Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 0 additions & 26 deletions x-pack/plugins/cases/public/common/lib/kibana/hooks.ts
Original file line number Diff line number Diff line change
Expand Up @@ -104,29 +104,3 @@ export const useCurrentUser = (): AuthenticatedElasticUser | null => {
}, [fetchUser]);
return user;
};

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This code is unused and shouldn't live in the cases plugin since each individual plugin that leverages cases will need to manage it's permissions separately.

export interface UseGetUserSavedObjectPermissions {
crud: boolean;
read: boolean;
}

export const useGetUserSavedObjectPermissions = () => {
const [
savedObjectsPermissions,
setSavedObjectsPermissions,
] = useState<UseGetUserSavedObjectPermissions | null>(null);
const uiCapabilities = useKibana().services.application.capabilities;

useEffect(() => {
const capabilitiesCanUserCRUD: boolean =
typeof uiCapabilities.siem.crud === 'boolean' ? uiCapabilities.siem.crud : false;
const capabilitiesCanUserRead: boolean =
typeof uiCapabilities.siem.show === 'boolean' ? uiCapabilities.siem.show : false;
setSavedObjectsPermissions({
crud: capabilitiesCanUserCRUD,
read: capabilitiesCanUserRead,
});
}, [uiCapabilities]);

return savedObjectsPermissions;
};
Original file line number Diff line number Diff line change
@@ -0,0 +1,234 @@
/*
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
* or more contributor license agreements. Licensed under the Elastic License
* 2.0; you may not use this file except in compliance with the Elastic License
* 2.0.
*/

import { TestCaseWithoutTimeline } from '../../objects/case';
import { ALL_CASES_NAME } from '../../screens/all_cases';

import { goToCreateNewCase } from '../../tasks/all_cases';
import { cleanKibana, deleteCases } from '../../tasks/common';

import {
backToCases,
createCase,
fillCasesMandatoryfields,
filterStatusOpen,
} from '../../tasks/create_new_case';
import {
constructUrlWithUser,
getEnvAuth,
loginWithUserAndWaitForPageWithoutDateRange,
} from '../../tasks/login';

import { CASES_URL } from '../../urls/navigation';

interface User {
username: string;
password: string;
description?: string;
roles: string[];
}

interface UserInfo {
username: string;
full_name: string;
email: string;
}

interface FeaturesPrivileges {
[featureId: string]: string[];
}

interface ElasticsearchIndices {
names: string[];
privileges: string[];
}

interface ElasticSearchPrivilege {
cluster?: string[];
indices?: ElasticsearchIndices[];
}

interface KibanaPrivilege {
spaces: string[];
base?: string[];
feature?: FeaturesPrivileges;
}

interface Role {
name: string;
privileges: {
elasticsearch?: ElasticSearchPrivilege;
kibana?: KibanaPrivilege[];
};
}

const secAll: Role = {
name: 'sec_all_role',
privileges: {
elasticsearch: {
indices: [
{
names: ['*'],
privileges: ['all'],
},
],
},
kibana: [
{
feature: {
siem: ['all'],
actions: ['all'],
actionsSimulators: ['all'],
},
spaces: ['*'],
},
],
},
};

const secAllUser: User = {
username: 'sec_all_user',
password: 'password',
roles: [secAll.name],
};

const secReadCasesAll: Role = {
name: 'sec_read_cases_all_role',
privileges: {
elasticsearch: {
indices: [
{
names: ['*'],
privileges: ['all'],
},
],
},
kibana: [
{
feature: {
siem: ['minimal_read', 'cases_all'],
actions: ['all'],
actionsSimulators: ['all'],
},
spaces: ['*'],
},
],
},
};

const secReadCasesAllUser: User = {
username: 'sec_read_cases_all_user',
password: 'password',
roles: [secReadCasesAll.name],
};

const usersToCreate = [secAllUser, secReadCasesAllUser];
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

secAllUser has all (aka the cases sub feature is untouched)
secReadCasesAllUser has security solution read but the cases sub feature is set to all so it should also be able to create a case.

const rolesToCreate = [secAll, secReadCasesAll];

const getUserInfo = (user: User): UserInfo => ({
username: user.username,
full_name: user.username.replace('_', ' '),
email: `${user.username}@elastic.co`,
});

const createUsersAndRoles = (users: User[], roles: Role[]) => {
const envUser = getEnvAuth();
for (const role of roles) {
cy.log(`Creating role: ${JSON.stringify(role)}`);
cy.request({
body: role.privileges,
headers: { 'kbn-xsrf': 'cypress-creds-via-config' },
method: 'PUT',
url: constructUrlWithUser(envUser, `/api/security/role/${role.name}`),
})
.its('status')
.should('eql', 204);
}

