I hereby claim:
- I am 2wdavidcunliffe on github.
- I am dcunliffe (https://keybase.io/dcunliffe) on keybase.
- I have a public key ASBP7qmNHZOUJU9v24Yl-ApkCJ1YlnsLsYrqGHPr8noBEQo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
#cloud-config | |
# vim: syntax=yaml | |
# | |
# The current version of cloud-init in the Hypriot rpi-64 is 0.7.9 | |
# When dealing with cloud-init, it is SUPER important to know the version | |
# I have wasted many hours creating servers to find out the module I was | |
# trying to use wasn't in the cloud-init version I had | |
# Documentation: http://cloudinit.readthedocs.io/en/0.7.9/index.html |
import requests | |
import json | |
import pandas as pd | |
def airtable_download(table, params_dict={}, api_key=None, base_id=None, record_id=None): | |
"""Makes a request to Airtable for all records from a single table. | |
Returns data in dictionary format. | |
Keyword Arguments: |
Vault secures, stores, and tightly controls access to tokens, passwords, certificates, API keys, and other secrets in modern computing. Vault is primarily used in production environments to manage secrets. Vault is a complex system that has many different pieces. There is a clear separation of components that are inside or outside of the security barrier. Only the storage backend and the HTTP API are outside, all other components are inside the barrier.
Figure 1: Architecture of Vault and Spring App (Click to enlarge)
The storage backend is untrusted and is used to durably store encrypted data. When the Vault server is started, it must be provided with a storage backend so that data is available across restarts. The HTTP API similarly must be started by the Vault server on start so that clients can interact with it.