Implement WorkbenchManagedCredentialsStrategy
for Databricks helpers
#382
Labels
sdk
Used for automation
WorkbenchManagedCredentialsStrategy
for Databricks helpers
#382
Problem
The external databricks helpers aren't intuitive to use with workbench yet. The
local_strategy=databricks_cli
fallback option does not work because workbench can't do an external browser redirect flow. A working alternative is to usepat_auth
instead, but that's not obvious because workbench managed credentials use an oauth token, not a PAT. (pat_auth
just sets a static bearer token on the auth header so it works the same, but how is a user supposed to know that?)Proposal
We should implement a
posit.connect.external.databricks.PositWorkbenchManagedCredentialsStrategy
to make it more obvious to users how they should use managed workbench credentials in a piece of content that is going to be deployed to Connect.Option 1:
There's still some awkwardness here though. Using
local_strategy=workbench_strategy
would not work locally because the"workbench"
managed databricks profile wouldn't exist in the config. Also the need to modifycfg.credentials_strategy
feels bad.Option 2: prefer a more explicit configuration
This is better but the use of the Connect strategy is still non-obvious. How does the caller know if it will do a client credentials flow or a viewer auth flow?
Option 3: an even more explicit configuration
The text was updated successfully, but these errors were encountered: