-
Type: Task
-
Resolution: Duplicate
-
Priority: Major - P3
-
None
-
Affects Version/s: None
-
Component/s: Sharding
-
None
-
Fully Compatible
-
Sharding 2017-03-27, Sharding 2017-04-17, Sharding 2017-05-08, Sharding 2017-05-29
This ticket was spun off from SERVER-27768.
As described in that ticket, the key the mongos and mongod will use to verify the clusterTime will be generated by the config server primary during transition to primary. It will be stored in the admin.system.keys with the following format:
{ _id: 'clusterTimeKey', key: <secure pseudorandom 20 byte key generated by TimeProofService::generateRandomKey()> }
mongod & mongos behavior:
- After startup, read the key document from config
- Initialize TimeProofService with the key
- Attach TimeProofService to LogicalClock
special for config server:
- After becoming primary, upsert the key document as described above
The key will be fetched from the config server through a new method on the ShardingCatalogClient, and the key will be stored on the config server through a new method on the ShardingCatalogManager.
- duplicates
-
SERVER-28127 Integrate KeyManager to LogicalClock
- Closed