rdblue commented on issue #16462:
URL: https://github.com/apache/iceberg/issues/16462#issuecomment-4503007471

   This requires trusting a malicious catalog, which is not reasonable. If an 
attacker controls a trusted catalog, that attacker already has access to user 
identity tokens and can do much more than reconfigure storage traffic. In 
addition, the ability for the catalog to configure the storage that the client 
connects to (and provide it credentials to that storage) is an intended feature.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to