Thanks everyone for reviewing this AIP. As Jarek and others suggested, I expanded the scope of this AIP and divided it into three phases. With the increased scope, the boundary line between this AIP and AIP-85 got a little thinner, but I believe these are still two different enhancements to make.
On Fri, Jul 25, 2025 at 10:51 PM Sumit Maheshwari <sumeet.ma...@gmail.com> wrote: > Yeah, overall it makes sense to include Triggers as well to be part of > this AIP and phase out the implementation. Though I didn't exclude Triggers > because "Uber" doesn't need that, I just thought of keeping the scope of > development small and achieving them, just like it was done in Airlfow 3 by > secluding only workers and not DAG-processor & Triggers. > > But if you think Triggers should be part of this AIP itself, then I can do > that and include Triggers as well in it. > > On Fri, Jul 25, 2025 at 7:34 PM Jarek Potiuk <ja...@potiuk.com> wrote: > >> I would very much prefer the architectural choices of this AIP are based >> on >> "general public" needs rather than "Uber needs" even if Uber will be >> implementing it - so from my point of view having Trigger separation as >> part of it is quite important. >> >> But that's not even this. >> >> We've been discussing for example for Deadlines (being implemented by >> Dennis and Ramit a possibility of short, notification-style "deadlines" >> to be send to triggerer for execution - this is well advanced now, and >> whether you want it or not Dag-provided code might be serialized and sent >> to triggerer for execution. This is part of our "broader" architectural >> change where we treat "workers" and "triggerer" similarly as a general >> executors of "sync" and "async" tasks respectively. That's where Airflow >> is >> evolving towards - inevitably. >> >> But we can of course phase things in out for implementation - even if AIP >> should cover both, I think if the goal of the AIP and preamble is about >> separating "user code" from "database" as the main reason, it also means >> Triggerer if you ask me (from design point of view at least). >> >> Again implementation can be phased and even different people and teams >> might work on those phases/pieces. >> >> J. >> >> On Fri, Jul 25, 2025 at 2:29 PM Sumit Maheshwari <sumeet.ma...@gmail.com> >> wrote: >> >> > > >> > > > #2. Yeah, we would need something similar for triggerers as well, >> but >> > > that >> > > can be done as part of a different AIP >> > >> > >> > You won't achieve your goal of "true" isolation of user code if you >> don't >> > > do triggerer. I think if the goal is to achieve it - it should cover >> > both. >> > >> > >> > My bad, should've explained our architecture for triggers as well, >> > apologies. So here it is: >> > >> > >> > - Triggers would be running on a centralized service, so all the >> Trigger >> > classes will be part of the platform team's repo and not the >> customer's >> > repo >> > - The triggers won't be able to use any libs other than std ones, >> which >> > are being used in core Airflow (like requests, etc) >> > - As we are the owners of the core Airflow repo, customers have to >> get >> > our approval to land any class in this path (unlike the dags repo >> which >> > they own) >> > - When a customer's task defer, we would have an allowlist on our >> side >> > to check if we should do the async polling or not >> > - If the Trigger class isn't part of our repo (allowlist), just fail >> the >> > task, as anyway we won't be having the code that they used in the >> > trigger >> > class >> > - If any of these conditions aren't suitable for you (as a customer), >> > feel free to use sync tasks only >> > >> > >> > But in general, I agree to make triggerer svc also communicate over apis >> > only. If that is done, then we can have instances of triggerer svc >> running >> > at customer's side as well, which can process any type of trigger class. >> > Though that's not a blocker for us at the moment, cause triggerer are >> > mostly doing just polling using simple libs like requests. >> > >> > >> > >> > On Fri, Jul 25, 2025 at 5:03 PM Igor Kholopov >> <ikholo...@google.com.invalid >> > > >> > wrote: >> > >> > > Thanks Sumit for the detailed proposal. Overall I believe it aligns >> well >> > > with the goals of making Airflow well-scalable beyond a single-team >> > > deployment (and AIP-85 goals), so you have my full support with this >> one. >> > > >> > > I've left a couple of clarification requests on the AIP page. >> > > >> > > Thanks, >> > > Igor >> > > >> > > On Fri, Jul 25, 2025 at 11:50 AM Sumit Maheshwari < >> > sumeet.ma...@gmail.com> >> > > wrote: >> > > >> > > > Thanks Jarek and Ash, for the initial review. It's good to know that >> > the >> > > > DAG processor has some preemptive measures in place to prevent >> access >> > > > to the DB. However, the main issue we are trying to solve is not to >> > > provide >> > > > DB creds to the customer teams, who are using Airflow as a >> multi-tenant >> > > > orchestration platform. I've updated the doc to reflect this point >> as >> > > well. >> > > > >> > > > Answering Jarek's points, >> > > > >> > > > #1. Yeah, had forgot to write about token mechanism, added that in >> doc, >> > > but >> > > > still how the token can be obtained (safely) is still open in my >> mind. >> > I >> > > > believe the token used by task executors can be created outside of >> it >> > as >> > > > well (I may be wrong here). >> > > > >> > > > #2. Yeah, we would need something similar for triggerers as well, >> but >> > > that >> > > > can be done as part of a different AIP >> > > > >> > > > #3. Yeah, I also believe the API should work largely. >> > > > >> > > > #4. Added that in the AIP, that instead of dag_dirs we can work with >> > > > dag_bundles and every dag-processor instance would be treated as a >> diff >> > > > bundle. >> > > > >> > > > Also, added points around callbacks, as these are also fetched >> directly >> > > > from the DB. >> > > > >> > > > On Fri, Jul 25, 2025 at 11:58 AM Jarek Potiuk <ja...@potiuk.com> >> > wrote: >> > > > >> > > > > > A clarification to this - the dag parser today is likely not >> > > protection >> > > > > against a dedicated malicious DAG author, but it does protect >> against >> > > > > casual DB access attempts - the db session is blanked out in the >> > > parsing >> > > > > process , as are the env var configs >> > > > > >> > > > > >> > > > >> > > >> > >> https://github.com/apache/airflow/blob/main/task-sdk/src/airflow/sdk/execution_time/supervisor.py#L274-L316 >> > > > > - >> > > > > is this perfect no? but it’s much more than no protection >> > > > > Oh absolutely.. This is exactly what we discussed back then in >> March >> > I >> > > > > think - and the way we decided to go for 3.0 with full knowledge >> it's >> > > not >> > > > > protecting against all threats. >> > > > > >> > > > > On Fri, Jul 25, 2025 at 8:22 AM Ash Berlin-Taylor <a...@apache.org >> > >> > > > wrote: >> > > > > >> > > > > > A clarification to this - the dag parser today is likely not >> > > protection >> > > > > > against a dedicated malicious DAG author, but it does protect >> > against >> > > > > > casual DB access attempts - the db session is blanked out in the >> > > > parsing >> > > > > > process , as are the env var configs >> > > > > > >> > > > > >> > > > >> > > >> > >> https://github.com/apache/airflow/blob/main/task-sdk/src/airflow/sdk/execution_time/supervisor.py#L274-L316 >> > > > > > - is this perfect no? but it’s much more than no protection >> > > > > > >> > > > > > > On 24 Jul 2025, at 21:56, Jarek Potiuk <ja...@potiuk.com> >> wrote: >> > > > > > > >> > > > > > > Currently in the DagFile processor there is no built-in >> > protection >> > > > > > against >> > > > > > > user code from Dag Parsing to - for example - read database >> > > > > > > credentials from airflow configuration and use them to talk >> to DB >> > > > > > directly. >> > > > > > >> > > > > >> > > > >> > > >> > >> >