Skip to content

Commit b906c30

Browse files
authored
Revert "API specification changes for custom roles (#2491)"
This reverts commit 2731ca8.
1 parent 2731ca8 commit b906c30

File tree

8 files changed

+82
-659
lines changed

8 files changed

+82
-659
lines changed

output/openapi/elasticsearch-serverless-openapi.json

Lines changed: 33 additions & 310 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

output/schema/schema.json

Lines changed: 25 additions & 121 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

output/schema/schema/schema.json

Lines changed: 15 additions & 118 deletions
Large diffs are not rendered by default.

output/schema/validation-errors.json

Lines changed: 0 additions & 11 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

output/typescript/types.ts

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

specification/security/_types/Privileges.ts

Lines changed: 5 additions & 94 deletions
Original file line numberDiff line numberDiff line change
@@ -42,133 +42,57 @@ export class ApplicationPrivileges {
4242
export enum ClusterPrivilege {
4343
all,
4444
cancel_task,
45-
/**
46-
* @availability stack
47-
*/
4845
create_snapshot,
49-
/**
50-
* @availability stack
51-
*/
52-
grant_api_key,
53-
/**
54-
* @availability stack
55-
*/
5646
cross_cluster_replication,
57-
/**
58-
* @availability stack
59-
*/
6047
cross_cluster_search,
61-
/**
62-
* @availability stack
63-
*/
6448
delegate_pki,
49+
grant_api_key,
6550
manage,
6651
manage_api_key,
67-
/**
68-
* @availability stack
69-
*/
7052
manage_autoscaling,
7153
manage_behavioral_analytics,
72-
/**
73-
* @availability stack
74-
*/
7554
manage_ccr,
7655
manage_data_frame_transforms,
7756
manage_data_stream_global_retention,
7857
manage_enrich,
79-
/**
80-
* @availability stack
81-
*/
8258
manage_ilm,
8359
manage_index_templates,
84-
/**
85-
* @availability stack
86-
*/
8760
manage_inference,
8861
manage_ingest_pipelines,
8962
manage_logstash_pipelines,
9063
manage_ml,
91-
/**
92-
* @availability stack
93-
*/
9464
manage_oidc,
9565
manage_own_api_key,
9666
manage_pipeline,
97-
/**
98-
* @availability stack
99-
*/
10067
manage_rollup,
101-
/**
102-
* @availability stack
103-
*/
10468
manage_saml,
10569
manage_search_application,
10670
manage_search_query_rules,
10771
manage_search_synonyms,
10872
manage_security,
109-
/**
110-
* @availability stack
111-
*/
11273
manage_service_account,
113-
/**
114-
* @availability stack
115-
*/
11674
manage_slm,
117-
/**
118-
* @availability stack
119-
*/
12075
manage_token,
12176
manage_transform,
122-
/**
123-
* @availability stack
124-
*/
12577
manage_user_profile,
126-
/**
127-
* @availability stack
128-
*/
12978
manage_watcher,
13079
monitor,
13180
monitor_data_frame_transforms,
13281
monitor_data_stream_global_retention,
13382
monitor_enrich,
13483
monitor_inference,
13584
monitor_ml,
136-
/**
137-
* @availability stack
138-
*/
13985
monitor_rollup,
140-
/**
141-
* @availability stack
142-
*/
14386
monitor_snapshot,
144-
/**
145-
* @availability stack
146-
*/
14787
monitor_text_structure,
14888
monitor_transform,
149-
/**
150-
* @availability stack
151-
*/
15289
monitor_watcher,
153-
/**
154-
* @availability stack
155-
*/
156-
read_ccr,
157-
/**
158-
* @availability stack
159-
*/
160-
read_ilm,
161-
read_pipeline,
162-
/**
163-
* @availability stack
164-
*/
165-
read_slm,
166-
/**
167-
* @availability stack
168-
*/
169-
transport_client,
17090
none,
17191
post_behavioral_analytics_event,
92+
read_ccr,
93+
read_connector_secrets,
94+
read_fleet_secrets,
95+
read_ilm,
17296
read_pipeline,
17397
read_security,
17498
read_slm,
@@ -198,7 +122,6 @@ export class IndicesPrivileges {
198122
/**
199123
* Set to `true` if using wildcard or regular expressions for patterns that cover restricted indices. Implicitly, restricted indices have limited privileges that can cause pattern tests to fail. If restricted indices are explicitly included in the `names` list, Elasticsearch checks privileges against these indices regardless of the value set for `allow_restricted_indices`.
200124
* @server_default false
201-
* @availability stack
202125
*/
203126
allow_restricted_indices?: boolean
204127
}
@@ -277,24 +200,12 @@ export enum IndexPrivilege {
277200
maintenance,
278201
manage,
279202
manage_data_stream_lifecycle,
280-
/**
281-
* @availability stack
282-
*/
283203
manage_follow_index,
284-
/**
285-
* @availability stack
286-
*/
287204
manage_ilm,
288-
/**
289-
* @availability stack
290-
*/
291205
manage_leader_index,
292206
monitor,
293207
none,
294208
read,
295-
/**
296-
* @availability stack
297-
*/
298209
read_cross_cluster,
299210
view_index_metadata,
300211
write

specification/security/get_role/SecurityGetRoleRequest.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ import { Names } from '@_types/common'
2525
* The get roles API cannot retrieve roles that are defined in roles files.
2626
* @rest_spec_name security.get_role
2727
* @availability stack since=0.0.0 stability=stable
28-
* @availability serverless stability=stable visibility=public
28+
* @availability serverless stability=stable visibility=private
2929
* @cluster_privileges manage_security
3030
*/
3131
export interface Request extends RequestBase {

specification/security/put_role/SecurityPutRoleRequest.ts

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ import { Metadata, Name, Refresh } from '@_types/common'
3232
* The create or update roles API cannot update roles that are defined in roles files.
3333
* @rest_spec_name security.put_role
3434
* @availability stack since=0.0.0 stability=stable
35-
* @availability serverless stability=stable visibility=public
35+
* @availability serverless stability=stable visibility=private
3636
* @cluster_privileges manage_security
3737
*/
3838
export interface Request extends RequestBase {
@@ -56,7 +56,6 @@ export interface Request extends RequestBase {
5656
cluster?: ClusterPrivilege[]
5757
/**
5858
* An object defining global privileges. A global privilege is a form of cluster privilege that is request-aware. Support for global privileges is currently limited to the management of application privileges.
59-
* @availability stack
6059
*/
6160
global?: Dictionary<string, UserDefinedValue>
6261
/**
@@ -68,7 +67,7 @@ export interface Request extends RequestBase {
6867
*/
6968
metadata?: Metadata
7069
/**
71-
* A list of users that the owners of this role can impersonate. *Note*: in Serverless, the run-as feature is disabled. For API compatibility, you can still specify an empty `run_as` field, but a non-empty list will be rejected.
70+
* A list of users that the owners of this role can impersonate.
7271
* @doc_id run-as-privilege
7372
*/
7473
run_as?: string[]

0 commit comments

Comments
 (0)