Skip to content

Commit b380572

Browse files
authored
Loosen pyyaml version, which broken for latest cython. (#266)
1 parent b4e971e commit b380572

File tree

8 files changed

+14
-60
lines changed

8 files changed

+14
-60
lines changed

ads/pipeline/ads_pipeline.py

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1904,7 +1904,7 @@ def __override_configurations(
19041904
# ) as ml_step_schema_file:
19051905
# ml_step_schema = json.load(ml_step_schema_file)
19061906

1907-
# yaml_dict = yaml.load(Pipeline._read_from_file(uri=uri))
1907+
# yaml_dict = yaml.load(Pipeline._read_from_file(uri=uri), Loader=yaml.FullLoader)
19081908

19091909
# pipeline_validator = Validator(pipeline_schema)
19101910
# if not pipeline_validator.validate(yaml_dict):
@@ -1996,7 +1996,6 @@ def init(self) -> "Pipeline":
19961996
)
19971997

19981998

1999-
20001999
class DataSciencePipeline(OCIDataScienceMixin, oci.data_science.models.Pipeline):
20012000
@classmethod
20022001
def from_ocid(cls, ocid: str) -> "DataSciencePipeline":
@@ -2277,4 +2276,4 @@ def delete(
22772276
operation_kwargs=operation_kwargs,
22782277
waiter_kwargs=waiter_kwargs,
22792278
)
2280-
return self.sync()
2279+
return self.sync()

ads/secrets/secrets.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
#!/usr/bin/env python
22
# -*- coding: utf-8 -*--
33

4-
# Copyright (c) 2021, 2022 Oracle and/or its affiliates.
4+
# Copyright (c) 2021, 2023 Oracle and/or its affiliates.
55
# Licensed under the Universal Permissive License v 1.0 as shown at https://oss.oracle.com/licenses/upl/
66

77
import ads
@@ -273,7 +273,7 @@ def load_secret(
273273
if format.lower() == "json":
274274
vault_info = json.load(vf)
275275
elif format.lower() in ["yaml", "yml"]:
276-
vault_info = yaml.load(vf)
276+
vault_info = yaml.load(vf, Loader=yaml.FullLoader)
277277
if not cls._validate_required_vault_attributes(vault_info):
278278
logger.error(
279279
f"Missing required Attributes in file {uri}: {cls.required_keys}"

setup.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
"ocifs>=1.1.3",
2828
"pandas>1.2.1,<1.6",
2929
"python_jsonschema_objects>=0.3.13",
30-
"PyYAML>=5.4,<6",
30+
"PyYAML>=6", # pyyaml 5.4 is broken with cython 3
3131
"requests",
3232
"scikit-learn>=0.23.2,<1.2",
3333
"tabulate>=0.8.9",

tests/unitary/default_setup/secret/test_secretkeeper_adw.py

Lines changed: 4 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,6 @@ def key_encoding_with_wallet(tmpdir):
121121
@patch("ads.common.auth.default_signer")
122122
@patch("ads.common.oci_client.OCIClientFactory")
123123
def test_encode(mock_client, mock_signer, key_encoding):
124-
125124
adwsecretkeeper = ADBSecretKeeper(
126125
*key_encoding[0],
127126
vault_id="ocid.vault",
@@ -135,7 +134,6 @@ def test_encode(mock_client, mock_signer, key_encoding):
135134
@patch("ads.common.auth.default_signer")
136135
@patch("ads.common.oci_client.OCIClientFactory")
137136
def test_adw_save(mock_client, mock_signer, key_encoding, tmpdir):
138-
139137
adwsecretkeeper = ADBSecretKeeper(
140138
*key_encoding[0],
141139
vault_id="ocid.vault",
@@ -158,7 +156,7 @@ def test_adw_save(mock_client, mock_signer, key_encoding, tmpdir):
158156
}
159157
adwsecretkeeper.export_vault_details(os.path.join(tmpdir, "test.yaml"))
160158
with open(os.path.join(tmpdir, "test.yaml")) as tf:
161-
assert yaml.load(tf) == {
159+
assert yaml.load(tf, Loader=yaml.FullLoader) == {
162160
"key_id": "ocid.key",
163161
"secret_id": "ocid.secret.id",
164162
"vault_id": "ocid.vault",
@@ -170,7 +168,6 @@ def test_adw_save(mock_client, mock_signer, key_encoding, tmpdir):
170168
def test_adw_save_without_explicit_encoding(
171169
mock_client, mock_signer, key_encoding, tmpdir
172170
):
173-
174171
adwsecretkeeper = ADBSecretKeeper(
175172
*key_encoding[0],
176173
vault_id="ocid.vault",
@@ -193,7 +190,7 @@ def test_adw_save_without_explicit_encoding(
193190
}
194191
adwsecretkeeper.export_vault_details(os.path.join(tmpdir, "test.yaml"))
195192
with open(os.path.join(tmpdir, "test.yaml")) as tf:
196-
assert yaml.load(tf) == {
193+
assert yaml.load(tf, Loader=yaml.FullLoader) == {
197194
"key_id": "ocid.key",
198195
"secret_id": "ocid.secret.id",
199196
"vault_id": "ocid.vault",
@@ -203,7 +200,6 @@ def test_adw_save_without_explicit_encoding(
203200
@patch("ads.common.auth.default_signer")
204201
@patch("ads.common.oci_client.OCIClientFactory")
205202
def test_adw_context(mock_client, mock_signer, key_encoding):
206-
207203
with mock.patch(
208204
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
209205
) as mocked_getsecret:
@@ -235,7 +231,6 @@ def test_adw_context(mock_client, mock_signer, key_encoding):
235231
@patch("ads.common.auth.default_signer")
236232
@patch("ads.common.oci_client.OCIClientFactory")
237233
def test_adw_keeper_no_wallet(mock_client, mock_signer, key_encoding):
238-
239234
with mock.patch(
240235
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
241236
) as mocked_getsecret:
@@ -263,7 +258,6 @@ def test_adw_keeper_with_repository(mock_client, mock_signer, key_encoding, tmpd
263258
@patch("ads.common.auth.default_signer")
264259
@patch("ads.common.oci_client.OCIClientFactory")
265260
def test_adw_context_namespace(mock_client, mock_signer, key_encoding):
266-
267261
with mock.patch(
268262
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
269263
) as mocked_getsecret:
@@ -296,7 +290,6 @@ def test_adw_context_namespace(mock_client, mock_signer, key_encoding):
296290
@patch("ads.common.auth.default_signer")
297291
@patch("ads.common.oci_client.OCIClientFactory")
298292
def test_adw_context_noexport(mock_client, mock_signer, key_encoding):
299-
300293
with mock.patch(
301294
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
302295
) as mocked_getsecret:
@@ -399,7 +392,6 @@ def mock_get_secret_id(
399392
with mock.patch(
400393
"ads.vault.Vault.get_secret", side_effect=mock_get_secret_id
401394
) as mocked_getsecret:
402-
403395
adwsecretkeeper = ADBSecretKeeper(
404396
vault_id="ocid.vault",
405397
key_id="ocid.key",
@@ -449,7 +441,6 @@ def mock_get_secret_id(
449441
with mock.patch(
450442
"ads.vault.Vault.get_secret", side_effect=mock_get_secret_id
451443
) as mocked_getsecret:
452-
453444
with ADBSecretKeeper.load_secret(
454445
wallet_dir=wallet_dir, source="meta.secret.id", export_env=True
455446
) as adwsecretkeeper:
@@ -506,7 +497,6 @@ def mock_get_secret_id(
506497
with mock.patch(
507498
"ads.vault.Vault.get_secret", side_effect=mock_get_secret_id
508499
) as mocked_getsecret:
509-
510500
with ADBSecretKeeper.load_secret(
511501
wallet_dir=wallet_dir,
512502
source="meta.secret.id",
@@ -566,7 +556,6 @@ def mock_get_secret_id(
566556
with mock.patch(
567557
"ads.vault.Vault.get_secret", side_effect=mock_get_secret_id
568558
) as mocked_getsecret:
569-
570559
with ADBSecretKeeper.load_secret(
571560
wallet_dir=wallet_dir,
572561
source="meta.secret.id",
@@ -617,7 +606,6 @@ def mock_create_secret(
617606
with mock.patch(
618607
"ads.vault.Vault.create_secret", side_effect=mock_create_secret
619608
) as mocked_getsecret:
620-
621609
adwsecretkeeper = ADBSecretKeeper(
622610
vault_id="ocid.vault",
623611
key_id="ocid.key",
@@ -641,7 +629,7 @@ def mock_create_secret(
641629
os.path.join(tmpdir, "info.yaml"), format="yml"
642630
)
643631
with open(os.path.join(tmpdir, "info.yaml")) as tf:
644-
assert yaml.load(tf) == {
632+
assert yaml.load(tf, Loader=yaml.FullLoader) == {
645633
"vault_id": "ocid.vault",
646634
"key_id": "ocid.key",
647635
"secret_id": "meta.secret.id",
@@ -675,7 +663,6 @@ def mock_create_secret(
675663
with mock.patch(
676664
"ads.vault.Vault.create_secret", side_effect=mock_create_secret
677665
) as mocked_getsecret:
678-
679666
adwsecretkeeper = ADBSecretKeeper(
680667
vault_id="ocid.vault",
681668
key_id="ocid.key",
@@ -699,7 +686,7 @@ def mock_create_secret(
699686
os.path.join(tmpdir, "info.yaml"), format="yaml"
700687
)
701688
with open(os.path.join(tmpdir, "info.yaml")) as tf:
702-
assert yaml.load(tf) == {
689+
assert yaml.load(tf, Loader=yaml.FullLoader) == {
703690
"vault_id": "ocid.vault",
704691
"key_id": "ocid.key",
705692
"secret_id": "meta.secret.id",
@@ -732,7 +719,6 @@ def mock_get_secret_id(
732719
return content_map[id]
733720

734721
with mock.patch("ads.vault.Vault.get_secret", side_effect=mock_get_secret_id) as _:
735-
736722
with ADBSecretKeeper.load_secret(
737723
source=os.path.join(os.path.join(tmpdir, "info.json")),
738724
format="json",
@@ -789,7 +775,6 @@ def mock_get_secret_id(
789775
return content_map[id]
790776

791777
with mock.patch("ads.vault.Vault.get_secret", side_effect=mock_get_secret_id) as _:
792-
793778
with ADBSecretKeeper.load_secret(
794779
source=os.path.join(os.path.join(tmpdir, "info.yaml")),
795780
format="yaml",

tests/unitary/default_setup/secret/test_secretkeeper_auth_token.py

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ def key_encoding():
2424
@patch("ads.common.auth.default_signer")
2525
@patch("ads.common.oci_client.OCIClientFactory")
2626
def test_encode(mock_client, mock_signer, key_encoding):
27-
2827
apisecretkeeper = AuthTokenSecretKeeper(
2928
key_encoding[0],
3029
vault_id="ocid.vault",
@@ -51,7 +50,6 @@ def test_decode(mock_client, mock_signer, key_encoding):
5150
@patch("ads.common.auth.default_signer")
5251
@patch("ads.common.oci_client.OCIClientFactory")
5352
def test_api_context(mock_client, mock_signer, key_encoding):
54-
5553
with mock.patch(
5654
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
5755
) as mocked_getsecret:
@@ -67,7 +65,6 @@ def test_api_context(mock_client, mock_signer, key_encoding):
6765
@patch("ads.common.auth.default_signer")
6866
@patch("ads.common.oci_client.OCIClientFactory")
6967
def test_api_context_namespace(mock_client, mock_signer, key_encoding):
70-
7168
with mock.patch(
7269
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
7370
) as mocked_getsecret:
@@ -83,7 +80,6 @@ def test_api_context_namespace(mock_client, mock_signer, key_encoding):
8380
@patch("ads.common.auth.default_signer")
8481
@patch("ads.common.oci_client.OCIClientFactory")
8582
def test_api_context_noexport(mock_client, mock_signer, key_encoding):
86-
8783
with mock.patch(
8884
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
8985
) as mocked_getsecret:
@@ -141,7 +137,7 @@ def test_export_vault_details(mock_client, mock_signer, key_encoding, tmpdir):
141137
os.path.join(tmpdir, "test.yaml"), format="yaml"
142138
)
143139
with open(os.path.join(tmpdir, "test.yaml")) as tf:
144-
assert yaml.load(tf) == {
140+
assert yaml.load(tf, Loader=yaml.FullLoader) == {
145141
"key_id": "ocid.key",
146142
"secret_id": "ocid.secret.id",
147143
"vault_id": "ocid.vault",
@@ -191,5 +187,4 @@ def test_load_from_invalid_file(mock_client, mock_signer, key_encoding, tmpdir):
191187
with AuthTokenSecretKeeper.load_secret(
192188
source=os.path.join(tmpdir, "test.yaml"), format="yaml"
193189
) as apisecretkeeper:
194-
195190
assert apisecretkeeper == key_encoding[1]

tests/unitary/default_setup/secret/test_secretkeeper_bds.py

Lines changed: 2 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,6 @@ def key_encoding():
5656
@patch("ads.common.auth.default_signer")
5757
@patch("ads.common.oci_client.OCIClientFactory")
5858
def test_encode(mock_client, mock_signer, key_encoding):
59-
6059
bdssecretkeeper = BDSSecretKeeper(
6160
*key_encoding[0],
6261
vault_id="ocid.vault",
@@ -176,7 +175,6 @@ def key_encoding_with_keytab_kerb5(tmpdir):
176175
def test_encode_with_keytab_kerb5(
177176
mock_client, mock_signer, key_encoding_with_keytab_kerb5
178177
):
179-
180178
bdssecretkeeper = BDSSecretKeeper(
181179
*key_encoding_with_keytab_kerb5.credentials,
182180
vault_id="ocid.vault",
@@ -194,7 +192,6 @@ def test_encode_with_keytab_kerb5(
194192
def test_bds_save_without_explicit_encoding(
195193
mock_client, mock_signer, key_encoding, tmpdir
196194
):
197-
198195
bdssecretkeeper = BDSSecretKeeper(
199196
*key_encoding[0],
200197
vault_id="ocid.vault",
@@ -219,7 +216,7 @@ def test_bds_save_without_explicit_encoding(
219216
}
220217
bdssecretkeeper.export_vault_details(os.path.join(tmpdir, "test.yaml"))
221218
with open(os.path.join(tmpdir, "test.yaml")) as tf:
222-
assert yaml.load(tf) == {
219+
assert yaml.load(tf, Loader=yaml.FullLoader) == {
223220
"key_id": "ocid.key",
224221
"secret_id": "ocid.secret.id",
225222
"vault_id": "ocid.vault",
@@ -229,7 +226,6 @@ def test_bds_save_without_explicit_encoding(
229226
@patch("ads.common.auth.default_signer")
230227
@patch("ads.common.oci_client.OCIClientFactory")
231228
def test_bds_save(mock_client, mock_signer, key_encoding_with_keytab_kerb5, tmpdir):
232-
233229
bdssecretkeeper = BDSSecretKeeper(
234230
*key_encoding_with_keytab_kerb5.credentials,
235231
vault_id="ocid.vault",
@@ -253,7 +249,7 @@ def test_bds_save(mock_client, mock_signer, key_encoding_with_keytab_kerb5, tmpd
253249
}
254250
bdssecretkeeper.export_vault_details(os.path.join(tmpdir, "test.yaml"))
255251
with open(os.path.join(tmpdir, "test.yaml")) as tf:
256-
assert yaml.load(tf) == {
252+
assert yaml.load(tf, Loader=yaml.FullLoader) == {
257253
"key_id": "ocid.key",
258254
"secret_id": "ocid.secret.id",
259255
"vault_id": "ocid.vault",
@@ -263,7 +259,6 @@ def test_bds_save(mock_client, mock_signer, key_encoding_with_keytab_kerb5, tmpd
263259
@patch("ads.common.auth.default_signer")
264260
@patch("ads.common.oci_client.OCIClientFactory")
265261
def test_bds_context(mock_client, mock_signer, key_encoding):
266-
267262
with mock.patch(
268263
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
269264
) as mocked_getsecret:
@@ -300,7 +295,6 @@ def test_bds_context(mock_client, mock_signer, key_encoding):
300295
@patch("ads.common.auth.default_signer")
301296
@patch("ads.common.oci_client.OCIClientFactory")
302297
def test_bds_keeper_no_file(mock_client, mock_signer, key_encoding):
303-
304298
with mock.patch(
305299
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
306300
) as mocked_getsecret:
@@ -315,7 +309,6 @@ def test_bds_keeper_no_file(mock_client, mock_signer, key_encoding):
315309
@patch("ads.common.auth.default_signer")
316310
@patch("ads.common.oci_client.OCIClientFactory")
317311
def test_bds_context_namespace(mock_client, mock_signer, key_encoding):
318-
319312
with mock.patch(
320313
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
321314
) as mocked_getsecret:
@@ -356,7 +349,6 @@ def test_bds_context_namespace(mock_client, mock_signer, key_encoding):
356349
@patch("ads.common.auth.default_signer")
357350
@patch("ads.common.oci_client.OCIClientFactory")
358351
def test_bds_context_noexport(mock_client, mock_signer, key_encoding):
359-
360352
with mock.patch(
361353
"ads.vault.Vault.get_secret", return_value=key_encoding[2]
362354
) as mocked_getsecret:
@@ -463,7 +455,6 @@ def mock_get_secret_id(
463455
with mock.patch(
464456
"ads.vault.Vault.get_secret", side_effect=mock_get_secret_id
465457
) as mocked_getsecret:
466-
467458
bdssecretkeeper = BDSSecretKeeper(
468459
vault_id="ocid.vault",
469460
key_id="ocid.key",
@@ -546,7 +537,6 @@ def mock_get_secret_id(
546537
with mock.patch(
547538
"ads.vault.Vault.get_secret", side_effect=mock_get_secret_id
548539
) as mocked_getsecret:
549-
550540
with BDSSecretKeeper.load_secret(
551541
source="meta.secret.id", export_env=True
552542
) as bdssecretkeeper:
@@ -604,7 +594,6 @@ def mock_get_secret_id(
604594
with mock.patch(
605595
"ads.vault.Vault.get_secret", side_effect=mock_get_secret_id
606596
) as mocked_getsecret:
607-
608597
with BDSSecretKeeper.load_secret(
609598
source="meta.secret.id",
610599
export_prefix="myapp",
@@ -682,7 +671,6 @@ def mock_get_secret_id(
682671
with mock.patch(
683672
"ads.vault.Vault.get_secret", side_effect=mock_get_secret_id
684673
) as mocked_getsecret:
685-
686674
with BDSSecretKeeper.load_secret(
687675
source="meta.secret.id",
688676
) as bdssecretkeeper:
@@ -726,7 +714,6 @@ def mock_get_secret_id(
726714
def test_bds_with_keytab_kerb5_load_from_file(
727715
mock_client, mock_signer, key_encoding_with_keytab_kerb5, tmpdir
728716
):
729-
730717
content_map = key_encoding_with_keytab_kerb5[3]
731718
content_map["meta.secret.id"] = key_encoding_with_keytab_kerb5.encoded
732719

@@ -746,7 +733,6 @@ def mock_get_secret_id(
746733
return content_map[id]
747734

748735
with mock.patch("ads.vault.Vault.get_secret", side_effect=mock_get_secret_id) as _:
749-
750736
with BDSSecretKeeper.load_secret(
751737
source=os.path.join(os.path.join(tmpdir, "info.json")),
752738
format="json",
@@ -802,7 +788,6 @@ def mock_get_secret_id(
802788
return content_map[id]
803789

804790
with mock.patch("ads.vault.Vault.get_secret", side_effect=mock_get_secret_id) as _:
805-
806791
with BDSSecretKeeper.load_secret(
807792
source=os.path.join(os.path.join(tmpdir, "info.yaml")),
808793
format="yaml",

0 commit comments

Comments
 (0)