Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
This repository contains the Python client for the TileDB Cloud Service.
See Quickstart section of the docs.
See https://tiledb-inc.github.io/TileDB-Cloud-Py/
Documentation uses Quarto style documentation.
pip install .[docs]
quartodoc build --config docs/_quarto.yaml
quarto preview docs/
pytest
pytest -vs
taskgraphs
in their names: pytest -vsk taskgraphs
TILEDB_REST_TOKEN
-- you will need a valid API token for the tests to passunittest
user and all tests should passTILEDB_REST_TOKEN
points to your own account, most tests will run, except for those that explicitly check against contents of the unittest
account which are skippedThis package contains modules and functions that will be run in the TileDB Cloud as UDFs. Local ingestor changes can be tested in the cloud by using a feature of cloudpickle. Below is a runnable example. TILEDB_NAMESPACE
is your TileDB namespace ("TileDB-Inc", for example). TILEDB_ACCESS_CREDENTIAL_NAME
is the name of the stored credentials for accessing AWS_BUCKET
. IMAGE_FILE_KEY
is the key for an object in that bucket and OUTPUT_GROUP_KEY
is the key to be used for the group that the ingest()
UDF will create in AWS_BUCKET
.
import cloudpickle
import tiledb.cloud.bioimg
cloudpickle.register_pickle_by_value(tiledb.cloud.bioimg)
tiledb.cloud.bioimg.ingest(
source="s3://AWS_BUCKET/IMAGE_FILE_KEY",
output="s3://AWS_BUCKET/OUTPUT_GROUP_KEY",
config=None,
namespace="TILEDB_NAMESPACE",
acn="TILEDB_ACCESS_CREDENTIAL_NAME",
ingest_resources={"cpu": "8", "memory": "32Gi"},
)
In this case tiledb.cloud.bioimg.ingest()
uses cloudpickle to send a local function to TileDB Cloud, and cloudpickle.register_pickle_by_value(tiledb.cloud.bioimg)
directs cloudpickle to bring the currently imported tiledb.cloud.bioimg
module along with the function. Your local version of the module will be used instead of the version currently deployed in TileDB Cloud.
Note: your local changes to the Cloud-Py package will need to be installed in order for cloudpickle to serialize them, as cloudpickle needs to find them at runtime.
Releasing is entirely automated. Releases made on GitHub using tags that start with "v", like "v0.12.28", trigger sdist and wheel builds and upload of those distributions to the Python Package Index.
FAQs
TileDB Cloud platform Python client
We found that tiledb-cloud demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 5 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.