[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-26 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17528462#comment-17528462
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

cgivre merged PR #2516:
URL: https://github.com/apache/drill/pull/2516




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-26 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17528410#comment-17528410
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1110248260

   This pull request **introduces 2 alerts** when merging 
a99c43497ec138497d273ecc2c27c8b8aa903fe3 into 
5080424abbd7cee0f603ede10ab8dbf29ec10c85 - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-18b20330426c3833f80dd34cc942f0118fbdab05)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string
   * 1 for Dereferenced variable may be null




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-25 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17527577#comment-17527577
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

vvysotskyi commented on code in PR #2516:
URL: https://github.com/apache/drill/pull/2516#discussion_r857767899


##
contrib/storage-jdbc/src/main/java/org/apache/drill/exec/store/jdbc/JdbcConventionFactory.java:
##
@@ -0,0 +1,35 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.drill.exec.store.jdbc;
+
+import org.apache.calcite.sql.SqlDialect;
+
+import java.util.Map;
+import java.util.concurrent.ConcurrentHashMap;
+
+public class JdbcConventionFactory {
+
+  private final Map CACHE = new 
ConcurrentHashMap<>();

Review Comment:
   Yes, it would be also nice to have an expiry time on it





> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-25 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17527493#comment-17527493
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

jnturton commented on code in PR #2516:
URL: https://github.com/apache/drill/pull/2516#discussion_r857621992


##
contrib/storage-jdbc/src/main/java/org/apache/drill/exec/store/jdbc/JdbcConventionFactory.java:
##
@@ -0,0 +1,35 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.drill.exec.store.jdbc;
+
+import org.apache.calcite.sql.SqlDialect;
+
+import java.util.Map;
+import java.util.concurrent.ConcurrentHashMap;
+
+public class JdbcConventionFactory {
+
+  private final Map CACHE = new 
ConcurrentHashMap<>();

Review Comment:
   @vvysotskyi Thanks, I've replaced it with a Guava cache that has a maximum 
size of 100 before LRU evictions begin. I wonder if I should set an expiry time 
on it too?





> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-25 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17527491#comment-17527491
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

jnturton commented on code in PR #2516:
URL: https://github.com/apache/drill/pull/2516#discussion_r857621992


##
contrib/storage-jdbc/src/main/java/org/apache/drill/exec/store/jdbc/JdbcConventionFactory.java:
##
@@ -0,0 +1,35 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.drill.exec.store.jdbc;
+
+import org.apache.calcite.sql.SqlDialect;
+
+import java.util.Map;
+import java.util.concurrent.ConcurrentHashMap;
+
+public class JdbcConventionFactory {
+
+  private final Map CACHE = new 
ConcurrentHashMap<>();

Review Comment:
   Thanks, I've replaced it with a Guava cache that has a maximum size of 100 
before evictions LRU begin. I wonder if I should set an expiry time on it too?





> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-25 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17527492#comment-17527492
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

jnturton commented on code in PR #2516:
URL: https://github.com/apache/drill/pull/2516#discussion_r857621992


##
contrib/storage-jdbc/src/main/java/org/apache/drill/exec/store/jdbc/JdbcConventionFactory.java:
##
@@ -0,0 +1,35 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.drill.exec.store.jdbc;
+
+import org.apache.calcite.sql.SqlDialect;
+
+import java.util.Map;
+import java.util.concurrent.ConcurrentHashMap;
+
+public class JdbcConventionFactory {
+
+  private final Map CACHE = new 
ConcurrentHashMap<>();

Review Comment:
   @vvysotskyi Thanks, I've replaced it with a Guava cache that has a maximum 
size of 100 before evictions LRU begin. I wonder if I should set an expiry time 
on it too?





> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-21 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17525920#comment-17525920
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1105565122

   This pull request **introduces 2 alerts** when merging 
c72ba9af4004ddc0d00a758b923b435b59d3f6c8 into 
66bc83233df2aafa6b95d83c650d54df7d91defe - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-eff3f82771070c554fc32081fdf50adaa477acdd)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string
   * 1 for Dereferenced variable may be null




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-21 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17525834#comment-17525834
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

cgivre commented on code in PR #2516:
URL: https://github.com/apache/drill/pull/2516#discussion_r855380007


##
contrib/storage-jdbc/src/main/java/org/apache/drill/exec/store/jdbc/JdbcScanBatchCreator.java:
##
@@ -55,14 +57,22 @@ public CloseableRecordBatch 
getBatch(ExecutorFragmentContext context,
 }
   }
 
-  private ScanFrameworkBuilder createBuilder(OptionManager options, 
JdbcSubScan subScan) {
-JdbcStorageConfig config = subScan.getConfig();
+  private ScanFrameworkBuilder createBuilder(ExecutorFragmentContext context, 
JdbcSubScan subScan) {
 ScanFrameworkBuilder builder = new ScanFrameworkBuilder();
 builder.projection(subScan.getColumns());
 builder.setUserName(subScan.getUserName());
 JdbcStoragePlugin plugin = subScan.getPlugin();
-List> readers =
-  Collections.singletonList(new JdbcBatchReader(plugin.getDataSource(), 
subScan.getSql(), subScan.getColumns()));
+UserCredentials userCreds = 
context.getContextInformation().getQueryUserCredentials();
+DataSource ds = plugin.getDataSource(userCreds)
+  .orElseThrow(() -> UserException.permissionError().message(
+"Query user %s could obtain a connection to %s, missing credentials?",

Review Comment:
   Fixed.





> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-21 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17525833#comment-17525833
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

cgivre commented on code in PR #2516:
URL: https://github.com/apache/drill/pull/2516#discussion_r855379275


##
contrib/storage-jdbc/src/test/java/org/apache/drill/exec/store/jdbc/TestJdbcWriterWithH2.java:
##
@@ -437,6 +445,7 @@ public void testWithReallyLongFile() throws Exception {
   }
 
   @Test
+  @Ignore

Review Comment:
   Fixed (and un-ignored)





> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-21 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17525454#comment-17525454
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

vvysotskyi commented on code in PR #2516:
URL: https://github.com/apache/drill/pull/2516#discussion_r854816913


##
contrib/storage-jdbc/src/main/java/org/apache/drill/exec/store/jdbc/JdbcConventionFactory.java:
##
@@ -0,0 +1,35 @@
+/*
+ * Licensed to the Apache Software Foundation (ASF) under one
+ * or more contributor license agreements.  See the NOTICE file
+ * distributed with this work for additional information
+ * regarding copyright ownership.  The ASF licenses this file
+ * to you under the Apache License, Version 2.0 (the
+ * "License"); you may not use this file except in compliance
+ * with the License.  You may obtain a copy of the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS,
+ * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ * See the License for the specific language governing permissions and
+ * limitations under the License.
+ */
+package org.apache.drill.exec.store.jdbc;
+
+import org.apache.calcite.sql.SqlDialect;
+
+import java.util.Map;
+import java.util.concurrent.ConcurrentHashMap;
+
+public class JdbcConventionFactory {
+
+  private final Map CACHE = new 
ConcurrentHashMap<>();

Review Comment:
   Shouldn't this cache invalidate its entries after some period of time to 
avoid memory leaks?



##
contrib/storage-jdbc/src/test/java/org/apache/drill/exec/store/jdbc/TestJdbcWriterWithH2.java:
##
@@ -437,6 +445,7 @@ public void testWithReallyLongFile() throws Exception {
   }
 
   @Test
+  @Ignore

Review Comment:
   Is there any reason why it is ignored?



##
contrib/storage-jdbc/src/main/java/org/apache/drill/exec/store/jdbc/JdbcStoragePlugin.java:
##
@@ -31,51 +34,89 @@
 import org.apache.drill.common.AutoCloseables;
 import org.apache.drill.common.exceptions.UserException;
 import org.apache.drill.exec.ops.OptimizerRulesContext;
+import org.apache.drill.exec.proto.UserBitShared.UserCredentials;
 import org.apache.drill.exec.server.DrillbitContext;
 import org.apache.drill.exec.store.AbstractStoragePlugin;
 import org.apache.drill.exec.store.SchemaConfig;
 import org.apache.drill.exec.store.security.UsernamePasswordCredentials;
 import 
org.apache.drill.shaded.guava.com.google.common.annotations.VisibleForTesting;
+import org.apache.drill.shaded.guava.com.google.common.collect.ImmutableSet;
 import org.slf4j.Logger;
 import org.slf4j.LoggerFactory;
 
 import javax.sql.DataSource;
 
 public class JdbcStoragePlugin extends AbstractStoragePlugin {
 
-  private static final Logger logger = 
LoggerFactory.getLogger(JdbcStoragePlugin.class);
+  static final Logger logger = 
LoggerFactory.getLogger(JdbcStoragePlugin.class);
 
-  private final JdbcStorageConfig config;
-  private final HikariDataSource dataSource;
-  private final SqlDialect dialect;
-  private final DrillJdbcConvention convention;
-  private final JdbcDialect jdbcDialect;
+  private final JdbcStorageConfig jdbcStorageConfig;
+  private final JdbcDialectFactory dialectFactory;
+  private final JdbcConventionFactory conventionFactory;
+  // DataSources for this storage config keyed on JDBC username
+  private final Map dataSources = new 
ConcurrentHashMap<>();

Review Comment:
   The same regarding caching here.



##
contrib/storage-jdbc/src/main/java/org/apache/drill/exec/store/jdbc/JdbcScanBatchCreator.java:
##
@@ -55,14 +57,22 @@ public CloseableRecordBatch 
getBatch(ExecutorFragmentContext context,
 }
   }
 
-  private ScanFrameworkBuilder createBuilder(OptionManager options, 
JdbcSubScan subScan) {
-JdbcStorageConfig config = subScan.getConfig();
+  private ScanFrameworkBuilder createBuilder(ExecutorFragmentContext context, 
JdbcSubScan subScan) {
 ScanFrameworkBuilder builder = new ScanFrameworkBuilder();
 builder.projection(subScan.getColumns());
 builder.setUserName(subScan.getUserName());
 JdbcStoragePlugin plugin = subScan.getPlugin();
-List> readers =
-  Collections.singletonList(new JdbcBatchReader(plugin.getDataSource(), 
subScan.getSql(), subScan.getColumns()));
+UserCredentials userCreds = 
context.getContextInformation().getQueryUserCredentials();
+DataSource ds = plugin.getDataSource(userCreds)
+  .orElseThrow(() -> UserException.permissionError().message(
+"Query user %s could obtain a connection to %s, missing credentials?",

Review Comment:
   could -> could not





> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DR

[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-20 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17525426#comment-17525426
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1104731624

   This pull request **introduces 2 alerts** when merging 
c615bac0096d2dd596cec96e5ab8a0ff8972c5a4 into 
66bc83233df2aafa6b95d83c650d54df7d91defe - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-7000c38ebc32818d9b81229c0125b13d52dbea99)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string
   * 1 for Dereferenced variable may be null




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-19 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17524709#comment-17524709
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1103457982

   This pull request **introduces 2 alerts** when merging 
861b1585216a384f2a6f232944fa4c9814e70691 into 
fd836a2a6e933c294a53271f7e9b6ba3fea7cc8d - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-655f1b5b213873cb902377487e1e2240447b8b7d)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string
   * 1 for Dereferenced variable may be null




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-19 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17524439#comment-17524439
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1102894124

   This pull request **introduces 2 alerts** when merging 
70c50dcc56f99d8816c756beb9b6190b6b6cf6be into 
fd836a2a6e933c294a53271f7e9b6ba3fea7cc8d - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-ae5cb0f8eedcaa9fa183314f4b09173e35aa7f9f)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string
   * 1 for Dereferenced variable may be null




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-19 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17524331#comment-17524331
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1102685834

   This pull request **introduces 2 alerts** when merging 
ff14630c4045b1f8ad8980f73cd340d3fb317efb into 
fd836a2a6e933c294a53271f7e9b6ba3fea7cc8d - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-e5916ece0f12985634861b644275940387d8f679)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string
   * 1 for Dereferenced variable may be null




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.7#820007)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-11 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17520799#comment-17520799
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1095521738

   This pull request **introduces 1 alert** when merging 
82c9418b57e3e2c5bc38d0004149e0a53ae53d47 into 
634ffa26ae21d138488946930570c95d858406cc - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-1e35a06b8a0f56c138deab384032f8f6d3425afa)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-11 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17520742#comment-17520742
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1095345571

   This pull request **introduces 1 alert** when merging 
7277123bf1cd27e1a4ba45396725ba1ee65afc76 into 
634ffa26ae21d138488946930570c95d858406cc - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-e14a3917a7eba7ef2af53e1fceda0583ec684197)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-10 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17520280#comment-17520280
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1094493794

   This pull request **introduces 1 alert** when merging 
ed92204450c5ace029fded2309a8b250f3059247 into 
634ffa26ae21d138488946930570c95d858406cc - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-dda44f48a37dd04de6f8df2ca78e0df0a42ce07a)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-10 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17520215#comment-17520215
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1094345634

   This pull request **introduces 1 alert** when merging 
904d00171ebaf874bac51515379d035f0afc23f6 into 
355e074858373ab7b42dd303bee9feebe4a671c0 - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-5e452825cc18e7946b26add3dd6a6367334f440c)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)


[jira] [Commented] (DRILL-8155) Introduce new plugin authentication modes

2022-04-08 Thread ASF GitHub Bot (Jira)


[ 
https://issues.apache.org/jira/browse/DRILL-8155?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17519523#comment-17519523
 ] 

ASF GitHub Bot commented on DRILL-8155:
---

lgtm-com[bot] commented on PR #2516:
URL: https://github.com/apache/drill/pull/2516#issuecomment-1092761361

   This pull request **introduces 1 alert** when merging 
2ab0498d88b96c2aab08f5bbf50d63af7a9c9818 into 
355e074858373ab7b42dd303bee9feebe4a671c0 - [view on 
LGTM.com](https://lgtm.com/projects/g/apache/drill/rev/pr-ba22572c5fe296c9af29e77be6ec49488f2a465f)
   
   **new alerts:**
   
   * 1 for Use of externally\-controlled format string




> Introduce new plugin authentication modes
> -
>
> Key: DRILL-8155
> URL: https://issues.apache.org/jira/browse/DRILL-8155
> Project: Apache Drill
>  Issue Type: Improvement
>  Components: Security
>Affects Versions: 1.20.0
>Reporter: Charles Givre
>Assignee: Charles Givre
>Priority: Major
> Fix For: Future
>
>
> At present, Drill storage plugins can use a shared set of credentials to 
> access storage on behalf of Drill users or, in a subset of cases belonging to 
> the broader Hadoop family, they can impersonate the Drill user when 
> drill.exec.impersonation.enabled = true.  An important but missing auth mode 
> is [what is termed "user translation" in 
> Trino|[https://docs.starburst.io/latest/security/impersonation.html].]  Under 
> user translation, the active Drill user is translated to a user known to the 
> external storage by means of a translation table that associates Drill users 
> with their credentials for the external storage.  No support for user 
> impersonation in the external storage is required in this mode.  This ticket 
> proposes that we add establish a design pattern that adds support for this 
> auth mode to Drill storage plugins.
> Another present day limitation is that impersonation, for the plugins that 
> support it, is toggled by a global switch.  We propose here that the auth 
> mode chosen for a plugin should be independent of the auth modes chosen for 
> other plugins, by a move of this option into their respective storage configs.
> Finally, while a standardised means of choosing an authentication mode is 
> desired, note that not every storage plugin needs to, or can, support every 
> mode.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)