Skip to content

Commit

Permalink
LDAP authentication (#374)
Browse files Browse the repository at this point in the history
# Description

This will resolve part of #144
The ticket can be merged once the stretch goals are reached as well.

A new iteration on the changes prototyped in #341

This iteration will include:

* A closer resemblance to the ticket requirements - using a list of authenticators
* Non-usage of LDAP for inter-node authentication (basic authentication instead)
* Erroring out if both TLS auth and LDAP auth are configured

## Follow-up Work

* Interconnection with an OPA authorization config, if provided (former stretch goal)
* Adding ldaps:// support (former stretch goal)
* Druid does not like anonymous LDAP access (without bind credentials). I have not found a way to configure it. This however, seems to be a usecase we want to support generally.
  • Loading branch information
Vladislav Supalov committed Jan 30, 2023
1 parent 48350e9 commit a158c7b
Show file tree
Hide file tree
Showing 32 changed files with 1,262 additions and 1,252 deletions.
12 changes: 12 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,18 @@ All notable changes to this project will be documented in this file.

### Added

- Add support for non-TLS LDAP authentication. ([#374])

### Changed

- Upgrade to `operator-rs` `0.31.0` ([#374])

[#374]: https://github.com/stackabletech/druid-operator/pull/374

## [23.1.0] - 2023-01-23

### Added

- BREAKING: Support for TLS encryption (activated per default -> port changes) and TLS authentication ([#333])
- Use emptyDir for segment cache on historicals ([#342])

Expand Down
Loading

0 comments on commit a158c7b

Please sign in to comment.