Skip to content

Conversation

@cwperks
Copy link
Owner

@cwperks cwperks commented Jul 22, 2025

Description

Steps to test:

  1. Checkout the common-utils changes from Update user deserialization to include entire attribute map common-utils#1
  2. ./gradlew publishToMavenLocal to publish the common-utils changes to your local maven repository where they can be picked up by the security plugin
  3. Run the test added in this PR with ./gradlew :opensearch-sample-resource-plugin:integrationTest --tests SampleResourcePluginTests.testUserSerializationAndDeserialization -i

Observe the debug statement with Parsed User in the logs:

Parsed User: User[name=admin, backend_roles=[], roles=[user_admin__allaccess], custom_attributes=[attr.internal.attr1=val1], user_requested_tenant=null]

Note: The changes in this PR are WIP and for demonstration purposes, the test should ideally add some assertions but some application logic may need to updated to use the log out the parsed user and then the test can assert the existence of certain log lines.

Check List

  • New functionality includes testing
  • New functionality has been documented
  • New Roles/Permissions have a corresponding security dashboards plugin PR
  • API changes companion pull request created
  • Commits are signed per the DCO using --signoff

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.

markdboyd and others added 12 commits July 21, 2025 12:38
attempt reading injected attributes in RolesInjector

add custom attributes to user information in thread context

add more logging to injectUserAndRoles

add debugging statements

update serialization to include only custom attribute name

revert changes to RolesInjector

revert changes to UserInjector

revert changes to SecurityFilter

Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>

update setUserInfoInThreadContext to base64 encode the serialized map of user custom attributes

Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>

add null tenant to user context when none is available

Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>

Immutable user object (opensearch-project#5212)

Signed-off-by: Nils Bandener <nils.bandener@eliatra.com>
Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>

apply spotless formatting

Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
…en requested tenant is empty

Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
…Utils

Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
…control whether user attributes are serialized

Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
…k if user attribute serialization is enabled before adding serialized user attributes to the thread context

Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
…t consistent

Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
Signed-off-by: Mark Boyd <mark.boyd@gsa.gov>
Signed-off-by: Craig Perkins <cwperx@amazon.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants