[JBoss JIRA] Updated: (TEIID-152) New SQL directive OPTION NOJOINPUSHDOWN that tells query planner to not push down any joins
by Ramesh Reddy (JIRA)
[ https://jira.jboss.org/jira/browse/TEIID-152?page=com.atlassian.jira.plug... ]
Ramesh Reddy updated TEIID-152:
-------------------------------
Component/s: Query Engine
Fix Version/s: 6.x
Affects Version/s: 6.x
> New SQL directive OPTION NOJOINPUSHDOWN that tells query planner to not push down any joins
> -------------------------------------------------------------------------------------------
>
> Key: TEIID-152
> URL: https://jira.jboss.org/jira/browse/TEIID-152
> Project: Teiid
> Issue Type: Feature Request
> Components: Query Engine
> Affects Versions: 6.x
> Reporter: Greg Haber
> Priority: Minor
> Fix For: 6.x
>
>
> This capability has been requested by a customer(see I-T ticket 217562). They want us to add in the following functionality:
> -add an OPTION directive (OPTION NOJOINPUSHDOWN) to MetaMatrix SQL that tells the query planner whether or not to attempt to push down joins for a particular query. This would be a general purpose MetaMatrix SQL change. The default would be for our query planner to act as it does today (do join pushdown as allowed by connector capabilities), and the behavior if this OPTION directive was used would be to instead not do any join pushdown for any part of the user query, even if allowed by connector capabilities.
> What this would allow them to do, if JBEDSP-348 is also implemented, is to leverage the limited join capability that SFDC has via its "relationship query" functionality. Because SFDC doesn't have full join capabilities, this would allow them to first try to submit a query against a VDB that uses SFDC as a source and see if the part of the join that the query planner pushes down to SFDC is something that SFDC can actually do. If not, the SFDC connector would throw an error, and the customer would resubmit their query with this OPTION NOJOINPUSHDOWN option.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: https://jira.jboss.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
15 years, 10 months
[JBoss JIRA] Updated: (TEIID-218) Security URL properties handling
by Steven Hawkins (JIRA)
[ https://jira.jboss.org/jira/browse/TEIID-218?page=com.atlassian.jira.plug... ]
Steven Hawkins updated TEIID-218:
---------------------------------
Component/s: JDBC Driver
Server
See also TEIID-249
> Security URL properties handling
> --------------------------------
>
> Key: TEIID-218
> URL: https://jira.jboss.org/jira/browse/TEIID-218
> Project: Teiid
> Issue Type: Feature Request
> Components: JDBC Driver, Server
> Affects Versions: 6.0.0
> Reporter: Steven Hawkins
> Assignee: Steven Hawkins
> Fix For: 6.1.0
>
>
> Defect Tracker #24196: Security URL properties are currently a mess in that there are three properties, clientToken, credentials, and trustedPayload that are all eventually treated at the trustedPayload. This is not desirable. Instead we should pass all of the connection properties to the membership service (as a map) for access by membership domains. This would remove the need to specifically pass the trustedPayload and application name as parameters. This could also be done for connectors provided that the message or the transport containing the connection properties is encrypted.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: https://jira.jboss.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
15 years, 10 months
[JBoss JIRA] Updated: (TEIID-218) Security URL properties handling
by Steven Hawkins (JIRA)
[ https://jira.jboss.org/jira/browse/TEIID-218?page=com.atlassian.jira.plug... ]
Steven Hawkins updated TEIID-218:
---------------------------------
Fix Version/s: 6.1.0
Affects Version/s: 6.0.0
> Security URL properties handling
> --------------------------------
>
> Key: TEIID-218
> URL: https://jira.jboss.org/jira/browse/TEIID-218
> Project: Teiid
> Issue Type: Feature Request
> Components: JDBC Driver, Server
> Affects Versions: 6.0.0
> Reporter: Steven Hawkins
> Assignee: Steven Hawkins
> Fix For: 6.1.0
>
>
> Defect Tracker #24196: Security URL properties are currently a mess in that there are three properties, clientToken, credentials, and trustedPayload that are all eventually treated at the trustedPayload. This is not desirable. Instead we should pass all of the connection properties to the membership service (as a map) for access by membership domains. This would remove the need to specifically pass the trustedPayload and application name as parameters. This could also be done for connectors provided that the message or the transport containing the connection properties is encrypted.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: https://jira.jboss.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
15 years, 10 months
[JBoss JIRA] Updated: (TEIID-217) LDAP Connector should provide a way to retrieve all values of an attribute that appears multiple times within a search result
by Steven Hawkins (JIRA)
[ https://jira.jboss.org/jira/browse/TEIID-217?page=com.atlassian.jira.plug... ]
Steven Hawkins updated TEIID-217:
---------------------------------
Component/s: LDAP Connector
Fix Version/s: 6.1.0
Affects Version/s: 6.0.0
> LDAP Connector should provide a way to retrieve all values of an attribute that appears multiple times within a search result
> -----------------------------------------------------------------------------------------------------------------------------
>
> Key: TEIID-217
> URL: https://jira.jboss.org/jira/browse/TEIID-217
> Project: Teiid
> Issue Type: Feature Request
> Components: LDAP Connector
> Affects Versions: 6.0.0
> Reporter: Michael Walker
> Priority: Minor
> Fix For: 6.1.0
>
>
> If an attribute appears more than once, we should have some way to return all values. Currently, we only return one value, with no rhyme, reason, or determinism as to which one gets returned. Implementing this is difficult when multiple attributes appear more than once, of course. But a simple example of where this problem rears it's head is in modeling LDAP groups. Groups typically have repeating attributes to represent each member, and it would be nice to query all members of a given group, but impossible to do so with the current logic.
> A sophisticated solution would create a normalized view of a DN, breaking out multi-valued attributes into a separate table that could be joined by a primary key. A simple solution might allow attributes to be flagged as "multi-valued", in which case, they could be maintained in a single denormalized table that represents all values in the DN.
> If we build an importer for LDAP, we should consider how to best handle this issue in the importer design.
--
This message is automatically generated by JIRA.
-
If you think it was sent incorrectly contact one of the administrators: https://jira.jboss.org/jira/secure/Administrators.jspa
-
For more information on JIRA, see: http://www.atlassian.com/software/jira
15 years, 10 months