aboutsummaryrefslogtreecommitdiff
path: root/.venv/lib/python3.12/site-packages/azure/ai/inference/_configuration.py
diff options
context:
space:
mode:
authorS. Solomon Darnell2025-03-28 21:52:21 -0500
committerS. Solomon Darnell2025-03-28 21:52:21 -0500
commit4a52a71956a8d46fcb7294ac71734504bb09bcc2 (patch)
treeee3dc5af3b6313e921cd920906356f5d4febc4ed /.venv/lib/python3.12/site-packages/azure/ai/inference/_configuration.py
parentcc961e04ba734dd72309fb548a2f97d67d578813 (diff)
downloadgn-ai-master.tar.gz
two version of R2R are hereHEADmaster
Diffstat (limited to '.venv/lib/python3.12/site-packages/azure/ai/inference/_configuration.py')
-rw-r--r--.venv/lib/python3.12/site-packages/azure/ai/inference/_configuration.py188
1 files changed, 188 insertions, 0 deletions
diff --git a/.venv/lib/python3.12/site-packages/azure/ai/inference/_configuration.py b/.venv/lib/python3.12/site-packages/azure/ai/inference/_configuration.py
new file mode 100644
index 00000000..894ec657
--- /dev/null
+++ b/.venv/lib/python3.12/site-packages/azure/ai/inference/_configuration.py
@@ -0,0 +1,188 @@
+# coding=utf-8
+# --------------------------------------------------------------------------
+# Copyright (c) Microsoft Corporation. All rights reserved.
+# Licensed under the MIT License. See License.txt in the project root for license information.
+# Code generated by Microsoft (R) Python Code Generator.
+# Changes may cause incorrect behavior and will be lost if the code is regenerated.
+# --------------------------------------------------------------------------
+
+from typing import Any, TYPE_CHECKING, Union
+
+from azure.core.credentials import AzureKeyCredential
+from azure.core.pipeline import policies
+
+from ._version import VERSION
+
+if TYPE_CHECKING:
+ from azure.core.credentials import TokenCredential
+
+
+class ChatCompletionsClientConfiguration: # pylint: disable=too-many-instance-attributes
+ """Configuration for ChatCompletionsClient.
+
+ Note that all parameters used to create this instance are saved as instance
+ attributes.
+
+ :param endpoint: Service host. Required.
+ :type endpoint: str
+ :param credential: Credential used to authenticate requests to the service. Is either a key
+ credential type or a token credential type. Required.
+ :type credential: ~azure.core.credentials.AzureKeyCredential or
+ ~azure.core.credentials.AzureKeyCredential or ~azure.core.credentials.TokenCredential
+ :keyword api_version: The API version to use for this operation. Default value is
+ "2024-05-01-preview". Note that overriding this default value may result in unsupported
+ behavior.
+ :paramtype api_version: str
+ """
+
+ def __init__(self, endpoint: str, credential: Union[AzureKeyCredential, "TokenCredential"], **kwargs: Any) -> None:
+ api_version: str = kwargs.pop("api_version", "2024-05-01-preview")
+
+ if endpoint is None:
+ raise ValueError("Parameter 'endpoint' must not be None.")
+ if credential is None:
+ raise ValueError("Parameter 'credential' must not be None.")
+
+ self.endpoint = endpoint
+ self.credential = credential
+ self.api_version = api_version
+ self.credential_scopes = kwargs.pop("credential_scopes", ["https://ml.azure.com/.default"])
+ kwargs.setdefault("sdk_moniker", "ai-inference/{}".format(VERSION))
+ self.polling_interval = kwargs.get("polling_interval", 30)
+ self._configure(**kwargs)
+
+ def _infer_policy(self, **kwargs):
+ if isinstance(self.credential, AzureKeyCredential):
+ return policies.AzureKeyCredentialPolicy(self.credential, "Authorization", prefix="Bearer", **kwargs)
+ if isinstance(self.credential, AzureKeyCredential):
+ return policies.AzureKeyCredentialPolicy(self.credential, "api-key", **kwargs)
+ if hasattr(self.credential, "get_token"):
+ return policies.BearerTokenCredentialPolicy(self.credential, *self.credential_scopes, **kwargs)
+ raise TypeError(f"Unsupported credential: {self.credential}")
+
+ def _configure(self, **kwargs: Any) -> None:
+ self.user_agent_policy = kwargs.get("user_agent_policy") or policies.UserAgentPolicy(**kwargs)
+ self.headers_policy = kwargs.get("headers_policy") or policies.HeadersPolicy(**kwargs)
+ self.proxy_policy = kwargs.get("proxy_policy") or policies.ProxyPolicy(**kwargs)
+ self.logging_policy = kwargs.get("logging_policy") or policies.NetworkTraceLoggingPolicy(**kwargs)
+ self.http_logging_policy = kwargs.get("http_logging_policy") or policies.HttpLoggingPolicy(**kwargs)
+ self.custom_hook_policy = kwargs.get("custom_hook_policy") or policies.CustomHookPolicy(**kwargs)
+ self.redirect_policy = kwargs.get("redirect_policy") or policies.RedirectPolicy(**kwargs)
+ self.retry_policy = kwargs.get("retry_policy") or policies.RetryPolicy(**kwargs)
+ self.authentication_policy = kwargs.get("authentication_policy")
+ if self.credential and not self.authentication_policy:
+ self.authentication_policy = self._infer_policy(**kwargs)
+
+
+class EmbeddingsClientConfiguration: # pylint: disable=too-many-instance-attributes
+ """Configuration for EmbeddingsClient.
+
+ Note that all parameters used to create this instance are saved as instance
+ attributes.
+
+ :param endpoint: Service host. Required.
+ :type endpoint: str
+ :param credential: Credential used to authenticate requests to the service. Is either a key
+ credential type or a token credential type. Required.
+ :type credential: ~azure.core.credentials.AzureKeyCredential or
+ ~azure.core.credentials.AzureKeyCredential or ~azure.core.credentials.TokenCredential
+ :keyword api_version: The API version to use for this operation. Default value is
+ "2024-05-01-preview". Note that overriding this default value may result in unsupported
+ behavior.
+ :paramtype api_version: str
+ """
+
+ def __init__(self, endpoint: str, credential: Union[AzureKeyCredential, "TokenCredential"], **kwargs: Any) -> None:
+ api_version: str = kwargs.pop("api_version", "2024-05-01-preview")
+
+ if endpoint is None:
+ raise ValueError("Parameter 'endpoint' must not be None.")
+ if credential is None:
+ raise ValueError("Parameter 'credential' must not be None.")
+
+ self.endpoint = endpoint
+ self.credential = credential
+ self.api_version = api_version
+ self.credential_scopes = kwargs.pop("credential_scopes", ["https://ml.azure.com/.default"])
+ kwargs.setdefault("sdk_moniker", "ai-inference/{}".format(VERSION))
+ self.polling_interval = kwargs.get("polling_interval", 30)
+ self._configure(**kwargs)
+
+ def _infer_policy(self, **kwargs):
+ if isinstance(self.credential, AzureKeyCredential):
+ return policies.AzureKeyCredentialPolicy(self.credential, "Authorization", prefix="Bearer", **kwargs)
+ if isinstance(self.credential, AzureKeyCredential):
+ return policies.AzureKeyCredentialPolicy(self.credential, "api-key", **kwargs)
+ if hasattr(self.credential, "get_token"):
+ return policies.BearerTokenCredentialPolicy(self.credential, *self.credential_scopes, **kwargs)
+ raise TypeError(f"Unsupported credential: {self.credential}")
+
+ def _configure(self, **kwargs: Any) -> None:
+ self.user_agent_policy = kwargs.get("user_agent_policy") or policies.UserAgentPolicy(**kwargs)
+ self.headers_policy = kwargs.get("headers_policy") or policies.HeadersPolicy(**kwargs)
+ self.proxy_policy = kwargs.get("proxy_policy") or policies.ProxyPolicy(**kwargs)
+ self.logging_policy = kwargs.get("logging_policy") or policies.NetworkTraceLoggingPolicy(**kwargs)
+ self.http_logging_policy = kwargs.get("http_logging_policy") or policies.HttpLoggingPolicy(**kwargs)
+ self.custom_hook_policy = kwargs.get("custom_hook_policy") or policies.CustomHookPolicy(**kwargs)
+ self.redirect_policy = kwargs.get("redirect_policy") or policies.RedirectPolicy(**kwargs)
+ self.retry_policy = kwargs.get("retry_policy") or policies.RetryPolicy(**kwargs)
+ self.authentication_policy = kwargs.get("authentication_policy")
+ if self.credential and not self.authentication_policy:
+ self.authentication_policy = self._infer_policy(**kwargs)
+
+
+class ImageEmbeddingsClientConfiguration: # pylint: disable=too-many-instance-attributes
+ """Configuration for ImageEmbeddingsClient.
+
+ Note that all parameters used to create this instance are saved as instance
+ attributes.
+
+ :param endpoint: Service host. Required.
+ :type endpoint: str
+ :param credential: Credential used to authenticate requests to the service. Is either a key
+ credential type or a token credential type. Required.
+ :type credential: ~azure.core.credentials.AzureKeyCredential or
+ ~azure.core.credentials.AzureKeyCredential or ~azure.core.credentials.TokenCredential
+ :keyword api_version: The API version to use for this operation. Default value is
+ "2024-05-01-preview". Note that overriding this default value may result in unsupported
+ behavior.
+ :paramtype api_version: str
+ """
+
+ def __init__(self, endpoint: str, credential: Union[AzureKeyCredential, "TokenCredential"], **kwargs: Any) -> None:
+ api_version: str = kwargs.pop("api_version", "2024-05-01-preview")
+
+ if endpoint is None:
+ raise ValueError("Parameter 'endpoint' must not be None.")
+ if credential is None:
+ raise ValueError("Parameter 'credential' must not be None.")
+
+ self.endpoint = endpoint
+ self.credential = credential
+ self.api_version = api_version
+ self.credential_scopes = kwargs.pop("credential_scopes", ["https://ml.azure.com/.default"])
+ kwargs.setdefault("sdk_moniker", "ai-inference/{}".format(VERSION))
+ self.polling_interval = kwargs.get("polling_interval", 30)
+ self._configure(**kwargs)
+
+ def _infer_policy(self, **kwargs):
+ if isinstance(self.credential, AzureKeyCredential):
+ return policies.AzureKeyCredentialPolicy(self.credential, "Authorization", prefix="Bearer", **kwargs)
+ if isinstance(self.credential, AzureKeyCredential):
+ return policies.AzureKeyCredentialPolicy(self.credential, "api-key", **kwargs)
+ if hasattr(self.credential, "get_token"):
+ return policies.BearerTokenCredentialPolicy(self.credential, *self.credential_scopes, **kwargs)
+ raise TypeError(f"Unsupported credential: {self.credential}")
+
+ def _configure(self, **kwargs: Any) -> None:
+ self.user_agent_policy = kwargs.get("user_agent_policy") or policies.UserAgentPolicy(**kwargs)
+ self.headers_policy = kwargs.get("headers_policy") or policies.HeadersPolicy(**kwargs)
+ self.proxy_policy = kwargs.get("proxy_policy") or policies.ProxyPolicy(**kwargs)
+ self.logging_policy = kwargs.get("logging_policy") or policies.NetworkTraceLoggingPolicy(**kwargs)
+ self.http_logging_policy = kwargs.get("http_logging_policy") or policies.HttpLoggingPolicy(**kwargs)
+ self.custom_hook_policy = kwargs.get("custom_hook_policy") or policies.CustomHookPolicy(**kwargs)
+ self.redirect_policy = kwargs.get("redirect_policy") or policies.RedirectPolicy(**kwargs)
+ self.retry_policy = kwargs.get("retry_policy") or policies.RetryPolicy(**kwargs)
+ self.authentication_policy = kwargs.get("authentication_policy")
+ if self.credential and not self.authentication_policy:
+ self.authentication_policy = self._infer_policy(**kwargs)