Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: oauth support in databricks destination #1912

Open
wants to merge 3 commits into
base: develop
Choose a base branch
from

Conversation

shekhar-rudder
Copy link
Member

@shekhar-rudder shekhar-rudder commented Feb 26, 2025

What are the changes introduced in this PR?

  • Added a new toggle field, authenticationType, to allow selection between PAT and OAuth authentication.
  • Introduced two new fields, oauthClientId and oauthClientSecret, which are displayed only when OAuth authentication is selected.
  • Updated the rendering logic for the token field to be shown only when PAT authentication is chosen.

What is the related Linear task?

Resolves INT-XXX

Please explain the objectives of your changes below

Put down any required details on the broader aspect of your changes. If there are any dependent changes, mandatorily mention them here

Any changes to existing capabilities/behaviour, mention the reason & what are the changes ?

N/A

Any new dependencies introduced with this change?

N/A

Any new checks got introduced or modified in test suites. Please explain the changes.

N/A


Developer checklist

  • My code follows the style guidelines of this project

  • No breaking changes are being introduced.

  • All related docs linked with the PR?

  • All changes manually tested?

  • Any documentation changes needed with this change?

  • I have executed schemaGenerator tests and updated schema if needed

  • Are sensitive fields marked as secret in definition config?

  • My test cases and placeholders use only masked/sample values for sensitive fields

  • Is the PR limited to 10 file changes & one task?

Reviewer checklist

  • Is the type of change in the PR title appropriate as per the changes?

  • Verified that there are no credentials or confidential data exposed with the changes.

Summary by CodeRabbit

  • New Features

    • Expanded authentication options to include OAuth support.
    • Introduced a new checkbox for "Use M2M OAuth" to enable machine-to-machine OAuth authentication.
    • Added client credential fields ("Client ID" and "Client Secret") that appear conditionally when OAuth is enabled.
    • Updated validation rules ensure the correct authentication method is used based on your selection.
  • Bug Fixes

    • Improved error handling for various authentication scenarios, ensuring clearer feedback for invalid configurations.

Copy link

coderabbitai bot commented Feb 26, 2025

Walkthrough

This pull request integrates OAuth-based authentication support into the Delta Lake destination configuration. Changes include the addition of new keys for OAuth in the configuration file, conditional validation of authentication credentials in the schema, and updates to the UI to allow users to toggle between traditional token input and new OAuth fields, adjusting the display and validations accordingly.

Changes

File(s) Summary
src/.../db-config.json Added new keys "useOauth", "oauthClientId", and "oauthClientSecret" to the defaultConfig array and added "oauthClientSecret" to the secretKeys array while retaining the "token" key.
src/.../schema.json Removed the standalone "token" property and implemented conditional validation: if "useOauth" is false, "token" is required; if true, "oauthClientId" and "oauthClientSecret" must match specific string patterns.
src/.../ui-config.json Introduced a new checkbox field for "Use M2M OAuth" and updated the "Personal Access Token" field to be conditionally displayed. Also added "Client ID" and "Client Secret" text input fields with regex validations and secret masking.
test/.../validation/destinations/deltalake.json Added multiple test cases for various authentication scenarios, including invalid token types, empty tokens, and valid configurations for both Personal Access Token and OAuth authentication, ensuring comprehensive coverage of the new features.

Suggested reviewers

  • lvrach
  • am6010
  • krishna2020
  • ssbeefeater
  • debanjan97
  • cisse21
  • ruchiramoitra
  • 1abhishekpandey
  • sandeepdsvs
  • ItsSudip
  • shrouti1507

Poem

I’m a rabbit leaping through lines of code,
Hopping across configs in a merry mode.
OAuth is now a part of our play,
With Client IDs and secrets bright as day.
Tokens rest while new credentials lead,
In this code garden, I joyfully heed! 🐰
Hurray for changes on this bright new road!


Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media?

❤️ Share
🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Generate unit testing code for this file.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai generate unit testing code for this file.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and generate unit testing code.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate docstrings to generate docstrings for this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

CodeRabbit Configuration File (.coderabbit.yaml)

  • You can programmatically configure CodeRabbit by adding a .coderabbit.yaml file to the root of your repository.
  • Please see the configuration documentation for more information.
  • If your editor has YAML language server enabled, you can add the path at the top of this file to enable auto-completion and validation: # yaml-language-server: $schema=https://coderabbit.ai/integrations/schema.v2.json

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

@shekhar-rudder shekhar-rudder added the DO NOT MERGE Approved but need to check more label Feb 26, 2025
Copy link

codecov bot commented Feb 26, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 100.00%. Comparing base (fe22b4b) to head (362c6e8).

Additional details and impacted files
@@            Coverage Diff            @@
##           develop     #1912   +/-   ##
=========================================
  Coverage   100.00%   100.00%           
=========================================
  Files            2         2           
  Lines           53        53           
  Branches         7         7           
=========================================
  Hits            53        53           

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (1)
src/configurations/destinations/deltalake/schema.json (1)

930-952: Ensure OAuth Credential Validation and Property Definition
This block conditionally requires "oauthClientId" and "oauthClientSecret" when "useOauth" is true. It is important to verify that the property "useOauth" is properly defined within the main schema's "properties" (or elsewhere in the configuration) so that these conditional checks are triggered as intended.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between fe22b4b and ced7305.

📒 Files selected for processing (3)
  • src/configurations/destinations/deltalake/db-config.json (2 hunks)
  • src/configurations/destinations/deltalake/schema.json (1 hunks)
  • src/configurations/destinations/deltalake/ui-config.json (2 hunks)
⏰ Context from checks skipped due to timeout of 90000ms (1)
  • GitHub Check: Analyze (java-kotlin)
🔇 Additional comments (6)
src/configurations/destinations/deltalake/db-config.json (2)

29-31: New OAuth Keys in Default Configuration
The keys "useOauth", "oauthClientId", and "oauthClientSecret" have been added to the "defaultConfig" array. This addition is consistent with the OAuth support introduced in the schema and UI. Please confirm that downstream components correctly handle these new configuration parameters.


136-137: Secure Handling of OAuth Client Secret
Adding "oauthClientSecret" to the "secretKeys" array is a good move to ensure that sensitive OAuth credentials are kept secure. This change aligns with the security practices for configuration management.

src/configurations/destinations/deltalake/ui-config.json (4)

33-38: New OAuth Toggle in UI
The new checkbox field labeled "Use M2M OAuth" is introduced to allow users to toggle between PAT and OAuth authentication methods. This addition is clearly presented and sets the foundation for conditionally displaying the appropriate authentication fields.


47-52: Conditional Display of Personal Access Token Field
The "Personal Access Token" field now includes a "preRequisiteField" that ensures it is only shown when "useOauth" is false. Additionally, it is marked as "secret": true, which helps protect sensitive data. This change matches the intended UI behavior.


53-65: Addition of OAuth Client ID Field
The new "Client ID" field is configured to appear only when "useOauth" is true using the "preRequisiteField" attribute. The field’s regex and error message provide basic validation, aligning with the requirements for OAuth credential input.


66-79: Addition of OAuth Client Secret Field
The added "Client Secret" field is correctly configured with "secret": true and conditional display via "preRequisiteField", making it visible only when "useOauth" is true. This configuration meets security and UX requirements for OAuth integrations.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (2)
test/data/validation/destinations/deltalake.json (2)

377-395: Test Case "With invalid token type": Validate token data type enforcement.
This test correctly passes a boolean value for the token and expects failure. Note that the error message "token must be string" appears twice along with the "must match \"then\" schema" error. Please verify that duplicate error messages are intentional as per the schema validation design.


396-418: Test Case "With empty token": Ensure token pattern validation.
This test feeds an empty string for the token and expects errors related to pattern matching. As with the previous case, the duplicate error message for the token pattern should be reviewed to confirm it is the desired behavior.

📜 Review details

Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro

📥 Commits

Reviewing files that changed from the base of the PR and between a7353d7 and 362c6e8.

📒 Files selected for processing (2)
  • src/configurations/destinations/deltalake/schema.json (2 hunks)
  • test/data/validation/destinations/deltalake.json (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (1)
  • src/configurations/destinations/deltalake/schema.json
🔇 Additional comments (4)
test/data/validation/destinations/deltalake.json (4)

419-437: Test Case "With valid token for PAT authentication": Verify successful PAT configuration.
The test validates that when useOauth is false and a valid token is provided, configuration validation passes. The setup appears correct for PAT-based authentication.


438-459: Test Case "With empty clientId for Oauth authentication": Check mandatory OAuth client ID.
This test confirms the configuration fails when OAuth is enabled (useOauth is true) but oauthClientId is empty. The error message ensures that the client ID meets the required pattern.


460-480: Test Case "With missing clientSecret for Oauth authentication": Enforce required OAuth client secret.
The test validates that omitting oauthClientSecret when OAuth is activated results in a configuration error. This behavior is correctly captured by the expected error messages.


481-501: Test Case "With valid config for Oauth authentication": Confirm valid OAuth configuration.
The test provides valid OAuth credentials with both oauthClientId and oauthClientSecret and expects the configuration to pass validation.

Note on Field Naming: Although the PR summary mentions a new toggle field named authenticationType, the configuration in these tests uses the boolean field useOauth to toggle OAuth support. Please verify that the field naming is intentional and consistent across the implementation, schema, and UI.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
DO NOT MERGE Approved but need to check more
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants