-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(storage): azdls #223
feat(storage): azdls #223
Conversation
@@ -9,6 +10,14 @@ pub(crate) async fn write_metadata_file( | |||
table_metadata: impl Serialize, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hm, ich glaube hier sollten wir nochmal ran in einem nächsten PR.
Die metadata_location ist ja schon Teil der table_metadata. Die aktuelle Implementierung lässt Fehler zu.
Darüber hinaus werden wir in Zukunft auch properties brauchen. Ein Kollege schaut sich gerade #156 an (@gongrilla), wofür wir properties brauchen.
f685347
to
65fc96e
Compare
65fc96e
to
37b6092
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We should also update the openapi-spec.
6e8d896
to
c2c4b6b
Compare
315c559
to
19ad604
Compare
table_location, | ||
secret | ||
.ok_or_else(|| { | ||
CredentialsError::MissingCredential(self.storage_type()) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
By doing this we rule out the possibility of a credential-free adls - completely public. I am not sure if this is relevant- would the storage driver support it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reqsign blows up if there's no credential, even worse, it'll take whatever it can find in env if nothing is passed to it which may cause really weird behavior if some az creds end up mounted into a catalog container, something like a profile being created for a warehouse based on the catalog provider's az account instead of from some client's account.
Co-authored-by: Christian <[email protected]>
azure datalake storage support, currently relies on forks of iceberg-rust -> opendal -> reqsign
we're also pulling in a lot of azure sdk dependencies just for the sas token stuff + validating the storage profile, once FileIO is up to speed we may wanna reconsider this, reqsign also has some sas facilities.