Latest Threat Research:SANDWORM_MODE: Shai-Hulud-Style npm Worm Hijacks CI Workflows and Poisons AI Toolchains.Details
Socket
Book a DemoInstallSign in
Socket

kflow

Package Overview
Dependencies
Maintainers
1
Versions
102
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

kflow - npm Package Compare versions

Comparing version
1.0.144
to
1.0.145
+1
-1
kflow.egg-info/PKG-INFO
Metadata-Version: 2.1
Name: kflow
Version: 1.0.144
Version: 1.0.145
Summary: KLog.co package for ETLs

@@ -5,0 +5,0 @@ Home-page: https://github.com/teu-ai/etl

@@ -35,3 +35,3 @@ import os

if secret_name in ["PrismaProd","WarehouseProd"]:
if base_env in ["PrismaProd","WarehouseProd"]:
rename_secret = {"PrismaProd":"prisma_bd",

@@ -43,3 +43,3 @@ "WarehouseProd":"secret-redshift-cluster-1",

secret_name = rename_secret[secret_name]
secret_name = rename_secret[base_env]

@@ -50,12 +50,12 @@ secret_value = get_secret(secret_name)

if base_env == 'vekna_cluster':
if secret_name == 'vekna_cluster':
sql_connector="postgresql"
db_name = 'vekna'
elif base_env == 'data_rds':
elif secret_name == 'data_rds':
sql_connector="postgresql"
db_name = 'postgres'
elif base_env == 'secret-redshift-cluster-1':
elif secret_name == 'secret-redshift-cluster-1':
sql_connector="redshift+psycopg2"
db_name = 'warehouse'
elif base_env == 'prisma_bd':
elif secret_name == 'prisma_bd':
sql_connector="postgresql"

@@ -62,0 +62,0 @@ db_name = 'prisma'

@@ -769,7 +769,7 @@ import io

def airtable_get_table(base_id,table_id,api_key):
def airtable_get_table(base_id,table_id):
from pyairtable import Api
api = Api(api_key)
api = Api(authn.get_secret('airtable_token'))
obj_table = api.table(base_id, table_id)

@@ -776,0 +776,0 @@ df_response = pd.DataFrame(obj_table.all())

Metadata-Version: 2.1
Name: kflow
Version: 1.0.144
Version: 1.0.145
Summary: KLog.co package for ETLs

@@ -5,0 +5,0 @@ Home-page: https://github.com/teu-ai/etl