Skip to content

Commit 1080975

Browse files
Deprecating data_frame_transforms roles
1 parent dae59da commit 1080975

File tree

8 files changed

+79
-261
lines changed

8 files changed

+79
-261
lines changed

docs/reference/rest-api/security/bulk-create-roles.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -328,7 +328,7 @@ The result would then have the `errors` field set to `true` and hold the error f
328328
"details": {
329329
"my_admin_role": { <4>
330330
"type": "action_request_validation_exception",
331-
"reason": "Validation Failed: 1: unknown cluster privilege [bad_cluster_privilege]. a privilege must be either one of the predefined cluster privilege names [manage_own_api_key,manage_data_stream_global_retention,monitor_data_stream_global_retention,none,cancel_task,cross_cluster_replication,cross_cluster_search,delegate_pki,grant_api_key,manage_autoscaling,manage_index_templates,manage_logstash_pipelines,manage_oidc,manage_saml,manage_search_application,manage_search_query_rules,manage_search_synonyms,manage_service_account,manage_token,manage_user_profile,monitor_connector,monitor_enrich,monitor_inference,monitor_ml,monitor_rollup,monitor_snapshot,monitor_stats,monitor_text_structure,monitor_watcher,post_behavioral_analytics_event,read_ccr,read_connector_secrets,read_fleet_secrets,read_ilm,read_pipeline,read_security,read_slm,transport_client,write_connector_secrets,write_fleet_secrets,create_snapshot,manage_behavioral_analytics,manage_ccr,manage_connector,manage_enrich,manage_ilm,manage_inference,manage_ml,manage_rollup,manage_slm,manage_watcher,monitor_data_frame_transforms,monitor_transform,manage_api_key,manage_ingest_pipelines,manage_pipeline,manage_data_frame_transforms,manage_transform,manage_security,monitor,manage,all] or a pattern over one of the available cluster actions;"
331+
"reason": "Validation Failed: 1: unknown cluster privilege [bad_cluster_privilege]. a privilege must be either one of the predefined cluster privilege names [manage_own_api_key,manage_data_stream_global_retention,monitor_data_stream_global_retention,none,cancel_task,cross_cluster_replication,cross_cluster_search,delegate_pki,grant_api_key,manage_autoscaling,manage_index_templates,manage_logstash_pipelines,manage_oidc,manage_saml,manage_search_application,manage_search_query_rules,manage_search_synonyms,manage_service_account,manage_token,manage_user_profile,monitor_connector,monitor_enrich,monitor_inference,monitor_ml,monitor_rollup,monitor_snapshot,monitor_stats,monitor_text_structure,monitor_watcher,post_behavioral_analytics_event,read_ccr,read_connector_secrets,read_fleet_secrets,read_ilm,read_pipeline,read_security,read_slm,transport_client,write_connector_secrets,write_fleet_secrets,create_snapshot,manage_behavioral_analytics,manage_ccr,manage_connector,manage_enrich,manage_ilm,manage_inference,manage_ml,manage_rollup,manage_slm,manage_watcher,monitor_transform,manage_api_key,manage_ingest_pipelines,manage_pipeline,manage_transform,manage_security,monitor,manage,all] or a pattern over one of the available cluster actions;"
332332
}
333333
}
334334
}

docs/reference/rest-api/security/get-builtin-privileges.asciidoc

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,6 @@ A successful call returns an object with "cluster", "index", and "remote_cluster
7878
"manage_behavioral_analytics",
7979
"manage_ccr",
8080
"manage_connector",
81-
"manage_data_frame_transforms",
8281
"manage_data_stream_global_retention",
8382
"manage_enrich",
8483
"manage_ilm",
@@ -104,7 +103,6 @@ A successful call returns an object with "cluster", "index", and "remote_cluster
104103
"manage_watcher",
105104
"monitor",
106105
"monitor_connector",
107-
"monitor_data_frame_transforms",
108106
"monitor_data_stream_global_retention",
109107
"monitor_enrich",
110108
"monitor_inference",

docs/reference/security/authorization/built-in-roles.asciidoc

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -33,18 +33,6 @@ suitable for writing beats output to {es}.
3333

3434
--
3535

36-
[[built-in-roles-data-frame-transforms-admin]] `data_frame_transforms_admin` ::
37-
Grants `manage_data_frame_transforms` cluster privileges, which enable you to
38-
manage {transforms}. This role also includes all
39-
{kibana-ref}/kibana-privileges.html[Kibana privileges] for the {ml-features}.
40-
deprecated:[7.5.0,"Replaced by <<built-in-roles-transform-admin,`transform_admin`>>"].
41-
42-
[[built-in-roles-data-frame-transforms-user]] `data_frame_transforms_user` ::
43-
Grants `monitor_data_frame_transforms` cluster privileges, which enable you to
44-
use {transforms}. This role also includes all
45-
{kibana-ref}/kibana-privileges.html[Kibana privileges] for the {ml-features}.
46-
deprecated:[7.5.0,"Replaced by <<built-in-roles-transform-user,`transform_user`>>"].
47-
4836
[[built-in-roles-editor]] `editor` ::
4937

5038
Grants full access to all features in {kib} (including Solutions) and read-only access to data indices.

docs/reference/security/authorization/privileges.asciidoc

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -95,12 +95,6 @@ only on clusters that contain follower indices.
9595
+
9696
This privilege is not available in {serverless-full}.
9797

98-
`manage_data_frame_transforms`::
99-
All operations related to managing {transforms}.
100-
deprecated[7.5] Use `manage_transform` instead.
101-
+
102-
This privilege is not available in {serverless-full}.
103-
10498
`manage_data_stream_global_retention`::
10599
This privilege has no effect.deprecated[8.16]
106100

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/privilege/ClusterPrivilegeResolver.java

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -234,10 +234,6 @@ public class ClusterPrivilegeResolver {
234234
MONITOR_INFERENCE_PATTERN
235235
);
236236
public static final NamedClusterPrivilege MONITOR_ML = new ActionClusterPrivilege("monitor_ml", MONITOR_ML_PATTERN);
237-
public static final NamedClusterPrivilege MONITOR_TRANSFORM_DEPRECATED = new ActionClusterPrivilege(
238-
"monitor_data_frame_transforms",
239-
MONITOR_TRANSFORM_PATTERN
240-
);
241237
public static final NamedClusterPrivilege MONITOR_TEXT_STRUCTURE = new ActionClusterPrivilege(
242238
"monitor_text_structure",
243239
MONITOR_TEXT_STRUCTURE_PATTERN
@@ -253,10 +249,6 @@ public class ClusterPrivilegeResolver {
253249
public static final NamedClusterPrivilege MANAGE = new ActionClusterPrivilege("manage", ALL_CLUSTER_PATTERN, ALL_SECURITY_PATTERN);
254250
public static final NamedClusterPrivilege MANAGE_INFERENCE = new ActionClusterPrivilege("manage_inference", MANAGE_INFERENCE_PATTERN);
255251
public static final NamedClusterPrivilege MANAGE_ML = new ActionClusterPrivilege("manage_ml", MANAGE_ML_PATTERN);
256-
public static final NamedClusterPrivilege MANAGE_TRANSFORM_DEPRECATED = new ActionClusterPrivilege(
257-
"manage_data_frame_transforms",
258-
MANAGE_TRANSFORM_PATTERN
259-
);
260252
public static final NamedClusterPrivilege MANAGE_TRANSFORM = new ActionClusterPrivilege("manage_transform", MANAGE_TRANSFORM_PATTERN);
261253
public static final NamedClusterPrivilege MANAGE_TOKEN = new ActionClusterPrivilege("manage_token", MANAGE_TOKEN_PATTERN);
262254
public static final NamedClusterPrivilege MANAGE_WATCHER = new ActionClusterPrivilege("manage_watcher", MANAGE_WATCHER_PATTERN);
@@ -426,7 +418,6 @@ public class ClusterPrivilegeResolver {
426418
MONITOR_INFERENCE,
427419
MONITOR_ML,
428420
MONITOR_TEXT_STRUCTURE,
429-
MONITOR_TRANSFORM_DEPRECATED,
430421
MONITOR_TRANSFORM,
431422
MONITOR_WATCHER,
432423
MONITOR_ROLLUP,
@@ -436,7 +427,6 @@ public class ClusterPrivilegeResolver {
436427
MANAGE_CONNECTOR,
437428
MANAGE_INFERENCE,
438429
MANAGE_ML,
439-
MANAGE_TRANSFORM_DEPRECATED,
440430
MANAGE_TRANSFORM,
441431
MANAGE_TOKEN,
442432
MANAGE_WATCHER,

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStore.java

Lines changed: 0 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -519,70 +519,6 @@ private static Map<String, RoleDescriptor> initializeReservedRoles() {
519519
+ "and roles that grant access to Kibana."
520520
)
521521
),
522-
// DEPRECATED: to be removed in 9.0.0
523-
entry(
524-
"data_frame_transforms_admin",
525-
new RoleDescriptor(
526-
"data_frame_transforms_admin",
527-
new String[] { "manage_data_frame_transforms" },
528-
new RoleDescriptor.IndicesPrivileges[] {
529-
RoleDescriptor.IndicesPrivileges.builder()
530-
.indices(
531-
TransformInternalIndexConstants.AUDIT_INDEX_PATTERN,
532-
TransformInternalIndexConstants.AUDIT_INDEX_PATTERN_DEPRECATED,
533-
TransformInternalIndexConstants.AUDIT_INDEX_READ_ALIAS
534-
)
535-
.privileges("view_index_metadata", "read")
536-
.build() },
537-
new RoleDescriptor.ApplicationResourcePrivileges[] {
538-
RoleDescriptor.ApplicationResourcePrivileges.builder()
539-
.application("kibana-*")
540-
.resources("*")
541-
.privileges("reserved_ml_user")
542-
.build() },
543-
null,
544-
null,
545-
MetadataUtils.getDeprecatedReservedMetadata("Please use the [transform_admin] role instead"),
546-
null,
547-
null,
548-
null,
549-
null,
550-
"Grants manage_data_frame_transforms cluster privileges, which enable you to manage transforms. "
551-
+ "This role also includes all Kibana privileges for the machine learning features."
552-
)
553-
),
554-
// DEPRECATED: to be removed in 9.0.0
555-
entry(
556-
"data_frame_transforms_user",
557-
new RoleDescriptor(
558-
"data_frame_transforms_user",
559-
new String[] { "monitor_data_frame_transforms" },
560-
new RoleDescriptor.IndicesPrivileges[] {
561-
RoleDescriptor.IndicesPrivileges.builder()
562-
.indices(
563-
TransformInternalIndexConstants.AUDIT_INDEX_PATTERN,
564-
TransformInternalIndexConstants.AUDIT_INDEX_PATTERN_DEPRECATED,
565-
TransformInternalIndexConstants.AUDIT_INDEX_READ_ALIAS
566-
)
567-
.privileges("view_index_metadata", "read")
568-
.build() },
569-
new RoleDescriptor.ApplicationResourcePrivileges[] {
570-
RoleDescriptor.ApplicationResourcePrivileges.builder()
571-
.application("kibana-*")
572-
.resources("*")
573-
.privileges("reserved_ml_user")
574-
.build() },
575-
null,
576-
null,
577-
MetadataUtils.getDeprecatedReservedMetadata("Please use the [transform_user] role instead"),
578-
null,
579-
null,
580-
null,
581-
null,
582-
"Grants monitor_data_frame_transforms cluster privileges, which enable you to use transforms. "
583-
+ "This role also includes all Kibana privileges for the machine learning features. "
584-
)
585-
),
586522
entry(
587523
"transform_admin",
588524
new RoleDescriptor(

0 commit comments

Comments
 (0)