Kafka+SQL "created-by" property needs to be populated once the Auth branch is merged
See original GitHub issueOnce we have the auth branch merged into master
we should make sure that the Kafka+SQL implementation properly sets the createdBy
field. References are:
Issue Analytics
- State:
- Created 3 years ago
- Comments:6 (6 by maintainers)
Top Results From Across the Web
Streams DSL - Confluent Documentation
A step-by-step guide for writing a stream processing application using the DSL is provided below. Once you have built your Kafka Streams application...
Read more >Kafka to BigQuery using Dataflow - Medium
The following is a step-by-step guide on how to use Apache Beam running on Google Cloud Dataflow to ingest Kafka messages into BigQuery....
Read more >SQL Developer Dialog Boxes and Wizards - Oracle Help Center
SQL Developer uses dialog boxes for creating and editing database connections and objects in the database (tables, views, procedures, and so on).
Read more >Apache Kafka | Programmatic Ponderings
I have included the AWS CloudFormation template and parameters file used to create the EMR cluster, on GitHub. When choosing Apache Spark, Apache...
Read more >git - Should I create a branch of the fork while creating PR for ...
Create a branch to implement the feature or bugfix, push your branch to your own repository (your fork), then open a pull-request to...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Actually, and since we’re already using the quarkus oidc extension, that kind of bean is already present. I’ll try to inject it, test it and see how it looks. See this for more info.
Another option is to introduce a new Authentication context CDI bean. That bean could hold authentication information such as the currently authenticated user/principal. That way the storage layer could make decisions based on that. The auth context bean would need to be updated at whatever point makes sense, on a per-request basis (so the state of the auth context bean would probably be thread-local).
The advantage of this is you don’t need to change the storage signatures, but it also might put us in a good position in the future once we have more advanced Authorization scenarios (e.g. the user’s roles determines what content they have access to, with the roles being encoded inside a JWT).