-
Notifications
You must be signed in to change notification settings - Fork 78
Prevent yield from operating on nodes which did not come from the current view. (SYN-5679) #3218
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…rent view. (SYN-5679)
Codecov ReportPatch coverage:
Additional details and impacted files@@ Coverage Diff @@
## master #3218 +/- ##
==========================================
- Coverage 97.31% 97.20% -0.11%
==========================================
Files 225 225
Lines 44998 45005 +7
==========================================
- Hits 43788 43747 -41
- Misses 1210 1258 +48
Flags with carried forward coverage won't be shown. Click here to find out more.
☔ View full report in Codecov by Sentry. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we might need to check the view in the if isinstance(valu, s_stormtypes.Prim):
case as well, I think you could potentially sneak through nodes in an embedquery there.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
An embedquery will still allow nodes from other views through:
view.exec 4aaedfd7ce26c9617f623e0b73c85f79 { $x=${it:dev:str=foo } } | yield $x
No description provided.