|
@@ -11,14 +11,14 @@ import org.elasticsearch.action.admin.cluster.health.TransportClusterHealthActio
|
|
|
import org.elasticsearch.action.admin.cluster.remote.TransportRemoteInfoAction;
|
|
|
import org.elasticsearch.action.admin.cluster.repositories.get.GetRepositoriesAction;
|
|
|
import org.elasticsearch.action.admin.cluster.repositories.put.TransportPutRepositoryAction;
|
|
|
-import org.elasticsearch.action.admin.cluster.reroute.ClusterRerouteAction;
|
|
|
+import org.elasticsearch.action.admin.cluster.reroute.TransportClusterRerouteAction;
|
|
|
import org.elasticsearch.action.admin.cluster.settings.ClusterUpdateSettingsAction;
|
|
|
-import org.elasticsearch.action.admin.cluster.shards.ClusterSearchShardsAction;
|
|
|
-import org.elasticsearch.action.admin.cluster.snapshots.create.CreateSnapshotAction;
|
|
|
-import org.elasticsearch.action.admin.cluster.snapshots.get.GetSnapshotsAction;
|
|
|
-import org.elasticsearch.action.admin.cluster.snapshots.status.SnapshotsStatusAction;
|
|
|
+import org.elasticsearch.action.admin.cluster.shards.TransportClusterSearchShardsAction;
|
|
|
+import org.elasticsearch.action.admin.cluster.snapshots.create.TransportCreateSnapshotAction;
|
|
|
+import org.elasticsearch.action.admin.cluster.snapshots.get.TransportGetSnapshotsAction;
|
|
|
+import org.elasticsearch.action.admin.cluster.snapshots.status.TransportSnapshotsStatusAction;
|
|
|
import org.elasticsearch.action.admin.cluster.state.ClusterStateAction;
|
|
|
-import org.elasticsearch.action.admin.cluster.stats.ClusterStatsAction;
|
|
|
+import org.elasticsearch.action.admin.cluster.stats.TransportClusterStatsAction;
|
|
|
import org.elasticsearch.action.admin.indices.alias.TransportIndicesAliasesAction;
|
|
|
import org.elasticsearch.action.admin.indices.alias.get.GetAliasesAction;
|
|
|
import org.elasticsearch.action.admin.indices.create.AutoCreateAction;
|
|
@@ -303,9 +303,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
FieldPermissionsCache fieldPermissionsCache = new FieldPermissionsCache(Settings.EMPTY);
|
|
|
Role snapshotUserRole = Role.buildFromRoleDescriptor(roleDescriptor, fieldPermissionsCache, RESTRICTED_INDICES);
|
|
|
assertThat(snapshotUserRole.cluster().check(GetRepositoriesAction.NAME, request, authentication), is(true));
|
|
|
- assertThat(snapshotUserRole.cluster().check(CreateSnapshotAction.NAME, request, authentication), is(true));
|
|
|
- assertThat(snapshotUserRole.cluster().check(SnapshotsStatusAction.NAME, request, authentication), is(true));
|
|
|
- assertThat(snapshotUserRole.cluster().check(GetSnapshotsAction.NAME, request, authentication), is(true));
|
|
|
+ assertThat(snapshotUserRole.cluster().check(TransportCreateSnapshotAction.TYPE.name(), request, authentication), is(true));
|
|
|
+ assertThat(snapshotUserRole.cluster().check(TransportSnapshotsStatusAction.TYPE.name(), request, authentication), is(true));
|
|
|
+ assertThat(snapshotUserRole.cluster().check(TransportGetSnapshotsAction.TYPE.name(), request, authentication), is(true));
|
|
|
|
|
|
assertThat(snapshotUserRole.cluster().check(TransportPutRepositoryAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(snapshotUserRole.cluster().check(GetIndexTemplatesAction.NAME, request, authentication), is(false));
|
|
@@ -313,7 +313,7 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
assertThat(snapshotUserRole.cluster().check(PutPipelineTransportAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(snapshotUserRole.cluster().check(GetPipelineAction.NAME, request, authentication), is(false));
|
|
|
assertThat(snapshotUserRole.cluster().check(DeletePipelineTransportAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(snapshotUserRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(snapshotUserRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(snapshotUserRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(snapshotUserRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(snapshotUserRole.cluster().check(GetWatchAction.NAME, request, authentication), is(false));
|
|
@@ -386,7 +386,7 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
assertThat(ingestAdminRole.cluster().check(PutPipelineTransportAction.TYPE.name(), request, authentication), is(true));
|
|
|
assertThat(ingestAdminRole.cluster().check(GetPipelineAction.NAME, request, authentication), is(true));
|
|
|
assertThat(ingestAdminRole.cluster().check(DeletePipelineTransportAction.TYPE.name(), request, authentication), is(true));
|
|
|
- assertThat(ingestAdminRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(ingestAdminRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(ingestAdminRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(ingestAdminRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(ingestAdminRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
@@ -426,10 +426,10 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
Role kibanaRole = Role.buildFromRoleDescriptor(roleDescriptor, new FieldPermissionsCache(Settings.EMPTY), RESTRICTED_INDICES);
|
|
|
assertThat(kibanaRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(true));
|
|
|
assertThat(kibanaRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(true));
|
|
|
- assertThat(kibanaRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(true));
|
|
|
+ assertThat(kibanaRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(true));
|
|
|
assertThat(kibanaRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(true));
|
|
|
assertThat(kibanaRole.cluster().check(GetIndexTemplatesAction.NAME, request, authentication), is(true));
|
|
|
- assertThat(kibanaRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(kibanaRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(kibanaRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(kibanaRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(true));
|
|
|
|
|
@@ -1704,9 +1704,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
);
|
|
|
assertThat(kibanaAdminRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(false));
|
|
|
assertThat(kibanaAdminRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(false));
|
|
|
- assertThat(kibanaAdminRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(kibanaAdminRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(kibanaAdminRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(kibanaAdminRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(kibanaAdminRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(kibanaAdminRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(kibanaAdminRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(kibanaAdminRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
@@ -1768,9 +1768,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
);
|
|
|
assertThat(kibanaUserRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(false));
|
|
|
assertThat(kibanaUserRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(false));
|
|
|
- assertThat(kibanaUserRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(kibanaUserRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(kibanaUserRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(kibanaUserRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(kibanaUserRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(kibanaUserRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(kibanaUserRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(kibanaUserRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
@@ -1851,9 +1851,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
assertThat(monitoringUserRole.cluster().check(TransportRemoteInfoAction.TYPE.name(), request, authentication), is(true));
|
|
|
assertThat(monitoringUserRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(false));
|
|
|
assertThat(monitoringUserRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(false));
|
|
|
- assertThat(monitoringUserRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(monitoringUserRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(monitoringUserRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(monitoringUserRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(monitoringUserRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(monitoringUserRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(monitoringUserRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(monitoringUserRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
@@ -1990,12 +1990,15 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
);
|
|
|
assertThat(remoteMonitoringAgentRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(true));
|
|
|
assertThat(remoteMonitoringAgentRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(true));
|
|
|
- assertThat(remoteMonitoringAgentRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(true));
|
|
|
+ assertThat(remoteMonitoringAgentRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(true));
|
|
|
assertThat(
|
|
|
remoteMonitoringAgentRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication),
|
|
|
is(true)
|
|
|
);
|
|
|
- assertThat(remoteMonitoringAgentRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(
|
|
|
+ remoteMonitoringAgentRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication),
|
|
|
+ is(false)
|
|
|
+ );
|
|
|
assertThat(remoteMonitoringAgentRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(remoteMonitoringAgentRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(remoteMonitoringAgentRole.cluster().check(GetWatchAction.NAME, request, authentication), is(true));
|
|
@@ -2200,7 +2203,10 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
);
|
|
|
assertThat(remoteMonitoringCollectorRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(true));
|
|
|
assertThat(remoteMonitoringCollectorRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(true));
|
|
|
- assertThat(remoteMonitoringCollectorRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(true));
|
|
|
+ assertThat(
|
|
|
+ remoteMonitoringCollectorRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication),
|
|
|
+ is(true)
|
|
|
+ );
|
|
|
assertThat(remoteMonitoringCollectorRole.cluster().check(GetIndexTemplatesAction.NAME, request, authentication), is(true));
|
|
|
assertThat(
|
|
|
remoteMonitoringCollectorRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication),
|
|
@@ -2210,7 +2216,10 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
remoteMonitoringCollectorRole.cluster().check(TransportDeleteIndexTemplateAction.TYPE.name(), request, authentication),
|
|
|
is(false)
|
|
|
);
|
|
|
- assertThat(remoteMonitoringCollectorRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(
|
|
|
+ remoteMonitoringCollectorRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication),
|
|
|
+ is(false)
|
|
|
+ );
|
|
|
assertThat(remoteMonitoringCollectorRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(remoteMonitoringCollectorRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(remoteMonitoringCollectorRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
@@ -2494,9 +2503,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
);
|
|
|
assertThat(reportingUserRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(false));
|
|
|
assertThat(reportingUserRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(false));
|
|
|
- assertThat(reportingUserRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(reportingUserRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(reportingUserRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(reportingUserRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(reportingUserRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(reportingUserRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(reportingUserRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(reportingUserRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
@@ -2708,9 +2717,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
);
|
|
|
assertThat(logstashSystemRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(true));
|
|
|
assertThat(logstashSystemRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(true));
|
|
|
- assertThat(logstashSystemRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(true));
|
|
|
+ assertThat(logstashSystemRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(true));
|
|
|
assertThat(logstashSystemRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(logstashSystemRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(logstashSystemRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(logstashSystemRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(logstashSystemRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
|
assertThat(logstashSystemRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(true));
|
|
@@ -2749,9 +2758,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
);
|
|
|
assertThat(beatsAdminRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(false));
|
|
|
assertThat(beatsAdminRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(false));
|
|
|
- assertThat(beatsAdminRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(beatsAdminRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(beatsAdminRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(beatsAdminRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(beatsAdminRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(beatsAdminRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(beatsAdminRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(beatsAdminRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
@@ -2814,9 +2823,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
Role beatsSystemRole = Role.buildFromRoleDescriptor(roleDescriptor, new FieldPermissionsCache(Settings.EMPTY), RESTRICTED_INDICES);
|
|
|
assertThat(beatsSystemRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(true));
|
|
|
assertThat(beatsSystemRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(true));
|
|
|
- assertThat(beatsSystemRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(true));
|
|
|
+ assertThat(beatsSystemRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(true));
|
|
|
assertThat(beatsSystemRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(beatsSystemRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(beatsSystemRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(beatsSystemRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(beatsSystemRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
|
assertThat(beatsSystemRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(true));
|
|
@@ -2865,9 +2874,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
Role APMSystemRole = Role.buildFromRoleDescriptor(roleDescriptor, new FieldPermissionsCache(Settings.EMPTY), RESTRICTED_INDICES);
|
|
|
assertThat(APMSystemRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(true));
|
|
|
assertThat(APMSystemRole.cluster().check(ClusterStateAction.NAME, request, authentication), is(true));
|
|
|
- assertThat(APMSystemRole.cluster().check(ClusterStatsAction.NAME, request, authentication), is(true));
|
|
|
+ assertThat(APMSystemRole.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(true));
|
|
|
assertThat(APMSystemRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(APMSystemRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(APMSystemRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(APMSystemRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(APMSystemRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
|
assertThat(APMSystemRole.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(true));
|
|
@@ -3527,9 +3536,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
// No cluster privileges
|
|
|
assertThat(role.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(false));
|
|
|
assertThat(role.cluster().check(ClusterStateAction.NAME, request, authentication), is(false));
|
|
|
- assertThat(role.cluster().check(ClusterStatsAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(role.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(role.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(role.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(role.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(role.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(role.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(role.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
@@ -3601,9 +3610,9 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
// No cluster privileges
|
|
|
assertThat(role.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(false));
|
|
|
assertThat(role.cluster().check(ClusterStateAction.NAME, request, authentication), is(false));
|
|
|
- assertThat(role.cluster().check(ClusterStatsAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(role.cluster().check(TransportClusterStatsAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(role.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(role.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(role.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(role.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(role.cluster().check(MonitoringBulkAction.NAME, request, authentication), is(false));
|
|
|
assertThat(role.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
@@ -3797,7 +3806,7 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
GetIndexAction.NAME,
|
|
|
GetFieldMappingsAction.NAME + "*",
|
|
|
GetMappingsAction.NAME,
|
|
|
- ClusterSearchShardsAction.NAME,
|
|
|
+ TransportClusterSearchShardsAction.TYPE.name(),
|
|
|
TransportSearchShardsAction.TYPE.name(),
|
|
|
ValidateQueryAction.NAME + "*",
|
|
|
GetSettingsAction.NAME,
|
|
@@ -3851,7 +3860,7 @@ public class ReservedRolesStoreTests extends ESTestCase {
|
|
|
);
|
|
|
assertThat(logstashAdminRole.cluster().check(TransportClusterHealthAction.NAME, request, authentication), is(false));
|
|
|
assertThat(logstashAdminRole.cluster().check(TransportPutIndexTemplateAction.TYPE.name(), request, authentication), is(false));
|
|
|
- assertThat(logstashAdminRole.cluster().check(ClusterRerouteAction.NAME, request, authentication), is(false));
|
|
|
+ assertThat(logstashAdminRole.cluster().check(TransportClusterRerouteAction.TYPE.name(), request, authentication), is(false));
|
|
|
assertThat(logstashAdminRole.cluster().check(ClusterUpdateSettingsAction.NAME, request, authentication), is(false));
|
|
|
assertThat(logstashAdminRole.cluster().check(DelegatePkiAuthenticationAction.NAME, request, authentication), is(false));
|
|
|
|