Skip to content

Conversation

tvernum
Copy link
Contributor

@tvernum tvernum commented Jun 20, 2025

With the introduction of entitlements (#120243) and exclusive file access (#123087) it is no longer safe to watch a whole directory.

In a lot of deployments, the parent directory for SSL config files will be the main config directory, which also contains exclusive files such as SAML realm metadata or File realm users. Watching that directory will cause entitlement warnings because it is not permissible for core/ssl-config to read files that are exclusively owned by the security module (or other modules)

With the introduction of entitlements (elastic#120243) and exclusive file access (elastic#123087) it is no longer safe to watch a whole directory. In a lot of deployments, the parent directory for SSL config files will be the main config directory, which also contains exclusive files such as SAML realm metadata or File realm users. Watching that directory will cause entitlement warnings because it is not permissible for core/ssl-config to read files that are exclusively owned by the security module (or other modules)
@tvernum tvernum added the :Security/TLS SSL/TLS, Certificates label Jun 20, 2025
@tvernum tvernum requested a review from slobodanadamovic June 24, 2025 05:55
@tvernum tvernum marked this pull request as ready for review June 24, 2025 05:55
@elasticsearchmachine
Copy link
Collaborator

Pinging @elastic/es-security (Team:Security)

@elasticsearchmachine elasticsearchmachine added the Team:Security Meta label for security team label Jun 24, 2025
@tvernum tvernum added >bug and removed Team:Security Meta label for security team labels Jun 24, 2025
@elasticsearchmachine
Copy link
Collaborator

Hi @tvernum, I've created a changelog YAML for you.

@elasticsearchmachine elasticsearchmachine added the Team:Security Meta label for security team label Jun 24, 2025
Copy link
Contributor

@slobodanadamovic slobodanadamovic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 👍

@tvernum tvernum enabled auto-merge (squash) June 25, 2025 04:43
@tvernum tvernum added auto-backport Automatically create backport pull requests when merged v8.19.0 labels Jun 25, 2025
@tvernum tvernum merged commit 8b62a55 into elastic:main Jun 25, 2025
38 checks passed
@elasticsearchmachine
Copy link
Collaborator

💚 Backport successful

Status Branch Result
8.19
elasticsearchmachine pushed a commit that referenced this pull request Jun 25, 2025
With the introduction of entitlements (#120243) and exclusive file access (#123087) it is no longer safe to watch a whole directory. In a lot of deployments, the parent directory for SSL config files will be the main config directory, which also contains exclusive files such as SAML realm metadata or File realm users. Watching that directory will cause entitlement warnings because it is not permissible for core/ssl-config to read files that are exclusively owned by the security module (or other modules)
mridula-s109 pushed a commit to mridula-s109/elasticsearch that referenced this pull request Jun 25, 2025
With the introduction of entitlements (elastic#120243) and exclusive file access (elastic#123087) it is no longer safe to watch a whole directory. In a lot of deployments, the parent directory for SSL config files will be the main config directory, which also contains exclusive files such as SAML realm metadata or File realm users. Watching that directory will cause entitlement warnings because it is not permissible for core/ssl-config to read files that are exclusively owned by the security module (or other modules)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

auto-backport Automatically create backport pull requests when merged >bug :Security/TLS SSL/TLS, Certificates Team:Security Meta label for security team v8.19.0 v9.1.0

3 participants