Handle PRIVILEGE_LEVEL_CHANGE action#10231
Conversation
|
Pinging @elastic/elastic-agent-control-plane (Team:Elastic-Agent-Control-Plane) |
…privilege_level_change.go Co-authored-by: Paolo Chilà <paolo.chila@elastic.co>
Co-authored-by: Paolo Chilà <paolo.chila@elastic.co>
ycombinator
left a comment
There was a problem hiding this comment.
@michalpristas Would it be possible to add some integration/E2E tests in this PR? Failing that, could you add some manual testing steps to the PR description? Thanks.
|
added testing steps to description |
Co-authored-by: Shaunak Kashyap <ycombinator@gmail.com>
Co-authored-by: Shaunak Kashyap <ycombinator@gmail.com>
…-agent into feat/switch-action
…nge.yaml Co-authored-by: Shaunak Kashyap <ycombinator@gmail.com>
…privilege_level_change.go Co-authored-by: Shaunak Kashyap <ycombinator@gmail.com>
…privilege_level_change.go Co-authored-by: Shaunak Kashyap <ycombinator@gmail.com>
…-agent into feat/switch-action
|
This pull request is now in conflicts. Could you fix it? 🙏 |
|
This pull request is now in conflicts. Could you fix it? 🙏 |
|
This pull request is now in conflicts. Could you fix it? 🙏 |
💛 Build succeeded, but was flaky
Failed CI StepsHistory
|
blakerouse
left a comment
There was a problem hiding this comment.
This looks good, thanks for working on it and iterating to get it into a good state.
to test this you need a 9.2 kibana with FF config:
This PR adds a handler for PRIVILEGE_LEVEL_CHANGE action.
Once action comes and permissions are fixed we call the code identical to
privilegeorunprivilegeCLI commands.Service manager handles user changes differently Windows being least problematic.
Systemd could do
daemon-reloadbut for consistency MacOS and Linux are handled in a same way:This is not performed if we are running using proper user
Test steps:
xpack.fleet.enableExperimental: ["enableAgentPrivilegeLevelChange"]POST kbn:api/fleet/agents/{agent_id}/privilege_level_changeFixes: #4973