Skip to content

Commit 0c6f323

Browse files
Auto-generated code for 8.15 (#2313)
1 parent 04a9eb4 commit 0c6f323

File tree

5 files changed

+789
-216
lines changed

5 files changed

+789
-216
lines changed

docs/reference.asciidoc

Lines changed: 121 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -813,7 +813,7 @@ client.reindex({ dest, source })
813813
** *`source` ({ index, query, remote, size, slice, sort, _source, runtime_mappings })*: The source you are copying from.
814814
** *`conflicts` (Optional, Enum("abort" | "proceed"))*: Set to proceed to continue reindexing even if there are conflicts.
815815
** *`max_docs` (Optional, number)*: The maximum number of documents to reindex.
816-
** *`script` (Optional, { lang, options, source } | { id })*: The script to run to update the document source or metadata when reindexing.
816+
** *`script` (Optional, { source, id, params, lang, options })*: The script to run to update the document source or metadata when reindexing.
817817
** *`size` (Optional, number)*
818818
** *`refresh` (Optional, boolean)*: If `true`, the request refreshes affected shards to make this operation visible to search.
819819
** *`requests_per_second` (Optional, float)*: The throttle for this request in sub-requests per second.
@@ -882,7 +882,7 @@ client.scriptsPainlessExecute({ ... })
882882
* *Request (object):*
883883
** *`context` (Optional, string)*: The context that the script should run in.
884884
** *`context_setup` (Optional, { document, index, query })*: Additional parameters for the `context`.
885-
** *`script` (Optional, { lang, options, source })*: The Painless script to execute.
885+
** *`script` (Optional, { source, id, params, lang, options })*: The Painless script to execute.
886886

887887
[discrete]
888888
=== scroll
@@ -1255,7 +1255,7 @@ client.update({ id, index })
12551255
to 'noop' if no change to the document occurred.
12561256
** *`doc` (Optional, object)*: A partial update to an existing document.
12571257
** *`doc_as_upsert` (Optional, boolean)*: Set to true to use the contents of 'doc' as the value of 'upsert'
1258-
** *`script` (Optional, { lang, options, source } | { id })*: Script to execute to update the document.
1258+
** *`script` (Optional, { source, id, params, lang, options })*: Script to execute to update the document.
12591259
** *`scripted_upsert` (Optional, boolean)*: Set to true to execute the script whether or not the document exists.
12601260
** *`_source` (Optional, boolean | { excludes, includes })*: Set to false to disable source retrieval. You can also specify a comma-separated
12611261
list of the fields you want to retrieve.
@@ -1298,7 +1298,7 @@ Supports wildcards (`*`).
12981298
To search all data streams or indices, omit this parameter or use `*` or `_all`.
12991299
** *`max_docs` (Optional, number)*: The maximum number of documents to update.
13001300
** *`query` (Optional, { bool, boosting, common, combined_fields, constant_score, dis_max, distance_feature, exists, function_score, fuzzy, geo_bounding_box, geo_distance, geo_polygon, geo_shape, has_child, has_parent, ids, intervals, knn, match, match_all, match_bool_prefix, match_none, match_phrase, match_phrase_prefix, more_like_this, multi_match, nested, parent_id, percolate, pinned, prefix, query_string, range, rank_feature, regexp, rule, script, script_score, semantic, shape, simple_query_string, span_containing, span_field_masking, span_first, span_multi, span_near, span_not, span_or, span_term, span_within, sparse_vector, term, terms, terms_set, text_expansion, weighted_tokens, wildcard, wrapper, type })*: Specifies the documents to update using the Query DSL.
1301-
** *`script` (Optional, { lang, options, source } | { id })*: The script to run to update the document source or metadata when updating.
1301+
** *`script` (Optional, { source, id, params, lang, options })*: The script to run to update the document source or metadata when updating.
13021302
** *`slice` (Optional, { field, id, max })*: Slice the request manually using the provided slice ID and total number of slices.
13031303
** *`conflicts` (Optional, Enum("abort" | "proceed"))*: What to do if update by query hits version conflicts: `abort` or `proceed`.
13041304
** *`allow_no_indices` (Optional, boolean)*: If `false`, the request returns an error if any wildcard expression, index alias, or `_all` value targets only missing or closed indices.
@@ -5084,6 +5084,15 @@ client.inference.put({ inference_id })
50845084

50855085
[discrete]
50865086
=== ingest
5087+
[discrete]
5088+
==== delete_geoip_database
5089+
Deletes a geoip database configuration
5090+
[source,ts]
5091+
----
5092+
client.ingest.deleteGeoipDatabase()
5093+
----
5094+
5095+
50875096
[discrete]
50885097
==== delete_pipeline
50895098
Deletes one or more existing ingest pipeline.
@@ -5116,6 +5125,15 @@ client.ingest.geoIpStats()
51165125
----
51175126

51185127

5128+
[discrete]
5129+
==== get_geoip_database
5130+
Returns geoip database configuration.
5131+
[source,ts]
5132+
----
5133+
client.ingest.getGeoipDatabase()
5134+
----
5135+
5136+
51195137
[discrete]
51205138
==== get_pipeline
51215139
Returns information about one or more ingest pipelines.
@@ -5151,6 +5169,15 @@ client.ingest.processorGrok()
51515169
----
51525170

51535171

5172+
[discrete]
5173+
==== put_geoip_database
5174+
Puts the configuration for a geoip database to be downloaded
5175+
[source,ts]
5176+
----
5177+
client.ingest.putGeoipDatabase()
5178+
----
5179+
5180+
51545181
[discrete]
51555182
==== put_pipeline
51565183
Creates or updates an ingest pipeline.
@@ -8193,6 +8220,42 @@ client.security.authenticate()
81938220
----
81948221

81958222

8223+
[discrete]
8224+
==== bulk_delete_role
8225+
The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.
8226+
The bulk delete roles API cannot delete roles that are defined in roles files.
8227+
8228+
{ref}/security-api-bulk-delete-role.html[Endpoint documentation]
8229+
[source,ts]
8230+
----
8231+
client.security.bulkDeleteRole({ names })
8232+
----
8233+
8234+
[discrete]
8235+
==== Arguments
8236+
8237+
* *Request (object):*
8238+
** *`names` (string[])*: An array of role names to delete
8239+
** *`refresh` (Optional, Enum(true | false | "wait_for"))*: If `true` (the default) then refresh the affected shards to make this operation visible to search, if `wait_for` then wait for a refresh to make this operation visible to search, if `false` then do nothing with refreshes.
8240+
8241+
[discrete]
8242+
==== bulk_put_role
8243+
The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.
8244+
The bulk create or update roles API cannot update roles that are defined in roles files.
8245+
8246+
{ref}/security-api-bulk-put-role.html[Endpoint documentation]
8247+
[source,ts]
8248+
----
8249+
client.security.bulkPutRole({ roles })
8250+
----
8251+
8252+
[discrete]
8253+
==== Arguments
8254+
8255+
* *Request (object):*
8256+
** *`roles` (Record<string, { cluster, indices, global, applications, metadata, run_as, description, transient_metadata }>)*: A dictionary of role name to RoleDescriptor objects to add or update
8257+
** *`refresh` (Optional, Enum(true | false | "wait_for"))*: If `true` (the default) then refresh the affected shards to make this operation visible to search, if `wait_for` then wait for a refresh to make this operation visible to search, if `false` then do nothing with refreshes.
8258+
81968259
[discrete]
81978260
==== bulk_update_api_keys
81988261
Updates the attributes of multiple existing API keys.
@@ -8332,7 +8395,7 @@ client.security.createApiKey({ ... })
83328395
* *Request (object):*
83338396
** *`expiration` (Optional, string | -1 | 0)*: Expiration time for the API key. By default, API keys never expire.
83348397
** *`name` (Optional, string)*: Specifies the name for this API key.
8335-
** *`role_descriptors` (Optional, Record<string, { cluster, indices, global, applications, metadata, run_as, transient_metadata }>)*: An array of role descriptors for this API key. This parameter is optional. When it is not specified or is an empty array, then the API key will have a point in time snapshot of permissions of the authenticated user. If you supply role descriptors then the resultant permissions would be an intersection of API keys permissions and authenticated user’s permissions thereby limiting the access scope for API keys. The structure of role descriptor is the same as the request for create role API. For more details, see create or update roles API.
8398+
** *`role_descriptors` (Optional, Record<string, { cluster, indices, global, applications, metadata, run_as, description, transient_metadata }>)*: An array of role descriptors for this API key. This parameter is optional. When it is not specified or is an empty array, then the API key will have a point in time snapshot of permissions of the authenticated user. If you supply role descriptors then the resultant permissions would be an intersection of API keys permissions and authenticated user’s permissions thereby limiting the access scope for API keys. The structure of role descriptor is the same as the request for create role API. For more details, see create or update roles API.
83368399
** *`metadata` (Optional, Record<string, User-defined value>)*: Arbitrary metadata that you want to associate with the API key. It supports nested data structure. Within the metadata object, keys beginning with `_` are reserved for system usage.
83378400
** *`refresh` (Optional, Enum(true | false | "wait_for"))*: If `true` (the default) then refresh the affected shards to make this operation visible to search, if `wait_for` then wait for a refresh to make this operation visible to search, if `false` then do nothing with refreshes.
83388401

@@ -8961,6 +9024,7 @@ client.security.putRole({ name })
89619024
** *`indices` (Optional, { field_security, names, privileges, query, allow_restricted_indices }[])*: A list of indices permissions entries.
89629025
** *`metadata` (Optional, Record<string, User-defined value>)*: Optional metadata. Within the metadata object, keys that begin with an underscore (`_`) are reserved for system use.
89639026
** *`run_as` (Optional, string[])*: A list of users that the owners of this role can impersonate. *Note*: in Serverless, the run-as feature is disabled. For API compatibility, you can still specify an empty `run_as` field, but a non-empty list will be rejected.
9027+
** *`description` (Optional, string)*: Optional description of the role descriptor
89649028
** *`transient_metadata` (Optional, Record<string, User-defined value>)*: Indicates roles that might be incompatible with the current cluster license, specifically roles with document and field level security. When the cluster license doesn’t allow certain features for a given role, this parameter is updated dynamically to list the incompatible features. If `enabled` is `false`, the role is ignored, but is still listed in the response from the authenticate API.
89659029
** *`refresh` (Optional, Enum(true | false | "wait_for"))*: If `true` (the default) then refresh the affected shards to make this operation visible to search, if `wait_for` then wait for a refresh to make this operation visible to search, if `false` then do nothing with refreshes.
89669030

@@ -9050,16 +9114,65 @@ An API key's actual permission is the intersection of its assigned role descript
90509114
** *`with_profile_uid` (Optional, boolean)*: Determines whether to also retrieve the profile uid, for the API key owner principal, if it exists.
90519115
** *`typed_keys` (Optional, boolean)*: Determines whether aggregation names are prefixed by their respective types in the response.
90529116

9117+
[discrete]
9118+
==== query_role
9119+
Retrieves roles in a paginated manner. You can optionally filter the results with a query.
9120+
9121+
{ref}/security-api-query-role.html[Endpoint documentation]
9122+
[source,ts]
9123+
----
9124+
client.security.queryRole({ ... })
9125+
----
9126+
9127+
[discrete]
9128+
==== Arguments
9129+
9130+
* *Request (object):*
9131+
** *`query` (Optional, { bool, exists, ids, match, match_all, prefix, range, simple_query_string, term, terms, wildcard })*: A query to filter which roles to return.
9132+
If the query parameter is missing, it is equivalent to a `match_all` query.
9133+
The query supports a subset of query types, including `match_all`, `bool`, `term`, `terms`, `match`,
9134+
`ids`, `prefix`, `wildcard`, `exists`, `range`, and `simple_query_string`.
9135+
You can query the following information associated with roles: `name`, `description`, `metadata`,
9136+
`applications.application`, `applications.privileges`, `applications.resources`.
9137+
** *`from` (Optional, number)*: Starting document offset.
9138+
By default, you cannot page through more than 10,000 hits using the from and size parameters.
9139+
To page through more hits, use the `search_after` parameter.
9140+
** *`sort` (Optional, string | { _score, _doc, _geo_distance, _script } | string | { _score, _doc, _geo_distance, _script }[])*: All public fields of a role are eligible for sorting.
9141+
In addition, sort can also be applied to the `_doc` field to sort by index order.
9142+
** *`size` (Optional, number)*: The number of hits to return.
9143+
By default, you cannot page through more than 10,000 hits using the `from` and `size` parameters.
9144+
To page through more hits, use the `search_after` parameter.
9145+
** *`search_after` (Optional, number | number | string | boolean | null | User-defined value[])*: Search after definition
9146+
90539147
[discrete]
90549148
==== query_user
9055-
Retrieves information for Users using a subset of query DSL
9149+
Retrieves information for Users in a paginated manner. You can optionally filter the results with a query.
90569150

90579151
{ref}/security-api-query-user.html[Endpoint documentation]
90589152
[source,ts]
90599153
----
9060-
client.security.queryUser()
9154+
client.security.queryUser({ ... })
90619155
----
90629156

9157+
[discrete]
9158+
==== Arguments
9159+
9160+
* *Request (object):*
9161+
** *`query` (Optional, { ids, bool, exists, match, match_all, prefix, range, simple_query_string, term, terms, wildcard })*: A query to filter which users to return.
9162+
If the query parameter is missing, it is equivalent to a `match_all` query.
9163+
The query supports a subset of query types, including `match_all`, `bool`, `term`, `terms`, `match`,
9164+
`ids`, `prefix`, `wildcard`, `exists`, `range`, and `simple_query_string`.
9165+
You can query the following information associated with user: `username`, `roles`, `enabled`
9166+
** *`from` (Optional, number)*: Starting document offset.
9167+
By default, you cannot page through more than 10,000 hits using the from and size parameters.
9168+
To page through more hits, use the `search_after` parameter.
9169+
** *`sort` (Optional, string | { _score, _doc, _geo_distance, _script } | string | { _score, _doc, _geo_distance, _script }[])*: Fields eligible for sorting are: username, roles, enabled
9170+
In addition, sort can also be applied to the `_doc` field to sort by index order.
9171+
** *`size` (Optional, number)*: The number of hits to return.
9172+
By default, you cannot page through more than 10,000 hits using the `from` and `size` parameters.
9173+
To page through more hits, use the `search_after` parameter.
9174+
** *`search_after` (Optional, number | number | string | boolean | null | User-defined value[])*: Search after definition
9175+
** *`with_profile_uid` (Optional, boolean)*: If true will return the User Profile ID for the users in the query result, if any.
90639176

90649177
[discrete]
90659178
==== saml_authenticate
@@ -9229,7 +9342,7 @@ client.security.updateApiKey({ id })
92299342

92309343
* *Request (object):*
92319344
** *`id` (string)*: The ID of the API key to update.
9232-
** *`role_descriptors` (Optional, Record<string, { cluster, indices, global, applications, metadata, run_as, transient_metadata }>)*: An array of role descriptors for this API key. This parameter is optional. When it is not specified or is an empty array, then the API key will have a point in time snapshot of permissions of the authenticated user. If you supply role descriptors then the resultant permissions would be an intersection of API keys permissions and authenticated user’s permissions thereby limiting the access scope for API keys. The structure of role descriptor is the same as the request for create role API. For more details, see create or update roles API.
9345+
** *`role_descriptors` (Optional, Record<string, { cluster, indices, global, applications, metadata, run_as, description, transient_metadata }>)*: An array of role descriptors for this API key. This parameter is optional. When it is not specified or is an empty array, then the API key will have a point in time snapshot of permissions of the authenticated user. If you supply role descriptors then the resultant permissions would be an intersection of API keys permissions and authenticated user’s permissions thereby limiting the access scope for API keys. The structure of role descriptor is the same as the request for create role API. For more details, see create or update roles API.
92339346
** *`metadata` (Optional, Record<string, User-defined value>)*: Arbitrary metadata that you want to associate with the API key. It supports nested data structure. Within the metadata object, keys beginning with _ are reserved for system usage.
92349347
** *`expiration` (Optional, string | -1 | 0)*: Expiration time for the API key.
92359348

@@ -10167,8 +10280,6 @@ index will not be deleted
1016710280
[discrete]
1016810281
==== get_node_stats
1016910282
Retrieves transform usage information for transform nodes.
10170-
10171-
//{ref}/get-transform-node-stats.html[Endpoint documentation]
1017210283
[source,ts]
1017310284
----
1017410285
client.transform.getNodeStats()

0 commit comments

Comments
 (0)