@meeco/svx-api-sdk 1.0.0-develop.20251009115620.9b58090 → 1.0.0-develop.20251014160718.b02efb1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. package/.openapi-generator/FILES +1 -1
  2. package/lib/esm/apis/ConnectionsApi.js +2 -2
  3. package/lib/esm/apis/SharesApi.js +2 -2
  4. package/lib/esm/models/{ShreIntentListResponse.js → ShareIntentListResponse.js} +6 -6
  5. package/lib/esm/models/UtilitiesOwDeploymentRequestOw.js +3 -0
  6. package/lib/esm/models/VaultInvitation.js +0 -11
  7. package/lib/esm/models/VaultOwnConnectionData.js +1 -7
  8. package/lib/esm/models/VaultTheOtherConnectedUserData.js +1 -7
  9. package/lib/esm/models/VaultUser.js +1 -2
  10. package/lib/esm/models/VaultUserConnectionsReport.js +0 -6
  11. package/lib/esm/models/index.js +1 -1
  12. package/lib/types/apis/ConnectionsApi.d.ts +2 -2
  13. package/lib/types/apis/SharesApi.d.ts +3 -3
  14. package/lib/types/models/{ShreIntentListResponse.d.ts → ShareIntentListResponse.d.ts} +10 -10
  15. package/lib/types/models/UtilitiesOwDeploymentRequestOw.d.ts +6 -0
  16. package/lib/types/models/VaultInvitation.d.ts +0 -22
  17. package/lib/types/models/VaultOwnConnectionData.d.ts +2 -13
  18. package/lib/types/models/VaultTheOtherConnectedUserData.d.ts +2 -13
  19. package/lib/types/models/VaultUser.d.ts +2 -3
  20. package/lib/types/models/VaultUserConnectionsReport.d.ts +0 -12
  21. package/lib/types/models/index.d.ts +1 -1
  22. package/lib/umd/apis/ConnectionsApi.js +2 -2
  23. package/lib/umd/apis/SharesApi.js +1 -1
  24. package/lib/umd/models/{ShreIntentListResponse.js → ShareIntentListResponse.js} +11 -11
  25. package/lib/umd/models/UtilitiesOwDeploymentRequestOw.js +3 -0
  26. package/lib/umd/models/VaultInvitation.js +0 -11
  27. package/lib/umd/models/VaultOwnConnectionData.js +1 -7
  28. package/lib/umd/models/VaultTheOtherConnectedUserData.js +1 -7
  29. package/lib/umd/models/VaultUser.js +1 -2
  30. package/lib/umd/models/VaultUserConnectionsReport.js +0 -6
  31. package/lib/umd/models/index.js +1 -1
  32. package/package.json +1 -1
@@ -214,13 +214,13 @@ models/PutTasksRequest.ts
214
214
  models/ReconfigureShareParamsInner.ts
215
215
  models/ReconfigureSharesResponse.ts
216
216
  models/SchemasIdVersionSchemaJsonGet200Response.ts
217
+ models/ShareIntentListResponse.ts
217
218
  models/ShareIntentParam.ts
218
219
  models/ShareIntentRequest.ts
219
220
  models/ShareIntentResponse.ts
220
221
  models/ShareIntentsResponse.ts
221
222
  models/SharesIncomingResponse.ts
222
223
  models/SharesOutgoingResponse.ts
223
- models/ShreIntentListResponse.ts
224
224
  models/UpdateDelegationsRequest.ts
225
225
  models/UtilitiesApplicationVersion.ts
226
226
  models/UtilitiesBlobInfo.ts
@@ -515,7 +515,7 @@ export class ConnectionsApi extends runtime.BaseAPI {
515
515
  });
516
516
  }
517
517
  /**
518
- * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the membership invitation parameter `organization_member_role` is used to specify the role we are inviting the user with. There are currently 2 organization member roles: * `owner` - can do everything * `admin` (default) - can only manage organization services If param `organization_member_role` is not provided then role `admin` will be assigned to the invited member. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
518
+ * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
519
519
  * Create an invitation
520
520
  */
521
521
  invitationsPostRaw(requestParameters, initOverrides) {
@@ -547,7 +547,7 @@ export class ConnectionsApi extends runtime.BaseAPI {
547
547
  });
548
548
  }
549
549
  /**
550
- * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the membership invitation parameter `organization_member_role` is used to specify the role we are inviting the user with. There are currently 2 organization member roles: * `owner` - can do everything * `admin` (default) - can only manage organization services If param `organization_member_role` is not provided then role `admin` will be assigned to the invited member. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
550
+ * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
551
551
  * Create an invitation
552
552
  */
553
553
  invitationsPost(meecoDelegationId, meecoOrganisationId, postInvitationsRequest, initOverrides) {
@@ -21,7 +21,7 @@ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, ge
21
21
  });
22
22
  };
23
23
  import * as runtime from '../runtime';
24
- import { CreateDeleteReconfigureSharesRequestToJSON, CreateDeleteReconfigureSharesServiceResponseFromJSON, GetItemSharesResponseFromJSON, ItemSharesUpdateResponseFromJSON, ListOfReconfigureShareParamsToJSON, PostItemEncryptRequestToJSON, PostItemSharesRequestToJSON, PutItemSharesRequestToJSON, ReconfigureSharesResponseFromJSON, ShareIntentRequestToJSON, ShareIntentResponseFromJSON, ShareIntentsResponseFromJSON, SharesIncomingResponseFromJSON, SharesOutgoingResponseFromJSON, ShreIntentListResponseFromJSON, VaultGetShareResponseFromJSON, VaultItemResponseFromJSON, VaultShareWithItemDataFromJSON, VaultSharesCreateResponseFromJSON, } from '../models';
24
+ import { CreateDeleteReconfigureSharesRequestToJSON, CreateDeleteReconfigureSharesServiceResponseFromJSON, GetItemSharesResponseFromJSON, ItemSharesUpdateResponseFromJSON, ListOfReconfigureShareParamsToJSON, PostItemEncryptRequestToJSON, PostItemSharesRequestToJSON, PutItemSharesRequestToJSON, ReconfigureSharesResponseFromJSON, ShareIntentListResponseFromJSON, ShareIntentRequestToJSON, ShareIntentResponseFromJSON, ShareIntentsResponseFromJSON, SharesIncomingResponseFromJSON, SharesOutgoingResponseFromJSON, VaultGetShareResponseFromJSON, VaultItemResponseFromJSON, VaultShareWithItemDataFromJSON, VaultSharesCreateResponseFromJSON, } from '../models';
25
25
  /**
26
26
  *
27
27
  */
@@ -561,7 +561,7 @@ export class SharesApi extends runtime.BaseAPI {
561
561
  headers: headerParameters,
562
562
  query: queryParameters,
563
563
  }, initOverrides);
564
- return new runtime.JSONApiResponse(response, (jsonValue) => ShreIntentListResponseFromJSON(jsonValue));
564
+ return new runtime.JSONApiResponse(response, (jsonValue) => ShareIntentListResponseFromJSON(jsonValue));
565
565
  });
566
566
  }
567
567
  /**
@@ -14,19 +14,19 @@
14
14
  import { VaultCollectionReportFromJSON, VaultCollectionReportToJSON, } from './VaultCollectionReport';
15
15
  import { VaultShareIntentFromJSON, VaultShareIntentToJSON, } from './VaultShareIntent';
16
16
  /**
17
- * Check if a given object implements the ShreIntentListResponse interface.
17
+ * Check if a given object implements the ShareIntentListResponse interface.
18
18
  */
19
- export function instanceOfShreIntentListResponse(value) {
19
+ export function instanceOfShareIntentListResponse(value) {
20
20
  let isInstance = true;
21
21
  isInstance = isInstance && "next_page_after" in value;
22
22
  isInstance = isInstance && "share_intents" in value;
23
23
  isInstance = isInstance && "meta" in value;
24
24
  return isInstance;
25
25
  }
26
- export function ShreIntentListResponseFromJSON(json) {
27
- return ShreIntentListResponseFromJSONTyped(json, false);
26
+ export function ShareIntentListResponseFromJSON(json) {
27
+ return ShareIntentListResponseFromJSONTyped(json, false);
28
28
  }
29
- export function ShreIntentListResponseFromJSONTyped(json, ignoreDiscriminator) {
29
+ export function ShareIntentListResponseFromJSONTyped(json, ignoreDiscriminator) {
30
30
  if ((json === undefined) || (json === null)) {
31
31
  return json;
32
32
  }
@@ -36,7 +36,7 @@ export function ShreIntentListResponseFromJSONTyped(json, ignoreDiscriminator) {
36
36
  'meta': VaultCollectionReportFromJSON(json['meta']),
37
37
  };
38
38
  }
39
- export function ShreIntentListResponseToJSON(value) {
39
+ export function ShareIntentListResponseToJSON(value) {
40
40
  if (value === undefined) {
41
41
  return undefined;
42
42
  }
@@ -19,6 +19,7 @@ export function instanceOfUtilitiesOwDeploymentRequestOw(value) {
19
19
  isInstance = isInstance && "app_client_id" in value;
20
20
  isInstance = isInstance && "app_client_secret" in value;
21
21
  isInstance = isInstance && "org_id" in value;
22
+ isInstance = isInstance && "org_name" in value;
22
23
  isInstance = isInstance && "org_passphrase" in value;
23
24
  return isInstance;
24
25
  }
@@ -33,6 +34,7 @@ export function UtilitiesOwDeploymentRequestOwFromJSONTyped(json, ignoreDiscrimi
33
34
  'app_client_id': json['app_client_id'],
34
35
  'app_client_secret': json['app_client_secret'],
35
36
  'org_id': json['org_id'],
37
+ 'org_name': json['org_name'],
36
38
  'org_passphrase': json['org_passphrase'],
37
39
  };
38
40
  }
@@ -47,6 +49,7 @@ export function UtilitiesOwDeploymentRequestOwToJSON(value) {
47
49
  'app_client_id': value.app_client_id,
48
50
  'app_client_secret': value.app_client_secret,
49
51
  'org_id': value.org_id,
52
+ 'org_name': value.org_name,
50
53
  'org_passphrase': value.org_passphrase,
51
54
  };
52
55
  }
@@ -16,8 +16,6 @@ import { exists } from '../runtime';
16
16
  * @export
17
17
  */
18
18
  export const VaultInvitationConnectionTypeEnum = {
19
- Member: 'member',
20
- Service: 'service',
21
19
  Delegate: 'delegate',
22
20
  Null: 'null'
23
21
  };
@@ -41,9 +39,6 @@ export function instanceOfVaultInvitation(value) {
41
39
  isInstance = isInstance && "token" in value;
42
40
  isInstance = isInstance && "delegation_role" in value;
43
41
  isInstance = isInstance && "delegation_token" in value;
44
- isInstance = isInstance && "organization_id" in value;
45
- isInstance = isInstance && "organization_member_role" in value;
46
- isInstance = isInstance && "service_id" in value;
47
42
  isInstance = isInstance && "sender_did" in value;
48
43
  isInstance = isInstance && "recipient_did" in value;
49
44
  isInstance = isInstance && "expire_at" in value;
@@ -74,9 +69,6 @@ export function VaultInvitationFromJSONTyped(json, ignoreDiscriminator) {
74
69
  'token': json['token'],
75
70
  'delegation_role': json['delegation_role'],
76
71
  'delegation_token': json['delegation_token'],
77
- 'organization_id': json['organization_id'],
78
- 'organization_member_role': json['organization_member_role'],
79
- 'service_id': json['service_id'],
80
72
  'sender_did': json['sender_did'],
81
73
  'recipient_did': json['recipient_did'],
82
74
  'expire_at': (new Date(json['expire_at'])),
@@ -108,9 +100,6 @@ export function VaultInvitationToJSON(value) {
108
100
  'token': value.token,
109
101
  'delegation_role': value.delegation_role,
110
102
  'delegation_token': value.delegation_token,
111
- 'organization_id': value.organization_id,
112
- 'organization_member_role': value.organization_member_role,
113
- 'service_id': value.service_id,
114
103
  'sender_did': value.sender_did,
115
104
  'recipient_did': value.recipient_did,
116
105
  'expire_at': (value.expire_at.toISOString()),
@@ -24,8 +24,6 @@ export const VaultOwnConnectionDataDelegationRoleEnum = {
24
24
  * @export
25
25
  */
26
26
  export const VaultOwnConnectionDataConnectionTypeEnum = {
27
- Member: 'member',
28
- Service: 'service',
29
27
  Delegate: 'delegate',
30
28
  Null: 'null'
31
29
  };
@@ -34,8 +32,7 @@ export const VaultOwnConnectionDataConnectionTypeEnum = {
34
32
  */
35
33
  export const VaultOwnConnectionDataUserTypeEnum = {
36
34
  Human: 'human',
37
- OrganizationAgent: 'organization_agent',
38
- ServiceAgent: 'service_agent'
35
+ Org: 'org'
39
36
  };
40
37
  /**
41
38
  * Check if a given object implements the VaultOwnConnectionData interface.
@@ -46,7 +43,6 @@ export function instanceOfVaultOwnConnectionData(value) {
46
43
  isInstance = isInstance && "encrypted_recipient_name" in value;
47
44
  isInstance = isInstance && "delegation_token" in value;
48
45
  isInstance = isInstance && "delegation_role" in value;
49
- isInstance = isInstance && "organization_member_id" in value;
50
46
  isInstance = isInstance && "connection_type" in value;
51
47
  isInstance = isInstance && "user_id" in value;
52
48
  isInstance = isInstance && "user_type" in value;
@@ -68,7 +64,6 @@ export function VaultOwnConnectionDataFromJSONTyped(json, ignoreDiscriminator) {
68
64
  'encrypted_recipient_name': json['encrypted_recipient_name'],
69
65
  'delegation_token': json['delegation_token'],
70
66
  'delegation_role': json['delegation_role'],
71
- 'organization_member_id': json['organization_member_id'],
72
67
  'connection_type': json['connection_type'],
73
68
  'user_id': json['user_id'],
74
69
  'user_type': json['user_type'],
@@ -90,7 +85,6 @@ export function VaultOwnConnectionDataToJSON(value) {
90
85
  'encrypted_recipient_name': value.encrypted_recipient_name,
91
86
  'delegation_token': value.delegation_token,
92
87
  'delegation_role': value.delegation_role,
93
- 'organization_member_id': value.organization_member_id,
94
88
  'connection_type': value.connection_type,
95
89
  'user_id': value.user_id,
96
90
  'user_type': value.user_type,
@@ -24,8 +24,6 @@ export const VaultTheOtherConnectedUserDataDelegationRoleEnum = {
24
24
  * @export
25
25
  */
26
26
  export const VaultTheOtherConnectedUserDataConnectionTypeEnum = {
27
- Member: 'member',
28
- Service: 'service',
29
27
  Delegate: 'delegate',
30
28
  Null: 'null'
31
29
  };
@@ -34,8 +32,7 @@ export const VaultTheOtherConnectedUserDataConnectionTypeEnum = {
34
32
  */
35
33
  export const VaultTheOtherConnectedUserDataUserTypeEnum = {
36
34
  Human: 'human',
37
- OrganizationAgent: 'organization_agent',
38
- ServiceAgent: 'service_agent'
35
+ Org: 'org'
39
36
  };
40
37
  /**
41
38
  * Check if a given object implements the VaultTheOtherConnectedUserData interface.
@@ -45,7 +42,6 @@ export function instanceOfVaultTheOtherConnectedUserData(value) {
45
42
  isInstance = isInstance && "id" in value;
46
43
  isInstance = isInstance && "delegation_token" in value;
47
44
  isInstance = isInstance && "delegation_role" in value;
48
- isInstance = isInstance && "organization_member_id" in value;
49
45
  isInstance = isInstance && "connection_type" in value;
50
46
  isInstance = isInstance && "user_id" in value;
51
47
  isInstance = isInstance && "user_type" in value;
@@ -65,7 +61,6 @@ export function VaultTheOtherConnectedUserDataFromJSONTyped(json, ignoreDiscrimi
65
61
  'id': json['id'],
66
62
  'delegation_token': json['delegation_token'],
67
63
  'delegation_role': json['delegation_role'],
68
- 'organization_member_id': json['organization_member_id'],
69
64
  'connection_type': json['connection_type'],
70
65
  'user_id': json['user_id'],
71
66
  'user_type': json['user_type'],
@@ -85,7 +80,6 @@ export function VaultTheOtherConnectedUserDataToJSON(value) {
85
80
  'id': value.id,
86
81
  'delegation_token': value.delegation_token,
87
82
  'delegation_role': value.delegation_role,
88
- 'organization_member_id': value.organization_member_id,
89
83
  'connection_type': value.connection_type,
90
84
  'user_id': value.user_id,
91
85
  'user_type': value.user_type,
@@ -16,8 +16,7 @@
16
16
  */
17
17
  export const VaultUserUserTypeEnum = {
18
18
  Human: 'human',
19
- OrganizationAgent: 'organization_agent',
20
- ServiceAgent: 'service_agent'
19
+ Org: 'org'
21
20
  };
22
21
  /**
23
22
  * Check if a given object implements the VaultUser interface.
@@ -19,8 +19,6 @@ import { VaultUserConnectionsReportConnectionsWithDelegationAccessToOtherUsersFr
19
19
  export function instanceOfVaultUserConnectionsReport(value) {
20
20
  let isInstance = true;
21
21
  isInstance = isInstance && "all_connections" in value;
22
- isInstance = isInstance && "member_connections" in value;
23
- isInstance = isInstance && "service_connections" in value;
24
22
  isInstance = isInstance && "connections_granting_delegation_access_to_your_account" in value;
25
23
  isInstance = isInstance && "connections_with_delegation_access_to_other_users" in value;
26
24
  return isInstance;
@@ -34,8 +32,6 @@ export function VaultUserConnectionsReportFromJSONTyped(json, ignoreDiscriminato
34
32
  }
35
33
  return {
36
34
  'all_connections': json['all_connections'],
37
- 'member_connections': json['member_connections'],
38
- 'service_connections': json['service_connections'],
39
35
  'connections_granting_delegation_access_to_your_account': VaultUserConnectionsReportConnectionsGrantingDelegationAccessToYourAccountFromJSON(json['connections_granting_delegation_access_to_your_account']),
40
36
  'connections_with_delegation_access_to_other_users': VaultUserConnectionsReportConnectionsWithDelegationAccessToOtherUsersFromJSON(json['connections_with_delegation_access_to_other_users']),
41
37
  };
@@ -49,8 +45,6 @@ export function VaultUserConnectionsReportToJSON(value) {
49
45
  }
50
46
  return {
51
47
  'all_connections': value.all_connections,
52
- 'member_connections': value.member_connections,
53
- 'service_connections': value.service_connections,
54
48
  'connections_granting_delegation_access_to_your_account': VaultUserConnectionsReportConnectionsGrantingDelegationAccessToYourAccountToJSON(value.connections_granting_delegation_access_to_your_account),
55
49
  'connections_with_delegation_access_to_other_users': VaultUserConnectionsReportConnectionsWithDelegationAccessToOtherUsersToJSON(value.connections_with_delegation_access_to_other_users),
56
50
  };
@@ -196,13 +196,13 @@ export * from './PutTasksRequest';
196
196
  export * from './ReconfigureShareParamsInner';
197
197
  export * from './ReconfigureSharesResponse';
198
198
  export * from './SchemasIdVersionSchemaJsonGet200Response';
199
+ export * from './ShareIntentListResponse';
199
200
  export * from './ShareIntentParam';
200
201
  export * from './ShareIntentRequest';
201
202
  export * from './ShareIntentResponse';
202
203
  export * from './ShareIntentsResponse';
203
204
  export * from './SharesIncomingResponse';
204
205
  export * from './SharesOutgoingResponse';
205
- export * from './ShreIntentListResponse';
206
206
  export * from './UpdateDelegationsRequest';
207
207
  export * from './UtilitiesApplicationVersion';
208
208
  export * from './UtilitiesBlobInfo';
@@ -190,12 +190,12 @@ export declare class ConnectionsApi extends runtime.BaseAPI {
190
190
  */
191
191
  invitationsInvitationIdRejectDelete(invitationId: string, meecoDelegationId?: string, meecoOrganisationId?: string, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<InvitationRejectedResponse>;
192
192
  /**
193
- * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the membership invitation parameter `organization_member_role` is used to specify the role we are inviting the user with. There are currently 2 organization member roles: * `owner` - can do everything * `admin` (default) - can only manage organization services If param `organization_member_role` is not provided then role `admin` will be assigned to the invited member. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
193
+ * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
194
194
  * Create an invitation
195
195
  */
196
196
  invitationsPostRaw(requestParameters: InvitationsPostRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<InvitationResponse>>;
197
197
  /**
198
- * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the membership invitation parameter `organization_member_role` is used to specify the role we are inviting the user with. There are currently 2 organization member roles: * `owner` - can do everything * `admin` (default) - can only manage organization services If param `organization_member_role` is not provided then role `admin` will be assigned to the invited member. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
198
+ * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
199
199
  * Create an invitation
200
200
  */
201
201
  invitationsPost(meecoDelegationId?: string, meecoOrganisationId?: string, postInvitationsRequest?: PostInvitationsRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<InvitationResponse>;
@@ -10,7 +10,7 @@
10
10
  * Do not edit the class manually.
11
11
  */
12
12
  import * as runtime from '../runtime';
13
- import type { CreateDeleteReconfigureSharesRequest, CreateDeleteReconfigureSharesServiceResponse, GetItemSharesResponse, ItemSharesUpdateResponse, ListOfReconfigureShareParams, PostItemEncryptRequest, PostItemSharesRequest, PutItemSharesRequest, ReconfigureSharesResponse, ShareIntentRequest, ShareIntentResponse, ShareIntentsResponse, SharesIncomingResponse, SharesOutgoingResponse, ShreIntentListResponse, VaultGetShareResponse, VaultItemResponse, VaultShareWithItemData, VaultSharesCreateResponse } from '../models';
13
+ import type { CreateDeleteReconfigureSharesRequest, CreateDeleteReconfigureSharesServiceResponse, GetItemSharesResponse, ItemSharesUpdateResponse, ListOfReconfigureShareParams, PostItemEncryptRequest, PostItemSharesRequest, PutItemSharesRequest, ReconfigureSharesResponse, ShareIntentListResponse, ShareIntentRequest, ShareIntentResponse, ShareIntentsResponse, SharesIncomingResponse, SharesOutgoingResponse, VaultGetShareResponse, VaultItemResponse, VaultShareWithItemData, VaultSharesCreateResponse } from '../models';
14
14
  export interface IncomingSharesGetRequest {
15
15
  nextPageAfter?: string;
16
16
  perPage?: number;
@@ -226,12 +226,12 @@ export declare class SharesApi extends runtime.BaseAPI {
226
226
  * share intents the user has created
227
227
  * View share intents the user has created
228
228
  */
229
- shareIntentsGetRaw(requestParameters: ShareIntentsGetRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<ShreIntentListResponse>>;
229
+ shareIntentsGetRaw(requestParameters: ShareIntentsGetRequest, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<runtime.ApiResponse<ShareIntentListResponse>>;
230
230
  /**
231
231
  * share intents the user has created
232
232
  * View share intents the user has created
233
233
  */
234
- shareIntentsGet(meecoDelegationId?: string, meecoOrganisationId?: string, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<ShreIntentListResponse>;
234
+ shareIntentsGet(meecoDelegationId?: string, meecoOrganisationId?: string, initOverrides?: RequestInit | runtime.InitOverrideFunction): Promise<ShareIntentListResponse>;
235
235
  /**
236
236
  * Delete a share intent
237
237
  * Delete a share intent
@@ -14,32 +14,32 @@ import type { VaultShareIntent } from './VaultShareIntent';
14
14
  /**
15
15
  *
16
16
  * @export
17
- * @interface ShreIntentListResponse
17
+ * @interface ShareIntentListResponse
18
18
  */
19
- export interface ShreIntentListResponse {
19
+ export interface ShareIntentListResponse {
20
20
  /**
21
21
  *
22
22
  * @type {string}
23
- * @memberof ShreIntentListResponse
23
+ * @memberof ShareIntentListResponse
24
24
  */
25
25
  next_page_after: string | null;
26
26
  /**
27
27
  *
28
28
  * @type {Array<VaultShareIntent>}
29
- * @memberof ShreIntentListResponse
29
+ * @memberof ShareIntentListResponse
30
30
  */
31
31
  share_intents: Array<VaultShareIntent>;
32
32
  /**
33
33
  *
34
34
  * @type {VaultCollectionReport}
35
- * @memberof ShreIntentListResponse
35
+ * @memberof ShareIntentListResponse
36
36
  */
37
37
  meta: VaultCollectionReport;
38
38
  }
39
39
  /**
40
- * Check if a given object implements the ShreIntentListResponse interface.
40
+ * Check if a given object implements the ShareIntentListResponse interface.
41
41
  */
42
- export declare function instanceOfShreIntentListResponse(value: object): boolean;
43
- export declare function ShreIntentListResponseFromJSON(json: any): ShreIntentListResponse;
44
- export declare function ShreIntentListResponseFromJSONTyped(json: any, ignoreDiscriminator: boolean): ShreIntentListResponse;
45
- export declare function ShreIntentListResponseToJSON(value?: ShreIntentListResponse | null): any;
42
+ export declare function instanceOfShareIntentListResponse(value: object): boolean;
43
+ export declare function ShareIntentListResponseFromJSON(json: any): ShareIntentListResponse;
44
+ export declare function ShareIntentListResponseFromJSONTyped(json: any, ignoreDiscriminator: boolean): ShareIntentListResponse;
45
+ export declare function ShareIntentListResponseToJSON(value?: ShareIntentListResponse | null): any;
@@ -33,6 +33,12 @@ export interface UtilitiesOwDeploymentRequestOw {
33
33
  * @memberof UtilitiesOwDeploymentRequestOw
34
34
  */
35
35
  org_id: string;
36
+ /**
37
+ * Organization name
38
+ * @type {string}
39
+ * @memberof UtilitiesOwDeploymentRequestOw
40
+ */
41
+ org_name: string;
36
42
  /**
37
43
  * Organization passphrase
38
44
  * @type {string}
@@ -17,8 +17,6 @@
17
17
  export interface VaultInvitation {
18
18
  /**
19
19
  * Type of the connection. Currently it can be
20
- * * `member` - a connection between an organization agent and a member
21
- * * `service`- a connection between a service user and a user of the service
22
20
  * * `delegate`- a connection between users where current user acts as delegate of a resource owner
23
21
  * * `NULL` - a connection between two human users
24
22
  * @type {string}
@@ -58,24 +56,6 @@ export interface VaultInvitation {
58
56
  * @memberof VaultInvitation
59
57
  */
60
58
  delegation_token: string | null;
61
- /**
62
- * In the invitation is a membership invitation from an organisation, this field contains the ID of the organisation
63
- * @type {string}
64
- * @memberof VaultInvitation
65
- */
66
- organization_id: string | null;
67
- /**
68
- * In the invitation is a membership invitation from an organisation, this field contains the membership role, it can be `admin` or `owner`
69
- * @type {string}
70
- * @memberof VaultInvitation
71
- */
72
- organization_member_role: string | null;
73
- /**
74
- * In the invitation is from an organisation service, this field contains the ID of the service
75
- * @type {string}
76
- * @memberof VaultInvitation
77
- */
78
- service_id: string | null;
79
59
  /**
80
60
  * Decentralized identifier of the invitation sender
81
61
  * @type {string}
@@ -171,8 +151,6 @@ export interface VaultInvitation {
171
151
  * @export
172
152
  */
173
153
  export declare const VaultInvitationConnectionTypeEnum: {
174
- readonly Member: "member";
175
- readonly Service: "service";
176
154
  readonly Delegate: "delegate";
177
155
  readonly Null: "null";
178
156
  };
@@ -42,16 +42,8 @@ export interface VaultOwnConnectionData {
42
42
  * @memberof VaultOwnConnectionData
43
43
  */
44
44
  delegation_role: VaultOwnConnectionDataDelegationRoleEnum;
45
- /**
46
- * In a membership connection `organization_member_id` contains an ID of an `organization_members` record
47
- * @type {string}
48
- * @memberof VaultOwnConnectionData
49
- */
50
- organization_member_id: string | null;
51
45
  /**
52
46
  * Type of the connection. Currently it can be
53
- * * `member` - a connection between an organization agent and a member
54
- * * `service`- a connection between a service user and a user of the service
55
47
  * * `delegate`- a connection between users where current user acts as delegate of a resource owner
56
48
  * * `NULL` - a connection between two human users
57
49
  * @type {string}
@@ -65,7 +57,7 @@ export interface VaultOwnConnectionData {
65
57
  */
66
58
  user_id: string;
67
59
  /**
68
- * Type of the user. Currently can be `human`, `service_agent`, `organization_user`
60
+ * Type of the user. Currently can be `human`, `org`
69
61
  * @type {string}
70
62
  * @memberof VaultOwnConnectionData
71
63
  */
@@ -109,8 +101,6 @@ export type VaultOwnConnectionDataDelegationRoleEnum = typeof VaultOwnConnection
109
101
  * @export
110
102
  */
111
103
  export declare const VaultOwnConnectionDataConnectionTypeEnum: {
112
- readonly Member: "member";
113
- readonly Service: "service";
114
104
  readonly Delegate: "delegate";
115
105
  readonly Null: "null";
116
106
  };
@@ -120,8 +110,7 @@ export type VaultOwnConnectionDataConnectionTypeEnum = typeof VaultOwnConnection
120
110
  */
121
111
  export declare const VaultOwnConnectionDataUserTypeEnum: {
122
112
  readonly Human: "human";
123
- readonly OrganizationAgent: "organization_agent";
124
- readonly ServiceAgent: "service_agent";
113
+ readonly Org: "org";
125
114
  };
126
115
  export type VaultOwnConnectionDataUserTypeEnum = typeof VaultOwnConnectionDataUserTypeEnum[keyof typeof VaultOwnConnectionDataUserTypeEnum];
127
116
  /**
@@ -36,16 +36,8 @@ export interface VaultTheOtherConnectedUserData {
36
36
  * @memberof VaultTheOtherConnectedUserData
37
37
  */
38
38
  delegation_role: VaultTheOtherConnectedUserDataDelegationRoleEnum;
39
- /**
40
- * In a membership connection `organization_member_id` contains an ID of an `organization_members` record
41
- * @type {string}
42
- * @memberof VaultTheOtherConnectedUserData
43
- */
44
- organization_member_id: string | null;
45
39
  /**
46
40
  * Type of the connection. Currently it can be
47
- * * `member` - a connection between an organization agent and a member
48
- * * `service`- a connection between a service user and a user of the service
49
41
  * * `delegate`- a connection between users where the user on the other side of a connection is a delegate of a resource owner
50
42
  * * `NULL` - a connection between two human users
51
43
  * @type {string}
@@ -59,7 +51,7 @@ export interface VaultTheOtherConnectedUserData {
59
51
  */
60
52
  user_id: string;
61
53
  /**
62
- * Type of the user on the other side of the connection. Currently can be `human`, `service_agent`, `organization_user`
54
+ * Type of the user on the other side of the connection. Currently can be `human`, `org`
63
55
  * @type {string}
64
56
  * @memberof VaultTheOtherConnectedUserData
65
57
  */
@@ -97,8 +89,6 @@ export type VaultTheOtherConnectedUserDataDelegationRoleEnum = typeof VaultTheOt
97
89
  * @export
98
90
  */
99
91
  export declare const VaultTheOtherConnectedUserDataConnectionTypeEnum: {
100
- readonly Member: "member";
101
- readonly Service: "service";
102
92
  readonly Delegate: "delegate";
103
93
  readonly Null: "null";
104
94
  };
@@ -108,8 +98,7 @@ export type VaultTheOtherConnectedUserDataConnectionTypeEnum = typeof VaultTheOt
108
98
  */
109
99
  export declare const VaultTheOtherConnectedUserDataUserTypeEnum: {
110
100
  readonly Human: "human";
111
- readonly OrganizationAgent: "organization_agent";
112
- readonly ServiceAgent: "service_agent";
101
+ readonly Org: "org";
113
102
  };
114
103
  export type VaultTheOtherConnectedUserDataUserTypeEnum = typeof VaultTheOtherConnectedUserDataUserTypeEnum[keyof typeof VaultTheOtherConnectedUserDataUserTypeEnum];
115
104
  /**
@@ -82,7 +82,7 @@ export interface VaultUser {
82
82
  */
83
83
  broken_attachments_present: boolean;
84
84
  /**
85
- * Type of the user currently can be `human`, `service_agent`, `organization_user`. Defaults to `human`
85
+ * Type of the user currently can be `human`, `org`. Defaults to `human`
86
86
  * @type {string}
87
87
  * @memberof VaultUser
88
88
  */
@@ -93,8 +93,7 @@ export interface VaultUser {
93
93
  */
94
94
  export declare const VaultUserUserTypeEnum: {
95
95
  readonly Human: "human";
96
- readonly OrganizationAgent: "organization_agent";
97
- readonly ServiceAgent: "service_agent";
96
+ readonly Org: "org";
98
97
  };
99
98
  export type VaultUserUserTypeEnum = typeof VaultUserUserTypeEnum[keyof typeof VaultUserUserTypeEnum];
100
99
  /**
@@ -23,18 +23,6 @@ export interface VaultUserConnectionsReport {
23
23
  * @memberof VaultUserConnectionsReport
24
24
  */
25
25
  all_connections: number;
26
- /**
27
- * number of member connections
28
- * @type {number}
29
- * @memberof VaultUserConnectionsReport
30
- */
31
- member_connections: number;
32
- /**
33
- * number of service connections
34
- * @type {number}
35
- * @memberof VaultUserConnectionsReport
36
- */
37
- service_connections: number;
38
26
  /**
39
27
  *
40
28
  * @type {VaultUserConnectionsReportConnectionsGrantingDelegationAccessToYourAccount}
@@ -194,13 +194,13 @@ export * from './PutTasksRequest';
194
194
  export * from './ReconfigureShareParamsInner';
195
195
  export * from './ReconfigureSharesResponse';
196
196
  export * from './SchemasIdVersionSchemaJsonGet200Response';
197
+ export * from './ShareIntentListResponse';
197
198
  export * from './ShareIntentParam';
198
199
  export * from './ShareIntentRequest';
199
200
  export * from './ShareIntentResponse';
200
201
  export * from './ShareIntentsResponse';
201
202
  export * from './SharesIncomingResponse';
202
203
  export * from './SharesOutgoingResponse';
203
- export * from './ShreIntentListResponse';
204
204
  export * from './UpdateDelegationsRequest';
205
205
  export * from './UtilitiesApplicationVersion';
206
206
  export * from './UtilitiesBlobInfo';
@@ -541,7 +541,7 @@ class ConnectionsApi extends runtime.BaseAPI {
541
541
  });
542
542
  }
543
543
  /**
544
- * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the membership invitation parameter `organization_member_role` is used to specify the role we are inviting the user with. There are currently 2 organization member roles: * `owner` - can do everything * `admin` (default) - can only manage organization services If param `organization_member_role` is not provided then role `admin` will be assigned to the invited member. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
544
+ * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
545
545
  * Create an invitation
546
546
  */
547
547
  invitationsPostRaw(requestParameters, initOverrides) {
@@ -573,7 +573,7 @@ class ConnectionsApi extends runtime.BaseAPI {
573
573
  });
574
574
  }
575
575
  /**
576
- * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the membership invitation parameter `organization_member_role` is used to specify the role we are inviting the user with. There are currently 2 organization member roles: * `owner` - can do everything * `admin` (default) - can only manage organization services If param `organization_member_role` is not provided then role `admin` will be assigned to the invited member. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
576
+ * Invite another user to connect. An invitation does not specify a recipient directly, instead the result of this operation is an invitation token which can then be sent to a recipient by a client application or some other means, mand the recipient can create a connection using this token and endpoint `POST /connections` --- Invitations and connections have 3 special use-cases: 1. a connection between an organization agent and an organization member 2. a connection between a service agent and a user of the service 3. a connection between a user and a delegate user who has been granted permissions to act on behalf of the user Blindly accepting an invitation by submitting an invitation token to `POST /connections` might have serious consequences, so client applications are advised to first read the invitation with `GET /invitations/{token}`before creating a connection. The intent of an invitation is in JSON field `integration_data`. --- For the delegation connection parameters `delegate_role` and `delegation_token` are mandatory. `delegation_token` should be obtained by running `POST /delegations` in the keystore. If `delegate_role` and `delegation_token` are present, a recipient is invited to become a delegate user who has rights to perform actions on behalf of the user who has created the invitation. Currently there are three delegate roles: * `owner` * `admin` * `reader` --- The vault supports two invitations workflows: * Simple - a sender creates an invitation. A recipient then accepts the invitation, and a connection is created. * Multistep - a sender creates an invitation. A recipient then accepts the invitation, no connection is created yet. The recipient then confirms the invitation, and a connection is created. An invitation is marked as belonging to one of these two workflows when created, boolean parameter `multistep_workflow` can be used for this. Values \'1\' and \'true\' are interpreted as true, as multistep invitation workflow. Each vault instance is configured to have a default invitation workflow. In case `multistep_workflow` is not submitted or is `null`, the default workflow is used.
577
577
  * Create an invitation
578
578
  */
579
579
  invitationsPost(meecoDelegationId, meecoOrganisationId, postInvitationsRequest, initOverrides) {
@@ -587,7 +587,7 @@ class SharesApi extends runtime.BaseAPI {
587
587
  headers: headerParameters,
588
588
  query: queryParameters,
589
589
  }, initOverrides);
590
- return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ShreIntentListResponseFromJSON)(jsonValue));
590
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ShareIntentListResponseFromJSON)(jsonValue));
591
591
  });
592
592
  }
593
593
  /**
@@ -13,25 +13,25 @@
13
13
  * Do not edit the class manually.
14
14
  */
15
15
  Object.defineProperty(exports, "__esModule", { value: true });
16
- exports.ShreIntentListResponseToJSON = exports.ShreIntentListResponseFromJSONTyped = exports.ShreIntentListResponseFromJSON = exports.instanceOfShreIntentListResponse = void 0;
16
+ exports.ShareIntentListResponseToJSON = exports.ShareIntentListResponseFromJSONTyped = exports.ShareIntentListResponseFromJSON = exports.instanceOfShareIntentListResponse = void 0;
17
17
  const VaultCollectionReport_1 = require("./VaultCollectionReport");
18
18
  const VaultShareIntent_1 = require("./VaultShareIntent");
19
19
  /**
20
- * Check if a given object implements the ShreIntentListResponse interface.
20
+ * Check if a given object implements the ShareIntentListResponse interface.
21
21
  */
22
- function instanceOfShreIntentListResponse(value) {
22
+ function instanceOfShareIntentListResponse(value) {
23
23
  let isInstance = true;
24
24
  isInstance = isInstance && "next_page_after" in value;
25
25
  isInstance = isInstance && "share_intents" in value;
26
26
  isInstance = isInstance && "meta" in value;
27
27
  return isInstance;
28
28
  }
29
- exports.instanceOfShreIntentListResponse = instanceOfShreIntentListResponse;
30
- function ShreIntentListResponseFromJSON(json) {
31
- return ShreIntentListResponseFromJSONTyped(json, false);
29
+ exports.instanceOfShareIntentListResponse = instanceOfShareIntentListResponse;
30
+ function ShareIntentListResponseFromJSON(json) {
31
+ return ShareIntentListResponseFromJSONTyped(json, false);
32
32
  }
33
- exports.ShreIntentListResponseFromJSON = ShreIntentListResponseFromJSON;
34
- function ShreIntentListResponseFromJSONTyped(json, ignoreDiscriminator) {
33
+ exports.ShareIntentListResponseFromJSON = ShareIntentListResponseFromJSON;
34
+ function ShareIntentListResponseFromJSONTyped(json, ignoreDiscriminator) {
35
35
  if ((json === undefined) || (json === null)) {
36
36
  return json;
37
37
  }
@@ -41,8 +41,8 @@ function ShreIntentListResponseFromJSONTyped(json, ignoreDiscriminator) {
41
41
  'meta': (0, VaultCollectionReport_1.VaultCollectionReportFromJSON)(json['meta']),
42
42
  };
43
43
  }
44
- exports.ShreIntentListResponseFromJSONTyped = ShreIntentListResponseFromJSONTyped;
45
- function ShreIntentListResponseToJSON(value) {
44
+ exports.ShareIntentListResponseFromJSONTyped = ShareIntentListResponseFromJSONTyped;
45
+ function ShareIntentListResponseToJSON(value) {
46
46
  if (value === undefined) {
47
47
  return undefined;
48
48
  }
@@ -55,4 +55,4 @@ function ShreIntentListResponseToJSON(value) {
55
55
  'meta': (0, VaultCollectionReport_1.VaultCollectionReportToJSON)(value.meta),
56
56
  };
57
57
  }
58
- exports.ShreIntentListResponseToJSON = ShreIntentListResponseToJSON;
58
+ exports.ShareIntentListResponseToJSON = ShareIntentListResponseToJSON;
@@ -22,6 +22,7 @@ function instanceOfUtilitiesOwDeploymentRequestOw(value) {
22
22
  isInstance = isInstance && "app_client_id" in value;
23
23
  isInstance = isInstance && "app_client_secret" in value;
24
24
  isInstance = isInstance && "org_id" in value;
25
+ isInstance = isInstance && "org_name" in value;
25
26
  isInstance = isInstance && "org_passphrase" in value;
26
27
  return isInstance;
27
28
  }
@@ -38,6 +39,7 @@ function UtilitiesOwDeploymentRequestOwFromJSONTyped(json, ignoreDiscriminator)
38
39
  'app_client_id': json['app_client_id'],
39
40
  'app_client_secret': json['app_client_secret'],
40
41
  'org_id': json['org_id'],
42
+ 'org_name': json['org_name'],
41
43
  'org_passphrase': json['org_passphrase'],
42
44
  };
43
45
  }
@@ -53,6 +55,7 @@ function UtilitiesOwDeploymentRequestOwToJSON(value) {
53
55
  'app_client_id': value.app_client_id,
54
56
  'app_client_secret': value.app_client_secret,
55
57
  'org_id': value.org_id,
58
+ 'org_name': value.org_name,
56
59
  'org_passphrase': value.org_passphrase,
57
60
  };
58
61
  }
@@ -19,8 +19,6 @@ const runtime_1 = require("../runtime");
19
19
  * @export
20
20
  */
21
21
  exports.VaultInvitationConnectionTypeEnum = {
22
- Member: 'member',
23
- Service: 'service',
24
22
  Delegate: 'delegate',
25
23
  Null: 'null'
26
24
  };
@@ -44,9 +42,6 @@ function instanceOfVaultInvitation(value) {
44
42
  isInstance = isInstance && "token" in value;
45
43
  isInstance = isInstance && "delegation_role" in value;
46
44
  isInstance = isInstance && "delegation_token" in value;
47
- isInstance = isInstance && "organization_id" in value;
48
- isInstance = isInstance && "organization_member_role" in value;
49
- isInstance = isInstance && "service_id" in value;
50
45
  isInstance = isInstance && "sender_did" in value;
51
46
  isInstance = isInstance && "recipient_did" in value;
52
47
  isInstance = isInstance && "expire_at" in value;
@@ -79,9 +74,6 @@ function VaultInvitationFromJSONTyped(json, ignoreDiscriminator) {
79
74
  'token': json['token'],
80
75
  'delegation_role': json['delegation_role'],
81
76
  'delegation_token': json['delegation_token'],
82
- 'organization_id': json['organization_id'],
83
- 'organization_member_role': json['organization_member_role'],
84
- 'service_id': json['service_id'],
85
77
  'sender_did': json['sender_did'],
86
78
  'recipient_did': json['recipient_did'],
87
79
  'expire_at': (new Date(json['expire_at'])),
@@ -114,9 +106,6 @@ function VaultInvitationToJSON(value) {
114
106
  'token': value.token,
115
107
  'delegation_role': value.delegation_role,
116
108
  'delegation_token': value.delegation_token,
117
- 'organization_id': value.organization_id,
118
- 'organization_member_role': value.organization_member_role,
119
- 'service_id': value.service_id,
120
109
  'sender_did': value.sender_did,
121
110
  'recipient_did': value.recipient_did,
122
111
  'expire_at': (value.expire_at.toISOString()),
@@ -27,8 +27,6 @@ exports.VaultOwnConnectionDataDelegationRoleEnum = {
27
27
  * @export
28
28
  */
29
29
  exports.VaultOwnConnectionDataConnectionTypeEnum = {
30
- Member: 'member',
31
- Service: 'service',
32
30
  Delegate: 'delegate',
33
31
  Null: 'null'
34
32
  };
@@ -37,8 +35,7 @@ exports.VaultOwnConnectionDataConnectionTypeEnum = {
37
35
  */
38
36
  exports.VaultOwnConnectionDataUserTypeEnum = {
39
37
  Human: 'human',
40
- OrganizationAgent: 'organization_agent',
41
- ServiceAgent: 'service_agent'
38
+ Org: 'org'
42
39
  };
43
40
  /**
44
41
  * Check if a given object implements the VaultOwnConnectionData interface.
@@ -49,7 +46,6 @@ function instanceOfVaultOwnConnectionData(value) {
49
46
  isInstance = isInstance && "encrypted_recipient_name" in value;
50
47
  isInstance = isInstance && "delegation_token" in value;
51
48
  isInstance = isInstance && "delegation_role" in value;
52
- isInstance = isInstance && "organization_member_id" in value;
53
49
  isInstance = isInstance && "connection_type" in value;
54
50
  isInstance = isInstance && "user_id" in value;
55
51
  isInstance = isInstance && "user_type" in value;
@@ -73,7 +69,6 @@ function VaultOwnConnectionDataFromJSONTyped(json, ignoreDiscriminator) {
73
69
  'encrypted_recipient_name': json['encrypted_recipient_name'],
74
70
  'delegation_token': json['delegation_token'],
75
71
  'delegation_role': json['delegation_role'],
76
- 'organization_member_id': json['organization_member_id'],
77
72
  'connection_type': json['connection_type'],
78
73
  'user_id': json['user_id'],
79
74
  'user_type': json['user_type'],
@@ -96,7 +91,6 @@ function VaultOwnConnectionDataToJSON(value) {
96
91
  'encrypted_recipient_name': value.encrypted_recipient_name,
97
92
  'delegation_token': value.delegation_token,
98
93
  'delegation_role': value.delegation_role,
99
- 'organization_member_id': value.organization_member_id,
100
94
  'connection_type': value.connection_type,
101
95
  'user_id': value.user_id,
102
96
  'user_type': value.user_type,
@@ -27,8 +27,6 @@ exports.VaultTheOtherConnectedUserDataDelegationRoleEnum = {
27
27
  * @export
28
28
  */
29
29
  exports.VaultTheOtherConnectedUserDataConnectionTypeEnum = {
30
- Member: 'member',
31
- Service: 'service',
32
30
  Delegate: 'delegate',
33
31
  Null: 'null'
34
32
  };
@@ -37,8 +35,7 @@ exports.VaultTheOtherConnectedUserDataConnectionTypeEnum = {
37
35
  */
38
36
  exports.VaultTheOtherConnectedUserDataUserTypeEnum = {
39
37
  Human: 'human',
40
- OrganizationAgent: 'organization_agent',
41
- ServiceAgent: 'service_agent'
38
+ Org: 'org'
42
39
  };
43
40
  /**
44
41
  * Check if a given object implements the VaultTheOtherConnectedUserData interface.
@@ -48,7 +45,6 @@ function instanceOfVaultTheOtherConnectedUserData(value) {
48
45
  isInstance = isInstance && "id" in value;
49
46
  isInstance = isInstance && "delegation_token" in value;
50
47
  isInstance = isInstance && "delegation_role" in value;
51
- isInstance = isInstance && "organization_member_id" in value;
52
48
  isInstance = isInstance && "connection_type" in value;
53
49
  isInstance = isInstance && "user_id" in value;
54
50
  isInstance = isInstance && "user_type" in value;
@@ -70,7 +66,6 @@ function VaultTheOtherConnectedUserDataFromJSONTyped(json, ignoreDiscriminator)
70
66
  'id': json['id'],
71
67
  'delegation_token': json['delegation_token'],
72
68
  'delegation_role': json['delegation_role'],
73
- 'organization_member_id': json['organization_member_id'],
74
69
  'connection_type': json['connection_type'],
75
70
  'user_id': json['user_id'],
76
71
  'user_type': json['user_type'],
@@ -91,7 +86,6 @@ function VaultTheOtherConnectedUserDataToJSON(value) {
91
86
  'id': value.id,
92
87
  'delegation_token': value.delegation_token,
93
88
  'delegation_role': value.delegation_role,
94
- 'organization_member_id': value.organization_member_id,
95
89
  'connection_type': value.connection_type,
96
90
  'user_id': value.user_id,
97
91
  'user_type': value.user_type,
@@ -19,8 +19,7 @@ exports.VaultUserToJSON = exports.VaultUserFromJSONTyped = exports.VaultUserFrom
19
19
  */
20
20
  exports.VaultUserUserTypeEnum = {
21
21
  Human: 'human',
22
- OrganizationAgent: 'organization_agent',
23
- ServiceAgent: 'service_agent'
22
+ Org: 'org'
24
23
  };
25
24
  /**
26
25
  * Check if a given object implements the VaultUser interface.
@@ -22,8 +22,6 @@ const VaultUserConnectionsReportConnectionsWithDelegationAccessToOtherUsers_1 =
22
22
  function instanceOfVaultUserConnectionsReport(value) {
23
23
  let isInstance = true;
24
24
  isInstance = isInstance && "all_connections" in value;
25
- isInstance = isInstance && "member_connections" in value;
26
- isInstance = isInstance && "service_connections" in value;
27
25
  isInstance = isInstance && "connections_granting_delegation_access_to_your_account" in value;
28
26
  isInstance = isInstance && "connections_with_delegation_access_to_other_users" in value;
29
27
  return isInstance;
@@ -39,8 +37,6 @@ function VaultUserConnectionsReportFromJSONTyped(json, ignoreDiscriminator) {
39
37
  }
40
38
  return {
41
39
  'all_connections': json['all_connections'],
42
- 'member_connections': json['member_connections'],
43
- 'service_connections': json['service_connections'],
44
40
  'connections_granting_delegation_access_to_your_account': (0, VaultUserConnectionsReportConnectionsGrantingDelegationAccessToYourAccount_1.VaultUserConnectionsReportConnectionsGrantingDelegationAccessToYourAccountFromJSON)(json['connections_granting_delegation_access_to_your_account']),
45
41
  'connections_with_delegation_access_to_other_users': (0, VaultUserConnectionsReportConnectionsWithDelegationAccessToOtherUsers_1.VaultUserConnectionsReportConnectionsWithDelegationAccessToOtherUsersFromJSON)(json['connections_with_delegation_access_to_other_users']),
46
42
  };
@@ -55,8 +51,6 @@ function VaultUserConnectionsReportToJSON(value) {
55
51
  }
56
52
  return {
57
53
  'all_connections': value.all_connections,
58
- 'member_connections': value.member_connections,
59
- 'service_connections': value.service_connections,
60
54
  'connections_granting_delegation_access_to_your_account': (0, VaultUserConnectionsReportConnectionsGrantingDelegationAccessToYourAccount_1.VaultUserConnectionsReportConnectionsGrantingDelegationAccessToYourAccountToJSON)(value.connections_granting_delegation_access_to_your_account),
61
55
  'connections_with_delegation_access_to_other_users': (0, VaultUserConnectionsReportConnectionsWithDelegationAccessToOtherUsers_1.VaultUserConnectionsReportConnectionsWithDelegationAccessToOtherUsersToJSON)(value.connections_with_delegation_access_to_other_users),
62
56
  };
@@ -212,13 +212,13 @@ __exportStar(require("./PutTasksRequest"), exports);
212
212
  __exportStar(require("./ReconfigureShareParamsInner"), exports);
213
213
  __exportStar(require("./ReconfigureSharesResponse"), exports);
214
214
  __exportStar(require("./SchemasIdVersionSchemaJsonGet200Response"), exports);
215
+ __exportStar(require("./ShareIntentListResponse"), exports);
215
216
  __exportStar(require("./ShareIntentParam"), exports);
216
217
  __exportStar(require("./ShareIntentRequest"), exports);
217
218
  __exportStar(require("./ShareIntentResponse"), exports);
218
219
  __exportStar(require("./ShareIntentsResponse"), exports);
219
220
  __exportStar(require("./SharesIncomingResponse"), exports);
220
221
  __exportStar(require("./SharesOutgoingResponse"), exports);
221
- __exportStar(require("./ShreIntentListResponse"), exports);
222
222
  __exportStar(require("./UpdateDelegationsRequest"), exports);
223
223
  __exportStar(require("./UtilitiesApplicationVersion"), exports);
224
224
  __exportStar(require("./UtilitiesBlobInfo"), exports);
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@meeco/svx-api-sdk",
3
- "version": "1.0.0-develop.20251009115620.9b58090",
3
+ "version": "1.0.0-develop.20251014160718.b02efb1",
4
4
  "description": "Meeco SVX API SDK",
5
5
  "types": "./lib/types/index.d.ts",
6
6
  "browser": "./lib/esm/index.js",