-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
minimal_all
privilege for a feature with no subfeatures doesn't give any privs
#111631
Comments
Pinging @elastic/kibana-security (Team:Security) |
minimal_all
privilege for a feature with no subfeatures doesn't give any privs
Note: I couldn't figure out where To add some background to Lee's description and how it involves Canvas & Reporting: "PDF reports" are the only sub-feature for Canvas, so the A side effect of that toggling nature, is a bug happening when the user has |
This is actually working as designed. Features only get a I think we are open to changing this decision if needed, but this isn't a bug as it stands today |
I think this is a weird situation where the test creates a role via the Kibana API which has the minimal_all priv even though you couldn't do that through the UI in this case (when Maybe creating that role should fail? |
Yeah I agree this is a weird situation. We could fail with an error message, but that poses some interesting backwards compatibility concerns. We haven't enforced privilege names to date, and we wouldn't want to prevent existing roles with unknown privileges from being updated. We (and ES) don't make the distinction between |
I think there could be a problem if someone creates roles with I haven't tried this. |
Kibana version: 7.15.0 (but also 7.14 or earlier versions)
Elasticsearch version: 7.15.0
Server OS version: n/a
Browser version: n/a
Browser OS version: n/a
Original install method (e.g. download page, yum, from source, etc.): ESS Cloud
Describe the bug: If you create a role with Kibana Canvas privilege of
all
orminimal_all
it should allow full access to Canvas. The difference between them should impact whether you can use reporting in Canvas or not but this is also tied to the config paramxpack.reporting.roles.enabled
.Expected:
xpack.reporting.roles.enabled: true
reporting in Canvas is controlled by having the reporting_user role (or not having it). In this case,minimal_all
andall
shouldn't make a difference.xpack.reporting.roles.enabled: false
reporting in Canvas is controlled by havingall
priv.minimal_all
means Canvas without reporting)I made this table but not 100% sure it's correct.
Actual:
minimal_all
withxpack.reporting.roles.enabled: true
doesn't give any access to Canvas.Steps to reproduce:
xpack.reporting.roles.enabled: false
that we have set in x-pack/test/functional/config.jsxpack.reporting.roles.enabled: false
?So you might have to use curl to the kibana URL/api/security/role with a body like this (our tests define these roles in the config file);
Expected behavior: Canvas should be in the Nav bar, and should also work if you go straight to the URL.
Screenshots (if relevant):
Errors in browser console (if relevant):
Provide logs and/or server output (if relevant):
Any additional context: I think our main test/functional and x-pack/test/functional test groups should try to avoid changing any Kibana or Elasticsearch server configuration parameters for a few reasons:
non-default-settings
config file for testing non-default values. In some cases we initially release a feature disabled but make a config parameter so users can change the setting and try it. If we have those in a different test suite, and later change the default value to enable the feature, we can just swap the tests between the two groups.The text was updated successfully, but these errors were encountered: