@flyteorg/flyteidl2 2.0.0-alpha10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (40) hide show
  1. package/flyteidl2/common/authorization_pb.ts +323 -0
  2. package/flyteidl2/common/identifier_pb.ts +423 -0
  3. package/flyteidl2/common/identity_pb.ts +205 -0
  4. package/flyteidl2/common/list_pb.ts +232 -0
  5. package/flyteidl2/common/policy_pb.ts +76 -0
  6. package/flyteidl2/common/role_pb.ts +161 -0
  7. package/flyteidl2/common/runtime_version_pb.ts +76 -0
  8. package/flyteidl2/core/artifact_id_pb.ts +400 -0
  9. package/flyteidl2/core/catalog_pb.ts +215 -0
  10. package/flyteidl2/core/execution_pb.ts +641 -0
  11. package/flyteidl2/core/identifier_pb.ts +237 -0
  12. package/flyteidl2/core/interface_pb.ts +187 -0
  13. package/flyteidl2/core/literals_pb.ts +673 -0
  14. package/flyteidl2/core/security_pb.ts +310 -0
  15. package/flyteidl2/core/tasks_pb.ts +1088 -0
  16. package/flyteidl2/core/types_pb.ts +592 -0
  17. package/flyteidl2/imagebuilder/definition_pb.ts +535 -0
  18. package/flyteidl2/imagebuilder/payload_pb.ts +62 -0
  19. package/flyteidl2/imagebuilder/service_pb.ts +30 -0
  20. package/flyteidl2/logs/dataplane/payload_pb.ts +396 -0
  21. package/flyteidl2/plugins/dask_pb.ts +109 -0
  22. package/flyteidl2/plugins/ray_pb.ts +189 -0
  23. package/flyteidl2/plugins/spark_pb.ts +145 -0
  24. package/flyteidl2/secret/definition_pb.ts +310 -0
  25. package/flyteidl2/secret/payload_pb.ts +266 -0
  26. package/flyteidl2/secret/secret_pb.ts +63 -0
  27. package/flyteidl2/task/common_pb.ts +319 -0
  28. package/flyteidl2/task/environment_pb.ts +36 -0
  29. package/flyteidl2/task/run_pb.ts +177 -0
  30. package/flyteidl2/task/task_definition_pb.ts +417 -0
  31. package/flyteidl2/task/task_service_pb.ts +248 -0
  32. package/flyteidl2/trigger/trigger_definition_pb.ts +283 -0
  33. package/flyteidl2/trigger/trigger_service_pb.ts +451 -0
  34. package/flyteidl2/workflow/queue_service_pb.ts +245 -0
  35. package/flyteidl2/workflow/run_definition_pb.ts +1192 -0
  36. package/flyteidl2/workflow/run_logs_service_pb.ts +106 -0
  37. package/flyteidl2/workflow/run_service_pb.ts +870 -0
  38. package/flyteidl2/workflow/state_service_pb.ts +310 -0
  39. package/flyteidl2/workflow/translator_service_pb.ts +174 -0
  40. package/package.json +18 -0
@@ -0,0 +1,310 @@
1
+ // @generated by protoc-gen-es v2.2.5 with parameter "target=ts,import_extension=.ts"
2
+ // @generated from file flyteidl2/core/security.proto (package flyteidl2.core, syntax proto3)
3
+ /* eslint-disable */
4
+
5
+ import type { GenEnum, GenFile, GenMessage } from "@bufbuild/protobuf/codegenv1";
6
+ import { enumDesc, fileDesc, messageDesc } from "@bufbuild/protobuf/codegenv1";
7
+ import type { Message } from "@bufbuild/protobuf";
8
+
9
+ /**
10
+ * Describes the file flyteidl2/core/security.proto.
11
+ */
12
+ export const file_flyteidl2_core_security: GenFile = /*@__PURE__*/
13
+ fileDesc("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");
14
+
15
+ /**
16
+ * Secret encapsulates information about the secret a task needs to proceed. An environment variable
17
+ * FLYTE_SECRETS_ENV_PREFIX will be passed to indicate the prefix of the environment variables that will be present if
18
+ * secrets are passed through environment variables.
