
    TњhI                     .     " S  S5      r \ " S5      rS rg)c                      \ rS rSrS rS r\S 5       r\S 5       r\S 5       r	S r
\S 5       r\S	 5       r\S
 5       r\S 5       r\S 5       r\S 5       r\S 5       r\S 5       r\S 5       r\S 5       r\S 5       r\S 5       rSrg)AppSettings   c                     Xl         g Nprefix)selfr   s     ]D:\Anime\Ugyen\janka_web_project\venv\Lib\site-packages\allauth/socialaccount/app_settings.py__init__AppSettings.__init__   s        c                 :    SSK Jn  U" U R                  U-   U5      $ )N    )get_setting)allauth.utilsr   r   )r	   namedfltr   s       r
   _settingAppSettings._setting   s    -4;;-t44r   c                 :    U R                  SU R                  5      $ )zM
Request email address from 3rd party account provider?
E.g. using OpenID AX
QUERY_EMAIL)r   EMAIL_REQUIREDr	   s    r
   r   AppSettings.QUERY_EMAIL
   s     }}]D,?,?@@r   c                 &    U R                  SS5      $ )z
Attempt to bypass the signup form by using fields (e.g. username,
email) retrieved from the social account provider. If a conflict
arises due to a duplicate email signup form will still kick in.
AUTO_SIGNUPTr   r   s    r
   r   AppSettings.AUTO_SIGNUP   s     }}]D11r   c                     U R                  S0 5      nUR                  S5      nU(       a  U R                  U5      US'   U$ )z
Provider specific settings
	PROVIDERSopenid_connect)r   get_migrate_oidc)r	   retoidcs      r
   r    AppSettings.PROVIDERS   sA    
 mmK,ww'($($6$6t$<C !
r   c                 *   UR                  S5      nUc  U$ 0 n/ nU Hn  n[        S0 US   D6n0 nSU;   a  US   US'   US   US'   UR                  UR                  SS5      US   US.5        US	   (       d   eUR                  U5        Mp     XCS
'   U$ )NSERVERSAPPtoken_auth_method
server_urlr    id)r   provider_idsettingsr.   APPS )r"   dictupdateappend)r	   r%   serversr$   appsserverappapp_settingss           r
   r#   AppSettings._migrate_oidc&   s    ((9%?KF''CL"f,4:;N4O01)/)=L&JJ"JJvr2#)$< , }%%%KK  F
r   c                     SSK Jn  UR                  nSU;   =(       a    US   R                  S5      nU R	                  SU5      $ )zD
The user is required to hand over an email address when signing up
r   r9   emailrequiredr   )allauth.accountr9   SIGNUP_FIELDSr"   r   )r	   account_settingsfieldsemail_requireds       r
   r   AppSettings.EMAIL_REQUIRED>   sC    
 	E!// F*Nvg/B/B:/N}}-~>>r   c                     SSK Jn  SSKJn  UR                  (       a  UR                  R
                  OSnU R                  SU5      $ )z\
See email verification method.  When `None`, the default
`allauth.account` logic kicks in.
r   r<   NEMAIL_VERIFICATION)allauthr9   r?   SOCIALACCOUNT_ONLYEmailVerificationMethodNONEr   )r	   allauth_settingsrA   r   s       r
   rF   AppSettings.EMAIL_VERIFICATIONI   sB     	=D  22 4499 	
 }}1488r   c                 &    U R                  SS5      $ )a  Consider a scenario where a social login occurs, and the social
account comes with a verified email address (verified by the account
provider), but that email address is already taken by a local user
account. Additionally, assume that the local user account does not have
any social account connected. Now, if the provider can be fully trusted,
you can argue that we should treat this scenario as a login to the
existing local user account even if the local account does not already
have the social account connected, because -- according to the provider
-- the user logging in has ownership of the email address.  This is how
this scenario is handled when `EMAIL_AUTHENTICATION` is set to
`True`. As this implies that an untrustworthy provider can login to any
local account by fabricating social account data, this setting defaults
to `False`. Only set it to `True` if you are using providers that can be
fully trusted.
EMAIL_AUTHENTICATIONFr   r   s    r
   rN    AppSettings.EMAIL_AUTHENTICATIONY   s    " }}3U;;r   c                 &    U R                  SS5      $ )a)  In case email authentication is applied, this setting controls
whether or not the social account is automatically connected to the
local account. In case of ``False`` (the default) the local account
remains unchanged during the login. In case of ``True``, the social
account for which the email matched, is automatically added to the list
of social accounts connected to the local account. As a result, even if
the user were to change the email address afterwards, social login
would still be possible when using ``True``, but not in case of
``False``.
!EMAIL_AUTHENTICATION_AUTO_CONNECTFr   r   s    r
   rQ   -AppSettings.EMAIL_AUTHENTICATION_AUTO_CONNECTl   s     }}@%HHr   c                 &    U R                  SS5      $ )NADAPTERz9allauth.socialaccount.adapter.DefaultSocialAccountAdapterr   r   s    r
   rT   AppSettings.ADAPTERz   s    }}G
 	
r   c                 &    U R                  S0 5      $ )NFORMSr   r   s    r
   rW   AppSettings.FORMS   s    }}Wb))r   c                 &    U R                  SS5      $ )NLOGIN_ON_GETFr   r   s    r
   rZ   AppSettings.LOGIN_ON_GET       }}^U33r   c                 &    U R                  SS5      $ )NSTORE_TOKENSFr   r   s    r
   r^   AppSettings.STORE_TOKENS   r\   r   c                     g)N   r1   r   s    r
   UID_MAX_LENGTHAppSettings.UID_MAX_LENGTH   s    r   c                 &    U R                  SS 5      $ )NSOCIALACCOUNT_STRr   r   s    r
   re   AppSettings.SOCIALACCOUNT_STR   s    }}0$77r   c                 &    U R                  SS5      $ )NREQUESTS_TIMEOUT   r   r   s    r
   rh   AppSettings.REQUESTS_TIMEOUT   s    }}/33r   c                 &    U R                  SS5      $ )NOPENID_CONNECT_URL_PREFIXr%   r   r   s    r
   rl   %AppSettings.OPENID_CONNECT_URL_PREFIX   s    }}8&AAr   r   N)__name__
__module____qualname____firstlineno__r   r   propertyr   r   r    r#   r   rF   rN   rQ   rT   rW   rZ   r^   rb   re   rh   rl   __static_attributes__r1   r   r
   r   r      sC   5
 A A 2 2  0 ? ? 9 9 < <$ I I 
 
 * * 4 4 4 4   8 8 4 4 B Br   r   SOCIALACCOUNT_c                 "    [        [        U 5      $ r   )getattr_app_settings)r   s    r
   __getattr__rx      s    =$''r   N)r   rw   rx   r1   r   r
   <module>ry      s&   ZB ZBz ,-(r   