Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cluster state role mapper file settings service #107886

Conversation

albertzaharovits
Copy link
Contributor

@albertzaharovits albertzaharovits commented Apr 25, 2024

Note: Currently, this PR includes the changes from #107410 (which introduces the ClusterStateRoleMapper). This is simpler to review after #107410 is merged in.

This PR simplifies the ReservedRoleMappingAction implementation, which is part of the FileSettingsService infrastructure, such that it stores the role mappings it parses from the settings.json file into the cluster state custom metadata that's used by the new ClusterStateRoleMapper. The native role mappings (stored in the .security index)
are left untouched by the ReservedRoleMappingAction.

@albertzaharovits albertzaharovits marked this pull request as ready for review April 25, 2024 16:17
@elasticsearchmachine
Copy link
Collaborator

Hi @albertzaharovits, I've created a changelog YAML for you.

@elasticsearchmachine elasticsearchmachine added the Team:Security Meta label for security team label Apr 25, 2024
@elasticsearchmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

Copy link
Member

@rjernst rjernst left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The changes to ReservedRoleMappingAction LGTM.

Copy link
Contributor

@gwbrown gwbrown left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks!

@albertzaharovits
Copy link
Contributor Author

@elasticsearchmachine run elasticsearch-ci/part-4-fips

@albertzaharovits
Copy link
Contributor Author

@elasticsearchmachine test elasticsearch-ci/part-4-fips

@albertzaharovits
Copy link
Contributor Author

@elasticsearchmachine run elasticsearch-ci/part-4

@albertzaharovits
Copy link
Contributor Author

@elasticsearchmachine test elasticsearch-ci/part-4

@albertzaharovits
Copy link
Contributor Author

@elasticsearchmachine test this please

@albertzaharovits albertzaharovits merged commit 391136c into elastic:main May 1, 2024
19 checks passed
@albertzaharovits albertzaharovits deleted the cluster-state-role-mapper-file-settings-service branch May 1, 2024 11:03
DaveCTurner added a commit to DaveCTurner/elasticsearch that referenced this pull request May 7, 2024
@DaveCTurner
Copy link
Contributor

Reverting this, hopefully temporarily, in #108346. It's not that this change is bad, but it's exposing a bug in the file-based settings service that we need to fix first.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
>non-issue :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team v8.15.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants