Skip to content

feat: wire lakehouse load into MySQL connector workflow#151

Open
AtMrun wants to merge 2 commits intomainfrom
feat/mysql-lakehouse-load-demo
Open

feat: wire lakehouse load into MySQL connector workflow#151
AtMrun wants to merge 2 commits intomainfrom
feat/mysql-lakehouse-load-demo

Conversation

@AtMrun
Copy link
Copy Markdown
Collaborator

@AtMrun AtMrun commented Mar 19, 2026

Summary

  • Demonstrates how to use the SDK's load_to_lakehouse activity in the MySQL connector's custom workflow
  • Adds raw parquet load after asyncio.gather and transformed jsonl load via run_exit_activities
  • Both loads gated behind ENABLE_LAKEHOUSE_LOAD env var + per-table namespace/table config
  • Requires application-sdk from feat/load-to-lakehouse-activity branch (feat: add load_to_lakehouse Temporal activity for Iceberg ingestion application-sdk#1134)

Test plan

  • Verify MySQL connector builds with SDK branch dependency
  • Test with ENABLE_LAKEHOUSE_LOAD=false (default) — no behavior change
  • Test with ENABLE_LAKEHOUSE_LOAD=true + namespace/table env vars — raw and transformed loads fire
  • Verify run_exit_activities correctly chains upload_to_atlan + transformed lakehouse load

🤖 Generated with Claude Code

Demonstrates how to use the SDK's load_to_lakehouse activity in a custom
workflow that overrides run(). Raw parquet load fires after asyncio.gather,
transformed jsonl load fires via run_exit_activities. Both are gated behind
ENABLE_LAKEHOUSE_LOAD env var + namespace/table config.

Requires application-sdk >= 2.7.0 (feat/load-to-lakehouse-activity branch).

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@snykgituser
Copy link
Copy Markdown

snykgituser commented Mar 19, 2026

Snyk checks have passed. No issues have been found so far.

Status Scan Engine Critical High Medium Low Total (0)
Code Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Mar 19, 2026

📦 Trivy Vulnerability Scan Results

Schema Version Created At Artifact Type
2 2026-03-19T05:22:28.227937817Z . filesystem

Report Summary

Could not generate summary table (data length mismatch: 30 vs 27).

Scan Result Details

connectors/anaplan/uv.lock

Vulnerabilities

Severity ID Package Version Fixed Version Title
🔴 CRITICAL CVE-2026-27962 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass due to JWK Header Injection vulnerability
🟠 HIGH CVE-2026-28490 authlib 1.6.6 1.6.9 authlib: Authlib: Information disclosure due to cryptographic padding oracle in JWE RSA1_5
🟠 HIGH CVE-2026-28498 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass via forged OpenID Connect ID Tokens
🟠 HIGH CVE-2026-28802 authlib 1.6.6 1.6.7 authlib: Authlib: Signature verification bypass via malicious JWT allows unauthorized access
🟠 HIGH CVE-2026-32274 black 26.1.0 26.3.1 black: Black: Arbitrary file writes from unsanitized user input in cache file name
🟠 HIGH CVE-2026-32640 simpleeval 1.0.3 1.0.5 simpleeval: SimpleEval: Arbitrary code execution via sandbox escape due to improper object handling
connectors/mysql/uv.lock

Vulnerabilities

Severity ID Package Version Fixed Version Title
🔴 CRITICAL CVE-2026-27962 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass due to JWK Header Injection vulnerability
🟠 HIGH CVE-2026-28490 authlib 1.6.6 1.6.9 authlib: Authlib: Information disclosure due to cryptographic padding oracle in JWE RSA1_5
🟠 HIGH CVE-2026-28498 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass via forged OpenID Connect ID Tokens
🟠 HIGH CVE-2026-28802 authlib 1.6.6 1.6.7 authlib: Authlib: Signature verification bypass via malicious JWT allows unauthorized access
🟠 HIGH CVE-2026-32274 black 26.1.0 26.3.1 black: Black: Arbitrary file writes from unsanitized user input in cache file name
🟠 HIGH CVE-2026-32640 simpleeval 1.0.3 1.0.5 simpleeval: SimpleEval: Arbitrary code execution via sandbox escape due to improper object handling
quickstart/ai_giphy/uv.lock

Vulnerabilities

Severity ID Package Version Fixed Version Title
🔴 CRITICAL CVE-2026-27962 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass due to JWK Header Injection vulnerability
🟠 HIGH CVE-2026-28490 authlib 1.6.6 1.6.9 authlib: Authlib: Information disclosure due to cryptographic padding oracle in JWE RSA1_5
🟠 HIGH CVE-2026-28498 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass via forged OpenID Connect ID Tokens
🟠 HIGH CVE-2026-28802 authlib 1.6.6 1.6.7 authlib: Authlib: Signature verification bypass via malicious JWT allows unauthorized access
🟠 HIGH CVE-2026-32274 black 26.1.0 26.3.1 black: Black: Arbitrary file writes from unsanitized user input in cache file name
🟠 HIGH CVE-2026-32640 simpleeval 1.0.3 1.0.5 simpleeval: SimpleEval: Arbitrary code execution via sandbox escape due to improper object handling
quickstart/giphy/uv.lock

Vulnerabilities

Severity ID Package Version Fixed Version Title
🔴 CRITICAL CVE-2026-27962 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass due to JWK Header Injection vulnerability
🟠 HIGH CVE-2026-28490 authlib 1.6.6 1.6.9 authlib: Authlib: Information disclosure due to cryptographic padding oracle in JWE RSA1_5
🟠 HIGH CVE-2026-28498 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass via forged OpenID Connect ID Tokens
🟠 HIGH CVE-2026-28802 authlib 1.6.6 1.6.7 authlib: Authlib: Signature verification bypass via malicious JWT allows unauthorized access
🟠 HIGH CVE-2026-32274 black 26.1.0 26.3.1 black: Black: Arbitrary file writes from unsanitized user input in cache file name
🟠 HIGH CVE-2026-32640 simpleeval 1.0.3 1.0.5 simpleeval: SimpleEval: Arbitrary code execution via sandbox escape due to improper object handling
quickstart/hello_world/uv.lock

Vulnerabilities

Severity ID Package Version Fixed Version Title
🔴 CRITICAL CVE-2026-27962 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass due to JWK Header Injection vulnerability
🟠 HIGH CVE-2026-28490 authlib 1.6.6 1.6.9 authlib: Authlib: Information disclosure due to cryptographic padding oracle in JWE RSA1_5
🟠 HIGH CVE-2026-28498 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass via forged OpenID Connect ID Tokens
🟠 HIGH CVE-2026-28802 authlib 1.6.6 1.6.7 authlib: Authlib: Signature verification bypass via malicious JWT allows unauthorized access
🟠 HIGH CVE-2026-32274 black 26.1.0 26.3.1 black: Black: Arbitrary file writes from unsanitized user input in cache file name
🟠 HIGH CVE-2026-32640 simpleeval 1.0.3 1.0.5 simpleeval: SimpleEval: Arbitrary code execution via sandbox escape due to improper object handling
templates/generic/uv.lock

Vulnerabilities

Severity ID Package Version Fixed Version Title
🟠 HIGH CVE-2026-32274 black 25.9.0 26.3.1 black: Black: Arbitrary file writes from unsanitized user input in cache file name
🟠 HIGH CVE-2025-67221 orjson 3.11.3 3.11.6 orjson: orjson: Denial of Service due to unbounded recursion with deeply nested JSON documents
🟠 HIGH CVE-2026-32640 simpleeval 1.0.3 1.0.5 simpleeval: SimpleEval: Arbitrary code execution via sandbox escape due to improper object handling
utilities/asset_descriptor_reminder/uv.lock

Vulnerabilities

Severity ID Package Version Fixed Version Title
🔴 CRITICAL CVE-2026-27962 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass due to JWK Header Injection vulnerability
🟠 HIGH CVE-2026-28490 authlib 1.6.6 1.6.9 authlib: Authlib: Information disclosure due to cryptographic padding oracle in JWE RSA1_5
🟠 HIGH CVE-2026-28498 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass via forged OpenID Connect ID Tokens
🟠 HIGH CVE-2026-28802 authlib 1.6.6 1.6.7 authlib: Authlib: Signature verification bypass via malicious JWT allows unauthorized access
🟠 HIGH CVE-2026-32274 black 26.1.0 26.3.1 black: Black: Arbitrary file writes from unsanitized user input in cache file name
🟠 HIGH CVE-2026-32640 simpleeval 1.0.3 1.0.5 simpleeval: SimpleEval: Arbitrary code execution via sandbox escape due to improper object handling
utilities/freshness_monitor/uv.lock

Vulnerabilities

Severity ID Package Version Fixed Version Title
🔴 CRITICAL CVE-2026-27962 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass due to JWK Header Injection vulnerability
🟠 HIGH CVE-2026-28490 authlib 1.6.6 1.6.9 authlib: Authlib: Information disclosure due to cryptographic padding oracle in JWE RSA1_5
🟠 HIGH CVE-2026-28498 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass via forged OpenID Connect ID Tokens
🟠 HIGH CVE-2026-28802 authlib 1.6.6 1.6.7 authlib: Authlib: Signature verification bypass via malicious JWT allows unauthorized access
🟠 HIGH CVE-2026-32274 black 26.1.0 26.3.1 black: Black: Arbitrary file writes from unsanitized user input in cache file name
🟠 HIGH CVE-2026-32640 simpleeval 1.0.3 1.0.5 simpleeval: SimpleEval: Arbitrary code execution via sandbox escape due to improper object handling
utilities/workflows_observability/uv.lock

Vulnerabilities

Severity ID Package Version Fixed Version Title
🔴 CRITICAL CVE-2026-27962 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass due to JWK Header Injection vulnerability
🟠 HIGH CVE-2026-28490 authlib 1.6.6 1.6.9 authlib: Authlib: Information disclosure due to cryptographic padding oracle in JWE RSA1_5
🟠 HIGH CVE-2026-28498 authlib 1.6.6 1.6.9 authlib: Authlib: Authentication bypass via forged OpenID Connect ID Tokens
🟠 HIGH CVE-2026-28802 authlib 1.6.6 1.6.7 authlib: Authlib: Signature verification bypass via malicious JWT allows unauthorized access
🟠 HIGH CVE-2026-32274 black 26.1.0 26.3.1 black: Black: Arbitrary file writes from unsanitized user input in cache file name
🟠 HIGH CVE-2026-32640 simpleeval 1.0.3 1.0.5 simpleeval: SimpleEval: Arbitrary code execution via sandbox escape due to improper object handling

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Mar 19, 2026

📦 Trivy Secret Scan Results

Schema Version Created At Artifact Type
2 2026-03-19T05:22:45.472285003Z . filesystem

Report Summary

Target Type Secrets . filesystem ✅ None found

Scan Result Details

✅ No secrets found during the scan for ..

…tion

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants