-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
group
classification is too inclusive for model access
#86
Comments
@nicholasyager I think the solve for models would be a one liner here to filter nodes to model nodes only before we call |
I agree strongly that we can and should update Having that been said, I do not believe that #2 is caused by this. Rather, having some models in |
in grace's case, test nodes that were one level downstream of leaf model nodes were being assigned public, while the leaf model nodes were being marked private, which caused the initial confusion! had we only considered the models as boundary nodes, I think she would have seen the behavior she wanted, and wouldn't have needed to to anything else to try to make those access settings different. i do think we're aligned that a access-specific operation command would help either way! |
Grace did the following:
I just did the following workflow:
dbt-meshify group vault --owner-name "Trainer Logan" -s "1__stage 2__raw_vault 3__business_vault"
dbt-meshify operation add-contract -s "2__raw_vault 3__business_vault"
I'm okay with not automatically updating access when you add a contract, but I do think we then need an operation to update access manually.
Originally posted by @graciegoheen in #85 (comment)
The reason number 2 did not properly classify her resource types appropriately based on her selection syntax is that we're doing the
classify_resource_access
step on all resources types in the selected group. Instead, we should limit the interface analysis tomodel
nodes only, as they are the ones that should haveaccess
settings at all!once the split command PR is merged, we'll have yml operations for all resource types, so we can add the group config to all relevant resource types, and limit the access type step to just models
The text was updated successfully, but these errors were encountered: