-
Notifications
You must be signed in to change notification settings - Fork 25.6k
[API keys] Add full_name and email to API key doc and use them to populate authing User #61354
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[API keys] Add full_name and email to API key doc and use them to populate authing User #61354
Conversation
…ulate user The API key document currently doesn't include the user's full_name or email attributes. This changeset adds those fields to the document and extracts them to fill in the User when authenticating. They're effectively going to be a snapshot of the User from when the key was created, but this is in line with roles and metadata as well. Signed-off-by: lloydmeta <[email protected]>
b620dff to
18fa022
Compare
Signed-off-by: lloydmeta <[email protected]>
|
Pinging @elastic/es-security (:Security/IdentityProvider) |
jkakavas
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Thanks LLoyd. I consider this a bug so I agree it should go in the next patch releases ( 7.8.2, 7.9.1 ) too. I don't see this breaking a client's response, the Authenticate API is supposed to be returning these two fields either way
...plugin/security/src/test/java/org/elasticsearch/xpack/security/authc/ApiKeyServiceTests.java
Outdated
Show resolved
Hide resolved
Signed-off-by: lloydmeta <[email protected]>
135cbc0 to
a13a122
Compare
|
@lloydmeta we usually tend to wait for a review from all reviewers that we ask. No big deal though, Tim can always comment and we can adjust if he has any suggestions/objections. I realize this is not the practice in all repos/teams ,just bringing it up for future reference:) |
Oh, sorry about that. Thanks for letting me know :) makes sense to me. Will keep that in mind. |
tvernum
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
|
I dropped @lloydmeta Do you want us to backport this, or do you have it under control? |
|
Thanks @tvernum I'm happy to handle the backporting as well. |
…hem to populate authing User (elastic#61354) The API key document currently doesn't include the user's full_name or email attributes, and as a result, when those attributes return `null` when hitting `GET`ing `/_security/_authenticate`, and in the SAML response from the [IdP Plugin](elastic#54046). This changeset adds those fields to the document and extracts them to fill in the User when authenticating. They're effectively going to be a snapshot of the User from when the key was created, but this is in line with roles and metadata as well. Signed-off-by: lloydmeta <[email protected]>
…se them to populate authing User (elastic#61354) The API key document currently doesn't include the user's full_name or email attributes, and as a result, when those attributes return `null` when hitting `GET`ing `/_security/_authenticate`, and in the SAML response from the [IdP Plugin](elastic#54046). This changeset adds those fields to the document and extracts them to fill in the User when authenticating. They're effectively going to be a snapshot of the User from when the key was created, but this is in line with roles and metadata as well. Signed-off-by: lloydmeta <[email protected]>
|
Backports:
Would appreciate a spot check from one of you to make sure I did those right before merging @jkakavas @tvernum |
…hem to populate authing User (#61354) (#61403) The API key document currently doesn't include the user's full_name or email attributes, and as a result, when those attributes return `null` when hitting `GET`ing `/_security/_authenticate`, and in the SAML response from the [IdP Plugin](#54046). This changeset adds those fields to the document and extracts them to fill in the User when authenticating. They're effectively going to be a snapshot of the User from when the key was created, but this is in line with roles and metadata as well. Signed-off-by: lloydmeta <[email protected]>
…se them to populate authing User (#61354) (#61404) The API key document currently doesn't include the user's full_name or email attributes, and as a result, when those attributes return `null` when hitting `GET`ing `/_security/_authenticate`, and in the SAML response from the [IdP Plugin](#54046). This changeset adds those fields to the document and extracts them to fill in the User when authenticating. They're effectively going to be a snapshot of the User from when the key was created, but this is in line with roles and metadata as well. Signed-off-by: lloydmeta <[email protected]>
The API key document currently doesn't include the user's full_name or email attributes, and as a result, when those attributes return
nullwhen hittingGETing/_security/_authenticate, and in the SAML response from the IdP Plugin.This changeset adds those fields to the document and extracts them to fill in the User when authenticating. They're effectively going to be a snapshot of the User from when the key was created, but this is in line with roles and metadata as well.