[
https://issues.apache.org/jira/browse/DRILL-3963?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14977491#comment-14977491
]
ASF GitHub Bot commented on DRILL-3963:
---------------------------------------
Github user jacques-n commented on the pull request:
https://github.com/apache/drill/pull/214#issuecomment-151685572
Interesting. I'm guessing that means that the Avro reader and the old Text
reader are also broken in this way. I wonder if we just don't have any tests to
cover those with regards to impersonation.
> Read raw key value bytes from sequence files
> --------------------------------------------
>
> Key: DRILL-3963
> URL: https://issues.apache.org/jira/browse/DRILL-3963
> Project: Apache Drill
> Issue Type: New Feature
> Reporter: amit hadke
> Assignee: amit hadke
>
> Sequence files store list of key-value pairs. Keys/values are of type hadoop
> writable.
> Provide a format plugin that reads raw bytes out of sequence files which can
> be further deserialized by a udf(from hadoop writable -> drill type)
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)