Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Minor doc enhancements around authentication providers #7710

Merged
merged 2 commits into from
Nov 14, 2023

Conversation

adutra
Copy link
Contributor

@adutra adutra commented Nov 13, 2023

No description provided.

dimas-b
dimas-b previously approved these changes Nov 13, 2023
@@ -210,18 +210,46 @@ The documentation for how to configure Nessie server authentication can be found
The `BasicAuthenticationProvider` allows connecting to a Nessie server that has `BASIC` authentication enabled.
Note that `BASIC` is not supported in production and should only be used for development/testing.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe servers (outside of unit tests) do not allow "basic" auth at all. Cf. this in applicaiton.properties:

# fixed at buildtime
quarkus.http.auth.basic=false

Would you mind fixing this doc paragraph too?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we can remove references to BASIC auth from all docs at this point. WDYT?

"https://<oidc-server>/realms/<realm-name>/protocol/openid-connect/token",
CONF_NESSIE_OAUTH2_CLIENT_ID, "my_client_id",
CONF_NESSIE_OAUTH2_CLIENT_SECRET, "very_secret");
NessieApiV2 api =
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I noticed incidentally when creating this example that the programmatic configuration of the OAuth2 provider is convoluted. There is no easy factory method available, and OAuth2Client and OAuth2ClientParams are package-private.

Should we improve that? (In a separate PR, of course.)

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1 to improvement :)

@adutra adutra merged commit d3f5c23 into projectnessie:main Nov 14, 2023
16 checks passed
@adutra adutra deleted the oauth2-conf-fixes branch November 14, 2023 17:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants