CasperSecurity

Current Path : /lib/python3/dist-packages/click/__pycache__/
Upload File :
Current File : //lib/python3/dist-packages/click/__pycache__/globals.cpython-310.pyc

o

�+ca��@s�ddlZddlZddlmZejrddlZddlmZe�Z	ej
ddd
d��Zej
ddedej
d	fd
d��Zddedej
d	fdd�Zddd�Zddd�Zddej
edej
efdd�ZdS)�N)�local�)�ContextF�silent�te.Literal[False]�returnrcC�dS�N��rr
r
�//usr/lib/python3/dist-packages/click/globals.py�get_current_context�r
.cCrr	r
rr
r
rr
rc
CsNz
t�dtjd�WSttfy&}z|std�|�WYd}~dSd}~ww)a�Returns the current click context.  This can be used as a way to
    access the current context object from anywhere.  This is a more implicit
    alternative to the :func:`pass_context` decorator.  This function is
    primarily useful for helpers such as :func:`echo` which might be
    interested in changing its behavior based on the current context.

    To push the current context, :meth:`Context.scope` can be used.

    .. versionadded:: 5.0

    :param silent: if set to `True` the return value is `None` if no context
                   is available.  The default behavior is to raise a
                   :exc:`RuntimeError`.
    r���z!There is no active click context.N)�t�cast�_local�stack�AttributeError�
IndexError�RuntimeError)r�er
r
rr
s

����ctxcCstj�dg��|�dS)z*Pushes a new context to the current stack.rN)r�__dict__�
setdefault�append)rr
r
r�push_context.srcCstj��dS)z%Removes the top level from the stack.N)rr�popr
r
r
r�pop_context3sr�colorcCs(|dur|Stdd�}|dur|jSdS)z�Internal helper to get the default value of the color flag.  If a
    value is passed it's returned unchanged, otherwise it's looked up from
    the current context.
    NTr)r
r)rrr
r
r�resolve_color_default8s
r )F)rrrr).)rrrN)rNr	)�typingr�	threadingr�
TYPE_CHECKING�typing_extensions�te�corerr�overloadr
�bool�Optionalrrr r
r
r
r�<module>s

$
Hacker Blog, Shell İndir, Sql İnjection, XSS Attacks, LFI Attacks, Social Hacking, Exploit Bot, Proxy Tools, Web Shell, PHP Shell, Alfa Shell İndir, Hacking Training Set, DDoS Script, Denial Of Service, Botnet, RFI Attacks, Encryption
Telegram @BIBIL_0DAY