@@ -9,26 +9,28 @@ the results stored on a server.
99
1010Table of Contents
1111=================
12- * [ Server-side configuration] ( #server-side-configuration )
13- * [ <i >Dictionary</i > authentication] ( #dictionary-authentication )
14- * [ External authentication methods] ( #external-auth-methods )
15- * [ <i >PAM</i > authentication] ( #pam-authentication )
16- * [ <i >LDAP</i > authentication] ( #ldap-authentication )
17- * [ Configuration options] ( #configuration-options )
18- * [ Membership in custom groups with <i >regex_groups</i >] ( #regex_groups-authentication )
19- * [ <i >OAuth</i > authentication] ( #oauth-authentication )
20- * [ <i >OAuth</i > Configuration options] ( #oauth-configuration-options )
21- * [ <i >OAuth</i > details per each provider] ( #oauth-details-per-each-provider )
22- * [ Client-side configuration] ( #client-side-configuration )
23- * [ Web-browser client] ( #web-browser-client )
24- * [ Command-line client] ( #command-line-client )
25- * [ Preconfigured credentials] ( #preconfigured-credentials )
26- * [ Automatic login] ( #automatic-login )
27- * [ Currently active tokens] ( #currently-active-tokens )
28- * [ Personal access token] ( #personal-access-token )
29- * [ ` new ` ] ( #new-personal-access-token )
30- * [ ` list ` ] ( #list-personal-access-token )
31- * [ ` del ` ] ( #remove-personal-access-token )
12+ - [ CodeChecker authentication subsystem] ( #codechecker-authentication-subsystem )
13+ - [ Table of Contents] ( #table-of-contents )
14+ - [ Server-side configuration ] ( #server-side-configuration- )
15+ - [ Dictionary authentication ] ( #dictionary-authentication- )
16+ - [ External authentication methods ] ( #external-authentication-methods- )
17+ - [ PAM authentication ] ( #pam-authentication- )
18+ - [ LDAP authentication ] ( #ldap-authentication- )
19+ - [ Configuration options ] ( #configuration-options- )
20+ - [ Membership in custom groups with regex\_ groups] ( #membership-in-custom-groups-with-regex_groups )
21+ - [ OAuth authentication ] ( #oauth-authentication- )
22+ - [ OAuth Configuration options ] ( #oauth-configuration-options- )
23+ - [ OAuth Details per each provider ] ( #oauth-details-per-each-provider- )
24+ - [ Client-side configuration ] ( #client-side-configuration- )
25+ - [ Web-browser client ] ( #web-browser-client- )
26+ - [ Command-line client ] ( #command-line-client- )
27+ - [ Preconfigured credentials ] ( #preconfigured-credentials- )
28+ - [ Automatic login ] ( #automatic-login- )
29+ - [ Currently active tokens ] ( #currently-active-tokens- )
30+ - [ Personal access token ] ( #personal-access-token- )
31+ - [ New personal access token ] ( #new-personal-access-token- )
32+ - [ List personal access tokens ] ( #list-personal-access-tokens- )
33+ - [ Remove personal access token ] ( #remove-personal-access-token- )
3234
3335# Server-side configuration <a name =" server-side-configuration " ></a >
3436
@@ -360,7 +362,7 @@ Specific behavior related to each provider is configured by a provider `template
360362 A key-value table that is used to set variables across all providers, for convenience.
361363
362364 Any variable can be specified. If using the ` host ` variable, it should be in the format ` https://example.com ` , including the protocol.
363-
365+
364366 The ` callback_url ` 's default value uses the ` host ` and ` provider ` variables.
365367 Template ` ms_entra/v2.0 ` uses the ` tenant_id ` variable.
366368
@@ -394,7 +396,7 @@ Specific behavior related to each provider is configured by a provider `template
394396
395397 * ` variables `
396398
397- A key-value table that is used to set variables used inside parameters.
399+ A key-value table that is used to set variables used inside parameters.
398400 To use a variable, specify it using ` {variable} ` .
399401 The ` {provider} ` variable is automatically set.
400402
@@ -494,7 +496,7 @@ Specific behavior related to each provider is configured by a provider `template
494496 * Default* : Set by template.
495497
496498 ### 🔧 Example: OAuth Configuration using templates
497-
499+
498500 ``` jsonc
499501 " github" : {
500502 " enabled" : false ,
@@ -622,7 +624,14 @@ To alleviate the need for supplying authentication in the command-line every
622624time a server is connected to, users can pre-configure their credentials to be
623625used in authentication.
624626
625- To do so first copy the `config/session_client.json` file from the CodeChecker
627+ You can pass the credential used as a password or personal access token
628+ in the `.codechecker.password.json` or
629+ directly in the `CC_PASSWORD` environment variable.
630+ If this environment variable is set, the credentials
631+ described in `.codechecker.password.json` will be ignored.
632+
633+ If you wish to provide (multiple different) credentials in a password configuration file,
634+ first copy the `config/session_client.json` file from the CodeChecker
626635package to your home directory and rename it to `.codechecker.passwords.json`
627636After creating the new file open `~/.codechecker.passwords.json`.
628637
@@ -656,10 +665,9 @@ authenticate in the name of the given user. This way no need to store passwords
656665in text files. For more information [ see] ( #personal-access-token ) .
657666
658667The location of the password file can be configured by the ` CC_PASS_FILE `
659- environment variable. This environment variable can also be used to setup
660- different credential files to login to the same server with a different user.
668+ environment variable.
661669
662- Furthermore, the location of the session file can be configured by the
670+ The location of the session file can be configured by the
663671` CC_SESSION_FILE ` environment variable. This can be useful if CodeChecker does
664672not have the permission to create a session file under the user's home
665673directory (e.g. in some CI environments).
0 commit comments