Skip to content

Commit 4e81b75

Browse files
authored
Remove old entitlements legacy code (#131224)
1 parent 30d3877 commit 4e81b75

File tree

8 files changed

+1
-58
lines changed

8 files changed

+1
-58
lines changed

build-tools/src/main/java/org/elasticsearch/gradle/testclusters/RunTask.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -303,7 +303,6 @@ else if (node.getSettingKeys().contains("telemetry.metrics.enabled") == false) {
303303
if (cliDebug) {
304304
enableCliDebug();
305305
}
306-
enableEntitlements();
307306
}
308307

309308
@TaskAction

build-tools/src/main/java/org/elasticsearch/gradle/testclusters/TestClustersAware.java

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -88,12 +88,4 @@ default void enableCliDebug() {
8888
}
8989
}
9090
}
91-
92-
default void enableEntitlements() {
93-
for (ElasticsearchCluster cluster : getClusters()) {
94-
for (ElasticsearchNode node : cluster.getNodes()) {
95-
node.cliJvmArgs("-Des.entitlements.enabled=true");
96-
}
97-
}
98-
}
9991
}

distribution/tools/server-cli/src/main/java/org/elasticsearch/server/cli/SystemJvmOptions.java

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,6 @@
1111

1212
import org.elasticsearch.common.settings.Settings;
1313
import org.elasticsearch.common.util.concurrent.EsExecutors;
14-
import org.elasticsearch.jdk.RuntimeVersionFeature;
1514

1615
import java.io.IOException;
1716
import java.nio.file.Files;
@@ -85,7 +84,6 @@ static List<String> systemJvmOptions(Settings nodeSettings, final Map<String, St
8584
maybeSetActiveProcessorCount(nodeSettings),
8685
maybeSetReplayFile(distroType, isHotspot),
8786
maybeWorkaroundG1Bug(),
88-
maybeAllowSecurityManager(useEntitlements),
8987
maybeAttachEntitlementAgent(esHome, useEntitlements)
9088
).flatMap(s -> s).toList();
9189
}
@@ -160,14 +158,6 @@ private static Stream<String> maybeWorkaroundG1Bug() {
160158
return Stream.of();
161159
}
162160

163-
private static Stream<String> maybeAllowSecurityManager(boolean useEntitlements) {
164-
if (RuntimeVersionFeature.isSecurityManagerAvailable()) {
165-
// Will become conditional on useEntitlements once entitlements can run without SM
166-
return Stream.of("-Djava.security.manager=allow");
167-
}
168-
return Stream.of();
169-
}
170-
171161
private static Stream<String> maybeAttachEntitlementAgent(Path esHome, boolean useEntitlements) {
172162
if (useEntitlements == false) {
173163
return Stream.empty();
@@ -191,7 +181,6 @@ private static Stream<String> maybeAttachEntitlementAgent(Path esHome, boolean u
191181
// into java.base, we must export the bridge from java.base to these modules, as a comma-separated list
192182
String modulesContainingEntitlementInstrumentation = "java.logging,java.net.http,java.naming,jdk.net";
193183
return Stream.of(
194-
"-Des.entitlements.enabled=true",
195184
"-XX:+EnableDynamicAgentLoading",
196185
"-Djdk.attach.allowAttachSelf=true",
197186
"--patch-module=java.base=" + bridgeJar,

libs/core/src/main/java/org/elasticsearch/jdk/RuntimeVersionFeature.java

Lines changed: 0 additions & 18 deletions
This file was deleted.

libs/entitlement/qa/src/javaRestTest/java/org/elasticsearch/entitlement/qa/EntitlementsTestRule.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,6 @@ protected void before() throws Throwable {
8383
cluster = ElasticsearchCluster.local()
8484
.module("entitled", spec -> buildEntitlements(spec, "org.elasticsearch.entitlement.qa.entitled", ENTITLED_POLICY))
8585
.module(ENTITLEMENT_TEST_PLUGIN_NAME, spec -> setupEntitlements(spec, modular, policyBuilder))
86-
.systemProperty("es.entitlements.enabled", "true")
8786
.systemProperty("es.entitlements.verify_bytecode", "true")
8887
.systemProperty("es.entitlements.testdir", () -> testDir.getRoot().getAbsolutePath())
8988
.systemProperties(spec -> tempDirSystemPropertyProvider.get(testDir.getRoot().toPath()))

modules/apm/src/javaRestTest/java/org/elasticsearch/telemetry/apm/ApmAgentSettingsIT.java

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,7 @@
1818
public class ApmAgentSettingsIT extends ESRestTestCase {
1919

2020
@ClassRule
21-
public static ElasticsearchCluster cluster = ElasticsearchCluster.local()
22-
.module("apm")
23-
.systemProperty("es.entitlements.enabled", "true")
24-
.build();
21+
public static ElasticsearchCluster cluster = ElasticsearchCluster.local().module("apm").build();
2522

2623
@Override
2724
protected String getTestRestCluster() {

x-pack/plugin/security/qa/security-trial/src/javaRestTest/java/org/elasticsearch/xpack/security/ssl/SslEntitlementRestIT.java

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,6 @@ public class SslEntitlementRestIT extends ESRestTestCase {
3232
public static ElasticsearchCluster cluster = ElasticsearchCluster.local()
3333
.apply(SecurityOnTrialLicenseRestTestCase.commonTrialSecurityClusterConfig)
3434
.settings(settingsProvider)
35-
.systemProperty("es.entitlements.enabled", "true")
3635
.build();
3736

3837
@Override

x-pack/qa/security-example-spi-extension/src/main/java/org/elasticsearch/example/ExampleSecurityExtension.java

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,11 @@
1111
import org.elasticsearch.example.realm.CustomRealm;
1212
import org.elasticsearch.example.realm.CustomRoleMappingRealm;
1313
import org.elasticsearch.example.role.CustomInMemoryRolesProvider;
14-
import org.elasticsearch.jdk.RuntimeVersionFeature;
1514
import org.elasticsearch.xpack.core.security.SecurityExtension;
1615
import org.elasticsearch.xpack.core.security.authc.AuthenticationFailureHandler;
1716
import org.elasticsearch.xpack.core.security.authc.Realm;
1817
import org.elasticsearch.xpack.core.security.authz.store.RoleRetrievalResult;
1918

20-
import java.security.AccessController;
21-
import java.security.PrivilegedAction;
2219
import java.util.Arrays;
2320
import java.util.Collections;
2421
import java.util.HashMap;
@@ -35,17 +32,6 @@
3532
*/
3633
public class ExampleSecurityExtension implements SecurityExtension {
3734

38-
static {
39-
final boolean useEntitlements = true;
40-
if (useEntitlements == false && RuntimeVersionFeature.isSecurityManagerAvailable()) {
41-
// check that the extension's policy works.
42-
AccessController.doPrivileged((PrivilegedAction<Void>) () -> {
43-
System.getSecurityManager().checkPropertyAccess("myproperty");
44-
return null;
45-
});
46-
}
47-
}
48-
4935
@Override
5036
public String extensionName() {
5137
return "example";

0 commit comments

Comments
 (0)