[Security Solution] [Detections] Bug fix for read privilege check during rule exec (#86852)

This commit is contained in:
Devin W. Hurley 2020-12-22 21:14:22 -05:00 committed by GitHub
parent e3896050fc
commit 35b10b5354
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 5 additions and 5 deletions

View file

@ -197,13 +197,16 @@ describe('rules_notification_alert_type', () => {
'myfa*': {
read: true,
},
'anotherindex*': {
read: true,
},
'some*': {
read: false,
},
},
application: {},
});
payload.params.index = ['some*', 'myfa*'];
payload.params.index = ['some*', 'myfa*', 'anotherindex*'];
await alert.executor(payload);
expect(ruleStatusService.partialFailure).toHaveBeenCalled();
expect(ruleStatusService.partialFailure.mock.calls[0][0]).toContain(

View file

@ -189,10 +189,7 @@ export const signalRulesAlertType = ({
(indexName) => privileges.index[indexName].read
);
if (
indexesWithReadPrivileges.length > 0 &&
indexesWithNoReadPrivileges.length >= indexesWithReadPrivileges.length
) {
if (indexesWithReadPrivileges.length > 0 && indexesWithNoReadPrivileges.length > 0) {
// some indices have read privileges others do not.
// set a partial failure status
const errorString = `Missing required read permissions on indexes: ${JSON.stringify(