Add actions/upload-artifact@v4.0.0
This commit is contained in:
BIN
sublime_text/Lib/python3.3.zip
Normal file
BIN
sublime_text/Lib/python3.3.zip
Normal file
Binary file not shown.
BIN
sublime_text/Lib/python3.8.zip
Normal file
BIN
sublime_text/Lib/python3.8.zip
Normal file
Binary file not shown.
21
sublime_text/Lib/python3/certifi/LICENSE
Normal file
21
sublime_text/Lib/python3/certifi/LICENSE
Normal file
@@ -0,0 +1,21 @@
|
||||
This package contains a modified version of ca-bundle.crt:
|
||||
|
||||
ca-bundle.crt -- Bundle of CA Root Certificates
|
||||
|
||||
Certificate data from Mozilla as of: Thu Nov 3 19:04:19 2011#
|
||||
This is a bundle of X.509 certificates of public Certificate Authorities
|
||||
(CA). These were automatically extracted from Mozilla's root certificates
|
||||
file (certdata.txt). This file can be found in the mozilla source tree:
|
||||
https://hg.mozilla.org/mozilla-central/file/tip/security/nss/lib/ckfw/builtins/certdata.txt
|
||||
It contains the certificates in PEM format and therefore
|
||||
can be directly used with curl / libcurl / php_curl, or with
|
||||
an Apache+mod_ssl webserver for SSL client authentication.
|
||||
Just configure this file as the SSLCACertificateFile.#
|
||||
|
||||
***** BEGIN LICENSE BLOCK *****
|
||||
This Source Code Form is subject to the terms of the Mozilla Public License,
|
||||
v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain
|
||||
one at http://mozilla.org/MPL/2.0/.
|
||||
|
||||
***** END LICENSE BLOCK *****
|
||||
@(#) $RCSfile: certdata.txt,v $ $Revision: 1.80 $ $Date: 2011/11/03 15:11:58 $
|
4
sublime_text/Lib/python3/certifi/__init__.py
Normal file
4
sublime_text/Lib/python3/certifi/__init__.py
Normal file
@@ -0,0 +1,4 @@
|
||||
from .core import contents, where
|
||||
|
||||
__all__ = ["contents", "where"]
|
||||
__version__ = "2022.12.07"
|
12
sublime_text/Lib/python3/certifi/__main__.py
Normal file
12
sublime_text/Lib/python3/certifi/__main__.py
Normal file
@@ -0,0 +1,12 @@
|
||||
import argparse
|
||||
|
||||
from certifi import contents, where
|
||||
|
||||
parser = argparse.ArgumentParser()
|
||||
parser.add_argument("-c", "--contents", action="store_true")
|
||||
args = parser.parse_args()
|
||||
|
||||
if args.contents:
|
||||
print(contents())
|
||||
else:
|
||||
print(where())
|
4527
sublime_text/Lib/python3/certifi/cacert.pem
Normal file
4527
sublime_text/Lib/python3/certifi/cacert.pem
Normal file
File diff suppressed because it is too large
Load Diff
98
sublime_text/Lib/python3/certifi/core.py
Normal file
98
sublime_text/Lib/python3/certifi/core.py
Normal file
@@ -0,0 +1,98 @@
|
||||
"""
|
||||
certifi.py
|
||||
~~~~~~~~~~
|
||||
|
||||
This module returns the installation location of cacert.pem or its contents.
|
||||
"""
|
||||
import sys
|
||||
|
||||
|
||||
if sys.version_info >= (3, 11):
|
||||
|
||||
from importlib.resources import as_file, files
|
||||
|
||||
_CACERT_CTX = None
|
||||
_CACERT_PATH = None
|
||||
|
||||
def where() -> str:
|
||||
# This is slightly terrible, but we want to delay extracting the file
|
||||
# in cases where we're inside of a zipimport situation until someone
|
||||
# actually calls where(), but we don't want to re-extract the file
|
||||
# on every call of where(), so we'll do it once then store it in a
|
||||
# global variable.
|
||||
global _CACERT_CTX
|
||||
global _CACERT_PATH
|
||||
if _CACERT_PATH is None:
|
||||
# This is slightly janky, the importlib.resources API wants you to
|
||||
# manage the cleanup of this file, so it doesn't actually return a
|
||||
# path, it returns a context manager that will give you the path
|
||||
# when you enter it and will do any cleanup when you leave it. In
|
||||
# the common case of not needing a temporary file, it will just
|
||||
# return the file system location and the __exit__() is a no-op.
|
||||
#
|
||||
# We also have to hold onto the actual context manager, because
|
||||
# it will do the cleanup whenever it gets garbage collected, so
|
||||
# we will also store that at the global level as well.
|
||||
_CACERT_CTX = as_file(files("certifi").joinpath("cacert.pem"))
|
||||
_CACERT_PATH = str(_CACERT_CTX.__enter__())
|
||||
|
||||
return _CACERT_PATH
|
||||
|
||||
def contents() -> str:
|
||||
return files("certifi").joinpath("cacert.pem").read_text(encoding="ascii")
|
||||
|
||||
elif sys.version_info >= (3, 7):
|
||||
|
||||
from importlib.resources import path as get_path, read_text
|
||||
|
||||
_CACERT_CTX = None
|
||||
_CACERT_PATH = None
|
||||
|
||||
def where() -> str:
|
||||
# This is slightly terrible, but we want to delay extracting the
|
||||
# file in cases where we're inside of a zipimport situation until
|
||||
# someone actually calls where(), but we don't want to re-extract
|
||||
# the file on every call of where(), so we'll do it once then store
|
||||
# it in a global variable.
|
||||
global _CACERT_CTX
|
||||
global _CACERT_PATH
|
||||
if _CACERT_PATH is None:
|
||||
# This is slightly janky, the importlib.resources API wants you
|
||||
# to manage the cleanup of this file, so it doesn't actually
|
||||
# return a path, it returns a context manager that will give
|
||||
# you the path when you enter it and will do any cleanup when
|
||||
# you leave it. In the common case of not needing a temporary
|
||||
# file, it will just return the file system location and the
|
||||
# __exit__() is a no-op.
|
||||
#
|
||||
# We also have to hold onto the actual context manager, because
|
||||
# it will do the cleanup whenever it gets garbage collected, so
|
||||
# we will also store that at the global level as well.
|
||||
_CACERT_CTX = get_path("certifi", "cacert.pem")
|
||||
_CACERT_PATH = str(_CACERT_CTX.__enter__())
|
||||
|
||||
return _CACERT_PATH
|
||||
|
||||
def contents() -> str:
|
||||
return read_text("certifi", "cacert.pem", encoding="ascii")
|
||||
|
||||
else:
|
||||
import os
|
||||
|
||||
# This fallback will work for Python versions prior to 3.7 that lack the
|
||||
# importlib.resources module but relies on the existing `where` function
|
||||
# so won't address issues with environments like PyOxidizer that don't set
|
||||
# __file__ on modules.
|
||||
def read_text(_module, _path, encoding="ascii"):
|
||||
with open(where(), "r", encoding=encoding) as data:
|
||||
return data.read()
|
||||
|
||||
# If we don't have importlib.resources, then we will just do the old logic
|
||||
# of assuming we're on the filesystem and munge the path directly.
|
||||
def where():
|
||||
f = os.path.dirname(__file__)
|
||||
|
||||
return os.path.join(f, "cacert.pem")
|
||||
|
||||
def contents():
|
||||
return read_text("certifi", "cacert.pem", encoding="ascii")
|
0
sublime_text/Lib/python3/certifi/py.typed
Normal file
0
sublime_text/Lib/python3/certifi/py.typed
Normal file
2265
sublime_text/Lib/python33/sublime.py
Normal file
2265
sublime_text/Lib/python33/sublime.py
Normal file
File diff suppressed because it is too large
Load Diff
1742
sublime_text/Lib/python33/sublime_plugin.py
Normal file
1742
sublime_text/Lib/python33/sublime_plugin.py
Normal file
File diff suppressed because it is too large
Load Diff
4407
sublime_text/Lib/python38/sublime.py
Normal file
4407
sublime_text/Lib/python38/sublime.py
Normal file
File diff suppressed because it is too large
Load Diff
2766
sublime_text/Lib/python38/sublime_plugin.py
Normal file
2766
sublime_text/Lib/python38/sublime_plugin.py
Normal file
File diff suppressed because it is too large
Load Diff
15
sublime_text/Lib/python38/sublime_types.py
Normal file
15
sublime_text/Lib/python38/sublime_types.py
Normal file
@@ -0,0 +1,15 @@
|
||||
# Don't evaluate type annotations at runtime
|
||||
from __future__ import annotations
|
||||
|
||||
from typing import Tuple, Union, List, Dict, Optional, Any
|
||||
from typing_extensions import TypeAlias
|
||||
from sublime import KindId, CompletionItem
|
||||
|
||||
DIP: TypeAlias = 'float'
|
||||
Vector: TypeAlias = 'Tuple[DIP, DIP]'
|
||||
Point: TypeAlias = 'int'
|
||||
Value: TypeAlias = 'Union[bool, str, int, float, List[Any], Dict[str, Any], None]'
|
||||
CommandArgs: TypeAlias = 'Optional[Dict[str, Value]]'
|
||||
Kind: TypeAlias = 'Tuple[KindId, str, str]'
|
||||
Event: TypeAlias = 'dict'
|
||||
CompletionValue: TypeAlias = 'Union[str, Tuple[str, str], CompletionItem]'
|
Reference in New Issue
Block a user