19
+ * FLYTE_SECRETS_DEFAULT_DIR will be passed to indicate the prefix of the path where secrets will be mounted if secrets
20
+ * are passed through file mounts.
21
+ *
22
+ * @generated from message flyteidl2.core.Secret
23
+ */
24
+ export type Secret = Message<"flyteidl2.core.Secret"> & {
25
+ /**
26
+ * The name of the secret group where to find the key referenced below. For K8s secrets, this should be the name of
27
+ * the v1/secret object. For Confidant, this should be the Credential name. For Vault, this should be the secret name.
28
+ * For AWS Secret Manager, this should be the name of the secret.
29
+ * +required
30
+ *
31
+ * @generated from field: string group = 1;
32
+ */
33
+ group: string;
34
+
35
+ /**
36
+ * The group version to fetch. This is not supported in all secret management systems. It'll be ignored for the ones
37
+ * that do not support it.
38
+ * +optional
39
+ *
40
+ * @generated from field: string group_version = 2;
41
+ */
42
+ groupVersion: string;
43
+
44
+ /**
45
+ * The name of the secret to mount. This has to match an existing secret in the system. It's up to the implementation
46
+ * of the secret management system to require case sensitivity. For K8s secrets, Confidant and Vault, this should
47
+ * match one of the keys inside the secret. For AWS Secret Manager, it's ignored.
48
+ * +optional
49
+ *
50
+ * @generated from field: string key = 3;
51
+ */
52
+ key: string;
53
+
54
+ /**
55
+ * mount_requirement is optional. Indicates where the secret has to be mounted. If provided, the execution will fail
56
+ * if the underlying key management system cannot satisfy that requirement. If not provided, the default location
57
+ * will depend on the key management system.
58
+ * +optional
59
+ *
60
+ * @generated from field: flyteidl2.core.Secret.MountType mount_requirement = 4;
61
+ */
62
+ mountRequirement: Secret_MountType;
63
+
64
+ /**
65
+ * env_var is optional. Custom environment variable to set the value of the secret. If mount_requirement is ENV_VAR,
66
+ * then the value is the secret itself. If mount_requirement is FILE, then the value is the path to the secret file.
67
+ * +optional
68
+ *
69
+ * @generated from field: string env_var = 5;
70
+ */
71
+ envVar: string;
72
+ };
73
+
74
+ /**
75
+ * Describes the message flyteidl2.core.Secret.
76
+ * Use `create(SecretSchema)` to create a new message.
77
+ */
78
+ export const SecretSchema: GenMessage<Secret> = /*@__PURE__*/
79
+ messageDesc(file_flyteidl2_core_security, 0);
80
+
81
+ /**
82
+ * @generated from enum flyteidl2.core.Secret.MountType
83
+ */
84
+ export enum Secret_MountType {
85
+ /**
86
+ * Default case, indicates the client can tolerate either mounting options.
87
+ *
88
+ * @generated from enum value: ANY = 0;
89
+ */
90
+ ANY = 0,
91
+
92
+ /**
93
+ * ENV_VAR indicates the secret needs to be mounted as an environment variable.
94
+ *
95
+ * @generated from enum value: ENV_VAR = 1;
96
+ */
97
+ ENV_VAR = 1,
98
+
99
+ /**
100
+ * FILE indicates the secret needs to be mounted as a file.
101
+ *
102
+ * @generated from enum value: FILE = 2;
103
+ */
104
+ FILE = 2,
105
+ }
106
+
107
+ /**
108
+ * Describes the enum flyteidl2.core.Secret.MountType.
109
+ */
110
+ export const Secret_MountTypeSchema: GenEnum<Secret_MountType> = /*@__PURE__*/
111
+ enumDesc(file_flyteidl2_core_security, 0, 0);
112
+
113
+ /**
114
+ * OAuth2Client encapsulates OAuth2 Client Credentials to be used when making calls on behalf of that task.
115
+ *
116
+ * @generated from message flyteidl2.core.OAuth2Client
117
+ */
118
+ export type OAuth2Client = Message<"flyteidl2.core.OAuth2Client"> & {
119
+ /**
120
+ * client_id is the public id for the client to use. The system will not perform any pre-auth validation that the
121
+ * secret requested matches the client_id indicated here.
122
+ * +required
123
+ *
124
+ * @generated from field: string client_id = 1;
125
+ */
126
+ clientId: string;
127
+
128
+ /**
129
+ * client_secret is a reference to the secret used to authenticate the OAuth2 client.
130
+ * +required
131
+ *
132
+ * @generated from field: flyteidl2.core.Secret client_secret = 2;
133
+ */
134
+ clientSecret?: Secret;
135
+ };
136
+
137
+ /**
138
+ * Describes the message flyteidl2.core.OAuth2Client.
139
+ * Use `create(OAuth2ClientSchema)` to create a new message.
140
+ */
141
+ export const OAuth2ClientSchema: GenMessage<OAuth2Client> = /*@__PURE__*/
142
+ messageDesc(file_flyteidl2_core_security, 1);
143
+
144
+ /**
145
+ * Identity encapsulates the various security identities a task can run as. It's up to the underlying plugin to pick the
146
+ * right identity for the execution environment.
147
+ *
148
+ * @generated from message flyteidl2.core.Identity
149
+ */
150
+ export type Identity = Message<"flyteidl2.core.Identity"> & {
151
+ /**
152
+ * iam_role references the fully qualified name of Identity & Access Management role to impersonate.
153
+ *
154
+ * @generated from field: string iam_role = 1;
155
+ */
156
+ iamRole: string;
157
+
158
+ /**
159
+ * k8s_service_account references a kubernetes service account to impersonate.
160
+ *
161
+ * @generated from field: string k8s_service_account = 2;
162
+ */
163
+ k8sServiceAccount: string;
164
+
165
+ /**
166
+ * oauth2_client references an oauth2 client. Backend plugins can use this information to impersonate the client when
167
+ * making external calls.
168
+ *
169
+ * @generated from field: flyteidl2.core.OAuth2Client oauth2_client = 3;
170
+ */
171
+ oauth2Client?: OAuth2Client;
172
+
173
+ /**
174
+ * execution_identity references the subject who makes the execution
175
+ *
176
+ * @generated from field: string execution_identity = 4;
177
+ */
178
+ executionIdentity: string;
179
+ };
180
+
181
+ /**
182
+ * Describes the message flyteidl2.core.Identity.
183
+ * Use `create(IdentitySchema)` to create a new message.
184
+ */
185
+ export const IdentitySchema: GenMessage<Identity> = /*@__PURE__*/
186
+ messageDesc(file_flyteidl2_core_security, 2);
187
+
188
+ /**
189
+ * OAuth2TokenRequest encapsulates information needed to request an OAuth2 token.
190
+ * FLYTE_TOKENS_ENV_PREFIX will be passed to indicate the prefix of the environment variables that will be present if
191
+ * tokens are passed through environment variables.
192
+ * FLYTE_TOKENS_PATH_PREFIX will be passed to indicate the prefix of the path where secrets will be mounted if tokens
193
+ * are passed through file mounts.
194
+ *
195
+ * @generated from message flyteidl2.core.OAuth2TokenRequest
196
+ */
197
+ export type OAuth2TokenRequest = Message<"flyteidl2.core.OAuth2TokenRequest"> & {
198
+ /**
199
+ * name indicates a unique id for the token request within this task token requests. It'll be used as a suffix for
200
+ * environment variables and as a filename for mounting tokens as files.
201
+ * +required
202
+ *
203
+ * @generated from field: string name = 1;
204
+ */
205
+ name: string;
206
+
207
+ /**
208
+ * type indicates the type of the request to make. Defaults to CLIENT_CREDENTIALS.
209
+ * +required
210
+ *
211
+ * @generated from field: flyteidl2.core.OAuth2TokenRequest.Type type = 2;
212
+ */
213
+ type: OAuth2TokenRequest_Type;
214
+
215
+ /**
216
+ * client references the client_id/secret to use to request the OAuth2 token.
217
+ * +required
218
+ *
219
+ * @generated from field: flyteidl2.core.OAuth2Client client = 3;
220
+ */
221
+ client?: OAuth2Client;
222
+
223
+ /**
224
+ * idp_discovery_endpoint references the discovery endpoint used to retrieve token endpoint and other related
225
+ * information.
226
+ * +optional
227
+ *
228
+ * @generated from field: string idp_discovery_endpoint = 4;
229
+ */
230
+ idpDiscoveryEndpoint: string;
231
+
232
+ /**
233
+ * token_endpoint references the token issuance endpoint. If idp_discovery_endpoint is not provided, this parameter is
234
+ * mandatory.
235
+ * +optional
236
+ *
237
+ * @generated from field: string token_endpoint = 5;
238
+ */
239
+ tokenEndpoint: string;
240
+ };
241
+
242
+ /**
243
+ * Describes the message flyteidl2.core.OAuth2TokenRequest.
244
+ * Use `create(OAuth2TokenRequestSchema)` to create a new message.
245
+ */
246
+ export const OAuth2TokenRequestSchema: GenMessage<OAuth2TokenRequest> = /*@__PURE__*/
247
+ messageDesc(file_flyteidl2_core_security, 3);
248
+
249
+ /**
250
+ * Type of the token requested.
251
+ *
252
+ * @generated from enum flyteidl2.core.OAuth2TokenRequest.Type
253
+ */
254
+ export enum OAuth2TokenRequest_Type {
255
+ /**
256
+ * CLIENT_CREDENTIALS indicates a 2-legged OAuth token requested using client credentials.
257
+ *
258
+ * @generated from enum value: CLIENT_CREDENTIALS = 0;
259
+ */
260
+ CLIENT_CREDENTIALS = 0,
261
+ }
262
+
263
+ /**
264
+ * Describes the enum flyteidl2.core.OAuth2TokenRequest.Type.
265
+ */
266
+ export const OAuth2TokenRequest_TypeSchema: GenEnum<OAuth2TokenRequest_Type> = /*@__PURE__*/
267
+ enumDesc(file_flyteidl2_core_security, 3, 0);
268
+
269
+ /**
270
+ * SecurityContext holds security attributes that apply to tasks.
271
+ *
272
+ * @generated from message flyteidl2.core.SecurityContext
273
+ */
274
+ export type SecurityContext = Message<"flyteidl2.core.SecurityContext"> & {
275
+ /**
276
+ * run_as encapsulates the identity a pod should run as. If the task fills in multiple fields here, it'll be up to the
277
+ * backend plugin to choose the appropriate identity for the execution engine the task will run on.
278
+ *
279
+ * @generated from field: flyteidl2.core.Identity run_as = 1;
280
+ */
281
+ runAs?: Identity;
282
+
283
+ /**
284
+ * secrets indicate the list of secrets the task needs in order to proceed. Secrets will be mounted/passed to the
285
+ * pod as it starts. If the plugin responsible for kicking of the task will not run it on a flyte cluster (e.g. AWS
286
+ * Batch), it's the responsibility of the plugin to fetch the secret (which means propeller identity will need access
287
+ * to the secret) and to pass it to the remote execution engine.
288
+ *
289
+ * @generated from field: repeated flyteidl2.core.Secret secrets = 2;
290
+ */
291
+ secrets: Secret[];
292
+
293
+ /**
294
+ * tokens indicate the list of token requests the task needs in order to proceed. Tokens will be mounted/passed to the
295
+ * pod as it starts. If the plugin responsible for kicking of the task will not run it on a flyte cluster (e.g. AWS
296
+ * Batch), it's the responsibility of the plugin to fetch the secret (which means propeller identity will need access
297
+ * to the secret) and to pass it to the remote execution engine.
298
+ *
299
+ * @generated from field: repeated flyteidl2.core.OAuth2TokenRequest tokens = 3;
300
+ */
301
+ tokens: OAuth2TokenRequest[];
302
+ };
303
+
304
+ /**
305
+ * Describes the message flyteidl2.core.SecurityContext.
306
+ * Use `create(SecurityContextSchema)` to create a new message.
307
+ */
308
+ export const SecurityContextSchema: GenMessage<SecurityContext> = /*@__PURE__*/
309
+ messageDesc(file_flyteidl2_core_security, 4);
310
+