Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Account Management: Create API keys #82005

Closed
wants to merge 22 commits into from
Closed

Conversation

thomheymann
Copy link
Contributor

@thomheymann thomheymann commented Oct 29, 2020

Summary

This PR adds the ability to manage and create API keys directly from your user profile.

The account management page has been slightly redesigned with user avatar and tabs to cater for the new API keys section.

Empty Prompt

empty_prompt

Authorisation error

forbidden_error

Disabled error

disabled_error

Unknown error

unknown_error

Create API key form

create_flyout

API key successfully created

created_callout

Invalidate API key confirmation

invalidate

Implementation

  • Updated react-use dependency since types in previous version where broken
  • Use of context to access core services and router history (useKibana and useHistory) instead of manually passing these down the render tree
  • Use of React Suspense instead of blocking rendering until dependencies have loaded
  • Created Breadcrumb component that automatically sets breadcrumbs and page title based on render tree
  • Added simple form hooks to manage state for inline validation (useForm, useSubmitHandler and useInlineValidation)
  • ownFocus functionality in EuiFlyout is broken so had to render inside a portal

Checklist

Delete any items that are not applicable to this PR.

For maintainers

@thomheymann thomheymann added Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! v7.11.0 v8.0.0 labels Oct 29, 2020
@thomheymann thomheymann linked an issue Oct 29, 2020 that may be closed by this pull request
@legrego legrego self-requested a review October 29, 2020 23:55
Copy link
Member

@legrego legrego left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I wanted to leave some quick feedback so you had something to look at in the meantime. I need to caveat this review by saying I haven't actually run this locally yet.

Overall this is looking great! I love seeing more "modern" approaches to React development in our codebase, and I think some of the abstractions you've come up with here have a lot of potential for reuse in other areas of the security plugin.

I also really like your attention to detail in the UI here. This is going to be really slick!

@@ -199,7 +199,7 @@
"react-dom": "^16.12.0",
"react-input-range": "^1.3.0",
"react-router": "^5.2.0",
"react-use": "^13.27.0",
"react-use": "^15.3.4",
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@streamich any concerns with updating react-use from 13.27 to 15.3?

if (error) {
const { statusCode, message = '' } = (error as any).body ?? {};

if (statusCode === 400 && message.indexOf('[feature_not_enabled_exception]') !== -1) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's chat quick about this logic tomorrow. I have a couple of ideas that might simplify/standardize things a bit

Copy link
Contributor Author

@thomheymann thomheymann Nov 2, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So I've just noticed that the class you recommended me using is server-side code: x-pack/plugins/security/server/authentication/api_keys so not sure it's expected to be used on the client.

The class also requires a logger and cluster client instance, non of which I have access to in the browser so I will keep this simple for now and use a functional approach directly in the component source.

On top of that I can't even re-use the logic of the function itself as the error object has a different schema and I only get statusCode and message through in the error body but not the disabled features property.

@thomheymann thomheymann marked this pull request as ready for review November 2, 2020 16:35
@thomheymann thomheymann requested review from a team as code owners November 2, 2020 16:35
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security (Team:Security)

@legrego
Copy link
Member

legrego commented Nov 3, 2020

A bulk of the increase in bundle size is attributed to the introduction of react-use:

image

I don't know if this is the "correct" approach, but in my local testing, changing the import style to reference the necessary functions dropped the bundle size down significantly:

diff --git a/x-pack/plugins/security/public/account_management/api_keys_page/api_keys_page.tsx b/x-pack/plugins/security/public/account_management/api_keys_page/api_keys_page.tsx
index 7f70ab228cb..81ebf21ba97 100644
--- a/x-pack/plugins/security/public/account_management/api_keys_page/api_keys_page.tsx
+++ b/x-pack/plugins/security/public/account_management/api_keys_page/api_keys_page.tsx
@@ -6,7 +6,8 @@
 
 import React, { FunctionComponent, useState } from 'react';
 import { Route, useHistory } from 'react-router-dom';
-import { useAsyncFn, useMount } from 'react-use';
+import useAsyncFn from 'react-use/lib/useAsyncFn';
+import useMount from 'react-use/lib/useMount';
 import { i18n } from '@kbn/i18n';
 import { FormattedMessage } from '@kbn/i18n/react';
 import { EuiButton, EuiCallOut, EuiFlexGroup, EuiFlexItem, EuiSpacer } from '@elastic/eui';

Copy link
Member

@legrego legrego left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry for not including this piece in the initial review: I think we should add a search bar to this page, to help folks filter down the list of API Keys. Many users will only have a handful of API Keys, so search won't be terribly useful for them. However, users who are responsible for setting up the SIEM Detection engine, or who generally take advantage of Alerting could find themselves with many API Keys to manage, and paging through the list without a search function would be tedious:

image

Bonus points if we support bulk-invalidation, but I consider this outside the scope of your PR


I also think it'd be worthwhile to add a couple of end-to-end tests ("functional tests" in Kibana's parlance) to verify the basic functionality of viewing, creating, and invalidating your API Keys. I can help you get acquainted with the functional test runner so you're not stumbling through this part blindly.

@thomheymann thomheymann requested a review from a team as a code owner November 6, 2020 11:31
@botelastic botelastic bot added the Team:Uptime - DEPRECATED Synthetics & RUM sub-team of Application Observability label Nov 6, 2020
@elasticmachine
Copy link
Contributor

Pinging @elastic/uptime (Team:uptime)

@legrego legrego self-requested a review November 9, 2020 20:30
Copy link
Member

@legrego legrego left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We had discussed adding a link or button from the Stack Management screen -- currently it sends you to Dev Tools instead. Can we change this to link to your new form?

image

@thomheymann thomheymann requested a review from legrego November 10, 2020 11:15
Copy link
Member

@legrego legrego left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! ❤️

Copy link
Contributor

@streamich streamich left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

AppArch changes LGTM.

@kibanamachine
Copy link
Contributor

💚 Build Succeeded

Metrics [docs]

Module Count

Fewer modules leads to a faster build time

id before after diff
ml 1243 1248 +5
security 469 486 +17
total +22

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
apm 3.1MB 3.1MB +156.0B
enterpriseSearch 682.7KB 682.7KB -1.0B
infra 2.5MB 2.5MB +264.0B
ml 6.7MB 6.7MB +1.5KB
security 784.3KB 830.5KB +46.2KB
transform 1.0MB 1.0MB +34.0B
total +48.2KB

Distributable file count

id before after diff
default 42777 43451 +674
oss 22459 23129 +670

Page load bundle

Size of the bundles that are downloaded on every page load. Target size is below 100kb

id before after diff
globalSearchBar 28.5KB 28.7KB +155.0B
kibanaReact 131.9KB 132.5KB +640.0B
security 162.4KB 173.8KB +11.4KB
upgradeAssistant 74.5KB 74.5KB -1.0B
total +12.2KB
Unknown metric groups

@kbn/ui-shared-deps asset size

id before after diff
kbn-ui-shared-deps.js 4.8MB 4.8MB +729.0B

async chunk count

id before after diff
security 18 19 +1

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

@legrego legrego mentioned this pull request Nov 16, 2020
2 tasks
@thomheymann
Copy link
Contributor Author

Closing this since API keys are not attached to a user account so don't belong in the profile page as originally thought.

@bytebilly
Copy link
Contributor

This is what I think could be a good first iteration for this issue:

  • Users can create a new API key in the existing Kibana view
  • Users must specify a name for the new API key
  • On success, show id and secret to the user, warning this is not retrievable again in the future

Possible additional features that can be included or postponed to a later release:

  • Users can specify an expiration date
  • On create, show also the base64 encoded string and a button to copy to clipboard

What do you think?

@jportner
Copy link
Contributor

  • On create, show also the base64 encoded string and a button to copy to clipboard

Once we figure out where we want to put API key management,I think this would be good to include in the MVP as well. It should be easy for us to add, and it's a common pain point for users (who can sometimes encode the string incorrectly)

@spalger spalger deleted the security/create-api-key branch May 8, 2022 22:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
release_note:enhancement Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! Team:Uptime - DEPRECATED Synthetics & RUM sub-team of Application Observability v7.11.0 v8.0.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Create API Key
8 participants