-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add connector SPI for returning redactable properties #24562
base: master
Are you sure you want to change the base?
Conversation
core/trino-spi/src/main/java/io/trino/spi/connector/ConnectorFactory.java
Outdated
Show resolved
Hide resolved
lib/trino-plugin-toolkit/src/main/java/io/trino/plugin/base/config/ConfigPropertyMetadata.java
Outdated
Show resolved
Hide resolved
plugin/trino-postgresql/src/test/java/io/trino/plugin/postgresql/TestPostgreSqlPlugin.java
Outdated
Show resolved
Hide resolved
core/trino-spi/src/main/java/io/trino/spi/connector/ConnectorFactory.java
Outdated
Show resolved
Hide resolved
{ | ||
checkArgument(!isNullOrEmpty(name), "name is null or empty"); | ||
this.name = name; | ||
this.module = requireNonNull(module, "module is null"); | ||
Set<Class<?>> configClasses = ImmutableSet.<Class<?>>builder() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Instead of attempting to list every configuration class, I think we should modify ConfigurationFactory
in Airlift to extract the properties for us. I'm thinking (just thoughts after a brief look) that we have a method to extract all properties from a set of modules, and classify them into used, unused, and unknown. With used and unused having sub classification for secure or unsecure.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I like the idea of getting properties from Airlift. However, I’m wondering if this is feasible, given that some modules are bound conditionally. Additionally, in some cases, we use constructs like: https://github.com/trinodb/trino/blob/master/plugin/trino-delta-lake/src/main/java/io/trino/plugin/deltalake/DeltaLakeSecurityModule.java#L43-L49, which means Airlift isn’t even aware that multiple modules can be bound.
I’m assuming we want to have a static list of possible properties, rather than bootstrapping a connector when getSecuritySensitivePropertyNames
is called. Is this a wrong assumption?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@piotrrzysko Can we scan the classpath to find all configuration classes annotated with @config ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I do this in this test:
trino/plugin/trino-postgresql/src/test/java/io/trino/plugin/postgresql/TestPostgreSqlPlugin.java
Line 97 in 8018b45
Set<ConfigPropertyMetadata> propertiesFoundInClasspath = findPropertiesInRuntimeClasspath(excludedClasses); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@piotrrzysko we could generate an index while building a project, in the trino-maven-plugin
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Classpath scanning won't work becasue you can mount configuration classes under a prefix... like we do for HTTP clients.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Update
I implemented the idea of retrieving properties from Airlift. See the recent changes in this PR and the corresponding PR in Airlift: airlift/airlift#1354.
To verify its functionality, I applied it to the following connectors:
- PostgreSQL (effectively all JDBC connectors, as they share the same returning sensitive properties)
- Hive, Iceberg, Delta, and Hudi – These are unique because they create a separate Bootstrap instance when loading trino-hdfs.
One concern I had was whether traversing the module tree might cause side effects. Specifically, I wasn’t sure what operations are allowed in the Module.configure
method. For example, can you open a database connection in this method?
After some thought, I believe we’re fine because a similar situation can occur during catalog creation. Here’s an example:
- A user issues a query with invalid configuration.
- Connector bootstrapping fails after the configuration stage.
- If any resource was opened during the process, it would remain unclosed.
Based on this, I assume operations with side effects, such as opening database connections, shouldn't be performed in Module.configure
.
Unresolved Issue
I encountered a problem while updating the PR with masking (#24563).
Since we now need to evaluate catalog properties for redaction right after parsing (reference code), more complex expressions than string literals can cause failures. For example, evaluating the following properties fails because the session doesn’t yet contain a transactionId:
CREATE CATALOG catalog USING jdbc
WITH (
"connection-url" = 'jdbc:h2:mem:config',
"connection-user" = lower('BOB'),
"connection-password" = '1234'
)
To address this, I tried delaying redaction as much as possible by moving it to just before the query state machine is created (reference code). This didn’t resolve the issue. The query failed because it hadn’t been registered yet in the LanguageFunctionManager
(reference code). The registration only happens after the query machine is created (reference code).
I’m not yet sure if I can delay redaction further, as the query machine references the query text, which is used to build QueryInfo objects that are exposed via the REST API. For now, when a query contains more complex expressions I mask all the properties.
8018b45
to
a4f5809
Compare
I think this will be helpful in getting #22669 done as well (the main stumbling block there is that by making catalog properties available in all catalog manager implementations, we may expose some security-sensitive properties). |
a4f5809
to
47db44b
Compare
Update: It seems the issue I described here: #24562 (comment) is solvable (thanks, @dain, for the help!). I’ve applied the necessary changes to #24563 and added tests to confirm that the evaluation of complex expressions works as expected. This PR now depends on: airlift/airlift#1354 |
c4a3d9f
to
4edb088
Compare
4edb088
to
e32ef86
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good % comment
core/trino-spi/src/main/java/io/trino/spi/connector/ConnectorFactory.java
Outdated
Show resolved
Hide resolved
lib/trino-plugin-toolkit/src/main/java/io/trino/plugin/base/config/ConfigUtils.java
Show resolved
Hide resolved
The SPI will be used by the engine to redact security-sensitive information in statements that manage catalogs. It has been added at the connector factory level, rather than the connector level, to allow more flexibility in retrieving properties. In some cases, we want to perform redacting before a connector is initiated. For example, when we create a new catalog by issuing the CREATE CATALOG statement.
e32ef86
to
6f81c49
Compare
public final class ConfigUtils | ||
{ | ||
private ConfigUtils() {} | ||
|
||
public static Set<String> getSecuritySensitivePropertyNames(Map<String, String> config, Set<ConfigPropertyMetadata> usedProperties) | ||
{ | ||
Set<String> sensitivePropertyNames = new HashSet<>(config.keySet()); | ||
|
||
for (ConfigPropertyMetadata propertyMetadata : usedProperties) { | ||
if (!propertyMetadata.securitySensitive()) { | ||
sensitivePropertyNames.remove(propertyMetadata.name()); | ||
} | ||
} | ||
|
||
return ImmutableSet.copyOf(sensitivePropertyNames); | ||
} | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
public final class ConfigUtils | |
{ | |
private ConfigUtils() {} | |
public static Set<String> getSecuritySensitivePropertyNames(Map<String, String> config, Set<ConfigPropertyMetadata> usedProperties) | |
{ | |
Set<String> sensitivePropertyNames = new HashSet<>(config.keySet()); | |
for (ConfigPropertyMetadata propertyMetadata : usedProperties) { | |
if (!propertyMetadata.securitySensitive()) { | |
sensitivePropertyNames.remove(propertyMetadata.name()); | |
} | |
} | |
return ImmutableSet.copyOf(sensitivePropertyNames); | |
} | |
} | |
public final class ConfigUtils | |
{ | |
private ConfigUtils() {} | |
public static Set<String> getSecuritySensitivePropertyNames(Map<String, String> config, Set<ConfigPropertyMetadata> usedProperties) | |
{ | |
Set<String> safePropertyNames = usedProperties.stream() | |
.filter(metadata -> !metadata.securitySensitive()) | |
.map(ConfigPropertyMetadata::name) | |
.collect(toImmutableSet()); | |
return Sets.difference(config.keySet(), safePropertyNames); | |
} | |
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@hashhar why oh why :)
@Override | ||
public Set<String> getSecuritySensitivePropertyNames(String catalogName, Map<String, String> config, ConnectorContext context) | ||
{ | ||
ClassLoader classLoader = HiveConnectorFactory.class.getClassLoader(); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
you can inline class loader
|
||
if (quietBootstrap) { | ||
app.quiet() | ||
.skipErrorReporting(); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
move to the left
module); | ||
|
||
if (quietBootstrap) { | ||
app.quiet() |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it would be better to have a single method that accepts boolean flag as these are always called together in the if
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this will allow for the chained call without the need to assign to a variable
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
let's add withQuiet(boolean flag)
and withSkipErrorReporting(boolean flag)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are you suggesting adding these methods to Airlift? If so, that would be inconsistent with other methods in Bootstrap
. Currently, boolean switches like loadSecretsPlugins
and doNotInitializeLogging
do not take arguments.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes. Inconsistent? Maybe, but more readable in the callsite.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For consistency we can add all methods with boolean flags
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't have a strong opinion on this. However, the construct with conditionally applying quiet
and skipErrorReporting
is currently used in five places, and I don't think it will be needed for other connectors. In fact, I can replace four of these five usages with a different approach - it will be a chained call.
It seems to me that introducing a new convention only for this case might be overkill, especially considering that Bootstrap
is used extensively elsewhere.
plugin/trino-hive/src/test/java/io/trino/plugin/hive/TestHivePlugin.java
Outdated
Show resolved
Hide resolved
Exposed properties fall into one of the following categories: they are either explicitly marked as security-sensitive or are unknown. The connector assumes that unknown properties might be misspelled security-sensitive properties.
This preparatory commit enables bootstrapping HDFS to retrieve its security-sensitive properties.
6f81c49
to
9c71c79
Compare
Description
An alternative approach to #23103. The main difference is that in this approach, the properties requiring redaction are selected from those provided by the user, rather than always returning a static set of predefined security-sensitive properties. The benefits are as follows:
This PR includes an implementation of the new SPI for the PostgreSQL, Hive, Iceberg, Delta, and Hudi connectors. Once we confirm that the approach is correct, we will apply it to the remaining connectors.
Here is a PR demonstrating how the new SPI could be used to mask security-sensitive properties in queries related to creating catalogs: #24563.
Additional context and related issues
Resolves #22887.
Release notes
( ) This is not user-visible or is docs only, and no release notes are required.
( ) Release notes are required. Please propose a release note for me.
(x) Release notes are required, with the following suggested text: