[deb/rpm] Create keystore after installation#76465
Conversation
|
Pinging @elastic/kibana-operations (Team:Operations) |
|
@elasticmachine merge upstream |
2 similar comments
|
@elasticmachine merge upstream |
|
@elasticmachine merge upstream |
|
ADding a build here in ~90, just going down the whole list. |
|
You will want to merge these changes in: #79409 |
|
#79409 has been merged and the conflicts need to be resolved. |
A common source of permission errors stem from creating files after package installation under a user that runtime kibana won't be able to read or write to. Under package installations this is usually root. This PR contains two changes: 1) Create the keystore during deb/rpm installation with permissions consistent with other stack products 2) Limit the force-root flag to the server CLI. The force-root flag is a good precaution for long running and global processes, but for local writes we can pre-enforce this by setting install permissions.
5182464 to
96a2546
Compare
This reverts commit 96a2546.
|
https://s3-us-west-1.amazonaws.com/kibana.budzenski.com/76465/290aa61/kibana-8.0.0-SNAPSHOT-amd64.deb |
|
@elasticmachine merge upstream |
|
@elasticmachine merge upstream |
src/cli_keystore/dev.js
Outdated
| */ | ||
|
|
||
| require('../setup_node_env'); | ||
| require('../setup_node_env/cli'); |
There was a problem hiding this comment.
Can we drop the new cli and instead require no_transpilation?
tylersmalley
left a comment
There was a problem hiding this comment.
Possible suggestion on dropping requirement of new cli file.
|
@elasticmachine merge upstream |
|
@elasticmachine merge upstream |
|
@elasticmachine merge upstream |
💚 Build SucceededMetrics [docs]
History
To update your PR or re-run it, just comment with: |
tylersmalley
left a comment
There was a problem hiding this comment.
LGTM - tested both deb and rpm.
|
7.x/7.11: dd9434a |
…o-node-details * 'master' of github.com:elastic/kibana: (65 commits) update chromedriver dependency to 87 (elastic#83624) [TSVB] use new Search API for rollup search (elastic#83275) [TSVB] Y-axis has number formatting not considering all series formatters in the group (elastic#83438) [Logs UI] Update <LogStream /> internal state when its props change (elastic#83302) Add tag bulk action context menu (elastic#82816) [code coverage] adding plugin to flush coverage data (elastic#83447) [UsageCollection] Expose `KibanaRequest` to explicitly opted-in collectors (elastic#83413) Added eventBus to trigger and listen plotHandler event (elastic#83435) [Runtime fields] Editor phase 1 (elastic#81472) [Maps] Fix threshold alert issue resolving nested fields (elastic#83577) chore(NA): remove usage of unverified es snapshots (elastic#83589) [DOCS] Adds Elastic Contributor Program link (elastic#83561) Upgrade EUI to v30.2.0 (elastic#82730) Don't show loading screen during auto-reload (elastic#83376) Functional tests - fix esArchive mappings with runtime fields (elastic#83530) [deb/rpm] Create keystore after installation (elastic#76465) [rpm] Create default environment file at "/etc/sysconfig/kibana" (elastic#82144) [docker] removes workaround for missing crypto-policies-scripts subpackage (elastic#83455) [ML] Persisted URL state for the Data frame analytics jobs and models pages (elastic#83439) adds xpack.security.authc.selector.enabled setting (elastic#83551) ...
Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com>
This commit updates the versions of the Elastic Stack that the template deploys. - Add 7.11.1 - Update 7.10 version to 7.10.2 - Remove EOL versions, 7.2.1 and 7.3.2 - Don't use --allow root for 7.11 Relates: elastic/kibana#76465
Alex089616
left a comment
There was a problem hiding this comment.
Need all accounts containing fundsa
Create keystore during package installation
A common source of permission errors stem from creating files after
package installation under a user that runtime kibana won't be able to
read or write to. Under package installations this is usually root.
This PR contains two changes:
consistent with other stack products
a good precaution for long running and global processes, but for local
writes we can pre-enforce this by setting install permissions.
Closes #77392
Closes #75448