Skip to content

Commit 156ebb5

Browse files
Replaced DefaultAzureCredential with AzureCliCredential in Scripts
1 parent ac366e0 commit 156ebb5

File tree

4 files changed

+12
-18
lines changed

4 files changed

+12
-18
lines changed

infra/scripts/index_scripts/01_create_search_index.py

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
from azure.identity import DefaultAzureCredential
1+
from azure.identity import AzureCliCredential
22
from azure.keyvault.secrets import SecretClient
33
from azure.search.documents.indexes import SearchIndexClient
44
from azure.search.documents.indexes.models import (
@@ -27,12 +27,11 @@ def get_secrets_from_kv(secret_name: str) -> str:
2727
Retrieves a secret value from Azure Key Vault.
2828
Args:
2929
secret_name (str): Name of the secret.
30-
credential (DefaultAzureCredential): Credential with access to Key Vault.
30+
credential (AzureCliCredential): Credential with access to Key Vault.
3131
Returns:
3232
str: The secret value.
3333
"""
34-
kv_credential = DefaultAzureCredential(managed_identity_client_id=managed_identity_client_id)
35-
# CodeQL [SM05139] Okay use of DefaultAzureCredential as it is only used in local environment.
34+
kv_credential = AzureCliCredential()
3635
secret_client = SecretClient(
3736
vault_url=f"https://{key_vault_name}.vault.azure.net/",
3837
credential=kv_credential
@@ -44,8 +43,7 @@ def create_search_index():
4443
"""Create an Azure Search index."""
4544

4645
# Shared credential
47-
credential = DefaultAzureCredential(managed_identity_client_id=managed_identity_client_id)
48-
# CodeQL [SM05139] Okay use of DefaultAzureCredential as it is only used in local environment.
46+
credential = AzureCliCredential()
4947

5048
# Retrieve secrets from Key Vault
5149
search_endpoint = get_secrets_from_kv("AZURE-SEARCH-ENDPOINT")

infra/scripts/index_scripts/02_process_data.py

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
from azure.search.documents import SearchClient
88
from azure.storage.filedatalake import DataLakeServiceClient
99
from azure.search.documents.indexes import SearchIndexClient
10-
from azure.identity import (DefaultAzureCredential, get_bearer_token_provider)
10+
from azure.identity import (AzureCliCredential, get_bearer_token_provider)
1111

1212

1313
key_vault_name = 'kv_to-be-replaced'
@@ -22,12 +22,11 @@ def get_secrets_from_kv(secret_name: str) -> str:
2222
Retrieves a secret value from Azure Key Vault.
2323
Args:
2424
secret_name (str): Name of the secret.
25-
credential (DefaultAzureCredential): Credential with access to Key Vault.
25+
credential (AzureCliCredential): Credential with access to Key Vault.
2626
Returns:
2727
str: The secret value.
2828
"""
29-
kv_credential = DefaultAzureCredential(managed_identity_client_id=managed_identity_client_id)
30-
# CodeQL [SM05139] Okay use of DefaultAzureCredential as it is only used in local environment.
29+
kv_credential = AzureCliCredential()
3130
secret_client = SecretClient(
3231
vault_url=f"https://{key_vault_name}.vault.azure.net/",
3332
credential=kv_credential
@@ -45,8 +44,7 @@ def get_secrets_from_kv(secret_name: str) -> str:
4544

4645
# Azure Data Lake settings
4746
account_url = f"https://{account_name}.dfs.core.windows.net"
48-
credential = DefaultAzureCredential(managed_identity_client_id=managed_identity_client_id)
49-
# CodeQL [SM05139] Okay use of DefaultAzureCredential as it is only used in local environment.
47+
credential = AzureCliCredential()
5048
service_client = DataLakeServiceClient(account_url, credential=credential, api_version='2023-01-03')
5149
file_system_client = service_client.get_file_system_client(file_system_client_name)
5250
directory_name = directory

scripts/chunk_documents.py

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55

66
from azure.ai.formrecognizer import DocumentAnalysisClient
77
from azure.core.credentials import AzureKeyCredential
8-
from azure.identity import DefaultAzureCredential
8+
from azure.identity import AzureCliCredential
99
from azure.keyvault.secrets import SecretClient
1010
from data_utils import chunk_directory
1111

@@ -57,8 +57,7 @@ def get_document_intelligence_client(config, secret_client):
5757
with open(args.config_file) as f:
5858
config = json.load(f)
5959

60-
credential = DefaultAzureCredential() # CodeQL [SM05139] Okay use of DefaultAzureCredential as it is only used in local environment.
61-
60+
credential = AzureCliCredential()
6261
if type(config) is not list:
6362
config = [config]
6463

scripts/embed_documents.py

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
import json
33
from asyncio import sleep
44

5-
from azure.identity import DefaultAzureCredential
5+
from azure.identity import AzureCliCredential
66
from azure.keyvault.secrets import SecretClient
77
from data_utils import get_embedding
88

@@ -19,8 +19,7 @@
1919
with open(args.config_file) as f:
2020
config = json.load(f)
2121

22-
credential = DefaultAzureCredential() # CodeQL [SM05139] Okay use of DefaultAzureCredential as it is only used in local environment.
23-
22+
credential = AzureCliCredential()
2423
if type(config) is not list:
2524
config = [config]
2625

0 commit comments

Comments
 (0)