soprano-sdk 0.1.100__tar.gz → 0.2.1__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/PKG-INFO +1 -1
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/pyproject.toml +1 -1
- soprano_sdk-0.2.1/soprano_sdk/authenticators/mfa.py +153 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/core/constants.py +17 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/core/engine.py +52 -4
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/core/state.py +9 -1
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/nodes/base.py +5 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/nodes/call_function.py +22 -2
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/nodes/collect_input.py +3 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/tools.py +0 -2
- soprano_sdk-0.2.1/soprano_sdk/utils/__init__.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/validation/schema.py +22 -1
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/validation/validator.py +38 -1
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/uv.lock +67 -69
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/.github/workflows/test_build_and_publish.yaml +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/.gitignore +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/.python-version +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/CLAUDE.md +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/LICENSE +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/README.md +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/framework_example.yaml +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/greeting_functions.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/greeting_workflow.yaml +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/main.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/persistence/README.md +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/persistence/conversation_based.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/persistence/entity_based.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/persistence/mongodb_demo.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/return_functions.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/return_workflow.yaml +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/structured_output_example.yaml +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/supervisors/README.md +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/supervisors/crewai_supervisor_ui.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/supervisors/langgraph_supervisor_ui.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/supervisors/tools/__init__.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/supervisors/tools/crewai_tools.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/supervisors/tools/langgraph_tools.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/supervisors/workflow_tools.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/tools/__init__.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/tools/address.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/examples/validator.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/legacy/langgraph_demo.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/legacy/langgraph_selfloop_demo.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/legacy/langgraph_v.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/legacy/main.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/legacy/return_fsm.excalidraw +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/legacy/return_state_machine.png +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/legacy/ui.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/scripts/visualize_workflow.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/scripts/workflow_demo.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/scripts/workflow_demo_ui.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/__init__.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/agents/__init__.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/agents/adaptor.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/agents/factory.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/agents/structured_output.py +0 -0
- {soprano_sdk-0.1.100/soprano_sdk/core → soprano_sdk-0.2.1/soprano_sdk/authenticators}/__init__.py +0 -0
- {soprano_sdk-0.1.100/soprano_sdk/nodes → soprano_sdk-0.2.1/soprano_sdk/core}/__init__.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/core/rollback_strategies.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/engine.py +0 -0
- {soprano_sdk-0.1.100/soprano_sdk/routing → soprano_sdk-0.2.1/soprano_sdk/nodes}/__init__.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/nodes/factory.py +0 -0
- {soprano_sdk-0.1.100/soprano_sdk/utils → soprano_sdk-0.2.1/soprano_sdk/routing}/__init__.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/routing/router.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/utils/function.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/utils/logger.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/utils/template.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/utils/tool.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/utils/tracing.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/soprano_sdk/validation/__init__.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/tests/debug_jinja2.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/tests/test_agent_factory.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/tests/test_collect_input_refactor.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/tests/test_external_values.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/tests/test_inputs_validation.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/tests/test_jinja2_path.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/tests/test_jinja2_standalone.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/tests/test_persistence.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/tests/test_structured_output.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/tests/test_transition_routing.py +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/todo.md +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/.eslintrc.cjs +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/.gitignore +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/README.md +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/index.html +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/package-lock.json +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/package.json +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/src/App.jsx +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/src/CustomNode.jsx +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/src/StepDetailsModal.jsx +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/src/WorkflowGraph.jsx +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/src/WorkflowInfoPanel.jsx +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/src/assets/react.svg +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/src/main.jsx +0 -0
- {soprano_sdk-0.1.100 → soprano_sdk-0.2.1}/workflow-visualizer/vite.config.js +0 -0
|
@@ -4,7 +4,7 @@ build-backend = "hatchling.build"
|
|
|
4
4
|
|
|
5
5
|
[project]
|
|
6
6
|
name = "soprano-sdk"
|
|
7
|
-
version = "0.1
|
|
7
|
+
version = "0.2.1"
|
|
8
8
|
description = "YAML-driven workflow engine with AI agent integration for building conversational SOPs"
|
|
9
9
|
readme = "README.md"
|
|
10
10
|
requires-python = ">=3.12"
|
|
@@ -0,0 +1,153 @@
|
|
|
1
|
+
import requests
|
|
2
|
+
from typing import TypedDict, Literal, NotRequired
|
|
3
|
+
from soprano_sdk.core.constants import MFARestAuthorizerEnv
|
|
4
|
+
|
|
5
|
+
|
|
6
|
+
class MFAChallenge(TypedDict):
|
|
7
|
+
value: str
|
|
8
|
+
|
|
9
|
+
|
|
10
|
+
class MFAState(TypedDict):
|
|
11
|
+
challengeType: Literal['OTP', 'dob']
|
|
12
|
+
post_payload: dict[str, str]
|
|
13
|
+
otpValue: NotRequired[str]
|
|
14
|
+
status: Literal['IN_PROGRESS', 'COMPLETED', 'ERRORED', 'FAILED'] | None
|
|
15
|
+
message: str
|
|
16
|
+
retry_count: int
|
|
17
|
+
|
|
18
|
+
|
|
19
|
+
|
|
20
|
+
def get_response(response: requests.Response):
|
|
21
|
+
if response.ok:
|
|
22
|
+
return response.json(), None
|
|
23
|
+
else:
|
|
24
|
+
return None, response.json()
|
|
25
|
+
|
|
26
|
+
|
|
27
|
+
def build_path(base_url: str, path: str):
|
|
28
|
+
return f"{base_url.rstrip('/')}/{path.lstrip('/')}"
|
|
29
|
+
|
|
30
|
+
|
|
31
|
+
def enforce_mfa_if_required(state: dict):
|
|
32
|
+
_mfa : MFAState = state['_mfa']
|
|
33
|
+
if _mfa['status'] == 'COMPLETED':
|
|
34
|
+
return True
|
|
35
|
+
generate_token_response = requests.post(
|
|
36
|
+
build_path(
|
|
37
|
+
base_url=MFARestAuthorizerEnv.GENERATE_TOKEN_BASE_URL.get_from_env(),
|
|
38
|
+
path=MFARestAuthorizerEnv.GENERATE_TOKEN_PATH.get_from_env()
|
|
39
|
+
), json=_mfa['post_payload'], timeout=30, headers={"Authorization": f"Bearer {state['bearer_token']}"}
|
|
40
|
+
)
|
|
41
|
+
_, error = get_response(generate_token_response)
|
|
42
|
+
|
|
43
|
+
challenge_type = error['additionalData']['challengeType']
|
|
44
|
+
_mfa['challengeType'] = challenge_type
|
|
45
|
+
_mfa['status'] = 'IN_PROGRESS'
|
|
46
|
+
_mfa['retry_count'] = 0
|
|
47
|
+
_mfa['message'] = f"Please enter the {challenge_type}"
|
|
48
|
+
if delivery_methods := error['additionalData'].get(f"{challenge_type.lower()}SentTo"):
|
|
49
|
+
_mfa['message'] += f" sent via {','.join(delivery_methods)}"
|
|
50
|
+
return False
|
|
51
|
+
|
|
52
|
+
|
|
53
|
+
def mfa_validate_user_input(**state: dict):
|
|
54
|
+
_mfa : MFAState = state['_mfa']
|
|
55
|
+
input_field_name = state['_active_input_field']
|
|
56
|
+
if not state[input_field_name]:
|
|
57
|
+
return False
|
|
58
|
+
|
|
59
|
+
post_payload = _mfa['post_payload']
|
|
60
|
+
challenge_field_name = f"{_mfa['challengeType'].lower()}Challenge"
|
|
61
|
+
post_payload.update({challenge_field_name: {"value": state[input_field_name]}})
|
|
62
|
+
validate_token_response = requests.post(
|
|
63
|
+
build_path(
|
|
64
|
+
base_url=MFARestAuthorizerEnv.VALIDATE_TOKEN_BASE_URL.get_from_env(),
|
|
65
|
+
path=MFARestAuthorizerEnv.VALIDATE_TOKEN_PATH.get_from_env()
|
|
66
|
+
), json=post_payload, timeout=30, headers={"Authorization": f"Bearer {state['bearer_token']}"}
|
|
67
|
+
)
|
|
68
|
+
_mfa['retry_count'] += 1
|
|
69
|
+
response, error = get_response(validate_token_response)
|
|
70
|
+
if error:
|
|
71
|
+
if _mfa['retry_count'] == 1:
|
|
72
|
+
_mfa['status'] = 'ERRORED'
|
|
73
|
+
_mfa['message'] = (
|
|
74
|
+
f"You Have Entered Invalid {_mfa['challengeType']}. {_mfa['message']}"
|
|
75
|
+
)
|
|
76
|
+
return False
|
|
77
|
+
|
|
78
|
+
if response and 'token' in response:
|
|
79
|
+
token = response['token']
|
|
80
|
+
post_payload['token'] = token
|
|
81
|
+
|
|
82
|
+
authorize = requests.post(
|
|
83
|
+
build_path(
|
|
84
|
+
base_url=MFARestAuthorizerEnv.AUTHORIZE_TOKEN_BASE_URL.get_from_env(),
|
|
85
|
+
path=MFARestAuthorizerEnv.AUTHORIZE_TOKEN_PATH.get_from_env()
|
|
86
|
+
),
|
|
87
|
+
json=post_payload,
|
|
88
|
+
timeout=30,
|
|
89
|
+
headers={"Authorization": f"Bearer {state['bearer_token']}"}
|
|
90
|
+
)
|
|
91
|
+
if authorize.status_code == 204:
|
|
92
|
+
_mfa['status'] = 'COMPLETED'
|
|
93
|
+
return True
|
|
94
|
+
else:
|
|
95
|
+
_mfa['status'] = 'FAILED'
|
|
96
|
+
return False
|
|
97
|
+
|
|
98
|
+
|
|
99
|
+
class MFANodeConfig:
|
|
100
|
+
|
|
101
|
+
@classmethod
|
|
102
|
+
def get_call_function_template(cls, source_node: str, next_node: str, mfa: dict):
|
|
103
|
+
return dict(
|
|
104
|
+
id=f"{source_node}_mfa_start",
|
|
105
|
+
action="call_function",
|
|
106
|
+
function="soprano_sdk.authenticators.mfa.enforce_mfa_if_required",
|
|
107
|
+
output=f"{source_node}_mfa_start",
|
|
108
|
+
mfa=mfa,
|
|
109
|
+
transitions=[
|
|
110
|
+
dict(
|
|
111
|
+
condition=True,
|
|
112
|
+
next=source_node,
|
|
113
|
+
),
|
|
114
|
+
dict(
|
|
115
|
+
condition=False,
|
|
116
|
+
next=next_node,
|
|
117
|
+
),
|
|
118
|
+
]
|
|
119
|
+
)
|
|
120
|
+
|
|
121
|
+
@classmethod
|
|
122
|
+
def get_validate_user_input(cls, source_node: str, next_node: str, model_name: str):
|
|
123
|
+
input_field_name = f"{source_node}_mfa_input"
|
|
124
|
+
return dict(
|
|
125
|
+
id=f"{source_node}_mfa_validate",
|
|
126
|
+
action="collect_input_with_agent",
|
|
127
|
+
description="Collect Input for MFA value",
|
|
128
|
+
field=input_field_name,
|
|
129
|
+
max_attempts=3,
|
|
130
|
+
validator="soprano_sdk.authenticators.mfa.mfa_validate_user_input",
|
|
131
|
+
agent=dict(
|
|
132
|
+
name="MFA Input Data Collector",
|
|
133
|
+
model=model_name,
|
|
134
|
+
initial_message="{{_mfa.message}}",
|
|
135
|
+
instructions="""
|
|
136
|
+
You are an authentication value extractor. Your job is to identify and extract MFA codes from user input.
|
|
137
|
+
|
|
138
|
+
**Task:**
|
|
139
|
+
- Read the user's message
|
|
140
|
+
- Extract ONLY the OTP code value
|
|
141
|
+
- Output in the exact format shown below
|
|
142
|
+
|
|
143
|
+
**Output Format:**
|
|
144
|
+
MFA_CAPTURED:
|
|
145
|
+
|
|
146
|
+
"""),
|
|
147
|
+
transitions=[
|
|
148
|
+
dict(
|
|
149
|
+
pattern="MFA_CAPTURED:",
|
|
150
|
+
next=next_node
|
|
151
|
+
)
|
|
152
|
+
]
|
|
153
|
+
)
|
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import os
|
|
1
2
|
from enum import Enum
|
|
2
3
|
|
|
3
4
|
|
|
@@ -57,3 +58,19 @@ DEFAULT_TIMEOUT = 300
|
|
|
57
58
|
|
|
58
59
|
MAX_ATTEMPTS_MESSAGE = "I'm having trouble understanding your {field}. Please contact customer service for assistance."
|
|
59
60
|
WORKFLOW_COMPLETE_MESSAGE = "Workflow completed."
|
|
61
|
+
|
|
62
|
+
|
|
63
|
+
class MFARestAuthorizerEnv(Enum):
|
|
64
|
+
GENERATE_TOKEN_BASE_URL = 'GENERATE_TOKEN_BASE_URL'
|
|
65
|
+
GENERATE_TOKEN_PATH = 'GENERATE_TOKEN_PATH'
|
|
66
|
+
VALIDATE_TOKEN_BASE_URL = 'VALIDATE_TOKEN_BASE_URL'
|
|
67
|
+
VALIDATE_TOKEN_PATH = 'VALIDATE_TOKEN_PATH'
|
|
68
|
+
AUTHORIZE_TOKEN_BASE_URL = 'AUTHORIZE_TOKEN_BASE_URL'
|
|
69
|
+
AUTHORIZE_TOKEN_PATH = 'AUTHORIZE_TOKEN_PATH'
|
|
70
|
+
|
|
71
|
+
API_TIMEOUT = 'API_TIMEOUT'
|
|
72
|
+
|
|
73
|
+
def get_from_env(self):
|
|
74
|
+
if self == MFARestAuthorizerEnv.API_TIMEOUT:
|
|
75
|
+
return int(os.getenv(self.value, '30'))
|
|
76
|
+
return os.getenv(self.value)
|
|
@@ -15,9 +15,10 @@ from ..utils.function import FunctionRepository
|
|
|
15
15
|
from ..utils.logger import logger
|
|
16
16
|
from ..utils.tool import ToolRepository
|
|
17
17
|
from ..validation import validate_workflow
|
|
18
|
-
|
|
18
|
+
from soprano_sdk.authenticators.mfa import MFANodeConfig
|
|
19
19
|
|
|
20
20
|
class WorkflowEngine:
|
|
21
|
+
|
|
21
22
|
def __init__(self, yaml_path: str, configs: dict):
|
|
22
23
|
self.yaml_path = yaml_path
|
|
23
24
|
self.configs = configs or {}
|
|
@@ -33,14 +34,16 @@ class WorkflowEngine:
|
|
|
33
34
|
self.workflow_name = self.config['name']
|
|
34
35
|
self.workflow_description = self.config['description']
|
|
35
36
|
self.workflow_version = self.config['version']
|
|
36
|
-
self.
|
|
37
|
-
self.steps = self.
|
|
37
|
+
self.mfa_node_indexes: list[int] = []
|
|
38
|
+
self.steps: list = self.load_steps()
|
|
39
|
+
self.step_map = {step['id']: step for step in self.steps}
|
|
40
|
+
self.data_fields = self.load_data()
|
|
41
|
+
|
|
38
42
|
self.outcomes = self.config['outcomes']
|
|
39
43
|
self.metadata = self.config.get('metadata', {})
|
|
40
44
|
|
|
41
45
|
self.StateType = create_state_model(self.data_fields)
|
|
42
46
|
|
|
43
|
-
self.step_map = {step['id']: step for step in self.steps}
|
|
44
47
|
self.outcome_map = {outcome['id']: outcome for outcome in self.outcomes}
|
|
45
48
|
|
|
46
49
|
self.function_repository = FunctionRepository()
|
|
@@ -196,6 +199,51 @@ class WorkflowEngine:
|
|
|
196
199
|
return tool_config.get('usage_policy')
|
|
197
200
|
|
|
198
201
|
|
|
202
|
+
def load_steps(self):
|
|
203
|
+
prepared_steps: list = []
|
|
204
|
+
previous_step: dict | None = None
|
|
205
|
+
for step in self.config['steps']:
|
|
206
|
+
step_id = step['id']
|
|
207
|
+
|
|
208
|
+
if mfa_config := step.get('mfa'):
|
|
209
|
+
mfa_data_collector = MFANodeConfig.get_validate_user_input(
|
|
210
|
+
next_node=step_id, model_name=mfa_config['model'],
|
|
211
|
+
source_node=step_id
|
|
212
|
+
)
|
|
213
|
+
mfa_start = MFANodeConfig.get_call_function_template(
|
|
214
|
+
source_node=step_id,
|
|
215
|
+
next_node=mfa_data_collector['id'],
|
|
216
|
+
mfa=mfa_config
|
|
217
|
+
)
|
|
218
|
+
prepared_steps.append(mfa_start)
|
|
219
|
+
prepared_steps.append(mfa_data_collector)
|
|
220
|
+
self.mfa_node_indexes.append(len(prepared_steps) - 1)
|
|
221
|
+
|
|
222
|
+
if previous_step and previous_step.get('transitions'):
|
|
223
|
+
for transition in previous_step.get('transitions'):
|
|
224
|
+
if transition.get('next') == step_id:
|
|
225
|
+
transition['next'] = mfa_start['id']
|
|
226
|
+
|
|
227
|
+
del step['mfa']
|
|
228
|
+
|
|
229
|
+
prepared_steps.append(step)
|
|
230
|
+
previous_step = step
|
|
231
|
+
return prepared_steps
|
|
232
|
+
|
|
233
|
+
def load_data(self):
|
|
234
|
+
data: list = self.config['data']
|
|
235
|
+
for mfa_node_index in self.mfa_node_indexes:
|
|
236
|
+
data.append(
|
|
237
|
+
dict(
|
|
238
|
+
name=f'{self.steps[mfa_node_index]['field']}',
|
|
239
|
+
type='text',
|
|
240
|
+
description='Input Recieved from the user during MFA'
|
|
241
|
+
)
|
|
242
|
+
)
|
|
243
|
+
|
|
244
|
+
return data
|
|
245
|
+
|
|
246
|
+
|
|
199
247
|
def load_workflow(yaml_path: str, checkpointer=None, config=None) -> Tuple[CompiledStateGraph, WorkflowEngine]:
|
|
200
248
|
"""
|
|
201
249
|
Load a workflow from YAML configuration.
|
|
@@ -47,6 +47,8 @@ def create_state_model(data_fields: List[dict]):
|
|
|
47
47
|
fields['_node_field_map'] = Annotated[Dict[str, str], replace]
|
|
48
48
|
fields['_computed_fields'] = Annotated[List[str], replace]
|
|
49
49
|
fields['error'] = Annotated[Optional[Dict[str, str]], replace]
|
|
50
|
+
fields['_mfa'] = Annotated[Optional[Dict[str, str]], replace]
|
|
51
|
+
fields['mfa_input'] = Annotated[Optional[Dict[str, str]], replace]
|
|
50
52
|
|
|
51
53
|
return types.new_class('WorkflowState', (TypedDict,), {}, lambda ns: ns.update({'__annotations__': fields}))
|
|
52
54
|
|
|
@@ -61,7 +63,13 @@ def initialize_state(state: Dict[str, Any]) -> Dict[str, Any]:
|
|
|
61
63
|
'_node_execution_order': [],
|
|
62
64
|
'_node_field_map': {},
|
|
63
65
|
'_computed_fields': [],
|
|
64
|
-
'error': None
|
|
66
|
+
'error': None,
|
|
67
|
+
'_mfa': {
|
|
68
|
+
'retry_count': 0,
|
|
69
|
+
'challengeType': None,
|
|
70
|
+
'status': None,
|
|
71
|
+
'message': None,
|
|
72
|
+
}
|
|
65
73
|
}
|
|
66
74
|
|
|
67
75
|
for field_name, default_value in fields_to_initialize.items():
|
|
@@ -18,10 +18,15 @@ class ActionStrategy(ABC):
|
|
|
18
18
|
def execute(self, state: Dict[str, Any]) -> Dict[str, Any]:
|
|
19
19
|
pass
|
|
20
20
|
|
|
21
|
+
@abstractmethod
|
|
22
|
+
def pre_execute(self, state: Dict[str, Any]) -> Dict[str, Any]:
|
|
23
|
+
pass
|
|
24
|
+
|
|
21
25
|
def get_node_function(self) -> Callable[[Dict[str, Any]], Dict[str, Any]]:
|
|
22
26
|
def node_fn(state: Dict[str, Any]) -> Dict[str, Any]:
|
|
23
27
|
logger.info(f"Executing node: {self.step_id} (action: {self.action})")
|
|
24
28
|
try:
|
|
29
|
+
self.pre_execute(state)
|
|
25
30
|
result = self.execute(state)
|
|
26
31
|
logger.info(f"Node {self.step_id} completed successfully")
|
|
27
32
|
logger.info(f"Result: {result}")
|
|
@@ -3,9 +3,23 @@ from typing import Dict, Any
|
|
|
3
3
|
from .base import ActionStrategy
|
|
4
4
|
from ..core.state import set_state_value, get_state_value
|
|
5
5
|
from ..utils.logger import logger
|
|
6
|
+
from jinja2 import Environment
|
|
7
|
+
import uuid
|
|
8
|
+
from ..core.constants import WorkflowKeys
|
|
6
9
|
from ..utils.template import get_nested_value
|
|
7
10
|
|
|
8
11
|
|
|
12
|
+
def compile_values(template_loader, state: dict, values: Any):
|
|
13
|
+
if isinstance(values, dict):
|
|
14
|
+
return {k: compile_values(template_loader, state, v) for k, v in values.items()}
|
|
15
|
+
elif isinstance(values, list):
|
|
16
|
+
return [compile_values(template_loader, state, value) for value in values]
|
|
17
|
+
elif isinstance(values, str):
|
|
18
|
+
return template_loader.from_string(values).render(state)
|
|
19
|
+
else:
|
|
20
|
+
return values
|
|
21
|
+
|
|
22
|
+
|
|
9
23
|
class CallFunctionStrategy(ActionStrategy):
|
|
10
24
|
def __init__(self, step_config: Dict[str, Any], engine_context: Any):
|
|
11
25
|
super().__init__(step_config, engine_context)
|
|
@@ -21,6 +35,14 @@ class CallFunctionStrategy(ActionStrategy):
|
|
|
21
35
|
if not self.output_field:
|
|
22
36
|
raise RuntimeError(f"Step '{self.step_id}' missing required 'output' property")
|
|
23
37
|
|
|
38
|
+
def pre_execute(self, state: Dict[str, Any]) -> Dict[str, Any]:
|
|
39
|
+
if 'mfa' in self.step_config:
|
|
40
|
+
state['_mfa'] = state.get('_mfa', {})
|
|
41
|
+
state['_mfa']['post_payload'] = dict(transactionId=str(uuid.uuid4()))
|
|
42
|
+
template_loader = self.engine_context.get_config_value("template_loader", Environment())
|
|
43
|
+
for k, v in self.step_config['mfa']['payload'].items():
|
|
44
|
+
state['_mfa']['post_payload'][k] = compile_values(template_loader, state, v)
|
|
45
|
+
|
|
24
46
|
def execute(self, state: Dict[str, Any]) -> Dict[str, Any]:
|
|
25
47
|
from ..utils.tracing import trace_node_execution
|
|
26
48
|
|
|
@@ -58,8 +80,6 @@ class CallFunctionStrategy(ActionStrategy):
|
|
|
58
80
|
|
|
59
81
|
if self.output_field:
|
|
60
82
|
set_state_value(state, self.output_field, result)
|
|
61
|
-
|
|
62
|
-
from ..core.constants import WorkflowKeys
|
|
63
83
|
computed_fields = get_state_value(state, WorkflowKeys.COMPUTED_FIELDS, [])
|
|
64
84
|
if self.output_field not in computed_fields:
|
|
65
85
|
computed_fields.append(self.output_field)
|
|
@@ -114,6 +114,9 @@ class CollectInputStrategy(ActionStrategy):
|
|
|
114
114
|
def _conversation_key(self) -> str:
|
|
115
115
|
return f'{self.field}_conversation'
|
|
116
116
|
|
|
117
|
+
def pre_execute(self, state: Dict[str, Any]) -> Dict[str, Any]:
|
|
118
|
+
state['_active_input_field'] = self.step_config.get('field')
|
|
119
|
+
|
|
117
120
|
@property
|
|
118
121
|
def _formatted_field_name(self) -> str:
|
|
119
122
|
return self.field.replace('_', ' ').title()
|
|
File without changes
|
|
@@ -226,7 +226,28 @@ WORKFLOW_SCHEMA = {
|
|
|
226
226
|
"minimum": 1,
|
|
227
227
|
"maximum": 600,
|
|
228
228
|
"description": "Timeout in seconds"
|
|
229
|
-
}
|
|
229
|
+
},
|
|
230
|
+
"mfa": {
|
|
231
|
+
"type": "object",
|
|
232
|
+
"description": "Multi-factor authentication configuration",
|
|
233
|
+
"required": ["type", "model", "payload"],
|
|
234
|
+
"properties": {
|
|
235
|
+
"model": {
|
|
236
|
+
"type": "string",
|
|
237
|
+
"description": "Path to the model which will be used to parse the MFA input from the user"
|
|
238
|
+
},
|
|
239
|
+
"type": {
|
|
240
|
+
"type": "string",
|
|
241
|
+
"enum": ["REST"],
|
|
242
|
+
"description": "API type for MFA"
|
|
243
|
+
},
|
|
244
|
+
"payload": {
|
|
245
|
+
"type": "object",
|
|
246
|
+
"description": "MFA payload data that is posted to the RESTAPI, Apart from the properties provided transactionId is sent by the framework in the post payload as an additional property, transactionId is the same throughout the MFA process",
|
|
247
|
+
"additionalProperties": True
|
|
248
|
+
}
|
|
249
|
+
}
|
|
250
|
+
},
|
|
230
251
|
}
|
|
231
252
|
}
|
|
232
253
|
},
|
|
@@ -3,6 +3,7 @@ from typing import List, Set
|
|
|
3
3
|
import jsonschema
|
|
4
4
|
|
|
5
5
|
from .schema import WORKFLOW_SCHEMA
|
|
6
|
+
from soprano_sdk.core.constants import MFARestAuthorizerEnv
|
|
6
7
|
|
|
7
8
|
|
|
8
9
|
class ValidationResult:
|
|
@@ -64,7 +65,7 @@ class WorkflowValidator:
|
|
|
64
65
|
if not step_id:
|
|
65
66
|
self.errors.append(f"Step at index {i} is missing 'id' field")
|
|
66
67
|
continue
|
|
67
|
-
|
|
68
|
+
self._validate_authorizer(step)
|
|
68
69
|
if step_id in step_ids:
|
|
69
70
|
self.errors.append(f"Duplicate step ID: '{step_id}'")
|
|
70
71
|
step_ids.add(step_id)
|
|
@@ -108,9 +109,37 @@ class WorkflowValidator:
|
|
|
108
109
|
f"Step '{step_id}' transition {i} references unknown target: '{next_target}'"
|
|
109
110
|
)
|
|
110
111
|
|
|
112
|
+
def _validate_authorizer(self, step):
|
|
113
|
+
|
|
114
|
+
def _validate_rest_fields():
|
|
115
|
+
if mfa_authorizer['type'] == 'REST':
|
|
116
|
+
for field in MFARestAuthorizerEnv:
|
|
117
|
+
is_present = field.get_from_env()
|
|
118
|
+
if not is_present:
|
|
119
|
+
self.errors.append(f"`{field.value}` needs to be set as Environment for REST MFA")
|
|
120
|
+
else:
|
|
121
|
+
self.errors.append(f"step({step['id']}) -> mfa -> type is unsupported")
|
|
122
|
+
|
|
123
|
+
mfa_authorizer = step.get("mfa", None)
|
|
124
|
+
if mfa_authorizer is None:
|
|
125
|
+
return
|
|
126
|
+
|
|
127
|
+
if mfa_authorizer and step['action'] != 'call_function':
|
|
128
|
+
self.errors.append(
|
|
129
|
+
f"MFA is enabled in step({step['id']}). MFA is supported only for `call_function` nodes"
|
|
130
|
+
)
|
|
131
|
+
|
|
132
|
+
model = mfa_authorizer.get('model')
|
|
133
|
+
if not model:
|
|
134
|
+
self.errors.append(f"step({step['id']}) -> mfa -> model is missing")
|
|
135
|
+
|
|
136
|
+
_validate_rest_fields()
|
|
137
|
+
|
|
138
|
+
|
|
111
139
|
def _validate_data_fields(self):
|
|
112
140
|
data_fields = {field.get('name') for field in self.config.get('data', [])}
|
|
113
141
|
steps = self.config.get('steps', [])
|
|
142
|
+
has_mfa = False
|
|
114
143
|
|
|
115
144
|
for step in steps:
|
|
116
145
|
step_id = step.get('id', 'unknown')
|
|
@@ -135,6 +164,9 @@ class WorkflowValidator:
|
|
|
135
164
|
output = step.get('output')
|
|
136
165
|
function = step.get('function')
|
|
137
166
|
|
|
167
|
+
if step.get('mfa'):
|
|
168
|
+
has_mfa = True
|
|
169
|
+
|
|
138
170
|
if not function:
|
|
139
171
|
self.errors.append(f"Step '{step_id}' is missing 'function' property")
|
|
140
172
|
|
|
@@ -145,6 +177,11 @@ class WorkflowValidator:
|
|
|
145
177
|
f"Step '{step_id}' output field '{output}' not defined in data fields"
|
|
146
178
|
)
|
|
147
179
|
|
|
180
|
+
if has_mfa and 'bearer_token' not in data_fields:
|
|
181
|
+
self.errors.append(
|
|
182
|
+
"`bearer_token` must be defined in `data` section: for MFA authorization"
|
|
183
|
+
)
|
|
184
|
+
|
|
148
185
|
def _validate_function_references(self):
|
|
149
186
|
steps = self.config.get('steps', [])
|
|
150
187
|
|
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
version = 1
|
|
2
|
-
revision =
|
|
2
|
+
revision = 2
|
|
3
3
|
requires-python = ">=3.12"
|
|
4
4
|
resolution-markers = [
|
|
5
5
|
"python_full_version >= '3.13'",
|
|
@@ -704,6 +704,72 @@ wheels = [
|
|
|
704
704
|
{ url = "https://files.pythonhosted.org/packages/a7/06/3d6badcf13db419e25b07041d9c7b4a2c331d3f4e7134445ec5df57714cd/coloredlogs-15.0.1-py2.py3-none-any.whl", hash = "sha256:612ee75c546f53e92e70049c9dbfcc18c935a2b9a53b66085ce9ef6a6e5c0934", size = 46018, upload-time = "2021-06-11T10:22:42.561Z" },
|
|
705
705
|
]
|
|
706
706
|
|
|
707
|
+
[[package]]
|
|
708
|
+
name = "conversational-sop-framework"
|
|
709
|
+
version = "0.1.83"
|
|
710
|
+
source = { editable = "." }
|
|
711
|
+
dependencies = [
|
|
712
|
+
{ name = "agno" },
|
|
713
|
+
{ name = "crewai" },
|
|
714
|
+
{ name = "jsonschema" },
|
|
715
|
+
{ name = "langchain" },
|
|
716
|
+
{ name = "langchain-community" },
|
|
717
|
+
{ name = "langchain-core" },
|
|
718
|
+
{ name = "langchain-openai" },
|
|
719
|
+
{ name = "langfuse" },
|
|
720
|
+
{ name = "langgraph" },
|
|
721
|
+
{ name = "openai" },
|
|
722
|
+
{ name = "pydantic" },
|
|
723
|
+
{ name = "pydantic-ai" },
|
|
724
|
+
{ name = "pyyaml" },
|
|
725
|
+
]
|
|
726
|
+
|
|
727
|
+
[package.optional-dependencies]
|
|
728
|
+
dev = [
|
|
729
|
+
{ name = "gradio" },
|
|
730
|
+
{ name = "pytest" },
|
|
731
|
+
]
|
|
732
|
+
persistence = [
|
|
733
|
+
{ name = "langgraph-checkpoint-mongodb" },
|
|
734
|
+
{ name = "pymongo" },
|
|
735
|
+
]
|
|
736
|
+
supervisors = [
|
|
737
|
+
{ name = "crewai" },
|
|
738
|
+
{ name = "langchain-openai" },
|
|
739
|
+
]
|
|
740
|
+
|
|
741
|
+
[package.dev-dependencies]
|
|
742
|
+
dev = [
|
|
743
|
+
{ name = "conversational-sop-framework" },
|
|
744
|
+
]
|
|
745
|
+
|
|
746
|
+
[package.metadata]
|
|
747
|
+
requires-dist = [
|
|
748
|
+
{ name = "agno", specifier = ">=2.0.7" },
|
|
749
|
+
{ name = "crewai", specifier = ">=0.186.1" },
|
|
750
|
+
{ name = "crewai", marker = "extra == 'supervisors'", specifier = ">=0.1.0" },
|
|
751
|
+
{ name = "gradio", marker = "extra == 'dev'", specifier = ">=5.46.0" },
|
|
752
|
+
{ name = "jsonschema", specifier = ">=4.0.0" },
|
|
753
|
+
{ name = "langchain", specifier = ">=1.0.7" },
|
|
754
|
+
{ name = "langchain-community", specifier = ">=0.4.1" },
|
|
755
|
+
{ name = "langchain-core", specifier = ">=0.3.67" },
|
|
756
|
+
{ name = "langchain-openai", specifier = ">=1.0.3" },
|
|
757
|
+
{ name = "langchain-openai", marker = "extra == 'supervisors'", specifier = ">=0.3.34" },
|
|
758
|
+
{ name = "langfuse", specifier = ">=3.10.1" },
|
|
759
|
+
{ name = "langgraph", specifier = "==1.0.2" },
|
|
760
|
+
{ name = "langgraph-checkpoint-mongodb", marker = "extra == 'persistence'", specifier = ">=0.2.0" },
|
|
761
|
+
{ name = "openai", specifier = ">=1.92.1" },
|
|
762
|
+
{ name = "pydantic", specifier = ">=2.0.0" },
|
|
763
|
+
{ name = "pydantic-ai", specifier = ">=1.22.0" },
|
|
764
|
+
{ name = "pymongo", marker = "extra == 'persistence'", specifier = ">=4.0.0" },
|
|
765
|
+
{ name = "pytest", marker = "extra == 'dev'", specifier = ">=7.0.0" },
|
|
766
|
+
{ name = "pyyaml", specifier = ">=6.0" },
|
|
767
|
+
]
|
|
768
|
+
provides-extras = ["dev", "persistence", "supervisors"]
|
|
769
|
+
|
|
770
|
+
[package.metadata.requires-dev]
|
|
771
|
+
dev = [{ name = "conversational-sop-framework", editable = "." }]
|
|
772
|
+
|
|
707
773
|
[[package]]
|
|
708
774
|
name = "crewai"
|
|
709
775
|
version = "1.4.1"
|
|
@@ -4227,74 +4293,6 @@ wheels = [
|
|
|
4227
4293
|
{ url = "https://files.pythonhosted.org/packages/e9/44/75a9c9421471a6c4805dbf2356f7c181a29c1879239abab1ea2cc8f38b40/sniffio-1.3.1-py3-none-any.whl", hash = "sha256:2f6da418d1f1e0fddd844478f41680e794e6051915791a034ff65e5f100525a2", size = 10235, upload-time = "2024-02-25T23:20:01.196Z" },
|
|
4228
4294
|
]
|
|
4229
4295
|
|
|
4230
|
-
[[package]]
|
|
4231
|
-
name = "soprano-sdk"
|
|
4232
|
-
version = "0.1.99"
|
|
4233
|
-
source = { editable = "." }
|
|
4234
|
-
dependencies = [
|
|
4235
|
-
{ name = "agno" },
|
|
4236
|
-
{ name = "crewai" },
|
|
4237
|
-
{ name = "jsonschema" },
|
|
4238
|
-
{ name = "langchain" },
|
|
4239
|
-
{ name = "langchain-community" },
|
|
4240
|
-
{ name = "langchain-core" },
|
|
4241
|
-
{ name = "langchain-openai" },
|
|
4242
|
-
{ name = "langfuse" },
|
|
4243
|
-
{ name = "langgraph" },
|
|
4244
|
-
{ name = "openai" },
|
|
4245
|
-
{ name = "pydantic" },
|
|
4246
|
-
{ name = "pydantic-ai" },
|
|
4247
|
-
{ name = "pytest" },
|
|
4248
|
-
{ name = "pyyaml" },
|
|
4249
|
-
]
|
|
4250
|
-
|
|
4251
|
-
[package.optional-dependencies]
|
|
4252
|
-
dev = [
|
|
4253
|
-
{ name = "gradio" },
|
|
4254
|
-
{ name = "pytest" },
|
|
4255
|
-
]
|
|
4256
|
-
persistence = [
|
|
4257
|
-
{ name = "langgraph-checkpoint-mongodb" },
|
|
4258
|
-
{ name = "pymongo" },
|
|
4259
|
-
]
|
|
4260
|
-
supervisors = [
|
|
4261
|
-
{ name = "crewai" },
|
|
4262
|
-
{ name = "langchain-openai" },
|
|
4263
|
-
]
|
|
4264
|
-
|
|
4265
|
-
[package.dev-dependencies]
|
|
4266
|
-
dev = [
|
|
4267
|
-
{ name = "soprano-sdk" },
|
|
4268
|
-
]
|
|
4269
|
-
|
|
4270
|
-
[package.metadata]
|
|
4271
|
-
requires-dist = [
|
|
4272
|
-
{ name = "agno", specifier = ">=2.0.7" },
|
|
4273
|
-
{ name = "crewai", specifier = ">=0.186.1" },
|
|
4274
|
-
{ name = "crewai", marker = "extra == 'supervisors'", specifier = ">=0.1.0" },
|
|
4275
|
-
{ name = "gradio", marker = "extra == 'dev'", specifier = ">=5.46.0" },
|
|
4276
|
-
{ name = "jsonschema", specifier = ">=4.0.0" },
|
|
4277
|
-
{ name = "langchain", specifier = ">=1.0.7" },
|
|
4278
|
-
{ name = "langchain-community", specifier = ">=0.4.1" },
|
|
4279
|
-
{ name = "langchain-core", specifier = ">=0.3.67" },
|
|
4280
|
-
{ name = "langchain-openai", specifier = ">=1.0.3" },
|
|
4281
|
-
{ name = "langchain-openai", marker = "extra == 'supervisors'", specifier = ">=0.3.34" },
|
|
4282
|
-
{ name = "langfuse", specifier = ">=3.10.1" },
|
|
4283
|
-
{ name = "langgraph", specifier = "==1.0.2" },
|
|
4284
|
-
{ name = "langgraph-checkpoint-mongodb", marker = "extra == 'persistence'", specifier = ">=0.2.0" },
|
|
4285
|
-
{ name = "openai", specifier = ">=1.92.1" },
|
|
4286
|
-
{ name = "pydantic", specifier = ">=2.0.0" },
|
|
4287
|
-
{ name = "pydantic-ai", specifier = ">=1.22.0" },
|
|
4288
|
-
{ name = "pymongo", marker = "extra == 'persistence'", specifier = ">=4.0.0" },
|
|
4289
|
-
{ name = "pytest", specifier = ">=9.0.1" },
|
|
4290
|
-
{ name = "pytest", marker = "extra == 'dev'", specifier = ">=7.0.0" },
|
|
4291
|
-
{ name = "pyyaml", specifier = ">=6.0" },
|
|
4292
|
-
]
|
|
4293
|
-
provides-extras = ["dev", "persistence", "supervisors"]
|
|
4294
|
-
|
|
4295
|
-
[package.metadata.requires-dev]
|
|
4296
|
-
dev = [{ name = "soprano-sdk", editable = "." }]
|
|
4297
|
-
|
|
4298
4296
|
[[package]]
|
|
4299
4297
|
name = "sqlalchemy"
|
|
4300
4298
|
version = "2.0.44"
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
{soprano_sdk-0.1.100/soprano_sdk/core → soprano_sdk-0.2.1/soprano_sdk/authenticators}/__init__.py
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|