CARVIEW |
Select Language
HTTP/2 200
date: Sun, 27 Jul 2025 19:54:12 GMT
content-type: text/html; charset=utf-8
cache-control: max-age=0, private, must-revalidate
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com release-assets.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com copilotprodattachments.blob.core.windows.net/github-production-copilot-attachments/ github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/
link: ; rel=preload; as=fetch; crossorigin=use-credentials
referrer-policy: no-referrer-when-downgrade
server-timing: issue_layout-fragment;desc="issue_layout fragment";dur=256.477772,issue_conversation_content-fragment;desc="issue_conversation_content fragment";dur=1043.420308,issue_conversation_sidebar-fragment;desc="issue_conversation_sidebar fragment";dur=71.73728,nginx;desc="NGINX";dur=0.713174,glb;desc="GLB";dur=101.533256
strict-transport-security: max-age=31536000; includeSubdomains; preload
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, X-Requested-With, Accept,Accept-Encoding, Accept, X-Requested-With
x-content-type-options: nosniff
x-frame-options: deny
x-voltron-version: a2eb102
x-xss-protection: 0
server: github.com
content-encoding: gzip
accept-ranges: bytes
set-cookie: _gh_sess=a0d%2FGMwtM%2BWGEJ3MYP0htOLuPYxvIC97SO%2BxvjFhZzDu9uF21YGQtODCKO4qYSPyOqpuAbfgADzeooXs721kZbtSFr0y96nRFc0%2FkKCF2som5P51goHOvLwZu4%2F5H0Bbd7anzkV7A32ZQfe6elXa3YZlFINKNtTMNKNfgIOW6vLnBO6Sv5wipRNSgIKfe6bmkdXuy1%2FrdfD5uIDWSbTtEd7Lw9s0%2Ba%2FEdZSxoY%2F7Wcoyomm21s5SDyhWOmL4gGyfczHS8hW6DnjeAwvFOO1t8A%3D%3D--1sD8BitIU4th5gP%2B--EdqyO%2BG30yiuOLUV2xuQCA%3D%3D; Path=/; HttpOnly; Secure; SameSite=Lax
set-cookie: _octo=GH1.1.613263756.1753646050; Path=/; Domain=github.com; Expires=Mon, 27 Jul 2026 19:54:10 GMT; Secure; SameSite=Lax
set-cookie: logged_in=no; Path=/; Domain=github.com; Expires=Mon, 27 Jul 2026 19:54:10 GMT; HttpOnly; Secure; SameSite=Lax
x-github-request-id: B65E:7ADB8:7D6A83:A4C1DC:688683E2
airflow sync-perm command does not sync DAG level Access Control Β· Issue #13376 Β· apache/airflow Β· GitHub
No typeNo projectsNone yetNo branches or pull requests
Skip to content
Navigation Menu
{{ message }}
-
Notifications
You must be signed in to change notification settings - Fork 15.4k
Closed
Labels
affected_version:2.0Issues Reported for 2.0Issues Reported for 2.0kind:bugThis is a clearly a bugThis is a clearly a bug
Milestone
Description
Apache Airflow version: 2.0.0
What happened:
Running sync_perm CLI command does not synchronize the permission granted through the DAG via access_control.
This is because of dag serialization. When dag serialization is enabled, the dagbag will exhibit a lazy loading behaviour.
How to reproduce it:
- Add access_control to a DAG where the new role has permission to see the DAG.
access_control={
"test": {'can_dag_read'}
},
- Run
airflow sync-perm
. - Log in as the new user and you will still not see any DAG.
- If you refresh the DAG, the new user will be able to DAG after they refresh their page
Expected behavior
When I run airflow sync-perm
, I expect the role who has been granted read permission for the DAG to be able to see that DAG.
This is also an issue with 1.10.x with DAG Serialization enabled, so would be good to backport it too.
chodankarcc
Metadata
Metadata
Assignees
Labels
affected_version:2.0Issues Reported for 2.0Issues Reported for 2.0kind:bugThis is a clearly a bugThis is a clearly a bug
Type
Projects
Milestone
Relationships
Development
Issue actions
You canβt perform that action at this time.