
    xii                       U d dl mZ d dlmZmZ d dlmZmZmZm	Z	m
Z
 d dlmZmZmZ d dlmZmZmZmZ d dlmZmZ d dlmZmZ d dlmZ d d	lmZ d d
lmZ  d dl!m"Z" erd dlm#Z#  ejH                  e%      Z&de'd<   dZ(de'd<   dZ)de'd<    ed      d"d#d       Z* ed      d$d       Z+d%dZ,d&dZ- G d dee.e.f         Z/ G d dee.e.e0z  e/z  dz  f         Z1da2d$dZ3 G d  d!e1      Z4y)'    )annotations)IteratorMapping)TYPE_CHECKINGAnyFinalNoReturncast)configloggerruntime)encode_provider_tokenget_secrets_auth_sectionis_authlib_installedvalidate_auth_credentials)make_deprecated_name_warningshow_deprecation_warning)StreamlitAPIExceptionStreamlitAuthError)
ForwardMsg)gather_metrics)get_script_run_ctx)make_url_path)UserInfoTyper   _LOGGERz/auth/loginAUTH_LOGIN_ENDPOINTz/auth/logoutAUTH_LOGOUT_ENDPOINTloginNc                    | d} t               }|Vt               st        d      t        |        t	               }t        |       |j                  _        |j                  |       yy)a'  Initiate the login flow for the given provider.

    This command redirects the user to an OpenID Connect (OIDC) provider. After
    the user authenticates their identity, they are redirected back to the
    home page of your app. Streamlit stores a cookie with the user's identity
    information in the user's browser . You can access the identity information
    through |st.user|_. Call ``st.logout()`` to remove the cookie
    and start a new session.

    You can use any OIDC provider, including Google, Microsoft, Okta, and more.
    You must configure the provider through secrets management. Although OIDC
    is an extension of OAuth 2.0, you can't use generic OAuth providers.
    Streamlit parses the user's identity token and surfaces its attributes in
    ``st.user``. If the provider returns an access token, that
    token is ignored unless you explicitly expose it.

    For all providers, there are three shared settings, ``redirect_uri``,
    ``cookie_secret``, and ``expose_tokens``, which you must specify in an
    ``[auth]`` dictionary in ``secrets.toml``. Other settings must be defined
    as described in the ``provider`` parameter.

    - ``redirect_uri`` is your app's absolute URL with the pathname
      ``oauth2callback``. For local development using the default port, this is
      ``http://localhost:8501/oauth2callback``.
    - ``cookie_secret`` should be a strong, randomly generated secret.
    - ``expose_tokens`` is a list of token types to expose. The supported token
      types are ``"id"`` and ``"access"``. This is an optional setting, and no
      tokens are exposed by default. For information and examples about exposing
      tokens, see |st.user|_.

    In addition to the shared settings, the following settings are required:

    - ``client_id``
    - ``client_secret``
    - ``server_metadata_url``

    For a complete list of OIDC parameters, see `OpenID Connect Core
    <https://openid.net/specs/openid-connect-core-1_0.html#AuthRequest>`_ and
    your provider's documentation. By default, Streamlit sets
    ``scope="openid profile email"`` and ``prompt="select_account"``. You can
    change these and other OIDC parameters by passing a dictionary of settings
    to ``client_kwargs``. ``state`` and ``nonce``, which are used for
    security, are handled automatically and don't need to be specified. For
    more information, see Example 4.

    .. Important::
        - You must install ``Authlib>=1.3.2`` to use this command. You can
          install it as an extra with Streamlit:

          .. code-block:: shell

             pip install streamlit[auth]

        - Your authentication configuration is dependent on your host location.
          When you deploy your app, remember to update your ``redirect_uri``
          within your app and your provider.
        - All URLs declared in the settings must be absolute (i.e., begin with
          ``http://`` or ``https://``).
        - Streamlit automatically enables CORS and XSRF protection when you
          configure authentication in ``secrets.toml``. This takes precedence
          over configuration options in ``config.toml``.
        - If a user is logged into your app and opens a new tab in the same
          browser, they will automatically be logged in to the new session with
          the same account.
        - If a user closes your app without logging out, the identity cookie
          will expire after 30 days.
        - For security reasons, authentication is not supported for embedded
          apps.

    .. |st.user| replace:: ``st.user``
    .. _st.user: https://docs.streamlit.io/develop/api-reference/user/st.user

    Parameters
    ----------
    provider: str or None
        The name of your provider configuration to use for login.

        If ``provider`` is ``None`` (default), Streamlit will use all settings
        in the ``[auth]`` dictionary within your app's ``secrets.toml`` file.
        Otherwise, use an ``[auth.{provider}]`` dictionary for the named
        provider, as shown in the examples that follow. When you pass a string
        to ``provider``, Streamlit will use ``redirect_uri`` and
        ``cookie_secret``, while ignoring any other values in the ``[auth]``
        dictionary.

        Due to internal implementation details, Streamlit does not support
        using an underscore within ``provider`` at this time.

    Examples
    --------
    **Example 1: Use an unnamed default identity provider**

    If you do not specify a name for your provider, specify all settings within
    the ``[auth]`` dictionary of your ``secrets.toml`` file. The following
    example configures Google as the default provider. For information about
    using OIDC with Google, see `Google Identity
    <https://developers.google.com/identity/openid-connect/openid-connect>`_.

    .. code-block:: toml
        :filename: .streamlit/secrets.toml

        [auth]
        redirect_uri = "http://localhost:8501/oauth2callback"
        cookie_secret = "xxx"
        client_id = "xxx"
        client_secret = "xxx"
        server_metadata_url = "https://accounts.google.com/.well-known/openid-configuration"  # fmt: skip

    .. code-block:: python
        :filename: streamlit_app.py

        import streamlit as st

        if not st.user.is_logged_in:
            if st.button("Log in"):
                st.login()
        else:
            if st.button("Log out"):
                st.logout()
            st.write(f"Hello, {st.user.name}!")

    **Example 2: Use a named identity provider**

    If you specify a name for your provider, save the shared settings in the
    ``[auth]`` dictionary of your ``secrets.toml`` file, and save the other
    settings in an ``[auth.{provider}]`` dictionary, where ``{provider}`` is
    the name of your provider. The following example configures Microsoft as
    the provider. The example uses ``provider="microsoft"``, but you can use
    any name. This name is internal to Streamlit and is used to match the login
    command to its configuration. For information about using OIDC with
    Microsoft, see `Microsoft Entra ID
    <https://learn.microsoft.com/en-us/power-pages/security/authentication/openid-settings>`_.
    To configure your ``{tenant}`` value in ``server_metadata_url``, see
    `Microsoft identity platform
    <https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc#find-your-apps-openid-configuration-document-uri>`_.

    .. code-block:: toml
        :filename: .streamlit/secrets.toml

        [auth]
        redirect_uri = "http://localhost:8501/oauth2callback"
        cookie_secret = "xxx"

        [auth.microsoft]
        client_id = "xxx"
        client_secret = "xxx"
        server_metadata_url = "https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration"

    .. code-block:: python
        :filename: streamlit_app.py

        import streamlit as st

        if not st.user.is_logged_in:
            st.login("microsoft")
        else:
            st.write(f"Hello, {st.user.name}!")

    **Example 3: Use multiple, named providers**

    If you want to give your users a choice of authentication methods,
    configure multiple providers and give them each a unique name. The
    following example lets users choose between Okta and Microsoft to log in.
    Always check with your identity provider to understand the structure of
    their identity tokens because the returned fields may differ. Remember to
    set ``{tenant}`` and ``{subdomain}`` in ``server_metadata_url`` for
    Microsoft and Okta, respectively.

    .. code-block:: toml
        :filename: .streamlit/secrets.toml

        [auth]
        redirect_uri = "http://localhost:8501/oauth2callback"
        cookie_secret = "xxx"

        [auth.microsoft]
        client_id = "xxx"
        client_secret = "xxx"
        server_metadata_url = "https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration"

        [auth.okta]
        client_id = "xxx"
        client_secret = "xxx"
        server_metadata_url = "https://{subdomain}.okta.com/.well-known/openid-configuration"

    .. code-block:: python
        :filename: streamlit_app.py

        import streamlit as st

        if not st.user.is_logged_in:
            st.header("Log in:")
            if st.button("Microsoft"):
                st.login("microsoft")
            if st.button("Okta"):
                st.login("okta")
        else:
            if st.button("Log out"):
                st.logout()
            st.write(f"Hello, {st.user.name}!")

    **Example 4: Change the default connection settings**

    ``prompt="select_account"`` may be treated differently by some
    providers when a user is already logged into their account. If a user is
    logged into their Google or Microsoft account from a previous session, the
    provider will prompt them to select the account they want to use, even if
    it's the only one. However, if the user is logged into their Okta or Auth0
    account from a previous session, the account will automatically be
    selected. ``st.logout()`` does not clear a user's related cookies. To force
    users to log in every time, use ``prompt="login"`` as described in Auth0's
    `Customize Signup and Login Prompts
    <https://auth0.com/docs/customize/login-pages/universal-login/customize-signup-and-login-prompts>`_.

    .. code-block:: toml
        :filename: .streamlit/secrets.toml

        [auth]
        redirect_uri = "http://localhost:8501/oauth2callback"
        cookie_secret = "xxx"

        [auth.auth0]
        client_id = "xxx"
        client_secret = "xxx"
        server_metadata_url = "https://{account}.{region}.auth0.com/.well-known/openid-configuration"
        client_kwargs = { "prompt" = "login" }

    .. code-block:: python
        :filename: streamlit_app.py

        import streamlit as st

        if st.button("Log in"):
            st.login("auth0")
        if st.user.is_logged_in:
            if st.button("Log out"):
                st.logout()
            st.write(f"Hello, {st.user.name}!)

    NdefaultzcTo use authentication features, you need to install Authlib>=1.3.2, e.g. via `pip install Authlib`.)	_get_script_run_ctxr   r   r   r   generate_login_redirect_urlauth_redirecturlenqueue)providercontextfwd_msgs      _/var/www/html/chatbot/card-advisor-bot/venv/lib/python3.12/site-packages/streamlit/user_info.pyr   r   7   sl    d !#G#%$F  	"(+,$?$I!      logoutc                 z   t               } | | j                  j                          | j                  }t	        j
                         r%t	        j                         }|j                  |       t        j                  d      }t               }t        |t              |j                  _        | j                  |       yy)a  Logout the current user.

    This command removes the user's information from ``st.user``,
    deletes their identity cookie, and redirects them to perform a proper
    logout from the OAuth provider (if available) before returning to your
    app's home page. This creates a new session.

    If the user has multiple sessions open in the same browser,
    ``st.user`` will not be cleared in any other session.
    ``st.user`` only reads from the identity cookie at the start
    of a session. After a session is running, you must call ``st.login()`` or
    ``st.logout()`` within that session to update ``st.user``.

    .. Note::
        If the OAuth provider supports OIDC end_session_endpoint in their
        server metadata, the user will be logged out from the identity provider
        as well. If not available, only local logout is performed.

    Example
    -------
    ``.streamlit/secrets.toml``:

    >>> [auth]
    >>> redirect_uri = "http://localhost:8501/oauth2callback"
    >>> cookie_secret = "xxx"
    >>> client_id = "xxx"
    >>> client_secret = "xxx"
    >>> server_metadata_url = "https://accounts.google.com/.well-known/openid-configuration"  # fmt: skip

    Your app code:

    >>> import streamlit as st
    >>>
    >>> if not st.user.is_logged_in:
    >>>     if st.button("Log in"):
    >>>         st.login()
    >>> else:
    >>>     if st.button("Log out"):
    >>>         st.logout()
    >>>     st.write(f"Hello, {st.user.name}!")
    Nserver.baseUrlPath)r!   	user_infoclear
session_idr   existsget_instanceclear_user_info_for_sessionr   
get_optionr   r   r   r#   r$   r%   )r'   r0   instance	base_pathr(   s        r)   r+   r+   9  s    V "#G!''
>>++-H00<%%&:;	,$1)=Q$R!  r*   c                p    t        |       }t        j                  d      }t        |t              }| d| S )z7Generate the login redirect URL for the given provider.r-   z
?provider=)r   r   r4   r   r   )r&   provider_tokenr6   
login_paths       r)   r"   r"   t  s<    *84N!!"67Iy*=>J\N#344r*   c                     t               } | t        j                  d       i S | j                  j	                         }t               }d|vr|rd|d<   |S )NzINo script run context available. st.user will return an empty dictionary.is_logged_inF)r!   r   warningr.   copyr   )ctxcontext_user_infoauth_section_existss      r)   _get_user_inforA   |  s^    

C
{W	
 	**,24..3F,1.)r*   c                  \     e Zd ZdZd
dZddZddZd fdZddZddZ	ddZ
dd	Z xZS )TokensProxya   
    A read-only, dict-like object for accessing exposed tokens from the    identity provider.

    This class provides access to tokens that have been explicitly exposed via
    the ``expose_tokens`` setting in your authentication configuration. Tokens
    contain sensitive credentials that your app can use to authenticate with
    external services on behalf of the logged-in user.

    To expose tokens in ``st.user.tokens``, add the ``expose_tokens`` parameter to your authentication
    configuration in ``.streamlit/secrets.toml``. ``expose_tokens`` must be in
    the ``[auth]`` section and can't be a nested dictionary. You can specify a
    single token type as a string or multiple token types as a list. Streamlit
    supports exposing ``"id"`` tokens and ``"access"`` tokens. If
    ``expose_tokens`` isn't configured, ``st.user.tokens`` is an empty dict.

    .. warning::
        Tokens are sensitive credentials that should be handled securely. Never
        expose tokens in your app's UI, logs, or error messages. Only use tokens
        for server-side API calls, and be mindful of token expiration times.
        Only expose tokens if your app needs them for specific API integrations.

    You can access token values using either key or attribute notation. For
    example, use ``st.user.tokens["id"]`` or ``st.user.tokens.id`` to access
    the ``id`` token. The object is read-only to prevent accidental modification of sensitive
    credentials.

    Attributes
    ----------
    id : str
        The identity token. This is only available if ``"id"`` is in ``expose_tokens``.
    access : str
        The access token. This is only available if ``"access"`` is in ``expose_tokens``.

    Examples
    --------
    **Example 1: Expose the ID token**

    To expose only the identity token, add ``expose_tokens`` to your
    authentication configuration. This example uses an unnamed default provider.

    .. code-block:: toml
        :filename: .streamlit/secrets.toml

        [auth]
        redirect_uri = "http://localhost:8501/oauth2callback"
        cookie_secret = "xxx"
        client_id = "xxx"
        client_secret = "xxx"
        server_metadata_url = "https://accounts.google.com/.well-known/openid-configuration"
        expose_tokens = "id"

    .. code-block:: python
        :filename: streamlit_app.py

        import streamlit as st

        if st.user.is_logged_in:
            id_token = st.user.tokens["id"]
            # Use the token for API verification

    **Example 2: Expose both ID and access tokens**

    You can use a list to expose multiple tokens. If you use one or more named
    identity providers, the same tokens must be exposed for all providers in
    the shared ``[auth]`` section.

    .. code-block:: toml
        :filename: .streamlit/secrets.toml

        [auth]
        redirect_uri = "http://localhost:8501/oauth2callback"
        cookie_secret = "xxx"
        expose_tokens = ["id", "access"]

        [auth.google]
        client_id = "xxx"
        client_secret = "xxx"
        server_metadata_url = "https://accounts.google.com/.well-known/openid-configuration"

        [auth.microsoft]
        client_id = "xxx"
        client_secret = "xxx"
        server_metadata_url = "https://login.microsoftonline.com/{tenant}/v2.0/.well-known/openid-configuration"

    .. code-block:: python
        :filename: streamlit_app.py

        import streamlit as st

        if st.user.is_logged_in:
            id_token = st.user.tokens["id"]
            access_token = st.user.tokens["access"]
            # Use the tokens for API verification
    c                    || _         y N_tokens)selftokenss     r)   __init__zTokensProxy.__init__  s	    r*   c                     | j                   |   S rE   rF   rH   keys     r)   __getitem__zTokensProxy.__getitem__  s    ||C  r*   c                Z    	 | j                   |   S # t        $ r t        d| d      w xY w)NzToken "z#" is not exposed or does not exist.)rG   KeyErrorAttributeErrorrL   s     r)   __getattr__zTokensProxy.__getattr__  s=    	U<<$$ 	U 73%/R!STT	Us    *c                ^    |j                  d      rt        | 	  ||       y t        d      )N_!st.user.tokens cannot be modified)
startswithsuper__setattr__r   )rH   namevalue	__class__s      r)   rX   zTokensProxy.__setattr__  s*    ??3Ge,'(KLLr*   c                    t        d      )NrU   r   rH   rY   rZ   s      r)   __setitem__zTokensProxy.__setitem__   s    #$GHHr*   c                ,    t        | j                        S rE   )iterrG   rH   s    r)   __iter__zTokensProxy.__iter__  s    DLL!!r*   c                ,    t        | j                        S rE   )lenrG   rb   s    r)   __len__zTokensProxy.__len__  s    4<<  r*   c                ,    t        | j                        S )zReturn the token mapping as a standard dictionary.

        Returns
        -------
        dict[str, str]
            A dictionary mapping token names to token values.
        )dictrG   rb   s    r)   to_dictzTokensProxy.to_dict	  s     DLL!!r*   )rI   dict[str, str]returnNone)rM   strrk   rm   )rY   rm   rZ   r   rk   rl   rk   zIterator[str]rk   int)rk   rj   )__name__
__module____qualname____doc__rJ   rN   rR   rX   r_   rc   rf   ri   __classcell__r[   s   @r)   rC   rC     s5    ^@!UMI"!"r*   rC   c                  p    e Zd ZdZddZddZddZddZddZddZ	ddZ
e ed	      dd
              Zy)UserInfoProxya  
    A read-only, dict-like object for accessing information about the current    user.

    ``st.user`` is dependent on the host platform running your
    Streamlit app. If your host platform has not configured the object,
    ``st.user`` will behave as it does in a locally running app.

    When authentication is configured in ``secrets.toml``, Streamlit will parse
    the OpenID Connect (OIDC) identity token and copy the attributes to
    ``st.user``. Check your provider's documentation for their
    available attributes (known as claims).

    When authentication is not configured, ``st.user`` has no
    attributes.

    You can access values via key or attribute notation. For example, use
    ``st.user["email"]`` or ``st.user.email`` to
    access the ``email`` attribute.

    .. Important::
        Identity tokens include an issuance and expiration time. Streamlit does
        not implicitly check these. If you want to automatically expire a
        user's authentication, check these values manually and programmatically
        log out your user (``st.logout()``) when needed.

    Attributes
    ----------
    is_logged_in : bool
        Whether a user is logged in. For a locally running app, this attribute
        is only available when authentication (``st.login()``) is configured in
        ``secrets.toml``. Otherwise, it does not exist.

    tokens: TokensProxy
        A read-only, dict-like object for accessing exposed tokens from the
        identity provider.

    Examples
    --------
    **Example 1: Google's identity token**

    If you configure a basic Google OIDC connection as shown in Example 1 of
    ``st.login()``, the following data is available in
    ``st.user``. Streamlit adds the ``is_logged_in`` attribute.
    Additional attributes may be available depending on the configuration of
    the user's Google account. For more information about Google's identity
    tokens, see `Obtain user information from the ID token
    <https://developers.google.com/identity/openid-connect/openid-connect#obtainuserinfo>`_
    in Google's docs.

    .. code-block:: python
        :filename: streamlit_app.py

        import streamlit as st

        if st.user.is_logged_in:
            st.write(st.user)

    Displayed data when a user is logged in:

    .. code-block:: json

        {
            "is_logged_in":true
            "iss":"https://accounts.google.com"
            "azp":"{client_id}.apps.googleusercontent.com"
            "aud":"{client_id}.apps.googleusercontent.com"
            "sub":"{unique_user_id}"
            "email":"{user}@gmail.com"
            "email_verified":true
            "at_hash":"{access_token_hash}"
            "nonce":"{nonce_string}"
            "name":"{full_name}"
            "picture":"https://lh3.googleusercontent.com/a/{content_path}"
            "given_name":"{given_name}"
            "family_name":"{family_name}"
            "iat":{issued_time}
            "exp":{expiration_time}
            "tokens":{}
    }

    **Example 2: Microsoft's identity token**

    If you configure a basic Microsoft OIDC connection as shown in Example 2 of
    ``st.login()``, the following data is available in
    ``st.user``. For more information about Microsoft's identity
    tokens, see `ID token claims reference
    <https://learn.microsoft.com/en-us/entra/identity-platform/id-token-claims-reference>`_
    in Microsoft's docs.

    .. code-block:: python
        :filename: streamlit_app.py

        import streamlit as st

        if st.user.is_logged_in:
            st.write(st.user)

    Displayed data when a user is logged in:

    .. code-block:: json

        {
            "is_logged_in":true
            "ver":"2.0"
            "iss":"https://login.microsoftonline.com/{tenant_id}/v2.0"
            "sub":"{application_user_id}"
            "aud":"{application_id}"
            "exp":{expiration_time}
            "iat":{issued_time}
            "nbf":{start_time}
            "name":"{full_name}"
            "preferred_username":"{username}"
            "oid":"{user_GUID}"
            "email":"{email}"
            "tid":"{tenant_id}"
            "nonce":"{nonce_string}"
            "aio":"{opaque_string}"
            "tokens":{}
        }
    c                    |dk(  r| j                   S 	 t        dt               |         S # t        $ r t        d| d      w xY w)NrI   str | bool | Nonezst.user has no key "".)rI   r
   rA   rP   rL   s     r)   rN   zUserInfoProxy.__getitem__  sR    (?;;	;+^-=c-BCC 	;1#b9::	;	   * Ac                    |dk(  r| j                   S 	 t        dt               |         S # t        $ r t	        d| d      w xY w)NrI   rz   zst.user has no attribute "r{   )rI   r
   rA   rP   rQ   rL   s     r)   rR   zUserInfoProxy.__getattr__  sU    (?;;	G+^-=c-BCC 	G #=cU"!EFF	Gr|   c                    t        d      Nzst.user cannot be modifiedr]   r^   s      r)   rX   zUserInfoProxy.__setattr__      #$@AAr*   c                    t        d      r   r]   r^   s      r)   r_   zUserInfoProxy.__setitem__  r   r*   c                (    t        t                     S rE   )ra   rA   rb   s    r)   rc   zUserInfoProxy.__iter__  s    N$%%r*   c                (    t        t                     S rE   )re   rA   rb   s    r)   rf   zUserInfoProxy.__len__  s    >#$$r*   c                    t               S )aR  
        Get user info as a dictionary.

        This method primarily exists for internal use and is not needed for
        most cases. ``st.user`` returns an object that inherits from
        ``dict`` by default.

        Returns
        -------
        Dict[str,str]
            A dictionary of the current user's information.
        )rA   rb   s    r)   ri   zUserInfoProxy.to_dict  s     r*   zuser.tokensc           	     `    t               }t        t        d|j                  di                   S )z-Access exposed tokens via a dict-like object.rj   rI   )rA   rC   r
   get)rH   r.   s     r)   rI   zUserInfoProxy.tokens  s*     #$	4 0)--"2MNOOr*   N)rM   rm   rk   zstr | bool | None | TokensProxy)rY   rm   rZ   
str | Nonerk   r	   rn   ro   rk   r   )rk   rC   )rq   rr   rs   rt   rN   rR   rX   r_   rc   rf   ri   propertyr   rI    r*   r)   rx   rx     sR    xt;GBB&%  M"P # Pr*   rx   Fc                 B    t         sda t        t        ddd             yy)z;Show a deprecation warning for the experimental_user alias.Texperimental_useruserz
2025-11-06N)#has_shown_experimental_user_warningr   r   r   r*   r)   "maybe_show_deprecated_user_warningr     s+     /.2+ (#	
 /r*   c                  0     e Zd ZdZd fdZd fdZ xZS )DeprecatedUserInfoProxyz
    A deprecated alias for UserInfoProxy.

    This class is deprecated and will be removed in a future version of
    Streamlit.
    c                6    t                t        | 	  |      S rE   )r   rW   __getattribute__)rH   rY   r[   s     r)   r   z(DeprecatedUserInfoProxy.__getattribute__  s    *,w'--r*   c                6    t                t        | 	  |      S rE   )r   rW   rN   )rH   rM   r[   s     r)   rN   z#DeprecatedUserInfoProxy.__getitem__  s    *,w"3''r*   )rY   rm   rk   r   )rM   rm   rk   r   )rq   rr   rs   rt   r   rN   ru   rv   s   @r)   r   r     s    .( (r*   r   rE   )r&   r   rk   rl   )rk   rl   )r&   rm   rk   rm   r   )5
__future__r   collections.abcr   r   typingr   r   r   r	   r
   	streamlitr   r   r   streamlit.auth_utilr   r   r   r   streamlit.deprecation_utilr   r   streamlit.errorsr   r   streamlit.proto.ForwardMsg_pb2r   streamlit.runtime.metrics_utilr   7streamlit.runtime.scriptrunner_utils.script_run_contextr   r!   streamlit.url_utilr   r   
get_loggerrq   r   __annotations__r   r   r   r+   r"   rA   rm   rC   boolrx   r   r   r   r   r*   r)   <module>r      s   # -  . -  G 5 9 -T #""8, ,* U *, e , ~! ~!B 7! 7!t5"D"'#s(# D"NkPGCtk!9D!@@A kP\ ', #
(m (r*   