@flipdish/authorization 0.2.32 → 0.2.33

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/api.d.ts CHANGED
@@ -963,6 +963,58 @@ export type GetUserPermissionsSuccessResponseResourcesValueResourceTypeEnum = ty
963
963
  */
964
964
  export interface GetUserPermissionsSuccessResponseResourcesValueResourceId {
965
965
  }
966
+ /**
967
+ * Grant teammate app access to a user being assigned within a brand for the first time.
968
+ * @export
969
+ * @interface GrantTeammateAccessRequestBody
970
+ */
971
+ export interface GrantTeammateAccessRequestBody {
972
+ /**
973
+ * Teammate app access level (role)
974
+ * @type {string}
975
+ * @memberof GrantTeammateAccessRequestBody
976
+ */
977
+ 'appAccessLevel': GrantTeammateAccessRequestBodyAppAccessLevelEnum;
978
+ /**
979
+ * Brand identifier (AppId); normalized to lowercase when stored
980
+ * @type {string}
981
+ * @memberof GrantTeammateAccessRequestBody
982
+ */
983
+ 'brandId': string;
984
+ /**
985
+ * Org-wide store access; when false, propertyIds are required for property-scoped roles
986
+ * @type {boolean}
987
+ * @memberof GrantTeammateAccessRequestBody
988
+ */
989
+ 'hasAccessToAllStores': boolean;
990
+ /**
991
+ * Property resource ids (e.g. p123) when scoped to properties
992
+ * @type {Array<string>}
993
+ * @memberof GrantTeammateAccessRequestBody
994
+ */
995
+ 'propertyIds'?: Array<string>;
996
+ /**
997
+ * Target user email; persisted on first assignment only
998
+ * @type {string}
999
+ * @memberof GrantTeammateAccessRequestBody
1000
+ */
1001
+ 'userEmail': string;
1002
+ /**
1003
+ * Target user display name; persisted on first assignment only
1004
+ * @type {string}
1005
+ * @memberof GrantTeammateAccessRequestBody
1006
+ */
1007
+ 'userName'?: string;
1008
+ }
1009
+ export declare const GrantTeammateAccessRequestBodyAppAccessLevelEnum: {
1010
+ readonly Owner: "Owner";
1011
+ readonly ManagedOwner: "ManagedOwner";
1012
+ readonly PropertyOwner: "PropertyOwner";
1013
+ readonly PropertyManager: "PropertyManager";
1014
+ readonly FinanceManager: "FinanceManager";
1015
+ readonly Integrator: "Integrator";
1016
+ };
1017
+ export type GrantTeammateAccessRequestBodyAppAccessLevelEnum = typeof GrantTeammateAccessRequestBodyAppAccessLevelEnum[keyof typeof GrantTeammateAccessRequestBodyAppAccessLevelEnum];
966
1018
  /**
967
1019
  *
968
1020
  * @export
@@ -1389,6 +1441,60 @@ export declare const Permissions: {
1389
1441
  readonly RoleAuthDeveloper: "RoleAuthDeveloper";
1390
1442
  };
1391
1443
  export type Permissions = typeof Permissions[keyof typeof Permissions];
1444
+ /**
1445
+ * Principal with teammate permission summary
1446
+ * @export
1447
+ * @interface PrincipalInOrgWithTeammatePermissionSummary
1448
+ */
1449
+ export interface PrincipalInOrgWithTeammatePermissionSummary {
1450
+ /**
1451
+ *
1452
+ * @type {string}
1453
+ * @memberof PrincipalInOrgWithTeammatePermissionSummary
1454
+ */
1455
+ 'type': PrincipalInOrgWithTeammatePermissionSummaryTypeEnum;
1456
+ /**
1457
+ *
1458
+ * @type {string}
1459
+ * @memberof PrincipalInOrgWithTeammatePermissionSummary
1460
+ */
1461
+ 'id': string;
1462
+ /**
1463
+ *
1464
+ * @type {string}
1465
+ * @memberof PrincipalInOrgWithTeammatePermissionSummary
1466
+ */
1467
+ 'name'?: string;
1468
+ /**
1469
+ *
1470
+ * @type {string}
1471
+ * @memberof PrincipalInOrgWithTeammatePermissionSummary
1472
+ */
1473
+ 'email'?: string;
1474
+ /**
1475
+ *
1476
+ * @type {string}
1477
+ * @memberof PrincipalInOrgWithTeammatePermissionSummary
1478
+ */
1479
+ 'phone'?: string;
1480
+ /**
1481
+ * Teammate role label; null when no compensating role or unknown
1482
+ * @type {string}
1483
+ * @memberof PrincipalInOrgWithTeammatePermissionSummary
1484
+ */
1485
+ 'roleDisplay': string;
1486
+ /**
1487
+ * True when granular roles differ from default for the compensating role
1488
+ * @type {boolean}
1489
+ * @memberof PrincipalInOrgWithTeammatePermissionSummary
1490
+ */
1491
+ 'isCustomised': boolean;
1492
+ }
1493
+ export declare const PrincipalInOrgWithTeammatePermissionSummaryTypeEnum: {
1494
+ readonly User: "User";
1495
+ readonly Automation: "Automation";
1496
+ };
1497
+ export type PrincipalInOrgWithTeammatePermissionSummaryTypeEnum = typeof PrincipalInOrgWithTeammatePermissionSummaryTypeEnum[keyof typeof PrincipalInOrgWithTeammatePermissionSummaryTypeEnum];
1392
1498
  /**
1393
1499
  * Principals in org
1394
1500
  * @export
@@ -1408,6 +1514,25 @@ export interface PrincipalsInOrgResponse {
1408
1514
  */
1409
1515
  'principals': Array<AuthorizationRequestPrincipal>;
1410
1516
  }
1517
+ /**
1518
+ * Principals in org including teammate permission summary per principal
1519
+ * @export
1520
+ * @interface PrincipalsInOrgWithTeammatePermissionSummaryResponse
1521
+ */
1522
+ export interface PrincipalsInOrgWithTeammatePermissionSummaryResponse {
1523
+ /**
1524
+ *
1525
+ * @type {string}
1526
+ * @memberof PrincipalsInOrgWithTeammatePermissionSummaryResponse
1527
+ */
1528
+ 'orgId': string;
1529
+ /**
1530
+ * List of principals with roleDisplay and isCustomised
1531
+ * @type {Array<PrincipalInOrgWithTeammatePermissionSummary>}
1532
+ * @memberof PrincipalsInOrgWithTeammatePermissionSummaryResponse
1533
+ */
1534
+ 'principals': Array<PrincipalInOrgWithTeammatePermissionSummary>;
1535
+ }
1411
1536
  /**
1412
1537
  * Details for revoking a forbidden role from a principal
1413
1538
  * @export
@@ -1572,6 +1697,59 @@ export declare const RoleNames: {
1572
1697
  readonly AuthDeveloper: "AuthDeveloper";
1573
1698
  };
1574
1699
  export type RoleNames = typeof RoleNames[keyof typeof RoleNames];
1700
+ /**
1701
+ * Teammate access applied
1702
+ * @export
1703
+ * @interface TeammateAccessSuccessResponse
1704
+ */
1705
+ export interface TeammateAccessSuccessResponse {
1706
+ /**
1707
+ *
1708
+ * @type {string}
1709
+ * @memberof TeammateAccessSuccessResponse
1710
+ */
1711
+ 'message': string;
1712
+ }
1713
+ /**
1714
+ * Update teammate app access for an existing teammate. Email and name are not accepted on update; the existing values stored against the user id are reused.
1715
+ * @export
1716
+ * @interface UpdateTeammateAccessRequestBody
1717
+ */
1718
+ export interface UpdateTeammateAccessRequestBody {
1719
+ /**
1720
+ * Teammate app access level (role)
1721
+ * @type {string}
1722
+ * @memberof UpdateTeammateAccessRequestBody
1723
+ */
1724
+ 'appAccessLevel': UpdateTeammateAccessRequestBodyAppAccessLevelEnum;
1725
+ /**
1726
+ * Brand identifier (AppId); normalized to lowercase when stored
1727
+ * @type {string}
1728
+ * @memberof UpdateTeammateAccessRequestBody
1729
+ */
1730
+ 'brandId': string;
1731
+ /**
1732
+ * Org-wide store access; when false, propertyIds are required for property-scoped roles
1733
+ * @type {boolean}
1734
+ * @memberof UpdateTeammateAccessRequestBody
1735
+ */
1736
+ 'hasAccessToAllStores': boolean;
1737
+ /**
1738
+ * Property resource ids (e.g. p123) when scoped to properties
1739
+ * @type {Array<string>}
1740
+ * @memberof UpdateTeammateAccessRequestBody
1741
+ */
1742
+ 'propertyIds'?: Array<string>;
1743
+ }
1744
+ export declare const UpdateTeammateAccessRequestBodyAppAccessLevelEnum: {
1745
+ readonly Owner: "Owner";
1746
+ readonly ManagedOwner: "ManagedOwner";
1747
+ readonly PropertyOwner: "PropertyOwner";
1748
+ readonly PropertyManager: "PropertyManager";
1749
+ readonly FinanceManager: "FinanceManager";
1750
+ readonly Integrator: "Integrator";
1751
+ };
1752
+ export type UpdateTeammateAccessRequestBodyAppAccessLevelEnum = typeof UpdateTeammateAccessRequestBodyAppAccessLevelEnum[keyof typeof UpdateTeammateAccessRequestBodyAppAccessLevelEnum];
1575
1753
  /**
1576
1754
  *
1577
1755
  * @export
@@ -2204,6 +2382,16 @@ export declare const RoleAssignmentApiAxiosParamCreator: (configuration?: Config
2204
2382
  * @throws {RequiredError}
2205
2383
  */
2206
2384
  getPrincipalRoles: (orgId: string, getPrincipalRolesRequestBody?: GetPrincipalRolesRequestBody, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
2385
+ /**
2386
+ * Grant teammate app access and underlying permissions for a user being assigned within a brand for the first time. Email and name are persisted on first assignment only and must be supplied here.
2387
+ * @summary Grant teammate access to a new user
2388
+ * @param {string} orgId
2389
+ * @param {string} userId Target Flipdish user id (numeric string)
2390
+ * @param {GrantTeammateAccessRequestBody} [grantTeammateAccessRequestBody]
2391
+ * @param {*} [options] Override http request option.
2392
+ * @throws {RequiredError}
2393
+ */
2394
+ grantTeammateAccess: (orgId: string, userId: string, grantTeammateAccessRequestBody?: GrantTeammateAccessRequestBody, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
2207
2395
  /**
2208
2396
  * Revokes a forbidden role from a given principal (user, group, etc.)
2209
2397
  * @summary Revoke Forbidden Role from Principal
@@ -2222,6 +2410,16 @@ export declare const RoleAssignmentApiAxiosParamCreator: (configuration?: Config
2222
2410
  * @throws {RequiredError}
2223
2411
  */
2224
2412
  revokeRoleFromPrincipal: (orgId: string, revokeRoleRequestBody?: RevokeRoleRequestBody, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
2413
+ /**
2414
+ * Update teammate app access and underlying permissions for an existing teammate. The user must already have been granted access for this brand. Email and name are not accepted on update; existing values are reused. Returns 404 if no existing assignment is found.
2415
+ * @summary Update teammate access for an existing user
2416
+ * @param {string} orgId
2417
+ * @param {string} userId Target Flipdish user id (numeric string)
2418
+ * @param {UpdateTeammateAccessRequestBody} [updateTeammateAccessRequestBody]
2419
+ * @param {*} [options] Override http request option.
2420
+ * @throws {RequiredError}
2421
+ */
2422
+ updateTeammateAccess: (orgId: string, userId: string, updateTeammateAccessRequestBody?: UpdateTeammateAccessRequestBody, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
2225
2423
  };
2226
2424
  /**
2227
2425
  * RoleAssignmentApi - functional programming interface
@@ -2246,6 +2444,16 @@ export declare const RoleAssignmentApiFp: (configuration?: Configuration) => {
2246
2444
  * @throws {RequiredError}
2247
2445
  */
2248
2446
  getPrincipalRoles(orgId: string, getPrincipalRolesRequestBody?: GetPrincipalRolesRequestBody, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetPrincipalRolesSuccessResponse>>;
2447
+ /**
2448
+ * Grant teammate app access and underlying permissions for a user being assigned within a brand for the first time. Email and name are persisted on first assignment only and must be supplied here.
2449
+ * @summary Grant teammate access to a new user
2450
+ * @param {string} orgId
2451
+ * @param {string} userId Target Flipdish user id (numeric string)
2452
+ * @param {GrantTeammateAccessRequestBody} [grantTeammateAccessRequestBody]
2453
+ * @param {*} [options] Override http request option.
2454
+ * @throws {RequiredError}
2455
+ */
2456
+ grantTeammateAccess(orgId: string, userId: string, grantTeammateAccessRequestBody?: GrantTeammateAccessRequestBody, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<TeammateAccessSuccessResponse>>;
2249
2457
  /**
2250
2458
  * Revokes a forbidden role from a given principal (user, group, etc.)
2251
2459
  * @summary Revoke Forbidden Role from Principal
@@ -2264,6 +2472,16 @@ export declare const RoleAssignmentApiFp: (configuration?: Configuration) => {
2264
2472
  * @throws {RequiredError}
2265
2473
  */
2266
2474
  revokeRoleFromPrincipal(orgId: string, revokeRoleRequestBody?: RevokeRoleRequestBody, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<RevokeRoleSuccessResponse>>;
2475
+ /**
2476
+ * Update teammate app access and underlying permissions for an existing teammate. The user must already have been granted access for this brand. Email and name are not accepted on update; existing values are reused. Returns 404 if no existing assignment is found.
2477
+ * @summary Update teammate access for an existing user
2478
+ * @param {string} orgId
2479
+ * @param {string} userId Target Flipdish user id (numeric string)
2480
+ * @param {UpdateTeammateAccessRequestBody} [updateTeammateAccessRequestBody]
2481
+ * @param {*} [options] Override http request option.
2482
+ * @throws {RequiredError}
2483
+ */
2484
+ updateTeammateAccess(orgId: string, userId: string, updateTeammateAccessRequestBody?: UpdateTeammateAccessRequestBody, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<TeammateAccessSuccessResponse>>;
2267
2485
  };
2268
2486
  /**
2269
2487
  * RoleAssignmentApi - factory interface
@@ -2288,6 +2506,16 @@ export declare const RoleAssignmentApiFactory: (configuration?: Configuration, b
2288
2506
  * @throws {RequiredError}
2289
2507
  */
2290
2508
  getPrincipalRoles(orgId: string, getPrincipalRolesRequestBody?: GetPrincipalRolesRequestBody, options?: RawAxiosRequestConfig): AxiosPromise<GetPrincipalRolesSuccessResponse>;
2509
+ /**
2510
+ * Grant teammate app access and underlying permissions for a user being assigned within a brand for the first time. Email and name are persisted on first assignment only and must be supplied here.
2511
+ * @summary Grant teammate access to a new user
2512
+ * @param {string} orgId
2513
+ * @param {string} userId Target Flipdish user id (numeric string)
2514
+ * @param {GrantTeammateAccessRequestBody} [grantTeammateAccessRequestBody]
2515
+ * @param {*} [options] Override http request option.
2516
+ * @throws {RequiredError}
2517
+ */
2518
+ grantTeammateAccess(orgId: string, userId: string, grantTeammateAccessRequestBody?: GrantTeammateAccessRequestBody, options?: RawAxiosRequestConfig): AxiosPromise<TeammateAccessSuccessResponse>;
2291
2519
  /**
2292
2520
  * Revokes a forbidden role from a given principal (user, group, etc.)
2293
2521
  * @summary Revoke Forbidden Role from Principal
@@ -2306,6 +2534,16 @@ export declare const RoleAssignmentApiFactory: (configuration?: Configuration, b
2306
2534
  * @throws {RequiredError}
2307
2535
  */
2308
2536
  revokeRoleFromPrincipal(orgId: string, revokeRoleRequestBody?: RevokeRoleRequestBody, options?: RawAxiosRequestConfig): AxiosPromise<RevokeRoleSuccessResponse>;
2537
+ /**
2538
+ * Update teammate app access and underlying permissions for an existing teammate. The user must already have been granted access for this brand. Email and name are not accepted on update; existing values are reused. Returns 404 if no existing assignment is found.
2539
+ * @summary Update teammate access for an existing user
2540
+ * @param {string} orgId
2541
+ * @param {string} userId Target Flipdish user id (numeric string)
2542
+ * @param {UpdateTeammateAccessRequestBody} [updateTeammateAccessRequestBody]
2543
+ * @param {*} [options] Override http request option.
2544
+ * @throws {RequiredError}
2545
+ */
2546
+ updateTeammateAccess(orgId: string, userId: string, updateTeammateAccessRequestBody?: UpdateTeammateAccessRequestBody, options?: RawAxiosRequestConfig): AxiosPromise<TeammateAccessSuccessResponse>;
2309
2547
  };
2310
2548
  /**
2311
2549
  * RoleAssignmentApi - object-oriented interface
@@ -2334,6 +2572,17 @@ export declare class RoleAssignmentApi extends BaseAPI {
2334
2572
  * @memberof RoleAssignmentApi
2335
2573
  */
2336
2574
  getPrincipalRoles(orgId: string, getPrincipalRolesRequestBody?: GetPrincipalRolesRequestBody, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<GetPrincipalRolesSuccessResponse, any, {}>>;
2575
+ /**
2576
+ * Grant teammate app access and underlying permissions for a user being assigned within a brand for the first time. Email and name are persisted on first assignment only and must be supplied here.
2577
+ * @summary Grant teammate access to a new user
2578
+ * @param {string} orgId
2579
+ * @param {string} userId Target Flipdish user id (numeric string)
2580
+ * @param {GrantTeammateAccessRequestBody} [grantTeammateAccessRequestBody]
2581
+ * @param {*} [options] Override http request option.
2582
+ * @throws {RequiredError}
2583
+ * @memberof RoleAssignmentApi
2584
+ */
2585
+ grantTeammateAccess(orgId: string, userId: string, grantTeammateAccessRequestBody?: GrantTeammateAccessRequestBody, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<TeammateAccessSuccessResponse, any, {}>>;
2337
2586
  /**
2338
2587
  * Revokes a forbidden role from a given principal (user, group, etc.)
2339
2588
  * @summary Revoke Forbidden Role from Principal
@@ -2354,6 +2603,17 @@ export declare class RoleAssignmentApi extends BaseAPI {
2354
2603
  * @memberof RoleAssignmentApi
2355
2604
  */
2356
2605
  revokeRoleFromPrincipal(orgId: string, revokeRoleRequestBody?: RevokeRoleRequestBody, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<RevokeRoleSuccessResponse, any, {}>>;
2606
+ /**
2607
+ * Update teammate app access and underlying permissions for an existing teammate. The user must already have been granted access for this brand. Email and name are not accepted on update; existing values are reused. Returns 404 if no existing assignment is found.
2608
+ * @summary Update teammate access for an existing user
2609
+ * @param {string} orgId
2610
+ * @param {string} userId Target Flipdish user id (numeric string)
2611
+ * @param {UpdateTeammateAccessRequestBody} [updateTeammateAccessRequestBody]
2612
+ * @param {*} [options] Override http request option.
2613
+ * @throws {RequiredError}
2614
+ * @memberof RoleAssignmentApi
2615
+ */
2616
+ updateTeammateAccess(orgId: string, userId: string, updateTeammateAccessRequestBody?: UpdateTeammateAccessRequestBody, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<TeammateAccessSuccessResponse, any, {}>>;
2357
2617
  }
2358
2618
  /**
2359
2619
  * UserManagementApi - axios parameter creator
@@ -2368,6 +2628,14 @@ export declare const UserManagementApiAxiosParamCreator: (configuration?: Config
2368
2628
  * @throws {RequiredError}
2369
2629
  */
2370
2630
  listUsersInOrg: (orgId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
2631
+ /**
2632
+ * Same principals as list users, plus roleDisplay and isCustomised per principal (extra Dynamo reads for compensating roles and granular assignments).
2633
+ * @summary List Users in Org with teammate permission summary
2634
+ * @param {string} orgId
2635
+ * @param {*} [options] Override http request option.
2636
+ * @throws {RequiredError}
2637
+ */
2638
+ listUsersInOrgWithTeammatePermissionSummary: (orgId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
2371
2639
  };
2372
2640
  /**
2373
2641
  * UserManagementApi - functional programming interface
@@ -2382,6 +2650,14 @@ export declare const UserManagementApiFp: (configuration?: Configuration) => {
2382
2650
  * @throws {RequiredError}
2383
2651
  */
2384
2652
  listUsersInOrg(orgId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PrincipalsInOrgResponse>>;
2653
+ /**
2654
+ * Same principals as list users, plus roleDisplay and isCustomised per principal (extra Dynamo reads for compensating roles and granular assignments).
2655
+ * @summary List Users in Org with teammate permission summary
2656
+ * @param {string} orgId
2657
+ * @param {*} [options] Override http request option.
2658
+ * @throws {RequiredError}
2659
+ */
2660
+ listUsersInOrgWithTeammatePermissionSummary(orgId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PrincipalsInOrgWithTeammatePermissionSummaryResponse>>;
2385
2661
  };
2386
2662
  /**
2387
2663
  * UserManagementApi - factory interface
@@ -2396,6 +2672,14 @@ export declare const UserManagementApiFactory: (configuration?: Configuration, b
2396
2672
  * @throws {RequiredError}
2397
2673
  */
2398
2674
  listUsersInOrg(orgId: string, options?: RawAxiosRequestConfig): AxiosPromise<PrincipalsInOrgResponse>;
2675
+ /**
2676
+ * Same principals as list users, plus roleDisplay and isCustomised per principal (extra Dynamo reads for compensating roles and granular assignments).
2677
+ * @summary List Users in Org with teammate permission summary
2678
+ * @param {string} orgId
2679
+ * @param {*} [options] Override http request option.
2680
+ * @throws {RequiredError}
2681
+ */
2682
+ listUsersInOrgWithTeammatePermissionSummary(orgId: string, options?: RawAxiosRequestConfig): AxiosPromise<PrincipalsInOrgWithTeammatePermissionSummaryResponse>;
2399
2683
  };
2400
2684
  /**
2401
2685
  * UserManagementApi - object-oriented interface
@@ -2413,6 +2697,15 @@ export declare class UserManagementApi extends BaseAPI {
2413
2697
  * @memberof UserManagementApi
2414
2698
  */
2415
2699
  listUsersInOrg(orgId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PrincipalsInOrgResponse, any, {}>>;
2700
+ /**
2701
+ * Same principals as list users, plus roleDisplay and isCustomised per principal (extra Dynamo reads for compensating roles and granular assignments).
2702
+ * @summary List Users in Org with teammate permission summary
2703
+ * @param {string} orgId
2704
+ * @param {*} [options] Override http request option.
2705
+ * @throws {RequiredError}
2706
+ * @memberof UserManagementApi
2707
+ */
2708
+ listUsersInOrgWithTeammatePermissionSummary(orgId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PrincipalsInOrgWithTeammatePermissionSummaryResponse, any, {}>>;
2416
2709
  }
2417
2710
  /**
2418
2711
  * UserPermissionsApi - axios parameter creator