Replies: 2 comments 1 reply
-
@sunfinite you can extend the HTTP API from plugins. If the goal is to try to to validate everything that can be configured, no one on the core team would object to such a plugin. |
Beta Was this translation helpful? Give feedback.
1 reply
-
If the idea is to add new endpoints to a group of existing tier 1 plugins with a limited scope, the only difficult part should be naming. We don't want to promise that we will validate everything, so |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
RabbitMQ series
4.1.x
Operating system (distribution) used
Linux
How is RabbitMQ deployed?
RabbitMQ-as-a-Service from a public cloud provider
What would you like to suggest for a future version of RabbitMQ?
In settings where operators do not have remote access to the RabbitMQ nodes, it is hard to determine network reachability and potential misconfigurations without applying changes directly to a running broker.
We propose an enhancement by adding plugin specific endpoints that allows broker administrators to validate new values for auth plugin settings without affecting the running broker environment. These endpoints would enable the following:
This reduces the risk of outages from misconfiguration and improves troubleshooting times.
Example using an invalid cacertfile:
Note that calling this endpoint will not affect the effective configuration of the running broker in any way. The functionality of this endpoint could be extended to perform authz checks given a vhost/queue/topic etc
Beta Was this translation helpful? Give feedback.
All reactions