-
Notifications
You must be signed in to change notification settings - Fork 9.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
server/auth: enable tokenProvider if recoved store enables auth #13172
Conversation
@cfz thanks a lot for this PR! I think it will fix the issue, but let me confirm with it. I think I can submit my review on Sunday. |
a672b8c
to
5b000a8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks! BTW it's also great if you can add an e2e test case. Can you add it? If you aren't familiar with e2e test infra, I can take it.
On the second thought, the change improves simple token and it's not for production use cases. I think having e2e test case is too much. It would be good just merging it. |
that's also what i'm thinking about. actually, we enabled auth but using Common Name based authentication for client side. looks like we eventually run into the simple token code somehow.... |
i would also like to backport this change to v3.4, which is the actual release we are using. but not sure we can do this without a new commit, due to the path changing during 3.4 and 3.5? |
seems the workflows needs another approval, since i amend my commit.... @mitake |
ping @mitake 😄 |
@cfz approved, thanks! |
5b000a8
to
ea6e34d
Compare
we found a lease leak issue: if a new member(by member add) is recovered by snapshot, and then become leader, the lease will never expire afterwards. leader will log the revoke failure caused by "invalid auth token", since the token provider is not functional, and drops all generated token from upper layer, which in this case, is the lease revoking routine.
ea6e34d
to
b12f8c1
Compare
@cfz thanks for addressing my comments, lgtm. |
…ables auth this is a manual backport of etcd-io#13172
…ables auth this is a manual backport of etcd-io#13172
…ables auth this is a manual backport of etcd-io#13172
…ables auth this is a manual backport of etcd-io#13172
we found a lease leak issue:
if a new member(by member add) is recovered by snapshot, and then
become leader, the lease will never expire afterwards. leader will
log the revoke failure caused by "invalid auth token", since the
token provider is not functional, and drops all generated token
from upper layer, which in this case, is the lease revoking
routine.