Using .sql(dialect="clickhouse") on a materialized view query produces invalid syntax. Example, this python script CREATE MATERIALIZED VIEW test.mv_ad_advertiser ( "id" Int32, "name" String, "type" ...
Even if it is a 'cookie' problem then it means that user sourced data is not going through an appropriate sanitisation before inclusion in a sql query. This is how sql injection attacks happen. From ...
asset = 'summary_data' query = "select * from summary_data" batch_request = RuntimeBatchRequest( datasource_name='sql_server_datasource', data_connector_name='sql_gx ...