderedDict + + def __init__(self, maxsize=10, dispose_func=None): + self._maxsize = maxsize + self.dispose_func = dispose_func + + self._container = self.ContainerCls() + self.lock = RLock() + + def __getitem__(self, key): + # Re-insert the item, moving it to the end of the eviction line. + with self.lock: + item = self._container.pop(key) + self._container[key] = item + return item + + def __setitem__(self, key, value): + evicted_value = _Null + with self.lock: + # Possibly evict the existing value of 'key' + evicted_value = self._container.get(key, _Null) + self._container[key] = value + + # If we didn't evict an existing value, we might have to evict the + # least recently used item from the beginning of the container. + if len(self._container) > self._maxsize: + _key, evicted_value = self._container.popitem(last=False) + + if self.dispose_func and evicted_value is not _Null: + self.dispose_func(evicted_value) + + def __delitem__(self, key): + with self.lock: + value = self._container.pop(key) + + if self.dispose_func: + self.dispose_func(value) + + def __len__(self): + with self.lock: + return len(self._container) + + def __iter__(self): + raise NotImplementedError( + "Iteration over this class is unlikely to be threadsafe." + ) + + def clear(self): + with self.lock: + # Copy pointers to all values, then wipe the mapping + values = list(itervalues(self._container)) + self._container.clear() + + if self.dispose_func: + for value in values: + self.dispose_func(value) + + def keys(self): + with self.lock: + return list(iterkeys(self._container)) + + +class HTTPHeaderDict(MutableMapping): + """ + :param headers: + An iterable of field-value pairs. Must not contain multiple field names + when compared case-insensitively. + + :param kwargs: + Additional field-value pairs to pass in to ``dict.update``. + + A ``dict`` like container for storing HTTP Headers. + + Field names are stored and compared case-insensitively in compliance with + RFC 7230. Iteration provides the first case-sensitive key seen for each + case-insensitive pair. + + Using ``__setitem__`` syntax overwrites fields that compare equal + case-insensitively in order to maintain ``dict``'s api. For fields that + compare equal, instead create a new ``HTTPHeaderDict`` and use ``.add`` + in a loop. + + If multiple fields that are equal case-insensitively are passed to the + constructor or ``.update``, the behavior is undefined and some will be + lost. + + >>> headers = HTTPHeaderDict() + >>> headers.add('Set-Cookie', 'foo=bar') + >>> headers.add('set-cookie', 'baz=quxx') + >>> headers['content-length'] = '7' + >>> headers['SET-cookie'] + 'foo=bar, baz=quxx' + >>> headers['Content-Length'] + '7' + """ + + def __init__(self, headers=None, **kwargs): + super(HTTPHeaderDict, self).__init__() + self._container = OrderedDict() + if headers is not None: + if isinstance(headers, HTTPHeaderDict): + self._copy_from(headers) + else: + self.extend(headers) + if kwargs: + self.extend(kwargs) + + def __setitem__(self, key, val): + self._container[key.lower()] = [key, val] + return self._container[key.lower()] + + def __getitem__(self, key): + val = self._container[key.lower()] + return ", ".join(val[1:]) + + def __delitem__(self, key): + del self._container[key.lower()] + + def __contains__(self, key): + return key.lower() in self._container + + def __eq__(self, other): + if not isinstance(other, Mapping) and not hasattr(other, "keys"): + return False + if not isinstance(other, type(self)): + other = type(self)(other) + return dict((k.lower(), v) for k, v in self.itermerged()) == dict( + (k.lower(), v) for k, v in other.itermerged() + ) + + def __ne__(self, other): + return not self.__eq__(other) + + if six.PY2: # Python 2 + iterkeys = MutableMapping.iterkeys + itervalues = MutableMapping.itervalues + + __marker = object() + + def __len__(self): + return len(self._container) + + def __iter__(self): + # Only provide the originally cased names + for vals in self._container.values(): + yield vals[0] + + def pop(self, key, default=__marker): + """D.pop(k[,d]) -> v, remove specified key and return the corresponding value. + If key is not found, d is returned if given, otherwise KeyError is raised. + """ + # Using the MutableMapping function directly fails due to the private marker. + # Using ordinary dict.pop would expose the internal structures. + # So let's reinvent the wheel. + try: + value = self[key] + except KeyError: + if default is self.__marker: + raise + return default + else: + del self[key] + return value + + def discard(self, key): + try: + del self[key] + except KeyError: + pass + + def add(self, key, val): + """Adds a (name, value) pair, doesn't overwrite the value if it already + exists. + + >>> headers = HTTPHeaderDict(foo='bar') + >>> headers.add('Foo', 'baz') + >>> headers['foo'] + 'bar, baz' + """ + key_lower = key.lower() + new_vals = [key, val] + # Keep the common case aka no item present as fast as possible + vals = self._container.setdefault(key_lower, new_vals) + if new_vals is not vals: + vals.append(val) + + def extend(self, *args, **kwargs): + """Generic import function for any type of header-like object. + Adapted version of MutableMapping.update in order to insert items + with self.add instead of self.__setitem__ + """ + if len(args) > 1: + raise TypeError( + "extend() takes at most 1 positional " + "arguments ({0} given)".format(len(args)) + ) + other = args[0] if len(args) >= 1 else () + + if isinstance(other, HTTPHeaderDict): + for key, val in other.iteritems(): + self.add(key, val) + elif isinstance(other, Mapping): + for key in other: + self.add(key, other[key]) + elif hasattr(other, "keys"): + for key in other.keys(): + self.add(key, other[key]) + else: + for key, value in other: + self.add(key, value) + + for key, value in kwargs.items(): + self.add(key, value) + + def getlist(self, key, default=__marker): + """Returns a list of all the values for the named field. Returns an + empty list if the key doesn't exist.""" + try: + vals = self._container[key.lower()] + except KeyError: + if default is self.__marker: + return [] + return default + else: + return vals[1:] + + # Backwards compatibility for httplib + getheaders = getlist + getallmatchingheaders = getlist + iget = getlist + + # Backwards compatibility for http.cookiejar + get_all = getlist + + def __repr__(self): + return "%s(%s)" % (type(self).__name__, dict(self.itermerged())) + + def _copy_from(self, other): + for key in other: + val = other.getlist(key) + if isinstance(val, list): + # Don't need to convert tuples + val = list(val) + self._container[key.lower()] = [key] + val + + def copy(self): + clone = type(self)() + clone._copy_from(self) + return clone + + def iteritems(self): + """Iterate over all header lines, including duplicate ones.""" + for key in self: + vals = self._container[key.lower()] + for val in vals[1:]: + yield vals[0], val + + def itermerged(self): + """Iterate over all headers, merging duplicate ones together.""" + for key in self: + val = self._container[key.lower()] + yield val[0], ", ".join(val[1:]) + + def items(self): + return list(self.iteritems()) + + @classmethod + def from_httplib(cls, message): # Python 2 + """Read headers from a Python 2 httplib message object.""" + # python2.7 does not expose a proper API for exporting multiheaders + # efficiently. This function re-reads raw lines from the message + # object and extracts the multiheaders properly. + obs_fold_continued_leaders = (" ", "\t") + headers = [] + + for line in message.headers: + if line.startswith(obs_fold_continued_leaders): + if not headers: + # We received a header line that starts with OWS as described + # in RFC-7230 S3.2.4. This indicates a multiline header, but + # there exists no previous header to which we can attach it. + raise InvalidHeader( + "Header continuation with no previous header: %s" % line + ) + else: + key, value = headers[-1] + headers[-1] = (key, value + " " + line.strip()) + continue + + key, value = line.split(":", 1) + headers.append((key, value.strip())) + + return cls(headers) diff --git a/_vendor/urllib3/_version.py b/_vendor/urllib3/_version.py new file mode 100644 index 0000000..6fbc84b --- /dev/null +++ b/_vendor/urllib3/_version.py @@ -0,0 +1,2 @@ +# This file is protected via CODEOWNERS +__version__ = "1.26.12" diff --git a/_vendor/urllib3/connection.py b/_vendor/urllib3/connection.py new file mode 100644 index 0000000..10fb36c --- /dev/null +++ b/_vendor/urllib3/connection.py @@ -0,0 +1,567 @@ +from __future__ import absolute_import + +import datetime +import logging +import os +import re +import socket +import warnings +from socket import error as SocketError +from socket import timeout as SocketTimeout + +from .packages import six +from .packages.six.moves.http_client import HTTPConnection as _HTTPConnection +from .packages.six.moves.http_client import HTTPException # noqa: F401 +from .util.proxy import create_proxy_ssl_context + +try: # Compiled with SSL? + import ssl + + BaseSSLError = ssl.SSLError +except (ImportError, AttributeError): # Platform-specific: No SSL. + ssl = None + + class BaseSSLError(BaseException): + pass + + +try: + # Python 3: not a no-op, we're adding this to the namespace so it can be imported. + ConnectionError = ConnectionError +except NameError: + # Python 2 + class ConnectionError(Exception): + pass + + +try: # Python 3: + # Not a no-op, we're adding this to the namespace so it can be imported. + BrokenPipeError = BrokenPipeError +except NameError: # Python 2: + + class BrokenPipeError(Exception): + pass + + +from ._collections import HTTPHeaderDict # noqa (historical, removed in v2) +from ._version import __version__ +from .exceptions import ( + ConnectTimeoutError, + NewConnectionError, + SubjectAltNameWarning, + SystemTimeWarning, +) +from .util import SKIP_HEADER, SKIPPABLE_HEADERS, connection +from .util.ssl_ import ( + assert_fingerprint, + create_urllib3_context, + is_ipaddress, + resolve_cert_reqs, + resolve_ssl_version, + ssl_wrap_socket, +) +from .util.ssl_match_hostname import CertificateError, match_hostname + +log = logging.getLogger(__name__) + +port_by_scheme = {"http": 80, "https": 443} + +# When it comes time to update this value as a part of regular maintenance +# (ie test_recent_date is failing) update it to ~6 months before the current date. +RECENT_DATE = datetime.date(2022, 1, 1) + +_CONTAINS_CONTROL_CHAR_RE = re.compile(r"[^-!#$%&'*+.^_`|~0-9a-zA-Z]") + + +class HTTPConnection(_HTTPConnection, object): + """ + Based on :class:`http.client.HTTPConnection` but provides an extra constructor + backwards-compatibility layer between older and newer Pythons. + + Additional keyword parameters are used to configure attributes of the connection. + Accepted parameters include: + + - ``strict``: See the documentation on :class:`urllib3.connectionpool.HTTPConnectionPool` + - ``source_address``: Set the source address for the current connection. + - ``socket_options``: Set specific options on the underlying socket. If not specified, then + defaults are loaded from ``HTTPConnection.default_socket_options`` which includes disabling + Nagle's algorithm (sets TCP_NODELAY to 1) unless the connection is behind a proxy. + + For example, if you wish to enable TCP Keep Alive in addition to the defaults, + you might pass: + + .. code-block:: python + + HTTPConnection.default_socket_options + [ + (socket.SOL_SOCKET, socket.SO_KEEPALIVE, 1), + ] + + Or you may want to disable the defaults by passing an empty list (e.g., ``[]``). + """ + + default_port = port_by_scheme["http"] + + #: Disable Nagle's algorithm by default. + #: ``[(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)]`` + default_socket_options = [(socket.IPPROTO_TCP, socket.TCP_NODELAY, 1)] + + #: Whether this connection verifies the host's certificate. + is_verified = False + + #: Whether this proxy connection (if used) verifies the proxy host's + #: certificate. + proxy_is_verified = None + + def __init__(self, *args, **kw): + if not six.PY2: + kw.pop("strict", None) + + # Pre-set source_address. + self.source_address = kw.get("source_address") + + #: The socket options provided by the user. If no options are + #: provided, we use the default options. + self.socket_options = kw.pop("socket_options", self.default_socket_options) + + # Proxy options provided by the user. + self.proxy = kw.pop("proxy", None) + self.proxy_config = kw.pop("proxy_config", None) + + _HTTPConnection.__init__(self, *args, **kw) + + @property + def host(self): + """ + Getter method to remove any trailing dots that indicate the hostname is an FQDN. + + In general, SSL certificates don't include the trailing dot indicating a + fully-qualified domain name, and thus, they don't validate properly when + checked against a domain name that includes the dot. In addition, some + servers may not expect to receive the trailing dot when provided. + + However, the hostname with trailing dot is critical to DNS resolution; doing a + lookup with the trailing dot will properly only resolve the appropriate FQDN, + whereas a lookup without a trailing dot will search the system's search domain + list. Thus, it's important to keep the original host around for use only in + those cases where it's appropriate (i.e., when doing DNS lookup to establish the + actual TCP connection across which we're going to send HTTP requests). + """ + return self._dns_host.rstrip(".") + + @host.setter + def host(self, value): + """ + Setter for the `host` property. + + We assume that only urllib3 uses the _dns_host attribute; httplib itself + only uses `host`, and it seems reasonable that other libraries follow suit. + """ + self._dns_host = value + + def _new_conn(self): + """Establish a socket connection and set nodelay settings on it. + + :return: New socket connection. + """ + extra_kw = {} + if self.source_address: + extra_kw["source_address"] = self.source_address + + if self.socket_options: + extra_kw["socket_options"] = self.socket_options + + try: + conn = connection.create_connection( + (self._dns_host, self.port), self.timeout, **extra_kw + ) + + except SocketTimeout: + raise ConnectTimeoutError( + self, + "Connection to %s timed out. (connect timeout=%s)" + % (self.host, self.timeout), + ) + + except SocketError as e: + raise NewConnectionError( + self, "Failed to establish a new connection: %s" % e + ) + + return conn + + def _is_using_tunnel(self): + # Google App Engine's httplib does not define _tunnel_host + return getattr(self, "_tunnel_host", None) + + def _prepare_conn(self, conn): + self.sock = conn + if self._is_using_tunnel(): + # TODO: Fix tunnel so it doesn't depend on self.sock state. + self._tunnel() + # Mark this connection as not reusable + self.auto_open = 0 + + def connect(self): + conn = self._new_conn() + self._prepare_conn(conn) + + def putrequest(self, method, url, *args, **kwargs): + """ """ + # Empty docstring because the indentation of CPython's implementation + # is broken but we don't want this method in our documentation. + match = _CONTAINS_CONTROL_CHAR_RE.search(method) + if match: + raise ValueError( + "Method cannot contain non-token characters %r (found at least %r)" + % (method, match.group()) + ) + + return _HTTPConnection.putrequest(self, method, url, *args, **kwargs) + + def putheader(self, header, *values): + """ """ + if not any(isinstance(v, str) and v == SKIP_HEADER for v in values): + _HTTPConnection.putheader(self, header, *values) + elif six.ensure_str(header.lower()) not in SKIPPABLE_HEADERS: + raise ValueError( + "urllib3.util.SKIP_HEADER only supports '%s'" + % ("', '".join(map(str.title, sorted(SKIPPABLE_HEADERS))),) + ) + + def request(self, method, url, body=None, headers=None): + if headers is None: + headers = {} + else: + # Avoid modifying the headers passed into .request() + headers = headers.copy() + if "user-agent" not in (six.ensure_str(k.lower()) for k in headers): + headers["User-Agent"] = _get_default_user_agent() + super(HTTPConnection, self).request(method, url, body=body, headers=headers) + + def request_chunked(self, method, url, body=None, headers=None): + """ + Alternative to the common request method, which sends the + body with chunked encoding and not as one block + """ + headers = headers or {} + header_keys = set([six.ensure_str(k.lower()) for k in headers]) + skip_accept_encoding = "accept-encoding" in header_keys + skip_host = "host" in header_keys + self.putrequest( + method, url, skip_accept_encoding=skip_accept_encoding, skip_host=skip_host + ) + if "user-agent" not in header_keys: + self.putheader("User-Agent", _get_default_user_agent()) + for header, value in headers.items(): + self.putheader(header, value) + if "transfer-encoding" not in header_keys: + self.putheader("Transfer-Encoding", "chunked") + self.endheaders() + + if body is not None: + stringish_types = six.string_types + (bytes,) + if isinstance(body, stringish_types): + body = (body,) + for chunk in body: + if not chunk: + continue + if not isinstance(chunk, bytes): + chunk = chunk.encode("utf8") + len_str = hex(len(chunk))[2:] + to_send = bytearray(len_str.encode()) + to_send += b"\r\n" + to_send += chunk + to_send += b"\r\n" + self.send(to_send) + + # After the if clause, to always have a closed body + self.send(b"0\r\n\r\n") + + +class HTTPSConnection(HTTPConnection): + """ + Many of the parameters to this constructor are passed to the underlying SSL + socket by means of :py:func:`urllib3.util.ssl_wrap_socket`. + """ + + default_port = port_by_scheme["https"] + + cert_reqs = None + ca_certs = None + ca_cert_dir = None + ca_cert_data = None + ssl_version = None + assert_fingerprint = None + tls_in_tls_required = False + + def __init__( + self, + host, + port=None, + key_file=None, + cert_file=None, + key_password=None, + strict=None, + timeout=socket._GLOBAL_DEFAULT_TIMEOUT, + ssl_context=None, + server_hostname=None, + **kw + ): + + HTTPConnection.__init__(self, host, port, strict=strict, timeout=timeout, **kw) + + self.key_file = key_file + self.cert_file = cert_file + self.key_password = key_password + self.ssl_context = ssl_context + self.server_hostname = server_hostname + + # Required property for Google AppEngine 1.9.0 which otherwise causes + # HTTPS requests to go out as HTTP. (See Issue #356) + self._protocol = "https" + + def set_cert( + self, + key_file=None, + cert_file=None, + cert_reqs=None, + key_password=None, + ca_certs=None, + assert_hostname=None, + assert_fingerprint=None, + ca_cert_dir=None, + ca_cert_data=None, + ): + """ + This method should only be called once, before the connection is used. + """ + # If cert_reqs is not provided we'll assume CERT_REQUIRED unless we also + # have an SSLContext object in which case we'll use its verify_mode. + if cert_reqs is None: + if self.ssl_context is not None: + cert_reqs = self.ssl_context.verify_mode + else: + cert_reqs = resolve_cert_reqs(None) + + self.key_file = key_file + self.cert_file = cert_file + self.cert_reqs = cert_reqs + self.key_password = key_password + self.assert_hostname = assert_hostname + self.assert_fingerprint = assert_fingerprint + self.ca_certs = ca_certs and os.path.expanduser(ca_certs) + self.ca_cert_dir = ca_cert_dir and os.path.expanduser(ca_cert_dir) + self.ca_cert_data = ca_cert_data + + def connect(self): + # Add certificate verification + self.sock = conn = self._new_conn() + hostname = self.host + tls_in_tls = False + + if self._is_using_tunnel(): + if self.tls_in_tls_required: + self.sock = conn = self._connect_tls_proxy(hostname, conn) + tls_in_tls = True + + # Calls self._set_hostport(), so self.host is + # self._tunnel_host below. + self._tunnel() + # Mark this connection as not reusable + self.auto_open = 0 + + # Override the host with the one we're requesting data from. + hostname = self._tunnel_host + + server_hostname = hostname + if self.server_hostname is not None: + server_hostname = self.server_hostname + + is_time_off = datetime.date.today() < RECENT_DATE + if is_time_off: + warnings.warn( + ( + "System time is way off (before {0}). This will probably " + "lead to SSL verification errors" + ).format(RECENT_DATE), + SystemTimeWarning, + ) + + # Wrap socket using verification with the root certs in + # trusted_root_certs + default_ssl_context = False + if self.ssl_context is None: + default_ssl_context = True + self.ssl_context = create_urllib3_context( + ssl_version=resolve_ssl_version(self.ssl_version), + cert_reqs=resolve_cert_reqs(self.cert_reqs), + ) + + context = self.ssl_context + context.verify_mode = resolve_cert_reqs(self.cert_reqs) + + # Try to load OS default certs if none are given. + # Works well on Windows (requires Python3.4+) + if ( + not self.ca_certs + and not self.ca_cert_dir + and not self.ca_cert_data + and default_ssl_context + and hasattr(context, "load_default_certs") + ): + context.load_default_certs() + + self.sock = ssl_wrap_socket( + sock=conn, + keyfile=self.key_file, + certfile=self.cert_file, + key_password=self.key_password, + ca_certs=self.ca_certs, + ca_cert_dir=self.ca_cert_dir, + ca_cert_data=self.ca_cert_data, + server_hostname=server_hostname, + ssl_context=context, + tls_in_tls=tls_in_tls, + ) + + # If we're using all defaults and the connection + # is TLSv1 or TLSv1.1 we throw a DeprecationWarning + # for the host. + if ( + default_ssl_context + and self.ssl_version is None + and hasattr(self.sock, "version") + and self.sock.version() in {"TLSv1", "TLSv1.1"} + ): + warnings.warn( + "Negotiating TLSv1/TLSv1.1 by default is deprecated " + "and will be disabled in urllib3 v2.0.0. Connecting to " + "'%s' with '%s' can be enabled by explicitly opting-in " + "with 'ssl_version'" % (self.host, self.sock.version()), + DeprecationWarning, + ) + + if self.assert_fingerprint: + assert_fingerprint( + self.sock.getpeercert(binary_form=True), self.assert_fingerprint + ) + elif ( + context.verify_mode != ssl.CERT_NONE + and not getattr(context, "check_hostname", False) + and self.assert_hostname is not False + ): + # While urllib3 attempts to always turn off hostname matching from + # the TLS library, this cannot always be done. So we check whether + # the TLS Library still thinks it's matching hostnames. + cert = self.sock.getpeercert() + if not cert.get("subjectAltName", ()): + warnings.warn( + ( + "Certificate for {0} has no `subjectAltName`, falling back to check for a " + "`commonName` for now. This feature is being removed by major browsers and " + "deprecated by RFC 2818. (See https://github.com/urllib3/urllib3/issues/497 " + "for details.)".format(hostname) + ), + SubjectAltNameWarning, + ) + _match_hostname(cert, self.assert_hostname or server_hostname) + + self.is_verified = ( + context.verify_mode == ssl.CERT_REQUIRED + or self.assert_fingerprint is not None + ) + + def _connect_tls_proxy(self, hostname, conn): + """ + Establish a TLS connection to the proxy using the provided SSL context. + """ + proxy_config = self.proxy_config + ssl_context = proxy_config.ssl_context + if ssl_context: + # If the user provided a proxy context, we assume CA and client + # certificates have already been set + return ssl_wrap_socket( + sock=conn, + server_hostname=hostname, + ssl_context=ssl_context, + ) + + ssl_context = create_proxy_ssl_context( + self.ssl_version, + self.cert_reqs, + self.ca_certs, + self.ca_cert_dir, + self.ca_cert_data, + ) + + # If no cert was provided, use only the default options for server + # certificate validation + socket = ssl_wrap_socket( + sock=conn, + ca_certs=self.ca_certs, + ca_cert_dir=self.ca_cert_dir, + ca_cert_data=self.ca_cert_data, + server_hostname=hostname, + ssl_context=ssl_context, + ) + + if ssl_context.verify_mode != ssl.CERT_NONE and not getattr( + ssl_context, "check_hostname", False + ): + # While urllib3 attempts to always turn off hostname matching from + # the TLS library, this cannot always be done. So we check whether + # the TLS Library still thinks it's matching hostnames. + cert = socket.getpeercert() + if not cert.get("subjectAltName", ()): + warnings.warn( + ( + "Certificate for {0} has no `subjectAltName`, falling back to check for a " + "`commonName` for now. This feature is being removed by major browsers and " + "deprecated by RFC 2818. (See https://github.com/urllib3/urllib3/issues/497 " + "for details.)".format(hostname) + ), + SubjectAltNameWarning, + ) + _match_hostname(cert, hostname) + + self.proxy_is_verified = ssl_context.verify_mode == ssl.CERT_REQUIRED + return socket + + +def _match_hostname(cert, asserted_hostname): + # Our upstream implementation of ssl.match_hostname() + # only applies this normalization to IP addresses so it doesn't + # match DNS SANs so we do the same thing! + stripped_hostname = asserted_hostname.strip("u[]") + if is_ipaddress(stripped_hostname): + asserted_hostname = stripped_hostname + + try: + match_hostname(cert, asserted_hostname) + except CertificateError as e: + log.warning( + "Certificate did not match expected hostname: %s. Certificate: %s", + asserted_hostname, + cert, + ) + # Add cert to exception and reraise so client code can inspect + # the cert when catching the exception, if they want to + e._peer_cert = cert + raise + + +def _get_default_user_agent(): + return "python-urllib3/%s" % __version__ + + +class DummyConnection(object): + """Used to detect a failed ConnectionCls import.""" + + pass + + +if not ssl: + HTTPSConnection = DummyConnection # noqa: F811 + + +VerifiedHTTPSConnection = HTTPSConnection diff --git a/_vendor/urllib3/connectionpool.py b/_vendor/urllib3/connectionpool.py new file mode 100644 index 0000000..96339e9 --- /dev/null +++ b/_vendor/urllib3/connectionpool.py @@ -0,0 +1,1110 @@ +from __future__ import absolute_import + +import errno +import logging +import re +import socket +import sys +import warnings +from socket import error as SocketError +from socket import timeout as SocketTimeout + +from .connection import ( + BaseSSLError, + BrokenPipeError, + DummyConnection, + HTTPConnection, + HTTPException, + HTTPSConnection, + VerifiedHTTPSConnection, + port_by_scheme, +) +from .exceptions import ( + ClosedPoolError, + EmptyPoolError, + HeaderParsingError, + HostChangedError, + InsecureRequestWarning, + LocationValueError, + MaxRetryError, + NewConnectionError, + ProtocolError, + ProxyError, + ReadTimeoutError, + SSLError, + TimeoutError, +) +from .packages import six +from .packages.six.moves import queue +from .request import RequestMethods +from .response import HTTPResponse +from .util.connection import is_connection_dropped +from .util.proxy import connection_requires_http_tunnel +from .util.queue import LifoQueue +from .util.request import set_file_position +from .util.response import assert_header_parsing +from .util.retry import Retry +from .util.ssl_match_hostname import CertificateError +from .util.timeout import Timeout +from .util.url import Url, _encode_target +from .util.url import _normalize_host as normalize_host +from .util.url import get_host, parse_url + +xrange = six.moves.xrange + +log = logging.getLogger(__name__) + +_Default = object() + + +# Pool objects +class ConnectionPool(object): + """ + Base class for all connection pools, such as + :class:`.HTTPConnectionPool` and :class:`.HTTPSConnectionPool`. + + .. note:: + ConnectionPool.urlopen() does not normalize or percent-encode target URIs + which is useful if your target server doesn't support percent-encoded + target URIs. + """ + + scheme = None + QueueCls = LifoQueue + + def __init__(self, host, port=None): + if not host: + raise LocationValueError("No host specified.") + + self.host = _normalize_host(host, scheme=self.scheme) + self._proxy_host = host.lower() + self.port = port + + def __str__(self): + return "%s(host=%r, port=%r)" % (type(self).__name__, self.host, self.port) + + def __enter__(self): + return self + + def __exit__(self, exc_type, exc_val, exc_tb): + self.close() + # Return False to re-raise any potential exceptions + return False + + def close(self): + """ + Close all pooled connections and disable the pool. + """ + pass + + +# This is taken from http://hg.python.org/cpython/file/7aaba721ebc0/Lib/socket.py#l252 +_blocking_errnos = {errno.EAGAIN, errno.EWOULDBLOCK} + + +class HTTPConnectionPool(ConnectionPool, RequestMethods): + """ + Thread-safe connection pool for one host. + + :param host: + Host used for this HTTP Connection (e.g. "localhost"), passed into + :class:`http.client.HTTPConnection`. + + :param port: + Port used for this HTTP Connection (None is equivalent to 80), passed + into :class:`http.client.HTTPConnection`. + + :param strict: + Causes BadStatusLine to be raised if the status line can't be parsed + as a valid HTTP/1.0 or 1.1 status line, passed into + :class:`http.client.HTTPConnection`. + + .. note:: + Only works in Python 2. This parameter is ignored in Python 3. + + :param timeout: + Socket timeout in seconds for each individual connection. This can + be a float or integer, which sets the timeout for the HTTP request, + or an instance of :class:`urllib3.util.Timeout` which gives you more + fine-grained control over request timeouts. After the constructor has + been parsed, this is always a `urllib3.util.Timeout` object. + + :param maxsize: + Number of connections to save that can be reused. More than 1 is useful + in multithreaded situations. If ``block`` is set to False, more + connections will be created but they will not be saved once they've + been used. + + :param block: + If set to True, no more than ``maxsize`` connections will be used at + a time. When no free connections are available, the call will block + until a connection has been released. This is a useful side effect for + particular multithreaded situations where one does not want to use more + than maxsize connections per host to prevent flooding. + + :param headers: + Headers to include with all requests, unless other headers are given + explicitly. + + :param retries: + Retry configuration to use by default with requests in this pool. + + :param _proxy: + Parsed proxy URL, should not be used directly, instead, see + :class:`urllib3.ProxyManager` + + :param _proxy_headers: + A dictionary with proxy headers, should not be used directly, + instead, see :class:`urllib3.ProxyManager` + + :param \\**conn_kw: + Additional parameters are used to create fresh :class:`urllib3.connection.HTTPConnection`, + :class:`urllib3.connection.HTTPSConnection` instances. + """ + + scheme = "http" + ConnectionCls = HTTPConnection + ResponseCls = HTTPResponse + + def __init__( + self, + host, + port=None, + strict=False, + timeout=Timeout.DEFAULT_TIMEOUT, + maxsize=1, + block=False, + headers=None, + retries=None, + _proxy=None, + _proxy_headers=None, + _proxy_config=None, + **conn_kw + ): + ConnectionPool.__init__(self, host, port) + RequestMethods.__init__(self, headers) + + self.strict = strict + + if not isinstance(timeout, Timeout): + timeout = Timeout.from_float(timeout) + + if retries is None: + retries = Retry.DEFAULT + + self.timeout = timeout + self.retries = retries + + self.pool = self.QueueCls(maxsize) + self.block = block + + self.proxy = _proxy + self.proxy_headers = _proxy_headers or {} + self.proxy_config = _proxy_config + + # Fill the queue up so that doing get() on it will block properly + for _ in xrange(maxsize): + self.pool.put(None) + + # These are mostly for testing and debugging purposes. + self.num_connections = 0 + self.num_requests = 0 + self.conn_kw = conn_kw + + if self.proxy: + # Enable Nagle's algorithm for proxies, to avoid packet fragmentation. + # We cannot know if the user has added default socket options, so we cannot replace the + # list. + self.conn_kw.setdefault("socket_options", []) + + self.conn_kw["proxy"] = self.proxy + self.conn_kw["proxy_config"] = self.proxy_config + + def _new_conn(self): + """ + Return a fresh :class:`HTTPConnection`. + """ + self.num_connections += 1 + log.debug( + "Starting new HTTP connection (%d): %s:%s", + self.num_connections, + self.host, + self.port or "80", + ) + + conn = self.ConnectionCls( + host=self.host, + port=self.port, + timeout=self.timeout.connect_timeout, + strict=self.strict, + **self.conn_kw + ) + return conn + + def _get_conn(self, timeout=None): + """ + Get a connection. Will return a pooled connection if one is available. + + If no connections are available and :prop:`.block` is ``False``, then a + fresh connection is returned. + + :param timeout: + Seconds to wait before giving up and raising + :class:`urllib3.exceptions.EmptyPoolError` if the pool is empty and + :prop:`.block` is ``True``. + """ + conn = None + try: + conn = self.pool.get(block=self.block, timeout=timeout) + + except AttributeError: # self.pool is None + raise ClosedPoolError(self, "Pool is closed.") + + except queue.Empty: + if self.block: + raise EmptyPoolError( + self, + "Pool reached maximum size and no more connections are allowed.", + ) + pass # Oh well, we'll create a new connection then + + # If this is a persistent connection, check if it got disconnected + if conn and is_connection_dropped(conn): + log.debug("Resetting dropped connection: %s", self.host) + conn.close() + if getattr(conn, "auto_open", 1) == 0: + # This is a proxied connection that has been mutated by + # http.client._tunnel() and cannot be reused (since it would + # attempt to bypass the proxy) + conn = None + + return conn or self._new_conn() + + def _put_conn(self, conn): + """ + Put a connection back into the pool. + + :param conn: + Connection object for the current host and port as returned by + :meth:`._new_conn` or :meth:`._get_conn`. + + If the pool is already full, the connection is closed and discarded + because we exceeded maxsize. If connections are discarded frequently, + then maxsize should be increased. + + If the pool is closed, then the connection will be closed and discarded. + """ + try: + self.pool.put(conn, block=False) + return # Everything is dandy, done. + except AttributeError: + # self.pool is None. + pass + except queue.Full: + # This should never happen if self.block == True + log.warning( + "Connection pool is full, discarding connection: %s. Connection pool size: %s", + self.host, + self.pool.qsize(), + ) + # Connection never got put back into the pool, close it. + if conn: + conn.close() + + def _validate_conn(self, conn): + """ + Called right before a request is made, after the socket is created. + """ + pass + + def _prepare_proxy(self, conn): + # Nothing to do for HTTP connections. + pass + + def _get_timeout(self, timeout): + """Helper that always returns a :class:`urllib3.util.Timeout`""" + if timeout is _Default: + return self.timeout.clone() + + if isinstance(timeout, Timeout): + return timeout.clone() + else: + # User passed us an int/float. This is for backwards compatibility, + # can be removed later + return Timeout.from_float(timeout) + + def _raise_timeout(self, err, url, timeout_value): + """Is the error actually a timeout? Will raise a ReadTimeout or pass""" + + if isinstance(err, SocketTimeout): + raise ReadTimeoutError( + self, url, "Read timed out. (read timeout=%s)" % timeout_value + ) + + # See the above comment about EAGAIN in Python 3. In Python 2 we have + # to specifically catch it and throw the timeout error + if hasattr(err, "errno") and err.errno in _blocking_errnos: + raise ReadTimeoutError( + self, url, "Read timed out. (read timeout=%s)" % timeout_value + ) + + # Catch possible read timeouts thrown as SSL errors. If not the + # case, rethrow the original. We need to do this because of: + # http://bugs.python.org/issue10272 + if "timed out" in str(err) or "did not complete (read)" in str( + err + ): # Python < 2.7.4 + raise ReadTimeoutError( + self, url, "Read timed out. (read timeout=%s)" % timeout_value + ) + + def _make_request( + self, conn, method, url, timeout=_Default, chunked=False, **httplib_request_kw + ): + """ + Perform a request on a given urllib connection object taken from our + pool. + + :param conn: + a connection from one of our connection pools + + :param timeout: + Socket timeout in seconds for the request. This can be a + float or integer, which will set the same timeout value for + the socket connect and the socket read, or an instance of + :class:`urllib3.util.Timeout`, which gives you more fine-grained + control over your timeouts. + """ + self.num_requests += 1 + + timeout_obj = self._get_timeout(timeout) + timeout_obj.start_connect() + conn.timeout = timeout_obj.connect_timeout + + # Trigger any extra validation we need to do. + try: + self._validate_conn(conn) + except (SocketTimeout, BaseSSLError) as e: + # Py2 raises this as a BaseSSLError, Py3 raises it as socket timeout. + self._raise_timeout(err=e, url=url, timeout_value=conn.timeout) + raise + + # conn.request() calls http.client.*.request, not the method in + # urllib3.request. It also calls makefile (recv) on the socket. + try: + if chunked: + conn.request_chunked(method, url, **httplib_request_kw) + else: + conn.request(method, url, **httplib_request_kw) + + # We are swallowing BrokenPipeError (errno.EPIPE) since the server is + # legitimately able to close the connection after sending a valid response. + # With this behaviour, the received response is still readable. + except BrokenPipeError: + # Python 3 + pass + except IOError as e: + # Python 2 and macOS/Linux + # EPIPE and ESHUTDOWN are BrokenPipeError on Python 2, and EPROTOTYPE is needed on macOS + # https://erickt.github.io/blog/2014/11/19/adventures-in-debugging-a-potential-osx-kernel-bug/ + if e.errno not in { + errno.EPIPE, + errno.ESHUTDOWN, + errno.EPROTOTYPE, + }: + raise + + # Reset the timeout for the recv() on the socket + read_timeout = timeout_obj.read_timeout + + # App Engine doesn't have a sock attr + if getattr(conn, "sock", None): + # In Python 3 socket.py will catch EAGAIN and return None when you + # try and read into the file pointer created by http.client, which + # instead raises a BadStatusLine exception. Instead of catching + # the exception and assuming all BadStatusLine exceptions are read + # timeouts, check for a zero timeout before making the request. + if read_timeout == 0: + raise ReadTimeoutError( + self, url, "Read timed out. (read timeout=%s)" % read_timeout + ) + if read_timeout is Timeout.DEFAULT_TIMEOUT: + conn.sock.settimeout(socket.getdefaulttimeout()) + else: # None or a value + conn.sock.settimeout(read_timeout) + + # Receive the response from the server + try: + try: + # Python 2.7, use buffering of HTTP responses + httplib_response = conn.getresponse(buffering=True) + except TypeError: + # Python 3 + try: + httplib_response = conn.getresponse() + except BaseException as e: + # Remove the TypeError from the exception chain in + # Python 3 (including for exceptions like SystemExit). + # Otherwise it looks like a bug in the code. + six.raise_from(e, None) + except (SocketTimeout, BaseSSLError, SocketError) as e: + self._raise_timeout(err=e, url=url, timeout_value=read_timeout) + raise + + # AppEngine doesn't have a version attr. + http_version = getattr(conn, "_http_vsn_str", "HTTP/?") + log.debug( + '%s://%s:%s "%s %s %s" %s %s', + self.scheme, + self.host, + self.port, + method, + url, + http_version, + httplib_response.status, + httplib_response.length, + ) + + try: + assert_header_parsing(httplib_response.msg) + except (HeaderParsingError, TypeError) as hpe: # Platform-specific: Python 3 + log.warning( + "Failed to parse headers (url=%s): %s", + self._absolute_url(url), + hpe, + exc_info=True, + ) + + return httplib_response + + def _absolute_url(self, path): + return Url(scheme=self.scheme, host=self.host, port=self.port, path=path).url + + def close(self): + """ + Close all pooled connections and disable the pool. + """ + if self.pool is None: + return + # Disable access to the pool + old_pool, self.pool = self.pool, None + + try: + while True: + conn = old_pool.get(block=False) + if conn: + conn.close() + + except queue.Empty: + pass # Done. + + def is_same_host(self, url): + """ + Check if the given ``url`` is a member of the same host as this + connection pool. + """ + if url.startswith("/"): + return True + + # TODO: Add optional support for socket.gethostbyname checking. + scheme, host, port = get_host(url) + if host is not None: + host = _normalize_host(host, scheme=scheme) + + # Use explicit default port for comparison when none is given + if self.port and not port: + port = port_by_scheme.get(scheme) + elif not self.port and port == port_by_scheme.get(scheme): + port = None + + return (scheme, host, port) == (self.scheme, self.host, self.port) + + def urlopen( + self, + method, + url, + body=None, + headers=None, + retries=None, + redirect=True, + assert_same_host=True, + timeout=_Default, + pool_timeout=None, + release_conn=None, + chunked=False, + body_pos=None, + **response_kw + ): + """ + Get a connection from the pool and perform an HTTP request. This is the + lowest level call for making a request, so you'll need to specify all + the raw details. + + .. note:: + + More commonly, it's appropriate to use a convenience method provided + by :class:`.RequestMethods`, such as :meth:`request`. + + .. note:: + + `release_conn` will only behave as expected if + `preload_content=False` because we want to make + `preload_content=False` the default behaviour someday soon without + breaking backwards compatibility. + + :param method: + HTTP request method (such as GET, POST, PUT, etc.) + + :param url: + The URL to perform the request on. + + :param body: + Data to send in the request body, either :class:`str`, :class:`bytes`, + an iterable of :class:`str`/:class:`bytes`, or a file-like object. + + :param headers: + Dictionary of custom headers to send, such as User-Agent, + If-None-Match, etc. If None, pool headers are used. If provided, + these headers completely replace any pool-specific headers. + + :param retries: + Configure the number of retries to allow before raising a + :class:`~urllib3.exceptions.MaxRetryError` exception. + + Pass ``None`` to retry until you receive a response. Pass a + :class:`~urllib3.util.retry.Retry` object for fine-grained control + over different types of retries. + Pass an integer number to retry connection errors that many times, + but no other types of errors. Pass zero to never retry. + + If ``False``, then retries are disabled and any exception is raised + immediately. Also, instead of raising a MaxRetryError on redirects, + the redirect response will be returned. + + :type retries: :class:`~urllib3.util.retry.Retry`, False, or an int. + + :param redirect: + If True, automatically handle redirects (status codes 301, 302, + 303, 307, 308). Each redirect counts as a retry. Disabling retries + will disable redirect, too. + + :param assert_same_host: + If ``True``, will make sure that the host of the pool requests is + consistent else will raise HostChangedError. When ``False``, you can + use the pool on an HTTP proxy and request foreign hosts. + + :param timeout: + If specified, overrides the default timeout for this one + request. It may be a float (in seconds) or an instance of + :class:`urllib3.util.Timeout`. + + :param pool_timeout: + If set and the pool is set to block=True, then this method will + block for ``pool_timeout`` seconds and raise EmptyPoolError if no + connection is available within the time period. + + :param release_conn: + If False, then the urlopen call will not release the connection + back into the pool once a response is received (but will release if + you read the entire contents of the response such as when + `preload_content=True`). This is useful if you're not preloading + the response's content immediately. You will need to call + ``r.release_conn()`` on the response ``r`` to return the connection + back into the pool. If None, it takes the value of + ``response_kw.get('preload_content', True)``. + + :param chunked: + If True, urllib3 will send the body using chunked transfer + encoding. Otherwise, urllib3 will send the body using the standard + content-length form. Defaults to False. + + :param int body_pos: + Position to seek to in file-like body in the event of a retry or + redirect. Typically this won't need to be set because urllib3 will + auto-populate the value when needed. + + :param \\**response_kw: + Additional parameters are passed to + :meth:`urllib3.response.HTTPResponse.from_httplib` + """ + + parsed_url = parse_url(url) + destination_scheme = parsed_url.scheme + + if headers is None: + headers = self.headers + + if not isinstance(retries, Retry): + retries = Retry.from_int(retries, redirect=redirect, default=self.retries) + + if release_conn is None: + release_conn = response_kw.get("preload_content", True) + + # Check host + if assert_same_host and not self.is_same_host(url): + raise HostChangedError(self, url, retries) + + # Ensure that the URL we're connecting to is properly encoded + if url.startswith("/"): + url = six.ensure_str(_encode_target(url)) + else: + url = six.ensure_str(parsed_url.url) + + conn = None + + # Track whether `conn` needs to be released before + # returning/raising/recursing. Update this variable if necessary, and + # leave `release_conn` constant throughout the function. That way, if + # the function recurses, the original value of `release_conn` will be + # passed down into the recursive call, and its value will be respected. + # + # See issue #651 [1] for details. + # + # [1] + release_this_conn = release_conn + + http_tunnel_required = connection_requires_http_tunnel( + self.proxy, self.proxy_config, destination_scheme + ) + + # Merge the proxy headers. Only done when not using HTTP CONNECT. We + # have to copy the headers dict so we can safely change it without those + # changes being reflected in anyone else's copy. + if not http_tunnel_required: + headers = headers.copy() + headers.update(self.proxy_headers) + + # Must keep the exception bound to a separate variable or else Python 3 + # complains about UnboundLocalError. + err = None + + # Keep track of whether we cleanly exited the except block. This + # ensures we do proper cleanup in finally. + clean_exit = False + + # Rewind body position, if needed. Record current position + # for future rewinds in the event of a redirect/retry. + body_pos = set_file_position(body, body_pos) + + try: + # Request a connection from the queue. + timeout_obj = self._get_timeout(timeout) + conn = self._get_conn(timeout=pool_timeout) + + conn.timeout = timeout_obj.connect_timeout + + is_new_proxy_conn = self.proxy is not None and not getattr( + conn, "sock", None + ) + if is_new_proxy_conn and http_tunnel_required: + self._prepare_proxy(conn) + + # Make the request on the httplib connection object. + httplib_response = self._make_request( + conn, + method, + url, + timeout=timeout_obj, + body=body, + headers=headers, + chunked=chunked, + ) + + # If we're going to release the connection in ``finally:``, then + # the response doesn't need to know about the connection. Otherwise + # it will also try to release it and we'll have a double-release + # mess. + response_conn = conn if not release_conn else None + + # Pass method to Response for length checking + response_kw["request_method"] = method + + # Import httplib's response into our own wrapper object + response = self.ResponseCls.from_httplib( + httplib_response, + pool=self, + connection=response_conn, + retries=retries, + **response_kw + ) + + # Everything went great! + clean_exit = True + + except EmptyPoolError: + # Didn't get a connection from the pool, no need to clean up + clean_exit = True + release_this_conn = False + raise + + except ( + TimeoutError, + HTTPException, + SocketError, + ProtocolError, + BaseSSLError, + SSLError, + CertificateError, + ) as e: + # Discard the connection for these exceptions. It will be + # replaced during the next _get_conn() call. + clean_exit = False + + def _is_ssl_error_message_from_http_proxy(ssl_error): + # We're trying to detect the message 'WRONG_VERSION_NUMBER' but + # SSLErrors are kinda all over the place when it comes to the message, + # so we try to cover our bases here! + message = " ".join(re.split("[^a-z]", str(ssl_error).lower())) + return ( + "wrong version number" in message or "unknown protocol" in message + ) + + # Try to detect a common user error with proxies which is to + # set an HTTP proxy to be HTTPS when it should be 'http://' + # (ie {'http': 'http://proxy', 'https': 'https://proxy'}) + # Instead we add a nice error message and point to a URL. + if ( + isinstance(e, BaseSSLError) + and self.proxy + and _is_ssl_error_message_from_http_proxy(e) + and conn.proxy + and conn.proxy.scheme == "https" + ): + e = ProxyError( + "Your proxy appears to only use HTTP and not HTTPS, " + "try changing your proxy URL to be HTTP. See: " + "https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html" + "#https-proxy-error-http-proxy", + SSLError(e), + ) + elif isinstance(e, (BaseSSLError, CertificateError)): + e = SSLError(e) + elif isinstance(e, (SocketError, NewConnectionError)) and self.proxy: + e = ProxyError("Cannot connect to proxy.", e) + elif isinstance(e, (SocketError, HTTPException)): + e = ProtocolError("Connection aborted.", e) + + retries = retries.increment( + method, url, error=e, _pool=self, _stacktrace=sys.exc_info()[2] + ) + retries.sleep() + + # Keep track of the error for the retry warning. + err = e + + finally: + if not clean_exit: + # We hit some kind of exception, handled or otherwise. We need + # to throw the connection away unless explicitly told not to. + # Close the connection, set the variable to None, and make sure + # we put the None back in the pool to avoid leaking it. + conn = conn and conn.close() + release_this_conn = True + + if release_this_conn: + # Put the connection back to be reused. If the connection is + # expired then it will be None, which will get replaced with a + # fresh connection during _get_conn. + self._put_conn(conn) + + if not conn: + # Try again + log.warning( + "Retrying (%r) after connection broken by '%r': %s", retries, err, url + ) + return self.urlopen( + method, + url, + body, + headers, + retries, + redirect, + assert_same_host, + timeout=timeout, + pool_timeout=pool_timeout, + release_conn=release_conn, + chunked=chunked, + body_pos=body_pos, + **response_kw + ) + + # Handle redirect? + redirect_location = redirect and response.get_redirect_location() + if redirect_location: + if response.status == 303: + method = "GET" + + try: + retries = retries.increment(method, url, response=response, _pool=self) + except MaxRetryError: + if retries.raise_on_redirect: + response.drain_conn() + raise + return response + + response.drain_conn() + retries.sleep_for_retry(response) + log.debug("Redirecting %s -> %s", url, redirect_location) + return self.urlopen( + method, + redirect_location, + body, + headers, + retries=retries, + redirect=redirect, + assert_same_host=assert_same_host, + timeout=timeout, + pool_timeout=pool_timeout, + release_conn=release_conn, + chunked=chunked, + body_pos=body_pos, + **response_kw + ) + + # Check if we should retry the HTTP response. + has_retry_after = bool(response.getheader("Retry-After")) + if retries.is_retry(method, response.status, has_retry_after): + try: + retries = retries.increment(method, url, response=response, _pool=self) + except MaxRetryError: + if retries.raise_on_status: + response.drain_conn() + raise + return response + + response.drain_conn() + retries.sleep(response) + log.debug("Retry: %s", url) + return self.urlopen( + method, + url, + body, + headers, + retries=retries, + redirect=redirect, + assert_same_host=assert_same_host, + timeout=timeout, + pool_timeout=pool_timeout, + release_conn=release_conn, + chunked=chunked, + body_pos=body_pos, + **response_kw + ) + + return response + + +class HTTPSConnectionPool(HTTPConnectionPool): + """ + Same as :class:`.HTTPConnectionPool`, but HTTPS. + + :class:`.HTTPSConnection` uses one of ``assert_fingerprint``, + ``assert_hostname`` and ``host`` in this order to verify connections. + If ``assert_hostname`` is False, no verification is done. + + The ``key_file``, ``cert_file``, ``cert_reqs``, ``ca_certs``, + ``ca_cert_dir``, ``ssl_version``, ``key_password`` are only used if :mod:`ssl` + is available and are fed into :meth:`urllib3.util.ssl_wrap_socket` to upgrade + the connection socket into an SSL socket. + """ + + scheme = "https" + ConnectionCls = HTTPSConnection + + def __init__( + self, + host, + port=None, + strict=False, + timeout=Timeout.DEFAULT_TIMEOUT, + maxsize=1, + block=False, + headers=None, + retries=None, + _proxy=None, + _proxy_headers=None, + key_file=None, + cert_file=None, + cert_reqs=None, + key_password=None, + ca_certs=None, + ssl_version=None, + assert_hostname=None, + assert_fingerprint=None, + ca_cert_dir=None, + **conn_kw + ): + + HTTPConnectionPool.__init__( + self, + host, + port, + strict, + timeout, + maxsize, + block, + headers, + retries, + _proxy, + _proxy_headers, + **conn_kw + ) + + self.key_file = key_file + self.cert_file = cert_file + self.cert_reqs = cert_reqs + self.key_password = key_password + self.ca_certs = ca_certs + self.ca_cert_dir = ca_cert_dir + self.ssl_version = ssl_version + self.assert_hostname = assert_hostname + self.assert_fingerprint = assert_fingerprint + + def _prepare_conn(self, conn): + """ + Prepare the ``connection`` for :meth:`urllib3.util.ssl_wrap_socket` + and establish the tunnel if proxy is used. + """ + + if isinstance(conn, VerifiedHTTPSConnection): + conn.set_cert( + key_file=self.key_file, + key_password=self.key_password, + cert_file=self.cert_file, + cert_reqs=self.cert_reqs, + ca_certs=self.ca_certs, + ca_cert_dir=self.ca_cert_dir, + assert_hostname=self.assert_hostname, + assert_fingerprint=self.assert_fingerprint, + ) + conn.ssl_version = self.ssl_version + return conn + + def _prepare_proxy(self, conn): + """ + Establishes a tunnel connection through HTTP CONNECT. + + Tunnel connection is established early because otherwise httplib would + improperly set Host: header to proxy's IP:port. + """ + + conn.set_tunnel(self._proxy_host, self.port, self.proxy_headers) + + if self.proxy.scheme == "https": + conn.tls_in_tls_required = True + + conn.connect() + + def _new_conn(self): + """ + Return a fresh :class:`http.client.HTTPSConnection`. + """ + self.num_connections += 1 + log.debug( + "Starting new HTTPS connection (%d): %s:%s", + self.num_connections, + self.host, + self.port or "443", + ) + + if not self.ConnectionCls or self.ConnectionCls is DummyConnection: + raise SSLError( + "Can't connect to HTTPS URL because the SSL module is not available." + ) + + actual_host = self.host + actual_port = self.port + if self.proxy is not None: + actual_host = self.proxy.host + actual_port = self.proxy.port + + conn = self.ConnectionCls( + host=actual_host, + port=actual_port, + timeout=self.timeout.connect_timeout, + strict=self.strict, + cert_file=self.cert_file, + key_file=self.key_file, + key_password=self.key_password, + **self.conn_kw + ) + + return self._prepare_conn(conn) + + def _validate_conn(self, conn): + """ + Called right before a request is made, after the socket is created. + """ + super(HTTPSConnectionPool, self)._validate_conn(conn) + + # Force connect early to allow us to validate the connection. + if not getattr(conn, "sock", None): # AppEngine might not have `.sock` + conn.connect() + + if not conn.is_verified: + warnings.warn( + ( + "Unverified HTTPS request is being made to host '%s'. " + "Adding certificate verification is strongly advised. See: " + "https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html" + "#ssl-warnings" % conn.host + ), + InsecureRequestWarning, + ) + + if getattr(conn, "proxy_is_verified", None) is False: + warnings.warn( + ( + "Unverified HTTPS connection done to an HTTPS proxy. " + "Adding certificate verification is strongly advised. See: " + "https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html" + "#ssl-warnings" + ), + InsecureRequestWarning, + ) + + +def connection_from_url(url, **kw): + """ + Given a url, return an :class:`.ConnectionPool` instance of its host. + + This is a shortcut for not having to parse out the scheme, host, and port + of the url before creating an :class:`.ConnectionPool` instance. + + :param url: + Absolute URL string that must include the scheme. Port is optional. + + :param \\**kw: + Passes additional parameters to the constructor of the appropriate + :class:`.ConnectionPool`. Useful for specifying things like + timeout, maxsize, headers, etc. + + Example:: + + >>> conn = connection_from_url('http://google.com/') + >>> r = conn.request('GET', '/') + """ + scheme, host, port = get_host(url) + port = port or port_by_scheme.get(scheme, 80) + if scheme == "https": + return HTTPSConnectionPool(host, port=port, **kw) + else: + return HTTPConnectionPool(host, port=port, **kw) + + +def _normalize_host(host, scheme): + """ + Normalize hosts for comparisons and use with sockets. + """ + + host = normalize_host(host, scheme) + + # httplib doesn't like it when we include brackets in IPv6 addresses + # Specifically, if we include brackets but also pass the port then + # httplib crazily doubles up the square brackets on the Host header. + # Instead, we need to make sure we never pass ``None`` as the port. + # However, for backward compatibility reasons we can't actually + # *assert* that. See http://bugs.python.org/issue28539 + if host.startswith("[") and host.endswith("]"): + host = host[1:-1] + return host diff --git a/_vendor/urllib3/contrib/__init__.py b/_vendor/urllib3/contrib/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/_vendor/urllib3/contrib/__pycache__/__init__.cpython-310.pyc b/_vendor/urllib3/contrib/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..0fb06356424bbfba436cb769628919d99bb2b768 GIT binary patch literal 156 zcmd1j<>g`k0^S>8$sqbMh(HF6K#l_t7qb9~6oz01O-8?!3`HPe1o6vWza+OnzaX_hM#Xs?_&_r?JjJ82R%V98^T?VX?Rn^{qX9NT!I~p;qzr4G%##YN1>)|ZTJ`izxg9fwyMpu* zic=~2j8M>N$Q9NC6RK&Xv5qO;NK@S49mXl9yw9ZIUCMR6{1YNT&B(~<;ehfMrmBF@ z=nSQK?VKU->NIO^w!~DBh$u{gFioj7n=Qf_gg_=omq_N|b1Q!B__~|=DNEOMC_7ZI zJ^93*(*AnnC+yHq2Ratq@5uzTbw3hZOE{j`3Pw@a(?M1NPh-C&6Qu#P;>ZFlGpU$6 zo60h5Oe$hdJI5|@?jquz7$CjyA>`YlsgPP>c4Pqq2NUYSpBJ2}VwQ*hni_WZvgOOxDnP_hb&yanQP zY1`sI)tkOtFt_8bnV=>;xVUF7my9sljK6Wyn(v7L!abeeq^YD)s41y$-85|dSWZ@E znm6e7yXpZLvaIA>c?b5jVpa?SsE{BSB4;|z@?{aQVcCZ_Jy|EEm%~5RD-)D~;gFIjS$1s4jwkUgN^NRwXSb-E4dOVmYpgB1mfUToKu06ap)~Sb zm@`A!Bu3d_ou>j>6zFRnBw$fs|APJj1-fs2F6OmQdFWG7U^ly|`}@vZL|uZWB{7F* z&gHwG?{XMTO&JnCQ~&l?J>^d%>EG#P@}uMBBRuiEEJ?0pNv`ZFz8ol)B2!=WRZA7W znx%=~npJZ(x8~P_hSdmkOAne>GcYV8Xj!eGZMCsabL;+8Fl|kXe#4&$I#x&Yb$>RP zv*tv<>7NMZEg;5v!#^3EvQDAja@+nJ!D;KXERA(wobt~EXRWic^m8d}X%c&L^f$6Z zUstuxekz6X3yEpF=h*o@*?Q}~BVLcxkI0s10HRAE{jda z97K_C22SW~Fm5KBPGSyYOx%y64J^Df7??}ph8MD{v9b2->BD<0>1~=TjBk5AW`3}l zB!l?&;$qK_hHiI5Z0h!+V9^;2nAo@IM!k4(FiJL~aB;}}J^}b}&F&h;(n}{80Ld^0 z^4qr!!^Ef0qrk*E-&?mNJ$?!s+>kO;d-!Z-jhmsB-+H8v{&-FfoBTxXkJ=t8Egftf_b~=J8^t_tI-rkju)}@;shtx0sHzSY_bNzC#Y~Bm=|zVebV7)WH{ur!b-}5_|-_L zs6cQH)?vm&m@RB79#%?EvgFOH6|HIvMy z@T=xMpS|<|*!aN$>=!#0A)0Ffa%q)x7RZQPhr32;q6ZXC))@^GNEAjFg?(>h$i)#c zaS()bU^C#?<53u}Ffl8>yT&&ZcNgSr##xUef0!^k_s`4UC^S*en#BDQ=Mm3Z)cv`` zL&!IqdgQ!($`U@x=cbM2wunVN;%f3k+djhcpKUZuvSefx ziYp_MD%t7kyg%`s1kNKUcwGLCn(4M3Isvoo%&_e|(xTtC?azjepU?b8;->*sG~a%- zm;{5xfj79GID7;C{Qb|oAG7USy+s7SiI7R5aIpw;`+>DP81WN;b)QJp(CCsTi;?f; zh|ggexHxr$3nB4kK9Bi*0`uM(8haDX&!}^@d^>`qhMAA>#A|5w#b&8Z1z)wPB5^_5 z^`(q7tnN0xl#qt$ZWF(CR}o*8HMaDA%{AN>RyEzWJB3*zPl&8mo(NfOSAi-{WSxqM z!u2{W6=@C~%DYh*l7odShj$g34f**aIgMH50F$8t{!hTj)1_j!NQvlh9f?P-$AQTo z!H2{Nb6hj(=kcU;(k2UrFck&|hFA+#UK8F7&O9EjZ(%RFr3&nXBP8#S6s?Ec2AjQ5 zP(?IM_zvV&Lpr7T30|WBEtdUYS8{A#Mj~8>Yh5R{5(FLJH@V{>>cP{NUZs+Lc@TsN zt(jhb-$A~&&lvcnc<>X! z?&Af|0vLok5Gf<}ejhFep-Ut@X6%g-f+;Je=s5l)oBoxc@P*?#tF7K)i z=)~zN!a7pA17Y4g?j%;gW26gZT3e8SwAXQQo~S(hwT2=qvi4fj@T+QnY&Yt1UG6C3Gu8Pmyl1y0w@2}>{7|1BVKihtDJfoF z7DyLlehEW|2*{eY4VT2YZKs%xDL2sM@!4Y#7R!1BxcpH60LDD>F5k;hY64}ZvzI+P z84Xz0pdJLA)y2^IVQQcTN)Zfb-)Na-I zZz1VZ{I@ynZtE2&Pup8>xb5c(|5tZvM;^DZ;xy#0r0o>9C|_wiHAr|K@|zj`M}FfX zV0?2BMqT<8HVtZOyJyn&o(uuY2OX~XS& zt>%=kNXc8E`+_^W2ba1t19&D@gT{1bPX!-$kJ2YF&83QPwYA;1bNmG!rB8NL;yLkk zt;CbIaR%p?p<7A1x6sHM183w%j+@oh1=;R+ zZWXYRjE%6YK#wH64j&vx;rPh}x+2E@ulUMnT;jWRa}wXB3ZfgKqNd!VObv1&-8L`h zo^(7%s1B0mEkd@Liu({`%X*0^tJwqGM2+X47A#QhcsVw&e~5NL6@Hmk=lo@jB(G-1 zEm4_Vzte|P95=-aVJFAF9=Ri-uH32Lf*SbyXcpc<-GGvyiVZZA)e>Z7zKA|qO~ein z0kV@~X;qaKc!g4}lb;kiUV7PM%w?{~(|8l`teFR)2u+Zc7|m3a^dheD2F*`>61@n? zvhqE+MUlgOqB4UY4H z>}1Y=E=}8y@~fO|R-~eK6jp|u)lu^%!#HbtVUIIPh_jj4XKY|2?H3{(WvU--WHpzq z4>vgZbWvPJxTGW{M1Ix;wmiUQI_?Q6_>QugfU?lZjcrh;<*WAu(wTh=P6x1Yb@ z*J;%a+9b1V>L7EorI}QWS?y{FD6*MN+=&S)Y=;czP+a2_kze77{{>CEttj)dhEPx6 zIvyQgO*VelF$`J%qNB9)IYs+UujTL4v<5R`4~>7(sh1vO_9tZE{HK#{wb1KF{ffq zOEp)+-1SsL%3H%o4W1ffIYG<=BXeq@RlWsQ%i7<%wHYZT;LMt)9gP?NRtqi2I5w$Kpg#F{#AxcLKuRPv70 zFz4N>SgwY$W;q%2r`UAZAWX6Thw=MIQ_usH(nZn{H*~=CL@o>DA|3u1om5VwEqN&M2316fLhr8>egP(; zy3$aNPobw#kDsHu%9WGG9@SOymcD`(hM_Ev-R}=p8?X!9AKRyIGev=6uReIR^!V9oW_Y;&&aa*k;ixJ? z?E+oX6$(F(E&MHNPEhlwXcm;*9a5Y+tfD`|*crsmcpe=RzabZX2_B|iLmhDCs1nG} z9}ZqU6#&W)^{IRnVkgs2NbvG2C7w>?EeIVMngoH%U#UBE_O$p7v^CMz`FT3QC~lj% z;30B#89a!HN(Yd{HQuaLa4@OKt?OART8)A8hF0Gx=JAWRgfqBcE;iN|YZ`4Ju*2zX2uWoIsz8?ix5G7BLw3U{a}g;Gr<5d5 zel850-gDdy#@*O^*(J{xci|3D?{}dt{NI#k2}S-ZYI+gOg=e&kVdD9?LV$LKDy_B{ zC{r(S(j-nwu;z>Z(VX%xQT$cuxBaD5UJwS(e0~{MAn}C z3p1Oad@KLZ%;qpk*^)ou>{kFGJ9Q)o*ui!XAE&8I{~*7>{t&h##iUS8YQIYkSC>tt gt+x@&^RJ?G@(kd$p>@=b*3qP2)Hmsxp^nr4KUppk<^TWy literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/contrib/__pycache__/ntlmpool.cpython-310.pyc b/_vendor/urllib3/contrib/__pycache__/ntlmpool.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..32a135c8287ec16f9f9bf87c938f98780b1f2c55 GIT binary patch literal 3591 zcmb7HTW{OQ6(%W?qGm?voEDEDLSjp@vY^`7AyI<+ft#joJ68Jj)Jx73&w z+dbR2(Y9GNuJ#`UFB+tirLW?pG*hC44S{yeKZ z)>i9--?+`z{Rdvy&$~Ryqjs1_Nyp35G`{M!(uH9<9QgxpGNE_ zH?F(KP+MEo%lU9yrZJ8RqF$DYyos?|hv)axPKOJ0%p{L{$HsW|(!Eye;p01LlJIsO zrO89!B_aPa9KNq>TC2;w4<--*NU78yVWi{-UN2?+n0t}*7|#TU0ibP|Fz+CWV{e;# zg7?yWj75nzk>c&&Y+T29%tOhqo{U07lIC8x4RLwu$$mzPcv0?UBF(sn4?PBhVM<_Q znn*8>B%KDy$~0pWO4zUy<=y_aGT+pA)4vlV-n{wan+UMRR1dVR@-m+p9Z z7f2>*WeOua+3Uf*bQ1jRQ5#mHqsb+WHaX$!M^QF zSB`Hni`lO<->y~hb87flUCmRh)%@xgnyL8?B5k%@q(J+o%Lc!2J$zd|z$8o(hWFlz z$29Tw5p)1d+F`}i4RGef|0-aWtkR+|l>7m`X@&Kr z{wH16ib|mcl>#$?S?EU=-NcbGvwF!oWej|VO{w~D#8PjfOT0M<)wv~N6&`NVU(1nnlrM4)oN)< z9`A@H6245;9EmhT(UGOScR+uAmzD=vD02A~ZhsK8W55l9ue8^nuI0UKEsL^iIhOML z+7F*cAM*WM?KLpVT6UOs)8vF_CYO9|ddVBvp_s*S-$#*j?uu>ewqDogbQizDyKhHk zW2$SLEHV8^2nEv}6!}lg6o{)`(DX-|p#=!4BZDC*b}_z-VA?fDCWskVCDMmFvxWw< zhn3u#%!0iCXber}`LO)}K%ELJbDxsj3zSyphaunP+9MK(XuhgGHxouYbI z`+Q+oD{4$*3%^IGvvYff_%-?qOr!qLdA?UTOzUgn5BU;X#I;dUc8nDu`JE1JmJ4U3 zKQo5za0b2e1)*O-xqx!9m>F5aI&+Hp|EVom_ggePwZb}wjyh6OhR;HGlYB9EtvfG6bkpo@xi%l^D*AH$zMii<@@jd3J3*j`n#uyAHxgMKnO_O_RaG!NI|`GwGPG8l~AyWnP+; zP6kzVb2o#tMbhm@3WdpM-BxzQS|JmNA#egWC!Vcu6Wm>evhjGx&uxNtJc z!aO7?-me;s#^=Y3R5h-8#}+j#b?)GMPZItj8#5MGis?yXiM0FpZ&)7v8Mgy=8k3#i zyW<^V4EeTqAW}Rt=)Nn$0vS!2X>j?en!^rYzuHkz%iJ7-}j8eJqMh)Y*z#d(Eu0>pO#I2d>Q83H`% zlqT7ytYF9oNZDn=U!+)@%m@2njF9rry){>4upT!~g z+fmzkvLoIhXsUXbfYpM8A1L2kM^|=H%~ed@(9QAhKTefe3xPFi&Kt9`fOfq?YaNtj{i33D2QAxhA#-q1`#$W&@3#_V0BalO;noVJ?s;g zQLR=)o!TU|tm0jOmteB$j2&k85IiX>D;O`$?UWsg8)}_EoJCxgj^Hf9qckrUkO{fS z1Bv_|5FLn%B=*F{;v;k=6*|sw$zrau)Zm?OvA`6F)oh9%VMD96TB8I{w-E{64TA9l z676~rJnx6`WTqMfENx@hmhCPcZ7Q*f4_520<+W4`vSlOz5h!G&xHj4rpU62E8am%kh9czhUojm+;GoOwni%&@252zx?ol)b& k;HC5N*hHVu3qjJjsnspVsOxnDKixE-i)sGbah5Cp1$8^@F#rGn literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/contrib/__pycache__/pyopenssl.cpython-310.pyc b/_vendor/urllib3/contrib/__pycache__/pyopenssl.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..45ba9665a83308c4416ac3e9a74f4af39a2f1e4b GIT binary patch literal 15736 zcma)jTW}m#dR})=&jo`42!P<7E44*Y!{P%Ov7#quK_>KL~kIUwqru`)!27ehm+{Wd7W@wtD z6*Wh9jH+HUiiXa5qM9h0xSQ2vEmcfOTe6z2Wr`zGPgS$E(c-ACbu#FcuI6fE#W7ub zq}3-)%^h#QrEC0qUvo0f$QPP3;vRdJD2{!i)%9J%&sHaDlf_AaHCmmj9WPExJ%{>< z;)w|E7@kfRPY%E>hj5)l@uV~E9IKwHoi3i%wI19=^-S@M;D5GwR_^DD=j49AcphI& zRKHbwsrVAc8h0kEFW0Q1CH1N5&(vNizM^aH`K=4iarafcpZ<*m-koqxZWzUj&Z**S z?n_&jTyyL4R^ELjx}V*;BDL2miQ-jv#y#tterBluh#LAiXQa+A3hq_+?AGi%n)Eq~ z_CJsMoRd2HT$4W6qdw=+9z=bA$@M5&)KavWaMw7_NLU{LhbFS#=bv$N&{B6 z-0wIqIWK>qxwrP-+1KuB&-7<{@$WcR@mmab-;8_rc{ z<_o>}Vcl>~7e91Abnn?8qHn>OMc-NJyX0JRt^>w>C$X&MZ)|zVePo8vfj1`x$G*xvR)~dd>5VT12C5wzI&A*EyrCiwW_{Vt*oh%s-UCO z$X=;8{41yoLa@r4Zh5;>-}sIUT6bNC!=Y2jaVkWpR0S$(TaYMKD-MRu4xs>KmFHI1 z3)$?-X2r7z!xJplWsU%DHB05~(uUyc`K4;rb#7&|SFF`$`+n1{FE8I)wXMsTkB{Mn za@XH1Tq|75vrk#In|@0CG+m36!+L@Zz?C~#^COw&D$uJ|v$xh;_42LNPg|-AhPzoPH|oBstQC5&3zhm7 zXkl0Ce#4G>t%fT{?ul8LsAtz)2#PD*xaMwvziTD(r}e?g$^#JXaSL4H6)a&j5@!vR zZqzA5R>@jj^(wwwZh3yAR_VB_tJzw^X;mQ=5WbRcmFjJ)0pcmkuhd+88;^yz&1RKC z1(ruU2KKC$$AMQ@V~kg?M)C+YKZ4jHfkSfps(nl7PTE&$q5xh9vQLT`~o>juKQIi3Ru>iXrR=34zRPVpKA5vw;PJ z6j)xxfrPBDgH5c)I)uk7tyTFcl*264UKUK=RIcZ7eFn6ib=iZgt_gG4 z+Ia{MM8Wpzm0Q-P?>D_$v$Jl!uv^)#G+n1sDm2u_ET3kVT?GwbFO_Ppy;yf54v??Q ziaZj+{M*3D_%?7Uw^YS%+wPNQwNdf&0;nekeJH!Ty943@Y@!kSs;=L6P!AO<4e3ew z?DyD!v1zSA?rO8!Th6Qq@7Hvb@_KNrwB|LcE#I|6He5oR`Q+Qzeirxi8ps8;glf*7 z>)RDPPk&U8R^4^xpZHL&AbgoH2Y)&qZsYQDC|s?mJ6h3jbeKXz!4hgq`9zSh?K-Jz z2U*(=c>wjCZ9i_6s^OcjG(|U0if?Yu`nBdPbkvMrQX8&6^Ty-Kx80qae9mbzSoA4S-g*G(xs@djhdj*@=+bN*P+Q9Yt&U= z!=EJiCP^ZSuMIuq@;w^OmS3sjp71J9a6A6s;r*5SbNBDrU{rhV-s1eyO6T8PdZ9F5 zibVlJ0eb^80R`)b#EG~;r75@8*g>0Uwe^LK_g!T@m-6y_+aj%L(pSZH*kN954&ttf&}d)b~{@PboN)G&IH zov`6n+2ty{kEPCcFAdtSp6aVX^KdzPUIcx}Fy4UuELhfxYQtNG+wX`2fe=U>emZh> zch^+~>f!Igjs;1Z=B%@PsTWQB)T108FL0znZ=RmI3Q`1VOdf86 z3PuMASR9W+n?eXcQ3mn}`9kW7oHD>@!eg(Z?e}qcWVT#t!Z370H=pOyDPsaP*3IXN zy@nJawGhDx)7?geO!tNM6bX>7wu4c+P=H;%i=g=_RHQK9v;$W1wJqIAZYR}CU2V^B zQv32AES4@^1W@4)s0z49J{&yDSz4y2WG%PENZzUXuBuBIBhBE&s>F|Be4=XfHyw&B z8Uz;1O5G_bCyGqrjfc+U27JI?D2vhPZNQ16_dGWc|5;51f4&Tk@8bebvShXD6-Eyh z;%H$P%EK<+&=s0-T)uMznuLpYmgg21ffk&Bg7wIikd*#|JePTg5XG{cc9em@c=nx55zN2izcS`@jp=vmR_r|80=7?>JXh}_EoN#%(P39yB&4V8eM>^CVL!6iZ^D!y6jLWM=oLB`Xb}l-J zyW028!!T=mde_+3)rBq29pg$N&YkNU1l6RyB)*C@8lvV@~x7hz37JX|hUfR^*asNHKd30_v|3If6||VG#m$%>3v|vbmvpEYwn$JQcn5{N($ed+}HVL zUx(X3#~{=BNEq#XQK#U*o=-5Czd^oBHFgkiLvu>H3IZJ}bUgPodc>dtFF1x39yElV zKfMz(s_0oVObae15?B2U)j*mslpnAh)I4LI*vS=%T(2PTmMp>FY*_}fKBX{IFgQZw z2GejLJA`Bc13W?QqPH}({0rEV&cBE^uIk4 zQxAg<1URtkDlL< zSN|pin}Ehaia+Y`MkB zo?D50_5!%dDNfyOg~>U$_fA6k;@N>L#rufdRH?cIeYDbUxX$g6pwSxGO#CJtB+5MX{r0=)v= z4U*J_-T_(%lZUAK7odXoCW>q_tLIF^oYu#ovf$j&!NZmNv6+FhmoR@kk;;5#{8j4I zgpv9QduN`TrurD4mT?XJNZQ-Dyf0AnQ!&K^c0piNv5x`8;-s)wkwjdP!9C@SI9c4& z&Zv{aJ>!fyKEGdI=>~KXY4et^@ z7pi3;jLc@3&pR&<<9_Iyp=nSLa+LeHyuU)x0s31&xvN*eEq|o{rv5bXNbADd!$&Z- z5?f|_7QTTA-vE=^N~()pa|^klZ9`prMBf1KJ~ipt`e{GYHM!x5RDrba>Jf~Q_TA9` z;8=Uv{SfjfV9bSH@#pbqxwaGb^vCwb(fb&$y@`Eo-|&k5q>~_Yv<=|f^Js|eRQpMU zZQ4J+hv>0uo`jFy$B6#-(pSdU&++Swf5bc*gbSiKe}CaepojL&dD>;gbS2D%3in!= ze#LXk|7Kj?h}phnT~zrK!tjBK{OC@Qj?_YsKt=~?#kMyG-$iu0NJC&ES?mR)p{fbn zKfsv5v7)OQ4<*nEEkRE7@n*|+8oTvi^5Oj4{Nl&+ckSg5K3chZ|Ire(R;lhYsTx9& zl-byB38KZc29XTqAPYcI@>nq$79_&~5=f~98K5bT`D7?2P4-A_!vXn}{#bI>49jy?`(89OBEh z7xLwIe=5G*iLj0NGSTBp!ASU0ZD7`-l+_k%+bCiV8zH@9b5hm#uFj&tLi8+GPCaHp zhEj?J9Wv#!Xt5xVD5i`<^}Nd(SwcNw(Pq&>kvIFipnjRHN3p2U^Z zk5HU*d-vIi1|3EP;vq+O7B=_0p$N@KzW$-V@h6K{cPXqA9s8!=VQL+%!91oz!orZg@4TQfQk#!qym)pHfK+^GHGow zfAe`JG5zDtiQ!pCy@&J}zU;dy1QD{&e&iO!?g|~IAmc^4{wPO4eTgm}z=^vuZX9%! z;%^U)p22rQYU%`z4!fW=5`RE7d+5GBYhZvsICEqleB-?8-QR zw~|ly-I&nrbJ5)A)=;mkvF(6JvfnNVJAq0TY(-Zl%-2jMI>(1eEB?{K5F1fA$x1S} zyQsvJC5w0?U3ep1T}{(Y?3rRMlE~$u6+W=Bm)eJbt{dz6x(<&;GJF4&F?3>yesB$Y zISi|?)0mDD4#9X-K`L2ZjmUJ1(=^h(I4e5tB=aw(!aM|mjaIEGVOaFKIJU5OZ+_*I z2lMuw<)!Pz(Kzse7g99lmLzV9gftjktJF)XO_N?bDia^@Ya+l1@B4j%B3jc;0~$F2 z-})z=Gs6TO_~sDDP)CxgYL!LgP?JN8XJoRf;WrSF*l{+D!Q@da8>FKiKLA#$3;+iu zCVGDe1Fo&CE6r8ReQ$|tP41((ll$^|$b3hzSC9%rtKT6(IH9RS4u06-#baNVu_JjI z4fAcGGaqBrmk0G*M8^ox5eYa7r=)~_|A;720V1TVU@sD71?U$PL4ev`Eyu=s5jzr&(0lTwqNokw_q z^Prk%p~6E6*;FQ-F*B*mnart7A~TxFWXx<9`O8Euq1an(q9}9G;vefh9sd#@Vv>c6 z=tJ!wI5ix@N&E)Wfo8a%n6uy-Q}P(TjOD<@i3}G9L0an`wipI5mrQFWKJ@Sh#GHD8 zR!aRYDrH|qR#*Gm(!CJ`9yW@&pTL8isP+(wHd-ig@sD+qd=8g) z1qJQ*8E}Nn!v#>zP~33r@QmGcl-N~AnWmtt@1lD?6HMB1)-KW*UXVd%SkzG8)&%K@ z7J+G({U^vXG@8uGAYmbgNA1mq=Tlk5p5i|S^aG3}a`mstLzFpgB&3j=@0{sPFdE{; zi3xlgPL=#mn-qJjy80&^?U6acJxVQhKMn|h!Ddh!kr`TAq}u2CINpr8k8cz#IpK>BS^W2wjahTe9|~XNUkM? zMEx3z$nKIp!D*rq9hHuULT+-?JBpjsAL5h$8jmxsck+iw^dfMF=+%?k*8r1pi&HQL zwx341$?1T-uoZ!=r@dsK)vyhreh$5{?U$|K`>|US2~OiP72|l44hC)hMvbe z)lzNEDZTp_qzPr%)H*kgo;%miE^n49^}!9b@bi2o6o<3e5Eu*=!v1pLQ~eR3hmsUW z1wC0Rj*-&^KgTYw6^|24Q^}Ed9NClaqv#i>CxM5ocN(u)QU8jNMfLwFYcjKAvR-|h z15S|agrFa;YZgg>X}#08{jq60@Y#!%3K=Lo|I^iF-$n-n=a-%aghx=E3v z)ZPeF7RZ04(2C@}{D;`#O zMc?D>3*<$-_!G|L3Mvdjak3|cLox}N8Z*2j6ir~KIhV;8X{IG%g1(Ums!S~r|5%S5 zEAi26a5T1)i)Q+BTy`vqX0%EH$QR?l0v(%}T{6chQ z!7D`mr=oUHKTn|fpQgW@3YBvZ#mS-mJS{2*71VVA3r6PUe{~Q$1xBS2x)4PUHO4~n z$inT6&x_~c|Ctl?_#X&fA&$n?B*CR|qyhh@v=Qzv+-6fII^f_1;hqFdYxtjcqPUAA zJQH2uk#9B4{wDheQ+K0(LI7ruq7xFxh`{LvZ7;K5Zt&o~?2i=3K<1qrH{*l*{e%B< zqQ9665B7%#|JCmSh+1SpCV00y9e|052JSv=l||Uix21T7SBcBE!K+S{IzeIt9II|fe2c?peZN3~f`EcMa)qggjY>b~E zZv>SCcR~7^JSCh!s`vjPg_OwR9Yp!BPo~E8lkggOWg*;I#N5VnwwrQlKMO(6j3MuI WHuL(#o7%6WpxDeLV$nqIm;OH~^yU@- literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/contrib/__pycache__/securetransport.cpython-310.pyc b/_vendor/urllib3/contrib/__pycache__/securetransport.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..ac5ad05792e46e21d06502d775ce6b4e670ef1a3 GIT binary patch literal 21859 zcmbV!dvIjgc~{@tw_Dw<)?*~i`*nBrDesJCXJ%jC9j{lTk!ECTBw5nzc(1+bZS}p9 zTGQ&*o_jS~H9huv#{m*!Z=3)z1x0Bn99UifmlG%|0h5G40u)db1$6^eK&n#skNgt@ z0h8?T`+eu$eo0z~^vpf?b)Mh(&iDA8@2b|YgUX6(=iQRCo4%ODQC;E~robygz z&V5dwoco=A*K$*pfsH|D5N%j)x^ie^$Qi+=i93nvAuHjX-SLeC|G7!$3|i=| z*c*>Ij~R(K6IEk7;pW}GRns}=_B)SzgX@nwPau7A{VC^ZuW$F6hY4rY%kO>y=V#pk z=e&1h{Q{0L92apshvO2C%Q&v!cpk?KI9|l@5{{Q~d=keiI9|nZ700J=yoTe`I9|sw zj^i4R2^`mPOyZcraRbLq9Md>HvwFt)Ec!Kr>svTxS4?lHbzL@{Id9&}xq}Z(^*ea} zIUdL}=jGNHt|sK&A-ww^c)rLZdbbq48+u^=l%bM%!`g2}Z*NC$hvhBXdxJ;x_D=M6 zMBYAzH?usVx1Yb7a1XoruO^%~-6L)v&W?N3J%;la+~e*EoWJND-hIpa!b8LPFg%V1fb00^E z$EAepCKnTMY|O2Y64#e2narMO)2?4Z`HV9WQEZ`Z0QSDIV2 zx68p=Z7Z;YH7|!(c5TH*1GSCKa>Y|)wzPmoidDP3!Oj$`fxY4t1N75g_DV&TL0Nl# z2lZ6#`C{pAan;LBS6%O2o4u>uD_2+90pzZ2c&Hs+yLV~q@`akZuvT7O^OTJ)-SgCW zwBkx-uD4R$ss#4jrdM5DoXG`iMNng{yy;7SqpqX&YAvu!#Z4I_dhXWPR#ZPbkMUG1 zJN9;Qhdof9U#r~nP#ucmKOU`;R+iBMNKt_ zGl#B_^k_|^Pm*Dx?szs|=!vs20dB$|z1yHY6 zi1I!&n#y6=3v_MU!5txiVEnd%5TbMdg-#Pz;OCCv#)zkf@SrrM3kUfXsI| zk=JTf_i2a=zod3HgIW$UNEOx2m_1&#y(;7lIL3CpWua@#f@|dsndRk5u`V;f^@gF9 zE79bS*;6&8SGDqreyw^wo^bRMQ@d4hAuiCLs$X`oSYjqE)zD+yE!ToIdwD08X;>4L za>=V=HYh>xBJS_gKBzu6CL_DBT&b1r#?vrS+uTu*K7svAY1F>_+@%*TAbGJhYWpfV z`StB(P++X;1+VGpn+MC4eW4l#MUFsotC+UHbI;o=$`cVYAIt35zocFj3jD} zv_d~3l1ba!YqbsXr*tdM&vm@ArK)IJvxi#)38iIOa3ZiMY$zE?axjxy=Ge&+T!>2; zU~w57CF9b(09lG|%M^$NlFsPaj$Zj|kZNR3O+d6=u1a-$91jg6-CD*ns|IDv2Xz43 z?H)2@i1g#;q`f#dwRC5EVbY#nwC5M*-k82VdEGuYzKHvC=j}VwOE>3kFWJbkFh0BV zrad=hkI%koe|CEI`gwcu^YaUni;MQ$f>bwsYkp>W63?e+CuVM6pPs#8Uqjj1xg~pM z`quOkDqfnim(XZb-Si~NPT9967bb3^_VH`eGt*0N>Uo=*UYcdyQ*#UUxII6YcZ;vlbFQUuRt*M1MG(!@j z6k0(=C_6i;Ya;oDV9i-V7839_2++}|>yzU%s1wsR+fiUF_kH>;qeeJTTozsL6|^3h z{XSe5zOZ0sRB#@~^e@d#%*_-azzY+Y%Gssw8_bgo`zLD3o1%OcVGw4-&?pBxVPAYT z0X_>x)8SwNBE(Zcp;{|=O4U?&vaq~WuDFGu;up56cdNDSYN1pt6k+BC;Ygvx%tfV& zJB1Zh+bC>$8{v^c3F0~M3Z)e;?dqz|5FRa5YDKqDs+1v@bV&%jay1+-1RkwKXo$jH zZ$}3*T#CsP?qZH^4MG9`IOqVb0Z;}c2 z;l0aU_gC8P#TpC;oB8FwaB0tz%Ow!GLdws3Q2gVl_{d7I?b1a99s0#S2mxGAo&emJcgu{L=yk{a6ueH zSm{q=DZ9q~Wc}MgV%KOS9^$$IjAARH1_N_Fc_*=$Xe8II`&Pqr&EtvtsYY@)^)PWC zl(^sHn)fsH@kXYRx|>ji2A*vt{PQ@QcT?(p3_1(0t!$ zq#BuHiTl~0cRk<8jwE*b8b%{?l&$9))^2|z*T_CJ@AsnS-j@>hk@{a~WPArb8n^>o zVlh#*bgTXoKq+3f5`ndz+4+`{xSt1#@oXc%p1t4G0H(5KsBbiS*z(;Zt}-0O)r345 zyleUo5&$oejH0$BWlj_?jJIwrd666c? zW@P7AqrMCZH4XKPjeH|nIIL;fYGpBMjkS(ibzk_YYjME`DY|e*DiyBDmJiG)SfOCF z#iiKOf=LC_1a1XHvNq~q8o-BvWrD1fq+(gan!D@45v0DKRTSqx%m(ERWP$HJdIaJc zi>nIp2s@#mycIu8Vl^sY0uXhO-(b{ftax~(l`yR<3v zYa4jk4SPvPXsVSJPldyBQ}L>+!CFDQL_F-@R`72;w-Aw`7Y>aV-8h5velaI_t&4>{ zF^Qf9Eu9=G16prY1CDh=o8w_RYA{z?gK8}J<+>LdUfVjiWg>*GP@0-C{ym=gUqoW1 zOd|(*CsNPMn3iD~rkODYA^-Y~jG2QZv>xS?89cX;(=;-_XT3K#kT!;pYXtvHW8^*a z|75Zm+^0>HL5U$F^Pc&K>KYp85GRzdO>t6<#mTq+sNy6@?WVE#Q&{e4h?X9R7A)KQ z8Hko_eXNlc(Xt>*IpJT%nWE*>L1s4#(b5Ca@@a^c90f@vS}X{Yv9o{^(~Y=)FCv6c78GHODr@#Z1h5C40i|()FwhB zsue=x-F=0|wkijNF#dQ_17?nfOCUacSXBh*=;Xoi+^(s+?UF-10S*`)QBUHeo?=2V zp`K>)3=^6wVK%nd0yWBqVkz`DC4}@=aZRZ6OfImDg_d1)nfF(iJkR6>CNDC13CU<) zz0B)RGI@o`t4yvUar&2c0?#i1jF8$xi_2GiitpKwR3A9;8p9yfINvp`5oI&ifG*u! zW>7E*e;#i-msuVQt8<}o3FfWL?_+7@{zyyfCMw-ypHOqZj>G>IBwoTX+=OGg2KEt5 zHwhHj@>1(*?g4x?@xZ_?LfY-Y(~O&Ovp8qnoZE|Yjwn6Oy>7odfOFm*bPwU&=MK5U zIQP3F?qQq<+%Z9!4QDVynGb0^*%@+AyJwJN*gfmoIFA5DK8N#R_i^_LoR7E{-KX5A zfiWL-pK(X=xtdWL*~!QHKf%;1KTYyC_YST?L0NwD{Cq2q0tLV zJM8ZqVAuoqhni7VMVM{6J7Hh*vf!3gIJDPIk_8!N3Xx_CbAD5ikD6R1l@+~^yH-Y~ z0L=^yUzp{Rpuw4jo@oD^(vEG|?+q2`Z7JQGGGeWmjIF$p+?Lfi&~&?z>CmC)2z^FVzaL9J_$lyswvny z0l->7+MC5yxVgfP%}VUz3JflJwgTy_Igx{0BAQveS1Y>!?clstS&6?5!LNZP?1KP^ zY}Uhl8W!Vknn=B01C`>&u?k86!?+NlwWZmr)!gi;sd+3VZ*aGW`3kem2KEY2AgwTo zU`fIZtEsoiErTdyzL(CWQ#slsv_$@}e!7cOI?Hu13|Cwlhpakkh#;|U1ZI$YV2mV! zsPyE<==P3XpPU-MJ+oApn4Sk5v?yB)72wODI;Ki*rlAoS z@Ur96vh3YjRSO{2SHczy%yuHlZq4(nPeE zy4sxcScK}K*;*~j_S35DRspEQ+9(n_E@Jm#)vgki-jF>8c85Q>tttbeJN@)ng+_~8 zFgL;^*e~qU<1H-S2D-QCj35taJ6Ywfn5%R9>a!@WXg7`~H3RiTv<}m-{IS{A%|`hG z#8M&3v_&3b>7gDARxPdB`iU;?Y0KUruxWYFLJ`)vj*Euj12S0z3pI=f#(lFs92mP0 z+3U%M39~dASPifh_rt|lHAOfxKTTJ;gYRb6uQo~C&Pn4l^RryiK@G}8_Bpw>A`#HO zs(KV1b0KRutVzbQ^KsD@#Z(V6hS`a!1&`e1jatzXY&PTcH7^N~sV}hRF6lii^ek33 ztA%Ff_es`%WVS2|i_*l>%o!)l`eXZ$wzFi1OF-&2U4nmzn-+z!NE7Sk3aDBihV&+d z4PXnP@V$gO3jY~&g}Ss>j3dArV5T3XZ@+_udOr;#z1K}P((ya-%+p^=i;;~pjqD(W zTGJ0<3&HwSs>(^S$wLtkRd*1e&2m{$6bp<{Kh43ESIQ+SFzk+DYsOx|P8)Zlp7ci#iF4qbxC@24#HJQxvERln zqgO&P&vlM;y~7G9VLKIuxCa_-5&xA=YA2uoRy-%` zZ=1nv98J+Tf~Kf7A?jdnsx`9c1^ z*)VslhtQ!|kbtwS!~-mlYUWbHKe25v6o|n;v``@&Aq0`rsxJgRB0l+q3oIMtc6%Gv zLjxi-733Q!iqM7yf4y(F-^H?j-$2d*F8%f#csAIu=*zcC;n^Xyk;ZwbVM)F4@Y{3T zLCvZX4DXJxMYIEJ8(#dDJW0xv^!i~ynU?zUo?JiC%C(&!3^yB^YPo)9O4ydjnrw{9 z!~;tM6694&-V$Ikv*wezg0(PR_GRM$vkVPr5!TV7ytl>ZD~ec2I0)97z|Q5o=cy$w z0WI0ZOHM8CpaIc~Y8{!?T_n!wxDF_m@oEX71{1AC<~xsl?CUuMoH#>q7QNh-5U=A5 z#?L0BWhHt={TTb0;v)}Qp0=IZ;3H!Nu5xozCQJ!Av}UO?Q>S`S%Xs!3GBcg>yqSk0 zIrYc_<^&|l97)sS%Ncp#OFS~>5bi7>Q-V&J)(?4=H_S(SY{E_%P@f2G zBiy|UjwX77!+My6Ly>}2maH#~TT7bnjIHzDCFTc(r|fpshZ()#wGUHd|^Kz+?Mil@2^G{W}c<>IOV3 z_Ua+YZ3IJHN$tIZavBy#Cjk!6lAlrcVaaW^*Nvw~!m%9H7WC zH`UQbT75S-{vh#1daEaJoD5DO=Lz6vJr78`(S=wQadHz`EEQbozH0;KnDG8JB{D@ zh0&h+H=DX}JjSiCQx0EdL%TBAV}rJ?y4Wngi?|)}n4s^}7J{p`U|d6K(|d!_ywj{{ zTcZ?_8>Ddq9STAV940bjd|(Ygy~B~z>ak60mLENO^kvbD_0(3da^dBr`f#%gVySDa z{V8ooi%@{n2)v1CD~)p6>Ay>1A^Vz(h&<8vivcoja1D#(aQcu3l3{vo3foOSc1bCH zns`+cs6N^SWW_H;+Hl9U1M$a}Ds-k#W*#HZEU9NIBmBec7i#&77*pIhbXL2ruhI+0zx2#pIX zYfkWc=NxI&@#q=|aCfe{C{cXlTfv$dV6(GK=9tjLRmAX|L(#Ze@>Jd7^E{s4j5$VQ zj?~J69y-VMc0#NE2_RP$4`!2k2bq9Lic35Iwt&@8fd3s-Nr4J$5MkQ8QLYvuqs8gn zD83utguQLM*bumSOB-9Z&f(T|VH2C_n`;UdW!T?ohl@ZC)8sU4q<6~XFxzCnkdm3* zv4*f4AadDylu4#xSU@5hnMXPE)F1RyN+)w7ndxI?l9^;K*$)}sPr03@1m{yL*$-C% zCd#8hk?)Y}Mh>!^XSfj9M=%Zhe?gWX?KD-Iy(ytL%^$A`1&I`=c!x9*mLGXd| z5T>bZtF;det)V&xs{RbJyo5@Az>0E4eWbHtU3O2aNo1B*sfyXEYuvR|z5)9O*XGOU zR)NnA1QXUhd<1rfHbh6;#(axX-b&Cm2O7(RnoqY@s6+0LHtDbr!zrO*t$TNwnAcnEBR#vKegbQr>xMiYE40FO!85P|2lm{4Cs zR&<)fc1EHQ3z#MFDx#e)^&E4ggw_r>r?4ZXK8)j)Y%%4a=2%jMY+WxX;oSJbjDQV2{&AcU!G}@{S>P;8L7Su3lke zS-oIne8CYUo1iAPO&<{C>>-8%W=5<=m$P=RgPD^-W<3iQez9R94uj16V$i#rk6f`n zjdAf^OPtmF=}NaTYQG2x_0t@Aix256-{E$nW<+7*kLO0=HVs>8vGHeF<32Ezn#7BD zNy`yjXnq(P|v4>A7U}cQ-xG<&!IA#DG6JeQj8rnI8 zV}UV!q@73jOlt$HYkDQ@LQn5L93N)bv0jZ97jOiQoy*(m7n zI*?kx<7tk+3}8xaz=rpnJ6KOh_fP65mU^?D!h2_T(!@B~V9-2(6;NH?qpIL;B2WBQi?yCl`q z5{#ii7E?VZchMwi;|R6n1m{gR(*BH;8Sg0bnSIOjGVB5^B96;{<1-2AU!G_#Bh>tY zJjuYpM$7jzsG(o3vgqpoLN+oe3H6TtZFjWwrB++CeenKIb-e$e^Sipo~+l3R9|2=j=t7g5QX zX#p_K$rzlu;RS7A&jcfdT6j?B%keV5=Q<)EoPmico>6Eo^*6Z zr#cRMp$0dx23Y6Mk-;UVVuWE!G!RU41SSN})-c=*NE7Q(?ssvYwEE)v{0}ll4lW0s z4ZKGxE{SRVUtS4(bi8v(w6)nGf+&8PI^tWnq3$IBiZjIw_JDS=k@%4Ib8{21VXOm0 z5}kUQpd@uQ01o|>X5*8L28{0eaDRc{)j-$EC3=^&SZ>9=jZ0Tnbb2BuqhL-@D?->2m$(Z5@Bj zZ*<~sa0u-Kt*0aldyzZ#)19-p0SnD~tFRt{SGe(;$b;XPvBemT5DhdE7rAt$g>r`d zciZ0}gu3JYQrOpVkK49hUFp2N9B(RSV7v;vu&-@V!r=Z3S?>v4klD1COKD0krTgeN zyH#=I!FR9{&BdlR8^TSjOW(j zQ?Gz^wI+pj)1eYB%{x`d%ReXLQts{A~5n)V?ofI!QF{w@vI`9k3x1eir{dI|-6R#YgcCA1&P$8HGPK*)F44^)Z)98vs+wn~~H zlE5tjHLIUw&*}H8514$D3B6Wr_K)(4R+<=D>M!z2hWU_JV2|H;JP zHyCKzr@zq;=S=;5T!e<|=vxZUn1OJam>x8mVKPgPR-u6Zim{L=!~6ZK#y8-TE6PlD z2ubWi{sOMUtae_Z9YYK8{6Glr;*+w~?rkvXK~LN#D|y1;jCA}+tJiV(oTmN5;F>{j zX)nFbK)95I#HGCyKZTd;jF-WiZ1XOq!{ZP*m-VuElV`9T@7zAOA0cZwcfcLQxz|19 z4&j`~XVeUoGY~j;7N2Dw#Z|w1%sq~G1KAVVllV7`FpX30X}lS9hcRo9sT1gO{pST( zp0mWl_~)8nvrMSVm2p;Q$_fIRK@RQ6(WJ;`#y=+0T%1xOG-N` zXTSY6BxD39zx{R;Bq!Thz`7CffzLFhrml81h}~f}QUGxVCUE$#A))hhT<;Xn4>u)P z3n7WP-Y3FMta3O{c$*a$<1?sYGzZK%7S9aQBqRzX6r!OG9OYdbI+`h97ZuR2k9ao- zU!WI=Z)@L?MgBGb6<_+aP*Z+B)Pz&pA=CkUbkrUN5rYVS1HEh$1~zXgppJnQ62Jst zqwODX#cr6k@XatL3eKk5#WDLG;z+!ct*j@^iPR7bdSG zOo+GmByw`!;r8lPM8)il$K8M{dG3HAw`D(Y*rG46zX_xqMl7Hvkr1#uL_Wa16o6@I z3QCJTR{x60_n7QQpnr`QlX1_^m-P5a>1qAliU`#w&hWa-g>wbM3lJ6Mf&e1dSZ^ymL81>NudbPLI!EXlb;P>VH5sxldknu z4EQ=MKnyoYXM8kW|EV^044q32+7;6&LE{p{O#@9aHUQiie=$?i4oq9rbsUaoWB+BE z8^=_~p4$w}lj@^zyk?YeOChVb(EYujR1=Sq;__!^pwRW7lDYKU*rm(Qb_glXGL3xh zRQsIiRhVaQ^$6l2dxqaM-+`8qxxrTeNx%GV*oQx90U)fPfgwCK$DRv~&F=ZjUBw?@ z2>3O}YwvRE*wm3k{Zj`_8&`6t0XBA(EMDNaR`EqGecNq-|}G=F>L^Y^uo)DL#bWf@1Y@)DC(Da z^^ce|m!~0C>OrwU|0tPu0$sAubG5L-CCi!70)Pra4ds7!V$6*;u-ydDz2{L z6GpGL;;SELm9H}Cmg3upn2C0?>!hiTOqpH+dKt?~g0kKJe&6anP`2fN-s-?=TT)_&lz{o|->K<)C~%|4U4s zVIszp#~fL_#6B?n?4E7JzA%RHKk_^UwQ?VM(*NuOVoz zuP9J=PfmPQ0$BH+SJ6?5WOj*b)Zy#YMmpMtuteAk`Gya0MYK658HS6maQw0O4=(s) zF(RR8-omMaB&dK4r&-P8OinR5$>bc8aQF^}C!qRu{g-0^xl4pnXw87L)qBkO7mzql z15GSUPF%k^$#ikNz(1Q&7@u4$Tz=uj!i|Yr1^g+HD=$C)F&QsiemTyFGR~8&8W%pM zzJs!L)pns(TU-AoZjR&s<>w0Xb2D#Vy7Jr$>?Iq2ww1lv_<@-pXJ(GPnRTCW@1Low zmmg2XiE9%v6`yGJuWdMSvr)z$LF*_NhkI~!>|k8oL8RskxApB@t8aS<@}sJ1YmWUo zsH(PX&i;gL>k}&?*1rD~#XZ`;nzn`xuBI)MbA%1W^U%ij&F9PvFy^cw__ibBo^(F;NzWoofsJ})r z@@*!+#N@v+`H;zBCV!m?Z6{w znUF_c#-lJ@Tjpo1TDcRH6{WGCJ_<8eHIn`s!43b{kywfR3*rV)-M0TT8GJor*oK+q z9{^xDj`@-e-gERluKC%^~rsdv-CNCz!|uB9{*m-y_how TlZh|$U;1j^%%#&kBgy{<=qPzg literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/contrib/__pycache__/socks.cpython-310.pyc b/_vendor/urllib3/contrib/__pycache__/socks.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..016e8bc649546472cec6134b021fe2162dae7fcf GIT binary patch literal 5558 zcmb7I&2QYs73bG-xzy_0wru5#Nt4)%NUMBENvkSG9LG+KAc{~aaYGcKsO7AeGMC)U za4oN}YKz!F&`W`$haPI63D8UWAN1P4qTs1OPq`KFp@k1|e{V=?Wl1hjE;!`8nR)Z( zef-|zCgbC_f@}QmpSS+{jH3LLI!7-Ho%e8yORAy-imL=_phap|b2U}jH__80-PLa@ z@p(gG#^6;|p`WBz+)7{smB{Q?-Kwgv$~RVEvg)^3`IWLqbE;9TYrA7|zJ>R?JC1iF zs6`XqNq4e4?2+mHm2jt~=+>$@lT-eD{KT;ZVAH zcOKG>N$EO;bhV(4SCP6=9PAiF1Ka7Rb zy!r1QfC<=GpYC1>x6-!0F zZh4`2UU4q@vBU1BET%o2q+JX&792kgY`Mz{SS1dN{T&Dvrr50?w^Aumm<|>khJ6`# zAZ_YLk+U(_Oj@^v10hQixx#KQVqFFu&_3nC zgn164K3Ly8ZP`laY3rh-1&cpz z+0j*>3C3f;3on4hoSrYlUcv)d2?n5}k33~y+s&pEL!Q-D+i^%!@Hoy|Nf){fSm30I z(-()PkcBh#1|~j(q)#&rb%zOH1ebzAAcCLDbHF%B)R*?eu0ayR zD&)2#W3DCQg~Qw_oQe4XS-2I2aD+t>2F%&(u$W>aW^h0l6WjP;)kUZ{qyspSJnr(y zWo~TTS(chPGEL;RIn>Vbl~D{dbA_#p{D(L!IB4INL2-0Hfemk-CQ~7WREa#{_BIqN z?F8*m6c^z}GCZL=doP54?=Wa0h9~DfpRW!BQav3#57k5Yp}#NtOr-E;7`T-LY;gw; zbbEEx=?&6O65FI&i59tYzch00HIgd~F25&bUF;+xed&K4Y9(iL@=)Y`I7#7uqf^?j z;fYhi04GmbYG|osBJJD9;y4Xke#)Sm0z9O!|L1X~JImvet6W}PE4Mjz_U|d9HPmd< z-;o~6Jirkww*I}A4@`f+dK52lYjD%&F&uIKZ+VoJ2n}~Efr(5L!uO>P3P8+J4SGp> zWJ?5kP;vyCuR5Z~T45VUjw0Y|0jN#KxsFKeCJ3r9Ms#;2n+13Tb2@3-6F`L${5gUL zdJB@4XokrWiVMdhIds;hskv{8Qq`hCkasJ6JTxRtLJLvc-H zT{D}MMjP$C|Dg<%D^4#0pe&}yOAa055OEN863$w=I)rm4^Z`J*?WIdLC5INOpTmo! zGjLDh7O$ciYTuxm`Boh&o|c zmU>}tF~u-T7ni>bSJ<7mT1zM#mU6@>J*jkH{i3_aRaxYL)F!Jb^rV^JvK{m zp3nnI9EGaKtF-oIXed+;po3k7+td!#KwVStrt%qT(bv|L{nt`$7aD?ol-){OYtsrd z&@a$TGcby0rFfdfvsyeY`K$)D2i2iUx;@ZtLd%;lNNNo}&Fj0gHdF$Vf%d4jwR5n? zS1M*`yY}E$s&b&CI(&Jk?~d`5+5;o44~^8ir}6ITYtwOX92*)rr=q9ly`X-e|5D#0 z{u6`W72K<*&)HKNGuZI+gPm5t|ahQv!%U}nqp9;Jfvo$xQSN`TI+5;`-32eD{W%X#Ub$J}B)?Z#h# zwcUxFVY$5QmrTk9#EP3(u>blfC@BZL0`vr6pd9F@P3KY(ev$^tyRV4G{-x`F808fV z65&(Sv1UL{tr#1AI&g+m@-YB)*Yp3 zrllH>HG^8~*As>YF7&27-oJ1nv`aZ)bHEN|QqRk5&&$huyw^SN%f25KBUR5s67oC= z8+?h*GG1U&i$xIzMkk%aD5v8}RQnh&f<7oM#Zc?Ulp(1t5T3XQYTv^xNW~-YCjiaP zNa>GdqV{YYN3?O3|0xW2bycvbo`8(9#mzTt_0@&nu~X&XA7#c zvT3P08C*pfu-_>Xbb(a#c|fRF)>=pB=9!uUA5eRZ;yTaSSR^?GtR2Qc4Y^ZZ*yb4= z`ZB1d$||z5TK}FhSBtQzyvW_ExCsKpztE&eVfWO7>QD=mzQSJ|>cz9Vi-M%Df`Yei zP?&tH9#}~G);*-S+ZyQBFSG;gK*zWd=%6g5m0k0o78nP1d{I&>puSU3O;Dee)GDa& zgIX=-PD`o<>L&%2=9;M$)P^e3kNOqTD$0)9u!fm7?y;dZ)Q5IpKQIr*hGRoB7+X`) zI;A5NB@;tqh@^|c#LNqmbbNOb>nCM_QeS_hu5ukmcTEYSE7#p>{?gehNXrFf+23z` zmj8nQJP%mPco&*46knQCeh&i8P5vCX^5?0c1i~F^UZmzFYADtkQ+xssR66)T0FL*f zFwOLc#hICZo${A4>`rg|?9-or;cb1fam|xfUO7ox&g{?qsLv!YqtGn>1K?Dx@r%^V zQ1er2sQk&!^$@~&Ma6`-Gw|{)8+8fl{2EPks3DoNTHNn?v_fRn4hnOm*=%Oyl5&VL zfGJDdfM21NQUi2ax5&;#5y&M|b|^A{ z`N*E=Zg0yZnc0+!d<%Y9R?9#`W z$ZU4E#pI`z;Dkh(K|^p1nY{A^`x-H!fadhokl7=9a0+WqnJ1eVQOSP1Mk53TGV>Q% zokqI(cM2cJm}}u*j;IMx$~{yUB9ggFW{@LFlKylGz-HE3o=q=PauaK4kO41hg=y=W mq2V%&N6^*7`ea?5(x%iYn7xitAUD7Ec*>ahXbM^LjPYM)0`xZk literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/contrib/_appengine_environ.py b/_vendor/urllib3/contrib/_appengine_environ.py new file mode 100644 index 0000000..8765b90 --- /dev/null +++ b/_vendor/urllib3/contrib/_appengine_environ.py @@ -0,0 +1,36 @@ +""" +This module provides means to detect the App Engine environment. +""" + +import os + + +def is_appengine(): + return is_local_appengine() or is_prod_appengine() + + +def is_appengine_sandbox(): + """Reports if the app is running in the first generation sandbox. + + The second generation runtimes are technically still in a sandbox, but it + is much less restrictive, so generally you shouldn't need to check for it. + see https://cloud.google.com/appengine/docs/standard/runtimes + """ + return is_appengine() and os.environ["APPENGINE_RUNTIME"] == "python27" + + +def is_local_appengine(): + return "APPENGINE_RUNTIME" in os.environ and os.environ.get( + "SERVER_SOFTWARE", "" + ).startswith("Development/") + + +def is_prod_appengine(): + return "APPENGINE_RUNTIME" in os.environ and os.environ.get( + "SERVER_SOFTWARE", "" + ).startswith("Google App Engine/") + + +def is_prod_appengine_mvms(): + """Deprecated.""" + return False diff --git a/_vendor/urllib3/contrib/_securetransport/__init__.py b/_vendor/urllib3/contrib/_securetransport/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/_vendor/urllib3/contrib/_securetransport/__pycache__/__init__.cpython-310.pyc b/_vendor/urllib3/contrib/_securetransport/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..e174a7a815941cea2f23e6b37e0587904d16b1da GIT binary patch literal 173 zcmd1j<>g`k0^S>8$sqbMh(HF6K#l_t7qb9~6oz01O-8?!3`HPe1o10Cza+OnzaX##Lg=0 literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/contrib/_securetransport/__pycache__/bindings.cpython-310.pyc b/_vendor/urllib3/contrib/_securetransport/__pycache__/bindings.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..e79d9275c3a4e811d6bece30f61ffc24fa80360c GIT binary patch literal 10669 zcmbtZTXP#nb_PHYgdmWjB#NSB$r@5uTD((|b+aT807Y0NKm(v?_3nChh;EW24rbt) zfhcmd$*$?WIEk~~_iSQ6Wu2rpw@NCHdCWt8K!T@K!|ZT9&C>O5)?M#mJ@q5(NWGW! z%Kn|k(fToV4DSivWgM^fvA$?TbbNW@s|ZhSblCSqKR>h+{Ui$PB(UhI2pbTm#A)%C z82IuGPkj~LiS0z$S#g#h-iX*AiMM$g@8ARNJ{4Jw^+%{b@8L&2jj(g#9Pi~vcVbMz z+cAC|Z-XMqhD4g37d`BP=w%o2T*7l1&lNnwc;3NtRUBa>qDx%Gc%!I~iNkCh^^2%a zpuB`~66Ix-Qz);XoJKi}@*4QBM7ySBy>eY*Wy{JACV`5@02Hp~|o3eZ)Zmvb~wg_ZGmX9F4S8{y-Y!cW9 z=s61hE^!AsbO0%%g>)#RB_(=9uNcD9CGMd;0leb3SI~Y>%CGuJ7086R=Ff*@E%_}= zXh}e7R!ZvLiSESNV;|`f@FVo`&}ESkkHxao z_GPU|OG{fo&SOMN za-NsH8^Fki8^FfItavDG@-fg1(2s#;#GJp%wlC3^=zZDW@i8ZaxjyEqkG9k3@9Ez3 z(Wd%nIbx>b5%KJc*w(M25&C@+F{7Ii%;VrU^H?Y<{1lWtR#7wJKInb%0Q7;l19}Hv zwxZsHl@xVGG=%SR|Lz$SxFe+yVjmV~8X^9%6i!Kc3s zJSj_0!g(p-2S6u){s3|(0jr3Vu|FK&o;v0Ds2-2u-v zSw2EJDmD2O7|rX`P`~ryy42=JXq!UYk7OI6G@l;>otEVzl(ZUyPk-Xu;wRvok{bRL zT%_So2@&K;gHJyLMml~*@?h~n-VYlOs=p(8W$mP_{jOgdkhS0QYo}!GbJA5EC9Tvc zvZ^{sGg7a?U((WFI=247^B0_nr|C@Fj696+xA>V)Bm9i`{hbc>Gt|%Ww^4sv*1zB# zmB{cpZ7UIpq^j$>qtq?lG=$Q0grn5ltp*C$QdV@6E1I&oZlP_ZY1Y;iYgJjri>q6v zqiATZ;ly9)M=0M8~>1*%+SMU*dg%D)C+PY@12~5I*0$WN0W+khxxSDQ~0W_&Y z4LW$HhA78cbvJ3TE`X;R<}{A=cLY2LQgqD0cdAv!FAp^U<$vod( zx9T(_saC*G?zP&qO$_aM1Giv8Ir39cb4d~zVbwD5&CxXBJ6xAvvhM*^G;1r?GjglI z7fj2A+Hwh`k7D71)%Kg5b$pQIi=F{7wr)zr2o9!(nKoDCMuE>)p{+sgAp53_Pmw&a zI+s@}rP=Corkqy_6=ktpdR)lmbIMSrg8I;ivRtUnm6oasILet~^@&oNRWijV%A-Ot zH=^V}TrB4+6{S>`;tC6k^MyR{LNPnPlq(b;Dl_O?ELD~H!a|`6!PSx+)E8ICqwlP; zkS}NFAU!ivm@ibHcs1`}~Y^khdl*LTBTF5TVXUfXrQhBjd$wQ4CL>CLi*)m4T zFXW5WF^mjM$v;L#smx{O=V>^pTxJO~DU+^BwzT-9TzEKFRpv_bxjev`JT%PA%;&w~ zFv0A6rm!%gRETg-cs$o%cA1QuGgB^aPhr(8ZW51ClDVq1r? z)Jw`Ihoh|{+KOWt_(oK{PJU4wPPgLO-28m&PWXC< zvfOe-D_K)%XHgriu9~Ww?(`Hj8J4+5O^&`TRF~eGUK^O2LE|$^=V}8Qq*rmyss6V8 zvcpp=g}vB8P>VyYmB?u}zL@QkB@-u4U8|KU^szb31}Q9fD>^nDdr2Ad%OuG5q~rtB zhsxx{*iHHIm||1d@)X!r(MK(+E}+W zN3{C)+6qv&z$wOZw_3+Hva=bS6*bMZ?3`HDnugmt0kDerFk{==Ru)b&0|#+hXMH&5 z9i|9>9*I!%xdY9QHKQqZ`){9;D~y8!=aFXUG9>ci&>D=|_Cp`Z13b)UfjJ}M@D4)?th5@!R?TUPD>eB6I1LSl9tCLa zhLoZx=8_@rn5^nZ)sp1WNmV8PRMl2WRlSHB?`c*2xTzU_OP8u5d;#2>ovpz2%(c9U zkPamy)3!rP)!CcUsYB##%-X&J^2gXR90c&#CF0R^r^F5zi?)>qc$_PE3mc2aSe$pj zSaFu%ove!|Sdw?KLp;e+{17{gwlsLUQSU){1od8?Vn@Myj2~vld7Aa1&k5em`gspK z$&auB-pfw$qwF+4#@^z`*%{u)&hiuNZQjq$@smv918k6=Vnh5iJI~)@7x)==k)LIk z_}lC|H+2Zt@9si%+uKe2U%S)9fz4#@^%C**$)P-RJMJ2mB_>@LOz#-)32UhvoQP zmgn!WS$>Z_=Q(2pV9vfd!bDm?8{CfwBGvP{qw6=`ri=wYa+iS@>fLulE|ME`4y2rA@VhmKO^#| zL_R0-C6S*K`7x275&4XW@*m&4(m(hG-bRR&<=fw5$O$4>iHsBZ`X51l3G(ufA|QVV zqFQh+HKy0>XwiDwX*P@m=)GtM0E)?Q5TA17ZFJ?Rh1L5x|LIvxbh{wStVztK)kYTAemj zeE#qg@l_4wY*{aCV%;g!ps9++uS3 z4}nWK&WUft}JmuguK@JqpN8ZBsLLC81aTc|%9y%ue_n0AaW%!o^Vqd;9Q`DI=k>Ww|s| zFp;9Qi}ZW_=Pbu9;xt&$9js_=JqrT1lIiu$ZgJ_}DS(AZm|=4I9$P!DL0P zXvu}F;D&^Po`99Y0oXvsBJ8x+-M4Ey|7CnLYCfBr%M-0+R7w!kOunK{UB96|%r2-% zdZuq)V;A=r%fEr`&GIIvZU*uo`i=7Tv5oEx8`2NS9sZ^!)Wy>Llga6c>!c+~y}HM~ ztK}P+&l5Ave3$h#^L{ff)omuU9{$ z6C4v7Ugl^%!pwx0%4;=8@} zbNny$WYi|@hJP-@3ySMkn=Vd6RkbN(Yb6_o<|0kN9f6mwc)2S@ayA8QHU(_9jOi$u zx9R`pHeD3hhl!+#bQ9?TVTU~#V@+2#WJ=7^$U`=?HQ|go`g1QOPB=2Fv`?c)s|%^H ziVeQi1wuhjtJ7`b6litSwMMH0mmaN7r(x)>P1%xtiU_5twnAhOq}4Tp`xK#>3<*=g zP}| zRu-!yV>h>?da_ih;HtIh5EBhd;Nf6ws-*nk>HTQC1_T`mD?tDfto9_84TM?3`6)Xc zZfQ?V*-@OCbkrkSLMAMgCn*2i3n9FSjU5j`bZp9*_W%siX;Nu`>Xc%8ml`q=pEWcb zxXNo>HVI&I(F1vISvRa43;ZzTWmOA1CyVBHM!MdrAs}1oSQ6ub#zVg79 zcJbOwTnWQp2syUbOcAD3o#rFEcu};c<&n^sGKM|cCQEkg1=JRRLz(cbTS?r?xbOm} z)kW9ucw;BQ5i;>ZA$5Sm^ify;K4K3&0u-j$1J1Pf&myLF#WF7Or3d%#YsJ;J#7_~9 ziuBe6L6I0EO&1?!E0a^+l4B(*^JSs&S^N); zrBPY7v0k!9YlZ-LAzXawjg9|6{7aF#dB1mA) zs>6#YI+erhhNG+tJft2=;zg<^-(*nEXh7J!*sQORpZRy6p4&OB-)lX9`@`l<+Any( zeL5^_Ut5>&AW~xtxUbnCs3_Ku4AB3BJelmAFLDvq-(RYSe_t| z&EUVAmK`#%!v=q2Gu`pBL(oZ_FUU!yfD@ zEB)C2jGB9~3gsl2U z8tEj_Ors%8?sbF~5+m*9>hw=(G@~(Gd zc#kfHoGXYf;*s>ZWb9@%-II=`W65Yb))!4iWBBdCZFBrpG7;-VT=Oc{L0J5oc;atvK_0rkpV86B}$ESkVCQF@a9nM_GJBuna(jHdjObO6VHCp$fD zNF&sLolFwPUh6T)?1j!f@np2e?;9?OyU%~FJ(u787$Aen(n`E5cJ!^Tr z!y0;hgYk$f7E9yyz6UX6?3*-nO2lZa{l64>CSJu6dnR6`I=xv3^YUa$S#ljv|F2|% u#vl%li{z0-&<2ZmydFZlp2cWZ)Dq|$9@87yqlq|4OG)d+UiHTN4*d_$a+2`? literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/contrib/_securetransport/__pycache__/low_level.cpython-310.pyc b/_vendor/urllib3/contrib/_securetransport/__pycache__/low_level.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..73f0bbca71b47df7ce1e6447c6131f5ccfc00b30 GIT binary patch literal 9056 zcmb7KOLN>-cE+o_(O~l-iKHxBwjg^PyEPIuevHTEag>o-l+9SLA!#Xt#OXorQ>3lUjgRiD% z^40PzzLvZaU&~&ZuNAMtSKG5gGqgI@uH!k~DQ~J<^J=;#O8e7cNt7PU92nkgSPm;+ zXx?0ChgDopgibhx>&dVdPUCtioC#-foe%#YoC{BUp?eGA$?z1OEQa&p0x<#p@MTHC0d^LRS?@Qj<@O$Cwc>Z!|tZDT({9oys z=G;tnE_KAV=(wAr(-Sgv+lh3uP2sMIpfAO`^y9Rb$jog;aTvuL>5}8DZ;Dj7z7+1= z-E1?7-F80?vM7mDyy<6L6DOG)Mp6V>XV;aY<7XmtvxK|ej5aohqh7tck~*#a@Es9| zH1*{!HQW#xHSSV*Cy`rAE{5H8qd4gFLyYe3Y$hGywlMUjo3!1|XeCY~k>Wi31_Ah$zO$QR;S+u-_35E!6LHlQeVD z7Hh(aRA-sorJgZEe>;iB9e0GkmGVeEnQTY2ZI0hVxhEs+1K0FZ(e8I#A9G7H9|IrW z93h9>6C|Nna-KpdwcAf2FRgACmBx(*wmK_jjxMyYS!7YRoBkLrFVXMX@<%JT-Ny3j z`pS)!#?|#@e(Jorbm5Qc4wsj2Uw^JXppiyDDwBCMaHR7%W!k=;X%CEC%gkJRq92%0 zCw;K(xcGe(ZHpMfY3*hr%_LTS(G8^FRlAKF*Zs_Qlhy;Mh1-@%*Nu4ZvDZiIy8Sfc z{#pVxs{%WkLVsG&45(({cRE5Yaf7-gEljGYsSX-ER&i>papP*IlLUU2$m^o*_d8i( zc0^p)3uiL7FEvTH@bynGXWicAUevpk`4WnE>D`CX55@L7!R1cWy4+(WzucD{+`V%d zYJ!EeE;m!QkZfcjm!W}8wxy-sZgHv^w42aCze($C@|Z8t7Sdi?rJ8O%lQk5N>^0Td zIC!r;6f%u=c#mP|3zV3>Ll*kHmK%Sg?OEeH6L+Od-=}&jxAIc1ql709 z$_Hgg%o==hL}DH2A=%N;q_cjnBhrcRAk;KX0@B}*gcY&D!&a3Tjx58#%uO6Aj;~(8 z>F1dGXO%rY*F)`$c2Co_hd@+J!jPn1w^<5b8ild+gF?^vPMxMuTU0;X5V3gFlUFWM zha_&}^F?iNiMMz>5w+23-b){n>^td|rSZGpIYT*(4lxs&wVH{XLGjou5Dko){Hr$ z)1PHny1{>zj=!(vBC3yUCW*R)gSFO0fe<3s4xqQ00sS+ee|lDe-kEzwPR>UkL`QUQ zsB>^J1pZ_-6UBqFtuc@&MS~M?6|lGj67K&F5S5}FWZ3$&u!Cl>>C0x1<>s9k^{fPS zKgu>6YABYOq;(Ywkc@h`90QF3XrHd%c)xCXmELZ%g_(Gzpot3xY18%iW|y(qcua_# zl3F<>+D3!6^7mFr5+oeiOxj4oB;L$lqYz>n2R|BtZfIoYz6JO#9RPUAqSA$|9GXw` z$Jp}g+GpqXjI5FyfC)1<)7M6IgK6|&=X!1)7`k?!L{vpthb5k#ly^{*!!9i?b9UEt zz=^I6W^-MB%x!dPpH1!8LI6rzUxbJs1Df`%zp!@n9j#s({Q8Jkk3q_}iuV|<-0Ek3 zt0S&T=?{^G1n$%A|3Th7`l=tLg50m0rk$m=wVTUQg3}O9@uLnnjZ&oB3_V}J_-RZ7 zvJY1dLk#)B`N7$5spF}9;J%*LrZ;r3HQ@DB1$zv z5T+ph7-5FYWXb)M$i|rK5hE6)L)@7ZM2E3mAi~6Wenwt0B4QaQyWot%eb~pgW3Ub= zF!Nz1lOvAog6!~vAnC%zJ{oFc1f$aiZzx?2k{%Pw#*vARfC!G}>ry{!UwR)p$U0^P zKBQi`duQeL`tqs=oFh6q!nuXfiyw(>2yk}+R0MDG3{KwsP!WJrqz0{iyDcR7vNe7% zd9A42S>qWNC3Y=EITW;?^^zpl=*{xerk@VSFUqRRqOAHX%2K4DV#if+fjrW1^ek!i zm6SHoW%>$E^A*b|gD}}9G?BFNnPu8~8JbA<@@+H;$a{}|#1QCU4E+-na-iszA?}uLEAFu2_Yq6Y7TAFHPW-bmcERui8syz>9j=+Sc-TMdif@~F+$y(5f_N}r%J;% z1>883Qz^2(j1f#wkb+<%+my);!;u(StsAweDZ&cq0&t3z3kY;bzf_UQQK1c{?yRk4 ze%4P3cPf&6gm(sPzX3gAdEBD7X+tP^@rE!s$yd=*eveM%+3QwO;<3Eh@m!ig2gJ^s zg#fr}D2AepV5!%CPEvCaZYpHfj1$%V=jfNi0vnF4W{^ncaJC^Z+mML0k3zx`hWoFm z&9!|FwjmCUg61zYa8|??2Rd_Ia&V_fJRuz3W3Y(*GDJ`b%bC4jMacn(Fsn!}aH|Tn z8oZU`?a#gs!A_B&7&1PX)MvH*Y3e1nFlq^X&Y(oXFQvD*l|3A5HaGGTIZSSY8Ngj$ zf{TP2!9~vPZt9@2!&+9K#~R#Vb?}(QH;#o6io(NyTO+*8IJ~^Oe2W6@uAg0WNnKcV z5Dmo?N&=7A1B~C`-WW*&XbTt*f=3RfVQvxF5`hhM?SkDzu>zEo3}V{(id4usg344u zoOBIGdKRY*V&@K!n9v!UA7b+l^uIM8GF4+rYY zN-sq12w@#OeA*KMZbZnQT+&hwyX;m!>V#@vRK$6{exj%VzB_&(is>d~(4@$Ct+~2f z*lkL0WH5oTwI~aE8NE)txgK@g6Gk=sE*w>=)8lq z0%=JzylN;U??vi4lPyt?IdBA`qkrPXg+-;~n>_z*JNb7QGyMrpwQ?C2Sq5kVE}6~a z3i9db23aZ~lwgzq)-kDEGiti=U)Fr>w~hto|BbwcPM%XCavub+Ur{_js&k+zzE8HB z18$k;{~_z{Dq~{muFF0!uMKtG;5@-NaAF`lEM29<2<{o{P9NQ2I3%J{E7uhRn`+z` zKl##-Z(u%!jd&4B2IvNnX?5aY(r!j6@76!j+{sHI)Y0WfD17GZK9 zTFb3$n!G0%TM683W`7n?sUMX0%Gq3Ae!_5?n{85qvj2~OA>O=o%Bzj3km4Og%)nDY zt0?-r*D^<18*i`eM;h?^YOcAPdz8GxRgbp zWj%N+L`G>5`^kVJ7&9=2u6o;f;a@5G^d1*9s` zLNr%_FHwqm#jB|qsKgqGqHOG5J z2^H4If5X@*;hl5h1^pzTbKbB4nTyO#ZBr80Ji2`Yq9+nk}*55B>MXqj=|rtX+#qZ~{V%?) z9yH1t{4*=*h(=KoAG%JGzKGb$4`JP%j?!vLsUYR$0WT`CJY-W8(-O;8Hc2)xlBUw} zZ?PpJ9_a_%b32mgnG+er)l~`RHbmoyf5f77sv6{zD1fn>%p-^3Wa*@hCHWSOH)~#OjmKTDwIj98IFGTnE@-LlsZ|XN>+}}pf~?*J5ITV`Wb{Ipf?;hg8Y1L{KlGc zbjPp_>l>myvW0GsumG}M@~E^?DGczC{c;L^7^DmY2OOu^rlHeMj6XwQu~*JbFlr7P zU^9ANCe431gS^}_bl!x`lI@m1VI8n(8#z3-R`dXyruW#Ejs2;R@+RuO zmQ^22hbFy;(hR>@&1U!K$hr;;ShfwzuI``6t7O?2`+ig~0`-`)XQ>-K$wV|6xO+%1KsUIM+uRnef=T9@;SP@CGX9$~o`J zMjb;I`56|b5b9Nw3bThVn3I5r!l0r`K~t6_owO+N4CQ$|9s);EB43-zKc{}0+?=$4 zJ+Lt);+qiZu}v&af7iBQW77}NkL6nW zj7f3N3`IJ+Wl{Vy$IyYyg=H~-P<%93nlUY74zbY5XNZTM$t}DN0iq}EDM`Iy#N?Y9fQyi=6cZ?0{>HK_1qXlh9Ch__Pj+AIW zeG)vQ0bl4tAaYlsK_C4PwIkmTFKdFGn|TRIk8)@MU#O;(SCFwXfIr|Fr?ovhw~3Vx z-ec{)MsYIP0OkRY3TeU?10u>~Aw<06tvK0<-Nser%OtJrDW!-9=9O#Lo-RJT?%ZtNTV7pTxpRAsGlBgeBPJMZF{i6ni^?|s;{a)Fj|$DM|6o{% zVs9qJe~SzOS7vgy+1n78+#EUB@;9~W{{V?5bejMG literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/contrib/_securetransport/bindings.py b/_vendor/urllib3/contrib/_securetransport/bindings.py new file mode 100644 index 0000000..264d564 --- /dev/null +++ b/_vendor/urllib3/contrib/_securetransport/bindings.py @@ -0,0 +1,519 @@ +""" +This module uses ctypes to bind a whole bunch of functions and constants from +SecureTransport. The goal here is to provide the low-level API to +SecureTransport. These are essentially the C-level functions and constants, and +they're pretty gross to work with. + +This code is a bastardised version of the code found in Will Bond's oscrypto +library. An enormous debt is owed to him for blazing this trail for us. For +that reason, this code should be considered to be covered both by urllib3's +license and by oscrypto's: + + Copyright (c) 2015-2016 Will Bond + + Permission is hereby granted, free of charge, to any person obtaining a + copy of this software and associated documentation files (the "Software"), + to deal in the Software without restriction, including without limitation + the rights to use, copy, modify, merge, publish, distribute, sublicense, + and/or sell copies of the Software, and to permit persons to whom the + Software is furnished to do so, subject to the following conditions: + + The above copyright notice and this permission notice shall be included in + all copies or substantial portions of the Software. + + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER + LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING + FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER + DEALINGS IN THE SOFTWARE. +""" +from __future__ import absolute_import + +import platform +from ctypes import ( + CDLL, + CFUNCTYPE, + POINTER, + c_bool, + c_byte, + c_char_p, + c_int32, + c_long, + c_size_t, + c_uint32, + c_ulong, + c_void_p, +) +from ctypes.util import find_library + +from ...packages.six import raise_from + +if platform.system() != "Darwin": + raise ImportError("Only macOS is supported") + +version = platform.mac_ver()[0] +version_info = tuple(map(int, version.split("."))) +if version_info < (10, 8): + raise OSError( + "Only OS X 10.8 and newer are supported, not %s.%s" + % (version_info[0], version_info[1]) + ) + + +def load_cdll(name, macos10_16_path): + """Loads a CDLL by name, falling back to known path on 10.16+""" + try: + # Big Sur is technically 11 but we use 10.16 due to the Big Sur + # beta being labeled as 10.16. + if version_info >= (10, 16): + path = macos10_16_path + else: + path = find_library(name) + if not path: + raise OSError # Caught and reraised as 'ImportError' + return CDLL(path, use_errno=True) + except OSError: + raise_from(ImportError("The library %s failed to load" % name), None) + + +Security = load_cdll( + "Security", "/System/Library/Frameworks/Security.framework/Security" +) +CoreFoundation = load_cdll( + "CoreFoundation", + "/System/Library/Frameworks/CoreFoundation.framework/CoreFoundation", +) + + +Boolean = c_bool +CFIndex = c_long +CFStringEncoding = c_uint32 +CFData = c_void_p +CFString = c_void_p +CFArray = c_void_p +CFMutableArray = c_void_p +CFDictionary = c_void_p +CFError = c_void_p +CFType = c_void_p +CFTypeID = c_ulong + +CFTypeRef = POINTER(CFType) +CFAllocatorRef = c_void_p + +OSStatus = c_int32 + +CFDataRef = POINTER(CFData) +CFStringRef = POINTER(CFString) +CFArrayRef = POINTER(CFArray) +CFMutableArrayRef = POINTER(CFMutableArray) +CFDictionaryRef = POINTER(CFDictionary) +CFArrayCallBacks = c_void_p +CFDictionaryKeyCallBacks = c_void_p +CFDictionaryValueCallBacks = c_void_p + +SecCertificateRef = POINTER(c_void_p) +SecExternalFormat = c_uint32 +SecExternalItemType = c_uint32 +SecIdentityRef = POINTER(c_void_p) +SecItemImportExportFlags = c_uint32 +SecItemImportExportKeyParameters = c_void_p +SecKeychainRef = POINTER(c_void_p) +SSLProtocol = c_uint32 +SSLCipherSuite = c_uint32 +SSLContextRef = POINTER(c_void_p) +SecTrustRef = POINTER(c_void_p) +SSLConnectionRef = c_uint32 +SecTrustResultType = c_uint32 +SecTrustOptionFlags = c_uint32 +SSLProtocolSide = c_uint32 +SSLConnectionType = c_uint32 +SSLSessionOption = c_uint32 + + +try: + Security.SecItemImport.argtypes = [ + CFDataRef, + CFStringRef, + POINTER(SecExternalFormat), + POINTER(SecExternalItemType), + SecItemImportExportFlags, + POINTER(SecItemImportExportKeyParameters), + SecKeychainRef, + POINTER(CFArrayRef), + ] + Security.SecItemImport.restype = OSStatus + + Security.SecCertificateGetTypeID.argtypes = [] + Security.SecCertificateGetTypeID.restype = CFTypeID + + Security.SecIdentityGetTypeID.argtypes = [] + Security.SecIdentityGetTypeID.restype = CFTypeID + + Security.SecKeyGetTypeID.argtypes = [] + Security.SecKeyGetTypeID.restype = CFTypeID + + Security.SecCertificateCreateWithData.argtypes = [CFAllocatorRef, CFDataRef] + Security.SecCertificateCreateWithData.restype = SecCertificateRef + + Security.SecCertificateCopyData.argtypes = [SecCertificateRef] + Security.SecCertificateCopyData.restype = CFDataRef + + Security.SecCopyErrorMessageString.argtypes = [OSStatus, c_void_p] + Security.SecCopyErrorMessageString.restype = CFStringRef + + Security.SecIdentityCreateWithCertificate.argtypes = [ + CFTypeRef, + SecCertificateRef, + POINTER(SecIdentityRef), + ] + Security.SecIdentityCreateWithCertificate.restype = OSStatus + + Security.SecKeychainCreate.argtypes = [ + c_char_p, + c_uint32, + c_void_p, + Boolean, + c_void_p, + POINTER(SecKeychainRef), + ] + Security.SecKeychainCreate.restype = OSStatus + + Security.SecKeychainDelete.argtypes = [SecKeychainRef] + Security.SecKeychainDelete.restype = OSStatus + + Security.SecPKCS12Import.argtypes = [ + CFDataRef, + CFDictionaryRef, + POINTER(CFArrayRef), + ] + Security.SecPKCS12Import.restype = OSStatus + + SSLReadFunc = CFUNCTYPE(OSStatus, SSLConnectionRef, c_void_p, POINTER(c_size_t)) + SSLWriteFunc = CFUNCTYPE( + OSStatus, SSLConnectionRef, POINTER(c_byte), POINTER(c_size_t) + ) + + Security.SSLSetIOFuncs.argtypes = [SSLContextRef, SSLReadFunc, SSLWriteFunc] + Security.SSLSetIOFuncs.restype = OSStatus + + Security.SSLSetPeerID.argtypes = [SSLContextRef, c_char_p, c_size_t] + Security.SSLSetPeerID.restype = OSStatus + + Security.SSLSetCertificate.argtypes = [SSLContextRef, CFArrayRef] + Security.SSLSetCertificate.restype = OSStatus + + Security.SSLSetCertificateAuthorities.argtypes = [SSLContextRef, CFTypeRef, Boolean] + Security.SSLSetCertificateAuthorities.restype = OSStatus + + Security.SSLSetConnection.argtypes = [SSLContextRef, SSLConnectionRef] + Security.SSLSetConnection.restype = OSStatus + + Security.SSLSetPeerDomainName.argtypes = [SSLContextRef, c_char_p, c_size_t] + Security.SSLSetPeerDomainName.restype = OSStatus + + Security.SSLHandshake.argtypes = [SSLContextRef] + Security.SSLHandshake.restype = OSStatus + + Security.SSLRead.argtypes = [SSLContextRef, c_char_p, c_size_t, POINTER(c_size_t)] + Security.SSLRead.restype = OSStatus + + Security.SSLWrite.argtypes = [SSLContextRef, c_char_p, c_size_t, POINTER(c_size_t)] + Security.SSLWrite.restype = OSStatus + + Security.SSLClose.argtypes = [SSLContextRef] + Security.SSLClose.restype = OSStatus + + Security.SSLGetNumberSupportedCiphers.argtypes = [SSLContextRef, POINTER(c_size_t)] + Security.SSLGetNumberSupportedCiphers.restype = OSStatus + + Security.SSLGetSupportedCiphers.argtypes = [ + SSLContextRef, + POINTER(SSLCipherSuite), + POINTER(c_size_t), + ] + Security.SSLGetSupportedCiphers.restype = OSStatus + + Security.SSLSetEnabledCiphers.argtypes = [ + SSLContextRef, + POINTER(SSLCipherSuite), + c_size_t, + ] + Security.SSLSetEnabledCiphers.restype = OSStatus + + Security.SSLGetNumberEnabledCiphers.argtype = [SSLContextRef, POINTER(c_size_t)] + Security.SSLGetNumberEnabledCiphers.restype = OSStatus + + Security.SSLGetEnabledCiphers.argtypes = [ + SSLContextRef, + POINTER(SSLCipherSuite), + POINTER(c_size_t), + ] + Security.SSLGetEnabledCiphers.restype = OSStatus + + Security.SSLGetNegotiatedCipher.argtypes = [SSLContextRef, POINTER(SSLCipherSuite)] + Security.SSLGetNegotiatedCipher.restype = OSStatus + + Security.SSLGetNegotiatedProtocolVersion.argtypes = [ + SSLContextRef, + POINTER(SSLProtocol), + ] + Security.SSLGetNegotiatedProtocolVersion.restype = OSStatus + + Security.SSLCopyPeerTrust.argtypes = [SSLContextRef, POINTER(SecTrustRef)] + Security.SSLCopyPeerTrust.restype = OSStatus + + Security.SecTrustSetAnchorCertificates.argtypes = [SecTrustRef, CFArrayRef] + Security.SecTrustSetAnchorCertificates.restype = OSStatus + + Security.SecTrustSetAnchorCertificatesOnly.argstypes = [SecTrustRef, Boolean] + Security.SecTrustSetAnchorCertificatesOnly.restype = OSStatus + + Security.SecTrustEvaluate.argtypes = [SecTrustRef, POINTER(SecTrustResultType)] + Security.SecTrustEvaluate.restype = OSStatus + + Security.SecTrustGetCertificateCount.argtypes = [SecTrustRef] + Security.SecTrustGetCertificateCount.restype = CFIndex + + Security.SecTrustGetCertificateAtIndex.argtypes = [SecTrustRef, CFIndex] + Security.SecTrustGetCertificateAtIndex.restype = SecCertificateRef + + Security.SSLCreateContext.argtypes = [ + CFAllocatorRef, + SSLProtocolSide, + SSLConnectionType, + ] + Security.SSLCreateContext.restype = SSLContextRef + + Security.SSLSetSessionOption.argtypes = [SSLContextRef, SSLSessionOption, Boolean] + Security.SSLSetSessionOption.restype = OSStatus + + Security.SSLSetProtocolVersionMin.argtypes = [SSLContextRef, SSLProtocol] + Security.SSLSetProtocolVersionMin.restype = OSStatus + + Security.SSLSetProtocolVersionMax.argtypes = [SSLContextRef, SSLProtocol] + Security.SSLSetProtocolVersionMax.restype = OSStatus + + try: + Security.SSLSetALPNProtocols.argtypes = [SSLContextRef, CFArrayRef] + Security.SSLSetALPNProtocols.restype = OSStatus + except AttributeError: + # Supported only in 10.12+ + pass + + Security.SecCopyErrorMessageString.argtypes = [OSStatus, c_void_p] + Security.SecCopyErrorMessageString.restype = CFStringRef + + Security.SSLReadFunc = SSLReadFunc + Security.SSLWriteFunc = SSLWriteFunc + Security.SSLContextRef = SSLContextRef + Security.SSLProtocol = SSLProtocol + Security.SSLCipherSuite = SSLCipherSuite + Security.SecIdentityRef = SecIdentityRef + Security.SecKeychainRef = SecKeychainRef + Security.SecTrustRef = SecTrustRef + Security.SecTrustResultType = SecTrustResultType + Security.SecExternalFormat = SecExternalFormat + Security.OSStatus = OSStatus + + Security.kSecImportExportPassphrase = CFStringRef.in_dll( + Security, "kSecImportExportPassphrase" + ) + Security.kSecImportItemIdentity = CFStringRef.in_dll( + Security, "kSecImportItemIdentity" + ) + + # CoreFoundation time! + CoreFoundation.CFRetain.argtypes = [CFTypeRef] + CoreFoundation.CFRetain.restype = CFTypeRef + + CoreFoundation.CFRelease.argtypes = [CFTypeRef] + CoreFoundation.CFRelease.restype = None + + CoreFoundation.CFGetTypeID.argtypes = [CFTypeRef] + CoreFoundation.CFGetTypeID.restype = CFTypeID + + CoreFoundation.CFStringCreateWithCString.argtypes = [ + CFAllocatorRef, + c_char_p, + CFStringEncoding, + ] + CoreFoundation.CFStringCreateWithCString.restype = CFStringRef + + CoreFoundation.CFStringGetCStringPtr.argtypes = [CFStringRef, CFStringEncoding] + CoreFoundation.CFStringGetCStringPtr.restype = c_char_p + + CoreFoundation.CFStringGetCString.argtypes = [ + CFStringRef, + c_char_p, + CFIndex, + CFStringEncoding, + ] + CoreFoundation.CFStringGetCString.restype = c_bool + + CoreFoundation.CFDataCreate.argtypes = [CFAllocatorRef, c_char_p, CFIndex] + CoreFoundation.CFDataCreate.restype = CFDataRef + + CoreFoundation.CFDataGetLength.argtypes = [CFDataRef] + CoreFoundation.CFDataGetLength.restype = CFIndex + + CoreFoundation.CFDataGetBytePtr.argtypes = [CFDataRef] + CoreFoundation.CFDataGetBytePtr.restype = c_void_p + + CoreFoundation.CFDictionaryCreate.argtypes = [ + CFAllocatorRef, + POINTER(CFTypeRef), + POINTER(CFTypeRef), + CFIndex, + CFDictionaryKeyCallBacks, + CFDictionaryValueCallBacks, + ] + CoreFoundation.CFDictionaryCreate.restype = CFDictionaryRef + + CoreFoundation.CFDictionaryGetValue.argtypes = [CFDictionaryRef, CFTypeRef] + CoreFoundation.CFDictionaryGetValue.restype = CFTypeRef + + CoreFoundation.CFArrayCreate.argtypes = [ + CFAllocatorRef, + POINTER(CFTypeRef), + CFIndex, + CFArrayCallBacks, + ] + CoreFoundation.CFArrayCreate.restype = CFArrayRef + + CoreFoundation.CFArrayCreateMutable.argtypes = [ + CFAllocatorRef, + CFIndex, + CFArrayCallBacks, + ] + CoreFoundation.CFArrayCreateMutable.restype = CFMutableArrayRef + + CoreFoundation.CFArrayAppendValue.argtypes = [CFMutableArrayRef, c_void_p] + CoreFoundation.CFArrayAppendValue.restype = None + + CoreFoundation.CFArrayGetCount.argtypes = [CFArrayRef] + CoreFoundation.CFArrayGetCount.restype = CFIndex + + CoreFoundation.CFArrayGetValueAtIndex.argtypes = [CFArrayRef, CFIndex] + CoreFoundation.CFArrayGetValueAtIndex.restype = c_void_p + + CoreFoundation.kCFAllocatorDefault = CFAllocatorRef.in_dll( + CoreFoundation, "kCFAllocatorDefault" + ) + CoreFoundation.kCFTypeArrayCallBacks = c_void_p.in_dll( + CoreFoundation, "kCFTypeArrayCallBacks" + ) + CoreFoundation.kCFTypeDictionaryKeyCallBacks = c_void_p.in_dll( + CoreFoundation, "kCFTypeDictionaryKeyCallBacks" + ) + CoreFoundation.kCFTypeDictionaryValueCallBacks = c_void_p.in_dll( + CoreFoundation, "kCFTypeDictionaryValueCallBacks" + ) + + CoreFoundation.CFTypeRef = CFTypeRef + CoreFoundation.CFArrayRef = CFArrayRef + CoreFoundation.CFStringRef = CFStringRef + CoreFoundation.CFDictionaryRef = CFDictionaryRef + +except (AttributeError): + raise ImportError("Error initializing ctypes") + + +class CFConst(object): + """ + A class object that acts as essentially a namespace for CoreFoundation + constants. + """ + + kCFStringEncodingUTF8 = CFStringEncoding(0x08000100) + + +class SecurityConst(object): + """ + A class object that acts as essentially a namespace for Security constants. + """ + + kSSLSessionOptionBreakOnServerAuth = 0 + + kSSLProtocol2 = 1 + kSSLProtocol3 = 2 + kTLSProtocol1 = 4 + kTLSProtocol11 = 7 + kTLSProtocol12 = 8 + # SecureTransport does not support TLS 1.3 even if there's a constant for it + kTLSProtocol13 = 10 + kTLSProtocolMaxSupported = 999 + + kSSLClientSide = 1 + kSSLStreamType = 0 + + kSecFormatPEMSequence = 10 + + kSecTrustResultInvalid = 0 + kSecTrustResultProceed = 1 + # This gap is present on purpose: this was kSecTrustResultConfirm, which + # is deprecated. + kSecTrustResultDeny = 3 + kSecTrustResultUnspecified = 4 + kSecTrustResultRecoverableTrustFailure = 5 + kSecTrustResultFatalTrustFailure = 6 + kSecTrustResultOtherError = 7 + + errSSLProtocol = -9800 + errSSLWouldBlock = -9803 + errSSLClosedGraceful = -9805 + errSSLClosedNoNotify = -9816 + errSSLClosedAbort = -9806 + + errSSLXCertChainInvalid = -9807 + errSSLCrypto = -9809 + errSSLInternal = -9810 + errSSLCertExpired = -9814 + errSSLCertNotYetValid = -9815 + errSSLUnknownRootCert = -9812 + errSSLNoRootCert = -9813 + errSSLHostNameMismatch = -9843 + errSSLPeerHandshakeFail = -9824 + errSSLPeerUserCancelled = -9839 + errSSLWeakPeerEphemeralDHKey = -9850 + errSSLServerAuthCompleted = -9841 + errSSLRecordOverflow = -9847 + + errSecVerifyFailed = -67808 + errSecNoTrustSettings = -25263 + errSecItemNotFound = -25300 + errSecInvalidTrustSettings = -25262 + + # Cipher suites. We only pick the ones our default cipher string allows. + # Source: https://developer.apple.com/documentation/security/1550981-ssl_cipher_suite_values + TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 = 0xC02C + TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 = 0xC030 + TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 = 0xC02B + TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 = 0xC02F + TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 = 0xCCA9 + TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 = 0xCCA8 + TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 = 0x009F + TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 = 0x009E + TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 = 0xC024 + TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 = 0xC028 + TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA = 0xC00A + TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA = 0xC014 + TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 = 0x006B + TLS_DHE_RSA_WITH_AES_256_CBC_SHA = 0x0039 + TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 = 0xC023 + TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 = 0xC027 + TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA = 0xC009 + TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA = 0xC013 + TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 = 0x0067 + TLS_DHE_RSA_WITH_AES_128_CBC_SHA = 0x0033 + TLS_RSA_WITH_AES_256_GCM_SHA384 = 0x009D + TLS_RSA_WITH_AES_128_GCM_SHA256 = 0x009C + TLS_RSA_WITH_AES_256_CBC_SHA256 = 0x003D + TLS_RSA_WITH_AES_128_CBC_SHA256 = 0x003C + TLS_RSA_WITH_AES_256_CBC_SHA = 0x0035 + TLS_RSA_WITH_AES_128_CBC_SHA = 0x002F + TLS_AES_128_GCM_SHA256 = 0x1301 + TLS_AES_256_GCM_SHA384 = 0x1302 + TLS_AES_128_CCM_8_SHA256 = 0x1305 + TLS_AES_128_CCM_SHA256 = 0x1304 diff --git a/_vendor/urllib3/contrib/_securetransport/low_level.py b/_vendor/urllib3/contrib/_securetransport/low_level.py new file mode 100644 index 0000000..fa0b245 --- /dev/null +++ b/_vendor/urllib3/contrib/_securetransport/low_level.py @@ -0,0 +1,397 @@ +""" +Low-level helpers for the SecureTransport bindings. + +These are Python functions that are not directly related to the high-level APIs +but are necessary to get them to work. They include a whole bunch of low-level +CoreFoundation messing about and memory management. The concerns in this module +are almost entirely about trying to avoid memory leaks and providing +appropriate and useful assistance to the higher-level code. +""" +import base64 +import ctypes +import itertools +import os +import re +import ssl +import struct +import tempfile + +from .bindings import CFConst, CoreFoundation, Security + +# This regular expression is used to grab PEM data out of a PEM bundle. +_PEM_CERTS_RE = re.compile( + b"-----BEGIN CERTIFICATE-----\n(.*?)\n-----END CERTIFICATE-----", re.DOTALL +) + + +def _cf_data_from_bytes(bytestring): + """ + Given a bytestring, create a CFData object from it. This CFData object must + be CFReleased by the caller. + """ + return CoreFoundation.CFDataCreate( + CoreFoundation.kCFAllocatorDefault, bytestring, len(bytestring) + ) + + +def _cf_dictionary_from_tuples(tuples): + """ + Given a list of Python tuples, create an associated CFDictionary. + """ + dictionary_size = len(tuples) + + # We need to get the dictionary keys and values out in the same order. + keys = (t[0] for t in tuples) + values = (t[1] for t in tuples) + cf_keys = (CoreFoundation.CFTypeRef * dictionary_size)(*keys) + cf_values = (CoreFoundation.CFTypeRef * dictionary_size)(*values) + + return CoreFoundation.CFDictionaryCreate( + CoreFoundation.kCFAllocatorDefault, + cf_keys, + cf_values, + dictionary_size, + CoreFoundation.kCFTypeDictionaryKeyCallBacks, + CoreFoundation.kCFTypeDictionaryValueCallBacks, + ) + + +def _cfstr(py_bstr): + """ + Given a Python binary data, create a CFString. + The string must be CFReleased by the caller. + """ + c_str = ctypes.c_char_p(py_bstr) + cf_str = CoreFoundation.CFStringCreateWithCString( + CoreFoundation.kCFAllocatorDefault, + c_str, + CFConst.kCFStringEncodingUTF8, + ) + return cf_str + + +def _create_cfstring_array(lst): + """ + Given a list of Python binary data, create an associated CFMutableArray. + The array must be CFReleased by the caller. + + Raises an ssl.SSLError on failure. + """ + cf_arr = None + try: + cf_arr = CoreFoundation.CFArrayCreateMutable( + CoreFoundation.kCFAllocatorDefault, + 0, + ctypes.byref(CoreFoundation.kCFTypeArrayCallBacks), + ) + if not cf_arr: + raise MemoryError("Unable to allocate memory!") + for item in lst: + cf_str = _cfstr(item) + if not cf_str: + raise MemoryError("Unable to allocate memory!") + try: + CoreFoundation.CFArrayAppendValue(cf_arr, cf_str) + finally: + CoreFoundation.CFRelease(cf_str) + except BaseException as e: + if cf_arr: + CoreFoundation.CFRelease(cf_arr) + raise ssl.SSLError("Unable to allocate array: %s" % (e,)) + return cf_arr + + +def _cf_string_to_unicode(value): + """ + Creates a Unicode string from a CFString object. Used entirely for error + reporting. + + Yes, it annoys me quite a lot that this function is this complex. + """ + value_as_void_p = ctypes.cast(value, ctypes.POINTER(ctypes.c_void_p)) + + string = CoreFoundation.CFStringGetCStringPtr( + value_as_void_p, CFConst.kCFStringEncodingUTF8 + ) + if string is None: + buffer = ctypes.create_string_buffer(1024) + result = CoreFoundation.CFStringGetCString( + value_as_void_p, buffer, 1024, CFConst.kCFStringEncodingUTF8 + ) + if not result: + raise OSError("Error copying C string from CFStringRef") + string = buffer.value + if string is not None: + string = string.decode("utf-8") + return string + + +def _assert_no_error(error, exception_class=None): + """ + Checks the return code and throws an exception if there is an error to + report + """ + if error == 0: + return + + cf_error_string = Security.SecCopyErrorMessageString(error, None) + output = _cf_string_to_unicode(cf_error_string) + CoreFoundation.CFRelease(cf_error_string) + + if output is None or output == u"": + output = u"OSStatus %s" % error + + if exception_class is None: + exception_class = ssl.SSLError + + raise exception_class(output) + + +def _cert_array_from_pem(pem_bundle): + """ + Given a bundle of certs in PEM format, turns them into a CFArray of certs + that can be used to validate a cert chain. + """ + # Normalize the PEM bundle's line endings. + pem_bundle = pem_bundle.replace(b"\r\n", b"\n") + + der_certs = [ + base64.b64decode(match.group(1)) for match in _PEM_CERTS_RE.finditer(pem_bundle) + ] + if not der_certs: + raise ssl.SSLError("No root certificates specified") + + cert_array = CoreFoundation.CFArrayCreateMutable( + CoreFoundation.kCFAllocatorDefault, + 0, + ctypes.byref(CoreFoundation.kCFTypeArrayCallBacks), + ) + if not cert_array: + raise ssl.SSLError("Unable to allocate memory!") + + try: + for der_bytes in der_certs: + certdata = _cf_data_from_bytes(der_bytes) + if not certdata: + raise ssl.SSLError("Unable to allocate memory!") + cert = Security.SecCertificateCreateWithData( + CoreFoundation.kCFAllocatorDefault, certdata + ) + CoreFoundation.CFRelease(certdata) + if not cert: + raise ssl.SSLError("Unable to build cert object!") + + CoreFoundation.CFArrayAppendValue(cert_array, cert) + CoreFoundation.CFRelease(cert) + except Exception: + # We need to free the array before the exception bubbles further. + # We only want to do that if an error occurs: otherwise, the caller + # should free. + CoreFoundation.CFRelease(cert_array) + raise + + return cert_array + + +def _is_cert(item): + """ + Returns True if a given CFTypeRef is a certificate. + """ + expected = Security.SecCertificateGetTypeID() + return CoreFoundation.CFGetTypeID(item) == expected + + +def _is_identity(item): + """ + Returns True if a given CFTypeRef is an identity. + """ + expected = Security.SecIdentityGetTypeID() + return CoreFoundation.CFGetTypeID(item) == expected + + +def _temporary_keychain(): + """ + This function creates a temporary Mac keychain that we can use to work with + credentials. This keychain uses a one-time password and a temporary file to + store the data. We expect to have one keychain per socket. The returned + SecKeychainRef must be freed by the caller, including calling + SecKeychainDelete. + + Returns a tuple of the SecKeychainRef and the path to the temporary + directory that contains it. + """ + # Unfortunately, SecKeychainCreate requires a path to a keychain. This + # means we cannot use mkstemp to use a generic temporary file. Instead, + # we're going to create a temporary directory and a filename to use there. + # This filename will be 8 random bytes expanded into base64. We also need + # some random bytes to password-protect the keychain we're creating, so we + # ask for 40 random bytes. + random_bytes = os.urandom(40) + filename = base64.b16encode(random_bytes[:8]).decode("utf-8") + password = base64.b16encode(random_bytes[8:]) # Must be valid UTF-8 + tempdirectory = tempfile.mkdtemp() + + keychain_path = os.path.join(tempdirectory, filename).encode("utf-8") + + # We now want to create the keychain itself. + keychain = Security.SecKeychainRef() + status = Security.SecKeychainCreate( + keychain_path, len(password), password, False, None, ctypes.byref(keychain) + ) + _assert_no_error(status) + + # Having created the keychain, we want to pass it off to the caller. + return keychain, tempdirectory + + +def _load_items_from_file(keychain, path): + """ + Given a single file, loads all the trust objects from it into arrays and + the keychain. + Returns a tuple of lists: the first list is a list of identities, the + second a list of certs. + """ + certificates = [] + identities = [] + result_array = None + + with open(path, "rb") as f: + raw_filedata = f.read() + + try: + filedata = CoreFoundation.CFDataCreate( + CoreFoundation.kCFAllocatorDefault, raw_filedata, len(raw_filedata) + ) + result_array = CoreFoundation.CFArrayRef() + result = Security.SecItemImport( + filedata, # cert data + None, # Filename, leaving it out for now + None, # What the type of the file is, we don't care + None, # what's in the file, we don't care + 0, # import flags + None, # key params, can include passphrase in the future + keychain, # The keychain to insert into + ctypes.byref(result_array), # Results + ) + _assert_no_error(result) + + # A CFArray is not very useful to us as an intermediary + # representation, so we are going to extract the objects we want + # and then free the array. We don't need to keep hold of keys: the + # keychain already has them! + result_count = CoreFoundation.CFArrayGetCount(result_array) + for index in range(result_count): + item = CoreFoundation.CFArrayGetValueAtIndex(result_array, index) + item = ctypes.cast(item, CoreFoundation.CFTypeRef) + + if _is_cert(item): + CoreFoundation.CFRetain(item) + certificates.append(item) + elif _is_identity(item): + CoreFoundation.CFRetain(item) + identities.append(item) + finally: + if result_array: + CoreFoundation.CFRelease(result_array) + + CoreFoundation.CFRelease(filedata) + + return (identities, certificates) + + +def _load_client_cert_chain(keychain, *paths): + """ + Load certificates and maybe keys from a number of files. Has the end goal + of returning a CFArray containing one SecIdentityRef, and then zero or more + SecCertificateRef objects, suitable for use as a client certificate trust + chain. + """ + # Ok, the strategy. + # + # This relies on knowing that macOS will not give you a SecIdentityRef + # unless you have imported a key into a keychain. This is a somewhat + # artificial limitation of macOS (for example, it doesn't necessarily + # affect iOS), but there is nothing inside Security.framework that lets you + # get a SecIdentityRef without having a key in a keychain. + # + # So the policy here is we take all the files and iterate them in order. + # Each one will use SecItemImport to have one or more objects loaded from + # it. We will also point at a keychain that macOS can use to work with the + # private key. + # + # Once we have all the objects, we'll check what we actually have. If we + # already have a SecIdentityRef in hand, fab: we'll use that. Otherwise, + # we'll take the first certificate (which we assume to be our leaf) and + # ask the keychain to give us a SecIdentityRef with that cert's associated + # key. + # + # We'll then return a CFArray containing the trust chain: one + # SecIdentityRef and then zero-or-more SecCertificateRef objects. The + # responsibility for freeing this CFArray will be with the caller. This + # CFArray must remain alive for the entire connection, so in practice it + # will be stored with a single SSLSocket, along with the reference to the + # keychain. + certificates = [] + identities = [] + + # Filter out bad paths. + paths = (path for path in paths if path) + + try: + for file_path in paths: + new_identities, new_certs = _load_items_from_file(keychain, file_path) + identities.extend(new_identities) + certificates.extend(new_certs) + + # Ok, we have everything. The question is: do we have an identity? If + # not, we want to grab one from the first cert we have. + if not identities: + new_identity = Security.SecIdentityRef() + status = Security.SecIdentityCreateWithCertificate( + keychain, certificates[0], ctypes.byref(new_identity) + ) + _assert_no_error(status) + identities.append(new_identity) + + # We now want to release the original certificate, as we no longer + # need it. + CoreFoundation.CFRelease(certificates.pop(0)) + + # We now need to build a new CFArray that holds the trust chain. + trust_chain = CoreFoundation.CFArrayCreateMutable( + CoreFoundation.kCFAllocatorDefault, + 0, + ctypes.byref(CoreFoundation.kCFTypeArrayCallBacks), + ) + for item in itertools.chain(identities, certificates): + # ArrayAppendValue does a CFRetain on the item. That's fine, + # because the finally block will release our other refs to them. + CoreFoundation.CFArrayAppendValue(trust_chain, item) + + return trust_chain + finally: + for obj in itertools.chain(identities, certificates): + CoreFoundation.CFRelease(obj) + + +TLS_PROTOCOL_VERSIONS = { + "SSLv2": (0, 2), + "SSLv3": (3, 0), + "TLSv1": (3, 1), + "TLSv1.1": (3, 2), + "TLSv1.2": (3, 3), +} + + +def _build_tls_unknown_ca_alert(version): + """ + Builds a TLS alert record for an unknown CA. + """ + ver_maj, ver_min = TLS_PROTOCOL_VERSIONS[version] + severity_fatal = 0x02 + description_unknown_ca = 0x30 + msg = struct.pack(">BB", severity_fatal, description_unknown_ca) + msg_len = len(msg) + record_type_alert = 0x15 + record = struct.pack(">BBBH", record_type_alert, ver_maj, ver_min, msg_len) + msg + return record diff --git a/_vendor/urllib3/contrib/appengine.py b/_vendor/urllib3/contrib/appengine.py new file mode 100644 index 0000000..f91bdd6 --- /dev/null +++ b/_vendor/urllib3/contrib/appengine.py @@ -0,0 +1,314 @@ +""" +This module provides a pool manager that uses Google App Engine's +`URLFetch Service `_. + +Example usage:: + + from urllib3 import PoolManager + from urllib3.contrib.appengine import AppEngineManager, is_appengine_sandbox + + if is_appengine_sandbox(): + # AppEngineManager uses AppEngine's URLFetch API behind the scenes + http = AppEngineManager() + else: + # PoolManager uses a socket-level API behind the scenes + http = PoolManager() + + r = http.request('GET', 'https://google.com/') + +There are `limitations `_ to the URLFetch service and it may not be +the best choice for your application. There are three options for using +urllib3 on Google App Engine: + +1. You can use :class:`AppEngineManager` with URLFetch. URLFetch is + cost-effective in many circumstances as long as your usage is within the + limitations. +2. You can use a normal :class:`~urllib3.PoolManager` by enabling sockets. + Sockets also have `limitations and restrictions + `_ and have a lower free quota than URLFetch. + To use sockets, be sure to specify the following in your ``app.yaml``:: + + env_variables: + GAE_USE_SOCKETS_HTTPLIB : 'true' + +3. If you are using `App Engine Flexible +`_, you can use the standard +:class:`PoolManager` without any configuration or special environment variables. +""" + +from __future__ import absolute_import + +import io +import logging +import warnings + +from ..exceptions import ( + HTTPError, + HTTPWarning, + MaxRetryError, + ProtocolError, + SSLError, + TimeoutError, +) +from ..packages.six.moves.urllib.parse import urljoin +from ..request import RequestMethods +from ..response import HTTPResponse +from ..util.retry import Retry +from ..util.timeout import Timeout +from . import _appengine_environ + +try: + from google.appengine.api import urlfetch +except ImportError: + urlfetch = None + + +log = logging.getLogger(__name__) + + +class AppEnginePlatformWarning(HTTPWarning): + pass + + +class AppEnginePlatformError(HTTPError): + pass + + +class AppEngineManager(RequestMethods): + """ + Connection manager for Google App Engine sandbox applications. + + This manager uses the URLFetch service directly instead of using the + emulated httplib, and is subject to URLFetch limitations as described in + the App Engine documentation `here + `_. + + Notably it will raise an :class:`AppEnginePlatformError` if: + * URLFetch is not available. + * If you attempt to use this on App Engine Flexible, as full socket + support is available. + * If a request size is more than 10 megabytes. + * If a response size is more than 32 megabytes. + * If you use an unsupported request method such as OPTIONS. + + Beyond those cases, it will raise normal urllib3 errors. + """ + + def __init__( + self, + headers=None, + retries=None, + validate_certificate=True, + urlfetch_retries=True, + ): + if not urlfetch: + raise AppEnginePlatformError( + "URLFetch is not available in this environment." + ) + + warnings.warn( + "urllib3 is using URLFetch on Google App Engine sandbox instead " + "of sockets. To use sockets directly instead of URLFetch see " + "https://urllib3.readthedocs.io/en/1.26.x/reference/urllib3.contrib.html.", + AppEnginePlatformWarning, + ) + + RequestMethods.__init__(self, headers) + self.validate_certificate = validate_certificate + self.urlfetch_retries = urlfetch_retries + + self.retries = retries or Retry.DEFAULT + + def __enter__(self): + return self + + def __exit__(self, exc_type, exc_val, exc_tb): + # Return False to re-raise any potential exceptions + return False + + def urlopen( + self, + method, + url, + body=None, + headers=None, + retries=None, + redirect=True, + timeout=Timeout.DEFAULT_TIMEOUT, + **response_kw + ): + + retries = self._get_retries(retries, redirect) + + try: + follow_redirects = redirect and retries.redirect != 0 and retries.total + response = urlfetch.fetch( + url, + payload=body, + method=method, + headers=headers or {}, + allow_truncated=False, + follow_redirects=self.urlfetch_retries and follow_redirects, + deadline=self._get_absolute_timeout(timeout), + validate_certificate=self.validate_certificate, + ) + except urlfetch.DeadlineExceededError as e: + raise TimeoutError(self, e) + + except urlfetch.InvalidURLError as e: + if "too large" in str(e): + raise AppEnginePlatformError( + "URLFetch request too large, URLFetch only " + "supports requests up to 10mb in size.", + e, + ) + raise ProtocolError(e) + + except urlfetch.DownloadError as e: + if "Too many redirects" in str(e): + raise MaxRetryError(self, url, reason=e) + raise ProtocolError(e) + + except urlfetch.ResponseTooLargeError as e: + raise AppEnginePlatformError( + "URLFetch response too large, URLFetch only supports" + "responses up to 32mb in size.", + e, + ) + + except urlfetch.SSLCertificateError as e: + raise SSLError(e) + + except urlfetch.InvalidMethodError as e: + raise AppEnginePlatformError( + "URLFetch does not support method: %s" % method, e + ) + + http_response = self._urlfetch_response_to_http_response( + response, retries=retries, **response_kw + ) + + # Handle redirect? + redirect_location = redirect and http_response.get_redirect_location() + if redirect_location: + # Check for redirect response + if self.urlfetch_retries and retries.raise_on_redirect: + raise MaxRetryError(self, url, "too many redirects") + else: + if http_response.status == 303: + method = "GET" + + try: + retries = retries.increment( + method, url, response=http_response, _pool=self + ) + except MaxRetryError: + if retries.raise_on_redirect: + raise MaxRetryError(self, url, "too many redirects") + return http_response + + retries.sleep_for_retry(http_response) + log.debug("Redirecting %s -> %s", url, redirect_location) + redirect_url = urljoin(url, redirect_location) + return self.urlopen( + method, + redirect_url, + body, + headers, + retries=retries, + redirect=redirect, + timeout=timeout, + **response_kw + ) + + # Check if we should retry the HTTP response. + has_retry_after = bool(http_response.getheader("Retry-After")) + if retries.is_retry(method, http_response.status, has_retry_after): + retries = retries.increment(method, url, response=http_response, _pool=self) + log.debug("Retry: %s", url) + retries.sleep(http_response) + return self.urlopen( + method, + url, + body=body, + headers=headers, + retries=retries, + redirect=redirect, + timeout=timeout, + **response_kw + ) + + return http_response + + def _urlfetch_response_to_http_response(self, urlfetch_resp, **response_kw): + + if is_prod_appengine(): + # Production GAE handles deflate encoding automatically, but does + # not remove the encoding header. + content_encoding = urlfetch_resp.headers.get("content-encoding") + + if content_encoding == "deflate": + del urlfetch_resp.headers["content-encoding"] + + transfer_encoding = urlfetch_resp.headers.get("transfer-encoding") + # We have a full response's content, + # so let's make sure we don't report ourselves as chunked data. + if transfer_encoding == "chunked": + encodings = transfer_encoding.split(",") + encodings.remove("chunked") + urlfetch_resp.headers["transfer-encoding"] = ",".join(encodings) + + original_response = HTTPResponse( + # In order for decoding to work, we must present the content as + # a file-like object. + body=io.BytesIO(urlfetch_resp.content), + msg=urlfetch_resp.header_msg, + headers=urlfetch_resp.headers, + status=urlfetch_resp.status_code, + **response_kw + ) + + return HTTPResponse( + body=io.BytesIO(urlfetch_resp.content), + headers=urlfetch_resp.headers, + status=urlfetch_resp.status_code, + original_response=original_response, + **response_kw + ) + + def _get_absolute_timeout(self, timeout): + if timeout is Timeout.DEFAULT_TIMEOUT: + return None # Defer to URLFetch's default. + if isinstance(timeout, Timeout): + if timeout._read is not None or timeout._connect is not None: + warnings.warn( + "URLFetch does not support granular timeout settings, " + "reverting to total or default URLFetch timeout.", + AppEnginePlatformWarning, + ) + return timeout.total + return timeout + + def _get_retries(self, retries, redirect): + if not isinstance(retries, Retry): + retries = Retry.from_int(retries, redirect=redirect, default=self.retries) + + if retries.connect or retries.read or retries.redirect: + warnings.warn( + "URLFetch only supports total retries and does not " + "recognize connect, read, or redirect retry parameters.", + AppEnginePlatformWarning, + ) + + return retries + + +# Alias methods from _appengine_environ to maintain public API interface. + +is_appengine = _appengine_environ.is_appengine +is_appengine_sandbox = _appengine_environ.is_appengine_sandbox +is_local_appengine = _appengine_environ.is_local_appengine +is_prod_appengine = _appengine_environ.is_prod_appengine +is_prod_appengine_mvms = _appengine_environ.is_prod_appengine_mvms diff --git a/_vendor/urllib3/contrib/ntlmpool.py b/_vendor/urllib3/contrib/ntlmpool.py new file mode 100644 index 0000000..41a8fd1 --- /dev/null +++ b/_vendor/urllib3/contrib/ntlmpool.py @@ -0,0 +1,130 @@ +""" +NTLM authenticating pool, contributed by erikcederstran + +Issue #10, see: http://code.google.com/p/urllib3/issues/detail?id=10 +""" +from __future__ import absolute_import + +import warnings +from logging import getLogger + +from ntlm import ntlm + +from .. import HTTPSConnectionPool +from ..packages.six.moves.http_client import HTTPSConnection + +warnings.warn( + "The 'urllib3.contrib.ntlmpool' module is deprecated and will be removed " + "in urllib3 v2.0 release, urllib3 is not able to support it properly due " + "to reasons listed in issue: https://github.com/urllib3/urllib3/issues/2282. " + "If you are a user of this module please comment in the mentioned issue.", + DeprecationWarning, +) + +log = getLogger(__name__) + + +class NTLMConnectionPool(HTTPSConnectionPool): + """ + Implements an NTLM authentication version of an urllib3 connection pool + """ + + scheme = "https" + + def __init__(self, user, pw, authurl, *args, **kwargs): + """ + authurl is a random URL on the server that is protected by NTLM. + user is the Windows user, probably in the DOMAIN\\username format. + pw is the password for the user. + """ + super(NTLMConnectionPool, self).__init__(*args, **kwargs) + self.authurl = authurl + self.rawuser = user + user_parts = user.split("\\", 1) + self.domain = user_parts[0].upper() + self.user = user_parts[1] + self.pw = pw + + def _new_conn(self): + # Performs the NTLM handshake that secures the connection. The socket + # must be kept open while requests are performed. + self.num_connections += 1 + log.debug( + "Starting NTLM HTTPS connection no. %d: https://%s%s", + self.num_connections, + self.host, + self.authurl, + ) + + headers = {"Connection": "Keep-Alive"} + req_header = "Authorization" + resp_header = "www-authenticate" + + conn = HTTPSConnection(host=self.host, port=self.port) + + # Send negotiation message + headers[req_header] = "NTLM %s" % ntlm.create_NTLM_NEGOTIATE_MESSAGE( + self.rawuser + ) + log.debug("Request headers: %s", headers) + conn.request("GET", self.authurl, None, headers) + res = conn.getresponse() + reshdr = dict(res.getheaders()) + log.debug("Response status: %s %s", res.status, res.reason) + log.debug("Response headers: %s", reshdr) + log.debug("Response data: %s [...]", res.read(100)) + + # Remove the reference to the socket, so that it can not be closed by + # the response object (we want to keep the socket open) + res.fp = None + + # Server should respond with a challenge message + auth_header_values = reshdr[resp_header].split(", ") + auth_header_value = None + for s in auth_header_values: + if s[:5] == "NTLM ": + auth_header_value = s[5:] + if auth_header_value is None: + raise Exception( + "Unexpected %s response header: %s" % (resp_header, reshdr[resp_header]) + ) + + # Send authentication message + ServerChallenge, NegotiateFlags = ntlm.parse_NTLM_CHALLENGE_MESSAGE( + auth_header_value + ) + auth_msg = ntlm.create_NTLM_AUTHENTICATE_MESSAGE( + ServerChallenge, self.user, self.domain, self.pw, NegotiateFlags + ) + headers[req_header] = "NTLM %s" % auth_msg + log.debug("Request headers: %s", headers) + conn.request("GET", self.authurl, None, headers) + res = conn.getresponse() + log.debug("Response status: %s %s", res.status, res.reason) + log.debug("Response headers: %s", dict(res.getheaders())) + log.debug("Response data: %s [...]", res.read()[:100]) + if res.status != 200: + if res.status == 401: + raise Exception("Server rejected request: wrong username or password") + raise Exception("Wrong server response: %s %s" % (res.status, res.reason)) + + res.fp = None + log.debug("Connection established") + return conn + + def urlopen( + self, + method, + url, + body=None, + headers=None, + retries=3, + redirect=True, + assert_same_host=True, + ): + if headers is None: + headers = {} + headers["Connection"] = "Keep-Alive" + return super(NTLMConnectionPool, self).urlopen( + method, url, body, headers, retries, redirect, assert_same_host + ) diff --git a/_vendor/urllib3/contrib/pyopenssl.py b/_vendor/urllib3/contrib/pyopenssl.py new file mode 100644 index 0000000..50a07d5 --- /dev/null +++ b/_vendor/urllib3/contrib/pyopenssl.py @@ -0,0 +1,519 @@ +""" +TLS with SNI_-support for Python 2. Follow these instructions if you would +like to verify TLS certificates in Python 2. Note, the default libraries do +*not* do certificate checking; you need to do additional work to validate +certificates yourself. + +This needs the following packages installed: + +* `pyOpenSSL`_ (tested with 16.0.0) +* `cryptography`_ (minimum 1.3.4, from pyopenssl) +* `idna`_ (minimum 2.0, from cryptography) + +However, pyopenssl depends on cryptography, which depends on idna, so while we +use all three directly here we end up having relatively few packages required. + +You can install them with the following command: + +.. code-block:: bash + + $ python -m pip install pyopenssl cryptography idna + +To activate certificate checking, call +:func:`~urllib3.contrib.pyopenssl.inject_into_urllib3` from your Python code +before you begin making HTTP requests. This can be done in a ``sitecustomize`` +module, or at any other time before your application begins using ``urllib3``, +like this: + +.. code-block:: python + + try: + import urllib3.contrib.pyopenssl + urllib3.contrib.pyopenssl.inject_into_urllib3() + except ImportError: + pass + +Now you can use :mod:`urllib3` as you normally would, and it will support SNI +when the required modules are installed. + +Activating this module also has the positive side effect of disabling SSL/TLS +compression in Python 2 (see `CRIME attack`_). + +.. _sni: https://en.wikipedia.org/wiki/Server_Name_Indication +.. _crime attack: https://en.wikipedia.org/wiki/CRIME_(security_exploit) +.. _pyopenssl: https://www.pyopenssl.org +.. _cryptography: https://cryptography.io +.. _idna: https://github.com/kjd/idna +""" +from __future__ import absolute_import + +import OpenSSL.SSL +from cryptography import x509 +from cryptography.hazmat.backends.openssl import backend as openssl_backend +from cryptography.hazmat.backends.openssl.x509 import _Certificate + +try: + from cryptography.x509 import UnsupportedExtension +except ImportError: + # UnsupportedExtension is gone in cryptography >= 2.1.0 + class UnsupportedExtension(Exception): + pass + + +from io import BytesIO +from socket import error as SocketError +from socket import timeout + +try: # Platform-specific: Python 2 + from socket import _fileobject +except ImportError: # Platform-specific: Python 3 + _fileobject = None + from ..packages.backports.makefile import backport_makefile + +import logging +import ssl +import sys +import warnings + +from .. import util +from ..packages import six +from ..util.ssl_ import PROTOCOL_TLS_CLIENT + +warnings.warn( + "'urllib3.contrib.pyopenssl' module is deprecated and will be removed " + "in a future release of urllib3 2.x. Read more in this issue: " + "https://github.com/urllib3/urllib3/issues/2680", + category=DeprecationWarning, + stacklevel=2, +) + +__all__ = ["inject_into_urllib3", "extract_from_urllib3"] + +# SNI always works. +HAS_SNI = True + +# Map from urllib3 to PyOpenSSL compatible parameter-values. +_openssl_versions = { + util.PROTOCOL_TLS: OpenSSL.SSL.SSLv23_METHOD, + PROTOCOL_TLS_CLIENT: OpenSSL.SSL.SSLv23_METHOD, + ssl.PROTOCOL_TLSv1: OpenSSL.SSL.TLSv1_METHOD, +} + +if hasattr(ssl, "PROTOCOL_SSLv3") and hasattr(OpenSSL.SSL, "SSLv3_METHOD"): + _openssl_versions[ssl.PROTOCOL_SSLv3] = OpenSSL.SSL.SSLv3_METHOD + +if hasattr(ssl, "PROTOCOL_TLSv1_1") and hasattr(OpenSSL.SSL, "TLSv1_1_METHOD"): + _openssl_versions[ssl.PROTOCOL_TLSv1_1] = OpenSSL.SSL.TLSv1_1_METHOD + +if hasattr(ssl, "PROTOCOL_TLSv1_2") and hasattr(OpenSSL.SSL, "TLSv1_2_METHOD"): + _openssl_versions[ssl.PROTOCOL_TLSv1_2] = OpenSSL.SSL.TLSv1_2_METHOD + + +_stdlib_to_openssl_verify = { + ssl.CERT_NONE: OpenSSL.SSL.VERIFY_NONE, + ssl.CERT_OPTIONAL: OpenSSL.SSL.VERIFY_PEER, + ssl.CERT_REQUIRED: OpenSSL.SSL.VERIFY_PEER + + OpenSSL.SSL.VERIFY_FAIL_IF_NO_PEER_CERT, +} +_openssl_to_stdlib_verify = dict((v, k) for k, v in _stdlib_to_openssl_verify.items()) + +# OpenSSL will only write 16K at a time +SSL_WRITE_BLOCKSIZE = 16384 + +orig_util_HAS_SNI = util.HAS_SNI +orig_util_SSLContext = util.ssl_.SSLContext + + +log = logging.getLogger(__name__) + + +def inject_into_urllib3(): + "Monkey-patch urllib3 with PyOpenSSL-backed SSL-support." + + _validate_dependencies_met() + + util.SSLContext = PyOpenSSLContext + util.ssl_.SSLContext = PyOpenSSLContext + util.HAS_SNI = HAS_SNI + util.ssl_.HAS_SNI = HAS_SNI + util.IS_PYOPENSSL = True + util.ssl_.IS_PYOPENSSL = True + + +def extract_from_urllib3(): + "Undo monkey-patching by :func:`inject_into_urllib3`." + + util.SSLContext = orig_util_SSLContext + util.ssl_.SSLContext = orig_util_SSLContext + util.HAS_SNI = orig_util_HAS_SNI + util.ssl_.HAS_SNI = orig_util_HAS_SNI + util.IS_PYOPENSSL = False + util.ssl_.IS_PYOPENSSL = False + + +def _validate_dependencies_met(): + """ + Verifies that PyOpenSSL's package-level dependencies have been met. + Throws `ImportError` if they are not met. + """ + # Method added in `cryptography==1.1`; not available in older versions + from cryptography.x509.extensions import Extensions + + if getattr(Extensions, "get_extension_for_class", None) is None: + raise ImportError( + "'cryptography' module missing required functionality. " + "Try upgrading to v1.3.4 or newer." + ) + + # pyOpenSSL 0.14 and above use cryptography for OpenSSL bindings. The _x509 + # attribute is only present on those versions. + from OpenSSL.crypto import X509 + + x509 = X509() + if getattr(x509, "_x509", None) is None: + raise ImportError( + "'pyOpenSSL' module missing required functionality. " + "Try upgrading to v0.14 or newer." + ) + + +def _dnsname_to_stdlib(name): + """ + Converts a dNSName SubjectAlternativeName field to the form used by the + standard library on the given Python version. + + Cryptography produces a dNSName as a unicode string that was idna-decoded + from ASCII bytes. We need to idna-encode that string to get it back, and + then on Python 3 we also need to convert to unicode via UTF-8 (the stdlib + uses PyUnicode_FromStringAndSize on it, which decodes via UTF-8). + + If the name cannot be idna-encoded then we return None signalling that + the name given should be skipped. + """ + + def idna_encode(name): + """ + Borrowed wholesale from the Python Cryptography Project. It turns out + that we can't just safely call `idna.encode`: it can explode for + wildcard names. This avoids that problem. + """ + import idna + + try: + for prefix in [u"*.", u"."]: + if name.startswith(prefix): + name = name[len(prefix) :] + return prefix.encode("ascii") + idna.encode(name) + return idna.encode(name) + except idna.core.IDNAError: + return None + + # Don't send IPv6 addresses through the IDNA encoder. + if ":" in name: + return name + + name = idna_encode(name) + if name is None: + return None + elif sys.version_info >= (3, 0): + name = name.decode("utf-8") + return name + + +def get_subj_alt_name(peer_cert): + """ + Given an PyOpenSSL certificate, provides all the subject alternative names. + """ + # Pass the cert to cryptography, which has much better APIs for this. + if hasattr(peer_cert, "to_cryptography"): + cert = peer_cert.to_cryptography() + else: + # This is technically using private APIs, but should work across all + # relevant versions before PyOpenSSL got a proper API for this. + cert = _Certificate(openssl_backend, peer_cert._x509) + + # We want to find the SAN extension. Ask Cryptography to locate it (it's + # faster than looping in Python) + try: + ext = cert.extensions.get_extension_for_class(x509.SubjectAlternativeName).value + except x509.ExtensionNotFound: + # No such extension, return the empty list. + return [] + except ( + x509.DuplicateExtension, + UnsupportedExtension, + x509.UnsupportedGeneralNameType, + UnicodeError, + ) as e: + # A problem has been found with the quality of the certificate. Assume + # no SAN field is present. + log.warning( + "A problem was encountered with the certificate that prevented " + "urllib3 from finding the SubjectAlternativeName field. This can " + "affect certificate validation. The error was %s", + e, + ) + return [] + + # We want to return dNSName and iPAddress fields. We need to cast the IPs + # back to strings because the match_hostname function wants them as + # strings. + # Sadly the DNS names need to be idna encoded and then, on Python 3, UTF-8 + # decoded. This is pretty frustrating, but that's what the standard library + # does with certificates, and so we need to attempt to do the same. + # We also want to skip over names which cannot be idna encoded. + names = [ + ("DNS", name) + for name in map(_dnsname_to_stdlib, ext.get_values_for_type(x509.DNSName)) + if name is not None + ] + names.extend( + ("IP Address", str(name)) for name in ext.get_values_for_type(x509.IPAddress) + ) + + return names + + +class WrappedSocket(object): + """API-compatibility wrapper for Python OpenSSL's Connection-class. + + Note: _makefile_refs, _drop() and _reuse() are needed for the garbage + collector of pypy. + """ + + def __init__(self, connection, socket, suppress_ragged_eofs=True): + self.connection = connection + self.socket = socket + self.suppress_ragged_eofs = suppress_ragged_eofs + self._makefile_refs = 0 + self._closed = False + + def fileno(self): + return self.socket.fileno() + + # Copy-pasted from Python 3.5 source code + def _decref_socketios(self): + if self._makefile_refs > 0: + self._makefile_refs -= 1 + if self._closed: + self.close() + + def recv(self, *args, **kwargs): + try: + data = self.connection.recv(*args, **kwargs) + except OpenSSL.SSL.SysCallError as e: + if self.suppress_ragged_eofs and e.args == (-1, "Unexpected EOF"): + return b"" + else: + raise SocketError(str(e)) + except OpenSSL.SSL.ZeroReturnError: + if self.connection.get_shutdown() == OpenSSL.SSL.RECEIVED_SHUTDOWN: + return b"" + else: + raise + except OpenSSL.SSL.WantReadError: + if not util.wait_for_read(self.socket, self.socket.gettimeout()): + raise timeout("The read operation timed out") + else: + return self.recv(*args, **kwargs) + + # TLS 1.3 post-handshake authentication + except OpenSSL.SSL.Error as e: + raise ssl.SSLError("read error: %r" % e) + else: + return data + + def recv_into(self, *args, **kwargs): + try: + return self.connection.recv_into(*args, **kwargs) + except OpenSSL.SSL.SysCallError as e: + if self.suppress_ragged_eofs and e.args == (-1, "Unexpected EOF"): + return 0 + else: + raise SocketError(str(e)) + except OpenSSL.SSL.ZeroReturnError: + if self.connection.get_shutdown() == OpenSSL.SSL.RECEIVED_SHUTDOWN: + return 0 + else: + raise + except OpenSSL.SSL.WantReadError: + if not util.wait_for_read(self.socket, self.socket.gettimeout()): + raise timeout("The read operation timed out") + else: + return self.recv_into(*args, **kwargs) + + # TLS 1.3 post-handshake authentication + except OpenSSL.SSL.Error as e: + raise ssl.SSLError("read error: %r" % e) + + def settimeout(self, timeout): + return self.socket.settimeout(timeout) + + def _send_until_done(self, data): + while True: + try: + return self.connection.send(data) + except OpenSSL.SSL.WantWriteError: + if not util.wait_for_write(self.socket, self.socket.gettimeout()): + raise timeout() + continue + except OpenSSL.SSL.SysCallError as e: + raise SocketError(str(e)) + + def sendall(self, data): + total_sent = 0 + while total_sent < len(data): + sent = self._send_until_done( + data[total_sent : total_sent + SSL_WRITE_BLOCKSIZE] + ) + total_sent += sent + + def shutdown(self): + # FIXME rethrow compatible exceptions should we ever use this + self.connection.shutdown() + + def close(self): + if self._makefile_refs < 1: + try: + self._closed = True + return self.connection.close() + except OpenSSL.SSL.Error: + return + else: + self._makefile_refs -= 1 + + def getpeercert(self, binary_form=False): + x509 = self.connection.get_peer_certificate() + + if not x509: + return x509 + + if binary_form: + return OpenSSL.crypto.dump_certificate(OpenSSL.crypto.FILETYPE_ASN1, x509) + + return { + "subject": ((("commonName", x509.get_subject().CN),),), + "subjectAltName": get_subj_alt_name(x509), + } + + def version(self): + return self.connection.get_protocol_version_name() + + def _reuse(self): + self._makefile_refs += 1 + + def _drop(self): + if self._makefile_refs < 1: + self.close() + else: + self._makefile_refs -= 1 + + +if _fileobject: # Platform-specific: Python 2 + + def makefile(self, mode, bufsize=-1): + self._makefile_refs += 1 + return _fileobject(self, mode, bufsize, close=True) + +else: # Platform-specific: Python 3 + makefile = backport_makefile + +WrappedSocket.makefile = makefile + + +class PyOpenSSLContext(object): + """ + I am a wrapper class for the PyOpenSSL ``Context`` object. I am responsible + for translating the interface of the standard library ``SSLContext`` object + to calls into PyOpenSSL. + """ + + def __init__(self, protocol): + self.protocol = _openssl_versions[protocol] + self._ctx = OpenSSL.SSL.Context(self.protocol) + self._options = 0 + self.check_hostname = False + + @property + def options(self): + return self._options + + @options.setter + def options(self, value): + self._options = value + self._ctx.set_options(value) + + @property + def verify_mode(self): + return _openssl_to_stdlib_verify[self._ctx.get_verify_mode()] + + @verify_mode.setter + def verify_mode(self, value): + self._ctx.set_verify(_stdlib_to_openssl_verify[value], _verify_callback) + + def set_default_verify_paths(self): + self._ctx.set_default_verify_paths() + + def set_ciphers(self, ciphers): + if isinstance(ciphers, six.text_type): + ciphers = ciphers.encode("utf-8") + self._ctx.set_cipher_list(ciphers) + + def load_verify_locations(self, cafile=None, capath=None, cadata=None): + if cafile is not None: + cafile = cafile.encode("utf-8") + if capath is not None: + capath = capath.encode("utf-8") + try: + self._ctx.load_verify_locations(cafile, capath) + if cadata is not None: + self._ctx.load_verify_locations(BytesIO(cadata)) + except OpenSSL.SSL.Error as e: + raise ssl.SSLError("unable to load trusted certificates: %r" % e) + + def load_cert_chain(self, certfile, keyfile=None, password=None): + self._ctx.use_certificate_chain_file(certfile) + if password is not None: + if not isinstance(password, six.binary_type): + password = password.encode("utf-8") + self._ctx.set_passwd_cb(lambda *_: password) + self._ctx.use_privatekey_file(keyfile or certfile) + + def set_alpn_protocols(self, protocols): + protocols = [six.ensure_binary(p) for p in protocols] + return self._ctx.set_alpn_protos(protocols) + + def wrap_socket( + self, + sock, + server_side=False, + do_handshake_on_connect=True, + suppress_ragged_eofs=True, + server_hostname=None, + ): + cnx = OpenSSL.SSL.Connection(self._ctx, sock) + + if isinstance(server_hostname, six.text_type): # Platform-specific: Python 3 + server_hostname = server_hostname.encode("utf-8") + + if server_hostname is not None: + cnx.set_tlsext_host_name(server_hostname) + + cnx.set_connect_state() + + while True: + try: + cnx.do_handshake() + except OpenSSL.SSL.WantReadError: + if not util.wait_for_read(sock, sock.gettimeout()): + raise timeout("select timed out") + continue + except OpenSSL.SSL.Error as e: + raise ssl.SSLError("bad handshake: %r" % e) + break + + return WrappedSocket(cnx, sock) + + +def _verify_callback(cnx, x509, err_no, err_depth, return_code): + return err_no == 0 diff --git a/_vendor/urllib3/contrib/securetransport.py b/_vendor/urllib3/contrib/securetransport.py new file mode 100644 index 0000000..6c46a3b --- /dev/null +++ b/_vendor/urllib3/contrib/securetransport.py @@ -0,0 +1,921 @@ +""" +SecureTranport support for urllib3 via ctypes. + +This makes platform-native TLS available to urllib3 users on macOS without the +use of a compiler. This is an important feature because the Python Package +Index is moving to become a TLSv1.2-or-higher server, and the default OpenSSL +that ships with macOS is not capable of doing TLSv1.2. The only way to resolve +this is to give macOS users an alternative solution to the problem, and that +solution is to use SecureTransport. + +We use ctypes here because this solution must not require a compiler. That's +because pip is not allowed to require a compiler either. + +This is not intended to be a seriously long-term solution to this problem. +The hope is that PEP 543 will eventually solve this issue for us, at which +point we can retire this contrib module. But in the short term, we need to +solve the impending tire fire that is Python on Mac without this kind of +contrib module. So...here we are. + +To use this module, simply import and inject it:: + + import urllib3.contrib.securetransport + urllib3.contrib.securetransport.inject_into_urllib3() + +Happy TLSing! + +This code is a bastardised version of the code found in Will Bond's oscrypto +library. An enormous debt is owed to him for blazing this trail for us. For +that reason, this code should be considered to be covered both by urllib3's +license and by oscrypto's: + +.. code-block:: + + Copyright (c) 2015-2016 Will Bond + + Permission is hereby granted, free of charge, to any person obtaining a + copy of this software and associated documentation files (the "Software"), + to deal in the Software without restriction, including without limitation + the rights to use, copy, modify, merge, publish, distribute, sublicense, + and/or sell copies of the Software, and to permit persons to whom the + Software is furnished to do so, subject to the following conditions: + + The above copyright notice and this permission notice shall be included in + all copies or substantial portions of the Software. + + THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER + LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING + FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER + DEALINGS IN THE SOFTWARE. +""" +from __future__ import absolute_import + +import contextlib +import ctypes +import errno +import os.path +import shutil +import socket +import ssl +import struct +import threading +import weakref + +import six + +from .. import util +from ..util.ssl_ import PROTOCOL_TLS_CLIENT +from ._securetransport.bindings import CoreFoundation, Security, SecurityConst +from ._securetransport.low_level import ( + _assert_no_error, + _build_tls_unknown_ca_alert, + _cert_array_from_pem, + _create_cfstring_array, + _load_client_cert_chain, + _temporary_keychain, +) + +try: # Platform-specific: Python 2 + from socket import _fileobject +except ImportError: # Platform-specific: Python 3 + _fileobject = None + from ..packages.backports.makefile import backport_makefile + +__all__ = ["inject_into_urllib3", "extract_from_urllib3"] + +# SNI always works +HAS_SNI = True + +orig_util_HAS_SNI = util.HAS_SNI +orig_util_SSLContext = util.ssl_.SSLContext + +# This dictionary is used by the read callback to obtain a handle to the +# calling wrapped socket. This is a pretty silly approach, but for now it'll +# do. I feel like I should be able to smuggle a handle to the wrapped socket +# directly in the SSLConnectionRef, but for now this approach will work I +# guess. +# +# We need to lock around this structure for inserts, but we don't do it for +# reads/writes in the callbacks. The reasoning here goes as follows: +# +# 1. It is not possible to call into the callbacks before the dictionary is +# populated, so once in the callback the id must be in the dictionary. +# 2. The callbacks don't mutate the dictionary, they only read from it, and +# so cannot conflict with any of the insertions. +# +# This is good: if we had to lock in the callbacks we'd drastically slow down +# the performance of this code. +_connection_refs = weakref.WeakValueDictionary() +_connection_ref_lock = threading.Lock() + +# Limit writes to 16kB. This is OpenSSL's limit, but we'll cargo-cult it over +# for no better reason than we need *a* limit, and this one is right there. +SSL_WRITE_BLOCKSIZE = 16384 + +# This is our equivalent of util.ssl_.DEFAULT_CIPHERS, but expanded out to +# individual cipher suites. We need to do this because this is how +# SecureTransport wants them. +CIPHER_SUITES = [ + SecurityConst.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384, + SecurityConst.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, + SecurityConst.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384, + SecurityConst.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, + SecurityConst.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, + SecurityConst.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, + SecurityConst.TLS_DHE_RSA_WITH_AES_256_GCM_SHA384, + SecurityConst.TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, + SecurityConst.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384, + SecurityConst.TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, + SecurityConst.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256, + SecurityConst.TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, + SecurityConst.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, + SecurityConst.TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, + SecurityConst.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, + SecurityConst.TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, + SecurityConst.TLS_DHE_RSA_WITH_AES_256_CBC_SHA256, + SecurityConst.TLS_DHE_RSA_WITH_AES_256_CBC_SHA, + SecurityConst.TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, + SecurityConst.TLS_DHE_RSA_WITH_AES_128_CBC_SHA, + SecurityConst.TLS_AES_256_GCM_SHA384, + SecurityConst.TLS_AES_128_GCM_SHA256, + SecurityConst.TLS_RSA_WITH_AES_256_GCM_SHA384, + SecurityConst.TLS_RSA_WITH_AES_128_GCM_SHA256, + SecurityConst.TLS_AES_128_CCM_8_SHA256, + SecurityConst.TLS_AES_128_CCM_SHA256, + SecurityConst.TLS_RSA_WITH_AES_256_CBC_SHA256, + SecurityConst.TLS_RSA_WITH_AES_128_CBC_SHA256, + SecurityConst.TLS_RSA_WITH_AES_256_CBC_SHA, + SecurityConst.TLS_RSA_WITH_AES_128_CBC_SHA, +] + +# Basically this is simple: for PROTOCOL_SSLv23 we turn it into a low of +# TLSv1 and a high of TLSv1.2. For everything else, we pin to that version. +# TLSv1 to 1.2 are supported on macOS 10.8+ +_protocol_to_min_max = { + util.PROTOCOL_TLS: (SecurityConst.kTLSProtocol1, SecurityConst.kTLSProtocol12), + PROTOCOL_TLS_CLIENT: (SecurityConst.kTLSProtocol1, SecurityConst.kTLSProtocol12), +} + +if hasattr(ssl, "PROTOCOL_SSLv2"): + _protocol_to_min_max[ssl.PROTOCOL_SSLv2] = ( + SecurityConst.kSSLProtocol2, + SecurityConst.kSSLProtocol2, + ) +if hasattr(ssl, "PROTOCOL_SSLv3"): + _protocol_to_min_max[ssl.PROTOCOL_SSLv3] = ( + SecurityConst.kSSLProtocol3, + SecurityConst.kSSLProtocol3, + ) +if hasattr(ssl, "PROTOCOL_TLSv1"): + _protocol_to_min_max[ssl.PROTOCOL_TLSv1] = ( + SecurityConst.kTLSProtocol1, + SecurityConst.kTLSProtocol1, + ) +if hasattr(ssl, "PROTOCOL_TLSv1_1"): + _protocol_to_min_max[ssl.PROTOCOL_TLSv1_1] = ( + SecurityConst.kTLSProtocol11, + SecurityConst.kTLSProtocol11, + ) +if hasattr(ssl, "PROTOCOL_TLSv1_2"): + _protocol_to_min_max[ssl.PROTOCOL_TLSv1_2] = ( + SecurityConst.kTLSProtocol12, + SecurityConst.kTLSProtocol12, + ) + + +def inject_into_urllib3(): + """ + Monkey-patch urllib3 with SecureTransport-backed SSL-support. + """ + util.SSLContext = SecureTransportContext + util.ssl_.SSLContext = SecureTransportContext + util.HAS_SNI = HAS_SNI + util.ssl_.HAS_SNI = HAS_SNI + util.IS_SECURETRANSPORT = True + util.ssl_.IS_SECURETRANSPORT = True + + +def extract_from_urllib3(): + """ + Undo monkey-patching by :func:`inject_into_urllib3`. + """ + util.SSLContext = orig_util_SSLContext + util.ssl_.SSLContext = orig_util_SSLContext + util.HAS_SNI = orig_util_HAS_SNI + util.ssl_.HAS_SNI = orig_util_HAS_SNI + util.IS_SECURETRANSPORT = False + util.ssl_.IS_SECURETRANSPORT = False + + +def _read_callback(connection_id, data_buffer, data_length_pointer): + """ + SecureTransport read callback. This is called by ST to request that data + be returned from the socket. + """ + wrapped_socket = None + try: + wrapped_socket = _connection_refs.get(connection_id) + if wrapped_socket is None: + return SecurityConst.errSSLInternal + base_socket = wrapped_socket.socket + + requested_length = data_length_pointer[0] + + timeout = wrapped_socket.gettimeout() + error = None + read_count = 0 + + try: + while read_count < requested_length: + if timeout is None or timeout >= 0: + if not util.wait_for_read(base_socket, timeout): + raise socket.error(errno.EAGAIN, "timed out") + + remaining = requested_length - read_count + buffer = (ctypes.c_char * remaining).from_address( + data_buffer + read_count + ) + chunk_size = base_socket.recv_into(buffer, remaining) + read_count += chunk_size + if not chunk_size: + if not read_count: + return SecurityConst.errSSLClosedGraceful + break + except (socket.error) as e: + error = e.errno + + if error is not None and error != errno.EAGAIN: + data_length_pointer[0] = read_count + if error == errno.ECONNRESET or error == errno.EPIPE: + return SecurityConst.errSSLClosedAbort + raise + + data_length_pointer[0] = read_count + + if read_count != requested_length: + return SecurityConst.errSSLWouldBlock + + return 0 + except Exception as e: + if wrapped_socket is not None: + wrapped_socket._exception = e + return SecurityConst.errSSLInternal + + +def _write_callback(connection_id, data_buffer, data_length_pointer): + """ + SecureTransport write callback. This is called by ST to request that data + actually be sent on the network. + """ + wrapped_socket = None + try: + wrapped_socket = _connection_refs.get(connection_id) + if wrapped_socket is None: + return SecurityConst.errSSLInternal + base_socket = wrapped_socket.socket + + bytes_to_write = data_length_pointer[0] + data = ctypes.string_at(data_buffer, bytes_to_write) + + timeout = wrapped_socket.gettimeout() + error = None + sent = 0 + + try: + while sent < bytes_to_write: + if timeout is None or timeout >= 0: + if not util.wait_for_write(base_socket, timeout): + raise socket.error(errno.EAGAIN, "timed out") + chunk_sent = base_socket.send(data) + sent += chunk_sent + + # This has some needless copying here, but I'm not sure there's + # much value in optimising this data path. + data = data[chunk_sent:] + except (socket.error) as e: + error = e.errno + + if error is not None and error != errno.EAGAIN: + data_length_pointer[0] = sent + if error == errno.ECONNRESET or error == errno.EPIPE: + return SecurityConst.errSSLClosedAbort + raise + + data_length_pointer[0] = sent + + if sent != bytes_to_write: + return SecurityConst.errSSLWouldBlock + + return 0 + except Exception as e: + if wrapped_socket is not None: + wrapped_socket._exception = e + return SecurityConst.errSSLInternal + + +# We need to keep these two objects references alive: if they get GC'd while +# in use then SecureTransport could attempt to call a function that is in freed +# memory. That would be...uh...bad. Yeah, that's the word. Bad. +_read_callback_pointer = Security.SSLReadFunc(_read_callback) +_write_callback_pointer = Security.SSLWriteFunc(_write_callback) + + +class WrappedSocket(object): + """ + API-compatibility wrapper for Python's OpenSSL wrapped socket object. + + Note: _makefile_refs, _drop(), and _reuse() are needed for the garbage + collector of PyPy. + """ + + def __init__(self, socket): + self.socket = socket + self.context = None + self._makefile_refs = 0 + self._closed = False + self._exception = None + self._keychain = None + self._keychain_dir = None + self._client_cert_chain = None + + # We save off the previously-configured timeout and then set it to + # zero. This is done because we use select and friends to handle the + # timeouts, but if we leave the timeout set on the lower socket then + # Python will "kindly" call select on that socket again for us. Avoid + # that by forcing the timeout to zero. + self._timeout = self.socket.gettimeout() + self.socket.settimeout(0) + + @contextlib.contextmanager + def _raise_on_error(self): + """ + A context manager that can be used to wrap calls that do I/O from + SecureTransport. If any of the I/O callbacks hit an exception, this + context manager will correctly propagate the exception after the fact. + This avoids silently swallowing those exceptions. + + It also correctly forces the socket closed. + """ + self._exception = None + + # We explicitly don't catch around this yield because in the unlikely + # event that an exception was hit in the block we don't want to swallow + # it. + yield + if self._exception is not None: + exception, self._exception = self._exception, None + self.close() + raise exception + + def _set_ciphers(self): + """ + Sets up the allowed ciphers. By default this matches the set in + util.ssl_.DEFAULT_CIPHERS, at least as supported by macOS. This is done + custom and doesn't allow changing at this time, mostly because parsing + OpenSSL cipher strings is going to be a freaking nightmare. + """ + ciphers = (Security.SSLCipherSuite * len(CIPHER_SUITES))(*CIPHER_SUITES) + result = Security.SSLSetEnabledCiphers( + self.context, ciphers, len(CIPHER_SUITES) + ) + _assert_no_error(result) + + def _set_alpn_protocols(self, protocols): + """ + Sets up the ALPN protocols on the context. + """ + if not protocols: + return + protocols_arr = _create_cfstring_array(protocols) + try: + result = Security.SSLSetALPNProtocols(self.context, protocols_arr) + _assert_no_error(result) + finally: + CoreFoundation.CFRelease(protocols_arr) + + def _custom_validate(self, verify, trust_bundle): + """ + Called when we have set custom validation. We do this in two cases: + first, when cert validation is entirely disabled; and second, when + using a custom trust DB. + Raises an SSLError if the connection is not trusted. + """ + # If we disabled cert validation, just say: cool. + if not verify: + return + + successes = ( + SecurityConst.kSecTrustResultUnspecified, + SecurityConst.kSecTrustResultProceed, + ) + try: + trust_result = self._evaluate_trust(trust_bundle) + if trust_result in successes: + return + reason = "error code: %d" % (trust_result,) + except Exception as e: + # Do not trust on error + reason = "exception: %r" % (e,) + + # SecureTransport does not send an alert nor shuts down the connection. + rec = _build_tls_unknown_ca_alert(self.version()) + self.socket.sendall(rec) + # close the connection immediately + # l_onoff = 1, activate linger + # l_linger = 0, linger for 0 seoncds + opts = struct.pack("ii", 1, 0) + self.socket.setsockopt(socket.SOL_SOCKET, socket.SO_LINGER, opts) + self.close() + raise ssl.SSLError("certificate verify failed, %s" % reason) + + def _evaluate_trust(self, trust_bundle): + # We want data in memory, so load it up. + if os.path.isfile(trust_bundle): + with open(trust_bundle, "rb") as f: + trust_bundle = f.read() + + cert_array = None + trust = Security.SecTrustRef() + + try: + # Get a CFArray that contains the certs we want. + cert_array = _cert_array_from_pem(trust_bundle) + + # Ok, now the hard part. We want to get the SecTrustRef that ST has + # created for this connection, shove our CAs into it, tell ST to + # ignore everything else it knows, and then ask if it can build a + # chain. This is a buuuunch of code. + result = Security.SSLCopyPeerTrust(self.context, ctypes.byref(trust)) + _assert_no_error(result) + if not trust: + raise ssl.SSLError("Failed to copy trust reference") + + result = Security.SecTrustSetAnchorCertificates(trust, cert_array) + _assert_no_error(result) + + result = Security.SecTrustSetAnchorCertificatesOnly(trust, True) + _assert_no_error(result) + + trust_result = Security.SecTrustResultType() + result = Security.SecTrustEvaluate(trust, ctypes.byref(trust_result)) + _assert_no_error(result) + finally: + if trust: + CoreFoundation.CFRelease(trust) + + if cert_array is not None: + CoreFoundation.CFRelease(cert_array) + + return trust_result.value + + def handshake( + self, + server_hostname, + verify, + trust_bundle, + min_version, + max_version, + client_cert, + client_key, + client_key_passphrase, + alpn_protocols, + ): + """ + Actually performs the TLS handshake. This is run automatically by + wrapped socket, and shouldn't be needed in user code. + """ + # First, we do the initial bits of connection setup. We need to create + # a context, set its I/O funcs, and set the connection reference. + self.context = Security.SSLCreateContext( + None, SecurityConst.kSSLClientSide, SecurityConst.kSSLStreamType + ) + result = Security.SSLSetIOFuncs( + self.context, _read_callback_pointer, _write_callback_pointer + ) + _assert_no_error(result) + + # Here we need to compute the handle to use. We do this by taking the + # id of self modulo 2**31 - 1. If this is already in the dictionary, we + # just keep incrementing by one until we find a free space. + with _connection_ref_lock: + handle = id(self) % 2147483647 + while handle in _connection_refs: + handle = (handle + 1) % 2147483647 + _connection_refs[handle] = self + + result = Security.SSLSetConnection(self.context, handle) + _assert_no_error(result) + + # If we have a server hostname, we should set that too. + if server_hostname: + if not isinstance(server_hostname, bytes): + server_hostname = server_hostname.encode("utf-8") + + result = Security.SSLSetPeerDomainName( + self.context, server_hostname, len(server_hostname) + ) + _assert_no_error(result) + + # Setup the ciphers. + self._set_ciphers() + + # Setup the ALPN protocols. + self._set_alpn_protocols(alpn_protocols) + + # Set the minimum and maximum TLS versions. + result = Security.SSLSetProtocolVersionMin(self.context, min_version) + _assert_no_error(result) + + result = Security.SSLSetProtocolVersionMax(self.context, max_version) + _assert_no_error(result) + + # If there's a trust DB, we need to use it. We do that by telling + # SecureTransport to break on server auth. We also do that if we don't + # want to validate the certs at all: we just won't actually do any + # authing in that case. + if not verify or trust_bundle is not None: + result = Security.SSLSetSessionOption( + self.context, SecurityConst.kSSLSessionOptionBreakOnServerAuth, True + ) + _assert_no_error(result) + + # If there's a client cert, we need to use it. + if client_cert: + self._keychain, self._keychain_dir = _temporary_keychain() + self._client_cert_chain = _load_client_cert_chain( + self._keychain, client_cert, client_key + ) + result = Security.SSLSetCertificate(self.context, self._client_cert_chain) + _assert_no_error(result) + + while True: + with self._raise_on_error(): + result = Security.SSLHandshake(self.context) + + if result == SecurityConst.errSSLWouldBlock: + raise socket.timeout("handshake timed out") + elif result == SecurityConst.errSSLServerAuthCompleted: + self._custom_validate(verify, trust_bundle) + continue + else: + _assert_no_error(result) + break + + def fileno(self): + return self.socket.fileno() + + # Copy-pasted from Python 3.5 source code + def _decref_socketios(self): + if self._makefile_refs > 0: + self._makefile_refs -= 1 + if self._closed: + self.close() + + def recv(self, bufsiz): + buffer = ctypes.create_string_buffer(bufsiz) + bytes_read = self.recv_into(buffer, bufsiz) + data = buffer[:bytes_read] + return data + + def recv_into(self, buffer, nbytes=None): + # Read short on EOF. + if self._closed: + return 0 + + if nbytes is None: + nbytes = len(buffer) + + buffer = (ctypes.c_char * nbytes).from_buffer(buffer) + processed_bytes = ctypes.c_size_t(0) + + with self._raise_on_error(): + result = Security.SSLRead( + self.context, buffer, nbytes, ctypes.byref(processed_bytes) + ) + + # There are some result codes that we want to treat as "not always + # errors". Specifically, those are errSSLWouldBlock, + # errSSLClosedGraceful, and errSSLClosedNoNotify. + if result == SecurityConst.errSSLWouldBlock: + # If we didn't process any bytes, then this was just a time out. + # However, we can get errSSLWouldBlock in situations when we *did* + # read some data, and in those cases we should just read "short" + # and return. + if processed_bytes.value == 0: + # Timed out, no data read. + raise socket.timeout("recv timed out") + elif result in ( + SecurityConst.errSSLClosedGraceful, + SecurityConst.errSSLClosedNoNotify, + ): + # The remote peer has closed this connection. We should do so as + # well. Note that we don't actually return here because in + # principle this could actually be fired along with return data. + # It's unlikely though. + self.close() + else: + _assert_no_error(result) + + # Ok, we read and probably succeeded. We should return whatever data + # was actually read. + return processed_bytes.value + + def settimeout(self, timeout): + self._timeout = timeout + + def gettimeout(self): + return self._timeout + + def send(self, data): + processed_bytes = ctypes.c_size_t(0) + + with self._raise_on_error(): + result = Security.SSLWrite( + self.context, data, len(data), ctypes.byref(processed_bytes) + ) + + if result == SecurityConst.errSSLWouldBlock and processed_bytes.value == 0: + # Timed out + raise socket.timeout("send timed out") + else: + _assert_no_error(result) + + # We sent, and probably succeeded. Tell them how much we sent. + return processed_bytes.value + + def sendall(self, data): + total_sent = 0 + while total_sent < len(data): + sent = self.send(data[total_sent : total_sent + SSL_WRITE_BLOCKSIZE]) + total_sent += sent + + def shutdown(self): + with self._raise_on_error(): + Security.SSLClose(self.context) + + def close(self): + # TODO: should I do clean shutdown here? Do I have to? + if self._makefile_refs < 1: + self._closed = True + if self.context: + CoreFoundation.CFRelease(self.context) + self.context = None + if self._client_cert_chain: + CoreFoundation.CFRelease(self._client_cert_chain) + self._client_cert_chain = None + if self._keychain: + Security.SecKeychainDelete(self._keychain) + CoreFoundation.CFRelease(self._keychain) + shutil.rmtree(self._keychain_dir) + self._keychain = self._keychain_dir = None + return self.socket.close() + else: + self._makefile_refs -= 1 + + def getpeercert(self, binary_form=False): + # Urgh, annoying. + # + # Here's how we do this: + # + # 1. Call SSLCopyPeerTrust to get hold of the trust object for this + # connection. + # 2. Call SecTrustGetCertificateAtIndex for index 0 to get the leaf. + # 3. To get the CN, call SecCertificateCopyCommonName and process that + # string so that it's of the appropriate type. + # 4. To get the SAN, we need to do something a bit more complex: + # a. Call SecCertificateCopyValues to get the data, requesting + # kSecOIDSubjectAltName. + # b. Mess about with this dictionary to try to get the SANs out. + # + # This is gross. Really gross. It's going to be a few hundred LoC extra + # just to repeat something that SecureTransport can *already do*. So my + # operating assumption at this time is that what we want to do is + # instead to just flag to urllib3 that it shouldn't do its own hostname + # validation when using SecureTransport. + if not binary_form: + raise ValueError("SecureTransport only supports dumping binary certs") + trust = Security.SecTrustRef() + certdata = None + der_bytes = None + + try: + # Grab the trust store. + result = Security.SSLCopyPeerTrust(self.context, ctypes.byref(trust)) + _assert_no_error(result) + if not trust: + # Probably we haven't done the handshake yet. No biggie. + return None + + cert_count = Security.SecTrustGetCertificateCount(trust) + if not cert_count: + # Also a case that might happen if we haven't handshaked. + # Handshook? Handshaken? + return None + + leaf = Security.SecTrustGetCertificateAtIndex(trust, 0) + assert leaf + + # Ok, now we want the DER bytes. + certdata = Security.SecCertificateCopyData(leaf) + assert certdata + + data_length = CoreFoundation.CFDataGetLength(certdata) + data_buffer = CoreFoundation.CFDataGetBytePtr(certdata) + der_bytes = ctypes.string_at(data_buffer, data_length) + finally: + if certdata: + CoreFoundation.CFRelease(certdata) + if trust: + CoreFoundation.CFRelease(trust) + + return der_bytes + + def version(self): + protocol = Security.SSLProtocol() + result = Security.SSLGetNegotiatedProtocolVersion( + self.context, ctypes.byref(protocol) + ) + _assert_no_error(result) + if protocol.value == SecurityConst.kTLSProtocol13: + raise ssl.SSLError("SecureTransport does not support TLS 1.3") + elif protocol.value == SecurityConst.kTLSProtocol12: + return "TLSv1.2" + elif protocol.value == SecurityConst.kTLSProtocol11: + return "TLSv1.1" + elif protocol.value == SecurityConst.kTLSProtocol1: + return "TLSv1" + elif protocol.value == SecurityConst.kSSLProtocol3: + return "SSLv3" + elif protocol.value == SecurityConst.kSSLProtocol2: + return "SSLv2" + else: + raise ssl.SSLError("Unknown TLS version: %r" % protocol) + + def _reuse(self): + self._makefile_refs += 1 + + def _drop(self): + if self._makefile_refs < 1: + self.close() + else: + self._makefile_refs -= 1 + + +if _fileobject: # Platform-specific: Python 2 + + def makefile(self, mode, bufsize=-1): + self._makefile_refs += 1 + return _fileobject(self, mode, bufsize, close=True) + +else: # Platform-specific: Python 3 + + def makefile(self, mode="r", buffering=None, *args, **kwargs): + # We disable buffering with SecureTransport because it conflicts with + # the buffering that ST does internally (see issue #1153 for more). + buffering = 0 + return backport_makefile(self, mode, buffering, *args, **kwargs) + + +WrappedSocket.makefile = makefile + + +class SecureTransportContext(object): + """ + I am a wrapper class for the SecureTransport library, to translate the + interface of the standard library ``SSLContext`` object to calls into + SecureTransport. + """ + + def __init__(self, protocol): + self._min_version, self._max_version = _protocol_to_min_max[protocol] + self._options = 0 + self._verify = False + self._trust_bundle = None + self._client_cert = None + self._client_key = None + self._client_key_passphrase = None + self._alpn_protocols = None + + @property + def check_hostname(self): + """ + SecureTransport cannot have its hostname checking disabled. For more, + see the comment on getpeercert() in this file. + """ + return True + + @check_hostname.setter + def check_hostname(self, value): + """ + SecureTransport cannot have its hostname checking disabled. For more, + see the comment on getpeercert() in this file. + """ + pass + + @property + def options(self): + # TODO: Well, crap. + # + # So this is the bit of the code that is the most likely to cause us + # trouble. Essentially we need to enumerate all of the SSL options that + # users might want to use and try to see if we can sensibly translate + # them, or whether we should just ignore them. + return self._options + + @options.setter + def options(self, value): + # TODO: Update in line with above. + self._options = value + + @property + def verify_mode(self): + return ssl.CERT_REQUIRED if self._verify else ssl.CERT_NONE + + @verify_mode.setter + def verify_mode(self, value): + self._verify = True if value == ssl.CERT_REQUIRED else False + + def set_default_verify_paths(self): + # So, this has to do something a bit weird. Specifically, what it does + # is nothing. + # + # This means that, if we had previously had load_verify_locations + # called, this does not undo that. We need to do that because it turns + # out that the rest of the urllib3 code will attempt to load the + # default verify paths if it hasn't been told about any paths, even if + # the context itself was sometime earlier. We resolve that by just + # ignoring it. + pass + + def load_default_certs(self): + return self.set_default_verify_paths() + + def set_ciphers(self, ciphers): + # For now, we just require the default cipher string. + if ciphers != util.ssl_.DEFAULT_CIPHERS: + raise ValueError("SecureTransport doesn't support custom cipher strings") + + def load_verify_locations(self, cafile=None, capath=None, cadata=None): + # OK, we only really support cadata and cafile. + if capath is not None: + raise ValueError("SecureTransport does not support cert directories") + + # Raise if cafile does not exist. + if cafile is not None: + with open(cafile): + pass + + self._trust_bundle = cafile or cadata + + def load_cert_chain(self, certfile, keyfile=None, password=None): + self._client_cert = certfile + self._client_key = keyfile + self._client_cert_passphrase = password + + def set_alpn_protocols(self, protocols): + """ + Sets the ALPN protocols that will later be set on the context. + + Raises a NotImplementedError if ALPN is not supported. + """ + if not hasattr(Security, "SSLSetALPNProtocols"): + raise NotImplementedError( + "SecureTransport supports ALPN only in macOS 10.12+" + ) + self._alpn_protocols = [six.ensure_binary(p) for p in protocols] + + def wrap_socket( + self, + sock, + server_side=False, + do_handshake_on_connect=True, + suppress_ragged_eofs=True, + server_hostname=None, + ): + # So, what do we do here? Firstly, we assert some properties. This is a + # stripped down shim, so there is some functionality we don't support. + # See PEP 543 for the real deal. + assert not server_side + assert do_handshake_on_connect + assert suppress_ragged_eofs + + # Ok, we're good to go. Now we want to create the wrapped socket object + # and store it in the appropriate place. + wrapped_socket = WrappedSocket(sock) + + # Now we can handshake + wrapped_socket.handshake( + server_hostname, + self._verify, + self._trust_bundle, + self._min_version, + self._max_version, + self._client_cert, + self._client_key, + self._client_key_passphrase, + self._alpn_protocols, + ) + return wrapped_socket diff --git a/_vendor/urllib3/contrib/socks.py b/_vendor/urllib3/contrib/socks.py new file mode 100644 index 0000000..c326e80 --- /dev/null +++ b/_vendor/urllib3/contrib/socks.py @@ -0,0 +1,216 @@ +# -*- coding: utf-8 -*- +""" +This module contains provisional support for SOCKS proxies from within +urllib3. This module supports SOCKS4, SOCKS4A (an extension of SOCKS4), and +SOCKS5. To enable its functionality, either install PySocks or install this +module with the ``socks`` extra. + +The SOCKS implementation supports the full range of urllib3 features. It also +supports the following SOCKS features: + +- SOCKS4A (``proxy_url='socks4a://...``) +- SOCKS4 (``proxy_url='socks4://...``) +- SOCKS5 with remote DNS (``proxy_url='socks5h://...``) +- SOCKS5 with local DNS (``proxy_url='socks5://...``) +- Usernames and passwords for the SOCKS proxy + +.. note:: + It is recommended to use ``socks5h://`` or ``socks4a://`` schemes in + your ``proxy_url`` to ensure that DNS resolution is done from the remote + server instead of client-side when connecting to a domain name. + +SOCKS4 supports IPv4 and domain names with the SOCKS4A extension. SOCKS5 +supports IPv4, IPv6, and domain names. + +When connecting to a SOCKS4 proxy the ``username`` portion of the ``proxy_url`` +will be sent as the ``userid`` section of the SOCKS request: + +.. code-block:: python + + proxy_url="socks4a://@proxy-host" + +When connecting to a SOCKS5 proxy the ``username`` and ``password`` portion +of the ``proxy_url`` will be sent as the username/password to authenticate +with the proxy: + +.. code-block:: python + + proxy_url="socks5h://:@proxy-host" + +""" +from __future__ import absolute_import + +try: + import socks +except ImportError: + import warnings + + from ..exceptions import DependencyWarning + + warnings.warn( + ( + "SOCKS support in urllib3 requires the installation of optional " + "dependencies: specifically, PySocks. For more information, see " + "https://urllib3.readthedocs.io/en/1.26.x/contrib.html#socks-proxies" + ), + DependencyWarning, + ) + raise + +from socket import error as SocketError +from socket import timeout as SocketTimeout + +from ..connection import HTTPConnection, HTTPSConnection +from ..connectionpool import HTTPConnectionPool, HTTPSConnectionPool +from ..exceptions import ConnectTimeoutError, NewConnectionError +from ..poolmanager import PoolManager +from ..util.url import parse_url + +try: + import ssl +except ImportError: + ssl = None + + +class SOCKSConnection(HTTPConnection): + """ + A plain-text HTTP connection that connects via a SOCKS proxy. + """ + + def __init__(self, *args, **kwargs): + self._socks_options = kwargs.pop("_socks_options") + super(SOCKSConnection, self).__init__(*args, **kwargs) + + def _new_conn(self): + """ + Establish a new connection via the SOCKS proxy. + """ + extra_kw = {} + if self.source_address: + extra_kw["source_address"] = self.source_address + + if self.socket_options: + extra_kw["socket_options"] = self.socket_options + + try: + conn = socks.create_connection( + (self.host, self.port), + proxy_type=self._socks_options["socks_version"], + proxy_addr=self._socks_options["proxy_host"], + proxy_port=self._socks_options["proxy_port"], + proxy_username=self._socks_options["username"], + proxy_password=self._socks_options["password"], + proxy_rdns=self._socks_options["rdns"], + timeout=self.timeout, + **extra_kw + ) + + except SocketTimeout: + raise ConnectTimeoutError( + self, + "Connection to %s timed out. (connect timeout=%s)" + % (self.host, self.timeout), + ) + + except socks.ProxyError as e: + # This is fragile as hell, but it seems to be the only way to raise + # useful errors here. + if e.socket_err: + error = e.socket_err + if isinstance(error, SocketTimeout): + raise ConnectTimeoutError( + self, + "Connection to %s timed out. (connect timeout=%s)" + % (self.host, self.timeout), + ) + else: + raise NewConnectionError( + self, "Failed to establish a new connection: %s" % error + ) + else: + raise NewConnectionError( + self, "Failed to establish a new connection: %s" % e + ) + + except SocketError as e: # Defensive: PySocks should catch all these. + raise NewConnectionError( + self, "Failed to establish a new connection: %s" % e + ) + + return conn + + +# We don't need to duplicate the Verified/Unverified distinction from +# urllib3/connection.py here because the HTTPSConnection will already have been +# correctly set to either the Verified or Unverified form by that module. This +# means the SOCKSHTTPSConnection will automatically be the correct type. +class SOCKSHTTPSConnection(SOCKSConnection, HTTPSConnection): + pass + + +class SOCKSHTTPConnectionPool(HTTPConnectionPool): + ConnectionCls = SOCKSConnection + + +class SOCKSHTTPSConnectionPool(HTTPSConnectionPool): + ConnectionCls = SOCKSHTTPSConnection + + +class SOCKSProxyManager(PoolManager): + """ + A version of the urllib3 ProxyManager that routes connections via the + defined SOCKS proxy. + """ + + pool_classes_by_scheme = { + "http": SOCKSHTTPConnectionPool, + "https": SOCKSHTTPSConnectionPool, + } + + def __init__( + self, + proxy_url, + username=None, + password=None, + num_pools=10, + headers=None, + **connection_pool_kw + ): + parsed = parse_url(proxy_url) + + if username is None and password is None and parsed.auth is not None: + split = parsed.auth.split(":") + if len(split) == 2: + username, password = split + if parsed.scheme == "socks5": + socks_version = socks.PROXY_TYPE_SOCKS5 + rdns = False + elif parsed.scheme == "socks5h": + socks_version = socks.PROXY_TYPE_SOCKS5 + rdns = True + elif parsed.scheme == "socks4": + socks_version = socks.PROXY_TYPE_SOCKS4 + rdns = False + elif parsed.scheme == "socks4a": + socks_version = socks.PROXY_TYPE_SOCKS4 + rdns = True + else: + raise ValueError("Unable to determine SOCKS version from %s" % proxy_url) + + self.proxy_url = proxy_url + + socks_options = { + "socks_version": socks_version, + "proxy_host": parsed.host, + "proxy_port": parsed.port, + "username": username, + "password": password, + "rdns": rdns, + } + connection_pool_kw["_socks_options"] = socks_options + + super(SOCKSProxyManager, self).__init__( + num_pools, headers, **connection_pool_kw + ) + + self.pool_classes_by_scheme = SOCKSProxyManager.pool_classes_by_scheme diff --git a/_vendor/urllib3/exceptions.py b/_vendor/urllib3/exceptions.py new file mode 100644 index 0000000..cba6f3f --- /dev/null +++ b/_vendor/urllib3/exceptions.py @@ -0,0 +1,323 @@ +from __future__ import absolute_import + +from .packages.six.moves.http_client import IncompleteRead as httplib_IncompleteRead + +# Base Exceptions + + +class HTTPError(Exception): + """Base exception used by this module.""" + + pass + + +class HTTPWarning(Warning): + """Base warning used by this module.""" + + pass + + +class PoolError(HTTPError): + """Base exception for errors caused within a pool.""" + + def __init__(self, pool, message): + self.pool = pool + HTTPError.__init__(self, "%s: %s" % (pool, message)) + + def __reduce__(self): + # For pickling purposes. + return self.__class__, (None, None) + + +class RequestError(PoolError): + """Base exception for PoolErrors that have associated URLs.""" + + def __init__(self, pool, url, message): + self.url = url + PoolError.__init__(self, pool, message) + + def __reduce__(self): + # For pickling purposes. + return self.__class__, (None, self.url, None) + + +class SSLError(HTTPError): + """Raised when SSL certificate fails in an HTTPS connection.""" + + pass + + +class ProxyError(HTTPError): + """Raised when the connection to a proxy fails.""" + + def __init__(self, message, error, *args): + super(ProxyError, self).__init__(message, error, *args) + self.original_error = error + + +class DecodeError(HTTPError): + """Raised when automatic decoding based on Content-Type fails.""" + + pass + + +class ProtocolError(HTTPError): + """Raised when something unexpected happens mid-request/response.""" + + pass + + +#: Renamed to ProtocolError but aliased for backwards compatibility. +ConnectionError = ProtocolError + + +# Leaf Exceptions + + +class MaxRetryError(RequestError): + """Raised when the maximum number of retries is exceeded. + + :param pool: The connection pool + :type pool: :class:`~urllib3.connectionpool.HTTPConnectionPool` + :param string url: The requested Url + :param exceptions.Exception reason: The underlying error + + """ + + def __init__(self, pool, url, reason=None): + self.reason = reason + + message = "Max retries exceeded with url: %s (Caused by %r)" % (url, reason) + + RequestError.__init__(self, pool, url, message) + + +class HostChangedError(RequestError): + """Raised when an existing pool gets a request for a foreign host.""" + + def __init__(self, pool, url, retries=3): + message = "Tried to open a foreign host with url: %s" % url + RequestError.__init__(self, pool, url, message) + self.retries = retries + + +class TimeoutStateError(HTTPError): + """Raised when passing an invalid state to a timeout""" + + pass + + +class TimeoutError(HTTPError): + """Raised when a socket timeout error occurs. + + Catching this error will catch both :exc:`ReadTimeoutErrors + ` and :exc:`ConnectTimeoutErrors `. + """ + + pass + + +class ReadTimeoutError(TimeoutError, RequestError): + """Raised when a socket timeout occurs while receiving data from a server""" + + pass + + +# This timeout error does not have a URL attached and needs to inherit from the +# base HTTPError +class ConnectTimeoutError(TimeoutError): + """Raised when a socket timeout occurs while connecting to a server""" + + pass + + +class NewConnectionError(ConnectTimeoutError, PoolError): + """Raised when we fail to establish a new connection. Usually ECONNREFUSED.""" + + pass + + +class EmptyPoolError(PoolError): + """Raised when a pool runs out of connections and no more are allowed.""" + + pass + + +class ClosedPoolError(PoolError): + """Raised when a request enters a pool after the pool has been closed.""" + + pass + + +class LocationValueError(ValueError, HTTPError): + """Raised when there is something wrong with a given URL input.""" + + pass + + +class LocationParseError(LocationValueError): + """Raised when get_host or similar fails to parse the URL input.""" + + def __init__(self, location): + message = "Failed to parse: %s" % location + HTTPError.__init__(self, message) + + self.location = location + + +class URLSchemeUnknown(LocationValueError): + """Raised when a URL input has an unsupported scheme.""" + + def __init__(self, scheme): + message = "Not supported URL scheme %s" % scheme + super(URLSchemeUnknown, self).__init__(message) + + self.scheme = scheme + + +class ResponseError(HTTPError): + """Used as a container for an error reason supplied in a MaxRetryError.""" + + GENERIC_ERROR = "too many error responses" + SPECIFIC_ERROR = "too many {status_code} error responses" + + +class SecurityWarning(HTTPWarning): + """Warned when performing security reducing actions""" + + pass + + +class SubjectAltNameWarning(SecurityWarning): + """Warned when connecting to a host with a certificate missing a SAN.""" + + pass + + +class InsecureRequestWarning(SecurityWarning): + """Warned when making an unverified HTTPS request.""" + + pass + + +class SystemTimeWarning(SecurityWarning): + """Warned when system time is suspected to be wrong""" + + pass + + +class InsecurePlatformWarning(SecurityWarning): + """Warned when certain TLS/SSL configuration is not available on a platform.""" + + pass + + +class SNIMissingWarning(HTTPWarning): + """Warned when making a HTTPS request without SNI available.""" + + pass + + +class DependencyWarning(HTTPWarning): + """ + Warned when an attempt is made to import a module with missing optional + dependencies. + """ + + pass + + +class ResponseNotChunked(ProtocolError, ValueError): + """Response needs to be chunked in order to read it as chunks.""" + + pass + + +class BodyNotHttplibCompatible(HTTPError): + """ + Body should be :class:`http.client.HTTPResponse` like + (have an fp attribute which returns raw chunks) for read_chunked(). + """ + + pass + + +class IncompleteRead(HTTPError, httplib_IncompleteRead): + """ + Response length doesn't match expected Content-Length + + Subclass of :class:`http.client.IncompleteRead` to allow int value + for ``partial`` to avoid creating large objects on streamed reads. + """ + + def __init__(self, partial, expected): + super(IncompleteRead, self).__init__(partial, expected) + + def __repr__(self): + return "IncompleteRead(%i bytes read, %i more expected)" % ( + self.partial, + self.expected, + ) + + +class InvalidChunkLength(HTTPError, httplib_IncompleteRead): + """Invalid chunk length in a chunked response.""" + + def __init__(self, response, length): + super(InvalidChunkLength, self).__init__( + response.tell(), response.length_remaining + ) + self.response = response + self.length = length + + def __repr__(self): + return "InvalidChunkLength(got length %r, %i bytes read)" % ( + self.length, + self.partial, + ) + + +class InvalidHeader(HTTPError): + """The header provided was somehow invalid.""" + + pass + + +class ProxySchemeUnknown(AssertionError, URLSchemeUnknown): + """ProxyManager does not support the supplied scheme""" + + # TODO(t-8ch): Stop inheriting from AssertionError in v2.0. + + def __init__(self, scheme): + # 'localhost' is here because our URL parser parses + # localhost:8080 -> scheme=localhost, remove if we fix this. + if scheme == "localhost": + scheme = None + if scheme is None: + message = "Proxy URL had no scheme, should start with http:// or https://" + else: + message = ( + "Proxy URL had unsupported scheme %s, should use http:// or https://" + % scheme + ) + super(ProxySchemeUnknown, self).__init__(message) + + +class ProxySchemeUnsupported(ValueError): + """Fetching HTTPS resources through HTTPS proxies is unsupported""" + + pass + + +class HeaderParsingError(HTTPError): + """Raised by assert_header_parsing, but we convert it to a log.warning statement.""" + + def __init__(self, defects, unparsed_data): + message = "%s, unparsed data: %r" % (defects or "Unknown", unparsed_data) + super(HeaderParsingError, self).__init__(message) + + +class UnrewindableBodyError(HTTPError): + """urllib3 encountered an error when trying to rewind a body""" + + pass diff --git a/_vendor/urllib3/fields.py b/_vendor/urllib3/fields.py new file mode 100644 index 0000000..9d630f4 --- /dev/null +++ b/_vendor/urllib3/fields.py @@ -0,0 +1,274 @@ +from __future__ import absolute_import + +import email.utils +import mimetypes +import re + +from .packages import six + + +def guess_content_type(filename, default="application/octet-stream"): + """ + Guess the "Content-Type" of a file. + + :param filename: + The filename to guess the "Content-Type" of using :mod:`mimetypes`. + :param default: + If no "Content-Type" can be guessed, default to `default`. + """ + if filename: + return mimetypes.guess_type(filename)[0] or default + return default + + +def format_header_param_rfc2231(name, value): + """ + Helper function to format and quote a single header parameter using the + strategy defined in RFC 2231. + + Particularly useful for header parameters which might contain + non-ASCII values, like file names. This follows + `RFC 2388 Section 4.4 `_. + + :param name: + The name of the parameter, a string expected to be ASCII only. + :param value: + The value of the parameter, provided as ``bytes`` or `str``. + :ret: + An RFC-2231-formatted unicode string. + """ + if isinstance(value, six.binary_type): + value = value.decode("utf-8") + + if not any(ch in value for ch in '"\\\r\n'): + result = u'%s="%s"' % (name, value) + try: + result.encode("ascii") + except (UnicodeEncodeError, UnicodeDecodeError): + pass + else: + return result + + if six.PY2: # Python 2: + value = value.encode("utf-8") + + # encode_rfc2231 accepts an encoded string and returns an ascii-encoded + # string in Python 2 but accepts and returns unicode strings in Python 3 + value = email.utils.encode_rfc2231(value, "utf-8") + value = "%s*=%s" % (name, value) + + if six.PY2: # Python 2: + value = value.decode("utf-8") + + return value + + +_HTML5_REPLACEMENTS = { + u"\u0022": u"%22", + # Replace "\" with "\\". + u"\u005C": u"\u005C\u005C", +} + +# All control characters from 0x00 to 0x1F *except* 0x1B. +_HTML5_REPLACEMENTS.update( + { + six.unichr(cc): u"%{:02X}".format(cc) + for cc in range(0x00, 0x1F + 1) + if cc not in (0x1B,) + } +) + + +def _replace_multiple(value, needles_and_replacements): + def replacer(match): + return needles_and_replacements[match.group(0)] + + pattern = re.compile( + r"|".join([re.escape(needle) for needle in needles_and_replacements.keys()]) + ) + + result = pattern.sub(replacer, value) + + return result + + +def format_header_param_html5(name, value): + """ + Helper function to format and quote a single header parameter using the + HTML5 strategy. + + Particularly useful for header parameters which might contain + non-ASCII values, like file names. This follows the `HTML5 Working Draft + Section 4.10.22.7`_ and matches the behavior of curl and modern browsers. + + .. _HTML5 Working Draft Section 4.10.22.7: + https://w3c.github.io/html/sec-forms.html#multipart-form-data + + :param name: + The name of the parameter, a string expected to be ASCII only. + :param value: + The value of the parameter, provided as ``bytes`` or `str``. + :ret: + A unicode string, stripped of troublesome characters. + """ + if isinstance(value, six.binary_type): + value = value.decode("utf-8") + + value = _replace_multiple(value, _HTML5_REPLACEMENTS) + + return u'%s="%s"' % (name, value) + + +# For backwards-compatibility. +format_header_param = format_header_param_html5 + + +class RequestField(object): + """ + A data container for request body parameters. + + :param name: + The name of this request field. Must be unicode. + :param data: + The data/value body. + :param filename: + An optional filename of the request field. Must be unicode. + :param headers: + An optional dict-like object of headers to initially use for the field. + :param header_formatter: + An optional callable that is used to encode and format the headers. By + default, this is :func:`format_header_param_html5`. + """ + + def __init__( + self, + name, + data, + filename=None, + headers=None, + header_formatter=format_header_param_html5, + ): + self._name = name + self._filename = filename + self.data = data + self.headers = {} + if headers: + self.headers = dict(headers) + self.header_formatter = header_formatter + + @classmethod + def from_tuples(cls, fieldname, value, header_formatter=format_header_param_html5): + """ + A :class:`~urllib3.fields.RequestField` factory from old-style tuple parameters. + + Supports constructing :class:`~urllib3.fields.RequestField` from + parameter of key/value strings AND key/filetuple. A filetuple is a + (filename, data, MIME type) tuple where the MIME type is optional. + For example:: + + 'foo': 'bar', + 'fakefile': ('foofile.txt', 'contents of foofile'), + 'realfile': ('barfile.txt', open('realfile').read()), + 'typedfile': ('bazfile.bin', open('bazfile').read(), 'image/jpeg'), + 'nonamefile': 'contents of nonamefile field', + + Field names and filenames must be unicode. + """ + if isinstance(value, tuple): + if len(value) == 3: + filename, data, content_type = value + else: + filename, data = value + content_type = guess_content_type(filename) + else: + filename = None + content_type = None + data = value + + request_param = cls( + fieldname, data, filename=filename, header_formatter=header_formatter + ) + request_param.make_multipart(content_type=content_type) + + return request_param + + def _render_part(self, name, value): + """ + Overridable helper function to format a single header parameter. By + default, this calls ``self.header_formatter``. + + :param name: + The name of the parameter, a string expected to be ASCII only. + :param value: + The value of the parameter, provided as a unicode string. + """ + + return self.header_formatter(name, value) + + def _render_parts(self, header_parts): + """ + Helper function to format and quote a single header. + + Useful for single headers that are composed of multiple items. E.g., + 'Content-Disposition' fields. + + :param header_parts: + A sequence of (k, v) tuples or a :class:`dict` of (k, v) to format + as `k1="v1"; k2="v2"; ...`. + """ + parts = [] + iterable = header_parts + if isinstance(header_parts, dict): + iterable = header_parts.items() + + for name, value in iterable: + if value is not None: + parts.append(self._render_part(name, value)) + + return u"; ".join(parts) + + def render_headers(self): + """ + Renders the headers for this request field. + """ + lines = [] + + sort_keys = ["Content-Disposition", "Content-Type", "Content-Location"] + for sort_key in sort_keys: + if self.headers.get(sort_key, False): + lines.append(u"%s: %s" % (sort_key, self.headers[sort_key])) + + for header_name, header_value in self.headers.items(): + if header_name not in sort_keys: + if header_value: + lines.append(u"%s: %s" % (header_name, header_value)) + + lines.append(u"\r\n") + return u"\r\n".join(lines) + + def make_multipart( + self, content_disposition=None, content_type=None, content_location=None + ): + """ + Makes this request field into a multipart request field. + + This method overrides "Content-Disposition", "Content-Type" and + "Content-Location" headers to the request parameter. + + :param content_type: + The 'Content-Type' of the request body. + :param content_location: + The 'Content-Location' of the request body. + + """ + self.headers["Content-Disposition"] = content_disposition or u"form-data" + self.headers["Content-Disposition"] += u"; ".join( + [ + u"", + self._render_parts( + ((u"name", self._name), (u"filename", self._filename)) + ), + ] + ) + self.headers["Content-Type"] = content_type + self.headers["Content-Location"] = content_location diff --git a/_vendor/urllib3/filepost.py b/_vendor/urllib3/filepost.py new file mode 100644 index 0000000..36c9252 --- /dev/null +++ b/_vendor/urllib3/filepost.py @@ -0,0 +1,98 @@ +from __future__ import absolute_import + +import binascii +import codecs +import os +from io import BytesIO + +from .fields import RequestField +from .packages import six +from .packages.six import b + +writer = codecs.lookup("utf-8")[3] + + +def choose_boundary(): + """ + Our embarrassingly-simple replacement for mimetools.choose_boundary. + """ + boundary = binascii.hexlify(os.urandom(16)) + if not six.PY2: + boundary = boundary.decode("ascii") + return boundary + + +def iter_field_objects(fields): + """ + Iterate over fields. + + Supports list of (k, v) tuples and dicts, and lists of + :class:`~urllib3.fields.RequestField`. + + """ + if isinstance(fields, dict): + i = six.iteritems(fields) + else: + i = iter(fields) + + for field in i: + if isinstance(field, RequestField): + yield field + else: + yield RequestField.from_tuples(*field) + + +def iter_fields(fields): + """ + .. deprecated:: 1.6 + + Iterate over fields. + + The addition of :class:`~urllib3.fields.RequestField` makes this function + obsolete. Instead, use :func:`iter_field_objects`, which returns + :class:`~urllib3.fields.RequestField` objects. + + Supports list of (k, v) tuples and dicts. + """ + if isinstance(fields, dict): + return ((k, v) for k, v in six.iteritems(fields)) + + return ((k, v) for k, v in fields) + + +def encode_multipart_formdata(fields, boundary=None): + """ + Encode a dictionary of ``fields`` using the multipart/form-data MIME format. + + :param fields: + Dictionary of fields or list of (key, :class:`~urllib3.fields.RequestField`). + + :param boundary: + If not specified, then a random boundary will be generated using + :func:`urllib3.filepost.choose_boundary`. + """ + body = BytesIO() + if boundary is None: + boundary = choose_boundary() + + for field in iter_field_objects(fields): + body.write(b("--%s\r\n" % (boundary))) + + writer(body).write(field.render_headers()) + data = field.data + + if isinstance(data, int): + data = str(data) # Backwards compatibility + + if isinstance(data, six.text_type): + writer(body).write(data) + else: + body.write(data) + + body.write(b"\r\n") + + body.write(b("--%s--\r\n" % (boundary))) + + content_type = str("multipart/form-data; boundary=%s" % boundary) + + return body.getvalue(), content_type diff --git a/_vendor/urllib3/packages/__init__.py b/_vendor/urllib3/packages/__init__.py new file mode 100644 index 0000000..e69de29 diff --git a/_vendor/urllib3/packages/__pycache__/__init__.cpython-310.pyc b/_vendor/urllib3/packages/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..518ca310599ee212edd99aa450d33638f753999e GIT binary patch literal 157 zcmd1j<>g`k0^S>8$sqbMh(HF6K#l_t7qb9~6oz01O-8?!3`HPe1o6v3za+OnzaX3yV0yKRm(Nn5u~FE>5hIQo6RZ*~^|Njb;w zk00>a**Eu_H*aR%ym_;YzCI_0U*DfUP^mr}i+z!v&flf*?8M`(=#RxztQb?4vTN3a zU9>I2@mjnXmv^F=kax0}ly|C_l6Sh8R*7OpC5t_7YRpmA>X=H6+r{3buQeYG zl@ivw>)j2&pn&kp)a3}j+`SI@Hjc*J>(v$b=hc;Si5D#Ru2NU4HEON8YAz}MYv8|H zU8}AM{Oi;p;;&Qd0{`{!ub+!c+6|Jopf&_?8`TZ?Z&Dir|7P)TRGS0;7ImY#Dad=X zl)F{k9K_wC2Hn2rEq%4RwQi}~)a?O&+mLR1kY|UwL+w<%f|x7Sl`0>^>{h$go&esf z_D1kNwJ(CV&Z}|1V1GdE4=}h>T7FR7DgJe6_28V1cCJ%*sk;N{9<@if@X&Y?xK67f z;A-k!r|wmUgH-paBkHJNvrZjT_p1j2_(AoM z9>8TatSSMll&eMpcvKx%)c_t-_9_YO1LKKB-Qr(*ZoKrd2C| z->BXg!82+mf@jsNdQ*_*3H4;q%BR%R0W_zc3812SbJU`@sAq%FGwM0@)*%1e)Z5iN z0{ETkJJj<5{DOLy`py9UF7k(WtH;Q!l9>55j*!{U7y{0sH~=Q&GJ??QT#XTp3dz3gUhS{-1^a=K}wS z;s40Wm~n%!pI0AMzYxH`s6M8CDS&@j{fhck!o?fV=a;Ep8@Hdg^^5Ke;HO_#AD^>F zt*tS{-LNbIB%BmWcXw=wd6TSop?jPy^c-(kxD{cZ&PUIhJq z1pPq-{b2Oc% z@+0UkBj~T98b2FBpNpW+N6;4xG`hNYi+c+w?Fgl}wkiF5{KUPWTk}WFF?sJsxN_(UlK~*3Vgq;{+2ue=Ztbe+8Ps%} zduveBt*Gf`sp%ioKL$1Zllls3`ij(ayUf=Aj2iw$cwv%B0iSQf&s!?i<+Hkcc9$>Sz7jUA`q}jH1OHsZV&L;F8Ev;;By&jxIDt=3i$GZPhRl3Lom3~%!i{^ai_a8 zs^gB1I+7)d+2@n`4e+fm?uEOdxDRfjxF7Du;sLlf6z_z)sd%tHfcIuewMA0h zD5-9eR5weit;K__gnL)sFN2w37RJ5BIJ}m8C>k`9a029MU z0{Ah&j|$B8eFQ#+yaBim<6Xk@IN*w_imvQjMv5cu$k|bZm(N*a$BWfRM$ncqWueY- zH#t@-PPp}AL()zbC*8@h6U7s7bx}VuiCn`)j}jrE%4+smW!yr&KM6<`n{eIY6x@;G z$vU}uRKku+SQTO9xG_8-e&c`*es0kPj#c<;cqV`|ul;Y2{K3SdnbZ>Anb*)6<@`6%Ew;!XUI1D?VAB%UhZ zS#VEUU*o>Xy?N{jgq@nRi%;VHUOcDqU{DpGs$(~x-iL=Jz7Zi$x=b^}{g+75akCRd z*z9-$d3!Z0z_p=B&GZu57EycRx&mjIe z#6O47=Meu~DOQgYEwgz+3!T?i|4R6pR$1W=OAf(SLxlLzQYFtX?@;(FC^6s0gSZni`%gat|RWm-#zl;BkyJY zv+r{Y=g=1_el)i3d#qTjb@TnrYOUI=x?X;yq4TFS;QDC3(ok-`dA!`r>#4ezZ`AXL zr<=#|+MF-fResCMR5lD+{*v;r*QiZ3-BNX8vZ0$pt!sC?^|A6q6*=6dt3Bk|HXH=) zoRmTe4L!P}mD*I;baUZ`mu-~va-7B4IzgC@pBO8jELYE;KmSAp-mV`r?8NiRGB|Fm z2nnWWV>H{KXq+t@O!(GA6|^q;5$3Z8kH_+rg=F?njrHwM z?HijDlN%?ilN*|4J?b_$+<2mTlY4SYWn-;6ywS8~kr! z+E15CHMd?WZAWph5b1=~>UpRTgbo4AOsP~aPq?L$@03at4K-CGoGq13OqFXUM)!rt zw9(R8hGpPv!}AK;lZj<538^LFJO70Fr`bjQ-lSV8jp)Wisn#efS67Hj_#@0mC_|mn zj5QN01@vjsFl4Y8qq8a#z|+xsGxJ)oA&&)Da2#vlj8I7&V}hsy8DT}5Zrbw zeHrn`)Ab|%JMnnb!7XG@l>nP2R1z&o0iAowt?9k4SNZ081?_*y8q$}bvfq+Qlq!()H7x3pQ$M!P-wN zw??1eQz})^OCCBUw+jK)VazD|v~K9ZgtXF+H-^W2yE*BnP}EedIlsl=K@87Qse~Fm zGET<5PsFodx2=R_f4w!(MF2@YG?>&&kXl1a8q*iixsuNHbfRg%Kr-kqN5ms| zycC=aYRSem!xnG>iOHW=fD>^+=GoW?CMp$wrUz3MxIlOzrP6pOp9K+%Dey&)-+QQW z(p86KMi{DuWwAWM>@+^!jc}SVbWd!~K5NfFz_DV@xL!UJSFtHHYQ~z4&%`mF6AGL& zgArsP(=kau=}k?#TCYbj(r!O~_~9*n9IPJD-SktuQB!`r?w)$d($_GpP)6uMYSr*~ z^!0c}nBIse&G?QUk;<<|*c8LB zf-|qefaAL6I?|5M9y}iN1PpG2f}q}<4ORz@!0f{4WNU*+T(c@a4W1G1T?1dpnF-Rai^fE2dldav_zq-ot;_$0z*X70zx zZ!POUXL0Te@!G?Dc{r3HM(tV5b*72HE4CMl&(;{jFf5ZpS}@>*(Y0!YMIB{PoP0*X zS&t=|Z7lYJeZmGG39_8Gu}a#78#IS*M_;jNP8kiOC&rfnQe1fmrL>?zX5Z zn5eL=)~J+g-VOj^9xTNdfekTnl*nl^iFy#KxJ>v-26^*q&M~ApT`al*-xbwn>J;- zaKwNk@XTjG%$REz&X_YvnM3n4m^(3-UXHmmS+{2rv&oqx zm=&?%j2fgUAVp$^j4W|x@TLqS-+^ikBXc=0Ga5NyFx6hf{WPXoP9uIAQ>_3QhOp!O z41)+Q#`^C>Ng{286L1RCaK=hm2?!}E+f2#9EE5swn-~=K?6v!oh3N3*=+rbdgoP8F_WTghvRQx2D#$Bj(u>ee4P zdHidDtdwRO0i5R+gG1eu?O3(x<-Mt4LvgR*ND0S|SG~N5Rm@a#DZ(Rp z{_wuTTW;8#AF0-{7m(~`TTsX!Z05b=jj5W-54+d_PN4GYaLtv{PE~Bp< zTHZa4>4&2CN$mBoBfws9BuKYKGA>vQI9u)^)hTnC-9{DjWeMB3kg;qdcl3?d8>i~Q z${NjNOVIWpOm!BVP6q z%d86_M0wgI9_rdv5SysWxi}h1o{Z`A3~*_8x+Mf0jGGye82JgZ{{po~&`$=T>xUzy+HpPGYyn|($3$^gYqWBa#3h1I6M;7NS;S5fwT(8f9 zZqOrQLxW|;ZhfE3!(3F3h@vFl)Kl*Ie04;$BUE~*kQ1;|;)#JU9T$gw}2a3kO&{k4-vYFVDpysx(+MwiIs6uk&1&>(7lhZ5oW?sRiRW z7X?!Kc-a#%r--&J%6aGwBo_=ngES%}_orJ|EXr@~vd7&s< z6-}F_&b`EE{-|(ILosRU{wKz>CoV9BcO*5kXa9V`kc*uWvF{~xADv@#9-t%rAw+qc z-ZC8DA$h&Vl*YKOFw~{fMp7UWSW_DKVLT#aXJQFElg=bE2`BC(Gs#RUlgsoZ(it1N zAf{wlT|W|LCmxSDcFLL9LnjmmX&fSe>|qWz-3hOC8MT6Wj(JK}5U6BV7Y?sQlvdLC zH=y)I(H}*`E3DrL#6aKH4D)*`N3l<=j~=|&x2p|56Zujj)f&{Neoqx{v(czQcp08T z7$!nLT@7M;&3gpROo9R=5AE{49TJn1K@ zbW`Y($|>dB4X;RT3*aeHy8syWdl1r?YO;U~#M23!M0maf!FN(ODz4}GNnNgwx_;`k zdG~3zW8Oq#L~RURy&nfiRU)JLR#O$1k{Yzy(%4?_c+EWxHGHG#7L(BbyC_`3{G znfpCg@2ytQ#!91B!?Z`?*96}Kk=S>bz!21rx2kL*-Cj6YIDjV7WEs@gZ%y zBd4F;Bfi7Nx1^(zQhB(7Z9PYsIIYge0wVo%r7=0J-BFThavIv#QRrHSCrYFBDL*j^ zs6}sq-VDR*aGZ&i$sKPtCo#7*#;fjF z8O&oq(7Pp3g?3c7BdO=7_DG(Vga)ZRzwdZ+qE^DDMNX%D6fuG06!@lB z_(DhgvM>)$Z8-Fm&?I{_@CnJnG=;7-VQ9${ngsP_4TXXl!!(7iG`(S+&FX1Ceyn=B z6^0ZT5_(F_=C~h+(-Do3i^ANPVJOHpJ-_$Zc;sn?@fdqie3%8MtA6s>I9}~C85ZJ+ z0bgtA%JD`6UF3tld+6U|{H-t*O72J%h9d98M57+iLGsc+pAucEqP)%Vjy}mY$J@Q; z!zcVu8fjphrx1sCD-112XxOu*39K9#w8M?l%y-E6b~jG9!W4y$6f44#o8w*m1Kc}% z(a)MgVMwZ&%v(#1uBOlx7$h-MQ%$SUF1WA&os`V|K z{S;oZ43!Mff_f0zt3oSf(D#$#zo6*!3imdhqEjF?U3SQvnj4)EN-TBJcmfyjQp&<4Dlf4Dovpv+Iw@X{Db5R?-=M?@=r{%`jNP zN+&$OCxmK#57J_V(`78$0LL2Dy5#qm(RUCuRX1fBI0zT9q%>KZf`B$vH$qA_08DUy z=xa7g!_!TOG_1<4b2kDpip66h*3*7Q;3g305on4d+a!?FEx!*T9!v_#qf{#Tz2dFA zO`J&t9w1nrfN&-;rc{#&G8eRpC*4;E3(+05WCU4XhcYS9;zuIN&?oe0OuF?} z&h&I4D8Du^HK9a@-t-$i58{|7qAP`ROC3J$~+9DP}LW z=aAvGzmnwN>yDHmMhU&|#BKq{5&lv}9Kl-8gk6C~3O#K05-1`I@bq+;q*r8~ppYdj z zygDpqZ#lq<*Gj)2_#b zi3eDYkh@LBUi2U=bad5)0SKq8O3f|TrzZU#44RawmmCS?7t&@k;c98viTk0@^vVw2mt?b{hrChzNv zsp~O{J{yfG`usGM|HHBsiN=&E#?KH+eRtY?vdb1&Ra82$TTSBTy2MBTx!Z zuS%;7P8qYR2ihXXhsB5(3(gmNS_k)tMlWApAlT$Nn|jckhIXB<=T6{s&l4?hsHAPD z(&vG=PLhh((Yb-n7C2p|5Ae57cc{Q0g&oBY&|1QVn#xZaK_w}RmXDpCEIxiFXpz-*U@J#=8H{%*R!_QlVv8p>VC!wbZUH{D4H10E zrmak98bPZ*O4vAAvZt>x=Prm9JDu%_dpL|uPOt4acY<--is0l4XHW6gB}ZJrLfS$L z)Q;A)`s--iROPrRH`nLaYM%D5Wz(d6*An_0I6NOvP_)6ei3c`f{5ZeCy;>@gHm?nP z$hP}=7G=?eG2nUoHN68gV0qN^K_dx>2ETxysN}pkrD=eRV9LaRaLff!oH7J$6KTa& zYYao(2~WB@A;lC4u#{p}N)3uJ+C(X**e4NTK|#8pqy;^~-jW{SXrgNW98YY;-hw8o zP`|*=$F450fb1`;lRTm-QDs|(2(%w1>08lYeQ>d!k2sMBpG~oTdd8R%!qk>_Pqf1u zj1P4oNaW&pJU$o0c?u{#mYK!bJ#C#%#vXt;jAL<`0ECXP5h#^-BC;JwKyP>(GWp4I zT6@m##GY-VkOWUp>K#Yeg+$PPa#gH#2@IWTWlU8aMo(c%Yyjfr`m~>DPEW$T6js!_ zfrBJVuS4$n6=cGK?qm6E%PLDBUW_;hlTMI59gnG{1Ef3{3S)mY+?cAX`Qx0!*atP zVLrlEJOkk2al}-5AL8^8I_>SP9D5MqVH7K*N?8kVPljchgGU@Y@^ByQbFOVU=_lDU z*a^bU1;>WR;L+D0A6S76T(qB-1`QMPG>z`oh`@%!11U^A|cM?`V=VPI~b%M2xc>8eeGoT3Zg_ zKZFnAxex~yQcST9MT1i^4_wU9d*D#Ekn6hBWWBrizPMJJl z7$XSrUH~U0KQZo3doS6(g#(`PQys{fMT=>e;t3*48vs25WG`5+F0sXr!vQaq@$yrm zo$xfX%rD(x=_dZ^sQlwd_$`#5L>Uu{7cU2868+|=^s#TTbnawcr*w%v6O~?LBZujX z(y1<18K+R`A`Vav`gR9l_zUSQA@X7*lZbb*zDHiKY(2s1gR)4_MayEuyT7%vNWMkO zV#JHzT3JG@Mc6_!;{9P+e&%G=Jw+Du9YTg({2s#6x2;WqS%8txWSPxV{*uAOjAjr~ zT*0U+>*+#k%j;z^H7v|@$LnQUhlxJHL7}%T6cfr0v<7yKX#!qx&{WwBn!Vx zYn-hpneaxXNcycbm3s9Jn;@E`j6xC1q_tq>vW7oET3?0yx``qeRKaRk#k|!}YedW+ z(bm)lSs3S7J%#v|y<@lE54i#-)_br#H}~-t)ypihIADU0l&er&9&tw@WfYeNVd6Vf zZbGx+6<3(Rp$1g6OcjLt7cD5j@9oI%=eqO#zcfrJ^Lt^_7L*h%x}469wGS=V&%tC> z?0phLE&I_&TZu>U^K(=6s)(|~0{GhyELqbFG!-30~;y zYB~|(oJtFmXxVGR&T57WpUs6Y6sv5#1&LsgZy2M^kS`fyF+YI|g*f^iKgIVvA5 z$%~P)3|p-2W5%+nB9 zpGF#PVP@^{&YI0zHB{HS!!R|&ZZAiZwsr`1;)5t&-^@O?o5S(YIo5iZl23%xk+Dz`N}g&}JF2GG-=dRyF99`_5anDnTx~@4HEPw0s&Ef4d(Hp!?%n6%%+5j}xleGD+ zw2}xWw%AX0By0}nx93@kgMA~rp{1oZcA(swT_-E$`n=qsHS6vL>yv0n*^zwldQH-x z>IIV@T5b547|q0@!Q!h~L7~x)>p5%T zRSS>GJ`4`b=)7}#&VDX-2Fe~VTptxeauJ6&z%sM8O42MIDXGh}dG`hBEPVs6hbEc{ z80227(zEe;kN9Dr>)p^ysSFL1C0CE+!fhJKbvIHaCD-mKSCVGE-rdNB&%ZI3z7KG( zz;UlU6N71f?`#S=Q=ERkE>%{#tab3eu$j(`_X}t02x7kb`{@JwZo6QKOF@16- z1FTtpOwY`uXOm5sq{|ii+@tnv&unU@N52&}0}~ujc&GS2@g$(63^7{n6)7t@8dQRKQJXsG=7tSJ(|p*$oN~7gnw=UJtJ&q6r8& zgA1M@?e!8zB42+dHpZ(;7Q#~KD$HYZak<6Dd2fy4j1fDVW-9E4?OBv?7PFyz1prC_ zXm}v9@#qqZ5l*NexeoSdUUBsuo-r_}K8m~2xO((Hu!f!?6JGjaQT#;^TKU0@AD?VYnkf(jQrIaAd4v%9``GdxYBl!B@o$e?M?u&axPy*9 zgGl`x9k#oeJq61f=!Zo9(m%xTABF=3mc~&(IH*>w!wO1t^m>lbvTFYTA=x3P3{^If zfYjIK%Ur)pZw!`oQl%s@s5ljCRD(adS$c%g_ z?s#{?>6{m4A@rP;n^It^IE?UP;ocu(C9d;Wl*p7AJ zIKCfu#N$|8jA{N$Z10c3@lz#fu>NUypzvsu^9PxPq4TCaX+oXkA-!^<_vL+r%=y;x zBWCfSYTZ3uaVO>T1r;_g{82MTitoWA<8KCf(8pHKCR%BXHVe~$J)6XLgL>q?#j@}= z!U;$Xa%~t>$sDGi6Syaje7V^K$0&21jhp;cj7*NZ6Sz#s`>r#Q5-w@Rk?6eFpn6#M zOkxzdR5_p0<;h9h=`4XtY2$&JK@jR^AYWET>n?5$nk-6g;mHCqk2?O6l1UO2soz9O z@hUu)~vr^)E2GTQ2pJY?k*f;>CIrm=RLv^~aF1f+zZgcu>}po1zD> zFgE^^fRIhR z^#}-0^E#_6#@$5Vm(>xU{!5x~JhZM9(GgnAvMD^exf=y_aUu72tWH(|9!2pE3%=22 z$ro1b@uXha1V^3049+F@3roWW9wi>SE7jy7Yckz9}&SnA6p znV&0_8oD|v_N_R}z}ONAFAGfu@9@D$8{dMVw$z6SwS2k3B!wvW0DFz!obVmq1~K7U zF>NkLt4tsieMwnCa7Km3o35653~G8_XD$6G5c9ZyAFv#7UBJ)I{~8I^ ze-GeA2jU)J7ks0{2(sqNr--ijbPP7(a)}Sya12mL=~fdr>*s`fSi(EX+tN{9n6k4hQ7?6rX8clKN7Sn;dE*k=MBWnNSBijp{@S(PwK(t=NxQeB zQGO52$)$ZFSL+{Vhj371UG)fmKOKtKro*D?%I|aQa)ND2`+as8w{}i1Kgp5>OK2at zF5FckNX*We!`2Ub2Mhyr3(n~<$k09Lu;u75>>`2=!?y+{CXJY@5R-{wBz-eIf=>1} zHG9ypQmU~HV5#WbkA$7;N!JSf|NnI8JdSAhA*V5X-I<)%PNP2!8e+uDG%MmiKAN-H z4ER51r*Jc*3m~Qb3?M&cN-^E|7mS-H^Eg4TfxkY_E~8wP&2l3|vjsks(e-DM^}=0u zW6*WnF6v%%20zwd#uZ2}TSknwMMv4kx;ujQCJ_gI^Bocmw?&3lI1*08oUvCJfy@C{Ze`nYhSP(_my^mws3HtIFt!^gyt-dI?RIo*E?dHoc z(W#F@k3rVYbCp_;<(xPnsv8NZQ@6jpMy)wN4v6gv&X47;a7W`BazJ+h3o^SITuxpV;cN;HnvqYdr*1$}levn_0gW%{7Py<*pknEZTub(TO5< zVwl9vQM($RW9dIb??8hAAu-@ttnf0P7dfE!GuvwAiD6aVu?pgfh={pZYr~{`;&9QX zbl9&1Ik5ozC8{*ygYy7C9VL1MbGZL`Mty-OS^93m^Jb1qUZ*Z>Qq6tSM8<&)lzam1 zeBwMVt#UH?B1#kMCoD;5BCU(`emD>xNdj5Y2j4HBJK{z6ktuv&4+68M3@Cd!T?6E2 zV7@DIp4qv}jseNbux@UESxLumOHtCl!h)r>oE-fGJ~eiu(Vt|&24Ff_^E}+m#Fc_R z-rpH@wF#5SHjtZx5RP!{FL;f?%(Ll<@@cQyf)UW6T@M{SSlp+-mq`-5Ygz0Oxm1i# zjQ$EoUrp?BCUC6*Ta%_o!QM}q`|I)@ML&+45q{sjz<;FHIAyduIb%Tx`~JcdKAWkz zN0W~jnh)VzPVag)&N23xQsJ!(y@SpHIuro)ZKTC0A^CC=XK%fR4tG{&Euqpy?BC3F zlFPd;wuqry=VzYGHH0XUDD)O4;^c!59vG`(TniOz%!SFWXR<5X$&AhK!gQOMZcUV~ zZ6~`h>5XjgHaa_)$q}m_v5^X4n$Y3YrOSrS3A~t!uxIVEq6?D-W^`K2Ukz zWbIHQySyt1(~_7F`rY|M)JKRB4J0%z8^k2R&zkKa4c5??b%rJDp#obCPMF5QxrcIy?!~Ejn8mJ3;3?^u9pnMLN_t z>JP#3mp*u8*Wttaj+AyCJ$mrK(4l=p$Bz0-!od3v@7;B5-%-&U;Y?dpW1$jDv_rC6 zl}(9=xFRgc3NAC97W-fB{LObGXuTN{|AR!~OGM$~=nG0P=Pct!qa19J5wIEKCK=gr z-}EP#VU8Ixp*^vmqK2-^9fBoLH8{4Sec5_=gp-l}qHT0XY{; ziRKL|S)1SOGHTnb?b!Ws8)>k)qpm!O+1$?I$;30s{#1Yez_R{a|EkR0NR{T-S8_;Y z$1(52<~5hHUv<*<|Ku|Ef9HDa|H?V`e>%PPS94kWKkU8%rg_EbxBoSJk^L{ufc?+T zQu`~;GW(yL<@P`3R@ncLTWP;+uadI&-MPd5HD{;&tIjU_SDfAU zFFSkeUvl=^A9MEEzv%3@f5ACmf7H3t{(0x1{SoIb`@_!N_Rl%@*gu;)WdBTV$o|m4 zz4iy4!}d=*_t`(?97%j2d%v8?VnrlfLH#Ffe1e6aWa*DPsnDu>;oC;9;FB$&?)-n^ z%bCkS6O=-`a9ML->rb1q60c>F3*+phl!e}MaQ@*W?5{aV`+uFF#~k#SgC28&9&^xR zP9J(JXaBpi#Qrz-nuA`;qSvzMwJdrqi(bp3*Rtrf>?-^3v#agD%U*2%Z5BP3MbBj~ zv%i?V-2R*F74~0e^Y$0ASK6P?q6f2ACqA258)8UJF#fNtNas>Kj{&cJEt6Upn@vHY zh%?-dC(b7lVZK%A#1iB=pG{_ysb2DQ3TNJOuFJQ;=zZw?u(?6&6R9?wN@eX-T%LFq z{}u5>0yITw4yYCWnS!zMw{vZn;nIt={AR9Hk|}xcfl-0{)NDhm3>+B03{Qv`KjxZE zCgM1CMh@!1odDAmM;>Dn{HHit?fyO+o3zCF6%J*q)cLH_57{bfFS||hXO`KC9*pd- uIRl9V-mhhQfO9;%s()GkK>y0@(!`2{)SgKUSVBiT@%0Q+CZ6Q>g`k0^S>8$sqbMh(HF6K#l_t7qb9~6oz01O-8?!3`HPe1o6vDza+OnzaX{cC@KH| literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/packages/backports/__pycache__/makefile.cpython-310.pyc b/_vendor/urllib3/packages/backports/__pycache__/makefile.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..5a953f452cec5e0bbbbb1ba41f6e792d53b1f084 GIT binary patch literal 1267 zcmZuxUvJws5GN&BlI1^5QJ_FyR<6K?8c1!RSy5mZiY{vcq#M$rZW_QZ3N2EJVp-Bi zI$jKV4@+P6AqK42)4tKb*FEJc?4>)(aS)(A!NM9%q$-7y{VARB zG|PGP>n9XN+iNqTPB?jeu1?B=Y>}fQStb*%uAPsL$dtn-BWWqfOmZ^M)Cr*lcx1&f zcvBV4X`v)hB}oLQiW5p6q>%gpSp_5I_>?EAA6-H*XupR|IIOemy)sxNzD2L71FO}4 zfS>GQgcQ>F0-r$rf8hz1w-nri#woswF7R(~7aE_TrO!OOR`;~uM$144l4xI&mk2Bx zwMEGMWm5-YQ#YCS6oKrE#~`~_R*puxdEqQ0jXZSfvfwFlQ0!`lg)<~xu;$VMIhr8x zqw-E0SDGUZbtn(uL@j$39Ssp=NFZ{eygz*%!RLH%m#yLs;5lGHjW~craK6f(572Op z>QF3nYlr}A>Xvr3ryC!2+88Px`gfGdoqn zGK1#^j~8EO#Tm^rMy4g>?tQgPIlnc&?R4@cnNv1QY$e5FHR#0)?YZ+H^WukX9pYa_bN+BF@9d+aNoW_Eu z(l}XZ?!4I9{r=#mxAFGD?(WW;c(^y(G2QK}3~vr!(@fmZIc5BYekd{pdgm?wMeV&h z6tt>9^=ys3j`1YVQ*qnY(OjJw#@K|sNJ?fUpWCxZ6BK-&X9YLG9OBuX0P0$qtV#la z&TUlVf?)hrG~+4A`!^C_K#Kof4%D<7R9W>%QE|-Gqi=rBp767+WRPd$K~+Dy!A#_! zZ4D}Tlk}L&!Sx#+tna2@otxWh`1;1|Ymv`^ZTMXr;x29j_u#WU#1SAX$-i1Hx&eED zJMG$X1N*QF0zrC>dN%ffdJPlAF)Nce7A@E^{^}*yEvt>|@@}yE)++oCu49(-XLcy0 O{fC2uK^r?>_v8QOabk1; literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/packages/backports/makefile.py b/_vendor/urllib3/packages/backports/makefile.py new file mode 100644 index 0000000..b8fb215 --- /dev/null +++ b/_vendor/urllib3/packages/backports/makefile.py @@ -0,0 +1,51 @@ +# -*- coding: utf-8 -*- +""" +backports.makefile +~~~~~~~~~~~~~~~~~~ + +Backports the Python 3 ``socket.makefile`` method for use with anything that +wants to create a "fake" socket object. +""" +import io +from socket import SocketIO + + +def backport_makefile( + self, mode="r", buffering=None, encoding=None, errors=None, newline=None +): + """ + Backport of ``socket.makefile`` from Python 3.5. + """ + if not set(mode) <= {"r", "w", "b"}: + raise ValueError("invalid mode %r (only r, w, b allowed)" % (mode,)) + writing = "w" in mode + reading = "r" in mode or not writing + assert reading or writing + binary = "b" in mode + rawmode = "" + if reading: + rawmode += "r" + if writing: + rawmode += "w" + raw = SocketIO(self, rawmode) + self._makefile_refs += 1 + if buffering is None: + buffering = -1 + if buffering < 0: + buffering = io.DEFAULT_BUFFER_SIZE + if buffering == 0: + if not binary: + raise ValueError("unbuffered streams must be binary") + return raw + if reading and writing: + buffer = io.BufferedRWPair(raw, raw, buffering) + elif reading: + buffer = io.BufferedReader(raw, buffering) + else: + assert writing + buffer = io.BufferedWriter(raw, buffering) + if binary: + return buffer + text = io.TextIOWrapper(buffer, encoding, errors, newline) + text.mode = mode + return text diff --git a/_vendor/urllib3/packages/six.py b/_vendor/urllib3/packages/six.py new file mode 100644 index 0000000..f099a3d --- /dev/null +++ b/_vendor/urllib3/packages/six.py @@ -0,0 +1,1076 @@ +# Copyright (c) 2010-2020 Benjamin Peterson +# +# Permission is hereby granted, free of charge, to any person obtaining a copy +# of this software and associated documentation files (the "Software"), to deal +# in the Software without restriction, including without limitation the rights +# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell +# copies of the Software, and to permit persons to whom the Software is +# furnished to do so, subject to the following conditions: +# +# The above copyright notice and this permission notice shall be included in all +# copies or substantial portions of the Software. +# +# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR +# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, +# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE +# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER +# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, +# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE +# SOFTWARE. + +"""Utilities for writing code that runs on Python 2 and 3""" + +from __future__ import absolute_import + +import functools +import itertools +import operator +import sys +import types + +__author__ = "Benjamin Peterson " +__version__ = "1.16.0" + + +# Useful for very coarse version differentiation. +PY2 = sys.version_info[0] == 2 +PY3 = sys.version_info[0] == 3 +PY34 = sys.version_info[0:2] >= (3, 4) + +if PY3: + string_types = (str,) + integer_types = (int,) + class_types = (type,) + text_type = str + binary_type = bytes + + MAXSIZE = sys.maxsize +else: + string_types = (basestring,) + integer_types = (int, long) + class_types = (type, types.ClassType) + text_type = unicode + binary_type = str + + if sys.platform.startswith("java"): + # Jython always uses 32 bits. + MAXSIZE = int((1 << 31) - 1) + else: + # It's possible to have sizeof(long) != sizeof(Py_ssize_t). + class X(object): + def __len__(self): + return 1 << 31 + + try: + len(X()) + except OverflowError: + # 32-bit + MAXSIZE = int((1 << 31) - 1) + else: + # 64-bit + MAXSIZE = int((1 << 63) - 1) + del X + +if PY34: + from importlib.util import spec_from_loader +else: + spec_from_loader = None + + +def _add_doc(func, doc): + """Add documentation to a function.""" + func.__doc__ = doc + + +def _import_module(name): + """Import module, returning the module after the last dot.""" + __import__(name) + return sys.modules[name] + + +class _LazyDescr(object): + def __init__(self, name): + self.name = name + + def __get__(self, obj, tp): + result = self._resolve() + setattr(obj, self.name, result) # Invokes __set__. + try: + # This is a bit ugly, but it avoids running this again by + # removing this descriptor. + delattr(obj.__class__, self.name) + except AttributeError: + pass + return result + + +class MovedModule(_LazyDescr): + def __init__(self, name, old, new=None): + super(MovedModule, self).__init__(name) + if PY3: + if new is None: + new = name + self.mod = new + else: + self.mod = old + + def _resolve(self): + return _import_module(self.mod) + + def __getattr__(self, attr): + _module = self._resolve() + value = getattr(_module, attr) + setattr(self, attr, value) + return value + + +class _LazyModule(types.ModuleType): + def __init__(self, name): + super(_LazyModule, self).__init__(name) + self.__doc__ = self.__class__.__doc__ + + def __dir__(self): + attrs = ["__doc__", "__name__"] + attrs += [attr.name for attr in self._moved_attributes] + return attrs + + # Subclasses should override this + _moved_attributes = [] + + +class MovedAttribute(_LazyDescr): + def __init__(self, name, old_mod, new_mod, old_attr=None, new_attr=None): + super(MovedAttribute, self).__init__(name) + if PY3: + if new_mod is None: + new_mod = name + self.mod = new_mod + if new_attr is None: + if old_attr is None: + new_attr = name + else: + new_attr = old_attr + self.attr = new_attr + else: + self.mod = old_mod + if old_attr is None: + old_attr = name + self.attr = old_attr + + def _resolve(self): + module = _import_module(self.mod) + return getattr(module, self.attr) + + +class _SixMetaPathImporter(object): + + """ + A meta path importer to import six.moves and its submodules. + + This class implements a PEP302 finder and loader. It should be compatible + with Python 2.5 and all existing versions of Python3 + """ + + def __init__(self, six_module_name): + self.name = six_module_name + self.known_modules = {} + + def _add_module(self, mod, *fullnames): + for fullname in fullnames: + self.known_modules[self.name + "." + fullname] = mod + + def _get_module(self, fullname): + return self.known_modules[self.name + "." + fullname] + + def find_module(self, fullname, path=None): + if fullname in self.known_modules: + return self + return None + + def find_spec(self, fullname, path, target=None): + if fullname in self.known_modules: + return spec_from_loader(fullname, self) + return None + + def __get_module(self, fullname): + try: + return self.known_modules[fullname] + except KeyError: + raise ImportError("This loader does not know module " + fullname) + + def load_module(self, fullname): + try: + # in case of a reload + return sys.modules[fullname] + except KeyError: + pass + mod = self.__get_module(fullname) + if isinstance(mod, MovedModule): + mod = mod._resolve() + else: + mod.__loader__ = self + sys.modules[fullname] = mod + return mod + + def is_package(self, fullname): + """ + Return true, if the named module is a package. + + We need this method to get correct spec objects with + Python 3.4 (see PEP451) + """ + return hasattr(self.__get_module(fullname), "__path__") + + def get_code(self, fullname): + """Return None + + Required, if is_package is implemented""" + self.__get_module(fullname) # eventually raises ImportError + return None + + get_source = get_code # same as get_code + + def create_module(self, spec): + return self.load_module(spec.name) + + def exec_module(self, module): + pass + + +_importer = _SixMetaPathImporter(__name__) + + +class _MovedItems(_LazyModule): + + """Lazy loading of moved objects""" + + __path__ = [] # mark as package + + +_moved_attributes = [ + MovedAttribute("cStringIO", "cStringIO", "io", "StringIO"), + MovedAttribute("filter", "itertools", "builtins", "ifilter", "filter"), + MovedAttribute( + "filterfalse", "itertools", "itertools", "ifilterfalse", "filterfalse" + ), + MovedAttribute("input", "__builtin__", "builtins", "raw_input", "input"), + MovedAttribute("intern", "__builtin__", "sys"), + MovedAttribute("map", "itertools", "builtins", "imap", "map"), + MovedAttribute("getcwd", "os", "os", "getcwdu", "getcwd"), + MovedAttribute("getcwdb", "os", "os", "getcwd", "getcwdb"), + MovedAttribute("getoutput", "commands", "subprocess"), + MovedAttribute("range", "__builtin__", "builtins", "xrange", "range"), + MovedAttribute( + "reload_module", "__builtin__", "importlib" if PY34 else "imp", "reload" + ), + MovedAttribute("reduce", "__builtin__", "functools"), + MovedAttribute("shlex_quote", "pipes", "shlex", "quote"), + MovedAttribute("StringIO", "StringIO", "io"), + MovedAttribute("UserDict", "UserDict", "collections"), + MovedAttribute("UserList", "UserList", "collections"), + MovedAttribute("UserString", "UserString", "collections"), + MovedAttribute("xrange", "__builtin__", "builtins", "xrange", "range"), + MovedAttribute("zip", "itertools", "builtins", "izip", "zip"), + MovedAttribute( + "zip_longest", "itertools", "itertools", "izip_longest", "zip_longest" + ), + MovedModule("builtins", "__builtin__"), + MovedModule("configparser", "ConfigParser"), + MovedModule( + "collections_abc", + "collections", + "collections.abc" if sys.version_info >= (3, 3) else "collections", + ), + MovedModule("copyreg", "copy_reg"), + MovedModule("dbm_gnu", "gdbm", "dbm.gnu"), + MovedModule("dbm_ndbm", "dbm", "dbm.ndbm"), + MovedModule( + "_dummy_thread", + "dummy_thread", + "_dummy_thread" if sys.version_info < (3, 9) else "_thread", + ), + MovedModule("http_cookiejar", "cookielib", "http.cookiejar"), + MovedModule("http_cookies", "Cookie", "http.cookies"), + MovedModule("html_entities", "htmlentitydefs", "html.entities"), + MovedModule("html_parser", "HTMLParser", "html.parser"), + MovedModule("http_client", "httplib", "http.client"), + MovedModule("email_mime_base", "email.MIMEBase", "email.mime.base"), + MovedModule("email_mime_image", "email.MIMEImage", "email.mime.image"), + MovedModule("email_mime_multipart", "email.MIMEMultipart", "email.mime.multipart"), + MovedModule( + "email_mime_nonmultipart", "email.MIMENonMultipart", "email.mime.nonmultipart" + ), + MovedModule("email_mime_text", "email.MIMEText", "email.mime.text"), + MovedModule("BaseHTTPServer", "BaseHTTPServer", "http.server"), + MovedModule("CGIHTTPServer", "CGIHTTPServer", "http.server"), + MovedModule("SimpleHTTPServer", "SimpleHTTPServer", "http.server"), + MovedModule("cPickle", "cPickle", "pickle"), + MovedModule("queue", "Queue"), + MovedModule("reprlib", "repr"), + MovedModule("socketserver", "SocketServer"), + MovedModule("_thread", "thread", "_thread"), + MovedModule("tkinter", "Tkinter"), + MovedModule("tkinter_dialog", "Dialog", "tkinter.dialog"), + MovedModule("tkinter_filedialog", "FileDialog", "tkinter.filedialog"), + MovedModule("tkinter_scrolledtext", "ScrolledText", "tkinter.scrolledtext"), + MovedModule("tkinter_simpledialog", "SimpleDialog", "tkinter.simpledialog"), + MovedModule("tkinter_tix", "Tix", "tkinter.tix"), + MovedModule("tkinter_ttk", "ttk", "tkinter.ttk"), + MovedModule("tkinter_constants", "Tkconstants", "tkinter.constants"), + MovedModule("tkinter_dnd", "Tkdnd", "tkinter.dnd"), + MovedModule("tkinter_colorchooser", "tkColorChooser", "tkinter.colorchooser"), + MovedModule("tkinter_commondialog", "tkCommonDialog", "tkinter.commondialog"), + MovedModule("tkinter_tkfiledialog", "tkFileDialog", "tkinter.filedialog"), + MovedModule("tkinter_font", "tkFont", "tkinter.font"), + MovedModule("tkinter_messagebox", "tkMessageBox", "tkinter.messagebox"), + MovedModule("tkinter_tksimpledialog", "tkSimpleDialog", "tkinter.simpledialog"), + MovedModule("urllib_parse", __name__ + ".moves.urllib_parse", "urllib.parse"), + MovedModule("urllib_error", __name__ + ".moves.urllib_error", "urllib.error"), + MovedModule("urllib", __name__ + ".moves.urllib", __name__ + ".moves.urllib"), + MovedModule("urllib_robotparser", "robotparser", "urllib.robotparser"), + MovedModule("xmlrpc_client", "xmlrpclib", "xmlrpc.client"), + MovedModule("xmlrpc_server", "SimpleXMLRPCServer", "xmlrpc.server"), +] +# Add windows specific modules. +if sys.platform == "win32": + _moved_attributes += [ + MovedModule("winreg", "_winreg"), + ] + +for attr in _moved_attributes: + setattr(_MovedItems, attr.name, attr) + if isinstance(attr, MovedModule): + _importer._add_module(attr, "moves." + attr.name) +del attr + +_MovedItems._moved_attributes = _moved_attributes + +moves = _MovedItems(__name__ + ".moves") +_importer._add_module(moves, "moves") + + +class Module_six_moves_urllib_parse(_LazyModule): + + """Lazy loading of moved objects in six.moves.urllib_parse""" + + +_urllib_parse_moved_attributes = [ + MovedAttribute("ParseResult", "urlparse", "urllib.parse"), + MovedAttribute("SplitResult", "urlparse", "urllib.parse"), + MovedAttribute("parse_qs", "urlparse", "urllib.parse"), + MovedAttribute("parse_qsl", "urlparse", "urllib.parse"), + MovedAttribute("urldefrag", "urlparse", "urllib.parse"), + MovedAttribute("urljoin", "urlparse", "urllib.parse"), + MovedAttribute("urlparse", "urlparse", "urllib.parse"), + MovedAttribute("urlsplit", "urlparse", "urllib.parse"), + MovedAttribute("urlunparse", "urlparse", "urllib.parse"), + MovedAttribute("urlunsplit", "urlparse", "urllib.parse"), + MovedAttribute("quote", "urllib", "urllib.parse"), + MovedAttribute("quote_plus", "urllib", "urllib.parse"), + MovedAttribute("unquote", "urllib", "urllib.parse"), + MovedAttribute("unquote_plus", "urllib", "urllib.parse"), + MovedAttribute( + "unquote_to_bytes", "urllib", "urllib.parse", "unquote", "unquote_to_bytes" + ), + MovedAttribute("urlencode", "urllib", "urllib.parse"), + MovedAttribute("splitquery", "urllib", "urllib.parse"), + MovedAttribute("splittag", "urllib", "urllib.parse"), + MovedAttribute("splituser", "urllib", "urllib.parse"), + MovedAttribute("splitvalue", "urllib", "urllib.parse"), + MovedAttribute("uses_fragment", "urlparse", "urllib.parse"), + MovedAttribute("uses_netloc", "urlparse", "urllib.parse"), + MovedAttribute("uses_params", "urlparse", "urllib.parse"), + MovedAttribute("uses_query", "urlparse", "urllib.parse"), + MovedAttribute("uses_relative", "urlparse", "urllib.parse"), +] +for attr in _urllib_parse_moved_attributes: + setattr(Module_six_moves_urllib_parse, attr.name, attr) +del attr + +Module_six_moves_urllib_parse._moved_attributes = _urllib_parse_moved_attributes + +_importer._add_module( + Module_six_moves_urllib_parse(__name__ + ".moves.urllib_parse"), + "moves.urllib_parse", + "moves.urllib.parse", +) + + +class Module_six_moves_urllib_error(_LazyModule): + + """Lazy loading of moved objects in six.moves.urllib_error""" + + +_urllib_error_moved_attributes = [ + MovedAttribute("URLError", "urllib2", "urllib.error"), + MovedAttribute("HTTPError", "urllib2", "urllib.error"), + MovedAttribute("ContentTooShortError", "urllib", "urllib.error"), +] +for attr in _urllib_error_moved_attributes: + setattr(Module_six_moves_urllib_error, attr.name, attr) +del attr + +Module_six_moves_urllib_error._moved_attributes = _urllib_error_moved_attributes + +_importer._add_module( + Module_six_moves_urllib_error(__name__ + ".moves.urllib.error"), + "moves.urllib_error", + "moves.urllib.error", +) + + +class Module_six_moves_urllib_request(_LazyModule): + + """Lazy loading of moved objects in six.moves.urllib_request""" + + +_urllib_request_moved_attributes = [ + MovedAttribute("urlopen", "urllib2", "urllib.request"), + MovedAttribute("install_opener", "urllib2", "urllib.request"), + MovedAttribute("build_opener", "urllib2", "urllib.request"), + MovedAttribute("pathname2url", "urllib", "urllib.request"), + MovedAttribute("url2pathname", "urllib", "urllib.request"), + MovedAttribute("getproxies", "urllib", "urllib.request"), + MovedAttribute("Request", "urllib2", "urllib.request"), + MovedAttribute("OpenerDirector", "urllib2", "urllib.request"), + MovedAttribute("HTTPDefaultErrorHandler", "urllib2", "urllib.request"), + MovedAttribute("HTTPRedirectHandler", "urllib2", "urllib.request"), + MovedAttribute("HTTPCookieProcessor", "urllib2", "urllib.request"), + MovedAttribute("ProxyHandler", "urllib2", "urllib.request"), + MovedAttribute("BaseHandler", "urllib2", "urllib.request"), + MovedAttribute("HTTPPasswordMgr", "urllib2", "urllib.request"), + MovedAttribute("HTTPPasswordMgrWithDefaultRealm", "urllib2", "urllib.request"), + MovedAttribute("AbstractBasicAuthHandler", "urllib2", "urllib.request"), + MovedAttribute("HTTPBasicAuthHandler", "urllib2", "urllib.request"), + MovedAttribute("ProxyBasicAuthHandler", "urllib2", "urllib.request"), + MovedAttribute("AbstractDigestAuthHandler", "urllib2", "urllib.request"), + MovedAttribute("HTTPDigestAuthHandler", "urllib2", "urllib.request"), + MovedAttribute("ProxyDigestAuthHandler", "urllib2", "urllib.request"), + MovedAttribute("HTTPHandler", "urllib2", "urllib.request"), + MovedAttribute("HTTPSHandler", "urllib2", "urllib.request"), + MovedAttribute("FileHandler", "urllib2", "urllib.request"), + MovedAttribute("FTPHandler", "urllib2", "urllib.request"), + MovedAttribute("CacheFTPHandler", "urllib2", "urllib.request"), + MovedAttribute("UnknownHandler", "urllib2", "urllib.request"), + MovedAttribute("HTTPErrorProcessor", "urllib2", "urllib.request"), + MovedAttribute("urlretrieve", "urllib", "urllib.request"), + MovedAttribute("urlcleanup", "urllib", "urllib.request"), + MovedAttribute("URLopener", "urllib", "urllib.request"), + MovedAttribute("FancyURLopener", "urllib", "urllib.request"), + MovedAttribute("proxy_bypass", "urllib", "urllib.request"), + MovedAttribute("parse_http_list", "urllib2", "urllib.request"), + MovedAttribute("parse_keqv_list", "urllib2", "urllib.request"), +] +for attr in _urllib_request_moved_attributes: + setattr(Module_six_moves_urllib_request, attr.name, attr) +del attr + +Module_six_moves_urllib_request._moved_attributes = _urllib_request_moved_attributes + +_importer._add_module( + Module_six_moves_urllib_request(__name__ + ".moves.urllib.request"), + "moves.urllib_request", + "moves.urllib.request", +) + + +class Module_six_moves_urllib_response(_LazyModule): + + """Lazy loading of moved objects in six.moves.urllib_response""" + + +_urllib_response_moved_attributes = [ + MovedAttribute("addbase", "urllib", "urllib.response"), + MovedAttribute("addclosehook", "urllib", "urllib.response"), + MovedAttribute("addinfo", "urllib", "urllib.response"), + MovedAttribute("addinfourl", "urllib", "urllib.response"), +] +for attr in _urllib_response_moved_attributes: + setattr(Module_six_moves_urllib_response, attr.name, attr) +del attr + +Module_six_moves_urllib_response._moved_attributes = _urllib_response_moved_attributes + +_importer._add_module( + Module_six_moves_urllib_response(__name__ + ".moves.urllib.response"), + "moves.urllib_response", + "moves.urllib.response", +) + + +class Module_six_moves_urllib_robotparser(_LazyModule): + + """Lazy loading of moved objects in six.moves.urllib_robotparser""" + + +_urllib_robotparser_moved_attributes = [ + MovedAttribute("RobotFileParser", "robotparser", "urllib.robotparser"), +] +for attr in _urllib_robotparser_moved_attributes: + setattr(Module_six_moves_urllib_robotparser, attr.name, attr) +del attr + +Module_six_moves_urllib_robotparser._moved_attributes = ( + _urllib_robotparser_moved_attributes +) + +_importer._add_module( + Module_six_moves_urllib_robotparser(__name__ + ".moves.urllib.robotparser"), + "moves.urllib_robotparser", + "moves.urllib.robotparser", +) + + +class Module_six_moves_urllib(types.ModuleType): + + """Create a six.moves.urllib namespace that resembles the Python 3 namespace""" + + __path__ = [] # mark as package + parse = _importer._get_module("moves.urllib_parse") + error = _importer._get_module("moves.urllib_error") + request = _importer._get_module("moves.urllib_request") + response = _importer._get_module("moves.urllib_response") + robotparser = _importer._get_module("moves.urllib_robotparser") + + def __dir__(self): + return ["parse", "error", "request", "response", "robotparser"] + + +_importer._add_module( + Module_six_moves_urllib(__name__ + ".moves.urllib"), "moves.urllib" +) + + +def add_move(move): + """Add an item to six.moves.""" + setattr(_MovedItems, move.name, move) + + +def remove_move(name): + """Remove item from six.moves.""" + try: + delattr(_MovedItems, name) + except AttributeError: + try: + del moves.__dict__[name] + except KeyError: + raise AttributeError("no such move, %r" % (name,)) + + +if PY3: + _meth_func = "__func__" + _meth_self = "__self__" + + _func_closure = "__closure__" + _func_code = "__code__" + _func_defaults = "__defaults__" + _func_globals = "__globals__" +else: + _meth_func = "im_func" + _meth_self = "im_self" + + _func_closure = "func_closure" + _func_code = "func_code" + _func_defaults = "func_defaults" + _func_globals = "func_globals" + + +try: + advance_iterator = next +except NameError: + + def advance_iterator(it): + return it.next() + + +next = advance_iterator + + +try: + callable = callable +except NameError: + + def callable(obj): + return any("__call__" in klass.__dict__ for klass in type(obj).__mro__) + + +if PY3: + + def get_unbound_function(unbound): + return unbound + + create_bound_method = types.MethodType + + def create_unbound_method(func, cls): + return func + + Iterator = object +else: + + def get_unbound_function(unbound): + return unbound.im_func + + def create_bound_method(func, obj): + return types.MethodType(func, obj, obj.__class__) + + def create_unbound_method(func, cls): + return types.MethodType(func, None, cls) + + class Iterator(object): + def next(self): + return type(self).__next__(self) + + callable = callable +_add_doc( + get_unbound_function, """Get the function out of a possibly unbound function""" +) + + +get_method_function = operator.attrgetter(_meth_func) +get_method_self = operator.attrgetter(_meth_self) +get_function_closure = operator.attrgetter(_func_closure) +get_function_code = operator.attrgetter(_func_code) +get_function_defaults = operator.attrgetter(_func_defaults) +get_function_globals = operator.attrgetter(_func_globals) + + +if PY3: + + def iterkeys(d, **kw): + return iter(d.keys(**kw)) + + def itervalues(d, **kw): + return iter(d.values(**kw)) + + def iteritems(d, **kw): + return iter(d.items(**kw)) + + def iterlists(d, **kw): + return iter(d.lists(**kw)) + + viewkeys = operator.methodcaller("keys") + + viewvalues = operator.methodcaller("values") + + viewitems = operator.methodcaller("items") +else: + + def iterkeys(d, **kw): + return d.iterkeys(**kw) + + def itervalues(d, **kw): + return d.itervalues(**kw) + + def iteritems(d, **kw): + return d.iteritems(**kw) + + def iterlists(d, **kw): + return d.iterlists(**kw) + + viewkeys = operator.methodcaller("viewkeys") + + viewvalues = operator.methodcaller("viewvalues") + + viewitems = operator.methodcaller("viewitems") + +_add_doc(iterkeys, "Return an iterator over the keys of a dictionary.") +_add_doc(itervalues, "Return an iterator over the values of a dictionary.") +_add_doc(iteritems, "Return an iterator over the (key, value) pairs of a dictionary.") +_add_doc( + iterlists, "Return an iterator over the (key, [values]) pairs of a dictionary." +) + + +if PY3: + + def b(s): + return s.encode("latin-1") + + def u(s): + return s + + unichr = chr + import struct + + int2byte = struct.Struct(">B").pack + del struct + byte2int = operator.itemgetter(0) + indexbytes = operator.getitem + iterbytes = iter + import io + + StringIO = io.StringIO + BytesIO = io.BytesIO + del io + _assertCountEqual = "assertCountEqual" + if sys.version_info[1] <= 1: + _assertRaisesRegex = "assertRaisesRegexp" + _assertRegex = "assertRegexpMatches" + _assertNotRegex = "assertNotRegexpMatches" + else: + _assertRaisesRegex = "assertRaisesRegex" + _assertRegex = "assertRegex" + _assertNotRegex = "assertNotRegex" +else: + + def b(s): + return s + + # Workaround for standalone backslash + + def u(s): + return unicode(s.replace(r"\\", r"\\\\"), "unicode_escape") + + unichr = unichr + int2byte = chr + + def byte2int(bs): + return ord(bs[0]) + + def indexbytes(buf, i): + return ord(buf[i]) + + iterbytes = functools.partial(itertools.imap, ord) + import StringIO + + StringIO = BytesIO = StringIO.StringIO + _assertCountEqual = "assertItemsEqual" + _assertRaisesRegex = "assertRaisesRegexp" + _assertRegex = "assertRegexpMatches" + _assertNotRegex = "assertNotRegexpMatches" +_add_doc(b, """Byte literal""") +_add_doc(u, """Text literal""") + + +def assertCountEqual(self, *args, **kwargs): + return getattr(self, _assertCountEqual)(*args, **kwargs) + + +def assertRaisesRegex(self, *args, **kwargs): + return getattr(self, _assertRaisesRegex)(*args, **kwargs) + + +def assertRegex(self, *args, **kwargs): + return getattr(self, _assertRegex)(*args, **kwargs) + + +def assertNotRegex(self, *args, **kwargs): + return getattr(self, _assertNotRegex)(*args, **kwargs) + + +if PY3: + exec_ = getattr(moves.builtins, "exec") + + def reraise(tp, value, tb=None): + try: + if value is None: + value = tp() + if value.__traceback__ is not tb: + raise value.with_traceback(tb) + raise value + finally: + value = None + tb = None + +else: + + def exec_(_code_, _globs_=None, _locs_=None): + """Execute code in a namespace.""" + if _globs_ is None: + frame = sys._getframe(1) + _globs_ = frame.f_globals + if _locs_ is None: + _locs_ = frame.f_locals + del frame + elif _locs_ is None: + _locs_ = _globs_ + exec ("""exec _code_ in _globs_, _locs_""") + + exec_( + """def reraise(tp, value, tb=None): + try: + raise tp, value, tb + finally: + tb = None +""" + ) + + +if sys.version_info[:2] > (3,): + exec_( + """def raise_from(value, from_value): + try: + raise value from from_value + finally: + value = None +""" + ) +else: + + def raise_from(value, from_value): + raise value + + +print_ = getattr(moves.builtins, "print", None) +if print_ is None: + + def print_(*args, **kwargs): + """The new-style print function for Python 2.4 and 2.5.""" + fp = kwargs.pop("file", sys.stdout) + if fp is None: + return + + def write(data): + if not isinstance(data, basestring): + data = str(data) + # If the file has an encoding, encode unicode with it. + if ( + isinstance(fp, file) + and isinstance(data, unicode) + and fp.encoding is not None + ): + errors = getattr(fp, "errors", None) + if errors is None: + errors = "strict" + data = data.encode(fp.encoding, errors) + fp.write(data) + + want_unicode = False + sep = kwargs.pop("sep", None) + if sep is not None: + if isinstance(sep, unicode): + want_unicode = True + elif not isinstance(sep, str): + raise TypeError("sep must be None or a string") + end = kwargs.pop("end", None) + if end is not None: + if isinstance(end, unicode): + want_unicode = True + elif not isinstance(end, str): + raise TypeError("end must be None or a string") + if kwargs: + raise TypeError("invalid keyword arguments to print()") + if not want_unicode: + for arg in args: + if isinstance(arg, unicode): + want_unicode = True + break + if want_unicode: + newline = unicode("\n") + space = unicode(" ") + else: + newline = "\n" + space = " " + if sep is None: + sep = space + if end is None: + end = newline + for i, arg in enumerate(args): + if i: + write(sep) + write(arg) + write(end) + + +if sys.version_info[:2] < (3, 3): + _print = print_ + + def print_(*args, **kwargs): + fp = kwargs.get("file", sys.stdout) + flush = kwargs.pop("flush", False) + _print(*args, **kwargs) + if flush and fp is not None: + fp.flush() + + +_add_doc(reraise, """Reraise an exception.""") + +if sys.version_info[0:2] < (3, 4): + # This does exactly the same what the :func:`py3:functools.update_wrapper` + # function does on Python versions after 3.2. It sets the ``__wrapped__`` + # attribute on ``wrapper`` object and it doesn't raise an error if any of + # the attributes mentioned in ``assigned`` and ``updated`` are missing on + # ``wrapped`` object. + def _update_wrapper( + wrapper, + wrapped, + assigned=functools.WRAPPER_ASSIGNMENTS, + updated=functools.WRAPPER_UPDATES, + ): + for attr in assigned: + try: + value = getattr(wrapped, attr) + except AttributeError: + continue + else: + setattr(wrapper, attr, value) + for attr in updated: + getattr(wrapper, attr).update(getattr(wrapped, attr, {})) + wrapper.__wrapped__ = wrapped + return wrapper + + _update_wrapper.__doc__ = functools.update_wrapper.__doc__ + + def wraps( + wrapped, + assigned=functools.WRAPPER_ASSIGNMENTS, + updated=functools.WRAPPER_UPDATES, + ): + return functools.partial( + _update_wrapper, wrapped=wrapped, assigned=assigned, updated=updated + ) + + wraps.__doc__ = functools.wraps.__doc__ + +else: + wraps = functools.wraps + + +def with_metaclass(meta, *bases): + """Create a base class with a metaclass.""" + # This requires a bit of explanation: the basic idea is to make a dummy + # metaclass for one level of class instantiation that replaces itself with + # the actual metaclass. + class metaclass(type): + def __new__(cls, name, this_bases, d): + if sys.version_info[:2] >= (3, 7): + # This version introduced PEP 560 that requires a bit + # of extra care (we mimic what is done by __build_class__). + resolved_bases = types.resolve_bases(bases) + if resolved_bases is not bases: + d["__orig_bases__"] = bases + else: + resolved_bases = bases + return meta(name, resolved_bases, d) + + @classmethod + def __prepare__(cls, name, this_bases): + return meta.__prepare__(name, bases) + + return type.__new__(metaclass, "temporary_class", (), {}) + + +def add_metaclass(metaclass): + """Class decorator for creating a class with a metaclass.""" + + def wrapper(cls): + orig_vars = cls.__dict__.copy() + slots = orig_vars.get("__slots__") + if slots is not None: + if isinstance(slots, str): + slots = [slots] + for slots_var in slots: + orig_vars.pop(slots_var) + orig_vars.pop("__dict__", None) + orig_vars.pop("__weakref__", None) + if hasattr(cls, "__qualname__"): + orig_vars["__qualname__"] = cls.__qualname__ + return metaclass(cls.__name__, cls.__bases__, orig_vars) + + return wrapper + + +def ensure_binary(s, encoding="utf-8", errors="strict"): + """Coerce **s** to six.binary_type. + + For Python 2: + - `unicode` -> encoded to `str` + - `str` -> `str` + + For Python 3: + - `str` -> encoded to `bytes` + - `bytes` -> `bytes` + """ + if isinstance(s, binary_type): + return s + if isinstance(s, text_type): + return s.encode(encoding, errors) + raise TypeError("not expecting type '%s'" % type(s)) + + +def ensure_str(s, encoding="utf-8", errors="strict"): + """Coerce *s* to `str`. + + For Python 2: + - `unicode` -> encoded to `str` + - `str` -> `str` + + For Python 3: + - `str` -> `str` + - `bytes` -> decoded to `str` + """ + # Optimization: Fast return for the common case. + if type(s) is str: + return s + if PY2 and isinstance(s, text_type): + return s.encode(encoding, errors) + elif PY3 and isinstance(s, binary_type): + return s.decode(encoding, errors) + elif not isinstance(s, (text_type, binary_type)): + raise TypeError("not expecting type '%s'" % type(s)) + return s + + +def ensure_text(s, encoding="utf-8", errors="strict"): + """Coerce *s* to six.text_type. + + For Python 2: + - `unicode` -> `unicode` + - `str` -> `unicode` + + For Python 3: + - `str` -> `str` + - `bytes` -> decoded to `str` + """ + if isinstance(s, binary_type): + return s.decode(encoding, errors) + elif isinstance(s, text_type): + return s + else: + raise TypeError("not expecting type '%s'" % type(s)) + + +def python_2_unicode_compatible(klass): + """ + A class decorator that defines __unicode__ and __str__ methods under Python 2. + Under Python 3 it does nothing. + + To support Python 2 and 3 with a single code base, define a __str__ method + returning text and apply this decorator to the class. + """ + if PY2: + if "__str__" not in klass.__dict__: + raise ValueError( + "@python_2_unicode_compatible cannot be applied " + "to %s because it doesn't define __str__()." % klass.__name__ + ) + klass.__unicode__ = klass.__str__ + klass.__str__ = lambda self: self.__unicode__().encode("utf-8") + return klass + + +# Complete the moves implementation. +# This code is at the end of this module to speed up module loading. +# Turn this module into a package. +__path__ = [] # required for PEP 302 and PEP 451 +__package__ = __name__ # see PEP 366 @ReservedAssignment +if globals().get("__spec__") is not None: + __spec__.submodule_search_locations = [] # PEP 451 @UndefinedVariable +# Remove other six meta path importers, since they cause problems. This can +# happen if six is removed from sys.modules and then reloaded. (Setuptools does +# this for some reason.) +if sys.meta_path: + for i, importer in enumerate(sys.meta_path): + # Here's some real nastiness: Another "instance" of the six module might + # be floating around. Therefore, we can't use isinstance() to check for + # the six meta path importer, since the other six instance will have + # inserted an importer with different class. + if ( + type(importer).__name__ == "_SixMetaPathImporter" + and importer.name == __name__ + ): + del sys.meta_path[i] + break + del i, importer +# Finally, add the importer to the meta path import hook. +sys.meta_path.append(_importer) diff --git a/_vendor/urllib3/poolmanager.py b/_vendor/urllib3/poolmanager.py new file mode 100644 index 0000000..ca4ec34 --- /dev/null +++ b/_vendor/urllib3/poolmanager.py @@ -0,0 +1,537 @@ +from __future__ import absolute_import + +import collections +import functools +import logging + +from ._collections import RecentlyUsedContainer +from .connectionpool import HTTPConnectionPool, HTTPSConnectionPool, port_by_scheme +from .exceptions import ( + LocationValueError, + MaxRetryError, + ProxySchemeUnknown, + ProxySchemeUnsupported, + URLSchemeUnknown, +) +from .packages import six +from .packages.six.moves.urllib.parse import urljoin +from .request import RequestMethods +from .util.proxy import connection_requires_http_tunnel +from .util.retry import Retry +from .util.url import parse_url + +__all__ = ["PoolManager", "ProxyManager", "proxy_from_url"] + + +log = logging.getLogger(__name__) + +SSL_KEYWORDS = ( + "key_file", + "cert_file", + "cert_reqs", + "ca_certs", + "ssl_version", + "ca_cert_dir", + "ssl_context", + "key_password", + "server_hostname", +) + +# All known keyword arguments that could be provided to the pool manager, its +# pools, or the underlying connections. This is used to construct a pool key. +_key_fields = ( + "key_scheme", # str + "key_host", # str + "key_port", # int + "key_timeout", # int or float or Timeout + "key_retries", # int or Retry + "key_strict", # bool + "key_block", # bool + "key_source_address", # str + "key_key_file", # str + "key_key_password", # str + "key_cert_file", # str + "key_cert_reqs", # str + "key_ca_certs", # str + "key_ssl_version", # str + "key_ca_cert_dir", # str + "key_ssl_context", # instance of ssl.SSLContext or urllib3.util.ssl_.SSLContext + "key_maxsize", # int + "key_headers", # dict + "key__proxy", # parsed proxy url + "key__proxy_headers", # dict + "key__proxy_config", # class + "key_socket_options", # list of (level (int), optname (int), value (int or str)) tuples + "key__socks_options", # dict + "key_assert_hostname", # bool or string + "key_assert_fingerprint", # str + "key_server_hostname", # str +) + +#: The namedtuple class used to construct keys for the connection pool. +#: All custom key schemes should include the fields in this key at a minimum. +PoolKey = collections.namedtuple("PoolKey", _key_fields) + +_proxy_config_fields = ("ssl_context", "use_forwarding_for_https") +ProxyConfig = collections.namedtuple("ProxyConfig", _proxy_config_fields) + + +def _default_key_normalizer(key_class, request_context): + """ + Create a pool key out of a request context dictionary. + + According to RFC 3986, both the scheme and host are case-insensitive. + Therefore, this function normalizes both before constructing the pool + key for an HTTPS request. If you wish to change this behaviour, provide + alternate callables to ``key_fn_by_scheme``. + + :param key_class: + The class to use when constructing the key. This should be a namedtuple + with the ``scheme`` and ``host`` keys at a minimum. + :type key_class: namedtuple + :param request_context: + A dictionary-like object that contain the context for a request. + :type request_context: dict + + :return: A namedtuple that can be used as a connection pool key. + :rtype: PoolKey + """ + # Since we mutate the dictionary, make a copy first + context = request_context.copy() + context["scheme"] = context["scheme"].lower() + context["host"] = context["host"].lower() + + # These are both dictionaries and need to be transformed into frozensets + for key in ("headers", "_proxy_headers", "_socks_options"): + if key in context and context[key] is not None: + context[key] = frozenset(context[key].items()) + + # The socket_options key may be a list and needs to be transformed into a + # tuple. + socket_opts = context.get("socket_options") + if socket_opts is not None: + context["socket_options"] = tuple(socket_opts) + + # Map the kwargs to the names in the namedtuple - this is necessary since + # namedtuples can't have fields starting with '_'. + for key in list(context.keys()): + context["key_" + key] = context.pop(key) + + # Default to ``None`` for keys missing from the context + for field in key_class._fields: + if field not in context: + context[field] = None + + return key_class(**context) + + +#: A dictionary that maps a scheme to a callable that creates a pool key. +#: This can be used to alter the way pool keys are constructed, if desired. +#: Each PoolManager makes a copy of this dictionary so they can be configured +#: globally here, or individually on the instance. +key_fn_by_scheme = { + "http": functools.partial(_default_key_normalizer, PoolKey), + "https": functools.partial(_default_key_normalizer, PoolKey), +} + +pool_classes_by_scheme = {"http": HTTPConnectionPool, "https": HTTPSConnectionPool} + + +class PoolManager(RequestMethods): + """ + Allows for arbitrary requests while transparently keeping track of + necessary connection pools for you. + + :param num_pools: + Number of connection pools to cache before discarding the least + recently used pool. + + :param headers: + Headers to include with all requests, unless other headers are given + explicitly. + + :param \\**connection_pool_kw: + Additional parameters are used to create fresh + :class:`urllib3.connectionpool.ConnectionPool` instances. + + Example:: + + >>> manager = PoolManager(num_pools=2) + >>> r = manager.request('GET', 'http://google.com/') + >>> r = manager.request('GET', 'http://google.com/mail') + >>> r = manager.request('GET', 'http://yahoo.com/') + >>> len(manager.pools) + 2 + + """ + + proxy = None + proxy_config = None + + def __init__(self, num_pools=10, headers=None, **connection_pool_kw): + RequestMethods.__init__(self, headers) + self.connection_pool_kw = connection_pool_kw + self.pools = RecentlyUsedContainer(num_pools, dispose_func=lambda p: p.close()) + + # Locally set the pool classes and keys so other PoolManagers can + # override them. + self.pool_classes_by_scheme = pool_classes_by_scheme + self.key_fn_by_scheme = key_fn_by_scheme.copy() + + def __enter__(self): + return self + + def __exit__(self, exc_type, exc_val, exc_tb): + self.clear() + # Return False to re-raise any potential exceptions + return False + + def _new_pool(self, scheme, host, port, request_context=None): + """ + Create a new :class:`urllib3.connectionpool.ConnectionPool` based on host, port, scheme, and + any additional pool keyword arguments. + + If ``request_context`` is provided, it is provided as keyword arguments + to the pool class used. This method is used to actually create the + connection pools handed out by :meth:`connection_from_url` and + companion methods. It is intended to be overridden for customization. + """ + pool_cls = self.pool_classes_by_scheme[scheme] + if request_context is None: + request_context = self.connection_pool_kw.copy() + + # Although the context has everything necessary to create the pool, + # this function has historically only used the scheme, host, and port + # in the positional args. When an API change is acceptable these can + # be removed. + for key in ("scheme", "host", "port"): + request_context.pop(key, None) + + if scheme == "http": + for kw in SSL_KEYWORDS: + request_context.pop(kw, None) + + return pool_cls(host, port, **request_context) + + def clear(self): + """ + Empty our store of pools and direct them all to close. + + This will not affect in-flight connections, but they will not be + re-used after completion. + """ + self.pools.clear() + + def connection_from_host(self, host, port=None, scheme="http", pool_kwargs=None): + """ + Get a :class:`urllib3.connectionpool.ConnectionPool` based on the host, port, and scheme. + + If ``port`` isn't given, it will be derived from the ``scheme`` using + ``urllib3.connectionpool.port_by_scheme``. If ``pool_kwargs`` is + provided, it is merged with the instance's ``connection_pool_kw`` + variable and used to create the new connection pool, if one is + needed. + """ + + if not host: + raise LocationValueError("No host specified.") + + request_context = self._merge_pool_kwargs(pool_kwargs) + request_context["scheme"] = scheme or "http" + if not port: + port = port_by_scheme.get(request_context["scheme"].lower(), 80) + request_context["port"] = port + request_context["host"] = host + + return self.connection_from_context(request_context) + + def connection_from_context(self, request_context): + """ + Get a :class:`urllib3.connectionpool.ConnectionPool` based on the request context. + + ``request_context`` must at least contain the ``scheme`` key and its + value must be a key in ``key_fn_by_scheme`` instance variable. + """ + scheme = request_context["scheme"].lower() + pool_key_constructor = self.key_fn_by_scheme.get(scheme) + if not pool_key_constructor: + raise URLSchemeUnknown(scheme) + pool_key = pool_key_constructor(request_context) + + return self.connection_from_pool_key(pool_key, request_context=request_context) + + def connection_from_pool_key(self, pool_key, request_context=None): + """ + Get a :class:`urllib3.connectionpool.ConnectionPool` based on the provided pool key. + + ``pool_key`` should be a namedtuple that only contains immutable + objects. At a minimum it must have the ``scheme``, ``host``, and + ``port`` fields. + """ + with self.pools.lock: + # If the scheme, host, or port doesn't match existing open + # connections, open a new ConnectionPool. + pool = self.pools.get(pool_key) + if pool: + return pool + + # Make a fresh ConnectionPool of the desired type + scheme = request_context["scheme"] + host = request_context["host"] + port = request_context["port"] + pool = self._new_pool(scheme, host, port, request_context=request_context) + self.pools[pool_key] = pool + + return pool + + def connection_from_url(self, url, pool_kwargs=None): + """ + Similar to :func:`urllib3.connectionpool.connection_from_url`. + + If ``pool_kwargs`` is not provided and a new pool needs to be + constructed, ``self.connection_pool_kw`` is used to initialize + the :class:`urllib3.connectionpool.ConnectionPool`. If ``pool_kwargs`` + is provided, it is used instead. Note that if a new pool does not + need to be created for the request, the provided ``pool_kwargs`` are + not used. + """ + u = parse_url(url) + return self.connection_from_host( + u.host, port=u.port, scheme=u.scheme, pool_kwargs=pool_kwargs + ) + + def _merge_pool_kwargs(self, override): + """ + Merge a dictionary of override values for self.connection_pool_kw. + + This does not modify self.connection_pool_kw and returns a new dict. + Any keys in the override dictionary with a value of ``None`` are + removed from the merged dictionary. + """ + base_pool_kwargs = self.connection_pool_kw.copy() + if override: + for key, value in override.items(): + if value is None: + try: + del base_pool_kwargs[key] + except KeyError: + pass + else: + base_pool_kwargs[key] = value + return base_pool_kwargs + + def _proxy_requires_url_absolute_form(self, parsed_url): + """ + Indicates if the proxy requires the complete destination URL in the + request. Normally this is only needed when not using an HTTP CONNECT + tunnel. + """ + if self.proxy is None: + return False + + return not connection_requires_http_tunnel( + self.proxy, self.proxy_config, parsed_url.scheme + ) + + def _validate_proxy_scheme_url_selection(self, url_scheme): + """ + Validates that were not attempting to do TLS in TLS connections on + Python2 or with unsupported SSL implementations. + """ + if self.proxy is None or url_scheme != "https": + return + + if self.proxy.scheme != "https": + return + + if six.PY2 and not self.proxy_config.use_forwarding_for_https: + raise ProxySchemeUnsupported( + "Contacting HTTPS destinations through HTTPS proxies " + "'via CONNECT tunnels' is not supported in Python 2" + ) + + def urlopen(self, method, url, redirect=True, **kw): + """ + Same as :meth:`urllib3.HTTPConnectionPool.urlopen` + with custom cross-host redirect logic and only sends the request-uri + portion of the ``url``. + + The given ``url`` parameter must be absolute, such that an appropriate + :class:`urllib3.connectionpool.ConnectionPool` can be chosen for it. + """ + u = parse_url(url) + self._validate_proxy_scheme_url_selection(u.scheme) + + conn = self.connection_from_host(u.host, port=u.port, scheme=u.scheme) + + kw["assert_same_host"] = False + kw["redirect"] = False + + if "headers" not in kw: + kw["headers"] = self.headers.copy() + + if self._proxy_requires_url_absolute_form(u): + response = conn.urlopen(method, url, **kw) + else: + response = conn.urlopen(method, u.request_uri, **kw) + + redirect_location = redirect and response.get_redirect_location() + if not redirect_location: + return response + + # Support relative URLs for redirecting. + redirect_location = urljoin(url, redirect_location) + + # RFC 7231, Section 6.4.4 + if response.status == 303: + method = "GET" + + retries = kw.get("retries") + if not isinstance(retries, Retry): + retries = Retry.from_int(retries, redirect=redirect) + + # Strip headers marked as unsafe to forward to the redirected location. + # Check remove_headers_on_redirect to avoid a potential network call within + # conn.is_same_host() which may use socket.gethostbyname() in the future. + if retries.remove_headers_on_redirect and not conn.is_same_host( + redirect_location + ): + headers = list(six.iterkeys(kw["headers"])) + for header in headers: + if header.lower() in retries.remove_headers_on_redirect: + kw["headers"].pop(header, None) + + try: + retries = retries.increment(method, url, response=response, _pool=conn) + except MaxRetryError: + if retries.raise_on_redirect: + response.drain_conn() + raise + return response + + kw["retries"] = retries + kw["redirect"] = redirect + + log.info("Redirecting %s -> %s", url, redirect_location) + + response.drain_conn() + return self.urlopen(method, redirect_location, **kw) + + +class ProxyManager(PoolManager): + """ + Behaves just like :class:`PoolManager`, but sends all requests through + the defined proxy, using the CONNECT method for HTTPS URLs. + + :param proxy_url: + The URL of the proxy to be used. + + :param proxy_headers: + A dictionary containing headers that will be sent to the proxy. In case + of HTTP they are being sent with each request, while in the + HTTPS/CONNECT case they are sent only once. Could be used for proxy + authentication. + + :param proxy_ssl_context: + The proxy SSL context is used to establish the TLS connection to the + proxy when using HTTPS proxies. + + :param use_forwarding_for_https: + (Defaults to False) If set to True will forward requests to the HTTPS + proxy to be made on behalf of the client instead of creating a TLS + tunnel via the CONNECT method. **Enabling this flag means that request + and response headers and content will be visible from the HTTPS proxy** + whereas tunneling keeps request and response headers and content + private. IP address, target hostname, SNI, and port are always visible + to an HTTPS proxy even when this flag is disabled. + + Example: + >>> proxy = urllib3.ProxyManager('http://localhost:3128/') + >>> r1 = proxy.request('GET', 'http://google.com/') + >>> r2 = proxy.request('GET', 'http://httpbin.org/') + >>> len(proxy.pools) + 1 + >>> r3 = proxy.request('GET', 'https://httpbin.org/') + >>> r4 = proxy.request('GET', 'https://twitter.com/') + >>> len(proxy.pools) + 3 + + """ + + def __init__( + self, + proxy_url, + num_pools=10, + headers=None, + proxy_headers=None, + proxy_ssl_context=None, + use_forwarding_for_https=False, + **connection_pool_kw + ): + + if isinstance(proxy_url, HTTPConnectionPool): + proxy_url = "%s://%s:%i" % ( + proxy_url.scheme, + proxy_url.host, + proxy_url.port, + ) + proxy = parse_url(proxy_url) + + if proxy.scheme not in ("http", "https"): + raise ProxySchemeUnknown(proxy.scheme) + + if not proxy.port: + port = port_by_scheme.get(proxy.scheme, 80) + proxy = proxy._replace(port=port) + + self.proxy = proxy + self.proxy_headers = proxy_headers or {} + self.proxy_ssl_context = proxy_ssl_context + self.proxy_config = ProxyConfig(proxy_ssl_context, use_forwarding_for_https) + + connection_pool_kw["_proxy"] = self.proxy + connection_pool_kw["_proxy_headers"] = self.proxy_headers + connection_pool_kw["_proxy_config"] = self.proxy_config + + super(ProxyManager, self).__init__(num_pools, headers, **connection_pool_kw) + + def connection_from_host(self, host, port=None, scheme="http", pool_kwargs=None): + if scheme == "https": + return super(ProxyManager, self).connection_from_host( + host, port, scheme, pool_kwargs=pool_kwargs + ) + + return super(ProxyManager, self).connection_from_host( + self.proxy.host, self.proxy.port, self.proxy.scheme, pool_kwargs=pool_kwargs + ) + + def _set_proxy_headers(self, url, headers=None): + """ + Sets headers needed by proxies: specifically, the Accept and Host + headers. Only sets headers not provided by the user. + """ + headers_ = {"Accept": "*/*"} + + netloc = parse_url(url).netloc + if netloc: + headers_["Host"] = netloc + + if headers: + headers_.update(headers) + return headers_ + + def urlopen(self, method, url, redirect=True, **kw): + "Same as HTTP(S)ConnectionPool.urlopen, ``url`` must be absolute." + u = parse_url(url) + if not connection_requires_http_tunnel(self.proxy, self.proxy_config, u.scheme): + # For connections using HTTP CONNECT, httplib sets the necessary + # headers on the CONNECT to the proxy. If we're not using CONNECT, + # we'll definitely need to set 'Host' at the very least. + headers = kw.get("headers", self.headers) + kw["headers"] = self._set_proxy_headers(url, headers) + + return super(ProxyManager, self).urlopen(method, url, redirect=redirect, **kw) + + +def proxy_from_url(url, **kw): + return ProxyManager(proxy_url=url, **kw) diff --git a/_vendor/urllib3/request.py b/_vendor/urllib3/request.py new file mode 100644 index 0000000..398386a --- /dev/null +++ b/_vendor/urllib3/request.py @@ -0,0 +1,170 @@ +from __future__ import absolute_import + +from .filepost import encode_multipart_formdata +from .packages.six.moves.urllib.parse import urlencode + +__all__ = ["RequestMethods"] + + +class RequestMethods(object): + """ + Convenience mixin for classes who implement a :meth:`urlopen` method, such + as :class:`urllib3.HTTPConnectionPool` and + :class:`urllib3.PoolManager`. + + Provides behavior for making common types of HTTP request methods and + decides which type of request field encoding to use. + + Specifically, + + :meth:`.request_encode_url` is for sending requests whose fields are + encoded in the URL (such as GET, HEAD, DELETE). + + :meth:`.request_encode_body` is for sending requests whose fields are + encoded in the *body* of the request using multipart or www-form-urlencoded + (such as for POST, PUT, PATCH). + + :meth:`.request` is for making any kind of request, it will look up the + appropriate encoding format and use one of the above two methods to make + the request. + + Initializer parameters: + + :param headers: + Headers to include with all requests, unless other headers are given + explicitly. + """ + + _encode_url_methods = {"DELETE", "GET", "HEAD", "OPTIONS"} + + def __init__(self, headers=None): + self.headers = headers or {} + + def urlopen( + self, + method, + url, + body=None, + headers=None, + encode_multipart=True, + multipart_boundary=None, + **kw + ): # Abstract + raise NotImplementedError( + "Classes extending RequestMethods must implement " + "their own ``urlopen`` method." + ) + + def request(self, method, url, fields=None, headers=None, **urlopen_kw): + """ + Make a request using :meth:`urlopen` with the appropriate encoding of + ``fields`` based on the ``method`` used. + + This is a convenience method that requires the least amount of manual + effort. It can be used in most situations, while still having the + option to drop down to more specific methods when necessary, such as + :meth:`request_encode_url`, :meth:`request_encode_body`, + or even the lowest level :meth:`urlopen`. + """ + method = method.upper() + + urlopen_kw["request_url"] = url + + if method in self._encode_url_methods: + return self.request_encode_url( + method, url, fields=fields, headers=headers, **urlopen_kw + ) + else: + return self.request_encode_body( + method, url, fields=fields, headers=headers, **urlopen_kw + ) + + def request_encode_url(self, method, url, fields=None, headers=None, **urlopen_kw): + """ + Make a request using :meth:`urlopen` with the ``fields`` encoded in + the url. This is useful for request methods like GET, HEAD, DELETE, etc. + """ + if headers is None: + headers = self.headers + + extra_kw = {"headers": headers} + extra_kw.update(urlopen_kw) + + if fields: + url += "?" + urlencode(fields) + + return self.urlopen(method, url, **extra_kw) + + def request_encode_body( + self, + method, + url, + fields=None, + headers=None, + encode_multipart=True, + multipart_boundary=None, + **urlopen_kw + ): + """ + Make a request using :meth:`urlopen` with the ``fields`` encoded in + the body. This is useful for request methods like POST, PUT, PATCH, etc. + + When ``encode_multipart=True`` (default), then + :func:`urllib3.encode_multipart_formdata` is used to encode + the payload with the appropriate content type. Otherwise + :func:`urllib.parse.urlencode` is used with the + 'application/x-www-form-urlencoded' content type. + + Multipart encoding must be used when posting files, and it's reasonably + safe to use it in other times too. However, it may break request + signing, such as with OAuth. + + Supports an optional ``fields`` parameter of key/value strings AND + key/filetuple. A filetuple is a (filename, data, MIME type) tuple where + the MIME type is optional. For example:: + + fields = { + 'foo': 'bar', + 'fakefile': ('foofile.txt', 'contents of foofile'), + 'realfile': ('barfile.txt', open('realfile').read()), + 'typedfile': ('bazfile.bin', open('bazfile').read(), + 'image/jpeg'), + 'nonamefile': 'contents of nonamefile field', + } + + When uploading a file, providing a filename (the first parameter of the + tuple) is optional but recommended to best mimic behavior of browsers. + + Note that if ``headers`` are supplied, the 'Content-Type' header will + be overwritten because it depends on the dynamic random boundary string + which is used to compose the body of the request. The random boundary + string can be explicitly set with the ``multipart_boundary`` parameter. + """ + if headers is None: + headers = self.headers + + extra_kw = {"headers": {}} + + if fields: + if "body" in urlopen_kw: + raise TypeError( + "request got values for both 'fields' and 'body', can only specify one." + ) + + if encode_multipart: + body, content_type = encode_multipart_formdata( + fields, boundary=multipart_boundary + ) + else: + body, content_type = ( + urlencode(fields), + "application/x-www-form-urlencoded", + ) + + extra_kw["body"] = body + extra_kw["headers"] = {"Content-Type": content_type} + + extra_kw["headers"].update(headers) + extra_kw.update(urlopen_kw) + + return self.urlopen(method, url, **extra_kw) diff --git a/_vendor/urllib3/response.py b/_vendor/urllib3/response.py new file mode 100644 index 0000000..01f08ee --- /dev/null +++ b/_vendor/urllib3/response.py @@ -0,0 +1,872 @@ +from __future__ import absolute_import + +import io +import logging +import sys +import zlib +from contextlib import contextmanager +from socket import error as SocketError +from socket import timeout as SocketTimeout + +try: + try: + import brotlicffi as brotli + except ImportError: + import brotli +except ImportError: + brotli = None + +from . import util +from ._collections import HTTPHeaderDict +from .connection import BaseSSLError, HTTPException +from .exceptions import ( + BodyNotHttplibCompatible, + DecodeError, + HTTPError, + IncompleteRead, + InvalidChunkLength, + InvalidHeader, + ProtocolError, + ReadTimeoutError, + ResponseNotChunked, + SSLError, +) +from .packages import six +from .util.response import is_fp_closed, is_response_to_head + +log = logging.getLogger(__name__) + + +class DeflateDecoder(object): + def __init__(self): + self._first_try = True + self._data = b"" + self._obj = zlib.decompressobj() + + def __getattr__(self, name): + return getattr(self._obj, name) + + def decompress(self, data): + if not data: + return data + + if not self._first_try: + return self._obj.decompress(data) + + self._data += data + try: + decompressed = self._obj.decompress(data) + if decompressed: + self._first_try = False + self._data = None + return decompressed + except zlib.error: + self._first_try = False + self._obj = zlib.decompressobj(-zlib.MAX_WBITS) + try: + return self.decompress(self._data) + finally: + self._data = None + + +class GzipDecoderState(object): + + FIRST_MEMBER = 0 + OTHER_MEMBERS = 1 + SWALLOW_DATA = 2 + + +class GzipDecoder(object): + def __init__(self): + self._obj = zlib.decompressobj(16 + zlib.MAX_WBITS) + self._state = GzipDecoderState.FIRST_MEMBER + + def __getattr__(self, name): + return getattr(self._obj, name) + + def decompress(self, data): + ret = bytearray() + if self._state == GzipDecoderState.SWALLOW_DATA or not data: + return bytes(ret) + while True: + try: + ret += self._obj.decompress(data) + except zlib.error: + previous_state = self._state + # Ignore data after the first error + self._state = GzipDecoderState.SWALLOW_DATA + if previous_state == GzipDecoderState.OTHER_MEMBERS: + # Allow trailing garbage acceptable in other gzip clients + return bytes(ret) + raise + data = self._obj.unused_data + if not data: + return bytes(ret) + self._state = GzipDecoderState.OTHER_MEMBERS + self._obj = zlib.decompressobj(16 + zlib.MAX_WBITS) + + +if brotli is not None: + + class BrotliDecoder(object): + # Supports both 'brotlipy' and 'Brotli' packages + # since they share an import name. The top branches + # are for 'brotlipy' and bottom branches for 'Brotli' + def __init__(self): + self._obj = brotli.Decompressor() + if hasattr(self._obj, "decompress"): + self.decompress = self._obj.decompress + else: + self.decompress = self._obj.process + + def flush(self): + if hasattr(self._obj, "flush"): + return self._obj.flush() + return b"" + + +class MultiDecoder(object): + """ + From RFC7231: + If one or more encodings have been applied to a representation, the + sender that applied the encodings MUST generate a Content-Encoding + header field that lists the content codings in the order in which + they were applied. + """ + + def __init__(self, modes): + self._decoders = [_get_decoder(m.strip()) for m in modes.split(",")] + + def flush(self): + return self._decoders[0].flush() + + def decompress(self, data): + for d in reversed(self._decoders): + data = d.decompress(data) + return data + + +def _get_decoder(mode): + if "," in mode: + return MultiDecoder(mode) + + if mode == "gzip": + return GzipDecoder() + + if brotli is not None and mode == "br": + return BrotliDecoder() + + return DeflateDecoder() + + +class HTTPResponse(io.IOBase): + """ + HTTP Response container. + + Backwards-compatible with :class:`http.client.HTTPResponse` but the response ``body`` is + loaded and decoded on-demand when the ``data`` property is accessed. This + class is also compatible with the Python standard library's :mod:`io` + module, and can hence be treated as a readable object in the context of that + framework. + + Extra parameters for behaviour not present in :class:`http.client.HTTPResponse`: + + :param preload_content: + If True, the response's body will be preloaded during construction. + + :param decode_content: + If True, will attempt to decode the body based on the + 'content-encoding' header. + + :param original_response: + When this HTTPResponse wrapper is generated from an :class:`http.client.HTTPResponse` + object, it's convenient to include the original for debug purposes. It's + otherwise unused. + + :param retries: + The retries contains the last :class:`~urllib3.util.retry.Retry` that + was used during the request. + + :param enforce_content_length: + Enforce content length checking. Body returned by server must match + value of Content-Length header, if present. Otherwise, raise error. + """ + + CONTENT_DECODERS = ["gzip", "deflate"] + if brotli is not None: + CONTENT_DECODERS += ["br"] + REDIRECT_STATUSES = [301, 302, 303, 307, 308] + + def __init__( + self, + body="", + headers=None, + status=0, + version=0, + reason=None, + strict=0, + preload_content=True, + decode_content=True, + original_response=None, + pool=None, + connection=None, + msg=None, + retries=None, + enforce_content_length=False, + request_method=None, + request_url=None, + auto_close=True, + ): + + if isinstance(headers, HTTPHeaderDict): + self.headers = headers + else: + self.headers = HTTPHeaderDict(headers) + self.status = status + self.version = version + self.reason = reason + self.strict = strict + self.decode_content = decode_content + self.retries = retries + self.enforce_content_length = enforce_content_length + self.auto_close = auto_close + + self._decoder = None + self._body = None + self._fp = None + self._original_response = original_response + self._fp_bytes_read = 0 + self.msg = msg + self._request_url = request_url + + if body and isinstance(body, (six.string_types, bytes)): + self._body = body + + self._pool = pool + self._connection = connection + + if hasattr(body, "read"): + self._fp = body + + # Are we using the chunked-style of transfer encoding? + self.chunked = False + self.chunk_left = None + tr_enc = self.headers.get("transfer-encoding", "").lower() + # Don't incur the penalty of creating a list and then discarding it + encodings = (enc.strip() for enc in tr_enc.split(",")) + if "chunked" in encodings: + self.chunked = True + + # Determine length of response + self.length_remaining = self._init_length(request_method) + + # If requested, preload the body. + if preload_content and not self._body: + self._body = self.read(decode_content=decode_content) + + def get_redirect_location(self): + """ + Should we redirect and where to? + + :returns: Truthy redirect location string if we got a redirect status + code and valid location. ``None`` if redirect status and no + location. ``False`` if not a redirect status code. + """ + if self.status in self.REDIRECT_STATUSES: + return self.headers.get("location") + + return False + + def release_conn(self): + if not self._pool or not self._connection: + return + + self._pool._put_conn(self._connection) + self._connection = None + + def drain_conn(self): + """ + Read and discard any remaining HTTP response data in the response connection. + + Unread data in the HTTPResponse connection blocks the connection from being released back to the pool. + """ + try: + self.read() + except (HTTPError, SocketError, BaseSSLError, HTTPException): + pass + + @property + def data(self): + # For backwards-compat with earlier urllib3 0.4 and earlier. + if self._body: + return self._body + + if self._fp: + return self.read(cache_content=True) + + @property + def connection(self): + return self._connection + + def isclosed(self): + return is_fp_closed(self._fp) + + def tell(self): + """ + Obtain the number of bytes pulled over the wire so far. May differ from + the amount of content returned by :meth:``urllib3.response.HTTPResponse.read`` + if bytes are encoded on the wire (e.g, compressed). + """ + return self._fp_bytes_read + + def _init_length(self, request_method): + """ + Set initial length value for Response content if available. + """ + length = self.headers.get("content-length") + + if length is not None: + if self.chunked: + # This Response will fail with an IncompleteRead if it can't be + # received as chunked. This method falls back to attempt reading + # the response before raising an exception. + log.warning( + "Received response with both Content-Length and " + "Transfer-Encoding set. This is expressly forbidden " + "by RFC 7230 sec 3.3.2. Ignoring Content-Length and " + "attempting to process response as Transfer-Encoding: " + "chunked." + ) + return None + + try: + # RFC 7230 section 3.3.2 specifies multiple content lengths can + # be sent in a single Content-Length header + # (e.g. Content-Length: 42, 42). This line ensures the values + # are all valid ints and that as long as the `set` length is 1, + # all values are the same. Otherwise, the header is invalid. + lengths = set([int(val) for val in length.split(",")]) + if len(lengths) > 1: + raise InvalidHeader( + "Content-Length contained multiple " + "unmatching values (%s)" % length + ) + length = lengths.pop() + except ValueError: + length = None + else: + if length < 0: + length = None + + # Convert status to int for comparison + # In some cases, httplib returns a status of "_UNKNOWN" + try: + status = int(self.status) + except ValueError: + status = 0 + + # Check for responses that shouldn't include a body + if status in (204, 304) or 100 <= status < 200 or request_method == "HEAD": + length = 0 + + return length + + def _init_decoder(self): + """ + Set-up the _decoder attribute if necessary. + """ + # Note: content-encoding value should be case-insensitive, per RFC 7230 + # Section 3.2 + content_encoding = self.headers.get("content-encoding", "").lower() + if self._decoder is None: + if content_encoding in self.CONTENT_DECODERS: + self._decoder = _get_decoder(content_encoding) + elif "," in content_encoding: + encodings = [ + e.strip() + for e in content_encoding.split(",") + if e.strip() in self.CONTENT_DECODERS + ] + if len(encodings): + self._decoder = _get_decoder(content_encoding) + + DECODER_ERROR_CLASSES = (IOError, zlib.error) + if brotli is not None: + DECODER_ERROR_CLASSES += (brotli.error,) + + def _decode(self, data, decode_content, flush_decoder): + """ + Decode the data passed in and potentially flush the decoder. + """ + if not decode_content: + return data + + try: + if self._decoder: + data = self._decoder.decompress(data) + except self.DECODER_ERROR_CLASSES as e: + content_encoding = self.headers.get("content-encoding", "").lower() + raise DecodeError( + "Received response with content-encoding: %s, but " + "failed to decode it." % content_encoding, + e, + ) + if flush_decoder: + data += self._flush_decoder() + + return data + + def _flush_decoder(self): + """ + Flushes the decoder. Should only be called if the decoder is actually + being used. + """ + if self._decoder: + buf = self._decoder.decompress(b"") + return buf + self._decoder.flush() + + return b"" + + @contextmanager + def _error_catcher(self): + """ + Catch low-level python exceptions, instead re-raising urllib3 + variants, so that low-level exceptions are not leaked in the + high-level api. + + On exit, release the connection back to the pool. + """ + clean_exit = False + + try: + try: + yield + + except SocketTimeout: + # FIXME: Ideally we'd like to include the url in the ReadTimeoutError but + # there is yet no clean way to get at it from this context. + raise ReadTimeoutError(self._pool, None, "Read timed out.") + + except BaseSSLError as e: + # FIXME: Is there a better way to differentiate between SSLErrors? + if "read operation timed out" not in str(e): + # SSL errors related to framing/MAC get wrapped and reraised here + raise SSLError(e) + + raise ReadTimeoutError(self._pool, None, "Read timed out.") + + except (HTTPException, SocketError) as e: + # This includes IncompleteRead. + raise ProtocolError("Connection broken: %r" % e, e) + + # If no exception is thrown, we should avoid cleaning up + # unnecessarily. + clean_exit = True + finally: + # If we didn't terminate cleanly, we need to throw away our + # connection. + if not clean_exit: + # The response may not be closed but we're not going to use it + # anymore so close it now to ensure that the connection is + # released back to the pool. + if self._original_response: + self._original_response.close() + + # Closing the response may not actually be sufficient to close + # everything, so if we have a hold of the connection close that + # too. + if self._connection: + self._connection.close() + + # If we hold the original response but it's closed now, we should + # return the connection back to the pool. + if self._original_response and self._original_response.isclosed(): + self.release_conn() + + def _fp_read(self, amt): + """ + Read a response with the thought that reading the number of bytes + larger than can fit in a 32-bit int at a time via SSL in some + known cases leads to an overflow error that has to be prevented + if `amt` or `self.length_remaining` indicate that a problem may + happen. + + The known cases: + * 3.8 <= CPython < 3.9.7 because of a bug + https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900. + * urllib3 injected with pyOpenSSL-backed SSL-support. + * CPython < 3.10 only when `amt` does not fit 32-bit int. + """ + assert self._fp + c_int_max = 2 ** 31 - 1 + if ( + ( + (amt and amt > c_int_max) + or (self.length_remaining and self.length_remaining > c_int_max) + ) + and not util.IS_SECURETRANSPORT + and (util.IS_PYOPENSSL or sys.version_info < (3, 10)) + ): + buffer = io.BytesIO() + # Besides `max_chunk_amt` being a maximum chunk size, it + # affects memory overhead of reading a response by this + # method in CPython. + # `c_int_max` equal to 2 GiB - 1 byte is the actual maximum + # chunk size that does not lead to an overflow error, but + # 256 MiB is a compromise. + max_chunk_amt = 2 ** 28 + while amt is None or amt != 0: + if amt is not None: + chunk_amt = min(amt, max_chunk_amt) + amt -= chunk_amt + else: + chunk_amt = max_chunk_amt + data = self._fp.read(chunk_amt) + if not data: + break + buffer.write(data) + del data # to reduce peak memory usage by `max_chunk_amt`. + return buffer.getvalue() + else: + # StringIO doesn't like amt=None + return self._fp.read(amt) if amt is not None else self._fp.read() + + def read(self, amt=None, decode_content=None, cache_content=False): + """ + Similar to :meth:`http.client.HTTPResponse.read`, but with two additional + parameters: ``decode_content`` and ``cache_content``. + + :param amt: + How much of the content to read. If specified, caching is skipped + because it doesn't make sense to cache partial content as the full + response. + + :param decode_content: + If True, will attempt to decode the body based on the + 'content-encoding' header. + + :param cache_content: + If True, will save the returned data such that the same result is + returned despite of the state of the underlying file object. This + is useful if you want the ``.data`` property to continue working + after having ``.read()`` the file object. (Overridden if ``amt`` is + set.) + """ + self._init_decoder() + if decode_content is None: + decode_content = self.decode_content + + if self._fp is None: + return + + flush_decoder = False + fp_closed = getattr(self._fp, "closed", False) + + with self._error_catcher(): + data = self._fp_read(amt) if not fp_closed else b"" + if amt is None: + flush_decoder = True + else: + cache_content = False + if ( + amt != 0 and not data + ): # Platform-specific: Buggy versions of Python. + # Close the connection when no data is returned + # + # This is redundant to what httplib/http.client _should_ + # already do. However, versions of python released before + # December 15, 2012 (http://bugs.python.org/issue16298) do + # not properly close the connection in all cases. There is + # no harm in redundantly calling close. + self._fp.close() + flush_decoder = True + if self.enforce_content_length and self.length_remaining not in ( + 0, + None, + ): + # This is an edge case that httplib failed to cover due + # to concerns of backward compatibility. We're + # addressing it here to make sure IncompleteRead is + # raised during streaming, so all calls with incorrect + # Content-Length are caught. + raise IncompleteRead(self._fp_bytes_read, self.length_remaining) + + if data: + self._fp_bytes_read += len(data) + if self.length_remaining is not None: + self.length_remaining -= len(data) + + data = self._decode(data, decode_content, flush_decoder) + + if cache_content: + self._body = data + + return data + + def stream(self, amt=2 ** 16, decode_content=None): + """ + A generator wrapper for the read() method. A call will block until + ``amt`` bytes have been read from the connection or until the + connection is closed. + + :param amt: + How much of the content to read. The generator will return up to + much data per iteration, but may return less. This is particularly + likely when using compressed data. However, the empty string will + never be returned. + + :param decode_content: + If True, will attempt to decode the body based on the + 'content-encoding' header. + """ + if self.chunked and self.supports_chunked_reads(): + for line in self.read_chunked(amt, decode_content=decode_content): + yield line + else: + while not is_fp_closed(self._fp): + data = self.read(amt=amt, decode_content=decode_content) + + if data: + yield data + + @classmethod + def from_httplib(ResponseCls, r, **response_kw): + """ + Given an :class:`http.client.HTTPResponse` instance ``r``, return a + corresponding :class:`urllib3.response.HTTPResponse` object. + + Remaining parameters are passed to the HTTPResponse constructor, along + with ``original_response=r``. + """ + headers = r.msg + + if not isinstance(headers, HTTPHeaderDict): + if six.PY2: + # Python 2.7 + headers = HTTPHeaderDict.from_httplib(headers) + else: + headers = HTTPHeaderDict(headers.items()) + + # HTTPResponse objects in Python 3 don't have a .strict attribute + strict = getattr(r, "strict", 0) + resp = ResponseCls( + body=r, + headers=headers, + status=r.status, + version=r.version, + reason=r.reason, + strict=strict, + original_response=r, + **response_kw + ) + return resp + + # Backwards-compatibility methods for http.client.HTTPResponse + def getheaders(self): + return self.headers + + def getheader(self, name, default=None): + return self.headers.get(name, default) + + # Backwards compatibility for http.cookiejar + def info(self): + return self.headers + + # Overrides from io.IOBase + def close(self): + if not self.closed: + self._fp.close() + + if self._connection: + self._connection.close() + + if not self.auto_close: + io.IOBase.close(self) + + @property + def closed(self): + if not self.auto_close: + return io.IOBase.closed.__get__(self) + elif self._fp is None: + return True + elif hasattr(self._fp, "isclosed"): + return self._fp.isclosed() + elif hasattr(self._fp, "closed"): + return self._fp.closed + else: + return True + + def fileno(self): + if self._fp is None: + raise IOError("HTTPResponse has no file to get a fileno from") + elif hasattr(self._fp, "fileno"): + return self._fp.fileno() + else: + raise IOError( + "The file-like object this HTTPResponse is wrapped " + "around has no file descriptor" + ) + + def flush(self): + if ( + self._fp is not None + and hasattr(self._fp, "flush") + and not getattr(self._fp, "closed", False) + ): + return self._fp.flush() + + def readable(self): + # This method is required for `io` module compatibility. + return True + + def readinto(self, b): + # This method is required for `io` module compatibility. + temp = self.read(len(b)) + if len(temp) == 0: + return 0 + else: + b[: len(temp)] = temp + return len(temp) + + def supports_chunked_reads(self): + """ + Checks if the underlying file-like object looks like a + :class:`http.client.HTTPResponse` object. We do this by testing for + the fp attribute. If it is present we assume it returns raw chunks as + processed by read_chunked(). + """ + return hasattr(self._fp, "fp") + + def _update_chunk_length(self): + # First, we'll figure out length of a chunk and then + # we'll try to read it from socket. + if self.chunk_left is not None: + return + line = self._fp.fp.readline() + line = line.split(b";", 1)[0] + try: + self.chunk_left = int(line, 16) + except ValueError: + # Invalid chunked protocol response, abort. + self.close() + raise InvalidChunkLength(self, line) + + def _handle_chunk(self, amt): + returned_chunk = None + if amt is None: + chunk = self._fp._safe_read(self.chunk_left) + returned_chunk = chunk + self._fp._safe_read(2) # Toss the CRLF at the end of the chunk. + self.chunk_left = None + elif amt < self.chunk_left: + value = self._fp._safe_read(amt) + self.chunk_left = self.chunk_left - amt + returned_chunk = value + elif amt == self.chunk_left: + value = self._fp._safe_read(amt) + self._fp._safe_read(2) # Toss the CRLF at the end of the chunk. + self.chunk_left = None + returned_chunk = value + else: # amt > self.chunk_left + returned_chunk = self._fp._safe_read(self.chunk_left) + self._fp._safe_read(2) # Toss the CRLF at the end of the chunk. + self.chunk_left = None + return returned_chunk + + def read_chunked(self, amt=None, decode_content=None): + """ + Similar to :meth:`HTTPResponse.read`, but with an additional + parameter: ``decode_content``. + + :param amt: + How much of the content to read. If specified, caching is skipped + because it doesn't make sense to cache partial content as the full + response. + + :param decode_content: + If True, will attempt to decode the body based on the + 'content-encoding' header. + """ + self._init_decoder() + # FIXME: Rewrite this method and make it a class with a better structured logic. + if not self.chunked: + raise ResponseNotChunked( + "Response is not chunked. " + "Header 'transfer-encoding: chunked' is missing." + ) + if not self.supports_chunked_reads(): + raise BodyNotHttplibCompatible( + "Body should be http.client.HTTPResponse like. " + "It should have have an fp attribute which returns raw chunks." + ) + + with self._error_catcher(): + # Don't bother reading the body of a HEAD request. + if self._original_response and is_response_to_head(self._original_response): + self._original_response.close() + return + + # If a response is already read and closed + # then return immediately. + if self._fp.fp is None: + return + + while True: + self._update_chunk_length() + if self.chunk_left == 0: + break + chunk = self._handle_chunk(amt) + decoded = self._decode( + chunk, decode_content=decode_content, flush_decoder=False + ) + if decoded: + yield decoded + + if decode_content: + # On CPython and PyPy, we should never need to flush the + # decoder. However, on Jython we *might* need to, so + # lets defensively do it anyway. + decoded = self._flush_decoder() + if decoded: # Platform-specific: Jython. + yield decoded + + # Chunk content ends with \r\n: discard it. + while True: + line = self._fp.fp.readline() + if not line: + # Some sites may not end with '\r\n'. + break + if line == b"\r\n": + break + + # We read everything; close the "file". + if self._original_response: + self._original_response.close() + + def geturl(self): + """ + Returns the URL that was the source of this response. + If the request that generated this response redirected, this method + will return the final redirect location. + """ + if self.retries is not None and len(self.retries.history): + return self.retries.history[-1].redirect_location + else: + return self._request_url + + def __iter__(self): + buffer = [] + for chunk in self.stream(decode_content=True): + if b"\n" in chunk: + chunk = chunk.split(b"\n") + yield b"".join(buffer) + chunk[0] + b"\n" + for x in chunk[1:-1]: + yield x + b"\n" + if chunk[-1]: + buffer = [chunk[-1]] + else: + buffer = [] + else: + buffer.append(chunk) + if buffer: + yield b"".join(buffer) diff --git a/_vendor/urllib3/util/__init__.py b/_vendor/urllib3/util/__init__.py new file mode 100644 index 0000000..4547fc5 --- /dev/null +++ b/_vendor/urllib3/util/__init__.py @@ -0,0 +1,49 @@ +from __future__ import absolute_import + +# For backwards compatibility, provide imports that used to be here. +from .connection import is_connection_dropped +from .request import SKIP_HEADER, SKIPPABLE_HEADERS, make_headers +from .response import is_fp_closed +from .retry import Retry +from .ssl_ import ( + ALPN_PROTOCOLS, + HAS_SNI, + IS_PYOPENSSL, + IS_SECURETRANSPORT, + PROTOCOL_TLS, + SSLContext, + assert_fingerprint, + resolve_cert_reqs, + resolve_ssl_version, + ssl_wrap_socket, +) +from .timeout import Timeout, current_time +from .url import Url, get_host, parse_url, split_first +from .wait import wait_for_read, wait_for_write + +__all__ = ( + "HAS_SNI", + "IS_PYOPENSSL", + "IS_SECURETRANSPORT", + "SSLContext", + "PROTOCOL_TLS", + "ALPN_PROTOCOLS", + "Retry", + "Timeout", + "Url", + "assert_fingerprint", + "current_time", + "is_connection_dropped", + "is_fp_closed", + "get_host", + "parse_url", + "make_headers", + "resolve_cert_reqs", + "resolve_ssl_version", + "split_first", + "ssl_wrap_socket", + "wait_for_read", + "wait_for_write", + "SKIP_HEADER", + "SKIPPABLE_HEADERS", +) diff --git a/_vendor/urllib3/util/__pycache__/__init__.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/__init__.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..69441de0ebcda59d24c68ceddad62a1aa5852054 GIT binary patch literal 1066 zcmZ9L%Wl&^6o&0w>Rgr8;+?O-nocrDhUo*5_9=rF5|sWU_Xu`;>$3OaKPgv zA%T-uRrllR44;gKA4YT40x=uDACLY-TxB!wn&2zq1%wNoz}7FiNU%?1q4%4rI46?d zI~7$Qj%O1*n@<TY`PK!^w?MoyU+66yNGXwMW$e zamT#`i`c&=(#a`n5i$~|QrUjWIf*2eI^Yyk{)|&qx+D@`#X_ob;&DN6s)JRL&=3mX z0^U%&^FYO1C-wqW|10l!D2dbORo!oH18RT(o|^Z@!;8oUJ90Q3PC zpap0HHUS;L7GN7t1gvRHoad^7@kJ_APB7+hq*Y}#@hpL|bhlC>^k~q?> zh7wef!%VYcRROxVEdD=hnXAlSW@A+-)Tk`ztZwzvEqGLU-Or`(l}9k83ed%sD`jEq zQHt?5gTK)CGyFOlNR|weFgcJO*ONMUeG|SRw}<|KhUbIiUS7q~KxfeEaFEK74loWQ mJuLh(xmTql76&OMZ{d3oFag`J^Ig-{zgK3{?wd`sl=}_4o)=^Q literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/__pycache__/connection.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/connection.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..82919849dbd96ccccd363dd18736e2d30f5c8cd1 GIT binary patch literal 3394 zcmaJ@TW=f372X?{ONyc{c2WdL(rFu4reRY}zScx3d^8~gQ72O|AO?`=l+>uU;C855Cm|)GfQ0@1YKf>GqW@2{+)Bu#l^aTXYoIu z4z67>jQ`T&@?&H1d%W_m7(yd7V`F6QnI_Gx*xIu~J9J`u#(Zb#W*0r$ywXxUW*5P7kh1Spx7sAHZ=3X;g44e3}6fT9!_+JiJ z!d3jQ@Rjh&OLK2Ev^qxX>Nk+ZXqm-Q(3fdER@{$9St``dH&*#!)eo|aC;L&teV#mz zM4I6E>ceyps3=W#10ngA5UIefEu$CTm~_u7-r7l@1k)~tNNuO0lMar!(g%yh3HJP9 zDty6%a6lK%9%Aa@y^B}g$DoWHmI|$x_RP%jKQ=^zB*)ywd^L1B#&K2Aw@T>#-Fjkl z498H`^k=3)zo)Qm$CwzcYVaNy)ft{oxEhN@vaT3&77dv?;B1g42_KL~ERrk~DU=Rb zkc3Pgq~kbbeVmC?$-{PC6WPcD5sdV`4ZT5>HwJMa|f=Nb_#nBOGn_0G{jeZm2L83_%$1I2^!BjG#oJvT31Y6aE@!0J0pyQg(@pTf6mli|OothjP^}+gBMe+KD58BzZcq5Yj#g0FB$pT2rs~8$}&vZ8&!NROQ4~)esckG+rVKPc0WwMlq(mlUnZNmAtCF!}_Un&-mic zGcWf(ugq$*`fOp=m@R@w^LPy>y}Xv!^MzBa)k5CP?U$B`sK(94*c4Cm=E-6X`LJh+ z9#+j9GGf&{S;`m7*%QM;gzI?s4wt8YGmY7jX&kTSOEWib0w1RM66aS=afTxxc8hVi2ng+!*Qa4)n@Dm$z2cFFK?-FhDh!8t{joa80An0S(R&?|cN>1f29N zSwNu&Lzcia=Zt_>8eGVJ!4!{Uso6a0ko_RN zUd@#&FMn%(c5Hq2#ZKWwVGPm{_#&J2_Yb(WSGtq zB1BH+C*w$})@o6QBZZQaNF5XvsYH|&t3e#66CV2eLF5mEQ4~)L7h#%)yl6a5BAVzb zC0wM9qAr3+a(^h&k*LsyTe_xLxWvC$=sddnC%@DEWNY)|;))OR`{gmej7M4g$p7QR zM}OFS=-=Dg-hBM9>vtb~y!GgD7a~#==+s&`Wcs2yw`x)0R91_ME<3H|qB?hkpoCU5 zU-vt$35Mq!9r8rskOvAIlnQsQtql+tRxm6)x}l~SFDjWxRa(>rL4qtEjCf(mKqvFU zX}PyOuna^cpKD1Vnc;Y*B4Y4=at?cVC(#$o`qg5 z6O|)n9GWxq9m2!Ro}tc=49EZOQt>{^fV#EdGTKjocHm%=iX#@4$p_|C`~_i02tG?MsQH?L?ieyI0NN1?*u9+&@^{GvvnwXIfucbwLfLLP;w@-YRKeoG&Q`bZ?r(Pd2fLr%DQf3jTc&8?(Dx1a z2KHjSlG*~df>3~S1?|4p=GoXdZ}WOsgysxIcxEZ%#5^@botidf9opjh@rtreEX*C0 zXta4J6*PqQP#43{nW5oJYADa{bgeAUPmP3%nkm{iTcy&MQ=?lszWqaOpPWi0c80*8 z=e=ZZl(N>fceVw&x!dvtwH3uxG$j}Pu!ODq>5I}_-a#P!D0_aV@aBfQBYsSGYFjS` zT-PP>Q>+n)KgXYrM)4b(QM+^rU^V}Y(gYvmyBHh-3gF>dmfJ9!fDD1ldga&@q~b#y zIkq=8-fvwg>b^f5qrc_8F9=0*Us8C9s9$PP=VubhGOKx6FgObKxh%7uLk+s_?8+XG zx+w7u4Fpb&2JKVLSlpq#3mx=KXA1AbQ5ue8{t=l_>(MYgs{u$g%w^NFowqGCZ}soI L-+7+5(0KQM8l;`7 literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/__pycache__/proxy.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/proxy.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..b9ca413e216a2cda8ae997384e61a31e2f60cffa GIT binary patch literal 1301 zcmYjROK%i85O%vCnS>-f1&Op0)=H~oB$z?sA%PIA6ajlc17c_Q5Fxdkwr8fHUzFW} zpym{={DCZMI&aSd6P z?%jx!vatHCZO?)>Wwx*5M1ze%zc%gp<0E6Tcwd7_%VLrcj^jZx$GL;k+{C3pTs4D; zayDG~uQ;qbnZ0Bxz};5k(R_(3ovRSBMe+fHTN5~*YgDqUlhO*Id z*(K?n=(P8FMqzf!VwTQ(Uj%}i6L)7p@bI(-=@8DK%tcj}SuP7X*D$IMmVp=xLTO{u z!kNb=S?FA!gq-4iyR&0pOV%TCB^_z8u(mQ+-QQKAZ8CHTCXd>HG;Qeg(;;u8E>gQy z8y(L|cq2ij#hk?08DTlB{&<#ly%W3pwC9!*_b~ruu#O!6cV}$#YFwq&H7jAR?X{b) z(_4D~Ml!~V8dnE)Q5NIAzQ(mpv$2bePtjh+=slTKV~$LRCAKvxvVaO{3zxxW;0=77 z0YBoLe+zv6H3$PAHc^>`xEv4c6-I8Z25+Nane`fW=vm%)ho162^7moG&35DC49vFm z8|;Zg4%+~;!rXNDnAUjbbVsLR?FOeL)a zIE%Ys1gA-JhBSjjc24c7UW!!;?fQ?6w6e?HgLf=;%LWD5>OTn`{{*r(`~|hHGA7 RGV~3+z<98B#DCsA`VJ8pZnppc literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/__pycache__/queue.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/queue.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..72186cc41aee6686f8c68060ff5b22aff5181f2e GIT binary patch literal 1021 zcmZ`&&2G~`5Z>9f9XCzdQkC)yJ~T!Y4oC=90*MQ%K$Vd2Wfi>J;^M!o?TSXZwGYxB z^G0Z|oO*>DCuTNE6k0LTjOJ%G-#0UMH5~RC%J9dh^cOJplY({eFgQYO-l9=VLCzAU zxDq)OJmEmTmy5znJYbri`{s#z6(qfPO!+FfW-8F$d2l6?P{9d{dUx1~9p7=Z5m?b= z-{)ZcNvAuVQfXZT21lsPQ#6_-pjg5cD1OZnp}kX3LV4Ga_zS2cP(2l5t*15+s&6;m zXQ$Oi*P8H_LO$sm)Mg7!%WmM7&6wnhov=9^N5XEVRi5j#&8o7ozS79h`1m&B)@yWr zYC+DK8DQqm%eXD-xX$W>c5Kdcd+>acz0enjX`E+Y;`*}vT9t8Ua*Ph+uFdk;jXSC@ ztuM1OYpF{^jJ9C9z2ZD_we-Kt>2x!gv2%8Xn>9TQ4IM1vhDuiCx^x5=W=Od}PMU10 zx6%Jijr%a&Sp#&%2Z(eAx2qj=2=4}Fa0_^S+?K;dNZO4J#&xYrwPfIBtuF3U@MPV! zyZG8oyaUs%H3C>l@k3k*`Kwd8fgSwqePB^nbp&qihj@6B$Joa_Lh}zA7LKFPhEkT} zLQ84;QWll!a`FdKPP%cvs2KW846V)363iZ%eKK^rHA7oA0h&$Jh8Tw|gnupX!1#%H=QwBBTQ8IJIe7!}n87Tik3htJQf?>^#WPj+S3XtgBivaahI14qam XJAAbm<~41xp?t^&d;kFt`M&rIZdlQ@ literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/__pycache__/request.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/request.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..a95acd93e6a7faea6c91803431b98fa847b464ec GIT binary patch literal 3483 zcmbtXTW=f372a7cmv`M#J4MsWL~+ZoAgKg#T|-R_%QDjl5o9599E30H<<3ytXt~SG z%$nwwLfa_6qEB|;`Y-x3ihT_bApamxfU4)rk|L!h$U|1x;n_JeXU?4O+!WPnWdokt zf1Y@MUo(ua@MHNY!pD7h<-cKI1|xwnBwa#~HUo2*>*j#YF)Of!`EFj*`M@3)x`kn} zTZC`BTjJ$ogBAWs&Pcbyirs2*GqGWRDX4WU1H#$o?q*(d}@SbYyh{U zxw{z`X7gi%S6TUwMz_k>&y4OyY3X6>tiq~alI|<4##X*Gx<6y9Yz=;Iu+ovy*!Tu+ zVKhj(>h@$5#ELuqa1;pzQ>EUW+dT9l#=kMMMK?YU1t0q%b9(`Q5V1)|h)6Wdl=RY? zA1Z##g`*}TE|c~9_wOHlxOeD$(Ajy|`3Sxmx${-m^Y}=$v{XMlPOU*C)pPNnl^#H z!N`l;l)NOTBs7(EN~UCLGxJ?zYKqsVCeS&c4N+$n(0QP9;tsP_UfI*!8NlE?fl`pn`uM zbE)WnyNnCjF6-snBUiXXdcyh0aRdJu-`3M8X|GS8K7A}={`6^+x{OI$_o6W5p7Nt` zTW@LUE%lkqt0FT5oH+suxw~#idz`wo7exVg!zK-UshSkjl}doB?MoHr=TjxzP$E#0 zs)*K?p{p;J?}HpV_JaWKt>|ZwA96-}6Y537p}Saiq)*8ff+FA(jJlGJMD)yOoL#*J zdW@qzW^sd=0KrFsOYkK$uNr7cGw-64D5hgKgloyz8-V!BJ8h08Y7m93SOkIJduQvd z_MOcuSoB=!dyX5c!Q#Z-D1a@JBU%d7MXf@2$N@en$B|$&(`nG_xHl4h0>C3uS|Dw= z+x1H&aK-nc21a;3aelfAT2AXHD8hV+vF~`UH~0~!#1$=YO(mjWn}$(K@44oco#*aw z6!7is%+~1O_wL=JL-&L`vygam5e4s|-#4|HGw|QreBi2~8*aVbervOFX~(}Tg+zUu z)=|PND4Mjs$TrAZ2&kW43iv-Au7!ni46r`iH1z{IcW;49|B8EQeLQ)mKQOc z*bmUvXp)arzjZgQU4bik<$EwpigWWOHErd&-5bTU>`OnC$_+i9<{*+&3*$PqFb>nz zo!#Be;bW(Bu>0uY-oc+m4zTeWMt!I{opiJltewjZ~ox3wI((=MV)3xg^ zo7S%QPFk43`!7Sh2IrmsX-f@9TO)teQm%kR(YpP){|El;9d8TbaVv|?t$B3D$`7_? zsk1$rq}64I`4xzhZ5XWITck`(c&o%Ri%ah>fVPND%nREr{@1dQCvcyKm2UnZU4mEF znkPU^2_rEP6{s&jpP2;4BSVoXlzv9ea+=#n3RB~S`O-KgpJ={isGPF;=H$(+WUKrs z`BZbpdTiv9ziQ8e)b7$zBz;T})L-PjCLKo4IPLoZ$3&|Ju7Y(?aI@_B2(p|Q`w~K9 z%>xY;4WrjTz{?HYEFv;o}+J0W~1!q2>11*6If&_>1$FJ3Yl)k7o z?}PnXfq%kj)cXuJW_}>!5%z16O3qKN7D;drRA(XKaPC{6F)l~VL1hFcQ#ZA6`XJfa z2`R_kjz*pr3s9Ag2RsBV@z%?Ii#9-Zt?W7wmP$<8$wwcDSSgl#P`mFOe_axPKpcy) z-vFD=O*EHz8&5+QqQe+^3g{A|KE-|$ZlRmcCJ<6VD@A>1IiP#^t!y_+f`YS%6&$dA z6tCm3i9;TTH(*H1Puw8pnOj>ZvXK+FkWrkU3H>mhjt08s-r_f~a15`cFjOlWkaJeZ z8jL2fF3gLfHKWkgFZAk$eW0Jl&9v+|SvWe5z>JgHkVg5P+d3DgW&RvnW=IH9Yul}k zT<-)rAK8}vbDgU7rP9h$x1E;yB1(7&QJ1dc{Nc`n{m!fvKN1^oO1In-kqUgT-}k#W zoH)dO%Na&2h9J#YX=P9UE07t*o=w`B^J%N;l&J$%UuwxLn9_v~{o=cs(0c@?La9OoZ!^%+o{ucU~WfF(n#IDYve}KOuhaB$Zphp zX7&BZix%L&75PyM{@YP|+v;{+fLE)FswFy}J;Ve@j(n-u7Eqn0Zg;)Lr!(n4;J-1G*@2qXhu@sstB1`|iw=(p^I&`MiV|;3R z_kzs@n;oI@Y;SLFS5AbF(NplywGWj~;JG_y;jSc4#!QWwAe4;wKFdhV6Sk7@T}JZZ zV>mS7l7vYvSrqtY-z~TznriDUGuOU$#_aM&m6K4%2+Xq0!|t~k9VU!`K4OZAlxOTT zd|aFh)NNEAmvz)?aZM?~hfphXnUy=!HvGJzTO4IsI;lMYzR(R(mQfdIc|5 zpkyPaRzBO~pR@g&VK3psUNKSQJnNMrf!WPosd&;8Ocr@2Sx`)>HkX4~*Gr#!L6?TW zfIZ)CBM0GE*!J*TYJ(0V5962O3M{%%-3BQ1YpVMT2+Ep5O&{Z9ESD72>baw!-pA+! z>FOw`V1y(4*gmRd$H<^LvZq+|02$2_OZKMt*gA5+m!mwj5Q8_cIj{zaFQZ1}KC`Ci z9(X-MQzTcXwz#AGDVo|*^H=;7MK&KpdsvMSqOB1!m@}kjeALAk*5UUMc{IQT_lgqRv^Ya!VFa3 zWZ?BlE&z~uMz&0O$jyt0(-aD73I!WGJ6jJR9XeujPq#?TJgEV;&jgPr^ZkNy$t0PT zJ75PPD>SWTaG9)UpuT^W?CdyH0L(SzYe*knV+RFL1kS5-11JTvoIWL^T#=t|90gS~ zGQC4?RxNXk<9JQMq+g!-aZS0%PT`CS0m8Pm9|RVJ|y*`-vibJeOAb|%G~ z$#E`Hswzi;s%paZP@uXYUpnu_Rbx0&Ojfp3Lg-6^-q4(((*zgGpcHSJfV0be{nT&% z?}0vsE%F)+?WJYZ)^x@W@@y9^!oP#uHpcG1o(K9@;zL+=sbu=P4Y5B00a~vG1p~q< zO~>{WMQ9g_HATHCs$80{Y3CeUxmhuiaY_%&e;6 zw?VTg0a)wpdnGsAiOE_~tY;%=t#k0#?fP}{Je-G^$2!CPscGK836D*XTySsh!7qLN5=UeeFyA)am4*O(v=Oedp{hE~4UQ z>;i+cXV0E<_MG4Sa^Ou)=2Q4g{_9)S|9mr*`ZwMTe$u%4GJgI)p>R@;)<`wAvZk@F zH}tYDuSVIBSF>!&Yr344*GxHstI^0dbLE^IV>ZT``Enlhw3BI!Hz&#y&B^j)vrsNH zr^-{!>GE`QraaS}Ezin6*~YQvTzO7QxyJqD?uiFl`J|h3ayuz!>=)Wyy?n}j>Tat1 z^y?`n?~LC|Ipgj#ca8FCckceP?&${_+9#Yzv`?a+aaSup=RW5Y?rQFHl}|YOMyfdV z0rr(DYT=ZH_{cvY{VZu7Xk6Fr(<$B5yn z)?L5twR~50#u5y_ekUxfyYF^fKe$@=15X?j(_yCR2D_dU8XeIH)2>`b#t-bE*VBhVz9K^+vvY)$#`8O^E?Flstx~PN<4=R{`O1fgJ%1DyWTz* z*kZ>G&VBaX`sdu+7pmtQ_3iWR10b|@9{9xFh4Y=D-Z(EvMWyyZcq)Fw=+4g&eB@_S z*EL-?f1gQrKh+2M6CqY5J;xu`6I`6Y%@8iMUaA6K-$)5Q5+_kS)Wx&7glUj{$CbNN z#V6RqLU9hip>^fcPei{sj?P5(Pme_Q`pT7S>noQxD_2*RudJ+ZR9?HjeEF*%2in(H zZrprpC7Ji;S|xth00oFsSe4uK^P`S63@HmcRBs106mDfG=|VXILBsK$7~O@*x4ZR?LODN`+da zQi1TRG(D%&V11%edADOXq9?hw@Y=2j4kWjP8Q%>8NO2-VaKZsBNqkAhn!^LGz$YQ* zQo5Gc%v@g6@#|j;nqa>wenX$B=*~|;^u{9J(aMHvLbd8pty(!P>xQgnT+=ak*qU|H z9f;Cvb_r^d4Vue0dPI}3RFlv8wG#M7sLkg93UXPmS5a^+`!06AAa4aM|Qn3gKV z{tAF4YgW~3)#^JPAvImC3qt<_u9W=|(vn&u*U2Svg;o}#?qJn`%h3LK&m9(rx2O!GKj!`1wFJzib>eX0rNv^j zB;F5#y6)TC4ZwQ)z-rsRv^lo6R_%uGZf$*htB?~$E06}BpO`88!fv;fnX*)EUF&6bCy<*f_Bx0*+alq?T*}DGHJ2| zVb}Y#xYV|V-Ng973cSE>EG0y<$y=+{X>Pm1@@g@N(ao|O4R60>ZNh5yEm~u)Fmv6APw${8BfX%ux*|1tzb)aNFz{;==T6HzN!rHd0w=A!v zW=z)g?Aew6c zco8S|!FSc$x0-effXcc<=*3K$+vU1{Sxu>jH&DZ`4iU3&I34LE$#$ zFu=`sCFbO22~S8X-xXlFvkAZyVeDg0-|sYCYZrp1o@YX~j?knKc(7+8dYQ3M}?DuR(+gLWNU zxV4YX4#Fq`4n#G(B`}I1+O!VO!ZPbD9cu2CDhUc{h7rmTxq5ouCS2s7`KvN`Vr6#j2@v)-X$q}%9oVvC_Tmu^)1X`aB zV~N{@*H5_;Lkg%x~3ge!N3WywzkyM3J_U!8*uEmwmu%{4G148a{o^o zR>D~^&cHHmf)_+AZw5q9uxmpeV~dm*kswp1M&Hl?X~YnS=OtqK8Di6BeP=h2p1RaO z)<@@6IpO~kw{rQ{YR~~vD?+h=a|i?&@X)rwJo#wH^T39VYm+JQAYsr&$)#1PsS-+{ zMb~M$ciIpskh!k2LnZA)-cjK_#?#abgNz)b8v>3djMBlbQ&9mTzmI(~B!q7VW`^MW zj^cOK&w^&yrf3IVp%MIDuhVcq(T{1N*A8M+4OC9Dmqx7WW<~FeOb*fq)i)p^m5B!= zC%Z-?f^Gq|)It-6Z5>7<-Y2yRts+>_pgow$P)yPkaj`+)a%E&kJxu13oybmZu>^a< zwU%J4i>0k~EL-HEOk2EfLFgwguoNW~+AjCh%XR|SeVh(y3yiGpNjoT}r)FdqqUF_`sI>E+Lt7A289Db}UT z?@*K=Lt^O3BixTu2t+52~ZOG;r!v{t2EV zdQn{f4rxC2Nq1{2nT(vE21d$hU`@&J(R~dG)IqwH7{R(?Gg*<_R%C%j_>G`eYj|J@ zTAW_3R;k%l1YidN7CnJs$|sV)+cXll-C*B!Td~^+W=>2H-vw7-KjI+S-$K)aIXY;! zxCl+luw@hRXabLO!V3k4;?Z*12tr$SGLHj8@&HT_c@E07_ZzO;rsFtDr0)$c{?K~S zT6o!d5#@V*^Ipn1iA(rPht@gkrPzleajMn$CCWr1Xc$mL&0+~Q10J=krCO&|UD_(i z^=u8SEm=NA;Wrjbi_oBprI%&-S(K$x>74|iq$;cgZ;X8LmJ8WM{n7ARpxI;rGBfPTmQdhua-gA8HRREAchu27tlg)%RTzKq}(w8iWBQ z2j2QPU#o3M(HD_}G|rQyY?Jd6cn)t@=5{Pt%*>=L(G-bqlxxzLPH#4Q1W2Q# z!cJ-+f=(O_nJl9MRva8yAIb>DWE=@CMUkKlm=y3)A!#a7{8V<~HMs-wDC^A8*grgnJX*T zS2kC|?9DeeuiaeR2-BPE%a>P*M*Zgq#MXbs;=fRYlgk}sfJD731CSrwLA>?@W_H#D zo~Aad(@_AI7uK1ly^NpC)ApuT>&Ff;tcLGhlL)qJ=va)GS@Ruj`h+g^Sunp@gA~(os|D4J&jlKs*^cH z%VEA};^{;$*Io@K?;?9wDfF@^r+Q;3r+aynGre(?v%QJ-*MeiR&s=X3Eysfs3?|=8 z^$J%~cd=%)on*GDIJVaHRI*_k-ib9oVjav&_Maa$q2@u$$gNQj0iCqWqj69eDyg7s zR)k$2pYpeHcH{9`r9~=vgY*7TxyHv99%UB=G02=Vn5%lL0X5cGmAI}F;qfO<&TXK< zXJmf|0DdQPsP(k_sRyZ_=y3OBpT;&m3+Sa5?v zCY-Lb_Ei=)Sgf(Q$wDTJ)>+#`5l)X1+bGtMPg02aHM;v(P~_%v8q&R*`N&K&?W=2< z-m}I&cI8UFyiw4pP>ktlLv3^ zK{D(?F6@Eh_aGVeAQ$$)>w7u;!0mhB^*wO<-UNP=j`sfKq3-BC?Y1T^I!1Km9EIB{ z@r7XO{(p+!UBI8G|m zZ|#Q}=`Z@Dlwcs;v`EH%86AQCCw?=(o<5GGAc+KL0w&UVJ+IGd-7$r7%u;2(KmJe- zCEA2Afqd5>-zR%G5dy7}?-?!PEOn>_5Icc>R~K_VU?4Dh`d!U?%Fzz-9J&MedtW~^ z1M@ykkKo>XK%HX(S7!IZYmjnqmmU8cB@ndScD+##4rEG8nnqE?fq5Bt0*IKEa3n{v zRriyZy%x-T21tZ*04(XDFIg`L>)b0Sp?b4XayZP_k>UXV!%z?xu%FPRMHCthZzoJU z?sjLVm{unkve9hvEnzmwvW4RSku;pJmQf_+Xk~ySgH2+BnmA|7YI(5Q1Q@LVsK=}o zcYKVsG8iOPH-$%#3II}d^acP0Ye5YHtamlac*nSfgsuY+;z`;`v*lFk7{vCW9w_Dm zI>-#&YpVcSr(sKg62v$|LdzXCrZg-OYKi1$KXJH(6m;8NvZR}v*fc{6rZS?UkP3(f z2`RyW&43d+8WD61ZO}d1oyQ<`v0*p29s8BNSlQ%L-33L1(9xAxnlt`7sC3kz5BOrK z50#?K0e@~QG^vvW$(ITQG=WH#5~&okq0y|j#96K=Vy6>OK=4ul3rKV2VOKcMWc+qX zN25!h9$nuyw=j!&^^C5~YWgGdQ7&z2vp{+G#L-(CI#oda;-V$mzmJMKV*}Zyi}3&w z66n@ji-EBR-l4=hG{Akd%$^A{l%OXd{l2TA&3H;eU!3Q2$M~L(d-G%pcQ}E^yOXIy zL(Y@!8JNfHnL+M;?m_AlNCq65xs?*ju-s4w*<{zcg>QY+fAJfO=f3pLXHYrQeJ(oA zc7!VccJn_N!|H){iJpt7%UW?P)P)XJQI2z zoSK6YoX}3E$+J1CNxgegq4BYiLwKZSsHKeV z!s{{y>?)B(UrxR$axmzJqr?jA$B!ul#<|L+j|?r%1aB zG}7z)5qF+L$GpLv=JoDzwbPM)AF|KXee6~3QxpR2KK4t!>|l@bT&1zLxeBJc#}&PY zB23FbkNECUOO%h8`%nx08J9@eLZ!tY&=D743)k%;}$Xqh;V7- zdEo>AQ>@I3BooR|HJvX6=aBP2&cB7&u*&Jf%Pv`iQ8=ou2;Omk6;sQYcQT<2<__;x zhL`I7z-d1yy#}yq~M^Z zl*k4I&&$l1$s?cH(K}G z5tt-AWTB79}K*rc(K=WZ%(&hf&aOyE~xD=$Hddr#eDaN7 zo{?ru-9c{9Yn^3q18Fw7|5~zrkP}!B!Ocd;LC+|pJmR1yy@hnD=ufR~7PI2(sEj&5 ziQ5GOfhozD5$Sd+cWeZ-lHMX;S;{`9JO6h4fiM^d%I-@JccaZu<2d)lzK!iG> ze;GfYkf$P{Jod9n7Vl|dhEcIS4cM4b8h%gr7(+8q^2evRpJ+%6$r19fb_O4>fAAot#lB4#_<&jg?>(9C{IIP zm-ES^2*D3&!KSdzz{A!iUFgRh;t}~WUe^s&$+NI6+9i>D+Xe7e9XO3 za|}FX@HUxhgb?Fl>a|sb&Q%Q7hSeYg><~JjM76&DIYkg$TKol2sA4ZGtWo5Lr=Ap+ zh7_cb6QsOwT&)g*&2hsi9ElpVq(-?tCwUnn^%^d$J(qaI;g4l?0i_~X!Pb@=k zKRjUU;~PO`{1(w*U=~@QuP^0-H-xF8?0G z!vq|X?{5n^)}cCQCE1k*hg9hj#2-3Zl(7;fe}~Bk6B(13?wMkm(h#mP9A!kFGY<^- zMR?B0HY{*WJcFz8Mc#uW4;h(CA2K$TL8Kbdszb)7a)%R+c{u6lhXwqmFzXHQ{1_q@ z8frQDt}92pCnw)<9XJ&Z&Q93#En7)Sc=pk-XjkJ=G)jLA7#=*v0ATCZS^ zZf`=i9^lH>iPnXlA%5C3?oT{O;hL9Ee~2re<`H#AbcWBcb_07Vw4Mnj_X=zkzhVnY zcp`wtFL33UaXg>eo8~ho^S;KO90yp;1hb6Y0G5T`)ZKJVg9kZ{_G5_R=MclsBX&R0 zn|8AAXAft3Gxz7PqJIvKBQt<8?SBj=dy@!P01Ls1`zM_oT4!Y3X9mc{H=uX*34Uvo5Jk5>y0yWc0(_SMciZcy&$O0=tFT zPU}|7+i!Je1J6^(RO2AM510R^=mT{wW$G&GN5;Jw-tL~c7N)_W;A^z)HsmK!s*pGyOOc;(=D$!Jx z$~U=x+BhJa}hlb;Foyx2hJ8UK^i0`nF(WmdT_CprmV=*i;1k+iH z%m13SU$Xcc6yan90UXC|#88l+c*rjDA6OSqBdz#bD02AIW$N2{9!&EHDHg*tz#jul zGg8;{|B<_-pFy~BGB=Yuna}5P`Alv)m&;}HbGbS2Xfihco7}hNG7@bc7EFjbyzKWgalQTKK z^z>y!R>?i-+%hDfd|fF^b8SdBoI~`56xNJOUdO9JTN0bw>`fUOW|V4CIFq8B-dQ+l zJMu`XEpaDzCMq1%=e9o8X literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/__pycache__/ssl_.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/ssl_.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..23bfb88e3b4343721e46bea8b431ab1ba22df459 GIT binary patch literal 11256 zcmd5?+ix7#d7sx1W|_FA(>f1M+lM~12nwkvQ1~Ax`dFYqfj$=~ig^nP6j1w8AVASNh1K78&dlzT zmYdfuIcLtC`Of{j{J!r@SSsZe{7V1){d#FZQT~M-zPG;!B!y0{xPL)eeyNdoUivIpy(shaA3@EM+QIrJ5-$@ELV<EZkjwAvfB>+XeGd8qvtP;a_6E$E9x|3~U! zA*u0VZCX;gUweFGS8-qZ3-yUwtB7@b8THQB&Wn1JNxd7g-nSL^75CMT757zd2K#b8 zX~S|aV#jW}m)y&^-*R7bU&sCSi00mOueet~R%^2(+H?Q%?k)G4TL#6O?i=oP)VkwN zyEkyZ>)v)N?hM|1-PJaf^6XRM?Xnt=IonYfbhu~x&34FmwXDUthW9A&cMju`PAkcl z^;mDZcVZ)IIJe>~(%X0LK7}MGWg|Yn(u%x#hk0v(!*@c~e9vJmzqK2mTVvs)!;N~w zYkCh_QKwBkcy2tgQC)f0k0Q{dq~^xP{UydihB4`p|LCboZENxQch=_@mhLZYY}hMn z-@j|mFD|av?DeHMhsQUOS?-z*&f7D$D!0n|Qwz18UZdn~By}2K`pY0=;DT@~(IOJA zaJ8o#t4P&j^#XE78rQfk%5*9_))ti?=6|3a=|@IS>*+mXURhO+v=63wnyc>7LTcT= z%3Js?gw3|YJc}QMmh10&5s$2J$MQbtIDr*-tzF)*{FYS@TM>6!+~R)ItK>!1&4$;n z((FXs+V-d_KWuwe#M#XDA@`z+AYJ!(hqWSWlXX1H2hDI*hu0g^meX>rWhaQx2Hvs* zKSDn=LMB$!h;{6EtYb*A-u2t@2sQ68<{XwYvFgO?cARBi)CqWO1l|shGtA#@@Xr+X zGS=+#Z_My!d#3HTZ*Yh0di=(lANY5?{n`3V;BU{g4|yYO&2(6Rr`eef_k)=z3hYYz zFn+}rlSe96%9g8SZ#(rpVvAR3TTCQpaxbc*s;RP9@eq%mBnL;77M9jGvGLz~u(H0i z7#9wh)3&3qzUOi9PVV0Ph7I;Ywg{HmWKJuh=IMEDeRXqnVfDVfd4B`XWBq3k?%$q8 z(Nw<(B=*Anm8I$?Sbt)5&91K63#;$0t%DO+R;zJA7Kxg}53^;>$GBBWD5sH-6(#ZJ z%EEV-HhnT9pR04_(Qa{RVe#J5_4%cZZ!f&t9hFZD_vZ0``(`&k^sY$x{+j|(rqxCU zSu-u~W@TYFzrHb_66TV8H+#{kKDd7$cTe1ni|;Pp=^7UoH)vV%nA1Yo;@%@($0Sbt zbUeL{EBXc!PpPS{0>h`e8dQw#>aKyi0h5z;b5J!IGFd3ex}$EvEutjnW*{?T>;|fz z5Karp|oL9k!D;CX;$QOB87EA$%w0&Q%+&ohq$>hH8j%<5)W*}^Y%~_3nh+P65NpS#ZTl^s+xG9{DH=zTRkNC@ zA{BpmwL3Lf`ASM%rzKB+l<%(+H6d3CstKz^^Z!hR{$_XZhS4IHbw(RCC^$W+u^@C@ zF8Py0RTs+iBee%?gy$(d zYxJD#Sog-lJQN`F>O5q=7g?>4TYY0eS~Cn>k6CL%xkTM7MDB3sH_%}rW-%02L{c`y zLd4m+BeoCsw!<6rOf8*Wma}5E30DMR-4T57Cuk_5*0QRJjibwW*0oMA(&=hn&F2I- z6F$e@u{k_`rn0Z&hOyJe)rykM?5N{&@AN1Ok;mfDBbnYTEZrojlTaQh)P*7D`HI{S_vINO0&u{IkhYcp@(Yr$3~Cd1lcVUw)nj=$Ss zzz5Wn<+LGPZRR`N3l4>aYdVKk-RZ!}k!*r<1s&?O&>0D>#Y1ZceO0XY!wyJWR;Rto z92XWkw7@#v0XQlVRkF5{x#%U}&_1Xzx{9?NGOHQFtotp(HG&VOt;q8%!W_}uOls;X z%yV4WTQ{sn6+fKuS^y-s?^YhoIPSjFs(bE@PUP%*l?HDHm!W@d97v25m9s)rrHm58 z#v?Q(n|U8Zae<6yGDOkKLxS3MH2)5j8W3JV?74 zk0ni~Dv}XCinDuYb2mE0ccPUicpqIrVyK#`WsUzf@`ft^G&TGAIr9V;4x4DbT7{0P zE|*PGiKLHhJI>prd^-W$Jrj> zJt;7rLoM?OAx8t~5ckI;sGH&WUZ!UpYtbFh8${0wz09%tM5;Zqf!XdaC2l0s6cLu& z^&tt?4tU;U;B{a`@Ea@_SQ#jf^kLw8uHbin$A?Zz@#7qTrvsq@*UX7F1s=syLS{LU zB`{-Alvmp%uTi?*zV^z~VXUM>mhUcZX;qSOZsRcd-H$Yw1xNVvP)`KVw_`MJ8Y7p z#*$_>tDT% zqzA6TN9WAis)j9Z3zEQKvJxpg@F34L1q^|#suPguIg~Szn;=Hr zpUGe!B*uaT#l-s?GQ1IT64f{(23O9oi(sHQ@550iuN5MuV-#@?(&TW?*iF3tOoPFK z)9GV7@E)$?Y380l8QD~cGs&*~BkBnVY!(bPuNA@1qhvia=Hbm(@-zD(-j?;QB_Fw4TOu6nDVgOztDeJx}*f(B;EIPg?~Fw+pZ~Xk|}}7I^Vt$<_BVtjb3}QCx%M z9j&UY>SjJs?6E&kfaJ(mGhx4yT5PMQ;@vpx7XpB-th~!IK7m$D=#PCq`Ecs-8FvJB zG1JSi{T{V<_7l<Z0LF9kPMYR?-k@cXDgDwqzS& zD}{Ztl{c?ftQFW#QTc|o=tqQ7BZ8Itx2MHzRt8rnAORjBA1@)^@JJaDFTzj?I|bNH zW0R=LN-(-?8+wT}1mZFc(m`H}`bpbQb%z_yB|{-wE--NdkSi2Zv1F{yqO}uaAgW|? z);C3QI`yPlI`wPi)AW_Z%eAh2)A}(rSQ$h%X62Am1nq`{)gBCeXg#cJQD-~iKF1)j zzgt^F5tFSg(KF01%4t<+u?x3-1Km2n#_vGeATXj6%$?+V)!H%p{(z)U`v{O(6ck1mA1G7QzN#E>M{r zOjHbpKtzh`gr`YJknE52r;>S+f$R@Xio!{IlNiaQ`-BAsoo@)+1#_MbI-#ImJUCs0 z<&+XU#51?Iwx&;YJ;YFWd7{P%29fe5hdUfGBb`7ymM)eIy$nYCoIB4-C6Oaz6s?^j zF-|Ip;;M{A=}*ZTJSBJgslc66ZG@ui2COCm>3g2-ba-R4j@KuCL^_2lBD=(4FyNjj zP~a3pDY;PkGUk&+QP>QqmJv7*=8YbNW%~>v(L^&yODBxnIalg8M16)MV@m*fA_hCE zY0vT*(-(7nD{_3}vSMD#B z&q)961PaO$4tj*@^%9cwH;D|zi)g6PJJ_e5c~t6^1V$)vrI&^OnRB&Ib(9*>RBr@V zfz5PBdZovR()31pg(tc=gnHEg2I2aSc34rBqfu4q8t?^1ML70d(2}wN(SG-4c zugxv8Ri^?Y2>!rCCIXe<0U0mGc?J_WN39;|ldxe@7W zKuWZ>iD87MvdOOl5_Sg@TNS4mIE74Kr3Z(}SqAMJ;vnp>jR?z$_L7qjTR7VNsrB1S z9Mb=LvDTK}B{@PMM_6V7cJbVAjRuwY0&+2^GYl0GEf0|;f8!$imjHhP`LtC_BIr4JSmpF?>+!~Mcq3KlDQD0+o#RPGM-q% z>7j*=Qtal&lN5?~f_BSJ;cDc32t7XEvhHneu5AcPf|;;Z5Ee)_3Es4|-9dx}Y(jE= zZ9@W?DruG#_}mivl_BojYmrAnGsDp(4Tw%r`r&rSBU&K|1t6vUNbuqyj!u0f{tDV4 z4~HZOadRIrGDe3pqTwO^F&yHNv3L>IlYp0E@Ax7BG4#}X_9pn^IX|{5v}-b$92h{WS6PlRS2xyH*EiV`^}9?7eT0N4C28v+ zdqJOW1m#JbMB)^DDEcoDjW`3N8A_Bx(SLcYkQgze;r~Ft)oTb3Iah!5h2b={2_e*q4tcx z)0qs8+Hl-9ssfm5c?ySqNKi?8HkvU3oU~^q0y8*>$Ql1-6f}ZU&x}m*nW3_uqgiUd z|D!x1YXPJPA9CfP8kHz4!wKk=ddg!2N)Xskc!p;m=X%N$wSAtOGIvaeU0U~F7onZ% zaQk7*Avsc$_ie2V+*GhYuv+gB_+9deiBc}-`I?>_MyO}%jtw>sr^n(~%I-=?4e=`zioT%>m_tQYv+-PB zyP%4)6MLoO9eola_G%Lu09^`NYk&AP3Q*(YoUtPfA!}`4Vd4ubS2wV^$AFlwv7vlm zzK3t``XxAaxuryx57ZQ1f=V96ypirEj$s_3&`GXOXm#2`Xw*uqvUp^vy0HHK+UC+? zb#ob$G(x!c_)Nr1HA1ZJ;Nux=#pzl97<2e1n)NwkisBGiQ^)^D)3q=1&y4K&=SG$h z&54jAaciGrNv3-m&d}kgrRVB6x+S2EdC~gdL|H%95xm#gOFfkia_Q*yQ+%w1!zw&I zAr987-J8Nrw1ieqA`E>PDWES|gsTwMt4Y|K{Rn;IB>gqq82KXcYj&dXp#ui6*oJ)} z`>>%=jCtELE=sa-$>ygk!ffoHX2Q*&N|d1ql9#6Y;OB4!Pw$xN1g?dm)O8pOANtF zgls7xhds_qX8^V}lBcUQbD@akfs)zA2TVBGjS>-or!1IXNQ3lk#e!X?#){DHYwxeF zEmZ+W*hkdTPbgWVguZu@zUu?Z-K69qC6|!I1y~P!$CMZjEH_U-ZIZ6^6`~aW^fk&2 z{AF^LW8-1yx7Y`i&B_ybadaf&?QEASkjE*sr4U2Gg<`dbSXk_q@O;g;`RjO`HAOCU=9Gj@&cj zL+#g^Nwjq8r5P7Q4*4&%%((bc3^ZrqH9ym)==qGMePPa;FPrDJiTpEd4`$&xfB9dT JJ7#IL@V}|;AhG}e literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/__pycache__/ssl_match_hostname.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/ssl_match_hostname.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..992f2ce4d7c49a3fc33402c4ce34115eb9d0e4a5 GIT binary patch literal 3218 zcmZ`*U2ojR73B=cUG8cn%Yy6Fjf)Ok*!8N?u5HCmV6;U9TMpDDl4Ch8syHPm&a6a> zOVTs5ws%1lMeG7CivEU5k9q3fDdx3Le(hs`);&XN71?M>a5x`#=H9t;?>Upt&bA#q zv;TM$|Ngw={L?m0KLHva<5Lm^ceWi)I8Dhmss41EP8wCs-FAQDWHX*4yz%?Qu`j3F z?r)upJa@Re?SJBMkNdA2?u*7tce}~Y@Fovlk?nxDc>9&J-QqL6gMXXP@;UrxINfr( z^OIjc+!JgV>3A>P%azWep}5**gHaaiB+uAD=0kRWtoKk~>ET^sLMf5yBud%yJ(01I zO0r$Hwe?x=HTK|aOqwgbo4sqj>#=Q~eh3;L<5L|J!oen;ZORGEpl1G#kUAM8aiqnX zl)2pKx+VxiYfl)Ob{GzGK1yx96NXPmQCg3D>&OOHtBUXL_4Tmm7fG?KBe^T|@&`|o zo8s9@+)tC8eo^hBKawe0EB%p9(!Nq@`1a;|#aL3T_ycRGhazx1QuVyH_Qx)Y>0{5< zYQKX|{R_pebKsVa!kKM3rE`cgIwA*N>2ddhbKv8TGx{S%y;1sygf}qSESn|W_v95# zc~fKdOY$DRZ%Elx*RY0nV42#X}1}k zJ*|t|{l3ogRP_>}2fbYG_V@HK?aM)Ir~UMJ)^a_|PP%7EPufF}Hf=TxS)43k1w?N) zX3vw9$C2cUB^isq4<>eZV~g2Xxy>g2SHJ6h{qu?UB3oXb(8r5)$0Dk$_z{0FK3Kc6y0vEfD(JdxLwRO`Y2umLVe}$A*@^LrNGszPR*eZ#G0;P# zsA)+tjFODQmewiZfsA&Iiz(k{glxi5W-jEJs?w#>dI5cE35Dl-#3OAlARW@C0ik}I zcyBy^o&RAODfN5`o!gA-$BhQ zkp$f3-e27Vj3Z$DjV^g@v&i_7ij%}Nl$J@X0Rn-@;@rj$d}%R2b$!!LfG_ZL28X(k zL@`#T^GrwudV;c>m%p=n6#($eIR0@={A-UE;Q*mJa}odF$R zoO0O#1(%&gzdv58`!twv#Dy1i5p;4=!CxaEo$R` z{zPv8y?;K@_p0XSw=}A!xo(&4OTt?~`@iWK-YyBBIqc|JJ%@gv@qnJMkpD!E%D+Rd zQ$NNI}z?Fp%(oVkG?bhKe6qXchaSBe0Jyv1*jgPK>gmC320AH;o!Oe)exP4xy+ugW&# zf|n+3xM#Hn3)4K7GHuYtFwZJcn^}`9(<5M)g4MM5+ANp^v z(E%9-WPvnJ{%u14;E{P3{cam$woSk5H0>%2gue0Kbi8wzZ`YLfprA{t3re?RnqkQE zI1J@kbjw9sScjRJ^(t6m)xxKCXeq2__uv=x&G=WA bkkv&Lo)h?B^W&|+KzH5+%iju`oz8y&CDvVF literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/__pycache__/ssltransport.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/ssltransport.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..c62254bbaa162c2c9fb0cd3166bcb24523d155ab GIT binary patch literal 7356 zcmbVR&2QYs73bG-xztLLC0mK}Nykp?O>8NjO`4>R?L-kbOFd!u-C)K+kf{_V2=&j%Id@AT4t>3BJZJDEel6sCsCTJcoZRQay0X-s2! zs5gu?Lsd{W!cxOrGf^+CmETgB$;vkrR=%#SSxjA4YSt~xr7YaiP}bCZYEi`3c9#7* zZ}9h`q}6Q3BIOKU^dz_z5P6>l^k2PY{R^#Jp`~CM>YC0CTFedQy1G`Xl-MhhxVmOC zi&btYYh`A$5j-tcWutgj*sJV5Hhx20v)OBGf=!|}!oJ52vm>Zg*;zKl?niADwFlTy z)W#|Xd!0SR9!C8>_6U0vvy8LHn1kmbc8)#Hj^oP&JHehn%Orb}oy7AnJH={v9$`}U`QnQ3qJ*U7T~rmtc5toKxzqo}*%n?ialFXk*McMsqAN}k`&W62Cg$)Y_1426 zsdL!{106q(BJQU_98KGD#y8?96`t5}(%4ztN$YWRGI4@NGsJd9sYgAXc!P*8%ZX1r z0VWT_csp@+;ua0_>s}Da$r`ON4KUPMxwza%DnYL+Jgsvv?aZf`zv+oI@LQoL!X2lT z@QqgJ1RHX`h;xSSa=P9!&S#=&#i8!_B*tN1^F(mgtUP4 z1?!&fc05&cw(Egk$0CT4o_#yen?j$Q=i2XoyUDyQF9@N*oF#d1S;j)m z$jfyv@zPWX1ACY2iyu5EXglFxM*0N(r6R}`{^#6G+Gx%+gXWpk6Hv-CFMJZb$hV&N zXTo58rYS98rX@nWJwMY*gK!3uz(NX3oNn&qC)_PB449X4w{LzITjr)=;sy~tra&v1 zKw;aas^Mqc)=E?w|876qZ^6^wWVVGBzl6EE7uD&O8v8aXsd7`@gVwrQucl`P-i=H} zS<19cGgCG-+o!53;aLO>Gcm3Mg~7CRT_FXdJc`EdhN=2qNF zuf$Y4OgbfalDNXVa)mRO#~Vp*77Gw2*vCr}#_OATRqjX-yI~wR^D2woI{aW#_pb6< zDK`=xZiqvS2QMqTNC zi^f$^V0V>01^WuB;wT!h1tmX>6JFCK?Ob(-$%Apk5iouM{lB8=s_H&giyi~SiB0NF ztbRpi2DOqZ*(I$>vFGMS5b`J%fFi@Ji(_b;rSUY8t+pozm@Wq1QXog4th;+ron$M8 z++`a|ukAsdyKIlS(p!;Ss`K}PJlv(6Y&JYn<=vE5RtXC=tS%=FB>s)%Vw#mGvK zrt%~0sIsT-mhq+hlClf0Og)lER$;FOe%EzXiN>E*l9#vPo9Xuf?*6Z2*Te7Vzu4cO z`t+nf{SBp`@Q6Y0a`i&3Bqg8Q4e6k_0=}IazL%th!oipUPFFRw}v;W+@bjaq$@)wZIhu+p|sQqD!WdC-L$l6cHT7cL1rbZSk;L1gZ8olDjc)( zv~;ta+4yOD`tC?HiS`I>mTb|`Vq=Yh)`-?hw>7gwmW?bcXtT2s*bb~}&)BWP@mJlE ztcoqIda$4(X(Ig5OKs|D+VsN!A(Rj|G6rA+3NA8XDq;co-WaHsNASBIBY^Yv%F1F7 z7&U-Jyel%NV$L>qIw?yR`yxT=Bq&69r4DqCzg7f*n6`jmIncX@?5K$cfK(Iq1c1BI zK~zAPch*EHkCQZDjXmN>wj!d9pwI+70_cwm++U=93^{?HhC6qV*I6B!B3?m}tJ}G{ z-hMKOB!ES-#JKZ>a84Bo#c5~zw6k91cF51gtKD(pH5#nkqKLO}>o%?;cpYm+J%Pa| zaIXPzwvd1!n^_McB$c%)5FSqpLm}XmTSXR0P|pQU6C6-Z3*vn8&Dpv0?_FGRFT6K5 zH@oC6&#%qqV;5v>=4@$o(F;W1JGO=Qy|0qtiF|YgnaTX6RU|q{_;Q07tc@1IVxFj1 ziuFo-$$>O!Z*vpTKNd+|j`(&ML_9B(9n%-+sN8;l1j!B>ylt8^*HIBN{uq=E4H5BbNgyeFy@->`@wo+QqPYAT))%3Qh-^nHM%A7pD$s?8o7Ogns~{zwQw} zJ|NM9r@4oP9O=yv{l9g5gf;x8w~ogTUPu2d_pppHB%A`$CT}=NyIU9K!i7zfb?vw6+=jbPg9bjnF0)*H6<*y?Qhn3d zIi(_zP?4-=`X*A3P4lWIj$^mV;`l1k2ZpboB9U8GKJV1G)otZVtw_#*<9k6tW?6## zH{$j3MVW8rCAg9(&PUPU&MqxoT5@ME&B^1FF5;yuvG(}SnBgjo4 z$Z4AOnfBlIp#BeL>jTP2K$!$0PdWaK3guo*L)N8>kMJzDO%lsblwD(0iH<=q2!A^> z5Dflb(LS7+n>Zoc)Nvad+LkIF&rIayXx%MI5ox>Tr)E^bOn8!bAimN~bC2*c1PNSP zCbiGd19V0Xr;^$-vnz|scptf0EyhG8`8G;tGMS#386ET+?X!zq zQ0S2-^z$>996GuJf=ahJ@MrfpY^Hk}CL!aU)9vY%g}K_8+$zB#4zYnECx71Aqt){Z zEAG3T+?oVN6R0Ei zgMQd1U=vQ?Y_taMb%B$#nnGUrk$Bf%`d*ITt!l30Vb0OHGw^B)0^L z7jV_oxx%g=rK3MOn{?gWc3nWdR!H@#>wePm!p@hn>$2FVX8eBz|Hmkf(FGw7@cL*sHAdppnAwnC1Fo2-&EGSe8ic^Aug&^N8KBj{Fm>{Pj z&wvWEC8HRYZ3%634wAfv!ooqKX4|SZW#6_YE#1;>`jza8ZEIz;ouL+LAN<*RwIXPy zT1Ai>D)dD92Af~=d6WJ_l*kkJ+-iFMRmzOyQM|ZH-Dzmw!sI&T;f(cKA>Ol;RupG5 M#pw*;UTs4E9|`~F{r~^~ literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/__pycache__/timeout.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/timeout.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..9715f199a066e0b01239f3b07cc391b935f4d477 GIT binary patch literal 8898 zcmd5?%X8bt83#a$qG&z*ijz(=nN3nx;#8(wJ8oJg&cv}DH#3gxj+JCa7ZL=PB5V*~ z7NBHuG(AK<^wR&Jhh(Nb1|{aDmDtr{>TaIn5}G|2)%nwbKy%scA9Rn;`g#N z9_PFh4M(ZSH}UNG&aK;b-nn+WbK~Z_*FLzt)!BOQ{hN0_*!t2_droadL!OTFd%2(U zn?j_bSQw^Bnx{z=1O&MJso>^qe6xqRaA(^M9T4DdS9o=MF7$Yf*ZP&P5>_9%+wBb+& zIqRnaccV0o+iF*<1z;h+(2LXHLA%XHlYEdSY7Rhi#WHr)fM3JW2@mqCms%Isnc#kS z_4U@pro;g22YEii;=4HDeLwMcxLDI5uIgXARPbz+CK<L!mIMIz+=q&hUeaf45P|x1*n>tY@n|(- zeiBM8GVIG(lz?zx_=e;MX_%R_;PxVL3n~ug5tm53L^z9iKPN3sZXxkqo&d(c&si_c2e1vZ!*G%i^c6kK7dUgogQy?zaGgn8A_OhCXV^r@W&^k^ zplOyHdi>ES24ro}#JC&EZlyAi*z{C8pNv4WWHK>qo%Q3?#}81VWrt*;DJn~Yv!VYm z8jgp|AEsk)Anhv-u0;vBiXCCrB-ZZvk#QOt3>=On*H>Jng+8_kVm-#$I0!h%V0VU* z(r#&hMzfhD*Lb9|G>-CK%Ql;2ke=~j>ue;_9t>#0x&(J8#$9Y?EpCRlL=apX&s(F3 zoqSU}m%$F6lEZ7IVrL^z$CL|DljY2rtXl!EwJ#BtQSOiUC!AB&PvChV76 zTX*qT#n+NIc^4aXJY8pZrQ)w2pYf&1U(@%jus!Qj$?QjZV(U92(YModQ>@WU{o{7HeAs!z^d zv0S^443P+qX2|_)4ChaH&>+C575 z0!q0p{zT8ZbjnC!1tX26v`|yTUfJ{W0LuIdkeA9wR1(r!gi+abbo$JtIK}BS-+{toZl32==l| ze+_qfa!Wb4mRSD^_SsWUI?5jA*&wBhl%^xXWmZ z=hoe-{HuLcrb8_YDp+DZG$w9JI)0DAKIj-bVjkGL_ejR>*vU@r6IB?A)BAXudstOD z@Wc=EYUmxfpSaUnKDX~4xUTb&lbotLc`dK@y~!olp+Bsu>|;;gI|mMZ;_f-q6+o^& zaK+o0n=8+Kgfs6!5%b#QS5MpBtoeV00Im;s@BliG1l`&^rB5R2!8pnAq{5X9Q&%8( zJmzh9AmyqgSlhJ!fB5DhbWKvw(K0CDp!umK1i=qoWC_nom1iE7!~Xft>y zB=6vm&yw+wizv_>h=ByL6d;igd_0B&%TtRGAvNV9mBj>kN?B_dCr-I-&ZS2^Tyo5C z*___cW<}WyIboD)KI*G9<~UPI0fku3hGPmJn3F(t4P#1}*7Pj{MebndGgKoPe%2X8 zPo#bGenI9t4X>#hMau)}IpApLKoT$;M(~3tmAAu30H6L7WwHlI)^Ns(8d5h!Y@f58vz^T;HaySu-0EYmy6B$7$a8D1_Zat&y;@z}d*0V{UtL=KhlkaA{_E)vtRKXohun8S z%`@|%u?-*Ogy0Tcav#5?=A7sMiwqV{4~7Yy<9nuQr0Q{GYkbEKkX33vO9D%l`=qT( zJ3^O)$~Aa;cykJ*q`b&Z$V3e&m2X)c))8l|iA+H@7=qokrcP8%XwJ0h1`=Vil6DaL zS=R1qW^^sMw0B=6d-6)jSqX?2o0HN0HYP`B#r8yST2nQ%t%&8^PA16Vn zg(v-iZlEZT$}JqvH(E^}-3%}rj@l=sYiPUJ3K^L_Q8VimC@5u5q~)U)THM=$JVE>E zY-)NkXv^^3bj3Ur1dm?APcg3t#pNJ1i>1AC8(Z4S9>!vAC>c6M>PWF#hMo)8wv^*SwQxIk1$ zrN*vU$X%6MxER*}r3zXbe{1uqeE#rHM9>!yTM9vJ+Er2J6RRyw(ow7DM*n@WW z(DB`pqqmxTQ-hH3sF$N!k24+`pCdhlwX5$_w5TQ+)JZnHbiYeU%Sbs{r6h%lPbKIX za+}lkb)TjQhStQxunt2~)w6~oenb*K&bZD3oDpuvp!R2yG8G7ox{C6PmFbIH$~0QX zZFoZ56>OF!*v7z$yH0)+H2|)%3OGX}d_B|w=kN>R=Tzm;Gv`2s`InU{NRi7JP9{Q4 zgS~;Q(e)b*!xG9}i4jP_OFAH53E0LrUe9D`#_Xc0K#gol0&N^4%~Hq6*0wRtwS?+) z0~wJXduXX?EbFfElP6p4yRKek84xqU8m%jL*4vc++uWdaB+2WVwAJe9Cfq5>OS#h* zFe)nOC>$&C6|Fp`X8tQyD`7Wk?m4gKE_>7Gjj)fbeL~JPY?gBV4F)7N>1x+$L~?}N zr7>!LGb%l;kPe8KXdZG$-G_=#?)$X%85{vUKfs^V7X|m4nwM~|(T?(Zy^^%1;{OgY z;1&#JCeB$eYxa)ksD>b4LhX_vchlLP^rFV~=(dw)NlDQt?X#kw?v3i?Kt0Gw8;LW# za6zCK5#m4$&uw?0bfRuVOZ5Vgs3GeswF$LOQEe6S5l=$ui0PJ}?blggw3<t~5_UDX!r&01Zm=~p7$ z+Qx@eNE*97UQosmzYlBq?>su#b!>>SJR;OgyK(}Zlm45c6T+306C|gSvYF9u%7U>u zudJ2~R&`}4GQ)KJhhmMM;U6E4ciW4kS;m6@j#U}8jOwSo$0*Fcu2;N&H>%!Ojrp4U zqI=Fg>(;#KS!2`Xt<5unGTNfi=?v3w9HU26EOt6nrmK!oG2iKgX@HIpxpW~heV#_A z>2i+tVg)*>*my#gG!%~0P*#oN6~wEijlwQB!Z! zBo#$tmY%6JsHWs2h_YfH5sv(?IFCD(r5=M{QGZi$>@5T+CnLcvI(2Wcy6Dxa%hj`$ F{{Xy=EkXbQ literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/__pycache__/url.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/url.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..e4a2627b46ea1cf896cfb0444d462553bb461e11 GIT binary patch literal 10630 zcmbtaTWlNId7d*f91bZ;mStPAy}RD=+OkAjqHM{xRo3>(lDu|m%Z@I)Sz2Ct#50m8 zjY#^;(6;DdvW*-h0h$15g9g2V%9|0OeJfBD=v!Y3^rcV5y!4?jU7&C2Lo1+hzyAzL zQBt-EP|9=W%(?vM_W$31IWBc}CKdcT|K-#C-(ORdf1{7~pMj5$@pwB-QMkgHt8B0= zW0Y52HLK#Sx!Q)F)lsJNm>b(LvWCnXZhXVcnoLEVEo8V?P>8SM%p4evDl*}cO z>y)_;M_uc}bLh6Rt!BG=w(O!@D2v0q2}Ea9iQ$R@rSOJLnAZ0Y12@BA<5B zJWZv#l0Bcj@QK3D^9!#Pe!{f=PNa8)^opM;Hk?qmEBD;v|FJ#1JTZLd;_!!0UX9kOr@k1x zHIB0C#BlaW<8zmPf9 zEYe4#^w#*9!3@=(t-eQN${Ac58mld4(yzv9yWiDr%43e0>62HNhA!8tz3A|2)p=Qq z(%@C0{QPn)omN8)rCFUm)2cX(Eev(n8yih0s(t9wKZxqIH=cfVwbnlb^d&E)I>NR?hE0KdNcWcI03`qT1@$ zTw<%kz`+hQ^|lTT%I6L?q^)RcD6`e~54NM-Y_+RSP28TGn!fYN-Fx5sz55Sl9zOck z?A-jqr=NZM^Q^s;=g#uVYGG~N-6)pI&xGe!p1*jxS-p5^bnNn#tJki7n8}@99R5yK z!!SE6$OA50KavR@&m5ApN%98g+4b{xWki8Vt zSSCByM*NNPNV!lR_HD7^_`{c<6|OkX$MPd?VQHki>93ZGBNgG|Yiy+A7hL+tlsCiV zM{dFM^QDdQ&8wjHE1JwvMV!QIho!5Xm~a2+m7qV3%;V~jC&511N?)j|i;t^%`qtu; z>S=29#p2_|C;j6jC<;^4hn@ZE*Kgmx-C={Ey!hlSNpQax z$bU2w2&s#fdv0Jbeg4AGH*V}O9Mi`;Y-ESs%409~{OGXg z=ebB6CCj)1O~6Zs_Xkog4i zDc&jbN#4Z|0b@IUKp36^&K?f61>sizDQV$1W&5_}`J$5dE5fmsOTrRPSvVdru~1yG z?4osde*TfQFnd2^EqD&MY|paM2F;7sbK9-RPLkI6a;2Cbe_AFu&Ve!kkmD9%v1MbhVo7Y+ZlM|xMXOCJmZX-bU*7hd;X)Bp@d|$7xntS+d`WPcmS3`F z?@U@_A6~zjksTxl&*V+Hr%^(AvOF|A-V~A`COU#x9Tvtm^Ex;SVtq<27GUQqOdJVV zooy>M=BvIIC|hb>50rofYM=#r5DSbTzHMUn)ERLGw9>IK=|N04nX<_yq574nYd7St+V4CTY@9)t>nh zQ^xVg6Zi!(fwCB{v6@=bYI-eJGiq_1hKVzvvp5z|PLn5L2C6K3A7v`n8)bknv>QN~ zhSM?wU4D-RCXe|_pl?N|Xa+G^{tdK?$##bPo<=((FdDStvg{$s;z7JoMq+5%KLq1Q z(I*(2EES(S!ncSYv3r0Ao47dHYB0ZA@GQb7G8ipywN!DrwNV0dLl|7g^DI%S6!|dt zr5p)C1I;q+a5ldh!4nM`K_IXT<5(N^Cg9AsmK@7@Y3F@+GeSK`0RbiH4GdWW70(d_CgWwmBBX>)6O4Af9=E$jP!AHnDOfuCB<8k+?f`w*1(}MQ`N9B z;sZ#JI86y*%?>*QgG&Plr4tfqeg`E$VC3!-XaTob*}~%y{hlK_Gqn_S06p~A-FQc3 zfT#EZBpr12hg*ZdJ)l5Hlz@HsMoKG zI(&TGx|A8c5{c?3u!@R+x=77Q>k0;2!FPnc?(=%t&tmT;3KQ4xUEGyIQ=$i zaJ2SQYaa}hXG%pU9nE$w4?Ol@78M;^0PiL67AqS|j%aPXmq8D#n>)5EZEKetE9*cj zc>*(nBvf2R@)hL(9r|*i$kRs1ywH#bdYJ?qaJNMTh z=#fLF_W(U$J(`e=ZWU6()Gxc$Bs-;wd#K)tRs7}Q>v;|N=8x=*mVNNg_#oD;D8dL} z#rR4cHVwo<@zpvsKi6KPep_8sYYK!$sq5spY^x9)7}E6^H@4ZjT8sI{mQpkPIFI|V z5VqKs3h}yDi^JH4rsrm#Lc&lp{X}4Hv04Jg`^RJ%tgGHPg9J}Nm|zvuliM)TpHtol zOjr@dv!TF1_|NcDL1K%+C6Yo_*SD2=Cr2o--nEV3**0T}Y?%zyZL-2Ts>_cYk%xjE zc8d8D$I04odhS_d9^=rVcHcBMSFlC(A;g)S=irUfKxBg1zIM2^bL z0ZgW?p2H)}dqNlTPskS`<1k_hgl}RiFi;Sls+2JRSR*FIaQ~5;AG!9%61Q*uD-k4I z>r$!%xoAnbLJ>AZf#>q8Q0bYE$lP?jo5)0c#5d7C?DQ%KrL6#KNaOyBII%zC%n4+_ z`VxsCfJ`3}gq2|j+%ve2Ip2Bdhsj6Nvy;;^^SRk+I0u!bVrWEThp{}M#t#!qn?B@4 z*qdQY*u@nm)L_+w8WcORIPE;Ty!4$SkAhUO>N4yXai2y^hKbg3gq^laPFG_!p()3~ zp@fGUClIX~C0>|-5uc-xy|Aa?<@Pjicz8IPBSX%5rdztzWnyT@exsh$U;Oot3$U*0f|R`Z^$xLHIvzeD)=wzNT#ZdWHRYE9AMHhp#cfO z35Hs^R2JmZg$DWYh`!>Oc;qtcYo$UltxIn#G(AU#VS#fHF&N2Vyiu}$+fU>o8#YHK z9t;XU*X;VA7{@z>1l!I`)l^laDW+?Hx-Wb66iY(&W4k>x*`x9a+sM0{#N+)tl0Xpx zo{HkLHFZlBoj$7r$q3^RP1Auk!jEBNs6@qfKJnvqQ-0w{#OHxlPtaBa0pUGCxg&fa zu?${KJ;|}1*kbrPI52u^JVH97hC5T5&raA=41ONr0y z;YY#|;zx;6WOg-!i`XQ##iHP%JSYHD3fie?H-rPOY9HDoK4LF92h3X1M?(M@@eVT8 zGr3kkC?_rNHh^k|7exUr5y46pJTR1R7xPX7g_a6MTWse1&9W0F8;}IEC_FmzaQ4B( z{d?Jo+xMq)bCY+cA571Mo%bGndNnsOH8q+x-c$M9$TSo;jTqJufs%+1?-`o;r9qxbfYde#xjlt7c%t0DLB z-f>J?@}7w}o#Z{Ptm_f~!Ik+Is`1L=C3-0#UX2pzA`rig(oPc5<4VMSdL7*2RuVw#&aSh z(yDhK?J=C9D6F$(r<8AWd?)JEIp{UiDWiid#M7DOeWxHGG(q(r=K3KRnLmFf>k;Haz~!=}Qg zYzE}Wo2)41bI{brw&KU1D=?f@F&uqkn>8^HHDq$w0*hMBtR-s6z$}k*l?-aoBtw{J zsbyya2XrC%Vq$Le%nUdi+55{#0MtKT>x|EIutus;N z@pa~TekWq*?0c{snmNBK=m?-jYaJNl`++XL?;j$Azouh6-S0*XOn&hb82CRyNz6Zt zk{C*U9vI^1C^7sVlo$Y`BLJf#{?TQ1^Op@!Iacq*IDjpvRn-6>%_%RSD80Xnf{WhY zkfH^{{VmsPdJ(&ZQTw3SkF6btV*dxcPy9$JYIvXgks@zd=sv})bpl;FF>8ht?g!Ei zq$#{HbEGku8suR7I8N?^eGMLByJ(dJNZ5K-y&KYc2e^K@hL^l1Ys8v`M1IXXd8W(1VWH)p^3IJBbr|~ zBBG8uAOp?ka{d|OAlGGO2zRhUE5An4H>s4Gwg@k43d$J1Nu$CiAQT|<}-zp}{uue!# z#E-J-sn$O4YW}7xi>89Sg7iDlU0x!x8%dLV7sa80$UsxAh(AP$RK9{PT*9OPVILQk zr6R(XcOTBp=N>(rm0D<(>bn+TKi-?U^RS_OG+b9iTAU0v>79r_qTJ79>pQa(pFALs zTAG_-@>9BUl?p!Wn($#};I1J0mbQWT33c71t_kwUr9mtxE-GFjNq5PhDh!iS1z`%} zaT${i6ZHRNN&;7aZEBA+R@k{~mD5!iX|RwXh)XP&BesqVU3nw*Cp3;UHGWPxGP=S< zYo8y`?iW#}_flw9#-P;W>?qUW7walTv3nY^DT+!Z;lf2F@Ri}X(HHfJ9vxAuqwu2j zINfdOYDzbmp{7(-Gw@A@O!PMXTfD)Ldo(d|K+AZc3p#T4ppkH~xW>vR^e-GgJW(W8 ztzMRZHr0y3%A0WOz;!o(&O>m6H*Ta4fiV1A8a;~p%jh=k6TG5pc!jLI-?A|A-!7!{ z^H;Q2O!^9i*q1AGU5`jOEhSWi6L#cFuItF_El<$m;03+RJ7wZS zPx2Sy?6~x`R~#?0A`ujEb2eDWix@Xfs-@sMg4{gur$i#YFmrG6;S~I#sfY6u_wS28 zqf%3PJFuU^_}%Gm=O|;4qO#%M-=7;Br4n(BT6W}~+oB-d@-}RlS1^G&n)>TQO zqv?JTy{&ebOa^jFUk|yN}(u43XiGkI>ji!{45#Mck~4Lcf{`cv3Frq xLQwG4qxL{dPU2A!;h;a`e~!i|uOp;H{$LmD)yyZ!Gv){8Df4}^$4sW|{{@*wkSYKG literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/__pycache__/wait.cpython-310.pyc b/_vendor/urllib3/util/__pycache__/wait.cpython-310.pyc new file mode 100644 index 0000000000000000000000000000000000000000..e22f39ea5068f16907a06bcdf0a6f6ddfcf8c1bb GIT binary patch literal 3050 zcmc&$TW=gS6t+E{%Wjj+wn;B(0S!e+3~CcZ3j)zrMW{iQ&;~Vuh!tWqS$mU7W@k1Y zZ_&>&v&U-$uNUU{L3rc%a;cn*RiiAc7{OUG=n0jn3K(dX`u{-sY6-dZ1Z}-E-OwB`YMI z;zYW`fD(LQj>DXdbDxlu?vOPi>>p^`d!GnLxcfx7vbJZn>ymAp5#FY)?uweI@00dK z%Eg&V5?92eXzbJWBuG=D2~tCx73W~pl$aJX&^N_-abcfCXT@{kqPPSr&Ve*5E`u~J z=n@H@e+nlet$>zpKTEX{P5#vM?&j(ak&%Gp-75)GH3iSNsRI68E>^I!cqv{-Vr@n<2Au-Ljz6GHG zs0KvUG*EDlj#z4Ix(A~d$%xg+u3g!(LY4?8nrUl;ciHeBB_j(cd9|=MY+=n3?QFQ4 zmU`t8DHy(giHs=hY;6*CLs%$R`)@M!j)1upASv|L=hjxE>UV&$0dJL7oOYKL`ZMrK zyPIT@RtQ_^E-qEnaB`W*jxKF!n8Lw1xlz)rZQr}!T7D34)r42nS$xkEK%gW}Wl7~2 zat5AxSd?Fd#-nvwXHcM@VNL9rM>(A^)%$||zR*GVjtjzwzBEt@5DJ=m1y7j|Lq@sXo>;S|;$`_vk_BX3mGcH#D4D?F$* zq(s14f4trs?$xHIUbQ6DvjzoO0s9AVmTlff)7s zG8GDWqAp^CR4MstmL);GCF!qC0~&)&{gn#Z)9snyWkJ-fz>5q<#14l1|BzrtEfe*G-Lj7aq%Ej?7iY;~go%Y?Hl zvJi(QZi|OSVCr=DWwUk+y}4US)`^n*&fL*kfu~-8cZ^R<=flMhKDgg1UF;V>S~j_% z^psqSa}D9+<4SaV;HVc-#yC(fVPj&4_o94L&7p4c;x&|vku(2h%qK8?%9WKPJqV!* zt6{4fFyDcCQjmRE7onQWcN{uE^W7KH%&#bOU2YBH?I@9{_M`16PNLOB231x)WNH@P zE}hLCOa$Ykn@I-%@EB-4ctN4p)SJ+pvIu=zgZduS{3bNJlbSrC2jET33bH{VO9EY1 z;3_s5(bAX?XRAvXavEDACXX4mEG!3h6K329_0}nraB>psew}=YGZCtZ^PK< zP|f}9I1cdHp`10SnK^Ysq3y?M^*21M#<;@Uggpk#18euo6}V?}AASx@vIBH{o%yTs zA8tS{^do;Q-j=CfWtq9U59NW>1C{1Jrbj>S`g&a+&HHg~HbZ7z^I_)&2&$7cM;EUz zANFG!9f1dRv zu*jTM-9qU$Hm5nOTp0Tv$M0Z+T3{_KwA2(zGYWHLm6)u2n3uKgAnjG==Acn)TcJE4gPw73z){tWnt)AQ4s^fFwB5$ z40^_7W4y^`-mU6?@D7H5j=}1gtUEy&YeM#FLX>${)2d&FUjn;+u|Dn1c-)(;Pc_`X E0UIcw;{X5v literal 0 HcmV?d00001 diff --git a/_vendor/urllib3/util/connection.py b/_vendor/urllib3/util/connection.py new file mode 100644 index 0000000..6af1138 --- /dev/null +++ b/_vendor/urllib3/util/connection.py @@ -0,0 +1,149 @@ +from __future__ import absolute_import + +import socket + +from ..contrib import _appengine_environ +from ..exceptions import LocationParseError +from ..packages import six +from .wait import NoWayToWaitForSocketError, wait_for_read + + +def is_connection_dropped(conn): # Platform-specific + """ + Returns True if the connection is dropped and should be closed. + + :param conn: + :class:`http.client.HTTPConnection` object. + + Note: For platforms like AppEngine, this will always return ``False`` to + let the platform handle connection recycling transparently for us. + """ + sock = getattr(conn, "sock", False) + if sock is False: # Platform-specific: AppEngine + return False + if sock is None: # Connection already closed (such as by httplib). + return True + try: + # Returns True if readable, which here means it's been dropped + return wait_for_read(sock, timeout=0.0) + except NoWayToWaitForSocketError: # Platform-specific: AppEngine + return False + + +# This function is copied from socket.py in the Python 2.7 standard +# library test suite. Added to its signature is only `socket_options`. +# One additional modification is that we avoid binding to IPv6 servers +# discovered in DNS if the system doesn't have IPv6 functionality. +def create_connection( + address, + timeout=socket._GLOBAL_DEFAULT_TIMEOUT, + source_address=None, + socket_options=None, +): + """Connect to *address* and return the socket object. + + Convenience function. Connect to *address* (a 2-tuple ``(host, + port)``) and return the socket object. Passing the optional + *timeout* parameter will set the timeout on the socket instance + before attempting to connect. If no *timeout* is supplied, the + global default timeout setting returned by :func:`socket.getdefaulttimeout` + is used. If *source_address* is set it must be a tuple of (host, port) + for the socket to bind as a source address before making the connection. + An host of '' or port 0 tells the OS to use the default. + """ + + host, port = address + if host.startswith("["): + host = host.strip("[]") + err = None + + # Using the value from allowed_gai_family() in the context of getaddrinfo lets + # us select whether to work with IPv4 DNS records, IPv6 records, or both. + # The original create_connection function always returns all records. + family = allowed_gai_family() + + try: + host.encode("idna") + except UnicodeError: + return six.raise_from( + LocationParseError(u"'%s', label empty or too long" % host), None + ) + + for res in socket.getaddrinfo(host, port, family, socket.SOCK_STREAM): + af, socktype, proto, canonname, sa = res + sock = None + try: + sock = socket.socket(af, socktype, proto) + + # If provided, set socket level options before connecting. + _set_socket_options(sock, socket_options) + + if timeout is not socket._GLOBAL_DEFAULT_TIMEOUT: + sock.settimeout(timeout) + if source_address: + sock.bind(source_address) + sock.connect(sa) + return sock + + except socket.error as e: + err = e + if sock is not None: + sock.close() + sock = None + + if err is not None: + raise err + + raise socket.error("getaddrinfo returns an empty list") + + +def _set_socket_options(sock, options): + if options is None: + return + + for opt in options: + sock.setsockopt(*opt) + + +def allowed_gai_family(): + """This function is designed to work in the context of + getaddrinfo, where family=socket.AF_UNSPEC is the default and + will perform a DNS search for both IPv6 and IPv4 records.""" + + family = socket.AF_INET + if HAS_IPV6: + family = socket.AF_UNSPEC + return family + + +def _has_ipv6(host): + """Returns True if the system can bind an IPv6 address.""" + sock = None + has_ipv6 = False + + # App Engine doesn't support IPV6 sockets and actually has a quota on the + # number of sockets that can be used, so just early out here instead of + # creating a socket needlessly. + # See https://github.com/urllib3/urllib3/issues/1446 + if _appengine_environ.is_appengine_sandbox(): + return False + + if socket.has_ipv6: + # has_ipv6 returns true if cPython was compiled with IPv6 support. + # It does not tell us if the system has IPv6 support enabled. To + # determine that we must bind to an IPv6 address. + # https://github.com/urllib3/urllib3/pull/611 + # https://bugs.python.org/issue658327 + try: + sock = socket.socket(socket.AF_INET6) + sock.bind((host, 0)) + has_ipv6 = True + except Exception: + pass + + if sock: + sock.close() + return has_ipv6 + + +HAS_IPV6 = _has_ipv6("::1") diff --git a/_vendor/urllib3/util/proxy.py b/_vendor/urllib3/util/proxy.py new file mode 100644 index 0000000..2199cc7 --- /dev/null +++ b/_vendor/urllib3/util/proxy.py @@ -0,0 +1,57 @@ +from .ssl_ import create_urllib3_context, resolve_cert_reqs, resolve_ssl_version + + +def connection_requires_http_tunnel( + proxy_url=None, proxy_config=None, destination_scheme=None +): + """ + Returns True if the connection requires an HTTP CONNECT through the proxy. + + :param URL proxy_url: + URL of the proxy. + :param ProxyConfig proxy_config: + Proxy configuration from poolmanager.py + :param str destination_scheme: + The scheme of the destination. (i.e https, http, etc) + """ + # If we're not using a proxy, no way to use a tunnel. + if proxy_url is None: + return False + + # HTTP destinations never require tunneling, we always forward. + if destination_scheme == "http": + return False + + # Support for forwarding with HTTPS proxies and HTTPS destinations. + if ( + proxy_url.scheme == "https" + and proxy_config + and proxy_config.use_forwarding_for_https + ): + return False + + # Otherwise always use a tunnel. + return True + + +def create_proxy_ssl_context( + ssl_version, cert_reqs, ca_certs=None, ca_cert_dir=None, ca_cert_data=None +): + """ + Generates a default proxy ssl context if one hasn't been provided by the + user. + """ + ssl_context = create_urllib3_context( + ssl_version=resolve_ssl_version(ssl_version), + cert_reqs=resolve_cert_reqs(cert_reqs), + ) + + if ( + not ca_certs + and not ca_cert_dir + and not ca_cert_data + and hasattr(ssl_context, "load_default_certs") + ): + ssl_context.load_default_certs() + + return ssl_context diff --git a/_vendor/urllib3/util/queue.py b/_vendor/urllib3/util/queue.py new file mode 100644 index 0000000..4178410 --- /dev/null +++ b/_vendor/urllib3/util/queue.py @@ -0,0 +1,22 @@ +import collections + +from ..packages import six +from ..packages.six.moves import queue + +if six.PY2: + # Queue is imported for side effects on MS Windows. See issue #229. + import Queue as _unused_module_Queue # noqa: F401 + + +class LifoQueue(queue.Queue): + def _init(self, _): + self.queue = collections.deque() + + def _qsize(self, len=len): + return len(self.queue) + + def _put(self, item): + self.queue.append(item) + + def _get(self): + return self.queue.pop() diff --git a/_vendor/urllib3/util/request.py b/_vendor/urllib3/util/request.py new file mode 100644 index 0000000..b574b08 --- /dev/null +++ b/_vendor/urllib3/util/request.py @@ -0,0 +1,146 @@ +from __future__ import absolute_import + +from base64 import b64encode + +from ..exceptions import UnrewindableBodyError +from ..packages.six import b, integer_types + +# Pass as a value within ``headers`` to skip +# emitting some HTTP headers that are added automatically. +# The only headers that are supported are ``Accept-Encoding``, +# ``Host``, and ``User-Agent``. +SKIP_HEADER = "@@@SKIP_HEADER@@@" +SKIPPABLE_HEADERS = frozenset(["accept-encoding", "host", "user-agent"]) + +ACCEPT_ENCODING = "gzip,deflate" +try: + try: + import brotlicffi as _unused_module_brotli # noqa: F401 + except ImportError: + import brotli as _unused_module_brotli # noqa: F401 +except ImportError: + pass +else: + ACCEPT_ENCODING += ",br" + +_FAILEDTELL = object() + + +def make_headers( + keep_alive=None, + accept_encoding=None, + user_agent=None, + basic_auth=None, + proxy_basic_auth=None, + disable_cache=None, +): + """ + Shortcuts for generating request headers. + + :param keep_alive: + If ``True``, adds 'connection: keep-alive' header. + + :param accept_encoding: + Can be a boolean, list, or string. + ``True`` translates to 'gzip,deflate'. + List will get joined by comma. + String will be used as provided. + + :param user_agent: + String representing the user-agent you want, such as + "python-urllib3/0.6" + + :param basic_auth: + Colon-separated username:password string for 'authorization: basic ...' + auth header. + + :param proxy_basic_auth: + Colon-separated username:password string for 'proxy-authorization: basic ...' + auth header. + + :param disable_cache: + If ``True``, adds 'cache-control: no-cache' header. + + Example:: + + >>> make_headers(keep_alive=True, user_agent="Batman/1.0") + {'connection': 'keep-alive', 'user-agent': 'Batman/1.0'} + >>> make_headers(accept_encoding=True) + {'accept-encoding': 'gzip,deflate'} + """ + headers = {} + if accept_encoding: + if isinstance(accept_encoding, str): + pass + elif isinstance(accept_encoding, list): + accept_encoding = ",".join(accept_encoding) + else: + accept_encoding = ACCEPT_ENCODING + headers["accept-encoding"] = accept_encoding + + if user_agent: + headers["user-agent"] = user_agent + + if keep_alive: + headers["connection"] = "keep-alive" + + if basic_auth: + headers["authorization"] = "Basic " + b64encode(b(basic_auth)).decode("utf-8") + + if proxy_basic_auth: + headers["proxy-authorization"] = "Basic " + b64encode( + b(proxy_basic_auth) + ).decode("utf-8") + + if disable_cache: + headers["cache-control"] = "no-cache" + + return headers + + +def set_file_position(body, pos): + """ + If a position is provided, move file to that point. + Otherwise, we'll attempt to record a position for future use. + """ + if pos is not None: + rewind_body(body, pos) + elif getattr(body, "tell", None) is not None: + try: + pos = body.tell() + except (IOError, OSError): + # This differentiates from None, allowing us to catch + # a failed `tell()` later when trying to rewind the body. + pos = _FAILEDTELL + + return pos + + +def rewind_body(body, body_pos): + """ + Attempt to rewind body to a certain position. + Primarily used for request redirects and retries. + + :param body: + File-like object that supports seek. + + :param int pos: + Position to seek to in file. + """ + body_seek = getattr(body, "seek", None) + if body_seek is not None and isinstance(body_pos, integer_types): + try: + body_seek(body_pos) + except (IOError, OSError): + raise UnrewindableBodyError( + "An error occurred when rewinding request body for redirect/retry." + ) + elif body_pos is _FAILEDTELL: + raise UnrewindableBodyError( + "Unable to record file position for rewinding " + "request body during a redirect/retry." + ) + else: + raise ValueError( + "body_pos must be of type integer, instead it was %s." % type(body_pos) + ) diff --git a/_vendor/urllib3/util/response.py b/_vendor/urllib3/util/response.py new file mode 100644 index 0000000..5ea609c --- /dev/null +++ b/_vendor/urllib3/util/response.py @@ -0,0 +1,107 @@ +from __future__ import absolute_import + +from email.errors import MultipartInvariantViolationDefect, StartBoundaryNotFoundDefect + +from ..exceptions import HeaderParsingError +from ..packages.six.moves import http_client as httplib + + +def is_fp_closed(obj): + """ + Checks whether a given file-like object is closed. + + :param obj: + The file-like object to check. + """ + + try: + # Check `isclosed()` first, in case Python3 doesn't set `closed`. + # GH Issue #928 + return obj.isclosed() + except AttributeError: + pass + + try: + # Check via the official file-like-object way. + return obj.closed + except AttributeError: + pass + + try: + # Check if the object is a container for another file-like object that + # gets released on exhaustion (e.g. HTTPResponse). + return obj.fp is None + except AttributeError: + pass + + raise ValueError("Unable to determine whether fp is closed.") + + +def assert_header_parsing(headers): + """ + Asserts whether all headers have been successfully parsed. + Extracts encountered errors from the result of parsing headers. + + Only works on Python 3. + + :param http.client.HTTPMessage headers: Headers to verify. + + :raises urllib3.exceptions.HeaderParsingError: + If parsing errors are found. + """ + + # This will fail silently if we pass in the wrong kind of parameter. + # To make debugging easier add an explicit check. + if not isinstance(headers, httplib.HTTPMessage): + raise TypeError("expected httplib.Message, got {0}.".format(type(headers))) + + defects = getattr(headers, "defects", None) + get_payload = getattr(headers, "get_payload", None) + + unparsed_data = None + if get_payload: + # get_payload is actually email.message.Message.get_payload; + # we're only interested in the result if it's not a multipart message + if not headers.is_multipart(): + payload = get_payload() + + if isinstance(payload, (bytes, str)): + unparsed_data = payload + if defects: + # httplib is assuming a response body is available + # when parsing headers even when httplib only sends + # header data to parse_headers() This results in + # defects on multipart responses in particular. + # See: https://github.com/urllib3/urllib3/issues/800 + + # So we ignore the following defects: + # - StartBoundaryNotFoundDefect: + # The claimed start boundary was never found. + # - MultipartInvariantViolationDefect: + # A message claimed to be a multipart but no subparts were found. + defects = [ + defect + for defect in defects + if not isinstance( + defect, (StartBoundaryNotFoundDefect, MultipartInvariantViolationDefect) + ) + ] + + if defects or unparsed_data: + raise HeaderParsingError(defects=defects, unparsed_data=unparsed_data) + + +def is_response_to_head(response): + """ + Checks whether the request of a response has been a HEAD-request. + Handles the quirks of AppEngine. + + :param http.client.HTTPResponse response: + Response to check if the originating request + used 'HEAD' as a method. + """ + # FIXME: Can we do this somehow without accessing private httplib _method? + method = response._method + if isinstance(method, int): # Platform-specific: Appengine + return method == 3 + return method.upper() == "HEAD" diff --git a/_vendor/urllib3/util/retry.py b/_vendor/urllib3/util/retry.py new file mode 100644 index 0000000..3398323 --- /dev/null +++ b/_vendor/urllib3/util/retry.py @@ -0,0 +1,620 @@ +from __future__ import absolute_import + +import email +import logging +import re +import time +import warnings +from collections import namedtuple +from itertools import takewhile + +from ..exceptions import ( + ConnectTimeoutError, + InvalidHeader, + MaxRetryError, + ProtocolError, + ProxyError, + ReadTimeoutError, + ResponseError, +) +from ..packages import six + +log = logging.getLogger(__name__) + + +# Data structure for representing the metadata of requests that result in a retry. +RequestHistory = namedtuple( + "RequestHistory", ["method", "url", "error", "status", "redirect_location"] +) + + +# TODO: In v2 we can remove this sentinel and metaclass with deprecated options. +_Default = object() + + +class _RetryMeta(type): + @property + def DEFAULT_METHOD_WHITELIST(cls): + warnings.warn( + "Using 'Retry.DEFAULT_METHOD_WHITELIST' is deprecated and " + "will be removed in v2.0. Use 'Retry.DEFAULT_ALLOWED_METHODS' instead", + DeprecationWarning, + ) + return cls.DEFAULT_ALLOWED_METHODS + + @DEFAULT_METHOD_WHITELIST.setter + def DEFAULT_METHOD_WHITELIST(cls, value): + warnings.warn( + "Using 'Retry.DEFAULT_METHOD_WHITELIST' is deprecated and " + "will be removed in v2.0. Use 'Retry.DEFAULT_ALLOWED_METHODS' instead", + DeprecationWarning, + ) + cls.DEFAULT_ALLOWED_METHODS = value + + @property + def DEFAULT_REDIRECT_HEADERS_BLACKLIST(cls): + warnings.warn( + "Using 'Retry.DEFAULT_REDIRECT_HEADERS_BLACKLIST' is deprecated and " + "will be removed in v2.0. Use 'Retry.DEFAULT_REMOVE_HEADERS_ON_REDIRECT' instead", + DeprecationWarning, + ) + return cls.DEFAULT_REMOVE_HEADERS_ON_REDIRECT + + @DEFAULT_REDIRECT_HEADERS_BLACKLIST.setter + def DEFAULT_REDIRECT_HEADERS_BLACKLIST(cls, value): + warnings.warn( + "Using 'Retry.DEFAULT_REDIRECT_HEADERS_BLACKLIST' is deprecated and " + "will be removed in v2.0. Use 'Retry.DEFAULT_REMOVE_HEADERS_ON_REDIRECT' instead", + DeprecationWarning, + ) + cls.DEFAULT_REMOVE_HEADERS_ON_REDIRECT = value + + @property + def BACKOFF_MAX(cls): + warnings.warn( + "Using 'Retry.BACKOFF_MAX' is deprecated and " + "will be removed in v2.0. Use 'Retry.DEFAULT_BACKOFF_MAX' instead", + DeprecationWarning, + ) + return cls.DEFAULT_BACKOFF_MAX + + @BACKOFF_MAX.setter + def BACKOFF_MAX(cls, value): + warnings.warn( + "Using 'Retry.BACKOFF_MAX' is deprecated and " + "will be removed in v2.0. Use 'Retry.DEFAULT_BACKOFF_MAX' instead", + DeprecationWarning, + ) + cls.DEFAULT_BACKOFF_MAX = value + + +@six.add_metaclass(_RetryMeta) +class Retry(object): + """Retry configuration. + + Each retry attempt will create a new Retry object with updated values, so + they can be safely reused. + + Retries can be defined as a default for a pool:: + + retries = Retry(connect=5, read=2, redirect=5) + http = PoolManager(retries=retries) + response = http.request('GET', 'http://example.com/') + + Or per-request (which overrides the default for the pool):: + + response = http.request('GET', 'http://example.com/', retries=Retry(10)) + + Retries can be disabled by passing ``False``:: + + response = http.request('GET', 'http://example.com/', retries=False) + + Errors will be wrapped in :class:`~urllib3.exceptions.MaxRetryError` unless + retries are disabled, in which case the causing exception will be raised. + + :param int total: + Total number of retries to allow. Takes precedence over other counts. + + Set to ``None`` to remove this constraint and fall back on other + counts. + + Set to ``0`` to fail on the first retry. + + Set to ``False`` to disable and imply ``raise_on_redirect=False``. + + :param int connect: + How many connection-related errors to retry on. + + These are errors raised before the request is sent to the remote server, + which we assume has not triggered the server to process the request. + + Set to ``0`` to fail on the first retry of this type. + + :param int read: + How many times to retry on read errors. + + These errors are raised after the request was sent to the server, so the + request may have side-effects. + + Set to ``0`` to fail on the first retry of this type. + + :param int redirect: + How many redirects to perform. Limit this to avoid infinite redirect + loops. + + A redirect is a HTTP response with a status code 301, 302, 303, 307 or + 308. + + Set to ``0`` to fail on the first retry of this type. + + Set to ``False`` to disable and imply ``raise_on_redirect=False``. + + :param int status: + How many times to retry on bad status codes. + + These are retries made on responses, where status code matches + ``status_forcelist``. + + Set to ``0`` to fail on the first retry of this type. + + :param int other: + How many times to retry on other errors. + + Other errors are errors that are not connect, read, redirect or status errors. + These errors might be raised after the request was sent to the server, so the + request might have side-effects. + + Set to ``0`` to fail on the first retry of this type. + + If ``total`` is not set, it's a good idea to set this to 0 to account + for unexpected edge cases and avoid infinite retry loops. + + :param iterable allowed_methods: + Set of uppercased HTTP method verbs that we should retry on. + + By default, we only retry on methods which are considered to be + idempotent (multiple requests with the same parameters end with the + same state). See :attr:`Retry.DEFAULT_ALLOWED_METHODS`. + + Set to a ``False`` value to retry on any verb. + + .. warning:: + + Previously this parameter was named ``method_whitelist``, that + usage is deprecated in v1.26.0 and will be removed in v2.0. + + :param iterable status_forcelist: + A set of integer HTTP status codes that we should force a retry on. + A retry is initiated if the request method is in ``allowed_methods`` + and the response status code is in ``status_forcelist``. + + By default, this is disabled with ``None``. + + :param float backoff_factor: + A backoff factor to apply between attempts after the second try + (most errors are resolved immediately by a second try without a + delay). urllib3 will sleep for:: + + {backoff factor} * (2 ** ({number of total retries} - 1)) + + seconds. If the backoff_factor is 0.1, then :func:`.sleep` will sleep + for [0.0s, 0.2s, 0.4s, ...] between retries. It will never be longer + than :attr:`Retry.DEFAULT_BACKOFF_MAX`. + + By default, backoff is disabled (set to 0). + + :param bool raise_on_redirect: Whether, if the number of redirects is + exhausted, to raise a MaxRetryError, or to return a response with a + response code in the 3xx range. + + :param bool raise_on_status: Similar meaning to ``raise_on_redirect``: + whether we should raise an exception, or return a response, + if status falls in ``status_forcelist`` range and retries have + been exhausted. + + :param tuple history: The history of the request encountered during + each call to :meth:`~Retry.increment`. The list is in the order + the requests occurred. Each list item is of class :class:`RequestHistory`. + + :param bool respect_retry_after_header: + Whether to respect Retry-After header on status codes defined as + :attr:`Retry.RETRY_AFTER_STATUS_CODES` or not. + + :param iterable remove_headers_on_redirect: + Sequence of headers to remove from the request when a response + indicating a redirect is returned before firing off the redirected + request. + """ + + #: Default methods to be used for ``allowed_methods`` + DEFAULT_ALLOWED_METHODS = frozenset( + ["HEAD", "GET", "PUT", "DELETE", "OPTIONS", "TRACE"] + ) + + #: Default status codes to be used for ``status_forcelist`` + RETRY_AFTER_STATUS_CODES = frozenset([413, 429, 503]) + + #: Default headers to be used for ``remove_headers_on_redirect`` + DEFAULT_REMOVE_HEADERS_ON_REDIRECT = frozenset(["Authorization"]) + + #: Maximum backoff time. + DEFAULT_BACKOFF_MAX = 120 + + def __init__( + self, + total=10, + connect=None, + read=None, + redirect=None, + status=None, + other=None, + allowed_methods=_Default, + status_forcelist=None, + backoff_factor=0, + raise_on_redirect=True, + raise_on_status=True, + history=None, + respect_retry_after_header=True, + remove_headers_on_redirect=_Default, + # TODO: Deprecated, remove in v2.0 + method_whitelist=_Default, + ): + + if method_whitelist is not _Default: + if allowed_methods is not _Default: + raise ValueError( + "Using both 'allowed_methods' and " + "'method_whitelist' together is not allowed. " + "Instead only use 'allowed_methods'" + ) + warnings.warn( + "Using 'method_whitelist' with Retry is deprecated and " + "will be removed in v2.0. Use 'allowed_methods' instead", + DeprecationWarning, + stacklevel=2, + ) + allowed_methods = method_whitelist + if allowed_methods is _Default: + allowed_methods = self.DEFAULT_ALLOWED_METHODS + if remove_headers_on_redirect is _Default: + remove_headers_on_redirect = self.DEFAULT_REMOVE_HEADERS_ON_REDIRECT + + self.total = total + self.connect = connect + self.read = read + self.status = status + self.other = other + + if redirect is False or total is False: + redirect = 0 + raise_on_redirect = False + + self.redirect = redirect + self.status_forcelist = status_forcelist or set() + self.allowed_methods = allowed_methods + self.backoff_factor = backoff_factor + self.raise_on_redirect = raise_on_redirect + self.raise_on_status = raise_on_status + self.history = history or tuple() + self.respect_retry_after_header = respect_retry_after_header + self.remove_headers_on_redirect = frozenset( + [h.lower() for h in remove_headers_on_redirect] + ) + + def new(self, **kw): + params = dict( + total=self.total, + connect=self.connect, + read=self.read, + redirect=self.redirect, + status=self.status, + other=self.other, + status_forcelist=self.status_forcelist, + backoff_factor=self.backoff_factor, + raise_on_redirect=self.raise_on_redirect, + raise_on_status=self.raise_on_status, + history=self.history, + remove_headers_on_redirect=self.remove_headers_on_redirect, + respect_retry_after_header=self.respect_retry_after_header, + ) + + # TODO: If already given in **kw we use what's given to us + # If not given we need to figure out what to pass. We decide + # based on whether our class has the 'method_whitelist' property + # and if so we pass the deprecated 'method_whitelist' otherwise + # we use 'allowed_methods'. Remove in v2.0 + if "method_whitelist" not in kw and "allowed_methods" not in kw: + if "method_whitelist" in self.__dict__: + warnings.warn( + "Using 'method_whitelist' with Retry is deprecated and " + "will be removed in v2.0. Use 'allowed_methods' instead", + DeprecationWarning, + ) + params["method_whitelist"] = self.allowed_methods + else: + params["allowed_methods"] = self.allowed_methods + + params.update(kw) + return type(self)(**params) + + @classmethod + def from_int(cls, retries, redirect=True, default=None): + """Backwards-compatibility for the old retries format.""" + if retries is None: + retries = default if default is not None else cls.DEFAULT + + if isinstance(retries, Retry): + return retries + + redirect = bool(redirect) and None + new_retries = cls(retries, redirect=redirect) + log.debug("Converted retries value: %r -> %r", retries, new_retries) + return new_retries + + def get_backoff_time(self): + """Formula for computing the current backoff + + :rtype: float + """ + # We want to consider only the last consecutive errors sequence (Ignore redirects). + consecutive_errors_len = len( + list( + takewhile(lambda x: x.redirect_location is None, reversed(self.history)) + ) + ) + if consecutive_errors_len <= 1: + return 0 + + backoff_value = self.backoff_factor * (2 ** (consecutive_errors_len - 1)) + return min(self.DEFAULT_BACKOFF_MAX, backoff_value) + + def parse_retry_after(self, retry_after): + # Whitespace: https://tools.ietf.org/html/rfc7230#section-3.2.4 + if re.match(r"^\s*[0-9]+\s*$", retry_after): + seconds = int(retry_after) + else: + retry_date_tuple = email.utils.parsedate_tz(retry_after) + if retry_date_tuple is None: + raise InvalidHeader("Invalid Retry-After header: %s" % retry_after) + if retry_date_tuple[9] is None: # Python 2 + # Assume UTC if no timezone was specified + # On Python2.7, parsedate_tz returns None for a timezone offset + # instead of 0 if no timezone is given, where mktime_tz treats + # a None timezone offset as local time. + retry_date_tuple = retry_date_tuple[:9] + (0,) + retry_date_tuple[10:] + + retry_date = email.utils.mktime_tz(retry_date_tuple) + seconds = retry_date - time.time() + + if seconds < 0: + seconds = 0 + + return seconds + + def get_retry_after(self, response): + """Get the value of Retry-After in seconds.""" + + retry_after = response.getheader("Retry-After") + + if retry_after is None: + return None + + return self.parse_retry_after(retry_after) + + def sleep_for_retry(self, response=None): + retry_after = self.get_retry_after(response) + if retry_after: + time.sleep(retry_after) + return True + + return False + + def _sleep_backoff(self): + backoff = self.get_backoff_time() + if backoff <= 0: + return + time.sleep(backoff) + + def sleep(self, response=None): + """Sleep between retry attempts. + + This method will respect a server's ``Retry-After`` response header + and sleep the duration of the time requested. If that is not present, it + will use an exponential backoff. By default, the backoff factor is 0 and + this method will return immediately. + """ + + if self.respect_retry_after_header and response: + slept = self.sleep_for_retry(response) + if slept: + return + + self._sleep_backoff() + + def _is_connection_error(self, err): + """Errors when we're fairly sure that the server did not receive the + request, so it should be safe to retry. + """ + if isinstance(err, ProxyError): + err = err.original_error + return isinstance(err, ConnectTimeoutError) + + def _is_read_error(self, err): + """Errors that occur after the request has been started, so we should + assume that the server began processing it. + """ + return isinstance(err, (ReadTimeoutError, ProtocolError)) + + def _is_method_retryable(self, method): + """Checks if a given HTTP method should be retried upon, depending if + it is included in the allowed_methods + """ + # TODO: For now favor if the Retry implementation sets its own method_whitelist + # property outside of our constructor to avoid breaking custom implementations. + if "method_whitelist" in self.__dict__: + warnings.warn( + "Using 'method_whitelist' with Retry is deprecated and " + "will be removed in v2.0. Use 'allowed_methods' instead", + DeprecationWarning, + ) + allowed_methods = self.method_whitelist + else: + allowed_methods = self.allowed_methods + + if allowed_methods and method.upper() not in allowed_methods: + return False + return True + + def is_retry(self, method, status_code, has_retry_after=False): + """Is this method/status code retryable? (Based on allowlists and control + variables such as the number of total retries to allow, whether to + respect the Retry-After header, whether this header is present, and + whether the returned status code is on the list of status codes to + be retried upon on the presence of the aforementioned header) + """ + if not self._is_method_retryable(method): + return False + + if self.status_forcelist and status_code in self.status_forcelist: + return True + + return ( + self.total + and self.respect_retry_after_header + and has_retry_after + and (status_code in self.RETRY_AFTER_STATUS_CODES) + ) + + def is_exhausted(self): + """Are we out of retries?""" + retry_counts = ( + self.total, + self.connect, + self.read, + self.redirect, + self.status, + self.other, + ) + retry_counts = list(filter(None, retry_counts)) + if not retry_counts: + return False + + return min(retry_counts) < 0 + + def increment( + self, + method=None, + url=None, + response=None, + error=None, + _pool=None, + _stacktrace=None, + ): + """Return a new Retry object with incremented retry counters. + + :param response: A response object, or None, if the server did not + return a response. + :type response: :class:`~urllib3.response.HTTPResponse` + :param Exception error: An error encountered during the request, or + None if the response was received successfully. + + :return: A new ``Retry`` object. + """ + if self.total is False and error: + # Disabled, indicate to re-raise the error. + raise six.reraise(type(error), error, _stacktrace) + + total = self.total + if total is not None: + total -= 1 + + connect = self.connect + read = self.read + redirect = self.redirect + status_count = self.status + other = self.other + cause = "unknown" + status = None + redirect_location = None + + if error and self._is_connection_error(error): + # Connect retry? + if connect is False: + raise six.reraise(type(error), error, _stacktrace) + elif connect is not None: + connect -= 1 + + elif error and self._is_read_error(error): + # Read retry? + if read is False or not self._is_method_retryable(method): + raise six.reraise(type(error), error, _stacktrace) + elif read is not None: + read -= 1 + + elif error: + # Other retry? + if other is not None: + other -= 1 + + elif response and response.get_redirect_location(): + # Redirect retry? + if redirect is not None: + redirect -= 1 + cause = "too many redirects" + redirect_location = response.get_redirect_location() + status = response.status + + else: + # Incrementing because of a server error like a 500 in + # status_forcelist and the given method is in the allowed_methods + cause = ResponseError.GENERIC_ERROR + if response and response.status: + if status_count is not None: + status_count -= 1 + cause = ResponseError.SPECIFIC_ERROR.format(status_code=response.status) + status = response.status + + history = self.history + ( + RequestHistory(method, url, error, status, redirect_location), + ) + + new_retry = self.new( + total=total, + connect=connect, + read=read, + redirect=redirect, + status=status_count, + other=other, + history=history, + ) + + if new_retry.is_exhausted(): + raise MaxRetryError(_pool, url, error or ResponseError(cause)) + + log.debug("Incremented Retry for (url='%s'): %r", url, new_retry) + + return new_retry + + def __repr__(self): + return ( + "{cls.__name__}(total={self.total}, connect={self.connect}, " + "read={self.read}, redirect={self.redirect}, status={self.status})" + ).format(cls=type(self), self=self) + + def __getattr__(self, item): + if item == "method_whitelist": + # TODO: Remove this deprecated alias in v2.0 + warnings.warn( + "Using 'method_whitelist' with Retry is deprecated and " + "will be removed in v2.0. Use 'allowed_methods' instead", + DeprecationWarning, + ) + return self.allowed_methods + try: + return getattr(super(Retry, self), item) + except AttributeError: + return getattr(Retry, item) + + +# For backwards compatibility (equivalent to pre-v1.9): +Retry.DEFAULT = Retry(3) diff --git a/_vendor/urllib3/util/ssl_.py b/_vendor/urllib3/util/ssl_.py new file mode 100644 index 0000000..8f86781 --- /dev/null +++ b/_vendor/urllib3/util/ssl_.py @@ -0,0 +1,495 @@ +from __future__ import absolute_import + +import hmac +import os +import sys +import warnings +from binascii import hexlify, unhexlify +from hashlib import md5, sha1, sha256 + +from ..exceptions import ( + InsecurePlatformWarning, + ProxySchemeUnsupported, + SNIMissingWarning, + SSLError, +) +from ..packages import six +from .url import BRACELESS_IPV6_ADDRZ_RE, IPV4_RE + +SSLContext = None +SSLTransport = None +HAS_SNI = False +IS_PYOPENSSL = False +IS_SECURETRANSPORT = False +ALPN_PROTOCOLS = ["http/1.1"] + +# Maps the length of a digest to a possible hash function producing this digest +HASHFUNC_MAP = {32: md5, 40: sha1, 64: sha256} + + +def _const_compare_digest_backport(a, b): + """ + Compare two digests of equal length in constant time. + + The digests must be of type str/bytes. + Returns True if the digests match, and False otherwise. + """ + result = abs(len(a) - len(b)) + for left, right in zip(bytearray(a), bytearray(b)): + result |= left ^ right + return result == 0 + + +_const_compare_digest = getattr(hmac, "compare_digest", _const_compare_digest_backport) + +try: # Test for SSL features + import ssl + from ssl import CERT_REQUIRED, wrap_socket +except ImportError: + pass + +try: + from ssl import HAS_SNI # Has SNI? +except ImportError: + pass + +try: + from .ssltransport import SSLTransport +except ImportError: + pass + + +try: # Platform-specific: Python 3.6 + from ssl import PROTOCOL_TLS + + PROTOCOL_SSLv23 = PROTOCOL_TLS +except ImportError: + try: + from ssl import PROTOCOL_SSLv23 as PROTOCOL_TLS + + PROTOCOL_SSLv23 = PROTOCOL_TLS + except ImportError: + PROTOCOL_SSLv23 = PROTOCOL_TLS = 2 + +try: + from ssl import PROTOCOL_TLS_CLIENT +except ImportError: + PROTOCOL_TLS_CLIENT = PROTOCOL_TLS + + +try: + from ssl import OP_NO_COMPRESSION, OP_NO_SSLv2, OP_NO_SSLv3 +except ImportError: + OP_NO_SSLv2, OP_NO_SSLv3 = 0x1000000, 0x2000000 + OP_NO_COMPRESSION = 0x20000 + + +try: # OP_NO_TICKET was added in Python 3.6 + from ssl import OP_NO_TICKET +except ImportError: + OP_NO_TICKET = 0x4000 + + +# A secure default. +# Sources for more information on TLS ciphers: +# +# - https://wiki.mozilla.org/Security/Server_Side_TLS +# - https://www.ssllabs.com/projects/best-practices/index.html +# - https://hynek.me/articles/hardening-your-web-servers-ssl-ciphers/ +# +# The general intent is: +# - prefer cipher suites that offer perfect forward secrecy (DHE/ECDHE), +# - prefer ECDHE over DHE for better performance, +# - prefer any AES-GCM and ChaCha20 over any AES-CBC for better performance and +# security, +# - prefer AES-GCM over ChaCha20 because hardware-accelerated AES is common, +# - disable NULL authentication, MD5 MACs, DSS, and other +# insecure ciphers for security reasons. +# - NOTE: TLS 1.3 cipher suites are managed through a different interface +# not exposed by CPython (yet!) and are enabled by default if they're available. +DEFAULT_CIPHERS = ":".join( + [ + "ECDHE+AESGCM", + "ECDHE+CHACHA20", + "DHE+AESGCM", + "DHE+CHACHA20", + "ECDH+AESGCM", + "DH+AESGCM", + "ECDH+AES", + "DH+AES", + "RSA+AESGCM", + "RSA+AES", + "!aNULL", + "!eNULL", + "!MD5", + "!DSS", + ] +) + +try: + from ssl import SSLContext # Modern SSL? +except ImportError: + + class SSLContext(object): # Platform-specific: Python 2 + def __init__(self, protocol_version): + self.protocol = protocol_version + # Use default values from a real SSLContext + self.check_hostname = False + self.verify_mode = ssl.CERT_NONE + self.ca_certs = None + self.options = 0 + self.certfile = None + self.keyfile = None + self.ciphers = None + + def load_cert_chain(self, certfile, keyfile): + self.certfile = certfile + self.keyfile = keyfile + + def load_verify_locations(self, cafile=None, capath=None, cadata=None): + self.ca_certs = cafile + + if capath is not None: + raise SSLError("CA directories not supported in older Pythons") + + if cadata is not None: + raise SSLError("CA data not supported in older Pythons") + + def set_ciphers(self, cipher_suite): + self.ciphers = cipher_suite + + def wrap_socket(self, socket, server_hostname=None, server_side=False): + warnings.warn( + "A true SSLContext object is not available. This prevents " + "urllib3 from configuring SSL appropriately and may cause " + "certain SSL connections to fail. You can upgrade to a newer " + "version of Python to solve this. For more information, see " + "https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html" + "#ssl-warnings", + InsecurePlatformWarning, + ) + kwargs = { + "keyfile": self.keyfile, + "certfile": self.certfile, + "ca_certs": self.ca_certs, + "cert_reqs": self.verify_mode, + "ssl_version": self.protocol, + "server_side": server_side, + } + return wrap_socket(socket, ciphers=self.ciphers, **kwargs) + + +def assert_fingerprint(cert, fingerprint): + """ + Checks if given fingerprint matches the supplied certificate. + + :param cert: + Certificate as bytes object. + :param fingerprint: + Fingerprint as string of hexdigits, can be interspersed by colons. + """ + + fingerprint = fingerprint.replace(":", "").lower() + digest_length = len(fingerprint) + hashfunc = HASHFUNC_MAP.get(digest_length) + if not hashfunc: + raise SSLError("Fingerprint of invalid length: {0}".format(fingerprint)) + + # We need encode() here for py32; works on py2 and p33. + fingerprint_bytes = unhexlify(fingerprint.encode()) + + cert_digest = hashfunc(cert).digest() + + if not _const_compare_digest(cert_digest, fingerprint_bytes): + raise SSLError( + 'Fingerprints did not match. Expected "{0}", got "{1}".'.format( + fingerprint, hexlify(cert_digest) + ) + ) + + +def resolve_cert_reqs(candidate): + """ + Resolves the argument to a numeric constant, which can be passed to + the wrap_socket function/method from the ssl module. + Defaults to :data:`ssl.CERT_REQUIRED`. + If given a string it is assumed to be the name of the constant in the + :mod:`ssl` module or its abbreviation. + (So you can specify `REQUIRED` instead of `CERT_REQUIRED`. + If it's neither `None` nor a string we assume it is already the numeric + constant which can directly be passed to wrap_socket. + """ + if candidate is None: + return CERT_REQUIRED + + if isinstance(candidate, str): + res = getattr(ssl, candidate, None) + if res is None: + res = getattr(ssl, "CERT_" + candidate) + return res + + return candidate + + +def resolve_ssl_version(candidate): + """ + like resolve_cert_reqs + """ + if candidate is None: + return PROTOCOL_TLS + + if isinstance(candidate, str): + res = getattr(ssl, candidate, None) + if res is None: + res = getattr(ssl, "PROTOCOL_" + candidate) + return res + + return candidate + + +def create_urllib3_context( + ssl_version=None, cert_reqs=None, options=None, ciphers=None +): + """All arguments have the same meaning as ``ssl_wrap_socket``. + + By default, this function does a lot of the same work that + ``ssl.create_default_context`` does on Python 3.4+. It: + + - Disables SSLv2, SSLv3, and compression + - Sets a restricted set of server ciphers + + If you wish to enable SSLv3, you can do:: + + from urllib3.util import ssl_ + context = ssl_.create_urllib3_context() + context.options &= ~ssl_.OP_NO_SSLv3 + + You can do the same to enable compression (substituting ``COMPRESSION`` + for ``SSLv3`` in the last line above). + + :param ssl_version: + The desired protocol version to use. This will default to + PROTOCOL_SSLv23 which will negotiate the highest protocol that both + the server and your installation of OpenSSL support. + :param cert_reqs: + Whether to require the certificate verification. This defaults to + ``ssl.CERT_REQUIRED``. + :param options: + Specific OpenSSL options. These default to ``ssl.OP_NO_SSLv2``, + ``ssl.OP_NO_SSLv3``, ``ssl.OP_NO_COMPRESSION``, and ``ssl.OP_NO_TICKET``. + :param ciphers: + Which cipher suites to allow the server to select. + :returns: + Constructed SSLContext object with specified options + :rtype: SSLContext + """ + # PROTOCOL_TLS is deprecated in Python 3.10 + if not ssl_version or ssl_version == PROTOCOL_TLS: + ssl_version = PROTOCOL_TLS_CLIENT + + context = SSLContext(ssl_version) + + context.set_ciphers(ciphers or DEFAULT_CIPHERS) + + # Setting the default here, as we may have no ssl module on import + cert_reqs = ssl.CERT_REQUIRED if cert_reqs is None else cert_reqs + + if options is None: + options = 0 + # SSLv2 is easily broken and is considered harmful and dangerous + options |= OP_NO_SSLv2 + # SSLv3 has several problems and is now dangerous + options |= OP_NO_SSLv3 + # Disable compression to prevent CRIME attacks for OpenSSL 1.0+ + # (issue #309) + options |= OP_NO_COMPRESSION + # TLSv1.2 only. Unless set explicitly, do not request tickets. + # This may save some bandwidth on wire, and although the ticket is encrypted, + # there is a risk associated with it being on wire, + # if the server is not rotating its ticketing keys properly. + options |= OP_NO_TICKET + + context.options |= options + + # Enable post-handshake authentication for TLS 1.3, see GH #1634. PHA is + # necessary for conditional client cert authentication with TLS 1.3. + # The attribute is None for OpenSSL <= 1.1.0 or does not exist in older + # versions of Python. We only enable on Python 3.7.4+ or if certificate + # verification is enabled to work around Python issue #37428 + # See: https://bugs.python.org/issue37428 + if (cert_reqs == ssl.CERT_REQUIRED or sys.version_info >= (3, 7, 4)) and getattr( + context, "post_handshake_auth", None + ) is not None: + context.post_handshake_auth = True + + def disable_check_hostname(): + if ( + getattr(context, "check_hostname", None) is not None + ): # Platform-specific: Python 3.2 + # We do our own verification, including fingerprints and alternative + # hostnames. So disable it here + context.check_hostname = False + + # The order of the below lines setting verify_mode and check_hostname + # matter due to safe-guards SSLContext has to prevent an SSLContext with + # check_hostname=True, verify_mode=NONE/OPTIONAL. This is made even more + # complex because we don't know whether PROTOCOL_TLS_CLIENT will be used + # or not so we don't know the initial state of the freshly created SSLContext. + if cert_reqs == ssl.CERT_REQUIRED: + context.verify_mode = cert_reqs + disable_check_hostname() + else: + disable_check_hostname() + context.verify_mode = cert_reqs + + # Enable logging of TLS session keys via defacto standard environment variable + # 'SSLKEYLOGFILE', if the feature is available (Python 3.8+). Skip empty values. + if hasattr(context, "keylog_filename"): + sslkeylogfile = os.environ.get("SSLKEYLOGFILE") + if sslkeylogfile: + context.keylog_filename = sslkeylogfile + + return context + + +def ssl_wrap_socket( + sock, + keyfile=None, + certfile=None, + cert_reqs=None, + ca_certs=None, + server_hostname=None, + ssl_version=None, + ciphers=None, + ssl_context=None, + ca_cert_dir=None, + key_password=None, + ca_cert_data=None, + tls_in_tls=False, +): + """ + All arguments except for server_hostname, ssl_context, and ca_cert_dir have + the same meaning as they do when using :func:`ssl.wrap_socket`. + + :param server_hostname: + When SNI is supported, the expected hostname of the certificate + :param ssl_context: + A pre-made :class:`SSLContext` object. If none is provided, one will + be created using :func:`create_urllib3_context`. + :param ciphers: + A string of ciphers we wish the client to support. + :param ca_cert_dir: + A directory containing CA certificates in multiple separate files, as + supported by OpenSSL's -CApath flag or the capath argument to + SSLContext.load_verify_locations(). + :param key_password: + Optional password if the keyfile is encrypted. + :param ca_cert_data: + Optional string containing CA certificates in PEM format suitable for + passing as the cadata parameter to SSLContext.load_verify_locations() + :param tls_in_tls: + Use SSLTransport to wrap the existing socket. + """ + context = ssl_context + if context is None: + # Note: This branch of code and all the variables in it are no longer + # used by urllib3 itself. We should consider deprecating and removing + # this code. + context = create_urllib3_context(ssl_version, cert_reqs, ciphers=ciphers) + + if ca_certs or ca_cert_dir or ca_cert_data: + try: + context.load_verify_locations(ca_certs, ca_cert_dir, ca_cert_data) + except (IOError, OSError) as e: + raise SSLError(e) + + elif ssl_context is None and hasattr(context, "load_default_certs"): + # try to load OS default certs; works well on Windows (require Python3.4+) + context.load_default_certs() + + # Attempt to detect if we get the goofy behavior of the + # keyfile being encrypted and OpenSSL asking for the + # passphrase via the terminal and instead error out. + if keyfile and key_password is None and _is_key_file_encrypted(keyfile): + raise SSLError("Client private key is encrypted, password is required") + + if certfile: + if key_password is None: + context.load_cert_chain(certfile, keyfile) + else: + context.load_cert_chain(certfile, keyfile, key_password) + + try: + if hasattr(context, "set_alpn_protocols"): + context.set_alpn_protocols(ALPN_PROTOCOLS) + except NotImplementedError: # Defensive: in CI, we always have set_alpn_protocols + pass + + # If we detect server_hostname is an IP address then the SNI + # extension should not be used according to RFC3546 Section 3.1 + use_sni_hostname = server_hostname and not is_ipaddress(server_hostname) + # SecureTransport uses server_hostname in certificate verification. + send_sni = (use_sni_hostname and HAS_SNI) or ( + IS_SECURETRANSPORT and server_hostname + ) + # Do not warn the user if server_hostname is an invalid SNI hostname. + if not HAS_SNI and use_sni_hostname: + warnings.warn( + "An HTTPS request has been made, but the SNI (Server Name " + "Indication) extension to TLS is not available on this platform. " + "This may cause the server to present an incorrect TLS " + "certificate, which can cause validation failures. You can upgrade to " + "a newer version of Python to solve this. For more information, see " + "https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html" + "#ssl-warnings", + SNIMissingWarning, + ) + + if send_sni: + ssl_sock = _ssl_wrap_socket_impl( + sock, context, tls_in_tls, server_hostname=server_hostname + ) + else: + ssl_sock = _ssl_wrap_socket_impl(sock, context, tls_in_tls) + return ssl_sock + + +def is_ipaddress(hostname): + """Detects whether the hostname given is an IPv4 or IPv6 address. + Also detects IPv6 addresses with Zone IDs. + + :param str hostname: Hostname to examine. + :return: True if the hostname is an IP address, False otherwise. + """ + if not six.PY2 and isinstance(hostname, bytes): + # IDN A-label bytes are ASCII compatible. + hostname = hostname.decode("ascii") + return bool(IPV4_RE.match(hostname) or BRACELESS_IPV6_ADDRZ_RE.match(hostname)) + + +def _is_key_file_encrypted(key_file): + """Detects if a key file is encrypted or not.""" + with open(key_file, "r") as f: + for line in f: + # Look for Proc-Type: 4,ENCRYPTED + if "ENCRYPTED" in line: + return True + + return False + + +def _ssl_wrap_socket_impl(sock, ssl_context, tls_in_tls, server_hostname=None): + if tls_in_tls: + if not SSLTransport: + # Import error, ssl is not available. + raise ProxySchemeUnsupported( + "TLS in TLS requires support for the 'ssl' module" + ) + + SSLTransport._validate_ssl_context_for_tls_in_tls(ssl_context) + return SSLTransport(sock, ssl_context, server_hostname) + + if server_hostname: + return ssl_context.wrap_socket(sock, server_hostname=server_hostname) + else: + return ssl_context.wrap_socket(sock) diff --git a/_vendor/urllib3/util/ssl_match_hostname.py b/_vendor/urllib3/util/ssl_match_hostname.py new file mode 100644 index 0000000..1dd950c --- /dev/null +++ b/_vendor/urllib3/util/ssl_match_hostname.py @@ -0,0 +1,159 @@ +"""The match_hostname() function from Python 3.3.3, essential when using SSL.""" + +# Note: This file is under the PSF license as the code comes from the python +# stdlib. http://docs.python.org/3/license.html + +import re +import sys + +# ipaddress has been backported to 2.6+ in pypi. If it is installed on the +# system, use it to handle IPAddress ServerAltnames (this was added in +# python-3.5) otherwise only do DNS matching. This allows +# util.ssl_match_hostname to continue to be used in Python 2.7. +try: + import ipaddress +except ImportError: + ipaddress = None + +__version__ = "3.5.0.1" + + +class CertificateError(ValueError): + pass + + +def _dnsname_match(dn, hostname, max_wildcards=1): + """Matching according to RFC 6125, section 6.4.3 + + http://tools.ietf.org/html/rfc6125#section-6.4.3 + """ + pats = [] + if not dn: + return False + + # Ported from python3-syntax: + # leftmost, *remainder = dn.split(r'.') + parts = dn.split(r".") + leftmost = parts[0] + remainder = parts[1:] + + wildcards = leftmost.count("*") + if wildcards > max_wildcards: + # Issue #17980: avoid denials of service by refusing more + # than one wildcard per fragment. A survey of established + # policy among SSL implementations showed it to be a + # reasonable choice. + raise CertificateError( + "too many wildcards in certificate DNS name: " + repr(dn) + ) + + # speed up common case w/o wildcards + if not wildcards: + return dn.lower() == hostname.lower() + + # RFC 6125, section 6.4.3, subitem 1. + # The client SHOULD NOT attempt to match a presented identifier in which + # the wildcard character comprises a label other than the left-most label. + if leftmost == "*": + # When '*' is a fragment by itself, it matches a non-empty dotless + # fragment. + pats.append("[^.]+") + elif leftmost.startswith("xn--") or hostname.startswith("xn--"): + # RFC 6125, section 6.4.3, subitem 3. + # The client SHOULD NOT attempt to match a presented identifier + # where the wildcard character is embedded within an A-label or + # U-label of an internationalized domain name. + pats.append(re.escape(leftmost)) + else: + # Otherwise, '*' matches any dotless string, e.g. www* + pats.append(re.escape(leftmost).replace(r"\*", "[^.]*")) + + # add the remaining fragments, ignore any wildcards + for frag in remainder: + pats.append(re.escape(frag)) + + pat = re.compile(r"\A" + r"\.".join(pats) + r"\Z", re.IGNORECASE) + return pat.match(hostname) + + +def _to_unicode(obj): + if isinstance(obj, str) and sys.version_info < (3,): + # ignored flake8 # F821 to support python 2.7 function + obj = unicode(obj, encoding="ascii", errors="strict") # noqa: F821 + return obj + + +def _ipaddress_match(ipname, host_ip): + """Exact matching of IP addresses. + + RFC 6125 explicitly doesn't define an algorithm for this + (section 1.7.2 - "Out of Scope"). + """ + # OpenSSL may add a trailing newline to a subjectAltName's IP address + # Divergence from upstream: ipaddress can't handle byte str + ip = ipaddress.ip_address(_to_unicode(ipname).rstrip()) + return ip == host_ip + + +def match_hostname(cert, hostname): + """Verify that *cert* (in decoded format as returned by + SSLSocket.getpeercert()) matches the *hostname*. RFC 2818 and RFC 6125 + rules are followed, but IP addresses are not accepted for *hostname*. + + CertificateError is raised on failure. On success, the function + returns nothing. + """ + if not cert: + raise ValueError( + "empty or no certificate, match_hostname needs a " + "SSL socket or SSL context with either " + "CERT_OPTIONAL or CERT_REQUIRED" + ) + try: + # Divergence from upstream: ipaddress can't handle byte str + host_ip = ipaddress.ip_address(_to_unicode(hostname)) + except (UnicodeError, ValueError): + # ValueError: Not an IP address (common case) + # UnicodeError: Divergence from upstream: Have to deal with ipaddress not taking + # byte strings. addresses should be all ascii, so we consider it not + # an ipaddress in this case + host_ip = None + except AttributeError: + # Divergence from upstream: Make ipaddress library optional + if ipaddress is None: + host_ip = None + else: # Defensive + raise + dnsnames = [] + san = cert.get("subjectAltName", ()) + for key, value in san: + if key == "DNS": + if host_ip is None and _dnsname_match(value, hostname): + return + dnsnames.append(value) + elif key == "IP Address": + if host_ip is not None and _ipaddress_match(value, host_ip): + return + dnsnames.append(value) + if not dnsnames: + # The subject is only checked when there is no dNSName entry + # in subjectAltName + for sub in cert.get("subject", ()): + for key, value in sub: + # XXX according to RFC 2818, the most specific Common Name + # must be used. + if key == "commonName": + if _dnsname_match(value, hostname): + return + dnsnames.append(value) + if len(dnsnames) > 1: + raise CertificateError( + "hostname %r " + "doesn't match either of %s" % (hostname, ", ".join(map(repr, dnsnames))) + ) + elif len(dnsnames) == 1: + raise CertificateError("hostname %r doesn't match %r" % (hostname, dnsnames[0])) + else: + raise CertificateError( + "no appropriate commonName or subjectAltName fields were found" + ) diff --git a/_vendor/urllib3/util/ssltransport.py b/_vendor/urllib3/util/ssltransport.py new file mode 100644 index 0000000..4a7105d --- /dev/null +++ b/_vendor/urllib3/util/ssltransport.py @@ -0,0 +1,221 @@ +import io +import socket +import ssl + +from ..exceptions import ProxySchemeUnsupported +from ..packages import six + +SSL_BLOCKSIZE = 16384 + + +class SSLTransport: + """ + The SSLTransport wraps an existing socket and establishes an SSL connection. + + Contrary to Python's implementation of SSLSocket, it allows you to chain + multiple TLS connections together. It's particularly useful if you need to + implement TLS within TLS. + + The class supports most of the socket API operations. + """ + + @staticmethod + def _validate_ssl_context_for_tls_in_tls(ssl_context): + """ + Raises a ProxySchemeUnsupported if the provided ssl_context can't be used + for TLS in TLS. + + The only requirement is that the ssl_context provides the 'wrap_bio' + methods. + """ + + if not hasattr(ssl_context, "wrap_bio"): + if six.PY2: + raise ProxySchemeUnsupported( + "TLS in TLS requires SSLContext.wrap_bio() which isn't " + "supported on Python 2" + ) + else: + raise ProxySchemeUnsupported( + "TLS in TLS requires SSLContext.wrap_bio() which isn't " + "available on non-native SSLContext" + ) + + def __init__( + self, socket, ssl_context, server_hostname=None, suppress_ragged_eofs=True + ): + """ + Create an SSLTransport around socket using the provided ssl_context. + """ + self.incoming = ssl.MemoryBIO() + self.outgoing = ssl.MemoryBIO() + + self.suppress_ragged_eofs = suppress_ragged_eofs + self.socket = socket + + self.sslobj = ssl_context.wrap_bio( + self.incoming, self.outgoing, server_hostname=server_hostname + ) + + # Perform initial handshake. + self._ssl_io_loop(self.sslobj.do_handshake) + + def __enter__(self): + return self + + def __exit__(self, *_): + self.close() + + def fileno(self): + return self.socket.fileno() + + def read(self, len=1024, buffer=None): + return self._wrap_ssl_read(len, buffer) + + def recv(self, len=1024, flags=0): + if flags != 0: + raise ValueError("non-zero flags not allowed in calls to recv") + return self._wrap_ssl_read(len) + + def recv_into(self, buffer, nbytes=None, flags=0): + if flags != 0: + raise ValueError("non-zero flags not allowed in calls to recv_into") + if buffer and (nbytes is None): + nbytes = len(buffer) + elif nbytes is None: + nbytes = 1024 + return self.read(nbytes, buffer) + + def sendall(self, data, flags=0): + if flags != 0: + raise ValueError("non-zero flags not allowed in calls to sendall") + count = 0 + with memoryview(data) as view, view.cast("B") as byte_view: + amount = len(byte_view) + while count < amount: + v = self.send(byte_view[count:]) + count += v + + def send(self, data, flags=0): + if flags != 0: + raise ValueError("non-zero flags not allowed in calls to send") + response = self._ssl_io_loop(self.sslobj.write, data) + return response + + def makefile( + self, mode="r", buffering=None, encoding=None, errors=None, newline=None + ): + """ + Python's httpclient uses makefile and buffered io when reading HTTP + messages and we need to support it. + + This is unfortunately a copy and paste of socket.py makefile with small + changes to point to the socket directly. + """ + if not set(mode) <= {"r", "w", "b"}: + raise ValueError("invalid mode %r (only r, w, b allowed)" % (mode,)) + + writing = "w" in mode + reading = "r" in mode or not writing + assert reading or writing + binary = "b" in mode + rawmode = "" + if reading: + rawmode += "r" + if writing: + rawmode += "w" + raw = socket.SocketIO(self, rawmode) + self.socket._io_refs += 1 + if buffering is None: + buffering = -1 + if buffering < 0: + buffering = io.DEFAULT_BUFFER_SIZE + if buffering == 0: + if not binary: + raise ValueError("unbuffered streams must be binary") + return raw + if reading and writing: + buffer = io.BufferedRWPair(raw, raw, buffering) + elif reading: + buffer = io.BufferedReader(raw, buffering) + else: + assert writing + buffer = io.BufferedWriter(raw, buffering) + if binary: + return buffer + text = io.TextIOWrapper(buffer, encoding, errors, newline) + text.mode = mode + return text + + def unwrap(self): + self._ssl_io_loop(self.sslobj.unwrap) + + def close(self): + self.socket.close() + + def getpeercert(self, binary_form=False): + return self.sslobj.getpeercert(binary_form) + + def version(self): + return self.sslobj.version() + + def cipher(self): + return self.sslobj.cipher() + + def selected_alpn_protocol(self): + return self.sslobj.selected_alpn_protocol() + + def selected_npn_protocol(self): + return self.sslobj.selected_npn_protocol() + + def shared_ciphers(self): + return self.sslobj.shared_ciphers() + + def compression(self): + return self.sslobj.compression() + + def settimeout(self, value): + self.socket.settimeout(value) + + def gettimeout(self): + return self.socket.gettimeout() + + def _decref_socketios(self): + self.socket._decref_socketios() + + def _wrap_ssl_read(self, len, buffer=None): + try: + return self._ssl_io_loop(self.sslobj.read, len, buffer) + except ssl.SSLError as e: + if e.errno == ssl.SSL_ERROR_EOF and self.suppress_ragged_eofs: + return 0 # eof, return 0. + else: + raise + + def _ssl_io_loop(self, func, *args): + """Performs an I/O loop between incoming/outgoing and the socket.""" + should_loop = True + ret = None + + while should_loop: + errno = None + try: + ret = func(*args) + except ssl.SSLError as e: + if e.errno not in (ssl.SSL_ERROR_WANT_READ, ssl.SSL_ERROR_WANT_WRITE): + # WANT_READ, and WANT_WRITE are expected, others are not. + raise e + errno = e.errno + + buf = self.outgoing.read() + self.socket.sendall(buf) + + if errno is None: + should_loop = False + elif errno == ssl.SSL_ERROR_WANT_READ: + buf = self.socket.recv(SSL_BLOCKSIZE) + if buf: + self.incoming.write(buf) + else: + self.incoming.write_eof() + return ret diff --git a/_vendor/urllib3/util/timeout.py b/_vendor/urllib3/util/timeout.py new file mode 100644 index 0000000..ff69593 --- /dev/null +++ b/_vendor/urllib3/util/timeout.py @@ -0,0 +1,268 @@ +from __future__ import absolute_import + +import time + +# The default socket timeout, used by httplib to indicate that no timeout was +# specified by the user +from socket import _GLOBAL_DEFAULT_TIMEOUT + +from ..exceptions import TimeoutStateError + +# A sentinel value to indicate that no timeout was specified by the user in +# urllib3 +_Default = object() + + +# Use time.monotonic if available. +current_time = getattr(time, "monotonic", time.time) + + +class Timeout(object): + """Timeout configuration. + + Timeouts can be defined as a default for a pool: + + .. code-block:: python + + timeout = Timeout(connect=2.0, read=7.0) + http = PoolManager(timeout=timeout) + response = http.request('GET', 'http://example.com/') + + Or per-request (which overrides the default for the pool): + + .. code-block:: python + + response = http.request('GET', 'http://example.com/', timeout=Timeout(10)) + + Timeouts can be disabled by setting all the parameters to ``None``: + + .. code-block:: python + + no_timeout = Timeout(connect=None, read=None) + response = http.request('GET', 'http://example.com/, timeout=no_timeout) + + + :param total: + This combines the connect and read timeouts into one; the read timeout + will be set to the time leftover from the connect attempt. In the + event that both a connect timeout and a total are specified, or a read + timeout and a total are specified, the shorter timeout will be applied. + + Defaults to None. + + :type total: int, float, or None + + :param connect: + The maximum amount of time (in seconds) to wait for a connection + attempt to a server to succeed. Omitting the parameter will default the + connect timeout to the system default, probably `the global default + timeout in socket.py + `_. + None will set an infinite timeout for connection attempts. + + :type connect: int, float, or None + + :param read: + The maximum amount of time (in seconds) to wait between consecutive + read operations for a response from the server. Omitting the parameter + will default the read timeout to the system default, probably `the + global default timeout in socket.py + `_. + None will set an infinite timeout. + + :type read: int, float, or None + + .. note:: + + Many factors can affect the total amount of time for urllib3 to return + an HTTP response. + + For example, Python's DNS resolver does not obey the timeout specified + on the socket. Other factors that can affect total request time include + high CPU load, high swap, the program running at a low priority level, + or other behaviors. + + In addition, the read and total timeouts only measure the time between + read operations on the socket connecting the client and the server, + not the total amount of time for the request to return a complete + response. For most requests, the timeout is raised because the server + has not sent the first byte in the specified time. This is not always + the case; if a server streams one byte every fifteen seconds, a timeout + of 20 seconds will not trigger, even though the request will take + several minutes to complete. + + If your goal is to cut off any request after a set amount of wall clock + time, consider having a second "watcher" thread to cut off a slow + request. + """ + + #: A sentinel object representing the default timeout value + DEFAULT_TIMEOUT = _GLOBAL_DEFAULT_TIMEOUT + + def __init__(self, total=None, connect=_Default, read=_Default): + self._connect = self._validate_timeout(connect, "connect") + self._read = self._validate_timeout(read, "read") + self.total = self._validate_timeout(total, "total") + self._start_connect = None + + def __repr__(self): + return "%s(connect=%r, read=%r, total=%r)" % ( + type(self).__name__, + self._connect, + self._read, + self.total, + ) + + # __str__ provided for backwards compatibility + __str__ = __repr__ + + @classmethod + def _validate_timeout(cls, value, name): + """Check that a timeout attribute is valid. + + :param value: The timeout value to validate + :param name: The name of the timeout attribute to validate. This is + used to specify in error messages. + :return: The validated and casted version of the given value. + :raises ValueError: If it is a numeric value less than or equal to + zero, or the type is not an integer, float, or None. + """ + if value is _Default: + return cls.DEFAULT_TIMEOUT + + if value is None or value is cls.DEFAULT_TIMEOUT: + return value + + if isinstance(value, bool): + raise ValueError( + "Timeout cannot be a boolean value. It must " + "be an int, float or None." + ) + try: + float(value) + except (TypeError, ValueError): + raise ValueError( + "Timeout value %s was %s, but it must be an " + "int, float or None." % (name, value) + ) + + try: + if value <= 0: + raise ValueError( + "Attempted to set %s timeout to %s, but the " + "timeout cannot be set to a value less " + "than or equal to 0." % (name, value) + ) + except TypeError: + # Python 3 + raise ValueError( + "Timeout value %s was %s, but it must be an " + "int, float or None." % (name, value) + ) + + return value + + @classmethod + def from_float(cls, timeout): + """Create a new Timeout from a legacy timeout value. + + The timeout value used by httplib.py sets the same timeout on the + connect(), and recv() socket requests. This creates a :class:`Timeout` + object that sets the individual timeouts to the ``timeout`` value + passed to this function. + + :param timeout: The legacy timeout value. + :type timeout: integer, float, sentinel default object, or None + :return: Timeout object + :rtype: :class:`Timeout` + """ + return Timeout(read=timeout, connect=timeout) + + def clone(self): + """Create a copy of the timeout object + + Timeout properties are stored per-pool but each request needs a fresh + Timeout object to ensure each one has its own start/stop configured. + + :return: a copy of the timeout object + :rtype: :class:`Timeout` + """ + # We can't use copy.deepcopy because that will also create a new object + # for _GLOBAL_DEFAULT_TIMEOUT, which socket.py uses as a sentinel to + # detect the user default. + return Timeout(connect=self._connect, read=self._read, total=self.total) + + def start_connect(self): + """Start the timeout clock, used during a connect() attempt + + :raises urllib3.exceptions.TimeoutStateError: if you attempt + to start a timer that has been started already. + """ + if self._start_connect is not None: + raise TimeoutStateError("Timeout timer has already been started.") + self._start_connect = current_time() + return self._start_connect + + def get_connect_duration(self): + """Gets the time elapsed since the call to :meth:`start_connect`. + + :return: Elapsed time in seconds. + :rtype: float + :raises urllib3.exceptions.TimeoutStateError: if you attempt + to get duration for a timer that hasn't been started. + """ + if self._start_connect is None: + raise TimeoutStateError( + "Can't get connect duration for timer that has not started." + ) + return current_time() - self._start_connect + + @property + def connect_timeout(self): + """Get the value to use when setting a connection timeout. + + This will be a positive float or integer, the value None + (never timeout), or the default system timeout. + + :return: Connect timeout. + :rtype: int, float, :attr:`Timeout.DEFAULT_TIMEOUT` or None + """ + if self.total is None: + return self._connect + + if self._connect is None or self._connect is self.DEFAULT_TIMEOUT: + return self.total + + return min(self._connect, self.total) + + @property + def read_timeout(self): + """Get the value for the read timeout. + + This assumes some time has elapsed in the connection timeout and + computes the read timeout appropriately. + + If self.total is set, the read timeout is dependent on the amount of + time taken by the connect timeout. If the connection time has not been + established, a :exc:`~urllib3.exceptions.TimeoutStateError` will be + raised. + + :return: Value to use for the read timeout. + :rtype: int, float, :attr:`Timeout.DEFAULT_TIMEOUT` or None + :raises urllib3.exceptions.TimeoutStateError: If :meth:`start_connect` + has not yet been called on this object. + """ + if ( + self.total is not None + and self.total is not self.DEFAULT_TIMEOUT + and self._read is not None + and self._read is not self.DEFAULT_TIMEOUT + ): + # In case the connect timeout has not yet been established. + if self._start_connect is None: + return self._read + return max(0, min(self.total - self.get_connect_duration(), self._read)) + elif self.total is not None and self.total is not self.DEFAULT_TIMEOUT: + return max(0, self.total - self.get_connect_duration()) + else: + return self._read diff --git a/_vendor/urllib3/util/url.py b/_vendor/urllib3/util/url.py new file mode 100644 index 0000000..b667c16 --- /dev/null +++ b/_vendor/urllib3/util/url.py @@ -0,0 +1,435 @@ +from __future__ import absolute_import + +import re +from collections import namedtuple + +from ..exceptions import LocationParseError +from ..packages import six + +url_attrs = ["scheme", "auth", "host", "port", "path", "query", "fragment"] + +# We only want to normalize urls with an HTTP(S) scheme. +# urllib3 infers URLs without a scheme (None) to be http. +NORMALIZABLE_SCHEMES = ("http", "https", None) + +# Almost all of these patterns were derived from the +# 'rfc3986' module: https://github.com/python-hyper/rfc3986 +PERCENT_RE = re.compile(r"%[a-fA-F0-9]{2}") +SCHEME_RE = re.compile(r"^(?:[a-zA-Z][a-zA-Z0-9+-]*:|/)") +URI_RE = re.compile( + r"^(?:([a-zA-Z][a-zA-Z0-9+.-]*):)?" + r"(?://([^\\/?#]*))?" + r"([^?#]*)" + r"(?:\?([^#]*))?" + r"(?:#(.*))?$", + re.UNICODE | re.DOTALL, +) + +IPV4_PAT = r"(?:[0-9]{1,3}\.){3}[0-9]{1,3}" +HEX_PAT = "[0-9A-Fa-f]{1,4}" +LS32_PAT = "(?:{hex}:{hex}|{ipv4})".format(hex=HEX_PAT, ipv4=IPV4_PAT) +_subs = {"hex": HEX_PAT, "ls32": LS32_PAT} +_variations = [ + # 6( h16 ":" ) ls32 + "(?:%(hex)s:){6}%(ls32)s", + # "::" 5( h16 ":" ) ls32 + "::(?:%(hex)s:){5}%(ls32)s", + # [ h16 ] "::" 4( h16 ":" ) ls32 + "(?:%(hex)s)?::(?:%(hex)s:){4}%(ls32)s", + # [ *1( h16 ":" ) h16 ] "::" 3( h16 ":" ) ls32 + "(?:(?:%(hex)s:)?%(hex)s)?::(?:%(hex)s:){3}%(ls32)s", + # [ *2( h16 ":" ) h16 ] "::" 2( h16 ":" ) ls32 + "(?:(?:%(hex)s:){0,2}%(hex)s)?::(?:%(hex)s:){2}%(ls32)s", + # [ *3( h16 ":" ) h16 ] "::" h16 ":" ls32 + "(?:(?:%(hex)s:){0,3}%(hex)s)?::%(hex)s:%(ls32)s", + # [ *4( h16 ":" ) h16 ] "::" ls32 + "(?:(?:%(hex)s:){0,4}%(hex)s)?::%(ls32)s", + # [ *5( h16 ":" ) h16 ] "::" h16 + "(?:(?:%(hex)s:){0,5}%(hex)s)?::%(hex)s", + # [ *6( h16 ":" ) h16 ] "::" + "(?:(?:%(hex)s:){0,6}%(hex)s)?::", +] + +UNRESERVED_PAT = r"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789._!\-~" +IPV6_PAT = "(?:" + "|".join([x % _subs for x in _variations]) + ")" +ZONE_ID_PAT = "(?:%25|%)(?:[" + UNRESERVED_PAT + "]|%[a-fA-F0-9]{2})+" +IPV6_ADDRZ_PAT = r"\[" + IPV6_PAT + r"(?:" + ZONE_ID_PAT + r")?\]" +REG_NAME_PAT = r"(?:[^\[\]%:/?#]|%[a-fA-F0-9]{2})*" +TARGET_RE = re.compile(r"^(/[^?#]*)(?:\?([^#]*))?(?:#.*)?$") + +IPV4_RE = re.compile("^" + IPV4_PAT + "$") +IPV6_RE = re.compile("^" + IPV6_PAT + "$") +IPV6_ADDRZ_RE = re.compile("^" + IPV6_ADDRZ_PAT + "$") +BRACELESS_IPV6_ADDRZ_RE = re.compile("^" + IPV6_ADDRZ_PAT[2:-2] + "$") +ZONE_ID_RE = re.compile("(" + ZONE_ID_PAT + r")\]$") + +_HOST_PORT_PAT = ("^(%s|%s|%s)(?::([0-9]{0,5}))?$") % ( + REG_NAME_PAT, + IPV4_PAT, + IPV6_ADDRZ_PAT, +) +_HOST_PORT_RE = re.compile(_HOST_PORT_PAT, re.UNICODE | re.DOTALL) + +UNRESERVED_CHARS = set( + "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789._-~" +) +SUB_DELIM_CHARS = set("!$&'()*+,;=") +USERINFO_CHARS = UNRESERVED_CHARS | SUB_DELIM_CHARS | {":"} +PATH_CHARS = USERINFO_CHARS | {"@", "/"} +QUERY_CHARS = FRAGMENT_CHARS = PATH_CHARS | {"?"} + + +class Url(namedtuple("Url", url_attrs)): + """ + Data structure for representing an HTTP URL. Used as a return value for + :func:`parse_url`. Both the scheme and host are normalized as they are + both case-insensitive according to RFC 3986. + """ + + __slots__ = () + + def __new__( + cls, + scheme=None, + auth=None, + host=None, + port=None, + path=None, + query=None, + fragment=None, + ): + if path and not path.startswith("/"): + path = "/" + path + if scheme is not None: + scheme = scheme.lower() + return super(Url, cls).__new__( + cls, scheme, auth, host, port, path, query, fragment + ) + + @property + def hostname(self): + """For backwards-compatibility with urlparse. We're nice like that.""" + return self.host + + @property + def request_uri(self): + """Absolute path including the query string.""" + uri = self.path or "/" + + if self.query is not None: + uri += "?" + self.query + + return uri + + @property + def netloc(self): + """Network location including host and port""" + if self.port: + return "%s:%d" % (self.host, self.port) + return self.host + + @property + def url(self): + """ + Convert self into a url + + This function should more or less round-trip with :func:`.parse_url`. The + returned url may not be exactly the same as the url inputted to + :func:`.parse_url`, but it should be equivalent by the RFC (e.g., urls + with a blank port will have : removed). + + Example: :: + + >>> U = parse_url('http://google.com/mail/') + >>> U.url + 'http://google.com/mail/' + >>> Url('http', 'username:password', 'host.com', 80, + ... '/path', 'query', 'fragment').url + 'http://username:password@host.com:80/path?query#fragment' + """ + scheme, auth, host, port, path, query, fragment = self + url = u"" + + # We use "is not None" we want things to happen with empty strings (or 0 port) + if scheme is not None: + url += scheme + u"://" + if auth is not None: + url += auth + u"@" + if host is not None: + url += host + if port is not None: + url += u":" + str(port) + if path is not None: + url += path + if query is not None: + url += u"?" + query + if fragment is not None: + url += u"#" + fragment + + return url + + def __str__(self): + return self.url + + +def split_first(s, delims): + """ + .. deprecated:: 1.25 + + Given a string and an iterable of delimiters, split on the first found + delimiter. Return two split parts and the matched delimiter. + + If not found, then the first part is the full input string. + + Example:: + + >>> split_first('foo/bar?baz', '?/=') + ('foo', 'bar?baz', '/') + >>> split_first('foo/bar?baz', '123') + ('foo/bar?baz', '', None) + + Scales linearly with number of delims. Not ideal for large number of delims. + """ + min_idx = None + min_delim = None + for d in delims: + idx = s.find(d) + if idx < 0: + continue + + if min_idx is None or idx < min_idx: + min_idx = idx + min_delim = d + + if min_idx is None or min_idx < 0: + return s, "", None + + return s[:min_idx], s[min_idx + 1 :], min_delim + + +def _encode_invalid_chars(component, allowed_chars, encoding="utf-8"): + """Percent-encodes a URI component without reapplying + onto an already percent-encoded component. + """ + if component is None: + return component + + component = six.ensure_text(component) + + # Normalize existing percent-encoded bytes. + # Try to see if the component we're encoding is already percent-encoded + # so we can skip all '%' characters but still encode all others. + component, percent_encodings = PERCENT_RE.subn( + lambda match: match.group(0).upper(), component + ) + + uri_bytes = component.encode("utf-8", "surrogatepass") + is_percent_encoded = percent_encodings == uri_bytes.count(b"%") + encoded_component = bytearray() + + for i in range(0, len(uri_bytes)): + # Will return a single character bytestring on both Python 2 & 3 + byte = uri_bytes[i : i + 1] + byte_ord = ord(byte) + if (is_percent_encoded and byte == b"%") or ( + byte_ord < 128 and byte.decode() in allowed_chars + ): + encoded_component += byte + continue + encoded_component.extend(b"%" + (hex(byte_ord)[2:].encode().zfill(2).upper())) + + return encoded_component.decode(encoding) + + +def _remove_path_dot_segments(path): + # See http://tools.ietf.org/html/rfc3986#section-5.2.4 for pseudo-code + segments = path.split("/") # Turn the path into a list of segments + output = [] # Initialize the variable to use to store output + + for segment in segments: + # '.' is the current directory, so ignore it, it is superfluous + if segment == ".": + continue + # Anything other than '..', should be appended to the output + elif segment != "..": + output.append(segment) + # In this case segment == '..', if we can, we should pop the last + # element + elif output: + output.pop() + + # If the path starts with '/' and the output is empty or the first string + # is non-empty + if path.startswith("/") and (not output or output[0]): + output.insert(0, "") + + # If the path starts with '/.' or '/..' ensure we add one more empty + # string to add a trailing '/' + if path.endswith(("/.", "/..")): + output.append("") + + return "/".join(output) + + +def _normalize_host(host, scheme): + if host: + if isinstance(host, six.binary_type): + host = six.ensure_str(host) + + if scheme in NORMALIZABLE_SCHEMES: + is_ipv6 = IPV6_ADDRZ_RE.match(host) + if is_ipv6: + # IPv6 hosts of the form 'a::b%zone' are encoded in a URL as + # such per RFC 6874: 'a::b%25zone'. Unquote the ZoneID + # separator as necessary to return a valid RFC 4007 scoped IP. + match = ZONE_ID_RE.search(host) + if match: + start, end = match.span(1) + zone_id = host[start:end] + + if zone_id.startswith("%25") and zone_id != "%25": + zone_id = zone_id[3:] + else: + zone_id = zone_id[1:] + zone_id = "%" + _encode_invalid_chars(zone_id, UNRESERVED_CHARS) + return host[:start].lower() + zone_id + host[end:] + else: + return host.lower() + elif not IPV4_RE.match(host): + return six.ensure_str( + b".".join([_idna_encode(label) for label in host.split(".")]) + ) + return host + + +def _idna_encode(name): + if name and any([ord(x) > 128 for x in name]): + try: + import idna + except ImportError: + six.raise_from( + LocationParseError("Unable to parse URL without the 'idna' module"), + None, + ) + try: + return idna.encode(name.lower(), strict=True, std3_rules=True) + except idna.IDNAError: + six.raise_from( + LocationParseError(u"Name '%s' is not a valid IDNA label" % name), None + ) + return name.lower().encode("ascii") + + +def _encode_target(target): + """Percent-encodes a request target so that there are no invalid characters""" + path, query = TARGET_RE.match(target).groups() + target = _encode_invalid_chars(path, PATH_CHARS) + query = _encode_invalid_chars(query, QUERY_CHARS) + if query is not None: + target += "?" + query + return target + + +def parse_url(url): + """ + Given a url, return a parsed :class:`.Url` namedtuple. Best-effort is + performed to parse incomplete urls. Fields not provided will be None. + This parser is RFC 3986 and RFC 6874 compliant. + + The parser logic and helper functions are based heavily on + work done in the ``rfc3986`` module. + + :param str url: URL to parse into a :class:`.Url` namedtuple. + + Partly backwards-compatible with :mod:`urlparse`. + + Example:: + + >>> parse_url('http://google.com/mail/') + Url(scheme='http', host='google.com', port=None, path='/mail/', ...) + >>> parse_url('google.com:80') + Url(scheme=None, host='google.com', port=80, path=None, ...) + >>> parse_url('/foo?bar') + Url(scheme=None, host=None, port=None, path='/foo', query='bar', ...) + """ + if not url: + # Empty + return Url() + + source_url = url + if not SCHEME_RE.search(url): + url = "//" + url + + try: + scheme, authority, path, query, fragment = URI_RE.match(url).groups() + normalize_uri = scheme is None or scheme.lower() in NORMALIZABLE_SCHEMES + + if scheme: + scheme = scheme.lower() + + if authority: + auth, _, host_port = authority.rpartition("@") + auth = auth or None + host, port = _HOST_PORT_RE.match(host_port).groups() + if auth and normalize_uri: + auth = _encode_invalid_chars(auth, USERINFO_CHARS) + if port == "": + port = None + else: + auth, host, port = None, None, None + + if port is not None: + port = int(port) + if not (0 <= port <= 65535): + raise LocationParseError(url) + + host = _normalize_host(host, scheme) + + if normalize_uri and path: + path = _remove_path_dot_segments(path) + path = _encode_invalid_chars(path, PATH_CHARS) + if normalize_uri and query: + query = _encode_invalid_chars(query, QUERY_CHARS) + if normalize_uri and fragment: + fragment = _encode_invalid_chars(fragment, FRAGMENT_CHARS) + + except (ValueError, AttributeError): + return six.raise_from(LocationParseError(source_url), None) + + # For the sake of backwards compatibility we put empty + # string values for path if there are any defined values + # beyond the path in the URL. + # TODO: Remove this when we break backwards compatibility. + if not path: + if query is not None or fragment is not None: + path = "" + else: + path = None + + # Ensure that each part of the URL is a `str` for + # backwards compatibility. + if isinstance(url, six.text_type): + ensure_func = six.ensure_text + else: + ensure_func = six.ensure_str + + def ensure_type(x): + return x if x is None else ensure_func(x) + + return Url( + scheme=ensure_type(scheme), + auth=ensure_type(auth), + host=ensure_type(host), + port=port, + path=ensure_type(path), + query=ensure_type(query), + fragment=ensure_type(fragment), + ) + + +def get_host(url): + """ + Deprecated. Use :func:`parse_url` instead. + """ + p = parse_url(url) + return p.scheme or "http", p.hostname, p.port diff --git a/_vendor/urllib3/util/wait.py b/_vendor/urllib3/util/wait.py new file mode 100644 index 0000000..21b4590 --- /dev/null +++ b/_vendor/urllib3/util/wait.py @@ -0,0 +1,152 @@ +import errno +import select +import sys +from functools import partial + +try: + from time import monotonic +except ImportError: + from time import time as monotonic + +__all__ = ["NoWayToWaitForSocketError", "wait_for_read", "wait_for_write"] + + +class NoWayToWaitForSocketError(Exception): + pass + + +# How should we wait on sockets? +# +# There are two types of APIs you can use for waiting on sockets: the fancy +# modern stateful APIs like epoll/kqueue, and the older stateless APIs like +# select/poll. The stateful APIs are more efficient when you have a lots of +# sockets to keep track of, because you can set them up once and then use them +# lots of times. But we only ever want to wait on a single socket at a time +# and don't want to keep track of state, so the stateless APIs are actually +# more efficient. So we want to use select() or poll(). +# +# Now, how do we choose between select() and poll()? On traditional Unixes, +# select() has a strange calling convention that makes it slow, or fail +# altogether, for high-numbered file descriptors. The point of poll() is to fix +# that, so on Unixes, we prefer poll(). +# +# On Windows, there is no poll() (or at least Python doesn't provide a wrapper +# for it), but that's OK, because on Windows, select() doesn't have this +# strange calling convention; plain select() works fine. +# +# So: on Windows we use select(), and everywhere else we use poll(). We also +# fall back to select() in case poll() is somehow broken or missing. + +if sys.version_info >= (3, 5): + # Modern Python, that retries syscalls by default + def _retry_on_intr(fn, timeout): + return fn(timeout) + +else: + # Old and broken Pythons. + def _retry_on_intr(fn, timeout): + if timeout is None: + deadline = float("inf") + else: + deadline = monotonic() + timeout + + while True: + try: + return fn(timeout) + # OSError for 3 <= pyver < 3.5, select.error for pyver <= 2.7 + except (OSError, select.error) as e: + # 'e.args[0]' incantation works for both OSError and select.error + if e.args[0] != errno.EINTR: + raise + else: + timeout = deadline - monotonic() + if timeout < 0: + timeout = 0 + if timeout == float("inf"): + timeout = None + continue + + +def select_wait_for_socket(sock, read=False, write=False, timeout=None): + if not read and not write: + raise RuntimeError("must specify at least one of read=True, write=True") + rcheck = [] + wcheck = [] + if read: + rcheck.append(sock) + if write: + wcheck.append(sock) + # When doing a non-blocking connect, most systems signal success by + # marking the socket writable. Windows, though, signals success by marked + # it as "exceptional". We paper over the difference by checking the write + # sockets for both conditions. (The stdlib selectors module does the same + # thing.) + fn = partial(select.select, rcheck, wcheck, wcheck) + rready, wready, xready = _retry_on_intr(fn, timeout) + return bool(rready or wready or xready) + + +def poll_wait_for_socket(sock, read=False, write=False, timeout=None): + if not read and not write: + raise RuntimeError("must specify at least one of read=True, write=True") + mask = 0 + if read: + mask |= select.POLLIN + if write: + mask |= select.POLLOUT + poll_obj = select.poll() + poll_obj.register(sock, mask) + + # For some reason, poll() takes timeout in milliseconds + def do_poll(t): + if t is not None: + t *= 1000 + return poll_obj.poll(t) + + return bool(_retry_on_intr(do_poll, timeout)) + + +def null_wait_for_socket(*args, **kwargs): + raise NoWayToWaitForSocketError("no select-equivalent available") + + +def _have_working_poll(): + # Apparently some systems have a select.poll that fails as soon as you try + # to use it, either due to strange configuration or broken monkeypatching + # from libraries like eventlet/greenlet. + try: + poll_obj = select.poll() + _retry_on_intr(poll_obj.poll, 0) + except (AttributeError, OSError): + return False + else: + return True + + +def wait_for_socket(*args, **kwargs): + # We delay choosing which implementation to use until the first time we're + # called. We could do it at import time, but then we might make the wrong + # decision if someone goes wild with monkeypatching select.poll after + # we're imported. + global wait_for_socket + if _have_working_poll(): + wait_for_socket = poll_wait_for_socket + elif hasattr(select, "select"): + wait_for_socket = select_wait_for_socket + else: # Platform-specific: Appengine. + wait_for_socket = null_wait_for_socket + return wait_for_socket(*args, **kwargs) + + +def wait_for_read(sock, timeout=None): + """Waits for reading to be available on a given socket. + Returns True if the socket is readable, or False if the timeout expired. + """ + return wait_for_socket(sock, read=True, timeout=timeout) + + +def wait_for_write(sock, timeout=None): + """Waits for writing to be available on a given socket. + Returns True if the socket is readable, or False if the timeout expired. + """ + return wait_for_socket(sock, write=True, timeout=timeout) diff --git a/www.photopea.com/code/pp/pp.js b/www.photopea.com/code/pp/pp.js index c656774..39e59dd 100644 --- a/www.photopea.com/code/pp/pp.js +++ b/www.photopea.com/code/pp/pp.js @@ -12641,7 +12641,7 @@ this.Tf()};co.prototype.GZ=function(w,n){this.ww=w};co.prototype.f=function(){dB for(var L=0;L",I),$=j.slice(0,g)+"< I=$.length;j=$+j.slice(k+1)}D[1].innerHTML=j}else D[1].innerHTML=fV.get([0,17,2])}var C=document.getElementById("sponsors"); if(C)C.textContent=fV.get([0,17,4]);this.ML.f();this.SP.f();this.cM.f();this.GX.f();this.El.f();this.NV.f(); for(var f in this.a.map)if(this.a.map[f].n8)this.a.map[f].n8.f()};hB.prototype.WW=function(){var w=e.eH[hk.Xe][hk.a3$]; -if(w&&w[1]){if(w[1].endsWith(hk.Dn("UUPSDm@ID")))return!0}return 4uRLSNtDWl}O;Enam>y#D{Zfj{2@%utSY!zV$l2NoYRIPpJb7ERVLl zeT4||#Arls5ML!z-BD7%^)LHEffX&kUBK76y=!MTZfLn>fCagbL75mj==6GAmYp3# zKtUPoo{1sE-JvxKwBl4!>moG9NRQVW)`0`>#;w2n1Y`vNVVLc<|Dlc&-d6cXWUV_I67sb-7Od10RcE{e+hx`LugIPd`uW7)-Jb9^SXt zF_KJJ1)TMX*zDSDry@90O#Vok&1JC5A@HOvwn_!Tw4-+gAfX3*p~Rh+r^f+Zuk+O# zK}#Z^Lco?+mrhadik+T}up(7BjKSs2Mt_J!KkQlFNP=)*%aQ9A@gl>tSln_v^jWs_#xU1a{u zhwr3$4m3r5&uFm#)D^Q*Jw?zPrki!0T7EG;%x4?A3Z(qT z4^=ijWMm}px=c;Dm}!VEEdo6F@kIYuJR-Aty>wK(2Qy6Ii{Dz-{gjF&GyGR+hJr!) z-a|-Q?}`;Mp8&S%m1U|-LZi~ne2|1u;hP*8CU$)A(MfOo_`!+lSA_6ZVPhfiD&1Ljgyhs; zJ1CJ!*#~lK^s9sZT2()ZlBokjIBTmur!sUl=ges9#7`Y{bVR%A_t_8Hu+}kW-ujFJ zB1XoL-K`{{m2oBf+qETD;lk<8NZTq4qHoevj`Xx4JBW6VmgW8mlpd+mwp#iO_5N>7rVQ3Hb0x zs)W^i?wi<%I)}IrG@Y}$eY4SiuglbTR2F1_;v<|Bvw_hfe1bo7EM>)I4wgM8LMq2I z=4h?Kg2#AO@;|6;hqamYJfIPxpcnc{hRR~>wKXc~69!mE?OnlwUj^~gyZ=i^P=)pq9cjMAe{yoVi6{Dh8jZNnYP{>Erc_W8W|r& z>*dHG+DTh4rw4&ER5yhj4j?9Z=ByF@phfXgEj#<8SURkGEVY{SU60PbU#)i~4Y={d2 z8YMa#IO!N71pt?FRHt5nzLeM{HUceS156>>Roh2OIYVMK`_p|#E_)jqQGH^m?=r`F z%JR7*_@`$WBMUT>RPKn_wmocjFlyWPc|S$r*e8!15hZILnQ|ZT6mu57JCJMa)fe}# zDz2S~RQ?D>Lt5l`5n3ZQw{$(iz*9VU)XjFughqS714-M-5hRx*!fo~?wW&O_nFy? zZOx9$vB4F~Usi+|LRCU#AZ{m$UEaTv-;a?fQw5J+G;O8^E~alI^=gXYrEFu=B1 zN`$ak%IL%n4Fq=HLW&%ZR(ZtK3AerRliSUc@nj(;bc;hgqjc2#yIHclky3}x3cJQx z9Hq_Rp4MZ-*_FA@LU{`S8xG*56>gF_rLE0ocj3TYc-v3IZg$FXPIW;{^f$d3Y za#xOG%U>Ia?a-Lt+?4`iwoVUQCRJ=hKZjpzRGU!dQzuo2Eyi2=%dY^~S<^>vfECZ( zS@vx9)>?ik%g6NT(KUlnx9s9-yxOd|!zoggs7^*Mw2hj4)&vlpR}ybC_OU)|vim|@ zjMbhe@VqTP^ z<%y{*W#c3Iq4Sp~c1gD%W`6>LKcJhO0oF~o&~S$~_s zBUJJL->d%3k@))~HyUq_3k`C1zwLQOk5ur^HOQGQ-PaVOEH~74n*qV|;QfsICt##1 zH^fS;TYzJ!qiNjy$u6i2{Lqvv(a2Nq*)(2rMYzQq`fx~|NPnDLI_3q)?hxN0yf^55 z_eZD{usm+q&bpwh9C%hrN&fP?6urod&AuP%1E~P7m%)#2D3@aSy31O3T>F-R`A~1c zyXb-NAw|=Ho8UJApMK1IP;HKg`EE&>6i3Q>r(}KgArMXZW@-(Ng#SfZLTdL# zAqGAKdc25w$$k6}?V8xVh3+w#CaE9Jnu4C32uBLj(D2F|6ekvZf6_vFlaV|GB zk<0H}b|Ay<^j4lI1AGj)>O-d*IC&L*chI1D&bY{)r?usVuu9Z=e@4x49TXr`@|!(bbByyzrPRDd z<_+>mo5{?(^dxL$i@fTb2-R>MoSi{P{?R|p{2%88F`!F+-Qf@B-2N}y!YvcY8x`Y^ zb<1vwDurC7GTRc#zZA5)#7!%ux;vY%by)5OQgvKVVks`Vq8-zSq3_y=kG_KMcF^lFJnN?xJ4-O03RUM5NU;w`51XdS zGwsz8@6jY_w{t=E>oAHp#1QP3LQj$;K;{xA&SQc)i|=7Mr%%ROUYkgZVW&pYcyqvV znf`f?=cSd1H=AlN^^`+aKoxZIzX(M4}5=w+B_*ZJ!*8y z(K)ZpGmOW>DF#hJ;WCGVt26jR*f}=(zB~o|-cMobLG+ ze$J#??IqMKmvqllCD#E_WbDKsHJZ7{w_dTiI9&S^HS${v!T;__!@y~wh7<*E4d zSN?fVfDvM;GjgbuB+Vruvdm02oB8$KSPKiaMxG;rddhY;#!pRVeeFL@NziMi?3f+z zWDucs=r4}_)aVlSRX#2aFR|rrN8%VN(jj!D<(%jOvOpqmkM`4C+frb;-}glOhk__I zqDI8fMb91`F#j4vW=~EYmGF&vHb#yp@y}Ya#CWF*s0z)tx7WwO#Jjkgw`F+23H}J5Zu_Pxt(*nxqS|)%P>XB}fkm z6*(J;zkohM=1DKZOM1H~OFHL~1f4wC`6y}f*`3K9 zK?{V#rd8#5^rEDaHN|OWyexxZQx)}zE_54Lj+^943sldX!bo|j+v_5gnIq&^^LtaYsAnD+Q%j-O_?`~f1=TEDZ>xUx0agXpq#(Lgc9M)1cM=nHZNEO~6Q0YJN z1F+BU%=_dDhh^H0KAD#Wxh4Hrz-5z3Rd`qsUo=(~wL@P**ksS_n{*Kj%8w%6pp*+L zNTsbYUK59a#>#baSHeqwtLnx0h?So}=jijAeIW~A)3Hlfkmh^ zur@G^mMa8rcBSc{=2l5QJrshB!+N*wb0qk5dBE!8_cWgVyq^dEm1O-kjG_wgVXF(E zZD(O;+bAYA^kF((`_xuUiXTUn?Bw)&gOf);*~cpwe*Wk^ww(HSpYMSZm29#(sHQ)t zeK=L=Eu~L;*Ge~e^UE0{@_j9#oj3+CTN|6Je+n(K48^iSNA_>cM=rpR93nQ+WH{XQ zvd}nxHg`2QOKszMY3aidLsS{tP;)lyL8#WJ5RX}vjFQ-Fs3gyk2?~D7*vwJvdNY2D z?_Tg5Tc>si)D2ZeG|)<6Y>u+J*US^JYU>572>sRy%Q25>S(kLiH!>L87xGM9)H&tIr3(8#Xi~CN;R2tw(&Cr!AcPEl{GwSJ#@unx=e7JxK$YLaU5p1tT@RA)k;8dUTVN>6JA5R;BFH z-RG1f_L_9wWP0H?&SH47z1q)Wi)LI~1EH`npJ=F4-Fzl2b0G zViWk3I4#s3)!2)E?f51pPg-)+#`|Fdm9H79@dZ9hglt;(F>gOMZnbjCd9dfcOaCav z^g_szpOsH;&ZPF%P-1<2waVpF-Fb~*Uul-zbqR;DC|4x@lANG*tIr~`{+MVuuZG&2FCaR7c+is{RN&MwC1f1HU25oQ8tv1u(F*wo$G zc2dR^e&OdGj2{vrMLOezs7~vJ>c@h5GLV)+OvxLJxEX`)ul^TmfX?1;N59_z&I0u# z9nGnNMGWhGO^kh$0A3Np`0eWD+wr>xhmv1iU~QDp0^!c>cmpEh(5Mr{On_vNu(I`+ z9i~?VHWc9&)g^sFb*mD<$N9+}!s^TW(8FK&G*ApfQQ*mg9|I`~=t*pqu)6!%5+Z3d zMG%`OtUiQS<{0bUBt+Hh#cK$5i24_-_~}Tmez>lhJLjYl?$dQLiWJOz&@fa)ikOVHJ_2{{lf6=Lj?^Edgk2 zS-RK*e(ghw-IDH@eF~RoSRfDlUofzdez8C*s^lMwW5FiCXqGm-+dnAY0HfKo4|%6{ zN_Dzbx~l!3b(}XX%|G^W;e3MG30wX zUk$@8vKAAr)sHg6yl2IyeG)+C(F)^J=|ts*4n3UsC}`tm!2qwYbE`&)pps8O!J|_J z1P3Eg+iEE7Hfdc^gW7WuD)2dR>`Vvy`dpwcN-$bwXN4s~z@IShw)^?LV{}Fo3yC2A zXuPueT7r(s2vuTlVpS&hXdi?I=GgQ>p(x;qF~4MAXyy zjSr*@wK=*}??Y0bc^jaH4^Gxilk~FY$$yW+0vr1K$!I!@?ho|TEH!LYQeyZ8F)-#* z-ep(7tJ=$NM9;p6u5_!YljZ8nRhl$`5N66ko|!CgZIj-5mE7@0F;w?^Bj+au6x^cK zBUCKWFNCp&snrtqaI#X#gV9#=*`u+@9!Cz8Rty47M3E)ks!s_1X^YA&t#!v&Uk%Qu zI@PCq@(21p7iviSVBPXAKk1(Rn7t-$Yco#sZyDn+|F=3-G!M=#eCl2IAExRbc}_$U z#}EhLbTLD{NZm8IM3C3>W4Bvla3BRF{Ut#E!v%28-*jMpHJ$_IkOi~+1o!Hjc?@F;m35bdTFuk;FgGdpZ>CtP~Ob;`o29 z{z*|3Fj=k#*yzQqlEtF33v1cDUs%!F#`7dmeF*F-nheDi<(8sU4|1YN&#$ zPu~fQ$ca6;T4s%_@Cbp7YZ_?zD@M=lS}cX*2dU=mfafaA%hx*E8(3a zrPg~xGzvvfnszJ&UqN!+Xr(*1{-{S- z$r(b~pymyn4NwxEK=XhbqVh9&7OH(XP9%j^5=}#Fe}1u2%g7BuaUM)Is0$kx{Co_| zzB6J-8gD5XbXyILZy9v@bwZ@j@vVs~*Hp<2A@gDIJsk#!PXp}yiOrBUV)>n)JEbkE zjI*}&7#`0C`606DQ#DsZHszT@1nKf}d0Vzfs~KLFLfO#pqk_+#4Z4xQ0L&0=MhJ7t zL>A~gE#GCKVn?22QyQl5%@vbFOSs~T;FPZs?*c80TYe`U%u9eLG0HaCP6DAJ;C`P* zet?tCOGllT9*`Aj%L98TAAc29J0Fvz{ITE@BM~t3BPu{V2CWz(!i6bRCAM=Uc}*8+ z-HT-FuWWMw4F6J=3YcX)KS=C$RcH<4LP|D7skQoxe`}dmd+x({o$HD4di;@rB*r-P z`{>q)TUk$ZCU-QSUPG+qV8XGJf}Uqkw^;Q?H5w+MQTE3-?0`zozzu9!8gqy2pQ6p- ztU}<#WpgBEIl}EIlFH`IMs^JQo)R8-Y~2+78#4BSv2>tO`BZymYwpWaC?3;Hgsz-? zsp{&Tx4#qf53yZDRMG=xiiAzynO-f{^v#n>z_^6gWonxv8Iz9hd+xq8db4qsOXz!M!9pYeR}r3EIy?R(U-unu714yspox r1=Cfp7g9l6(Eq!({yT!eI}hEm8kW_H=rzV2zvF4DJyNYwwuSv4n)7cr literal 0 HcmV?d00001 diff --git a/www.photopea.com/papi/tpls.json b/www.photopea.com/papi/tpls.json index 6b9c983..c3ca256 100644 --- a/www.photopea.com/papi/tpls.json +++ b/www.photopea.com/papi/tpls.json @@ -34,7 +34,7 @@ },{"c0":"Default"},{"c0":"Default"},{"c0":"Default"},{"c0":"Default"},{"c0":"Default"},{"c0":"Default"},{"c0":"Default"} ], "authors" : [[1, "Photopea"], [30889, "Michal Krzywania"], [186404, "MonstyrSlayr (MonstyrSlayr)"], [205931, "Kickass Tuber"], [206182, "hxim"], [206910, "Lunal Graphics"], [208253, "UnBest"], [210704, "mostafa mohamed"], [218023, "Cameron CAMBIT"], [220423, "Logan Weir"], [233072, "stoney"], [238401, "R\u0131dvan"], [246833, "Rinku Ravi"], [258474, "M\u00fasica Produccion"], [279052, "Maren Ortega Arlegui"], [283073, "food"], [289060, "Cal CoachesFX"], [308527, "CryptoBanker"], [321474, "\u0627\u0644\u0642\u0627\u0641\u0629 Agave"], [324863, "Aprameyan R"], [340495, "Games Bulletin"], [368079, "GaleFight"], [368363, "Gareth Edwards"], [382482, "Odyc"], [393362, "Joinability"], [393980, "Shuutoka"], [401270, "\u300e\u0f3adabcatz\u0f3b\u300f"], [406586, "babydej"], [413192, "Ahmed Lloyd"], [414679, "Ariel Bristol"], [416002, "Carlo"], [426548, "Christopher White"], [427446, "musa"], [438548, "kixxu"], [457393, "0_gpl Studio"], [458757, "Doodle's Playground"], [462430, "AtmajyotiBasu7ERoll 7. TamoghnaBasu6CRoll 5."], [463954, "Oscar (OsCat)"], [469793, "Sami"], [475463, "Luke Palios"], [476699, "Alexander Dvametry"], [479302, "Mark Anon"], [479643, "Aranganathan Arumugam (AK)"], [484724, "Jude Mitchell"], [485170, "Sahiwal Media"], [486021, "bofa"], [488986, "Faria Akter"], [488992, "Shamsul Arefin Khan Shams"], [489375, "The Lifebringer"], [489615, "Gideon Bispo"], [491847, "Lux DL"], [492066, "Numerous"], [492113, "noka"], [492123, "Lucia Brander"], [493100, "Alberto Hernandez"], [493851, "Binyamin Szwarcfiter"], [494208, "Laura H.-C."], [494887, "Huaidong Tang"], [495065, "iChoake"], [498694, "Senin \u0130\u00e7in"], [499203, "Pandgum"], [500652, "Micheal"], [500861, "AAQIL"], [502399, "danq danq"], [503072, "\u0421\u0435\u043c\u0435\u043d \u0418\u0437\u0432\u0435\u043a\u043e\u0432"], [504352, "Cheyenne Miles"], [508813, "Photopea"], [509757, "Yaman Kumar"], [511639, "The Dead Dev (D3V & Games)"], [514283, "James Gardener"], [515531, "Dex (LuaDex)"], [516863, "Numerous 2.0"], [516875, "Rami Alloush"], [517921, "Bini Design"], [518718, "Layfy Arts"], [521298, "Angela Aganap"], [521999, "Iskandar Shah Bin Immrah"], [522801, "Selim Bulut"], [523082, "fatdia tv"], [523442, "James Prendergast"], [523943, "VAPEG"], [524148, "GUMP (GUMP)"], [524962, "herman chiu"], [525163, "Bob Kennedy"], [526600, "Kosmic Dragon"], [528859, "Trxnn"], [530810, "Roniew"], [534818, "Imaad Arain"], [538129, "Shaw Salvadore"], [542288, "Nog 13"], [543632, "Felipe Siqueira Reis"], [546054, "swapnil patil"], [548447, "Amit Tharval"], [550200, "Ryan Galeas"], [553211, "Interstellar Official"], [553255, "store radsazeh"], [554508, "theunknown guy"], [555639, "Scein 10"], [556492, "M. Fahad"], [558902, "Galaxy Gamer"], [562528, "ColmPlayz"], [564636, "Tutorial Editing tips Channel"], [568668, "ShadyDoesStuff on Twitter"], [570932, "Arai Atsuzawa"], [572533, "Becky Buttons"], [573228, "Cam"], [573647, "Sheyla Ramirez"], [576226, "Giles Taylor"], [576342, "Tuesday"], [576515, "Zanele Theron"], [579229, "Alissa Camarillo"], [584090, "oGrqpez"], [585803, "Salafay Salafay"], [586788, "Zaruki\u00f8"], [586847, "AHAMAD"], [588574, "Noah C."], [589605, "Yaemori"], [590294, "Obukohwo Oke"], [594929, "Jessica Hawkins"], [595996, "Katrina Duncan"], [596039, "Gael Level"], [596404, "L\u00ea Vi\u1ec7t H\u01b0ng"], [597576, "james bearinger"], [598073, "KAMAL KANG"], [599538, "Tuna K\u0131l\u0131\u00e7"], [599605, "Minecraftilehm"], [604998, "Monster Bla"], [605700, "Au Silk"], [605809, "Antimo Foglia"], [607002, "carlos aguilar"], [607908, "nooone asked"], [609185, "Kevin Tony"], [612292, "Reyna Navarrete"], [614487, "Damian J"], [616651, "Nicole Plumey"], [617814, "andrianDC"], [618519, "L -Jay"], [619621, "Valbon Jorgangji"], [625371, "Wikiredia"], [626627, "Redus Russ"], [627911, "Savage_Dev"], [628756, "Fathiyah Karimah"], [630008, "viserion comunica\u00e7\u00e3o"], [630162, "Awesome Gamer"], [630787, "computer user"], [631312, "Kalmeshwar Gurav"], [631340, "Leafy"], [631446, "Ramazan Arslan"], [631597, "classik_edittz"], [632493, "Julie Boulangier"], [636554, "Rylan"], [639438, "C00lboyplayz"], [640281, "Zapro Creations"], [640656, "Martyna Kolasiewicz"], [641415, "Aimee Young"], [645880, "Jamie Lumsden"], [655811, "Do ggie"], [656614, "Lukas Smith"], [659309, "GraphicsFamily.com"], [660124, "Tay Townsend"], [660678, "XMDT-SMMO"], [664017, "Maggie May (Maggie)"], [664170, "AARADHYA TIWARI"], [667909, "Jan Karl"], [668750, "GamePlayesYT"], [670273, "youtuber klad"], [670508, "Sequtive"], [670573, "CHASE HAVENS"], [672101, "Kenzie Aleron (Kenzie)"], [672491, "Jorge Carretero"], [673168, "HB SQUAD"], [674167, "Sora"], [674783, "hi there"], [675654, "SpazzFN"], [677212, "Abido.ma"], [677828, "Catur Prawoso"], [678159, "Stiven Mendez"], [678735, "CEO Neumzy"], [682451, "fhfadsjkfhas"], [683997, "Dhokebaz Ishq"], [685347, "Louis Bryan"], [686242, "Dangelo_omg839"], [686334, "Doiphode Ganesh"], [686346, "The Yali"], [688004, "chat"], [688400, "Lindsey Dyck"], [688728, "XEST.CF"], [696699, "https:\/\/t.me\/mehithegawd\/1498"], [696922, "Davide Di Stasio"], [705941, "SPA GROUP"], [706438, "Lucas Henry"], [713625, "StockElementsFX.com"], [713895, "The_Roblox_Bacon"], [715740, "Abdulrahman al-Anesi"], [718365, "Eric Johnston"], [729923, "Quinn Giese"], [735306, "Vikhyat Agarwal"], [735585, "MYQUNTA"], [735788, "Cristian Stg"], [735946, "Nicolas Levet"], [736536, "Fe4r Break"], [737789, "cc"], [738652, "IceGuz"], [744007, "John Dor"], [745832, "manthra.design"], [745917, "Rui Duarte"], [748057, "Enrique Chanona"], [749280, "movie"], [749452, "RBXMonkey Creations"], [749657, "Daniel Velez"], [749749, "Design Hub"], [756775, "Mateus Soave"], [758697, "Axel"], [760221, "Dolphinboy_Playz"], [762295, "Ben Sulley"], [762992, "Dmitry Pavlov"], [763528, "Th\u00e0nh ID"], [766521, "casen Evans"], [767998, "Zeropie"], [768480, "Henry"], [768731, "InvenTex"], [769709, "Stumble guys banner"], [770251, "Sharlene DeZolt"], [770653, "D Patel"], [772483, "wqet"], [777139, "Raven"], [777876, "Apengg"], [777994, "ramzim"], [778954, "helmy gold"], [784491, "Colvas"], [784737, "While True"], [785663, "Just 21"], [785694, "NYC-Roblox"], [786183, "\u041c\u0430 \u041f\u0430"], [786278, "bron"], [786370, "Chief"], [786442, "Sandra Feng"], [789932, "Zentastic Arts"], [791621, "Crazy clothing"], [792406, "DreamLeon"], [792516, "NV"], [793722, "lilly"], [793834, "ruuo"], [794173, "Dylan"], [795460, "Bellarei Bijoux (Beth Hilton)"], [798022, "Reje hornsworth"], [798468, "Gourav soni"], [799354, "Lobsang Tsultrim"], [801432, "cartoon art"], [803770, "ely Yeaman"], [804101, "SimpleSloth"], [806225, "Infomercado"], [807025, "Rocky Perro"], [807283, "David Allen"], [807315, "adeies"], [809086, "Ether\u2019s"], [813087, "Isaac Fleming"], [815306, "Fabian Paci"], [815527, "Mohammed Nour"], [816429, "ghhghg"], [818414, "Akiyu"], [821677, "Leevi"], [822967, "Kemma Elcock"], [824267, "Vivian Yeti"], [826760, "HaReL"], [827057, "Matthew Jenkins"], [829046, "Lucas Thadeu"], [830677, "Marco Antonio Hurtado"], [832354, "Janet.badenes@alumno.fomento.edu"], [834933, "SkuoBatz On Youtube"], [835184, "Pancito Dev"], [835836, "MartyGamez"], [836837, "heikomauel.de"], [840283, "Melanie Stofcik"], [841005, "NoezxcHub"], [841338, "Templates youtube"], [841509, "Allawi Dev"], [842242, "kiuytr"], [842248, "Santeri Holmi"], [843204, "ChenequeTV"], [845963, "Allan Sam"], [846262, "ericc"], [847790, "ZeruStation"], [850808, "Spewy"], [853236, "Angele Djioleu"], [859605, "TripTeamMusic"], [860806, "Rupkanth Avinash"], [864234, "Sarah Elizabeth Ketron"], [870053, "digitalic"]], "list" : [ - [0, 0, 1598900378, "AhPFS6c8", "https://i.imgur.com/nRleorO.png", 15, 11537, 1756, 19762, "Glitch Effect", "Double-click the current Smart Object and replace the text with something else."], + [0, 0, 1598900378, "AhPFS6c8", "https://i.imgur.com/nRleorO.png", 15, 11538, 1756, 19762, "Glitch Effect", "Double-click the current Smart Object and replace the text with something else."], [0, 0, 1597044186, "1OQ7hpau", "https://i.imgur.com/H16QAeI.jpg", 12, 1868, 557, 1276491, "Your Favourite Recipes - Pink Fruits", "A template with a pink background with a dragonfruit, oranges and a rambutan. A great template for your cooking recipes!"], [0, 0, 1597044224, "ZDTlyIOT", "https://i.imgur.com/OEijCJ6.jpg", 12, 2318, 744, 241255, "Cooking Template With Desserts", "A template with a breakfast: waffles with fruits and a coffee. Food and cooking template."], [0, 0, 1597044258, "GHtge8Dl", "https://i.imgur.com/Rhok81o.jpg", 12, 7474, 1781, 108376, "Food and Recipes - Sweet Toast", "A breakfast with a toast with blueberries and a banana. Food and cooking template."], @@ -53,17 +53,17 @@ [0, 0, 1597044860, "QvTx54G2", "https://i.imgur.com/t5TOl7R.jpeg", 12, 1219, 295, 239181, "Yellow Summer Beach", "An illustrated woman on the beach. A white text on a yellow background."], [0, 0, 1597044914, "49TSUmuX", "https://i.imgur.com/J5SNilY.jpg", 12, 2573, 1094, 161043, "Swimming Pool Template", "A woman sitting next to the swimming pool. Summer Template."], [0, 0, 1597044944, "PoYrGpEh", "https://i.imgur.com/R4n7jKL.jpeg", 12, 1318, 310, 343232, "Blanket on the Beach", "A colorful blanket on the sand on the beach, next to a watermelon. Summer Sales."], - [0, 0, 1597044989, "WQGVADJb", "https://i.imgur.com/aIG9mCA.jpg", 12, 7767, 2348, 390710, "Girl on the Beach", "A little girl splashing in sea water on the seashore. Summer Sales."], + [0, 0, 1597044989, "WQGVADJb", "https://i.imgur.com/aIG9mCA.jpg", 12, 7768, 2349, 390710, "Girl on the Beach", "A little girl splashing in sea water on the seashore. Summer Sales."], [0, 0, 1597045014, "LWrLIKaq", "https://i.imgur.com/8rstLgn.jpg", 12, 2956, 946, 114775, "Stairs to the Pool", "A yellow concrete and the stairs into the blue swimming pool. Mega Summer Sale."], [0, 0, 1615816370, "nZleGUbA", "https://i.imgur.com/BrEt16C.jpeg", 14, 11400, 3201, 123378, "Drake Hotline Blink", "Meme template, not this, confirm that, yellow, orange jacket."], [0, 0, 1615816923, "kN6Yq6ky", "https://i.imgur.com/jgiXWYJ.jpeg", 14, 4672, 1262, 109190, "Distracted Boyfriend", "Meme template, boy, two girls, looking at another girl."], [0, 0, 1615817122, "3w69c920", "https://i.imgur.com/wm2LwPY.jpeg", 14, 2384, 612, 98146, "Expanding Brain", "Meme template, brain expand, blue universe, skeleton."], - [0, 0, 1615817466, "XjwWxxs1", "https://i.imgur.com/UqGOwOQ.jpeg", 14, 1655, 459, 47529, "Waiting Skeleton", "Meme template, skeleton on a bench, waiting."], + [0, 0, 1615817466, "XjwWxxs1", "https://i.imgur.com/UqGOwOQ.jpeg", 14, 1656, 459, 47529, "Waiting Skeleton", "Meme template, skeleton on a bench, waiting."], [0, 0, 1615817748, "qBfZo4wn", "https://i.imgur.com/M1un2Rh.jpg", 14, 2330, 624, 56850, "Roll Safe, Think About It", "Meme template, think, mind, finger pointing on a head, smart guy."], [0, 0, 1615818153, "-YUMQGS5", "https://i.imgur.com/Bw2soXU.jpeg", 14, 882, 188, 174589, "American Chopper Argument", "Meme template, guys arguing, throwing a chair, fight."], - [0, 0, 1615818821, "jrroVBEE", "https://i.imgur.com/ZJt36be.jpg", 14, 1574, 541, 52677, "Finding Neverland", "Meme template, boy crying on a bench, father hugging, Johnny Depp."], - [0, 0, 1615819766, "riFZgmuz", "https://i.imgur.com/s702Ga8.jpg", 14, 1347, 370, 70165, "Types of Headaches", "Meme template. Heads red areas, migrene, hypertension, stress."], - [0, 0, 1620806515, "70imObZ3", "https://i.imgur.com/5GcK3x5.jpg", 15, 98284, 36431, 44547, "Bold Sign", "Bold Sign: 3D effect. Type your own text. Modify the hue in the adjustment layer."], + [0, 0, 1615818821, "jrroVBEE", "https://i.imgur.com/ZJt36be.jpg", 14, 1575, 541, 52677, "Finding Neverland", "Meme template, boy crying on a bench, father hugging, Johnny Depp."], + [0, 0, 1615819766, "riFZgmuz", "https://i.imgur.com/s702Ga8.jpg", 14, 1348, 370, 70165, "Types of Headaches", "Meme template. Heads red areas, migrene, hypertension, stress."], + [0, 0, 1620806515, "70imObZ3", "https://i.imgur.com/5GcK3x5.jpg", 15, 98291, 36435, 44547, "Bold Sign", "Bold Sign: 3D effect. Type your own text. Modify the hue in the adjustment layer."], [0, 0, 1623865612, "QSV6D5Gr", "https://i.imgur.com/wRx0n0M.jpeg", 15, 31656, 16377, 43485, "3D Sign", "This is a text with a 3D effect. \n\nThe Hue adjustment layer lets you change the Hue of the result."], [0, 0, 1624285529, "oswpYsHc", "https://i.imgur.com/XAArVEH.jpeg", 15, 3475, 2039, 67511, "Vintage Sign", "A template for a Vintage Sign text, 3D effect, drop shadows."], [0, 0, 1624292973, "hR2QlXuE", "https://i.imgur.com/2Ab5xzi.jpeg", 15, 1292, 352, 60403, "Summer Sales Sign", "3D Sign effect, Black Text on Yellow Background, glossy.\n\nEdit the Smart Object (double-click the thumbnail of a layer)."], @@ -71,7 +71,7 @@ [0, 0, 1629027329, "YRhAHZ3E", "https://i.imgur.com/0YYKaTL.jpeg", 22, 4510, 1081, 1081005, "Party Flyer", "An invitation to a concert or a party, or a rock festival. Just fill in your own text. You can replace the background photo, too :)"], [0, 0, 1629027754, "yz-L59ux", "https://i.imgur.com/01YvoGp.jpeg", 20, 1390, 238, 7401717, "Brochure Template", "A free template for a brochure, a front and a back side. Fill in your own text."], [0, 0, 1629104061, "oBfXl5rP", "https://i.imgur.com/c5R8rIw.jpeg", 20, 1491, 594, 7834100, "Certificate Template", "Create a certificate, fill in names, remove the background."], - [0, 0, 1629104378, "iHBHbCZa", "https://i.imgur.com/aQD9Sag.jpeg", 22, 5105, 1362, 2377221, "Invitation Template", "Invitation to a wedding, or another event."], + [0, 0, 1629104378, "iHBHbCZa", "https://i.imgur.com/aQD9Sag.jpeg", 22, 5105, 1364, 2377221, "Invitation Template", "Invitation to a wedding, or another event."], [0, 0, 1630428812, "9UxUbJCN", "https://i.imgur.com/Frw3kYf.jpg", 24, 736, 126, 134997, "Resume Template", "A free template for creating a resume (CV). Just load your own photo and replace the text."], [0, 0, 1630428912, "3oc152-w", "https://i.imgur.com/aYBFuRm.jpg", 24, 707, 139, 679575, "Resume Template", "A free template for creating a resume (CV). Just load your own photo and replace the text."], [0, 0, 1630428969, "NVFkyNcs", "https://i.imgur.com/t5id5Kt.jpg", 24, 458, 83, 95022, "Resume Template", "A free template for creating a resume (CV). Just load your own photo and replace the text."], @@ -85,9 +85,9 @@ [0, 0, 1630662905, "EJ4La1Lj", "https://i.imgur.com/I5nfcch.jpg", 15, 2342, 1029, 21628, "Super! Neon Glow Sign", "3D text sign, replace the text with your own."], [0, 0, 1630663028, "0o6neJfg", "https://i.imgur.com/kjNcAP1.jpg", 15, 1837, 1044, 146019, "Metallic Grey Sign", "3D text sign, replace the text with your own."], [0, 0, 1630663169, "tpB6vZji", "https://i.imgur.com/kcbBgP1.jpg", 15, 4565, 2243, 66063, "Fantastic Neon Sign", "3D text sign, replace the text with your own. Blue Neon on a purple background."], - [0, 0, 1630663242, "a75eYlc3", "https://i.imgur.com/493UB7b.jpg", 15, 8955, 3968, 166620, "Burning Sign", "3D text sign, replace the text with your own. Burning Fire on charcoal."], + [0, 0, 1630663242, "a75eYlc3", "https://i.imgur.com/493UB7b.jpg", 15, 8957, 3970, 166620, "Burning Sign", "3D text sign, replace the text with your own. Burning Fire on charcoal."], [0, 0, 1630663298, "mGnCDNiW", "https://i.imgur.com/nsKbxB7.jpg", 15, 1007, 530, 164790, "Horror Sign", "3D text sign, replace the text with your own."], - [0, 0, 1630663428, "ggzthM22", "https://i.imgur.com/dSec3Om.jpg", 15, 16894, 6394, 208930, "Green Earth Sign", "3D Sign, replace text with your own. Green text on ferns."], + [0, 0, 1630663428, "ggzthM22", "https://i.imgur.com/dSec3Om.jpg", 15, 16896, 6396, 208930, "Green Earth Sign", "3D Sign, replace text with your own. Green text on ferns."], [0, 0, 1630663520, "jPDI_91H", "https://i.imgur.com/rQ2vvxq.jpg", 15, 1147, 572, 14575, "Gelly Neon Sign", "3D Sign, replace text with your own. Cyan text on a purple background."], [0, 0, 1630663624, "QkxqCgcu", "https://i.imgur.com/uyiNweu.jpg", 15, 5355, 2162, 14299, "Ice Melting Sign", "3D Sign, replace text with your own. Blue Melting ice and snow."], [0, 0, 1630679401, "I-Jhpwbr", "https://i.imgur.com/J8TaH3S.jpg", 15, 269, 33, 56570, "Retro Western Sign", "3D text sign, replace the text with your own. Burning Fire on charcoal."], @@ -98,22 +98,22 @@ [0, 0, 1634227700, "7mXU3fAC", "https://i.imgur.com/WsMACB4.jpg", 15, 746, 224, 2455001, "Grafitti Bricks 3D Sign", "Grafitti on a wall of bricks, add your own text."], [0, 0, 1634227827, "Hi5YXMb8", "https://i.imgur.com/1Bu5hyH.jpg", 15, 345, 227, 73673, "Thorns Sign", "White thorns text on a green background, add your own text."], [0, 0, 1634227937, "fHq0uQ0d", "https://i.imgur.com/aMovoiL.jpg", 15, 1849, 553, 146209, "Under Water Sign", "3D text effect, water glossy sign."], - [0, 0, 1634228078, "qWHZKZSX", "https://i.imgur.com/97Y0HoM.jpg", 15, 13119, 5921, 17438, "Liquid Waves Sign", "Text with the effect of waves."], + [0, 0, 1634228078, "qWHZKZSX", "https://i.imgur.com/97Y0HoM.jpg", 15, 13120, 5921, 17438, "Liquid Waves Sign", "Text with the effect of waves."], [0, 0, 1634228222, "Hcm4YKZk", "https://i.imgur.com/rTYY3fw.jpg", 15, 2958, 1512, 109696, "Antique Wood Sign", "Text on a wooden wall."], [0, 0, 1634228590, "0TYhEM4u", "https://i.imgur.com/LLdYexI.jpg", 15, 1957, 1056, 350400, "Vintage Distorted Sign", "Add your own text."], [0, 0, 1634228655, "DLnbRplv", "https://i.imgur.com/FPJO5DY.jpg", 15, 1124, 743, 18358, "Pink Sign", "Add your own text."], - [0, 0, 1634228783, "rh_aaIG7", "https://i.imgur.com/Tem2VN6.jpg", 15, 6084, 3802, 288858, "Sticker Sign", "Add your own text."], + [0, 0, 1634228783, "rh_aaIG7", "https://i.imgur.com/Tem2VN6.jpg", 15, 6086, 3802, 288858, "Sticker Sign", "Add your own text."], [0, 0, 1635777522, "ar7v1Jk7", "https://i.imgur.com/jXGDZgK.png", 60, 117, 4, 37966, "Box Blur Algorithm", "A visualization of a box blur algorithm, modifiable."], [0, 0, 1638889877, "gHChMMHH", "https://i.imgur.com/g8Vk6YE.gif", 16, 4421, 552, 790542, "Dancing Santa Animation", "Insert your face, or a face of your friend, and export a GIF of a dancing Santa! :)"], - [0, 0, 1640345839, "W4RMPCFN", "https://i.imgur.com/Gbj3RDW.gif", 16, 1189, 137, 977099, "Falling Snow Animation", "Paste your own photo and export a GIF with a falling snow on top of it :)"], + [0, 0, 1640345839, "W4RMPCFN", "https://i.imgur.com/Gbj3RDW.gif", 16, 1190, 137, 977099, "Falling Snow Animation", "Paste your own photo and export a GIF with a falling snow on top of it :)"], [0, 0, 1643018894, "e6Y3uf3z", "https://i.imgur.com/9LVYIwL.gif", 16, 4317, 608, 1077230, "Christmas Lights Animation", "Put christmas lights over your own photo :)"], [0, 0, 1644571172, "twl9HqX_", "https://i.imgur.com/tRIle5S.jpg", 14, 575, 170, 96171, "I Bet He's Thinking About Other Women", "Make your own version of a famous meme :)"], - [0, 0, 1648630058, "Z4UlfMNs", "https://i.imgur.com/5fLdkmR.jpeg", 14, 3805, 696, 95082, "Will Smith Slap at Oscar", "Make your own Will Smith Slap meme :)"], + [0, 0, 1648630058, "Z4UlfMNs", "https://i.imgur.com/5fLdkmR.jpeg", 14, 3807, 696, 95082, "Will Smith Slap at Oscar", "Make your own Will Smith Slap meme :)"], [1, 0, 1649602765, "tSp7058p", "https://i.imgur.com/RoBnkjm.png", 30, 0, 1462, 1729, "3D Depth Viewer", "Load an Image and a Depth Map, and view them in 3D!\n\nhttps:\/\/www.photopea.com\/tuts\/how-to-make-a-facebook-3d-photo-easily\/"], [0, 0, 1656865639, "dGtz_awx", "https://i.imgur.com/YW96xjs.jpg", 15, 746, 425, 33983, "View Count Sign", "A simple sign with one number"], [0, 0, 1662553052, "00zKZ0ge", "https://i.imgur.com/WN8kmvY.png", 15, 511, 179, 14153, "Bold 3D text with a shadow", "Create your own sign, 3D text with a black edge."], [0, 1, 1642377309, "jl_aFfHV", "https://i.imgur.com/KCJquBK.png", 60, 1426, 442, 453774, "Squid Game Mask Mockup", "This file was made for this YouTube tutorial https:\/\/youtu.be\/69mrnqF_LLw\n\nYou can double click and edit logo on the mask by replacing it in the smart object. Just paste your graphic there (Photopea will open second project tab) and after all save it using File - Save Smat Object. Or simple use CTRL+S."], - [0, 1, 1646207970, "48k8yCSY", "https://i.imgur.com/wlnBbzq.jpg", 25, 5434, 1029, 973832, "Certificate-Template-001-A4-H", "This is fully editable Certificate\/Diploma template. \nYou can edit all the text in the document and even change colors.\n\nThis template has size of A4 (that is common size in Europe but can be printed in US Letter size too)\n\nIt contains VARIABLES. What does it mean? \nYou can put your own CSV (for example Excel od Google Spreadsheet file) with hundrets of participiants with their own certificate number. And they are easily to export it with one mouse click to a ZIP file. No more typing by hand - lets automate it in just a few minutes!\n\nWant to know more about it. Please read: https:\/\/www.photopea.com\/learn\/variables"], + [0, 1, 1646207970, "48k8yCSY", "https://i.imgur.com/wlnBbzq.jpg", 25, 5436, 1029, 973832, "Certificate-Template-001-A4-H", "This is fully editable Certificate\/Diploma template. \nYou can edit all the text in the document and even change colors.\n\nThis template has size of A4 (that is common size in Europe but can be printed in US Letter size too)\n\nIt contains VARIABLES. What does it mean? \nYou can put your own CSV (for example Excel od Google Spreadsheet file) with hundrets of participiants with their own certificate number. And they are easily to export it with one mouse click to a ZIP file. No more typing by hand - lets automate it in just a few minutes!\n\nWant to know more about it. Please read: https:\/\/www.photopea.com\/learn\/variables"], [0, 1, 1646208359, "5Ce4yfUG", "https://i.imgur.com/A6JraSQ.jpeg", 25, 1205, 294, 971130, "Certificate-Template-001-A4-V", "This is fully editable Certificate\/Diploma template. \nYou can edit all the text in the document and even change colors.\n\nThis template has size of A4 (that is common size in Europe but can be printed in US Letter size too)\n\nIt contains VARIABLES. What does it mean? \nYou can put your own CSV (for example Excel od Google Spreadsheet file) with hundrets of participiants with their own certificate number. And they are easily to export it with one mouse click to a ZIP file. No more typing by hand - lets automate it in just a few minutes!\n\nWant to know more about it. Please read: https:\/\/www.photopea.com\/learn\/variables"], [0, 2, 1622685868, "48W_yWwX", "https://i.imgur.com/N02oAhj.png", 0, 224, 79, 14834, "top text bottom text", "for memes"], [0, 3, 1595367974, "GEiPiJ3G", "https://i.imgur.com/zc3YJra.jpg", 11, 1725, 842, 1485847, "Gaming Youtube Thumbnail", "Youtube thumbnail template for a gaming channel. Just replace text and images, and you're good to go!"], @@ -129,12 +129,12 @@ [0, 4, 1600245541, "coMZ_M8b", "https://i.imgur.com/zgqKQeP.png", 60, 2748, 116, 7815, "File Icon", "File icon template for any file format."], [0, 4, 1600246700, "Kz9gZey0", "https://i.imgur.com/sGx8FVU.png", 11, 1752, 705, 1257824, "Youtube Thumbnail Space", "Youtube Thumbnail for your videos."], [0, 4, 1600246711, "rvDqZeC7", "https://i.imgur.com/gd3ne9l.jpg", 11, 4458, 1240, 1400067, "Youtube Thumbnail Tower", "Youtube Thumbnail for your videos."], - [1, 4, 1649965753, "xA9dv3Ro", "https://i.imgur.com/CY9bDps.png", 1, 0, 2749, 133, "Emoji (Twemoji Plugin)", "Insert emoji to your project. Contains emojis from Twemoji (default), OpenMoji, Noto Emoji, Blobmoji, Emoji One and EmojiTwo. Use right-click to see all variants and CTRL + right-click for black and white versions."], + [1, 4, 1649965753, "xA9dv3Ro", "https://i.imgur.com/CY9bDps.png", 1, 0, 2750, 133, "Emoji (Twemoji Plugin)", "Insert emoji to your project. Contains emojis from Twemoji (default), OpenMoji, Noto Emoji, Blobmoji, Emoji One and EmojiTwo. Use right-click to see all variants and CTRL + right-click for black and white versions."], [1, 4, 1649966042, "hcU-j2_Q", "https://i.imgur.com/yocdas0.png", 20, 0, 1446, 145, "QR Code Maker", "Create QR codes easily from your URL or text."], [1, 4, 1649966268, "lKQwe9oT", "https://i.imgur.com/9df4vOi.png", 20, 0, 545, 143, "Chart Maker (Google Charts)", "Generates charts from your data using Google API. Supported charts are Area Chart, Bar Chart, Bubble Chart, Candlestick Chart, Column Chart, Combo Chart, Histogram, Line Chart, Pie Chart, Scatter Chart and Stepped Area Chart."], - [1, 4, 1649966342, "z_ccCMxl", "https://i.imgur.com/H4gsjGf.png", 30, 0, 1732, 145, "Adaptive Palette", "This plugin allows you to quickly pick an alternative color from different palettes (Brightness, HueShift, Intensity, Tint, Tones, Saturation, Previous, etc..). Special \"From image\" palette displays colors taken directly from the current Photopea project."], + [1, 4, 1649966342, "z_ccCMxl", "https://i.imgur.com/H4gsjGf.png", 30, 0, 1733, 145, "Adaptive Palette", "This plugin allows you to quickly pick an alternative color from different palettes (Brightness, HueShift, Intensity, Tint, Tones, Saturation, Previous, etc..). Special \"From image\" palette displays colors taken directly from the current Photopea project."], [1, 4, 1649966457, "CBIMJS4m", "https://i.imgur.com/sdFgsOp.png", 30, 0, 1363, 139, "Similar Letter", "Select letter with Magic Wand tool and enter which letter it is, then click button and it will offer 20 most similar letters in Photopea fonts. Can help you identify font from rasterized image (if font from Photopea was used) or find similar looking font included in Photopea to some unknown or known font in your raster image\/logo\/screenshot etc. You can also sketch shape of letter with brush and find some font which has simlar looking letter."], - [1, 4, 1649966545, "38LDuleD", "https://i.imgur.com/3MSF58R.png", 20, 0, 694, 143, "Chart Maker (Basic)", "Generates charts from your data. Supported charts are Column Chart, Stacked Column Chart, Bar Chart, Stacked Bar Chart, Line Chart, Pie Chart, Donut Chart and Map Chart."], + [1, 4, 1649966545, "38LDuleD", "https://i.imgur.com/3MSF58R.png", 20, 0, 695, 143, "Chart Maker (Basic)", "Generates charts from your data. Supported charts are Column Chart, Stacked Column Chart, Bar Chart, Stacked Bar Chart, Line Chart, Pie Chart, Donut Chart and Map Chart."], [1, 4, 1649966872, "OIUXsO97", "https://i.imgur.com/25X4zVe.png", 0, 0, 840, 140, "Wikipedia Images", "Search for main images in english wikipedia pages. Images may be subject to copyright. To check license terms right click or long press on image and select \"License information\" from menu."], [1, 4, 1650274530, "8UJnFyQJ", "https://i.imgur.com/Xw6SN0X.png", 30, 0, 680, 141, "Image to Data URI Converter", "Convert your image to Data URI for embedding directly in your HTML or CSS code using base64 encoding without the need for additional image files. You can choose from PNG, JPEG, SVG and WEBP format and copy to clipboard with single click."], [5, 4, 1650821275, "7hIhBY6m", "https://i.imgur.com/vtO6V38.png", 0, 0, 2671, 22561, "Cool Text Styles", "Cool text styles for your text layers. Styles included: BoostStyle, CoolStyle, DealStyle, DopeStyle, GreatStype, HypeStyle, KickStyle, PrizeStyle, WestStyle. Recommended font is Jost-ExtraBold size 190px. To scale to any size use Layer\/Layer Style\/Scale Effects."], @@ -143,15 +143,15 @@ [1, 4, 1656144612, "5l6PHad-", "https://i.imgur.com/nQfUWXR.png", 30, 0, 489, 152, "JPEG XL, AVIF, HEIC Plugin", "Open and save your images in JPEG XL (jxl) and AVIF (avif) formats or open images in HEIC (heic or heif) format."], [1, 4, 1656670805, "jYVSOL4g", "https://i.imgur.com/tPhi8l1.png", 20, 0, 392, 144, "Maze Generator", "Create your own maze puzzles. You can customize size, shape and colors of the puzzle and choose your favorite maze generation algorithm. Generated image can be converted to vector shape which allows you to enhance the image later without quality loss."], [1, 4, 1657300946, "tBRjB07-", "https://i.imgur.com/ln8wxua.png", 30, 0, 342, 138, "OCR Plugin", "Are you looking to extract text from images? This plugin detects the text in your image or part of the image based on current rectangle selection and display it as a readable (and selectable) text. 39 languages are supported. Recognized text can be added as text layer to your document. It uses Tesseract.js API, please support authors here: https:\/\/github.com\/naptha\/tesseract.js"], - [1, 4, 1658338173, "9cHI4uRa", "https://i.imgur.com/KL1D8hb.png", 20, 0, 1385, 140, "Clouds Generator", "Generate your own realistic clouds. Use randomize buttons or adjust cloud and shadow options manually to create visually credible clouds."], + [1, 4, 1658338173, "9cHI4uRa", "https://i.imgur.com/KL1D8hb.png", 20, 0, 1387, 140, "Clouds Generator", "Generate your own realistic clouds. Use randomize buttons or adjust cloud and shadow options manually to create visually credible clouds."], [1, 4, 1663416457, "d52VtJgZ", "https://i.imgur.com/9zD9fVX.png", 20, 0, 80, 137, "LaTeX Editor", "Create and edit formatted mathematical equations from LaTeX markup using powerful MathJax JavaScript library. The original LaTeX markup is stored in a layer name to allow editing the LaTeX layer (Smart Object) in the future via this plugin. To support MathJax authors go to https:\/\/www.mathjax.org\/#sponsors"], [0, 5, 1625795091, "YRGR3E-U", "https://i.imgur.com/nBZJdmU.png", 60, 630, 94, 128714, "Magic Flame", "Customizable fantasy style flame with an anamorphic flare. Styles can easily be chosen with the included adjustment layers."], [0, 5, 1625798662, "dUnVg0D1", "https://i.imgur.com/oCtvX6B.jpg", 60, 1286, 238, 218936, "Lens Flare", "Customizable lens flare PSD."], [0, 5, 1625853662, "m65gSYfi", "https://i.imgur.com/p12DNoU.jpg", 11, 1113, 311, 600058, "Photopea Tutorial Thumbnail", "Thumbnail for a Photopea tutorial video"], - [0, 5, 1628046084, "KH04tLq4", "https://i.imgur.com/ybFRcYU.jpg", 2, 2289, 584, 688471, "Digital Asset Pack Mockup", "Make a little box for your brushes, overlays, stock photos, actions, or other digital assets."], + [0, 5, 1628046084, "KH04tLq4", "https://i.imgur.com/ybFRcYU.jpg", 2, 2290, 584, 688471, "Digital Asset Pack Mockup", "Make a little box for your brushes, overlays, stock photos, actions, or other digital assets."], [0, 5, 1628361677, "b_7ZUwAy", "https://i.imgur.com/xUs0LjP.jpg", 14, 486, 100, 88642, "Mel Gibson Talking to Bloody Jesus", "Jajaja"], [0, 5, 1628703104, "msLJhWno", "https://i.imgur.com/34s8x3d.jpg", 15, 2024, 189, 5540779, "Glow Text", "Based on https:\/\/www.youtube.com\/watch?v=AbSEtXJUtL0"], - [0, 5, 1629041967, "HRq1a4l8", "https://i.imgur.com/aC8xlNl.jpg", 11, 720, 122, 3950347, "Photopea Tutorial Thumbnail 2", "A better Photopea thumbnail template"], + [0, 5, 1629041967, "HRq1a4l8", "https://i.imgur.com/aC8xlNl.jpg", 11, 721, 122, 3950347, "Photopea Tutorial Thumbnail 2", "A better Photopea thumbnail template"], [0, 5, 1630279132, "RfUelY4C", "https://i.imgur.com/T3IUzPP.jpg", 1, 2786, 388, 11165478, "Desktop Wallpaper Mockup", "Show off how good your wallpaper would look on a computer screen!"], [0, 5, 1630975261, "x4uKSbGB", "https://i.imgur.com/5OSkWex.jpg", 15, 9287, 3449, 1755775, "Shockwave Text", "Made with https:\/\/www.deviantart.com\/yikuans\/art\/15-Smoke-Overlays-891103314 and https:\/\/www.deviantart.com\/yikuans\/art\/Lens-Flare-Components-Deluxe-888810787"], [0, 5, 1631235943, "fD_Off7R", "https://i.imgur.com/ySsVrek.jpg", 15, 2540, 457, 5805593, "Reflected logo", "cool"], @@ -162,39 +162,39 @@ [0, 5, 1641659051, "Firprb2c", "https://i.imgur.com/8sb5Ku0.jpg", 15, 1499, 97, 4209930, "Fire Title", "The effect is pretty fire not gonna lie"], [0, 5, 1641762609, "CoMRVQ83", "https://i.imgur.com/RBxB5sW.jpg", 11, 356, 67, 109299, "Photopea Tutorial Thumbnail 3", "A(nother) simple thumbnail for Photopea tutorial videos. This can also be used for speedarts, breakdowns, etc."], [0, 5, 1641950827, "2KSBBYBr", "https://i.imgur.com/WaRhcoA.jpg", 15, 417, 29, 7659312, "Explosion Title", "I made this explosion effect I made while bored. I wanted to share in case anyone finds it useful or interesting."], - [0, 5, 1642198184, "yIyZ7tdJ", "https://i.imgur.com/r7cSR7Z.jpg", 15, 7020, 1649, 5624238, "Glow and Reflection", "Put your graphic into the spotlight! This pseudo-3D template is sure to make your 2D designs pop."], - [0, 5, 1642356335, "I-BsldV8", "https://i.imgur.com/Da0oLML.jpg", 15, 1929, 389, 9964323, "Ice Title", "Custom bevel and procedural particle FX!"], + [0, 5, 1642198184, "yIyZ7tdJ", "https://i.imgur.com/r7cSR7Z.jpg", 15, 7021, 1650, 5624238, "Glow and Reflection", "Put your graphic into the spotlight! This pseudo-3D template is sure to make your 2D designs pop."], + [0, 5, 1642356335, "I-BsldV8", "https://i.imgur.com/Da0oLML.jpg", 15, 1930, 390, 9964323, "Ice Title", "Custom bevel and procedural particle FX!"], [0, 5, 1646515837, "pVXVBAMK", "https://i.imgur.com/R0BNsyi.png", 11, 259, 83, 22115, "YouTube End Cards Background", "Simple and customizable template for YouTube outros, modeled over the default end card positions such that you don't have to drag them around. Easily insert a background image, add text, and more!"], [1, 5, 1649633937, "aj2heMFD", "https://lunalgraphics.github.io/example-images/spritereplicator-example2-after.jpg", 12, 0, 2053, 169, "Sprite Replicator", "An tool for creating complex patterns and particle effects. Learn more at https:\/\/dartfling.vercel.app\/product?pid=8"], - [1, 5, 1649634177, "GxSCdbW_", "https://raw.githubusercontent.com/lunalgraphics/lunalgraphics.github.io/14ed0891ce4bba86347a964802f026e1f594ff0a/marketing-images/colortheater-banner.jpg", 11, 0, 6085, 141, "Color Theater", "An easy to use but powerful color-grading tool. Learn more at https:\/\/dartfling.vercel.app\/product?pid=4"], - [1, 5, 1649984363, "b1DGPo2R", "https://lunalgraphics.github.io/example-images/zeus-example1-after.jpg", 10, 0, 4607, 141, "Zeus - Electric Energy FX", "Create custom electricity-inspired visual effects! Learn more at https:\/\/dartfling.vercel.app\/product?pid=2"], - [1, 5, 1650036035, "8ngLZTIx", "https://i.imgur.com/NhuV8i4.jpg", 10, 0, 1150, 149, "Fractal Noise", "Advanced Perlin\/Fractal Noise renderer. More customizable than the Clouds filter.\n\nTutorial: https:\/\/www.youtube.com\/watch?v=3eTlaqApDGs"], + [1, 5, 1649634177, "GxSCdbW_", "https://raw.githubusercontent.com/lunalgraphics/lunalgraphics.github.io/14ed0891ce4bba86347a964802f026e1f594ff0a/marketing-images/colortheater-banner.jpg", 11, 0, 6086, 141, "Color Theater", "An easy to use but powerful color-grading tool. Learn more at https:\/\/dartfling.vercel.app\/product?pid=4"], + [1, 5, 1649984363, "b1DGPo2R", "https://lunalgraphics.github.io/example-images/zeus-example1-after.jpg", 10, 0, 4608, 141, "Zeus - Electric Energy FX", "Create custom electricity-inspired visual effects! Learn more at https:\/\/dartfling.vercel.app\/product?pid=2"], + [1, 5, 1650036035, "8ngLZTIx", "https://i.imgur.com/NhuV8i4.jpg", 10, 0, 1151, 149, "Fractal Noise", "Advanced Perlin\/Fractal Noise renderer. More customizable than the Clouds filter.\n\nTutorial: https:\/\/www.youtube.com\/watch?v=3eTlaqApDGs"], [0, 5, 1651341764, "eaJ4Kcms", "https://i.imgur.com/I14qcZl.jpg", 60, 441, 70, 4756657, "Lens Flare 3", "Customizable anamorphic lens flare effect"], [0, 5, 1653774781, "LUC4PE_m", "https://i.imgur.com/fPdJKvO.jpg", 14, 389, 62, 935587, "Animated Nerd Face Emoji", "From r\/whenthe"], [1, 5, 1654133454, "ziolOfs4", "https://i.imgur.com/ejfeNcA.jpeg", 1, 0, 2371, 132, "3D Elements", "Add GLB models to your Photopea projects! Designed by mustafaGFX ( https:\/\/github.com\/mustafaGFX )."], [1, 5, 1659915738, "P9JScpva", "https://i.imgur.com/SH7NwfI.jpeg", 10, 0, 1318, 153, "Starburst generator", "Generate a starburst light flare effect to add to your images!"], [0, 5, 1662227188, "mhgVaiHr", "https://i.imgur.com/TyOCauV.png", 60, 92, 0, 8607, "Elliptical light falloff", "cool"], [1, 5, 1666126423, "zh808Q_c", "https://i.imgur.com/wkxHjVK.jpeg", 1, 0, 39, 199, "Pexels Embed", "Embed pexels.com into Photopea for quick access to one of the biggest stock image sites on the internet.."], - [0, 6, 1595367974, "Jh67Y-Kk", "https://i.imgur.com/bjZpfa7.png", 15, 17496, 9196, 34795, "Text styles", "Exclusive text style by UnBest"], + [0, 6, 1595367974, "Jh67Y-Kk", "https://i.imgur.com/bjZpfa7.png", 15, 17497, 9196, 34795, "Text styles", "Exclusive text style by UnBest"], [0, 7, 1598889099, "E4bJER5O", "https://i.imgur.com/eFqMOhC.jpg", 2, 2819, 279, 3322433, "Box Mockups", "The best Box Mockup helps you to showcase packaging designs for the final presentation. You will see the smart layer in it that provides the easiness for amendment."], [0, 7, 1598890123, "td7q9Ed-", "https://i.imgur.com/1OPNc0A.jpg", 2, 15205, 3467, 1172599, "Hanging Wall Sign", "Make your signage or logo presentation stand out with this photorealistic mock-up of an original round wall sign. The high-quality PSD file includes a smart layer where you can simply drag and drop your design."], - [0, 7, 1598890654, "nIOQ7tcZ", "https://i.imgur.com/4SF65vs.jpg", 0, 6317, 779, 6050131, "Shop Facade Logo", "Today we have for you a new logo mock-up of a shop facade that will make your branding design projects stand out. The PSD file includes smart objects so you can easily add your own design and create a flawless presentation"], - [0, 7, 1621609499, "pIJxJX-Q", "https://i.imgur.com/N0Vj2kB.jpg", 2, 17160, 2521, 6226084, "realistic t-shirts mockup", "The best T-shirt Mockup which you can use freely to showcase your next t-shirt project. You can change the color of the t-shirt by applying background fill inside the smart object. You can change the inner color of the hanging t-shirt."], + [0, 7, 1598890654, "nIOQ7tcZ", "https://i.imgur.com/4SF65vs.jpg", 0, 6318, 779, 6050131, "Shop Facade Logo", "Today we have for you a new logo mock-up of a shop facade that will make your branding design projects stand out. The PSD file includes smart objects so you can easily add your own design and create a flawless presentation"], + [0, 7, 1621609499, "pIJxJX-Q", "https://i.imgur.com/N0Vj2kB.jpg", 2, 17161, 2521, 6226084, "realistic t-shirts mockup", "The best T-shirt Mockup which you can use freely to showcase your next t-shirt project. You can change the color of the t-shirt by applying background fill inside the smart object. You can change the inner color of the hanging t-shirt."], [0, 7, 1621610343, "m-qAlc8j", "https://i.imgur.com/LSLy2rG.jpg", 2, 1946, 234, 8544483, "Event Ticket Mockup", "Simple and clean ticket mockups. As always, mockups are easy to customize to your needs \u2013 you can present your ticket project within seconds"], [0, 7, 1621614043, "1aY3Zns4", "https://i.imgur.com/yFsXitU.jpg", 2, 15165, 3856, 2118187, "Floating Business Card Mockup", "Showcase your branding designs with flying business cards! \nyou can replace the front and the back design of the business card, change the background color, and fully customize your image"], [0, 7, 1621614622, "EOyb6tTz", "https://i.imgur.com/AHZRIoV.jpeg", 0, 1145, 172, 1036557, "Sticker Mockup", "An easy-to-use mockup for presenting sticker designs: Simply add your vector graphics to the smart layer and see how your sticker will look like in real life"], - [0, 7, 1621684704, "eZZan9uq", "https://i.imgur.com/I1so86M.jpg", 2, 2096, 258, 4335274, "Box Mockups 2", "part 2\nThe best Box Mockup helps you to showcase packaging designs for the final presentation. You will see the smart layer in it that provides the easiness for amendment."], + [0, 7, 1621684704, "eZZan9uq", "https://i.imgur.com/I1so86M.jpg", 2, 2097, 258, 4335274, "Box Mockups 2", "part 2\nThe best Box Mockup helps you to showcase packaging designs for the final presentation. You will see the smart layer in it that provides the easiness for amendment."], [0, 7, 1621684973, "HRVbn1ou", "https://i.imgur.com/RO2JPfQ.jpg", 2, 1147, 141, 2852154, "Box Mockups 3", "part 3 The best Box Mockup that helps you to showcase packaging designs for the final presentation. You will see the smart layer in it that provides the easiness for amendment."], [0, 7, 1621685807, "Nu4BC58u", "https://i.imgur.com/7peolao.jpg", 2, 6626, 1341, 1469641, "Vertical Business Card Mockup", "use the best vertical business card mockup PSD file for your next business project. This has the best perspective with clean photo-realistic looks. You can use this vertical business card mockup for a commercial or personal project."], [0, 7, 1630692650, "jSMybe-7", "https://i.imgur.com/nsroJil.jpg", 0, 396, 110, 11583809, "smart band", "full editable smart band mockup"], [0, 7, 1630692866, "7dtCSgfQ", "https://i.imgur.com/HVHhnY6.jpg", 0, 2105, 384, 755808, "notebook", "full editable notebook mockup"], - [0, 7, 1630842968, "CAJ94Cb1", "https://i.imgur.com/Z3f4hYA.jpg", 0, 4427, 630, 16173095, "cup mockup", "2 cups free mockup"], + [0, 7, 1630842968, "CAJ94Cb1", "https://i.imgur.com/Z3f4hYA.jpg", 0, 4430, 630, 16173095, "cup mockup", "2 cups free mockup"], [0, 7, 1630889315, "QlzjKw8s", "https://i.imgur.com/KKPkwB9.jpg", 0, 611, 192, 460085, "flash mockup", "free realistic flash mockup"], [0, 7, 1630889666, "V1Bk5Fn4", "https://i.imgur.com/fq5V3NJ.jpg", 0, 976, 212, 1359291, "pin mockup", "realistic pin mockup"], - [0, 7, 1640478912, "iDjas1i7", "https://i.imgur.com/AbhpyWb.gif", 16, 26902, 4065, 184972, "logo animation", "adjustable logo animation with easy clear layers, you can replace logo and color quickly"], + [0, 7, 1640478912, "iDjas1i7", "https://i.imgur.com/AbhpyWb.gif", 16, 26906, 4065, 184972, "logo animation", "adjustable logo animation with easy clear layers, you can replace logo and color quickly"], [3, 7, 1650851348, "TzJzOJBB", "https://i.imgur.com/S3hKlFm.jpeg", 0, 0, 3004, 8146325, "watercolor", "realistic watercolor brushes\nyou can use it for digital painting and editing"], [0, 8, 1612277646, "T6OQWyRF", "https://i.imgur.com/fNAaMog.jpeg", 11, 11970, 3861, 5153440, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\nhttps:\/\/bit.ly\/3jbkfZL (CAMBIT Creates on YT)"], - [0, 8, 1612277883, "YQWO2Nrf", "https://i.imgur.com/1BMXG66.jpg", 11, 10404, 3166, 3407042, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\nhttps:\/\/bit.ly\/3jbkfZL (CAMBIT Creates on YT)"], + [0, 8, 1612277883, "YQWO2Nrf", "https://i.imgur.com/1BMXG66.jpg", 11, 10406, 3167, 3407042, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\nhttps:\/\/bit.ly\/3jbkfZL (CAMBIT Creates on YT)"], [0, 8, 1612277979, "059BeiwE", "https://i.imgur.com/wwhtrMi.jpg", 11, 11460, 4996, 5656427, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\nhttps:\/\/bit.ly\/3jbkfZL (CAMBIT Creates on YT)"], [0, 8, 1612278095, "GB7k2aof", "https://i.imgur.com/1WiOwg8.jpeg", 11, 4580, 1187, 3455074, "Simple YouTube End Screen", "Simple, easily customizable YouTube End Screen.\n\nVideo on how to customize this template:\nhttps:\/\/bit.ly\/39G0pmv (CAMBIT Creates on YT)"], [0, 8, 1612278221, "Wl1P3KKX", "https://i.imgur.com/c3iYexa.jpeg", 0, 4576, 1065, 8412690, "Simple YouTube End Screen", "Simple, easily customizable YouTube End Screen.\n\nVideo on how to customize this template:\nhttps:\/\/bit.ly\/39G0pmv (CAMBIT Creates on YT)"], @@ -204,36 +204,36 @@ [0, 8, 1612279032, "F7XgAax_", "https://i.imgur.com/IlCcfp0.jpg", 11, 10573, 3850, 3395167, "Simple YouTube Logo", "Simple, easily customizable YouTube Logo.\n\nVideo on how to customize this template:\ntinyurl.com\/1e16jpe9 (CAMBIT Creates on YT)"], [0, 8, 1612279087, "6i0sGHH5", "https://i.imgur.com/zO2QQl2.jpg", 11, 6035, 2032, 4980620, "Simple YouTube Logo", "Simple, easily customizable YouTube Logo.\n\nVideo on how to customize this template:\ntinyurl.com\/1e16jpe9 (CAMBIT Creates on YT)"], [0, 8, 1612279142, "yMbjJ7Ef", "https://i.imgur.com/CdxHXFO.jpg", 11, 2920, 1428, 115667, "Simple YouTube Logo", "Simple, easily customizable YouTube Logo.\n\nVideo on how to customize this template:\ntinyurl.com\/1e16jpe9 (CAMBIT Creates on YT)"], - [0, 8, 1612279191, "SlmPx69t", "https://i.imgur.com/juaoVK2.jpg", 11, 9425, 3636, 5447982, "Simple YouTube Logo", "Simple, easily customizable YouTube Logo.\n\nVideo on how to customize this template:\ntinyurl.com\/1e16jpe9 (CAMBIT Creates on YT)"], + [0, 8, 1612279191, "SlmPx69t", "https://i.imgur.com/juaoVK2.jpg", 11, 9426, 3636, 5447982, "Simple YouTube Logo", "Simple, easily customizable YouTube Logo.\n\nVideo on how to customize this template:\ntinyurl.com\/1e16jpe9 (CAMBIT Creates on YT)"], [0, 8, 1612279361, "tFYDK8wL", "https://i.imgur.com/j8eJp9D.jpg", 11, 8887, 4313, 3102153, "Simple YouTube Thumbnail", "Simple, easily customizable YouTube Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/184hzd6w (CAMBIT Creates on YT)"], [0, 8, 1612279423, "YCX2nm4c", "https://i.imgur.com/x6tpywI.jpeg", 11, 13781, 5900, 6199030, "Simple YouTube Thumbnail", "Simple, easily customizable YouTube Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/184hzd6w (CAMBIT Creates on YT)"], - [0, 8, 1612279471, "VKzHJVFB", "https://i.imgur.com/nwtki5N.jpg", 11, 20305, 6851, 2558479, "Simple YouTube Thumbnail", "Simple, easily customizable YouTube Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/184hzd6w (CAMBIT Creates on YT)"], + [0, 8, 1612279471, "VKzHJVFB", "https://i.imgur.com/nwtki5N.jpg", 11, 20306, 6851, 2558479, "Simple YouTube Thumbnail", "Simple, easily customizable YouTube Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/184hzd6w (CAMBIT Creates on YT)"], [0, 8, 1612279519, "YK0vCVc0", "https://i.imgur.com/50UPxcv.jpg", 11, 18136, 7595, 2086745, "Simple YouTube Thumbnail", "Simple, easily customizable YouTube Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/184hzd6w (CAMBIT Creates on YT)"], [0, 8, 1612279651, "o05JofbF", "https://i.imgur.com/PXRipnx.jpg", 11, 19468, 4336, 202002, "Among Us Thumbnail", "Simple, easily customizable Among Us Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/uy7x17cq (CAMBIT Creates on YT)"], [0, 8, 1612280005, "k4GI2P3z", "https://i.imgur.com/TvZvM6C.jpeg", 11, 13849, 8075, 657807, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\ntinyurl.com\/2ewfvnn9 (CAMBIT Creates on YT)"], [0, 8, 1612280081, "m6x93Azo", "https://i.imgur.com/QV9SdiM.jpg", 11, 8648, 4173, 167582, "Simple YouTube Logo", "Simple, easily customizable YouTube Logo.\n\nVideo on how to customize this template:\ntinyurl.com\/2ewfvnn9 (CAMBIT Creates on YT)"], [0, 8, 1612280228, "7i7XCTEb", "https://i.imgur.com/AioZJTn.jpg", 11, 2157, 528, 215580, "Simple YouTube End Screen", "Simple, easily customizable YouTube End Screen.\n\nVideo on how to customize this template:\ntinyurl.com\/2ewfvnn9 (CAMBIT Creates on YT)"], - [0, 8, 1612280446, "k9XQB-8f", "https://i.imgur.com/R6VjyWk.jpg", 15, 169112, 35135, 121884, "Neon Sign", "Simple, easily customizable Neon Sign.\n\nVideo on how to customize this template:\ntinyurl.com\/i4sbjlcf (CAMBIT Creates on YT)"], - [0, 8, 1612280604, "SYx9-f-b", "https://i.imgur.com/zReKban.jpg", 11, 10263, 2680, 797316, "Apex Legends Thumbnail", "Simple, easily customizable Apex Legends Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/yyolbbpl (CAMBIT Creates on YT)"], - [0, 8, 1612280878, "bJRXRIfq", "https://i.imgur.com/h5N1C88.jpeg", 11, 10193, 4225, 4386550, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\ntinyurl.com\/3fcbp6b4 (CAMBIT Creates on YT)"], - [0, 8, 1612281260, "Ya6q0Tln", "https://i.imgur.com/zwbJQwV.jpg", 11, 27212, 10443, 4435004, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\ntinyurl.com\/cpdlji93 (CAMBIT Creates on YT)"], - [0, 8, 1612281457, "vKhoMzqP", "https://i.imgur.com/GZQ9gp2.jpg", 11, 5036, 1510, 1044696, "Minecraft YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\ntinyurl.com\/y228jzgb (CAMBIT Creates on YT)"], + [0, 8, 1612280446, "k9XQB-8f", "https://i.imgur.com/R6VjyWk.jpg", 15, 169117, 35139, 121884, "Neon Sign", "Simple, easily customizable Neon Sign.\n\nVideo on how to customize this template:\ntinyurl.com\/i4sbjlcf (CAMBIT Creates on YT)"], + [0, 8, 1612280604, "SYx9-f-b", "https://i.imgur.com/zReKban.jpg", 11, 10265, 2681, 797316, "Apex Legends Thumbnail", "Simple, easily customizable Apex Legends Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/yyolbbpl (CAMBIT Creates on YT)"], + [0, 8, 1612280878, "bJRXRIfq", "https://i.imgur.com/h5N1C88.jpeg", 11, 10196, 4225, 4386550, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\ntinyurl.com\/3fcbp6b4 (CAMBIT Creates on YT)"], + [0, 8, 1612281260, "Ya6q0Tln", "https://i.imgur.com/zwbJQwV.jpg", 11, 27213, 10444, 4435004, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\ntinyurl.com\/cpdlji93 (CAMBIT Creates on YT)"], + [0, 8, 1612281457, "vKhoMzqP", "https://i.imgur.com/GZQ9gp2.jpg", 11, 5037, 1511, 1044696, "Minecraft YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\ntinyurl.com\/y228jzgb (CAMBIT Creates on YT)"], [0, 8, 1612281727, "tcyaiJYB", "https://i.imgur.com/83wrIJc.jpg", 11, 12943, 3095, 1028797, "Simple YouTube Logo", "Simple, easily customizable YouTube Logo.\n\nVideo on how to customize this template:\ntinyurl.com\/14lfz8p0 (CAMBIT Creates on YT)"], [0, 8, 1612281864, "2ZWRRzhf", "https://i.imgur.com/nGNM3QT.jpg", 11, 1815, 725, 2118021, "Call of Duty Thumbnail", "Simple, easily customizable Call of Duty Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/2bopuzm2 (CAMBIT Creates on YT)"], [0, 8, 1612282028, "1ZOZbFH-", "https://i.imgur.com/2gB601B.jpg", 10, 581, 147, 729897, "Fall Logo", "Simple, easily customizable Fall Logo.\n\nVideo on how to customize this template:\ntinyurl.com\/yzmft4jh (CAMBIT Creates on YT)"], [0, 8, 1612282134, "PkMX3Lm9", "https://i.imgur.com/637ZNYy.jpg", 10, 664, 153, 7327824, "Fall Banner", "Simple, easily customizable Fall banner.\n\nVideo on how to customize this template:\ntinyurl.com\/85q28ayt (CAMBIT Creates on YT)"], - [0, 8, 1612282339, "iDpXkmYb", "https://i.imgur.com/fmuYmD4.jpg", 11, 12316, 4505, 2805682, "Simple YouTube Thumbnail", "Simple, easily customizable YouTube Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/35wu84qd (CAMBIT Creates on YT)"], + [0, 8, 1612282339, "iDpXkmYb", "https://i.imgur.com/fmuYmD4.jpg", 11, 12317, 4505, 2805682, "Simple YouTube Thumbnail", "Simple, easily customizable YouTube Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/35wu84qd (CAMBIT Creates on YT)"], [0, 8, 1612282573, "wc9mhU6q", "https://i.imgur.com/IJkOhav.jpeg", 11, 3668, 1090, 632116, "Roblox Thumbnail", "Simple, easily customizable Roblox Thumbnail.\n\nVideo on how to customize this template:\ntinyurl.com\/4zbntnbf (CAMBIT Creates on YT)"], - [0, 8, 1612282817, "p3tlvANF", "https://i.imgur.com/DmjI4Pj.jpeg", 11, 12938, 3619, 2123701, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\ntinyurl.com\/3w3ufotm (CAMBIT Creates on YT)"], + [0, 8, 1612282817, "p3tlvANF", "https://i.imgur.com/DmjI4Pj.jpeg", 11, 12940, 3619, 2123701, "Simple YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to customize this template:\ntinyurl.com\/3w3ufotm (CAMBIT Creates on YT)"], [0, 8, 1612285645, "TlFSLsyK", "https://i.imgur.com/6GgFioO.jpg", 11, 2354, 775, 882640, "Simple YouTube End Screen", "Simple, easily customizable YouTube End Screen.\n\nVideo on how to customize this template:\ntinyurl.com\/3l54vja8 (CAMBIT Creates on YT)"], [0, 8, 1612365440, "0oq9raSA", "https://i.imgur.com/cSpmvJF.jpg", 10, 2080, 576, 121585, "Roblox Logo", "Simple, easily customizable Roblox Logo.\n\nVideo on how to customize this template:\ntinyurl.com\/1csgij7z (CAMBIT Creates on YT)"], - [0, 8, 1612545406, "duzu5AMd", "https://i.imgur.com/Cublu8K.jpg", 15, 97342, 30460, 57591, "Golden Text", "Simple, easily customizable Golden Text.\n\nVideo on how to make this golden text is on my YouTube.\n(CAMBIT Creates on YT)"], + [0, 8, 1612545406, "duzu5AMd", "https://i.imgur.com/Cublu8K.jpg", 15, 97349, 30462, 57591, "Golden Text", "Simple, easily customizable Golden Text.\n\nVideo on how to make this golden text is on my YouTube.\n(CAMBIT Creates on YT)"], [0, 8, 1612810564, "mfOWPzLQ", "https://i.imgur.com/XTWQNAs.jpg", 11, 7433, 1525, 611504, "Minecraft Thumbnail", "Simple, easily customizable Minecraft Thumbnail.\n\nVideo on how to make this template is on my YouTube\n(CAMBIT Creates on YT)"], [0, 8, 1613762354, "QBy-usaD", "https://i.imgur.com/K4qYD4Q.jpeg", 11, 3409, 1006, 1411901, "Roblox Arsenal YouTube Banner", "Simple, easily customizable YouTube banner.\n\nVideo on how to make this is at:\nCAMBIT Creates on YT"], - [0, 8, 1613940663, "7zAwU9Ts", "https://i.imgur.com/8YAlikJ.jpg", 11, 15084, 4212, 614035, "Fortnite Highlights Thumbnail", "Simple, easily customizable Fortnite Highlights Thumbnail.\n\nVideo on how to make this:\nCAMBIT Creates on YT"], - [0, 8, 1615230335, "vuyTuGtk", "https://i.imgur.com/paF54NZ.jpg", 11, 16136, 8009, 201278, "80s Retro Banner", "Tutorial on how to make this banner will be at CAMBIT Creates on YouTube!\n\nhttps:\/\/www.youtube.com\/channel\/UCUYghcyi3yBoBFUiW94EdWw"], + [0, 8, 1613940663, "7zAwU9Ts", "https://i.imgur.com/8YAlikJ.jpg", 11, 15085, 4212, 614035, "Fortnite Highlights Thumbnail", "Simple, easily customizable Fortnite Highlights Thumbnail.\n\nVideo on how to make this:\nCAMBIT Creates on YT"], + [0, 8, 1615230335, "vuyTuGtk", "https://i.imgur.com/paF54NZ.jpg", 11, 16137, 8009, 201278, "80s Retro Banner", "Tutorial on how to make this banner will be at CAMBIT Creates on YouTube!\n\nhttps:\/\/www.youtube.com\/channel\/UCUYghcyi3yBoBFUiW94EdWw"], [0, 8, 1616426647, "bNZxrnSq", "https://i.imgur.com/Df6rJGa.jpeg", 10, 4016, 1340, 72047, "Simple Stream Overlay", "Simple, easily customizable Stream Overlay.\n\nVideo on how to customize this template:\n (CAMBIT Creates on YT)"], - [0, 8, 1617376577, "vxP4nbZR", "https://i.imgur.com/chLmQSy.jpeg", 11, 4033, 1642, 468545, "Simple YouTube End Screen (Glowing)", "Simple, easily customizable YouTube End Screen.\n\nVideo on how to make this template:\n(CAMBIT Creates on YT)"], + [0, 8, 1617376577, "vxP4nbZR", "https://i.imgur.com/chLmQSy.jpeg", 11, 4034, 1642, 468545, "Simple YouTube End Screen (Glowing)", "Simple, easily customizable YouTube End Screen.\n\nVideo on how to make this template:\n(CAMBIT Creates on YT)"], [0, 8, 1617814260, "W9PFcnhB", "https://i.imgur.com/Ztd1eRr.jpg", 10, 10122, 4452, 37400, "Stream Starting Soon Screen", "Simple, easily customizable Starting Soon Screen.\n\nVideo on how to customize this template:\n(CAMBIT Creates on YT)"], [0, 8, 1626448684, "c7DNJHqq", "https://i.imgur.com/yywoZnI.jpeg", 11, 4819, 3185, 49687, "Clean Thumbnail", "If you want to know how to create this thumbnail in under 5 minutes check out my channel CAMBIT Creates!\nhttps:\/\/www.youtube.com\/channel\/UCUYghcyi3yBoBFUiW94EdWw"], [0, 8, 1632407126, "zWz6k8at", "https://i.imgur.com/h990yTB.jpeg", 11, 1259, 595, 202989, "Simple Discord Banner", "Check out my channel for a tutorial on how to make this from scratch! (CAMBIT Creates)"], @@ -246,7 +246,7 @@ [0, 11, 1656870452, "ZkQlx_Jg", "https://i.imgur.com/WU1XIuF.jpg", 0, 91, 18, 25634, "off button", "off button"], [0, 11, 1657152038, "IcbyAUF7", "https://i.imgur.com/MRK2AzE.jpg", 60, 59, 11, 11760, "signal icon", "signal icon"], [0, 11, 1657561265, "tToce61-", "https://i.imgur.com/HyCXzt1.jpg", 11, 1712, 159, 1006081, "steam game", "steam games"], - [0, 11, 1657579895, "USbe8cJ-", "https://i.imgur.com/gkTsQ5I.jpg", 11, 2009, 379, 1987588, "Racer Text Effect", "Racer Text Effect"], + [0, 11, 1657579895, "USbe8cJ-", "https://i.imgur.com/gkTsQ5I.jpg", 11, 2010, 379, 1987588, "Racer Text Effect", "Racer Text Effect"], [0, 11, 1657671355, "qX-zymE-", "https://i.imgur.com/Ud1ELDt.jpg", 11, 1792, 640, 318520, "game", "game"], [3, 11, 1658535857, "4DTHvahW", "https://static.brusheezy.com/system/resources/previews/000/059/213/non_2x/free-sword-photoshop-brushes.jpg", 0, 0, 284, 7272515, "Sword Photoshop Brushes", "Sword Photoshop Brushes"], [3, 11, 1662929816, "pUHzSQAd", "https://static.brusheezy.com/system/resources/previews/000/023/219/non_2x/drips-and-splats-texture-photoshop-textures.jpg", 0, 0, 198, 2330831, "Drips And Splats Texture", "Drips And Splats Texture"], @@ -258,25 +258,25 @@ [0, 12, 1665061927, "B-xzPJ0L", "https://i.imgur.com/7Ga6tVt.jpg", 0, 28, 0, 599812, "samundra manthan", "samundra manthan"], [0, 13, 1654669162, "YYYDBdg6", "https://i.imgur.com/M3eYoIo.jpg", 11, 101, 24, 5907553, "Miniatura MUSICPROMASTERY", "creada para MusicPro Mastery\nhttps:\/\/www.youtube.com\/c\/MusicProMastery"], [0, 13, 1654673202, "E7aZDVex", "https://i.imgur.com/g7WLnH1.jpg", 11, 113, 42, 4203822, "MusicPro Mastery 2", "Miniatura 2 de MusicPro Mastery\nhttps:\/\/www.youtube.com\/channel\/UCldnHTJM4w1LNvHRPiTnG9A"], - [0, 14, 1602750897, "Di40vm7k", "https://i.imgur.com/s9syupL.jpeg", 11, 4926, 801, 3056763, "FIFA THUMBNAIL", "Very nice made with photophea thumbnail."], + [0, 14, 1602750897, "Di40vm7k", "https://i.imgur.com/s9syupL.jpeg", 11, 4927, 801, 3056763, "FIFA THUMBNAIL", "Very nice made with photophea thumbnail."], [0, 15, 1603211815, "C0QsdbO5", "https://i.imgur.com/XRPMiYy.jpg", 10, 6647, 1445, 8213, "Custom Discord Profile Picture (by \"food\") (360 x 360) for higher resolution", "I made this for people that want to customize the default Discord profile picture, I included all the default colors Discord uses"], [0, 15, 1606764477, "kwOGg8Zh", "https://i.imgur.com/WdRWr9c.png", 10, 2034, 229, 17095, "Custom Google Profile Picture (by \"food\")", "includes the colors i could find, sorry if the colors arent named its too much work and its too hard with photopea's renaming system, they should probably add a shortcut for renaming."], [0, 16, 1603198820, "U7Bj-Jdg", "https://i.imgur.com/WPKgBWp.jpeg", 11, 1252, 277, 5015404, "Youtube FIFA 21 Channel art", "A template on FIFA 21 channel art template works for mobile and pc really well."], [0, 16, 1607541653, "1bZwWzKb", "https://i.imgur.com/1dkRecR.jpeg", 11, 1374, 257, 6975285, "Forza Horizon 4 Banner", "The banner includes a montage of your favourite car or even Cars. As long side this they allow for a simple clean Text effect using drop shadows. This simple but amazing looking banner with take your YouTube channel to the next level and help you to exceed your potential."], - [0, 17, 1605273264, "GYoLS0pz", "https://i.imgur.com/7KXPfIl.jpg", 11, 30788, 12262, 273804, "Youtube thumbnail", "Heres a free youtube thumbnail design i made hope you like it..of you wish to get the paid version subscribe to my youtube channel https:\/\/www.youtube.com\/channel\/UCBE9xYAWoHw1GHqRdVxBGew"], + [0, 17, 1605273264, "GYoLS0pz", "https://i.imgur.com/7KXPfIl.jpg", 11, 30791, 12264, 273804, "Youtube thumbnail", "Heres a free youtube thumbnail design i made hope you like it..of you wish to get the paid version subscribe to my youtube channel https:\/\/www.youtube.com\/channel\/UCBE9xYAWoHw1GHqRdVxBGew"], [0, 18, 1629536996, "9rq7Nw_l", "https://imgur.com/sYA72Cx.jpg", 11, 1196, 319, 1013620, "Thumbnail \u0635\u0648\u0631\u0629 \u0645\u0635\u063a\u0631\u0629", "Make thumbnails more beautiful\nhttps:\/\/youtube.com\/shorts\/8XfcSZk0Nrc?feature=share"], [0, 19, 1622444359, "62J0PiM7", "https://i.imgur.com/w9EgIbl.jpg", 60, 431, 26, 247812, "AR Project", "This is my first project"], [0, 20, 1620721566, "NRbukwhO", "https://i.imgur.com/g1Iy9su.png", 10, 90, 13, 21372, "Games Bulletin Template", "Template for Games Bulletin social media posts"], [0, 21, 1622493012, "mo_y1HyY", "https://i.imgur.com/f4zBvLe.jpg", 60, 849, 134, 12549, "Cool gradient", "gradient"], [0, 22, 1632414539, "Lcqt4u_1", "https://i.imgur.com/xUi9twt.jpg", 10, 177, 63, 396526, "Plastic Blister Pack Water Drop Text!", "I came up with a way to make a plastic blister pack looking effect for Live text, and thought to myself \"do you know what would make this better? Water drops. That's what.\"\n\nChange the colour of the Background with the Hue\/Sat layer, and edit the text inside the folder to whatever you want."], - [0, 22, 1636118268, "DI_JtkDh", "https://i.imgur.com/0yClXPz.jpg", 15, 29195, 10975, 193990, "Realistic Gold Text", "A realistic gold text effect, in Photopea.\n\nCheck out my YouTube Channel for lots more Photopea content!\n\nhttps:\/\/www.youtube.com\/channel\/UC79BJIUMVFc7Lyczcxpxy3g"], - [0, 23, 1648082658, "aHyYk3-g", "https://i.imgur.com/QwC3YOj.jpeg", 10, 4961, 1893, 344769, "Aera", "banners for aera team template."], + [0, 22, 1636118268, "DI_JtkDh", "https://i.imgur.com/0yClXPz.jpg", 15, 29196, 10975, 193990, "Realistic Gold Text", "A realistic gold text effect, in Photopea.\n\nCheck out my YouTube Channel for lots more Photopea content!\n\nhttps:\/\/www.youtube.com\/channel\/UC79BJIUMVFc7Lyczcxpxy3g"], + [0, 23, 1648082658, "aHyYk3-g", "https://i.imgur.com/QwC3YOj.jpeg", 10, 4961, 1895, 344769, "Aera", "banners for aera team template."], [0, 24, 1617732379, "4Hk284Nq", "https://i.imgur.com/k6dZNCy.jpg", 11, 1397, 668, 3011056, "Minecraft SMP Thumbnail Template", "a minecraft smp template for streaming"], [0, 24, 1617735597, "94-zclTY", "https://i.imgur.com/hABMF62.jpg", 10, 541, 158, 3072579, "Minecraft SMP Stream Thumbnail TWITCH", "a mcyt thumbnail for streaming minecraft using twitch"], [0, 25, 1652170924, "GI8RVdq9", "https://cdn.discordapp.com/attachments/909430333806608385/973500117715918888/unknown.png", 14, 365, 67, 943088, "Wolverine Remember", "Wolverine Remember meme template"], [0, 26, 1620403500, "ZqudmdoC", "https://i.imgur.com/IsEkqlY.jpg", 15, 889, 269, 262831, "Nice wallpaper", "Nice wallpaper; took me a while to make."], [0, 26, 1620404248, "ooWyoz0u", "https://i.imgur.com/os1vh9b.jpg", 15, 3138, 726, 370401, "SKI-FI wallpaper", "Nice wallpaper i made. C:"], - [0, 27, 1614393788, "GQRv9aFo", "https://i.imgur.com/Y9m2HVa.jpeg", 1, 15311, 2225, 9704224, "iphone", "test"], + [0, 27, 1614393788, "GQRv9aFo", "https://i.imgur.com/Y9m2HVa.jpeg", 1, 15313, 2225, 9704224, "iphone", "test"], [0, 27, 1614395732, "tLpM7Lly", "https://i.imgur.com/my8oeAK.jpg", 1, 8165, 1127, 3567483, "iphone titled to the left", "random"], [0, 27, 1614396765, "9sRjdsMT", "https://i.imgur.com/ZK6lIkV.jpeg", 0, 1827, 262, 4447633, "iphone tilted to the right", "yes"], [0, 28, 1615045168, "Q12Hvy5d", "https://i.imgur.com/fTDxSRv.jpg", 10, 644, 264, 5613154, "NInjago Season 13 stlye", "Ninjago Season 13 banner"], @@ -286,12 +286,12 @@ [0, 29, 1615309871, "KZzV-qQR", "https://i.imgur.com/N2IPM01.jpg", 0, 432, 29, 34390, "good Vibes", "enjoy a good vibe"], [0, 30, 1659923282, "b4JobyLe", "https://i.imgur.com/41RyQpe.png", 0, 84, 0, 336247, "just for me in case crash", "s"], [0, 30, 1615599668, "h8OeTUtO", "https://i.imgur.com/TeefGph.jpeg", 11, 6024, 2044, 583391, "Game Icon Template (GFX Included)", "This pack allows you to create your very own ROBLOX game icon! you can change the color of almost anything! Making sure to subscribe to Carlite!"], - [0, 30, 1615683550, "_KA2EyJG", "https://i.imgur.com/Gls34vo.jpg", 11, 2095, 730, 25175, "Sun Burst Effect Template", "This template allows you to change the color of this effect and customize it to your liking. Subscribe to Carlite!"], + [0, 30, 1615683550, "_KA2EyJG", "https://i.imgur.com/Gls34vo.jpg", 11, 2096, 731, 25175, "Sun Burst Effect Template", "This template allows you to change the color of this effect and customize it to your liking. Subscribe to Carlite!"], [0, 30, 1616251206, "I0LVYyX6", "https://i.imgur.com/iT3n3AL.jpeg", 11, 1342, 392, 39322, "Two Sided Sun Burst Effect", "This is a two sided verison of my previous Sun Burst Effect"], [0, 30, 1617326910, "Z_inAAOD", "https://i.imgur.com/m3VDUFD.png", 0, 201, 49, 3408721, "com sheet template", "this is just for me"], [0, 30, 1654487565, "x2chKqlZ", "https://i.imgur.com/MmTN18T.jpg", 10, 151, 25, 541384, "Roblox Shirt Template (Changeable Colors + Chains)", "You can change the colors and if you want to see the original template with the eye button next to the thing."], [0, 30, 1658710497, "SAElowkO", "https://i.imgur.com/uapM2LL.png", 0, 137, 47, 224455, "Roblox Sweater Template", "For me"], - [0, 30, 1659051776, "9f1A8HGI", "https://i.imgur.com/JeRTwX3.jpg", 10, 107, 30, 348577, "y2k star roblox black pants", "W"], + [0, 30, 1659051776, "9f1A8HGI", "https://i.imgur.com/JeRTwX3.jpg", 10, 108, 30, 348577, "y2k star roblox black pants", "W"], [0, 30, 1659718614, "mxruteVZ", "https://i.imgur.com/kygxUfl.jpg", 10, 208, 101, 591020, "roblox sweater template", "W"], [0, 30, 1660414727, "rzOgRNET", "https://i.imgur.com/G2EcNCR.png", 0, 35, 6, 454041, "sweatpants for me", "ss"], [0, 30, 1661216439, "4Uj5bu-7", "https://i.imgur.com/eiBJNAA.png", 0, 65, 33, 279941, "My Roblox Clothing Template", "W"], @@ -300,7 +300,7 @@ [0, 31, 1639673237, "wHYTNn4A", "https://i.imgur.com/KUSqYPk.jpg", 0, 1685, 563, 9508831, "MELTING SNOW TEXT EFFECT", "Easy to use! Looks amazing! Enjoy! -DUBBY DESIGNZ\nCashapp $cdubby24"], [0, 31, 1639673489, "8Q4sE8Ow", "https://i.imgur.com/eYbkmGk.jpg", 0, 1218, 213, 16878185, "UNDEAD TEXT EFFECT", "Easy to use! Looks amazing! Enjoy! -DUBBY DESIGNZ\nCashapp $cdubby24"], [0, 31, 1639673938, "yyrl434D", "https://i.imgur.com/ftY0wTK.jpg", 0, 417, 37, 2132739, "3D NEON LIGHT TEXT EFFECT", "Easy to use! Looks amazing! Enjoy! -DUBBY DESIGNZ\nCashapp $cdubby24"], - [0, 31, 1639674306, "oLRJ9PhO", "https://i.imgur.com/rQfkBVf.jpg", 0, 3683, 880, 3752839, "3D SILVER TEXT EFFECT", "Easy to use! Looks amazing! Enjoy! -DUBBY DESIGNZ\nCashapp $cdubby24"], + [0, 31, 1639674306, "oLRJ9PhO", "https://i.imgur.com/rQfkBVf.jpg", 0, 3684, 880, 3752839, "3D SILVER TEXT EFFECT", "Easy to use! Looks amazing! Enjoy! -DUBBY DESIGNZ\nCashapp $cdubby24"], [0, 31, 1639747964, "yqgVzs44", "https://i.imgur.com/94DzpmE.jpg", 0, 625, 164, 1518037, "DIAMOND TEXT STYLE", "Easy to use! Looks great! Enjoy! -DUBBY DESIGNZ\nCashapp $cdubby24"], [0, 31, 1639749421, "tnrCyDAa", "https://i.imgur.com/A57j2jz.jpg", 0, 319, 127, 712668, "HQ DUBBY DESIGNZ TEXT STYLE", "Easy to use! Looks great! Enjoy! -DUBBY DESIGNZ\nCashapp $cdubby24"], [0, 31, 1642944440, "0ZwfYUGQ", "https://i.imgur.com/5h3ndU7.jpg", 0, 1331, 266, 1259370, "GLITTER TEXT STYLE DUBBY DESIGNZ", "Easy to use! Looks great! Enjoy! -Dubby Designz\nCashapp $cdubby24"], @@ -309,7 +309,7 @@ [0, 33, 1617812120, "bw6XjavJ", "https://i.imgur.com/g15LYOu.png", 0, 523, 182, 54663, "Rainbow Text", "made for bored people."], [0, 34, 1625731532, "F3olqmRn", "https://i.imgur.com/aGpQG98.jpeg", 0, 1069, 120, 2463262, "Car edit template", "Yuh template for your edits"], [0, 35, 1620077746, "MGH2R3BT", "https://doodle.likes-throwing.rocks/hPgxIT.png", 10, 534, 156, 46160, "Advanced Green Logo", "Logo for Social Media"], - [0, 36, 1620471080, "qwLFo-Ge", "https://i.imgur.com/ZtR7ICJ.jpeg", 0, 25290, 4595, 3421739, "3D glass logo mockup", "I do not own this it is downloaded from graphicsfamily.com .\ndownload the license here \ud83d\udc47\nhttps:\/\/www.mediafire.com\/file\/wbv00o8cu0mda5y\/license-graphicsfamily.com.txt\/file ."], + [0, 36, 1620471080, "qwLFo-Ge", "https://i.imgur.com/ZtR7ICJ.jpeg", 0, 25291, 4596, 3421739, "3D glass logo mockup", "I do not own this it is downloaded from graphicsfamily.com .\ndownload the license here \ud83d\udc47\nhttps:\/\/www.mediafire.com\/file\/wbv00o8cu0mda5y\/license-graphicsfamily.com.txt\/file ."], [0, 37, 1629492534, "EtDkSkzB", "https://i.imgur.com/VN6E2Tv.jpg", 0, 251, 52, 421959, "cat", "e"], [0, 38, 1647076420, "sWJVczAG", "https://i.imgur.com/2n3Nisx.png", 60, 150, 22, 28376, "Polytoria shirt template.", "If you use Polytoria, you can use this to make a good shirt !\nGame link : https:\/\/polytoria.com\/\nUpload page : https:\/\/polytoria.com\/shop\/upload\/shirt"], [0, 39, 1622229976, "nWGP1LsW", "https://i.imgur.com/q3qYTNs.jpg", 14, 279, 41, 214048, "mustard watermark", "if anyone other than me is seeing this, hi\nalso this probably wont make any sense"], @@ -320,36 +320,36 @@ [0, 41, 1622840439, "ij8jWBhb", "https://i.imgur.com/denHdM3.jpg", 14, 687, 145, 195866, "Dog Suffocate Owner Template", "Dog Suffocate Owner Template"], [0, 41, 1622841217, "8Fou82xE", "https://i.imgur.com/VqhRsGx.jpg", 14, 890, 170, 53079, "Is this a pigeon? template", "Is this a pigeon? template"], [0, 42, 1662021345, "rkMLM0h6", "https://i.imgur.com/uth7Re1.jpg", 10, 133, 39, 409311, "Aranga 360 YouTube", "YouTube Logo"], - [0, 42, 1662022900, "Z7UDCuvw", "https://i.imgur.com/L9buf3R.jpg", 11, 379, 15, 147031, "Crypto Ulagam Live", "Crypto Ulagam YT Thumbnail"], + [0, 42, 1662022900, "Z7UDCuvw", "https://i.imgur.com/L9buf3R.jpg", 11, 380, 15, 147031, "Crypto Ulagam Live", "Crypto Ulagam YT Thumbnail"], [0, 43, 1623654168, "O7L4yHSk", "https://i.imgur.com/pOfHmt0.jpg", 60, 336, 15, 7023017, "How To Make Your Own Fut Card", "Hello"], [0, 44, 1623684212, "qd4M8zOd", "https://i.imgur.com/lgTMO8i.jpeg", 11, 204, 37, 88409, "YouTube Urdu Template", "YouTube Urdu Template Sample"], [0, 45, 1637963692, "5WKg8ZT_", "https://i.imgur.com/XFSxvQw.jpeg", 15, 1447, 1108, 1094025, "Basic 3D Text Template", "Perfect for making 3D logos!"], [0, 45, 1638409798, "mOVSry7F", "https://i.imgur.com/wvcIsYy.jpeg", 15, 253, 104, 70274, "Candy Cane Glowing 3D Text", "Perfect for Christmas-styled logos!"], - [0, 45, 1641259888, "fjb4PJDn", "https://i.imgur.com/btnt6vS.png", 15, 10463, 6098, 299330, "(Color Change) 3D Text", "Easy to change text!"], + [0, 45, 1641259888, "fjb4PJDn", "https://i.imgur.com/btnt6vS.png", 15, 10464, 6099, 299330, "(Color Change) 3D Text", "Easy to change text!"], [0, 46, 1624248813, "VBLu29m0", "https://i.imgur.com/GTNaMfp.jpg", 0, 1672, 66, 114663, "1123", "standard bc"], [0, 47, 1624250868, "6jjYRIK8", "https://i.imgur.com/CvBUH76.jpg", 60, 661, 144, 1255897, "COPA AMERICA TEMPLATE BY MOBUTER | Mobuter | Copa America | Facebook | Poster | Cinematic Poster | Argentina", "This template is specially created for COPA AMERICA. Supporters of any country can use this template to show his\/her love for football. Just need to update the smart object of flag and text. Add your own photo to take the poster to the next level. For more visit-\nhttps:\/\/www.youtube.com\/Mobuter?sub_confirmation=1\n You can add a 3D cartoon to this template which you can create by watching this video-https:\/\/youtu.be\/voajMXLvjz0 Or search in YouTube writing- Mobuter Thanks!"], [0, 48, 1625984385, "OgvsmnFT", "https://i.pinimg.com/originals/14/d4/11/14d411ef40a5351e7aea88c3c48ab54b.jpg", 60, 2092, 54, 1981089, "Wildclaw Purple Lightning", "A wildclaw from FR. A skin for Thundercrack 2021."], [0, 49, 1624765694, "df1t2dMf", "https://i.imgur.com/FsQTvx2.jpg", 12, 557, 105, 85302, "meu socorro", "post_crist\u00e3o"], - [0, 50, 1634920883, "2qgap3J3", "https://i.imgur.com/XOq0i89.jpg", 15, 3302, 1635, 142252, "Texto Sticker by Deluxe Tutorials", "Link del Tutorial en YouTube\nhttps:\/\/www.youtube.com\/watch?v=T6YVTsiryxk\nSuscribete y comparte el v\u00eddeo para m\u00e1s tutoriales de \u00e9stilos y ef\u00e9ctos textos en Photopea"], + [0, 50, 1634920883, "2qgap3J3", "https://i.imgur.com/XOq0i89.jpg", 15, 3303, 1635, 142252, "Texto Sticker by Deluxe Tutorials", "Link del Tutorial en YouTube\nhttps:\/\/www.youtube.com\/watch?v=T6YVTsiryxk\nSuscribete y comparte el v\u00eddeo para m\u00e1s tutoriales de \u00e9stilos y ef\u00e9ctos textos en Photopea"], [0, 50, 1635928646, "6QtdQtwr", "https://i.imgur.com/y5GfUwv.jpeg", 15, 2371, 1209, 86333, "Dorado Golden Text", "Texto Dorado by Deluxe Tutorials\nTutorial en YouTube\nhttps:\/\/www.youtube.com\/watch?v=qu4aJnNg1Tc\nSuscribete y visita los dem\u00e1s tutoriales en photopea de mi canal"], [0, 50, 1635566637, "ZDonoomB", "https://i.imgur.com/zFb68zB.jpg", 15, 5497, 2154, 109554, "photopea texto dorado", "Texto Dorado by Deluxe Tutorials\nTutorial en YouTube\nhttps:\/\/www.youtube.com\/watch?v=qu4aJnNg1Tc\nSuscribete y visita los dem\u00e1s tutoriales en photopea de mi canal"], [0, 50, 1636062319, "40cZpjiX", "https://i.imgur.com/QkKcnf5.jpg", 15, 8901, 3682, 72348, "Realistic Gold v3 Text by Yellow Digital Tutorials", "Download Full PSD\nhttps:\/\/www.youtube.com\/watch?v=yGZ_AEDYeus\nLike, subscribe and share if you want more free photopea texts. \nVisit my Store of Flyer Text Templates \nhttps:\/\/cinema4dmaterials.wordpress.com\/"], - [0, 50, 1636094898, "qRAYtTDq", "https://i.imgur.com/1HHPWW1.jpg", 15, 3059, 1001, 170469, "CHRISTMAS CANDY CANE TEXT EFFECT BY YELLOW DIGITAL TUTORIALS", "DOWNLOAD FULL PSD \nhttps:\/\/www.youtube.com\/watch?v=OYQB2joEwtg\n\nVisit my Store of Flyer Text Templates \nhttps:\/\/cinema4dmaterials.wordpress.com\/\nMy Facebook\nhttps:\/\/www.facebook.com\/Yellow-Digital-1382286485242164\/"], + [0, 50, 1636094898, "qRAYtTDq", "https://i.imgur.com/1HHPWW1.jpg", 15, 3061, 1001, 170469, "CHRISTMAS CANDY CANE TEXT EFFECT BY YELLOW DIGITAL TUTORIALS", "DOWNLOAD FULL PSD \nhttps:\/\/www.youtube.com\/watch?v=OYQB2joEwtg\n\nVisit my Store of Flyer Text Templates \nhttps:\/\/cinema4dmaterials.wordpress.com\/\nMy Facebook\nhttps:\/\/www.facebook.com\/Yellow-Digital-1382286485242164\/"], [0, 50, 1636243931, "oe4BLedQ", "https://i.imgur.com/NInWWlv.jpg", 15, 2807, 1412, 54229, "3D TEXT IN 4K By Yellow Digital Tutorials", "Full Tutorial in YouTube\nhttps:\/\/www.youtube.com\/watch?v=50h6GwYw884\nVisit my Store\nhttps:\/\/cinema4dmaterials.wordpress.com\/\nMy Facebook\nhttps:\/\/www.facebook.com\/Yellow-Digital-1382286485242164\/"], - [0, 50, 1636568731, "LT6mD6gh", "https://i.imgur.com/W1HzhjO.jpg", 15, 8922, 4086, 40655, "Texto Dorado Vintage by Deluxe Tutorials", "FONT\nhttps:\/\/www.dafont.com\/carbon.font\nFULL TUTORIAL\nhttps:\/\/www.youtube.com\/watch?v=tmicWTLsjAg"], + [0, 50, 1636568731, "LT6mD6gh", "https://i.imgur.com/W1HzhjO.jpg", 15, 8923, 4086, 40655, "Texto Dorado Vintage by Deluxe Tutorials", "FONT\nhttps:\/\/www.dafont.com\/carbon.font\nFULL TUTORIAL\nhttps:\/\/www.youtube.com\/watch?v=tmicWTLsjAg"], [0, 50, 1636779053, "fiwekLkM", "https://i.imgur.com/34yv5Ei.jpg", 15, 5542, 2032, 16208, "Texto Cartoon 3D by Deluxe Tutorials", "Font\nhttps:\/\/www.dafont.com\/heroes-legend.font\nFull Tutorial\nhttps:\/\/www.youtube.com\/watch?v=epdWNJvqKXw"], [0, 50, 1638925466, "UP-4dva-", "https://i.imgur.com/pXo9vmV.jpg", 15, 1688, 402, 23359, "GOLDEN BALLOON By Deluxe Tutorials", "FULL TUTORIAL \nhttps:\/\/www.youtube.com\/channel\/UCPJIfJ-0wLER5lHcGyYhb2A\/\nFONT\nhttps:\/\/www.dafont.com\/crewniverse.font"], - [0, 50, 1664841998, "SYo6v-Mc", "https://i.imgur.com/ZksieZ9.jpg", 15, 4489, 1908, 12399732, "Diamond Gold", "Full Tutorial :\nhttps:\/\/www.youtube.com\/watch?v=mqXFqCJuU-w"], + [0, 50, 1664841998, "SYo6v-Mc", "https://i.imgur.com/ZksieZ9.jpg", 15, 4492, 1909, 12399732, "Diamond Gold", "Full Tutorial :\nhttps:\/\/www.youtube.com\/watch?v=mqXFqCJuU-w"], [0, 51, 1624643981, "yWT_i9T6", "https://i.imgur.com/51g5ffS.jpg", 11, 1101, 212, 1650454, "Numerous's Template 1", "This is for Numerous and ONLY Numerous use with permission."], [0, 52, 1624655052, "5EiLwvGX", "https://i.imgur.com/8Qu5Ueq.jpg", 0, 485, 75, 425016, "Apex Custom Legend Template", "Have you ever wanted to make a concept for a legend in Apex? Have you tried to make a template for it and failed? Have you ever tried to find someone else's template and found out it was deleted? Well no need to fret because I have a legend selection template just for you! Show your concepts to your friends and get them to use this template!\n\nMake sure to credit me for the template!"], [0, 53, 1624657812, "GHkF3Mou", "https://i.imgur.com/sPW0v9V.jpg", 15, 3246, 165, 36361, "Rose Text Effect by Yellow Digital Tutorials", "Tutorial in Youtube \nhttps:\/\/www.youtube.com\/watch?v=jL4uM8dJI90"], - [0, 53, 1624674441, "mwUg3UG6", "https://i.imgur.com/T1zpinv.jpg", 15, 6522, 2009, 54455, "Glossy Text Effect by Yellow Digital Tutorials", "Tutorial in YouTube : https:\/\/www.youtube.com\/watch?v=kg5D8NiDldo"], + [0, 53, 1624674441, "mwUg3UG6", "https://i.imgur.com/T1zpinv.jpg", 15, 6523, 2010, 54455, "Glossy Text Effect by Yellow Digital Tutorials", "Tutorial in YouTube : https:\/\/www.youtube.com\/watch?v=kg5D8NiDldo"], [0, 53, 1624842793, "VgiEb_D3", "https://i.imgur.com/cyjMpQQ.jpg", 15, 1979, 89, 57436, "Baby Text Effect by Yellow Digital Tutorials", "Link Tutorial in YouTube \nhttps:\/\/www.youtube.com\/watch?v=KKCLO0_3TP4"], - [0, 53, 1624855956, "0_YnQraA", "https://i.imgur.com/ouqtjlB.jpg", 15, 9231, 3558, 48111, "fish", "App Game Text Effect by Yellow Digital Tutorials \nLink Tutorial : https:\/\/www.youtube.com\/watch?v=CIrbS1S-UCA"], + [0, 53, 1624855956, "0_YnQraA", "https://i.imgur.com/ouqtjlB.jpg", 15, 9233, 3558, 48111, "fish", "App Game Text Effect by Yellow Digital Tutorials \nLink Tutorial : https:\/\/www.youtube.com\/watch?v=CIrbS1S-UCA"], [0, 53, 1624887509, "1-ksidjk", "https://i.imgur.com/OYShIr4.jpg", 15, 16540, 4543, 48457, "Cartoon Colorful 3d Text Style by Yellow Digital Tutorials", "Tutorial in YouTube : https:\/\/www.youtube.com\/watch?v=qrvl1l7GoFs"], [0, 53, 1624915763, "dyCXT9nb", "https://i.imgur.com/N6LBH1a.jpg", 15, 1487, 782, 40844, "Good Day Text Effect by Yellow Digital Tutorials", "Tutorial in YouTube https:\/\/www.youtube.com\/watch?v=Sf5dCfsRafE"], - [0, 53, 1624934633, "VSo90itD", "https://i.imgur.com/wT6mF2a.jpg", 15, 45193, 16684, 670084, "Movie Text Effect by Yellow Digital Tutorials", "Tutorial and materials in YouTube\nhttps:\/\/www.youtube.com\/watch?v=D-CijdRUMPg"], - [0, 53, 1624958209, "4X9O4-US", "https://i.imgur.com/9yqbWxI.jpg", 15, 196540, 63308, 361843, "Golden Text Effect by Yellow Digital Tutorials", "Tutorial and Materials in YouTube\nTUTORIAL AND PSD FREE : https:\/\/www.youtube.com\/watch?v=tG3GzTw0DGQ"], + [0, 53, 1624934633, "VSo90itD", "https://i.imgur.com/wT6mF2a.jpg", 15, 45194, 16684, 670084, "Movie Text Effect by Yellow Digital Tutorials", "Tutorial and materials in YouTube\nhttps:\/\/www.youtube.com\/watch?v=D-CijdRUMPg"], + [0, 53, 1624958209, "4X9O4-US", "https://i.imgur.com/9yqbWxI.jpg", 15, 196554, 63317, 361843, "Golden Text Effect by Yellow Digital Tutorials", "Tutorial and Materials in YouTube\nTUTORIAL AND PSD FREE : https:\/\/www.youtube.com\/watch?v=tG3GzTw0DGQ"], [0, 54, 1625239468, "BdxX1rcB", "https://i.imgur.com/0WeyWY7.jpg", 11, 3608, 1396, 180192, "cartoony text", "cartoony text for videos thumbnails pfps ect."], [0, 54, 1625443408, "6o9cIDpG", "https://i.imgur.com/gJIPpWa.jpg", 11, 3176, 666, 72554, "Profile picture glitch text", "blue and purple glitch text profile picture."], [0, 55, 1625590818, "GtNIHpaz", "https://i.imgur.com/wD8Z1Nt.jpg", 10, 333, 23, 142790, "INTENSE PACK (cool texts)", "9 super-Cool text types!"], @@ -361,10 +361,10 @@ [6, 58, 1651533811, "h-LUjBe1", "https://media.giphy.com/media/e1MeiQLWuCs2LRiNhB/giphy.gif", 0, 0, 664, 113838, "Paper Patterns Lined and Grid", "8 Lined| 6 Grid Paper Patterns"], [6, 58, 1651536165, "k_ZY4o6_", "https://media.giphy.com/media/piqyR56NLb1rMmrPdg/giphy.gif", 0, 0, 1143, 7701062, "Seamless HD Scales", "12 Total"], [0, 59, 1628202370, "5BwvORr8", "https://i.imgur.com/U5PtQGF.jpg", 0, 89, 17, 64600, "IMG_20200815_193941_705", "https:\/\/www.photopea.com\/#i5BwvORr8"], - [0, 60, 1638676282, "mnvFDwea", "https://i.imgur.com/K0FqrKn.png", 11, 11532, 2396, 190105, "Roblox Art", "art"], + [0, 60, 1638676282, "mnvFDwea", "https://i.imgur.com/K0FqrKn.png", 11, 11533, 2396, 190105, "Roblox Art", "art"], [0, 61, 1661467285, "XDUefjUw", "https://i.imgur.com/LM95cZg.png", 60, 299, 135, 68180, "CNN News Lower Third", "CNN News Lower Third for youtube and CNN Bloxburg"], [0, 61, 1661765869, "cSzV-mh0", "https://i.imgur.com/MG4UEmV.png", 0, 54, 5, 779030, "CNN Election Graph", "CNN Political Election Graph"], - [0, 62, 1625818870, "tA5uiPj8", "https://i.imgur.com/XrJVXQM.jpeg", 11, 6031, 1847, 234395, "how to make roblox shirt", "make it"], + [0, 62, 1625818870, "tA5uiPj8", "https://i.imgur.com/XrJVXQM.jpeg", 11, 6032, 1847, 234395, "how to make roblox shirt", "make it"], [0, 62, 1625909124, "3X2LWJqe", "https://i.imgur.com/zTeF97n.jpeg", 11, 644, 251, 192499, "pfp template", "when exporting put width - 500 height - 500"], [0, 62, 1626775582, "uTj4pcRF", "https://i.imgur.com/W6p1ZiI.png", 11, 1173, 172, 684779, "pfp maker", "just download this font and add to photopea\nhttps:\/\/www.fontspace.com\/space-mission-font-f56190"], [0, 62, 1627549093, "z9SdouTB", "https://i.imgur.com/R4qO2s7.png", 11, 46476, 10294, 703983, "pfp maker", "credits - hisho"], @@ -374,7 +374,7 @@ [0, 64, 1626091600, "FmyOqI9S", "https://i.imgur.com/18v4CWa.jpg", 0, 1725, 1067, 4135409, "Putin_life", "1"], [0, 65, 1628485322, "MWflTyYK", "https://i.imgur.com/t5prY97.jpg", 0, 191, 32, 237650, "4DD1E570-294A-493F-A43D-402A9A4A07C8", "Ifk"], [0, 65, 1628485361, "Z5jDTI2L", "https://i.imgur.com/Y8M58bH.jpg", 0, 308, 52, 4778852, "delicate", "Idk"], - [0, 66, 1652888210, "K8crHG1A", "https://i.imgur.com/ZaOayOq.jpeg", 10, 1722, 1091, 2412998, "Custom Card With Your Text", "Free to use :)\nDiscord Server: https:\/\/discord.gg\/QWGE3ANjpG"], + [0, 66, 1652888210, "K8crHG1A", "https://i.imgur.com/ZaOayOq.jpeg", 10, 1723, 1091, 2412998, "Custom Card With Your Text", "Free to use :)\nDiscord Server: https:\/\/discord.gg\/QWGE3ANjpG"], [0, 66, 1653082106, "i0pVmgqD", "https://i.imgur.com/lxQkHlF.jpeg", 10, 7281, 2274, 341744, "Gaming Logo", "Free To Use :) Discord Server: https:\/\/discord.gg\/QWGE3ANjpG"], [0, 67, 1627891831, "ItUN_dOj", "https://i.imgur.com/0VM4unR.jpg", 0, 1104, 204, 231517, "Y", "A"], [0, 67, 1627892086, "YVDhGxNf", "https://i.imgur.com/u8SA3jw.jpg", 0, 882, 77, 127240, "y", "S"], @@ -383,7 +383,7 @@ [0, 70, 1629087754, "dJCvL3Og", "https://i.imgur.com/qP6PqrK.jpg", 10, 4791, 1511, 1853699, "Simple Discord Invite Banner", "Made By Tsukei"], [0, 71, 1628048976, "HCJuDiuE", "https://i.imgur.com/N013KOO.jpg", 0, 221, 36, 34605, "Numerous's Project", "Only for my use."], [0, 72, 1628055668, "XgReG6mC", "https://i.imgur.com/PGbwrvn.jpg", 0, 489, 66, 94832, "bkg-photopea", "logo placeholder"], - [0, 73, 1651233880, "oWWSuei5", "https://i.imgur.com/jdf9MeS.jpg", 0, 906, 114, 2173174, "mockup", "\u05dc\u05db\u05dc \u05de\u05d9 \u05e9\u05d0\u05d9\u05df \u05dc\u05d5 \u05ea\u05e7\u05e6\u05d9\u05d1 \u05dc\u05e7\u05e0\u05d5\u05ea \u05e4\u05d5\u05d8\u05d5\u05e9\u05d5\u05e4 \u05d0\u05d5 \u05d0\u05d9\u05df \u05d1\u05de\u05d7\u05e9\u05d1 \u05de\u05e7\u05d5\u05dd \u05dc\u05e4\u05d5\u05d8\u05d5\u05e9\u05d5\u05e4 \u05e4\u05e8\u05d5\u05e5"], + [0, 73, 1651233880, "oWWSuei5", "https://i.imgur.com/jdf9MeS.jpg", 0, 907, 115, 2173174, "mockup", "\u05dc\u05db\u05dc \u05de\u05d9 \u05e9\u05d0\u05d9\u05df \u05dc\u05d5 \u05ea\u05e7\u05e6\u05d9\u05d1 \u05dc\u05e7\u05e0\u05d5\u05ea \u05e4\u05d5\u05d8\u05d5\u05e9\u05d5\u05e4 \u05d0\u05d5 \u05d0\u05d9\u05df \u05d1\u05de\u05d7\u05e9\u05d1 \u05de\u05e7\u05d5\u05dd \u05dc\u05e4\u05d5\u05d8\u05d5\u05e9\u05d5\u05e4 \u05e4\u05e8\u05d5\u05e5"], [0, 74, 1629388350, "XWuRyces", "https://i.imgur.com/kdA8CFA.jpg", 15, 4980, 1316, 104649, "Harry Potter Text", "Just a Harry Potter text for you lot"], [0, 75, 1628737190, "5vdcBv5a", "https://i.imgur.com/gN5lgvs.jpg", 0, 542, 9, 1838897, "5359178-ai", "hehe"], [0, 76, 1628830537, "5oZ8ODbR", "https://i.imgur.com/K3iUas0.png", 0, 71, 20, 1908, "Billionairegiant", "Gradient Template"], @@ -405,9 +405,9 @@ [0, 80, 1638888953, "z_2pMc8o", "https://i.imgur.com/cUI1Yjw.jpeg", 10, 981, 162, 822477, "***FREE*** Youtube Channel Art\/Banner", "See How To Make It...Click This LINK : https:\/\/www.youtube.com\/watch?v=J8Q_vPi9bkU&t=53s\nPlease SUBSCRIBE Me On YOUTUBE: https:\/\/www.youtube.com\/channel\/UCk2xy9I9CiH3qqeaEVomnPQ?sub_confirmation=1"], [0, 80, 1639140241, "de73PU0R", "https://i.imgur.com/WZmDxhU.jpeg", 15, 520, 124, 359710, "WINTER FLAKES TEXT", "!ENJOY!\nPlease SUBSCRIBE Me On YOUTUBE: https:\/\/www.youtube.com\/channel\/UCk2xy9I9CiH3qqeaEVomnPQ?sub_confirmation=1"], [0, 80, 1639142124, "ylbrJFmg", "https://i.imgur.com/fy3aLFc.jpeg", 15, 190, 32, 37485, "BLOWING TEXT", "!ENJOY!\nPlease SUBSCRIBE Me On YOUTUBE: https:\/\/www.youtube.com\/channel\/UCk2xy9I9CiH3qqeaEVomnPQ?sub_confirmation=1"], - [0, 81, 1629146214, "wyqvXT68", "https://i.imgur.com/KT3mdPF.jpg", 10, 3949, 1614, 121576, "Chrome Text Effect", "template for metal or chrome looking text"], + [0, 81, 1629146214, "wyqvXT68", "https://i.imgur.com/KT3mdPF.jpg", 10, 3950, 1614, 121576, "Chrome Text Effect", "template for metal or chrome looking text"], [0, 81, 1629146799, "jJRNzRr-", "https://i.imgur.com/hcxGm9k.jpg", 10, 1089, 539, 142807, "Satin Text Template", "cool text template to use for your social media work"], - [0, 82, 1654598508, "u1-ESE0t", "https://i.imgur.com/Y45df1D.jpg", 14, 271, 46, 168442, "I don't want to play with you meme", ":)"], + [0, 82, 1654598508, "u1-ESE0t", "https://i.imgur.com/Y45df1D.jpg", 14, 272, 46, 168442, "I don't want to play with you meme", ":)"], [0, 83, 1629285705, "9uwF5PJP", "https://i.imgur.com/LKJrmit.png", 0, 157, 8, 2882, "Phone_Template", "Phone template"], [3, 84, 1655254572, "P8ohtC_m", "https://media.myphotoshopbrushes.com/patterns/schemat/1055.png", 0, 0, 219, 9801, "Dooffy Patterns Square Brushes", "Dooffy Patterns Square Brushes"], [3, 84, 1655255170, "5YsmEvi3", "https://media.myphotoshopbrushes.com/brushes/schemat/338.png", 0, 0, 480, 1271241, "Halftones 1", "halftones"], @@ -432,10 +432,10 @@ [0, 91, 1631890727, "Dkm9KCq1", "https://imgur.com/C7QkMnX.png", 11, 840, 141, 3230244, "PUBG Montage", "This Is A PUBG Montage Thumbnail it took a little effort to make you can use it to make Montage thumbnail\n\nCheck My Yt In This \nhttps:\/\/www.youtube.com\/channel\/UC8oXVQJGZofNrVd710F7lyA"], [0, 92, 1631883793, "VpV2rUt3", "https://i.imgur.com/hxITnrd.jpeg", 11, 1371, 591, 71522, "White balloon text", "Balloon text,a recreation of the gold sign by CAMBIT Creates,enjoy :)"], [0, 92, 1632581135, "FenuZc-g", "https://i.imgur.com/sYe5BpV.jpeg", 10, 886, 169, 64603, "Twitter Banner Template", "Just a simple twitter banner."], - [0, 93, 1632085792, "oGMxtV9w", "https://i.imgur.com/BvL7vsn.jpg", 0, 4903, 1137, 5044356, "Banner Template", "Banner Template For You To Use"], + [0, 93, 1632085792, "oGMxtV9w", "https://i.imgur.com/BvL7vsn.jpg", 0, 4904, 1137, 5044356, "Banner Template", "Banner Template For You To Use"], [0, 93, 1632336680, "1ctA8x46", "https://i.imgur.com/fZ27O6L.jpg", 0, 4552, 1483, 18597049, "Banner Template", "Banner For You"], [0, 94, 1632322203, "wJ2DnZQf", "https://i.imgur.com/tTi66G0.png", 11, 800, 53, 14158, "Epic Text", "This text along with the background is ideal for a thumbnail!\n(The thumbnail size is preset to the YouTube thumbnail standard)"], - [0, 95, 1632322094, "uYORwfcs", "https://i.imgur.com/GPx3EDQ.jpg", 3, 7784, 2210, 3321214, "book product", "bookcover"], + [0, 95, 1632322094, "uYORwfcs", "https://i.imgur.com/GPx3EDQ.jpg", 3, 7785, 2210, 3321214, "book product", "bookcover"], [0, 95, 1639292266, "x6zFGFKA", "https://i.imgur.com/uChE3GP.jpg", 12, 741, 339, 166862, "industrial", "instagram"], [0, 96, 1632416116, "cJSZjN8K", "https://i.imgur.com/8FJ9Gml.jpeg", 12, 1974, 194, 3337609, "Turn Yourself INTO Venom", "IN THIS TEMPLATE YOU CAN CHANGE HALF VENOM FACE. ALSO YOU CAN CHANGE ALL THE TEXT AVAILIBLE IN THIS TEMPLATE.\nGuide On How To Use This Template:\nhttps:\/\/youtu.be\/-dgsXbe_TEU"], [0, 96, 1633028377, "1SpyzAog", "https://i.imgur.com/IMUvfrf.jpeg", 11, 169, 12, 344909, "Youtube Profile", "This template is easy and simple. All you Need is :\n1. Picture of yourself\n2. Channel Name\nand thats it you good to go.\nVisit My Youtube Channel:\nhttps:\/\/www.youtube.com\/channel\/UC54GM2-or9BFHnk03wXvLBw"], @@ -456,7 +456,7 @@ [0, 101, 1633801636, "lg_ccns_", "https://i.imgur.com/EiMbPdG.jpeg", 11, 490, 9, 171807, "Cod Thumbnail", "Hi"], [0, 101, 1634189690, "8hmuGzgn", "https://i.imgur.com/DCtv6Go.jpeg", 11, 731, 207, 416001, "Roblox Thumbnail", "by Tutorial Editing Tips Channel"], [0, 101, 1634249222, "TZRJSdGc", "https://i.imgur.com/Q76a8ej.jpeg", 11, 154, 41, 71076, "End Screen", "By Tutorial Editing Tips Channel"], - [0, 102, 1653141059, "eFOKOMYB", "https://i.imgur.com/MkfDHXQ.jpg", 10, 3746, 1702, 211973, "Purple Galaxy Twitter Banner", "Purple Themed Twitter Banner"], + [0, 102, 1653141059, "eFOKOMYB", "https://i.imgur.com/MkfDHXQ.jpg", 10, 3747, 1702, 211973, "Purple Galaxy Twitter Banner", "Purple Themed Twitter Banner"], [0, 102, 1649028250, "PJGn18pM", "https://i.imgur.com/0IBZCFw.jpg", 11, 1527, 530, 8191617, "Fortnite Thumbnail Template", "Fortnite"], [0, 102, 1649672652, "FMNzkDY2", "https://i.imgur.com/15pZhE1.jpg", 10, 321, 158, 132728, "Roblox GUI - Twitter Code", "Twitter Code"], [0, 102, 1652536949, "wHvl_l7-", "https://i.imgur.com/bHrvHB3.jpg", 11, 1051, 282, 1366554, "Simple YouTube Thumbnail", "Use this template for a simple YouTube Gaming Video\/Streaming Thumbnail"], @@ -492,7 +492,7 @@ [0, 111, 1635363494, "Bvl0ueGs", "https://i.imgur.com/9ovboIZ.jpg", 60, 224, 59, 4685525, "Rec Room Name PopUp Fancy", "From rec room content kit"], [0, 111, 1635363797, "jOqpFX2L", "https://i.imgur.com/3fMfZB7.jpg", 60, 202, 12, 4502716, "Rec Room Name PopUp Normal", "From rec room creator kit"], [7, 112, 1661781512, "GNnESbBw", "https://i.imgur.com/5yJYZzb.jpg", 0, 0, 349, 42909, "\u0645\u062d\u0645\u062f \u0627\u0644\u0633\u064a\u062f \u0627\u0644\u0647\u0627\u062f\u064a", "\u0628\u0633\u0645 \u0627\u0644\u0644\u0647 \u0627\u0644\u0631\u062d\u0645\u0646 \u0627\u0644\u0631\u062d\u064a\u0645"], - [7, 112, 1660563592, "bMrCfJvA", "https://i.imgur.com/OwvvRPm.jpg", 0, 0, 374, 6523, "\u0645\u062d\u0645\u062f \u0635\u0644\u0649 \u0627\u0644\u0644\u0647 \u0639\u0644\u064a\u0647 \u0648\u0633\u0644\u0645", "\u062e\u0637"], + [7, 112, 1660563592, "bMrCfJvA", "https://i.imgur.com/OwvvRPm.jpg", 0, 0, 375, 6523, "\u0645\u062d\u0645\u062f \u0635\u0644\u0649 \u0627\u0644\u0644\u0647 \u0639\u0644\u064a\u0647 \u0648\u0633\u0644\u0645", "\u062e\u0637"], [3, 113, 1659300615, "W7zBcbh6", "https://i.imgur.com/RfTm1bN.png", 0, 0, 124, 218697, "turtle brush", "turtle"], [3, 113, 1659331525, "CEFnSc0-", "https://i.imgur.com/dT2u4ki.png", 0, 0, 223, 290651, "gear brush", "gear"], [0, 114, 1638331656, "x8YyUGGT", "https://i.imgur.com/n6ylEv4.jpg", 11, 999, 23, 53438, "HiF5UL5GfKDqEr8kqUx5nxBtEgDy0TJqPevmstphzD6868yPGd", "Logical kz subscribe on YouTube"], @@ -501,7 +501,7 @@ [0, 117, 1636321936, "SVay8SFE", "https://i.imgur.com/eEp8x4c.jpg", 15, 636, 110, 56092, "hyper text effect", "Hyper text effect"], [0, 117, 1636322070, "K_1ijS1s", "https://i.imgur.com/EMp7g3y.jpg", 15, 362, 33, 709290, "New bluish tect effect", "New bluish tect effect"], [0, 117, 1636387537, "zk3w4MoM", "https://i.imgur.com/c3TGJ2A.jpg", 15, 1472, 23, 55981, "BANG!", "Bang text effects"], - [0, 117, 1636389407, "z8ksGwNK", "https://i.imgur.com/W5B6Gob.jpg", 15, 1349, 139, 104213, "SOLVED 132", "Solved text effect"], + [0, 117, 1636389407, "z8ksGwNK", "https://i.imgur.com/W5B6Gob.jpg", 15, 1350, 139, 104213, "SOLVED 132", "Solved text effect"], [0, 117, 1636529635, "YHdSURLw", "https://i.imgur.com/V2UN1Vx.jpg", 15, 999, 79, 65460, "KIDS", "Kids text effect"], [0, 118, 1636520187, "4dTb7r6e", "https://i.imgur.com/lmM1JmC.jpg", 0, 979, 27, 226297, "Georgia NEW", "licene"], [0, 118, 1636525464, "S1ZtPMG8", "https://i.imgur.com/zg2Ccvg.jpg", 2, 244, 28, 261092, "2", "2"], @@ -516,14 +516,14 @@ [0, 120, 1658770115, "K6P-AAh4", "https://i.imgur.com/w0hPsB7.png", 60, 682, 146, 732062, "Fortnite Twitch Overlay by Gael Level", "A transparent overlay meant for you to have your health bar as the background color in OBS"], [0, 120, 1659375042, "bEKXasSx", "https://i.imgur.com/8caoF5k.png", 60, 510, 112, 129300, "Valorant style Twitch Panels by Gael Level", "from Gael Level tutorial: https:\/\/youtu.be\/61WvKX1fiAk"], [0, 120, 1660666195, "bwZghEA-", "https://i.imgur.com/dY2XnH0.png", 11, 367, 114, 6749272, "PODCAST overlay for Twitch Youtube OBS studio by Gael Level", "Made for a tutorial on recording\/streaming discord conversations"], - [0, 120, 1660931081, "8lEzI3Sg", "https://i.imgur.com/V9pewZ8.png", 11, 3934, 1643, 1753567, "LIGHTNING Youtube Banner Template by Gael Level", "Youtube banner template.\nChange the text, add your character, export."], - [0, 120, 1662558032, "CGNYxapm", "https://i.imgur.com/qDr1QT8.png", 11, 3928, 1372, 7029622, "Youtube Thumbnail Template - Gaming", "A youtube thumbnail for gaming videos"], + [0, 120, 1660931081, "8lEzI3Sg", "https://i.imgur.com/V9pewZ8.png", 11, 3936, 1643, 1753567, "LIGHTNING Youtube Banner Template by Gael Level", "Youtube banner template.\nChange the text, add your character, export."], + [0, 120, 1662558032, "CGNYxapm", "https://i.imgur.com/qDr1QT8.png", 11, 3930, 1374, 7029622, "Youtube Thumbnail Template - Gaming", "A youtube thumbnail for gaming videos"], [0, 120, 1664392689, "CsXBDIIb", "https://i.imgur.com/VX9dFFX.png", 60, 254, 58, 1969645, "ALPHA Stream Overlays by Gael Level", "Made for a tutorial\nWatch here https:\/\/youtu.be\/oH0esmKNlH0"], - [0, 120, 1665064361, "JqlhM2V8", "https://i.imgur.com/mRZKr83.png", 10, 3913, 2132, 121346, "Social media pop up Template by Gael Level", "Static social media bar for live streamers"], + [0, 120, 1665064361, "JqlhM2V8", "https://i.imgur.com/mRZKr83.png", 10, 3923, 2134, 121346, "Social media pop up Template by Gael Level", "Static social media bar for live streamers"], [0, 121, 1636671983, "19D5vK8a", "https://i.imgur.com/nZwUWbT.png", 0, 663, 72, 567, "Test add tempate", "s"], [0, 122, 1636831068, "0HIlgf8Z", "https://i.imgur.com/rrvmScb.png", 10, 870, 457, 55498, "Red Hyper banner Overlay", "Custom banner overlay"], [0, 123, 1636912829, "6F70eACm", "https://i.imgur.com/I9JArIn.jpg", 15, 1121, 209, 296586, "PC SPIDY WALLPAPER", "How is it."], - [0, 124, 1639333106, "SpNOPBit", "https://i.imgur.com/hkaGeoo_d.png", 3, 7168, 915, 2748759, "t-shirt mockup", "t-shirt"], + [0, 124, 1639333106, "SpNOPBit", "https://i.imgur.com/hkaGeoo_d.png", 3, 7171, 915, 2748759, "t-shirt mockup", "t-shirt"], [0, 125, 1650138190, "YHGSwd7b", "https://i.imgur.com/64vybFV.jpeg", 14, 303, 48, 232373, "Minecraftilehm", "Lihtsalt naljakas project, lol."], [0, 126, 1637677611, "XDblTYJh", "https://i.imgur.com/Z7CsRqG.png", 60, 3717, 1465, 388066, "Neon Sign", "With this FREE template, you can make your own neon sign, you do not need credit as I did this in class :D, I hope you enjoy it!"], [0, 126, 1637765324, "UtcELoNa", "https://i.imgur.com/APafmaF.jpeg", 15, 162, 56, 1414173, "Waves Sign", "Hello there, thanks for clicking on my template. I made this while in class (as always). If you have questions they should be in the read me folder, just click on the *EYE* icon to show it.\n\nIf you have further questions let me know in the comments (scroll down)!"], @@ -533,24 +533,24 @@ [0, 127, 1638180650, "tOyVMN8b", "https://i.imgur.com/yGzpW9a.jpg", 2, 459, 50, 184274, "ASP - QR Code tag", "QRcode generated"], [0, 128, 1637753103, "4fvvwNwL", "https://i.imgur.com/uctYpHm.jpg", 0, 495, 73, 130008, "Napolincasa_Format_foto_1240x720_x_photopea", "aaaa"], [0, 129, 1647963319, "F9uGYgtn", "https://i.imgur.com/83w8TBG.jpg", 3, 141, 20, 142952, "twisted skateboards", "logotipo para TWISTED SKATEBOARDS"], - [0, 130, 1637971045, "ZvLmV3oG", "https://i.imgur.com/zH312Rp.jpeg", 15, 6621, 3184, 15094, "Clickbait Fortnite Text!", "make sure to drag the text in your project. enjoy!"], + [0, 130, 1637971045, "ZvLmV3oG", "https://i.imgur.com/zH312Rp.jpeg", 15, 6622, 3184, 15094, "Clickbait Fortnite Text!", "make sure to drag the text in your project. enjoy!"], [0, 130, 1637976543, "HUfFzyUJ", "https://i.imgur.com/fjWlX3y.jpeg", 11, 521, 212, 120923, "Red Curvey Clickbait Arrow", "Arrow By arialfx:\nhttps:\/\/youtube.com\/arialfx\nhttps:\/\/arialfx.com"], [0, 130, 1637977045, "A7vK9Uek", "https://i.imgur.com/mWF2Wth.png", 11, 1546, 728, 961, "Perfect White Border For Thumbnails (1280 x 720)", "White Border For Thumbnails"], [0, 130, 1637977738, "OuHRjzZj", "https://i.imgur.com/mmfZuTi.jpeg", 11, 176, 59, 26522, "Clickbait Style Cross", "Fortnite Thumbnail X"], [0, 130, 1639182357, "vqV_VTkh", "https://i.imgur.com/w4YuMxE.png", 11, 2611, 1309, 24222, "Clickbait Fortnite Text 2.0!", "White Edition! (drag and drop in your project) :)"], [0, 130, 1639715199, "4uWIwzNk", "https://i.imgur.com/7mvX1E4.jpeg", 11, 1463, 640, 24192, "White And Red Clickbait Text!", "drag and drop on ur project enjoy :)"], - [0, 130, 1639715498, "ll99EPfd", "https://i.imgur.com/165aGhQ.jpeg", 15, 26253, 12253, 24256, "Clickbait Text 3.0", "drag and drop in ur project enjoy! :)"], + [0, 130, 1639715498, "ll99EPfd", "https://i.imgur.com/165aGhQ.jpeg", 15, 26258, 12256, 24256, "Clickbait Text 3.0", "drag and drop in ur project enjoy! :)"], [0, 131, 1640166624, "Brpyf4qI", "https://i.imgur.com/ARBY9dj.jpeg", 11, 2643, 870, 66826, "Gold TEXT", "Simple Gold Text (you have to change both text layers to your name)\nCredit to \"Cambit Creates\""], [0, 132, 1638451861, "6lp-2AWS", "https://i.imgur.com/xdNdqLQ.jpg", 60, 357, 30, 43914, "psd__76___polaroid_by_night_gate_by_night_gate_daroopf (1)", "Idk wtf I'm doing but if this posts it's psd #76 polaroid by night-gate on DeviantArt"], [0, 133, 1638719858, "9E1wFrdb", "https://i.imgur.com/Ueb5FxA.jpg", 21, 807, 82, 133840, "Dressed Undressed", "hgfhgf"], [0, 134, 1638961144, "AyPXY0cn", "https://i.imgur.com/KPgkggL.jpg", 0, 367, 15, 133784, "psd__45_by_xsweetxtea_ddlutln", "hereherehereherehehree"], - [0, 135, 1641116089, "YwrcRLRS", "https://i.imgur.com/cVhqlTs.jpg", 60, 85218, 31505, 122705, "Roblox Clothing Templates", "Do you need the template to make a shirt or pants on the platform Roblox? If you do well then here you go."], + [0, 135, 1641116089, "YwrcRLRS", "https://i.imgur.com/cVhqlTs.jpg", 60, 85224, 31508, 122705, "Roblox Clothing Templates", "Do you need the template to make a shirt or pants on the platform Roblox? If you do well then here you go."], [0, 136, 1639151647, "zhVjj46-", "https://i.imgur.com/WtWytyu.jpg", 0, 245, 44, 166842, "daz flowers.2021", "flowers"], [0, 137, 1640167164, "Q3c8MSGB", "https://i.imgur.com/vrtfvCS.jpg", 2, 354, 25, 28823228, "DC Mockup 02", "Perde + Hali"], [0, 138, 1640028720, "27DnORKS", "https://i.imgur.com/A0eWZJe.jpg", 0, 6096, 1940, 144415, "Clickbait Font", "Made by Daddy Grav"], [0, 139, 1640204706, "54NwBSGU", "https://i.imgur.com/eJwQ4Iv.png", 10, 5148, 1917, 454787, "Roblox simulator logo", "Basic logo for Roblox simulator games"], [0, 140, 1640435240, "SViiyUUb", "https://i.imgur.com/z7pB0fz.jpeg", 10, 855, 450, 23147, "Simple Twitter Banner", "Just a simple twitter banner where you can change the name to your desire!"], - [0, 141, 1640594595, "bIyRfxuq", "https://wallpapercave.com/wp/wp6322092.jpg", 1, 2531, 195, 628507, "Background AesThecThic", "LOL"], + [0, 141, 1640594595, "bIyRfxuq", "https://wallpapercave.com/wp/wp6322092.jpg", 1, 2532, 195, 628507, "Background AesThecThic", "LOL"], [0, 142, 1640787580, "dCLKqiT_", "https://i.imgur.com/HfD3eX8.jpg", 10, 125, 19, 6195949, "ViserionComunica\u00e7ao", "Especialista em Design Gr\u00e1fico Publicit\u00e1rio"], [0, 143, 1640805540, "_ke3o76U", "https://i.imgur.com/R34YIEM.jpeg", 14, 1479, 454, 584669, "Lego Star Wars Character Background", "Lego Star Wars Character Background. For any use you want!"], [0, 144, 1644276183, "qkOdoeE5", "https://i.imgur.com/gbpXyIo.jpeg", 0, 253, 84, 560003, "MOCKUP", "Hello !"], @@ -571,75 +571,75 @@ [0, 155, 1644471783, "UmIi2uhs", "https://i.imgur.com/lTsWuk8.jpeg", 15, 637, 447, 17956, "Cool Text For YouTube Thumbnails", "This Is A Basic Test With A Stroke Drop Shadow And Some Other Things."], [0, 156, 1643504813, "dJsomJxN", "https://i.imgur.com/uIYtTHK.jpg", 0, 143, 34, 4045541, "DAILY PRICE UPDATE TEMPLATE NEW", "."], [0, 157, 1643614301, "nB--Et5O", "https://i.imgur.com/RXSMAxg.jpg", 0, 115, 17, 5458923, "Magic Item template", "1"], - [0, 158, 1644008729, "TPFkUiWV", "https://graphicsfamily.com/wp-content/uploads/edd/2022/01/Dark-Office-Logo-Mockup-1180x787.jpg", 0, 4067, 1086, 4607273, "Dark Office Logo Mockup", "Perfect for branding your logo design projects.\nDownload Free .PSD source + TUTORIAL: \nhttps:\/\/graphicsfamily.com\/downloads\/dark-office-logo-mockup\/"], - [0, 158, 1644015984, "57sVTBeT", "https://graphicsfamily.com/wp-content/uploads/edd/2022/02/3D-Glass-Logo-Mockup-by-GraphicsFamily.jpg", 0, 6094, 1148, 17658662, "3D Glass Logo Mockup", "Built to empower your logo & brand identity. Design flexibility, influence and shine! Download:\n\nhttps:\/\/graphicsfamily.com\/downloads\/3d-glass-logo-mockup\/"], + [0, 158, 1644008729, "TPFkUiWV", "https://graphicsfamily.com/wp-content/uploads/edd/2022/01/Dark-Office-Logo-Mockup-1180x787.jpg", 0, 4068, 1088, 4607273, "Dark Office Logo Mockup", "Perfect for branding your logo design projects.\nDownload Free .PSD source + TUTORIAL: \nhttps:\/\/graphicsfamily.com\/downloads\/dark-office-logo-mockup\/"], + [0, 158, 1644015984, "57sVTBeT", "https://graphicsfamily.com/wp-content/uploads/edd/2022/02/3D-Glass-Logo-Mockup-by-GraphicsFamily.jpg", 0, 6095, 1148, 17658662, "3D Glass Logo Mockup", "Built to empower your logo & brand identity. Design flexibility, influence and shine! Download:\n\nhttps:\/\/graphicsfamily.com\/downloads\/3d-glass-logo-mockup\/"], [0, 158, 1644139646, "a6trZkwY", "https://graphicsfamily.com/wp-content/uploads/edd/2022/02/Free-Office-Logo-Mockup-Download-GraphicsFamily-.jpg", 0, 19314, 4738, 795500, "Free Office Logo Mockup", "Showcase your logo or brand in a professional manner. Download Free .PSD source :\n\nhttps:\/\/graphicsfamily.com\/downloads\/free-office-logo-mockup\/"], - [0, 158, 1644188269, "GD89Pvb1", "https://graphicsfamily.com/wp-content/uploads/edd/2022/02/3D-Logo-Mockup-Design-Download.jpg", 0, 70456, 14775, 5807217, "3D Logo Mockup", "A brilliant way to improve your logo appearance! Impress your audience! Download Free PSD source:\n\nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-design\/"], + [0, 158, 1644188269, "GD89Pvb1", "https://graphicsfamily.com/wp-content/uploads/edd/2022/02/3D-Logo-Mockup-Design-Download.jpg", 0, 70459, 14779, 5807217, "3D Logo Mockup", "A brilliant way to improve your logo appearance! Impress your audience! Download Free PSD source:\n\nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-design\/"], [0, 158, 1644296595, "e-Zq-21q", "https://graphicsfamily.com/wp-content/uploads/2022/02/Download-Smoke-Effects-Free-Neon-Logo-Mockup.jpg", 0, 2137, 351, 3423972, "Neon Logo Mockup", "Put the WOW factor in your logo designs and amaze your audience! Download Free PSD source: graphicsfamily.com\/downloads\/free-neon-logo-mockup\/"], [0, 158, 1645134049, "rH6GfJ3v", "https://graphicsfamily.com/wp-content/uploads/2022/02/Free-Cap-Mockup-Thumb.jpg", 0, 1538, 526, 7326924, "Free Cap Mockup", "Showcase your logo designs like a PRO with this beautiful PSD mockup.\nDownload PSD source: https:\/\/graphicsfamily.com\/downloads\/free-cap-mockup\/"], - [0, 158, 1645138185, "FpsxpDlZ", "https://graphicsfamily.com/wp-content/uploads/2022/02/3D-Logo-Mockup-on-Office-Glass-Wall-by-GraphicsFamily.jpg", 0, 8511, 2983, 3576263, "3D Logo Mockup On Office Glass Wall", "Imagination, Logo Design Creativity and Finesse. Free Download PSD Source:\nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-on-office-glass-wall\/"], - [0, 158, 1645139838, "_-iPoMvO", "https://graphicsfamily.com/wp-content/uploads/edd/2020/05/MODERN-3D-LOGO-MOCKUP-1180x885.jpg", 0, 19716, 4775, 3730985, "Modern 3D Logo Mockup", "This stunning 3D Logo Mock-up will help you transform your logo, text or icon into a modern and realistic 3D perspective. Download PSD source file now:\nhttps:\/\/graphicsfamily.com\/downloads\/modern-3d-logo-mock-up\/"], - [0, 158, 1645396876, "AyNQMMS7", "https://i.imgur.com/ay8ILtp.jpg", 0, 44920, 13504, 21782013, "Logo Mockup on Office Glass", "Let's make your new logo worth a thousand words! Free download PSD source now:\ngraphicsfamily.com\/downloads\/logo-mockup-on-office-glass\/"], - [0, 158, 1645511025, "Gjp5Zcb2", "https://i.imgur.com/n610gL1.jpg", 0, 28014, 8800, 1415753, "3D Logo Mockup on Black Wall", "A perfect mockup for branding your logo design projects! Free download PSD source now: \nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-on-black-wall\/ \u200e"], + [0, 158, 1645138185, "FpsxpDlZ", "https://graphicsfamily.com/wp-content/uploads/2022/02/3D-Logo-Mockup-on-Office-Glass-Wall-by-GraphicsFamily.jpg", 0, 8516, 2984, 3576263, "3D Logo Mockup On Office Glass Wall", "Imagination, Logo Design Creativity and Finesse. Free Download PSD Source:\nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-on-office-glass-wall\/"], + [0, 158, 1645139838, "_-iPoMvO", "https://graphicsfamily.com/wp-content/uploads/edd/2020/05/MODERN-3D-LOGO-MOCKUP-1180x885.jpg", 0, 19721, 4777, 3730985, "Modern 3D Logo Mockup", "This stunning 3D Logo Mock-up will help you transform your logo, text or icon into a modern and realistic 3D perspective. Download PSD source file now:\nhttps:\/\/graphicsfamily.com\/downloads\/modern-3d-logo-mock-up\/"], + [0, 158, 1645396876, "AyNQMMS7", "https://i.imgur.com/ay8ILtp.jpg", 0, 44924, 13506, 21782013, "Logo Mockup on Office Glass", "Let's make your new logo worth a thousand words! Free download PSD source now:\ngraphicsfamily.com\/downloads\/logo-mockup-on-office-glass\/"], + [0, 158, 1645511025, "Gjp5Zcb2", "https://i.imgur.com/n610gL1.jpg", 0, 28017, 8800, 1415753, "3D Logo Mockup on Black Wall", "A perfect mockup for branding your logo design projects! Free download PSD source now: \nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-on-black-wall\/ \u200e"], [0, 158, 1645649423, "zaTSFmvR", "https://i.imgur.com/NH5TDT0.jpeg", 0, 4867, 1882, 6255169, "FREE Wall Logo Mockup", "Improve your logo design appearance and increase sales! Free download PSD source now: \nhttps:\/\/graphicsfamily.com\/downloads\/sunshade-3d-logo-mockup\/"], [0, 158, 1645650824, "XucY2N3y", "https://i.imgur.com/RjU6oaZ.jpeg", 0, 7753, 2498, 9339291, "FREE Elegant Logo Mockup", "Put the \"WOW\" factor in your logo designs and make more money! Download free PSD source:\nhttps:\/\/graphicsfamily.com\/downloads\/black-gold-elegant-logo-mockup\/"], - [0, 158, 1645656913, "nHT4Xzgm", "https://i.imgur.com/zPzP9BX.jpeg", 0, 7675, 3318, 1681921, "FREE 3D Logo Mockup", "Get a Logo Design Presentation That Boosts Sales! Attract more clients with professional logo presentations! Free Download PSD Source File:\nhttps:\/\/graphicsfamily.com\/downloads\/category\/mockups\/logo-mockup\/"], - [0, 158, 1645659025, "zekdsee6", "https://i.imgur.com/bPoPZ38.jpeg", 0, 3933, 1106, 3675843, "FREE Company Branding Logo Mockup", "Make your new logo worth a thousand words! Memorable, simple and unique. An aesthetic professional office branding is really essential for your logo design success. Free Download:\nhttps:\/\/graphicsfamily.com\/downloads\/category\/mockups\/logo-mockup\/"], + [0, 158, 1645656913, "nHT4Xzgm", "https://i.imgur.com/zPzP9BX.jpeg", 0, 7678, 3318, 1681921, "FREE 3D Logo Mockup", "Get a Logo Design Presentation That Boosts Sales! Attract more clients with professional logo presentations! Free Download PSD Source File:\nhttps:\/\/graphicsfamily.com\/downloads\/category\/mockups\/logo-mockup\/"], + [0, 158, 1645659025, "zekdsee6", "https://i.imgur.com/bPoPZ38.jpeg", 0, 3934, 1106, 3675843, "FREE Company Branding Logo Mockup", "Make your new logo worth a thousand words! Memorable, simple and unique. An aesthetic professional office branding is really essential for your logo design success. Free Download:\nhttps:\/\/graphicsfamily.com\/downloads\/category\/mockups\/logo-mockup\/"], [0, 158, 1645777685, "VSczIvX3", "https://i.imgur.com/4VYdfN3.jpeg", 0, 3883, 965, 6169079, "FREE Golden 3D Logo Mockup", "Beautifully crafted logo presentations will represent yourself as a designer more professionally. This awesome 3D logo mockup will instantly grab your customers attention and increase your logo designs sales. \nDownload PSD Source File:\nhttps:\/\/graphicsfamily.com\/downloads\/golden-3d-logo-mockup-on-black-wall\/"], [0, 158, 1646254591, "ZhBoHYu3", "https://i.imgur.com/MCGitiu.jpg", 11, 2407, 308, 10140672, "YouTube Channel Art Design", "Whether you are a fashion designer, a fashion photographer, an ad agency or even a B2B tech company, you can highlight your talents and make sure your audience gets the message by using this FREE and ingenious resource today! \nFree Download PSD source:\nhttps:\/\/graphicsfamily.com\/downloads\/category\/youtube-channel-art\/"], - [0, 158, 1646259570, "HZa_T9iJ", "https://i.imgur.com/I3pSL1p.jpeg", 0, 8082, 2934, 5854366, "Realistic Glossy Wall Logo Mockup", "A beautiful logo mock-up will save you a lot of time and also will enhance the design presentation no matter how small or large your clients\u2019 projects are.\nhttps:\/\/graphicsfamily.com\/downloads\/category\/mockups\/logo-mockup\/"], + [0, 158, 1646259570, "HZa_T9iJ", "https://i.imgur.com/I3pSL1p.jpeg", 0, 8083, 2935, 5854366, "Realistic Glossy Wall Logo Mockup", "A beautiful logo mock-up will save you a lot of time and also will enhance the design presentation no matter how small or large your clients\u2019 projects are.\nhttps:\/\/graphicsfamily.com\/downloads\/category\/mockups\/logo-mockup\/"], [0, 158, 1646638441, "8MNrpF_v", "https://i.imgur.com/A4LjmI1.jpeg", 0, 4911, 702, 6905639, "Black 3D Logo Mockup", "Bringing the logo design art to the cart. Good luck with sales and happy clients!\nhttps:\/\/graphicsfamily.com\/downloads\/black-3d-logo-mockup-on-gray-wall\/"], - [0, 158, 1647074735, "wBkmhxEL", "https://i.imgur.com/AOcXFhE.jpeg", 0, 11734, 2438, 11915602, "Glass 3D Logo Mockup", "Develop a passion for logo design. Very easy to use and the fastest way to show your design.\nhttps:\/\/graphicsfamily.com\/downloads\/glass-3d-logo-mockup-on-black-wall\/"], - [0, 158, 1647157344, "FBP15l60", "https://i.imgur.com/5CObZRv.jpeg", 0, 26643, 6479, 5693114, "Logo Mockup on Gray Wall", "Perfect to present your logo designs in a more realistic and creative way.\nhttps:\/\/graphicsfamily.com\/downloads\/logo-mockup-on-gray-wall\/"], - [0, 158, 1647494050, "5zk4cAot", "https://i.imgur.com/U7mdrAe.jpeg", 0, 14097, 5013, 3859253, "Logo Mockup with 3D Logo", "Showcase your creative designs with a highly realistic 3D effect logo mockup!\nhttps:\/\/graphicsfamily.com\/downloads\/logo-mockup-with-3d-logo\/"], + [0, 158, 1647074735, "wBkmhxEL", "https://i.imgur.com/AOcXFhE.jpeg", 0, 11736, 2439, 11915602, "Glass 3D Logo Mockup", "Develop a passion for logo design. Very easy to use and the fastest way to show your design.\nhttps:\/\/graphicsfamily.com\/downloads\/glass-3d-logo-mockup-on-black-wall\/"], + [0, 158, 1647157344, "FBP15l60", "https://i.imgur.com/5CObZRv.jpeg", 0, 26647, 6479, 5693114, "Logo Mockup on Gray Wall", "Perfect to present your logo designs in a more realistic and creative way.\nhttps:\/\/graphicsfamily.com\/downloads\/logo-mockup-on-gray-wall\/"], + [0, 158, 1647494050, "5zk4cAot", "https://i.imgur.com/U7mdrAe.jpeg", 0, 14098, 5014, 3859253, "Logo Mockup with 3D Logo", "Showcase your creative designs with a highly realistic 3D effect logo mockup!\nhttps:\/\/graphicsfamily.com\/downloads\/logo-mockup-with-3d-logo\/"], [0, 158, 1648677408, "bqdOO3_I", "https://i.imgur.com/2sWljUt.jpg", 60, 384, 23, 82901, "Simple Invoice Design", "Build trust and grow your brand with a professional invoice design.\nhttps:\/\/graphicsfamily.com\/downloads\/clean-professional-invoice-template\/"], [0, 158, 1649913429, "v6h_UzJV", "https://i.imgur.com/YNF5mkx.jpg", 0, 641, 51, 1852772, "Brick Wall Logo Mockup", "Create a stunning design presentation for your logo creations with ease! \nhttps:\/\/graphicsfamily.com\/downloads\/brick-wall-logo-mockup\/"], [0, 158, 1652046656, "GGv20R_y", "https://i.imgur.com/zPzpLD8.jpg", 0, 1076, 91, 789206, "Metallic Badge Logo Mockup", "An amazing photorealistic metallic badge logo mockup!\nhttps:\/\/graphicsfamily.com\/downloads\/photorealistic-metallic-badge-logo-mockup\/"], [0, 158, 1652328077, "k0GaNzRe", "https://i.imgur.com/z5pMu4X.jpg", 0, 6084, 2189, 3857288, "Photorealistic Logo Mockup", "Promote your logo design creations in a professional manner!\nhttps:\/\/graphicsfamily.com\/downloads\/photorealistic-cotton-logo-mockup\/"], [0, 158, 1654466737, "uKiIUn7b", "https://i.imgur.com/cR6NSME.jpg", 0, 1895, 353, 2105385, "Laser Cut Cotton Logo Mockup", "Meticulously designed to make your clients super impressed. https:\/\/graphicsfamily.com\/downloads\/photo-realistic-laser-cut-cotton-logo-mockup\/"], - [0, 158, 1655180337, "cNRcf7ah", "https://i.imgur.com/zwUtfTr.jpg", 0, 7136, 1415, 1279403, "3D Golden Logo Mockup", "A brilliant way to improve your logo appearance! Generate more sales for your logo designs!\nhttps:\/\/graphicsfamily.com\/downloads\/3d-golden-logo-mockup\/"], + [0, 158, 1655180337, "cNRcf7ah", "https://i.imgur.com/zwUtfTr.jpg", 0, 7137, 1415, 1279403, "3D Golden Logo Mockup", "A brilliant way to improve your logo appearance! Generate more sales for your logo designs!\nhttps:\/\/graphicsfamily.com\/downloads\/3d-golden-logo-mockup\/"], [0, 158, 1655181707, "icRDjqMU", "https://i.imgur.com/UMXrQvj.jpg", 0, 2470, 359, 2512097, "Green Glass Logo Mockup", "Showcase your creative logo designs with a professional Green Glass Logo Mockup! https:\/\/graphicsfamily.com\/downloads\/green-glass-logo-mockup\/"], - [0, 158, 1655184671, "gsrgWpa8", "https://i.imgur.com/ZJXSDfg.jpg", 0, 7418, 2801, 1011394, "Stone Logo Mockup", "The perfect logo design presentation to impress your clients.\nhttps:\/\/graphicsfamily.com\/downloads\/carved-stone-logo-mockup\/"], - [0, 158, 1655185786, "4WdoPo04", "https://i.imgur.com/jTBFF7w.jpg", 0, 29822, 12657, 2730875, "Paper Logo Mockup", "Present Your Logo Designs Like An Ad Agency and WOW your audience!\nhttps:\/\/graphicsfamily.com\/downloads\/paper-logo-mockup\/"], - [0, 158, 1655755174, "0QpNBErG", "https://i.imgur.com/EZh6dGK.jpg", 0, 80104, 16211, 2475554, "3D Logo Mockup on Glass Wall", "Good logo design is good business! Enhance your designer portfolio with quality and professional logo presentations.\nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-on-glass-wall\/"], + [0, 158, 1655184671, "gsrgWpa8", "https://i.imgur.com/ZJXSDfg.jpg", 0, 7420, 2802, 1011394, "Stone Logo Mockup", "The perfect logo design presentation to impress your clients.\nhttps:\/\/graphicsfamily.com\/downloads\/carved-stone-logo-mockup\/"], + [0, 158, 1655185786, "4WdoPo04", "https://i.imgur.com/jTBFF7w.jpg", 0, 29829, 12663, 2730875, "Paper Logo Mockup", "Present Your Logo Designs Like An Ad Agency and WOW your audience!\nhttps:\/\/graphicsfamily.com\/downloads\/paper-logo-mockup\/"], + [0, 158, 1655755174, "0QpNBErG", "https://i.imgur.com/EZh6dGK.jpg", 0, 80120, 16212, 2475554, "3D Logo Mockup on Glass Wall", "Good logo design is good business! Enhance your designer portfolio with quality and professional logo presentations.\nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-on-glass-wall\/"], [0, 158, 1657776447, "1oKM7KAw", "https://i.imgur.com/OzqGJLI.jpg", 0, 764, 114, 684547, "Black Logo Mockup on White Wall", "Show off your logo or any other graphics with this amazing mockup. https:\/\/graphicsfamily.com\/downloads\/black-logo-mockup-on-white-wall\/"], [0, 158, 1658124813, "KOhvhzGT", "https://i.imgur.com/L0Mo1qT.jpg", 0, 3422, 405, 249222, "3D Glass Logo Mockup", "Imagine how amazing your logos would look like on this window glass. https:\/\/graphicsfamily.com\/downloads\/3d-glass-logo-mockup-on-blue-office-wall\/"], - [0, 158, 1658873385, "2u1myRLU", "https://i.imgur.com/D3tnYtf.jpg", 0, 3296, 1133, 9165831, "Luxury Logo Mockup", "An elegant way to present your logo designs. Impress your clients with quality and professional logo presentations. https:\/\/graphicsfamily.com\/downloads\/category\/mockups\/logo-mockup\/"], + [0, 158, 1658873385, "2u1myRLU", "https://i.imgur.com/D3tnYtf.jpg", 0, 3297, 1134, 9165831, "Luxury Logo Mockup", "An elegant way to present your logo designs. Impress your clients with quality and professional logo presentations. https:\/\/graphicsfamily.com\/downloads\/category\/mockups\/logo-mockup\/"], [0, 158, 1659068970, "jdIKIcp9", "https://i.imgur.com/YQp8zTS.jpg", 0, 2853, 272, 593775, "3D Golden Metal Logo Mockup", "Use this Mockup and show off your creative side! Add a professional and impressive look to your logo designs!\nhttps:\/\/graphicsfamily.com\/downloads\/category\/mockups\/logo-mockup\/"], - [0, 158, 1659071650, "cAMBatl2", "https://i.imgur.com/gFysfw3.jpg", 0, 6833, 1780, 1578713, "Glass Door Logo Mockup", "With only a few clicks, you can create eye-catching thumbnails for your logo designs! Impress your audience and attract more clients! https:\/\/graphicsfamily.com\/downloads\/glass-door-signage-logo-mockup\/"], - [0, 158, 1659074265, "jleRDRcJ", "https://i.imgur.com/YvL8Cd4.jpg", 0, 7383, 2581, 406381, "Office Logo Mockup", "Improve the appearance of your latest logos and amaze your clients.\nhttps:\/\/graphicsfamily.com\/downloads\/minimal-office-logo-mockup\/"], - [0, 158, 1659131861, "5CdPNY26", "https://i.imgur.com/2NQP10h.jpg", 0, 38659, 14204, 3621366, "Paper Logo Mockup", "Make your new logo design worth a thousand words! Impress your clients!\nhttps:\/\/graphicsfamily.com\/downloads\/logo-mock-up-on-paper-free-psd\/"], + [0, 158, 1659071650, "cAMBatl2", "https://i.imgur.com/gFysfw3.jpg", 0, 6834, 1780, 1578713, "Glass Door Logo Mockup", "With only a few clicks, you can create eye-catching thumbnails for your logo designs! Impress your audience and attract more clients! https:\/\/graphicsfamily.com\/downloads\/glass-door-signage-logo-mockup\/"], + [0, 158, 1659074265, "jleRDRcJ", "https://i.imgur.com/YvL8Cd4.jpg", 0, 7384, 2581, 406381, "Office Logo Mockup", "Improve the appearance of your latest logos and amaze your clients.\nhttps:\/\/graphicsfamily.com\/downloads\/minimal-office-logo-mockup\/"], + [0, 158, 1659131861, "5CdPNY26", "https://i.imgur.com/2NQP10h.jpg", 0, 38669, 14207, 3621366, "Paper Logo Mockup", "Make your new logo design worth a thousand words! Impress your clients!\nhttps:\/\/graphicsfamily.com\/downloads\/logo-mock-up-on-paper-free-psd\/"], [0, 158, 1659132734, "GIEkmzx5", "https://graphicsfamily.com/wp-content/uploads/edd/2020/06/Free-Realistic-3D-Wall-Logo-MockUp-Animated-GIF.gif", 0, 825, 182, 4164458, "3D Wall Logo MockUp", "This stunning 3D realistic mockup with the great spot light effect not only will enhance your logo design presentation in a super-polished way.\nhttps:\/\/graphicsfamily.com\/downloads\/realistic-3d-wall-logo-mockup\/"], - [0, 158, 1659133396, "hnpVsY98", "https://i.imgur.com/ccX047d.jpg", 0, 1578, 482, 1079009, "Metal Effect Logo Mockup", "Clean-cut, bold and professional, this logo mockup will help you communicate the essence of the brand.\nhttps:\/\/graphicsfamily.com\/downloads\/metal-logo-effect-mockup\/"], - [0, 158, 1660540072, "XtYxaz5d", "https://i.imgur.com/BVbQys3.jpg", 0, 25710, 9730, 311537, "Logo Mockup on Black Textile", "\ud83d\udd25 Taste the Feeling of an Amazing Logo Design Presentation! \nhttps:\/\/graphicsfamily.com\/downloads\/white-logo-mockup-on-black-textile\/"], - [0, 158, 1661224240, "8E7rp8Xr", "https://i.imgur.com/6kntRtg.jpg", 25, 964, 91, 434839, "Free Certificate Template Design", "You\u2019re looking for a creative certificate design template, right? https:\/\/graphicsfamily.com\/downloads\/free-certificate-design-psd-download\/"], + [0, 158, 1659133396, "hnpVsY98", "https://i.imgur.com/ccX047d.jpg", 0, 1579, 483, 1079009, "Metal Effect Logo Mockup", "Clean-cut, bold and professional, this logo mockup will help you communicate the essence of the brand.\nhttps:\/\/graphicsfamily.com\/downloads\/metal-logo-effect-mockup\/"], + [0, 158, 1660540072, "XtYxaz5d", "https://i.imgur.com/BVbQys3.jpg", 0, 25720, 9733, 311537, "Logo Mockup on Black Textile", "\ud83d\udd25 Taste the Feeling of an Amazing Logo Design Presentation! \nhttps:\/\/graphicsfamily.com\/downloads\/white-logo-mockup-on-black-textile\/"], + [0, 158, 1661224240, "8E7rp8Xr", "https://i.imgur.com/6kntRtg.jpg", 25, 966, 91, 434839, "Free Certificate Template Design", "You\u2019re looking for a creative certificate design template, right? https:\/\/graphicsfamily.com\/downloads\/free-certificate-design-psd-download\/"], [0, 158, 1661225174, "J2ZDNA6z", "https://i.imgur.com/2Ft4Op3.jpg", 40, 1364, 201, 3401345, "Free Web Banner Design", "A professional eye-catching banner design template for you!\nhttps:\/\/graphicsfamily.com\/downloads\/professional-web-banner-design-free-psd-template\/"], [0, 158, 1661226219, "oEiA-_V4", "https://i.imgur.com/1arPhWy.jpg", 21, 655, 87, 3227086, "Free Id Card Template", "An amazing ID-CARD template to represent your company\u2019s image.\nhttps:\/\/graphicsfamily.com\/downloads\/free-id-card-mockup-template\/"], - [0, 158, 1661226661, "oqg8jD99", "https://i.imgur.com/4LBLtas.jpg", 21, 2128, 221, 3661268, "Student Id Card Design", "\ud83d\udd25Get a professional ID Card with this ready-made template!\nhttps:\/\/graphicsfamily.com\/downloads\/modern-student-id-card-design-free-template\/"], + [0, 158, 1661226661, "oqg8jD99", "https://i.imgur.com/4LBLtas.jpg", 21, 2129, 221, 3661268, "Student Id Card Design", "\ud83d\udd25Get a professional ID Card with this ready-made template!\nhttps:\/\/graphicsfamily.com\/downloads\/modern-student-id-card-design-free-template\/"], [0, 158, 1661407657, "_TKGPHVP", "https://i.imgur.com/tXyTaYl.jpg", 21, 1314, 207, 3660368, "Business Card Design Template", "Create a Beautiful, Professional, Printable Business Card Design right now!\nhttps:\/\/graphicsfamily.com\/downloads\/creative-business-card-design-with-white-and-green\/"], - [0, 158, 1661458473, "-fL8A5Fr", "https://i.imgur.com/GOgEQO5.png", 21, 922, 215, 99958, "Free Simple and Modern Business Card Design Template with White and Red", "Create Your Perfect Business Card Fast Crafted by a Professional Graphic Artist!\nhttps:\/\/graphicsfamily.com\/downloads\/category\/business-cards\/"], - [0, 158, 1661459401, "YbFZjnRG", "https://i.imgur.com/BCFcqBr.jpg", 21, 1732, 260, 1059714, "White and Blue Business Card Design", "Business cards can help you establish your brand!\nhttps:\/\/graphicsfamily.com\/downloads\/white-and-blue-simple-business-card-design\/"], - [0, 158, 1661460930, "77MtGY6x", "https://i.imgur.com/8QfwyGK.jpg", 0, 1597, 465, 1940080, "Office Logo Mockup", "Logo presentation is as important as creative work. As a designer, you need to know how to really sell your creations in a really professional way.\nhttps:\/\/graphicsfamily.com\/downloads\/office-background-logo-mockup\/"], + [0, 158, 1661458473, "-fL8A5Fr", "https://i.imgur.com/GOgEQO5.png", 21, 923, 215, 99958, "Free Simple and Modern Business Card Design Template with White and Red", "Create Your Perfect Business Card Fast Crafted by a Professional Graphic Artist!\nhttps:\/\/graphicsfamily.com\/downloads\/category\/business-cards\/"], + [0, 158, 1661459401, "YbFZjnRG", "https://i.imgur.com/BCFcqBr.jpg", 21, 1733, 260, 1059714, "White and Blue Business Card Design", "Business cards can help you establish your brand!\nhttps:\/\/graphicsfamily.com\/downloads\/white-and-blue-simple-business-card-design\/"], + [0, 158, 1661460930, "77MtGY6x", "https://i.imgur.com/8QfwyGK.jpg", 0, 1598, 465, 1940080, "Office Logo Mockup", "Logo presentation is as important as creative work. As a designer, you need to know how to really sell your creations in a really professional way.\nhttps:\/\/graphicsfamily.com\/downloads\/office-background-logo-mockup\/"], [0, 158, 1661461986, "RFB7ejCM", "https://i.imgur.com/K27WBIa.jpg", 0, 2377, 477, 975556, "Metal Logo Mockup", "Create highly engaging thumbnails for your logo designs!\nhttps:\/\/graphicsfamily.com\/downloads\/metal-sign-logo-mockup-on-black-wall\/"], - [0, 158, 1661749992, "6cmYdtSV", "https://i.imgur.com/vQf2DoY.jpg", 12, 1548, 334, 1765872, "Social media post design", "A great way to promote your digital business service through social media. \nhttps:\/\/graphicsfamily.com\/downloads\/category\/instagram-posts\/"], - [0, 158, 1661753667, "aK0KQAL_", "https://i.imgur.com/8qF7jPI.jpg", 60, 1433, 109, 598096, "Star Logo Design", "\ud83e\udd29Create a professional \u2b50star logo design in minutes!\nhttps:\/\/graphicsfamily.com\/downloads\/free-star-logo-design\/"], - [0, 158, 1661812961, "qdBP0KMR", "https://i.imgur.com/sUYR9yR.jpg", 0, 3842, 906, 2388548, "Glass Board Logo Mockup", "A well presented logo design will surely win the bid for example in a logo design contest or when you deliver the design concept to your customers.\nhttps:\/\/graphicsfamily.com\/downloads\/glass-board-logo-mockup\/"], + [0, 158, 1661749992, "6cmYdtSV", "https://i.imgur.com/vQf2DoY.jpg", 12, 1550, 334, 1765872, "Social media post design", "A great way to promote your digital business service through social media. \nhttps:\/\/graphicsfamily.com\/downloads\/category\/instagram-posts\/"], + [0, 158, 1661753667, "aK0KQAL_", "https://i.imgur.com/8qF7jPI.jpg", 60, 1434, 109, 598096, "Star Logo Design", "\ud83e\udd29Create a professional \u2b50star logo design in minutes!\nhttps:\/\/graphicsfamily.com\/downloads\/free-star-logo-design\/"], + [0, 158, 1661812961, "qdBP0KMR", "https://i.imgur.com/sUYR9yR.jpg", 0, 3843, 906, 2388548, "Glass Board Logo Mockup", "A well presented logo design will surely win the bid for example in a logo design contest or when you deliver the design concept to your customers.\nhttps:\/\/graphicsfamily.com\/downloads\/glass-board-logo-mockup\/"], [0, 158, 1661813957, "NDoe2x11", "https://i.imgur.com/Pq4yEIY.jpg", 0, 2350, 424, 1726359, "Black Wall Logo Mockup", "A brilliant idea to showcase your logos to your clients.\nhttps:\/\/graphicsfamily.com\/downloads\/black-wall-logo-mockup\/"], [0, 158, 1661814703, "O5LwYdx8", "https://i.imgur.com/QqdACvc.jpg", 0, 4002, 1198, 2868447, "3D Logo Mockup", "Logo mockups are the #1 factor that influence people to buy your logo designs!\nhttps:\/\/graphicsfamily.com\/downloads\/realistic-3d-tech-logo-mockup\/"], - [0, 158, 1661815577, "vKrWEUcT", "https://i.imgur.com/7sNu2rK.jpg", 0, 4274, 1391, 3908137, "Office Glass Logo Mockup", "Impress your clients and earn more money using high quality logo mockups.\nhttps:\/\/graphicsfamily.com\/downloads\/free-psd-logo-mock-up-on-office-glass-wall\/"], - [0, 158, 1662274075, "UcX-Y8Ge", "https://i.imgur.com/oFFFXXC.jpg", 0, 18657, 6091, 5012965, "Glass Effects Logo Mockup", "\ud83e\udd29Showcase your logo designs like a \u2b50PRO!\nhttps:\/\/graphicsfamily.com\/downloads\/glass-effects-logo-mockup\/"], + [0, 158, 1661815577, "vKrWEUcT", "https://i.imgur.com/7sNu2rK.jpg", 0, 4276, 1393, 3908137, "Office Glass Logo Mockup", "Impress your clients and earn more money using high quality logo mockups.\nhttps:\/\/graphicsfamily.com\/downloads\/free-psd-logo-mock-up-on-office-glass-wall\/"], + [0, 158, 1662274075, "UcX-Y8Ge", "https://i.imgur.com/oFFFXXC.jpg", 0, 18665, 6093, 5012965, "Glass Effects Logo Mockup", "\ud83e\udd29Showcase your logo designs like a \u2b50PRO!\nhttps:\/\/graphicsfamily.com\/downloads\/glass-effects-logo-mockup\/"], [0, 158, 1662275703, "gyRmy0Ih", "https://i.imgur.com/DF7FXKm.jpg", 0, 1063, 203, 582272, "Leather Logo Mockup", "Beyond the limits of logo design creation process. Instantly grab your customers attention and increase your logo designs sales.\nhttps:\/\/graphicsfamily.com\/downloads\/realistic-leather-pressed-logo-mockup\/"], [0, 158, 1662276579, "CcSIXiwP", "https://i.imgur.com/9T9pBvO.jpg", 0, 709, 173, 5351426, "3D Logo Mockup on Glass Wall", "A great way to showcase your logo and brand.\nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-on-blurred-office-glass-wall\/"], - [0, 158, 1662277225, "cJlFA5xd", "https://i.imgur.com/N1uHCRT.jpg", 0, 5571, 1793, 379537, "3D Logo Mockup on Wood", "\ud83e\udd0e\ud83d\udfe4\ud83d\udfebBrand yourself the right way with this elegant free logo mockup.\nhttps:\/\/graphicsfamily.com\/downloads\/engraved-logo-mockup-on-wood\/"], - [0, 158, 1662279639, "bLzsuj1V", "https://i.imgur.com/H3uKUko.jpg", 0, 2150, 664, 2952663, "Metal Laser Cut Logo Mockup", "\ud83c\udf96\ufe0fPromote your logo design creations in a professional manner!\nhttps:\/\/graphicsfamily.com\/downloads\/realistic-laser-cut-on-metallic-silver-background-logo-mockup\/"], - [0, 158, 1662281336, "IUVx5S-3", "https://i.imgur.com/zlJSTNh.jpg", 0, 16184, 3346, 1230987, "3D Office Wall Logo Mockup", "\ud83d\udc51Logo Mockups are the #1 factor to have more sales for your logo designs!\nhttps:\/\/graphicsfamily.com\/downloads\/3d-office-wall-logo-mockup-with-dark-gray-wall\/"], - [0, 158, 1662282673, "A5BHGenN", "https://i.imgur.com/dnNzeVh.jpg", 0, 3045, 953, 10428363, "Golden Logo Mockup", "\ud83e\udd47Impress your clients and earn more money with this amazing logo mockup.\nhttps:\/\/graphicsfamily.com\/downloads\/embossed-golden-logo-mockup\/"], - [0, 158, 1662283450, "i6l_lQxn", "https://i.imgur.com/VI8xPiO.jpg", 0, 4512, 2451, 1517929, "White Paper Logo Mockup", "\ud83d\udca5A perfect logo presentation will surely drive new customers your way!\nhttps:\/\/graphicsfamily.com\/downloads\/free-white-paper-logo-mockup\/"], - [0, 158, 1662494049, "oX7iz4UC", "https://i.imgur.com/QjnudT0.jpg", 0, 1404, 365, 1218417, "Creative 3D Logo Mockup", "Influence and shine like a professional designer!\nhttps:\/\/graphicsfamily.com\/downloads\/creative-3d-logo-mockup\/"], - [0, 158, 1662494866, "Skin--b-", "https://i.imgur.com/NEZLmxs.jpg", 0, 1713, 615, 3228637, "Golden Logo Mockup on Red Fabric", "\ud83e\udd47Impress your clients and earn more money with high quality logo mockups! Sell your logo creations like a PRO!\nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-on-red-fabric\/"], + [0, 158, 1662277225, "cJlFA5xd", "https://i.imgur.com/N1uHCRT.jpg", 0, 5573, 1794, 379537, "3D Logo Mockup on Wood", "\ud83e\udd0e\ud83d\udfe4\ud83d\udfebBrand yourself the right way with this elegant free logo mockup.\nhttps:\/\/graphicsfamily.com\/downloads\/engraved-logo-mockup-on-wood\/"], + [0, 158, 1662279639, "bLzsuj1V", "https://i.imgur.com/H3uKUko.jpg", 0, 2152, 664, 2952663, "Metal Laser Cut Logo Mockup", "\ud83c\udf96\ufe0fPromote your logo design creations in a professional manner!\nhttps:\/\/graphicsfamily.com\/downloads\/realistic-laser-cut-on-metallic-silver-background-logo-mockup\/"], + [0, 158, 1662281336, "IUVx5S-3", "https://i.imgur.com/zlJSTNh.jpg", 0, 16199, 3347, 1230987, "3D Office Wall Logo Mockup", "\ud83d\udc51Logo Mockups are the #1 factor to have more sales for your logo designs!\nhttps:\/\/graphicsfamily.com\/downloads\/3d-office-wall-logo-mockup-with-dark-gray-wall\/"], + [0, 158, 1662282673, "A5BHGenN", "https://i.imgur.com/dnNzeVh.jpg", 0, 3048, 954, 10428363, "Golden Logo Mockup", "\ud83e\udd47Impress your clients and earn more money with this amazing logo mockup.\nhttps:\/\/graphicsfamily.com\/downloads\/embossed-golden-logo-mockup\/"], + [0, 158, 1662283450, "i6l_lQxn", "https://i.imgur.com/VI8xPiO.jpg", 0, 4513, 2451, 1517929, "White Paper Logo Mockup", "\ud83d\udca5A perfect logo presentation will surely drive new customers your way!\nhttps:\/\/graphicsfamily.com\/downloads\/free-white-paper-logo-mockup\/"], + [0, 158, 1662494049, "oX7iz4UC", "https://i.imgur.com/QjnudT0.jpg", 0, 1405, 366, 1218417, "Creative 3D Logo Mockup", "Influence and shine like a professional designer!\nhttps:\/\/graphicsfamily.com\/downloads\/creative-3d-logo-mockup\/"], + [0, 158, 1662494866, "Skin--b-", "https://i.imgur.com/NEZLmxs.jpg", 0, 1717, 617, 3228637, "Golden Logo Mockup on Red Fabric", "\ud83e\udd47Impress your clients and earn more money with high quality logo mockups! Sell your logo creations like a PRO!\nhttps:\/\/graphicsfamily.com\/downloads\/3d-logo-mockup-on-red-fabric\/"], [0, 158, 1662495712, "BX2t1oW5", "https://i.imgur.com/LgAqgQw.jpg", 0, 448, 101, 910355, "Photorealistic Logo Mockup", "\ud83e\ude90 Impress your clients and earn more money using high quality logo mockups.\nhttps:\/\/graphicsfamily.com\/downloads\/photorealistic-foil-logo-mockup\/"], [0, 158, 1662496474, "MMvUR5s6", "https://i.imgur.com/22LsrPA.jpg", 0, 1343, 214, 2976187, "3D Metal Logo Mockup", "Good logo design is good business! Showcase Your Logo Designs Like a PRO!\nhttps:\/\/graphicsfamily.com\/downloads\/3d-metal-logo-mockup\/"], - [0, 158, 1664343694, "U3PKZ6uS", "https://i.imgur.com/XuyLimr.jpg", 0, 2648, 744, 8174905, "Golden Logo Mockup", "Display your logo design creations properly and impress your audience.\nhttps:\/\/graphicsfamily.com\/downloads\/elegant-luxurious-black-box-golden-brand-logo-mockup\/"], + [0, 158, 1664343694, "U3PKZ6uS", "https://i.imgur.com/XuyLimr.jpg", 0, 2650, 744, 8174905, "Golden Logo Mockup", "Display your logo design creations properly and impress your audience.\nhttps:\/\/graphicsfamily.com\/downloads\/elegant-luxurious-black-box-golden-brand-logo-mockup\/"], [0, 159, 1645394559, "WonZEkjH", "https://i.imgur.com/BoY2reI.jpg", 0, 75, 4, 73852, "The PSD MOOn", "test"], [0, 159, 1645480755, "SEryHmJi", "https://i.imgur.com/VF3USAf.jpg", 0, 115, 1, 41794, "Testing this", "testing this"], [0, 159, 1645481246, "dz2jApPS", "https://i.imgur.com/1XrIklX.jpg", 0, 41, 1, 103533, "Its the sun", "Only testing this."], @@ -663,7 +663,7 @@ [0, 162, 1644387880, "JZD8lYMJ", "https://i.imgur.com/E0Yp63u.jpg", 0, 458, 36, 208916, "Goku As Dbz", "Goku..."], [0, 163, 1644587268, "CbX866SV", "https://i.imgur.com/Xp1dN0r.png", 0, 48, 6, 1192930, "SQ_Template-v5", "Sequtive Roblox Clothing Template"], [0, 164, 1649075916, "1bgTfeAb", "https://i.imgur.com/1bYVani.png", 0, 955, 322, 123520, "Roblox Shirt Template", "Use it"], - [0, 164, 1658139478, "dGiZjR6I", "https://i.imgur.com/Mc70ukR.png", 60, 270, 76, 238266, "Free and easy Roblox Shirt Template", "This help you make roblox shirt fast and easy"], + [0, 164, 1658139478, "dGiZjR6I", "https://i.imgur.com/Mc70ukR.png", 60, 272, 76, 238266, "Free and easy Roblox Shirt Template", "This help you make roblox shirt fast and easy"], [0, 164, 1658582413, "pc3r34S6", "https://i.imgur.com/r67GdIQ.png", 0, 389, 98, 12428, "YT Cartoony Text Logo", "Use it"], [0, 165, 1644859859, "B4SyCXpC", "https://i.imgur.com/0TW1Dmm.png", 0, 376, 76, 16266, "3D text RED", "this PSD template make for youtube thumbnail or banner"], [0, 166, 1644914765, "aZT3YyUo", "https://i.imgur.com/f0pGbcr.png", 0, 53, 11, 1193811, "SEQUTIVE_Template", "roblox clothing template"], @@ -679,7 +679,7 @@ [2, 167, 1655162910, "KlNcSRaG", "https://www.google.com/images/branding/googlelogo/1x/googlelogo_color_272x92dp.png", 0, 0, 170, 318, "grow", "new project"], [2, 167, 1655576270, "Q5AZ0rEW", "https://www.google.com/images/branding/googlelogo/1x/googlelogo_color_272x92dp.png", 0, 0, 228, 335, "grow big", "grow big"], [5, 167, 1656792717, "nSiuEYbv", "https://www.google.com/images/branding/googlelogo/1x/googlelogo_color_272x92dp.png", 0, 0, 531, 11837058, "all styles", "all styles"], - [0, 168, 1645063098, "mMt3ZKKc", "https://i.ibb.co/Ln6GVdD/maybe.png", 60, 12567, 3723, 161059, "EASY Roblox Shirt Template by mocca200", "An Easy to Use Roblox Shirt Template with Shirt Color, Shading, a reference and a neckhole. Insert images into the \"shirt\" folder and below \"DO NOT TOUCH\" so the image fits well."], + [0, 168, 1645063098, "mMt3ZKKc", "https://i.ibb.co/Ln6GVdD/maybe.png", 60, 12568, 3723, 161059, "EASY Roblox Shirt Template by mocca200", "An Easy to Use Roblox Shirt Template with Shirt Color, Shading, a reference and a neckhole. Insert images into the \"shirt\" folder and below \"DO NOT TOUCH\" so the image fits well."], [0, 169, 1645045475, "URBclM8X", "https://i.imgur.com/LnHMEUD.jpg", 0, 441, 116, 237050, "CENICIENTA POSTER", "Poster"], [0, 170, 1616781581, "z93Laqlr", "https://imgur.com/uOK1zhK.png", 60, 7337, 2936, 1910452, "Galaxy TEXT", "."], [0, 170, 1620844102, "4-xlugRN", "https://imgur.com/Mmr2WjP.jpg", 60, 647, 90, 265983, "\u0643\u0644 \u0639\u0627\u0645 \u0648\u0627\u0646\u062a\u0645 \u0628\u062e\u064a\u0631", "\u062a\u0635\u0645\u064a\u0645 \u0644\u0644\u0639\u064a\u062f"], @@ -711,7 +711,7 @@ [0, 186, 1656343003, "rqAxb98m", "https://i.imgur.com/SdLH6HE.png", 0, 555, 138, 567632, "XESTCF - PAYTOPR\u0130CE", "\u0130nstagra: xest.cf\nYoutube: EstherWise (youtube.com\/c\/estherwisex)\nDiscord: https:\/\/discord.gg\/t3vPMaPgAd"], [0, 186, 1656346519, "wvyMll0M", "https://i.imgur.com/tPg9HPb.png", 0, 1044, 257, 661711, "XESTCF V2", "V2 xest.cf"], [0, 187, 1659968003, "wWzXj2OC", "https://i.imgur.com/Pt5axSU.jpg", 10, 471, 43, 40833, "Rayanna by design by VK EDITZ 9845629625", "Vk EDITZ \n+91 9845629625"], - [0, 188, 1647517439, "aZtMHCqL", "https://i.imgur.com/BsShU39.jpeg", 14, 1866, 328, 68200, "mr.incredible meme", "Type your own text in the two boxes. Modify text effect"], + [0, 188, 1647517439, "aZtMHCqL", "https://i.imgur.com/BsShU39.jpeg", 14, 1867, 328, 68200, "mr.incredible meme", "Type your own text in the two boxes. Modify text effect"], [0, 189, 1648481197, "DmKGpToR", "https://i.imgur.com/2ErMAFj.jpg", 0, 462, 160, 138958, "Bill CK", "BILL CK"], [0, 189, 1648481776, "QN-578I5", "https://i.imgur.com/Fnf6FF2.jpg", 0, 241, 100, 119092, "BILL TK", "BILL TK"], [0, 190, 1648531039, "A8czQllI", "https://i.imgur.com/c43Kwk4.jpeg", 3, 394, 57, 225445, "Polytoria Hoodie Template", "A hoodie template from the game polytoria!"], @@ -737,10 +737,10 @@ [0, 202, 1656626957, "6Ox4JQxY", "https://i.ibb.co/9GLCdbw/Roblox-template.png", 60, 268, 113, 882, "Roblox clothing template", "Very cool"], [0, 203, 1652744283, "APpY4GFy", "https://i.imgur.com/b1nKxOB.jpeg", 0, 767, 18, 17616, "drivers license", "id"], [0, 204, 1652949263, "UHdi5P_m", "https://i.imgur.com/UkKTQaL.jpg", 22, 997, 137, 1103465, "Birth Announcement Card", "Announce your baby birth or gender reveal with this beautiful and easy to edit photoshop template."], - [0, 204, 1652951192, "cOHQol7L", "https://i.imgur.com/TS0ofyU.jpeg", 0, 499, 48, 1630534, "Company Logo Mockup", "This is very simple and clean company logo mockup, you can just replace your logo or text in smart object and save it, its done!"], + [0, 204, 1652951192, "cOHQol7L", "https://i.imgur.com/TS0ofyU.jpeg", 0, 500, 49, 1630534, "Company Logo Mockup", "This is very simple and clean company logo mockup, you can just replace your logo or text in smart object and save it, its done!"], [0, 204, 1652951332, "utiTjwkr", "https://i.imgur.com/AH6RULs.jpeg", 3, 1240, 327, 1715002, "Company Name Board", "Want to show your companies logo or names, this photoshop template is for you, just replace your content in smart object and save it, you are done!"], [0, 204, 1652951377, "akiozXSx", "https://i.imgur.com/pDvPOCB.jpeg", 60, 634, 115, 193870, "Email Signature", "Every employee or marketer or any online business need a beautiful and clean email signature for their marketing purpose, this simple and clean photoshop template will definately help."], - [0, 204, 1652951459, "bRGt6bY1", "https://i.imgur.com/VcWHReo.jpeg", 2, 712, 123, 387083, "Poster Mockup", "Need to showcase your poster design on a realistic wall? download this beautiful and simple to edit poster design photoshop mockup and insert your design in smart object."], + [0, 204, 1652951459, "bRGt6bY1", "https://i.imgur.com/VcWHReo.jpeg", 2, 713, 123, 387083, "Poster Mockup", "Need to showcase your poster design on a realistic wall? download this beautiful and simple to edit poster design photoshop mockup and insert your design in smart object."], [0, 204, 1652951543, "-4p0moY5", "https://i.imgur.com/UjMzOBR.jpeg", 3, 774, 28, 281597, "Cosmetic Product Mockup", "Showcase your branding on the realistic looking product mockup, best for cosmetics or healthcare product designs."], [0, 204, 1652951838, "f0CRgktP", "https://i.imgur.com/hpd98zm.jpeg", 15, 315, 53, 449112, "Rustic Text Effect", "Have you ever wondered how the rustic look for your logo or heading to do in photoshop? use this rustic photoshop text look template, simple write your text on layer and it will change to rustic!"], [0, 204, 1652951870, "VhfhJpF_", "https://i.imgur.com/1CjwhXf.jpeg", 15, 8872, 4351, 191837, "Silver Text Effect", "Need a shiny and eye stopper text effect or logo? check this out, a shiny text effect in photoshop for your logos or headings, you can change your text easily and download."], @@ -748,7 +748,7 @@ [0, 204, 1652951942, "Ah3lNhD_", "https://i.imgur.com/hCqnXgB.jpeg", 2, 1179, 211, 898250, "T-shirt Photoshop Mockup", "Change the text manually or insert your graphic into the smart object, you are done! download this simple t shirt mockup for showcase your design."], [0, 204, 1652951980, "MP7SvZJ-", "https://i.imgur.com/7WPiziE.jpeg", 2, 1362, 160, 94197, "T-shirt Mockup", "Are you a designer or a brand seller who need to showcase their work on T's? downlaod this simple to edit photoshop tshirt mockup for free!"], [0, 204, 1652952054, "cECiHwxk", "https://i.imgur.com/Z03E8GF.jpeg", 12, 372, 119, 77048, "Yoga Instagram Post", "Do you own ayoga or fitness studio? and need to market online? this beautiful and simple instagram post will help you. Downlaod now and edit it as you want."], - [0, 204, 1652953314, "63vaBjV2", "https://i.imgur.com/SvWEX9V.jpeg", 3, 9585, 1523, 839149, "Logo on Wall", "This 3d logo on wall is best for any designers to showcase how the logo will display when placed on wall"], + [0, 204, 1652953314, "63vaBjV2", "https://i.imgur.com/SvWEX9V.jpeg", 3, 9588, 1523, 839149, "Logo on Wall", "This 3d logo on wall is best for any designers to showcase how the logo will display when placed on wall"], [0, 204, 1652953380, "F49N-0pU", "https://i.imgur.com/KNwINaP.jpeg", 60, 267, 51, 96730, "Monthly Calender", "Here is the calender for the month of May!"], [0, 204, 1652953471, "Nc8q1be_", "https://i.imgur.com/znSsIvv.jpeg", 3, 741, 144, 2870551, "Neon Sign Board", "Make your restaurant or night club's name more amazing with this neon sign board, easy to edit and change text"], [0, 204, 1652953569, "97cj0Rv5", "https://i.imgur.com/XZGCApW.jpeg", 60, 279, 24, 3661843, "Photo Reel", "Photo realistic and gurnge styled photo frames for you!"], @@ -761,7 +761,7 @@ [0, 204, 1647616837, "9PwHwbms", "https://i.imgur.com/yrGrk6j.jpg", 12, 1884, 538, 1196294, "Instagram Ad Post", "Simple and effective instagram ad post for your online business"], [0, 204, 1647616999, "A5OZCJ5e", "https://i.imgur.com/oHPsDQE.jpg", 12, 220, 37, 329608, "Mothers Day Instagram Post", "Make your moms day a very special day, by posting this instagram post on your wall!!!"], [0, 204, 1647617192, "dGaXz0sO", "https://i.imgur.com/TKALWl4.jpg", 60, 909, 240, 2293129, "Wooden Hanging Name Plate", "Edit and use this beautiful hanging wooden name plate for your sweet home and make your home much more beautiful!"], - [0, 204, 1647617504, "qrjlQwlz", "https://i.imgur.com/8Y4PhsP.jpg", 15, 4236, 1742, 1489935, "Cool Neon Sign Board", "Use this amazing neon sign board psd for your posters or other works!"], + [0, 204, 1647617504, "qrjlQwlz", "https://i.imgur.com/8Y4PhsP.jpg", 15, 4237, 1743, 1489935, "Cool Neon Sign Board", "Use this amazing neon sign board psd for your posters or other works!"], [0, 204, 1647617672, "HAqg1bol", "https://i.imgur.com/Jr6X39w.jpg", 21, 2097, 518, 114310, "Beautiful Print Label", "Use this print label design psd for anything..."], [0, 204, 1647618592, "_gbuZXjK", "https://i.imgur.com/Sw5Xmsu.jpg", 11, 385, 190, 4375995, "Youtube Banner for Tech Videos", "Use this beautifully designed and easily editable youtube banner psd template"], [0, 204, 1647618835, "SLLDLbdH", "https://i.imgur.com/WZ5nwqz.jpg", 11, 1349, 701, 853703, "Gaming YouTube Channel Banner Template", "Download this Gaming YouTube Channel Banner Template for your gaming channel."], @@ -771,10 +771,10 @@ [0, 204, 1653462252, "vnpm2-ZW", "https://i.imgur.com/EWBljXv.png", 2, 219, 13, 3832, "Box Mockup", "This simple print and use template for mockup design or DIY design."], [0, 204, 1653462307, "faqebqUc", "https://i.imgur.com/QQlfPMV.jpeg", 3, 5964, 1189, 89402, "Coffee Cup Mockup", "Boost your sales with this book cover by inserting your artwork in design, easy to edit just paste your artwork into smartlayer and save"], [0, 204, 1653462367, "phKdG5rK", "https://i.imgur.com/qqlHF3P.jpeg", 2, 1421, 164, 1168165, "Easy Book Mockup", "Download and use this high quality coffee cup mockup for your logo design or other text, made with smart layers."], - [0, 204, 1653462417, "F4xHk9DT", "https://i.imgur.com/li7t8OB.jpeg", 12, 612, 90, 670853, "Food Instagram Post", "Standout and get more sales or likes with this food instagram post template easy to edit and save."], + [0, 204, 1653462417, "F4xHk9DT", "https://i.imgur.com/li7t8OB.jpeg", 12, 612, 96, 670853, "Food Instagram Post", "Standout and get more sales or likes with this food instagram post template easy to edit and save."], [0, 204, 1653462460, "upJNvWCV", "https://i.imgur.com/TwP8hzw.jpeg", 12, 919, 219, 119656, "NFT instagram Post", "NFT is everywhere, and if you are into NFT and need marketing online, use this template to market your NFT on instagram instantly."], - [0, 204, 1653462510, "H9RQBrjv", "https://i.imgur.com/qaWkPr4.jpeg", 11, 1182, 589, 128421, "Simple Youtube Banner", "Make youtube banner to suit your channel with this simple to edit and change artwork youtube banner."], - [0, 204, 1653462570, "pQa-ohMN", "https://i.imgur.com/q5P6su8.jpeg", 15, 224, 109, 17379, "Sticker Text Effect", "Make your personalized text effect with this sticker like text effect for print and paste anywhere."], + [0, 204, 1653462510, "H9RQBrjv", "https://i.imgur.com/qaWkPr4.jpeg", 11, 1183, 589, 128421, "Simple Youtube Banner", "Make youtube banner to suit your channel with this simple to edit and change artwork youtube banner."], + [0, 204, 1653462570, "pQa-ohMN", "https://i.imgur.com/q5P6su8.jpeg", 15, 225, 109, 17379, "Sticker Text Effect", "Make your personalized text effect with this sticker like text effect for print and paste anywhere."], [0, 204, 1653462626, "CLGj1YR9", "https://i.imgur.com/CzH8BM2.jpeg", 12, 121, 21, 207743, "Stop War Instagram Post", "Stop the war, the ukraine was is just getting worsen, support ukraine with this instagram post template."], [0, 204, 1653462670, "viIwbK0a", "https://i.imgur.com/p6nRrto.jpeg", 12, 180, 45, 984432, "Stop Ukraine War Post", "Stop the war, the ukraine was is just getting worsen, support ukraine with this instagram post template."], [0, 204, 1653462714, "rR5-hc_t", "https://i.imgur.com/6Zt87ya.jpeg", 12, 190, 32, 2684711, "World Yoga Day", "Celebrate this world yoga day with this amazing instagram template for your business or personal use."], @@ -796,14 +796,14 @@ [0, 210, 1662579551, "z5HGbiaV", "https://i.imgur.com/7pXEonS.jpg", 11, 805, 396, 138013, "Simple YouTube Logo", "Enjoy!"], [0, 210, 1663353337, "gbAJeKQ5", "https://i.imgur.com/J1NdSby.jpg", 11, 806, 239, 542501, "Simple Among Us Thumbnail", "Enjoy!"], [0, 210, 1663611192, "mQjM15ib", "https://i.imgur.com/Eg6lQwl.png", 11, 189, 86, 13940, "White And Green Clickbate Text!", "Enjoy!"], - [0, 210, 1663682609, "68b9BCSz", "https://i.imgur.com/kBaL6OH.jpg", 11, 1532, 584, 2254152, "Simple YouTube Thumbnail", "Enjoy!"], + [0, 210, 1663682609, "68b9BCSz", "https://i.imgur.com/kBaL6OH.jpg", 11, 1533, 584, 2254152, "Simple YouTube Thumbnail", "Enjoy!"], [0, 210, 1663868977, "rr7YJ5rk", "https://i.imgur.com/xyTHYsV.jpg", 11, 274, 109, 5104324, "YouTube Thumbnail Template", "Enjoy!"], - [0, 210, 1663869695, "ylFniMfR", "https://i.imgur.com/dgyTr5m.jpg", 11, 901, 408, 1310972, "YouTube Banner Blue", "Enjoy!"], + [0, 210, 1663869695, "ylFniMfR", "https://i.imgur.com/dgyTr5m.jpg", 11, 902, 409, 1310972, "YouTube Banner Blue", "Enjoy!"], [0, 210, 1664213747, "i0y4EWn2", "https://i.imgur.com/Bri8Ro6.jpg", 11, 540, 219, 1947285, "Simple YouTube Thumbnail", "Enjoy!"], - [0, 210, 1664221554, "ULZKkYJg", "https://i.imgur.com/vtiK84X.jpg", 11, 489, 181, 1546925, "Simple YouTube Thumbnail", "Enjoy!"], + [0, 210, 1664221554, "ULZKkYJg", "https://i.imgur.com/vtiK84X.jpg", 11, 490, 181, 1546925, "Simple YouTube Thumbnail", "Enjoy!"], [0, 210, 1664299381, "5NCblwnZ", "https://i.imgur.com/3qNmkNO.jpg", 11, 264, 99, 1265749, "Minecraft Thumbnail Template", "Enjoy!"], [0, 210, 1665682631, "6wTwEwLQ", "https://i.imgur.com/N5FFrGN.jpg", 10, 59, 10, 3405726, "Gaming Logo Template", "Enjoy!"], - [0, 210, 1665683078, "MgmX0f6s", "https://i.imgur.com/dT6zwr5.jpg", 11, 468, 164, 2287155, "YouTube Thumbnail Template", "Enjoy!"], + [0, 210, 1665683078, "MgmX0f6s", "https://i.imgur.com/dT6zwr5.jpg", 11, 469, 164, 2287155, "YouTube Thumbnail Template", "Enjoy!"], [0, 210, 1666118180, "dCTD8JwW", "https://i.imgur.com/CXYSnB8.jpg", 15, 365, 109, 558787, "Text Styles!", "Enjoy!"], [0, 210, 1666632528, "_XCnI4gs", "https://i.imgur.com/XB1PH3Q.jpg", 11, 5, 0, 160787, "Simple YouTube Logo", "Enjoy!"], [0, 211, 1654360612, "W8SuWf2A", "https://i.imgur.com/evnHnYS.png", 0, 137, 15, 13700, "Glass Logo Design", "Glass Logo Design custom for your commercial or free use"], @@ -829,13 +829,13 @@ [0, 223, 1656122843, "rEBUJIQE", "https://i.imgur.com/IMZ0PyJ.jpg", 0, 502, 52, 343626, "yt name", "for chunky channel"], [0, 224, 1656417689, "jz-vAs52", "https://i.imgur.com/tbYndu9.jpg", 11, 164, 59, 5113647, "Minecraft Server AD", "made by MAYBESWEAT"], [0, 224, 1656496215, "5FCgUKk3", "https://i.imgur.com/0oQTy9y.jpg", 11, 1457, 619, 9432163, "Minecraft Release Announcement", "Made by MAYBESWEAT0 \nsubscribe to me on yt for more!!!"], - [0, 225, 1657054730, "R3dDez7p", "https://i.imgur.com/MMgaP6d.png", 0, 1765, 844, 411186, "Roblox Hoodie", "Hoodie"], + [0, 225, 1657054730, "R3dDez7p", "https://i.imgur.com/MMgaP6d.png", 0, 1769, 844, 411186, "Roblox Hoodie", "Hoodie"], [0, 225, 1657380116, "-RiReprq", "https://i.imgur.com/jjZY1lw.png", 0, 474, 228, 314164, "Roblox Suit\/Tuxedo", "Suit\/Tuxedo"], [0, 226, 1657138084, "L2ARCjC9", "https://i.imgur.com/kwQsFzG.jpeg", 11, 556, 30, 32734, "Apengg", "Hello world."], [0, 227, 1657173607, "lsoPvRcv", "https://i.imgur.com/GZAfvAF.jpg", 2, 466, 97, 1032053, "Nintendo Switch Game Cover Template", "100% Editable Nintendo Switch Game Cover Template.\n\nFull-size, ready to print @ 300dpi.\n\nFonts used: \n- MarkPro Bold\n- Roboto\n\nGoogle Drive link to fonts and stand-alone .PSD: https:\/\/drive.google.com\/drive\/folders\/1lcIfNN_cBmPDYIlfidd8yQiXY_jVac_4"], [2, 228, 1657274682, "DmwvP-bz", "https://i.imgur.com/echRLji.png", 0, 0, 1195, 2099, "gold effect", "Gold Effect Photoshop"], [0, 229, 1666380189, "2nwm8gVX", "https://i.imgur.com/Qo48Rh9.jpg", 3, 27, 2, 1929963, "Indomie psd", "edit"], - [0, 229, 1666380472, "WgkoV7TG", "https://i.imgur.com/hBlZdkI.jpg", 60, 56, 25, 1186652, "Red gradient Background", "Nice red color gradient background"], + [0, 229, 1666380472, "WgkoV7TG", "https://i.imgur.com/hBlZdkI.jpg", 60, 57, 25, 1186652, "Red gradient Background", "Nice red color gradient background"], [0, 229, 1666380639, "2fLHUSTD", "https://i.imgur.com/OZN8L8q.jpg", 1, 64, 5, 57653, "christmass text", "Edit text"], [0, 230, 1658230889, "UR7I0xjU", "https://i.imgur.com/rL7iZ3c.jpg", 22, 749, 175, 10669166, "Beach Party", "Beach Party Invitation"], [0, 231, 1658176196, "rM-EGTUz", "https://i.imgur.com/Uvp4xXO.jpg", 0, 156, 9, 925864, "Slim Reaper", "Justin Jefferson and Grim Reaper"], @@ -844,7 +844,7 @@ [0, 232, 1659578753, "wo82-SsC", "https://i.imgur.com/u9jXS0s.jpeg", 0, 1907, 906, 14587, "Clickbait Text", "Subscribe to NYC-Roblox"], [0, 232, 1663456370, "edk-AP99", "https://i.imgur.com/IcqJ8Ux.png", 0, 50, 9, 68394, "Roblox Currency Buttons", "Subscribe To NYC-Roblox"], [3, 233, 1658232017, "knz7sqWi", "https://i.imgur.com/Lj4mDj1.png", 0, 0, 245, 170656, "Background text", "brush"], - [0, 234, 1658260253, "IUHiRJfU", "https://i.imgur.com/PHflAcP.jpeg", 60, 668, 84, 17233490, "NBA 2K22 Iced Out Card Template", "just a regular 2k card"], + [0, 234, 1658260253, "IUHiRJfU", "https://i.imgur.com/PHflAcP.jpeg", 60, 669, 84, 17233490, "NBA 2K22 Iced Out Card Template", "just a regular 2k card"], [0, 234, 1658285697, "lVjDmorO", "https://i.imgur.com/FpoeE4D.jpeg", 60, 299, 22, 22948874, "Invincible NBA 2K22 Card Template", "just a regular card template"], [0, 235, 1658271848, "S182EccY", "https://i.imgur.com/AgDj3yU.png", 0, 112, 32, 9806, "Chief AU Template", "Chief AU Template"], [0, 236, 1658286535, "aJpSDjeW", "https://i.imgur.com/Eam7mJr.jpeg", 60, 77, 9, 6823671, "\u7267\u6021\u5c0f\u7ea2\u4e66", "123"], @@ -871,7 +871,7 @@ [0, 247, 1660015095, "YF4rRKII", "https://i.imgur.com/ipmo7rm.jpeg", 21, 173, 26, 59605, "\u0f58\u0f72\u0f44\u0f0b\u0f56\u0fb1\u0f44\u0f0b\u0f0d 04 \u0f3c\u0f62\u0f44\u0f0b\u0f58\u0f7c\u0f66\u0f0d\u0f3d", "\u0f62\u0f44\u0f0b\u0f51\u0f42\u0f62\u0f0b\u0f56\u0f5f\u0f7c\u0f66\u0f0b\u0f46\u0f7c\u0f42"], [2, 248, 1660162095, "fDj1XKuH", "https://i.ytimg.com/vi/cVd6bVtn9LM/maxresdefault.jpg", 0, 0, 1005, 1758, "cartoon", "cartoon art"], [0, 249, 1660524930, "pguNA8_B", "https://cdn.discordapp.com/attachments/997614471117799445/1008538921187156069/Photopea_tempalte_1.png", 0, 101, 36, 64561, "yt Roblox thumbnail essential kit", "For roblox yt or yt in general"], - [0, 250, 1660504561, "xHbkAWRG", "https://i.imgur.com/mWrrMSv.jpeg", 11, 280, 31, 1602667, "Youtube Border Pack", "A Pack For your Youtube Channel!"], + [0, 250, 1660504561, "xHbkAWRG", "https://i.imgur.com/mWrrMSv.jpeg", 11, 281, 31, 1602667, "Youtube Border Pack", "A Pack For your Youtube Channel!"], [0, 251, 1661963858, "7CiEpWVw", "https://i.imgur.com/RDJPDjJ.png", 60, 255, 431, 104550, "Plantilla Infomercado NV", "Plantilla Infomercado Nueva Versi\u00f3n Centrada"], [0, 251, 1663942174, "uGyl9d3U", "https://i.imgur.com/64bEfJG.jpg", 0, 96, 97, 708049, "Nueva Plantilla Infomercado", "Nueva plantilla"], [0, 251, 1666370331, "ArOAZCit", "https://i.imgur.com/DlYZRlG.png", 0, 11, 2, 1029, "Foto vacia Infomercado", "Tama\u00f1o foto infomercado"], @@ -889,7 +889,7 @@ [3, 256, 1661455973, "3eeoc5gv", "https://static.brusheezy.com/system/resources/previews/000/065/114/non_2x/charcoal-photoshop-brushes.jpg", 0, 0, 253, 28179522, "Charcoal", "Charcoal"], [0, 257, 1661736568, "2hD3eTMC", "https://i.imgur.com/kEchQ2H.png", 50, 374, 71, 59651, "Intertitle", "Old silent film style intertitle."], [0, 258, 1661775582, "aC4jPkc9", "https://i.imgur.com/J5aZ7ZD.jpeg", 10, 302, 57, 3792910, "KSI thumbnail style", "This is a perfect thumbnail style for reaction, gaming youtubers."], - [0, 258, 1661944798, "7K706qlF", "https://i.imgur.com/rnMeSXj.jpeg", 10, 2204, 675, 2938645, "MrBeast Thumbnail Style", "This is the perfect style for reaction videos and mrbeast style videos."], + [0, 258, 1661944798, "7K706qlF", "https://i.imgur.com/rnMeSXj.jpeg", 10, 2205, 677, 2938645, "MrBeast Thumbnail Style", "This is the perfect style for reaction videos and mrbeast style videos."], [2, 259, 1661848539, "glnmEZBy", "https://i.stack.imgur.com/YdJZtl.jpg", 0, 0, 126, 18092, "disperation", "hello"], [0, 260, 1662106100, "Xyqi_kL8", "https://i.imgur.com/n28ZTsX.jpg", 11, 127, 49, 242150, "YouTube Thumbnail 2012 Style", "My own version of YouTube 2012. you can edit it except text effects and the layout. (DO NOT CHANGE IT) you can also put funny images in there like vanoss gaming thumbnail"], [0, 261, 1662387252, "-fxiFhYv", "https://i.imgur.com/5wZb1Pl.png", 10, 176, 23, 68115, "Countryball template", "Make your own countryball with this template!\n\nYou need experience with photopea before doing this."], @@ -903,13 +903,13 @@ [3, 268, 1664820656, "xTyEMug4", "https://i.stack.imgur.com/Brjd3.jpg", 0, 0, 7, 45871, "Janet Badenes", "Es muy bueno"], [0, 269, 1663564276, "BWh4uhdd", "https://i.imgur.com/13e2kHc.jpeg", 11, 292, 62, 256636, "You're Own Roblox Youtube Logo", "A template made already. But for you !"], [0, 270, 1663516394, "OH9CpN2m", "https://i.imgur.com/FOp7yi7.png", 14, 74, 8, 11723, "no one absolutely no one:", "no one absolutely no one meme template"], - [0, 271, 1663600628, "0auHbTtA", "https://i.imgur.com/XBSjtxm.jpg", 10, 308, 108, 48513, "Twitch Panel", "Here is twitch panels designed by me marty gamez in photopea"], + [0, 271, 1663600628, "0auHbTtA", "https://i.imgur.com/XBSjtxm.jpg", 10, 309, 108, 48513, "Twitch Panel", "Here is twitch panels designed by me marty gamez in photopea"], [0, 271, 1664830652, "iWfFCjwU", "https://i.imgur.com/SB8oqNp.jpg", 10, 240, 52, 5668689, "Starting Soon Template", "Fully Editable Enjoy!"], [0, 272, 1666097477, "Sff-Xh1N", "https://i.imgur.com/fQTaHCN.jpeg", 10, 29, 3, 1708676, "Linkedin Carousel", "Eine Vorkage um f\u00fcr Linkedin einen Carousel Post zu erstellen."], [0, 273, 1664057748, "nK1DLOJX", "https://i.imgur.com/pbp0UWQ.png", 0, 65, 2, 7113, "Monochromatic Portrait Template", "Mrs. Stofcik's Painting II class"], [0, 274, 1663994620, "0s-lgkDZ", "https://i.imgur.com/Tht02kj.jpeg", 60, 1003, 402, 146745, "Phonk Logo?", "Thug Life"], [0, 275, 1666011616, "uInHJQTv", "https://i.imgur.com/WxCDfDF.jpg", 11, 197, 45, 67709, "Template youtube sub", "You can change name"], - [0, 276, 1664057958, "e1YBdYNq", "https://i.imgur.com/sUp5Jcm.png", 60, 1019, 342, 3803045, "Roblox PFP GFX", "Free Roblox PFP GFX - By Allawi"], + [0, 276, 1664057958, "e1YBdYNq", "https://i.imgur.com/sUp5Jcm.png", 60, 1021, 342, 3803045, "Roblox PFP GFX", "Free Roblox PFP GFX - By Allawi"], [8, 277, 1664138083, "YesEBjEj", "https://i.imgur.com/oT4cjsu.jpeg", 0, 0, 181, 818758, "Red River Paper Polar Matte 60 lb", "loiuytrds"], [5, 278, 1664138894, "JIvDxXrW", "https://i.imgur.com/R9LSYBI.jpg", 0, 0, 116, 39390, "blacksword", "good font"], [0, 279, 1664224934, "TrKfpDaO", "https://i.imgur.com/ERRKPiR.jpg", 0, 86, 6, 27613, "CHENEQUE_TEMPLES", "Unlike t-shirts, shirts and pants wrap all the way around an avatar\u2019s body, giving you more design control. To get started, download the following clothing templates and draw your own art on top."], @@ -918,8 +918,8 @@ [2, 282, 1664598069, "LMZkBwm7", "https://i.imgur.com/GEQ5TeK.jpeg", 0, 0, 47, 172, "Set 2 XD", "This is a Test"], [0, 283, 1664902798, "ztfVQAaE", "https://i.imgur.com/E9Kx5ob.jpg", 11, 140, 30, 17032, "Burbank Text Overlay For Youtube", "Just some Burbank text you can use for video editing!"], [0, 283, 1664990979, "_wi5JFku", "https://i.imgur.com/Rc0V3qa.jpg", 11, 64, 7, 18957, "Burbank Text Overlay For Youtube V2", "just Burbank font for youtube"], - [0, 283, 1665767081, "EW-96yV4", "https://i.imgur.com/Cb3FX2W.jpg", 0, 391, 73, 22724, "Halloween Text", "just some Halloween text"], - [0, 283, 1666630307, "fhDlwYPm", "https://i.imgur.com/gOj2OsD.png", 0, 3, 0, 24612, "Halloween Text For Clickbait", "Text"], + [0, 283, 1665767081, "EW-96yV4", "https://i.imgur.com/Cb3FX2W.jpg", 0, 392, 73, 22724, "Halloween Text", "just some Halloween text"], + [0, 283, 1666630307, "fhDlwYPm", "https://i.imgur.com/gOj2OsD.png", 0, 4, 0, 24612, "Halloween Text For Clickbait", "Text"], [0, 284, 1665097301, "-POyWDkn", "https://i.imgur.com/KjOUOHU.png", 60, 39, 6, 39970, "Printify Embrodery", "Logo Embrodery template"], [0, 285, 1665670635, "Ai0hsP2g", "https://i.imgur.com/FUO27x5.png", 0, 42, 7, 3886274, "Album Cover Template", "TripTeamMusic Album Cover Template that Includes Parental Advisory Logos."], [2, 286, 1665759334, "YyYlLxUt", "https://i.ytimg.com/vi/cVd6bVtn9LM/maxresdefault.jpg", 0, 0, 45, 5424919, "Rupkanth", "All the above"], diff --git a/www.photopea.com/plugins/gallery.json b/www.photopea.com/plugins/gallery.json index 2f34c34..acf11b3 100644 --- a/www.photopea.com/plugins/gallery.json +++ b/www.photopea.com/plugins/gallery.json @@ -1 +1 @@ -{"total":1341200,"totalHits":500,"hits":[{"id":7525456,"pageURL":"https://pixabay.com/photos/squirrel-wildlife-mammal-animal-7525456/","type":"photo","tags":"squirrel, wildlife, mammal","previewURL":"https://cdn.pixabay.com/photo/2022/10/16/16/13/squirrel-7525456_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gfcb1e9d161baeead9dae4362d7ff081cec42d3e34ed082867bb3c60643811a0aef915ea4a6b336abe230408ee6b973902db399256626d5af751fe34825e8cac7_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g8f23c62782c2a10f3a3179d3fd475d9d88561d750d57ac3b73789edd9c553a9f046174bce5cb17b930314e8f43183c0fd159d371b373611bbf4c1803c7be23a1_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3342691,"views":10619,"downloads":10350,"collections":3,"likes":79,"comments":0,"user_id":1767157,"user":"Ralphs_Fotos","userImageURL":"https://cdn.pixabay.com/user/2022/10/22/05-16-16-200_250x250.jpg"},{"id":7538921,"pageURL":"https://pixabay.com/photos/happy-mothers-day-ribbon-flower-7538921/","type":"photo","tags":"happy mothers day, ribbon, flower","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/10/49/ribbon-7538921_150.jpg","previewWidth":150,"previewHeight":99,"webformatURL":"https://pixabay.com/get/g06d2d1f916d17e3741f00929fa6d26e098dbcc07edd1cf2b6088c2726202b158475eabee4259dce539c9052f49713db565b39df88448d6c0867f66285f9224f2_640.jpg","webformatWidth":640,"webformatHeight":421,"largeImageURL":"https://pixabay.com/get/g82bdb08026f865192d4366e6c41f580f88ac4a3ba597ac4ba1e55c7bb76aa7292004d5f62d0e05fc2da8eb934b3cf1714177861803547fe789e1f5303a9f7c44_1280.jpg","imageWidth":6000,"imageHeight":3949,"imageSize":2137124,"views":4628,"downloads":4562,"collections":5,"likes":76,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7525450,"pageURL":"https://pixabay.com/photos/bird-ornithology-sparrow-sperling-7525450/","type":"photo","tags":"bird, ornithology, sparrow","previewURL":"https://cdn.pixabay.com/photo/2022/10/16/16/12/bird-7525450_150.jpg","previewWidth":150,"previewHeight":98,"webformatURL":"https://pixabay.com/get/gc71ab2e71b2c9a332381d0e47d71546daf8b2861b4106551adb7a860be78622a680186af317022bb83e07457c6c3e7c930d714896c640f68eefde6fe0a2b6f30_640.jpg","webformatWidth":640,"webformatHeight":418,"largeImageURL":"https://pixabay.com/get/g63036a3963c3e944ecde2bcd0ef4316ca669e4f9c1f9a30ee00156f8248ecbb76427d64b745de849a47dc96bbefaeb2211950776cf89933e78c01fbcdd931101_1280.jpg","imageWidth":5452,"imageHeight":3562,"imageSize":2037507,"views":8321,"downloads":8189,"collections":1,"likes":69,"comments":0,"user_id":1767157,"user":"Ralphs_Fotos","userImageURL":"https://cdn.pixabay.com/user/2022/10/22/05-16-16-200_250x250.jpg"},{"id":7535373,"pageURL":"https://pixabay.com/photos/buildings-panoramic-alhambra-7535373/","type":"photo","tags":"buildings, panoramic, alhambra","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/17/27/buildings-7535373_150.jpg","previewWidth":150,"previewHeight":36,"webformatURL":"https://pixabay.com/get/ga4196b25d06ff939fc668a09a760cfd3283d03eda80cb1d1ec3c4c14035ed19ee4e9f268cbe45d9a0f79548ad7bbb6dc455493f6fc330500a396caf8f0b80523_640.jpg","webformatWidth":640,"webformatHeight":153,"largeImageURL":"https://pixabay.com/get/g39099a60d694e0fe1602bb3e8020d25f8485b5ccbc3e43a733d864472535b19fae819fe1f82ef8b38d4f86350254e375714a0c240b4b2c751602bf7403071021_1280.jpg","imageWidth":17717,"imageHeight":4248,"imageSize":13504559,"views":17884,"downloads":17384,"collections":7,"likes":102,"comments":61,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7538798,"pageURL":"https://pixabay.com/photos/bird-warbler-flowers-spring-nature-7538798/","type":"photo","tags":"bird, warbler, flowers","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/09/12/bird-7538798_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g82b10d125e0fc58ee45d239f887d74038403dcc997cc301ce40c29d67e594d30cfe90b11e7141a827a819ab483b1065bc08dcd254718c348062769d4189f094d_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gcda74333f0cd0e4aae3bba8b6cf996359e63ebc0bde53e6cb00d23eadbab0f73aeb8dc44aea5cb9c8f055c69105637c14bcc73b201cbde00afdd281d493c0871_1280.jpg","imageWidth":7087,"imageHeight":4724,"imageSize":2717329,"views":3975,"downloads":3841,"collections":7,"likes":67,"comments":33,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7534081,"pageURL":"https://pixabay.com/photos/fork-tailed-flycatcher-bird-animal-7534081/","type":"photo","tags":"fork-tailed flycatcher, bird, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/16/fork-tailed-flycatcher-7534081_150.jpg","previewWidth":150,"previewHeight":66,"webformatURL":"https://pixabay.com/get/gff0a760a928c0d89c1e804bddd6de65b51c625815b905e5fd0557f5b6cbef717477860544ab927a6907bbbd5b5d563fa4a965eed3ee3af5ff0c688c68a09248f_640.jpg","webformatWidth":640,"webformatHeight":283,"largeImageURL":"https://pixabay.com/get/g4aa6a7bc7ec9eca6bc8bddd1bd7f63b7b1a2f6cce7744a60efc4d1f187a21ff661736b8c05e5bf9adb55c1650f7e3480573895c2f3ad41050794e1010d1a316b_1280.jpg","imageWidth":4600,"imageHeight":2035,"imageSize":512450,"views":12679,"downloads":12570,"collections":2,"likes":73,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7525451,"pageURL":"https://pixabay.com/photos/squirrel-wildlife-mammal-animal-7525451/","type":"photo","tags":"squirrel, wildlife, mammal","previewURL":"https://cdn.pixabay.com/photo/2022/10/16/16/13/squirrel-7525451_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g1763ddbb46c2d4dfb95c0e794f47b240fc09a2bed2a4a435c71683c609982835e48c27d6eff69f19b8cbe56b925d66c2cd194c8160a15ea6b843b30f1d0e5952_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g675834ac98857fe8b44ea1456ade4c763ae58ebdebc5a3143ad811660300c537d0a56cfdb029ab525f061fa51e9e97a0c24f4cf47fe07b6dd79ad4729e045508_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4494216,"views":4773,"downloads":4658,"collections":0,"likes":67,"comments":0,"user_id":1767157,"user":"Ralphs_Fotos","userImageURL":"https://cdn.pixabay.com/user/2022/10/22/05-16-16-200_250x250.jpg"},{"id":7535359,"pageURL":"https://pixabay.com/photos/sunset-sea-church-port-people-7535359/","type":"photo","tags":"sunset, sea, church","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/17/21/sunset-7535359_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g3d8193d1b16d07d22a33a1cdb172108a6c74a8294805cb5843d9d82c1f68cf0bb7a5d87409d2f9a4a080e5fa1ad125065321a911acad1f3a28a773909e625afd_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g1172271921d70c1353dcffab49f717c3168695e194c8dd76a10a29d74d81afd3f6fd07d03c40216ff0de460c8a1eff01f6131bc1cd4353c739f2e765e9e5b6b1_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":3584422,"views":15541,"downloads":15136,"collections":3,"likes":100,"comments":51,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7532068,"pageURL":"https://pixabay.com/photos/apple-water-droplets-fruit-wet-dew-7532068/","type":"photo","tags":"apple, water droplets, fruit","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/10/08/apple-7532068_150.jpg","previewWidth":100,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g37ca04534b37db79150e0bb96d6e453be5e73da0724ff4185703654a42a51e964e15e9073919fa0b827cc810ce70a64c90ddbbac7759fdc71ce71b6216fbe589_640.jpg","webformatWidth":427,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/gb066266e995f5ff11ecf46db31408d7266d5033b44ea6341b80ecc0115b0f0c1f0d512a66122f68b5e87c6e6ca0741677b83e1ad441f0a5112ef7f8fbcee0ced_1280.jpg","imageWidth":4000,"imageHeight":6000,"imageSize":4432326,"views":13946,"downloads":13904,"collections":1,"likes":100,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7538941,"pageURL":"https://pixabay.com/photos/pumpkin-vegetable-harvest-fall-7538941/","type":"photo","tags":"pumpkin, vegetable, harvest","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/11/03/pumpkin-7538941_150.jpg","previewWidth":100,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g81bd357a6dd464bb7e1f3f7166554bfa356eca953a8e6157f83f407652135eb07152ae940c6f56746c657fb7ab3bae029e719f6cb4262c28060a383d74f763c2_640.jpg","webformatWidth":427,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g03d6daca495e15db9163a3c5aa3d9c849f288af108d21d60b7e97aebda52394859c7e24b87777c7c37ae91bf9c3582533e8623deecce53aec3cd845be012b785_1280.jpg","imageWidth":4000,"imageHeight":6000,"imageSize":2880257,"views":2469,"downloads":2452,"collections":0,"likes":59,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7535427,"pageURL":"https://pixabay.com/photos/border-collie-dog-pet-animal-7535427/","type":"photo","tags":"border collie, dog, pet","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/17/57/border-collie-7535427_150.jpg","previewWidth":150,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g363d4dc65559614e309b0380ab22821427282ea48ea7687fde4b9f17da1188fe424fe64f7e67ab39cee935c78bc83fc672c2df4595b85455941b79cb3a92ebd8_640.jpg","webformatWidth":640,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g4225bf13b61fc9d483ce110e5c8f843585e95d5e7e67d100567208074d332617857ec1a3c82b0004841a4b0ba5f462f8275784597957c8f3ac70f7729723e650_1280.jpg","imageWidth":3000,"imageHeight":3000,"imageSize":1995798,"views":6735,"downloads":6631,"collections":1,"likes":79,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7537352,"pageURL":"https://pixabay.com/photos/pumpkins-orange-pumpkin-vegetable-7537352/","type":"photo","tags":"pumpkins, orange pumpkin, vegetable","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/15/10/pumpkins-7537352_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g4014633a550c6e0feb838101d3f2c2a54a3abe876cc67ba055ddfbd7b20e4f8a4574a25dcd3a92a8799418e1a7e747f4643e267a9422a2ab291d7dfb149db9fd_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g2a5bca77f027861d7c88ccc652a8be76effa0aceef5258be647188071760592ef27c2be3c621e5f7c6514397022849b0495fb1714e8556b6df9f60341f64843d_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":6799257,"views":4054,"downloads":3966,"collections":0,"likes":57,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7534071,"pageURL":"https://pixabay.com/photos/dahlia-flower-plant-yellow-flower-7534071/","type":"photo","tags":"dahlia, flower, plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/04/dahlia-7534071_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g7fe7d039246e4f83384139861ea752c4dd72c2b34358bf44688a925c7d4532089a4d13ab0e2971cc1eecf40c34a1775f3c674320f56f95b0992f8858c7cef30f_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g69928af90c868914fd3b175efad2425b9432eed8231ac54533772939479027c2cd826c7d465fb11f7bea9f9e139ea5af14447983a256390dbcc3591708f2f973_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":3066207,"views":7427,"downloads":7311,"collections":4,"likes":83,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7534063,"pageURL":"https://pixabay.com/photos/pink-flower-dahlia-flower-blossom-7534063/","type":"photo","tags":"pink flower, dahlia, flower","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/04/54/pink-flower-7534063_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g5f7b1ff5af0648390332ccce854135d8ac448148f41a29b586658e037a068d5c34d59cac473357c7e03d91d45b2dcf9b70413629fd7082685498875062ea6638_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ga7d92b0a839adc014f9829e61ebe9730a70c2963c9a25cc4451cb69fbc017eed1acd85cd3f464c33a6933598df423a69539838f863c89aca69c8352aa627479a_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":3889698,"views":13878,"downloads":13611,"collections":1,"likes":88,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7536157,"pageURL":"https://pixabay.com/photos/bighorn-sheep-ram-animal-wild-sheep-7536157/","type":"photo","tags":"bighorn sheep, ram, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/04/25/bighorn-sheep-7536157_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g06a6244dcfb59a05fe52f87f38a19e5e374e22979878a57c6901a59fcf436eb622a3db14b9118f75f347df9c7d1b3477cc53b1ab2e54f336e9228153df412e5c_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g0ef39d52a1c12828e2c3ae2a8223ac25fbf82131136e22142e343e67dc5ffee9f55d1e1358a481617f5801a95de790e68395ad787b582b7affb8df7f2c34eae0_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4756942,"views":3933,"downloads":3852,"collections":0,"likes":63,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7536603,"pageURL":"https://pixabay.com/photos/great-cormorant-bird-7536603/","type":"photo","tags":"great cormorant, bird, great black fish-eating bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/09/19/great-cormorant-7536603_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g4cd5a38562f434e78f0d9becc67253b7d3dcb111c942a3975915112d36734adfd9e7ab0b0c33029b8b6de19ba7e618724e641cdc548795c17ea4ed1dfe12413f_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ge1712f4fd45fbfbc932aaba48c092fac988bdabd504df74c59919beeed92f798db39a70a56f62c9fa34f039c6473b745871884e0f28f46f7807198fa37255cc3_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":4454408,"views":3938,"downloads":3868,"collections":3,"likes":44,"comments":24,"user_id":14802912,"user":"dendoktoor","userImageURL":"https://cdn.pixabay.com/user/2022/09/08/19-19-09-260_250x250.jpg"},{"id":7534072,"pageURL":"https://pixabay.com/photos/bank-leaves-fall-park-nature-7534072/","type":"photo","tags":"bank, leaves, fall","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/06/bank-7534072_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g6df9bca779c4fd29a7f5452cd72626a352871d438c55912e3528c63f389dc5dceb3fb6c16a4a9d8de3d9fb5eabe34ade2e385a2cfa1e879898e8dfbb74a2591d_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g07d4c7834f8a6ce8b6afd865f361975167b3d5fc1d7568fa4acb5da74a82c1fb2769716f33e01f5f5d85f66e4d00dc51be18c2cc398872c5d79a812ebbeb517d_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":5829303,"views":10742,"downloads":10499,"collections":3,"likes":88,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7534079,"pageURL":"https://pixabay.com/photos/rufous-hornero-bird-animal-branch-7534079/","type":"photo","tags":"rufous hornero, bird, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/14/rufous-hornero-7534079_150.jpg","previewWidth":150,"previewHeight":120,"webformatURL":"https://pixabay.com/get/gc3a69c3b09543a9f1a8c2b210aab209c440aaab2aad56e7c788e2dc05e3299df3b9b0e195e3e0e95f7602e07aec0a0b267eafae8394143f90bcb70bd00e81073_640.jpg","webformatWidth":640,"webformatHeight":512,"largeImageURL":"https://pixabay.com/get/g28fdd719e5a451671f299a8a8c189923b7f1694f24e04e7d813be9087ac0683cec94ba5a2da847b92b766b96e800936fbcf7f20ace2e1b69de53fe5bb08388d5_1280.jpg","imageWidth":3082,"imageHeight":2466,"imageSize":829922,"views":4144,"downloads":4100,"collections":0,"likes":52,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7540499,"pageURL":"https://pixabay.com/photos/maple-leaf-autumn-fall-autumn-leaf-7540499/","type":"photo","tags":"maple, leaf, autumn","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/05/04/maple-7540499_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g209334c802870d6dc47fd37fb9a9c822cbce5eee70001c3ecbb95e916d99bb9b5b0a3a15431a2f3324bfaa62537f740609b3dfe1090ccc6732ba9be7bbfc2492_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g32c98e28a4ccf9e77d4e8c4b5ab4e5178631e3ccdf8f006de83df511cbb43cf45aae2e761050e5311f676823c1a904ee7949bf7139a71edbdcf5afbd2cb52e17_1280.jpg","imageWidth":6031,"imageHeight":4021,"imageSize":4704484,"views":1071,"downloads":988,"collections":0,"likes":51,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7536101,"pageURL":"https://pixabay.com/photos/coot-girl-coot-fulica-leucoptera-7536101/","type":"photo","tags":"coot girl, coot, fulica leucoptera","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/02/59/coot-girl-7536101_150.jpg","previewWidth":150,"previewHeight":128,"webformatURL":"https://pixabay.com/get/gf107099fc725163532e04854b6a81ae83b54f978e5882cee378c4da795eb16ac6d4debac56bb8f40a91c3f0381fedd191bbdeb18d84e3edfb0fe2fb0d6e4e899_640.jpg","webformatWidth":640,"webformatHeight":547,"largeImageURL":"https://pixabay.com/get/g6c05d00b3c53ad8d24734e1b8957e67af214a5d0dfb6597ca686d4d33e821b1a3185f14af1a53c87a07f2c02ed6ccf44a686be830396231d4ed52a91bdf9f51b_1280.jpg","imageWidth":3000,"imageHeight":2565,"imageSize":611614,"views":1787,"downloads":1747,"collections":1,"likes":40,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7536606,"pageURL":"https://pixabay.com/photos/great-cormorant-bird-7536606/","type":"photo","tags":"great cormorant, bird, great black fish-eating bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/09/20/great-cormorant-7536606_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g3f201c1c2b3557904cac4a1c547ef5aecb78d563c26f79f760962c4c80b9b17a9a24a08dea10ea347eabe92d92294a3670eeae9159cbfe7e91d88071d8852124_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g8937d1fc02ebf797b4daa48e4570e566e1aa0edc0d97cbd319c8bcadd0da3bb9cb128388f5005309e2797c7041424ab561d004126b6c2c146c939660ad7820a0_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":3167699,"views":1742,"downloads":1689,"collections":2,"likes":43,"comments":22,"user_id":14802912,"user":"dendoktoor","userImageURL":"https://cdn.pixabay.com/user/2022/09/08/19-19-09-260_250x250.jpg"},{"id":7540331,"pageURL":"https://pixabay.com/photos/carnation-flower-plant-garden-7540331/","type":"photo","tags":"carnation, flower, plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/02/12/carnation-7540331_150.jpg","previewWidth":150,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g5044f8afeef6b49c8705d5435c7cbeead8e1a743217ae47e559396592fdfef801fdcc1b1e86999095c615d4b7949cc610364044725d306b0f15c9001757f2370_640.jpg","webformatWidth":640,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g686e85b292c578e6f0a4006ef62007e21430422cab19d6822e791f15b70b9f63bbbb25f64eeb0b6766ef1bb1b32ccdc720b471638497ca5b3d81eee2b1817f33_1280.jpg","imageWidth":3000,"imageHeight":3000,"imageSize":1250034,"views":750,"downloads":697,"collections":0,"likes":49,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7525151,"pageURL":"https://pixabay.com/photos/early-morning-sunrise-woman-dawn-7525151/","type":"photo","tags":"early morning, sunrise, woman","previewURL":"https://cdn.pixabay.com/photo/2022/10/16/13/53/early-morning-7525151_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g5fef2ce413aca9effa7f45e2f07e08d002e538881b84b21e0992f1b85da867a7530360b65934d8c68499b4771e0f12bedd631ac91c8b0b58cd02a126236cb7ab_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gfd840596a7cda349a23f177810d3a637b3b0e2941435c8bc6e682be2b7912724433931f00aa7bcddd7d64a2900093bdb57619c740598b631616bbe57c61eb9fc_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4495574,"views":54838,"downloads":40235,"collections":33,"likes":85,"comments":12,"user_id":29721583,"user":"\u9cb8\u6d77\u9189\u4faf","userImageURL":"https://cdn.pixabay.com/user/2022/09/08/09-56-51-86_250x250.jpg"},{"id":7540753,"pageURL":"https://pixabay.com/photos/sunset-lake-jetty-mountains-nature-7540753/","type":"photo","tags":"sunset, lake, jetty","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/08/22/sunset-7540753_150.jpg","previewWidth":150,"previewHeight":84,"webformatURL":"https://pixabay.com/get/gcb764bf0cc0ffd5fc96c5193da2d673d790ecb460d0a80070bf25a28a19b2c5d4312e1ccd0d835827771542fa4c15ae9fad0f557a2683946055967ec489a0c25_640.jpg","webformatWidth":640,"webformatHeight":360,"largeImageURL":"https://pixabay.com/get/g1cec10081014c4d4ead279481ec08ea2aaa0e21eb080e6b630dd4a312ee82d077e7110af7484f84bb4b0c63b1998c96f147e42916bf4fb9d96e8d857c4540543_1280.jpg","imageWidth":5356,"imageHeight":3013,"imageSize":2072773,"views":1092,"downloads":1026,"collections":8,"likes":40,"comments":23,"user_id":1425977,"user":"ChiemSeherin","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/09-31-00-469_250x250.jpeg"},{"id":7532069,"pageURL":"https://pixabay.com/photos/apple-water-droplets-fruit-wet-dew-7532069/","type":"photo","tags":"apple, water droplets, fruit","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/10/09/apple-7532069_150.jpg","previewWidth":100,"previewHeight":150,"webformatURL":"https://pixabay.com/get/geebf52d10a3fc915c69b9f91e1c9f16a622183b6f83d4ace08a41d77542890faaff0e3a31767d901a1197d68acd3c99ab062ed6b488f5a9609a93e34a8abf46c_640.jpg","webformatWidth":427,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/gd7576a00bab1a9fcb4eed2987a1514c3023e3a04f30eeb129d492761aba16420326c9fee9b802ca2e385e92c4a84809b4bdfa6899b079a19461857e8edc6bfba_1280.jpg","imageWidth":4000,"imageHeight":6000,"imageSize":3910891,"views":6724,"downloads":6709,"collections":0,"likes":81,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7534074,"pageURL":"https://pixabay.com/photos/lichen-branch-wood-sunburst-lichen-7534074/","type":"photo","tags":"lichen, branch, wood","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/07/lichen-7534074_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g655e9d5b8f6c70bcf4659bc984a887c3217f1451430f0aede3808fb3b91115440b0f47491e49b7cfd5ed661b89e42161ce94d7e376aa7aa1bdc31450981d9f6c_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gc71f27ce8a3b90a0f1c75e0d98fbe76296140cf825c17d13a9eedc07cb9baab6658256ba74528472b339157957d64885bace934c82be2f972e3856c755ce8a65_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":4095499,"views":6425,"downloads":6322,"collections":1,"likes":75,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7532850,"pageURL":"https://pixabay.com/photos/flower-petals-spring-leaves-plant-7532850/","type":"photo","tags":"flower, petals, spring leaves","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/15/37/flower-7532850_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gf5e03a9dc5c2dfad515f697f03fad36425e4d037e79fc53bbb6d43ebfc2399bdc10a9d6f2d26d0ae94cf398fff8dcc52ad18e3f7c650c34946d2cff541fa097b_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gb990b27d30266ed7c298d1decc48aeb4d60094785c419ec941c7f9450054ddbdcca8b189a73d701a43cfd89822411e11f0d0472252b6e58390509b062b707cd6_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":3940719,"views":9775,"downloads":9630,"collections":3,"likes":81,"comments":46,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7523894,"pageURL":"https://pixabay.com/photos/cat-kitten-pet-animal-feline-7523894/","type":"photo","tags":"cat, kitten, pet","previewURL":"https://cdn.pixabay.com/photo/2022/10/15/21/23/cat-7523894_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g6054dee46666628513e3f6af91da6546c8783ff1692ab7a988901dac5b6409a6634a9718dccc9651e719c967fd722c9488a6c30d459da83245a6de616378eb2c_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gced0b1833a946649576f928225cad912a1fa907227e580580a766a84a5540143296d436e3ec9c083c57ba9ebfdcbf203d86d4e351755e6a4dad3397e148aa529_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":6180891,"views":53266,"downloads":47086,"collections":31,"likes":104,"comments":14,"user_id":4397258,"user":"FelixMittermeier","userImageURL":"https://cdn.pixabay.com/user/2022/10/15/21-17-48-138_250x250.jpg"},{"id":7535412,"pageURL":"https://pixabay.com/photos/red-apple-hanging-branch-dawn-7535412/","type":"photo","tags":"red apple, hanging, branch","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/17/49/red-apple-7535412_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g391dee5a04e7d32c3afef189bbaba829733016e31128c98d193bf7f478d5772a5c9c7208956694f401d52bdd69f32c8eac881534554b4a045e811f6a83b6c7a8_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g32b55280806bb2c5a6737cb223f084bd03e4ac7a340a83afffbed6c434d24aa3dd21e495d8c3a3862b338d4c5022f404cdc15a2eafd233898db674a3c9af22af_1280.jpg","imageWidth":5898,"imageHeight":3932,"imageSize":2509758,"views":5712,"downloads":5605,"collections":0,"likes":54,"comments":48,"user_id":6355831,"user":"pasja1000","userImageURL":"https://cdn.pixabay.com/user/2021/02/06/02-19-29-704_250x250.png"},{"id":7535445,"pageURL":"https://pixabay.com/photos/apples-foggy-morning-fruit-tree-7535445/","type":"photo","tags":"apples, foggy morning, fruit","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/18/06/apples-7535445_150.jpg","previewWidth":150,"previewHeight":103,"webformatURL":"https://pixabay.com/get/gc2fb0a465301abc9f1e2ea578b74750f5a7f53dcb954be964aa6fc964932e70c586be9614fa6adc8519857a4bee01fe726f0d8189a572cf733a8e20f4da12e86_640.jpg","webformatWidth":640,"webformatHeight":438,"largeImageURL":"https://pixabay.com/get/gc075b7766b7f072296cd793e847701b4e06be305c1b42c1680596505cb79cc681221019eb3126e58eaf372a5716b4a76933e0167977af9f53e9db7c64e4c793d_1280.jpg","imageWidth":4225,"imageHeight":2894,"imageSize":1953969,"views":4092,"downloads":4029,"collections":3,"likes":40,"comments":33,"user_id":6355831,"user":"pasja1000","userImageURL":"https://cdn.pixabay.com/user/2021/02/06/02-19-29-704_250x250.png"},{"id":7532851,"pageURL":"https://pixabay.com/photos/sea-waves-beach-sand-sunset-7532851/","type":"photo","tags":"sea, waves, beach","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/15/37/sea-7532851_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gbf91df5daf0fc91e7b1700a415bc776329f2490928029e8465a14dad15098a65c6a28f2262e3d695b77a69638ab68ff9777f39b31cb760996eef0a5b211c4938_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ge5de1205a53fd143293c6649871dcd5c9c54e1e6051399af6a3f46e8f3faf5a05907baa13a74646607b46632692cb4685dcb4768e150c22e5e6d51662d96e1c9_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4030339,"views":7913,"downloads":7760,"collections":2,"likes":75,"comments":40,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7535504,"pageURL":"https://pixabay.com/photos/flower-chrysanthemum-mum-7535504/","type":"photo","tags":"flower, chrysanthemum, mum","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/18/20/flower-7535504_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/ga42b2b9bcc300908a5f32c3009b91c86f081faafce2321e93a5b573be06ebc9414ffc11102241fa0d4d80f19eef9f36569032bf48f4048aaa4e7ba3a4282f010_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g6b4eea1e7cb2294e1844fa6be0e9accaaf9bfd181035dc54125b5da57dc9493907abfed774ac6d384e90d5537201919a4d601dbd24acad723c6ce14e46c26d09_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3902596,"views":4395,"downloads":4324,"collections":0,"likes":58,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7537903,"pageURL":"https://pixabay.com/photos/pumpkin-fall-vegetables-nature-7537903/","type":"photo","tags":"pumpkin, fall, vegetables","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/20/21/pumpkin-7537903_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g63f5ddd94472f2759fe87ba766bd5139d96fc9d1398917d912468ceeb32a21ea5078c64b35b85b686d43d90b6aa3a8bb97b28ddb9554f723377034c75eacac38_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g1a022405efd301925c1d7d8d2609fbccfb508efe4f359249bba719fbb15a1e9d3fccf195fef665525c6279ed9b16894f5c08703fc2f0e74694e6eacb7b0a2b8e_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3429771,"views":1290,"downloads":1237,"collections":1,"likes":41,"comments":15,"user_id":3930681,"user":"matthiasboeckel","userImageURL":"https://cdn.pixabay.com/user/2022/04/12/06-48-11-19_250x250.jpg"},{"id":7522713,"pageURL":"https://pixabay.com/photos/castle-vineyards-cochem-germany-7522713/","type":"photo","tags":"castle, vineyards, cochem","previewURL":"https://cdn.pixabay.com/photo/2022/10/15/08/22/castle-7522713_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g37f94b9c207d97d18da6c9e21b41f04243a1b674811ef4486f12a34201b10783279fcdcdb06166fcd37f47750e48ec98b0efc67c4895fcb8e9c6902e8aa8192b_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g877bb737d1a8c78f2e3271f84875899c58c87b2f1af266eebe7f77b6434b0ebb848b4f0e77878b5ac271483ae888bec8ae4b42171762837477dcf8fe2864cbef_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":5239184,"views":31783,"downloads":31073,"collections":5,"likes":126,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7538368,"pageURL":"https://pixabay.com/photos/bread-food-baked-homemade-biscuit-7538368/","type":"photo","tags":"bread, food, baked","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/04/27/bread-7538368_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g40f65ac14b2bb77f73886317c4b7bb669dcc668be7a3f39b4f3fffb12b09576e496b71ca50f31f9734e4abec232adb900fd17208a57657bd9017764206cf4142_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g713256b487d5a609c2e794e4e7774d7d0bf8760afe58ef780d5916d894648bd8ec380933a68d5a686e669fa2f3f6198819bb95861553e891fd6e98368d49b196_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3231661,"views":750,"downloads":698,"collections":0,"likes":42,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7534073,"pageURL":"https://pixabay.com/photos/pied-billed-grebe-bird-lake-7534073/","type":"photo","tags":"pied-billed grebe, bird, lake","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/07/pied-billed-grebe-7534073_150.jpg","previewWidth":150,"previewHeight":107,"webformatURL":"https://pixabay.com/get/gbafb56c3fe3622ddfd680024e0c0581c5a4786986379259ed3f7648d4415935a075d305ae8be8513804869612939392e6c8a860c4c9f1b8c876dbee0012fa80e_640.jpg","webformatWidth":640,"webformatHeight":457,"largeImageURL":"https://pixabay.com/get/ge57d8c737d18e9364a5f681b7d675583db01dacc8fa397a9d4acf324ce51862e85a6514ec7c86f1bbb1e1a9b756cee84e70810c2a8db18f8703cec636c238143_1280.jpg","imageWidth":3047,"imageHeight":2176,"imageSize":632828,"views":3287,"downloads":3255,"collections":0,"likes":45,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7530151,"pageURL":"https://pixabay.com/photos/cliffs-lighthouse-sea-clouds-7530151/","type":"photo","tags":"cliffs, lighthouse, sea","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/12/37/cliffs-7530151_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gb45437b387318b792cb9ce1ad98a2462e595ce254cc67a2aa1b9c4b43f03e736dfa8905dfebe928414df5e61bf63d52ee40ef871bf6b115048f53294ba4f512b_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g5d789638f936ee65d91070f92a038164fcdec54a920bee6274b4b0f978161b1af2f8fa10ec290cc0e9a31b2c3ef525eec187b055d4e992593d9cd9dbfce2d16c_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":6270436,"views":19719,"downloads":19259,"collections":5,"likes":94,"comments":52,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7530152,"pageURL":"https://pixabay.com/photos/mountain-cabin-meadows-trees-green-7530152/","type":"photo","tags":"mountain, cabin, meadows","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/12/37/mountain-7530152_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g5c322af368a103101b8c62a85b6a6db9b648fbbde0b9fd23e28c4696fb56b741ff2f60fcd096ea9dbe49ace6aab8f5e0c67e97d31969552de135cda8497a911f_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g017492f8ec0da225954941ecf41be8b24a42eccce5bd3cf3f8840af03db2827ea57abfab6d1cf71a85c2705db5479656898cfaf1b7714c1c501863ce4e213f6a_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":10907502,"views":18015,"downloads":17529,"collections":3,"likes":94,"comments":51,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7518536,"pageURL":"https://pixabay.com/photos/crane-houses-architecture-cologne-7518536/","type":"photo","tags":"crane houses, architecture, cologne","previewURL":"https://cdn.pixabay.com/photo/2022/10/13/07/54/crane-houses-7518536_150.jpg","previewWidth":100,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g8d083fcdd4f4fedc1cd3ada787ffeb074aca23bd3d53a87e6fa5a581ceeec7d01a5d90725a5d81efe0a95077b15031e7ee7fe9ff84647349a4c7f9b3ced8f230_640.jpg","webformatWidth":427,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g93d654b064b78c586656e0cf141d93564c45eff8ea1cd5c8228355c23bd123b1e86449ed0d1c5a9d8ce3de2f969d7274846bf9ee3b5857b52b2bcf11ec93a071_1280.jpg","imageWidth":4000,"imageHeight":6000,"imageSize":5301194,"views":49729,"downloads":45192,"collections":9,"likes":172,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7532076,"pageURL":"https://pixabay.com/photos/water-lake-sailboat-yacht-7532076/","type":"photo","tags":"water, lake, sailboat","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/10/19/water-7532076_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g045b03001b3aa59813fe633009bc15246405c2d13799a7cb5b9d84b1f6e034c9939d6523f7e739804cfab03e459725f1f5fb83f0daca9da765465f03a291c9eb_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gcc0729b02c567d4a6fe07bc799a5a756d19faf8c70a32f1248f8a455e53aff97ae987ce18b02470c5463306fc298c6f581e0898c9ed23f8109262bb866e8ce88_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":9687704,"views":2873,"downloads":2822,"collections":1,"likes":41,"comments":28,"user_id":9363663,"user":"Nowaja","userImageURL":"https://cdn.pixabay.com/user/2020/09/15/15-16-12-52_250x250.jpg"},{"id":7522608,"pageURL":"https://pixabay.com/photos/danube-river-wave-danube-wave-7522608/","type":"photo","tags":"danube river, wave, danube wave","previewURL":"https://cdn.pixabay.com/photo/2022/10/15/06/45/danube-river-7522608_150.jpg","previewWidth":150,"previewHeight":99,"webformatURL":"https://pixabay.com/get/gab128ad289da151829a19820c4e8008907ff6b40370736b54af7ac65926bfae100ebb887554b9a942bd21f095f761b44d3f943b06925beb095cfe6f11c7a82b0_640.jpg","webformatWidth":640,"webformatHeight":422,"largeImageURL":"https://pixabay.com/get/gd1d0a5a4f28aed365e9f96041e74b4b61cd4f6a3d474e4296e9207e1b15f1c0e7d83798e4327f4f97cdb6908de6f7e6446fa3f4fdaad8c1e0fb25cf9f77e589e_1280.jpg","imageWidth":3387,"imageHeight":2233,"imageSize":3413035,"views":44901,"downloads":40677,"collections":26,"likes":96,"comments":13,"user_id":30610845,"user":"mikewolf_","userImageURL":"https://cdn.pixabay.com/user/2022/10/15/06-43-32-88_250x250.jpg"},{"id":7534068,"pageURL":"https://pixabay.com/photos/teasel-flower-faded-dried-up-7534068/","type":"photo","tags":"teasel, flower, faded","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/01/teasel-7534068_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g56f116349828435cd94a72cd628f74cedad44743f7bdd09eca676d9119f750944420790d104a12554e6f4ce725a223d5a0e8d0d2abc4a177971df8054b2625ba_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g74f88462b312d0ce903cdec3c649fcf00a2ec03a68562a13e26b70afc707e14c64560dad31e3db4c5680c28b6746e833d204d5f6c0d8b08f9a753228ed8db632_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":4580223,"views":4577,"downloads":4513,"collections":1,"likes":62,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7534070,"pageURL":"https://pixabay.com/photos/southern-screamer-chaj%c3%a1-bird-7534070/","type":"photo","tags":"southern screamer, chaj\u00e1, bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/04/southern-screamer-7534070_150.jpg","previewWidth":143,"previewHeight":150,"webformatURL":"https://pixabay.com/get/ga80caad3044e57aa178cec445ac5f42b204c6d241e7dc2ef47e5fd978662f748aa4d0f30069e154401114636284359a824b963c2f03e97e5cd5aaf11bb87e74a_640.jpg","webformatWidth":612,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g4e980896809ba08bd8b6cfda97b777e202f95a1647ab25a6aa29f82e1a0d68d3537351fef079df2f51ef07f00fbdc8b24f6f5b8884e44f98b922a0211f2b6861_1280.jpg","imageWidth":3071,"imageHeight":3212,"imageSize":1013138,"views":2824,"downloads":2807,"collections":1,"likes":40,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7533939,"pageURL":"https://pixabay.com/photos/musk-ox-buffalo-animal-wildlife-7533939/","type":"photo","tags":"musk ox, buffalo, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/02/23/musk-ox-7533939_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g01adf540eb39560fab1b7f04479c4c77bd6821563d2b2d99170f774634db37c5ac3e0b4fe9c31c8afb14925a2135776f559992500807805893f7e064288ea613_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g826252cba466c6b4b14fdc363682155e42f4eca572f99f27d76864940e8be91d0cc201e4b5701ce73008530fcd1feecd3a7e518554eb772248a07b240a353b6b_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3962906,"views":5442,"downloads":5355,"collections":0,"likes":62,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7538404,"pageURL":"https://pixabay.com/photos/cormorant-bird-animal-water-bird-7538404/","type":"photo","tags":"cormorant, bird, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/05/08/cormorant-7538404_150.jpg","previewWidth":150,"previewHeight":131,"webformatURL":"https://pixabay.com/get/gbe15da25682521f2795e961bbd4c48401890341f2d02c88dce27ce31ebd7c714bd1573dad46a92a61247d447c7e91919c8e1653e2e66e92277276d697eb67a67_640.jpg","webformatWidth":640,"webformatHeight":561,"largeImageURL":"https://pixabay.com/get/gaa29dde73225db4da323e998697e0f61929f2d41949ef0d48e621d2d401b4ccf5fba2053ca09cf1b46694fd123428045fbbdaf1049082e9cd5325bcdb2d5b490_1280.jpg","imageWidth":3235,"imageHeight":2835,"imageSize":663680,"views":1074,"downloads":1045,"collections":0,"likes":30,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7537567,"pageURL":"https://pixabay.com/photos/leaves-fall-multicoloured-nature-7537567/","type":"photo","tags":"leaves, fall, multicoloured","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/16/35/leaves-7537567_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g56dac41207a01b1a3c5335c60a710e584535d76215ecf3fd4f539441149aa49dc6a336d18f06538c1cf5b485c9d8ba49f73667faae589409c596d0085b786d39_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g339cb35f82acaddc3dbef466166da9945f3b17c4988081e01a09b8817a5e15ce23f338dc90b36d5e32a0ea068436bf30898a6791c3cf37bac4534012cc24982a_1280.jpg","imageWidth":5000,"imageHeight":3333,"imageSize":4483716,"views":1498,"downloads":1450,"collections":1,"likes":29,"comments":13,"user_id":7998824,"user":"jggrz","userImageURL":"https://cdn.pixabay.com/user/2022/10/21/09-43-52-779_250x250.jpg"},{"id":7540742,"pageURL":"https://pixabay.com/photos/sunset-lake-autumn-mountains-7540742/","type":"photo","tags":"sunset, lake, autumn","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/08/18/sunset-7540742_150.jpg","previewWidth":150,"previewHeight":60,"webformatURL":"https://pixabay.com/get/gf7fcf12d08dca7da9d1d23dc0bd9af80c388f14f2fc543b17f8f648e37bf51faa6a6eb1795fd8818bbbeba885739bb669b8225abffb32388d6ce64c70e0f9109_640.jpg","webformatWidth":640,"webformatHeight":256,"largeImageURL":"https://pixabay.com/get/gc7fec162854b2d66de892ab8f8b04f32d79efeefad72ee07017df7c955da21f005f08c725bcc6adaa719d6a368c34b112b7f3d5f0f4677b56c03dfc0846352fd_1280.jpg","imageWidth":5935,"imageHeight":2374,"imageSize":3265342,"views":517,"downloads":470,"collections":2,"likes":36,"comments":20,"user_id":1425977,"user":"ChiemSeherin","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/09-31-00-469_250x250.jpeg"},{"id":7529348,"pageURL":"https://pixabay.com/photos/glittering-bellied-emerald-bird-7529348/","type":"photo","tags":"glittering-bellied emerald, bird, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/06/05/glittering-bellied-emerald-7529348_150.jpg","previewWidth":150,"previewHeight":134,"webformatURL":"https://pixabay.com/get/ga079a9b79bc7e66cb91890ef9770866ec35eddd47eb143e193af29982ee51d3c0a210fadf8d2385cb095e197d820e4c410832b901c4cff06e3533399c00a9233_640.jpg","webformatWidth":640,"webformatHeight":571,"largeImageURL":"https://pixabay.com/get/gfa5f42b5d8da6e82b1ca3f201bbaded553b75f1f21c566c0d1d6fe08c75e074a91b35dc7c6834985111691a8d2ee182cbe39bf79a414ab75319cc16bf5d8b943_1280.jpg","imageWidth":3294,"imageHeight":2941,"imageSize":606496,"views":7646,"downloads":7552,"collections":3,"likes":60,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7538401,"pageURL":"https://pixabay.com/photos/coscoroba-swan-swan-bird-waterfowl-7538401/","type":"photo","tags":"coscoroba swan, swan, bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/05/06/coscoroba-swan-7538401_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gfccac014b526c3248b2edf949b56f9499d8965bb43bb97d2464a18c26ff7ba6db24e5c774f7d3288611b6b1d86a787b3738b3225c7042dd8c109e21244dff5f1_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gfc137f8d3991f6a27bfe9589f690d0f5f2b8936a82c8838c2ab56f20926ca111cf3a4a4047bce2a0764d81abe8aec4ed30e2aeaec3c8397073aad227647fcb4d_1280.jpg","imageWidth":3034,"imageHeight":2023,"imageSize":416641,"views":1072,"downloads":1051,"collections":0,"likes":29,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7538418,"pageURL":"https://pixabay.com/photos/spectacled-tyrant-bird-plant-animal-7538418/","type":"photo","tags":"spectacled tyrant, bird, plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/05/16/spectacled-tyrant-7538418_150.jpg","previewWidth":150,"previewHeight":120,"webformatURL":"https://pixabay.com/get/gf64d00a4237f39465db77e9bbcc28b36c9a82909412b34e7c7bf110f3a15e0ff06219377642b0dfe2e6d9c177a05792000c61942c6b3cf1ae40d4da3062e36a8_640.jpg","webformatWidth":640,"webformatHeight":512,"largeImageURL":"https://pixabay.com/get/g286c87c625f9bbd9cc72b0a21f659c39dccfeeb57730babcde7d2a97fe04ef1af247c64ad7b48caabc89f25e0bd635836a7daf32f6cc426653536f947db6356e_1280.jpg","imageWidth":3047,"imageHeight":2438,"imageSize":508565,"views":962,"downloads":941,"collections":1,"likes":28,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7538820,"pageURL":"https://pixabay.com/photos/calf-cow-animal-bovine-beef-7538820/","type":"photo","tags":"calf, cow, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/09/23/calf-7538820_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g55401fec7de8ef6ed4b33fd301eb7d1eed2ff32bf0c9abf4760c432da32fd5e6522b8ddf98c06a08de45cd6e0fdeb078fbe511b9a622a12e8ad9d2670a12dada_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g97dfa1edd789a1a48b3b55a6151110b39ff23b89aba88d1045d032a572e08069b27469f7c471a324f458a3dd10199181ef779b22cf234781dc62bb9aa09be49a_1280.jpg","imageWidth":8256,"imageHeight":5504,"imageSize":8315994,"views":814,"downloads":775,"collections":1,"likes":36,"comments":20,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7538799,"pageURL":"https://pixabay.com/photos/calf-cow-animal-livestock-bovine-7538799/","type":"photo","tags":"calf, cow, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/09/13/calf-7538799_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gaae3bbd783335521444e8e7fa1d7b2a434849b5d050e5387491234b3991620afdb97529c5d607bf4b8aac3aed43267c6581c5b2ba9876e2d2803f0d0f2bb4b43_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ge43c74a3d0661ad350e7cf5c7674039a45a0ea2af0dcc4db060cc3c569fe69f54dcc46bedf4bca25cc028afde11a4352a0ca78b37af0b6f91538d9b16a67c8cf_1280.jpg","imageWidth":8209,"imageHeight":5473,"imageSize":8633184,"views":767,"downloads":727,"collections":1,"likes":36,"comments":23,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7538816,"pageURL":"https://pixabay.com/photos/cow-calf-animals-cattle-bovine-7538816/","type":"photo","tags":"cow, calf, animals","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/09/19/cow-7538816_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g06c26f84a01198cbd3903221a601ac3015acb53b690c928269083a258eb100d4a2027b2fedce50a852745111309b6346a4e0b58791d491495ff09906bfef93c5_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g3eaaebc6945e720998ffd1699842dade45533dc3df8d3f98de01c784e1e006faf08b1b35fde28dfef7bf38d4739eaec334fd503a81b89cf71c0aa239728d52fd_1280.jpg","imageWidth":5738,"imageHeight":3825,"imageSize":7963993,"views":733,"downloads":693,"collections":1,"likes":36,"comments":22,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7540534,"pageURL":"https://pixabay.com/photos/white-throated-treecreeper-bird-tree-7540534/","type":"photo","tags":"white-throated treecreeper, bird, tree","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/05/57/white-throated-treecreeper-7540534_150.jpg","previewWidth":100,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g7997f41e8b1547e7bfc8285e07c005c50a5e7f0502e3eff131029ebda910e6805df480f72b6c75379e810d97e8d47c6a656f075397e68f5f818a168bef2b03d3_640.jpg","webformatWidth":427,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g3d695ee31f1351ad38cc0cef87f428f856c15adedcdb044865be7245a06aace4c222f5b8463771a43f84bbd735f999240fc08772c23741ea6b3916165184feea_1280.jpg","imageWidth":3401,"imageHeight":5102,"imageSize":2361210,"views":526,"downloads":489,"collections":2,"likes":35,"comments":20,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7540765,"pageURL":"https://pixabay.com/photos/grey-shrike-thrush-thrush-bird-7540765/","type":"photo","tags":"grey shrike-thrush, thrush, bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/08/32/grey-shrike-thrush-7540765_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g88974fac74e99f86f30fe7ba88bb7d9342e875df72a479d7214d98563d0c6a869638e7efef6c1442a88b6f49f9a24de02126e03d4d1e20f86a9e310d88da238a_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gc7c541c138965c790601ee5244c1bf1e93882e3c3c7238abbfd815350436cde645022a87a74a152eab317afefe1e422ff8fd32b01c3b64fd64b4b0df95bb1ed3_1280.jpg","imageWidth":6870,"imageHeight":4580,"imageSize":4252108,"views":484,"downloads":445,"collections":2,"likes":35,"comments":23,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7529350,"pageURL":"https://pixabay.com/photos/ringed-teal-duck-bird-7529350/","type":"photo","tags":"ringed teal, duck, bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/06/11/ringed-teal-7529350_150.jpg","previewWidth":150,"previewHeight":113,"webformatURL":"https://pixabay.com/get/ga7426c1ade5fb1b0818229f875818c8d983c22bb9a056ee1bc6055a5379ef79d4bab1fa07d56a0c9b03d18cc7750a35ce2337c18852efe27a0abb4b6682190f5_640.jpg","webformatWidth":640,"webformatHeight":481,"largeImageURL":"https://pixabay.com/get/g162ec76e110f7593e98bb197c0f6334fa52d777641fe492ef0a1ae740221b1a0283a355a0b568fe304b60dec68102f9697a1542e77b8612fa13488b79161d16d_1280.jpg","imageWidth":3988,"imageHeight":3000,"imageSize":1002384,"views":6817,"downloads":6730,"collections":1,"likes":59,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7537201,"pageURL":"https://pixabay.com/photos/pumpkins-white-pumpkin-vegetable-7537201/","type":"photo","tags":"pumpkins, white pumpkin, vegetable","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/14/25/pumpkins-7537201_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/geca25f106dbfac4a3e721f388bea639b823fe1ed2061ca21c8b7d56d1aa7d3e51a6a2acee0f66da191ecf6e0795c4c12c0cfde1f2582c728f6700d4e9ca7c98b_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gf9eff1d5c20fb242636489bbedbb3d76f36145edd395d8579c71b54e1ff44e0c052fc8135a3db702f783b2022b6d95e4edde1b54162097e319311eb65747032f_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4744754,"views":876,"downloads":849,"collections":0,"likes":39,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7533698,"pageURL":"https://pixabay.com/photos/cormorant-bird-river-animal-7533698/","type":"photo","tags":"cormorant, bird, river","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/21/38/cormorant-7533698_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g58d897184dda5cc6563775aa87aa5649715e19d31e904a753e35a7761088ec86a15aa7fb7b1dc6cccaf3166b261919f1c4917370ce6b00d6eafa4842a1895349_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g4fe077b838124ab1345e31cce81cd5cef0c26c27a04504fedbebae6b3b93517b72aa8ea819e2591249f7681398981f92e6532aa461a064541b6989da7c3f4cc9_1280.jpg","imageWidth":4000,"imageHeight":2667,"imageSize":2295445,"views":3296,"downloads":3237,"collections":1,"likes":41,"comments":21,"user_id":25467781,"user":"sharkolot","userImageURL":"https://cdn.pixabay.com/user/2022/10/10/19-39-18-33_250x250.jpg"},{"id":7538819,"pageURL":"https://pixabay.com/photos/calf-cow-animal-bovine-beef-7538819/","type":"photo","tags":"calf, cow, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/09/23/calf-7538819_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g678f0f4a48823271a334dd80cf7bc04763ca3da221dbd5b6879094631c8f92b8b39f4c0b131530e869a050d430f142b4332138c3802b06eacef8fccc08659760_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g977686641713373c313cbf1e7878ea5d38e783cba3f0c27ef1ef6b7fae1b1e4de097d51246d9c0bba9e8ae29b9630daebf47670dffe8889e82f0c598dcea542f_1280.jpg","imageWidth":7403,"imageHeight":4934,"imageSize":6476856,"views":720,"downloads":683,"collections":1,"likes":35,"comments":21,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7535521,"pageURL":"https://pixabay.com/photos/pumpkin-vegetables-food-healthy-7535521/","type":"photo","tags":"pumpkin, vegetables, food","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/18/28/pumpkin-7535521_150.jpg","previewWidth":150,"previewHeight":94,"webformatURL":"https://pixabay.com/get/g9e5c3d5cff5ca7c4f2d662d891d9c8c6254619566f718ecb9c8cba58e27c2a9a7ef705005d904acb4ea83c369004b9eb900cb3417f47351848d48b8367e8f38e_640.jpg","webformatWidth":640,"webformatHeight":399,"largeImageURL":"https://pixabay.com/get/g8f0ce06d71d91b3cdaa0bb7cb6453eba157e03e8e45d1aa73dd7f429455b9162dc458b3ee8abf67bef4228ad216d6a542848411306b2e580239728466b2f8ea6_1280.jpg","imageWidth":5984,"imageHeight":3728,"imageSize":3867900,"views":1274,"downloads":1251,"collections":0,"likes":33,"comments":13,"user_id":3930681,"user":"matthiasboeckel","userImageURL":"https://cdn.pixabay.com/user/2022/04/12/06-48-11-19_250x250.jpg"},{"id":7531228,"pageURL":"https://pixabay.com/photos/man-mercedes-benz-vintage-car-7531228/","type":"photo","tags":"man, mercedes benz, vintage car","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/22/44/man-7531228_150.jpg","previewWidth":150,"previewHeight":124,"webformatURL":"https://pixabay.com/get/g45f704658056f03612e526b3653dd536a53504e44123bfbb3eeb0e736605f72a199f408cfe6e44cbd716ff998dad939575acfddf1059afdb5d54168ad99133c6_640.jpg","webformatWidth":640,"webformatHeight":530,"largeImageURL":"https://pixabay.com/get/g06739ece2f91f22f52521158d2b9bc268e5f57a72527465a9ee7de4eda6026a3c0ab58e0da703410a54133e90d10f0aeb15258f4471a6ee53346652f4ce2ef55_1280.jpg","imageWidth":4200,"imageHeight":3480,"imageSize":1902562,"views":8061,"downloads":7858,"collections":3,"likes":71,"comments":52,"user_id":9214707,"user":"mollyroselee","userImageURL":"https://cdn.pixabay.com/user/2022/10/03/13-04-47-783_250x250.jpg"},{"id":7536089,"pageURL":"https://pixabay.com/photos/whistling-heron-chiffon-7536089/","type":"photo","tags":"whistling heron, chiffon, sirigma sibilatrix","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/02/56/whistling-heron-7536089_150.jpg","previewWidth":150,"previewHeight":120,"webformatURL":"https://pixabay.com/get/g7d2d7027590810d247ede58503f8ddfbb3a36739c62c0f2e938099fbffff1797a5329ecd861c82139e9e397d5d5cbe32a4ee309104d619776d1691c04cb24c4c_640.jpg","webformatWidth":640,"webformatHeight":512,"largeImageURL":"https://pixabay.com/get/g2d21f5945cac3396c6eee993d8e5a2a4f3fa316fffb023b5e7ac29cb75309eaecaa0783c294e611c48143959a98446fafe62fea3f310b6dc6e143f189256260e_1280.jpg","imageWidth":3750,"imageHeight":3000,"imageSize":791574,"views":766,"downloads":738,"collections":1,"likes":30,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7535899,"pageURL":"https://pixabay.com/photos/apple-branches-field-the-orchard-7535899/","type":"photo","tags":"apple, branches, field","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/23/36/apple-7535899_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g1227bd82171ee1ca1df0ba6a706b7ca0296ff1768d38cb2f6a3a4eb1472c6d347a7cb4ca9c0bd04e42ceb8d1a91863adeca46abd0a80cd0987b50bec090e866e_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g20ff9ca3640066fe6449349d946a990c574724ee2cb2439962add49c9a94c5b1741fa68dbf866a3a98087f8a2d1c99380b780a7a6e8c10321aef7015a1d3c27b_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":2233208,"views":363,"downloads":336,"collections":1,"likes":28,"comments":19,"user_id":6355831,"user":"pasja1000","userImageURL":"https://cdn.pixabay.com/user/2021/02/06/02-19-29-704_250x250.png"},{"id":7539271,"pageURL":"https://pixabay.com/photos/jewelry-basket-cosmea-cosm-7539271/","type":"photo","tags":"jewelry basket, cosmea, cosm","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/13/44/jewelry-basket-7539271_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g9987ad94e26169bc2e3e0bd5a4760edbca795279a64a60af3081c0d21ff6d575305d39a5f5190f843259be615edd62522eb6134d14046d52b388d85d8b12f70c_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g2060dafedd472331f3e1ad8df8537b8f2005f812264dd2da56953bfd512ebe7c87eab3ce563d7e0a3d5d666c098c44259504e73a2e9f3bbf8c5ad9c4649469e5_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":2376135,"views":438,"downloads":405,"collections":4,"likes":31,"comments":16,"user_id":10084616,"user":"Nennieinszweidrei","userImageURL":"https://cdn.pixabay.com/user/2022/03/12/15-57-22-761_250x250.jpg"},{"id":7535241,"pageURL":"https://pixabay.com/photos/apple-fruit-tree-plants-red-apple-7535241/","type":"photo","tags":"apple, fruit, tree","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/16/22/apple-7535241_150.jpg","previewWidth":150,"previewHeight":98,"webformatURL":"https://pixabay.com/get/g397416fb889d3c8e07ae5b09447254bf42b313802dcefa38e7cbd6bf8bd78574beaf5e4faa012590ec99dfe8b70ef849002d791b9b9fc411be505cbe21749c2a_640.jpg","webformatWidth":640,"webformatHeight":417,"largeImageURL":"https://pixabay.com/get/g51a1e1aff35991c106b456a3cdde804b07ca59fba77a711eaaee1c5cf2ade088abb6703208b9587b6e4abd8b826ed56efb763ca9f7773e2d032a4911f7296ae8_1280.jpg","imageWidth":5845,"imageHeight":3806,"imageSize":2835255,"views":1163,"downloads":1138,"collections":2,"likes":33,"comments":21,"user_id":6355831,"user":"pasja1000","userImageURL":"https://cdn.pixabay.com/user/2021/02/06/02-19-29-704_250x250.png"},{"id":7535529,"pageURL":"https://pixabay.com/photos/wind-chimes-decorative-music-7535529/","type":"photo","tags":"wind chimes, decorative, music","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/18/32/wind-chimes-7535529_150.jpg","previewWidth":134,"previewHeight":150,"webformatURL":"https://pixabay.com/get/gfc46073881730f421f939ffd7a3b9ad7b911acc09a569e545253565072393045daf1bc24c4d26f58f0dff003866d96ad65c7cd43c0f739a01d9e0b176d35254e_640.jpg","webformatWidth":570,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/gcbc499578bf34d2752bfc681a0c774389259b345574cb6aa385797050959b77513af88720d233b6f79e8e5a5a1ba099fdffc121ad650f39c47fd8eca9b525787_1280.jpg","imageWidth":3402,"imageHeight":3822,"imageSize":2439535,"views":2217,"downloads":2178,"collections":1,"likes":45,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7522735,"pageURL":"https://pixabay.com/photos/castle-ships-vineyards-cochem-7522735/","type":"photo","tags":"castle, ships, vineyards","previewURL":"https://cdn.pixabay.com/photo/2022/10/15/08/40/castle-7522735_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gf87a22e1140999a752590e8a080064a13f2dd8ec07e47f680ac38af291c21cbdd0021aac4ea9d621684a448200962e958350d41f5e3f14f3b3cf101710bfe62c_640.jpg","webformatWidth":640,"webformatHeight":426,"largeImageURL":"https://pixabay.com/get/gf7b87530f77d4bb98fbd1054b3b8bfebd3312d5f40f2d41bedf990aaba4cabb8842c13872448c79263dfd93a1c1b7d09b150e575551c58f9c83a74209122ac8f_1280.jpg","imageWidth":6000,"imageHeight":3997,"imageSize":7762007,"views":25695,"downloads":25257,"collections":1,"likes":109,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7537869,"pageURL":"https://pixabay.com/photos/monkey-animal-primate-nature-7537869/","type":"photo","tags":"monkey, animal, primate","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/19/47/monkey-7537869_150.jpg","previewWidth":150,"previewHeight":84,"webformatURL":"https://pixabay.com/get/g9b5aa1feaba782ef103fb603d0b032197bde2064add8ef81431ace0b01018f7c4c6fe69e7fd34c1a6226639533411e31caba47d19326256bf1ed29c5d4708fab_640.jpg","webformatWidth":640,"webformatHeight":360,"largeImageURL":"https://pixabay.com/get/gfb117e75ec5217921cda612c33f852b5e459fea8860fff4645a43f412f1e263dd1f802a60af5310bbee934bc5cb36f345ce632901b0795df81631f6ce296f0fc_1280.jpg","imageWidth":6000,"imageHeight":3376,"imageSize":6775024,"views":957,"downloads":924,"collections":0,"likes":28,"comments":16,"user_id":5797981,"user":"J\u00fcrgen_Bierlein","userImageURL":"https://cdn.pixabay.com/user/2017/08/23/23-15-41-944_250x250.jpg"},{"id":7536200,"pageURL":"https://pixabay.com/photos/nature-wallpaper-growth-7536200/","type":"photo","tags":"nature wallpaper, growth, forest mushrooms","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/05/12/growth-7536200_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g54b9343cd25da4f95f33e57c8dc56e4702ff850135805e8136b9f113454f1457c7a9019001702866a29d5676a9f0fc812e6dcee8d6ba343f431a867ab8f3ec7c_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gc91d5dc98c8be6e309e6f2116f2735322f080051f1eb0d7ad806a70f15adbb8ab01bee69f22c300a5d32cbce3b6584236b93060dd7924e170a8a6b8b68edf6f5_1280.jpg","imageWidth":5000,"imageHeight":3333,"imageSize":3367695,"views":977,"downloads":941,"collections":0,"likes":26,"comments":15,"user_id":7998824,"user":"jggrz","userImageURL":"https://cdn.pixabay.com/user/2022/10/21/09-43-52-779_250x250.jpg"},{"id":7536145,"pageURL":"https://pixabay.com/photos/tiger-butterfly-insects-love-flower-7536145/","type":"photo","tags":"tiger butterfly, insects, love","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/03/53/tiger-butterfly-7536145_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g2b5e7053909c6ffad941335e620238ecf7afc63c4bfa1c4361408770c6d459e98c470cade9e7700fe834a351d11e34e443d9adeffff9913ac2e1e02b617c492a_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g457a043c2ff5a92da65bfc9d1b48d2f452cee1a5ed3909472ec8008e33d3d556e42fe1d8d92943dc35aafad366f0361c1c456067539e3d90e9e76b8197563f1e_1280.jpg","imageWidth":6000,"imageHeight":4003,"imageSize":3946975,"views":842,"downloads":800,"collections":2,"likes":24,"comments":7,"user_id":7703165,"user":"KIMDAEJEUNG","userImageURL":"https://cdn.pixabay.com/user/2022/05/29/17-22-10-952_250x250.jpg"},{"id":7539599,"pageURL":"https://pixabay.com/photos/forest-trees-sunlight-7539599/","type":"photo","tags":"forest, trees, sunlight","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/16/47/forest-7539599_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g726fe87238e920f06277205b90be58304308e472b8635e6f9178e7d9cb8a7088ea1596ac8112252c6d5a4a15599f8a083ded65f6edc59faa22ff39fe2ee9794e_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g144c2ba942c8bdebac79a28555db043a4b763b41783f616c650372b32abea944500a5e99bf721e4298e55c38a785c23839b66c0ca71727af4be5bad01a99b04e_1280.jpg","imageWidth":4016,"imageHeight":2677,"imageSize":4183117,"views":609,"downloads":571,"collections":5,"likes":29,"comments":11,"user_id":16096197,"user":"Camera-man","userImageURL":"https://cdn.pixabay.com/user/2022/03/01/11-08-12-943_250x250.jpg"},{"id":7539596,"pageURL":"https://pixabay.com/photos/mountain-alps-italy-valle-d-aosta-7539596/","type":"photo","tags":"mountain, alps, italy","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/16/47/mountain-7539596_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g388beba90a69f7c99308267927eb20ae805967e169d2cedc9373092c248c8f3837a48c8749f06af65bc2c8c4cdd6f9e61359d5f1b0642db996eea43df65d0842_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ge2c47f56ee066e6c098c692b74326ba0de58cce2cdff5d06467d1b5af4f607414d58f800a40f746fbd68c01b85e3c772f5a9d188144aa9fec6459186e4a54dd0_1280.jpg","imageWidth":4016,"imageHeight":2677,"imageSize":4396080,"views":398,"downloads":351,"collections":3,"likes":31,"comments":15,"user_id":16096197,"user":"Camera-man","userImageURL":"https://cdn.pixabay.com/user/2022/03/01/11-08-12-943_250x250.jpg"},{"id":7530473,"pageURL":"https://pixabay.com/photos/sunset-lake-mountains-heaven-7530473/","type":"photo","tags":"sunset, lake, mountains","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/14/42/sunset-7530473_150.jpg","previewWidth":150,"previewHeight":84,"webformatURL":"https://pixabay.com/get/g83a6b163596ffc36cbdb0c2ce5a78cd4a7783ed14cd7bdc3fb7b7ed2b5a72016599b452d3e3ec03bba27b56e041b91f6bc34fdcff1a9915799973a07073ad6ca_640.jpg","webformatWidth":640,"webformatHeight":360,"largeImageURL":"https://pixabay.com/get/g9fe29924f4eae8b2a6c0e36f1dc65e7e3d245696c9aec31bee155d9a6d9c59533cfbab0dbc8e7bbb8f9c4e8ed82b2595a5be7a5fb3d06802a9792ef62d19688f_1280.jpg","imageWidth":5966,"imageHeight":3356,"imageSize":2506825,"views":10071,"downloads":9849,"collections":5,"likes":66,"comments":49,"user_id":1425977,"user":"ChiemSeherin","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/09-31-00-469_250x250.jpeg"},{"id":7530798,"pageURL":"https://pixabay.com/photos/swan-bird-waterfowl-water-bird-7530798/","type":"photo","tags":"swan, bird, waterfowl","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/17/31/swan-7530798_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gef351ecf1e58e814efef1d4894b957dd0f0598b5e9cefa33485c8870d3d20d6d93f72863696125d53c50168f7f10cb5c0dbcdc369dcd17f3b245ae0c7623ccca_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gb180792eae50b1901bb508d4e9b541a5782b727a7462681084f5e42b90a6459e5e95854dc498631a4f8b1d0d6895ad66e8d092131c74306829e9d7c03b2fc6f0_1280.jpg","imageWidth":3000,"imageHeight":2000,"imageSize":1635516,"views":6343,"downloads":6258,"collections":0,"likes":54,"comments":34,"user_id":25467781,"user":"sharkolot","userImageURL":"https://cdn.pixabay.com/user/2022/10/10/19-39-18-33_250x250.jpg"},{"id":7536239,"pageURL":"https://pixabay.com/photos/mushrooms-mycology-fungus-7536239/","type":"photo","tags":"mushrooms, mycology, fungus","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/05/24/mushrooms-7536239_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g7094aaf9e34cd2d478cef9b51028be84284e3d0d895c60694dea1c4bc039cb5861cc77d11bb935ca62a6956f4b0bc6a11ac4ef25093167d87c5b45c6b56fb175_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g0fe55e0e4ffef9a2780d8e7fdac756392c9ad22a1aae620e0f0ea93a383e28202c3224e7dfe20387522b46ac50dc45920635dce5cc9e6795c81fb58494d932f5_1280.jpg","imageWidth":5000,"imageHeight":3333,"imageSize":3802517,"views":545,"downloads":515,"collections":0,"likes":25,"comments":13,"user_id":7998824,"user":"jggrz","userImageURL":"https://cdn.pixabay.com/user/2022/10/21/09-43-52-779_250x250.jpg"},{"id":7529676,"pageURL":"https://pixabay.com/photos/seagull-beach-bird-wildlife-7529676/","type":"photo","tags":"seagull, beach, bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/09/05/seagull-7529676_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g7183c718fb3fec8469473e3a23ec2208ad51651da911e34140a20cfedfb92025d860571f36b17d219a1b30a329b6129fa7d4b5ce4e7d5f02b7eba3aa20659a00_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g306bbc51b4a187f79d777d0852d40319aa560c0f720decc0d943395283e4ae610e0b7f5db8471cf28ab34f8a1731c96ae85393833dc9a6ed3a2aebc2c307839d_1280.jpg","imageWidth":4670,"imageHeight":3113,"imageSize":2756287,"views":5308,"downloads":5231,"collections":2,"likes":53,"comments":32,"user_id":14802912,"user":"dendoktoor","userImageURL":"https://cdn.pixabay.com/user/2022/09/08/19-19-09-260_250x250.jpg"},{"id":7518546,"pageURL":"https://pixabay.com/photos/clouds-heaven-background-sunbeams-7518546/","type":"photo","tags":"clouds, heaven, background","previewURL":"https://cdn.pixabay.com/photo/2022/10/13/07/59/clouds-7518546_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gd6147bce9b84544b35bdba1fd5970a4f9970589ac4dcbb1bcf9144ece731cff4eb77a5a45cb7aa0637e8822c3cbfbbf28b2487d3b3f409eb09098d6b0a7d0db7_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g3c5d4422fa68d78b49c9af58a54e5b913fa6ea5cbcb0dbdb9e192d58d6e500f5f279ea47d5563ee03c01015d367ae19fb13aabcc161d4b6b7b10116bafe72fbf_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":1607772,"views":25089,"downloads":24808,"collections":1,"likes":142,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7529353,"pageURL":"https://pixabay.com/photos/marsh-sandpiper-bird-animal-7529353/","type":"photo","tags":"marsh sandpiper, bird, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/06/15/marsh-sandpiper-7529353_150.jpg","previewWidth":150,"previewHeight":126,"webformatURL":"https://pixabay.com/get/gcd97fecfca645dd8b1a9cebded215d1c39e49dc51f1a0a2fd34774475d1ab7fdf2bb3ef29f4ae86bcaccddede5597167ac95332f8ba3ad90f9b45126b3c5b5fc_640.jpg","webformatWidth":640,"webformatHeight":538,"largeImageURL":"https://pixabay.com/get/gd185b3dac375394e4565153fe521230faf4db6f8bdf85f9b32e232222fdf97e1742403a5b9199259d2edfdff8a92a2581c23bcb8c5b69869baedd3045e86ed1f_1280.jpg","imageWidth":3553,"imageHeight":2988,"imageSize":878382,"views":6347,"downloads":6280,"collections":0,"likes":54,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7518551,"pageURL":"https://pixabay.com/photos/crane-houses-architecture-cologne-7518551/","type":"photo","tags":"crane houses, architecture, cologne","previewURL":"https://cdn.pixabay.com/photo/2022/10/13/08/01/crane-houses-7518551_150.jpg","previewWidth":101,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g993b2fdea86dde497412b4fe40b136c4799325e75543b02fdfc5c1e7e8718275d2fef5f6fa3334ecfa65924da071a3720a4280d453a0fc015ebf2611d29cb3a5_640.jpg","webformatWidth":433,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g14378c6727d12dbac081c64d4290be22e4d43bb66fb5db709f87ad92483ea889a7b1137cdee9ca40375bd4e9c1464f7b1ec7c2bfd0ebf95d7df43b80d2bb454f_1280.jpg","imageWidth":4000,"imageHeight":5915,"imageSize":7627355,"views":17098,"downloads":16840,"collections":4,"likes":136,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7534016,"pageURL":"https://pixabay.com/photos/wolf-animal-wildlife-hokkaido-wolf-7534016/","type":"photo","tags":"wolf, animal, wildlife","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/04/07/wolf-7534016_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g7d3051e33c467e004ba5d550eb20197f202e1ed000294ceab12fe9e99e18e2ef67180f349851953ccaab68c256f75b2630671f08c5cd2a10f61480d4e5e1d8e1_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gbf411a931e25a8cab59d8f9fab36d07a9c270ad6dfaf33e9c212c340199b14ea02ea2d988d790479f2d9288f08cd0dd62c664be0033dcf91b0dcd2e5c24c8fd0_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4834627,"views":3906,"downloads":3852,"collections":0,"likes":52,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7537179,"pageURL":"https://pixabay.com/photos/pumpkins-white-pumpkin-vegetable-7537179/","type":"photo","tags":"pumpkins, white pumpkin, vegetable","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/14/17/pumpkins-7537179_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g8d2ebf9e8eb68407c57c2412ee47900c32087c1084d287f0bac82ce741aa8bace110d0034db92d04a267fcb135a9e30fba27b8a7a37f73df2697e9f9261764ae_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g44a17ce524dba84d0cedc5f52d46b316337b88f9f58e273975e11a47d547d6cc7875bc9eaa4132d3647112bd6b0094583c975ab70d1162bc2465e12e401d51a7_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":5482678,"views":559,"downloads":530,"collections":0,"likes":35,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7529927,"pageURL":"https://pixabay.com/photos/lion-african-lion-white-lion-animal-7529927/","type":"photo","tags":"lion, african lion, white lion","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/11/13/lion-7529927_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g953d20e41c4dfc967bbc51ea7e409dc7123eecd19c7ded93a0ad7cd65e2c33649a0c0426a80b84a6fc9911fe1d0d54fb87fc0bb2c75b9fd664c5b5e38794492b_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g7bd4a8eec7a9c44f4307f2f19021415d16b130e8ff0285e60eeccffb5b2100c36ff59f9388a439dc83b3236c3a4e6adad24cae252d39d5150d0eb571db3ad054_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":5690274,"views":6623,"downloads":6488,"collections":2,"likes":59,"comments":64,"user_id":3698690,"user":"Marjonhorn","userImageURL":"https://cdn.pixabay.com/user/2020/10/31/14-11-24-484_250x250.png"},{"id":7535876,"pageURL":"https://pixabay.com/photos/round-table-king-arthur-statue-7535876/","type":"photo","tags":"round table, king arthur, statue","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/23/10/round-table-7535876_150.jpg","previewWidth":150,"previewHeight":114,"webformatURL":"https://pixabay.com/get/gc1f3b796fda580ef809aa97788d8508c1c02ddabab4cbf297490df66291528d76a54dc8ce3bab0711b957b33020d036a0262bf3a1967585eb3c27a2fa4f675c1_640.jpg","webformatWidth":640,"webformatHeight":485,"largeImageURL":"https://pixabay.com/get/g734a101bc333c8cfbc42c92ef057bec306c63f6c60af48c30db102a0ccde8d2088adf65a004048b901fd3afb454d6a3c635e35de7edb8a74c590595ef7a9cd4e_1280.jpg","imageWidth":3867,"imageHeight":2933,"imageSize":3655680,"views":509,"downloads":482,"collections":2,"likes":35,"comments":25,"user_id":7068951,"user":"ykaiavu","userImageURL":"https://cdn.pixabay.com/user/2022/03/01/18-49-57-752_250x250.jpg"},{"id":7532815,"pageURL":"https://pixabay.com/photos/marigold-calendula-officinalis-7532815/","type":"photo","tags":"marigold, calendula officinalis, raindrops","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/15/19/marigold-7532815_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gf431ac628067dcb7763fffb43df2983af06e6f9cd4f543fcf42e1f06cee175b7877c5379697e7a2782f349eca4ca298533e90925b19ad624fa1b094f1cefc5ec_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g1f80c2ad7301afbf3c5eab08017c03e7d2ed319d8dd15b9928ab4a904ef847f659fd37b4b15259005a1ed84033529e3df51aa1885dca49272627e693585c57ad_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":2749750,"views":2587,"downloads":2510,"collections":2,"likes":55,"comments":40,"user_id":10084616,"user":"Nennieinszweidrei","userImageURL":"https://cdn.pixabay.com/user/2022/03/12/15-57-22-761_250x250.jpg"},{"id":7531013,"pageURL":"https://pixabay.com/photos/carnation-flower-plant-garden-7531013/","type":"photo","tags":"carnation, flower, plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/19/34/carnation-7531013_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g77faffcbba84dd32e0979e3d9bb076f4dc1ec1bb6bcbaf34e7ef591d5e1c2925350aaab51563426349f58933649a118f79eac638522cdd96757a5f07c8e5d06f_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g2e08c9342f30d88f9cb0291dad3e389b903d2269d4c40b32bc6db8d50b5d0714db5dd5efb0511b077a9ed0d59d44e76e1d820c07c2f97e30d886e8bb70feee76_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":2754519,"views":6270,"downloads":6153,"collections":0,"likes":66,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7537226,"pageURL":"https://pixabay.com/photos/pumpkins-orange-pumpkin-vegetable-7537226/","type":"photo","tags":"pumpkins, orange pumpkin, vegetable","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/14/30/pumpkins-7537226_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gae1dc020187c366cf3b232859c90e74220b14eb215a176e4bce0ba0584a99ce57d5ecdf2f5940ebcd0e5a9ba6ccac2daaca3cd97203b4da1ca626298ae9371a1_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g62200fa999390a610640c3d7b14186db3143e530962f194c31eb04e0f89e066890517d0757dfa7b0494b697afac1318722f956db7cb7fb3856922128af2813b9_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":5631163,"views":498,"downloads":472,"collections":0,"likes":34,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7522627,"pageURL":"https://pixabay.com/photos/mushrooms-moon-autumn-night-7522627/","type":"photo","tags":"mushrooms, moon, autumn","previewURL":"https://cdn.pixabay.com/photo/2022/10/15/07/12/mushrooms-7522627_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gc9a81b1ed4158263657e2a222fa53592d9e5af13a8822d5516a19c5a887b6c62f58e3123ee86ea8676a2ea34fad515f694c60e0ce017fc1aa01bd62354991256_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gd1bba66cf4243243c1225d8b5fcf9627751883ec4b45ede2855d81e37f55c37e0bd346ab2d79b7ecc3ff1b036790f13d9998b14910dcc904e61c308bf311d808_1280.jpg","imageWidth":7087,"imageHeight":4724,"imageSize":2768202,"views":20113,"downloads":19670,"collections":11,"likes":105,"comments":60,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7537746,"pageURL":"https://pixabay.com/photos/goat-horns-fur-animal-portrait-7537746/","type":"photo","tags":"goat, horns, fur","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/18/07/goat-7537746_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gc94ca6070af873a7e2af76878fa7e750d84cf6afede584adc07d7043d1d2964ada182e61e0c4813ca2f09751ff259d28d51fa3d3700988a96fc9f0c4c5a2f67d_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gb5293f2597204e3518491f86d0da36eb5ca1d3b30a9db6e3c7ea520b4d147f1564afebc3f13d1f47999f973cbe4c2214efe861beb3ff7781696eb14c0bfc2165_1280.jpg","imageWidth":3936,"imageHeight":2624,"imageSize":2918009,"views":564,"downloads":530,"collections":0,"likes":23,"comments":12,"user_id":87167,"user":"fotoblend","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/15-08-54-559_250x250.jpg"},{"id":7536796,"pageURL":"https://pixabay.com/photos/blossom-bloom-flower-iris-plant-7536796/","type":"photo","tags":"blossom, bloom, flower","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/11/05/blossom-7536796_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gdec495dc4d6132e9774993652cfb5db243423c1d95ddf60e0ee0b9ae1f1da77e7aa4ed4232657a98bc2f3b4e0be4e68e1a8cd0ef4e3271ede848021fd43a9868_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g1461ce126cbcc19bccc8ab0ea00758ee54c86efd8aa5e851ad203bca646a375ad2ac23b176460c9096181a14c210e9f1cb36f1c00c077f35f922310b0460f545_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":6511828,"views":381,"downloads":354,"collections":0,"likes":23,"comments":11,"user_id":3238642,"user":"Georg_Wietschorke","userImageURL":"https://cdn.pixabay.com/user/2019/11/19/05-40-55-369_250x250.jpeg"},{"id":7539275,"pageURL":"https://pixabay.com/photos/verbena-real-verbena-medicinal-plant-7539275/","type":"photo","tags":"verbena, real verbena, medicinal plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/13/45/verbena-7539275_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g2885d39f8a2058788345ef2dbf926801657c30393e81094ee5b7ad1ca0701dd41b8942082d72bf2767fd778d646a5b096d97e4f7a8ae1bf092d00013fe4c9501_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g40dead0e7f677066ae446d696f442a1d69064ad86410b7f78793fc0ae877a7cd84b44f9a7e0ecab0f58add531ac06a8c286f64e101f5bfbec0ee9def94d06942_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":2847542,"views":464,"downloads":425,"collections":3,"likes":28,"comments":17,"user_id":10084616,"user":"Nennieinszweidrei","userImageURL":"https://cdn.pixabay.com/user/2022/03/12/15-57-22-761_250x250.jpg"},{"id":7540762,"pageURL":"https://pixabay.com/photos/european-hornet-hornet-insect-wasp-7540762/","type":"photo","tags":"european hornet, hornet, insect","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/08/30/european-hornet-7540762_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gd0a940260cba42ddeeb2beb0cf1a9f5ce3dc1c3b363ff8921b7b68f4ecec8389ed2c2e033aca5e9d3c3c7ce06fa4c15d807130134f3cfb75f13fd622cee197cb_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g445375902cb34c31474b244ade7bfcdf689711f62fd18201371b009b66b7674cb16bc7ff93601503f5075386e7e02805b010b6609c32aed149635a98505b8e45_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":2708823,"views":137,"downloads":120,"collections":0,"likes":23,"comments":0,"user_id":1767157,"user":"Ralphs_Fotos","userImageURL":"https://cdn.pixabay.com/user/2022/10/22/05-16-16-200_250x250.jpg"},{"id":7533098,"pageURL":"https://pixabay.com/photos/nature-wallpaper-park-fall-path-7533098/","type":"photo","tags":"nature wallpaper, park, fall","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/17/11/park-7533098_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gfa5a2cf3612b949cb2d87ab0546284ef263d35056ccc64d2bf8c8180704f393d68eb69b348688ea2027bfa31a06e12f71a2003a8c137e9b610e9c736e346c79e_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g01f302c4b097d7041fe6284af508b0817b898de02e44145726b93a188e9e2d3cf7b34df9da33e3230df3b7decd034328108d1852d7479bae772ca1dd1caacc67_1280.jpg","imageWidth":5000,"imageHeight":3333,"imageSize":7796339,"views":3332,"downloads":3232,"collections":2,"likes":36,"comments":15,"user_id":7998824,"user":"jggrz","userImageURL":"https://cdn.pixabay.com/user/2022/10/21/09-43-52-779_250x250.jpg"},{"id":7501470,"pageURL":"https://pixabay.com/photos/hyacinth-macaw-hyacinthine-macaw-7501470/","type":"photo","tags":"hyacinth macaw, hyacinthine, macaw","previewURL":"https://cdn.pixabay.com/photo/2022/10/05/20/43/hyacinth-macaw-7501470_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g67a5cd8e7527e43c4647ef6426fe4d00f11199838873d0229f33fc53f6f85a0aec97bee295075ce25182ccb15112d2f3eaa5ab99c372746af95ce4331e4c47a7_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gde399b45820f365451460d13a7eb822054c3d8f118fd6d8d10f771a400536acfff7b1c3be6570464b52bfdf35fa499c425403a7323d41d1582f8327bd767534b_1280.jpg","imageWidth":3000,"imageHeight":2000,"imageSize":1329659,"views":35090,"downloads":26337,"collections":48,"likes":151,"comments":61,"user_id":25467781,"user":"sharkolot","userImageURL":"https://cdn.pixabay.com/user/2022/10/10/19-39-18-33_250x250.jpg"},{"id":7535384,"pageURL":"https://pixabay.com/photos/leaf-dry-sprig-dried-leaf-7535384/","type":"photo","tags":"leaf, dry, sprig","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/17/36/leaf-7535384_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g8216938686cb29efbe79c52047d442d9253610d812a47d8f5ccbd243d7b7eb1dbac06815eefb86432a1c350db1257b14f0261b8be854e09edc3a5b6b196d6ecd_640.jpg","webformatWidth":640,"webformatHeight":428,"largeImageURL":"https://pixabay.com/get/g15a346328e4fe6d2b29d9ae9855a9928b46027d7af8b07f1e9651592a9b5aff358a0d3d0dade63b825339cfdb99e92a1733dd72884573ab517250020f9641faf_1280.jpg","imageWidth":5635,"imageHeight":3767,"imageSize":2426225,"views":737,"downloads":721,"collections":1,"likes":29,"comments":21,"user_id":6355831,"user":"pasja1000","userImageURL":"https://cdn.pixabay.com/user/2021/02/06/02-19-29-704_250x250.png"},{"id":7530478,"pageURL":"https://pixabay.com/photos/sunset-lake-mountains-heaven-7530478/","type":"photo","tags":"sunset, lake, mountains","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/14/47/sunset-7530478_150.jpg","previewWidth":150,"previewHeight":75,"webformatURL":"https://pixabay.com/get/g06eed800a0e89efcbbd24e76e84b187f997dfd14f4e443c7b6160dfcbee202528398759c6783b93b13f08d07195cb8594f7f2b7481f5f70050b4cb02d26cac5d_640.jpg","webformatWidth":640,"webformatHeight":320,"largeImageURL":"https://pixabay.com/get/g079dc8f32982bf2d6c40b41826516c36bb09a84160321f725e3c17b22ba7fcfd5bd8140286922e2a2740cb1f80efe81fd4f3bc15cf02d090f4b755767eacd966_1280.jpg","imageWidth":5966,"imageHeight":2983,"imageSize":1766973,"views":8481,"downloads":8319,"collections":7,"likes":57,"comments":40,"user_id":1425977,"user":"ChiemSeherin","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/09-31-00-469_250x250.jpeg"},{"id":7530479,"pageURL":"https://pixabay.com/photos/sunset-lake-heaven-reflection-7530479/","type":"photo","tags":"sunset, lake, heaven","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/14/47/sunset-7530479_150.jpg","previewWidth":150,"previewHeight":60,"webformatURL":"https://pixabay.com/get/g3ef0d697c09fe815695895913beb42ecbc0e591cd827170ccd71bfbf599e798a19d211c4310f2f3a350fa8bfc6046d2a7963c27024e94f5387b4ff886712998f_640.jpg","webformatWidth":640,"webformatHeight":256,"largeImageURL":"https://pixabay.com/get/g321e39ab8e05e6b8de7044a3dc1fc0de8bbcf848eecec98dd2ce7231079a78df400da3c3ef4187afb28c939d7639c89909b68354b81049bdddf266ee28d8d26a_1280.jpg","imageWidth":5947,"imageHeight":2379,"imageSize":1700297,"views":5657,"downloads":5538,"collections":5,"likes":57,"comments":39,"user_id":1425977,"user":"ChiemSeherin","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/09-31-00-469_250x250.jpeg"},{"id":7532813,"pageURL":"https://pixabay.com/photos/goat-horns-goat-head-7532813/","type":"photo","tags":"goat, horns, goat head","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/15/18/goat-7532813_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g585367f683a7306188d5ef63ebf5571ded8c83ccb65e00e4044843445d0169dbaa48b5238968e2e41e0229ab1a4c03f0b1c6323ace869ab8be1a3c29f554217e_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g34d23736f116eaa49de3b719f3410b31c863cb0d8da3e0c1385d405d3e317ffa7c73d3bc3f541213ce21a3e60cb3a7e4e51840d1c72177da2a8836dd8e8b556c_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3772215,"views":2504,"downloads":2437,"collections":1,"likes":53,"comments":34,"user_id":10084616,"user":"Nennieinszweidrei","userImageURL":"https://cdn.pixabay.com/user/2022/03/12/15-57-22-761_250x250.jpg"},{"id":7539273,"pageURL":"https://pixabay.com/photos/bee-insect-aster-honey-bee-7539273/","type":"photo","tags":"bee, insect, aster","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/13/45/bee-7539273_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g6e9db0b4daa40967258badbdda8cf4d4f026453973cf3e4a63f4faa51204b2b3a5a15df3ff3fcbe9c4908980c767beb9b495e6d5d57a37155cd4ff82581395ee_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g098def6fdee18e74440ef200fe245ba7a820f1b8f19807f98ea9e1a8f185734893674c029c077ad98af57865b920577e8d1f51dadd663fbd61505ba38907ab1e_1280.jpg","imageWidth":6114,"imageHeight":4076,"imageSize":2635328,"views":357,"downloads":335,"collections":3,"likes":27,"comments":16,"user_id":10084616,"user":"Nennieinszweidrei","userImageURL":"https://cdn.pixabay.com/user/2022/03/12/15-57-22-761_250x250.jpg"},{"id":7539597,"pageURL":"https://pixabay.com/photos/the-needle-mountains-beach-7539597/","type":"photo","tags":"the needle, mountains, beach","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/16/47/the-needle-7539597_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g82f8b0f0af89d3fe08c9d42461ccf7def09aa40e0bb1a1c607d97df293aac6d09230237245c3e709e84d7637255f55e418dce596b4227cd7acbc2859d6cb2bc3_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g02e2d2fbbb6b15f908b1588b661f87c85325806acf67215b6768046c2976bea6c0ed4744552ce9f0eb7b758e0bfe5df830afd58ad002193ae26b6a85b26d1a29_1280.jpg","imageWidth":4016,"imageHeight":2677,"imageSize":2683121,"views":439,"downloads":408,"collections":3,"likes":27,"comments":14,"user_id":16096197,"user":"Camera-man","userImageURL":"https://cdn.pixabay.com/user/2022/03/01/11-08-12-943_250x250.jpg"},{"id":7540256,"pageURL":"https://pixabay.com/photos/sunflower-flower-plant-flora-7540256/","type":"photo","tags":"sunflower, flower, plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/01/03/sunflower-7540256_150.jpg","previewWidth":150,"previewHeight":101,"webformatURL":"https://pixabay.com/get/gb01fb4064ba188a0f16891b97dfd357f7901b2b5d90acf216b85f8c4b34eae4a5e246edae7899f4cedc5b674933520bb388536151502231602dec20506b072e6_640.jpg","webformatWidth":640,"webformatHeight":429,"largeImageURL":"https://pixabay.com/get/gb71a0fde480f830676ae49b172e1870e8a5d07aca023e4e5d77134465468cf06d19b1634ad1f35e50dcc24d55fcd4f0b58dce3414c21e738383bef1864e895e1_1280.jpg","imageWidth":9667,"imageHeight":6481,"imageSize":9486406,"views":296,"downloads":270,"collections":4,"likes":20,"comments":12,"user_id":21428489,"user":"ignartonosbg","userImageURL":"https://cdn.pixabay.com/user/2022/09/24/03-57-39-85_250x250.jpg"}]} \ No newline at end of file +{"total":1341204,"totalHits":500,"hits":[{"id":7525456,"pageURL":"https://pixabay.com/photos/squirrel-wildlife-mammal-animal-7525456/","type":"photo","tags":"squirrel, wildlife, mammal","previewURL":"https://cdn.pixabay.com/photo/2022/10/16/16/13/squirrel-7525456_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g80eb176b16ee65b1791f2b3a559d6d919248e916e911abf4da9ae29d5d513d674422ddae8bcaae0b2be1bded45c7d35b0e372d758cc64edd377d68d876ecc8e7_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gde64c685c38de01701429e57f647887c8663cd2a22c48a27f4c0a622f3d000092f744aa1bc231c76e95273ce77a0506769fc6ef7b99bc427bb5cf8856f70a600_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3342691,"views":11135,"downloads":10850,"collections":3,"likes":80,"comments":0,"user_id":1767157,"user":"Ralphs_Fotos","userImageURL":"https://cdn.pixabay.com/user/2022/10/22/05-16-16-200_250x250.jpg"},{"id":7538921,"pageURL":"https://pixabay.com/photos/happy-mothers-day-ribbon-flower-7538921/","type":"photo","tags":"happy mothers day, ribbon, flower","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/10/49/ribbon-7538921_150.jpg","previewWidth":150,"previewHeight":99,"webformatURL":"https://pixabay.com/get/g21890eeae1613ef093521b195b4cf78a0afc9595a98ada429067a2b1f831d6f94d6c5fae4173a7d312c7662271b2e8e6893aeeaca5fc1e5e1eb072a7b6e6ef20_640.jpg","webformatWidth":640,"webformatHeight":421,"largeImageURL":"https://pixabay.com/get/g4952ea160de71f4360dbe7d0c5fce53431f4fc8ffa36d2c2f56753f85badb609d77a5643d8edec74058b2976568c29ff68a86657d45644a4d16f8d6ac0f18712_1280.jpg","imageWidth":6000,"imageHeight":3949,"imageSize":2137124,"views":4845,"downloads":4778,"collections":5,"likes":77,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7538798,"pageURL":"https://pixabay.com/photos/bird-warbler-flowers-spring-nature-7538798/","type":"photo","tags":"bird, warbler, flowers","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/09/12/bird-7538798_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g40aacb3cdf661b14fea3f93b9800dd7b454204ddf2e944bba7c76538b468fe15ac92eb26c211951d7245d09eb43ed1b1f0896c8fc220cc5cec2b7249fd119db1_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g8c8acc1ddafd6b6eb8738b453025c8aca1d680984fb1d57a0adb74449569ae62161173198d48e019264dcd913228c0d01d03a95edf9559ba09ce0fef9ddea01a_1280.jpg","imageWidth":7087,"imageHeight":4724,"imageSize":2717329,"views":4216,"downloads":4078,"collections":8,"likes":69,"comments":35,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7525450,"pageURL":"https://pixabay.com/photos/bird-ornithology-sparrow-sperling-7525450/","type":"photo","tags":"bird, ornithology, sparrow","previewURL":"https://cdn.pixabay.com/photo/2022/10/16/16/12/bird-7525450_150.jpg","previewWidth":150,"previewHeight":98,"webformatURL":"https://pixabay.com/get/g72a1ad6ad6413e615be03336f697a9488af1d3466a126db3273b7bdc57d3713374513cfd8679b34646018a13a5df91127272d8c9b25c650a6811e844b5d005ba_640.jpg","webformatWidth":640,"webformatHeight":418,"largeImageURL":"https://pixabay.com/get/gc7d3561bd006b87be0303368c5c1561d1092dabae92490f53d8543d8fb1180eb8b2e8cabe12118eab16751e63e743f731b83770a0858681b9392ea70910389a1_1280.jpg","imageWidth":5452,"imageHeight":3562,"imageSize":2037507,"views":8918,"downloads":8780,"collections":1,"likes":70,"comments":0,"user_id":1767157,"user":"Ralphs_Fotos","userImageURL":"https://cdn.pixabay.com/user/2022/10/22/05-16-16-200_250x250.jpg"},{"id":7535373,"pageURL":"https://pixabay.com/photos/buildings-panoramic-alhambra-7535373/","type":"photo","tags":"buildings, panoramic, alhambra","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/17/27/buildings-7535373_150.jpg","previewWidth":150,"previewHeight":36,"webformatURL":"https://pixabay.com/get/g8674c63e2042f324b00bc4050898c5ca9f9a11e96aa175ada2ae397e3b582409cd0e8b164201247edb29f294ccb72b2d8fd35b60f6f5e9f31362cb51ad114553_640.jpg","webformatWidth":640,"webformatHeight":153,"largeImageURL":"https://pixabay.com/get/g9e632d5181439db818e20729d5d928eb1021920ee3afcf6f6ff2f99529fed5ed66d4b707b74475d7a609fe5809711a2cdfdb9ff6b83e69bd78b6b4de1f706516_1280.jpg","imageWidth":17717,"imageHeight":4248,"imageSize":13504559,"views":18399,"downloads":17884,"collections":7,"likes":102,"comments":62,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7534081,"pageURL":"https://pixabay.com/photos/fork-tailed-flycatcher-bird-animal-7534081/","type":"photo","tags":"fork-tailed flycatcher, bird, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/16/fork-tailed-flycatcher-7534081_150.jpg","previewWidth":150,"previewHeight":66,"webformatURL":"https://pixabay.com/get/g450234f70f840ec812c3f8ab16843b1530ac67bcfb30f0f7bd2884b4a018eb7db061bb3991894516fac7e0702b2ab0a67651233283267fe9e4e81a7c26b03714_640.jpg","webformatWidth":640,"webformatHeight":283,"largeImageURL":"https://pixabay.com/get/ge650323ad951204e2b738ac00bf5c3b93a9190a8ee4864b632c79a4af53a84b9d82b9cc04032bc4fd56f976f63f6532e61fdcfa3efe2eb5b1f06004be3336cb4_1280.jpg","imageWidth":4600,"imageHeight":2035,"imageSize":512450,"views":12679,"downloads":12570,"collections":2,"likes":73,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7525451,"pageURL":"https://pixabay.com/photos/squirrel-wildlife-mammal-animal-7525451/","type":"photo","tags":"squirrel, wildlife, mammal","previewURL":"https://cdn.pixabay.com/photo/2022/10/16/16/13/squirrel-7525451_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g2e0c7c48df438c52e85f9c011c6d93075acbfd1d53a65dba148d7060d6c2800ad90f84d6243627747b81a2e9daf5460a203aec678b619dd03187c0a80ef302f4_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g3ac469243f7e2042e80f321614bb03374fee4fc22f4569acdb5b57a08743c4faf3e2a05b0274ab4317555e0065b47f9d527ee005c3324923c53ab252e2a4649e_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4494216,"views":4773,"downloads":4658,"collections":0,"likes":67,"comments":0,"user_id":1767157,"user":"Ralphs_Fotos","userImageURL":"https://cdn.pixabay.com/user/2022/10/22/05-16-16-200_250x250.jpg"},{"id":7535359,"pageURL":"https://pixabay.com/photos/sunset-sea-church-port-people-7535359/","type":"photo","tags":"sunset, sea, church","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/17/21/sunset-7535359_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gbc0e4160268ca63ba6e73b38ab71ba7b3af24e22ecd0ed8c2158c00cc82ad16afcb265540c555e6933dcd8e918fe0728fa8c180088a428677af9bd29fbb3f413_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gd5a19bbdf87db35c2b346d8b4a239b0e551c3a42285645468347dc2a96021e723202ad49a2bc356dae0c505ebe54331004c13e08e76a0a9e5d5c83db72cc996e_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":3584422,"views":15541,"downloads":15136,"collections":3,"likes":100,"comments":51,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7532068,"pageURL":"https://pixabay.com/photos/apple-water-droplets-fruit-wet-dew-7532068/","type":"photo","tags":"apple, water droplets, fruit","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/10/08/apple-7532068_150.jpg","previewWidth":100,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g4536120ca82f828ff270a1dd78249c22f9aca6cfee5416b3eb4e0e362c15a3a1d0a4cd2548935eb5d90d33633c664bedf9958946b07d77aa8645d0064dcc8aee_640.jpg","webformatWidth":427,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/gb6f8a6686766f56cb9806527c7dbb80d6207fa4d3ccac398d6664f441785c3015db105628cebb5b8c0986c8d48dc74f77549c578fb9e3d6bb8b30c88aa3cf84f_1280.jpg","imageWidth":4000,"imageHeight":6000,"imageSize":4432326,"views":13946,"downloads":13904,"collections":1,"likes":100,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7538941,"pageURL":"https://pixabay.com/photos/pumpkin-vegetable-harvest-fall-7538941/","type":"photo","tags":"pumpkin, vegetable, harvest","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/11/03/pumpkin-7538941_150.jpg","previewWidth":100,"previewHeight":150,"webformatURL":"https://pixabay.com/get/gd7969dbe5ab893912a69645e86fdc9ab6e3a9596e08b5fd8f3d6bed0f843f0439cb60e1fe31bf8b23543aa9fcac9f4b3e20dd45c87b9c2d06db064cc85f93da4_640.jpg","webformatWidth":427,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g656e39a6fbc147302b49bbbe4b57c2b3592393695cf4d237e8bf7fcb16cf8c1acf8d97d91cce079cabf70d0e813d28ae93dcd0c2cb01d7b7871bfaaf8d81f260_1280.jpg","imageWidth":4000,"imageHeight":6000,"imageSize":2880257,"views":2469,"downloads":2452,"collections":0,"likes":59,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7535427,"pageURL":"https://pixabay.com/photos/border-collie-dog-pet-animal-7535427/","type":"photo","tags":"border collie, dog, pet","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/17/57/border-collie-7535427_150.jpg","previewWidth":150,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g3ddfd665ff5c827113b4cb1e840b890402b846e3a1af54878f5576d41edd1cf4697b8cb84373ff6ef59475fd3c95948b9392baf88d93697121b41bdd34f51cf6_640.jpg","webformatWidth":640,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g94de02c2e03231b2f2ac82ef5f231ee4a43b90c8007b87833d811ea56d402c267d9c1d35bf7f9ea7f6720ffc578bd6c51bc48f6ebf178b8577f7a7ebb4e90e6c_1280.jpg","imageWidth":3000,"imageHeight":3000,"imageSize":1995798,"views":6922,"downloads":6816,"collections":1,"likes":79,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7537352,"pageURL":"https://pixabay.com/photos/pumpkins-orange-pumpkin-vegetable-7537352/","type":"photo","tags":"pumpkins, orange pumpkin, vegetable","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/15/10/pumpkins-7537352_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gcec58e5cc9a04380cbcfe0e71b951c889ba785b51de0fac4556e7933c951bf0e651e7dc8a2024f9973a921e1798cf6a5b477ebedb567a34716735eca682a3ae8_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g38a8d9729aa1d45489151d5f02620eb561f18d5eda0dc54daf9dd823c17e9db1c03ebe694d4fb2c7ec971c39ae3e579db6f47e3e81a781ae2610d71b8c25a6f5_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":6799257,"views":4054,"downloads":3966,"collections":0,"likes":57,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7534071,"pageURL":"https://pixabay.com/photos/dahlia-flower-plant-yellow-flower-7534071/","type":"photo","tags":"dahlia, flower, plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/04/dahlia-7534071_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g9d3ea755cc4e6cfd26bc90814fa8d310ef7ad82258fb027bcc49ce5074be392843a1ee90fa4b664f85dedc0eda4d8c658df590696d9fca0a257f2d6d223e7ea8_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g12405b2b763ae7ee27caa6c9e35328b2deb6396bf4219f0ba3de4ff292c62bd632d6b2812613f32eca46a59f1d6f008742188313d13b8d16557a704626e45879_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":3066207,"views":7427,"downloads":7311,"collections":4,"likes":83,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7536603,"pageURL":"https://pixabay.com/photos/great-cormorant-bird-7536603/","type":"photo","tags":"great cormorant, bird, great black fish-eating bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/09/19/great-cormorant-7536603_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/ga22dd4a6436a50cd32725eed83f1a129631a79fc47b82887704d150a510a1938b69accd9c6d927ec3854aae91c6e691719b6e34324ff8d7025265b71d959433e_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g7b56bcb8d0883fdd7e36d57d7519861f437edc3e5d0e8b77fbb444ab843074e3c5e407195501915a32be89de25a6146ae7b5f6cafef45645779d7e355f3e6dcf_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":4454408,"views":3938,"downloads":3868,"collections":3,"likes":44,"comments":24,"user_id":14802912,"user":"dendoktoor","userImageURL":"https://cdn.pixabay.com/user/2022/09/08/19-19-09-260_250x250.jpg"},{"id":7536157,"pageURL":"https://pixabay.com/photos/bighorn-sheep-ram-animal-wild-sheep-7536157/","type":"photo","tags":"bighorn sheep, ram, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/04/25/bighorn-sheep-7536157_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gd906c070db9436182c7ca26b983d6c2c56037c173236fda818d6dda4b04e8cc5e447a60fa89650a8063c76bc9e8b4f2fc60616f0352120d5154e56d596c05a65_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g9fb45b98a53068a5cc9b77dac136206340c0a7e59936a10c03dddd529c29777240537566df2796b9b0529aceba382bcf8e4f013b63ad6b76534e82ecc0b824f0_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4756942,"views":4061,"downloads":3977,"collections":0,"likes":64,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7540499,"pageURL":"https://pixabay.com/photos/maple-leaf-autumn-fall-autumn-leaf-7540499/","type":"photo","tags":"maple, leaf, autumn","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/05/04/maple-7540499_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g5807d333c124af33a4936b032862f9762ebeb0f8c9166d1fcbac81447ffaa6a7273b3c171369d5fbf8c95bcb689782e80f1cf965b8c5f04dad4736e3d1a76351_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gb6efd9ff3ab0679a349febebb22bda0a1134575417c963200a19f0211f46ece93d4652dfc3cf5c2f3fc32fdb847c5adc99ad4b83f641e83237b3a4ddf811eb5e_1280.jpg","imageWidth":6031,"imageHeight":4021,"imageSize":4704484,"views":1190,"downloads":1103,"collections":1,"likes":53,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7534072,"pageURL":"https://pixabay.com/photos/bank-leaves-fall-park-nature-7534072/","type":"photo","tags":"bank, leaves, fall","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/06/bank-7534072_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g66f86389d264610e711b492eec4904fcc01b360811e59373e11fbea4ce8ce2d87430a777438b5d33d5e08e6a964a784bbff9919c69afa73efe864e4f4117fb7f_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g14ec388bde41bcd4071416541e5c4483699d1c5bb204533bd3cf30ed313abe00d8acbce56cad3c6f7993bf010580ef05633465e77c5ac76117630fdbc9f6c93c_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":5829303,"views":10742,"downloads":10499,"collections":3,"likes":88,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7534063,"pageURL":"https://pixabay.com/photos/pink-flower-dahlia-flower-blossom-7534063/","type":"photo","tags":"pink flower, dahlia, flower","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/04/54/pink-flower-7534063_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/ge84578df92f84b254e512225348bbafe7e87b334a8dd42e40dd7b92d670a7b6e0f011e6d595709703c66da4d4162454ae9c333d7176a02d3df714b8ba17766f9_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g6e2531b172423d58bce8c4767a178117dc93673e34d7d2f6c1b3eeb92cec23392a584fe69fef746b66d8e9a5d55aa9d438b66d866d38f50c2ec0a1dffb5f04db_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":3889698,"views":14297,"downloads":14022,"collections":1,"likes":89,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7534079,"pageURL":"https://pixabay.com/photos/rufous-hornero-bird-animal-branch-7534079/","type":"photo","tags":"rufous hornero, bird, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/14/rufous-hornero-7534079_150.jpg","previewWidth":150,"previewHeight":120,"webformatURL":"https://pixabay.com/get/gc1d735e2681c6fb02fca638305a4bbce556b057527c909819e70218040a5322b7c9c276039601c703711d5d45c542fc2530d293c855159a17d733c9d902dd4f6_640.jpg","webformatWidth":640,"webformatHeight":512,"largeImageURL":"https://pixabay.com/get/g032ebd722a8baac2bda03cc892731b9add814528f7dab8d0757c369525f6826e647744d005421a740a09b46647fcaa689dd1431b063a0cdbe5dcb69a4a53ce4d_1280.jpg","imageWidth":3082,"imageHeight":2466,"imageSize":829922,"views":4438,"downloads":4391,"collections":0,"likes":52,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7536101,"pageURL":"https://pixabay.com/photos/coot-girl-coot-fulica-leucoptera-7536101/","type":"photo","tags":"coot girl, coot, fulica leucoptera","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/02/59/coot-girl-7536101_150.jpg","previewWidth":150,"previewHeight":128,"webformatURL":"https://pixabay.com/get/g9c50d5f364c096a81d5043d2bba53c729cffdaea976a5c3b0b21e1924954ea3ea09da59a1f77a90bcd14af25d7188176551ed90f13b2914bca1a8eccaccf8248_640.jpg","webformatWidth":640,"webformatHeight":547,"largeImageURL":"https://pixabay.com/get/g432c2cb15e83d8bd54112a50932fc9ace2e035d4d6a5fbf71c5950c227beb563b12962c61b5b66eab369c3b3b14148a9f2793d28707c6eb4bc9bbfc188ccdd43_1280.jpg","imageWidth":3000,"imageHeight":2565,"imageSize":611614,"views":1787,"downloads":1747,"collections":1,"likes":40,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7536606,"pageURL":"https://pixabay.com/photos/great-cormorant-bird-7536606/","type":"photo","tags":"great cormorant, bird, great black fish-eating bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/09/20/great-cormorant-7536606_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gedf4c4e4e57b49e0ee3c0da4af614e56277e70bdbf714f62b45e58098994364f5165299cf043ade137cd0e8ecb99ae8165f21708253add75c3d79d7cbd26c8a3_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g9da6cd9b37c3a6886bce65e5919257c3c6a5ef75f877482ad11151874a4142c24a7edc15a0c3a403f7e10735e1a09718cc582fd2e0710801661c6122373c2d00_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":3167699,"views":1742,"downloads":1689,"collections":2,"likes":43,"comments":22,"user_id":14802912,"user":"dendoktoor","userImageURL":"https://cdn.pixabay.com/user/2022/09/08/19-19-09-260_250x250.jpg"},{"id":7540753,"pageURL":"https://pixabay.com/photos/sunset-lake-jetty-mountains-nature-7540753/","type":"photo","tags":"sunset, lake, jetty","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/08/22/sunset-7540753_150.jpg","previewWidth":150,"previewHeight":84,"webformatURL":"https://pixabay.com/get/g80c3d54987a786a449d8585cb249f98dd35c086cc32c10f99ced3ed764bca044fe9e411e4d16a3dda999c0fac79bd12bff68c000748a4ac85c046423a21cd99e_640.jpg","webformatWidth":640,"webformatHeight":360,"largeImageURL":"https://pixabay.com/get/g208030c2f7eaab337d2dcc3b51b75378d09fbd0e3a5d99af6d3c360b661f8faec87c81980140f2dcd7ff696ce40aa2ca7364fdd6501e229085980a3a68bf5f0e_1280.jpg","imageWidth":5356,"imageHeight":3013,"imageSize":2072773,"views":1251,"downloads":1178,"collections":8,"likes":41,"comments":24,"user_id":1425977,"user":"ChiemSeherin","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/09-31-00-469_250x250.jpeg"},{"id":7540331,"pageURL":"https://pixabay.com/photos/carnation-flower-plant-garden-7540331/","type":"photo","tags":"carnation, flower, plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/02/12/carnation-7540331_150.jpg","previewWidth":150,"previewHeight":150,"webformatURL":"https://pixabay.com/get/gc4a6fa22c28c942a8dad209539d608802f1895205fa938debc2a542b3813cc43a7f3d889f8eeef6ed6c842e0fcd70f5d50381a01a0e1a23a39a40a3706b21913_640.jpg","webformatWidth":640,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/gc0f619719194f42644d2c3bff9fe6c6db0ed432eb3ef3a071d637b464ce74c8384b4fe7924ffb27d9ef3bbf570b1d95c841f1ec6f8de72f55078bd419bc976ac_1280.jpg","imageWidth":3000,"imageHeight":3000,"imageSize":1250034,"views":750,"downloads":697,"collections":0,"likes":49,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7532069,"pageURL":"https://pixabay.com/photos/apple-water-droplets-fruit-wet-dew-7532069/","type":"photo","tags":"apple, water droplets, fruit","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/10/09/apple-7532069_150.jpg","previewWidth":100,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g3e7ee60ab925289287efe7d175937275e0b612017e4e53818af8a992382338def1d1739470d0461f9016f1e69764e2af6df32ba21a3223d54bd52aabf17836df_640.jpg","webformatWidth":427,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g417538df1c220432279686a1c52927d016923904169c4389fdf645f872c60824706d338f7ede3616dc984e093617d665f6d6bbdff85395f7f7005b936bb141bd_1280.jpg","imageWidth":4000,"imageHeight":6000,"imageSize":3910891,"views":6724,"downloads":6709,"collections":0,"likes":81,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7525151,"pageURL":"https://pixabay.com/photos/early-morning-sunrise-woman-dawn-7525151/","type":"photo","tags":"early morning, sunrise, woman","previewURL":"https://cdn.pixabay.com/photo/2022/10/16/13/53/early-morning-7525151_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g9c5254445eab618974ca9b66f0e27f6c35a1f1df10a6303d92cba905c6fe4de45f741916c5b78683543a91c74cf2ed575cdc372399e1eb94ab7404046823e21b_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g674c687d392ce7d6156a69197762f24869c719eb40c7ea467b0738851f74b3899e0b32b75366016d0f8f98ba057892e7363ffeff4c1f6feea60a40198b77ca0a_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4495574,"views":56223,"downloads":41194,"collections":34,"likes":86,"comments":13,"user_id":29721583,"user":"\u9cb8\u6d77\u9189\u4faf","userImageURL":"https://cdn.pixabay.com/user/2022/09/08/09-56-51-86_250x250.jpg"},{"id":7534074,"pageURL":"https://pixabay.com/photos/lichen-branch-wood-sunburst-lichen-7534074/","type":"photo","tags":"lichen, branch, wood","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/07/lichen-7534074_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g7534fc87f526be3913c3f32f4123a809a74211dd1cf2ada056c929e72fd9d875215f53f08239557b27a240e83c49ef420cc4563a7f6d174cbbe68fbc65e56768_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g78cdb5a39fb7f37cab91d44ea530c520fec7219733a3c864200f266e6a5146e3cba5c0ed75de541415e686b79f4e44ddced0e9d43ae0e9aa030ef1b20020c478_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":4095499,"views":6425,"downloads":6322,"collections":1,"likes":75,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7532850,"pageURL":"https://pixabay.com/photos/flower-petals-spring-leaves-plant-7532850/","type":"photo","tags":"flower, petals, spring leaves","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/15/37/flower-7532850_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gc0876f533f87d699fb90941246af39624bce122b9288d4d9bd72f250fed7b76b560f03cad86adb2705a3106ba054569069e737f08c1cfc3dcefa1f4b673b2744_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g476afe3c3b24ca502fc97363c5326b61ed2777ff7cbdd3f527d18d1b192e1a7c690bcc4201086c02906537e88de97b4d679a3f09e0b6d63e37d244a3ccc91246_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":3940719,"views":9775,"downloads":9630,"collections":3,"likes":81,"comments":46,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7523894,"pageURL":"https://pixabay.com/photos/cat-kitten-pet-animal-feline-7523894/","type":"photo","tags":"cat, kitten, pet","previewURL":"https://cdn.pixabay.com/photo/2022/10/15/21/23/cat-7523894_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g70235e36155ccde544248ad4bbd53cfcf0672ecf01f778c97bed5489a9dca4310d1c130e114c0d9d897536c3e8733aad958741f8347471dd0edaf2ef4868f69b_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g9ead8a031603aeb6dd58e1d3283e6c8573629e502b7c88845b5afbd7979fd77916df38621a23d41828e21cf5d13229a8ce254860c6596c7328395875702dc08d_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":6180891,"views":53266,"downloads":47086,"collections":31,"likes":104,"comments":14,"user_id":4397258,"user":"FelixMittermeier","userImageURL":"https://cdn.pixabay.com/user/2022/10/15/21-17-48-138_250x250.jpg"},{"id":7535412,"pageURL":"https://pixabay.com/photos/red-apple-hanging-branch-dawn-7535412/","type":"photo","tags":"red apple, hanging, branch","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/17/49/red-apple-7535412_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gaeed893bf9ec72ecf1411ae3c6e4f090467b1567ec2042c2b0519686a1e3ea0c1f285718fd416c507d536fa27938b45242ff0efb63253600f6607faa35b79b1c_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g03f1054c5d6e72eb9362f406a4f6035c712a6a09d7b8809c52da1ba2d4d52d706872b5fc770214aa791721b45287aaae5dc83c8d9e6b956ff79d4b7e3765e10b_1280.jpg","imageWidth":5898,"imageHeight":3932,"imageSize":2509758,"views":5712,"downloads":5605,"collections":0,"likes":54,"comments":48,"user_id":6355831,"user":"pasja1000","userImageURL":"https://cdn.pixabay.com/user/2021/02/06/02-19-29-704_250x250.png"},{"id":7535445,"pageURL":"https://pixabay.com/photos/apples-foggy-morning-fruit-tree-7535445/","type":"photo","tags":"apples, foggy morning, fruit","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/18/06/apples-7535445_150.jpg","previewWidth":150,"previewHeight":103,"webformatURL":"https://pixabay.com/get/g081e6762470cfcd5a32f41d9545dd9531fc3e21e1e9ab16aa593e70bd89a2735679fb9ca8f5f915815b9249f4a1f6aec40261c78ab4f02acde2dca8831d2ecf2_640.jpg","webformatWidth":640,"webformatHeight":438,"largeImageURL":"https://pixabay.com/get/g29b58993aef279dd034f06e7d7a74d5dfad3571338c79421fbf60410206bf265d75747b593bd9f19c86e5087b0d1741f5804a67cedd456bc2cb04924792bfa4b_1280.jpg","imageWidth":4225,"imageHeight":2894,"imageSize":1953969,"views":4092,"downloads":4029,"collections":3,"likes":40,"comments":33,"user_id":6355831,"user":"pasja1000","userImageURL":"https://cdn.pixabay.com/user/2021/02/06/02-19-29-704_250x250.png"},{"id":7535504,"pageURL":"https://pixabay.com/photos/flower-chrysanthemum-mum-7535504/","type":"photo","tags":"flower, chrysanthemum, mum","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/18/20/flower-7535504_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g06499c90ba1b1b7029672dcbeecbf9ee06ea80653a0fbce8e57ea8ec48413f5ac0b6d5cb56b8840b2a8892ab43d7363f3282c68244b2d80480fb95a58fdc4359_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g1415a78aa9dad89aef7ecbeea87486998f19f27d77fd2597c7830b65585ad719947221f698e7326ea2481a949eda2dcfc9937b62d963761850a4f6ebe148a615_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3902596,"views":4416,"downloads":4344,"collections":0,"likes":59,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7532851,"pageURL":"https://pixabay.com/photos/sea-waves-beach-sand-sunset-7532851/","type":"photo","tags":"sea, waves, beach","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/15/37/sea-7532851_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gefcdf89043da4153be8ff0de2746eefb827c42993cbd8d0c995ce8a20d4fafdec84b4aaf49d86279818fac52e2d7f563c4800379322cb38989233acb71e91398_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g6510e550eabb62f04ff938e3d0ad07539d80ecdfa25f15a9f25cd06282507d509c883343067c6a2363dbe15c169fe8134d504de9deb923b15b1803a76951ebeb_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4030339,"views":7913,"downloads":7760,"collections":2,"likes":75,"comments":40,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7537903,"pageURL":"https://pixabay.com/photos/pumpkin-fall-vegetables-nature-7537903/","type":"photo","tags":"pumpkin, fall, vegetables","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/20/21/pumpkin-7537903_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g5535208c92acc415d7b17966adba51736b6b66923cd04b4d458f9f11a76c3a2640437536464568beb86913538fb80db9665dd7481985aef41ca62f000dffe8c2_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gad3acef6c9e9dfce7158085c7da6d15f1b50fc6ef8b0a4971af3264a68e75ae718bc5195d994999cb1e519c36a05f3334673de2eeab0b048aa17c09e0dd9ecf4_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3429771,"views":1495,"downloads":1440,"collections":1,"likes":41,"comments":15,"user_id":3930681,"user":"matthiasboeckel","userImageURL":"https://cdn.pixabay.com/user/2022/04/12/06-48-11-19_250x250.jpg"},{"id":7522713,"pageURL":"https://pixabay.com/photos/castle-vineyards-cochem-germany-7522713/","type":"photo","tags":"castle, vineyards, cochem","previewURL":"https://cdn.pixabay.com/photo/2022/10/15/08/22/castle-7522713_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gf41c1fbf6881abdbf2fce18163fa4435a1f8f1eead01cc45dae773afc5e3fabc09ba0e1a23f29cee03f09a8b8baca4bdaf2153bbaa361919cabbd5f0bb531aad_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gc353959862a9103f0aaf3e6caba1e750d66c573d107912d37437471e5192f63f1dce73ab9615f50c44b0bd795f74fbb811b53d65f0f1316b1152eba140b73b2a_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":5239184,"views":31783,"downloads":31073,"collections":5,"likes":126,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7538368,"pageURL":"https://pixabay.com/photos/bread-food-baked-homemade-biscuit-7538368/","type":"photo","tags":"bread, food, baked","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/04/27/bread-7538368_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gf50bf3294919b7641aa2a9c31c5232242b8d040fd062db2a3f44900e8bcb1acbba9c9d6a6ac05839922f711d6bf9b8688874c98624ce5050658b79cc0a33c9bb_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gc2e54b4a739f807977d678c4490cdd824f64852411fba5ecc02f6583b3c6c04cd063d2dbeed30bdf18198bdcb1de6f4ef1fcaa989f1c88a7ef5fabbe479d099f_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3231661,"views":750,"downloads":698,"collections":0,"likes":42,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7534073,"pageURL":"https://pixabay.com/photos/pied-billed-grebe-bird-lake-7534073/","type":"photo","tags":"pied-billed grebe, bird, lake","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/07/pied-billed-grebe-7534073_150.jpg","previewWidth":150,"previewHeight":107,"webformatURL":"https://pixabay.com/get/gc8bf754f5af84823e1d43816a2cd581118f57e815001cbfbf04bbd5ee4bddf37b0a600ba94a86251ff296069d128c5151d1480ac58a7e8af904fcd05854b1083_640.jpg","webformatWidth":640,"webformatHeight":457,"largeImageURL":"https://pixabay.com/get/gb15a6f793cd7c4b6cfb8db1a48609cfc115d6fb5596fda09ca143f1162fb571ea1b01d2a64ec606c829fcfb81f9c95d199b083bda075cc6c95f4d32563a8a053_1280.jpg","imageWidth":3047,"imageHeight":2176,"imageSize":632828,"views":3287,"downloads":3255,"collections":0,"likes":45,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7530151,"pageURL":"https://pixabay.com/photos/cliffs-lighthouse-sea-clouds-7530151/","type":"photo","tags":"cliffs, lighthouse, sea","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/12/37/cliffs-7530151_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gaeded37518c3aef5e6cc5ac27685bcecc7ffe5ed0e0f2966c116c560e230eeb8d4528938a76887bad687da521b1262cb229d394f7c9a5889d5b160e5bad2a213_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g53fe42d63ac701dc5a2cd982e835d86c0d1dad5325e1d4626a499654b44d1f43e75b1fe9488831d6eab31ce2807ffd98974b15f2cd7cd0663892feb3d808bd8a_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":6270436,"views":19719,"downloads":19259,"collections":5,"likes":94,"comments":52,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7518536,"pageURL":"https://pixabay.com/photos/crane-houses-architecture-cologne-7518536/","type":"photo","tags":"crane houses, architecture, cologne","previewURL":"https://cdn.pixabay.com/photo/2022/10/13/07/54/crane-houses-7518536_150.jpg","previewWidth":100,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g3fb5ffcc0a863af89be9ec19793f0ee8a6ee6a8847f04644e55646e105910a274531d398a394fc983c188dfa812775f6c5f9f26b3937ac287f6937a5a2b86fd0_640.jpg","webformatWidth":427,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g4d8e9eb640767e92b183c7543202ec0932e9cd2c16ab7a6d0a69412088aa972bd822fdc5b5f40946104df0fa75df5b6e45ad1ebbb15ee63747f1e1f7aae3f8f0_1280.jpg","imageWidth":4000,"imageHeight":6000,"imageSize":5301194,"views":49967,"downloads":45405,"collections":11,"likes":173,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7530152,"pageURL":"https://pixabay.com/photos/mountain-cabin-meadows-trees-green-7530152/","type":"photo","tags":"mountain, cabin, meadows","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/12/37/mountain-7530152_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g2a7018a563cedd3a72375f961fff46154cb35e6541cc83171bfc1f25404716b138ffac968bbbe42e42b5f81b384e379636a7eccff0fe22f4306c023238c94901_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g7cd7d0a57cb587d9c5ff23339986d41a759d8bdbe799a36a58d21135800ffe4d6c7a6ff925c6b0430212d8487db11647851d60a866880af7b5bd3f4b40fc71e5_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":10907502,"views":18015,"downloads":17529,"collections":3,"likes":94,"comments":51,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7532076,"pageURL":"https://pixabay.com/photos/water-lake-sailboat-yacht-7532076/","type":"photo","tags":"water, lake, sailboat","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/10/19/water-7532076_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g2cda5533ed5786feb2d8922397345922095d9071c101d7cdfe229c36414778bb046eeeb7f0e5bd901aa7b9587e6a6d0f9a34616e89a49da9c1e5cb00228437c6_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gf21ddb9c77b325a0fb4e7a7be6e078e8f62928cdb77e7ac80fb715c04d9e1ba19cb21b02c3aace6d78497a3817b059de545288fee9c909d2b690f53c61d06e4e_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":9687704,"views":2873,"downloads":2822,"collections":1,"likes":41,"comments":28,"user_id":9363663,"user":"Nowaja","userImageURL":"https://cdn.pixabay.com/user/2020/09/15/15-16-12-52_250x250.jpg"},{"id":7522608,"pageURL":"https://pixabay.com/photos/danube-river-wave-danube-wave-7522608/","type":"photo","tags":"danube river, wave, danube wave","previewURL":"https://cdn.pixabay.com/photo/2022/10/15/06/45/danube-river-7522608_150.jpg","previewWidth":150,"previewHeight":99,"webformatURL":"https://pixabay.com/get/gbfaa0ef22ed86097fb75cdd94c620379c84b250f6f5f6b89ab5ef01d4215edf2dfccb8cb7f3953ef197434ff4f70fc11a252cf36ed585ba5f81246be3db1a741_640.jpg","webformatWidth":640,"webformatHeight":422,"largeImageURL":"https://pixabay.com/get/gb067960e54be391818e80872cb353f9d3d19503de523e1b01b7b68c46559a802740bd69f34a7ca9816871410f7c59addd8e0190c4c1245cf082c5afd3d6667ef_1280.jpg","imageWidth":3387,"imageHeight":2233,"imageSize":3413035,"views":45572,"downloads":41296,"collections":26,"likes":97,"comments":13,"user_id":30610845,"user":"mikewolf_","userImageURL":"https://cdn.pixabay.com/user/2022/10/15/06-43-32-88_250x250.jpg"},{"id":7538816,"pageURL":"https://pixabay.com/photos/cow-calf-animals-cattle-bovine-7538816/","type":"photo","tags":"cow, calf, animals","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/09/19/cow-7538816_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g18444ba0cef2f7b001a48238db4d23f5dcbde6b551161bfd34f5c8620479ba5a4ce332443f0d7e965cb6976955f6c6efd629bc3b7fd9b458d8a19abcd6a6bd12_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gd5787ed22c6f54142e2f163daa85fb267690a8cd77f4a246267df875a60fb9fa34c56b10e6e4fc52e5fa63d6f19785061150cee9223ac6f6c7fdc1dcc16a3b94_1280.jpg","imageWidth":5738,"imageHeight":3825,"imageSize":7963993,"views":774,"downloads":733,"collections":1,"likes":38,"comments":23,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7540742,"pageURL":"https://pixabay.com/photos/sunset-lake-autumn-mountains-7540742/","type":"photo","tags":"sunset, lake, autumn","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/08/18/sunset-7540742_150.jpg","previewWidth":150,"previewHeight":60,"webformatURL":"https://pixabay.com/get/gfd48f24d2cad6e24aaefe0483319a99f398b7707c2d1849bfe2397aba3eb349ac5a86c86b42df230f04b73c0008a5bf4ac136888abde907259c987d2ffde0f40_640.jpg","webformatWidth":640,"webformatHeight":256,"largeImageURL":"https://pixabay.com/get/gf010aa0116241b411936753f80a3fae4a211402b34bf806937586361e27ca5dafcf36172b1e5c70a838be8085820af80e107eb4e5d59f2d1805974857e3d1ff8_1280.jpg","imageWidth":5935,"imageHeight":2374,"imageSize":3265342,"views":822,"downloads":770,"collections":2,"likes":37,"comments":21,"user_id":1425977,"user":"ChiemSeherin","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/09-31-00-469_250x250.jpeg"},{"id":7534068,"pageURL":"https://pixabay.com/photos/teasel-flower-faded-dried-up-7534068/","type":"photo","tags":"teasel, flower, faded","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/01/teasel-7534068_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g50e8fe8b32284f4bd12adb62a5e86092f4394fdaf6d06032fe70244d813c9848f4566f846af0fd59c948db8570c6c1dfb69f3c50694adc05fde36be03147a437_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g0e251b98878e2e41191aabbe6d624f73c87e302308af2670e193edecb7c821af6d6b9c2dbb96127f7802a4513905eba9ccb227caf11d21423db024b5c261dbc6_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":4580223,"views":4577,"downloads":4513,"collections":1,"likes":62,"comments":0,"user_id":10327513,"user":"NickyPe","userImageURL":"https://cdn.pixabay.com/user/2022/09/25/06-57-47-415_250x250.jpg"},{"id":7534070,"pageURL":"https://pixabay.com/photos/southern-screamer-chaj%c3%a1-bird-7534070/","type":"photo","tags":"southern screamer, chaj\u00e1, bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/05/04/southern-screamer-7534070_150.jpg","previewWidth":143,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g1461960a284680b228d3edf010956c3103b4a00f6e26b1593ef91a20d70a86e53aef1b21a651c219238bf25d0ee87df8c1af34dba43d4218209f49df167cc487_640.jpg","webformatWidth":612,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/gf762b0a7758241e0ab04f03262eba2d0e97eb21eae350181cf429a01033c94f4ef91016f74a0fe890a82dd241426ccfb6a6518c7527cb67136c30b4d8a3d728f_1280.jpg","imageWidth":3071,"imageHeight":3212,"imageSize":1013138,"views":2824,"downloads":2807,"collections":1,"likes":40,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7533939,"pageURL":"https://pixabay.com/photos/musk-ox-buffalo-animal-wildlife-7533939/","type":"photo","tags":"musk ox, buffalo, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/02/23/musk-ox-7533939_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gb313843172c317d1634e6e1b99c806475a89563aceb08101d6cc32f6a76d06ef8ac34f3f4cf4a5012368943370bb8c2d3f5a557c82e837071afa64a024932b57_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g69f0db5a4b8ca3315d5beac6d64764f0e7e6290d409c4a9c340e3f21cd510a69ed8d0121e783359a2ca14a2352c45d8aad95c4a483adad55af5b43d3211819d3_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3962906,"views":5442,"downloads":5355,"collections":0,"likes":62,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7538404,"pageURL":"https://pixabay.com/photos/cormorant-bird-animal-water-bird-7538404/","type":"photo","tags":"cormorant, bird, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/05/08/cormorant-7538404_150.jpg","previewWidth":150,"previewHeight":131,"webformatURL":"https://pixabay.com/get/g2be96c92dc98ed152163e7dc81ed10336ad312d6811db93943caa5347b073b5c006cf78f74a70a954656ac36acd498929e0e6745803e66203cbd1e19fbc2306a_640.jpg","webformatWidth":640,"webformatHeight":561,"largeImageURL":"https://pixabay.com/get/g18f8aa000915f7e0dd3d37a399fc30969e83df0159db5f309e08f3c45a727c15a436222303418d9df87dc22642b154cd62545ed95c8967ef50e8b145b9fe3e94_1280.jpg","imageWidth":3235,"imageHeight":2835,"imageSize":663680,"views":1074,"downloads":1045,"collections":0,"likes":30,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7537567,"pageURL":"https://pixabay.com/photos/leaves-fall-multicoloured-nature-7537567/","type":"photo","tags":"leaves, fall, multicoloured","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/16/35/leaves-7537567_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gf14e0307ab376fed85dece7c17fe570e9eec98793103b957552c59798fc4271db8ffa09a6da90c224040e9498219d97889472d3604a70deef35fe5252ea03b0b_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gf6b0b74a3e55e670d0099a7d00a9150c19bba6e032dd155df11d294ce8fa029094c219d0a28103e6b71bd697ed7bf68f55bbbc25377fc59e7476e06d94d089ca_1280.jpg","imageWidth":5000,"imageHeight":3333,"imageSize":4483716,"views":1498,"downloads":1450,"collections":1,"likes":29,"comments":13,"user_id":7998824,"user":"jggrz","userImageURL":"https://cdn.pixabay.com/user/2022/10/21/09-43-52-779_250x250.jpg"},{"id":7538820,"pageURL":"https://pixabay.com/photos/calf-cow-animal-bovine-beef-7538820/","type":"photo","tags":"calf, cow, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/09/23/calf-7538820_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g3a5584ce19cbe96a68fea814dd10336afa774447f651d288b046dea33c948f713a5342afc79df3652e07bc219f8e3cd80cb5e23997068dc76121288a55d22da5_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g66550ab1b82eb1cde89512f0fcb88cf3858d1160aa1601fca282d3b1e95e73cc310bb7ea0fedeabb9396d782e854ed85666625c026f321ac9fe1fb65f211c8b8_1280.jpg","imageWidth":8256,"imageHeight":5504,"imageSize":8315994,"views":863,"downloads":823,"collections":1,"likes":37,"comments":21,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7538799,"pageURL":"https://pixabay.com/photos/calf-cow-animal-livestock-bovine-7538799/","type":"photo","tags":"calf, cow, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/09/13/calf-7538799_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g8afe6413a3cca1f03f2e66a39a7f8e88232a2739f2fb5d5d8ffaeb7de7ba0b0facc7efc218d9fa087bcf2cdd1fbde280ee4cc441f9cc815fd02606a5c638960f_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gb5526ad3dac75d485a84d715a2c458cbfba5d63e0e814da4d9d98039abbecd56b4f81b03ece44f3695ad0a5783b0963e64b9e60f9d0a6fe108d7919acb9f18dc_1280.jpg","imageWidth":8209,"imageHeight":5473,"imageSize":8633184,"views":859,"downloads":818,"collections":1,"likes":37,"comments":24,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7540534,"pageURL":"https://pixabay.com/photos/white-throated-treecreeper-bird-tree-7540534/","type":"photo","tags":"white-throated treecreeper, bird, tree","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/05/57/white-throated-treecreeper-7540534_150.jpg","previewWidth":100,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g040262399b7ef4f62442a034083acd5dc8b2ee5dd28812a18c5273c596bb5a388a1bef968764e0a6beff18c5e1f4710a8db219a9c8fcf825a3943f391433c8ab_640.jpg","webformatWidth":427,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g1aa2dd858a1de9c2c2839f831898b840791f150a9b418cd1faf69912eaa9fdd6b8e8643fae1f22439ee7139aaddb0917f45fbebd61b14ef10838e54d17239145_1280.jpg","imageWidth":3401,"imageHeight":5102,"imageSize":2361210,"views":549,"downloads":511,"collections":2,"likes":36,"comments":21,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7540765,"pageURL":"https://pixabay.com/photos/grey-shrike-thrush-thrush-bird-7540765/","type":"photo","tags":"grey shrike-thrush, thrush, bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/08/32/grey-shrike-thrush-7540765_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g84276eae56b4ed67fcd705b98f963d564080bf178920f6719a79254493cb036892e1405efda60d65585c2ee1fbfdb2f6093a0a67af226a7be45284afe891501a_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ge054a9e9db762ca7d4b11765dcb204da37a6055c0b1ee80fd0f08d309c6bf4d1186f56cd3fddd596a3c5c93fe8f9e6428507716b91c3876acbf74e9dbb096e56_1280.jpg","imageWidth":6870,"imageHeight":4580,"imageSize":4252108,"views":513,"downloads":473,"collections":2,"likes":36,"comments":24,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7529348,"pageURL":"https://pixabay.com/photos/glittering-bellied-emerald-bird-7529348/","type":"photo","tags":"glittering-bellied emerald, bird, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/06/05/glittering-bellied-emerald-7529348_150.jpg","previewWidth":150,"previewHeight":134,"webformatURL":"https://pixabay.com/get/g599a781530dfc316c60e817e9c40e4a0576bbd4013edfb86ce5ff769a7b6bbb2bbef7cd9c35746857d57582dc4b46bd3fbae8c2dc1799e65d6354bd6787574ac_640.jpg","webformatWidth":640,"webformatHeight":571,"largeImageURL":"https://pixabay.com/get/g3a8ab132cda3a24a997490284534f5f20506d4bec7e1f2e27c0585a928949285fad941b342d69047bf0d87961e649b130b1fe769b3b3adbf90d66952043911df_1280.jpg","imageWidth":3294,"imageHeight":2941,"imageSize":606496,"views":7646,"downloads":7552,"collections":3,"likes":60,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7538401,"pageURL":"https://pixabay.com/photos/coscoroba-swan-swan-bird-waterfowl-7538401/","type":"photo","tags":"coscoroba swan, swan, bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/05/06/coscoroba-swan-7538401_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g24d120211734fc8c9bce8eff5bdf98af1eeb7ebe24d71d29a0e96b416e4de9bb13ed17bdc19ae8f44b43249e274193107e86f4bab2e76d8c9c2aef07d1f7ae8b_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gae9be482f009b1a56947d05d658019628065f30a989e72e25236076590067fad2b1314cdaa263de9c1b2da5e7bf7836ca19c1fdb37080c590c762a69a4c7dbfa_1280.jpg","imageWidth":3034,"imageHeight":2023,"imageSize":416641,"views":1072,"downloads":1051,"collections":0,"likes":29,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7538418,"pageURL":"https://pixabay.com/photos/spectacled-tyrant-bird-plant-animal-7538418/","type":"photo","tags":"spectacled tyrant, bird, plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/05/16/spectacled-tyrant-7538418_150.jpg","previewWidth":150,"previewHeight":120,"webformatURL":"https://pixabay.com/get/g20e5bdebb747302da8ea960112fc6482271ca48f8fcae4d438637b10e6035e0c502d8fc066b56648753f6d447f7e31ce4a740f8df7fd39ddd127c2037504f633_640.jpg","webformatWidth":640,"webformatHeight":512,"largeImageURL":"https://pixabay.com/get/g0c37c372cc814190012ac1067422fa36c7b73dddc8a43eb2a4941bbaa11d9c09b73c06f999642907f797a3434c529003baa674537316f837128967a35819a6c5_1280.jpg","imageWidth":3047,"imageHeight":2438,"imageSize":508565,"views":962,"downloads":941,"collections":1,"likes":28,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7538819,"pageURL":"https://pixabay.com/photos/calf-cow-animal-bovine-beef-7538819/","type":"photo","tags":"calf, cow, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/09/23/calf-7538819_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gba8571fd979ab0b9e0095a67729c8ac7775f75755877b2de6c7bb427d493d72800e0fd26cff249d42055864405f08943f882ebd3c1616316b2fedec9c1cdea51_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g2167904689b61d342efd05912a18aebc3a32ad5937b7e089ef96b4f9ef5f2f72cdd26067866a2d7c89e40081afc5040524dc3f263d6c8052389417ae2abed566_1280.jpg","imageWidth":7403,"imageHeight":4934,"imageSize":6476856,"views":805,"downloads":767,"collections":1,"likes":36,"comments":22,"user_id":5526837,"user":"pen_ash","userImageURL":"https://cdn.pixabay.com/user/2022/09/01/10-33-42-903_250x250.jpg"},{"id":7539599,"pageURL":"https://pixabay.com/photos/forest-trees-sunlight-7539599/","type":"photo","tags":"forest, trees, sunlight","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/16/47/forest-7539599_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g37fbf7ef6ed2ba48b1f9c66bb99d883e094ccba2ca91d1632587e0c788df36a32a117ed933b1d97a0495fc0ea669b4846110326f5a381ea1e2c1540b812fc725_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g66181c83b5bc5d7e4143fbc3c0b51487cbab7d9fb4fdba263fe980ecc7bb2b7bd5a70b298930c0b8b8000a72ecdb10af5e8f1da6b1019540cc38bff3a99c542b_1280.jpg","imageWidth":4016,"imageHeight":2677,"imageSize":4183117,"views":728,"downloads":688,"collections":6,"likes":31,"comments":13,"user_id":16096197,"user":"Camera-man","userImageURL":"https://cdn.pixabay.com/user/2022/03/01/11-08-12-943_250x250.jpg"},{"id":7529350,"pageURL":"https://pixabay.com/photos/ringed-teal-duck-bird-7529350/","type":"photo","tags":"ringed teal, duck, bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/06/11/ringed-teal-7529350_150.jpg","previewWidth":150,"previewHeight":113,"webformatURL":"https://pixabay.com/get/g58174e52cca93170bb168d9819e4d1e20a752b4d2dd8e05efae24a81eb5a4fa6fe990fc5a2bf82d835e05061f25aadbf91f2bb9183e3c1e54560f778b205c5d2_640.jpg","webformatWidth":640,"webformatHeight":481,"largeImageURL":"https://pixabay.com/get/g3be9126e045c5ac54e049215a43c13e99a3d20f3474ec5645364ab3f87ef0f83865827f14cb246f9b39ac59f2aa8457b27a062f3f1231f64df398e971802e9b0_1280.jpg","imageWidth":3988,"imageHeight":3000,"imageSize":1002384,"views":6817,"downloads":6730,"collections":1,"likes":59,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7533698,"pageURL":"https://pixabay.com/photos/cormorant-bird-river-animal-7533698/","type":"photo","tags":"cormorant, bird, river","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/21/38/cormorant-7533698_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g8b589c7e2aceabf008a0c688a405a2ca7b65f9372b80bd310def6d5cb70004dac51435e09a44a181de5a37013f87ca65d4bb0bea0be68bb429c3fcbe110dd2f3_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ge5a58c3214e6813593d0e4d220f113a7805fd49c93b7c52a110fe93c8fd8ede0c50a54299ae01cebf1f44e0397820c356c8e73618bc849b8b892b91b0567c3b8_1280.jpg","imageWidth":4000,"imageHeight":2667,"imageSize":2295445,"views":3296,"downloads":3237,"collections":1,"likes":41,"comments":21,"user_id":25467781,"user":"sharkolot","userImageURL":"https://cdn.pixabay.com/user/2022/10/10/19-39-18-33_250x250.jpg"},{"id":7531228,"pageURL":"https://pixabay.com/photos/man-mercedes-benz-vintage-car-7531228/","type":"photo","tags":"man, mercedes benz, vintage car","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/22/44/man-7531228_150.jpg","previewWidth":150,"previewHeight":124,"webformatURL":"https://pixabay.com/get/g0f0d674a1f95f56b155916927fa983a2a48304cef0e88ec3b3a107a5c700080e67630de70df1c01aab1b388e59de4cca4eca83630a3d181e9d6927a9ac561299_640.jpg","webformatWidth":640,"webformatHeight":530,"largeImageURL":"https://pixabay.com/get/gf49dbedd9a0dfdf18e22bbf3a338a50f894c819b358409e74d8a168deef77265462110528d18a685fb88556ab97544b963328ebbf177fd083547a9acaa3bfe46_1280.jpg","imageWidth":4200,"imageHeight":3480,"imageSize":1902562,"views":8061,"downloads":7858,"collections":3,"likes":71,"comments":52,"user_id":9214707,"user":"mollyroselee","userImageURL":"https://cdn.pixabay.com/user/2022/10/03/13-04-47-783_250x250.jpg"},{"id":7536089,"pageURL":"https://pixabay.com/photos/whistling-heron-chiffon-7536089/","type":"photo","tags":"whistling heron, chiffon, sirigma sibilatrix","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/02/56/whistling-heron-7536089_150.jpg","previewWidth":150,"previewHeight":120,"webformatURL":"https://pixabay.com/get/g1201e8f79d6c4e077acd93bffa847560b51509a9ecc8f67b54b86159fcbf6de432d86de3bcf134b7557dc9426845502bc75dfe745f749d68de3d980e10b312a7_640.jpg","webformatWidth":640,"webformatHeight":512,"largeImageURL":"https://pixabay.com/get/gdc04a4cbdbd8f19f201780b1b2ca226cfc648c1b53b82ccc61ba3f24285ea5edc912420aa107fca250e95aa5b5e7b81c8bc9f14b2ee7b9abd09ccb60952dda1e_1280.jpg","imageWidth":3750,"imageHeight":3000,"imageSize":791574,"views":766,"downloads":738,"collections":1,"likes":30,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7535899,"pageURL":"https://pixabay.com/photos/apple-branches-field-the-orchard-7535899/","type":"photo","tags":"apple, branches, field","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/23/36/apple-7535899_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g455af6a94d576681e6c7f548313867b89194a8142cd01f03807585f02d2cc78445b7ed77f3252dbe6f661a753d67db0816ddc1676faaca2f9bf90a774a4ba268_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g87a1fe6925c6cfeba786d8526e258d643a0885944163550a964ee34d2ded037bf544bb08256c9b745e2ba61acbca9f3bbdde316561c402dfb03285835313b21f_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":2233208,"views":405,"downloads":377,"collections":1,"likes":28,"comments":19,"user_id":6355831,"user":"pasja1000","userImageURL":"https://cdn.pixabay.com/user/2021/02/06/02-19-29-704_250x250.png"},{"id":7539271,"pageURL":"https://pixabay.com/photos/jewelry-basket-cosmea-cosm-7539271/","type":"photo","tags":"jewelry basket, cosmea, cosm","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/13/44/jewelry-basket-7539271_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g180dbbea3e3a6492c8d991318ba5e4ed61161871fc7091da8add260e89353293185062abb53e128269362a02081820826e59519cc68e15f1414e5fc09b5eb783_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g0085e4905751a71b3d17116781bd6c3993d0b4145bfab174368a0664c21be9f33ee3ff3453b8a9ec9486ce1b9fa48aa989e8a2ec85f7bcd9b94a490b8bd3d0f2_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":2376135,"views":486,"downloads":452,"collections":4,"likes":31,"comments":16,"user_id":10084616,"user":"Nennieinszweidrei","userImageURL":"https://cdn.pixabay.com/user/2022/03/12/15-57-22-761_250x250.jpg"},{"id":7535241,"pageURL":"https://pixabay.com/photos/apple-fruit-tree-plants-red-apple-7535241/","type":"photo","tags":"apple, fruit, tree","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/16/22/apple-7535241_150.jpg","previewWidth":150,"previewHeight":98,"webformatURL":"https://pixabay.com/get/gc2cb4e3be55368a820e9062c2475c411433c4daab0fd9e8bc60c7e922e5b5c4a50f8e9803d5480a1043103bba1fbb1bbeaedd3e428074bce969f06991a264084_640.jpg","webformatWidth":640,"webformatHeight":417,"largeImageURL":"https://pixabay.com/get/g0a1f73294ff3bf98a4424e73b45b23e54c730a5c27e1b13a0134f7b7401233732b22038c381261a3193e58d68f579671e572401193256d3d0ec1901833678136_1280.jpg","imageWidth":5845,"imageHeight":3806,"imageSize":2835255,"views":1163,"downloads":1138,"collections":2,"likes":33,"comments":21,"user_id":6355831,"user":"pasja1000","userImageURL":"https://cdn.pixabay.com/user/2021/02/06/02-19-29-704_250x250.png"},{"id":7539596,"pageURL":"https://pixabay.com/photos/mountain-alps-italy-valle-d-aosta-7539596/","type":"photo","tags":"mountain, alps, italy","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/16/47/mountain-7539596_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g1c9698324f2a03a596b13fe7742ca702b378d2f6bd2973c8bbc65417f559c71d7af9b978222787047b3b1f516fbb3445445a4a0b09c7609154e1f2f955519b1e_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g794815b2afcfbdb483938e005ea55a3d7ca8d119cdff59cfb99c77618fdebc92b95e38a24f1eea2bea7ebe0e76047258fffc36b4eca6d1d1135230b82b8b2779_1280.jpg","imageWidth":4016,"imageHeight":2677,"imageSize":4396080,"views":412,"downloads":364,"collections":3,"likes":32,"comments":16,"user_id":16096197,"user":"Camera-man","userImageURL":"https://cdn.pixabay.com/user/2022/03/01/11-08-12-943_250x250.jpg"},{"id":7537201,"pageURL":"https://pixabay.com/photos/pumpkins-white-pumpkin-vegetable-7537201/","type":"photo","tags":"pumpkins, white pumpkin, vegetable","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/14/25/pumpkins-7537201_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g7d53bd38fb143b64fcbd43077edd6c1597b6f774ac3afb2b4a052d03cd40de6400aa598c3b76e7f79602a0417ee908b6cb83fb75a6b8afd592f8aff8a207abec_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g3ed8c6d4467d9f98f5af2687df41509422de735bb315cc8ce497bbae265097971829546e22224c8dc88b2856cef551e648e7e8ab28545ba638288ac6222a4c9d_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4744754,"views":961,"downloads":931,"collections":0,"likes":39,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7522735,"pageURL":"https://pixabay.com/photos/castle-ships-vineyards-cochem-7522735/","type":"photo","tags":"castle, ships, vineyards","previewURL":"https://cdn.pixabay.com/photo/2022/10/15/08/40/castle-7522735_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gb784c9e0a2706a3ddfba13977dbef8fbe526e4099ab816b211c301d008a3733f4aeda89b838e0697283a8c5824e074284178123bb5e4a9fbb030a01e6a69208b_640.jpg","webformatWidth":640,"webformatHeight":426,"largeImageURL":"https://pixabay.com/get/gabb234f7af18c8522e5dc95acae4e2cf563c124496d24c3b576f87b28793a7609181ff866d798a2f05de2020acc1a2e067bd05dee00f612a27d0b099ce55b5d4_1280.jpg","imageWidth":6000,"imageHeight":3997,"imageSize":7762007,"views":25695,"downloads":25257,"collections":1,"likes":109,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7537869,"pageURL":"https://pixabay.com/photos/monkey-animal-primate-nature-7537869/","type":"photo","tags":"monkey, animal, primate","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/19/47/monkey-7537869_150.jpg","previewWidth":150,"previewHeight":84,"webformatURL":"https://pixabay.com/get/g2d6af749934572ed083054d460c465afec7b4bfddc76692e77edb06f4b2fca11b78335073b3e90196132d3308075fdc1169f0f8d4f07c16d4685fd52963968da_640.jpg","webformatWidth":640,"webformatHeight":360,"largeImageURL":"https://pixabay.com/get/g4cc82d7955e0ba4ef4cfc0733e9c37ffdc87efb1c6af8b5e0349051d40802c967a441e151a890d0dda60084bbe8b915482cc40846a835e8c1756017158ff0955_1280.jpg","imageWidth":6000,"imageHeight":3376,"imageSize":6775024,"views":957,"downloads":924,"collections":0,"likes":28,"comments":16,"user_id":5797981,"user":"J\u00fcrgen_Bierlein","userImageURL":"https://cdn.pixabay.com/user/2017/08/23/23-15-41-944_250x250.jpg"},{"id":7536200,"pageURL":"https://pixabay.com/photos/nature-wallpaper-growth-7536200/","type":"photo","tags":"nature wallpaper, growth, forest mushrooms","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/05/12/growth-7536200_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gc3cb0cdc913b9c43482b573e6c1f0322b0895a935cba44eae9a5171a5a50122d84d11854b3a975b4a47239317e10b727e4874937392df5d679e0bcaad5cddc31_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ga8fafb386ebfa9fbcb0bdb394a2ada6d7d450160e440eb37e075e669dd4d5e17f65bf0d9e3b20e37ea3327923d80823d85074765f3a1432d9579aee440b3ba95_1280.jpg","imageWidth":5000,"imageHeight":3333,"imageSize":3367695,"views":977,"downloads":941,"collections":0,"likes":26,"comments":15,"user_id":7998824,"user":"jggrz","userImageURL":"https://cdn.pixabay.com/user/2022/10/21/09-43-52-779_250x250.jpg"},{"id":7536145,"pageURL":"https://pixabay.com/photos/tiger-butterfly-insects-love-flower-7536145/","type":"photo","tags":"tiger butterfly, insects, love","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/03/53/tiger-butterfly-7536145_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gc5c29516af20b9e4a6ef9034973bfd6b83a1e7de6e36b4f363bb27043995c08e4965a5926e8c0d7b68cebf4989e410e52d4dd78a35bbbbf606a7b8ff4c0a81ef_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g93a5a794e634d2f177ceae11595b1034f441d8ac8d919b6bb4c3b6cb915bd0c55d4724116191743d7fcc84b8830d6333badbaa7b1fce9f3e8815b10c3f9df7f7_1280.jpg","imageWidth":6000,"imageHeight":4003,"imageSize":3946975,"views":856,"downloads":814,"collections":2,"likes":24,"comments":7,"user_id":7703165,"user":"KIMDAEJEUNG","userImageURL":"https://cdn.pixabay.com/user/2022/05/29/17-22-10-952_250x250.jpg"},{"id":7530473,"pageURL":"https://pixabay.com/photos/sunset-lake-mountains-heaven-7530473/","type":"photo","tags":"sunset, lake, mountains","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/14/42/sunset-7530473_150.jpg","previewWidth":150,"previewHeight":84,"webformatURL":"https://pixabay.com/get/gb15bf103caeba4e2a35e9f74b8ef5cd2ccc58aa439f459455ad0ae16781867835593d89d0dda16cb5dbfe347d20f870f98c4736d89611737fadc67916a20b6e7_640.jpg","webformatWidth":640,"webformatHeight":360,"largeImageURL":"https://pixabay.com/get/gb82f059346a2093dec9d6cf47a640df359a70d05e24b48737b0b08ed4069647427a62a46c46f009fa3fd2928a3edfaa547d2e330281117f8ad10e0a9b354e32f_1280.jpg","imageWidth":5966,"imageHeight":3356,"imageSize":2506825,"views":10071,"downloads":9849,"collections":5,"likes":66,"comments":49,"user_id":1425977,"user":"ChiemSeherin","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/09-31-00-469_250x250.jpeg"},{"id":7535521,"pageURL":"https://pixabay.com/photos/pumpkin-vegetables-food-healthy-7535521/","type":"photo","tags":"pumpkin, vegetables, food","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/18/28/pumpkin-7535521_150.jpg","previewWidth":150,"previewHeight":94,"webformatURL":"https://pixabay.com/get/geee95031872364a38ce7b33a9c82023cd4ac119c8827aae9639293eaf7615262f6476f4162b9d80b0860485392e3c4fd1860b094bf056206abca6a0a34bb1155_640.jpg","webformatWidth":640,"webformatHeight":399,"largeImageURL":"https://pixabay.com/get/g989a7d55bf7db837f44f2957907021587c771bd03b7b203d0950b074c070534ee7aef747be008962780a29f02f8f2a630b5142da1f5fa26ed0b2ea0c88bc7004_1280.jpg","imageWidth":5984,"imageHeight":3728,"imageSize":3867900,"views":1357,"downloads":1331,"collections":0,"likes":33,"comments":13,"user_id":3930681,"user":"matthiasboeckel","userImageURL":"https://cdn.pixabay.com/user/2022/04/12/06-48-11-19_250x250.jpg"},{"id":7535529,"pageURL":"https://pixabay.com/photos/wind-chimes-decorative-music-7535529/","type":"photo","tags":"wind chimes, decorative, music","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/18/32/wind-chimes-7535529_150.jpg","previewWidth":134,"previewHeight":150,"webformatURL":"https://pixabay.com/get/gadf5fe42c4066f8df68ba0d49004dc69aebf613ab6b5e41bc8c59f54f4a98342ad905a2d09c8eee88e1cde94bf28707bd7747b29824236d1a4781bab2dabe1b9_640.jpg","webformatWidth":570,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/gd3e893e2cd63765b3a61cd6dab6d1c033085c88a1734758895d841fa974d7db078a2ba9acf7d0d8b3ee3b2574ba69a1ca42915f9deef3f058f5aab8a7f0ccbe1_1280.jpg","imageWidth":3402,"imageHeight":3822,"imageSize":2439535,"views":2323,"downloads":2283,"collections":1,"likes":45,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7536239,"pageURL":"https://pixabay.com/photos/mushrooms-mycology-fungus-7536239/","type":"photo","tags":"mushrooms, mycology, fungus","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/05/24/mushrooms-7536239_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g7c505a6953f628363c2f5d4ac0404ee2291197e2881678d1315648b28f0865803c0a6157301eef895527692b8b0bf15ef878674c01771c3df1695550fc1f41a8_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ge3573dc2ba3990600f5272cd37bbad674a827ac7856ea069b8fd76195daaf07a559086e8e2c07233752989bd25c692a11bd5557ff18725962ac4c1e6d7f91b9d_1280.jpg","imageWidth":5000,"imageHeight":3333,"imageSize":3802517,"views":545,"downloads":515,"collections":0,"likes":25,"comments":13,"user_id":7998824,"user":"jggrz","userImageURL":"https://cdn.pixabay.com/user/2022/10/21/09-43-52-779_250x250.jpg"},{"id":7518546,"pageURL":"https://pixabay.com/photos/clouds-heaven-background-sunbeams-7518546/","type":"photo","tags":"clouds, heaven, background","previewURL":"https://cdn.pixabay.com/photo/2022/10/13/07/59/clouds-7518546_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g679fc271dd7996d94982a5751a824abe631b836d9b1a86b0a40363e202285e915ac115b5ed5b9b2a9f6e0f34191c5e904c2aec365649e4dd6620cd88109ee875_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g267f3c78a2af60d7855c3aebdd4a772f2fe3f5e3dd5e3cddbf819a18cbde1b8c0b7724ca5f748c812a4652c5f864ed06f4e28fc91e602c2c24f065f1768b32b8_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":1607772,"views":25089,"downloads":24808,"collections":1,"likes":142,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7529353,"pageURL":"https://pixabay.com/photos/marsh-sandpiper-bird-animal-7529353/","type":"photo","tags":"marsh sandpiper, bird, animal","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/06/15/marsh-sandpiper-7529353_150.jpg","previewWidth":150,"previewHeight":126,"webformatURL":"https://pixabay.com/get/gfa10e37bb3ff2171d54154a09d763309fcb3fbc3ac25317c5f90b1535658ef299ad7bf3bb4f1e886fd3ee65d4681a35b1f157a3e840e84d4b1ca6d1747271df6_640.jpg","webformatWidth":640,"webformatHeight":538,"largeImageURL":"https://pixabay.com/get/g80d8e1806aa0f0dcae8595e500261f2d970c09f3a42701a1091698c680adbf54ac88a64b9cdaa65c355741d646f03c14f4f036ecc04fdda5bf9fa507fc7a4eca_1280.jpg","imageWidth":3553,"imageHeight":2988,"imageSize":878382,"views":6347,"downloads":6280,"collections":0,"likes":54,"comments":0,"user_id":17561499,"user":"Beto_MdP","userImageURL":"https://cdn.pixabay.com/user/2022/02/04/00-22-52-402_250x250.jpg"},{"id":7529676,"pageURL":"https://pixabay.com/photos/seagull-beach-bird-wildlife-7529676/","type":"photo","tags":"seagull, beach, bird","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/09/05/seagull-7529676_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gcdcd65b2c4de09f402175bdbbe3ab1b95866a2b16e1db9b2c0a007f2643e233f69f575733ba59125a0f12256da9e4d70a3523dd3cda532ce2b8ead862eca1d06_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g84c269365dd3f84b978c6f5a55d14ed56ee9819bceb5e56ff7e9b3192ed0ab91751ecb4d70f67f4895ae35da6dffcfd68a4f2f6496247c6cceb43aa40eaf1828_1280.jpg","imageWidth":4670,"imageHeight":3113,"imageSize":2756287,"views":5366,"downloads":5289,"collections":2,"likes":53,"comments":32,"user_id":14802912,"user":"dendoktoor","userImageURL":"https://cdn.pixabay.com/user/2022/09/08/19-19-09-260_250x250.jpg"},{"id":7518551,"pageURL":"https://pixabay.com/photos/crane-houses-architecture-cologne-7518551/","type":"photo","tags":"crane houses, architecture, cologne","previewURL":"https://cdn.pixabay.com/photo/2022/10/13/08/01/crane-houses-7518551_150.jpg","previewWidth":101,"previewHeight":150,"webformatURL":"https://pixabay.com/get/g7af12b2c04958dc6880eba9eadc415d54354d95a7d5062e9e643145e28d3d1d78fb888bb6b340980b9188bff572b03bdd73ba3c74bdd7d146a5a01c2686b0fc4_640.jpg","webformatWidth":433,"webformatHeight":640,"largeImageURL":"https://pixabay.com/get/g2148b14382e79d4f3f8fcdaa5391188795fd80f1550a9596308eac21a84157f46f6c4445579edc1a0f6e8bafdd35fdca65132fe4341776f9daa831cc68286df7_1280.jpg","imageWidth":4000,"imageHeight":5915,"imageSize":7627355,"views":17098,"downloads":16840,"collections":4,"likes":136,"comments":0,"user_id":2364555,"user":"pixel2013","userImageURL":"https://cdn.pixabay.com/user/2020/07/25/21-10-11-80_250x250.jpg"},{"id":7534016,"pageURL":"https://pixabay.com/photos/wolf-animal-wildlife-hokkaido-wolf-7534016/","type":"photo","tags":"wolf, animal, wildlife","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/04/07/wolf-7534016_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g840c77abeb9ec2b7941046fb20ed8a3fc61409a6e02e37d1713b99a35094a140ad86b75bc0d12e2c68a40b67aa046e74ae754a3aa7a1c5d12b0b6eff535617c7_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gfc478608bd10d4873ad5c3dffe7154af3327ac4f0c4220dc4ee6ea5923450e071f4d13eecc69461ddfd0f6461010ffbc0f1ab0fe541980dfa0ab15c903b9fc23_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":4834627,"views":3906,"downloads":3852,"collections":0,"likes":52,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7537179,"pageURL":"https://pixabay.com/photos/pumpkins-white-pumpkin-vegetable-7537179/","type":"photo","tags":"pumpkins, white pumpkin, vegetable","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/14/17/pumpkins-7537179_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g0babe626377733626f9c9d1bf825956ba1f1bb5ba55d9e470a7bfae9de2b076637e8482db4404f00d55d33b858c6ce5a9ab4544a2c4967a6ae179cf16c5ec508_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gb3521cf216652c3233cfbdadb3a2e60ef7b0f27e6888f8274d3498dcb39dfd79c46ce31aa8062fe544f81cc5a506ae8ad774a85505b68bb6f10248c3e3a78a16_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":5482678,"views":559,"downloads":530,"collections":0,"likes":35,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7530798,"pageURL":"https://pixabay.com/photos/swan-bird-waterfowl-water-bird-7530798/","type":"photo","tags":"swan, bird, waterfowl","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/17/31/swan-7530798_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/ga3389d43a34c0474f08d726b56411ed6f3e56ee4beb1b0f65f4da58d0ec1498befbfc89409278952afc81a9b46176c695c6b74253dc4a7b30b40e0a4eee5aa4b_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g594402a558eb41b389feae1d1cd7d976d483c0639c472e1a320a6686772115594563244097f56421936b3f1f0bce7d567b3328037dee4c384e9b25e2b63c9b03_1280.jpg","imageWidth":3000,"imageHeight":2000,"imageSize":1635516,"views":6525,"downloads":6438,"collections":0,"likes":54,"comments":34,"user_id":25467781,"user":"sharkolot","userImageURL":"https://cdn.pixabay.com/user/2022/10/10/19-39-18-33_250x250.jpg"},{"id":7529927,"pageURL":"https://pixabay.com/photos/lion-african-lion-white-lion-animal-7529927/","type":"photo","tags":"lion, african lion, white lion","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/11/13/lion-7529927_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gc366828cacc333748ab96a48dfe5a576f1d74f0cccfac7c26caa33df68a329625b1469ca4a5350d7759868469adf6c462c2c816971c2fe893fdcf84263468855_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gcc8960fdcae773f0cd9439dc7049f5bb6c0925767ea0c780c420b127c3de943b5aee91f11450696c38cc2e5ec5200a7c915d8c8cf1e26a4bc4ef9723fde67fdd_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":5690274,"views":6623,"downloads":6488,"collections":2,"likes":59,"comments":64,"user_id":3698690,"user":"Marjonhorn","userImageURL":"https://cdn.pixabay.com/user/2020/10/31/14-11-24-484_250x250.png"},{"id":7540762,"pageURL":"https://pixabay.com/photos/european-hornet-hornet-insect-wasp-7540762/","type":"photo","tags":"european hornet, hornet, insect","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/08/30/european-hornet-7540762_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gca54f059266e9ce8f7f26dbba25a35643e8973aba3fb76ca382f9eba3305f24b1022e15f822f6a4ba2183d4af808f0bd7bad6e6cca8d42dd088151bfa2656bb6_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gdf9b79b34b468373796caf8b8198243e8f1fea8918c7a304de7ee4bd0991adf85c366c7deefb930e1ca010bb3069bf31997e45c2bcfd1710ed0a02d526cc8b13_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":2708823,"views":146,"downloads":128,"collections":0,"likes":24,"comments":0,"user_id":1767157,"user":"Ralphs_Fotos","userImageURL":"https://cdn.pixabay.com/user/2022/10/22/05-16-16-200_250x250.jpg"},{"id":7532815,"pageURL":"https://pixabay.com/photos/marigold-calendula-officinalis-7532815/","type":"photo","tags":"marigold, calendula officinalis, raindrops","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/15/19/marigold-7532815_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gbddb0ef44fb5c696c8885d9648139be171b7d3a6bff72a1c54d443fba57d5eafe0bf632585fa5deb29e99f579f62745c21033f21ca12300b518ceac40a7b17f4_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ga11d8f4cf68c609aff931a0fe12497b5216166ef8215322e7d1699b1dfcfafde28065b2f4323dd69dfe033feeaaff660833c22d69b339b3a522d6a4a2f18d91b_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":2749750,"views":2587,"downloads":2510,"collections":2,"likes":55,"comments":40,"user_id":10084616,"user":"Nennieinszweidrei","userImageURL":"https://cdn.pixabay.com/user/2022/03/12/15-57-22-761_250x250.jpg"},{"id":7522627,"pageURL":"https://pixabay.com/photos/mushrooms-moon-autumn-night-7522627/","type":"photo","tags":"mushrooms, moon, autumn","previewURL":"https://cdn.pixabay.com/photo/2022/10/15/07/12/mushrooms-7522627_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gcd81e1940320f2cdc417af259127557ba147755a0fcc63159e6ddb7c313dc3b72778174be5de0923af6003e8aeae3256073d8b5c51f6e205b0c1d26194a8fb18_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gc15a9d49ad71e26a45694fe10f079fead6c58702f2675db208a6dbc8e307a8521838ecfa1033d91fe0c4e9aa1f887fa45e7badac086965668c2405e9c5ce08d5_1280.jpg","imageWidth":7087,"imageHeight":4724,"imageSize":2768202,"views":20113,"downloads":19670,"collections":11,"likes":105,"comments":60,"user_id":3764790,"user":"ELG21","userImageURL":"https://cdn.pixabay.com/user/2022/04/07/18-24-56-559_250x250.jpg"},{"id":7535876,"pageURL":"https://pixabay.com/photos/round-table-king-arthur-statue-7535876/","type":"photo","tags":"round table, king arthur, statue","previewURL":"https://cdn.pixabay.com/photo/2022/10/20/23/10/round-table-7535876_150.jpg","previewWidth":150,"previewHeight":114,"webformatURL":"https://pixabay.com/get/g3f2585a6da755d6d0de933ed86841a5bcc5b8ffdf8545fb9e803dc573c71ae1ca7f895ffc847de3d9de3a4aeb3d12a84d886fdcbbc80cf73034f2d526c4e15ef_640.jpg","webformatWidth":640,"webformatHeight":485,"largeImageURL":"https://pixabay.com/get/gfbd0457959f15686b2c54970ccd555af488d4b45b14db20bb3d75479c6dcc802bc7889e75a4f5a099ccb630a1a95a642a25ef9f1b7e899fefa397bba035efa3e_1280.jpg","imageWidth":3867,"imageHeight":2933,"imageSize":3655680,"views":530,"downloads":502,"collections":2,"likes":35,"comments":25,"user_id":7068951,"user":"ykaiavu","userImageURL":"https://cdn.pixabay.com/user/2022/03/01/18-49-57-752_250x250.jpg"},{"id":7537746,"pageURL":"https://pixabay.com/photos/goat-horns-fur-animal-portrait-7537746/","type":"photo","tags":"goat, horns, fur","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/18/07/goat-7537746_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gef724811c47ccf31c9671f3c762d5c8b92cefaddc82f3c4d3872ed836f2fecdc2f8de0b949b98585eed09789197d01db03c5b14e4f24d9f058a625ce5f37b8ec_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gba875be9ef8a1e6ff5c57df0d9c5cd99b64512c3b57d13878aea67f0576240278fe44dce4650f28ba54fb12dcae03297da8a838036b28ab6d4a32e9470b64744_1280.jpg","imageWidth":3936,"imageHeight":2624,"imageSize":2918009,"views":644,"downloads":608,"collections":0,"likes":23,"comments":12,"user_id":87167,"user":"fotoblend","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/15-08-54-559_250x250.jpg"},{"id":7536796,"pageURL":"https://pixabay.com/photos/blossom-bloom-flower-iris-plant-7536796/","type":"photo","tags":"blossom, bloom, flower","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/11/05/blossom-7536796_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g61480bf02791ce7fb8d28e9f00e14b26111ce020049b99d97a291f1b97202c7a0b6f1dea61185e404d79dc467064fbc6e475f9df87ccff9e8bd7f191dd2c3e5d_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g1121c7b9a62ff890e21846e087f671ae0c9bc21a5b498d4826b768c896ace5d19bdf9b7c3e27695023671b84c0d1f01be8b92bdf2d6c630b5ccd86a55b9fdfbe_1280.jpg","imageWidth":5568,"imageHeight":3712,"imageSize":6511828,"views":416,"downloads":388,"collections":0,"likes":23,"comments":11,"user_id":3238642,"user":"Georg_Wietschorke","userImageURL":"https://cdn.pixabay.com/user/2019/11/19/05-40-55-369_250x250.jpeg"},{"id":7539597,"pageURL":"https://pixabay.com/photos/the-needle-mountains-beach-7539597/","type":"photo","tags":"the needle, mountains, beach","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/16/47/the-needle-7539597_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g2819f3e58bfc9ac19bd7ebfdf0ed4a9313cf128068670eac6e85dc0291de7e01a8cb37bddbce51a20e92f958275d33d193fbb540adfcec6472d5fab5d8595776_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g6d5845f2e7a0eeaf23b773e0382f6de721fd20b57dd34eb61cdc774709eeaada6cf2548634dd65b0847d07702c5c8d4846d38ef6c2dd1873dc19f9facd6cd3f5_1280.jpg","imageWidth":4016,"imageHeight":2677,"imageSize":2683121,"views":455,"downloads":423,"collections":3,"likes":28,"comments":15,"user_id":16096197,"user":"Camera-man","userImageURL":"https://cdn.pixabay.com/user/2022/03/01/11-08-12-943_250x250.jpg"},{"id":7531013,"pageURL":"https://pixabay.com/photos/carnation-flower-plant-garden-7531013/","type":"photo","tags":"carnation, flower, plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/19/34/carnation-7531013_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g902889dcdce0016a46eb05a05396a514d407edb512bcce8abeb427f9a68a14ead852c971887157e2a167d9e688f759f29656c0fbd02970778a4f885a3f62d55e_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g53b25727b8ed9554abda988858f959399ff604dae9b5c2f20d6b1e2d18b5aab53088731554b0d63096fe4294fea84bdf98afe8ad1d3faadd0cf2d93fd9edeb9b_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":2754519,"views":6314,"downloads":6197,"collections":0,"likes":66,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"},{"id":7539275,"pageURL":"https://pixabay.com/photos/verbena-real-verbena-medicinal-plant-7539275/","type":"photo","tags":"verbena, real verbena, medicinal plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/13/45/verbena-7539275_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g9dd2c800a708a9b83afdfeb19cbd1fc9dda95b1584ea6e411aa0c6e8a930500ea199cd59e40d81e14f03acf71affe6fc46f315e4988a2cee8b3a947f76d7300e_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g9f4cd2b034cb624bf11a80fd6a623bd693f9ac0bfd30a16b3bf59b35458927319e93d454414c5849dfba0e14dc206b5bd811248841ae3a2bc9532ad26d08db61_1280.jpg","imageWidth":6240,"imageHeight":4160,"imageSize":2847542,"views":464,"downloads":425,"collections":3,"likes":28,"comments":17,"user_id":10084616,"user":"Nennieinszweidrei","userImageURL":"https://cdn.pixabay.com/user/2022/03/12/15-57-22-761_250x250.jpg"},{"id":7501470,"pageURL":"https://pixabay.com/photos/hyacinth-macaw-hyacinthine-macaw-7501470/","type":"photo","tags":"hyacinth macaw, hyacinthine, macaw","previewURL":"https://cdn.pixabay.com/photo/2022/10/05/20/43/hyacinth-macaw-7501470_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g941f06ca1cd9fcd552282ffd67e7f0754e98ed9b566b5ba62227194afc19de85a08ea27dcfee2affeab91b2c70d8444fb8a4bbcd073c39dc3c7e16cb39c2b9ac_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/gff0c434be033e4dc9c26d6ce5be995f0686003f9e311842584d9fe0e470ee0f93ebce7633d8ca8755744d385b07eabcbfa58d9397d5c85316dd09d717a19aee6_1280.jpg","imageWidth":3000,"imageHeight":2000,"imageSize":1329659,"views":35257,"downloads":26483,"collections":48,"likes":152,"comments":61,"user_id":25467781,"user":"sharkolot","userImageURL":"https://cdn.pixabay.com/user/2022/10/10/19-39-18-33_250x250.jpg"},{"id":7533098,"pageURL":"https://pixabay.com/photos/nature-wallpaper-park-fall-path-7533098/","type":"photo","tags":"nature wallpaper, park, fall","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/17/11/park-7533098_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g2c70f8e693f788cee38d373278c5888f8ac91dd5bca72b83a1e4b4b98b8869c11307ad74a0b9d59238c124257784fab4021ed83e313f6a9127e4b5f848b3998c_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g579b844185588a82afb2fed03f2dc0ab8e96861ad2afa00b7b673e2bcd6c0e04605942bf3deca7d01158a3192e692e1eaccf9886f33d4777a9566c5eb6aa80c8_1280.jpg","imageWidth":5000,"imageHeight":3333,"imageSize":7796339,"views":3332,"downloads":3232,"collections":2,"likes":36,"comments":15,"user_id":7998824,"user":"jggrz","userImageURL":"https://cdn.pixabay.com/user/2022/10/21/09-43-52-779_250x250.jpg"},{"id":7530478,"pageURL":"https://pixabay.com/photos/sunset-lake-mountains-heaven-7530478/","type":"photo","tags":"sunset, lake, mountains","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/14/47/sunset-7530478_150.jpg","previewWidth":150,"previewHeight":75,"webformatURL":"https://pixabay.com/get/g3848c00ec5e7281eac1ee3d522c59fa3f609015237ab555e83ca6186d03b0a746a84e85c47a7a8fc516fb71177424ec6b239ef89352c836eaa7df2b0f712203f_640.jpg","webformatWidth":640,"webformatHeight":320,"largeImageURL":"https://pixabay.com/get/g27ffb50c9c7a2cb836c84b4bf1d49140d36c12cc15e4b4658f6e87a1ac23244a3fdc7b8338256910697a456703ad600fee798f259872e833cfac7c6f9de5d2c0_1280.jpg","imageWidth":5966,"imageHeight":2983,"imageSize":1766973,"views":8481,"downloads":8319,"collections":7,"likes":57,"comments":40,"user_id":1425977,"user":"ChiemSeherin","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/09-31-00-469_250x250.jpeg"},{"id":7530479,"pageURL":"https://pixabay.com/photos/sunset-lake-heaven-reflection-7530479/","type":"photo","tags":"sunset, lake, heaven","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/14/47/sunset-7530479_150.jpg","previewWidth":150,"previewHeight":60,"webformatURL":"https://pixabay.com/get/g66eb8d04db404a2c0ef1366513c6dc91417b9d6b293971a41b727e5df55f8e92a59babeab15e5cec838e699a78d3c2a7a273801c3450265845a8e32e7e3d8dd8_640.jpg","webformatWidth":640,"webformatHeight":256,"largeImageURL":"https://pixabay.com/get/gf29e5cbaa522385b4f6e43930353ac5481fb18128ed31f4adfdc883af29241a76ed1750c473d0c100fce7722ffe2014f9ca150782cc5fb5fd8be5c47d97d81c2_1280.jpg","imageWidth":5947,"imageHeight":2379,"imageSize":1700297,"views":5657,"downloads":5538,"collections":5,"likes":57,"comments":39,"user_id":1425977,"user":"ChiemSeherin","userImageURL":"https://cdn.pixabay.com/user/2022/09/21/09-31-00-469_250x250.jpeg"},{"id":7532813,"pageURL":"https://pixabay.com/photos/goat-horns-goat-head-7532813/","type":"photo","tags":"goat, horns, goat head","previewURL":"https://cdn.pixabay.com/photo/2022/10/19/15/18/goat-7532813_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gc7f99a82fa88550241c098729c0f61dcb11dcef96a3efb1f22db105e8ad08f763eeb59b5ca689f5c009be2a0aea574da858684754381e9795755bf6522b382dd_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g6f2b59b9d46ca5770cf2837b103117cd7cb127cbeaef322c26d418d5634afcc2542b6e708f1288d76a28d87a039d0ee8bf5aad8bb08929a424fd6a211343586d_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":3772215,"views":2504,"downloads":2437,"collections":1,"likes":53,"comments":34,"user_id":10084616,"user":"Nennieinszweidrei","userImageURL":"https://cdn.pixabay.com/user/2022/03/12/15-57-22-761_250x250.jpg"},{"id":7539273,"pageURL":"https://pixabay.com/photos/bee-insect-aster-honey-bee-7539273/","type":"photo","tags":"bee, insect, aster","previewURL":"https://cdn.pixabay.com/photo/2022/10/22/13/45/bee-7539273_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/gc33979359e1cb465a205b02315d4f61eaedfca86a6e8e0952af7c5bbc990756bff731cd97c0d5b0ac10a23dc5936c2e6c29987044fde531274af1a535db7eb58_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g7e530570ee1f1eca1459d478fc90400c7e4c63ab516db25c0f0337dac314bfacdb53b703034be111c3017724fca56d43a35530e122f824b6956b6570e9112309_1280.jpg","imageWidth":6114,"imageHeight":4076,"imageSize":2635328,"views":396,"downloads":374,"collections":3,"likes":27,"comments":16,"user_id":10084616,"user":"Nennieinszweidrei","userImageURL":"https://cdn.pixabay.com/user/2022/03/12/15-57-22-761_250x250.jpg"},{"id":7540256,"pageURL":"https://pixabay.com/photos/sunflower-flower-plant-flora-7540256/","type":"photo","tags":"sunflower, flower, plant","previewURL":"https://cdn.pixabay.com/photo/2022/10/23/01/03/sunflower-7540256_150.jpg","previewWidth":150,"previewHeight":101,"webformatURL":"https://pixabay.com/get/ga3e3a437776b726f76edf4e4088c91639cd06f357fdef302ae490b2e214d2facf99a93b0384c443a256faced651fdf579341740b56141d81aa3cce4719399c56_640.jpg","webformatWidth":640,"webformatHeight":429,"largeImageURL":"https://pixabay.com/get/g260bb446646c0dd7839336fe1e0df4544f7617f6301d533e3e0667237bf4da6b276846bc179765bbeabba50f525dc6c3c5600d405dd63ce111ab4bc7a8ec688e_1280.jpg","imageWidth":9667,"imageHeight":6481,"imageSize":9486406,"views":296,"downloads":270,"collections":4,"likes":20,"comments":12,"user_id":21428489,"user":"ignartonosbg","userImageURL":"https://cdn.pixabay.com/user/2022/09/24/03-57-39-85_250x250.jpg"},{"id":7530555,"pageURL":"https://pixabay.com/photos/vineyard-grapes-grapevines-7530555/","type":"photo","tags":"vineyard, grapes, grapevines","previewURL":"https://cdn.pixabay.com/photo/2022/10/18/15/37/vineyard-7530555_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g5f274331b3921f1bbc18ac3096a122e5abb7acf6c5d55d425b3b1f143a1b04fc7c63a5bdb449566204ad32e8c8335dd0d04868b112ed90fe38e4b1fd0f03e8cd_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/ge7818d91c4cf43fa7e1007821798b5737b930fc7cb7151256298ff633aaa86b2b351389b70194c7dfef5bff90fb2486019c1dc73b836e51c80af10a1d205b668_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":6957163,"views":3718,"downloads":3620,"collections":4,"likes":47,"comments":23,"user_id":3930681,"user":"matthiasboeckel","userImageURL":"https://cdn.pixabay.com/user/2022/04/12/06-48-11-19_250x250.jpg"},{"id":7537226,"pageURL":"https://pixabay.com/photos/pumpkins-orange-pumpkin-vegetable-7537226/","type":"photo","tags":"pumpkins, orange pumpkin, vegetable","previewURL":"https://cdn.pixabay.com/photo/2022/10/21/14/30/pumpkins-7537226_150.jpg","previewWidth":150,"previewHeight":100,"webformatURL":"https://pixabay.com/get/g23e63a0fcbe540b921dd18431eba07236515012afcf01032fcae04e719dfd68a3ecc6a2c1ca120bb12840b01f101d1233454017a2ae9e74070c0db79d0206bef_640.jpg","webformatWidth":640,"webformatHeight":427,"largeImageURL":"https://pixabay.com/get/g2abcf720a0b36045c570fa281695f0b9c6291251af6b0107a285927d00687fe597ee0876cba24ae3d03735ec7954553c8f28ee945902cdd757f5ca46f395ad85_1280.jpg","imageWidth":6000,"imageHeight":4000,"imageSize":5631163,"views":558,"downloads":529,"collections":0,"likes":34,"comments":1,"user_id":7673058,"user":"Ray_Shrewsberry","userImageURL":"https://cdn.pixabay.com/user/2022/05/16/01-15-48-539_250x250.jpg"}]} \ No newline at end of file diff --git a/www.photopea.com/templates/?type=0.html b/www.photopea.com/templates/?type=0.html new file mode 100644 index 0000000..b938884 --- /dev/null +++ b/www.photopea.com/templates/?type=0.html @@ -0,0 +1,236 @@ + + + + + + + + + + + + PSD Templates + + + + + + + + + + + +