-
Notifications
You must be signed in to change notification settings - Fork 8.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Encrypted Saved Objects can be partially updated and cause AAD issues #50256
Comments
Pinging @elastic/kibana-stack-services (Team:Stack Services) |
hmm not sure... tbh this feels like a Security team issue, not an Alerting one 🤔 |
Yeah let's leave open for now. I'll re-label as a security team issue |
Pinging @elastic/kibana-security (Team:Security) |
Thanks @legrego, I've updated the title and description to better reflect the problem. |
I just want to note a use case we have in Alerting: There are times when we need to partially update fields - such as situation where we don't want to have to decrypt the encrypted fields (if, for example, we know that encryption has broken and want to mark this SO somehow). Ideally for us the type system could somehow allow us to either update non AAD fields or the whole object, but never partially update a field that's part of AAD. We're happy for this to be enforced through generics or something like that (so it wouldn't necessarily throw, but it would mean that if anyone wanted to break it they would have to go out of their way to cheat the compiler - in which case, they are taking responsibility for breaking things. |
Situation might have changed since this issue was open: Because of BWC reasons, we are now performing a "client-side" update for the SOR update and bulkUpdate operations, meaning that we are resolving the current document, updating the attributes, then re-indexing the whole result. Which means, we have the whole set of attributes during an update, so we could use the current attributes for any encryption/AAD recomputation we may need, even in case of partial updates. Not sure if this could be achieved in the current state of the code, or if it would required ESO to be integrated directly into the SOR (as we've been discussing for some time now). |
For the alerting team, this is no longer an issue as we moved to using |
I don't know, I really think we need to check in with @gmmorris first. |
Bin it. |
Agreed, I think we're all done here ✅ |
💚 I miss you folks |
Good thing we were here @legrego, who know what you would have got to up to otherwise 😉 (miss you too 💚) |
Miss y'all too! Hope everyone is well 😎 :elastic-heart: :alex-approved: |
Well well well, here we are again with @gmmorris and @alexfrancoeur debating priorities 😆 |
I can't believe you kept that @mikecote 💚 |
Bahahha that's amazing. I'll defer to @pgayvallet here, but according to @mikecote the alerting team is all set. Feels like we could close this out for now. I also intend to continue to provide extremely valuable input like this on other random Kibana issues when it makes sense 😊 We should hop on a zoom soon and catch up! |
Yes! |
The spam is strong with those ones |
@mikecote Looks like it was recently discussed this summer, but can this be closed now that the SOR update function includes a get prior to updating? |
@jeramysoucy yup, since the SOR performs an |
Closing - resolved by changes to SOR update, which now gets the raw SO doc before applying incoming attribute changes. |
The alerting team has been caught a few times updating encrypted attributes while forgetting to provide all the values for AAD. This issue would be to enhance this developer experience when such scenario is encountered.
The alerting team is still planning to leverage partial updates to update attributes excluded from AAD (see: #76830).
Original description
Fix ESO to not do partial update. See: https://github.com//pull/40694#pullrequestreview-261268183
The text was updated successfully, but these errors were encountered: