@cubist-labs/cubesigner-sdk 0.4.236 → 0.4.237
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/package.json +1 -1
- package/dist/src/bucket.d.ts +19 -0
- package/dist/src/bucket.d.ts.map +1 -0
- package/dist/src/bucket.js +17 -0
- package/dist/src/client/api_client.d.ts +25 -2
- package/dist/src/client/api_client.d.ts.map +1 -1
- package/dist/src/client/api_client.js +49 -8
- package/dist/src/index.d.ts +2 -0
- package/dist/src/index.d.ts.map +1 -1
- package/dist/src/index.js +3 -1
- package/dist/src/policy.d.ts +5 -3
- package/dist/src/policy.d.ts.map +1 -1
- package/dist/src/policy.js +2 -2
- package/dist/src/schema.d.ts +248 -11
- package/dist/src/schema.d.ts.map +1 -1
- package/dist/src/schema.js +1 -1
- package/dist/src/schema_types.d.ts +10 -0
- package/dist/src/schema_types.d.ts.map +1 -1
- package/dist/src/schema_types.js +11 -1
- package/dist/src/scopes.d.ts.map +1 -1
- package/dist/src/scopes.js +8 -1
- package/package.json +1 -1
- package/src/bucket.ts +30 -0
- package/src/client/api_client.ts +69 -12
- package/src/index.ts +2 -0
- package/src/policy.ts +8 -5
- package/src/schema.ts +265 -6
- package/src/schema_types.ts +15 -1
- package/src/scopes.ts +7 -0
package/dist/src/schema.d.ts
CHANGED
|
@@ -1031,6 +1031,31 @@ export interface paths {
|
|
|
1031
1031
|
*/
|
|
1032
1032
|
post: operations["invokePolicy"];
|
|
1033
1033
|
};
|
|
1034
|
+
"/v0/org/{org_id}/policy/buckets": {
|
|
1035
|
+
/**
|
|
1036
|
+
* List Buckets
|
|
1037
|
+
* @description List Buckets
|
|
1038
|
+
*
|
|
1039
|
+
* List available meta information about all policy KV store buckets in the org.
|
|
1040
|
+
*/
|
|
1041
|
+
get: operations["listPolicyBuckets"];
|
|
1042
|
+
};
|
|
1043
|
+
"/v0/org/{org_id}/policy/buckets/{bucket_name}": {
|
|
1044
|
+
/**
|
|
1045
|
+
* Get Bucket
|
|
1046
|
+
* @description Get Bucket
|
|
1047
|
+
*
|
|
1048
|
+
* Returns the meta information of a policy KV store bucket.
|
|
1049
|
+
*/
|
|
1050
|
+
get: operations["getPolicyBucket"];
|
|
1051
|
+
/**
|
|
1052
|
+
* Update Bucket
|
|
1053
|
+
* @description Update Bucket
|
|
1054
|
+
*
|
|
1055
|
+
* Updates meta information for an existing policy KV store bucket.
|
|
1056
|
+
*/
|
|
1057
|
+
patch: operations["updatePolicyBucket"];
|
|
1058
|
+
};
|
|
1034
1059
|
"/v0/org/{org_id}/policy/import_key": {
|
|
1035
1060
|
/**
|
|
1036
1061
|
* Create Policy Import Key
|
|
@@ -1046,7 +1071,7 @@ export interface paths {
|
|
|
1046
1071
|
* Get the org-wide policy secrets.
|
|
1047
1072
|
* @description Get the org-wide policy secrets.
|
|
1048
1073
|
*
|
|
1049
|
-
* Note that this only returns the keys for the secrets,
|
|
1074
|
+
* Note that this only returns the keys for the secrets, omitting the values.
|
|
1050
1075
|
* The values are secret and are not accessible outside Wasm policy execution.
|
|
1051
1076
|
*/
|
|
1052
1077
|
get: operations["getPolicySecrets"];
|
|
@@ -1853,8 +1878,7 @@ export interface components {
|
|
|
1853
1878
|
*/
|
|
1854
1879
|
Aud: string | string[];
|
|
1855
1880
|
AuditLogEntry: {
|
|
1856
|
-
|
|
1857
|
-
event: string;
|
|
1881
|
+
event: components["schemas"]["OrgEventDiscriminants"];
|
|
1858
1882
|
/** @description UUID of the event. Unique across all events. */
|
|
1859
1883
|
event_id: string;
|
|
1860
1884
|
org_id: components["schemas"]["Id"];
|
|
@@ -2693,7 +2717,7 @@ export interface components {
|
|
|
2693
2717
|
* @description Billing event types.
|
|
2694
2718
|
* @enum {string}
|
|
2695
2719
|
*/
|
|
2696
|
-
BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "AttestKey" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "CancelInvitation" | "ListInvitations" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "AttestRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "GetEmailConfig" | "DeleteEmailConfig" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "QueryAuditLog" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "RpcApi" | "RpcCreateTransaction" | "RpcGetTransaction" | "RpcListTransactions" | "CustomChainRpcCall" | "EsploraApiCall" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "AttestationJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
|
|
2720
|
+
BillingEvent: "Mmi" | "MmiMessageGet" | "MmiMessageList" | "MmiMessageSign" | "MmiMessageReject" | "MmiMessageDelete" | "AboutMe" | "UserResetEmailInit" | "UserResetEmailComplete" | "UserDeleteTotp" | "UserResetTotpInit" | "UserResetTotpComplete" | "UserVerifyTotp" | "UserRegisterFidoInit" | "UserRegisterFidoComplete" | "UserDeleteFido" | "CreateProofOidc" | "CreateProofCubeSigner" | "VerifyProof" | "AddOidcIdentity" | "RemoveOidcIdentity" | "ListOidcIdentities" | "GetOrg" | "UpdateOrg" | "GetOrgExport" | "CreateOrg" | "ListKeys" | "AttestKey" | "GetKey" | "GetKeyByMaterialId" | "ListKeyRoles" | "UpdateKey" | "ListHistoricalKeyTx" | "Invite" | "CancelInvitation" | "ListInvitations" | "ListUsers" | "GetUser" | "GetUserByEmail" | "GetUserByOidc" | "UpdateMembership" | "ResetMemberMfa" | "CompleteResetMemberMfa" | "CreateRole" | "AttestRole" | "GetRole" | "ListTokenKeys" | "ListRoles" | "GetRoleKey" | "ListRoleKeys" | "ListRoleUsers" | "UpdateRole" | "DeleteRole" | "ConfigureEmail" | "GetEmailConfig" | "DeleteEmailConfig" | "ListHistoricalRoleTx" | "CreatePolicy" | "GetPolicy" | "ListPolicies" | "DeletePolicy" | "UpdatePolicy" | "InvokePolicy" | "GetPolicyLogs" | "UploadWasmPolicy" | "GetPolicySecrets" | "UpdatePolicySecrets" | "SetPolicySecret" | "DeletePolicySecret" | "CreatePolicyImportKey" | "GetPolicyBucket" | "ListPolicyBuckets" | "UpdatePolicyBucket" | "UserExportDelete" | "UserExportList" | "UserExportInit" | "UserExportComplete" | "AddUserToRole" | "RemoveUserFromRole" | "MfaApproveCs" | "MfaRejectCs" | "MfaGet" | "MfaList" | "AddKeysToRole" | "RemoveKeyFromRole" | "CreateToken" | "CreateSession" | "RevokeSession" | "RevokeCurrentSession" | "RevokeSessions" | "ListSessions" | "GetSession" | "SignerSessionRefresh" | "MfaApproveTotp" | "MfaRejectTotp" | "MfaFidoInit" | "MfaApproveFidoComplete" | "MfaRejectFidoComplete" | "MfaEmailInit" | "MfaEmailComplete" | "Cube3signerHeartbeat" | "CreateContact" | "GetContact" | "ListContacts" | "DeleteContact" | "UpdateContact" | "LookupContactsByAddress" | "QueryMetrics" | "QueryAuditLog" | "Counts" | "CreateKey" | "ImportKey" | "CreateKeyImportKey" | "DeriveKey" | "DeleteKey" | "AvaSign" | "AvaSerializedTxSign" | "BabylonRegistration" | "BabylonStaking" | "BabylonCovSign" | "BlobSign" | "BtcMessageSign" | "BtcSign" | "DiffieHellmanExchange" | "PsbtSign" | "PsbtLegacyInputSign" | "PsbtSegwitInputSign" | "PsbtTaprootInputSign" | "TaprootSign" | "Eip712Sign" | "Eip191Sign" | "Eth1Sign" | "Eth2Sign" | "SolanaSign" | "SuiSign" | "TendermintSign" | "Stake" | "Unstake" | "PasskeyAuthInit" | "PasskeyAuthComplete" | "OidcAuth" | "Oauth2Twitter" | "OAuth2TokenRefresh" | "EmailOtpAuth" | "SiweInit" | "SiweComplete" | "TelegramAuth" | "CreateOidcUser" | "DeleteOidcUser" | "DeleteUser" | "CreateEotsNonces" | "EotsSign" | "AuthMigrationIdentityAdd" | "AuthMigrationIdentityRemove" | "AuthMigrationUserUpdate" | "KeyCreated" | "KeyImported" | "InvitationAccept" | "IdpAuthenticate" | "IdpPasswordResetRequest" | "IdpPasswordResetConfirm" | "RpcApi" | "RpcCreateTransaction" | "RpcGetTransaction" | "RpcListTransactions" | "CustomChainRpcCall" | "EsploraApiCall" | "SentryApiCall" | "SentryApiCallPublic" | "MmiJwkSet" | "AttestationJwkSet" | "UserOrgs" | "PublicOrgInfo" | "EmailMyOrgs";
|
|
2697
2721
|
/** @description A bitcoin address and its network. */
|
|
2698
2722
|
BitcoinAddressInfo: {
|
|
2699
2723
|
/**
|
|
@@ -2918,6 +2942,49 @@ export interface components {
|
|
|
2918
2942
|
*/
|
|
2919
2943
|
value: number;
|
|
2920
2944
|
};
|
|
2945
|
+
/**
|
|
2946
|
+
* @description The access-controlled actions that can be performed on a bucket
|
|
2947
|
+
* @enum {string}
|
|
2948
|
+
*/
|
|
2949
|
+
BucketAction: "read:key:value" | "read:key:exists" | "update:key:value" | "delete:key:value" | "scan:keys" | "update:bucket:owner" | "update:bucket:acl" | "update:bucket:metadata";
|
|
2950
|
+
/** @description Information about a policy KV store bucket. */
|
|
2951
|
+
BucketInfo: ({
|
|
2952
|
+
created?: components["schemas"]["EpochDateTime"] | null;
|
|
2953
|
+
last_modified?: components["schemas"]["EpochDateTime"] | null;
|
|
2954
|
+
/**
|
|
2955
|
+
* Format: int64
|
|
2956
|
+
* @description Version of this object
|
|
2957
|
+
*/
|
|
2958
|
+
version?: number;
|
|
2959
|
+
} & {
|
|
2960
|
+
/** @description The access-control entries for the bucket. */
|
|
2961
|
+
acl?: unknown[] | null;
|
|
2962
|
+
/** @description Arbitrary user-defined metadata. */
|
|
2963
|
+
metadata?: unknown;
|
|
2964
|
+
owner: components["schemas"]["Id"];
|
|
2965
|
+
}) & {
|
|
2966
|
+
/** @description The name of the bucket. */
|
|
2967
|
+
name: string;
|
|
2968
|
+
};
|
|
2969
|
+
/**
|
|
2970
|
+
* @description Sub-entity of org where per-bucket metadata (like ACL) is stored.
|
|
2971
|
+
* The [Id] of a [BucketMeta] must be the bucket name.
|
|
2972
|
+
*/
|
|
2973
|
+
BucketMeta: {
|
|
2974
|
+
created?: components["schemas"]["EpochDateTime"] | null;
|
|
2975
|
+
last_modified?: components["schemas"]["EpochDateTime"] | null;
|
|
2976
|
+
/**
|
|
2977
|
+
* Format: int64
|
|
2978
|
+
* @description Version of this object
|
|
2979
|
+
*/
|
|
2980
|
+
version?: number;
|
|
2981
|
+
} & {
|
|
2982
|
+
/** @description The access-control entries for the bucket. */
|
|
2983
|
+
acl?: unknown[] | null;
|
|
2984
|
+
/** @description Arbitrary user-defined metadata. */
|
|
2985
|
+
metadata?: unknown;
|
|
2986
|
+
owner: components["schemas"]["Id"];
|
|
2987
|
+
};
|
|
2921
2988
|
CancelInvitationRequest: {
|
|
2922
2989
|
email: components["schemas"]["Email"];
|
|
2923
2990
|
};
|
|
@@ -4203,7 +4270,7 @@ export interface components {
|
|
|
4203
4270
|
* @description Explicitly named scopes for accessing CubeSigner APIs
|
|
4204
4271
|
* @enum {string}
|
|
4205
4272
|
*/
|
|
4206
|
-
ExplicitScope: "sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email:*" | "manage:email:get" | "manage:email:update" | "manage:email:delete" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:attest" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:region" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:readonly" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:acl" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:acl" | "manage:policy:secrets:update:editPolicy" | "manage:contact:*" | "manage:contact:readonly" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:labels" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:attest" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:actions" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:readonly" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:audit:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:invitation:list" | "manage:org:invitation:cancel" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:update:*" | "manage:org:update:enabled" | "manage:org:update:policy" | "manage:org:update:signPolicy" | "manage:org:update:export" | "manage:org:update:totpFailureLimit" | "manage:org:update:notificationEndpoints" | "manage:org:update:defaultInviteKind" | "manage:org:update:idpConfiguration" | "manage:org:update:passkeyConfiguration" | "manage:org:update:emailPreferences" | "manage:org:update:historicalData" | "manage:org:update:requireScopeCeiling" | "manage:org:update:alienLoginRequirement" | "manage:org:update:memberLoginRequirement" | "manage:org:update:keyExportRequirement" | "manage:org:update:allowedMfaTypes" | "manage:org:update:policyEngineConf" | "manage:org:update:customChains" | "manage:org:update:extProps" | "manage:org:update:editPolicy" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:readonly" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration:*" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*" | "rpc:*" | "rpc:createTransaction:*" | "rpc:createTransaction:evm" | "rpc:getTransaction" | "rpc:listTransactions";
|
|
4273
|
+
ExplicitScope: "sign:*" | "sign:ava" | "sign:blob" | "sign:diffieHellman" | "sign:btc:*" | "sign:btc:segwit" | "sign:btc:taproot" | "sign:btc:psbt:*" | "sign:btc:psbt:doge" | "sign:btc:psbt:legacy" | "sign:btc:psbt:segwit" | "sign:btc:psbt:taproot" | "sign:btc:psbt:ltcSegwit" | "sign:btc:message:*" | "sign:btc:message:segwit" | "sign:btc:message:legacy" | "sign:babylon:*" | "sign:babylon:eots:*" | "sign:babylon:eots:nonces" | "sign:babylon:eots:sign" | "sign:babylon:staking:*" | "sign:babylon:staking:deposit" | "sign:babylon:staking:unbond" | "sign:babylon:staking:withdraw" | "sign:babylon:staking:slash" | "sign:babylon:registration" | "sign:babylon:covenant" | "sign:evm:*" | "sign:evm:tx" | "sign:evm:eip191" | "sign:evm:eip712" | "sign:eth2:*" | "sign:eth2:validate" | "sign:eth2:stake" | "sign:eth2:unstake" | "sign:solana" | "sign:sui" | "sign:tendermint" | "sign:mmi" | "manage:*" | "manage:readonly" | "manage:email:*" | "manage:email:get" | "manage:email:update" | "manage:email:delete" | "manage:mfa:*" | "manage:mfa:readonly" | "manage:mfa:list" | "manage:mfa:vote:*" | "manage:mfa:vote:cs" | "manage:mfa:vote:email" | "manage:mfa:vote:fido" | "manage:mfa:vote:totp" | "manage:mfa:register:*" | "manage:mfa:register:fido" | "manage:mfa:register:totp" | "manage:mfa:register:email" | "manage:mfa:unregister:*" | "manage:mfa:unregister:fido" | "manage:mfa:unregister:totp" | "manage:mfa:verify:*" | "manage:mfa:verify:totp" | "manage:key:*" | "manage:key:readonly" | "manage:key:get" | "manage:key:attest" | "manage:key:listRoles" | "manage:key:list" | "manage:key:history:tx:list" | "manage:key:create" | "manage:key:import" | "manage:key:update:*" | "manage:key:update:owner" | "manage:key:update:policy" | "manage:key:update:enabled" | "manage:key:update:region" | "manage:key:update:metadata" | "manage:key:update:editPolicy" | "manage:key:delete" | "manage:policy:*" | "manage:policy:readonly" | "manage:policy:create" | "manage:policy:get" | "manage:policy:list" | "manage:policy:delete" | "manage:policy:update:*" | "manage:policy:update:owner" | "manage:policy:update:name" | "manage:policy:update:acl" | "manage:policy:update:editPolicy" | "manage:policy:update:metadata" | "manage:policy:update:rule" | "manage:policy:invoke" | "manage:policy:wasm:*" | "manage:policy:wasm:upload" | "manage:policy:secrets:*" | "manage:policy:secrets:get" | "manage:policy:secrets:update:*" | "manage:policy:secrets:update:values" | "manage:policy:secrets:update:acl" | "manage:policy:secrets:update:editPolicy" | "manage:policy:buckets:*" | "manage:policy:buckets:get" | "manage:policy:buckets:list" | "manage:policy:buckets:update:*" | "manage:policy:buckets:update:owner" | "manage:policy:buckets:update:acl" | "manage:policy:buckets:update:metadata" | "manage:contact:*" | "manage:contact:readonly" | "manage:contact:create" | "manage:contact:get" | "manage:contact:list" | "manage:contact:delete" | "manage:contact:update:*" | "manage:contact:update:name" | "manage:contact:update:addresses" | "manage:contact:update:owner" | "manage:contact:update:labels" | "manage:contact:update:metadata" | "manage:contact:update:editPolicy" | "manage:contact:lookup:*" | "manage:contact:lookup:address" | "manage:policy:createImportKey" | "manage:role:*" | "manage:role:readonly" | "manage:role:create" | "manage:role:delete" | "manage:role:get:*" | "manage:role:attest" | "manage:role:get:keys" | "manage:role:get:keys:list" | "manage:role:get:keys:get" | "manage:role:get:users" | "manage:role:list" | "manage:role:update:*" | "manage:role:update:enabled" | "manage:role:update:policy" | "manage:role:update:editPolicy" | "manage:role:update:actions" | "manage:role:update:key:*" | "manage:role:update:key:add" | "manage:role:update:key:remove" | "manage:role:update:user:*" | "manage:role:update:user:add" | "manage:role:update:user:remove" | "manage:role:history:tx:list" | "manage:identity:*" | "manage:identity:readonly" | "manage:identity:verify" | "manage:identity:add" | "manage:identity:remove" | "manage:identity:list" | "manage:org:*" | "manage:org:create" | "manage:org:metrics:query" | "manage:org:audit:query" | "manage:org:readonly" | "manage:org:addUser" | "manage:org:inviteUser" | "manage:org:inviteAlien" | "manage:org:invitation:list" | "manage:org:invitation:cancel" | "manage:org:updateMembership" | "manage:org:listUsers" | "manage:org:user:get" | "manage:org:deleteUser" | "manage:org:get" | "manage:org:update:*" | "manage:org:update:enabled" | "manage:org:update:policy" | "manage:org:update:signPolicy" | "manage:org:update:export" | "manage:org:update:totpFailureLimit" | "manage:org:update:notificationEndpoints" | "manage:org:update:defaultInviteKind" | "manage:org:update:idpConfiguration" | "manage:org:update:passkeyConfiguration" | "manage:org:update:emailPreferences" | "manage:org:update:historicalData" | "manage:org:update:requireScopeCeiling" | "manage:org:update:alienLoginRequirement" | "manage:org:update:memberLoginRequirement" | "manage:org:update:keyExportRequirement" | "manage:org:update:allowedMfaTypes" | "manage:org:update:policyEngineConf" | "manage:org:update:customChains" | "manage:org:update:extProps" | "manage:org:update:editPolicy" | "manage:org:user:resetMfa" | "manage:session:*" | "manage:session:readonly" | "manage:session:get" | "manage:session:list" | "manage:session:create" | "manage:session:extend" | "manage:session:revoke" | "manage:export:*" | "manage:export:readonly" | "manage:export:org:*" | "manage:export:org:get" | "manage:export:user:*" | "manage:export:user:delete" | "manage:export:user:list" | "manage:authMigration:*" | "manage:authMigration:identity:add" | "manage:authMigration:identity:remove" | "manage:authMigration:user:update" | "manage:mmi:*" | "manage:mmi:readonly" | "manage:mmi:get" | "manage:mmi:list" | "manage:mmi:reject" | "manage:mmi:delete" | "export:*" | "export:user:*" | "export:user:init" | "export:user:complete" | "mmi:*" | "orgAccess:*" | "orgAccess:child:*" | "rpc:*" | "rpc:createTransaction:*" | "rpc:createTransaction:evm" | "rpc:getTransaction" | "rpc:listTransactions";
|
|
4207
4274
|
/**
|
|
4208
4275
|
* @description This type specifies the interpretation of the `fee` field in Babylon
|
|
4209
4276
|
* staking requests. If `sats`, the field is intpreted as a fixed value
|
|
@@ -4259,7 +4326,7 @@ export interface components {
|
|
|
4259
4326
|
request_device_identifier?: boolean;
|
|
4260
4327
|
};
|
|
4261
4328
|
/** @enum {string} */
|
|
4262
|
-
ForbiddenErrorCode: "AlienKeyCreate" | "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "ChangingKeyExportRequirementIsDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature" | "Acl";
|
|
4329
|
+
ForbiddenErrorCode: "AlienKeyCreate" | "CannotAssumeIdentity" | "SentryDisallowed" | "PasskeyLoginDisabled" | "PasskeyNotRegistered" | "CannotCreateOrg" | "WrongMfaEmailOtpJwt" | "OrgFlagNotSet" | "FidoRequiredToRemoveTotp" | "OidcIdentityLimitReached" | "OidcScopeCeilingMissing" | "OidcIssuerNotAllowedForMemberRole" | "OidcNoMemberRolesAllowed" | "EmailOtpNotConfigured" | "MfaChallengeExpired" | "ChainIdNotAllowed" | "InvalidOrg" | "OrgIdMismatch" | "SessionForWrongOrg" | "SelfDelete" | "SelfDisable" | "InvalidOrgMembershipRoleChange" | "UserDisabled" | "OrgDisabled" | "OrgNotFound" | "OrgWithoutOwner" | "OrphanedUser" | "OidcUserNotFound" | "UserNotInOrg" | "UserNotOrgOwner" | "UserNotKeyOwner" | "InvalidRole" | "DisabledRole" | "KeyDisabled" | "KeyNotInRole" | "ContactNotInOrg" | "UserExportRequestNotInOrg" | "UserExportRequestInvalid" | "UserExportDisabled" | "UserNotOriginalKeyOwner" | "UserNotInRole" | "MustBeFullMember" | "SessionExpired" | "SessionChanged" | "SessionRevoked" | "ExpectedUserSession" | "SessionRoleChanged" | "ScopedNameNotFound" | "SessionInvalidEpochToken" | "SessionInvalidRefreshToken" | "SessionRefreshTokenExpired" | "InvalidAuthHeader" | "SessionNotFound" | "InvalidArn" | "SessionInvalidAuthToken" | "SessionAuthTokenExpired" | "SessionPossiblyStolenToken" | "MfaDisallowedIdentity" | "MfaDisallowedApprover" | "MfaTypeNotAllowed" | "MfaNotApprovedYet" | "MfaConfirmationCodeMismatch" | "MfaHttpRequestMismatch" | "MfaRemoveBelowMin" | "MfaOrgRequirementNotMet" | "MfaRegistrationDisallowed" | "TotpAlreadyConfigured" | "TotpConfigurationChanged" | "MfaTotpBadConfiguration" | "MfaTotpBadCode" | "MfaTotpRateLimit" | "ImproperSessionScope" | "FullSessionRequired" | "SessionWithoutAnyScopeUnder" | "UserRoleUnprivileged" | "MemberRoleForbidden" | "MfaNotConfigured" | "RemoveLastOidcIdentity" | "OperationNotAllowed" | "OrgExportRetrievalDisabled" | "ChangingKeyExportRequirementIsDisabled" | "AutoAddBlsKeyToProtectedRole" | "UserNotPolicyOwner" | "UserNotContactOwner" | "UserNotBucketOwner" | "LegacySessionCannotHaveScopeCeiling" | "RoleInParentOrgNotAllowed" | "RemoveKeyFromRoleUserNotAllowed" | "SiweChallengeExpired" | "SiweMessageNotValid" | "SiweMessageInvalidSignature" | "Acl";
|
|
4263
4330
|
/**
|
|
4264
4331
|
* @description Specifies a fork of the `BeaconChain`, to prevent replay attacks.
|
|
4265
4332
|
* The schema of `Fork` is defined in the [Beacon chain
|
|
@@ -5120,7 +5187,7 @@ export interface components {
|
|
|
5120
5187
|
/** Format: binary */
|
|
5121
5188
|
NonceValue: string;
|
|
5122
5189
|
/** @enum {string} */
|
|
5123
|
-
NotFoundErrorCode: "UriSegmentMissing" | "UriSegmentInvalid" | "TotpNotConfigured" | "FidoKeyNotFound" | "FidoChallengeNotFound" | "TotpChallengeNotFound" | "UserExportRequestNotFound" | "UserExportCiphertextNotFound" | "OrgExportCiphertextNotFound" | "UploadObjectNotFound" | "PolicySecretNotFound" | "TimestreamDisabled" | "CustomChainNotFound" | "InvitationNotFound" | "TransactionNotFound" | "EmailConfigNotFound";
|
|
5190
|
+
NotFoundErrorCode: "UriSegmentMissing" | "UriSegmentInvalid" | "TotpNotConfigured" | "FidoKeyNotFound" | "FidoChallengeNotFound" | "TotpChallengeNotFound" | "UserExportRequestNotFound" | "UserExportCiphertextNotFound" | "OrgExportCiphertextNotFound" | "UploadObjectNotFound" | "PolicySecretNotFound" | "BucketMetaNotFound" | "TimestreamDisabled" | "CustomChainNotFound" | "InvitationNotFound" | "TransactionNotFound" | "EmailConfigNotFound";
|
|
5124
5191
|
/** @description The configuration and status of a notification endpoint */
|
|
5125
5192
|
NotificationEndpoint: components["schemas"]["NotificationEndpointSubscription"] & {
|
|
5126
5193
|
status: components["schemas"]["SubscriptionStatus"];
|
|
@@ -5716,6 +5783,21 @@ export interface components {
|
|
|
5716
5783
|
*/
|
|
5717
5784
|
last_evaluated_key?: string | null;
|
|
5718
5785
|
};
|
|
5786
|
+
/**
|
|
5787
|
+
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
5788
|
+
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
5789
|
+
*/
|
|
5790
|
+
PaginatedListBucketsResponse: {
|
|
5791
|
+
/** @description The buckets in the organization. */
|
|
5792
|
+
buckets: components["schemas"]["BucketInfo"][];
|
|
5793
|
+
} & {
|
|
5794
|
+
/**
|
|
5795
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
5796
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
5797
|
+
* but specify this value as the 'page.start' query parameter.
|
|
5798
|
+
*/
|
|
5799
|
+
last_evaluated_key?: string | null;
|
|
5800
|
+
};
|
|
5719
5801
|
/**
|
|
5720
5802
|
* @description Response type that wraps another type and adds base64url-encoded encrypted `last_evaluated_key`
|
|
5721
5803
|
* value (which can the user pass back to use as a url query parameter to continue pagination).
|
|
@@ -6035,12 +6117,10 @@ export interface components {
|
|
|
6035
6117
|
message_tx?: components["schemas"]["TypedTransaction"] | null;
|
|
6036
6118
|
}) & Record<string, never>;
|
|
6037
6119
|
/**
|
|
6038
|
-
* PolicyAction
|
|
6039
6120
|
* @description The access-controlled actions that can be performed on a named policy.
|
|
6040
|
-
* @example read:policy
|
|
6041
6121
|
* @enum {string}
|
|
6042
6122
|
*/
|
|
6043
|
-
PolicyAction: "read:*" | "read:policy" | "read:logs" | "update:*" | "update:name" | "update:rules" | "update:metadata" | "update:editPolicy" | "update:owner" | "update:acl" | "delete" | "attach" | "sign" | "invoke";
|
|
6123
|
+
PolicyAction: "read:*" | "read" | "read:policy" | "read:logs" | "update:*" | "update" | "update:name" | "update:rules" | "update:metadata" | "update:editPolicy" | "update:owner" | "update:acl" | "delete" | "attach" | "sign" | "invoke";
|
|
6044
6124
|
/** @description The id for attaching a named policy to a key, role, or key in role. */
|
|
6045
6125
|
PolicyAttachedToId: OneOf<[
|
|
6046
6126
|
{
|
|
@@ -7594,6 +7674,23 @@ export interface components {
|
|
|
7594
7674
|
/** @description Optional policy evaluation tree. */
|
|
7595
7675
|
policy_eval_tree?: unknown;
|
|
7596
7676
|
} & Record<string, never>;
|
|
7677
|
+
/** @description The information needed to update a bucket. */
|
|
7678
|
+
UpdateBucketRequest: {
|
|
7679
|
+
/** @description Access-control entries defining how the bucket can be accessed. */
|
|
7680
|
+
acl?: unknown;
|
|
7681
|
+
/**
|
|
7682
|
+
* Format: int64
|
|
7683
|
+
* @description If set, updating only succeeds if the current version matches this value.
|
|
7684
|
+
*/
|
|
7685
|
+
expected_version?: number | null;
|
|
7686
|
+
/** @description Optional metadata. */
|
|
7687
|
+
metadata?: unknown;
|
|
7688
|
+
/**
|
|
7689
|
+
* @description Update the owner of the bucket
|
|
7690
|
+
* @example User#00000000-0000-0000-0000-000000000000
|
|
7691
|
+
*/
|
|
7692
|
+
owner?: string | null;
|
|
7693
|
+
};
|
|
7597
7694
|
/** @description The information needed to update a Contact. */
|
|
7598
7695
|
UpdateContactRequest: {
|
|
7599
7696
|
addresses?: components["schemas"]["AddressMap"] | null;
|
|
@@ -8417,6 +8514,29 @@ export interface components {
|
|
|
8417
8514
|
};
|
|
8418
8515
|
};
|
|
8419
8516
|
};
|
|
8517
|
+
/** @description Information about a policy KV store bucket. */
|
|
8518
|
+
BucketInfo: {
|
|
8519
|
+
content: {
|
|
8520
|
+
"application/json": ({
|
|
8521
|
+
created?: components["schemas"]["EpochDateTime"] | null;
|
|
8522
|
+
last_modified?: components["schemas"]["EpochDateTime"] | null;
|
|
8523
|
+
/**
|
|
8524
|
+
* Format: int64
|
|
8525
|
+
* @description Version of this object
|
|
8526
|
+
*/
|
|
8527
|
+
version?: number;
|
|
8528
|
+
} & {
|
|
8529
|
+
/** @description The access-control entries for the bucket. */
|
|
8530
|
+
acl?: unknown[] | null;
|
|
8531
|
+
/** @description Arbitrary user-defined metadata. */
|
|
8532
|
+
metadata?: unknown;
|
|
8533
|
+
owner: components["schemas"]["Id"];
|
|
8534
|
+
}) & {
|
|
8535
|
+
/** @description The name of the bucket. */
|
|
8536
|
+
name: string;
|
|
8537
|
+
};
|
|
8538
|
+
};
|
|
8539
|
+
};
|
|
8420
8540
|
/** @description The number of users and keys in an org, organized by user role and key type */
|
|
8421
8541
|
ComputeCountsResponse: {
|
|
8422
8542
|
content: {
|
|
@@ -9132,6 +9252,21 @@ export interface components {
|
|
|
9132
9252
|
};
|
|
9133
9253
|
};
|
|
9134
9254
|
};
|
|
9255
|
+
PaginatedListBucketsResponse: {
|
|
9256
|
+
content: {
|
|
9257
|
+
"application/json": {
|
|
9258
|
+
/** @description The buckets in the organization. */
|
|
9259
|
+
buckets: components["schemas"]["BucketInfo"][];
|
|
9260
|
+
} & {
|
|
9261
|
+
/**
|
|
9262
|
+
* @description If set, the content of `response` does not contain the entire result set.
|
|
9263
|
+
* To fetch the next page of the result set, call the same endpoint
|
|
9264
|
+
* but specify this value as the 'page.start' query parameter.
|
|
9265
|
+
*/
|
|
9266
|
+
last_evaluated_key?: string | null;
|
|
9267
|
+
};
|
|
9268
|
+
};
|
|
9269
|
+
};
|
|
9135
9270
|
PaginatedListContactsResponse: {
|
|
9136
9271
|
content: {
|
|
9137
9272
|
"application/json": {
|
|
@@ -13358,6 +13493,108 @@ export interface operations {
|
|
|
13358
13493
|
};
|
|
13359
13494
|
};
|
|
13360
13495
|
};
|
|
13496
|
+
/**
|
|
13497
|
+
* List Buckets
|
|
13498
|
+
* @description List Buckets
|
|
13499
|
+
*
|
|
13500
|
+
* List available meta information about all policy KV store buckets in the org.
|
|
13501
|
+
*/
|
|
13502
|
+
listPolicyBuckets: {
|
|
13503
|
+
parameters: {
|
|
13504
|
+
query?: {
|
|
13505
|
+
/**
|
|
13506
|
+
* @description Max number of items to return per page.
|
|
13507
|
+
*
|
|
13508
|
+
* If the actual number of returned items may be less that this, even if there exist more
|
|
13509
|
+
* data in the result set. To reliably determine if more data is left in the result set,
|
|
13510
|
+
* inspect the [UnencryptedLastEvalKey] value in the response object.
|
|
13511
|
+
*/
|
|
13512
|
+
"page.size"?: number;
|
|
13513
|
+
/**
|
|
13514
|
+
* @description The start of the page. Omit to start from the beginning; otherwise, only specify a
|
|
13515
|
+
* the exact value previously returned as 'last_evaluated_key' from the same endpoint.
|
|
13516
|
+
*/
|
|
13517
|
+
"page.start"?: string | null;
|
|
13518
|
+
};
|
|
13519
|
+
path: {
|
|
13520
|
+
/**
|
|
13521
|
+
* @description Name or ID of the desired Org
|
|
13522
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
13523
|
+
*/
|
|
13524
|
+
org_id: string;
|
|
13525
|
+
};
|
|
13526
|
+
};
|
|
13527
|
+
responses: {
|
|
13528
|
+
200: components["responses"]["PaginatedListBucketsResponse"];
|
|
13529
|
+
default: {
|
|
13530
|
+
content: {
|
|
13531
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
13532
|
+
};
|
|
13533
|
+
};
|
|
13534
|
+
};
|
|
13535
|
+
};
|
|
13536
|
+
/**
|
|
13537
|
+
* Get Bucket
|
|
13538
|
+
* @description Get Bucket
|
|
13539
|
+
*
|
|
13540
|
+
* Returns the meta information of a policy KV store bucket.
|
|
13541
|
+
*/
|
|
13542
|
+
getPolicyBucket: {
|
|
13543
|
+
parameters: {
|
|
13544
|
+
path: {
|
|
13545
|
+
/**
|
|
13546
|
+
* @description Name or ID of the desired Org
|
|
13547
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
13548
|
+
*/
|
|
13549
|
+
org_id: string;
|
|
13550
|
+
bucket_name: string;
|
|
13551
|
+
};
|
|
13552
|
+
};
|
|
13553
|
+
responses: {
|
|
13554
|
+
200: components["responses"]["BucketInfo"];
|
|
13555
|
+
default: {
|
|
13556
|
+
content: {
|
|
13557
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
13558
|
+
};
|
|
13559
|
+
};
|
|
13560
|
+
};
|
|
13561
|
+
};
|
|
13562
|
+
/**
|
|
13563
|
+
* Update Bucket
|
|
13564
|
+
* @description Update Bucket
|
|
13565
|
+
*
|
|
13566
|
+
* Updates meta information for an existing policy KV store bucket.
|
|
13567
|
+
*/
|
|
13568
|
+
updatePolicyBucket: {
|
|
13569
|
+
parameters: {
|
|
13570
|
+
path: {
|
|
13571
|
+
/**
|
|
13572
|
+
* @description Name or ID of the desired Org
|
|
13573
|
+
* @example Org#124dfe3e-3bbd-487d-80c0-53c55e8ab87a
|
|
13574
|
+
*/
|
|
13575
|
+
org_id: string;
|
|
13576
|
+
bucket_name: string;
|
|
13577
|
+
};
|
|
13578
|
+
};
|
|
13579
|
+
requestBody: {
|
|
13580
|
+
content: {
|
|
13581
|
+
"application/json": components["schemas"]["UpdateBucketRequest"];
|
|
13582
|
+
};
|
|
13583
|
+
};
|
|
13584
|
+
responses: {
|
|
13585
|
+
200: components["responses"]["BucketInfo"];
|
|
13586
|
+
202: {
|
|
13587
|
+
content: {
|
|
13588
|
+
"application/json": components["schemas"]["AcceptedResponse"];
|
|
13589
|
+
};
|
|
13590
|
+
};
|
|
13591
|
+
default: {
|
|
13592
|
+
content: {
|
|
13593
|
+
"application/json": components["schemas"]["ErrorResponse"];
|
|
13594
|
+
};
|
|
13595
|
+
};
|
|
13596
|
+
};
|
|
13597
|
+
};
|
|
13361
13598
|
/**
|
|
13362
13599
|
* Create Policy Import Key
|
|
13363
13600
|
* @description Create Policy Import Key
|
|
@@ -13388,7 +13625,7 @@ export interface operations {
|
|
|
13388
13625
|
* Get the org-wide policy secrets.
|
|
13389
13626
|
* @description Get the org-wide policy secrets.
|
|
13390
13627
|
*
|
|
13391
|
-
* Note that this only returns the keys for the secrets,
|
|
13628
|
+
* Note that this only returns the keys for the secrets, omitting the values.
|
|
13392
13629
|
* The values are secret and are not accessible outside Wasm policy execution.
|
|
13393
13630
|
*/
|
|
13394
13631
|
getPolicySecrets: {
|