airbyte-cdk 6.48.3__py3-none-any.whl → 6.48.4__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- airbyte_cdk/cli/airbyte_cdk/_secrets.py +328 -54
- airbyte_cdk/cli/airbyte_cdk/_util.py +26 -0
- {airbyte_cdk-6.48.3.dist-info → airbyte_cdk-6.48.4.dist-info}/METADATA +2 -1
- {airbyte_cdk-6.48.3.dist-info → airbyte_cdk-6.48.4.dist-info}/RECORD +8 -8
- {airbyte_cdk-6.48.3.dist-info → airbyte_cdk-6.48.4.dist-info}/LICENSE.txt +0 -0
- {airbyte_cdk-6.48.3.dist-info → airbyte_cdk-6.48.4.dist-info}/LICENSE_SHORT +0 -0
- {airbyte_cdk-6.48.3.dist-info → airbyte_cdk-6.48.4.dist-info}/WHEEL +0 -0
- {airbyte_cdk-6.48.3.dist-info → airbyte_cdk-6.48.4.dist-info}/entry_points.txt +0 -0
@@ -1,36 +1,71 @@
|
|
1
1
|
# Copyright (c) 2025 Airbyte, Inc., all rights reserved.
|
2
|
-
"""Secret management commands
|
2
|
+
"""**Secret management commands.**
|
3
3
|
|
4
4
|
This module provides commands for managing secrets for Airbyte connectors.
|
5
5
|
|
6
|
-
Usage
|
7
|
-
airbyte-cdk secrets fetch --connector-name source-github
|
8
|
-
airbyte-cdk secrets fetch --connector-directory /path/to/connector
|
9
|
-
airbyte-cdk secrets fetch # Run from within a connector directory
|
6
|
+
**Usage:**
|
10
7
|
|
11
|
-
|
12
|
-
|
13
|
-
|
8
|
+
```bash
|
9
|
+
# Fetch secrets
|
10
|
+
airbyte-cdk secrets fetch --connector-name source-github
|
11
|
+
airbyte-cdk secrets fetch --connector-directory /path/to/connector
|
12
|
+
airbyte-cdk secrets fetch # Run from within a connector directory
|
14
13
|
|
15
|
-
|
14
|
+
# List secrets (without fetching)
|
15
|
+
airbyte-cdk secrets list --connector-name source-github
|
16
|
+
airbyte-cdk secrets list --connector-directory /path/to/connector
|
17
|
+
```
|
18
|
+
|
19
|
+
**Usage without pre-installing (stateless):**
|
20
|
+
|
21
|
+
```bash
|
22
|
+
pipx run airbyte-cdk secrets fetch ...
|
23
|
+
uvx airbyte-cdk secrets fetch ...
|
24
|
+
```
|
25
|
+
|
26
|
+
The command retrieves secrets from Google Secret Manager based on connector
|
16
27
|
labels and writes them to the connector's `secrets` directory.
|
17
28
|
"""
|
18
29
|
|
30
|
+
from __future__ import annotations
|
31
|
+
|
19
32
|
import json
|
33
|
+
import logging
|
20
34
|
import os
|
35
|
+
from functools import lru_cache
|
21
36
|
from pathlib import Path
|
37
|
+
from typing import Any, cast
|
22
38
|
|
39
|
+
import requests
|
23
40
|
import rich_click as click
|
41
|
+
import yaml
|
42
|
+
from click import style
|
43
|
+
from rich.console import Console
|
44
|
+
from rich.table import Table
|
24
45
|
|
25
|
-
from airbyte_cdk.cli.airbyte_cdk._util import
|
46
|
+
from airbyte_cdk.cli.airbyte_cdk._util import (
|
47
|
+
resolve_connector_name,
|
48
|
+
resolve_connector_name_and_directory,
|
49
|
+
)
|
26
50
|
|
27
51
|
AIRBYTE_INTERNAL_GCP_PROJECT = "dataline-integration-testing"
|
28
52
|
CONNECTOR_LABEL = "connector"
|
53
|
+
GLOBAL_MASK_KEYS_URL = "https://connectors.airbyte.com/files/registries/v0/specs_secrets_mask.yaml"
|
54
|
+
|
55
|
+
logger = logging.getLogger("airbyte-cdk.cli.secrets")
|
56
|
+
|
57
|
+
try:
|
58
|
+
from google.cloud import secretmanager_v1 as secretmanager
|
59
|
+
from google.cloud.secretmanager_v1 import Secret
|
60
|
+
except ImportError:
|
61
|
+
# If the package is not installed, we will raise an error in the CLI command.
|
62
|
+
secretmanager = None # type: ignore
|
63
|
+
Secret = None # type: ignore
|
29
64
|
|
30
65
|
|
31
66
|
@click.group(
|
32
67
|
name="secrets",
|
33
|
-
help=__doc__.replace("\n", "\n\n"), # Render docstring as help text (markdown)
|
68
|
+
help=__doc__.replace("\n", "\n\n"), # Render docstring as help text (markdown) # type: ignore
|
34
69
|
)
|
35
70
|
def secrets_cli_group() -> None:
|
36
71
|
"""Secret management commands."""
|
@@ -54,10 +89,18 @@ def secrets_cli_group() -> None:
|
|
54
89
|
default=AIRBYTE_INTERNAL_GCP_PROJECT,
|
55
90
|
help=f"GCP project ID. Defaults to '{AIRBYTE_INTERNAL_GCP_PROJECT}'.",
|
56
91
|
)
|
92
|
+
@click.option(
|
93
|
+
"--print-ci-secrets-masks",
|
94
|
+
help="Print GitHub CI mask for secrets.",
|
95
|
+
type=bool,
|
96
|
+
is_flag=True,
|
97
|
+
default=False,
|
98
|
+
)
|
57
99
|
def fetch(
|
58
100
|
connector_name: str | None = None,
|
59
101
|
connector_directory: Path | None = None,
|
60
102
|
gcp_project_id: str = AIRBYTE_INTERNAL_GCP_PROJECT,
|
103
|
+
print_ci_secrets_masks: bool = False,
|
61
104
|
) -> None:
|
62
105
|
"""Fetch secrets for a connector from Google Secret Manager.
|
63
106
|
|
@@ -67,19 +110,185 @@ def fetch(
|
|
67
110
|
If no connector name or directory is provided, we will look within the current working
|
68
111
|
directory. If the current working directory is not a connector directory (e.g. starting
|
69
112
|
with 'source-') and no connector name or path is provided, the process will fail.
|
113
|
+
|
114
|
+
The `--print-ci-secrets-masks` option will print the GitHub CI mask for the secrets.
|
115
|
+
This is useful for masking secrets in CI logs.
|
116
|
+
|
117
|
+
WARNING: This action causes the secrets to be printed in clear text to `STDOUT`. For security
|
118
|
+
reasons, this function will only execute if the `CI` environment variable is set. Otherwise,
|
119
|
+
masks will not be printed.
|
70
120
|
"""
|
71
|
-
|
72
|
-
|
73
|
-
|
121
|
+
click.echo("Fetching secrets...", err=True)
|
122
|
+
|
123
|
+
client = _get_gsm_secrets_client()
|
124
|
+
connector_name, connector_directory = resolve_connector_name_and_directory(
|
125
|
+
connector_name=connector_name,
|
126
|
+
connector_directory=connector_directory,
|
127
|
+
)
|
128
|
+
secrets_dir = _get_secrets_dir(
|
129
|
+
connector_directory=connector_directory,
|
130
|
+
connector_name=connector_name,
|
131
|
+
ensure_exists=True,
|
132
|
+
)
|
133
|
+
secrets = _fetch_secret_handles(
|
134
|
+
connector_name=connector_name,
|
135
|
+
gcp_project_id=gcp_project_id,
|
136
|
+
)
|
137
|
+
# Fetch and write secrets
|
138
|
+
secret_count = 0
|
139
|
+
for secret in secrets:
|
140
|
+
secret_file_path = _get_secret_filepath(
|
141
|
+
secrets_dir=secrets_dir,
|
142
|
+
secret=secret,
|
143
|
+
)
|
144
|
+
_write_secret_file(
|
145
|
+
secret=secret,
|
146
|
+
client=client,
|
147
|
+
file_path=secret_file_path,
|
148
|
+
)
|
149
|
+
click.echo(f"Secret written to: {secret_file_path.absolute()!s}", err=True)
|
150
|
+
secret_count += 1
|
151
|
+
|
152
|
+
if secret_count == 0:
|
153
|
+
click.echo(
|
154
|
+
f"No secrets found for connector: '{connector_name}'",
|
155
|
+
err=True,
|
156
|
+
)
|
157
|
+
|
158
|
+
if not print_ci_secrets_masks:
|
159
|
+
return
|
160
|
+
|
161
|
+
if not os.environ.get("CI", None):
|
162
|
+
click.echo(
|
163
|
+
"The `--print-ci-secrets-masks` option is only available in CI environments. "
|
164
|
+
"The `CI` env var is either not set or not set to a truthy value. "
|
165
|
+
"Skipping printing secret masks.",
|
166
|
+
err=True,
|
167
|
+
)
|
168
|
+
return
|
169
|
+
|
170
|
+
# Else print the CI mask
|
171
|
+
_print_ci_secrets_masks(
|
172
|
+
secrets_dir=secrets_dir,
|
173
|
+
)
|
174
|
+
|
175
|
+
|
176
|
+
@secrets_cli_group.command("list")
|
177
|
+
@click.option(
|
178
|
+
"--connector-name",
|
179
|
+
type=str,
|
180
|
+
help="Name of the connector to fetch secrets for. Ignored if --connector-directory is provided.",
|
181
|
+
)
|
182
|
+
@click.option(
|
183
|
+
"--connector-directory",
|
184
|
+
type=click.Path(exists=True, file_okay=False, path_type=Path),
|
185
|
+
help="Path to the connector directory.",
|
186
|
+
)
|
187
|
+
@click.option(
|
188
|
+
"--gcp-project-id",
|
189
|
+
type=str,
|
190
|
+
default=AIRBYTE_INTERNAL_GCP_PROJECT,
|
191
|
+
help=f"GCP project ID. Defaults to '{AIRBYTE_INTERNAL_GCP_PROJECT}'.",
|
192
|
+
)
|
193
|
+
def list_(
|
194
|
+
connector_name: str | None = None,
|
195
|
+
connector_directory: Path | None = None,
|
196
|
+
gcp_project_id: str = AIRBYTE_INTERNAL_GCP_PROJECT,
|
197
|
+
) -> None:
|
198
|
+
"""List secrets for a connector from Google Secret Manager.
|
199
|
+
|
200
|
+
This command fetches secrets for a connector from Google Secret Manager and prints
|
201
|
+
them as a table.
|
202
|
+
|
203
|
+
If no connector name or directory is provided, we will look within the current working
|
204
|
+
directory. If the current working directory is not a connector directory (e.g. starting
|
205
|
+
with 'source-') and no connector name or path is provided, the process will fail.
|
206
|
+
"""
|
207
|
+
click.echo("Scanning secrets...", err=True)
|
208
|
+
|
209
|
+
connector_name = connector_name or resolve_connector_name(
|
210
|
+
connector_directory=connector_directory or Path().resolve().absolute(),
|
211
|
+
)
|
212
|
+
secrets: list[Secret] = _fetch_secret_handles( # type: ignore
|
213
|
+
connector_name=connector_name,
|
214
|
+
gcp_project_id=gcp_project_id,
|
215
|
+
)
|
216
|
+
|
217
|
+
if not secrets:
|
218
|
+
click.echo(
|
219
|
+
f"No secrets found for connector: '{connector_name}'",
|
220
|
+
err=True,
|
221
|
+
)
|
222
|
+
return
|
223
|
+
# print a rich table with the secrets
|
224
|
+
click.echo(
|
225
|
+
style(
|
226
|
+
f"Secrets for connector '{connector_name}' in project '{gcp_project_id}':",
|
227
|
+
fg="green",
|
228
|
+
)
|
229
|
+
)
|
230
|
+
|
231
|
+
console = Console()
|
232
|
+
table = Table(title=f"'{connector_name}' Secrets")
|
233
|
+
table.add_column("Name", justify="left", style="cyan", overflow="fold")
|
234
|
+
table.add_column("Labels", justify="left", style="magenta", overflow="fold")
|
235
|
+
table.add_column("Created", justify="left", style="blue", overflow="fold")
|
236
|
+
for secret in secrets:
|
237
|
+
full_secret_name = secret.name
|
238
|
+
secret_name = full_secret_name.split("/secrets/")[-1] # Removes project prefix
|
239
|
+
# E.g. https://console.cloud.google.com/security/secret-manager/secret/SECRET_SOURCE-SHOPIFY__CREDS/versions?hl=en&project=<gcp_project_id>
|
240
|
+
secret_url = f"https://console.cloud.google.com/security/secret-manager/secret/{secret_name}/versions?hl=en&project={gcp_project_id}"
|
241
|
+
table.add_row(
|
242
|
+
f"[link={secret_url}]{secret_name}[/link]",
|
243
|
+
"\n".join([f"{k}={v}" for k, v in secret.labels.items()]),
|
244
|
+
str(secret.create_time),
|
245
|
+
)
|
246
|
+
|
247
|
+
console.print(table)
|
248
|
+
|
249
|
+
|
250
|
+
def _fetch_secret_handles(
|
251
|
+
connector_name: str,
|
252
|
+
gcp_project_id: str = AIRBYTE_INTERNAL_GCP_PROJECT,
|
253
|
+
) -> list["Secret"]: # type: ignore
|
254
|
+
"""Fetch secrets from Google Secret Manager."""
|
255
|
+
if not secretmanager:
|
74
256
|
raise ImportError(
|
75
257
|
"google-cloud-secret-manager package is required for Secret Manager integration. "
|
76
258
|
"Install it with 'pip install airbyte-cdk[dev]' "
|
77
259
|
"or 'pip install google-cloud-secret-manager'."
|
78
260
|
)
|
79
261
|
|
80
|
-
|
262
|
+
client = _get_gsm_secrets_client()
|
263
|
+
|
264
|
+
# List all secrets with the connector label
|
265
|
+
parent = f"projects/{gcp_project_id}"
|
266
|
+
filter_string = f"labels.{CONNECTOR_LABEL}={connector_name}"
|
267
|
+
secrets = client.list_secrets(
|
268
|
+
request=secretmanager.ListSecretsRequest(
|
269
|
+
parent=parent,
|
270
|
+
filter=filter_string,
|
271
|
+
)
|
272
|
+
)
|
273
|
+
return [s for s in secrets]
|
274
|
+
|
81
275
|
|
82
|
-
|
276
|
+
def _write_secret_file(
|
277
|
+
secret: "Secret", # type: ignore
|
278
|
+
client: "secretmanager.SecretManagerServiceClient", # type: ignore
|
279
|
+
file_path: Path,
|
280
|
+
) -> None:
|
281
|
+
version_name = f"{secret.name}/versions/latest"
|
282
|
+
response = client.access_secret_version(name=version_name)
|
283
|
+
file_path.write_text(response.payload.data.decode("UTF-8"))
|
284
|
+
file_path.chmod(0o600) # default to owner read/write only
|
285
|
+
|
286
|
+
|
287
|
+
def _get_secrets_dir(
|
288
|
+
connector_directory: Path,
|
289
|
+
connector_name: str,
|
290
|
+
ensure_exists: bool = True,
|
291
|
+
) -> Path:
|
83
292
|
try:
|
84
293
|
connector_name, connector_directory = resolve_connector_name_and_directory(
|
85
294
|
connector_name=connector_name,
|
@@ -95,56 +304,121 @@ def fetch(
|
|
95
304
|
except ValueError as e:
|
96
305
|
raise ValueError(str(e))
|
97
306
|
|
98
|
-
# Create secrets directory if it doesn't exist
|
99
307
|
secrets_dir = connector_directory / "secrets"
|
100
|
-
|
308
|
+
if ensure_exists:
|
309
|
+
secrets_dir.mkdir(parents=True, exist_ok=True)
|
310
|
+
|
311
|
+
gitignore_path = secrets_dir / ".gitignore"
|
312
|
+
if not gitignore_path.exists():
|
313
|
+
gitignore_path.write_text("*")
|
101
314
|
|
102
|
-
|
103
|
-
|
315
|
+
return secrets_dir
|
316
|
+
|
317
|
+
|
318
|
+
def _get_secret_filepath(
|
319
|
+
secrets_dir: Path,
|
320
|
+
secret: Secret, # type: ignore
|
321
|
+
) -> Path:
|
322
|
+
"""Get the file path for a secret based on its labels."""
|
323
|
+
if secret.labels and "filename" in secret.labels:
|
324
|
+
return secrets_dir / f"{secret.labels['filename']}.json"
|
325
|
+
|
326
|
+
return secrets_dir / "config.json" # Default filename
|
327
|
+
|
328
|
+
|
329
|
+
def _get_gsm_secrets_client() -> "secretmanager.SecretManagerServiceClient": # type: ignore
|
330
|
+
"""Get the Google Secret Manager client."""
|
331
|
+
if not secretmanager:
|
332
|
+
raise ImportError(
|
333
|
+
"google-cloud-secret-manager package is required for Secret Manager integration. "
|
334
|
+
"Install it with 'pip install airbyte-cdk[dev]' "
|
335
|
+
"or 'pip install google-cloud-secret-manager'."
|
336
|
+
)
|
104
337
|
|
105
|
-
# Get GSM client
|
106
338
|
credentials_json = os.environ.get("GCP_GSM_CREDENTIALS")
|
107
339
|
if not credentials_json:
|
108
340
|
raise ValueError(
|
109
|
-
"No Google Cloud credentials found.
|
341
|
+
"No Google Cloud credentials found. "
|
342
|
+
"Please set the `GCP_GSM_CREDENTIALS` environment variable."
|
110
343
|
)
|
111
344
|
|
112
|
-
|
113
|
-
|
345
|
+
return cast(
|
346
|
+
"secretmanager.SecretManagerServiceClient",
|
347
|
+
secretmanager.SecretManagerServiceClient.from_service_account_info(
|
348
|
+
json.loads(credentials_json)
|
349
|
+
),
|
114
350
|
)
|
115
351
|
|
116
|
-
|
117
|
-
|
118
|
-
|
119
|
-
|
120
|
-
|
121
|
-
|
122
|
-
|
352
|
+
|
353
|
+
def _print_ci_secrets_masks(
|
354
|
+
secrets_dir: Path,
|
355
|
+
) -> None:
|
356
|
+
"""Print GitHub CI mask for secrets.
|
357
|
+
|
358
|
+
https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/workflow-commands-for-github-actions#example-masking-an-environment-variable
|
359
|
+
|
360
|
+
The env var `CI` is set to a truthy value in GitHub Actions, so we can use it to
|
361
|
+
determine if we are in a CI environment. If not, we don't want to print the masks,
|
362
|
+
as it will cause the secrets to be printed in clear text to STDOUT.
|
363
|
+
"""
|
364
|
+
if not os.environ.get("CI", None):
|
365
|
+
click.echo(
|
366
|
+
"The `--print-ci-secrets-masks` option is only available in CI environments. "
|
367
|
+
"The `CI` env var is either not set or not set to a truthy value. "
|
368
|
+
"Skipping printing secret masks.",
|
369
|
+
err=True,
|
123
370
|
)
|
124
|
-
|
371
|
+
return
|
125
372
|
|
126
|
-
|
127
|
-
|
128
|
-
|
129
|
-
secret_name = secret.name
|
130
|
-
version_name = f"{secret_name}/versions/latest"
|
131
|
-
response = client.access_secret_version(name=version_name)
|
132
|
-
payload = response.payload.data.decode("UTF-8")
|
133
|
-
|
134
|
-
filename_base = "config" # Default filename
|
135
|
-
if secret.labels and "filename" in secret.labels:
|
136
|
-
filename_base = secret.labels["filename"]
|
137
|
-
|
138
|
-
secret_file_path = secrets_dir / f"{filename_base}.json"
|
139
|
-
secret_file_path.write_text(payload)
|
140
|
-
secret_file_path.chmod(0o600) # default to owner read/write only
|
141
|
-
click.echo(f"Secret written to: {secret_file_path.absolute()!s}")
|
142
|
-
secret_count += 1
|
373
|
+
for secret_file_path in secrets_dir.glob("*.json"):
|
374
|
+
config_dict = json.loads(secret_file_path.read_text())
|
375
|
+
_print_ci_secrets_masks_for_config(config=config_dict)
|
143
376
|
|
144
|
-
|
145
|
-
|
377
|
+
|
378
|
+
def _print_ci_secrets_masks_for_config(
|
379
|
+
config: dict[str, str] | list[Any] | Any,
|
380
|
+
) -> None:
|
381
|
+
"""Print GitHub CI mask for secrets config, navigating child nodes recursively."""
|
382
|
+
if isinstance(config, list):
|
383
|
+
for item in config:
|
384
|
+
_print_ci_secrets_masks_for_config(item)
|
385
|
+
|
386
|
+
if isinstance(config, dict):
|
387
|
+
for key, value in config.items():
|
388
|
+
if _is_secret_property(key):
|
389
|
+
logger.debug(f"Masking secret for config key: {key}")
|
390
|
+
print(f"::add-mask::{value!s}")
|
391
|
+
if isinstance(value, dict):
|
392
|
+
# For nested dicts, we also need to mask the json-stringified version
|
393
|
+
print(f"::add-mask::{json.dumps(value)!s}")
|
394
|
+
|
395
|
+
if isinstance(value, (dict, list)):
|
396
|
+
_print_ci_secrets_masks_for_config(config=value)
|
146
397
|
|
147
398
|
|
148
|
-
|
149
|
-
"
|
150
|
-
|
399
|
+
def _is_secret_property(property_name: str) -> bool:
|
400
|
+
"""Check if the property name is in the list of properties to mask.
|
401
|
+
|
402
|
+
To avoid false negatives, we perform a case-insensitive check, and we include any property name
|
403
|
+
that contains a rule entry, even if it is not an exact match.
|
404
|
+
|
405
|
+
For example, if the rule entry is "password", we will also match "PASSWORD" and "my_password".
|
406
|
+
"""
|
407
|
+
names_to_mask: list[str] = _get_spec_mask()
|
408
|
+
if any([mask.lower() in property_name.lower() for mask in names_to_mask]):
|
409
|
+
return True
|
410
|
+
|
411
|
+
return False
|
412
|
+
|
413
|
+
|
414
|
+
@lru_cache
|
415
|
+
def _get_spec_mask() -> list[str]:
|
416
|
+
"""Get the list of properties to mask from the spec mask file."""
|
417
|
+
response = requests.get(GLOBAL_MASK_KEYS_URL, allow_redirects=True)
|
418
|
+
if not response.ok:
|
419
|
+
logger.error(f"Failed to fetch spec mask: {response.content.decode('utf-8')}")
|
420
|
+
try:
|
421
|
+
return cast(list[str], yaml.safe_load(response.content)["properties"])
|
422
|
+
except Exception as e:
|
423
|
+
logger.error(f"Failed to parse spec mask: {e}")
|
424
|
+
raise
|
@@ -41,3 +41,29 @@ def resolve_connector_name_and_directory(
|
|
41
41
|
raise ValueError("Either connector_name or connector_directory must be provided.")
|
42
42
|
|
43
43
|
return connector_name, connector_directory
|
44
|
+
|
45
|
+
|
46
|
+
def resolve_connector_name(
|
47
|
+
connector_directory: Path,
|
48
|
+
) -> str:
|
49
|
+
"""Resolve the connector name.
|
50
|
+
|
51
|
+
This function will resolve the connector name based on the provided connector directory.
|
52
|
+
If the current working directory is not a connector directory
|
53
|
+
(e.g. starting with 'source-'), the process will fail.
|
54
|
+
|
55
|
+
Raises:
|
56
|
+
FileNotFoundError: If the connector directory does not exist or cannot be found.
|
57
|
+
"""
|
58
|
+
if not connector_directory:
|
59
|
+
raise FileNotFoundError(
|
60
|
+
"Connector directory does not exist or cannot be found. Please provide a valid "
|
61
|
+
"connector directory."
|
62
|
+
)
|
63
|
+
connector_name = connector_directory.absolute().name
|
64
|
+
if not connector_name.startswith("source-") and not connector_name.startswith("destination-"):
|
65
|
+
raise ValueError(
|
66
|
+
f"Connector directory '{connector_name}' does not look like a valid connector directory. "
|
67
|
+
f"Full path: {connector_directory.absolute()}"
|
68
|
+
)
|
69
|
+
return connector_name
|
@@ -1,6 +1,6 @@
|
|
1
1
|
Metadata-Version: 2.1
|
2
2
|
Name: airbyte-cdk
|
3
|
-
Version: 6.48.
|
3
|
+
Version: 6.48.4
|
4
4
|
Summary: A framework for writing Airbyte Connectors.
|
5
5
|
Home-page: https://airbyte.com
|
6
6
|
License: MIT
|
@@ -66,6 +66,7 @@ Requires-Dist: pytz (==2024.2)
|
|
66
66
|
Requires-Dist: rapidfuzz (>=3.10.1,<4.0.0)
|
67
67
|
Requires-Dist: requests
|
68
68
|
Requires-Dist: requests_cache
|
69
|
+
Requires-Dist: rich
|
69
70
|
Requires-Dist: rich-click (>=1.8.8,<2.0.0)
|
70
71
|
Requires-Dist: serpyco-rs (>=1.10.2,<2.0.0)
|
71
72
|
Requires-Dist: sqlalchemy (>=2.0,<3.0,!=2.0.36) ; extra == "sql"
|
@@ -4,8 +4,8 @@ airbyte_cdk/cli/airbyte_cdk/__init__.py,sha256=8IoEcbdYr7CMAh97Xut5__uHH9vV4LKUt
|
|
4
4
|
airbyte_cdk/cli/airbyte_cdk/_connector.py,sha256=bz6PGAuer17mSTkbCw10rTllOEjG_gw3U2lsvXAcPQE,5337
|
5
5
|
airbyte_cdk/cli/airbyte_cdk/_image.py,sha256=F0XtvR2CyFi1EPIUBiEnDia9NfCuM7T_itdNj9yyb2E,2907
|
6
6
|
airbyte_cdk/cli/airbyte_cdk/_manifest.py,sha256=aFdeeWgek7oXR3YfZPxk7kBZ64Blmsr0dAXN6BVGiIA,482
|
7
|
-
airbyte_cdk/cli/airbyte_cdk/_secrets.py,sha256=
|
8
|
-
airbyte_cdk/cli/airbyte_cdk/_util.py,sha256=
|
7
|
+
airbyte_cdk/cli/airbyte_cdk/_secrets.py,sha256=iRA8435sYDcWe6IBv4VAo-3yTIAFqySbDvmUsgpEInA,14712
|
8
|
+
airbyte_cdk/cli/airbyte_cdk/_util.py,sha256=bnzBIAIvuukbOwYwHXay33yAkyyOVJw24xNjNXsPG74,2732
|
9
9
|
airbyte_cdk/cli/airbyte_cdk/_version.py,sha256=ohZNIktLFk91sdzqFW5idaNrZAPX2dIRnz---_fcKOE,352
|
10
10
|
airbyte_cdk/cli/source_declarative_manifest/__init__.py,sha256=-0ST722Nj65bgRokzpzPkD1NBBW5CytEHFUe38cB86Q,91
|
11
11
|
airbyte_cdk/cli/source_declarative_manifest/_run.py,sha256=9qtbjt-I_stGWzWX6yVUKO_eE-Ga7g-uTuibML9qLBs,8330
|
@@ -408,9 +408,9 @@ airbyte_cdk/utils/slice_hasher.py,sha256=EDxgROHDbfG-QKQb59m7h_7crN1tRiawdf5uU7G
|
|
408
408
|
airbyte_cdk/utils/spec_schema_transformations.py,sha256=-5HTuNsnDBAhj-oLeQXwpTGA0HdcjFOf2zTEMUTTg_Y,816
|
409
409
|
airbyte_cdk/utils/stream_status_utils.py,sha256=ZmBoiy5HVbUEHAMrUONxZvxnvfV9CesmQJLDTAIWnWw,1171
|
410
410
|
airbyte_cdk/utils/traced_exception.py,sha256=C8uIBuCL_E4WnBAOPSxBicD06JAldoN9fGsQDp463OY,6292
|
411
|
-
airbyte_cdk-6.48.
|
412
|
-
airbyte_cdk-6.48.
|
413
|
-
airbyte_cdk-6.48.
|
414
|
-
airbyte_cdk-6.48.
|
415
|
-
airbyte_cdk-6.48.
|
416
|
-
airbyte_cdk-6.48.
|
411
|
+
airbyte_cdk-6.48.4.dist-info/LICENSE.txt,sha256=Wfe61S4BaGPj404v8lrAbvhjYR68SHlkzeYrg3_bbuM,1051
|
412
|
+
airbyte_cdk-6.48.4.dist-info/LICENSE_SHORT,sha256=aqF6D1NcESmpn-cqsxBtszTEnHKnlsp8L4x9wAh3Nxg,55
|
413
|
+
airbyte_cdk-6.48.4.dist-info/METADATA,sha256=hXMMplkbvREua_CfMKw1NaOIGbD43pmoz1tURhdTUWg,6343
|
414
|
+
airbyte_cdk-6.48.4.dist-info/WHEEL,sha256=Nq82e9rUAnEjt98J6MlVmMCZb-t9cYE2Ir1kpBmnWfs,88
|
415
|
+
airbyte_cdk-6.48.4.dist-info/entry_points.txt,sha256=AKWbEkHfpzzk9nF9tqBUaw1MbvTM4mGtEzmZQm0ZWvM,139
|
416
|
+
airbyte_cdk-6.48.4.dist-info/RECORD,,
|
File without changes
|
File without changes
|
File without changes
|
File without changes
|