Skip to content

Commit 67c182c

Browse files
committed
Updated privileges
Add `"maintenance"` to allow `refresh=true` option on bulk API call.
1 parent 4e9dda0 commit 67c182c

File tree

2 files changed

+7
-2
lines changed

2 files changed

+7
-2
lines changed

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@
1313
import org.elasticsearch.action.admin.indices.mapping.put.TransportPutMappingAction;
1414
import org.elasticsearch.action.admin.indices.rollover.RolloverAction;
1515
import org.elasticsearch.action.admin.indices.settings.put.TransportUpdateSettingsAction;
16+
import org.elasticsearch.action.datastreams.CreateDataStreamAction;
1617
import org.elasticsearch.xpack.core.monitoring.action.MonitoringBulkAction;
1718
import org.elasticsearch.xpack.core.security.action.apikey.InvalidateApiKeyAction;
1819
import org.elasticsearch.xpack.core.security.action.privilege.GetBuiltinPrivilegesAction;
@@ -272,6 +273,7 @@ static RoleDescriptor kibanaSystem(String name) {
272273
"read",
273274
"write",
274275
"view_index_metadata",
276+
"maintenance",
275277
RolloverAction.NAME,
276278
TransportIndicesAliasesAction.NAME,
277279
TransportPutMappingAction.TYPE.name(),

x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStoreTests.java

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -631,8 +631,6 @@ public void testKibanaSystemRole() {
631631
final IndexAbstraction indexAbstraction = mockIndexAbstraction(index);
632632
assertThat(kibanaRole.indices().allowedIndicesMatcher(RolloverAction.NAME).test(indexAbstraction), is(true));
633633
assertThat(kibanaRole.indices().allowedIndicesMatcher(TransportCreateIndexAction.TYPE.name()).test(indexAbstraction), is(true));
634-
assertThat(kibanaRole.indices().allowedIndicesMatcher(TransportSearchAction.TYPE.name()).test(indexAbstraction), is(true));
635-
assertThat(kibanaRole.indices().allowedIndicesMatcher(TransportUpdateAction.TYPE.name()).test(indexAbstraction), is(true));
636634
assertThat(kibanaRole.indices().allowedIndicesMatcher(TransportIndicesAliasesAction.NAME).test(indexAbstraction), is(true));
637635
assertThat(kibanaRole.indices().allowedIndicesMatcher(TransportPutMappingAction.TYPE.name()).test(indexAbstraction), is(true));
638636
assertThat(
@@ -643,7 +641,12 @@ public void testKibanaSystemRole() {
643641
kibanaRole.indices().allowedIndicesMatcher(TransportUpdateSettingsAction.TYPE.name()).test(indexAbstraction),
644642
is(true)
645643
);
644+
645+
// Check view_index_metadata privilege
646646
assertViewIndexMetadata(kibanaRole, index);
647+
648+
// Check read, write and maintenance privileges
649+
assertReadWriteDocsAndMaintenanceButNotDeleteIndexAllowed(kibanaRole, index + randomIntBetween(0, 5));
647650
});
648651

649652
// read-only index access, including cross cluster

0 commit comments

Comments
 (0)