Ë
    Þªgt  ã                   óL   — d dl mZmZmZmZmZmZmZmZm	Z	m
Z
mZ  G d„ d«      Zy)é   )ÚAuthMFAChallengeResponseÚAuthMFAEnrollResponseÚ-AuthMFAGetAuthenticatorAssuranceLevelResponseÚAuthMFAListFactorsResponseÚAuthMFAUnenrollResponseÚAuthMFAVerifyResponseÚMFAChallengeAndVerifyParamsÚMFAChallengeParamsÚMFAEnrollParamsÚMFAUnenrollParamsÚMFAVerifyParamsc                   óx   — e Zd ZdZdedefd„Zdedefd„Z	de
defd„Zdedefd„Zdedefd„Zdefd	„Zdefd
„Zy)ÚAsyncGoTrueMFAAPIz<
    Contains the full multi-factor authentication API.
    ÚparamsÚreturnc              ƒ   ó   K  — t        «       ‚­w)aS  
        Starts the enrollment process for a new Multi-Factor Authentication
        factor. This method creates a new factor in the 'unverified' state.
        Present the QR code or secret to the user and ask them to add it to their
        authenticator app. Ask the user to provide you with an authenticator code
        from their app and verify it by calling challenge and then verify.

        The first successful verification of an unverified factor activates the
        factor. All other sessions are logged out and the current one gets an
        `aal2` authenticator level.
        ©ÚNotImplementedError©Úselfr   s     úQ/var/www/openai/venv/lib/python3.12/site-packages/gotrue/_async/gotrue_mfa_api.pyÚenrollzAsyncGoTrueMFAAPI.enroll   s   è ø€ ô "Ó#Ð#ùó   ‚c              ƒ   ó   K  — t        «       ‚­w)z©
        Prepares a challenge used to verify that a user has access to a MFA
        factor. Provide the challenge ID and verification code by calling `verify`.
        r   r   s     r   Ú	challengezAsyncGoTrueMFAAPI.challenge#   ó   è ø€ ô
 "Ó#Ð#ùr   c              ƒ   ó   K  — t        «       ‚­w)zð
        Helper method which creates a challenge and immediately uses the given code
        to verify against it thereafter. The verification code is provided by the
        user by entering a code seen in their authenticator app.
        r   r   s     r   Úchallenge_and_verifyz&AsyncGoTrueMFAAPI.challenge_and_verify*   s   è ø€ ô "Ó#Ð#ùr   c              ƒ   ó   K  — t        «       ‚­w)z­
        Verifies a verification code against a challenge. The verification code is
        provided by the user by entering a code seen in their authenticator app.
        r   r   s     r   ÚverifyzAsyncGoTrueMFAAPI.verify5   r   r   c              ƒ   ó   K  — t        «       ‚­w)zö
        Unenroll removes a MFA factor. Unverified factors can safely be ignored
        and it's not necessary to unenroll them. Unenrolling a verified MFA factor
        cannot be done from a session with an `aal1` authenticator level.
        r   r   s     r   ÚunenrollzAsyncGoTrueMFAAPI.unenroll<   s   è ø€ ô "Ó#Ð#ùr   c              ƒ   ó   K  — t        «       ‚­w)a:  
        Returns the list of MFA factors enabled for this user. For most use cases
        you should consider using `get_authenticator_assurance_level`.

        This uses a cached version of the factors and avoids incurring a network call.
        If you need to update this list, call `get_user` first.
        r   ©r   s    r   Úlist_factorszAsyncGoTrueMFAAPI.list_factorsD   s   è ø€ ô "Ó#Ð#ùr   c              ƒ   ó   K  — t        «       ‚­w)a~  
        Returns the Authenticator Assurance Level (AAL) for the active session.

        - `aal1` (or `null`) means that the user's identity has been verified only
        with a conventional login (email+password, OTP, magic link, social login,
        etc.).
        - `aal2` means that the user's identity has been verified both with a
        conventional login and at least one MFA factor.

        Although this method returns a promise, it's fairly quick (microseconds)
        and rarely uses the network. You can use this to check whether the current
        user needs to be shown a screen to verify their MFA factors.
        r   r$   s    r   Ú!get_authenticator_assurance_levelz3AsyncGoTrueMFAAPI.get_authenticator_assurance_levelN   s   è ø€ ô  "Ó#Ð#ùr   N)Ú__name__Ú
__module__Ú__qualname__Ú__doc__r   r   r   r
   r   r   r	   r   r   r   r    r   r   r"   r   r%   r   r'   © ó    r   r   r      sŠ   „ ñð$ ?ð $Ð7Ló $ð$Ð&8ð $Ð=Uó $ð	$à+ð	$ð 
ó	$ð$ ?ð $Ð7Ló $ð$Ð%6ð $Ð;Ró $ð$Ð$>ó $ð$à	6ô$r-   r   N)Útypesr   r   r   r   r   r   r	   r
   r   r   r   r   r,   r-   r   Ú<module>r/      s%   ð÷÷ ÷ ñ ÷N$ò N$r-   