@@ -15,7 +15,7 @@ const baseline = new BaselineStack(app, 'BaselineStack');
1515
1616
1717const coreDataLake = new DataLakeStack ( app , 'CoreDataLake' , {
18-
18+ starterLakeFormationAdminPrincipalArn : app . node . tryGetContext ( "starterLakeFormationAdmin" )
1919} ) ;
2020
2121const chemblStack = new ChemblStack ( app , 'ChemblStack' , {
@@ -36,6 +36,9 @@ const analyticsStack = new AnalyticsStack(app, 'AnalyticsStack', {
3636} ) ;
3737
3838
39+
40+
41+
3942chemblStack . grantIamRead ( analyticsStack . NotebookRole ) ;
4043openTargetsStack . grantIamRead ( analyticsStack . NotebookRole ) ;
4144
@@ -46,44 +49,44 @@ openTargetsStack.grantIamRead(analyticsStack.NotebookRole);
4649
4750
4851
49- const exampleUser = iam . User . fromUserName ( coreDataLake , 'exampleGrantee' , 'paul1' ) ;
52+ // const exampleUser = iam.User.fromUserName(coreDataLake, 'exampleGrantee', 'paul1' );
5053
51- var exampleGrant : DataLakeEnrollment . TablePermissionGrant = {
52- tables : [ "association_data" , "evidence_data" , "target_list" , "disease_list" ] ,
53- DatabasePermissions : [ DataLakeEnrollment . DatabasePermission . Alter , DataLakeEnrollment . DatabasePermission . CreateTable , DataLakeEnrollment . DatabasePermission . Drop ] ,
54- GrantableDatabasePermissions : [ DataLakeEnrollment . DatabasePermission . Alter , DataLakeEnrollment . DatabasePermission . CreateTable , DataLakeEnrollment . DatabasePermission . Drop ] ,
55- TablePermissions : [ DataLakeEnrollment . TablePermission . Select , DataLakeEnrollment . TablePermission . Insert , DataLakeEnrollment . TablePermission . Delete ] ,
56- GrantableTablePermissions : [ DataLakeEnrollment . TablePermission . Select ]
57- } ;
54+ // var exampleGrant: DataLakeEnrollment.TablePermissionGrant = {
55+ // tables: ["association_data", "evidence_data","target_list","disease_list"],
56+ // DatabasePermissions: [DataLakeEnrollment.DatabasePermission.Alter, DataLakeEnrollment.DatabasePermission.CreateTable, DataLakeEnrollment.DatabasePermission.Drop],
57+ // GrantableDatabasePermissions: [DataLakeEnrollment.DatabasePermission.Alter, DataLakeEnrollment.DatabasePermission.CreateTable, DataLakeEnrollment.DatabasePermission.Drop],
58+ // TablePermissions: [DataLakeEnrollment.TablePermission.Select, DataLakeEnrollment.TablePermission.Insert, DataLakeEnrollment.TablePermission.Delete],
59+ // GrantableTablePermissions: [DataLakeEnrollment.TablePermission.Select]
60+ // };
5861
59- openTargetsStack . grantTablePermissions ( exampleUser , exampleGrant ) ;
62+ // openTargetsStack.grantTablePermissions(exampleUser, exampleGrant);
6063
6164
6265
6366
64- // In the example below, we are using the compound_structures table from ChEMBL. It has the following table definition:
65- // ['molregno', 'molfile', 'standard_inchi', 'standard_inchi_key', 'canonical_smiles']
66- // Lets say we want to give a principal ONLY select permissions to everything in the compound_structures table BUT the 'canonical_smiles' column.
67+ // // In the example below, we are using the compound_structures table from ChEMBL. It has the following table definition:
68+ // // ['molregno', 'molfile', 'standard_inchi', 'standard_inchi_key', 'canonical_smiles']
69+ // // Lets say we want to give a principal ONLY select permissions to everything in the compound_structures table BUT the 'canonical_smiles' column.
6770
68- var exampleTableWithColumnsGrant : DataLakeEnrollment . TableWithColumnPermissionGrant = {
69- table : "chembl_25_public_compound_structures" ,
70- // Note that we are NOT including 'canonical_smiles'. That effectivley prevents this user from querying that column.
71- columns : [ 'molregno' , 'molfile' , 'standard_inchi' , 'standard_inchi_key' ] ,
72- DatabasePermissions : [ ] ,
73- GrantableDatabasePermissions : [ ] ,
74- TableColumnPermissions : [ DataLakeEnrollment . TablePermission . Select ] ,
75- GrantableTableColumnPermissions : [ ]
76- } ;
71+ // var exampleTableWithColumnsGrant: DataLakeEnrollment.TableWithColumnPermissionGrant = {
72+ // table: "chembl_25_public_compound_structures",
73+ // // Note that we are NOT including 'canonical_smiles'. That effectivley prevents this user from querying that column.
74+ // columns: ['molregno', 'molfile', 'standard_inchi', 'standard_inchi_key'],
75+ // DatabasePermissions: [],
76+ // GrantableDatabasePermissions: [],
77+ // TableColumnPermissions: [DataLakeEnrollment.TablePermission.Select],
78+ // GrantableTableColumnPermissions: []
79+ // };
7780
78- var exampleTableWithColumnsGrant_WithWildCard : DataLakeEnrollment . TableWithColumnPermissionGrant = {
79- table : "chembl_25_public_compound_structures" ,
80- wildCardFilter : DataLakeEnrollment . TableWithColumnFilter . Exclude ,
81- columns : [ 'canonical_smiles' ] ,
82- DatabasePermissions : [ ] ,
83- GrantableDatabasePermissions : [ ] ,
84- TableColumnPermissions : [ DataLakeEnrollment . TablePermission . Select ] ,
85- GrantableTableColumnPermissions : [ ]
86- } ;
81+ // var exampleTableWithColumnsGrant_WithWildCard: DataLakeEnrollment.TableWithColumnPermissionGrant = {
82+ // table: "chembl_25_public_compound_structures",
83+ // wildCardFilter: DataLakeEnrollment.TableWithColumnFilter.Exclude,
84+ // columns: ['canonical_smiles'],
85+ // DatabasePermissions: [],
86+ // GrantableDatabasePermissions: [],
87+ // TableColumnPermissions: [DataLakeEnrollment.TablePermission.Select],
88+ // GrantableTableColumnPermissions: []
89+ // };
8790
88- // Note that exampleTableWithColumnsGrant exampleTableWithColumnsGrant_WithWildCard grants the same effecitve permissions. One just uses a the wildcard.
89- chemblStack . grantTableWithColumnPermissions ( exampleUser , exampleTableWithColumnsGrant ) ;
91+ // // Note that exampleTableWithColumnsGrant exampleTableWithColumnsGrant_WithWildCard grants the same effecitve permissions. One just uses a the wildcard.
92+ // chemblStack.grantTableWithColumnPermissions(exampleUser, exampleTableWithColumnsGrant);
0 commit comments