Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix Okta Authentication and Validation - Ingestion #2955

Merged
merged 11 commits into from Feb 26, 2022
Merged

Fix Okta Authentication and Validation - Ingestion #2955

merged 11 commits into from Feb 26, 2022

Conversation

ayush-shah
Copy link
Member

@ayush-shah ayush-shah commented Feb 23, 2022

Describe your changes :

fixes #2953
fixes #2913

Type of change :

  • Bug fix
  • Improvement

Frontend Preview (Screenshots) :

For frontend related change, please link screenshots of your changes preview! Optional for backend related changes.

Checklist:

  • I have read the CONTRIBUTING document.
  • I have performed a self-review of my own.
  • I have tagged my reviewers below.
  • I have commented on my code, particularly in hard-to-understand areas.
  • My changes generate no new warnings.
  • I have added tests that prove my fix is effective or that my feature works.
  • All new and existing tests passed.

Reviewers

@harshach @pmbrull @vivekratnavel

@ayush-shah ayush-shah added bug Something isn't working Ingestion labels Feb 23, 2022
@ayush-shah ayush-shah self-assigned this Feb 23, 2022
@ayush-shah ayush-shah added this to In progress in Release 0.9.0 via automation Feb 23, 2022
@ayush-shah ayush-shah marked this pull request as draft February 24, 2022 04:28
@ayush-shah ayush-shah marked this pull request as ready for review February 24, 2022 13:55
@@ -155,7 +156,7 @@ def __init__(self, config: MetadataServerConfig, raw_data: bool = False):
base_url=self.config.api_endpoint,
api_version=self.config.api_version,
auth_header="Authorization",
auth_token=self._auth_provider.auth_token(),
auth_token=asyncio.run(self._auth_provider.auth_token()),
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

do we need aysncio here?

@sonarcloud
Copy link

sonarcloud bot commented Feb 26, 2022

[open-metadata-ingestion] Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 2 Code Smells

0.0% 0.0% Coverage
0.0% 0.0% Duplication

@ayush-shah
Copy link
Member Author

@harshach I have added the code that renews the tokens
checks if it's near expiry, if under 2 minutes, it will create a new token, we will be sending expiry alongwith access token

@harshach harshach merged commit 412d61a into main Feb 26, 2022
Release 0.9.0 automation moved this from In progress to Done Feb 26, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working Ingestion
Projects
No open projects
Development

Successfully merging this pull request may close these issues.

Okta Authentication - Ingestion Ingestion - Token expires without renewing
2 participants