From 9248577a0d6c723f673bef085ba0b643936e5b52 Mon Sep 17 00:00:00 2001 From: lcawl Date: Mon, 21 Oct 2024 13:47:07 -0700 Subject: [PATCH] Generate output --- output/openapi/elasticsearch-openapi.json | 189 ++++++++++++----- .../elasticsearch-serverless-openapi.json | 23 ++- output/schema/schema.json | 194 ++++++++++-------- .../CreateServiceTokenRequest.ts | 2 +- 4 files changed, 254 insertions(+), 154 deletions(-) diff --git a/output/openapi/elasticsearch-openapi.json b/output/openapi/elasticsearch-openapi.json index c38334cf5..5f10e3d51 100644 --- a/output/openapi/elasticsearch-openapi.json +++ b/output/openapi/elasticsearch-openapi.json @@ -26789,7 +26789,8 @@ "tags": [ "security" ], - "summary": "Creates or updates a user profile on behalf of another user", + "summary": "Create or update a user profile", + "description": "Create or update a user profile on behalf of another user.", "operationId": "security-activate-user-profile", "requestBody": { "content": { @@ -26924,8 +26925,8 @@ "tags": [ "security" ], - "summary": "Get roles API", - "description": "Retrieves roles in the native realm.", + "summary": "Get roles", + "description": "Get roles in the native realm.", "operationId": "security-get-role-1", "responses": { "200": { @@ -26937,8 +26938,8 @@ "tags": [ "security" ], - "summary": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management", - "description": "The bulk create or update roles API cannot update roles that are defined in roles files.", + "summary": "Bulk create or update roles", + "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk create or update roles API cannot update roles that are defined in roles files.", "operationId": "security-bulk-put-role", "parameters": [ { @@ -27018,8 +27019,8 @@ "tags": [ "security" ], - "summary": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management", - "description": "The bulk delete roles API cannot delete roles that are defined in roles files.", + "summary": "Bulk delete roles", + "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk delete roles API cannot delete roles that are defined in roles files.", "operationId": "security-bulk-delete-role", "parameters": [ { @@ -27094,7 +27095,8 @@ "tags": [ "security" ], - "summary": "Changes the passwords of users in the native realm and built-in users", + "summary": "Change passwords", + "description": "Change the passwords of users in the native realm and built-in users.", "operationId": "security-change-password", "parameters": [ { @@ -27117,7 +27119,8 @@ "tags": [ "security" ], - "summary": "Changes the passwords of users in the native realm and built-in users", + "summary": "Change passwords", + "description": "Change the passwords of users in the native realm and built-in users.", "operationId": "security-change-password-1", "parameters": [ { @@ -27142,7 +27145,8 @@ "tags": [ "security" ], - "summary": "Changes the passwords of users in the native realm and built-in users", + "summary": "Change passwords", + "description": "Change the passwords of users in the native realm and built-in users.", "operationId": "security-change-password-2", "parameters": [ { @@ -27162,7 +27166,8 @@ "tags": [ "security" ], - "summary": "Changes the passwords of users in the native realm and built-in users", + "summary": "Change passwords", + "description": "Change the passwords of users in the native realm and built-in users.", "operationId": "security-change-password-3", "parameters": [ { @@ -27184,8 +27189,8 @@ "tags": [ "security" ], - "summary": "Evicts a subset of all entries from the API key cache", - "description": "The cache is also automatically cleared on state changes of the security index.", + "summary": "Clear the API key cache", + "description": "Evict a subset of all entries from the API key cache.\nThe cache is also automatically cleared on state changes of the security index.", "operationId": "security-clear-api-key-cache", "parameters": [ { @@ -27239,7 +27244,8 @@ "tags": [ "security" ], - "summary": "Evicts application privileges from the native application privileges cache", + "summary": "Clear the privileges cache", + "description": "Evict privileges from the native application privilege cache.\nThe cache is also automatically cleared for applications that have their privileges updated.", "operationId": "security-clear-cached-privileges", "parameters": [ { @@ -27293,8 +27299,8 @@ "tags": [ "security" ], - "summary": "Evicts users from the user cache", - "description": "Can completely clear the cache or evict specific users.", + "summary": "Clear the user cache", + "description": "Evict users from the user cache. You can completely clear the cache or evict specific users.", "operationId": "security-clear-cached-realms", "parameters": [ { @@ -27360,7 +27366,8 @@ "tags": [ "security" ], - "summary": "Evicts roles from the native role cache", + "summary": "Clear the roles cache", + "description": "Evict roles from the native role cache.", "operationId": "security-clear-cached-roles", "parameters": [ { @@ -27413,7 +27420,11 @@ "tags": [ "security" ], - "summary": "Evicts tokens from the service account token caches", + "summary": "Clear service account token caches", + "description": "Evict a subset of all entries from the service account token caches.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-clear-cached-service-tokens", "parameters": [ { @@ -27603,7 +27614,7 @@ "security" ], "summary": "Create an API key", - "description": "Creates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "operationId": "security-create-api-key", "parameters": [ { @@ -27625,7 +27636,7 @@ "security" ], "summary": "Create an API key", - "description": "Creates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "operationId": "security-create-api-key-1", "parameters": [ { @@ -27733,7 +27744,11 @@ "tags": [ "security" ], - "summary": "Creates a service accounts token for access without requiring basic authentication", + "summary": "Create a service account token", + "description": "Create a service accounts token for access without requiring basic authentication.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-create-service-token", "parameters": [ { @@ -27759,7 +27774,11 @@ "tags": [ "security" ], - "summary": "Creates a service accounts token for access without requiring basic authentication", + "summary": "Create a service account token", + "description": "Create a service accounts token for access without requiring basic authentication.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-create-service-token-1", "parameters": [ { @@ -27785,7 +27804,11 @@ "tags": [ "security" ], - "summary": "Deletes a service account token", + "summary": "Delete service account tokens", + "description": "Delete service account tokens for a service in a specified namespace.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-delete-service-token", "parameters": [ { @@ -27860,7 +27883,11 @@ "tags": [ "security" ], - "summary": "Creates a service accounts token for access without requiring basic authentication", + "summary": "Create a service account token", + "description": "Create a service accounts token for access without requiring basic authentication.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-create-service-token-2", "parameters": [ { @@ -27885,7 +27912,10 @@ "tags": [ "security" ], - "summary": "Retrieves application privileges", + "summary": "Get application privileges", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-get-privileges-2", "parameters": [ { @@ -27906,7 +27936,10 @@ "tags": [ "security" ], - "summary": "Removes application privileges", + "summary": "Delete application privileges", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-delete-privileges", "parameters": [ { @@ -27968,8 +28001,8 @@ "tags": [ "security" ], - "summary": "Get roles API", - "description": "Retrieves roles in the native realm.", + "summary": "Get roles", + "description": "Get roles in the native realm.", "operationId": "security-get-role", "parameters": [ { @@ -28034,8 +28067,8 @@ "tags": [ "security" ], - "summary": "Delete roles API", - "description": "Removes roles in the native realm.", + "summary": "Delete roles", + "description": "Remove roles in the native realm.", "operationId": "security-delete-role", "parameters": [ { @@ -28087,7 +28120,11 @@ "tags": [ "security" ], - "summary": "Retrieves role mappings", + "summary": "Get role mappings", + "description": "Role mappings define which roles are assigned to each user.\nThe role mapping APIs are generally the preferred way to manage role mappings rather than using role mapping files.\nThe get role mappings API cannot retrieve role mappings that are defined in role mapping files.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/mapping-roles.html" + }, "operationId": "security-get-role-mapping", "parameters": [ { @@ -28153,7 +28190,7 @@ "tags": [ "security" ], - "summary": "Removes role mappings", + "summary": "Delete role mappings", "operationId": "security-delete-role-mapping", "parameters": [ { @@ -28206,7 +28243,8 @@ "tags": [ "security" ], - "summary": "Retrieves information about users in the native realm and built-in users", + "summary": "Get users", + "description": "Get information about users in the native realm and built-in users.", "operationId": "security-get-user", "parameters": [ { @@ -28274,7 +28312,8 @@ "tags": [ "security" ], - "summary": "Deletes users from the native realm", + "summary": "Delete users", + "description": "Delete users from the native realm.", "operationId": "security-delete-user", "parameters": [ { @@ -28326,7 +28365,8 @@ "tags": [ "security" ], - "summary": "Disables users in the native realm", + "summary": "Deactivate users", + "description": "Deactivate users in the native realm.", "operationId": "security-disable-user", "parameters": [ { @@ -28346,7 +28386,8 @@ "tags": [ "security" ], - "summary": "Disables users in the native realm", + "summary": "Deactivate users", + "description": "Deactivate users in the native realm.", "operationId": "security-disable-user-1", "parameters": [ { @@ -28368,7 +28409,8 @@ "tags": [ "security" ], - "summary": "Disables a user profile so it's not visible in user profile searches", + "summary": "Deactivate a user profile", + "description": "Deactivated user profiles are not visible in user profile searches.", "operationId": "security-disable-user-profile", "parameters": [ { @@ -28389,7 +28431,8 @@ "tags": [ "security" ], - "summary": "Disables a user profile so it's not visible in user profile searches", + "summary": "Deactivate a user profile", + "description": "Deactivated user profiles are not visible in user profile searches.", "operationId": "security-disable-user-profile-1", "parameters": [ { @@ -28412,7 +28455,8 @@ "tags": [ "security" ], - "summary": "Enables users in the native realm", + "summary": "Activate users", + "description": "Activate users in the native realm.", "operationId": "security-enable-user", "parameters": [ { @@ -28432,7 +28476,8 @@ "tags": [ "security" ], - "summary": "Enables users in the native realm", + "summary": "Activate users", + "description": "Activate users in the native realm.", "operationId": "security-enable-user-1", "parameters": [ { @@ -28454,7 +28499,8 @@ "tags": [ "security" ], - "summary": "Enables a user profile so it's visible in user profile searches", + "summary": "Activate a user profile", + "description": "Activated user profiles are visible in user profile searches.", "operationId": "security-enable-user-profile", "parameters": [ { @@ -28475,7 +28521,8 @@ "tags": [ "security" ], - "summary": "Enables a user profile so it's visible in user profile searches", + "summary": "Activate a user profile", + "description": "Activated user profiles are visible in user profile searches.", "operationId": "security-enable-user-profile-1", "parameters": [ { @@ -28498,7 +28545,8 @@ "tags": [ "security" ], - "summary": "Enables a Kibana instance to configure itself for communication with a secured Elasticsearch cluster", + "summary": "Enroll Kibana", + "description": "Enable a Kibana instance to configure itself for communication with a secured Elasticsearch cluster.", "operationId": "security-enroll-kibana", "responses": { "200": { @@ -28532,7 +28580,8 @@ "tags": [ "security" ], - "summary": "Allows a new node to join an existing cluster with security features enabled", + "summary": "Enroll a node", + "description": "Enroll a new node to allow it to join an existing cluster with security features enabled.", "operationId": "security-enroll-node", "responses": { "200": { @@ -28585,8 +28634,11 @@ "tags": [ "security" ], - "summary": "Get builtin privileges API", - "description": "Retrieves the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", + "summary": "Get builtin privileges", + "description": "Get the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-get-builtin-privileges", "responses": { "200": { @@ -28626,7 +28678,10 @@ "tags": [ "security" ], - "summary": "Retrieves application privileges", + "summary": "Get application privileges", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-get-privileges", "responses": { "200": { @@ -28683,7 +28738,10 @@ "tags": [ "security" ], - "summary": "Retrieves application privileges", + "summary": "Get application privileges", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-get-privileges-1", "parameters": [ { @@ -28703,7 +28761,11 @@ "tags": [ "security" ], - "summary": "Retrieves role mappings", + "summary": "Get role mappings", + "description": "Role mappings define which roles are assigned to each user.\nThe role mapping APIs are generally the preferred way to manage role mappings rather than using role mapping files.\nThe get role mappings API cannot retrieve role mappings that are defined in role mapping files.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/mapping-roles.html" + }, "operationId": "security-get-role-mapping-1", "responses": { "200": { @@ -28718,7 +28780,11 @@ "tags": [ "security" ], - "summary": "This API returns a list of service accounts that match the provided path parameter(s)", + "summary": "Get service accounts", + "description": "Get a list of service accounts that match the provided path parameters.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-get-service-accounts", "parameters": [ { @@ -28741,7 +28807,11 @@ "tags": [ "security" ], - "summary": "This API returns a list of service accounts that match the provided path parameter(s)", + "summary": "Get service accounts", + "description": "Get a list of service accounts that match the provided path parameters.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-get-service-accounts-1", "parameters": [ { @@ -28761,7 +28831,11 @@ "tags": [ "security" ], - "summary": "This API returns a list of service accounts that match the provided path parameter(s)", + "summary": "Get service accounts", + "description": "Get a list of service accounts that match the provided path parameters.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-get-service-accounts-2", "responses": { "200": { @@ -28776,7 +28850,10 @@ "tags": [ "security" ], - "summary": "Retrieves information of all service credentials for a service account", + "summary": "Get service account credentials", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-get-service-credentials", "parameters": [ { @@ -28845,7 +28922,8 @@ "tags": [ "security" ], - "summary": "Creates a bearer token for access without requiring basic authentication", + "summary": "Get a token", + "description": "Create a bearer token for access without requiring basic authentication.", "operationId": "security-get-token", "requestBody": { "content": { @@ -28992,7 +29070,8 @@ "tags": [ "security" ], - "summary": "Retrieves information about users in the native realm and built-in users", + "summary": "Get users", + "description": "Get information about users in the native realm and built-in users.", "operationId": "security-get-user-1", "parameters": [ { diff --git a/output/openapi/elasticsearch-serverless-openapi.json b/output/openapi/elasticsearch-serverless-openapi.json index 249b543cb..25baa266d 100644 --- a/output/openapi/elasticsearch-serverless-openapi.json +++ b/output/openapi/elasticsearch-serverless-openapi.json @@ -16733,7 +16733,7 @@ "security" ], "summary": "Create an API key", - "description": "Creates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "operationId": "security-create-api-key", "parameters": [ { @@ -16755,7 +16755,7 @@ "security" ], "summary": "Create an API key", - "description": "Creates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "operationId": "security-create-api-key-1", "parameters": [ { @@ -16863,8 +16863,8 @@ "tags": [ "security" ], - "summary": "Get roles API", - "description": "Retrieves roles in the native realm.", + "summary": "Get roles", + "description": "Get roles in the native realm.", "operationId": "security-get-role", "parameters": [ { @@ -16929,8 +16929,8 @@ "tags": [ "security" ], - "summary": "Delete roles API", - "description": "Removes roles in the native realm.", + "summary": "Delete roles", + "description": "Remove roles in the native realm.", "operationId": "security-delete-role", "parameters": [ { @@ -16982,8 +16982,11 @@ "tags": [ "security" ], - "summary": "Get builtin privileges API", - "description": "Retrieves the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", + "summary": "Get builtin privileges", + "description": "Get the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-get-builtin-privileges", "responses": { "200": { @@ -17023,8 +17026,8 @@ "tags": [ "security" ], - "summary": "Get roles API", - "description": "Retrieves roles in the native realm.", + "summary": "Get roles", + "description": "Get roles in the native realm.", "operationId": "security-get-role-1", "responses": { "200": { diff --git a/output/schema/schema.json b/output/schema/schema.json index be65f0248..63e7d37f8 100644 --- a/output/schema/schema.json +++ b/output/schema/schema.json @@ -14962,7 +14962,7 @@ "stability": "stable" } }, - "description": "Creates or updates a user profile on behalf of another user.", + "description": "Create or update a user profile.\nCreate or update a user profile on behalf of another user.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-activate-user-profile.html", "name": "security.activate_user_profile", "privileges": { @@ -15040,7 +15040,7 @@ "stability": "stable" } }, - "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk delete roles API cannot delete roles that are defined in roles files.", + "description": "Bulk delete roles.\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk delete roles API cannot delete roles that are defined in roles files.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-bulk-delete-role.html", "name": "security.bulk_delete_role", "privileges": { @@ -15083,7 +15083,7 @@ "stability": "stable" } }, - "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk create or update roles API cannot update roles that are defined in roles files.", + "description": "Bulk create or update roles.\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk create or update roles API cannot update roles that are defined in roles files.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-bulk-put-role.html", "name": "security.bulk_put_role", "privileges": { @@ -15149,7 +15149,7 @@ "stability": "stable" } }, - "description": "Changes the passwords of users in the native realm and built-in users.", + "description": "Change passwords.\nChange the passwords of users in the native realm and built-in users.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-change-password.html", "name": "security.change_password", "request": { @@ -15195,7 +15195,7 @@ "stability": "stable" } }, - "description": "Evicts a subset of all entries from the API key cache.\nThe cache is also automatically cleared on state changes of the security index.", + "description": "Clear the API key cache.\nEvict a subset of all entries from the API key cache.\nThe cache is also automatically cleared on state changes of the security index.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-clear-api-key-cache.html", "name": "security.clear_api_key_cache", "privileges": { @@ -15235,7 +15235,7 @@ "stability": "stable" } }, - "description": "Evicts application privileges from the native application privileges cache.", + "description": "Clear the privileges cache.\nEvict privileges from the native application privilege cache.\nThe cache is also automatically cleared for applications that have their privileges updated.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-clear-privilege-cache.html", "name": "security.clear_cached_privileges", "request": { @@ -15269,7 +15269,7 @@ "stability": "stable" } }, - "description": "Evicts users from the user cache. Can completely clear the cache or evict specific users.", + "description": "Clear the user cache.\nEvict users from the user cache. You can completely clear the cache or evict specific users.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-clear-cache.html", "name": "security.clear_cached_realms", "request": { @@ -15303,7 +15303,7 @@ "stability": "stable" } }, - "description": "Evicts roles from the native role cache.", + "description": "Clear the roles cache.\nEvict roles from the native role cache.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-clear-role-cache.html", "name": "security.clear_cached_roles", "request": { @@ -15337,8 +15337,10 @@ "stability": "stable" } }, - "description": "Evicts tokens from the service account token caches.", + "description": "Clear service account token caches.\nEvict a subset of all entries from the service account token caches.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-clear-service-token-caches.html", + "extDocId": "service-accounts", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html", "name": "security.clear_cached_service_tokens", "request": { "name": "Request", @@ -15372,7 +15374,7 @@ "stability": "stable" } }, - "description": "Create an API key.\nCreates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key.\nCreate an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-create-api-key.html", "name": "security.create_api_key", "privileges": { @@ -15443,8 +15445,10 @@ "stability": "stable" } }, - "description": "Creates a service accounts token for access without requiring basic authentication.", + "description": "Create a service account token.\nCreate a service accounts token for access without requiring basic authentication.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-create-service-token.html", + "extDocId": "service-accounts", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html", "name": "security.create_service_token", "request": { "name": "Request", @@ -15485,8 +15489,10 @@ "stability": "stable" } }, - "description": "Removes application privileges.", + "description": "Delete application privileges.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-delete-privilege.html", + "extDocId": "security-privileges", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-privileges.html", "name": "security.delete_privileges", "request": { "name": "Request", @@ -15519,7 +15525,7 @@ "stability": "stable" } }, - "description": "Delete roles API.\n\nRemoves roles in the native realm.", + "description": "Delete roles.\nRemove roles in the native realm.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-delete-role.html", "name": "security.delete_role", "request": { @@ -15554,7 +15560,7 @@ "stability": "stable" } }, - "description": "Removes role mappings.", + "description": "Delete role mappings.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-delete-role-mapping.html", "name": "security.delete_role_mapping", "request": { @@ -15589,8 +15595,10 @@ "stability": "stable" } }, - "description": "Deletes a service account token.", + "description": "Delete service account tokens.\nDelete service account tokens for a service in a specified namespace.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-delete-service-token.html", + "extDocId": "service-accounts", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html", "name": "security.delete_service_token", "request": { "name": "Request", @@ -15619,7 +15627,7 @@ "stability": "stable" } }, - "description": "Deletes users from the native realm.", + "description": "Delete users.\nDelete users from the native realm.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-delete-user.html", "name": "security.delete_user", "request": { @@ -15649,7 +15657,7 @@ "stability": "stable" } }, - "description": "Disables users in the native realm.", + "description": "Deactivate users.\nDeactivate users in the native realm.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-disable-user.html", "name": "security.disable_user", "request": { @@ -15685,7 +15693,7 @@ "stability": "stable" } }, - "description": "Disables a user profile so it's not visible in user profile searches.", + "description": "Deactivate a user profile.\nDeactivated user profiles are not visible in user profile searches.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/master/security-api-disable-user-profile.html", "name": "security.disable_user_profile", "privileges": { @@ -15721,7 +15729,7 @@ "stability": "stable" } }, - "description": "Enables users in the native realm.", + "description": "Activate users.\nActivate users in the native realm.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-enable-user.html", "name": "security.enable_user", "request": { @@ -15757,7 +15765,7 @@ "stability": "stable" } }, - "description": "Enables a user profile so it's visible in user profile searches.", + "description": "Activate a user profile.\nActivated user profiles are visible in user profile searches.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/master/security-api-enable-user-profile.html", "name": "security.enable_user_profile", "privileges": { @@ -15794,7 +15802,7 @@ "stability": "stable" } }, - "description": "Enables a Kibana instance to configure itself for communication with a secured Elasticsearch cluster.", + "description": "Enroll Kibana.\nEnable a Kibana instance to configure itself for communication with a secured Elasticsearch cluster.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/master/security-api-kibana-enrollment.html", "name": "security.enroll_kibana", "request": { @@ -15828,7 +15836,7 @@ "stability": "stable" } }, - "description": "Allows a new node to join an existing cluster with security features enabled.", + "description": "Enroll a node.\nEnroll a new node to allow it to join an existing cluster with security features enabled.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/master/security-api-node-enrollment.html", "name": "security.enroll_node", "request": { @@ -15907,8 +15915,10 @@ "stability": "stable" } }, - "description": "Get builtin privileges API.\n\nRetrieves the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", + "description": "Get builtin privileges.\nGet the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-builtin-privileges.html", + "extDocId": "security-privileges", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-privileges.html", "name": "security.get_builtin_privileges", "privileges": { "cluster": [ @@ -15947,8 +15957,10 @@ "stability": "stable" } }, - "description": "Retrieves application privileges.", + "description": "Get application privileges.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-privileges.html", + "extDocId": "security-privileges", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-privileges.html", "name": "security.get_privileges", "request": { "name": "Request", @@ -15993,7 +16005,7 @@ "stability": "stable" } }, - "description": "Get roles API.\n\nRetrieves roles in the native realm.", + "description": "Get roles.\nGet roles in the native realm.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-role.html", "name": "security.get_role", "privileges": { @@ -16039,8 +16051,10 @@ "stability": "stable" } }, - "description": "Retrieves role mappings.", + "description": "Get role mappings.\nRole mappings define which roles are assigned to each user.\nThe role mapping APIs are generally the preferred way to manage role mappings rather than using role mapping files.\nThe get role mappings API cannot retrieve role mappings that are defined in role mapping files.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-role-mapping.html", + "extDocId": "mapping-roles", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/mapping-roles.html", "name": "security.get_role_mapping", "privileges": { "cluster": [ @@ -16085,8 +16099,10 @@ "stability": "stable" } }, - "description": "This API returns a list of service accounts that match the provided path parameter(s).", + "description": "Get service accounts.\nGet a list of service accounts that match the provided path parameters.