A few files had their first comment removed even though it did not contain a license. This re-adds those comments.
@@ -0,0 +1,14 @@
+# Role mapping configuration file which has elasticsearch roles as keys
+# that map to one or more user or group distinguished names
+
+#roleA: this is an elasticsearch role
+# - groupA-DN this is a group distinguished name
+# - groupB-DN
+# - user1-DN this is the full user distinguished name
+#power_user:
+# - "cn=admins,dc=example,dc=com"
+#user:
+# - "cn=users,dc=example,dc=com"
+# - "cn=John Doe,cn=other users,dc=example,dc=com"
@@ -0,0 +1,3 @@
+# The default roles file is empty as the preferred method of defining roles is
+# through the API/UI. File based roles are useful in error scenarios when the
+# API based roles may not be available.
@@ -1,3 +1,4 @@
+# AD Realm Role Mapping
group_role:
- "CN=Avengers,CN=users,DC=ad,DC=test,DC=elasticsearch,DC=com"
user_role:
+# This LDAP connection does group lookup by a subtree search, no role mapping
ldap:
urls:
- ldap://ldap.example.com:1389
+# This LDAP connection does group lookup by attribute with group to role mapping
urls: # these connections are not round-robin, but primary, secondary, etc. When the first fails the second is attempted
@@ -1,2 +1,4 @@
+# Role mappings for PKI tests
user:
- "CN=Elasticsearch Test Node, OU=elasticsearch, O=org"
@@ -1,3 +1,9 @@
+# roleA this is an elasticsearch role
+# - groupA-DN this is any group, ldap DN, or unix group
+# - user1-DN
+#This is an example of ldap mapping configuration
security:
- "cn=avengers,ou=marvel,o=superheros"
- "cn=shield,ou=marvel,o=superheros"
@@ -1,3 +1,5 @@
+# All cluster rights
+# All operations on all indices
admin:
cluster:
- all
+# Integration tests for monitoring
+#
"X-Pack loaded":
- do:
cluster.state: {}
+# Integration tests xpack info and usage API
"X-Pack Info and Usage":
+# remove this test from core-tests-with-security as soon as we can
+# pull in rest test from modules in core
---
"Basic Rankeval test":
@@ -1,3 +1,6 @@
+# Run as all users
@@ -1,3 +1,7 @@
+# A role that has all sorts of configuration:
+# - it can monitor the cluster
+# - for index1 and index2 it can do CRUD things and refresh
+# - for other indices it has search-only privileges
actual_role:
run_as: [ "joe" ]
+# Integration tests for smoke testing plugins
"Plugins are actually installed":
"Secret settings are correctly filtered":
+# When a script is specified in a watch, updates should be taken into account
+# See https://github.com/elastic/x-plugins/issues/4237
"Test transform scripts are updated on execution":
- skip:
+# tag::rest
rest_minimal:
indices:
- names: test