airbyte-cdk 6.48.3__py3-none-any.whl → 6.48.4__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,36 +1,71 @@
1
1
  # Copyright (c) 2025 Airbyte, Inc., all rights reserved.
2
- """Secret management commands.
2
+ """**Secret management commands.**
3
3
 
4
4
  This module provides commands for managing secrets for Airbyte connectors.
5
5
 
6
- Usage:
7
- airbyte-cdk secrets fetch --connector-name source-github
8
- airbyte-cdk secrets fetch --connector-directory /path/to/connector
9
- airbyte-cdk secrets fetch # Run from within a connector directory
6
+ **Usage:**
10
7
 
11
- Usage without pre-installing (stateless):
12
- pipx run airbyte-cdk secrets fetch ...
13
- uvx airbyte-cdk secrets fetch ...
8
+ ```bash
9
+ # Fetch secrets
10
+ airbyte-cdk secrets fetch --connector-name source-github
11
+ airbyte-cdk secrets fetch --connector-directory /path/to/connector
12
+ airbyte-cdk secrets fetch # Run from within a connector directory
14
13
 
15
- The 'fetch' command retrieves secrets from Google Secret Manager based on connector
14
+ # List secrets (without fetching)
15
+ airbyte-cdk secrets list --connector-name source-github
16
+ airbyte-cdk secrets list --connector-directory /path/to/connector
17
+ ```
18
+
19
+ **Usage without pre-installing (stateless):**
20
+
21
+ ```bash
22
+ pipx run airbyte-cdk secrets fetch ...
23
+ uvx airbyte-cdk secrets fetch ...
24
+ ```
25
+
26
+ The command retrieves secrets from Google Secret Manager based on connector
16
27
  labels and writes them to the connector's `secrets` directory.
17
28
  """
18
29
 
30
+ from __future__ import annotations
31
+
19
32
  import json
33
+ import logging
20
34
  import os
35
+ from functools import lru_cache
21
36
  from pathlib import Path
37
+ from typing import Any, cast
22
38
 
39
+ import requests
23
40
  import rich_click as click
41
+ import yaml
42
+ from click import style
43
+ from rich.console import Console
44
+ from rich.table import Table
24
45
 
25
- from airbyte_cdk.cli.airbyte_cdk._util import resolve_connector_name_and_directory
46
+ from airbyte_cdk.cli.airbyte_cdk._util import (
47
+ resolve_connector_name,
48
+ resolve_connector_name_and_directory,
49
+ )
26
50
 
27
51
  AIRBYTE_INTERNAL_GCP_PROJECT = "dataline-integration-testing"
28
52
  CONNECTOR_LABEL = "connector"
53
+ GLOBAL_MASK_KEYS_URL = "https://connectors.airbyte.com/files/registries/v0/specs_secrets_mask.yaml"
54
+
55
+ logger = logging.getLogger("airbyte-cdk.cli.secrets")
56
+
57
+ try:
58
+ from google.cloud import secretmanager_v1 as secretmanager
59
+ from google.cloud.secretmanager_v1 import Secret
60
+ except ImportError:
61
+ # If the package is not installed, we will raise an error in the CLI command.
62
+ secretmanager = None # type: ignore
63
+ Secret = None # type: ignore
29
64
 
30
65
 
31
66
  @click.group(
32
67
  name="secrets",
33
- help=__doc__.replace("\n", "\n\n"), # Render docstring as help text (markdown)
68
+ help=__doc__.replace("\n", "\n\n"), # Render docstring as help text (markdown) # type: ignore
34
69
  )
35
70
  def secrets_cli_group() -> None:
36
71
  """Secret management commands."""
@@ -54,10 +89,18 @@ def secrets_cli_group() -> None:
54
89
  default=AIRBYTE_INTERNAL_GCP_PROJECT,
55
90
  help=f"GCP project ID. Defaults to '{AIRBYTE_INTERNAL_GCP_PROJECT}'.",
56
91
  )
92
+ @click.option(
93
+ "--print-ci-secrets-masks",
94
+ help="Print GitHub CI mask for secrets.",
95
+ type=bool,
96
+ is_flag=True,
97
+ default=False,
98
+ )
57
99
  def fetch(
58
100
  connector_name: str | None = None,
59
101
  connector_directory: Path | None = None,
60
102
  gcp_project_id: str = AIRBYTE_INTERNAL_GCP_PROJECT,
103
+ print_ci_secrets_masks: bool = False,
61
104
  ) -> None:
62
105
  """Fetch secrets for a connector from Google Secret Manager.
63
106
 
@@ -67,19 +110,185 @@ def fetch(
67
110
  If no connector name or directory is provided, we will look within the current working
68
111
  directory. If the current working directory is not a connector directory (e.g. starting
69
112
  with 'source-') and no connector name or path is provided, the process will fail.
113
+
114
+ The `--print-ci-secrets-masks` option will print the GitHub CI mask for the secrets.
115
+ This is useful for masking secrets in CI logs.
116
+
117
+ WARNING: This action causes the secrets to be printed in clear text to `STDOUT`. For security
118
+ reasons, this function will only execute if the `CI` environment variable is set. Otherwise,
119
+ masks will not be printed.
70
120
  """
71
- try:
72
- from google.cloud import secretmanager_v1 as secretmanager
73
- except ImportError:
121
+ click.echo("Fetching secrets...", err=True)
122
+
123
+ client = _get_gsm_secrets_client()
124
+ connector_name, connector_directory = resolve_connector_name_and_directory(
125
+ connector_name=connector_name,
126
+ connector_directory=connector_directory,
127
+ )
128
+ secrets_dir = _get_secrets_dir(
129
+ connector_directory=connector_directory,
130
+ connector_name=connector_name,
131
+ ensure_exists=True,
132
+ )
133
+ secrets = _fetch_secret_handles(
134
+ connector_name=connector_name,
135
+ gcp_project_id=gcp_project_id,
136
+ )
137
+ # Fetch and write secrets
138
+ secret_count = 0
139
+ for secret in secrets:
140
+ secret_file_path = _get_secret_filepath(
141
+ secrets_dir=secrets_dir,
142
+ secret=secret,
143
+ )
144
+ _write_secret_file(
145
+ secret=secret,
146
+ client=client,
147
+ file_path=secret_file_path,
148
+ )
149
+ click.echo(f"Secret written to: {secret_file_path.absolute()!s}", err=True)
150
+ secret_count += 1
151
+
152
+ if secret_count == 0:
153
+ click.echo(
154
+ f"No secrets found for connector: '{connector_name}'",
155
+ err=True,
156
+ )
157
+
158
+ if not print_ci_secrets_masks:
159
+ return
160
+
161
+ if not os.environ.get("CI", None):
162
+ click.echo(
163
+ "The `--print-ci-secrets-masks` option is only available in CI environments. "
164
+ "The `CI` env var is either not set or not set to a truthy value. "
165
+ "Skipping printing secret masks.",
166
+ err=True,
167
+ )
168
+ return
169
+
170
+ # Else print the CI mask
171
+ _print_ci_secrets_masks(
172
+ secrets_dir=secrets_dir,
173
+ )
174
+
175
+
176
+ @secrets_cli_group.command("list")
177
+ @click.option(
178
+ "--connector-name",
179
+ type=str,
180
+ help="Name of the connector to fetch secrets for. Ignored if --connector-directory is provided.",
181
+ )
182
+ @click.option(
183
+ "--connector-directory",
184
+ type=click.Path(exists=True, file_okay=False, path_type=Path),
185
+ help="Path to the connector directory.",
186
+ )
187
+ @click.option(
188
+ "--gcp-project-id",
189
+ type=str,
190
+ default=AIRBYTE_INTERNAL_GCP_PROJECT,
191
+ help=f"GCP project ID. Defaults to '{AIRBYTE_INTERNAL_GCP_PROJECT}'.",
192
+ )
193
+ def list_(
194
+ connector_name: str | None = None,
195
+ connector_directory: Path | None = None,
196
+ gcp_project_id: str = AIRBYTE_INTERNAL_GCP_PROJECT,
197
+ ) -> None:
198
+ """List secrets for a connector from Google Secret Manager.
199
+
200
+ This command fetches secrets for a connector from Google Secret Manager and prints
201
+ them as a table.
202
+
203
+ If no connector name or directory is provided, we will look within the current working
204
+ directory. If the current working directory is not a connector directory (e.g. starting
205
+ with 'source-') and no connector name or path is provided, the process will fail.
206
+ """
207
+ click.echo("Scanning secrets...", err=True)
208
+
209
+ connector_name = connector_name or resolve_connector_name(
210
+ connector_directory=connector_directory or Path().resolve().absolute(),
211
+ )
212
+ secrets: list[Secret] = _fetch_secret_handles( # type: ignore
213
+ connector_name=connector_name,
214
+ gcp_project_id=gcp_project_id,
215
+ )
216
+
217
+ if not secrets:
218
+ click.echo(
219
+ f"No secrets found for connector: '{connector_name}'",
220
+ err=True,
221
+ )
222
+ return
223
+ # print a rich table with the secrets
224
+ click.echo(
225
+ style(
226
+ f"Secrets for connector '{connector_name}' in project '{gcp_project_id}':",
227
+ fg="green",
228
+ )
229
+ )
230
+
231
+ console = Console()
232
+ table = Table(title=f"'{connector_name}' Secrets")
233
+ table.add_column("Name", justify="left", style="cyan", overflow="fold")
234
+ table.add_column("Labels", justify="left", style="magenta", overflow="fold")
235
+ table.add_column("Created", justify="left", style="blue", overflow="fold")
236
+ for secret in secrets:
237
+ full_secret_name = secret.name
238
+ secret_name = full_secret_name.split("/secrets/")[-1] # Removes project prefix
239
+ # E.g. https://console.cloud.google.com/security/secret-manager/secret/SECRET_SOURCE-SHOPIFY__CREDS/versions?hl=en&project=<gcp_project_id>
240
+ secret_url = f"https://console.cloud.google.com/security/secret-manager/secret/{secret_name}/versions?hl=en&project={gcp_project_id}"
241
+ table.add_row(
242
+ f"[link={secret_url}]{secret_name}[/link]",
243
+ "\n".join([f"{k}={v}" for k, v in secret.labels.items()]),
244
+ str(secret.create_time),
245
+ )
246
+
247
+ console.print(table)
248
+
249
+
250
+ def _fetch_secret_handles(
251
+ connector_name: str,
252
+ gcp_project_id: str = AIRBYTE_INTERNAL_GCP_PROJECT,
253
+ ) -> list["Secret"]: # type: ignore
254
+ """Fetch secrets from Google Secret Manager."""
255
+ if not secretmanager:
74
256
  raise ImportError(
75
257
  "google-cloud-secret-manager package is required for Secret Manager integration. "
76
258
  "Install it with 'pip install airbyte-cdk[dev]' "
77
259
  "or 'pip install google-cloud-secret-manager'."
78
260
  )
79
261
 
80
- click.echo("Fetching secrets...")
262
+ client = _get_gsm_secrets_client()
263
+
264
+ # List all secrets with the connector label
265
+ parent = f"projects/{gcp_project_id}"
266
+ filter_string = f"labels.{CONNECTOR_LABEL}={connector_name}"
267
+ secrets = client.list_secrets(
268
+ request=secretmanager.ListSecretsRequest(
269
+ parent=parent,
270
+ filter=filter_string,
271
+ )
272
+ )
273
+ return [s for s in secrets]
274
+
81
275
 
82
- # Resolve connector name/directory
276
+ def _write_secret_file(
277
+ secret: "Secret", # type: ignore
278
+ client: "secretmanager.SecretManagerServiceClient", # type: ignore
279
+ file_path: Path,
280
+ ) -> None:
281
+ version_name = f"{secret.name}/versions/latest"
282
+ response = client.access_secret_version(name=version_name)
283
+ file_path.write_text(response.payload.data.decode("UTF-8"))
284
+ file_path.chmod(0o600) # default to owner read/write only
285
+
286
+
287
+ def _get_secrets_dir(
288
+ connector_directory: Path,
289
+ connector_name: str,
290
+ ensure_exists: bool = True,
291
+ ) -> Path:
83
292
  try:
84
293
  connector_name, connector_directory = resolve_connector_name_and_directory(
85
294
  connector_name=connector_name,
@@ -95,56 +304,121 @@ def fetch(
95
304
  except ValueError as e:
96
305
  raise ValueError(str(e))
97
306
 
98
- # Create secrets directory if it doesn't exist
99
307
  secrets_dir = connector_directory / "secrets"
100
- secrets_dir.mkdir(parents=True, exist_ok=True)
308
+ if ensure_exists:
309
+ secrets_dir.mkdir(parents=True, exist_ok=True)
310
+
311
+ gitignore_path = secrets_dir / ".gitignore"
312
+ if not gitignore_path.exists():
313
+ gitignore_path.write_text("*")
101
314
 
102
- gitignore_path = secrets_dir / ".gitignore"
103
- gitignore_path.write_text("*")
315
+ return secrets_dir
316
+
317
+
318
+ def _get_secret_filepath(
319
+ secrets_dir: Path,
320
+ secret: Secret, # type: ignore
321
+ ) -> Path:
322
+ """Get the file path for a secret based on its labels."""
323
+ if secret.labels and "filename" in secret.labels:
324
+ return secrets_dir / f"{secret.labels['filename']}.json"
325
+
326
+ return secrets_dir / "config.json" # Default filename
327
+
328
+
329
+ def _get_gsm_secrets_client() -> "secretmanager.SecretManagerServiceClient": # type: ignore
330
+ """Get the Google Secret Manager client."""
331
+ if not secretmanager:
332
+ raise ImportError(
333
+ "google-cloud-secret-manager package is required for Secret Manager integration. "
334
+ "Install it with 'pip install airbyte-cdk[dev]' "
335
+ "or 'pip install google-cloud-secret-manager'."
336
+ )
104
337
 
105
- # Get GSM client
106
338
  credentials_json = os.environ.get("GCP_GSM_CREDENTIALS")
107
339
  if not credentials_json:
108
340
  raise ValueError(
109
- "No Google Cloud credentials found. Please set the GCP_GSM_CREDENTIALS environment variable."
341
+ "No Google Cloud credentials found. "
342
+ "Please set the `GCP_GSM_CREDENTIALS` environment variable."
110
343
  )
111
344
 
112
- client = secretmanager.SecretManagerServiceClient.from_service_account_info(
113
- json.loads(credentials_json)
345
+ return cast(
346
+ "secretmanager.SecretManagerServiceClient",
347
+ secretmanager.SecretManagerServiceClient.from_service_account_info(
348
+ json.loads(credentials_json)
349
+ ),
114
350
  )
115
351
 
116
- # List all secrets with the connector label
117
- parent = f"projects/{gcp_project_id}"
118
- filter_string = f"labels.{CONNECTOR_LABEL}={connector_name}"
119
- secrets = client.list_secrets(
120
- request=secretmanager.ListSecretsRequest(
121
- parent=parent,
122
- filter=filter_string,
352
+
353
+ def _print_ci_secrets_masks(
354
+ secrets_dir: Path,
355
+ ) -> None:
356
+ """Print GitHub CI mask for secrets.
357
+
358
+ https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions#example-masking-an-environment-variable
359
+
360
+ The env var `CI` is set to a truthy value in GitHub Actions, so we can use it to
361
+ determine if we are in a CI environment. If not, we don't want to print the masks,
362
+ as it will cause the secrets to be printed in clear text to STDOUT.
363
+ """
364
+ if not os.environ.get("CI", None):
365
+ click.echo(
366
+ "The `--print-ci-secrets-masks` option is only available in CI environments. "
367
+ "The `CI` env var is either not set or not set to a truthy value. "
368
+ "Skipping printing secret masks.",
369
+ err=True,
123
370
  )
124
- )
371
+ return
125
372
 
126
- # Fetch and write secrets
127
- secret_count = 0
128
- for secret in secrets:
129
- secret_name = secret.name
130
- version_name = f"{secret_name}/versions/latest"
131
- response = client.access_secret_version(name=version_name)
132
- payload = response.payload.data.decode("UTF-8")
133
-
134
- filename_base = "config" # Default filename
135
- if secret.labels and "filename" in secret.labels:
136
- filename_base = secret.labels["filename"]
137
-
138
- secret_file_path = secrets_dir / f"{filename_base}.json"
139
- secret_file_path.write_text(payload)
140
- secret_file_path.chmod(0o600) # default to owner read/write only
141
- click.echo(f"Secret written to: {secret_file_path.absolute()!s}")
142
- secret_count += 1
373
+ for secret_file_path in secrets_dir.glob("*.json"):
374
+ config_dict = json.loads(secret_file_path.read_text())
375
+ _print_ci_secrets_masks_for_config(config=config_dict)
143
376
 
144
- if secret_count == 0:
145
- click.echo(f"No secrets found for connector: {connector_name}")
377
+
378
+ def _print_ci_secrets_masks_for_config(
379
+ config: dict[str, str] | list[Any] | Any,
380
+ ) -> None:
381
+ """Print GitHub CI mask for secrets config, navigating child nodes recursively."""
382
+ if isinstance(config, list):
383
+ for item in config:
384
+ _print_ci_secrets_masks_for_config(item)
385
+
386
+ if isinstance(config, dict):
387
+ for key, value in config.items():
388
+ if _is_secret_property(key):
389
+ logger.debug(f"Masking secret for config key: {key}")
390
+ print(f"::add-mask::{value!s}")
391
+ if isinstance(value, dict):
392
+ # For nested dicts, we also need to mask the json-stringified version
393
+ print(f"::add-mask::{json.dumps(value)!s}")
394
+
395
+ if isinstance(value, (dict, list)):
396
+ _print_ci_secrets_masks_for_config(config=value)
146
397
 
147
398
 
148
- __all__ = [
149
- "secrets_cli_group",
150
- ]
399
+ def _is_secret_property(property_name: str) -> bool:
400
+ """Check if the property name is in the list of properties to mask.
401
+
402
+ To avoid false negatives, we perform a case-insensitive check, and we include any property name
403
+ that contains a rule entry, even if it is not an exact match.
404
+
405
+ For example, if the rule entry is "password", we will also match "PASSWORD" and "my_password".
406
+ """
407
+ names_to_mask: list[str] = _get_spec_mask()
408
+ if any([mask.lower() in property_name.lower() for mask in names_to_mask]):
409
+ return True
410
+
411
+ return False
412
+
413
+
414
+ @lru_cache
415
+ def _get_spec_mask() -> list[str]:
416
+ """Get the list of properties to mask from the spec mask file."""
417
+ response = requests.get(GLOBAL_MASK_KEYS_URL, allow_redirects=True)
418
+ if not response.ok:
419
+ logger.error(f"Failed to fetch spec mask: {response.content.decode('utf-8')}")
420
+ try:
421
+ return cast(list[str], yaml.safe_load(response.content)["properties"])
422
+ except Exception as e:
423
+ logger.error(f"Failed to parse spec mask: {e}")
424
+ raise
@@ -41,3 +41,29 @@ def resolve_connector_name_and_directory(
41
41
  raise ValueError("Either connector_name or connector_directory must be provided.")
42
42
 
43
43
  return connector_name, connector_directory
44
+
45
+
46
+ def resolve_connector_name(
47
+ connector_directory: Path,
48
+ ) -> str:
49
+ """Resolve the connector name.
50
+
51
+ This function will resolve the connector name based on the provided connector directory.
52
+ If the current working directory is not a connector directory
53
+ (e.g. starting with 'source-'), the process will fail.
54
+
55
+ Raises:
56
+ FileNotFoundError: If the connector directory does not exist or cannot be found.
57
+ """
58
+ if not connector_directory:
59
+ raise FileNotFoundError(
60
+ "Connector directory does not exist or cannot be found. Please provide a valid "
61
+ "connector directory."
62
+ )
63
+ connector_name = connector_directory.absolute().name
64
+ if not connector_name.startswith("source-") and not connector_name.startswith("destination-"):
65
+ raise ValueError(
66
+ f"Connector directory '{connector_name}' does not look like a valid connector directory. "
67
+ f"Full path: {connector_directory.absolute()}"
68
+ )
69
+ return connector_name
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: airbyte-cdk
3
- Version: 6.48.3
3
+ Version: 6.48.4
4
4
  Summary: A framework for writing Airbyte Connectors.
5
5
  Home-page: https://airbyte.com
6
6
  License: MIT
@@ -66,6 +66,7 @@ Requires-Dist: pytz (==2024.2)
66
66
  Requires-Dist: rapidfuzz (>=3.10.1,<4.0.0)
67
67
  Requires-Dist: requests
68
68
  Requires-Dist: requests_cache
69
+ Requires-Dist: rich
69
70
  Requires-Dist: rich-click (>=1.8.8,<2.0.0)
70
71
  Requires-Dist: serpyco-rs (>=1.10.2,<2.0.0)
71
72
  Requires-Dist: sqlalchemy (>=2.0,<3.0,!=2.0.36) ; extra == "sql"
@@ -4,8 +4,8 @@ airbyte_cdk/cli/airbyte_cdk/__init__.py,sha256=8IoEcbdYr7CMAh97Xut5__uHH9vV4LKUt
4
4
  airbyte_cdk/cli/airbyte_cdk/_connector.py,sha256=bz6PGAuer17mSTkbCw10rTllOEjG_gw3U2lsvXAcPQE,5337
5
5
  airbyte_cdk/cli/airbyte_cdk/_image.py,sha256=F0XtvR2CyFi1EPIUBiEnDia9NfCuM7T_itdNj9yyb2E,2907
6
6
  airbyte_cdk/cli/airbyte_cdk/_manifest.py,sha256=aFdeeWgek7oXR3YfZPxk7kBZ64Blmsr0dAXN6BVGiIA,482
7
- airbyte_cdk/cli/airbyte_cdk/_secrets.py,sha256=AOHrMwEeKeEq9icDTu5Zrhw7CzC1lvoxFk1cA0aW3-M,5221
8
- airbyte_cdk/cli/airbyte_cdk/_util.py,sha256=kEvq7OkjDjn7G25gk15xTaMRp6gAWzD68e0PkZBADoY,1714
7
+ airbyte_cdk/cli/airbyte_cdk/_secrets.py,sha256=iRA8435sYDcWe6IBv4VAo-3yTIAFqySbDvmUsgpEInA,14712
8
+ airbyte_cdk/cli/airbyte_cdk/_util.py,sha256=bnzBIAIvuukbOwYwHXay33yAkyyOVJw24xNjNXsPG74,2732
9
9
  airbyte_cdk/cli/airbyte_cdk/_version.py,sha256=ohZNIktLFk91sdzqFW5idaNrZAPX2dIRnz---_fcKOE,352
10
10
  airbyte_cdk/cli/source_declarative_manifest/__init__.py,sha256=-0ST722Nj65bgRokzpzPkD1NBBW5CytEHFUe38cB86Q,91
11
11
  airbyte_cdk/cli/source_declarative_manifest/_run.py,sha256=9qtbjt-I_stGWzWX6yVUKO_eE-Ga7g-uTuibML9qLBs,8330
@@ -408,9 +408,9 @@ airbyte_cdk/utils/slice_hasher.py,sha256=EDxgROHDbfG-QKQb59m7h_7crN1tRiawdf5uU7G
408
408
  airbyte_cdk/utils/spec_schema_transformations.py,sha256=-5HTuNsnDBAhj-oLeQXwpTGA0HdcjFOf2zTEMUTTg_Y,816
409
409
  airbyte_cdk/utils/stream_status_utils.py,sha256=ZmBoiy5HVbUEHAMrUONxZvxnvfV9CesmQJLDTAIWnWw,1171
410
410
  airbyte_cdk/utils/traced_exception.py,sha256=C8uIBuCL_E4WnBAOPSxBicD06JAldoN9fGsQDp463OY,6292
411
- airbyte_cdk-6.48.3.dist-info/LICENSE.txt,sha256=Wfe61S4BaGPj404v8lrAbvhjYR68SHlkzeYrg3_bbuM,1051
412
- airbyte_cdk-6.48.3.dist-info/LICENSE_SHORT,sha256=aqF6D1NcESmpn-cqsxBtszTEnHKnlsp8L4x9wAh3Nxg,55
413
- airbyte_cdk-6.48.3.dist-info/METADATA,sha256=LwIvW38MkG7ondTet4rpAEzG7yFhQkEjmZdtZEKreBc,6323
414
- airbyte_cdk-6.48.3.dist-info/WHEEL,sha256=Nq82e9rUAnEjt98J6MlVmMCZb-t9cYE2Ir1kpBmnWfs,88
415
- airbyte_cdk-6.48.3.dist-info/entry_points.txt,sha256=AKWbEkHfpzzk9nF9tqBUaw1MbvTM4mGtEzmZQm0ZWvM,139
416
- airbyte_cdk-6.48.3.dist-info/RECORD,,
411
+ airbyte_cdk-6.48.4.dist-info/LICENSE.txt,sha256=Wfe61S4BaGPj404v8lrAbvhjYR68SHlkzeYrg3_bbuM,1051
412
+ airbyte_cdk-6.48.4.dist-info/LICENSE_SHORT,sha256=aqF6D1NcESmpn-cqsxBtszTEnHKnlsp8L4x9wAh3Nxg,55
413
+ airbyte_cdk-6.48.4.dist-info/METADATA,sha256=hXMMplkbvREua_CfMKw1NaOIGbD43pmoz1tURhdTUWg,6343
414
+ airbyte_cdk-6.48.4.dist-info/WHEEL,sha256=Nq82e9rUAnEjt98J6MlVmMCZb-t9cYE2Ir1kpBmnWfs,88
415
+ airbyte_cdk-6.48.4.dist-info/entry_points.txt,sha256=AKWbEkHfpzzk9nF9tqBUaw1MbvTM4mGtEzmZQm0ZWvM,139
416
+ airbyte_cdk-6.48.4.dist-info/RECORD,,