Hi, first this seems an amazing piece of code that I just discovered. Thank you a lot.
Then, looking around, it seems that the replication HTTP endpoint is not protected. This is fine in a controlled infrastructure, but I have a use case where I would need to replicate a database over the internet and having a password protected replication endpoint is just required.
To my understanding that's just a secret token shared on all replicas, and it could be as simple as Authorization: bearer TOKEN over HTTPS.
Hi, first this seems an amazing piece of code that I just discovered. Thank you a lot.
Then, looking around, it seems that the replication HTTP endpoint is not protected. This is fine in a controlled infrastructure, but I have a use case where I would need to replicate a database over the internet and having a password protected replication endpoint is just required.
To my understanding that's just a secret token shared on all replicas, and it could be as simple as
Authorization: bearer TOKEN
over HTTPS.