OpenSearch/qa/sql/security/roles.yml

61 lines
1.7 KiB
YAML

read_all:
cluster:
- "cluster:monitor/main" # Used by JDBC's MetaData
indices:
- names: test
privileges: [read, "indices:admin/get", "indices:admin/sql/tables", "indices:admin/sql/columns"]
- names: bort
privileges: [read, "indices:admin/get", "indices:admin/sql/tables", "indices:admin/sql/columns"]
read_something_else:
cluster:
- "cluster:monitor/main" # Used by JDBC's MetaData
indices:
- names: something_that_isnt_test
privileges: [read, "indices:admin/get", "indices:admin/sql/tables", "indices:admin/sql/columns"]
read_test_a:
cluster:
- "cluster:monitor/main" # Used by JDBC's MetaData
indices:
- names: test
privileges: [read, "indices:admin/get", "indices:admin/sql/tables", "indices:admin/sql/columns"]
field_security:
grant: [a]
read_test_a_and_b:
cluster:
- "cluster:monitor/main" # Used by JDBC's MetaData
indices:
- names: test
privileges: [read, "indices:admin/get", "indices:admin/sql/tables", "indices:admin/sql/columns"]
field_security:
grant: ["*"]
except: [c]
read_test_without_c_3:
cluster:
- "cluster:monitor/main" # Used by JDBC's MetaData
indices:
- names: test
privileges: [read, "indices:admin/get", "indices:admin/sql/tables", "indices:admin/sql/columns"]
query: |
{
"bool": {
"must_not": [
{
"match": {
"c": 3
}
}
]
}
}
read_bort:
cluster:
- "cluster:monitor/main" # Used by JDBC's MetaData
indices:
- names: bort
privileges: [read, "indices:admin/get", "indices:admin/sql/tables", "indices:admin/sql/columns"]