Manage Sudos
Create Sudos
To create a new Sudo:
do {
let sudoInput = SudoCreateInput(
title: "Mr.",
firstName: "John",
lastName: "Smith",
label: "Shopping",
notes: "Used for shopping.",
avatar: .fileUrl(avatarUrl)
)
let sudo = try await client.createSudo(input: sudoInput)
// Create successful
} catch {
// Handle error. An error may be thrown if the backend is unable
// to create the Sudo due to availability, security or entitlement issues or
// due to unrecoverable circumstances arising from programmatic error or
// configuration error. For example, if the keychain access entitlement
// is not set up correctly, the client is not signed in,
// or basic system resources are unavailable.
}val sudo = Sudo()
sudo.title = "Mr."
sudo.firstName = "John"
sudo.lastName = "Smith"
sudo.label = "Shopping"
sudo.notes = "Used for shopping."
sudo.avatar = avatarUri
CoroutineScope(Dispatchers.IO).launch {
try {
client.createSudo(sudo)
// Sudo created successfully.
} catch (e: SudoProfileException) {
// Handle error.
}
}import { Sudo } from '@sudoplatform/sudo-profiles'
const sudo = new Sudo()
sudo.title = "Mr."
sudo.firstName = "John"
sudo.lastName = "Smith"
sudo.label = "Shopping"
sudo.notes = "Used for shopping."
sudo.setAvatar(avatarFile)
try {
const createdSudo = await client.createSudo(sudo)
// Sudo created successfully.
} catch(err) {
// Handle error.
}List Sudos
To list Sudos:
do {
let sudos = try await client.listSudos(cachePolicy: .remoteOnly)
// Download the avatar images.
for sudo in sudos {
if let avatarClaim = sudo.avatarClaim {
let data = try await client.getBlob(forClaim: avatarClaim, cachePolicy: .remoteOnly)
let image = UIImage(data: data)
}
}
} catch {
// Handle error. An error may be thrown if the backend is unable
// to list Sudos due to availability or for unrecoverable circumstances arising
// from programmatic error or configuration error. For example, if the keychain
// access entitlement is not set up correctly, the client is not signed in,
// or basic system resources are unavailable.
}CoroutineScope(Dispatchers.IO).launch {
try {
val sudos = client.listSudos(ListOption.REMOTE_ONLY)
for (sudo in sudos) {
// Load the avatar image.
val avatar = sudo.avatar
if (avatar != null) {
val file = File(avatar)
val data = file.readBytes()
}
}
} catch (e: SudoProfileException) {
// Handle error.
}
}try {
const sudos = await client.listSudos()
} catch(err) {
// Handle error.
}Modify Sudos
To update an existing Sudo:
let updateInput = SudoUpdateInput(
sudoId: sudoId,
version: version,
firstName: .newValue("David")
)
do {
let updatedSudo = try await client.updateSudo(input: updateInput)
// Update successful.
} catch {
// Handle error. An error may be thrown if the backend is unable to
// update Sudo due to availability or security issues or for unrecoverable
// circumstances arising from programmatic error or configuration error.
// For example, if the keychain access entitlement is not set up correctly,
// the client is not signed in, or basic system resources are unavailable.
}sudo.firstName = "David"
CoroutineScope(Dispatchers.IO).launch {
try {
client.updateSudo(sudo)
// Sudo updated successfully.
} catch (e: SudoProfileException) {
// Handle error.
}
}sudo.firstName = "David"
try {
const updatedSudo = await client.updateSudo(sudo)
// Sudo updated successfully.
} catch(err) {
// Handle error.
}Subscribe to Changes
To subscribe to a specific Sudo change notification:
class MySubscriber: SudoSubscriber {
func sudoChanged(changeType: SudoChangeType, sudo: Sudo) {
// Process new, updated or deleted Sudo.
}
func connectionStatusChanged(changeType: SudoChangeType, state: SubscriptionConnectionState) {
if state == .connected {
// The subscription for the provided change type is now connected hence the subscribers
// will start receiving Sudo changes.
} else if state == .disconnected {
// The subscription is disconnected and all subscribers for the provided
// change type were automatically unsubscribed. Subscribe again to establish a
// new connection or report the error.
}
}
}
let subscriber = MySubscriber()
do {
try await client.subscribe(id: "subscriber_id", changeTypes: [.create], subscriber: subscriber)
} catch {
// Handle error. An error might be thrown for unrecoverable circumstances arising
// from programmatic error or configuration error. For example, if the keychain
// access entitlement is not set up correctly, the client is not signed in,
// or basic system resources are unavailable.
}class MySubscriber: SudoSubscriber {
override fun connectionStatusChanged(state: SudoSubscriber.ConnectionState) {
if (state == SudoSubscriber.ConnectionState.CONNECTED) {
// The subscription is now connected hence the subscribers
// will start receiving Sudo changes.
} else {
// The subscription is disconnected and all subscribers were
// automatically unsubscribed. Subscribe again to establish a
// new connection or report the error.
}
}
override fun sudoChanged(changeType: SudoSubscriber.ChangeType, sudo: Sudo) {
// Process new, updated or deleted Sudo.
}
}
val subscriber = MySubscriber()
CoroutineScope(Dispatchers.IO).launch {
client.subscribeAsync("<subscriber_id>", SudoSubscriber.ChangeType.CREATE, subscriber)
}import {
SudoSubscriber,
ConnectionState,
ChangeType,
} from '@sudoplatform/sudo-profiles'
class MySubscriber implements SudoSubscriber {
public sudoChanged(changeType, sudo) {
// Process new, updated or deleted Sudo.
}
public connectionStatusChanged(state) {
if (state === ConnectionState.Connected) {
// The subscription is now connected hence the subscribers
// will start receiving Sudo changes.
} else {
// The subscription is disconnected and all subscribers were
// automatically unsubscribed. Subscribe again to establish a
// new connection or report the error.
}
}
}
try {
const subscriber = new MySubscriber()
client.subscribe('subscriber_id', ChangeType.Create, subscriber)
} catch(err) {
// Handle error.
}To subscribe to Sudo change notification of all types:
class MySubscriber: SudoSubscriber {
func sudoChanged(changeType: SudoChangeType, sudo: Sudo) {
// Process new, updated or deleted Sudo.
}
func connectionStatusChanged(changeType: SudoChangeType, state: SubscriptionConnectionState) {
if state == .connected {
// The subscription is now connected hence the subscribers
// will start receiving Sudo changes.
} else if state == .disconnected {
// The subscription is disconnected and all subscribers were
// automatically unsubscribed. Subscribe again to establish a
// new connection or report the error.
}
}
}
let subscriber = MySubscriber()
do {
try await client.subscribe(id: "subscriber_id", subscriber: subscriber)
} catch {
// Handle error. An error may be thrown for unrecoverable circumstances arising
// from programmatic error or configuration error. For example, if the keychain
// access entitlement is not set up correctly, the client is not signed in,
// or basic system resources are unavailable.
}class MySubscriber: SudoSubscriber {
override fun connectionStatusChanged(state: SudoSubscriber.ConnectionState) {
if (state == SudoSubscriber.ConnectionState.CONNECTED) {
// The subscription is now connected hence the subscribers
// will start receiving Sudo changes.
} else {
// The subscription is disconnected and all subscribers were
// automatically unsubscribed. Subscribe again to establish a
// new connection or report the error.
}
}
override fun sudoChanged(changeType: SudoSubscriber.ChangeType, sudo: Sudo) {
// Process new, updated or deleted Sudo.
}
}
val subscriber = MySubscriber()
CoroutineScope(Dispatchers.IO).launch {
client.subscribeAsync("<subscriber_id>", subscriber)
}import {
SudoSubscriber,
ConnectionState,
ChangeType,
} from '@sudoplatform/sudo-profiles'
class MySubscriber implements SudoSubscriber {
public sudoChanged(changeType, sudo) {
// Process new, updated or deleted Sudo.
}
public connectionStatusChanged(state) {
if (state === ConnectionState.Connected) {
// The subscription is now connected hence the subscribers
// will start receiving Sudo changes.
} else {
// The subscription is disconnected and all subscribers were
// automatically unsubscribed. Subscribe again to establish a
// new connection or report the error.
}
}
}
try {
const subscriber = new MySubscriber()
client.subscribeAll('subscriber_id', subscriber)
} catch(err) {
// Handle error.
}Delete Sudos
To delete an existing Sudo:
let input = SudoDeleteInput(sudoId: sudoId, version: version)
do {
try await client.deleteSudo(input: input)
// Delete successful.
} catch {
// Handle error. An error might be thrown if the backend is unable
// to delete the Sudo due to availability or security issues or for
// unrecoverable circumstances arising from programmatic error or
// configuration error. For example, if the keychain access entitlement is
// not set up correctly, the client is not signed in, or basic system
// resources are unavailable.
}CoroutineScope(Dispatchers.IO).launch {
try {
client.deleteSudo(sudo)
// Sudo deleted successfully.
} catch (e: SudoProfileException) {
// Handle error.
}
}try {
await client.deleteSudo(sudo)
// Sudo deleted successfully.
} catch(err) {
// Handle error.
}Get Ownership Proof
Many Sudo Platform services require the user to present a proof that they own a particular Sudo so that a provisioned resource can be associated with a Sudo. Sudo Profiles SDK provides an API to generate a cryptographic proof of Sudo ownership so it can be used in provisioning APIs of other SDKs such as Email SDK.
To obtain a Sudo ownership proof for provisioning a resource tied to a Sudo.
do {
let jwt = try await client.getOwnershipProof(sudo: sudo, audience: "<service_specific_audience>")
// Ownership proof obtained successfully.
} catch {
// Handle error. An error might be thrown if the backend is unable
// to delete the Sudo due to availability or security issues or for
// unrecoverable circumstances arising from programmatic error or
// configuration error. For example, if the keychain access entitlement is
// not set up correctly, the client is not signed in, or basic system
// resources are unavailable.
}CoroutineScope(Dispatchers.IO).launch {
try {
client.getOwnershipProof(sudo, "<service_specific_audience>")
// Ownership proof obtained successfully.
} catch (e: SudoProfileException) {
// Handle error.
}
}try {
await client.getOwnershipProof(sudoId, "<service_specific_audience>")
// Ownership proof obtained successfully.
} catch(err) {
// Handle error.
}Resetting Client State
You can reset the internal state information maintained by SudoProfilesClient by calling reset API.
Resetting the client state will cause all persistent data to be lost including any cached Sudos and encryption keys. Unless you are intending to import the encryption keys from an external source, e.g. key backup, you should call generateEncryptionKey API to create a new encryption key before using SudoProfileClient again.
do {
try await client.reset()
} catch {
// Handle error. An error may be thrown for unrecoverable circumstances arising
// from programmatic error or configuration error. For example, basic system resources
// are not accessible.
}client.reset()try {
await client.reset()
} catch(err) {
// Handle error. An error might be thrown for unrecoverable circumstances arising
// from programmatic error or configuration error. For example, basic system resources
// are not accessible.
}Last updated