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-service-accounts.html", + "extDocId": "service-accounts", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html", "name": "security.get_service_accounts", "privileges": { "cluster": [ @@ -16137,8 +16153,10 @@ "stability": "stable" } }, - "description": "Retrieves information of all service credentials for a service account.", + "description": "Get service account credentials.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-service-credentials.html", + "extDocId": "service-accounts", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html", "name": "security.get_service_credentials", "request": { "name": "Request", @@ -16200,7 +16218,7 @@ "stability": "stable" } }, - "description": "Creates a bearer token for access without requiring basic authentication.", + "description": "Get a token.\nCreate a bearer token for access without requiring basic authentication.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-token.html", "name": "security.get_token", "request": { @@ -16233,7 +16251,7 @@ "stability": "stable" } }, - "description": "Retrieves information about users in the native realm and built-in users.", + "description": "Get users.\nGet information about users in the native realm and built-in users.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-user.html", "name": "security.get_user", "request": { @@ -188193,7 +188211,7 @@ } ] }, - "description": "Creates or updates a user profile on behalf of another user.", + "description": "Create or update a user profile.\nCreate or update a user profile on behalf of another user.", "inherits": { "type": { "name": "RequestBase", @@ -188206,7 +188224,7 @@ }, "path": [], "query": [], - "specLocation": "security/activate_user_profile/Request.ts#L23-L37" + "specLocation": "security/activate_user_profile/Request.ts#L23-L38" }, { "kind": "response", @@ -188479,7 +188497,7 @@ } ] }, - "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk delete roles API cannot delete roles that are defined in roles files.", + "description": "Bulk delete roles.\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk delete roles API cannot delete roles that are defined in roles files.", "inherits": { "type": { "name": "RequestBase", @@ -188505,7 +188523,7 @@ } } ], - "specLocation": "security/bulk_delete_role/SecurityBulkDeleteRoleRequest.ts#L23-L41" + "specLocation": "security/bulk_delete_role/SecurityBulkDeleteRoleRequest.ts#L23-L42" }, { "kind": "response", @@ -188595,7 +188613,7 @@ } ] }, - "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk create or update roles API cannot update roles that are defined in roles files.", + "description": "Bulk create or update roles.\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk create or update roles API cannot update roles that are defined in roles files.", "inherits": { "type": { "name": "RequestBase", @@ -188621,7 +188639,7 @@ } } ], - "specLocation": "security/bulk_put_role/SecurityBulkPutRoleRequest.ts#L25-L43" + "specLocation": "security/bulk_put_role/SecurityBulkPutRoleRequest.ts#L25-L44" }, { "kind": "response", @@ -188727,7 +188745,7 @@ } ] }, - "description": "Changes the passwords of users in the native realm and built-in users.", + "description": "Change passwords.\nChange the passwords of users in the native realm and built-in users.", "inherits": { "type": { "name": "RequestBase", @@ -188766,7 +188784,7 @@ } } ], - "specLocation": "security/change_password/SecurityChangePasswordRequest.ts#L23-L51" + "specLocation": "security/change_password/SecurityChangePasswordRequest.ts#L23-L53" }, { "kind": "response", @@ -188788,7 +188806,7 @@ "body": { "kind": "no_body" }, - "description": "Evicts a subset of all entries from the API key cache.\nThe cache is also automatically cleared on state changes of the security index.", + "description": "Clear the API key cache.\nEvict a subset of all entries from the API key cache.\nThe cache is also automatically cleared on state changes of the security index.", "inherits": { "type": { "name": "RequestBase", @@ -188814,7 +188832,7 @@ } ], "query": [], - "specLocation": "security/clear_api_key_cache/SecurityClearApiKeyCacheRequest.ts#L23-L40" + "specLocation": "security/clear_api_key_cache/SecurityClearApiKeyCacheRequest.ts#L23-L41" }, { "kind": "response", @@ -188882,7 +188900,7 @@ "body": { "kind": "no_body" }, - "description": "Evicts application privileges from the native application privileges cache.", + "description": "Clear the privileges cache.\nEvict privileges from the native application privilege cache.\nThe cache is also automatically cleared for applications that have their privileges updated.", "inherits": { "type": { "name": "RequestBase", @@ -188908,7 +188926,7 @@ } ], "query": [], - "specLocation": "security/clear_cached_privileges/SecurityClearCachedPrivilegesRequest.ts#L23-L32" + "specLocation": "security/clear_cached_privileges/SecurityClearCachedPrivilegesRequest.ts#L23-L35" }, { "kind": "response", @@ -188976,7 +188994,7 @@ "body": { "kind": "no_body" }, - "description": "Evicts users from the user cache. Can completely clear the cache or evict specific users.", + "description": "Clear the user cache.\nEvict users from the user cache. You can completely clear the cache or evict specific users.", "inherits": { "type": { "name": "RequestBase", @@ -189018,7 +189036,7 @@ } } ], - "specLocation": "security/clear_cached_realms/SecurityClearCachedRealmsRequest.ts#L23-L35" + "specLocation": "security/clear_cached_realms/SecurityClearCachedRealmsRequest.ts#L23-L37" }, { "kind": "response", @@ -189086,7 +189104,7 @@ "body": { "kind": "no_body" }, - "description": "Evicts roles from the native role cache.", + "description": "Clear the roles cache.\nEvict roles from the native role cache.", "inherits": { "type": { "name": "RequestBase", @@ -189112,7 +189130,7 @@ } ], "query": [], - "specLocation": "security/clear_cached_roles/ClearCachedRolesRequest.ts#L23-L32" + "specLocation": "security/clear_cached_roles/ClearCachedRolesRequest.ts#L23-L34" }, { "kind": "response", @@ -189180,7 +189198,7 @@ "body": { "kind": "no_body" }, - "description": "Evicts tokens from the service account token caches.", + "description": "Clear service account token caches.\nEvict a subset of all entries from the service account token caches.", "inherits": { "type": { "name": "RequestBase", @@ -189230,7 +189248,7 @@ } ], "query": [], - "specLocation": "security/clear_cached_service_tokens/ClearCachedServiceTokensRequest.ts#L23-L34" + "specLocation": "security/clear_cached_service_tokens/ClearCachedServiceTokensRequest.ts#L23-L37" }, { "kind": "response", @@ -189367,7 +189385,7 @@ } ] }, - "description": "Create an API key.\nCreates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key.\nCreate an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "inherits": { "type": { "name": "RequestBase", @@ -189482,7 +189500,7 @@ "body": { "kind": "no_body" }, - "description": "Creates a service accounts token for access without requiring basic authentication.", + "description": "Create a service account token.\nCreate a service accounts token for access without requiring basic authentication.", "inherits": { "type": { "name": "RequestBase", @@ -189545,7 +189563,7 @@ } } ], - "specLocation": "security/create_service_token/CreateServiceTokenRequest.ts#L23-L38" + "specLocation": "security/create_service_token/CreateServiceTokenRequest.ts#L23-L40" }, { "kind": "response", @@ -189643,7 +189661,7 @@ "body": { "kind": "no_body" }, - "description": "Removes application privileges.", + "description": "Delete application privileges.", "inherits": { "type": { "name": "RequestBase", @@ -189694,7 +189712,7 @@ } } ], - "specLocation": "security/delete_privileges/SecurityDeletePrivilegesRequest.ts#L23-L36" + "specLocation": "security/delete_privileges/SecurityDeletePrivilegesRequest.ts#L23-L38" }, { "kind": "response", @@ -189744,7 +189762,7 @@ "body": { "kind": "no_body" }, - "description": "Delete roles API.\n\nRemoves roles in the native realm.", + "description": "Delete roles.\nRemove roles in the native realm.", "inherits": { "type": { "name": "RequestBase", @@ -189783,7 +189801,7 @@ } } ], - "specLocation": "security/delete_role/SecurityDeleteRoleRequest.ts#L23-L38" + "specLocation": "security/delete_role/SecurityDeleteRoleRequest.ts#L23-L37" }, { "kind": "response", @@ -189817,7 +189835,7 @@ "body": { "kind": "no_body" }, - "description": "Removes role mappings.", + "description": "Delete role mappings.", "inherits": { "type": { "name": "RequestBase", @@ -189856,7 +189874,7 @@ } } ], - "specLocation": "security/delete_role_mapping/SecurityDeleteRoleMappingRequest.ts#L23-L35" + "specLocation": "security/delete_role_mapping/SecurityDeleteRoleMappingRequest.ts#L23-L36" }, { "kind": "response", @@ -189890,7 +189908,7 @@ "body": { "kind": "no_body" }, - "description": "Deletes a service account token.", + "description": "Delete service account tokens.\nDelete service account tokens for a service in a specified namespace.", "inherits": { "type": { "name": "RequestBase", @@ -189953,7 +189971,7 @@ } } ], - "specLocation": "security/delete_service_token/DeleteServiceTokenRequest.ts#L23-L37" + "specLocation": "security/delete_service_token/DeleteServiceTokenRequest.ts#L23-L40" }, { "kind": "response", @@ -189987,7 +190005,7 @@ "body": { "kind": "no_body" }, - "description": "Deletes users from the native realm.", + "description": "Delete users.\nDelete users from the native realm.", "inherits": { "type": { "name": "RequestBase", @@ -190026,7 +190044,7 @@ } } ], - "specLocation": "security/delete_user/SecurityDeleteUserRequest.ts#L23-L34" + "specLocation": "security/delete_user/SecurityDeleteUserRequest.ts#L23-L36" }, { "kind": "response", @@ -190060,7 +190078,7 @@ "body": { "kind": "no_body" }, - "description": "Disables users in the native realm.", + "description": "Deactivate users.\nDeactivate users in the native realm.", "inherits": { "type": { "name": "RequestBase", @@ -190099,7 +190117,7 @@ } } ], - "specLocation": "security/disable_user/SecurityDisableUserRequest.ts#L23-L34" + "specLocation": "security/disable_user/SecurityDisableUserRequest.ts#L23-L36" }, { "kind": "response", @@ -190121,7 +190139,7 @@ "body": { "kind": "no_body" }, - "description": "Disables a user profile so it's not visible in user profile searches.", + "description": "Deactivate a user profile.\nDeactivated user profiles are not visible in user profile searches.", "inherits": { "type": { "name": "RequestBase", @@ -190161,7 +190179,7 @@ } } ], - "specLocation": "security/disable_user_profile/Request.ts#L24-L47" + "specLocation": "security/disable_user_profile/Request.ts#L24-L48" }, { "kind": "response", @@ -190189,7 +190207,7 @@ "body": { "kind": "no_body" }, - "description": "Enables users in the native realm.", + "description": "Activate users.\nActivate users in the native realm.", "inherits": { "type": { "name": "RequestBase", @@ -190228,7 +190246,7 @@ } } ], - "specLocation": "security/enable_user/SecurityEnableUserRequest.ts#L23-L34" + "specLocation": "security/enable_user/SecurityEnableUserRequest.ts#L23-L36" }, { "kind": "response", @@ -190250,7 +190268,7 @@ "body": { "kind": "no_body" }, - "description": "Enables a user profile so it's visible in user profile searches.", + "description": "Activate a user profile.\nActivated user profiles are visible in user profile searches.", "inherits": { "type": { "name": "RequestBase", @@ -190290,7 +190308,7 @@ } } ], - "specLocation": "security/enable_user_profile/Request.ts#L24-L47" + "specLocation": "security/enable_user_profile/Request.ts#L24-L48" }, { "kind": "response", @@ -190318,7 +190336,7 @@ "body": { "kind": "no_body" }, - "description": "Enables a Kibana instance to configure itself for communication with a secured Elasticsearch cluster.", + "description": "Enroll Kibana.\nEnable a Kibana instance to configure itself for communication with a secured Elasticsearch cluster.", "inherits": { "type": { "name": "RequestBase", @@ -190331,7 +190349,7 @@ }, "path": [], "query": [], - "specLocation": "security/enroll_kibana/Request.ts#L22-L27" + "specLocation": "security/enroll_kibana/Request.ts#L22-L28" }, { "kind": "response", @@ -190408,7 +190426,7 @@ "body": { "kind": "no_body" }, - "description": "Allows a new node to join an existing cluster with security features enabled.", + "description": "Enroll a node.\nEnroll a new node to allow it to join an existing cluster with security features enabled.", "inherits": { "type": { "name": "RequestBase", @@ -190421,7 +190439,7 @@ }, "path": [], "query": [], - "specLocation": "security/enroll_node/Request.ts#L22-L27" + "specLocation": "security/enroll_node/Request.ts#L22-L28" }, { "kind": "response", @@ -190682,7 +190700,7 @@ "body": { "kind": "no_body" }, - "description": "Get builtin privileges API.\n\nRetrieves the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", + "description": "Get builtin privileges.\nGet the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", "inherits": { "type": { "name": "RequestBase", @@ -190746,7 +190764,7 @@ "body": { "kind": "no_body" }, - "description": "Retrieves application privileges.", + "description": "Get application privileges.", "inherits": { "type": { "name": "RequestBase", @@ -190784,7 +190802,7 @@ } ], "query": [], - "specLocation": "security/get_privileges/SecurityGetPrivilegesRequest.ts#L23-L33" + "specLocation": "security/get_privileges/SecurityGetPrivilegesRequest.ts#L23-L35" }, { "kind": "response", @@ -190834,7 +190852,7 @@ "body": { "kind": "no_body" }, - "description": "Get roles API.\n\nRetrieves roles in the native realm.", + "description": "Get roles.\nGet roles in the native realm.", "inherits": { "type": { "name": "RequestBase", @@ -190860,7 +190878,7 @@ } ], "query": [], - "specLocation": "security/get_role/SecurityGetRoleRequest.ts#L23-L39" + "specLocation": "security/get_role/SecurityGetRoleRequest.ts#L23-L38" }, { "kind": "response", @@ -191061,7 +191079,7 @@ "body": { "kind": "no_body" }, - "description": "Retrieves role mappings.", + "description": "Get role mappings.\nRole mappings define which roles are assigned to each user.\nThe role mapping APIs are generally the preferred way to manage role mappings rather than using role mapping files.\nThe get role mappings API cannot retrieve role mappings that are defined in role mapping files.", "inherits": { "type": { "name": "RequestBase", @@ -191087,7 +191105,7 @@ } ], "query": [], - "specLocation": "security/get_role_mapping/SecurityGetRoleMappingRequest.ts#L23-L36" + "specLocation": "security/get_role_mapping/SecurityGetRoleMappingRequest.ts#L23-L41" }, { "kind": "response", @@ -191126,7 +191144,7 @@ "body": { "kind": "no_body" }, - "description": "This API returns a list of service accounts that match the provided path parameter(s).", + "description": "Get service accounts.\nGet a list of service accounts that match the provided path parameters.", "inherits": { "type": { "name": "RequestBase", @@ -191164,7 +191182,7 @@ } ], "query": [], - "specLocation": "security/get_service_accounts/GetServiceAccountsRequest.ts#L23-L41" + "specLocation": "security/get_service_accounts/GetServiceAccountsRequest.ts#L23-L43" }, { "kind": "response", @@ -191293,7 +191311,7 @@ "body": { "kind": "no_body" }, - "description": "Retrieves information of all service credentials for a service account.", + "description": "Get service account credentials.", "inherits": { "type": { "name": "RequestBase", @@ -191331,7 +191349,7 @@ } ], "query": [], - "specLocation": "security/get_service_credentials/GetServiceCredentialsRequest.ts#L23-L39" + "specLocation": "security/get_service_credentials/GetServiceCredentialsRequest.ts#L23-L41" }, { "kind": "response", @@ -191592,7 +191610,7 @@ } ] }, - "description": "Creates a bearer token for access without requiring basic authentication.", + "description": "Get a token.\nCreate a bearer token for access without requiring basic authentication.", "inherits": { "type": { "name": "RequestBase", @@ -191605,7 +191623,7 @@ }, "path": [], "query": [], - "specLocation": "security/get_token/GetUserAccessTokenRequest.ts#L25-L39" + "specLocation": "security/get_token/GetUserAccessTokenRequest.ts#L25-L41" }, { "kind": "response", @@ -191737,7 +191755,7 @@ "body": { "kind": "no_body" }, - "description": "Retrieves information about users in the native realm and built-in users.", + "description": "Get users.\nGet information about users in the native realm and built-in users.", "inherits": { "type": { "name": "RequestBase", @@ -191798,7 +191816,7 @@ } } ], - "specLocation": "security/get_user/SecurityGetUserRequest.ts#L23-L41" + "specLocation": "security/get_user/SecurityGetUserRequest.ts#L23-L43" }, { "kind": "response", diff --git a/specification/security/create_service_token/CreateServiceTokenRequest.ts b/specification/security/create_service_token/CreateServiceTokenRequest.ts index cfdddef30..ab18a69a3 100644 --- a/specification/security/create_service_token/CreateServiceTokenRequest.ts +++ b/specification/security/create_service_token/CreateServiceTokenRequest.ts @@ -26,7 +26,7 @@ import { Name, Namespace, Refresh, Service } from '@_types/common' * @rest_spec_name security.create_service_token * @availability stack stability=stable * @availability serverless stability=stable visibility=private - * @ext_doc_id service-account + * @ext_doc_id service-accounts */ export interface Request extends RequestBase { path_parts: {