Skip to content

Conversation

@wolfstudy
Copy link
Contributor

@wolfstudy wolfstudy commented Aug 28, 2019

Master Issue: #2

Motivation

Add auth provider for project

Signed-off-by: xiaolong.ran ranxiaolong716@gmail.com

Signed-off-by: xiaolong.ran <ranxiaolong716@gmail.com>
@wolfstudy wolfstudy requested review from sijie and zymap August 28, 2019 03:45
@wolfstudy wolfstudy self-assigned this Aug 28, 2019
@sijie sijie added this to the 0.0.1 milestone Aug 28, 2019
Copy link
Member

@sijie sijie left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@wolfstudy it seems that this auth provider is copied from pulsar-client-go. I can image how it can be used for pulsar client. but how does this work for pulsarctl (mainly pulsarctl is issuing http request)? Can you add the code to show how are you going to use this for securing the http requests?

Signed-off-by: xiaolong.ran <ranxiaolong716@gmail.com>
Signed-off-by: xiaolong.ran <ranxiaolong716@gmail.com>
Signed-off-by: xiaolong.ran <ranxiaolong716@gmail.com>
@wolfstudy
Copy link
Contributor Author

@sijie @zymap PTAL

@sijie
Copy link
Member

sijie commented Aug 28, 2019

Also please add an integration test to ensure tls is working as expected

@sijie sijie mentioned this pull request Aug 28, 2019
29 tasks
Signed-off-by: xiaolong.ran <ranxiaolong716@gmail.com>
@zymap
Copy link
Member

zymap commented Aug 29, 2019

@wolfstudy I left some questions. PTAL

Signed-off-by: xiaolong.ran <ranxiaolong716@gmail.com>
Signed-off-by: xiaolong.ran <ranxiaolong716@gmail.com>
Signed-off-by: xiaolong.ran <ranxiaolong716@gmail.com>
Signed-off-by: xiaolong.ran <ranxiaolong716@gmail.com>
@wolfstudy wolfstudy closed this Aug 29, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants