Auto-generated code for 8.11 (#2091)

This commit is contained in:
Elastic Machine
2023-12-13 03:56:49 +11:00
committed by GitHub
parent 7cc6824974
commit dda20a4d07
4 changed files with 22 additions and 19 deletions

View File

@ -8121,6 +8121,7 @@ client.security.putRoleMapping({ name })
** *`enabled` (Optional, boolean)*
** *`metadata` (Optional, Record<string, User-defined value>)*
** *`roles` (Optional, string[])*
** *`role_templates` (Optional, { format, template }[])*
** *`rules` (Optional, { any, all, field, except })*
** *`run_as` (Optional, string[])*
** *`refresh` (Optional, Enum(true | false | "wait_for"))*: If `true` (the default) then refresh the affected shards to make this operation visible to search, if `wait_for` then wait for a refresh to make this operation visible to search, if `false` then do nothing with refreshes.

View File

@ -1400,7 +1400,7 @@ export default class Security {
async putRoleMapping (this: That, params: T.SecurityPutRoleMappingRequest | TB.SecurityPutRoleMappingRequest, options?: TransportRequestOptions): Promise<T.SecurityPutRoleMappingResponse>
async putRoleMapping (this: That, params: T.SecurityPutRoleMappingRequest | TB.SecurityPutRoleMappingRequest, options?: TransportRequestOptions): Promise<any> {
const acceptedPath: string[] = ['name']
const acceptedBody: string[] = ['enabled', 'metadata', 'roles', 'rules', 'run_as']
const acceptedBody: string[] = ['enabled', 'metadata', 'roles', 'role_templates', 'rules', 'run_as']
const querystring: Record<string, any> = {}
// @ts-expect-error
const userBody: any = params?.body

View File

@ -15752,7 +15752,7 @@ export interface SecurityRoleMapping {
metadata: Metadata
roles: string[]
rules: SecurityRoleMappingRule
role_templates?: SecurityGetRoleRoleTemplate[]
role_templates?: SecurityRoleTemplate[]
}
export interface SecurityRoleMappingRule {
@ -15762,6 +15762,11 @@ export interface SecurityRoleMappingRule {
except?: SecurityRoleMappingRule
}
export interface SecurityRoleTemplate {
format?: SecurityTemplateFormat
template: Script
}
export type SecurityRoleTemplateInlineQuery = string | QueryDslQueryContainer
export interface SecurityRoleTemplateInlineScript extends ScriptBase {
@ -15776,6 +15781,8 @@ export interface SecurityRoleTemplateQuery {
export type SecurityRoleTemplateScript = SecurityRoleTemplateInlineScript | SecurityRoleTemplateInlineQuery | StoredScriptId
export type SecurityTemplateFormat = 'string' | 'json'
export interface SecurityTransientMetadataConfig {
enabled: boolean
}
@ -16100,17 +16107,10 @@ export interface SecurityGetRoleRole {
run_as: string[]
transient_metadata: SecurityTransientMetadataConfig
applications: SecurityApplicationPrivileges[]
role_templates?: SecurityGetRoleRoleTemplate[]
role_templates?: SecurityRoleTemplate[]
global?: Record<string, Record<string, Record<string, string[]>>>
}
export interface SecurityGetRoleRoleTemplate {
format?: SecurityGetRoleTemplateFormat
template: Script
}
export type SecurityGetRoleTemplateFormat = 'string' | 'json'
export interface SecurityGetRoleMappingRequest extends RequestBase {
name?: Names
}
@ -16369,6 +16369,7 @@ export interface SecurityPutRoleMappingRequest extends RequestBase {
enabled?: boolean
metadata?: Metadata
roles?: string[]
role_templates?: SecurityRoleTemplate[]
rules?: SecurityRoleMappingRule
run_as?: string[]
}

View File

@ -16063,7 +16063,7 @@ export interface SecurityRoleMapping {
metadata: Metadata
roles: string[]
rules: SecurityRoleMappingRule
role_templates?: SecurityGetRoleRoleTemplate[]
role_templates?: SecurityRoleTemplate[]
}
export interface SecurityRoleMappingRule {
@ -16073,6 +16073,11 @@ export interface SecurityRoleMappingRule {
except?: SecurityRoleMappingRule
}
export interface SecurityRoleTemplate {
format?: SecurityTemplateFormat
template: Script
}
export type SecurityRoleTemplateInlineQuery = string | QueryDslQueryContainer
export interface SecurityRoleTemplateInlineScript extends ScriptBase {
@ -16087,6 +16092,8 @@ export interface SecurityRoleTemplateQuery {
export type SecurityRoleTemplateScript = SecurityRoleTemplateInlineScript | SecurityRoleTemplateInlineQuery | StoredScriptId
export type SecurityTemplateFormat = 'string' | 'json'
export interface SecurityTransientMetadataConfig {
enabled: boolean
}
@ -16420,17 +16427,10 @@ export interface SecurityGetRoleRole {
run_as: string[]
transient_metadata: SecurityTransientMetadataConfig
applications: SecurityApplicationPrivileges[]
role_templates?: SecurityGetRoleRoleTemplate[]
role_templates?: SecurityRoleTemplate[]
global?: Record<string, Record<string, Record<string, string[]>>>
}
export interface SecurityGetRoleRoleTemplate {
format?: SecurityGetRoleTemplateFormat
template: Script
}
export type SecurityGetRoleTemplateFormat = 'string' | 'json'
export interface SecurityGetRoleMappingRequest extends RequestBase {
name?: Names
}
@ -16713,6 +16713,7 @@ export interface SecurityPutRoleMappingRequest extends RequestBase {
enabled?: boolean
metadata?: Metadata
roles?: string[]
role_templates?: SecurityRoleTemplate[]
rules?: SecurityRoleMappingRule
run_as?: string[]
}