-
Notifications
You must be signed in to change notification settings - Fork 24.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[docs] Document new role description field #108422
[docs] Document new role description field #108422
Conversation
Documentation preview: |
+ "as well as updating user profile data for the kibana-* namespace. " | ||
+ "Additionally, this role grants read access to the .monitoring-* indices " | ||
+ "and read and write access to the .reporting-* indices. " | ||
+ "Note: This role should not be assigned to users as the granted permissions may change between releases." |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a verbatim copy of kibana_system
role's description. The documentation seems to be outdated, since the permissions have changed quite a lot since the documentation was first written.
Not sure if we should cover them all. But I do think it's worth revisiting description to be more explicit in stating that this its intention is for system use by Kibana and that it should not be granted to regular users.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah good catch! I can take this back to my team to discuss updates, but I think this is fine for now.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sounds good to me.
The superuser role is not 1-1 serialized when persisted as limited-by.
superuser role now has description which is not stored in API keys
* would be inconsistent and require handling backwards compatibility. | ||
* Hence why we have to remove them before create/update of API key roles. | ||
*/ | ||
static Set<RoleDescriptor> removeUserRoleDescriptorDescriptions(Set<RoleDescriptor> userRoleDescriptors) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Made package protected for testing.
7c4bddc
to
3440fbf
Compare
Pinging @elastic/es-docs (Team:Docs) |
Pinging @elastic/es-security (Team:Security) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
+ "as well as updating user profile data for the kibana-* namespace. " | ||
+ "Additionally, this role grants read access to the .monitoring-* indices " | ||
+ "and read and write access to the .reporting-* indices. " | ||
+ "Note: This role should not be assigned to users as the granted permissions may change between releases." |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah good catch! I can take this back to my team to discuss updates, but I think this is fine for now.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
docs lgtm with a couple of small comments
Co-authored-by: shainaraskas <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
This PR adds missing role description for the `transport_client role`, and a test to enforce that all reserved roles are described. The description also serves as self-documentation for roles, thus it is reasonable to make this a requirement for all reserved roles. Relates to #108422, which included descriptions for other reserved roles.
Update API docs to include new
description
field (introduced in #107088) and add descriptions for all built-in roles.