Skip to content

Commit

Permalink
avoid extending non base class (#3852) (#3853)
Browse files Browse the repository at this point in the history
(cherry picked from commit d22ee5a)

Co-authored-by: Laura Trotta <[email protected]>
  • Loading branch information
github-actions[bot] and l-trotta authored Feb 27, 2025
1 parent 16613a7 commit fa24e21
Show file tree
Hide file tree
Showing 5 changed files with 181 additions and 37 deletions.
60 changes: 49 additions & 11 deletions output/openapi/elasticsearch-openapi.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

14 changes: 7 additions & 7 deletions output/schema/schema-serverless.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

114 changes: 97 additions & 17 deletions output/schema/schema.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

7 changes: 6 additions & 1 deletion output/typescript/types.ts

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

23 changes: 22 additions & 1 deletion specification/security/_types/Privileges.ts
Original file line number Diff line number Diff line change
Expand Up @@ -313,7 +313,28 @@ export class UserIndicesPrivileges {
allow_restricted_indices: boolean
}

export class RemoteUserIndicesPrivileges extends UserIndicesPrivileges {
export class RemoteUserIndicesPrivileges {
/**
* The document fields that the owners of the role have read access to.
* @ext_doc_id field-and-document-access-control
*/
field_security?: FieldSecurity[]
/**
* A list of indices (or index name patterns) to which the permissions in this entry apply.
*/
names: IndexName | IndexName[]
/**
* The index level privileges that owners of the role have on the specified indices.
*/
privileges: IndexPrivilege[]
/**
* Search queries that define the documents the user has access to. A document within the specified indices must match these queries for it to be accessible by the owners of the role.
*/
query?: IndicesPrivilegesQuery[]
/**
* Set to `true` if using wildcard or regular expressions for patterns that cover restricted indices. Implicitly, restricted indices have limited privileges that can cause pattern tests to fail. If restricted indices are explicitly included in the `names` list, Elasticsearch checks privileges against these indices regardless of the value set for `allow_restricted_indices`.
*/
allow_restricted_indices: boolean
clusters: string[]
}

Expand Down

0 comments on commit fa24e21

Please sign in to comment.