Quick and easy AI components to build Kotaemon - applicable in client project.
pip install kotaemon@git+ssh://[email protected]/Cinnamon/kotaemon.git
-
Create conda environment (suggest 3.10)
conda create -n kotaemon python=3.10 conda activate kotaemon
-
Clone the repo
git clone [email protected]:Cinnamon/kotaemon.git
-
Pre-commit
pre-commit install
-
Install all
cd kotaemon/libs/kotaemon pip install -e ".[dev]"
-
Test
pytest tests
This repo uses git-secret to share credentials, which
internally uses gpg
to encrypt and decrypt secret files.
This repo uses python-dotenv
to manage credentials stored as environment variable.
Please note that the use of python-dotenv
and credentials are for development
purposes only. Thus, it should not be used in the main source code (i.e. kotaemon/
and tests/
), but can be used in examples/
.
Please follow the official guide to install git-secret.
For Windows users, see For Windows users.
For users who don't have sudo privilege to install packages, follow the Manual Installation
in the official guide and set PREFIX
to a path that you have access to. And please don't forget to add PREFIX
to your PATH
.
In order to gain access to the secret files, you must provide your gpg public file to anyone who has access and ask them to ask your key to the keyring. For a quick tutorial on generating your gpg key pair, you can refer to the Using gpg
section from the git-secret main page.
The credentials are encrypted in the .env.secret
file. To print the decrypted content to stdout, run
git-secret cat [filename]
Or to get the decrypted .env
file, run
git-secret reveal [filename]
git-secret is currently not available for Windows, thus the easiest way is to use it in WSL (please use the latest version of WSL2). From there you have 2 options:
-
Using the gpg of WSL.
This is the most straight-forward option since you would use WSL just like any other unix environment. However, the downside is that you have to make WSL your main environment, which means WSL must have write permission on your repo. To achieve this, you must either:
-
Clone and store your repo inside WSL's file system.
-
Provide WSL with necessary permission on your Windows file system. This can be achieve by setting
automount
options for WSL. To do that, add these content to/etc/wsl.conf
and then restart your sub-system.[automount] options = "metadata,umask=022,fmask=011"
This enables all permissions for user owner.
-
-
Using the gpg of Windows but with git-secret from WSL.
For those who use Windows as the main environment, having to switch back and forth between Windows and WSL will be inconvenient. You can instead stay within your Windows environment and apply some tricks to use
git-secret
from WSL.-
Install and setup
gpg
on Windows. -
Install
git-secret
on WSL. Now in Windows, you can invokegit-secret
usingwsl git-secret
. -
Alternatively you can setup alias in CMD to shorten the syntax. Please refer to this SO answer for the instruction. Some recommended aliases are:
@echo off :: Commands DOSKEY ls=dir /B $* DOSKEY ll=dir /a $* DOSKEY git-secret=wsl git-secret $* DOSKEY gs=wsl git-secret $*
Now you can invoke
git-secret
in CMD usinggit-secret
orgs
.- For Powershell users, similar behaviours can be achieved using
Set-Alias
andprofile.ps1
. Please refer this SO thread as an example.
- For Powershell users, similar behaviours can be achieved using
-
- documents: define document
- loaders