Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

[beyondinsight_password_safe] Handle null password ion authentication#17411

Open
StacieClark-Elastic wants to merge 3 commits intoelastic:mainfrom
StacieClark-Elastic:beyondinsight_password_safe-handle-null-password
Open

[beyondinsight_password_safe] Handle null password ion authentication#17411
StacieClark-Elastic wants to merge 3 commits intoelastic:mainfrom
StacieClark-Elastic:beyondinsight_password_safe-handle-null-password

Conversation

@StacieClark-Elastic
Copy link
Member

@StacieClark-ElasticStacieClark-Elastic commentedFeb 13, 2026
edited
Loading

Proposed commit message

beyondinsight_password_safe: handle optional password in authentication

The BeyondInsight API does not always require a password for
authentication. The password will be null when it is not supplied.
Whether one is needed depends on the "User Password
Required" setting on the API registration in BeyondInsight. When no
password was configured, the integration failed because it assumed
the password field was always present in state.

ref:https://docs.beyondtrust.com/bips/docs/bi-cloud-configure-api

Checklist

  • I have reviewedtips for building integrations and this pull request is aligned with them.
  • [x ] I have verified that all data streams collect metrics or logs.
  • [ x] I have added an entry to my package'schangelog.yml file.
  • I have verified that Kibana version constraints are current according toguidelines.
  • I have verified that any added dashboard complies with Kibana'sDashboard good practices

@StacieClark-ElasticStacieClark-Elastic requested a review froma team as acode ownerFebruary 13, 2026 20:37
@StacieClark-ElasticStacieClark-Elastic added bugfixPull request that fixes a bug issue Team:Security-Service IntegrationsSecurity Service Integrations team [elastic/security-service-integrations] Integration:beyondinsight_password_safeBeyondInsight and Password Safe labelsFeb 13, 2026
@elasticmachine
Copy link

Pinging @elastic/security-service-integrations (Team:Security-Service Integrations)

@StacieClark-ElasticStacieClark-Elastic changed the titleHandle null password ion authentication[beyondinsight_password_safe] Handle null password ion authenticationFeb 13, 2026
@StacieClark-ElasticStacieClark-Elasticforce-pushed thebeyondinsight_password_safe-handle-null-password branch from751fd99 to49b09d2CompareFebruary 13, 2026 20:39
@elastic-vault-github-plugin-prod

🚀 Benchmarks report

To see the full report comment with/test benchmark fullreport

Copy link
Contributor

@efd6efd6 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Suggest the following commit message

beyondinsight_password_safe: handle optional password in authenticationThe BeyondInsight API does not always require a password forauthentication. Whether one is needed depends on the "User PasswordRequired" setting on the API registration in BeyondInsight. When nopassword was configured, the integration failed because it assumedthe password field was always present in state.ref: https://docs.beyondtrust.com/bips/docs/bi-cloud-configure-api

url: http://{{Hostname}}:{{Port}}/BeyondTrust/api/public/v3
apikey: test_api_key
username: testuser2
password: null
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

This has no default in the manifest, so it can be omitted here.

Suggested change
password: null

Copy link
MemberAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

The test is specifically for when the password is null. Should we ever add a default in the manifest then this test will no longer test the condition for which it is written.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

In thestate construction I think the password field should be conditionally included

{{#if password}}  password: {{escape_string password}}{{/if}}

Copy link
MemberAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

The password always exists. Sometimes it is null.

Copy link
MemberAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

I discussed this with@andrewkroh before I did the fix as I was also confused about the password existing and being null. This fix will allow users to not have to update their policies when the integration is updated.

"Authorization": [
sprintf("PS-Auth key=%s; runas=%s;", [state.apikey, state.username]) +
((state.password != "") ? (sprintf(" pwd=[%s];", [state.password])) : ""),
((state.?password.orValue("") != "") ? (sprintf(" pwd=[%s];", [state.password])) : ""),
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

With conditional rendering into the config, this becomeshas(state.password) ? …

Copy link
MemberAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

The password always exists. sometimes it is null.

@elasticmachine
Copy link

💚 Build Succeeded

History

Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@efd6efd6Awaiting requested review from efd6

At least 1 approving review is required to merge this pull request.

Assignees

No one assigned

Labels

bugfixPull request that fixes a bug issueIntegration:beyondinsight_password_safeBeyondInsight and Password SafeTeam:Security-Service IntegrationsSecurity Service Integrations team [elastic/security-service-integrations]

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

3 participants

@StacieClark-Elastic@elasticmachine@efd6

Comments


[8]ページ先頭

©2009-2026 Movatter.jp