-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Config API: Re-evaluate public API & configuration options #46
Comments
Here is a list of the options we are currently not supporting but might want to support in the future: (See librdkafka/CONFIGURATION.md for reference) EDIT: since #88
|
felixschlegel
added a commit
to felixschlegel/swift-kafka-client
that referenced
this issue
Jul 14, 2023
> Adds some of the missing properties from swift-server#46. Motivation: We were lacking some of the security protocol configuration options and want to provide them in a type-safe manner. Modifications: * Created a new file `KafkaConfiguration+Security.swift` * add `public struct` `SSLConfiguration` * add `public struct` `SASLMechanism` * add `public struct` `KerberosConfiguration` * add `public struct` `OAuthBearerMethod` * add `public struct` `SecurityProtocol` * integrate `KafkaConfiguration.SSLOptions` in new types * integrate `KafkaConfiguration.SASLOptions` in new types
felixschlegel
added a commit
to felixschlegel/swift-kafka-client
that referenced
this issue
Jul 14, 2023
> Adds some of the missing properties from swift-server#46. Motivation: We were lacking some of the security protocol configuration options and want to provide them in a type-safe manner. Modifications: * add Kerberos support * add OAuthBearer support * Created a new file `KafkaConfiguration+Security.swift` * add `public struct` `SSLConfiguration` * add `public struct` `SASLMechanism` * add `public struct` `KerberosConfiguration` * add `public struct` `OAuthBearerMethod` * add `public struct` `SecurityProtocol` * integrate `KafkaConfiguration.SSLOptions` in new types * integrate `KafkaConfiguration.SASLOptions` in new types
felixschlegel
added a commit
to felixschlegel/swift-kafka-client
that referenced
this issue
Jul 17, 2023
> Adds some of the missing properties from swift-server#46. Motivation: We were lacking some of the security protocol configuration options and want to provide them in a type-safe manner. Modifications: * add Kerberos support * add OAuthBearer support * Created a new file `KafkaConfiguration+Security.swift` * add `public struct` `SSLConfiguration` * add `public struct` `SASLMechanism` * add `public struct` `KerberosConfiguration` * add `public struct` `OAuthBearerMethod` * add `public struct` `SecurityProtocol` * integrate `KafkaConfiguration.SSLOptions` in new types * integrate `KafkaConfiguration.SASLOptions` in new types
FranzBusch
pushed a commit
that referenced
this issue
Jul 18, 2023
* Type-safe Security Configurations > Adds some of the missing properties from #46. Motivation: We were lacking some of the security protocol configuration options and want to provide them in a type-safe manner. Modifications: * add Kerberos support * add OAuthBearer support * Created a new file `KafkaConfiguration+Security.swift` * add `public struct` `SSLConfiguration` * add `public struct` `SASLMechanism` * add `public struct` `KerberosConfiguration` * add `public struct` `OAuthBearerMethod` * add `public struct` `SecurityProtocol` * integrate `KafkaConfiguration.SSLOptions` in new types * integrate `KafkaConfiguration.SASLOptions` in new types * Fix failing test * Changes David Modifications: * go from `KafkaConfiguration.Key` type into more specific types: * `LeafAndIntermediates` to extract the public Key * `PrivateKey` * `RootCertificate` * `RootCertificate`: add two new options * `probe` (default): probe list of standard paths and make first certificate found root default root certificate location path * `disableBrokerVerification`: disable broker verification entirely * `KafkaConfiguration+Security`: * turn `static func`s without parameters into `static let`s for our enum-like `public structs` * Review David Modifications: * add `public init` to `KafkaConfiguration.SASLMechanism.KerberosConfiguration`
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
librdkafka
configurations — do we want to narrow it down to the most basic configurations and expand this on user request / provide an unsafe API that allows pro-users to set arbitrary key-value options?librdkafka
exposes configuration options regarding OAuth and SSL keys etc. — does our package even intend to expose that as well?The text was updated successfully, but these errors were encountered: