airbyte-cdk 6.38.3__py3-none-any.whl → 6.38.3.dev4100__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- airbyte_cdk/entrypoint.py +6 -6
- airbyte_cdk/logger.py +4 -1
- airbyte_cdk/sources/file_based/file_based_source.py +22 -1
- airbyte_cdk/sources/file_based/file_based_stream_permissions_reader.py +109 -0
- airbyte_cdk/sources/file_based/file_based_stream_reader.py +0 -94
- airbyte_cdk/sources/file_based/stream/identities_stream.py +7 -5
- airbyte_cdk/sources/file_based/stream/permissions_file_based_stream.py +12 -3
- {airbyte_cdk-6.38.3.dist-info → airbyte_cdk-6.38.3.dev4100.dist-info}/METADATA +1 -1
- {airbyte_cdk-6.38.3.dist-info → airbyte_cdk-6.38.3.dev4100.dist-info}/RECORD +13 -12
- {airbyte_cdk-6.38.3.dist-info → airbyte_cdk-6.38.3.dev4100.dist-info}/LICENSE.txt +0 -0
- {airbyte_cdk-6.38.3.dist-info → airbyte_cdk-6.38.3.dev4100.dist-info}/LICENSE_SHORT +0 -0
- {airbyte_cdk-6.38.3.dist-info → airbyte_cdk-6.38.3.dev4100.dist-info}/WHEEL +0 -0
- {airbyte_cdk-6.38.3.dist-info → airbyte_cdk-6.38.3.dev4100.dist-info}/entry_points.txt +0 -0
airbyte_cdk/entrypoint.py
CHANGED
@@ -22,7 +22,7 @@ from requests import PreparedRequest, Response, Session
|
|
22
22
|
|
23
23
|
from airbyte_cdk.connector import TConfig
|
24
24
|
from airbyte_cdk.exception_handler import init_uncaught_exception_handler
|
25
|
-
from airbyte_cdk.logger import init_logger
|
25
|
+
from airbyte_cdk.logger import PRINT_BUFFER, init_logger
|
26
26
|
from airbyte_cdk.models import (
|
27
27
|
AirbyteConnectionStatus,
|
28
28
|
AirbyteMessage,
|
@@ -337,11 +337,11 @@ def launch(source: Source, args: List[str]) -> None:
|
|
337
337
|
parsed_args = source_entrypoint.parse_args(args)
|
338
338
|
# temporarily removes the PrintBuffer because we're seeing weird print behavior for concurrent syncs
|
339
339
|
# Refer to: https://github.com/airbytehq/oncall/issues/6235
|
340
|
-
|
341
|
-
|
342
|
-
|
343
|
-
|
344
|
-
|
340
|
+
with PRINT_BUFFER:
|
341
|
+
for message in source_entrypoint.run(parsed_args):
|
342
|
+
# simply printing is creating issues for concurrent CDK as Python uses different two instructions to print: one for the message and
|
343
|
+
# the other for the break line. Adding `\n` to the message ensure that both are printed at the same time
|
344
|
+
print(f"{message}\n", end="")
|
345
345
|
|
346
346
|
|
347
347
|
def _init_internal_request_filter() -> None:
|
airbyte_cdk/logger.py
CHANGED
@@ -16,8 +16,11 @@ from airbyte_cdk.models import (
|
|
16
16
|
Level,
|
17
17
|
Type,
|
18
18
|
)
|
19
|
+
from airbyte_cdk.utils import PrintBuffer
|
19
20
|
from airbyte_cdk.utils.airbyte_secrets_utils import filter_secrets
|
20
21
|
|
22
|
+
PRINT_BUFFER = PrintBuffer(flush_interval=0.1)
|
23
|
+
|
21
24
|
LOGGING_CONFIG = {
|
22
25
|
"version": 1,
|
23
26
|
"disable_existing_loggers": False,
|
@@ -27,7 +30,7 @@ LOGGING_CONFIG = {
|
|
27
30
|
"handlers": {
|
28
31
|
"console": {
|
29
32
|
"class": "logging.StreamHandler",
|
30
|
-
"stream":
|
33
|
+
"stream": PRINT_BUFFER,
|
31
34
|
"formatter": "airbyte",
|
32
35
|
},
|
33
36
|
},
|
@@ -48,6 +48,9 @@ from airbyte_cdk.sources.file_based.exceptions import (
|
|
48
48
|
FileBasedErrorsCollector,
|
49
49
|
FileBasedSourceError,
|
50
50
|
)
|
51
|
+
from airbyte_cdk.sources.file_based.file_based_stream_permissions_reader import (
|
52
|
+
AbstractFileBasedStreamPermissionsReader,
|
53
|
+
)
|
51
54
|
from airbyte_cdk.sources.file_based.file_based_stream_reader import AbstractFileBasedStreamReader
|
52
55
|
from airbyte_cdk.sources.file_based.file_types import default_parsers
|
53
56
|
from airbyte_cdk.sources.file_based.file_types.file_type_parser import FileTypeParser
|
@@ -100,8 +103,10 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
|
|
100
103
|
cursor_cls: Type[
|
101
104
|
Union[AbstractConcurrentFileBasedCursor, AbstractFileBasedCursor]
|
102
105
|
] = FileBasedConcurrentCursor,
|
106
|
+
stream_permissions_reader: Optional[AbstractFileBasedStreamPermissionsReader] = None,
|
103
107
|
):
|
104
108
|
self.stream_reader = stream_reader
|
109
|
+
self.stream_permissions_reader = stream_permissions_reader
|
105
110
|
self.spec_class = spec_class
|
106
111
|
self.config = config
|
107
112
|
self.catalog = catalog
|
@@ -337,9 +342,23 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
|
|
337
342
|
preserve_directory_structure=preserve_directory_structure(parsed_config),
|
338
343
|
)
|
339
344
|
|
345
|
+
def _ensure_permissions_reader_available(self) -> None:
|
346
|
+
"""
|
347
|
+
Validates that a stream permissions reader is available.
|
348
|
+
Raises a ValueError if the reader is not provided.
|
349
|
+
"""
|
350
|
+
if not self.stream_permissions_reader:
|
351
|
+
raise ValueError(
|
352
|
+
"Stream permissions reader is required for streams that use permissions transfer mode."
|
353
|
+
)
|
354
|
+
|
340
355
|
def _make_permissions_stream(
|
341
356
|
self, stream_config: FileBasedStreamConfig, cursor: Optional[AbstractFileBasedCursor]
|
342
357
|
) -> AbstractFileBasedStream:
|
358
|
+
"""
|
359
|
+
Creates a stream that reads permissions from files.
|
360
|
+
"""
|
361
|
+
self._ensure_permissions_reader_available()
|
343
362
|
return PermissionsFileBasedStream(
|
344
363
|
config=stream_config,
|
345
364
|
catalog_schema=self.stream_schemas.get(stream_config.name),
|
@@ -350,6 +369,7 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
|
|
350
369
|
validation_policy=self._validate_and_get_validation_policy(stream_config),
|
351
370
|
errors_collector=self.errors_collector,
|
352
371
|
cursor=cursor,
|
372
|
+
stream_permissions_reader=self.stream_permissions_reader, # type: ignore
|
353
373
|
)
|
354
374
|
|
355
375
|
def _make_file_based_stream(
|
@@ -370,9 +390,10 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
|
|
370
390
|
def _make_identities_stream(
|
371
391
|
self,
|
372
392
|
) -> Stream:
|
393
|
+
self._ensure_permissions_reader_available()
|
373
394
|
return FileIdentitiesStream(
|
374
395
|
catalog_schema=self.stream_schemas.get(FileIdentitiesStream.IDENTITIES_STREAM_NAME),
|
375
|
-
|
396
|
+
stream_permissions_reader=self.stream_permissions_reader, # type: ignore
|
376
397
|
discovery_policy=self.discovery_policy,
|
377
398
|
errors_collector=self.errors_collector,
|
378
399
|
)
|
@@ -0,0 +1,109 @@
|
|
1
|
+
#
|
2
|
+
# Copyright (c) 2025 Airbyte, Inc., all rights reserved.
|
3
|
+
#
|
4
|
+
|
5
|
+
import logging
|
6
|
+
from abc import ABC, abstractmethod
|
7
|
+
from typing import Any, Dict, Iterable
|
8
|
+
|
9
|
+
from airbyte_cdk.sources.file_based.remote_file import RemoteFile
|
10
|
+
|
11
|
+
|
12
|
+
class AbstractFileBasedStreamPermissionsReader(ABC):
|
13
|
+
"""
|
14
|
+
This class is responsible for reading file permissions and Identities from a source.
|
15
|
+
"""
|
16
|
+
|
17
|
+
@abstractmethod
|
18
|
+
def get_file_acl_permissions(self, file: RemoteFile, logger: logging.Logger) -> Dict[str, Any]:
|
19
|
+
"""
|
20
|
+
This function should return the allow list for a given file, i.e. the list of all identities and their permission levels associated with it
|
21
|
+
|
22
|
+
e.g.
|
23
|
+
def get_file_acl_permissions(self, file: RemoteFile, logger: logging.Logger):
|
24
|
+
api_conn = some_api.conn(credentials=SOME_CREDENTIALS)
|
25
|
+
result = api_conn.get_file_permissions_info(file.id)
|
26
|
+
return MyPermissionsModel(
|
27
|
+
id=result["id"],
|
28
|
+
access_control_list = result["access_control_list"],
|
29
|
+
is_public = result["is_public"],
|
30
|
+
).dict()
|
31
|
+
"""
|
32
|
+
raise NotImplementedError(
|
33
|
+
f"{self.__class__.__name__} does not implement get_file_acl_permissions(). To support ACL permissions, implement this method and update file_permissions_schema."
|
34
|
+
)
|
35
|
+
|
36
|
+
@abstractmethod
|
37
|
+
def load_identity_groups(self, logger: logging.Logger) -> Iterable[Dict[str, Any]]:
|
38
|
+
"""
|
39
|
+
This function should return the Identities in a determined "space" or "domain" where the file metadata (ACLs) are fetched and ACLs items (Identities) exists.
|
40
|
+
|
41
|
+
e.g.
|
42
|
+
def load_identity_groups(self, logger: logging.Logger) -> Dict[str, Any]:
|
43
|
+
api_conn = some_api.conn(credentials=SOME_CREDENTIALS)
|
44
|
+
users_api = api_conn.users()
|
45
|
+
groups_api = api_conn.groups()
|
46
|
+
members_api = self.google_directory_service.members()
|
47
|
+
for user in users_api.list():
|
48
|
+
yield my_identity_model(id=user.id, name=user.name, email_address=user.email, type="user").dict()
|
49
|
+
for group in groups_api.list():
|
50
|
+
group_obj = my_identity_model(id=group.id, name=groups.name, email_address=user.email, type="group").dict()
|
51
|
+
for member in members_api.list(group=group):
|
52
|
+
group_obj.member_email_addresses = group_obj.member_email_addresses or []
|
53
|
+
group_obj.member_email_addresses.append(member.email)
|
54
|
+
yield group_obj.dict()
|
55
|
+
"""
|
56
|
+
raise NotImplementedError(
|
57
|
+
f"{self.__class__.__name__} does not implement load_identity_groups(). To support identities, implement this method and update identities_schema."
|
58
|
+
)
|
59
|
+
|
60
|
+
@property
|
61
|
+
@abstractmethod
|
62
|
+
def file_permissions_schema(self) -> Dict[str, Any]:
|
63
|
+
"""
|
64
|
+
This function should return the permissions schema for file permissions stream.
|
65
|
+
|
66
|
+
e.g.
|
67
|
+
def file_permissions_schema(self) -> Dict[str, Any]:
|
68
|
+
# you can also follow the patter we have for python connectors and have a json file and read from there e.g. schemas/identities.json
|
69
|
+
return {
|
70
|
+
"type": "object",
|
71
|
+
"properties": {
|
72
|
+
"id": { "type": "string" },
|
73
|
+
"file_path": { "type": "string" },
|
74
|
+
"access_control_list": {
|
75
|
+
"type": "array",
|
76
|
+
"items": { "type": "string" }
|
77
|
+
},
|
78
|
+
"publicly_accessible": { "type": "boolean" }
|
79
|
+
}
|
80
|
+
}
|
81
|
+
"""
|
82
|
+
raise NotImplementedError(
|
83
|
+
f"{self.__class__.__name__} does not implement file_permissions_schema, please return json schema for your permissions streams."
|
84
|
+
)
|
85
|
+
|
86
|
+
@property
|
87
|
+
@abstractmethod
|
88
|
+
def identities_schema(self) -> Dict[str, Any]:
|
89
|
+
"""
|
90
|
+
This function should return the identities schema for file identity stream.
|
91
|
+
|
92
|
+
e.g.
|
93
|
+
def identities_schema(self) -> Dict[str, Any]:
|
94
|
+
# you can also follow the patter we have for python connectors and have a json file and read from there e.g. schemas/identities.json
|
95
|
+
return {
|
96
|
+
"type": "object",
|
97
|
+
"properties": {
|
98
|
+
"id": { "type": "string" },
|
99
|
+
"remote_id": { "type": "string" },
|
100
|
+
"name": { "type": ["null", "string"] },
|
101
|
+
"email_address": { "type": ["null", "string"] },
|
102
|
+
"member_email_addresses": { "type": ["null", "array"] },
|
103
|
+
"type": { "type": "string" },
|
104
|
+
}
|
105
|
+
}
|
106
|
+
"""
|
107
|
+
raise NotImplementedError(
|
108
|
+
f"{self.__class__.__name__} does not implement identities_schema, please return json schema for your identities stream."
|
109
|
+
)
|
@@ -184,97 +184,3 @@ class AbstractFileBasedStreamReader(ABC):
|
|
184
184
|
makedirs(path.dirname(local_file_path), exist_ok=True)
|
185
185
|
absolute_file_path = path.abspath(local_file_path)
|
186
186
|
return [file_relative_path, local_file_path, absolute_file_path]
|
187
|
-
|
188
|
-
@abstractmethod
|
189
|
-
def get_file_acl_permissions(self, file: RemoteFile, logger: logging.Logger) -> Dict[str, Any]:
|
190
|
-
"""
|
191
|
-
This function should return the allow list for a given file, i.e. the list of all identities and their permission levels associated with it
|
192
|
-
|
193
|
-
e.g.
|
194
|
-
def get_file_acl_permissions(self, file: RemoteFile, logger: logging.Logger):
|
195
|
-
api_conn = some_api.conn(credentials=SOME_CREDENTIALS)
|
196
|
-
result = api_conn.get_file_permissions_info(file.id)
|
197
|
-
return MyPermissionsModel(
|
198
|
-
id=result["id"],
|
199
|
-
access_control_list = result["access_control_list"],
|
200
|
-
is_public = result["is_public"],
|
201
|
-
).dict()
|
202
|
-
"""
|
203
|
-
raise NotImplementedError(
|
204
|
-
f"{self.__class__.__name__} does not implement get_file_acl_permissions(). To support ACL permissions, implement this method and update file_permissions_schema."
|
205
|
-
)
|
206
|
-
|
207
|
-
@abstractmethod
|
208
|
-
def load_identity_groups(self, logger: logging.Logger) -> Iterable[Dict[str, Any]]:
|
209
|
-
"""
|
210
|
-
This function should return the Identities in a determined "space" or "domain" where the file metadata (ACLs) are fetched and ACLs items (Identities) exists.
|
211
|
-
|
212
|
-
e.g.
|
213
|
-
def load_identity_groups(self, logger: logging.Logger) -> Dict[str, Any]:
|
214
|
-
api_conn = some_api.conn(credentials=SOME_CREDENTIALS)
|
215
|
-
users_api = api_conn.users()
|
216
|
-
groups_api = api_conn.groups()
|
217
|
-
members_api = self.google_directory_service.members()
|
218
|
-
for user in users_api.list():
|
219
|
-
yield my_identity_model(id=user.id, name=user.name, email_address=user.email, type="user").dict()
|
220
|
-
for group in groups_api.list():
|
221
|
-
group_obj = my_identity_model(id=group.id, name=groups.name, email_address=user.email, type="group").dict()
|
222
|
-
for member in members_api.list(group=group):
|
223
|
-
group_obj.member_email_addresses = group_obj.member_email_addresses or []
|
224
|
-
group_obj.member_email_addresses.append(member.email)
|
225
|
-
yield group_obj.dict()
|
226
|
-
"""
|
227
|
-
raise NotImplementedError(
|
228
|
-
f"{self.__class__.__name__} does not implement load_identity_groups(). To support identities, implement this method and update identities_schema."
|
229
|
-
)
|
230
|
-
|
231
|
-
@property
|
232
|
-
@abstractmethod
|
233
|
-
def file_permissions_schema(self) -> Dict[str, Any]:
|
234
|
-
"""
|
235
|
-
This function should return the permissions schema for file permissions stream.
|
236
|
-
|
237
|
-
e.g.
|
238
|
-
def file_permissions_schema(self) -> Dict[str, Any]:
|
239
|
-
# you can also follow the patter we have for python connectors and have a json file and read from there e.g. schemas/identities.json
|
240
|
-
return {
|
241
|
-
"type": "object",
|
242
|
-
"properties": {
|
243
|
-
"id": { "type": "string" },
|
244
|
-
"file_path": { "type": "string" },
|
245
|
-
"access_control_list": {
|
246
|
-
"type": "array",
|
247
|
-
"items": { "type": "string" }
|
248
|
-
},
|
249
|
-
"publicly_accessible": { "type": "boolean" }
|
250
|
-
}
|
251
|
-
}
|
252
|
-
"""
|
253
|
-
raise NotImplementedError(
|
254
|
-
f"{self.__class__.__name__} does not implement file_permissions_schema, please return json schema for your permissions streams."
|
255
|
-
)
|
256
|
-
|
257
|
-
@property
|
258
|
-
@abstractmethod
|
259
|
-
def identities_schema(self) -> Dict[str, Any]:
|
260
|
-
"""
|
261
|
-
This function should return the identities schema for file identity stream.
|
262
|
-
|
263
|
-
e.g.
|
264
|
-
def identities_schema(self) -> Dict[str, Any]:
|
265
|
-
# you can also follow the patter we have for python connectors and have a json file and read from there e.g. schemas/identities.json
|
266
|
-
return {
|
267
|
-
"type": "object",
|
268
|
-
"properties": {
|
269
|
-
"id": { "type": "string" },
|
270
|
-
"remote_id": { "type": "string" },
|
271
|
-
"name": { "type": ["null", "string"] },
|
272
|
-
"email_address": { "type": ["null", "string"] },
|
273
|
-
"member_email_addresses": { "type": ["null", "array"] },
|
274
|
-
"type": { "type": "string" },
|
275
|
-
}
|
276
|
-
}
|
277
|
-
"""
|
278
|
-
raise NotImplementedError(
|
279
|
-
f"{self.__class__.__name__} does not implement identities_schema, please return json schema for your identities stream."
|
280
|
-
)
|
@@ -8,7 +8,9 @@ from typing import Any, Dict, Iterable, Mapping, MutableMapping, Optional
|
|
8
8
|
from airbyte_cdk.sources.file_based.config.file_based_stream_config import PrimaryKeyType
|
9
9
|
from airbyte_cdk.sources.file_based.discovery_policy import AbstractDiscoveryPolicy
|
10
10
|
from airbyte_cdk.sources.file_based.exceptions import FileBasedErrorsCollector
|
11
|
-
from airbyte_cdk.sources.file_based.
|
11
|
+
from airbyte_cdk.sources.file_based.file_based_stream_permissions_reader import (
|
12
|
+
AbstractFileBasedStreamPermissionsReader,
|
13
|
+
)
|
12
14
|
from airbyte_cdk.sources.streams.core import JsonSchema
|
13
15
|
from airbyte_cdk.sources.streams.permissions.identities_stream import IdentitiesStream
|
14
16
|
|
@@ -24,13 +26,13 @@ class FileIdentitiesStream(IdentitiesStream):
|
|
24
26
|
def __init__(
|
25
27
|
self,
|
26
28
|
catalog_schema: Optional[Mapping[str, Any]],
|
27
|
-
|
29
|
+
stream_permissions_reader: AbstractFileBasedStreamPermissionsReader,
|
28
30
|
discovery_policy: AbstractDiscoveryPolicy,
|
29
31
|
errors_collector: FileBasedErrorsCollector,
|
30
32
|
) -> None:
|
31
33
|
super().__init__()
|
32
34
|
self.catalog_schema = catalog_schema
|
33
|
-
self.
