Skip to content

Commit 304227b

Browse files
committed
Edit whitespace; regenerate output
1 parent 0f19f35 commit 304227b

File tree

24 files changed

+89
-67
lines changed

24 files changed

+89
-67
lines changed

output/openapi/elasticsearch-openapi.json

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

output/openapi/elasticsearch-serverless-openapi.json

Lines changed: 2 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

output/schema/schema.json

Lines changed: 63 additions & 63 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

specification/security/get_user_profile/Request.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ import { RequestBase } from '@_types/Base'
2222

2323
/**
2424
* Get a user profile.
25+
*
2526
* Get a user's profile using the unique profile ID.
2627
* @rest_spec_name security.get_user_profile
2728
* @availability stack since=8.2.0 stability=stable

specification/security/grant_api_key/SecurityGrantApiKeyRequest.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ import { ApiKeyGrantType, GrantApiKey } from './types'
2323

2424
/**
2525
* Grant an API key.
26+
*
2627
* Create an API key on behalf of another user.
2728
* This API is similar to the create API keys API, however it creates the API key for a user that is different than the user that runs the API.
2829
* The caller must have authentication credentials (either an access token, or a username and password) for the user on whose behalf the API key will be created.

specification/security/has_privileges/SecurityHasPrivilegesRequest.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,7 @@ import { ApplicationPrivilegesCheck, IndexPrivilegesCheck } from './types'
2424

2525
/**
2626
* Check user privileges.
27+
*
2728
* Determine whether the specified user has a specified list of privileges.
2829
* @rest_spec_name security.has_privileges
2930
* @availability stack since=6.4.0 stability=stable

specification/security/has_privileges_user_profile/Request.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ import { PrivilegesCheck } from './types'
2323

2424
/**
2525
* Check user profile privileges.
26+
*
2627
* Determine whether the users associated with the specified user profile IDs have all the requested privileges.
2728
* @rest_spec_name security.has_privileges_user_profile
2829
* @availability stack since=8.3.0 stability=stable

specification/security/invalidate_api_key/SecurityInvalidateApiKeyRequest.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ import { Id, Name, Username } from '@_types/common'
2222

2323
/**
2424
* Invalidate API keys.
25+
*
2526
* This API invalidates API keys created by the create API key or grant API key APIs.
2627
* Invalidated API keys fail authentication, but they can still be viewed using the get API key information and query API key information APIs, for at least the configured retention period, until they are automatically deleted.
2728
* The `manage_api_key` privilege allows deleting any API keys.

specification/security/invalidate_token/SecurityInvalidateTokenRequest.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ import { Name, Username } from '@_types/common'
2222

2323
/**
2424
* Invalidate a token.
25+
*
2526
* The access tokens returned by the get token API have a finite period of time for which they are valid.
2627
* After that time period, they can no longer be used.
2728
* The time period is defined by the `xpack.security.authc.token.timeout` setting.

specification/security/put_role/SecurityPutRoleRequest.ts

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,10 @@ import { Metadata, Name, Refresh } from '@_types/common'
3030

3131
/**
3232
* Create or update roles.
33+
*
3334
* The role management APIs are generally the preferred way to manage roles in the native realm, rather than using file-based role management.
3435
* The create or update roles API cannot update roles that are defined in roles files.
36+
* File-based role management is not available in Elastic Serverless.
3537
* @rest_spec_name security.put_role
3638
* @availability stack stability=stable
3739
* @availability serverless stability=stable visibility=public

0 commit comments

Comments
 (0)