@planqk/planqk-api-sdk 1.1.0 → 1.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (78) hide show
  1. package/dist/Client.d.ts +9 -3
  2. package/dist/Client.js +7 -2
  3. package/dist/api/index.d.ts +1 -1
  4. package/dist/api/index.js +1 -1
  5. package/dist/api/resources/authentication/client/Client.d.ts +55 -0
  6. package/dist/api/resources/authentication/client/Client.js +126 -0
  7. package/dist/api/resources/authentication/client/index.d.ts +1 -0
  8. package/dist/api/resources/authentication/client/index.js +2 -0
  9. package/dist/api/resources/authentication/index.d.ts +2 -0
  10. package/dist/api/resources/authentication/index.js +18 -0
  11. package/dist/api/resources/authentication/types/AuthorizeResponse.d.ts +5 -0
  12. package/dist/api/resources/authentication/types/AuthorizeResponse.js +5 -0
  13. package/dist/api/resources/authentication/types/index.d.ts +1 -0
  14. package/dist/api/resources/authentication/types/index.js +17 -0
  15. package/dist/api/resources/dataPools/client/Client.d.ts +10 -3
  16. package/dist/api/resources/dataPools/client/Client.js +37 -9
  17. package/dist/api/resources/index.d.ts +2 -0
  18. package/dist/api/resources/index.js +3 -1
  19. package/dist/api/types/AccessToken.d.ts +10 -0
  20. package/dist/api/types/AccessToken.js +5 -0
  21. package/dist/api/types/OrganizationMembership.d.ts +22 -0
  22. package/dist/api/types/OrganizationMembership.js +19 -0
  23. package/dist/api/types/PersonalAccessTokenPrincipal.d.ts +18 -0
  24. package/dist/api/types/PersonalAccessTokenPrincipal.js +14 -0
  25. package/dist/api/types/ServiceExecution.d.ts +20 -0
  26. package/dist/api/types/ServiceExecution.js +16 -0
  27. package/dist/api/types/ServiceExecutionTokenPrincipal.d.ts +8 -0
  28. package/dist/api/types/ServiceExecutionTokenPrincipal.js +5 -0
  29. package/dist/api/types/UserContext.d.ts +24 -0
  30. package/dist/api/types/UserContext.js +19 -0
  31. package/dist/api/types/index.d.ts +6 -0
  32. package/dist/api/types/index.js +6 -0
  33. package/fern/fern.config.json +1 -1
  34. package/fern/openapi/openapi.json +321 -15
  35. package/package.json +1 -1
  36. package/planqk/api/_version.py +1 -1
  37. package/planqk/api/client.py +1 -5
  38. package/planqk/api/sdk/__init__.py +34 -2
  39. package/planqk/api/sdk/authentication/__init__.py +7 -0
  40. package/planqk/api/sdk/authentication/client.py +102 -0
  41. package/planqk/api/sdk/authentication/raw_client.py +183 -0
  42. package/planqk/api/sdk/authentication/types/__init__.py +7 -0
  43. package/planqk/api/sdk/authentication/types/authorize_response.py +8 -0
  44. package/planqk/api/sdk/client.py +11 -0
  45. package/planqk/api/sdk/core/client_wrapper.py +12 -2
  46. package/planqk/api/sdk/data_pools/client.py +16 -0
  47. package/planqk/api/sdk/environment.py +1 -1
  48. package/planqk/api/sdk/types/__init__.py +30 -1
  49. package/planqk/api/sdk/types/access_token.py +26 -0
  50. package/planqk/api/sdk/types/organization_membership.py +27 -0
  51. package/planqk/api/sdk/types/organization_membership_account_type.py +5 -0
  52. package/planqk/api/sdk/types/organization_membership_role.py +5 -0
  53. package/planqk/api/sdk/types/personal_access_token_principal.py +31 -0
  54. package/planqk/api/sdk/types/personal_access_token_principal_account_type.py +5 -0
  55. package/planqk/api/sdk/types/service_execution.py +27 -0
  56. package/planqk/api/sdk/types/service_execution_status.py +7 -0
  57. package/planqk/api/sdk/types/service_execution_token_principal.py +34 -0
  58. package/planqk/api/sdk/types/user_context.py +35 -0
  59. package/planqk/api/sdk/types/user_context_account_type.py +5 -0
  60. package/planqk/api/sdk/types/user_context_context_type.py +5 -0
  61. package/pyproject.toml +1 -1
  62. package/src/Client.ts +13 -4
  63. package/src/api/index.ts +1 -1
  64. package/src/api/resources/authentication/client/Client.ts +134 -0
  65. package/src/api/resources/authentication/client/index.ts +1 -0
  66. package/src/api/resources/authentication/index.ts +2 -0
  67. package/src/api/resources/authentication/types/AuthorizeResponse.ts +7 -0
  68. package/src/api/resources/authentication/types/index.ts +1 -0
  69. package/src/api/resources/dataPools/client/Client.ts +42 -10
  70. package/src/api/resources/index.ts +2 -0
  71. package/src/api/types/AccessToken.ts +11 -0
  72. package/src/api/types/OrganizationMembership.ts +24 -0
  73. package/src/api/types/PersonalAccessTokenPrincipal.ts +21 -0
  74. package/src/api/types/ServiceExecution.ts +22 -0
  75. package/src/api/types/ServiceExecutionTokenPrincipal.ts +10 -0
  76. package/src/api/types/UserContext.ts +27 -0
  77. package/src/api/types/index.ts +6 -0
  78. package/uv.lock +27 -269
@@ -0,0 +1,5 @@
1
+ "use strict";
2
+ /**
3
+ * This file was auto-generated by Fern from our API Definition.
4
+ */
5
+ Object.defineProperty(exports, "__esModule", { value: true });
@@ -0,0 +1,24 @@
1
+ /**
2
+ * This file was auto-generated by Fern from our API Definition.
3
+ */
4
+ import * as PlanqkApi from "../index.js";
5
+ export interface UserContext {
6
+ id?: string;
7
+ contextType?: UserContext.ContextType;
8
+ accountType?: UserContext.AccountType;
9
+ parent?: PlanqkApi.UserContext;
10
+ }
11
+ export declare namespace UserContext {
12
+ type ContextType = "USER" | "ORGANIZATION" | "SERVICE_EXECUTION";
13
+ const ContextType: {
14
+ readonly User: "USER";
15
+ readonly Organization: "ORGANIZATION";
16
+ readonly ServiceExecution: "SERVICE_EXECUTION";
17
+ };
18
+ type AccountType = "BASIC" | "PRO" | "BUSINESS";
19
+ const AccountType: {
20
+ readonly Basic: "BASIC";
21
+ readonly Pro: "PRO";
22
+ readonly Business: "BUSINESS";
23
+ };
24
+ }
@@ -0,0 +1,19 @@
1
+ "use strict";
2
+ /**
3
+ * This file was auto-generated by Fern from our API Definition.
4
+ */
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ exports.UserContext = void 0;
7
+ var UserContext;
8
+ (function (UserContext) {
9
+ UserContext.ContextType = {
10
+ User: "USER",
11
+ Organization: "ORGANIZATION",
12
+ ServiceExecution: "SERVICE_EXECUTION",
13
+ };
14
+ UserContext.AccountType = {
15
+ Basic: "BASIC",
16
+ Pro: "PRO",
17
+ Business: "BUSINESS",
18
+ };
19
+ })(UserContext || (exports.UserContext = UserContext = {}));
@@ -1,3 +1,9 @@
1
1
  export * from "./OauthScope.js";
2
2
  export * from "./DataPoolDto.js";
3
3
  export * from "./DataPoolFileDto.js";
4
+ export * from "./AccessToken.js";
5
+ export * from "./OrganizationMembership.js";
6
+ export * from "./PersonalAccessTokenPrincipal.js";
7
+ export * from "./ServiceExecution.js";
8
+ export * from "./ServiceExecutionTokenPrincipal.js";
9
+ export * from "./UserContext.js";
@@ -17,3 +17,9 @@ Object.defineProperty(exports, "__esModule", { value: true });
17
17
  __exportStar(require("./OauthScope.js"), exports);
18
18
  __exportStar(require("./DataPoolDto.js"), exports);
19
19
  __exportStar(require("./DataPoolFileDto.js"), exports);
20
+ __exportStar(require("./AccessToken.js"), exports);
21
+ __exportStar(require("./OrganizationMembership.js"), exports);
22
+ __exportStar(require("./PersonalAccessTokenPrincipal.js"), exports);
23
+ __exportStar(require("./ServiceExecution.js"), exports);
24
+ __exportStar(require("./ServiceExecutionTokenPrincipal.js"), exports);
25
+ __exportStar(require("./UserContext.js"), exports);
@@ -1,4 +1,4 @@
1
1
  {
2
2
  "organization": "planqk",
3
- "version": "0.65.7"
3
+ "version": "0.65.25"
4
4
  }
@@ -12,14 +12,26 @@
12
12
  },
13
13
  "servers": [
14
14
  {
15
- "url": "https://34.90.225.20.nip.io/qc-catalog",
15
+ "url": "https://platform.planqk.de/qc-catalog",
16
16
  "description": "Generated server url"
17
17
  }
18
18
  ],
19
+ "tags": [
20
+ {
21
+ "name": "Authentication",
22
+ "description": "Endpoints for checking authentication and authorization."
23
+ },
24
+ {
25
+ "name": "Data Pools",
26
+ "description": "Manage data pools, which are organized collections of files that serve as reusable data sources for services."
27
+ }
28
+ ],
19
29
  "paths": {
20
30
  "/datapools/{id}": {
21
31
  "get": {
22
- "tags": ["Data Pools"],
32
+ "tags": [
33
+ "Data Pools"
34
+ ],
23
35
  "description": "Get a specific data pool (identified by its ID).",
24
36
  "operationId": "getDataPool",
25
37
  "parameters": [
@@ -31,6 +43,14 @@
31
43
  "type": "string",
32
44
  "format": "uuid"
33
45
  }
46
+ },
47
+ {
48
+ "name": "X-OrganizationId",
49
+ "in": "header",
50
+ "description": "The ID of your organization in case you want to perform operations in this context. Leave it empty to operate in your personal account.",
51
+ "schema": {
52
+ "type": "string"
53
+ }
34
54
  }
35
55
  ],
36
56
  "responses": {
@@ -67,7 +87,9 @@
67
87
  ]
68
88
  },
69
89
  "put": {
70
- "tags": ["Data Pools"],
90
+ "tags": [
91
+ "Data Pools"
92
+ ],
71
93
  "description": "Update an existing data pool (identified by its ID).",
72
94
  "operationId": "updateDataPool",
73
95
  "parameters": [
@@ -79,6 +101,14 @@
79
101
  "type": "string",
80
102
  "format": "uuid"
81
103
  }
104
+ },
105
+ {
106
+ "name": "X-OrganizationId",
107
+ "in": "header",
108
+ "description": "The ID of your organization in case you want to perform operations in this context. Leave it empty to operate in your personal account.",
109
+ "schema": {
110
+ "type": "string"
111
+ }
82
112
  }
83
113
  ],
84
114
  "requestBody": {
@@ -128,7 +158,9 @@
128
158
  ]
129
159
  },
130
160
  "delete": {
131
- "tags": ["Data Pools"],
161
+ "tags": [
162
+ "Data Pools"
163
+ ],
132
164
  "description": "Delete a specific data pool (identified by its ID).",
133
165
  "operationId": "deleteDataPool",
134
166
  "parameters": [
@@ -140,6 +172,14 @@
140
172
  "type": "string",
141
173
  "format": "uuid"
142
174
  }
175
+ },
176
+ {
177
+ "name": "X-OrganizationId",
178
+ "in": "header",
179
+ "description": "The ID of your organization in case you want to perform operations in this context. Leave it empty to operate in your personal account.",
180
+ "schema": {
181
+ "type": "string"
182
+ }
143
183
  }
144
184
  ],
145
185
  "responses": {
@@ -171,9 +211,21 @@
171
211
  },
172
212
  "/datapools": {
173
213
  "get": {
174
- "tags": ["Data Pools"],
214
+ "tags": [
215
+ "Data Pools"
216
+ ],
175
217
  "description": "Get a list of all data pools for the current user.",
176
218
  "operationId": "getDataPools",
219
+ "parameters": [
220
+ {
221
+ "name": "X-OrganizationId",
222
+ "in": "header",
223
+ "description": "The ID of your organization in case you want to perform operations in this context. Leave it empty to operate in your personal account.",
224
+ "schema": {
225
+ "type": "string"
226
+ }
227
+ }
228
+ ],
177
229
  "responses": {
178
230
  "200": {
179
231
  "description": "List of data pools",
@@ -211,9 +263,21 @@
211
263
  ]
212
264
  },
213
265
  "post": {
214
- "tags": ["Data Pools"],
266
+ "tags": [
267
+ "Data Pools"
268
+ ],
215
269
  "description": "Create a new data pool.",
216
270
  "operationId": "createDataPool",
271
+ "parameters": [
272
+ {
273
+ "name": "X-OrganizationId",
274
+ "in": "header",
275
+ "description": "The ID of your organization in case you want to perform operations in this context. Leave it empty to operate in your personal account.",
276
+ "schema": {
277
+ "type": "string"
278
+ }
279
+ }
280
+ ],
217
281
  "requestBody": {
218
282
  "content": {
219
283
  "application/json": {
@@ -263,7 +327,9 @@
263
327
  },
264
328
  "/datapools/{id}/files": {
265
329
  "get": {
266
- "tags": ["Data Pools"],
330
+ "tags": [
331
+ "Data Pools"
332
+ ],
267
333
  "description": "Get all files associated with a specific data pool (identified by its ID).",
268
334
  "operationId": "getDataPoolFiles",
269
335
  "parameters": [
@@ -275,6 +341,14 @@
275
341
  "type": "string",
276
342
  "format": "uuid"
277
343
  }
344
+ },
345
+ {
346
+ "name": "X-OrganizationId",
347
+ "in": "header",
348
+ "description": "The ID of your organization in case you want to perform operations in this context. Leave it empty to operate in your personal account.",
349
+ "schema": {
350
+ "type": "string"
351
+ }
278
352
  }
279
353
  ],
280
354
  "responses": {
@@ -314,7 +388,9 @@
314
388
  ]
315
389
  },
316
390
  "post": {
317
- "tags": ["Data Pools"],
391
+ "tags": [
392
+ "Data Pools"
393
+ ],
318
394
  "description": "Add a new file to a specific data pool (identified by its ID).",
319
395
  "operationId": "addDataPoolFile",
320
396
  "parameters": [
@@ -334,6 +410,14 @@
334
410
  "schema": {
335
411
  "type": "string"
336
412
  }
413
+ },
414
+ {
415
+ "name": "X-OrganizationId",
416
+ "in": "header",
417
+ "description": "The ID of your organization in case you want to perform operations in this context. Leave it empty to operate in your personal account.",
418
+ "schema": {
419
+ "type": "string"
420
+ }
337
421
  }
338
422
  ],
339
423
  "requestBody": {
@@ -347,7 +431,9 @@
347
431
  "format": "binary"
348
432
  }
349
433
  },
350
- "required": ["file"]
434
+ "required": [
435
+ "file"
436
+ ]
351
437
  }
352
438
  }
353
439
  }
@@ -389,9 +475,62 @@
389
475
  ]
390
476
  }
391
477
  },
478
+ "/authorize": {
479
+ "post": {
480
+ "tags": [
481
+ "Authentication"
482
+ ],
483
+ "description": "Get the authenticated principal based on the provided token.",
484
+ "operationId": "authorize",
485
+ "parameters": [
486
+ {
487
+ "name": "X-Auth-Token",
488
+ "in": "header",
489
+ "required": false,
490
+ "schema": {
491
+ "type": "string"
492
+ }
493
+ }
494
+ ],
495
+ "responses": {
496
+ "200": {
497
+ "description": "The scopes of the provided token.",
498
+ "content": {
499
+ "application/json": {
500
+ "schema": {
501
+ "type": "object",
502
+ "oneOf": [
503
+ {
504
+ "$ref": "#/components/schemas/PersonalAccessTokenPrincipal"
505
+ },
506
+ {
507
+ "$ref": "#/components/schemas/ServiceExecutionTokenPrincipal"
508
+ }
509
+ ]
510
+ }
511
+ }
512
+ }
513
+ },
514
+ "401": {
515
+ "description": "Unauthorized"
516
+ },
517
+ "403": {
518
+ "description": "Forbidden"
519
+ },
520
+ "404": {
521
+ "description": "Not Found"
522
+ },
523
+ "500": {
524
+ "description": "Internal Server Error"
525
+ }
526
+ }
527
+ }
528
+ },
392
529
  "/datapools/{id}/files/{fileId}": {
393
530
  "get": {
394
- "tags": ["Data Pools"],
531
+ "tags": [
532
+ "Data Pools"
533
+ ],
395
534
  "description": "Get the content of a specific file from a data pool (both file and data pool identified by their ID).",
396
535
  "operationId": "getDataPoolFile",
397
536
  "parameters": [
@@ -412,6 +551,14 @@
412
551
  "type": "string",
413
552
  "format": "uuid"
414
553
  }
554
+ },
555
+ {
556
+ "name": "X-OrganizationId",
557
+ "in": "header",
558
+ "description": "The ID of your organization in case you want to perform operations in this context. Leave it empty to operate in your personal account.",
559
+ "schema": {
560
+ "type": "string"
561
+ }
415
562
  }
416
563
  ],
417
564
  "responses": {
@@ -452,7 +599,9 @@
452
599
  ]
453
600
  },
454
601
  "delete": {
455
- "tags": ["Data Pools"],
602
+ "tags": [
603
+ "Data Pools"
604
+ ],
456
605
  "description": "Delete a specific file from a data pool (both file and data pool identified by their IDs).",
457
606
  "operationId": "deleteDataPoolFile",
458
607
  "parameters": [
@@ -473,6 +622,14 @@
473
622
  "type": "string",
474
623
  "format": "uuid"
475
624
  }
625
+ },
626
+ {
627
+ "name": "X-OrganizationId",
628
+ "in": "header",
629
+ "description": "The ID of your organization in case you want to perform operations in this context. Leave it empty to operate in your personal account.",
630
+ "schema": {
631
+ "type": "string"
632
+ }
476
633
  }
477
634
  ],
478
635
  "responses": {
@@ -525,7 +682,11 @@
525
682
  "currentUserPermission": {
526
683
  "type": "string",
527
684
  "description": "The access permission role for this entity of the current user",
528
- "enum": ["VIEWER", "MAINTAINER", "OWNER"],
685
+ "enum": [
686
+ "VIEWER",
687
+ "MAINTAINER",
688
+ "OWNER"
689
+ ],
529
690
  "example": "OWNER",
530
691
  "readOnly": true
531
692
  },
@@ -585,6 +746,151 @@
585
746
  "pattern": "^\\d{4}\\-\\d{2}\\-\\d{2}\\s{1}\\d{2}\\:\\d{2}\\:\\d{2}$"
586
747
  }
587
748
  }
749
+ },
750
+ "AccessToken": {
751
+ "type": "object",
752
+ "properties": {
753
+ "id": {
754
+ "type": "string",
755
+ "format": "uuid"
756
+ },
757
+ "name": {
758
+ "type": "string"
759
+ },
760
+ "createdAt": {
761
+ "type": "string",
762
+ "format": "date-time"
763
+ },
764
+ "usedAt": {
765
+ "type": "string",
766
+ "format": "date-time"
767
+ },
768
+ "expiresAt": {
769
+ "type": "string",
770
+ "format": "date"
771
+ }
772
+ }
773
+ },
774
+ "OrganizationMembership": {
775
+ "type": "object",
776
+ "properties": {
777
+ "id": {
778
+ "type": "string",
779
+ "format": "uuid"
780
+ },
781
+ "accountType": {
782
+ "type": "string",
783
+ "enum": [
784
+ "BASIC",
785
+ "PRO",
786
+ "BUSINESS"
787
+ ]
788
+ },
789
+ "role": {
790
+ "type": "string",
791
+ "enum": [
792
+ "VIEWER",
793
+ "MAINTAINER",
794
+ "OWNER"
795
+ ]
796
+ }
797
+ }
798
+ },
799
+ "PersonalAccessTokenPrincipal": {
800
+ "type": "object",
801
+ "properties": {
802
+ "id": {
803
+ "type": "string",
804
+ "format": "uuid"
805
+ },
806
+ "accessToken": {
807
+ "$ref": "#/components/schemas/AccessToken"
808
+ },
809
+ "accountType": {
810
+ "type": "string",
811
+ "enum": [
812
+ "BASIC",
813
+ "PRO",
814
+ "BUSINESS"
815
+ ]
816
+ },
817
+ "organizationMemberships": {
818
+ "type": "array",
819
+ "items": {
820
+ "$ref": "#/components/schemas/OrganizationMembership"
821
+ }
822
+ }
823
+ }
824
+ },
825
+ "ServiceExecution": {
826
+ "type": "object",
827
+ "properties": {
828
+ "id": {
829
+ "type": "string",
830
+ "format": "uuid"
831
+ },
832
+ "createdAt": {
833
+ "type": "string",
834
+ "format": "date-time"
835
+ },
836
+ "startedAt": {
837
+ "type": "string",
838
+ "format": "date-time"
839
+ },
840
+ "endedAt": {
841
+ "type": "string",
842
+ "format": "date-time"
843
+ },
844
+ "status": {
845
+ "type": "string",
846
+ "enum": [
847
+ "UNKNOWN",
848
+ "PENDING",
849
+ "RUNNING",
850
+ "SUCCEEDED",
851
+ "FAILED"
852
+ ]
853
+ }
854
+ }
855
+ },
856
+ "ServiceExecutionTokenPrincipal": {
857
+ "type": "object",
858
+ "properties": {
859
+ "serviceExecution": {
860
+ "$ref": "#/components/schemas/ServiceExecution"
861
+ },
862
+ "serviceProvider": {
863
+ "$ref": "#/components/schemas/UserContext"
864
+ }
865
+ }
866
+ },
867
+ "UserContext": {
868
+ "type": "object",
869
+ "properties": {
870
+ "id": {
871
+ "type": "string",
872
+ "format": "uuid"
873
+ },
874
+ "contextType": {
875
+ "type": "string",
876
+ "enum": [
877
+ "USER",
878
+ "ORGANIZATION",
879
+ "SERVICE_EXECUTION"
880
+ ]
881
+ },
882
+ "accountType": {
883
+ "type": "string",
884
+ "enum": [
885
+ "BASIC",
886
+ "PRO",
887
+ "BUSINESS"
888
+ ]
889
+ },
890
+ "parent": {
891
+ "$ref": "#/components/schemas/UserContext"
892
+ }
893
+ }
588
894
  }
589
895
  },
590
896
  "securitySchemes": {
@@ -597,8 +903,8 @@
597
903
  "type": "oauth2",
598
904
  "flows": {
599
905
  "password": {
600
- "tokenUrl": "https://login.34.90.225.20.nip.io/realms/planqk/protocol/openid-connect/token",
601
- "refreshUrl": "https://login.34.90.225.20.nip.io/realms/planqk/protocol/openid-connect/token",
906
+ "tokenUrl": "https://login.platform.planqk.de/realms/planqk/protocol/openid-connect/token",
907
+ "refreshUrl": "https://login.platform.planqk.de/realms/planqk/protocol/openid-connect/token",
602
908
  "scopes": {
603
909
  "profile": ""
604
910
  }
@@ -607,4 +913,4 @@
607
913
  }
608
914
  }
609
915
  }
610
- }
916
+ }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@planqk/planqk-api-sdk",
3
- "version": "1.1.0",
3
+ "version": "1.2.0",
4
4
  "description": "SDK to interact with official PLANQK API.",
5
5
  "author": "Kipu Quantum GmbH",
6
6
  "contributors": [
@@ -1 +1 @@
1
- __version__ = "1.1.0"
1
+ __version__ = "1.2.0"
@@ -13,11 +13,7 @@ class PlanqkApiClient:
13
13
  base_url = os.environ.get(_PLANQK_API_BASE_URL_NAME, "https://platform.planqk.de/qc-catalog")
14
14
  credentials_provider = DefaultCredentialsProvider(access_token)
15
15
 
16
- headers = None
17
- if organization_id:
18
- headers = {"X-OrganizationId": organization_id}
19
-
20
- self._api = PlanqkApi(base_url=base_url, api_key=credentials_provider.get_access_token(), headers=headers)
16
+ self._api = PlanqkApi(base_url=base_url, api_key=credentials_provider.get_access_token(), organization_id=organization_id)
21
17
 
22
18
  @property
23
19
  def data_pools(self) -> DataPoolsClient:
@@ -2,14 +2,34 @@
2
2
 
3
3
  # isort: skip_file
4
4
 
5
- from .types import DataPoolDto, DataPoolDtoCurrentUserPermission, DataPoolFileDto, OauthScope
5
+ from .types import (
6
+ AccessToken,
7
+ DataPoolDto,
8
+ DataPoolDtoCurrentUserPermission,
9
+ DataPoolFileDto,
10
+ OauthScope,
11
+ OrganizationMembership,
12
+ OrganizationMembershipAccountType,
13
+ OrganizationMembershipRole,
14
+ PersonalAccessTokenPrincipal,
15
+ PersonalAccessTokenPrincipalAccountType,
16
+ ServiceExecution,
17
+ ServiceExecutionStatus,
18
+ ServiceExecutionTokenPrincipal,
19
+ UserContext,
20
+ UserContextAccountType,
21
+ UserContextContextType,
22
+ )
6
23
  from .errors import BadRequestError, ForbiddenError, InternalServerError, NotFoundError, UnauthorizedError
7
- from . import data_pools
24
+ from . import authentication, data_pools
25
+ from .authentication import AuthorizeResponse
8
26
  from .client import AsyncPlanqkApi, PlanqkApi
9
27
  from .environment import PlanqkApiEnvironment
10
28
 
11
29
  __all__ = [
30
+ "AccessToken",
12
31
  "AsyncPlanqkApi",
32
+ "AuthorizeResponse",
13
33
  "BadRequestError",
14
34
  "DataPoolDto",
15
35
  "DataPoolDtoCurrentUserPermission",
@@ -18,8 +38,20 @@ __all__ = [
18
38
  "InternalServerError",
19
39
  "NotFoundError",
20
40
  "OauthScope",
41
+ "OrganizationMembership",
42
+ "OrganizationMembershipAccountType",
43
+ "OrganizationMembershipRole",
44
+ "PersonalAccessTokenPrincipal",
45
+ "PersonalAccessTokenPrincipalAccountType",
21
46
  "PlanqkApi",
22
47
  "PlanqkApiEnvironment",
48
+ "ServiceExecution",
49
+ "ServiceExecutionStatus",
50
+ "ServiceExecutionTokenPrincipal",
23
51
  "UnauthorizedError",
52
+ "UserContext",
53
+ "UserContextAccountType",
54
+ "UserContextContextType",
55
+ "authentication",
24
56
  "data_pools",
25
57
  ]
@@ -0,0 +1,7 @@
1
+ # This file was auto-generated by Fern from our API Definition.
2
+
3
+ # isort: skip_file
4
+
5
+ from .types import AuthorizeResponse
6
+
7
+ __all__ = ["AuthorizeResponse"]