d44ba28d27
When running as a node, we check the `xpack.security.transport.filter.enabled` setting to see if we should create the IPFilter but this check is not really correct. The HTTP filter could be enabled or a profile filter could be enabled so there are times when we may not be filtering connections when we should. Additionally, since we do not bind the IPFilter to a null provider, Guice will try to create one during startup to inject into the security transport. This results in an exception and startup fails. This change always creates the IPFilter when running as a node. This IPFilter has its own settings and logic to determine whether it should be filtering on a given network transport. Closes elastic/elasticsearch#3592 Original commit: elastic/x-pack-elasticsearch@95c25651c4 |
||
---|---|---|
.. | ||
bin/x-pack | ||
config/x-pack | ||
src | ||
README.asciidoc | ||
TESTING.asciidoc | ||
test-signatures.txt |
README.asciidoc
= Elasticsearch Security Plugin This plugins adds security features to elasticsearch You can build the plugin with `mvn package`. The documentation is put in the `docs/` directory.