Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

stolonctl: etcd and sentinel api auth #73

Open
sgotti opened this issue Oct 27, 2015 · 1 comment
Open

stolonctl: etcd and sentinel api auth #73

sgotti opened this issue Oct 27, 2015 · 1 comment

Comments

@sgotti
Copy link
Member

sgotti commented Oct 27, 2015

Related to #51

stolonctl will, if enabled, like other components, use etcd auth to access the cluster hierarchy on etcd and read the needed keys.

Since the client, to do some operations also needs to communicate with the leader sentinel, we'll use etcd authentication and authorization for protecting the sentinel api instead of inventing a new authz layer.

Practically the leader sentinel will write an authentication token to an etcd key. If the client can read this key then it can use the token to communicate with the sentinel.
Additionally the sentinel will change the token every n seconds.

@sgotti sgotti modified the milestone: v0.4.0 Sep 28, 2016
@sgotti sgotti modified the milestones: v0.4.0, v0.5.0 Oct 21, 2016
@sgotti sgotti modified the milestones: v0.5.0, v0.6.0 Dec 14, 2016
@sgotti sgotti removed this from the v0.6.0 milestone May 30, 2017
@davissp14
Copy link

davissp14 commented Jul 14, 2021

@sgotti Moving over to the official go client etcd-io/etcd should make adding this pretty straight forward.

Looks like Stolon is currently pinningcoreos/etcd, which is deprecated.
https://github.com/sorintlab/stolon/blob/master/go.mod#L4-L5

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants