zhaozhao.zz de0f42bff3 ACL: add masteruser configuration for replication
In mostly production environment, normal user's behavior should be
limited.

Now in redis ACL mechanism we can do it like that:

    user default on +@all ~* -@dangerous nopass
    user admin on +@all ~* >someSeriousPassword

Then the default normal user can not execute dangerous commands like
FLUSHALL/KEYS.

But some admin commands are in dangerous category too like PSYNC,
and the configurations above will forbid replica from sync with master.

Finally I think we could add a new configuration for replication,
it is masteruser option, like this:

    masteruser admin
    masterauth someSeriousPassword

Then replica will try AUTH admin someSeriousPassword and get privilege
to execute PSYNC. If masteruser is NULL, replica would AUTH with only
masterauth like before.
2019-02-12 17:12:37 +08:00
..
2016-04-25 16:49:57 +03:00
2016-06-07 16:46:00 -04:00
2019-01-06 15:01:25 +08:00
2018-03-21 15:34:13 +08:00
2016-04-04 08:50:58 +02:00
2018-10-05 18:29:23 +02:00
2015-10-01 13:02:25 +02:00
2019-01-09 17:00:29 +01:00
2019-01-09 17:00:29 +01:00
2019-01-09 17:00:29 +01:00
2018-11-25 08:10:26 +00:00
2018-07-18 10:16:33 +03:00
2018-07-17 10:39:47 +02:00
2017-12-05 15:38:03 +01:00
2018-07-03 18:19:46 +02:00
2018-06-21 22:08:09 +08:00
2016-07-27 11:34:25 +02:00
2018-10-17 12:57:21 +02:00
2019-01-09 17:00:29 +01:00
2019-01-09 17:00:29 +01:00
2018-07-13 09:46:30 -06:00
2018-10-11 13:00:55 +02:00
2019-01-09 17:00:29 +01:00
2018-07-03 18:19:46 +02:00
2014-08-08 10:05:32 +02:00
2018-07-12 21:21:37 +08:00
2018-07-03 18:19:46 +02:00
2018-12-05 17:15:02 +08:00
2018-11-11 18:49:55 +00:00
2015-04-27 12:07:49 +02:00
2015-04-27 12:07:49 +02:00
2019-01-09 17:00:29 +01:00
2014-07-02 16:31:22 +02:00
2019-01-09 17:00:29 +01:00
2019-01-09 17:00:29 +01:00
2019-01-09 17:00:29 +01:00
2018-12-11 13:29:30 +01:00
2018-12-11 13:29:30 +01:00
2018-07-03 18:19:46 +02:00