-
Notifications
You must be signed in to change notification settings - Fork 282
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] do_not_fail_on_forbidden_empty does not work for cat api #1815
Comments
Thanks for filing @jezsy, I am having trouble reproducing the issue with |
Hi @peternied. Apologies for the late response. Upon further tests, it seems my claim about In that case, the main issue now is just extending usage of parameters |
Similarly, I think the two parameters should also apply to |
Thanks for updating us on this issue, we have added this issue into items to be looked at so thank you very much for contributing to this project by filing. Please feel free to open a pull request if you've got recommendations for this or other features. |
…idden setting (#3236) ### Description This change allows for DNFOF behavior on the _cat/_indices API. It adds the required index permissions into the DNFOF regex to be picked up in the DNFOF code path. Previously it was being skipped/returning 403, since the index permissions were not in the regex. ### Issues Resolved Fix: #1815 Is this a backport? If so, please add backport PR # and/or commits # ### Testing [Please provide details of testing done: unit testing, integration testing and manual testing] ### Check List - [ ] New functionality includes testing - [ ] New functionality has been documented - [ ] Commits are signed per the DCO using --signoff By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license. For more information on following Developer Certificate of Origin and signing off your commits, please check [here](https://github.com/opensearch-project/OpenSearch/blob/main/CONTRIBUTING.md#developer-certificate-of-origin). --------- Signed-off-by: Derek Ho <[email protected]>
…idden setting (opensearch-project#3236) This change allows for DNFOF behavior on the _cat/_indices API. It adds the required index permissions into the DNFOF regex to be picked up in the DNFOF code path. Previously it was being skipped/returning 403, since the index permissions were not in the regex. Fix: opensearch-project#1815 Is this a backport? If so, please add backport PR # and/or commits # [Please provide details of testing done: unit testing, integration testing and manual testing] - [ ] New functionality includes testing - [ ] New functionality has been documented - [ ] Commits are signed per the DCO using --signoff By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license. For more information on following Developer Certificate of Origin and signing off your commits, please check [here](https://github.com/opensearch-project/OpenSearch/blob/main/CONTRIBUTING.md#developer-certificate-of-origin). --------- Signed-off-by: Derek Ho <[email protected]> (cherry picked from commit 4c095d2) Signed-off-by: Derek Ho <[email protected]>
What is the bug?
Setting
do_not_fail_on_forbidden
to true does not seem to have any impact on some APIs like cat/_indices and cat/_aliases - the whole operation is rejected even if indices exist for which the user has access to._cat/indices/some-index-* would work, but not _cat/indices because it include internal indices which the user does not permission for.
Adding permissions under index_patterns: '*' can make them work, but I think this defeats the purpose of having the do_not_fail_on_forbidden parameter.
How can one reproduce the bug?
Steps to reproduce the behavior:
roles.yml
config.yml
Error for GET _cat/indices
Error for GET _cat/aliases
Both of these permissions should be covered under the
manage
default_action_group, but the operations only work when targeted specifically to the index, so do_not_fail_on_forbidden does not seem to be working as intended.What is the expected behavior?
do_not_fail_on_forbidden should work similarly for all APIs, where results are filtered based only on the indices that the user has permissions for.
What is your host/environment?
The text was updated successfully, but these errors were encountered: