Skip to content

Commit 96f2095

Browse files
committed
WIP serverless custom role API changes
1 parent 76da5bd commit 96f2095

File tree

2 files changed

+60
-1
lines changed

2 files changed

+60
-1
lines changed

specification/security/_types/Privileges.ts

Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,40 +42,85 @@ export class ApplicationPrivileges {
4242
export enum ClusterPrivilege {
4343
all,
4444
cancel_task,
45+
/**
46+
* @availability stack
47+
*/
4548
create_snapshot,
49+
/**
50+
* @availability stack
51+
*/
4652
grant_api_key,
4753
manage,
4854
manage_api_key,
55+
/**
56+
* @availability stack
57+
*/
4958
manage_ccr,
5059
manage_enrich,
60+
/**
61+
* @availability stack
62+
*/
5163
manage_ilm,
5264
manage_index_templates,
5365
manage_ingest_pipelines,
5466
manage_logstash_pipelines,
5567
manage_ml,
68+
/**
69+
* @availability stack
70+
*/
5671
manage_oidc,
5772
manage_own_api_key,
5873
manage_pipeline,
5974
manage_rollup,
6075
manage_saml,
6176
manage_security,
77+
/**
78+
* @availability stack
79+
*/
6280
manage_service_account,
81+
/**
82+
* @availability stack
83+
*/
6384
manage_slm,
85+
/**
86+
* @availability stack
87+
*/
6488
manage_token,
6589
manage_transform,
90+
/**
91+
* @availability stack
92+
*/
6693
manage_user_profile,
94+
/**
95+
* @availability stack
96+
*/
6797
manage_watcher,
6898
monitor,
6999
monitor_ml,
70100
monitor_rollup,
71101
monitor_snapshot,
72102
monitor_text_structure,
73103
monitor_transform,
104+
/**
105+
* @availability stack
106+
*/
74107
monitor_watcher,
108+
/**
109+
* @availability stack
110+
*/
75111
read_ccr,
112+
/**
113+
* @availability stack
114+
*/
76115
read_ilm,
77116
read_pipeline,
117+
/**
118+
* @availability stack
119+
*/
78120
read_slm,
121+
/**
122+
* @availability stack
123+
*/
79124
transport_client
80125
}
81126

@@ -100,6 +145,7 @@ export class IndicesPrivileges {
100145
/**
101146
* Set to `true` if using wildcard or regular expressions for patterns that cover restricted indices. Implicitly, restricted indices have limited privileges that can cause pattern tests to fail. If restricted indices are explicitly included in the `names` list, Elasticsearch checks privileges against these indices regardless of the value set for `allow_restricted_indices`.
102147
* @server_default false
148+
* @availability stack
103149
*/
104150
allow_restricted_indices?: boolean
105151
}
@@ -176,11 +222,23 @@ export enum IndexPrivilege {
176222
index,
177223
maintenance,
178224
manage,
225+
/**
226+
* @availability stack
227+
*/
179228
manage_follow_index,
229+
/**
230+
* @availability stack
231+
*/
180232
manage_ilm,
233+
/**
234+
* @availability stack
235+
*/
181236
manage_leader_index,
182237
monitor,
183238
read,
239+
/**
240+
* @availability stack
241+
*/
184242
read_cross_cluster,
185243
view_index_metadata,
186244
write

specification/security/put_role/SecurityPutRoleRequest.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ import { Metadata, Name, Refresh } from '@_types/common'
3232
* The create or update roles API cannot update roles that are defined in roles files.
3333
* @rest_spec_name security.put_role
3434
* @availability stack since=0.0.0 stability=stable
35-
* @availability serverless stability=stable visibility=private
35+
* @availability serverless stability=stable visibility=public
3636
* @cluster_privileges manage_security
3737
*/
3838
export interface Request extends RequestBase {
@@ -56,6 +56,7 @@ export interface Request extends RequestBase {
5656
cluster?: ClusterPrivilege[]
5757
/**
5858
* An object defining global privileges. A global privilege is a form of cluster privilege that is request-aware. Support for global privileges is currently limited to the management of application privileges.
59+
* @availability stack
5960
*/
6061
global?: Dictionary<string, UserDefinedValue>
6162
/**

0 commit comments

Comments
 (0)