-
Notifications
You must be signed in to change notification settings - Fork 25.7k
Bugfix: Prevent invalid privileges in manage roles privilege #128532
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bugfix: Prevent invalid privileges in manage roles privilege #128532
Conversation
|
Hi @gmjehovich, I've created a changelog YAML for you. |
n1v0lg
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! Nice work 🚀 A couple comments but nothing that requires another round of review.
...t/java/org/elasticsearch/xpack/core/security/authz/privilege/ManageRolesPrivilegesTests.java
Outdated
Show resolved
Hide resolved
...t/java/org/elasticsearch/xpack/core/security/authz/privilege/ManageRolesPrivilegesTests.java
Show resolved
Hide resolved
...ity-trial/src/javaRestTest/java/org/elasticsearch/xpack/security/role/BulkPutRoleRestIT.java
Show resolved
Hide resolved
...ity-trial/src/javaRestTest/java/org/elasticsearch/xpack/security/role/BulkPutRoleRestIT.java
Show resolved
Hide resolved
...t/java/org/elasticsearch/xpack/core/security/authz/privilege/ManageRolesPrivilegesTests.java
Outdated
Show resolved
Hide resolved
Co-authored-by: Nikolaj Volgushev <n1v0lg@users.noreply.github.com>
Co-authored-by: Nikolaj Volgushev <n1v0lg@users.noreply.github.com>
Co-authored-by: Nikolaj Volgushev <n1v0lg@users.noreply.github.com>
…security/authz/privilege/ManageRolesPrivilegesTests.java Co-authored-by: Nikolaj Volgushev <n1v0lg@users.noreply.github.com>
ac89b49 to
33b17cd
Compare
|
Hi @gmjehovich, I've updated the changelog YAML for you. |
|
Pinging @elastic/es-security (Team:Security) |
370ac83 to
c641de1
Compare
💔 Backport failed
You can use sqren/backport to manually backport by running |
…#128532) This PR addresses the bug reported in [elastic#127496](elastic#127496) **Changes:** - Added validation logic in `ConfigurableClusterPrivileges` to ensure privileges defined for a global cluster manage role privilege are valid - Added unit test to `ManageRolePrivilegesTest` to ensure invalid privilege is caught during role creation - Updated `BulkPutRoleRestIT` to assert that an error is thrown and that the role is not created. Both existing and new unit/integration tests passed locally.
…#128532) This PR addresses the bug reported in [elastic#127496](elastic#127496) **Changes:** - Added validation logic in `ConfigurableClusterPrivileges` to ensure privileges defined for a global cluster manage role privilege are valid - Added unit test to `ManageRolePrivilegesTest` to ensure invalid privilege is caught during role creation - Updated `BulkPutRoleRestIT` to assert that an error is thrown and that the role is not created. Both existing and new unit/integration tests passed locally.
…#128532) This PR addresses the bug reported in [elastic#127496](elastic#127496) **Changes:** - Added validation logic in `ConfigurableClusterPrivileges` to ensure privileges defined for a global cluster manage role privilege are valid - Added unit test to `ManageRolePrivilegesTest` to ensure invalid privilege is caught during role creation - Updated `BulkPutRoleRestIT` to assert that an error is thrown and that the role is not created. Both existing and new unit/integration tests passed locally.
This PR addresses the bug reported in [#127496](#127496) **Changes:** - Added validation logic in `ConfigurableClusterPrivileges` to ensure privileges defined for a global cluster manage role privilege are valid - Added unit test to `ManageRolePrivilegesTest` to ensure invalid privilege is caught during role creation - Updated `BulkPutRoleRestIT` to assert that an error is thrown and that the role is not created. Both existing and new unit/integration tests passed locally.
…elastic#128847) This PR addresses the bug reported in [elastic#127496](elastic#127496) **Changes:** - Added validation logic in `ConfigurableClusterPrivileges` to ensure privileges defined for a global cluster manage role privilege are valid - Added unit test to `ManageRolePrivilegesTest` to ensure invalid privilege is caught during role creation - Updated `BulkPutRoleRestIT` to assert that an error is thrown and that the role is not created. Both existing and new unit/integration tests passed locally.
…elastic#128847) This PR addresses the bug reported in [elastic#127496](elastic#127496) **Changes:** - Added validation logic in `ConfigurableClusterPrivileges` to ensure privileges defined for a global cluster manage role privilege are valid - Added unit test to `ManageRolePrivilegesTest` to ensure invalid privilege is caught during role creation - Updated `BulkPutRoleRestIT` to assert that an error is thrown and that the role is not created. Both existing and new unit/integration tests passed locally.
…) (#129155) This PR addresses the bug reported in [#127496](#127496) **Changes:** - Added validation logic in `ConfigurableClusterPrivileges` to ensure privileges defined for a global cluster manage role privilege are valid - Added unit test to `ManageRolePrivilegesTest` to ensure invalid privilege is caught during role creation - Updated `BulkPutRoleRestIT` to assert that an error is thrown and that the role is not created. Both existing and new unit/integration tests passed locally.
…) (#129156) This PR addresses the bug reported in [#127496](#127496) **Changes:** - Added validation logic in `ConfigurableClusterPrivileges` to ensure privileges defined for a global cluster manage role privilege are valid - Added unit test to `ManageRolePrivilegesTest` to ensure invalid privilege is caught during role creation - Updated `BulkPutRoleRestIT` to assert that an error is thrown and that the role is not created. Both existing and new unit/integration tests passed locally.
#128626) This PR addresses the bug reported in [#127496](#127496) **Changes:** - Added validation logic in `ConfigurableClusterPrivileges` to ensure privileges defined for a global cluster manage role privilege are valid - Added unit test to `ManageRolePrivilegesTest` to ensure invalid privilege is caught during role creation - Updated `BulkPutRoleRestIT` to assert that an error is thrown and that the role is not created. Both existing and new unit/integration tests passed locally. Co-authored-by: Joe Gallo <joe.gallo@elastic.co>
This PR addresses the bug reported in #127496
Changes:
ConfigurableClusterPrivilegesto ensure privileges defined for a global cluster manage role privilege are validManageRolePrivilegesTestto ensure invalid privilege is caught during role creationBulkPutRoleRestITto assert that an error is thrown and that the role is not created.Both existing and new unit/integration tests passed locally.