pyegeria 1.5.1.1.9__py3-none-any.whl → 1.5.1.1.11__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pyegeria/glossary_manager_omvs.py +3 -0
- pyegeria/runtime_manager_omvs.py +105 -48
- {pyegeria-1.5.1.1.9.dist-info → pyegeria-1.5.1.1.11.dist-info}/METADATA +1 -1
- {pyegeria-1.5.1.1.9.dist-info → pyegeria-1.5.1.1.11.dist-info}/RECORD +7 -7
- {pyegeria-1.5.1.1.9.dist-info → pyegeria-1.5.1.1.11.dist-info}/LICENSE +0 -0
- {pyegeria-1.5.1.1.9.dist-info → pyegeria-1.5.1.1.11.dist-info}/WHEEL +0 -0
- {pyegeria-1.5.1.1.9.dist-info → pyegeria-1.5.1.1.11.dist-info}/entry_points.txt +0 -0
@@ -1511,6 +1511,9 @@ class GlossaryManager(GlossaryBrowser):
|
|
1511
1511
|
"initialStatus": status,
|
1512
1512
|
}
|
1513
1513
|
|
1514
|
+
# if upsert:
|
1515
|
+
# if len(qualified_name) > 5:
|
1516
|
+
# existing_term =
|
1514
1517
|
# Add the term
|
1515
1518
|
term_guid = self.create_controlled_glossary_term(
|
1516
1519
|
glossary_guid, body_slimmer(body)
|
pyegeria/runtime_manager_omvs.py
CHANGED
@@ -59,15 +59,27 @@ class RuntimeManager(Client):
|
|
59
59
|
)
|
60
60
|
|
61
61
|
async def __async__get_guid__(
|
62
|
-
self,
|
62
|
+
self,
|
63
|
+
guid: str = None,
|
64
|
+
name: str = None,
|
65
|
+
property_name: str = "qualifiedName",
|
66
|
+
tech_type: str = None,
|
63
67
|
) -> str:
|
64
68
|
"""Helper function to return a server_guid - one of server_guid or server_name should
|
65
69
|
contain information. If both are None, an exception will be thrown. If both contain
|
66
|
-
values, server_guid will be used.
|
70
|
+
values, server_guid will be used. If the tech_type is supplied and the property_name is qualifiedName
|
71
|
+
then the name will be pre-pended with the tech_type name to form a qualifiedName.
|
72
|
+
|
73
|
+
An InvalidParameter Exception is thrown if multiple matches
|
74
|
+
are found for the given property name. If this occurs, use a qualified name for the property name.
|
75
|
+
Async version.
|
67
76
|
"""
|
68
77
|
if guid:
|
69
78
|
return guid
|
70
79
|
if name:
|
80
|
+
if (tech_type) and (property_name == "qualifiedName"):
|
81
|
+
name = f"{tech_type}:{name}"
|
82
|
+
|
71
83
|
body = {
|
72
84
|
"class": "NameRequestBody",
|
73
85
|
"name": name,
|
@@ -92,15 +104,23 @@ class RuntimeManager(Client):
|
|
92
104
|
)
|
93
105
|
|
94
106
|
def __get_guid__(
|
95
|
-
self,
|
107
|
+
self,
|
108
|
+
guid: str = None,
|
109
|
+
name: str = None,
|
110
|
+
property_name: str = "qualifiedName",
|
111
|
+
tech_type: str = None,
|
96
112
|
) -> str:
|
97
113
|
"""Helper function to return a server_guid - one of server_guid or server_name should
|
98
114
|
contain information. If both are None, an exception will be thrown. If both contain
|
99
|
-
values, server_guid will be used.
|
115
|
+
values, server_guid will be used. If the tech_type is supplied and the property_name is qualifiedName
|
116
|
+
then the name will be pre-pended with the tech_type name to form a qualifiedName.
|
117
|
+
|
118
|
+
An InvalidParameter Exception is thrown if multiple matches
|
119
|
+
are found for the given property name. If this occurs, use a qualified name for the property name.
|
100
120
|
"""
|
101
121
|
loop = asyncio.get_event_loop()
|
102
122
|
result = loop.run_until_complete(
|
103
|
-
self.__async__get_guid__(guid, name, property_name)
|
123
|
+
self.__async__get_guid__(guid, name, property_name, tech_type)
|
104
124
|
)
|
105
125
|
return result
|
106
126
|
|
@@ -111,7 +131,7 @@ class RuntimeManager(Client):
|
|
111
131
|
self,
|
112
132
|
cohort_name: str,
|
113
133
|
server_guid: str = None,
|
114
|
-
|
134
|
+
server_qualified_name: str = None,
|
115
135
|
) -> None:
|
116
136
|
"""A new server needs to register the metadataCollectionId for its metadata repository with the other servers
|
117
137
|
in the open metadata repository. It only needs to do this once and uses a timestamp to record that the
|
@@ -124,8 +144,8 @@ class RuntimeManager(Client):
|
|
124
144
|
----------
|
125
145
|
server_guid : str, default = None
|
126
146
|
Identity of the server to act on. If not specified, server_name must be.
|
127
|
-
|
128
|
-
|
147
|
+
server_qualified_name: str, default = None
|
148
|
+
Unique name of server to act on. If not specified, server_guid must be.
|
129
149
|
cohort_name : str
|
130
150
|
Name of the cohort to join
|
131
151
|
|
@@ -140,7 +160,7 @@ class RuntimeManager(Client):
|
|
140
160
|
UserNotAuthorizedException
|
141
161
|
|
142
162
|
"""
|
143
|
-
server_guid = self.__get_guid__(server_guid,
|
163
|
+
server_guid = self.__get_guid__(server_guid, server_qualified_name)
|
144
164
|
url = (
|
145
165
|
f"{self.runtime_command_root}/cohort-members/"
|
146
166
|
f"{server_guid}/cohorts/{cohort_name}/connect"
|
@@ -149,7 +169,10 @@ class RuntimeManager(Client):
|
|
149
169
|
return
|
150
170
|
|
151
171
|
def connect_to_cohort(
|
152
|
-
self,
|
172
|
+
self,
|
173
|
+
cohort_name: str,
|
174
|
+
server_guid: str = None,
|
175
|
+
server_qualified_name: str = None,
|
153
176
|
) -> None:
|
154
177
|
"""A new server needs to register the metadataCollectionId for its metadata repository with the other servers
|
155
178
|
in the open metadata repository. It only needs to do this once and uses a timestamp to record that the
|
@@ -162,8 +185,8 @@ class RuntimeManager(Client):
|
|
162
185
|
----------
|
163
186
|
server_guid : str, default = None
|
164
187
|
Identity of the server to act on. If not specified, server_name must be.
|
165
|
-
|
166
|
-
|
188
|
+
server_qualified_name: str, default = None
|
189
|
+
Unique name of server to act on. If not specified, server_guid must be.
|
167
190
|
cohort_name: str
|
168
191
|
Name of the cohort to join
|
169
192
|
|
@@ -180,12 +203,17 @@ class RuntimeManager(Client):
|
|
180
203
|
"""
|
181
204
|
loop = asyncio.get_event_loop()
|
182
205
|
loop.run_until_complete(
|
183
|
-
self._async_connect_to_cohort(
|
206
|
+
self._async_connect_to_cohort(
|
207
|
+
cohort_name, server_guid, server_qualified_name
|
208
|
+
)
|
184
209
|
)
|
185
210
|
return
|
186
211
|
|
187
212
|
async def _async_disconnect_from_cohort(
|
188
|
-
self,
|
213
|
+
self,
|
214
|
+
cohort_name: str,
|
215
|
+
server_guid: str = None,
|
216
|
+
server_qualified_name: str = None,
|
189
217
|
) -> None:
|
190
218
|
"""Disconnect communications from a specific cohort. Async version.
|
191
219
|
|
@@ -195,8 +223,8 @@ class RuntimeManager(Client):
|
|
195
223
|
----------
|
196
224
|
server_guid : str, default = None
|
197
225
|
Identity of the server to act on. If not specified, server_name must be.
|
198
|
-
|
199
|
-
|
226
|
+
server_qualified_name: str, default = None
|
227
|
+
Unique name of server to act on. If not specified, server_guid must be.
|
200
228
|
cohort_name : str
|
201
229
|
Name of the cohort to join
|
202
230
|
|
@@ -211,7 +239,7 @@ class RuntimeManager(Client):
|
|
211
239
|
UserNotAuthorizedException
|
212
240
|
|
213
241
|
"""
|
214
|
-
server_guid = self.__get_guid__(server_guid,
|
242
|
+
server_guid = self.__get_guid__(server_guid, server_qualified_name)
|
215
243
|
url = (
|
216
244
|
f"{self.runtime_command_root}/runtime-manager/cohort-members/"
|
217
245
|
f"{server_guid}/cohorts/{cohort_name}/disconnect"
|
@@ -220,7 +248,10 @@ class RuntimeManager(Client):
|
|
220
248
|
return
|
221
249
|
|
222
250
|
def disconnect_from_cohort(
|
223
|
-
self,
|
251
|
+
self,
|
252
|
+
cohort_name: str,
|
253
|
+
server_guid: str = None,
|
254
|
+
server_qualified_name: str = None,
|
224
255
|
) -> None:
|
225
256
|
"""Disconnect communications from a specific cohort.
|
226
257
|
|
@@ -230,8 +261,8 @@ class RuntimeManager(Client):
|
|
230
261
|
----------
|
231
262
|
server_guid : str, default = None
|
232
263
|
Identity of the server to act on. If not specified, server_name must be.
|
233
|
-
|
234
|
-
|
264
|
+
server_qualified_name: str, default = None
|
265
|
+
Unique name of server to act on. If not specified, server_guid must be.
|
235
266
|
cohort_name: str
|
236
267
|
Name of the cohort to join
|
237
268
|
|
@@ -248,12 +279,17 @@ class RuntimeManager(Client):
|
|
248
279
|
"""
|
249
280
|
loop = asyncio.get_event_loop()
|
250
281
|
loop.run_until_complete(
|
251
|
-
self._async_disconnect_from_cohort(
|
282
|
+
self._async_disconnect_from_cohort(
|
283
|
+
cohort_name, server_guid, server_qualified_name
|
284
|
+
)
|
252
285
|
)
|
253
286
|
return
|
254
287
|
|
255
288
|
async def _async_unregister_from_cohort(
|
256
|
-
self,
|
289
|
+
self,
|
290
|
+
cohort_name: str,
|
291
|
+
server_guid: str = None,
|
292
|
+
server_qualified_name: str = None,
|
257
293
|
) -> None:
|
258
294
|
"""Unregister from a specific cohort and disconnect from cohort communications. Async version.
|
259
295
|
|
@@ -263,8 +299,8 @@ class RuntimeManager(Client):
|
|
263
299
|
----------
|
264
300
|
server_guid : str, default = None
|
265
301
|
Identity of the server to act on. If not specified, server_name must be.
|
266
|
-
|
267
|
-
|
302
|
+
server_qualified_name: str, default = None
|
303
|
+
Unique name of server to act on. If not specified, server_guid must be.
|
268
304
|
cohort_name : str
|
269
305
|
Name of the cohort to join
|
270
306
|
|
@@ -279,7 +315,7 @@ class RuntimeManager(Client):
|
|
279
315
|
UserNotAuthorizedException
|
280
316
|
|
281
317
|
"""
|
282
|
-
server_guid = self.__get_guid__(server_guid,
|
318
|
+
server_guid = self.__get_guid__(server_guid, server_qualified_name)
|
283
319
|
url = (
|
284
320
|
f"{self.runtime_command_root}/cohort-members/"
|
285
321
|
f"{server_guid}/cohorts/{cohort_name}/unregister"
|
@@ -288,7 +324,10 @@ class RuntimeManager(Client):
|
|
288
324
|
return
|
289
325
|
|
290
326
|
def unregister_from_cohort(
|
291
|
-
self,
|
327
|
+
self,
|
328
|
+
cohort_name: str,
|
329
|
+
server_guid: str = None,
|
330
|
+
server_qualified_name: str = None,
|
292
331
|
) -> None:
|
293
332
|
"""Unregister from a specific cohort and disconnect from cohort communications.
|
294
333
|
https://egeria-project.org/concepts/cohort-member/
|
@@ -297,8 +336,8 @@ class RuntimeManager(Client):
|
|
297
336
|
----------
|
298
337
|
server_guid : str, default = None
|
299
338
|
Identity of the server to act on. If not specified, server_name must be.
|
300
|
-
|
301
|
-
|
339
|
+
server_qualified_name: str, default = None
|
340
|
+
Unique name of server to act on. If not specified, server_guid must be.
|
302
341
|
cohort_name: str
|
303
342
|
Name of the cohort to join
|
304
343
|
|
@@ -315,7 +354,9 @@ class RuntimeManager(Client):
|
|
315
354
|
"""
|
316
355
|
loop = asyncio.get_event_loop()
|
317
356
|
loop.run_until_complete(
|
318
|
-
self._async_disconnect_from_cohort(
|
357
|
+
self._async_disconnect_from_cohort(
|
358
|
+
cohort_name, server_guid, server_qualified_name
|
359
|
+
)
|
319
360
|
)
|
320
361
|
return
|
321
362
|
|
@@ -357,7 +398,7 @@ class RuntimeManager(Client):
|
|
357
398
|
UserNotAuthorizedException
|
358
399
|
|
359
400
|
"""
|
360
|
-
server_guid = self.__get_guid__(server_guid, server_name)
|
401
|
+
server_guid = self.__get_guid__(server_guid, server_name, "name")
|
361
402
|
url = (
|
362
403
|
f"{self.runtime_command_root}/engine-hosts/"
|
363
404
|
f"{server_guid}/governance_engines/{gov_engine_name}/refresh-config"
|
@@ -436,7 +477,9 @@ class RuntimeManager(Client):
|
|
436
477
|
UserNotAuthorizedException
|
437
478
|
|
438
479
|
"""
|
439
|
-
server_guid = self.__get_guid__(
|
480
|
+
server_guid = self.__get_guid__(
|
481
|
+
server_guid, server_name, "qualifiedName", "Integration Daemon"
|
482
|
+
)
|
440
483
|
url = (
|
441
484
|
f"{self.runtime_command_root}/integration-daemons/"
|
442
485
|
f"{server_guid}/integration-connectors/{connector_name}/configuration-properties"
|
@@ -518,7 +561,9 @@ class RuntimeManager(Client):
|
|
518
561
|
UserNotAuthorizedException
|
519
562
|
|
520
563
|
"""
|
521
|
-
server_guid = self.__get_guid__(
|
564
|
+
server_guid = self.__get_guid__(
|
565
|
+
server_guid, server_name, "qualifiedName", "Connection"
|
566
|
+
)
|
522
567
|
url = (
|
523
568
|
f"{self.runtime_command_root}/integration-daemons/"
|
524
569
|
f"{server_guid}/integration-connectors/{connector_name}/configuration-properties"
|
@@ -618,7 +663,9 @@ class RuntimeManager(Client):
|
|
618
663
|
UserNotAuthorizedException
|
619
664
|
|
620
665
|
"""
|
621
|
-
server_guid = self.__get_guid__(
|
666
|
+
server_guid = self.__get_guid__(
|
667
|
+
server_guid, server_name, "qualifiedName", "Connection"
|
668
|
+
)
|
622
669
|
url = (
|
623
670
|
f"{self.runtime_command_root}/integration-daemons/"
|
624
671
|
f"{server_guid}/integration-connectors/{connector_name}/endpoint-network-address"
|
@@ -705,7 +752,9 @@ class RuntimeManager(Client):
|
|
705
752
|
UserNotAuthorizedException
|
706
753
|
|
707
754
|
"""
|
708
|
-
server_guid = self.__get_guid__(
|
755
|
+
server_guid = self.__get_guid__(
|
756
|
+
server_guid, server_name, "qualifiedName", "Integration Daemon"
|
757
|
+
)
|
709
758
|
url = (
|
710
759
|
f"{self.runtime_command_root}/integration-daemons/"
|
711
760
|
f"{server_guid}/integration-connectors/refresh"
|
@@ -788,7 +837,9 @@ class RuntimeManager(Client):
|
|
788
837
|
UserNotAuthorizedException
|
789
838
|
|
790
839
|
"""
|
791
|
-
server_guid = self.__get_guid__(
|
840
|
+
server_guid = self.__get_guid__(
|
841
|
+
server_guid, server_name, "qualifiedName", "Integration Daemon"
|
842
|
+
)
|
792
843
|
url = (
|
793
844
|
f"{self.runtime_command_root}/integration-daemons/"
|
794
845
|
f"{server_guid}/integration-connectors/restart"
|
@@ -873,7 +924,9 @@ class RuntimeManager(Client):
|
|
873
924
|
UserNotAuthorizedException
|
874
925
|
|
875
926
|
"""
|
876
|
-
server_guid = self.__get_guid__(
|
927
|
+
server_guid = self.__get_guid__(
|
928
|
+
server_guid, server_name, "qualifiedName", "Integration Daemon"
|
929
|
+
)
|
877
930
|
url = (
|
878
931
|
f"{self.runtime_command_root}/integration-daemons/"
|
879
932
|
f"{server_guid}/integration-groups/{integ_group_name}/refresh-config"
|
@@ -957,7 +1010,7 @@ class RuntimeManager(Client):
|
|
957
1010
|
UserNotAuthorizedException
|
958
1011
|
|
959
1012
|
"""
|
960
|
-
server_guid = self.__get_guid__(server_guid, server_name)
|
1013
|
+
server_guid = self.__get_guid__(server_guid, server_name, "name")
|
961
1014
|
url = (
|
962
1015
|
f"{self.runtime_command_root}/integration-daemons/"
|
963
1016
|
f"{server_guid}/integration-daemons/{server_guid}/open-lineage-events/publish"
|
@@ -1038,7 +1091,9 @@ class RuntimeManager(Client):
|
|
1038
1091
|
UserNotAuthorizedException
|
1039
1092
|
|
1040
1093
|
"""
|
1041
|
-
server_guid = self.__get_guid__(
|
1094
|
+
server_guid = self.__get_guid__(
|
1095
|
+
server_guid, server_name, "qualifiedName", "Metadata Access Store"
|
1096
|
+
)
|
1042
1097
|
url = (
|
1043
1098
|
f"{self.runtime_command_root}/metadata-access-stores/{server_guid}/instance/load/open-metadata-archives/"
|
1044
1099
|
f"archive-content"
|
@@ -1129,7 +1184,9 @@ class RuntimeManager(Client):
|
|
1129
1184
|
|
1130
1185
|
"""
|
1131
1186
|
server_name = f"Metadata Access Server:{server_name}"
|
1132
|
-
server_guid = self.__get_guid__(
|
1187
|
+
server_guid = self.__get_guid__(
|
1188
|
+
server_guid, server_name, "qualifiedName", "Metadata Access Store"
|
1189
|
+
)
|
1133
1190
|
url = f"{self.runtime_command_root}/metadata-access-stores/{server_guid}/instance/load/open-metadata-archives/file"
|
1134
1191
|
|
1135
1192
|
await self._async_make_request(
|
@@ -1209,7 +1266,7 @@ class RuntimeManager(Client):
|
|
1209
1266
|
UserNotAuthorizedException
|
1210
1267
|
|
1211
1268
|
"""
|
1212
|
-
server_guid = self.__get_guid__(server_guid, server_name)
|
1269
|
+
server_guid = self.__get_guid__(server_guid, server_name, "name")
|
1213
1270
|
url = f"{self.runtime_command_root}/omag-servers/{server_guid}"
|
1214
1271
|
|
1215
1272
|
await self._async_make_request("DELETE", url)
|
@@ -1274,7 +1331,7 @@ class RuntimeManager(Client):
|
|
1274
1331
|
UserNotAuthorizedException
|
1275
1332
|
|
1276
1333
|
"""
|
1277
|
-
server_guid = self.__get_guid__(server_guid, server_name)
|
1334
|
+
server_guid = self.__get_guid__(server_guid, server_name, "name")
|
1278
1335
|
url = f"{self.runtime_command_root}/omag-servers/{server_guid}/instance"
|
1279
1336
|
|
1280
1337
|
await self._async_make_request("POST", url, time_out=timeout)
|
@@ -1339,7 +1396,7 @@ class RuntimeManager(Client):
|
|
1339
1396
|
UserNotAuthorizedException
|
1340
1397
|
|
1341
1398
|
"""
|
1342
|
-
server_guid = self.__get_guid__(server_guid, server_name)
|
1399
|
+
server_guid = self.__get_guid__(server_guid, server_name, "name")
|
1343
1400
|
url = f"{self.runtime_command_root}/omag-servers/{server_guid}/instance"
|
1344
1401
|
|
1345
1402
|
await self._async_make_request("DELETE", url)
|
@@ -1674,7 +1731,7 @@ class RuntimeManager(Client):
|
|
1674
1731
|
UserNotAuthorizedException
|
1675
1732
|
|
1676
1733
|
"""
|
1677
|
-
platform_guid = self.__get_guid__(platform_guid, platform_name)
|
1734
|
+
platform_guid = self.__get_guid__(platform_guid, platform_name, "name")
|
1678
1735
|
url = f"{self.runtime_command_root}/platforms/{platform_guid}/report"
|
1679
1736
|
|
1680
1737
|
response = await self._async_make_request("GET", url)
|
@@ -1778,7 +1835,6 @@ class RuntimeManager(Client):
|
|
1778
1835
|
async def _async_get_server_by_guid(
|
1779
1836
|
self,
|
1780
1837
|
server_guid: str = None,
|
1781
|
-
server_name: str = None,
|
1782
1838
|
effective_time: str = None,
|
1783
1839
|
) -> str | dict:
|
1784
1840
|
"""Returns details about the server's catalog entry (asset). Async version.
|
@@ -1802,7 +1858,7 @@ class RuntimeManager(Client):
|
|
1802
1858
|
UserNotAuthorizedException
|
1803
1859
|
|
1804
1860
|
"""
|
1805
|
-
|
1861
|
+
|
1806
1862
|
url = f"{self.runtime_command_root}/software-servers/{server_guid}"
|
1807
1863
|
|
1808
1864
|
if effective_time is not None:
|
@@ -1817,7 +1873,6 @@ class RuntimeManager(Client):
|
|
1817
1873
|
def get_server_by_guid(
|
1818
1874
|
self,
|
1819
1875
|
server_guid: str = None,
|
1820
|
-
server_name: str = None,
|
1821
1876
|
effective_time: str = None,
|
1822
1877
|
) -> str | dict:
|
1823
1878
|
"""Returns details about the platform's catalog entry (asset).
|
@@ -1843,7 +1898,7 @@ class RuntimeManager(Client):
|
|
1843
1898
|
"""
|
1844
1899
|
loop = asyncio.get_event_loop()
|
1845
1900
|
response = loop.run_until_complete(
|
1846
|
-
self._async_get_server_by_guid(server_guid,
|
1901
|
+
self._async_get_server_by_guid(server_guid, effective_time)
|
1847
1902
|
)
|
1848
1903
|
return response
|
1849
1904
|
|
@@ -2135,7 +2190,9 @@ class RuntimeManager(Client):
|
|
2135
2190
|
UserNotAuthorizedException
|
2136
2191
|
|
2137
2192
|
"""
|
2138
|
-
server_guid = self.__get_guid__(
|
2193
|
+
server_guid = self.__get_guid__(
|
2194
|
+
server_guid, server_name, "name", tech_type="OMAG Server"
|
2195
|
+
)
|
2139
2196
|
url = f"{self.runtime_command_root}/omag-servers/{server_guid}/instance/report"
|
2140
2197
|
|
2141
2198
|
response = await self._async_make_request("GET", url)
|
@@ -92,20 +92,20 @@ pyegeria/egeria_tech_client.py,sha256=7NfqpJFft5GR4NPRDVDw22L9caHbXB8fhx0TAf6qEo
|
|
92
92
|
pyegeria/feedback_manager_omvs.py,sha256=B66e3ZCaC_dirb0mcb2Nz3PYh2ZKsoMAYNOb3euNiro,152931
|
93
93
|
pyegeria/full_omag_server_config.py,sha256=LBnqUiz1ofBdlKBzECFs_pQbdJwcWigAukWHGJRR2nU,47340
|
94
94
|
pyegeria/glossary_browser_omvs.py,sha256=NcitYaZJqwVODBO5zBtWpXPNUJJ3DKzEbRaOFSAyUlg,93554
|
95
|
-
pyegeria/glossary_manager_omvs.py,sha256=
|
95
|
+
pyegeria/glossary_manager_omvs.py,sha256=QOx4OwESPAF4cjrkHsHxGfvyQkJaPbYCzWGEMqfnFFg,116964
|
96
96
|
pyegeria/mermaid_utilities.py,sha256=GXiS-subb5nJcDqlThZWX2T8WspU1neFfhf4TxRoMh4,8344
|
97
97
|
pyegeria/my_profile_omvs.py,sha256=DyECbUFEcgokrIbzdMMNljC3bqfqKGXAF2wZEpzvRYs,34666
|
98
98
|
pyegeria/platform_services.py,sha256=CJIOYIFEbcIGwdWlApAQcXxZTsdrhFtpJcm4O3p7dG0,41646
|
99
99
|
pyegeria/project_manager_omvs.py,sha256=Y7Lyqh4jIujJrr_Ub7feo904FN_uz4R10T4hKhqE1Uw,67499
|
100
100
|
pyegeria/registered_info.py,sha256=y0-LgDIQXpph0lEWxIOG3_HsqX_Z2iAIb3xu4Aa4B70,6344
|
101
|
-
pyegeria/runtime_manager_omvs.py,sha256=
|
101
|
+
pyegeria/runtime_manager_omvs.py,sha256=En4Y2oBPXX477NRT3mEp4bdpPCYKx-HCihcKdaPlb0M,76222
|
102
102
|
pyegeria/server_operations.py,sha256=ciH890hYT85YQ6OpByn4w7s3a7TtvWZpIG5rkRqbcI0,16766
|
103
103
|
pyegeria/template_manager_omvs.py,sha256=heqbKeum5hPCHap4r1RUZU8YB3QaQlxVNbq4GZimJtE,42450
|
104
104
|
pyegeria/utils.py,sha256=1h6bwveadd6GpbnGLTmqPBmBk68QvxdjGTI9RfbrgKY,5415
|
105
105
|
pyegeria/valid_metadata_omvs.py,sha256=tfCGXed5LLt59YA8uZNNtd9UJ-lRZfPU_uZxK31Yux0,65069
|
106
106
|
pyegeria/x_action_author_omvs.py,sha256=xu1IQ0YbhIKi17C5a7Aq9u1Az2czwahNPpX9czmyVxE,6454
|
107
|
-
pyegeria-1.5.1.1.
|
108
|
-
pyegeria-1.5.1.1.
|
109
|
-
pyegeria-1.5.1.1.
|
110
|
-
pyegeria-1.5.1.1.
|
111
|
-
pyegeria-1.5.1.1.
|
107
|
+
pyegeria-1.5.1.1.11.dist-info/LICENSE,sha256=xx0jnfkXJvxRnG63LTGOxlggYnIysveWIZ6H3PNdCrQ,11357
|
108
|
+
pyegeria-1.5.1.1.11.dist-info/METADATA,sha256=1gGEbsh_40wIn2PEdk8fEwwQQg5UufTbuZjRBN3MUgQ,2998
|
109
|
+
pyegeria-1.5.1.1.11.dist-info/WHEEL,sha256=sP946D7jFCHeNz5Iq4fL4Lu-PrWrFsgfLXbbkciIZwg,88
|
110
|
+
pyegeria-1.5.1.1.11.dist-info/entry_points.txt,sha256=aSpiaOuOEL1QBfuIGOaATzDCihpVOyvIK1XCQHK3uRc,4186
|
111
|
+
pyegeria-1.5.1.1.11.dist-info/RECORD,,
|
File without changes
|
File without changes
|
File without changes
|