-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security] Moved reset_creds call to reset_internal_creds #176410
Conversation
🤖 GitHub commentsExpand to view the GitHub comments
Just comment with:
|
fb4c1ed
to
f35fad0
Compare
Pinging @elastic/security-solution (Team: SecuritySolution) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!!! Thanks!! :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@dkirchan thank you for updating the user related logic promptly 👍
💛 Build succeeded, but was flaky
Failed CI StepsTest Failures
Metrics [docs]
History
To update your PR or re-run it, just comment with: cc @dkirchan |
…6410) ## Summary Actions needed following the email that was sent about the breaking change : > API: rather than returning credentials for a privileged "elastic" user, [we'll return](https://elasticco.atlassian.net/browse/CP-5477) credentials for a much-less privileged "admin" user. Note this is the user that can be manipulated by customers. This new user won't be an "operator" user anymore: any test that relies on this user being able to do things such as retrieving the cluster health, role mappings, node stats, etc. would therefore break. > A second set of credentials can be retrieved for a privileged "testing-internal" user through a dedicated API endpoint. To retrieve credentials for that user, please update your automation with a small change: > 1. rather than calling the _reset-credentials endpoint, please call the[_reset-internal-credentials > 2. remove any hard-coded reference of the "elastic" user: the new username is returned in the API response --------- Co-authored-by: Gloria Hornero <[email protected]>
…6410) ## Summary Actions needed following the email that was sent about the breaking change : > API: rather than returning credentials for a privileged "elastic" user, [we'll return](https://elasticco.atlassian.net/browse/CP-5477) credentials for a much-less privileged "admin" user. Note this is the user that can be manipulated by customers. This new user won't be an "operator" user anymore: any test that relies on this user being able to do things such as retrieving the cluster health, role mappings, node stats, etc. would therefore break. > A second set of credentials can be retrieved for a privileged "testing-internal" user through a dedicated API endpoint. To retrieve credentials for that user, please update your automation with a small change: > 1. rather than calling the _reset-credentials endpoint, please call the[_reset-internal-credentials > 2. remove any hard-coded reference of the "elastic" user: the new username is returned in the API response --------- Co-authored-by: Gloria Hornero <[email protected]>
Summary
Actions needed following the email that was sent about the breaking change :