Test run of new docs

This commit is contained in:
Josh Mock
2024-11-19 11:04:35 -06:00
parent f33aa8cccd
commit 8210607de0
503 changed files with 37166 additions and 12056 deletions

View File

@ -0,0 +1,65 @@
[[reference-security-update_api_key]]
////////
===========================================================================================================================
|| ||
|| ||
|| ||
|| ██████╗ ███████╗ █████╗ ██████╗ ███╗ ███╗███████╗ ||
|| ██╔══██╗██╔════╝██╔══██╗██╔══██╗████╗ ████║██╔════╝ ||
|| ██████╔╝█████╗ ███████║██║ ██║██╔████╔██║█████╗ ||
|| ██╔══██╗██╔══╝ ██╔══██║██║ ██║██║╚██╔╝██║██╔══╝ ||
|| ██║ ██║███████╗██║ ██║██████╔╝██║ ╚═╝ ██║███████╗ ||
|| ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝╚═════╝ ╚═╝ ╚═╝╚══════╝ ||
|| ||
|| ||
|| This file is autogenerated, DO NOT send pull requests that changes this file directly. ||
|| You should update the script that does the generation, which can be found in: ||
|| https://github.com/elastic/elastic-client-generator-js ||
|| ||
|| You can run the script with the following command: ||
|| npm run elasticsearch -- --version <version> ||
|| ||
|| ||
|| ||
===========================================================================================================================
////////
[discrete]
=== client.security.updateApiKey
Update an API key. Updates attributes of an existing API key. Users can only update API keys that they created or that were granted to them. Use this API to update API keys created by the create API Key or grant API Key APIs. If you need to apply the same update to many API keys, you can use bulk update API Keys to reduce overhead. Its not possible to update expired API keys, or API keys that have been invalidated by invalidate API Key. This API supports updates to an API keys access scope and metadata. The access scope of an API key is derived from the `role_descriptors` you specify in the request, and a snapshot of the owner users permissions at the time of the request. The snapshot of the owners permissions is updated automatically on every call. If you dont specify `role_descriptors` in the request, a call to this API might still change the API keys access scope. This change can occur if the owner users permissions have changed since the API key was created or last modified. To update another users API key, use the `run_as` feature to submit a request on behalf of another user. IMPORTANT: Its not possible to use an API key as the authentication credential for this API. To update an API key, the owner users credentials are required.
{ref}/security-api-update-api-key.html[{es} documentation]
[discrete]
==== Function signature
[source,ts]
----
(SecurityUpdateApiKeyRequest, options?): Promise<SecurityUpdateApiKeyResponse>
----
[discrete]
===== `SecurityUpdateApiKeyRequest`
[source,ts]
----
interface SecurityUpdateApiKeyRequest extends <<shared-type-request-base, RequestBase>> {
id: <<shared-type-id, Id>>
role_descriptors?: Record<string, SecurityRoleDescriptor>
metadata?: <<shared-type-metadata, Metadata>>
expiration?: <<shared-type-duration, Duration>>
}
----
[discrete]
===== `SecurityUpdateApiKeyResponse`
[source,ts]
----
interface SecurityUpdateApiKeyResponse {
updated: boolean
}
----