-
Notifications
You must be signed in to change notification settings - Fork 331
update read access to specific indices #5590
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
update read access to specific indices #5590
Conversation
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #5590 +/- ##
==========================================
- Coverage 73.12% 73.07% -0.05%
==========================================
Files 408 408
Lines 25262 25262
Branches 3843 3843
==========================================
- Hits 18473 18461 -12
- Misses 4922 4935 +13
+ Partials 1867 1866 -1 🚀 New features to boost your workflow:
|
@fen-qin please fix the code hygiene failures by ensuring that permissions are ordered alphabetically. |
891b6ce
to
1333ed9
Compare
@cwperks, tried to fix the style and ordering issue by running the following commands:
|
CI failures are caused by the disabling the old sonatype repo. SQL repo is also facing the same issue. |
actually, it looks like the artifact server is unintentionally down |
I'll raise a PR to remove old sonatype from maven repo options |
20b53f3
to
ceb5751
Compare
Signed-off-by: Fen Qin <mfenqin@amazon.com>
ceb5751
to
d218884
Compare
Description
For AOS 3.3, search relevance workbench will support OpenSearch Dashboards visualization which requires direct access to "search-relevance-experiment-results". Update the read_access to allowlist the index permission.
Issues Resolved
Is this a backport? If so, please add backport PR # and/or commits #, and remove
backport-failed
label from the original PR.Do these changes introduce new permission(s) to be displayed in the static dropdown on the front-end? If so, please open a draft PR in the security dashboards plugin and link the draft PR here
Testing
mfenqin_readaccess
roleCheck List
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.