Skip to content

Commit

Permalink
Unauthorized route migration for routes owned by security-service-int…
Browse files Browse the repository at this point in the history
…egrations (#198376)

### Authz API migration for unauthorized routes

This PR migrates unauthorized routes owned by your team to a new
security configuration.
Please refer to the documentation for more information: [Authorization
API](https://docs.elastic.dev/kibana-dev-docs/key-concepts/security-api-authorization)

### **Before migration:**
```ts
router.get({
  path: '/api/path',
  ...
}, handler);
```

### **After migration:**
```ts
router.get({
  path: '/api/path',
  security: {
    authz: {
      enabled: false,
      reason: 'This route is opted out from authorization because ...',
    },
  },
  ...
}, handler);
```

### What to do next?
1. Review the changes in this PR.
2. Elaborate on the reasoning to opt-out of authorization.
3. Routes without a compelling reason to opt-out of authorization should
plan to introduce them as soon as possible.
2. You might need to update your tests to reflect the new security
configuration:
  - If you have snapshot tests that include the route definition.

## Any questions?
If you have any questions or need help with API authorization, please
reach out to the `@elastic/kibana-security` team.

---------

Co-authored-by: Kylie Meli <kylie.geller@elastic.co>
  • Loading branch information
kibanamachine and kgeller authored Nov 8, 2024
1 parent ef0428f commit ae15c54
Showing 1 changed file with 7 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,13 @@ export const getFleetManagedIndexTemplatesRoute = (router: IRouter) => {
.addVersion(
{
version: '1',
security: {
authz: {
enabled: false,
reason:
'This route delegates authorization of the current user to the Elasticsearch index template API.',
},
},
validate: {},
},
async (context, _request, response) => {
Expand Down

0 comments on commit ae15c54

Please sign in to comment.