xenoslib 0.1.29.24__py3-none-any.whl → 0.1.30__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- xenoslib/about.py +1 -1
- xenoslib/extend.py +2 -198
- xenoslib/tools/__init__.py +1 -0
- xenoslib/tools/config_loader.py +211 -0
- {xenoslib-0.1.29.24.dist-info → xenoslib-0.1.30.dist-info}/METADATA +1 -1
- {xenoslib-0.1.29.24.dist-info → xenoslib-0.1.30.dist-info}/RECORD +9 -7
- {xenoslib-0.1.29.24.dist-info → xenoslib-0.1.30.dist-info}/WHEEL +0 -0
- {xenoslib-0.1.29.24.dist-info → xenoslib-0.1.30.dist-info}/licenses/LICENSE +0 -0
- {xenoslib-0.1.29.24.dist-info → xenoslib-0.1.30.dist-info}/top_level.txt +0 -0
xenoslib/about.py
CHANGED
xenoslib/extend.py
CHANGED
|
@@ -7,7 +7,7 @@ import logging
|
|
|
7
7
|
import yaml
|
|
8
8
|
import requests
|
|
9
9
|
|
|
10
|
-
from xenoslib.
|
|
10
|
+
from xenoslib.tools import ConfigLoader # noqa compactive
|
|
11
11
|
|
|
12
12
|
|
|
13
13
|
logger = logging.getLogger(__name__)
|
|
@@ -194,201 +194,5 @@ class DingTalkLogHandler(logging.Handler):
|
|
|
194
194
|
print(exc)
|
|
195
195
|
|
|
196
196
|
|
|
197
|
-
class ConfigLoader(SingletonWithArgs):
|
|
198
|
-
"""Centralized configuration management with optional Vault integration.
|
|
199
|
-
|
|
200
|
-
Args:
|
|
201
|
-
config_file_path (str): Path to the YAML configuration file. Defaults to "config.yml".
|
|
202
|
-
vault_secret_id (str, optional): Secret ID for Vault authentication.
|
|
203
|
-
If provided, enables Vault functionality and imports hvac module.
|
|
204
|
-
|
|
205
|
-
Attributes:
|
|
206
|
-
cache (dict): Cache storage for frequently accessed configuration values.
|
|
207
|
-
|
|
208
|
-
Example:
|
|
209
|
-
# Without Vault (hvac not imported)
|
|
210
|
-
>>> config = ConfigLoader("config.yml")
|
|
211
|
-
|
|
212
|
-
# With Vault (hvac imported on demand)
|
|
213
|
-
>>> config = ConfigLoader("config.yml", vault_secret_id="my-secret-id")
|
|
214
|
-
"""
|
|
215
|
-
|
|
216
|
-
cache = {}
|
|
217
|
-
vault_client = None
|
|
218
|
-
|
|
219
|
-
def __init__(self, config_file_path="config.yml", vault_secret_id=None):
|
|
220
|
-
"""Initialize the ConfigLoader with a configuration file and optional Vault secret."""
|
|
221
|
-
with open(config_file_path, "r") as f:
|
|
222
|
-
self._raw_config = yaml.safe_load(f) or {}
|
|
223
|
-
|
|
224
|
-
if vault_secret_id is not None:
|
|
225
|
-
self.vault_secret_id = vault_secret_id
|
|
226
|
-
self._check_and_renew_vault_client()
|
|
227
|
-
|
|
228
|
-
def _init_vault_client(self):
|
|
229
|
-
"""Initialize and authenticate the Vault client (imports hvac on demand).
|
|
230
|
-
|
|
231
|
-
Args:
|
|
232
|
-
vault_secret_id (str): Secret ID for Vault authentication.
|
|
233
|
-
|
|
234
|
-
Raises:
|
|
235
|
-
ImportError: If hvac package is not installed.
|
|
236
|
-
KeyError: If required Vault configuration is missing.
|
|
237
|
-
Exception: If Vault authentication fails.
|
|
238
|
-
"""
|
|
239
|
-
try:
|
|
240
|
-
import hvac # Lazy import
|
|
241
|
-
except ImportError as e:
|
|
242
|
-
raise ImportError(
|
|
243
|
-
"hvac package is required for Vault integration. " "Install with: pip install hvac"
|
|
244
|
-
) from e
|
|
245
|
-
|
|
246
|
-
try:
|
|
247
|
-
vault_config = self._raw_config.get("vault", {})
|
|
248
|
-
vault_url = vault_config.get("url")
|
|
249
|
-
vault_space = vault_config.get("space")
|
|
250
|
-
vault_role_id = vault_config.get("role_id")
|
|
251
|
-
|
|
252
|
-
if not all([vault_url, vault_space, vault_role_id]):
|
|
253
|
-
raise KeyError("Missing required Vault configuration in config.yml")
|
|
254
|
-
|
|
255
|
-
self.vault_client = hvac.Client(url=vault_url, namespace=vault_space, timeout=45)
|
|
256
|
-
self.vault_client.auth.approle.login(
|
|
257
|
-
role_id=vault_role_id, secret_id=self.vault_secret_id
|
|
258
|
-
)
|
|
259
|
-
except Exception as e:
|
|
260
|
-
self.vault_client = None
|
|
261
|
-
raise Exception(f"Failed to initialize Vault client: {str(e)}")
|
|
262
|
-
|
|
263
|
-
def _check_and_renew_vault_client(self):
|
|
264
|
-
# 检查当前Token的状态,包括过期时间和可续租性
|
|
265
|
-
if not self.vault_client or not self.vault_client.is_authenticated():
|
|
266
|
-
# 如果当前Token无效,则重新认证
|
|
267
|
-
self._init_vault_client()
|
|
268
|
-
|
|
269
|
-
def get(self, section, key_name, use_cache=True):
|
|
270
|
-
"""Retrieve a configuration value.
|
|
271
|
-
|
|
272
|
-
Args:
|
|
273
|
-
section (str): The configuration section name.
|
|
274
|
-
key_name (str): The key name within the section.
|
|
275
|
-
use_cache (bool): Whether to use cached values. Defaults to True.
|
|
276
|
-
|
|
277
|
-
Returns:
|
|
278
|
-
The configuration value, which may come from:
|
|
279
|
-
- Direct configuration value
|
|
280
|
-
- Vault secret (if Vault is initialized)
|
|
281
|
-
- Cache (if enabled)
|
|
282
|
-
|
|
283
|
-
Raises:
|
|
284
|
-
KeyError: If the section or key is not found.
|
|
285
|
-
Exception: If Vault access is required but not available.
|
|
286
|
-
"""
|
|
287
|
-
if section not in self._raw_config:
|
|
288
|
-
raise KeyError(f"Section '{section}' not found")
|
|
289
|
-
|
|
290
|
-
# Check for direct value first
|
|
291
|
-
if key_name in self._raw_config[section]:
|
|
292
|
-
return self._raw_config[section][key_name]
|
|
293
|
-
|
|
294
|
-
# Handle Vault reference if Vault is enabled
|
|
295
|
-
vault_key = f"{key_name}@vault"
|
|
296
|
-
if vault_key in self._raw_config[section]:
|
|
297
|
-
if self.vault_client is None:
|
|
298
|
-
raise Exception(
|
|
299
|
-
f"Vault access required for {key_name} but Vault is not initialized"
|
|
300
|
-
)
|
|
301
|
-
|
|
302
|
-
cache_key = f"{section}_{key_name}"
|
|
303
|
-
|
|
304
|
-
if use_cache and cache_key in self.cache:
|
|
305
|
-
return self.cache[cache_key]
|
|
306
|
-
value = self._get_value_from_vault(section, key_name)
|
|
307
|
-
self.cache[cache_key] = value
|
|
308
|
-
return value
|
|
309
|
-
|
|
310
|
-
raise KeyError(f"Key '{key_name}' or '{vault_key}' not found in section '{section}'")
|
|
311
|
-
|
|
312
|
-
def _get_value_from_vault(self, section, key_name):
|
|
313
|
-
"""Retrieve a secret value from Vault.
|
|
314
|
-
|
|
315
|
-
Args:
|
|
316
|
-
section (str): The configuration section name.
|
|
317
|
-
key_name (str): The key name within the section.
|
|
318
|
-
|
|
319
|
-
Returns:
|
|
320
|
-
The secret value from Vault.
|
|
321
|
-
|
|
322
|
-
Raises:
|
|
323
|
-
Exception: If Vault access fails.
|
|
324
|
-
"""
|
|
325
|
-
try:
|
|
326
|
-
vault_path = self._raw_config[section]["vault_path"]
|
|
327
|
-
vault_key = self._raw_config[section][f"{key_name}@vault"]
|
|
328
|
-
vault_namepsace = self._raw_config[section].get("vault_namespace")
|
|
329
|
-
if vault_namepsace:
|
|
330
|
-
self.vault_client.adapter.namespace = vault_namepsace
|
|
331
|
-
else:
|
|
332
|
-
self.vault_client.adapter.namespace = self._raw_config["vault"]["space"]
|
|
333
|
-
data = self.vault_client.secrets.kv.read_secret_version(
|
|
334
|
-
path=vault_path, mount_point="kv", raise_on_deleted_version=True
|
|
335
|
-
)
|
|
336
|
-
return data["data"]["data"][vault_key]
|
|
337
|
-
except Exception as e:
|
|
338
|
-
raise Exception(f"Failed to fetch {key_name} from Vault: {str(e)}")
|
|
339
|
-
|
|
340
|
-
def __getitem__(self, section):
|
|
341
|
-
"""Dictionary-style access to configuration sections."""
|
|
342
|
-
if section not in self._raw_config:
|
|
343
|
-
raise KeyError(f"Section '{section}' not found")
|
|
344
|
-
return SectionProxy(self, section)
|
|
345
|
-
|
|
346
|
-
def __getattr__(self, section):
|
|
347
|
-
"""Attribute-style access to configuration sections."""
|
|
348
|
-
try:
|
|
349
|
-
return self[section]
|
|
350
|
-
except KeyError as e:
|
|
351
|
-
raise AttributeError(str(e))
|
|
352
|
-
|
|
353
|
-
|
|
354
|
-
class SectionProxy:
|
|
355
|
-
"""Proxy class for configuration section access."""
|
|
356
|
-
|
|
357
|
-
def __init__(self, config_loader, section):
|
|
358
|
-
self._loader = config_loader
|
|
359
|
-
self._section = section
|
|
360
|
-
|
|
361
|
-
def __getitem__(self, key):
|
|
362
|
-
"""Dictionary-style access to configuration values."""
|
|
363
|
-
return self._loader.get(self._section, key)
|
|
364
|
-
|
|
365
|
-
def get(self, key, default=None):
|
|
366
|
-
"""Dictionary-style access to configuration values."""
|
|
367
|
-
try:
|
|
368
|
-
return self._loader.get(self._section, key)
|
|
369
|
-
except KeyError:
|
|
370
|
-
return default
|
|
371
|
-
|
|
372
|
-
def __getattr__(self, key):
|
|
373
|
-
"""Attribute-style access to configuration values."""
|
|
374
|
-
try:
|
|
375
|
-
return self[key]
|
|
376
|
-
except KeyError as e:
|
|
377
|
-
raise AttributeError(str(e))
|
|
378
|
-
|
|
379
|
-
def __repr__(self):
|
|
380
|
-
"""String representation of the section's configuration."""
|
|
381
|
-
return yaml.dump(self._loader._raw_config[self._section])
|
|
382
|
-
|
|
383
|
-
|
|
384
197
|
if __name__ == "__main__":
|
|
385
|
-
|
|
386
|
-
print("Without Vault:", config_without_vault.get("jira", "url"))
|
|
387
|
-
|
|
388
|
-
# This will only work if you provide a valid Vault secret ID
|
|
389
|
-
# and hvac package is installed
|
|
390
|
-
config_with_vault = ConfigLoader("config.yml", vault_secret_id=os.getenv("VAULT_SECRET_ID"))
|
|
391
|
-
|
|
392
|
-
print("With Vault:", config_with_vault.test.test)
|
|
393
|
-
print("With Vault:", config_with_vault["cis"]["cis_client_id"])
|
|
394
|
-
print("Try val not exists: ", config_with_vault.test.get("not_exists"))
|
|
198
|
+
pass
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
from .config_loader import ConfigLoader # noqa
|
|
@@ -0,0 +1,211 @@
|
|
|
1
|
+
#!/usr/bin/env python3
|
|
2
|
+
# -*- coding: utf-8 -*-
|
|
3
|
+
import os
|
|
4
|
+
import logging
|
|
5
|
+
|
|
6
|
+
import yaml
|
|
7
|
+
|
|
8
|
+
from xenoslib.base import SingletonWithArgs
|
|
9
|
+
|
|
10
|
+
|
|
11
|
+
logger = logging.getLogger(__name__)
|
|
12
|
+
|
|
13
|
+
|
|
14
|
+
class ConfigLoader(SingletonWithArgs):
|
|
15
|
+
"""Centralized configuration management with optional Vault integration.
|
|
16
|
+
|
|
17
|
+
Args:
|
|
18
|
+
config_file_path (str): Path to the YAML configuration file. Defaults to "config.yml".
|
|
19
|
+
vault_secret_id (str, optional): Secret ID for Vault authentication.
|
|
20
|
+
If provided, enables Vault functionality and imports hvac module.
|
|
21
|
+
|
|
22
|
+
Attributes:
|
|
23
|
+
cache (dict): Cache storage for frequently accessed configuration values.
|
|
24
|
+
|
|
25
|
+
Example:
|
|
26
|
+
# Without Vault (hvac not imported)
|
|
27
|
+
>>> config = ConfigLoader("config.yml")
|
|
28
|
+
|
|
29
|
+
# With Vault (hvac imported on demand)
|
|
30
|
+
>>> config = ConfigLoader("config.yml", vault_secret_id="my-secret-id")
|
|
31
|
+
"""
|
|
32
|
+
|
|
33
|
+
cache = {}
|
|
34
|
+
vault_client = None
|
|
35
|
+
|
|
36
|
+
def __init__(self, config_file_path="config.yml", vault_secret_id=None):
|
|
37
|
+
"""Initialize the ConfigLoader with a configuration file and optional Vault secret."""
|
|
38
|
+
with open(config_file_path, "r") as f:
|
|
39
|
+
self._raw_config = yaml.safe_load(f) or {}
|
|
40
|
+
|
|
41
|
+
if vault_secret_id is not None:
|
|
42
|
+
self.vault_secret_id = vault_secret_id
|
|
43
|
+
self._check_and_renew_vault_client()
|
|
44
|
+
|
|
45
|
+
def _init_vault_client(self):
|
|
46
|
+
"""Initialize and authenticate the Vault client (imports hvac on demand).
|
|
47
|
+
|
|
48
|
+
Args:
|
|
49
|
+
vault_secret_id (str): Secret ID for Vault authentication.
|
|
50
|
+
|
|
51
|
+
Raises:
|
|
52
|
+
ImportError: If hvac package is not installed.
|
|
53
|
+
KeyError: If required Vault configuration is missing.
|
|
54
|
+
Exception: If Vault authentication fails.
|
|
55
|
+
"""
|
|
56
|
+
try:
|
|
57
|
+
import hvac # Lazy import
|
|
58
|
+
except ImportError as e:
|
|
59
|
+
raise ImportError(
|
|
60
|
+
"hvac package is required for Vault integration. " "Install with: pip install hvac"
|
|
61
|
+
) from e
|
|
62
|
+
|
|
63
|
+
try:
|
|
64
|
+
vault_config = self._raw_config.get("vault", {})
|
|
65
|
+
vault_url = vault_config.get("url")
|
|
66
|
+
vault_space = vault_config.get("space")
|
|
67
|
+
vault_role_id = vault_config.get("role_id")
|
|
68
|
+
|
|
69
|
+
if not all([vault_url, vault_space, vault_role_id]):
|
|
70
|
+
raise KeyError("Missing required Vault configuration in config.yml")
|
|
71
|
+
|
|
72
|
+
self.vault_client = hvac.Client(url=vault_url, namespace=vault_space, timeout=45)
|
|
73
|
+
self.vault_client.auth.approle.login(
|
|
74
|
+
role_id=vault_role_id, secret_id=self.vault_secret_id
|
|
75
|
+
)
|
|
76
|
+
except Exception as e:
|
|
77
|
+
self.vault_client = None
|
|
78
|
+
raise Exception(f"Failed to initialize Vault client: {str(e)}")
|
|
79
|
+
|
|
80
|
+
def _check_and_renew_vault_client(self):
|
|
81
|
+
# 检查当前Token的状态,包括过期时间和可续租性
|
|
82
|
+
if not self.vault_client or not self.vault_client.is_authenticated():
|
|
83
|
+
# 如果当前Token无效,则重新认证
|
|
84
|
+
self._init_vault_client()
|
|
85
|
+
|
|
86
|
+
def get(self, section, key_name, use_cache=True):
|
|
87
|
+
"""Retrieve a configuration value.
|
|
88
|
+
|
|
89
|
+
Args:
|
|
90
|
+
section (str): The configuration section name.
|
|
91
|
+
key_name (str): The key name within the section.
|
|
92
|
+
use_cache (bool): Whether to use cached values. Defaults to True.
|
|
93
|
+
|
|
94
|
+
Returns:
|
|
95
|
+
The configuration value, which may come from:
|
|
96
|
+
- Direct configuration value
|
|
97
|
+
- Vault secret (if Vault is initialized)
|
|
98
|
+
- Cache (if enabled)
|
|
99
|
+
|
|
100
|
+
Raises:
|
|
101
|
+
KeyError: If the section or key is not found.
|
|
102
|
+
Exception: If Vault access is required but not available.
|
|
103
|
+
"""
|
|
104
|
+
if section not in self._raw_config:
|
|
105
|
+
raise KeyError(f"Section '{section}' not found")
|
|
106
|
+
|
|
107
|
+
# Check for direct value first
|
|
108
|
+
if key_name in self._raw_config[section]:
|
|
109
|
+
return self._raw_config[section][key_name]
|
|
110
|
+
|
|
111
|
+
# Handle Vault reference if Vault is enabled
|
|
112
|
+
vault_key = f"{key_name}@vault"
|
|
113
|
+
if vault_key in self._raw_config[section]:
|
|
114
|
+
if self.vault_client is None:
|
|
115
|
+
raise Exception(
|
|
116
|
+
f"Vault access required for {key_name} but Vault is not initialized"
|
|
117
|
+
)
|
|
118
|
+
|
|
119
|
+
cache_key = f"{section}_{key_name}"
|
|
120
|
+
|
|
121
|
+
if use_cache and cache_key in self.cache:
|
|
122
|
+
return self.cache[cache_key]
|
|
123
|
+
value = self._get_value_from_vault(section, key_name)
|
|
124
|
+
self.cache[cache_key] = value
|
|
125
|
+
return value
|
|
126
|
+
|
|
127
|
+
raise KeyError(f"Key '{key_name}' or '{vault_key}' not found in section '{section}'")
|
|
128
|
+
|
|
129
|
+
def _get_value_from_vault(self, section, key_name):
|
|
130
|
+
"""Retrieve a secret value from Vault.
|
|
131
|
+
|
|
132
|
+
Args:
|
|
133
|
+
section (str): The configuration section name.
|
|
134
|
+
key_name (str): The key name within the section.
