You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@airavata.apache.org by is...@apache.org on 2021/06/07 13:37:07 UTC
[airavata-custos] branch develop updated: pytohn SDK update
This is an automated email from the ASF dual-hosted git repository.
isjarana pushed a commit to branch develop
in repository https://gitbox.apache.org/repos/asf/airavata-custos.git
The following commit(s) were added to refs/heads/develop by this push:
new 327bf34 pytohn SDK update
new 80ca1fd Merge pull request #191 from isururanawaka/sdk_update
327bf34 is described below
commit 327bf3493a735ed8cc3d905ff2a97189c6b9b601
Author: Isuru Ranawaka <ir...@gmail.com>
AuthorDate: Mon Jun 7 09:35:38 2021 -0400
pytohn SDK update
---
.../custos-python-sdk/build/lib/custos/__init__.py | 0
.../build/lib/custos/clients/__init__.py | 0
.../lib/custos/clients/agent_management_client.py | 293 ++++++
.../lib}/custos/clients/group_management_client.py | 28 +-
.../custos/clients/identity_management_client.py | 240 +++++
.../clients/resource_secret_management_client.py | 195 ++++
.../custos/clients/sharing_management_client.py | 120 +++
.../clients/super_tenant_management_client.py | 80 ++
.../lib/custos/clients/tenant_management_client.py | 269 ++++++
.../lib/custos/clients/user_management_client.py | 387 ++++++++
.../build/lib/custos/clients/utils/__init__.py | 0
.../utils/certificate_fetching_rest_client.py | 11 +-
.../build/lib/custos/clients/utils/utilities.py | 8 +
.../build/lib/custos/samples/__init__.py | 0
.../lib/custos/samples/agent_management_samples.py | 49 +
.../lib/custos/samples/group_management_samples.py | 63 ++
.../custos/samples/identity_management_samples.py | 70 ++
.../custos/samples/resource_secert_management.py | 80 ++
.../build/lib/custos/samples/resources/__init__.py | 0
.../build/lib/custos/samples/resources/cert.pem | 31 +
.../custos/samples/tenant_management_samples.py | 95 ++
.../lib/custos/samples/user_management_samples.py | 109 +++
.../build/lib/custos/server/__init__.py | 0
.../custos/server/core/AgentProfileService_pb2.py | 78 +-
.../server/core/AgentProfileService_pb2_grpc.py | 182 ++++
.../server/core/ClusterManagementService_pb2.py | 139 +++
.../core/ClusterManagementService_pb2_grpc.py | 2 +-
.../server/core/CredentialStoreService_pb2.py | 245 +++--
.../server/core/CredentialStoreService_pb2_grpc.py | 677 ++++++++++++++
.../core/FederatedAuthenticationService_pb2.py | 989 +++++++++++++++++++++
.../FederatedAuthenticationService_pb2_grpc.py | 347 ++++++++
.../lib}/custos/server/core/IamAdminService_pb2.py | 457 ++++++----
.../custos/server/core/IamAdminService_pb2_grpc.py | 50 ++
.../lib}/custos/server/core/IdentityService_pb2.py | 241 ++---
.../custos/server/core/IdentityService_pb2_grpc.py | 414 +++++++++
.../lib/custos/server/core/LoggingService_pb2.py | 402 +++++++++
.../custos/server/core/LoggingService_pb2_grpc.py | 165 ++++
.../lib/custos/server/core/MessagingService_pb2.py | 334 +++++++
.../server/core/MessagingService_pb2_grpc.py | 99 +++
.../server/core/ResourceSecretService_pb2.py | 292 ++++--
.../server/core/ResourceSecretService_pb2_grpc.py | 134 ++-
.../lib}/custos/server/core/SharingService_pb2.py | 140 ++-
.../custos/server/core/SharingService_pb2_grpc.py | 35 +-
.../custos/server/core/TenantProfileService_pb2.py | 385 +++++---
.../server/core/TenantProfileService_pb2_grpc.py | 330 +++++++
.../custos/server/core/UserProfileService_pb2.py | 165 ++--
.../server/core/UserProfileService_pb2_grpc.py | 2 +-
.../build/lib/custos/server/core/__init__.py | 0
.../integration/AgentManagementService_pb2.py | 157 +++-
.../AgentManagementService_pb2_grpc.py} | 383 ++++----
.../integration/ClusterManagementService_pb2.py | 144 +++
.../ClusterManagementService_pb2_grpc.py | 83 ++
.../integration/GroupManagementService_pb2.py | 309 +++++++
.../GroupManagementService_pb2_grpc.py} | 402 +++++----
.../integration/IdentityManagementService_pb2.py | 96 +-
.../IdentityManagementService_pb2_grpc.py | 449 ++++++++++
.../server/integration/LogManagementService_pb2.py | 100 +++
.../integration/LogManagementService_pb2_grpc.py | 149 ++++
.../ResourceSecretManagementService_pb2.py | 64 +-
.../ResourceSecretManagementService_pb2_grpc.py | 149 ++++
.../integration/SharingManagementService_pb2.py | 44 +-
.../SharingManagementService_pb2_grpc.py | 50 ++
.../integration/TenantManagementService_pb2.py | 374 ++++++--
.../TenantManagementService_pb2_grpc.py | 748 ++++++++++++++++
.../integration/UserManagementService_pb2.py | 96 +-
.../integration/UserManagementService_pb2_grpc.py | 17 +
.../lib/custos/server/integration/__init__.py | 0
.../build/lib/custos/transport/__init__.py | 0
.../build/lib/custos/transport/certificate.pem | 58 ++
.../build/lib/custos/transport/settings.py | 36 +
.../custos/clients/group_management_client.py | 28 +-
.../utils/certificate_fetching_rest_client.py | 11 +-
.../custos/server/core/AgentProfileService_pb2.py | 78 +-
.../server/core/AgentProfileService_pb2_grpc.py | 255 ++++--
.../core/ClusterManagementService_pb2_grpc.py | 2 +-
.../server/core/CredentialStoreService_pb2.py | 245 +++--
.../server/core/CredentialStoreService_pb2_grpc.py | 988 +++++++++++++-------
.../core/FederatedAuthenticationService_pb2.py | 535 +++++++++--
.../FederatedAuthenticationService_pb2_grpc.py | 437 ++++++---
.../custos/server/core/IamAdminService_pb2.py | 457 ++++++----
.../custos/server/core/IamAdminService_pb2_grpc.py | 50 ++
.../custos/server/core/IdentityService_pb2.py | 241 ++---
.../custos/server/core/IdentityService_pb2_grpc.py | 605 ++++++++-----
.../custos/server/core/LoggingService_pb2.py | 402 +++++++++
.../custos/server/core/LoggingService_pb2_grpc.py | 165 ++++
.../custos/server/core/MessagingService_pb2.py | 334 +++++++
.../server/core/MessagingService_pb2_grpc.py | 99 +++
.../server/core/ResourceSecretService_pb2.py | 292 ++++--
.../server/core/ResourceSecretService_pb2_grpc.py | 134 ++-
.../custos/server/core/SharingService_pb2.py | 140 ++-
.../custos/server/core/SharingService_pb2_grpc.py | 35 +-
.../custos/server/core/TenantProfileService_pb2.py | 385 +++++---
.../server/core/TenantProfileService_pb2_grpc.py | 488 ++++++----
.../custos/server/core/UserProfileService_pb2.py | 165 ++--
.../server/core/UserProfileService_pb2_grpc.py | 2 +-
.../integration/AgentManagementService_pb2.py | 157 +++-
.../integration/AgentManagementService_pb2_grpc.py | 752 +++++++++++-----
.../integration/ClusterManagementService_pb2.py | 144 +++
.../ClusterManagementService_pb2_grpc.py | 83 ++
.../integration/GroupManagementService_pb2.py | 178 +++-
.../integration/GroupManagementService_pb2_grpc.py | 424 +++++++--
.../integration/IdentityManagementService_pb2.py | 96 +-
.../IdentityManagementService_pb2_grpc.py | 636 ++++++++-----
.../server/integration/LogManagementService_pb2.py | 100 +++
.../integration/LogManagementService_pb2_grpc.py | 149 ++++
.../ResourceSecretManagementService_pb2.py | 64 +-
.../ResourceSecretManagementService_pb2_grpc.py | 149 ++++
.../integration/SharingManagementService_pb2.py | 44 +-
.../SharingManagementService_pb2_grpc.py | 50 ++
.../integration/TenantManagementService_pb2.py | 374 ++++++--
.../TenantManagementService_pb2_grpc.py | 969 +++++++++++++++-----
.../integration/UserManagementService_pb2.py | 96 +-
.../integration/UserManagementService_pb2_grpc.py | 17 +
.../custos_python_sdk.egg-info/SOURCES.txt | 10 +
.../custos-python-sdk/custos_sdk.egg-info/PKG-INFO | 13 +
.../SOURCES.txt | 22 +-
.../custos_sdk.egg-info/dependency_links.txt | 1 +
.../custos_sdk.egg-info/requires.txt | 10 +
.../custos_sdk.egg-info/top_level.txt | 1 +
custos-client-sdks/custos-python-sdk/setup.py | 4 +-
.../src/main/resources/pythonStubGenerator.sh | 24 +
121 files changed, 19545 insertions(+), 3935 deletions(-)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/__init__.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/__init__.py
new file mode 100644
index 0000000..e69de29
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/__init__.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/__init__.py
new file mode 100644
index 0000000..e69de29
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/agent_management_client.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/agent_management_client.py
new file mode 100644
index 0000000..3980b49
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/agent_management_client.py
@@ -0,0 +1,293 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+
+import logging
+import grpc
+
+from custos.transport.settings import CustosServerClientSettings
+
+from custos.server.integration.AgentManagementService_pb2_grpc import AgentManagementServiceStub
+from custos.server.core.IamAdminService_pb2 import AgentClientMetadata, RegisterUserRequest, \
+ UserRepresentation, UserAttribute, AddUserAttributesRequest, DeleteUserAttributeRequest, AddUserRolesRequest, \
+ DeleteUserRolesRequest, AddProtocolMapperRequest, ClaimJSONTypes, MapperTypes
+from custos.server.integration.AgentManagementService_pb2 import AgentSearchRequest
+from custos.clients.utils.certificate_fetching_rest_client import CertificateFetchingRestClient
+
+logger = logging.getLogger(__name__)
+logger.setLevel(logging.DEBUG)
+
+
+class AgentManagementClient(object):
+
+ def __init__(self, custos_server_setting):
+ self.custos_settings = custos_server_setting
+ self.target = self.custos_settings.CUSTOS_SERVER_HOST + ":" + str(self.custos_settings.CUSTOS_SERVER_PORT)
+ certManager = CertificateFetchingRestClient(custos_server_setting)
+ certManager.load_certificate()
+ with open(self.custos_settings.CUSTOS_CERT_PATH, 'rb') as f:
+ trusted_certs = f.read()
+ self.channel_credentials = grpc.ssl_channel_credentials(root_certificates=trusted_certs)
+ self.channel = grpc.secure_channel(target=self.target, credentials=self.channel_credentials)
+ self.agent_stub = AgentManagementServiceStub(self.channel)
+
+ def enable_agents(self, token):
+ """
+ Enable agent registration for realm
+ :param token:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ return self.agent_stub.enableAgents(metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while enabling agents")
+ raise
+
+ def configure_agent_client(self, token, access_token_life_time):
+ """
+ Configure agent client
+ :param token:
+ :param access_token_life_time:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = AgentClientMetadata(access_token_life_time=access_token_life_time)
+
+ return self.agent_stub.enableAgents(request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while configuring agent client")
+ raise
+
+ def register_and_enable_agent(self, token, agent):
+ """
+ Register and enable agent
+ :param agent:
+ :param token:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ attributeList = []
+ for atr in agent['attributes']:
+ attribute = UserAttribute(key=atr['key'], values=atr['values'])
+ attributeList.append(attribute)
+ id = agent['id']
+ realm_roles = agent['realm_roles']
+ user = UserRepresentation(id=id, realm_roles=realm_roles, attributes=attributeList)
+ request = RegisterUserRequest(user=user)
+
+ return self.agent_stub.registerAndEnableAgent(request=request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred while enabling agents")
+ raise
+
+ def get_agent(self, token, id):
+ """
+ Get agent having id
+ :param token:
+ :param id:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = AgentSearchRequest(id=id)
+ return self.agent_stub.getAgent(request=request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while fetching agent")
+ raise
+
+ def delete_agent(self, token, id):
+ """
+ Delete agent having id
+ :param token:
+ :param id:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = AgentSearchRequest(id=id)
+ return self.agent_stub.deleteAgent(request=request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while deleting agent")
+ raise
+
+ def disable_agent(self, token, id):
+ """
+ Disable agent having id
+ :param token:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = AgentSearchRequest(id=id)
+ return self.agent_stub.disableAgent(request=request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while disabling agent")
+ raise
+
+ def enable_agent(self, token, id):
+ """
+ Enable agent having id
+ :param token:
+ :param id:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = AgentSearchRequest(id=id)
+ return self.agent_stub.enableAgent(request=request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while enabling agent")
+ raise
+
+ def add_agent_attributes(self, token, agents, attributes):
+ """
+ Add attributes to agents
+ :param token:
+ :param agents:
+ :param attributes:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ attributeList = []
+ for atr in attributes:
+ attribute = UserAttribute(key=atr['key'], values=atr['values'])
+ attributeList.append(attribute)
+
+ request = AddUserAttributesRequest(attributes=attributeList, agents=agents)
+ return self.agent_stub.addAgentAttributes(request=request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while adding agent attributes")
+ raise
+
+ def delete_agent_attributes(self, token, agents, attributes):
+ """
+ Delete agent attributes of agents
+ :param token:
+ :param agents:
+ :param attributes:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ attributeList = []
+ for atr in attributes:
+ attribute = UserAttribute(key=atr['key'], values=atr['values'])
+ attributeList.append(attribute)
+
+ request = DeleteUserAttributeRequest(attributes=attributeList, agents=agents)
+ return self.agent_stub.deleteAgentAttributes(request=request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while deleting agent attributes")
+ raise
+
+ def add_roles_to_agents(self, token, agents, roles):
+ """
+ Add roles to agents
+ :param token:
+ :param agents:
+ :param roles:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ request = AddUserRolesRequest(agents=agents, roles=roles)
+ return self.agent_stub.addRolesToAgent(request=request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred whiling adding roles to agents")
+ raise
+
+ def delete_roles_from_agent(self, token, id, roles):
+ """
+ Delete roles from agent
+ :param token:
+ :param id:
+ :param roles:
+ :return:
+ """
+
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ request = DeleteUserRolesRequest(id=id, roles=roles)
+ return self.agent_stub.deleteRolesFromAgent(request=request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while enabling agents")
+ raise
+
+ def add_protocol_mapper(self, token, name, attribute_name, claim_name, claim_type, mapper_type,
+ add_to_id_token, add_to_access_token, add_to_user_info, multi_valued,
+ aggregate_attribute_values):
+ """
+ Add protocol mapper to agent client
+ :param token:
+ :param name:
+ :param attribute_name:
+ :param claim_name:
+ :param claim_type:
+ :param mapper_type:
+ :param add_to_id_token:
+ :param add_to_access_token:
+ :param add_to_user_info:
+ :param multi_valued:
+ :param aggregate_attribute_values:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ wrapped_json_type = ClaimJSONTypes.Value(claim_type)
+ wrapped_mapper_type = MapperTypes.Value(mapper_type)
+
+ request = AddProtocolMapperRequest(name=name,
+ attribute_name=attribute_name,
+ claim_name=claim_name,
+ claim_type=wrapped_json_type,
+ mapper_type=wrapped_mapper_type,
+ add_to_id_token=add_to_id_token,
+ add_to_access_token=add_to_access_token,
+ add_to_user_info=add_to_user_info,
+ multi_valued=multi_valued,
+ aggregate_attribute_values=aggregate_attribute_values
+ )
+
+ return self.agent_stub.addProtocolMapper(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in add_protocol_mapper, probably due to invalid parameters")
+ raise
diff --git a/custos-client-sdks/custos-python-sdk/custos/clients/group_management_client.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/group_management_client.py
similarity index 86%
copy from custos-client-sdks/custos-python-sdk/custos/clients/group_management_client.py
copy to custos-client-sdks/custos-python-sdk/build/lib/custos/clients/group_management_client.py
index ae4cf54..b80b051 100644
--- a/custos-client-sdks/custos-python-sdk/custos/clients/group_management_client.py
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/group_management_client.py
@@ -21,10 +21,8 @@ import grpc
from custos.transport.settings import CustosServerClientSettings
from custos.server.integration.GroupManagementService_pb2_grpc import GroupManagementServiceStub
-from custos.server.core.IamAdminService_pb2 import GroupRequest, GroupsRequest, UserGroupMappingRequest, \
- UserAttribute, GroupRepresentation
-from custos.server.core.UserProfileService_pb2 import GroupToGroupMembership
+from custos.server.core.UserProfileService_pb2 import GroupToGroupMembership, Group, GroupRequest, GroupMembership
from custos.clients.utils.certificate_fetching_rest_client import CertificateFetchingRestClient
logger = logging.getLogger(__name__)
@@ -44,7 +42,7 @@ class GroupManagementClient(object):
self.channel = grpc.secure_channel(target=self.target, credentials=self.channel_credentials)
self.group_stub = GroupManagementServiceStub(self.channel)
- def create_groups(self, token, name, description, owner_id):
+ def create_group(self, token, name, description, owner_id):
"""
Create groups
:param owner_id:
@@ -57,14 +55,13 @@ class GroupManagementClient(object):
try:
token = "Bearer " + token
metadata = (('authorization', token),)
- group_list = []
- rep = GroupRepresentation(name=name, realm_roles=[], client_roles=[],
- sub_groups=[], attributes=[], description=description,
- ownerId=owner_id)
- group_list.append(rep)
- request = GroupsRequest(groups=group_list)
-
- return self.group_stub.createGroups(request=request, metadata=metadata)
+ rep = Group(name=name, realm_roles=[], client_roles=[],
+ attributes=[], description=description,
+ owner_id=owner_id)
+
+ request = GroupRequest(group=rep)
+
+ return self.group_stub.createGroup(request=request, metadata=metadata)
except Exception:
logger.exception("Error occurred while creating groups")
raise
@@ -95,8 +92,7 @@ class GroupManagementClient(object):
try:
token = "Bearer " + token
metadata = (('authorization', token),)
-
- gr = GroupRepresentation(id=group_id, name=group_name)
+ gr = Group(id=group_id, name=group_name)
request = GroupRequest(id=group_id, group=gr)
return self.group_stub.findGroup(request=request, metadata=metadata)
except Exception:
@@ -129,7 +125,7 @@ class GroupManagementClient(object):
try:
token = "Bearer " + token
metadata = (('authorization', token),)
- request = UserGroupMappingRequest(username=username, group_id=group_id, membership_type=membership_type)
+ request = GroupMembership(username=username, group_id=group_id, type=membership_type)
return self.group_stub.addUserToGroup(request=request, metadata=metadata)
except Exception:
logger.exception("Error occurred while adding user to group")
@@ -146,7 +142,7 @@ class GroupManagementClient(object):
try:
token = "Bearer " + token
metadata = (('authorization', token),)
- request = UserGroupMappingRequest(username=username, group_id=group_id)
+ request = GroupMembership(username=username, group_id=group_id)
return self.group_stub.removeUserFromGroup(request=request, metadata=metadata)
except Exception:
logger.exception("Error occurred while removing user from group")
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/identity_management_client.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/identity_management_client.py
new file mode 100644
index 0000000..c90a1b2
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/identity_management_client.py
@@ -0,0 +1,240 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+import logging
+
+import grpc
+from custos.transport.settings import CustosServerClientSettings
+
+from custos.server.integration.IdentityManagementService_pb2_grpc import IdentityManagementServiceStub
+from custos.server.core.IdentityService_pb2 import AuthenticationRequest, AuthToken, Claim, \
+ GetUserManagementSATokenRequest, \
+ GetTokenRequest, GetOIDCConfiguration, EndSessionRequest
+from custos.server.integration.IdentityManagementService_pb2 import AuthorizationRequest, GetCredentialsRequest, \
+ EndSessionRequest as Er, GetAgentTokenRequest
+from custos.clients.utils.certificate_fetching_rest_client import CertificateFetchingRestClient
+
+logger = logging.getLogger(__name__)
+logger.setLevel(logging.DEBUG)
+
+
+class IdentityManagementClient(object):
+
+ def __init__(self, custos_server_setting):
+ self.custos_settings = custos_server_setting
+ self.target = self.custos_settings.CUSTOS_SERVER_HOST + ":" + str(self.custos_settings.CUSTOS_SERVER_PORT)
+ certManager = CertificateFetchingRestClient(custos_server_setting)
+ certManager.load_certificate()
+ with open(self.custos_settings.CUSTOS_CERT_PATH, 'rb') as f:
+ trusted_certs = f.read()
+ self.channel_credentials = grpc.ssl_channel_credentials(root_certificates=trusted_certs)
+ self.channel = grpc.secure_channel(target=self.target, credentials=self.channel_credentials)
+ self.identity_stub = IdentityManagementServiceStub(self.channel)
+
+ def authenticate(self, token, username, password):
+ """
+ Used for local authentication
+ :param token client credentials
+ :param username Users username
+ :param password Users password
+ :return: Access token
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = AuthenticationRequest(username=username, password=password)
+
+ return self.identity_stub.authenticate(request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred in authenticate, probably due to invalid parameters")
+ raise
+
+ def is_authenticated(self, token, user_access_token, username):
+ """
+ Check access token is valid
+ :param token: client credential token
+ :param user_access_token access token of user
+ :param username
+ :return: status (TRUE, FALSE)
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ claim = Claim(key="username", value=username)
+
+ claims = []
+ claims.append(claim)
+
+ request = AuthToken(accessToken=user_access_token, claims=claims)
+
+ return self.identity_stub.isAuthenticated(request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred in is_authenticated, probably due to invalid parameters")
+ raise
+
+ def get_service_account_access_token(self, token):
+ """
+ Get service account access token
+ :param token: client credentials
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = GetUserManagementSATokenRequest();
+
+ return self.identity_stub.getUserManagementServiceAccountAccessToken(request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred in get_service_account_access_token, probably due to invalid parameters")
+ raise
+
+ def authorize(self, client_id, redirect_uri, response_type, scope, state):
+ """
+ return authorize url of keycloak
+ :param redirect_uri: redirect URI of client
+ :param response_type: response type (code)
+ :param scope: (openid email profile)
+ :param state: (random number)
+ :return:
+ """
+ try:
+ request = AuthorizationRequest(client_id=client_id, redirect_uri=redirect_uri, response_type=response_type,
+ scope=scope,
+ state=state)
+
+ return self.identity_stub.authorize(request)
+ except Exception:
+ logger.exception("Error occurred in authorize, probably due to invalid parameters")
+ raise
+
+ def token(self, token, redirect_uri=None, code=None, username=None, password=None, refresh_token=None,
+ grant_type=None):
+ """
+ provide user access token
+ :param token: client credentials
+ :param redirect_uri: redirect uri
+ :param code: code returned from token
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = GetTokenRequest(redirect_uri=redirect_uri, code=code,
+ username=username, password=password, refresh_token=refresh_token,
+ grant_type=grant_type)
+
+ return self.identity_stub.token(request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred in token, probably due to invalid parameters")
+ raise
+
+ def get_credentials(self, token, client_id):
+ """
+ provides IAM and CILogon credentials
+ :param token
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = GetCredentialsRequest(client_id=client_id)
+
+ return self.identity_stub.getCredentials(request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred in get_credentials, probably due to invalid parameters")
+ raise
+
+ def get_oidc_configuration(self, token, client_id):
+ """
+ send the OIDC config
+ :param token client credentials
+ :param client_id
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = GetOIDCConfiguration(client_id=client_id)
+
+ return self.identity_stub.getOIDCConfiguration(request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred in get_OIDC_Configuration, probably due to invalid parameters")
+ raise
+
+ def end_user_session(self, token, refresh_token):
+ """
+ End user session
+ :param token:
+ :param refresh_token:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ body = EndSessionRequest(refresh_token=refresh_token)
+ request = Er(body=body)
+
+ return self.identity_stub.endUserSession(request=request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while ending user session")
+ raise
+
+ def get_agent_token(self, token, client_id, grant_type, refresh_token=None):
+ """
+ Get agent token
+ :param token: base64Encoded(agentId:agentSec)
+ :param client_id: parent Client Id
+ :param grant_type: client_credentials, refresh_token
+ :param refresh_token:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = GetAgentTokenRequest(client_id=client_id, grant_type=grant_type, refresh_token=refresh_token)
+
+ return self.identity_stub.getAgentToken(request=request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred while fetching agent token")
+ raise
+
+ def end_agent_session(self, token, refresh_token):
+ """
+ End user session
+ :param token: base64Encoded(agentId:agentSec)
+ :param refresh_token:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ body = EndSessionRequest(refresh_token=refresh_token)
+ request = Er(body=body)
+
+ return self.identity_stub.endAgentSession(request=request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while ending agent session")
+ raise
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/resource_secret_management_client.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/resource_secret_management_client.py
new file mode 100644
index 0000000..1b41dbc
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/resource_secret_management_client.py
@@ -0,0 +1,195 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+
+import logging
+import grpc
+
+from custos.transport.settings import CustosServerClientSettings
+
+from custos.server.integration.ResourceSecretManagementService_pb2_grpc import ResourceSecretManagementServiceStub
+from custos.server.core.IdentityService_pb2 import GetJWKSRequest
+from custos.server.core.ResourceSecretService_pb2 import GetSecretRequest, SecretMetadata, ResourceOwnerType, \
+ ResourceSource, KVCredential, ResourceType, SSHCredential, PasswordCredential, GetResourceCredentialByTokenRequest
+from google.protobuf.json_format import MessageToJson
+from custos.clients.utils.certificate_fetching_rest_client import CertificateFetchingRestClient
+
+logger = logging.getLogger(__name__)
+logger.setLevel(logging.DEBUG)
+
+
+class ResourceSecretManagementClient(object):
+
+ def __init__(self, custos_server_setting):
+ self.custos_settings = custos_server_setting
+ self.target = self.custos_settings.CUSTOS_SERVER_HOST + ":" + str(self.custos_settings.CUSTOS_SERVER_PORT)
+ certManager = CertificateFetchingRestClient(custos_server_setting)
+ certManager.load_certificate()
+ with open(self.custos_settings.CUSTOS_CERT_PATH, 'rb') as f:
+ trusted_certs = f.read()
+ self.channel_credentials = grpc.ssl_channel_credentials(root_certificates=trusted_certs)
+ self.channel = grpc.secure_channel(target=self.target, credentials=self.channel_credentials)
+ self.resource_sec_client = ResourceSecretManagementServiceStub(self.channel)
+
+ def get_secret(self, token, owner_type, resource_type, source, name):
+ """
+ Get secret from secret service
+ :param token:
+ :param owner_type:
+ :param resource_type:
+ :param source:
+ :param name:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ owner_type = ResourceOwnerType.Value(owner_type)
+ resource_type = ResourceType.Value(resource_type)
+ source = ResourceSource.Value(source)
+ met = SecretMetadata(owner_type=owner_type,
+ resource_type=resource_type, source=source, name=name)
+ request = GetSecretRequest(metadata=met)
+ msg = self.resource_sec_client.getSecret(request=request, metadata=metadata)
+ return MessageToJson(msg)
+ except Exception:
+ logger.exception("Error occurred while fetching secrets")
+ raise
+
+ def get_JWKS(self, token):
+ """
+ Get JWKS resources
+ :param token:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ request = GetJWKSRequest()
+ msg = self.resource_sec_client.getJWKS(request=request, metadata=metadata)
+ return MessageToJson(msg)
+ except Exception:
+ logger.exception("Error occurred while fetching JWKS request")
+ raise
+
+ def add_ssh_credential(self, token, client_id, owner_id, description):
+
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ secret_metadata = SecretMetadata(client_id=client_id, owner_id=owner_id, description=description)
+ ssh_cred = SSHCredential(metadata=secret_metadata)
+
+ return self.resource_sec_client.addSSHCredential(request=ssh_cred, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred while creating ssh key")
+ raise
+
+ def add_password_credential(self, token, client_id, owner_id, description, password):
+
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ secret_metadata = SecretMetadata(client_id=client_id, owner_id=owner_id, description=description)
+ password_cred = PasswordCredential(metadata=secret_metadata, password=password)
+
+ return self.resource_sec_client.addPasswordCredential(request=password_cred, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred while creating password key")
+ raise
+
+ def get_ssh_credential(self, token, client_id, ssh_credential_token):
+
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ request = GetResourceCredentialByTokenRequest(client_id=client_id, token=ssh_credential_token)
+
+ msg = self.resource_sec_client.getSSHCredential(request=request, metadata=metadata)
+ return MessageToJson(msg)
+ except Exception:
+ logger.exception("Error occurred while creating ssh key")
+ raise
+
+ def get_password_credential(self, token, client_id, password_credential_token):
+
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ request = GetResourceCredentialByTokenRequest(client_id=client_id, token=password_credential_token)
+
+ msg = self.resource_sec_client.getPasswordCredential(request=request, metadata=metadata)
+ return MessageToJson(msg)
+ except Exception:
+ logger.exception("Error occurred while creating password key")
+ raise
+
+ def set_KV_credential(self, token, user_token, client_id, key, value):
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),('user_token', user_token),)
+ secret_metadata = SecretMetadata(client_id=client_id)
+ request = KVCredential(key=key, value=value, metadata=secret_metadata)
+
+ msg = self.resource_sec_client.addKVCredential(request=request, metadata=metadata)
+ return MessageToJson(msg)
+ except Exception:
+ logger.exception("Error occurred while creating KV credential")
+ raise
+
+ def update_KV_credential(self, token,user_token, client_id, key, value):
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),('user_token', user_token),)
+ secret_metadata = SecretMetadata(client_id=client_id)
+ request = KVCredential(key=key, value=value, metadata=secret_metadata)
+
+ msg = self.resource_sec_client.updateKVCredential(request=request, metadata=metadata)
+ return MessageToJson(msg)
+ except Exception:
+ logger.exception("Error occurred while updating KV credential")
+ raise
+
+ def delete_KV_credential(self, token, user_token, client_id, key):
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),('user_token', user_token),)
+ secret_metadata = SecretMetadata(client_id=client_id)
+ request = KVCredential(key=key, metadata=secret_metadata)
+
+ msg = self.resource_sec_client.deleteKVCredential(request=request, metadata=metadata)
+ return MessageToJson(msg)
+
+ except Exception:
+ logger.exception("Error occurred while deleting KV credential")
+ raise
+
+ def get_KV_credential(self, token, user_token, client_id, key):
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),('user_token', user_token),)
+ secret_metadata = SecretMetadata(client_id=client_id)
+ request = KVCredential(key=key, metadata=secret_metadata)
+
+ msg = self.resource_sec_client.getKVCredential(request=request, metadata=metadata)
+ return MessageToJson(msg)
+
+ except Exception:
+ logger.exception("Error occurred while get KV credential")
+ raise
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/sharing_management_client.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/sharing_management_client.py
new file mode 100644
index 0000000..468c5ca
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/sharing_management_client.py
@@ -0,0 +1,120 @@
+import logging
+import grpc
+
+from custos.transport.settings import CustosServerClientSettings
+
+from custos.server.integration.SharingManagementService_pb2_grpc import SharingManagementServiceStub
+
+from custos.server.core.SharingService_pb2 import PermissionType, EntityType, Entity, SharingRequest, \
+ PermissionTypeRequest, EntityRequest, EntityTypeRequest
+from google.protobuf.json_format import MessageToJson
+from custos.clients.utils.certificate_fetching_rest_client import CertificateFetchingRestClient
+
+logger = logging.getLogger(__name__)
+logger.setLevel(logging.DEBUG)
+
+
+class SharingManagementClient(object):
+
+ def __init__(self, custos_server_setting):
+ self.custos_settings = custos_server_setting
+ self.target = self.custos_settings.CUSTOS_SERVER_HOST + ":" + str(self.custos_settings.CUSTOS_SERVER_PORT)
+ certManager = CertificateFetchingRestClient(custos_server_setting)
+ certManager.load_certificate()
+ with open(self.custos_settings.CUSTOS_CERT_PATH, 'rb') as f:
+ trusted_certs = f.read()
+ self.channel_credentials = grpc.ssl_channel_credentials(root_certificates=trusted_certs)
+ self.channel = grpc.secure_channel(target=self.target, credentials=self.channel_credentials)
+ self.sharing_mgt_client = SharingManagementServiceStub(self.channel)
+
+ def create_entity_type(self, token, client_id, id, name, description):
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ entity_type = EntityType(id=id, name=name, description=description)
+ entity_type_req = EntityTypeRequest(client_id=client_id, entity_type=entity_type)
+ return self.sharing_mgt_client.createEntityType(request=entity_type_req, metadata=metadata);
+ except Exception:
+ logger.exception("Error occurred while creating entity type with Id " + id)
+ raise
+
+ def create_permission_type(self, token, client_id, id, name, description):
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ permission_type = PermissionType(id=id, name=name, description=description)
+ permission_type_req = PermissionTypeRequest(client_id=client_id, permission_type=permission_type)
+ return self.sharing_mgt_client.createPermissionType(request=permission_type_req, metadata=metadata);
+ except Exception:
+ logger.exception("Error occurred while creating permission entity type with Id " + id)
+ raise
+
+ def create_entity(self, token, client_id, id, name, description, owner_id, type, parent_id):
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+ entity = Entity(id=id, name=name, description=description, owner_id=owner_id, type=type,
+ parent_id=parent_id)
+ entity_req = EntityRequest(client_id=client_id, entity=entity)
+ return self.sharing_mgt_client.createEntity(request=entity_req, metadata=metadata);
+ except Exception:
+ logger.exception("Error occurred while creating entity with Id " + id)
+ raise
+
+ def share_entity_with_users(self, token, client_id, entity_id, permission_type, user_id):
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ entity = Entity(id=entity_id)
+ permission_type = PermissionType(id=permission_type)
+ owner_ids = []
+ owner_ids.append(user_id)
+ cascade = True
+ sharing_req = SharingRequest(client_id=client_id, entity=entity, permission_type=permission_type,
+ owner_id=owner_ids, cascade=cascade)
+ return self.sharing_mgt_client.shareEntityWithUsers(request=sharing_req, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while creating entity with Id " + entity_id)
+ raise
+
+ def share_entity_with_groups(self, token, client_id, entity_id, permission_type, group_id):
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ entity = Entity(id=entity_id)
+ permission_type = PermissionType(id=permission_type)
+ owner_ids = []
+ owner_ids.append(group_id)
+ cascade = True
+ sharing_req = SharingRequest(client_id=client_id, entity=entity, permission_type=permission_type,
+ owner_id=owner_ids, cascade=cascade)
+ return self.sharing_mgt_client.shareEntityWithGroups(request=sharing_req, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred while creating entity with Id " +
+ entity_id)
+ raise
+
+ def user_has_access(self, token, client_id, entity_id, permission_type, user_id):
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ entity = Entity(id=entity_id)
+ permission_type = PermissionType(id=permission_type)
+ owner_ids = []
+ owner_ids.append(user_id)
+ cascade = True
+ sharing_req = SharingRequest(client_id=client_id, entity=entity, permission_type=permission_type,
+ owner_id=owner_ids, cascade=cascade)
+ resl = self.sharing_mgt_client.userHasAccess(request=sharing_req, metadata=metadata)
+
+ if resl.status:
+ return True
+ else:
+ return False
+
+ except Exception:
+ logger.exception("Error occurred while checking for permissions ")
+ raise
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/super_tenant_management_client.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/super_tenant_management_client.py
new file mode 100644
index 0000000..f7c0463
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/super_tenant_management_client.py
@@ -0,0 +1,80 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+import logging
+import grpc
+from custos.server.integration.TenantManagementService_pb2_grpc import TenantManagementServiceStub;
+from custos.server.core.TenantProfileService_pb2 import GetTenantsRequest, UpdateStatusRequest
+from custos.transport.settings import CustosServerClientSettings
+from custos.clients.utils.certificate_fetching_rest_client import CertificateFetchingRestClient
+
+logger = logging.getLogger(__name__)
+logger.setLevel(logging.DEBUG)
+
+
+class SuperTenantManagementClient(object):
+
+ def __init__(self, custos_server_setting):
+ self.custos_settings =custos_server_setting
+ self.target = self.custos_settings.CUSTOS_SERVER_HOST + ":" + str(self.custos_settings.CUSTOS_SERVER_PORT)
+ certManager = CertificateFetchingRestClient(custos_server_setting)
+ certManager.load_certificate()
+ with open(self.custos_settings.CUSTOS_CERT_PATH, 'rb') as f:
+ trusted_certs = f.read()
+ self.channel_credentials = grpc.ssl_channel_credentials(root_certificates=trusted_certs)
+ self.channel = grpc.secure_channel(target=self.target, credentials=self.channel_credentials)
+ self.tenant_stub = TenantManagementServiceStub(self.channel)
+
+ def get_all_tenants(self, token, offset, limit, status, requester_email=None):
+ """
+ Get all tenants
+ :param token admin user token
+ :param offset omits the initial number of entries
+ :param limit contains maximum number of entries
+ :param status (ACTIVE, REQUESTED, DENIED, CANCELLED, DEACTIVATED)
+ :return: Tenants
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = GetTenantsRequest(offset=offset, limit=limit, status=status, requester_email=None)
+
+ return self.tenant_stub.getAllTenants(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in get_all_tenants, probably due to invalid parameters")
+ raise
+
+ def update_tenant_status(self, token, client_id, status):
+ """
+ Update tenant status.
+ :param token admin user token
+ :param client_id client id of tenant to be updated
+ :param status (ACTIVE, REQUESTED, DENIED, CANCELLED, DEACTIVATED)
+ :return: Operation Status
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = UpdateStatusRequest(client_id=client_id, status=status)
+
+ return self.tenant_stub.updateTenantStatus(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in update_tenant_status, probably due to invalid parameters")
+ raise
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/tenant_management_client.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/tenant_management_client.py
new file mode 100644
index 0000000..def5d00
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/tenant_management_client.py
@@ -0,0 +1,269 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+import logging
+import grpc
+from custos.server.integration.TenantManagementService_pb2_grpc import TenantManagementServiceStub
+from custos.server.core.TenantProfileService_pb2 import Tenant, GetTenantsRequest, GetAllTenantsForUserRequest
+from custos.server.core.IamAdminService_pb2 import AddRolesRequest, RoleRepresentation, AddProtocolMapperRequest, \
+ ClaimJSONTypes, MapperTypes
+from custos.server.integration.TenantManagementService_pb2 import GetTenantRequest, \
+ UpdateTenantRequest, DeleteTenantRequest
+from custos.transport.settings import CustosServerClientSettings
+from custos.clients.utils.certificate_fetching_rest_client import CertificateFetchingRestClient
+
+logger = logging.getLogger(__name__)
+logger.setLevel(logging.DEBUG)
+
+
+class TenantManagementClient(object):
+
+ def __init__(self, custos_server_setting):
+ self.custos_settings = custos_server_setting
+ self.target = self.custos_settings.CUSTOS_SERVER_HOST + ":" + str(self.custos_settings.CUSTOS_SERVER_PORT)
+ certManager = CertificateFetchingRestClient(custos_server_setting)
+ certManager.load_certificate()
+ with open(self.custos_settings.CUSTOS_CERT_PATH, 'rb') as f:
+ trusted_certs = f.read()
+ self.channel_credentials = grpc.ssl_channel_credentials(root_certificates=trusted_certs)
+ self.channel = grpc.secure_channel(target=self.target, credentials=self.channel_credentials)
+ self.tenant_stub = TenantManagementServiceStub(self.channel)
+
+ def create_admin_tenant(self, client_name, requester_email, admin_frist_name,
+ admin_last_name, admin_email, admin_username, admin_password,
+ contacts, redirect_uris, client_uri, scope, domain, logo_uri, comment):
+ """
+ Creates admin tenant client. Needs to be approved by
+ Custos Admin
+ :return: Custos Credentials
+ """
+ try:
+ tenant = Tenant(client_name=client_name,
+ requester_email=requester_email,
+ admin_first_name=admin_frist_name,
+ admin_last_name=admin_last_name,
+ admin_email=admin_email,
+ admin_username=admin_username,
+ admin_password=admin_password,
+ contacts=contacts,
+ redirect_uris=redirect_uris,
+ client_uri=client_uri,
+ scope=scope,
+ domain=domain,
+ logo_uri=logo_uri,
+ comment=comment,
+ application_type="web")
+ return self.tenant_stub.createTenant(tenant)
+ except Exception:
+ logger.exception("Error occurred in create_admin_tenant, probably due to invalid parameters")
+ raise
+
+ def create_tenant(self, client_token, client_name, requester_email, admin_frist_name,
+ admin_last_name, admin_email, admin_username, admin_password,
+ contacts, redirect_uris, client_uri, scope, domain, logo_uri, comment):
+ """
+ Creates child tenant under admin tenant. Automatically activates
+ :return: Custos credentials
+ """
+ try:
+ tenant = Tenant(client_name=client_name,
+ requester_email=requester_email,
+ admin_first_name=admin_frist_name,
+ admin_last_name=admin_last_name,
+ admin_email=admin_email,
+ admin_username=admin_username,
+ admin_password=admin_password,
+ contacts=contacts,
+ redirect_uris=redirect_uris,
+ client_uri=client_uri,
+ scope=scope,
+ domain=domain,
+ logo_uri=logo_uri,
+ comment=comment,
+ application_type="web")
+ token = "Bearer " + client_token
+ metadata = (('authorization', token),)
+ return self.tenant_stub.createTenant(tenant, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred in create_tenant, probably due to invalid parameters")
+ raise
+
+ def get_tenant(self, client_token, client_id):
+ """
+ Fetch tenant
+ :return: Tenant
+ """
+ try:
+ request = GetTenantRequest(client_id=client_id)
+ token = "Bearer " + client_token
+ metadata = (('authorization', token),)
+ return self.tenant_stub.getTenant(request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred in get_tenant, probably due to invalid parameters")
+ raise
+
+ def update_tenant(self, client_token, client_id, client_name, requester_email, admin_frist_name,
+ admin_last_name, admin_email, admin_username, admin_password,
+ contacts, redirect_uris, client_uri, scope, domain, logo_uri, comment):
+ """
+ Update given tenant by client Id
+ :return: updated tenant
+ """
+ try:
+ tenant = Tenant(client_name=client_name,
+ requester_email=requester_email,
+ admin_first_name=admin_frist_name,
+ admin_last_name=admin_last_name,
+ admin_email=admin_email,
+ admin_username=admin_username,
+ admin_password=admin_password,
+ contacts=contacts,
+ redirect_uris=redirect_uris,
+ client_uri=client_uri,
+ scope=scope,
+ domain=domain,
+ logo_uri=logo_uri,
+ comment=comment,
+ application_type="web")
+ token = "Bearer " + client_token
+ metadata = (('authorization', token),)
+
+ request = UpdateTenantRequest(client_id=client_id, body=tenant)
+
+ return self.tenant_stub.updateTenant(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in update_tenant, probably due to invalid parameters")
+ raise
+
+ def delete_tenant(self, token, client_id):
+ """
+ Delete given tenant by client Id
+ :return: void
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = DeleteTenantRequest(client_id=client_id)
+
+ return self.tenant_stub.deleteTenant(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in delete_tenant, probably due to invalid parameters")
+ raise
+
+ def add_tenant_roles(self, token, roles, is_client_level):
+ """
+ :param token
+ :param: roles include realm or client level roles as array
+ :param is_client_level boolean to indicate to add roles to client
+ :return: void
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ rolesRepArray = []
+
+ for role in roles:
+ rolesRep = RoleRepresentation(name=role['name'], description=role['description'],
+ composite=role['composite'])
+ rolesRepArray.append(rolesRep)
+
+ request = AddRolesRequest(roles=rolesRepArray, client_level=is_client_level)
+
+ return self.tenant_stub.addTenantRoles(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in add_tenant_roles, probably due to invalid parameters")
+ raise
+
+ def add_protocol_mapper(self, token, name, attribute_name, claim_name, claim_type, mapper_type,
+ add_to_id_token, add_to_access_token, add_to_user_info, multi_valued,
+ aggregate_attribute_values):
+ """
+ Protocol mapper enables to add user attributes, user realm roles or user client roles to be
+ added to ID token, Access token.
+ :param token
+ :param: roles include realm or client level roles as array
+ :param is_client_level boolean to indicate to add roles to client
+ :return: void
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ wrapped_json_type = ClaimJSONTypes.Value(claim_type)
+ wrapped_mapper_type = MapperTypes.Value(mapper_type)
+
+ request = AddProtocolMapperRequest(name=name,
+ attribute_name=attribute_name,
+ claim_name=claim_name,
+ claim_type=wrapped_json_type,
+ mapper_type=wrapped_mapper_type,
+ add_to_id_token=add_to_id_token,
+ add_to_access_token=add_to_access_token,
+ add_to_user_info=add_to_user_info,
+ multi_valued=multi_valued,
+ aggregate_attribute_values=aggregate_attribute_values
+ )
+
+ return self.tenant_stub.addProtocolMapper(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in add_protocol_mapper, probably due to invalid parameters")
+ raise
+
+ def get_child_tenants(self, token, offset, limit, status):
+ """
+ Get child tenants of the calling tenant
+ :param token
+ :param: offset omit initial number of results equalt to offset
+ :param limit results should contain maximum number of entries
+ :param status (ACTIVE, REQUESTED, DENIED, CANCELLED, DEACTIVATED)
+ :return: Tenants
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = GetTenantsRequest(offset=offset, limit=limit, status=status)
+
+ return self.tenant_stub.getChildTenants(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in get_child_tenants, probably due to invalid parameters")
+ raise
+
+ def get_all_tenants(self, token, email):
+ """
+ Get all tenants requested by given user
+ :param token
+ :param email get all tenants requested by email
+ :return: Tenants
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = GetAllTenantsForUserRequest(email=email)
+
+ return self.tenant_stub.getAllTenantsForUser(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in get_all_tenants, probably due to invalid parameters")
+ raise
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/user_management_client.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/user_management_client.py
new file mode 100644
index 0000000..6fd5159
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/user_management_client.py
@@ -0,0 +1,387 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+import logging
+import grpc
+
+from custos.transport.settings import CustosServerClientSettings
+
+from custos.server.integration.UserManagementService_pb2_grpc import UserManagementServiceStub
+from custos.server.core.IamAdminService_pb2 import RegisterUserRequest, UserRepresentation, RegisterUsersRequest, \
+ UserAttribute, \
+ AddUserAttributesRequest, DeleteUserAttributeRequest, UserSearchMetadata, FindUsersRequest, AddUserRolesRequest, \
+ UserSearchRequest, ResetUserPassword, DeleteUserRolesRequest
+from custos.server.core.UserProfileService_pb2 import UserProfile
+from custos.server.integration.UserManagementService_pb2 import LinkUserProfileRequest, UserProfileRequest
+
+from custos.clients.utils.certificate_fetching_rest_client import CertificateFetchingRestClient
+
+logger = logging.getLogger(__name__)
+logger.setLevel(logging.DEBUG)
+
+
+class UserManagementClient(object):
+
+ def __init__(self, custos_server_setting):
+ self.custos_settings = custos_server_setting
+ self.target = self.custos_settings.CUSTOS_SERVER_HOST + ":" + str(self.custos_settings.CUSTOS_SERVER_PORT)
+ certManager = CertificateFetchingRestClient(custos_server_setting)
+ certManager.load_certificate()
+ with open(self.custos_settings.CUSTOS_CERT_PATH, 'rb') as f:
+ trusted_certs = f.read()
+ self.channel_credentials = grpc.ssl_channel_credentials(root_certificates=trusted_certs)
+ self.channel = grpc.secure_channel(target=self.target, credentials=self.channel_credentials)
+ self.user_stub = UserManagementServiceStub(self.channel)
+
+ def register_user(self, token, username, first_name, last_name, password, email, is_temp_password):
+ """
+ Register user in given tenant
+ :param token: client credentials
+ :param username:
+ :param first_name:
+ :param last_name:
+ :param password:
+ :param email:
+ :param is_temp_password:
+ :return: registration status
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ user = UserRepresentation(username=username, password=password,
+ first_name=first_name, last_name=last_name,
+ email=email, temporary_password=is_temp_password)
+
+ request = RegisterUserRequest(user=user)
+
+ return self.user_stub.registerUser(request, metadata=metadata)
+ except Exception:
+ logger.exception("Error occurred in register_user, probably due to invalid parameters")
+ raise
+
+ def register_and_enable_users(self, token, users):
+ """
+ register and enable users
+ :param token: admin access token
+ :param users:
+ :return:
+ """
+
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ usersList = []
+
+ for user in users:
+ attributeList = []
+ for atr in user['attributes']:
+ attribute = UserAttribute(key=atr['key'], values=atr['values'])
+ attributeList.append(attribute)
+ username = user['username']
+ password = user['password']
+ first_name = user['first_name']
+ last_name = user['last_name']
+ email = user['email']
+ temporary_password = user['temporary_password']
+ realm_roles = user['realm_roles']
+ client_roles = user['client_roles']
+ attributes = attributeList
+ user = UserRepresentation(username=username, password=password,
+ first_name=first_name, last_name=last_name,
+ email=email, temporary_password=temporary_password,
+ realm_roles=realm_roles, client_roles=client_roles,
+ attributes=attributes)
+
+ usersList.append(user)
+
+ request = RegisterUsersRequest(users=usersList)
+ return self.user_stub.registerAndEnableUsers(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in register_and_enable_users, probably due to invalid parameters")
+ raise
+
+ def add_user_attributes(self, token, attributes, users):
+ """
+ Add user attributes
+ :param token:
+ :param attributes:
+ :param users:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ attributeList = []
+ for atr in attributes:
+ attribute = UserAttribute(key=atr['key'], values=atr['values'])
+ attributeList.append(attribute)
+
+ request = AddUserAttributesRequest(attributes=attributeList, users=users)
+ return self.user_stub.addUserAttributes(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in add_user_attributes, probably due to invalid parameters")
+ raise
+
+ def delete_user_attributes(self, token, attributes, users):
+ """
+ Delete user attributes
+ :param token: user token
+ :param attributes:
+ :param users:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ attributeList = []
+ for atr in attributes:
+ attribute = UserAttribute(key=atr['key'], values=atr['values'])
+ attributeList.append(attribute)
+
+ request = DeleteUserAttributeRequest(attributes=attributeList, users=users)
+ return self.user_stub.deleteUserAttributes(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in delete_user_attributes, probably due to invalid parameters")
+ raise
+
+ def enable_user(self, token, username):
+ """
+ Enable user request
+ :param token: client credential
+ :param attributes:
+ :param users:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ user = UserSearchMetadata(username=username)
+ request = UserSearchRequest(user=user)
+ return self.user_stub.enableUser(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in enable_user, probably due to invalid parameters")
+ raise
+
+ def add_roles_to_users(self, token, usernames, roles, is_client_level):
+ """
+ Add roles to users
+ :param token: admin token
+ :param usernames list of usersname
+ :param : roles list of roles
+ :param is_client_level to add client level else realm level
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = AddUserRolesRequest(usernames=usernames, roles=roles, client_level=is_client_level)
+ return self.user_stub.addRolesToUsers(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in add_roles_to_users, probably due to invalid parameters")
+ raise
+
+ def is_user_enabled(self, token, username):
+ """
+ Check the weather user is enabled
+ :param token: client credential
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ user = UserSearchMetadata(username=username)
+ request = UserSearchRequest(user=user)
+ return self.user_stub.isUserEnabled(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in is_user_enabled, probably due to invalid parameters")
+ raise
+
+ def is_username_available(self, token, username):
+ """
+ Check the weather username is available
+ :param token: client credential
+ :param username
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ user = UserSearchMetadata(username=username)
+ request = UserSearchRequest(user=user)
+ return self.user_stub.isUsernameAvailable(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in is_username_available, probably due to invalid parameters")
+ raise
+
+ def get_user(self, token, username):
+ """
+ Get user
+ :param token: client credential
+ :param username
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ user = UserSearchMetadata(username=username)
+ request = UserSearchRequest(user=user)
+ return self.user_stub.getUser(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in get_user, probably due to invalid parameters")
+ raise
+
+ def find_users(self, token, offset, limit, username=None, firstname=None, lastname=None, email=None, ):
+ """
+ Find users
+ :param token: client credential
+ :param username
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ user = UserSearchMetadata(username=username, first_name=firstname, last_name=lastname, email=email)
+ request = FindUsersRequest(user=user, offset=offset, limit=limit)
+ return self.user_stub.findUsers(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in find_users, probably due to invalid parameters")
+ raise
+
+ def reset_password(self, token, username, password):
+ """
+ Reset user password
+ :param token: client credential
+ :param username
+ :param password
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = ResetUserPassword(username=username, password=password)
+ return self.user_stub.resetPassword(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in reset_password, probably due to invalid parameters")
+ raise
+
+ def delete_user(self, token, username):
+ """
+ Delete user from a given realm
+ :param token: admin credentials
+ :param username:
+ :return:
+ """
+
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ user = UserSearchMetadata(username=username)
+ request = UserSearchRequest(user=user)
+ return self.user_stub.deleteUser(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in delete_user, probably due to invalid parameters")
+ raise
+
+ def delete_user_roles(self, token, username, client_roles, realm_roles):
+ """
+ Delete user roles
+ :param token: admin access token
+ :param username:
+ :param client_roles:
+ :param realm_roles:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ request = DeleteUserRolesRequest(username=username, client_roles=client_roles, roles=realm_roles)
+ return self.user_stub.deleteUserRoles(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in delete_user_roles, probably due to invalid parameters")
+ raise
+
+ def update_user_profile(self, token, username, email, first_name, last_name):
+ """
+ Update user profile
+ :param token: user token
+ :param username:
+ :param email:
+ :param first_name:
+ :param last_name:
+ :return:
+ """
+
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ profile = UserProfile(username=username, email=email, first_name=first_name, last_name=last_name)
+ request = UserProfileRequest(user_profile=profile)
+ return self.user_stub.updateUserProfile(request=request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in update_user_profile, probably due to invalid parameters")
+ raise
+
+ def link_user_profile(self, token, current_username, previous_username, linking_attributes=None):
+ """
+ Link existing user profile with previous user profile
+ :param previous_username:
+ :param current_username:
+ :param linking_attributes:
+ :return:
+ """
+ try:
+ token = "Bearer " + token
+ metadata = (('authorization', token),)
+
+ attributeList = []
+ for atr in linking_attributes:
+ attribute = UserAttribute(key=atr['key'], values=atr['values'])
+ attributeList.append(attribute)
+
+ request = LinkUserProfileRequest(current_username=current_username, previous_username=previous_username,
+ linking_attributes=attributeList)
+ return self.user_stub.linkUserProfile(request, metadata=metadata)
+
+ except Exception:
+ logger.exception("Error occurred in update_user_profile, probably due to invalid parameters")
+ raise
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/utils/__init__.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/utils/__init__.py
new file mode 100644
index 0000000..e69de29
diff --git a/custos-client-sdks/custos-python-sdk/custos/clients/utils/certificate_fetching_rest_client.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/utils/certificate_fetching_rest_client.py
similarity index 93%
copy from custos-client-sdks/custos-python-sdk/custos/clients/utils/certificate_fetching_rest_client.py
copy to custos-client-sdks/custos-python-sdk/build/lib/custos/clients/utils/certificate_fetching_rest_client.py
index 247372f..ec58e8a 100644
--- a/custos-client-sdks/custos-python-sdk/custos/clients/utils/certificate_fetching_rest_client.py
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/utils/certificate_fetching_rest_client.py
@@ -29,7 +29,10 @@ import custos.clients.utils.utilities as utl
logger = logging.getLogger(__name__)
logger.setLevel(logging.DEBUG)
+import requests
+from requests.packages.urllib3.exceptions import InsecureRequestWarning
+requests.packages.urllib3.disable_warnings(InsecureRequestWarning)
class CertificateFetchingRestClient(object):
@@ -56,15 +59,9 @@ class CertificateFetchingRestClient(object):
r = requests.get(url=self.url, params=self.params, headers=self.header, stream=True, timeout=60, verify=False)
value = r.json()['value']
path = self.custos_settings.CUSTOS_CERT_PATH
- f = open(path, "w")
+ f = open(path, "w+")
f.write(value)
- try:
- with warnings.catch_warnings():
- warnings.simplefilter('ignore', InsecureRequestWarning)
- yield
- finally:
- f.close()
def __is_certificate_valid(self):
if os.path.isfile(self.custos_settings.CUSTOS_CERT_PATH):
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/utils/utilities.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/utils/utilities.py
new file mode 100644
index 0000000..7b42372
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/clients/utils/utilities.py
@@ -0,0 +1,8 @@
+from base64 import b64encode
+
+
+def get_token(custos_settings):
+ tokenStr = custos_settings.CUSTOS_CLIENT_ID + ":" + custos_settings.CUSTOS_CLIENT_SEC
+ tokenByte = tokenStr.encode('utf-8')
+ encodedBytes = b64encode(tokenByte)
+ return encodedBytes.decode('utf-8')
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/__init__.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/__init__.py
new file mode 100644
index 0000000..e69de29
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/agent_management_samples.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/agent_management_samples.py
new file mode 100644
index 0000000..52a0de5
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/agent_management_samples.py
@@ -0,0 +1,49 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+import logging
+from custos.clients.identity_management_client import IdentityManagementClient
+from custos.clients.agent_management_client import AgentManagementClient
+
+from custos.transport.settings import CustosServerClientSettings
+import custos.clients.utils.utilities as utl
+
+logger = logging.getLogger(__name__)
+
+logger.setLevel(logging.DEBUG)
+# create console handler with a higher log level
+handler = logging.StreamHandler()
+handler.setLevel(logging.DEBUG)
+
+custos_settings = CustosServerClientSettings()
+# load APIServerClient with default configuration
+client = AgentManagementClient(custos_settings)
+id_client = IdentityManagementClient(custos_settings)
+
+token = utl.get_token(custos_settings)
+
+
+def register_and_enable():
+ agent = {
+ "id": "agent-asdasda-ebnmvf",
+ "realm_roles": [],
+ "attributes": [{
+ "key": "agent_cluster_id",
+ "values": ["123123131"]
+ }]
+ }
+ id_res = id_client.token(token, username="isjarana", password="Custos1234", grant_type="password")
+ response = client.register_and_enable_agent(id_res['access_token'], agent)
+ print(response)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/group_management_samples.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/group_management_samples.py
new file mode 100644
index 0000000..586cce5
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/group_management_samples.py
@@ -0,0 +1,63 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+import logging
+from custos.clients.identity_management_client import IdentityManagementClient
+from custos.clients.group_management_client import GroupManagementClient
+
+from custos.transport.settings import CustosServerClientSettings
+import custos.clients.utils.utilities as utl
+
+logger = logging.getLogger(__name__)
+
+logger.setLevel(logging.DEBUG)
+# create console handler with a higher log level
+handler = logging.StreamHandler()
+handler.setLevel(logging.DEBUG)
+custos_settings = CustosServerClientSettings()
+# load APIServerClient with default configuration
+client = GroupManagementClient(custos_settings)
+id_client = IdentityManagementClient(custos_settings)
+
+token = utl.get_token(custos_settings)
+
+print(token)
+
+
+def create_group():
+ groups = [
+ {
+ "name": "testll",
+ "realm_roles": [],
+ "client_roles": [],
+ "attributes": [{
+ "key": "phone",
+ "values": ["8123915386"]
+ }],
+ "sub_groups": [{
+ "name": "testlj",
+ "realm_roles": [],
+ "client_roles": [],
+ "attributes": [{
+ "key": "email",
+ "values": ["irjanith@gmail.com"]
+ }],
+ "sub_groups": []
+ }]
+ }
+ ]
+ id_res = id_client.token(token, username="isjarana", password="Custos1234", grant_type="password")
+ response = client.create_groups(id_res['access_token'], groups)
+ print(response)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/identity_management_samples.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/identity_management_samples.py
new file mode 100644
index 0000000..eca9053
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/identity_management_samples.py
@@ -0,0 +1,70 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+import logging
+from custos.clients.identity_management_client import IdentityManagementClient
+from custos.transport.settings import CustosServerClientSettings
+import custos.clients.utils.utilities as utl
+
+logger = logging.getLogger(__name__)
+
+logger.setLevel(logging.DEBUG)
+# create console handler with a higher log level
+handler = logging.StreamHandler()
+handler.setLevel(logging.DEBUG)
+
+custos_settings = CustosServerClientSettings()
+# load IdentityManagementClient with default configuration
+client = IdentityManagementClient(custos_settings)
+
+main_token = utl.get_token(custos_settings)
+
+
+def authenticate():
+ response = client.authenticate(main_token, "isjarana", "Custos1234")
+ print(response)
+
+
+def is_authenticated():
+ access_token = client.authenticate(main_token, "issa", "1234")
+ response = client.is_authenticated(main_token, access_token.accessToken, "issa")
+ print(response)
+
+
+def get_user_management_access_token():
+ response = client.get_service_account_access_token(token)
+ print(response)
+
+
+def authorize():
+ response = client.authorize("custos-xgect9otrwawa8uwztym-10000006", "http://custos.lk", "code",
+ "openid email profile", "asdadasdewde")
+ print(response)
+
+
+def token():
+ response = client.token(main_token, "http://custos.lk", "asdasdasdadasd")
+ print(response)
+
+
+def get_credentials():
+ response = client.get_credentials(main_token, "custos-xgect9otrwawa8uwztym-10000006")
+ print(response)
+
+
+def get_OIDC_config():
+ response = client.get_oidc_configuration(main_token, "custos-pv3fqfs9z1hps0xily2t-10000000")
+ print(response)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/resource_secert_management.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/resource_secert_management.py
new file mode 100644
index 0000000..f2568cb
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/resource_secert_management.py
@@ -0,0 +1,80 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+import logging
+from custos.clients.user_management_client import UserManagementClient
+from custos.clients.identity_management_client import IdentityManagementClient
+from custos.clients.super_tenant_management_client import SuperTenantManagementClient
+from custos.clients.resource_secret_management_client import ResourceSecretManagementClient
+from google.protobuf.json_format import MessageToDict
+
+from custos.transport.settings import CustosServerClientSettings
+import custos.clients.utils.utilities as utl
+
+logger = logging.getLogger(__name__)
+
+logger.setLevel(logging.DEBUG)
+# create console handler with a higher log level
+handler = logging.StreamHandler()
+handler.setLevel(logging.DEBUG)
+
+custos_settings = CustosServerClientSettings()
+# load APIServerClient with default configuration
+client = UserManagementClient(custos_settings)
+id_client = IdentityManagementClient(custos_settings)
+resource_secret_client = ResourceSecretManagementClient(custos_settings)
+
+token = utl.get_token(custos_settings)
+
+admin_client = SuperTenantManagementClient(custos_settings)
+
+
+def user_login():
+ response = id_client.token(token=
+ token,
+ username="USERNAME",
+ password="PASSWORD",
+ grant_type="password")
+ dict_obj = MessageToDict(response)
+ return dict_obj['access_token']
+
+
+def setKVCredential():
+ token = user_login()
+ resp = resource_secret_client.set_KV_credential(token=token, user_token=token,
+ client_id='CHANGE_ME', key='Your key',
+ value='Your Value')
+ print(resp)
+
+
+def getKVCredential():
+ token = user_login()
+ resp = resource_secret_client.get_KV_credential(token=token, user_token=token,
+ client_id='CHANGE_ME', key='Your key')
+ print(resp)
+
+
+def updateKVCredential():
+ token = user_login()
+ resp = resource_secret_client.update_KV_credential(token=token, user_token=token,
+ client_id='CHANGE_ME', key='Your key')
+ print(resp)
+
+
+def deleteKVCredential():
+ token = user_login()
+ resp = resource_secret_client.delete_KV_credential(token=token, user_token=token,
+ client_id='CHANGE_ME', key='Your key')
+ print(resp)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/resources/__init__.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/resources/__init__.py
new file mode 100644
index 0000000..e69de29
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/resources/cert.pem b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/resources/cert.pem
new file mode 100644
index 0000000..2f3d403
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/resources/cert.pem
@@ -0,0 +1,31 @@
+-----BEGIN CERTIFICATE-----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+-----END CERTIFICATE-----
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/tenant_management_samples.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/tenant_management_samples.py
new file mode 100644
index 0000000..9502b45
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/tenant_management_samples.py
@@ -0,0 +1,95 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+import logging
+from custos.clients.tenant_management_client import TenantManagementClient
+from custos.clients.super_tenant_management_client import SuperTenantManagementClient
+from custos.clients.identity_management_client import IdentityManagementClient
+from custos.transport.settings import CustosServerClientSettings
+import custos.clients.utils.utilities as utl
+
+logger = logging.getLogger(__name__)
+
+logger.setLevel(logging.DEBUG)
+# create console handler with a higher log level
+handler = logging.StreamHandler()
+handler.setLevel(logging.DEBUG)
+
+custos_settings = CustosServerClientSettings()
+# load APIServerClient with default configuration
+client = TenantManagementClient(custos_settings)
+admin_client = SuperTenantManagementClient(custos_settings)
+id_client = IdentityManagementClient(custos_settings)
+
+token = utl.get_token(custos_settings)
+
+
+def create_tenant():
+ contacts = ["2345634324"]
+ redirect_uris = ["http://localhost:8080,http://localhost:8080/user/external_ids"]
+ response = client.create_admin_tenant("SAMPLE",
+ "XXX@iu.edu", "First Name", "LastName", "email", "admin",
+ "1234",
+ contacts, redirect_uris, "https://domain.org/",
+ "openid profile email org.cilogon.userinfo", "domain.org",
+ "https://domain.org/static/favicon.png", "Galaxy Portal")
+ print(response)
+
+
+def get_tenant():
+ client_id = "custos-8p4baddxvbiusmjorjch-10000401"
+ response = client.get_tenant(client_token=token, client_id=client_id)
+ print(response)
+
+
+def update_tenant():
+ client_id = "custos-6nwoqodstpe5mvcq09lh-10000101"
+ contacts = ["8123915386"]
+ redirect_uris = ["https://custos.scigap.org/callback ", "http://127.0.0.1:8000/auth/callback/",
+ "http://127.0.0.1:8000/"]
+ response = client.update_tenant(token, client_id, "Custos Portal",
+ "irjanith@gmail.com", "Isuru", "Ranawaka", "irjanith@gmail.com", "isjarana",
+ "Custos1234",
+ contacts, redirect_uris, "https://custos.scigap.org/",
+ "openid profile email org.cilogon.userinfo", "domain.org",
+ "https://custos.scigap.org/", "Custos Portal")
+ print(response)
+
+
+def add_tenant_roles():
+ roles = [{"name": "testing", "composite": False, "description": "testing realm"}]
+ response = client.add_tenant_roles(token, roles, False)
+ print(response)
+
+
+def add_protocol_mapper():
+ response = client.add_protocol_mapper(token, "phone_atr", "phone", "phone", "STRING", "USER_ATTRIBUTE", True, True,
+ True, False, False)
+ print(response)
+
+
+def get_child_tenants():
+ response = client.get_child_tenants(token, 0, 5, "ACTIVE")
+ print(response)
+
+
+def get_all_tenants():
+ response = admin_client.get_all_tenants(token, 0, 5, "ACTIVE")
+ print(response)
+
+
+def delete_tenant():
+ response = client.delete_tenant(token, "custos-pv3fqfs9z1hps0xily2t-10000000")
+ print(response)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/user_management_samples.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/user_management_samples.py
new file mode 100644
index 0000000..a7e3c81
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/samples/user_management_samples.py
@@ -0,0 +1,109 @@
+# Licensed to the Apache Software Foundation (ASF) under one or more
+# contributor license agreements. See the NOTICE file distributed with
+# this work for additional information regarding copyright ownership.
+# The ASF licenses this file to You under the Apache License, Version 2.0
+# (the "License"); you may not use this file except in compliance with
+# the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+import logging
+from custos.clients.user_management_client import UserManagementClient
+from custos.clients.identity_management_client import IdentityManagementClient
+from custos.clients.super_tenant_management_client import SuperTenantManagementClient
+
+from custos.transport.settings import CustosServerClientSettings
+import custos.clients.utils.utilities as utl
+
+logger = logging.getLogger(__name__)
+
+logger.setLevel(logging.DEBUG)
+# create console handler with a higher log level
+handler = logging.StreamHandler()
+handler.setLevel(logging.DEBUG)
+
+custos_settings = CustosServerClientSettings()
+# load APIServerClient with default configuration
+client = UserManagementClient(custos_settings)
+id_client = IdentityManagementClient(custos_settings)
+
+token = utl.get_token(custos_settings)
+
+admin_client = SuperTenantManagementClient(custos_settings)
+
+
+def register_user():
+ response = client.register_user(token, "TestingUser", "Jhon", "Smith", "12345", "jhon@iu.edu", True)
+ print(response)
+
+
+def register_and_enable_users():
+ response = id_client.authenticate(token, "isjarana", "Custos1234")
+
+ users = [
+ {
+ "username": "test123",
+ "first_name": "user1",
+ "last_name": "last",
+ "password": "1234",
+ "email": "irjanith1@gmail.com",
+ "temporary_password": True,
+ "realm_roles": [
+
+ ],
+ "client_roles": [
+
+ ],
+ "attributes": [
+
+ ]
+ }
+ ]
+
+ response = client.register_and_enable_users(response.accessToken, users)
+ print(response)
+
+
+def add_user_attributes():
+ response = id_client.authenticate(token, "isjarana", "Custos1234")
+ attributes = [
+ {
+ "key": "phone",
+ "values": ["8123915386"]
+ }
+ ]
+ users = ["janith"]
+ response = client.add_user_attributes(response.accessToken, attributes, users)
+ print(response)
+
+
+def delete_user_attributes():
+ response = id_client.authenticate(token, "isjarana", "Custos1234")
+ attributes = [
+ {
+ "key": "phone",
+ "values": ["8123915386"]
+ }
+ ]
+ users = ["janith"]
+ response = client.delete_user_attributes(response.accessToken, attributes, users)
+ print(response)
+
+
+def add_roles_to_user():
+ response = id_client.authenticate(token, "issa", "1234")
+ roles = ["testing"]
+ users = ["janith"]
+ response = client.add_roles_to_users(response.accessToken, users, roles, False)
+ print(response)
+
+
+def find_users():
+ response = client.find_users(token, 0, 3, username="isjarana")
+ print(response)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/__init__.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/__init__.py
new file mode 100644
index 0000000..e69de29
diff --git a/custos-client-sdks/custos-python-sdk/custos/server/core/AgentProfileService_pb2.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/AgentProfileService_pb2.py
similarity index 72%
copy from custos-client-sdks/custos-python-sdk/custos/server/core/AgentProfileService_pb2.py
copy to custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/AgentProfileService_pb2.py
index 48f05a2..31d01a9 100644
--- a/custos-client-sdks/custos-python-sdk/custos/server/core/AgentProfileService_pb2.py
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/AgentProfileService_pb2.py
@@ -1,7 +1,7 @@
# -*- coding: utf-8 -*-
# Generated by the protocol buffer compiler. DO NOT EDIT!
# source: AgentProfileService.proto
-
+"""Generated protocol buffer code."""
from google.protobuf.internal import enum_type_wrapper
from google.protobuf import descriptor as _descriptor
from google.protobuf import message as _message
@@ -18,8 +18,9 @@ DESCRIPTOR = _descriptor.FileDescriptor(
name='AgentProfileService.proto',
package='org.apache.custos.agent.profile.service',
syntax='proto3',
- serialized_options=b'P\001',
- serialized_pb=b'\n\x19\x41gentProfileService.proto\x12\'org.apache.custos.agent.profile.service\"\xe3\x01\n\x05\x41gent\x12\n\n\x02id\x18\x01 \x01(\t\x12\x44\n\x06status\x18\x02 \x01(\x0e\x32\x34.org.apache.custos.agent.profile.service.AgentStatus\x12\x12\n\ncreated_at\x18\x03 \x01(\x03\x12\x18\n\x10last_modified_at\x18\x04 \x01(\x03\x12\r\n\x05roles\x18\x05 \x03(\t\x12K\n\nattributes\x18\x06 \x03(\x0b\x32\x37.org.apache.custos.agent.profile.service.AgentAttribute\"8\n\x0e\x41gentAttri [...]
+ serialized_options=b'P\001Z\004./pb',
+ create_key=_descriptor._internal_create_key,
+ serialized_pb=b'\n\x19\x41gentProfileService.proto\x12\'org.apache.custos.agent.profile.service\"\xff\x01\n\x05\x41gent\x12\n\n\x02id\x18\x01 \x01(\t\x12\x44\n\x06status\x18\x02 \x01(\x0e\x32\x34.org.apache.custos.agent.profile.service.AgentStatus\x12\x12\n\ncreated_at\x18\x03 \x01(\x03\x12\x18\n\x10last_modified_at\x18\x04 \x01(\x03\x12\r\n\x05roles\x18\x05 \x03(\t\x12K\n\nattributes\x18\x06 \x03(\x0b\x32\x37.org.apache.custos.agent.profile.service.AgentAttribute\x12\x1a\n\x12\x61gent [...]
)
_AGENTSTATUS = _descriptor.EnumDescriptor(
@@ -27,20 +28,23 @@ _AGENTSTATUS = _descriptor.EnumDescriptor(
full_name='org.apache.custos.agent.profile.service.AgentStatus',
filename=None,
file=DESCRIPTOR,
+ create_key=_descriptor._internal_create_key,
values=[
_descriptor.EnumValueDescriptor(
name='ENABLED', index=0, number=0,
serialized_options=None,
- type=None),
+ type=None,
+ create_key=_descriptor._internal_create_key),
_descriptor.EnumValueDescriptor(
name='DISABLED', index=1, number=1,
serialized_options=None,
- type=None),
+ type=None,
+ create_key=_descriptor._internal_create_key),
],
containing_type=None,
serialized_options=None,
- serialized_start=490,
- serialized_end=530,
+ serialized_start=519,
+ serialized_end=559,
)
_sym_db.RegisterEnumDescriptor(_AGENTSTATUS)
@@ -56,6 +60,7 @@ _AGENT = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='id', full_name='org.apache.custos.agent.profile.service.Agent.id', index=0,
@@ -63,42 +68,49 @@ _AGENT = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='status', full_name='org.apache.custos.agent.profile.service.Agent.status', index=1,
number=2, type=14, cpp_type=8, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='created_at', full_name='org.apache.custos.agent.profile.service.Agent.created_at', index=2,
number=3, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='last_modified_at', full_name='org.apache.custos.agent.profile.service.Agent.last_modified_at', index=3,
number=4, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='roles', full_name='org.apache.custos.agent.profile.service.Agent.roles', index=4,
number=5, type=9, cpp_type=9, label=3,
has_default_value=False, default_value=[],
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='attributes', full_name='org.apache.custos.agent.profile.service.Agent.attributes', index=5,
number=6, type=11, cpp_type=10, label=3,
has_default_value=False, default_value=[],
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='agent_client_roles', full_name='org.apache.custos.agent.profile.service.Agent.agent_client_roles', index=6,
+ number=8, type=9, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -112,7 +124,7 @@ _AGENT = _descriptor.Descriptor(
oneofs=[
],
serialized_start=71,
- serialized_end=298,
+ serialized_end=326,
)
@@ -122,6 +134,7 @@ _AGENTATTRIBUTE = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='id', full_name='org.apache.custos.agent.profile.service.AgentAttribute.id', index=0,
@@ -129,21 +142,21 @@ _AGENTATTRIBUTE = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='key', full_name='org.apache.custos.agent.profile.service.AgentAttribute.key', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='value', full_name='org.apache.custos.agent.profile.service.AgentAttribute.value', index=2,
number=3, type=9, cpp_type=9, label=3,
has_default_value=False, default_value=[],
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -156,8 +169,8 @@ _AGENTATTRIBUTE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=300,
- serialized_end=356,
+ serialized_start=328,
+ serialized_end=384,
)
@@ -167,21 +180,22 @@ _AGENTREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.agent.profile.service.AgentRequest.tenantId', index=0,
+ name='tenant_id', full_name='org.apache.custos.agent.profile.service.AgentRequest.tenant_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='agent', full_name='org.apache.custos.agent.profile.service.AgentRequest.agent', index=1,
number=2, type=11, cpp_type=10, label=1,
has_default_value=False, default_value=None,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -194,8 +208,8 @@ _AGENTREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=358,
- serialized_end=453,
+ serialized_start=386,
+ serialized_end=482,
)
@@ -205,6 +219,7 @@ _OPERATIONSTATUS = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='status', full_name='org.apache.custos.agent.profile.service.OperationStatus.status', index=0,
@@ -212,7 +227,7 @@ _OPERATIONSTATUS = _descriptor.Descriptor(
has_default_value=False, default_value=False,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -225,8 +240,8 @@ _OPERATIONSTATUS = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=455,
- serialized_end=488,
+ serialized_start=484,
+ serialized_end=517,
)
_AGENT.fields_by_name['status'].enum_type = _AGENTSTATUS
@@ -276,8 +291,9 @@ _AGENTPROFILESERVICE = _descriptor.ServiceDescriptor(
file=DESCRIPTOR,
index=0,
serialized_options=None,
- serialized_start=533,
- serialized_end=1033,
+ create_key=_descriptor._internal_create_key,
+ serialized_start=562,
+ serialized_end=1062,
methods=[
_descriptor.MethodDescriptor(
name='createAgent',
@@ -287,6 +303,7 @@ _AGENTPROFILESERVICE = _descriptor.ServiceDescriptor(
input_type=_AGENTREQUEST,
output_type=_AGENT,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='updateAgent',
@@ -296,6 +313,7 @@ _AGENTPROFILESERVICE = _descriptor.ServiceDescriptor(
input_type=_AGENTREQUEST,
output_type=_AGENT,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='deleteAgent',
@@ -305,6 +323,7 @@ _AGENTPROFILESERVICE = _descriptor.ServiceDescriptor(
input_type=_AGENTREQUEST,
output_type=_OPERATIONSTATUS,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getAgent',
@@ -314,6 +333,7 @@ _AGENTPROFILESERVICE = _descriptor.ServiceDescriptor(
input_type=_AGENTREQUEST,
output_type=_AGENT,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
])
_sym_db.RegisterServiceDescriptor(_AGENTPROFILESERVICE)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/AgentProfileService_pb2_grpc.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/AgentProfileService_pb2_grpc.py
new file mode 100644
index 0000000..dd0ce30
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/AgentProfileService_pb2_grpc.py
@@ -0,0 +1,182 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements. See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership. The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing,
+# software distributed under the License is distributed on an
+# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+# KIND, either express or implied. See the License for the
+# specific language governing permissions and limitations
+# under the License.
+
+# Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT!
+"""Client and server classes corresponding to protobuf-defined services."""
+import grpc
+
+import custos.server.core.AgentProfileService_pb2 as AgentProfileService__pb2
+
+
+class AgentProfileServiceStub(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def __init__(self, channel):
+ """Constructor.
+
+ Args:
+ channel: A grpc.Channel.
+ """
+ self.createAgent = channel.unary_unary(
+ '/org.apache.custos.agent.profile.service.AgentProfileService/createAgent',
+ request_serializer=AgentProfileService__pb2.AgentRequest.SerializeToString,
+ response_deserializer=AgentProfileService__pb2.Agent.FromString,
+ )
+ self.updateAgent = channel.unary_unary(
+ '/org.apache.custos.agent.profile.service.AgentProfileService/updateAgent',
+ request_serializer=AgentProfileService__pb2.AgentRequest.SerializeToString,
+ response_deserializer=AgentProfileService__pb2.Agent.FromString,
+ )
+ self.deleteAgent = channel.unary_unary(
+ '/org.apache.custos.agent.profile.service.AgentProfileService/deleteAgent',
+ request_serializer=AgentProfileService__pb2.AgentRequest.SerializeToString,
+ response_deserializer=AgentProfileService__pb2.OperationStatus.FromString,
+ )
+ self.getAgent = channel.unary_unary(
+ '/org.apache.custos.agent.profile.service.AgentProfileService/getAgent',
+ request_serializer=AgentProfileService__pb2.AgentRequest.SerializeToString,
+ response_deserializer=AgentProfileService__pb2.Agent.FromString,
+ )
+
+
+class AgentProfileServiceServicer(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def createAgent(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def updateAgent(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def deleteAgent(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getAgent(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+
+def add_AgentProfileServiceServicer_to_server(servicer, server):
+ rpc_method_handlers = {
+ 'createAgent': grpc.unary_unary_rpc_method_handler(
+ servicer.createAgent,
+ request_deserializer=AgentProfileService__pb2.AgentRequest.FromString,
+ response_serializer=AgentProfileService__pb2.Agent.SerializeToString,
+ ),
+ 'updateAgent': grpc.unary_unary_rpc_method_handler(
+ servicer.updateAgent,
+ request_deserializer=AgentProfileService__pb2.AgentRequest.FromString,
+ response_serializer=AgentProfileService__pb2.Agent.SerializeToString,
+ ),
+ 'deleteAgent': grpc.unary_unary_rpc_method_handler(
+ servicer.deleteAgent,
+ request_deserializer=AgentProfileService__pb2.AgentRequest.FromString,
+ response_serializer=AgentProfileService__pb2.OperationStatus.SerializeToString,
+ ),
+ 'getAgent': grpc.unary_unary_rpc_method_handler(
+ servicer.getAgent,
+ request_deserializer=AgentProfileService__pb2.AgentRequest.FromString,
+ response_serializer=AgentProfileService__pb2.Agent.SerializeToString,
+ ),
+ }
+ generic_handler = grpc.method_handlers_generic_handler(
+ 'org.apache.custos.agent.profile.service.AgentProfileService', rpc_method_handlers)
+ server.add_generic_rpc_handlers((generic_handler,))
+
+
+ # This class is part of an EXPERIMENTAL API.
+class AgentProfileService(object):
+ """Missing associated documentation comment in .proto file."""
+
+ @staticmethod
+ def createAgent(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.agent.profile.service.AgentProfileService/createAgent',
+ AgentProfileService__pb2.AgentRequest.SerializeToString,
+ AgentProfileService__pb2.Agent.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def updateAgent(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.agent.profile.service.AgentProfileService/updateAgent',
+ AgentProfileService__pb2.AgentRequest.SerializeToString,
+ AgentProfileService__pb2.Agent.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def deleteAgent(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.agent.profile.service.AgentProfileService/deleteAgent',
+ AgentProfileService__pb2.AgentRequest.SerializeToString,
+ AgentProfileService__pb2.OperationStatus.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getAgent(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.agent.profile.service.AgentProfileService/getAgent',
+ AgentProfileService__pb2.AgentRequest.SerializeToString,
+ AgentProfileService__pb2.Agent.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/ClusterManagementService_pb2.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/ClusterManagementService_pb2.py
new file mode 100644
index 0000000..0b196b2
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/ClusterManagementService_pb2.py
@@ -0,0 +1,139 @@
+# -*- coding: utf-8 -*-
+# Generated by the protocol buffer compiler. DO NOT EDIT!
+# source: ClusterManagementService.proto
+
+from google.protobuf import descriptor as _descriptor
+from google.protobuf import message as _message
+from google.protobuf import reflection as _reflection
+from google.protobuf import symbol_database as _symbol_database
+# @@protoc_insertion_point(imports)
+
+_sym_db = _symbol_database.Default()
+
+
+
+
+DESCRIPTOR = _descriptor.FileDescriptor(
+ name='ClusterManagementService.proto',
+ package='org.apache.custos.cluster.management.service',
+ syntax='proto3',
+ serialized_options=b'P\001',
+ serialized_pb=b'\n\x1e\x43lusterManagementService.proto\x12,org.apache.custos.cluster.management.service\"D\n\x1bGetServerCertificateRequest\x12\x12\n\nsecretName\x18\x01 \x01(\t\x12\x11\n\tnamespace\x18\x02 \x01(\t\"3\n\x1cGetServerCertificateResponse\x12\x13\n\x0b\x63\x65rtificate\x18\x01 \x01(\t2\xd0\x01\n\x18\x43lusterManagementService\x12\xb3\x01\n\x1agetCustosServerCertificate\x12I.org.apache.custos.cluster.management.service.GetServerCertificateRequest\x1aJ.org.apache.custos.clu [...]
+)
+
+
+
+
+_GETSERVERCERTIFICATEREQUEST = _descriptor.Descriptor(
+ name='GetServerCertificateRequest',
+ full_name='org.apache.custos.cluster.management.service.GetServerCertificateRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='secretName', full_name='org.apache.custos.cluster.management.service.GetServerCertificateRequest.secretName', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR),
+ _descriptor.FieldDescriptor(
+ name='namespace', full_name='org.apache.custos.cluster.management.service.GetServerCertificateRequest.namespace', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=80,
+ serialized_end=148,
+)
+
+
+_GETSERVERCERTIFICATERESPONSE = _descriptor.Descriptor(
+ name='GetServerCertificateResponse',
+ full_name='org.apache.custos.cluster.management.service.GetServerCertificateResponse',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='certificate', full_name='org.apache.custos.cluster.management.service.GetServerCertificateResponse.certificate', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=150,
+ serialized_end=201,
+)
+
+DESCRIPTOR.message_types_by_name['GetServerCertificateRequest'] = _GETSERVERCERTIFICATEREQUEST
+DESCRIPTOR.message_types_by_name['GetServerCertificateResponse'] = _GETSERVERCERTIFICATERESPONSE
+_sym_db.RegisterFileDescriptor(DESCRIPTOR)
+
+GetServerCertificateRequest = _reflection.GeneratedProtocolMessageType('GetServerCertificateRequest', (_message.Message,), {
+ 'DESCRIPTOR' : _GETSERVERCERTIFICATEREQUEST,
+ '__module__' : 'ClusterManagementService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.cluster.management.service.GetServerCertificateRequest)
+ })
+_sym_db.RegisterMessage(GetServerCertificateRequest)
+
+GetServerCertificateResponse = _reflection.GeneratedProtocolMessageType('GetServerCertificateResponse', (_message.Message,), {
+ 'DESCRIPTOR' : _GETSERVERCERTIFICATERESPONSE,
+ '__module__' : 'ClusterManagementService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.cluster.management.service.GetServerCertificateResponse)
+ })
+_sym_db.RegisterMessage(GetServerCertificateResponse)
+
+
+DESCRIPTOR._options = None
+
+_CLUSTERMANAGEMENTSERVICE = _descriptor.ServiceDescriptor(
+ name='ClusterManagementService',
+ full_name='org.apache.custos.cluster.management.service.ClusterManagementService',
+ file=DESCRIPTOR,
+ index=0,
+ serialized_options=None,
+ serialized_start=204,
+ serialized_end=412,
+ methods=[
+ _descriptor.MethodDescriptor(
+ name='getCustosServerCertificate',
+ full_name='org.apache.custos.cluster.management.service.ClusterManagementService.getCustosServerCertificate',
+ index=0,
+ containing_service=None,
+ input_type=_GETSERVERCERTIFICATEREQUEST,
+ output_type=_GETSERVERCERTIFICATERESPONSE,
+ serialized_options=None,
+ ),
+])
+_sym_db.RegisterServiceDescriptor(_CLUSTERMANAGEMENTSERVICE)
+
+DESCRIPTOR.services_by_name['ClusterManagementService'] = _CLUSTERMANAGEMENTSERVICE
+
+# @@protoc_insertion_point(module_scope)
diff --git a/custos-client-sdks/custos-python-sdk/custos/server/core/ClusterManagementService_pb2_grpc.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/ClusterManagementService_pb2_grpc.py
similarity index 95%
copy from custos-client-sdks/custos-python-sdk/custos/server/core/ClusterManagementService_pb2_grpc.py
copy to custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/ClusterManagementService_pb2_grpc.py
index 820f6be..8cf201c 100644
--- a/custos-client-sdks/custos-python-sdk/custos/server/core/ClusterManagementService_pb2_grpc.py
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/ClusterManagementService_pb2_grpc.py
@@ -1,7 +1,7 @@
# Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT!
import grpc
-import ClusterManagementService_pb2 as ClusterManagementService__pb2
+import custos.server.core.ClusterManagementService_pb2 as ClusterManagementService__pb2
class ClusterManagementServiceStub(object):
diff --git a/custos-client-sdks/custos-python-sdk/custos/server/core/CredentialStoreService_pb2.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/CredentialStoreService_pb2.py
similarity index 68%
copy from custos-client-sdks/custos-python-sdk/custos/server/core/CredentialStoreService_pb2.py
copy to custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/CredentialStoreService_pb2.py
index d951299..4428782 100644
--- a/custos-client-sdks/custos-python-sdk/custos/server/core/CredentialStoreService_pb2.py
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/CredentialStoreService_pb2.py
@@ -1,7 +1,7 @@
# -*- coding: utf-8 -*-
# Generated by the protocol buffer compiler. DO NOT EDIT!
# source: CredentialStoreService.proto
-
+"""Generated protocol buffer code."""
from google.protobuf.internal import enum_type_wrapper
from google.protobuf import descriptor as _descriptor
from google.protobuf import message as _message
@@ -18,8 +18,9 @@ DESCRIPTOR = _descriptor.FileDescriptor(
name='CredentialStoreService.proto',
package='org.apache.custos.credential.store.service',
syntax='proto3',
- serialized_options=b'P\001',
- serialized_pb=b'\n\x1c\x43redentialStoreService.proto\x12*org.apache.custos.credential.store.service\"\xfb\x01\n\x12\x43redentialMetadata\x12\x0f\n\x07ownerId\x18\x01 \x01(\x03\x12\n\n\x02id\x18\x02 \x01(\t\x12\x0e\n\x06secret\x18\x03 \x01(\t\x12\x1d\n\x15\x63lientSecretExpiredAt\x18\x04 \x01(\x03\x12\x18\n\x10\x63lientIdIssuedAt\x18\x05 \x01(\x03\x12>\n\x04type\x18\x06 \x01(\x0e\x32\x30.org.apache.custos.credential.store.service.Type\x12\x14\n\x0csuper_tenant\x18\x07 \x01(\x08\x12\x13 [...]
+ serialized_options=b'P\001Z\004./pb',
+ create_key=_descriptor._internal_create_key,
+ serialized_pb=b'\n\x1c\x43redentialStoreService.proto\x12*org.apache.custos.credential.store.service\"\x82\x02\n\x12\x43redentialMetadata\x12\x10\n\x08owner_id\x18\x01 \x01(\x03\x12\n\n\x02id\x18\x02 \x01(\t\x12\x0e\n\x06secret\x18\x03 \x01(\t\x12 \n\x18\x63lient_secret_expired_at\x18\x04 \x01(\x03\x12\x1b\n\x13\x63lient_id_issued_at\x18\x05 \x01(\x03\x12>\n\x04type\x18\x06 \x01(\x0e\x32\x30.org.apache.custos.credential.store.service.Type\x12\x14\n\x0csuper_tenant\x18\x07 \x01(\x08\x12 [...]
)
_TYPE = _descriptor.EnumDescriptor(
@@ -27,36 +28,43 @@ _TYPE = _descriptor.EnumDescriptor(
full_name='org.apache.custos.credential.store.service.Type',
filename=None,
file=DESCRIPTOR,
+ create_key=_descriptor._internal_create_key,
values=[
_descriptor.EnumValueDescriptor(
name='CUSTOS', index=0, number=0,
serialized_options=None,
- type=None),
+ type=None,
+ create_key=_descriptor._internal_create_key),
_descriptor.EnumValueDescriptor(
name='IAM', index=1, number=1,
serialized_options=None,
- type=None),
+ type=None,
+ create_key=_descriptor._internal_create_key),
_descriptor.EnumValueDescriptor(
name='CILOGON', index=2, number=2,
serialized_options=None,
- type=None),
+ type=None,
+ create_key=_descriptor._internal_create_key),
_descriptor.EnumValueDescriptor(
name='INDIVIDUAL', index=3, number=3,
serialized_options=None,
- type=None),
+ type=None,
+ create_key=_descriptor._internal_create_key),
_descriptor.EnumValueDescriptor(
name='AGENT_CLIENT', index=4, number=4,
serialized_options=None,
- type=None),
+ type=None,
+ create_key=_descriptor._internal_create_key),
_descriptor.EnumValueDescriptor(
name='AGENT', index=5, number=5,
serialized_options=None,
- type=None),
+ type=None,
+ create_key=_descriptor._internal_create_key),
],
containing_type=None,
serialized_options=None,
- serialized_start=1556,
- serialized_end=1641,
+ serialized_start=1578,
+ serialized_end=1663,
)
_sym_db.RegisterEnumDescriptor(_TYPE)
@@ -76,70 +84,71 @@ _CREDENTIALMETADATA = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='ownerId', full_name='org.apache.custos.credential.store.service.CredentialMetadata.ownerId', index=0,
+ name='owner_id', full_name='org.apache.custos.credential.store.service.CredentialMetadata.owner_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='id', full_name='org.apache.custos.credential.store.service.CredentialMetadata.id', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='secret', full_name='org.apache.custos.credential.store.service.CredentialMetadata.secret', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientSecretExpiredAt', full_name='org.apache.custos.credential.store.service.CredentialMetadata.clientSecretExpiredAt', index=3,
+ name='client_secret_expired_at', full_name='org.apache.custos.credential.store.service.CredentialMetadata.client_secret_expired_at', index=3,
number=4, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientIdIssuedAt', full_name='org.apache.custos.credential.store.service.CredentialMetadata.clientIdIssuedAt', index=4,
+ name='client_id_issued_at', full_name='org.apache.custos.credential.store.service.CredentialMetadata.client_id_issued_at', index=4,
number=5, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='type', full_name='org.apache.custos.credential.store.service.CredentialMetadata.type', index=5,
number=6, type=14, cpp_type=8, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='super_tenant', full_name='org.apache.custos.credential.store.service.CredentialMetadata.super_tenant', index=6,
number=7, type=8, cpp_type=7, label=1,
has_default_value=False, default_value=False,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='super_admin', full_name='org.apache.custos.credential.store.service.CredentialMetadata.super_admin', index=7,
number=8, type=8, cpp_type=7, label=1,
has_default_value=False, default_value=False,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='internal_sec', full_name='org.apache.custos.credential.store.service.CredentialMetadata.internal_sec', index=8,
number=11, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -153,7 +162,7 @@ _CREDENTIALMETADATA = _descriptor.Descriptor(
oneofs=[
],
serialized_start=77,
- serialized_end=328,
+ serialized_end=335,
)
@@ -163,6 +172,7 @@ _GETCREDENTIALREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='ownerId', full_name='org.apache.custos.credential.store.service.GetCredentialRequest.ownerId', index=0,
@@ -170,21 +180,21 @@ _GETCREDENTIALREQUEST = _descriptor.Descriptor(
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='id', full_name='org.apache.custos.credential.store.service.GetCredentialRequest.id', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='type', full_name='org.apache.custos.credential.store.service.GetCredentialRequest.type', index=2,
number=3, type=14, cpp_type=8, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -197,8 +207,8 @@ _GETCREDENTIALREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=330,
- serialized_end=445,
+ serialized_start=337,
+ serialized_end=452,
)
@@ -208,6 +218,7 @@ _GETALLCREDENTIALSREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='ownerId', full_name='org.apache.custos.credential.store.service.GetAllCredentialsRequest.ownerId', index=0,
@@ -215,7 +226,7 @@ _GETALLCREDENTIALSREQUEST = _descriptor.Descriptor(
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -228,8 +239,8 @@ _GETALLCREDENTIALSREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=447,
- serialized_end=490,
+ serialized_start=454,
+ serialized_end=497,
)
@@ -239,28 +250,29 @@ _GETALLCREDENTIALSRESPONSE = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='secretList', full_name='org.apache.custos.credential.store.service.GetAllCredentialsResponse.secretList', index=0,
+ name='secret_list', full_name='org.apache.custos.credential.store.service.GetAllCredentialsResponse.secret_list', index=0,
number=1, type=11, cpp_type=10, label=3,
has_default_value=False, default_value=[],
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='requesterUserEmail', full_name='org.apache.custos.credential.store.service.GetAllCredentialsResponse.requesterUserEmail', index=1,
+ name='requester_user_email', full_name='org.apache.custos.credential.store.service.GetAllCredentialsResponse.requester_user_email', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='requesterUsername', full_name='org.apache.custos.credential.store.service.GetAllCredentialsResponse.requesterUsername', index=2,
+ name='requester_username', full_name='org.apache.custos.credential.store.service.GetAllCredentialsResponse.requester_username', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -273,8 +285,8 @@ _GETALLCREDENTIALSRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=493,
- serialized_end=659,
+ serialized_start=500,
+ serialized_end=670,
)
@@ -284,6 +296,7 @@ _OPERATIONSTATUS = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='state', full_name='org.apache.custos.credential.store.service.OperationStatus.state', index=0,
@@ -291,7 +304,7 @@ _OPERATIONSTATUS = _descriptor.Descriptor(
has_default_value=False, default_value=False,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -304,8 +317,8 @@ _OPERATIONSTATUS = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=661,
- serialized_end=693,
+ serialized_start=672,
+ serialized_end=704,
)
@@ -315,21 +328,22 @@ _DELETECREDENTIALREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='ownerId', full_name='org.apache.custos.credential.store.service.DeleteCredentialRequest.ownerId', index=0,
+ name='owner_id', full_name='org.apache.custos.credential.store.service.DeleteCredentialRequest.owner_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='type', full_name='org.apache.custos.credential.store.service.DeleteCredentialRequest.type', index=1,
number=2, type=14, cpp_type=8, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -342,8 +356,8 @@ _DELETECREDENTIALREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=695,
- serialized_end=801,
+ serialized_start=706,
+ serialized_end=813,
)
@@ -353,14 +367,15 @@ _GETOPERATIONSMETADATAREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='traceId', full_name='org.apache.custos.credential.store.service.GetOperationsMetadataRequest.traceId', index=0,
+ name='trace_id', full_name='org.apache.custos.credential.store.service.GetOperationsMetadataRequest.trace_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -373,8 +388,8 @@ _GETOPERATIONSMETADATAREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=803,
- serialized_end=850,
+ serialized_start=815,
+ serialized_end=863,
)
@@ -384,6 +399,7 @@ _OPERATIONMETADATA = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='event', full_name='org.apache.custos.credential.store.service.OperationMetadata.event', index=0,
@@ -391,28 +407,28 @@ _OPERATIONMETADATA = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='status', full_name='org.apache.custos.credential.store.service.OperationMetadata.status', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='timeStamp', full_name='org.apache.custos.credential.store.service.OperationMetadata.timeStamp', index=2,
+ name='time_stamp', full_name='org.apache.custos.credential.store.service.OperationMetadata.time_stamp', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='performedBy', full_name='org.apache.custos.credential.store.service.OperationMetadata.performedBy', index=3,
+ name='performed_by', full_name='org.apache.custos.credential.store.service.OperationMetadata.performed_by', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -425,8 +441,8 @@ _OPERATIONMETADATA = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=852,
- serialized_end=942,
+ serialized_start=865,
+ serialized_end=957,
)
@@ -436,6 +452,7 @@ _GETOPERATIONSMETADATARESPONSE = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='metadata', full_name='org.apache.custos.credential.store.service.GetOperationsMetadataResponse.metadata', index=0,
@@ -443,7 +460,7 @@ _GETOPERATIONSMETADATARESPONSE = _descriptor.Descriptor(
has_default_value=False, default_value=[],
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -456,8 +473,8 @@ _GETOPERATIONSMETADATARESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=944,
- serialized_end=1056,
+ serialized_start=959,
+ serialized_end=1071,
)
@@ -467,21 +484,22 @@ _GETNEWCUSTOSCREDENTIALREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='ownerId', full_name='org.apache.custos.credential.store.service.GetNewCustosCredentialRequest.ownerId', index=0,
+ name='owner_id', full_name='org.apache.custos.credential.store.service.GetNewCustosCredentialRequest.owner_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='performedBy', full_name='org.apache.custos.credential.store.service.GetNewCustosCredentialRequest.performedBy', index=1,
+ name='performed_by', full_name='org.apache.custos.credential.store.service.GetNewCustosCredentialRequest.performed_by', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -494,8 +512,8 @@ _GETNEWCUSTOSCREDENTIALREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1058,
- serialized_end=1127,
+ serialized_start=1073,
+ serialized_end=1144,
)
@@ -505,21 +523,22 @@ _GETNEWCUSTOSCREDENTIALRESPONSE = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='clientId', full_name='org.apache.custos.credential.store.service.GetNewCustosCredentialResponse.clientId', index=0,
+ name='client_id', full_name='org.apache.custos.credential.store.service.GetNewCustosCredentialResponse.client_id', index=0,
number=1, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientSecret', full_name='org.apache.custos.credential.store.service.GetNewCustosCredentialResponse.clientSecret', index=1,
+ name='client_secret', full_name='org.apache.custos.credential.store.service.GetNewCustosCredentialResponse.client_secret', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -532,8 +551,8 @@ _GETNEWCUSTOSCREDENTIALRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1129,
- serialized_end=1201,
+ serialized_start=1146,
+ serialized_end=1220,
)
@@ -543,6 +562,7 @@ _TOKENREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='token', full_name='org.apache.custos.credential.store.service.TokenRequest.token', index=0,
@@ -550,14 +570,14 @@ _TOKENREQUEST = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='parentClientId', full_name='org.apache.custos.credential.store.service.TokenRequest.parentClientId', index=1,
+ name='parent_client_id', full_name='org.apache.custos.credential.store.service.TokenRequest.parent_client_id', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -570,8 +590,8 @@ _TOKENREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1203,
- serialized_end=1256,
+ serialized_start=1222,
+ serialized_end=1277,
)
@@ -581,14 +601,15 @@ _GETOWNERIDRESPONSE = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='ownerId', full_name='org.apache.custos.credential.store.service.GetOwnerIdResponse.ownerId', index=0,
+ name='owner_id', full_name='org.apache.custos.credential.store.service.GetOwnerIdResponse.owner_id', index=0,
number=2, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -601,8 +622,8 @@ _GETOWNERIDRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1258,
- serialized_end=1295,
+ serialized_start=1279,
+ serialized_end=1317,
)
@@ -612,6 +633,7 @@ _CREDENTIALS = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='iam_client_id', full_name='org.apache.custos.credential.store.service.Credentials.iam_client_id', index=0,
@@ -619,56 +641,56 @@ _CREDENTIALS = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='iam_client_secret', full_name='org.apache.custos.credential.store.service.Credentials.iam_client_secret', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='ci_logon_client_id', full_name='org.apache.custos.credential.store.service.Credentials.ci_logon_client_id', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='ci_logon_client_secret', full_name='org.apache.custos.credential.store.service.Credentials.ci_logon_client_secret', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='custos_client_id', full_name='org.apache.custos.credential.store.service.Credentials.custos_client_id', index=4,
number=5, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='custos_client_secret', full_name='org.apache.custos.credential.store.service.Credentials.custos_client_secret', index=5,
number=6, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='custos_client_id_issued_at', full_name='org.apache.custos.credential.store.service.Credentials.custos_client_id_issued_at', index=6,
number=7, type=1, cpp_type=5, label=1,
has_default_value=False, default_value=float(0),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='custos_client_secret_expired_at', full_name='org.apache.custos.credential.store.service.Credentials.custos_client_secret_expired_at', index=7,
number=8, type=1, cpp_type=5, label=1,
has_default_value=False, default_value=float(0),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -681,13 +703,13 @@ _CREDENTIALS = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1298,
- serialized_end=1554,
+ serialized_start=1320,
+ serialized_end=1576,
)
_CREDENTIALMETADATA.fields_by_name['type'].enum_type = _TYPE
_GETCREDENTIALREQUEST.fields_by_name['type'].enum_type = _TYPE
-_GETALLCREDENTIALSRESPONSE.fields_by_name['secretList'].message_type = _CREDENTIALMETADATA
+_GETALLCREDENTIALSRESPONSE.fields_by_name['secret_list'].message_type = _CREDENTIALMETADATA
_DELETECREDENTIALREQUEST.fields_by_name['type'].enum_type = _TYPE
_GETOPERATIONSMETADATARESPONSE.fields_by_name['metadata'].message_type = _OPERATIONMETADATA
DESCRIPTOR.message_types_by_name['CredentialMetadata'] = _CREDENTIALMETADATA
@@ -814,8 +836,9 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
file=DESCRIPTOR,
index=0,
serialized_options=None,
- serialized_start=1644,
- serialized_end=4487,
+ create_key=_descriptor._internal_create_key,
+ serialized_start=1666,
+ serialized_end=4654,
methods=[
_descriptor.MethodDescriptor(
name='putCredential',
@@ -825,6 +848,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_CREDENTIALMETADATA,
output_type=_OPERATIONSTATUS,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='deleteCredential',
@@ -834,6 +858,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_DELETECREDENTIALREQUEST,
output_type=_OPERATIONSTATUS,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getCredential',
@@ -843,6 +868,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_GETCREDENTIALREQUEST,
output_type=_CREDENTIALMETADATA,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getAllCredentials',
@@ -852,6 +878,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_GETALLCREDENTIALSREQUEST,
output_type=_GETALLCREDENTIALSRESPONSE,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getOperationMetadata',
@@ -861,6 +888,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_GETOPERATIONSMETADATAREQUEST,
output_type=_GETOPERATIONSMETADATARESPONSE,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getNewCustosCredential',
@@ -870,6 +898,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_GETNEWCUSTOSCREDENTIALREQUEST,
output_type=_CREDENTIALMETADATA,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getOwnerIdFromToken',
@@ -879,6 +908,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_TOKENREQUEST,
output_type=_GETOWNERIDRESPONSE,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getCustosCredentialFromToken',
@@ -888,6 +918,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_TOKENREQUEST,
output_type=_CREDENTIALMETADATA,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getCustosCredentialFromClientId',
@@ -897,6 +928,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_GETCREDENTIALREQUEST,
output_type=_CREDENTIALMETADATA,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getAllCredentialsFromToken',
@@ -906,6 +938,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_TOKENREQUEST,
output_type=_GETALLCREDENTIALSRESPONSE,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getMasterCredentials',
@@ -915,6 +948,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_GETCREDENTIALREQUEST,
output_type=_GETALLCREDENTIALSRESPONSE,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getAllCredentialsFromJWTToken',
@@ -924,6 +958,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_TOKENREQUEST,
output_type=_GETALLCREDENTIALSRESPONSE,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getBasicCredentials',
@@ -933,6 +968,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_TOKENREQUEST,
output_type=_CREDENTIALS,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='createAgentCredential',
@@ -942,6 +978,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_CREDENTIALMETADATA,
output_type=_CREDENTIALMETADATA,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getAgentCredential',
@@ -951,6 +988,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_GETCREDENTIALREQUEST,
output_type=_CREDENTIALMETADATA,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='deleteAgentCredential',
@@ -960,6 +998,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_CREDENTIALMETADATA,
output_type=_OPERATIONSTATUS,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getCredentialByAgentBasicAuth',
@@ -969,6 +1008,7 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_TOKENREQUEST,
output_type=_GETALLCREDENTIALSRESPONSE,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getCredentialByAgentJWTToken',
@@ -978,6 +1018,17 @@ _CREDENTIALSTORESERVICE = _descriptor.ServiceDescriptor(
input_type=_TOKENREQUEST,
output_type=_GETALLCREDENTIALSRESPONSE,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='validateAgentJWTToken',
+ full_name='org.apache.custos.credential.store.service.CredentialStoreService.validateAgentJWTToken',
+ index=18,
+ containing_service=None,
+ input_type=_TOKENREQUEST,
+ output_type=_OPERATIONSTATUS,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
])
_sym_db.RegisterServiceDescriptor(_CREDENTIALSTORESERVICE)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/CredentialStoreService_pb2_grpc.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/CredentialStoreService_pb2_grpc.py
new file mode 100644
index 0000000..cb975e5
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/CredentialStoreService_pb2_grpc.py
@@ -0,0 +1,677 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements. See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership. The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing,
+# software distributed under the License is distributed on an
+# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+# KIND, either express or implied. See the License for the
+# specific language governing permissions and limitations
+# under the License.
+
+# Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT!
+"""Client and server classes corresponding to protobuf-defined services."""
+import grpc
+
+import custos.server.core.CredentialStoreService_pb2 as CredentialStoreService__pb2
+
+
+class CredentialStoreServiceStub(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def __init__(self, channel):
+ """Constructor.
+
+ Args:
+ channel: A grpc.Channel.
+ """
+ self.putCredential = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/putCredential',
+ request_serializer=CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.OperationStatus.FromString,
+ )
+ self.deleteCredential = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/deleteCredential',
+ request_serializer=CredentialStoreService__pb2.DeleteCredentialRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.OperationStatus.FromString,
+ )
+ self.getCredential = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getCredential',
+ request_serializer=CredentialStoreService__pb2.GetCredentialRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.CredentialMetadata.FromString,
+ )
+ self.getAllCredentials = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getAllCredentials',
+ request_serializer=CredentialStoreService__pb2.GetAllCredentialsRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ )
+ self.getOperationMetadata = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getOperationMetadata',
+ request_serializer=CredentialStoreService__pb2.GetOperationsMetadataRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.GetOperationsMetadataResponse.FromString,
+ )
+ self.getNewCustosCredential = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getNewCustosCredential',
+ request_serializer=CredentialStoreService__pb2.GetNewCustosCredentialRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.CredentialMetadata.FromString,
+ )
+ self.getOwnerIdFromToken = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getOwnerIdFromToken',
+ request_serializer=CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.GetOwnerIdResponse.FromString,
+ )
+ self.getCustosCredentialFromToken = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getCustosCredentialFromToken',
+ request_serializer=CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.CredentialMetadata.FromString,
+ )
+ self.getCustosCredentialFromClientId = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getCustosCredentialFromClientId',
+ request_serializer=CredentialStoreService__pb2.GetCredentialRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.CredentialMetadata.FromString,
+ )
+ self.getAllCredentialsFromToken = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getAllCredentialsFromToken',
+ request_serializer=CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ )
+ self.getMasterCredentials = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getMasterCredentials',
+ request_serializer=CredentialStoreService__pb2.GetCredentialRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ )
+ self.getAllCredentialsFromJWTToken = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getAllCredentialsFromJWTToken',
+ request_serializer=CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ )
+ self.getBasicCredentials = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getBasicCredentials',
+ request_serializer=CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.Credentials.FromString,
+ )
+ self.createAgentCredential = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/createAgentCredential',
+ request_serializer=CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.CredentialMetadata.FromString,
+ )
+ self.getAgentCredential = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getAgentCredential',
+ request_serializer=CredentialStoreService__pb2.GetCredentialRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.CredentialMetadata.FromString,
+ )
+ self.deleteAgentCredential = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/deleteAgentCredential',
+ request_serializer=CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.OperationStatus.FromString,
+ )
+ self.getCredentialByAgentBasicAuth = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getCredentialByAgentBasicAuth',
+ request_serializer=CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ )
+ self.getCredentialByAgentJWTToken = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/getCredentialByAgentJWTToken',
+ request_serializer=CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ )
+ self.validateAgentJWTToken = channel.unary_unary(
+ '/org.apache.custos.credential.store.service.CredentialStoreService/validateAgentJWTToken',
+ request_serializer=CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ response_deserializer=CredentialStoreService__pb2.OperationStatus.FromString,
+ )
+
+
+class CredentialStoreServiceServicer(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def putCredential(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def deleteCredential(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getCredential(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getAllCredentials(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getOperationMetadata(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getNewCustosCredential(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getOwnerIdFromToken(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getCustosCredentialFromToken(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getCustosCredentialFromClientId(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getAllCredentialsFromToken(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getMasterCredentials(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getAllCredentialsFromJWTToken(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getBasicCredentials(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def createAgentCredential(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getAgentCredential(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def deleteAgentCredential(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getCredentialByAgentBasicAuth(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getCredentialByAgentJWTToken(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def validateAgentJWTToken(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+
+def add_CredentialStoreServiceServicer_to_server(servicer, server):
+ rpc_method_handlers = {
+ 'putCredential': grpc.unary_unary_rpc_method_handler(
+ servicer.putCredential,
+ request_deserializer=CredentialStoreService__pb2.CredentialMetadata.FromString,
+ response_serializer=CredentialStoreService__pb2.OperationStatus.SerializeToString,
+ ),
+ 'deleteCredential': grpc.unary_unary_rpc_method_handler(
+ servicer.deleteCredential,
+ request_deserializer=CredentialStoreService__pb2.DeleteCredentialRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.OperationStatus.SerializeToString,
+ ),
+ 'getCredential': grpc.unary_unary_rpc_method_handler(
+ servicer.getCredential,
+ request_deserializer=CredentialStoreService__pb2.GetCredentialRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ ),
+ 'getAllCredentials': grpc.unary_unary_rpc_method_handler(
+ servicer.getAllCredentials,
+ request_deserializer=CredentialStoreService__pb2.GetAllCredentialsRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.GetAllCredentialsResponse.SerializeToString,
+ ),
+ 'getOperationMetadata': grpc.unary_unary_rpc_method_handler(
+ servicer.getOperationMetadata,
+ request_deserializer=CredentialStoreService__pb2.GetOperationsMetadataRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.GetOperationsMetadataResponse.SerializeToString,
+ ),
+ 'getNewCustosCredential': grpc.unary_unary_rpc_method_handler(
+ servicer.getNewCustosCredential,
+ request_deserializer=CredentialStoreService__pb2.GetNewCustosCredentialRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ ),
+ 'getOwnerIdFromToken': grpc.unary_unary_rpc_method_handler(
+ servicer.getOwnerIdFromToken,
+ request_deserializer=CredentialStoreService__pb2.TokenRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.GetOwnerIdResponse.SerializeToString,
+ ),
+ 'getCustosCredentialFromToken': grpc.unary_unary_rpc_method_handler(
+ servicer.getCustosCredentialFromToken,
+ request_deserializer=CredentialStoreService__pb2.TokenRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ ),
+ 'getCustosCredentialFromClientId': grpc.unary_unary_rpc_method_handler(
+ servicer.getCustosCredentialFromClientId,
+ request_deserializer=CredentialStoreService__pb2.GetCredentialRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ ),
+ 'getAllCredentialsFromToken': grpc.unary_unary_rpc_method_handler(
+ servicer.getAllCredentialsFromToken,
+ request_deserializer=CredentialStoreService__pb2.TokenRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.GetAllCredentialsResponse.SerializeToString,
+ ),
+ 'getMasterCredentials': grpc.unary_unary_rpc_method_handler(
+ servicer.getMasterCredentials,
+ request_deserializer=CredentialStoreService__pb2.GetCredentialRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.GetAllCredentialsResponse.SerializeToString,
+ ),
+ 'getAllCredentialsFromJWTToken': grpc.unary_unary_rpc_method_handler(
+ servicer.getAllCredentialsFromJWTToken,
+ request_deserializer=CredentialStoreService__pb2.TokenRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.GetAllCredentialsResponse.SerializeToString,
+ ),
+ 'getBasicCredentials': grpc.unary_unary_rpc_method_handler(
+ servicer.getBasicCredentials,
+ request_deserializer=CredentialStoreService__pb2.TokenRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.Credentials.SerializeToString,
+ ),
+ 'createAgentCredential': grpc.unary_unary_rpc_method_handler(
+ servicer.createAgentCredential,
+ request_deserializer=CredentialStoreService__pb2.CredentialMetadata.FromString,
+ response_serializer=CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ ),
+ 'getAgentCredential': grpc.unary_unary_rpc_method_handler(
+ servicer.getAgentCredential,
+ request_deserializer=CredentialStoreService__pb2.GetCredentialRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ ),
+ 'deleteAgentCredential': grpc.unary_unary_rpc_method_handler(
+ servicer.deleteAgentCredential,
+ request_deserializer=CredentialStoreService__pb2.CredentialMetadata.FromString,
+ response_serializer=CredentialStoreService__pb2.OperationStatus.SerializeToString,
+ ),
+ 'getCredentialByAgentBasicAuth': grpc.unary_unary_rpc_method_handler(
+ servicer.getCredentialByAgentBasicAuth,
+ request_deserializer=CredentialStoreService__pb2.TokenRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.GetAllCredentialsResponse.SerializeToString,
+ ),
+ 'getCredentialByAgentJWTToken': grpc.unary_unary_rpc_method_handler(
+ servicer.getCredentialByAgentJWTToken,
+ request_deserializer=CredentialStoreService__pb2.TokenRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.GetAllCredentialsResponse.SerializeToString,
+ ),
+ 'validateAgentJWTToken': grpc.unary_unary_rpc_method_handler(
+ servicer.validateAgentJWTToken,
+ request_deserializer=CredentialStoreService__pb2.TokenRequest.FromString,
+ response_serializer=CredentialStoreService__pb2.OperationStatus.SerializeToString,
+ ),
+ }
+ generic_handler = grpc.method_handlers_generic_handler(
+ 'org.apache.custos.credential.store.service.CredentialStoreService', rpc_method_handlers)
+ server.add_generic_rpc_handlers((generic_handler,))
+
+
+ # This class is part of an EXPERIMENTAL API.
+class CredentialStoreService(object):
+ """Missing associated documentation comment in .proto file."""
+
+ @staticmethod
+ def putCredential(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/putCredential',
+ CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ CredentialStoreService__pb2.OperationStatus.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def deleteCredential(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/deleteCredential',
+ CredentialStoreService__pb2.DeleteCredentialRequest.SerializeToString,
+ CredentialStoreService__pb2.OperationStatus.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getCredential(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getCredential',
+ CredentialStoreService__pb2.GetCredentialRequest.SerializeToString,
+ CredentialStoreService__pb2.CredentialMetadata.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getAllCredentials(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getAllCredentials',
+ CredentialStoreService__pb2.GetAllCredentialsRequest.SerializeToString,
+ CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getOperationMetadata(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getOperationMetadata',
+ CredentialStoreService__pb2.GetOperationsMetadataRequest.SerializeToString,
+ CredentialStoreService__pb2.GetOperationsMetadataResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getNewCustosCredential(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getNewCustosCredential',
+ CredentialStoreService__pb2.GetNewCustosCredentialRequest.SerializeToString,
+ CredentialStoreService__pb2.CredentialMetadata.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getOwnerIdFromToken(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getOwnerIdFromToken',
+ CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ CredentialStoreService__pb2.GetOwnerIdResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getCustosCredentialFromToken(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getCustosCredentialFromToken',
+ CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ CredentialStoreService__pb2.CredentialMetadata.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getCustosCredentialFromClientId(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getCustosCredentialFromClientId',
+ CredentialStoreService__pb2.GetCredentialRequest.SerializeToString,
+ CredentialStoreService__pb2.CredentialMetadata.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getAllCredentialsFromToken(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getAllCredentialsFromToken',
+ CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getMasterCredentials(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getMasterCredentials',
+ CredentialStoreService__pb2.GetCredentialRequest.SerializeToString,
+ CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getAllCredentialsFromJWTToken(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getAllCredentialsFromJWTToken',
+ CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getBasicCredentials(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getBasicCredentials',
+ CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ CredentialStoreService__pb2.Credentials.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def createAgentCredential(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/createAgentCredential',
+ CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ CredentialStoreService__pb2.CredentialMetadata.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getAgentCredential(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getAgentCredential',
+ CredentialStoreService__pb2.GetCredentialRequest.SerializeToString,
+ CredentialStoreService__pb2.CredentialMetadata.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def deleteAgentCredential(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/deleteAgentCredential',
+ CredentialStoreService__pb2.CredentialMetadata.SerializeToString,
+ CredentialStoreService__pb2.OperationStatus.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getCredentialByAgentBasicAuth(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getCredentialByAgentBasicAuth',
+ CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getCredentialByAgentJWTToken(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/getCredentialByAgentJWTToken',
+ CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ CredentialStoreService__pb2.GetAllCredentialsResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def validateAgentJWTToken(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.credential.store.service.CredentialStoreService/validateAgentJWTToken',
+ CredentialStoreService__pb2.TokenRequest.SerializeToString,
+ CredentialStoreService__pb2.OperationStatus.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/FederatedAuthenticationService_pb2.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/FederatedAuthenticationService_pb2.py
new file mode 100644
index 0000000..0425718
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/FederatedAuthenticationService_pb2.py
@@ -0,0 +1,989 @@
+# -*- coding: utf-8 -*-
+# Generated by the protocol buffer compiler. DO NOT EDIT!
+# source: FederatedAuthenticationService.proto
+"""Generated protocol buffer code."""
+from google.protobuf.internal import enum_type_wrapper
+from google.protobuf import descriptor as _descriptor
+from google.protobuf import message as _message
+from google.protobuf import reflection as _reflection
+from google.protobuf import symbol_database as _symbol_database
+# @@protoc_insertion_point(imports)
+
+_sym_db = _symbol_database.Default()
+
+
+from google.protobuf import struct_pb2 as google_dot_protobuf_dot_struct__pb2
+
+
+DESCRIPTOR = _descriptor.FileDescriptor(
+ name='FederatedAuthenticationService.proto',
+ package='org.apache.custos.federated.authentication.service',
+ syntax='proto3',
+ serialized_options=b'P\001Z\004./pb',
+ create_key=_descriptor._internal_create_key,
+ serialized_pb=b'\n$FederatedAuthenticationService.proto\x12\x32org.apache.custos.federated.authentication.service\x1a\x1cgoogle/protobuf/struct.proto\"\xbe\x01\n\x0e\x43lientMetadata\x12\x11\n\ttenant_id\x18\x01 \x01(\x03\x12\x13\n\x0btenant_name\x18\x02 \x01(\t\x12\r\n\x05scope\x18\x03 \x03(\t\x12\x12\n\ntenant_uRI\x18\x04 \x01(\t\x12\x10\n\x08\x63ontacts\x18\x05 \x03(\t\x12\x0f\n\x07\x63omment\x18\x06 \x01(\t\x12\x15\n\rredirect_uRIs\x18\x07 \x03(\t\x12\x11\n\tclient_id\x18\x08 \x01( [...]
+ ,
+ dependencies=[google_dot_protobuf_dot_struct__pb2.DESCRIPTOR,])
+
+_INSTITUTIONCACHETYPE = _descriptor.EnumDescriptor(
+ name='InstitutionCacheType',
+ full_name='org.apache.custos.federated.authentication.service.InstitutionCacheType',
+ filename=None,
+ file=DESCRIPTOR,
+ create_key=_descriptor._internal_create_key,
+ values=[
+ _descriptor.EnumValueDescriptor(
+ name='WHITELIST', index=0, number=0,
+ serialized_options=None,
+ type=None,
+ create_key=_descriptor._internal_create_key),
+ _descriptor.EnumValueDescriptor(
+ name='BACKLIST', index=1, number=1,
+ serialized_options=None,
+ type=None,
+ create_key=_descriptor._internal_create_key),
+ ],
+ containing_type=None,
+ serialized_options=None,
+ serialized_start=1658,
+ serialized_end=1709,
+)
+_sym_db.RegisterEnumDescriptor(_INSTITUTIONCACHETYPE)
+
+InstitutionCacheType = enum_type_wrapper.EnumTypeWrapper(_INSTITUTIONCACHETYPE)
+WHITELIST = 0
+BACKLIST = 1
+
+
+
+_CLIENTMETADATA = _descriptor.Descriptor(
+ name='ClientMetadata',
+ full_name='org.apache.custos.federated.authentication.service.ClientMetadata',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='tenant_id', full_name='org.apache.custos.federated.authentication.service.ClientMetadata.tenant_id', index=0,
+ number=1, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='tenant_name', full_name='org.apache.custos.federated.authentication.service.ClientMetadata.tenant_name', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='scope', full_name='org.apache.custos.federated.authentication.service.ClientMetadata.scope', index=2,
+ number=3, type=9, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='tenant_uRI', full_name='org.apache.custos.federated.authentication.service.ClientMetadata.tenant_uRI', index=3,
+ number=4, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='contacts', full_name='org.apache.custos.federated.authentication.service.ClientMetadata.contacts', index=4,
+ number=5, type=9, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='comment', full_name='org.apache.custos.federated.authentication.service.ClientMetadata.comment', index=5,
+ number=6, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='redirect_uRIs', full_name='org.apache.custos.federated.authentication.service.ClientMetadata.redirect_uRIs', index=6,
+ number=7, type=9, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.federated.authentication.service.ClientMetadata.client_id', index=7,
+ number=8, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='performed_by', full_name='org.apache.custos.federated.authentication.service.ClientMetadata.performed_by', index=8,
+ number=9, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=123,
+ serialized_end=313,
+)
+
+
+_REGISTERCLIENTRESPONSE = _descriptor.Descriptor(
+ name='RegisterClientResponse',
+ full_name='org.apache.custos.federated.authentication.service.RegisterClientResponse',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.federated.authentication.service.RegisterClientResponse.client_id', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_secret', full_name='org.apache.custos.federated.authentication.service.RegisterClientResponse.client_secret', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id_issued_at', full_name='org.apache.custos.federated.authentication.service.RegisterClientResponse.client_id_issued_at', index=2,
+ number=3, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_secret_expires_at', full_name='org.apache.custos.federated.authentication.service.RegisterClientResponse.client_secret_expires_at', index=3,
+ number=4, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_registration_uri', full_name='org.apache.custos.federated.authentication.service.RegisterClientResponse.client_registration_uri', index=4,
+ number=5, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=316,
+ serialized_end=478,
+)
+
+
+_GETCLIENTREQUEST = _descriptor.Descriptor(
+ name='GetClientRequest',
+ full_name='org.apache.custos.federated.authentication.service.GetClientRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='tenant_id', full_name='org.apache.custos.federated.authentication.service.GetClientRequest.tenant_id', index=0,
+ number=1, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.federated.authentication.service.GetClientRequest.client_id', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=480,
+ serialized_end=536,
+)
+
+
+_GETCLIENTRESPONSE = _descriptor.Descriptor(
+ name='GetClientResponse',
+ full_name='org.apache.custos.federated.authentication.service.GetClientResponse',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.federated.authentication.service.GetClientResponse.client_id', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_name', full_name='org.apache.custos.federated.authentication.service.GetClientResponse.client_name', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='redirect_uRIs', full_name='org.apache.custos.federated.authentication.service.GetClientResponse.redirect_uRIs', index=2,
+ number=3, type=9, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='grant_types', full_name='org.apache.custos.federated.authentication.service.GetClientResponse.grant_types', index=3,
+ number=4, type=9, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='scope', full_name='org.apache.custos.federated.authentication.service.GetClientResponse.scope', index=4,
+ number=5, type=9, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id_issued_at', full_name='org.apache.custos.federated.authentication.service.GetClientResponse.client_id_issued_at', index=5,
+ number=6, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='comment', full_name='org.apache.custos.federated.authentication.service.GetClientResponse.comment', index=6,
+ number=7, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_secret', full_name='org.apache.custos.federated.authentication.service.GetClientResponse.client_secret', index=7,
+ number=8, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_secret_expires_at', full_name='org.apache.custos.federated.authentication.service.GetClientResponse.client_secret_expires_at', index=8,
+ number=9, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_registration_uri', full_name='org.apache.custos.federated.authentication.service.GetClientResponse.client_registration_uri', index=9,
+ number=10, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=539,
+ serialized_end=793,
+)
+
+
+_DELETECLIENTREQUEST = _descriptor.Descriptor(
+ name='DeleteClientRequest',
+ full_name='org.apache.custos.federated.authentication.service.DeleteClientRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='tenant_id', full_name='org.apache.custos.federated.authentication.service.DeleteClientRequest.tenant_id', index=0,
+ number=1, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.federated.authentication.service.DeleteClientRequest.client_id', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='performed_by', full_name='org.apache.custos.federated.authentication.service.DeleteClientRequest.performed_by', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=795,
+ serialized_end=876,
+)
+
+
+_EMPTY = _descriptor.Descriptor(
+ name='Empty',
+ full_name='org.apache.custos.federated.authentication.service.Empty',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=878,
+ serialized_end=885,
+)
+
+
+_GETOPERATIONSMETADATAREQUEST = _descriptor.Descriptor(
+ name='GetOperationsMetadataRequest',
+ full_name='org.apache.custos.federated.authentication.service.GetOperationsMetadataRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='trace_id', full_name='org.apache.custos.federated.authentication.service.GetOperationsMetadataRequest.trace_id', index=0,
+ number=1, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=887,
+ serialized_end=935,
+)
+
+
+_OPERATIONMETADATA = _descriptor.Descriptor(
+ name='OperationMetadata',
+ full_name='org.apache.custos.federated.authentication.service.OperationMetadata',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='event', full_name='org.apache.custos.federated.authentication.service.OperationMetadata.event', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='status', full_name='org.apache.custos.federated.authentication.service.OperationMetadata.status', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='time_stamp', full_name='org.apache.custos.federated.authentication.service.OperationMetadata.time_stamp', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='performed_by', full_name='org.apache.custos.federated.authentication.service.OperationMetadata.performed_by', index=3,
+ number=4, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=937,
+ serialized_end=1029,
+)
+
+
+_GETOPERATIONSMETADATARESPONSE = _descriptor.Descriptor(
+ name='GetOperationsMetadataResponse',
+ full_name='org.apache.custos.federated.authentication.service.GetOperationsMetadataResponse',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='metadata', full_name='org.apache.custos.federated.authentication.service.GetOperationsMetadataResponse.metadata', index=0,
+ number=1, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1031,
+ serialized_end=1151,
+)
+
+
+_CACHEMANIPULATIONREQUEST = _descriptor.Descriptor(
+ name='CacheManipulationRequest',
+ full_name='org.apache.custos.federated.authentication.service.CacheManipulationRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='tenant_id', full_name='org.apache.custos.federated.authentication.service.CacheManipulationRequest.tenant_id', index=0,
+ number=1, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='institution_ids', full_name='org.apache.custos.federated.authentication.service.CacheManipulationRequest.institution_ids', index=1,
+ number=2, type=9, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='type', full_name='org.apache.custos.federated.authentication.service.CacheManipulationRequest.type', index=2,
+ number=3, type=14, cpp_type=8, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='performedBy', full_name='org.apache.custos.federated.authentication.service.CacheManipulationRequest.performedBy', index=3,
+ number=4, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1154,
+ serialized_end=1333,
+)
+
+
+_STATUS = _descriptor.Descriptor(
+ name='Status',
+ full_name='org.apache.custos.federated.authentication.service.Status',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='status', full_name='org.apache.custos.federated.authentication.service.Status.status', index=0,
+ number=1, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1335,
+ serialized_end=1359,
+)
+
+
+_INSTITUTIONOPERATIONRESPONSE = _descriptor.Descriptor(
+ name='InstitutionOperationResponse',
+ full_name='org.apache.custos.federated.authentication.service.InstitutionOperationResponse',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1361,
+ serialized_end=1391,
+)
+
+
+_INSTITUTION = _descriptor.Descriptor(
+ name='Institution',
+ full_name='org.apache.custos.federated.authentication.service.Institution',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='entity_id', full_name='org.apache.custos.federated.authentication.service.Institution.entity_id', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='organization_name', full_name='org.apache.custos.federated.authentication.service.Institution.organization_name', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='display_name', full_name='org.apache.custos.federated.authentication.service.Institution.display_name', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='rand_s', full_name='org.apache.custos.federated.authentication.service.Institution.rand_s', index=3,
+ number=4, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1393,
+ serialized_end=1490,
+)
+
+
+_GETINSTITUTIONSIDSASRESPONSE = _descriptor.Descriptor(
+ name='GetInstitutionsIdsAsResponse',
+ full_name='org.apache.custos.federated.authentication.service.GetInstitutionsIdsAsResponse',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='entity_ids', full_name='org.apache.custos.federated.authentication.service.GetInstitutionsIdsAsResponse.entity_ids', index=0,
+ number=1, type=9, cpp_type=9, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1492,
+ serialized_end=1542,
+)
+
+
+_GETINSTITUTIONSRESPONSE = _descriptor.Descriptor(
+ name='GetInstitutionsResponse',
+ full_name='org.apache.custos.federated.authentication.service.GetInstitutionsResponse',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='institutions', full_name='org.apache.custos.federated.authentication.service.GetInstitutionsResponse.institutions', index=0,
+ number=2, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=1544,
+ serialized_end=1656,
+)
+
+_GETOPERATIONSMETADATARESPONSE.fields_by_name['metadata'].message_type = _OPERATIONMETADATA
+_CACHEMANIPULATIONREQUEST.fields_by_name['type'].enum_type = _INSTITUTIONCACHETYPE
+_GETINSTITUTIONSRESPONSE.fields_by_name['institutions'].message_type = _INSTITUTION
+DESCRIPTOR.message_types_by_name['ClientMetadata'] = _CLIENTMETADATA
+DESCRIPTOR.message_types_by_name['RegisterClientResponse'] = _REGISTERCLIENTRESPONSE
+DESCRIPTOR.message_types_by_name['GetClientRequest'] = _GETCLIENTREQUEST
+DESCRIPTOR.message_types_by_name['GetClientResponse'] = _GETCLIENTRESPONSE
+DESCRIPTOR.message_types_by_name['DeleteClientRequest'] = _DELETECLIENTREQUEST
+DESCRIPTOR.message_types_by_name['Empty'] = _EMPTY
+DESCRIPTOR.message_types_by_name['GetOperationsMetadataRequest'] = _GETOPERATIONSMETADATAREQUEST
+DESCRIPTOR.message_types_by_name['OperationMetadata'] = _OPERATIONMETADATA
+DESCRIPTOR.message_types_by_name['GetOperationsMetadataResponse'] = _GETOPERATIONSMETADATARESPONSE
+DESCRIPTOR.message_types_by_name['CacheManipulationRequest'] = _CACHEMANIPULATIONREQUEST
+DESCRIPTOR.message_types_by_name['Status'] = _STATUS
+DESCRIPTOR.message_types_by_name['InstitutionOperationResponse'] = _INSTITUTIONOPERATIONRESPONSE
+DESCRIPTOR.message_types_by_name['Institution'] = _INSTITUTION
+DESCRIPTOR.message_types_by_name['GetInstitutionsIdsAsResponse'] = _GETINSTITUTIONSIDSASRESPONSE
+DESCRIPTOR.message_types_by_name['GetInstitutionsResponse'] = _GETINSTITUTIONSRESPONSE
+DESCRIPTOR.enum_types_by_name['InstitutionCacheType'] = _INSTITUTIONCACHETYPE
+_sym_db.RegisterFileDescriptor(DESCRIPTOR)
+
+ClientMetadata = _reflection.GeneratedProtocolMessageType('ClientMetadata', (_message.Message,), {
+ 'DESCRIPTOR' : _CLIENTMETADATA,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.ClientMetadata)
+ })
+_sym_db.RegisterMessage(ClientMetadata)
+
+RegisterClientResponse = _reflection.GeneratedProtocolMessageType('RegisterClientResponse', (_message.Message,), {
+ 'DESCRIPTOR' : _REGISTERCLIENTRESPONSE,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.RegisterClientResponse)
+ })
+_sym_db.RegisterMessage(RegisterClientResponse)
+
+GetClientRequest = _reflection.GeneratedProtocolMessageType('GetClientRequest', (_message.Message,), {
+ 'DESCRIPTOR' : _GETCLIENTREQUEST,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.GetClientRequest)
+ })
+_sym_db.RegisterMessage(GetClientRequest)
+
+GetClientResponse = _reflection.GeneratedProtocolMessageType('GetClientResponse', (_message.Message,), {
+ 'DESCRIPTOR' : _GETCLIENTRESPONSE,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.GetClientResponse)
+ })
+_sym_db.RegisterMessage(GetClientResponse)
+
+DeleteClientRequest = _reflection.GeneratedProtocolMessageType('DeleteClientRequest', (_message.Message,), {
+ 'DESCRIPTOR' : _DELETECLIENTREQUEST,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.DeleteClientRequest)
+ })
+_sym_db.RegisterMessage(DeleteClientRequest)
+
+Empty = _reflection.GeneratedProtocolMessageType('Empty', (_message.Message,), {
+ 'DESCRIPTOR' : _EMPTY,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.Empty)
+ })
+_sym_db.RegisterMessage(Empty)
+
+GetOperationsMetadataRequest = _reflection.GeneratedProtocolMessageType('GetOperationsMetadataRequest', (_message.Message,), {
+ 'DESCRIPTOR' : _GETOPERATIONSMETADATAREQUEST,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.GetOperationsMetadataRequest)
+ })
+_sym_db.RegisterMessage(GetOperationsMetadataRequest)
+
+OperationMetadata = _reflection.GeneratedProtocolMessageType('OperationMetadata', (_message.Message,), {
+ 'DESCRIPTOR' : _OPERATIONMETADATA,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.OperationMetadata)
+ })
+_sym_db.RegisterMessage(OperationMetadata)
+
+GetOperationsMetadataResponse = _reflection.GeneratedProtocolMessageType('GetOperationsMetadataResponse', (_message.Message,), {
+ 'DESCRIPTOR' : _GETOPERATIONSMETADATARESPONSE,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.GetOperationsMetadataResponse)
+ })
+_sym_db.RegisterMessage(GetOperationsMetadataResponse)
+
+CacheManipulationRequest = _reflection.GeneratedProtocolMessageType('CacheManipulationRequest', (_message.Message,), {
+ 'DESCRIPTOR' : _CACHEMANIPULATIONREQUEST,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.CacheManipulationRequest)
+ })
+_sym_db.RegisterMessage(CacheManipulationRequest)
+
+Status = _reflection.GeneratedProtocolMessageType('Status', (_message.Message,), {
+ 'DESCRIPTOR' : _STATUS,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.Status)
+ })
+_sym_db.RegisterMessage(Status)
+
+InstitutionOperationResponse = _reflection.GeneratedProtocolMessageType('InstitutionOperationResponse', (_message.Message,), {
+ 'DESCRIPTOR' : _INSTITUTIONOPERATIONRESPONSE,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.InstitutionOperationResponse)
+ })
+_sym_db.RegisterMessage(InstitutionOperationResponse)
+
+Institution = _reflection.GeneratedProtocolMessageType('Institution', (_message.Message,), {
+ 'DESCRIPTOR' : _INSTITUTION,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.Institution)
+ })
+_sym_db.RegisterMessage(Institution)
+
+GetInstitutionsIdsAsResponse = _reflection.GeneratedProtocolMessageType('GetInstitutionsIdsAsResponse', (_message.Message,), {
+ 'DESCRIPTOR' : _GETINSTITUTIONSIDSASRESPONSE,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.GetInstitutionsIdsAsResponse)
+ })
+_sym_db.RegisterMessage(GetInstitutionsIdsAsResponse)
+
+GetInstitutionsResponse = _reflection.GeneratedProtocolMessageType('GetInstitutionsResponse', (_message.Message,), {
+ 'DESCRIPTOR' : _GETINSTITUTIONSRESPONSE,
+ '__module__' : 'FederatedAuthenticationService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.federated.authentication.service.GetInstitutionsResponse)
+ })
+_sym_db.RegisterMessage(GetInstitutionsResponse)
+
+
+DESCRIPTOR._options = None
+
+_FEDERATEDAUTHENTICATIONSERVICE = _descriptor.ServiceDescriptor(
+ name='FederatedAuthenticationService',
+ full_name='org.apache.custos.federated.authentication.service.FederatedAuthenticationService',
+ file=DESCRIPTOR,
+ index=0,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ serialized_start=1712,
+ serialized_end=3198,
+ methods=[
+ _descriptor.MethodDescriptor(
+ name='addClient',
+ full_name='org.apache.custos.federated.authentication.service.FederatedAuthenticationService.addClient',
+ index=0,
+ containing_service=None,
+ input_type=_CLIENTMETADATA,
+ output_type=_REGISTERCLIENTRESPONSE,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='updateClient',
+ full_name='org.apache.custos.federated.authentication.service.FederatedAuthenticationService.updateClient',
+ index=1,
+ containing_service=None,
+ input_type=_CLIENTMETADATA,
+ output_type=_EMPTY,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='getClient',
+ full_name='org.apache.custos.federated.authentication.service.FederatedAuthenticationService.getClient',
+ index=2,
+ containing_service=None,
+ input_type=_GETCLIENTREQUEST,
+ output_type=_GETCLIENTRESPONSE,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='deleteClient',
+ full_name='org.apache.custos.federated.authentication.service.FederatedAuthenticationService.deleteClient',
+ index=3,
+ containing_service=None,
+ input_type=_DELETECLIENTREQUEST,
+ output_type=_EMPTY,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='getOperationMetadata',
+ full_name='org.apache.custos.federated.authentication.service.FederatedAuthenticationService.getOperationMetadata',
+ index=4,
+ containing_service=None,
+ input_type=_GETOPERATIONSMETADATAREQUEST,
+ output_type=_GETOPERATIONSMETADATARESPONSE,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='addToCache',
+ full_name='org.apache.custos.federated.authentication.service.FederatedAuthenticationService.addToCache',
+ index=5,
+ containing_service=None,
+ input_type=_CACHEMANIPULATIONREQUEST,
+ output_type=_STATUS,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='removeFromCache',
+ full_name='org.apache.custos.federated.authentication.service.FederatedAuthenticationService.removeFromCache',
+ index=6,
+ containing_service=None,
+ input_type=_CACHEMANIPULATIONREQUEST,
+ output_type=_STATUS,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='getFromCache',
+ full_name='org.apache.custos.federated.authentication.service.FederatedAuthenticationService.getFromCache',
+ index=7,
+ containing_service=None,
+ input_type=_CACHEMANIPULATIONREQUEST,
+ output_type=_GETINSTITUTIONSRESPONSE,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='getInstitutions',
+ full_name='org.apache.custos.federated.authentication.service.FederatedAuthenticationService.getInstitutions',
+ index=8,
+ containing_service=None,
+ input_type=_CACHEMANIPULATIONREQUEST,
+ output_type=_GETINSTITUTIONSRESPONSE,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+])
+_sym_db.RegisterServiceDescriptor(_FEDERATEDAUTHENTICATIONSERVICE)
+
+DESCRIPTOR.services_by_name['FederatedAuthenticationService'] = _FEDERATEDAUTHENTICATIONSERVICE
+
+# @@protoc_insertion_point(module_scope)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/FederatedAuthenticationService_pb2_grpc.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/FederatedAuthenticationService_pb2_grpc.py
new file mode 100644
index 0000000..09940f5
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/FederatedAuthenticationService_pb2_grpc.py
@@ -0,0 +1,347 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements. See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership. The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing,
+# software distributed under the License is distributed on an
+# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+# KIND, either express or implied. See the License for the
+# specific language governing permissions and limitations
+# under the License.
+
+# Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT!
+"""Client and server classes corresponding to protobuf-defined services."""
+import grpc
+
+import custos.server.core.FederatedAuthenticationService_pb2 as FederatedAuthenticationService__pb2
+
+
+class FederatedAuthenticationServiceStub(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def __init__(self, channel):
+ """Constructor.
+
+ Args:
+ channel: A grpc.Channel.
+ """
+ self.addClient = channel.unary_unary(
+ '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/addClient',
+ request_serializer=FederatedAuthenticationService__pb2.ClientMetadata.SerializeToString,
+ response_deserializer=FederatedAuthenticationService__pb2.RegisterClientResponse.FromString,
+ )
+ self.updateClient = channel.unary_unary(
+ '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/updateClient',
+ request_serializer=FederatedAuthenticationService__pb2.ClientMetadata.SerializeToString,
+ response_deserializer=FederatedAuthenticationService__pb2.Empty.FromString,
+ )
+ self.getClient = channel.unary_unary(
+ '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/getClient',
+ request_serializer=FederatedAuthenticationService__pb2.GetClientRequest.SerializeToString,
+ response_deserializer=FederatedAuthenticationService__pb2.GetClientResponse.FromString,
+ )
+ self.deleteClient = channel.unary_unary(
+ '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/deleteClient',
+ request_serializer=FederatedAuthenticationService__pb2.DeleteClientRequest.SerializeToString,
+ response_deserializer=FederatedAuthenticationService__pb2.Empty.FromString,
+ )
+ self.getOperationMetadata = channel.unary_unary(
+ '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/getOperationMetadata',
+ request_serializer=FederatedAuthenticationService__pb2.GetOperationsMetadataRequest.SerializeToString,
+ response_deserializer=FederatedAuthenticationService__pb2.GetOperationsMetadataResponse.FromString,
+ )
+ self.addToCache = channel.unary_unary(
+ '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/addToCache',
+ request_serializer=FederatedAuthenticationService__pb2.CacheManipulationRequest.SerializeToString,
+ response_deserializer=FederatedAuthenticationService__pb2.Status.FromString,
+ )
+ self.removeFromCache = channel.unary_unary(
+ '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/removeFromCache',
+ request_serializer=FederatedAuthenticationService__pb2.CacheManipulationRequest.SerializeToString,
+ response_deserializer=FederatedAuthenticationService__pb2.Status.FromString,
+ )
+ self.getFromCache = channel.unary_unary(
+ '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/getFromCache',
+ request_serializer=FederatedAuthenticationService__pb2.CacheManipulationRequest.SerializeToString,
+ response_deserializer=FederatedAuthenticationService__pb2.GetInstitutionsResponse.FromString,
+ )
+ self.getInstitutions = channel.unary_unary(
+ '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/getInstitutions',
+ request_serializer=FederatedAuthenticationService__pb2.CacheManipulationRequest.SerializeToString,
+ response_deserializer=FederatedAuthenticationService__pb2.GetInstitutionsResponse.FromString,
+ )
+
+
+class FederatedAuthenticationServiceServicer(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def addClient(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def updateClient(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getClient(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def deleteClient(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getOperationMetadata(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def addToCache(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def removeFromCache(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getFromCache(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getInstitutions(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+
+def add_FederatedAuthenticationServiceServicer_to_server(servicer, server):
+ rpc_method_handlers = {
+ 'addClient': grpc.unary_unary_rpc_method_handler(
+ servicer.addClient,
+ request_deserializer=FederatedAuthenticationService__pb2.ClientMetadata.FromString,
+ response_serializer=FederatedAuthenticationService__pb2.RegisterClientResponse.SerializeToString,
+ ),
+ 'updateClient': grpc.unary_unary_rpc_method_handler(
+ servicer.updateClient,
+ request_deserializer=FederatedAuthenticationService__pb2.ClientMetadata.FromString,
+ response_serializer=FederatedAuthenticationService__pb2.Empty.SerializeToString,
+ ),
+ 'getClient': grpc.unary_unary_rpc_method_handler(
+ servicer.getClient,
+ request_deserializer=FederatedAuthenticationService__pb2.GetClientRequest.FromString,
+ response_serializer=FederatedAuthenticationService__pb2.GetClientResponse.SerializeToString,
+ ),
+ 'deleteClient': grpc.unary_unary_rpc_method_handler(
+ servicer.deleteClient,
+ request_deserializer=FederatedAuthenticationService__pb2.DeleteClientRequest.FromString,
+ response_serializer=FederatedAuthenticationService__pb2.Empty.SerializeToString,
+ ),
+ 'getOperationMetadata': grpc.unary_unary_rpc_method_handler(
+ servicer.getOperationMetadata,
+ request_deserializer=FederatedAuthenticationService__pb2.GetOperationsMetadataRequest.FromString,
+ response_serializer=FederatedAuthenticationService__pb2.GetOperationsMetadataResponse.SerializeToString,
+ ),
+ 'addToCache': grpc.unary_unary_rpc_method_handler(
+ servicer.addToCache,
+ request_deserializer=FederatedAuthenticationService__pb2.CacheManipulationRequest.FromString,
+ response_serializer=FederatedAuthenticationService__pb2.Status.SerializeToString,
+ ),
+ 'removeFromCache': grpc.unary_unary_rpc_method_handler(
+ servicer.removeFromCache,
+ request_deserializer=FederatedAuthenticationService__pb2.CacheManipulationRequest.FromString,
+ response_serializer=FederatedAuthenticationService__pb2.Status.SerializeToString,
+ ),
+ 'getFromCache': grpc.unary_unary_rpc_method_handler(
+ servicer.getFromCache,
+ request_deserializer=FederatedAuthenticationService__pb2.CacheManipulationRequest.FromString,
+ response_serializer=FederatedAuthenticationService__pb2.GetInstitutionsResponse.SerializeToString,
+ ),
+ 'getInstitutions': grpc.unary_unary_rpc_method_handler(
+ servicer.getInstitutions,
+ request_deserializer=FederatedAuthenticationService__pb2.CacheManipulationRequest.FromString,
+ response_serializer=FederatedAuthenticationService__pb2.GetInstitutionsResponse.SerializeToString,
+ ),
+ }
+ generic_handler = grpc.method_handlers_generic_handler(
+ 'org.apache.custos.federated.authentication.service.FederatedAuthenticationService', rpc_method_handlers)
+ server.add_generic_rpc_handlers((generic_handler,))
+
+
+ # This class is part of an EXPERIMENTAL API.
+class FederatedAuthenticationService(object):
+ """Missing associated documentation comment in .proto file."""
+
+ @staticmethod
+ def addClient(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/addClient',
+ FederatedAuthenticationService__pb2.ClientMetadata.SerializeToString,
+ FederatedAuthenticationService__pb2.RegisterClientResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def updateClient(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/updateClient',
+ FederatedAuthenticationService__pb2.ClientMetadata.SerializeToString,
+ FederatedAuthenticationService__pb2.Empty.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getClient(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/getClient',
+ FederatedAuthenticationService__pb2.GetClientRequest.SerializeToString,
+ FederatedAuthenticationService__pb2.GetClientResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def deleteClient(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/deleteClient',
+ FederatedAuthenticationService__pb2.DeleteClientRequest.SerializeToString,
+ FederatedAuthenticationService__pb2.Empty.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getOperationMetadata(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/getOperationMetadata',
+ FederatedAuthenticationService__pb2.GetOperationsMetadataRequest.SerializeToString,
+ FederatedAuthenticationService__pb2.GetOperationsMetadataResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def addToCache(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/addToCache',
+ FederatedAuthenticationService__pb2.CacheManipulationRequest.SerializeToString,
+ FederatedAuthenticationService__pb2.Status.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def removeFromCache(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/removeFromCache',
+ FederatedAuthenticationService__pb2.CacheManipulationRequest.SerializeToString,
+ FederatedAuthenticationService__pb2.Status.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getFromCache(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/getFromCache',
+ FederatedAuthenticationService__pb2.CacheManipulationRequest.SerializeToString,
+ FederatedAuthenticationService__pb2.GetInstitutionsResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getInstitutions(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.federated.authentication.service.FederatedAuthenticationService/getInstitutions',
+ FederatedAuthenticationService__pb2.CacheManipulationRequest.SerializeToString,
+ FederatedAuthenticationService__pb2.GetInstitutionsResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
diff --git a/custos-client-sdks/custos-python-sdk/custos/server/core/IamAdminService_pb2.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IamAdminService_pb2.py
similarity index 83%
copy from custos-client-sdks/custos-python-sdk/custos/server/core/IamAdminService_pb2.py
copy to custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IamAdminService_pb2.py
index a7e7c0e..b1a8c63 100644
--- a/custos-client-sdks/custos-python-sdk/custos/server/core/IamAdminService_pb2.py
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IamAdminService_pb2.py
@@ -19,9 +19,9 @@ DESCRIPTOR = _descriptor.FileDescriptor(
name='IamAdminService.proto',
package='org.apache.custos.iam.service',
syntax='proto3',
- serialized_options=b'P\001',
+ serialized_options=b'P\001Z\004./pb',
create_key=_descriptor._internal_create_key,
- serialized_pb=b'\n\x15IamAdminService.proto\x12\x1dorg.apache.custos.iam.service\x1a\x1bgoogle/protobuf/empty.proto\"\x84\x02\n\x12SetUpTenantRequest\x12\x10\n\x08tenantId\x18\x01 \x01(\x03\x12\x12\n\ntenantName\x18\x02 \x01(\t\x12\x15\n\radminUsername\x18\x03 \x01(\t\x12\x16\n\x0e\x61\x64minFirstname\x18\x04 \x01(\t\x12\x15\n\radminLastname\x18\x05 \x01(\t\x12\x12\n\nadminEmail\x18\x06 \x01(\t\x12\x15\n\radminPassword\x18\x07 \x01(\t\x12\x11\n\ttenantURL\x18\x08 \x01(\t\x12\x16\n\x0er [...]
+ serialized_pb=b'\n\x15IamAdminService.proto\x12\x1dorg.apache.custos.iam.service\x1a\x1bgoogle/protobuf/empty.proto\"\x90\x02\n\x12SetUpTenantRequest\x12\x11\n\ttenant_id\x18\x01 \x01(\x03\x12\x13\n\x0btenant_name\x18\x02 \x01(\t\x12\x16\n\x0e\x61\x64min_username\x18\x03 \x01(\t\x12\x17\n\x0f\x61\x64min_firstname\x18\x04 \x01(\t\x12\x16\n\x0e\x61\x64min_lastname\x18\x05 \x01(\t\x12\x13\n\x0b\x61\x64min_email\x18\x06 \x01(\t\x12\x16\n\x0e\x61\x64min_password\x18\x07 \x01(\t\x12\x12\n\nt [...]
,
dependencies=[google_dot_protobuf_dot_empty__pb2.DESCRIPTOR,])
@@ -65,8 +65,8 @@ _FEDERATEDIDPS = _descriptor.EnumDescriptor(
],
containing_type=None,
serialized_options=None,
- serialized_start=6345,
- serialized_end=6443,
+ serialized_start=6554,
+ serialized_end=6652,
)
_sym_db.RegisterEnumDescriptor(_FEDERATEDIDPS)
@@ -96,8 +96,8 @@ _MAPPERTYPES = _descriptor.EnumDescriptor(
],
containing_type=None,
serialized_options=None,
- serialized_start=6445,
- serialized_end=6521,
+ serialized_start=6654,
+ serialized_end=6730,
)
_sym_db.RegisterEnumDescriptor(_MAPPERTYPES)
@@ -137,8 +137,8 @@ _CLAIMJSONTYPES = _descriptor.EnumDescriptor(
],
containing_type=None,
serialized_options=None,
- serialized_start=6523,
- serialized_end=6597,
+ serialized_start=6732,
+ serialized_end=6806,
)
_sym_db.RegisterEnumDescriptor(_CLAIMJSONTYPES)
@@ -163,8 +163,8 @@ _RESOURCETYPES = _descriptor.EnumDescriptor(
],
containing_type=None,
serialized_options=None,
- serialized_start=6599,
- serialized_end=6635,
+ serialized_start=6808,
+ serialized_end=6844,
)
_sym_db.RegisterEnumDescriptor(_RESOURCETYPES)
@@ -197,77 +197,77 @@ _SETUPTENANTREQUEST = _descriptor.Descriptor(
create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.iam.service.SetUpTenantRequest.tenantId', index=0,
+ name='tenant_id', full_name='org.apache.custos.iam.service.SetUpTenantRequest.tenant_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='tenantName', full_name='org.apache.custos.iam.service.SetUpTenantRequest.tenantName', index=1,
+ name='tenant_name', full_name='org.apache.custos.iam.service.SetUpTenantRequest.tenant_name', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='adminUsername', full_name='org.apache.custos.iam.service.SetUpTenantRequest.adminUsername', index=2,
+ name='admin_username', full_name='org.apache.custos.iam.service.SetUpTenantRequest.admin_username', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='adminFirstname', full_name='org.apache.custos.iam.service.SetUpTenantRequest.adminFirstname', index=3,
+ name='admin_firstname', full_name='org.apache.custos.iam.service.SetUpTenantRequest.admin_firstname', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='adminLastname', full_name='org.apache.custos.iam.service.SetUpTenantRequest.adminLastname', index=4,
+ name='admin_lastname', full_name='org.apache.custos.iam.service.SetUpTenantRequest.admin_lastname', index=4,
number=5, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='adminEmail', full_name='org.apache.custos.iam.service.SetUpTenantRequest.adminEmail', index=5,
+ name='admin_email', full_name='org.apache.custos.iam.service.SetUpTenantRequest.admin_email', index=5,
number=6, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='adminPassword', full_name='org.apache.custos.iam.service.SetUpTenantRequest.adminPassword', index=6,
+ name='admin_password', full_name='org.apache.custos.iam.service.SetUpTenantRequest.admin_password', index=6,
number=7, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='tenantURL', full_name='org.apache.custos.iam.service.SetUpTenantRequest.tenantURL', index=7,
+ name='tenant_uRL', full_name='org.apache.custos.iam.service.SetUpTenantRequest.tenant_uRL', index=7,
number=8, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='requesterEmail', full_name='org.apache.custos.iam.service.SetUpTenantRequest.requesterEmail', index=8,
+ name='requester_email', full_name='org.apache.custos.iam.service.SetUpTenantRequest.requester_email', index=8,
number=9, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='redirectURIs', full_name='org.apache.custos.iam.service.SetUpTenantRequest.redirectURIs', index=9,
+ name='redirect_uRIs', full_name='org.apache.custos.iam.service.SetUpTenantRequest.redirect_uRIs', index=9,
number=10, type=9, cpp_type=9, label=3,
has_default_value=False, default_value=[],
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='custosClientId', full_name='org.apache.custos.iam.service.SetUpTenantRequest.custosClientId', index=10,
+ name='custos_client_id', full_name='org.apache.custos.iam.service.SetUpTenantRequest.custos_client_id', index=10,
number=11, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -286,7 +286,7 @@ _SETUPTENANTREQUEST = _descriptor.Descriptor(
oneofs=[
],
serialized_start=86,
- serialized_end=346,
+ serialized_end=358,
)
@@ -324,8 +324,8 @@ _CONFIGUREFEDERATEIDPREQUEST_CONFIGMAPENTRY = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=643,
- serialized_end=691,
+ serialized_start=661,
+ serialized_end=709,
)
_CONFIGUREFEDERATEIDPREQUEST = _descriptor.Descriptor(
@@ -337,7 +337,7 @@ _CONFIGUREFEDERATEIDPREQUEST = _descriptor.Descriptor(
create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.tenantId', index=0,
+ name='tenant_id', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.tenant_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
@@ -351,35 +351,35 @@ _CONFIGUREFEDERATEIDPREQUEST = _descriptor.Descriptor(
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientID', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.clientID', index=2,
+ name='client_iD', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.client_iD', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientSec', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.clientSec', index=3,
+ name='client_sec', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.client_sec', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='configMap', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.configMap', index=4,
+ name='config_map', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.config_map', index=4,
number=5, type=11, cpp_type=10, label=3,
has_default_value=False, default_value=[],
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='requesterEmail', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.requesterEmail', index=5,
+ name='requester_email', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.requester_email', index=5,
number=6, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='idpId', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.idpId', index=6,
+ name='idp_id', full_name='org.apache.custos.iam.service.ConfigureFederateIDPRequest.idp_id', index=6,
number=7, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -404,8 +404,8 @@ _CONFIGUREFEDERATEIDPREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=349,
- serialized_end=691,
+ serialized_start=361,
+ serialized_end=709,
)
@@ -436,8 +436,8 @@ _FEDERATEIDPRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=693,
- serialized_end=730,
+ serialized_start=711,
+ serialized_end=748,
)
@@ -450,14 +450,14 @@ _SETUPTENANTRESPONSE = _descriptor.Descriptor(
create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='clientId', full_name='org.apache.custos.iam.service.SetUpTenantResponse.clientId', index=0,
+ name='client_id', full_name='org.apache.custos.iam.service.SetUpTenantResponse.client_id', index=0,
number=1, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientSecret', full_name='org.apache.custos.iam.service.SetUpTenantResponse.clientSecret', index=1,
+ name='client_secret', full_name='org.apache.custos.iam.service.SetUpTenantResponse.client_secret', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -475,8 +475,8 @@ _SETUPTENANTRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=732,
- serialized_end=793,
+ serialized_start=750,
+ serialized_end=813,
)
@@ -489,21 +489,21 @@ _ISUSERNAMEAVAILABLEREQUEST = _descriptor.Descriptor(
create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.iam.service.IsUsernameAvailableRequest.tenantId', index=0,
+ name='tenant_id', full_name='org.apache.custos.iam.service.IsUsernameAvailableRequest.tenant_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='accessToken', full_name='org.apache.custos.iam.service.IsUsernameAvailableRequest.accessToken', index=1,
+ name='access_token', full_name='org.apache.custos.iam.service.IsUsernameAvailableRequest.access_token', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='userName', full_name='org.apache.custos.iam.service.IsUsernameAvailableRequest.userName', index=2,
+ name='user_name', full_name='org.apache.custos.iam.service.IsUsernameAvailableRequest.user_name', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -521,8 +521,8 @@ _ISUSERNAMEAVAILABLEREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=795,
- serialized_end=880,
+ serialized_start=815,
+ serialized_end=903,
)
@@ -553,8 +553,8 @@ _CHECKINGRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=882,
- serialized_end=918,
+ serialized_start=905,
+ serialized_end=941,
)
@@ -669,8 +669,8 @@ _USERREPRESENTATION = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=921,
- serialized_end=1241,
+ serialized_start=944,
+ serialized_end=1264,
)
@@ -757,8 +757,8 @@ _GROUPREPRESENTATION = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1244,
- serialized_end=1576,
+ serialized_start=1267,
+ serialized_end=1599,
)
@@ -771,28 +771,28 @@ _REGISTERUSERREQUEST = _descriptor.Descriptor(
create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.iam.service.RegisterUserRequest.tenantId', index=0,
+ name='tenant_id', full_name='org.apache.custos.iam.service.RegisterUserRequest.tenant_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='accessToken', full_name='org.apache.custos.iam.service.RegisterUserRequest.accessToken', index=1,
+ name='access_token', full_name='org.apache.custos.iam.service.RegisterUserRequest.access_token', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientId', full_name='org.apache.custos.iam.service.RegisterUserRequest.clientId', index=2,
+ name='client_id', full_name='org.apache.custos.iam.service.RegisterUserRequest.client_id', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientSec', full_name='org.apache.custos.iam.service.RegisterUserRequest.clientSec', index=3,
+ name='client_sec', full_name='org.apache.custos.iam.service.RegisterUserRequest.client_sec', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -806,7 +806,7 @@ _REGISTERUSERREQUEST = _descriptor.Descriptor(
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='performedBy', full_name='org.apache.custos.iam.service.RegisterUserRequest.performedBy', index=5,
+ name='performed_by', full_name='org.apache.custos.iam.service.RegisterUserRequest.performed_by', index=5,
number=6, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -824,8 +824,8 @@ _REGISTERUSERREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1579,
- serialized_end=1762,
+ serialized_start=1602,
+ serialized_end=1790,
)
@@ -845,28 +845,28 @@ _REGISTERUSERSREQUEST = _descriptor.Descriptor(
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.iam.service.RegisterUsersRequest.tenantId', index=1,
+ name='tenant_id', full_name='org.apache.custos.iam.service.RegisterUsersRequest.tenant_id', index=1,
number=2, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='accessToken', full_name='org.apache.custos.iam.service.RegisterUsersRequest.accessToken', index=2,
+ name='access_token', full_name='org.apache.custos.iam.service.RegisterUsersRequest.access_token', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientId', full_name='org.apache.custos.iam.service.RegisterUsersRequest.clientId', index=3,
+ name='client_id', full_name='org.apache.custos.iam.service.RegisterUsersRequest.client_id', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='performedBy', full_name='org.apache.custos.iam.service.RegisterUsersRequest.performedBy', index=4,
+ name='performed_by', full_name='org.apache.custos.iam.service.RegisterUsersRequest.performed_by', index=4,
number=5, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -884,8 +884,8 @@ _REGISTERUSERSREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1765,
- serialized_end=1931,
+ serialized_start=1793,
+ serialized_end=1963,
)
@@ -916,8 +916,8 @@ _REGISTERUSERRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1933,
- serialized_end=1978,
+ serialized_start=1965,
+ serialized_end=2010,
)
@@ -930,14 +930,14 @@ _REGISTERUSERSRESPONSE = _descriptor.Descriptor(
create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='allUseresRegistered', full_name='org.apache.custos.iam.service.RegisterUsersResponse.allUseresRegistered', index=0,
+ name='all_useres_registered', full_name='org.apache.custos.iam.service.RegisterUsersResponse.all_useres_registered', index=0,
number=1, type=8, cpp_type=7, label=1,
has_default_value=False, default_value=False,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='failedUsers', full_name='org.apache.custos.iam.service.RegisterUsersResponse.failedUsers', index=1,
+ name='failed_users', full_name='org.apache.custos.iam.service.RegisterUsersResponse.failed_users', index=1,
number=2, type=11, cpp_type=10, label=3,
has_default_value=False, default_value=[],
message_type=None, enum_type=None, containing_type=None,
@@ -955,8 +955,8 @@ _REGISTERUSERSRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1980,
- serialized_end=2104,
+ serialized_start=2012,
+ serialized_end=2139,
)
@@ -1015,8 +1015,8 @@ _USERSEARCHMETADATA = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=2106,
- serialized_end=2210,
+ serialized_start=2141,
+ serialized_end=2245,
)
@@ -1050,14 +1050,14 @@ _FINDUSERSREQUEST = _descriptor.Descriptor(
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.iam.service.FindUsersRequest.tenantId', index=3,
+ name='tenant_id', full_name='org.apache.custos.iam.service.FindUsersRequest.tenant_id', index=3,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='accessToken', full_name='org.apache.custos.iam.service.FindUsersRequest.accessToken', index=4,
+ name='access_token', full_name='org.apache.custos.iam.service.FindUsersRequest.access_token', index=4,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -1089,8 +1089,8 @@ _FINDUSERSREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=2213,
- serialized_end=2405,
+ serialized_start=2248,
+ serialized_end=2442,
)
@@ -1110,14 +1110,14 @@ _USERSEARCHREQUEST = _descriptor.Descriptor(
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.iam.service.UserSearchRequest.tenantId', index=1,
+ name='tenant_id', full_name='org.apache.custos.iam.service.UserSearchRequest.tenant_id', index=1,
number=2, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='accessToken', full_name='org.apache.custos.iam.service.UserSearchRequest.accessToken', index=2,
+ name='access_token', full_name='org.apache.custos.iam.service.UserSearchRequest.access_token', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -1138,7 +1138,7 @@ _USERSEARCHREQUEST = _descriptor.Descriptor(
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='performedBy', full_name='org.apache.custos.iam.service.UserSearchRequest.performedBy', index=5,
+ name='performed_by', full_name='org.apache.custos.iam.service.UserSearchRequest.performed_by', index=5,
number=6, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -1156,8 +1156,8 @@ _USERSEARCHREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=2408,
- serialized_end=2591,
+ serialized_start=2445,
+ serialized_end=2631,
)
@@ -1188,8 +1188,8 @@ _FINDUSERSRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=2593,
- serialized_end=2678,
+ serialized_start=2633,
+ serialized_end=2718,
)
@@ -1216,28 +1216,28 @@ _RESETUSERPASSWORD = _descriptor.Descriptor(
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.iam.service.ResetUserPassword.tenantId', index=2,
+ name='tenant_id', full_name='org.apache.custos.iam.service.ResetUserPassword.tenant_id', index=2,
number=3, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='accessToken', full_name='org.apache.custos.iam.service.ResetUserPassword.accessToken', index=3,
+ name='access_token', full_name='org.apache.custos.iam.service.ResetUserPassword.access_token', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientId', full_name='org.apache.custos.iam.service.ResetUserPassword.clientId', index=4,
+ name='client_id', full_name='org.apache.custos.iam.service.ResetUserPassword.client_id', index=4,
number=5, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientSec', full_name='org.apache.custos.iam.service.ResetUserPassword.clientSec', index=5,
+ name='client_sec', full_name='org.apache.custos.iam.service.ResetUserPassword.client_sec', index=5,
number=6, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -1255,8 +1255,8 @@ _RESETUSERPASSWORD = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=2681,
- serialized_end=2812,
+ serialized_start=2721,
+ serialized_end=2856,
)
@@ -1336,8 +1336,8 @@ _DELETEUSERROLESREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=2815,
- serialized_end=2988,
+ serialized_start=2859,
+ serialized_end=3032,
)
@@ -1417,8 +1417,8 @@ _ADDUSERROLESREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=2991,
- serialized_end=3166,
+ serialized_start=3035,
+ serialized_end=3210,
)
@@ -1431,14 +1431,14 @@ _UPDATEUSERPROFILEREQUEST = _descriptor.Descriptor(
create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='accessToken', full_name='org.apache.custos.iam.service.UpdateUserProfileRequest.accessToken', index=0,
+ name='access_token', full_name='org.apache.custos.iam.service.UpdateUserProfileRequest.access_token', index=0,
number=1, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.iam.service.UpdateUserProfileRequest.tenantId', index=1,
+ name='tenant_id', full_name='org.apache.custos.iam.service.UpdateUserProfileRequest.tenant_id', index=1,
number=2, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
@@ -1463,8 +1463,8 @@ _UPDATEUSERPROFILEREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=3169,
- serialized_end=3299,
+ serialized_start=3213,
+ serialized_end=3345,
)
@@ -1495,8 +1495,8 @@ _ADDUSERRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=3301,
- serialized_end=3332,
+ serialized_start=3347,
+ serialized_end=3378,
)
@@ -1509,7 +1509,7 @@ _GETOPERATIONSMETADATAREQUEST = _descriptor.Descriptor(
create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='traceId', full_name='org.apache.custos.iam.service.GetOperationsMetadataRequest.traceId', index=0,
+ name='trace_id', full_name='org.apache.custos.iam.service.GetOperationsMetadataRequest.trace_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
@@ -1527,8 +1527,8 @@ _GETOPERATIONSMETADATAREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=3334,
- serialized_end=3381,
+ serialized_start=3380,
+ serialized_end=3428,
)
@@ -1555,14 +1555,14 @@ _OPERATIONMETADATA = _descriptor.Descriptor(
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='timeStamp', full_name='org.apache.custos.iam.service.OperationMetadata.timeStamp', index=2,
+ name='time_stamp', full_name='org.apache.custos.iam.service.OperationMetadata.time_stamp', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='performedBy', full_name='org.apache.custos.iam.service.OperationMetadata.performedBy', index=3,
+ name='performed_by', full_name='org.apache.custos.iam.service.OperationMetadata.performed_by', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
@@ -1580,8 +1580,8 @@ _OPERATIONMETADATA = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=3383,
- serialized_end=3473,
+ serialized_start=3430,
+ serialized_end=3522,
)
@@ -1612,8 +1612,8 @@ _GETOPERATIONSMETADATARESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=3475,
- serialized_end=3574,
+ serialized_start=3524,
+ serialized_end=3623,
)
@@ -1626,7 +1626,7 @@ _DELETETENANTREQUEST = _descriptor.Descriptor(
create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.iam.service.DeleteTenantRequest.tenantId', index=0,
+ name='tenant_id', full_name='org.apache.custos.iam.service.DeleteTenantRequest.tenant_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
@@ -1644,8 +1644,8 @@ _DELETETENANTREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=3576,
- serialized_end=3615,
+ serialized_start=3625,
+ serialized_end=3665,
)
@@ -1697,8 +1697,8 @@ _ADDROLESREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=3618,
- serialized_end=3761,
+ serialized_start=3668,
+ serialized_end=3811,
)
@@ -1743,8 +1743,8 @@ _GETROLESREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=3763,
- serialized_end=3840,
+ serialized_start=3813,
+ serialized_end=3890,
)
@@ -1777,6 +1777,66 @@ _ROLEREPRESENTATION = _descriptor.Descriptor(
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='id', full_name='org.apache.custos.iam.service.RoleRepresentation.id', index=3,
+ number=4, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=3892,
+ serialized_end=3978,
+)
+
+
+_DELETEROLEREQUEST = _descriptor.Descriptor(
+ name='DeleteRoleRequest',
+ full_name='org.apache.custos.iam.service.DeleteRoleRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='client_level', full_name='org.apache.custos.iam.service.DeleteRoleRequest.client_level', index=0,
+ number=1, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='tenant_id', full_name='org.apache.custos.iam.service.DeleteRoleRequest.tenant_id', index=1,
+ number=2, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.iam.service.DeleteRoleRequest.client_id', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='role', full_name='org.apache.custos.iam.service.DeleteRoleRequest.role', index=3,
+ number=4, type=11, cpp_type=10, label=1,
+ has_default_value=False, default_value=None,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -1789,8 +1849,8 @@ _ROLEREPRESENTATION = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=3842,
- serialized_end=3916,
+ serialized_start=3981,
+ serialized_end=4125,
)
@@ -1828,8 +1888,8 @@ _ALLROLES = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=3918,
- serialized_end=4009,
+ serialized_start=4127,
+ serialized_end=4218,
)
@@ -1937,8 +1997,8 @@ _ADDPROTOCOLMAPPERREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=4012,
- serialized_end=4404,
+ serialized_start=4221,
+ serialized_end=4613,
)
@@ -1969,8 +2029,8 @@ _OPERATIONSTATUS = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=4406,
- serialized_end=4439,
+ serialized_start=4615,
+ serialized_end=4648,
)
@@ -2043,8 +2103,8 @@ _ADDUSERATTRIBUTESREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=4442,
- serialized_end=4646,
+ serialized_start=4651,
+ serialized_end=4855,
)
@@ -2117,8 +2177,8 @@ _DELETEUSERATTRIBUTEREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=4649,
- serialized_end=4855,
+ serialized_start=4858,
+ serialized_end=5064,
)
@@ -2156,8 +2216,8 @@ _USERATTRIBUTE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=4857,
- serialized_end=4901,
+ serialized_start=5066,
+ serialized_end=5110,
)
@@ -2223,8 +2283,8 @@ _EVENTPERSISTENCEREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=4904,
- serialized_end=5046,
+ serialized_start=5113,
+ serialized_end=5255,
)
@@ -2290,8 +2350,8 @@ _GROUPSREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=5049,
- serialized_end=5229,
+ serialized_start=5258,
+ serialized_end=5438,
)
@@ -2364,8 +2424,8 @@ _GROUPREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=5232,
- serialized_end=5422,
+ serialized_start=5441,
+ serialized_end=5631,
)
@@ -2396,8 +2456,8 @@ _GROUPSRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=5424,
- serialized_end=5508,
+ serialized_start=5633,
+ serialized_end=5717,
)
@@ -2477,8 +2537,8 @@ _USERGROUPMAPPINGREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=5511,
- serialized_end=5694,
+ serialized_start=5720,
+ serialized_end=5903,
)
@@ -2551,8 +2611,8 @@ _AGENTCLIENTMETADATA = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=5697,
- serialized_end=5872,
+ serialized_start=5906,
+ serialized_end=6081,
)
@@ -2625,8 +2685,8 @@ _AGENT = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=5875,
- serialized_end=6071,
+ serialized_start=6084,
+ serialized_end=6280,
)
@@ -2671,8 +2731,8 @@ _GETALLRESOURCES = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=6073,
- serialized_end=6195,
+ serialized_start=6282,
+ serialized_end=6404,
)
@@ -2710,26 +2770,27 @@ _GETALLRESOURCESRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=6198,
- serialized_end=6343,
+ serialized_start=6407,
+ serialized_end=6552,
)
_CONFIGUREFEDERATEIDPREQUEST_CONFIGMAPENTRY.containing_type = _CONFIGUREFEDERATEIDPREQUEST
_CONFIGUREFEDERATEIDPREQUEST.fields_by_name['type'].enum_type = _FEDERATEDIDPS
-_CONFIGUREFEDERATEIDPREQUEST.fields_by_name['configMap'].message_type = _CONFIGUREFEDERATEIDPREQUEST_CONFIGMAPENTRY
+_CONFIGUREFEDERATEIDPREQUEST.fields_by_name['config_map'].message_type = _CONFIGUREFEDERATEIDPREQUEST_CONFIGMAPENTRY
_USERREPRESENTATION.fields_by_name['attributes'].message_type = _USERATTRIBUTE
_GROUPREPRESENTATION.fields_by_name['attributes'].message_type = _USERATTRIBUTE
_GROUPREPRESENTATION.fields_by_name['users'].message_type = _USERREPRESENTATION
_GROUPREPRESENTATION.fields_by_name['sub_groups'].message_type = _GROUPREPRESENTATION
_REGISTERUSERREQUEST.fields_by_name['user'].message_type = _USERREPRESENTATION
_REGISTERUSERSREQUEST.fields_by_name['users'].message_type = _USERREPRESENTATION
-_REGISTERUSERSRESPONSE.fields_by_name['failedUsers'].message_type = _USERREPRESENTATION
+_REGISTERUSERSRESPONSE.fields_by_name['failed_users'].message_type = _USERREPRESENTATION
_FINDUSERSREQUEST.fields_by_name['user'].message_type = _USERSEARCHMETADATA
_USERSEARCHREQUEST.fields_by_name['user'].message_type = _USERSEARCHMETADATA
_FINDUSERSRESPONSE.fields_by_name['users'].message_type = _USERREPRESENTATION
_UPDATEUSERPROFILEREQUEST.fields_by_name['user'].message_type = _USERREPRESENTATION
_GETOPERATIONSMETADATARESPONSE.fields_by_name['metadata'].message_type = _OPERATIONMETADATA
_ADDROLESREQUEST.fields_by_name['roles'].message_type = _ROLEREPRESENTATION
+_DELETEROLEREQUEST.fields_by_name['role'].message_type = _ROLEREPRESENTATION
_ALLROLES.fields_by_name['roles'].message_type = _ROLEREPRESENTATION
_ADDPROTOCOLMAPPERREQUEST.fields_by_name['claim_type'].enum_type = _CLAIMJSONTYPES
_ADDPROTOCOLMAPPERREQUEST.fields_by_name['mapper_type'].enum_type = _MAPPERTYPES
@@ -2770,6 +2831,7 @@ DESCRIPTOR.message_types_by_name['DeleteTenantRequest'] = _DELETETENANTREQUEST
DESCRIPTOR.message_types_by_name['AddRolesRequest'] = _ADDROLESREQUEST
DESCRIPTOR.message_types_by_name['GetRolesRequest'] = _GETROLESREQUEST
DESCRIPTOR.message_types_by_name['RoleRepresentation'] = _ROLEREPRESENTATION
+DESCRIPTOR.message_types_by_name['DeleteRoleRequest'] = _DELETEROLEREQUEST
DESCRIPTOR.message_types_by_name['AllRoles'] = _ALLROLES
DESCRIPTOR.message_types_by_name['AddProtocolMapperRequest'] = _ADDPROTOCOLMAPPERREQUEST
DESCRIPTOR.message_types_by_name['OperationStatus'] = _OPERATIONSTATUS
@@ -2995,6 +3057,13 @@ RoleRepresentation = _reflection.GeneratedProtocolMessageType('RoleRepresentatio
})
_sym_db.RegisterMessage(RoleRepresentation)
+DeleteRoleRequest = _reflection.GeneratedProtocolMessageType('DeleteRoleRequest', (_message.Message,), {
+ 'DESCRIPTOR' : _DELETEROLEREQUEST,
+ '__module__' : 'IamAdminService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.iam.service.DeleteRoleRequest)
+ })
+_sym_db.RegisterMessage(DeleteRoleRequest)
+
AllRoles = _reflection.GeneratedProtocolMessageType('AllRoles', (_message.Message,), {
'DESCRIPTOR' : _ALLROLES,
'__module__' : 'IamAdminService_pb2'
@@ -3111,8 +3180,8 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
index=0,
serialized_options=None,
create_key=_descriptor._internal_create_key,
- serialized_start=6638,
- serialized_end=12271,
+ serialized_start=6847,
+ serialized_end=12592,
methods=[
_descriptor.MethodDescriptor(
name='setUPTenant',
@@ -3185,9 +3254,19 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
+ name='deleteRole',
+ full_name='org.apache.custos.iam.service.IamAdminService.deleteRole',
+ index=7,
+ containing_service=None,
+ input_type=_DELETEROLEREQUEST,
+ output_type=_OPERATIONSTATUS,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
name='isUsernameAvailable',
full_name='org.apache.custos.iam.service.IamAdminService.isUsernameAvailable',
- index=7,
+ index=8,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3197,7 +3276,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='registerUser',
full_name='org.apache.custos.iam.service.IamAdminService.registerUser',
- index=8,
+ index=9,
containing_service=None,
input_type=_REGISTERUSERREQUEST,
output_type=_REGISTERUSERRESPONSE,
@@ -3207,7 +3286,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='enableUser',
full_name='org.apache.custos.iam.service.IamAdminService.enableUser',
- index=9,
+ index=10,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_USERREPRESENTATION,
@@ -3217,7 +3296,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='disableUser',
full_name='org.apache.custos.iam.service.IamAdminService.disableUser',
- index=10,
+ index=11,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_USERREPRESENTATION,
@@ -3227,7 +3306,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='isUserEnabled',
full_name='org.apache.custos.iam.service.IamAdminService.isUserEnabled',
- index=11,
+ index=12,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3237,7 +3316,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='isUserExist',
full_name='org.apache.custos.iam.service.IamAdminService.isUserExist',
- index=12,
+ index=13,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_CHECKINGRESPONSE,
@@ -3247,7 +3326,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='getUser',
full_name='org.apache.custos.iam.service.IamAdminService.getUser',
- index=13,
+ index=14,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_USERREPRESENTATION,
@@ -3257,7 +3336,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='findUsers',
full_name='org.apache.custos.iam.service.IamAdminService.findUsers',
- index=14,
+ index=15,
containing_service=None,
input_type=_FINDUSERSREQUEST,
output_type=_FINDUSERSRESPONSE,
@@ -3267,7 +3346,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='resetPassword',
full_name='org.apache.custos.iam.service.IamAdminService.resetPassword',
- index=15,
+ index=16,
containing_service=None,
input_type=_RESETUSERPASSWORD,
output_type=_OPERATIONSTATUS,
@@ -3277,7 +3356,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='grantAdminPrivilege',
full_name='org.apache.custos.iam.service.IamAdminService.grantAdminPrivilege',
- index=16,
+ index=17,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3287,7 +3366,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='removeAdminPrivilege',
full_name='org.apache.custos.iam.service.IamAdminService.removeAdminPrivilege',
- index=17,
+ index=18,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3297,7 +3376,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='registerAndEnableUsers',
full_name='org.apache.custos.iam.service.IamAdminService.registerAndEnableUsers',
- index=18,
+ index=19,
containing_service=None,
input_type=_REGISTERUSERSREQUEST,
output_type=_REGISTERUSERSRESPONSE,
@@ -3307,7 +3386,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='addUserAttributes',
full_name='org.apache.custos.iam.service.IamAdminService.addUserAttributes',
- index=19,
+ index=20,
containing_service=None,
input_type=_ADDUSERATTRIBUTESREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3317,7 +3396,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='deleteUserAttributes',
full_name='org.apache.custos.iam.service.IamAdminService.deleteUserAttributes',
- index=20,
+ index=21,
containing_service=None,
input_type=_DELETEUSERATTRIBUTEREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3327,7 +3406,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='addRolesToUsers',
full_name='org.apache.custos.iam.service.IamAdminService.addRolesToUsers',
- index=21,
+ index=22,
containing_service=None,
input_type=_ADDUSERROLESREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3337,7 +3416,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='deleteUser',
full_name='org.apache.custos.iam.service.IamAdminService.deleteUser',
- index=22,
+ index=23,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3347,7 +3426,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='deleteRolesFromUser',
full_name='org.apache.custos.iam.service.IamAdminService.deleteRolesFromUser',
- index=23,
+ index=24,
containing_service=None,
input_type=_DELETEUSERROLESREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3357,7 +3436,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='updateUserProfile',
full_name='org.apache.custos.iam.service.IamAdminService.updateUserProfile',
- index=24,
+ index=25,
containing_service=None,
input_type=_UPDATEUSERPROFILEREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3367,7 +3446,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='getOperationMetadata',
full_name='org.apache.custos.iam.service.IamAdminService.getOperationMetadata',
- index=25,
+ index=26,
containing_service=None,
input_type=_GETOPERATIONSMETADATAREQUEST,
output_type=_GETOPERATIONSMETADATARESPONSE,
@@ -3377,7 +3456,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='configureEventPersistence',
full_name='org.apache.custos.iam.service.IamAdminService.configureEventPersistence',
- index=26,
+ index=27,
containing_service=None,
input_type=_EVENTPERSISTENCEREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3387,7 +3466,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='createGroups',
full_name='org.apache.custos.iam.service.IamAdminService.createGroups',
- index=27,
+ index=28,
containing_service=None,
input_type=_GROUPSREQUEST,
output_type=_GROUPSRESPONSE,
@@ -3397,7 +3476,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='updateGroup',
full_name='org.apache.custos.iam.service.IamAdminService.updateGroup',
- index=28,
+ index=29,
containing_service=None,
input_type=_GROUPREQUEST,
output_type=_GROUPREPRESENTATION,
@@ -3407,7 +3486,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='deleteGroup',
full_name='org.apache.custos.iam.service.IamAdminService.deleteGroup',
- index=29,
+ index=30,
containing_service=None,
input_type=_GROUPREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3417,7 +3496,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='findGroup',
full_name='org.apache.custos.iam.service.IamAdminService.findGroup',
- index=30,
+ index=31,
containing_service=None,
input_type=_GROUPREQUEST,
output_type=_GROUPREPRESENTATION,
@@ -3427,7 +3506,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='getAllGroups',
full_name='org.apache.custos.iam.service.IamAdminService.getAllGroups',
- index=31,
+ index=32,
containing_service=None,
input_type=_GROUPREQUEST,
output_type=_GROUPSRESPONSE,
@@ -3437,7 +3516,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='addUserToGroup',
full_name='org.apache.custos.iam.service.IamAdminService.addUserToGroup',
- index=32,
+ index=33,
containing_service=None,
input_type=_USERGROUPMAPPINGREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3447,7 +3526,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='removeUserFromGroup',
full_name='org.apache.custos.iam.service.IamAdminService.removeUserFromGroup',
- index=33,
+ index=34,
containing_service=None,
input_type=_USERGROUPMAPPINGREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3457,7 +3536,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='createAgentClient',
full_name='org.apache.custos.iam.service.IamAdminService.createAgentClient',
- index=34,
+ index=35,
containing_service=None,
input_type=_AGENTCLIENTMETADATA,
output_type=_SETUPTENANTRESPONSE,
@@ -3467,7 +3546,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='configureAgentClient',
full_name='org.apache.custos.iam.service.IamAdminService.configureAgentClient',
- index=35,
+ index=36,
containing_service=None,
input_type=_AGENTCLIENTMETADATA,
output_type=_OPERATIONSTATUS,
@@ -3477,7 +3556,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='isAgentNameAvailable',
full_name='org.apache.custos.iam.service.IamAdminService.isAgentNameAvailable',
- index=36,
+ index=37,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3487,7 +3566,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='registerAndEnableAgent',
full_name='org.apache.custos.iam.service.IamAdminService.registerAndEnableAgent',
- index=37,
+ index=38,
containing_service=None,
input_type=_REGISTERUSERREQUEST,
output_type=_REGISTERUSERRESPONSE,
@@ -3497,7 +3576,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='deleteAgent',
full_name='org.apache.custos.iam.service.IamAdminService.deleteAgent',
- index=38,
+ index=39,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3507,7 +3586,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='getAgent',
full_name='org.apache.custos.iam.service.IamAdminService.getAgent',
- index=39,
+ index=40,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_AGENT,
@@ -3517,7 +3596,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='disableAgent',
full_name='org.apache.custos.iam.service.IamAdminService.disableAgent',
- index=40,
+ index=41,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3527,7 +3606,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='enableAgent',
full_name='org.apache.custos.iam.service.IamAdminService.enableAgent',
- index=41,
+ index=42,
containing_service=None,
input_type=_USERSEARCHREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3537,7 +3616,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='addAgentAttributes',
full_name='org.apache.custos.iam.service.IamAdminService.addAgentAttributes',
- index=42,
+ index=43,
containing_service=None,
input_type=_ADDUSERATTRIBUTESREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3547,7 +3626,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='deleteAgentAttributes',
full_name='org.apache.custos.iam.service.IamAdminService.deleteAgentAttributes',
- index=43,
+ index=44,
containing_service=None,
input_type=_DELETEUSERATTRIBUTEREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3557,7 +3636,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='addRolesToAgent',
full_name='org.apache.custos.iam.service.IamAdminService.addRolesToAgent',
- index=44,
+ index=45,
containing_service=None,
input_type=_ADDUSERROLESREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3567,7 +3646,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='deleteAgentRoles',
full_name='org.apache.custos.iam.service.IamAdminService.deleteAgentRoles',
- index=45,
+ index=46,
containing_service=None,
input_type=_DELETEUSERROLESREQUEST,
output_type=_OPERATIONSTATUS,
@@ -3577,7 +3656,7 @@ _IAMADMINSERVICE = _descriptor.ServiceDescriptor(
_descriptor.MethodDescriptor(
name='getAllResources',
full_name='org.apache.custos.iam.service.IamAdminService.getAllResources',
- index=46,
+ index=47,
containing_service=None,
input_type=_GETALLRESOURCES,
output_type=_GETALLRESOURCESRESPONSE,
diff --git a/custos-client-sdks/custos-python-sdk/custos/server/core/IamAdminService_pb2_grpc.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IamAdminService_pb2_grpc.py
similarity index 97%
copy from custos-client-sdks/custos-python-sdk/custos/server/core/IamAdminService_pb2_grpc.py
copy to custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IamAdminService_pb2_grpc.py
index 36e8812..8a23ea4 100644
--- a/custos-client-sdks/custos-python-sdk/custos/server/core/IamAdminService_pb2_grpc.py
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IamAdminService_pb2_grpc.py
@@ -1,3 +1,20 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements. See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership. The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing,
+# software distributed under the License is distributed on an
+# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+# KIND, either express or implied. See the License for the
+# specific language governing permissions and limitations
+# under the License.
+
# Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT!
"""Client and server classes corresponding to protobuf-defined services."""
import grpc
@@ -50,6 +67,11 @@ class IamAdminServiceStub(object):
request_serializer=IamAdminService__pb2.GetRolesRequest.SerializeToString,
response_deserializer=IamAdminService__pb2.AllRoles.FromString,
)
+ self.deleteRole = channel.unary_unary(
+ '/org.apache.custos.iam.service.IamAdminService/deleteRole',
+ request_serializer=IamAdminService__pb2.DeleteRoleRequest.SerializeToString,
+ response_deserializer=IamAdminService__pb2.OperationStatus.FromString,
+ )
self.isUsernameAvailable = channel.unary_unary(
'/org.apache.custos.iam.service.IamAdminService/isUsernameAvailable',
request_serializer=IamAdminService__pb2.UserSearchRequest.SerializeToString,
@@ -297,6 +319,12 @@ class IamAdminServiceServicer(object):
context.set_details('Method not implemented!')
raise NotImplementedError('Method not implemented!')
+ def deleteRole(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
def isUsernameAvailable(self, request, context):
"""Missing associated documentation comment in .proto file."""
context.set_code(grpc.StatusCode.UNIMPLEMENTED)
@@ -575,6 +603,11 @@ def add_IamAdminServiceServicer_to_server(servicer, server):
request_deserializer=IamAdminService__pb2.GetRolesRequest.FromString,
response_serializer=IamAdminService__pb2.AllRoles.SerializeToString,
),
+ 'deleteRole': grpc.unary_unary_rpc_method_handler(
+ servicer.deleteRole,
+ request_deserializer=IamAdminService__pb2.DeleteRoleRequest.FromString,
+ response_serializer=IamAdminService__pb2.OperationStatus.SerializeToString,
+ ),
'isUsernameAvailable': grpc.unary_unary_rpc_method_handler(
servicer.isUsernameAvailable,
request_deserializer=IamAdminService__pb2.UserSearchRequest.FromString,
@@ -905,6 +938,23 @@ class IamAdminService(object):
insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
@staticmethod
+ def deleteRole(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.iam.service.IamAdminService/deleteRole',
+ IamAdminService__pb2.DeleteRoleRequest.SerializeToString,
+ IamAdminService__pb2.OperationStatus.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
def isUsernameAvailable(request,
target,
options=(),
diff --git a/custos-client-sdks/custos-python-sdk/custos/server/core/IdentityService_pb2.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IdentityService_pb2.py
similarity index 70%
copy from custos-client-sdks/custos-python-sdk/custos/server/core/IdentityService_pb2.py
copy to custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IdentityService_pb2.py
index fced1b5..adabd34 100644
--- a/custos-client-sdks/custos-python-sdk/custos/server/core/IdentityService_pb2.py
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IdentityService_pb2.py
@@ -1,7 +1,7 @@
# -*- coding: utf-8 -*-
# Generated by the protocol buffer compiler. DO NOT EDIT!
# source: IdentityService.proto
-
+"""Generated protocol buffer code."""
from google.protobuf import descriptor as _descriptor
from google.protobuf import message as _message
from google.protobuf import reflection as _reflection
@@ -18,8 +18,9 @@ DESCRIPTOR = _descriptor.FileDescriptor(
name='IdentityService.proto',
package='org.apache.custos.identity.service',
syntax='proto3',
- serialized_options=b'P\001',
- serialized_pb=b'\n\x15IdentityService.proto\x12\"org.apache.custos.identity.service\x1a\x1cgoogle/protobuf/struct.proto\"[\n\tAuthToken\x12\x13\n\x0b\x61\x63\x63\x65ssToken\x18\x01 \x01(\t\x12\x39\n\x06\x63laims\x18\x02 \x03(\x0b\x32).org.apache.custos.identity.service.Claim\"#\n\x05\x43laim\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t\"r\n\x04User\x12\x0b\n\x03sub\x18\x01 \x01(\t\x12\x10\n\x08\x66ullName\x18\x02 \x01(\t\x12\x11\n\tfirstName\x18\x03 \x01(\t\x12\x10 [...]
+ serialized_options=b'P\001Z\004./pb',
+ create_key=_descriptor._internal_create_key,
+ serialized_pb=b'\n\x15IdentityService.proto\x12\"org.apache.custos.identity.service\x1a\x1cgoogle/protobuf/struct.proto\"\\\n\tAuthToken\x12\x14\n\x0c\x61\x63\x63\x65ss_token\x18\x01 \x01(\t\x12\x39\n\x06\x63laims\x18\x02 \x03(\x0b\x32).org.apache.custos.identity.service.Claim\"#\n\x05\x43laim\x12\x0b\n\x03key\x18\x01 \x01(\t\x12\r\n\x05value\x18\x02 \x01(\t\"v\n\x04User\x12\x0b\n\x03sub\x18\x01 \x01(\t\x12\x11\n\tfull_name\x18\x02 \x01(\t\x12\x12\n\nfirst_name\x18\x03 \x01(\t\x12\x11\ [...]
,
dependencies=[google_dot_protobuf_dot_struct__pb2.DESCRIPTOR,])
@@ -32,21 +33,22 @@ _AUTHTOKEN = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='accessToken', full_name='org.apache.custos.identity.service.AuthToken.accessToken', index=0,
+ name='access_token', full_name='org.apache.custos.identity.service.AuthToken.access_token', index=0,
number=1, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='claims', full_name='org.apache.custos.identity.service.AuthToken.claims', index=1,
number=2, type=11, cpp_type=10, label=3,
has_default_value=False, default_value=[],
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -60,7 +62,7 @@ _AUTHTOKEN = _descriptor.Descriptor(
oneofs=[
],
serialized_start=91,
- serialized_end=182,
+ serialized_end=183,
)
@@ -70,6 +72,7 @@ _CLAIM = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='key', full_name='org.apache.custos.identity.service.Claim.key', index=0,
@@ -77,14 +80,14 @@ _CLAIM = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='value', full_name='org.apache.custos.identity.service.Claim.value', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -97,8 +100,8 @@ _CLAIM = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=184,
- serialized_end=219,
+ serialized_start=185,
+ serialized_end=220,
)
@@ -108,6 +111,7 @@ _USER = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='sub', full_name='org.apache.custos.identity.service.User.sub', index=0,
@@ -115,42 +119,42 @@ _USER = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='fullName', full_name='org.apache.custos.identity.service.User.fullName', index=1,
+ name='full_name', full_name='org.apache.custos.identity.service.User.full_name', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='firstName', full_name='org.apache.custos.identity.service.User.firstName', index=2,
+ name='first_name', full_name='org.apache.custos.identity.service.User.first_name', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='lastName', full_name='org.apache.custos.identity.service.User.lastName', index=3,
+ name='last_name', full_name='org.apache.custos.identity.service.User.last_name', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='emailAddress', full_name='org.apache.custos.identity.service.User.emailAddress', index=4,
+ name='email_address', full_name='org.apache.custos.identity.service.User.email_address', index=4,
number=5, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='username', full_name='org.apache.custos.identity.service.User.username', index=5,
number=6, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -163,8 +167,8 @@ _USER = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=221,
- serialized_end=335,
+ serialized_start=222,
+ serialized_end=340,
)
@@ -174,6 +178,7 @@ _GETTOKENREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='tenant_id', full_name='org.apache.custos.identity.service.GetTokenRequest.tenant_id', index=0,
@@ -181,63 +186,63 @@ _GETTOKENREQUEST = _descriptor.Descriptor(
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='client_id', full_name='org.apache.custos.identity.service.GetTokenRequest.client_id', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='client_secret', full_name='org.apache.custos.identity.service.GetTokenRequest.client_secret', index=2,
number=3, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='redirect_uri', full_name='org.apache.custos.identity.service.GetTokenRequest.redirect_uri', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='code', full_name='org.apache.custos.identity.service.GetTokenRequest.code', index=4,
number=6, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='username', full_name='org.apache.custos.identity.service.GetTokenRequest.username', index=5,
number=7, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='password', full_name='org.apache.custos.identity.service.GetTokenRequest.password', index=6,
number=8, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='refresh_token', full_name='org.apache.custos.identity.service.GetTokenRequest.refresh_token', index=7,
number=9, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='grant_type', full_name='org.apache.custos.identity.service.GetTokenRequest.grant_type', index=8,
number=10, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -250,8 +255,8 @@ _GETTOKENREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=338,
- serialized_end=531,
+ serialized_start=343,
+ serialized_end=536,
)
@@ -261,6 +266,7 @@ _TOKENRESPONSE = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='access_token', full_name='org.apache.custos.identity.service.TokenResponse.access_token', index=0,
@@ -268,63 +274,63 @@ _TOKENRESPONSE = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='expires_in', full_name='org.apache.custos.identity.service.TokenResponse.expires_in', index=1,
number=2, type=1, cpp_type=5, label=1,
has_default_value=False, default_value=float(0),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='refresh_expires_in', full_name='org.apache.custos.identity.service.TokenResponse.refresh_expires_in', index=2,
number=3, type=1, cpp_type=5, label=1,
has_default_value=False, default_value=float(0),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='refresh_token', full_name='org.apache.custos.identity.service.TokenResponse.refresh_token', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='token_type', full_name='org.apache.custos.identity.service.TokenResponse.token_type', index=4,
number=5, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='id_token', full_name='org.apache.custos.identity.service.TokenResponse.id_token', index=5,
number=6, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='not_before_policy', full_name='org.apache.custos.identity.service.TokenResponse.not_before_policy', index=6,
number=7, type=1, cpp_type=5, label=1,
has_default_value=False, default_value=float(0),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='session_state', full_name='org.apache.custos.identity.service.TokenResponse.session_state', index=7,
number=8, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='scope', full_name='org.apache.custos.identity.service.TokenResponse.scope', index=8,
number=9, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -337,8 +343,8 @@ _TOKENRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=534,
- serialized_end=745,
+ serialized_start=539,
+ serialized_end=750,
)
@@ -348,42 +354,43 @@ _AUTHENTICATIONREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='clientId', full_name='org.apache.custos.identity.service.AuthenticationRequest.clientId', index=0,
+ name='client_id', full_name='org.apache.custos.identity.service.AuthenticationRequest.client_id', index=0,
number=1, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientSecret', full_name='org.apache.custos.identity.service.AuthenticationRequest.clientSecret', index=1,
+ name='client_secret', full_name='org.apache.custos.identity.service.AuthenticationRequest.client_secret', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.identity.service.AuthenticationRequest.tenantId', index=2,
+ name='tenant_id', full_name='org.apache.custos.identity.service.AuthenticationRequest.tenant_id', index=2,
number=3, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='username', full_name='org.apache.custos.identity.service.AuthenticationRequest.username', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='password', full_name='org.apache.custos.identity.service.AuthenticationRequest.password', index=4,
number=5, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -396,25 +403,26 @@ _AUTHENTICATIONREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=747,
- serialized_end=864,
+ serialized_start=752,
+ serialized_end=872,
)
-_ISAUTHENTICATERESPONSE = _descriptor.Descriptor(
- name='IsAuthenticateResponse',
- full_name='org.apache.custos.identity.service.IsAuthenticateResponse',
+_ISAUTHENTICATEDRESPONSE = _descriptor.Descriptor(
+ name='IsAuthenticatedResponse',
+ full_name='org.apache.custos.identity.service.IsAuthenticatedResponse',
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='authenticated', full_name='org.apache.custos.identity.service.IsAuthenticateResponse.authenticated', index=0,
+ name='authenticated', full_name='org.apache.custos.identity.service.IsAuthenticatedResponse.authenticated', index=0,
number=1, type=8, cpp_type=7, label=1,
has_default_value=False, default_value=False,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -427,8 +435,8 @@ _ISAUTHENTICATERESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=866,
- serialized_end=913,
+ serialized_start=874,
+ serialized_end=922,
)
@@ -438,28 +446,29 @@ _GETUSERMANAGEMENTSATOKENREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='clientId', full_name='org.apache.custos.identity.service.GetUserManagementSATokenRequest.clientId', index=0,
+ name='client_id', full_name='org.apache.custos.identity.service.GetUserManagementSATokenRequest.client_id', index=0,
number=1, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='clientSecret', full_name='org.apache.custos.identity.service.GetUserManagementSATokenRequest.clientSecret', index=1,
+ name='client_secret', full_name='org.apache.custos.identity.service.GetUserManagementSATokenRequest.client_secret', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.identity.service.GetUserManagementSATokenRequest.tenantId', index=2,
+ name='tenant_id', full_name='org.apache.custos.identity.service.GetUserManagementSATokenRequest.tenant_id', index=2,
number=3, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -472,8 +481,8 @@ _GETUSERMANAGEMENTSATOKENREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=915,
- serialized_end=1006,
+ serialized_start=924,
+ serialized_end=1018,
)
@@ -483,14 +492,15 @@ _GETAUTHORIZATIONENDPOINTREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='tenantId', full_name='org.apache.custos.identity.service.GetAuthorizationEndpointRequest.tenantId', index=0,
+ name='tenant_id', full_name='org.apache.custos.identity.service.GetAuthorizationEndpointRequest.tenant_id', index=0,
number=1, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -503,8 +513,8 @@ _GETAUTHORIZATIONENDPOINTREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1008,
- serialized_end=1059,
+ serialized_start=1020,
+ serialized_end=1072,
)
@@ -514,14 +524,15 @@ _AUTHORIZATIONRESPONSE = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
- name='authorizationEndpoint', full_name='org.apache.custos.identity.service.AuthorizationResponse.authorizationEndpoint', index=0,
+ name='authorization_endpoint', full_name='org.apache.custos.identity.service.AuthorizationResponse.authorization_endpoint', index=0,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -534,8 +545,8 @@ _AUTHORIZATIONRESPONSE = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1061,
- serialized_end=1115,
+ serialized_start=1074,
+ serialized_end=1129,
)
@@ -545,6 +556,7 @@ _GETOIDCCONFIGURATION = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='client_id', full_name='org.apache.custos.identity.service.GetOIDCConfiguration.client_id', index=0,
@@ -552,21 +564,21 @@ _GETOIDCCONFIGURATION = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='client_secret', full_name='org.apache.custos.identity.service.GetOIDCConfiguration.client_secret', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='tenant_id', full_name='org.apache.custos.identity.service.GetOIDCConfiguration.tenant_id', index=2,
number=3, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -579,8 +591,8 @@ _GETOIDCCONFIGURATION = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1117,
- serialized_end=1200,
+ serialized_start=1131,
+ serialized_end=1214,
)
@@ -590,6 +602,7 @@ _GETJWKSREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='client_id', full_name='org.apache.custos.identity.service.GetJWKSRequest.client_id', index=0,
@@ -597,21 +610,21 @@ _GETJWKSREQUEST = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='client_secret', full_name='org.apache.custos.identity.service.GetJWKSRequest.client_secret', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='tenant_id', full_name='org.apache.custos.identity.service.GetJWKSRequest.tenant_id', index=2,
number=3, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -624,8 +637,8 @@ _GETJWKSREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1202,
- serialized_end=1279,
+ serialized_start=1216,
+ serialized_end=1293,
)
@@ -635,6 +648,7 @@ _ENDSESSIONREQUEST = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='client_id', full_name='org.apache.custos.identity.service.EndSessionRequest.client_id', index=0,
@@ -642,28 +656,28 @@ _ENDSESSIONREQUEST = _descriptor.Descriptor(
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='client_secret', full_name='org.apache.custos.identity.service.EndSessionRequest.client_secret', index=1,
number=2, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='tenant_id', full_name='org.apache.custos.identity.service.EndSessionRequest.tenant_id', index=2,
number=3, type=3, cpp_type=2, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
name='refresh_token', full_name='org.apache.custos.identity.service.EndSessionRequest.refresh_token', index=3,
number=4, type=9, cpp_type=9, label=1,
has_default_value=False, default_value=b"".decode('utf-8'),
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -676,8 +690,8 @@ _ENDSESSIONREQUEST = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1281,
- serialized_end=1384,
+ serialized_start=1295,
+ serialized_end=1398,
)
@@ -687,6 +701,7 @@ _OPERATIONSTATUS = _descriptor.Descriptor(
filename=None,
file=DESCRIPTOR,
containing_type=None,
+ create_key=_descriptor._internal_create_key,
fields=[
_descriptor.FieldDescriptor(
name='status', full_name='org.apache.custos.identity.service.OperationStatus.status', index=0,
@@ -694,7 +709,7 @@ _OPERATIONSTATUS = _descriptor.Descriptor(
has_default_value=False, default_value=False,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
- serialized_options=None, file=DESCRIPTOR),
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -707,8 +722,8 @@ _OPERATIONSTATUS = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=1386,
- serialized_end=1419,
+ serialized_start=1400,
+ serialized_end=1433,
)
_AUTHTOKEN.fields_by_name['claims'].message_type = _CLAIM
@@ -718,7 +733,7 @@ DESCRIPTOR.message_types_by_name['User'] = _USER
DESCRIPTOR.message_types_by_name['GetTokenRequest'] = _GETTOKENREQUEST
DESCRIPTOR.message_types_by_name['TokenResponse'] = _TOKENRESPONSE
DESCRIPTOR.message_types_by_name['AuthenticationRequest'] = _AUTHENTICATIONREQUEST
-DESCRIPTOR.message_types_by_name['IsAuthenticateResponse'] = _ISAUTHENTICATERESPONSE
+DESCRIPTOR.message_types_by_name['IsAuthenticatedResponse'] = _ISAUTHENTICATEDRESPONSE
DESCRIPTOR.message_types_by_name['GetUserManagementSATokenRequest'] = _GETUSERMANAGEMENTSATOKENREQUEST
DESCRIPTOR.message_types_by_name['GetAuthorizationEndpointRequest'] = _GETAUTHORIZATIONENDPOINTREQUEST
DESCRIPTOR.message_types_by_name['AuthorizationResponse'] = _AUTHORIZATIONRESPONSE
@@ -770,12 +785,12 @@ AuthenticationRequest = _reflection.GeneratedProtocolMessageType('Authentication
})
_sym_db.RegisterMessage(AuthenticationRequest)
-IsAuthenticateResponse = _reflection.GeneratedProtocolMessageType('IsAuthenticateResponse', (_message.Message,), {
- 'DESCRIPTOR' : _ISAUTHENTICATERESPONSE,
+IsAuthenticatedResponse = _reflection.GeneratedProtocolMessageType('IsAuthenticatedResponse', (_message.Message,), {
+ 'DESCRIPTOR' : _ISAUTHENTICATEDRESPONSE,
'__module__' : 'IdentityService_pb2'
- # @@protoc_insertion_point(class_scope:org.apache.custos.identity.service.IsAuthenticateResponse)
+ # @@protoc_insertion_point(class_scope:org.apache.custos.identity.service.IsAuthenticatedResponse)
})
-_sym_db.RegisterMessage(IsAuthenticateResponse)
+_sym_db.RegisterMessage(IsAuthenticatedResponse)
GetUserManagementSATokenRequest = _reflection.GeneratedProtocolMessageType('GetUserManagementSATokenRequest', (_message.Message,), {
'DESCRIPTOR' : _GETUSERMANAGEMENTSATOKENREQUEST,
@@ -835,8 +850,9 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
file=DESCRIPTOR,
index=0,
serialized_options=None,
- serialized_start=1422,
- serialized_end=2731,
+ create_key=_descriptor._internal_create_key,
+ serialized_start=1436,
+ serialized_end=2747,
methods=[
_descriptor.MethodDescriptor(
name='authenticate',
@@ -846,15 +862,17 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
input_type=_AUTHENTICATIONREQUEST,
output_type=_AUTHTOKEN,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
- name='isAuthenticate',
- full_name='org.apache.custos.identity.service.IdentityService.isAuthenticate',
+ name='isAuthenticated',
+ full_name='org.apache.custos.identity.service.IdentityService.isAuthenticated',
index=1,
containing_service=None,
input_type=_AUTHTOKEN,
- output_type=_ISAUTHENTICATERESPONSE,
+ output_type=_ISAUTHENTICATEDRESPONSE,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getUser',
@@ -864,6 +882,7 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
input_type=_AUTHTOKEN,
output_type=_USER,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getUserManagementServiceAccountAccessToken',
@@ -873,6 +892,7 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
input_type=_GETUSERMANAGEMENTSATOKENREQUEST,
output_type=_AUTHTOKEN,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getToken',
@@ -882,6 +902,7 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
input_type=_GETTOKENREQUEST,
output_type=google_dot_protobuf_dot_struct__pb2._STRUCT,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getAuthorizeEndpoint',
@@ -891,6 +912,7 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
input_type=_GETAUTHORIZATIONENDPOINTREQUEST,
output_type=_AUTHORIZATIONRESPONSE,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getOIDCConfiguration',
@@ -900,6 +922,7 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
input_type=_GETOIDCCONFIGURATION,
output_type=google_dot_protobuf_dot_struct__pb2._STRUCT,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getTokenByPasswordGrantType',
@@ -909,6 +932,7 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
input_type=_GETTOKENREQUEST,
output_type=google_dot_protobuf_dot_struct__pb2._STRUCT,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getTokenByRefreshTokenGrantType',
@@ -918,6 +942,7 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
input_type=_GETTOKENREQUEST,
output_type=google_dot_protobuf_dot_struct__pb2._STRUCT,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='getJWKS',
@@ -927,6 +952,7 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
input_type=_GETJWKSREQUEST,
output_type=google_dot_protobuf_dot_struct__pb2._STRUCT,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
_descriptor.MethodDescriptor(
name='endSession',
@@ -936,6 +962,7 @@ _IDENTITYSERVICE = _descriptor.ServiceDescriptor(
input_type=_ENDSESSIONREQUEST,
output_type=_OPERATIONSTATUS,
serialized_options=None,
+ create_key=_descriptor._internal_create_key,
),
])
_sym_db.RegisterServiceDescriptor(_IDENTITYSERVICE)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IdentityService_pb2_grpc.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IdentityService_pb2_grpc.py
new file mode 100644
index 0000000..3555342
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/IdentityService_pb2_grpc.py
@@ -0,0 +1,414 @@
+# Licensed to the Apache Software Foundation (ASF) under one
+# or more contributor license agreements. See the NOTICE file
+# distributed with this work for additional information
+# regarding copyright ownership. The ASF licenses this file
+# to you under the Apache License, Version 2.0 (the
+# "License"); you may not use this file except in compliance
+# with the License. You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing,
+# software distributed under the License is distributed on an
+# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+# KIND, either express or implied. See the License for the
+# specific language governing permissions and limitations
+# under the License.
+
+# Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT!
+"""Client and server classes corresponding to protobuf-defined services."""
+import grpc
+
+import custos.server.core.IdentityService_pb2 as IdentityService__pb2
+from google.protobuf import struct_pb2 as google_dot_protobuf_dot_struct__pb2
+
+
+class IdentityServiceStub(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def __init__(self, channel):
+ """Constructor.
+
+ Args:
+ channel: A grpc.Channel.
+ """
+ self.authenticate = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/authenticate',
+ request_serializer=IdentityService__pb2.AuthenticationRequest.SerializeToString,
+ response_deserializer=IdentityService__pb2.AuthToken.FromString,
+ )
+ self.isAuthenticated = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/isAuthenticated',
+ request_serializer=IdentityService__pb2.AuthToken.SerializeToString,
+ response_deserializer=IdentityService__pb2.IsAuthenticatedResponse.FromString,
+ )
+ self.getUser = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/getUser',
+ request_serializer=IdentityService__pb2.AuthToken.SerializeToString,
+ response_deserializer=IdentityService__pb2.User.FromString,
+ )
+ self.getUserManagementServiceAccountAccessToken = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/getUserManagementServiceAccountAccessToken',
+ request_serializer=IdentityService__pb2.GetUserManagementSATokenRequest.SerializeToString,
+ response_deserializer=IdentityService__pb2.AuthToken.FromString,
+ )
+ self.getToken = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/getToken',
+ request_serializer=IdentityService__pb2.GetTokenRequest.SerializeToString,
+ response_deserializer=google_dot_protobuf_dot_struct__pb2.Struct.FromString,
+ )
+ self.getAuthorizeEndpoint = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/getAuthorizeEndpoint',
+ request_serializer=IdentityService__pb2.GetAuthorizationEndpointRequest.SerializeToString,
+ response_deserializer=IdentityService__pb2.AuthorizationResponse.FromString,
+ )
+ self.getOIDCConfiguration = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/getOIDCConfiguration',
+ request_serializer=IdentityService__pb2.GetOIDCConfiguration.SerializeToString,
+ response_deserializer=google_dot_protobuf_dot_struct__pb2.Struct.FromString,
+ )
+ self.getTokenByPasswordGrantType = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/getTokenByPasswordGrantType',
+ request_serializer=IdentityService__pb2.GetTokenRequest.SerializeToString,
+ response_deserializer=google_dot_protobuf_dot_struct__pb2.Struct.FromString,
+ )
+ self.getTokenByRefreshTokenGrantType = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/getTokenByRefreshTokenGrantType',
+ request_serializer=IdentityService__pb2.GetTokenRequest.SerializeToString,
+ response_deserializer=google_dot_protobuf_dot_struct__pb2.Struct.FromString,
+ )
+ self.getJWKS = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/getJWKS',
+ request_serializer=IdentityService__pb2.GetJWKSRequest.SerializeToString,
+ response_deserializer=google_dot_protobuf_dot_struct__pb2.Struct.FromString,
+ )
+ self.endSession = channel.unary_unary(
+ '/org.apache.custos.identity.service.IdentityService/endSession',
+ request_serializer=IdentityService__pb2.EndSessionRequest.SerializeToString,
+ response_deserializer=IdentityService__pb2.OperationStatus.FromString,
+ )
+
+
+class IdentityServiceServicer(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def authenticate(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def isAuthenticated(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getUser(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getUserManagementServiceAccountAccessToken(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getToken(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getAuthorizeEndpoint(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getOIDCConfiguration(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getTokenByPasswordGrantType(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getTokenByRefreshTokenGrantType(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getJWKS(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def endSession(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+
+def add_IdentityServiceServicer_to_server(servicer, server):
+ rpc_method_handlers = {
+ 'authenticate': grpc.unary_unary_rpc_method_handler(
+ servicer.authenticate,
+ request_deserializer=IdentityService__pb2.AuthenticationRequest.FromString,
+ response_serializer=IdentityService__pb2.AuthToken.SerializeToString,
+ ),
+ 'isAuthenticated': grpc.unary_unary_rpc_method_handler(
+ servicer.isAuthenticated,
+ request_deserializer=IdentityService__pb2.AuthToken.FromString,
+ response_serializer=IdentityService__pb2.IsAuthenticatedResponse.SerializeToString,
+ ),
+ 'getUser': grpc.unary_unary_rpc_method_handler(
+ servicer.getUser,
+ request_deserializer=IdentityService__pb2.AuthToken.FromString,
+ response_serializer=IdentityService__pb2.User.SerializeToString,
+ ),
+ 'getUserManagementServiceAccountAccessToken': grpc.unary_unary_rpc_method_handler(
+ servicer.getUserManagementServiceAccountAccessToken,
+ request_deserializer=IdentityService__pb2.GetUserManagementSATokenRequest.FromString,
+ response_serializer=IdentityService__pb2.AuthToken.SerializeToString,
+ ),
+ 'getToken': grpc.unary_unary_rpc_method_handler(
+ servicer.getToken,
+ request_deserializer=IdentityService__pb2.GetTokenRequest.FromString,
+ response_serializer=google_dot_protobuf_dot_struct__pb2.Struct.SerializeToString,
+ ),
+ 'getAuthorizeEndpoint': grpc.unary_unary_rpc_method_handler(
+ servicer.getAuthorizeEndpoint,
+ request_deserializer=IdentityService__pb2.GetAuthorizationEndpointRequest.FromString,
+ response_serializer=IdentityService__pb2.AuthorizationResponse.SerializeToString,
+ ),
+ 'getOIDCConfiguration': grpc.unary_unary_rpc_method_handler(
+ servicer.getOIDCConfiguration,
+ request_deserializer=IdentityService__pb2.GetOIDCConfiguration.FromString,
+ response_serializer=google_dot_protobuf_dot_struct__pb2.Struct.SerializeToString,
+ ),
+ 'getTokenByPasswordGrantType': grpc.unary_unary_rpc_method_handler(
+ servicer.getTokenByPasswordGrantType,
+ request_deserializer=IdentityService__pb2.GetTokenRequest.FromString,
+ response_serializer=google_dot_protobuf_dot_struct__pb2.Struct.SerializeToString,
+ ),
+ 'getTokenByRefreshTokenGrantType': grpc.unary_unary_rpc_method_handler(
+ servicer.getTokenByRefreshTokenGrantType,
+ request_deserializer=IdentityService__pb2.GetTokenRequest.FromString,
+ response_serializer=google_dot_protobuf_dot_struct__pb2.Struct.SerializeToString,
+ ),
+ 'getJWKS': grpc.unary_unary_rpc_method_handler(
+ servicer.getJWKS,
+ request_deserializer=IdentityService__pb2.GetJWKSRequest.FromString,
+ response_serializer=google_dot_protobuf_dot_struct__pb2.Struct.SerializeToString,
+ ),
+ 'endSession': grpc.unary_unary_rpc_method_handler(
+ servicer.endSession,
+ request_deserializer=IdentityService__pb2.EndSessionRequest.FromString,
+ response_serializer=IdentityService__pb2.OperationStatus.SerializeToString,
+ ),
+ }
+ generic_handler = grpc.method_handlers_generic_handler(
+ 'org.apache.custos.identity.service.IdentityService', rpc_method_handlers)
+ server.add_generic_rpc_handlers((generic_handler,))
+
+
+ # This class is part of an EXPERIMENTAL API.
+class IdentityService(object):
+ """Missing associated documentation comment in .proto file."""
+
+ @staticmethod
+ def authenticate(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/authenticate',
+ IdentityService__pb2.AuthenticationRequest.SerializeToString,
+ IdentityService__pb2.AuthToken.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def isAuthenticated(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/isAuthenticated',
+ IdentityService__pb2.AuthToken.SerializeToString,
+ IdentityService__pb2.IsAuthenticatedResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getUser(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/getUser',
+ IdentityService__pb2.AuthToken.SerializeToString,
+ IdentityService__pb2.User.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getUserManagementServiceAccountAccessToken(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/getUserManagementServiceAccountAccessToken',
+ IdentityService__pb2.GetUserManagementSATokenRequest.SerializeToString,
+ IdentityService__pb2.AuthToken.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getToken(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/getToken',
+ IdentityService__pb2.GetTokenRequest.SerializeToString,
+ google_dot_protobuf_dot_struct__pb2.Struct.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getAuthorizeEndpoint(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/getAuthorizeEndpoint',
+ IdentityService__pb2.GetAuthorizationEndpointRequest.SerializeToString,
+ IdentityService__pb2.AuthorizationResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getOIDCConfiguration(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/getOIDCConfiguration',
+ IdentityService__pb2.GetOIDCConfiguration.SerializeToString,
+ google_dot_protobuf_dot_struct__pb2.Struct.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getTokenByPasswordGrantType(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/getTokenByPasswordGrantType',
+ IdentityService__pb2.GetTokenRequest.SerializeToString,
+ google_dot_protobuf_dot_struct__pb2.Struct.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getTokenByRefreshTokenGrantType(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/getTokenByRefreshTokenGrantType',
+ IdentityService__pb2.GetTokenRequest.SerializeToString,
+ google_dot_protobuf_dot_struct__pb2.Struct.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getJWKS(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/getJWKS',
+ IdentityService__pb2.GetJWKSRequest.SerializeToString,
+ google_dot_protobuf_dot_struct__pb2.Struct.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def endSession(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.identity.service.IdentityService/endSession',
+ IdentityService__pb2.EndSessionRequest.SerializeToString,
+ IdentityService__pb2.OperationStatus.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/LoggingService_pb2.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/LoggingService_pb2.py
new file mode 100644
index 0000000..6cf3ef4
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/LoggingService_pb2.py
@@ -0,0 +1,402 @@
+# -*- coding: utf-8 -*-
+# Generated by the protocol buffer compiler. DO NOT EDIT!
+# source: LoggingService.proto
+"""Generated protocol buffer code."""
+from google.protobuf import descriptor as _descriptor
+from google.protobuf import message as _message
+from google.protobuf import reflection as _reflection
+from google.protobuf import symbol_database as _symbol_database
+# @@protoc_insertion_point(imports)
+
+_sym_db = _symbol_database.Default()
+
+
+from google.protobuf import empty_pb2 as google_dot_protobuf_dot_empty__pb2
+
+
+DESCRIPTOR = _descriptor.FileDescriptor(
+ name='LoggingService.proto',
+ package='org.apache.custos.logging.service',
+ syntax='proto3',
+ serialized_options=b'P\001Z\004./pb',
+ create_key=_descriptor._internal_create_key,
+ serialized_pb=b'\n\x14LoggingService.proto\x12!org.apache.custos.logging.service\x1a\x1bgoogle/protobuf/empty.proto\"\x97\x01\n\x08LogEvent\x12\x14\n\x0c\x63reated_time\x18\x01 \x01(\x03\x12\x14\n\x0cservice_name\x18\x02 \x01(\t\x12\x12\n\nevent_type\x18\x03 \x01(\t\x12\x10\n\x08username\x18\x04 \x01(\t\x12\x11\n\tclient_id\x18\x05 \x01(\t\x12\x11\n\ttenant_id\x18\x06 \x01(\x03\x12\x13\n\x0b\x65xternal_ip\x18\x07 \x01(\t\"\x18\n\x06Status\x12\x0e\n\x06status\x18\x01 \x01(\x08\"\xcb\x01 [...]
+ ,
+ dependencies=[google_dot_protobuf_dot_empty__pb2.DESCRIPTOR,])
+
+
+
+
+_LOGEVENT = _descriptor.Descriptor(
+ name='LogEvent',
+ full_name='org.apache.custos.logging.service.LogEvent',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='created_time', full_name='org.apache.custos.logging.service.LogEvent.created_time', index=0,
+ number=1, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='service_name', full_name='org.apache.custos.logging.service.LogEvent.service_name', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='event_type', full_name='org.apache.custos.logging.service.LogEvent.event_type', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='username', full_name='org.apache.custos.logging.service.LogEvent.username', index=3,
+ number=4, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.logging.service.LogEvent.client_id', index=4,
+ number=5, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='tenant_id', full_name='org.apache.custos.logging.service.LogEvent.tenant_id', index=5,
+ number=6, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='external_ip', full_name='org.apache.custos.logging.service.LogEvent.external_ip', index=6,
+ number=7, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=89,
+ serialized_end=240,
+)
+
+
+_STATUS = _descriptor.Descriptor(
+ name='Status',
+ full_name='org.apache.custos.logging.service.Status',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='status', full_name='org.apache.custos.logging.service.Status.status', index=0,
+ number=1, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=242,
+ serialized_end=266,
+)
+
+
+_LOGEVENTREQUEST = _descriptor.Descriptor(
+ name='LogEventRequest',
+ full_name='org.apache.custos.logging.service.LogEventRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='tenant_id', full_name='org.apache.custos.logging.service.LogEventRequest.tenant_id', index=0,
+ number=1, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='start_time', full_name='org.apache.custos.logging.service.LogEventRequest.start_time', index=1,
+ number=2, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='end_time', full_name='org.apache.custos.logging.service.LogEventRequest.end_time', index=2,
+ number=3, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.logging.service.LogEventRequest.client_id', index=3,
+ number=4, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='username', full_name='org.apache.custos.logging.service.LogEventRequest.username', index=4,
+ number=5, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='remote_ip', full_name='org.apache.custos.logging.service.LogEventRequest.remote_ip', index=5,
+ number=6, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='service_name', full_name='org.apache.custos.logging.service.LogEventRequest.service_name', index=6,
+ number=7, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='event_type', full_name='org.apache.custos.logging.service.LogEventRequest.event_type', index=7,
+ number=8, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='offset', full_name='org.apache.custos.logging.service.LogEventRequest.offset', index=8,
+ number=9, type=5, cpp_type=1, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='limit', full_name='org.apache.custos.logging.service.LogEventRequest.limit', index=9,
+ number=10, type=5, cpp_type=1, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=269,
+ serialized_end=472,
+)
+
+
+_LOGEVENTS = _descriptor.Descriptor(
+ name='LogEvents',
+ full_name='org.apache.custos.logging.service.LogEvents',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='events', full_name='org.apache.custos.logging.service.LogEvents.events', index=0,
+ number=1, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=474,
+ serialized_end=546,
+)
+
+
+_LOGGINGCONFIGURATIONREQUEST = _descriptor.Descriptor(
+ name='LoggingConfigurationRequest',
+ full_name='org.apache.custos.logging.service.LoggingConfigurationRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='tenant_id', full_name='org.apache.custos.logging.service.LoggingConfigurationRequest.tenant_id', index=0,
+ number=1, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.logging.service.LoggingConfigurationRequest.client_id', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=548,
+ serialized_end=615,
+)
+
+_LOGEVENTS.fields_by_name['events'].message_type = _LOGEVENT
+DESCRIPTOR.message_types_by_name['LogEvent'] = _LOGEVENT
+DESCRIPTOR.message_types_by_name['Status'] = _STATUS
+DESCRIPTOR.message_types_by_name['LogEventRequest'] = _LOGEVENTREQUEST
+DESCRIPTOR.message_types_by_name['LogEvents'] = _LOGEVENTS
+DESCRIPTOR.message_types_by_name['LoggingConfigurationRequest'] = _LOGGINGCONFIGURATIONREQUEST
+_sym_db.RegisterFileDescriptor(DESCRIPTOR)
+
+LogEvent = _reflection.GeneratedProtocolMessageType('LogEvent', (_message.Message,), {
+ 'DESCRIPTOR' : _LOGEVENT,
+ '__module__' : 'LoggingService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.logging.service.LogEvent)
+ })
+_sym_db.RegisterMessage(LogEvent)
+
+Status = _reflection.GeneratedProtocolMessageType('Status', (_message.Message,), {
+ 'DESCRIPTOR' : _STATUS,
+ '__module__' : 'LoggingService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.logging.service.Status)
+ })
+_sym_db.RegisterMessage(Status)
+
+LogEventRequest = _reflection.GeneratedProtocolMessageType('LogEventRequest', (_message.Message,), {
+ 'DESCRIPTOR' : _LOGEVENTREQUEST,
+ '__module__' : 'LoggingService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.logging.service.LogEventRequest)
+ })
+_sym_db.RegisterMessage(LogEventRequest)
+
+LogEvents = _reflection.GeneratedProtocolMessageType('LogEvents', (_message.Message,), {
+ 'DESCRIPTOR' : _LOGEVENTS,
+ '__module__' : 'LoggingService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.logging.service.LogEvents)
+ })
+_sym_db.RegisterMessage(LogEvents)
+
+LoggingConfigurationRequest = _reflection.GeneratedProtocolMessageType('LoggingConfigurationRequest', (_message.Message,), {
+ 'DESCRIPTOR' : _LOGGINGCONFIGURATIONREQUEST,
+ '__module__' : 'LoggingService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.logging.service.LoggingConfigurationRequest)
+ })
+_sym_db.RegisterMessage(LoggingConfigurationRequest)
+
+
+DESCRIPTOR._options = None
+
+_LOGGINGSERVICE = _descriptor.ServiceDescriptor(
+ name='LoggingService',
+ full_name='org.apache.custos.logging.service.LoggingService',
+ file=DESCRIPTOR,
+ index=0,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ serialized_start=618,
+ serialized_end=1091,
+ methods=[
+ _descriptor.MethodDescriptor(
+ name='addLogEvent',
+ full_name='org.apache.custos.logging.service.LoggingService.addLogEvent',
+ index=0,
+ containing_service=None,
+ input_type=_LOGEVENT,
+ output_type=_STATUS,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='getLogEvents',
+ full_name='org.apache.custos.logging.service.LoggingService.getLogEvents',
+ index=1,
+ containing_service=None,
+ input_type=_LOGEVENTREQUEST,
+ output_type=_LOGEVENTS,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='isLogEnabled',
+ full_name='org.apache.custos.logging.service.LoggingService.isLogEnabled',
+ index=2,
+ containing_service=None,
+ input_type=_LOGGINGCONFIGURATIONREQUEST,
+ output_type=_STATUS,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='enable',
+ full_name='org.apache.custos.logging.service.LoggingService.enable',
+ index=3,
+ containing_service=None,
+ input_type=_LOGGINGCONFIGURATIONREQUEST,
+ output_type=_STATUS,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+])
+_sym_db.RegisterServiceDescriptor(_LOGGINGSERVICE)
+
+DESCRIPTOR.services_by_name['LoggingService'] = _LOGGINGSERVICE
+
+# @@protoc_insertion_point(module_scope)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/LoggingService_pb2_grpc.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/LoggingService_pb2_grpc.py
new file mode 100644
index 0000000..8b44c96
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/LoggingService_pb2_grpc.py
@@ -0,0 +1,165 @@
+# Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT!
+"""Client and server classes corresponding to protobuf-defined services."""
+import grpc
+
+import custos.server.core.LoggingService_pb2 as LoggingService__pb2
+
+
+class LoggingServiceStub(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def __init__(self, channel):
+ """Constructor.
+
+ Args:
+ channel: A grpc.Channel.
+ """
+ self.addLogEvent = channel.unary_unary(
+ '/org.apache.custos.logging.service.LoggingService/addLogEvent',
+ request_serializer=LoggingService__pb2.LogEvent.SerializeToString,
+ response_deserializer=LoggingService__pb2.Status.FromString,
+ )
+ self.getLogEvents = channel.unary_unary(
+ '/org.apache.custos.logging.service.LoggingService/getLogEvents',
+ request_serializer=LoggingService__pb2.LogEventRequest.SerializeToString,
+ response_deserializer=LoggingService__pb2.LogEvents.FromString,
+ )
+ self.isLogEnabled = channel.unary_unary(
+ '/org.apache.custos.logging.service.LoggingService/isLogEnabled',
+ request_serializer=LoggingService__pb2.LoggingConfigurationRequest.SerializeToString,
+ response_deserializer=LoggingService__pb2.Status.FromString,
+ )
+ self.enable = channel.unary_unary(
+ '/org.apache.custos.logging.service.LoggingService/enable',
+ request_serializer=LoggingService__pb2.LoggingConfigurationRequest.SerializeToString,
+ response_deserializer=LoggingService__pb2.Status.FromString,
+ )
+
+
+class LoggingServiceServicer(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def addLogEvent(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def getLogEvents(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def isLogEnabled(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def enable(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+
+def add_LoggingServiceServicer_to_server(servicer, server):
+ rpc_method_handlers = {
+ 'addLogEvent': grpc.unary_unary_rpc_method_handler(
+ servicer.addLogEvent,
+ request_deserializer=LoggingService__pb2.LogEvent.FromString,
+ response_serializer=LoggingService__pb2.Status.SerializeToString,
+ ),
+ 'getLogEvents': grpc.unary_unary_rpc_method_handler(
+ servicer.getLogEvents,
+ request_deserializer=LoggingService__pb2.LogEventRequest.FromString,
+ response_serializer=LoggingService__pb2.LogEvents.SerializeToString,
+ ),
+ 'isLogEnabled': grpc.unary_unary_rpc_method_handler(
+ servicer.isLogEnabled,
+ request_deserializer=LoggingService__pb2.LoggingConfigurationRequest.FromString,
+ response_serializer=LoggingService__pb2.Status.SerializeToString,
+ ),
+ 'enable': grpc.unary_unary_rpc_method_handler(
+ servicer.enable,
+ request_deserializer=LoggingService__pb2.LoggingConfigurationRequest.FromString,
+ response_serializer=LoggingService__pb2.Status.SerializeToString,
+ ),
+ }
+ generic_handler = grpc.method_handlers_generic_handler(
+ 'org.apache.custos.logging.service.LoggingService', rpc_method_handlers)
+ server.add_generic_rpc_handlers((generic_handler,))
+
+
+ # This class is part of an EXPERIMENTAL API.
+class LoggingService(object):
+ """Missing associated documentation comment in .proto file."""
+
+ @staticmethod
+ def addLogEvent(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.logging.service.LoggingService/addLogEvent',
+ LoggingService__pb2.LogEvent.SerializeToString,
+ LoggingService__pb2.Status.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def getLogEvents(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.logging.service.LoggingService/getLogEvents',
+ LoggingService__pb2.LogEventRequest.SerializeToString,
+ LoggingService__pb2.LogEvents.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def isLogEnabled(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.logging.service.LoggingService/isLogEnabled',
+ LoggingService__pb2.LoggingConfigurationRequest.SerializeToString,
+ LoggingService__pb2.Status.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def enable(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.logging.service.LoggingService/enable',
+ LoggingService__pb2.LoggingConfigurationRequest.SerializeToString,
+ LoggingService__pb2.Status.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/MessagingService_pb2.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/MessagingService_pb2.py
new file mode 100644
index 0000000..3ad188d
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/MessagingService_pb2.py
@@ -0,0 +1,334 @@
+# -*- coding: utf-8 -*-
+# Generated by the protocol buffer compiler. DO NOT EDIT!
+# source: MessagingService.proto
+"""Generated protocol buffer code."""
+from google.protobuf import descriptor as _descriptor
+from google.protobuf import message as _message
+from google.protobuf import reflection as _reflection
+from google.protobuf import symbol_database as _symbol_database
+# @@protoc_insertion_point(imports)
+
+_sym_db = _symbol_database.Default()
+
+
+from google.protobuf import empty_pb2 as google_dot_protobuf_dot_empty__pb2
+
+
+DESCRIPTOR = _descriptor.FileDescriptor(
+ name='MessagingService.proto',
+ package='org.apache.custos.messaging.service',
+ syntax='proto3',
+ serialized_options=b'P\001Z\004./pb',
+ create_key=_descriptor._internal_create_key,
+ serialized_pb=b'\n\x16MessagingService.proto\x12#org.apache.custos.messaging.service\x1a\x1bgoogle/protobuf/empty.proto\"\x9a\x02\n\x07Message\x12\x14\n\x0c\x63reated_time\x18\x01 \x01(\x03\x12\x14\n\x0cservice_name\x18\x02 \x01(\t\x12\x12\n\nevent_type\x18\x03 \x01(\t\x12\x10\n\x08username\x18\x04 \x01(\t\x12\x11\n\tclient_id\x18\x05 \x01(\t\x12\x11\n\ttenant_id\x18\x06 \x01(\x03\x12P\n\nproperties\x18\x07 \x03(\x0b\x32<.org.apache.custos.messaging.service.Message.PropertiesEntry\x12\ [...]
+ ,
+ dependencies=[google_dot_protobuf_dot_empty__pb2.DESCRIPTOR,])
+
+
+
+
+_MESSAGE_PROPERTIESENTRY = _descriptor.Descriptor(
+ name='PropertiesEntry',
+ full_name='org.apache.custos.messaging.service.Message.PropertiesEntry',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='key', full_name='org.apache.custos.messaging.service.Message.PropertiesEntry.key', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='value', full_name='org.apache.custos.messaging.service.Message.PropertiesEntry.value', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=b'8\001',
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=326,
+ serialized_end=375,
+)
+
+_MESSAGE = _descriptor.Descriptor(
+ name='Message',
+ full_name='org.apache.custos.messaging.service.Message',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='created_time', full_name='org.apache.custos.messaging.service.Message.created_time', index=0,
+ number=1, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='service_name', full_name='org.apache.custos.messaging.service.Message.service_name', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='event_type', full_name='org.apache.custos.messaging.service.Message.event_type', index=2,
+ number=3, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='username', full_name='org.apache.custos.messaging.service.Message.username', index=3,
+ number=4, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.messaging.service.Message.client_id', index=4,
+ number=5, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='tenant_id', full_name='org.apache.custos.messaging.service.Message.tenant_id', index=5,
+ number=6, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='properties', full_name='org.apache.custos.messaging.service.Message.properties', index=6,
+ number=7, type=11, cpp_type=10, label=3,
+ has_default_value=False, default_value=[],
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='message_id', full_name='org.apache.custos.messaging.service.Message.message_id', index=7,
+ number=8, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[_MESSAGE_PROPERTIESENTRY, ],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=93,
+ serialized_end=375,
+)
+
+
+_MESSAGEENABLINGREQUEST = _descriptor.Descriptor(
+ name='MessageEnablingRequest',
+ full_name='org.apache.custos.messaging.service.MessageEnablingRequest',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='tenant_id', full_name='org.apache.custos.messaging.service.MessageEnablingRequest.tenant_id', index=0,
+ number=1, type=3, cpp_type=2, label=1,
+ has_default_value=False, default_value=0,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='client_id', full_name='org.apache.custos.messaging.service.MessageEnablingRequest.client_id', index=1,
+ number=2, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=377,
+ serialized_end=439,
+)
+
+
+_STATUS = _descriptor.Descriptor(
+ name='Status',
+ full_name='org.apache.custos.messaging.service.Status',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='status', full_name='org.apache.custos.messaging.service.Status.status', index=0,
+ number=1, type=8, cpp_type=7, label=1,
+ has_default_value=False, default_value=False,
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=441,
+ serialized_end=465,
+)
+
+
+_MESSAGEENABLINGRESPONSE = _descriptor.Descriptor(
+ name='MessageEnablingResponse',
+ full_name='org.apache.custos.messaging.service.MessageEnablingResponse',
+ filename=None,
+ file=DESCRIPTOR,
+ containing_type=None,
+ create_key=_descriptor._internal_create_key,
+ fields=[
+ _descriptor.FieldDescriptor(
+ name='topic', full_name='org.apache.custos.messaging.service.MessageEnablingResponse.topic', index=0,
+ number=1, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ ],
+ extensions=[
+ ],
+ nested_types=[],
+ enum_types=[
+ ],
+ serialized_options=None,
+ is_extendable=False,
+ syntax='proto3',
+ extension_ranges=[],
+ oneofs=[
+ ],
+ serialized_start=467,
+ serialized_end=507,
+)
+
+_MESSAGE_PROPERTIESENTRY.containing_type = _MESSAGE
+_MESSAGE.fields_by_name['properties'].message_type = _MESSAGE_PROPERTIESENTRY
+DESCRIPTOR.message_types_by_name['Message'] = _MESSAGE
+DESCRIPTOR.message_types_by_name['MessageEnablingRequest'] = _MESSAGEENABLINGREQUEST
+DESCRIPTOR.message_types_by_name['Status'] = _STATUS
+DESCRIPTOR.message_types_by_name['MessageEnablingResponse'] = _MESSAGEENABLINGRESPONSE
+_sym_db.RegisterFileDescriptor(DESCRIPTOR)
+
+Message = _reflection.GeneratedProtocolMessageType('Message', (_message.Message,), {
+
+ 'PropertiesEntry' : _reflection.GeneratedProtocolMessageType('PropertiesEntry', (_message.Message,), {
+ 'DESCRIPTOR' : _MESSAGE_PROPERTIESENTRY,
+ '__module__' : 'MessagingService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.messaging.service.Message.PropertiesEntry)
+ })
+ ,
+ 'DESCRIPTOR' : _MESSAGE,
+ '__module__' : 'MessagingService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.messaging.service.Message)
+ })
+_sym_db.RegisterMessage(Message)
+_sym_db.RegisterMessage(Message.PropertiesEntry)
+
+MessageEnablingRequest = _reflection.GeneratedProtocolMessageType('MessageEnablingRequest', (_message.Message,), {
+ 'DESCRIPTOR' : _MESSAGEENABLINGREQUEST,
+ '__module__' : 'MessagingService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.messaging.service.MessageEnablingRequest)
+ })
+_sym_db.RegisterMessage(MessageEnablingRequest)
+
+Status = _reflection.GeneratedProtocolMessageType('Status', (_message.Message,), {
+ 'DESCRIPTOR' : _STATUS,
+ '__module__' : 'MessagingService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.messaging.service.Status)
+ })
+_sym_db.RegisterMessage(Status)
+
+MessageEnablingResponse = _reflection.GeneratedProtocolMessageType('MessageEnablingResponse', (_message.Message,), {
+ 'DESCRIPTOR' : _MESSAGEENABLINGRESPONSE,
+ '__module__' : 'MessagingService_pb2'
+ # @@protoc_insertion_point(class_scope:org.apache.custos.messaging.service.MessageEnablingResponse)
+ })
+_sym_db.RegisterMessage(MessageEnablingResponse)
+
+
+DESCRIPTOR._options = None
+_MESSAGE_PROPERTIESENTRY._options = None
+
+_MESSAGINGSERVICE = _descriptor.ServiceDescriptor(
+ name='MessagingService',
+ full_name='org.apache.custos.messaging.service.MessagingService',
+ file=DESCRIPTOR,
+ index=0,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ serialized_start=510,
+ serialized_end=764,
+ methods=[
+ _descriptor.MethodDescriptor(
+ name='publish',
+ full_name='org.apache.custos.messaging.service.MessagingService.publish',
+ index=0,
+ containing_service=None,
+ input_type=_MESSAGE,
+ output_type=_STATUS,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+ _descriptor.MethodDescriptor(
+ name='enable',
+ full_name='org.apache.custos.messaging.service.MessagingService.enable',
+ index=1,
+ containing_service=None,
+ input_type=_MESSAGEENABLINGREQUEST,
+ output_type=_MESSAGEENABLINGRESPONSE,
+ serialized_options=None,
+ create_key=_descriptor._internal_create_key,
+ ),
+])
+_sym_db.RegisterServiceDescriptor(_MESSAGINGSERVICE)
+
+DESCRIPTOR.services_by_name['MessagingService'] = _MESSAGINGSERVICE
+
+# @@protoc_insertion_point(module_scope)
diff --git a/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/MessagingService_pb2_grpc.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/MessagingService_pb2_grpc.py
new file mode 100644
index 0000000..e568312
--- /dev/null
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/MessagingService_pb2_grpc.py
@@ -0,0 +1,99 @@
+# Generated by the gRPC Python protocol compiler plugin. DO NOT EDIT!
+"""Client and server classes corresponding to protobuf-defined services."""
+import grpc
+
+import custos.server.core.MessagingService_pb2 as MessagingService__pb2
+
+
+class MessagingServiceStub(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def __init__(self, channel):
+ """Constructor.
+
+ Args:
+ channel: A grpc.Channel.
+ """
+ self.publish = channel.unary_unary(
+ '/org.apache.custos.messaging.service.MessagingService/publish',
+ request_serializer=MessagingService__pb2.Message.SerializeToString,
+ response_deserializer=MessagingService__pb2.Status.FromString,
+ )
+ self.enable = channel.unary_unary(
+ '/org.apache.custos.messaging.service.MessagingService/enable',
+ request_serializer=MessagingService__pb2.MessageEnablingRequest.SerializeToString,
+ response_deserializer=MessagingService__pb2.MessageEnablingResponse.FromString,
+ )
+
+
+class MessagingServiceServicer(object):
+ """Missing associated documentation comment in .proto file."""
+
+ def publish(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+ def enable(self, request, context):
+ """Missing associated documentation comment in .proto file."""
+ context.set_code(grpc.StatusCode.UNIMPLEMENTED)
+ context.set_details('Method not implemented!')
+ raise NotImplementedError('Method not implemented!')
+
+
+def add_MessagingServiceServicer_to_server(servicer, server):
+ rpc_method_handlers = {
+ 'publish': grpc.unary_unary_rpc_method_handler(
+ servicer.publish,
+ request_deserializer=MessagingService__pb2.Message.FromString,
+ response_serializer=MessagingService__pb2.Status.SerializeToString,
+ ),
+ 'enable': grpc.unary_unary_rpc_method_handler(
+ servicer.enable,
+ request_deserializer=MessagingService__pb2.MessageEnablingRequest.FromString,
+ response_serializer=MessagingService__pb2.MessageEnablingResponse.SerializeToString,
+ ),
+ }
+ generic_handler = grpc.method_handlers_generic_handler(
+ 'org.apache.custos.messaging.service.MessagingService', rpc_method_handlers)
+ server.add_generic_rpc_handlers((generic_handler,))
+
+
+ # This class is part of an EXPERIMENTAL API.
+class MessagingService(object):
+ """Missing associated documentation comment in .proto file."""
+
+ @staticmethod
+ def publish(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.messaging.service.MessagingService/publish',
+ MessagingService__pb2.Message.SerializeToString,
+ MessagingService__pb2.Status.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
+
+ @staticmethod
+ def enable(request,
+ target,
+ options=(),
+ channel_credentials=None,
+ call_credentials=None,
+ insecure=False,
+ compression=None,
+ wait_for_ready=None,
+ timeout=None,
+ metadata=None):
+ return grpc.experimental.unary_unary(request, target, '/org.apache.custos.messaging.service.MessagingService/enable',
+ MessagingService__pb2.MessageEnablingRequest.SerializeToString,
+ MessagingService__pb2.MessageEnablingResponse.FromString,
+ options, channel_credentials,
+ insecure, call_credentials, compression, wait_for_ready, timeout, metadata)
diff --git a/custos-client-sdks/custos-python-sdk/custos/server/core/ResourceSecretService_pb2.py b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/ResourceSecretService_pb2.py
similarity index 75%
copy from custos-client-sdks/custos-python-sdk/custos/server/core/ResourceSecretService_pb2.py
copy to custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/ResourceSecretService_pb2.py
index cc23980..06745ec 100644
--- a/custos-client-sdks/custos-python-sdk/custos/server/core/ResourceSecretService_pb2.py
+++ b/custos-client-sdks/custos-python-sdk/build/lib/custos/server/core/ResourceSecretService_pb2.py
@@ -18,9 +18,9 @@ DESCRIPTOR = _descriptor.FileDescriptor(
name='ResourceSecretService.proto',
package='org.apache.custos.resource.secret.service',
syntax='proto3',
- serialized_options=b'P\001',
+ serialized_options=b'P\001Z\004./pb',
create_key=_descriptor._internal_create_key,
- serialized_pb=b'\n\x1bResourceSecretService.proto\x12)org.apache.custos.resource.secret.service\"\xda\x03\n\x0eSecretMetadata\x12P\n\nowner_type\x18\x01 \x01(\x0e\x32<.org.apache.custos.resource.secret.service.ResourceOwnerType\x12N\n\rresource_type\x18\x02 \x01(\x0e\x32\x37.org.apache.custos.resource.secret.service.ResourceType\x12I\n\x06source\x18\x03 \x01(\x0e\x32\x39.org.apache.custos.resource.secret.service.ResourceSource\x12\x0c\n\x04name\x18\x04 \x01(\t\x12\r\n\x05value\x18\x05 [...]
+ serialized_pb=b'\n\x1bResourceSecretService.proto\x12)org.apache.custos.resource.secret.service\"\xda\x03\n\x0eSecretMetadata\x12P\n\nowner_type\x18\x01 \x01(\x0e\x32<.org.apache.custos.resource.secret.service.ResourceOwnerType\x12N\n\rresource_type\x18\x02 \x01(\x0e\x32\x37.org.apache.custos.resource.secret.service.ResourceType\x12I\n\x06source\x18\x03 \x01(\x0e\x32\x39.org.apache.custos.resource.secret.service.ResourceSource\x12\x0c\n\x04name\x18\x04 \x01(\t\x12\r\n\x05value\x18\x05 [...]
)
_RESOURCEOWNERTYPE = _descriptor.EnumDescriptor(
@@ -48,8 +48,8 @@ _RESOURCEOWNERTYPE = _descriptor.EnumDescriptor(
],
containing_type=None,
serialized_options=None,
- serialized_start=2283,
- serialized_end=2343,
+ serialized_start=2577,
+ serialized_end=2637,
)
_sym_db.RegisterEnumDescriptor(_RESOURCEOWNERTYPE)
@@ -91,11 +91,46 @@ _RESOURCETYPE = _descriptor.EnumDescriptor(
serialized_options=None,
type=None,
create_key=_descriptor._internal_create_key),
+ _descriptor.EnumValueDescriptor(
+ name='SCP', index=6, number=6,
+ serialized_options=None,
+ type=None,
+ create_key=_descriptor._internal_create_key),
+ _descriptor.EnumValueDescriptor(
+ name='S3', index=7, number=7,
+ serialized_options=None,
+ type=None,
+ create_key=_descriptor._internal_create_key),
+ _descriptor.EnumValueDescriptor(
+ name='BOX', index=8, number=8,
+ serialized_options=None,
+ type=None,
+ create_key=_descriptor._internal_create_key),
+ _descriptor.EnumValueDescriptor(
+ name='AZURE', index=9, number=9,
+ serialized_options=None,
+ type=None,
+ create_key=_descriptor._internal_create_key),
+ _descriptor.EnumValueDescriptor(
+ name='GCS', index=10, number=10,
+ serialized_options=None,
+ type=None,
+ create_key=_descriptor._internal_create_key),
+ _descriptor.EnumValueDescriptor(
+ name='DROPBOX', index=11, number=11,
+ serialized_options=None,
+ type=None,
+ create_key=_descriptor._internal_create_key),
+ _descriptor.EnumValueDescriptor(
+ name='FTP', index=12, number=12,
+ serialized_options=None,
+ type=None,
+ create_key=_descriptor._internal_create_key),
],
containing_type=None,
serialized_options=None,
- serialized_start=2345,
- serialized_end=2466,
+ serialized_start=2640,
+ serialized_end=2829,
)
_sym_db.RegisterEnumDescriptor(_RESOURCETYPE)
@@ -130,8 +165,8 @@ _RESOURCESOURCE = _descriptor.EnumDescriptor(
],
containing_type=None,
serialized_options=None,
- serialized_start=2468,
- serialized_end=2536,
+ serialized_start=2831,
+ serialized_end=2899,
)
_sym_db.RegisterEnumDescriptor(_RESOURCESOURCE)
@@ -168,11 +203,16 @@ _RESOURCESECRETTYPE = _descriptor.EnumDescriptor(
serialized_options=None,
type=None,
create_key=_descriptor._internal_create_key),
+ _descriptor.EnumValueDescriptor(
+ name='CREDENTIAL_MAP', index=5, number=5,
+ serialized_options=None,
+ type=None,
+ create_key=_descriptor._internal_create_key),
],
containing_type=None,
serialized_options=None,
- serialized_start=2538,
- serialized_end=2625,
+ serialized_start=2901,
+ serialized_end=3008,
)
_sym_db.RegisterEnumDescriptor(_RESOURCESECRETTYPE)
@@ -186,6 +226,13 @@ VAULT_CREDENTIAL = 2
VM = 3
ACCOUNT = 4
OTHER = 5
+SCP = 6
+S3 = 7
+BOX = 8
+AZURE = 9
+GCS = 10
+DROPBOX = 11
+FTP = 12
KUBE = 0
LOCAL = 1
EXTERNAL = 2
@@ -195,6 +242,7 @@ PASSWORD = 1
X509_CERTIFICATE = 2
RAW_DATA = 3
KV = 4
+CREDENTIAL_MAP = 5
@@ -358,14 +406,14 @@ _CERTIFICATECREDENTIAL = _descriptor.Descriptor(
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='useShamirsSecretSharingWithEncryption', full_name='org.apache.custos.resource.secret.service.CertificateCredential.useShamirsSecretSharingWithEncryption', index=6,
+ name='use_shamirs_secret_sharing_with_encryption', full_name='org.apache.custos.resource.secret.service.CertificateCredential.use_shamirs_secret_sharing_with_encryption', index=6,
number=8, type=8, cpp_type=7, label=1,
has_default_value=False, default_value=False,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='numOfShares', full_name='org.apache.custos.resource.secret.service.CertificateCredential.numOfShares', index=7,
+ name='num_of_shares', full_name='org.apache.custos.resource.secret.service.CertificateCredential.num_of_shares', index=7,
number=9, type=5, cpp_type=1, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
@@ -398,7 +446,7 @@ _CERTIFICATECREDENTIAL = _descriptor.Descriptor(
oneofs=[
],
serialized_start=552,
- serialized_end=865,
+ serialized_end=872,
)
@@ -425,14 +473,14 @@ _PASSWORDCREDENTIAL = _descriptor.Descriptor(
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='useShamirsSecretSharingWithEncryption', full_name='org.apache.custos.resource.secret.service.PasswordCredential.useShamirsSecretSharingWithEncryption', index=2,
+ name='use_shamirs_secret_sharing_with_encryption', full_name='org.apache.custos.resource.secret.service.PasswordCredential.use_shamirs_secret_sharing_with_encryption', index=2,
number=4, type=8, cpp_type=7, label=1,
has_default_value=False, default_value=False,
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
_descriptor.FieldDescriptor(
- name='numOfShares', full_name='org.apache.custos.resource.secret.service.PasswordCredential.numOfShares', index=3,
+ name='num_of_shares', full_name='org.apache.custos.resource.secret.service.PasswordCredential.num_of_shares', index=3,
number=5, type=5, cpp_type=1, label=1,
has_default_value=False, default_value=0,
message_type=None, enum_type=None, containing_type=None,
@@ -452,6 +500,13 @@ _PASSWORDCREDENTIAL = _descriptor.Descriptor(
message_type=None, enum_type=None, containing_type=None,
is_extension=False, extension_scope=None,
serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
+ _descriptor.FieldDescriptor(
+ name='userId', full_name='org.apache.custos.resource.secret.service.PasswordCredential.userId', index=6,
+ number=8, type=9, cpp_type=9, label=1,
+ has_default_value=False, default_value=b"".decode('utf-8'),
+ message_type=None, enum_type=None, containing_type=None,
+ is_extension=False, extension_scope=None,
+ serialized_options=None, file=DESCRIPTOR, create_key=_descriptor._internal_create_key),
],
extensions=[
],
@@ -464,8 +519,8 @@ _PASSWORDCREDENTIAL = _descriptor.Descriptor(
extension_ranges=[],
oneofs=[
],
- serialized_start=868,
- serialized_end=1093,
+ serialized_start=875,
+ serialized_end=1123,
)
@@ -506,14 +561,14 @@ _SSHCREDENTIAL = _descriptor.Descriptor(
... 26883 lines suppressed ...