Hi everyone, I’d like to propose adding *context-aware functions* to Apache Polaris so that view definitions can resolve security context on the Polaris side (aka catalog end without depending on engines).
*Proposed functions* 1. *is_principal('<principal_name>')* – returns TRUE if the authenticated principal matches <principal_name>, otherwise FALSE. 2. *is_principal_role('<principal_role_name>')* – returns TRUE when <principal_role_name> appears in the principal’s role set. 3. *is_catalog_role('<catalog_role_name>')* – analogous check at the catalog-role level. *Why it matters* These predicates make views dynamic. Example: CREATE VIEW dynamic_vw ASSELECT *FROM ns1.layer1_tableWHERE is_principal_role('ANALYST'); When a user whose one of principal roles include *ANALYST* calls LOAD VIEW, Polaris rewrites the view to - SELECT * FROM ns1.layer1_table WHERE TRUE; For everyone else the view becomes - SELECT * FROM ns1.layer1_table WHERE FALSE; The result is better and consistent control of the identity resolution without relying on the engine side changes and giving polaris more authority in enforcing things like FGAC (WIP by me). Note the same can be extrapolated to any Polaris stored entity. *Proof of concept* I’ve put together a quick POC branch: https://github.com/apache/polaris/compare/main...singhpk234:polaris:dyanmic/view *Prior art* Snowflake context functions : https://docs.snowflake.com/en/sql-reference/functions-context <https://docs.snowflake.com/en/sql-reference/functions-context> Databricks Unity Catalog offers a similar mechanism called *dynamic views*: https://docs.databricks.com/aws/en/views/dynamic *Next steps* If the community is interested, we can discuss API surface, engine implications, and a roadmap for merging. Eager to hear your feedback! Best, Prashant Singh