lefebsy commented on PR #389:
URL: https://github.com/apache/polaris/pull/389#issuecomment-2458490912

   > I guess I don't understand what isn't supported today with 
catalog-properties. E.g., in 
https://github.com/apache/polaris/blob/main/polaris-service/src/test/java/org/apache/polaris/service/catalog/PolarisSparkIntegrationTest.java
 , we use `S3MockContainer` as an S3 endpoint, which requires the same 
path-style access and custom enpdoint configuration as what's included here. 
Can we not follow the same pattern for minio?
   
   Not found how endpoint or other properties can be set from REST API create 
or update catalog. Only arnRole is accepted as mandatory parameter today in AWS 
storage type.
   
   > 
   > As a rule, I think vending static credentials is _not_ a good idea. Some 
customization for how the STS client is instantiated, possibly with support for 
custom profiles for different catalogs could make sense. But I think, 
ultimately, the credentials returned should _always_ be a temporary session 
token. Even if we just call 
[GetSessionToken](https://docs.aws.amazon.com/STS/latest/APIReference/API_GetSessionToken.html)
 without requiring an IAM role, it would vastly more secure than sending raw 
credentials.
   
   I agree, by default it is STS without role. Raw credentials are poor 
fallback scenario when STS are not available. There is enterprise context where 
STS, assumeRole etc are not allowed. Only pair of keys are available. By 
example, Dell ECS require additional policy to enable STS and assumeRole. Not 
activated out of the box. I tried to be explicit about this degraded security 
pattern.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to