Point in Time should handle security on aliases #61547
Labels
>docs
General docs changes
:Search/Search
Search-related issues that do not fall into other categories
:Security/Authorization
Roles, Privileges, DLS/FLS, RBAC/ABAC
Team:Docs
Meta label for docs team
Team:Search
Meta label for search team
Team:Security
Meta label for security team
In #61062 we introduced a new feature called PIT that allows to reuse the same context on multiple queries.
We've decided to merge the feature in advance but there is still one thing that we need to fix/decide. The PIT relies on the concrete index names that were resolved when the PIT was created. That allows to keep the scope of a PIT to only indices that existed when the PIT was created but that makes the security on aliases more challenging. Today we allow aliases to have different permissions than their targeted indices. Even though this feature is deprecated in security at the moment, it is unclear if we'll remove it in the future. So for PIT, we've decided to disallow the creation if an alias with a different permission is used in the creation request. This issue is a placeholder to ensure that we implement this protection before
7.10
.That should be temporary until the @elastic/es-security team revises the plan to un-deprecate or to remove this problematic use case definitely. If the decision is to un-deprecate we'll of course need to support the use case in PIT but that decision can wait after
7.10
is released.The text was updated successfully, but these errors were encountered: