@flipdish/authorization 0.2.32 → 0.2.33
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/api.ts +431 -0
- package/configuration.ts +1 -1
- package/dist/api.d.ts +293 -0
- package/dist/api.js +318 -1
- package/dist/configuration.js +1 -1
- package/package.json +1 -1
package/dist/api.d.ts
CHANGED
|
@@ -963,6 +963,58 @@ export type GetUserPermissionsSuccessResponseResourcesValueResourceTypeEnum = ty
|
|
|
963
963
|
*/
|
|
964
964
|
export interface GetUserPermissionsSuccessResponseResourcesValueResourceId {
|
|
965
965
|
}
|
|
966
|
+
/**
|
|
967
|
+
* Grant teammate app access to a user being assigned within a brand for the first time.
|
|
968
|
+
* @export
|
|
969
|
+
* @interface GrantTeammateAccessRequestBody
|
|
970
|
+
*/
|
|
971
|
+
export interface GrantTeammateAccessRequestBody {
|
|
972
|
+
/**
|
|
973
|
+
* Teammate app access level (role)
|
|
974
|
+
* @type {string}
|
|
975
|
+
* @memberof GrantTeammateAccessRequestBody
|
|
976
|
+
*/
|
|
977
|
+
'appAccessLevel': GrantTeammateAccessRequestBodyAppAccessLevelEnum;
|
|
978
|
+
/**
|
|
979
|
+
* Brand identifier (AppId); normalized to lowercase when stored
|
|
980
|
+
* @type {string}
|
|
981
|
+
* @memberof GrantTeammateAccessRequestBody
|
|
982
|
+
*/
|
|
983
|
+
'brandId': string;
|
|
984
|
+
/**
|
|
985
|
+
* Org-wide store access; when false, propertyIds are required for property-scoped roles
|
|
986
|
+
* @type {boolean}
|
|
987
|
+
* @memberof GrantTeammateAccessRequestBody
|
|
988
|
+
*/
|
|
989
|
+
'hasAccessToAllStores': boolean;
|
|
990
|
+
/**
|
|
991
|
+
* Property resource ids (e.g. p123) when scoped to properties
|
|
992
|
+
* @type {Array<string>}
|
|
993
|
+
* @memberof GrantTeammateAccessRequestBody
|
|
994
|
+
*/
|
|
995
|
+
'propertyIds'?: Array<string>;
|
|
996
|
+
/**
|
|
997
|
+
* Target user email; persisted on first assignment only
|
|
998
|
+
* @type {string}
|
|
999
|
+
* @memberof GrantTeammateAccessRequestBody
|
|
1000
|
+
*/
|
|
1001
|
+
'userEmail': string;
|
|
1002
|
+
/**
|
|
1003
|
+
* Target user display name; persisted on first assignment only
|
|
1004
|
+
* @type {string}
|
|
1005
|
+
* @memberof GrantTeammateAccessRequestBody
|
|
1006
|
+
*/
|
|
1007
|
+
'userName'?: string;
|
|
1008
|
+
}
|
|
1009
|
+
export declare const GrantTeammateAccessRequestBodyAppAccessLevelEnum: {
|
|
1010
|
+
readonly Owner: "Owner";
|
|
1011
|
+
readonly ManagedOwner: "ManagedOwner";
|
|
1012
|
+
readonly PropertyOwner: "PropertyOwner";
|
|
1013
|
+
readonly PropertyManager: "PropertyManager";
|
|
1014
|
+
readonly FinanceManager: "FinanceManager";
|
|
1015
|
+
readonly Integrator: "Integrator";
|
|
1016
|
+
};
|
|
1017
|
+
export type GrantTeammateAccessRequestBodyAppAccessLevelEnum = typeof GrantTeammateAccessRequestBodyAppAccessLevelEnum[keyof typeof GrantTeammateAccessRequestBodyAppAccessLevelEnum];
|
|
966
1018
|
/**
|
|
967
1019
|
*
|
|
968
1020
|
* @export
|
|
@@ -1389,6 +1441,60 @@ export declare const Permissions: {
|
|
|
1389
1441
|
readonly RoleAuthDeveloper: "RoleAuthDeveloper";
|
|
1390
1442
|
};
|
|
1391
1443
|
export type Permissions = typeof Permissions[keyof typeof Permissions];
|
|
1444
|
+
/**
|
|
1445
|
+
* Principal with teammate permission summary
|
|
1446
|
+
* @export
|
|
1447
|
+
* @interface PrincipalInOrgWithTeammatePermissionSummary
|
|
1448
|
+
*/
|
|
1449
|
+
export interface PrincipalInOrgWithTeammatePermissionSummary {
|
|
1450
|
+
/**
|
|
1451
|
+
*
|
|
1452
|
+
* @type {string}
|
|
1453
|
+
* @memberof PrincipalInOrgWithTeammatePermissionSummary
|
|
1454
|
+
*/
|
|
1455
|
+
'type': PrincipalInOrgWithTeammatePermissionSummaryTypeEnum;
|
|
1456
|
+
/**
|
|
1457
|
+
*
|
|
1458
|
+
* @type {string}
|
|
1459
|
+
* @memberof PrincipalInOrgWithTeammatePermissionSummary
|
|
1460
|
+
*/
|
|
1461
|
+
'id': string;
|
|
1462
|
+
/**
|
|
1463
|
+
*
|
|
1464
|
+
* @type {string}
|
|
1465
|
+
* @memberof PrincipalInOrgWithTeammatePermissionSummary
|
|
1466
|
+
*/
|
|
1467
|
+
'name'?: string;
|
|
1468
|
+
/**
|
|
1469
|
+
*
|
|
1470
|
+
* @type {string}
|
|
1471
|
+
* @memberof PrincipalInOrgWithTeammatePermissionSummary
|
|
1472
|
+
*/
|
|
1473
|
+
'email'?: string;
|
|
1474
|
+
/**
|
|
1475
|
+
*
|
|
1476
|
+
* @type {string}
|
|
1477
|
+
* @memberof PrincipalInOrgWithTeammatePermissionSummary
|
|
1478
|
+
*/
|
|
1479
|
+
'phone'?: string;
|
|
1480
|
+
/**
|
|
1481
|
+
* Teammate role label; null when no compensating role or unknown
|
|
1482
|
+
* @type {string}
|
|
1483
|
+
* @memberof PrincipalInOrgWithTeammatePermissionSummary
|
|
1484
|
+
*/
|
|
1485
|
+
'roleDisplay': string;
|
|
1486
|
+
/**
|
|
1487
|
+
* True when granular roles differ from default for the compensating role
|
|
1488
|
+
* @type {boolean}
|
|
1489
|
+
* @memberof PrincipalInOrgWithTeammatePermissionSummary
|
|
1490
|
+
*/
|
|
1491
|
+
'isCustomised': boolean;
|
|
1492
|
+
}
|
|
1493
|
+
export declare const PrincipalInOrgWithTeammatePermissionSummaryTypeEnum: {
|
|
1494
|
+
readonly User: "User";
|
|
1495
|
+
readonly Automation: "Automation";
|
|
1496
|
+
};
|
|
1497
|
+
export type PrincipalInOrgWithTeammatePermissionSummaryTypeEnum = typeof PrincipalInOrgWithTeammatePermissionSummaryTypeEnum[keyof typeof PrincipalInOrgWithTeammatePermissionSummaryTypeEnum];
|
|
1392
1498
|
/**
|
|
1393
1499
|
* Principals in org
|
|
1394
1500
|
* @export
|
|
@@ -1408,6 +1514,25 @@ export interface PrincipalsInOrgResponse {
|
|
|
1408
1514
|
*/
|
|
1409
1515
|
'principals': Array<AuthorizationRequestPrincipal>;
|
|
1410
1516
|
}
|
|
1517
|
+
/**
|
|
1518
|
+
* Principals in org including teammate permission summary per principal
|
|
1519
|
+
* @export
|
|
1520
|
+
* @interface PrincipalsInOrgWithTeammatePermissionSummaryResponse
|
|
1521
|
+
*/
|
|
1522
|
+
export interface PrincipalsInOrgWithTeammatePermissionSummaryResponse {
|
|
1523
|
+
/**
|
|
1524
|
+
*
|
|
1525
|
+
* @type {string}
|
|
1526
|
+
* @memberof PrincipalsInOrgWithTeammatePermissionSummaryResponse
|
|
1527
|
+
*/
|
|
1528
|
+
'orgId': string;
|
|
1529
|
+
/**
|
|
1530
|
+
* List of principals with roleDisplay and isCustomised
|
|
1531
|
+
* @type {Array<PrincipalInOrgWithTeammatePermissionSummary>}
|
|
1532
|
+
* @memberof PrincipalsInOrgWithTeammatePermissionSummaryResponse
|
|
1533
|
+
*/
|
|
1534
|
+
'principals': Array<PrincipalInOrgWithTeammatePermissionSummary>;
|
|
1535
|
+
}
|
|
1411
1536
|
/**
|
|
1412
1537
|
* Details for revoking a forbidden role from a principal
|
|
1413
1538
|
* @export
|
|
@@ -1572,6 +1697,59 @@ export declare const RoleNames: {
|
|
|
1572
1697
|
readonly AuthDeveloper: "AuthDeveloper";
|
|
1573
1698
|
};
|
|
1574
1699
|
export type RoleNames = typeof RoleNames[keyof typeof RoleNames];
|
|
1700
|
+
/**
|
|
1701
|
+
* Teammate access applied
|
|
1702
|
+
* @export
|
|
1703
|
+
* @interface TeammateAccessSuccessResponse
|
|
1704
|
+
*/
|
|
1705
|
+
export interface TeammateAccessSuccessResponse {
|
|
1706
|
+
/**
|
|
1707
|
+
*
|
|
1708
|
+
* @type {string}
|
|
1709
|
+
* @memberof TeammateAccessSuccessResponse
|
|
1710
|
+
*/
|
|
1711
|
+
'message': string;
|
|
1712
|
+
}
|
|
1713
|
+
/**
|
|
1714
|
+
* Update teammate app access for an existing teammate. Email and name are not accepted on update; the existing values stored against the user id are reused.
|
|
1715
|
+
* @export
|
|
1716
|
+
* @interface UpdateTeammateAccessRequestBody
|
|
1717
|
+
*/
|
|
1718
|
+
export interface UpdateTeammateAccessRequestBody {
|
|
1719
|
+
/**
|
|
1720
|
+
* Teammate app access level (role)
|
|
1721
|
+
* @type {string}
|
|
1722
|
+
* @memberof UpdateTeammateAccessRequestBody
|
|
1723
|
+
*/
|
|
1724
|
+
'appAccessLevel': UpdateTeammateAccessRequestBodyAppAccessLevelEnum;
|
|
1725
|
+
/**
|
|
1726
|
+
* Brand identifier (AppId); normalized to lowercase when stored
|
|
1727
|
+
* @type {string}
|
|
1728
|
+
* @memberof UpdateTeammateAccessRequestBody
|
|
1729
|
+
*/
|
|
1730
|
+
'brandId': string;
|
|
1731
|
+
/**
|
|
1732
|
+
* Org-wide store access; when false, propertyIds are required for property-scoped roles
|
|
1733
|
+
* @type {boolean}
|
|
1734
|
+
* @memberof UpdateTeammateAccessRequestBody
|
|
1735
|
+
*/
|
|
1736
|
+
'hasAccessToAllStores': boolean;
|
|
1737
|
+
/**
|
|
1738
|
+
* Property resource ids (e.g. p123) when scoped to properties
|
|
1739
|
+
* @type {Array<string>}
|
|
1740
|
+
* @memberof UpdateTeammateAccessRequestBody
|
|
1741
|
+
*/
|
|
1742
|
+
'propertyIds'?: Array<string>;
|
|
1743
|
+
}
|
|
1744
|
+
export declare const UpdateTeammateAccessRequestBodyAppAccessLevelEnum: {
|
|
1745
|
+
readonly Owner: "Owner";
|
|
1746
|
+
readonly ManagedOwner: "ManagedOwner";
|
|
1747
|
+
readonly PropertyOwner: "PropertyOwner";
|
|
1748
|
+
readonly PropertyManager: "PropertyManager";
|
|
1749
|
+
readonly FinanceManager: "FinanceManager";
|
|
1750
|
+
readonly Integrator: "Integrator";
|
|
1751
|
+
};
|
|
1752
|
+
export type UpdateTeammateAccessRequestBodyAppAccessLevelEnum = typeof UpdateTeammateAccessRequestBodyAppAccessLevelEnum[keyof typeof UpdateTeammateAccessRequestBodyAppAccessLevelEnum];
|
|
1575
1753
|
/**
|
|
1576
1754
|
*
|
|
1577
1755
|
* @export
|
|
@@ -2204,6 +2382,16 @@ export declare const RoleAssignmentApiAxiosParamCreator: (configuration?: Config
|
|
|
2204
2382
|
* @throws {RequiredError}
|
|
2205
2383
|
*/
|
|
2206
2384
|
getPrincipalRoles: (orgId: string, getPrincipalRolesRequestBody?: GetPrincipalRolesRequestBody, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
2385
|
+
/**
|
|
2386
|
+
* Grant teammate app access and underlying permissions for a user being assigned within a brand for the first time. Email and name are persisted on first assignment only and must be supplied here.
|
|
2387
|
+
* @summary Grant teammate access to a new user
|
|
2388
|
+
* @param {string} orgId
|
|
2389
|
+
* @param {string} userId Target Flipdish user id (numeric string)
|
|
2390
|
+
* @param {GrantTeammateAccessRequestBody} [grantTeammateAccessRequestBody]
|
|
2391
|
+
* @param {*} [options] Override http request option.
|
|
2392
|
+
* @throws {RequiredError}
|
|
2393
|
+
*/
|
|
2394
|
+
grantTeammateAccess: (orgId: string, userId: string, grantTeammateAccessRequestBody?: GrantTeammateAccessRequestBody, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
2207
2395
|
/**
|
|
2208
2396
|
* Revokes a forbidden role from a given principal (user, group, etc.)
|
|
2209
2397
|
* @summary Revoke Forbidden Role from Principal
|
|
@@ -2222,6 +2410,16 @@ export declare const RoleAssignmentApiAxiosParamCreator: (configuration?: Config
|
|
|
2222
2410
|
* @throws {RequiredError}
|
|
2223
2411
|
*/
|
|
2224
2412
|
revokeRoleFromPrincipal: (orgId: string, revokeRoleRequestBody?: RevokeRoleRequestBody, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
2413
|
+
/**
|
|
2414
|
+
* Update teammate app access and underlying permissions for an existing teammate. The user must already have been granted access for this brand. Email and name are not accepted on update; existing values are reused. Returns 404 if no existing assignment is found.
|
|
2415
|
+
* @summary Update teammate access for an existing user
|
|
2416
|
+
* @param {string} orgId
|
|
2417
|
+
* @param {string} userId Target Flipdish user id (numeric string)
|
|
2418
|
+
* @param {UpdateTeammateAccessRequestBody} [updateTeammateAccessRequestBody]
|
|
2419
|
+
* @param {*} [options] Override http request option.
|
|
2420
|
+
* @throws {RequiredError}
|
|
2421
|
+
*/
|
|
2422
|
+
updateTeammateAccess: (orgId: string, userId: string, updateTeammateAccessRequestBody?: UpdateTeammateAccessRequestBody, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
2225
2423
|
};
|
|
2226
2424
|
/**
|
|
2227
2425
|
* RoleAssignmentApi - functional programming interface
|
|
@@ -2246,6 +2444,16 @@ export declare const RoleAssignmentApiFp: (configuration?: Configuration) => {
|
|
|
2246
2444
|
* @throws {RequiredError}
|
|
2247
2445
|
*/
|
|
2248
2446
|
getPrincipalRoles(orgId: string, getPrincipalRolesRequestBody?: GetPrincipalRolesRequestBody, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetPrincipalRolesSuccessResponse>>;
|
|
2447
|
+
/**
|
|
2448
|
+
* Grant teammate app access and underlying permissions for a user being assigned within a brand for the first time. Email and name are persisted on first assignment only and must be supplied here.
|
|
2449
|
+
* @summary Grant teammate access to a new user
|
|
2450
|
+
* @param {string} orgId
|
|
2451
|
+
* @param {string} userId Target Flipdish user id (numeric string)
|
|
2452
|
+
* @param {GrantTeammateAccessRequestBody} [grantTeammateAccessRequestBody]
|
|
2453
|
+
* @param {*} [options] Override http request option.
|
|
2454
|
+
* @throws {RequiredError}
|
|
2455
|
+
*/
|
|
2456
|
+
grantTeammateAccess(orgId: string, userId: string, grantTeammateAccessRequestBody?: GrantTeammateAccessRequestBody, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<TeammateAccessSuccessResponse>>;
|
|
2249
2457
|
/**
|
|
2250
2458
|
* Revokes a forbidden role from a given principal (user, group, etc.)
|
|
2251
2459
|
* @summary Revoke Forbidden Role from Principal
|
|
@@ -2264,6 +2472,16 @@ export declare const RoleAssignmentApiFp: (configuration?: Configuration) => {
|
|
|
2264
2472
|
* @throws {RequiredError}
|
|
2265
2473
|
*/
|
|
2266
2474
|
revokeRoleFromPrincipal(orgId: string, revokeRoleRequestBody?: RevokeRoleRequestBody, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<RevokeRoleSuccessResponse>>;
|
|
2475
|
+
/**
|
|
2476
|
+
* Update teammate app access and underlying permissions for an existing teammate. The user must already have been granted access for this brand. Email and name are not accepted on update; existing values are reused. Returns 404 if no existing assignment is found.
|
|
2477
|
+
* @summary Update teammate access for an existing user
|
|
2478
|
+
* @param {string} orgId
|
|
2479
|
+
* @param {string} userId Target Flipdish user id (numeric string)
|
|
2480
|
+
* @param {UpdateTeammateAccessRequestBody} [updateTeammateAccessRequestBody]
|
|
2481
|
+
* @param {*} [options] Override http request option.
|
|
2482
|
+
* @throws {RequiredError}
|
|
2483
|
+
*/
|
|
2484
|
+
updateTeammateAccess(orgId: string, userId: string, updateTeammateAccessRequestBody?: UpdateTeammateAccessRequestBody, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<TeammateAccessSuccessResponse>>;
|
|
2267
2485
|
};
|
|
2268
2486
|
/**
|
|
2269
2487
|
* RoleAssignmentApi - factory interface
|
|
@@ -2288,6 +2506,16 @@ export declare const RoleAssignmentApiFactory: (configuration?: Configuration, b
|
|
|
2288
2506
|
* @throws {RequiredError}
|
|
2289
2507
|
*/
|
|
2290
2508
|
getPrincipalRoles(orgId: string, getPrincipalRolesRequestBody?: GetPrincipalRolesRequestBody, options?: RawAxiosRequestConfig): AxiosPromise<GetPrincipalRolesSuccessResponse>;
|
|
2509
|
+
/**
|
|
2510
|
+
* Grant teammate app access and underlying permissions for a user being assigned within a brand for the first time. Email and name are persisted on first assignment only and must be supplied here.
|
|
2511
|
+
* @summary Grant teammate access to a new user
|
|
2512
|
+
* @param {string} orgId
|
|
2513
|
+
* @param {string} userId Target Flipdish user id (numeric string)
|
|
2514
|
+
* @param {GrantTeammateAccessRequestBody} [grantTeammateAccessRequestBody]
|
|
2515
|
+
* @param {*} [options] Override http request option.
|
|
2516
|
+
* @throws {RequiredError}
|
|
2517
|
+
*/
|
|
2518
|
+
grantTeammateAccess(orgId: string, userId: string, grantTeammateAccessRequestBody?: GrantTeammateAccessRequestBody, options?: RawAxiosRequestConfig): AxiosPromise<TeammateAccessSuccessResponse>;
|
|
2291
2519
|
/**
|
|
2292
2520
|
* Revokes a forbidden role from a given principal (user, group, etc.)
|
|
2293
2521
|
* @summary Revoke Forbidden Role from Principal
|
|
@@ -2306,6 +2534,16 @@ export declare const RoleAssignmentApiFactory: (configuration?: Configuration, b
|
|
|
2306
2534
|
* @throws {RequiredError}
|
|
2307
2535
|
*/
|
|
2308
2536
|
revokeRoleFromPrincipal(orgId: string, revokeRoleRequestBody?: RevokeRoleRequestBody, options?: RawAxiosRequestConfig): AxiosPromise<RevokeRoleSuccessResponse>;
|
|
2537
|
+
/**
|
|
2538
|
+
* Update teammate app access and underlying permissions for an existing teammate. The user must already have been granted access for this brand. Email and name are not accepted on update; existing values are reused. Returns 404 if no existing assignment is found.
|
|
2539
|
+
* @summary Update teammate access for an existing user
|
|
2540
|
+
* @param {string} orgId
|
|
2541
|
+
* @param {string} userId Target Flipdish user id (numeric string)
|
|
2542
|
+
* @param {UpdateTeammateAccessRequestBody} [updateTeammateAccessRequestBody]
|
|
2543
|
+
* @param {*} [options] Override http request option.
|
|
2544
|
+
* @throws {RequiredError}
|
|
2545
|
+
*/
|
|
2546
|
+
updateTeammateAccess(orgId: string, userId: string, updateTeammateAccessRequestBody?: UpdateTeammateAccessRequestBody, options?: RawAxiosRequestConfig): AxiosPromise<TeammateAccessSuccessResponse>;
|
|
2309
2547
|
};
|
|
2310
2548
|
/**
|
|
2311
2549
|
* RoleAssignmentApi - object-oriented interface
|
|
@@ -2334,6 +2572,17 @@ export declare class RoleAssignmentApi extends BaseAPI {
|
|
|
2334
2572
|
* @memberof RoleAssignmentApi
|
|
2335
2573
|
*/
|
|
2336
2574
|
getPrincipalRoles(orgId: string, getPrincipalRolesRequestBody?: GetPrincipalRolesRequestBody, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<GetPrincipalRolesSuccessResponse, any, {}>>;
|
|
2575
|
+
/**
|
|
2576
|
+
* Grant teammate app access and underlying permissions for a user being assigned within a brand for the first time. Email and name are persisted on first assignment only and must be supplied here.
|
|
2577
|
+
* @summary Grant teammate access to a new user
|
|
2578
|
+
* @param {string} orgId
|
|
2579
|
+
* @param {string} userId Target Flipdish user id (numeric string)
|
|
2580
|
+
* @param {GrantTeammateAccessRequestBody} [grantTeammateAccessRequestBody]
|
|
2581
|
+
* @param {*} [options] Override http request option.
|
|
2582
|
+
* @throws {RequiredError}
|
|
2583
|
+
* @memberof RoleAssignmentApi
|
|
2584
|
+
*/
|
|
2585
|
+
grantTeammateAccess(orgId: string, userId: string, grantTeammateAccessRequestBody?: GrantTeammateAccessRequestBody, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<TeammateAccessSuccessResponse, any, {}>>;
|
|
2337
2586
|
/**
|
|
2338
2587
|
* Revokes a forbidden role from a given principal (user, group, etc.)
|
|
2339
2588
|
* @summary Revoke Forbidden Role from Principal
|
|
@@ -2354,6 +2603,17 @@ export declare class RoleAssignmentApi extends BaseAPI {
|
|
|
2354
2603
|
* @memberof RoleAssignmentApi
|
|
2355
2604
|
*/
|
|
2356
2605
|
revokeRoleFromPrincipal(orgId: string, revokeRoleRequestBody?: RevokeRoleRequestBody, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<RevokeRoleSuccessResponse, any, {}>>;
|
|
2606
|
+
/**
|
|
2607
|
+
* Update teammate app access and underlying permissions for an existing teammate. The user must already have been granted access for this brand. Email and name are not accepted on update; existing values are reused. Returns 404 if no existing assignment is found.
|
|
2608
|
+
* @summary Update teammate access for an existing user
|
|
2609
|
+
* @param {string} orgId
|
|
2610
|
+
* @param {string} userId Target Flipdish user id (numeric string)
|
|
2611
|
+
* @param {UpdateTeammateAccessRequestBody} [updateTeammateAccessRequestBody]
|
|
2612
|
+
* @param {*} [options] Override http request option.
|
|
2613
|
+
* @throws {RequiredError}
|
|
2614
|
+
* @memberof RoleAssignmentApi
|
|
2615
|
+
*/
|
|
2616
|
+
updateTeammateAccess(orgId: string, userId: string, updateTeammateAccessRequestBody?: UpdateTeammateAccessRequestBody, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<TeammateAccessSuccessResponse, any, {}>>;
|
|
2357
2617
|
}
|
|
2358
2618
|
/**
|
|
2359
2619
|
* UserManagementApi - axios parameter creator
|
|
@@ -2368,6 +2628,14 @@ export declare const UserManagementApiAxiosParamCreator: (configuration?: Config
|
|
|
2368
2628
|
* @throws {RequiredError}
|
|
2369
2629
|
*/
|
|
2370
2630
|
listUsersInOrg: (orgId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
2631
|
+
/**
|
|
2632
|
+
* Same principals as list users, plus roleDisplay and isCustomised per principal (extra Dynamo reads for compensating roles and granular assignments).