|
35
|
+
self.stream_permissions_reader = stream_permissions_reader
|
34
36
|
self._discovery_policy = discovery_policy
|
35
37
|
self.errors_collector = errors_collector
|
36
38
|
self._cursor: MutableMapping[str, Any] = {}
|
@@ -40,8 +42,8 @@ class FileIdentitiesStream(IdentitiesStream):
|
|
40
42
|
return None
|
41
43
|
|
42
44
|
def load_identity_groups(self) -> Iterable[Dict[str, Any]]:
|
43
|
-
return self.
|
45
|
+
return self.stream_permissions_reader.load_identity_groups(logger=self.logger)
|
44
46
|
|
45
47
|
@cache
|
46
48
|
def get_json_schema(self) -> JsonSchema:
|
47
|
-
return self.
|
49
|
+
return self.stream_permissions_reader.identities_schema
|
@@ -7,6 +7,9 @@ from typing import Any, Dict, Iterable
|
|
7
7
|
|
8
8
|
from airbyte_cdk.models import AirbyteLogMessage, AirbyteMessage, Level
|
9
9
|
from airbyte_cdk.models import Type as MessageType
|
10
|
+
from airbyte_cdk.sources.file_based.file_based_stream_permissions_reader import (
|
11
|
+
AbstractFileBasedStreamPermissionsReader,
|
12
|
+
)
|
10
13
|
from airbyte_cdk.sources.file_based.stream import DefaultFileBasedStream
|
11
14
|
from airbyte_cdk.sources.file_based.types import StreamSlice
|
12
15
|
from airbyte_cdk.sources.streams.core import JsonSchema
|
@@ -26,10 +29,16 @@ class PermissionsFileBasedStream(DefaultFileBasedStream):
|
|
26
29
|
and schema definition, while this class handles the streaming interface.
|
27
30
|
"""
|
28
31
|
|
32
|
+
def __init__(
|
33
|
+
self, stream_permissions_reader: AbstractFileBasedStreamPermissionsReader, **kwargs: Any
|
34
|
+
):
|
35
|
+
super().__init__(**kwargs)
|
36
|
+
self.stream_permissions_reader = stream_permissions_reader
|
37
|
+
|
29
38
|
def _filter_schema_invalid_properties(
|
30
39
|
self, configured_catalog_json_schema: Dict[str, Any]
|
31
40
|
) -> Dict[str, Any]:
|
32
|
-
return self.
|
41
|
+
return self.stream_permissions_reader.file_permissions_schema
|
33
42
|
|
34
43
|
def read_records_from_slice(self, stream_slice: StreamSlice) -> Iterable[AirbyteMessage]:
|
35
44
|
"""
|
@@ -40,7 +49,7 @@ class PermissionsFileBasedStream(DefaultFileBasedStream):
|
|
40
49
|
no_permissions = False
|
41
50
|
file_datetime_string = file.last_modified.strftime(self.DATE_TIME_FORMAT)
|
42
51
|
try:
|
43
|
-
permissions_record = self.
|
52
|
+
permissions_record = self.stream_permissions_reader.get_file_acl_permissions(
|
44
53
|
file, logger=self.logger
|
45
54
|
)
|
46
55
|
if not permissions_record:
|
@@ -82,4 +91,4 @@ class PermissionsFileBasedStream(DefaultFileBasedStream):
|
|
82
91
|
Returns:
|
83
92
|
The file permissions schema that defines the structure of permission records
|
84
93
|
"""
|
85
|
-
return self.
|
94
|
+
return self.stream_permissions_reader.file_permissions_schema
|
@@ -26,9 +26,9 @@ airbyte_cdk/destinations/vector_db_based/indexer.py,sha256=beiSi2Uu67EoTr7yQSaCJ
|
|
26
26
|
airbyte_cdk/destinations/vector_db_based/test_utils.py,sha256=MkqLiOJ5QyKbV4rNiJhe-BHM7FD-ADHQ4bQGf4c5lRY,1932
|
27
27
|
airbyte_cdk/destinations/vector_db_based/utils.py,sha256=FOyEo8Lc-fY8UyhpCivhZtIqBRyxf3cUt6anmK03fUY,1127
|
28
28
|
airbyte_cdk/destinations/vector_db_based/writer.py,sha256=nZ00xPiohElJmYktEZZIhr0m5EDETCHGhg0Lb2S7A20,5095
|
29
|
-
airbyte_cdk/entrypoint.py,sha256=
|
29
|
+
airbyte_cdk/entrypoint.py,sha256=NRJv5BNZRSUEVTmNBa9N7ih6fW5sg4DwL0nkB9kI99Y,18570
|
30
30
|
airbyte_cdk/exception_handler.py,sha256=D_doVl3Dt60ASXlJsfviOCswxGyKF2q0RL6rif3fNks,2013
|
31
|
-
airbyte_cdk/logger.py,sha256=
|
31
|
+
airbyte_cdk/logger.py,sha256=1cURbvawbunCAV178q-XhTHcbAQZTSf07WhU7U9AXWU,3744
|
32
32
|
airbyte_cdk/models/__init__.py,sha256=MOTiuML2wShBaMSIwikdjyye2uUWBjo4J1QFSbnoiM4,2075
|
33
33
|
airbyte_cdk/models/airbyte_protocol.py,sha256=MCmLir67-hF12YM5OKzeGbWrlxr7ChG_OQSE1xG8EIU,3748
|
34
34
|
airbyte_cdk/models/airbyte_protocol_serializers.py,sha256=s6SaFB2CMrG_7jTQGn_fhFbQ1FUxhCxf5kq2RWGHMVI,1749
|
@@ -214,8 +214,9 @@ airbyte_cdk/sources/file_based/discovery_policy/__init__.py,sha256=gl3ey6mZbyfra
|
|
214
214
|
airbyte_cdk/sources/file_based/discovery_policy/abstract_discovery_policy.py,sha256=dCfXX529Rd5rtopg4VeEgTPJjFtqjtjzPq6LCw18Wt0,605
|
215
215
|
airbyte_cdk/sources/file_based/discovery_policy/default_discovery_policy.py,sha256=-xujTidtrq6HC00WKbjQh1CZdT5LMuzkp5BLjqDmfTY,1007
|
216
216
|
airbyte_cdk/sources/file_based/exceptions.py,sha256=WP0qkG6fpWoBpOyyicgp5YNE393VWyegq5qSy0v4QtM,7362
|
217
|
-
airbyte_cdk/sources/file_based/file_based_source.py,sha256=
|
218
|
-
airbyte_cdk/sources/file_based/
|
217
|
+
airbyte_cdk/sources/file_based/file_based_source.py,sha256=HG4wok4kTEQYzoMxa3u_JwkgdUp_eHkqFMEx5Is7jOM,19934
|
218
|
+
airbyte_cdk/sources/file_based/file_based_stream_permissions_reader.py,sha256=hwwVTi5Ue5cPCzVM8jWOVbsTdjVRW4eDyVv8JMWFnyc,4846
|
219
|
+
airbyte_cdk/sources/file_based/file_based_stream_reader.py,sha256=0cmppYO3pZlFiJrs5oorF4JXv4ErhOeEMrdLG7P-Gdk,6742
|
219
220
|
airbyte_cdk/sources/file_based/file_types/__init__.py,sha256=blCLn0-2LC-ZdgcNyDEhqM2RiUvEjEBh-G4-t32ZtuM,1268
|
220
221
|
airbyte_cdk/sources/file_based/file_types/avro_parser.py,sha256=XNx-JC-sgzH9u3nOJ2M59FxBXvtig8LN6BIkeDOavZA,10858
|
221
222
|
airbyte_cdk/sources/file_based/file_types/csv_parser.py,sha256=QlCXB-ry3np67Q_VerQEPoWDOTcPTB6Go4ydZxY9ae4,20445
|
@@ -242,8 +243,8 @@ airbyte_cdk/sources/file_based/stream/cursor/__init__.py,sha256=MhFB5hOo8sjwvCh8
|
|
242
243
|
airbyte_cdk/sources/file_based/stream/cursor/abstract_file_based_cursor.py,sha256=om-x3gZFPgWDpi15S9RxZmR36VHnk8sytgN6LlBQhAw,1934
|
243
244
|
airbyte_cdk/sources/file_based/stream/cursor/default_file_based_cursor.py,sha256=VGV7xLyBribuBMVrXtO1xqkWJD86bl7yhXtjnwLMohM,7051
|
244
245
|
airbyte_cdk/sources/file_based/stream/default_file_based_stream.py,sha256=XLU5cNqQ-5mj243gNzMyXtm_oCtg1ORyoqbCsUo9Dn4,18044
|
245
|
-
airbyte_cdk/sources/file_based/stream/identities_stream.py,sha256=
|
246
|
-
airbyte_cdk/sources/file_based/stream/permissions_file_based_stream.py,sha256=
|
246
|
+
airbyte_cdk/sources/file_based/stream/identities_stream.py,sha256=FZH83Geoy3K3nwUk2VVNJERFcXUTnl-4XljjucUM23s,1893
|
247
|
+
airbyte_cdk/sources/file_based/stream/permissions_file_based_stream.py,sha256=ke82qgm7snOlQTDx94Lqsc0cDkHWi3OJDTrPxffpFqc,3914
|
247
248
|
airbyte_cdk/sources/file_based/types.py,sha256=INxG7OPnkdUP69oYNKMAbwhvV1AGvLRHs1J6pIia2FI,218
|
248
249
|
airbyte_cdk/sources/http_config.py,sha256=OBZeuyFilm6NlDlBhFQvHhTWabEvZww6OHDIlZujIS0,730
|
249
250
|
airbyte_cdk/sources/http_logger.py,sha256=H93kPAujHhPmXNX0JSFG3D-SL6yEFA5PtKot9Hu3TYA,1690
|
@@ -357,9 +358,9 @@ airbyte_cdk/utils/slice_hasher.py,sha256=EDxgROHDbfG-QKQb59m7h_7crN1tRiawdf5uU7G
|
|
357
358
|
airbyte_cdk/utils/spec_schema_transformations.py,sha256=-5HTuNsnDBAhj-oLeQXwpTGA0HdcjFOf2zTEMUTTg_Y,816
|
358
359
|
airbyte_cdk/utils/stream_status_utils.py,sha256=ZmBoiy5HVbUEHAMrUONxZvxnvfV9CesmQJLDTAIWnWw,1171
|
359
360
|
airbyte_cdk/utils/traced_exception.py,sha256=C8uIBuCL_E4WnBAOPSxBicD06JAldoN9fGsQDp463OY,6292
|
360
|
-
airbyte_cdk-6.38.3.dist-info/LICENSE.txt,sha256=Wfe61S4BaGPj404v8lrAbvhjYR68SHlkzeYrg3_bbuM,1051
|
361
|
-
airbyte_cdk-6.38.3.dist-info/LICENSE_SHORT,sha256=aqF6D1NcESmpn-cqsxBtszTEnHKnlsp8L4x9wAh3Nxg,55
|
362
|
-
airbyte_cdk-6.38.3.dist-info/METADATA,sha256=
|
363
|
-
airbyte_cdk-6.38.3.dist-info/WHEEL,sha256=Nq82e9rUAnEjt98J6MlVmMCZb-t9cYE2Ir1kpBmnWfs,88
|
364
|
-
airbyte_cdk-6.38.3.dist-info/entry_points.txt,sha256=fj-e3PAQvsxsQzyyq8UkG1k8spunWnD4BAH2AwlR6NM,95
|
365
|
-
airbyte_cdk-6.38.3.dist-info/RECORD,,
|
361
|
+
airbyte_cdk-6.38.3.dev4100.dist-info/LICENSE.txt,sha256=Wfe61S4BaGPj404v8lrAbvhjYR68SHlkzeYrg3_bbuM,1051
|
362
|
+
airbyte_cdk-6.38.3.dev4100.dist-info/LICENSE_SHORT,sha256=aqF6D1NcESmpn-cqsxBtszTEnHKnlsp8L4x9wAh3Nxg,55
|
363
|
+
airbyte_cdk-6.38.3.dev4100.dist-info/METADATA,sha256=w60PKl3DfFjzvG3uKUtLCCEf0s83i-osbdqy2doggrc,6021
|
364
|
+
airbyte_cdk-6.38.3.dev4100.dist-info/WHEEL,sha256=Nq82e9rUAnEjt98J6MlVmMCZb-t9cYE2Ir1kpBmnWfs,88
|
365
|
+
airbyte_cdk-6.38.3.dev4100.dist-info/entry_points.txt,sha256=fj-e3PAQvsxsQzyyq8UkG1k8spunWnD4BAH2AwlR6NM,95
|
366
|
+
airbyte_cdk-6.38.3.dev4100.dist-info/RECORD,,
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|