Skip to content

Commit ef524c3

Browse files
committed
Separate out SearchAccess privileges
1 parent d5d06c1 commit ef524c3

File tree

5 files changed

+144
-22
lines changed

5 files changed

+144
-22
lines changed

output/openapi/elasticsearch-openapi.json

Lines changed: 42 additions & 16 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

output/schema/schema.json

Lines changed: 69 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

output/typescript/types.ts

Lines changed: 9 additions & 2 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

specification/security/_types/Access.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
* under the License.
1818
*/
1919

20-
import { RemoteIndicesPrivileges, ReplicationAccess } from './Privileges'
20+
import { ReplicationAccess, SearchAccess } from './Privileges'
2121

2222
export class Access {
2323
/**
@@ -27,5 +27,5 @@ export class Access {
2727
/**
2828
* A list of indices permission entries for cross-cluster search.
2929
*/
30-
search?: RemoteIndicesPrivileges[]
30+
search?: SearchAccess[]
3131
}

specification/security/_types/Privileges.ts

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -383,3 +383,25 @@ export class ReplicationAccess {
383383
*/
384384
names: IndexName[]
385385
}
386+
387+
export class SearchAccess {
388+
/**
389+
* The document fields that the owners of the role have read access to.
390+
* @doc_id field-and-document-access-control
391+
*/
392+
field_security?: FieldSecurity
393+
/**
394+
* A list of indices (or index name patterns) to which the permissions in this entry apply.
395+
*/
396+
names: IndexName[]
397+
/**
398+
* A search query that defines the documents the owners of the role have access to. A document within the specified indices must match this query for it to be accessible by the owners of the role.
399+
*/
400+
query?: IndicesPrivilegesQuery
401+
/**
402+
* Set to `true` if using wildcard or regular expressions for patterns that cover restricted indices. Implicitly, restricted indices have limited privileges that can cause pattern tests to fail. If restricted indices are explicitly included in the `names` list, Elasticsearch checks privileges against these indices regardless of the value set for `allow_restricted_indices`.
403+
* @server_default false
404+
* @availability stack
405+
*/
406+
allow_restricted_indices?: boolean
407+
}

0 commit comments

Comments
 (0)