Update 'quarkus-oidc' and 'quarkus-oidc-client' to get secrets from CredentialsProvider #18073
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes #15125.
This PR has the following updates:
Credentials.Provider
configuration groupCredentials.Secret
andCredentials.Jwt
groups can use a client secret; soCredentials.Secret
now has aprovider
property to specify a secret key (quarkus.oidc.credentials.client-secret.provider.key
) that should be used to retrieve a secret, similarly forJwt
- but sinceJwt
can have not only a client secret but also a private key configured, the property is calledsecret-provider
which one can use asquarkus.oidc.credentials.jwt.secret-provider.key
quarkus-oidc
/quarkus-oidc-client
tests to use a testCredentialsProvider
OidcClient Authentication
docs to refer to the new options and also added a similar section to the OIDCweb-app
docs since the config root is different