airbyte-cdk 6.33.5__py3-none-any.whl → 6.33.7__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -21,6 +21,7 @@ from airbyte_cdk.sources.declarative.requesters.request_option import (
21
21
  )
22
22
  from airbyte_cdk.sources.message import MessageRepository
23
23
  from airbyte_cdk.sources.types import Config, Record, StreamSlice, StreamState
24
+ from airbyte_cdk.utils.mapping_helpers import _validate_component_request_option_paths
24
25
 
25
26
 
26
27
  @dataclass
@@ -122,6 +123,10 @@ class DatetimeBasedCursor(DeclarativeCursor):
122
123
  if not self.cursor_datetime_formats:
123
124
  self.cursor_datetime_formats = [self.datetime_format]
124
125
 
126
+ _validate_component_request_option_paths(
127
+ self.config, self.start_time_option, self.end_time_option
128
+ )
129
+
125
130
  def get_stream_state(self) -> StreamState:
126
131
  return {self.cursor_field.eval(self.config): self._cursor} if self._cursor else {} # type: ignore # cursor_field is converted to an InterpolatedString in __post_init__
127
132
 
@@ -23,6 +23,9 @@ from airbyte_cdk.sources.declarative.requesters.request_option import (
23
23
  )
24
24
  from airbyte_cdk.sources.declarative.requesters.request_path import RequestPath
25
25
  from airbyte_cdk.sources.types import Config, Record, StreamSlice, StreamState
26
+ from airbyte_cdk.utils.mapping_helpers import (
27
+ _validate_component_request_option_paths,
28
+ )
26
29
 
27
30
 
28
31
  @dataclass
@@ -113,6 +116,13 @@ class DefaultPaginator(Paginator):
113
116
  if isinstance(self.url_base, str):
114
117
  self.url_base = InterpolatedString(string=self.url_base, parameters=parameters)
115
118
 
119
+ if self.page_token_option and not isinstance(self.page_token_option, RequestPath):
120
+ _validate_component_request_option_paths(
121
+ self.config,
122
+ self.page_size_option,
123
+ self.page_token_option,
124
+ )
125
+
116
126
  def get_initial_token(self) -> Optional[Any]:
117
127
  """
118
128
  Return the page token that should be used for the first request of a stream
@@ -11,6 +11,7 @@ from pydantic.v1 import AnyUrl, BaseModel, Field
11
11
 
12
12
  from airbyte_cdk import OneOfOptionConfig
13
13
  from airbyte_cdk.sources.file_based.config.file_based_stream_config import FileBasedStreamConfig
14
+ from airbyte_cdk.sources.specs.transfer_modes import DeliverPermissions
14
15
  from airbyte_cdk.sources.utils import schema_helpers
15
16
 
16
17
 
@@ -65,7 +66,7 @@ class AbstractFileBasedSpec(BaseModel):
65
66
  order=10,
66
67
  )
67
68
 
68
- delivery_method: Union[DeliverRecords, DeliverRawFiles] = Field(
69
+ delivery_method: Union[DeliverRecords, DeliverRawFiles, DeliverPermissions] = Field(
69
70
  title="Delivery Method",
70
71
  discriminator="delivery_type",
71
72
  type="object",
@@ -0,0 +1,81 @@
1
+ #
2
+ # Copyright (c) 2025 Airbyte, Inc., all rights reserved.
3
+ #
4
+
5
+ from airbyte_cdk.sources.file_based.config.abstract_file_based_spec import (
6
+ AbstractFileBasedSpec,
7
+ DeliverRawFiles,
8
+ )
9
+ from airbyte_cdk.sources.specs.transfer_modes import DeliverPermissions
10
+
11
+ DELIVERY_TYPE_KEY = "delivery_type"
12
+ DELIVERY_TYPE_PERMISSION_TRANSFER_MODE_VALUE = "use_permissions_transfer"
13
+ DELIVERY_TYPE_FILES_TRANSFER_MODE_VALUE = "use_file_transfer"
14
+ PRESERVE_DIRECTORY_STRUCTURE_KEY = "preserve_directory_structure"
15
+ INCLUDE_IDENTITIES_STREAM_KEY = "include_identities_stream"
16
+
17
+
18
+ def use_file_transfer(parsed_config: AbstractFileBasedSpec) -> bool:
19
+ """Returns `True` if the configuration uses file transfer mode."""
20
+ return (
21
+ hasattr(parsed_config.delivery_method, DELIVERY_TYPE_KEY)
22
+ and parsed_config.delivery_method.delivery_type == DELIVERY_TYPE_FILES_TRANSFER_MODE_VALUE
23
+ )
24
+
25
+
26
+ def preserve_directory_structure(parsed_config: AbstractFileBasedSpec) -> bool:
27
+ """
28
+ Determines whether to preserve directory structure during file transfer.
29
+
30
+ When enabled, files maintain their subdirectory paths in the destination.
31
+ When disabled, files are flattened to the root of the destination.
32
+
33
+ Args:
34
+ parsed_config: The parsed configuration containing delivery method settings
35
+
36
+ Returns:
37
+ True if directory structure should be preserved (default), False otherwise
38
+ """
39
+ if (
40
+ use_file_transfer(parsed_config)
41
+ and hasattr(parsed_config.delivery_method, PRESERVE_DIRECTORY_STRUCTURE_KEY)
42
+ and isinstance(parsed_config.delivery_method, DeliverRawFiles)
43
+ ):
44
+ return parsed_config.delivery_method.preserve_directory_structure
45
+ return True
46
+
47
+
48
+ def use_permissions_transfer(parsed_config: AbstractFileBasedSpec) -> bool:
49
+ """
50
+ Determines whether to use permissions transfer to sync ACLs and Identities
51
+
52
+ Args:
53
+ parsed_config: The parsed configuration containing delivery method settings
54
+
55
+ Returns:
56
+ True if permissions transfer should be enabled, False otherwise
57
+ """
58
+ return (
59
+ hasattr(parsed_config.delivery_method, DELIVERY_TYPE_KEY)
60
+ and parsed_config.delivery_method.delivery_type
61
+ == DELIVERY_TYPE_PERMISSION_TRANSFER_MODE_VALUE
62
+ )
63
+
64
+
65
+ def include_identities_stream(parsed_config: AbstractFileBasedSpec) -> bool:
66
+ """
67
+ There are scenarios where user may not have access to identities but still is valuable to get ACLs
68
+
69
+ Args:
70
+ parsed_config: The parsed configuration containing delivery method settings
71
+
72
+ Returns:
73
+ True if we should include Identities stream.
74
+ """
75
+ if (
76
+ use_permissions_transfer(parsed_config)
77
+ and hasattr(parsed_config.delivery_method, INCLUDE_IDENTITIES_STREAM_KEY)
78
+ and isinstance(parsed_config.delivery_method, DeliverPermissions)
79
+ ):
80
+ return parsed_config.delivery_method.include_identities_stream
81
+ return False
@@ -33,6 +33,12 @@ from airbyte_cdk.sources.file_based.config.file_based_stream_config import (
33
33
  FileBasedStreamConfig,
34
34
  ValidationPolicy,
35
35
  )
36
+ from airbyte_cdk.sources.file_based.config.validate_config_transfer_modes import (
37
+ include_identities_stream,
38
+ preserve_directory_structure,
39
+ use_file_transfer,
40
+ use_permissions_transfer,
41
+ )
36
42
  from airbyte_cdk.sources.file_based.discovery_policy import (
37
43
  AbstractDiscoveryPolicy,
38
44
  DefaultDiscoveryPolicy,
@@ -49,7 +55,12 @@ from airbyte_cdk.sources.file_based.schema_validation_policies import (
49
55
  DEFAULT_SCHEMA_VALIDATION_POLICIES,
50
56
  AbstractSchemaValidationPolicy,
51
57
  )
52
- from airbyte_cdk.sources.file_based.stream import AbstractFileBasedStream, DefaultFileBasedStream
58
+ from airbyte_cdk.sources.file_based.stream import (
59
+ AbstractFileBasedStream,
60
+ DefaultFileBasedStream,
61
+ FileIdentitiesStream,
62
+ PermissionsFileBasedStream,
63
+ )
53
64
  from airbyte_cdk.sources.file_based.stream.concurrent.adapters import FileBasedStreamFacade
54
65
  from airbyte_cdk.sources.file_based.stream.concurrent.cursor import (
55
66
  AbstractConcurrentFileBasedCursor,
@@ -66,6 +77,7 @@ from airbyte_cdk.utils.traced_exception import AirbyteTracedException
66
77
  DEFAULT_CONCURRENCY = 100
67
78
  MAX_CONCURRENCY = 100
68
79
  INITIAL_N_PARTITIONS = MAX_CONCURRENCY // 2
80
+ IDENTITIES_STREAM = "identities"
69
81
 
70
82
 
71
83
  class FileBasedSource(ConcurrentSourceAdapter, ABC):
@@ -157,13 +169,20 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
157
169
  errors = []
158
170
  tracebacks = []
159
171
  for stream in streams:
172
+ if isinstance(stream, FileIdentitiesStream):
173
+ identity = next(iter(stream.load_identity_groups()))
174
+ if not identity:
175
+ errors.append(
176
+ "Unable to get identities for current configuration, please check your credentials"
177
+ )
178
+ continue
160
179
  if not isinstance(stream, AbstractFileBasedStream):
161
180
  raise ValueError(f"Stream {stream} is not a file-based stream.")
162
181
  try:
163
182
  parsed_config = self._get_parsed_config(config)
164
183
  availability_method = (
165
184
  stream.availability_strategy.check_availability
166
- if self._use_file_transfer(parsed_config)
185
+ if use_file_transfer(parsed_config) or use_permissions_transfer(parsed_config)
167
186
  else stream.availability_strategy.check_availability_and_parsability
168
187
  )
169
188
  (
@@ -239,7 +258,7 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
239
258
  message_repository=self.message_repository,
240
259
  )
241
260
  stream = FileBasedStreamFacade.create_from_stream(
242
- stream=self._make_default_stream(
261
+ stream=self._make_file_based_stream(
243
262
  stream_config=stream_config,
244
263
  cursor=cursor,
245
264
  parsed_config=parsed_config,
@@ -270,7 +289,7 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
270
289
  CursorField(DefaultFileBasedStream.ab_last_mod_col),
271
290
  )
272
291
  stream = FileBasedStreamFacade.create_from_stream(
273
- stream=self._make_default_stream(
292
+ stream=self._make_file_based_stream(
274
293
  stream_config=stream_config,
275
294
  cursor=cursor,
276
295
  parsed_config=parsed_config,
@@ -282,13 +301,17 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
282
301
  )
283
302
  else:
284
303
  cursor = self.cursor_cls(stream_config)
285
- stream = self._make_default_stream(
304
+ stream = self._make_file_based_stream(
286
305
  stream_config=stream_config,
287
306
  cursor=cursor,
288
307
  parsed_config=parsed_config,
289
308
  )
290
309
 
291
310
  streams.append(stream)
311
+
312
+ if include_identities_stream(parsed_config):
313
+ identities_stream = self._make_identities_stream()
314
+ streams.append(identities_stream)
292
315
  return streams
293
316
 
294
317
  except ValidationError as exc:
@@ -310,8 +333,48 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
310
333
  validation_policy=self._validate_and_get_validation_policy(stream_config),
311
334
  errors_collector=self.errors_collector,
312
335
  cursor=cursor,
313
- use_file_transfer=self._use_file_transfer(parsed_config),
314
- preserve_directory_structure=self._preserve_directory_structure(parsed_config),
336
+ use_file_transfer=use_file_transfer(parsed_config),
337
+ preserve_directory_structure=preserve_directory_structure(parsed_config),
338
+ )
339
+
340
+ def _make_permissions_stream(
341
+ self, stream_config: FileBasedStreamConfig, cursor: Optional[AbstractFileBasedCursor]
342
+ ) -> AbstractFileBasedStream:
343
+ return PermissionsFileBasedStream(
344
+ config=stream_config,
345
+ catalog_schema=self.stream_schemas.get(stream_config.name),
346
+ stream_reader=self.stream_reader,
347
+ availability_strategy=self.availability_strategy,
348
+ discovery_policy=self.discovery_policy,
349
+ parsers=self.parsers,
350
+ validation_policy=self._validate_and_get_validation_policy(stream_config),
351
+ errors_collector=self.errors_collector,
352
+ cursor=cursor,
353
+ )
354
+
355
+ def _make_file_based_stream(
356
+ self,
357
+ stream_config: FileBasedStreamConfig,
358
+ cursor: Optional[AbstractFileBasedCursor],
359
+ parsed_config: AbstractFileBasedSpec,
360
+ ) -> AbstractFileBasedStream:
361
+ """
362
+ Creates different streams depending on the type of the transfer mode selected
363
+ """
364
+ if use_permissions_transfer(parsed_config):
365
+ return self._make_permissions_stream(stream_config, cursor)
366
+ # we should have a stream for File transfer mode to decouple from DefaultFileBasedStream
367
+ else:
368
+ return self._make_default_stream(stream_config, cursor, parsed_config)
369
+
370
+ def _make_identities_stream(
371
+ self,
372
+ ) -> Stream:
373
+ return FileIdentitiesStream(
374
+ catalog_schema=self.stream_schemas.get(FileIdentitiesStream.IDENTITIES_STREAM_NAME),
375
+ stream_reader=self.stream_reader,
376
+ discovery_policy=self.discovery_policy,
377
+ errors_collector=self.errors_collector,
315
378
  )
316
379
 
317
380
  def _get_stream_from_catalog(
@@ -378,33 +441,3 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
378
441
  "`input_schema` and `schemaless` options cannot both be set",
379
442
  model=FileBasedStreamConfig,
380
443
  )
381
-
382
- @staticmethod
383
- def _use_file_transfer(parsed_config: AbstractFileBasedSpec) -> bool:
384
- use_file_transfer = (
385
- hasattr(parsed_config.delivery_method, "delivery_type")
386
- and parsed_config.delivery_method.delivery_type == "use_file_transfer"
387
- )
388
- return use_file_transfer
389
-
390
- @staticmethod
391
- def _preserve_directory_structure(parsed_config: AbstractFileBasedSpec) -> bool:
392
- """
393
- Determines whether to preserve directory structure during file transfer.
394
-
395
- When enabled, files maintain their subdirectory paths in the destination.
396
- When disabled, files are flattened to the root of the destination.
397
-
398
- Args:
399
- parsed_config: The parsed configuration containing delivery method settings
400
-
401
- Returns:
402
- True if directory structure should be preserved (default), False otherwise
403
- """
404
- if (
405
- FileBasedSource._use_file_transfer(parsed_config)
406
- and hasattr(parsed_config.delivery_method, "preserve_directory_structure")
407
- and parsed_config.delivery_method.preserve_directory_structure is not None
408
- ):
409
- return parsed_config.delivery_method.preserve_directory_structure
410
- return True
@@ -13,6 +13,11 @@ from typing import Any, Dict, Iterable, List, Optional, Set
13
13
  from wcmatch.glob import GLOBSTAR, globmatch
14
14
 
15
15
  from airbyte_cdk.sources.file_based.config.abstract_file_based_spec import AbstractFileBasedSpec
16
+ from airbyte_cdk.sources.file_based.config.validate_config_transfer_modes import (
17
+ include_identities_stream,
18
+ preserve_directory_structure,
19
+ use_file_transfer,
20
+ )
16
21
  from airbyte_cdk.sources.file_based.remote_file import RemoteFile
17
22
 
18
23
 
@@ -128,24 +133,20 @@ class AbstractFileBasedStreamReader(ABC):
128
133
 
129
134
  def use_file_transfer(self) -> bool:
130
135
  if self.config:
131
- use_file_transfer = (
132
- hasattr(self.config.delivery_method, "delivery_type")
133
- and self.config.delivery_method.delivery_type == "use_file_transfer"
134
- )
135
- return use_file_transfer
136
+ return use_file_transfer(self.config)
136
137
  return False
137
138
 
138
139
  def preserve_directory_structure(self) -> bool:
139
140
  # fall back to preserve subdirectories if config is not present or incomplete
140
- if (
141
- self.use_file_transfer()
142
- and self.config
143
- and hasattr(self.config.delivery_method, "preserve_directory_structure")
144
- and self.config.delivery_method.preserve_directory_structure is not None
145
- ):
146
- return self.config.delivery_method.preserve_directory_structure
141
+ if self.config:
142
+ return preserve_directory_structure(self.config)
147
143
  return True
148
144
 
145
+ def include_identities_stream(self) -> bool:
146
+ if self.config:
147
+ return include_identities_stream(self.config)
148
+ return False
149
+
149
150
  @abstractmethod
150
151
  def get_file(
151
152
  self, file: RemoteFile, local_directory: str, logger: logging.Logger
@@ -183,3 +184,97 @@ class AbstractFileBasedStreamReader(ABC):
183
184
  makedirs(path.dirname(local_file_path), exist_ok=True)
184
185
  absolute_file_path = path.abspath(local_file_path)
185
186
  return [file_relative_path, local_file_path, absolute_file_path]
187
+
188
+ @abstractmethod
189
+ def get_file_acl_permissions(self, file: RemoteFile, logger: logging.Logger) -> Dict[str, Any]:
190
+ """
191
+ This function should return the allow list for a given file, i.e. the list of all identities and their permission levels associated with it
192
+
193
+ e.g.
194
+ def get_file_acl_permissions(self, file: RemoteFile, logger: logging.Logger):
195
+ api_conn = some_api.conn(credentials=SOME_CREDENTIALS)
196
+ result = api_conn.get_file_permissions_info(file.id)
197
+ return MyPermissionsModel(
198
+ id=result["id"],
199
+ access_control_list = result["access_control_list"],
200
+ is_public = result["is_public"],
201
+ ).dict()
202
+ """
203
+ raise NotImplementedError(
204
+ f"{self.__class__.__name__} does not implement get_file_acl_permissions(). To support ACL permissions, implement this method and update file_permissions_schema."
205
+ )
206
+
207
+ @abstractmethod
208
+ def load_identity_groups(self, logger: logging.Logger) -> Iterable[Dict[str, Any]]:
209
+ """
210
+ This function should return the Identities in a determined "space" or "domain" where the file metadata (ACLs) are fetched and ACLs items (Identities) exists.
211
+
212
+ e.g.
213
+ def load_identity_groups(self, logger: logging.Logger) -> Dict[str, Any]:
214
+ api_conn = some_api.conn(credentials=SOME_CREDENTIALS)
215
+ users_api = api_conn.users()
216
+ groups_api = api_conn.groups()
217
+ members_api = self.google_directory_service.members()
218
+ for user in users_api.list():
219
+ yield my_identity_model(id=user.id, name=user.name, email_address=user.email, type="user").dict()
220
+ for group in groups_api.list():
221
+ group_obj = my_identity_model(id=group.id, name=groups.name, email_address=user.email, type="group").dict()
222
+ for member in members_api.list(group=group):
223
+ group_obj.member_email_addresses = group_obj.member_email_addresses or []
224
+ group_obj.member_email_addresses.append(member.email)
225
+ yield group_obj.dict()
226
+ """
227
+ raise NotImplementedError(
228
+ f"{self.__class__.__name__} does not implement load_identity_groups(). To support identities, implement this method and update identities_schema."
229
+ )
230
+
231
+ @property
232
+ @abstractmethod
233
+ def file_permissions_schema(self) -> Dict[str, Any]:
234
+ """
235
+ This function should return the permissions schema for file permissions stream.
236
+
237
+ e.g.
238
+ def file_permissions_schema(self) -> Dict[str, Any]:
239
+ # you can also follow the patter we have for python connectors and have a json file and read from there e.g. schemas/identities.json
240
+ return {
241
+ "type": "object",
242
+ "properties": {
243
+ "id": { "type": "string" },
244
+ "file_path": { "type": "string" },
245
+ "access_control_list": {
246
+ "type": "array",
247
+ "items": { "type": "string" }
248
+ },
249
+ "publicly_accessible": { "type": "boolean" }
250
+ }
251
+ }
252
+ """
253
+ raise NotImplementedError(
254
+ f"{self.__class__.__name__} does not implement file_permissions_schema, please return json schema for your permissions streams."
255
+ )
256
+
257
+ @property
258
+ @abstractmethod
259
+ def identities_schema(self) -> Dict[str, Any]:
260
+ """
261
+ This function should return the identities schema for file identity stream.
262
+
263
+ e.g.
264
+ def identities_schema(self) -> Dict[str, Any]:
265
+ # you can also follow the patter we have for python connectors and have a json file and read from there e.g. schemas/identities.json
266
+ return {
267
+ "type": "object",
268
+ "properties": {
269
+ "id": { "type": "string" },
270
+ "remote_id": { "type": "string" },
271
+ "name": { "type": ["null", "string"] },
272
+ "email_address": { "type": ["null", "string"] },
273
+ "member_email_addresses": { "type": ["null", "array"] },
274
+ "type": { "type": "string" },
275
+ }
276
+ }
277
+ """
278
+ raise NotImplementedError(
279
+ f"{self.__class__.__name__} does not implement identities_schema, please return json schema for your identities stream."
280
+ )
@@ -1,4 +1,13 @@
1
1
  from airbyte_cdk.sources.file_based.stream.abstract_file_based_stream import AbstractFileBasedStream
2
2
  from airbyte_cdk.sources.file_based.stream.default_file_based_stream import DefaultFileBasedStream
3
+ from airbyte_cdk.sources.file_based.stream.identities_stream import FileIdentitiesStream
4
+ from airbyte_cdk.sources.file_based.stream.permissions_file_based_stream import (
5
+ PermissionsFileBasedStream,
6
+ )
3
7
 
4
- __all__ = ["AbstractFileBasedStream", "DefaultFileBasedStream"]
8
+ __all__ = [
9
+ "AbstractFileBasedStream",
10
+ "DefaultFileBasedStream",
11
+ "FileIdentitiesStream",
12
+ "PermissionsFileBasedStream",
13
+ ]
@@ -0,0 +1,47 @@
1
+ #
2
+ # Copyright (c) 2024 Airbyte, Inc., all rights reserved.
3
+ #
4
+
5
+ from functools import cache
6
+ from typing import Any, Dict, Iterable, Mapping, MutableMapping, Optional
7
+
8
+ from airbyte_cdk.sources.file_based.config.file_based_stream_config import PrimaryKeyType
9
+ from airbyte_cdk.sources.file_based.discovery_policy import AbstractDiscoveryPolicy
10
+ from airbyte_cdk.sources.file_based.exceptions import FileBasedErrorsCollector
11
+ from airbyte_cdk.sources.file_based.file_based_stream_reader import AbstractFileBasedStreamReader
12
+ from airbyte_cdk.sources.streams.core import JsonSchema
13
+ from airbyte_cdk.sources.streams.permissions.identities_stream import IdentitiesStream
14
+
15
+
16
+ class FileIdentitiesStream(IdentitiesStream):
17
+ """
18
+ The identities stream. A full refresh stream to sync identities from a certain domain.
19
+ The stream reader manage the logic to get such data, which is implemented on connector side.
20
+ """
21
+
22
+ is_resumable = False
23
+
24
+ def __init__(
25
+ self,
26
+ catalog_schema: Optional[Mapping[str, Any]],
27
+ stream_reader: AbstractFileBasedStreamReader,
28
+ discovery_policy: AbstractDiscoveryPolicy,
29
+ errors_collector: FileBasedErrorsCollector,
30
+ ) -> None:
31
+ super().__init__()
32
+ self.catalog_schema = catalog_schema
33
+ self.stream_reader = stream_reader
34
+ self._discovery_policy = discovery_policy
35
+ self.errors_collector = errors_collector
36
+ self._cursor: MutableMapping[str, Any] = {}
37
+
38
+ @property
39
+ def primary_key(self) -> PrimaryKeyType:
40
+ return None
41
+
42
+ def load_identity_groups(self) -> Iterable[Dict[str, Any]]:
43
+ return self.stream_reader.load_identity_groups(logger=self.logger)
44
+
45
+ @cache
46
+ def get_json_schema(self) -> JsonSchema:
47
+ return self.stream_reader.identities_schema
@@ -0,0 +1,85 @@
1
+ #
2
+ # Copyright (c) 2025 Airbyte, Inc., all rights reserved.
3
+ #
4
+
5
+ import traceback
6
+ from typing import Any, Dict, Iterable
7
+
8
+ from airbyte_cdk.models import AirbyteLogMessage, AirbyteMessage, Level
9
+ from airbyte_cdk.models import Type as MessageType
10
+ from airbyte_cdk.sources.file_based.stream import DefaultFileBasedStream
11
+ from airbyte_cdk.sources.file_based.types import StreamSlice
12
+ from airbyte_cdk.sources.streams.core import JsonSchema
13
+ from airbyte_cdk.sources.utils.record_helper import stream_data_to_airbyte_message
14
+
15
+
16
+ class PermissionsFileBasedStream(DefaultFileBasedStream):
17
+ """
18
+ A specialized stream for handling file-based ACL permissions.
19
+
20
+ This stream works with the stream_reader to:
21
+ 1. Fetch ACL permissions for each file in the source
22
+ 2. Transform permissions into a standardized format
23
+ 3. Generate records containing permission information
24
+
25
+ The stream_reader is responsible for the actual implementation of permission retrieval
26
+ and schema definition, while this class handles the streaming interface.
27
+ """
28
+
29
+ def _filter_schema_invalid_properties(
30
+ self, configured_catalog_json_schema: Dict[str, Any]
31
+ ) -> Dict[str, Any]:
32
+ return self.stream_reader.file_permissions_schema
33
+
34
+ def read_records_from_slice(self, stream_slice: StreamSlice) -> Iterable[AirbyteMessage]:
35
+ """
36
+ Yield permissions records from all remote files
37
+ """
38
+
39
+ for file in stream_slice["files"]:
40
+ no_permissions = False
41
+ file_datetime_string = file.last_modified.strftime(self.DATE_TIME_FORMAT)
42
+ try:
43
+ permissions_record = self.stream_reader.get_file_acl_permissions(
44
+ file, logger=self.logger
45
+ )
46
+ if not permissions_record:
47
+ no_permissions = True
48
+ self.logger.warning(
49
+ f"Unable to fetch permissions. stream={self.name} file={file.uri}"
50
+ )
51
+ continue
52
+ permissions_record = self.transform_record(
53
+ permissions_record, file, file_datetime_string
54
+ )
55
+ yield stream_data_to_airbyte_message(
56
+ self.name, permissions_record, is_file_transfer_message=False
57
+ )
58
+ except Exception as e:
59
+ self.logger.error(f"Failed to retrieve permissions for file {file.uri}: {str(e)}")
60
+ yield AirbyteMessage(
61
+ type=MessageType.LOG,
62
+ log=AirbyteLogMessage(
63
+ level=Level.ERROR,
64
+ message=f"Error retrieving files permissions: stream={self.name} file={file.uri}",
65
+ stack_trace=traceback.format_exc(),
66
+ ),
67
+ )
68
+ finally:
69
+ if no_permissions:
70
+ yield AirbyteMessage(
71
+ type=MessageType.LOG,
72
+ log=AirbyteLogMessage(
73
+ level=Level.WARN,
74
+ message=f"Unable to fetch permissions. stream={self.name} file={file.uri}",
75
+ ),
76
+ )
77
+
78
+ def _get_raw_json_schema(self) -> JsonSchema:
79
+ """
80
+ Retrieve the raw JSON schema for file permissions from the stream reader.
81
+
82
+ Returns:
83
+ The file permissions schema that defines the structure of permission records
84
+ """
85
+ return self.stream_reader.file_permissions_schema
@@ -0,0 +1,26 @@
1
+ #
2
+ # Copyright (c) 2025 Airbyte, Inc., all rights reserved.
3
+ #
4
+
5
+ from typing import Literal
6
+
7
+ from pydantic.v1 import AnyUrl, BaseModel, Field
8
+
9
+ from airbyte_cdk import OneOfOptionConfig
10
+
11
+
12
+ class DeliverPermissions(BaseModel):
13
+ class Config(OneOfOptionConfig):
14
+ title = "Replicate Permissions ACL"
15
+ description = "Sends one identity stream and one for more permissions (ACL) streams to the destination. This data can be used in downstream systems to recreate permission restrictions mirroring the original source."
16
+ discriminator = "delivery_type"
17
+
18
+ delivery_type: Literal["use_permissions_transfer"] = Field(
19
+ "use_permissions_transfer", const=True
20
+ )
21
+
22
+ include_identities_stream: bool = Field(
23
+ title="Include Identity Stream",
24
+ description="This data can be used in downstream systems to recreate permission restrictions mirroring the original source",
25
+ default=True,
26
+ )
@@ -0,0 +1,75 @@
1
+ #
2
+ # Copyright (c) 2024 Airbyte, Inc., all rights reserved.
3
+ #
4
+
5
+ import traceback
6
+ from abc import ABC, abstractmethod
7
+ from typing import Any, Dict, Iterable, List, Mapping, MutableMapping, Optional
8
+
9
+ from airbyte_protocol_dataclasses.models import SyncMode
10
+
11
+ from airbyte_cdk.models import AirbyteLogMessage, AirbyteMessage, Level
12
+ from airbyte_cdk.models import Type as MessageType
13
+ from airbyte_cdk.sources.streams import Stream
14
+ from airbyte_cdk.sources.streams.checkpoint import Cursor
15
+ from airbyte_cdk.sources.utils.record_helper import stream_data_to_airbyte_message
16
+ from airbyte_cdk.utils.traced_exception import AirbyteTracedException
17
+
18
+
19
+ class IdentitiesStream(Stream, ABC):
20
+ """
21
+ The identities stream. A full refresh stream to sync identities from a certain domain.
22
+ The load_identity_groups method manage the logic to get such data.
23
+ """
24
+
25
+ IDENTITIES_STREAM_NAME = "identities"
26
+
27
+ is_resumable = False
28
+
29
+ def __init__(self) -> None:
30
+ super().__init__()
31
+ self._cursor: MutableMapping[str, Any] = {}
32
+
33
+ @property
34
+ def state(self) -> MutableMapping[str, Any]:
35
+ return self._cursor
36
+
37
+ @state.setter
38
+ def state(self, value: MutableMapping[str, Any]) -> None:
39
+ """State setter, accept state serialized by state getter."""
40
+ self._cursor = value
41
+
42
+ def read_records(
43
+ self,
44
+ sync_mode: SyncMode,
45
+ cursor_field: Optional[List[str]] = None,
46
+ stream_slice: Optional[Mapping[str, Any]] = None,
47
+ stream_state: Optional[Mapping[str, Any]] = None,
48
+ ) -> Iterable[Mapping[str, Any] | AirbyteMessage]:
49
+ try:
50
+ identity_groups = self.load_identity_groups()
51
+ for record in identity_groups:
52
+ yield stream_data_to_airbyte_message(self.name, record)
53
+ except AirbyteTracedException as exc:
54
+ # Re-raise the exception to stop the whole sync immediately as this is a fatal error
55
+ raise exc
56
+ except Exception as e:
57
+ yield AirbyteMessage(
58
+ type=MessageType.LOG,
59
+ log=AirbyteLogMessage(
60
+ level=Level.ERROR,
61
+ message=f"Error trying to read identities: {e} stream={self.name}",
62
+ stack_trace=traceback.format_exc(),
63
+ ),
64
+ )
65
+
66
+ @abstractmethod
67
+ def load_identity_groups(self) -> Iterable[Dict[str, Any]]:
68
+ raise NotImplementedError("Implement this method to read identity records")
69
+
70
+ @property
71
+ def name(self) -> str:
72
+ return self.IDENTITIES_STREAM_NAME
73
+
74
+ def get_cursor(self) -> Optional[Cursor]:
75
+ return None
@@ -17,6 +17,7 @@ class SupportedHttpMethods(str, Enum):
17
17
  GET = "get"
18
18
  PATCH = "patch"
19
19
  POST = "post"
20
+ PUT = "put"
20
21
  DELETE = "delete"
21
22
 
22
23
 
@@ -77,7 +78,7 @@ class HttpMocker(contextlib.ContextDecorator):
77
78
  additional_matcher=self._matches_wrapper(matcher),
78
79
  response_list=[
79
80
  {
80
- "text": response.body,
81
+ self._get_body_field(response): response.body,
81
82
  "status_code": response.status_code,
82
83
  "headers": response.headers,
83
84
  }
@@ -85,6 +86,10 @@ class HttpMocker(contextlib.ContextDecorator):
85
86
  ],
86
87
  )
87
88
 
89
+ @staticmethod
90
+ def _get_body_field(response: HttpResponse) -> str:
91
+ return "text" if isinstance(response.body, str) else "content"
92
+
88
93
  def get(self, request: HttpRequest, responses: Union[HttpResponse, List[HttpResponse]]) -> None:
89
94
  self._mock_request_method(SupportedHttpMethods.GET, request, responses)
90
95
 
@@ -98,6 +103,9 @@ class HttpMocker(contextlib.ContextDecorator):
98
103
  ) -> None:
99
104
  self._mock_request_method(SupportedHttpMethods.POST, request, responses)
100
105
 
106
+ def put(self, request: HttpRequest, responses: Union[HttpResponse, List[HttpResponse]]) -> None:
107
+ self._mock_request_method(SupportedHttpMethods.PUT, request, responses)
108
+
101
109
  def delete(
102
110
  self, request: HttpRequest, responses: Union[HttpResponse, List[HttpResponse]]
103
111
  ) -> None:
@@ -1,19 +1,22 @@
1
1
  # Copyright (c) 2023 Airbyte, Inc., all rights reserved.
2
2
 
3
3
  from types import MappingProxyType
4
- from typing import Mapping
4
+ from typing import Mapping, Union
5
5
 
6
6
 
7
7
  class HttpResponse:
8
8
  def __init__(
9
- self, body: str, status_code: int = 200, headers: Mapping[str, str] = MappingProxyType({})
9
+ self,
10
+ body: Union[str, bytes],
11
+ status_code: int = 200,
12
+ headers: Mapping[str, str] = MappingProxyType({}),
10
13
  ):
11
14
  self._body = body
12
15
  self._status_code = status_code
13
16
  self._headers = headers
14
17
 
15
18
  @property
16
- def body(self) -> str:
19
+ def body(self) -> Union[str, bytes]:
17
20
  return self._body
18
21
 
19
22
  @property
@@ -6,6 +6,12 @@
6
6
  import copy
7
7
  from typing import Any, Dict, List, Mapping, Optional, Union
8
8
 
9
+ from airbyte_cdk.sources.declarative.requesters.request_option import (
10
+ RequestOption,
11
+ RequestOptionType,
12
+ )
13
+ from airbyte_cdk.sources.types import Config
14
+
9
15
 
10
16
  def _merge_mappings(
11
17
  target: Dict[str, Any],
@@ -33,13 +39,17 @@ def _merge_mappings(
33
39
  if isinstance(target_value, dict) and isinstance(source_value, dict):
34
40
  # Only body_json supports nested_structures
35
41
  if not allow_same_value_merge:
36
- raise ValueError(f"Duplicate keys found: {'.'.join(current_path)}")
42
+ raise ValueError(
43
+ f"Request body collision, duplicate keys detected at key path: {'.'.join(current_path)}. Please ensure that all keys in the request are unique."
44
+ )
37
45
  # If both are dictionaries, recursively merge them
38
46
  _merge_mappings(target_value, source_value, current_path, allow_same_value_merge)
39
47
 
40
48
  elif not allow_same_value_merge or target_value != source_value:
41
49
  # If same key has different values, that's a conflict
42
- raise ValueError(f"Duplicate keys found: {'.'.join(current_path)}")
50
+ raise ValueError(
51
+ f"Request body collision, duplicate keys detected at key path: {'.'.join(current_path)}. Please ensure that all keys in the request are unique."
52
+ )
43
53
  else:
44
54
  # No conflict, just copy the value (using deepcopy for nested structures)
45
55
  target[key] = copy.deepcopy(source_value)
@@ -102,3 +112,34 @@ def combine_mappings(
102
112
  _merge_mappings(result, mapping, allow_same_value_merge=allow_same_value_merge)
103
113
 
104
114
  return result
115
+
116
+
117
+ def _validate_component_request_option_paths(
118
+ config: Config, *request_options: Optional[RequestOption]
119
+ ) -> None:
120
+ """
121
+ Validates that a component with multiple request options does not have conflicting paths.
122
+ Uses dummy values for validation since actual values might not be available at init time.
123
+ """
124
+ grouped_options: Dict[RequestOptionType, List[RequestOption]] = {}
125
+ for option in request_options:
126
+ if option:
127
+ grouped_options.setdefault(option.inject_into, []).append(option)
128
+
129
+ for inject_type, options in grouped_options.items():
130
+ if len(options) <= 1:
131
+ continue
132
+
133
+ option_dicts: List[Optional[Union[Mapping[str, Any], str]]] = []
134
+ for i, option in enumerate(options):
135
+ option_dict: Dict[str, Any] = {}
136
+ # Use indexed dummy values to ensure we catch conflicts
137
+ option.inject_into_request(option_dict, f"dummy_value_{i}", config)
138
+ option_dicts.append(option_dict)
139
+
140
+ try:
141
+ combine_mappings(
142
+ option_dicts, allow_same_value_merge=(inject_type == RequestOptionType.body_json)
143
+ )
144
+ except ValueError as error:
145
+ raise ValueError(error)
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: airbyte-cdk
3
- Version: 6.33.5
3
+ Version: 6.33.7
4
4
  Summary: A framework for writing Airbyte Connectors.
5
5
  Home-page: https://airbyte.com
6
6
  License: MIT
@@ -93,7 +93,7 @@ airbyte_cdk/sources/declarative/extractors/response_to_file_extractor.py,sha256=
93
93
  airbyte_cdk/sources/declarative/extractors/type_transformer.py,sha256=d6Y2Rfg8pMVEEnHllfVksWZdNVOU55yk34O03dP9muY,1626
94
94
  airbyte_cdk/sources/declarative/incremental/__init__.py,sha256=U1oZKtBaEC6IACmvziY9Wzg7Z8EgF4ZuR7NwvjlB_Sk,1255
95
95
  airbyte_cdk/sources/declarative/incremental/concurrent_partition_cursor.py,sha256=5dbO47TFmC5Oz8TZ8DKXwXeZElz70xy2v2HJlZr5qVs,17751
96
- airbyte_cdk/sources/declarative/incremental/datetime_based_cursor.py,sha256=5Bl_2EeA4as0e3J23Yxp8Q8BXzh0nJ2NcGSgj3V0h2o,21954
96
+ airbyte_cdk/sources/declarative/incremental/datetime_based_cursor.py,sha256=Rbe6lJLTtZ5en33MwZiB9-H9-AwDMNHgwBZs8EqhYqk,22172
97
97
  airbyte_cdk/sources/declarative/incremental/declarative_cursor.py,sha256=5Bhw9VRPyIuCaD0wmmq_L3DZsa-rJgtKSEUzSd8YYD0,536
98
98
  airbyte_cdk/sources/declarative/incremental/global_substream_cursor.py,sha256=9HO-QbL9akvjq2NP7l498RwLA4iQZlBMQW1tZbt34I8,15943
99
99
  airbyte_cdk/sources/declarative/incremental/per_partition_cursor.py,sha256=9IAJTCiRUXvhFFz-IhZtYh_KfAjLHqthsYf2jErQRls,17728
@@ -145,7 +145,7 @@ airbyte_cdk/sources/declarative/requesters/error_handlers/http_response_filter.p
145
145
  airbyte_cdk/sources/declarative/requesters/http_job_repository.py,sha256=3GtOefPH08evlSUxaILkiKLTHbIspFY4qd5B3ZqNE60,10063
146
146
  airbyte_cdk/sources/declarative/requesters/http_requester.py,sha256=Ek5hS60-CYjvEaFD-bI7qA-bPgbOPb9hTbMBU4n5zNs,14994
147
147
  airbyte_cdk/sources/declarative/requesters/paginators/__init__.py,sha256=uArbKs9JKNCt7t9tZoeWwjDpyI1HoPp29FNW0JzvaEM,644
148
- airbyte_cdk/sources/declarative/requesters/paginators/default_paginator.py,sha256=dSm_pKGOZjzvg-X_Vif-MjrnlUG23fCa69bocq8dVIs,11693
148
+ airbyte_cdk/sources/declarative/requesters/paginators/default_paginator.py,sha256=ZW4lwWNAzb4zL0jKc-HjowP5-y0Zg9xi0YlK6tkx_XY,12057
149
149
  airbyte_cdk/sources/declarative/requesters/paginators/no_pagination.py,sha256=j6j9QRPaTbKQ2N661RFVKthhkWiodEp6ut0tKeEd0Ng,2019
150
150
  airbyte_cdk/sources/declarative/requesters/paginators/paginator.py,sha256=OlN-y0PEOMzlUNUh3pzonoTpIJpGwkP4ibFengvpLVU,2230
151
151
  airbyte_cdk/sources/declarative/requesters/paginators/strategies/__init__.py,sha256=2gly8fuZpDNwtu1Qg6oE2jBLGqQRdzSLJdnpk_iDV6I,767
@@ -205,7 +205,7 @@ airbyte_cdk/sources/file_based/availability_strategy/__init__.py,sha256=ddKQfUmk
205
205
  airbyte_cdk/sources/file_based/availability_strategy/abstract_file_based_availability_strategy.py,sha256=01Nd4b7ERAbp-OZo_8rrAzFXWPTMwr02SnWiN17nx8Q,2363
206
206
  airbyte_cdk/sources/file_based/availability_strategy/default_file_based_availability_strategy.py,sha256=j9T5TimfWFUz7nqsaj-83G3xWmDpsmeSbDnaUNmz0UM,5849
207
207
  airbyte_cdk/sources/file_based/config/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
208
- airbyte_cdk/sources/file_based/config/abstract_file_based_spec.py,sha256=gXlZwnEKLWknnK_n7j14lANgR6vkqhlLJ-G3rRu-ox4,6897
208
+ airbyte_cdk/sources/file_based/config/abstract_file_based_spec.py,sha256=purspcxMNWLhGunaqVJa9TISMZK7vlQSwdz4zykFWNA,6989
209
209
  airbyte_cdk/sources/file_based/config/avro_format.py,sha256=NxTF96ewzn6HuhgodsY7Rpb-ybr1ZEWW5d4Vid64g5A,716
210
210
  airbyte_cdk/sources/file_based/config/csv_format.py,sha256=NWekkyT8dTwiVK0mwa_krQD4FJPHSDfILo8kPAg3-Vs,8006
211
211
  airbyte_cdk/sources/file_based/config/excel_format.py,sha256=9qAmTsT6SoVzNfNv0oBVkVCmiyqQuVAbfRKajjoa7Js,378
@@ -213,12 +213,13 @@ airbyte_cdk/sources/file_based/config/file_based_stream_config.py,sha256=rkTuHpz
213
213
  airbyte_cdk/sources/file_based/config/jsonl_format.py,sha256=cxtpz4t9_ERQyj_1Bx4DjOxuYLykWt0B02S4dWW5BgM,378
214
214
  airbyte_cdk/sources/file_based/config/parquet_format.py,sha256=XOp-7nmm_WcbGI8SjKH2fs3Mkf1H4RAOYSWeUFYAz3w,741
215
215
  airbyte_cdk/sources/file_based/config/unstructured_format.py,sha256=tIbB9Pn1HqU67ju7hEZ9dBstRrb2eojUNMsdckzbj58,3565
216
+ airbyte_cdk/sources/file_based/config/validate_config_transfer_modes.py,sha256=OS52g6sJr98pKKLS4NO4ME3LCGy6qjjpWkHYWfG0Jtk,2925
216
217
  airbyte_cdk/sources/file_based/discovery_policy/__init__.py,sha256=gl3ey6mZbyfraB9P3pFhf9UJp2JeTZ1SUFAopy2iBvY,301
217
218
  airbyte_cdk/sources/file_based/discovery_policy/abstract_discovery_policy.py,sha256=dCfXX529Rd5rtopg4VeEgTPJjFtqjtjzPq6LCw18Wt0,605
218
219
  airbyte_cdk/sources/file_based/discovery_policy/default_discovery_policy.py,sha256=-xujTidtrq6HC00WKbjQh1CZdT5LMuzkp5BLjqDmfTY,1007
219
220
  airbyte_cdk/sources/file_based/exceptions.py,sha256=WP0qkG6fpWoBpOyyicgp5YNE393VWyegq5qSy0v4QtM,7362
220
- airbyte_cdk/sources/file_based/file_based_source.py,sha256=Biv2QufYQtHZQCBZs4iCUpqTd82rk7xo8SDYkEeau3k,17616
221
- airbyte_cdk/sources/file_based/file_based_stream_reader.py,sha256=e1KhgTh7mzvkBOz9DjLwzOsDwevrTmbxSYIcvhgWgGM,6856
221
+ airbyte_cdk/sources/file_based/file_based_source.py,sha256=JXfwc9KaW7PvjAbm2GJ7Ra3DJnCZH4KaE3WytYvtM1Q,18925
222
+ airbyte_cdk/sources/file_based/file_based_stream_reader.py,sha256=d2UZ3C8M-A591KvBvg8kDpVdpox0rKVlRhVy5bi-auc,11209
222
223
  airbyte_cdk/sources/file_based/file_types/__init__.py,sha256=blCLn0-2LC-ZdgcNyDEhqM2RiUvEjEBh-G4-t32ZtuM,1268
223
224
  airbyte_cdk/sources/file_based/file_types/avro_parser.py,sha256=XNx-JC-sgzH9u3nOJ2M59FxBXvtig8LN6BIkeDOavZA,10858
224
225
  airbyte_cdk/sources/file_based/file_types/csv_parser.py,sha256=QlCXB-ry3np67Q_VerQEPoWDOTcPTB6Go4ydZxY9ae4,20445
@@ -233,7 +234,7 @@ airbyte_cdk/sources/file_based/schema_helpers.py,sha256=Cf8FH1bDFP0qCDDfEYir_WjP
233
234
  airbyte_cdk/sources/file_based/schema_validation_policies/__init__.py,sha256=FkByIyEy56x2_awYnxGPqGaOp7zAzpAoRkPZHKySI9M,536
234
235
  airbyte_cdk/sources/file_based/schema_validation_policies/abstract_schema_validation_policy.py,sha256=kjvX7nOmUALYd7HuZHilUzgJPZ-MnZ08mtvuBnt2tQ0,618
235
236
  airbyte_cdk/sources/file_based/schema_validation_policies/default_schema_validation_policies.py,sha256=vjTlmYT_nqzY3DbT5xem7X-bwgA9RyXHoKFqiMO2URk,1728
236
- airbyte_cdk/sources/file_based/stream/__init__.py,sha256=QPDqdgjsabOQD93dSFqHGaFS_3pIwm-chEabZHiPJi0,265
237
+ airbyte_cdk/sources/file_based/stream/__init__.py,sha256=q_zmeOHHg0JK5j1YNSOIsyXGz-wlTl_0E8z5GKVAcVM,543
237
238
  airbyte_cdk/sources/file_based/stream/abstract_file_based_stream.py,sha256=9pQh3BHYcxm8CRC8XawfmBxL8O9HggpWwCCbX_ncINE,7509
238
239
  airbyte_cdk/sources/file_based/stream/concurrent/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
239
240
  airbyte_cdk/sources/file_based/stream/concurrent/adapters.py,sha256=WZ5q2uovgohauJgwfxq_LFeZ92WMZd0LoH6c5QQURPo,13931
@@ -245,12 +246,15 @@ airbyte_cdk/sources/file_based/stream/cursor/__init__.py,sha256=MhFB5hOo8sjwvCh8
245
246
  airbyte_cdk/sources/file_based/stream/cursor/abstract_file_based_cursor.py,sha256=om-x3gZFPgWDpi15S9RxZmR36VHnk8sytgN6LlBQhAw,1934
246
247
  airbyte_cdk/sources/file_based/stream/cursor/default_file_based_cursor.py,sha256=VGV7xLyBribuBMVrXtO1xqkWJD86bl7yhXtjnwLMohM,7051
247
248
  airbyte_cdk/sources/file_based/stream/default_file_based_stream.py,sha256=XLU5cNqQ-5mj243gNzMyXtm_oCtg1ORyoqbCsUo9Dn4,18044
249
+ airbyte_cdk/sources/file_based/stream/identities_stream.py,sha256=DwgNU-jDp5vZ_WloQSUzBciDnAFMo8bXPjXpQx5-eko,1790
250
+ airbyte_cdk/sources/file_based/stream/permissions_file_based_stream.py,sha256=i0Jn0zuAPomLa4pHSu9TQ3gAN5xXhNzPTYVwUDiDEyE,3523
248
251
  airbyte_cdk/sources/file_based/types.py,sha256=INxG7OPnkdUP69oYNKMAbwhvV1AGvLRHs1J6pIia2FI,218
249
252
  airbyte_cdk/sources/http_config.py,sha256=OBZeuyFilm6NlDlBhFQvHhTWabEvZww6OHDIlZujIS0,730
250
253
  airbyte_cdk/sources/http_logger.py,sha256=l_1fk5YwdonZ1wvAsTwjj6d36fj2WrVraIAMj5jTQdM,1575
251
254
  airbyte_cdk/sources/message/__init__.py,sha256=y98fzHsQBwXwp2zEa4K5mxGFqjnx9lDn9O0pTk-VS4U,395
252
255
  airbyte_cdk/sources/message/repository.py,sha256=SG7avgti_-dj8FcRHTTrhgLLGJbElv14_zIB0SH8AIc,4763
253
256
  airbyte_cdk/sources/source.py,sha256=KIBBH5VLEb8BZ8B9aROlfaI6OLoJqKDPMJ10jkAR7nk,3611
257
+ airbyte_cdk/sources/specs/transfer_modes.py,sha256=sfSVO0yT6SaGKN5_TP0Nl_ftG0yPhecaBv0WkhAEXA8,932
254
258
  airbyte_cdk/sources/streams/__init__.py,sha256=8fzTKpRTnSx5PggXgQPKJzHNZUV2BCA40N-dI6JM1xI,256
255
259
  airbyte_cdk/sources/streams/availability_strategy.py,sha256=_RU4JITrxMEN36g1RDHMu0iSw0I_3yWGfo5N8_YRvOg,3247
256
260
  airbyte_cdk/sources/streams/call_rate.py,sha256=jRsGp1PDZBCDQNxzcGVnVmVzLk0wLHxS1JnJwMAgy9U,27568
@@ -303,6 +307,7 @@ airbyte_cdk/sources/streams/http/requests_native_auth/abstract_oauth.py,sha256=c
303
307
  airbyte_cdk/sources/streams/http/requests_native_auth/abstract_token.py,sha256=Y3n7J-sk5yGjv_OxtY6Z6k0PEsFZmtIRi-x0KCbaHdA,1010
304
308
  airbyte_cdk/sources/streams/http/requests_native_auth/oauth.py,sha256=C2j2uVfi9d-3KgHO3NGxIiFdfASjHOtsd6g_LWPYOAs,20311
305
309
  airbyte_cdk/sources/streams/http/requests_native_auth/token.py,sha256=h5PTzcdH-RQLeCg7xZ45w_484OPUDSwNWl_iMJQmZoI,2526
310
+ airbyte_cdk/sources/streams/permissions/identities_stream.py,sha256=9O9k6k18Xm3Zsiw_vnI_jsHXfMCQiek6V-jMkJJLxn8,2621
306
311
  airbyte_cdk/sources/streams/utils/__init__.py,sha256=4Hw-PX1-VgESLF16cDdvuYCzGJtHntThLF4qIiULWeo,61
307
312
  airbyte_cdk/sources/types.py,sha256=aFPGI4t2K1vHz2oFSUIYUyDN7kw-vcYq4D7aD2zgfAU,5128
308
313
  airbyte_cdk/sources/utils/__init__.py,sha256=TTN6VUxVy6Is8BhYQZR5pxJGQh8yH4duXh4O1TiMiEY,118
@@ -328,9 +333,9 @@ airbyte_cdk/test/catalog_builder.py,sha256=-y05Cz1x0Dlk6oE9LSKhCozssV2gYBNtMdV5Y
328
333
  airbyte_cdk/test/entrypoint_wrapper.py,sha256=9XBii_YguQp0d8cykn3hy102FsJcwIBQzSB7co5ho0s,9802
329
334
  airbyte_cdk/test/mock_http/__init__.py,sha256=jE5kC6CQ0OXkTqKhciDnNVZHesBFVIA2YvkdFGwva7k,322
330
335
  airbyte_cdk/test/mock_http/matcher.py,sha256=4Qj8UnJKZIs-eodshryce3SN1Ayc8GZpBETmP6hTEyc,1446
331
- airbyte_cdk/test/mock_http/mocker.py,sha256=HJjgFdapr7OALj0sfk-LVXYBiymbUDieaGa8U1_q730,7358
336
+ airbyte_cdk/test/mock_http/mocker.py,sha256=ghX44cLwhs7lqz1gYMizGX8zfPnDvt3YNI2w5jLpzIs,7726
332
337
  airbyte_cdk/test/mock_http/request.py,sha256=tdB8cqk2vLgCDTOKffBKsM06llYs4ZecgtH6DKyx6yY,4112
333
- airbyte_cdk/test/mock_http/response.py,sha256=U9KEsUkK2dPXYwnfwrwp6CcYSSpMYKLjfTrPFKSMCaM,602
338
+ airbyte_cdk/test/mock_http/response.py,sha256=s4-cQQqTtmeej0pQDWqmG0vUWpHS-93lIWMpW3zSVyU,662
334
339
  airbyte_cdk/test/mock_http/response_builder.py,sha256=debPx_lRYBaQVSwCoKLa0F8KFk3h0qG7bWxFBATa0cc,7958
335
340
  airbyte_cdk/test/state_builder.py,sha256=kLPql9lNzUJaBg5YYRLJlY_Hy5JLHJDVyKPMZMoYM44,946
336
341
  airbyte_cdk/test/utils/__init__.py,sha256=Hu-1XT2KDoYjDF7-_ziDwv5bY3PueGjANOCbzeOegDg,57
@@ -346,7 +351,7 @@ airbyte_cdk/utils/datetime_format_inferrer.py,sha256=Ne2cpk7Tx3eZDEW2Q3O7jnNOY9g
346
351
  airbyte_cdk/utils/datetime_helpers.py,sha256=8mqzZ67Or2PBp7tLtrhh6XFv4wFzYsjCL_DOQJRaftI,17751
347
352
  airbyte_cdk/utils/event_timing.py,sha256=aiuFmPU80buLlNdKq4fDTEqqhEIelHPF6AalFGwY8as,2557
348
353
  airbyte_cdk/utils/is_cloud_environment.py,sha256=DayV32Irh-SdnJ0MnjvstwCJ66_l5oEsd8l85rZtHoc,574
349
- airbyte_cdk/utils/mapping_helpers.py,sha256=4EOyUzNAGkq-M0QF5rPeBfT4v_eV7qBrEaAtsTH1k8Y,4309
354
+ airbyte_cdk/utils/mapping_helpers.py,sha256=imUTULHmZ1Ks-MRMRLIVqHCX1eJi_j6tFQrYsKIKtM4,5967
350
355
  airbyte_cdk/utils/message_utils.py,sha256=OTzbkwN7AdMDA3iKYq1LKwfPFxpyEDfdgEF9BED3dkU,1366
351
356
  airbyte_cdk/utils/oneof_option_config.py,sha256=N8EmWdYdwt0FM7fuShh6H8nj_r4KEL9tb2DJJtwsPow,1180
352
357
  airbyte_cdk/utils/print_buffer.py,sha256=PhMOi0C4Z91kWKrSvCQXcp8qRh1uCimpIdvrg6voZIA,2810
@@ -355,9 +360,9 @@ airbyte_cdk/utils/slice_hasher.py,sha256=EDxgROHDbfG-QKQb59m7h_7crN1tRiawdf5uU7G
355
360
  airbyte_cdk/utils/spec_schema_transformations.py,sha256=-5HTuNsnDBAhj-oLeQXwpTGA0HdcjFOf2zTEMUTTg_Y,816
356
361
  airbyte_cdk/utils/stream_status_utils.py,sha256=ZmBoiy5HVbUEHAMrUONxZvxnvfV9CesmQJLDTAIWnWw,1171
357
362
  airbyte_cdk/utils/traced_exception.py,sha256=C8uIBuCL_E4WnBAOPSxBicD06JAldoN9fGsQDp463OY,6292
358
- airbyte_cdk-6.33.5.dist-info/LICENSE.txt,sha256=Wfe61S4BaGPj404v8lrAbvhjYR68SHlkzeYrg3_bbuM,1051
359
- airbyte_cdk-6.33.5.dist-info/LICENSE_SHORT,sha256=aqF6D1NcESmpn-cqsxBtszTEnHKnlsp8L4x9wAh3Nxg,55
360
- airbyte_cdk-6.33.5.dist-info/METADATA,sha256=sJVXKnOvbWXpBdzmMLW3FiKHhQKlnAbvFF91iwim9lo,6010
361
- airbyte_cdk-6.33.5.dist-info/WHEEL,sha256=Nq82e9rUAnEjt98J6MlVmMCZb-t9cYE2Ir1kpBmnWfs,88
362
- airbyte_cdk-6.33.5.dist-info/entry_points.txt,sha256=fj-e3PAQvsxsQzyyq8UkG1k8spunWnD4BAH2AwlR6NM,95
363
- airbyte_cdk-6.33.5.dist-info/RECORD,,
363
+ airbyte_cdk-6.33.7.dist-info/LICENSE.txt,sha256=Wfe61S4BaGPj404v8lrAbvhjYR68SHlkzeYrg3_bbuM,1051
364
+ airbyte_cdk-6.33.7.dist-info/LICENSE_SHORT,sha256=aqF6D1NcESmpn-cqsxBtszTEnHKnlsp8L4x9wAh3Nxg,55
365
+ airbyte_cdk-6.33.7.dist-info/METADATA,sha256=wx51UyfmmCxI6vcmkCr28bbvwR6P5gcokPbuCEwS83Q,6010
366
+ airbyte_cdk-6.33.7.dist-info/WHEEL,sha256=Nq82e9rUAnEjt98J6MlVmMCZb-t9cYE2Ir1kpBmnWfs,88
367
+ airbyte_cdk-6.33.7.dist-info/entry_points.txt,sha256=fj-e3PAQvsxsQzyyq8UkG1k8spunWnD4BAH2AwlR6NM,95
368
+ airbyte_cdk-6.33.7.dist-info/RECORD,,