-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Fleet] Use Kibana Authz for API authorization #205335
base: main
Are you sure you want to change the base?
Conversation
…t --include-path /api/status --include-path /api/alerting/rule/ --include-path /api/alerting/rules --include-path /api/actions --include-path /api/security/role --include-path /api/spaces --include-path /api/fleet --include-path /api/dashboards --update'
…o feature-kibana-authz
…t --include-path /api/status --include-path /api/alerting/rule/ --include-path /api/alerting/rules --include-path /api/actions --include-path /api/security/role --include-path /api/spaces --include-path /api/fleet --include-path /api/dashboards --update'
…o feature-kibana-authz
…t --include-path /api/status --include-path /api/alerting/rule/ --include-path /api/alerting/rules --include-path /api/actions --include-path /api/security/role --include-path /api/spaces --include-path /api/fleet --include-path /api/dashboards --update'
…t --include-path /api/status --include-path /api/alerting/rule/ --include-path /api/alerting/rules --include-path /api/actions --include-path /api/security/role --include-path /api/spaces --include-path /api/fleet --include-path /api/dashboards --update'
…o feature-kibana-authz
Pinging @elastic/fleet (Team:Fleet) |
@elena-shostak what do you think about this request? |
…t --include-path /api/status --include-path /api/alerting/rule/ --include-path /api/alerting/rules --include-path /api/actions --include-path /api/security/role --include-path /api/spaces --include-path /api/fleet --include-path /api/dashboards --update'
x-pack/platform/plugins/shared/fleet/server/routes/epm/index.ts
Outdated
Show resolved
Hide resolved
x-pack/platform/plugins/shared/fleet/server/routes/preconfiguration/index.ts
Show resolved
Hide resolved
Probably not, the previous response schema changes are not backported, we would get a lot of conflicts in backport. |
…o feature-kibana-authz
@elasticmachine merge upstream |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
…o feature-kibana-authz
…t --include-path /api/status --include-path /api/alerting/rule/ --include-path /api/alerting/rules --include-path /api/actions --include-path /api/security/role --include-path /api/spaces --include-path /api/fleet --include-path /api/dashboards --update'
…o feature-kibana-authz
…t --include-path /api/status --include-path /api/alerting/rule/ --include-path /api/alerting/rules --include-path /api/actions --include-path /api/security/role --include-path /api/spaces --include-path /api/fleet --include-path /api/dashboards --update'
💚 Build Succeeded
Metrics [docs]
History
cc @nchaulet |
Summary
Resolve #203170
Use Kibana authz instead of having custom logic for Fleet when it's possible. This add the required privileges to the generated open API doc.
Privileges are tested with API integration tests, so I do not think we will introduce a regression or a breaking change with that PR.
It was not possible to migrate all routes as some scenario are not yet supported like a route need
(privilege1 AND privilege2) OR (privilege3 AND privilege 4)
@legrego do you think it will be possible to support this kind of rules? do you want me to create an issue for that.Do we want to backport this to 8.x?