Skip to content

Don't require separate privilege for internal detail of put pipeline#60191

Merged
droberts195 merged 1 commit intoelastic:7.9from
droberts195:hide_put_pipeline_internal_detail_79
Jul 27, 2020
Merged

Don't require separate privilege for internal detail of put pipeline#60191
droberts195 merged 1 commit intoelastic:7.9from
droberts195:hide_put_pipeline_internal_detail_79

Conversation

@droberts195
Copy link
Copy Markdown

Putting an ingest pipeline used to require that the user calling
it had permission to get nodes info as well as permission to
manage ingest. This was due to an internal implementaton detail
that was not visible to the end user.

This change alters the behaviour so that a user with the
manage_pipeline cluster privilege can put an ingest pipeline
regardless of whether they have the separate privilege to get
nodes info. The internal implementation detail now runs as
the internal _xpack user when security is enabled.

Backport of #60106

Putting an ingest pipeline used to require that the user calling
it had permission to get nodes info as well as permission to
manage ingest.  This was due to an internal implementaton detail
that was not visible to the end user.

This change alters the behaviour so that a user with the
manage_pipeline cluster privilege can put an ingest pipeline
regardless of whether they have the separate privilege to get
nodes info.  The internal implementation detail now runs as
the internal _xpack user when security is enabled.

Backport of elastic#60106
@droberts195 droberts195 merged commit aa6ef62 into elastic:7.9 Jul 27, 2020
@droberts195 droberts195 deleted the hide_put_pipeline_internal_detail_79 branch July 27, 2020 09:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant