??????????????
Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 173

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 174

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 175

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 176

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 177

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 178
 Udac @`sddlmZmZmZeZddlZddlZddlZddl Z ddl Z ddl Z ddl Z ddl Z ddlZddlmZmZmZddlmZddlmZmZddlmZddlmZddlmZdd lmZ dd l!m"Z"m#Z#m$Z$dd l%m&Z&dd l'm(Z(dd l)m*Z*ddl+m,Z,ddl-m.Z.y"ddl/Z0ddl1Z0e2Z3Wne4k rddl3Z3nXye5Wne6k re7Z5nXe.Z8dZ9dZ:dZ;dZ<dZ=dZ>dZ?dZ@e jAjBe jAjCeDddZEdZFdZGdZHdZIdZJejKrpeFZLn eJeFZLe jAjCe jAjCe jAjCeDZMe jNdeMZOe jNd ZPe jNd!ZQd"ejRfd#YZSd$ZTeUd%ZVd&fd'YZWd(eWfd)YZXd*ZYd+ZZd,Z[d-Z\d.Z]e2d/de^e2e2e2e2e2d0 Z_d1Z`dS(2i(tabsolute_importtdivisiontprint_functionN(tASTtImportt ImportFrom(tBytesIO(t __version__t __author__(t constants(t AnsibleError(t!InterpreterDiscoveryRequiredError(tmodule_manifest(tto_bytestto_textt to_native(tAnsibleJSONEncoder(t import_module(tmodule_utils_loader(taction_write_locks(tDisplays"#<>s"<>"s)"<>"s# POWERSHELL_COMMONs$<>s<>u# -*- coding: utf-8 -*-s# -*- coding: utf-8 -*-s..t module_utilsuk-%(shebang)s %(coding)s _ANSIBALLZ_WRAPPER = True # For test-module.py script to tell this is a ANSIBALLZ_WRAPPER # This code is part of Ansible, but is an independent component. # The code in this particular templatable string, and this templatable string # only, is BSD licensed. Modules which end up using this snippet, which is # dynamically combined together by Ansible still belong to the author of the # module, and they may assign their own license to the complete work. # # Copyright (c), James Cammarata, 2016 # Copyright (c), Toshio Kuratomi, 2016 # # Redistribution and use in source and binary forms, with or without modification, # are permitted provided that the following conditions are met: # # * Redistributions of source code must retain the above copyright # notice, this list of conditions and the following disclaimer. # * Redistributions in binary form must reproduce the above copyright notice, # this list of conditions and the following disclaimer in the documentation # and/or other materials provided with the distribution. # # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND # ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED # WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. # IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, # INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, # PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT # LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE # USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. def _ansiballz_main(): %(rlimit)s import os import os.path import sys import __main__ # For some distros and python versions we pick up this script in the temporary # directory. This leads to problems when the ansible module masks a python # library that another import needs. We have not figured out what about the # specific distros and python versions causes this to behave differently. # # Tested distros: # Fedora23 with python3.4 Works # Ubuntu15.10 with python2.7 Works # Ubuntu15.10 with python3.4 Fails without this # Ubuntu16.04.1 with python3.5 Fails without this # To test on another platform: # * use the copy module (since this shadows the stdlib copy module) # * Turn off pipelining # * Make sure that the destination file does not exist # * ansible ubuntu16-test -m copy -a 'src=/etc/motd dest=/var/tmp/m' # This will traceback in shutil. Looking at the complete traceback will show # that shutil is importing copy which finds the ansible module instead of the # stdlib module scriptdir = None try: scriptdir = os.path.dirname(os.path.realpath(__main__.__file__)) except (AttributeError, OSError): # Some platforms don't set __file__ when reading from stdin # OSX raises OSError if using abspath() in a directory we don't have # permission to read (realpath calls abspath) pass if scriptdir is not None: sys.path = [p for p in sys.path if p != scriptdir] import base64 import runpy import shutil import tempfile import zipfile if sys.version_info < (3,): PY3 = False else: PY3 = True ZIPDATA = """%(zipdata)s""" # Note: temp_path isn't needed once we switch to zipimport def invoke_module(modlib_path, temp_path, json_params): # When installed via setuptools (including python setup.py install), # ansible may be installed with an easy-install.pth file. That file # may load the system-wide install of ansible rather than the one in # the module. sitecustomize is the only way to override that setting. z = zipfile.ZipFile(modlib_path, mode='a') # py3: modlib_path will be text, py2: it's bytes. Need bytes at the end sitecustomize = u'import sys\nsys.path.insert(0,"%%s")\n' %% modlib_path sitecustomize = sitecustomize.encode('utf-8') # Use a ZipInfo to work around zipfile limitation on hosts with # clocks set to a pre-1980 year (for instance, Raspberry Pi) zinfo = zipfile.ZipInfo() zinfo.filename = 'sitecustomize.py' zinfo.date_time = ( %(year)i, %(month)i, %(day)i, %(hour)i, %(minute)i, %(second)i) z.writestr(zinfo, sitecustomize) z.close() # Put the zipped up module_utils we got from the controller first in the python path so that we # can monkeypatch the right basic sys.path.insert(0, modlib_path) # Monkeypatch the parameters into basic from ansible.module_utils import basic basic._ANSIBLE_ARGS = json_params %(coverage)s # Run the module! By importing it as '__main__', it thinks it is executing as a script runpy.run_module(mod_name='%(module_fqn)s', init_globals=None, run_name='__main__', alter_sys=True) # Ansible modules must exit themselves print('{"msg": "New-style module did not handle its own exit", "failed": true}') sys.exit(1) def debug(command, zipped_mod, json_params): # The code here normally doesn't run. It's only used for debugging on the # remote machine. # # The subcommands in this function make it easier to debug ansiballz # modules. Here's the basic steps: # # Run ansible with the environment variable: ANSIBLE_KEEP_REMOTE_FILES=1 and -vvv # to save the module file remotely:: # $ ANSIBLE_KEEP_REMOTE_FILES=1 ansible host1 -m ping -a 'data=october' -vvv # # Part of the verbose output will tell you where on the remote machine the # module was written to:: # [...] # SSH: EXEC ssh -C -q -o ControlMaster=auto -o ControlPersist=60s -o KbdInteractiveAuthentication=no -o # PreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickey -o PasswordAuthentication=no -o ConnectTimeout=10 -o # ControlPath=/home/badger/.ansible/cp/ansible-ssh-%%h-%%p-%%r -tt rhel7 '/bin/sh -c '"'"'LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 # LC_MESSAGES=en_US.UTF-8 /usr/bin/python /home/badger/.ansible/tmp/ansible-tmp-1461173013.93-9076457629738/ping'"'"'' # [...] # # Login to the remote machine and run the module file via from the previous # step with the explode subcommand to extract the module payload into # source files:: # $ ssh host1 # $ /usr/bin/python /home/badger/.ansible/tmp/ansible-tmp-1461173013.93-9076457629738/ping explode # Module expanded into: # /home/badger/.ansible/tmp/ansible-tmp-1461173408.08-279692652635227/ansible # # You can now edit the source files to instrument the code or experiment with # different parameter values. When you're ready to run the code you've modified # (instead of the code from the actual zipped module), use the execute subcommand like this:: # $ /usr/bin/python /home/badger/.ansible/tmp/ansible-tmp-1461173013.93-9076457629738/ping execute # Okay to use __file__ here because we're running from a kept file basedir = os.path.join(os.path.abspath(os.path.dirname(__file__)), 'debug_dir') args_path = os.path.join(basedir, 'args') if command == 'excommunicate': print('The excommunicate debug command is deprecated and will be removed in 2.11. Use execute instead.') command = 'execute' if command == 'explode': # transform the ZIPDATA into an exploded directory of code and then # print the path to the code. This is an easy way for people to look # at the code on the remote machine for debugging it in that # environment z = zipfile.ZipFile(zipped_mod) for filename in z.namelist(): if filename.startswith('/'): raise Exception('Something wrong with this module zip file: should not contain absolute paths') dest_filename = os.path.join(basedir, filename) if dest_filename.endswith(os.path.sep) and not os.path.exists(dest_filename): os.makedirs(dest_filename) else: directory = os.path.dirname(dest_filename) if not os.path.exists(directory): os.makedirs(directory) f = open(dest_filename, 'wb') f.write(z.read(filename)) f.close() # write the args file f = open(args_path, 'wb') f.write(json_params) f.close() print('Module expanded into:') print('%%s' %% basedir) exitcode = 0 elif command == 'execute': # Execute the exploded code instead of executing the module from the # embedded ZIPDATA. This allows people to easily run their modified # code on the remote machine to see how changes will affect it. # Set pythonpath to the debug dir sys.path.insert(0, basedir) # read in the args file which the user may have modified with open(args_path, 'rb') as f: json_params = f.read() # Monkeypatch the parameters into basic from ansible.module_utils import basic basic._ANSIBLE_ARGS = json_params # Run the module! By importing it as '__main__', it thinks it is executing as a script runpy.run_module(mod_name='%(module_fqn)s', init_globals=None, run_name='__main__', alter_sys=True) # Ansible modules must exit themselves print('{"msg": "New-style module did not handle its own exit", "failed": true}') sys.exit(1) else: print('WARNING: Unknown debug command. Doing nothing.') exitcode = 0 return exitcode # # See comments in the debug() method for information on debugging # ANSIBALLZ_PARAMS = %(params)s if PY3: ANSIBALLZ_PARAMS = ANSIBALLZ_PARAMS.encode('utf-8') try: # There's a race condition with the controller removing the # remote_tmpdir and this module executing under async. So we cannot # store this in remote_tmpdir (use system tempdir instead) # Only need to use [ansible_module]_payload_ in the temp_path until we move to zipimport # (this helps ansible-test produce coverage stats) temp_path = tempfile.mkdtemp(prefix='ansible_%(ansible_module)s_payload_') zipped_mod = os.path.join(temp_path, 'ansible_%(ansible_module)s_payload.zip') with open(zipped_mod, 'wb') as modlib: modlib.write(base64.b64decode(ZIPDATA)) if len(sys.argv) == 2: exitcode = debug(sys.argv[1], zipped_mod, ANSIBALLZ_PARAMS) else: # Note: temp_path isn't needed once we switch to zipimport invoke_module(zipped_mod, temp_path, ANSIBALLZ_PARAMS) finally: try: shutil.rmtree(temp_path) except (NameError, OSError): # tempdir creation probably failed pass sys.exit(exitcode) if __name__ == '__main__': _ansiballz_main() s # Access to the working directory is required by coverage. # Some platforms, such as macOS, may not allow querying the working directory when using become to drop privileges. try: os.getcwd() except OSError: os.chdir('/') os.environ['COVERAGE_FILE'] = '%(coverage_output)s' import atexit try: import coverage except ImportError: print('{"msg": "Could not import `coverage` module.", "failed": true}') sys.exit(1) cov = coverage.Coverage(config_file='%(coverage_config)s') def atexit_coverage(): cov.stop() cov.save() atexit.register(atexit_coverage) cov.start() s try: if PY3: import importlib.util if importlib.util.find_spec('coverage') is None: raise ImportError else: import imp imp.find_module('coverage') except ImportError: print('{"msg": "Could not find `coverage` module.", "failed": true}') sys.exit(1) s import resource existing_soft, existing_hard = resource.getrlimit(resource.RLIMIT_NOFILE) # adjust soft limit subject to existing hard limit requested_soft = min(existing_hard, %(rlimit_nofile)d) if requested_soft != existing_soft: try: resource.setrlimit(resource.RLIMIT_NOFILE, (requested_soft, existing_hard)) except ValueError: # some platforms (eg macOS) lie about their hard limit pass cC`s_g}xI|jD];}|j}| s|jdrAqn|j|qWdj|S(Nu#u (t splitlineststript startswithtappendtjoin(tsourcetbuftlinetl((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyt_strip_commentss s$%s/(?Pansible/modules/.*)\.py$sB/(?Pansible_collections/[^/]+/[^/]+/plugins/modules/.*)\.py$s(?:from +\.{2,} *module_utils.* +import |from +ansible_collections\.[^.]+\.[^.]+\.plugins\.module_utils.* +import |import +ansible_collections\.[^.]+\.[^.]+\.plugins\.module_utils.*|from +ansible\.module_utils.* +import |import +ansible\.module_utils\.)tModuleDepFindercB`s,eZdZdZdZdZRS(cO`s}tt|j||t|_||_||_t|_t|_i|jt 6|j t 6|_ |j |dS(s Walk the ast tree for the python module. :arg module_fqn: The fully qualified name to reach this module in dotted notation. example: ansible.module_utils.basic Save submodule[.submoduleN][.identifier] into self.submodules when they are from ansible.module_utils or ansible_collections packages self.submodules will end up with tuples like: - ('ansible', 'module_utils', 'basic',) - ('ansible', 'module_utils', 'urls', 'fetch_url') - ('ansible', 'module_utils', 'database', 'postgres') - ('ansible', 'module_utils', 'database', 'postgres', 'quote') - ('ansible', 'module_utils', 'database', 'postgres', 'quote') - ('ansible_collections', 'my_ns', 'my_col', 'plugins', 'module_utils', 'foo') It's up to calling code to determine whether the final element of the tuple are module names or something else (function, class, or variable names) .. seealso:: :python3:class:`ast.NodeVisitor` N(tsuperR t__init__tsett submodulest module_fqnt_treetrequired_importst visit_ImportRtvisit_ImportFromRt _visit_mapt generic_visit(tselfR%ttreetargstkwargs((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyR"s      cC`sxtj|D]\}}t|trxe|D]Z}t|ttfrm||_|j|j|q2t|t r2|j |q2q2WqqWdS(N( tastt iter_fieldst isinstancetlistRRtparentR*t __class__RR+(R,tnodetfieldtvaluetitem((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyR+s  cC`sx|jD]z}|jjds4|jjdr t|jjd}|jj||j|jkr|j j|qq q W|j |dS(s Handle import ansible.module_utils.MODLIB[.MODLIBn] [as asname] We save these as interesting submodules when the imported library is in ansible.module_utils or ansible.collections sansible.module_utils.sansible_collections.t.N( tnamestnameRttupletsplitR$taddR4R&R'R+(R,R6taliastpy_mod((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyR(scC`s|jdkr|jrwt|jjd}|jr]dj||j |jf}qdj||j }q|j}n |j}d}|jdjdkr|j j d nl|j drt|jd}nE|j dr'|j ds d|kr't|jd}q'n|rx]|jD]O}|j j ||jf|j |jkr7|jj ||jfq7q7Wn|j|dS( s  Handle from ansible.module_utils.MODLIB import [.MODLIBn] [as asname] Also has to handle relative imports We save these as interesting submodules when the imported library is in ansible.module_utils or ansible.collections iR:t_sixsansible.module_utilssansible_collections.splugins.module_utilss.plugins.module_utils.N(RB(tlevelR%R=R>tmoduleRtNoneR;R<R$R?RtendswithR4R&R'R+(R,R6tpartst node_moduleRAR@((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyR)s.  $  $(t__name__t __module__R"R+R(R)(((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyR s $ cC`sYtjj|s1tdtjj|nt|d}|j}WdQX|S(Ns1imported module support code does not exist at %strb(tostpathtexistsR tabspathtopentread(RMtfdtdata((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyt_slurp6s c C`s9tjj|j}d|j}tjjj|rtjj |d|}d|}|j |j}|jdi}|dkr||krt d d |d |q||}qn9d |} | |krd|fS|j || j}d |} |r/| ddj |} n| |fS(s Note not stellar API: Returns None instead of always returning a shebang line. Doing it this way allows the caller to decide to use the shebang it read from the file rather than trust that we reformatted what they already have correctly. sINTERPRETER_%st variablesudiscovered_interpreter_%st ansible_factstautot auto_legacyt auto_silenttauto_legacy_silentsinterpreter discovery neededtinterpreter_nametdiscovery_modeuansible_%s_interpreteru#!u (RWRXRYRZN(RLRMtbasenameRtuppertCtconfigtget_configuration_definitionstgettget_config_valuettemplateR RER( t interpretert task_varsttemplarR.R[tinterpreter_config_keytinterpreter_outtdiscovered_interpreter_configtfacts_from_task_varstinterpreter_configtshebang((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyt _get_shebang>s*         t ModuleInfocB`s#eZdZdZdZRS(cC`s4t|_t|_d}tdkrtjjj|||_ }|dk rt j j |j dtjjk|_|j jd|_|j }q'td|n|tj|||_ }|ddtjk|_|ddtjk|_|jrt j j|dd}n |d}||_ dS(Nis /__init__.pysNo module named '%s'is __init__.py(tFalsetpy_srctpkg_dirREtimpt importlibt machineryt PathFindert find_spect_infoRLRMtsplitexttorigintSOURCE_SUFFIXESRFt ImportErrort find_modulet PY_SOURCEt PKG_DIRECTORYR(R,R<tpathsRMtinfo((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyR"qs"    (   cC`sItr<|jr<z|jdjSWd|jdjXnt|jS(Ni(RsRqRxRQtcloseRTRM(R,((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyt get_sources cC`sd|j|j|jfS(Ns*ModuleInfo: py_src=%s, pkg_dir=%s, path=%s(RqRrRM(R,((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyt__repr__s(RIRJR"RR(((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyRops  tCollectionModuleInfocB`seZdZdZRS(cC`s||_t|_t|_x|D]c}dj|jd|_y|jWnt k rdq"Xt j j||jd|_ Pq"Wt dj t|jt|dS(NR:t/s.pys4unable to load collection-hosted module_util {0}.{1}(t _mod_nametTrueRqRpRrRR>t _package_nameRtIOErrorRLRMR|tformatR(R,R<RRM((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyR"s       cC`s;t|j}tjt|jt|jd}|S(Ns.py(RRtpkgutiltget_dataRR(R,tpkgRS((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyRs((RIRJR"R(((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyRs c C`sytj|}Wn2ttfk rG}td||jfnXt||}gtjdt D]} t j j | rj| ^qj} | j tt} x$|jj|D]} d} | dd!dkrtd| } d} d}n| dd!dkrGtdg| D]} t j j| d^q} d} d}n3| dd krx dD]`}t| |krzPny-t| | t j j| | g} PWq^tk rq^q^Xq^Wn| dd !dkrc| d }xd D]s}t||krPny@t| | g| D] } t j j| || ^q} PWqtk r[qqXqWntjd | gq| dkr| |jkrqnd |fg}|d kr|j d| d| dfn|j | dtdj|nt| tr|d kr*| d } n| }| j}t j j| }||f||<| j|g}xS| d D]k}|j |t|dg}||kr|t j j|}d}||f||<| j|q|q|Wq| j rf| j rfd|g}|d kr=|j d| d| dfn|j | dtdj|n|d kr| d } n| |kr| jr| d!