ethyca-fides 2.60.0rc1__py2.py3-none-any.whl → 2.60.1b0__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (100) hide show
  1. {ethyca_fides-2.60.0rc1.dist-info → ethyca_fides-2.60.1b0.dist-info}/METADATA +1 -1
  2. {ethyca_fides-2.60.0rc1.dist-info → ethyca_fides-2.60.1b0.dist-info}/RECORD +98 -97
  3. fides/_version.py +3 -3
  4. fides/api/api/deps.py +18 -2
  5. fides/api/api/v1/endpoints/admin.py +4 -3
  6. fides/api/app_setup.py +13 -5
  7. fides/api/db/database.py +11 -14
  8. fides/api/db/seed.py +88 -85
  9. fides/api/schemas/connection_configuration/connection_secrets_google_cloud_sql_mysql.py +17 -0
  10. fides/api/schemas/connection_configuration/connection_secrets_google_cloud_sql_postgres.py +17 -0
  11. fides/api/schemas/connection_configuration/enums/google_cloud_sql_ip_type.py +9 -0
  12. fides/api/service/connectors/google_cloud_mysql_connector.py +4 -0
  13. fides/api/service/connectors/google_cloud_postgres_connector.py +4 -0
  14. fides/api/service/connectors/sql_connector.py +2 -2
  15. fides/api/util/data_category.py +1 -0
  16. fides/ui-build/static/admin/404.html +1 -1
  17. fides/ui-build/static/admin/_next/static/chunks/5973-9199898696748d0c.js +1 -0
  18. fides/ui-build/static/admin/_next/static/chunks/9965-023779db7a1b4aa2.js +1 -0
  19. fides/ui-build/static/admin/_next/static/chunks/pages/consent/{reporting-1762ed46d98cebad.js → reporting-51284600803b1fa6.js} +1 -1
  20. fides/ui-build/static/admin/_next/static/{h6f83-sNVA0ahtQ8eFh82 → snXG8lXqPoT4hj3yvlEtk}/_buildManifest.js +1 -1
  21. fides/ui-build/static/admin/add-systems/manual.html +1 -1
  22. fides/ui-build/static/admin/add-systems/multiple.html +1 -1
  23. fides/ui-build/static/admin/add-systems.html +1 -1
  24. fides/ui-build/static/admin/ant-poc.html +1 -1
  25. fides/ui-build/static/admin/consent/configure/add-vendors.html +1 -1
  26. fides/ui-build/static/admin/consent/configure.html +1 -1
  27. fides/ui-build/static/admin/consent/privacy-experience/[id].html +1 -1
  28. fides/ui-build/static/admin/consent/privacy-experience/new.html +1 -1
  29. fides/ui-build/static/admin/consent/privacy-experience.html +1 -1
  30. fides/ui-build/static/admin/consent/privacy-notices/[id].html +1 -1
  31. fides/ui-build/static/admin/consent/privacy-notices/new.html +1 -1
  32. fides/ui-build/static/admin/consent/privacy-notices.html +1 -1
  33. fides/ui-build/static/admin/consent/properties.html +1 -1
  34. fides/ui-build/static/admin/consent/reporting.html +1 -1
  35. fides/ui-build/static/admin/consent.html +1 -1
  36. fides/ui-build/static/admin/data-catalog/[systemId]/projects/[projectUrn]/[resourceUrn].html +1 -1
  37. fides/ui-build/static/admin/data-catalog/[systemId]/projects/[projectUrn].html +1 -1
  38. fides/ui-build/static/admin/data-catalog/[systemId]/projects.html +1 -1
  39. fides/ui-build/static/admin/data-catalog/[systemId]/resources/[resourceUrn].html +1 -1
  40. fides/ui-build/static/admin/data-catalog/[systemId]/resources.html +1 -1
  41. fides/ui-build/static/admin/data-catalog.html +1 -1
  42. fides/ui-build/static/admin/data-discovery/action-center/[monitorId]/[systemId].html +1 -1
  43. fides/ui-build/static/admin/data-discovery/action-center/[monitorId].html +1 -1
  44. fides/ui-build/static/admin/data-discovery/action-center.html +1 -1
  45. fides/ui-build/static/admin/data-discovery/activity.html +1 -1
  46. fides/ui-build/static/admin/data-discovery/detection/[resourceUrn].html +1 -1
  47. fides/ui-build/static/admin/data-discovery/detection.html +1 -1
  48. fides/ui-build/static/admin/data-discovery/discovery/[resourceUrn].html +1 -1
  49. fides/ui-build/static/admin/data-discovery/discovery.html +1 -1
  50. fides/ui-build/static/admin/datamap.html +1 -1
  51. fides/ui-build/static/admin/dataset/[datasetId]/[collectionName]/[...subfieldNames].html +1 -1
  52. fides/ui-build/static/admin/dataset/[datasetId]/[collectionName].html +1 -1
  53. fides/ui-build/static/admin/dataset/[datasetId].html +1 -1
  54. fides/ui-build/static/admin/dataset/new.html +1 -1
  55. fides/ui-build/static/admin/dataset.html +1 -1
  56. fides/ui-build/static/admin/datastore-connection/[id].html +1 -1
  57. fides/ui-build/static/admin/datastore-connection/new.html +1 -1
  58. fides/ui-build/static/admin/datastore-connection.html +1 -1
  59. fides/ui-build/static/admin/index.html +1 -1
  60. fides/ui-build/static/admin/integrations/[id].html +1 -1
  61. fides/ui-build/static/admin/integrations.html +1 -1
  62. fides/ui-build/static/admin/lib/fides-preview.js +1 -1
  63. fides/ui-build/static/admin/login/[provider].html +1 -1
  64. fides/ui-build/static/admin/login.html +1 -1
  65. fides/ui-build/static/admin/messaging/[id].html +1 -1
  66. fides/ui-build/static/admin/messaging/add-template.html +1 -1
  67. fides/ui-build/static/admin/messaging.html +1 -1
  68. fides/ui-build/static/admin/privacy-requests/[id].html +1 -1
  69. fides/ui-build/static/admin/privacy-requests/configure/messaging.html +1 -1
  70. fides/ui-build/static/admin/privacy-requests/configure/storage.html +1 -1
  71. fides/ui-build/static/admin/privacy-requests/configure.html +1 -1
  72. fides/ui-build/static/admin/privacy-requests.html +1 -1
  73. fides/ui-build/static/admin/properties/[id].html +1 -1
  74. fides/ui-build/static/admin/properties/add-property.html +1 -1
  75. fides/ui-build/static/admin/properties.html +1 -1
  76. fides/ui-build/static/admin/reporting/datamap.html +1 -1
  77. fides/ui-build/static/admin/settings/about.html +1 -1
  78. fides/ui-build/static/admin/settings/consent/[configuration_id]/[purpose_id].html +1 -1
  79. fides/ui-build/static/admin/settings/consent.html +1 -1
  80. fides/ui-build/static/admin/settings/custom-fields.html +1 -1
  81. fides/ui-build/static/admin/settings/domain-records.html +1 -1
  82. fides/ui-build/static/admin/settings/domains.html +1 -1
  83. fides/ui-build/static/admin/settings/email-templates.html +1 -1
  84. fides/ui-build/static/admin/settings/locations.html +1 -1
  85. fides/ui-build/static/admin/settings/organization.html +1 -1
  86. fides/ui-build/static/admin/settings/regulations.html +1 -1
  87. fides/ui-build/static/admin/systems/configure/[id]/test-datasets.html +1 -1
  88. fides/ui-build/static/admin/systems/configure/[id].html +1 -1
  89. fides/ui-build/static/admin/systems.html +1 -1
  90. fides/ui-build/static/admin/taxonomy.html +1 -1
  91. fides/ui-build/static/admin/user-management/new.html +1 -1
  92. fides/ui-build/static/admin/user-management/profile/[id].html +1 -1
  93. fides/ui-build/static/admin/user-management.html +1 -1
  94. fides/ui-build/static/admin/_next/static/chunks/5973-6f53799483424513.js +0 -1
  95. fides/ui-build/static/admin/_next/static/chunks/9965-dac854cdf6141611.js +0 -1
  96. {ethyca_fides-2.60.0rc1.dist-info → ethyca_fides-2.60.1b0.dist-info}/WHEEL +0 -0
  97. {ethyca_fides-2.60.0rc1.dist-info → ethyca_fides-2.60.1b0.dist-info}/entry_points.txt +0 -0
  98. {ethyca_fides-2.60.0rc1.dist-info → ethyca_fides-2.60.1b0.dist-info}/licenses/LICENSE +0 -0
  99. {ethyca_fides-2.60.0rc1.dist-info → ethyca_fides-2.60.1b0.dist-info}/top_level.txt +0 -0
  100. /fides/ui-build/static/admin/_next/static/{h6f83-sNVA0ahtQ8eFh82 → snXG8lXqPoT4hj3yvlEtk}/_ssgManifest.js +0 -0
fides/api/db/seed.py CHANGED
@@ -25,6 +25,7 @@ from fides.api.models.fides_user_permissions import FidesUserPermissions
25
25
  from fides.api.models.policy import Policy, Rule, RuleTarget
26
26
  from fides.api.models.sql_models import ( # type: ignore[attr-defined]
27
27
  Dataset,
28
+ Organization,
28
29
  System,
29
30
  sql_model_map,
30
31
  )
@@ -44,7 +45,7 @@ from fides.api.util.text import to_snake_case
44
45
  from fides.config import CONFIG
45
46
  from fides.service.dataset.dataset_config_service import DatasetConfigService
46
47
 
47
- from .crud import create_resource, get_resource, list_resource, upsert_resources
48
+ from .crud import upsert_resources
48
49
  from .samples import (
49
50
  load_sample_connections_from_project,
50
51
  load_sample_resources_from_project,
@@ -282,106 +283,41 @@ def load_default_erasure_policy(
282
283
  )
283
284
 
284
285
 
285
- def load_default_dsr_policies() -> None:
286
+ def load_default_dsr_policies(session: Session) -> None:
286
287
  """
287
288
  Checks whether DSR execution policies exist in the database, and
288
289
  inserts them to target a default set of data categories if not.
289
290
  """
290
- with sync_session() as db_session: # type: ignore[attr-defined]
291
- client_id = get_client_id(db_session)
291
+ client_id = get_client_id(session)
292
292
 
293
- # By default, include all categories *except* those related to a user's
294
- # financial, payment, and credentials data. These are typically not
295
- # included in access and erasure requests as they are covered by other
296
- # compliance programs (e.g. legal, tax, security) and most
297
- # organizations need to be extra careful about how these are used -
298
- # especially for erasure! Therefore, a safe default for "out of the
299
- # box" behaviour is to exclude these
293
+ # By default, include all categories *except* those related to a user's
294
+ # financial, payment, and credentials data. These are typically not
295
+ # included in access and erasure requests as they are covered by other
296
+ # compliance programs (e.g. legal, tax, security) and most
297
+ # organizations need to be extra careful about how these are used -
298
+ # especially for erasure! Therefore, a safe default for "out of the
299
+ # box" behaviour is to exclude these
300
300
 
301
- default_data_categories = get_user_data_categories()
301
+ default_data_categories = get_user_data_categories()
302
302
 
303
- log.debug(
304
- f"Preparing to create default rules for the following Data Categories: {default_data_categories} if they do not already exist"
305
- )
306
-
307
- load_default_access_policy(db_session, client_id, default_data_categories)
308
- load_default_erasure_policy(db_session, client_id, default_data_categories)
309
-
310
- log.info("All default policies & rules created")
311
-
312
-
313
- async def load_default_organization(async_session: AsyncSession) -> None:
314
- """
315
- Seed the database with a default organization unless
316
- one with a matching name already exists.
317
- """
318
-
319
- log.info("Loading the default organization...")
320
- organizations: List[Dict] = list(
321
- map(dict, DEFAULT_TAXONOMY.model_dump(mode="json")["organization"])
303
+ log.debug(
304
+ f"Preparing to create default rules for the following Data Categories: {default_data_categories} if they do not already exist"
322
305
  )
323
306
 
324
- inserted = 0
325
- for org in organizations:
326
- try:
327
- existing = await get_resource(
328
- sql_model_map["organization"],
329
- org["fides_key"],
330
- async_session,
331
- raise_not_found=False,
332
- )
333
- if not existing:
334
- await create_resource(sql_model_map["organization"], org, async_session)
335
- inserted += 1
336
- except AlreadyExistsError:
337
- pass
307
+ load_default_access_policy(session, client_id, default_data_categories)
308
+ load_default_erasure_policy(session, client_id, default_data_categories)
338
309
 
339
- log.debug(f"INSERTED {inserted} organization resource(s)")
340
- log.debug(f"SKIPPED {len(organizations)-inserted} organization resource(s)")
341
-
342
-
343
- async def load_default_taxonomy(async_session: AsyncSession) -> None:
344
- """Seed the database with the default taxonomy resources."""
345
-
346
- upsert_resource_types = list(DEFAULT_TAXONOMY.model_fields_set)
347
- upsert_resource_types.remove("organization")
348
-
349
- log.info("Loading the default fideslang taxonomy resources...")
350
- for resource_type in upsert_resource_types:
351
- log.debug(f"Processing {resource_type} resources...")
352
- default_resources = DEFAULT_TAXONOMY.model_dump(mode="json")[resource_type]
353
- existing_resources = await list_resource(
354
- sql_model_map[resource_type], async_session
355
- )
356
- existing_keys = [item.fides_key for item in existing_resources]
357
- resources = [
358
- resource
359
- for resource in default_resources
360
- if resource["fides_key"] not in existing_keys
361
- ]
362
-
363
- if len(resources) == 0:
364
- log.debug(f"No new {resource_type} resources to add from default taxonomy.")
365
- continue
366
-
367
- try:
368
- await upsert_resources(
369
- sql_model_map[resource_type], resources, async_session
370
- )
371
- except QueryError: # pragma: no cover
372
- pass # The create_resource function will log the error
373
- else:
374
- log.debug(f"UPSERTED {len(resources)} {resource_type} resource(s)")
310
+ log.info("All default policies & rules created")
375
311
 
376
312
 
377
- async def load_default_resources(async_session: AsyncSession) -> None:
313
+ def load_default_resources(session: Session) -> None:
378
314
  """
379
315
  Seed the database with default resources that the application
380
316
  expects to be available.
381
317
  """
382
- await load_default_organization(async_session)
383
- await load_default_taxonomy(async_session)
384
- load_default_dsr_policies()
318
+ load_default_organization(session)
319
+ load_default_taxonomy(session)
320
+ load_default_dsr_policies(session)
385
321
 
386
322
 
387
323
  async def load_samples(async_session: AsyncSession) -> None:
@@ -549,3 +485,70 @@ async def load_samples(async_session: AsyncSession) -> None:
549
485
 
550
486
  except QueryError: # pragma: no cover
551
487
  pass # The upsert_resources function will log any error
488
+
489
+
490
+ def load_default_organization(db: Session) -> None:
491
+ """
492
+ Seed the database with a default organization unless
493
+ one with a matching name already exists.
494
+ """
495
+ log.info("Loading the default organization...")
496
+ organizations: List[Dict] = list(
497
+ map(dict, DEFAULT_TAXONOMY.model_dump(mode="json")["organization"])
498
+ )
499
+
500
+ inserted = 0
501
+ for org in organizations:
502
+ try:
503
+ existing = Organization.get_by(
504
+ db=db, field="fides_key", value=org["fides_key"]
505
+ )
506
+ if not existing:
507
+ Organization.create(db=db, data=org, check_name=False)
508
+ inserted += 1
509
+ except AlreadyExistsError:
510
+ pass
511
+
512
+ log.debug(f"INSERTED {inserted} organization resource(s)")
513
+ log.debug(f"SKIPPED {len(organizations)-inserted} organization resource(s)")
514
+
515
+
516
+ def load_default_taxonomy(db: Session) -> None:
517
+ """Synchronous version: Seed the database with the default taxonomy resources."""
518
+ upsert_resource_types = list(DEFAULT_TAXONOMY.model_fields_set)
519
+ upsert_resource_types.remove("organization")
520
+
521
+ log.info("Loading the default fideslang taxonomy resources...")
522
+ for resource_type in upsert_resource_types:
523
+ sql_model = sql_model_map[resource_type]
524
+ log.debug(f"Processing {resource_type} resources...")
525
+ default_resources = DEFAULT_TAXONOMY.model_dump(mode="json")[resource_type]
526
+
527
+ try:
528
+ # Fetch existing keys first
529
+ existing_keys = {item[0] for item in db.query(sql_model.fides_key).all()}
530
+ except Exception as exc:
531
+ log.error(f"Error fetching existing keys for {resource_type}: {exc}")
532
+ continue # Skip this resource type if we can't get existing keys
533
+
534
+ # Filter for resources that don't exist
535
+ resources_to_create = [
536
+ resource
537
+ for resource in default_resources
538
+ if resource["fides_key"] not in existing_keys
539
+ ]
540
+
541
+ if not resources_to_create:
542
+ log.debug(f"No new {resource_type} resources to add from default taxonomy.")
543
+ continue
544
+
545
+ created_count = 0
546
+ for resource_data in resources_to_create:
547
+ try:
548
+ sql_model.create_or_update(db=db, data=resource_data)
549
+ created_count += 1
550
+ except Exception:
551
+ pass
552
+
553
+ if created_count > 0:
554
+ log.debug(f"UPSERTED {created_count} {resource_type} resource(s)")
@@ -8,6 +8,9 @@ from fides.api.schemas.base_class import NoValidationSchema
8
8
  from fides.api.schemas.connection_configuration.connection_secrets import (
9
9
  ConnectionConfigSecretsSchema,
10
10
  )
11
+ from fides.api.schemas.connection_configuration.enums.google_cloud_sql_ip_type import (
12
+ GoogleCloudSQLIPType,
13
+ )
11
14
 
12
15
 
13
16
  class KeyfileCreds(BaseModel):
@@ -51,6 +54,11 @@ class GoogleCloudSQLMySQLSchema(ConnectionConfigSecretsSchema):
51
54
  json_schema_extra={"sensitive": True},
52
55
  description="The contents of the key file that contains authentication credentials for a service account in GCP.",
53
56
  )
57
+ ip_type: Optional[GoogleCloudSQLIPType] = Field(
58
+ default=None,
59
+ title="IP type",
60
+ description="Specify the IP Address type required for your database (defaults to public). See the Google Cloud documentation for more information about connection options: https://cloud.google.com/sql/docs/postgres/connect-overview",
61
+ )
54
62
 
55
63
  _required_components: ClassVar[List[str]] = [
56
64
  "db_iam_user",
@@ -66,6 +74,15 @@ class GoogleCloudSQLMySQLSchema(ConnectionConfigSecretsSchema):
66
74
  v = json.loads(v)
67
75
  return KeyfileCreds.model_validate(v)
68
76
 
77
+ @field_validator("ip_type", mode="before")
78
+ @classmethod
79
+ def empty_string_to_none(cls, v: Optional[str]) -> Optional[GoogleCloudSQLIPType]:
80
+ if v == "":
81
+ return None
82
+ if v is not None:
83
+ return GoogleCloudSQLIPType(v)
84
+ return v
85
+
69
86
 
70
87
  class GoogleCloudSQLMySQLDocsSchema(GoogleCloudSQLMySQLSchema, NoValidationSchema):
71
88
  """Google Cloud SQL MySQL Secrets Schema for API Docs"""
@@ -8,6 +8,9 @@ from fides.api.schemas.base_class import NoValidationSchema
8
8
  from fides.api.schemas.connection_configuration.connection_secrets import (
9
9
  ConnectionConfigSecretsSchema,
10
10
  )
11
+ from fides.api.schemas.connection_configuration.enums.google_cloud_sql_ip_type import (
12
+ GoogleCloudSQLIPType,
13
+ )
11
14
 
12
15
 
13
16
  class KeyfileCreds(BaseModel):
@@ -57,6 +60,11 @@ class GoogleCloudSQLPostgresSchema(ConnectionConfigSecretsSchema):
57
60
  json_schema_extra={"sensitive": True},
58
61
  description="The contents of the key file that contains authentication credentials for a service account in GCP.",
59
62
  )
63
+ ip_type: Optional[GoogleCloudSQLIPType] = Field(
64
+ default=None,
65
+ title="IP type",
66
+ description="Specify the IP Address type required for your database (defaults to public). See the Google Cloud documentation for more information about connection options: https://cloud.google.com/sql/docs/postgres/connect-overview",
67
+ )
60
68
 
61
69
  _required_components: ClassVar[List[str]] = [
62
70
  "db_iam_user",
@@ -71,6 +79,15 @@ class GoogleCloudSQLPostgresSchema(ConnectionConfigSecretsSchema):
71
79
  v = json.loads(v)
72
80
  return KeyfileCreds.model_validate(v)
73
81
 
82
+ @field_validator("ip_type", mode="before")
83
+ @classmethod
84
+ def empty_string_to_none(cls, v: Optional[str]) -> Optional[GoogleCloudSQLIPType]:
85
+ if v == "":
86
+ return None
87
+ if v is not None:
88
+ return GoogleCloudSQLIPType(v)
89
+ return v
90
+
74
91
 
75
92
  class GoogleCloudSQLPostgresDocsSchema(
76
93
  GoogleCloudSQLPostgresSchema, NoValidationSchema
@@ -0,0 +1,9 @@
1
+ from enum import Enum
2
+
3
+
4
+ class GoogleCloudSQLIPType(str, Enum):
5
+ """Enum for Google Cloud SQL IP types"""
6
+
7
+ public = "public"
8
+ private = "private"
9
+ private_service_connect = "psc"
@@ -8,6 +8,9 @@ from sqlalchemy.engine import Engine, LegacyCursorResult, create_engine # type:
8
8
  from fides.api.schemas.connection_configuration.connection_secrets_google_cloud_sql_mysql import (
9
9
  GoogleCloudSQLMySQLSchema,
10
10
  )
11
+ from fides.api.schemas.connection_configuration.enums.google_cloud_sql_ip_type import (
12
+ GoogleCloudSQLIPType,
13
+ )
11
14
  from fides.api.service.connectors.sql_connector import SQLConnector
12
15
  from fides.api.util.collection_util import Row
13
16
  from fides.config import get_config
@@ -37,6 +40,7 @@ class GoogleCloudSQLMySQLConnector(SQLConnector):
37
40
  conn: pymysql.connections.Connection = connector.connect(
38
41
  config.instance_connection_name,
39
42
  "pymysql",
43
+ ip_type=config.ip_type or GoogleCloudSQLIPType.public,
40
44
  user=config.db_iam_user,
41
45
  db=config.dbname,
42
46
  enable_iam_auth=True,
@@ -16,6 +16,9 @@ from fides.api.graph.execution import ExecutionNode
16
16
  from fides.api.schemas.connection_configuration.connection_secrets_google_cloud_sql_postgres import (
17
17
  GoogleCloudSQLPostgresSchema,
18
18
  )
19
+ from fides.api.schemas.connection_configuration.enums.google_cloud_sql_ip_type import (
20
+ GoogleCloudSQLIPType,
21
+ )
19
22
  from fides.api.service.connectors.query_configs.google_cloud_postgres_query_config import (
20
23
  GoogleCloudSQLPostgresQueryConfig,
21
24
  )
@@ -53,6 +56,7 @@ class GoogleCloudSQLPostgresConnector(SQLConnector):
53
56
  conn: pg8000.dbapi.Connection = connector.connect(
54
57
  config.instance_connection_name,
55
58
  "pg8000",
59
+ ip_type=config.ip_type or GoogleCloudSQLIPType.public,
56
60
  user=config.db_iam_user,
57
61
  db=config.dbname or self.default_db_name,
58
62
  enable_iam_auth=True,
@@ -119,8 +119,8 @@ class SQLConnector(BaseConnector[Engine]):
119
119
  )
120
120
  except ClientResponseError as e:
121
121
  raise ConnectionException(f"Connection error: {e.message}")
122
- except Exception:
123
- raise ConnectionException("Connection error.")
122
+ except Exception as exc:
123
+ raise ConnectionException(f"Connection error: {exc}")
124
124
 
125
125
  return ConnectionTestStatus.succeeded
126
126
 
@@ -26,6 +26,7 @@ def generate_fides_data_categories() -> Type[EnumType]:
26
26
  return FidesDataCategory
27
27
 
28
28
 
29
+ # TODO: Move away from using this, it conflicts with the DataCategory model
29
30
  DataCategory = generate_fides_data_categories()
30
31
 
31
32
 
@@ -1 +1 @@
1
- <!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><meta name="next-head-count" content="2"/><link data-next-font="" rel="preconnect" href="/" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/a063d3d67fe688f6.css" as="style"/><link rel="stylesheet" href="/_next/static/css/a063d3d67fe688f6.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-42372ed130431b0a.js"></script><script src="/_next/static/chunks/webpack-32c43a8d709ca5c6.js" defer=""></script><script src="/_next/static/chunks/framework-c92fc3344e6fd165.js" defer=""></script><script src="/_next/static/chunks/main-090643377c8254e6.js" defer=""></script><script src="/_next/static/chunks/pages/_app-854abc8128542e40.js" defer=""></script><script src="/_next/static/chunks/pages/404-73e79d3760ef2658.js" defer=""></script><script src="/_next/static/h6f83-sNVA0ahtQ8eFh82/_buildManifest.js" defer=""></script><script src="/_next/static/h6f83-sNVA0ahtQ8eFh82/_ssgManifest.js" defer=""></script><style>.data-ant-cssinjs-cache-path{content:"";}</style></head><body><div id="__next"><div style="height:100%;display:flex"></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{}},"page":"/404","query":{},"buildId":"h6f83-sNVA0ahtQ8eFh82","nextExport":true,"autoExport":true,"isFallback":false,"scriptLoader":[]}</script></body></html>
1
+ <!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><meta name="viewport" content="width=device-width"/><meta name="next-head-count" content="2"/><link data-next-font="" rel="preconnect" href="/" crossorigin="anonymous"/><link rel="preload" href="/_next/static/css/a063d3d67fe688f6.css" as="style"/><link rel="stylesheet" href="/_next/static/css/a063d3d67fe688f6.css" data-n-g=""/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills-42372ed130431b0a.js"></script><script src="/_next/static/chunks/webpack-32c43a8d709ca5c6.js" defer=""></script><script src="/_next/static/chunks/framework-c92fc3344e6fd165.js" defer=""></script><script src="/_next/static/chunks/main-090643377c8254e6.js" defer=""></script><script src="/_next/static/chunks/pages/_app-854abc8128542e40.js" defer=""></script><script src="/_next/static/chunks/pages/404-73e79d3760ef2658.js" defer=""></script><script src="/_next/static/snXG8lXqPoT4hj3yvlEtk/_buildManifest.js" defer=""></script><script src="/_next/static/snXG8lXqPoT4hj3yvlEtk/_ssgManifest.js" defer=""></script><style>.data-ant-cssinjs-cache-path{content:"";}</style></head><body><div id="__next"><div style="height:100%;display:flex"></div></div><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{}},"page":"/404","query":{},"buildId":"snXG8lXqPoT4hj3yvlEtk","nextExport":true,"autoExport":true,"isFallback":false,"scriptLoader":[]}</script></body></html>
@@ -0,0 +1 @@
1
+ "use strict";(self.webpackChunk_N_E=self.webpackChunk_N_E||[]).push([[5973],{7617:function(e,s,t){t.d(s,{q:function(){return a}});var i=t(24246),n=t(91922);let a=e=>{let{label:s,isDisabled:t,...a}=e;return(0,i.jsx)(n.OK9,{"data-testid":"tab-".concat(s),_selected:{fontWeight:"600",color:"complimentary.500",borderColor:"complimentary.500"},fontSize:a.fontSize,fontWeight:"500",color:"gray.500",isDisabled:t||!1,children:s})};s.Z=e=>{let{data:s,border:t="partial",...r}=e;return(0,i.jsxs)(n.mQc,{colorScheme:"complimentary",...r,children:[(0,i.jsx)(n.tdY,{width:"partial"===t?"max-content":void 0,children:s.map(e=>(0,i.jsx)(a,{label:e.label,isDisabled:e.isDisabled,fontSize:r.fontSize},e.label))}),(0,i.jsx)(n.nPR,{children:s.map(e=>(0,i.jsx)(n.x45,{px:0,"data-testid":"tab-panel-".concat(e.label),children:e.content},e.label))})]})}},18225:function(e,s,t){var i=t(24246),n=t(91922);s.Z=e=>{let{...s}=e;return(0,i.jsx)(n.kCb,{boxSize:"full",align:"center",justify:"center",children:(0,i.jsx)(n.$jN,{color:"primary",...s})})}},77213:function(e,s,t){t.d(s,{Z:function(){return u}});var i=t(24246),n=t(91922),a=t(88038),r=t.n(a),o=t(86677);t(27378);var c=t(25980),d=t(90867),l=t(77830),h=()=>{let e=(0,o.useRouter)();return(0,i.jsx)(n.xuv,{bg:"gray.50",border:"1px solid",borderColor:"blue.400",borderRadius:"md",justifyContent:"space-between",p:5,mb:5,mt:5,children:(0,i.jsxs)(n.xuv,{children:[(0,i.jsxs)(n.Kqy,{direction:{base:"column",sm:"row"},justifyContent:"space-between",children:[(0,i.jsx)(n.xvT,{fontWeight:"semibold",children:"Configure your storage and messaging provider"}),(0,i.jsx)(n.wpx,{onClick:()=>{e.push(l.fz)},children:"Configure"})]}),(0,i.jsxs)(n.xvT,{children:["Before Fides can process your privacy requests we need two simple steps to configure your storage and email client."," "]})]})})},u=e=>{let{children:s,title:t,padded:a=!0,mainProps:l}=e,u=(0,c.hz)(),x=(0,o.useRouter)(),m="/privacy-requests"===x.pathname||"/datastore-connection"===x.pathname,j=!(u.flags.privacyRequestsConfiguration&&m),{data:p}=(0,d.JE)(void 0,{skip:j}),{data:g}=(0,d.PW)(void 0,{skip:j}),y=u.flags.privacyRequestsConfiguration&&(!p||!g)&&m;return(0,i.jsxs)(n.kCb,{"data-testid":t,direction:"column",h:"100vh",children:[(0,i.jsxs)(r(),{children:[(0,i.jsxs)("title",{children:["Fides Admin UI - ",t]}),(0,i.jsx)("meta",{name:"description",content:"Privacy Engineering Platform"}),(0,i.jsx)("link",{rel:"icon",href:"/favicon.ico"})]}),(0,i.jsxs)(n.kCb,{as:"main",direction:"column",py:a?6:0,px:a?10:0,h:a?"calc(100% - 48px)":"full",flex:1,minWidth:0,overflow:"auto",...l,children:[y?(0,i.jsx)(h,{}):null,s]})]})}},58754:function(e,s,t){var i=t(24246),n=t(91922),a=t(70788);s.Z=e=>{let{heading:s,breadcrumbItems:t,isSticky:r=!0,children:o,rightContent:c,style:d,...l}=e;return(0,i.jsxs)("div",{...l,style:r?{position:"sticky",top:"-24px",paddingTop:"24px",paddingBottom:"24px",paddingLeft:"40px",marginLeft:"-40px",paddingRight:"40px",marginRight:"-40px",marginTop:"-24px",left:0,zIndex:20,backgroundColor:"white",...d}:{paddingBottom:"24px",...d},children:[(0,i.jsxs)(n.jqI,{justify:"space-between",children:["string"==typeof s?(0,i.jsx)(n.lQT,{className:t||o?"pb-4":void 0,level:1,"data-testid":"page-heading",children:s}):s,c&&(0,i.jsx)("div",{"data-testid":"page-header-right-content",children:c})]}),!!t&&(0,i.jsx)(a.m,{className:o?"pb-4":void 0,items:t,"data-testid":"page-breadcrumb"}),o]})}},79789:function(e,s,t){t.d(s,{Hn:function(){return o},XU:function(){return r},Z5:function(){return c},aG:function(){return h},cB:function(){return a},hX:function(){return l},vQ:function(){return d}});var i=t(24246),n=t(91922);let a=e=>{let{text:s,...t}=e;return(0,i.jsx)(n.X6q,{fontSize:"sm",mt:4,mb:1,...t,children:s})},r=e=>{let{children:s}=e;return(0,i.jsx)(n.xvT,{fontSize:"14px",mb:4,children:s})},o=e=>{let{children:s,href:t}=e;return(0,i.jsx)(n.rUS,{href:t,textDecoration:"underline",isExternal:!0,children:s})},c=e=>{let{children:s}=e;return(0,i.jsx)(n.QI$,{fontSize:"14px",mb:4,children:s})},d=e=>{let{children:s}=e;return(0,i.jsx)(n.GSI,{fontSize:"14px",mb:4,ml:6,children:s})},l=e=>{let{children:s}=e;return(0,i.jsx)(n.EKh,{display:"block",whiteSpace:"pre",p:4,mb:4,overflowX:"scroll",children:s})},h=e=>{let{data:s}=e;return(0,i.jsxs)(n.iA_,{fontSize:"14px",children:[(0,i.jsx)(n.hrZ,{children:(0,i.jsxs)(n.Tr,{children:[(0,i.jsx)(n.Th,{children:"Permission"}),(0,i.jsx)(n.Th,{children:"Description"})]})}),(0,i.jsx)(n.p3B,{children:s.map(e=>(0,i.jsxs)(n.Tr,{children:[(0,i.jsx)(n.Td,{children:(0,i.jsx)(n.Vp9,{children:e.permission})}),(0,i.jsx)(n.Td,{children:e.description})]},e.permission))})]})}},97181:function(e,s,t){t.d(s,{d:function(){return d}});var i=t(24246),n=t(91922),a=t(34090),r=t(27378),o=t(46238),c=t(40324);let d=e=>{let{name:s,label:t,labelProps:d,tooltip:l,isRequired:h,layout:u="inline",helperText:x,...m}=e,[j,p,{setValue:g}]=(0,a.U$)(s),y=!!(p.touched&&p.error),[v,f]=(0,r.useState)("");j.value||"tags"!==m.mode&&"multiple"!==m.mode||(j.value=[]),"tags"===m.mode&&"string"==typeof j.value&&(j.value=[j.value]);let C="tags"===m.mode?(e,s)=>e?e.value!==v||j.value.includes(v)?m.optionRender?m.optionRender(e,s):e.label:'Create "'.concat(v,'"'):void 0:m.optionRender||void 0,S=e=>{f(e),m.onSearch&&m.onSearch(e)},b=(e,s)=>{g(e),m.onChange&&m.onChange(e,s)};return"inline"===u?(0,i.jsx)(n.NIc,{isInvalid:y,isRequired:h,children:(0,i.jsxs)(n.rjZ,{templateColumns:t?"1fr 3fr":"1fr",children:[t?(0,i.jsx)(c.__,{htmlFor:m.id||s,...d,children:t}):null,(0,i.jsxs)(n.jqI,{align:"center",children:[(0,i.jsxs)(n.jqI,{vertical:!0,flex:1,className:"mr-2",children:[(0,i.jsx)(n.WPr,{...j,id:m.id||s,"data-testid":"controlled-select-".concat(j.name),...m,optionRender:C,onSearch:"tags"===m.mode?S:void 0,onChange:b,value:j.value||void 0,status:y?"error":void 0}),x&&(0,i.jsx)(n.Q6r,{children:x}),(0,i.jsx)(c.Bc,{isInvalid:y,message:p.error,fieldName:j.name})]}),(0,i.jsx)(o.b,{label:l})]})]})}):(0,i.jsx)(n.NIc,{isInvalid:y,isRequired:h,children:(0,i.jsxs)(n.gCW,{alignItems:"start",children:[(0,i.jsxs)(n.jqI,{align:"center",children:[t?(0,i.jsx)(c.__,{htmlFor:m.id||s,fontSize:"xs",my:0,mr:1,...d,children:t}):null,(0,i.jsx)(o.b,{label:l})]}),(0,i.jsx)(n.WPr,{...j,id:m.id||s,"data-testid":"controlled-select-".concat(j.name),...m,optionRender:C,onSearch:"tags"===m.mode?S:void 0,onChange:b,value:j.value||void 0,status:y?"error":void 0}),x&&(0,i.jsx)(n.Q6r,{style:{marginTop:0},children:x}),(0,i.jsx)(c.Bc,{isInvalid:y,message:p.error,fieldName:j.name})]})})}},14047:function(e,s,t){t.d(s,{H:function(){return a},V:function(){return i.V}});var i=t(84306),n=t(812);let a=()=>{let{errorAlert:e}=(0,i.V)();return{handleError:s=>{let t="An unexpected error occurred. Please try again.";(0,n.Ot)(s)?t=s.data.detail:(0,n.tB)(s)&&(t=s.data.detail[0].msg),e(t)}}}},84306:function(e,s,t){t.d(s,{V:function(){return a}});var i=t(24246),n=t(91922);let a=()=>{let e=(0,n.pmc)();return{errorAlert:(s,t,a)=>{let r={...a,position:(null==a?void 0:a.position)||"top",render:e=>{let{onClose:a}=e;return(0,i.jsxs)(n.bZj,{alignItems:"normal",status:"error","data-testid":"error-alert",children:[(0,i.jsx)(n.zMQ,{}),(0,i.jsxs)(n.xuv,{children:[t&&(0,i.jsx)(n.CdC,{children:t}),(0,i.jsx)(n.XaZ,{children:s})]}),(0,i.jsx)(n.PZ7,{onClick:a,position:"relative",right:0,size:"sm",top:-1})]})}};(null==a?void 0:a.id)&&e.isActive(a.id)?e.update(a.id,r):e(r)},successAlert:(s,t,a)=>{let r={...a,position:(null==a?void 0:a.position)||"top",render:e=>{let{onClose:a}=e;return(0,i.jsxs)(n.bZj,{alignItems:"normal",status:"success",variant:"subtle","data-testid":"success-alert",children:[(0,i.jsx)(n.zMQ,{}),(0,i.jsxs)(n.xuv,{children:[t&&(0,i.jsx)(n.CdC,{children:t}),(0,i.jsx)(n.XaZ,{children:s})]}),(0,i.jsx)(n.PZ7,{onClick:a,position:"relative",right:0,size:"sm",top:-1})]})}};(null==a?void 0:a.id)&&e.isActive(a.id)?e.update(a.id,r):e(r)}}}},8133:function(e,s,t){var i=t(24246),n=t(91922);s.Z=e=>{let{title:s,children:t,isOpen:a,onClose:r,...o}=e;return(0,i.jsxs)(n.u_l,{isOpen:a,onClose:r,isCentered:!0,scrollBehavior:"inside",size:"xl",id:"add-modal",...o,children:[(0,i.jsx)(n.ZAr,{}),(0,i.jsxs)(n.hzk,{textAlign:"left",p:0,"data-testid":"add-modal-content",children:[(0,i.jsx)(n.xBx,{p:0,children:(0,i.jsx)(n.xuv,{backgroundColor:"gray.50",px:6,py:4,border:"1px",borderColor:"gray.200",borderTopRadius:6,display:"flex",justifyContent:"space-between",alignItems:"center",children:(0,i.jsx)(n.X6q,{as:"h3",size:"sm",children:s})})}),(0,i.jsx)(n.fef,{pb:4,overflow:"auto",children:t})]})]})}},70788:function(e,s,t){t.d(s,{m:function(){return d}});var i=t(24246),n=t(91922),a=t(79894),r=t.n(a),o=t(27378);let{Text:c}=n.AntTypography,d=e=>{let{items:s,...t}=e,a=(0,o.useMemo)(()=>null==s?void 0:s.map((e,t)=>{let a=t===s.length-1,o={...e},d=o.onClick&&!o.href;return("string"==typeof o.title&&(o.title=(0,i.jsx)(c,{style:{color:"inherit",maxWidth:a?void 0:400},ellipsis:!a,children:o.title})),d)?o.title=(0,i.jsx)(n.wpx,{type:"text",size:"small",icon:o.icon,onClick:o.onClick,className:"ant-breadcrumb-link -mt-px px-1 text-inherit",children:o.title}):(o.icon&&(o.title=(0,i.jsxs)(i.Fragment,{children:[(0,i.jsx)("span",{className:"anticon align-text-bottom",children:o.icon}),o.title]})),o.href&&o.title&&(o.title=(0,i.jsx)(r(),{href:o.href,className:"ant-breadcrumb-link",children:o.title}),delete o.href)),o}),[s]);return(0,i.jsx)(n.zrq,{items:a,...t})}},41337:function(e,s,t){var i=t(24246),n=t(91922);t(27378);var a=t(16643),r=t(16394),o=t(14746);let c=o.Ny+o.iW.get(a.Rj.WEBSITE),d=e=>void 0!==e.connection_type,l=e=>void 0!==e.encoded_icon,h=e=>(null==e?void 0:e.connection_type)===a.Rj.WEBSITE;s.Z=e=>{let{data:s,...t}=e;return(0,i.jsx)(n.Eep,{boxSize:"32px",objectFit:"cover",src:(()=>{let e;if(l(s)&&s.encoded_icon)return"data:image/svg+xml;base64,".concat(s.encoded_icon);if(h(s)){var t;let e=null===(t=s.secrets)||void 0===t?void 0:t.url;if(!e)return c;let i=(0,r.ge)(e);return(0,r.tl)(i,100)}if(d(s))e=[...o.iW].find(e=>{var t,i;let[n]=e;return s.connection_type.toString()!==a.Rj.SAAS&&s.connection_type.toString()===n||s.connection_type.toString()===a.Rj.SAAS&&(null===(i=s.saas_config)||void 0===i?void 0:null===(t=i.type)||void 0===t?void 0:t.toString())===n.toString()});else if(l(s)){let{identifier:t}=s;e=[...o.iW].find(e=>{let[s]=e;return s.toLowerCase()===t.toLowerCase()})}return e?o.Ny+e[1]:o.VD})(),fallbackSrc:h(s)?c:o.VD,alt:(()=>{if(d(s)){var e;return null!==(e=s.name)&&void 0!==e?e:s.key}return l(s)?s.human_readable:s})(),...t})}},15872:function(e,s,t){var i=t(24246),n=t(91922),a=t(86677);t(27378);var r=t(77830),o=t(14207);s.Z=e=>{let{connection_key:s,showMenu:t}=e,{isOpen:c,onOpen:d,onClose:l}=(0,n.qY0)(),[h,u]=(0,o.R5)(),x=(0,a.useRouter)(),m=()=>{u.isLoading||l()};return(0,i.jsxs)(i.Fragment,{children:[t&&(0,i.jsx)(n.sNh,{_focus:{color:"complimentary.500",bg:"gray.100"},onClick:d,children:(0,i.jsx)(n.xvT,{fontSize:"sm",children:"Delete"})}),!t&&(0,i.jsx)(n.wpx,{onClick:d,children:"Delete integration"}),(0,i.jsxs)(n.u_l,{isCentered:!0,isOpen:c,onClose:m,children:[(0,i.jsx)(n.ZAr,{}),(0,i.jsxs)(n.hzk,{children:[(0,i.jsx)(n.xBx,{children:"Delete integration"}),(0,i.jsx)(n.olH,{}),(0,i.jsx)(n.fef,{pb:6,children:(0,i.jsx)(n.Kqy,{direction:"column",spacing:"15px",children:(0,i.jsx)(n.xvT,{color:"gray.600",fontSize:"sm",fontWeight:"sm",lineHeight:"20px",children:"Deleting an integration may impact any privacy request that is currently in progress. Do you wish to proceed?"})})}),(0,i.jsxs)(n.mzw,{className:"flex gap-4",children:[(0,i.jsx)(n.wpx,{onClick:m,className:"w-1/2",children:"Cancel"}),(0,i.jsx)(n.wpx,{onClick:()=>{s&&(h(s),t||x.push(r.KH))},loading:u.isLoading,type:"primary",className:"w-1/2",children:"Delete integration"})]})]})]})]})}},19812:function(e,s,t){t.d(s,{t:function(){return o}});var i=t(14047),n=t(14207),a=t(27378),r=t(41966);let o=e=>{var s,t,o;let{connectionConfig:c}=e,[d]=(0,n.S6)(),{data:l}=(0,n.Eg)(null!==(t=null==c?void 0:c.key)&&void 0!==t?t:""),h=null!==(o=null==l?void 0:null===(s=l.items)||void 0===s?void 0:s.map(e=>e.fides_key))&&void 0!==o?o:[],u=h.map(e=>({label:e,value:e})),{data:x}=(0,r.LH)({onlyUnlinkedDatasets:!0}),m=(0,a.useMemo)(()=>{var e;return null!==(e=null==x?void 0:x.map(e=>({value:e.fides_key,label:"".concat(e.name," (").concat(e.fides_key,")")||0})))&&void 0!==e?e:[]},[x]),{errorAlert:j,successAlert:p}=(0,i.V)();return{dropdownOptions:[...u,...m],initialDatasets:h,patchConnectionDatasetConfig:async function(e,s){var t,i,n;let{showSuccessAlert:a=!0}=arguments.length>2&&void 0!==arguments[2]?arguments[2]:{},r=null!==(n=null===(t=e.dataset)||void 0===t?void 0:t.map(e=>({fides_key:e,ctl_dataset_fides_key:e})))&&void 0!==n?n:[],o=await d({connection_key:s,dataset_pairs:r}).unwrap();(null===(i=o.failed)||void 0===i?void 0:i.length)>0?j(o.failed[0].message):a&&p("Dataset successfully updated!")}}}},33335:function(e,s,t){t.d(s,{E:function(){return i}});let i=e=>e.toLowerCase().replace(/[ .]/g,"_").replace(/[^a-zA-Z0-9_<>-]/g,"")},45216:function(e,s,t){var i=t(91922),n=t(812),a=t(16394),r=t(14207);s.Z=e=>{let[s,{data:t,fulfilledTimeStamp:o,isLoading:c,isFetching:d}]=(0,r.h2)(),l=(0,i.pmc)();return{testConnection:async()=>{var t,i,a,r;if(!e)return;let o=await s(e.key);if(o.isError)l({status:"error",description:(0,n.e$)(o.error,"Unable to test connection. Please try again.")});else if((null===(t=o.data)||void 0===t?void 0:t.test_status)==="succeeded")l({status:"success",description:"Connected successfully"});else if((null===(i=o.data)||void 0===i?void 0:i.test_status)==="failed"){let e="Connection test failed.";(null===(a=o.data)||void 0===a?void 0:a.failure_reason)&&(e+=" ".concat(null===(r=o.data)||void 0===r?void 0:r.failure_reason)),l({status:"warning",description:e})}},isLoading:c||d,testData:{timestamp:o?(0,a.p6)(o):null==e?void 0:e.last_test_timestamp,succeeded:t?"succeeded"===t.test_status:!!(null==e?void 0:e.last_test_succeeded)}}}},41553:function(e,s,t){var i=t(24246),n=t(91922),a=t(16394);s.Z=e=>{let{testData:s}=e;if(!s.timestamp)return(0,i.jsx)(n.xvT,{"data-testid":"connection-status",children:"Connection not tested"});let t=(0,a.p6)(s.timestamp);return s.succeeded?(0,i.jsxs)(n.kCb,{color:"success-text.900",align:"center","data-testid":"connection-status",children:[(0,i.jsx)(n.rE2,{mr:2,boxSize:4}),(0,i.jsxs)(n.xvT,{children:["Last connected ",t]})]}):(0,i.jsxs)(n.kCb,{color:"error-text.900",align:"center","data-testid":"connection-status",children:[(0,i.jsx)(n.iid,{mr:2,boxSize:4}),(0,i.jsxs)(n.xvT,{children:["Last connection failed ",t]})]})}},75595:function(e,s,t){var i=t(24246),n=t(91922),a=t(41337),r=t(15872),o=t(45216),c=t(15704),d=t(41553);s.Z=e=>{let{integration:s,showTestNotice:t,otherButtons:l,showDeleteButton:h,configureButtonLabel:u="Configure",onConfigureClick:x}=e,{testConnection:m,isLoading:j,testData:p}=(0,o.Z)(s),g=(0,c.ZP)(null==s?void 0:s.connection_type);return(0,i.jsxs)(n.xuv,{maxW:"760px",borderWidth:1,borderRadius:"lg",overflow:"hidden",padding:"12px",marginBottom:"24px","data-testid":"integration-info-".concat(null==s?void 0:s.key),children:[(0,i.jsxs)(n.kCb,{children:[(0,i.jsx)(a.Z,{data:null!=s?s:"",boxSize:"50px"}),(0,i.jsxs)(n.kCb,{direction:"column",flexGrow:1,marginLeft:"16px",children:[(0,i.jsx)(n.xvT,{color:"gray.700",fontWeight:"semibold",children:(null==s?void 0:s.name)||"(No name)"}),t?(0,i.jsx)(d.Z,{testData:p}):(0,i.jsx)(n.xvT,{color:"gray.700",fontSize:"sm",fontWeight:"semibold",mt:1,children:g.category})]}),(0,i.jsxs)("div",{className:"flex gap-4",children:[h&&s&&(0,i.jsx)(r.Z,{showMenu:!1,connection_key:s.key}),t&&(0,i.jsx)(n.wpx,{onClick:m,loading:j,"data-testid":"test-connection-btn",children:"Test connection"}),l,x&&(0,i.jsx)(n.wpx,{onClick:x,"data-testid":"configure-btn",children:u})]})]}),(0,i.jsx)(n.Eq9,{marginTop:"16px",children:g.tags.map(e=>(0,i.jsx)(n.j8w,{children:e},e))})]})}},15987:function(e,s,t){var i=t(24246),n=t(91922),a=t(34090),r=t(90104),o=t.n(r),c=t(92465),d=t.n(c),l=t(25389),h=t.n(l),u=t(15539),x=t.n(u),m=t(55484),j=t(18225),p=t(97181),g=t(40324),y=t(812),v=t(20682),f=t(41966),C=t(94725),S=t(19812),b=t(33335),A=t(1315),D=t(16643),w=t(31883);s.Z=e=>{var s,t;let{connection:r,connectionOption:c,onCancel:l,description:u}=e,[R,{isLoading:E}]=(0,C.Pp)(),[_,{isLoading:T}]=(0,C.pH)(),[H,{isLoading:B}]=(0,A.qd)(),{data:k,isLoading:F}=(0,v.n3)(c.identifier),{data:L}=(0,A.K3)(),I=null==L?void 0:L.map(e=>{var s;return{label:null!==(s=e.name)&&void 0!==s?s:e.fides_key,value:e.fides_key}}),{data:O}=(0,f.LH)({minimal:!0,connection_type:D.Rj.BIGQUERY}),U=null==O?void 0:O.map(e=>{var s;return{label:null!==(s=e.name)&&void 0!==s?s:e.fides_key,value:e.fides_key}}),{patchConnectionDatasetConfig:M,initialDatasets:q}=(0,S.t)({connectionConfig:r}),P=E||T||B,N={name:null!==(s=null==r?void 0:r.name)&&void 0!==s?s:"",description:null!==(t=null==r?void 0:r.description)&&void 0!==t?t:"",secrets:h()(null==k?void 0:k.properties,(e,s)=>{var t,i;return null!==(i=null==r?void 0:null===(t=r.secrets)||void 0===t?void 0:t[s])&&void 0!==i?i:""}),dataset:q},Q=(0,n.pmc)(),G=!!r,Z=e=>x()(h()(e,(e,s)=>{var t,i;return(null!==(i=null==r?void 0:null===(t=r.secrets)||void 0===t?void 0:t[s])&&void 0!==i?i:"")===e?void 0:e}),d()),z=async e=>{var s;let t;let i=Z(e.secrets),n=G?{...r,disabled:null!==(s=r.disabled)&&void 0!==s&&s,name:e.name,description:e.description,secrets:void 0}:{name:e.name,key:(0,b.E)(e.name),connection_type:c.identifier,access:D.uv.READ,disabled:!1,description:e.description,secrets:e.secrets,dataset:e.dataset};if(t=e.system_fides_key?await H({systemFidesKey:e.system_fides_key,connectionConfigs:[n]}):await _(n),(0,w.D4)(t)){Q({status:"error",description:(0,y.e$)(t.error,"A problem occurred while ".concat(G?"updating":"creating"," this integration. Please try again."))});return}if(!e.secrets){Q({status:"success",description:"Integration ".concat(G?"updated":"created"," successfully")});return}if(!o()(i)){let e=await R({connection_key:n.key,secrets:i});if((0,w.D4)(e)){Q({status:"error",description:(0,y.e$)(e.error,"An error occurred while ".concat(G?"updating":"creating"," this integration's secret. Please try again."))});return}}Q({status:"success",description:"Integration secret ".concat(G?"updated":"created"," successfully")}),l(),n&&e.dataset&&c.identifier===D.Rj.DATAHUB&&await M(e,n.key,{showSuccessAlert:!1})};if(F)return(0,i.jsx)(j.Z,{});let W=e=>Object.entries(e.properties).map(s=>{let[t,n]=s,a="secrets.".concat(t);return(0,i.jsx)(g.j0,{name:a,id:a,type:n.sensitive?"password":void 0,label:n.title,isRequired:e.required.includes(t),tooltip:n.description,variant:"stacked"},a)});return(0,i.jsxs)(i.Fragment,{children:[u&&(0,i.jsx)(n.xuv,{padding:"20px 24px",backgroundColor:"gray.50",borderRadius:"md",border:"1px solid",borderColor:"gray.200",fontSize:"sm",marginTop:"16px",children:u}),(0,i.jsx)(a.J9,{initialValues:N,enableReinitialize:!0,onSubmit:z,validationSchema:(e=>{let s=Object.entries(e.properties).map(s=>{let[t,i]=s;return[t,e.required.includes(t)?m.Z_().required().label(i.title):m.Z_().nullable().label(i.title)]});return m.Ry().shape({name:m.Z_().required().label("Name"),description:m.Z_().nullable().label("Description"),secrets:m.Ry().shape(Object.fromEntries(s))})})(k),children:e=>{let{dirty:s,isValid:t,resetForm:r}=e;return(0,i.jsx)(a.l0,{children:(0,i.jsxs)(n.gCW,{alignItems:"start",spacing:6,mt:4,children:[(0,i.jsx)(g.j0,{id:"name",name:"name",label:"Name",variant:"stacked",isRequired:!0}),(0,i.jsx)(g.j0,{id:"description",name:"description",label:"Description",variant:"stacked"}),W(k),!G&&(0,i.jsx)(p.d,{id:"system_fides_key",name:"system_fides_key",options:null!=I?I:[],label:"System",tooltip:"The system to associate with the integration",layout:"stacked"}),c.identifier===D.Rj.DATAHUB&&(0,i.jsx)(p.d,{id:"dataset",name:"dataset",options:null!=U?U:[],label:"Datasets",tooltip:"Only BigQuery datasets are supported. Selected datasets will sync with matching DataHub datasets. If none are selected, all datasets will be included by default.",layout:"stacked",mode:"multiple"}),(0,i.jsxs)("div",{className:"flex w-full justify-between",children:[(0,i.jsx)(n.wpx,{onClick:()=>{l(),r()},children:"Cancel"}),(0,i.jsx)(n.wpx,{htmlType:"submit",type:"primary",disabled:!s||!t,loading:P,"data-testid":"save-btn",children:"Save"})]})]})})}})]})}},15704:function(e,s,t){t.d(s,{FO:function(){return B},jq:function(){return k},ZP:function(){return L}}),(i=n||(n={})).DATA_CATALOG="Data Catalog",i.DATA_WAREHOUSE="Data Warehouse",i.DATABASE="Database",i.WEBSITE="Website";var i,n,a=t(24246),r=t(91922),o=t(79789),c=e=>{let{children:s}=e,{isOpen:t,onToggle:i}=(0,r.qY0)();return(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(r.UO1,{in:t,children:s}),(0,a.jsx)(r.xvT,{fontSize:"sm",cursor:"pointer",textDecoration:"underline",onClick:i,children:t?"Show less":"Show more"})]})},d=t(16643);let l={name:"Google BigQuery",key:"bq_placeholder",connection_type:d.Rj.BIGQUERY,access:d.uv.READ,created_at:""},h=[{permission:"bigquery.jobs.create",description:"Run jobs (e.g. queries) within the project. This is only needed for the Fides Project where the Fides service account is located."},{permission:"bigquery.jobs.list",description:"Manage the queries that the service account performs. This is only needed for the Fides Project where the Fides service account is located."},{permission:"bigquery.routines.get",description:"Allow the service account to retrieve custom routines (e.g. queries) on associated datasets and tables."},{permission:"bigquery.routines.list",description:"Allow the service account to manage the custom routines (e.g. queries) that run on associated datasets and tables."}],u=[{permission:"bigquery.datasets.get",description:"Retrieve metadata and list tables for the specified project."},{permission:"bigquery.tables.get",description:"Retrieve metadata for the specified table."},{permission:"bigquery.tables.getData",description:"Read data in the specified table."},{permission:"bigquery.tables.list",description:"List all tables in the specified dataset."},{permission:"resourcemanager.projects.get",description:"Retrieve metadata for the specified project."}],x={placeholder:l,category:n.DATA_WAREHOUSE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Continuously monitor BigQuery to detect and track schema-level changes, automatically discover and label data categories as well as automatically process DSR (privacy requests) and consent enforcement to proactively manage data governance risks."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Data Warehouse"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Cloud provider"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"}),(0,a.jsx)(r.HCh,{children:"DSR automation"}),(0,a.jsx)(r.HCh,{children:"Consent orchestration"})]}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsx)(o.XU,{children:"For detection and discovery, Fides requires a read-only BigQuery service account with limited permissions. If you intend to automate governance for DSR or Consent, Fides requires a read-and-write BigQuery service account to any project you would like Fides to govern."}),(0,a.jsx)(o.XU,{children:"A BigQuery administrator can create the necessary role for Fides using BigQuery's roles guide and assign this to a service account using BigQuery's service account guide."}),(0,a.jsx)(o.XU,{children:"The permissions allow Fides to read the schema of, and data stored in projects, datasets and tables as well write restricted updates based on your policy configurations to tables you specify as part of DSR and Consent orchestration."}),(0,a.jsx)(o.cB,{text:"Permissions list"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"bigquery.jobs.create"}),(0,a.jsx)(r.HCh,{children:"bigquery.jobs.list"}),(0,a.jsx)(r.HCh,{children:"bigquery.routines.get"}),(0,a.jsx)(r.HCh,{children:"bigquery.routines.list"}),(0,a.jsx)(r.HCh,{children:"bigquery.datasets.get"}),(0,a.jsx)(r.HCh,{children:"bigquery.tables.get"}),(0,a.jsx)(r.HCh,{children:"bigquery.tables.getData"}),(0,a.jsx)(r.HCh,{children:"bigquery.tables.list"}),(0,a.jsx)(r.HCh,{children:"bigquery.tables.updateData"}),(0,a.jsx)(r.HCh,{children:"resourcemanager.projects.get"})]})]})]}),{}),instructions:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Configuring a Fides -> BigQuery Integration"}),(0,a.jsx)(o.cB,{text:"Step 1: Create a Fides project"}),(0,a.jsxs)(o.XU,{children:["Create a Fides Project using"," ",(0,a.jsx)(o.Hn,{href:"https://cloud.google.com/resource-manager/docs/creating-managing-projects#creating_a_project",children:"BigQuery's project creation guide"}),"."]}),(0,a.jsx)(o.cB,{text:"Step 2: Create a Fides role in GCP"}),(0,a.jsxs)(o.vQ,{children:[(0,a.jsxs)(r.HCh,{children:["Create a custom role for Fides using BigQuery's"," ",(0,a.jsx)(o.Hn,{href:"https://cloud.google.com/iam/docs/creating-custom-roles#creating_a_custom_role",children:"roles guide"}),"."]}),(0,a.jsx)(r.HCh,{children:"Follow the sections below to grant permissions to this role for the Fides project and any project you would like Fides to manage."})]}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Step 3: Assign permissions to the Fides project"}),(0,a.jsx)(o.XU,{children:"Assign the following permissions to the Fides Project that will be used by your Fides service account to run queries:"}),(0,a.jsx)(o.aG,{data:h}),(0,a.jsx)(o.cB,{text:"Step 4: Assign permissions to any project you’d like Fides to monitor"}),(0,a.jsx)(o.XU,{children:"Grant the following permissions to the Fides service account in every project where you would like Fides detection and discovery monitoring."}),(0,a.jsx)(o.aG,{data:u}),(0,a.jsx)(o.cB,{text:"Step 5: Create a Fides service account in the Fides Project"}),(0,a.jsxs)(o.vQ,{children:[(0,a.jsxs)(r.HCh,{children:["Create a service account for Fides using BigQuery's"," ",(0,a.jsx)(o.Hn,{href:"https://cloud.google.com/iam/docs/service-accounts-create",children:"service account guide"}),"."]}),(0,a.jsx)(r.HCh,{children:"Assign the previously created role to this service account."}),(0,a.jsxs)(r.HCh,{children:["Download the service account JSON keyfile."," ",(0,a.jsx)("strong",{children:"Note: this is sensitive information that should not be shared."})," ","An example of this is below:"]})]}),(0,a.jsx)(o.hX,{children:'{\n "type": "service_account",\n "project_id": "project-id-123456",\n "private_key_id": "0123456789abcdef0123456789abcdef01234567",\n "private_key": "-----BEGIN PRIVATE KEY-----\\nMIIyourkey-----\\nEND PRIVATE KEY-----\\n",\n "client_email": "test@project-id-123456.iam.gserviceaccount.com",\n "client_id": "012345678901234567890",\n "auth_uri": "https://accounts.google.com/o/oauth2/auth",\n "token_uri": "https://oauth2.googleapis.com/token",\n "auth_provider_x509_cert_url": "https://www.googleapis.com/oauth2/v1/certs",\n "client_x509_cert_url": "https://www.googleapis.com/robot/v1/metadata/x509/test%40project-id-123456.iam.gserviceaccount.com"\n}'}),(0,a.jsx)(o.cB,{text:"Step 6: Use the JSON key to authenticate your integration"}),(0,a.jsx)(o.XU,{children:"Provide the JSON key to your Fides instance to securely connect Fides."})]})]}),{}),tags:["DSR Automation","Discovery","Detection"]},m={name:"Datahub",key:"datahub_placeholder",connection_type:d.Rj.DATAHUB,access:d.uv.READ,created_at:""},j=(0,a.jsx)(a.Fragment,{children:"Set up a connection to your DataHub instance by providing a name, server URL, and access token. You can also select the BigQuery datasets you'd like to sync—these will be matched with corresponding datasets in DataHub. If no datasets are selected, all available BigQuery datasets will be included by default."}),p={placeholder:m,category:n.DATA_CATALOG,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"DataHub is a metadata platform designed to help organizations manage and govern their data. It acts as a centralized repository for tracking and discovering data assets across an organization, helping data teams understand where their data resides, how it's used, and how it flows through various systems."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsx)(o.Z5,{children:(0,a.jsx)(r.HCh,{children:"Data Catalog"})}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsx)(o.Z5,{children:(0,a.jsx)(r.HCh,{children:"The related user to the access token must have at least the Editor role on DataHub."})})]})]}),{}),tags:["Sync"],description:j},g={name:"DynamoDB",key:"dynamo_placeholder",connection_type:d.Rj.DYNAMODB,access:d.uv.READ,created_at:""},y=[{permission:"AmazonDynamoDBReadOnlyAccess",description:"Provides read-only access to Amazon DynamoDB via the AWS Management Console."},{permission:"AmazonDynamoDBFullAccess",description:"Provides full access to Amazon DynamoDB via the AWS Management Console. Only needed if automating governance for DSR or Consent."}],v={placeholder:g,category:n.DATABASE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Continuously monitor DynamoDB to detect and track schema-level changes, automatically discover and label data categories as well as automatically process DSR (privacy requests) and consent enforcement to proactively manage data governance risks."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"NoSQL database"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Cloud provider"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"})]}),(0,a.jsx)(o.cB,{text:"Permissions and Policies"}),(0,a.jsxs)(o.XU,{children:["For detection and discovery, Fides requires an IAM user with read-only DynamoDB permissions in order to detect, discover, and classify sensitive data. The AWS-managed"," ",(0,a.jsx)(r.EKh,{children:"AmazonDynamoDBReadOnlyAccess"})," policy can be used to assign these permissions. If you intend to automate governance for DSR or Consent, Fides requires an IAM user with read-and-write DynamoDB permissions. The AWS-managed",(0,a.jsx)(r.EKh,{children:"AmazonDynamoDBFullAccess"})," policy can be used to assign these permissions. An IAM administrator can create the necessary principal for Fides using the AWS IAM guides, and assign the appropriate permissions policy to the IAM user."]}),(0,a.jsx)(o.XU,{children:"The permissions allow Fides to read the schema of, and data stored in, DynamoDB tables. This data is inspected only for the purpose of detecting sensitive data risks and no data is stored by Fides. As part of DSR or Consent orchestration, Fides will only write restricted updates to the tables specified by your Fides policy configuration."}),(0,a.jsx)(o.cB,{text:"Policy List"}),(0,a.jsx)(o.XU,{children:"The following AWS-managed policies provide the necessary permissions for Fides:"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"AmazonDynamoDBReadOnlyAccess"}),(0,a.jsx)(r.HCh,{children:"AmazonDynamoDBFullAccess (only needed if automating governance for DSR or Consent)"})]})]})]}),{}),instructions:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Configuring a Fides -> DynamoDB Integration"}),(0,a.jsx)(o.cB,{text:"Step 1: Create an IAM user in AWS"}),(0,a.jsxs)(o.XU,{children:["Create an IAM user for Fides' DynamoDB access following the"," ",(0,a.jsx)(o.Hn,{href:"https://docs.aws.amazon.com/IAM/latest/UserGuide/getting-started.html#getting-started-iam-user",children:"AWS IAM user guide"}),"."]}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Step 2: Assign policies to the IAM user"}),(0,a.jsx)(o.XU,{children:"Grant the necessary permissions to the IAM user by attaching directly the appropriate AWS-managed policy for your use case:"}),(0,a.jsx)(o.aG,{data:y}),(0,a.jsx)(o.cB,{text:"Step 3: Create an access key for the IAM user"}),(0,a.jsxs)(o.vQ,{children:[(0,a.jsxs)(r.HCh,{children:["Create an access key for the IAM user under"," ",(0,a.jsx)("strong",{children:"Security credentials"})]}),(0,a.jsx)(r.HCh,{children:"Select the Other use case"}),(0,a.jsx)(r.HCh,{children:"Copy the Access Key ID and Secret Access Key"})]}),(0,a.jsx)(o.cB,{text:"Use the Credentials to Authenticate Your Integration"}),(0,a.jsx)(o.XU,{children:"Provide the credentials to your Fides instance to securely connect Fides."})]})]}),{}),tags:["Database","DSR Automation","Discovery","Detection"]},f={placeholder:{name:"Google Cloud SQL for MySQL",key:"google_cloud_sql_for_mysql_placeholder",connection_type:d.Rj.GOOGLE_CLOUD_SQL_MYSQL,access:d.uv.READ,created_at:""},category:n.DATABASE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Google Cloud SQL for MySQL is a fully-managed relational database service that simplifies the setup, maintenance, management, and administration of MySQL databases. Connect Fides to your Google Cloud SQL for MySQL to detect and track changes in schemas and tables and automatically discover and label data categories to proactively manage data governance risks."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Database"}),(0,a.jsx)(r.HCh,{children:"SQL database"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"}),(0,a.jsx)(r.HCh,{children:"DSR automation"})]}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsx)(o.XU,{children:"For detection and discovery, Fides requires a user with the SELECT permission on the database. If you intend to automate governance for DSR or Consent, Fides requires a user with the SELECT, UPDATE, and DELETE The permissions allow Fides to read the schema of, and data stored in tables, and fields as well as write restricted updates based on your policy configurations to tables you specify as part of DSR and Consent orchestration. For a complete list of permissions view the Google Cloud SQL for MySQL DB documentation."}),(0,a.jsx)(o.cB,{text:"Permissions list"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"GRANT SELECT"}),(0,a.jsx)(r.HCh,{children:"GRANT UPDATE"}),(0,a.jsx)(r.HCh,{children:"GRANT DELETE"})]})]})]}),{}),tags:["Discovery","Detection"]},C={placeholder:{name:"Google Cloud SQL for Postgres",key:"google_cloud_sql_for_postgres_placeholder",connection_type:d.Rj.GOOGLE_CLOUD_SQL_POSTGRES,access:d.uv.READ,created_at:""},category:n.DATABASE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Google Cloud SQL for Postgres is a fully-managed relational database service that simplifies the setup, maintenance, management, and administration of Postgres databases. Connect Fides to your Google Cloud SQL for Postgres to detect and track changes in schemas and tables and automatically discover and label data categories to proactively manage data governance risks."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Database"}),(0,a.jsx)(r.HCh,{children:"SQL database"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"}),(0,a.jsx)(r.HCh,{children:"DSR automation"})]}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsx)(o.XU,{children:"For detection and discovery, Fides requires a user with the SELECT permission on the database. If you intend to automate governance for DSR or Consent, Fides requires a user with the SELECT, UPDATE, and DELETE permission. The permissions allow Fides to read the schema of, and data stored in tables, and fields as well as write restricted updates based on your policy configurations to tables you specify as part of DSR and orchestration. For a complete list of permissions view the Google Cloud SQL for Postgres DB documentation."}),(0,a.jsx)(o.XU,{children:"The following GCP service account permissions are needed when setting up Google Cloud SQL for Postgres."}),(0,a.jsx)(o.cB,{text:"Permissions list"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"cloudsql.instances.connect"}),(0,a.jsx)(r.HCh,{children:"cloudsql.instances.get"}),(0,a.jsx)(r.HCh,{children:"cloudsql.instances.login"})]})]})]}),{}),tags:["Discovery","Detection"]},S={placeholder:{name:"Microsoft SQL Server",key:"microsoft_sql_server_placeholder",connection_type:d.Rj.MSSQL,access:d.uv.READ,created_at:""},category:n.DATABASE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Microsoft SQL Server, is a relational database management system (RDBMS) developed by Microsoft. It is designed to store, manage, and retrieve data as requested by other software applications, which may run either on the same computer or across a network."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Database"}),(0,a.jsx)(r.HCh,{children:"SQL database"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"})]}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsx)(o.XU,{children:"For detecting databases, Fides requires a user with the following permissions/role:"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"CREATE LOGIN username WITH PASSWORD = 'password';"}),(0,a.jsx)(r.HCh,{children:"GRANT SELECT, INSERT, UPDATE TO username;"})]})]})]}),{}),tags:["DSR Automation","Discovery","Detection"]},b={placeholder:{name:"MySQL",key:"mysql_placeholder",connection_type:d.Rj.MYSQL,access:d.uv.READ,created_at:""},category:n.DATABASE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Continuously monitor MySQL databases to detect and track schema-level changes, automatically discover and label data categories as well as automatically process DSR (privacy requests) and consent enforcement to proactively manage data governance risks."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Database"}),(0,a.jsx)(r.HCh,{children:"SQL database"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"})]}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsx)(o.XU,{children:"For detecting databases, Fides requires a user with the following permissions/role:"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"CREATE USER 'username' IDENTIFIED WITH authentication_plugin BY 'password';"}),(0,a.jsx)(r.HCh,{children:"GRANT SELECT, INSERT ON database.* TO 'username'@'%';"})]})]})]}),{}),tags:["DSR Automation","Discovery","Detection"]},A={placeholder:{name:"Postgres",key:"postgres_placeholder",connection_type:d.Rj.POSTGRES,access:d.uv.READ,created_at:""},category:n.DATABASE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Postgres is a relational database. Connect Fides to your Postgres Datbase to detect and track changes in schemas and tables and automatically discover and label data categories to proactively manage data governance risks."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Database"}),(0,a.jsx)(r.HCh,{children:"SQL database"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"})]}),(0,a.jsx)(o.XU,{children:"For each database, Fides requires the following permissions, where 'username' is the user set up for Fides, and 'database' is the name of the database you want to connect to."}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"CREATE USER username WITH LOGIN;"}),(0,a.jsx)(r.HCh,{children:"GRANT SELECT ON ALL TABLES IN SCHEMA public TO username;"}),(0,a.jsx)(r.HCh,{children:"GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA public TO username;"})]})]})]}),{}),tags:["Detection","Discovery"]},D={placeholder:{name:"Amazon RDS MySQL",key:"rds_mysql_placeholder",connection_type:d.Rj.RDS_MYSQL,access:d.uv.READ,created_at:""},category:n.DATABASE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Amazon RDS MySQL is a fully-managed relational database service that simplifies the setup, maintenance, management, and administration of MySQL databases. Connect Fides to your Amazon RDS MySQL to detect and track changes in schemas and tables and automatically discover and label data categories to proactively manage data governance risks."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Database"}),(0,a.jsx)(r.HCh,{children:"SQL database"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"})]}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsx)(o.XU,{children:"For detecting database RDS instances and clusters, Fides requires an IAM user with the following permissions/role:"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"rds:DescribeDBClusters"}),(0,a.jsx)(r.HCh,{children:"rds:DescribeDBInstances"}),(0,a.jsx)(r.HCh,{children:"rds-db:connect"})]}),(0,a.jsx)(o.XU,{children:"And per database instance and database it requires the following permissions, where 'username' is the user set up for Fides, and 'database' is the database name, you want to connect to."}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"CREATE USER 'username' IDENTIFIED WITH AWSAuthenticationPlugin AS 'RDS';"}),(0,a.jsx)(r.HCh,{children:"GRANT SELECT, INSERT ON database.* TO 'username'@'%';"})]})]})]}),{}),tags:["Discovery","Detection"]},w={placeholder:{name:"Amazon RDS Postgres",key:"rds_postgres_placeholder",connection_type:d.Rj.RDS_POSTGRES,access:d.uv.READ,created_at:""},category:n.DATABASE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Amazon RDS Postgres is a fully-managed relational database service that simplifies the setup, maintenance, management, and administration of Postgres databases. Connect Fides to your Amazon RDS Postgres to detect and track changes in schemas and tables and automatically discover and label data categories to proactively manage data governance risks."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Database"}),(0,a.jsx)(r.HCh,{children:"SQL database"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"})]}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsx)(o.XU,{children:"For detecting database RDS instances and clusters, Fides requires an IAM user with the following permissions/role:"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"rds:DescribeDBClusters"}),(0,a.jsx)(r.HCh,{children:"rds:DescribeDBInstances"}),(0,a.jsx)(r.HCh,{children:"rds-db:connect"})]}),(0,a.jsx)(o.XU,{children:"For each database instance and database, Fides requires the following permissions, where 'username' is the user set up for Fides, and 'database' is the name of the database you want to connect to."}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"CREATE USER username WITH LOGIN;"}),(0,a.jsx)(r.HCh,{children:"GRANT rds_iam TO username;"}),(0,a.jsx)(r.HCh,{children:"GRANT SELECT ON ALL TABLES IN SCHEMA public TO username;"}),(0,a.jsx)(r.HCh,{children:"GRANT ALL PRIVILEGES ON ALL TABLES IN SCHEMA public TO username;"})]})]})]}),{}),tags:["Discovery","Detection"]},R={placeholder:{name:"Amazon S3",key:"s3_placeholder",connection_type:d.Rj.S3,access:d.uv.READ,created_at:""},category:n.DATA_WAREHOUSE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Continuously monitor S3 to detect and track schema-level changes, automatically discover and label data categories as well as automatically process DSR (privacy requests) and consent enforcement to proactively manage data governance risks."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Object storage"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Cloud provider"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"})]}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsx)(o.XU,{children:"Fides requires an IAM principal with read-only S3 permissions in order to detect, discover, and classify sensitive data. The AWS-managed AmazonS3ReadOnlyAccess policy can be used to assign these permissions. An IAM administrator can create the necessary principal for Fides using the AWS IAM guides, and assign the appropriate permissions policy to the IAM principal."}),(0,a.jsx)(o.XU,{children:"The permissions allow Fides to list buckets and read object data data stored in those buckets. This data is inspected only for the purpose of detecting sensitive data risks and no data is stored by Fides."}),(0,a.jsx)(o.XU,{children:"Ethyca recommends creating an IAM role with the appropriate permissions, which will be assumed by Fides at runtime, with ephemeral credentials. There must also be an IAM user with fixed credentials that Fides uses strictly for assuming the IAM role with the appropriate permissions. If desired, Fides also supports authenticating directly as an IAM user with the appropriate permissions, but this is considered a less secure option."}),(0,a.jsx)(o.cB,{text:"Permissions list"}),(0,a.jsx)(o.Z5,{children:(0,a.jsx)(r.HCh,{children:"AmazonS3ReadOnlyAccess"})})]})]}),{}),instructions:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Configuring a Fides -> Amazon S3 Integration"}),(0,a.jsx)(o.cB,{text:"Step 1: Create an IAM role in AWS"}),(0,a.jsx)(o.XU,{children:"Create an IAM role for Fides' S3 access following the AWS IAM roles guide. This role will be referred to below as the Fides S3 Access Role."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Step 2: Assign policies to the IAM role"}),(0,a.jsx)(o.XU,{children:"Grant the necessary permissions to the IAM role by attaching the following AWS-managed policy:"}),(0,a.jsx)(o.aG,{data:[{permission:"AmazonS3ReadOnlyAccess",description:"Provides read-only access to all buckets via the AWS Management Console."}]}),(0,a.jsx)(o.cB,{text:"Step 3: Create an IAM user for assuming a role"}),(0,a.jsxs)(o.XU,{children:["Follow the ",(0,a.jsx)(o.Hn,{href:"https://docs.aws.amazon.com/IAM/latest/UserGuide/getting-started.html#getting-started-iam-user",children:"AWS guide"})," for creating an IAM user to create an IAM user that Fides will authenticate as in order to assume the Fides S3 Access Role created above, and retrieve ephemeral credentials."]}),(0,a.jsx)(o.cB,{text:"Step 4: Grant the IAM user permission to assume the Fides S3 Access Role"}),(0,a.jsx)(o.XU,{children:"Navigate to the IAM user’s Permissions page and add a permission by creating an inline policy. This permission should grant the IAM user permission to assume the Fides S3 Access Role created above (you’ll need to retrieve the role ARN). The inline policy should look similar to this:"}),(0,a.jsx)(o.hX,{children:'{\n "Version": "2012-10-17",\n "Statement": [\n {\n "Sid": "VisualEditor0",\n "Effect": "Allow",\n "Action": "sts:AssumeRole",\n "Resource": "arn:aws:iam::[AWS ACCOUNT NUMBER]:role/[Fides S3 Access Role ARN]"\n }\n ]\n}'}),(0,a.jsx)(o.cB,{text:"Step 5: Create an access key for the IAM user"}),(0,a.jsxs)(o.vQ,{children:[(0,a.jsxs)(r.HCh,{children:["Create an access key for the IAM user under"," ",(0,a.jsx)("strong",{children:"Security credentials"}),"."]}),(0,a.jsx)(r.HCh,{children:"Select the Other use case"}),(0,a.jsx)(r.HCh,{children:"Copy the Access Key ID and Secret Access Key"})]}),(0,a.jsx)(o.cB,{text:"Step 6: Use the credentials to authenticate your integration"}),(0,a.jsxs)(o.XU,{children:["Provide the credentials to your Fides instance to securely connect Fides. For the Assume Role ARN, provide the ARN for the Fides S3 Access Role created in step 1."," "]})]})]}),{}),tags:["DSR Automation","Discovery","Detection"]},E={placeholder:{name:"Scylla",key:"scylla_placeholder",connection_type:d.Rj.SCYLLA,access:d.uv.READ,created_at:""},category:n.DATABASE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"ScyllaDB is an open-sources distributed NoSQL data store designed to be compatible with Apache Cassandra. Connect Fides to your ScyllaDB to detect and track changes in keyspaces and tables and automatically discover and label data categories to proactively manage data governance risks."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Database"}),(0,a.jsx)(r.HCh,{children:"NoSQL database"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"}),(0,a.jsx)(r.HCh,{children:"DSR automation"})]}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsx)(o.XU,{children:"For detection and discovery, Fides requires a user with the SELECT permission on all keyspaces. If you intend to automate governance for DSR or Consent, Fides requires the role to to be granted SELECT and MODIFY on all keyspaces. The permissions allow Fides to read the schema of, and data stored in keyspaces, tables, and fields as well as write restricted updates based on your policy configurations to tables you specify as part of DSR and Consent orchestration. For a complete list of permissions view the Scylla DB documentation."}),(0,a.jsx)(o.cB,{text:"Permissions list"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"SELECT ALL KEYSPACES"}),(0,a.jsx)(r.HCh,{children:"MODIFY ALL KEYSPACES"})]})]})]}),{}),tags:["DSR Automation","Discovery","Detection"]},_={placeholder:{name:"Snowflake",key:"snowflake_placeholder",connection_type:d.Rj.SNOWFLAKE,access:d.uv.READ,created_at:""},category:n.DATABASE,overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Snowflake is a cloud-based data warehousing platform designed for handling large-scale data storage and analytics. It enables organizations to store, manage, and analyze massive amounts of data efficiently, offering features like scalability, performance, and flexibility."}),(0,a.jsxs)(c,{children:[(0,a.jsx)(o.cB,{text:"Categories"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"Database"}),(0,a.jsx)(r.HCh,{children:"SQL database"}),(0,a.jsx)(r.HCh,{children:"Storage system"}),(0,a.jsx)(r.HCh,{children:"Data detection"}),(0,a.jsx)(r.HCh,{children:"Data discovery"})]}),(0,a.jsx)(o.cB,{text:"Permissions"}),(0,a.jsxs)(o.Z5,{children:[(0,a.jsx)(r.HCh,{children:"CREATE ROLE my_monitor_role;"}),(0,a.jsx)(r.HCh,{children:"GRANT USAGE ON DATABASE DATABASE_1 TO ROLE my_monitor_role;"}),(0,a.jsx)(r.HCh,{children:"GRANT USAGE ON SCHEMA DATABASE_1.TEST_SCHEMA TO ROLE my_monitor_role;"}),(0,a.jsx)(r.HCh,{children:"GRANT SELECT ON ALL TABLES IN SCHEMA DATABASE_1.TEST_SCHEMA TO ROLE my_monitor_role;"}),(0,a.jsx)(r.HCh,{children:"CREATE USER test_user PASSWORD='***';"}),(0,a.jsx)(r.HCh,{children:"GRANT ROLE my_monitor_role TO USER test_user;"})]})]})]}),{}),tags:["DSR Automation","Discovery","Detection"]},T={placeholder:{name:"Website",key:"website_placeholder",connection_type:d.Rj.WEBSITE,access:d.uv.READ,created_at:""},category:n.WEBSITE,tags:["Consent","Discovery","Detection"],overview:(0,a.jsx)(()=>(0,a.jsxs)(a.Fragment,{children:[(0,a.jsx)(o.cB,{text:"Overview"}),(0,a.jsx)(o.XU,{children:"Websites, or “properties”, often process user data. Adding a website as an integration lets you configure a Consent Management Platform (CMP), a site-specific privacy center, and Cross-Origin requests via Fides. You can also set up monitors to detect vendors, track technologies like cookies or pixels, and ensure compliance."})]}),{})},H={[d.Rj.BIGQUERY]:x,[d.Rj.DATAHUB]:p,[d.Rj.DYNAMODB]:v,[d.Rj.GOOGLE_CLOUD_SQL_MYSQL]:f,[d.Rj.GOOGLE_CLOUD_SQL_POSTGRES]:C,[d.Rj.MSSQL]:S,[d.Rj.RDS_MYSQL]:D,[d.Rj.RDS_POSTGRES]:w,[d.Rj.S3]:R,[d.Rj.SCYLLA]:E,[d.Rj.SNOWFLAKE]:_,[d.Rj.MYSQL]:b,[d.Rj.WEBSITE]:T,[d.Rj.POSTGRES]:A},B=Object.values(H),k=Object.keys(H),F={placeholder:{name:"",key:"placeholder",connection_type:d.Rj.MANUAL,access:d.uv.READ,created_at:""},category:n.DATA_WAREHOUSE,tags:[]};var L=e=>{var s;return e&&null!==(s=H[e])&&void 0!==s?s:F}},64176:function(e,s,t){var i=t(27378),n=t(20682);s.Z=e=>{let{data:s}=(0,n.$I)({});return(0,i.useMemo)(()=>null==s?void 0:s.items.find(s=>s.identifier===e),[s,e])}},31883:function(e,s,t){t.d(s,{Bw:function(){return i.Bw},D4:function(){return i.D4}});var i=t(19043)}}]);