Skip to content

[9.0] Unauthorized route migration for routes owned by response-ops (#214785)#214830

Merged
kibanamachine merged 1 commit intoelastic:9.0from
kibanamachine:backport/9.0/pr-214785
Mar 17, 2025
Merged

[9.0] Unauthorized route migration for routes owned by response-ops (#214785)#214830
kibanamachine merged 1 commit intoelastic:9.0from
kibanamachine:backport/9.0/pr-214785

Conversation

@kibanamachine
Copy link
Contributor

Backport

This will backport the following commits from main to 9.0:

Questions ?

Please refer to the Backport tool documentation

…c#214785)

### Authz API migration for unauthorized routes

This PR migrates last unauthorized routes owned by your team to a new
security configuration.
Please refer to the documentation for more information: [Authorization
API](https://docs.elastic.dev/kibana-dev-docs/key-concepts/security-api-authorization)

### **Before migration:**
```ts
router.get({
  path: '/api/path',
  ...
}, handler);
```

### **After migration:**
```ts
router.get({
  path: '/api/path',
  security: {
    authz: {
      enabled: false,
      reason: 'This route is opted out from authorization because ...',
    },
  },
  ...
}, handler);
```

(cherry picked from commit 229dca5)
@kibanamachine kibanamachine merged commit 1b42e77 into elastic:9.0 Mar 17, 2025
12 checks passed
@elasticmachine
Copy link
Contributor

💛 Build succeeded, but was flaky

Failed CI Steps

Test Failures

  • [job] [logs] FTR Configs #60 / Rules Management - Rule Delete API @ess delete_rules_bulk_legacy deleting rules bulk using bulk_action endpoint should return 2 legacy actions in the response body when it deletes 2 rules

Metrics [docs]

✅ unchanged

cc @elena-shostak

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport This PR is a backport of another PR

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants