Skip to content

Commit bd6956f

Browse files
SK-1731: Fixed formatting
1 parent 5d43560 commit bd6956f

15 files changed

Lines changed: 214 additions & 214 deletions

samples/service_account/scoped_token_generation_example.py

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,23 +5,23 @@
55
is_expired,
66
)
77

8-
file_path = "<CREDENTIALS_FILE_PATH>"
9-
bearer_token = ""
8+
file_path = '<CREDENTIALS_FILE_PATH>'
9+
bearer_token = ''
1010

1111
skyflow_credentials = {
12-
"clientID": "<YOUR_CLIENT_ID>",
13-
"clientName": "<YOUR_CLIENT_NAME>",
14-
"tokenURI": "<YOUR_TOKEN_URI>",
15-
"keyID": "<YOUR_KEY_ID>",
16-
"privateKey": "<YOUR_PRIVATE_KEY>",
12+
'clientID': '<YOUR_CLIENT_ID>',
13+
'clientName': '<YOUR_CLIENT_NAME>',
14+
'tokenURI': '<YOUR_TOKEN_URI>',
15+
'keyID': '<YOUR_KEY_ID>',
16+
'privateKey': '<YOUR_PRIVATE_KEY>',
1717
}
1818
credentials_string = json.dumps(skyflow_credentials)
1919
# Generate bearer token from credentials file path
2020

21-
options = {"role_ids": ["ROLE_ID1", "ROLE_ID2"]}
21+
options = {'role_ids': ['ROLE_ID1', 'ROLE_ID2']}
2222
if is_expired(bearer_token):
2323
bearer_token, token_type = generate_bearer_token(
24-
"<YOUR_CREDENTIALS_FILE_PATH>", options
24+
'<YOUR_CREDENTIALS_FILE_PATH>', options
2525
)
2626

2727
print(bearer_token, token_type)

samples/service_account/signed_token_generation_example.py

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -5,29 +5,29 @@
55
generate_signed_data_tokens_from_creds,
66
)
77

8-
file_path = "CREDENTIALS_FILE_PATH"
9-
bearer_token = ""
8+
file_path = 'CREDENTIALS_FILE_PATH'
9+
bearer_token = ''
1010

1111
skyflow_credentials = {
12-
"clientID": "<YOUR_CLIENT_ID>",
13-
"clientName": "<YOUR_CLIENT_NAME>",
14-
"tokenURI": "<YOUR_TOKEN_URI>",
15-
"keyID": "<YOUR_KEY_ID>",
16-
"privateKey": "<YOUR_PRIVATE_KEY>",
12+
'clientID': '<YOUR_CLIENT_ID>',
13+
'clientName': '<YOUR_CLIENT_NAME>',
14+
'tokenURI': '<YOUR_TOKEN_URI>',
15+
'keyID': '<YOUR_KEY_ID>',
16+
'privateKey': '<YOUR_PRIVATE_KEY>',
1717
}
1818
credentials_string = json.dumps(skyflow_credentials)
1919

2020

2121
options = {
22-
"ctx": "CONTEX_ID",
23-
"data_tokens": ["DATA_TOKEN1", "DATA_TOKEN2"],
24-
"time_to_live": 90, # in seconds
22+
'ctx': 'CONTEX_ID',
23+
'data_tokens': ['DATA_TOKEN1', 'DATA_TOKEN2'],
24+
'time_to_live': 90, # in seconds
2525
}
2626

2727
# Generate bearer token from credentials file path
2828
if is_expired(bearer_token):
2929
actual_token, signed_token = generate_signed_data_tokens(
30-
"<YOUR_CREDENTIALS_FILE_PATH>", options
30+
'<YOUR_CREDENTIALS_FILE_PATH>', options
3131
)
3232

3333

samples/service_account/token_generation_example.py

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,22 +5,22 @@
55
is_expired,
66
)
77

8-
file_path = "CREDENTIALS_FILE_PATH"
9-
bearer_token = ""
8+
file_path = 'CREDENTIALS_FILE_PATH'
9+
bearer_token = ''
1010

1111
skyflow_credentials = {
12-
"clientID": "<YOUR_CLIENT_ID>",
13-
"clientName": "<YOUR_CLIENT_NAME>",
14-
"tokenURI": "<YOUR_TOKEN_URI>",
15-
"keyID": "<YOUR_KEY_ID>",
16-
"privateKey": "<YOUR_PRIVATE_KEY>",
12+
'clientID': '<YOUR_CLIENT_ID>',
13+
'clientName': '<YOUR_CLIENT_NAME>',
14+
'tokenURI': '<YOUR_TOKEN_URI>',
15+
'keyID': '<YOUR_KEY_ID>',
16+
'privateKey': '<YOUR_PRIVATE_KEY>',
1717
}
1818
credentials_string = json.dumps(skyflow_credentials)
1919

2020

2121
# Generate bearer token from credentials file path
2222
if is_expired(bearer_token):
23-
bearer_token, token_type = generate_bearer_token("<YOUR_CREDENTIALS_FILE_PATH>")
23+
bearer_token, token_type = generate_bearer_token('<YOUR_CREDENTIALS_FILE_PATH>')
2424

2525
print(bearer_token, token_type)
2626

samples/service_account/token_generation_with_context_example.py

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,24 +5,24 @@
55
is_expired,
66
)
77

8-
file_path = "CREDENTIALS_FILE_PATH"
9-
bearer_token = ""
8+
file_path = 'CREDENTIALS_FILE_PATH'
9+
bearer_token = ''
1010

1111
skyflow_credentials = {
12-
"clientID": "<YOUR_CLIENT_ID>",
13-
"clientName": "<YOUR_CLIENT_NAME>",
14-
"tokenURI": "<YOUR_TOKEN_URI>",
15-
"keyID": "<YOUR_KEY_ID>",
16-
"privateKey": "<YOUR_PRIVATE_KEY>",
12+
'clientID': '<YOUR_CLIENT_ID>',
13+
'clientName': '<YOUR_CLIENT_NAME>',
14+
'tokenURI': '<YOUR_TOKEN_URI>',
15+
'keyID': '<YOUR_KEY_ID>',
16+
'privateKey': '<YOUR_PRIVATE_KEY>',
1717
}
1818
credentials_string = json.dumps(skyflow_credentials)
1919

2020
# Generate bearer token from credentials file path
21-
options = {"ctx": "<CONTEXT_ID>"}
21+
options = {'ctx': '<CONTEXT_ID>'}
2222

2323
if is_expired(bearer_token):
2424
bearer_token, token_type = generate_bearer_token(
25-
"<YOUR_CREDENTIALS_FILE_PATH>", options
25+
'<YOUR_CREDENTIALS_FILE_PATH>', options
2626
)
2727

2828
print(bearer_token, token_type)

samples/vault_api/client_operations.py

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -5,17 +5,17 @@
55

66
# To generate Bearer Token from credentials string.
77
skyflow_credentials = {
8-
"clientID": "<YOUR_CLIENT_ID>",
9-
"clientName": "<YOUR_CLIENT_NAME>",
10-
"tokenURI": "<YOUR_TOKEN_URI>",
11-
"keyID": "<YOUR_KEY_ID>",
12-
"privateKey": "<YOUR_PRIVATE_KEY>",
8+
'clientID': '<YOUR_CLIENT_ID>',
9+
'clientName': '<YOUR_CLIENT_NAME>',
10+
'tokenURI': '<YOUR_TOKEN_URI>',
11+
'keyID': '<YOUR_KEY_ID>',
12+
'privateKey': '<YOUR_PRIVATE_KEY>',
1313
}
1414
credentials_string = json.dumps(skyflow_credentials)
1515

1616
# please pass one of api_key, token, credentials_string & path as credentials
1717
credentials = {
18-
"token": "<BEARER_TOKEN>",
18+
'token': '<BEARER_TOKEN>',
1919
#'credentials_string': credentials_string
2020
}
2121

@@ -24,10 +24,10 @@
2424
Skyflow.builder()
2525
.add_vault_config(
2626
{
27-
"vault_id": "<VAULT_ID1>", # primary vault
28-
"cluster_id": "<CLUSTER_ID1>", # ID from your vault URL Eg https://{clusterId}.vault.skyflowapis.com
29-
"env": Env.PROD, # Env by default it is set to PROD
30-
"credentials": credentials, # individual credentials
27+
'vault_id': '<VAULT_ID1>', # primary vault
28+
'cluster_id': '<CLUSTER_ID1>', # ID from your vault URL Eg https://{clusterId}.vault.skyflowapis.com
29+
'env': Env.PROD, # Env by default it is set to PROD
30+
'credentials': credentials, # individual credentials
3131
}
3232
)
3333
.set_log_level(LogLevel.ERROR) # set log level by default it is set to ERROR
@@ -39,32 +39,32 @@
3939

4040
skyflow_client.add_vault_config(
4141
{
42-
"vault_id": "VAULT_ID2", # secondary vault
43-
"cluster_id": "CLUSTER_ID2", # ID from your vault URL Eg https://{clusterId}.vault.skyflowapis.com
44-
"env": Env.PROD, # Env by default it is set to PROD
42+
'vault_id': 'VAULT_ID2', # secondary vault
43+
'cluster_id': 'CLUSTER_ID2', # ID from your vault URL Eg https://{clusterId}.vault.skyflowapis.com
44+
'env': Env.PROD, # Env by default it is set to PROD
4545
# if you don't specify individual credentials, skyflow credentials will be used
4646
}
4747
)
4848

4949

5050
skyflow_client.update_vault_config(
5151
{
52-
"vault_id": "VAULT_ID2",
53-
"cluster_id": "CLUSTER_ID2",
54-
"credentials": credentials, # update credentials
52+
'vault_id': 'VAULT_ID2',
53+
'cluster_id': 'CLUSTER_ID2',
54+
'credentials': credentials, # update credentials
5555
}
5656
)
5757

5858

5959
# perform operations
6060

6161
delete_request = DeleteRequest(
62-
table = "<TABLE_NAME>",
63-
ids = ["<SKYFLOW_ID1>", "<SKYFLOW_ID2>"]
62+
table = '<TABLE_NAME>',
63+
ids = ['<SKYFLOW_ID1>', '<SKYFLOW_ID2>']
6464
)
6565

6666
# perform delete call if you don't specify vault() it will return the first valid vault
67-
response = skyflow_client.vault("VAULT_ID2").delete(delete_request)
67+
response = skyflow_client.vault('VAULT_ID2').delete(delete_request)
6868

6969
# remove vault on the fly
70-
skyflow_client.remove_vault_config("VAULT_ID")
70+
skyflow_client.remove_vault_config('VAULT_ID')

samples/vault_api/credentials_options.py

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -4,16 +4,16 @@
44
from skyflow.vault.data import DeleteRequest
55

66
skyflow_credentials = {
7-
"clientID": "<YOUR_CLIENT_ID>",
8-
"clientName": "<YOUR_CLIENT_NAME>",
9-
"tokenURI": "<YOUR_TOKEN_URI>",
10-
"keyID": "<YOUR_KEY_ID>",
11-
"privateKey": "<YOUR_PRIVATE_KEY>",
7+
'clientID': '<YOUR_CLIENT_ID>',
8+
'clientName': '<YOUR_CLIENT_NAME>',
9+
'tokenURI': '<YOUR_TOKEN_URI>',
10+
'keyID': '<YOUR_KEY_ID>',
11+
'privateKey': '<YOUR_PRIVATE_KEY>',
1212
}
1313
credentials_string = json.dumps(skyflow_credentials)
1414

1515
credentials = {
16-
"token": "BEARER_TOKEN", # bearer token
16+
'token': 'BEARER_TOKEN', # bearer token
1717
# api_key: 'API_KEY', # API_KEY
1818
# path: 'PATH', # path to credentials file
1919
# credentials_string: credentials_string, # credentials as string
@@ -23,17 +23,17 @@
2323
Skyflow.builder()
2424
.add_vault_config(
2525
{
26-
"vault_id": "<VAULT_ID1>", # primary vault
27-
"cluster_id": "<CLUSTER_ID1>", # ID from your vault URL Eg https://{clusterId}.vault.skyflowapis.com
28-
"env": Env.PROD, # Env by default it is set to PROD
26+
'vault_id': '<VAULT_ID1>', # primary vault
27+
'cluster_id': '<CLUSTER_ID1>', # ID from your vault URL Eg https://{clusterId}.vault.skyflowapis.com
28+
'env': Env.PROD, # Env by default it is set to PROD
2929
}
3030
)
3131
.add_vault_config(
3232
{
33-
"vault_id": "<VAULT_ID2>",
34-
"cluster_id": "<CLUSTER_ID2>", # ID from your vault URL Eg https://{clusterId}.vault.skyflowapis.com
35-
"env": Env.PROD, # Env by default it is set to PROD
36-
"credentials": credentials,
33+
'vault_id': '<VAULT_ID2>',
34+
'cluster_id': '<CLUSTER_ID2>', # ID from your vault URL Eg https://{clusterId}.vault.skyflowapis.com
35+
'env': Env.PROD, # Env by default it is set to PROD
36+
'credentials': credentials,
3737
}
3838
)
3939
.add_skyflow_credentials(
@@ -44,26 +44,26 @@
4444
)
4545

4646
primary_delete_ids = [
47-
"SKYFLOW_ID1",
48-
"SKYFLOW_ID2",
49-
"SKYFLOW_ID3",
47+
'SKYFLOW_ID1',
48+
'SKYFLOW_ID2',
49+
'SKYFLOW_ID3',
5050
]
5151

5252
# perform operations
5353

54-
primary_delete_request = DeleteRequest(table="<TABLE_NAME>", ids=primary_delete_ids)
54+
primary_delete_request = DeleteRequest(table='<TABLE_NAME>', ids=primary_delete_ids)
5555

5656
# VAULT_ID1 will use credentials if you don't specify individual credentials at config level
57-
response = skyflow_client.vault("VAULT_ID2").delete(primary_delete_request)
57+
response = skyflow_client.vault('VAULT_ID2').delete(primary_delete_request)
5858

5959

6060
secondary_delete_ids = [
61-
"SKYFLOW_ID1",
62-
"SKYFLOW_ID2",
63-
"SKYFLOW_ID3",
61+
'SKYFLOW_ID1',
62+
'SKYFLOW_ID2',
63+
'SKYFLOW_ID3',
6464
]
6565

66-
secondary_delete_request = DeleteRequest(table="TABLE_NAME", ids=secondary_delete_ids)
66+
secondary_delete_request = DeleteRequest(table='TABLE_NAME', ids=secondary_delete_ids)
6767

6868
# VAULT_ID2 will use individual credentials at config level
69-
response = skyflow_client.vault("VAULT_ID2").delete(primary_delete_request)
69+
response = skyflow_client.vault('VAULT_ID2').delete(primary_delete_request)

samples/vault_api/delete_records.py

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -7,17 +7,17 @@
77

88
# To generate Bearer Token from credentials string.
99
skyflow_credentials = {
10-
"clientID": "<YOUR_CLIENT_ID>",
11-
"clientName": "<YOUR_CLIENT_NAME>",
12-
"tokenURI": "<YOUR_TOKEN_URI>",
13-
"keyID": "<YOUR_KEY_ID>",
14-
"privateKey": "<YOUR_PRIVATE_KEY>",
10+
'clientID': '<YOUR_CLIENT_ID>',
11+
'clientName': '<YOUR_CLIENT_NAME>',
12+
'tokenURI': '<YOUR_TOKEN_URI>',
13+
'keyID': '<YOUR_KEY_ID>',
14+
'privateKey': '<YOUR_PRIVATE_KEY>',
1515
}
1616
credentials_string = json.dumps(skyflow_credentials)
1717

1818
# please pass one of api_key, token, credentials_string & path as credentials
1919
credentials = {
20-
"token": "BEARER_TOKEN", # bearer token
20+
'token': 'BEARER_TOKEN', # bearer token
2121
# api_key: 'API_KEY', # API_KEY
2222
# path: 'PATH', # path to credentials file
2323
# credentials_string: credentials_string, # credentials as string
@@ -27,10 +27,10 @@
2727
Skyflow.builder()
2828
.add_vault_config(
2929
{
30-
"vault_id": "VAULT_ID", # primary vault
31-
"cluster_id": "CLUSTER_ID", # ID from your vault URL Eg https://{clusterId}.vault.skyflowapis.com
32-
"env": Env.PROD, # Env by default it is set to PROD
33-
"credentials": credentials, # individual credentials
30+
'vault_id': 'VAULT_ID', # primary vault
31+
'cluster_id': 'CLUSTER_ID', # ID from your vault URL Eg https://{clusterId}.vault.skyflowapis.com
32+
'env': Env.PROD, # Env by default it is set to PROD
33+
'credentials': credentials, # individual credentials
3434
}
3535
)
3636
.add_skyflow_credentials(
@@ -41,13 +41,13 @@
4141
)
4242

4343
primary_delete_ids = [
44-
"SKYFLOW_ID1",
45-
"SKYFLOW_ID2",
46-
"SKYFLOW_ID3",
44+
'SKYFLOW_ID1',
45+
'SKYFLOW_ID2',
46+
'SKYFLOW_ID3',
4747
]
4848

49-
delete_request = DeleteRequest(table="<TABLE_NAME>", ids=primary_delete_ids)
49+
delete_request = DeleteRequest(table='<TABLE_NAME>', ids=primary_delete_ids)
5050

51-
response = client.vault("<VAULT_ID>").delete(delete_request)
51+
response = client.vault('<VAULT_ID>').delete(delete_request)
5252

5353
print(response)

0 commit comments

Comments
 (0)