Skip to content

Commit

Permalink
Auto-generated code for 8.11 (#2091)
Browse files Browse the repository at this point in the history
  • Loading branch information
elasticmachine authored Dec 12, 2023
1 parent 7cc6824 commit dda20a4
Show file tree
Hide file tree
Showing 4 changed files with 22 additions and 19 deletions.
1 change: 1 addition & 0 deletions docs/reference.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -8121,6 +8121,7 @@ client.security.putRoleMapping({ name })
** *`enabled` (Optional, boolean)*
** *`metadata` (Optional, Record<string, User-defined value>)*
** *`roles` (Optional, string[])*
** *`role_templates` (Optional, { format, template }[])*
** *`rules` (Optional, { any, all, field, except })*
** *`run_as` (Optional, string[])*
** *`refresh` (Optional, Enum(true | false | "wait_for"))*: If `true` (the default) then refresh the affected shards to make this operation visible to search, if `wait_for` then wait for a refresh to make this operation visible to search, if `false` then do nothing with refreshes.
Expand Down
2 changes: 1 addition & 1 deletion src/api/api/security.ts
Original file line number Diff line number Diff line change
Expand Up @@ -1400,7 +1400,7 @@ export default class Security {
async putRoleMapping (this: That, params: T.SecurityPutRoleMappingRequest | TB.SecurityPutRoleMappingRequest, options?: TransportRequestOptions): Promise<T.SecurityPutRoleMappingResponse>
async putRoleMapping (this: That, params: T.SecurityPutRoleMappingRequest | TB.SecurityPutRoleMappingRequest, options?: TransportRequestOptions): Promise<any> {
const acceptedPath: string[] = ['name']
const acceptedBody: string[] = ['enabled', 'metadata', 'roles', 'rules', 'run_as']
const acceptedBody: string[] = ['enabled', 'metadata', 'roles', 'role_templates', 'rules', 'run_as']
const querystring: Record<string, any> = {}
// @ts-expect-error
const userBody: any = params?.body
Expand Down
19 changes: 10 additions & 9 deletions src/api/types.ts
Original file line number Diff line number Diff line change
Expand Up @@ -15752,7 +15752,7 @@ export interface SecurityRoleMapping {
metadata: Metadata
roles: string[]
rules: SecurityRoleMappingRule
role_templates?: SecurityGetRoleRoleTemplate[]
role_templates?: SecurityRoleTemplate[]
}

export interface SecurityRoleMappingRule {
Expand All @@ -15762,6 +15762,11 @@ export interface SecurityRoleMappingRule {
except?: SecurityRoleMappingRule
}

export interface SecurityRoleTemplate {
format?: SecurityTemplateFormat
template: Script
}

export type SecurityRoleTemplateInlineQuery = string | QueryDslQueryContainer

export interface SecurityRoleTemplateInlineScript extends ScriptBase {
Expand All @@ -15776,6 +15781,8 @@ export interface SecurityRoleTemplateQuery {

export type SecurityRoleTemplateScript = SecurityRoleTemplateInlineScript | SecurityRoleTemplateInlineQuery | StoredScriptId

export type SecurityTemplateFormat = 'string' | 'json'

export interface SecurityTransientMetadataConfig {
enabled: boolean
}
Expand Down Expand Up @@ -16100,17 +16107,10 @@ export interface SecurityGetRoleRole {
run_as: string[]
transient_metadata: SecurityTransientMetadataConfig
applications: SecurityApplicationPrivileges[]
role_templates?: SecurityGetRoleRoleTemplate[]
role_templates?: SecurityRoleTemplate[]
global?: Record<string, Record<string, Record<string, string[]>>>
}

export interface SecurityGetRoleRoleTemplate {
format?: SecurityGetRoleTemplateFormat
template: Script
}

export type SecurityGetRoleTemplateFormat = 'string' | 'json'

export interface SecurityGetRoleMappingRequest extends RequestBase {
name?: Names
}
Expand Down Expand Up @@ -16369,6 +16369,7 @@ export interface SecurityPutRoleMappingRequest extends RequestBase {
enabled?: boolean
metadata?: Metadata
roles?: string[]
role_templates?: SecurityRoleTemplate[]
rules?: SecurityRoleMappingRule
run_as?: string[]
}
Expand Down
19 changes: 10 additions & 9 deletions src/api/typesWithBodyKey.ts
Original file line number Diff line number Diff line change
Expand Up @@ -16063,7 +16063,7 @@ export interface SecurityRoleMapping {
metadata: Metadata
roles: string[]
rules: SecurityRoleMappingRule
role_templates?: SecurityGetRoleRoleTemplate[]
role_templates?: SecurityRoleTemplate[]
}

export interface SecurityRoleMappingRule {
Expand All @@ -16073,6 +16073,11 @@ export interface SecurityRoleMappingRule {
except?: SecurityRoleMappingRule
}

export interface SecurityRoleTemplate {
format?: SecurityTemplateFormat
template: Script
}

export type SecurityRoleTemplateInlineQuery = string | QueryDslQueryContainer

export interface SecurityRoleTemplateInlineScript extends ScriptBase {
Expand All @@ -16087,6 +16092,8 @@ export interface SecurityRoleTemplateQuery {

export type SecurityRoleTemplateScript = SecurityRoleTemplateInlineScript | SecurityRoleTemplateInlineQuery | StoredScriptId

export type SecurityTemplateFormat = 'string' | 'json'

export interface SecurityTransientMetadataConfig {
enabled: boolean
}
Expand Down Expand Up @@ -16420,17 +16427,10 @@ export interface SecurityGetRoleRole {
run_as: string[]
transient_metadata: SecurityTransientMetadataConfig
applications: SecurityApplicationPrivileges[]
role_templates?: SecurityGetRoleRoleTemplate[]
role_templates?: SecurityRoleTemplate[]
global?: Record<string, Record<string, Record<string, string[]>>>
}

export interface SecurityGetRoleRoleTemplate {
format?: SecurityGetRoleTemplateFormat
template: Script
}

export type SecurityGetRoleTemplateFormat = 'string' | 'json'

export interface SecurityGetRoleMappingRequest extends RequestBase {
name?: Names
}
Expand Down Expand Up @@ -16713,6 +16713,7 @@ export interface SecurityPutRoleMappingRequest extends RequestBase {
enabled?: boolean
metadata?: Metadata
roles?: string[]
role_templates?: SecurityRoleTemplate[]
rules?: SecurityRoleMappingRule
run_as?: string[]
}
Expand Down

0 comments on commit dda20a4

Please sign in to comment.