Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Don't fallback to anonymous for tokens/apikeys #51042

Merged
merged 2 commits into from
Jan 17, 2020

Conversation

jkakavas
Copy link
Member

This commit changes our behavior so that when we receive a
request with an invalid/expired/wrong access token or API Key
we do not fallback to authenticating as the anonymous user even if
anonymous access is enabled for Elasticsearch.

Resolves: #50171

This commit changes our behavior so that when we receive a
request with an invalid/expired/wrong access token or API Key
we do not fallback to authenticating as the anonymous user even if
anonymous access is enabled for Elasticsearch.

Resolves:  elastic#50171
@jkakavas jkakavas added >bug :Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc) v8.0.0 v7.6.0 labels Jan 15, 2020
@jkakavas jkakavas requested a review from tvernum January 15, 2020 14:08
@elasticmachine
Copy link
Collaborator

Pinging @elastic/es-security (:Security/Authentication)

@polyfractal polyfractal added v7.7.0 and removed v7.6.0 labels Jan 15, 2020
@jkakavas
Copy link
Member Author

@polyfractal not sure if this was actually you or a bot 🤖 , but this is a bug fix and still targets 7.6.0 assuming it is merged in time to be included.

@tvernum
Copy link
Contributor

tvernum commented Jan 16, 2020

@jkakavas We bulk move every unmerged PR out of a release when it the branch is cut.
It's up to the PR author to relabel back again if needed (the auto update doesn't know whether it should go to the next minor, the next patch, or be marked as a blocker for the current minor).

@jkakavas
Copy link
Member Author

the auto update doesn't know whether it should go to the next minor, the next patch, or be marked as a blocker for the current minor

Makes sense:) I had a suspicion hence the

not sure if this was actually you or a bot

but I thought we run all our bots as @@elasticmachine. TIL

@tvernum
Copy link
Contributor

tvernum commented Jan 16, 2020

It's not a bot, just a script.

@tvernum tvernum added the v7.6.0 label Jan 17, 2020
Copy link
Contributor

@tvernum tvernum left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@jkakavas jkakavas merged commit 722fdd5 into elastic:master Jan 17, 2020
jkakavas added a commit to jkakavas/elasticsearch that referenced this pull request Jan 17, 2020
This commit changes our behavior so that when we receive a
request with an invalid/expired/wrong access token or API Key
we do not fallback to authenticating as the anonymous user even if
anonymous access is enabled for Elasticsearch.
jkakavas added a commit to jkakavas/elasticsearch that referenced this pull request Jan 17, 2020
This commit changes our behavior so that when we receive a
request with an invalid/expired/wrong access token or API Key
we do not fallback to authenticating as the anonymous user even if
anonymous access is enabled for Elasticsearch.
jkakavas added a commit that referenced this pull request Jan 17, 2020
This commit changes our behavior so that when we receive a
request with an invalid/expired/wrong access token or API Key
we do not fallback to authenticating as the anonymous user even if
anonymous access is enabled for Elasticsearch.
jkakavas added a commit that referenced this pull request Jan 17, 2020
This commit changes our behavior so that when we receive a
request with an invalid/expired/wrong access token or API Key
we do not fallback to authenticating as the anonymous user even if
anonymous access is enabled for Elasticsearch.
SivagurunathanV pushed a commit to SivagurunathanV/elasticsearch that referenced this pull request Jan 23, 2020
This commit changes our behavior so that when we receive a
request with an invalid/expired/wrong access token or API Key
we do not fallback to authenticating as the anonymous user even if
anonymous access is enabled for Elasticsearch.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
>bug :Security/Authentication Logging in, Usernames/passwords, Realms (Native/LDAP/AD/SAML/PKI/etc) v7.6.0 v7.7.0 v8.0.0-alpha1
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Don't fallback to anonymous user when anonymous access is enabled for invalid access token/api key
5 participants