Skip to content

Adding JWT auth capability for s2s replication#10165

Draft
stuart-wells wants to merge 7 commits intomainfrom
stuartwells/jwts2s
Draft

Adding JWT auth capability for s2s replication#10165
stuart-wells wants to merge 7 commits intomainfrom
stuartwells/jwts2s

Conversation

@stuart-wells
Copy link
Copy Markdown
Contributor

What changed?

Adds JWT to server-to-server connections. Frontend already had support for reading auth so this focuses on getting a token and injecting it.

Why?

s2s is currently a gap in the auth abilities. This provides more flexibility for users based on their auth requirements.

How did you test it?

  • built
  • run locally and tested manually
  • covered by existing tests
  • added new unit test(s)
  • added new functional test(s)

Potential risks

Need to get auth right. Main risk is a user believing they are secure when they are not.

@dnr
Copy link
Copy Markdown
Contributor

dnr commented May 4, 2026

I haven't looked in detail at this code yet, but one feature that's been requested a lot is to be able to authenticate internode connections (within one cluster) with tokens instead of mTLS. Would it be easy to cover that use case in this PR as well?

@dnr
Copy link
Copy Markdown
Contributor

dnr commented May 4, 2026

Also, for frontend auth, we have this pluggable ClaimMapper interface that defines how tokens/TLS info is handled, and then a JWT-based implementation. Can we set up something similar (or reuse ClaimMapper) so that s2s (and internode) token-based auth isn't tied to JWT either?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants