flwr-nightly 1.15.0.dev20250125__py3-none-any.whl → 1.15.0.dev20250128__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,31 @@
1
+ # Copyright 2025 Flower Labs GmbH. All Rights Reserved.
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ # ==============================================================================
15
+ """Flower user auth plugins."""
16
+
17
+
18
+ from flwr.common.auth_plugin import CliAuthPlugin
19
+ from flwr.common.constant import AuthType
20
+
21
+ from .oidc_cli_plugin import OidcCliPlugin
22
+
23
+
24
+ def get_cli_auth_plugins() -> dict[str, type[CliAuthPlugin]]:
25
+ """Return all CLI authentication plugins."""
26
+ return {AuthType.OIDC: OidcCliPlugin}
27
+
28
+
29
+ __all__ = [
30
+ "get_cli_auth_plugins",
31
+ ]
@@ -0,0 +1,150 @@
1
+ # Copyright 2025 Flower Labs GmbH. All Rights Reserved.
2
+ #
3
+ # Licensed under the Apache License, Version 2.0 (the "License");
4
+ # you may not use this file except in compliance with the License.
5
+ # You may obtain a copy of the License at
6
+ #
7
+ # http://www.apache.org/licenses/LICENSE-2.0
8
+ #
9
+ # Unless required by applicable law or agreed to in writing, software
10
+ # distributed under the License is distributed on an "AS IS" BASIS,
11
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
+ # See the License for the specific language governing permissions and
13
+ # limitations under the License.
14
+ # ==============================================================================
15
+ """Flower CLI user auth plugin for OIDC."""
16
+
17
+
18
+ import json
19
+ import time
20
+ from collections.abc import Sequence
21
+ from pathlib import Path
22
+ from typing import Any, Optional, Union
23
+
24
+ import typer
25
+
26
+ from flwr.common.auth_plugin import CliAuthPlugin
27
+ from flwr.common.constant import (
28
+ ACCESS_TOKEN_KEY,
29
+ AUTH_TYPE_KEY,
30
+ REFRESH_TOKEN_KEY,
31
+ AuthType,
32
+ )
33
+ from flwr.common.typing import UserAuthCredentials, UserAuthLoginDetails
34
+ from flwr.proto.exec_pb2 import ( # pylint: disable=E0611
35
+ GetAuthTokensRequest,
36
+ GetAuthTokensResponse,
37
+ )
38
+ from flwr.proto.exec_pb2_grpc import ExecStub
39
+
40
+
41
+ class OidcCliPlugin(CliAuthPlugin):
42
+ """Flower OIDC auth plugin for CLI."""
43
+
44
+ def __init__(self, credentials_path: Path):
45
+ self.access_token: Optional[str] = None
46
+ self.refresh_token: Optional[str] = None
47
+ self.credentials_path = credentials_path
48
+
49
+ @staticmethod
50
+ def login(
51
+ login_details: UserAuthLoginDetails,
52
+ exec_stub: ExecStub,
53
+ ) -> UserAuthCredentials:
54
+ """Authenticate the user and retrieve authentication credentials."""
55
+ typer.secho(
56
+ "Please login with your user credentials here: "
57
+ f"{login_details.verification_uri_complete}",
58
+ fg=typer.colors.BLUE,
59
+ )
60
+ start_time = time.time()
61
+ time.sleep(login_details.interval)
62
+
63
+ while (time.time() - start_time) < login_details.expires_in:
64
+ res: GetAuthTokensResponse = exec_stub.GetAuthTokens(
65
+ GetAuthTokensRequest(device_code=login_details.device_code)
66
+ )
67
+
68
+ access_token = res.access_token
69
+ refresh_token = res.refresh_token
70
+
71
+ if access_token and refresh_token:
72
+ typer.secho(
73
+ "✅ Login successful.",
74
+ fg=typer.colors.GREEN,
75
+ bold=False,
76
+ )
77
+ return UserAuthCredentials(
78
+ access_token=access_token,
79
+ refresh_token=refresh_token,
80
+ )
81
+
82
+ time.sleep(login_details.interval)
83
+
84
+ typer.secho(
85
+ "❌ Timeout, failed to sign in.",
86
+ fg=typer.colors.RED,
87
+ bold=True,
88
+ )
89
+ raise typer.Exit(code=1)
90
+
91
+ def store_tokens(self, credentials: UserAuthCredentials) -> None:
92
+ """Store authentication tokens to the `credentials_path`.
93
+
94
+ The credentials, including tokens, will be saved as a JSON file
95
+ at `credentials_path`.
96
+ """
97
+ self.access_token = credentials.access_token
98
+ self.refresh_token = credentials.refresh_token
99
+ json_dict = {
100
+ AUTH_TYPE_KEY: AuthType.OIDC,
101
+ ACCESS_TOKEN_KEY: credentials.access_token,
102
+ REFRESH_TOKEN_KEY: credentials.refresh_token,
103
+ }
104
+
105
+ with open(self.credentials_path, "w", encoding="utf-8") as file:
106
+ json.dump(json_dict, file, indent=4)
107
+
108
+ def load_tokens(self) -> None:
109
+ """Load authentication tokens from the `credentials_path`."""
110
+ with open(self.credentials_path, encoding="utf-8") as file:
111
+ json_dict: dict[str, Any] = json.load(file)
112
+ access_token = json_dict.get(ACCESS_TOKEN_KEY)
113
+ refresh_token = json_dict.get(REFRESH_TOKEN_KEY)
114
+
115
+ if isinstance(access_token, str) and isinstance(refresh_token, str):
116
+ self.access_token = access_token
117
+ self.refresh_token = refresh_token
118
+
119
+ def write_tokens_to_metadata(
120
+ self, metadata: Sequence[tuple[str, Union[str, bytes]]]
121
+ ) -> Sequence[tuple[str, Union[str, bytes]]]:
122
+ """Write authentication tokens to the provided metadata."""
123
+ if self.access_token is None or self.refresh_token is None:
124
+ typer.secho(
125
+ "❌ Missing authentication tokens. Please login first.",
126
+ fg=typer.colors.RED,
127
+ bold=True,
128
+ )
129
+ raise typer.Exit(code=1)
130
+
131
+ return list(metadata) + [
132
+ (ACCESS_TOKEN_KEY, self.access_token),
133
+ (REFRESH_TOKEN_KEY, self.refresh_token),
134
+ ]
135
+
136
+ def read_tokens_from_metadata(
137
+ self, metadata: Sequence[tuple[str, Union[str, bytes]]]
138
+ ) -> Optional[UserAuthCredentials]:
139
+ """Read authentication tokens from the provided metadata."""
140
+ metadata_dict = dict(metadata)
141
+ access_token = metadata_dict.get(ACCESS_TOKEN_KEY)
142
+ refresh_token = metadata_dict.get(REFRESH_TOKEN_KEY)
143
+
144
+ if isinstance(access_token, str) and isinstance(refresh_token, str):
145
+ return UserAuthCredentials(
146
+ access_token=access_token,
147
+ refresh_token=refresh_token,
148
+ )
149
+
150
+ return None
flwr/cli/login/login.py CHANGED
@@ -34,7 +34,11 @@ from flwr.proto.exec_pb2 import ( # pylint: disable=E0611
34
34
  )
35
35
  from flwr.proto.exec_pb2_grpc import ExecStub
36
36
 
37
- from ..utils import init_channel, try_obtain_cli_auth_plugin
37
+ from ..utils import (
38
+ init_channel,
39
+ try_obtain_cli_auth_plugin,
40
+ unauthenticated_exc_handler,
41
+ )
38
42
 
39
43
 
40
44
  def login( # pylint: disable=R0914
@@ -81,7 +85,8 @@ def login( # pylint: disable=R0914
81
85
  stub = ExecStub(channel)
82
86
 
83
87
  login_request = GetLoginDetailsRequest()
84
- login_response: GetLoginDetailsResponse = stub.GetLoginDetails(login_request)
88
+ with unauthenticated_exc_handler():
89
+ login_response: GetLoginDetailsResponse = stub.GetLoginDetails(login_request)
85
90
 
86
91
  # Get the auth plugin
87
92
  auth_type = login_response.auth_type
@@ -104,7 +109,8 @@ def login( # pylint: disable=R0914
104
109
  expires_in=login_response.expires_in,
105
110
  interval=login_response.interval,
106
111
  )
107
- credentials = auth_plugin.login(details, stub)
112
+ with unauthenticated_exc_handler():
113
+ credentials = auth_plugin.login(details, stub)
108
114
 
109
115
  # Store the tokens
110
116
  auth_plugin.store_tokens(credentials)
flwr/cli/utils.py CHANGED
@@ -29,20 +29,13 @@ import typer
29
29
 
30
30
  from flwr.cli.cli_user_auth_interceptor import CliUserAuthInterceptor
31
31
  from flwr.common.auth_plugin import CliAuthPlugin
32
- from flwr.common.constant import AUTH_TYPE, CREDENTIALS_DIR, FLWR_DIR
32
+ from flwr.common.constant import AUTH_TYPE_KEY, CREDENTIALS_DIR, FLWR_DIR
33
33
  from flwr.common.grpc import GRPC_MAX_MESSAGE_LENGTH, create_channel
34
34
  from flwr.common.logger import log
35
35
 
36
+ from .auth_plugin import get_cli_auth_plugins
36
37
  from .config_utils import validate_certificate_in_federation_config
37
38
 
38
- try:
39
- from flwr.ee import get_cli_auth_plugins
40
- except ImportError:
41
-
42
- def get_cli_auth_plugins() -> dict[str, type[CliAuthPlugin]]:
43
- """Return all CLI authentication plugins."""
44
- raise NotImplementedError("No authentication plugins are currently supported.")
45
-
46
39
 
47
40
  def prompt_text(
48
41
  text: str,
@@ -244,7 +237,7 @@ def try_obtain_cli_auth_plugin(
244
237
  try:
245
238
  with config_path.open("r", encoding="utf-8") as file:
246
239
  json_file = json.load(file)
247
- auth_type = json_file[AUTH_TYPE]
240
+ auth_type = json_file[AUTH_TYPE_KEY]
248
241
  except (FileNotFoundError, KeyError):
249
242
  typer.secho(
250
243
  "❌ Missing or invalid credentials for user authentication. "
@@ -308,12 +301,19 @@ def unauthenticated_exc_handler() -> Iterator[None]:
308
301
  try:
309
302
  yield
310
303
  except grpc.RpcError as e:
311
- if e.code() != grpc.StatusCode.UNAUTHENTICATED:
312
- raise
313
- typer.secho(
314
- " Authentication failed. Please run `flwr login`"
315
- " to authenticate and try again.",
316
- fg=typer.colors.RED,
317
- bold=True,
318
- )
319
- raise typer.Exit(code=1) from None
304
+ if e.code() == grpc.StatusCode.UNAUTHENTICATED:
305
+ typer.secho(
306
+ "❌ Authentication failed. Please run `flwr login`"
307
+ " to authenticate and try again.",
308
+ fg=typer.colors.RED,
309
+ bold=True,
310
+ )
311
+ raise typer.Exit(code=1) from None
312
+ if e.code() == grpc.StatusCode.UNIMPLEMENTED:
313
+ typer.secho(
314
+ "❌ User authentication is not enabled on this SuperLink.",
315
+ fg=typer.colors.RED,
316
+ bold=True,
317
+ )
318
+ raise typer.Exit(code=1) from None
319
+ raise
@@ -16,7 +16,6 @@
16
16
 
17
17
 
18
18
  import argparse
19
- import sys
20
19
  from logging import DEBUG, ERROR, INFO, WARN
21
20
  from pathlib import Path
22
21
  from typing import Optional
@@ -65,17 +64,6 @@ def run_supernode() -> None:
65
64
  "Ignoring `--flwr-dir`.",
66
65
  )
67
66
 
68
- # Exit if unsupported argument is passed by the user
69
- if args.app is not None:
70
- log(
71
- ERROR,
72
- "The `app` argument is deprecated. The SuperNode now automatically "
73
- "uses the ClientApp delivered from the SuperLink. Providing the app "
74
- "directory manually is no longer supported. Please remove the `app` "
75
- "argument from your command.",
76
- )
77
- sys.exit(1)
78
-
79
67
  root_certificates = try_obtain_root_certificates(args, args.superlink)
80
68
  load_fn = get_load_client_app_fn(
81
69
  default_app_ref="",
@@ -146,18 +134,6 @@ def _parse_args_run_supernode() -> argparse.ArgumentParser:
146
134
  parser = argparse.ArgumentParser(
147
135
  description="Start a Flower SuperNode",
148
136
  )
149
-
150
- parser.add_argument(
151
- "app",
152
- nargs="?",
153
- default=None,
154
- help=(
155
- "(REMOVED) This argument is removed. The SuperNode now automatically "
156
- "uses the ClientApp delivered from the SuperLink, so there is no need to "
157
- "provide the app directory manually. This argument will be removed in a "
158
- "future version."
159
- ),
160
- )
161
137
  _parse_args_common(parser)
162
138
  parser.add_argument(
163
139
  "--flwr-dir",
flwr/common/constant.py CHANGED
@@ -108,7 +108,7 @@ MAX_RETRY_DELAY = 20 # Maximum delay duration between two consecutive retries.
108
108
 
109
109
  # Constants for user authentication
110
110
  CREDENTIALS_DIR = ".credentials"
111
- AUTH_TYPE = "auth_type"
111
+ AUTH_TYPE_KEY = "auth_type"
112
112
  ACCESS_TOKEN_KEY = "access_token"
113
113
  REFRESH_TOKEN_KEY = "refresh_token"
114
114
 
@@ -200,3 +200,13 @@ class CliOutputFormat:
200
200
  def __new__(cls) -> CliOutputFormat:
201
201
  """Prevent instantiation."""
202
202
  raise TypeError(f"{cls.__name__} cannot be instantiated.")
203
+
204
+
205
+ class AuthType:
206
+ """User authentication types."""
207
+
208
+ OIDC = "oidc"
209
+
210
+ def __new__(cls) -> AuthType:
211
+ """Prevent instantiation."""
212
+ raise TypeError(f"{cls.__name__} cannot be instantiated.")
flwr/common/logger.py CHANGED
@@ -17,12 +17,13 @@
17
17
 
18
18
  import json as _json
19
19
  import logging
20
+ import os
20
21
  import re
21
22
  import sys
22
23
  import threading
23
24
  import time
24
25
  from io import StringIO
25
- from logging import WARN, LogRecord
26
+ from logging import ERROR, WARN, LogRecord
26
27
  from logging.handlers import HTTPHandler
27
28
  from queue import Empty, Queue
28
29
  from typing import TYPE_CHECKING, Any, Optional, TextIO, Union
@@ -42,6 +43,7 @@ from .constant import LOG_UPLOAD_INTERVAL
42
43
  LOGGER_NAME = "flwr"
43
44
  FLOWER_LOGGER = logging.getLogger(LOGGER_NAME)
44
45
  FLOWER_LOGGER.setLevel(logging.DEBUG)
46
+ log = FLOWER_LOGGER.log # pylint: disable=invalid-name
45
47
 
46
48
  LOG_COLORS = {
47
49
  "DEBUG": "\033[94m", # Blue
@@ -101,7 +103,7 @@ class ConsoleHandler(StreamHandler):
101
103
 
102
104
 
103
105
  def update_console_handler(
104
- level: Optional[int] = None,
106
+ level: Optional[Union[int, str]] = None,
105
107
  timestamps: Optional[bool] = None,
106
108
  colored: Optional[bool] = None,
107
109
  ) -> None:
@@ -125,6 +127,22 @@ console_handler = ConsoleHandler(
125
127
  console_handler.setLevel(logging.INFO)
126
128
  FLOWER_LOGGER.addHandler(console_handler)
127
129
 
130
+ # Set log level via env var (show timestamps for `DEBUG`)
131
+ if log_level := os.getenv("PYTHONLOGLEVEL"):
132
+ try:
133
+ use_time_stamps = log_level.upper() == "DEBUG"
134
+ update_console_handler(
135
+ level=log_level, timestamps=use_time_stamps, colored=True
136
+ )
137
+ except Exception: # pylint: disable=broad-exception-caught
138
+ # Alert user but don't raise exception
139
+ log(
140
+ ERROR,
141
+ "Failed to set logging level %s. Using default level: %s",
142
+ log_level,
143
+ logging.getLevelName(console_handler.level),
144
+ )
145
+
128
146
 
129
147
  class CustomHTTPHandler(HTTPHandler):
130
148
  """Custom HTTPHandler which overrides the mapLogRecords method."""
@@ -185,10 +203,6 @@ def configure(
185
203
  FLOWER_LOGGER.addHandler(http_handler)
186
204
 
187
205
 
188
- logger = logging.getLogger(LOGGER_NAME) # pylint: disable=invalid-name
189
- log = logger.log # pylint: disable=invalid-name
190
-
191
-
192
206
  def warn_preview_feature(name: str) -> None:
193
207
  """Warn the user when they use a preview feature."""
194
208
  log(
flwr/server/app.py CHANGED
@@ -40,7 +40,7 @@ from flwr.common.args import try_obtain_server_certificates
40
40
  from flwr.common.auth_plugin import ExecAuthPlugin
41
41
  from flwr.common.config import get_flwr_dir, parse_config_args
42
42
  from flwr.common.constant import (
43
- AUTH_TYPE,
43
+ AUTH_TYPE_KEY,
44
44
  CLIENT_OCTET,
45
45
  EXEC_API_DEFAULT_SERVER_ADDRESS,
46
46
  FLEET_API_GRPC_BIDI_DEFAULT_ADDRESS,
@@ -578,7 +578,7 @@ def _try_obtain_exec_auth_plugin(
578
578
 
579
579
  # Load authentication configuration
580
580
  auth_config: dict[str, Any] = config.get("authentication", {})
581
- auth_type: str = auth_config.get(AUTH_TYPE, "")
581
+ auth_type: str = auth_config.get(AUTH_TYPE_KEY, "")
582
582
 
583
583
  # Load authentication plugin
584
584
  try:
@@ -49,7 +49,7 @@ from flwr.proto.serverappio_pb2_grpc import ServerAppIoStub # pylint: disable=E
49
49
  from .driver import Driver
50
50
 
51
51
  ERROR_MESSAGE_DRIVER_NOT_CONNECTED = """
52
- [Driver] Error: Not connected.
52
+ [flwr-serverapp] Error: Not connected.
53
53
 
54
54
  Call `connect()` on the `GrpcDriverStub` instance before calling any of the other
55
55
  `GrpcDriverStub` methods.
@@ -102,7 +102,7 @@ class GrpcDriver(Driver):
102
102
  )
103
103
  self._grpc_stub = ServerAppIoStub(self._channel)
104
104
  _wrap_stub(self._grpc_stub, self._retry_invoker)
105
- log(DEBUG, "[Driver] Connected to %s", self._addr)
105
+ log(DEBUG, "[flwr-serverapp] Connected to %s", self._addr)
106
106
 
107
107
  def _disconnect(self) -> None:
108
108
  """Disconnect from the ServerAppIo API."""
@@ -113,7 +113,7 @@ class GrpcDriver(Driver):
113
113
  self._channel = None
114
114
  self._grpc_stub = None
115
115
  channel.close()
116
- log(DEBUG, "[Driver] Disconnected")
116
+ log(DEBUG, "[flwr-serverapp] Disconnected")
117
117
 
118
118
  def set_run(self, run_id: int) -> None:
119
119
  """Set the run."""
@@ -122,6 +122,7 @@ def run_serverapp( # pylint: disable=R0914, disable=W0212, disable=R0915
122
122
  # Pull ServerAppInputs from LinkState
123
123
  req = PullServerAppInputsRequest()
124
124
  res: PullServerAppInputsResponse = driver._stub.PullServerAppInputs(req)
125
+ log(DEBUG, "flwr-serverapp: PullServerAppInputs")
125
126
  if not res.HasField("run"):
126
127
  sleep(3)
127
128
  run_status = None
@@ -362,9 +362,8 @@ class ServerAppIoServicer(serverappio_pb2_grpc.ServerAppIoServicer):
362
362
  ) -> PullServerAppInputsResponse:
363
363
  """Pull ServerApp process inputs."""
364
364
  log(DEBUG, "ServerAppIoServicer.PullServerAppInputs")
365
- # Init access to LinkState and Ffs
365
+ # Init access to LinkState
366
366
  state = self.state_factory.state()
367
- ffs = self.ffs_factory.ffs()
368
367
 
369
368
  # Lock access to LinkState, preventing obtaining the same pending run_id
370
369
  with self.lock:
@@ -374,6 +373,9 @@ class ServerAppIoServicer(serverappio_pb2_grpc.ServerAppIoServicer):
374
373
  if run_id is None:
375
374
  return PullServerAppInputsResponse()
376
375
 
376
+ # Init access to Ffs
377
+ ffs = self.ffs_factory.ffs()
378
+
377
379
  # Retrieve Context, Run and Fab for the run_id
378
380
  serverapp_ctxt = state.get_serverapp_context(run_id)
379
381
  run = state.get_run(run_id)
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: flwr-nightly
3
- Version: 1.15.0.dev20250125
3
+ Version: 1.15.0.dev20250128
4
4
  Summary: Flower: A Friendly Federated AI Framework
5
5
  Home-page: https://flower.ai
6
6
  License: Apache-2.0
@@ -1,6 +1,8 @@
1
1
  flwr/__init__.py,sha256=VmBWedrCxqmt4QvUHBLqyVEH6p7zaFMD_oCHerXHSVw,937
2
2
  flwr/cli/__init__.py,sha256=cZJVgozlkC6Ni2Hd_FAIrqefrkCGOV18fikToq-6iLw,720
3
3
  flwr/cli/app.py,sha256=UeXrW5gxrUnFViDjAMIxGNZZKwu3a1oAj83v53IWIWM,1382
4
+ flwr/cli/auth_plugin/__init__.py,sha256=FyaoqPzcxlBTFfJ2sBRC5USwQLmAhFr5KuBwfMO4bmo,1052
5
+ flwr/cli/auth_plugin/oidc_cli_plugin.py,sha256=nooDDWO_3bWYqi_KBrsO3YteDIIuvTZD30XymbvRPlA,5374
4
6
  flwr/cli/build.py,sha256=4P70i_FnUs0P21aTwjTXtFQSAfY-C04hUDF-2npfJdo,6345
5
7
  flwr/cli/cli_user_auth_interceptor.py,sha256=aZepPA298s-HjGmkJGMvI_uZe72O5aLC3jri-ilG53o,3126
6
8
  flwr/cli/config_utils.py,sha256=LelRR960I36n1IPw7BIu79fKoOh0JePA58kAtoXSTH0,7518
@@ -9,7 +11,7 @@ flwr/cli/example.py,sha256=uk5CoD0ZITgpY_ffsTbEKf8XOOCSUzByjHPcMSPqV18,2216
9
11
  flwr/cli/install.py,sha256=-RnrYGejN_zyXXp_CoddSQwoQfRTWWyt9WYlxphJzyU,8180
10
12
  flwr/cli/log.py,sha256=vcO-r5EIc127mOQ26uxKVITX-w_Zib7AxSVuuN70_JY,6671
11
13
  flwr/cli/login/__init__.py,sha256=6_9zOzbPOAH72K2wX3-9dXTAbS7Mjpa5sEn2lA6eHHI,800
12
- flwr/cli/login/login.py,sha256=EOU1E-89VPn5Ns7ytaDdGNVVeOoC4ULFjtNPogjXGGQ,3783
14
+ flwr/cli/login/login.py,sha256=iNnNF1bvV0n8Z-vNc89azFNA73JqKZlO1s5OF2atsTc,3917
13
15
  flwr/cli/ls.py,sha256=5KCHdctN5f5GkCAkbZSC1OuKdhmLzobINpltsdtDtQU,11383
14
16
  flwr/cli/new/__init__.py,sha256=pOQtPT9W4kCIttcKne5m-FtJbvTqdjTVJxzQ9AUYK8I,790
15
17
  flwr/cli/new/new.py,sha256=scyyKt8mzkc3El1bypgkHjKwVQEc2-q4I50PxriPFdI,9922
@@ -68,7 +70,7 @@ flwr/cli/new/templates/app/pyproject.tensorflow.toml.tpl,sha256=r0SZnvoR5a5mEWKJ
68
70
  flwr/cli/run/__init__.py,sha256=cCsKVB0SFzh2b3QmGba6BHckB85xlhjh3mh4pBpACtY,790
69
71
  flwr/cli/run/run.py,sha256=kEOYKin9qPJy8SODxcAvIWk-OskKPsxvcbvhDhf2VD4,8299
70
72
  flwr/cli/stop.py,sha256=DBCKg9AhB1WcJsyqfkHKR1_V_yT7D32zqa9QhmX9IAU,4926
71
- flwr/cli/utils.py,sha256=z5WFbh2RwMirFcv6QtV_4rJlK7ad2XrUJUsinNhqE28,11310
73
+ flwr/cli/utils.py,sha256=D6XmroF6iu-AT02xbp2vWK6nGGgAPBLPRlJw9Cmx0SA,11390
72
74
  flwr/client/__init__.py,sha256=DGDoO0AEAfz-0CUFmLdyUUweAS64-07AOnmDfWUefK4,1192
73
75
  flwr/client/app.py,sha256=tNnef5wGVfqMiiGiWzAuULyy1QpvCKukiRmNi_a2cQc,34261
74
76
  flwr/client/client.py,sha256=8o58nd9o6ZFcMIaVYPGcV4MSjBG4H0oFgWiv8ZEO3oA,7895
@@ -107,7 +109,7 @@ flwr/client/rest_client/__init__.py,sha256=5KGlp7pjc1dhNRkKlaNtUfQmg8wrRFh9lS3P3
107
109
  flwr/client/rest_client/connection.py,sha256=9_JDGHkmaiPgk6CmcQId56Ia1ucQfrqcpNOUObdZaZU,13008
108
110
  flwr/client/run_info_store.py,sha256=ZN2Phi4DSLbSyzg8RmzJcVYh1g6eurHOmWRCT7GMtw4,4040
109
111
  flwr/client/supernode/__init__.py,sha256=SUhWOzcgXRNXk1V9UgB5-FaWukqqrOEajVUHEcPkwyQ,865
110
- flwr/client/supernode/app.py,sha256=xxtMgscyfF5iUrM2WpYQJDTGVt1nKdzSewhgOv308Ko,10990
112
+ flwr/client/supernode/app.py,sha256=q-hOZUpvxN64Eo4uBe_Om7uMneIE_ux5fyNp7siINxY,10142
111
113
  flwr/client/typing.py,sha256=dxoTBnTMfqXr5J7G3y-uNjqxYCddvxhu89spfj4Lm2U,1048
112
114
  flwr/common/__init__.py,sha256=TVaoFEJE158aui1TPZQiJCDZX4RNHRyI8I55VC80HhI,3901
113
115
  flwr/common/address.py,sha256=9KNYE69WW_QVcyumsux3Qn1wmn4J7f13Y9nHASpvzbA,3018
@@ -115,7 +117,7 @@ flwr/common/args.py,sha256=bCvtG0hhh_hVjl9NoWsY_g7kLMIN3jCN7B883HvZ7hg,6223
115
117
  flwr/common/auth_plugin/__init__.py,sha256=1Y8Oj3iB49IHDu9tvDih1J74Ygu7k85V9s2A4WORPyA,887
116
118
  flwr/common/auth_plugin/auth_plugin.py,sha256=wgDorBUB4IkK6twQ8vNawRVz7BDPmKdXZBNLqhU9RSs,3871
117
119
  flwr/common/config.py,sha256=n6T5Vi6BUFul37GUpKp9Doqnz35phJqSud_G3ySWlIQ,13336
118
- flwr/common/constant.py,sha256=FLqav6UCcdCG61XZr31fmAFqOu4WRFG8zcbnwUyYJ4w,6202
120
+ flwr/common/constant.py,sha256=mw2H-rTFI5Lwv8EK2dlW5RDAynQWeSawcwup2p0vLN4,6419
119
121
  flwr/common/context.py,sha256=uJ-mnoC_8y_udEb3kAX-r8CPphNTWM72z1AlsvQEu54,2403
120
122
  flwr/common/date.py,sha256=NHHpESce5wYqEwoDXf09gp9U9l_5Bmlh2BsOcwS-kDM,1554
121
123
  flwr/common/differential_privacy.py,sha256=XwcJ3rWr8S8BZUocc76vLSJAXIf6OHnWkBV6-xlIRuw,6106
@@ -126,7 +128,7 @@ flwr/common/exit/exit.py,sha256=DmZFyksp-w1sFDQekq5Z-qfnr-ivCAv78aQkqj-TDps,3458
126
128
  flwr/common/exit/exit_code.py,sha256=PNEnCrZfOILjfDAFu5m-2YWEJBrk97xglq4zCUlqV7E,3470
127
129
  flwr/common/exit_handlers.py,sha256=Dke87CC6d6b6kqkC2mF0I4JsP4mHhlQTFxkS4sKKgyw,3308
128
130
  flwr/common/grpc.py,sha256=GCdiTCppW-clhzOo7OIJbsKIWKnJ9pqNTsAKhj7y4So,9646
129
- flwr/common/logger.py,sha256=UPyI_98EDibqgf3epgWxFHxdXgYReSWtaKFf9Mj0hd0,12306
131
+ flwr/common/logger.py,sha256=xgS-oEN6U54vEYoWdX0U0ymqMfndhK0-ePiGtmjHdmU,12852
130
132
  flwr/common/message.py,sha256=Zv4ID2BLQsbff0F03DI_MeFoHbSqVZAdDD9NcKYv6Zo,13832
131
133
  flwr/common/object_ref.py,sha256=fIXf8aP5mG6Nuni7dvcKK5Di3zRfRWGs4ljvqIXplds,10115
132
134
  flwr/common/parameter.py,sha256=-bFAUayToYDF50FZGrBC1hQYJCQDtB2bbr3ZuVLMtdE,2095
@@ -215,7 +217,7 @@ flwr/proto/transport_pb2_grpc.py,sha256=Nvn7oxzm1g1fPiGCGhyKxILDZHYG0CcgjySTzxq-
215
217
  flwr/proto/transport_pb2_grpc.pyi,sha256=AGXf8RiIiW2J5IKMlm_3qT3AzcDa4F3P5IqUjve_esA,766
216
218
  flwr/py.typed,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
217
219
  flwr/server/__init__.py,sha256=cEg1oecBu4cKB69iJCqWEylC8b5XW47bl7rQiJsdTvM,1528
218
- flwr/server/app.py,sha256=4AYewApWSvYTJZcLzKGrcvT8AvHUXzwY0ROBXgmFlPU,30598
220
+ flwr/server/app.py,sha256=ZHtoXbMzvTf82z96__WDv_ZaPqAYwVtCAZylwVXjOuE,30606
219
221
  flwr/server/client_manager.py,sha256=7Ese0tgrH-i-ms363feYZJKwB8gWnXSmg_hYF2Bju4U,6227
220
222
  flwr/server/client_proxy.py,sha256=4G-oTwhb45sfWLx2uZdcXD98IZwdTS6F88xe3akCdUg,2399
221
223
  flwr/server/compat/__init__.py,sha256=VxnJtJyOjNFQXMNi9hIuzNlZM5n0Hj1p3aq_Pm2udw4,892
@@ -226,7 +228,7 @@ flwr/server/compat/legacy_context.py,sha256=wBzBcfV6YO6IQGriM_FdJ5XZfiBBEEJdS_Od
226
228
  flwr/server/criterion.py,sha256=ypbAexbztzGUxNen9RCHF91QeqiEQix4t4Ih3E-42MM,1061
227
229
  flwr/server/driver/__init__.py,sha256=bikRv6CjTwSvYh7tf10gziU5o2YotOWhhftz2tr3KDc,886
228
230
  flwr/server/driver/driver.py,sha256=u_fMfqLYTroTafGCNwKPHI4lttRL-Z5CqeT3_FHSq-Q,5701
229
- flwr/server/driver/grpc_driver.py,sha256=VYIbYavkJO2m6TcqStHr-pQLiyEoWlX8lsOsWfljZRQ,9758
231
+ flwr/server/driver/grpc_driver.py,sha256=iI7e-V-GYNtlY56DPtdPaS8XUzd9NG_YD3LPgl2bTMI,9782
230
232
  flwr/server/driver/inmemory_driver.py,sha256=b1U1PrB_Vpn--vav8SX-sn0THD9BTlV9UFIpuWTWLro,6665
231
233
  flwr/server/history.py,sha256=qSb5_pPTrwofpSYGsZWzMPkl_4uJ4mJFWesxXDrEvDU,5026
232
234
  flwr/server/run_serverapp.py,sha256=vIPhvJx0i5sEZO4IKM6ruCXmx4ncat76rh0B4KhdhhM,2446
@@ -234,7 +236,7 @@ flwr/server/server.py,sha256=1ZsFEptmAV-L2vP2etNC9Ed5CLSxpuKzUFkAPQ4l5Xc,17893
234
236
  flwr/server/server_app.py,sha256=RsgS6PRS5Z74cMUAHzsm8r3LWddwn00MjRs6rlacHt8,6297
235
237
  flwr/server/server_config.py,sha256=CZaHVAsMvGLjpWVcLPkiYxgJN4xfIyAiUrCI3fETKY4,1349
236
238
  flwr/server/serverapp/__init__.py,sha256=L0K-94UDdTyEZ8LDtYybGIIIv3HW6AhSVjXMUfYJQnQ,800
237
- flwr/server/serverapp/app.py,sha256=3kjCL2c279EXdtzVNeOfaX-PK5updZKjBOrgV6DjVPM,8492
239
+ flwr/server/serverapp/app.py,sha256=hRGtvx2bYxcrDh4poqdy-CNkzBtVcr2Hc5gOjgD3J4s,8554
238
240
  flwr/server/serverapp_components.py,sha256=-IV_CitOfrJclJj2jNdbN1Q65PyFmtKtrTIg1hc6WQw,2118
239
241
  flwr/server/strategy/__init__.py,sha256=tQer2SwjDnvgFFuJMZM-S01Z615N5XK6MaCvpm4BMU0,2836
240
242
  flwr/server/strategy/aggregate.py,sha256=PDvekufza13s9AsVmz9WASunaBs3yCtl8JVliFx9j6Q,13978
@@ -263,7 +265,7 @@ flwr/server/strategy/strategy.py,sha256=cXapkD5uDrt5C-RbmWDn9FLoap3Q41i7GKvbmfbC
263
265
  flwr/server/superlink/__init__.py,sha256=8tHYCfodUlRD8PCP9fHgvu8cz5N31A2QoRVL0jDJ15E,707
264
266
  flwr/server/superlink/driver/__init__.py,sha256=5soEK5QSvxNjmJQ-CGTWROc4alSAeU0e9Ad9RDhsd3E,717
265
267
  flwr/server/superlink/driver/serverappio_grpc.py,sha256=UzHwo6qYZMeOhr7nn1iZbcyDSmwvnq_kpYH0mEAndW0,2173
266
- flwr/server/superlink/driver/serverappio_servicer.py,sha256=BgYsimZqTdUoeUzNF71IfcEi-Nl3Sb2zn2BCcPa_eTM,16402
268
+ flwr/server/superlink/driver/serverappio_servicer.py,sha256=ewnalJl6FqHZh1K51UzWnq0QCfpxIW2NYjG52OlPf1c,16432
267
269
  flwr/server/superlink/ffs/__init__.py,sha256=FAY-zShcfPmOxosok2QyT6hTNMNctG8cH9s_nIl8jkI,840
268
270
  flwr/server/superlink/ffs/disk_ffs.py,sha256=n_Ah0sQwXGVQ9wj5965nLjdkQQbpoHCljjXKFnwftsU,3297
269
271
  flwr/server/superlink/ffs/ffs.py,sha256=qLI1UfosJugu2BKOJWqHIhafTm-YiuKqGf3OGWPH0NM,2395
@@ -325,8 +327,8 @@ flwr/superexec/exec_servicer.py,sha256=X10ILT-AoGMrB3IgI2mBe9i-QcIVUAl9bucuqVOPY
325
327
  flwr/superexec/exec_user_auth_interceptor.py,sha256=K06OU-l4LnYhTDg071hGJuOaQWEJbZsYi5qxUmmtiG0,3704
326
328
  flwr/superexec/executor.py,sha256=_B55WW2TD1fBINpabSSDRenVHXYmvlfhv-k8hJKU4lQ,3115
327
329
  flwr/superexec/simulation.py,sha256=WQDon15oqpMopAZnwRZoTICYCfHqtkvFSqiTQ2hLD_g,4088
328
- flwr_nightly-1.15.0.dev20250125.dist-info/LICENSE,sha256=z8d0m5b2O9McPEK1xHG_dWgUBT6EfBDz6wA0F7xSPTA,11358
329
- flwr_nightly-1.15.0.dev20250125.dist-info/METADATA,sha256=6xKhBBSDBkiq4rDxICNgqjqay3PiJGuB3esHhT-i_Ig,15864
330
- flwr_nightly-1.15.0.dev20250125.dist-info/WHEEL,sha256=FMvqSimYX_P7y0a7UY-_Mc83r5zkBZsCYPm7Lr0Bsq4,88
331
- flwr_nightly-1.15.0.dev20250125.dist-info/entry_points.txt,sha256=JlNxX3qhaV18_2yj5a3kJW1ESxm31cal9iS_N_pf1Rk,538
332
- flwr_nightly-1.15.0.dev20250125.dist-info/RECORD,,
330
+ flwr_nightly-1.15.0.dev20250128.dist-info/LICENSE,sha256=z8d0m5b2O9McPEK1xHG_dWgUBT6EfBDz6wA0F7xSPTA,11358
331
+ flwr_nightly-1.15.0.dev20250128.dist-info/METADATA,sha256=02RbG86fQY9wlFDKjH9WRDcNPECHXeDi0G3eyYgTnq0,15864
332
+ flwr_nightly-1.15.0.dev20250128.dist-info/WHEEL,sha256=FMvqSimYX_P7y0a7UY-_Mc83r5zkBZsCYPm7Lr0Bsq4,88
333
+ flwr_nightly-1.15.0.dev20250128.dist-info/entry_points.txt,sha256=JlNxX3qhaV18_2yj5a3kJW1ESxm31cal9iS_N_pf1Rk,538
334
+ flwr_nightly-1.15.0.dev20250128.dist-info/RECORD,,