|
|
2633
|
+
* @summary List Users in Org with teammate permission summary
|
|
2634
|
+
* @param {string} orgId
|
|
2635
|
+
* @param {*} [options] Override http request option.
|
|
2636
|
+
* @throws {RequiredError}
|
|
2637
|
+
*/
|
|
2638
|
+
listUsersInOrgWithTeammatePermissionSummary: (orgId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
2371
2639
|
};
|
|
2372
2640
|
/**
|
|
2373
2641
|
* UserManagementApi - functional programming interface
|
|
@@ -2382,6 +2650,14 @@ export declare const UserManagementApiFp: (configuration?: Configuration) => {
|
|
|
2382
2650
|
* @throws {RequiredError}
|
|
2383
2651
|
*/
|
|
2384
2652
|
listUsersInOrg(orgId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PrincipalsInOrgResponse>>;
|
|
2653
|
+
/**
|
|
2654
|
+
* Same principals as list users, plus roleDisplay and isCustomised per principal (extra Dynamo reads for compensating roles and granular assignments).
|
|
2655
|
+
* @summary List Users in Org with teammate permission summary
|
|
2656
|
+
* @param {string} orgId
|
|
2657
|
+
* @param {*} [options] Override http request option.
|
|
2658
|
+
* @throws {RequiredError}
|
|
2659
|
+
*/
|
|
2660
|
+
listUsersInOrgWithTeammatePermissionSummary(orgId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PrincipalsInOrgWithTeammatePermissionSummaryResponse>>;
|
|
2385
2661
|
};
|
|
2386
2662
|
/**
|
|
2387
2663
|
* UserManagementApi - factory interface
|
|
@@ -2396,6 +2672,14 @@ export declare const UserManagementApiFactory: (configuration?: Configuration, b
|
|
|
2396
2672
|
* @throws {RequiredError}
|
|
2397
2673
|
*/
|
|
2398
2674
|
listUsersInOrg(orgId: string, options?: RawAxiosRequestConfig): AxiosPromise<PrincipalsInOrgResponse>;
|
|
2675
|
+
/**
|
|
2676
|
+
* Same principals as list users, plus roleDisplay and isCustomised per principal (extra Dynamo reads for compensating roles and granular assignments).
|
|
2677
|
+
* @summary List Users in Org with teammate permission summary
|
|
2678
|
+
* @param {string} orgId
|
|
2679
|
+
* @param {*} [options] Override http request option.
|
|
2680
|
+
* @throws {RequiredError}
|
|
2681
|
+
*/
|
|
2682
|
+
listUsersInOrgWithTeammatePermissionSummary(orgId: string, options?: RawAxiosRequestConfig): AxiosPromise<PrincipalsInOrgWithTeammatePermissionSummaryResponse>;
|
|
2399
2683
|
};
|
|
2400
2684
|
/**
|
|
2401
2685
|
* UserManagementApi - object-oriented interface
|
|
@@ -2413,6 +2697,15 @@ export declare class UserManagementApi extends BaseAPI {
|
|
|
2413
2697
|
* @memberof UserManagementApi
|
|
2414
2698
|
*/
|
|
2415
2699
|
listUsersInOrg(orgId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PrincipalsInOrgResponse, any, {}>>;
|
|
2700
|
+
/**
|
|
2701
|
+
* Same principals as list users, plus roleDisplay and isCustomised per principal (extra Dynamo reads for compensating roles and granular assignments).
|
|
2702
|
+
* @summary List Users in Org with teammate permission summary
|
|
2703
|
+
* @param {string} orgId
|
|
2704
|
+
* @param {*} [options] Override http request option.
|
|
2705
|
+
* @throws {RequiredError}
|
|
2706
|
+
* @memberof UserManagementApi
|
|
2707
|
+
*/
|
|
2708
|
+
listUsersInOrgWithTeammatePermissionSummary(orgId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PrincipalsInOrgWithTeammatePermissionSummaryResponse, any, {}>>;
|
|
2416
2709
|
}
|
|
2417
2710
|
/**
|
|
2418
2711
|
* UserPermissionsApi - axios parameter creator
|