XJDKC commented on code in PR #1506:
URL: https://github.com/apache/polaris/pull/1506#discussion_r2087269395


##########
spec/polaris-management-service.yml:
##########
@@ -938,6 +940,38 @@ components:
           format: password
           description: Bearer token (input-only)
 
+    SigV4AuthenticationParameters:
+      type: object
+      description: AWS Signature Version 4 authentication
+      allOf:
+        - $ref: '#/components/schemas/AuthenticationParameters'
+      properties:
+        roleArn:
+          type: string
+          description: The aws IAM role arn assumed by polaris userArn when 
signing requests
+          example: 
"arn:aws:iam::123456789001:role/role-that-has-remote-catalog-access"
+        roleSessionName:
+          type: string
+          description: The role session name to be used by the SigV4 protocol 
for signing requests
+          example: "polaris-remote-catalog-access"
+        externalId:
+          type: string
+          description: An optional external id used to establish a trust 
relationship with AWS in the trust policy
+          example: "external-id-1234"
+        signingRegion:
+          type: string
+          description: Region to be used by the SigV4 protocol for signing 
requests
+          example: "us-west-2"
+        signingName:
+          type: string
+          description: The service name to be used by the SigV4 protocol for 
signing requests, the default signing name is "execute-api" is if not provided
+          example: "glue"
+        serviceIdentity:
+          $ref: '#/components/schemas/ServiceIdentityInfo'

Review Comment:
   Hey Dmitri, I discussed the proposal of adding another set of management 
apis for the service identity info in my design doc (topic 3, proposal 3): 
[Apache Polaris Creds Management 
Proposal](https://docs.google.com/document/d/1MAW87DtyHWPPNIEkUCRVUKBGjhh5bPn0GbtV7fifm30/edit?usp=sharing)
   
   Here is the pros and cons:
   * Pros
     * Clean separation of concerns: identity info is no longer mixed into 
catalog or storage config
     * Keeps catalog schema simple and focused on user input
     * Easy to extend without touching catalog model or breaking clients
     * Works well for self-managed and SaaS deployments
   * Cons
     * Users must make an additional API call to fetch identity info, it 
requires users to coordinate across two APIs to complete setup
     * Identity context is no longer colocated with the catalog entity, this 
assumed that polaris will use same identity for all the catalogs within the 
same realm
     * Incompatible with current behavior where identity fields are visible in 
the catalog response
     * Some service-managed fields like consentUrl are not static and cannot be 
precomputed globally. Instead, they depend on user-provided configuration 
(e.g., Azure tenant ID) and are generated after Polaris receives that info.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to