-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unauthorized route migration for routes owned by appex-ai-infra,obs-ai-assistant,security-generative-ai #198351
base: main
Are you sure you want to change the base?
Conversation
…ssistant,security-generative-ai
Pinging @elastic/obs-ai-assistant (Team:Obs AI Assistant) |
Pinging @elastic/appex-ai-infra (Team:AI Infra) |
enabled: false, | ||
reason: 'This route is opted out from authorization', | ||
}, | ||
}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@dgieselaar I don't think we intended to opt-out of authorization here? Don't we want to require a minimum set of privileges?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's true, but atm we don't know what set of roles or permission swe should restraint to (virtual any plugin can call those APIs from the inference public contract) - it's a platform API. Plus, RBAC regarding inference APIs could be lower level than the endpoints (once we figure that what RBAC model we might want).
The PR is just adapting the code to the new route rbac format, basically
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can we model privileges based on the features that currently call this endpoint? For example, could this route require any of the privileges that grant access to the AI Assistants?
@elasticmachine merge upstream |
…-ai-infra_obs-ai-assistant_security-generative-ai
💛 Build succeeded, but was flaky
Failed CI StepsTest FailuresMetrics [docs]
|
Authz API migration for unauthorized routes
This PR migrates unauthorized routes owned by your team to a new security configuration.
Please refer to the documentation for more information: Authorization API
Before migration:
After migration:
What to do next?
Any questions?
If you have any questions or need help with API authorization, please reach out to the
@elastic/kibana-security
team.