airbyte-cdk 6.38.3__py3-none-any.whl → 6.38.3.dev4100__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
airbyte_cdk/entrypoint.py CHANGED
@@ -22,7 +22,7 @@ from requests import PreparedRequest, Response, Session
22
22
 
23
23
  from airbyte_cdk.connector import TConfig
24
24
  from airbyte_cdk.exception_handler import init_uncaught_exception_handler
25
- from airbyte_cdk.logger import init_logger
25
+ from airbyte_cdk.logger import PRINT_BUFFER, init_logger
26
26
  from airbyte_cdk.models import (
27
27
  AirbyteConnectionStatus,
28
28
  AirbyteMessage,
@@ -337,11 +337,11 @@ def launch(source: Source, args: List[str]) -> None:
337
337
  parsed_args = source_entrypoint.parse_args(args)
338
338
  # temporarily removes the PrintBuffer because we're seeing weird print behavior for concurrent syncs
339
339
  # Refer to: https://github.com/airbytehq/oncall/issues/6235
340
- # with PrintBuffer():
341
- for message in source_entrypoint.run(parsed_args):
342
- # simply printing is creating issues for concurrent CDK as Python uses different two instructions to print: one for the message and
343
- # the other for the break line. Adding `\n` to the message ensure that both are printed at the same time
344
- print(f"{message}\n", end="", flush=True)
340
+ with PRINT_BUFFER:
341
+ for message in source_entrypoint.run(parsed_args):
342
+ # simply printing is creating issues for concurrent CDK as Python uses different two instructions to print: one for the message and
343
+ # the other for the break line. Adding `\n` to the message ensure that both are printed at the same time
344
+ print(f"{message}\n", end="")
345
345
 
346
346
 
347
347
  def _init_internal_request_filter() -> None:
airbyte_cdk/logger.py CHANGED
@@ -16,8 +16,11 @@ from airbyte_cdk.models import (
16
16
  Level,
17
17
  Type,
18
18
  )
19
+ from airbyte_cdk.utils import PrintBuffer
19
20
  from airbyte_cdk.utils.airbyte_secrets_utils import filter_secrets
20
21
 
22
+ PRINT_BUFFER = PrintBuffer(flush_interval=0.1)
23
+
21
24
  LOGGING_CONFIG = {
22
25
  "version": 1,
23
26
  "disable_existing_loggers": False,
@@ -27,7 +30,7 @@ LOGGING_CONFIG = {
27
30
  "handlers": {
28
31
  "console": {
29
32
  "class": "logging.StreamHandler",
30
- "stream": "ext://sys.stdout",
33
+ "stream": PRINT_BUFFER,
31
34
  "formatter": "airbyte",
32
35
  },
33
36
  },
@@ -48,6 +48,9 @@ from airbyte_cdk.sources.file_based.exceptions import (
48
48
  FileBasedErrorsCollector,
49
49
  FileBasedSourceError,
50
50
  )
51
+ from airbyte_cdk.sources.file_based.file_based_stream_permissions_reader import (
52
+ AbstractFileBasedStreamPermissionsReader,
53
+ )
51
54
  from airbyte_cdk.sources.file_based.file_based_stream_reader import AbstractFileBasedStreamReader
52
55
  from airbyte_cdk.sources.file_based.file_types import default_parsers
53
56
  from airbyte_cdk.sources.file_based.file_types.file_type_parser import FileTypeParser
@@ -100,8 +103,10 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
100
103
  cursor_cls: Type[
101
104
  Union[AbstractConcurrentFileBasedCursor, AbstractFileBasedCursor]
102
105
  ] = FileBasedConcurrentCursor,
106
+ stream_permissions_reader: Optional[AbstractFileBasedStreamPermissionsReader] = None,
103
107
  ):
104
108
  self.stream_reader = stream_reader
109
+ self.stream_permissions_reader = stream_permissions_reader
105
110
  self.spec_class = spec_class
106
111
  self.config = config
107
112
  self.catalog = catalog
@@ -337,9 +342,23 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
337
342
  preserve_directory_structure=preserve_directory_structure(parsed_config),
338
343
  )
339
344
 
345
+ def _ensure_permissions_reader_available(self) -> None:
346
+ """
347
+ Validates that a stream permissions reader is available.
348
+ Raises a ValueError if the reader is not provided.
349
+ """
350
+ if not self.stream_permissions_reader:
351
+ raise ValueError(
352
+ "Stream permissions reader is required for streams that use permissions transfer mode."
353
+ )
354
+
340
355
  def _make_permissions_stream(
341
356
  self, stream_config: FileBasedStreamConfig, cursor: Optional[AbstractFileBasedCursor]
342
357
  ) -> AbstractFileBasedStream:
358
+ """
359
+ Creates a stream that reads permissions from files.
360
+ """
361
+ self._ensure_permissions_reader_available()
343
362
  return PermissionsFileBasedStream(
344
363
  config=stream_config,
345
364
  catalog_schema=self.stream_schemas.get(stream_config.name),
@@ -350,6 +369,7 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
350
369
  validation_policy=self._validate_and_get_validation_policy(stream_config),
351
370
  errors_collector=self.errors_collector,
352
371
  cursor=cursor,
372
+ stream_permissions_reader=self.stream_permissions_reader, # type: ignore
353
373
  )
354
374
 
355
375
  def _make_file_based_stream(
@@ -370,9 +390,10 @@ class FileBasedSource(ConcurrentSourceAdapter, ABC):
370
390
  def _make_identities_stream(
371
391
  self,
372
392
  ) -> Stream:
393
+ self._ensure_permissions_reader_available()
373
394
  return FileIdentitiesStream(
374
395
  catalog_schema=self.stream_schemas.get(FileIdentitiesStream.IDENTITIES_STREAM_NAME),
375
- stream_reader=self.stream_reader,
396
+ stream_permissions_reader=self.stream_permissions_reader, # type: ignore
376
397
  discovery_policy=self.discovery_policy,
377
398
  errors_collector=self.errors_collector,
378
399
  )
@@ -0,0 +1,109 @@
1
+ #
2
+ # Copyright (c) 2025 Airbyte, Inc., all rights reserved.
3
+ #
4
+
5
+ import logging
6
+ from abc import ABC, abstractmethod
7
+ from typing import Any, Dict, Iterable
8
+
9
+ from airbyte_cdk.sources.file_based.remote_file import RemoteFile
10
+
11
+
12
+ class AbstractFileBasedStreamPermissionsReader(ABC):
13
+ """
14
+ This class is responsible for reading file permissions and Identities from a source.
15
+ """
16
+
17
+ @abstractmethod
18
+ def get_file_acl_permissions(self, file: RemoteFile, logger: logging.Logger) -> Dict[str, Any]:
19
+ """
20
+ This function should return the allow list for a given file, i.e. the list of all identities and their permission levels associated with it
21
+
22
+ e.g.
23
+ def get_file_acl_permissions(self, file: RemoteFile, logger: logging.Logger):
24
+ api_conn = some_api.conn(credentials=SOME_CREDENTIALS)
25
+ result = api_conn.get_file_permissions_info(file.id)
26
+ return MyPermissionsModel(
27
+ id=result["id"],
28
+ access_control_list = result["access_control_list"],
29
+ is_public = result["is_public"],
30
+ ).dict()
31
+ """
32
+ raise NotImplementedError(
33
+ f"{self.__class__.__name__} does not implement get_file_acl_permissions(). To support ACL permissions, implement this method and update file_permissions_schema."
34
+ )
35
+
36
+ @abstractmethod
37
+ def load_identity_groups(self, logger: logging.Logger) -> Iterable[Dict[str, Any]]:
38
+ """
39
+ This function should return the Identities in a determined "space" or "domain" where the file metadata (ACLs) are fetched and ACLs items (Identities) exists.
40
+
41
+ e.g.
42
+ def load_identity_groups(self, logger: logging.Logger) -> Dict[str, Any]:
43
+ api_conn = some_api.conn(credentials=SOME_CREDENTIALS)
44
+ users_api = api_conn.users()
45
+ groups_api = api_conn.groups()
46
+ members_api = self.google_directory_service.members()
47
+ for user in users_api.list():
48
+ yield my_identity_model(id=user.id, name=user.name, email_address=user.email, type="user").dict()
49
+ for group in groups_api.list():
50
+ group_obj = my_identity_model(id=group.id, name=groups.name, email_address=user.email, type="group").dict()
51
+ for member in members_api.list(group=group):
52
+ group_obj.member_email_addresses = group_obj.member_email_addresses or []
53
+ group_obj.member_email_addresses.append(member.email)
54
+ yield group_obj.dict()
55
+ """
56
+ raise NotImplementedError(
57
+ f"{self.__class__.__name__} does not implement load_identity_groups(). To support identities, implement this method and update identities_schema."
58
+ )
59
+
60
+ @property
61
+ @abstractmethod
62
+ def file_permissions_schema(self) -> Dict[str, Any]:
63
+ """
64
+ This function should return the permissions schema for file permissions stream.
65
+
66
+ e.g.
67
+ def file_permissions_schema(self) -> Dict[str, Any]:
68
+ # you can also follow the patter we have for python connectors and have a json file and read from there e.g. schemas/identities.json
69
+ return {
70
+ "type": "object",
71
+ "properties": {
72
+ "id": { "type": "string" },
73
+ "file_path": { "type": "string" },
74
+ "access_control_list": {
75
+ "type": "array",
76
+ "items": { "type": "string" }
77
+ },
78
+ "publicly_accessible": { "type": "boolean" }
79
+ }
80
+ }
81
+ """
82
+ raise NotImplementedError(
83
+ f"{self.__class__.__name__} does not implement file_permissions_schema, please return json schema for your permissions streams."
84
+ )
85
+
86
+ @property
87
+ @abstractmethod
88
+ def identities_schema(self) -> Dict[str, Any]:
89
+ """
90
+ This function should return the identities schema for file identity stream.
91
+
92
+ e.g.
93
+ def identities_schema(self) -> Dict[str, Any]:
94
+ # you can also follow the patter we have for python connectors and have a json file and read from there e.g. schemas/identities.json
95
+ return {
96
+ "type": "object",
97
+ "properties": {
98
+ "id": { "type": "string" },
99
+ "remote_id": { "type": "string" },
100
+ "name": { "type": ["null", "string"] },
101
+ "email_address": { "type": ["null", "string"] },
102
+ "member_email_addresses": { "type": ["null", "array"] },
103
+ "type": { "type": "string" },
104
+ }
105
+ }
106
+ """
107
+ raise NotImplementedError(
108
+ f"{self.__class__.__name__} does not implement identities_schema, please return json schema for your identities stream."
109
+ )
@@ -184,97 +184,3 @@ class AbstractFileBasedStreamReader(ABC):
184
184
  makedirs(path.dirname(local_file_path), exist_ok=True)
185
185
  absolute_file_path = path.abspath(local_file_path)
186
186
  return [file_relative_path, local_file_path, absolute_file_path]
187
-
188
- @abstractmethod
189
- def get_file_acl_permissions(self, file: RemoteFile, logger: logging.Logger) -> Dict[str, Any]:
190
- """
191
- This function should return the allow list for a given file, i.e. the list of all identities and their permission levels associated with it
192
-
193
- e.g.
194
- def get_file_acl_permissions(self, file: RemoteFile, logger: logging.Logger):
195
- api_conn = some_api.conn(credentials=SOME_CREDENTIALS)
196
- result = api_conn.get_file_permissions_info(file.id)
197
- return MyPermissionsModel(
198
- id=result["id"],
199
- access_control_list = result["access_control_list"],
200
- is_public = result["is_public"],
201
- ).dict()
202
- """
203
- raise NotImplementedError(
204
- f"{self.__class__.__name__} does not implement get_file_acl_permissions(). To support ACL permissions, implement this method and update file_permissions_schema."
205
- )
206
-
207
- @abstractmethod
208
- def load_identity_groups(self, logger: logging.Logger) -> Iterable[Dict[str, Any]]:
209
- """
210
- This function should return the Identities in a determined "space" or "domain" where the file metadata (ACLs) are fetched and ACLs items (Identities) exists.
211
-
212
- e.g.
213
- def load_identity_groups(self, logger: logging.Logger) -> Dict[str, Any]:
214
- api_conn = some_api.conn(credentials=SOME_CREDENTIALS)
215
- users_api = api_conn.users()
216
- groups_api = api_conn.groups()
217
- members_api = self.google_directory_service.members()
218
- for user in users_api.list():
219
- yield my_identity_model(id=user.id, name=user.name, email_address=user.email, type="user").dict()
220
- for group in groups_api.list():
221
- group_obj = my_identity_model(id=group.id, name=groups.name, email_address=user.email, type="group").dict()
222
- for member in members_api.list(group=group):
223
- group_obj.member_email_addresses = group_obj.member_email_addresses or []
224
- group_obj.member_email_addresses.append(member.email)
225
- yield group_obj.dict()
226
- """
227
- raise NotImplementedError(
228
- f"{self.__class__.__name__} does not implement load_identity_groups(). To support identities, implement this method and update identities_schema."
229
- )
230
-
231
- @property
232
- @abstractmethod
233
- def file_permissions_schema(self) -> Dict[str, Any]:
234
- """
235
- This function should return the permissions schema for file permissions stream.
236
-
237
- e.g.
238
- def file_permissions_schema(self) -> Dict[str, Any]:
239
- # you can also follow the patter we have for python connectors and have a json file and read from there e.g. schemas/identities.json
240
- return {
241
- "type": "object",
242
- "properties": {
243
- "id": { "type": "string" },
244
- "file_path": { "type": "string" },
245
- "access_control_list": {
246
- "type": "array",
247
- "items": { "type": "string" }
248
- },
249
- "publicly_accessible": { "type": "boolean" }
250
- }
251
- }
252
- """
253
- raise NotImplementedError(
254
- f"{self.__class__.__name__} does not implement file_permissions_schema, please return json schema for your permissions streams."
255
- )
256
-
257
- @property
258
- @abstractmethod
259
- def identities_schema(self) -> Dict[str, Any]:
260
- """
261
- This function should return the identities schema for file identity stream.
262
-
263
- e.g.
264
- def identities_schema(self) -> Dict[str, Any]:
265
- # you can also follow the patter we have for python connectors and have a json file and read from there e.g. schemas/identities.json
266
- return {
267
- "type": "object",
268
- "properties": {
269
- "id": { "type": "string" },
270
- "remote_id": { "type": "string" },
271
- "name": { "type": ["null", "string"] },
272
- "email_address": { "type": ["null", "string"] },
273
- "member_email_addresses": { "type": ["null", "array"] },
274
- "type": { "type": "string" },
275
- }
276
- }
277
- """
278
- raise NotImplementedError(
279
- f"{self.__class__.__name__} does not implement identities_schema, please return json schema for your identities stream."
280
- )
@@ -8,7 +8,9 @@ from typing import Any, Dict, Iterable, Mapping, MutableMapping, Optional
8
8
  from airbyte_cdk.sources.file_based.config.file_based_stream_config import PrimaryKeyType
9
9
  from airbyte_cdk.sources.file_based.discovery_policy import AbstractDiscoveryPolicy
10
10
  from airbyte_cdk.sources.file_based.exceptions import FileBasedErrorsCollector
11
- from airbyte_cdk.sources.file_based.file_based_stream_reader import AbstractFileBasedStreamReader
11
+ from airbyte_cdk.sources.file_based.file_based_stream_permissions_reader import (
12
+ AbstractFileBasedStreamPermissionsReader,
13
+ )
12
14
  from airbyte_cdk.sources.streams.core import JsonSchema
13
15
  from airbyte_cdk.sources.streams.permissions.identities_stream import IdentitiesStream
14
16
 
@@ -24,13 +26,13 @@ class FileIdentitiesStream(IdentitiesStream):
24
26
  def __init__(
25
27
  self,
26
28
  catalog_schema: Optional[Mapping[str, Any]],
27
- stream_reader: AbstractFileBasedStreamReader,
29
+ stream_permissions_reader: AbstractFileBasedStreamPermissionsReader,
28
30
  discovery_policy: AbstractDiscoveryPolicy,
29
31
  errors_collector: FileBasedErrorsCollector,
30
32
  ) -> None:
31
33
  super().__init__()
32
34
  self.catalog_schema = catalog_schema
33
- self.stream_reader = stream_reader
35
+ self.stream_permissions_reader = stream_permissions_reader
34
36
  self._discovery_policy = discovery_policy
35
37
  self.errors_collector = errors_collector
36
38
  self._cursor: MutableMapping[str, Any] = {}
@@ -40,8 +42,8 @@ class FileIdentitiesStream(IdentitiesStream):
40
42
  return None
41
43
 
42
44
  def load_identity_groups(self) -> Iterable[Dict[str, Any]]:
43
- return self.stream_reader.load_identity_groups(logger=self.logger)
45
+ return self.stream_permissions_reader.load_identity_groups(logger=self.logger)
44
46
 
45
47
  @cache
46
48
  def get_json_schema(self) -> JsonSchema:
47
- return self.stream_reader.identities_schema
49
+ return self.stream_permissions_reader.identities_schema
@@ -7,6 +7,9 @@ from typing import Any, Dict, Iterable
7
7
 
8
8
  from airbyte_cdk.models import AirbyteLogMessage, AirbyteMessage, Level
9
9
  from airbyte_cdk.models import Type as MessageType
10
+ from airbyte_cdk.sources.file_based.file_based_stream_permissions_reader import (
11
+ AbstractFileBasedStreamPermissionsReader,
12
+ )
10
13
  from airbyte_cdk.sources.file_based.stream import DefaultFileBasedStream
11
14
  from airbyte_cdk.sources.file_based.types import StreamSlice
12
15
  from airbyte_cdk.sources.streams.core import JsonSchema
@@ -26,10 +29,16 @@ class PermissionsFileBasedStream(DefaultFileBasedStream):
26
29
  and schema definition, while this class handles the streaming interface.
27
30
  """
28
31
 
32
+ def __init__(
33
+ self, stream_permissions_reader: AbstractFileBasedStreamPermissionsReader, **kwargs: Any
34
+ ):
35
+ super().__init__(**kwargs)
36
+ self.stream_permissions_reader = stream_permissions_reader
37
+
29
38
  def _filter_schema_invalid_properties(
30
39
  self, configured_catalog_json_schema: Dict[str, Any]
31
40
  ) -> Dict[str, Any]:
32
- return self.stream_reader.file_permissions_schema
41
+ return self.stream_permissions_reader.file_permissions_schema
33
42
 
34
43
  def read_records_from_slice(self, stream_slice: StreamSlice) -> Iterable[AirbyteMessage]:
35
44
  """
@@ -40,7 +49,7 @@ class PermissionsFileBasedStream(DefaultFileBasedStream):
40
49
  no_permissions = False
41
50
  file_datetime_string = file.last_modified.strftime(self.DATE_TIME_FORMAT)
42
51
  try:
43
- permissions_record = self.stream_reader.get_file_acl_permissions(
52
+ permissions_record = self.stream_permissions_reader.get_file_acl_permissions(
44
53
  file, logger=self.logger
45
54
  )
46
55
  if not permissions_record:
@@ -82,4 +91,4 @@ class PermissionsFileBasedStream(DefaultFileBasedStream):
82
91
  Returns:
83
92
  The file permissions schema that defines the structure of permission records
84
93
  """
85
- return self.stream_reader.file_permissions_schema
94
+ return self.stream_permissions_reader.file_permissions_schema
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: airbyte-cdk
3
- Version: 6.38.3
3
+ Version: 6.38.3.dev4100
4
4
  Summary: A framework for writing Airbyte Connectors.
5
5
  Home-page: https://airbyte.com
6
6
  License: MIT
@@ -26,9 +26,9 @@ airbyte_cdk/destinations/vector_db_based/indexer.py,sha256=beiSi2Uu67EoTr7yQSaCJ
26
26
  airbyte_cdk/destinations/vector_db_based/test_utils.py,sha256=MkqLiOJ5QyKbV4rNiJhe-BHM7FD-ADHQ4bQGf4c5lRY,1932
27
27
  airbyte_cdk/destinations/vector_db_based/utils.py,sha256=FOyEo8Lc-fY8UyhpCivhZtIqBRyxf3cUt6anmK03fUY,1127
28
28
  airbyte_cdk/destinations/vector_db_based/writer.py,sha256=nZ00xPiohElJmYktEZZIhr0m5EDETCHGhg0Lb2S7A20,5095
29
- airbyte_cdk/entrypoint.py,sha256=xFLY2PV8mKXUaeBAknczbK6plrs4_B1WdWA6K3iaRJI,18555
29
+ airbyte_cdk/entrypoint.py,sha256=NRJv5BNZRSUEVTmNBa9N7ih6fW5sg4DwL0nkB9kI99Y,18570
30
30
  airbyte_cdk/exception_handler.py,sha256=D_doVl3Dt60ASXlJsfviOCswxGyKF2q0RL6rif3fNks,2013
31
- airbyte_cdk/logger.py,sha256=qi4UGuSYQQGaFaTVJlMD9lLppwqLXt1XBhwSXo-Q5IA,3660
31
+ airbyte_cdk/logger.py,sha256=1cURbvawbunCAV178q-XhTHcbAQZTSf07WhU7U9AXWU,3744
32
32
  airbyte_cdk/models/__init__.py,sha256=MOTiuML2wShBaMSIwikdjyye2uUWBjo4J1QFSbnoiM4,2075
33
33
  airbyte_cdk/models/airbyte_protocol.py,sha256=MCmLir67-hF12YM5OKzeGbWrlxr7ChG_OQSE1xG8EIU,3748
34
34
  airbyte_cdk/models/airbyte_protocol_serializers.py,sha256=s6SaFB2CMrG_7jTQGn_fhFbQ1FUxhCxf5kq2RWGHMVI,1749
@@ -214,8 +214,9 @@ airbyte_cdk/sources/file_based/discovery_policy/__init__.py,sha256=gl3ey6mZbyfra
214
214
  airbyte_cdk/sources/file_based/discovery_policy/abstract_discovery_policy.py,sha256=dCfXX529Rd5rtopg4VeEgTPJjFtqjtjzPq6LCw18Wt0,605
215
215
  airbyte_cdk/sources/file_based/discovery_policy/default_discovery_policy.py,sha256=-xujTidtrq6HC00WKbjQh1CZdT5LMuzkp5BLjqDmfTY,1007
216
216
  airbyte_cdk/sources/file_based/exceptions.py,sha256=WP0qkG6fpWoBpOyyicgp5YNE393VWyegq5qSy0v4QtM,7362
217
- airbyte_cdk/sources/file_based/file_based_source.py,sha256=JXfwc9KaW7PvjAbm2GJ7Ra3DJnCZH4KaE3WytYvtM1Q,18925
218
- airbyte_cdk/sources/file_based/file_based_stream_reader.py,sha256=d2UZ3C8M-A591KvBvg8kDpVdpox0rKVlRhVy5bi-auc,11209
217
+ airbyte_cdk/sources/file_based/file_based_source.py,sha256=HG4wok4kTEQYzoMxa3u_JwkgdUp_eHkqFMEx5Is7jOM,19934
218
+ airbyte_cdk/sources/file_based/file_based_stream_permissions_reader.py,sha256=hwwVTi5Ue5cPCzVM8jWOVbsTdjVRW4eDyVv8JMWFnyc,4846
219
+ airbyte_cdk/sources/file_based/file_based_stream_reader.py,sha256=0cmppYO3pZlFiJrs5oorF4JXv4ErhOeEMrdLG7P-Gdk,6742
219
220
  airbyte_cdk/sources/file_based/file_types/__init__.py,sha256=blCLn0-2LC-ZdgcNyDEhqM2RiUvEjEBh-G4-t32ZtuM,1268
220
221
  airbyte_cdk/sources/file_based/file_types/avro_parser.py,sha256=XNx-JC-sgzH9u3nOJ2M59FxBXvtig8LN6BIkeDOavZA,10858
221
222
  airbyte_cdk/sources/file_based/file_types/csv_parser.py,sha256=QlCXB-ry3np67Q_VerQEPoWDOTcPTB6Go4ydZxY9ae4,20445
@@ -242,8 +243,8 @@ airbyte_cdk/sources/file_based/stream/cursor/__init__.py,sha256=MhFB5hOo8sjwvCh8
242
243
  airbyte_cdk/sources/file_based/stream/cursor/abstract_file_based_cursor.py,sha256=om-x3gZFPgWDpi15S9RxZmR36VHnk8sytgN6LlBQhAw,1934
243
244
  airbyte_cdk/sources/file_based/stream/cursor/default_file_based_cursor.py,sha256=VGV7xLyBribuBMVrXtO1xqkWJD86bl7yhXtjnwLMohM,7051
244
245
  airbyte_cdk/sources/file_based/stream/default_file_based_stream.py,sha256=XLU5cNqQ-5mj243gNzMyXtm_oCtg1ORyoqbCsUo9Dn4,18044
245
- airbyte_cdk/sources/file_based/stream/identities_stream.py,sha256=DwgNU-jDp5vZ_WloQSUzBciDnAFMo8bXPjXpQx5-eko,1790
246
- airbyte_cdk/sources/file_based/stream/permissions_file_based_stream.py,sha256=i0Jn0zuAPomLa4pHSu9TQ3gAN5xXhNzPTYVwUDiDEyE,3523
246
+ airbyte_cdk/sources/file_based/stream/identities_stream.py,sha256=FZH83Geoy3K3nwUk2VVNJERFcXUTnl-4XljjucUM23s,1893
247
+ airbyte_cdk/sources/file_based/stream/permissions_file_based_stream.py,sha256=ke82qgm7snOlQTDx94Lqsc0cDkHWi3OJDTrPxffpFqc,3914
247
248
  airbyte_cdk/sources/file_based/types.py,sha256=INxG7OPnkdUP69oYNKMAbwhvV1AGvLRHs1J6pIia2FI,218
248
249
  airbyte_cdk/sources/http_config.py,sha256=OBZeuyFilm6NlDlBhFQvHhTWabEvZww6OHDIlZujIS0,730
249
250
  airbyte_cdk/sources/http_logger.py,sha256=H93kPAujHhPmXNX0JSFG3D-SL6yEFA5PtKot9Hu3TYA,1690
@@ -357,9 +358,9 @@ airbyte_cdk/utils/slice_hasher.py,sha256=EDxgROHDbfG-QKQb59m7h_7crN1tRiawdf5uU7G
357
358
  airbyte_cdk/utils/spec_schema_transformations.py,sha256=-5HTuNsnDBAhj-oLeQXwpTGA0HdcjFOf2zTEMUTTg_Y,816
358
359
  airbyte_cdk/utils/stream_status_utils.py,sha256=ZmBoiy5HVbUEHAMrUONxZvxnvfV9CesmQJLDTAIWnWw,1171
359
360
  airbyte_cdk/utils/traced_exception.py,sha256=C8uIBuCL_E4WnBAOPSxBicD06JAldoN9fGsQDp463OY,6292
360
- airbyte_cdk-6.38.3.dist-info/LICENSE.txt,sha256=Wfe61S4BaGPj404v8lrAbvhjYR68SHlkzeYrg3_bbuM,1051
361
- airbyte_cdk-6.38.3.dist-info/LICENSE_SHORT,sha256=aqF6D1NcESmpn-cqsxBtszTEnHKnlsp8L4x9wAh3Nxg,55
362
- airbyte_cdk-6.38.3.dist-info/METADATA,sha256=8jMYkKC_ie6Xm0bs5_gB5FcSirgKCNaCrUL4Rz01YIM,6013
363
- airbyte_cdk-6.38.3.dist-info/WHEEL,sha256=Nq82e9rUAnEjt98J6MlVmMCZb-t9cYE2Ir1kpBmnWfs,88
364
- airbyte_cdk-6.38.3.dist-info/entry_points.txt,sha256=fj-e3PAQvsxsQzyyq8UkG1k8spunWnD4BAH2AwlR6NM,95
365
- airbyte_cdk-6.38.3.dist-info/RECORD,,
361
+ airbyte_cdk-6.38.3.dev4100.dist-info/LICENSE.txt,sha256=Wfe61S4BaGPj404v8lrAbvhjYR68SHlkzeYrg3_bbuM,1051
362
+ airbyte_cdk-6.38.3.dev4100.dist-info/LICENSE_SHORT,sha256=aqF6D1NcESmpn-cqsxBtszTEnHKnlsp8L4x9wAh3Nxg,55
363
+ airbyte_cdk-6.38.3.dev4100.dist-info/METADATA,sha256=w60PKl3DfFjzvG3uKUtLCCEf0s83i-osbdqy2doggrc,6021
364
+ airbyte_cdk-6.38.3.dev4100.dist-info/WHEEL,sha256=Nq82e9rUAnEjt98J6MlVmMCZb-t9cYE2Ir1kpBmnWfs,88
365
+ airbyte_cdk-6.38.3.dev4100.dist-info/entry_points.txt,sha256=fj-e3PAQvsxsQzyyq8UkG1k8spunWnD4BAH2AwlR6NM,95
366
+ airbyte_cdk-6.38.3.dev4100.dist-info/RECORD,,