Hi Alex,

Thanks for pushing this forward. I really appreciate the amount of thought and 
iteration that went into the proposal.

I’m generally supportive of the direction here, including introducing a new 
AuthManager instead of trying to fully evolve the existing one in place. Given 
how much non-standard behavior we’ve accumulated over time (internal token 
endpoint assumptions, legacy token exchange, client credential quirks, etc.), 
aiming for better OAuth2 spec compliance and explicitly shedding some of those 
behaviors feels like the right long-term direction.

IMHO the dual-manager approach seems like a reasonable way to manage that 
transition, in a safe way. It gives users a way to try the new manager and 
validate their setups, while still having a clear rollback path if something 
unexpected comes up.

That being said, I can understand the concern around a drop-in replacement from 
a migration perspective. For example, deployment owners of engines like Trino 
may need to update configs rather than getting a fully transparent upgrade - so 
I’m looking forward to discussing those tradeoffs and edge cases in more detail 
at the catalog sync tomorrow.

Cheers, and thanks a lot again for this amazing proposal doc!
Sung

On 2026/01/13 23:39:28 Daniel Weeks wrote:
> I know this thread hasn't gotten a lot of replies yet, but I know there's a
> lot of interest in more standardized Auth and supporting more flows.  I
> really appreciate the effort you've put into this.
> 
> I do want to call out a few points from the doc that we should discuss in
> more detail.  Specifically:
> 
> *Do we take on an OAuth SDK dependency and if so, which one?*
> 
> Looking at the two options, I'm a little concerned about the Nimbus library
> due to the limited number of maintainers.  At a cursory glance, it looks
> like a good library, but relying on a security sensitive library that has
> effectively one maintainer, is a bit of a red flag.  I haven't looked
> closely at the Google library, but it appears to be in maintenance mode
> (though they say they will continue to make security related updates).  I
> have a little more confidence in that, but would love it if someone on the
> Google team could provide any further insight.
> 
> *What is the future for multi-session management?*
> 
> You rightly call out that this is primarily (only?) leveraged by Trino, so
> it might be helpful if they have an alternative, but the intent is to
> have a clear path to propagate identity for multi-tenant systems.  I don't
> think we can reasonably abandon this unless we have a clear path forward
> for identity propagation.
> 
> *Are we creating a new manager or enhancing the existing one?*
> 
> This was discussed the last time we revisited the auth manager, but I feel
> like we were leaning more toward integrating the new client and flows
> rather than a wholesale replacement of the existing auth manager.  I'm a
> little more open to exploring a new manager if the result is a cleaner
> implementation and we can manage migrating between the two, but I'm not
> convinced we necessarily need to replace everything.
> 
> *Do we need to use the REST HTTP Client?*
> 
> I feel like this is more of a requirement if we were rolling the
> implementation ourselves rather than relying on a library.  We have a
> number of other libraries that manage their own clients and connections,
> but I think we want to limit the proliferation in the code we control.
> Ideally, if we could reuse at least the underlying http client, that would
> be great, but if the SDK is managing its own client, I don't think that's
> really a blocker.
> 
> Overall, I remain strongly supportive of improved and more standardized
> OAuth2 support (everyone wants refresh token support and the other flows
> would be beneficial).  I'm primarily concerned with making the transition
> smooth and not introducing auth related inconsistencies for users who
> already have production systems using the current clients.
> 
> Looking forward to discussing more tomorrow, but these are my initial
> thoughts,
> -Dan
> 
> On Mon, Jan 12, 2026 at 8:23 AM Alexandre Dutra <[email protected]> wrote:
> 
> > Hi Christian and team,
> >
> > Thank you for your review. This topic has been added to the agenda for
> > our upcoming catalog sync on January 14th.
> >
> > I agree that porting the legacy token-exchange behavior to the new
> > manager might be unnecessary – I anticipate this will be a key
> > discussion point on Wednesday. Skipping these features would
> > significantly simplify the implementation.
> >
> > I look forward to our meeting!
> >
> > Thanks,
> > Alex
> >
> > On Wed, Jan 7, 2026 at 6:11 PM Christian Thiel
> > <[email protected]> wrote:
> > >
> > > Hello Alex,
> > >
> > > Thanks for your persistent initiative!
> > >
> > > I’ve gone through the document, and it looks good to me. The plan looks
> > solid to me, and the selection of flows aligns with what we previously
> > discussed in the community. I’m not entirely sure we need to migrate the
> > legacy token‑exchange behaviour to the new Manager. Since this flow is
> > specific to Iceberg and the endpoint has been deprecated for over 1.5
> > years, it might no longer be necessary.
> > >
> > > Looking forward to discussing this further in next week's sync! Best,
> > Christian
> > >
> > >
> > >
> > > On Mon, 5 Jan 2026 at 16:30, Alexandre Dutra <[email protected]> wrote:
> > >>
> > >> Hi all,
> > >>
> > >> I hope you're having a great start to the new year!
> > >>
> > >> I'm following up on the Auth Manager v2 proposal that I shared a while
> > >> back. I haven't gotten any feedback or comments on the design doc [1]
> > >> so far, but I know many of us were away during the last weeks
> > >> (including myself).
> > >>
> > >> It would be awesome if we could chat about it during our next catalog
> > >> sync meeting on January 14th. Any feedback is welcome, but I'd
> > >> especially love to hear from folks who use any of the "advanced
> > >> features" mentioned in the document.
> > >>
> > >> Thanks,
> > >> Alex
> > >>
> > >> [1]:
> > https://docs.google.com/document/d/1Hxw-t8Maa7wZFmrlSujm7LRawKsFP3Q31tET_3aRnQU/edit?usp=sharing
> > >> On Fri, Dec 12, 2025 at 6:53 PM Alexandre Dutra <[email protected]>
> > wrote:
> > >> >
> > >> > Hi all,
> > >> >
> > >> > I would like to resume the discussion around the OAuth2 manager in
> > >> > Iceberg REST with a new proposal.
> > >> >
> > >> > Our last conversation [1] indicated a community preference for
> > >> > enhancing the existing manager within iceberg-core, rather than
> > >> > introducing a separate one. We agreed that deprecations and new
> > >> > dependencies, like an OAuth2 library, were acceptable trade-offs.
> > >> >
> > >> > After an extensive PoC, I have developed a design document for what I
> > >> > am calling the "OAuth2 Manager v2" initiative [2].
> > >> >
> > >> > While the ideal goal was a seamless evolution of the existing manager,
> > >> > the reality is more complex. The proposal is designed to make the
> > >> > migration of both configuration and runtime behavior as smooth as
> > >> > possible, although some adjustments will be necessary. A roadmap with
> > >> > different steps (deprecation, transition, removal), spanning a few
> > >> > minor Iceberg versions, is included in the document.
> > >> >
> > >> > I welcome your thoughts on the design doc and look forward to
> > >> > discussing this topic at the next catalog meeting in January 2026.
> > >> >
> > >> > Thanks,
> > >> > Alex
> > >> >
> > >> > [1]: https://lists.apache.org/thread/on7xcr838ol0bctxjjfnkjb72rjwnmsk
> > >> > [2]:
> > https://docs.google.com/document/d/1Hxw-t8Maa7wZFmrlSujm7LRawKsFP3Q31tET_3aRnQU/edit?usp=sharing
> >
> 

Reply via email to