Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Change visibility of ApiKeyInAuthorizationHeaderHandler #21

Closed
OPSnake opened this issue Feb 15, 2021 · 4 comments
Closed

Change visibility of ApiKeyInAuthorizationHeaderHandler #21

OPSnake opened this issue Feb 15, 2021 · 4 comments

Comments

@OPSnake
Copy link

OPSnake commented Feb 15, 2021

Change visibility of ApiKeyInAuthorizationHeaderHandler to public.

@mihirdilip
Copy link
Owner

Thanks for your comment @OPSnake. Some explanation/reason for doing so would help.

@OPSnake
Copy link
Author

OPSnake commented Feb 15, 2021

I dynamically configure and inject different authentication handlers into a multi-tenant application depending on the client configuration.

For that I would need to access the ApiKeyInAuthorizationHeaderHandler class rather than looking for it by relflection

@mihirdilip
Copy link
Owner

@OPSnake, please send a code snippet where/how you configure and inject different authentication handlers depending on configuration?

Would you be able to use IAuthenticationSchemeProvider to extract Handler type?

var schemeProvider = services.GetRequiredService<IAuthenticationSchemeProvider>();
Assert.NotNull(schemeProvider);
			
var scheme = await schemeProvider.GetDefaultAuthenticateSchemeAsync();
Assert.NotNull(scheme);
Assert.Equal(typeof(ApiKeyInAuthorizationHeaderHandler), scheme.HandlerType);

@mihirdilip
Copy link
Owner

Hi @OPSnake, just to let you know that I have changed the visibility of all the handlers to public with new release of the library.
Link to NuGet
Link to Release

Thanks for using the library and your feedback.

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants