[AI4DSOC] Hide security solution pages#219081
Conversation
|
/ci |
|
/ci |
|
/ci |
|
/ci |
|
/ci |
x-pack/solutions/security/plugins/security_solution/public/cloud_security_posture/routes.tsx
Show resolved
Hide resolved
|
/ci |
1 similar comment
|
/ci |
💛 Build succeeded, but was flaky
Failed CI Steps
Test Failures
Metrics [docs]Async chunks
Page load bundle
History
|
## Summary This PR implements a mechanism to control visibility and access to Security Solution pages based on user access and PLIs. It replaces direct usage of the `SecurityRoutePageWrapper` component with the `withSecurityRoutePageWrapper` higher-order component across multiple route files in the Security Solution plugin. ## Changes - Added `cloudSecurityPosture` entry to the `SecurityPageName` enum in `deep_links.ts` - Replaced direct usage of `SecurityRoutePageWrapper` with `withSecurityRoutePageWrapper` HOC in: | Route | Complete | AiSoc | Comments | |-------------------------|----------|--------------------------------|----------------------| | Asset Inventory routes | OK | Redirected to /get_started | | | Assets routes | OK | OK | Should we hide this one? | | Cloud Security Posture | Redirected to /get_started | Redirected to /get_started | Redirected if there's no 'Cloud' Addon (even on Complete) | | Dashboards routes | OK | Redirected to /get_started | | | Exceptions routes | OK | Upselling | Upselling has priority over redirection | | Explore routes | OK | Redirected to /get_started | | | Investigations routes | OK | Redirected to /get_started | | | Notes routes | OK | Not Working | Should be redirected to get_started - TBC... | | Overview routes | OK | Redirected to /get_started | | | Timelines routes | OK | Redirected to /get_started | | ## Question: <img width="1227" alt="Screenshot 2025-04-24 at 15 20 52" src="https://github.com/user-attachments/assets/a57936b9-e954-43d8-a6d0-caf31508461c" /> Without `Cloud` Add-on - should we hide the cloud cards ? Eg. in `Complete` tier? ## Technical Details The `withSecurityRoutePageWrapper` HOC provides a consistent way to handle authorization, redirects, and page visibility across the Security Solution. This approach allows for more granular control over which pages are accessible based on user permissions and subscription tier, particularly important for the **AI for SOC** functionality. ## Testing - Verified that all Security Solution pages properly respect user permissions - Confirmed that unauthorized users are redirected appropriately Closes: elastic/security-team#12401 --------- Co-authored-by: Ash <1849116+ashokaditya@users.noreply.github.com> Co-authored-by: Ashokaditya <ashokaditya@elastic.co>
## Summary This PR implements a mechanism to control visibility and access to Security Solution pages based on user access and PLIs. It replaces direct usage of the `SecurityRoutePageWrapper` component with the `withSecurityRoutePageWrapper` higher-order component across multiple route files in the Security Solution plugin. ## Changes - Added `cloudSecurityPosture` entry to the `SecurityPageName` enum in `deep_links.ts` - Replaced direct usage of `SecurityRoutePageWrapper` with `withSecurityRoutePageWrapper` HOC in: | Route | Complete | AiSoc | Comments | |-------------------------|----------|--------------------------------|----------------------| | Asset Inventory routes | OK | Redirected to /get_started | | | Assets routes | OK | OK | Should we hide this one? | | Cloud Security Posture | Redirected to /get_started | Redirected to /get_started | Redirected if there's no 'Cloud' Addon (even on Complete) | | Dashboards routes | OK | Redirected to /get_started | | | Exceptions routes | OK | Upselling | Upselling has priority over redirection | | Explore routes | OK | Redirected to /get_started | | | Investigations routes | OK | Redirected to /get_started | | | Notes routes | OK | Not Working | Should be redirected to get_started - TBC... | | Overview routes | OK | Redirected to /get_started | | | Timelines routes | OK | Redirected to /get_started | | ## Question: <img width="1227" alt="Screenshot 2025-04-24 at 15 20 52" src="https://github.com/user-attachments/assets/a57936b9-e954-43d8-a6d0-caf31508461c" /> Without `Cloud` Add-on - should we hide the cloud cards ? Eg. in `Complete` tier? ## Technical Details The `withSecurityRoutePageWrapper` HOC provides a consistent way to handle authorization, redirects, and page visibility across the Security Solution. This approach allows for more granular control over which pages are accessible based on user permissions and subscription tier, particularly important for the **AI for SOC** functionality. ## Testing - Verified that all Security Solution pages properly respect user permissions - Confirmed that unauthorized users are redirected appropriately Closes: elastic/security-team#12401 --------- Co-authored-by: Ash <1849116+ashokaditya@users.noreply.github.com> Co-authored-by: Ashokaditya <ashokaditya@elastic.co>
|
Starting backport for target branches: 8.19 https://github.com/elastic/kibana/actions/runs/15493992160 |
|
Starting backport for target branches: 8.19 https://github.com/elastic/kibana/actions/runs/15493992158 |
💔 All backports failed
Manual backportTo create the backport manually run: Questions ?Please refer to the Backport tool documentation |
1 similar comment
💔 All backports failed
Manual backportTo create the backport manually run: Questions ?Please refer to the Backport tool documentation |
|
Friendly reminder: Looks like this PR hasn’t been backported yet. |
4 similar comments
|
Friendly reminder: Looks like this PR hasn’t been backported yet. |
|
Friendly reminder: Looks like this PR hasn’t been backported yet. |
|
Friendly reminder: Looks like this PR hasn’t been backported yet. |
|
Friendly reminder: Looks like this PR hasn’t been backported yet. |
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation |
## Summary This PR implements a mechanism to control visibility and access to Security Solution pages based on user access and PLIs. It replaces direct usage of the `SecurityRoutePageWrapper` component with the `withSecurityRoutePageWrapper` higher-order component across multiple route files in the Security Solution plugin. ## Changes - Added `cloudSecurityPosture` entry to the `SecurityPageName` enum in `deep_links.ts` - Replaced direct usage of `SecurityRoutePageWrapper` with `withSecurityRoutePageWrapper` HOC in: | Route | Complete | AiSoc | Comments | |-------------------------|----------|--------------------------------|----------------------| | Asset Inventory routes | OK | Redirected to /get_started | | | Assets routes | OK | OK | Should we hide this one? | | Cloud Security Posture | Redirected to /get_started | Redirected to /get_started | Redirected if there's no 'Cloud' Addon (even on Complete) | | Dashboards routes | OK | Redirected to /get_started | | | Exceptions routes | OK | Upselling | Upselling has priority over redirection | | Explore routes | OK | Redirected to /get_started | | | Investigations routes | OK | Redirected to /get_started | | | Notes routes | OK | Not Working | Should be redirected to get_started - TBC... | | Overview routes | OK | Redirected to /get_started | | | Timelines routes | OK | Redirected to /get_started | | ## Question: <img width="1227" alt="Screenshot 2025-04-24 at 15 20 52" src="https://github.com/user-attachments/assets/a57936b9-e954-43d8-a6d0-caf31508461c" /> Without `Cloud` Add-on - should we hide the cloud cards ? Eg. in `Complete` tier? ## Technical Details The `withSecurityRoutePageWrapper` HOC provides a consistent way to handle authorization, redirects, and page visibility across the Security Solution. This approach allows for more granular control over which pages are accessible based on user permissions and subscription tier, particularly important for the **AI for SOC** functionality. ## Testing - Verified that all Security Solution pages properly respect user permissions - Confirmed that unauthorized users are redirected appropriately Closes: elastic/security-team#12401 --------- Co-authored-by: Ash <1849116+ashokaditya@users.noreply.github.com> Co-authored-by: Ashokaditya <ashokaditya@elastic.co> (cherry picked from commit 0a5120b) # Conflicts: # x-pack/solutions/security/plugins/security_solution/public/asset_inventory/links.ts # x-pack/solutions/security/plugins/security_solution/public/asset_inventory/routes.tsx # x-pack/solutions/security/plugins/security_solution/public/cloud_security_posture/routes.tsx # x-pack/solutions/security/plugins/security_solution/public/rules/routes.tsx # x-pack/test/security_solution_cypress/cypress/e2e/ai4dsoc/navigation/navigation.cy.ts
|
Looks like this PR has a backport PR but it still hasn't been merged. Please merge it ASAP to keep the branches relatively in sync. |
5 similar comments
|
Looks like this PR has a backport PR but it still hasn't been merged. Please merge it ASAP to keep the branches relatively in sync. |
|
Looks like this PR has a backport PR but it still hasn't been merged. Please merge it ASAP to keep the branches relatively in sync. |
|
Looks like this PR has a backport PR but it still hasn't been merged. Please merge it ASAP to keep the branches relatively in sync. |
|
Looks like this PR has a backport PR but it still hasn't been merged. Please merge it ASAP to keep the branches relatively in sync. |
|
Looks like this PR has a backport PR but it still hasn't been merged. Please merge it ASAP to keep the branches relatively in sync. |
Summary
This PR implements a mechanism to control visibility and access to Security Solution pages based on user access and PLIs.
It replaces direct usage of the
SecurityRoutePageWrappercomponent with thewithSecurityRoutePageWrapperhigher-order component across multiple route files in the Security Solution plugin.Changes
cloudSecurityPostureentry to theSecurityPageNameenum indeep_links.tsSecurityRoutePageWrapperwithwithSecurityRoutePageWrapperHOC in:Question:
Technical Details
The
withSecurityRoutePageWrapperHOC provides a consistent way to handle authorization, redirects, and page visibility across the Security Solution.This approach allows for more granular control over which pages are accessible based on user permissions and subscription tier, particularly important for the AI for SOC functionality.
Testing
Closes: https://github.com/elastic/security-team/issues/12401