Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TrinoRestCatalog can ddos Identity Provider while refreshing auth token because of multiple cached session contexts #25122

Open
varpa89 opened this issue Feb 24, 2025 · 0 comments

Comments

@varpa89
Copy link

varpa89 commented Feb 24, 2025

When we create an Iceberg catalog with iceberg.rest-catalog.session option = NONE TrinoRestCatalog#convert method creates a new SessionContext on each hit with the random UUID. It lead to a situation when we cache iceberg AuthSession and cache key it this random UUID.
The problem is happening because in the background RestSessionCatalog tries to refresh the token for each key in the cache

Image

it was also discussed here

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

1 participant