-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[CT-2533] [Feature] Support sqlparse 0.4.4 #7515
Comments
+1 even a moderate security vulnerability can be a problem for some organizations. |
Thanks for reaching out @lukehsiao and @dimoschi 🙏 We might need to wait until a new version of sqlparse addresses the issue. The best next step would be for someone to open a relevant issue upstream with I can take it as an action item to open an issue with Background for those just tuning inWe introduced a pin of sqlparse<0.4.4 because our functional testing suite was failing for sqlparse==0.4.4, and you can read more here: Side note: The CI tests actually worked for macOS Windows and it was only failing for Linux (Ubuntu). |
Gonna try reproduce the issue and look if I can open a PR at |
Another user just reported (#7521) seeing the same issue with |
@MauroLuzzatto provided some very useful information here, namely:
So maybe there's some kind of state that is available to subsequent executions that isn't available to the first one in a fresh environment? This is the context reported by @MauroLuzzatto:
|
We should replace |
💡 @emmyoop do we have an issue in GitHub to replace |
Closing in favor of #7791 |
Reopening per #7791 (comment) |
Looks like #7919 has pivoted back to use sqlparse 0.4.4 as well |
New fix in #8215 |
Is this your first time submitting a feature request?
Describe the feature
sqlparse
<0.4.4 contains a moderate security vulnerability: GHSA-rrm6-wvj7-cwh2dbt-core has started to pin to <0.4.4 in #7394 which makes it difficult for packages using dbt to update to the fixed version.
Would it be possible for dbt to support v0.4.4?
Describe alternatives you've considered
The answer might just be "no". In which case we will have to wait until a new version of sqlparse addresses the issue. It does not seem like there is anything upstream sqlparse tracking work to resolve #7396. So, if the answer is no, then I would hope the appropriate effort upstream can be made so we have a path forward eventually.
Who will this benefit?
All users of dbt-core who want to update to a non-vulnerable sqlparse version.
Are you interested in contributing this feature?
No response
Anything else?
No response
The text was updated successfully, but these errors were encountered: