ob-metaflow 2.11.15.1__py2.py3-none-any.whl → 2.11.15.2__py2.py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of ob-metaflow might be problematic. Click here for more details.

@@ -154,6 +154,13 @@ AWS_SECRETS_MANAGER_DEFAULT_REGION = from_conf("AWS_SECRETS_MANAGER_DEFAULT_REGI
154
154
  # - "projects/1234567890/secrets/foo-" -> "projects/1234567890/secrets/foo-mysecret"
155
155
  GCP_SECRET_MANAGER_PREFIX = from_conf("GCP_SECRET_MANAGER_PREFIX")
156
156
 
157
+ # Secrets Backend - Azure Key Vault prefix. With this, users don't have to
158
+ # specify the full https:// vault url in the @secret decorator.
159
+ #
160
+ # It does not make a difference if the prefix ends in a / or not. We will handle either
161
+ # case correctly.
162
+ AZURE_KEY_VAULT_PREFIX = from_conf("AZURE_KEY_VAULT_PREFIX")
163
+
157
164
  # The root directory to save artifact pulls in, when using S3 or Azure
158
165
  ARTIFACT_LOCALROOT = from_conf("ARTIFACT_LOCALROOT", os.getcwd())
159
166
 
@@ -471,6 +478,7 @@ def get_pinned_conda_libs(python_version, datastore_type):
471
478
  elif datastore_type == "azure":
472
479
  pins["azure-identity"] = ">=1.10.0"
473
480
  pins["azure-storage-blob"] = ">=12.12.0"
481
+ pins["azure-keyvault-secrets"] = ">=4.8.0"
474
482
  elif datastore_type == "gs":
475
483
  pins["google-cloud-storage"] = ">=2.5.0"
476
484
  pins["google-auth"] = ">=2.11.0"
@@ -124,7 +124,7 @@ class MetaflowEnvironment(object):
124
124
  cmds.append("%s -m pip install awscli boto3" % self._python())
125
125
  elif datastore_type == "azure":
126
126
  cmds.append(
127
- "%s -m pip install azure-identity azure-storage-blob simple-azure-blob-downloader -qqq"
127
+ "%s -m pip install azure-identity azure-storage-blob azure-keyvault-secrets simple-azure-blob-downloader -qqq"
128
128
  % self._python()
129
129
  )
130
130
  elif datastore_type == "gs":
@@ -125,6 +125,10 @@ SECRETS_PROVIDERS_DESC = [
125
125
  "gcp-secret-manager",
126
126
  ".gcp.gcp_secret_manager_secrets_provider.GcpSecretManagerSecretsProvider",
127
127
  ),
128
+ (
129
+ "az-key-vault",
130
+ ".azure.azure_secret_manager_secrets_provider.AzureKeyVaultSecretsProvider",
131
+ ),
128
132
  ]
129
133
 
130
134
  AZURE_CLIENT_PROVIDERS_DESC = [
@@ -32,6 +32,7 @@ from metaflow.metaflow_config import (
32
32
  S3_ENDPOINT_URL,
33
33
  SERVICE_HEADERS,
34
34
  SERVICE_INTERNAL_URL,
35
+ AZURE_KEY_VAULT_PREFIX,
35
36
  )
36
37
 
37
38
  from metaflow.metaflow_config_funcs import config_values
@@ -412,6 +413,9 @@ class Airflow(object):
412
413
  if GCP_SECRET_MANAGER_PREFIX:
413
414
  env["METAFLOW_GCP_SECRET_MANAGER_PREFIX"] = GCP_SECRET_MANAGER_PREFIX
414
415
 
416
+ if AZURE_KEY_VAULT_PREFIX:
417
+ env["METAFLOW_AZURE_KEY_VAULT_PREFIX"] = AZURE_KEY_VAULT_PREFIX
418
+
415
419
  env.update(additional_mf_variables)
416
420
 
417
421
  service_account = (
@@ -33,6 +33,7 @@ from metaflow.metaflow_config import (
33
33
  DEFAULT_METADATA,
34
34
  DEFAULT_SECRETS_BACKEND_TYPE,
35
35
  GCP_SECRET_MANAGER_PREFIX,
36
+ AZURE_KEY_VAULT_PREFIX,
36
37
  KUBERNETES_FETCH_EC2_METADATA,
37
38
  KUBERNETES_LABELS,
38
39
  KUBERNETES_NAMESPACE,
@@ -1420,6 +1421,7 @@ class ArgoWorkflows(object):
1420
1421
  "METAFLOW_AWS_SECRETS_MANAGER_DEFAULT_REGION"
1421
1422
  ] = AWS_SECRETS_MANAGER_DEFAULT_REGION
1422
1423
  env["METAFLOW_GCP_SECRET_MANAGER_PREFIX"] = GCP_SECRET_MANAGER_PREFIX
1424
+ env["METAFLOW_AZURE_KEY_VAULT_PREFIX"] = AZURE_KEY_VAULT_PREFIX
1423
1425
 
1424
1426
  # support for Azure
1425
1427
  env[
@@ -10,4 +10,4 @@ class MetaflowAzureResourceError(MetaflowException):
10
10
 
11
11
 
12
12
  class MetaflowAzurePackageError(MetaflowException):
13
- headline = "Missing required packages 'azure-identity' and 'azure-storage-blob'"
13
+ headline = "Missing required packages 'azure-identity' and 'azure-storage-blob' and 'azure-keyvault-secrets'"
@@ -0,0 +1,236 @@
1
+ from metaflow.plugins.secrets import SecretsProvider
2
+ import re
3
+ import base64
4
+ import codecs
5
+ from urllib.parse import urlparse
6
+ from metaflow.exception import MetaflowException
7
+ import sys
8
+ from metaflow.metaflow_config import AZURE_KEY_VAULT_PREFIX
9
+ from metaflow.plugins.azure.azure_credential import (
10
+ create_cacheable_azure_credential,
11
+ )
12
+
13
+
14
+ class MetaflowAzureKeyVaultBadVault(MetaflowException):
15
+ """Raised when the secretid is fully qualified but does not have the right key vault domain"""
16
+
17
+
18
+ class MetaflowAzureKeyVaultBadSecretType(MetaflowException):
19
+ """Raised when the secret type is anything except secrets"""
20
+
21
+
22
+ class MetaflowAzureKeyVaultBadSecretPath(MetaflowException):
23
+ """Raised when the secret path does not match to expected length"""
24
+
25
+
26
+ class MetaflowAzureKeyVaultBadSecretName(MetaflowException):
27
+ """Raised when the secret name does not match expected pattern"""
28
+
29
+
30
+ class MetaflowAzureKeyVaultBadSecretVersion(MetaflowException):
31
+ """Raised when the secret version does not match expected pattern"""
32
+
33
+
34
+ class MetaflowAzureKeyVaultBadSecret(MetaflowException):
35
+ """Raised when the secret does not match supported patterns in Metaflow"""
36
+
37
+
38
+ class AzureKeyVaultSecretsProvider(SecretsProvider):
39
+ TYPE = "az-key-vault"
40
+ key_vault_domains = [
41
+ ".vault.azure.net",
42
+ ".vault.azure.cn",
43
+ ".vault.usgovcloudapi.net",
44
+ ".vault.microsoftazure.de",
45
+ ]
46
+ supported_vault_object_types = ["secrets"]
47
+
48
+ # https://learn.microsoft.com/en-us/azure/key-vault/general/about-keys-secrets-certificates has details on vault name structure
49
+ # Vault name and Managed HSM pool name must be a 3-24 character string, containing only 0-9, a-z, A-Z, and not consecutive -.
50
+ def _is_valid_vault_name(self, vault_name):
51
+ vault_name_pattern = r"^(?!.*--)[a-zA-Z0-9-]{3,24}$"
52
+ return re.match(vault_name_pattern, vault_name) is not None
53
+
54
+ # The type of the object can be, "keys", "secrets", or "certificates".
55
+ # Currently only secrets will be supported
56
+ def _is_valid_object_type(self, secret_type):
57
+ for type in self.supported_vault_object_types:
58
+ if secret_type == type:
59
+ return True
60
+ return False
61
+
62
+ # The secret name must be a 1-127 character string, starting with a letter and containing only 0-9, a-z, A-Z, and -.
63
+ def _is_valid_secret_name(self, secret_name):
64
+ secret_name_pattern = r"^[a-zA-Z][a-zA-Z0-9-]{0,126}$"
65
+ return re.match(secret_name_pattern, secret_name) is not None
66
+
67
+ # An object-version is a system-generated, 32 character string identifier that is optionally used to address a unique version of an object.
68
+ def _is_valid_object_version(self, secret_version):
69
+ object_version_pattern = r"^[a-zA-Z0-9]{32}$"
70
+ return re.match(object_version_pattern, secret_version) is not None
71
+
72
+ # This function will check if the secret_id is fully qualified url. It will return True iff the secret_id is of the form:
73
+ # https://myvault.vault.azure.net/secrets/mysecret/ec96f02080254f109c51a1f14cdb1931 OR
74
+ # https://myvault.vault.azure.net/secrets/mysecret/
75
+ # validating the above as per recommendations in https://devblogs.microsoft.com/azure-sdk/guidance-for-applications-using-the-key-vault-libraries/
76
+ def _is_secret_id_fully_qualified_url(self, secret_id):
77
+ # if the secret_id is None/empty/does not start with https then return false
78
+ if secret_id is None or secret_id == "" or not secret_id.startswith("https://"):
79
+ return False
80
+ try:
81
+ parsed_vault_url = urlparse(secret_id)
82
+ except ValueError:
83
+ print(f"invalid vault url", file=sys.stderr)
84
+ return False
85
+ hostname = parsed_vault_url.netloc
86
+
87
+ k_v_domain_found = False
88
+ actual_k_v_domain = ""
89
+ for k_v_domain in self.key_vault_domains:
90
+ if k_v_domain in hostname:
91
+ k_v_domain_found = True
92
+ actual_k_v_domain = k_v_domain
93
+ break
94
+ if not k_v_domain_found:
95
+ # the secret_id started with https:// however the key_vault_domains
96
+ # were not present in the secret_id which means
97
+ raise MetaflowAzureKeyVaultBadVault(f"bad key vault domain {secret_id}")
98
+
99
+ # given the secret_id seems to have a valid key vault domain
100
+ # lets verify that the vault name corresponds to its regex.
101
+ vault_name = hostname[: -len(actual_k_v_domain)]
102
+ # verify the vault name pattern
103
+ if not self._is_valid_vault_name(vault_name):
104
+ raise MetaflowAzureKeyVaultBadVault(f"bad key vault name {vault_name}")
105
+
106
+ path_parts = parsed_vault_url.path.strip("/").split("/")
107
+ total_path_parts = len(path_parts)
108
+ if total_path_parts < 2 or total_path_parts > 3:
109
+ raise MetaflowAzureKeyVaultBadSecretPath(
110
+ f"bad secret uri path {path_parts}"
111
+ )
112
+
113
+ object_type = path_parts[0]
114
+ if not self._is_valid_object_type(object_type):
115
+ raise MetaflowAzureKeyVaultBadSecretType(f"bad secret type {object_type}")
116
+
117
+ secret_name = path_parts[1]
118
+ if not self._is_valid_secret_name(secret_name=secret_name):
119
+ raise MetaflowAzureKeyVaultBadSecretName(f"bad secret name {secret_name}")
120
+
121
+ if total_path_parts == 3:
122
+ if not self._is_valid_object_version(path_parts[2]):
123
+ raise MetaflowAzureKeyVaultBadSecretVersion(
124
+ f"bad secret version {path_parts[2]}"
125
+ )
126
+
127
+ return True
128
+
129
+ # This function will validate the correctness of the partial secret id.
130
+ # It will attempt to construct the fully qualified secret URL internally and
131
+ # call the _is_secret_id_fully_qualified_url to check validity
132
+ def _is_partial_secret_valid(self, secret_id):
133
+ secret_parts = secret_id.strip("/").split("/")
134
+ total_secret_parts = len(secret_parts)
135
+ if total_secret_parts < 1 or total_secret_parts > 2:
136
+ return False
137
+
138
+ # since the secret_id is supposedly a partial id, the AZURE_KEY_VAULT_PREFIX
139
+ # must be set.
140
+ if not AZURE_KEY_VAULT_PREFIX:
141
+ raise ValueError(
142
+ f"cannot use simple secret id without setting METAFLOW_AZURE_KEY_VAULT_PREFIX. {AZURE_KEY_VAULT_PREFIX}"
143
+ )
144
+ domain = AZURE_KEY_VAULT_PREFIX.rstrip("/")
145
+ full_secret = f"{domain}/secrets/{secret_id}"
146
+ if not self._is_secret_id_fully_qualified_url(full_secret):
147
+ return False
148
+
149
+ return True
150
+
151
+ def _sanitize_key_as_env_var(self, key):
152
+ """
153
+ Sanitize a key as an environment variable name.
154
+ This is purely a convenience trade-off to cover common cases well, vs. introducing
155
+ ambiguities (e.g. did the final '_' come from '.', or '-' or is original?).
156
+
157
+ 1/27/2023(jackie):
158
+
159
+ We start with few rules and should *sparingly* add more over time.
160
+ Also, it's TBD whether all possible providers will share the same sanitization logic.
161
+ Therefore we will keep this function private for now
162
+ """
163
+ return key.replace("-", "_").replace(".", "_").replace("/", "_")
164
+
165
+ def get_secret_as_dict(self, secret_id, options={}, role=None):
166
+ # https://learn.microsoft.com/en-us/azure/app-service/app-service-key-vault-references?tabs=azure-cli has a lot of details on
167
+ # the patterns used in key vault
168
+ # Vault names and Managed HSM pool names are selected by the user and are globally unique.
169
+ # Vault name and Managed HSM pool name must be a 3-24 character string, containing only 0-9, a-z, A-Z, and not consecutive -.
170
+ # object-type The type of the object. As of 05/08/24 only "secrets", are supported
171
+ # object-name An object-name is a user provided name for and must be unique within a key vault. The name must be a 1-127 character string, starting with a letter and containing only 0-9, a-z, A-Z, and -.
172
+ # object-version An object-version is a system-generated, 32 character string identifier that is optionally used to address a unique version of an object.
173
+
174
+ # We allow these forms of secret_id:
175
+ #
176
+ # 1. Full path like https://<key-vault-name><.vault-domain>/secrets/<secret-name>/<secret-version>. This is what you
177
+ # see in Azure portal and is easy to copy paste.
178
+ #
179
+ # 2. Full path but without the version like https://<key-vault-name><.vault-domain>/secrets/<secret-name>
180
+ #
181
+ # 3. Simple string like mysecret. This corresponds to the SecretName.
182
+ #
183
+ # 4. Simple string with <secret-name>/<secret-version> suffix like mysecret/123
184
+
185
+ # The latter two forms require METAFLOW_AZURE_KEY_VAULT_PREFIX to be set.
186
+
187
+ # if the secret_id is None/empty/does not start with https then return false
188
+ if secret_id is None or secret_id == "":
189
+ raise MetaflowAzureKeyVaultBadSecret(f"empty secret id is not supported")
190
+
191
+ # check if the passed in secret is a short-form ( #3/#4 in the above comment)
192
+ if not secret_id.startswith("https://"):
193
+ # check if the secret_id is of form `secret_name` OR `secret_name/secret_version`
194
+ if not self._is_partial_secret_valid(secret_id=secret_id):
195
+ raise MetaflowAzureKeyVaultBadSecret(
196
+ f"unsupported partial secret {secret_id}"
197
+ )
198
+
199
+ domain = AZURE_KEY_VAULT_PREFIX.rstrip("/")
200
+ full_secret = f"{domain}/secrets/{secret_id}"
201
+
202
+ # if the secret id is passed as a URL - then check if the url is fully qualified
203
+ if secret_id.startswith("https://"):
204
+ if not self._is_secret_id_fully_qualified_url(secret_id=secret_id):
205
+ raise MetaflowException(f"unsupported secret {secret_id}")
206
+ full_secret = secret_id
207
+
208
+ # at this point I know that the secret URL is good so we can start creating the Secret Client
209
+ az_credentials = create_cacheable_azure_credential()
210
+ res = urlparse(full_secret)
211
+ az_vault_url = f"{res.scheme}://{res.netloc}" # https://myvault.vault.azure.net
212
+ secret_data = res.path.strip("/").split("/")[1:]
213
+ secret_name = secret_data[0]
214
+ secret_version = None
215
+ if len(secret_data) > 1:
216
+ secret_version = secret_data[1]
217
+
218
+ from azure.keyvault.secrets import SecretClient
219
+
220
+ client = SecretClient(vault_url=az_vault_url, credential=az_credentials)
221
+
222
+ key_vault_secret_val = client.get_secret(
223
+ name=secret_name, version=secret_version
224
+ )
225
+
226
+ result = {}
227
+
228
+ if options.get("env_var_name") is not None:
229
+ env_var_name = options["env_var_name"]
230
+ sanitized_key = self._sanitize_key_as_env_var(env_var_name)
231
+ else:
232
+ sanitized_key = self._sanitize_key_as_env_var(key_vault_secret_val.name)
233
+
234
+ response_payload = key_vault_secret_val.value
235
+ result[sanitized_key] = response_payload
236
+ return result
@@ -32,6 +32,7 @@ from metaflow.metaflow_config import (
32
32
  DEFAULT_METADATA,
33
33
  DEFAULT_SECRETS_BACKEND_TYPE,
34
34
  GCP_SECRET_MANAGER_PREFIX,
35
+ AZURE_KEY_VAULT_PREFIX,
35
36
  KUBERNETES_FETCH_EC2_METADATA,
36
37
  KUBERNETES_LABELS,
37
38
  KUBERNETES_SANDBOX_INIT_SCRIPT,
@@ -261,6 +262,9 @@ class Kubernetes(object):
261
262
  .environment_variable(
262
263
  "METAFLOW_GCP_SECRET_MANAGER_PREFIX", GCP_SECRET_MANAGER_PREFIX
263
264
  )
265
+ .environment_variable(
266
+ "METAFLOW_AZURE_KEY_VAULT_PREFIX", AZURE_KEY_VAULT_PREFIX
267
+ )
264
268
  .environment_variable("METAFLOW_S3_ENDPOINT_URL", S3_ENDPOINT_URL)
265
269
  .environment_variable(
266
270
  "METAFLOW_AZURE_STORAGE_BLOB_SERVICE_ENDPOINT",
metaflow/version.py CHANGED
@@ -1 +1 @@
1
- metaflow_version = "2.11.15.1"
1
+ metaflow_version = "2.11.15.2"
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: ob-metaflow
3
- Version: 2.11.15.1
3
+ Version: 2.11.15.2
4
4
  Summary: Metaflow: More Data Science, Less Engineering
5
5
  Author: Netflix, Outerbounds & the Metaflow Community
6
6
  Author-email: help@outerbounds.co
@@ -12,7 +12,7 @@ Requires-Dist: boto3
12
12
  Requires-Dist: pylint
13
13
  Requires-Dist: kubernetes
14
14
  Provides-Extra: stubs
15
- Requires-Dist: ob-metaflow-stubs ==2.11.15.1 ; extra == 'stubs'
15
+ Requires-Dist: ob-metaflow-stubs ==2.11.15.2 ; extra == 'stubs'
16
16
 
17
17
  ![Metaflow_Logo_Horizontal_FullColor_Ribbon_Dark_RGB](https://user-images.githubusercontent.com/763451/89453116-96a57e00-d713-11ea-9fa6-82b29d4d6eff.png)
18
18
 
@@ -15,10 +15,10 @@ metaflow/graph.py,sha256=ZPxyG8uwVMk5YYgX4pQEQaPZtZM5Wy-G4NtJK73IEuA,11818
15
15
  metaflow/includefile.py,sha256=yHczcZ_U0SrasxSNhZb3DIBzx8UZnrJCl3FzvpEQLOA,19753
16
16
  metaflow/integrations.py,sha256=LlsaoePRg03DjENnmLxZDYto3NwWc9z_PtU6nJxLldg,1480
17
17
  metaflow/lint.py,sha256=_kYAbAtsP7IG1Rd0FqNbo8I8Zs66_0WXbaZJFARO3dE,10394
18
- metaflow/metaflow_config.py,sha256=GgzzL_CwZdNfdAen3iy_0RmwqNXrl4hxx9t6DBhgRcU,21117
18
+ metaflow/metaflow_config.py,sha256=XEn3iYMP6c7lleymgBjpfCsYLMR9T2nsx-KiHy5iUcI,21477
19
19
  metaflow/metaflow_config_funcs.py,sha256=pCaiQ2ez9wXixJI3ehmf3QiW9lUqFrZnBZx1my_0wIg,4874
20
20
  metaflow/metaflow_current.py,sha256=sCENPBiji3LcPbwgOG0ukGd_yEc5tST8EowES8DzRtA,7430
21
- metaflow/metaflow_environment.py,sha256=XiMmBZiq3_dwaw0Oi3B8588BahYxzgfqWGMePPZqUUc,7359
21
+ metaflow/metaflow_environment.py,sha256=RHxCI-EcTR0yh352oa13itZeDun45OVF-lOAFxB9uXo,7382
22
22
  metaflow/metaflow_profile.py,sha256=jKPEW-hmAQO-htSxb9hXaeloLacAh41A35rMZH6G8pA,418
23
23
  metaflow/metaflow_version.py,sha256=mPQ6g_3XjNdi0NrxDzwlW8ZH0nMyYpwqmJ04P7TIdP0,4774
24
24
  metaflow/monitor.py,sha256=T0NMaBPvXynlJAO_avKtk8OIIRMyEuMAyF8bIp79aZU,5323
@@ -34,7 +34,7 @@ metaflow/task.py,sha256=ecGaULbK8kXPnyWzH1u6wtGclm0qeJm7K95amEL17sQ,25863
34
34
  metaflow/unbounded_foreach.py,sha256=p184WMbrMJ3xKYHwewj27ZhRUsSj_kw1jlye5gA9xJk,387
35
35
  metaflow/util.py,sha256=RrjsvADLKxSqjL76CxKh_J4OJl840B9Ak3V-vXleGas,13429
36
36
  metaflow/vendor.py,sha256=LZgXrh7ZSDmD32D1T5jj3OKKpXIqqxKzdMAOc5V0SD4,5162
37
- metaflow/version.py,sha256=21Opmiequz8jaaQf126ZsQhW01DOlR0QQoLBeNzjsps,31
37
+ metaflow/version.py,sha256=LJTdJuz7bbVrmaIHT0OQUmxzGPb3ovAAoEl5E7LsPTQ,31
38
38
  metaflow/_vendor/__init__.py,sha256=y_CiwUD3l4eAKvTVDZeqgVujMy31cAM1qjAB-HfI-9s,353
39
39
  metaflow/_vendor/click/__init__.py,sha256=FkyGDQ-cbiQxP_lxgUspyFYS48f2S_pTcfKPz-d_RMo,2463
40
40
  metaflow/_vendor/click/_bashcomplete.py,sha256=9J98IHQYmCAr2Jup6TDshUr5FJEen-AoQCZR0K5nKxQ,12309
@@ -118,7 +118,7 @@ metaflow/mflog/mflog.py,sha256=VebXxqitOtNAs7VJixnNfziO_i_urG7bsJ5JiB5IXgY,4370
118
118
  metaflow/mflog/save_logs.py,sha256=ZBAF4BMukw4FMAC7odpr9OI2BC_2petPtDX0ca6srC4,2352
119
119
  metaflow/mflog/save_logs_periodically.py,sha256=2Uvk9hi-zlCqXxOQoXmmjH1SCugfw6eG6w70WgfI-ho,1256
120
120
  metaflow/mflog/tee.py,sha256=wTER15qeHuiRpCkOqo-bd-r3Gj-EVlf3IvWRCA4beW4,887
121
- metaflow/plugins/__init__.py,sha256=xI4SpqVwargS21ExDAQNwfV_Iz_WG1E53arXhjq2H68,6759
121
+ metaflow/plugins/__init__.py,sha256=A_qoolQowlEQFajlBqfYBRF9qP-hzy33749KZ4R2fgc,6881
122
122
  metaflow/plugins/catch_decorator.py,sha256=UOM2taN_OL2RPpuJhwEOA9ZALm0-hHD0XS2Hn2GUev0,4061
123
123
  metaflow/plugins/debug_logger.py,sha256=mcF5HYzJ0NQmqCMjyVUk3iAP-heroHRIiVWQC6Ha2-I,879
124
124
  metaflow/plugins/debug_monitor.py,sha256=Md5X_sDOSssN9pt2D8YcaIjTK5JaQD55UAYTcF6xYF0,1099
@@ -135,7 +135,7 @@ metaflow/plugins/tag_cli.py,sha256=O_ZI4ILwGX3xKrLewUUF-zdJjCDi3JmsTb4ow87_RuY,1
135
135
  metaflow/plugins/test_unbounded_foreach_decorator.py,sha256=cB_2OWb38eYfmbVck72ZwU0qgzi6hqJXZAxglpHU_qg,5216
136
136
  metaflow/plugins/timeout_decorator.py,sha256=GGlsnmT1F-5FDaN19pDWKhmcHaN1hstgtZRBipPPu3c,3595
137
137
  metaflow/plugins/airflow/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
138
- metaflow/plugins/airflow/airflow.py,sha256=W4qmLY1clGuSlEf9muGM0qgk8ZbAr7P3squa9_m7ni0,32007
138
+ metaflow/plugins/airflow/airflow.py,sha256=U7jg1fSpGcuXhBCZ9xNh492h0MhBx3EV1WpWQh6RIaI,32147
139
139
  metaflow/plugins/airflow/airflow_cli.py,sha256=fUi6IsRMi6mvL6Twrszk7rZq7_4PmdYr9evJnBpXXPc,14440
140
140
  metaflow/plugins/airflow/airflow_decorator.py,sha256=H9-QnRP4x8tSomLmmpGeuVUI48-CxHR7tlvn_ceX1Zs,1772
141
141
  metaflow/plugins/airflow/airflow_utils.py,sha256=qd6lV2X4VpCO2sLsRc35JMOU4DVz_tQacrM_wWNkQug,28865
@@ -150,7 +150,7 @@ metaflow/plugins/airflow/sensors/s3_sensor.py,sha256=JUKoGNoTCtrO9MNEneEC7ldRNwg
150
150
  metaflow/plugins/argo/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
151
151
  metaflow/plugins/argo/argo_client.py,sha256=MKKhMCbWOPzf6z5zQQiyDRHHkAXcO7ipboDZDqAAvOk,15849
152
152
  metaflow/plugins/argo/argo_events.py,sha256=_C1KWztVqgi3zuH57pInaE9OzABc2NnncC-zdwOMZ-w,5909
153
- metaflow/plugins/argo/argo_workflows.py,sha256=vr0DUFLKUmVXS2IZRThNgqsfRyN2HQMPaPlvj9Ps3Hs,129679
153
+ metaflow/plugins/argo/argo_workflows.py,sha256=niBAizKFjDA-PTQh-PqhSHV4KX68uL83RF2kZN-QtT4,129783
154
154
  metaflow/plugins/argo/argo_workflows_cli.py,sha256=sZTpgfmc50eT3e0qIxpVqUgWhTcYlO1HM4gU6Oaya8g,33259
155
155
  metaflow/plugins/argo/argo_workflows_decorator.py,sha256=K5t4uIk2IXPdK7v7DEjj3buSB8ikLjLycKjbZUYeiaw,6781
156
156
  metaflow/plugins/argo/generate_input_paths.py,sha256=loYsI6RFX9LlFsHb7Fe-mzlTTtRdySoOu7sYDy-uXK0,881
@@ -176,7 +176,8 @@ metaflow/plugins/aws/step_functions/step_functions_client.py,sha256=DKpNwAIWElvW
176
176
  metaflow/plugins/aws/step_functions/step_functions_decorator.py,sha256=9hw_MX36RyFp6IowuAYaJzJg9UC5KCe1FNt1PcG7_J0,3791
177
177
  metaflow/plugins/azure/__init__.py,sha256=GuuhTVC-zSdyAf79a1wiERMq0Zts7fwVT7t9fAf234A,100
178
178
  metaflow/plugins/azure/azure_credential.py,sha256=JmdGEbVzgxy8ucqnQDdTTI_atyMX9WSZUw3qYOo7RhE,2174
179
- metaflow/plugins/azure/azure_exceptions.py,sha256=uvxE3E3nsbQq1dxCx1Yl9O54frbnMS5Elk8Z4qQ2Oh4,404
179
+ metaflow/plugins/azure/azure_exceptions.py,sha256=NnbwpUC23bc61HZjJmeXztY0tBNn_Y_VpIpDDuYWIZ0,433
180
+ metaflow/plugins/azure/azure_secret_manager_secrets_provider.py,sha256=O1osBCO47GPM95HzL4gSt_sjRdQyqX-oLxY8xWaPTDI,11022
180
181
  metaflow/plugins/azure/azure_tail.py,sha256=JAqV4mC42bMpR0O7m6X4cpFuh0peV1ufs_jJXrmicTc,3362
181
182
  metaflow/plugins/azure/azure_utils.py,sha256=j3kAxi2oC-fMpw8YegJvqsAwxi_m7jGPxCaeVwoBZJg,7100
182
183
  metaflow/plugins/azure/blob_service_client_factory.py,sha256=MtyPftBxrXdXMxwhKgLepG6mtlb_2BhJLG_fvbO6D14,6527
@@ -249,7 +250,7 @@ metaflow/plugins/gcp/gs_tail.py,sha256=Jl_wvnzU7dub07A-DOAuP5FeccNIrPM-CeL1xKFs1
249
250
  metaflow/plugins/gcp/gs_utils.py,sha256=ZmIGFse1qYyvAVrwga23PQUzF6dXEDLLsZ2F-YRmvow,2030
250
251
  metaflow/plugins/gcp/includefile_support.py,sha256=vIDeR-MiJuUh-2S2pV7Z7FBkhIWwtHXaRrj76MWGRiY,3869
251
252
  metaflow/plugins/kubernetes/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
252
- metaflow/plugins/kubernetes/kubernetes.py,sha256=5wM8_gRuyyyIv9mbX2lCePsLHoiDgJnbzYwnJy_NEoE,19233
253
+ metaflow/plugins/kubernetes/kubernetes.py,sha256=KIRt-brcAMe7SyhecgooTxOurxF9vTL0Db37LC0reMA,19384
253
254
  metaflow/plugins/kubernetes/kubernetes_cli.py,sha256=wSByGQEaoQo1aV9kJoKYmbVVeFQVsMw9RfG4Bw2sMm8,10274
254
255
  metaflow/plugins/kubernetes/kubernetes_client.py,sha256=irATJpAob4jINkJw0zT_Xoa6JHRtYxx2IOeimlbzvPo,2373
255
256
  metaflow/plugins/kubernetes/kubernetes_decorator.py,sha256=315v32txNvgMQC8QHl1fwf9tslsESlZ8M5KY-qhjgjg,25984
@@ -301,9 +302,9 @@ metaflow/tutorials/07-worldview/README.md,sha256=5vQTrFqulJ7rWN6r20dhot9lI2sVj9W
301
302
  metaflow/tutorials/07-worldview/worldview.ipynb,sha256=ztPZPI9BXxvW1QdS2Tfe7LBuVzvFvv0AToDnsDJhLdE,2237
302
303
  metaflow/tutorials/08-autopilot/README.md,sha256=GnePFp_q76jPs991lMUqfIIh5zSorIeWznyiUxzeUVE,1039
303
304
  metaflow/tutorials/08-autopilot/autopilot.ipynb,sha256=DQoJlILV7Mq9vfPBGW-QV_kNhWPjS5n6SJLqePjFYLY,3191
304
- ob_metaflow-2.11.15.1.dist-info/LICENSE,sha256=nl_Lt5v9VvJ-5lWJDT4ddKAG-VZ-2IaLmbzpgYDz2hU,11343
305
- ob_metaflow-2.11.15.1.dist-info/METADATA,sha256=IdnmLMJXs_Q8Y4XY6xkeos6iWs-KIXXoBZmn_VoMjVQ,5148
306
- ob_metaflow-2.11.15.1.dist-info/WHEEL,sha256=DZajD4pwLWue70CAfc7YaxT1wLUciNBvN_TTcvXpltE,110
307
- ob_metaflow-2.11.15.1.dist-info/entry_points.txt,sha256=IKwTN1T3I5eJL3uo_vnkyxVffcgnRdFbKwlghZfn27k,57
308
- ob_metaflow-2.11.15.1.dist-info/top_level.txt,sha256=v1pDHoWaSaKeuc5fKTRSfsXCKSdW1zvNVmvA-i0if3o,9
309
- ob_metaflow-2.11.15.1.dist-info/RECORD,,
305
+ ob_metaflow-2.11.15.2.dist-info/LICENSE,sha256=nl_Lt5v9VvJ-5lWJDT4ddKAG-VZ-2IaLmbzpgYDz2hU,11343
306
+ ob_metaflow-2.11.15.2.dist-info/METADATA,sha256=3vdCmlKaPQ9V9EfET5djgsF_JxUOPdIQLV1qmgbIy_Y,5148
307
+ ob_metaflow-2.11.15.2.dist-info/WHEEL,sha256=DZajD4pwLWue70CAfc7YaxT1wLUciNBvN_TTcvXpltE,110
308
+ ob_metaflow-2.11.15.2.dist-info/entry_points.txt,sha256=IKwTN1T3I5eJL3uo_vnkyxVffcgnRdFbKwlghZfn27k,57
309
+ ob_metaflow-2.11.15.2.dist-info/top_level.txt,sha256=v1pDHoWaSaKeuc5fKTRSfsXCKSdW1zvNVmvA-i0if3o,9
310
+ ob_metaflow-2.11.15.2.dist-info/RECORD,,