Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[7.x] Properly apply rename deprecation to xpack.security.authProviders. #45755

Merged
merged 1 commit into from
Sep 16, 2019

Conversation

azasypkin
Copy link
Member

In #39446 we migrated part of the xpack.security config to the new platform plugin, but we didn't account for the mutual usage of deprecated xpack.security.authProviders and new xpack.security.authc.{oidc|realm}.*.

Ideally we should have relied on the config deprecation system provided by the New Platform, but it's not implemented yet. In this commit we implement a workaround for the missing rename deprecation transformation.

@azasypkin azasypkin added bug Fixes for quality problems that affect the customer experience Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! Feature:Security/Authentication Platform Security - Authentication release_note:skip Skip the PR/issue when compiling release notes v7.4.0 labels Sep 16, 2019
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-security

@azasypkin azasypkin changed the title Properly apply rename deprecation to xpack.security.authProviders. [7.x] Properly apply rename deprecation to xpack.security.authProviders. Sep 16, 2019
@elasticmachine
Copy link
Contributor

💚 Build Succeeded

@@ -56,6 +53,23 @@ export const ConfigSchema = schema.object(
{ allowUnknowns: true }
);

// HACK: Since new platform doesn't support config deprecation transformations yet (e.g. `rename`), we have to handle
// them manually here for the time being. Legacy platform config will log corresponding deprecation warnings.
const origValidate = ConfigSchema.validate;
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

note: super hacky, but feels like the safest and correct for the time being.

Copy link
Contributor

@kobelb kobelb left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@azasypkin
Copy link
Member Author

7.4/7.4.0: c74ac20

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backported bug Fixes for quality problems that affect the customer experience Feature:Security/Authentication Platform Security - Authentication release_note:skip Skip the PR/issue when compiling release notes Team:Security Team focused on: Auth, Users, Roles, Spaces, Audit Logging, and more! v7.4.0 v7.5.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants