Tokern Lineage Engine is fast and easy to use application to collect, visualize and analyze column-level data lineage in databases, data warehouses and data lakes in AWS and GCP.
Tokern Lineage helps you browse column-level data lineage * visually using kedro-viz * analyze lineage graphs programmatically using the powerful networkx graph library
Checkout an example data lineage notebook.
Check out the post on using data lineage for cost control for an example of how data lineage can be used in production.
Download the docker-compose file from Github repository.
# in a new directory run
wget https://raw.githubusercontent.com/tokern/data-lineage/master/install-manifests/docker-compose/catalog-demo.yml
# or run
curl https://raw.githubusercontent.com/tokern/data-lineage/master/install-manifests/docker-compose/tokern-lineage-engine.yml -o docker-compose.yml
Run docker-compose
docker-compose up -d
Check that the containers are running.
docker ps
CONTAINER ID IMAGE CREATED STATUS PORTS NAMES
3f4e77845b81 tokern/data-lineage-viz:latest ... 4 hours ago Up 4 hours 0.0.0.0:8000->80/tcp tokern-data-lineage-visualizer
1e1ce4efd792 tokern/data-lineage:latest ... 5 days ago Up 5 days tokern-data-lineage
38be15bedd39 tokern/demodb:latest ... 2 weeks ago Up 2 weeks tokern-demodb
Try out Tokern Lineage App
Head to http://localhost:8000/
to open the Tokern Lineage app
# in a new directory run
wget https://raw.githubusercontent.com/tokern/data-lineage/master/install-manifests/docker-compose/tokern-lineage-engine.yml
# or run
curl https://raw.githubusercontent.com/tokern/data-lineage/master/install-manifests/docker-compose/catalog-demo.yml -o tokern-lineage-engine.yml
Run docker-compose
docker-compose up -d
If you want to use an external Postgres database, change the following parameters in tokern-lineage-engine.yml
:
You can also override default values using environement variables.
CATALOG_HOST=... CATALOG_USER=... CATALOG_PASSWORD=... CATALOG_DB=... docker-compose -f ... up -d
For more advanced usage of environment variables with docker-compose, refer to docker-compose docs
Pro-tip
If you want to connect to a database in the host machine, set
CATALOG_HOST: host.docker.internal # For mac or windows
#OR
CATALOG_HOST: 172.17.0.1 # Linux
For advanced usage, please refer to data-lineage documentation
Please take this survey if you are a user or considering using data-lineage. Responses will help us prioritize features better.
This can't currently be run on ARM hardware without being in emulation mode. Given Mac M1 and AWS EC2 Graviton, it would be nice to have ARM support.
python:3.8.1-slim is old and has 21 security vulnerabilites.
At least consider swapping to python:3.8-slim.
Bumps ipython from 7.31.1 to 8.10.0.
15ea1ed
release 8.10.0560ad10
DOC: Update what's new for 8.10 (#13939)7557ade
DOC: Update what's new for 8.10385d693
Merge pull request from GHSA-29gw-9793-fvw7e548ee2
Swallow potential exceptions from showtraceback() (#13934)0694b08
MAINT: mock slowest test. (#13885)8655912
MAINT: mock slowest test.a011765
Isolate the attack tests with setUp and tearDown methodsc7a9470
Add some regression tests for this changefd34cf5
Swallow potential exceptions from showtraceback()Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Bumps cryptography from 3.4.7 to 39.0.1.
Sourced from cryptography's changelog.
39.0.1 - 2023-02-07
* **SECURITY ISSUE** - Fixed a bug where ``Cipher.update_into`` accepted Python buffer protocol objects, but allowed immutable buffers. **CVE-2023-23931** * Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.0.8.
.. _v39-0-0:
39.0.0 - 2023-01-01
- BACKWARDS INCOMPATIBLE: Support for OpenSSL 1.1.0 has been removed. Users on older version of OpenSSL will need to upgrade.
- BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.5. The new minimum LibreSSL version is 3.5.0. Going forward our policy is to support versions of LibreSSL that are available in versions of OpenBSD that are still receiving security support.
- BACKWARDS INCOMPATIBLE: Removed the
encode_point
andfrom_encoded_point
methods on :class:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicNumbers
, which had been deprecated for several years. :meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.public_bytes
and :meth:~cryptography.hazmat.primitives.asymmetric.ec.EllipticCurvePublicKey.from_encoded_point
should be used instead.- BACKWARDS INCOMPATIBLE: Support for using MD5 or SHA1 in :class:
~cryptography.x509.CertificateBuilder
, other X.509 builders, and PKCS7 has been removed.- BACKWARDS INCOMPATIBLE: Dropped support for macOS 10.10 and 10.11, macOS users must upgrade to 10.12 or newer.
- ANNOUNCEMENT: The next version of
cryptography
(40.0) will change the way we link OpenSSL. This will only impact users who buildcryptography
from source (i.e., not from awheel
), and specify their own version of OpenSSL. For those users, theCFLAGS
,LDFLAGS
,INCLUDE
,LIB
, andCRYPTOGRAPHY_SUPPRESS_LINK_FLAGS
environment variables will no longer be respected. Instead, users will need to configure their buildsas documented here
_.- Added support for :ref:
disabling the legacy provider in OpenSSL 3.0.x<legacy-provider>
.- Added support for disabling RSA key validation checks when loading RSA keys via :func:
~cryptography.hazmat.primitives.serialization.load_pem_private_key
, :func:~cryptography.hazmat.primitives.serialization.load_der_private_key
, and :meth:~cryptography.hazmat.primitives.asymmetric.rsa.RSAPrivateNumbers.private_key
. This speeds up key loading but is :term:unsafe
if you are loading potentially attacker supplied keys.- Significantly improved performance for :class:
~cryptography.hazmat.primitives.ciphers.aead.ChaCha20Poly1305
... (truncated)
d6951dc
changelog + security fix backport (#8231)138da90
workaround scapy bug in downstream tests (#8218) (#8228)69527bc
bookworm is py311 now (#8200)111deef
backport main branch CI to 39.0.x (#8153)338a65a
39.0.0 version bump (#7954)84a3cd7
automatically download and upload circleci wheels (#7949)525c0b3
Type annotate release.py (#7951)46d2a94
Use the latest 3.10 release when wheel building (#7953)f150dc1
fix CI to work with ubuntu 22.04 (#7950)8867724
fix README for python3 (#7947)Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
Bumps oauthlib from 3.1.1 to 3.2.2.
Sourced from oauthlib's releases.
3.2.2
OAuth2.0 Provider:
- CVE-2022-36087
3.2.1
In short
OAuth2.0 Provider:
- #803 : Metadata endpoint support of non-HTTPS
OAuth1.0:
- #818 : Allow IPv6 being parsed by signature
General:
- Improved and fixed documentation warnings.
- Cosmetic changes based on isort
What's Changed
- add missing slots to TokenBase by
@ariebovenberg
in oauthlib/oauthlib#804- Add CORS support for Refresh Token Grant. by
@luhn
in oauthlib/oauthlib#806- GitHub Action to lint Python code by
@cclauss
in oauthlib/oauthlib#797- Docs: fix Sphinx warnings for better ReadTheDocs generation by
@JonathanHuot
in oauthlib/oauthlib#807- Allow non-HTTPS issuer when OAUTHLIB_INSECURE_TRANSPORT. by
@luhn
in oauthlib/oauthlib#803- chore: fix typo in test by
@tamanobi
in oauthlib/oauthlib#816- Fix typo in server.rst by
@NemanjaT
in oauthlib/oauthlib#819- Fixed isort imports by
@dasm
in oauthlib/oauthlib#820- docs: Fix a few typos by
@timgates42
in oauthlib/oauthlib#822- docs: fix typos by
@kianmeng
in oauthlib/oauthlib#823New Contributors
@ariebovenberg
made their first contribution in oauthlib/oauthlib#804@tamanobi
made their first contribution in oauthlib/oauthlib#816@NemanjaT
made their first contribution in oauthlib/oauthlib#819@kianmeng
made their first contribution in oauthlib/oauthlib#823Full Changelog: https://github.com/oauthlib/oauthlib/compare/v3.2.0...v3.2.1
3.2.0
Changelog
OAuth2.0 Client:
- #795: Add Device Authorization Flow for Web Application
- #786: Add PKCE support for Client
- #783: Fallback to none in case of wrong expires_at format.
OAuth2.0 Provider:
- #790: Add support for CORS to metadata endpoint.
- #791: Add support for CORS to token endpoint.
- #787: Remove comma after Bearer in WWW-Authenticate
OAuth2.0 Provider - OIDC:
- #755: Call save_token in Hybrid code flow
... (truncated)
Sourced from oauthlib's changelog.
3.2.2 (2022-10-17)
OAuth2.0 Provider:
- CVE-2022-36087
3.2.1 (2022-09-09)
OAuth2.0 Provider:
- #803: Metadata endpoint support of non-HTTPS
OAuth1.0:
- #818: Allow IPv6 being parsed by signature
General:
- Improved and fixed documentation warnings.
- Cosmetic changes based on isort
3.2.0 (2022-01-29)
OAuth2.0 Client:
- #795: Add Device Authorization Flow for Web Application
- #786: Add PKCE support for Client
- #783: Fallback to none in case of wrong expires_at format.
OAuth2.0 Provider:
- #790: Add support for CORS to metadata endpoint.
- #791: Add support for CORS to token endpoint.
- #787: Remove comma after Bearer in WWW-Authenticate
OAuth2.0 Provider - OIDC:
- #755: Call save_token in Hybrid code flow
- #751: OIDC add support of refreshing ID Tokens with
refresh_id_token
- #751: The RefreshTokenGrant modifiers now take the same arguments as the AuthorizationCodeGrant modifiers (
token
,token_handler
,request
).General:
- Added Python 3.9, 3.10, 3.11
- Improve Travis & Coverage
e6c33e4
Add 3.2.2 version4a4d65f
Merge pull request #832 from oauthlib/3.2.188bb156
Updated date and authors2e40b41
Merge pull request from GHSA-3pgj-pg6c-r5p71a45d97
Prepare 3.2.1 releaseb4bdd09
Merge pull request #818 from dasm/master5d85c61
Fix IPV6 regex used to check redirect_urie514826
Add check of performance of ipv6 check0adbbe1
docs: fix typos6569ec3
docs: Fix a few typosDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase
.
data-lineage data-governance python postgresql jupyter