Skip to content

Commit 78c49a6

Browse files
author
elasticsearchmachine
committed
[CI] Auto commit changes from spotless
1 parent fe1fb47 commit 78c49a6

File tree

2 files changed

+5
-21
lines changed

2 files changed

+5
-21
lines changed

x-pack/plugin/core/src/main/java/org/elasticsearch/xpack/core/security/authz/store/KibanaOwnedReservedRoleDescriptors.java

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -524,10 +524,7 @@ static RoleDescriptor kibanaSystem(String name) {
524524
// For ExtraHop and QualysGAV specific actions. Kibana reads, writes and manages this index
525525
// for configured ILM policies.
526526
RoleDescriptor.IndicesPrivileges.builder()
527-
.indices(
528-
"logs-extrahop.investigation-*",
529-
"logs-qualys_gav.asset-*"
530-
)
527+
.indices("logs-extrahop.investigation-*", "logs-qualys_gav.asset-*")
531528
.privileges(
532529
"manage",
533530
"create_index",

x-pack/plugin/core/src/test/java/org/elasticsearch/xpack/core/security/authz/store/ReservedRolesStoreTests.java

Lines changed: 4 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1909,15 +1909,9 @@ public void testKibanaSystemRole() {
19091909

19101910
// Assert Index Management Actions (Allowed by "create_index", "delete_index", and "manage")
19111911
// Allowed by the explicit "create_index" privilege
1912-
assertThat(
1913-
kibanaRole.indices().allowedIndicesMatcher(TransportCreateIndexAction.TYPE.name()).test(indexAbstraction),
1914-
is(true)
1915-
);
1912+
assertThat(kibanaRole.indices().allowedIndicesMatcher(TransportCreateIndexAction.TYPE.name()).test(indexAbstraction), is(true));
19161913
// Allowed by the explicit TransportDeleteIndexAction
1917-
assertThat(
1918-
kibanaRole.indices().allowedIndicesMatcher(TransportDeleteIndexAction.TYPE.name()).test(indexAbstraction),
1919-
is(true)
1920-
);
1914+
assertThat(kibanaRole.indices().allowedIndicesMatcher(TransportDeleteIndexAction.TYPE.name()).test(indexAbstraction), is(true));
19211915

19221916
// Assert ILM Actions (Allowed by "manage" and explicit transport actions)
19231917
// Allowed due to the "manage" privilege and explicit TransportUpdateSettingsAction
@@ -1926,19 +1920,12 @@ public void testKibanaSystemRole() {
19261920
is(true)
19271921
);
19281922
// Allowed due to the "manage" privilege and explicit TransportAutoPutMappingAction
1929-
assertThat(
1930-
kibanaRole.indices().allowedIndicesMatcher(TransportPutMappingAction.TYPE.name()).test(indexAbstraction),
1931-
is(true)
1932-
);
1923+
assertThat(kibanaRole.indices().allowedIndicesMatcher(TransportPutMappingAction.TYPE.name()).test(indexAbstraction), is(true));
19331924
// Allowed due to the explicit TransportIndicesAliasesAction
1934-
assertThat(
1935-
kibanaRole.indices().allowedIndicesMatcher(TransportIndicesAliasesAction.NAME).test(indexAbstraction),
1936-
is(true)
1937-
);
1925+
assertThat(kibanaRole.indices().allowedIndicesMatcher(TransportIndicesAliasesAction.NAME).test(indexAbstraction), is(true));
19381926
// Rollover requires 'manage' on the alias and 'create_index', both of which are granted.
19391927
assertThat(kibanaRole.indices().allowedIndicesMatcher(RolloverAction.NAME).test(indexAbstraction), is(true));
19401928

1941-
19421929
// Assert Denied Actions
19431930
// This role should not have cross-cluster permissions on these indices
19441931
assertThat(kibanaRole.indices().allowedIndicesMatcher(READ_CROSS_CLUSTER_NAME).test(indexAbstraction), is(false));

0 commit comments

Comments
 (0)