This is an automated email from the ASF dual-hosted git repository.

cwylie pushed a commit to branch 0.19.0
in repository https://gitbox.apache.org/repos/asf/druid.git


The following commit(s) were added to refs/heads/0.19.0 by this push:
     new 1be8b21  renamed authenticationChain to authenticatorChain (#10143) 
(#10160)
1be8b21 is described below

commit 1be8b21ec7a360f87896b127c80834e077b45154
Author: Clint Wylie <[email protected]>
AuthorDate: Thu Jul 9 12:08:37 2020 -0700

    renamed authenticationChain to authenticatorChain (#10143) (#10160)
    
    Co-authored-by: Antoine Huret <[email protected]>
---
 docs/configuration/index.md                                    |  2 +-
 docs/design/auth.md                                            | 10 +++++-----
 docs/development/extensions-core/druid-ranger-security.md      |  2 +-
 .../main/java/org/apache/druid/server/security/AuthConfig.java |  4 ++--
 4 files changed, 9 insertions(+), 9 deletions(-)

diff --git a/docs/configuration/index.md b/docs/configuration/index.md
index 70aaf93..f380b96 100644
--- a/docs/configuration/index.md
+++ b/docs/configuration/index.md
@@ -222,7 +222,7 @@ values for the above mentioned configs among others 
provided by Java implementat
 |Property|Type|Description|Default|Required|
 |--------|-----------|--------|--------|--------|
 |`druid.auth.authenticatorChain`|JSON List of Strings|List of Authenticator 
type names|["allowAll"]|no|
-|`druid.escalator.type`|String|Type of the Escalator that should be used for 
internal Druid communications. This Escalator must use an authentication scheme 
that is supported by an Authenticator in 
`druid.auth.authenticationChain`.|"noop"|no|
+|`druid.escalator.type`|String|Type of the Escalator that should be used for 
internal Druid communications. This Escalator must use an authentication scheme 
that is supported by an Authenticator in 
`druid.auth.authenticatorChain`.|"noop"|no|
 |`druid.auth.authorizers`|JSON List of Strings|List of Authorizer type names 
|["allowAll"]|no|
 |`druid.auth.unsecuredPaths`| List of Strings|List of paths for which security 
checks will not be performed. All requests to these paths will be 
allowed.|[]|no|
 |`druid.auth.allowUnauthenticatedHttpOptions`|Boolean|If true, skip 
authentication checks for HTTP OPTIONS requests. This is needed for certain use 
cases, such as supporting CORS pre-flight requests. Note that disabling 
authentication checks for OPTIONS requests will allow unauthenticated users to 
determine what Druid endpoints are valid (by checking if the OPTIONS request 
returns a 200 instead of 404), so enabling this option may reveal information 
about server configuration, including  [...]
diff --git a/docs/design/auth.md b/docs/design/auth.md
index de40db6..9701f63 100644
--- a/docs/design/auth.md
+++ b/docs/design/auth.md
@@ -28,7 +28,7 @@ This document describes non-extension specific Apache Druid 
authentication and a
 |Property|Type|Description|Default|Required|
 |--------|-----------|--------|--------|--------|
 |`druid.auth.authenticatorChain`|JSON List of Strings|List of Authenticator 
type names|["allowAll"]|no|
-|`druid.escalator.type`|String|Type of the Escalator that should be used for 
internal Druid communications. This Escalator must use an authentication scheme 
that is supported by an Authenticator in 
`druid.auth.authenticationChain`.|"noop"|no|
+|`druid.escalator.type`|String|Type of the Escalator that should be used for 
internal Druid communications. This Escalator must use an authentication scheme 
that is supported by an Authenticator in 
`druid.auth.authenticatorChain`.|"noop"|no|
 |`druid.auth.authorizers`|JSON List of Strings|List of Authorizer type names 
|["allowAll"]|no|
 |`druid.auth.unsecuredPaths`| List of Strings|List of paths for which security 
checks will not be performed. All requests to these paths will be 
allowed.|[]|no|
 |`druid.auth.allowUnauthenticatedHttpOptions`|Boolean|If true, allow HTTP 
OPTIONS requests by unauthenticated users. This is primarily useful for 
supporting CORS preflight requests, which Druid does not support directly, but 
which can be enabled using third-party extensions.<br /><br />Note that you 
must add "OPTIONS" to `druid.server.http.allowedHttpMethods`.<br /><br />Also 
note that disabling authentication checks for OPTIONS requests will allow 
unauthenticated users to determine what [...]
@@ -40,7 +40,7 @@ Authentication decisions are handled by a chain of 
Authenticator instances. A re
 
 Authenticator implementations are provided by extensions.
 
-For example, the following authentication chain definition enables the 
Kerberos and HTTP Basic authenticators, from the `druid-kerberos` and 
`druid-basic-security` core extensions, respectively:
+For example, the following authenticator chain definition enables the Kerberos 
and HTTP Basic authenticators, from the `druid-kerberos` and 
`druid-basic-security` core extensions, respectively:
 
 ```
 druid.auth.authenticatorChain=["kerberos", "basic"]
@@ -59,7 +59,7 @@ This built-in Authenticator authenticates all requests, and 
always directs them
 ### Anonymous authenticator
 
 This built-in Authenticator authenticates all requests, and directs them to an 
Authorizer specified in the configuration by the user. It is intended to be 
used for adding a default level of access so
-the Anonymous Authenticator should be added to the end of the authentication 
chain. A request that reaches the Anonymous Authenticator at the end of the 
chain will succeed or fail depending on how the Authorizer linked to the 
Anonymous Authenticator is configured.
+the Anonymous Authenticator should be added to the end of the authenticator 
chain. A request that reaches the Anonymous Authenticator at the end of the 
chain will succeed or fail depending on how the Authorizer linked to the 
Anonymous Authenticator is configured.
 
 |Property|Description|Default|Required|
 |--------|-----------|-------|--------|
@@ -111,7 +111,7 @@ 
druid.auth.authenticator.trustedDomain.name=myTrustedAutenticator
 ## Escalator
 The `druid.escalator.type` property determines what authentication scheme 
should be used for internal Druid cluster communications (such as when a Broker 
process communicates with Historical processes for query processing).
 
-The Escalator chosen for this property must use an authentication scheme that 
is supported by an Authenticator in `druid.auth.authenticationChain`. 
Authenticator extension implementers must also provide a corresponding 
Escalator implementation if they intend to use a particular authentication 
scheme for internal Druid communications.
+The Escalator chosen for this property must use an authentication scheme that 
is supported by an Authenticator in `druid.auth.authenticatorChain`. 
Authenticator extension implementers must also provide a corresponding 
Escalator implementation if they intend to use a particular authentication 
scheme for internal Druid communications.
 
 ### Noop escalator
 
@@ -139,7 +139,7 @@ The Authorizer with type name "allowAll" accepts all 
requests.
 
 ## Default Unsecured Configuration
 
-When `druid.auth.authenticationChain` is left empty or unspecified, Druid will 
create an authentication chain with a single AllowAll Authenticator named 
"allowAll".
+When `druid.auth.authenticatorChain` is left empty or unspecified, Druid will 
create an authenticator chain with a single AllowAll Authenticator named 
"allowAll".
 
 When `druid.auth.authorizers` is left empty or unspecified, Druid will create 
a single AllowAll Authorizer named "allowAll".
 
diff --git a/docs/development/extensions-core/druid-ranger-security.md 
b/docs/development/extensions-core/druid-ranger-security.md
index cac8438..77f3eb9 100644
--- a/docs/development/extensions-core/druid-ranger-security.md
+++ b/docs/development/extensions-core/druid-ranger-security.md
@@ -36,7 +36,7 @@ Support for Apache Ranger authorization consists of three 
elements:
 * providing the service definition for Druid to Apache Ranger
  
 ### Enabling the extension
-Ensure that you have a valid authentication chain and escalator set in your 
`common.runtime.properties`. For every authenticator your wish to use the 
authorizer for, set 
`druid.auth.authenticator.<authenticatorName>.authorizerName` to the name you 
will give the authorizer, e.g. `ranger`. 
+Ensure that you have a valid authenticator chain and escalator set in your 
`common.runtime.properties`. For every authenticator your wish to use the 
authorizer for, set 
`druid.auth.authenticator.<authenticatorName>.authorizerName` to the name you 
will give the authorizer, e.g. `ranger`. 
 
 Then add the following and amend to your needs (in case you need to use 
multiple authorizers):
 
diff --git 
a/server/src/main/java/org/apache/druid/server/security/AuthConfig.java 
b/server/src/main/java/org/apache/druid/server/security/AuthConfig.java
index 656b8b7..f588101 100644
--- a/server/src/main/java/org/apache/druid/server/security/AuthConfig.java
+++ b/server/src/main/java/org/apache/druid/server/security/AuthConfig.java
@@ -53,13 +53,13 @@ public class AuthConfig
 
   @JsonCreator
   public AuthConfig(
-      @JsonProperty("authenticatorChain") List<String> authenticationChain,
+      @JsonProperty("authenticatorChain") List<String> authenticatorChain,
       @JsonProperty("authorizers") List<String> authorizers,
       @JsonProperty("unsecuredPaths") List<String> unsecuredPaths,
       @JsonProperty("allowUnauthenticatedHttpOptions") boolean 
allowUnauthenticatedHttpOptions
   )
   {
-    this.authenticatorChain = authenticationChain;
+    this.authenticatorChain = authenticatorChain;
     this.authorizers = authorizers;
     this.unsecuredPaths = unsecuredPaths == null ? Collections.emptyList() : 
unsecuredPaths;
     this.allowUnauthenticatedHttpOptions = allowUnauthenticatedHttpOptions;


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to