id
int64
0
190k
prompt
stringlengths
21
13.4M
docstring
stringlengths
1
12k
180,610
from flask import jsonify, g from sqlalchemy_utils.types.arrow import arrow from app.api.base import api_bp, require_api_sudo, require_api_auth from app import config from app.extensions import limiter from app.log import LOG from app.models import Job, ApiToCookieToken LOG = _get_logger("SL") class Job(Base, ModelMi...
Delete the user. Requires sudo mode.
180,611
from flask import jsonify, g from sqlalchemy_utils.types.arrow import arrow from app.api.base import api_bp, require_api_sudo, require_api_auth from app import config from app.extensions import limiter from app.log import LOG from app.models import Job, ApiToCookieToken class ApiToCookieToken(Base, ModelMixin): __...
Get a temporary token to exchange it for a cookie based session Output: 200 and a temporary random token { token: "asdli3ldq39h9hd3", }
180,612
from flask import g, request from flask import jsonify from app.api.base import api_bp, require_api_auth from app.db import Session from app.models import CustomDomain, DomainDeletedAlias, Mailbox, DomainMailbox def custom_domain_to_dict(custom_domain: CustomDomain): return { "id": custom_domain.id, ...
null
180,613
from flask import g, request from flask import jsonify from app.api.base import api_bp, require_api_auth from app.db import Session from app.models import CustomDomain, DomainDeletedAlias, Mailbox, DomainMailbox class CustomDomain(Base, ModelMixin): __tablename__ = "custom_domain" user_id = sa.Column(sa.Forei...
null
180,614
from flask import g, request from flask import jsonify from app.api.base import api_bp, require_api_auth from app.db import Session from app.models import CustomDomain, DomainDeletedAlias, Mailbox, DomainMailbox def custom_domain_to_dict(custom_domain: CustomDomain): return { "id": custom_domain.id, ...
Update alias note Input: custom_domain_id: in url In body: catch_all (optional): boolean random_prefix_generation (optional): boolean name (optional): in body mailbox_ids (optional): array of mailbox_id Output: 200
180,615
from typing import Optional import arrow import requests from flask import g from flask import jsonify from flask import request from requests import RequestException from app.api.base import api_bp, require_api_auth from app.config import APPLE_API_SECRET, MACAPP_APPLE_API_SECRET from app.subscription_webhook import e...
Process payment Input: receipt_data: in body (optional) is_macapp: in body Output: 200 of the payment is successful, i.e. user is upgraded to premium
180,616
from typing import Optional import arrow import requests from flask import g from flask import jsonify from flask import request from requests import RequestException from app.api.base import api_bp, require_api_auth from app.config import APPLE_API_SECRET, MACAPP_APPLE_API_SECRET from app.subscription_webhook import e...
The "Subscription Status URL" to receive update notifications from Apple
180,617
from flask import g from flask import jsonify from flask import request from app.api.base import api_bp, require_api_auth from app.config import PAGE_LIMIT from app.db import Session from app.models import Notification PAGE_LIMIT = 20 class Notification(Base, ModelMixin): __tablename__ = "notification" user_i...
Get notifications Input: - page: in url. Starts at 0 Output: - more: boolean. Whether there's more notification to load - notifications: list of notifications. - id - message - title - read - created_at
180,618
from flask import g from flask import jsonify from flask import request from app.api.base import api_bp, require_api_auth from app.config import PAGE_LIMIT from app.db import Session from app.models import Notification Session = scoped_session(sessionmaker(bind=connection)) Session: sqlalchemy.orm.Session class Noti...
Mark a notification as read Input: notification_id: in url Output: 200 if updated successfully
180,619
import secrets import string import facebook import google.oauth2.credentials import googleapiclient.discovery from flask import jsonify, request from flask_login import login_user from itsdangerous import Signer from app import email_utils from app.api.base import api_bp from app.config import FLASK_SECRET, DISABLE_RE...
Authenticate user Input: email password device: to create an ApiKey associated with this device Output: 200 and user info containing: { name: "John Wick", mfa_enabled: true, mfa_key: "a long string", api_key: "a long string" }
180,620
import secrets import string import facebook import google.oauth2.credentials import googleapiclient.discovery from flask import jsonify, request from flask_login import login_user from itsdangerous import Signer from app import email_utils from app.api.base import api_bp from app.config import FLASK_SECRET, DISABLE_RE...
User signs up - will need to activate their account with an activation code. Input: email password Output: 200: user needs to confirm their account
180,621
import secrets import string import facebook import google.oauth2.credentials import googleapiclient.discovery from flask import jsonify, request from flask_login import login_user from itsdangerous import Signer from app import email_utils from app.api.base import api_bp from app.config import FLASK_SECRET, DISABLE_RE...
User enters the activation code to confirm their account. Input: email code Output: 200: user account is now activated, user can login now 400: wrong email, code 410: wrong code too many times
180,622
import secrets import string import facebook import google.oauth2.credentials import googleapiclient.discovery from flask import jsonify, request from flask_login import login_user from itsdangerous import Signer from app import email_utils from app.api.base import api_bp from app.config import FLASK_SECRET, DISABLE_RE...
User asks for another activation code Input: email Output: 200: user is going to receive an email for activate their account
180,623
import secrets import string import facebook import google.oauth2.credentials import googleapiclient.discovery from flask import jsonify, request from flask_login import login_user from itsdangerous import Signer from app import email_utils from app.api.base import api_bp from app.config import FLASK_SECRET, DISABLE_RE...
Authenticate user with Facebook Input: facebook_token: facebook access token device: to create an ApiKey associated with this device Output: 200 and user info containing: { name: "John Wick", mfa_enabled: true, mfa_key: "a long string", api_key: "a long string" }
180,624
import secrets import string import facebook import google.oauth2.credentials import googleapiclient.discovery from flask import jsonify, request from flask_login import login_user from itsdangerous import Signer from app import email_utils from app.api.base import api_bp from app.config import FLASK_SECRET, DISABLE_RE...
Authenticate user with Google Input: google_token: Google access token device: to create an ApiKey associated with this device Output: 200 and user info containing: { name: "John Wick", mfa_enabled: true, mfa_key: "a long string", api_key: "a long string" }
180,625
import secrets import string import facebook import google.oauth2.credentials import googleapiclient.discovery from flask import jsonify, request from flask_login import login_user from itsdangerous import Signer from app import email_utils from app.api.base import api_bp from app.config import FLASK_SECRET, DISABLE_RE...
User forgot password Input: email Output: 200 and a reset password email is sent to user 400 if email not exist
180,626
import pyotp from flask import jsonify, request from flask_login import login_user from itsdangerous import Signer from app.api.base import api_bp from app.config import FLASK_SECRET from app.db import Session from app.email_utils import send_invalid_totp_login_email from app.extensions import limiter from app.log impo...
Validate the OTP Token Input: mfa_token: OTP token that user enters mfa_key: MFA key obtained in previous auth request, e.g. /api/auth/login device: the device name, used to create an ApiKey associated with this device Output: 200 and user info containing: { name: "John Wick", api_key: "a long string", email: "user ema...
180,627
from functools import wraps from typing import Tuple, Optional import arrow from flask import Blueprint, request, jsonify, g from flask_login import current_user from app.db import Session from app.models import ApiKey def authorize_request() -> Optional[Tuple[str, int]]: api_code = request.headers.get("Authenticat...
null
180,628
from functools import wraps from typing import Tuple, Optional import arrow from flask import Blueprint, request, jsonify, g from flask_login import current_user from app.db import Session from app.models import ApiKey def authorize_request() -> Optional[Tuple[str, int]]: api_code = request.headers.get("Authenticat...
null
180,629
import csv from io import StringIO import re from typing import Optional, Tuple from email_validator import validate_email, EmailNotValidError from sqlalchemy.exc import IntegrityError, DataError from flask import make_response from app.config import ( BOUNCE_PREFIX_FOR_REPLY_PHASE, BOUNCE_PREFIX, BOUNCE_SU...
null
180,630
import random import re import secrets import string import time import urllib.parse from functools import wraps from typing import List, Optional from flask_wtf import FlaskForm from unidecode import unidecode from .config import WORDS_FILE_PATH, ALLOWED_REDIRECT_DOMAINS from .log import LOG def random_word(): re...
null
180,631
import random import re import secrets import string import time import urllib.parse from functools import wraps from typing import List, Optional from flask_wtf import FlaskForm from unidecode import unidecode from .config import WORDS_FILE_PATH, ALLOWED_REDIRECT_DOMAINS from .log import LOG def word_exist(word): ...
null
180,632
import random import re import secrets import string import time import urllib.parse from functools import wraps from typing import List, Optional from flask_wtf import FlaskForm from unidecode import unidecode from .config import WORDS_FILE_PATH, ALLOWED_REDIRECT_DOMAINS from .log import LOG The provided code snippet...
Useful utility method to print out a SQLAlchemy query
180,633
import random import re import secrets import string import time import urllib.parse from functools import wraps from typing import List, Optional from flask_wtf import FlaskForm from unidecode import unidecode from .config import WORDS_FILE_PATH, ALLOWED_REDIRECT_DOMAINS from .log import LOG LOG = _get_logger("SL") ...
null
180,634
import arrow from flask import make_response, render_template from flask_login import login_required from app.config import URL from app.onboarding.base import onboarding_bp URL = os.environ["URL"] def setup_done(): response = make_response(render_template("onboarding/setup_done.html")) # TODO: Remove when t...
null
180,635
from app.onboarding.base import onboarding_bp from app.onboarding.utils import get_extension_info from flask import redirect, render_template, url_for from flask_login import login_required def get_extension_info() -> Optional[ExtensionInfo]: browser = get_browser() if browser == Browser.Chrome: extens...
null
180,636
from app.onboarding.base import onboarding_bp from flask import render_template def index(): return render_template("onboarding/index.html")
null
180,637
from app.extensions import limiter from app.models import Alias from app.onboarding.base import onboarding_bp from app.email_utils import send_test_email_alias from flask import render_template, request, flash from flask_login import current_user, login_required from flask_wtf import FlaskForm from wtforms import Strin...
null
180,638
from app.onboarding.base import onboarding_bp from app.onboarding.utils import get_extension_info from flask import redirect, url_for def get_extension_info() -> Optional[ExtensionInfo]: browser = get_browser() if browser == Browser.Chrome: extension_link = CHROME_EXTENSION_LINK browser_name = ...
null
180,639
from typing import Optional import arrow import sqlalchemy from flask_admin.model.template import EndpointLinkRowAction from markupsafe import Markup from app import models, s3 from flask import redirect, url_for, request, flash, Response from flask_admin import expose, AdminIndexView from flask_admin.actions import ac...
null
180,640
from typing import Optional import arrow import sqlalchemy from flask_admin.model.template import EndpointLinkRowAction from markupsafe import Markup from app import models, s3 from flask import redirect, url_for, request, flash, Response from flask_admin import expose, AdminIndexView from flask_admin.actions import ac...
null
180,641
from typing import Optional import arrow import sqlalchemy from flask_admin.model.template import EndpointLinkRowAction from markupsafe import Markup from app import models, s3 from flask import redirect, url_for, request, flash, Response from flask_admin import expose, AdminIndexView from flask_admin.actions import ac...
null
180,642
from typing import Optional import arrow import sqlalchemy from flask_admin.model.template import EndpointLinkRowAction from markupsafe import Markup from app import models, s3 from flask import redirect, url_for, request, flash, Response from flask_admin import expose, AdminIndexView from flask_admin.actions import ac...
null
180,643
from typing import Optional import arrow import sqlalchemy from flask_admin.model.template import EndpointLinkRowAction from markupsafe import Markup from app import models, s3 from flask import redirect, url_for, request, flash, Response from flask_admin import expose, AdminIndexView from flask_admin.actions import ac...
null
180,644
from typing import Optional import arrow import sqlalchemy from flask_admin.model.template import EndpointLinkRowAction from markupsafe import Markup from app import models, s3 from flask import redirect, url_for, request, flash, Response from flask_admin import expose, AdminIndexView from flask_admin.actions import ac...
null
180,645
from typing import Optional import arrow import sqlalchemy from flask_admin.model.template import EndpointLinkRowAction from markupsafe import Markup from app import models, s3 from flask import redirect, url_for, request, flash, Response from flask_admin import expose, AdminIndexView from flask_admin.actions import ac...
null
180,646
from typing import Optional import arrow import sqlalchemy from flask_admin.model.template import EndpointLinkRowAction from markupsafe import Markup from app import models, s3 from flask import redirect, url_for, request, flash, Response from flask_admin import expose, AdminIndexView from flask_admin.actions import ac...
null
180,647
from typing import Optional import arrow import sqlalchemy from flask_admin.model.template import EndpointLinkRowAction from markupsafe import Markup from app import models, s3 from flask import redirect, url_for, request, flash, Response from flask_admin import expose, AdminIndexView from flask_admin.actions import ac...
null
180,648
import os from jinja2 import Environment, FileSystemLoader from app.config import ROOT_DIR, URL from app.email_utils import send_email from app.handler.unsubscribe_encoder import UnsubscribeEncoder, UnsubscribeAction from app.log import LOG from app.models import NewsletterUser, Alias ROOT_DIR = os.path.abspath(os.pat...
Return whether the newsletter is sent successfully and the error if not
180,649
import base64 import hashlib from typing import Optional import arrow from jwcrypto import jwk, jwt from app.config import OPENID_PRIVATE_KEY_PATH, URL from app.log import LOG from app.models import ClientUser LOG = _get_logger("SL") def verify_id_token(id_token) -> bool: try: jwt.JWT(key=_key, jwt=id_tok...
null
180,650
import base64 import hashlib from typing import Optional import arrow from jwcrypto import jwk, jwt from app.config import OPENID_PRIVATE_KEY_PATH, URL from app.log import LOG from app.models import ClientUser def decode_id_token(id_token) -> jwt.JWT: return jwt.JWT(key=_key, jwt=id_token)
null
180,651
from datetime import datetime from typing import Optional import newrelic.agent import redis.exceptions import werkzeug.exceptions from limits.storage import RedisStorage from app.log import LOG lock_redis: Optional[RedisStorage] = None LOG = _get_logger("SL") def check_bucket_limit( lock_name: Optional[str] = No...
null
180,652
from dataclasses import dataclass from enum import Enum from flask import url_for from typing import Optional from app.errors import LinkException from app.models import User, Partner from app.proton.proton_client import ProtonClient, ProtonUser from app.account_linking import ( process_login_case, process_link...
null
180,653
from newrelic import agent from typing import Optional from app.db import Session from app.errors import ProtonPartnerNotSetUp from app.models import Partner, PartnerUser, User PROTON_PARTNER_NAME = "Proton" class Partner(Base, ModelMixin): __tablename__ = "partner" name = sa.Column(sa.String(128), unique=Tru...
null
180,654
from abc import ABC, abstractmethod from arrow import Arrow from dataclasses import dataclass from http import HTTPStatus from requests import Response, Session from typing import Optional from app.account_linking import SLPlan, SLPlanType from app.config import PROTON_EXTRA_HEADER_NAME, PROTON_EXTRA_HEADER_VALUE from ...
null
180,655
from __future__ import annotations import base64 import dataclasses import enum import hashlib import hmac import os import random import secrets import uuid from typing import List, Tuple, Optional, Union import arrow import sqlalchemy as sa from arrow import Arrow from email_validator import validate_email from flank...
null
180,656
from __future__ import annotations import base64 import dataclasses import enum import hashlib import hmac import os import random import secrets import uuid from typing import List, Tuple, Optional, Union import arrow import sqlalchemy as sa from arrow import Arrow from email_validator import validate_email from flank...
null
180,657
from __future__ import annotations import base64 import dataclasses import enum import hashlib import hmac import os import random import secrets import uuid from typing import List, Tuple, Optional, Union import arrow import sqlalchemy as sa from arrow import Arrow from email_validator import validate_email from flank...
null
180,658
from __future__ import annotations import base64 import dataclasses import enum import hashlib import hmac import os import random import secrets import uuid from typing import List, Tuple, Optional, Union import arrow import sqlalchemy as sa from arrow import Arrow from email_validator import validate_email from flank...
null
180,659
from __future__ import annotations import base64 import dataclasses import enum import hashlib import hmac import os import random import secrets import uuid from typing import List, Tuple, Optional, Union import arrow import sqlalchemy as sa from arrow import Arrow from email_validator import validate_email from flank...
null
180,660
from __future__ import annotations import base64 import dataclasses import enum import hashlib import hmac import os import random import secrets import uuid from typing import List, Tuple, Optional, Union import arrow import sqlalchemy as sa from arrow import Arrow from email_validator import validate_email from flank...
generate an email address that does not exist before :param alias_domain: the domain used to generate the alias. :param scheme: int, value of AliasGeneratorEnum, indicate how the email is generated :param retries: int, How many times we can try to generate an alias in case of collision :type in_hex: bool, if the genera...
180,661
from __future__ import annotations import base64 import email import json import os import time import uuid from concurrent.futures import ThreadPoolExecutor from email.message import Message from functools import wraps from smtplib import SMTP, SMTPException from typing import Optional, Dict, List, Callable import new...
null
180,662
from flask import request, redirect, url_for, flash, render_template, g from flask_login import login_user, current_user from app import email_utils from app.auth.base import auth_bp from app.db import Session from app.extensions import limiter from app.log import LOG from app.models import ActivationCode from app.util...
null
180,663
from flask import request, session, redirect, flash, url_for from requests_oauthlib import OAuth2Session from app.auth.base import auth_bp from app.auth.views.login_utils import after_login from app.config import GITHUB_CLIENT_ID, GITHUB_CLIENT_SECRET, URL from app.db import Session from app.log import LOG from app.mod...
null
180,664
from flask import request, session, redirect, flash, url_for from requests_oauthlib import OAuth2Session from app.auth.base import auth_bp from app.auth.views.login_utils import after_login from app.config import GITHUB_CLIENT_ID, GITHUB_CLIENT_SECRET, URL from app.db import Session from app.log import LOG from app.mod...
null
180,665
from flask import request, flash, render_template, redirect, url_for from flask_wtf import FlaskForm from wtforms import StringField, validators from app.auth.base import auth_bp from app.auth.views.register import send_activation_email from app.extensions import limiter from app.log import LOG from app.models import U...
null
180,666
from flask import redirect, url_for, flash, make_response from app.auth.base import auth_bp from app.config import SESSION_COOKIE_NAME from app.session import logout_session SESSION_COOKIE_NAME = "slapp" def logout_session(): logout_user() purge_fn = getattr(current_app.session_interface, "purge_session", Non...
null
180,667
from flask import request, session, redirect, flash, url_for from requests_oauthlib import OAuth2Session from app import s3 from app.auth.base import auth_bp from app.config import URL, GOOGLE_CLIENT_ID, GOOGLE_CLIENT_SECRET from app.db import Session from app.log import LOG from app.models import User, File, SocialAut...
null
180,668
from flask import request, session, redirect, flash, url_for from requests_oauthlib import OAuth2Session from app import s3 from app.auth.base import auth_bp from app.config import URL, GOOGLE_CLIENT_ID, GOOGLE_CLIENT_SECRET from app.db import Session from app.log import LOG from app.models import User, File, SocialAut...
null
180,669
import json import secrets from time import time import webauthn from flask import ( request, render_template, redirect, url_for, flash, session, make_response, g, ) from flask_login import login_user from flask_wtf import FlaskForm from wtforms import HiddenField, validators, BooleanFie...
null
180,670
from flask import render_template, redirect, url_for from flask_login import current_user from app.auth.base import auth_bp from app.log import LOG LOG = _get_logger("SL") def social(): if current_user.is_authenticated: LOG.d("user is already authenticated, redirect to dashboard") return redirect(...
null
180,671
from flask import request, session, redirect, url_for, flash from requests_oauthlib import OAuth2Session from requests_oauthlib.compliance_fixes import facebook_compliance_fix from app.auth.base import auth_bp from app.auth.views.google import create_file_from_url from app.config import ( URL, FACEBOOK_CLIENT_I...
null
180,672
from flask import request, session, redirect, url_for, flash from requests_oauthlib import OAuth2Session from requests_oauthlib.compliance_fixes import facebook_compliance_fix from app.auth.base import auth_bp from app.auth.views.google import create_file_from_url from app.config import ( URL, FACEBOOK_CLIENT_I...
null
180,673
from flask import request, render_template, flash, g from flask_wtf import FlaskForm from wtforms import StringField, validators from app.auth.base import auth_bp from app.dashboard.views.account_setting import send_reset_password_email from app.extensions import limiter from app.log import LOG from app.models import U...
null
180,674
from flask import request, render_template, redirect, url_for, flash, g from flask_login import current_user from flask_wtf import FlaskForm from wtforms import StringField, validators from app.auth.base import auth_bp from app.auth.views.login_utils import after_login from app.config import CONNECT_WITH_PROTON, CONNEC...
null
180,675
from flask import request, session, redirect, flash, url_for from requests_oauthlib import OAuth2Session from app import config from app.auth.base import auth_bp from app.auth.views.login_utils import after_login from app.config import ( URL, OIDC_AUTHORIZATION_URL, OIDC_USER_INFO_URL, OIDC_TOKEN_URL, ...
null
180,676
from flask import request, session, redirect, flash, url_for from requests_oauthlib import OAuth2Session from app import config from app.auth.base import auth_bp from app.auth.views.login_utils import after_login from app.config import ( URL, OIDC_AUTHORIZATION_URL, OIDC_USER_INFO_URL, OIDC_TOKEN_URL, ...
null
180,677
import arrow from flask import request, render_template, redirect, url_for, flash, session, g from flask_login import login_user from flask_wtf import FlaskForm from wtforms import StringField, validators from app.auth.base import auth_bp from app.config import MFA_USER_ID from app.db import Session from app.email_util...
null
180,678
import requests from flask import request, flash, render_template, redirect, url_for from flask_login import current_user from flask_wtf import FlaskForm from wtforms import StringField, validators from app import email_utils, config from app.auth.base import auth_bp from app.config import CONNECT_WITH_PROTON, CONNECT_...
null
180,679
import requests from flask import request, session, redirect, flash, url_for from flask_limiter.util import get_remote_address from flask_login import current_user from requests_oauthlib import OAuth2Session from typing import Optional from app.auth.base import auth_bp from app.auth.views.login_utils import after_login...
null
180,680
import requests from flask import request, session, redirect, flash, url_for from flask_limiter.util import get_remote_address from flask_login import current_user from requests_oauthlib import OAuth2Session from typing import Optional from app.auth.base import auth_bp from app.auth.views.login_utils import after_login...
null
180,681
import uuid from flask import request, flash, render_template, url_for, g from flask_wtf import FlaskForm from wtforms import StringField, validators from app.auth.base import auth_bp from app.auth.views.login_utils import after_login from app.db import Session from app.extensions import limiter from app.models import ...
null
180,682
import pyotp from flask import ( render_template, redirect, url_for, flash, session, make_response, request, g, ) from flask_login import login_user from flask_wtf import FlaskForm from wtforms import BooleanField, StringField, validators from app.auth.base import auth_bp from app.config...
null
180,683
import arrow from flask import redirect, url_for, request, flash from flask_login import login_user from app.auth.base import auth_bp from app.models import ApiToCookieToken from app.utils import sanitize_next_url class ApiToCookieToken(Base, ModelMixin): __tablename__ = "api_cookie_token" code = sa.Column(sa....
null
180,684
from flask import request, flash, render_template, redirect, url_for from flask_login import login_user from app.auth.base import auth_bp from app.db import Session from app.log import LOG from app.models import EmailChange, ResetPasswordCode Session = scoped_session(sessionmaker(bind=connection)) Session: sqlalchemy...
null
180,685
import arrow from flask import render_template, flash, redirect, url_for, request from flask_login import login_required, current_user from app.db import Session from app.models import PhoneReservation, User from app.phone.base import phone_bp current_user: User Session = scoped_session(sessionmaker(bind=connection)) ...
null
180,686
import jwt from flask import request from jwt import InvalidSignatureError, DecodeError from app.config import ( PHONE_PROVIDER_2_HEADER, PHONE_PROVIDER_2_SECRET, ) from app.log import LOG from app.models import PhoneNumber, PhoneMessage from app.phone.base import phone_bp PHONE_PROVIDER_2_HEADER = os.environ....
null
180,687
from functools import wraps from flask import request, abort from twilio.request_validator import RequestValidator from twilio.twiml.messaging_response import MessagingResponse from app.config import TWILIO_AUTH_TOKEN from app.log import LOG from app.models import PhoneNumber, PhoneMessage from app.phone.base import ph...
Validates that incoming requests genuinely originated from Twilio
180,688
from functools import wraps from flask import request, abort from twilio.request_validator import RequestValidator from twilio.twiml.messaging_response import MessagingResponse from app.config import TWILIO_AUTH_TOKEN from app.log import LOG from app.models import PhoneNumber, PhoneMessage from app.phone.base import ph...
null
180,689
from typing import Dict import arrow from flask import render_template, request, flash, redirect, url_for from flask_login import login_required, current_user from sqlalchemy import func from app.db import Session from app.models import PhoneCountry, PhoneNumber, PhoneReservation from app.phone.base import phone_bp def...
null
180,690
from typing import Dict import arrow from flask import render_template, request, flash, redirect, url_for from flask_login import login_required, current_user from sqlalchemy import func from app.db import Session from app.models import PhoneCountry, PhoneNumber, PhoneReservation from app.phone.base import phone_bp Se...
null
180,691
from flask import request from app.config import ( PHONE_PROVIDER_1_HEADER, PHONE_PROVIDER_1_SECRET, ) from app.log import LOG from app.models import PhoneNumber, PhoneMessage from app.phone.base import phone_bp PHONE_PROVIDER_1_HEADER = "X-SimpleLogin-Secret" PHONE_PROVIDER_1_SECRET = os.environ.get("PHONE_PR...
null
180,692
import uuid from datetime import timedelta from functools import wraps from typing import Callable, Any, Optional from flask import request from flask_login import current_user from limits.storage import RedisStorage from werkzeug import exceptions class _InnerLock: def __init__( self, lock_suffix: ...
null
180,693
from flask_limiter import Limiter from flask_limiter.util import get_remote_address from flask_login import current_user, LoginManager from app import config def __key_func(): if current_user.is_authenticated: return f"userid:{current_user.id}" else: ip_addr = get_remote_address() retur...
null
180,694
from flask_limiter import Limiter from flask_limiter.util import get_remote_address from flask_login import current_user, LoginManager from app import config def disable_rate_limit(): return config.DISABLE_RATE_LIMIT
null
180,695
import os import random import socket import string from ast import literal_eval from typing import Callable, List from urllib.parse import urlparse from dotenv import load_dotenv def sl_getenv(env_var: str, default_factory: Callable = None): URL = os.environ["URL"] def get_allowed_redirect_domains() -> List[str]: ...
null
180,696
import os import random import socket import string from ast import literal_eval from typing import Callable, List from urllib.parse import urlparse from dotenv import load_dotenv if "ALIAS_DOMAINS" in os.environ: ALIAS_DOMAINS = sl_getenv("ALIAS_DOMAINS") # ["domain1.com", "domain2.com"] else: ALIAS_DOMAINS =...
null
180,697
import os import random import socket import string from ast import literal_eval from typing import Callable, List from urllib.parse import urlparse from dotenv import load_dotenv if "ALIAS_DOMAINS" in os.environ: ALIAS_DOMAINS = sl_getenv("ALIAS_DOMAINS") # ["domain1.com", "domain2.com"] else: ALIAS_DOMAINS =...
null
180,698
import enum from typing import Set, Union import flask class Scope(enum.Enum): EMAIL = "email" NAME = "name" OPENID = "openid" AVATAR_URL = "avatar_url" def _split_arg(arg_input: Union[str, list]) -> Set[str]: """convert input response_type/scope into a set of string. arg_input = request.args.ge...
null
180,699
from flask import render_template, redirect, url_for, flash from flask_login import current_user, login_required from flask_wtf import FlaskForm from wtforms import StringField, validators from app.db import Session from app.developer.base import developer_bp from app.models import Client class NewClientForm(FlaskForm)...
null
180,700
from io import BytesIO from flask import request, render_template, redirect, url_for, flash from flask_login import current_user, login_required from flask_wtf import FlaskForm from flask_wtf.file import FileField from wtforms import StringField, validators, TextAreaField from app import s3 from app.config import ADMIN...
null
180,701
from io import BytesIO from flask import request, render_template, redirect, url_for, flash from flask_login import current_user, login_required from flask_wtf import FlaskForm from flask_wtf.file import FileField from wtforms import StringField, validators, TextAreaField from app import s3 from app.config import ADMIN...
null
180,702
from io import BytesIO from flask import request, render_template, redirect, url_for, flash from flask_login import current_user, login_required from flask_wtf import FlaskForm from flask_wtf.file import FileField from wtforms import StringField, validators, TextAreaField from app import s3 from app.config import ADMIN...
null
180,703
from io import BytesIO from flask import request, render_template, redirect, url_for, flash from flask_login import current_user, login_required from flask_wtf import FlaskForm from flask_wtf.file import FileField from wtforms import StringField, validators, TextAreaField from app import s3 from app.config import ADMIN...
null
180,704
from io import BytesIO from flask import request, render_template, redirect, url_for, flash from flask_login import current_user, login_required from flask_wtf import FlaskForm from flask_wtf.file import FileField from wtforms import StringField, validators, TextAreaField from app import s3 from app.config import ADMIN...
null
180,705
from flask import render_template from flask_login import current_user, login_required from app.developer.base import developer_bp from app.models import Client class Client(Base, ModelMixin): __tablename__ = "client" oauth_client_id = sa.Column(sa.String(128), unique=True, nullable=False) oauth_client_sec...
null
180,706
from app.build_info import SHA1 from app.monitor.base import monitor_bp SHA1 = "dev" def git_sha1(): return SHA1
null
180,707
from app.build_info import SHA1 from app.monitor.base import monitor_bp def live(): return "live"
null
180,708
from app.build_info import SHA1 from app.monitor.base import monitor_bp def test_exception(): raise Exception("to make sure sentry works") return "never reach here"
null
180,709
from app import config from typing import Optional, List, Tuple import dns.resolver def _get_dns_resolver(): my_resolver = dns.resolver.Resolver() my_resolver.nameservers = config.NAMESERVERS return my_resolver def get_ns(hostname) -> [str]: try: answers = _get_dns_resolver().resolve(hostname, ...
null