Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Provide fluent API to set upSecurityIdentityAugmentors andIdentityProviders such as Security JPA programmatically#51279

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Open
michalvavrik wants to merge1 commit intoquarkusio:main
base:main
Choose a base branch
Loading
frommichalvavrik:feature/fluent-api-for-identity-provider-and-augmentor

Conversation

@michalvavrik
Copy link
Member

sberyozkin reacted with heart emoji
@quarkus-bot

This comment has been minimized.

@michalvavrikmichalvavrikforce-pushed thefeature/fluent-api-for-identity-provider-and-augmentor branch from3d9f827 to86e5b6aCompareNovember 28, 2025 00:29
@github-actions
Copy link

github-actionsbot commentedNov 28, 2025
edited
Loading

🎊 PR Preview3f428b9 has been successfully built and deployed tohttps://quarkus-pr-main-51279-preview.surge.sh/version/main/guides/

  • Images of blog posts older than 3 months are not available.
  • Newsletters older than 3 months are not available.

@quarkus-bot
Copy link

Status for workflowQuarkus Documentation CI

This is the status report for runningQuarkus Documentation CI on commit86e5b6a.

✅ The latest workflow run for the pull request has completed successfully.

It should be safe to merge provided you have a look at the other checks in the summary.

Warning

There are other workflow runs running, you probably need to wait for their status before merging.

@quarkus-bot

This comment has been minimized.

*
* @return Quarkus Security JPA {@link IdentityProvider}s
*/
staticCollection<IdentityProvider<?>>jpa() {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Cansecurity-jpa support more than one IdentityProvider ?

Copy link
MemberAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Cansecurity-jpa support more than one IdentityProvider ?

Yes. Form-based authentication requires other provider. You can check out my tests, thehttpSecurity.mechanism(form, jpa) wouldn't work.

* Registers given {@link HttpAuthenticationMechanism} in addition to all other global authentication mechanisms.
*
* @param mechanism {@link HttpAuthenticationMechanism}
* @param identityProviders {@link IdentityProvider}s that should be used for authentication instead
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

What is not clear to me is why these identity providers and augmentors must be used instead of CDI registered identity providers and augmentors, while the mechanism is not meant to be used instead of other mechanisms.

Copy link
MemberAuthor

@michalvavrikmichalvavrikNov 28, 2025
edited
Loading

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Before I answer, I would like to summarize so that we speak about the same thing:

  • this method adds a new mechanism (likenew CustomAuthMechanism or any other mechanism at all) and allows you to use your own identity providers and augmentors
  • if you want to use global identity providers or augmentors, then don't use it
  • if you want to use global identity providers/augmentors and some other providers/augmentors, specific for only this mechanism, you can create collection with global identity providers/augmentors and your own, specific for only this mechanism; nothing stops you

What is not clear to me is why these identity providers and augmentors must be used instead of CDI registered identity providers and augmentors, while the mechanism is not meant to be used instead of other mechanisms.

  • how many times do you want to use both identity providers registered as CDI beans and dedicated ones for this mechanism? I'd say you usually need one or two
  • this methods facilitates programmatic setup for Quarkus Security JPA, if withhttpSecurity.basic() we already use Quarkus Security JPA from CDI, then why would we need the programmatic setup at all? Only answer I could come with is flexibility - unlike CDI providers, which are there for every mechanism, here you can explicitly select which provider and augmentors you want to apply

@michalvavrik
Copy link
MemberAuthor

I run the OIDC wiremock IT Module tests and they are passing for me locally.

@quarkus-bot
Copy link

quarkus-botbot commentedNov 28, 2025
edited by github-actionsbot
Loading

Status for workflowQuarkus CI

This is the status report for runningQuarkus CI on commit86e5b6a.

✅ The latest workflow run for the pull request has completed successfully.

It should be safe to merge provided you have a look at the other checks in the summary.

You can consult theDevelocity build scans.

Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@sberyozkinsberyozkinsberyozkin left review comments

At least 1 approving review is required to merge this pull request.

Assignees

No one assigned

Labels

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

2 participants

@michalvavrik@sberyozkin

[8]ページ先頭

©2009-2025 Movatter.jp