[GRPC] Add accessUnixDomainSocket permission for transport-grpc#20463
[GRPC] Add accessUnixDomainSocket permission for transport-grpc#20463cwperks merged 6 commits intoopensearch-project:mainfrom
Conversation
|
Important Review skippedAuto incremental reviews are disabled on this repository. Please check the settings in the CodeRabbit UI or the You can disable this status message by setting the
📝 WalkthroughWalkthroughThe pull request adds a new security permission in the transport-grpc module's security policy to enable Unix domain socket access, with a corresponding changelog entry documenting this addition. Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~3 minutes 🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing touches🧪 Generate unit tests (beta)
Comment |
6d77a97 to
3bdc3ca
Compare
java.io.tmpdir
java.io.tmpdir 3bdc3ca to
1c2f653
Compare
Signed-off-by: Karen X <karenxyr@gmail.com>
1c2f653 to
469842f
Compare
java.io.tmpdir
java.io.tmpdir Signed-off-by: Karen X <karenxyr@gmail.com>
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #20463 +/- ##
============================================
+ Coverage 73.25% 73.28% +0.03%
- Complexity 72103 72147 +44
============================================
Files 5798 5798
Lines 329732 329732
Branches 47519 47519
============================================
+ Hits 241554 241653 +99
+ Misses 68805 68712 -93
+ Partials 19373 19367 -6 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
modules/transport-grpc/src/main/plugin-metadata/plugin-security.policy
Outdated
Show resolved
Hide resolved
Sincere apologies @cwperks @karenyrx , somehow missed it: yes, we treat |
…y.policy Co-authored-by: Andriy Redko <drreta@gmail.com> Signed-off-by: Karen X <karenxyr@gmail.com>
Signed-off-by: Karen X <karenxyr@gmail.com>
|
❕ Gradle check result for 7d44eed: UNSTABLE Please review all flaky tests that succeeded after retry and create an issue if one does not already exist to track the flaky failure. |
Signed-off-by: Karen X <karenxyr@gmail.com>
|
❗ AI-powered Code-Diff-Analyzer found issues on commit 241ec5a.
The table above displays the top 10 most important findings. Pull Requests Author(s): Please update your Pull Request according to the report above. Repository Maintainer(s): You can Thanks. |
Signed-off-by: Karen X <karenxyr@gmail.com>
|
❗ AI-powered Code-Diff-Analyzer found issues on commit 53adec5.
The table above displays the top 10 most important findings. Pull Requests Author(s): Please update your Pull Request according to the report above. Repository Maintainer(s): You can Thanks. |
|
❌ Gradle check result for 53adec5: FAILURE Please examine the workflow log, locate, and copy-paste the failure(s) below, then iterate to green. Is the failure a flaky test unrelated to your change? |
|
❕ Gradle check result for 53adec5: UNSTABLE Please review all flaky tests that succeeded after retry and create an issue if one does not already exist to track the flaky failure. |
…search-project#20463) * [GRPC] Add security policy for transport-grpc Signed-off-by: Karen X <karenxyr@gmail.com> * more granular Signed-off-by: Karen X <karenxyr@gmail.com> * Update modules/transport-grpc/src/main/plugin-metadata/plugin-security.policy Co-authored-by: Andriy Redko <drreta@gmail.com> Signed-off-by: Karen X <karenxyr@gmail.com> * update changelog Signed-off-by: Karen X <karenxyr@gmail.com> --------- Signed-off-by: Karen X <karenxyr@gmail.com> Co-authored-by: Andriy Redko <drreta@gmail.com>
…search-project#20463) * [GRPC] Add security policy for transport-grpc Signed-off-by: Karen X <karenxyr@gmail.com> * more granular Signed-off-by: Karen X <karenxyr@gmail.com> * Update modules/transport-grpc/src/main/plugin-metadata/plugin-security.policy Co-authored-by: Andriy Redko <drreta@gmail.com> Signed-off-by: Karen X <karenxyr@gmail.com> * update changelog Signed-off-by: Karen X <karenxyr@gmail.com> --------- Signed-off-by: Karen X <karenxyr@gmail.com> Co-authored-by: Andriy Redko <drreta@gmail.com>
Description
The Hybrid search gRPC integration test on Windows is failing with:
Notably the
deleteIfExistsandD:\a\neural-search\neural-search\build\testclusters\integTest-0\tmp\socket_1511921991part, which indicates delete permissions are denied for tmp files created by the integration testThis issue is Windows-specific because:
EpollSelectorProviderwhich doesn't create temporary filesWEPollSelectorProvider→PipeImpl→ creates temp files for IPCThis PR allows Netty to delete temporary socket files in
java.io.tmpdir.Since we havent seen an error for create, read, or write yet, I have not added those in this PR, to follow principle of least privilege, but those could be needed in the future as well.
Related Issues
opensearch-project/neural-search#1723
Check List
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.