openfeature-provider-flagd 0.2.2__py3-none-any.whl → 0.2.4__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -47,7 +47,7 @@ ENV_VAR_RETRY_BACKOFF_MS = "FLAGD_RETRY_BACKOFF_MS"
47
47
  ENV_VAR_RETRY_BACKOFF_MAX_MS = "FLAGD_RETRY_BACKOFF_MAX_MS"
48
48
  ENV_VAR_RETRY_GRACE_PERIOD_SECONDS = "FLAGD_RETRY_GRACE_PERIOD"
49
49
  ENV_VAR_SELECTOR = "FLAGD_SOURCE_SELECTOR"
50
- ENV_VAR_PROVIDER_ID = "FLAGD_SOURCE_PROVIDER_ID"
50
+ ENV_VAR_PROVIDER_ID = "FLAGD_PROVIDER_ID"
51
51
  ENV_VAR_STREAM_DEADLINE_MS = "FLAGD_STREAM_DEADLINE_MS"
52
52
  ENV_VAR_TLS = "FLAGD_TLS"
53
53
  ENV_VAR_TLS_CERT = "FLAGD_SERVER_CERT_PATH"
@@ -158,52 +158,52 @@ class FlagdProvider(AbstractProvider):
158
158
 
159
159
  def resolve_boolean_details(
160
160
  self,
161
- key: str,
161
+ flag_key: str,
162
162
  default_value: bool,
163
163
  evaluation_context: typing.Optional[EvaluationContext] = None,
164
164
  ) -> FlagResolutionDetails[bool]:
165
165
  return self.resolver.resolve_boolean_details(
166
- key, default_value, evaluation_context
166
+ flag_key, default_value, evaluation_context
167
167
  )
168
168
 
169
169
  def resolve_string_details(
170
170
  self,
171
- key: str,
171
+ flag_key: str,
172
172
  default_value: str,
173
173
  evaluation_context: typing.Optional[EvaluationContext] = None,
174
174
  ) -> FlagResolutionDetails[str]:
175
175
  return self.resolver.resolve_string_details(
176
- key, default_value, evaluation_context
176
+ flag_key, default_value, evaluation_context
177
177
  )
178
178
 
179
179
  def resolve_float_details(
180
180
  self,
181
- key: str,
181
+ flag_key: str,
182
182
  default_value: float,
183
183
  evaluation_context: typing.Optional[EvaluationContext] = None,
184
184
  ) -> FlagResolutionDetails[float]:
185
185
  return self.resolver.resolve_float_details(
186
- key, default_value, evaluation_context
186
+ flag_key, default_value, evaluation_context
187
187
  )
188
188
 
189
189
  def resolve_integer_details(
190
190
  self,
191
- key: str,
191
+ flag_key: str,
192
192
  default_value: int,
193
193
  evaluation_context: typing.Optional[EvaluationContext] = None,
194
194
  ) -> FlagResolutionDetails[int]:
195
195
  return self.resolver.resolve_integer_details(
196
- key, default_value, evaluation_context
196
+ flag_key, default_value, evaluation_context
197
197
  )
198
198
 
199
199
  def resolve_object_details(
200
200
  self,
201
- key: str,
201
+ flag_key: str,
202
202
  default_value: typing.Union[dict, list],
203
203
  evaluation_context: typing.Optional[EvaluationContext] = None,
204
204
  ) -> FlagResolutionDetails[typing.Union[dict, list]]:
205
205
  return self.resolver.resolve_object_details(
206
- key, default_value, evaluation_context
206
+ flag_key, default_value, evaluation_context
207
207
  )
208
208
 
209
209
  def emit_provider_ready_with_context(
@@ -1,3 +1,4 @@
1
+ import json
1
2
  import logging
2
3
  import threading
3
4
  import time
@@ -80,6 +81,44 @@ class GrpcResolver:
80
81
  ("grpc.initial_reconnect_backoff_ms", config.retry_backoff_ms),
81
82
  ("grpc.max_reconnect_backoff_ms", config.retry_backoff_max_ms),
82
83
  ("grpc.min_reconnect_backoff_ms", config.deadline_ms),
84
+ (
85
+ "grpc.service_config",
86
+ json.dumps(
87
+ {
88
+ "methodConfig": [
89
+ {
90
+ "name": [
91
+ {"service": "flagd.sync.v1.FlagSyncService"},
92
+ {"service": "flagd.evaluation.v1.Service"},
93
+ ],
94
+ "retryPolicy": {
95
+ "maxAttempts": 3,
96
+ "initialBackoff": "1s",
97
+ "maxBackoff": "5s",
98
+ "backoffMultiplier": 2.0,
99
+ "retryableStatusCodes": [
100
+ "CANCELLED",
101
+ "UNKNOWN",
102
+ "INVALID_ARGUMENT",
103
+ "NOT_FOUND",
104
+ "ALREADY_EXISTS",
105
+ "PERMISSION_DENIED",
106
+ "RESOURCE_EXHAUSTED",
107
+ "FAILED_PRECONDITION",
108
+ "ABORTED",
109
+ "OUT_OF_RANGE",
110
+ "UNIMPLEMENTED",
111
+ "INTERNAL",
112
+ "UNAVAILABLE",
113
+ "DATA_LOSS",
114
+ "UNAUTHENTICATED",
115
+ ],
116
+ },
117
+ }
118
+ ]
119
+ }
120
+ ),
121
+ ),
83
122
  ]
84
123
  if config.tls:
85
124
  channel_args = {
@@ -17,6 +17,23 @@ from .process.targeting import targeting
17
17
  T = typing.TypeVar("T")
18
18
 
19
19
 
20
+ def _merge_metadata(
21
+ flag_metadata: typing.Optional[
22
+ typing.Mapping[str, typing.Union[float, int, str, bool]]
23
+ ],
24
+ flag_set_metadata: typing.Optional[
25
+ typing.Mapping[str, typing.Union[float, int, str, bool]]
26
+ ],
27
+ ) -> typing.Mapping[str, typing.Union[float, int, str, bool]]:
28
+ metadata = {} if flag_set_metadata is None else dict(flag_set_metadata)
29
+
30
+ if flag_metadata is not None:
31
+ for key, value in flag_metadata.items():
32
+ metadata[key] = value
33
+
34
+ return metadata
35
+
36
+
20
37
  class InProcessResolver:
21
38
  def __init__(
22
39
  self,
@@ -103,18 +120,26 @@ class InProcessResolver:
103
120
  if not flag:
104
121
  raise FlagNotFoundError(f"Flag with key {key} not present in flag store.")
105
122
 
123
+ metadata = _merge_metadata(flag.metadata, self.flag_store.flag_set_metadata)
124
+
106
125
  if flag.state == "DISABLED":
107
- return FlagResolutionDetails(default_value, reason=Reason.DISABLED)
126
+ return FlagResolutionDetails(
127
+ default_value, flag_metadata=metadata, reason=Reason.DISABLED
128
+ )
108
129
 
109
130
  if not flag.targeting:
110
131
  variant, value = flag.default
111
- return FlagResolutionDetails(value, variant=variant, reason=Reason.STATIC)
132
+ return FlagResolutionDetails(
133
+ value, variant=variant, flag_metadata=metadata, reason=Reason.STATIC
134
+ )
112
135
 
113
136
  variant = targeting(flag.key, flag.targeting, evaluation_context)
114
137
 
115
138
  if variant is None:
116
139
  variant, value = flag.default
117
- return FlagResolutionDetails(value, variant=variant, reason=Reason.DEFAULT)
140
+ return FlagResolutionDetails(
141
+ value, variant=variant, flag_metadata=metadata, reason=Reason.DEFAULT
142
+ )
118
143
  if not isinstance(variant, (str, bool)):
119
144
  raise ParseError(
120
145
  "Parsed JSONLogic targeting did not return a string or bool"
@@ -128,4 +153,5 @@ class InProcessResolver:
128
153
  value,
129
154
  variant=variant,
130
155
  reason=Reason.TARGETING_MATCH,
156
+ flag_metadata=metadata,
131
157
  )
@@ -14,7 +14,7 @@ from openfeature.contrib.provider.flagd.resolvers.process.connector import (
14
14
  from openfeature.contrib.provider.flagd.resolvers.process.flags import FlagStore
15
15
  from openfeature.evaluation_context import EvaluationContext
16
16
  from openfeature.event import ProviderEventDetails
17
- from openfeature.exception import ParseError, ProviderNotReadyError
17
+ from openfeature.exception import ErrorCode, ParseError, ProviderNotReadyError
18
18
 
19
19
  logger = logging.getLogger("openfeature.contrib")
20
20
 
@@ -76,8 +76,15 @@ class FileWatcher(FlagStateConnector):
76
76
  self.handle_error("Could not parse JSON flag data from file")
77
77
  except yaml.error.YAMLError:
78
78
  self.handle_error("Could not parse YAML flag data from file")
79
- except ParseError:
80
- self.handle_error("Could not parse flag data using flagd syntax")
79
+ except ParseError as e:
80
+ self.handle_error(
81
+ "Could not parse flag data using flagd syntax: "
82
+ + (
83
+ "no error message provided"
84
+ if e is None or e.error_message is None
85
+ else e.error_message
86
+ )
87
+ )
81
88
  except Exception:
82
89
  self.handle_error("Could not read flags from file")
83
90
 
@@ -104,4 +111,8 @@ class FileWatcher(FlagStateConnector):
104
111
  def handle_error(self, error_message: str) -> None:
105
112
  logger.exception(error_message)
106
113
  self.should_emit_ready_on_success = True
107
- self.emit_provider_error(ProviderEventDetails(message=error_message))
114
+ self.emit_provider_error(
115
+ ProviderEventDetails(
116
+ message=error_message, error_code=ErrorCode.PARSE_ERROR
117
+ )
118
+ )
@@ -62,6 +62,44 @@ class GrpcWatcher(FlagStateConnector):
62
62
  ("grpc.initial_reconnect_backoff_ms", config.retry_backoff_ms),
63
63
  ("grpc.max_reconnect_backoff_ms", config.retry_backoff_max_ms),
64
64
  ("grpc.min_reconnect_backoff_ms", config.stream_deadline_ms),
65
+ (
66
+ "grpc.service_config",
67
+ json.dumps(
68
+ {
69
+ "methodConfig": [
70
+ {
71
+ "name": [
72
+ {"service": "flagd.sync.v1.FlagSyncService"},
73
+ {"service": "flagd.evaluation.v1.Service"},
74
+ ],
75
+ "retryPolicy": {
76
+ "maxAttempts": 3,
77
+ "initialBackoff": "1s",
78
+ "maxBackoff": "5s",
79
+ "backoffMultiplier": 2.0,
80
+ "retryableStatusCodes": [
81
+ "CANCELLED",
82
+ "UNKNOWN",
83
+ "INVALID_ARGUMENT",
84
+ "NOT_FOUND",
85
+ "ALREADY_EXISTS",
86
+ "PERMISSION_DENIED",
87
+ "RESOURCE_EXHAUSTED",
88
+ "FAILED_PRECONDITION",
89
+ "ABORTED",
90
+ "OUT_OF_RANGE",
91
+ "UNIMPLEMENTED",
92
+ "INTERNAL",
93
+ "UNAVAILABLE",
94
+ "DATA_LOSS",
95
+ "UNAUTHENTICATED",
96
+ ],
97
+ },
98
+ }
99
+ ]
100
+ }
101
+ ),
102
+ ),
65
103
  ]
66
104
  if config.default_authority is not None:
67
105
  options.append(("grpc.default_authority", config.default_authority))
@@ -7,6 +7,21 @@ from openfeature.event import ProviderEventDetails
7
7
  from openfeature.exception import ParseError
8
8
 
9
9
 
10
+ def _validate_metadata(key: str, value: typing.Union[float, int, str, bool]) -> None:
11
+ if key is None:
12
+ raise ParseError("Metadata key must be set")
13
+ elif not isinstance(key, str):
14
+ raise ParseError(f"Metadata key {key} must be of type str, but is {type(key)}")
15
+ elif not key:
16
+ raise ParseError("key must not be empty")
17
+ if value is None:
18
+ raise ParseError(f"Metadata value for key {key} must be set")
19
+ elif not isinstance(value, (float, int, str, bool)):
20
+ raise ParseError(
21
+ f"Metadata value {value} for key {key} must be of type float, int, str or bool, but is {type(value)}"
22
+ )
23
+
24
+
10
25
  class FlagStore:
11
26
  def __init__(
12
27
  self,
@@ -16,12 +31,16 @@ class FlagStore:
16
31
  ):
17
32
  self.emit_provider_configuration_changed = emit_provider_configuration_changed
18
33
  self.flags: typing.Mapping[str, Flag] = {}
34
+ self.flag_set_metadata: typing.Mapping[
35
+ str, typing.Union[float, int, str, bool]
36
+ ] = {}
19
37
 
20
38
  def get_flag(self, key: str) -> typing.Optional["Flag"]:
21
39
  return self.flags.get(key)
22
40
 
23
41
  def update(self, flags_data: dict) -> None:
24
42
  flags = flags_data.get("flags", {})
43
+ metadata = flags_data.get("metadata", {})
25
44
  evaluators: typing.Optional[dict] = flags_data.get("$evaluators")
26
45
  if evaluators:
27
46
  transposed = json.dumps(flags)
@@ -33,10 +52,18 @@ class FlagStore:
33
52
 
34
53
  if not isinstance(flags, dict):
35
54
  raise ParseError("`flags` key of configuration must be a dictionary")
55
+ if not isinstance(metadata, dict):
56
+ raise ParseError("`metadata` key of configuration must be a dictionary")
57
+ for key, value in metadata.items():
58
+ _validate_metadata(key, value)
59
+
36
60
  self.flags = {key: Flag.from_dict(key, data) for key, data in flags.items()}
61
+ self.flag_set_metadata = metadata
37
62
 
38
63
  self.emit_provider_configuration_changed(
39
- ProviderEventDetails(flags_changed=list(self.flags.keys()))
64
+ ProviderEventDetails(
65
+ flags_changed=list(self.flags.keys()), metadata=metadata
66
+ )
40
67
  )
41
68
 
42
69
 
@@ -47,6 +74,9 @@ class Flag:
47
74
  variants: typing.Mapping[str, typing.Any]
48
75
  default_variant: typing.Union[bool, str]
49
76
  targeting: typing.Optional[dict] = None
77
+ metadata: typing.Optional[
78
+ typing.Mapping[str, typing.Union[float, int, str, bool]]
79
+ ] = None
50
80
 
51
81
  def __post_init__(self) -> None:
52
82
  if not self.state or not isinstance(self.state, str):
@@ -66,6 +96,12 @@ class Flag:
66
96
  if self.default_variant not in self.variants:
67
97
  raise ParseError("Default variant does not match set of variants")
68
98
 
99
+ if self.metadata:
100
+ if not isinstance(self.metadata, dict):
101
+ raise ParseError("Flag metadata is not a valid json object")
102
+ for key, value in self.metadata.items():
103
+ _validate_metadata(key, value)
104
+
69
105
  @classmethod
70
106
  def from_dict(cls, key: str, data: dict) -> "Flag":
71
107
  if "defaultVariant" in data:
@@ -77,6 +113,8 @@ class Flag:
77
113
  try:
78
114
  flag = cls(key=key, **data)
79
115
  return flag
116
+ except ParseError as parseError:
117
+ raise parseError
80
118
  except Exception as err:
81
119
  raise ParseError from err
82
120
 
@@ -2,7 +2,7 @@
2
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
3
3
  # NO CHECKED-IN PROTOBUF GENCODE
4
4
  # source: openfeature/schemas/protobuf/flagd/evaluation/v1/evaluation.proto
5
- # Protobuf Python Version: 5.29.0
5
+ # Protobuf Python Version: 6.31.0
6
6
  """Generated protocol buffer code."""
7
7
  from google.protobuf import descriptor as _descriptor
8
8
  from google.protobuf import descriptor_pool as _descriptor_pool
@@ -11,8 +11,8 @@ from google.protobuf import symbol_database as _symbol_database
11
11
  from google.protobuf.internal import builder as _builder
12
12
  _runtime_version.ValidateProtobufRuntimeVersion(
13
13
  _runtime_version.Domain.PUBLIC,
14
- 5,
15
- 29,
14
+ 6,
15
+ 31,
16
16
  0,
17
17
  '',
18
18
  'openfeature/schemas/protobuf/flagd/evaluation/v1/evaluation.proto'
@@ -5,7 +5,7 @@ import warnings
5
5
 
6
6
  from openfeature.schemas.protobuf.flagd.evaluation.v1 import evaluation_pb2 as openfeature_dot_schemas_dot_protobuf_dot_flagd_dot_evaluation_dot_v1_dot_evaluation__pb2
7
7
 
8
- GRPC_GENERATED_VERSION = '1.71.0'
8
+ GRPC_GENERATED_VERSION = '1.73.0'
9
9
  GRPC_VERSION = grpc.__version__
10
10
  _version_not_supported = False
11
11
 
@@ -2,7 +2,7 @@
2
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
3
3
  # NO CHECKED-IN PROTOBUF GENCODE
4
4
  # source: openfeature/schemas/protobuf/flagd/sync/v1/sync.proto
5
- # Protobuf Python Version: 5.29.0
5
+ # Protobuf Python Version: 6.31.0
6
6
  """Generated protocol buffer code."""
7
7
  from google.protobuf import descriptor as _descriptor
8
8
  from google.protobuf import descriptor_pool as _descriptor_pool
@@ -11,8 +11,8 @@ from google.protobuf import symbol_database as _symbol_database
11
11
  from google.protobuf.internal import builder as _builder
12
12
  _runtime_version.ValidateProtobufRuntimeVersion(
13
13
  _runtime_version.Domain.PUBLIC,
14
- 5,
15
- 29,
14
+ 6,
15
+ 31,
16
16
  0,
17
17
  '',
18
18
  'openfeature/schemas/protobuf/flagd/sync/v1/sync.proto'
@@ -5,7 +5,7 @@ import warnings
5
5
 
6
6
  from openfeature.schemas.protobuf.flagd.sync.v1 import sync_pb2 as openfeature_dot_schemas_dot_protobuf_dot_flagd_dot_sync_dot_v1_dot_sync__pb2
7
7
 
8
- GRPC_GENERATED_VERSION = '1.71.0'
8
+ GRPC_GENERATED_VERSION = '1.73.0'
9
9
  GRPC_VERSION = grpc.__version__
10
10
  _version_not_supported = False
11
11
 
@@ -2,7 +2,7 @@
2
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
3
3
  # NO CHECKED-IN PROTOBUF GENCODE
4
4
  # source: openfeature/schemas/protobuf/schema/v1/schema.proto
5
- # Protobuf Python Version: 5.29.0
5
+ # Protobuf Python Version: 6.31.0
6
6
  """Generated protocol buffer code."""
7
7
  from google.protobuf import descriptor as _descriptor
8
8
  from google.protobuf import descriptor_pool as _descriptor_pool
@@ -11,8 +11,8 @@ from google.protobuf import symbol_database as _symbol_database
11
11
  from google.protobuf.internal import builder as _builder
12
12
  _runtime_version.ValidateProtobufRuntimeVersion(
13
13
  _runtime_version.Domain.PUBLIC,
14
- 5,
15
- 29,
14
+ 6,
15
+ 31,
16
16
  0,
17
17
  '',
18
18
  'openfeature/schemas/protobuf/schema/v1/schema.proto'
@@ -5,7 +5,7 @@ import warnings
5
5
 
6
6
  from openfeature.schemas.protobuf.schema.v1 import schema_pb2 as openfeature_dot_schemas_dot_protobuf_dot_schema_dot_v1_dot_schema__pb2
7
7
 
8
- GRPC_GENERATED_VERSION = '1.71.0'
8
+ GRPC_GENERATED_VERSION = '1.73.0'
9
9
  GRPC_VERSION = grpc.__version__
10
10
  _version_not_supported = False
11
11
 
@@ -2,7 +2,7 @@
2
2
  # Generated by the protocol buffer compiler. DO NOT EDIT!
3
3
  # NO CHECKED-IN PROTOBUF GENCODE
4
4
  # source: openfeature/schemas/protobuf/sync/v1/sync_service.proto
5
- # Protobuf Python Version: 5.29.0
5
+ # Protobuf Python Version: 6.31.0
6
6
  """Generated protocol buffer code."""
7
7
  from google.protobuf import descriptor as _descriptor
8
8
  from google.protobuf import descriptor_pool as _descriptor_pool
@@ -11,8 +11,8 @@ from google.protobuf import symbol_database as _symbol_database
11
11
  from google.protobuf.internal import builder as _builder
12
12
  _runtime_version.ValidateProtobufRuntimeVersion(
13
13
  _runtime_version.Domain.PUBLIC,
14
- 5,
15
- 29,
14
+ 6,
15
+ 31,
16
16
  0,
17
17
  '',
18
18
  'openfeature/schemas/protobuf/sync/v1/sync_service.proto'
@@ -5,7 +5,7 @@ import warnings
5
5
 
6
6
  from openfeature.schemas.protobuf.sync.v1 import sync_service_pb2 as openfeature_dot_schemas_dot_protobuf_dot_sync_dot_v1_dot_sync__service__pb2
7
7
 
8
- GRPC_GENERATED_VERSION = '1.71.0'
8
+ GRPC_GENERATED_VERSION = '1.73.0'
9
9
  GRPC_VERSION = grpc.__version__
10
10
  _version_not_supported = False
11
11
 
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: openfeature-provider-flagd
3
- Version: 0.2.2
3
+ Version: 0.2.4
4
4
  Summary: OpenFeature provider for the flagd flag evaluation engine
5
5
  Project-URL: Homepage, https://github.com/open-feature/python-sdk-contrib
6
6
  Author-email: OpenFeature <openfeature-core@groups.io>
@@ -1,36 +1,36 @@
1
1
  openfeature/.gitignore,sha256=1ZPH4VtVL4bMQmBJXQJxeAyUa74LCtqV1a_yjeDIzSQ,8
2
2
  openfeature/contrib/provider/flagd/__init__.py,sha256=WlrcPaCH31dEG1IvrvpeuhAaQ8Ni8LEzDpNM_x-qKOA,65
3
- openfeature/contrib/provider/flagd/config.py,sha256=GAt8skBFMzF4skf8l8yr7jl7KBUM509ogZDpvF3NByk,8380
3
+ openfeature/contrib/provider/flagd/config.py,sha256=S2DO-X5Fs8Wn1hq-7tOYBuYep4URhINbhbzH1vDcLxk,8373
4
4
  openfeature/contrib/provider/flagd/flag_type.py,sha256=rZYfmqQEmtqVVTb8e-d8Wt8ZCnHtf7xPSmYxyU8w0R0,158
5
- openfeature/contrib/provider/flagd/provider.py,sha256=wJGCFdfZlk6Y-ABU3PNSiKvrlQlNMZavsdrR2QlTqJY,7931
5
+ openfeature/contrib/provider/flagd/provider.py,sha256=qGLWvpYEfvf5RrvYb2vTvzc8CDrAWausA3bPfs93v3I,7981
6
6
  openfeature/contrib/provider/flagd/sync_metadata_hook.py,sha256=fd3uRtwDhVlCW9vZhS35p9qENkl6wDHwlFH-L48aPDM,456
7
7
  openfeature/contrib/provider/flagd/resolvers/__init__.py,sha256=CzsnsfxJCaD_S1gBf15kkJBVD-gVLKIwDi4W1nE-dXw,181
8
- openfeature/contrib/provider/flagd/resolvers/grpc.py,sha256=KJTrwZM-XF2-Xw-O4YvrN-Xvn_KqsO9T29lBAjiDS-4,13581
9
- openfeature/contrib/provider/flagd/resolvers/in_process.py,sha256=Ce42cagr521rW6zW_LjT1yeVYeVqBJrNM6ASlYbdn2c,4628
8
+ openfeature/contrib/provider/flagd/resolvers/grpc.py,sha256=dIRuCgHrqCwPzpXdfL1cEPss08-LwZcy_gIUe0xLeqY,15380
9
+ openfeature/contrib/provider/flagd/resolvers/in_process.py,sha256=Oqj3Ak-zqjvWnlnsg5ElXXHn-YIPZRItbyfzakCd8O0,5433
10
10
  openfeature/contrib/provider/flagd/resolvers/protocol.py,sha256=Wc7oUH6ytPuKg8Lj_3y-_LLkQkuvsow9IiSfmlM8I2o,1402
11
11
  openfeature/contrib/provider/flagd/resolvers/process/custom_ops.py,sha256=bZX1At0dRxhghhWz4g-8N-YPobcVfYSv9PTsYh-lZDc,4549
12
- openfeature/contrib/provider/flagd/resolvers/process/flags.py,sha256=jEU-8xjGm-NXPfB6O4no4Zn8XjGTFPGRkdXx-t8uQp0,3199
12
+ openfeature/contrib/provider/flagd/resolvers/process/flags.py,sha256=znDHo84b4-vQswoHSo0807AvK84mqhiJjlC-_vMehdE,4759
13
13
  openfeature/contrib/provider/flagd/resolvers/process/targeting.py,sha256=qjYgfoJK9B1ghh19cUq7f-VEql7Hh1J7sh0BhnNc_h0,905
14
14
  openfeature/contrib/provider/flagd/resolvers/process/connector/__init__.py,sha256=hyYYxRYEnSho5F28M2hbhhtkG4DQTwJjD36ddI0Xs7M,289
15
- openfeature/contrib/provider/flagd/resolvers/process/connector/file_watcher.py,sha256=f4jg9tHj94R_PJ4sCZ2f6B1r7Fgm1NqEZr68qH9pYYk,3920
16
- openfeature/contrib/provider/flagd/resolvers/process/connector/grpc_watcher.py,sha256=XwG71pZqLLEBn7FAT0BhrO1LcCTuEwNZAXvEr37gioY,8835
17
- openfeature/schemas/protobuf/flagd/evaluation/v1/evaluation_pb2.py,sha256=YPBimdlVBCfnVqxq9uek3H4nyaIR0MhggCAaR0XtIt4,7527
15
+ openfeature/contrib/provider/flagd/resolvers/process/connector/file_watcher.py,sha256=abj6DhAyu2nP-P5EAHB9GyceJMym21rO8tKr8nQhmKM,4241
16
+ openfeature/contrib/provider/flagd/resolvers/process/connector/grpc_watcher.py,sha256=LUIz7azSjzYtRGyepub54jBZkQjbgpK8W3vwHpK_QLE,10622
17
+ openfeature/schemas/protobuf/flagd/evaluation/v1/evaluation_pb2.py,sha256=-K4_Kmx2JRgLAZG2jf5LqmDjY7ewrJKHGebqv3RqPwE,7527
18
18
  openfeature/schemas/protobuf/flagd/evaluation/v1/evaluation_pb2.pyi,sha256=afh-fdsmyfS62C-iq7EQsqr_5yZP_QxJXp81Q0Lcllk,18333
19
- openfeature/schemas/protobuf/flagd/evaluation/v1/evaluation_pb2_grpc.py,sha256=owH7bBrwEdzXxvabwv1ebzWVczshLFE3TZcDoAj8Owk,17189
19
+ openfeature/schemas/protobuf/flagd/evaluation/v1/evaluation_pb2_grpc.py,sha256=GirT-3TstdC8RMHAWYg8b_5Pcirvi3zac7fTvj9R6-A,17189
20
20
  openfeature/schemas/protobuf/flagd/evaluation/v1/evaluation_pb2_grpc.pyi,sha256=tQm-QOlsMdhdN_7i5LsrtLtBPu4qpL0qzTE7DbSvXFs,7731
21
- openfeature/schemas/protobuf/flagd/sync/v1/sync_pb2.py,sha256=OIhVrNkhXtwuCdvbahXiOx-mQ3XVVPx5gh0UHzKN0_M,3528
21
+ openfeature/schemas/protobuf/flagd/sync/v1/sync_pb2.py,sha256=m3-pL_dTFAGUzDVhOl-HjcfykIOqMP61spiq41W-UHU,3528
22
22
  openfeature/schemas/protobuf/flagd/sync/v1/sync_pb2.pyi,sha256=Qsqe0vz5AJRAAjARXhjiaPKyIFbLttr4gTWae2zyJfM,5967
23
- openfeature/schemas/protobuf/flagd/sync/v1/sync_pb2_grpc.py,sha256=gwoXi82VHekdHGuMGvFC0VbNpqVW8tnX2EkkxVDpvzU,8335
23
+ openfeature/schemas/protobuf/flagd/sync/v1/sync_pb2_grpc.py,sha256=29uVTAXbPfS28aXQBUvq1bFRVyEnzv39DEZS2ZiNe10,8335
24
24
  openfeature/schemas/protobuf/flagd/sync/v1/sync_pb2_grpc.pyi,sha256=APjDd-Yo6i6FE_kOusWhTqk-8B_0wIEMXcImCuGpQt8,3782
25
- openfeature/schemas/protobuf/schema/v1/schema_pb2.py,sha256=dfGpiAYJ2VuRBrctH7s21KkdrIr9rzIaWibUZ3So3g4,7255
25
+ openfeature/schemas/protobuf/schema/v1/schema_pb2.py,sha256=LIQjZ-jrzHULHYpFefuB0KRgtp0c9xwjXl0VDxrZsuY,7255
26
26
  openfeature/schemas/protobuf/schema/v1/schema_pb2.pyi,sha256=14Z6i0kRpCAQO8aCpc4Qwre1OJ7_d_ZIPq8V1vTuYzU,18369
27
- openfeature/schemas/protobuf/schema/v1/schema_pb2_grpc.py,sha256=af2955mIP2jB9LXZqnfN9cpQbPhl0tTg86MsQzsiy60,16227
27
+ openfeature/schemas/protobuf/schema/v1/schema_pb2_grpc.py,sha256=oFw3Hn7Vir33pKW52jSn4NLzdNWxF28HlVACSiiBf_Q,16227
28
28
  openfeature/schemas/protobuf/schema/v1/schema_pb2_grpc.pyi,sha256=EJ55jvso2Uzx50XryC7fsKGEOBi1bMOGCXaShl1TcJ4,7067
29
- openfeature/schemas/protobuf/sync/v1/sync_service_pb2.py,sha256=Sw0kLvO0wIRXsaFic8qmTuScMdf1-1WOHGWP4FOIB_s,3327
29
+ openfeature/schemas/protobuf/sync/v1/sync_service_pb2.py,sha256=pK8BPYQQmWihQYd-4jI84htTqmp6Jf7kk_w4MGG8Qgg,3327
30
30
  openfeature/schemas/protobuf/sync/v1/sync_service_pb2.pyi,sha256=o3YpW_5iQJWjU7IFEsyspeqLyBDC4C_psBNErwziumE,7986
31
- openfeature/schemas/protobuf/sync/v1/sync_service_pb2_grpc.py,sha256=Fnkq2H0sfLwc029RXfFxp5__f4UskT6Hbn_ZBT0LpJU,6185
31
+ openfeature/schemas/protobuf/sync/v1/sync_service_pb2_grpc.py,sha256=OCmeAttHCyfNWy30YsRR6k6QQpabJQP6EwYt8_eU168,6185
32
32
  openfeature/schemas/protobuf/sync/v1/sync_service_pb2_grpc.pyi,sha256=4NoAkGicVNxx4yVK5_JvvPn1OGlRdPhqM2wCpkwCjEI,3024
33
- openfeature_provider_flagd-0.2.2.dist-info/METADATA,sha256=-rYNDdWa7IAGVC23b4mx0BbpQdujHKRcHgm7iOi90BA,21635
34
- openfeature_provider_flagd-0.2.2.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
35
- openfeature_provider_flagd-0.2.2.dist-info/licenses/LICENSE,sha256=xx0jnfkXJvxRnG63LTGOxlggYnIysveWIZ6H3PNdCrQ,11357
36
- openfeature_provider_flagd-0.2.2.dist-info/RECORD,,
33
+ openfeature_provider_flagd-0.2.4.dist-info/METADATA,sha256=Pale_7EQKur6a8sWsXyMJ5TasYd-VKoWsXGansBpWWE,21635
34
+ openfeature_provider_flagd-0.2.4.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
35
+ openfeature_provider_flagd-0.2.4.dist-info/licenses/LICENSE,sha256=xx0jnfkXJvxRnG63LTGOxlggYnIysveWIZ6H3PNdCrQ,11357
36
+ openfeature_provider_flagd-0.2.4.dist-info/RECORD,,