-
Notifications
You must be signed in to change notification settings - Fork 25.8k
Fix permissions for UnboundID LDAP SDK #68872
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
We inadvertently removed permissions needed by the UnboundID LDAP SDK during a refactoring. This commit returns them to their rightful place. These permissions are needed in core because we force the class initializers for two classes from the UnboundID LDAP SDK to load while loading the x-pack-core plugin. We have to do this there because x-pack-core depends on the UnboundID LDAP SDK as some realm classes live in x-pack-core. Without these permissions, Elasticsearch will fail to start if an AD or LDAP realm is configured.
|
Pinging @elastic/es-security (Team:Security) |
rjernst
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
|
@elasticmachine update branch |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
tvernum
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
I was able to start up a node with both SAML and LDAP configured, and authenticate with an LDAP user.
|
I don't see any mention of automated tests for this issue or LDAP auth. It is possible? Any plans for it? |
|
I just repeated my test against master (without this fix) and it fails to start, as expected. |
They're coming, but they'll take time. |
We inadvertently removed permissions needed by the UnboundID LDAP SDK during a refactoring. This commit returns them to their rightful place. These permissions are needed in core because we force the class initializers for two classes from the UnboundID LDAP SDK to load while loading the x-pack-core plugin. We have to do this there because x-pack-core depends on the UnboundID LDAP SDK as some realm classes live in x-pack-core. Without these permissions, Elasticsearch will fail to start if an AD or LDAP realm is configured.
We inadvertently removed permissions needed by the UnboundID LDAP SDK during a refactoring. This commit returns them to their rightful place. These permissions are needed in core because we force the class initializers for two classes from the UnboundID LDAP SDK to load while loading the x-pack-core plugin. We have to do this there because x-pack-core depends on the UnboundID LDAP SDK as some realm classes live in x-pack-core. Without these permissions, Elasticsearch will fail to start if an AD or LDAP realm is configured.
Hey, glad to see this has been raised. Is there any guide on how to fix, or will I need to wait for 7.11.1 release? |
|
Yes, there isn't a good workaround. We'll release 7.11.1 as fast as we can. |
We inadvertently removed permissions needed by the UnboundID LDAP SDK during a refactoring. This commit returns them to their rightful place.
These permissions are needed in core because we force the class initializers for two classes from the UnboundID LDAP SDK to load while loading the x-pack-core plugin. We have to do this there because x-pack-core depends on the UnboundID LDAP SDK as some realm classes live in x-pack-core.
Without these permissions, Elasticsearch will fail to start if an AD or LDAP realm is configured.
Relates #64743
Closes #68838