-
Notifications
You must be signed in to change notification settings - Fork 25.6k
Default enable cluster state role mapper #114337
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Confirmed on local ECK setup that:
|
|
Pinging @elastic/es-security (Team:Security) |
|
Hi @n1v0lg, I've created a changelog YAML for you. |
…/elasticsearch into enable-cluster-state-role-mapper
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
💔 Backport failedThe backport operation could not be completed due to the following error: You can use sqren/backport to manually backport by running |
This PR default-enables cluster-state role mappings as the first part of the mitigation for a regression in ECK introduced by #107410. Prior to this PR, cluster-state role mappings were written to cluster-state, but not read from it. With this PR, cluster-state role mappings will be read and used to assign roles to users, i.e. in user role resolution. However, they will not be included in the output of the [Get role mappings API](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-role-mapping.html) yet. Exposing them via API is a target for a follow-up fix. Relates: ES-9628 Supersedes: #113900
This PR default-enables cluster-state role mappings as the first part of the mitigation for a regression in ECK introduced by #107410. Prior to this PR, cluster-state role mappings were written to cluster-state, but not read from it. With this PR, cluster-state role mappings will be read and used to assign roles to users, i.e. in user role resolution. However, they will not be included in the output of the [Get role mappings API](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-role-mapping.html) yet. Exposing them via API is a target for a follow-up fix. Relates: ES-9628 Supersedes: #113900
This (backport) PR default-enables cluster-state role mappings as the first part of the mitigation for a regression in ECK introduced by #107410. Prior to this PR, cluster-state role mappings were written to cluster-state, but not read from it. With this PR, cluster-state role mappings will be read and used to assign roles to users, i.e. in user role resolution. However, they will not be included in the output of the [Get role mappings API](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-role-mapping.html) yet. Exposing them via API is a target for a follow-up fix. Relates: ES-9628 Supersedes: #113900
This PR default-enables cluster-state role mappings as the first part of the mitigation for a regression in ECK introduced by elastic#107410. Prior to this PR, cluster-state role mappings were written to cluster-state, but not read from it. With this PR, cluster-state role mappings will be read and used to assign roles to users, i.e. in user role resolution. However, they will not be included in the output of the [Get role mappings API](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-role-mapping.html) yet. Exposing them via API is a target for a follow-up fix. Relates: ES-9628 Supersedes: elastic#113900
This PR default-enables cluster-state role mappings as the first part of the mitigation for a regression in ECK introduced by elastic#107410. Prior to this PR, cluster-state role mappings were written to cluster-state, but not read from it. With this PR, cluster-state role mappings will be read and used to assign roles to users, i.e. in user role resolution. However, they will not be included in the output of the [Get role mappings API](https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-role-mapping.html) yet. Exposing them via API is a target for a follow-up fix. Relates: ES-9628 Supersedes: elastic#113900
This PR default-enables cluster-state role mappings as the first part of the mitigation for a regression in ECK introduced by #107410.
Prior to this PR, cluster-state role mappings were written to cluster-state, but not read from it.
With this PR, cluster-state role mappings will be read and used to assign roles to users, i.e. in user role resolution.
However, they will not be included in the output of the Get role mappings API yet. Exposing them via API is a target for a follow-up fix.
Relates: ES-9628
Supersedes: #113900