-
Notifications
You must be signed in to change notification settings - Fork 63
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support JWT authentication #113
Conversation
b922098
to
76f09a6
Compare
3d7cfda
to
6f5001f
Compare
@nineinchnick please rebase |
@wendigo good to go, the one failure is a flaky test. I'll see if I can adress that later |
@nineinchnick please rebase, there is a conflict |
@wendigo green again |
Thanks for running with this @nineinchnick |
My main motivation is how quickly I can get reviews in this repo :D |
@wendigo PTAL. After you merge this, can you do a new release? It requires pushing a new tag. |
README.md
Outdated
@@ -11,7 +11,7 @@ Trino, and receive the resulting data. | |||
|
|||
* Native Go implementation | |||
* Connections over HTTP or HTTPS | |||
* HTTP Basic and Kerberos authentication | |||
* HTTP Basic, and Kerberos authentication |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
that looks weird
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The Oxford comma?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
BTW I ran the Vale linter on this Readme, same one we use for Trino docs
Based on #110.
I added certificate generation to be able to run integration tests. Statically generated certificates cannot be used, since on macOS they could only be valid for 1 year, which would require regenerating them.
I also refactored
trino/integration_tls_test.go
to avoid using the reverse proxy.Fixes #59