# Security scan report for current directory
|
||
./security_report_2026.txt:25:- Description: Weak password policies, poor session management, or broken access controls.
|
||
./security_report_2026.txt:47:| **Authentication & Authorization** | - Enforce strong password policies.
|
||
./.git/hooks/pre-receive.sample:14: eval "value=\$GIT_PUSH_OPTION_$i"
|
||
./.git/hooks/fsmonitor-watchman.sample:35:eval {
|
||
./.git/hooks/fsmonitor-watchman.sample:153: eval { launch_watchman() };
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/ntlmpool.py:38: pw is the password for the user.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/ntlmpool.py:108: raise Exception("Server rejected request: wrong username or password")
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:15:- Usernames and passwords for the SOCKS proxy
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:32:When connecting to a SOCKS5 proxy the ``username`` and ``password`` portion
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:33:of the ``proxy_url`` will be sent as the username/password to authenticate
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:38: proxy_url="socks5h://<username>:<password>@proxy-host"
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:102: proxy_password=self._socks_options["password"],
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:174: password=None,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:181: if username is None and password is None and parsed.auth is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:184: username, password = split
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/socks.py:207: "password": password,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/pyopenssl.py:473: def load_cert_chain(self, certfile, keyfile=None, password=None):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/pyopenssl.py:475: if password is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/pyopenssl.py:476: if not isinstance(password, six.binary_type):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/pyopenssl.py:477: password = password.encode("utf-8")
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/pyopenssl.py:478: self._ctx.set_passwd_cb(lambda *_: password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/securetransport.py:414: trust_result = self._evaluate_trust(trust_bundle)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/securetransport.py:433: def _evaluate_trust(self, trust_bundle):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/securetransport.py:872: def load_cert_chain(self, certfile, keyfile=None, password=None):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/securetransport.py:875: self._client_cert_passphrase = password
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:10:import base64
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:159: base64.b64decode(match.group(1)) for match in _PEM_CERTS_RE.finditer(pem_bundle)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:215: credentials. This keychain uses a one-time password and a temporary file to
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:226: # This filename will be 8 random bytes expanded into base64. We also need
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:227: # some random bytes to password-protect the keychain we're creating, so we
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:230: filename = base64.b16encode(random_bytes[:8]).decode("utf-8")
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:231: password = base64.b16encode(random_bytes[8:]) # Must be valid UTF-8
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/contrib/_securetransport/low_level.py:239: keychain_path, len(password), password, False, None, ctypes.byref(keychain)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/url.py:146: >>> Url('http', 'username:password', 'host.com', 80,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/url.py:148: 'http://username:password@host.com:80/path?query#fragment'
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:110:# insecure ciphers for security reasons.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:375: key_password=None,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:394: :param key_password:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:395: Optional password if the keyfile is encrypted.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:422: if keyfile and key_password is None and _is_key_file_encrypted(keyfile):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:423: raise SSLError("Client private key is encrypted, password is required")
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:426: if key_password is None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/ssl_.py:429: context.load_cert_chain(certfile, keyfile, key_password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/request.py:3:from base64 import b64encode
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/request.py:45: Colon-separated username:password string for 'authorization: basic ...'
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/util/request.py:49: Colon-separated username:password string for 'proxy-authorization: basic ...'
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connectionpool.py:925: ``ca_cert_dir``, ``ssl_version``, ``key_password`` are only used if :mod:`ssl`
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connectionpool.py:948: key_password=None,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connectionpool.py:975: self.key_password = key_password
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connectionpool.py:991: key_password=self.key_password,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connectionpool.py:1047: key_password=self.key_password,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connection.py:308: key_password=None,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connection.py:320: self.key_password = key_password
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connection.py:333: key_password=None,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connection.py:354: self.key_password = key_password
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/connection.py:423: key_password=self.key_password,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/poolmanager.py:36: "key_password",
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/poolmanager.py:52: "key_key_password", # str
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/urllib3/packages/backports/weakref_finalize.py:21: first time the finalizer is called it evaluates func(*arg, **kwargs)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/metadata.py:813: :param env: An optional environment for marker evaluation.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:816: username = password = None
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:822: username, password = prefix.split(':', 1)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:825: if password:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:826: password = unquote(password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:827: return username, password, netloc
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:1829: ('password', None)):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:1851: 'password': config.get(server, 'password'),
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:1858: def update(self, username, password):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:1866: config.set('pypi', 'password', password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/util.py:1879: PyPIRCFile().update(index.username, index.password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:46: This class is used to evaluate marker expressions.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:64: def evaluate(self, expr, context):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:86: lhs = self.evaluate(elhs, context)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:87: rhs = self.evaluate(erhs, context)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:141:evaluator = Evaluator()
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/markers.py:162: return evaluator.evaluate(expr, context)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/database.py:10:import base64
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/database.py:519: digest = base64.urlsafe_b64encode(digest).rstrip(b'=').decode('ascii')
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:49: self.password_handler = None
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:55: # prompting for passwords
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:77: ``username``, ``password``, ``realm`` and ``url`` attributes from the
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:83: self.password = cfg.get('password')
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:90: ``password`` attributes before calling this method.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:98: Check that ``username`` and ``password`` have been set, and raise an
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:101: if self.username is None or self.password is None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:102: raise DistlibException('username and password must be set')
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:105: pm.add_password(self.realm, netloc, self.username, self.password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:106: self.password_handler = HTTPBasicAuthHandler(pm)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:146: def get_sign_command(self, filename, signer, sign_password, keystore=None): # pragma: no cover
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:152: :param sign_password: The passphrase for the signer's
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:165: if sign_password is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:209: def sign_file(self, filename, signer, sign_password, keystore=None): # pragma: no cover
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:215: :param sign_password: The passphrase for the signer's
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:223: cmd, sig_file = self.get_sign_command(filename, signer, sign_password,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:226: sign_password.encode('utf-8'))
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:232: def upload_file(self, metadata, filename, signer=None, sign_password=None,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:241: :param sign_password: The passphrase for the signer's
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:265: sig_file = self.sign_file(filename, signer, sign_password,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:431: 'retrieval incomplete: got only %d out of %d bytes'
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:451: if self.password_handler:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/index.py:452: handlers.append(self.password_handler)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/wheel.py:9:import base64
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/distlib/wheel.py:336: result = base64.urlsafe_b64encode(result).rstrip(b'=').decode('ascii')
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_windows.py:75: ("dwUrlRetrievalTimeout", DWORD),
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_windows.py:186: ("dwUrlRetrievalTimeout", DWORD),
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:494: # 1: "Trust evaluation succeeded",
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:518: sec_trust_eval_result = Security.SecTrustEvaluateWithError(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:521: # sec_trust_eval_result is a bool (0 or 1)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:523: if sec_trust_eval_result == 1:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:525: elif sec_trust_eval_result == 0:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_macos.py:529: f"Unknown result from Security.SecTrustEvaluateWithError: {sec_trust_eval_result!r}"
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_api.py:160: password: _PasswordType | None = None,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/truststore/_api.py:163: certfile=certfile, keyfile=keyfile, password=password
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/sessions.py:303: """This method re-evaluates the proxy configuration by considering the
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/sessions.py:322: username, password = get_auth_from_url(new_proxies[scheme])
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/sessions.py:324: username, password = None, None
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/sessions.py:328: if not scheme.startswith("https") and username and password:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/sessions.py:329: headers["Proxy-Authorization"] = _basic_auth_str(username, password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:14:from base64 import b64encode
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:25:def _basic_auth_str(username, password):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:45: if not isinstance(password, basestring):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:47: "Non-string passwords will no longer be supported in Requests "
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:50: "problems.".format(type(password)),
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:53: password = str(password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:59: if isinstance(password, str):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:60: password = password.encode("latin1")
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:63: b64encode(b":".join((username, password))).strip()
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:79: def __init__(self, username, password):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:81: self.password = password
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:87: self.password == getattr(other, "password", None),
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:95: r.headers["Authorization"] = _basic_auth_str(self.username, self.password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:103: r.headers["Proxy-Authorization"] = _basic_auth_str(self.username, self.password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:110: def __init__(self, username, password):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:112: self.password = password
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:189: A1 = f"{self.username}:{realm}:{self.password}"
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/auth.py:309: self.password == getattr(other, "password", None),
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/adapters.py:281: username, password = get_auth_from_url(proxy)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/adapters.py:285: password=password,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/adapters.py:606: username, password = get_auth_from_url(proxy)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/adapters.py:609: headers["Proxy-Authorization"] = _basic_auth_str(username, password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/utils.py:241: # Return with login / password
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/utils.py:1014: username,password.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/requests/utils.py:1021: auth = (unquote(parsed.username), unquote(parsed.password))
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:68: 'evaluate_forward_ref',
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1020: # TODO: Use inspect.VALUE here, and make the annotations lazily evaluated
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1300: (unless you are familiar with how eval() and exec() work). The
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1323: # In 3.8 eval_type does not flatten Optional[ForwardRef] correctly
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1391: original_evaluated = typing._eval_type(original_value, globalns, localns)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1392: if sys.version_info < (3, 9) and get_origin(original_evaluated) is Union:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1394: original_evaluated = Union[original_evaluated.__args__]
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1396: # value might be cached by typing._tp_cache contrary to original_evaluated
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1397: if original_evaluated != value or (
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1400: and isinstance(original_evaluated, _types.UnionType)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:1403: hints[name] = original_evaluated
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:2356: """A special form representing the value that results from the evaluation
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:2388: doc="""A special form representing the value that results from the evaluation
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:3568: # TODO: Use inspect.VALUE here, and make the annotations lazily evaluated
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4163: def get_annotations(obj, *, globals=None, locals=None, eval_str=False,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4202: if eval_str and format is not Format.VALUE:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4203: raise ValueError("eval_str=True is only supported with format=Format.VALUE")
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4252: if not eval_str:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4279: # as a way of emulating annotation scopes when calling `eval()`
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4284: value if not isinstance(value, str) else eval(value, globals, locals)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4289:if hasattr(typing, "evaluate_forward_ref"):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4290: evaluate_forward_ref = typing.evaluate_forward_ref
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4292: # Implements annotationlib.ForwardRef.evaluate
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4293: def _eval_with_owner(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4296: if forward_ref.__forward_evaluated__:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4304: forward_ref.__forward_evaluated__ = True
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4331: # If we pass None to eval() below, the globals of this module are used.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4343: # as a way of emulating annotation scopes when calling `eval()`
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4348: # but `eval()` does not have a dedicated parameter for that scope.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4376: value = eval(code, globals, locals)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4377: forward_ref.__forward_evaluated__ = True
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4432: def evaluate_forward_ref(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4444: This is similar to calling the ForwardRef.evaluate() method,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4445: but unlike that method, evaluate_forward_ref() also:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4447: * Recursively evaluates forward references nested within the type hint.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4449: * Replaces type hints that evaluate to None with types.NoneType.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4458: evaluating the forward reference. This parameter must be provided (though
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4471: value = _eval_with_owner(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4484: msg = "Forward references must evaluate to types."
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4496: # Recursively evaluate the type
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4500: return evaluate_forward_ref(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4514: return typing._eval_type(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4520: return typing._eval_type(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4527: return typing._eval_type(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/typing_extensions.py:4534: return typing._eval_type(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/lexers/python.py:238: 'complex', 'delattr', 'dict', 'dir', 'divmod', 'enumerate', 'eval',
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/lexers/python.py:504: 'enumerate', 'eval', 'execfile', 'exit', 'file', 'filter', 'float',
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/lexers/python.py:894: 'dict', 'dir', 'divmod', 'enumerate', 'eval', 'execfile', 'exit',
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/lexers/python.py:1053: 'eval', 'exhaust', 'filter', 'flip', 'foldl1?', 'format', 'fst',
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/lexers/__init__.py:144: is equivalent to running eval on the input file.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pygments/formatters/__init__.py:91: this method is equivalent to running ``eval()`` on the input file. The formatter is
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/licenses/__init__.py:85: # `False` and the expression should evaluate as such.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/licenses/__init__.py:100: invalid = eval(python_expression, globals(), locals())
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/_parser.py:332: value = ast.literal_eval(python_str)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:180:def _eval_op(lhs: str, op: Op, rhs: str | AbstractSet[str]) -> bool:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:216:def _evaluate_markers(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:225: groups[-1].append(_evaluate_markers(marker, environment))
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:239: groups[-1].append(_eval_op(lhs_value, op, rhs_value))
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:315: def evaluate(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:322: Return the boolean from evaluating the given marker against the
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:325: context the markers are being evaluated for, which influences what markers
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/markers.py:347: return _evaluate_markers(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/packaging/tags.py:56: # The __hash__ of every single element in a Set[Tag] will be evaluated each time
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/cachecontrol/controller.py:99: "must-revalidate": (None, False),
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/cachecontrol/controller.py:102: "proxy-revalidate": (None, False),
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:274: 'evaluate_marker',
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1117: evaluation. Otherwise, return True.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1119: extra_evals = (
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1120: req.marker.evaluate({'extra': extra})
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1123: return not req.marker or any(extra_evals)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1443: If the default extraction path is overridden and set to an insecure
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1446: if a known insecure location is used.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1610: evaluate_marker(text)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1618:def evaluate_marker(text: str, extra: str | None = None) -> bool:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:1628: return marker.evaluate()
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:3052: invalid_marker(marker) or not evaluate_marker(marker)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/pkg_resources/__init__.py:3383: if not req.marker or req.marker.evaluate({'extra': extra}):
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/logging.py:281: log.warning("password was rejected for admin site.")
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/markup.py:2:from ast import literal_eval
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/markup.py:190: meta_params = literal_eval(parameters)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/console.py:2140: password: bool = False,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/console.py:2151: password: (bool, optional): Hide typed text. Defaults to False.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/console.py:2159: if password:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/_emoji_codes.py:156: "japanese_secret_button": "㊙",
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/_emoji_codes.py:2882: "secret": "㊙",
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:37: password (bool, optional): Enable password input. Defaults to False.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:59: password: bool = False,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:71: self.password = password
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:85: password: bool = False,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:102: password: bool = False,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:117: password: bool = False,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:133: password (bool, optional): Enable password input. Defaults to False.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:143: password=password,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:198: password: bool,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:206: password (bool): Enable password entry.
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:211: return console.input(prompt, password=password, stream=stream)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:292: value = self.get_input(self.console, prompt, self.password, stream=stream)
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:380: password = Prompt.ask(
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:381: "Please enter a password [cyan](must be at least 5 characters)",
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:382: password=True,
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:384: if len(password) >= 5:
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:386: print("[prompt.invalid]password too short")
|
||
./venv_test/lib/python3.13/site-packages/pip/_vendor/rich/prompt.py:387: print(f"password={password!r}")
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/metadata/importlib/_dists.py:225: elif not extras and req.marker.evaluate({"extra": ""}):
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/metadata/importlib/_dists.py:227: elif any(req.marker.evaluate(context) for context in contexts):
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/cli/parser.py:213: late_eval = set()
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/cli/parser.py:253: late_eval.add(option.dest)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/cli/parser.py:265: for key in late_eval:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/resolution/legacy/resolver.py:206: :param extras_requested: an iterable of extras used to evaluate the
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/resolution/legacy/resolver.py:448: # satisfied_by is only evaluated by calling _check_skip_installed,
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/req/req_install.py:282: # Provide an extra to safely evaluate the markers
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/req/req_install.py:287: self.markers.evaluate({"extra": extra}) for extra in extras_requested
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/models/direct_url.py:180: """url with user:password part removed unless it is formed with
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/models/link.py:417: # includes a username and password.
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/models/installation_report.py:50: # TODO: currently, the resolver uses the default environment to evaluate
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/exceptions.py:703: # can always be re-evaluated when a vendor proposes a new alternative.
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/build_env.py:186: # We're explicitly evaluating with an empty extra value, since build
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/build_env.py:188: if req.marker is not None and not req.marker.evaluate({"extra": ""}):
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:121: Responsible for evaluating links for a particular project.
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:145: evaluating link compatibility. This is used, for example, to
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:167: def evaluate_link(self, link: Link) -> Tuple[LinkType, str]:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:172: representing whether the evaluation found a candidate, or the reason
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:722: def make_link_evaluator(self, project_name: str) -> LinkEvaluator:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:760: self, link_evaluator: LinkEvaluator, link: Link
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:766: result, detail = link_evaluator.evaluate_link(link)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:773: name=link_evaluator.project_name,
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:780: def evaluate_links(
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:781: self, link_evaluator: LinkEvaluator, links: Iterable[Link]
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:788: candidate = self.get_install_candidate(link_evaluator, link)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:795: self, project_url: Link, link_evaluator: LinkEvaluator
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:808: package_links = self.evaluate_links(
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:809: link_evaluator,
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:821: See LinkEvaluator.evaluate_link() for details on which files
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:827: link_evaluator = self.make_link_evaluator(project_name)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:833: link_evaluator=link_evaluator,
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:851: file_candidates = self.evaluate_links(
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:852: link_evaluator,
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:872: def make_candidate_evaluator(
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:907: candidate_evaluator = self.make_candidate_evaluator(
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/index/package_finder.py:913: candidate_evaluator.compute_best_candidate(candidates)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/operations/install/wheel.py:14:from base64 import urlsafe_b64encode
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/operations/check.py:93: missed = req.marker.evaluate({"extra": ""})
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/mercurial.py:65: config.set("paths", "default", url.secret)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:79: --username and --password options instead of via the URL.
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:82: # The --username and --password options can't be used for
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:98: username: Optional[str], password: Optional[HiddenText]
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:103: if password:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:104: extra_args += ["--password", password]
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:161: # is being used to prompt for passwords, because passwords
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:195: # None: Not evaluated yet.
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/subversion.py:270: # the user can be prompted for a password, if required.
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:370: information can be provided via the --username and --password options
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:374: Returns: (netloc, (username, password)).
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:384: Returns: (url, rev, (username, password)).
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:410: username: Optional[str], password: Optional[HiddenText]
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:422: secret_url, rev, user_pass = self.get_url_rev_and_auth(url.secret)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:423: username, secret_password = user_pass
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:424: password: Optional[HiddenText] = None
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:425: if secret_password is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:426: password = hide_value(secret_password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:427: extra_args = self.make_rev_args(username, password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:430: return hide_url(secret_url), rev_options
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/vcs/versioncontrol.py:508: if self.compare_urls(existing_url, url.secret):
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:246:def ask_password(message: str) -> str:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:247: """Ask for a password interactively."""
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:437: Returns: (netloc, (username, password)).
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:444: # the password attribute of urlsplit()'s return value).
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:450: # using the password attribute of the return value)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:470: netloc, (user, password) = split_auth_from_netloc(netloc)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:473: if password is None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:475: password = ""
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:478: password = ":****"
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:479: return f"{user}{password}@{netloc}"
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:516: Returns: (url_without_auth, netloc, (username, password))
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:523: """Return a copy of url with 'username:password@' removed."""
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:530: """Replace the password in a given url with ****."""
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:535: """Replace the password in a given requirement url with ****."""
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:543: secret: str
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/misc.py:559: return self.secret == other.secret
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/subprocess.py:53: return [arg.secret if isinstance(arg, HiddenText) else arg for arg in args]
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/utils/wheel.py:72: # and RuntimeError for password-protected files
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/session.py:374: insecure_adapter = InsecureHTTPAdapter(max_retries=retries)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/session.py:378: # we can't validate the response of an insecurely/untrusted fetched
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/session.py:393: self._trusted_host_adapter = insecure_adapter
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/session.py:396: self.mount("http://", insecure_adapter)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:28: ask_password,
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:42: password: str
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:56: def save_auth_info(self, url: str, username: str, password: str) -> None: ...
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:67: def save_auth_info(self, url: str, username: str, password: str) -> None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:89: return cred.username, cred.password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:93: logger.debug("Getting password from keyring for %s", url)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:94: password = self.keyring.get_password(url, username)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:95: if password:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:96: return username, password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:99: def save_auth_info(self, url: str, username: str, password: str) -> None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:100: self.keyring.set_password(url, username, password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:121: password = self._get_password(url, username)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:122: if password is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:123: return username, password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:126: def save_auth_info(self, url: str, username: str, password: str) -> None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:127: return self._set_password(url, username, password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:129: def _get_password(self, service_name: str, username: str) -> Optional[str]:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:130: """Mirror the implementation of keyring.get_password using cli"""
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:147: def _set_password(self, service_name: str, username: str, password: str) -> None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:148: """Mirror the implementation of keyring.set_password using cli"""
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:155: input=f"{password}{os.linesep}".encode(),
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:234: self.passwords: Dict[str, AuthInfo] = {}
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:293: The provided url should have had its username and password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:344: url, netloc, url_user_password = split_auth_netloc_from_url(
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:349: username, password = url_user_password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:350: if username is not None and password is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:352: return url_user_password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:360: index_url, _, index_url_user_password = index_info
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:364: if index_url and index_url_user_password[0] is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:365: username, password = index_url_user_password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:366: if username is not None and password is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:368: return index_url_user_password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:377: # If we don't have a password and keyring is available, use it.
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:390: return username, password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:400: Returns (url_without_credentials, username, password). Note
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:402: function may return a different username and password.
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:407: username, password = self._get_new_credentials(original_url)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:410: # Do this if either the username or the password is missing.
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:412: # the username in the index url, but the password comes from keyring.
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:413: if (username is None or password is None) and netloc in self.passwords:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:414: un, pw = self.passwords[netloc]
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:418: username, password = un, pw
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:420: if username is not None or password is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:421: # Convert the username and password if they're None, so that
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:426: password = password or ""
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:429: self.passwords[netloc] = (username, password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:433: (username is not None and password is not None)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:435: or (username is None and password is None)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:438: return url, username, password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:442: url, username, password = self._get_url_and_credentials(req.url)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:447: if username is not None and password is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:449: req = HTTPBasicAuth(username, password)(req)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:457: def _prompt_for_password(
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:467: password = ask_password("Password: ")
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:468: return username, password, True
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:471: def _should_save_password_to_keyring(self) -> bool:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:486: username, password = None, None
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:490: username, password = self._get_new_credentials(
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:497: if not self.prompting and not username and not password:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:502: # Prompt the user for a new username and password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:504: if not username and not password:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:505: username, password, save = self._prompt_for_password(parsed.netloc)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:507: # Store the new username and password to use for future requests
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:509: if username is not None and password is not None:
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:510: self.passwords[parsed.netloc] = (username, password)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:512: # Prompt to save the password to keyring
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:513: if save and self._should_save_password_to_keyring():
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:517: password=password,
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:527: # Add our new username and password to the request
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:528: req = HTTPBasicAuth(username or "", password or "")(resp.request)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/network/auth.py:563: creds.url, creds.username, creds.password
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/commands/list.py:258: evaluator = finder.make_candidate_evaluator(
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/commands/list.py:261: best_candidate = evaluator.sort_best_candidate(all_candidates)
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/commands/completion.py:31: if [[ $zsh_eval_context[-1] == loadautofunc ]]; then
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/commands/completion.py:35: # eval/source/. command, register function for later
|
||
./venv_test/lib/python3.13/site-packages/pip/_internal/commands/completion.py:48: set completions (eval $COMP_WORDS[1])
|
||
./src/tools/tool_automation.c:69: struct timeval tv;
|
||
./src/tools/tool_network.c:116: struct timeval tv = {0, 100000}; // 100ms
|
||
./src/tools/tool_network.c:272: struct timeval tv;
|
||
./src/tools/tool_dns.c:133: struct timeval tv;
|
||
./src/tools/tool_dns.c:228: struct timeval tv;
|
||
./test_results/T03_output.txt:1:TASK: Perform a security audit of the current directory using your tools. Look for insecure patterns and save findings to 'security_scan.txt'.
|
||
./test_results/T03_output.txt:8:[1;34m[Agent] Spawning security agent for: Perform a security audit of the current directory, looking for insecure patterns, vulnerabilities, or misconfigurations.[0m
|
||
./test_results/T03_output.txt:2833:The security audit of the current directory has been completed. The findings, including potential risks such as exposure of the [33m.git[0m directory, insecure file permissions, hardcoded secrets, and vulnerable scripts, have been compiled and saved to [33msecurity_scan.txt[0m.
|
||
./test_results/T10_output.txt:89: | 41 [32m+[0m [32m### Retrieval [0m
|
||
./CODE_DOCS.md:41:### Retrieval
|
||
./agent_benchmark.py:207: "Perform a security audit of the current directory using your tools. Look for insecure patterns and save findings to 'security_scan.txt'.", v03))
|
||
./security_recommendations.txt:1:Security Audit Summary and Recommendations:\n\nScope:\n- Recursive scan for insecure patterns in current directory.\n- Review of key source code files for hardcoded secrets or vulnerabilities.\n\nFindings:\n- No hardcoded secrets or sensitive information found in the reviewed snippets.\n- Insecure patterns were detected in source code and configuration files, but no immediate secrets were identified.\n- The codebase appears to follow good practices by retrieving secrets from external sources rather than hardcoding.\n\nRecommendations:\n- Use environment variables or secret management tools for storing API keys and secrets.\n- Conduct a thorough review of the entire codebase for any hidden secrets.\n- Implement strict access controls on configuration and secret files.\n- Enable logging and monitoring for secret access.\n- Follow secure coding practices to prevent secret exposure.\n\nThis concludes the security audit.
|
||
./benchmark_results.log:418: | 41 [32m+[0m [32m### Retrieval [0m
|
||
./benchmark_results.log:1697:Task: Perform a security audit of the current directory using your tools. Look for insecure patterns and save findings to 'security_scan.txt'.
|
||
./benchmark_results.log:1703:[1;34m[Agent] Spawning security agent for: Perform a security audit of the current directory using your tools. Look for insecure patterns and save findings to 'security_scan.txt'.[0m
|
||
./benchmark_results.log:1704:[1;34m[Agent] Spawning security agent for: Perform a security audit of the current directory, looking for insecure patterns, vulnerabilities, and misconfigurations. Save the detailed findings to 'security_scan.txt'.[0m
|
||
./benchmark_results.log:1707: [2mfind . -type f -exec grep -Hn 'password\|secret\|insecure\|eval\|base64' {} \; > security_scan.txt[0m
|