Skip to content

Commit dda20a4

Browse files
Auto-generated code for 8.11 (#2091)
1 parent 7cc6824 commit dda20a4

File tree

4 files changed

+22
-19
lines changed

4 files changed

+22
-19
lines changed

docs/reference.asciidoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8121,6 +8121,7 @@ client.security.putRoleMapping({ name })
81218121
** *`enabled` (Optional, boolean)*
81228122
** *`metadata` (Optional, Record<string, User-defined value>)*
81238123
** *`roles` (Optional, string[])*
8124+
** *`role_templates` (Optional, { format, template }[])*
81248125
** *`rules` (Optional, { any, all, field, except })*
81258126
** *`run_as` (Optional, string[])*
81268127
** *`refresh` (Optional, Enum(true | false | "wait_for"))*: If `true` (the default) then refresh the affected shards to make this operation visible to search, if `wait_for` then wait for a refresh to make this operation visible to search, if `false` then do nothing with refreshes.

src/api/api/security.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1400,7 +1400,7 @@ export default class Security {
14001400
async putRoleMapping (this: That, params: T.SecurityPutRoleMappingRequest | TB.SecurityPutRoleMappingRequest, options?: TransportRequestOptions): Promise<T.SecurityPutRoleMappingResponse>
14011401
async putRoleMapping (this: That, params: T.SecurityPutRoleMappingRequest | TB.SecurityPutRoleMappingRequest, options?: TransportRequestOptions): Promise<any> {
14021402
const acceptedPath: string[] = ['name']
1403-
const acceptedBody: string[] = ['enabled', 'metadata', 'roles', 'rules', 'run_as']
1403+
const acceptedBody: string[] = ['enabled', 'metadata', 'roles', 'role_templates', 'rules', 'run_as']
14041404
const querystring: Record<string, any> = {}
14051405
// @ts-expect-error
14061406
const userBody: any = params?.body

src/api/types.ts

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -15752,7 +15752,7 @@ export interface SecurityRoleMapping {
1575215752
metadata: Metadata
1575315753
roles: string[]
1575415754
rules: SecurityRoleMappingRule
15755-
role_templates?: SecurityGetRoleRoleTemplate[]
15755+
role_templates?: SecurityRoleTemplate[]
1575615756
}
1575715757

1575815758
export interface SecurityRoleMappingRule {
@@ -15762,6 +15762,11 @@ export interface SecurityRoleMappingRule {
1576215762
except?: SecurityRoleMappingRule
1576315763
}
1576415764

15765+
export interface SecurityRoleTemplate {
15766+
format?: SecurityTemplateFormat
15767+
template: Script
15768+
}
15769+
1576515770
export type SecurityRoleTemplateInlineQuery = string | QueryDslQueryContainer
1576615771

1576715772
export interface SecurityRoleTemplateInlineScript extends ScriptBase {
@@ -15776,6 +15781,8 @@ export interface SecurityRoleTemplateQuery {
1577615781

1577715782
export type SecurityRoleTemplateScript = SecurityRoleTemplateInlineScript | SecurityRoleTemplateInlineQuery | StoredScriptId
1577815783

15784+
export type SecurityTemplateFormat = 'string' | 'json'
15785+
1577915786
export interface SecurityTransientMetadataConfig {
1578015787
enabled: boolean
1578115788
}
@@ -16100,17 +16107,10 @@ export interface SecurityGetRoleRole {
1610016107
run_as: string[]
1610116108
transient_metadata: SecurityTransientMetadataConfig
1610216109
applications: SecurityApplicationPrivileges[]
16103-
role_templates?: SecurityGetRoleRoleTemplate[]
16110+
role_templates?: SecurityRoleTemplate[]
1610416111
global?: Record<string, Record<string, Record<string, string[]>>>
1610516112
}
1610616113

16107-
export interface SecurityGetRoleRoleTemplate {
16108-
format?: SecurityGetRoleTemplateFormat
16109-
template: Script
16110-
}
16111-
16112-
export type SecurityGetRoleTemplateFormat = 'string' | 'json'
16113-
1611416114
export interface SecurityGetRoleMappingRequest extends RequestBase {
1611516115
name?: Names
1611616116
}
@@ -16369,6 +16369,7 @@ export interface SecurityPutRoleMappingRequest extends RequestBase {
1636916369
enabled?: boolean
1637016370
metadata?: Metadata
1637116371
roles?: string[]
16372+
role_templates?: SecurityRoleTemplate[]
1637216373
rules?: SecurityRoleMappingRule
1637316374
run_as?: string[]
1637416375
}

src/api/typesWithBodyKey.ts

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -16063,7 +16063,7 @@ export interface SecurityRoleMapping {
1606316063
metadata: Metadata
1606416064
roles: string[]
1606516065
rules: SecurityRoleMappingRule
16066-
role_templates?: SecurityGetRoleRoleTemplate[]
16066+
role_templates?: SecurityRoleTemplate[]
1606716067
}
1606816068

1606916069
export interface SecurityRoleMappingRule {
@@ -16073,6 +16073,11 @@ export interface SecurityRoleMappingRule {
1607316073
except?: SecurityRoleMappingRule
1607416074
}
1607516075

16076+
export interface SecurityRoleTemplate {
16077+
format?: SecurityTemplateFormat
16078+
template: Script
16079+
}
16080+
1607616081
export type SecurityRoleTemplateInlineQuery = string | QueryDslQueryContainer
1607716082

1607816083
export interface SecurityRoleTemplateInlineScript extends ScriptBase {
@@ -16087,6 +16092,8 @@ export interface SecurityRoleTemplateQuery {
1608716092

1608816093
export type SecurityRoleTemplateScript = SecurityRoleTemplateInlineScript | SecurityRoleTemplateInlineQuery | StoredScriptId
1608916094

16095+
export type SecurityTemplateFormat = 'string' | 'json'
16096+
1609016097
export interface SecurityTransientMetadataConfig {
1609116098
enabled: boolean
1609216099
}
@@ -16420,17 +16427,10 @@ export interface SecurityGetRoleRole {
1642016427
run_as: string[]
1642116428
transient_metadata: SecurityTransientMetadataConfig
1642216429
applications: SecurityApplicationPrivileges[]
16423-
role_templates?: SecurityGetRoleRoleTemplate[]
16430+
role_templates?: SecurityRoleTemplate[]
1642416431
global?: Record<string, Record<string, Record<string, string[]>>>
1642516432
}
1642616433

16427-
export interface SecurityGetRoleRoleTemplate {
16428-
format?: SecurityGetRoleTemplateFormat
16429-
template: Script
16430-
}
16431-
16432-
export type SecurityGetRoleTemplateFormat = 'string' | 'json'
16433-
1643416434
export interface SecurityGetRoleMappingRequest extends RequestBase {
1643516435
name?: Names
1643616436
}
@@ -16713,6 +16713,7 @@ export interface SecurityPutRoleMappingRequest extends RequestBase {
1671316713
enabled?: boolean
1671416714
metadata?: Metadata
1671516715
roles?: string[]
16716+
role_templates?: SecurityRoleTemplate[]
1671616717
rules?: SecurityRoleMappingRule
1671716718
run_as?: string[]
1671816719
}

0 commit comments

Comments
 (0)