Skip to main content
Glama

propublica-mcp

azure.py•4.11 kB
"""Azure Key Vault settings source.""" from __future__ import annotations as _annotations from collections.abc import Iterator, Mapping from typing import TYPE_CHECKING, Optional from pydantic.fields import FieldInfo from .env import EnvSettingsSource if TYPE_CHECKING: from azure.core.credentials import TokenCredential from azure.core.exceptions import ResourceNotFoundError from azure.keyvault.secrets import SecretClient from pydantic_settings.main import BaseSettings else: TokenCredential = None ResourceNotFoundError = None SecretClient = None def import_azure_key_vault() -> None: global TokenCredential global SecretClient global ResourceNotFoundError try: from azure.core.credentials import TokenCredential from azure.core.exceptions import ResourceNotFoundError from azure.keyvault.secrets import SecretClient except ImportError as e: # pragma: no cover raise ImportError( 'Azure Key Vault dependencies are not installed, run `pip install pydantic-settings[azure-key-vault]`' ) from e class AzureKeyVaultMapping(Mapping[str, Optional[str]]): _loaded_secrets: dict[str, str | None] _secret_client: SecretClient _secret_names: list[str] def __init__( self, secret_client: SecretClient, case_sensitive: bool, ) -> None: self._loaded_secrets = {} self._secret_client = secret_client self._case_sensitive = case_sensitive self._secret_map: dict[str, str] = self._load_remote() def _load_remote(self) -> dict[str, str]: secret_names: Iterator[str] = ( secret.name for secret in self._secret_client.list_properties_of_secrets() if secret.name and secret.enabled ) if self._case_sensitive: return {name: name for name in secret_names} return {name.lower(): name for name in secret_names} def __getitem__(self, key: str) -> str | None: if not self._case_sensitive: key = key.lower() if key not in self._loaded_secrets and key in self._secret_map: self._loaded_secrets[key] = self._secret_client.get_secret(self._secret_map[key]).value return self._loaded_secrets[key] def __len__(self) -> int: return len(self._secret_map) def __iter__(self) -> Iterator[str]: return iter(self._secret_map.keys()) class AzureKeyVaultSettingsSource(EnvSettingsSource): _url: str _credential: TokenCredential def __init__( self, settings_cls: type[BaseSettings], url: str, credential: TokenCredential, dash_to_underscore: bool = False, case_sensitive: bool | None = None, env_prefix: str | None = None, env_parse_none_str: str | None = None, env_parse_enums: bool | None = None, ) -> None: import_azure_key_vault() self._url = url self._credential = credential self._dash_to_underscore = dash_to_underscore super().__init__( settings_cls, case_sensitive=case_sensitive, env_prefix=env_prefix, env_nested_delimiter='--', env_ignore_empty=False, env_parse_none_str=env_parse_none_str, env_parse_enums=env_parse_enums, ) def _load_env_vars(self) -> Mapping[str, Optional[str]]: secret_client = SecretClient(vault_url=self._url, credential=self._credential) return AzureKeyVaultMapping(secret_client, self.case_sensitive) def _extract_field_info(self, field: FieldInfo, field_name: str) -> list[tuple[str, str, bool]]: if self._dash_to_underscore: return list((x[0], x[1].replace('_', '-'), x[2]) for x in super()._extract_field_info(field, field_name)) return super()._extract_field_info(field, field_name) def __repr__(self) -> str: return f'{self.__class__.__name__}(url={self._url!r}, env_nested_delimiter={self.env_nested_delimiter!r})' __all__ = ['AzureKeyVaultMapping', 'AzureKeyVaultSettingsSource']

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/asachs01/propublica-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server