-
Notifications
You must be signed in to change notification settings - Fork 282
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature/Extensions] Implement PrivilegeEvaluator on REST Layer. #2751
Comments
[Triage] @willyborankin Tagging you on this issue |
@willyborankin I have a 3 PRs open across Security, core and the SDK to add a notion of a ProtectedRoute which is a named route. The PRs are still open so I'm not sure if the SDK team or core was comfortable with the approach, but it was trying to solve the problem of naming a REST action similar to a transport action to have a name to place in a role definition. Similar to the work you had done around the security APIs. opensearch-project/OpenSearch#6870 |
I think to add such functionality (it doesn't matter how permissions will look like) no need to add yet another cluster_permissions:
- "*" for that I added method:
|
@willyborankin I think it may be necessary to add at least a separate On the Transport-Layer the existing PrivelegesEvaluator takes the input:
but the Task and ActionRequest would not be available on the REST-Layer. This PR introduces the concept of
It would be great to have a single place for evaluating privileges, but I'm not entirely sure if its possible yet because the The PR linked above works for evaluating privileges on routes mapped to a single name (like a One of the goals with extensions is that all existing optional plugins (apart from security and job-scheduler) could be re-written as an extension and use the SDK. That would include supporting ISM and CCR which define index permissions:
|
@cwperks @willyborankin The current implementation of NamedRoute allows declaring a unique name for a route and has option to test against cluster permissions. For plugins looking to transform to extensions, we have an option to add |
Closing this issue. Please feel free to open it if you think it needs more comments. |
@DarshitChanpura Can we close those 'unchecked' items in the description before we close this issue? |
Done. |
As part of the new REST API authorization flow, a new PrivilegesEvaluator is required to evaluate a user against request REST route.
This involves:
cluster_permissions
nomenclature #2752- [ ] Supporting index permissions nomenclatureNot needed as these will always be evaluated as cluster permissions at REST level.- [ ] Supporting index patternsThe text was updated successfully, but these errors were encountered: