Skip to content

Conversation

@gmjehovich
Copy link
Contributor

Backport of #128532

…#128532)

This PR addresses the bug reported in
[elastic#127496](elastic#127496)

**Changes:** - Added validation logic in `ConfigurableClusterPrivileges`
to ensure privileges defined for a global cluster manage role privilege
are valid  - Added unit test to `ManageRolePrivilegesTest` to ensure
invalid privilege is caught during role creation - Updated
`BulkPutRoleRestIT` to assert that an error is thrown and that the role
is not created.

Both existing and new unit/integration tests passed locally.
@gmjehovich gmjehovich added >bug :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC backport Team:Security Meta label for security team v9.0.2 labels Jun 3, 2025
@gmjehovich gmjehovich requested a review from jfreden June 3, 2025 16:21
@gmjehovich
Copy link
Contributor Author

@jfreden On the original PR, I used another function ( IndexPrivilege.resolveBySelectorAccess() )- but that didn't exist on this branch. I saw this IndexPrivilege.get() function essentially does the same thing, so I wanted to make sure I could use it interchangeably.

Copy link
Contributor

@slobodanadamovic slobodanadamovic left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 👍

Since you are planing to backport the fix to 8.18 and 8.17 branches, I suggest you label this PR auto-backport and add appropriate version labels. This way you wont need to do it manually.

@gmjehovich gmjehovich added auto-backport Automatically create backport pull requests when merged v8.18.3 v8.17.8 labels Jun 9, 2025
@gmjehovich gmjehovich merged commit 96df3a9 into elastic:9.0 Jun 9, 2025
21 checks passed
@elasticsearchmachine
Copy link
Collaborator

💚 Backport successful

Status Branch Result
8.17
8.18

gmjehovich added a commit to gmjehovich/elasticsearch that referenced this pull request Jun 9, 2025
…elastic#128847)

This PR addresses the bug reported in
[elastic#127496](elastic#127496)

**Changes:** - Added validation logic in `ConfigurableClusterPrivileges`
to ensure privileges defined for a global cluster manage role privilege
are valid  - Added unit test to `ManageRolePrivilegesTest` to ensure
invalid privilege is caught during role creation - Updated
`BulkPutRoleRestIT` to assert that an error is thrown and that the role
is not created.

Both existing and new unit/integration tests passed locally.
gmjehovich added a commit to gmjehovich/elasticsearch that referenced this pull request Jun 9, 2025
…elastic#128847)

This PR addresses the bug reported in
[elastic#127496](elastic#127496)

**Changes:** - Added validation logic in `ConfigurableClusterPrivileges`
to ensure privileges defined for a global cluster manage role privilege
are valid  - Added unit test to `ManageRolePrivilegesTest` to ensure
invalid privilege is caught during role creation - Updated
`BulkPutRoleRestIT` to assert that an error is thrown and that the role
is not created.

Both existing and new unit/integration tests passed locally.
elasticsearchmachine pushed a commit that referenced this pull request Jun 9, 2025
…) (#129155)

This PR addresses the bug reported in
[#127496](#127496)

**Changes:** - Added validation logic in `ConfigurableClusterPrivileges`
to ensure privileges defined for a global cluster manage role privilege
are valid  - Added unit test to `ManageRolePrivilegesTest` to ensure
invalid privilege is caught during role creation - Updated
`BulkPutRoleRestIT` to assert that an error is thrown and that the role
is not created.

Both existing and new unit/integration tests passed locally.
elasticsearchmachine pushed a commit that referenced this pull request Jun 9, 2025
…) (#129156)

This PR addresses the bug reported in
[#127496](#127496)

**Changes:** - Added validation logic in `ConfigurableClusterPrivileges`
to ensure privileges defined for a global cluster manage role privilege
are valid  - Added unit test to `ManageRolePrivilegesTest` to ensure
invalid privilege is caught during role creation - Updated
`BulkPutRoleRestIT` to assert that an error is thrown and that the role
is not created.

Both existing and new unit/integration tests passed locally.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

auto-backport Automatically create backport pull requests when merged backport >bug :Security/Authorization Roles, Privileges, DLS/FLS, RBAC/ABAC Team:Security Meta label for security team v8.17.8 v8.18.3 v9.0.2

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants