mirror of
https://github.com/elastic/kibana.git
synced 2025-06-27 18:51:07 -04:00
[Security Solution] Enable Endpoint management RBAC feature flag by default (#148109)
## Summary Enable the RBAC feature flag for Endpoint management RBAC by default. ### Checklist - [x] [Unit or functional tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html) were updated or added to match the most common scenarios Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
This commit is contained in:
parent
a09b12686f
commit
9786a8fb7c
5 changed files with 32 additions and 8 deletions
|
@ -64,7 +64,7 @@ export const allowedExperimentalValues = Object.freeze({
|
|||
/**
|
||||
* Enables endpoint package level rbac
|
||||
*/
|
||||
endpointRbacEnabled: false,
|
||||
endpointRbacEnabled: true,
|
||||
|
||||
/**
|
||||
* Enables endpoint package level rbac for response actions only.
|
||||
|
|
|
@ -39,7 +39,7 @@ describe('when in the Administration tab', () => {
|
|||
endpointPrivileges: { loading: false, canAccessEndpointManagement: false },
|
||||
});
|
||||
|
||||
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
|
||||
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
|
||||
});
|
||||
|
||||
it('should display `no permission` if no `canReadPolicyManagement`', async () => {
|
||||
|
@ -48,7 +48,7 @@ describe('when in the Administration tab', () => {
|
|||
});
|
||||
|
||||
mockedContext.history.push('/administration/policy');
|
||||
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
|
||||
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
|
||||
});
|
||||
|
||||
it('should display `no permission` if no `canReadTrustedApplications`', async () => {
|
||||
|
@ -57,7 +57,7 @@ describe('when in the Administration tab', () => {
|
|||
});
|
||||
|
||||
mockedContext.history.push('/administration/trusted_apps');
|
||||
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
|
||||
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
|
||||
});
|
||||
|
||||
it('should display `no permission` if no `canReadEventFilters`', async () => {
|
||||
|
@ -66,7 +66,7 @@ describe('when in the Administration tab', () => {
|
|||
});
|
||||
|
||||
mockedContext.history.push('/administration/event_filters');
|
||||
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
|
||||
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
|
||||
});
|
||||
|
||||
it('should display `no permission` if no `canReadHostIsolationExceptions`', async () => {
|
||||
|
@ -75,7 +75,7 @@ describe('when in the Administration tab', () => {
|
|||
});
|
||||
|
||||
mockedContext.history.push('/administration/host_isolation_exceptions');
|
||||
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
|
||||
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
|
||||
});
|
||||
|
||||
it('should display `no permission` if no `canReadBlocklist`', async () => {
|
||||
|
@ -84,7 +84,7 @@ describe('when in the Administration tab', () => {
|
|||
});
|
||||
|
||||
mockedContext.history.push('/administration/blocklist');
|
||||
expect(await render().findByTestId('noIngestPermissions')).toBeTruthy();
|
||||
expect(await render().findByTestId('noPrivilegesPage')).toBeTruthy();
|
||||
});
|
||||
|
||||
it('should display `no permission` if no `canReadActionsLogManagement`', async () => {
|
||||
|
|
|
@ -34,6 +34,18 @@ export default function ({ getService }: FtrProviderContext) {
|
|||
'read',
|
||||
'minimal_all',
|
||||
'minimal_read',
|
||||
'endpoint_list_all',
|
||||
'endpoint_list_read',
|
||||
'trusted_applications_all',
|
||||
'trusted_applications_read',
|
||||
'host_isolation_exceptions_all',
|
||||
'host_isolation_exceptions_read',
|
||||
'blocklist_all',
|
||||
'blocklist_read',
|
||||
'event_filters_all',
|
||||
'event_filters_read',
|
||||
'policy_management_all',
|
||||
'policy_management_read',
|
||||
'actions_log_management_all',
|
||||
'actions_log_management_read',
|
||||
'host_isolation_all',
|
||||
|
|
|
@ -102,11 +102,23 @@ export default function ({ getService }: FtrProviderContext) {
|
|||
'actions_log_management_all',
|
||||
'actions_log_management_read',
|
||||
'all',
|
||||
'blocklist_all',
|
||||
'blocklist_read',
|
||||
'endpoint_list_all',
|
||||
'endpoint_list_read',
|
||||
'event_filters_all',
|
||||
'event_filters_read',
|
||||
'host_isolation_all',
|
||||
'host_isolation_exceptions_all',
|
||||
'host_isolation_exceptions_read',
|
||||
'minimal_all',
|
||||
'minimal_read',
|
||||
'policy_management_all',
|
||||
'policy_management_read',
|
||||
'process_operations_all',
|
||||
'read',
|
||||
'trusted_applications_all',
|
||||
'trusted_applications_read',
|
||||
],
|
||||
uptime: ['all', 'read', 'minimal_all', 'minimal_read'],
|
||||
securitySolutionCases: ['all', 'read', 'minimal_all', 'minimal_read', 'cases_delete'],
|
||||
|
|
|
@ -59,7 +59,7 @@ export default ({ getPageObjects, getService }: FtrProviderContext) => {
|
|||
|
||||
it('should NOT allow access to endpoint management pages', async () => {
|
||||
await PageObjects.endpoint.navigateToEndpointList();
|
||||
await testSubjects.existOrFail('noIngestPermissions');
|
||||
await testSubjects.existOrFail('noPrivilegesPage');
|
||||
});
|
||||
|
||||
it('should display endpoint data on Host Details', async () => {
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue