-
Notifications
You must be signed in to change notification settings - Fork 336
Update ppl_full_access with new required permissions #5510
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: Vamsi Manohar <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@vamsimanohar I'm approving this PR, but I think we should hide the internal implementation from a user by executing these actions in the plugin's system context.
i.e. stash the threadContext then execute the actions
try (ThreadContext.StoredContext ctx = threadContext.stashContext()) {
...run actions here...
}
For example, see my core PR to hide the internal scroll implementation of _update_by_query: opensearch-project/OpenSearch#17250
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@vamsimanohar qq, shouldn't manage_point_in_time
action-group cover these? Or do we not want readll and segments permission added as part of refresh?
Also, would you mind adding a CHANGELOG entry for this PR under maintenance section.
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #5510 +/- ##
==========================================
- Coverage 72.78% 72.73% -0.05%
==========================================
Files 398 398
Lines 24641 24641
Branches 3747 3747
==========================================
- Hits 17934 17923 -11
- Misses 4878 4891 +13
+ Partials 1829 1827 -2 🚀 New features to boost your workflow:
|
@cwperks Yeah, we did this in our plugins for accessing system indices.. Honestly I didn't give a thought on why is PPL plugin using user's permissions to create and delete PITs. Lets keep this PR on hold and see if I can make changes to SQL plugin to use plugin's permissions instead of user's |
@cwperks SQL Plugin has few use cases where PIT management within plugin is not feasible right now.
These two use cases are making the changes much more involved. So, we still want to continue with existing permission model and revisit at a later time. @DarshitChanpura |
@vamsimanohar is this required? |
Description
[Describe what this change achieves]
PPL started using create/delete PIT APIs for execution and ppl_full_access is not reflecting those permissions. This PR address the gap.
Testing
Manual testing done with above permissions and requests are working fine.
Check List
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.