outerbounds 0.3.181__py3-none-any.whl → 0.3.182rc0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,164 @@
1
+ from typing import Dict
2
+
3
+ import base64
4
+ import json
5
+ import requests
6
+ import random
7
+ import time
8
+ import sys
9
+
10
+ from .utils import safe_requests_wrapper, TODOException
11
+
12
+
13
+ class OuterboundsSecretsException(Exception):
14
+ pass
15
+
16
+
17
+ class SecretNotFound(OuterboundsSecretsException):
18
+ pass
19
+
20
+
21
+ class OuterboundsSecretsApiResponse:
22
+ def __init__(self, response):
23
+ self.response = response
24
+
25
+ @property
26
+ def secret_resource_id(self):
27
+ return self.response["secret_resource_id"]
28
+
29
+ @property
30
+ def secret_backend_type(self):
31
+ return self.response["secret_backend_type"]
32
+
33
+
34
+ class SecretRetriever:
35
+ def get_secret_as_dict(self, secret_id, options={}, role=None):
36
+ """
37
+ Supports a special way of specifying secrets sources in outerbounds using the format:
38
+ @secrets(sources=["outerbounds.<integrations_name>"])
39
+
40
+ When invoked it makes a requests to the integrations secrets metadata endpoint on the
41
+ keywest server to get the cloud resource id for a secret. It then uses that to invoke
42
+ secrets manager on the core oss and returns the secrets.
43
+ """
44
+ headers = {"Content-Type": "application/json", "Connection": "keep-alive"}
45
+ perimeter, integrations_url = self._get_secret_configs()
46
+ integration_name = secret_id
47
+ request_payload = {
48
+ "perimeter_name": perimeter,
49
+ "integration_name": integration_name,
50
+ }
51
+ response = self._make_request(integrations_url, headers, request_payload)
52
+ secret_resource_id = response.secret_resource_id
53
+ secret_backend_type = response.secret_backend_type
54
+
55
+ from metaflow.plugins.secrets.secrets_decorator import (
56
+ get_secrets_backend_provider,
57
+ )
58
+
59
+ secrets_provider = get_secrets_backend_provider(secret_backend_type)
60
+ secret_dict = secrets_provider.get_secret_as_dict(
61
+ secret_resource_id, options={}, role=role
62
+ )
63
+
64
+ # Outerbounds stores secrets as binaries. Hence we expect the returned secret to be
65
+ # {<cloud-secret-name>: <base64 encoded full secret>}. We decode the secret here like:
66
+ # 1. decode the base64 encoded full secret
67
+ # 2. load the decoded secret as a json
68
+ # 3. decode the base64 encoded values in the dict
69
+ # 4. return the decoded dict
70
+ binary_secret = next(iter(secret_dict.values()))
71
+ return self._decode_secret(binary_secret)
72
+
73
+ def _is_base64_encoded(self, data):
74
+ try:
75
+ if isinstance(data, str):
76
+ # Check if the string can be base64 decoded
77
+ base64.b64decode(data).decode("utf-8")
78
+ return True
79
+ return False
80
+ except Exception:
81
+ return False
82
+
83
+ def _decode_secret(self, secret):
84
+ try:
85
+ result = {}
86
+ secret_str = secret
87
+ if self._is_base64_encoded(secret):
88
+ # we check if the secret string is base64 encoded because the returned secret from
89
+ # AWS secret manager is base64 encoded while the secret from GCP is not
90
+ secret_str = base64.b64decode(secret).decode("utf-8")
91
+
92
+ secret_dict = json.loads(secret_str)
93
+ for key, value in secret_dict.items():
94
+ result[key] = base64.b64decode(value).decode("utf-8")
95
+
96
+ return result
97
+ except Exception as e:
98
+ raise OuterboundsSecretsException(f"Error decoding secret: {e}")
99
+
100
+ def _get_secret_configs(self):
101
+ from metaflow_extensions.outerbounds.remote_config import init_config # type: ignore
102
+ from os import environ
103
+
104
+ conf = init_config()
105
+ if "OBP_PERIMETER" in conf:
106
+ perimeter = conf["OBP_PERIMETER"]
107
+ else:
108
+ # if the perimeter is not in metaflow config, try to get it from the environment
109
+ perimeter = environ.get("OBP_PERIMETER", "")
110
+
111
+ if "OBP_INTEGRATIONS_URL" in conf:
112
+ integrations_url = conf["OBP_INTEGRATIONS_URL"]
113
+ else:
114
+ # if the integrations is not in metaflow config, try to get it from the environment
115
+ integrations_url = environ.get("OBP_INTEGRATIONS_URL", "")
116
+
117
+ if not perimeter:
118
+ raise OuterboundsSecretsException(
119
+ "No perimeter set. Please make sure to run `outerbounds configure <...>` command which can be found on the Ourebounds UI or reach out to your Outerbounds support team."
120
+ )
121
+
122
+ if not integrations_url:
123
+ raise OuterboundsSecretsException(
124
+ "No integrations url set. Please notify your Outerbounds support team about this issue."
125
+ )
126
+
127
+ integrations_secrets_metadata_url = f"{integrations_url}/secrets/metadata"
128
+ return perimeter, integrations_secrets_metadata_url
129
+
130
+ def _make_request(self, url, headers: Dict, payload: Dict):
131
+ try:
132
+ from metaflow.metaflow_config import SERVICE_HEADERS
133
+
134
+ request_headers = {**headers, **(SERVICE_HEADERS or {})}
135
+ except ImportError:
136
+ raise OuterboundsSecretsException(
137
+ "Failed to create app: No Metaflow service headers found"
138
+ )
139
+
140
+ response = safe_requests_wrapper(
141
+ requests.get,
142
+ url,
143
+ data=json.dumps(payload),
144
+ headers=request_headers,
145
+ conn_error_retries=5,
146
+ retryable_status_codes=[409],
147
+ )
148
+ self._handle_error_response(response)
149
+ return OuterboundsSecretsApiResponse(response.json())
150
+
151
+ @staticmethod
152
+ def _handle_error_response(response: requests.Response):
153
+ if response.status_code >= 500:
154
+ raise OuterboundsSecretsException(
155
+ f"Server error: {response.text}. Please reach out to your Outerbounds support team."
156
+ )
157
+ status_code = response.status_code
158
+ if status_code == 404:
159
+ raise SecretNotFound(f"Secret not found: {response.text}")
160
+
161
+ if status_code >= 400:
162
+ raise OuterboundsSecretsException(
163
+ f"status_code={status_code}\t\n\t\t{response.text}"
164
+ )
@@ -0,0 +1,227 @@
1
+ import random
2
+ import time
3
+ import sys
4
+ import json
5
+ import requests
6
+ from typing import Optional
7
+
8
+ # This click import is not used to construct any ob
9
+ # package cli. Its used only for printing stuff.
10
+ # So we can use the static metaflow._vendor import path
11
+ from metaflow._vendor import click
12
+ from .app_config import CAPSULE_DEBUG
13
+ import sys
14
+ import threading
15
+ import time
16
+ import logging
17
+ import itertools
18
+ from typing import Union, Callable, Any, List
19
+
20
+ from outerbounds._vendor.spinner import (
21
+ Spinners,
22
+ )
23
+
24
+
25
+ class MultiStepSpinner:
26
+ """
27
+ A spinner that supports multi-step progress and configurable alignment.
28
+
29
+ Parameters
30
+ ----------
31
+ spinner : Spinners
32
+ Which spinner frames/interval to use.
33
+ text : str
34
+ Static text to display beside the spinner.
35
+ color : str, optional
36
+ Click color name.
37
+ align : {'left','right'}
38
+ Whether to render the spinner to the left (default) or right of the text.
39
+ """
40
+
41
+ def __init__(
42
+ self,
43
+ spinner: Spinners = Spinners.dots,
44
+ text: str = "",
45
+ color: Optional[str] = None,
46
+ align: str = "right",
47
+ file=sys.stdout,
48
+ ):
49
+ cfg = spinner.value
50
+ self.frames = cfg["frames"]
51
+ self.interval = float(cfg["interval"]) / 1000.0 # type: ignore
52
+ self.text = text
53
+ self.color = color
54
+ if align not in ("left", "right"):
55
+ raise ValueError("align must be 'left' or 'right'")
56
+ self.align = align
57
+ self._write_file = file
58
+ # precompute clear length: max frame width + space + text length
59
+ max_frame = max(self.frames, key=lambda x: len(x)) # type: ignore
60
+ self.clear_len = len(self.main_text) + len(max_frame) + 1
61
+
62
+ self._stop_evt = threading.Event()
63
+ self._pause_evt = threading.Event()
64
+ self._thread = None
65
+ self._write_lock = threading.Lock()
66
+
67
+ @property
68
+ def main_text(self):
69
+ # if self.text is a callable then call it
70
+ if callable(self.text):
71
+ return self.text()
72
+ return self.text
73
+
74
+ def _spin(self):
75
+ for frame in itertools.cycle(self.frames):
76
+ if self._stop_evt.is_set():
77
+ break
78
+ if self._pause_evt.is_set():
79
+ time.sleep(0.05)
80
+ continue
81
+
82
+ # ---- Core logging critical section ----
83
+ with self._write_lock:
84
+ symbol = click.style(frame, fg=self.color) if self.color else frame
85
+ if self.align == "left":
86
+ msg = f"{symbol} {self.main_text}"
87
+ else:
88
+ msg = f"{self.main_text} {symbol}"
89
+
90
+ click.echo(msg, nl=False, file=self._write_file)
91
+ click.echo("\r", nl=False, file=self._write_file)
92
+ self._write_file.flush()
93
+ # ---- End of critical section ----
94
+ time.sleep(self.interval)
95
+ # clear the line when done
96
+ self._clear_line()
97
+
98
+ def _clear_line(self):
99
+ with self._write_lock:
100
+ click.echo(" " * self.clear_len, nl=False, file=self._write_file)
101
+ click.echo("\r", nl=False, file=self._write_file)
102
+ self._write_file.flush()
103
+
104
+ def start(self):
105
+ if self._thread and self._thread.is_alive():
106
+ return
107
+ self._stop_evt.clear()
108
+ self._pause_evt.clear()
109
+ self._thread = threading.Thread(target=self._spin, daemon=True)
110
+ self._thread.start()
111
+
112
+ def stop(self):
113
+ self._stop_evt.set()
114
+ if self._thread:
115
+ self._thread.join()
116
+
117
+ def log(self, *messages: str):
118
+ """Pause the spinner, emit a ✔ + message, then resume."""
119
+ self._pause_evt.set()
120
+ self._clear_line()
121
+ # ---- Core logging critical section ----
122
+ with self._write_lock:
123
+ self._write_file.flush()
124
+ for message in messages:
125
+ click.echo(f"{message}", file=self._write_file, nl=True)
126
+ self._write_file.flush()
127
+ # ---- End of critical section ----
128
+ self._pause_evt.clear()
129
+
130
+ def __enter__(self):
131
+ self.start()
132
+ return self
133
+
134
+ def __exit__(self, exc_type, exc, tb):
135
+ self.stop()
136
+
137
+
138
+ class SpinnerLogHandler(logging.Handler):
139
+ def __init__(self, spinner: MultiStepSpinner, *args, **kwargs):
140
+ super().__init__(*args, **kwargs)
141
+ self.spinner = spinner
142
+
143
+ def emit(self, record):
144
+ msg = self.format(record)
145
+ self.spinner.log(msg)
146
+
147
+
148
+ class MaximumRetriesExceeded(Exception):
149
+ def __init__(self, url, method, status_code, text):
150
+ self.url = url
151
+ self.method = method
152
+ self.status_code = status_code
153
+ self.text = text
154
+
155
+ def __str__(self):
156
+ return f"Maximum retries exceeded for {self.url}[{self.method}] {self.status_code} {self.text}"
157
+
158
+
159
+ class TODOException(Exception):
160
+ pass
161
+
162
+
163
+ requests_funcs = [
164
+ requests.get,
165
+ requests.post,
166
+ requests.put,
167
+ requests.delete,
168
+ requests.patch,
169
+ requests.head,
170
+ requests.options,
171
+ ]
172
+
173
+
174
+ def safe_requests_wrapper(
175
+ requests_module_fn,
176
+ *args,
177
+ conn_error_retries=2,
178
+ retryable_status_codes=[409],
179
+ **kwargs,
180
+ ):
181
+ """
182
+ There are two categories of errors that we need to handle when dealing with any API server.
183
+ 1. HTTP errors. These are are errors that are returned from the API server.
184
+ - How to handle retries for this case will be application specific.
185
+ 2. Errors when the API server may not be reachable (DNS resolution / network issues)
186
+ - In this scenario, we know that something external to the API server is going wrong causing the issue.
187
+ - Failing pre-maturely in the case might not be the best course of action since critical user jobs might crash on intermittent issues.
188
+ - So in this case, we can just planely retry the request.
189
+
190
+ This function handles the second case. It's a simple wrapper to handle the retry logic for connection errors.
191
+ If this function is provided a `conn_error_retries` of 5, then the last retry will have waited 32 seconds.
192
+ Generally this is a safe enough number of retries after which we can assume that something is really broken. Until then,
193
+ there can be intermittent issues that would resolve themselves if we retry gracefully.
194
+ """
195
+ if requests_module_fn not in requests_funcs:
196
+ raise ValueError(
197
+ f"safe_requests_wrapper doesn't support {requests_module_fn.__name__}. You can only use the following functions: {requests_funcs}"
198
+ )
199
+
200
+ _num_retries = 0
201
+ noise = random.uniform(-0.5, 0.5)
202
+ response = None
203
+ while _num_retries < conn_error_retries:
204
+ try:
205
+ response = requests_module_fn(*args, **kwargs)
206
+ if response.status_code not in retryable_status_codes:
207
+ return response
208
+ if CAPSULE_DEBUG:
209
+ print(
210
+ f"[outerbounds-debug] safe_requests_wrapper: {response.url}[{requests_module_fn.__name__}] {response.status_code} {response.text}",
211
+ file=sys.stderr,
212
+ )
213
+ _num_retries += 1
214
+ time.sleep((2 ** (_num_retries + 1)) + noise)
215
+ except requests.exceptions.ConnectionError:
216
+ if _num_retries <= conn_error_retries - 1:
217
+ # Exponential backoff with 2^(_num_retries+1) seconds
218
+ time.sleep((2 ** (_num_retries + 1)) + noise)
219
+ _num_retries += 1
220
+ else:
221
+ raise
222
+ raise MaximumRetriesExceeded(
223
+ response.url,
224
+ requests_module_fn.__name__,
225
+ response.status_code,
226
+ response.text,
227
+ )
@@ -0,0 +1,22 @@
1
+ import os
2
+ from .app_config import AppConfig, AppConfigError
3
+ from .secrets import SecretRetriever, SecretNotFound
4
+ from .dependencies import bake_deployment_image
5
+
6
+
7
+ def deploy_validations(app_config: AppConfig, cache_dir: str, logger):
8
+
9
+ # First check if the secrets for the app exist.
10
+ app_secrets = app_config.get("secrets", [])
11
+ secret_retriever = SecretRetriever()
12
+ for secret in app_secrets:
13
+ try:
14
+ secret_retriever.get_secret_as_dict(secret)
15
+ except SecretNotFound:
16
+ raise AppConfigError(f"Secret not found: {secret}")
17
+
18
+ # TODO: Next check if the compute pool exists.
19
+
20
+
21
+ def run_validations(app_config: AppConfig):
22
+ pass
@@ -8,6 +8,7 @@ import shutil
8
8
  import subprocess
9
9
 
10
10
  from ..utils import metaflowconfig
11
+ from ..apps.app_cli import app
11
12
 
12
13
  APP_READY_POLL_TIMEOUT_SECONDS = 300
13
14
  # Even after our backend validates that the app routes are ready, it takes a few seconds for
@@ -20,11 +21,6 @@ def cli(**kwargs):
20
21
  pass
21
22
 
22
23
 
23
- @click.group(help="Manage apps")
24
- def app(**kwargs):
25
- pass
26
-
27
-
28
24
  @app.command(help="Start an app using a port and a name")
29
25
  @click.option(
30
26
  "-d",
@@ -414,7 +410,7 @@ def kill_process(config_dir=None, profile=None, port=-1, name=""):
414
410
  default=os.environ.get("METAFLOW_PROFILE", ""),
415
411
  help="The named metaflow profile in which your workstation exists",
416
412
  )
417
- def list(config_dir=None, profile=None):
413
+ def list_local(config_dir=None, profile=None):
418
414
  if "WORKSTATION_ID" not in os.environ:
419
415
  click.secho(
420
416
  "All outerbounds app commands can only be run from a workstation.",
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: outerbounds
3
- Version: 0.3.181
3
+ Version: 0.3.182rc0
4
4
  Summary: More Data Science, Less Administration
5
5
  License: Proprietary
6
6
  Keywords: data science,machine learning,MLOps
@@ -29,8 +29,8 @@ Requires-Dist: google-cloud-secret-manager (>=2.20.0,<3.0.0) ; extra == "gcp"
29
29
  Requires-Dist: google-cloud-storage (>=2.14.0,<3.0.0) ; extra == "gcp"
30
30
  Requires-Dist: metaflow-checkpoint (==0.2.1)
31
31
  Requires-Dist: ob-metaflow (==2.15.17.1)
32
- Requires-Dist: ob-metaflow-extensions (==1.1.169)
33
- Requires-Dist: ob-metaflow-stubs (==6.0.3.181)
32
+ Requires-Dist: ob-metaflow-extensions (==1.1.170rc0)
33
+ Requires-Dist: ob-metaflow-stubs (==6.0.3.182rc0)
34
34
  Requires-Dist: opentelemetry-distro (>=0.41b0) ; extra == "otel"
35
35
  Requires-Dist: opentelemetry-exporter-otlp-proto-http (>=1.20.0) ; extra == "otel"
36
36
  Requires-Dist: opentelemetry-instrumentation-requests (>=0.41b0) ; extra == "otel"
@@ -1,4 +1,4 @@
1
- outerbounds/__init__.py,sha256=GPdaubvAYF8pOFWJ3b-sPMKCpyfpteWVMZWkmaYhxRw,32
1
+ outerbounds/__init__.py,sha256=8kikk4NZ0M0ymHuZN2mzw4LpJKFk0rvjYZ1uRefM7PE,39
2
2
  outerbounds/_vendor/PyYAML.LICENSE,sha256=jTko-dxEkP1jVwfLiOsmvXZBAqcoKVQwfT5RZ6V36KQ,1101
3
3
  outerbounds/_vendor/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
4
4
  outerbounds/_vendor/_yaml/__init__.py,sha256=nD985-g4Mrx97PhtSzI2L53o8sCHUJ4ZoBWcUd7o0PQ,1449
@@ -20,6 +20,9 @@ outerbounds/_vendor/click/testing.py,sha256=ptpMYgRY7dVfE3UDgkgwayu9ePw98sQI3D7z
20
20
  outerbounds/_vendor/click/types.py,sha256=u8LK2CRcVw3jWDutzP_wgFV478TXhsjL8gYSFPjGKkE,35865
21
21
  outerbounds/_vendor/click/utils.py,sha256=33D6E7poH_nrKB-xr-UyDEXnxOcCiQqxuRLtrqeVv6o,18682
22
22
  outerbounds/_vendor/click.LICENSE,sha256=morRBqOU6FO_4h9C9OctWSgZoigF2ZG18ydQKSkrZY0,1475
23
+ outerbounds/_vendor/spinner/__init__.py,sha256=gTm0NdQGTRxmghye1CYkhRtodji0MezsqAWs9OrLLRc,102
24
+ outerbounds/_vendor/spinner/spinners.py,sha256=0Hl1dskTzfibHPM5dfHV3no1maFduOCJ48r8mr3tgr0,15786
25
+ outerbounds/_vendor/spinner.LICENSE,sha256=R2t7cIDZ6-VroHO5M_FWET8adqmdI-PGv0AnhyvCo4A,1069
23
26
  outerbounds/_vendor/vendor_any.txt,sha256=9vi_h2zSBIx0sFM9i69xNEwe-HyeX0_sdtMjImmvgXo,27
24
27
  outerbounds/_vendor/yaml/__init__.py,sha256=lPcXUknB0EUNfCL8MJOgq26y70nOQR_Eajqzycmtnhg,12569
25
28
  outerbounds/_vendor/yaml/_yaml.cpython-311-darwin.so,sha256=YiF55JiadfOvw_mUH-lONNnsiMHj6C6o1SBfTCvvW54,362008
@@ -39,9 +42,28 @@ outerbounds/_vendor/yaml/resolver.py,sha256=dPhU1d7G1JCMktPFvNhyqwj2oNvx1yf_Jfa3
39
42
  outerbounds/_vendor/yaml/scanner.py,sha256=ZcI8IngR56PaQ0m27WU2vxCqmDCuRjz-hr7pirbMPuw,52982
40
43
  outerbounds/_vendor/yaml/serializer.py,sha256=8wFZRy9SsQSktF_f9OOroroqsh4qVUe53ry07P9UgCc,4368
41
44
  outerbounds/_vendor/yaml/tokens.py,sha256=JBSu38wihGr4l73JwbfMA7Ks1-X84g8-NskTz7KwPmA,2578
45
+ outerbounds/apps/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
46
+ outerbounds/apps/_state_machine.py,sha256=ixgL--jne3q71gQNnUeK-UdLP-Oc2kSGSsIW1fiHZPY,14469
47
+ outerbounds/apps/app_cli.py,sha256=vTbIN43A9A_OHTM0I6cb28g3GtY4_jk1wmUi5wG09w0,50174
48
+ outerbounds/apps/app_config.py,sha256=UHVK8JLIuW-OcGg5WxDm4QHeImPGtohD4KpJryZntC4,11307
49
+ outerbounds/apps/artifacts.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
50
+ outerbounds/apps/capsule.py,sha256=IYaD5X-IpSD9IsLpIJUaJ2B31up7PY7GhMMizkwLV7I,31039
51
+ outerbounds/apps/cli_to_config.py,sha256=Thc5jXRxoU6Pr8kAVVOX-5Es5ha6y6Vh_GBzL__oI7Q,3299
52
+ outerbounds/apps/click_importer.py,sha256=nnkPOR6TKrtIpc3a5Fna1zVJoQqDZvUXlNA9CdiNKFc,995
53
+ outerbounds/apps/code_package/__init__.py,sha256=8McF7pgx8ghvjRnazp2Qktlxi9yYwNiwESSQrk-2oW8,68
54
+ outerbounds/apps/code_package/code_packager.py,sha256=RWvM5BKjgLhu7icsO_n5SSYC57dwyST0dWpoWF88ovU,22881
55
+ outerbounds/apps/code_package/examples.py,sha256=aF8qKIJxCVv_ugcShQjqUsXKKKMsm1oMkQIl8w3QKuw,4016
56
+ outerbounds/apps/config_schema.yaml,sha256=j_mysTAPkIMSocItTg3aduMDfBs2teIhAErvpF0Elus,8826
57
+ outerbounds/apps/dependencies.py,sha256=03pZY-JRN-dYN-iyZ73zoEIEKmrOvbY4qld7RlRXYuw,3976
58
+ outerbounds/apps/deployer.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
59
+ outerbounds/apps/experimental/__init__.py,sha256=RUZBAyqFnX3pRQxTjNmS1-qpgQcc9xQGQD2yJh4MA_M,3349
60
+ outerbounds/apps/perimeters.py,sha256=1J1_-5legFPskv3HTRwQMpzTytE3TO8KRT2IvVOrWcQ,1584
61
+ outerbounds/apps/secrets.py,sha256=aWzcAayQEJghQgFP_qp9w6jyvan_hoL4_ceqZ0ZjLd4,6126
62
+ outerbounds/apps/utils.py,sha256=6REvD9PtJcLYzrxX5lZ5Dzzm-Sy2l-I1oSzQN9viYRs,7611
63
+ outerbounds/apps/validations.py,sha256=kR2eXckx0XJ4kUOOLkMRepbTh0INtL1Z8aV4-fZpfc8,678
42
64
  outerbounds/cli_main.py,sha256=e9UMnPysmc7gbrimq2I4KfltggyU7pw59Cn9aEguVcU,74
43
65
  outerbounds/command_groups/__init__.py,sha256=QPWtj5wDRTINDxVUL7XPqG3HoxHNvYOg08EnuSZB2Hc,21
44
- outerbounds/command_groups/apps_cli.py,sha256=v9OlQ1b4BGB-cBZiHB6W5gDocDoMmrQ7zdK11QiJ-B8,20847
66
+ outerbounds/command_groups/apps_cli.py,sha256=ecXyLhGxjbct62iqviP9qBX8s4d-XG56ICpTM2h2etk,20821
45
67
  outerbounds/command_groups/cli.py,sha256=FTeeDrvyBb-qcs2xklTiCyVTN5I0tBPyBReqDIE4oWU,530
46
68
  outerbounds/command_groups/fast_bakery_cli.py,sha256=5kja7v6C651XAY6dsP_IkBPJQgfU4hA4S9yTOiVPhW0,6213
47
69
  outerbounds/command_groups/kubernetes_cli.py,sha256=2bxPKUp5g_gdwVo4lT-IeWvHxz6Jmj1KxG70nXNgX_M,14758
@@ -56,7 +78,7 @@ outerbounds/utils/metaflowconfig.py,sha256=l2vJbgPkLISU-XPGZFaC8ZKmYFyJemlD6bwB-
56
78
  outerbounds/utils/schema.py,sha256=lMUr9kNgn9wy-sO_t_Tlxmbt63yLeN4b0xQXbDUDj4A,2331
57
79
  outerbounds/utils/utils.py,sha256=4Z8cszNob_8kDYCLNTrP-wWads_S_MdL3Uj3ju4mEsk,501
58
80
  outerbounds/vendor.py,sha256=gRLRJNXtZBeUpPEog0LOeIsl6GosaFFbCxUvR4bW6IQ,5093
59
- outerbounds-0.3.181.dist-info/METADATA,sha256=XyEanDRdzyNArTKojXDq1HKZtEC6iPvJwv_7VrPFb6I,1837
60
- outerbounds-0.3.181.dist-info/WHEEL,sha256=sP946D7jFCHeNz5Iq4fL4Lu-PrWrFsgfLXbbkciIZwg,88
61
- outerbounds-0.3.181.dist-info/entry_points.txt,sha256=7ye0281PKlvqxu15rjw60zKg2pMsXI49_A8BmGqIqBw,47
62
- outerbounds-0.3.181.dist-info/RECORD,,
81
+ outerbounds-0.3.182rc0.dist-info/METADATA,sha256=Y51QdSpzQvPHckh4lLqNcic0u-gM1sIi4rX2K4RmUPA,1846
82
+ outerbounds-0.3.182rc0.dist-info/WHEEL,sha256=sP946D7jFCHeNz5Iq4fL4Lu-PrWrFsgfLXbbkciIZwg,88
83
+ outerbounds-0.3.182rc0.dist-info/entry_points.txt,sha256=AP6rZg7y5SK9e9a9iVq0Fi9Q2KPjPZSwtZ6R98rLw-8,56
84
+ outerbounds-0.3.182rc0.dist-info/RECORD,,
@@ -0,0 +1,3 @@
1
+ [console_scripts]
2
+ outerbounds=outerbounds.cli_main:cli
3
+
@@ -1,3 +0,0 @@
1
- [console_scripts]
2
- outerbounds=outerbounds:cli
3
-