[Security Solution] Enable Endpoint management RBAC feature flag by default (#148109)

## Summary

Enable the RBAC feature flag for Endpoint management RBAC by default.


### Checklist

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
This commit is contained in:
Kevin Logan 2023-01-10 10:54:42 -05:00 committed by GitHub
parent a09b12686f
commit 9786a8fb7c
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
5 changed files with 32 additions and 8 deletions

View file

@ -64,7 +64,7 @@ export const allowedExperimentalValues = Object.freeze({
/**
* Enables endpoint package level rbac
*/
endpointRbacEnabled: false,
endpointRbacEnabled: true,
/**
* Enables endpoint package level rbac for response actions only.

View file

@ -39,7 +39,7 @@ describe('when in the Administration tab', () => {
endpointPrivileges: { loading: false, canAccessEndpointManagement: false },
});
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
});
it('should display `no permission` if no `canReadPolicyManagement`', async () => {
@ -48,7 +48,7 @@ describe('when in the Administration tab', () => {
});
mockedContext.history.push('/administration/policy');
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
});
it('should display `no permission` if no `canReadTrustedApplications`', async () => {
@ -57,7 +57,7 @@ describe('when in the Administration tab', () => {
});
mockedContext.history.push('/administration/trusted_apps');
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
});
it('should display `no permission` if no `canReadEventFilters`', async () => {
@ -66,7 +66,7 @@ describe('when in the Administration tab', () => {
});
mockedContext.history.push('/administration/event_filters');
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
});
it('should display `no permission` if no `canReadHostIsolationExceptions`', async () => {
@ -75,7 +75,7 @@ describe('when in the Administration tab', () => {
});
mockedContext.history.push('/administration/host_isolation_exceptions');
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
});
it('should display `no permission` if no `canReadBlocklist`', async () => {
@ -84,7 +84,7 @@ describe('when in the Administration tab', () => {
});
mockedContext.history.push('/administration/blocklist');
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
});
it('should display `no permission` if no `canReadActionsLogManagement`', async () => {

View file

@ -34,6 +34,18 @@ export default function ({ getService }: FtrProviderContext) {
'read',
'minimal_all',
'minimal_read',
'endpoint_list_all',
'endpoint_list_read',
'trusted_applications_all',
'trusted_applications_read',
'host_isolation_exceptions_all',
'host_isolation_exceptions_read',
'blocklist_all',
'blocklist_read',
'event_filters_all',
'event_filters_read',
'policy_management_all',
'policy_management_read',
'actions_log_management_all',
'actions_log_management_read',
'host_isolation_all',

View file

@ -102,11 +102,23 @@ export default function ({ getService }: FtrProviderContext) {
'actions_log_management_all',
'actions_log_management_read',
'all',
'blocklist_all',
'blocklist_read',
'endpoint_list_all',
'endpoint_list_read',
'event_filters_all',
'event_filters_read',
'host_isolation_all',
'host_isolation_exceptions_all',
'host_isolation_exceptions_read',
'minimal_all',
'minimal_read',
'policy_management_all',
'policy_management_read',
'process_operations_all',
'read',
'trusted_applications_all',
'trusted_applications_read',
],
uptime: ['all', 'read', 'minimal_all', 'minimal_read'],
securitySolutionCases: ['all', 'read', 'minimal_all', 'minimal_read', 'cases_delete'],

View file

@ -59,7 +59,7 @@ export default ({ getPageObjects, getService }: FtrProviderContext) => {
it('should NOT allow access to endpoint management pages', async () => {
await PageObjects.endpoint.navigateToEndpointList();
await testSubjects.existOrFail('noIngestPermissions');
await testSubjects.existOrFail('noPrivilegesPage');
});
it('should display endpoint data on Host Details', async () => {