Skip to content

Commit 334fe3b

Browse files
avoid extending non base class (#3852) (#3855)
(cherry picked from commit d22ee5a) Co-authored-by: Laura Trotta <[email protected]>
1 parent 43c1ab0 commit 334fe3b

File tree

5 files changed

+181
-37
lines changed

5 files changed

+181
-37
lines changed

output/openapi/elasticsearch-openapi.json

Lines changed: 49 additions & 11 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

output/schema/schema-serverless.json

Lines changed: 7 additions & 7 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

output/schema/schema.json

Lines changed: 97 additions & 17 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

output/typescript/types.ts

Lines changed: 6 additions & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

specification/security/_types/Privileges.ts

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -313,7 +313,28 @@ export class UserIndicesPrivileges {
313313
allow_restricted_indices: boolean
314314
}
315315

316-
export class RemoteUserIndicesPrivileges extends UserIndicesPrivileges {
316+
export class RemoteUserIndicesPrivileges {
317+
/**
318+
* The document fields that the owners of the role have read access to.
319+
* @ext_doc_id field-and-document-access-control
320+
*/
321+
field_security?: FieldSecurity[]
322+
/**
323+
* A list of indices (or index name patterns) to which the permissions in this entry apply.
324+
*/
325+
names: IndexName | IndexName[]
326+
/**
327+
* The index level privileges that owners of the role have on the specified indices.
328+
*/
329+
privileges: IndexPrivilege[]
330+
/**
331+
* Search queries that define the documents the user has access to. A document within the specified indices must match these queries for it to be accessible by the owners of the role.
332+
*/
333+
query?: IndicesPrivilegesQuery[]
334+
/**
335+
* Set to `true` if using wildcard or regular expressions for patterns that cover restricted indices. Implicitly, restricted indices have limited privileges that can cause pattern tests to fail. If restricted indices are explicitly included in the `names` list, Elasticsearch checks privileges against these indices regardless of the value set for `allow_restricted_indices`.
336+
*/
337+
allow_restricted_indices: boolean
317338
clusters: string[]
318339
}
319340

0 commit comments

Comments
 (0)