You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Minimal bits to make Snowflake SPCS OIDC authentication work
This commit is mainly meant as an example to complement changes in how
we will be performing authentication within the Snowflake Posit Team
Native Application. When / if that PR of work for OIDC goes through
this will serve as a good example of how it can be supported.
I think this PR also highlights the importance of OIDC device flow
authentication which is supported in PPM
https://packagemanager.rstudio.com/__docs__/admin/appendix//cli/rspm_login_sso.html
which would again eliminate the need for an api key.
I REALLY like how this package uses the snow command to generate the
jwt used for snowflake ingress as this means our Posit libraries don't
have to re-implement the snowflake authentication.
Going to put this PR in draft and will contribute more after I share
this with our team tomorrow at Standup.
* Refactor SPCS authentication to align with codebase patterns
This commit refines the Snowflake SPCS (Snowpark Container Services)
OIDC authentication implementation to better align with existing
codebase patterns and improve type safety.
Changes:
- Make SPCSConnectServer.api_key Optional[str] to match RSConnectServer
- Add comprehensive docstring to SPCSConnectServer class explaining
SPCS deployment and authentication approach
- Reorder RSConnectExecutor server type detection to check for
snowflake_connection_name first, as SPCS is more specific than
generic Connect deployment
- Ensure api_key is passed to SPCSConnectServer in all instantiations
(RSConnectExecutor.__init__ and validate_spcs_server)
- Add null check before setting X-RSC-Authorization header to fix
type checking error
- Update all test cases in SPCSConnectServerTestCase to pass api_key
parameter and verify it's set correctly
All SPCS-specific tests pass. The implementation now follows the
established patterns for server authentication while maintaining
backward compatibility.
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude <[email protected]>
* docs: update CHANGELOG for SPCS authentication improvements
Add changelog entry documenting the fix for Snowflake SPCS
authentication to properly handle API keys and align with
codebase patterns.
🤖 Generated with [Claude Code](https://claude.com/claude-code)
Co-Authored-By: Claude <[email protected]>
* metadata reordering to allow snowflake+api key
* store api key when storing spcs server
* Fix snowflake server store get
---------
Co-authored-by: Claude <[email protected]>
Co-authored-by: Aron Atkins <[email protected]>
0 commit comments