cwyodmodules 0.3.47__py3-none-any.whl → 0.3.49__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- cwyodmodules/batch/utilities/helpers/env_helper.py +33 -33
- cwyodmodules/mgmt_config.py +48 -32
- {cwyodmodules-0.3.47.dist-info → cwyodmodules-0.3.49.dist-info}/METADATA +2 -2
- {cwyodmodules-0.3.47.dist-info → cwyodmodules-0.3.49.dist-info}/RECORD +7 -7
- {cwyodmodules-0.3.47.dist-info → cwyodmodules-0.3.49.dist-info}/WHEEL +0 -0
- {cwyodmodules-0.3.47.dist-info → cwyodmodules-0.3.49.dist-info}/licenses/LICENSE +0 -0
- {cwyodmodules-0.3.47.dist-info → cwyodmodules-0.3.49.dist-info}/top_level.txt +0 -0
@@ -7,7 +7,7 @@ from ..orchestrator.orchestration_strategy import OrchestrationStrategy
|
|
7
7
|
from ..helpers.config.conversation_flow import ConversationFlow
|
8
8
|
from ..helpers.config.database_type import DatabaseType
|
9
9
|
|
10
|
-
from mgmt_config import logger, identity, keyvault,
|
10
|
+
from mgmt_config import logger, identity, keyvault, head_keyvault
|
11
11
|
|
12
12
|
|
13
13
|
|
@@ -29,23 +29,23 @@ class EnvHelper:
|
|
29
29
|
|
30
30
|
logger.info("Initializing EnvHelper")
|
31
31
|
|
32
|
+
if not keyvault:
|
33
|
+
raise ValueError("keyvault is not configured. Please set 'key_vault_uri' environment variable.")
|
34
|
+
|
35
|
+
if not head_keyvault:
|
36
|
+
raise ValueError("head_keyvault is not configured. Please set 'head_key_vault_uri' environment variable.")
|
37
|
+
|
32
38
|
# Wrapper for Azure Key Vault
|
33
39
|
os.environ["APPLICATIONINSIGHTS_ENABLED"] = "true"
|
34
40
|
|
35
|
-
|
36
|
-
|
37
|
-
self.secretHelperHead = create_keyvault_client(
|
38
|
-
vault_url=os.environ["head_key_vault_uri"]
|
39
|
-
)
|
40
|
-
|
41
|
-
# self.secretHelper = SecretHelper(
|
41
|
+
# keyvault = SecretHelper(
|
42
42
|
# keyvault_uri="https://www.kv-main-cwyod-res1.vault.azure.net/"
|
43
43
|
# )
|
44
|
-
#
|
44
|
+
# head_keyvault = SecretHelper(
|
45
45
|
# keyvault_uri="https://www.kv-main-cwyod-hd-res1.vault.azure.net/"
|
46
46
|
# )
|
47
47
|
|
48
|
-
self.LOGLEVEL =
|
48
|
+
self.LOGLEVEL = keyvault.get_secret("logging-level")
|
49
49
|
self.LOG_EXECUTION = self.get_env_var_bool(
|
50
50
|
"LOG_EXECUTION", "True"
|
51
51
|
)
|
@@ -57,18 +57,18 @@ class EnvHelper:
|
|
57
57
|
)
|
58
58
|
|
59
59
|
# Azure
|
60
|
-
self.AZURE_SUBSCRIPTION_ID =
|
61
|
-
self.AZURE_RESOURCE_GROUP =
|
62
|
-
self.AZURE_HEAD_RESOURCE_GROUP =
|
60
|
+
self.AZURE_SUBSCRIPTION_ID = keyvault.get_secret("subscription-id")
|
61
|
+
self.AZURE_RESOURCE_GROUP = keyvault.get_secret("resource-group-name")
|
62
|
+
self.AZURE_HEAD_RESOURCE_GROUP = head_keyvault.get_secret(
|
63
63
|
"resource-group-name"
|
64
64
|
)
|
65
|
-
self.AZURE_RESOURCE_ENVIRONMENT =
|
65
|
+
self.AZURE_RESOURCE_ENVIRONMENT = keyvault.get_secret(
|
66
66
|
"resource-group-environment"
|
67
67
|
)
|
68
68
|
self.AZURE_RESOURCE_PRIVATE = (
|
69
|
-
|
69
|
+
keyvault.get_secret("run-private-endpoint").lower() == "true"
|
70
70
|
)
|
71
|
-
self.PROJECT_CODE =
|
71
|
+
self.PROJECT_CODE = keyvault.get_secret("project-code")
|
72
72
|
self.APP_NAME = os.getenv("REFLECTION_NAME", "Default")
|
73
73
|
self.POSTGRESQL_NAME = (
|
74
74
|
f"psql-main-{self.PROJECT_CODE}-{self.AZURE_RESOURCE_ENVIRONMENT}"
|
@@ -83,7 +83,7 @@ class EnvHelper:
|
|
83
83
|
f"https://{self.AZURE_BLOB_ACCOUNT_NAME}.blob.core.windows.net/"
|
84
84
|
)
|
85
85
|
|
86
|
-
self.AZURE_FUNCTION_APP_ENDPOINT =
|
86
|
+
self.AZURE_FUNCTION_APP_ENDPOINT = keyvault.get_secret(
|
87
87
|
f"func-backend-{self.PROJECT_CODE}-{self.AZURE_RESOURCE_ENVIRONMENT}-endpoint"
|
88
88
|
)
|
89
89
|
self.AZURE_BLOB_CONTAINER_NAME = "documents"
|
@@ -115,7 +115,7 @@ class EnvHelper:
|
|
115
115
|
self.AZURE_COSMOSDB_CONVERSATIONS_CONTAINER = os.getenv(
|
116
116
|
"AZURE_COSMOSDB_CONVERSATIONS_CONTAINER_NAME", ""
|
117
117
|
)
|
118
|
-
self.AZURE_COSMOSDB_ACCOUNT_KEY =
|
118
|
+
self.AZURE_COSMOSDB_ACCOUNT_KEY = keyvault.get_secret(
|
119
119
|
"AZURE_COSMOSDB_ACCOUNT_KEY"
|
120
120
|
)
|
121
121
|
self.AZURE_COSMOSDB_ENABLE_FEEDBACK = (
|
@@ -142,10 +142,10 @@ class EnvHelper:
|
|
142
142
|
self.POSTGRESQL_HOST = azure_postgresql_info.get("host", "")
|
143
143
|
else:
|
144
144
|
self.POSTGRESQL_USER = "cwyod_project_uai"
|
145
|
-
self.POSTGRESQL_DATABASE =
|
145
|
+
self.POSTGRESQL_DATABASE = keyvault.get_secret(
|
146
146
|
f"{self.POSTGRESQL_NAME}-default-database-name"
|
147
147
|
)
|
148
|
-
self.POSTGRESQL_HOST =
|
148
|
+
self.POSTGRESQL_HOST = keyvault.get_secret(
|
149
149
|
f"{self.POSTGRESQL_NAME}-server-name"
|
150
150
|
)
|
151
151
|
# Ensure integrated vectorization is disabled for PostgreSQL
|
@@ -177,11 +177,11 @@ class EnvHelper:
|
|
177
177
|
True if self.AZURE_OPENAI_STREAM.lower() == "true" else False
|
178
178
|
)
|
179
179
|
|
180
|
-
# self.AZURE_COMPUTER_VISION_NAME =
|
180
|
+
# self.AZURE_COMPUTER_VISION_NAME = head_keyvault.get_secret(
|
181
181
|
# "cognitive-kind-ComputerVision"
|
182
182
|
# )
|
183
183
|
self.AZURE_COMPUTER_VISION_NAME = ""
|
184
|
-
# self.AZURE_COMPUTER_VISION_ENDPOINT =
|
184
|
+
# self.AZURE_COMPUTER_VISION_ENDPOINT = head_keyvault.get_secret(
|
185
185
|
# f"{self.AZURE_COMPUTER_VISION_NAME}-endpoint"
|
186
186
|
# )
|
187
187
|
self.AZURE_COMPUTER_VISION_ENDPOINT = ""
|
@@ -197,16 +197,16 @@ class EnvHelper:
|
|
197
197
|
self.AZURE_OPENAI_API_KEY = ""
|
198
198
|
self.AZURE_COMPUTER_VISION_KEY = None
|
199
199
|
else:
|
200
|
-
self.AZURE_SEARCH_KEY =
|
201
|
-
self.AZURE_OPENAI_API_KEY =
|
200
|
+
self.AZURE_SEARCH_KEY = keyvault.get_secret("AZURE_SEARCH_KEY")
|
201
|
+
self.AZURE_OPENAI_API_KEY = keyvault.get_secret(
|
202
202
|
"AZURE_OPENAI_API_KEY"
|
203
203
|
)
|
204
|
-
self.AZURE_COMPUTER_VISION_KEY =
|
204
|
+
self.AZURE_COMPUTER_VISION_KEY = keyvault.get_secret(
|
205
205
|
"AZURE_COMPUTER_VISION_KEY"
|
206
206
|
)
|
207
207
|
|
208
208
|
# Set env for Azure OpenAI
|
209
|
-
self.AZURE_AI_SERVICES_NAME =
|
209
|
+
self.AZURE_AI_SERVICES_NAME = head_keyvault.get_secret(
|
210
210
|
"cognitive-kind-AIServices"
|
211
211
|
)
|
212
212
|
self.AZURE_OPENAI_ENDPOINT = (
|
@@ -226,10 +226,10 @@ class EnvHelper:
|
|
226
226
|
|
227
227
|
# Azure Form Recognizer
|
228
228
|
|
229
|
-
self.AZURE_FORM_RECOGNIZER_NAME =
|
229
|
+
self.AZURE_FORM_RECOGNIZER_NAME = keyvault.get_secret(
|
230
230
|
"cognitive-kind-FormRecognizer"
|
231
231
|
)
|
232
|
-
self.AZURE_FORM_RECOGNIZER_ENDPOINT =
|
232
|
+
self.AZURE_FORM_RECOGNIZER_ENDPOINT = keyvault.get_secret(
|
233
233
|
f"{self.AZURE_FORM_RECOGNIZER_NAME}-endpoint"
|
234
234
|
)
|
235
235
|
|
@@ -238,18 +238,18 @@ class EnvHelper:
|
|
238
238
|
self.APPLICATIONINSIGHTS_ENABLED = "True"
|
239
239
|
|
240
240
|
# Azure AI Content Safety
|
241
|
-
self.AZURE_CONTENT_SAFETY_NAME =
|
241
|
+
self.AZURE_CONTENT_SAFETY_NAME = head_keyvault.get_secret(
|
242
242
|
"cognitive-kind-ContentSafety"
|
243
243
|
)
|
244
|
-
self.AZURE_CONTENT_SAFETY_ENDPOINT =
|
244
|
+
self.AZURE_CONTENT_SAFETY_ENDPOINT = head_keyvault.get_secret(
|
245
245
|
f"{self.AZURE_CONTENT_SAFETY_NAME}-endpoint"
|
246
246
|
)
|
247
247
|
|
248
248
|
# Speech Service
|
249
|
-
self.AZURE_SPEECH_SERVICE_NAME =
|
249
|
+
self.AZURE_SPEECH_SERVICE_NAME = head_keyvault.get_secret(
|
250
250
|
"cognitive-kind-SpeechServices"
|
251
251
|
)
|
252
|
-
self.AZURE_SPEECH_ENDPOINT =
|
252
|
+
self.AZURE_SPEECH_ENDPOINT = head_keyvault.get_secret(
|
253
253
|
f"{self.AZURE_SPEECH_SERVICE_NAME}-endpoint"
|
254
254
|
)
|
255
255
|
|
@@ -262,7 +262,7 @@ class EnvHelper:
|
|
262
262
|
self.AZURE_SPEECH_REGION_ENDPOINT = (
|
263
263
|
f"https://{self.AZURE_SPEECH_SERVICE_REGION}.api.cognitive.microsoft.com/"
|
264
264
|
)
|
265
|
-
self.AZURE_SPEECH_KEY =
|
265
|
+
self.AZURE_SPEECH_KEY = head_keyvault.get_secret(f"{self.AZURE_SPEECH_SERVICE_NAME}-key") # changed from None to allow private endpoint communication
|
266
266
|
|
267
267
|
self.LOAD_CONFIG_FROM_BLOB_STORAGE = self.get_env_var_bool(
|
268
268
|
"LOAD_CONFIG_FROM_BLOB_STORAGE"
|
cwyodmodules/mgmt_config.py
CHANGED
@@ -1,24 +1,24 @@
|
|
1
1
|
"""
|
2
2
|
Azure Project Management Configuration Template
|
3
3
|
|
4
|
-
This template provides standardized configuration for Azure logging
|
5
|
-
|
6
|
-
|
7
|
-
throughout your application.
|
4
|
+
This template provides standardized configuration for Azure logging and identity
|
5
|
+
management across projects. It creates singleton instances of AzureLogger and
|
6
|
+
AzureIdentity that can be imported and used throughout your application.
|
8
7
|
|
9
8
|
Usage:
|
10
|
-
from mgmt_config import logger, identity
|
9
|
+
from mgmt_config import logger, identity
|
11
10
|
|
12
11
|
logger.info("Application started")
|
13
12
|
credential = identity.get_credential()
|
14
|
-
secret = keyvault.get_secret("my-secret") if keyvault else None
|
15
13
|
"""
|
16
14
|
|
17
15
|
import os
|
18
16
|
from typing import Optional, Dict, Any
|
19
|
-
from azpaddypy.mgmt.logging import create_app_logger
|
17
|
+
from azpaddypy.mgmt.logging import create_app_logger, create_function_logger
|
20
18
|
from azpaddypy.mgmt.identity import create_azure_identity
|
21
|
-
from azpaddypy.resources.keyvault import create_azure_keyvault
|
19
|
+
from azpaddypy.resources.keyvault import create_azure_keyvault
|
20
|
+
|
21
|
+
# Alias for import in other packages
|
22
22
|
|
23
23
|
# =============================================================================
|
24
24
|
# SERVICE CONFIGURATION
|
@@ -68,29 +68,40 @@ IDENTITY_CONNECTION_STRING = LOGGER_CONNECTION_STRING
|
|
68
68
|
# KEYVAULT CONFIGURATION
|
69
69
|
# =============================================================================
|
70
70
|
|
71
|
-
#
|
71
|
+
# Azure Key Vault URL (required for Key Vault operations)
|
72
72
|
KEYVAULT_URL = os.getenv("key_vault_uri")
|
73
|
+
HEAD_KEYVAULT_URL = os.getenv("head_key_vault_uri")
|
73
74
|
|
74
|
-
#
|
75
|
+
# Enable specific Key Vault client types
|
75
76
|
KEYVAULT_ENABLE_SECRETS = os.getenv("KEYVAULT_ENABLE_SECRETS", "true").lower() == "true"
|
76
77
|
KEYVAULT_ENABLE_KEYS = os.getenv("KEYVAULT_ENABLE_KEYS", "false").lower() == "true"
|
77
78
|
KEYVAULT_ENABLE_CERTIFICATES = os.getenv("KEYVAULT_ENABLE_CERTIFICATES", "false").lower() == "true"
|
78
79
|
|
79
|
-
# Connection string for
|
80
|
+
# Connection string for keyvault logging (uses same as logger by default)
|
80
81
|
KEYVAULT_CONNECTION_STRING = LOGGER_CONNECTION_STRING
|
81
82
|
|
82
83
|
# =============================================================================
|
83
84
|
# INITIALIZE SERVICES
|
84
85
|
# =============================================================================
|
85
|
-
|
86
86
|
# Create logger instance
|
87
|
-
|
88
|
-
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
|
93
|
-
|
87
|
+
if "functionapp" in os.getenv("REFLECTION_KIND", "app"):
|
88
|
+
logger = create_function_logger(
|
89
|
+
function_app_name=os.getenv("REFLECTION_NAME", "app"),
|
90
|
+
function_name="backend",
|
91
|
+
service_version=SERVICE_VERSION,
|
92
|
+
connection_string=LOGGER_CONNECTION_STRING,
|
93
|
+
instrumentation_options=LOGGER_INSTRUMENTATION_OPTIONS,
|
94
|
+
)
|
95
|
+
logger.info("Function logger initialized")
|
96
|
+
else:
|
97
|
+
logger = create_app_logger(
|
98
|
+
service_name=SERVICE_NAME,
|
99
|
+
service_version=SERVICE_VERSION,
|
100
|
+
connection_string=LOGGER_CONNECTION_STRING,
|
101
|
+
enable_console_logging=LOGGER_ENABLE_CONSOLE,
|
102
|
+
instrumentation_options=LOGGER_INSTRUMENTATION_OPTIONS,
|
103
|
+
)
|
104
|
+
logger.info("App logger initialized")
|
94
105
|
|
95
106
|
# Create identity instance with shared logger
|
96
107
|
identity = create_azure_identity(
|
@@ -103,7 +114,7 @@ identity = create_azure_identity(
|
|
103
114
|
logger=logger,
|
104
115
|
)
|
105
116
|
|
106
|
-
# Create
|
117
|
+
# Create keyvault instance with shared logger and identity (if URL is configured)
|
107
118
|
keyvault = None
|
108
119
|
if KEYVAULT_URL:
|
109
120
|
keyvault = create_azure_keyvault(
|
@@ -118,12 +129,10 @@ if KEYVAULT_URL:
|
|
118
129
|
enable_certificates=KEYVAULT_ENABLE_CERTIFICATES,
|
119
130
|
)
|
120
131
|
|
121
|
-
|
122
|
-
|
123
|
-
|
124
|
-
|
125
|
-
return create_azure_keyvault(
|
126
|
-
vault_url=vault_url,
|
132
|
+
head_keyvault = None
|
133
|
+
if HEAD_KEYVAULT_URL:
|
134
|
+
head_keyvault = create_azure_keyvault(
|
135
|
+
vault_url=HEAD_KEYVAULT_URL,
|
127
136
|
azure_identity=identity,
|
128
137
|
service_name=SERVICE_NAME,
|
129
138
|
service_version=SERVICE_VERSION,
|
@@ -139,7 +148,7 @@ def create_keyvault_client(vault_url: str) -> Optional[AzureKeyVault]:
|
|
139
148
|
# =============================================================================
|
140
149
|
|
141
150
|
# Validate critical configuration
|
142
|
-
if SERVICE_NAME ==
|
151
|
+
if SERVICE_NAME == __name__:
|
143
152
|
logger.warning(
|
144
153
|
"SERVICE_NAME is not configured. Please set SERVICE_NAME environment variable or update this template.",
|
145
154
|
extra={"configuration_issue": "service_name_not_set"}
|
@@ -153,10 +162,16 @@ if not LOGGER_CONNECTION_STRING:
|
|
153
162
|
|
154
163
|
if not KEYVAULT_URL:
|
155
164
|
logger.info(
|
156
|
-
"No
|
165
|
+
"No Key Vault URL configured. Key Vault operations will be disabled.",
|
157
166
|
extra={"keyvault_status": "disabled"}
|
158
167
|
)
|
159
168
|
|
169
|
+
if not HEAD_KEYVAULT_URL:
|
170
|
+
logger.info(
|
171
|
+
"No Head Key Vault URL configured. Head Key Vault operations will be disabled.",
|
172
|
+
extra={"head_keyvault_status": "disabled"}
|
173
|
+
)
|
174
|
+
|
160
175
|
# Log successful initialization
|
161
176
|
logger.info(
|
162
177
|
f"Management configuration initialized for service '{SERVICE_NAME}' v{SERVICE_VERSION}",
|
@@ -167,9 +182,10 @@ logger.info(
|
|
167
182
|
"token_cache_enabled": IDENTITY_ENABLE_TOKEN_CACHE,
|
168
183
|
"telemetry_enabled": bool(LOGGER_CONNECTION_STRING),
|
169
184
|
"keyvault_enabled": bool(KEYVAULT_URL),
|
170
|
-
"
|
171
|
-
"
|
172
|
-
"
|
185
|
+
"head_keyvault_enabled": bool(HEAD_KEYVAULT_URL),
|
186
|
+
"keyvault_secrets_enabled": KEYVAULT_ENABLE_SECRETS if KEYVAULT_URL else False,
|
187
|
+
"keyvault_keys_enabled": KEYVAULT_ENABLE_KEYS if KEYVAULT_URL else False,
|
188
|
+
"keyvault_certificates_enabled": KEYVAULT_ENABLE_CERTIFICATES if KEYVAULT_URL else False,
|
173
189
|
}
|
174
190
|
)
|
175
191
|
|
@@ -178,4 +194,4 @@ logger.info(
|
|
178
194
|
# =============================================================================
|
179
195
|
|
180
196
|
# Export logger, identity, and keyvault for use in applications
|
181
|
-
__all__ = ["logger", "identity", "keyvault", "
|
197
|
+
__all__ = ["logger", "identity", "keyvault", "head_keyvault"]
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.4
|
2
2
|
Name: cwyodmodules
|
3
|
-
Version: 0.3.
|
3
|
+
Version: 0.3.49
|
4
4
|
Summary: Add your description here
|
5
5
|
Author-email: Patrik <patrikhartl@gmail.com>
|
6
6
|
Classifier: Operating System :: OS Independent
|
@@ -40,7 +40,7 @@ Requires-Dist: azure-search-documents==11.6.0b4
|
|
40
40
|
Requires-Dist: semantic-kernel==1.3.0
|
41
41
|
Requires-Dist: pydantic==2.7.4
|
42
42
|
Requires-Dist: pandas>=2.2.3
|
43
|
-
Requires-Dist: azpaddypy>=0.3.
|
43
|
+
Requires-Dist: azpaddypy>=0.3.7
|
44
44
|
Dynamic: license-file
|
45
45
|
|
46
46
|
# paddypy
|
@@ -1,5 +1,5 @@
|
|
1
1
|
cwyodmodules/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
2
|
-
cwyodmodules/mgmt_config.py,sha256=
|
2
|
+
cwyodmodules/mgmt_config.py,sha256=xYhAhsIzDJc8ZizRolR5YNIY-P1gLAdepTeudzQqdj8,7819
|
3
3
|
cwyodmodules/api/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
4
4
|
cwyodmodules/api/chat_history.py,sha256=bVXFmhTHIfEiHv_nBrfizO-cQRHhKgrdcZ07OD1b0Tw,20683
|
5
5
|
cwyodmodules/batch/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
@@ -37,7 +37,7 @@ cwyodmodules/batch/utilities/helpers/azure_postgres_helper_light_rag.py,sha256=M
|
|
37
37
|
cwyodmodules/batch/utilities/helpers/azure_search_helper.py,sha256=vIIMEck1wPg9oRlWweE2gSZ1nUYc_tmEe4QeFlsrwKk,11314
|
38
38
|
cwyodmodules/batch/utilities/helpers/document_chunking_helper.py,sha256=2MZOjW-fHXgYijP3m9O-nizOlk96Yg0axyxT0K6fTnM,725
|
39
39
|
cwyodmodules/batch/utilities/helpers/document_loading_helper.py,sha256=2HBEl3vW-_PKbX5pPntTC_R5eToTk2Qb-q3M4Mt6hCU,603
|
40
|
-
cwyodmodules/batch/utilities/helpers/env_helper.py,sha256=
|
40
|
+
cwyodmodules/batch/utilities/helpers/env_helper.py,sha256=0wJTaoMAR8rBo1-q2TQx2xqkYktbgk9EsUmZSsvwIJ0,15727
|
41
41
|
cwyodmodules/batch/utilities/helpers/lightrag_helper.py,sha256=7lb9JMm5IohsO73LWo5bWmlzWCGYNsx_fYl-aFdwATQ,3845
|
42
42
|
cwyodmodules/batch/utilities/helpers/llm_helper.py,sha256=lHLYrUidtaemmKrVbWoo7oIvwluUoPUk16U5lV-YIX8,8282
|
43
43
|
cwyodmodules/batch/utilities/helpers/orchestrator_helper.py,sha256=mCcZyMFG0otnw9gzWd-PYocHmDdFDVg-RT9oDPiDZPk,897
|
@@ -109,8 +109,8 @@ cwyodmodules/graphrag/query/generate.py,sha256=BZiB6iw7PkIovw-CyYFogMHnDxK0Qu_4u
|
|
109
109
|
cwyodmodules/graphrag/query/graph_search.py,sha256=95h3ecSWx4864XgKABtG0fh3Nk8HkqJVzoCrO8daJ-Y,7724
|
110
110
|
cwyodmodules/graphrag/query/types.py,sha256=1Iq1dp4I4a56_cuFjOZ0NTgd0A2_MpVFznp_czgt6cI,617
|
111
111
|
cwyodmodules/graphrag/query/vector_search.py,sha256=9Gwu9LPjtoAYUU8WKqCvbCHAIg3dpk71reoYd1scLnQ,1807
|
112
|
-
cwyodmodules-0.3.
|
113
|
-
cwyodmodules-0.3.
|
114
|
-
cwyodmodules-0.3.
|
115
|
-
cwyodmodules-0.3.
|
116
|
-
cwyodmodules-0.3.
|
112
|
+
cwyodmodules-0.3.49.dist-info/licenses/LICENSE,sha256=UqBDTipijsSW2ZSOXyTZnMsXmLoEHTgNEM0tL4g-Sso,1150
|
113
|
+
cwyodmodules-0.3.49.dist-info/METADATA,sha256=3W5TdCC31Bv_3PNPjM9V-AzBOLjoWscS1e-HcwD7b6Y,2002
|
114
|
+
cwyodmodules-0.3.49.dist-info/WHEEL,sha256=_zCd3N1l69ArxyTb8rzEoP9TpbYXkqRFSNOD5OuxnTs,91
|
115
|
+
cwyodmodules-0.3.49.dist-info/top_level.txt,sha256=99RENLbkdRX-qpJvsxZ5AfmTL5s6shSaKOWYpz1vwzg,13
|
116
|
+
cwyodmodules-0.3.49.dist-info/RECORD,,
|
File without changes
|
File without changes
|
File without changes
|