From c95ad3f228d3a1d3bb4259654b57317a312478b6 Mon Sep 17 00:00:00 2001 From: speakeasybot Date: Tue, 6 Aug 2024 00:17:57 +0000 Subject: [PATCH] ci: regenerated with OpenAPI Doc 1.0.0, Speakeasy CLI 1.352.2 --- permissions/.gitattributes | 2 + permissions/.gitignore | 8 + permissions/.speakeasy/gen.lock | 140 +++ permissions/.vscode/settings.json | 5 + permissions/CONTRIBUTING.md | 26 + permissions/README.md | 368 +++++- permissions/RELEASES.md | 10 +- permissions/USAGE.md | 48 +- .../docs/models/addassignmentrequest.md | 9 + permissions/docs/models/assignment.md | 11 + permissions/docs/models/assignrolesrequest.md | 9 + permissions/docs/models/deleterolerequest.md | 8 + permissions/docs/models/effect.md | 9 + permissions/docs/models/equalscondition.md | 12 + .../models/getassignedrolesforuserrequest.md | 8 + permissions/docs/models/getrolerequest.md | 8 + permissions/docs/models/grant.md | 11 + permissions/docs/models/grantcondition.md | 13 + .../docs/models/grantwithdependencies.md | 12 + .../models/grantwithdependencieseffect.md | 9 + .../models/listallassignmentsresponsebody.md | 10 + .../docs/models/listallrolesresponsebody.md | 10 + .../models/listcurrentrolesresponsebody.md | 10 + permissions/docs/models/operation.md | 8 + permissions/docs/models/orgrole.md | 17 + permissions/docs/models/orgroletype.md | 8 + permissions/docs/models/partnerrole.md | 17 + permissions/docs/models/partnerroleschemas.md | 17 + permissions/docs/models/partnerroletype.md | 8 + permissions/docs/models/portalrole.md | 16 + permissions/docs/models/portalroleschemas.md | 16 + permissions/docs/models/portalroletype.md | 8 + permissions/docs/models/putrolerequest.md | 9 + .../docs/models/removeassignmentrequest.md | 9 + permissions/docs/models/role.md | 35 + permissions/docs/models/rolepayload.md | 35 + permissions/docs/models/rolesearchinput.md | 13 + permissions/docs/models/schemas.md | 17 + .../docs/models/schemasportalroletype.md | 8 + .../docs/models/schemasshareroletype.md | 8 + permissions/docs/models/schemastype.md | 8 + .../docs/models/schemasuserroletype.md | 8 + .../docs/models/searchrolesresponsebody.md | 11 + permissions/docs/models/security.md | 9 + permissions/docs/models/sharerole.md | 16 + permissions/docs/models/shareroleschemas.md | 16 + permissions/docs/models/shareroletype.md | 8 + permissions/docs/models/type.md | 8 + permissions/docs/models/userrole.md | 16 + permissions/docs/models/userroleschemas.md | 16 + permissions/docs/models/userroletype.md | 8 + permissions/docs/models/utils/retryconfig.md | 24 + permissions/docs/sdks/assignments/README.md | 231 ++++ permissions/docs/sdks/epilot/README.md | 9 + permissions/docs/sdks/roles/README.md | 356 ++++++ permissions/gen.yaml | 43 +- permissions/poetry.toml | 2 + permissions/py.typed | 1 + permissions/pylintrc | 67 +- permissions/pyproject.toml | 55 + permissions/scripts/compile.sh | 83 ++ permissions/scripts/publish.sh | 5 + permissions/setup.py | 39 - permissions/src/epilot/__init__.py | 3 - permissions/src/epilot/assignments.py | 147 --- permissions/src/epilot/models/__init__.py | 2 - .../src/epilot/models/operations/__init__.py | 16 - .../epilot/models/operations/addassignment.py | 25 - .../epilot/models/operations/assignroles.py | 24 - .../epilot/models/operations/deleterole.py | 23 - .../operations/getassignedrolesforuser.py | 23 - .../src/epilot/models/operations/getrole.py | 23 - .../models/operations/listallassignments.py | 28 - .../epilot/models/operations/listallroles.py | 27 - .../models/operations/listcurrentroles.py | 27 - .../src/epilot/models/operations/putrole.py | 124 -- .../models/operations/refreshpermissions.py | 15 - .../models/operations/removeassignment.py | 25 - .../epilot/models/operations/searchroles.py | 28 - .../src/epilot/models/shared/__init__.py | 13 - .../src/epilot/models/shared/assignment.py | 18 - .../epilot/models/shared/equalscondition.py | 22 - permissions/src/epilot/models/shared/grant.py | 23 - .../src/epilot/models/shared/orgrole.py | 36 - .../src/epilot/models/shared/partnerrole.py | 37 - .../epilot/models/shared/rolesearchinput.py | 26 - .../src/epilot/models/shared/security.py | 13 - .../src/epilot/models/shared/sharerole.py | 36 - .../src/epilot/models/shared/userrole.py | 36 - permissions/src/epilot/roles.py | 192 ---- permissions/src/epilot/sdk.py | 81 -- permissions/src/epilot/utils/__init__.py | 4 - permissions/src/epilot/utils/retries.py | 118 -- permissions/src/epilot/utils/utils.py | 735 ------------ .../src/epilot_permissions/__init__.py | 5 + .../src/epilot_permissions/_hooks/__init__.py | 5 + .../epilot_permissions/_hooks/registration.py | 13 + .../src/epilot_permissions/_hooks/sdkhooks.py | 57 + .../src/epilot_permissions/_hooks/types.py | 76 ++ .../src/epilot_permissions/assignments.py | 764 +++++++++++++ permissions/src/epilot_permissions/basesdk.py | 254 +++++ .../src/epilot_permissions/httpclient.py | 78 ++ .../src/epilot_permissions/models/__init__.py | 30 + .../models/addassignmentop.py | 19 + .../epilot_permissions/models/assignment.py | 23 + .../models/assignrolesop.py | 19 + .../epilot_permissions/models/deleteroleop.py | 17 + .../models/equalscondition.py | 26 + .../models/getassignedrolesforuserop.py | 17 + .../epilot_permissions/models/getroleop.py | 17 + .../src/epilot_permissions/models/grant.py | 27 + .../models/grantcondition.py | 13 + .../models/grantwithdependencies.py | 32 + .../models/listallassignmentsop.py | 20 + .../models/listallrolesop.py | 20 + .../models/listcurrentrolesop.py | 20 + .../src/epilot_permissions/models/orgrole.py | 53 + .../epilot_permissions/models/partnerrole.py | 51 + .../epilot_permissions/models/portalrole.py | 49 + .../epilot_permissions/models/putroleop.py | 20 + .../models/removeassignmentop.py | 19 + .../src/epilot_permissions/models/role.py | 16 + .../epilot_permissions/models/rolepayload.py | 207 ++++ .../models/rolesearchinput.py | 37 + .../src/epilot_permissions/models/sdkerror.py | 22 + .../models/searchrolesop.py | 22 + .../src/epilot_permissions/models/security.py | 18 + .../epilot_permissions/models/sharerole.py | 49 + .../src/epilot_permissions/models/userrole.py | 49 + permissions/src/epilot_permissions/py.typed | 1 + permissions/src/epilot_permissions/roles.py | 1016 +++++++++++++++++ permissions/src/epilot_permissions/sdk.py | 95 ++ .../epilot_permissions/sdkconfiguration.py | 48 + .../src/epilot_permissions/types/__init__.py | 21 + .../src/epilot_permissions/types/basemodel.py | 35 + .../src/epilot_permissions/utils/__init__.py | 84 ++ .../epilot_permissions/utils/annotations.py | 19 + .../src/epilot_permissions/utils/enums.py | 34 + .../utils/eventstreaming.py | 179 +++ .../src/epilot_permissions/utils/forms.py | 207 ++++ .../src/epilot_permissions/utils/headers.py | 136 +++ .../src/epilot_permissions/utils/logger.py | 16 + .../src/epilot_permissions/utils/metadata.py | 118 ++ .../epilot_permissions/utils/queryparams.py | 203 ++++ .../epilot_permissions/utils/requestbodies.py | 66 ++ .../src/epilot_permissions/utils/retries.py | 216 ++++ .../src/epilot_permissions/utils/security.py | 168 +++ .../epilot_permissions/utils/serializers.py | 181 +++ .../src/epilot_permissions/utils/url.py | 150 +++ .../src/epilot_permissions/utils/values.py | 128 +++ 150 files changed, 7209 insertions(+), 2070 deletions(-) create mode 100644 permissions/.gitattributes create mode 100644 permissions/.gitignore create mode 100644 permissions/.speakeasy/gen.lock create mode 100644 permissions/.vscode/settings.json create mode 100644 permissions/CONTRIBUTING.md mode change 100755 => 100644 permissions/USAGE.md create mode 100644 permissions/docs/models/addassignmentrequest.md create mode 100644 permissions/docs/models/assignment.md create mode 100644 permissions/docs/models/assignrolesrequest.md create mode 100644 permissions/docs/models/deleterolerequest.md create mode 100644 permissions/docs/models/effect.md create mode 100644 permissions/docs/models/equalscondition.md create mode 100644 permissions/docs/models/getassignedrolesforuserrequest.md create mode 100644 permissions/docs/models/getrolerequest.md create mode 100644 permissions/docs/models/grant.md create mode 100644 permissions/docs/models/grantcondition.md create mode 100644 permissions/docs/models/grantwithdependencies.md create mode 100644 permissions/docs/models/grantwithdependencieseffect.md create mode 100644 permissions/docs/models/listallassignmentsresponsebody.md create mode 100644 permissions/docs/models/listallrolesresponsebody.md create mode 100644 permissions/docs/models/listcurrentrolesresponsebody.md create mode 100644 permissions/docs/models/operation.md create mode 100644 permissions/docs/models/orgrole.md create mode 100644 permissions/docs/models/orgroletype.md create mode 100644 permissions/docs/models/partnerrole.md create mode 100644 permissions/docs/models/partnerroleschemas.md create mode 100644 permissions/docs/models/partnerroletype.md create mode 100644 permissions/docs/models/portalrole.md create mode 100644 permissions/docs/models/portalroleschemas.md create mode 100644 permissions/docs/models/portalroletype.md create mode 100644 permissions/docs/models/putrolerequest.md create mode 100644 permissions/docs/models/removeassignmentrequest.md create mode 100644 permissions/docs/models/role.md create mode 100644 permissions/docs/models/rolepayload.md create mode 100644 permissions/docs/models/rolesearchinput.md create mode 100644 permissions/docs/models/schemas.md create mode 100644 permissions/docs/models/schemasportalroletype.md create mode 100644 permissions/docs/models/schemasshareroletype.md create mode 100644 permissions/docs/models/schemastype.md create mode 100644 permissions/docs/models/schemasuserroletype.md create mode 100644 permissions/docs/models/searchrolesresponsebody.md create mode 100644 permissions/docs/models/security.md create mode 100644 permissions/docs/models/sharerole.md create mode 100644 permissions/docs/models/shareroleschemas.md create mode 100644 permissions/docs/models/shareroletype.md create mode 100644 permissions/docs/models/type.md create mode 100644 permissions/docs/models/userrole.md create mode 100644 permissions/docs/models/userroleschemas.md create mode 100644 permissions/docs/models/userroletype.md create mode 100644 permissions/docs/models/utils/retryconfig.md create mode 100644 permissions/docs/sdks/assignments/README.md create mode 100644 permissions/docs/sdks/epilot/README.md create mode 100644 permissions/docs/sdks/roles/README.md create mode 100644 permissions/poetry.toml create mode 100644 permissions/py.typed mode change 100755 => 100644 permissions/pylintrc create mode 100644 permissions/pyproject.toml create mode 100755 permissions/scripts/compile.sh create mode 100755 permissions/scripts/publish.sh delete mode 100755 permissions/setup.py delete mode 100755 permissions/src/epilot/__init__.py delete mode 100755 permissions/src/epilot/assignments.py delete mode 100755 permissions/src/epilot/models/__init__.py delete mode 100755 permissions/src/epilot/models/operations/__init__.py delete mode 100755 permissions/src/epilot/models/operations/addassignment.py delete mode 100755 permissions/src/epilot/models/operations/assignroles.py delete mode 100755 permissions/src/epilot/models/operations/deleterole.py delete mode 100755 permissions/src/epilot/models/operations/getassignedrolesforuser.py delete mode 100755 permissions/src/epilot/models/operations/getrole.py delete mode 100755 permissions/src/epilot/models/operations/listallassignments.py delete mode 100755 permissions/src/epilot/models/operations/listallroles.py delete mode 100755 permissions/src/epilot/models/operations/listcurrentroles.py delete mode 100755 permissions/src/epilot/models/operations/putrole.py delete mode 100755 permissions/src/epilot/models/operations/refreshpermissions.py delete mode 100755 permissions/src/epilot/models/operations/removeassignment.py delete mode 100755 permissions/src/epilot/models/operations/searchroles.py delete mode 100755 permissions/src/epilot/models/shared/__init__.py delete mode 100755 permissions/src/epilot/models/shared/assignment.py delete mode 100755 permissions/src/epilot/models/shared/equalscondition.py delete mode 100755 permissions/src/epilot/models/shared/grant.py delete mode 100755 permissions/src/epilot/models/shared/orgrole.py delete mode 100755 permissions/src/epilot/models/shared/partnerrole.py delete mode 100755 permissions/src/epilot/models/shared/rolesearchinput.py delete mode 100755 permissions/src/epilot/models/shared/security.py delete mode 100755 permissions/src/epilot/models/shared/sharerole.py delete mode 100755 permissions/src/epilot/models/shared/userrole.py delete mode 100755 permissions/src/epilot/roles.py delete mode 100755 permissions/src/epilot/sdk.py delete mode 100755 permissions/src/epilot/utils/__init__.py delete mode 100755 permissions/src/epilot/utils/retries.py delete mode 100755 permissions/src/epilot/utils/utils.py create mode 100644 permissions/src/epilot_permissions/__init__.py create mode 100644 permissions/src/epilot_permissions/_hooks/__init__.py create mode 100644 permissions/src/epilot_permissions/_hooks/registration.py create mode 100644 permissions/src/epilot_permissions/_hooks/sdkhooks.py create mode 100644 permissions/src/epilot_permissions/_hooks/types.py create mode 100644 permissions/src/epilot_permissions/assignments.py create mode 100644 permissions/src/epilot_permissions/basesdk.py create mode 100644 permissions/src/epilot_permissions/httpclient.py create mode 100644 permissions/src/epilot_permissions/models/__init__.py create mode 100644 permissions/src/epilot_permissions/models/addassignmentop.py create mode 100644 permissions/src/epilot_permissions/models/assignment.py create mode 100644 permissions/src/epilot_permissions/models/assignrolesop.py create mode 100644 permissions/src/epilot_permissions/models/deleteroleop.py create mode 100644 permissions/src/epilot_permissions/models/equalscondition.py create mode 100644 permissions/src/epilot_permissions/models/getassignedrolesforuserop.py create mode 100644 permissions/src/epilot_permissions/models/getroleop.py create mode 100644 permissions/src/epilot_permissions/models/grant.py create mode 100644 permissions/src/epilot_permissions/models/grantcondition.py create mode 100644 permissions/src/epilot_permissions/models/grantwithdependencies.py create mode 100644 permissions/src/epilot_permissions/models/listallassignmentsop.py create mode 100644 permissions/src/epilot_permissions/models/listallrolesop.py create mode 100644 permissions/src/epilot_permissions/models/listcurrentrolesop.py create mode 100644 permissions/src/epilot_permissions/models/orgrole.py create mode 100644 permissions/src/epilot_permissions/models/partnerrole.py create mode 100644 permissions/src/epilot_permissions/models/portalrole.py create mode 100644 permissions/src/epilot_permissions/models/putroleop.py create mode 100644 permissions/src/epilot_permissions/models/removeassignmentop.py create mode 100644 permissions/src/epilot_permissions/models/role.py create mode 100644 permissions/src/epilot_permissions/models/rolepayload.py create mode 100644 permissions/src/epilot_permissions/models/rolesearchinput.py create mode 100644 permissions/src/epilot_permissions/models/sdkerror.py create mode 100644 permissions/src/epilot_permissions/models/searchrolesop.py create mode 100644 permissions/src/epilot_permissions/models/security.py create mode 100644 permissions/src/epilot_permissions/models/sharerole.py create mode 100644 permissions/src/epilot_permissions/models/userrole.py create mode 100644 permissions/src/epilot_permissions/py.typed create mode 100644 permissions/src/epilot_permissions/roles.py create mode 100644 permissions/src/epilot_permissions/sdk.py create mode 100644 permissions/src/epilot_permissions/sdkconfiguration.py create mode 100644 permissions/src/epilot_permissions/types/__init__.py create mode 100644 permissions/src/epilot_permissions/types/basemodel.py create mode 100644 permissions/src/epilot_permissions/utils/__init__.py create mode 100644 permissions/src/epilot_permissions/utils/annotations.py create mode 100644 permissions/src/epilot_permissions/utils/enums.py create mode 100644 permissions/src/epilot_permissions/utils/eventstreaming.py create mode 100644 permissions/src/epilot_permissions/utils/forms.py create mode 100644 permissions/src/epilot_permissions/utils/headers.py create mode 100644 permissions/src/epilot_permissions/utils/logger.py create mode 100644 permissions/src/epilot_permissions/utils/metadata.py create mode 100644 permissions/src/epilot_permissions/utils/queryparams.py create mode 100644 permissions/src/epilot_permissions/utils/requestbodies.py create mode 100644 permissions/src/epilot_permissions/utils/retries.py create mode 100644 permissions/src/epilot_permissions/utils/security.py create mode 100644 permissions/src/epilot_permissions/utils/serializers.py create mode 100644 permissions/src/epilot_permissions/utils/url.py create mode 100644 permissions/src/epilot_permissions/utils/values.py diff --git a/permissions/.gitattributes b/permissions/.gitattributes new file mode 100644 index 000000000..4d75d5900 --- /dev/null +++ b/permissions/.gitattributes @@ -0,0 +1,2 @@ +# This allows generated code to be indexed correctly +*.py linguist-generated=false \ No newline at end of file diff --git a/permissions/.gitignore b/permissions/.gitignore new file mode 100644 index 000000000..477b77290 --- /dev/null +++ b/permissions/.gitignore @@ -0,0 +1,8 @@ +.venv/ +venv/ +src/*.egg-info/ +__pycache__/ +.pytest_cache/ +.python-version +.DS_Store +pyrightconfig.json diff --git a/permissions/.speakeasy/gen.lock b/permissions/.speakeasy/gen.lock new file mode 100644 index 000000000..c20e58d6c --- /dev/null +++ b/permissions/.speakeasy/gen.lock @@ -0,0 +1,140 @@ +lockVersion: 2.0.0 +id: e5cfd20b-f8be-4594-b69d-562b2d361141 +management: + docChecksum: a0eeed3cfdea16b280c0906629448e71 + docVersion: 1.0.0 + speakeasyVersion: 1.352.2 + generationVersion: 2.385.2 + releaseVersion: 1.3.0 + configChecksum: 7db05397b1def4c1a8e44640b46a075d + repoURL: https://github.com/epilot-dev/sdk-python.git + repoSubDirectory: permissions + installationURL: https://github.com/epilot-dev/sdk-python.git#subdirectory=permissions +features: + python: + additionalDependencies: 1.0.0 + constsAndDefaults: 1.0.1 + core: 5.3.3 + defaultEnabledRetries: 0.2.0 + envVarSecurityUsage: 0.3.1 + flattening: 3.0.0 + globalSecurity: 3.0.1 + globalSecurityCallbacks: 1.0.0 + globalServerURLs: 3.0.0 + responseFormat: 1.0.0 + retries: 3.0.0 + sdkHooks: 1.0.0 + unions: 3.0.1 +generatedFiles: + - src/epilot_permissions/sdkconfiguration.py + - src/epilot_permissions/assignments.py + - src/epilot_permissions/roles.py + - src/epilot_permissions/sdk.py + - .vscode/settings.json + - poetry.toml + - py.typed + - pylintrc + - pyproject.toml + - scripts/compile.sh + - scripts/publish.sh + - src/epilot_permissions/__init__.py + - src/epilot_permissions/basesdk.py + - src/epilot_permissions/httpclient.py + - src/epilot_permissions/py.typed + - src/epilot_permissions/types/__init__.py + - src/epilot_permissions/types/basemodel.py + - src/epilot_permissions/utils/__init__.py + - src/epilot_permissions/utils/annotations.py + - src/epilot_permissions/utils/enums.py + - src/epilot_permissions/utils/eventstreaming.py + - src/epilot_permissions/utils/forms.py + - src/epilot_permissions/utils/headers.py + - src/epilot_permissions/utils/logger.py + - src/epilot_permissions/utils/metadata.py + - src/epilot_permissions/utils/queryparams.py + - src/epilot_permissions/utils/requestbodies.py + - src/epilot_permissions/utils/retries.py + - src/epilot_permissions/utils/security.py + - src/epilot_permissions/utils/serializers.py + - src/epilot_permissions/utils/url.py + - src/epilot_permissions/utils/values.py + - src/epilot_permissions/models/sdkerror.py + - src/epilot_permissions/models/assignment.py + - src/epilot_permissions/models/addassignmentop.py + - src/epilot_permissions/models/assignrolesop.py + - src/epilot_permissions/models/getassignedrolesforuserop.py + - src/epilot_permissions/models/listallassignmentsop.py + - src/epilot_permissions/models/removeassignmentop.py + - src/epilot_permissions/models/role.py + - src/epilot_permissions/models/userrole.py + - src/epilot_permissions/models/grant.py + - src/epilot_permissions/models/grantcondition.py + - src/epilot_permissions/models/equalscondition.py + - src/epilot_permissions/models/orgrole.py + - src/epilot_permissions/models/sharerole.py + - src/epilot_permissions/models/partnerrole.py + - src/epilot_permissions/models/portalrole.py + - src/epilot_permissions/models/deleteroleop.py + - src/epilot_permissions/models/getroleop.py + - src/epilot_permissions/models/listallrolesop.py + - src/epilot_permissions/models/listcurrentrolesop.py + - src/epilot_permissions/models/putroleop.py + - src/epilot_permissions/models/rolepayload.py + - src/epilot_permissions/models/grantwithdependencies.py + - src/epilot_permissions/models/searchrolesop.py + - src/epilot_permissions/models/rolesearchinput.py + - src/epilot_permissions/models/security.py + - src/epilot_permissions/models/__init__.py + - docs/models/assignment.md + - docs/models/addassignmentrequest.md + - docs/models/assignrolesrequest.md + - docs/models/getassignedrolesforuserrequest.md + - docs/models/listallassignmentsresponsebody.md + - docs/models/removeassignmentrequest.md + - docs/models/role.md + - docs/models/userroletype.md + - docs/models/userrole.md + - docs/models/effect.md + - docs/models/grant.md + - docs/models/grantcondition.md + - docs/models/operation.md + - docs/models/equalscondition.md + - docs/models/orgroletype.md + - docs/models/orgrole.md + - docs/models/shareroletype.md + - docs/models/sharerole.md + - docs/models/partnerroletype.md + - docs/models/partnerrole.md + - docs/models/portalroletype.md + - docs/models/portalrole.md + - docs/models/deleterolerequest.md + - docs/models/getrolerequest.md + - docs/models/listallrolesresponsebody.md + - docs/models/listcurrentrolesresponsebody.md + - docs/models/putrolerequest.md + - docs/models/schemasportalroletype.md + - docs/models/portalroleschemas.md + - docs/models/schemastype.md + - docs/models/partnerroleschemas.md + - docs/models/schemasshareroletype.md + - docs/models/shareroleschemas.md + - docs/models/type.md + - docs/models/schemas.md + - docs/models/schemasuserroletype.md + - docs/models/userroleschemas.md + - docs/models/rolepayload.md + - docs/models/grantwithdependencieseffect.md + - docs/models/grantwithdependencies.md + - docs/models/searchrolesresponsebody.md + - docs/models/rolesearchinput.md + - docs/models/security.md + - docs/sdks/epilot/README.md + - docs/models/utils/retryconfig.md + - docs/sdks/assignments/README.md + - docs/sdks/roles/README.md + - USAGE.md + - .gitattributes + - src/epilot_permissions/_hooks/sdkhooks.py + - src/epilot_permissions/_hooks/types.py + - src/epilot_permissions/_hooks/__init__.py + - CONTRIBUTING.md diff --git a/permissions/.vscode/settings.json b/permissions/.vscode/settings.json new file mode 100644 index 000000000..f0e6c80a8 --- /dev/null +++ b/permissions/.vscode/settings.json @@ -0,0 +1,5 @@ +{ + "python.testing.pytestArgs": ["tests", "-vv"], + "python.testing.unittestEnabled": false, + "python.testing.pytestEnabled": true +} diff --git a/permissions/CONTRIBUTING.md b/permissions/CONTRIBUTING.md new file mode 100644 index 000000000..d585717fc --- /dev/null +++ b/permissions/CONTRIBUTING.md @@ -0,0 +1,26 @@ +# Contributing to This Repository + +Thank you for your interest in contributing to this repository. Please note that this repository contains generated code. As such, we do not accept direct changes or pull requests. Instead, we encourage you to follow the guidelines below to report issues and suggest improvements. + +## How to Report Issues + +If you encounter any bugs or have suggestions for improvements, please open an issue on GitHub. When reporting an issue, please provide as much detail as possible to help us reproduce the problem. This includes: + +- A clear and descriptive title +- Steps to reproduce the issue +- Expected and actual behavior +- Any relevant logs, screenshots, or error messages +- Information about your environment (e.g., operating system, software versions) + - For example can be collected using the `npx envinfo` command from your terminal if you have Node.js installed + +## Issue Triage and Upstream Fixes + +We will review and triage issues as quickly as possible. Our goal is to address bugs and incorporate improvements in the upstream source code. Fixes will be included in the next generation of the generated code. + +## Contact + +If you have any questions or need further assistance, please feel free to reach out by opening an issue. + +Thank you for your understanding and cooperation! + +The Maintainers diff --git a/permissions/README.md b/permissions/README.md index 2d9a97e1e..ac81a531b 100755 --- a/permissions/README.md +++ b/permissions/README.md @@ -1,59 +1,363 @@ # epilot-permissions - + ## SDK Installation +PIP ```bash pip install git+https://github.com/epilot-dev/sdk-python.git#subdirectory=permissions ``` - +Poetry +```bash +poetry add git+https://github.com/epilot-dev/sdk-python.git#subdirectory=permissions +``` + + + ## SDK Example Usage - + +### Example + +```python +# Synchronous Example +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.assignments.add_assignment(role_id="123:owner", user_id="1") + +if res is not None: + # handle response + pass +``` + +
+ +The same SDK client can also be used to make asychronous requests by importing asyncio. +```python +# Asynchronous Example +import asyncio +import epilot_permissions +from epilot_permissions import Epilot + +async def main(): + s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), + ) + res = await s.assignments.add_assignment_async(role_id="123:owner", user_id="1") + if res is not None: + # handle response + pass + +asyncio.run(main()) +``` + + + +## Available Resources and Operations + +### [assignments](docs/sdks/assignments/README.md) + +* [add_assignment](docs/sdks/assignments/README.md#add_assignment) - addAssignment +* [assign_roles](docs/sdks/assignments/README.md#assign_roles) - assignRoles +* [get_assigned_roles_for_user](docs/sdks/assignments/README.md#get_assigned_roles_for_user) - getAssignedRolesForUser +* [list_all_assignments](docs/sdks/assignments/README.md#list_all_assignments) - listAllAssignments +* [remove_assignment](docs/sdks/assignments/README.md#remove_assignment) - removeAssignment + +### [roles](docs/sdks/roles/README.md) + +* [delete_role](docs/sdks/roles/README.md#delete_role) - deleteRole +* [get_role](docs/sdks/roles/README.md#get_role) - getRole +* [list_all_roles](docs/sdks/roles/README.md#list_all_roles) - listAllRoles +* [list_current_roles](docs/sdks/roles/README.md#list_current_roles) - listCurrentRoles +* [put_role](docs/sdks/roles/README.md#put_role) - putRole +* [refresh_permissions](docs/sdks/roles/README.md#refresh_permissions) - refreshPermissions +* [search_roles](docs/sdks/roles/README.md#search_roles) - searchRoles + + + +## Retries + +Some of the endpoints in this SDK support retries. If you use the SDK without any configuration, it will fall back to the default retry strategy provided by the API. However, the default retry strategy can be overridden on a per-operation basis, or across the entire SDK. + +To change the default retry strategy for a single API call, simply provide a `RetryConfig` object to the call: +```python +from epilot.utils import BackoffStrategy, RetryConfig +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.assignments.add_assignment(role_id="123:owner", user_id="1", + RetryConfig("backoff", BackoffStrategy(1, 50, 1.1, 100), False)) + +if res is not None: + # handle response + pass + +``` + +If you'd like to override the default retry strategy for all operations that support retries, you can use the `retry_config` optional parameter when initializing the SDK: +```python +from epilot.utils import BackoffStrategy, RetryConfig +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + retry_config=RetryConfig("backoff", BackoffStrategy(1, 50, 1.1, 100), False), + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.assignments.add_assignment(role_id="123:owner", user_id="1") + +if res is not None: + # handle response + pass + +``` + + + +## Error Handling + +Handling errors in this SDK should largely match your expectations. All operations return a response object or raise an error. If Error objects are specified in your OpenAPI Spec, the SDK will raise the appropriate Error type. + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +### Example + +```python +import epilot_permissions +from epilot_permissions import Epilot, models + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + +res = None +try: + res = s.assignments.add_assignment(role_id="123:owner", user_id="1") + +except models.SDKError as e: + # handle exception + raise(e) + +if res is not None: + # handle response + pass + +``` + + + +## Server Selection + +### Select Server by Index + +You can override the default server globally by passing a server index to the `server_idx: int` optional parameter when initializing the SDK client instance. The selected server will then be used as the default on the operations that use it. This table lists the indexes associated with the available servers: + +| # | Server | Variables | +| - | ------ | --------- | +| 0 | `https://permissions.sls.epilot.io` | None | + +#### Example + ```python -import epilot -from epilot.models import operations, shared +import epilot_permissions +from epilot_permissions import Epilot -s = epilot.Epilot( - security=shared.Security( - epilot_auth="Bearer YOUR_BEARER_TOKEN_HERE", +s = Epilot( + server_idx=0, + security=epilot_permissions.Security( + epilot_auth="", ), ) -req = operations.AddAssignmentRequest( - role_id="123:owner", - user_id="1", +res = s.assignments.add_assignment(role_id="123:owner", user_id="1") + +if res is not None: + # handle response + pass + +``` + + +### Override Server URL Per-Client + +The default server can also be overridden globally by passing a URL to the `server_url: str` optional parameter when initializing the SDK client instance. For example: +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + server_url="https://permissions.sls.epilot.io", + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.assignments.add_assignment(role_id="123:owner", user_id="1") + +if res is not None: + # handle response + pass + +``` + + + +## Custom HTTP Client + +The Python SDK makes API calls using the [httpx](https://www.python-httpx.org/) HTTP library. In order to provide a convenient way to configure timeouts, cookies, proxies, custom headers, and other low-level configuration, you can initialize the SDK client with your own HTTP client instance. +Depending on whether you are using the sync or async version of the SDK, you can pass an instance of `HttpClient` or `AsyncHttpClient` respectively, which are Protocol's ensuring that the client has the necessary methods to make API calls. +This allows you to wrap the client with your own custom logic, such as adding custom headers, logging, or error handling, or you can just pass an instance of `httpx.Client` or `httpx.AsyncClient` directly. + +For example, you could specify a header for every request that this sdk makes as follows: +```python +from epilot_permissions import Epilot +import httpx + +http_client = httpx.Client(headers={"x-custom-header": "someValue"}) +s = Epilot(client=http_client) +``` + +or you could wrap the client with your own custom logic: +```python +from epilot_permissions import Epilot +from epilot_permissions.httpclient import AsyncHttpClient +import httpx + +class CustomClient(AsyncHttpClient): + client: AsyncHttpClient + + def __init__(self, client: AsyncHttpClient): + self.client = client + + async def send( + self, + request: httpx.Request, + *, + stream: bool = False, + auth: Union[ + httpx._types.AuthTypes, httpx._client.UseClientDefault, None + ] = httpx.USE_CLIENT_DEFAULT, + follow_redirects: Union[ + bool, httpx._client.UseClientDefault + ] = httpx.USE_CLIENT_DEFAULT, + ) -> httpx.Response: + request.headers["Client-Level-Header"] = "added by client" + + return await self.client.send( + request, stream=stream, auth=auth, follow_redirects=follow_redirects + ) + + def build_request( + self, + method: str, + url: httpx._types.URLTypes, + *, + content: Optional[httpx._types.RequestContent] = None, + data: Optional[httpx._types.RequestData] = None, + files: Optional[httpx._types.RequestFiles] = None, + json: Optional[Any] = None, + params: Optional[httpx._types.QueryParamTypes] = None, + headers: Optional[httpx._types.HeaderTypes] = None, + cookies: Optional[httpx._types.CookieTypes] = None, + timeout: Union[ + httpx._types.TimeoutTypes, httpx._client.UseClientDefault + ] = httpx.USE_CLIENT_DEFAULT, + extensions: Optional[httpx._types.RequestExtensions] = None, + ) -> httpx.Request: + return self.client.build_request( + method, + url, + content=content, + data=data, + files=files, + json=json, + params=params, + headers=headers, + cookies=cookies, + timeout=timeout, + extensions=extensions, + ) + +s = Epilot(async_client=CustomClient(httpx.AsyncClient())) +``` + + + +## Authentication + +### Per-Client Security Schemes + +This SDK supports the following security schemes globally: + +| Name | Type | Scheme | +| ------------- | ------------- | ------------- | +| `epilot_auth` | http | HTTP Bearer | +| `epilot_org` | apiKey | API key | + +You can set the security parameters through the `security` optional parameter when initializing the SDK client instance. The selected scheme will be used by default to authenticate with the API for all operations that support it. For example: +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), ) - -res = s.assignments.add_assignment(req) -if res.assignment is not None: + +res = s.assignments.add_assignment(role_id="123:owner", user_id="1") + +if res is not None: # handle response + pass + ``` - + - -## SDK Available Operations + +## Debugging +To emit debug logs for SDK requests and responses you can pass a logger object directly into your SDK object. -### assignments +```python +from epilot_permissions import Epilot +import logging + +logging.basicConfig(level=logging.DEBUG) +s = Epilot(debug_logger=logging.getLogger("epilot_permissions")) +``` + -* `add_assignment` - addAssignment -* `assign_roles` - assignRoles -* `get_assigned_roles_for_user` - getAssignedRolesForUser -* `list_all_assignments` - listAllAssignments -* `remove_assignment` - removeAssignment + -### roles -* `delete_role` - deleteRole -* `get_role` - getRole -* `list_all_roles` - listAllRoles -* `list_current_roles` - listCurrentRoles -* `put_role` - putRole -* `refresh_permissions` - refreshPermissions -* `search_roles` - searchRoles - ### SDK Generated by [Speakeasy](https://docs.speakeasyapi.dev/docs/using-speakeasy/client-sdks) diff --git a/permissions/RELEASES.md b/permissions/RELEASES.md index 2cef85918..6d4978ac3 100644 --- a/permissions/RELEASES.md +++ b/permissions/RELEASES.md @@ -34,4 +34,12 @@ Based on: ### Changes Based on: - OpenAPI Doc 1.0.0 https://docs.api.epilot.io/permissions.yaml -- Speakeasy CLI 1.19.2 (2.16.5) https://github.com/speakeasy-api/speakeasy \ No newline at end of file +- Speakeasy CLI 1.19.2 (2.16.5) https://github.com/speakeasy-api/speakeasy + +## 2024-08-06 00:17:47 +### Changes +Based on: +- OpenAPI Doc 1.0.0 https://docs.api.epilot.io/permissions.yaml +- Speakeasy CLI 1.352.2 (2.385.2) https://github.com/speakeasy-api/speakeasy +### Generated +- [python v1.3.0] permissions \ No newline at end of file diff --git a/permissions/USAGE.md b/permissions/USAGE.md old mode 100755 new mode 100644 index f8b544774..ad5040fcb --- a/permissions/USAGE.md +++ b/permissions/USAGE.md @@ -1,23 +1,43 @@ - + ```python -import epilot -from epilot.models import operations, shared +# Synchronous Example +import epilot_permissions +from epilot_permissions import Epilot -s = epilot.Epilot( - security=shared.Security( - epilot_auth="Bearer YOUR_BEARER_TOKEN_HERE", +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", ), ) -req = operations.AddAssignmentRequest( - role_id="123:owner", - user_id="1", -) - -res = s.assignments.add_assignment(req) +res = s.assignments.add_assignment(role_id="123:owner", user_id="1") -if res.assignment is not None: +if res is not None: # handle response + pass +``` + +
+ +The same SDK client can also be used to make asychronous requests by importing asyncio. +```python +# Asynchronous Example +import asyncio +import epilot_permissions +from epilot_permissions import Epilot + +async def main(): + s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), + ) + res = await s.assignments.add_assignment_async(role_id="123:owner", user_id="1") + if res is not None: + # handle response + pass + +asyncio.run(main()) ``` - \ No newline at end of file + \ No newline at end of file diff --git a/permissions/docs/models/addassignmentrequest.md b/permissions/docs/models/addassignmentrequest.md new file mode 100644 index 000000000..342134dbe --- /dev/null +++ b/permissions/docs/models/addassignmentrequest.md @@ -0,0 +1,9 @@ +# AddAssignmentRequest + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | +| `role_id` | *str* | :heavy_check_mark: | N/A | 123:owner | +| `user_id` | *str* | :heavy_check_mark: | N/A | 1 | \ No newline at end of file diff --git a/permissions/docs/models/assignment.md b/permissions/docs/models/assignment.md new file mode 100644 index 000000000..4cbe718ba --- /dev/null +++ b/permissions/docs/models/assignment.md @@ -0,0 +1,11 @@ +# Assignment + +A role attached to an user + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | +| `roles` | List[*str*] | :heavy_minus_sign: | N/A | | +| `user_id` | *Optional[str]* | :heavy_minus_sign: | Id of a user | 1 | \ No newline at end of file diff --git a/permissions/docs/models/assignrolesrequest.md b/permissions/docs/models/assignrolesrequest.md new file mode 100644 index 000000000..751eac2ca --- /dev/null +++ b/permissions/docs/models/assignrolesrequest.md @@ -0,0 +1,9 @@ +# AssignRolesRequest + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | +| `user_id` | *str* | :heavy_check_mark: | N/A | 1 | +| `request_body` | List[*str*] | :heavy_minus_sign: | N/A | | \ No newline at end of file diff --git a/permissions/docs/models/deleterolerequest.md b/permissions/docs/models/deleterolerequest.md new file mode 100644 index 000000000..8e93fb49c --- /dev/null +++ b/permissions/docs/models/deleterolerequest.md @@ -0,0 +1,8 @@ +# DeleteRoleRequest + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | +| `role_id` | *str* | :heavy_check_mark: | N/A | 123:owner | \ No newline at end of file diff --git a/permissions/docs/models/effect.md b/permissions/docs/models/effect.md new file mode 100644 index 000000000..3ad76f478 --- /dev/null +++ b/permissions/docs/models/effect.md @@ -0,0 +1,9 @@ +# Effect + + +## Values + +| Name | Value | +| ------- | ------- | +| `ALLOW` | allow | +| `DENY` | deny | \ No newline at end of file diff --git a/permissions/docs/models/equalscondition.md b/permissions/docs/models/equalscondition.md new file mode 100644 index 000000000..bf28f44b4 --- /dev/null +++ b/permissions/docs/models/equalscondition.md @@ -0,0 +1,12 @@ +# EqualsCondition + +Check if attribute equals to any of the values + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------------------------------ | ------------------------------------------ | ------------------------------------------ | ------------------------------------------ | ------------------------------------------ | +| `attribute` | *str* | :heavy_check_mark: | N/A | workflows.primary.task_name | +| `operation` | [models.Operation](../models/operation.md) | :heavy_check_mark: | N/A | | +| `values` | List[*Any*] | :heavy_check_mark: | N/A | | \ No newline at end of file diff --git a/permissions/docs/models/getassignedrolesforuserrequest.md b/permissions/docs/models/getassignedrolesforuserrequest.md new file mode 100644 index 000000000..e92783d08 --- /dev/null +++ b/permissions/docs/models/getassignedrolesforuserrequest.md @@ -0,0 +1,8 @@ +# GetAssignedRolesForUserRequest + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | +| `user_id` | *str* | :heavy_check_mark: | N/A | 1 | \ No newline at end of file diff --git a/permissions/docs/models/getrolerequest.md b/permissions/docs/models/getrolerequest.md new file mode 100644 index 000000000..b8a06dd42 --- /dev/null +++ b/permissions/docs/models/getrolerequest.md @@ -0,0 +1,8 @@ +# GetRoleRequest + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | +| `role_id` | *str* | :heavy_check_mark: | N/A | 123:owner | \ No newline at end of file diff --git a/permissions/docs/models/grant.md b/permissions/docs/models/grant.md new file mode 100644 index 000000000..f7fcccd87 --- /dev/null +++ b/permissions/docs/models/grant.md @@ -0,0 +1,11 @@ +# Grant + + +## Fields + +| Field | Type | Required | Description | Example | +| ---------------------------------------------------------- | ---------------------------------------------------------- | ---------------------------------------------------------- | ---------------------------------------------------------- | ---------------------------------------------------------- | +| `action` | *str* | :heavy_check_mark: | N/A | entity-read | +| `conditions` | List[[models.GrantCondition](../models/grantcondition.md)] | :heavy_minus_sign: | N/A | | +| `effect` | [Optional[models.Effect]](../models/effect.md) | :heavy_minus_sign: | N/A | | +| `resource` | *Optional[str]* | :heavy_minus_sign: | N/A | entity:123:contact:f7c22299-ca72-4bca-8538-0a88eeefc947 | \ No newline at end of file diff --git a/permissions/docs/models/grantcondition.md b/permissions/docs/models/grantcondition.md new file mode 100644 index 000000000..9296bc286 --- /dev/null +++ b/permissions/docs/models/grantcondition.md @@ -0,0 +1,13 @@ +# GrantCondition + +An additional condition that must be met for the grant + + +## Supported Types + +### `models.EqualsCondition` + +```python +value: models.EqualsCondition = /* values here */ +``` + diff --git a/permissions/docs/models/grantwithdependencies.md b/permissions/docs/models/grantwithdependencies.md new file mode 100644 index 000000000..17a97dec3 --- /dev/null +++ b/permissions/docs/models/grantwithdependencies.md @@ -0,0 +1,12 @@ +# GrantWithDependencies + + +## Fields + +| Field | Type | Required | Description | Example | +| ---------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------- | +| `action` | *str* | :heavy_check_mark: | N/A | entity-read | +| `conditions` | List[[models.GrantCondition](../models/grantcondition.md)] | :heavy_minus_sign: | N/A | | +| `dependencies` | List[[models.Grant](../models/grant.md)] | :heavy_minus_sign: | Provided additional dependencies, exploded when storing the role | | +| `effect` | [Optional[models.GrantWithDependenciesEffect]](../models/grantwithdependencieseffect.md) | :heavy_minus_sign: | N/A | | +| `resource` | *Optional[str]* | :heavy_minus_sign: | N/A | entity:123:contact:f7c22299-ca72-4bca-8538-0a88eeefc947 | \ No newline at end of file diff --git a/permissions/docs/models/grantwithdependencieseffect.md b/permissions/docs/models/grantwithdependencieseffect.md new file mode 100644 index 000000000..f83fcc64c --- /dev/null +++ b/permissions/docs/models/grantwithdependencieseffect.md @@ -0,0 +1,9 @@ +# GrantWithDependenciesEffect + + +## Values + +| Name | Value | +| ------- | ------- | +| `ALLOW` | allow | +| `DENY` | deny | \ No newline at end of file diff --git a/permissions/docs/models/listallassignmentsresponsebody.md b/permissions/docs/models/listallassignmentsresponsebody.md new file mode 100644 index 000000000..9cb4ee9c8 --- /dev/null +++ b/permissions/docs/models/listallassignmentsresponsebody.md @@ -0,0 +1,10 @@ +# ListAllAssignmentsResponseBody + +ok + + +## Fields + +| Field | Type | Required | Description | +| -------------------------------------------------- | -------------------------------------------------- | -------------------------------------------------- | -------------------------------------------------- | +| `assignments` | List[[models.Assignment](../models/assignment.md)] | :heavy_minus_sign: | N/A | \ No newline at end of file diff --git a/permissions/docs/models/listallrolesresponsebody.md b/permissions/docs/models/listallrolesresponsebody.md new file mode 100644 index 000000000..677efc9de --- /dev/null +++ b/permissions/docs/models/listallrolesresponsebody.md @@ -0,0 +1,10 @@ +# ListAllRolesResponseBody + +ok + + +## Fields + +| Field | Type | Required | Description | +| -------------------------------------- | -------------------------------------- | -------------------------------------- | -------------------------------------- | +| `roles` | List[[models.Role](../models/role.md)] | :heavy_minus_sign: | N/A | \ No newline at end of file diff --git a/permissions/docs/models/listcurrentrolesresponsebody.md b/permissions/docs/models/listcurrentrolesresponsebody.md new file mode 100644 index 000000000..d40eeb64f --- /dev/null +++ b/permissions/docs/models/listcurrentrolesresponsebody.md @@ -0,0 +1,10 @@ +# ListCurrentRolesResponseBody + +ok + + +## Fields + +| Field | Type | Required | Description | +| -------------------------------------- | -------------------------------------- | -------------------------------------- | -------------------------------------- | +| `roles` | List[[models.Role](../models/role.md)] | :heavy_minus_sign: | N/A | \ No newline at end of file diff --git a/permissions/docs/models/operation.md b/permissions/docs/models/operation.md new file mode 100644 index 000000000..9587621e4 --- /dev/null +++ b/permissions/docs/models/operation.md @@ -0,0 +1,8 @@ +# Operation + + +## Values + +| Name | Value | +| -------- | -------- | +| `EQUALS` | equals | \ No newline at end of file diff --git a/permissions/docs/models/orgrole.md b/permissions/docs/models/orgrole.md new file mode 100644 index 000000000..19b5fed6a --- /dev/null +++ b/permissions/docs/models/orgrole.md @@ -0,0 +1,17 @@ +# OrgRole + +A role automatically applied to all users in an organization. + + +## Fields + +| Field | Type | Required | Description | Example | +| -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | +| `grants` | List[[models.Grant](../models/grant.md)] | :heavy_check_mark: | List of grants (permissions) applied to the role | | +| `id` | *str* | :heavy_check_mark: | Format: : | 123:owner | +| `name` | *str* | :heavy_check_mark: | Human-friendly name for the role | Owner | +| `organization_id` | *str* | :heavy_check_mark: | Id of an organization | 123 | +| `slug` | *str* | :heavy_check_mark: | URL-friendly name for the role | owner | +| `type` | [models.OrgRoleType](../models/orgroletype.md) | :heavy_check_mark: | N/A | | +| `expires_at` | [date](https://docs.python.org/3/library/datetime.html#date-objects) | :heavy_minus_sign: | date and time then the role will expire | 2028-07-21T17:32:28Z | +| `pricing_tier` | *Optional[str]* | :heavy_minus_sign: | The pricing tier of the organization this root role is based on | Professional | \ No newline at end of file diff --git a/permissions/docs/models/orgroletype.md b/permissions/docs/models/orgroletype.md new file mode 100644 index 000000000..31f37ee35 --- /dev/null +++ b/permissions/docs/models/orgroletype.md @@ -0,0 +1,8 @@ +# OrgRoleType + + +## Values + +| Name | Value | +| ---------- | ---------- | +| `ORG_ROLE` | org_role | \ No newline at end of file diff --git a/permissions/docs/models/partnerrole.md b/permissions/docs/models/partnerrole.md new file mode 100644 index 000000000..f00403bea --- /dev/null +++ b/permissions/docs/models/partnerrole.md @@ -0,0 +1,17 @@ +# PartnerRole + +A role that appears in another organization's role list that can be assigned but not modified by the partner organization. + + +## Fields + +| Field | Type | Required | Description | Example | +| -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | +| `grants` | List[[models.Grant](../models/grant.md)] | :heavy_check_mark: | List of grants (permissions) applied to the role | | +| `id` | *str* | :heavy_check_mark: | Format: : | 123:owner | +| `name` | *str* | :heavy_check_mark: | Human-friendly name for the role | Owner | +| `organization_id` | *str* | :heavy_check_mark: | Id of an organization | 123 | +| `slug` | *str* | :heavy_check_mark: | URL-friendly name for the role | owner | +| `type` | [models.PartnerRoleType](../models/partnerroletype.md) | :heavy_check_mark: | N/A | | +| `expires_at` | [date](https://docs.python.org/3/library/datetime.html#date-objects) | :heavy_minus_sign: | date and time then the role will expire | 2028-07-21T17:32:28Z | +| `partner_org_id` | *Optional[str]* | :heavy_minus_sign: | N/A | 123 | \ No newline at end of file diff --git a/permissions/docs/models/partnerroleschemas.md b/permissions/docs/models/partnerroleschemas.md new file mode 100644 index 000000000..a731ea87c --- /dev/null +++ b/permissions/docs/models/partnerroleschemas.md @@ -0,0 +1,17 @@ +# PartnerRoleSchemas + +A role that appears in another organization's role list that can be assigned but not modified by the partner organization. + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | +| `grants` | List[[models.GrantWithDependencies](../models/grantwithdependencies.md)] | :heavy_check_mark: | N/A | | +| `id` | *str* | :heavy_check_mark: | Format: : | 123:owner | +| `name` | *str* | :heavy_check_mark: | Human-friendly name for the role | Owner | +| `organization_id` | *str* | :heavy_check_mark: | Id of an organization | 123 | +| `slug` | *str* | :heavy_check_mark: | URL-friendly name for the role | owner | +| `type` | [models.SchemasType](../models/schemastype.md) | :heavy_check_mark: | N/A | | +| `expires_at` | [date](https://docs.python.org/3/library/datetime.html#date-objects) | :heavy_minus_sign: | date and time then the role will expire | 2028-07-21T17:32:28Z | +| `partner_org_id` | *Optional[str]* | :heavy_minus_sign: | N/A | 123 | \ No newline at end of file diff --git a/permissions/docs/models/partnerroletype.md b/permissions/docs/models/partnerroletype.md new file mode 100644 index 000000000..b22bcaed3 --- /dev/null +++ b/permissions/docs/models/partnerroletype.md @@ -0,0 +1,8 @@ +# PartnerRoleType + + +## Values + +| Name | Value | +| -------------- | -------------- | +| `PARTNER_ROLE` | partner_role | \ No newline at end of file diff --git a/permissions/docs/models/portalrole.md b/permissions/docs/models/portalrole.md new file mode 100644 index 000000000..4d34889ca --- /dev/null +++ b/permissions/docs/models/portalrole.md @@ -0,0 +1,16 @@ +# PortalRole + +A role that is applied to end customers and installers using the Portals + + +## Fields + +| Field | Type | Required | Description | Example | +| -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | +| `grants` | List[[models.Grant](../models/grant.md)] | :heavy_check_mark: | List of grants (permissions) applied to the role | | +| `id` | *str* | :heavy_check_mark: | Format: : | 123:owner | +| `name` | *str* | :heavy_check_mark: | Human-friendly name for the role | Owner | +| `organization_id` | *str* | :heavy_check_mark: | Id of an organization | 123 | +| `slug` | *str* | :heavy_check_mark: | URL-friendly name for the role | owner | +| `type` | [models.PortalRoleType](../models/portalroletype.md) | :heavy_check_mark: | N/A | | +| `expires_at` | [date](https://docs.python.org/3/library/datetime.html#date-objects) | :heavy_minus_sign: | date and time then the role will expire | 2028-07-21T17:32:28Z | \ No newline at end of file diff --git a/permissions/docs/models/portalroleschemas.md b/permissions/docs/models/portalroleschemas.md new file mode 100644 index 000000000..df27534fa --- /dev/null +++ b/permissions/docs/models/portalroleschemas.md @@ -0,0 +1,16 @@ +# PortalRoleSchemas + +A role that is applied to end customers and installers using the Portals + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | +| `grants` | List[[models.GrantWithDependencies](../models/grantwithdependencies.md)] | :heavy_check_mark: | N/A | | +| `id` | *str* | :heavy_check_mark: | Format: : | 123:owner | +| `name` | *str* | :heavy_check_mark: | Human-friendly name for the role | Owner | +| `organization_id` | *str* | :heavy_check_mark: | Id of an organization | 123 | +| `slug` | *str* | :heavy_check_mark: | URL-friendly name for the role | owner | +| `type` | [models.SchemasPortalRoleType](../models/schemasportalroletype.md) | :heavy_check_mark: | N/A | | +| `expires_at` | [date](https://docs.python.org/3/library/datetime.html#date-objects) | :heavy_minus_sign: | date and time then the role will expire | 2028-07-21T17:32:28Z | \ No newline at end of file diff --git a/permissions/docs/models/portalroletype.md b/permissions/docs/models/portalroletype.md new file mode 100644 index 000000000..1952bb6ca --- /dev/null +++ b/permissions/docs/models/portalroletype.md @@ -0,0 +1,8 @@ +# PortalRoleType + + +## Values + +| Name | Value | +| ------------- | ------------- | +| `PORTAL_ROLE` | portal_role | \ No newline at end of file diff --git a/permissions/docs/models/putrolerequest.md b/permissions/docs/models/putrolerequest.md new file mode 100644 index 000000000..16274c8fd --- /dev/null +++ b/permissions/docs/models/putrolerequest.md @@ -0,0 +1,9 @@ +# PutRoleRequest + + +## Fields + +| Field | Type | Required | Description | Example | +| -------------------------------------------------------- | -------------------------------------------------------- | -------------------------------------------------------- | -------------------------------------------------------- | -------------------------------------------------------- | +| `role_id` | *str* | :heavy_check_mark: | N/A | 123:owner | +| `role_payload` | [Optional[models.RolePayload]](../models/rolepayload.md) | :heavy_minus_sign: | N/A | | \ No newline at end of file diff --git a/permissions/docs/models/removeassignmentrequest.md b/permissions/docs/models/removeassignmentrequest.md new file mode 100644 index 000000000..dafe901f7 --- /dev/null +++ b/permissions/docs/models/removeassignmentrequest.md @@ -0,0 +1,9 @@ +# RemoveAssignmentRequest + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------ | ------------------ | ------------------ | ------------------ | ------------------ | +| `role_id` | *str* | :heavy_check_mark: | N/A | 123:owner | +| `user_id` | *str* | :heavy_check_mark: | N/A | 1 | \ No newline at end of file diff --git a/permissions/docs/models/role.md b/permissions/docs/models/role.md new file mode 100644 index 000000000..a64ce0a38 --- /dev/null +++ b/permissions/docs/models/role.md @@ -0,0 +1,35 @@ +# Role + + +## Supported Types + +### `models.UserRole` + +```python +value: models.UserRole = /* values here */ +``` + +### `models.OrgRole` + +```python +value: models.OrgRole = /* values here */ +``` + +### `models.ShareRole` + +```python +value: models.ShareRole = /* values here */ +``` + +### `models.PartnerRole` + +```python +value: models.PartnerRole = /* values here */ +``` + +### `models.PortalRole` + +```python +value: models.PortalRole = /* values here */ +``` + diff --git a/permissions/docs/models/rolepayload.md b/permissions/docs/models/rolepayload.md new file mode 100644 index 000000000..cc78b9dcc --- /dev/null +++ b/permissions/docs/models/rolepayload.md @@ -0,0 +1,35 @@ +# RolePayload + + +## Supported Types + +### `models.UserRoleSchemas` + +```python +value: models.UserRoleSchemas = /* values here */ +``` + +### `models.Schemas` + +```python +value: models.Schemas = /* values here */ +``` + +### `models.ShareRoleSchemas` + +```python +value: models.ShareRoleSchemas = /* values here */ +``` + +### `models.PartnerRoleSchemas` + +```python +value: models.PartnerRoleSchemas = /* values here */ +``` + +### `models.PortalRoleSchemas` + +```python +value: models.PortalRoleSchemas = /* values here */ +``` + diff --git a/permissions/docs/models/rolesearchinput.md b/permissions/docs/models/rolesearchinput.md new file mode 100644 index 000000000..855eda0a3 --- /dev/null +++ b/permissions/docs/models/rolesearchinput.md @@ -0,0 +1,13 @@ +# RoleSearchInput + + +## Fields + +| Field | Type | Required | Description | Example | +| --------------------------------------------------------------------- | --------------------------------------------------------------------- | --------------------------------------------------------------------- | --------------------------------------------------------------------- | --------------------------------------------------------------------- | +| `limit` | *Optional[float]* | :heavy_minus_sign: | The Number of roles to return | 1 | +| `offset` | *Optional[float]* | :heavy_minus_sign: | The number of roles to skip before starting to collect the result set | 1 | +| `org_ids` | List[*str*] | :heavy_minus_sign: | List of organization ids to filter by | [
"123",
"456"
] | +| `query` | *Optional[str]* | :heavy_minus_sign: | Input to search across fields | Administrator | +| `role_ids` | List[*str*] | :heavy_minus_sign: | List of role ids to filter by | [
"123:manager",
"456:owner"
] | +| `slugs` | List[*str*] | :heavy_minus_sign: | List of role slugs to filter by | [
"manager",
"owner"
] | \ No newline at end of file diff --git a/permissions/docs/models/schemas.md b/permissions/docs/models/schemas.md new file mode 100644 index 000000000..e49c89ecc --- /dev/null +++ b/permissions/docs/models/schemas.md @@ -0,0 +1,17 @@ +# Schemas + +A role automatically applied to all users in an organization. + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | +| `grants` | List[[models.GrantWithDependencies](../models/grantwithdependencies.md)] | :heavy_check_mark: | N/A | | +| `id` | *str* | :heavy_check_mark: | Format: : | 123:owner | +| `name` | *str* | :heavy_check_mark: | Human-friendly name for the role | Owner | +| `organization_id` | *str* | :heavy_check_mark: | Id of an organization | 123 | +| `slug` | *str* | :heavy_check_mark: | URL-friendly name for the role | owner | +| `type` | [models.Type](../models/type.md) | :heavy_check_mark: | N/A | | +| `expires_at` | [date](https://docs.python.org/3/library/datetime.html#date-objects) | :heavy_minus_sign: | date and time then the role will expire | 2028-07-21T17:32:28Z | +| `pricing_tier` | *Optional[str]* | :heavy_minus_sign: | The pricing tier of the organization this root role is based on | Professional | \ No newline at end of file diff --git a/permissions/docs/models/schemasportalroletype.md b/permissions/docs/models/schemasportalroletype.md new file mode 100644 index 000000000..b5952ae81 --- /dev/null +++ b/permissions/docs/models/schemasportalroletype.md @@ -0,0 +1,8 @@ +# SchemasPortalRoleType + + +## Values + +| Name | Value | +| ------------- | ------------- | +| `PORTAL_ROLE` | portal_role | \ No newline at end of file diff --git a/permissions/docs/models/schemasshareroletype.md b/permissions/docs/models/schemasshareroletype.md new file mode 100644 index 000000000..439177113 --- /dev/null +++ b/permissions/docs/models/schemasshareroletype.md @@ -0,0 +1,8 @@ +# SchemasShareRoleType + + +## Values + +| Name | Value | +| ------------ | ------------ | +| `SHARE_ROLE` | share_role | \ No newline at end of file diff --git a/permissions/docs/models/schemastype.md b/permissions/docs/models/schemastype.md new file mode 100644 index 000000000..9a06d6539 --- /dev/null +++ b/permissions/docs/models/schemastype.md @@ -0,0 +1,8 @@ +# SchemasType + + +## Values + +| Name | Value | +| -------------- | -------------- | +| `PARTNER_ROLE` | partner_role | \ No newline at end of file diff --git a/permissions/docs/models/schemasuserroletype.md b/permissions/docs/models/schemasuserroletype.md new file mode 100644 index 000000000..d3424d94d --- /dev/null +++ b/permissions/docs/models/schemasuserroletype.md @@ -0,0 +1,8 @@ +# SchemasUserRoleType + + +## Values + +| Name | Value | +| ----------- | ----------- | +| `USER_ROLE` | user_role | \ No newline at end of file diff --git a/permissions/docs/models/searchrolesresponsebody.md b/permissions/docs/models/searchrolesresponsebody.md new file mode 100644 index 000000000..76c077070 --- /dev/null +++ b/permissions/docs/models/searchrolesresponsebody.md @@ -0,0 +1,11 @@ +# SearchRolesResponseBody + +ok + + +## Fields + +| Field | Type | Required | Description | +| -------------------------------------- | -------------------------------------- | -------------------------------------- | -------------------------------------- | +| `hits` | *Optional[float]* | :heavy_minus_sign: | N/A | +| `results` | List[[models.Role](../models/role.md)] | :heavy_minus_sign: | N/A | \ No newline at end of file diff --git a/permissions/docs/models/security.md b/permissions/docs/models/security.md new file mode 100644 index 000000000..c59fe377f --- /dev/null +++ b/permissions/docs/models/security.md @@ -0,0 +1,9 @@ +# Security + + +## Fields + +| Field | Type | Required | Description | +| ------------------ | ------------------ | ------------------ | ------------------ | +| `epilot_auth` | *Optional[str]* | :heavy_minus_sign: | N/A | +| `epilot_org` | *Optional[str]* | :heavy_minus_sign: | N/A | \ No newline at end of file diff --git a/permissions/docs/models/sharerole.md b/permissions/docs/models/sharerole.md new file mode 100644 index 000000000..4b01db9fe --- /dev/null +++ b/permissions/docs/models/sharerole.md @@ -0,0 +1,16 @@ +# ShareRole + +A role that can be assigned to users in other organizations for sharing purposes. + + +## Fields + +| Field | Type | Required | Description | Example | +| -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | +| `grants` | List[[models.Grant](../models/grant.md)] | :heavy_check_mark: | List of grants (permissions) applied to the role | | +| `id` | *str* | :heavy_check_mark: | Format: : | 123:owner | +| `name` | *str* | :heavy_check_mark: | Human-friendly name for the role | Owner | +| `organization_id` | *str* | :heavy_check_mark: | Id of an organization | 123 | +| `slug` | *str* | :heavy_check_mark: | URL-friendly name for the role | owner | +| `type` | [models.ShareRoleType](../models/shareroletype.md) | :heavy_check_mark: | N/A | | +| `expires_at` | [date](https://docs.python.org/3/library/datetime.html#date-objects) | :heavy_minus_sign: | date and time then the role will expire | 2028-07-21T17:32:28Z | \ No newline at end of file diff --git a/permissions/docs/models/shareroleschemas.md b/permissions/docs/models/shareroleschemas.md new file mode 100644 index 000000000..6445a1019 --- /dev/null +++ b/permissions/docs/models/shareroleschemas.md @@ -0,0 +1,16 @@ +# ShareRoleSchemas + +A role that can be assigned to users in other organizations for sharing purposes. + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | +| `grants` | List[[models.GrantWithDependencies](../models/grantwithdependencies.md)] | :heavy_check_mark: | N/A | | +| `id` | *str* | :heavy_check_mark: | Format: : | 123:owner | +| `name` | *str* | :heavy_check_mark: | Human-friendly name for the role | Owner | +| `organization_id` | *str* | :heavy_check_mark: | Id of an organization | 123 | +| `slug` | *str* | :heavy_check_mark: | URL-friendly name for the role | owner | +| `type` | [models.SchemasShareRoleType](../models/schemasshareroletype.md) | :heavy_check_mark: | N/A | | +| `expires_at` | [date](https://docs.python.org/3/library/datetime.html#date-objects) | :heavy_minus_sign: | date and time then the role will expire | 2028-07-21T17:32:28Z | \ No newline at end of file diff --git a/permissions/docs/models/shareroletype.md b/permissions/docs/models/shareroletype.md new file mode 100644 index 000000000..fa8aa236e --- /dev/null +++ b/permissions/docs/models/shareroletype.md @@ -0,0 +1,8 @@ +# ShareRoleType + + +## Values + +| Name | Value | +| ------------ | ------------ | +| `SHARE_ROLE` | share_role | \ No newline at end of file diff --git a/permissions/docs/models/type.md b/permissions/docs/models/type.md new file mode 100644 index 000000000..e8ca260bd --- /dev/null +++ b/permissions/docs/models/type.md @@ -0,0 +1,8 @@ +# Type + + +## Values + +| Name | Value | +| ---------- | ---------- | +| `ORG_ROLE` | org_role | \ No newline at end of file diff --git a/permissions/docs/models/userrole.md b/permissions/docs/models/userrole.md new file mode 100644 index 000000000..f349fdbb9 --- /dev/null +++ b/permissions/docs/models/userrole.md @@ -0,0 +1,16 @@ +# UserRole + +A standard user role. Must be explicitly assigned to users. + + +## Fields + +| Field | Type | Required | Description | Example | +| -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | -------------------------------------------------------------------- | +| `grants` | List[[models.Grant](../models/grant.md)] | :heavy_check_mark: | List of grants (permissions) applied to the role | | +| `id` | *str* | :heavy_check_mark: | Format: : | 123:owner | +| `name` | *str* | :heavy_check_mark: | Human-friendly name for the role | Owner | +| `organization_id` | *str* | :heavy_check_mark: | Id of an organization | 123 | +| `slug` | *str* | :heavy_check_mark: | URL-friendly name for the role | owner | +| `type` | [models.UserRoleType](../models/userroletype.md) | :heavy_check_mark: | N/A | | +| `expires_at` | [date](https://docs.python.org/3/library/datetime.html#date-objects) | :heavy_minus_sign: | date and time then the role will expire | 2028-07-21T17:32:28Z | \ No newline at end of file diff --git a/permissions/docs/models/userroleschemas.md b/permissions/docs/models/userroleschemas.md new file mode 100644 index 000000000..d83c65759 --- /dev/null +++ b/permissions/docs/models/userroleschemas.md @@ -0,0 +1,16 @@ +# UserRoleSchemas + +A standard user role. Must be explicitly assigned to users. + + +## Fields + +| Field | Type | Required | Description | Example | +| ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | ------------------------------------------------------------------------ | +| `grants` | List[[models.GrantWithDependencies](../models/grantwithdependencies.md)] | :heavy_check_mark: | N/A | | +| `id` | *str* | :heavy_check_mark: | Format: : | 123:owner | +| `name` | *str* | :heavy_check_mark: | Human-friendly name for the role | Owner | +| `organization_id` | *str* | :heavy_check_mark: | Id of an organization | 123 | +| `slug` | *str* | :heavy_check_mark: | URL-friendly name for the role | owner | +| `type` | [models.SchemasUserRoleType](../models/schemasuserroletype.md) | :heavy_check_mark: | N/A | | +| `expires_at` | [date](https://docs.python.org/3/library/datetime.html#date-objects) | :heavy_minus_sign: | date and time then the role will expire | 2028-07-21T17:32:28Z | \ No newline at end of file diff --git a/permissions/docs/models/userroletype.md b/permissions/docs/models/userroletype.md new file mode 100644 index 000000000..90a67a625 --- /dev/null +++ b/permissions/docs/models/userroletype.md @@ -0,0 +1,8 @@ +# UserRoleType + + +## Values + +| Name | Value | +| ----------- | ----------- | +| `USER_ROLE` | user_role | \ No newline at end of file diff --git a/permissions/docs/models/utils/retryconfig.md b/permissions/docs/models/utils/retryconfig.md new file mode 100644 index 000000000..69dd549ec --- /dev/null +++ b/permissions/docs/models/utils/retryconfig.md @@ -0,0 +1,24 @@ +# RetryConfig + +Allows customizing the default retry configuration. Only usable with methods that mention they support retries. + +## Fields + +| Name | Type | Description | Example | +| ------------------------- | ----------------------------------- | --------------------------------------- | --------- | +| `strategy` | `*str*` | The retry strategy to use. | `backoff` | +| `backoff` | [BackoffStrategy](#backoffstrategy) | Configuration for the backoff strategy. | | +| `retry_connection_errors` | `*bool*` | Whether to retry on connection errors. | `true` | + +## BackoffStrategy + +The backoff strategy allows retrying a request with an exponential backoff between each retry. + +### Fields + +| Name | Type | Description | Example | +| ------------------ | --------- | ----------------------------------------- | -------- | +| `initial_interval` | `*int*` | The initial interval in milliseconds. | `500` | +| `max_interval` | `*int*` | The maximum interval in milliseconds. | `60000` | +| `exponent` | `*float*` | The exponent to use for the backoff. | `1.5` | +| `max_elapsed_time` | `*int*` | The maximum elapsed time in milliseconds. | `300000` | \ No newline at end of file diff --git a/permissions/docs/sdks/assignments/README.md b/permissions/docs/sdks/assignments/README.md new file mode 100644 index 000000000..861c5916f --- /dev/null +++ b/permissions/docs/sdks/assignments/README.md @@ -0,0 +1,231 @@ +# Assignments +(*assignments*) + +## Overview + +Assign roles to users + +### Available Operations + +* [add_assignment](#add_assignment) - addAssignment +* [assign_roles](#assign_roles) - assignRoles +* [get_assigned_roles_for_user](#get_assigned_roles_for_user) - getAssignedRolesForUser +* [list_all_assignments](#list_all_assignments) - listAllAssignments +* [remove_assignment](#remove_assignment) - removeAssignment + +## add_assignment + +Assign a user to a role. + +Use the `x-epilot-org-id` header to assign share roles to users in other orgs + + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.assignments.add_assignment(role_id="123:owner", user_id="1") + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | Example | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `role_id` | *str* | :heavy_check_mark: | N/A | 123:owner | +| `user_id` | *str* | :heavy_check_mark: | N/A | 1 | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | | + + +### Response + +**[models.Assignment](../../models/assignment.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +## assign_roles + +Assign / unassign roles to users. + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.assignments.assign_roles(user_id="1", request_body=[ + "123:owner", +]) + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | Example | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `user_id` | *str* | :heavy_check_mark: | N/A | 1 | +| `request_body` | List[*str*] | :heavy_minus_sign: | N/A | | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | | + + +### Response + +**[List[str]](../../models/.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +## get_assigned_roles_for_user + +Get list of assigned roles by user id + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.assignments.get_assigned_roles_for_user(user_id="1") + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | Example | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `user_id` | *str* | :heavy_check_mark: | N/A | 1 | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | | + + +### Response + +**[List[str]](../../models/.