Skip to content

Commit

Permalink
Removing the ability to get/put roles
Browse files Browse the repository at this point in the history
  • Loading branch information
kobelb committed Jun 8, 2018
1 parent 5550955 commit 5e4c27e
Show file tree
Hide file tree
Showing 2 changed files with 0 additions and 9 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -83,8 +83,6 @@ private static Map<String, RoleDescriptor> initializeReservedRoles() {
"monitor", "manage_index_templates", MonitoringBulkAction.NAME, "manage_saml",
"cluster:admin/xpack/security/privilege/get",
"cluster:admin/xpack/security/privilege/put",
"cluster:admin/xpack/security/role/get",
"cluster:admin/xpack/security/role/put"
},
new RoleDescriptor.IndicesPrivileges[] {
RoleDescriptor.IndicesPrivileges.builder().indices(".kibana*", ".reporting-*").privileges("all").build(),
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,9 +78,6 @@
import org.elasticsearch.xpack.core.security.action.privilege.DeletePrivilegesAction;
import org.elasticsearch.xpack.core.security.action.privilege.GetPrivilegesAction;
import org.elasticsearch.xpack.core.security.action.privilege.PutPrivilegesAction;
import org.elasticsearch.xpack.core.security.action.role.ClearRolesCacheAction;
import org.elasticsearch.xpack.core.security.action.role.DeleteRoleAction;
import org.elasticsearch.xpack.core.security.action.role.GetRolesAction;
import org.elasticsearch.xpack.core.security.action.role.PutRoleAction;
import org.elasticsearch.xpack.core.security.action.saml.SamlAuthenticateAction;
import org.elasticsearch.xpack.core.security.action.saml.SamlPrepareAuthenticationAction;
Expand Down Expand Up @@ -192,10 +189,6 @@ public void testKibanaSystemRole() {
assertThat(kibanaRole.cluster().check(DeletePrivilegesAction.NAME), is(false));
assertThat(kibanaRole.cluster().check(GetPrivilegesAction.NAME), is(true));
assertThat(kibanaRole.cluster().check(PutPrivilegesAction.NAME), is(true));
assertThat(kibanaRole.cluster().check(ClearRolesCacheAction.NAME), is(false));
assertThat(kibanaRole.cluster().check(DeleteRoleAction.NAME), is(false));
assertThat(kibanaRole.cluster().check(GetRolesAction.NAME), is(true));
assertThat(kibanaRole.cluster().check(PutRoleAction.NAME), is(true));


// Everything else
Expand Down

0 comments on commit 5e4c27e

Please sign in to comment.