otdf-python 0.4.0__py3-none-any.whl → 0.4.2__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (96) hide show
  1. otdf_python/__init__.py +1 -2
  2. otdf_python/__main__.py +1 -2
  3. otdf_python/address_normalizer.py +8 -10
  4. otdf_python/aesgcm.py +8 -0
  5. otdf_python/assertion_config.py +21 -0
  6. otdf_python/asym_crypto.py +18 -22
  7. otdf_python/auth_headers.py +7 -6
  8. otdf_python/autoconfigure_utils.py +21 -7
  9. otdf_python/cli.py +5 -5
  10. otdf_python/collection_store.py +13 -1
  11. otdf_python/collection_store_impl.py +5 -0
  12. otdf_python/config.py +13 -0
  13. otdf_python/connect_client.py +1 -0
  14. otdf_python/constants.py +2 -0
  15. otdf_python/crypto_utils.py +4 -0
  16. otdf_python/dpop.py +3 -5
  17. otdf_python/ecc_constants.py +12 -14
  18. otdf_python/ecc_mode.py +7 -2
  19. otdf_python/ecdh.py +24 -31
  20. otdf_python/eckeypair.py +5 -0
  21. otdf_python/header.py +5 -0
  22. otdf_python/invalid_zip_exception.py +6 -2
  23. otdf_python/kas_client.py +66 -55
  24. otdf_python/kas_connect_rpc_client.py +75 -38
  25. otdf_python/kas_info.py +4 -3
  26. otdf_python/kas_key_cache.py +10 -9
  27. otdf_python/key_type.py +4 -0
  28. otdf_python/key_type_constants.py +4 -11
  29. otdf_python/manifest.py +24 -0
  30. otdf_python/nanotdf.py +30 -28
  31. otdf_python/nanotdf_ecdsa_struct.py +5 -11
  32. otdf_python/nanotdf_type.py +13 -1
  33. otdf_python/policy_binding_serializer.py +6 -4
  34. otdf_python/policy_info.py +6 -0
  35. otdf_python/policy_object.py +8 -0
  36. otdf_python/policy_stub.py +2 -0
  37. otdf_python/resource_locator.py +22 -13
  38. otdf_python/sdk.py +51 -73
  39. otdf_python/sdk_builder.py +60 -47
  40. otdf_python/sdk_exceptions.py +11 -1
  41. otdf_python/symmetric_and_payload_config.py +6 -0
  42. otdf_python/tdf.py +47 -10
  43. otdf_python/tdf_reader.py +10 -13
  44. otdf_python/tdf_writer.py +5 -0
  45. otdf_python/token_source.py +4 -3
  46. otdf_python/version.py +5 -0
  47. otdf_python/zip_reader.py +10 -2
  48. otdf_python/zip_writer.py +11 -0
  49. {otdf_python-0.4.0.dist-info → otdf_python-0.4.2.dist-info}/METADATA +3 -2
  50. {otdf_python-0.4.0.dist-info → otdf_python-0.4.2.dist-info}/RECORD +81 -72
  51. {otdf_python-0.4.0.dist-info → otdf_python-0.4.2.dist-info}/WHEEL +1 -1
  52. otdf_python_proto/__init__.py +2 -6
  53. otdf_python_proto/authorization/__init__.py +10 -0
  54. otdf_python_proto/authorization/authorization_connect.py +250 -0
  55. otdf_python_proto/authorization/v2/authorization_connect.py +315 -0
  56. otdf_python_proto/entityresolution/__init__.py +10 -0
  57. otdf_python_proto/entityresolution/entity_resolution_connect.py +185 -0
  58. otdf_python_proto/entityresolution/v2/entity_resolution_connect.py +185 -0
  59. otdf_python_proto/kas/__init__.py +2 -2
  60. otdf_python_proto/kas/kas_connect.py +259 -0
  61. otdf_python_proto/policy/actions/__init__.py +11 -0
  62. otdf_python_proto/policy/actions/actions_connect.py +380 -0
  63. otdf_python_proto/policy/attributes/__init__.py +11 -0
  64. otdf_python_proto/policy/attributes/attributes_connect.py +1310 -0
  65. otdf_python_proto/policy/kasregistry/__init__.py +11 -0
  66. otdf_python_proto/policy/kasregistry/key_access_server_registry_connect.py +912 -0
  67. otdf_python_proto/policy/keymanagement/__init__.py +11 -0
  68. otdf_python_proto/policy/keymanagement/key_management_connect.py +380 -0
  69. otdf_python_proto/policy/namespaces/__init__.py +11 -0
  70. otdf_python_proto/policy/namespaces/namespaces_connect.py +648 -0
  71. otdf_python_proto/policy/registeredresources/__init__.py +11 -0
  72. otdf_python_proto/policy/registeredresources/registered_resources_connect.py +770 -0
  73. otdf_python_proto/policy/resourcemapping/__init__.py +11 -0
  74. otdf_python_proto/policy/resourcemapping/resource_mapping_connect.py +790 -0
  75. otdf_python_proto/policy/subjectmapping/__init__.py +11 -0
  76. otdf_python_proto/policy/subjectmapping/subject_mapping_connect.py +851 -0
  77. otdf_python_proto/policy/unsafe/__init__.py +11 -0
  78. otdf_python_proto/policy/unsafe/unsafe_connect.py +705 -0
  79. otdf_python_proto/wellknownconfiguration/__init__.py +10 -0
  80. otdf_python_proto/wellknownconfiguration/wellknown_configuration_connect.py +124 -0
  81. otdf_python_proto/authorization/authorization_pb2_connect.py +0 -191
  82. otdf_python_proto/authorization/v2/authorization_pb2_connect.py +0 -233
  83. otdf_python_proto/entityresolution/entity_resolution_pb2_connect.py +0 -149
  84. otdf_python_proto/entityresolution/v2/entity_resolution_pb2_connect.py +0 -149
  85. otdf_python_proto/kas/kas_pb2_connect.py +0 -192
  86. otdf_python_proto/policy/actions/actions_pb2_connect.py +0 -275
  87. otdf_python_proto/policy/attributes/attributes_pb2_connect.py +0 -863
  88. otdf_python_proto/policy/kasregistry/key_access_server_registry_pb2_connect.py +0 -611
  89. otdf_python_proto/policy/keymanagement/key_management_pb2_connect.py +0 -275
  90. otdf_python_proto/policy/namespaces/namespaces_pb2_connect.py +0 -443
  91. otdf_python_proto/policy/registeredresources/registered_resources_pb2_connect.py +0 -527
  92. otdf_python_proto/policy/resourcemapping/resource_mapping_pb2_connect.py +0 -527
  93. otdf_python_proto/policy/subjectmapping/subject_mapping_pb2_connect.py +0 -569
  94. otdf_python_proto/policy/unsafe/unsafe_pb2_connect.py +0 -485
  95. otdf_python_proto/wellknownconfiguration/wellknown_configuration_pb2_connect.py +0 -107
  96. {otdf_python-0.4.0.dist-info → otdf_python-0.4.2.dist-info}/licenses/LICENSE +0 -0
@@ -0,0 +1,11 @@
1
+ """policy.keymanagement protobuf definitions."""
2
+
3
+ from .key_management_connect import (
4
+ KeyManagementServiceClient,
5
+ KeyManagementServiceClientSync,
6
+ )
7
+
8
+ __all__ = [
9
+ "KeyManagementServiceClient",
10
+ "KeyManagementServiceClientSync",
11
+ ]
@@ -0,0 +1,380 @@
1
+ # -*- coding: utf-8 -*-
2
+ # Generated by https://github.com/connectrpc/connect-python. DO NOT EDIT!
3
+ # source: policy/keymanagement/key_management.proto
4
+
5
+ from collections.abc import AsyncGenerator, AsyncIterator, Iterable, Iterator, Mapping
6
+ from typing import Protocol
7
+
8
+ from connectrpc.client import ConnectClient, ConnectClientSync
9
+ from connectrpc.code import Code
10
+ from connectrpc.errors import ConnectError
11
+ from connectrpc.interceptor import Interceptor, InterceptorSync
12
+ from connectrpc.method import IdempotencyLevel, MethodInfo
13
+ from connectrpc.request import Headers, RequestContext
14
+ from connectrpc.server import ConnectASGIApplication, ConnectWSGIApplication, Endpoint, EndpointSync
15
+ import policy.keymanagement.key_management_pb2 as policy_dot_keymanagement_dot_key__management__pb2
16
+
17
+
18
+ class KeyManagementService(Protocol):
19
+ async def create_provider_config(self, request: policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigRequest, ctx: RequestContext) -> policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigResponse:
20
+ raise ConnectError(Code.UNIMPLEMENTED, "Not implemented")
21
+
22
+ async def get_provider_config(self, request: policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigRequest, ctx: RequestContext) -> policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigResponse:
23
+ raise ConnectError(Code.UNIMPLEMENTED, "Not implemented")
24
+
25
+ async def list_provider_configs(self, request: policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsRequest, ctx: RequestContext) -> policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsResponse:
26
+ raise ConnectError(Code.UNIMPLEMENTED, "Not implemented")
27
+
28
+ async def update_provider_config(self, request: policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigRequest, ctx: RequestContext) -> policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigResponse:
29
+ raise ConnectError(Code.UNIMPLEMENTED, "Not implemented")
30
+
31
+ async def delete_provider_config(self, request: policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigRequest, ctx: RequestContext) -> policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigResponse:
32
+ raise ConnectError(Code.UNIMPLEMENTED, "Not implemented")
33
+
34
+
35
+ class KeyManagementServiceASGIApplication(ConnectASGIApplication[KeyManagementService]):
36
+ def __init__(self, service: KeyManagementService | AsyncGenerator[KeyManagementService], *, interceptors: Iterable[Interceptor]=(), read_max_bytes: int | None = None) -> None:
37
+ super().__init__(
38
+ service=service,
39
+ endpoints=lambda svc: {
40
+ "/policy.keymanagement.KeyManagementService/CreateProviderConfig": Endpoint.unary(
41
+ method=MethodInfo(
42
+ name="CreateProviderConfig",
43
+ service_name="policy.keymanagement.KeyManagementService",
44
+ input=policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigRequest,
45
+ output=policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigResponse,
46
+ idempotency_level=IdempotencyLevel.UNKNOWN,
47
+ ),
48
+ function=svc.create_provider_config,
49
+ ),
50
+ "/policy.keymanagement.KeyManagementService/GetProviderConfig": Endpoint.unary(
51
+ method=MethodInfo(
52
+ name="GetProviderConfig",
53
+ service_name="policy.keymanagement.KeyManagementService",
54
+ input=policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigRequest,
55
+ output=policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigResponse,
56
+ idempotency_level=IdempotencyLevel.UNKNOWN,
57
+ ),
58
+ function=svc.get_provider_config,
59
+ ),
60
+ "/policy.keymanagement.KeyManagementService/ListProviderConfigs": Endpoint.unary(
61
+ method=MethodInfo(
62
+ name="ListProviderConfigs",
63
+ service_name="policy.keymanagement.KeyManagementService",
64
+ input=policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsRequest,
65
+ output=policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsResponse,
66
+ idempotency_level=IdempotencyLevel.UNKNOWN,
67
+ ),
68
+ function=svc.list_provider_configs,
69
+ ),
70
+ "/policy.keymanagement.KeyManagementService/UpdateProviderConfig": Endpoint.unary(
71
+ method=MethodInfo(
72
+ name="UpdateProviderConfig",
73
+ service_name="policy.keymanagement.KeyManagementService",
74
+ input=policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigRequest,
75
+ output=policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigResponse,
76
+ idempotency_level=IdempotencyLevel.UNKNOWN,
77
+ ),
78
+ function=svc.update_provider_config,
79
+ ),
80
+ "/policy.keymanagement.KeyManagementService/DeleteProviderConfig": Endpoint.unary(
81
+ method=MethodInfo(
82
+ name="DeleteProviderConfig",
83
+ service_name="policy.keymanagement.KeyManagementService",
84
+ input=policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigRequest,
85
+ output=policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigResponse,
86
+ idempotency_level=IdempotencyLevel.UNKNOWN,
87
+ ),
88
+ function=svc.delete_provider_config,
89
+ ),
90
+ },
91
+ interceptors=interceptors,
92
+ read_max_bytes=read_max_bytes,
93
+ )
94
+
95
+ @property
96
+ def path(self) -> str:
97
+ """Returns the URL path to mount the application to when serving multiple applications."""
98
+ return "/policy.keymanagement.KeyManagementService"
99
+
100
+
101
+ class KeyManagementServiceClient(ConnectClient):
102
+ async def create_provider_config(
103
+ self,
104
+ request: policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigRequest,
105
+ *,
106
+ headers: Headers | Mapping[str, str] | None = None,
107
+ timeout_ms: int | None = None,
108
+ ) -> policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigResponse:
109
+ return await self.execute_unary(
110
+ request=request,
111
+ method=MethodInfo(
112
+ name="CreateProviderConfig",
113
+ service_name="policy.keymanagement.KeyManagementService",
114
+ input=policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigRequest,
115
+ output=policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigResponse,
116
+ idempotency_level=IdempotencyLevel.UNKNOWN,
117
+ ),
118
+ headers=headers,
119
+ timeout_ms=timeout_ms,
120
+ )
121
+
122
+ async def get_provider_config(
123
+ self,
124
+ request: policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigRequest,
125
+ *,
126
+ headers: Headers | Mapping[str, str] | None = None,
127
+ timeout_ms: int | None = None,
128
+ ) -> policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigResponse:
129
+ return await self.execute_unary(
130
+ request=request,
131
+ method=MethodInfo(
132
+ name="GetProviderConfig",
133
+ service_name="policy.keymanagement.KeyManagementService",
134
+ input=policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigRequest,
135
+ output=policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigResponse,
136
+ idempotency_level=IdempotencyLevel.UNKNOWN,
137
+ ),
138
+ headers=headers,
139
+ timeout_ms=timeout_ms,
140
+ )
141
+
142
+ async def list_provider_configs(
143
+ self,
144
+ request: policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsRequest,
145
+ *,
146
+ headers: Headers | Mapping[str, str] | None = None,
147
+ timeout_ms: int | None = None,
148
+ ) -> policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsResponse:
149
+ return await self.execute_unary(
150
+ request=request,
151
+ method=MethodInfo(
152
+ name="ListProviderConfigs",
153
+ service_name="policy.keymanagement.KeyManagementService",
154
+ input=policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsRequest,
155
+ output=policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsResponse,
156
+ idempotency_level=IdempotencyLevel.UNKNOWN,
157
+ ),
158
+ headers=headers,
159
+ timeout_ms=timeout_ms,
160
+ )
161
+
162
+ async def update_provider_config(
163
+ self,
164
+ request: policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigRequest,
165
+ *,
166
+ headers: Headers | Mapping[str, str] | None = None,
167
+ timeout_ms: int | None = None,
168
+ ) -> policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigResponse:
169
+ return await self.execute_unary(
170
+ request=request,
171
+ method=MethodInfo(
172
+ name="UpdateProviderConfig",
173
+ service_name="policy.keymanagement.KeyManagementService",
174
+ input=policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigRequest,
175
+ output=policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigResponse,
176
+ idempotency_level=IdempotencyLevel.UNKNOWN,
177
+ ),
178
+ headers=headers,
179
+ timeout_ms=timeout_ms,
180
+ )
181
+
182
+ async def delete_provider_config(
183
+ self,
184
+ request: policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigRequest,
185
+ *,
186
+ headers: Headers | Mapping[str, str] | None = None,
187
+ timeout_ms: int | None = None,
188
+ ) -> policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigResponse:
189
+ return await self.execute_unary(
190
+ request=request,
191
+ method=MethodInfo(
192
+ name="DeleteProviderConfig",
193
+ service_name="policy.keymanagement.KeyManagementService",
194
+ input=policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigRequest,
195
+ output=policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigResponse,
196
+ idempotency_level=IdempotencyLevel.UNKNOWN,
197
+ ),
198
+ headers=headers,
199
+ timeout_ms=timeout_ms,
200
+ )
201
+
202
+
203
+ class KeyManagementServiceSync(Protocol):
204
+ def create_provider_config(self, request: policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigRequest, ctx: RequestContext) -> policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigResponse:
205
+ raise ConnectError(Code.UNIMPLEMENTED, "Not implemented")
206
+ def get_provider_config(self, request: policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigRequest, ctx: RequestContext) -> policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigResponse:
207
+ raise ConnectError(Code.UNIMPLEMENTED, "Not implemented")
208
+ def list_provider_configs(self, request: policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsRequest, ctx: RequestContext) -> policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsResponse:
209
+ raise ConnectError(Code.UNIMPLEMENTED, "Not implemented")
210
+ def update_provider_config(self, request: policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigRequest, ctx: RequestContext) -> policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigResponse:
211
+ raise ConnectError(Code.UNIMPLEMENTED, "Not implemented")
212
+ def delete_provider_config(self, request: policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigRequest, ctx: RequestContext) -> policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigResponse:
213
+ raise ConnectError(Code.UNIMPLEMENTED, "Not implemented")
214
+
215
+
216
+ class KeyManagementServiceWSGIApplication(ConnectWSGIApplication):
217
+ def __init__(self, service: KeyManagementServiceSync, interceptors: Iterable[InterceptorSync]=(), read_max_bytes: int | None = None) -> None:
218
+ super().__init__(
219
+ endpoints={
220
+ "/policy.keymanagement.KeyManagementService/CreateProviderConfig": EndpointSync.unary(
221
+ method=MethodInfo(
222
+ name="CreateProviderConfig",
223
+ service_name="policy.keymanagement.KeyManagementService",
224
+ input=policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigRequest,
225
+ output=policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigResponse,
226
+ idempotency_level=IdempotencyLevel.UNKNOWN,
227
+ ),
228
+ function=service.create_provider_config,
229
+ ),
230
+ "/policy.keymanagement.KeyManagementService/GetProviderConfig": EndpointSync.unary(
231
+ method=MethodInfo(
232
+ name="GetProviderConfig",
233
+ service_name="policy.keymanagement.KeyManagementService",
234
+ input=policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigRequest,
235
+ output=policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigResponse,
236
+ idempotency_level=IdempotencyLevel.UNKNOWN,
237
+ ),
238
+ function=service.get_provider_config,
239
+ ),
240
+ "/policy.keymanagement.KeyManagementService/ListProviderConfigs": EndpointSync.unary(
241
+ method=MethodInfo(
242
+ name="ListProviderConfigs",
243
+ service_name="policy.keymanagement.KeyManagementService",
244
+ input=policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsRequest,
245
+ output=policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsResponse,
246
+ idempotency_level=IdempotencyLevel.UNKNOWN,
247
+ ),
248
+ function=service.list_provider_configs,
249
+ ),
250
+ "/policy.keymanagement.KeyManagementService/UpdateProviderConfig": EndpointSync.unary(
251
+ method=MethodInfo(
252
+ name="UpdateProviderConfig",
253
+ service_name="policy.keymanagement.KeyManagementService",
254
+ input=policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigRequest,
255
+ output=policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigResponse,
256
+ idempotency_level=IdempotencyLevel.UNKNOWN,
257
+ ),
258
+ function=service.update_provider_config,
259
+ ),
260
+ "/policy.keymanagement.KeyManagementService/DeleteProviderConfig": EndpointSync.unary(
261
+ method=MethodInfo(
262
+ name="DeleteProviderConfig",
263
+ service_name="policy.keymanagement.KeyManagementService",
264
+ input=policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigRequest,
265
+ output=policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigResponse,
266
+ idempotency_level=IdempotencyLevel.UNKNOWN,
267
+ ),
268
+ function=service.delete_provider_config,
269
+ ),
270
+ },
271
+ interceptors=interceptors,
272
+ read_max_bytes=read_max_bytes,
273
+ )
274
+
275
+ @property
276
+ def path(self) -> str:
277
+ """Returns the URL path to mount the application to when serving multiple applications."""
278
+ return "/policy.keymanagement.KeyManagementService"
279
+
280
+
281
+ class KeyManagementServiceClientSync(ConnectClientSync):
282
+ def create_provider_config(
283
+ self,
284
+ request: policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigRequest,
285
+ *,
286
+ headers: Headers | Mapping[str, str] | None = None,
287
+ timeout_ms: int | None = None,
288
+ ) -> policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigResponse:
289
+ return self.execute_unary(
290
+ request=request,
291
+ method=MethodInfo(
292
+ name="CreateProviderConfig",
293
+ service_name="policy.keymanagement.KeyManagementService",
294
+ input=policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigRequest,
295
+ output=policy_dot_keymanagement_dot_key__management__pb2.CreateProviderConfigResponse,
296
+ idempotency_level=IdempotencyLevel.UNKNOWN,
297
+ ),
298
+ headers=headers,
299
+ timeout_ms=timeout_ms,
300
+ )
301
+
302
+ def get_provider_config(
303
+ self,
304
+ request: policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigRequest,
305
+ *,
306
+ headers: Headers | Mapping[str, str] | None = None,
307
+ timeout_ms: int | None = None,
308
+ ) -> policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigResponse:
309
+ return self.execute_unary(
310
+ request=request,
311
+ method=MethodInfo(
312
+ name="GetProviderConfig",
313
+ service_name="policy.keymanagement.KeyManagementService",
314
+ input=policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigRequest,
315
+ output=policy_dot_keymanagement_dot_key__management__pb2.GetProviderConfigResponse,
316
+ idempotency_level=IdempotencyLevel.UNKNOWN,
317
+ ),
318
+ headers=headers,
319
+ timeout_ms=timeout_ms,
320
+ )
321
+
322
+ def list_provider_configs(
323
+ self,
324
+ request: policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsRequest,
325
+ *,
326
+ headers: Headers | Mapping[str, str] | None = None,
327
+ timeout_ms: int | None = None,
328
+ ) -> policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsResponse:
329
+ return self.execute_unary(
330
+ request=request,
331
+ method=MethodInfo(
332
+ name="ListProviderConfigs",
333
+ service_name="policy.keymanagement.KeyManagementService",
334
+ input=policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsRequest,
335
+ output=policy_dot_keymanagement_dot_key__management__pb2.ListProviderConfigsResponse,
336
+ idempotency_level=IdempotencyLevel.UNKNOWN,
337
+ ),
338
+ headers=headers,
339
+ timeout_ms=timeout_ms,
340
+ )
341
+
342
+ def update_provider_config(
343
+ self,
344
+ request: policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigRequest,
345
+ *,
346
+ headers: Headers | Mapping[str, str] | None = None,
347
+ timeout_ms: int | None = None,
348
+ ) -> policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigResponse:
349
+ return self.execute_unary(
350
+ request=request,
351
+ method=MethodInfo(
352
+ name="UpdateProviderConfig",
353
+ service_name="policy.keymanagement.KeyManagementService",
354
+ input=policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigRequest,
355
+ output=policy_dot_keymanagement_dot_key__management__pb2.UpdateProviderConfigResponse,
356
+ idempotency_level=IdempotencyLevel.UNKNOWN,
357
+ ),
358
+ headers=headers,
359
+ timeout_ms=timeout_ms,
360
+ )
361
+
362
+ def delete_provider_config(
363
+ self,
364
+ request: policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigRequest,
365
+ *,
366
+ headers: Headers | Mapping[str, str] | None = None,
367
+ timeout_ms: int | None = None,
368
+ ) -> policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigResponse:
369
+ return self.execute_unary(
370
+ request=request,
371
+ method=MethodInfo(
372
+ name="DeleteProviderConfig",
373
+ service_name="policy.keymanagement.KeyManagementService",
374
+ input=policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigRequest,
375
+ output=policy_dot_keymanagement_dot_key__management__pb2.DeleteProviderConfigResponse,
376
+ idempotency_level=IdempotencyLevel.UNKNOWN,
377
+ ),
378
+ headers=headers,
379
+ timeout_ms=timeout_ms,
380
+ )
@@ -0,0 +1,11 @@
1
+ """policy.namespaces protobuf definitions."""
2
+
3
+ from .namespaces_connect import (
4
+ NamespaceServiceClient,
5
+ NamespaceServiceClientSync,
6
+ )
7
+
8
+ __all__ = [
9
+ "NamespaceServiceClient",
10
+ "NamespaceServiceClientSync",
11
+ ]