-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Investigate restricting third-party access to user's container #1312
Comments
Disabling these properties The only issue remains is the location specified on CREATE SCHEMA query. A user can still run this and Create a table and insert into another user's container. Write a controller that uses the Trino client REST API to pre-create schemas. |
Todo: Write a controller in aaw-kubeflow-profiles-controller to create schemas using Trino Client REST API |
Apache Ranger will be able to resolve this type of use case. There is a trino-ranger plugin in the works: trinodb/trino#13297 |
Closing. Going to create another task for schema profiles controller in next sprint. |
Able to create table and insert data into another user's blob container. Investigate either at Trino/Azure level to restrict access using the blob URI.
The text was updated successfully, but these errors were encountered: