allow rolling upgrades, remove same MinIO version requirement (#9033)

Upgrades between releases are failing due to strict
rule to avoid rolling upgrades, it is enough to
bump up APIs between versions to allow for quorum
failure and wait times. Authentication failures are
catastrophic in nature which leads to server not
be able to upgrade properly.

Fixes #9021
Fixes #8968
master
Harshavardhana 5 years ago committed by GitHub
parent dcd63b4146
commit 4c92bec619
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
  1. 1
      cmd/jwt.go
  2. 4
      cmd/storage-rest-server.go

@ -86,7 +86,6 @@ func authenticateNode(accessKey, secretKey, audience string) (string, error) {
claims.SetExpiry(UTCNow().Add(defaultInterNodeJWTExpiry)) claims.SetExpiry(UTCNow().Add(defaultInterNodeJWTExpiry))
claims.SetAccessKey(accessKey) claims.SetAccessKey(accessKey)
claims.SetAudience(audience) claims.SetAudience(audience)
claims.SetIssuer(ReleaseTag)
jwt := jwtgo.NewWithClaims(jwtgo.SigningMethodHS512, claims) jwt := jwtgo.NewWithClaims(jwtgo.SigningMethodHS512, claims)
return jwt.SignedString([]byte(secretKey)) return jwt.SignedString([]byte(secretKey))

@ -79,10 +79,6 @@ func storageServerRequestValidate(r *http.Request) error {
return errAuthentication return errAuthentication
} }
if claims.Issuer != ReleaseTag {
return errAuthentication
}
requestTimeStr := r.Header.Get("X-Minio-Time") requestTimeStr := r.Header.Get("X-Minio-Time")
requestTime, err := time.Parse(time.RFC3339, requestTimeStr) requestTime, err := time.Parse(time.RFC3339, requestTimeStr)
if err != nil { if err != nil {

Loading…
Cancel
Save