-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Avoid "Manually specified and authenticated users mismatch" YT error" #28
Conversation
4cbc191
to
5bd3866
Compare
@alextokarew has imported your pull request. If you are a Yandex employee, you can view this diff. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Unit and integration tests are failing for this pull request, please fix it
❌ This pull request has been discarded. |
@alextokarew has imported your pull request. If you are a Yandex employee, you can view this diff. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Compilation is still failing
❌ This pull request has been discarded. |
@alextokarew has imported your pull request. If you are a Yandex employee, you can view this diff. |
❌ This pull request has been discarded. |
@alextokarew has imported your pull request. If you are a Yandex employee, you can view this diff. |
❌ This pull request has been discarded. |
@alextokarew has imported your pull request. If you are a Yandex employee, you can view this diff. |
❌ This pull request has been discarded. |
7ea4686
to
5eaa5a0
Compare
@alextokarew has imported your pull request. If you are a Yandex employee, you can view this diff. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you write a test that does the following:
- Creates a table with some data
- Creates two users on a cluster
- Sets an ACL to the created table such that the one user has the permission to select the data from it and the other hasn't
- Sequentially read the table using these users, and the first should get the result, the second will raise an exception.
Sample code is here:
create_user("spyt_user")
create_user("rightless_user")
path = "//tmp/secret_table"
create("table", path, attributes={"schema": [{"name": "s", "type": "string"}]})
rows = [{"s": "row"}]
write_table(path, rows, verbose=False)
set(path + "/@acl", [make_ace("allow", "spyt_user", "read"), make_ace("deny", "rightless_user", "read")])
make_query(f"select * from yt.`ytTable:/{path}`", user="rightless_user") # throws an exception
result = make_query(f"select * from yt.`ytTable:/{path}`", user="spyt_user")
assert_items_equal(result, rows)
❌ This pull request has been discarded. |
No description provided.