diff --git a/output/openapi/elasticsearch-openapi.json b/output/openapi/elasticsearch-openapi.json index 987f000307..7b476be454 100644 --- a/output/openapi/elasticsearch-openapi.json +++ b/output/openapi/elasticsearch-openapi.json @@ -29564,7 +29564,8 @@ ] } } - } + }, + "required": true }, "responses": { "200": { diff --git a/output/schema/schema.json b/output/schema/schema.json index 4b2ca9c399..c99833b40a 100644 --- a/output/schema/schema.json +++ b/output/schema/schema.json @@ -16227,7 +16227,8 @@ } }, "description": "Delegate PKI authentication.\nThis API implements the exchange of an X509Certificate chain for an Elasticsearch access token.\nThe certificate chain is validated, according to RFC 5280, by sequentially considering the trust configuration of every installed PKI realm that has `delegation.enabled` set to `true`.\nA successfully trusted client certificate is also subject to the validation of the subject distinguished name according to thw `username_pattern` of the respective realm.\n\nThis API is called by smart and trusted proxies, such as Kibana, which terminate the user's TLS session but still want to authenticate the user by using a PKI realm—-​as if the user connected directly to Elasticsearch.\n\nIMPORTANT: The association between the subject public key in the target certificate and the corresponding private key is not validated.\nThis is part of the TLS authentication process and it is delegated to the proxy that calls this API.\nThe proxy is trusted to have performed the TLS authentication and this API translates that authentication into an Elasticsearch access token.", - "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/master/security-api-delegate-pki-authentication.html", + "docId": "security-api-delegate-pki", + "docUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-delegate-pki-authentication.html", "extDocId": "pki-realm", "extDocUrl": "https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/pki-realm.html", "name": "security.delegate_pki", @@ -16240,7 +16241,7 @@ "name": "Request", "namespace": "security.delegate_pki" }, - "requestBodyRequired": false, + "requestBodyRequired": true, "response": { "name": "Response", "namespace": "security.delegate_pki" @@ -195077,7 +195078,7 @@ }, "path": [], "query": [], - "specLocation": "security/delegate_pki/SecurityDelegatePkiRequest.ts#L22-L49" + "specLocation": "security/delegate_pki/SecurityDelegatePkiRequest.ts#L22-L50" }, { "kind": "response", diff --git a/output/schema/validation-errors.json b/output/schema/validation-errors.json index eb377efe37..d207d4b355 100644 --- a/output/schema/validation-errors.json +++ b/output/schema/validation-errors.json @@ -634,12 +634,6 @@ ], "response": [] }, - "security.delegate_pki": { - "request": [ - "Request: should not have a body" - ], - "response": [] - }, "security.get_settings": { "request": [ "Missing request & response" diff --git a/specification/_doc_ids/table.csv b/specification/_doc_ids/table.csv index 6ae68ccc89..c2cc0b63f2 100644 --- a/specification/_doc_ids/table.csv +++ b/specification/_doc_ids/table.csv @@ -601,6 +601,7 @@ security-api-clear-role-cache,https://www.elastic.co/guide/en/elasticsearch/refe security-api-clear-service-token-caches,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-clear-service-token-caches.html security-api-create-api-key,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-create-api-key.html security-api-create-service-token,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-create-service-token.html +security-api-delegate-pki,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-delegate-pki-authentication.html security-api-delete-privilege,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-delete-privilege.html security-api-delete-role-mapping,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-delete-role-mapping.html security-api-delete-role,https://www.elastic.co/guide/en/elasticsearch/reference/{branch}/security-api-delete-role.html diff --git a/specification/security/delegate_pki/SecurityDelegatePkiRequest.ts b/specification/security/delegate_pki/SecurityDelegatePkiRequest.ts index cf0aaa9e12..a0499586cf 100644 --- a/specification/security/delegate_pki/SecurityDelegatePkiRequest.ts +++ b/specification/security/delegate_pki/SecurityDelegatePkiRequest.ts @@ -33,6 +33,7 @@ import { RequestBase } from '@_types/Base' * @rest_spec_name security.delegate_pki * @availability stack since=7.4.0 stability=stable * @cluster_privileges all + * @doc_id security-api-delegate-pki * @ext_doc_id pki-realm */ export interface Request extends RequestBase {