-
Notifications
You must be signed in to change notification settings - Fork 3.7k
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
.Net: Add support for custom authentication provider for OpenAPI #2283
Conversation
@gitri-ms This is related to work you did in the past. Adding you as a reviewer. |
I believe one can already do this by passing in an HttpClient with the DefaultHeaders populated, which is our recommended approach for similar situations across SK. (We're trying to reduce the number of routes we provide to do things that are already doable via common dotnet patterns, or can be added as extensions, to reduce the surface and complexity of the SDK) @SergeyMenshykh can you please confirm, and take a look at the PR and the needs it addresses? |
I would propose taking this authentication provider in, as it's very simple. At the same time, it's very flexible to cover all authentication needs for OpenAPI functionality, so no more providers will be needed. |
dotnet/src/Skills/Skills.OpenAPI/Authentication/CustomAuthenticationProvider.cs
Outdated
Show resolved
Hide resolved
…rosoft#2283) ### Motivation and Context <!-- Thank you for your contribution to the semantic-kernel repo! Please help reviewers and future users, providing the following information: 1. Why is this change required? 2. What problem does it solve? 3. What scenario does it contribute to? 4. If it fixes an open issue, please link to the issue here. --> 1. **Why is this change required?** This change adds support for other authentication methods defined in OpenAPI specs. 2. **What problem does it solve?** Some APIs use other authentication methods that define a value in a custom header. As an example, [many PlayFab APIs](https://learn.microsoft.com/en-us/gaming/playfab/api-references/#security) are authenticated using secret key or user token in a custom header. The current authentication providers are not sufficient for onboarding these APIs as skills. 3. **What scenario does it contribute to?** This change will enable APIs using custom header authentication to onboard their OpenAPI specs as skills in Semantic Kernel. 4. **If it fixes an open issue, please link to the issue here.** ### Description <!-- Describe your changes, the overall approach, the underlying design. These notes will help understanding how your code works. Thanks! --> This change adds a new OpenAPI authentication provider that enables specifying a custom header to supply the authentication key or value. ### Contribution Checklist <!-- Before submitting this PR, please make sure: --> - [x] The code builds clean without any errors or warnings - [x] The PR follows the [SK Contribution Guidelines](https://github.com/microsoft/semantic-kernel/blob/main/CONTRIBUTING.md) and the [pre-submission formatting script](https://github.com/microsoft/semantic-kernel/blob/main/CONTRIBUTING.md#development-scripts) raises no violations - [x] All unit tests pass, and I have added new tests where possible - [x] I didn't break anyone 😄 --------- Co-authored-by: Gil LaHaye <gillahaye@microsoft.com> Co-authored-by: Shawn Callegari <36091529+shawncal@users.noreply.github.com>
Motivation and Context
Description
This change adds a new OpenAPI authentication provider that enables specifying a custom header to supply the authentication key or value.
Contribution Checklist