paskia 0.8.0__py3-none-any.whl → 0.9.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (67) hide show
  1. paskia/_version.py +2 -2
  2. paskia/authsession.py +14 -27
  3. paskia/bootstrap.py +31 -103
  4. paskia/config.py +0 -1
  5. paskia/db/__init__.py +26 -51
  6. paskia/db/background.py +17 -37
  7. paskia/db/jsonl.py +168 -6
  8. paskia/db/migrations.py +34 -0
  9. paskia/db/operations.py +400 -723
  10. paskia/db/structs.py +214 -90
  11. paskia/fastapi/__main__.py +89 -189
  12. paskia/fastapi/admin.py +103 -162
  13. paskia/fastapi/api.py +49 -85
  14. paskia/fastapi/mainapp.py +30 -19
  15. paskia/fastapi/remote.py +16 -39
  16. paskia/fastapi/reset.py +27 -17
  17. paskia/fastapi/session.py +2 -2
  18. paskia/fastapi/user.py +21 -27
  19. paskia/fastapi/ws.py +27 -62
  20. paskia/fastapi/wschat.py +62 -0
  21. paskia/frontend-build/auth/admin/index.html +5 -5
  22. paskia/frontend-build/auth/assets/{AccessDenied-Bc249ASC.css → AccessDenied-DPkUS8LZ.css} +1 -1
  23. paskia/frontend-build/auth/assets/AccessDenied-Fmeb6EtF.js +8 -0
  24. paskia/frontend-build/auth/assets/{RestrictedAuth-DgdJyscT.css → RestrictedAuth-CvR33_Z0.css} +1 -1
  25. paskia/frontend-build/auth/assets/RestrictedAuth-DsJXicIw.js +1 -0
  26. paskia/frontend-build/auth/assets/{_plugin-vue_export-helper-rKFEraYH.js → _plugin-vue_export-helper-nhjnO_bd.js} +1 -1
  27. paskia/frontend-build/auth/assets/admin-CPE1pLMm.js +1 -0
  28. paskia/frontend-build/auth/assets/{admin-BeNu48FR.css → admin-DzzjSg72.css} +1 -1
  29. paskia/frontend-build/auth/assets/{auth-BKX7shEe.css → auth-C7k64Wad.css} +1 -1
  30. paskia/frontend-build/auth/assets/auth-YIZvPlW_.js +1 -0
  31. paskia/frontend-build/auth/assets/{forward-Dzg-aE1C.js → forward-DmqVHZ7e.js} +1 -1
  32. paskia/frontend-build/auth/assets/reset-Chtv69AT.css +1 -0
  33. paskia/frontend-build/auth/assets/reset-s20PATTN.js +1 -0
  34. paskia/frontend-build/auth/assets/{restricted-C0IQufuH.js → restricted-D3AJx3_6.js} +1 -1
  35. paskia/frontend-build/auth/index.html +5 -5
  36. paskia/frontend-build/auth/restricted/index.html +4 -4
  37. paskia/frontend-build/int/forward/index.html +4 -4
  38. paskia/frontend-build/int/reset/index.html +3 -3
  39. paskia/globals.py +2 -2
  40. paskia/migrate/__init__.py +62 -55
  41. paskia/migrate/sql.py +72 -22
  42. paskia/remoteauth.py +1 -2
  43. paskia/sansio.py +6 -12
  44. {paskia-0.8.0.dist-info → paskia-0.9.0.dist-info}/METADATA +3 -2
  45. paskia-0.9.0.dist-info/RECORD +57 -0
  46. paskia/frontend-build/auth/assets/AccessDenied-aTdCvz9k.js +0 -8
  47. paskia/frontend-build/auth/assets/RestrictedAuth-BLMK7-nL.js +0 -1
  48. paskia/frontend-build/auth/assets/admin-tVs8oyLv.js +0 -1
  49. paskia/frontend-build/auth/assets/auth-Dk3q4pNS.js +0 -1
  50. paskia/frontend-build/auth/assets/reset-BWF4cWKR.css +0 -1
  51. paskia/frontend-build/auth/assets/reset-C_Td1_jn.js +0 -1
  52. paskia/util/frontend.py +0 -75
  53. paskia/util/hostutil.py +0 -76
  54. paskia/util/htmlutil.py +0 -47
  55. paskia/util/passphrase.py +0 -20
  56. paskia/util/permutil.py +0 -43
  57. paskia/util/pow.py +0 -45
  58. paskia/util/querysafe.py +0 -11
  59. paskia/util/sessionutil.py +0 -38
  60. paskia/util/startupbox.py +0 -75
  61. paskia/util/timeutil.py +0 -47
  62. paskia/util/useragent.py +0 -10
  63. paskia/util/userinfo.py +0 -145
  64. paskia/util/wordlist.py +0 -54
  65. paskia-0.8.0.dist-info/RECORD +0 -68
  66. {paskia-0.8.0.dist-info → paskia-0.9.0.dist-info}/WHEEL +0 -0
  67. {paskia-0.8.0.dist-info → paskia-0.9.0.dist-info}/entry_points.txt +0 -0
paskia/util/permutil.py DELETED
@@ -1,43 +0,0 @@
1
- """Minimal permission helpers with '*' wildcard support (no DB expansion)."""
2
-
3
- from collections.abc import Sequence
4
- from fnmatch import fnmatchcase
5
-
6
- from paskia import db
7
- from paskia.util.hostutil import normalize_host
8
-
9
- __all__ = ["has_any", "has_all", "session_context"]
10
-
11
-
12
- def _match(perms: set[str], patterns: Sequence[str]):
13
- return (
14
- any(fnmatchcase(p, pat) for p in perms) if "*" in pat else pat in perms
15
- for pat in patterns
16
- )
17
-
18
-
19
- def _get_effective_scopes(ctx) -> set[str]:
20
- """Get effective permission scopes from context.
21
-
22
- Returns scopes from ctx.permissions (filtered by org) if available,
23
- otherwise falls back to ctx.role.permissions for backwards compatibility.
24
- """
25
- if ctx.permissions:
26
- return {p.scope for p in ctx.permissions}
27
- # Fallback for contexts without effective permissions computed
28
- return set(ctx.role.permissions or [])
29
-
30
-
31
- def has_any(ctx, patterns: Sequence[str]) -> bool:
32
- return any(_match(_get_effective_scopes(ctx), patterns)) if ctx else False
33
-
34
-
35
- def has_all(ctx, patterns: Sequence[str]) -> bool:
36
- return all(_match(_get_effective_scopes(ctx), patterns)) if ctx else False
37
-
38
-
39
- async def session_context(auth: str | None, host: str | None = None):
40
- if not auth:
41
- return None
42
- normalized_host = normalize_host(host) if host else None
43
- return db.get_session_context(auth, normalized_host)
paskia/util/pow.py DELETED
@@ -1,45 +0,0 @@
1
- """
2
- Proof of Work utility using PBKDF2-SHA512.
3
-
4
- The PoW requires finding nonces where PBKDF2(challenge, nonce) produces
5
- output with a zero first byte. Each work unit requires finding one such nonce.
6
- All valid nonces are concatenated into a solution for server verification.
7
- """
8
-
9
- import hashlib
10
- import secrets
11
-
12
- EASY = 2 # Around 0.25s
13
- NORMAL = 8 # Around 1s
14
- HARD = 32 # Around 4s
15
-
16
-
17
- def generate_challenge() -> bytes:
18
- """Generate a random 8-byte challenge."""
19
- return secrets.token_bytes(8)
20
-
21
-
22
- def verify_pow(challenge: bytes, solution: bytes, work: int = NORMAL) -> None:
23
- """Verify a Proof of Work solution.
24
-
25
- Args:
26
- challenge: 8-byte server-provided challenge
27
- solution: Concatenated 8-byte nonces (8 * work bytes)
28
- work: Number of work units expected
29
-
30
- Raises:
31
- ValueError: If the solution is invalid
32
- """
33
- if len(challenge) != 8:
34
- raise ValueError("Invalid challenge length")
35
-
36
- if len(solution) != 8 * work:
37
- raise ValueError("Invalid solution length")
38
-
39
- # Verify each work unit - check that PBKDF2 output starts with 0x00
40
- for i in range(work):
41
- nonce = solution[i * 8 : (i + 1) * 8]
42
- # Require first byte of PBKDF2-SHA512 to be zero
43
- result = hashlib.pbkdf2_hmac("sha512", challenge, nonce, 128, 2)
44
- if result[0] or result[1] & 0x07:
45
- raise ValueError("Invalid PoW solution")
paskia/util/querysafe.py DELETED
@@ -1,11 +0,0 @@
1
- import re
2
-
3
- _SAFE_RE = re.compile(r"^[A-Za-z0-9:._~-]+$")
4
-
5
-
6
- def assert_safe(value: str, *, field: str = "value") -> None:
7
- if not isinstance(value, str) or not value or not _SAFE_RE.match(value):
8
- raise ValueError(f"{field} must match ^[A-Za-z0-9:._~-]+$")
9
-
10
-
11
- __all__ = ["assert_safe"]
@@ -1,38 +0,0 @@
1
- """Utility functions for session validation and checking."""
2
-
3
- from datetime import datetime, timezone
4
-
5
- from paskia.authsession import EXPIRES
6
- from paskia.db import SessionContext
7
- from paskia.util.timeutil import parse_duration
8
-
9
-
10
- def check_session_age(ctx: SessionContext, max_age: str | None) -> bool:
11
- """Check if a session satisfies the max_age requirement.
12
-
13
- Uses the credential's last_used timestamp to determine authentication age,
14
- since session renewal can happen without re-authentication.
15
-
16
- Args:
17
- ctx: The session context containing session and credential info
18
- max_age: Maximum age string (e.g., "5m", "1h", "30s") or None
19
-
20
- Returns:
21
- True if authentication is recent enough or max_age is None, False if too old
22
-
23
- Raises:
24
- ValueError: If max_age format is invalid
25
- """
26
- if not max_age:
27
- return True
28
-
29
- max_age_delta = parse_duration(max_age)
30
-
31
- # Use credential's last_used time if available, fall back to session renewed time
32
- if ctx.credential and ctx.credential.last_used:
33
- auth_time = ctx.credential.last_used
34
- else:
35
- auth_time = ctx.session.expiry - EXPIRES
36
-
37
- time_since_auth = datetime.now(timezone.utc) - auth_time
38
- return time_since_auth <= max_age_delta
paskia/util/startupbox.py DELETED
@@ -1,75 +0,0 @@
1
- """Startup configuration box formatting utilities."""
2
-
3
- import os
4
- from sys import stderr
5
- from typing import TYPE_CHECKING
6
-
7
- from paskia._version import __version__
8
-
9
- if TYPE_CHECKING:
10
- from paskia.config import PaskiaConfig
11
-
12
- BOX_WIDTH = 60 # Inner width (excluding box chars)
13
-
14
-
15
- def line(text: str = "") -> str:
16
- """Format a line inside the box with proper padding, truncating if needed."""
17
- if len(text) > BOX_WIDTH:
18
- text = text[: BOX_WIDTH - 1] + "…"
19
- return f"┃ {text:<{BOX_WIDTH}} ┃\n"
20
-
21
-
22
- def top() -> str:
23
- return "┏" + "━" * (BOX_WIDTH + 2) + "┓\n"
24
-
25
-
26
- def bottom() -> str:
27
- return "┗" + "━" * (BOX_WIDTH + 2) + "┛\n"
28
-
29
-
30
- def print_startup_config(config: "PaskiaConfig") -> None:
31
- """Print server configuration on startup."""
32
- lines = [top()]
33
- lines.append(line(" ▄▄▄▄▄"))
34
- lines.append(line("█ █ Paskia " + __version__))
35
- lines.append(line("█ █▄▄▄▄▄▄▄▄▄▄▄▄"))
36
- lines.append(line("█ █▀▀▀▀█▀▀█▀▀█ " + config.site_url + config.site_path))
37
- lines.append(line(" ▀▀▀▀▀"))
38
-
39
- # Format auth host section
40
- if config.auth_host:
41
- lines.append(line(f"Auth Host: {config.auth_host}"))
42
-
43
- # Show frontend URL if in dev mode
44
- devmode = os.environ.get("PASKIA_DEVMODE")
45
- if devmode:
46
- lines.append(line(f"Dev Frontend: {devmode}"))
47
-
48
- # Format listen address with scheme
49
- if config.uds:
50
- listen = f"unix:{config.uds}"
51
- elif config.host:
52
- listen = f"http://{config.host}:{config.port}"
53
- else:
54
- listen = f"http://0.0.0.0:{config.port} + [::]:{config.port}"
55
- lines.append(line(f"Backend: {listen}"))
56
-
57
- # Relying Party line (omit name if same as id)
58
- rp_id = config.rp_id
59
- rp_name = config.rp_name
60
- if rp_name and rp_name != rp_id:
61
- lines.append(line(f"Relying Party: {rp_id} ({rp_name})"))
62
- else:
63
- lines.append(line(f"Relying Party: {rp_id}"))
64
-
65
- # Format origins section
66
- allowed = config.origins
67
- if allowed:
68
- lines.append(line("Permitted Origins:"))
69
- for origin in sorted(allowed):
70
- lines.append(line(f" - {origin}"))
71
- else:
72
- lines.append(line(f"Origin: {rp_id} and all subdomains allowed"))
73
-
74
- lines.append(bottom())
75
- stderr.write("".join(lines))
paskia/util/timeutil.py DELETED
@@ -1,47 +0,0 @@
1
- """Utility functions for parsing time durations."""
2
-
3
- import re
4
- from datetime import timedelta
5
-
6
-
7
- def parse_duration(duration_str: str) -> timedelta:
8
- """Parse a duration string into a timedelta.
9
-
10
- Supports units: s, m, min, h, d
11
- Examples: "30s", "5m", "5min", "2h", "1d"
12
-
13
- Args:
14
- duration_str: A string like "30s", "5m", "2h"
15
-
16
- Returns:
17
- A timedelta object
18
-
19
- Raises:
20
- ValueError: If the format is invalid
21
- """
22
- duration_str = duration_str.strip().lower()
23
-
24
- # Pattern matches: number + unit
25
- # Units: s (seconds), m/min (minutes), h (hours), d (days)
26
- pattern = r"^(\d+(?:\.\d+)?)(s|m|min|h|d)$"
27
- match = re.match(pattern, duration_str)
28
-
29
- if not match:
30
- raise ValueError(
31
- f"Invalid duration format: '{duration_str}'. "
32
- "Expected format like '30s', '5m', '5min', '2h', or '1d'"
33
- )
34
-
35
- value = float(match.group(1))
36
- unit = match.group(2)
37
-
38
- if unit == "s":
39
- return timedelta(seconds=value)
40
- elif unit in ("m", "min"):
41
- return timedelta(minutes=value)
42
- elif unit == "h":
43
- return timedelta(hours=value)
44
- elif unit == "d":
45
- return timedelta(days=value)
46
- else:
47
- raise ValueError(f"Unsupported time unit: {unit}")
paskia/util/useragent.py DELETED
@@ -1,10 +0,0 @@
1
- import user_agents
2
-
3
-
4
- def compact_user_agent(ua: str | None) -> str:
5
- if not ua:
6
- return "-"
7
- u = user_agents.parse(ua)
8
- ver = u.browser.version_string.split(".")[0]
9
- dev = u.device.family if u.device.family not in ["Other", "Mac"] else ""
10
- return f"{u.browser.family}/{ver} {u.os.family} {dev}".strip()
paskia/util/userinfo.py DELETED
@@ -1,145 +0,0 @@
1
- """User information formatting and retrieval logic."""
2
-
3
- from datetime import timezone
4
-
5
- from paskia import aaguid, db
6
- from paskia.authsession import EXPIRES
7
- from paskia.util import hostutil, permutil, useragent
8
-
9
-
10
- def _format_datetime(dt):
11
- """Format a datetime object to ISO 8601 string with UTC timezone."""
12
- if dt is None:
13
- return None
14
- if dt.tzinfo:
15
- return dt.astimezone(timezone.utc).isoformat().replace("+00:00", "Z")
16
- else:
17
- return dt.replace(tzinfo=timezone.utc).isoformat().replace("+00:00", "Z")
18
-
19
-
20
- async def format_user_info(
21
- *,
22
- user_uuid,
23
- auth: str,
24
- session_record,
25
- request_host: str | None,
26
- ) -> dict:
27
- """Format complete user information for authenticated users.
28
-
29
- Args:
30
- user_uuid: UUID of the user to fetch information for
31
- auth: Authentication token
32
- session_record: Current session record
33
- request_host: Host header from the request
34
-
35
- Returns:
36
- Dictionary containing formatted user information including:
37
- - User details
38
- - Organization and role information
39
- - Credentials list
40
- - Sessions list
41
- - Permissions
42
- """
43
- u = db.get_user_by_uuid(user_uuid)
44
- ctx = await permutil.session_context(auth, request_host)
45
-
46
- # Fetch and format credentials
47
- user_credentials = db.get_credentials_by_user_uuid(user_uuid)
48
- credentials: list[dict] = []
49
- user_aaguids: set[str] = set()
50
-
51
- for c in user_credentials:
52
- aaguid_str = str(c.aaguid)
53
- user_aaguids.add(aaguid_str)
54
- credentials.append(
55
- {
56
- "credential_uuid": str(c.uuid),
57
- "aaguid": aaguid_str,
58
- "created_at": _format_datetime(c.created_at),
59
- "last_used": _format_datetime(c.last_used),
60
- "last_verified": _format_datetime(c.last_verified),
61
- "sign_count": c.sign_count,
62
- "is_current_session": session_record.credential_uuid == c.uuid,
63
- }
64
- )
65
-
66
- credentials.sort(key=lambda cred: cred["created_at"])
67
- aaguid_info = aaguid.filter(user_aaguids)
68
-
69
- # Format role and org information
70
- role_info = None
71
- org_info = None
72
- effective_permissions: list[str] = []
73
-
74
- if ctx:
75
- role_info = {
76
- "uuid": str(ctx.role.uuid),
77
- "display_name": ctx.role.display_name,
78
- "permissions": ctx.role.permissions,
79
- }
80
- org_info = {
81
- "uuid": str(ctx.org.uuid),
82
- "display_name": ctx.org.display_name,
83
- "permissions": ctx.org.permissions,
84
- }
85
- effective_permissions = [p.scope for p in (ctx.permissions or [])]
86
-
87
- # Format sessions
88
- normalized_request_host = hostutil.normalize_host(request_host)
89
- session_records = db.list_sessions_for_user(user_uuid)
90
- current_session_key = auth
91
- sessions_payload: list[dict] = []
92
-
93
- for entry in session_records:
94
- sessions_payload.append(
95
- {
96
- "id": entry.key,
97
- "credential_uuid": str(entry.credential_uuid),
98
- "host": entry.host,
99
- "ip": entry.ip,
100
- "user_agent": useragent.compact_user_agent(entry.user_agent),
101
- "last_renewed": _format_datetime(entry.expiry - EXPIRES),
102
- "is_current": entry.key == current_session_key,
103
- "is_current_host": bool(
104
- normalized_request_host
105
- and entry.host
106
- and entry.host == normalized_request_host
107
- ),
108
- }
109
- )
110
-
111
- return {
112
- "authenticated": True,
113
- "user": {
114
- "user_uuid": str(u.uuid),
115
- "user_name": u.display_name,
116
- "created_at": _format_datetime(u.created_at),
117
- "last_seen": _format_datetime(u.last_seen),
118
- "visits": u.visits,
119
- },
120
- "org": org_info,
121
- "role": role_info,
122
- "permissions": effective_permissions,
123
- "credentials": credentials,
124
- "aaguid_info": aaguid_info,
125
- "sessions": sessions_payload,
126
- }
127
-
128
-
129
- async def format_reset_user_info(user_uuid, reset_token) -> dict:
130
- """Format minimal user information for reset token requests.
131
-
132
- Args:
133
- user_uuid: UUID of the user
134
- reset_token: Reset token record
135
-
136
- Returns:
137
- Dictionary with minimal user info for password reset flow
138
- """
139
- u = db.get_user_by_uuid(user_uuid)
140
-
141
- return {
142
- "authenticated": False,
143
- "session_type": reset_token.token_type,
144
- "user": {"user_uuid": str(u.uuid), "user_name": u.display_name},
145
- }
paskia/util/wordlist.py DELETED
@@ -1,54 +0,0 @@
1
- # A custom list of 1024 common 3-6 letter words, with unique 3-prefixes and no prefix words, entropy 2.1b/letter 10b/word
2
- words: list = """
3
- able about absent abuse access acid across act adapt add adjust admit adult advice affair afraid again age agree ahead
4
- aim air aisle alarm album alert alien all almost alone alpha also alter always amazed among amused anchor angle animal
5
- ankle annual answer any apart appear april arch are argue army around array art ascent ash ask aspect assume asthma atom
6
- attack audit august aunt author avoid away awful axis baby back bad bag ball bamboo bank bar base battle beach become
7
- beef before begin behind below bench best better beyond bid bike bind bio birth bitter black bleak blind blood blue
8
- board body boil bomb bone book border boss bottom bounce bowl box boy brain bread bring brown brush bubble buck budget
9
- build bulk bundle burden bus but buyer buzz cable cache cage cake call came can car case catch cause cave celery cement
10
- census cereal change check child choice chunk cigar circle city civil class clean client close club coast code coffee
11
- coil cold come cool copy core cost cotton couch cover coyote craft cream crime cross cruel cry cube cue cult cup curve
12
- custom cute cycle dad damage danger daring dash dawn day deal debate decide deer define degree deity delay demand denial
13
- depth derive design detail device dial dice die differ dim dinner direct dish divert dizzy doctor dog dollar domain
14
- donate door dose double dove draft dream drive drop drum dry duck dumb dune during dust dutch dwarf eager early east
15
- echo eco edge edit effort egg eight either elbow elder elite else embark emerge emily employ enable end enemy engine
16
- enjoy enlist enough enrich ensure entire envy equal era erode error erupt escape essay estate ethics evil evoke exact
17
- excess exist exotic expect extent eye fabric face fade faith fall family fan far father fault feel female fence fetch
18
- fever few fiber field figure file find first fish fit fix flat flesh flight float fluid fly foam focus fog foil follow
19
- food force fossil found fox frame fresh friend frog fruit fuel fun fury future gadget gain galaxy game gap garden gas
20
- gate gauge gaze genius ghost giant gift giggle ginger girl give glass glide globe glue goal god gold good gospel govern
21
- gown grant great grid group grunt guard guess guide gulf gun gym habit hair half hammer hand happy hard hat have hawk
22
- hay hazard head hedge height help hen hero hidden high hill hint hip hire hobby hockey hold home honey hood hope horse
23
- host hotel hour hover how hub huge human hungry hurt hybrid ice icon idea idle ignore ill image immune impact income
24
- index infant inhale inject inmate inner input inside into invest iron island issue italy item ivory jacket jaguar james
25
- jar jazz jeans jelly jewel job joe joke joy judge juice july jump june just kansas kate keep kernel key kick kid kind
26
- kiss kit kiwi knee knife know labor lady lag lake lamp laptop large later laugh lava law layer lazy leader left legal
27
- lemon length lesson letter level liar libya lid life light like limit line lion liquid list little live lizard load
28
- local logic long loop lost loud love low loyal lucky lumber lunch lust luxury lyrics mad magic main major make male
29
- mammal man map market mass matter maze mccoy meadow media meet melt member men mercy mesh method middle milk mimic mind
30
- mirror miss mix mobile model mom monkey moon more mother mouse move much muffin mule must mutual myself myth naive name
31
- napkin narrow nasty nation near neck need nephew nerve nest net never news next nice night noble noise noodle normal
32
- nose note novel now number nurse nut oak obey object oblige obtain occur ocean odor off often oil okay old olive omit
33
- once one onion online open opium oppose option orange orbit order organ orient orphan other outer oval oven own oxygen
34
- oyster ozone pact paddle page pair palace panel paper parade past path pause pave paw pay peace pen people pepper permit
35
- pet philip phone phrase piano pick piece pig pilot pink pipe pistol pitch pizza place please pluck poem point polar pond
36
- pool post pot pound powder praise prefer price profit public pull punch pupil purity push put puzzle qatar quasi queen
37
- quite quoted rabbit race radio rail rally ramp range rapid rare rather raven raw razor real rebel recall red reform
38
- region reject relief remain rent reopen report result return review reward rhythm rib rich ride rifle right ring riot
39
- ripple risk ritual river road robot rocket room rose rotate round row royal rubber rude rug rule run rural sad safe sage
40
- sail salad same santa sauce save say scale scene school scope screen scuba sea second seed self semi sense series settle
41
- seven shadow she ship shock shrimp shy sick side siege sign silver simple since siren sister six size skate sketch ski
42
- skull slab sleep slight slogan slush small smile smooth snake sniff snow soap soccer soda soft solid son soon sort south
43
- space speak sphere spirit split spoil spring spy square state step still story strong stuff style submit such sudden
44
- suffer sugar suit summer sun supply sure swamp sweet switch sword symbol syntax syria system table tackle tag tail talk
45
- tank tape target task tattoo taxi team tell ten term test text that theme this three thumb tibet ticket tide tight tilt
46
- time tiny tip tired tissue title toast today toe toilet token tomato tone tool top torch toss total toward toy trade
47
- tree trial trophy true try tube tumble tunnel turn twenty twice two type ugly unable uncle under unfair unique unlock
48
- until unveil update uphold upon upper upset urban urge usage use usual vacuum vague valid van vapor vast vault vein
49
- velvet vendor very vessel viable video view villa violin virus visit vital vivid vocal voice volume vote voyage wage
50
- wait wall want war wash water wave way wealth web weird were west wet what when whip wide wife will window wire wish
51
- wolf woman wonder wood work wrap wreck write wrong xander xbox xerox xray yang yard year yellow yes yin york you zane
52
- zara zebra zen zero zippo zone zoo zorro zulu
53
- """.split()
54
- assert len(words) == 1024 # Exactly 10 bits of entropy per word
@@ -1,68 +0,0 @@
1
- paskia/__init__.py,sha256=6eopO87IOFA2zfOuqt8Jj8Tdtp93HBMOgUBtTzMRweM,57
2
- paskia/_version.py,sha256=Rttl-BDadtcW1QzGnNffCWA_Wc9mUKDMOBPZp--Mnsc,704
3
- paskia/authsession.py,sha256=Do0L2b_i3zUKvRcf4p45xeCwu5ZXAwdtEPr5H8y6X7M,2305
4
- paskia/bootstrap.py,sha256=5p4kAfTeWbcM-JD6gnmKMUilhPSRIH8HyZtnVevt8Co,5764
5
- paskia/config.py,sha256=U_HGzZab-HEVPuoMXxy2mrpoiZYW4jy_jiWDnhf0wBA,749
6
- paskia/globals.py,sha256=YQQHDr2nCicgCSWyIKOj_vL33c7uHTCi94cKXk6y2iI,1713
7
- paskia/remoteauth.py,sha256=peu_fcINwDW8YGzLtbMq7FX7oD05bWwNLmJaMYWaKR0,12481
8
- paskia/sansio.py,sha256=O4TGgNrHAYtHR2IxRgyrB2P2Zesz7eGq-IMM1RGjvC8,9998
9
- paskia/aaguid/__init__.py,sha256=Moy67wiJSYulL_whgEEBBKabKEOvlR-NRLyXprDdBO0,1007
10
- paskia/aaguid/combined_aaguid.json,sha256=CaZ96AiwdAjBnyVZnJ1eolAHxUQMB2H6mDgZkorYg_A,4124722
11
- paskia/db/__init__.py,sha256=YaolZA23SEbqIKYwlK4mvpCCqNXEoWGsOpK_EEZt5Rg,3983
12
- paskia/db/background.py,sha256=Wb8pWmko0CbY48NCfBkxmmPRgPaU5U_wEA4TYNPHBe8,4005
13
- paskia/db/jsonl.py,sha256=CCl3Tlj73_Ej5NbiZQgEGrGqm6uLQF0bmmupoZ060tU,3913
14
- paskia/db/operations.py,sha256=aOrvq8YSjRuN_Ahq7nK7iTx4Uw6uBmfnmKisC-v2cwU,41591
15
- paskia/db/structs.py,sha256=ZWqAJPtixT6B5iHibss3KpDqvgzgPfP-nbSf3NGDQN4,3574
16
- paskia/fastapi/__init__.py,sha256=NFsTX1qytoyZKiur7RDTa2fxiOWHrop5CAAx8rqK9E0,58
17
- paskia/fastapi/__main__.py,sha256=YtkTWGLPrrjsgZeGUWoRENAgdqwQSufjHimWKuLZKDg,11322
18
- paskia/fastapi/admin.py,sha256=sR6pJVBffTmdiiuAtlq7Ar64qnP55dczgUZ5QQwCOIA,36873
19
- paskia/fastapi/api.py,sha256=lMOTaoX4gBsotjBrP-FEs5-C_NmjGJJaRNFkpbgWhvQ,10654
20
- paskia/fastapi/auth_host.py,sha256=Y5w9Mz6jyq0hj7SX8LfwebaesUOLGcWzGW9lsmw5WOo,3242
21
- paskia/fastapi/authz.py,sha256=6s2TGkb3C7qWTXHOaMj613NiqMfztqM5QENuSb2IjO8,3529
22
- paskia/fastapi/mainapp.py,sha256=Jcoet0U4aQK8YfXQ07NuanjYXu0wPkwKaHQsrlKtBas,4466
23
- paskia/fastapi/remote.py,sha256=Qwplai_bK65WqxRA3btV_Psrl_bDF2VHN0Yzh5vwB78,19783
24
- paskia/fastapi/reset.py,sha256=8rhtqU_L17i_ZrIPPz7cXi_laWfM9_daNSnG2gS93b8,3341
25
- paskia/fastapi/session.py,sha256=9n0NuK5NtocOb27ahIU2T9eHZUog1Og_i9vvaDf7Wo8,1489
26
- paskia/fastapi/user.py,sha256=lMDzpVQ3-fprKPGu_M6vhkf9_fgR1Ak6QRqKkZhvoTE,4824
27
- paskia/fastapi/ws.py,sha256=S-KxB2KRDiF8BuhwZzJ9iDYlQjHtu3-d3ewm-TIytzk,5739
28
- paskia/fastapi/wsutil.py,sha256=CJZOyy4e9jazgyvj6CQ_kXVlGtpHNwfjGOdmHL02Nec,2620
29
- paskia/frontend-build/auth/index.html,sha256=vseFFj4Ockqhk1GkRNaHgXvEP5wpTgffhaIMuS7WANQ,936
30
- paskia/frontend-build/auth/admin/index.html,sha256=tWMDZTiWenGOTW66beypUQRxps3KYhixE2By2Wyqs8Y,862
31
- paskia/frontend-build/auth/assets/AccessDenied-Bc249ASC.css,sha256=tXoiIdVA54gVkzpqtrSidcdLB_86bB1ND-RwJSio8c0,7847
32
- paskia/frontend-build/auth/assets/AccessDenied-aTdCvz9k.js,sha256=_wCKW7fX2p8O8cfHG7PqEGLVHAVXfEvDL0tog0uY2hY,51560
33
- paskia/frontend-build/auth/assets/RestrictedAuth-BLMK7-nL.js,sha256=KAvDgEdN42Ycw3zyPONiFelfiV5xnUM9GXSnTpYfGX0,9816
34
- paskia/frontend-build/auth/assets/RestrictedAuth-DgdJyscT.css,sha256=mh35oOAdymdWc0rbTIE4oBiPzMDaNBH-ERugDl0tkSk,5397
35
- paskia/frontend-build/auth/assets/_plugin-vue_export-helper-BTzJAQlS.css,sha256=GpCu32ZoXHmL_8wVVa0Yja8dtKpaJSRyfitYAURx4Yc,12796
36
- paskia/frontend-build/auth/assets/_plugin-vue_export-helper-rKFEraYH.js,sha256=tX2rJaQDkdoiFt6YDC4vVGpMlw8cN0KuLSGdZKc5qU0,84792
37
- paskia/frontend-build/auth/assets/admin-BeNu48FR.css,sha256=jpRO6DDPrd_8gc9BhAZv_AbX8DrziF_pthO2b7DyfOw,8125
38
- paskia/frontend-build/auth/assets/admin-tVs8oyLv.js,sha256=U4vK_0OKT8Tmllk2xJc9Iv1roSaFADMLUv0A2KG0RZw,41563
39
- paskia/frontend-build/auth/assets/auth-BKX7shEe.css,sha256=331tMdRk6Ao7PNIifD8JDDjY8GD5gW9aYPM2MeLcZvg,4333
40
- paskia/frontend-build/auth/assets/auth-Dk3q4pNS.js,sha256=xFQuAuR8e35vnji0zfejipN56SDlpTlu2eyC9Ojjlms,25427
41
- paskia/frontend-build/auth/assets/forward-Dzg-aE1C.js,sha256=XZfdNI43MqAKQkui-3r7tCW_GL2GDu_NXPMzovJMcOA,782
42
- paskia/frontend-build/auth/assets/helpers-DzjFIx78.js,sha256=w_IsCBn3QwidsuwQhVRycd8Fa53lvbgRGGojTBXVlUc,940
43
- paskia/frontend-build/auth/assets/pow-2N9bxgAo.js,sha256=7AfzW5lcTefPI6YGXrYao1b56L7v5Bon9Y9N40yHsaE,9447
44
- paskia/frontend-build/auth/assets/reset-BWF4cWKR.css,sha256=8RZp0rx3cVPaxH2LjBzmyGzkrtQV6lqeAsBEG7eSetA,238
45
- paskia/frontend-build/auth/assets/reset-C_Td1_jn.js,sha256=0EtawdYcLd14KKmtwMAuvaakEjpRrZA9am-QgrZc98Q,3983
46
- paskia/frontend-build/auth/assets/restricted-C0IQufuH.js,sha256=fjCvfZTZBC7qkCKuvy-ppW3rzSD1ST9ZfE4VMR22r9w,1023
47
- paskia/frontend-build/auth/restricted/index.html,sha256=xfFuO5qpZfx8CNz9kB7fC_OjPIsoZQ1b9W5xeFE1cJ4,785
48
- paskia/frontend-build/int/forward/index.html,sha256=h4qLmAjIlGQ7ZjKV3yDsMD4SpPS2K3j4Z1BwW8DJf04,870
49
- paskia/frontend-build/int/reset/index.html,sha256=t21RLLETyTHBnKe95V053_zmfB34Vavp0fp4G5fU7-U,612
50
- paskia/migrate/__init__.py,sha256=4ZpfZbPBeJHi1Pjtq76bOi8Ev4hFDwZNXIQNuqQ3p5c,9803
51
- paskia/migrate/sql.py,sha256=qiAQooYVYdFwW-UeMwNnjLOjVAFa1tjHCZFjkkuinp0,12782
52
- paskia/util/frontend.py,sha256=NbCWi74lb6yqk-2WKJci4km-Kij0yCK1Vq_51yKfY3U,2505
53
- paskia/util/hostutil.py,sha256=agZWjOawQxHshLGkFX-TxpExP1pjXEWCSrMCnOGajk8,2321
54
- paskia/util/htmlutil.py,sha256=r0YR3AKIsIg5Gg45N92Lh7UYz2kwF1coreZahzLZIX8,1580
55
- paskia/util/passphrase.py,sha256=oAfLJwaBvCmXY3CMv8KeAogE9V5SejnTLfXWIiQYCOo,562
56
- paskia/util/permutil.py,sha256=-pjC54SUXy6G-wET8hXtlEOhsiHY8ukpt_-lVBxu9T0,1388
57
- paskia/util/pow.py,sha256=u99Phs1DBiv9Ptm8agaA7ZSOnRPtDcpgkLgGzNTcJWo,1395
58
- paskia/util/querysafe.py,sha256=iHfY2z5MX0Y6gso2oeq-SiHhg97vq35Jp1D16sXY0FE,294
59
- paskia/util/sessionutil.py,sha256=nhm2OVOrWQ8tskHEBSLrLrZjG6-jQdvbfqGyib2mZ50,1263
60
- paskia/util/startupbox.py,sha256=SIg26g9EIdkm7uVWiDfAUuXn6Z05EAsYEQni4qkVEWI,2353
61
- paskia/util/timeutil.py,sha256=1Zf8rXa76oLXDuZrGyuVDNhFjxl-28Z_Xb6pIH06ORk,1258
62
- paskia/util/useragent.py,sha256=wOeueToxKHdJ91vT5jMVBoIhelNwxD5u7vgWQGSjImA,325
63
- paskia/util/userinfo.py,sha256=b3dP_EJ94x76UAclq3y1rwvo3hIa65JM6B3mTRoZvJ8,4600
64
- paskia/util/wordlist.py,sha256=EKwrABkqRO1f59--muegOoluPydPJAHlWJNXwV0IFyA,6069
65
- paskia-0.8.0.dist-info/METADATA,sha256=XjqoY0zqAImymOSNsiluNfwGNtxHMdWW_9EhdeiTAQM,4227
66
- paskia-0.8.0.dist-info/WHEEL,sha256=WLgqFyCfm_KASv4WHyYy0P3pM_m7J5L9k2skdKLirC8,87
67
- paskia-0.8.0.dist-info/entry_points.txt,sha256=vvx6RYetgd61I2ODqQPHqrKHgCfuo08w_T35yDlHenE,93
68
- paskia-0.8.0.dist-info/RECORD,,
File without changes