Skip to content

Commit fcad7ec

Browse files
committed
[OpenAPI] Edit more security API summaries (#3036)
1 parent fe3cffe commit fcad7ec

File tree

24 files changed

+79
-15
lines changed

24 files changed

+79
-15
lines changed

specification/_doc_ids/table.csv

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,7 @@ data-stream-path-param,https://www.elastic.co/guide/en/elasticsearch/reference/{
111111
data-streams,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/data-streams.html
112112
date-index-name-processor,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/date-index-name-processor.html
113113
dcg,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/search-rank-eval.html#_discounted_cumulative_gain_dcg
114+
defining-roles,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/defining-roles.html
114115
delete-async-sql-search-api,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/delete-async-sql-search-api.html
115116
delete-enrich-policy-api,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/delete-enrich-policy-api.html
116117
delete-license,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/delete-license.html
@@ -612,6 +613,7 @@ uppercase-processor,https://www.elastic.co/guide/en/elasticsearch/reference/{bra
612613
urldecode-processor,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/urldecode-processor.html
613614
usage-api,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/usage-api.html
614615
user-agent-processor,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/user-agent-processor.html
616+
user-profile,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/user-profile.html
615617
voting-config-exclusions,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/voting-config-exclusions.html
616618
watcher-api-ack-watch,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/watcher-api-ack-watch.html
617619
watcher-api-activate-watch,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/watcher-api-activate-watch.html

specification/security/get_user_privileges/SecurityGetUserPrivilegesRequest.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@ import { RequestBase } from '@_types/Base'
2121
import { Name } from '@_types/common'
2222

2323
/**
24+
* Get user privileges.
2425
* @rest_spec_name security.get_user_privileges
2526
* @availability stack since=6.5.0 stability=stable
2627
* @availability serverless stability=stable visibility=private

specification/security/get_user_profile/Request.ts

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,9 @@ import { UserProfileId } from '@security/_types/UserProfile'
2121
import { RequestBase } from '@_types/Base'
2222

2323
/**
24-
* Retrieves a user's profile using the unique profile ID.
24+
* Get a user profile.
25+
*
26+
* Get a user's profile using the unique profile ID.
2527
* @rest_spec_name security.get_user_profile
2628
* @availability stack since=8.2.0 stability=stable
2729
* @availability serverless stability=stable visibility=private

specification/security/grant_api_key/SecurityGrantApiKeyRequest.ts

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,8 +22,10 @@ import { Password, Username } from '@_types/common'
2222
import { ApiKeyGrantType, GrantApiKey } from './types'
2323

2424
/**
25-
* Creates an API key on behalf of another user.
26-
* This API is similar to Create API keys, however it creates the API key for a user that is different than the user that runs the API.
25+
* Grant an API key.
26+
*
27+
* Create an API key on behalf of another user.
28+
* This API is similar to the create API keys API, however it creates the API key for a user that is different than the user that runs the API.
2729
* The caller must have authentication credentials (either an access token, or a username and password) for the user on whose behalf the API key will be created.
2830
* It is not possible to use this API to create an API key without that user’s credentials.
2931
* The user, for whom the authentication credentials is provided, can optionally "run as" (impersonate) another user.

specification/security/has_privileges/SecurityHasPrivilegesRequest.ts

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,10 +24,12 @@ import { ApplicationPrivilegesCheck, IndexPrivilegesCheck } from './types'
2424

2525
/**
2626
* Check user privileges.
27-
* Determines whether the specified user has a specified list of privileges.
27+
*
28+
* Determine whether the specified user has a specified list of privileges.
2829
* @rest_spec_name security.has_privileges
2930
* @availability stack since=6.4.0 stability=stable
3031
* @availability serverless stability=stable visibility=public
32+
* @ext_doc_id security-privileges
3133
*/
3234
export interface Request extends RequestBase {
3335
path_parts: {

specification/security/has_privileges_user_profile/Request.ts

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,14 @@ import { RequestBase } from '@_types/Base'
2222
import { PrivilegesCheck } from './types'
2323

2424
/**
25+
* Check user profile privileges.
26+
*
27+
* Determine whether the users associated with the specified user profile IDs have all the requested privileges.
2528
* @rest_spec_name security.has_privileges_user_profile
2629
* @availability stack since=8.3.0 stability=stable
2730
* @availability serverless stability=stable visibility=private
2831
* @cluster_privileges manage_user_profile
32+
* @ext_doc_id user-profile
2933
*/
3034
export interface Request extends RequestBase {
3135
body: {

specification/security/invalidate_api_key/SecurityInvalidateApiKeyRequest.ts

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,13 +22,15 @@ import { Id, Name, Username } from '@_types/common'
2222

2323
/**
2424
* Invalidate API keys.
25-
* Invalidates one or more API keys.
25+
*
26+
* This API invalidates API keys created by the create API key or grant API key APIs.
27+
* Invalidated API keys fail authentication, but they can still be viewed using the get API key information and query API key information APIs, for at least the configured retention period, until they are automatically deleted.
2628
* The `manage_api_key` privilege allows deleting any API keys.
2729
* The `manage_own_api_key` only allows deleting API keys that are owned by the user.
2830
* In addition, with the `manage_own_api_key` privilege, an invalidation request must be issued in one of the three formats:
2931
* - Set the parameter `owner=true`.
3032
* - Or, set both `username` and `realm_name` to match the user’s identity.
31-
* - Or, if the request is issued by an API key, i.e. an API key invalidates itself, specify its ID in the `ids` field.
33+
* - Or, if the request is issued by an API key, that is to say an API key invalidates itself, specify its ID in the `ids` field.
3234
* @rest_spec_name security.invalidate_api_key
3335
* @availability stack since=6.7.0 stability=stable
3436
* @availability serverless stability=stable visibility=public

specification/security/invalidate_token/SecurityInvalidateTokenRequest.ts

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,14 @@ import { RequestBase } from '@_types/Base'
2121
import { Name, Username } from '@_types/common'
2222

2323
/**
24+
* Invalidate a token.
25+
*
26+
* The access tokens returned by the get token API have a finite period of time for which they are valid.
27+
* After that time period, they can no longer be used.
28+
* The time period is defined by the `xpack.security.authc.token.timeout` setting.
29+
*
30+
* The refresh tokens returned by the get token API are only valid for 24 hours. They can also be used exactly once.
31+
* If you want to invalidate one or more access or refresh tokens immediately, use this invalidate token API.
2432
* @rest_spec_name security.invalidate_token
2533
* @availability stack since=5.5.0 stability=stable
2634
* @availability serverless stability=stable visibility=private

specification/security/put_privileges/SecurityPutPrivilegesRequest.ts

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,11 @@ import { Refresh } from '@_types/common'
2323
import { Actions } from './types'
2424

2525
/**
26+
* Create or update application privileges.
2627
* @rest_spec_name security.put_privileges
2728
* @availability stack since=6.4.0 stability=stable
2829
* @availability serverless stability=stable visibility=private
29-
*
30+
* @ext_doc_id security-privileges
3031
*/
3132
export interface Request extends RequestBase {
3233
query_parameters: {

specification/security/put_role/SecurityPutRoleRequest.ts

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,12 +29,16 @@ import { RequestBase } from '@_types/Base'
2929
import { Metadata, Name, Refresh } from '@_types/common'
3030

3131
/**
32-
* The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.
32+
* Create or update roles.
33+
*
34+
* The role management APIs are generally the preferred way to manage roles in the native realm, rather than using file-based role management.
3335
* The create or update roles API cannot update roles that are defined in roles files.
36+
* File-based role management is not available in Elastic Serverless.
3437
* @rest_spec_name security.put_role
3538
* @availability stack stability=stable
3639
* @availability serverless stability=stable visibility=private
3740
* @cluster_privileges manage_security
41+
* @ext_doc_id defining-roles
3842
*/
3943
export interface Request extends RequestBase {
4044
path_parts: {

0 commit comments

Comments
 (0)