|
|
135
|
+
|
|
136
|
+
Returns:
|
|
137
|
+
The secret value from Vault.
|
|
138
|
+
|
|
139
|
+
Raises:
|
|
140
|
+
Exception: If Vault access fails.
|
|
141
|
+
"""
|
|
142
|
+
try:
|
|
143
|
+
vault_path = self._raw_config[section]["vault_path"]
|
|
144
|
+
vault_key = self._raw_config[section][f"{key_name}@vault"]
|
|
145
|
+
vault_namepsace = self._raw_config[section].get("vault_namespace")
|
|
146
|
+
if vault_namepsace:
|
|
147
|
+
self.vault_client.adapter.namespace = vault_namepsace
|
|
148
|
+
else:
|
|
149
|
+
self.vault_client.adapter.namespace = self._raw_config["vault"]["space"]
|
|
150
|
+
data = self.vault_client.secrets.kv.read_secret_version(
|
|
151
|
+
path=vault_path, mount_point="kv", raise_on_deleted_version=True
|
|
152
|
+
)
|
|
153
|
+
return data["data"]["data"][vault_key]
|
|
154
|
+
except Exception as e:
|
|
155
|
+
raise Exception(f"Failed to fetch {key_name} from Vault: {str(e)}")
|
|
156
|
+
|
|
157
|
+
def __getitem__(self, section):
|
|
158
|
+
"""Dictionary-style access to configuration sections."""
|
|
159
|
+
if section not in self._raw_config:
|
|
160
|
+
raise KeyError(f"Section '{section}' not found")
|
|
161
|
+
return SectionProxy(self, section)
|
|
162
|
+
|
|
163
|
+
def __getattr__(self, section):
|
|
164
|
+
"""Attribute-style access to configuration sections."""
|
|
165
|
+
try:
|
|
166
|
+
return self[section]
|
|
167
|
+
except KeyError as e:
|
|
168
|
+
raise AttributeError(str(e))
|
|
169
|
+
|
|
170
|
+
|
|
171
|
+
class SectionProxy:
|
|
172
|
+
"""Proxy class for configuration section access."""
|
|
173
|
+
|
|
174
|
+
def __init__(self, config_loader, section):
|
|
175
|
+
self._loader = config_loader
|
|
176
|
+
self._section = section
|
|
177
|
+
|
|
178
|
+
def __getitem__(self, key):
|
|
179
|
+
"""Dictionary-style access to configuration values."""
|
|
180
|
+
return self._loader.get(self._section, key)
|
|
181
|
+
|
|
182
|
+
def get(self, key, default=None):
|
|
183
|
+
"""Dictionary-style access to configuration values."""
|
|
184
|
+
try:
|
|
185
|
+
return self._loader.get(self._section, key)
|
|
186
|
+
except KeyError:
|
|
187
|
+
return default
|
|
188
|
+
|
|
189
|
+
def __getattr__(self, key):
|
|
190
|
+
"""Attribute-style access to configuration values."""
|
|
191
|
+
try:
|
|
192
|
+
return self[key]
|
|
193
|
+
except KeyError as e:
|
|
194
|
+
raise AttributeError(str(e))
|
|
195
|
+
|
|
196
|
+
def __repr__(self):
|
|
197
|
+
"""String representation of the section's configuration."""
|
|
198
|
+
return yaml.dump(self._loader._raw_config[self._section])
|
|
199
|
+
|
|
200
|
+
|
|
201
|
+
if __name__ == "__main__":
|
|
202
|
+
config_without_vault = ConfigLoader("config.yml")
|
|
203
|
+
print("Without Vault:", config_without_vault.get("jira", "url"))
|
|
204
|
+
|
|
205
|
+
# This will only work if you provide a valid Vault secret ID
|
|
206
|
+
# and hvac package is installed
|
|
207
|
+
config_with_vault = ConfigLoader("config.yml", vault_secret_id=os.getenv("VAULT_SECRET_ID"))
|
|
208
|
+
|
|
209
|
+
print("With Vault:", config_with_vault.test.test)
|
|
210
|
+
print("With Vault:", config_with_vault["cis"]["cis_client_id"])
|
|
211
|
+
print("Try val not exists: ", config_with_vault.test.get("not_exists"))
|
|
@@ -1,17 +1,19 @@
|
|
|
1
1
|
xenoslib/__init__.py,sha256=vlMWwdD2gTb9ztpm_orYAm_Y0Be0Es64ifvMQwrE1jU,310
|
|
2
2
|
xenoslib/__main__.py,sha256=UpD3pl4l5ZUFxK6FzNMWRb1AZpEnwerulSFoPb_Pdgw,307
|
|
3
|
-
xenoslib/about.py,sha256=
|
|
3
|
+
xenoslib/about.py,sha256=B8RIL1Gxy_xbK_YIIS4rzVETE5QvWJ-XGugxrMrhEpY,229
|
|
4
4
|
xenoslib/base.py,sha256=rAXk71AsnWvQ7MaSad5Xxd9Lwucp-cZc15yyqoV5Dk4,12440
|
|
5
5
|
xenoslib/dev.py,sha256=R6iwKuu-xvaYiBOUyP2gpePyvXss17TOZaCmQEihPCw,1236
|
|
6
|
-
xenoslib/extend.py,sha256=
|
|
6
|
+
xenoslib/extend.py,sha256=Vl5d8carSGy6ERE2EjTmB9lOo2uIBWs1iz-fKm_TX-M,5947
|
|
7
7
|
xenoslib/linux.py,sha256=EFCQBq_JsmNJc3wGlJlzH9W0tjOA7sSwx0u62R5Ut2k,1318
|
|
8
8
|
xenoslib/mail.py,sha256=pkC4gpMSxKbuvNR-0CdwbJQEJNbBCp5oEYAJS-uxq9s,7286
|
|
9
9
|
xenoslib/mock.py,sha256=iNIplO7clejqLWfpY4r0WQH5BULy9dCoolDenZEci0c,3572
|
|
10
10
|
xenoslib/onedrive.py,sha256=-bJJ8Cd_RjJSlDynYqKoZlFKE1HHM34l6NXOQrWOwtg,7783
|
|
11
11
|
xenoslib/win_trayicon.py,sha256=7GJwX3c2CS1XWQjsyDK5EfM-MmEHdzPJCTX2sGpWmuU,13115
|
|
12
12
|
xenoslib/windows.py,sha256=lUTD7TowaPqYHgIL6b-GM9PLd-VyJNNGzkzC3K9vOxo,4080
|
|
13
|
-
xenoslib
|
|
14
|
-
xenoslib
|
|
15
|
-
xenoslib-0.1.
|
|
16
|
-
xenoslib-0.1.
|
|
17
|
-
xenoslib-0.1.
|
|
13
|
+
xenoslib/tools/__init__.py,sha256=D1qP5tD2ZukXHgjKUh0fFl8jUipM3KaPBZBi0vGPypQ,48
|
|
14
|
+
xenoslib/tools/config_loader.py,sha256=K31ksf-cE76aJOqm82ayYIgkwcmk5iAENJNaax5CwNY,7752
|
|
15
|
+
xenoslib-0.1.30.dist-info/licenses/LICENSE,sha256=lF6hjufhiR-xAje_Wo7ogxV5phz2d5TgkfL5SGshujg,1066
|
|
16
|
+
xenoslib-0.1.30.dist-info/METADATA,sha256=Ve9EhjpGDTtOG91V30a1GW9LGQw356f12uyyfkCsBEo,911
|
|
17
|
+
xenoslib-0.1.30.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
|
|
18
|
+
xenoslib-0.1.30.dist-info/top_level.txt,sha256=Rfm4GdW0NyA2AHDNUF2wFQOfAo53mAPibddSHGd3X60,9
|
|
19
|
+
xenoslib-0.1.30.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|
|
File without changes
|