-
Notifications
You must be signed in to change notification settings - Fork 343
Fix IllegalArgumentException when resolved indices are empty #5797
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Fix IllegalArgumentException when resolved indices are empty #5797
Conversation
|
That looks quite good to me, thank you! Just a few things:
|
4692a36 to
b9d0dec
Compare
acaae3e to
96c8e4e
Compare
Signed-off-by: Maxim Muzafarov <[email protected]>
96c8e4e to
91a7097
Compare
|
@nibix during the implementation of the integration test, I encountered another edge case: if there are no indices, and users do not have any indices priveleges for the action at all, such requests should be also forbidden. To check this edge case I've added - a new method You've also mentioned IndexAuthorizationReadOnlyIntTests.java to add a new ingegration test there. I've added new
wdyt? |
|
Thanks for the update! On Friday, I will be quite busy with other stuff, so I will only have time to take a closer look on Monday.
We need to take a closer look at this:
Of course, this is a discussable topic - at the moment, we are working on some fundamental behavior changes (see #3905, #5367 and #5399 ; I also need to write an updated RFC soon). Feel invited to discuss there. |
|
Sorry for the late reply, was just too busy :-( That looks generally very good to me! Yet, I think we need to briefly reflect on this:
If I see this correctly, this would have the following effect:
This is a kind of inconsistent behavior which we should avoid IMHO (even though it might be a case that seldomly happens in the real word). For now, I would propose not to do the At the moment, we are busy on revising the index authorization behavior, see #5814. We could use that chance and implement the behavior change in that go. Feel invited to have a look there and comment :) @cwperks wdyt? |
Description
[Describe what this change achieves]
Issues Resolved
Resolves #5794
Is this a backport? If so, please add backport PR # and/or commits #, and remove
backport-failedlabel from the original PR.Do these changes introduce new permission(s) to be displayed in the static dropdown on the front-end? If so, please open a draft PR in the security dashboards plugin and link the draft PR here
Testing
[Please provide details of testing done: unit testing, integration testing and manual testing]
Check List
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.