-
Notifications
You must be signed in to change notification settings - Fork 9.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bug: Auth revision w/ JWT tokens #13300
Comments
cc:// @mitake Thoughts? |
davissp14
changed the title
Bug: Auth revision w/ JWT auth tokens
Bug: Auth revision w/ JWT tokens
Aug 19, 2021
@davissp14 thanks for sharing the detailed way to reproduce, let me check it on my side. |
I'll work on in after merging #13262 |
the above PR was merged, I'll work on this PR later this week |
1 task
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Etcd version: 3.5
It seems that
jwt
auth tokens are tied to a particular auth revision. If the auth revision is incremented after a token has been issued, connections fail with:The connections will continue to fail until the TTL is hit and the token is renewed. Given our use-case this makes
JWT
tokens pretty much unusable.In order to reproduce
Generate certs
Configure the auth token and boot the cluster
auth_token=jwt,pub-key=ecdsa-p256-public.pem.pub,priv-key=ecdsa-p256-private.pem,sign-method=ES256
Configure auth
Setup your root user, grant role, etc.
Establish a connection
Establish a connection using any client.
In a separate terminal or through
etcdctl
, add a new user or make a change that will bump the auth revision.The original connection established by the client will become unusable until the auth token is renewed.
The text was updated successfully, but these errors were encountered: