-
Notifications
You must be signed in to change notification settings - Fork 212
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE REQUEST #32] On-Premises S3 / S3 Compatible... #389
base: main
Are you sure you want to change the base?
Conversation
This comment was marked as outdated.
This comment was marked as outdated.
...s-core/src/main/java/org/apache/polaris/core/storage/s3/S3CredentialsStorageIntegration.java
Outdated
Show resolved
Hide resolved
...s-core/src/main/java/org/apache/polaris/core/storage/s3/S3CredentialsStorageIntegration.java
Outdated
Show resolved
Hide resolved
dd8d860
to
e2c296b
Compare
@@ -23,6 +23,8 @@ public enum PolarisCredentialProperty { | |||
AWS_KEY_ID(String.class, "s3.access-key-id", "the aws access key id"), | |||
AWS_SECRET_KEY(String.class, "s3.secret-access-key", "the aws access key secret"), | |||
AWS_TOKEN(String.class, "s3.session-token", "the aws scoped access token"), | |||
AWS_ENDPOINT(String.class, "s3.endpoint", "the aws s3 endpoint"), | |||
AWS_PATH_STYLE_ACCESS(Boolean.class, "s3.path-style-access", "the aws s3 path style access"), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
whether or not to use path-style access
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Many S3COMPATIBLE solutions are deployed without network devices or configurations in front of them allowing support of dynamic hosts names including buckets.
TLS certificate with private AC could also be a challenge for dynamic host name. "*. domain" can also be forbidden by some enterprise security policy
Path style is useful in many cases. In ideal world I agree it should stay deprecated...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think @eric-maynard was asking if we can change the description to something like this:
AWS_PATH_STYLE_ACCESS(Boolean.class, "s3.path-style-access", "the aws s3 path style access"), | |
AWS_PATH_STYLE_ACCESS(Boolean.class, "s3.path-style-access", "whether or not to use path-style access"), |
I also agreed that we should make sure it false
by default
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For IBM's watsonx.data product it is set to true
by default for Minio and Ceph bucket types, reason being that it's more likely to work. Path style will work regardless of whether the customer has setup wildcard DNS, a TLS certificate with a subject-alternate-name (the wildcard), and the hostname in the zonegroup (for Ceph). Virtual host style will only work if all of those things are done.
It's not a hill I would die on, but it's worthy of consideration.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
To clarify, I was referring to the Polaris scope default. Users always have the option to set it to true when creating a new catalog.
.../org/apache/polaris/core/storage/s3compatible/S3CompatibleCredentialsStorageIntegration.java
Outdated
Show resolved
Hide resolved
.../org/apache/polaris/core/storage/s3compatible/S3CompatibleCredentialsStorageIntegration.java
Outdated
Show resolved
Hide resolved
@lefebsy are we merging this PR soon or there is still some outstanding work? |
Hi @lefebsy, let me know once the PR is ready for another look. As I said here, #389 (comment), this PR isn't blocked by other PRs. |
@flyrain |
@@ -62,6 +63,7 @@ | |||
@JsonTypeInfo(use = JsonTypeInfo.Id.NAME) | |||
@JsonSubTypes({ | |||
@JsonSubTypes.Type(value = AwsStorageConfigurationInfo.class), | |||
@JsonSubTypes.Type(value = S3CompatibleStorageConfigurationInfo.class), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What is the reason to model non-AWS S3 storage as a separate config info class as opposed to adding a few optional settings to AwsStorageConfigurationInfo
?
My understanding is that the same AWS SDK is used for actual access anyway, so storage config info basically goes into the same AWS client, right?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The question of modifying the current implementation arose at the beginning of the PR. The direction given was to propose a variant in order not to disrupt the existing. Possibly in a second step, unify.
So this PR follows the instructions and avoids modifying the existing and proposes a variant adapted to the S3 alternatives.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fair enough... I'll review closer soon :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
AWS config is an S3 configuration.
I'd not be opposed to rename AwsStorageConfigurationInfo
to S3StorageConfigurationInfo
and make that configuration work.
Having two different configurations for the same thing doesn't really make sense to me.
@lefebsy, mind doing this?
S3CompatibleStorageConfigInfo s3ConfigModel = | ||
(S3CompatibleStorageConfigInfo) storageConfigModel; | ||
config = | ||
new S3CompatibleStorageConfigurationInfo( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Don't we as well need pass a custom STS endpoint in order to initialize STSClient with a custom endpoint that points to MinIO as an example?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This implementation explicitly pass the s3 endpoint to the stsClient.
Apart from AWS which exposes AssumeRole, STS and globally IAM on a separate endpoint from the S3 APIs, other S3 providers seem to use the same endpoint.
In a mixed AWS + other approach, it would be necessary to explicitly specify the STS endpoint and the S3 endpoint.
In the non-AWS approach, it is not mandatory, it is the same endpoint (Minio, Ceph, backblaze, Dell ECS, ...)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also, Backblaze (only one 'l'! 🙂) B2, and I'm guessing some other S3-compatible services, doesn't have an STS, so there's no point in specifying an endpoint.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
got it. Thanks for the info :)
@@ -250,6 +268,21 @@ public Builder setStorageConfigurationInfo( | |||
awsConfig.validateArn(awsConfigModel.getRoleArn()); | |||
config = awsConfig; | |||
break; | |||
|
|||
case S3_COMPATIBLE: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am still trying to figure out why we opted to introduce a new source type S3_COMPATIBLE
? IMO this should be agnostic, is the issue here enforcing the s3 custom endpoint and path style? (they are mandatory with compatible)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Correct.
To complete the response given to @dimas-b a few lines higher :
Before the security arbitrage favoring vending only STS there were more options to be used by onPrem ecosystems habits (keys that do not expire quickly by exemple).
Since then, the difference between the AWS class and the S3compatible class is smaller.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for thew info. I am fine with it as it is as long we do have a plan to unify it at some point
helm/polaris/values.yaml
Outdated
# test is not recommended for production. | ||
authenticator: | ||
# -- Configures whether to enable the bootstrap metastore manager job | ||
bootstrapMetastoreManager: false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This change doesn't look right. You are removing extremely useful stuff from this values.yaml file, and the added content seems to come from an old state of the Helm chart.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@lefebsy maybe would be easier if you take the helm stuff outside of this PR and have it as a follow up. Wdyt? (so we don't prolong this PR further :))
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok it's a total mistake from my part, I do not know when this occurred, probably during a rebase. I will come back to main branch for this file.
Sorry
Thanks a lot @lefebsy for working on it. I agreed that we don't have to put Helm change in, so that the github pipeline can pass. We can always add it back as a followup PR. It should be ready to merge as long as we fix this https://github.com/apache/polaris/pull/389/files#r1980741611. |
Yes. I have restored helm from main branch. I have probably done a small test modification and forget it. I'm really confused. |
Thanks @lefebsy . The PR looks now a lot better from helm standpoint. We just need to address last comment from @flyrain to get this PR going 🙂 |
@lefebsy you have a conflict by the way |
# Conflicts: # polaris-core/src/main/java/org/apache/polaris/core/storage/PolarisCredentialProperty.java
=> Hello, the conflict should be resolved since rebased :-) |
Thanks @lefebsy . Can you please address this last comment so we have this PR wrapped up? https://github.com/apache/polaris/pull/389/files#r1980741611 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for your contribution @lefebsy ! Overall I think it's a valuable addition to Polaris, but I have a couple of concerns.
s3ConfigModel.getS3PathStyleAccess(), | ||
s3ConfigModel.getS3Region(), | ||
s3ConfigModel.getS3RoleArn(), | ||
new ArrayList<>(allowedLocations)); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: why new
array?
return S3CompatibleStorageConfigInfo.builder() | ||
.setStorageType(StorageConfigInfo.StorageTypeEnum.S3_COMPATIBLE) | ||
.setS3Endpoint(s3Config.getS3Endpoint()) | ||
.setS3ProfileName(s3Config.getS3ProfileName()) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
these kind of attribute copy blocks of code are easy to mess up by accidental typos... Could you add a unit test for this conversion?
@@ -241,6 +243,7 @@ public void validateMaxAllowedLocations(int maxAllowedLocations) { | |||
/** Polaris' storage type, each has a fixed prefix for its location */ | |||
public enum StorageType { | |||
S3("s3://"), | |||
S3_COMPATIBLE("s3://"), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I believe s3
is sufficient for this PR because AWS also maps to only s3
. Other URIs schemes (like s3a
) are applicable to AWS too, but I think it is best to handle that in a follow-up PR.
if (roleArn.contains("aws-cn")) { | ||
return "arn:aws-cn:s3:::"; | ||
} else if (roleArn.contains("aws-us-gov")) { | ||
return "arn:aws-us-gov:s3:::"; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I believe this kind of special cases should not be in Polaris code, but it's ok for this PR as I understand it mimics previous AWS-specific logic.
@Nonnull Set<String> allowedReadLocations, | ||
@Nonnull Set<String> allowedWriteLocations) { | ||
|
||
String caI = System.getenv(storageConfig.getS3CredentialsCatalogAccessKeyId()); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm strongly opposed to storing credential env. variable name is the storage config (essentially in the catalog config).
The environment and catalog config are different management domains with different concerns.
Using a static env. variable name (e.g. AWS_ACCESS_KEY
) is ok in the short term, IMHO.
Is it strictly necessary to support different secrets for different catalogs in this case?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I shared the same concern, see here https://github.com/apache/polaris/pull/389/files#r1980741611
StaticCredentialsProvider.create(AwsBasicCredentials.create(caI, caS))); | ||
LOGGER.debug("S3Compatible - stsClient using keys from catalog settings"); | ||
} | ||
try (StsClient stsClient = stsBuilder.build()) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Creating an StsClient for each request is an overkill, IMHO, but we can probably refactor that later.
@@ -40,7 +40,7 @@ follows: | |||
|
|||
```shell | |||
./gradlew clean :polaris-quarkus-server:assemble -Dquarkus.container-image.build=true --no-build-cache | |||
docker compose -f ./regtests/docker-compose.yml up --build --exit-code-from regtest | |||
docker-compose -f ./regtests/docker-compose.yml up --build --exit-code-from regtest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This seems to be unrelated to the purpose of this PR. Please make this change in a separate PR.
- 9000:9000 | ||
volumes: | ||
- ./miniodata:/data | ||
- ./certs:/root/.minio/certs/ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this strictly necessary for tests?
* @return A policy limiting scope access | ||
*/ | ||
// TODO - add KMS key access | ||
public static IamPolicy policyString( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why not reuse the policy from the code the deals with AWS S3?
@lefebsy : I appreciate your work on this PR, but I'd like to submit an alternative implementation for consideration by the community. Will mention it here, when it's ready. |
Hi @dimas-b , great to know that you will contribute to this as well. Given the PR is WIP for a quite long time, can we merge this first, and make changes later? We can always improve on it and make changes as needed. |
|
||
EnumMap<PolarisCredentialProperty, String> propertiesMap = | ||
new EnumMap<>(PolarisCredentialProperty.class); | ||
propertiesMap.put(PolarisCredentialProperty.AWS_ENDPOINT, storageConfig.getS3Endpoint()); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
tl;dr: I believe the endpoint is currently not set when the SKIP_CREDENTIAL_SUBSCOPING_INDIRECTION
feature is activated, but I think it should be (or it should be configurable at the catalog level again).
Long story: I tested this MR successfully in an earlier stage (back in early January, before the Quarkus migration) and now wanted to upgrade our PoC setup to the most recent state of this MR. Our setup involves a Ceph S3 backend that doesn't have the STS configured, which means: we need to be able to adjust the s3.endpoint
property, but can't use subscoped credentials. This path doesn't seem to be possible anymore. Previously, we had SKIP_CREDENTIAL_SUBSCOPING_INDIRECTION
disabled (because we weren't aware of it) but skipCredentialSubscopingIndirection
(on the catalog) enabled. The latter seems to have been removed in one of the updates, so STS is always enforced if not skipped globally. If SKIP_CREDENTIAL_SUBSCOPING_INDIRECTION
is set, the getSubscopedCreds
function is not even called by the FileIOUtil
, so the S3FileIO
is initialized without region, endpoint etc., which causes it to fall back to environment variables and eventually failing.
For our case, we definitely need to set the endpoint for our Ceph catalog, but also don't want to globally disable STS and/or setting global AWS_*
variables just to fix the S3FileIO
, because we want to have AWS S3 and Ceph S3 catalogs in the same Polaris instance. Am I missing something in configuring this or does this not work anymore?
Description (edited) :
This is a S3 proposition of Polaris core storage implementation, copy of the aws + new parameters : endpoint, path style...
It is tested OK with :
This should works with many S3 compatible solutions like Dell ECS, NetApp StorageGRID, etc...
By default it is trying to respect the same behavior about credentials than AWS (IAM/STS). The same dynamic policy is applied, limiting the scope to the data queried.
Otherwise if STS is not available 'skipCredentialSubscopingIndirection' = true will disabling Polaris "SubScoping" of the credentials
Let me know your opinion about this design proposal.
Thank you
Included Changes:
Type of change:
Checklist:
Please delete options that are not relevant.