You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Related to the optional authentication layer in this PR of the oteapi-services, it would be benfitical that a user authenticates while the client is launed.
This could directly make use of the fastapi.security-package so that the token/credentials are automatically added to the request headers when the get-method of a stragety is called in a pipeline.
Suggestions for implementations will follow up soon.
The text was updated successfully, but these errors were encountered:
Could this not be done with the config pathway of setting headers in an OTE Service client as of now? Or are you thinking of something more specialized/pre-configured options?
Yes, sourcing the token from an .env file might be a much smarter and secure way than hardcoding it into a the script where you execute the pipeline.
However, this also might be limited if you would like to manage different access control parameters over different strategies. E.g. DataResourceConfigA takes token No 1 and TransformationConfigB takes token No 2.
If you do not specify it in the config while creating the strategies, the ote-services will by default take the token from the headers of the incoming request. This might become problematic in that way, that the wrong token might be passed to the wrong strategy when executing the pipeline.
Hence, if we would like to manage this more dynamically in a pydantic-setting, I think it makes sense to have to opportunity to manage all secrets this settings-object and map them there to all the strategies we would like to pass them later on.
But this is definitely a larger effort to implement this and I don't know in how far the otelib is intended to solve this procedure.
Related to the optional authentication layer in this PR of the
oteapi-services
, it would be benfitical that a user authenticates while the client is launed.This could directly make use of the
fastapi.security
-package so that the token/credentials are automatically added to the request headers when theget
-method of a stragety is called in a pipeline.Suggestions for implementations will follow up soon.
The text was updated successfully, but these errors were encountered: