From 253e70232f1f854ae793c1a74d788c302ba0bc9c Mon Sep 17 00:00:00 2001 From: lcawl Date: Wed, 23 Oct 2024 07:43:55 -0700 Subject: [PATCH] Generate output --- output/openapi/elasticsearch-openapi.json | 187 +++++++++++----- .../elasticsearch-serverless-openapi.json | 4 +- output/schema/schema.json | 210 ++++++++++-------- 3 files changed, 250 insertions(+), 151 deletions(-) diff --git a/output/openapi/elasticsearch-openapi.json b/output/openapi/elasticsearch-openapi.json index aac893e7f4..2cd0a5667f 100644 --- a/output/openapi/elasticsearch-openapi.json +++ b/output/openapi/elasticsearch-openapi.json @@ -26789,7 +26789,8 @@ "tags": [ "security" ], - "summary": "Creates or updates a user profile on behalf of another user", + "summary": "Activate a user profile", + "description": "Create or update a user profile on behalf of another user.", "operationId": "security-activate-user-profile", "requestBody": { "content": { @@ -26924,8 +26925,8 @@ "tags": [ "security" ], - "summary": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management", - "description": "The get roles API cannot retrieve roles that are defined in roles files.", + "summary": "Get roles", + "description": "Get roles in the native realm.\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe get roles API cannot retrieve roles that are defined in roles files.", "operationId": "security-get-role-1", "responses": { "200": { @@ -26937,8 +26938,8 @@ "tags": [ "security" ], - "summary": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management", - "description": "The bulk create or update roles API cannot update roles that are defined in roles files.", + "summary": "Bulk create or update roles", + "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk create or update roles API cannot update roles that are defined in roles files.", "operationId": "security-bulk-put-role", "parameters": [ { @@ -27018,8 +27019,8 @@ "tags": [ "security" ], - "summary": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management", - "description": "The bulk delete roles API cannot delete roles that are defined in roles files.", + "summary": "Bulk delete roles", + "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk delete roles API cannot delete roles that are defined in roles files.", "operationId": "security-bulk-delete-role", "parameters": [ { @@ -27094,7 +27095,8 @@ "tags": [ "security" ], - "summary": "Changes the passwords of users in the native realm and built-in users", + "summary": "Change passwords", + "description": "Change the passwords of users in the native realm and built-in users.", "operationId": "security-change-password", "parameters": [ { @@ -27117,7 +27119,8 @@ "tags": [ "security" ], - "summary": "Changes the passwords of users in the native realm and built-in users", + "summary": "Change passwords", + "description": "Change the passwords of users in the native realm and built-in users.", "operationId": "security-change-password-1", "parameters": [ { @@ -27142,7 +27145,8 @@ "tags": [ "security" ], - "summary": "Changes the passwords of users in the native realm and built-in users", + "summary": "Change passwords", + "description": "Change the passwords of users in the native realm and built-in users.", "operationId": "security-change-password-2", "parameters": [ { @@ -27162,7 +27166,8 @@ "tags": [ "security" ], - "summary": "Changes the passwords of users in the native realm and built-in users", + "summary": "Change passwords", + "description": "Change the passwords of users in the native realm and built-in users.", "operationId": "security-change-password-3", "parameters": [ { @@ -27184,8 +27189,8 @@ "tags": [ "security" ], - "summary": "Evicts a subset of all entries from the API key cache", - "description": "The cache is also automatically cleared on state changes of the security index.", + "summary": "Clear the API key cache", + "description": "Evict a subset of all entries from the API key cache.\nThe cache is also automatically cleared on state changes of the security index.", "operationId": "security-clear-api-key-cache", "parameters": [ { @@ -27239,7 +27244,8 @@ "tags": [ "security" ], - "summary": "Evicts application privileges from the native application privileges cache", + "summary": "Clear the privileges cache", + "description": "Evict privileges from the native application privilege cache.\nThe cache is also automatically cleared for applications that have their privileges updated.", "operationId": "security-clear-cached-privileges", "parameters": [ { @@ -27293,8 +27299,8 @@ "tags": [ "security" ], - "summary": "Evicts users from the user cache", - "description": "Can completely clear the cache or evict specific users.", + "summary": "Clear the user cache", + "description": "Evict users from the user cache. You can completely clear the cache or evict specific users.", "operationId": "security-clear-cached-realms", "parameters": [ { @@ -27360,7 +27366,8 @@ "tags": [ "security" ], - "summary": "Evicts roles from the native role cache", + "summary": "Clear the roles cache", + "description": "Evict roles from the native role cache.", "operationId": "security-clear-cached-roles", "parameters": [ { @@ -27413,7 +27420,11 @@ "tags": [ "security" ], - "summary": "Evicts tokens from the service account token caches", + "summary": "Clear service account token caches", + "description": "Evict a subset of all entries from the service account token caches.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-clear-cached-service-tokens", "parameters": [ { @@ -27603,7 +27614,7 @@ "security" ], "summary": "Create an API key", - "description": "Creates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "operationId": "security-create-api-key", "parameters": [ { @@ -27625,7 +27636,7 @@ "security" ], "summary": "Create an API key", - "description": "Creates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "operationId": "security-create-api-key-1", "parameters": [ { @@ -27733,7 +27744,11 @@ "tags": [ "security" ], - "summary": "Creates a service accounts token for access without requiring basic authentication", + "summary": "Create a service account token", + "description": "Create a service accounts token for access without requiring basic authentication.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-create-service-token", "parameters": [ { @@ -27759,7 +27774,11 @@ "tags": [ "security" ], - "summary": "Creates a service accounts token for access without requiring basic authentication", + "summary": "Create a service account token", + "description": "Create a service accounts token for access without requiring basic authentication.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-create-service-token-1", "parameters": [ { @@ -27785,7 +27804,11 @@ "tags": [ "security" ], - "summary": "Deletes a service account token", + "summary": "Delete service account tokens", + "description": "Delete service account tokens for a service in a specified namespace.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-delete-service-token", "parameters": [ { @@ -27860,7 +27883,11 @@ "tags": [ "security" ], - "summary": "Creates a service accounts token for access without requiring basic authentication", + "summary": "Create a service account token", + "description": "Create a service accounts token for access without requiring basic authentication.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-create-service-token-2", "parameters": [ { @@ -27885,7 +27912,10 @@ "tags": [ "security" ], - "summary": "Retrieves application privileges", + "summary": "Get application privileges", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-get-privileges-2", "parameters": [ { @@ -27906,7 +27936,10 @@ "tags": [ "security" ], - "summary": "Removes application privileges", + "summary": "Delete application privileges", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-delete-privileges", "parameters": [ { @@ -27968,8 +28001,8 @@ "tags": [ "security" ], - "summary": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management", - "description": "The get roles API cannot retrieve roles that are defined in roles files.", + "summary": "Get roles", + "description": "Get roles in the native realm.\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe get roles API cannot retrieve roles that are defined in roles files.", "operationId": "security-get-role", "parameters": [ { @@ -28034,7 +28067,8 @@ "tags": [ "security" ], - "summary": "Removes roles in the native realm", + "summary": "Delete roles", + "description": "Delete roles in the native realm.", "operationId": "security-delete-role", "parameters": [ { @@ -28086,7 +28120,11 @@ "tags": [ "security" ], - "summary": "Retrieves role mappings", + "summary": "Get role mappings", + "description": "Role mappings define which roles are assigned to each user.\nThe role mapping APIs are generally the preferred way to manage role mappings rather than using role mapping files.\nThe get role mappings API cannot retrieve role mappings that are defined in role mapping files.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/mapping-roles.html" + }, "operationId": "security-get-role-mapping", "parameters": [ { @@ -28152,7 +28190,7 @@ "tags": [ "security" ], - "summary": "Removes role mappings", + "summary": "Delete role mappings", "operationId": "security-delete-role-mapping", "parameters": [ { @@ -28205,7 +28243,8 @@ "tags": [ "security" ], - "summary": "Retrieves information about users in the native realm and built-in users", + "summary": "Get users", + "description": "Get information about users in the native realm and built-in users.", "operationId": "security-get-user", "parameters": [ { @@ -28273,7 +28312,8 @@ "tags": [ "security" ], - "summary": "Deletes users from the native realm", + "summary": "Delete users", + "description": "Delete users from the native realm.", "operationId": "security-delete-user", "parameters": [ { @@ -28325,7 +28365,8 @@ "tags": [ "security" ], - "summary": "Disables users in the native realm", + "summary": "Disable users", + "description": "Disable users in the native realm.", "operationId": "security-disable-user", "parameters": [ { @@ -28345,7 +28386,8 @@ "tags": [ "security" ], - "summary": "Disables users in the native realm", + "summary": "Disable users", + "description": "Disable users in the native realm.", "operationId": "security-disable-user-1", "parameters": [ { @@ -28367,7 +28409,8 @@ "tags": [ "security" ], - "summary": "Disables a user profile so it's not visible in user profile searches", + "summary": "Disable a user profile", + "description": "Disable user profiles so that they are not visible in user profile searches.", "operationId": "security-disable-user-profile", "parameters": [ { @@ -28388,7 +28431,8 @@ "tags": [ "security" ], - "summary": "Disables a user profile so it's not visible in user profile searches", + "summary": "Disable a user profile", + "description": "Disable user profiles so that they are not visible in user profile searches.", "operationId": "security-disable-user-profile-1", "parameters": [ { @@ -28411,7 +28455,8 @@ "tags": [ "security" ], - "summary": "Enables users in the native realm", + "summary": "Enable users", + "description": "Enable users in the native realm.", "operationId": "security-enable-user", "parameters": [ { @@ -28431,7 +28476,8 @@ "tags": [ "security" ], - "summary": "Enables users in the native realm", + "summary": "Enable users", + "description": "Enable users in the native realm.", "operationId": "security-enable-user-1", "parameters": [ { @@ -28453,7 +28499,8 @@ "tags": [ "security" ], - "summary": "Enables a user profile so it's visible in user profile searches", + "summary": "Enable a user profile", + "description": "Enable user profiles to make them visible in user profile searches.", "operationId": "security-enable-user-profile", "parameters": [ { @@ -28474,7 +28521,8 @@ "tags": [ "security" ], - "summary": "Enables a user profile so it's visible in user profile searches", + "summary": "Enable a user profile", + "description": "Enable user profiles to make them visible in user profile searches.", "operationId": "security-enable-user-profile-1", "parameters": [ { @@ -28497,7 +28545,8 @@ "tags": [ "security" ], - "summary": "Enables a Kibana instance to configure itself for communication with a secured Elasticsearch cluster", + "summary": "Enroll Kibana", + "description": "Enable a Kibana instance to configure itself for communication with a secured Elasticsearch cluster.", "operationId": "security-enroll-kibana", "responses": { "200": { @@ -28531,7 +28580,8 @@ "tags": [ "security" ], - "summary": "Allows a new node to join an existing cluster with security features enabled", + "summary": "Enroll a node", + "description": "Enroll a new node to allow it to join an existing cluster with security features enabled.", "operationId": "security-enroll-node", "responses": { "200": { @@ -28584,7 +28634,11 @@ "tags": [ "security" ], - "summary": "Retrieves the list of cluster privileges and index privileges that are available in this version of Elasticsearch", + "summary": "Get builtin privileges", + "description": "Get the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-get-builtin-privileges", "responses": { "200": { @@ -28621,7 +28675,10 @@ "tags": [ "security" ], - "summary": "Retrieves application privileges", + "summary": "Get application privileges", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-get-privileges", "responses": { "200": { @@ -28678,7 +28735,10 @@ "tags": [ "security" ], - "summary": "Retrieves application privileges", + "summary": "Get application privileges", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-privileges.html" + }, "operationId": "security-get-privileges-1", "parameters": [ { @@ -28698,7 +28758,11 @@ "tags": [ "security" ], - "summary": "Retrieves role mappings", + "summary": "Get role mappings", + "description": "Role mappings define which roles are assigned to each user.\nThe role mapping APIs are generally the preferred way to manage role mappings rather than using role mapping files.\nThe get role mappings API cannot retrieve role mappings that are defined in role mapping files.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/mapping-roles.html" + }, "operationId": "security-get-role-mapping-1", "responses": { "200": { @@ -28713,7 +28777,11 @@ "tags": [ "security" ], - "summary": "This API returns a list of service accounts that match the provided path parameter(s)", + "summary": "Get service accounts", + "description": "Get a list of service accounts that match the provided path parameters.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-get-service-accounts", "parameters": [ { @@ -28736,7 +28804,11 @@ "tags": [ "security" ], - "summary": "This API returns a list of service accounts that match the provided path parameter(s)", + "summary": "Get service accounts", + "description": "Get a list of service accounts that match the provided path parameters.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-get-service-accounts-1", "parameters": [ { @@ -28756,7 +28828,11 @@ "tags": [ "security" ], - "summary": "This API returns a list of service accounts that match the provided path parameter(s)", + "summary": "Get service accounts", + "description": "Get a list of service accounts that match the provided path parameters.", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-get-service-accounts-2", "responses": { "200": { @@ -28771,7 +28847,10 @@ "tags": [ "security" ], - "summary": "Retrieves information of all service credentials for a service account", + "summary": "Get service account credentials", + "externalDocs": { + "url": "https://www.elastic.co/guide/en/elasticsearch/reference/current/service-accounts.html" + }, "operationId": "security-get-service-credentials", "parameters": [ { @@ -28840,7 +28919,8 @@ "tags": [ "security" ], - "summary": "Creates a bearer token for access without requiring basic authentication", + "summary": "Get a token", + "description": "Create a bearer token for access without requiring basic authentication.", "operationId": "security-get-token", "requestBody": { "content": { @@ -28987,7 +29067,8 @@ "tags": [ "security" ], - "summary": "Retrieves information about users in the native realm and built-in users", + "summary": "Get users", + "description": "Get information about users in the native realm and built-in users.", "operationId": "security-get-user-1", "parameters": [ { diff --git a/output/openapi/elasticsearch-serverless-openapi.json b/output/openapi/elasticsearch-serverless-openapi.json index 8d90f4b346..2f0c482af5 100644 --- a/output/openapi/elasticsearch-serverless-openapi.json +++ b/output/openapi/elasticsearch-serverless-openapi.json @@ -16960,7 +16960,7 @@ "security" ], "summary": "Create an API key", - "description": "Creates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "operationId": "security-create-api-key", "parameters": [ { @@ -16982,7 +16982,7 @@ "security" ], "summary": "Create an API key", - "description": "Creates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "operationId": "security-create-api-key-1", "parameters": [ { diff --git a/output/schema/schema.json b/output/schema/schema.json index 66ee64b4f5..2ce927308c 100644 --- a/output/schema/schema.json +++ b/output/schema/schema.json @@ -14966,7 +14966,7 @@ "stability": "stable" } }, - "description": "Creates or updates a user profile on behalf of another user.", + "description": "Activate a user profile.\n\nCreate or update a user profile on behalf of another user.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-activate-user-profile.html", "name": "security.activate_user_profile", "privileges": { @@ -15009,7 +15009,7 @@ "stability": "stable" } }, - "description": "Authenticate a user.\nAuthenticates a user and returns information about the authenticated user.\nInclude the user information in a [basic auth header](https://en.wikipedia.org/wiki/Basic_access_authentication).\nA successful call returns a JSON structure that shows user information such as their username, the roles that are assigned to the user, any assigned metadata, and information about the realms that authenticated and authorized the user.\nIf the user cannot be authenticated, this API returns a 401 status code.", + "description": "Authenticate a user.\n\nAuthenticates a user and returns information about the authenticated user.\nInclude the user information in a [basic auth header](https://en.wikipedia.org/wiki/Basic_access_authentication).\nA successful call returns a JSON structure that shows user information such as their username, the roles that are assigned to the user, any assigned metadata, and information about the realms that authenticated and authorized the user.\nIf the user cannot be authenticated, this API returns a 401 status code.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-authenticate.html", "name": "security.authenticate", "request": { @@ -15044,7 +15044,7 @@ "stability": "stable" } }, - "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk delete roles API cannot delete roles that are defined in roles files.", + "description": "Bulk delete roles.\n\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk delete roles API cannot delete roles that are defined in roles files.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-bulk-delete-role.html", "name": "security.bulk_delete_role", "privileges": { @@ -15087,7 +15087,7 @@ "stability": "stable" } }, - "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk create or update roles API cannot update roles that are defined in roles files.", + "description": "Bulk create or update roles.\n\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk create or update roles API cannot update roles that are defined in roles files.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-bulk-put-role.html", "name": "security.bulk_put_role", "privileges": { @@ -15153,7 +15153,7 @@ "stability": "stable" } }, - "description": "Changes the passwords of users in the native realm and built-in users.", + "description": "Change passwords.\n\nChange the passwords of users in the native realm and built-in users.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-change-password.html", "name": "security.change_password", "request": { @@ -15199,7 +15199,7 @@ "stability": "stable" } }, - "description": "Evicts a subset of all entries from the API key cache.\nThe cache is also automatically cleared on state changes of the security index.", + "description": "Clear the API key cache.\n\nEvict a subset of all entries from the API key cache.\nThe cache is also automatically cleared on state changes of the security index.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-clear-api-key-cache.html", "name": "security.clear_api_key_cache", "privileges": { @@ -15239,7 +15239,7 @@ "stability": "stable" } }, - "description": "Evicts application privileges from the native application privileges cache.", + "description": "Clear the privileges cache.\n\nEvict privileges from the native application privilege cache.\nThe cache is also automatically cleared for applications that have their privileges updated.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-clear-privilege-cache.html", "name": "security.clear_cached_privileges", "request": { @@ -15273,7 +15273,7 @@ "stability": "stable" } }, - "description": "Evicts users from the user cache. Can completely clear the cache or evict specific users.", + "description": "Clear the user cache.\n\nEvict users from the user cache. You can completely clear the cache or evict specific users.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-clear-cache.html", "name": "security.clear_cached_realms", "request": { @@ -15307,7 +15307,7 @@ "stability": "stable" } }, - "description": "Evicts roles from the native role cache.", + "description": "Clear the roles cache.\n\nEvict roles from the native role cache.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-clear-role-cache.html", "name": "security.clear_cached_roles", "request": { @@ -15341,8 +15341,10 @@ "stability": "stable" } }, - "description": "Evicts tokens from the service account token caches.", + "description": "Clear service account token caches.\n\nEvict a subset of all entries from the service account token caches.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-clear-service-token-caches.html", + "extDocId": "service-accounts", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html", "name": "security.clear_cached_service_tokens", "request": { "name": "Request", @@ -15376,7 +15378,7 @@ "stability": "stable" } }, - "description": "Create an API key.\nCreates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key.\n\nCreate an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-create-api-key.html", "name": "security.create_api_key", "privileges": { @@ -15447,8 +15449,10 @@ "stability": "stable" } }, - "description": "Creates a service accounts token for access without requiring basic authentication.", + "description": "Create a service account token.\n\nCreate a service accounts token for access without requiring basic authentication.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-create-service-token.html", + "extDocId": "service-accounts", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html", "name": "security.create_service_token", "request": { "name": "Request", @@ -15489,8 +15493,10 @@ "stability": "stable" } }, - "description": "Removes application privileges.", + "description": "Delete application privileges.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-delete-privilege.html", + "extDocId": "security-privileges", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-privileges.html", "name": "security.delete_privileges", "request": { "name": "Request", @@ -15523,7 +15529,7 @@ "stability": "stable" } }, - "description": "Removes roles in the native realm.", + "description": "Delete roles.\n\nDelete roles in the native realm.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-delete-role.html", "name": "security.delete_role", "request": { @@ -15558,7 +15564,7 @@ "stability": "stable" } }, - "description": "Removes role mappings.", + "description": "Delete role mappings.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-delete-role-mapping.html", "name": "security.delete_role_mapping", "request": { @@ -15593,8 +15599,10 @@ "stability": "stable" } }, - "description": "Deletes a service account token.", + "description": "Delete service account tokens.\n\nDelete service account tokens for a service in a specified namespace.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-delete-service-token.html", + "extDocId": "service-accounts", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html", "name": "security.delete_service_token", "request": { "name": "Request", @@ -15623,7 +15631,7 @@ "stability": "stable" } }, - "description": "Deletes users from the native realm.", + "description": "Delete users.\n\nDelete users from the native realm.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-delete-user.html", "name": "security.delete_user", "request": { @@ -15653,7 +15661,7 @@ "stability": "stable" } }, - "description": "Disables users in the native realm.", + "description": "Disable users.\n\nDisable users in the native realm.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-disable-user.html", "name": "security.disable_user", "request": { @@ -15689,7 +15697,7 @@ "stability": "stable" } }, - "description": "Disables a user profile so it's not visible in user profile searches.", + "description": "Disable a user profile.\n\nDisable user profiles so that they are not visible in user profile searches.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/master/security-api-disable-user-profile.html", "name": "security.disable_user_profile", "privileges": { @@ -15725,7 +15733,7 @@ "stability": "stable" } }, - "description": "Enables users in the native realm.", + "description": "Enable users.\n\nEnable users in the native realm.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-enable-user.html", "name": "security.enable_user", "request": { @@ -15761,7 +15769,7 @@ "stability": "stable" } }, - "description": "Enables a user profile so it's visible in user profile searches.", + "description": "Enable a user profile.\n\nEnable user profiles to make them visible in user profile searches.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/master/security-api-enable-user-profile.html", "name": "security.enable_user_profile", "privileges": { @@ -15798,7 +15806,7 @@ "stability": "stable" } }, - "description": "Enables a Kibana instance to configure itself for communication with a secured Elasticsearch cluster.", + "description": "Enroll Kibana.\n\nEnable a Kibana instance to configure itself for communication with a secured Elasticsearch cluster.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/master/security-api-kibana-enrollment.html", "name": "security.enroll_kibana", "request": { @@ -15832,7 +15840,7 @@ "stability": "stable" } }, - "description": "Allows a new node to join an existing cluster with security features enabled.", + "description": "Enroll a node.\n\nEnroll a new node to allow it to join an existing cluster with security features enabled.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/master/security-api-node-enrollment.html", "name": "security.enroll_node", "request": { @@ -15870,7 +15878,7 @@ "stability": "stable" } }, - "description": "Get API key information.\nRetrieves information for one or more API keys.\nNOTE: If you have only the `manage_own_api_key` privilege, this API returns only the API keys that you own.\nIf you have `read_security`, `manage_api_key` or greater privileges (including `manage_security`), this API returns all API keys regardless of ownership.", + "description": "Get API key information.\n\nRetrieves information for one or more API keys.\nNOTE: If you have only the `manage_own_api_key` privilege, this API returns only the API keys that you own.\nIf you have `read_security`, `manage_api_key` or greater privileges (including `manage_security`), this API returns all API keys regardless of ownership.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-api-key.html", "name": "security.get_api_key", "privileges": { @@ -15911,8 +15919,10 @@ "stability": "stable" } }, - "description": "Retrieves the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", + "description": "Get builtin privileges.\n\nGet the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-builtin-privileges.html", + "extDocId": "security-privileges", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-privileges.html", "name": "security.get_builtin_privileges", "privileges": { "cluster": [ @@ -15951,8 +15961,10 @@ "stability": "stable" } }, - "description": "Retrieves application privileges.", + "description": "Get application privileges.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-privileges.html", + "extDocId": "security-privileges", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-privileges.html", "name": "security.get_privileges", "request": { "name": "Request", @@ -15997,7 +16009,7 @@ "stability": "stable" } }, - "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe get roles API cannot retrieve roles that are defined in roles files.", + "description": "Get roles.\n\nGet roles in the native realm.\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe get roles API cannot retrieve roles that are defined in roles files.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-role.html", "name": "security.get_role", "privileges": { @@ -16043,8 +16055,10 @@ "stability": "stable" } }, - "description": "Retrieves role mappings.", + "description": "Get role mappings.\n\nRole mappings define which roles are assigned to each user.\nThe role mapping APIs are generally the preferred way to manage role mappings rather than using role mapping files.\nThe get role mappings API cannot retrieve role mappings that are defined in role mapping files.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-role-mapping.html", + "extDocId": "mapping-roles", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/mapping-roles.html", "name": "security.get_role_mapping", "privileges": { "cluster": [ @@ -16089,8 +16103,10 @@ "stability": "stable" } }, - "description": "This API returns a list of service accounts that match the provided path parameter(s).", + "description": "Get service accounts.\n\nGet a list of service accounts that match the provided path parameters.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-service-accounts.html", + "extDocId": "service-accounts", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html", "name": "security.get_service_accounts", "privileges": { "cluster": [ @@ -16141,8 +16157,10 @@ "stability": "stable" } }, - "description": "Retrieves information of all service credentials for a service account.", + "description": "Get service account credentials.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-service-credentials.html", + "extDocId": "service-accounts", + "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/service-accounts.html", "name": "security.get_service_credentials", "request": { "name": "Request", @@ -16204,7 +16222,7 @@ "stability": "stable" } }, - "description": "Creates a bearer token for access without requiring basic authentication.", + "description": "Get a token.\n\nCreate a bearer token for access without requiring basic authentication.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-token.html", "name": "security.get_token", "request": { @@ -16237,7 +16255,7 @@ "stability": "stable" } }, - "description": "Retrieves information about users in the native realm and built-in users.", + "description": "Get users.\n\nGet information about users in the native realm and built-in users.", "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/current/security-api-get-user.html", "name": "security.get_user", "request": { @@ -188055,7 +188073,7 @@ } ] }, - "description": "Creates or updates a user profile on behalf of another user.", + "description": "Activate a user profile.\n\nCreate or update a user profile on behalf of another user.", "inherits": { "type": { "name": "RequestBase", @@ -188068,7 +188086,7 @@ }, "path": [], "query": [], - "specLocation": "security/activate_user_profile/Request.ts#L23-L37" + "specLocation": "security/activate_user_profile/Request.ts#L23-L39" }, { "kind": "response", @@ -188096,7 +188114,7 @@ "body": { "kind": "no_body" }, - "description": "Authenticate a user.\nAuthenticates a user and returns information about the authenticated user.\nInclude the user information in a [basic auth header](https://en.wikipedia.org/wiki/Basic_access_authentication).\nA successful call returns a JSON structure that shows user information such as their username, the roles that are assigned to the user, any assigned metadata, and information about the realms that authenticated and authorized the user.\nIf the user cannot be authenticated, this API returns a 401 status code.", + "description": "Authenticate a user.\n\nAuthenticates a user and returns information about the authenticated user.\nInclude the user information in a [basic auth header](https://en.wikipedia.org/wiki/Basic_access_authentication).\nA successful call returns a JSON structure that shows user information such as their username, the roles that are assigned to the user, any assigned metadata, and information about the realms that authenticated and authorized the user.\nIf the user cannot be authenticated, this API returns a 401 status code.", "inherits": { "type": { "name": "RequestBase", @@ -188109,7 +188127,7 @@ }, "path": [], "query": [], - "specLocation": "security/authenticate/SecurityAuthenticateRequest.ts#L22-L32" + "specLocation": "security/authenticate/SecurityAuthenticateRequest.ts#L22-L33" }, { "kind": "response", @@ -188341,7 +188359,7 @@ } ] }, - "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk delete roles API cannot delete roles that are defined in roles files.", + "description": "Bulk delete roles.\n\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk delete roles API cannot delete roles that are defined in roles files.", "inherits": { "type": { "name": "RequestBase", @@ -188367,7 +188385,7 @@ } } ], - "specLocation": "security/bulk_delete_role/SecurityBulkDeleteRoleRequest.ts#L23-L41" + "specLocation": "security/bulk_delete_role/SecurityBulkDeleteRoleRequest.ts#L23-L43" }, { "kind": "response", @@ -188457,7 +188475,7 @@ } ] }, - "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk create or update roles API cannot update roles that are defined in roles files.", + "description": "Bulk create or update roles.\n\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe bulk create or update roles API cannot update roles that are defined in roles files.", "inherits": { "type": { "name": "RequestBase", @@ -188483,7 +188501,7 @@ } } ], - "specLocation": "security/bulk_put_role/SecurityBulkPutRoleRequest.ts#L25-L43" + "specLocation": "security/bulk_put_role/SecurityBulkPutRoleRequest.ts#L25-L45" }, { "kind": "response", @@ -188589,7 +188607,7 @@ } ] }, - "description": "Changes the passwords of users in the native realm and built-in users.", + "description": "Change passwords.\n\nChange the passwords of users in the native realm and built-in users.", "inherits": { "type": { "name": "RequestBase", @@ -188628,7 +188646,7 @@ } } ], - "specLocation": "security/change_password/SecurityChangePasswordRequest.ts#L23-L51" + "specLocation": "security/change_password/SecurityChangePasswordRequest.ts#L23-L54" }, { "kind": "response", @@ -188650,7 +188668,7 @@ "body": { "kind": "no_body" }, - "description": "Evicts a subset of all entries from the API key cache.\nThe cache is also automatically cleared on state changes of the security index.", + "description": "Clear the API key cache.\n\nEvict a subset of all entries from the API key cache.\nThe cache is also automatically cleared on state changes of the security index.", "inherits": { "type": { "name": "RequestBase", @@ -188676,7 +188694,7 @@ } ], "query": [], - "specLocation": "security/clear_api_key_cache/SecurityClearApiKeyCacheRequest.ts#L23-L40" + "specLocation": "security/clear_api_key_cache/SecurityClearApiKeyCacheRequest.ts#L23-L42" }, { "kind": "response", @@ -188744,7 +188762,7 @@ "body": { "kind": "no_body" }, - "description": "Evicts application privileges from the native application privileges cache.", + "description": "Clear the privileges cache.\n\nEvict privileges from the native application privilege cache.\nThe cache is also automatically cleared for applications that have their privileges updated.", "inherits": { "type": { "name": "RequestBase", @@ -188770,7 +188788,7 @@ } ], "query": [], - "specLocation": "security/clear_cached_privileges/SecurityClearCachedPrivilegesRequest.ts#L23-L32" + "specLocation": "security/clear_cached_privileges/SecurityClearCachedPrivilegesRequest.ts#L23-L36" }, { "kind": "response", @@ -188838,7 +188856,7 @@ "body": { "kind": "no_body" }, - "description": "Evicts users from the user cache. Can completely clear the cache or evict specific users.", + "description": "Clear the user cache.\n\nEvict users from the user cache. You can completely clear the cache or evict specific users.", "inherits": { "type": { "name": "RequestBase", @@ -188880,7 +188898,7 @@ } } ], - "specLocation": "security/clear_cached_realms/SecurityClearCachedRealmsRequest.ts#L23-L35" + "specLocation": "security/clear_cached_realms/SecurityClearCachedRealmsRequest.ts#L23-L38" }, { "kind": "response", @@ -188948,7 +188966,7 @@ "body": { "kind": "no_body" }, - "description": "Evicts roles from the native role cache.", + "description": "Clear the roles cache.\n\nEvict roles from the native role cache.", "inherits": { "type": { "name": "RequestBase", @@ -188974,7 +188992,7 @@ } ], "query": [], - "specLocation": "security/clear_cached_roles/ClearCachedRolesRequest.ts#L23-L32" + "specLocation": "security/clear_cached_roles/ClearCachedRolesRequest.ts#L23-L35" }, { "kind": "response", @@ -189042,7 +189060,7 @@ "body": { "kind": "no_body" }, - "description": "Evicts tokens from the service account token caches.", + "description": "Clear service account token caches.\n\nEvict a subset of all entries from the service account token caches.", "inherits": { "type": { "name": "RequestBase", @@ -189092,7 +189110,7 @@ } ], "query": [], - "specLocation": "security/clear_cached_service_tokens/ClearCachedServiceTokensRequest.ts#L23-L34" + "specLocation": "security/clear_cached_service_tokens/ClearCachedServiceTokensRequest.ts#L23-L38" }, { "kind": "response", @@ -189229,7 +189247,7 @@ } ] }, - "description": "Create an API key.\nCreates an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", + "description": "Create an API key.\n\nCreate an API key for access without requiring basic authentication.\nA successful request returns a JSON structure that contains the API key, its unique id, and its name.\nIf applicable, it also returns expiration information for the API key in milliseconds.\nNOTE: By default, API keys never expire. You can specify expiration information when you create the API keys.", "inherits": { "type": { "name": "RequestBase", @@ -189255,7 +189273,7 @@ } } ], - "specLocation": "security/create_api_key/SecurityCreateApiKeyRequest.ts#L26-L59" + "specLocation": "security/create_api_key/SecurityCreateApiKeyRequest.ts#L26-L60" }, { "kind": "response", @@ -189344,7 +189362,7 @@ "body": { "kind": "no_body" }, - "description": "Creates a service accounts token for access without requiring basic authentication.", + "description": "Create a service account token.\n\nCreate a service accounts token for access without requiring basic authentication.", "inherits": { "type": { "name": "RequestBase", @@ -189407,7 +189425,7 @@ } } ], - "specLocation": "security/create_service_token/CreateServiceTokenRequest.ts#L23-L38" + "specLocation": "security/create_service_token/CreateServiceTokenRequest.ts#L23-L41" }, { "kind": "response", @@ -189505,7 +189523,7 @@ "body": { "kind": "no_body" }, - "description": "Removes application privileges.", + "description": "Delete application privileges.", "inherits": { "type": { "name": "RequestBase", @@ -189556,7 +189574,7 @@ } } ], - "specLocation": "security/delete_privileges/SecurityDeletePrivilegesRequest.ts#L23-L36" + "specLocation": "security/delete_privileges/SecurityDeletePrivilegesRequest.ts#L23-L38" }, { "kind": "response", @@ -189606,7 +189624,7 @@ "body": { "kind": "no_body" }, - "description": "Removes roles in the native realm.", + "description": "Delete roles.\n\nDelete roles in the native realm.", "inherits": { "type": { "name": "RequestBase", @@ -189645,7 +189663,7 @@ } } ], - "specLocation": "security/delete_role/SecurityDeleteRoleRequest.ts#L23-L35" + "specLocation": "security/delete_role/SecurityDeleteRoleRequest.ts#L23-L38" }, { "kind": "response", @@ -189679,7 +189697,7 @@ "body": { "kind": "no_body" }, - "description": "Removes role mappings.", + "description": "Delete role mappings.", "inherits": { "type": { "name": "RequestBase", @@ -189718,7 +189736,7 @@ } } ], - "specLocation": "security/delete_role_mapping/SecurityDeleteRoleMappingRequest.ts#L23-L35" + "specLocation": "security/delete_role_mapping/SecurityDeleteRoleMappingRequest.ts#L23-L36" }, { "kind": "response", @@ -189752,7 +189770,7 @@ "body": { "kind": "no_body" }, - "description": "Deletes a service account token.", + "description": "Delete service account tokens.\n\nDelete service account tokens for a service in a specified namespace.", "inherits": { "type": { "name": "RequestBase", @@ -189815,7 +189833,7 @@ } } ], - "specLocation": "security/delete_service_token/DeleteServiceTokenRequest.ts#L23-L37" + "specLocation": "security/delete_service_token/DeleteServiceTokenRequest.ts#L23-L41" }, { "kind": "response", @@ -189849,7 +189867,7 @@ "body": { "kind": "no_body" }, - "description": "Deletes users from the native realm.", + "description": "Delete users.\n\nDelete users from the native realm.", "inherits": { "type": { "name": "RequestBase", @@ -189888,7 +189906,7 @@ } } ], - "specLocation": "security/delete_user/SecurityDeleteUserRequest.ts#L23-L34" + "specLocation": "security/delete_user/SecurityDeleteUserRequest.ts#L23-L37" }, { "kind": "response", @@ -189922,7 +189940,7 @@ "body": { "kind": "no_body" }, - "description": "Disables users in the native realm.", + "description": "Disable users.\n\nDisable users in the native realm.", "inherits": { "type": { "name": "RequestBase", @@ -189961,7 +189979,7 @@ } } ], - "specLocation": "security/disable_user/SecurityDisableUserRequest.ts#L23-L34" + "specLocation": "security/disable_user/SecurityDisableUserRequest.ts#L23-L37" }, { "kind": "response", @@ -189983,7 +190001,7 @@ "body": { "kind": "no_body" }, - "description": "Disables a user profile so it's not visible in user profile searches.", + "description": "Disable a user profile.\n\nDisable user profiles so that they are not visible in user profile searches.", "inherits": { "type": { "name": "RequestBase", @@ -190023,7 +190041,7 @@ } } ], - "specLocation": "security/disable_user_profile/Request.ts#L24-L47" + "specLocation": "security/disable_user_profile/Request.ts#L24-L49" }, { "kind": "response", @@ -190051,7 +190069,7 @@ "body": { "kind": "no_body" }, - "description": "Enables users in the native realm.", + "description": "Enable users.\n\nEnable users in the native realm.", "inherits": { "type": { "name": "RequestBase", @@ -190090,7 +190108,7 @@ } } ], - "specLocation": "security/enable_user/SecurityEnableUserRequest.ts#L23-L34" + "specLocation": "security/enable_user/SecurityEnableUserRequest.ts#L23-L37" }, { "kind": "response", @@ -190112,7 +190130,7 @@ "body": { "kind": "no_body" }, - "description": "Enables a user profile so it's visible in user profile searches.", + "description": "Enable a user profile.\n\nEnable user profiles to make them visible in user profile searches.", "inherits": { "type": { "name": "RequestBase", @@ -190152,7 +190170,7 @@ } } ], - "specLocation": "security/enable_user_profile/Request.ts#L24-L47" + "specLocation": "security/enable_user_profile/Request.ts#L24-L49" }, { "kind": "response", @@ -190180,7 +190198,7 @@ "body": { "kind": "no_body" }, - "description": "Enables a Kibana instance to configure itself for communication with a secured Elasticsearch cluster.", + "description": "Enroll Kibana.\n\nEnable a Kibana instance to configure itself for communication with a secured Elasticsearch cluster.", "inherits": { "type": { "name": "RequestBase", @@ -190193,7 +190211,7 @@ }, "path": [], "query": [], - "specLocation": "security/enroll_kibana/Request.ts#L22-L27" + "specLocation": "security/enroll_kibana/Request.ts#L22-L29" }, { "kind": "response", @@ -190270,7 +190288,7 @@ "body": { "kind": "no_body" }, - "description": "Allows a new node to join an existing cluster with security features enabled.", + "description": "Enroll a node.\n\nEnroll a new node to allow it to join an existing cluster with security features enabled.", "inherits": { "type": { "name": "RequestBase", @@ -190283,7 +190301,7 @@ }, "path": [], "query": [], - "specLocation": "security/enroll_node/Request.ts#L22-L27" + "specLocation": "security/enroll_node/Request.ts#L22-L29" }, { "kind": "response", @@ -190375,7 +190393,7 @@ "body": { "kind": "no_body" }, - "description": "Get API key information.\nRetrieves information for one or more API keys.\nNOTE: If you have only the `manage_own_api_key` privilege, this API returns only the API keys that you own.\nIf you have `read_security`, `manage_api_key` or greater privileges (including `manage_security`), this API returns all API keys regardless of ownership.", + "description": "Get API key information.\n\nRetrieves information for one or more API keys.\nNOTE: If you have only the `manage_own_api_key` privilege, this API returns only the API keys that you own.\nIf you have `read_security`, `manage_api_key` or greater privileges (including `manage_security`), this API returns all API keys regardless of ownership.", "inherits": { "type": { "name": "RequestBase", @@ -190507,7 +190525,7 @@ } } ], - "specLocation": "security/get_api_key/SecurityGetApiKeyRequest.ts#L23-L87" + "specLocation": "security/get_api_key/SecurityGetApiKeyRequest.ts#L23-L88" }, { "kind": "response", @@ -190544,7 +190562,7 @@ "body": { "kind": "no_body" }, - "description": "Retrieves the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", + "description": "Get builtin privileges.\n\nGet the list of cluster privileges and index privileges that are available in this version of Elasticsearch.", "inherits": { "type": { "name": "RequestBase", @@ -190557,7 +190575,7 @@ }, "path": [], "query": [], - "specLocation": "security/get_builtin_privileges/SecurityGetBuiltinPrivilegesRequest.ts#L22-L28" + "specLocation": "security/get_builtin_privileges/SecurityGetBuiltinPrivilegesRequest.ts#L22-L32" }, { "kind": "response", @@ -190605,7 +190623,7 @@ "body": { "kind": "no_body" }, - "description": "Retrieves application privileges.", + "description": "Get application privileges.", "inherits": { "type": { "name": "RequestBase", @@ -190643,7 +190661,7 @@ } ], "query": [], - "specLocation": "security/get_privileges/SecurityGetPrivilegesRequest.ts#L23-L33" + "specLocation": "security/get_privileges/SecurityGetPrivilegesRequest.ts#L23-L35" }, { "kind": "response", @@ -190693,7 +190711,7 @@ "body": { "kind": "no_body" }, - "description": "The role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe get roles API cannot retrieve roles that are defined in roles files.", + "description": "Get roles.\n\nGet roles in the native realm.\nThe role management APIs are generally the preferred way to manage roles, rather than using file-based role management.\nThe get roles API cannot retrieve roles that are defined in roles files.", "inherits": { "type": { "name": "RequestBase", @@ -190719,7 +190737,7 @@ } ], "query": [], - "specLocation": "security/get_role/SecurityGetRoleRequest.ts#L23-L38" + "specLocation": "security/get_role/SecurityGetRoleRequest.ts#L23-L41" }, { "kind": "response", @@ -190920,7 +190938,7 @@ "body": { "kind": "no_body" }, - "description": "Retrieves role mappings.", + "description": "Get role mappings.\n\nRole mappings define which roles are assigned to each user.\nThe role mapping APIs are generally the preferred way to manage role mappings rather than using role mapping files.\nThe get role mappings API cannot retrieve role mappings that are defined in role mapping files.", "inherits": { "type": { "name": "RequestBase", @@ -190946,7 +190964,7 @@ } ], "query": [], - "specLocation": "security/get_role_mapping/SecurityGetRoleMappingRequest.ts#L23-L36" + "specLocation": "security/get_role_mapping/SecurityGetRoleMappingRequest.ts#L23-L42" }, { "kind": "response", @@ -190985,7 +191003,7 @@ "body": { "kind": "no_body" }, - "description": "This API returns a list of service accounts that match the provided path parameter(s).", + "description": "Get service accounts.\n\nGet a list of service accounts that match the provided path parameters.", "inherits": { "type": { "name": "RequestBase", @@ -191023,7 +191041,7 @@ } ], "query": [], - "specLocation": "security/get_service_accounts/GetServiceAccountsRequest.ts#L23-L41" + "specLocation": "security/get_service_accounts/GetServiceAccountsRequest.ts#L23-L44" }, { "kind": "response", @@ -191152,7 +191170,7 @@ "body": { "kind": "no_body" }, - "description": "Retrieves information of all service credentials for a service account.", + "description": "Get service account credentials.", "inherits": { "type": { "name": "RequestBase", @@ -191190,7 +191208,7 @@ } ], "query": [], - "specLocation": "security/get_service_credentials/GetServiceCredentialsRequest.ts#L23-L39" + "specLocation": "security/get_service_credentials/GetServiceCredentialsRequest.ts#L23-L41" }, { "kind": "response", @@ -191451,7 +191469,7 @@ } ] }, - "description": "Creates a bearer token for access without requiring basic authentication.", + "description": "Get a token.\n\nCreate a bearer token for access without requiring basic authentication.", "inherits": { "type": { "name": "RequestBase", @@ -191464,7 +191482,7 @@ }, "path": [], "query": [], - "specLocation": "security/get_token/GetUserAccessTokenRequest.ts#L25-L39" + "specLocation": "security/get_token/GetUserAccessTokenRequest.ts#L25-L42" }, { "kind": "response", @@ -191596,7 +191614,7 @@ "body": { "kind": "no_body" }, - "description": "Retrieves information about users in the native realm and built-in users.", + "description": "Get users.\n\nGet information about users in the native realm and built-in users.", "inherits": { "type": { "name": "RequestBase", @@ -191657,7 +191675,7 @@ } } ], - "specLocation": "security/get_user/SecurityGetUserRequest.ts#L23-L41" + "specLocation": "security/get_user/SecurityGetUserRequest.ts#L23-L44" }, { "kind": "response",