Auto-generated code for 8.11 (#2091)
This commit is contained in:
@ -8121,6 +8121,7 @@ client.security.putRoleMapping({ name })
|
||||
** *`enabled` (Optional, boolean)*
|
||||
** *`metadata` (Optional, Record<string, User-defined value>)*
|
||||
** *`roles` (Optional, string[])*
|
||||
** *`role_templates` (Optional, { format, template }[])*
|
||||
** *`rules` (Optional, { any, all, field, except })*
|
||||
** *`run_as` (Optional, string[])*
|
||||
** *`refresh` (Optional, Enum(true | false | "wait_for"))*: If `true` (the default) then refresh the affected shards to make this operation visible to search, if `wait_for` then wait for a refresh to make this operation visible to search, if `false` then do nothing with refreshes.
|
||||
|
||||
@ -1400,7 +1400,7 @@ export default class Security {
|
||||
async putRoleMapping (this: That, params: T.SecurityPutRoleMappingRequest | TB.SecurityPutRoleMappingRequest, options?: TransportRequestOptions): Promise<T.SecurityPutRoleMappingResponse>
|
||||
async putRoleMapping (this: That, params: T.SecurityPutRoleMappingRequest | TB.SecurityPutRoleMappingRequest, options?: TransportRequestOptions): Promise<any> {
|
||||
const acceptedPath: string[] = ['name']
|
||||
const acceptedBody: string[] = ['enabled', 'metadata', 'roles', 'rules', 'run_as']
|
||||
const acceptedBody: string[] = ['enabled', 'metadata', 'roles', 'role_templates', 'rules', 'run_as']
|
||||
const querystring: Record<string, any> = {}
|
||||
// @ts-expect-error
|
||||
const userBody: any = params?.body
|
||||
|
||||
@ -15752,7 +15752,7 @@ export interface SecurityRoleMapping {
|
||||
metadata: Metadata
|
||||
roles: string[]
|
||||
rules: SecurityRoleMappingRule
|
||||
role_templates?: SecurityGetRoleRoleTemplate[]
|
||||
role_templates?: SecurityRoleTemplate[]
|
||||
}
|
||||
|
||||
export interface SecurityRoleMappingRule {
|
||||
@ -15762,6 +15762,11 @@ export interface SecurityRoleMappingRule {
|
||||
except?: SecurityRoleMappingRule
|
||||
}
|
||||
|
||||
export interface SecurityRoleTemplate {
|
||||
format?: SecurityTemplateFormat
|
||||
template: Script
|
||||
}
|
||||
|
||||
export type SecurityRoleTemplateInlineQuery = string | QueryDslQueryContainer
|
||||
|
||||
export interface SecurityRoleTemplateInlineScript extends ScriptBase {
|
||||
@ -15776,6 +15781,8 @@ export interface SecurityRoleTemplateQuery {
|
||||
|
||||
export type SecurityRoleTemplateScript = SecurityRoleTemplateInlineScript | SecurityRoleTemplateInlineQuery | StoredScriptId
|
||||
|
||||
export type SecurityTemplateFormat = 'string' | 'json'
|
||||
|
||||
export interface SecurityTransientMetadataConfig {
|
||||
enabled: boolean
|
||||
}
|
||||
@ -16100,17 +16107,10 @@ export interface SecurityGetRoleRole {
|
||||
run_as: string[]
|
||||
transient_metadata: SecurityTransientMetadataConfig
|
||||
applications: SecurityApplicationPrivileges[]
|
||||
role_templates?: SecurityGetRoleRoleTemplate[]
|
||||
role_templates?: SecurityRoleTemplate[]
|
||||
global?: Record<string, Record<string, Record<string, string[]>>>
|
||||
}
|
||||
|
||||
export interface SecurityGetRoleRoleTemplate {
|
||||
format?: SecurityGetRoleTemplateFormat
|
||||
template: Script
|
||||
}
|
||||
|
||||
export type SecurityGetRoleTemplateFormat = 'string' | 'json'
|
||||
|
||||
export interface SecurityGetRoleMappingRequest extends RequestBase {
|
||||
name?: Names
|
||||
}
|
||||
@ -16369,6 +16369,7 @@ export interface SecurityPutRoleMappingRequest extends RequestBase {
|
||||
enabled?: boolean
|
||||
metadata?: Metadata
|
||||
roles?: string[]
|
||||
role_templates?: SecurityRoleTemplate[]
|
||||
rules?: SecurityRoleMappingRule
|
||||
run_as?: string[]
|
||||
}
|
||||
|
||||
@ -16063,7 +16063,7 @@ export interface SecurityRoleMapping {
|
||||
metadata: Metadata
|
||||
roles: string[]
|
||||
rules: SecurityRoleMappingRule
|
||||
role_templates?: SecurityGetRoleRoleTemplate[]
|
||||
role_templates?: SecurityRoleTemplate[]
|
||||
}
|
||||
|
||||
export interface SecurityRoleMappingRule {
|
||||
@ -16073,6 +16073,11 @@ export interface SecurityRoleMappingRule {
|
||||
except?: SecurityRoleMappingRule
|
||||
}
|
||||
|
||||
export interface SecurityRoleTemplate {
|
||||
format?: SecurityTemplateFormat
|
||||
template: Script
|
||||
}
|
||||
|
||||
export type SecurityRoleTemplateInlineQuery = string | QueryDslQueryContainer
|
||||
|
||||
export interface SecurityRoleTemplateInlineScript extends ScriptBase {
|
||||
@ -16087,6 +16092,8 @@ export interface SecurityRoleTemplateQuery {
|
||||
|
||||
export type SecurityRoleTemplateScript = SecurityRoleTemplateInlineScript | SecurityRoleTemplateInlineQuery | StoredScriptId
|
||||
|
||||
export type SecurityTemplateFormat = 'string' | 'json'
|
||||
|
||||
export interface SecurityTransientMetadataConfig {
|
||||
enabled: boolean
|
||||
}
|
||||
@ -16420,17 +16427,10 @@ export interface SecurityGetRoleRole {
|
||||
run_as: string[]
|
||||
transient_metadata: SecurityTransientMetadataConfig
|
||||
applications: SecurityApplicationPrivileges[]
|
||||
role_templates?: SecurityGetRoleRoleTemplate[]
|
||||
role_templates?: SecurityRoleTemplate[]
|
||||
global?: Record<string, Record<string, Record<string, string[]>>>
|
||||
}
|
||||
|
||||
export interface SecurityGetRoleRoleTemplate {
|
||||
format?: SecurityGetRoleTemplateFormat
|
||||
template: Script
|
||||
}
|
||||
|
||||
export type SecurityGetRoleTemplateFormat = 'string' | 'json'
|
||||
|
||||
export interface SecurityGetRoleMappingRequest extends RequestBase {
|
||||
name?: Names
|
||||
}
|
||||
@ -16713,6 +16713,7 @@ export interface SecurityPutRoleMappingRequest extends RequestBase {
|
||||
enabled?: boolean
|
||||
metadata?: Metadata
|
||||
roles?: string[]
|
||||
role_templates?: SecurityRoleTemplate[]
|
||||
rules?: SecurityRoleMappingRule
|
||||
run_as?: string[]
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user