Skip to content

Commit 0055ac1

Browse files
committed
make lint
1 parent 8cbb3a7 commit 0055ac1

File tree

1 file changed

+8
-5
lines changed

1 file changed

+8
-5
lines changed

mkdocs/docs/configuration.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -344,7 +344,6 @@ catalog:
344344
| snapshot-loading-mode | refs | The snapshots to return in the body of the metadata. Setting the value to `all` would return the full set of snapshots currently valid for the table. Setting the value to `refs` would load all snapshots referenced by branches or tags. |
345345
| `header.X-Iceberg-Access-Delegation` | `vended-credentials` | Signal to the server that the client supports delegated access via a comma-separated list of access mechanisms. The server may choose to supply access via any or none of the requested mechanisms. When using `vended-credentials`, the server provides temporary credentials to the client. When using `remote-signing`, the server signs requests on behalf of the client. (default: `vended-credentials`) |
346346

347-
348347
#### Headers in REST Catalog
349348

350349
To configure custom headers in REST Catalog, include them in the catalog properties with `header.<Header-Name>`. This
@@ -358,21 +357,21 @@ catalog:
358357
header.content-type: application/vnd.api+json
359358
```
360359

361-
362360
#### Authentication Options
363361

364362
##### OAuth2
363+
365364
| Key | Example | Description |
366365
| ------------------- | -------------------------------- | -------------------------------------------------------------------------------------------------- |
367366
| oauth2-server-uri | <https://auth-service/cc> | Authentication URL to use for client credentials authentication (default: uri + 'v1/oauth/tokens') |
368-
|
369-
| token | FEW23.DFSDF.FSDF | Bearer token value to use for `Authorization` header ```
367+
| token | FEW23.DFSDF.FSDF | Bearer token value to use for `Authorization` header |
370368
| credential | client_id:client_secret | Credential to use for OAuth2 credential flow when initializing the catalog |
371369
| scope | openid offline corpds:ds:profile | Desired scope of the requested security token (default : catalog) |
372370
| resource | rest_catalog.iceberg.com | URI for the target resource or service |
373371
| audience | rest_catalog | Logical name of target resource or service |
374372

375373
##### SigV4
374+
376375
| Key | Example | Description |
377376
| ------------------- | -------------------------------- | -------------------------------------------------------------------------------------------------- |
378377
| rest.sigv4-enabled | true | Sign requests to the REST Server using AWS SigV4 protocol |
@@ -381,10 +380,10 @@ catalog:
381380

382381
<!-- markdown-link-check-enable-->
383382

384-
385383
#### Common Integrations & Examples
386384

387385
##### AWS Glue
386+
388387
```yaml
389388
catalog:
390389
s3_tables_catalog:
@@ -397,6 +396,7 @@ catalog:
397396
```
398397

399398
##### Unity Catalog
399+
400400
```yaml
401401
catalog:
402402
unity_catalog:
@@ -407,6 +407,7 @@ catalog:
407407
```
408408

409409
##### R2 Data Catalog
410+
410411
```yaml
411412
catalog:
412413
r2_catalog:
@@ -417,6 +418,7 @@ catalog:
417418
```
418419

419420
##### Lakekeeper
421+
420422
```yaml
421423
catalog:
422424
lakekeeper_catalog:
@@ -429,6 +431,7 @@ catalog:
429431
```
430432

431433
##### Apache Polaris
434+
432435
```yaml
433436
catalog:
434437
polaris_catalog:

0 commit comments

Comments
 (0)