[Actions] Extended ActionTypeRegistry with connector validation to validate config with secrets#116079
Conversation
…lidate config with secrets
|
Pinging @elastic/kibana-alerting-services (Team:Alerting Services) |
|
Even though this is how I was thinking of implementing it, having to duplicate the schema references for config and secrets in the Wondering if to make this a little clearer, we'd want to have the The existing validation function in the PR would then be unchanged! And the definition of the I could go either way though, not sure it's worth having a "different" shaped validation makes sense, since the way this is currently shaped seems more consistent that what I proposed ^^^. And:
|
…ulNaumenko/kibana into actions-config-with-secrets-validation
Thank you for a great thoughts @pmuellr! Yeah, I think you are right about the changes to the different shape of the connector validator. |
pmuellr
left a comment
There was a problem hiding this comment.
LGTM; made one note about some typing that we should probably fix up, if possible - and could do it later; also there's a test which doesn't seem like it's testing the connector validator, so I'm guessing it's some copy pasta.
💚 Build Succeeded
Metrics [docs]
History
To update your PR or re-run it, just comment with: cc @YulNaumenko |
…-migrate-away-from-injected-css-js * 'master' of github.com:elastic/kibana: (61 commits) [ML] Nodes overview for the Model Management page (elastic#116361) [Uptime] Uptime index config using kibana.yml (elastic#115775) [Controls] Dashboard Integration (elastic#115991) skip flaky suite (elastic#104260) Include Files in GitHub UI (elastic#115956) skip flaky suite (elastic#116060) [Canvas] By-Value Embeddables (elastic#113827) Skip failing test (elastic#115366) [Osquery] Fix live query search doesn't return relevant results for agents (elastic#116332) [Integrations] Added link in old Add Data description and fixed alignment in cards (elastic#116213) [Actions] Extended ActionTypeRegistry with connector validation to validate config with secrets (elastic#116079) skip flaky suite (elastic#109329) Grant access to machine learning features when base privileges are used (elastic#115444) Skipping failing test (elastic#84957) [RAC][Security Solution] Adds migration to new SecuritySolution rule types (elastic#112113) skip flaky suite (elastic#115366) [Fleet] Marking API spec as experimental (elastic#116331) [Docs] Cleaning up the versions in the upgrade paths. Closes elastic#116223 (elastic#116228) [Reporting] Suppress debug logs in the mock logger (elastic#116012) [Metrics UI] Clear threshold alert groups state when filterQuery changes (elastic#116205) ... # Conflicts: # src/plugins/dashboard/public/application/embeddable/dashboard_container.tsx # src/plugins/dashboard/public/types.ts
|
Friendly reminder: Looks like this PR hasn’t been backported yet. |
|
Friendly reminder: Looks like this PR hasn’t been backported yet. |
Resolves #112459
Currently there was no ability to validate connector config with secrets values together, which causes to the issues in the API validation for .email action type:
hasAuth(config) is true theusername/password(secrets) should be populated;service(config) isexchange_serverthenclientSecret(secrets) should be populated;Added new validation method for connector, which allows to implement by the action type the ability to validate connector properties secrets with config.