@meeco/svx-api-sdk 1.0.0-stage.20240430145443.1d5661a → 1.0.0-stage.20240624095554.3e253ce

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (62) hide show
  1. package/.openapi-generator/FILES +2 -0
  2. package/lib/esm/apis/ConnectionsApi.js +69 -69
  3. package/lib/esm/apis/HelpersApi.js +14 -8
  4. package/lib/esm/apis/ItemsApi.js +24 -24
  5. package/lib/esm/apis/OrganisationsApi.js +176 -176
  6. package/lib/esm/apis/SecurityRightsApi.js +80 -80
  7. package/lib/esm/apis/SharesApi.js +24 -24
  8. package/lib/esm/apis/TenantsApi.js +174 -174
  9. package/lib/esm/apis/VerifiableCredentialsApi.js +12 -6
  10. package/lib/esm/apis/VerifiablePresentationsApi.js +1 -0
  11. package/lib/esm/models/ATOMBlobInfo.js +8 -0
  12. package/lib/esm/models/ATOMBlobPublicInfo.js +6 -0
  13. package/lib/esm/models/ATOMFileStorageBackend.js +45 -0
  14. package/lib/esm/models/ATOMFileStorageConfiguration.js +46 -0
  15. package/lib/esm/models/VCCredentialTypeModelDtoSchema.js +6 -0
  16. package/lib/esm/models/VCCredentialTypeSchemaDto.js +6 -0
  17. package/lib/esm/models/VCInputDescriptorsDto.js +3 -0
  18. package/lib/esm/models/VCPresentationDefinitionDto.js +0 -3
  19. package/lib/esm/models/VCPresentationDefinitionToSchemaModel.js +3 -0
  20. package/lib/esm/models/VCVerifyPresentationRequestResponseDto.js +3 -2
  21. package/lib/esm/models/index.js +2 -0
  22. package/lib/types/apis/ConnectionsApi.d.ts +36 -36
  23. package/lib/types/apis/HelpersApi.d.ts +8 -7
  24. package/lib/types/apis/ItemsApi.d.ts +18 -18
  25. package/lib/types/apis/OrganisationsApi.d.ts +82 -82
  26. package/lib/types/apis/SecurityRightsApi.d.ts +28 -28
  27. package/lib/types/apis/SharesApi.d.ts +16 -16
  28. package/lib/types/apis/TenantsApi.d.ts +82 -82
  29. package/lib/types/apis/VerifiableCredentialsApi.d.ts +6 -4
  30. package/lib/types/apis/VerifiablePresentationsApi.d.ts +1 -0
  31. package/lib/types/models/ATOMBlobInfo.d.ts +18 -0
  32. package/lib/types/models/ATOMBlobPublicInfo.d.ts +12 -0
  33. package/lib/types/models/ATOMFileStorageBackend.d.ts +37 -0
  34. package/lib/types/models/ATOMFileStorageConfiguration.d.ts +38 -0
  35. package/lib/types/models/VCCredentialTypeModelDtoSchema.d.ts +12 -0
  36. package/lib/types/models/VCCredentialTypeSchemaDto.d.ts +12 -0
  37. package/lib/types/models/VCInputDescriptorsDto.d.ts +7 -0
  38. package/lib/types/models/VCPresentationDefinitionDto.d.ts +0 -7
  39. package/lib/types/models/VCPresentationDefinitionToSchemaModel.d.ts +6 -0
  40. package/lib/types/models/VCVerifyPresentationRequestResponseDto.d.ts +7 -1
  41. package/lib/types/models/index.d.ts +2 -0
  42. package/lib/umd/apis/ConnectionsApi.js +69 -69
  43. package/lib/umd/apis/HelpersApi.js +14 -8
  44. package/lib/umd/apis/ItemsApi.js +24 -24
  45. package/lib/umd/apis/OrganisationsApi.js +176 -176
  46. package/lib/umd/apis/SecurityRightsApi.js +80 -80
  47. package/lib/umd/apis/SharesApi.js +24 -24
  48. package/lib/umd/apis/TenantsApi.js +174 -174
  49. package/lib/umd/apis/VerifiableCredentialsApi.js +12 -6
  50. package/lib/umd/apis/VerifiablePresentationsApi.js +1 -0
  51. package/lib/umd/models/ATOMBlobInfo.js +8 -0
  52. package/lib/umd/models/ATOMBlobPublicInfo.js +6 -0
  53. package/lib/umd/models/ATOMFileStorageBackend.js +52 -0
  54. package/lib/umd/models/ATOMFileStorageConfiguration.js +53 -0
  55. package/lib/umd/models/VCCredentialTypeModelDtoSchema.js +6 -0
  56. package/lib/umd/models/VCCredentialTypeSchemaDto.js +6 -0
  57. package/lib/umd/models/VCInputDescriptorsDto.js +3 -0
  58. package/lib/umd/models/VCPresentationDefinitionDto.js +0 -3
  59. package/lib/umd/models/VCPresentationDefinitionToSchemaModel.js +3 -0
  60. package/lib/umd/models/VCVerifyPresentationRequestResponseDto.js +3 -2
  61. package/lib/umd/models/index.js +2 -0
  62. package/package.json +1 -1
@@ -255,15 +255,33 @@ class OrganisationsApi extends runtime.BaseAPI {
255
255
  });
256
256
  }
257
257
  /**
258
- * Archive an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
259
- * Archive an organisation
258
+ * List admins of an organisation. It is also possible to request a list of archived admins of the organisation, that is, users who used to have organisation security rights for the given organisation, but do not have them now. In order to execute this action the current user must have * security right `atom:org:list_org_admins` for the organisation with the ID in parameter `org_id` or * security right `atom:tenant:list_admins_of_all_orgs_of_tenant` for the parent tenant of the organisation `org_id` or * global security right `atom:global:list_admins_of_all_orgs
259
+ * List admins of an organisation
260
260
  */
261
- orgsIdArchivePostRaw(requestParameters, initOverrides) {
261
+ orgsOrgIdAdminsGetRaw(requestParameters, initOverrides) {
262
262
  return __awaiter(this, void 0, void 0, function* () {
263
- if (requestParameters.id === null || requestParameters.id === undefined) {
264
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling orgsIdArchivePost.');
263
+ if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
264
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsGet.');
265
265
  }
266
266
  const queryParameters = {};
267
+ if (requestParameters.status !== undefined) {
268
+ queryParameters['status'] = requestParameters.status;
269
+ }
270
+ if (requestParameters.email !== undefined) {
271
+ queryParameters['email'] = requestParameters.email;
272
+ }
273
+ if (requestParameters.perPage !== undefined) {
274
+ queryParameters['per_page'] = requestParameters.perPage;
275
+ }
276
+ if (requestParameters.page !== undefined) {
277
+ queryParameters['page'] = requestParameters.page;
278
+ }
279
+ if (requestParameters.order !== undefined) {
280
+ queryParameters['order'] = requestParameters.order;
281
+ }
282
+ if (requestParameters.nextPageAfter !== undefined) {
283
+ queryParameters['next_page_after'] = requestParameters.nextPageAfter;
284
+ }
267
285
  const headerParameters = {};
268
286
  if (this.configuration && this.configuration.accessToken) {
269
287
  const token = this.configuration.accessToken;
@@ -273,32 +291,35 @@ class OrganisationsApi extends runtime.BaseAPI {
273
291
  }
274
292
  }
275
293
  const response = yield this.request({
276
- path: `/orgs/{id}/archive`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
277
- method: 'POST',
294
+ path: `/orgs/{org_id}/admins`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))),
295
+ method: 'GET',
278
296
  headers: headerParameters,
279
297
  query: queryParameters,
280
298
  }, initOverrides);
281
- return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMOneOrgFromJSON)(jsonValue));
299
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMPaginatedAdminListFromJSON)(jsonValue));
282
300
  });
283
301
  }
284
302
  /**
285
- * Archive an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
286
- * Archive an organisation
303
+ * List admins of an organisation. It is also possible to request a list of archived admins of the organisation, that is, users who used to have organisation security rights for the given organisation, but do not have them now. In order to execute this action the current user must have * security right `atom:org:list_org_admins` for the organisation with the ID in parameter `org_id` or * security right `atom:tenant:list_admins_of_all_orgs_of_tenant` for the parent tenant of the organisation `org_id` or * global security right `atom:global:list_admins_of_all_orgs
304
+ * List admins of an organisation
287
305
  */
288
- orgsIdArchivePost(id, initOverrides) {
306
+ orgsOrgIdAdminsGet(orgId, status, email, perPage, page, order, nextPageAfter, initOverrides) {
289
307
  return __awaiter(this, void 0, void 0, function* () {
290
- const response = yield this.orgsIdArchivePostRaw({ id: id }, initOverrides);
308
+ const response = yield this.orgsOrgIdAdminsGetRaw({ orgId: orgId, status: status, email: email, perPage: perPage, page: page, order: order, nextPageAfter: nextPageAfter }, initOverrides);
291
309
  return yield response.value();
292
310
  });
293
311
  }
294
312
  /**
295
- * Delete an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
296
- * Delete an organisation
313
+ * Remove a user from admins of the given organisation, and put the admin into the registry of former admins of that organisation. In order to execute this action the current user must one of the following security rights: * `atom:global:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:org:assign_org_sr_to_user`
314
+ * Archive an organisation admin
297
315
  */
298
- orgsIdDeleteRaw(requestParameters, initOverrides) {
316
+ orgsOrgIdAdminsOrgAdminIdArchivePostRaw(requestParameters, initOverrides) {
299
317
  return __awaiter(this, void 0, void 0, function* () {
300
- if (requestParameters.id === null || requestParameters.id === undefined) {
301
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling orgsIdDelete.');
318
+ if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
319
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdArchivePost.');
320
+ }
321
+ if (requestParameters.orgAdminId === null || requestParameters.orgAdminId === undefined) {
322
+ throw new runtime.RequiredError('orgAdminId', 'Required parameter requestParameters.orgAdminId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdArchivePost.');
302
323
  }
303
324
  const queryParameters = {};
304
325
  const headerParameters = {};
@@ -310,8 +331,8 @@ class OrganisationsApi extends runtime.BaseAPI {
310
331
  }
311
332
  }
312
333
  const response = yield this.request({
313
- path: `/orgs/{id}`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
314
- method: 'DELETE',
334
+ path: `/orgs/{org_id}/admins/{org_admin_id}/archive`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"org_admin_id"}}`, encodeURIComponent(String(requestParameters.orgAdminId))),
335
+ method: 'POST',
315
336
  headers: headerParameters,
316
337
  query: queryParameters,
317
338
  }, initOverrides);
@@ -319,22 +340,25 @@ class OrganisationsApi extends runtime.BaseAPI {
319
340
  });
320
341
  }
321
342
  /**
322
- * Delete an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
323
- * Delete an organisation
343
+ * Remove a user from admins of the given organisation, and put the admin into the registry of former admins of that organisation. In order to execute this action the current user must one of the following security rights: * `atom:global:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:org:assign_org_sr_to_user`
344
+ * Archive an organisation admin
324
345
  */
325
- orgsIdDelete(id, initOverrides) {
346
+ orgsOrgIdAdminsOrgAdminIdArchivePost(orgId, orgAdminId, initOverrides) {
326
347
  return __awaiter(this, void 0, void 0, function* () {
327
- yield this.orgsIdDeleteRaw({ id: id }, initOverrides);
348
+ yield this.orgsOrgIdAdminsOrgAdminIdArchivePostRaw({ orgId: orgId, orgAdminId: orgAdminId }, initOverrides);
328
349
  });
329
350
  }
330
351
  /**
331
- * Show an organisation. In order to execute this action the current user must have * global security `atom:global:view_all_orgs` or * security right `atom:tenant:view_tenant_orgs` for the tenant * security right `atom:org:view_org` for the org with the ID in parameter `org_id`
332
- * View an organisation
352
+ * Remove a user from organisation admins. In order to execute this action the current user must one of the following security rights: * `atom:global:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:org:assign_org_sr_to_user`
353
+ * Remove a user from organisation admins
333
354
  */
334
- orgsIdGetRaw(requestParameters, initOverrides) {
355
+ orgsOrgIdAdminsOrgAdminIdDeleteRaw(requestParameters, initOverrides) {
335
356
  return __awaiter(this, void 0, void 0, function* () {
336
- if (requestParameters.id === null || requestParameters.id === undefined) {
337
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling orgsIdGet.');
357
+ if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
358
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdDelete.');
359
+ }
360
+ if (requestParameters.orgAdminId === null || requestParameters.orgAdminId === undefined) {
361
+ throw new runtime.RequiredError('orgAdminId', 'Required parameter requestParameters.orgAdminId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdDelete.');
338
362
  }
339
363
  const queryParameters = {};
340
364
  const headerParameters = {};
@@ -346,39 +370,37 @@ class OrganisationsApi extends runtime.BaseAPI {
346
370
  }
347
371
  }
348
372
  const response = yield this.request({
349
- path: `/orgs/{id}`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
350
- method: 'GET',
373
+ path: `/orgs/{org_id}/admins/{org_admin_id}`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"org_admin_id"}}`, encodeURIComponent(String(requestParameters.orgAdminId))),
374
+ method: 'DELETE',
351
375
  headers: headerParameters,
352
376
  query: queryParameters,
353
377
  }, initOverrides);
354
- return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMOneOrgFromJSON)(jsonValue));
378
+ return new runtime.VoidApiResponse(response);
355
379
  });
356
380
  }
357
381
  /**
358
- * Show an organisation. In order to execute this action the current user must have * global security `atom:global:view_all_orgs` or * security right `atom:tenant:view_tenant_orgs` for the tenant * security right `atom:org:view_org` for the org with the ID in parameter `org_id`
359
- * View an organisation
382
+ * Remove a user from organisation admins. In order to execute this action the current user must one of the following security rights: * `atom:global:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:org:assign_org_sr_to_user`
383
+ * Remove a user from organisation admins
360
384
  */
361
- orgsIdGet(id, initOverrides) {
385
+ orgsOrgIdAdminsOrgAdminIdDelete(orgId, orgAdminId, initOverrides) {
362
386
  return __awaiter(this, void 0, void 0, function* () {
363
- const response = yield this.orgsIdGetRaw({ id: id }, initOverrides);
364
- return yield response.value();
387
+ yield this.orgsOrgIdAdminsOrgAdminIdDeleteRaw({ orgId: orgId, orgAdminId: orgAdminId }, initOverrides);
365
388
  });
366
389
  }
367
390
  /**
368
- * Update an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant with the ID in parameter `tenant_id`.
369
- * Update an organisation
391
+ * Show an admin of a given organisation. In order to execute this action the current user must have * security right `atom:org:list_org_admins` for the organisation with the ID in parameter `org_id` or * security right `atom:tenant:list_admins_of_all_orgs_of_tenant` for the parent tenant of the organisation `org_id` or * global security right `atom:global:list_admins_of_all_orgs
392
+ * Show an admin of a given organisation
370
393
  */
371
- orgsIdPutRaw(requestParameters, initOverrides) {
394
+ orgsOrgIdAdminsOrgAdminIdGetRaw(requestParameters, initOverrides) {
372
395
  return __awaiter(this, void 0, void 0, function* () {
373
- if (requestParameters.id === null || requestParameters.id === undefined) {
374
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling orgsIdPut.');
396
+ if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
397
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdGet.');
375
398
  }
376
- if (requestParameters.aTOMCreateOrUpdateOrgRequest === null || requestParameters.aTOMCreateOrUpdateOrgRequest === undefined) {
377
- throw new runtime.RequiredError('aTOMCreateOrUpdateOrgRequest', 'Required parameter requestParameters.aTOMCreateOrUpdateOrgRequest was null or undefined when calling orgsIdPut.');
399
+ if (requestParameters.orgAdminId === null || requestParameters.orgAdminId === undefined) {
400
+ throw new runtime.RequiredError('orgAdminId', 'Required parameter requestParameters.orgAdminId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdGet.');
378
401
  }
379
402
  const queryParameters = {};
380
403
  const headerParameters = {};
381
- headerParameters['Content-Type'] = 'application/json';
382
404
  if (this.configuration && this.configuration.accessToken) {
383
405
  const token = this.configuration.accessToken;
384
406
  const tokenString = yield token("SVX-JWT", []);
@@ -387,33 +409,35 @@ class OrganisationsApi extends runtime.BaseAPI {
387
409
  }
388
410
  }
389
411
  const response = yield this.request({
390
- path: `/orgs/{id}`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
391
- method: 'PUT',
412
+ path: `/orgs/{org_id}/admins/{org_admin_id}`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"org_admin_id"}}`, encodeURIComponent(String(requestParameters.orgAdminId))),
413
+ method: 'GET',
392
414
  headers: headerParameters,
393
415
  query: queryParameters,
394
- body: (0, models_1.ATOMCreateOrUpdateOrgRequestToJSON)(requestParameters.aTOMCreateOrUpdateOrgRequest),
395
416
  }, initOverrides);
396
- return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMOneOrgFromJSON)(jsonValue));
417
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMAdminFromJSON)(jsonValue));
397
418
  });
398
419
  }
399
420
  /**
400
- * Update an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant with the ID in parameter `tenant_id`.
401
- * Update an organisation
421
+ * Show an admin of a given organisation. In order to execute this action the current user must have * security right `atom:org:list_org_admins` for the organisation with the ID in parameter `org_id` or * security right `atom:tenant:list_admins_of_all_orgs_of_tenant` for the parent tenant of the organisation `org_id` or * global security right `atom:global:list_admins_of_all_orgs
422
+ * Show an admin of a given organisation
402
423
  */
403
- orgsIdPut(id, aTOMCreateOrUpdateOrgRequest, initOverrides) {
424
+ orgsOrgIdAdminsOrgAdminIdGet(orgId, orgAdminId, initOverrides) {
404
425
  return __awaiter(this, void 0, void 0, function* () {
405
- const response = yield this.orgsIdPutRaw({ id: id, aTOMCreateOrUpdateOrgRequest: aTOMCreateOrUpdateOrgRequest }, initOverrides);
426
+ const response = yield this.orgsOrgIdAdminsOrgAdminIdGetRaw({ orgId: orgId, orgAdminId: orgAdminId }, initOverrides);
406
427
  return yield response.value();
407
428
  });
408
429
  }
409
430
  /**
410
- * Restore an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
411
- * Restore an organisation
431
+ * Reinstate an archived user and make him/her a org admin again. In order to execute this action the current user must one of the following security rights: * `atom:org:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:global:assign_org_sr_to_user`
432
+ * Restore an archived organisation admin
412
433
  */
413
- orgsIdRestorePostRaw(requestParameters, initOverrides) {
434
+ orgsOrgIdAdminsOrgAdminIdRestorePostRaw(requestParameters, initOverrides) {
414
435
  return __awaiter(this, void 0, void 0, function* () {
415
- if (requestParameters.id === null || requestParameters.id === undefined) {
416
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling orgsIdRestorePost.');
436
+ if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
437
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdRestorePost.');
438
+ }
439
+ if (requestParameters.orgAdminId === null || requestParameters.orgAdminId === undefined) {
440
+ throw new runtime.RequiredError('orgAdminId', 'Required parameter requestParameters.orgAdminId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdRestorePost.');
417
441
  }
418
442
  const queryParameters = {};
419
443
  const headerParameters = {};
@@ -425,52 +449,37 @@ class OrganisationsApi extends runtime.BaseAPI {
425
449
  }
426
450
  }
427
451
  const response = yield this.request({
428
- path: `/orgs/{id}/restore`.replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
452
+ path: `/orgs/{org_id}/admins/{org_admin_id}/restore`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"org_admin_id"}}`, encodeURIComponent(String(requestParameters.orgAdminId))),
429
453
  method: 'POST',
430
454
  headers: headerParameters,
431
455
  query: queryParameters,
432
456
  }, initOverrides);
433
- return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMOneOrgFromJSON)(jsonValue));
457
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMAdminFromJSON)(jsonValue));
434
458
  });
435
459
  }
436
460
  /**
437
- * Restore an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
438
- * Restore an organisation
461
+ * Reinstate an archived user and make him/her a org admin again. In order to execute this action the current user must one of the following security rights: * `atom:org:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:global:assign_org_sr_to_user`
462
+ * Restore an archived organisation admin
439
463
  */
440
- orgsIdRestorePost(id, initOverrides) {
464
+ orgsOrgIdAdminsOrgAdminIdRestorePost(orgId, orgAdminId, initOverrides) {
441
465
  return __awaiter(this, void 0, void 0, function* () {
442
- const response = yield this.orgsIdRestorePostRaw({ id: id }, initOverrides);
466
+ const response = yield this.orgsOrgIdAdminsOrgAdminIdRestorePostRaw({ orgId: orgId, orgAdminId: orgAdminId }, initOverrides);
443
467
  return yield response.value();
444
468
  });
445
469
  }
446
470
  /**
447
- * List admins of an organisation. It is also possible to request a list of archived admins of the organisation, that is, users who used to have organisation security rights for the given organisation, but do not have them now. In order to execute this action the current user must have * security right `atom:org:list_org_admins` for the organisation with the ID in parameter `org_id` or * security right `atom:tenant:list_admins_of_all_orgs_of_tenant` for the parent tenant of the organisation `org_id` or * global security right `atom:global:list_admins_of_all_orgs
448
- * List admins of an organisation
471
+ * List organisation security rights of a organisation admin. In order to execute this action the current user must have security right `atom:org:list_org_admin_sr` for the organisation with the ID in parameter `org_id` or `atom:tenant:list_org_admin_sr` for the tenant that the organisation belongs to, or global security right `atom:global:list_admin_sr_of_any_admin`\"
472
+ * List security rights of an organisation admin
449
473
  */
450
- orgsOrgIdAdminsGetRaw(requestParameters, initOverrides) {
474
+ orgsOrgIdAdminsOrgAdminIdSecurityRightsGetRaw(requestParameters, initOverrides) {
451
475
  return __awaiter(this, void 0, void 0, function* () {
452
476
  if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
453
- throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsGet.');
454
- }
455
- const queryParameters = {};
456
- if (requestParameters.status !== undefined) {
457
- queryParameters['status'] = requestParameters.status;
458
- }
459
- if (requestParameters.email !== undefined) {
460
- queryParameters['email'] = requestParameters.email;
461
- }
462
- if (requestParameters.perPage !== undefined) {
463
- queryParameters['per_page'] = requestParameters.perPage;
464
- }
465
- if (requestParameters.page !== undefined) {
466
- queryParameters['page'] = requestParameters.page;
467
- }
468
- if (requestParameters.order !== undefined) {
469
- queryParameters['order'] = requestParameters.order;
477
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdSecurityRightsGet.');
470
478
  }
471
- if (requestParameters.nextPageAfter !== undefined) {
472
- queryParameters['next_page_after'] = requestParameters.nextPageAfter;
479
+ if (requestParameters.orgAdminId === null || requestParameters.orgAdminId === undefined) {
480
+ throw new runtime.RequiredError('orgAdminId', 'Required parameter requestParameters.orgAdminId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdSecurityRightsGet.');
473
481
  }
482
+ const queryParameters = {};
474
483
  const headerParameters = {};
475
484
  if (this.configuration && this.configuration.accessToken) {
476
485
  const token = this.configuration.accessToken;
@@ -480,38 +489,42 @@ class OrganisationsApi extends runtime.BaseAPI {
480
489
  }
481
490
  }
482
491
  const response = yield this.request({
483
- path: `/orgs/{org_id}/admins`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))),
492
+ path: `/orgs/{org_id}/admins/{org_admin_id}/security_rights`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"org_admin_id"}}`, encodeURIComponent(String(requestParameters.orgAdminId))),
484
493
  method: 'GET',
485
494
  headers: headerParameters,
486
495
  query: queryParameters,
487
496
  }, initOverrides);
488
- return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMPaginatedAdminListFromJSON)(jsonValue));
497
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMSecurityRightsFromJSON)(jsonValue));
489
498
  });
490
499
  }
491
500
  /**
492
- * List admins of an organisation. It is also possible to request a list of archived admins of the organisation, that is, users who used to have organisation security rights for the given organisation, but do not have them now. In order to execute this action the current user must have * security right `atom:org:list_org_admins` for the organisation with the ID in parameter `org_id` or * security right `atom:tenant:list_admins_of_all_orgs_of_tenant` for the parent tenant of the organisation `org_id` or * global security right `atom:global:list_admins_of_all_orgs
493
- * List admins of an organisation
501
+ * List organisation security rights of a organisation admin. In order to execute this action the current user must have security right `atom:org:list_org_admin_sr` for the organisation with the ID in parameter `org_id` or `atom:tenant:list_org_admin_sr` for the tenant that the organisation belongs to, or global security right `atom:global:list_admin_sr_of_any_admin`\"
502
+ * List security rights of an organisation admin
494
503
  */
495
- orgsOrgIdAdminsGet(orgId, status, email, perPage, page, order, nextPageAfter, initOverrides) {
504
+ orgsOrgIdAdminsOrgAdminIdSecurityRightsGet(orgId, orgAdminId, initOverrides) {
496
505
  return __awaiter(this, void 0, void 0, function* () {
497
- const response = yield this.orgsOrgIdAdminsGetRaw({ orgId: orgId, status: status, email: email, perPage: perPage, page: page, order: order, nextPageAfter: nextPageAfter }, initOverrides);
506
+ const response = yield this.orgsOrgIdAdminsOrgAdminIdSecurityRightsGetRaw({ orgId: orgId, orgAdminId: orgAdminId }, initOverrides);
498
507
  return yield response.value();
499
508
  });
500
509
  }
501
510
  /**
502
- * Remove a user from admins of the given organisation, and put the admin into the registry of former admins of that organisation. In order to execute this action the current user must one of the following security rights: * `atom:global:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:org:assign_org_sr_to_user`
503
- * Archive an organisation admin
511
+ * Assign organisation security rights to an organisation admin. The endpoint can process security rights of 2 categories: * `for_org = true` and `for_tenant = false` * `for_org = true` and `for_tenant = true`, in this case the security right will be assigned to the tenant which organisation belongs to In order to execute this action the current user must have one of the following security rights: * security right `atom:org:assign_org_sr_to_user` for the organisation with the ID in parameter `org_id` * security right `atom:tenant:assign_org_sr_to_user` for the tenant that the organisation belongs to * global security right `atom:global:assign_org_sr_to_user`\"
512
+ * Assign organisation security rights to an organisation admin
504
513
  */
505
- orgsOrgIdAdminsIdArchivePostRaw(requestParameters, initOverrides) {
514
+ orgsOrgIdAdminsOrgAdminIdSecurityRightsPostRaw(requestParameters, initOverrides) {
506
515
  return __awaiter(this, void 0, void 0, function* () {
507
516
  if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
508
- throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsIdArchivePost.');
517
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdSecurityRightsPost.');
509
518
  }
510
- if (requestParameters.id === null || requestParameters.id === undefined) {
511
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling orgsOrgIdAdminsIdArchivePost.');
519
+ if (requestParameters.orgAdminId === null || requestParameters.orgAdminId === undefined) {
520
+ throw new runtime.RequiredError('orgAdminId', 'Required parameter requestParameters.orgAdminId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdSecurityRightsPost.');
521
+ }
522
+ if (requestParameters.aTOMAssignSecurityRightsRequest === null || requestParameters.aTOMAssignSecurityRightsRequest === undefined) {
523
+ throw new runtime.RequiredError('aTOMAssignSecurityRightsRequest', 'Required parameter requestParameters.aTOMAssignSecurityRightsRequest was null or undefined when calling orgsOrgIdAdminsOrgAdminIdSecurityRightsPost.');
512
524
  }
513
525
  const queryParameters = {};
514
526
  const headerParameters = {};
527
+ headerParameters['Content-Type'] = 'application/json';
515
528
  if (this.configuration && this.configuration.accessToken) {
516
529
  const token = this.configuration.accessToken;
517
530
  const tokenString = yield token("SVX-JWT", []);
@@ -520,34 +533,32 @@ class OrganisationsApi extends runtime.BaseAPI {
520
533
  }
521
534
  }
522
535
  const response = yield this.request({
523
- path: `/orgs/{org_id}/admins/{id}/archive`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
536
+ path: `/orgs/{org_id}/admins/{org_admin_id}/security_rights`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"org_admin_id"}}`, encodeURIComponent(String(requestParameters.orgAdminId))),
524
537
  method: 'POST',
525
538
  headers: headerParameters,
526
539
  query: queryParameters,
540
+ body: (0, models_1.ATOMAssignSecurityRightsRequestToJSON)(requestParameters.aTOMAssignSecurityRightsRequest),
527
541
  }, initOverrides);
528
542
  return new runtime.VoidApiResponse(response);
529
543
  });
530
544
  }
531
545
  /**
532
- * Remove a user from admins of the given organisation, and put the admin into the registry of former admins of that organisation. In order to execute this action the current user must one of the following security rights: * `atom:global:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:org:assign_org_sr_to_user`
533
- * Archive an organisation admin
546
+ * Assign organisation security rights to an organisation admin. The endpoint can process security rights of 2 categories: * `for_org = true` and `for_tenant = false` * `for_org = true` and `for_tenant = true`, in this case the security right will be assigned to the tenant which organisation belongs to In order to execute this action the current user must have one of the following security rights: * security right `atom:org:assign_org_sr_to_user` for the organisation with the ID in parameter `org_id` * security right `atom:tenant:assign_org_sr_to_user` for the tenant that the organisation belongs to * global security right `atom:global:assign_org_sr_to_user`\"
547
+ * Assign organisation security rights to an organisation admin
534
548
  */
535
- orgsOrgIdAdminsIdArchivePost(orgId, id, initOverrides) {
549
+ orgsOrgIdAdminsOrgAdminIdSecurityRightsPost(orgId, orgAdminId, aTOMAssignSecurityRightsRequest, initOverrides) {
536
550
  return __awaiter(this, void 0, void 0, function* () {
537
- yield this.orgsOrgIdAdminsIdArchivePostRaw({ orgId: orgId, id: id }, initOverrides);
551
+ yield this.orgsOrgIdAdminsOrgAdminIdSecurityRightsPostRaw({ orgId: orgId, orgAdminId: orgAdminId, aTOMAssignSecurityRightsRequest: aTOMAssignSecurityRightsRequest }, initOverrides);
538
552
  });
539
553
  }
540
554
  /**
541
- * Remove a user from organisation admins. In order to execute this action the current user must one of the following security rights: * `atom:global:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:org:assign_org_sr_to_user`
542
- * Remove a user from organisation admins
555
+ * Archive an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
556
+ * Archive an organisation
543
557
  */
544
- orgsOrgIdAdminsIdDeleteRaw(requestParameters, initOverrides) {
558
+ orgsOrgIdArchivePostRaw(requestParameters, initOverrides) {
545
559
  return __awaiter(this, void 0, void 0, function* () {
546
560
  if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
547
- throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsIdDelete.');
548
- }
549
- if (requestParameters.id === null || requestParameters.id === undefined) {
550
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling orgsOrgIdAdminsIdDelete.');
561
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdArchivePost.');
551
562
  }
552
563
  const queryParameters = {};
553
564
  const headerParameters = {};
@@ -559,34 +570,32 @@ class OrganisationsApi extends runtime.BaseAPI {
559
570
  }
560
571
  }
561
572
  const response = yield this.request({
562
- path: `/orgs/{org_id}/admins/{id}`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
563
- method: 'DELETE',
573
+ path: `/orgs/{org_id}/archive`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))),
574
+ method: 'POST',
564
575
  headers: headerParameters,
565
576
  query: queryParameters,
566
577
  }, initOverrides);
567
- return new runtime.VoidApiResponse(response);
578
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMOneOrgFromJSON)(jsonValue));
568
579
  });
569
580
  }
570
581
  /**
571
- * Remove a user from organisation admins. In order to execute this action the current user must one of the following security rights: * `atom:global:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:org:assign_org_sr_to_user`
572
- * Remove a user from organisation admins
582
+ * Archive an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
583
+ * Archive an organisation
573
584
  */
574
- orgsOrgIdAdminsIdDelete(orgId, id, initOverrides) {
585
+ orgsOrgIdArchivePost(orgId, initOverrides) {
575
586
  return __awaiter(this, void 0, void 0, function* () {
576
- yield this.orgsOrgIdAdminsIdDeleteRaw({ orgId: orgId, id: id }, initOverrides);
587
+ const response = yield this.orgsOrgIdArchivePostRaw({ orgId: orgId }, initOverrides);
588
+ return yield response.value();
577
589
  });
578
590
  }
579
591
  /**
580
- * Show an admin of a given organisation. In order to execute this action the current user must have * security right `atom:org:list_org_admins` for the organisation with the ID in parameter `org_id` or * security right `atom:tenant:list_admins_of_all_orgs_of_tenant` for the parent tenant of the organisation `org_id` or * global security right `atom:global:list_admins_of_all_orgs
581
- * Show an admin of a given organisation
592
+ * Delete an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
593
+ * Delete an organisation
582
594
  */
583
- orgsOrgIdAdminsIdGetRaw(requestParameters, initOverrides) {
595
+ orgsOrgIdDeleteRaw(requestParameters, initOverrides) {
584
596
  return __awaiter(this, void 0, void 0, function* () {
585
597
  if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
586
- throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsIdGet.');
587
- }
588
- if (requestParameters.id === null || requestParameters.id === undefined) {
589
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling orgsOrgIdAdminsIdGet.');
598
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdDelete.');
590
599
  }
591
600
  const queryParameters = {};
592
601
  const headerParameters = {};
@@ -598,35 +607,31 @@ class OrganisationsApi extends runtime.BaseAPI {
598
607
  }
599
608
  }
600
609
  const response = yield this.request({
601
- path: `/orgs/{org_id}/admins/{id}`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
602
- method: 'GET',
610
+ path: `/orgs/{org_id}`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))),
611
+ method: 'DELETE',
603
612
  headers: headerParameters,
604
613
  query: queryParameters,
605
614
  }, initOverrides);
606
- return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMAdminFromJSON)(jsonValue));
615
+ return new runtime.VoidApiResponse(response);
607
616
  });
608
617
  }
609
618
  /**
610
- * Show an admin of a given organisation. In order to execute this action the current user must have * security right `atom:org:list_org_admins` for the organisation with the ID in parameter `org_id` or * security right `atom:tenant:list_admins_of_all_orgs_of_tenant` for the parent tenant of the organisation `org_id` or * global security right `atom:global:list_admins_of_all_orgs
611
- * Show an admin of a given organisation
619
+ * Delete an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
620
+ * Delete an organisation
612
621
  */
613
- orgsOrgIdAdminsIdGet(orgId, id, initOverrides) {
622
+ orgsOrgIdDelete(orgId, initOverrides) {
614
623
  return __awaiter(this, void 0, void 0, function* () {
615
- const response = yield this.orgsOrgIdAdminsIdGetRaw({ orgId: orgId, id: id }, initOverrides);
616
- return yield response.value();
624
+ yield this.orgsOrgIdDeleteRaw({ orgId: orgId }, initOverrides);
617
625
  });
618
626
  }
619
627
  /**
620
- * Reinstate an archived user and make him/her a org admin again. In order to execute this action the current user must one of the following security rights: * `atom:org:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:global:assign_org_sr_to_user`
621
- * Restore an archived organisation admin
628
+ * Show an organisation. In order to execute this action the current user must have * global security `atom:global:view_all_orgs` or * security right `atom:tenant:view_tenant_orgs` for the tenant * security right `atom:org:view_org` for the org with the ID in parameter `org_id`
629
+ * View an organisation
622
630
  */
623
- orgsOrgIdAdminsIdRestorePostRaw(requestParameters, initOverrides) {
631
+ orgsOrgIdGetRaw(requestParameters, initOverrides) {
624
632
  return __awaiter(this, void 0, void 0, function* () {
625
633
  if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
626
- throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsIdRestorePost.');
627
- }
628
- if (requestParameters.id === null || requestParameters.id === undefined) {
629
- throw new runtime.RequiredError('id', 'Required parameter requestParameters.id was null or undefined when calling orgsOrgIdAdminsIdRestorePost.');
634
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdGet.');
630
635
  }
631
636
  const queryParameters = {};
632
637
  const headerParameters = {};
@@ -638,38 +643,39 @@ class OrganisationsApi extends runtime.BaseAPI {
638
643
  }
639
644
  }
640
645
  const response = yield this.request({
641
- path: `/orgs/{org_id}/admins/{id}/restore`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"id"}}`, encodeURIComponent(String(requestParameters.id))),
642
- method: 'POST',
646
+ path: `/orgs/{org_id}`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))),
647
+ method: 'GET',
643
648
  headers: headerParameters,
644
649
  query: queryParameters,
645
650
  }, initOverrides);
646
- return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMAdminFromJSON)(jsonValue));
651
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMOneOrgFromJSON)(jsonValue));
647
652
  });
648
653
  }
649
654
  /**
650
- * Reinstate an archived user and make him/her a org admin again. In order to execute this action the current user must one of the following security rights: * `atom:org:assign_org_sr_to_user` * `atom:tenant:assign_org_sr_to_user` * `atom:global:assign_org_sr_to_user`
651
- * Restore an archived organisation admin
655
+ * Show an organisation. In order to execute this action the current user must have * global security `atom:global:view_all_orgs` or * security right `atom:tenant:view_tenant_orgs` for the tenant * security right `atom:org:view_org` for the org with the ID in parameter `org_id`
656
+ * View an organisation
652
657
  */
653
- orgsOrgIdAdminsIdRestorePost(orgId, id, initOverrides) {
658
+ orgsOrgIdGet(orgId, initOverrides) {
654
659
  return __awaiter(this, void 0, void 0, function* () {
655
- const response = yield this.orgsOrgIdAdminsIdRestorePostRaw({ orgId: orgId, id: id }, initOverrides);
660
+ const response = yield this.orgsOrgIdGetRaw({ orgId: orgId }, initOverrides);
656
661
  return yield response.value();
657
662
  });
658
663
  }
659
664
  /**
660
- * List organisation security rights of a organisation admin. In order to execute this action the current user must have security right `atom:org:list_org_admin_sr` for the organisation with the ID in parameter `org_id` or `atom:tenant:list_org_admin_sr` for the tenant that the organisation belongs to, or global security right `atom:global:list_admin_sr_of_any_admin`\"
661
- * List security rights of an organisation admin
665
+ * Update an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant with the ID in parameter `tenant_id`.
666
+ * Update an organisation
662
667
  */
663
- orgsOrgIdAdminsOrgAdminIdSecurityRightsGetRaw(requestParameters, initOverrides) {
668
+ orgsOrgIdPutRaw(requestParameters, initOverrides) {
664
669
  return __awaiter(this, void 0, void 0, function* () {
665
670
  if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
666
- throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdSecurityRightsGet.');
671
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdPut.');
667
672
  }
668
- if (requestParameters.orgAdminId === null || requestParameters.orgAdminId === undefined) {
669
- throw new runtime.RequiredError('orgAdminId', 'Required parameter requestParameters.orgAdminId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdSecurityRightsGet.');
673
+ if (requestParameters.aTOMCreateOrUpdateOrgRequest === null || requestParameters.aTOMCreateOrUpdateOrgRequest === undefined) {
674
+ throw new runtime.RequiredError('aTOMCreateOrUpdateOrgRequest', 'Required parameter requestParameters.aTOMCreateOrUpdateOrgRequest was null or undefined when calling orgsOrgIdPut.');
670
675
  }
671
676
  const queryParameters = {};
672
677
  const headerParameters = {};
678
+ headerParameters['Content-Type'] = 'application/json';
673
679
  if (this.configuration && this.configuration.accessToken) {
674
680
  const token = this.configuration.accessToken;
675
681
  const tokenString = yield token("SVX-JWT", []);
@@ -678,42 +684,36 @@ class OrganisationsApi extends runtime.BaseAPI {
678
684
  }
679
685
  }
680
686
  const response = yield this.request({
681
- path: `/orgs/{org_id}/admins/{org_admin_id}/security_rights`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"org_admin_id"}}`, encodeURIComponent(String(requestParameters.orgAdminId))),
682
- method: 'GET',
687
+ path: `/orgs/{org_id}`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))),
688
+ method: 'PUT',
683
689
  headers: headerParameters,
684
690
  query: queryParameters,
691
+ body: (0, models_1.ATOMCreateOrUpdateOrgRequestToJSON)(requestParameters.aTOMCreateOrUpdateOrgRequest),
685
692
  }, initOverrides);
686
- return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMSecurityRightsFromJSON)(jsonValue));
693
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMOneOrgFromJSON)(jsonValue));
687
694
  });
688
695
  }
689
696
  /**
690
- * List organisation security rights of a organisation admin. In order to execute this action the current user must have security right `atom:org:list_org_admin_sr` for the organisation with the ID in parameter `org_id` or `atom:tenant:list_org_admin_sr` for the tenant that the organisation belongs to, or global security right `atom:global:list_admin_sr_of_any_admin`\"
691
- * List security rights of an organisation admin
697
+ * Update an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant with the ID in parameter `tenant_id`.
698
+ * Update an organisation
692
699
  */
693
- orgsOrgIdAdminsOrgAdminIdSecurityRightsGet(orgId, orgAdminId, initOverrides) {
700
+ orgsOrgIdPut(orgId, aTOMCreateOrUpdateOrgRequest, initOverrides) {
694
701
  return __awaiter(this, void 0, void 0, function* () {
695
- const response = yield this.orgsOrgIdAdminsOrgAdminIdSecurityRightsGetRaw({ orgId: orgId, orgAdminId: orgAdminId }, initOverrides);
702
+ const response = yield this.orgsOrgIdPutRaw({ orgId: orgId, aTOMCreateOrUpdateOrgRequest: aTOMCreateOrUpdateOrgRequest }, initOverrides);
696
703
  return yield response.value();
697
704
  });
698
705
  }
699
706
  /**
700
- * Assign organisation security rights to an organisation admin. The endpoint can process security rights of 2 categories: * `for_org = true` and `for_tenant = false` * `for_org = true` and `for_tenant = true`, in this case the security right will be assigned to the tenant which organisation belongs to In order to execute this action the current user must have one of the following security rights: * security right `atom:org:assign_org_sr_to_user` for the organisation with the ID in parameter `org_id` * security right `atom:tenant:assign_org_sr_to_user` for the tenant that the organisation belongs to * global security right `atom:global:assign_org_sr_to_user`\"
701
- * Assign organisation security rights to an organisation admin
707
+ * Restore an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
708
+ * Restore an organisation
702
709
  */
703
- orgsOrgIdAdminsOrgAdminIdSecurityRightsPostRaw(requestParameters, initOverrides) {
710
+ orgsOrgIdRestorePostRaw(requestParameters, initOverrides) {
704
711
  return __awaiter(this, void 0, void 0, function* () {
705
712
  if (requestParameters.orgId === null || requestParameters.orgId === undefined) {
706
- throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdSecurityRightsPost.');
707
- }
708
- if (requestParameters.orgAdminId === null || requestParameters.orgAdminId === undefined) {
709
- throw new runtime.RequiredError('orgAdminId', 'Required parameter requestParameters.orgAdminId was null or undefined when calling orgsOrgIdAdminsOrgAdminIdSecurityRightsPost.');
710
- }
711
- if (requestParameters.aTOMAssignSecurityRightsRequest === null || requestParameters.aTOMAssignSecurityRightsRequest === undefined) {
712
- throw new runtime.RequiredError('aTOMAssignSecurityRightsRequest', 'Required parameter requestParameters.aTOMAssignSecurityRightsRequest was null or undefined when calling orgsOrgIdAdminsOrgAdminIdSecurityRightsPost.');
713
+ throw new runtime.RequiredError('orgId', 'Required parameter requestParameters.orgId was null or undefined when calling orgsOrgIdRestorePost.');
713
714
  }
714
715
  const queryParameters = {};
715
716
  const headerParameters = {};
716
- headerParameters['Content-Type'] = 'application/json';
717
717
  if (this.configuration && this.configuration.accessToken) {
718
718
  const token = this.configuration.accessToken;
719
719
  const tokenString = yield token("SVX-JWT", []);
@@ -722,22 +722,22 @@ class OrganisationsApi extends runtime.BaseAPI {
722
722
  }
723
723
  }
724
724
  const response = yield this.request({
725
- path: `/orgs/{org_id}/admins/{org_admin_id}/security_rights`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))).replace(`{${"org_admin_id"}}`, encodeURIComponent(String(requestParameters.orgAdminId))),
725
+ path: `/orgs/{org_id}/restore`.replace(`{${"org_id"}}`, encodeURIComponent(String(requestParameters.orgId))),
726
726
  method: 'POST',
727
727
  headers: headerParameters,
728
728
  query: queryParameters,
729
- body: (0, models_1.ATOMAssignSecurityRightsRequestToJSON)(requestParameters.aTOMAssignSecurityRightsRequest),
730
729
  }, initOverrides);
731
- return new runtime.VoidApiResponse(response);
730
+ return new runtime.JSONApiResponse(response, (jsonValue) => (0, models_1.ATOMOneOrgFromJSON)(jsonValue));
732
731
  });
733
732
  }
734
733
  /**
735
- * Assign organisation security rights to an organisation admin. The endpoint can process security rights of 2 categories: * `for_org = true` and `for_tenant = false` * `for_org = true` and `for_tenant = true`, in this case the security right will be assigned to the tenant which organisation belongs to In order to execute this action the current user must have one of the following security rights: * security right `atom:org:assign_org_sr_to_user` for the organisation with the ID in parameter `org_id` * security right `atom:tenant:assign_org_sr_to_user` for the tenant that the organisation belongs to * global security right `atom:global:assign_org_sr_to_user`\"
736
- * Assign organisation security rights to an organisation admin
734
+ * Restore an organisation. In order to execute this action the current user must have security right `atom:tenant:create_org` for the tenant of the organisation.
735
+ * Restore an organisation
737
736
  */
738
- orgsOrgIdAdminsOrgAdminIdSecurityRightsPost(orgId, orgAdminId, aTOMAssignSecurityRightsRequest, initOverrides) {
737
+ orgsOrgIdRestorePost(orgId, initOverrides) {
739
738
  return __awaiter(this, void 0, void 0, function* () {
740
- yield this.orgsOrgIdAdminsOrgAdminIdSecurityRightsPostRaw({ orgId: orgId, orgAdminId: orgAdminId, aTOMAssignSecurityRightsRequest: aTOMAssignSecurityRightsRequest }, initOverrides);
739
+ const response = yield this.orgsOrgIdRestorePostRaw({ orgId: orgId }, initOverrides);
740
+ return yield response.value();
741
741
  });
742
742
  }
743
743
  /**