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +## list_all_assignments + +Returns list of all assignments in organization + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.assignments.list_all_assignments() + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | + + +### Response + +**[models.ListAllAssignmentsResponseBody](../../models/listallassignmentsresponsebody.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +## remove_assignment + +Remove role assignment from user + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.assignments.remove_assignment(role_id="123:owner", user_id="1") + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | Example | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `role_id` | *str* | :heavy_check_mark: | N/A | 123:owner | +| `user_id` | *str* | :heavy_check_mark: | N/A | 1 | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | | + + +### Response + +**[models.Assignment](../../models/assignment.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | diff --git a/permissions/docs/sdks/epilot/README.md b/permissions/docs/sdks/epilot/README.md new file mode 100644 index 000000000..96e52122f --- /dev/null +++ b/permissions/docs/sdks/epilot/README.md @@ -0,0 +1,9 @@ +# Epilot SDK + + +## Overview + +Permissions API: Flexible Role-based Access Control for epilot + +### Available Operations + diff --git a/permissions/docs/sdks/roles/README.md b/permissions/docs/sdks/roles/README.md new file mode 100644 index 000000000..b73022c1b --- /dev/null +++ b/permissions/docs/sdks/roles/README.md @@ -0,0 +1,356 @@ +# Roles +(*roles*) + +## Overview + +Manage roles and grants + +### Available Operations + +* [delete_role](#delete_role) - deleteRole +* [get_role](#get_role) - getRole +* [list_all_roles](#list_all_roles) - listAllRoles +* [list_current_roles](#list_current_roles) - listCurrentRoles +* [put_role](#put_role) - putRole +* [refresh_permissions](#refresh_permissions) - refreshPermissions +* [search_roles](#search_roles) - searchRoles + +## delete_role + +Delete role by id + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.roles.delete_role(role_id="123:owner") + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | Example | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `role_id` | *str* | :heavy_check_mark: | N/A | 123:owner | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | | + + +### Response + +**[models.Role](../../models/role.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +## get_role + +Get role by id + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.roles.get_role(role_id="123:owner") + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | Example | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `role_id` | *str* | :heavy_check_mark: | N/A | 123:owner | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | | + + +### Response + +**[models.Role](../../models/role.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +## list_all_roles + +Returns list of all roles in organization + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.roles.list_all_roles() + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | + + +### Response + +**[models.ListAllRolesResponseBody](../../models/listallrolesresponsebody.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +## list_current_roles + +Returns roles and grants assigned to current user + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.roles.list_current_roles() + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | + + +### Response + +**[models.ListCurrentRolesResponseBody](../../models/listcurrentrolesresponsebody.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +## put_role + +Create or update role + +### Example Usage + +```python +import dateutil.parser +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.roles.put_role(role_id="123:owner", role_payload={ + "grants": [ + { + "action": "entity-read", + "conditions": [ + { + "attribute": "workflows.primary.task_name", + "operation": epilot_permissions.Operation.EQUALS, + "values": [ + "Qualification", + ], + }, + ], + "dependencies": [ + { + "action": "entity-read", + "conditions": [ + { + "attribute": "workflows.primary.task_name", + "operation": epilot_permissions.Operation.EQUALS, + "values": [ + "Qualification", + ], + }, + ], + "resource": "entity:123:contact:f7c22299-ca72-4bca-8538-0a88eeefc947", + }, + ], + "resource": "entity:123:contact:f7c22299-ca72-4bca-8538-0a88eeefc947", + }, + ], + "id": "123:owner", + "name": "Owner", + "organization_id": "123", + "slug": "owner", + "type": epilot_permissions.SchemasUserRoleType.USER_ROLE, + "expires_at": dateutil.parser.isoparse("2028-07-21T17:32:28Z"), +}) + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | Example | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `role_id` | *str* | :heavy_check_mark: | N/A | 123:owner | +| `role_payload` | [Optional[models.RolePayload]](../../models/rolepayload.md) | :heavy_minus_sign: | N/A | | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | | + + +### Response + +**[models.Role](../../models/role.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +## refresh_permissions + +Makes sure the user has a role in the organization + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +s.roles.refresh_permissions() + +# Use the SDK ... + +``` + +### Parameters + +| Parameter | Type | Required | Description | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | + +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | + +## search_roles + +Search Roles + +### Example Usage + +```python +import epilot_permissions +from epilot_permissions import Epilot + +s = Epilot( + security=epilot_permissions.Security( + epilot_auth="", + ), +) + + +res = s.roles.search_roles(request={ + "limit": 1, + "offset": 1, + "org_ids": [ + "123", + "456", + ], + "query": "Administrator", + "role_ids": [ + "123:manager", + "456:owner", + ], + "slugs": [ + "manager", + "owner", + ], +}) + +if res is not None: + # handle response + pass + +``` + +### Parameters + +| Parameter | Type | Required | Description | +| ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------- | +| `request` | [models.RoleSearchInput](../../models/rolesearchinput.md) | :heavy_check_mark: | The request object to use for the request. | +| `retries` | [Optional[utils.RetryConfig]](../../models/utils/retryconfig.md) | :heavy_minus_sign: | Configuration to override the default retry behavior of the client. | + + +### Response + +**[models.SearchRolesResponseBody](../../models/searchrolesresponsebody.md)** +### Errors + +| Error Object | Status Code | Content Type | +| --------------- | --------------- | --------------- | +| models.SDKError | 4xx-5xx | */* | diff --git a/permissions/gen.yaml b/permissions/gen.yaml index ea94d4574..abd4e94c3 100644 --- a/permissions/gen.yaml +++ b/permissions/gen.yaml @@ -1,16 +1,41 @@ -configVersion: 1.0.0 -management: - docChecksum: 2e01724bb1e55ab32f2eaf23de0044cf - docVersion: 1.0.0 - speakeasyVersion: 1.19.2 - generationVersion: 2.16.5 +configVersion: 2.0.0 generation: - telemetryEnabled: false sdkClassName: epilot + usageSnippets: + optionalPropertyRendering: withExample + fixes: + nameResolutionDec2023: false + parameterOrderingFeb2024: false + requestResponseComponentNamesFeb2024: false + auth: + oAuth2ClientCredentialsEnabled: false sdkFlattening: true - singleTagPerOp: false + telemetryEnabled: false python: - version: 1.2.2 + version: 1.3.0 + additionalDependencies: + dev: {} + main: {} author: epilot + authors: + - Speakeasy + clientServerStatusCodesAsErrors: true description: Python Client SDK for Epilot + enumFormat: enum + flattenGlobalSecurity: true + flattenRequests: false + imports: + option: openapi + paths: + callbacks: "" + errors: "" + operations: "" + shared: "" + webhooks: "" + inputModelSuffix: input + maxMethodParams: 4 + methodArguments: infer-optional-args + outputModelSuffix: output packageName: epilot-permissions + responseFormat: flat + templateVersion: v2 diff --git a/permissions/poetry.toml b/permissions/poetry.toml new file mode 100644 index 000000000..ab1033bd3 --- /dev/null +++ b/permissions/poetry.toml @@ -0,0 +1,2 @@ +[virtualenvs] +in-project = true diff --git a/permissions/py.typed b/permissions/py.typed new file mode 100644 index 000000000..3e38f1a92 --- /dev/null +++ b/permissions/py.typed @@ -0,0 +1 @@ +# Marker file for PEP 561. The package enables type hints. diff --git a/permissions/pylintrc b/permissions/pylintrc old mode 100755 new mode 100644 index 79b8008d0..224b0d50d --- a/permissions/pylintrc +++ b/permissions/pylintrc @@ -59,10 +59,11 @@ ignore-paths= # Emacs file locks ignore-patterns=^\.# -# List of module names for which member attributes should not be checked -# (useful for modules/projects where namespaces are manipulated during runtime -# and thus existing member attributes cannot be deduced by static analysis). It -# supports qualified module names, as well as Unix pattern matching. +# List of module names for which member attributes should not be checked and +# will not be imported (useful for modules/projects where namespaces are +# manipulated during runtime and thus existing member attributes cannot be +# deduced by static analysis). It supports qualified module names, as well as +# Unix pattern matching. ignored-modules= # Python code to execute, usually for sys.path manipulation such as @@ -88,11 +89,17 @@ persistent=yes # Minimum Python version to use for version dependent checks. Will default to # the version used to run pylint. -py-version=3.9 +py-version=3.8 # Discover python modules and packages in the file system subtree. recursive=no +# Add paths to the list of the source roots. Supports globbing patterns. The +# source root is an absolute path or a path relative to the current working +# directory used to determine a package namespace for modules located under the +# source root. +source-roots=src + # When enabled, pylint would attempt to guess common misconfiguration and emit # user-friendly hints instead of false-positive error messages. suggestion-mode=yes @@ -116,20 +123,15 @@ argument-naming-style=snake_case #argument-rgx= # Naming style matching correct attribute names. -attr-naming-style=snake_case +#attr-naming-style=snake_case # Regular expression matching correct attribute names. Overrides attr-naming- # style. If left empty, attribute names will be checked with the set naming # style. -#attr-rgx= +attr-rgx=[^\W\d][^\W]*|__.*__$ # Bad variable names which should always be refused, separated by a comma. -bad-names=foo, - bar, - baz, - toto, - tutu, - tata +bad-names= # Bad variable names regexes, separated by a comma. If names match any regex, # they will always be refused @@ -185,6 +187,7 @@ good-names=i, ex, Run, _, + e, id # Good variable names regexes, separated by a comma. If names match any regex, @@ -229,6 +232,10 @@ no-docstring-rgx=^_ # These decorators are taken in consideration only for invalid-name. property-classes=abc.abstractproperty +# Regular expression matching correct type alias names. If left empty, type +# alias names will be checked with the set naming style. +typealias-rgx=.* + # Regular expression matching correct type variable names. If left empty, type # variable names will be checked with the set naming style. #typevar-rgx= @@ -251,15 +258,12 @@ check-protected-access-in-special-methods=no defining-attr-methods=__init__, __new__, setUp, + asyncSetUp, __post_init__ # List of member names, which should be excluded from the protected access # warning. -exclude-protected=_asdict, - _fields, - _replace, - _source, - _make +exclude-protected=_asdict,_fields,_replace,_source,_make,os._exit # List of valid names for the first argument in a class method. valid-classmethod-first-arg=cls @@ -422,6 +426,8 @@ disable=raw-checker-failed, suppressed-message, useless-suppression, deprecated-pragma, + use-implicit-booleaness-not-comparison-to-string, + use-implicit-booleaness-not-comparison-to-zero, use-symbolic-message-instead, trailing-whitespace, line-too-long, @@ -439,13 +445,23 @@ disable=raw-checker-failed, trailing-newlines, too-many-public-methods, too-many-locals, - too-many-lines + too-many-lines, + using-constant-test, + too-many-statements, + cyclic-import, + too-many-nested-blocks, + too-many-boolean-expressions, + no-else-raise, + bare-except, + broad-exception-caught, + fixme, + consider-using-from-import # Enable the message, report, category or checker with the given id(s). You can # either give multiple identifier separated by comma (,) or put this option # multiple time (only on the command line, not in the configuration file where # it should appear only once). See also the "--disable" option for examples. -enable=c-extension-no-member +enable= [METHOD_ARGS] @@ -491,8 +507,9 @@ evaluation=max(0, 0 if fatal else 10.0 - ((float(5 * error + warning + refactor # used to format the message information. See doc for all details. msg-template= -# Set the output format. Available formats are text, parseable, colorized, json -# and msvs (visual studio). You can also give a reporter class, e.g. +# Set the output format. Available formats are: text, parseable, colorized, +# json2 (improved json format), json (old json format) and msvs (visual +# studio). You can also give a reporter class, e.g. # mypackage.mymodule.MyReporterClass. #output-format= @@ -526,8 +543,8 @@ min-similarity-lines=4 # Limits count of emitted suggestions for spelling mistakes. max-spelling-suggestions=4 -# Spelling dictionary name. Available dictionaries: none. To make it work, -# install the 'python-enchant' package. +# Spelling dictionary name. No available dictionaries : You need to install +# both the python package and the system dependency for enchant to work. spelling-dict= # List of comma separated words that should be considered directives if they @@ -620,7 +637,7 @@ additional-builtins= allow-global-unused-variables=yes # List of names allowed to shadow builtins -allowed-redefined-builtins= +allowed-redefined-builtins=id,object # List of strings which can identify a callback function by name. A callback # name must start or end with one of those strings. diff --git a/permissions/pyproject.toml b/permissions/pyproject.toml new file mode 100644 index 000000000..bfc06bdde --- /dev/null +++ b/permissions/pyproject.toml @@ -0,0 +1,55 @@ +[tool.poetry] +name = "epilot-permissions" +version = "1.3.0" +description = "Python Client SDK for Epilot" +authors = ["Speakeasy",] +readme = "README.md" +repository = "https://github.com/epilot-dev/sdk-python.git" +packages = [ + { include = "epilot_permissions", from = "src" } +] +include = ["py.typed", "src/epilot_permissions/py.typed"] + +[tool.setuptools.package-data] +"*" = ["py.typed", "src/epilot_permissions/py.typed"] + +[virtualenvs] +in-project = true + +[tool.poetry.dependencies] +python = "^3.8" +httpx = "^0.27.0" +jsonpath-python = "^1.0.6" +pydantic = "~2.8.2" +python-dateutil = "^2.9.0.post0" +typing-inspect = "^0.9.0" + +[tool.poetry.group.dev.dependencies] +mypy = "==1.10.1" +pylint = "==3.2.3" +pyright = "==1.1.374" +types-python-dateutil = "^2.9.0.20240316" + +[build-system] +requires = ["poetry-core"] +build-backend = "poetry.core.masonry.api" + +[tool.pytest.ini_options] +pythonpath = ["src"] + +[tool.mypy] +disable_error_code = "misc" + +[[tool.mypy.overrides]] +module = "typing_inspect" +ignore_missing_imports = true + +[[tool.mypy.overrides]] +module = "jsonpath" +ignore_missing_imports = true + +[tool.pyright] +venvPath = "." +venv = ".venv" + + diff --git a/permissions/scripts/compile.sh b/permissions/scripts/compile.sh new file mode 100755 index 000000000..aa49772e2 --- /dev/null +++ b/permissions/scripts/compile.sh @@ -0,0 +1,83 @@ +#!/usr/bin/env bash + +set -o pipefail # Ensure pipeline failures are propagated + +# Use temporary files to store outputs and exit statuses +declare -A output_files +declare -A status_files + +# Function to run a command with temporary output and status files +run_command() { + local cmd="$1" + local key="$2" + local output_file="$3" + local status_file="$4" + + # Run the command and store output and exit status + { + eval "$cmd" + echo $? > "$status_file" + } &> "$output_file" & +} + +# Create temporary files for outputs and statuses +for cmd in compileall pylint mypy pyright; do + output_files[$cmd]=$(mktemp) + status_files[$cmd]=$(mktemp) +done + +# Collect PIDs for background processes +declare -a pids + +# Run commands in parallel using temporary files +echo "Running python -m compileall" +run_command 'poetry run python -m compileall -q . && echo "Success"' 'compileall' "${output_files[compileall]}" "${status_files[compileall]}" +pids+=($!) + +echo "Running pylint" +run_command 'poetry run pylint src' 'pylint' "${output_files[pylint]}" "${status_files[pylint]}" +pids+=($!) + +echo "Running mypy" +run_command 'poetry run mypy src' 'mypy' "${output_files[mypy]}" "${status_files[mypy]}" +pids+=($!) + +echo "Running pyright (optional)" +run_command 'if command -v pyright > /dev/null 2>&1; then pyright src; else echo "pyright not found, skipping"; fi' 'pyright' "${output_files[pyright]}" "${status_files[pyright]}" +pids+=($!) + +# Wait for all processes to complete +echo "Waiting for processes to complete" +for pid in "${pids[@]}"; do + wait "$pid" +done + +# Print output sequentially and check for failures +failed=false +for key in "${!output_files[@]}"; do + echo "--- Output from Command: $key ---" + echo + cat "${output_files[$key]}" + echo # Empty line for separation + echo "--- End of Output from Command: $key ---" + echo + + exit_status=$(cat "${status_files[$key]}") + if [ "$exit_status" -ne 0 ]; then + echo "Command $key failed with exit status $exit_status" >&2 + failed=true + fi +done + +# Clean up temporary files +for tmp_file in "${output_files[@]}" "${status_files[@]}"; do + rm -f "$tmp_file" +done + +if $failed; then + echo "One or more commands failed." >&2 + exit 1 +else + echo "All commands completed successfully." + exit 0 +fi diff --git a/permissions/scripts/publish.sh b/permissions/scripts/publish.sh new file mode 100755 index 000000000..1ee7194cd --- /dev/null +++ b/permissions/scripts/publish.sh @@ -0,0 +1,5 @@ +#!/usr/bin/env bash + +export POETRY_PYPI_TOKEN_PYPI=${PYPI_TOKEN} + +poetry publish --build --skip-existing diff --git a/permissions/setup.py b/permissions/setup.py deleted file mode 100755 index b12150d8f..000000000 --- a/permissions/setup.py +++ /dev/null @@ -1,39 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -import setuptools - -try: - with open("README.md", "r") as fh: - long_description = fh.read() -except FileNotFoundError: - long_description = "" - -setuptools.setup( - name="epilot-permissions", - version="1.2.2", - author="epilot", - description="Python Client SDK for Epilot", - long_description=long_description, - long_description_content_type="text/markdown", - packages=setuptools.find_packages(where="src"), - install_requires=[ - "certifi==2022.12.07", - "charset-normalizer==2.1.1", - "dataclasses-json-speakeasy==0.5.8", - "idna==3.3", - "marshmallow==3.17.1", - "marshmallow-enum==1.5.1", - "mypy-extensions==0.4.3", - "packaging==21.3", - "pyparsing==3.0.9", - "python-dateutil==2.8.2", - "requests==2.28.1", - "six==1.16.0", - "typing-inspect==0.8.0", - "typing_extensions==4.3.0", - "urllib3==1.26.12", - "pylint==2.16.2", - ], - package_dir={'': 'src'}, - python_requires='>=3.9' -) diff --git a/permissions/src/epilot/__init__.py b/permissions/src/epilot/__init__.py deleted file mode 100755 index b9e232018..000000000 --- a/permissions/src/epilot/__init__.py +++ /dev/null @@ -1,3 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from .sdk import * diff --git a/permissions/src/epilot/assignments.py b/permissions/src/epilot/assignments.py deleted file mode 100755 index 80feb031b..000000000 --- a/permissions/src/epilot/assignments.py +++ /dev/null @@ -1,147 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -import requests as requests_http -from . import utils -from epilot.models import operations, shared -from typing import Optional - -class Assignments: - r"""Assign roles to users""" - _client: requests_http.Session - _security_client: requests_http.Session - _server_url: str - _language: str - _sdk_version: str - _gen_version: str - - def __init__(self, client: requests_http.Session, security_client: requests_http.Session, server_url: str, language: str, sdk_version: str, gen_version: str) -> None: - self._client = client - self._security_client = security_client - self._server_url = server_url - self._language = language - self._sdk_version = sdk_version - self._gen_version = gen_version - - def add_assignment(self, request: operations.AddAssignmentRequest) -> operations.AddAssignmentResponse: - r"""addAssignment - Assign a user to a role. - - Use the `x-epilot-org-id` header to assign share roles to users in other orgs - - """ - base_url = self._server_url - - url = utils.generate_url(operations.AddAssignmentRequest, base_url, '/v1/permissions/assignments/{userId}/{roleId}', request) - - - client = self._security_client - - http_res = client.request('POST', url) - content_type = http_res.headers.get('Content-Type') - - res = operations.AddAssignmentResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 201: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[shared.Assignment]) - res.assignment = out - - return res - - def assign_roles(self, request: operations.AssignRolesRequest) -> operations.AssignRolesResponse: - r"""assignRoles - Assign / unassign roles to users. - """ - base_url = self._server_url - - url = utils.generate_url(operations.AssignRolesRequest, base_url, '/v1/permissions/assignments/{userId}', request) - - headers = {} - req_content_type, data, form = utils.serialize_request_body(request, "request_body", 'json') - if req_content_type not in ('multipart/form-data', 'multipart/mixed'): - headers['content-type'] = req_content_type - - client = self._security_client - - http_res = client.request('PUT', url, data=data, files=form, headers=headers) - content_type = http_res.headers.get('Content-Type') - - res = operations.AssignRolesResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[list[str]]) - res.assignments = out - - return res - - def get_assigned_roles_for_user(self, request: operations.GetAssignedRolesForUserRequest) -> operations.GetAssignedRolesForUserResponse: - r"""getAssignedRolesForUser - Get list of assigned roles by user id - """ - base_url = self._server_url - - url = utils.generate_url(operations.GetAssignedRolesForUserRequest, base_url, '/v1/permissions/assignments/{userId}', request) - - - client = self._security_client - - http_res = client.request('GET', url) - content_type = http_res.headers.get('Content-Type') - - res = operations.GetAssignedRolesForUserResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[list[str]]) - res.assignments = out - - return res - - def list_all_assignments(self) -> operations.ListAllAssignmentsResponse: - r"""listAllAssignments - Returns list of all assignments in organization - """ - base_url = self._server_url - - url = base_url.removesuffix('/') + '/v1/permissions/assignments' - - - client = self._security_client - - http_res = client.request('GET', url) - content_type = http_res.headers.get('Content-Type') - - res = operations.ListAllAssignmentsResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[operations.ListAllAssignments200ApplicationJSON]) - res.list_all_assignments_200_application_json_object = out - - return res - - def remove_assignment(self, request: operations.RemoveAssignmentRequest) -> operations.RemoveAssignmentResponse: - r"""removeAssignment - Remove role assignment from user - """ - base_url = self._server_url - - url = utils.generate_url(operations.RemoveAssignmentRequest, base_url, '/v1/permissions/assignments/{userId}/{roleId}', request) - - - client = self._security_client - - http_res = client.request('DELETE', url) - content_type = http_res.headers.get('Content-Type') - - res = operations.RemoveAssignmentResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[shared.Assignment]) - res.assignment = out - - return res - - \ No newline at end of file diff --git a/permissions/src/epilot/models/__init__.py b/permissions/src/epilot/models/__init__.py deleted file mode 100755 index 889f8adcf..000000000 --- a/permissions/src/epilot/models/__init__.py +++ /dev/null @@ -1,2 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - diff --git a/permissions/src/epilot/models/operations/__init__.py b/permissions/src/epilot/models/operations/__init__.py deleted file mode 100755 index 28dd7873f..000000000 --- a/permissions/src/epilot/models/operations/__init__.py +++ /dev/null @@ -1,16 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from .addassignment import * -from .assignroles import * -from .deleterole import * -from .getassignedrolesforuser import * -from .getrole import * -from .listallassignments import * -from .listallroles import * -from .listcurrentroles import * -from .putrole import * -from .refreshpermissions import * -from .removeassignment import * -from .searchroles import * - -__all__ = ["AddAssignmentRequest","AddAssignmentResponse","AssignRolesRequest","AssignRolesResponse","DeleteRoleRequest","DeleteRoleResponse","GetAssignedRolesForUserRequest","GetAssignedRolesForUserResponse","GetRoleRequest","GetRoleResponse","ListAllAssignments200ApplicationJSON","ListAllAssignmentsResponse","ListAllRoles200ApplicationJSON","ListAllRolesResponse","ListCurrentRoles200ApplicationJSON","ListCurrentRolesResponse","PutRoleRequest","PutRoleRequestBody1","PutRoleRequestBody1TypeEnum","PutRoleRequestBody2","PutRoleRequestBody2TypeEnum","PutRoleRequestBody3","PutRoleRequestBody3TypeEnum","PutRoleRequestBody4","PutRoleRequestBody4TypeEnum","PutRoleResponse","RefreshPermissionsResponse","RemoveAssignmentRequest","RemoveAssignmentResponse","SearchRoles200ApplicationJSON","SearchRolesResponse"] diff --git a/permissions/src/epilot/models/operations/addassignment.py b/permissions/src/epilot/models/operations/addassignment.py deleted file mode 100755 index 3748607b6..000000000 --- a/permissions/src/epilot/models/operations/addassignment.py +++ /dev/null @@ -1,25 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from ..shared import assignment as shared_assignment -from typing import Optional - - -@dataclasses.dataclass -class AddAssignmentRequest: - - role_id: str = dataclasses.field(metadata={'path_param': { 'field_name': 'roleId', 'style': 'simple', 'explode': False }}) - user_id: str = dataclasses.field(metadata={'path_param': { 'field_name': 'userId', 'style': 'simple', 'explode': False }}) - - -@dataclasses.dataclass -class AddAssignmentResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - assignment: Optional[shared_assignment.Assignment] = dataclasses.field(default=None) - r"""ok""" - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/assignroles.py b/permissions/src/epilot/models/operations/assignroles.py deleted file mode 100755 index 937f84599..000000000 --- a/permissions/src/epilot/models/operations/assignroles.py +++ /dev/null @@ -1,24 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from typing import Optional - - -@dataclasses.dataclass -class AssignRolesRequest: - - user_id: str = dataclasses.field(metadata={'path_param': { 'field_name': 'userId', 'style': 'simple', 'explode': False }}) - request_body: Optional[list[str]] = dataclasses.field(default=None, metadata={'request': { 'media_type': 'application/json' }}) - - -@dataclasses.dataclass -class AssignRolesResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - assignments: Optional[list[str]] = dataclasses.field(default=None) - r"""ok""" - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/deleterole.py b/permissions/src/epilot/models/operations/deleterole.py deleted file mode 100755 index fb133d553..000000000 --- a/permissions/src/epilot/models/operations/deleterole.py +++ /dev/null @@ -1,23 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from typing import Any, Optional - - -@dataclasses.dataclass -class DeleteRoleRequest: - - role_id: str = dataclasses.field(metadata={'path_param': { 'field_name': 'roleId', 'style': 'simple', 'explode': False }}) - - -@dataclasses.dataclass -class DeleteRoleResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - role: Optional[Any] = dataclasses.field(default=None) - r"""ok""" - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/getassignedrolesforuser.py b/permissions/src/epilot/models/operations/getassignedrolesforuser.py deleted file mode 100755 index adcb672fb..000000000 --- a/permissions/src/epilot/models/operations/getassignedrolesforuser.py +++ /dev/null @@ -1,23 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from typing import Optional - - -@dataclasses.dataclass -class GetAssignedRolesForUserRequest: - - user_id: str = dataclasses.field(metadata={'path_param': { 'field_name': 'userId', 'style': 'simple', 'explode': False }}) - - -@dataclasses.dataclass -class GetAssignedRolesForUserResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - assignments: Optional[list[str]] = dataclasses.field(default=None) - r"""ok""" - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/getrole.py b/permissions/src/epilot/models/operations/getrole.py deleted file mode 100755 index 3091ee262..000000000 --- a/permissions/src/epilot/models/operations/getrole.py +++ /dev/null @@ -1,23 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from typing import Any, Optional - - -@dataclasses.dataclass -class GetRoleRequest: - - role_id: str = dataclasses.field(metadata={'path_param': { 'field_name': 'roleId', 'style': 'simple', 'explode': False }}) - - -@dataclasses.dataclass -class GetRoleResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - role: Optional[Any] = dataclasses.field(default=None) - r"""ok""" - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/listallassignments.py b/permissions/src/epilot/models/operations/listallassignments.py deleted file mode 100755 index 5f538ab14..000000000 --- a/permissions/src/epilot/models/operations/listallassignments.py +++ /dev/null @@ -1,28 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from ..shared import assignment as shared_assignment -from dataclasses_json import Undefined, dataclass_json -from epilot import utils -from typing import Optional - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class ListAllAssignments200ApplicationJSON: - r"""ok""" - - assignments: Optional[list[shared_assignment.Assignment]] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('assignments'), 'exclude': lambda f: f is None }}) - - -@dataclasses.dataclass -class ListAllAssignmentsResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - list_all_assignments_200_application_json_object: Optional[ListAllAssignments200ApplicationJSON] = dataclasses.field(default=None) - r"""ok""" - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/listallroles.py b/permissions/src/epilot/models/operations/listallroles.py deleted file mode 100755 index 3729090b5..000000000 --- a/permissions/src/epilot/models/operations/listallroles.py +++ /dev/null @@ -1,27 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from dataclasses_json import Undefined, dataclass_json -from epilot import utils -from typing import Any, Optional - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class ListAllRoles200ApplicationJSON: - r"""ok""" - - roles: Optional[list[Any]] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('roles'), 'exclude': lambda f: f is None }}) - - -@dataclasses.dataclass -class ListAllRolesResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - list_all_roles_200_application_json_object: Optional[ListAllRoles200ApplicationJSON] = dataclasses.field(default=None) - r"""ok""" - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/listcurrentroles.py b/permissions/src/epilot/models/operations/listcurrentroles.py deleted file mode 100755 index ac36bd0ab..000000000 --- a/permissions/src/epilot/models/operations/listcurrentroles.py +++ /dev/null @@ -1,27 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from dataclasses_json import Undefined, dataclass_json -from epilot import utils -from typing import Any, Optional - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class ListCurrentRoles200ApplicationJSON: - r"""ok""" - - roles: Optional[list[Any]] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('roles'), 'exclude': lambda f: f is None }}) - - -@dataclasses.dataclass -class ListCurrentRolesResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - list_current_roles_200_application_json_object: Optional[ListCurrentRoles200ApplicationJSON] = dataclasses.field(default=None) - r"""ok""" - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/putrole.py b/permissions/src/epilot/models/operations/putrole.py deleted file mode 100755 index ac66a51e6..000000000 --- a/permissions/src/epilot/models/operations/putrole.py +++ /dev/null @@ -1,124 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import dateutil.parser -import requests as requests_http -from ..shared import grant as shared_grant -from dataclasses_json import Undefined, dataclass_json -from datetime import datetime -from enum import Enum -from epilot import utils -from marshmallow import fields -from typing import Any, Optional - -class PutRoleRequestBody4TypeEnum(str, Enum): - PARTNER_ROLE = "partner_role" - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class PutRoleRequestBody4: - r"""A role that appears in another organization's role list that can be assigned but not modified by the partner organization.""" - - grants: list[shared_grant.Grant] = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('grants') }}) - r"""List of grants (permissions) applied to the role""" - id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('id') }}) - r"""Format: :""" - name: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('name') }}) - r"""Human-friendly name for the role""" - organization_id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('organization_id') }}) - r"""Id of an organization""" - slug: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('slug') }}) - r"""URL-friendly name for the role""" - type: PutRoleRequestBody4TypeEnum = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('type') }}) - expires_at: Optional[datetime] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('expires_at'), 'encoder': utils.datetimeisoformat(True), 'decoder': dateutil.parser.isoparse, 'mm_field': fields.DateTime(format='iso'), 'exclude': lambda f: f is None }}) - r"""date and time then the role will expire""" - partner_org_id: Optional[str] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('partner_org_id'), 'exclude': lambda f: f is None }}) - -class PutRoleRequestBody3TypeEnum(str, Enum): - SHARE_ROLE = "share_role" - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class PutRoleRequestBody3: - r"""A role that can be assigned to users in other organizations for sharing purposes.""" - - grants: list[shared_grant.Grant] = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('grants') }}) - r"""List of grants (permissions) applied to the role""" - id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('id') }}) - r"""Format: :""" - name: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('name') }}) - r"""Human-friendly name for the role""" - organization_id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('organization_id') }}) - r"""Id of an organization""" - slug: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('slug') }}) - r"""URL-friendly name for the role""" - type: PutRoleRequestBody3TypeEnum = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('type') }}) - expires_at: Optional[datetime] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('expires_at'), 'encoder': utils.datetimeisoformat(True), 'decoder': dateutil.parser.isoparse, 'mm_field': fields.DateTime(format='iso'), 'exclude': lambda f: f is None }}) - r"""date and time then the role will expire""" - -class PutRoleRequestBody2TypeEnum(str, Enum): - ORG_ROLE = "org_role" - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class PutRoleRequestBody2: - r"""A role automatically applied to all users in an organization.""" - - grants: list[shared_grant.Grant] = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('grants') }}) - r"""List of grants (permissions) applied to the role""" - id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('id') }}) - r"""Format: :""" - name: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('name') }}) - r"""Human-friendly name for the role""" - organization_id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('organization_id') }}) - r"""Id of an organization""" - slug: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('slug') }}) - r"""URL-friendly name for the role""" - type: PutRoleRequestBody2TypeEnum = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('type') }}) - expires_at: Optional[datetime] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('expires_at'), 'encoder': utils.datetimeisoformat(True), 'decoder': dateutil.parser.isoparse, 'mm_field': fields.DateTime(format='iso'), 'exclude': lambda f: f is None }}) - r"""date and time then the role will expire""" - -class PutRoleRequestBody1TypeEnum(str, Enum): - USER_ROLE = "user_role" - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class PutRoleRequestBody1: - r"""A standard user role. Must be explicitly assigned to users.""" - - grants: list[shared_grant.Grant] = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('grants') }}) - r"""List of grants (permissions) applied to the role""" - id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('id') }}) - r"""Format: :""" - name: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('name') }}) - r"""Human-friendly name for the role""" - organization_id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('organization_id') }}) - r"""Id of an organization""" - slug: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('slug') }}) - r"""URL-friendly name for the role""" - type: PutRoleRequestBody1TypeEnum = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('type') }}) - expires_at: Optional[datetime] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('expires_at'), 'encoder': utils.datetimeisoformat(True), 'decoder': dateutil.parser.isoparse, 'mm_field': fields.DateTime(format='iso'), 'exclude': lambda f: f is None }}) - r"""date and time then the role will expire""" - - -@dataclasses.dataclass -class PutRoleRequest: - - role_id: str = dataclasses.field(metadata={'path_param': { 'field_name': 'roleId', 'style': 'simple', 'explode': False }}) - request_body: Optional[Any] = dataclasses.field(default=None, metadata={'request': { 'media_type': 'application/json' }}) - - -@dataclasses.dataclass -class PutRoleResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - role: Optional[Any] = dataclasses.field(default=None) - r"""ok""" - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/refreshpermissions.py b/permissions/src/epilot/models/operations/refreshpermissions.py deleted file mode 100755 index 27b56b681..000000000 --- a/permissions/src/epilot/models/operations/refreshpermissions.py +++ /dev/null @@ -1,15 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from typing import Optional - - -@dataclasses.dataclass -class RefreshPermissionsResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/removeassignment.py b/permissions/src/epilot/models/operations/removeassignment.py deleted file mode 100755 index 5fc8d5ba5..000000000 --- a/permissions/src/epilot/models/operations/removeassignment.py +++ /dev/null @@ -1,25 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from ..shared import assignment as shared_assignment -from typing import Optional - - -@dataclasses.dataclass -class RemoveAssignmentRequest: - - role_id: str = dataclasses.field(metadata={'path_param': { 'field_name': 'roleId', 'style': 'simple', 'explode': False }}) - user_id: str = dataclasses.field(metadata={'path_param': { 'field_name': 'userId', 'style': 'simple', 'explode': False }}) - - -@dataclasses.dataclass -class RemoveAssignmentResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - assignment: Optional[shared_assignment.Assignment] = dataclasses.field(default=None) - r"""ok""" - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - \ No newline at end of file diff --git a/permissions/src/epilot/models/operations/searchroles.py b/permissions/src/epilot/models/operations/searchroles.py deleted file mode 100755 index 473d7c36e..000000000 --- a/permissions/src/epilot/models/operations/searchroles.py +++ /dev/null @@ -1,28 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import requests as requests_http -from dataclasses_json import Undefined, dataclass_json -from epilot import utils -from typing import Any, Optional - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class SearchRoles200ApplicationJSON: - r"""ok""" - - hits: Optional[float] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('hits'), 'exclude': lambda f: f is None }}) - results: Optional[list[Any]] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('results'), 'exclude': lambda f: f is None }}) - - -@dataclasses.dataclass -class SearchRolesResponse: - - content_type: str = dataclasses.field() - status_code: int = dataclasses.field() - raw_response: Optional[requests_http.Response] = dataclasses.field(default=None) - search_roles_200_application_json_object: Optional[SearchRoles200ApplicationJSON] = dataclasses.field(default=None) - r"""ok""" - \ No newline at end of file diff --git a/permissions/src/epilot/models/shared/__init__.py b/permissions/src/epilot/models/shared/__init__.py deleted file mode 100755 index e7b107624..000000000 --- a/permissions/src/epilot/models/shared/__init__.py +++ /dev/null @@ -1,13 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from .assignment import * -from .equalscondition import * -from .grant import * -from .orgrole import * -from .partnerrole import * -from .rolesearchinput import * -from .security import * -from .sharerole import * -from .userrole import * - -__all__ = ["Assignment","EqualsCondition","EqualsConditionOperationEnum","Grant","GrantEffectEnum","OrgRole","OrgRoleTypeEnum","PartnerRole","PartnerRoleTypeEnum","RoleSearchInput","Security","ShareRole","ShareRoleTypeEnum","UserRole","UserRoleTypeEnum"] diff --git a/permissions/src/epilot/models/shared/assignment.py b/permissions/src/epilot/models/shared/assignment.py deleted file mode 100755 index cb4267477..000000000 --- a/permissions/src/epilot/models/shared/assignment.py +++ /dev/null @@ -1,18 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -from dataclasses_json import Undefined, dataclass_json -from epilot import utils -from typing import Optional - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class Assignment: - r"""A role attached to an user""" - - roles: Optional[list[str]] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('roles'), 'exclude': lambda f: f is None }}) - user_id: Optional[str] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('user_id'), 'exclude': lambda f: f is None }}) - r"""Id of a user""" - \ No newline at end of file diff --git a/permissions/src/epilot/models/shared/equalscondition.py b/permissions/src/epilot/models/shared/equalscondition.py deleted file mode 100755 index 86a025c17..000000000 --- a/permissions/src/epilot/models/shared/equalscondition.py +++ /dev/null @@ -1,22 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -from dataclasses_json import Undefined, dataclass_json -from enum import Enum -from epilot import utils -from typing import Any - -class EqualsConditionOperationEnum(str, Enum): - EQUALS = "equals" - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class EqualsCondition: - r"""Check if attribute equals to any of the values""" - - attribute: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('attribute') }}) - operation: EqualsConditionOperationEnum = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('operation') }}) - values: list[Any] = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('values') }}) - \ No newline at end of file diff --git a/permissions/src/epilot/models/shared/grant.py b/permissions/src/epilot/models/shared/grant.py deleted file mode 100755 index 2306b7a20..000000000 --- a/permissions/src/epilot/models/shared/grant.py +++ /dev/null @@ -1,23 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -from dataclasses_json import Undefined, dataclass_json -from enum import Enum -from epilot import utils -from typing import Any, Optional - -class GrantEffectEnum(str, Enum): - ALLOW = "allow" - DENY = "deny" - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class Grant: - - action: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('action') }}) - conditions: Optional[list[Any]] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('conditions'), 'exclude': lambda f: f is None }}) - effect: Optional[GrantEffectEnum] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('effect'), 'exclude': lambda f: f is None }}) - resource: Optional[str] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('resource'), 'exclude': lambda f: f is None }}) - \ No newline at end of file diff --git a/permissions/src/epilot/models/shared/orgrole.py b/permissions/src/epilot/models/shared/orgrole.py deleted file mode 100755 index ca4b05bdc..000000000 --- a/permissions/src/epilot/models/shared/orgrole.py +++ /dev/null @@ -1,36 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import dateutil.parser -from ..shared import grant as shared_grant -from dataclasses_json import Undefined, dataclass_json -from datetime import datetime -from enum import Enum -from epilot import utils -from marshmallow import fields -from typing import Optional - -class OrgRoleTypeEnum(str, Enum): - ORG_ROLE = "org_role" - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class OrgRole: - r"""A role automatically applied to all users in an organization.""" - - grants: list[shared_grant.Grant] = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('grants') }}) - r"""List of grants (permissions) applied to the role""" - id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('id') }}) - r"""Format: :""" - name: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('name') }}) - r"""Human-friendly name for the role""" - organization_id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('organization_id') }}) - r"""Id of an organization""" - slug: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('slug') }}) - r"""URL-friendly name for the role""" - type: OrgRoleTypeEnum = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('type') }}) - expires_at: Optional[datetime] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('expires_at'), 'encoder': utils.datetimeisoformat(True), 'decoder': dateutil.parser.isoparse, 'mm_field': fields.DateTime(format='iso'), 'exclude': lambda f: f is None }}) - r"""date and time then the role will expire""" - \ No newline at end of file diff --git a/permissions/src/epilot/models/shared/partnerrole.py b/permissions/src/epilot/models/shared/partnerrole.py deleted file mode 100755 index 6258bf9fe..000000000 --- a/permissions/src/epilot/models/shared/partnerrole.py +++ /dev/null @@ -1,37 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import dateutil.parser -from ..shared import grant as shared_grant -from dataclasses_json import Undefined, dataclass_json -from datetime import datetime -from enum import Enum -from epilot import utils -from marshmallow import fields -from typing import Optional - -class PartnerRoleTypeEnum(str, Enum): - PARTNER_ROLE = "partner_role" - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class PartnerRole: - r"""A role that appears in another organization's role list that can be assigned but not modified by the partner organization.""" - - grants: list[shared_grant.Grant] = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('grants') }}) - r"""List of grants (permissions) applied to the role""" - id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('id') }}) - r"""Format: :""" - name: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('name') }}) - r"""Human-friendly name for the role""" - organization_id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('organization_id') }}) - r"""Id of an organization""" - slug: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('slug') }}) - r"""URL-friendly name for the role""" - type: PartnerRoleTypeEnum = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('type') }}) - expires_at: Optional[datetime] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('expires_at'), 'encoder': utils.datetimeisoformat(True), 'decoder': dateutil.parser.isoparse, 'mm_field': fields.DateTime(format='iso'), 'exclude': lambda f: f is None }}) - r"""date and time then the role will expire""" - partner_org_id: Optional[str] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('partner_org_id'), 'exclude': lambda f: f is None }}) - \ No newline at end of file diff --git a/permissions/src/epilot/models/shared/rolesearchinput.py b/permissions/src/epilot/models/shared/rolesearchinput.py deleted file mode 100755 index 6509274b9..000000000 --- a/permissions/src/epilot/models/shared/rolesearchinput.py +++ /dev/null @@ -1,26 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -from dataclasses_json import Undefined, dataclass_json -from epilot import utils -from typing import Optional - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class RoleSearchInput: - - limit: Optional[float] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('limit'), 'exclude': lambda f: f is None }}) - r"""The Number of roles to return""" - offset: Optional[float] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('offset'), 'exclude': lambda f: f is None }}) - r"""The number of roles to skip before starting to collect the result set""" - org_ids: Optional[list[str]] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('org_ids'), 'exclude': lambda f: f is None }}) - r"""List of organization ids to filter by""" - query: Optional[str] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('query'), 'exclude': lambda f: f is None }}) - r"""Input to search across fields""" - role_ids: Optional[list[str]] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('role_ids'), 'exclude': lambda f: f is None }}) - r"""List of role ids to filter by""" - slugs: Optional[list[str]] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('slugs'), 'exclude': lambda f: f is None }}) - r"""List of role slugs to filter by""" - \ No newline at end of file diff --git a/permissions/src/epilot/models/shared/security.py b/permissions/src/epilot/models/shared/security.py deleted file mode 100755 index 0dedc5e9a..000000000 --- a/permissions/src/epilot/models/shared/security.py +++ /dev/null @@ -1,13 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -from typing import Optional - - -@dataclasses.dataclass -class Security: - - epilot_auth: Optional[str] = dataclasses.field(default=None, metadata={'security': { 'scheme': True, 'type': 'http', 'sub_type': 'bearer', 'field_name': 'Authorization' }}) - epilot_org: Optional[str] = dataclasses.field(default=None, metadata={'security': { 'scheme': True, 'type': 'apiKey', 'sub_type': 'header', 'field_name': 'x-epilot-org-id' }}) - \ No newline at end of file diff --git a/permissions/src/epilot/models/shared/sharerole.py b/permissions/src/epilot/models/shared/sharerole.py deleted file mode 100755 index fc54c73ef..000000000 --- a/permissions/src/epilot/models/shared/sharerole.py +++ /dev/null @@ -1,36 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import dateutil.parser -from ..shared import grant as shared_grant -from dataclasses_json import Undefined, dataclass_json -from datetime import datetime -from enum import Enum -from epilot import utils -from marshmallow import fields -from typing import Optional - -class ShareRoleTypeEnum(str, Enum): - SHARE_ROLE = "share_role" - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class ShareRole: - r"""A role that can be assigned to users in other organizations for sharing purposes.""" - - grants: list[shared_grant.Grant] = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('grants') }}) - r"""List of grants (permissions) applied to the role""" - id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('id') }}) - r"""Format: :""" - name: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('name') }}) - r"""Human-friendly name for the role""" - organization_id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('organization_id') }}) - r"""Id of an organization""" - slug: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('slug') }}) - r"""URL-friendly name for the role""" - type: ShareRoleTypeEnum = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('type') }}) - expires_at: Optional[datetime] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('expires_at'), 'encoder': utils.datetimeisoformat(True), 'decoder': dateutil.parser.isoparse, 'mm_field': fields.DateTime(format='iso'), 'exclude': lambda f: f is None }}) - r"""date and time then the role will expire""" - \ No newline at end of file diff --git a/permissions/src/epilot/models/shared/userrole.py b/permissions/src/epilot/models/shared/userrole.py deleted file mode 100755 index bdf6d71c7..000000000 --- a/permissions/src/epilot/models/shared/userrole.py +++ /dev/null @@ -1,36 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from __future__ import annotations -import dataclasses -import dateutil.parser -from ..shared import grant as shared_grant -from dataclasses_json import Undefined, dataclass_json -from datetime import datetime -from enum import Enum -from epilot import utils -from marshmallow import fields -from typing import Optional - -class UserRoleTypeEnum(str, Enum): - USER_ROLE = "user_role" - - -@dataclass_json(undefined=Undefined.EXCLUDE) -@dataclasses.dataclass -class UserRole: - r"""A standard user role. Must be explicitly assigned to users.""" - - grants: list[shared_grant.Grant] = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('grants') }}) - r"""List of grants (permissions) applied to the role""" - id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('id') }}) - r"""Format: :""" - name: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('name') }}) - r"""Human-friendly name for the role""" - organization_id: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('organization_id') }}) - r"""Id of an organization""" - slug: str = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('slug') }}) - r"""URL-friendly name for the role""" - type: UserRoleTypeEnum = dataclasses.field(metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('type') }}) - expires_at: Optional[datetime] = dataclasses.field(default=None, metadata={'dataclasses_json': { 'letter_case': utils.get_field_name('expires_at'), 'encoder': utils.datetimeisoformat(True), 'decoder': dateutil.parser.isoparse, 'mm_field': fields.DateTime(format='iso'), 'exclude': lambda f: f is None }}) - r"""date and time then the role will expire""" - \ No newline at end of file diff --git a/permissions/src/epilot/roles.py b/permissions/src/epilot/roles.py deleted file mode 100755 index bfd3fa55d..000000000 --- a/permissions/src/epilot/roles.py +++ /dev/null @@ -1,192 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -import requests as requests_http -from . import utils -from epilot.models import operations, shared -from typing import Any, Optional - -class Roles: - r"""Manage roles and grants""" - _client: requests_http.Session - _security_client: requests_http.Session - _server_url: str - _language: str - _sdk_version: str - _gen_version: str - - def __init__(self, client: requests_http.Session, security_client: requests_http.Session, server_url: str, language: str, sdk_version: str, gen_version: str) -> None: - self._client = client - self._security_client = security_client - self._server_url = server_url - self._language = language - self._sdk_version = sdk_version - self._gen_version = gen_version - - def delete_role(self, request: operations.DeleteRoleRequest) -> operations.DeleteRoleResponse: - r"""deleteRole - Delete role by id - """ - base_url = self._server_url - - url = utils.generate_url(operations.DeleteRoleRequest, base_url, '/v1/permissions/roles/{roleId}', request) - - - client = self._security_client - - http_res = client.request('DELETE', url) - content_type = http_res.headers.get('Content-Type') - - res = operations.DeleteRoleResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[Any]) - res.role = out - - return res - - def get_role(self, request: operations.GetRoleRequest) -> operations.GetRoleResponse: - r"""getRole - Get role by id - """ - base_url = self._server_url - - url = utils.generate_url(operations.GetRoleRequest, base_url, '/v1/permissions/roles/{roleId}', request) - - - client = self._security_client - - http_res = client.request('GET', url) - content_type = http_res.headers.get('Content-Type') - - res = operations.GetRoleResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[Any]) - res.role = out - - return res - - def list_all_roles(self) -> operations.ListAllRolesResponse: - r"""listAllRoles - Returns list of all roles in organization - """ - base_url = self._server_url - - url = base_url.removesuffix('/') + '/v1/permissions/roles' - - - client = self._security_client - - http_res = client.request('GET', url) - content_type = http_res.headers.get('Content-Type') - - res = operations.ListAllRolesResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[operations.ListAllRoles200ApplicationJSON]) - res.list_all_roles_200_application_json_object = out - - return res - - def list_current_roles(self) -> operations.ListCurrentRolesResponse: - r"""listCurrentRoles - Returns roles and grants assigned to current user - """ - base_url = self._server_url - - url = base_url.removesuffix('/') + '/v1/permissions/me' - - - client = self._security_client - - http_res = client.request('GET', url) - content_type = http_res.headers.get('Content-Type') - - res = operations.ListCurrentRolesResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[operations.ListCurrentRoles200ApplicationJSON]) - res.list_current_roles_200_application_json_object = out - - return res - - def put_role(self, request: operations.PutRoleRequest) -> operations.PutRoleResponse: - r"""putRole - Create or update role - """ - base_url = self._server_url - - url = utils.generate_url(operations.PutRoleRequest, base_url, '/v1/permissions/roles/{roleId}', request) - - headers = {} - req_content_type, data, form = utils.serialize_request_body(request, "request_body", 'json') - if req_content_type not in ('multipart/form-data', 'multipart/mixed'): - headers['content-type'] = req_content_type - - client = self._security_client - - http_res = client.request('PUT', url, data=data, files=form, headers=headers) - content_type = http_res.headers.get('Content-Type') - - res = operations.PutRoleResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[Any]) - res.role = out - - return res - - def refresh_permissions(self) -> operations.RefreshPermissionsResponse: - r"""refreshPermissions - Makes sure the user has a role in the organization - """ - base_url = self._server_url - - url = base_url.removesuffix('/') + '/v1/permissions/refresh' - - - client = self._security_client - - http_res = client.request('GET', url) - content_type = http_res.headers.get('Content-Type') - - res = operations.RefreshPermissionsResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - pass - - return res - - def search_roles(self, request: shared.RoleSearchInput) -> operations.SearchRolesResponse: - r"""searchRoles - Search Roles - """ - base_url = self._server_url - - url = base_url.removesuffix('/') + '/v1/permissions/roles:search' - - headers = {} - req_content_type, data, form = utils.serialize_request_body(request, "request", 'json') - if req_content_type not in ('multipart/form-data', 'multipart/mixed'): - headers['content-type'] = req_content_type - - client = self._security_client - - http_res = client.request('POST', url, data=data, files=form, headers=headers) - content_type = http_res.headers.get('Content-Type') - - res = operations.SearchRolesResponse(status_code=http_res.status_code, content_type=content_type, raw_response=http_res) - - if http_res.status_code == 200: - if utils.match_content_type(content_type, 'application/json'): - out = utils.unmarshal_json(http_res.text, Optional[operations.SearchRoles200ApplicationJSON]) - res.search_roles_200_application_json_object = out - - return res - - \ No newline at end of file diff --git a/permissions/src/epilot/sdk.py b/permissions/src/epilot/sdk.py deleted file mode 100755 index b498e6a08..000000000 --- a/permissions/src/epilot/sdk.py +++ /dev/null @@ -1,81 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -import requests as requests_http -from . import utils -from .assignments import Assignments -from .roles import Roles -from epilot.models import shared - -SERVERS = [ - "https://permissions.sls.epilot.io", -] -"""Contains the list of servers available to the SDK""" - -class Epilot: - r"""Flexible Role-based Access Control for epilot""" - assignments: Assignments - r"""Assign roles to users""" - roles: Roles - r"""Manage roles and grants""" - - _client: requests_http.Session - _security_client: requests_http.Session - _server_url: str = SERVERS[0] - _language: str = "python" - _sdk_version: str = "1.2.2" - _gen_version: str = "2.16.5" - - def __init__(self, - security: shared.Security = None, - server_url: str = None, - url_params: dict[str, str] = None, - client: requests_http.Session = None - ) -> None: - """Instantiates the SDK configuring it with the provided parameters. - - :param security: The security details required for authentication - :type security: shared.Security - :param server_url: The server URL to use for all operations - :type server_url: str - :param url_params: Parameters to optionally template the server URL with - :type url_params: dict[str, str] - :param client: The requests.Session HTTP client to use for all operations - :type client: requests_http.Session - """ - self._client = requests_http.Session() - - - if server_url is not None: - if url_params is not None: - self._server_url = utils.template_url(server_url, url_params) - else: - self._server_url = server_url - - if client is not None: - self._client = client - - self._security_client = utils.configure_security_client(self._client, security) - - - self._init_sdks() - - def _init_sdks(self): - self.assignments = Assignments( - self._client, - self._security_client, - self._server_url, - self._language, - self._sdk_version, - self._gen_version - ) - - self.roles = Roles( - self._client, - self._security_client, - self._server_url, - self._language, - self._sdk_version, - self._gen_version - ) - - \ No newline at end of file diff --git a/permissions/src/epilot/utils/__init__.py b/permissions/src/epilot/utils/__init__.py deleted file mode 100755 index 94b739857..000000000 --- a/permissions/src/epilot/utils/__init__.py +++ /dev/null @@ -1,4 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -from .retries import * -from .utils import * diff --git a/permissions/src/epilot/utils/retries.py b/permissions/src/epilot/utils/retries.py deleted file mode 100755 index c6251d948..000000000 --- a/permissions/src/epilot/utils/retries.py +++ /dev/null @@ -1,118 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -import random -import time - -import requests - - -class BackoffStrategy: - initial_interval: int - max_interval: int - exponent: float - max_elapsed_time: int - - def __init__(self, initial_interval: int, max_interval: int, exponent: float, max_elapsed_time: int): - self.initial_interval = initial_interval - self.max_interval = max_interval - self.exponent = exponent - self.max_elapsed_time = max_elapsed_time - - -class RetryConfig: - strategy: str - backoff: BackoffStrategy - retry_connection_errors: bool - - def __init__(self, strategy: str, retry_connection_errors: bool): - self.strategy = strategy - self.retry_connection_errors = retry_connection_errors - - -class Retries: - config: RetryConfig - status_codes: list[str] - - def __init__(self, config: RetryConfig, status_codes: list[str]): - self.config = config - self.status_codes = status_codes - - -class TemporaryError(Exception): - response: requests.Response - - def __init__(self, response: requests.Response): - self.response = response - - -class PermanentError(Exception): - inner: Exception - - def __init__(self, inner: Exception): - self.inner = inner - - -def retry(func, retries: Retries): - if retries.config.strategy == 'backoff': - def do_request(): - res: requests.Response - try: - res = func() - - for code in retries.status_codes: - if "X" in code.upper(): - code_range = int(code[0]) - - status_major = res.status_code / 100 - - if status_major >= code_range and status_major < code_range + 1: - raise TemporaryError(res) - else: - parsed_code = int(code) - - if res.status_code == parsed_code: - raise TemporaryError(res) - except requests.exceptions.ConnectionError as exception: - if not retries.config.config.retry_connection_errors: - raise - - raise PermanentError(exception) from exception - except requests.exceptions.Timeout as exception: - if not retries.config.config.retry_connection_errors: - raise - - raise PermanentError(exception) from exception - except TemporaryError: - raise - except Exception as exception: - raise PermanentError(exception) from exception - - return res - - return retry_with_backoff(do_request, retries.config.backoff.initial_interval, retries.config.backoff.max_interval, retries.config.backoff.exponent, retries.config.backoff.max_elapsed_time) - - return func() - - -def retry_with_backoff(func, initial_interval=500, max_interval=60000, exponent=1.5, max_elapsed_time=3600000): - start = round(time.time()*1000) - retries = 0 - - while True: - try: - return func() - except PermanentError as exception: - raise exception.inner - except Exception as exception: # pylint: disable=broad-exception-caught - now = round(time.time()*1000) - if now - start > max_elapsed_time: - if isinstance(exception, TemporaryError): - return exception.response - - raise - sleep = ((initial_interval/1000) * - exponent**retries + random.uniform(0, 1)) - if sleep > max_interval/1000: - sleep = max_interval/1000 - time.sleep(sleep) - retries += 1 diff --git a/permissions/src/epilot/utils/utils.py b/permissions/src/epilot/utils/utils.py deleted file mode 100755 index 9d4fba324..000000000 --- a/permissions/src/epilot/utils/utils.py +++ /dev/null @@ -1,735 +0,0 @@ -"""Code generated by Speakeasy (https://speakeasyapi.dev). DO NOT EDIT.""" - -import base64 -import json -import re -from dataclasses import Field, dataclass, fields, is_dataclass, make_dataclass -from datetime import date, datetime -from email.message import Message -from enum import Enum -from typing import Any, Callable, Optional, Tuple, Union, get_args, get_origin -from xmlrpc.client import boolean - -import dateutil.parser -import requests -from dataclasses_json import DataClassJsonMixin - - -class SecurityClient: - client: requests.Session - query_params: dict[str, str] = {} - - def __init__(self, client: requests.Session): - self.client = client - - def request(self, method, url, **kwargs): - params = kwargs.get('params', {}) - kwargs["params"] = self.query_params | params - - return self.client.request(method, url, **kwargs) - - -def configure_security_client(client: requests.Session, security: dataclass): - client = SecurityClient(client) - - if security is None: - return client - - sec_fields: Tuple[Field, ...] = fields(security) - for sec_field in sec_fields: - value = getattr(security, sec_field.name) - if value is None: - continue - - metadata = sec_field.metadata.get('security') - if metadata is None: - continue - if metadata.get('option'): - _parse_security_option(client, value) - return client - if metadata.get('scheme'): - # Special case for basic auth which could be a flattened struct - if metadata.get("sub_type") == "basic" and not is_dataclass(value): - _parse_security_scheme(client, metadata, security) - else: - _parse_security_scheme(client, metadata, value) - - return client - - -def _parse_security_option(client: SecurityClient, option: dataclass): - opt_fields: Tuple[Field, ...] = fields(option) - for opt_field in opt_fields: - metadata = opt_field.metadata.get('security') - if metadata is None or metadata.get('scheme') is None: - continue - _parse_security_scheme( - client, metadata, getattr(option, opt_field.name)) - - -def _parse_security_scheme(client: SecurityClient, scheme_metadata: dict, scheme: any): - scheme_type = scheme_metadata.get('type') - sub_type = scheme_metadata.get('sub_type') - - if is_dataclass(scheme): - if scheme_type == 'http' and sub_type == 'basic': - _parse_basic_auth_scheme(client, scheme) - return - - scheme_fields: Tuple[Field, ...] = fields(scheme) - for scheme_field in scheme_fields: - metadata = scheme_field.metadata.get('security') - if metadata is None or metadata.get('field_name') is None: - continue - - value = getattr(scheme, scheme_field.name) - - _parse_security_scheme_value( - client, scheme_metadata, metadata, value) - else: - _parse_security_scheme_value( - client, scheme_metadata, scheme_metadata, scheme) - - -def _parse_security_scheme_value(client: SecurityClient, scheme_metadata: dict, security_metadata: dict, value: any): - scheme_type = scheme_metadata.get('type') - sub_type = scheme_metadata.get('sub_type') - - header_name = security_metadata.get('field_name') - - if scheme_type == "apiKey": - if sub_type == 'header': - client.client.headers[header_name] = value - elif sub_type == 'query': - client.query_params[header_name] = value - elif sub_type == 'cookie': - client.client.cookies[header_name] = value - else: - raise Exception('not supported') - elif scheme_type == "openIdConnect": - client.client.headers[header_name] = value - elif scheme_type == 'oauth2': - client.client.headers[header_name] = value - elif scheme_type == 'http': - if sub_type == 'bearer': - client.client.headers[header_name] = value - else: - raise Exception('not supported') - else: - raise Exception('not supported') - - -def _parse_basic_auth_scheme(client: SecurityClient, scheme: dataclass): - username = "" - password = "" - - scheme_fields: Tuple[Field, ...] = fields(scheme) - for scheme_field in scheme_fields: - metadata = scheme_field.metadata.get('security') - if metadata is None or metadata.get('field_name') is None: - continue - - field_name = metadata.get('field_name') - value = getattr(scheme, scheme_field.name) - - if field_name == 'username': - username = value - if field_name == 'password': - password = value - - data = f'{username}:{password}'.encode() - client.client.headers['Authorization'] = f'Basic {base64.b64encode(data).decode()}' - - -def generate_url(clazz: type, server_url: str, path: str, path_params: dataclass, gbls: dict[str, dict[str, dict[str, Any]]] = None) -> str: - path_param_fields: Tuple[Field, ...] = fields(clazz) - for field in path_param_fields: - request_metadata = field.metadata.get('request') - if request_metadata is not None: - continue - - param_metadata = field.metadata.get('path_param') - if param_metadata is None: - continue - - if param_metadata.get('style', 'simple') == 'simple': - param = getattr( - path_params, field.name) if path_params is not None else None - param = _populate_from_globals( - field.name, param, 'pathParam', gbls) - - if param is None: - continue - - if isinstance(param, list): - pp_vals: list[str] = [] - for pp_val in param: - if pp_val is None: - continue - pp_vals.append(_val_to_string(pp_val)) - path = path.replace( - '{' + param_metadata.get('field_name', field.name) + '}', ",".join(pp_vals), 1) - elif isinstance(param, dict): - pp_vals: list[str] = [] - for pp_key in param: - if param[pp_key] is None: - continue - if param_metadata.get('explode'): - pp_vals.append( - f"{pp_key}={_val_to_string(param[pp_key])}") - else: - pp_vals.append( - f"{pp_key},{_val_to_string(param[pp_key])}") - path = path.replace( - '{' + param_metadata.get('field_name', field.name) + '}', ",".join(pp_vals), 1) - elif not isinstance(param, (str, int, float, complex, bool)): - pp_vals: list[str] = [] - param_fields: Tuple[Field, ...] = fields(param) - for param_field in param_fields: - param_value_metadata = param_field.metadata.get( - 'path_param') - if not param_value_metadata: - continue - - parm_name = param_value_metadata.get( - 'field_name', field.name) - - param_field_val = getattr(param, param_field.name) - if param_field_val is None: - continue - if param_metadata.get('explode'): - pp_vals.append( - f"{parm_name}={_val_to_string(param_field_val)}") - else: - pp_vals.append( - f"{parm_name},{_val_to_string(param_field_val)}") - path = path.replace( - '{' + param_metadata.get('field_name', field.name) + '}', ",".join(pp_vals), 1) - else: - path = path.replace( - '{' + param_metadata.get('field_name', field.name) + '}', _val_to_string(param), 1) - - return server_url.removesuffix("/") + path - - -def is_optional(field): - return get_origin(field) is Union and type(None) in get_args(field) - - -def template_url(url_with_params: str, params: dict[str, str]) -> str: - for key, value in params.items(): - url_with_params = url_with_params.replace( - '{' + key + '}', value) - - return url_with_params - - -def get_query_params(clazz: type, query_params: dataclass, gbls: dict[str, dict[str, dict[str, Any]]] = None) -> dict[str, list[str]]: - params: dict[str, list[str]] = {} - - param_fields: Tuple[Field, ...] = fields(clazz) - for field in param_fields: - request_metadata = field.metadata.get('request') - if request_metadata is not None: - continue - - metadata = field.metadata.get('query_param') - if not metadata: - continue - - param_name = field.name - value = getattr( - query_params, param_name) if query_params is not None else None - - value = _populate_from_globals(param_name, value, 'queryParam', gbls) - - f_name = metadata.get("field_name") - serialization = metadata.get('serialization', '') - if serialization != '': - params = params | _get_serialized_query_params( - metadata, f_name, value) - else: - style = metadata.get('style', 'form') - if style == 'deepObject': - params = params | _get_deep_object_query_params( - metadata, f_name, value) - elif style == 'form': - params = params | _get_form_query_params( - metadata, f_name, value) - else: - raise Exception('not yet implemented') - return params - - -def get_headers(headers_params: dataclass) -> dict[str, str]: - if headers_params is None: - return {} - - headers: dict[str, str] = {} - - param_fields: Tuple[Field, ...] = fields(headers_params) - for field in param_fields: - metadata = field.metadata.get('header') - if not metadata: - continue - - value = _serialize_header(metadata.get( - 'explode', False), getattr(headers_params, field.name)) - - if value != '': - headers[metadata.get('field_name', field.name)] = value - - return headers - - -def _get_serialized_query_params(metadata: dict, field_name: str, obj: any) -> dict[str, list[str]]: - params: dict[str, list[str]] = {} - - serialization = metadata.get('serialization', '') - if serialization == 'json': - params[metadata.get("field_name", field_name)] = marshal_json(obj) - - return params - - -def _get_deep_object_query_params(metadata: dict, field_name: str, obj: any) -> dict[str, list[str]]: - params: dict[str, list[str]] = {} - - if obj is None: - return params - - if is_dataclass(obj): - obj_fields: Tuple[Field, ...] = fields(obj) - for obj_field in obj_fields: - obj_param_metadata = obj_field.metadata.get('query_param') - if not obj_param_metadata: - continue - - obj_val = getattr(obj, obj_field.name) - if obj_val is None: - continue - - if isinstance(obj_val, list): - for val in obj_val: - if val is None: - continue - - if params.get(f'{metadata.get("field_name", field_name)}[{obj_param_metadata.get("field_name", obj_field.name)}]') is None: - params[f'{metadata.get("field_name", field_name)}[{obj_param_metadata.get("field_name", obj_field.name)}]'] = [ - ] - - params[ - f'{metadata.get("field_name", field_name)}[{obj_param_metadata.get("field_name", obj_field.name)}]'].append(_val_to_string(val)) - else: - params[ - f'{metadata.get("field_name", field_name)}[{obj_param_metadata.get("field_name", obj_field.name)}]'] = [ - _val_to_string(obj_val)] - elif isinstance(obj, dict): - for key, value in obj.items(): - if value is None: - continue - - if isinstance(value, list): - for val in value: - if val is None: - continue - - if params.get(f'{metadata.get("field_name", field_name)}[{key}]') is None: - params[f'{metadata.get("field_name", field_name)}[{key}]'] = [ - ] - - params[ - f'{metadata.get("field_name", field_name)}[{key}]'].append(_val_to_string(val)) - else: - params[f'{metadata.get("field_name", field_name)}[{key}]'] = [ - _val_to_string(value)] - return params - - -def _get_query_param_field_name(obj_field: Field) -> str: - obj_param_metadata = obj_field.metadata.get('query_param') - - if not obj_param_metadata: - return "" - - return obj_param_metadata.get("field_name", obj_field.name) - - -def _get_form_query_params(metadata: dict, field_name: str, obj: any) -> dict[str, list[str]]: - return _populate_form(field_name, metadata.get("explode", True), obj, _get_query_param_field_name) - - -SERIALIZATION_METHOD_TO_CONTENT_TYPE = { - 'json': 'application/json', - 'form': 'application/x-www-form-urlencoded', - 'multipart': 'multipart/form-data', - 'raw': 'application/octet-stream', - 'string': 'text/plain', -} - - -def serialize_request_body(request: dataclass, request_field_name: str, serialization_method: str) -> Tuple[str, any, any]: - if request is None: - return None, None, None, None - - if not is_dataclass(request) or not hasattr(request, request_field_name): - return serialize_content_type(request_field_name, SERIALIZATION_METHOD_TO_CONTENT_TYPE[serialization_method], request) - - request_val = getattr(request, request_field_name) - - request_fields: Tuple[Field, ...] = fields(request) - request_metadata = None - - for field in request_fields: - if field.name == request_field_name: - request_metadata = field.metadata.get('request') - break - - if request_metadata is None: - raise Exception('invalid request type') - - return serialize_content_type(request_field_name, request_metadata.get('media_type', 'application/octet-stream'), request_val) - - -def serialize_content_type(field_name: str, media_type: str, request: dataclass) -> Tuple[str, any, list[list[any]]]: - if re.match(r'(application|text)\/.*?\+*json.*', media_type) is not None: - return media_type, marshal_json(request), None - if re.match(r'multipart\/.*', media_type) is not None: - return serialize_multipart_form(media_type, request) - if re.match(r'application\/x-www-form-urlencoded.*', media_type) is not None: - return media_type, serialize_form_data(field_name, request), None - if isinstance(request, (bytes, bytearray)): - return media_type, request, None - if isinstance(request, str): - return media_type, request, None - - raise Exception( - f"invalid request body type {type(request)} for mediaType {media_type}") - - -def serialize_multipart_form(media_type: str, request: dataclass) -> Tuple[str, any, list[list[any]]]: - form: list[list[any]] = [] - request_fields = fields(request) - - for field in request_fields: - val = getattr(request, field.name) - if val is None: - continue - - field_metadata = field.metadata.get('multipart_form') - if not field_metadata: - continue - - if field_metadata.get("file") is True: - file_fields = fields(val) - - file_name = "" - field_name = "" - content = bytes() - - for file_field in file_fields: - file_metadata = file_field.metadata.get('multipart_form') - if file_metadata is None: - continue - - if file_metadata.get("content") is True: - content = getattr(val, file_field.name) - else: - field_name = file_metadata.get( - "field_name", file_field.name) - file_name = getattr(val, file_field.name) - if field_name == "" or file_name == "" or content == bytes(): - raise Exception('invalid multipart/form-data file') - - form.append([field_name, [file_name, content]]) - elif field_metadata.get("json") is True: - to_append = [field_metadata.get("field_name", field.name), [ - None, marshal_json(val), "application/json"]] - form.append(to_append) - else: - field_name = field_metadata.get( - "field_name", field.name) - if isinstance(val, list): - for value in val: - if value is None: - continue - form.append( - [field_name + "[]", [None, _val_to_string(value)]]) - else: - form.append([field_name, [None, _val_to_string(val)]]) - return media_type, None, form - - -def serialize_dict(original: dict, explode: bool, field_name, existing: Optional[dict[str, list[str]]]) -> dict[ - str, list[str]]: - if existing is None: - existing = [] - - if explode is True: - for key, val in original.items(): - if key not in existing: - existing[key] = [] - existing[key].append(val) - else: - temp = [] - for key, val in original.items(): - temp.append(str(key)) - temp.append(str(val)) - if field_name not in existing: - existing[field_name] = [] - existing[field_name].append(",".join(temp)) - return existing - - -def serialize_form_data(field_name: str, data: dataclass) -> dict[str, any]: - form: dict[str, list[str]] = {} - - if is_dataclass(data): - for field in fields(data): - val = getattr(data, field.name) - if val is None: - continue - - metadata = field.metadata.get('form') - if metadata is None: - continue - - field_name = metadata.get('field_name', field.name) - - if metadata.get('json'): - form[field_name] = [marshal_json(val)] - else: - if metadata.get('style', 'form') == 'form': - form = form | _populate_form( - field_name, metadata.get('explode', True), val, _get_form_field_name) - else: - raise Exception( - f'Invalid form style for field {field.name}') - elif isinstance(data, dict): - for key, value in data.items(): - form[key] = [_val_to_string(value)] - else: - raise Exception(f'Invalid request body type for field {field_name}') - - return form - - -def _get_form_field_name(obj_field: Field) -> str: - obj_param_metadata = obj_field.metadata.get('form') - - if not obj_param_metadata: - return "" - - return obj_param_metadata.get("field_name", obj_field.name) - - -def _populate_form(field_name: str, explode: boolean, obj: any, get_field_name_func: Callable) -> dict[str, list[str]]: - params: dict[str, list[str]] = {} - - if obj is None: - return params - - if is_dataclass(obj): - items = [] - - obj_fields: Tuple[Field, ...] = fields(obj) - for obj_field in obj_fields: - obj_field_name = get_field_name_func(obj_field) - if obj_field_name == '': - continue - - val = getattr(obj, obj_field.name) - if val is None: - continue - - if explode: - params[obj_field_name] = [_val_to_string(val)] - else: - items.append( - f'{obj_field_name},{_val_to_string(val)}') - - if len(items) > 0: - params[field_name] = [','.join(items)] - elif isinstance(obj, dict): - items = [] - for key, value in obj.items(): - if value is None: - continue - - if explode: - params[key] = _val_to_string(value) - else: - items.append(f'{key},{_val_to_string(value)}') - - if len(items) > 0: - params[field_name] = [','.join(items)] - elif isinstance(obj, list): - items = [] - - for value in obj: - if value is None: - continue - - if explode: - if not field_name in params: - params[field_name] = [] - params[field_name].append(_val_to_string(value)) - else: - items.append(_val_to_string(value)) - - if len(items) > 0: - params[field_name] = [','.join([str(item) for item in items])] - else: - params[field_name] = [_val_to_string(obj)] - - return params - - -def _serialize_header(explode: bool, obj: any) -> str: - if obj is None: - return '' - - if is_dataclass(obj): - items = [] - obj_fields: Tuple[Field, ...] = fields(obj) - for obj_field in obj_fields: - obj_param_metadata = obj_field.metadata.get('header') - - if not obj_param_metadata: - continue - - obj_field_name = obj_param_metadata.get( - 'field_name', obj_field.name) - if obj_field_name == '': - continue - - val = getattr(obj, obj_field.name) - if val is None: - continue - - if explode: - items.append( - f'{obj_field_name}={_val_to_string(val)}') - else: - items.append(obj_field_name) - items.append(_val_to_string(val)) - - if len(items) > 0: - return ','.join(items) - elif isinstance(obj, dict): - items = [] - - for key, value in obj.items(): - if value is None: - continue - - if explode: - items.append(f'{key}={_val_to_string(value)}') - else: - items.append(key) - items.append(_val_to_string(value)) - - if len(items) > 0: - return ','.join([str(item) for item in items]) - elif isinstance(obj, list): - items = [] - - for value in obj: - if value is None: - continue - - items.append(_val_to_string(value)) - - if len(items) > 0: - return ','.join(items) - else: - return f'{_val_to_string(obj)}' - - return '' - - -def unmarshal_json(data, typ): - unmarhsal = make_dataclass('Unmarhsal', [('res', typ)], - bases=(DataClassJsonMixin,)) - json_dict = json.loads(data) - out = unmarhsal.from_dict({"res": json_dict}) - return out.res - - -def marshal_json(val): - marshal = make_dataclass('Marshal', [('res', type(val))], - bases=(DataClassJsonMixin,)) - marshaller = marshal(res=val) - json_dict = marshaller.to_dict() - return json.dumps(json_dict["res"]) - - -def match_content_type(content_type: str, pattern: str) -> boolean: - if pattern in (content_type, "*", "*/*"): - return True - - msg = Message() - msg['content-type'] = content_type - media_type = msg.get_content_type() - - if media_type == pattern: - return True - - parts = media_type.split("/") - if len(parts) == 2: - if pattern in (f'{parts[0]}/*', f'*/{parts[1]}'): - return True - - return False - - -def datetimeisoformat(optional: bool): - def isoformatoptional(val): - if optional and val is None: - return None - return _val_to_string(val) - - return isoformatoptional - - -def dateisoformat(optional: bool): - def isoformatoptional(val): - if optional and val is None: - return None - return date.isoformat(val) - - return isoformatoptional - - -def datefromisoformat(date_str: str): - return dateutil.parser.parse(date_str).date() - - -def get_field_name(name): - def override(_, _field_name=name): - return _field_name - - return override - - -def _val_to_string(val): - if isinstance(val, bool): - return str(val).lower() - if isinstance(val, datetime): - return val.isoformat().replace('+00:00', 'Z') - if isinstance(val, Enum): - return val.value - - return str(val) - - -def _populate_from_globals(param_name: str, value: any, param_type: str, gbls: dict[str, dict[str, dict[str, Any]]]): - if value is None and gbls is not None: - if 'parameters' in gbls: - if param_type in gbls['parameters']: - if param_name in gbls['parameters'][param_type]: - global_value = gbls['parameters'][param_type][param_name] - if global_value is not None: - value = global_value - - return value diff --git a/permissions/src/epilot_permissions/__init__.py b/permissions/src/epilot_permissions/__init__.py new file mode 100644 index 000000000..68138c477 --- /dev/null +++ b/permissions/src/epilot_permissions/__init__.py @@ -0,0 +1,5 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from .sdk import * +from .sdkconfiguration import * +from .models import * diff --git a/permissions/src/epilot_permissions/_hooks/__init__.py b/permissions/src/epilot_permissions/_hooks/__init__.py new file mode 100644 index 000000000..2ee66cdd5 --- /dev/null +++ b/permissions/src/epilot_permissions/_hooks/__init__.py @@ -0,0 +1,5 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from .sdkhooks import * +from .types import * +from .registration import * diff --git a/permissions/src/epilot_permissions/_hooks/registration.py b/permissions/src/epilot_permissions/_hooks/registration.py new file mode 100644 index 000000000..1db6a5293 --- /dev/null +++ b/permissions/src/epilot_permissions/_hooks/registration.py @@ -0,0 +1,13 @@ +from .types import Hooks + + +# This file is only ever generated once on the first generation and then is free to be modified. +# Any hooks you wish to add should be registered in the init_hooks function. Feel free to define them +# in this file or in separate files in the hooks folder. + + +def init_hooks(hooks: Hooks): + # pylint: disable=unused-argument + """Add hooks by calling hooks.register{sdk_init/before_request/after_success/after_error}Hook + with an instance of a hook that implements that specific Hook interface + Hooks are registered per SDK instance, and are valid for the lifetime of the SDK instance""" diff --git a/permissions/src/epilot_permissions/_hooks/sdkhooks.py b/permissions/src/epilot_permissions/_hooks/sdkhooks.py new file mode 100644 index 000000000..68352dd6a --- /dev/null +++ b/permissions/src/epilot_permissions/_hooks/sdkhooks.py @@ -0,0 +1,57 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +import httpx +from .types import SDKInitHook, BeforeRequestContext, BeforeRequestHook, AfterSuccessContext, AfterSuccessHook, AfterErrorContext, AfterErrorHook, Hooks +from .registration import init_hooks +from typing import List, Optional, Tuple +from epilot_permissions.httpclient import HttpClient + +class SDKHooks(Hooks): + def __init__(self) -> None: + self.sdk_init_hooks: List[SDKInitHook] = [] + self.before_request_hooks: List[BeforeRequestHook] = [] + self.after_success_hooks: List[AfterSuccessHook] = [] + self.after_error_hooks: List[AfterErrorHook] = [] + init_hooks(self) + + def register_sdk_init_hook(self, hook: SDKInitHook) -> None: + self.sdk_init_hooks.append(hook) + + def register_before_request_hook(self, hook: BeforeRequestHook) -> None: + self.before_request_hooks.append(hook) + + def register_after_success_hook(self, hook: AfterSuccessHook) -> None: + self.after_success_hooks.append(hook) + + def register_after_error_hook(self, hook: AfterErrorHook) -> None: + self.after_error_hooks.append(hook) + + def sdk_init(self, base_url: str, client: HttpClient) -> Tuple[str, HttpClient]: + for hook in self.sdk_init_hooks: + base_url, client = hook.sdk_init(base_url, client) + return base_url, client + + def before_request(self, hook_ctx: BeforeRequestContext, request: httpx.Request) -> httpx.Request: + for hook in self.before_request_hooks: + out = hook.before_request(hook_ctx, request) + if isinstance(out, Exception): + raise out + request = out + + return request + + def after_success(self, hook_ctx: AfterSuccessContext, response: httpx.Response) -> httpx.Response: + for hook in self.after_success_hooks: + out = hook.after_success(hook_ctx, response) + if isinstance(out, Exception): + raise out + response = out + return response + + def after_error(self, hook_ctx: AfterErrorContext, response: Optional[httpx.Response], error: Optional[Exception]) -> Tuple[Optional[httpx.Response], Optional[Exception]]: + for hook in self.after_error_hooks: + result = hook.after_error(hook_ctx, response, error) + if isinstance(result, Exception): + raise result + response, error = result + return response, error diff --git a/permissions/src/epilot_permissions/_hooks/types.py b/permissions/src/epilot_permissions/_hooks/types.py new file mode 100644 index 000000000..7b05f4c38 --- /dev/null +++ b/permissions/src/epilot_permissions/_hooks/types.py @@ -0,0 +1,76 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + + +from abc import ABC, abstractmethod +from epilot_permissions.httpclient import HttpClient +import httpx +from typing import Any, Callable, List, Optional, Tuple, Union + + +class HookContext: + operation_id: str + oauth2_scopes: Optional[List[str]] = None + security_source: Optional[Union[Any, Callable[[], Any]]] = None + + def __init__(self, operation_id: str, oauth2_scopes: Optional[List[str]], security_source: Optional[Union[Any, Callable[[], Any]]]): + self.operation_id = operation_id + self.oauth2_scopes = oauth2_scopes + self.security_source = security_source + + +class BeforeRequestContext(HookContext): + def __init__(self, hook_ctx: HookContext): + super().__init__(hook_ctx.operation_id, hook_ctx.oauth2_scopes, hook_ctx.security_source) + + +class AfterSuccessContext(HookContext): + def __init__(self, hook_ctx: HookContext): + super().__init__(hook_ctx.operation_id, hook_ctx.oauth2_scopes, hook_ctx.security_source) + + + +class AfterErrorContext(HookContext): + def __init__(self, hook_ctx: HookContext): + super().__init__(hook_ctx.operation_id, hook_ctx.oauth2_scopes, hook_ctx.security_source) + + +class SDKInitHook(ABC): + @abstractmethod + def sdk_init(self, base_url: str, client: HttpClient) -> Tuple[str, HttpClient]: + pass + + +class BeforeRequestHook(ABC): + @abstractmethod + def before_request(self, hook_ctx: BeforeRequestContext, request: httpx.Request) -> Union[httpx.Request, Exception]: + pass + + +class AfterSuccessHook(ABC): + @abstractmethod + def after_success(self, hook_ctx: AfterSuccessContext, response: httpx.Response) -> Union[httpx.Response, Exception]: + pass + + +class AfterErrorHook(ABC): + @abstractmethod + def after_error(self, hook_ctx: AfterErrorContext, response: Optional[httpx.Response], error: Optional[Exception]) -> Union[Tuple[Optional[httpx.Response], Optional[Exception]], Exception]: + pass + + +class Hooks(ABC): + @abstractmethod + def register_sdk_init_hook(self, hook: SDKInitHook): + pass + + @abstractmethod + def register_before_request_hook(self, hook: BeforeRequestHook): + pass + + @abstractmethod + def register_after_success_hook(self, hook: AfterSuccessHook): + pass + + @abstractmethod + def register_after_error_hook(self, hook: AfterErrorHook): + pass diff --git a/permissions/src/epilot_permissions/assignments.py b/permissions/src/epilot_permissions/assignments.py new file mode 100644 index 000000000..1c5fad557 --- /dev/null +++ b/permissions/src/epilot_permissions/assignments.py @@ -0,0 +1,764 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from .basesdk import BaseSDK +from epilot_permissions import models +from epilot_permissions._hooks import HookContext +from epilot_permissions.types import OptionalNullable, UNSET +import epilot_permissions.utils as utils +from typing import List, Optional + +class Assignments(BaseSDK): + r"""Assign roles to users""" + + + def add_assignment( + self, *, + role_id: str, + user_id: str, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.Assignment]: + r"""addAssignment + + Assign a user to a role. + + Use the `x-epilot-org-id` header to assign share roles to users in other orgs + + + :param role_id: + :param user_id: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.AddAssignmentRequest( + role_id=role_id, + user_id=user_id, + ) + + req = self.build_request( + method="POST", + path="/v1/permissions/assignments/{userId}/{roleId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="addAssignment", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "201", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.Assignment]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def add_assignment_async( + self, *, + role_id: str, + user_id: str, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.Assignment]: + r"""addAssignment + + Assign a user to a role. + + Use the `x-epilot-org-id` header to assign share roles to users in other orgs + + + :param role_id: + :param user_id: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.AddAssignmentRequest( + role_id=role_id, + user_id=user_id, + ) + + req = self.build_request( + method="POST", + path="/v1/permissions/assignments/{userId}/{roleId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="addAssignment", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "201", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.Assignment]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + def assign_roles( + self, *, + user_id: str, + request_body: Optional[List[str]] = None, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[List[str]]: + r"""assignRoles + + Assign / unassign roles to users. + + :param user_id: + :param request_body: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.AssignRolesRequest( + user_id=user_id, + request_body=request_body, + ) + + req = self.build_request( + method="PUT", + path="/v1/permissions/assignments/{userId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + get_serialized_body=lambda: utils.serialize_request_body(request.request_body, False, True, "json", Optional[List[str]]), + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="assignRoles", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[List[str]]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def assign_roles_async( + self, *, + user_id: str, + request_body: Optional[List[str]] = None, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[List[str]]: + r"""assignRoles + + Assign / unassign roles to users. + + :param user_id: + :param request_body: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.AssignRolesRequest( + user_id=user_id, + request_body=request_body, + ) + + req = self.build_request( + method="PUT", + path="/v1/permissions/assignments/{userId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + get_serialized_body=lambda: utils.serialize_request_body(request.request_body, False, True, "json", Optional[List[str]]), + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="assignRoles", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[List[str]]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + def get_assigned_roles_for_user( + self, *, + user_id: str, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[List[str]]: + r"""getAssignedRolesForUser + + Get list of assigned roles by user id + + :param user_id: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.GetAssignedRolesForUserRequest( + user_id=user_id, + ) + + req = self.build_request( + method="GET", + path="/v1/permissions/assignments/{userId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="getAssignedRolesForUser", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[List[str]]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def get_assigned_roles_for_user_async( + self, *, + user_id: str, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[List[str]]: + r"""getAssignedRolesForUser + + Get list of assigned roles by user id + + :param user_id: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.GetAssignedRolesForUserRequest( + user_id=user_id, + ) + + req = self.build_request( + method="GET", + path="/v1/permissions/assignments/{userId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="getAssignedRolesForUser", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[List[str]]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + def list_all_assignments( + self, *, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.ListAllAssignmentsResponseBody]: + r"""listAllAssignments + + Returns list of all assignments in organization + + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + req = self.build_request( + method="GET", + path="/v1/permissions/assignments", + base_url=base_url, + url_variables=url_variables, + request=None, + request_body_required=False, + request_has_path_params=False, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="listAllAssignments", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.ListAllAssignmentsResponseBody]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def list_all_assignments_async( + self, *, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.ListAllAssignmentsResponseBody]: + r"""listAllAssignments + + Returns list of all assignments in organization + + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + req = self.build_request( + method="GET", + path="/v1/permissions/assignments", + base_url=base_url, + url_variables=url_variables, + request=None, + request_body_required=False, + request_has_path_params=False, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="listAllAssignments", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.ListAllAssignmentsResponseBody]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + def remove_assignment( + self, *, + role_id: str, + user_id: str, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.Assignment]: + r"""removeAssignment + + Remove role assignment from user + + :param role_id: + :param user_id: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.RemoveAssignmentRequest( + role_id=role_id, + user_id=user_id, + ) + + req = self.build_request( + method="DELETE", + path="/v1/permissions/assignments/{userId}/{roleId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="removeAssignment", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.Assignment]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def remove_assignment_async( + self, *, + role_id: str, + user_id: str, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.Assignment]: + r"""removeAssignment + + Remove role assignment from user + + :param role_id: + :param user_id: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.RemoveAssignmentRequest( + role_id=role_id, + user_id=user_id, + ) + + req = self.build_request( + method="DELETE", + path="/v1/permissions/assignments/{userId}/{roleId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="removeAssignment", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.Assignment]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + diff --git a/permissions/src/epilot_permissions/basesdk.py b/permissions/src/epilot_permissions/basesdk.py new file mode 100644 index 000000000..6effd832f --- /dev/null +++ b/permissions/src/epilot_permissions/basesdk.py @@ -0,0 +1,254 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from .sdkconfiguration import SDKConfiguration +from epilot_permissions import models +from epilot_permissions._hooks import AfterErrorContext, AfterSuccessContext, BeforeRequestContext +import epilot_permissions.utils as utils +from epilot_permissions.utils import RetryConfig, SerializedRequestBody, get_body_content +import httpx +from typing import Callable, List, Optional, Tuple + +class BaseSDK: + sdk_configuration: SDKConfiguration + + def __init__(self, sdk_config: SDKConfiguration) -> None: + self.sdk_configuration = sdk_config + + def get_url(self, base_url, url_variables): + sdk_url, sdk_variables = self.sdk_configuration.get_server_details() + + if base_url is None: + base_url = sdk_url + + if url_variables is None: + url_variables = sdk_variables + + return utils.template_url(base_url, url_variables) + + def build_request( + self, + method, + path, + base_url, + url_variables, + request, + request_body_required, + request_has_path_params, + request_has_query_params, + user_agent_header, + accept_header_value, + _globals=None, + security=None, + timeout_ms: Optional[int] = None, + get_serialized_body: Optional[ + Callable[[], Optional[SerializedRequestBody]] + ] = None, + url_override: Optional[str] = None, + ) -> httpx.Request: + client = self.sdk_configuration.client + + query_params = {} + + url = url_override + if url is None: + url = utils.generate_url( + self.get_url(base_url, url_variables), + path, + request if request_has_path_params else None, + _globals if request_has_path_params else None, + ) + + query_params = utils.get_query_params( + request if request_has_query_params else None, + _globals if request_has_query_params else None, + ) + + headers = utils.get_headers(request, _globals) + headers["Accept"] = accept_header_value + headers[user_agent_header] = self.sdk_configuration.user_agent + + if security is not None: + if callable(security): + security = security() + + if security is not None: + security_headers, security_query_params = utils.get_security(security) + headers = {**headers, **security_headers} + query_params = {**query_params, **security_query_params} + + serialized_request_body = SerializedRequestBody("application/octet-stream") + if get_serialized_body is not None: + rb = get_serialized_body() + if request_body_required and rb is None: + raise ValueError("request body is required") + + if rb is not None: + serialized_request_body = rb + + if ( + serialized_request_body.media_type is not None + and serialized_request_body.media_type + not in ( + "multipart/form-data", + "multipart/mixed", + ) + ): + headers["content-type"] = serialized_request_body.media_type + + timeout = timeout_ms / 1000 if timeout_ms is not None else None + + return client.build_request( + method, + url, + params=query_params, + content=serialized_request_body.content, + data=serialized_request_body.data, + files=serialized_request_body.files, + headers=headers, + timeout=timeout, + ) + + def do_request( + self, + hook_ctx, + request, + error_status_codes, + stream=False, + retry_config: Optional[Tuple[RetryConfig, List[str]]] = None, + ) -> httpx.Response: + client = self.sdk_configuration.client + logger = self.sdk_configuration.debug_logger + + def do(): + http_res = None + try: + req = self.sdk_configuration.get_hooks().before_request( + BeforeRequestContext(hook_ctx), request + ) + logger.debug( + "Request:\nMethod: %s\nURL: %s\nHeaders: %s\nBody: %s", + req.method, + req.url, + req.headers, + get_body_content(req) + ) + http_res = client.send(req, stream=stream) + except Exception as e: + _, e = self.sdk_configuration.get_hooks().after_error( + AfterErrorContext(hook_ctx), None, e + ) + if e is not None: + logger.debug("Request Exception", exc_info=True) + raise e + + if http_res is None: + logger.debug("Raising no response SDK error") + raise models.SDKError("No response received") + + logger.debug( + "Response:\nStatus Code: %s\nURL: %s\nHeaders: %s\nBody: %s", + http_res.status_code, + http_res.url, + http_res.headers, + "" if stream else http_res.text + ) + + if utils.match_status_codes(error_status_codes, http_res.status_code): + result, err = self.sdk_configuration.get_hooks().after_error( + AfterErrorContext(hook_ctx), http_res, None + ) + if err is not None: + logger.debug("Request Exception", exc_info=True) + raise err + if result is not None: + http_res = result + else: + logger.debug("Raising unexpected SDK error") + raise models.SDKError("Unexpected error occurred") + + return http_res + + if retry_config is not None: + http_res = utils.retry(do, utils.Retries(retry_config[0], retry_config[1])) + else: + http_res = do() + + if not utils.match_status_codes(error_status_codes, http_res.status_code): + http_res = self.sdk_configuration.get_hooks().after_success( + AfterSuccessContext(hook_ctx), http_res + ) + + return http_res + + async def do_request_async( + self, + hook_ctx, + request, + error_status_codes, + stream=False, + retry_config: Optional[Tuple[RetryConfig, List[str]]] = None, + ) -> httpx.Response: + client = self.sdk_configuration.async_client + logger = self.sdk_configuration.debug_logger + async def do(): + http_res = None + try: + req = self.sdk_configuration.get_hooks().before_request( + BeforeRequestContext(hook_ctx), request + ) + logger.debug( + "Request:\nMethod: %s\nURL: %s\nHeaders: %s\nBody: %s", + req.method, + req.url, + req.headers, + get_body_content(req) + ) + http_res = await client.send(req, stream=stream) + except Exception as e: + _, e = self.sdk_configuration.get_hooks().after_error( + AfterErrorContext(hook_ctx), None, e + ) + if e is not None: + logger.debug("Request Exception", exc_info=True) + raise e + + if http_res is None: + logger.debug("Raising no response SDK error") + raise models.SDKError("No response received") + + logger.debug( + "Response:\nStatus Code: %s\nURL: %s\nHeaders: %s\nBody: %s", + http_res.status_code, + http_res.url, + http_res.headers, + "" if stream else http_res.text + ) + + if utils.match_status_codes(error_status_codes, http_res.status_code): + result, err = self.sdk_configuration.get_hooks().after_error( + AfterErrorContext(hook_ctx), http_res, None + ) + if err is not None: + logger.debug("Request Exception", exc_info=True) + raise err + if result is not None: + http_res = result + else: + logger.debug("Raising unexpected SDK error") + raise models.SDKError("Unexpected error occurred") + + return http_res + + if retry_config is not None: + http_res = await utils.retry_async( + do, utils.Retries(retry_config[0], retry_config[1]) + ) + else: + http_res = await do() + + if not utils.match_status_codes(error_status_codes, http_res.status_code): + http_res = self.sdk_configuration.get_hooks().after_success( + AfterSuccessContext(hook_ctx), http_res + ) + + return http_res diff --git a/permissions/src/epilot_permissions/httpclient.py b/permissions/src/epilot_permissions/httpclient.py new file mode 100644 index 000000000..36b642a0e --- /dev/null +++ b/permissions/src/epilot_permissions/httpclient.py @@ -0,0 +1,78 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +# pyright: reportReturnType = false +from typing_extensions import Protocol, runtime_checkable +import httpx +from typing import Any, Optional, Union + + +@runtime_checkable +class HttpClient(Protocol): + def send( + self, + request: httpx.Request, + *, + stream: bool = False, + auth: Union[ + httpx._types.AuthTypes, httpx._client.UseClientDefault, None + ] = httpx.USE_CLIENT_DEFAULT, + follow_redirects: Union[ + bool, httpx._client.UseClientDefault + ] = httpx.USE_CLIENT_DEFAULT, + ) -> httpx.Response: + pass + + def build_request( + self, + method: str, + url: httpx._types.URLTypes, + *, + content: Optional[httpx._types.RequestContent] = None, + data: Optional[httpx._types.RequestData] = None, + files: Optional[httpx._types.RequestFiles] = None, + json: Optional[Any] = None, + params: Optional[httpx._types.QueryParamTypes] = None, + headers: Optional[httpx._types.HeaderTypes] = None, + cookies: Optional[httpx._types.CookieTypes] = None, + timeout: Union[ + httpx._types.TimeoutTypes, httpx._client.UseClientDefault + ] = httpx.USE_CLIENT_DEFAULT, + extensions: Optional[httpx._types.RequestExtensions] = None, + ) -> httpx.Request: + pass + + +@runtime_checkable +class AsyncHttpClient(Protocol): + async def send( + self, + request: httpx.Request, + *, + stream: bool = False, + auth: Union[ + httpx._types.AuthTypes, httpx._client.UseClientDefault, None + ] = httpx.USE_CLIENT_DEFAULT, + follow_redirects: Union[ + bool, httpx._client.UseClientDefault + ] = httpx.USE_CLIENT_DEFAULT, + ) -> httpx.Response: + pass + + def build_request( + self, + method: str, + url: httpx._types.URLTypes, + *, + content: Optional[httpx._types.RequestContent] = None, + data: Optional[httpx._types.RequestData] = None, + files: Optional[httpx._types.RequestFiles] = None, + json: Optional[Any] = None, + params: Optional[httpx._types.QueryParamTypes] = None, + headers: Optional[httpx._types.HeaderTypes] = None, + cookies: Optional[httpx._types.CookieTypes] = None, + timeout: Union[ + httpx._types.TimeoutTypes, httpx._client.UseClientDefault + ] = httpx.USE_CLIENT_DEFAULT, + extensions: Optional[httpx._types.RequestExtensions] = None, + ) -> httpx.Request: + pass diff --git a/permissions/src/epilot_permissions/models/__init__.py b/permissions/src/epilot_permissions/models/__init__.py new file mode 100644 index 000000000..8865dec83 --- /dev/null +++ b/permissions/src/epilot_permissions/models/__init__.py @@ -0,0 +1,30 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from .addassignmentop import AddAssignmentRequest, AddAssignmentRequestTypedDict +from .assignment import Assignment, AssignmentTypedDict +from .assignrolesop import AssignRolesRequest, AssignRolesRequestTypedDict +from .deleteroleop import DeleteRoleRequest, DeleteRoleRequestTypedDict +from .equalscondition import EqualsCondition, EqualsConditionTypedDict, Operation +from .getassignedrolesforuserop import GetAssignedRolesForUserRequest, GetAssignedRolesForUserRequestTypedDict +from .getroleop import GetRoleRequest, GetRoleRequestTypedDict +from .grant import Effect, Grant, GrantTypedDict +from .grantcondition import GrantCondition, GrantConditionTypedDict +from .grantwithdependencies import GrantWithDependencies, GrantWithDependenciesEffect, GrantWithDependenciesTypedDict +from .listallassignmentsop import ListAllAssignmentsResponseBody, ListAllAssignmentsResponseBodyTypedDict +from .listallrolesop import ListAllRolesResponseBody, ListAllRolesResponseBodyTypedDict +from .listcurrentrolesop import ListCurrentRolesResponseBody, ListCurrentRolesResponseBodyTypedDict +from .orgrole import OrgRole, OrgRoleType, OrgRoleTypedDict +from .partnerrole import PartnerRole, PartnerRoleType, PartnerRoleTypedDict +from .portalrole import PortalRole, PortalRoleType, PortalRoleTypedDict +from .putroleop import PutRoleRequest, PutRoleRequestTypedDict +from .removeassignmentop import RemoveAssignmentRequest, RemoveAssignmentRequestTypedDict +from .role import Role, RoleTypedDict +from .rolepayload import PartnerRoleSchemas, PartnerRoleSchemasTypedDict, PortalRoleSchemas, PortalRoleSchemasTypedDict, RolePayload, RolePayloadTypedDict, Schemas, SchemasPortalRoleType, SchemasShareRoleType, SchemasType, SchemasTypedDict, SchemasUserRoleType, ShareRoleSchemas, ShareRoleSchemasTypedDict, Type, UserRoleSchemas, UserRoleSchemasTypedDict +from .rolesearchinput import RoleSearchInput, RoleSearchInputTypedDict +from .sdkerror import SDKError +from .searchrolesop import SearchRolesResponseBody, SearchRolesResponseBodyTypedDict +from .security import Security, SecurityTypedDict +from .sharerole import ShareRole, ShareRoleType, ShareRoleTypedDict +from .userrole import UserRole, UserRoleType, UserRoleTypedDict + +__all__ = ["AddAssignmentRequest", "AddAssignmentRequestTypedDict", "AssignRolesRequest", "AssignRolesRequestTypedDict", "Assignment", "AssignmentTypedDict", "DeleteRoleRequest", "DeleteRoleRequestTypedDict", "Effect", "EqualsCondition", "EqualsConditionTypedDict", "GetAssignedRolesForUserRequest", "GetAssignedRolesForUserRequestTypedDict", "GetRoleRequest", "GetRoleRequestTypedDict", "Grant", "GrantCondition", "GrantConditionTypedDict", "GrantTypedDict", "GrantWithDependencies", "GrantWithDependenciesEffect", "GrantWithDependenciesTypedDict", "ListAllAssignmentsResponseBody", "ListAllAssignmentsResponseBodyTypedDict", "ListAllRolesResponseBody", "ListAllRolesResponseBodyTypedDict", "ListCurrentRolesResponseBody", "ListCurrentRolesResponseBodyTypedDict", "Operation", "OrgRole", "OrgRoleType", "OrgRoleTypedDict", "PartnerRole", "PartnerRoleSchemas", "PartnerRoleSchemasTypedDict", "PartnerRoleType", "PartnerRoleTypedDict", "PortalRole", "PortalRoleSchemas", "PortalRoleSchemasTypedDict", "PortalRoleType", "PortalRoleTypedDict", "PutRoleRequest", "PutRoleRequestTypedDict", "RemoveAssignmentRequest", "RemoveAssignmentRequestTypedDict", "Role", "RolePayload", "RolePayloadTypedDict", "RoleSearchInput", "RoleSearchInputTypedDict", "RoleTypedDict", "SDKError", "Schemas", "SchemasPortalRoleType", "SchemasShareRoleType", "SchemasType", "SchemasTypedDict", "SchemasUserRoleType", "SearchRolesResponseBody", "SearchRolesResponseBodyTypedDict", "Security", "SecurityTypedDict", "ShareRole", "ShareRoleSchemas", "ShareRoleSchemasTypedDict", "ShareRoleType", "ShareRoleTypedDict", "Type", "UserRole", "UserRoleSchemas", "UserRoleSchemasTypedDict", "UserRoleType", "UserRoleTypedDict"] diff --git a/permissions/src/epilot_permissions/models/addassignmentop.py b/permissions/src/epilot_permissions/models/addassignmentop.py new file mode 100644 index 000000000..d5253903a --- /dev/null +++ b/permissions/src/epilot_permissions/models/addassignmentop.py @@ -0,0 +1,19 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from epilot_permissions.types import BaseModel +from epilot_permissions.utils import FieldMetadata, PathParamMetadata +import pydantic +from typing import TypedDict +from typing_extensions import Annotated + + +class AddAssignmentRequestTypedDict(TypedDict): + role_id: str + user_id: str + + +class AddAssignmentRequest(BaseModel): + role_id: Annotated[str, pydantic.Field(alias="roleId"), FieldMetadata(path=PathParamMetadata(style="simple", explode=False))] + user_id: Annotated[str, pydantic.Field(alias="userId"), FieldMetadata(path=PathParamMetadata(style="simple", explode=False))] + diff --git a/permissions/src/epilot_permissions/models/assignment.py b/permissions/src/epilot_permissions/models/assignment.py new file mode 100644 index 000000000..88bc414a2 --- /dev/null +++ b/permissions/src/epilot_permissions/models/assignment.py @@ -0,0 +1,23 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class AssignmentTypedDict(TypedDict): + r"""A role attached to an user""" + + roles: NotRequired[List[str]] + user_id: NotRequired[str] + r"""Id of a user""" + + +class Assignment(BaseModel): + r"""A role attached to an user""" + + roles: Optional[List[str]] = None + user_id: Optional[str] = None + r"""Id of a user""" + diff --git a/permissions/src/epilot_permissions/models/assignrolesop.py b/permissions/src/epilot_permissions/models/assignrolesop.py new file mode 100644 index 000000000..05ebb7761 --- /dev/null +++ b/permissions/src/epilot_permissions/models/assignrolesop.py @@ -0,0 +1,19 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from epilot_permissions.types import BaseModel +from epilot_permissions.utils import FieldMetadata, PathParamMetadata, RequestMetadata +import pydantic +from typing import List, Optional, TypedDict +from typing_extensions import Annotated, NotRequired + + +class AssignRolesRequestTypedDict(TypedDict): + user_id: str + request_body: NotRequired[List[str]] + + +class AssignRolesRequest(BaseModel): + user_id: Annotated[str, pydantic.Field(alias="userId"), FieldMetadata(path=PathParamMetadata(style="simple", explode=False))] + request_body: Annotated[Optional[List[str]], FieldMetadata(request=RequestMetadata(media_type="application/json"))] = None + diff --git a/permissions/src/epilot_permissions/models/deleteroleop.py b/permissions/src/epilot_permissions/models/deleteroleop.py new file mode 100644 index 000000000..70eb08ad6 --- /dev/null +++ b/permissions/src/epilot_permissions/models/deleteroleop.py @@ -0,0 +1,17 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from epilot_permissions.types import BaseModel +from epilot_permissions.utils import FieldMetadata, PathParamMetadata +import pydantic +from typing import TypedDict +from typing_extensions import Annotated + + +class DeleteRoleRequestTypedDict(TypedDict): + role_id: str + + +class DeleteRoleRequest(BaseModel): + role_id: Annotated[str, pydantic.Field(alias="roleId"), FieldMetadata(path=PathParamMetadata(style="simple", explode=False))] + diff --git a/permissions/src/epilot_permissions/models/equalscondition.py b/permissions/src/epilot_permissions/models/equalscondition.py new file mode 100644 index 000000000..aff3c5972 --- /dev/null +++ b/permissions/src/epilot_permissions/models/equalscondition.py @@ -0,0 +1,26 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from enum import Enum +from epilot_permissions.types import BaseModel +from typing import Any, List, TypedDict + + +class Operation(str, Enum): + EQUALS = "equals" + +class EqualsConditionTypedDict(TypedDict): + r"""Check if attribute equals to any of the values""" + + attribute: str + operation: Operation + values: List[Any] + + +class EqualsCondition(BaseModel): + r"""Check if attribute equals to any of the values""" + + attribute: str + operation: Operation + values: List[Any] + diff --git a/permissions/src/epilot_permissions/models/getassignedrolesforuserop.py b/permissions/src/epilot_permissions/models/getassignedrolesforuserop.py new file mode 100644 index 000000000..84acd0179 --- /dev/null +++ b/permissions/src/epilot_permissions/models/getassignedrolesforuserop.py @@ -0,0 +1,17 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from epilot_permissions.types import BaseModel +from epilot_permissions.utils import FieldMetadata, PathParamMetadata +import pydantic +from typing import TypedDict +from typing_extensions import Annotated + + +class GetAssignedRolesForUserRequestTypedDict(TypedDict): + user_id: str + + +class GetAssignedRolesForUserRequest(BaseModel): + user_id: Annotated[str, pydantic.Field(alias="userId"), FieldMetadata(path=PathParamMetadata(style="simple", explode=False))] + diff --git a/permissions/src/epilot_permissions/models/getroleop.py b/permissions/src/epilot_permissions/models/getroleop.py new file mode 100644 index 000000000..d314219ae --- /dev/null +++ b/permissions/src/epilot_permissions/models/getroleop.py @@ -0,0 +1,17 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from epilot_permissions.types import BaseModel +from epilot_permissions.utils import FieldMetadata, PathParamMetadata +import pydantic +from typing import TypedDict +from typing_extensions import Annotated + + +class GetRoleRequestTypedDict(TypedDict): + role_id: str + + +class GetRoleRequest(BaseModel): + role_id: Annotated[str, pydantic.Field(alias="roleId"), FieldMetadata(path=PathParamMetadata(style="simple", explode=False))] + diff --git a/permissions/src/epilot_permissions/models/grant.py b/permissions/src/epilot_permissions/models/grant.py new file mode 100644 index 000000000..8d861407e --- /dev/null +++ b/permissions/src/epilot_permissions/models/grant.py @@ -0,0 +1,27 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .grantcondition import GrantCondition, GrantConditionTypedDict +from enum import Enum +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class Effect(str, Enum): + ALLOW = "allow" + DENY = "deny" + +class GrantTypedDict(TypedDict): + action: str + conditions: NotRequired[List[GrantConditionTypedDict]] + effect: NotRequired[Effect] + resource: NotRequired[str] + + +class Grant(BaseModel): + action: str + conditions: Optional[List[GrantCondition]] = None + effect: Optional[Effect] = Effect.ALLOW + resource: Optional[str] = None + diff --git a/permissions/src/epilot_permissions/models/grantcondition.py b/permissions/src/epilot_permissions/models/grantcondition.py new file mode 100644 index 000000000..4fc8b27a4 --- /dev/null +++ b/permissions/src/epilot_permissions/models/grantcondition.py @@ -0,0 +1,13 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .equalscondition import EqualsCondition, EqualsConditionTypedDict + + +GrantConditionTypedDict = EqualsConditionTypedDict +r"""An additional condition that must be met for the grant""" + + +GrantCondition = EqualsCondition +r"""An additional condition that must be met for the grant""" + diff --git a/permissions/src/epilot_permissions/models/grantwithdependencies.py b/permissions/src/epilot_permissions/models/grantwithdependencies.py new file mode 100644 index 000000000..51d16257f --- /dev/null +++ b/permissions/src/epilot_permissions/models/grantwithdependencies.py @@ -0,0 +1,32 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .grant import Grant, GrantTypedDict +from .grantcondition import GrantCondition, GrantConditionTypedDict +from enum import Enum +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class GrantWithDependenciesEffect(str, Enum): + ALLOW = "allow" + DENY = "deny" + +class GrantWithDependenciesTypedDict(TypedDict): + action: str + conditions: NotRequired[List[GrantConditionTypedDict]] + dependencies: NotRequired[List[GrantTypedDict]] + r"""Provided additional dependencies, exploded when storing the role""" + effect: NotRequired[GrantWithDependenciesEffect] + resource: NotRequired[str] + + +class GrantWithDependencies(BaseModel): + action: str + conditions: Optional[List[GrantCondition]] = None + dependencies: Optional[List[Grant]] = None + r"""Provided additional dependencies, exploded when storing the role""" + effect: Optional[GrantWithDependenciesEffect] = GrantWithDependenciesEffect.ALLOW + resource: Optional[str] = None + diff --git a/permissions/src/epilot_permissions/models/listallassignmentsop.py b/permissions/src/epilot_permissions/models/listallassignmentsop.py new file mode 100644 index 000000000..9da89063f --- /dev/null +++ b/permissions/src/epilot_permissions/models/listallassignmentsop.py @@ -0,0 +1,20 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .assignment import Assignment, AssignmentTypedDict +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class ListAllAssignmentsResponseBodyTypedDict(TypedDict): + r"""ok""" + + assignments: NotRequired[List[AssignmentTypedDict]] + + +class ListAllAssignmentsResponseBody(BaseModel): + r"""ok""" + + assignments: Optional[List[Assignment]] = None + diff --git a/permissions/src/epilot_permissions/models/listallrolesop.py b/permissions/src/epilot_permissions/models/listallrolesop.py new file mode 100644 index 000000000..1989b0b0f --- /dev/null +++ b/permissions/src/epilot_permissions/models/listallrolesop.py @@ -0,0 +1,20 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .role import Role, RoleTypedDict +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class ListAllRolesResponseBodyTypedDict(TypedDict): + r"""ok""" + + roles: NotRequired[List[RoleTypedDict]] + + +class ListAllRolesResponseBody(BaseModel): + r"""ok""" + + roles: Optional[List[Role]] = None + diff --git a/permissions/src/epilot_permissions/models/listcurrentrolesop.py b/permissions/src/epilot_permissions/models/listcurrentrolesop.py new file mode 100644 index 000000000..0fa437d20 --- /dev/null +++ b/permissions/src/epilot_permissions/models/listcurrentrolesop.py @@ -0,0 +1,20 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .role import Role, RoleTypedDict +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class ListCurrentRolesResponseBodyTypedDict(TypedDict): + r"""ok""" + + roles: NotRequired[List[RoleTypedDict]] + + +class ListCurrentRolesResponseBody(BaseModel): + r"""ok""" + + roles: Optional[List[Role]] = None + diff --git a/permissions/src/epilot_permissions/models/orgrole.py b/permissions/src/epilot_permissions/models/orgrole.py new file mode 100644 index 000000000..e365d813a --- /dev/null +++ b/permissions/src/epilot_permissions/models/orgrole.py @@ -0,0 +1,53 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .grant import Grant, GrantTypedDict +from datetime import datetime +from enum import Enum +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class OrgRoleType(str, Enum): + ORG_ROLE = "org_role" + +class OrgRoleTypedDict(TypedDict): + r"""A role automatically applied to all users in an organization.""" + + grants: List[GrantTypedDict] + r"""List of grants (permissions) applied to the role""" + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: OrgRoleType + expires_at: NotRequired[datetime] + r"""date and time then the role will expire""" + pricing_tier: NotRequired[str] + r"""The pricing tier of the organization this root role is based on""" + + +class OrgRole(BaseModel): + r"""A role automatically applied to all users in an organization.""" + + grants: List[Grant] + r"""List of grants (permissions) applied to the role""" + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: OrgRoleType + expires_at: Optional[datetime] = None + r"""date and time then the role will expire""" + pricing_tier: Optional[str] = None + r"""The pricing tier of the organization this root role is based on""" + diff --git a/permissions/src/epilot_permissions/models/partnerrole.py b/permissions/src/epilot_permissions/models/partnerrole.py new file mode 100644 index 000000000..105f1e18d --- /dev/null +++ b/permissions/src/epilot_permissions/models/partnerrole.py @@ -0,0 +1,51 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .grant import Grant, GrantTypedDict +from datetime import datetime +from enum import Enum +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class PartnerRoleType(str, Enum): + PARTNER_ROLE = "partner_role" + +class PartnerRoleTypedDict(TypedDict): + r"""A role that appears in another organization's role list that can be assigned but not modified by the partner organization.""" + + grants: List[GrantTypedDict] + r"""List of grants (permissions) applied to the role""" + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: PartnerRoleType + expires_at: NotRequired[datetime] + r"""date and time then the role will expire""" + partner_org_id: NotRequired[str] + + +class PartnerRole(BaseModel): + r"""A role that appears in another organization's role list that can be assigned but not modified by the partner organization.""" + + grants: List[Grant] + r"""List of grants (permissions) applied to the role""" + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: PartnerRoleType + expires_at: Optional[datetime] = None + r"""date and time then the role will expire""" + partner_org_id: Optional[str] = None + diff --git a/permissions/src/epilot_permissions/models/portalrole.py b/permissions/src/epilot_permissions/models/portalrole.py new file mode 100644 index 000000000..4d3f748f6 --- /dev/null +++ b/permissions/src/epilot_permissions/models/portalrole.py @@ -0,0 +1,49 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .grant import Grant, GrantTypedDict +from datetime import datetime +from enum import Enum +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class PortalRoleType(str, Enum): + PORTAL_ROLE = "portal_role" + +class PortalRoleTypedDict(TypedDict): + r"""A role that is applied to end customers and installers using the Portals""" + + grants: List[GrantTypedDict] + r"""List of grants (permissions) applied to the role""" + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: PortalRoleType + expires_at: NotRequired[datetime] + r"""date and time then the role will expire""" + + +class PortalRole(BaseModel): + r"""A role that is applied to end customers and installers using the Portals""" + + grants: List[Grant] + r"""List of grants (permissions) applied to the role""" + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: PortalRoleType + expires_at: Optional[datetime] = None + r"""date and time then the role will expire""" + diff --git a/permissions/src/epilot_permissions/models/putroleop.py b/permissions/src/epilot_permissions/models/putroleop.py new file mode 100644 index 000000000..a2b5fd6b9 --- /dev/null +++ b/permissions/src/epilot_permissions/models/putroleop.py @@ -0,0 +1,20 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .rolepayload import RolePayload, RolePayloadTypedDict +from epilot_permissions.types import BaseModel +from epilot_permissions.utils import FieldMetadata, PathParamMetadata, RequestMetadata +import pydantic +from typing import Optional, TypedDict +from typing_extensions import Annotated, NotRequired + + +class PutRoleRequestTypedDict(TypedDict): + role_id: str + role_payload: NotRequired[RolePayloadTypedDict] + + +class PutRoleRequest(BaseModel): + role_id: Annotated[str, pydantic.Field(alias="roleId"), FieldMetadata(path=PathParamMetadata(style="simple", explode=False))] + role_payload: Annotated[Optional[RolePayload], FieldMetadata(request=RequestMetadata(media_type="application/json"))] = None + diff --git a/permissions/src/epilot_permissions/models/removeassignmentop.py b/permissions/src/epilot_permissions/models/removeassignmentop.py new file mode 100644 index 000000000..dfedf9876 --- /dev/null +++ b/permissions/src/epilot_permissions/models/removeassignmentop.py @@ -0,0 +1,19 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from epilot_permissions.types import BaseModel +from epilot_permissions.utils import FieldMetadata, PathParamMetadata +import pydantic +from typing import TypedDict +from typing_extensions import Annotated + + +class RemoveAssignmentRequestTypedDict(TypedDict): + role_id: str + user_id: str + + +class RemoveAssignmentRequest(BaseModel): + role_id: Annotated[str, pydantic.Field(alias="roleId"), FieldMetadata(path=PathParamMetadata(style="simple", explode=False))] + user_id: Annotated[str, pydantic.Field(alias="userId"), FieldMetadata(path=PathParamMetadata(style="simple", explode=False))] + diff --git a/permissions/src/epilot_permissions/models/role.py b/permissions/src/epilot_permissions/models/role.py new file mode 100644 index 000000000..d1d900f49 --- /dev/null +++ b/permissions/src/epilot_permissions/models/role.py @@ -0,0 +1,16 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .orgrole import OrgRole, OrgRoleTypedDict +from .partnerrole import PartnerRole, PartnerRoleTypedDict +from .portalrole import PortalRole, PortalRoleTypedDict +from .sharerole import ShareRole, ShareRoleTypedDict +from .userrole import UserRole, UserRoleTypedDict +from typing import Union + + +RoleTypedDict = Union[UserRoleTypedDict, ShareRoleTypedDict, PortalRoleTypedDict, OrgRoleTypedDict, PartnerRoleTypedDict] + + +Role = Union[UserRole, ShareRole, PortalRole, OrgRole, PartnerRole] + diff --git a/permissions/src/epilot_permissions/models/rolepayload.py b/permissions/src/epilot_permissions/models/rolepayload.py new file mode 100644 index 000000000..fc4a44fbb --- /dev/null +++ b/permissions/src/epilot_permissions/models/rolepayload.py @@ -0,0 +1,207 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .grantwithdependencies import GrantWithDependencies, GrantWithDependenciesTypedDict +from datetime import datetime +from enum import Enum +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict, Union +from typing_extensions import NotRequired + + +class SchemasPortalRoleType(str, Enum): + PORTAL_ROLE = "portal_role" + +class PortalRoleSchemasTypedDict(TypedDict): + r"""A role that is applied to end customers and installers using the Portals""" + + grants: List[GrantWithDependenciesTypedDict] + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: SchemasPortalRoleType + expires_at: NotRequired[datetime] + r"""date and time then the role will expire""" + + +class PortalRoleSchemas(BaseModel): + r"""A role that is applied to end customers and installers using the Portals""" + + grants: List[GrantWithDependencies] + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: SchemasPortalRoleType + expires_at: Optional[datetime] = None + r"""date and time then the role will expire""" + + +class SchemasType(str, Enum): + PARTNER_ROLE = "partner_role" + +class PartnerRoleSchemasTypedDict(TypedDict): + r"""A role that appears in another organization's role list that can be assigned but not modified by the partner organization.""" + + grants: List[GrantWithDependenciesTypedDict] + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: SchemasType + expires_at: NotRequired[datetime] + r"""date and time then the role will expire""" + partner_org_id: NotRequired[str] + + +class PartnerRoleSchemas(BaseModel): + r"""A role that appears in another organization's role list that can be assigned but not modified by the partner organization.""" + + grants: List[GrantWithDependencies] + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: SchemasType + expires_at: Optional[datetime] = None + r"""date and time then the role will expire""" + partner_org_id: Optional[str] = None + + +class SchemasShareRoleType(str, Enum): + SHARE_ROLE = "share_role" + +class ShareRoleSchemasTypedDict(TypedDict): + r"""A role that can be assigned to users in other organizations for sharing purposes.""" + + grants: List[GrantWithDependenciesTypedDict] + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: SchemasShareRoleType + expires_at: NotRequired[datetime] + r"""date and time then the role will expire""" + + +class ShareRoleSchemas(BaseModel): + r"""A role that can be assigned to users in other organizations for sharing purposes.""" + + grants: List[GrantWithDependencies] + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: SchemasShareRoleType + expires_at: Optional[datetime] = None + r"""date and time then the role will expire""" + + +class Type(str, Enum): + ORG_ROLE = "org_role" + +class SchemasTypedDict(TypedDict): + r"""A role automatically applied to all users in an organization.""" + + grants: List[GrantWithDependenciesTypedDict] + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: Type + expires_at: NotRequired[datetime] + r"""date and time then the role will expire""" + pricing_tier: NotRequired[str] + r"""The pricing tier of the organization this root role is based on""" + + +class Schemas(BaseModel): + r"""A role automatically applied to all users in an organization.""" + + grants: List[GrantWithDependencies] + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: Type + expires_at: Optional[datetime] = None + r"""date and time then the role will expire""" + pricing_tier: Optional[str] = None + r"""The pricing tier of the organization this root role is based on""" + + +class SchemasUserRoleType(str, Enum): + USER_ROLE = "user_role" + +class UserRoleSchemasTypedDict(TypedDict): + r"""A standard user role. Must be explicitly assigned to users.""" + + grants: List[GrantWithDependenciesTypedDict] + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: SchemasUserRoleType + expires_at: NotRequired[datetime] + r"""date and time then the role will expire""" + + +class UserRoleSchemas(BaseModel): + r"""A standard user role. Must be explicitly assigned to users.""" + + grants: List[GrantWithDependencies] + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: SchemasUserRoleType + expires_at: Optional[datetime] = None + r"""date and time then the role will expire""" + + +RolePayloadTypedDict = Union[UserRoleSchemasTypedDict, ShareRoleSchemasTypedDict, PortalRoleSchemasTypedDict, SchemasTypedDict, PartnerRoleSchemasTypedDict] + + +RolePayload = Union[UserRoleSchemas, ShareRoleSchemas, PortalRoleSchemas, Schemas, PartnerRoleSchemas] + diff --git a/permissions/src/epilot_permissions/models/rolesearchinput.py b/permissions/src/epilot_permissions/models/rolesearchinput.py new file mode 100644 index 000000000..ff215390d --- /dev/null +++ b/permissions/src/epilot_permissions/models/rolesearchinput.py @@ -0,0 +1,37 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class RoleSearchInputTypedDict(TypedDict): + limit: NotRequired[float] + r"""The Number of roles to return""" + offset: NotRequired[float] + r"""The number of roles to skip before starting to collect the result set""" + org_ids: NotRequired[List[str]] + r"""List of organization ids to filter by""" + query: NotRequired[str] + r"""Input to search across fields""" + role_ids: NotRequired[List[str]] + r"""List of role ids to filter by""" + slugs: NotRequired[List[str]] + r"""List of role slugs to filter by""" + + +class RoleSearchInput(BaseModel): + limit: Optional[float] = 50 + r"""The Number of roles to return""" + offset: Optional[float] = 0 + r"""The number of roles to skip before starting to collect the result set""" + org_ids: Optional[List[str]] = None + r"""List of organization ids to filter by""" + query: Optional[str] = None + r"""Input to search across fields""" + role_ids: Optional[List[str]] = None + r"""List of role ids to filter by""" + slugs: Optional[List[str]] = None + r"""List of role slugs to filter by""" + diff --git a/permissions/src/epilot_permissions/models/sdkerror.py b/permissions/src/epilot_permissions/models/sdkerror.py new file mode 100644 index 000000000..03216cbf5 --- /dev/null +++ b/permissions/src/epilot_permissions/models/sdkerror.py @@ -0,0 +1,22 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from dataclasses import dataclass +from typing import Optional +import httpx + + +@dataclass +class SDKError(Exception): + """Represents an error returned by the API.""" + + message: str + status_code: int = -1 + body: str = "" + raw_response: Optional[httpx.Response] = None + + def __str__(self): + body = "" + if len(self.body) > 0: + body = f"\n{self.body}" + + return f"{self.message}: Status {self.status_code}{body}" diff --git a/permissions/src/epilot_permissions/models/searchrolesop.py b/permissions/src/epilot_permissions/models/searchrolesop.py new file mode 100644 index 000000000..3d1cfdaed --- /dev/null +++ b/permissions/src/epilot_permissions/models/searchrolesop.py @@ -0,0 +1,22 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .role import Role, RoleTypedDict +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class SearchRolesResponseBodyTypedDict(TypedDict): + r"""ok""" + + hits: NotRequired[float] + results: NotRequired[List[RoleTypedDict]] + + +class SearchRolesResponseBody(BaseModel): + r"""ok""" + + hits: Optional[float] = None + results: Optional[List[Role]] = None + diff --git a/permissions/src/epilot_permissions/models/security.py b/permissions/src/epilot_permissions/models/security.py new file mode 100644 index 000000000..aa4d3af86 --- /dev/null +++ b/permissions/src/epilot_permissions/models/security.py @@ -0,0 +1,18 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from epilot_permissions.types import BaseModel +from epilot_permissions.utils import FieldMetadata, SecurityMetadata +from typing import Optional, TypedDict +from typing_extensions import Annotated, NotRequired + + +class SecurityTypedDict(TypedDict): + epilot_auth: NotRequired[str] + epilot_org: NotRequired[str] + + +class Security(BaseModel): + epilot_auth: Annotated[Optional[str], FieldMetadata(security=SecurityMetadata(scheme=True, scheme_type="http", sub_type="bearer", field_name="Authorization"))] = None + epilot_org: Annotated[Optional[str], FieldMetadata(security=SecurityMetadata(scheme=True, scheme_type="apiKey", sub_type="header", field_name="x-epilot-org-id"))] = None + diff --git a/permissions/src/epilot_permissions/models/sharerole.py b/permissions/src/epilot_permissions/models/sharerole.py new file mode 100644 index 000000000..59c54fa6c --- /dev/null +++ b/permissions/src/epilot_permissions/models/sharerole.py @@ -0,0 +1,49 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .grant import Grant, GrantTypedDict +from datetime import datetime +from enum import Enum +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class ShareRoleType(str, Enum): + SHARE_ROLE = "share_role" + +class ShareRoleTypedDict(TypedDict): + r"""A role that can be assigned to users in other organizations for sharing purposes.""" + + grants: List[GrantTypedDict] + r"""List of grants (permissions) applied to the role""" + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: ShareRoleType + expires_at: NotRequired[datetime] + r"""date and time then the role will expire""" + + +class ShareRole(BaseModel): + r"""A role that can be assigned to users in other organizations for sharing purposes.""" + + grants: List[Grant] + r"""List of grants (permissions) applied to the role""" + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: ShareRoleType + expires_at: Optional[datetime] = None + r"""date and time then the role will expire""" + diff --git a/permissions/src/epilot_permissions/models/userrole.py b/permissions/src/epilot_permissions/models/userrole.py new file mode 100644 index 000000000..b7bccbfae --- /dev/null +++ b/permissions/src/epilot_permissions/models/userrole.py @@ -0,0 +1,49 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from __future__ import annotations +from .grant import Grant, GrantTypedDict +from datetime import datetime +from enum import Enum +from epilot_permissions.types import BaseModel +from typing import List, Optional, TypedDict +from typing_extensions import NotRequired + + +class UserRoleType(str, Enum): + USER_ROLE = "user_role" + +class UserRoleTypedDict(TypedDict): + r"""A standard user role. Must be explicitly assigned to users.""" + + grants: List[GrantTypedDict] + r"""List of grants (permissions) applied to the role""" + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: UserRoleType + expires_at: NotRequired[datetime] + r"""date and time then the role will expire""" + + +class UserRole(BaseModel): + r"""A standard user role. Must be explicitly assigned to users.""" + + grants: List[Grant] + r"""List of grants (permissions) applied to the role""" + id: str + r"""Format: :""" + name: str + r"""Human-friendly name for the role""" + organization_id: str + r"""Id of an organization""" + slug: str + r"""URL-friendly name for the role""" + type: UserRoleType + expires_at: Optional[datetime] = None + r"""date and time then the role will expire""" + diff --git a/permissions/src/epilot_permissions/py.typed b/permissions/src/epilot_permissions/py.typed new file mode 100644 index 000000000..3e38f1a92 --- /dev/null +++ b/permissions/src/epilot_permissions/py.typed @@ -0,0 +1 @@ +# Marker file for PEP 561. The package enables type hints. diff --git a/permissions/src/epilot_permissions/roles.py b/permissions/src/epilot_permissions/roles.py new file mode 100644 index 000000000..a5f95bedf --- /dev/null +++ b/permissions/src/epilot_permissions/roles.py @@ -0,0 +1,1016 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from .basesdk import BaseSDK +from epilot_permissions import models +from epilot_permissions._hooks import HookContext +from epilot_permissions.types import BaseModel, OptionalNullable, UNSET +import epilot_permissions.utils as utils +from typing import Optional, Union, cast + +class Roles(BaseSDK): + r"""Manage roles and grants""" + + + def delete_role( + self, *, + role_id: str, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.Role]: + r"""deleteRole + + Delete role by id + + :param role_id: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.DeleteRoleRequest( + role_id=role_id, + ) + + req = self.build_request( + method="DELETE", + path="/v1/permissions/roles/{roleId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="deleteRole", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.Role]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def delete_role_async( + self, *, + role_id: str, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.Role]: + r"""deleteRole + + Delete role by id + + :param role_id: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.DeleteRoleRequest( + role_id=role_id, + ) + + req = self.build_request( + method="DELETE", + path="/v1/permissions/roles/{roleId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="deleteRole", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.Role]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + def get_role( + self, *, + role_id: str, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.Role]: + r"""getRole + + Get role by id + + :param role_id: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.GetRoleRequest( + role_id=role_id, + ) + + req = self.build_request( + method="GET", + path="/v1/permissions/roles/{roleId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="getRole", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.Role]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def get_role_async( + self, *, + role_id: str, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.Role]: + r"""getRole + + Get role by id + + :param role_id: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.GetRoleRequest( + role_id=role_id, + ) + + req = self.build_request( + method="GET", + path="/v1/permissions/roles/{roleId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="getRole", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.Role]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + def list_all_roles( + self, *, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.ListAllRolesResponseBody]: + r"""listAllRoles + + Returns list of all roles in organization + + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + req = self.build_request( + method="GET", + path="/v1/permissions/roles", + base_url=base_url, + url_variables=url_variables, + request=None, + request_body_required=False, + request_has_path_params=False, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="listAllRoles", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.ListAllRolesResponseBody]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def list_all_roles_async( + self, *, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.ListAllRolesResponseBody]: + r"""listAllRoles + + Returns list of all roles in organization + + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + req = self.build_request( + method="GET", + path="/v1/permissions/roles", + base_url=base_url, + url_variables=url_variables, + request=None, + request_body_required=False, + request_has_path_params=False, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="listAllRoles", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.ListAllRolesResponseBody]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + def list_current_roles( + self, *, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.ListCurrentRolesResponseBody]: + r"""listCurrentRoles + + Returns roles and grants assigned to current user + + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + req = self.build_request( + method="GET", + path="/v1/permissions/me", + base_url=base_url, + url_variables=url_variables, + request=None, + request_body_required=False, + request_has_path_params=False, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="listCurrentRoles", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.ListCurrentRolesResponseBody]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def list_current_roles_async( + self, *, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.ListCurrentRolesResponseBody]: + r"""listCurrentRoles + + Returns roles and grants assigned to current user + + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + req = self.build_request( + method="GET", + path="/v1/permissions/me", + base_url=base_url, + url_variables=url_variables, + request=None, + request_body_required=False, + request_has_path_params=False, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="listCurrentRoles", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.ListCurrentRolesResponseBody]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + def put_role( + self, *, + role_id: str, + role_payload: Optional[Union[models.RolePayload, models.RolePayloadTypedDict]] = None, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.Role]: + r"""putRole + + Create or update role + + :param role_id: + :param role_payload: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.PutRoleRequest( + role_id=role_id, + role_payload=utils.get_pydantic_model(role_payload, Optional[models.RolePayload]), + ) + + req = self.build_request( + method="PUT", + path="/v1/permissions/roles/{roleId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + get_serialized_body=lambda: utils.serialize_request_body(request.role_payload, False, True, "json", Optional[models.RolePayload]), + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="putRole", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.Role]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def put_role_async( + self, *, + role_id: str, + role_payload: Optional[Union[models.RolePayload, models.RolePayloadTypedDict]] = None, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.Role]: + r"""putRole + + Create or update role + + :param role_id: + :param role_payload: + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + request = models.PutRoleRequest( + role_id=role_id, + role_payload=utils.get_pydantic_model(role_payload, Optional[models.RolePayload]), + ) + + req = self.build_request( + method="PUT", + path="/v1/permissions/roles/{roleId}", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=True, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + get_serialized_body=lambda: utils.serialize_request_body(request.role_payload, False, True, "json", Optional[models.RolePayload]), + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="putRole", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.Role]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + def refresh_permissions( + self, *, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ): + r"""refreshPermissions + + Makes sure the user has a role in the organization + + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + req = self.build_request( + method="GET", + path="/v1/permissions/refresh", + base_url=base_url, + url_variables=url_variables, + request=None, + request_body_required=False, + request_has_path_params=False, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="*/*", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="refreshPermissions", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "*"): + return + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def refresh_permissions_async( + self, *, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ): + r"""refreshPermissions + + Makes sure the user has a role in the organization + + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + req = self.build_request( + method="GET", + path="/v1/permissions/refresh", + base_url=base_url, + url_variables=url_variables, + request=None, + request_body_required=False, + request_has_path_params=False, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="*/*", + security=self.sdk_configuration.security, + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="refreshPermissions", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "*"): + return + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + def search_roles( + self, *, + request: Optional[Union[models.RoleSearchInput, models.RoleSearchInputTypedDict]] = None, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.SearchRolesResponseBody]: + r"""searchRoles + + Search Roles + + :param request: The request object to send. + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + if not isinstance(request, BaseModel) and request is not None: + request = utils.unmarshal(request, models.RoleSearchInput) + request = cast(models.RoleSearchInput, request) + + req = self.build_request( + method="POST", + path="/v1/permissions/roles:search", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=False, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + get_serialized_body=lambda: utils.serialize_request_body(request, False, True, "json", Optional[models.RoleSearchInput]), + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = self.do_request( + hook_ctx=HookContext(operation_id="searchRoles", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.SearchRolesResponseBody]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + + + async def search_roles_async( + self, *, + request: Optional[Union[models.RoleSearchInput, models.RoleSearchInputTypedDict]] = None, + retries: OptionalNullable[utils.RetryConfig] = UNSET, + server_url: Optional[str] = None, + timeout_ms: Optional[int] = None, + ) -> Optional[models.SearchRolesResponseBody]: + r"""searchRoles + + Search Roles + + :param request: The request object to send. + :param retries: Override the default retry configuration for this method + :param server_url: Override the default server URL for this method + :param timeout_ms: Override the default request timeout configuration for this method in milliseconds + """ + base_url = None + url_variables = None + if timeout_ms is None: + timeout_ms = self.sdk_configuration.timeout_ms + + if server_url is not None: + base_url = server_url + + if not isinstance(request, BaseModel) and request is not None: + request = utils.unmarshal(request, models.RoleSearchInput) + request = cast(models.RoleSearchInput, request) + + req = self.build_request( + method="POST", + path="/v1/permissions/roles:search", + base_url=base_url, + url_variables=url_variables, + request=request, + request_body_required=False, + request_has_path_params=False, + request_has_query_params=True, + user_agent_header="user-agent", + accept_header_value="application/json", + security=self.sdk_configuration.security, + get_serialized_body=lambda: utils.serialize_request_body(request, False, True, "json", Optional[models.RoleSearchInput]), + timeout_ms=timeout_ms, + ) + + if retries == UNSET: + if self.sdk_configuration.retry_config is not UNSET: + retries = self.sdk_configuration.retry_config + + retry_config = None + if isinstance(retries, utils.RetryConfig): + retry_config = (retries, [ + "429", + "500", + "502", + "503", + "504" + ]) + + http_res = await self.do_request_async( + hook_ctx=HookContext(operation_id="searchRoles", oauth2_scopes=[], security_source=self.sdk_configuration.security), + request=req, + error_status_codes=["4XX","5XX"], + retry_config=retry_config + ) + + if utils.match_response(http_res, "200", "application/json"): + return utils.unmarshal_json(http_res.text, Optional[models.SearchRolesResponseBody]) + if utils.match_response(http_res, ["4XX","5XX"], "*"): + raise models.SDKError("API error occurred", http_res.status_code, http_res.text, http_res) + + content_type = http_res.headers.get("Content-Type") + raise models.SDKError(f"Unexpected response received (code: {http_res.status_code}, type: {content_type})", http_res.status_code, http_res.text, http_res) + + diff --git a/permissions/src/epilot_permissions/sdk.py b/permissions/src/epilot_permissions/sdk.py new file mode 100644 index 000000000..7252db8c9 --- /dev/null +++ b/permissions/src/epilot_permissions/sdk.py @@ -0,0 +1,95 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from .basesdk import BaseSDK +from .httpclient import AsyncHttpClient, HttpClient +from .sdkconfiguration import SDKConfiguration +from .utils.logger import Logger, NoOpLogger +from .utils.retries import RetryConfig +from epilot_permissions import models +from epilot_permissions._hooks import SDKHooks +from epilot_permissions.assignments import Assignments +from epilot_permissions.roles import Roles +from epilot_permissions.types import OptionalNullable, UNSET +import epilot_permissions.utils as utils +import httpx +from typing import Callable, Dict, Optional, Union + +class Epilot(BaseSDK): + r"""Permissions API: Flexible Role-based Access Control for epilot""" + assignments: Assignments + r"""Assign roles to users""" + roles: Roles + r"""Manage roles and grants""" + def __init__( + self, + security: Union[models.Security, Callable[[], models.Security]], + server_idx: Optional[int] = None, + server_url: Optional[str] = None, + url_params: Optional[Dict[str, str]] = None, + client: Optional[HttpClient] = None, + async_client: Optional[AsyncHttpClient] = None, + retry_config: OptionalNullable[RetryConfig] = UNSET, + timeout_ms: Optional[int] = None, + debug_logger: Optional[Logger] = None + ) -> None: + r"""Instantiates the SDK configuring it with the provided parameters. + + :param security: The security details required for authentication + :param server_idx: The index of the server to use for all methods + :param server_url: The server URL to use for all methods + :param url_params: Parameters to optionally template the server URL with + :param client: The HTTP client to use for all synchronous methods + :param async_client: The Async HTTP client to use for all asynchronous methods + :param retry_config: The retry configuration to use for all supported methods + :param timeout_ms: Optional request timeout applied to each operation in milliseconds + """ + if client is None: + client = httpx.Client() + + assert issubclass( + type(client), HttpClient + ), "The provided client must implement the HttpClient protocol." + + if async_client is None: + async_client = httpx.AsyncClient() + + if debug_logger is None: + debug_logger = NoOpLogger() + + assert issubclass( + type(async_client), AsyncHttpClient + ), "The provided async_client must implement the AsyncHttpClient protocol." + + if server_url is not None: + if url_params is not None: + server_url = utils.template_url(server_url, url_params) + + + BaseSDK.__init__(self, SDKConfiguration( + client=client, + async_client=async_client, + security=security, + server_url=server_url, + server_idx=server_idx, + retry_config=retry_config, + timeout_ms=timeout_ms, + debug_logger=debug_logger + )) + + hooks = SDKHooks() + + current_server_url, *_ = self.sdk_configuration.get_server_details() + server_url, self.sdk_configuration.client = hooks.sdk_init(current_server_url, self.sdk_configuration.client) + if current_server_url != server_url: + self.sdk_configuration.server_url = server_url + + # pylint: disable=protected-access + self.sdk_configuration.__dict__["_hooks"] = hooks + + self._init_sdks() + + + def _init_sdks(self): + self.assignments = Assignments(self.sdk_configuration) + self.roles = Roles(self.sdk_configuration) + diff --git a/permissions/src/epilot_permissions/sdkconfiguration.py b/permissions/src/epilot_permissions/sdkconfiguration.py new file mode 100644 index 000000000..0c9d12dd1 --- /dev/null +++ b/permissions/src/epilot_permissions/sdkconfiguration.py @@ -0,0 +1,48 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + + +from ._hooks import SDKHooks +from .httpclient import AsyncHttpClient, HttpClient +from .utils import Logger, RetryConfig, remove_suffix +from dataclasses import dataclass +from epilot_permissions import models +from epilot_permissions.types import OptionalNullable, UNSET +from pydantic import Field +from typing import Callable, Dict, Optional, Tuple, Union + + +SERVERS = [ + "https://permissions.sls.epilot.io", +] +"""Contains the list of servers available to the SDK""" + +@dataclass +class SDKConfiguration: + client: HttpClient + async_client: AsyncHttpClient + debug_logger: Logger + security: Optional[Union[models.Security,Callable[[], models.Security]]] = None + server_url: Optional[str] = "" + server_idx: Optional[int] = 0 + language: str = "python" + openapi_doc_version: str = "1.0.0" + sdk_version: str = "1.3.0" + gen_version: str = "2.385.2" + user_agent: str = "speakeasy-sdk/python 1.3.0 2.385.2 1.0.0 epilot-permissions" + retry_config: OptionalNullable[RetryConfig] = Field(default_factory=lambda: UNSET) + timeout_ms: Optional[int] = None + + def __post_init__(self): + self._hooks = SDKHooks() + + def get_server_details(self) -> Tuple[str, Dict[str, str]]: + if self.server_url is not None and self.server_url: + return remove_suffix(self.server_url, "/"), {} + if self.server_idx is None: + self.server_idx = 0 + + return SERVERS[self.server_idx], {} + + + def get_hooks(self) -> SDKHooks: + return self._hooks diff --git a/permissions/src/epilot_permissions/types/__init__.py b/permissions/src/epilot_permissions/types/__init__.py new file mode 100644 index 000000000..fc76fe0c5 --- /dev/null +++ b/permissions/src/epilot_permissions/types/__init__.py @@ -0,0 +1,21 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from .basemodel import ( + BaseModel, + Nullable, + OptionalNullable, + UnrecognizedInt, + UnrecognizedStr, + UNSET, + UNSET_SENTINEL, +) + +__all__ = [ + "BaseModel", + "Nullable", + "OptionalNullable", + "UnrecognizedInt", + "UnrecognizedStr", + "UNSET", + "UNSET_SENTINEL", +] diff --git a/permissions/src/epilot_permissions/types/basemodel.py b/permissions/src/epilot_permissions/types/basemodel.py new file mode 100644 index 000000000..85f7c61b5 --- /dev/null +++ b/permissions/src/epilot_permissions/types/basemodel.py @@ -0,0 +1,35 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from pydantic import ConfigDict, model_serializer +from pydantic import BaseModel as PydanticBaseModel +from typing import Literal, Optional, TypeVar, Union, NewType +from typing_extensions import TypeAliasType + + +class BaseModel(PydanticBaseModel): + model_config = ConfigDict( + populate_by_name=True, arbitrary_types_allowed=True, protected_namespaces=() + ) + + +class Unset(BaseModel): + @model_serializer(mode="plain") + def serialize_model(self): + return UNSET_SENTINEL + + def __bool__(self) -> Literal[False]: + return False + + +UNSET = Unset() +UNSET_SENTINEL = "~?~unset~?~sentinel~?~" + + +T = TypeVar("T") +Nullable = TypeAliasType("Nullable", Union[T, None], type_params=(T,)) +OptionalNullable = TypeAliasType( + "OptionalNullable", Union[Optional[Nullable[T]], Unset], type_params=(T,) +) + +UnrecognizedInt = NewType("UnrecognizedInt", int) +UnrecognizedStr = NewType("UnrecognizedStr", str) diff --git a/permissions/src/epilot_permissions/utils/__init__.py b/permissions/src/epilot_permissions/utils/__init__.py new file mode 100644 index 000000000..95aa1b60c --- /dev/null +++ b/permissions/src/epilot_permissions/utils/__init__.py @@ -0,0 +1,84 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from .annotations import get_discriminator +from .enums import OpenEnumMeta +from .headers import get_headers, get_response_headers +from .metadata import ( + FieldMetadata, + find_metadata, + FormMetadata, + HeaderMetadata, + MultipartFormMetadata, + PathParamMetadata, + QueryParamMetadata, + RequestMetadata, + SecurityMetadata, +) +from .queryparams import get_query_params +from .retries import BackoffStrategy, Retries, retry, retry_async, RetryConfig +from .requestbodies import serialize_request_body, SerializedRequestBody +from .security import get_security +from .serializers import ( + get_pydantic_model, + marshal_json, + unmarshal, + unmarshal_json, + serialize_decimal, + serialize_float, + serialize_int, + stream_to_text, + validate_decimal, + validate_float, + validate_int, + validate_open_enum, +) +from .url import generate_url, template_url, remove_suffix +from .values import get_global_from_env, match_content_type, match_status_codes, match_response +from .logger import Logger, get_body_content, NoOpLogger + +__all__ = [ + "BackoffStrategy", + "FieldMetadata", + "find_metadata", + "FormMetadata", + "generate_url", + "get_body_content", + "get_discriminator", + "get_global_from_env", + "get_headers", + "get_pydantic_model", + "get_query_params", + "get_response_headers", + "get_security", + "HeaderMetadata", + "Logger", + "marshal_json", + "match_content_type", + "match_status_codes", + "match_response", + "MultipartFormMetadata", + "NoOpLogger", + "OpenEnumMeta", + "PathParamMetadata", + "QueryParamMetadata", + "remove_suffix", + "Retries", + "retry", + "retry_async", + "RetryConfig", + "RequestMetadata", + "SecurityMetadata", + "serialize_decimal", + "serialize_float", + "serialize_int", + "serialize_request_body", + "SerializedRequestBody", + "stream_to_text", + "template_url", + "unmarshal", + "unmarshal_json", + "validate_decimal", + "validate_float", + "validate_int", + "validate_open_enum", +] diff --git a/permissions/src/epilot_permissions/utils/annotations.py b/permissions/src/epilot_permissions/utils/annotations.py new file mode 100644 index 000000000..0d17472b3 --- /dev/null +++ b/permissions/src/epilot_permissions/utils/annotations.py @@ -0,0 +1,19 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from typing import Any + +def get_discriminator(model: Any, fieldname: str, key: str) -> str: + if isinstance(model, dict): + try: + return f'{model.get(key)}' + except AttributeError as e: + raise ValueError(f'Could not find discriminator key {key} in {model}') from e + + if hasattr(model, fieldname): + return f'{getattr(model, fieldname)}' + + fieldname = fieldname.upper() + if hasattr(model, fieldname): + return f'{getattr(model, fieldname)}' + + raise ValueError(f'Could not find discriminator field {fieldname} in {model}') diff --git a/permissions/src/epilot_permissions/utils/enums.py b/permissions/src/epilot_permissions/utils/enums.py new file mode 100644 index 000000000..c650b10cb --- /dev/null +++ b/permissions/src/epilot_permissions/utils/enums.py @@ -0,0 +1,34 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +import enum + + +class OpenEnumMeta(enum.EnumMeta): + def __call__( + cls, value, names=None, *, module=None, qualname=None, type=None, start=1 + ): + # The `type` kwarg also happens to be a built-in that pylint flags as + # redeclared. Safe to ignore this lint rule with this scope. + # pylint: disable=redefined-builtin + + if names is not None: + return super().__call__( + value, + names=names, + module=module, + qualname=qualname, + type=type, + start=start, + ) + + try: + return super().__call__( + value, + names=names, # pyright: ignore[reportArgumentType] + module=module, + qualname=qualname, + type=type, + start=start, + ) + except ValueError: + return value diff --git a/permissions/src/epilot_permissions/utils/eventstreaming.py b/permissions/src/epilot_permissions/utils/eventstreaming.py new file mode 100644 index 000000000..7789cfd35 --- /dev/null +++ b/permissions/src/epilot_permissions/utils/eventstreaming.py @@ -0,0 +1,179 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +import re +import json +from typing import Callable, TypeVar, Optional, Generator, AsyncGenerator, Tuple +import httpx + +T = TypeVar("T") + + +class ServerEvent: + id: Optional[str] = None + event: Optional[str] = None + data: Optional[str] = None + retry: Optional[int] = None + + +MESSAGE_BOUNDARIES = [ + b"\r\n\r\n", + b"\n\n", + b"\r\r", +] + + +async def stream_events_async( + response: httpx.Response, + decoder: Callable[[str], T], + sentinel: Optional[str] = None, +) -> AsyncGenerator[T, None]: + buffer = bytearray() + position = 0 + discard = False + async for chunk in response.aiter_bytes(): + # We've encountered the sentinel value and should no longer process + # incoming data. Instead we throw new data away until the server closes + # the connection. + if discard: + continue + + buffer += chunk + for i in range(position, len(buffer)): + char = buffer[i : i + 1] + seq: Optional[bytes] = None + if char in [b"\r", b"\n"]: + for boundary in MESSAGE_BOUNDARIES: + seq = _peek_sequence(i, buffer, boundary) + if seq is not None: + break + if seq is None: + continue + + block = buffer[position:i] + position = i + len(seq) + event, discard = _parse_event(block, decoder, sentinel) + if event is not None: + yield event + + if position > 0: + buffer = buffer[position:] + position = 0 + + event, discard = _parse_event(buffer, decoder, sentinel) + if event is not None: + yield event + + +def stream_events( + response: httpx.Response, + decoder: Callable[[str], T], + sentinel: Optional[str] = None, +) -> Generator[T, None, None]: + buffer = bytearray() + position = 0 + discard = False + for chunk in response.iter_bytes(): + # We've encountered the sentinel value and should no longer process + # incoming data. Instead we throw new data away until the server closes + # the connection. + if discard: + continue + + buffer += chunk + for i in range(position, len(buffer)): + char = buffer[i : i + 1] + seq: Optional[bytes] = None + if char in [b"\r", b"\n"]: + for boundary in MESSAGE_BOUNDARIES: + seq = _peek_sequence(i, buffer, boundary) + if seq is not None: + break + if seq is None: + continue + + block = buffer[position:i] + position = i + len(seq) + event, discard = _parse_event(block, decoder, sentinel) + if event is not None: + yield event + + if position > 0: + buffer = buffer[position:] + position = 0 + + event, discard = _parse_event(buffer, decoder, sentinel) + if event is not None: + yield event + + +def _parse_event( + raw: bytearray, decoder: Callable[[str], T], sentinel: Optional[str] = None +) -> Tuple[Optional[T], bool]: + block = raw.decode() + lines = re.split(r"\r?\n|\r", block) + publish = False + event = ServerEvent() + data = "" + for line in lines: + if not line: + continue + + delim = line.find(":") + if delim <= 0: + continue + + field = line[0:delim] + value = line[delim + 1 :] if delim < len(line) - 1 else "" + if len(value) and value[0] == " ": + value = value[1:] + + if field == "event": + event.event = value + publish = True + elif field == "data": + data += value + "\n" + publish = True + elif field == "id": + event.id = value + publish = True + elif field == "retry": + event.retry = int(value) if value.isdigit() else None + publish = True + + if sentinel and data == f"{sentinel}\n": + return None, True + + if data: + data = data[:-1] + event.data = data + + if ( + data.isnumeric() + or data == "true" + or data == "false" + or data == "null" + or data.startswith("{") + or data.startswith("[") + or data.startswith('"') + ): + try: + event.data = json.loads(data) + except Exception: + pass + + out = None + if publish: + out = decoder(json.dumps(event.__dict__)) + + return out, False + + +def _peek_sequence(position: int, buffer: bytearray, sequence: bytes): + if len(sequence) > (len(buffer) - position): + return None + + for i, seq in enumerate(sequence): + if buffer[position + i] != seq: + return None + + return sequence diff --git a/permissions/src/epilot_permissions/utils/forms.py b/permissions/src/epilot_permissions/utils/forms.py new file mode 100644 index 000000000..07f9b2359 --- /dev/null +++ b/permissions/src/epilot_permissions/utils/forms.py @@ -0,0 +1,207 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from typing import ( + Any, + Dict, + get_type_hints, + List, + Tuple, +) +from pydantic import BaseModel +from pydantic.fields import FieldInfo + +from .serializers import marshal_json + +from .metadata import ( + FormMetadata, + MultipartFormMetadata, + find_field_metadata, +) +from .values import _val_to_string + + +def _populate_form( + field_name: str, + explode: bool, + obj: Any, + delimiter: str, + form: Dict[str, List[str]], +): + if obj is None: + return form + + if isinstance(obj, BaseModel): + items = [] + + obj_fields: Dict[str, FieldInfo] = obj.__class__.model_fields + for name in obj_fields: + obj_field = obj_fields[name] + obj_field_name = obj_field.alias if obj_field.alias is not None else name + if obj_field_name == "": + continue + + val = getattr(obj, name) + if val is None: + continue + + if explode: + form[obj_field_name] = [_val_to_string(val)] + else: + items.append(f"{obj_field_name}{delimiter}{_val_to_string(val)}") + + if len(items) > 0: + form[field_name] = [delimiter.join(items)] + elif isinstance(obj, Dict): + items = [] + for key, value in obj.items(): + if value is None: + continue + + if explode: + form[key] = [_val_to_string(value)] + else: + items.append(f"{key}{delimiter}{_val_to_string(value)}") + + if len(items) > 0: + form[field_name] = [delimiter.join(items)] + elif isinstance(obj, List): + items = [] + + for value in obj: + if value is None: + continue + + if explode: + if not field_name in form: + form[field_name] = [] + form[field_name].append(_val_to_string(value)) + else: + items.append(_val_to_string(value)) + + if len(items) > 0: + form[field_name] = [delimiter.join([str(item) for item in items])] + else: + form[field_name] = [_val_to_string(obj)] + + return form + + +def serialize_multipart_form( + media_type: str, request: Any +) -> Tuple[str, Dict[str, Any], Dict[str, Any]]: + form: Dict[str, Any] = {} + files: Dict[str, Any] = {} + + if not isinstance(request, BaseModel): + raise TypeError("invalid request body type") + + request_fields: Dict[str, FieldInfo] = request.__class__.model_fields + request_field_types = get_type_hints(request.__class__) + + for name in request_fields: + field = request_fields[name] + + val = getattr(request, name) + if val is None: + continue + + field_metadata = find_field_metadata(field, MultipartFormMetadata) + if not field_metadata: + continue + + f_name = field.alias if field.alias is not None else name + + if field_metadata.file: + file_fields: Dict[str, FieldInfo] = val.__class__.model_fields + + file_name = "" + field_name = "" + content = None + content_type = None + + for file_field_name in file_fields: + file_field = file_fields[file_field_name] + + file_metadata = find_field_metadata(file_field, MultipartFormMetadata) + if file_metadata is None: + continue + + if file_metadata.content: + content = getattr(val, file_field_name, None) + elif file_field_name == "content_type": + content_type = getattr(val, file_field_name, None) + else: + field_name = ( + file_field.alias + if file_field.alias is not None + else file_field_name + ) + file_name = getattr(val, file_field_name) + + if field_name == "" or file_name == "" or content is None: + raise ValueError("invalid multipart/form-data file") + + if content_type is not None: + files[field_name] = (file_name, content, content_type) + else: + files[field_name] = (file_name, content) + elif field_metadata.json: + files[f_name] = ( + None, + marshal_json(val, request_field_types[name]), + "application/json", + ) + else: + if isinstance(val, List): + values = [] + + for value in val: + if value is None: + continue + values.append(_val_to_string(value)) + + form[f_name + "[]"] = values + else: + form[f_name] = _val_to_string(val) + return media_type, form, files + + +def serialize_form_data(data: Any) -> Dict[str, Any]: + form: Dict[str, List[str]] = {} + + if isinstance(data, BaseModel): + data_fields: Dict[str, FieldInfo] = data.__class__.model_fields + data_field_types = get_type_hints(data.__class__) + for name in data_fields: + field = data_fields[name] + + val = getattr(data, name) + if val is None: + continue + + metadata = find_field_metadata(field, FormMetadata) + if metadata is None: + continue + + f_name = field.alias if field.alias is not None else name + + if metadata.json: + form[f_name] = [marshal_json(val, data_field_types[name])] + else: + if metadata.style == "form": + _populate_form( + f_name, + metadata.explode, + val, + ",", + form, + ) + else: + raise ValueError(f"Invalid form style for field {name}") + elif isinstance(data, Dict): + for key, value in data.items(): + form[key] = [_val_to_string(value)] + else: + raise TypeError(f"Invalid request body type {type(data)} for form data") + + return form diff --git a/permissions/src/epilot_permissions/utils/headers.py b/permissions/src/epilot_permissions/utils/headers.py new file mode 100644 index 000000000..e14a0f4a8 --- /dev/null +++ b/permissions/src/epilot_permissions/utils/headers.py @@ -0,0 +1,136 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from typing import ( + Any, + Dict, + List, + Optional, +) +from httpx import Headers +from pydantic import BaseModel +from pydantic.fields import FieldInfo + +from .metadata import ( + HeaderMetadata, + find_field_metadata, +) + +from .values import _populate_from_globals, _val_to_string + + +def get_headers(headers_params: Any, gbls: Optional[Any] = None) -> Dict[str, str]: + headers: Dict[str, str] = {} + + globals_already_populated = [] + if headers_params is not None: + globals_already_populated = _populate_headers(headers_params, gbls, headers, []) + if gbls is not None: + _populate_headers(gbls, None, headers, globals_already_populated) + + return headers + + +def _populate_headers( + headers_params: Any, + gbls: Any, + header_values: Dict[str, str], + skip_fields: List[str], +) -> List[str]: + globals_already_populated: List[str] = [] + + if not isinstance(headers_params, BaseModel): + return globals_already_populated + + param_fields: Dict[str, FieldInfo] = headers_params.__class__.model_fields + for name in param_fields: + if name in skip_fields: + continue + + field = param_fields[name] + f_name = field.alias if field.alias is not None else name + + metadata = find_field_metadata(field, HeaderMetadata) + if metadata is None: + continue + + value, global_found = _populate_from_globals( + name, getattr(headers_params, name), HeaderMetadata, gbls + ) + if global_found: + globals_already_populated.append(name) + value = _serialize_header(metadata.explode, value) + + if value != "": + header_values[f_name] = value + + return globals_already_populated + + +def _serialize_header(explode: bool, obj: Any) -> str: + if obj is None: + return "" + + if isinstance(obj, BaseModel): + items = [] + obj_fields: Dict[str, FieldInfo] = obj.__class__.model_fields + for name in obj_fields: + obj_field = obj_fields[name] + obj_param_metadata = find_field_metadata(obj_field, HeaderMetadata) + + if not obj_param_metadata: + continue + + f_name = obj_field.alias if obj_field.alias is not None else name + + val = getattr(obj, name) + if val is None: + continue + + if explode: + items.append(f"{f_name}={_val_to_string(val)}") + else: + items.append(f_name) + items.append(_val_to_string(val)) + + if len(items) > 0: + return ",".join(items) + elif isinstance(obj, Dict): + items = [] + + for key, value in obj.items(): + if value is None: + continue + + if explode: + items.append(f"{key}={_val_to_string(value)}") + else: + items.append(key) + items.append(_val_to_string(value)) + + if len(items) > 0: + return ",".join([str(item) for item in items]) + elif isinstance(obj, List): + items = [] + + for value in obj: + if value is None: + continue + + items.append(_val_to_string(value)) + + if len(items) > 0: + return ",".join(items) + else: + return f"{_val_to_string(obj)}" + + return "" + + +def get_response_headers(headers: Headers) -> Dict[str, List[str]]: + res: Dict[str, List[str]] = {} + for k, v in headers.items(): + if not k in res: + res[k] = [] + + res[k].append(v) + return res diff --git a/permissions/src/epilot_permissions/utils/logger.py b/permissions/src/epilot_permissions/utils/logger.py new file mode 100644 index 000000000..7e4bbeac2 --- /dev/null +++ b/permissions/src/epilot_permissions/utils/logger.py @@ -0,0 +1,16 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +import httpx +from typing import Any, Protocol + +class Logger(Protocol): + def debug(self, msg: str, *args: Any, **kwargs: Any) -> None: + pass + +class NoOpLogger: + def debug(self, msg: str, *args: Any, **kwargs: Any) -> None: + pass + +def get_body_content(req: httpx.Request) -> str: + return "" if not hasattr(req, "_content") else str(req.content) + diff --git a/permissions/src/epilot_permissions/utils/metadata.py b/permissions/src/epilot_permissions/utils/metadata.py new file mode 100644 index 000000000..173b3e5ce --- /dev/null +++ b/permissions/src/epilot_permissions/utils/metadata.py @@ -0,0 +1,118 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from typing import Optional, Type, TypeVar, Union +from dataclasses import dataclass +from pydantic.fields import FieldInfo + + +T = TypeVar("T") + + +@dataclass +class SecurityMetadata: + option: bool = False + scheme: bool = False + scheme_type: Optional[str] = None + sub_type: Optional[str] = None + field_name: Optional[str] = None + + def get_field_name(self, default: str) -> str: + return self.field_name or default + + +@dataclass +class ParamMetadata: + serialization: Optional[str] = None + style: str = "simple" + explode: bool = False + + +@dataclass +class PathParamMetadata(ParamMetadata): + pass + + +@dataclass +class QueryParamMetadata(ParamMetadata): + style: str = "form" + explode: bool = True + + +@dataclass +class HeaderMetadata(ParamMetadata): + pass + + +@dataclass +class RequestMetadata: + media_type: str = "application/octet-stream" + + +@dataclass +class MultipartFormMetadata: + file: bool = False + content: bool = False + json: bool = False + + +@dataclass +class FormMetadata: + json: bool = False + style: str = "form" + explode: bool = True + + +class FieldMetadata: + security: Optional[SecurityMetadata] = None + path: Optional[PathParamMetadata] = None + query: Optional[QueryParamMetadata] = None + header: Optional[HeaderMetadata] = None + request: Optional[RequestMetadata] = None + form: Optional[FormMetadata] = None + multipart: Optional[MultipartFormMetadata] = None + + def __init__( + self, + security: Optional[SecurityMetadata] = None, + path: Optional[Union[PathParamMetadata, bool]] = None, + query: Optional[Union[QueryParamMetadata, bool]] = None, + header: Optional[Union[HeaderMetadata, bool]] = None, + request: Optional[Union[RequestMetadata, bool]] = None, + form: Optional[Union[FormMetadata, bool]] = None, + multipart: Optional[Union[MultipartFormMetadata, bool]] = None, + ): + self.security = security + self.path = PathParamMetadata() if isinstance(path, bool) else path + self.query = QueryParamMetadata() if isinstance(query, bool) else query + self.header = HeaderMetadata() if isinstance(header, bool) else header + self.request = RequestMetadata() if isinstance(request, bool) else request + self.form = FormMetadata() if isinstance(form, bool) else form + self.multipart = ( + MultipartFormMetadata() if isinstance(multipart, bool) else multipart + ) + + +def find_field_metadata(field_info: FieldInfo, metadata_type: Type[T]) -> Optional[T]: + metadata = find_metadata(field_info, FieldMetadata) + if not metadata: + return None + + fields = metadata.__dict__ + + for field in fields: + if isinstance(fields[field], metadata_type): + return fields[field] + + return None + + +def find_metadata(field_info: FieldInfo, metadata_type: Type[T]) -> Optional[T]: + metadata = field_info.metadata + if not metadata: + return None + + for md in metadata: + if isinstance(md, metadata_type): + return md + + return None diff --git a/permissions/src/epilot_permissions/utils/queryparams.py b/permissions/src/epilot_permissions/utils/queryparams.py new file mode 100644 index 000000000..1c8c58340 --- /dev/null +++ b/permissions/src/epilot_permissions/utils/queryparams.py @@ -0,0 +1,203 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from typing import ( + Any, + Dict, + get_type_hints, + List, + Optional, +) + +from pydantic import BaseModel +from pydantic.fields import FieldInfo + +from .metadata import ( + QueryParamMetadata, + find_field_metadata, +) +from .values import _get_serialized_params, _populate_from_globals, _val_to_string +from .forms import _populate_form + + +def get_query_params( + query_params: Any, + gbls: Optional[Any] = None, +) -> Dict[str, List[str]]: + params: Dict[str, List[str]] = {} + + globals_already_populated = _populate_query_params(query_params, gbls, params, []) + if gbls is not None: + _populate_query_params(gbls, None, params, globals_already_populated) + + return params + + +def _populate_query_params( + query_params: Any, + gbls: Any, + query_param_values: Dict[str, List[str]], + skip_fields: List[str], +) -> List[str]: + globals_already_populated: List[str] = [] + + if not isinstance(query_params, BaseModel): + return globals_already_populated + + param_fields: Dict[str, FieldInfo] = query_params.__class__.model_fields + param_field_types = get_type_hints(query_params.__class__) + for name in param_fields: + if name in skip_fields: + continue + + field = param_fields[name] + + metadata = find_field_metadata(field, QueryParamMetadata) + if not metadata: + continue + + value = getattr(query_params, name) if query_params is not None else None + + value, global_found = _populate_from_globals( + name, value, QueryParamMetadata, gbls + ) + if global_found: + globals_already_populated.append(name) + + f_name = field.alias if field.alias is not None else name + serialization = metadata.serialization + if serialization is not None: + serialized_parms = _get_serialized_params( + metadata, f_name, value, param_field_types[name] + ) + for key, value in serialized_parms.items(): + if key in query_param_values: + query_param_values[key].extend(value) + else: + query_param_values[key] = [value] + else: + style = metadata.style + if style == "deepObject": + _populate_deep_object_query_params(f_name, value, query_param_values) + elif style == "form": + _populate_delimited_query_params( + metadata, f_name, value, ",", query_param_values + ) + elif style == "pipeDelimited": + _populate_delimited_query_params( + metadata, f_name, value, "|", query_param_values + ) + else: + raise NotImplementedError( + f"query param style {style} not yet supported" + ) + + return globals_already_populated + + +def _populate_deep_object_query_params( + field_name: str, + obj: Any, + params: Dict[str, List[str]], +): + if obj is None: + return + + if isinstance(obj, BaseModel): + _populate_deep_object_query_params_basemodel(field_name, obj, params) + elif isinstance(obj, Dict): + _populate_deep_object_query_params_dict(field_name, obj, params) + + +def _populate_deep_object_query_params_basemodel( + prior_params_key: str, + obj: Any, + params: Dict[str, List[str]], +): + if obj is None: + return + + if not isinstance(obj, BaseModel): + return + + obj_fields: Dict[str, FieldInfo] = obj.__class__.model_fields + for name in obj_fields: + obj_field = obj_fields[name] + + f_name = obj_field.alias if obj_field.alias is not None else name + + params_key = f"{prior_params_key}[{f_name}]" + + obj_param_metadata = find_field_metadata(obj_field, QueryParamMetadata) + if obj_param_metadata is None: + continue + + obj_val = getattr(obj, name) + if obj_val is None: + continue + + if isinstance(obj_val, BaseModel): + _populate_deep_object_query_params_basemodel(params_key, obj_val, params) + elif isinstance(obj_val, Dict): + _populate_deep_object_query_params_dict(params_key, obj_val, params) + elif isinstance(obj_val, List): + _populate_deep_object_query_params_list(params_key, obj_val, params) + else: + params[params_key] = [_val_to_string(obj_val)] + + +def _populate_deep_object_query_params_dict( + prior_params_key: str, + value: Dict, + params: Dict[str, List[str]], +): + if value is None: + return + + for key, val in value.items(): + if val is None: + continue + + params_key = f"{prior_params_key}[{key}]" + + if isinstance(val, BaseModel): + _populate_deep_object_query_params_basemodel(params_key, val, params) + elif isinstance(val, Dict): + _populate_deep_object_query_params_dict(params_key, val, params) + elif isinstance(val, List): + _populate_deep_object_query_params_list(params_key, val, params) + else: + params[params_key] = [_val_to_string(val)] + + +def _populate_deep_object_query_params_list( + params_key: str, + value: List, + params: Dict[str, List[str]], +): + if value is None: + return + + for val in value: + if val is None: + continue + + if params.get(params_key) is None: + params[params_key] = [] + + params[params_key].append(_val_to_string(val)) + + +def _populate_delimited_query_params( + metadata: QueryParamMetadata, + field_name: str, + obj: Any, + delimiter: str, + query_param_values: Dict[str, List[str]], +): + _populate_form( + field_name, + metadata.explode, + obj, + delimiter, + query_param_values, + ) diff --git a/permissions/src/epilot_permissions/utils/requestbodies.py b/permissions/src/epilot_permissions/utils/requestbodies.py new file mode 100644 index 000000000..4f586ae79 --- /dev/null +++ b/permissions/src/epilot_permissions/utils/requestbodies.py @@ -0,0 +1,66 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +import io +from dataclasses import dataclass +import re +from typing import ( + Any, + Optional, +) + +from .forms import serialize_form_data, serialize_multipart_form + +from .serializers import marshal_json + +SERIALIZATION_METHOD_TO_CONTENT_TYPE = { + "json": "application/json", + "form": "application/x-www-form-urlencoded", + "multipart": "multipart/form-data", + "raw": "application/octet-stream", + "string": "text/plain", +} + + +@dataclass +class SerializedRequestBody: + media_type: str + content: Optional[Any] = None + data: Optional[Any] = None + files: Optional[Any] = None + + +def serialize_request_body( + request_body: Any, + nullable: bool, + optional: bool, + serialization_method: str, + request_body_type, +) -> Optional[SerializedRequestBody]: + if request_body is None: + if not nullable and optional: + return None + + media_type = SERIALIZATION_METHOD_TO_CONTENT_TYPE[serialization_method] + + serialized_request_body = SerializedRequestBody(media_type) + + if re.match(r"(application|text)\/.*?\+*json.*", media_type) is not None: + serialized_request_body.content = marshal_json(request_body, request_body_type) + elif re.match(r"multipart\/.*", media_type) is not None: + ( + serialized_request_body.media_type, + serialized_request_body.data, + serialized_request_body.files, + ) = serialize_multipart_form(media_type, request_body) + elif re.match(r"application\/x-www-form-urlencoded.*", media_type) is not None: + serialized_request_body.data = serialize_form_data(request_body) + elif isinstance(request_body, (bytes, bytearray, io.BytesIO, io.BufferedReader)): + serialized_request_body.content = request_body + elif isinstance(request_body, str): + serialized_request_body.content = request_body + else: + raise TypeError( + f"invalid request body type {type(request_body)} for mediaType {media_type}" + ) + + return serialized_request_body diff --git a/permissions/src/epilot_permissions/utils/retries.py b/permissions/src/epilot_permissions/utils/retries.py new file mode 100644 index 000000000..8070fae79 --- /dev/null +++ b/permissions/src/epilot_permissions/utils/retries.py @@ -0,0 +1,216 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +import random +import time +from typing import List + +import httpx + + +class BackoffStrategy: + initial_interval: int + max_interval: int + exponent: float + max_elapsed_time: int + + def __init__( + self, + initial_interval: int, + max_interval: int, + exponent: float, + max_elapsed_time: int, + ): + self.initial_interval = initial_interval + self.max_interval = max_interval + self.exponent = exponent + self.max_elapsed_time = max_elapsed_time + + +class RetryConfig: + strategy: str + backoff: BackoffStrategy + retry_connection_errors: bool + + def __init__( + self, strategy: str, backoff: BackoffStrategy, retry_connection_errors: bool + ): + self.strategy = strategy + self.backoff = backoff + self.retry_connection_errors = retry_connection_errors + + +class Retries: + config: RetryConfig + status_codes: List[str] + + def __init__(self, config: RetryConfig, status_codes: List[str]): + self.config = config + self.status_codes = status_codes + + +class TemporaryError(Exception): + response: httpx.Response + + def __init__(self, response: httpx.Response): + self.response = response + + +class PermanentError(Exception): + inner: Exception + + def __init__(self, inner: Exception): + self.inner = inner + + +def retry(func, retries: Retries): + if retries.config.strategy == "backoff": + + def do_request() -> httpx.Response: + res: httpx.Response + try: + res = func() + + for code in retries.status_codes: + if "X" in code.upper(): + code_range = int(code[0]) + + status_major = res.status_code / 100 + + if status_major >= code_range and status_major < code_range + 1: + raise TemporaryError(res) + else: + parsed_code = int(code) + + if res.status_code == parsed_code: + raise TemporaryError(res) + except httpx.ConnectError as exception: + if retries.config.retry_connection_errors: + raise + + raise PermanentError(exception) from exception + except httpx.TimeoutException as exception: + if retries.config.retry_connection_errors: + raise + + raise PermanentError(exception) from exception + except TemporaryError: + raise + except Exception as exception: + raise PermanentError(exception) from exception + + return res + + return retry_with_backoff( + do_request, + retries.config.backoff.initial_interval, + retries.config.backoff.max_interval, + retries.config.backoff.exponent, + retries.config.backoff.max_elapsed_time, + ) + + return func() + + +async def retry_async(func, retries: Retries): + if retries.config.strategy == "backoff": + + async def do_request() -> httpx.Response: + res: httpx.Response + try: + res = await func() + + for code in retries.status_codes: + if "X" in code.upper(): + code_range = int(code[0]) + + status_major = res.status_code / 100 + + if status_major >= code_range and status_major < code_range + 1: + raise TemporaryError(res) + else: + parsed_code = int(code) + + if res.status_code == parsed_code: + raise TemporaryError(res) + except httpx.ConnectError as exception: + if retries.config.retry_connection_errors: + raise + + raise PermanentError(exception) from exception + except httpx.TimeoutException as exception: + if retries.config.retry_connection_errors: + raise + + raise PermanentError(exception) from exception + except TemporaryError: + raise + except Exception as exception: + raise PermanentError(exception) from exception + + return res + + return await retry_with_backoff_async( + do_request, + retries.config.backoff.initial_interval, + retries.config.backoff.max_interval, + retries.config.backoff.exponent, + retries.config.backoff.max_elapsed_time, + ) + + return await func() + + +def retry_with_backoff( + func, + initial_interval=500, + max_interval=60000, + exponent=1.5, + max_elapsed_time=3600000, +): + start = round(time.time() * 1000) + retries = 0 + + while True: + try: + return func() + except PermanentError as exception: + raise exception.inner + except Exception as exception: # pylint: disable=broad-exception-caught + now = round(time.time() * 1000) + if now - start > max_elapsed_time: + if isinstance(exception, TemporaryError): + return exception.response + + raise + sleep = (initial_interval / 1000) * exponent**retries + random.uniform(0, 1) + sleep = min(sleep, max_interval / 1000) + time.sleep(sleep) + retries += 1 + + +async def retry_with_backoff_async( + func, + initial_interval=500, + max_interval=60000, + exponent=1.5, + max_elapsed_time=3600000, +): + start = round(time.time() * 1000) + retries = 0 + + while True: + try: + return await func() + except PermanentError as exception: + raise exception.inner + except Exception as exception: # pylint: disable=broad-exception-caught + now = round(time.time() * 1000) + if now - start > max_elapsed_time: + if isinstance(exception, TemporaryError): + return exception.response + + raise + sleep = (initial_interval / 1000) * exponent**retries + random.uniform(0, 1) + sleep = min(sleep, max_interval / 1000) + time.sleep(sleep) + retries += 1 diff --git a/permissions/src/epilot_permissions/utils/security.py b/permissions/src/epilot_permissions/utils/security.py new file mode 100644 index 000000000..aab4cb65c --- /dev/null +++ b/permissions/src/epilot_permissions/utils/security.py @@ -0,0 +1,168 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +import base64 +from typing import ( + Any, + Dict, + List, + Tuple, +) +from pydantic import BaseModel +from pydantic.fields import FieldInfo + +from .metadata import ( + SecurityMetadata, + find_field_metadata, +) + + + +def get_security(security: Any) -> Tuple[Dict[str, str], Dict[str, List[str]]]: + headers: Dict[str, str] = {} + query_params: Dict[str, List[str]] = {} + + if security is None: + return headers, query_params + + if not isinstance(security, BaseModel): + raise TypeError("security must be a pydantic model") + + sec_fields: Dict[str, FieldInfo] = security.__class__.model_fields + for name in sec_fields: + sec_field = sec_fields[name] + + value = getattr(security, name) + if value is None: + continue + + metadata = find_field_metadata(sec_field, SecurityMetadata) + if metadata is None: + continue + if metadata.option: + _parse_security_option(headers, query_params, value) + return headers, query_params + if metadata.scheme: + # Special case for basic auth which could be a flattened model + if metadata.sub_type == "basic" and not isinstance(value, BaseModel): + _parse_security_scheme(headers, query_params, metadata, name, security) + else: + _parse_security_scheme(headers, query_params, metadata, name, value) + + return headers, query_params + + +def _parse_security_option( + headers: Dict[str, str], query_params: Dict[str, List[str]], option: Any +): + if not isinstance(option, BaseModel): + raise TypeError("security option must be a pydantic model") + + opt_fields: Dict[str, FieldInfo] = option.__class__.model_fields + for name in opt_fields: + opt_field = opt_fields[name] + + metadata = find_field_metadata(opt_field, SecurityMetadata) + if metadata is None or not metadata.scheme: + continue + _parse_security_scheme( + headers, query_params, metadata, name, getattr(option, name) + ) + + +def _parse_security_scheme( + headers: Dict[str, str], + query_params: Dict[str, List[str]], + scheme_metadata: SecurityMetadata, + field_name: str, + scheme: Any, +): + scheme_type = scheme_metadata.scheme_type + sub_type = scheme_metadata.sub_type + + if isinstance(scheme, BaseModel): + if scheme_type == "http" and sub_type == "basic": + _parse_basic_auth_scheme(headers, scheme) + return + + scheme_fields: Dict[str, FieldInfo] = scheme.__class__.model_fields + for name in scheme_fields: + scheme_field = scheme_fields[name] + + metadata = find_field_metadata(scheme_field, SecurityMetadata) + if metadata is None or metadata.field_name is None: + continue + + value = getattr(scheme, name) + + _parse_security_scheme_value( + headers, query_params, scheme_metadata, metadata, name, value + ) + else: + _parse_security_scheme_value( + headers, query_params, scheme_metadata, scheme_metadata, field_name, scheme + ) + + +def _parse_security_scheme_value( + headers: Dict[str, str], + query_params: Dict[str, List[str]], + scheme_metadata: SecurityMetadata, + security_metadata: SecurityMetadata, + field_name: str, + value: Any, +): + scheme_type = scheme_metadata.scheme_type + sub_type = scheme_metadata.sub_type + + header_name = security_metadata.get_field_name(field_name) + + if scheme_type == "apiKey": + if sub_type == "header": + headers[header_name] = value + elif sub_type == "query": + query_params[header_name] = [value] + else: + raise ValueError("sub type {sub_type} not supported") + elif scheme_type == "openIdConnect": + headers[header_name] = _apply_bearer(value) + elif scheme_type == "oauth2": + if sub_type != "client_credentials": + headers[header_name] = _apply_bearer(value) + elif scheme_type == "http": + if sub_type == "bearer": + headers[header_name] = _apply_bearer(value) + else: + raise ValueError("sub type {sub_type} not supported") + else: + raise ValueError("scheme type {scheme_type} not supported") + + +def _apply_bearer(token: str) -> str: + return token.lower().startswith("bearer ") and token or f"Bearer {token}" + + +def _parse_basic_auth_scheme(headers: Dict[str, str], scheme: Any): + username = "" + password = "" + + if not isinstance(scheme, BaseModel): + raise TypeError("basic auth scheme must be a pydantic model") + + scheme_fields: Dict[str, FieldInfo] = scheme.__class__.model_fields + for name in scheme_fields: + scheme_field = scheme_fields[name] + + metadata = find_field_metadata(scheme_field, SecurityMetadata) + if metadata is None or metadata.field_name is None: + continue + + field_name = metadata.field_name + value = getattr(scheme, name) + + if field_name == "username": + username = value + if field_name == "password": + password = value + + data = f"{username}:{password}".encode() + headers["Authorization"] = f"Basic {base64.b64encode(data).decode()}" diff --git a/permissions/src/epilot_permissions/utils/serializers.py b/permissions/src/epilot_permissions/utils/serializers.py new file mode 100644 index 000000000..a98998a3f --- /dev/null +++ b/permissions/src/epilot_permissions/utils/serializers.py @@ -0,0 +1,181 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from decimal import Decimal +import json +from typing import Any, Dict, List, Union, get_args +import httpx +from typing_extensions import get_origin +from pydantic import ConfigDict, create_model +from pydantic_core import from_json +from typing_inspect import is_optional_type + +from ..types.basemodel import BaseModel, Nullable, OptionalNullable + + +def serialize_decimal(as_str: bool): + def serialize(d): + if is_optional_type(type(d)) and d is None: + return None + + if not isinstance(d, Decimal): + raise ValueError("Expected Decimal object") + + return str(d) if as_str else float(d) + + return serialize + + +def validate_decimal(d): + if d is None: + return None + + if isinstance(d, Decimal): + return d + + if not isinstance(d, (str, int, float)): + raise ValueError("Expected string, int or float") + + return Decimal(str(d)) + + +def serialize_float(as_str: bool): + def serialize(f): + if is_optional_type(type(f)) and f is None: + return None + + if not isinstance(f, float): + raise ValueError("Expected float") + + return str(f) if as_str else f + + return serialize + + +def validate_float(f): + if f is None: + return None + + if isinstance(f, float): + return f + + if not isinstance(f, str): + raise ValueError("Expected string") + + return float(f) + + +def serialize_int(as_str: bool): + def serialize(b): + if is_optional_type(type(b)) and b is None: + return None + + if not isinstance(b, int): + raise ValueError("Expected int") + + return str(b) if as_str else b + + return serialize + + +def validate_int(b): + if b is None: + return None + + if isinstance(b, int): + return b + + if not isinstance(b, str): + raise ValueError("Expected string") + + return int(b) + + +def validate_open_enum(is_int: bool): + def validate(e): + if e is None: + return None + + if is_int: + if not isinstance(e, int): + raise ValueError("Expected int") + else: + if not isinstance(e, str): + raise ValueError("Expected string") + + return e + + return validate + + +def unmarshal_json(raw, typ: Any) -> Any: + return unmarshal(from_json(raw), typ) + + +def unmarshal(val, typ: Any) -> Any: + unmarshaller = create_model( + "Unmarshaller", + body=(typ, ...), + __config__=ConfigDict(populate_by_name=True, arbitrary_types_allowed=True), + ) + + m = unmarshaller(body=val) + + # pyright: ignore[reportAttributeAccessIssue] + return m.body # type: ignore + + +def marshal_json(val, typ): + if is_nullable(typ) and val is None: + return "null" + + marshaller = create_model( + "Marshaller", + body=(typ, ...), + __config__=ConfigDict(populate_by_name=True, arbitrary_types_allowed=True), + ) + + m = marshaller(body=val) + + d = m.model_dump(by_alias=True, mode="json", exclude_none=True) + + if len(d) == 0: + return "" + + return json.dumps(d[next(iter(d))], separators=(",", ":"), sort_keys=True) + + +def is_nullable(field): + origin = get_origin(field) + if origin is Nullable or origin is OptionalNullable: + return True + + if not origin is Union or type(None) not in get_args(field): + return False + + for arg in get_args(field): + if get_origin(arg) is Nullable or get_origin(arg) is OptionalNullable: + return True + + return False + + +def stream_to_text(stream: httpx.Response) -> str: + return "".join(stream.iter_text()) + + +def get_pydantic_model(data: Any, typ: Any) -> Any: + if not _contains_pydantic_model(data): + return unmarshal(data, typ) + + return data + + +def _contains_pydantic_model(data: Any) -> bool: + if isinstance(data, BaseModel): + return True + if isinstance(data, List): + return any(_contains_pydantic_model(item) for item in data) + if isinstance(data, Dict): + return any(_contains_pydantic_model(value) for value in data.values()) + + return False diff --git a/permissions/src/epilot_permissions/utils/url.py b/permissions/src/epilot_permissions/utils/url.py new file mode 100644 index 000000000..b201bfa49 --- /dev/null +++ b/permissions/src/epilot_permissions/utils/url.py @@ -0,0 +1,150 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from decimal import Decimal +from typing import ( + Any, + Dict, + get_type_hints, + List, + Optional, + Union, + get_args, + get_origin, +) +from pydantic import BaseModel +from pydantic.fields import FieldInfo + +from .metadata import ( + PathParamMetadata, + find_field_metadata, +) +from .values import _get_serialized_params, _populate_from_globals, _val_to_string + + +def generate_url( + server_url: str, + path: str, + path_params: Any, + gbls: Optional[Any] = None, +) -> str: + path_param_values: Dict[str, str] = {} + + globals_already_populated = _populate_path_params( + path_params, gbls, path_param_values, [] + ) + if gbls is not None: + _populate_path_params(gbls, None, path_param_values, globals_already_populated) + + for key, value in path_param_values.items(): + path = path.replace("{" + key + "}", value, 1) + + return remove_suffix(server_url, "/") + path + + +def _populate_path_params( + path_params: Any, + gbls: Any, + path_param_values: Dict[str, str], + skip_fields: List[str], +) -> List[str]: + globals_already_populated: List[str] = [] + + if not isinstance(path_params, BaseModel): + return globals_already_populated + + path_param_fields: Dict[str, FieldInfo] = path_params.__class__.model_fields + path_param_field_types = get_type_hints(path_params.__class__) + for name in path_param_fields: + if name in skip_fields: + continue + + field = path_param_fields[name] + + param_metadata = find_field_metadata(field, PathParamMetadata) + if param_metadata is None: + continue + + param = getattr(path_params, name) if path_params is not None else None + param, global_found = _populate_from_globals( + name, param, PathParamMetadata, gbls + ) + if global_found: + globals_already_populated.append(name) + + if param is None: + continue + + f_name = field.alias if field.alias is not None else name + serialization = param_metadata.serialization + if serialization is not None: + serialized_params = _get_serialized_params( + param_metadata, f_name, param, path_param_field_types[name] + ) + for key, value in serialized_params.items(): + path_param_values[key] = value + else: + pp_vals: List[str] = [] + if param_metadata.style == "simple": + if isinstance(param, List): + for pp_val in param: + if pp_val is None: + continue + pp_vals.append(_val_to_string(pp_val)) + path_param_values[f_name] = ",".join(pp_vals) + elif isinstance(param, Dict): + for pp_key in param: + if param[pp_key] is None: + continue + if param_metadata.explode: + pp_vals.append(f"{pp_key}={_val_to_string(param[pp_key])}") + else: + pp_vals.append(f"{pp_key},{_val_to_string(param[pp_key])}") + path_param_values[f_name] = ",".join(pp_vals) + elif not isinstance(param, (str, int, float, complex, bool, Decimal)): + param_fields: Dict[str, FieldInfo] = param.__class__.model_fields + for name in param_fields: + param_field = param_fields[name] + + param_value_metadata = find_field_metadata( + param_field, PathParamMetadata + ) + if param_value_metadata is None: + continue + + param_name = ( + param_field.alias if param_field.alias is not None else name + ) + + param_field_val = getattr(param, name) + if param_field_val is None: + continue + if param_metadata.explode: + pp_vals.append( + f"{param_name}={_val_to_string(param_field_val)}" + ) + else: + pp_vals.append( + f"{param_name},{_val_to_string(param_field_val)}" + ) + path_param_values[f_name] = ",".join(pp_vals) + else: + path_param_values[f_name] = _val_to_string(param) + + return globals_already_populated + + +def is_optional(field): + return get_origin(field) is Union and type(None) in get_args(field) + + +def template_url(url_with_params: str, params: Dict[str, str]) -> str: + for key, value in params.items(): + url_with_params = url_with_params.replace("{" + key + "}", value) + + return url_with_params + + +def remove_suffix(input_string, suffix): + if suffix and input_string.endswith(suffix): + return input_string[: -len(suffix)] + return input_string diff --git a/permissions/src/epilot_permissions/utils/values.py b/permissions/src/epilot_permissions/utils/values.py new file mode 100644 index 000000000..24ccae3d0 --- /dev/null +++ b/permissions/src/epilot_permissions/utils/values.py @@ -0,0 +1,128 @@ +"""Code generated by Speakeasy (https://speakeasy.com). DO NOT EDIT.""" + +from datetime import datetime +from enum import Enum +from email.message import Message +import os +from typing import Any, Callable, Dict, List, Optional, Tuple, TypeVar, Union + +from httpx import Response +from pydantic import BaseModel +from pydantic.fields import FieldInfo + +from .serializers import marshal_json + +from .metadata import ParamMetadata, find_field_metadata + + +def match_content_type(content_type: str, pattern: str) -> bool: + if pattern in (content_type, "*", "*/*"): + return True + + msg = Message() + msg["content-type"] = content_type + media_type = msg.get_content_type() + + if media_type == pattern: + return True + + parts = media_type.split("/") + if len(parts) == 2: + if pattern in (f"{parts[0]}/*", f"*/{parts[1]}"): + return True + + return False + + +def match_status_codes(status_codes: List[str], status_code: int) -> bool: + if "default" in status_codes: + return True + + for code in status_codes: + if code == str(status_code): + return True + + if code.endswith("XX") and code.startswith(str(status_code)[:1]): + return True + return False + + +T = TypeVar("T") + + +def get_global_from_env( + value: Optional[T], env_key: str, type_cast: Callable[[str], T] +) -> Optional[T]: + if value is not None: + return value + env_value = os.getenv(env_key) + if env_value is not None: + try: + return type_cast(env_value) + except ValueError: + pass + return None + + +def match_response( + response: Response, code: Union[str, List[str]], content_type: str +) -> bool: + codes = code if isinstance(code, list) else [code] + return match_status_codes(codes, response.status_code) and match_content_type( + response.headers.get("content-type", "application/octet-stream"), content_type + ) + + +def _populate_from_globals( + param_name: str, value: Any, param_metadata_type: type, gbls: Any +) -> Tuple[Any, bool]: + if gbls is None: + return value, False + + if not isinstance(gbls, BaseModel): + raise TypeError("globals must be a pydantic model") + + global_fields: Dict[str, FieldInfo] = gbls.__class__.model_fields + found = False + for name in global_fields: + field = global_fields[name] + if name is not param_name: + continue + + found = True + + if value is not None: + return value, True + + global_value = getattr(gbls, name) + + param_metadata = find_field_metadata(field, param_metadata_type) + if param_metadata is None: + return value, True + + return global_value, True + + return value, found + + +def _val_to_string(val) -> str: + if isinstance(val, bool): + return str(val).lower() + if isinstance(val, datetime): + return str(val.isoformat().replace("+00:00", "Z")) + if isinstance(val, Enum): + return str(val.value) + + return str(val) + + +def _get_serialized_params( + metadata: ParamMetadata, field_name: str, obj: Any, typ: type +) -> Dict[str, str]: + params: Dict[str, str] = {} + + serialization = metadata.serialization + if serialization == "json": + params[field_name] = marshal_json(obj, typ) + + return params