-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Cloud Security] Added 'x-elastic-internal-origin' to agentless axios request headers for Kibana 9.0 #203188
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I moved the error handling tests to a secluded describe
section in this file.
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
💛 Build succeeded, but was flaky
Failed CI StepsMetrics [docs]
cc @seanrathier |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
code LGTM 🚀
Pinging @elastic/fleet (Team:Fleet) |
Starting backport for target branches: 8.x |
… request headers for Kibana 9.0 (elastic#203188) (cherry picked from commit e08d712)
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation |
… agentless axios request headers for Kibana 9.0 (#203188) (#203332) # Backport This will backport the following commits from `main` to `8.x`: - [[Cloud Security] Added 'x-elastic-internal-origin' to agentless axios request headers for Kibana 9.0 (#203188)](#203188) <!--- Backport version: 9.4.3 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sqren/backport) <!--BACKPORT [{"author":{"name":"seanrathier","email":"[email protected]"},"sourceCommit":{"committedDate":"2024-12-06T19:21:42Z","message":"[Cloud Security] Added 'x-elastic-internal-origin' to agentless axios request headers for Kibana 9.0 (#203188)","sha":"e08d7126eb57dfa18a8607df7244a63caacc0bfc","branchLabelMapping":{"^v9.0.0$":"main","^v8.18.0$":"8.x","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:skip","Team:Fleet","v9.0.0","Team:Cloud Security","backport:prev-minor","8.18 candidate"],"title":"[Cloud Security] Added 'x-elastic-internal-origin' to agentless axios request headers for Kibana 9.0","number":203188,"url":"https://github.com/elastic/kibana/pull/203188","mergeCommit":{"message":"[Cloud Security] Added 'x-elastic-internal-origin' to agentless axios request headers for Kibana 9.0 (#203188)","sha":"e08d7126eb57dfa18a8607df7244a63caacc0bfc"}},"sourceBranch":"main","suggestedTargetBranches":[],"targetPullRequestStates":[{"branch":"main","label":"v9.0.0","branchLabelMappingKey":"^v9.0.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/203188","number":203188,"mergeCommit":{"message":"[Cloud Security] Added 'x-elastic-internal-origin' to agentless axios request headers for Kibana 9.0 (#203188)","sha":"e08d7126eb57dfa18a8607df7244a63caacc0bfc"}}]}] BACKPORT--> Co-authored-by: seanrathier <[email protected]>
… request headers for Kibana 9.0 (elastic#203188)
… request headers for Kibana 9.0 (elastic#203188)
… request headers for Kibana 9.0 (elastic#203188)
… request headers for Kibana 9.0 (elastic#203188)
… request headers for Kibana 9.0 (elastic#203188)
… request headers for Kibana 9.0 (elastic#203188)
… request headers for Kibana 9.0 (elastic#203188)
Summary
Kibana 9.0 requires all request made with
axios
have the request headerx-elastic-internal-origin
set toKibana
to avoid appearing as an “external” integration. Any requests without it will be blocked in Kibana 9.0Checklist
Reviewers should verify this PR satisfies this list as well.