This function is used by the _handle_rpc_error() decorator, depending on the AUTH_MODE config object.
fetch_grpc_call_auth_metadata()
deffetch_grpc_call_auth_metadata()
get_credentials()
defget_credentials()
refresh_credentials()
defrefresh_credentials()
This function is used by the _handle_rpc_error() decorator, depending on the AUTH_MODE config object. This handler
is meant for SDK use-cases of auth (like pyflyte, or when users call SDK functions that require access to Admin,
like when waiting for another workflow to complete from within a task). This function uses basic auth, which means
the credentials for basic auth must be present from wherever this code is running.
This function is used when the configuration value for AUTH_MODE is set to ’external_process'.
fetch_grpc_call_auth_metadata()
deffetch_grpc_call_auth_metadata()
get_credentials()
defget_credentials()
refresh_credentials()
defrefresh_credentials()
This function is used when the configuration value for AUTH_MODE is set to ’external_process’.
It reads an id token generated by an external process started by running the ‘command’.
This Authenticator encapsulates the entire PKCE flow and automatically opens a browser window for login
For Auth0 - you will need to manually configure your config.yaml to include a scopes list of the syntax:
admin.scopes: [“offline_access”, “offline”, “all”, “openid”] and/or similar scopes in order to get the refresh token +
caching. Otherwise, it will just receive the access token alone. Your FlyteCTL Helm config however should only
contain [“offline”, “all”] - as OIDC scopes are ungrantable in Auth0 customer APIs. They are simply requested
for in the POST request during the token caching process.