for (const user of users) {
const userInfo = getUserInfo(user);
cy.log(`Creating user: ${JSON.stringify(user)}`);
cy.request({
body: {
username: user.username,
password: user.password,
roles: user.roles,
full_name: userInfo.full_name,
email: userInfo.email,
},
headers: { 'kbn-xsrf': 'cypress-creds-via-config' },
method: 'POST',
url: constructUrlWithUser(envUser, `/internal/security/users/${user.username}`),
})
.its('status')
.should('eql', 200);
}
};

const deleteUsersAndRoles = (users: User[], roles: Role[]) => {
const envUser = getEnvAuth();
for (const user of users) {
cy.log(`Deleting user: ${JSON.stringify(user)}`);
cy.request({
headers: { 'kbn-xsrf': 'cypress-creds-via-config' },
method: 'DELETE',
url: constructUrlWithUser(envUser, `/internal/security/users/${user.username}`),
failOnStatusCode: false,
})
.its('status')
.should('oneOf', [204, 404]);
}

for (const role of roles) {
cy.log(`Deleting role: ${JSON.stringify(role)}`);
cy.request({
headers: { 'kbn-xsrf': 'cypress-creds-via-config' },
method: 'DELETE',
url: constructUrlWithUser(envUser, `/api/security/role/${role.name}`),
failOnStatusCode: false,
})
.its('status')
.should('oneOf', [204, 404]);
}
};

const testCase: TestCaseWithoutTimeline = {
name: 'This is the title of the case',
tags: ['Tag1', 'Tag2'],
description: 'This is the case description',
reporter: 'elastic',
owner: 'securitySolution',
};

describe('Cases privileges', () => {
before(() => {
cleanKibana();
createUsersAndRoles(usersToCreate, rolesToCreate);
});

after(() => {
deleteUsersAndRoles(usersToCreate, rolesToCreate);
cleanKibana();
});

beforeEach(() => {
deleteCases();
});

for (const user of [secAllUser, secReadCasesAllUser]) {
it(`User ${user.username} with role(s) ${user.roles.join()} can create a case`, () => {
loginWithUserAndWaitForPageWithoutDateRange(CASES_URL, user);
goToCreateNewCase();
fillCasesMandatoryfields(testCase);
createCase();
backToCases();
filterStatusOpen();

cy.get(ALL_CASES_NAME).should('have.text', testCase.name);
});
}
});
7 changes: 5 additions & 2 deletions x-pack/plugins/security_solution/cypress/objects/case.ts
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,14 @@

import { CompleteTimeline, timeline } from './timeline';

export interface TestCase {
export interface TestCase extends TestCaseWithoutTimeline {
timeline: CompleteTimeline;
}

export interface TestCaseWithoutTimeline {
name: string;
tags: string[];
description: string;
timeline: CompleteTimeline;
reporter: string;
owner: string;
}
Expand Down
31 changes: 18 additions & 13 deletions x-pack/plugins/security_solution/cypress/tasks/common.ts
Original file line number Diff line number Diff line change
Expand Up @@ -106,19 +106,7 @@ export const cleanKibana = () => {
},
});

cy.request('POST', `${kibanaIndexUrl}/_delete_by_query?conflicts=proceed`, {
query: {
bool: {
filter: [
{
match: {
type: 'cases',
},
},
],
},
},
});
deleteCases();

cy.request('POST', `${kibanaIndexUrl}/_delete_by_query?conflicts=proceed`, {
query: {
Expand Down Expand Up @@ -149,4 +137,21 @@ export const cleanKibana = () => {
esArchiverResetKibana();
};

export const deleteCases = () => {
const kibanaIndexUrl = `${Cypress.env('ELASTICSEARCH_URL')}/.kibana_\*`;
cy.request('POST', `${kibanaIndexUrl}/_delete_by_query?conflicts=proceed`, {
query: {
bool: {
filter: [
{
match: {
type: 'cases',
},
},
],
},
},
});
};

export const scrollToBottom = () => cy.scrollTo('bottom');
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ import {
JiraConnectorOptions,
ServiceNowconnectorOptions,
TestCase,
TestCaseWithoutTimeline,
} from '../objects/case';
import { ALL_CASES_OPEN_CASES_COUNT, ALL_CASES_OPEN_FILTER } from '../screens/all_cases';

Expand Down Expand Up @@ -46,7 +47,7 @@ export const filterStatusOpen = () => {
cy.get(ALL_CASES_OPEN_FILTER).click();
};

export const fillCasesMandatoryfields = (newCase: TestCase) => {
export const fillCasesMandatoryfields = (newCase: TestCaseWithoutTimeline) => {
cy.get(TITLE_INPUT).type(newCase.name, { force: true });
newCase.tags.forEach((tag) => {
cy.get(TAGS_INPUT).type(`${tag}{enter}`, { force: true });
Expand Down
Loading