OpenSearch/x-pack/plugin/ml/qa/ml-with-security
David Roberts 89466eefa5
Don't require separate privilege for internal detail of put pipeline (#60190)
Putting an ingest pipeline used to require that the user calling
it had permission to get nodes info as well as permission to
manage ingest.  This was due to an internal implementaton detail
that was not visible to the end user.

This change alters the behaviour so that a user with the
manage_pipeline cluster privilege can put an ingest pipeline
regardless of whether they have the separate privilege to get
nodes info.  The internal implementation detail now runs as
the internal _xpack user when security is enabled.

Backport of #60106
2020-07-27 10:44:48 +01:00
..
src/test/java/org/elasticsearch/smoketest Don't require separate privilege for internal detail of put pipeline (#60190) 2020-07-27 10:44:48 +01:00
build.gradle Don't require separate privilege for internal detail of put pipeline (#60190) 2020-07-27 10:44:48 +01:00
roles.yml Disallow mapping updates for doc ingestion privileges (#58784) 2020-07-14 23:39:41 +03:00