Skip to content

Conversation

tvernum
Copy link
Contributor

@tvernum tvernum commented Jun 11, 2025

This adds a new patch level TransportVersion in preparation for backporting #128805

This adds a new patch level TransportVersion in preparation for backporting elastic#128805
@tvernum tvernum requested a review from slobodanadamovic June 11, 2025 02:32
@tvernum tvernum added >non-issue :Security/IdentityProvider Identity Provider (SSO) project in X-Pack v8.19.0 v9.1.0 labels Jun 11, 2025
@elasticsearchmachine elasticsearchmachine added the Team:Security Meta label for security team label Jun 11, 2025
@elasticsearchmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

doc1.attributeNames.setName("urn:" + randomAlphaOfLengthBetween(4, 8) + "." + randomAlphaOfLengthBetween(4, 8));
doc1.attributeNames.setRoles("urn:" + randomAlphaOfLengthBetween(4, 8) + "." + randomAlphaOfLengthBetween(4, 8));
doc1.attributeNames.setExtensions(
randomList(0, 3, () -> "urn:" + randomAlphaOfLengthBetween(4, 8) + "." + randomAlphaOfLengthBetween(4, 8))
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The testStreamRoundTripWithAllFields now fails randomly in assertToXContentEquivalent. The problem seem to be with the ordering of extensions items:

java.lang.AssertionError: Error when comparing xContent. acs: same [https://cEtrLOYX.LakSo/saml/acs] attributes: email: same [urn:hAVRt.inLOJA] extensions: 0: expected String [urn:pDeptYdD.rehxgHP] but was String [urn:BeZmekTl.QhNbhUns] 1: expected String [urn:BeZmekTl.QhNbhUns] but was String [urn:pDeptYdD.rehxgHP] 
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think I'll just make it a single element then.

@tvernum tvernum requested a review from slobodanadamovic June 13, 2025 06:09
Copy link
Contributor

@slobodanadamovic slobodanadamovic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 👍

@tvernum tvernum merged commit efca20e into elastic:main Jun 13, 2025
23 checks passed
elasticsearchmachine pushed a commit that referenced this pull request Jun 16, 2025
This extends the change from #128176 to validate the "custom attributes" on a per Service Provider basis. Each Service Provider (whether registered or wildcard based) has a field "attributes.extensions" which is a list of attribute names that may be provided by the caller of "/_idp/saml/init". Service Providers that have not be configured with extension attributes will reject any custom attributes in SAML init. This necessitates a new field in the service provider index (but only if the new `extensions` attribute is set). The template has been updated, but there is no data migration because the `saml-service-provider` index does not exist in any of the environments into which we wish to deploy this change. Backport of: #128805, #129233
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

>non-issue :Security/IdentityProvider Identity Provider (SSO) project in X-Pack Team:Security Meta label for security team v8.19.0 v9.1.0

3 participants