}||kr| j}|| j f||<| j|qnA| }||kr| j}|| j f||<| j|nxt!d t| D]}| | d"}||kr3|d }t|dg| D]} t j j| |d ^qo}| j||j|j f||(t module_pathtremote_module_fqntmatchRM((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyt_get_ansible_module_fqns   c C`s|jd}dj|d}|j|||ddkrTd}t}nd}t|j}xVt|t|D]?}dj|| d}||krqn|j|d qWd S( sKAdd a module from ansible or from an ansible collection into the module zipR:Rs.pyiRiis /__init__.pyRN(R>RRt frozensettnamelistRR( RRRtmodule_path_partsRRtexisting_pathsRt package_path((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyt_add_module_to_zips  c.'C`s5d}}t|r#d}}n3t|krPd}d}|jtd}ntj|rnd}d}nt|krd}d}|jtd}ntjd|tjstjd |tjstjd |tjstjd |tjstjd |tjr"d}d}n4t|kr=d}d }nd|krVd}}nd}|dTkru|||fSt }t }|dkrt d|}y%t tj|dtdt}Wn)tk r}tdt|nXytt|}Wn+tk r3tjd|tj}nXyt|}Wn(tk rntjdd|}nXtjj t!j"d}tjj |d||f}d}tjj#|rtjd|t$|d}|j%}WdQXnz|t&j&kr&tjd|t&j&|}ntjd|t&j&d}tjd|tjdt'|tjj#|stjd t }tj(|d!d"d#|}id$t)t*d%t)t+d&d'fdU6dVdW6}x=|j,D]/\} \}!}"|j-|"|!|j.| qWt/||||||tjd-t0||||j1t2j3|j4}tjj#|stj5|ntjd.t$|d/d0}#|#j6|WdQXtjd1tj7|d/|tjd2nWdQX|dkrptjd3y(t$|d}#|#j%}WdQXWqpt8k rltd4qpXnt9|d5d6}t:d7||\}}$|dkrd8}nt!j;j<d9d:|}%t=|%t>st>|j?|%}%n|%r t@t d;|%}&nd<}&tjAjBd=}'|'r`tjAd>}(|(rWtCt d?|'d@|(})qftD})nd<})tEjEjF}*|j6t)tGt dA|dB|dC|dD|dE|dFtHdG|*jIdH|*jJdI|*jKdJ|*jLdK|*jMdL|*jNdM|)dN|&|j4}n$|dkrIdO}tOjP|||| ||| | | | || }n|d kr(t)tj|dtdt}+t)t |+},|jtQt)t t*}|jtR|,}|jtSt)dPj t!jT}|jt|+}dQt)|jBdRt!jUd5d6}-|jdS|-}n|||fS(Xs Given the source of the module, convert it to a Jinja2 template to insert module code and return whether it's a new or old style module. toldtbinarytnewtpythons(from ansible.module_utils.basic import *t powershells,#Requires -Module Ansible.ModuleUtils.Legacys#Requires -Modules#Requires -Versions#AnsibleRequires -OSVersions#AnsibleRequires -Powershells#AnsibleRequires -CSharpUtiltjsonargst WANT_JSONtnon_native_want_jsontANSIBLE_MODULE_ARGStclst vault_to_textsDUnable to pass options to module, they must be JSON serializable: %suOBad module compression string specified: %s. Using ZIP_STORED (no compression)s)ANSIBALLZ: Could not determine module FQNsansible.modules.%stansiballz_caches%s-%ss"ANSIBALLZ: using cached module: %sRKNsANSIBALLZ: Using lock for %ss$ANSIBALLZ: Using generic lock for %ssANSIBALLZ: Acquiring locksANSIBALLZ: Lock acquired: %ssANSIBALLZ: Creating moduletmodetwt compressionsUfrom pkgutil import extend_path __path__=extend_path(__path__,__name__) __version__="s" __author__="s" sansible/__init__.pyRR"sHfrom pkgutil import extend_path __path__=extend_path(__path__,__name__) s ansible/module_utils/__init__.pyRs&ANSIBALLZ: Writing module into payloadsANSIBALLZ: Writing modules-parttwbsANSIBALLZ: Renaming modulesANSIBALLZ: Done creating modules$ANSIBALLZ: Reading module after locksvA different worker process failed to create module file. Look at traceback for that process for debugging information.terrorstsurrogate_or_strictu/usr/bin/pythonu#!/usr/bin/pythontPYTHON_MODULE_RLIMIT_NOFILERUt rlimit_nofileRt_ANSIBLE_COVERAGE_CONFIGt_ANSIBLE_COVERAGE_OUTPUTtcoverage_configtcoverage_outputtzipdatatansible_moduleR%tparamsRmtcodingtyeartmonthtdaythourtminutetsecondtcoveragetrlimitu #!powershellt,ssyslog.tansible_syslog_facilityssyslog.LOG_USER(soldRR(sansibles__init__(sHfrom pkgutil import extend_path __path__=extend_path(__path__,__name__) s ansible/module_utils/__init__.py(sansibles module_utilss__init__(VRtREPLACERtreplacetNEW_STYLE_PYTHON_MODULE_RERtREPLACER_WINDOWStret IGNORECASEtREPLACER_JSONARGSRERR#tdicttreprtjsontdumpsRRt TypeErrorR RtgetattrtzipfiletAttributeErrorRRt ZIP_STOREDRRtdebugRLRMRR_tDEFAULT_LOCAL_TMPRNRPRQRtidtZipFileR RRtitemsRR?RRRtbase64t b64encodetgetvaluetmakedirstwritetrenameRRRnR`RcR2tintRdtANSIBALLZ_RLIMIT_TEMPLATEtenvironRbtANSIBALLZ_COVERAGE_TEMPLATEt!ANSIBALLZ_COVERAGE_CHECK_TEMPLATEtdatetimetutcnowtACTIVE_ANSIBALLZ_TEMPLATEtENCODING_STRINGRRRRRRt ps_manifestt_create_powershell_wrappertREPLACER_VERSIONtREPLACER_COMPLEXtREPLACER_SELINUXtDEFAULT_SELINUX_SPECIAL_FStDEFAULT_SYSLOG_FACILITY(.t module_nameRRt module_argsRfRgtmodule_compressiont async_timeouttbecomet become_methodt become_usertbecome_passwordt become_flagst environmenttmodule_substylet module_styleRmtoutputRRtpython_repred_paramsRtcompression_methodRt lookup_pathtcached_module_filenameRt module_datatlockt zipoutputRRRt file_datatfilenametfReRRRRRtnowtmodule_args_jsontpython_repred_argstfacility((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyt_find_module_utilss(                %                                   !$%R c C`s|dkrin|}| dkr*in| } t|d} | j}WdQXt|||||||d|d|d|d| d| d| d | \}}}|d kr||t|d d fS|dkr|jd d}|djdr|dj}tjt |ddd}g|D]}t|dd^q1}|d}t t ||||ddddd d }|r||d<}nt j j|jdr|jdtnt|d d dd}nd j|}n|||fS(s Used to insert chunks of code into modules before transfer rather than doing regular python imports. This allows for more efficient transfer in a non-bootstrapping scenario by not moving extra files over the wire and also takes care of embedding arguments in the transferred modules. This version is done in such a way that local imports can still be used in the module code, so IDEs don't have to be aware of what is going on. Example: from ansible.module_utils.basic import * ... will result in the insertion of basic.py into the module from the module_utils/ directory in the source tree. For powershell, this code effectively no-ops, as the exec wrapper requires access to a number of properties not available here. RKNR)R*R+R,R-R.R/Rt nonstringtpassthrus iis#!iRRupython(RERPRQRARR>RRtshlexRR RnRLRMR]tinserttb_ENCODING_STRINGR(R&RR'RgRfR(R)R*R+R,R-R.R/R<RR1Rmtb_linest b_shebangR.taRet b_new_shebang((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyt modify_modules4  %  cC`si}i}t|tr<x|D]}|j|q"Wn|r|j|}|tjjkrxNtjjj|gD]1}|j|jdj|pij q|Wn||kr|j||j qn|j||S(Ns group/{0}( R2R3RRdR_R`tmodule_defaults_groupsRbRtcopy(tactionR.tdefaultsRgttmp_argstmodule_defaultstdefaultR((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pytget_action_args_with_defaults$s 2  (at __future__RRRttypet __metaclass__R0RRRRLRDRRRRRRtioRtansible.releaseRRRR R_tansible.errorsR t&ansible.executor.interpreter_discoveryR tansible.executor.powershellR Rtansible.module_utils._textR RRt ansible.module_utils.common.jsonRt%ansible.module_utils.compat.importlibRtansible.plugins.loaderRtansible.executorRtansible.utils.displayRtimportlib.utilRttimportlib.machineryRERsR|tFileNotFoundErrort NameErrorRRRR!R"RRR#RRFRMRtdirnamet__file__RtANSIBALLZ_TEMPLATERRRRtDEFAULT_KEEP_REMOTE_FILESRt site_packagestcompileRRRt NodeVisitorR RTR=RnRoRRRRRRARpRKRS(((sB/usr/lib/python2.7/site-packages/ansible/executor/module_common.pyts                $   *   2%  !  A