Bump to 3.7.0-SNAPSHOT, fix security plugin compatibility, use admin cert auth for health checks#1667
Merged
ankitkala merged 2 commits intoMay 6, 2026
Conversation
fb6738a to
19aea57
Compare
d8d048b to
dac3f20
Compare
Signed-off-by: Craig Perkins <cwperx@amazon.com>
ba6c280 to
4318cdc
Compare
daff0c5 to
d3d08a7
Compare
4549666 to
3cc7039
Compare
…rate test certs with IPv6 SAN, fix admin_dn parsing, implement TransportIndicesResolvingAction for CCR metadata action, remove macOS CI Signed-off-by: Craig Perkins <cwperx@amazon.com>
3cc7039 to
02d8961
Compare
Member
Author
|
@ankitkala @krishna-ggk @soosinha @gbbafna @monusingh-1 FYI this will fix the checks. Please review when you have some time. While the admin cert change is tangential to fixing the security checks, I would like to introduce it now in the context of cwperks/security#92 which I would plan to add checks for and it would be needed to make API calls in light of security index initialization on a standby cluster. Basically in this PR it makes cluster health checks use admin cert rather then basic auth creds which is a harmless change. This also alters the certs checked into this repo to add the IPv6 loopback address as a SAN and added a document to add the steps for generating these certs. |
3 tasks
ankitkala
approved these changes
May 4, 2026
soosinha
approved these changes
May 6, 2026
mohit10011999
pushed a commit
to mohit10011999/cross-cluster-replication
that referenced
this pull request
May 9, 2026
…cert auth for health checks (opensearch-project#1667) * Bump to 3.7.0-SNAPSHOT and remove macOS CI checks Signed-off-by: Craig Perkins <cwperx@amazon.com> * Bump to 3.7.0-SNAPSHOT, use admin cert auth for health checks, regenerate test certs with IPv6 SAN, fix admin_dn parsing, implement TransportIndicesResolvingAction for CCR metadata action, remove macOS CI Signed-off-by: Craig Perkins <cwperx@amazon.com> --------- Signed-off-by: Craig Perkins <cwperx@amazon.com> Signed-off-by: Mohit Kumar <mohitamg@amazon.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Description
Bumps OpenSearch dependency from 3.6.0-SNAPSHOT to 3.7.0-SNAPSHOT and fixes compatibility issues with the security plugin introduced by core's explicit index resolution API (PR #18523).
Changes
Version bump:
opensearch_versiondefault from3.6.0-SNAPSHOTto3.7.0-SNAPSHOTFix 3.7.0 security plugin compatibility:
TransportIndicesResolvingActiononTransportUpdateMetadataActionso the security plugin can properly resolve indices for CCR's internal metadata update actionResolvedIndices{unknown=true}and conservatively assumed FLS/DLS/Field Masking restrictions applied, blocking all CCR replication actions with: "Cross Cluster Replication is not supported when FLS or DLS or Fieldmasking is activated"Admin certificate auth for health checks:
admin:admin) with admin certificate auth (kirk.pem) for cluster health checks when the security plugin is enabledjava.net.http.HttpClientwhich properly handles TLS client certificate presentation (unlikeHttpsURLConnection)plugins.security.ssl.http.clientauth_mode: OPTIONALso the server accepts client certificates during TLS handshakeRegenerated test certificates:
esnode.pem,esnode-key.pem,kirk.pem,kirk-key.pem, androot-ca.pemwith proper Subject Alternative Names including IPv6 localhost (::1), fixing hostname verification failures withjava.net.http.HttpClientFixed admin_dn parsing:
plugins.security.authcz.admin_dnfrom a plain string to a YAML list format (["CN=kirk,OU=client,O=client,L=test,C=de"])Settings.getAsList()to split the DN on commas, resulting in 5 invalid entries instead of 1 valid DNCI cleanup:
macos-latestfrom the build matrix in.github/workflows/build.ymlbin/main/andbin/test/(build output directories) to.gitignoreTesting
BasicReplicationITtests pass with security enabled (-Psecurity=true)Check List
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.
For more information on following Developer Certificate of Origin and signing off your commits, please check here.