You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What would you like to be added:
In PR #1036, logic for document detachment during Client Deactivation was introduced. As Yorkie's documents are distributed across servers based on shard keys, a Cluster Server was needed for inter-cluster communication during deactivation. However, there are still critical issues that need addressing:
Authentication: Since the client may require a token for authentication, we need a structure for authentication during server-to-server communication. It’s important to ensure that communication between servers is secure.
External Call Restrictions: The logic within ClusterService should only be used for inter-server communication. We need to establish methods to restrict external calls or entirely prevent exposure to enhance security.
Why is this needed:
These enhancements will provide a secure and controlled environment for document operations during client deactivation, significantly reducing potential security risks associated with unauthenticated access and improper external calls.
The text was updated successfully, but these errors were encountered:
What would you like to be added:
In PR #1036, logic for document detachment during Client Deactivation was introduced. As Yorkie's documents are distributed across servers based on shard keys, a
Cluster Server
was needed for inter-cluster communication during deactivation. However, there are still critical issues that need addressing:Authentication: Since the client may require a token for authentication, we need a structure for authentication during server-to-server communication. It’s important to ensure that communication between servers is secure.
External Call Restrictions: The logic within
ClusterService
should only be used for inter-server communication. We need to establish methods to restrict external calls or entirely prevent exposure to enhance security.Why is this needed:
These enhancements will provide a secure and controlled environment for document operations during client deactivation, significantly reducing potential security risks associated with unauthenticated access and improper external calls.
The text was updated successfully, but these errors were encountered: