Skip to content

Commit c2ea5c3

Browse files
authored
Merge pull request #2868 from emqx/20250318-sync-release-5.8
sync release-5.8
2 parents 2aeeb13 + d99820b commit c2ea5c3

File tree

161 files changed

+109511
-3570
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

161 files changed

+109511
-3570
lines changed

current-version.env

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
EE_VERSION=5.8.4
2-
CE_VERSION=5.8.4
1+
EE_VERSION=5.8.5
2+
CE_VERSION=5.8.5
33
EE_MINOR_VERSION=5.8
44
CE_MINOR_VERSION=5.8

dir.yaml

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -190,15 +190,15 @@
190190
- title_en: EMQX 企业版 API 文档
191191
title_cn: EMQX 企业版 API 文档
192192
lang: cn
193-
path: https://docs.emqx.com/zh/enterprise/v${EE_MINOR_VERSION}/admin/api-docs.html
193+
path: https://docs.emqx.com/en/enterprise/v${EE_MINOR_VERSION}/admin/api-docs.html
194194
- title_en: EMQX Open Source API Docs
195195
title_cn: EMQX Open Source API Docs
196196
lang: en
197197
path: https://docs.emqx.com/en/emqx/v${CE_MINOR_VERSION}/admin/api-docs.html
198198
- title_en: EMQX 开源版 API 文档
199199
title_cn: EMQX 开源版 API 文档
200200
lang: cn
201-
path: https://docs.emqx.com/zh/emqx/v${CE_MINOR_VERSION}/admin/api-docs.html
201+
path: https://docs.emqx.com/en/emqx/v${CE_MINOR_VERSION}/admin/api-docs.html
202202

203203
- title_en: EMQX Clustering
204204
title_cn: 构建集群
@@ -223,7 +223,6 @@
223223
children:
224224
- performance/tune
225225
- performance/benchmark-emqtt-bench
226-
- performance/benchmark-xmeter
227226
- performance/performance-reference
228227

229228
- title_en: Security Guide
@@ -561,21 +560,21 @@
561560
- observability/datadog
562561
- title_en: Integrate with OpenTelemetry
563562
title_cn: 集成 OpenTelemetry
564-
path: observability/open-telemetry/open-telemetry
563+
path: observability/opentelemetry/opentelemetry
565564
collapsed: true
566565
children:
567566
- title_en: Metrics
568567
title_cn: 指标
569-
path: observability/open-telemetry/metrics
568+
path: observability/opentelemetry/metrics
570569
- title_en: Logs
571570
title_cn: 日志
572-
path: observability/open-telemetry/logs
571+
path: observability/opentelemetry/logs
573572
- title_en: Traces
574573
title_cn: 追踪
575-
path: observability/open-telemetry/traces
574+
path: observability/opentelemetry/traces
576575
- title_en: End-to-end Traces
577576
title_cn: 端到端追踪
578-
path: observability/open-telemetry/e2e-traces
577+
path: observability/opentelemetry/e2e-traces
579578
- title_en: Backup and Restore
580579
title_cn: 备份与恢复
581580
path: operations/backup-restore

en_US/access-control/authn/acl.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
# Access Control List
22

3-
EMQX allows presetting client permissions during the authentication phase to control the publish-subscribe permission checks after the client logs in. Currently, both JWT authentication and HTTP authentication support permission presets, using Access Control Lists (ACL) as an optional extension of the authentication result. For example, this can be a private claim `acl` defined in JWT, or an `acl` JSON property returned as part of the HTTP authentication response. After a client connects, its publish and subscribe actions are restricted by these ACL rules.
3+
This page introduces Access Control Lists (ACL) rules embedded in JWT and HTTP authentication responses. Currently, JWT authentication and HTTP authentication support permission presets, using ACL as an optional extension of the authentication result. For example, this can be a private claim `acl` defined in JWT, or an `acl` JSON property returned as part of the HTTP authentication response. After a client connects, its publish and subscribe actions are restricted by these ACL rules.
44

5-
This page introduces the ACL rules for presetting client permissions. Authorizing a client using the ACL rules included in the authentication response is concise, efficient, and generally sufficient for most use cases. For more comprehensive but generic authorization methods, refer to [Authorization](../authz/authz.md).
5+
General ACL rules are stored in `acl.conf`. For details, see [acl.conf](../authz/file.md). For more comprehensive authorization methods, refer to [Authorization](../authz/authz.md).
66

77
::: tip
88

Loading
-558 KB
Loading
Binary file not shown.

en_US/access-control/authn/http.md

Lines changed: 10 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -67,9 +67,7 @@ On [EMQX Dashboard](http://127.0.0.1:18083/#/authentication), click **Access Con
6767

6868
<img src="./assets/authn-http.png" alt="HTTP" style="zoom:67%;" />
6969

70-
71-
72-
**HTTP**:
70+
Follow the instructions below on how to configure the authentication:
7371

7472
- **Method**: Select HTTP request method, optional values: `get`, `post`
7573

@@ -79,20 +77,20 @@ On [EMQX Dashboard](http://127.0.0.1:18083/#/authentication), click **Access Con
7977
:::
8078

8179
- **URL**: Enter the URL address of the HTTP service.
82-
- **Headers** (optional): HTTP request header. You can add several headers.
80+
- **Headers** (optional): HTTP request header. You can add several headers. Keys and values support using [placeholders](./authn.md#authentication-placeholders).
81+
- **Enable TLS**: Turn on the toggle switch if you want to enable TLS. For more information on enabling TLS, see [Network and TLS](../../network/overview.md).
82+
83+
- **Body**: Request template; for `POST` requests, it is sent as a JSON in the request body; for `GET` requests, it is encoded as a Query String in the URL. Mapping keys and values support using [placeholders](./authn.md#authentication-placeholders).
8384

84-
**Connection Configuration**:
85+
- **Advanced Settings**:
8586

86-
- **Pool size** (optional): Input an integer value to define the number of concurrent connections from an EMQX node to an HTTP server. Default: **8**. <!--有范围吗?-->
87-
- **Connect Timeout** (optional): Specify the waiting period before EMQX assumes the connection is timed out. Units supported include milliseconds, second, minute, and hour.
88-
- **HTTP Pipelining** (optional): Input a positive integer to specify the maximum number of HTTP requests that can be sent without waiting for a response; default value: **100**.
89-
- **Request Timeout** (optional): Specify the waiting period before EMQX assumes the request is timed out. Units supported include milliseconds, second, minute, and hour.
87+
- **Pool size** (optional): Input an integer value to define the number of concurrent connections from an EMQX node to an HTTP server. Default: `8`.
9088

91-
**TLS Configuration**: Turn on the toggle switch if you want to enable TLS. For more information on enabling TLS, see [Network and TLS](../../network/overview.md).
89+
- **Connect Timeout** (optional): Specify the waiting period before EMQX assumes the connection is timed out. Units supported include milliseconds, second, minute, and hour.
9290

93-
**Authentication configuration**:
91+
- **HTTP Pipelining** (optional): Input a positive integer to specify the maximum number of HTTP requests that can be sent without waiting for a response; default value: `100`.
9492

95-
- **Body**: Request template; for `POST` requests, it is sent as a JSON in the request body; for `GET` requests, it is encoded as a Query String in the URL. Mapping keys and values support using [placeholder](./authn.md#authentication-placeholders).
93+
- **Request Timeout** (optional): Specify the waiting period before EMQX assumes the request is timed out. Units supported include milliseconds, second, minute, and hour.
9694

9795
After you finish the settings, click **Create**.
9896

en_US/access-control/authn/mnesia.md

Lines changed: 10 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -20,16 +20,20 @@ In the EMQX Dashboard, click **Access Control** -> **Authentication** from the l
2020

2121
**UserID Type**: Specify the fields for client ID authentication; Options: `username`, `clientid`(corresponding to the `Username` or `Client Identifier` fields in the `CONNECT` message sent by the MQTT client).
2222

23-
**Password Hash**: Select the hashing function to store passwords in the database. Available options are `plain`, `md5`, `sha`, `bcrypt`, and `pbkdf2`. Additional configuration depends on your selected function:
23+
**Password Hash**: Select the password hashing algorithm applied to plain-text passwords before results are stored in the database. Available options are `plain`, `md5`, `sha`, `sha256`, `sha512`, `bcrypt`, and `pbkdf2`. Additional configurations depend on the selected algorithm:
2424

25-
- For `plain`, `md5`, `sha`, `sha256` or `sha512`:
26-
- **Salt Position**: Determines how salt (random data) is added to the password. Options are `suffix`, `prefix`, or `disable`. You can keep the default value unless you migrate user credentials from external storage into the EMQX built-in database. Note: Set **Salt Position** to `disable` if `plain` is selected.
25+
- For `md5`, `sha`, `sha256` or `sha512`:
26+
- **Salt Position**: Determines how salt (random data) is mixed with the password. Options are `suffix`, `prefix`, or `disable`. You can keep the default value unless you migrate user credentials from external storage into the EMQX built-in database.
27+
- Resulting hash is represented as a string of hexadecimal characters, and compared case-insensitively with the stored credential.
28+
- For `plain`:
29+
- **Salt Position**: should be `disable`.
2730
- For `bcrypt`:
28-
- **Salt Rounds**: Defines the number of times the hash function is applied, expressed as 2^Salt Rounds, also known as the "cost factor". The default value is `10`, with a permissible range of `5` to `10`. A higher value is recommended for enhanced security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
29-
- For `pbkdf2`:
31+
- **Salt Rounds**: Defines the number of times the hash function is applied, expressed as _2<sup>Salt Rounds</sup>_, also known as the "cost factor". The default value is `10`, with a permissible range of `5` to `10`. A higher value is recommended for enhanced security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
32+
- For `pbkdf2`:
3033
- **Pseudorandom Function**: Selects the hash function that generates the key, such as `sha256`.
3134
- **Iteration Count**: Sets the number of times the hash function is executed. The default is `4096`.
32-
- **Derived Key Length** (optional): Specifies the length of the generated key. If left blank, the length will default to that determined by the selected pseudorandom function.
35+
- **Derived Key Length** (optional): Specifies the length in bytes of the generated key. If left blank, the length will default to that determined by the selected pseudorandom function.
36+
- Resulting hash is represented as a string of hexadecimal characters, and compared case-insensitively with the stored credential.
3337

3438
After you finish the settings, click **Create**.
3539

en_US/access-control/authn/mongodb.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can use EMQX Dashboard to configure how to use MongoDB for password authenti
5555

5656
In the EMQX Dashboard, click **Access Control** -> **Authentication** from the left navigation menu. On the **Authentication** page, click **Create** at the top right corner. Click to select **Password-Based** as **Mechanism**, and **MongoDB** as **Backend** to go to the **Configuration** tab, as shown below.
5757

58-
<img src="./assets/authn-mongodb-1.png" alt="Authenticate with MondoDB" style="zoom:67%;" />
58+
![authn-MongoDB_ee](./assets/authn-MongoDB_ee.png)
5959

6060
Follow the instructions below on how to configure the authentication:
6161

@@ -84,15 +84,19 @@ Follow the instructions below on how to configure the authentication:
8484
**Authentication configuration**: Configure settings related to authentication:
8585

8686
- **Password Hash Field**: Specify the field name of the password.
87-
- **Password Hash**: Select the hashing function for password storage, such as `plain`, `md5`, `sha`, `bcrypt`, or `pbkdf2`. Additional configurations depend on the selected function:
88-
- For `plain`, `md5`, `sha`, `sha256`, or `sha512`:
89-
- **Salt Position**: Define how salt (random data) is added to the password. Options are`suffix`, `prefix`, or `disable`. You can keep the default value unless you migrate user credentials from external storage into the EMQX built-in database. Note: Set **Salt Position** to `disable` if `plain` is selected.
87+
- **Password Hash**: Select the password hashing algorithm applied to plain-text passwords before results are stored in the database. Available options are `plain`, `md5`, `sha`, `sha256`, `sha512`, `bcrypt`, and `pbkdf2`. Additional configurations depend on the selected algorithm:
88+
- For `md5`, `sha`, `sha256` or `sha512`:
89+
- **Salt Position**: Determines how salt (random data) is mixed with the password. Options are `suffix`, `prefix`, or `disable`. You can keep the default value unless you migrate user credentials from external storage into the EMQX built-in database.
90+
- Resulting hash is represented as a string of hexadecimal characters, and compared case-insensitively with the stored credential.
91+
- For `plain`:
92+
- **Salt Position**: should be `disable`.
9093
- For `bcrypt`:
91-
- **Salt Rounds**: Set the number of hash function applications, expressed as 2^Salt Rounds, also known as the "cost factor". Default: `10`; Range: `5-10`. Higher values are recommended for better security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
94+
- **Salt Rounds**: Defines the number of times the hash function is applied, expressed as _2<sup>Salt Rounds</sup>_, also known as the "cost factor". The default value is `10`, with a permissible range of `5` to `10`. A higher value is recommended for enhanced security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
9295
- For `pbkdf2`:
93-
- **Pseudorandom Function**: Specify the hash functions to generate the key, such as `sha256`.
94-
- **Iteration Count**: Specify the iteration times; Default: `4096`.
95-
- **Derived Key Length** (optional): Specify the generated key length. You can leave this field blank, then the key length will be determined by the pseudorandom function you selected.
96+
- **Pseudorandom Function**: Selects the hash function that generates the key, such as `sha256`.
97+
- **Iteration Count**: Sets the number of times the hash function is executed. The default is `4096`.
98+
- **Derived Key Length** (optional): Specifies the length in bytes of the generated key. If left blank, the length will default to that determined by the selected pseudorandom function.
99+
- Resulting hash is represented as a string of hexadecimal characters, and compared case-insensitively with the stored credential.
96100
- **Salt Field**: Specify the salt field in MongoDB.
97101
- **is_superuser Field**: Determine if the user is a super user.
98102
- **Filter**: A map interpreted as MongoDB selector for credential lookup. [Placeholders](./authn.md#authentication-placeholders) are supported.

en_US/access-control/authn/mysql.md

Lines changed: 11 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -84,15 +84,19 @@ Follow the instructions below on how to configure the authentication:
8484

8585
**Authentication configuration**: Configure settings related to authentication:
8686

87-
- **Password Hash**: Select the hash function for storing passwords in the database, such as `plain`, `md5`, `sha`, `bcrypt`, or `pbkdf2`. Additional configuration depends on your selected function:
88-
- For `plain`, `md5`, `sha`, `sha256`, or `sha512`:
89-
- **Salt Position**: Determines how salt (random data) is added to the password. Options are `suffix`, `prefix`, or `disable`. Retain the default setting unless migrating credentials from external storage to the EMQX built-in database. Note: Set to `disable` if `plain` is chosen.
87+
- **Password Hash**: Select the password hashing algorithm applied to plain-text passwords before results are stored in the database. Available options are `plain`, `md5`, `sha`, `sha256`, `sha512`, `bcrypt`, and `pbkdf2`. Additional configurations depend on the selected algorithm:
88+
- For `md5`, `sha`, `sha256` or `sha512`:
89+
- **Salt Position**: Determines how salt (random data) is mixed with the password. Options are `suffix`, `prefix`, or `disable`. You can keep the default value unless you migrate user credentials from external storage into the EMQX built-in database.
90+
- Resulting hash is represented as a string of hexadecimal characters, and compared case-insensitively with the stored credential.
91+
- For `plain`:
92+
- **Salt Position**: should be `disable`.
9093
- For `bcrypt`:
91-
- **Salt Rounds**: Set the number of times the hash function executes, denoted as 2^Salt Rounds, also known as the "cost factor". The default is `10`, with a range of `5` to `10`. A higher value is recommended for enhanced security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
94+
- **Salt Rounds**: Defines the number of times the hash function is applied, expressed as _2<sup>Salt Rounds</sup>_, also known as the "cost factor". The default value is `10`, with a permissible range of `5` to `10`. A higher value is recommended for enhanced security. Note: Increasing the cost factor by 1 doubles the necessary time for authentication.
9295
- For `pbkdf2`:
93-
- **Pseudorandom Function**: Specify the Hash functions to generate the key, such as `sha256`.
94-
- **Iteration Count**: Specify the iteration times; Default: `4096`.
95-
- **Derived Key Length** (optional): Specify the length of the generated password. You can leave this field blank, then the key length will be determined by the pseudorandom function you selected.
96+
- **Pseudorandom Function**: Selects the hash function that generates the key, such as `sha256`.
97+
- **Iteration Count**: Sets the number of times the hash function is executed. The default is `4096`.
98+
- **Derived Key Length** (optional): Specifies the length in bytes of the generated key. If left blank, the length will default to that determined by the selected pseudorandom function.
99+
- Resulting hash is represented as a string of hexadecimal characters, and compared case-insensitively with the stored credential.
96100
- **SQL**: Fill in the query statement according to the data schema. For more information, see [SQL data schema and query statement](#sql-table-structure-and-query-statement).
97101

98102
After you finish the settings, click **Create**.

0 commit comments

Comments
 (0)