@palmetto/users-sdk 1.1.0 → 1.2.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/__generated__/schema.d.ts +739 -60
- package/dist/client.d.ts +45 -116
- package/dist/client.js +18 -9
- package/dist/main.d.ts +2 -1
- package/dist/main.js +2 -1
- package/dist/scopes.d.ts +11 -0
- package/dist/scopes.js +50 -0
- package/package.json +1 -1
|
@@ -22,14 +22,20 @@ export interface paths {
|
|
|
22
22
|
path?: never;
|
|
23
23
|
cookie?: never;
|
|
24
24
|
};
|
|
25
|
-
/**
|
|
25
|
+
/**
|
|
26
|
+
* Get Current User
|
|
27
|
+
* @deprecated
|
|
28
|
+
*/
|
|
26
29
|
get: operations["UsersController_getMe"];
|
|
27
30
|
put?: never;
|
|
28
31
|
post?: never;
|
|
29
32
|
delete?: never;
|
|
30
33
|
options?: never;
|
|
31
34
|
head?: never;
|
|
32
|
-
/**
|
|
35
|
+
/**
|
|
36
|
+
* Update Current User
|
|
37
|
+
* @deprecated
|
|
38
|
+
*/
|
|
33
39
|
patch: operations["UsersController_updateMe"];
|
|
34
40
|
trace?: never;
|
|
35
41
|
};
|
|
@@ -87,6 +93,41 @@ export interface paths {
|
|
|
87
93
|
patch?: never;
|
|
88
94
|
trace?: never;
|
|
89
95
|
};
|
|
96
|
+
"/api/users/{id}/roles": {
|
|
97
|
+
parameters: {
|
|
98
|
+
query?: never;
|
|
99
|
+
header?: never;
|
|
100
|
+
path?: never;
|
|
101
|
+
cookie?: never;
|
|
102
|
+
};
|
|
103
|
+
/** Get roles */
|
|
104
|
+
get: operations["UsersController_getRoles"];
|
|
105
|
+
put?: never;
|
|
106
|
+
post?: never;
|
|
107
|
+
delete?: never;
|
|
108
|
+
options?: never;
|
|
109
|
+
head?: never;
|
|
110
|
+
patch?: never;
|
|
111
|
+
trace?: never;
|
|
112
|
+
};
|
|
113
|
+
"/api/users/{id}/roles/{roleId}": {
|
|
114
|
+
parameters: {
|
|
115
|
+
query?: never;
|
|
116
|
+
header?: never;
|
|
117
|
+
path?: never;
|
|
118
|
+
cookie?: never;
|
|
119
|
+
};
|
|
120
|
+
get?: never;
|
|
121
|
+
put?: never;
|
|
122
|
+
/** Add role to user */
|
|
123
|
+
post: operations["UsersController_addRole"];
|
|
124
|
+
/** Remove role from user */
|
|
125
|
+
delete: operations["UsersController_removeRole"];
|
|
126
|
+
options?: never;
|
|
127
|
+
head?: never;
|
|
128
|
+
patch?: never;
|
|
129
|
+
trace?: never;
|
|
130
|
+
};
|
|
90
131
|
"/api/users/{id}/grants": {
|
|
91
132
|
parameters: {
|
|
92
133
|
query?: never;
|
|
@@ -105,6 +146,24 @@ export interface paths {
|
|
|
105
146
|
patch?: never;
|
|
106
147
|
trace?: never;
|
|
107
148
|
};
|
|
149
|
+
"/api/v2/users/me": {
|
|
150
|
+
parameters: {
|
|
151
|
+
query?: never;
|
|
152
|
+
header?: never;
|
|
153
|
+
path?: never;
|
|
154
|
+
cookie?: never;
|
|
155
|
+
};
|
|
156
|
+
/** Get Current User */
|
|
157
|
+
get: operations["UsersV2Controller_getMe"];
|
|
158
|
+
put?: never;
|
|
159
|
+
post?: never;
|
|
160
|
+
delete?: never;
|
|
161
|
+
options?: never;
|
|
162
|
+
head?: never;
|
|
163
|
+
/** Update Current User */
|
|
164
|
+
patch: operations["UsersV2Controller_updateMe"];
|
|
165
|
+
trace?: never;
|
|
166
|
+
};
|
|
108
167
|
"/api/organizations/{id}": {
|
|
109
168
|
parameters: {
|
|
110
169
|
query?: never;
|
|
@@ -140,6 +199,41 @@ export interface paths {
|
|
|
140
199
|
patch?: never;
|
|
141
200
|
trace?: never;
|
|
142
201
|
};
|
|
202
|
+
"/api/roles": {
|
|
203
|
+
parameters: {
|
|
204
|
+
query?: never;
|
|
205
|
+
header?: never;
|
|
206
|
+
path?: never;
|
|
207
|
+
cookie?: never;
|
|
208
|
+
};
|
|
209
|
+
/** Get roles */
|
|
210
|
+
get: operations["RolesController_findAll"];
|
|
211
|
+
put?: never;
|
|
212
|
+
/** Create a new role */
|
|
213
|
+
post: operations["RolesController_create"];
|
|
214
|
+
delete?: never;
|
|
215
|
+
options?: never;
|
|
216
|
+
head?: never;
|
|
217
|
+
patch?: never;
|
|
218
|
+
trace?: never;
|
|
219
|
+
};
|
|
220
|
+
"/api/roles/{id}": {
|
|
221
|
+
parameters: {
|
|
222
|
+
query?: never;
|
|
223
|
+
header?: never;
|
|
224
|
+
path?: never;
|
|
225
|
+
cookie?: never;
|
|
226
|
+
};
|
|
227
|
+
/** Find role */
|
|
228
|
+
get: operations["RolesController_findOne"];
|
|
229
|
+
put?: never;
|
|
230
|
+
post?: never;
|
|
231
|
+
delete?: never;
|
|
232
|
+
options?: never;
|
|
233
|
+
head?: never;
|
|
234
|
+
patch?: never;
|
|
235
|
+
trace?: never;
|
|
236
|
+
};
|
|
143
237
|
"/api/auth/token": {
|
|
144
238
|
parameters: {
|
|
145
239
|
query?: never;
|
|
@@ -283,7 +377,8 @@ export interface components {
|
|
|
283
377
|
updatedAt?: string;
|
|
284
378
|
};
|
|
285
379
|
/**
|
|
286
|
-
* @
|
|
380
|
+
* @deprecated
|
|
381
|
+
* @description Internal auth id
|
|
287
382
|
* @example auth0|1234567890
|
|
288
383
|
*/
|
|
289
384
|
auth0Id: string | null;
|
|
@@ -304,6 +399,7 @@ export interface components {
|
|
|
304
399
|
*/
|
|
305
400
|
lastName: string;
|
|
306
401
|
/**
|
|
402
|
+
* @deprecated
|
|
307
403
|
* @description User permissions
|
|
308
404
|
* @example {
|
|
309
405
|
* "photon:blueprint": [
|
|
@@ -431,7 +527,8 @@ export interface components {
|
|
|
431
527
|
updatedAt?: string;
|
|
432
528
|
};
|
|
433
529
|
/**
|
|
434
|
-
* @
|
|
530
|
+
* @deprecated
|
|
531
|
+
* @description Internal auth id
|
|
435
532
|
* @example auth0|1234567890
|
|
436
533
|
*/
|
|
437
534
|
auth0Id: string | null;
|
|
@@ -500,21 +597,30 @@ export interface components {
|
|
|
500
597
|
/** @default [] */
|
|
501
598
|
grants: {
|
|
502
599
|
/**
|
|
503
|
-
* @description
|
|
600
|
+
* @description The entity to grant access to
|
|
504
601
|
* @example photon:blueprint
|
|
505
602
|
*/
|
|
506
603
|
entity: string;
|
|
507
604
|
/**
|
|
508
|
-
* @description
|
|
605
|
+
* @description The operation on the entity to grant access to
|
|
509
606
|
* @example read
|
|
510
607
|
*/
|
|
511
608
|
operation: string;
|
|
512
609
|
/**
|
|
513
|
-
* @description
|
|
610
|
+
* @description The scope to apply to this grant to
|
|
611
|
+
* @default @self
|
|
612
|
+
* @enum {string}
|
|
613
|
+
*/
|
|
614
|
+
scope: "@deny" | "@self" | "@org" | "@admin";
|
|
615
|
+
/**
|
|
616
|
+
* @deprecated
|
|
617
|
+
* @description Deny this operation instead of granting it. Use scope = -1 instead of using this field.
|
|
514
618
|
* @example false
|
|
515
619
|
*/
|
|
516
620
|
deny?: boolean;
|
|
517
621
|
}[];
|
|
622
|
+
/** @default [] */
|
|
623
|
+
roleIds: string[];
|
|
518
624
|
};
|
|
519
625
|
/** NotFoundError */
|
|
520
626
|
NotFoundErrorDto: {
|
|
@@ -560,19 +666,154 @@ export interface components {
|
|
|
560
666
|
/** @description Personal access token */
|
|
561
667
|
personalAccessToken?: string;
|
|
562
668
|
};
|
|
563
|
-
/**
|
|
564
|
-
|
|
669
|
+
/** List */
|
|
670
|
+
ListDto: {
|
|
671
|
+
data: unknown[];
|
|
672
|
+
};
|
|
673
|
+
/** Role */
|
|
674
|
+
RoleDto: {
|
|
675
|
+
organizationId?: string;
|
|
676
|
+
name: string;
|
|
677
|
+
/** @enum {string} */
|
|
678
|
+
requiredScope: "@org" | "@admin";
|
|
679
|
+
grants: {
|
|
680
|
+
/**
|
|
681
|
+
* @description Grant entity
|
|
682
|
+
* @example photon:tasks
|
|
683
|
+
*/
|
|
684
|
+
entity: string;
|
|
685
|
+
/**
|
|
686
|
+
* @description Grant operation
|
|
687
|
+
* @example read
|
|
688
|
+
*/
|
|
689
|
+
operation: string;
|
|
690
|
+
/**
|
|
691
|
+
* @example @self
|
|
692
|
+
* @enum {string}
|
|
693
|
+
*/
|
|
694
|
+
scope: "@deny" | "@self" | "@org" | "@admin";
|
|
695
|
+
/**
|
|
696
|
+
* @deprecated
|
|
697
|
+
* @example false
|
|
698
|
+
*/
|
|
699
|
+
deny?: boolean;
|
|
700
|
+
}[];
|
|
701
|
+
meta: {
|
|
702
|
+
/**
|
|
703
|
+
* Format: date-time
|
|
704
|
+
* @description Created at timestamp
|
|
705
|
+
* @example 2024-09-11T00:09:06.276+0000
|
|
706
|
+
*/
|
|
707
|
+
createdAt: string;
|
|
708
|
+
/**
|
|
709
|
+
* Format: date-time
|
|
710
|
+
* @description Updated at timestamp
|
|
711
|
+
* @example 2024-09-11T00:09:06.276+0000
|
|
712
|
+
*/
|
|
713
|
+
updatedAt?: string;
|
|
714
|
+
};
|
|
715
|
+
};
|
|
716
|
+
/** CreateGrant */
|
|
717
|
+
CreateGrantDto: {
|
|
718
|
+
/**
|
|
719
|
+
* @description The entity to grant access to
|
|
720
|
+
* @example photon:blueprint
|
|
721
|
+
*/
|
|
722
|
+
entity: string;
|
|
723
|
+
/**
|
|
724
|
+
* @description The operation on the entity to grant access to
|
|
725
|
+
* @example read
|
|
726
|
+
*/
|
|
727
|
+
operation: string;
|
|
728
|
+
/**
|
|
729
|
+
* @description The scope to apply to this grant to
|
|
730
|
+
* @default @self
|
|
731
|
+
* @enum {string}
|
|
732
|
+
*/
|
|
733
|
+
scope: "@deny" | "@self" | "@org" | "@admin";
|
|
734
|
+
/**
|
|
735
|
+
* @deprecated
|
|
736
|
+
* @description Deny this operation instead of granting it. Use scope = -1 instead of using this field.
|
|
737
|
+
* @example false
|
|
738
|
+
*/
|
|
739
|
+
deny?: boolean;
|
|
740
|
+
};
|
|
741
|
+
/** RemoveGrantInput */
|
|
742
|
+
RemoveGrantInputDto: {
|
|
565
743
|
/**
|
|
566
|
-
* @description
|
|
744
|
+
* @description The entity to grant access to
|
|
567
745
|
* @example photon:blueprint
|
|
568
746
|
*/
|
|
569
747
|
entity: string;
|
|
570
748
|
/**
|
|
571
|
-
* @description
|
|
749
|
+
* @description The operation on the entity to grant access to
|
|
572
750
|
* @example read
|
|
573
751
|
*/
|
|
574
752
|
operation: string;
|
|
575
753
|
};
|
|
754
|
+
/** Me */
|
|
755
|
+
MeDto: {
|
|
756
|
+
/** @example 66e25e72d10dfef2f9f6cc60 */
|
|
757
|
+
id: string;
|
|
758
|
+
meta: {
|
|
759
|
+
/**
|
|
760
|
+
* Format: date-time
|
|
761
|
+
* @description Created at timestamp
|
|
762
|
+
* @example 2024-09-11T00:09:06.276+0000
|
|
763
|
+
*/
|
|
764
|
+
createdAt: string;
|
|
765
|
+
/**
|
|
766
|
+
* Format: date-time
|
|
767
|
+
* @description Updated at timestamp
|
|
768
|
+
* @example 2024-09-11T00:09:06.276+0000
|
|
769
|
+
*/
|
|
770
|
+
updatedAt?: string;
|
|
771
|
+
};
|
|
772
|
+
/**
|
|
773
|
+
* Format: email
|
|
774
|
+
* @description Email
|
|
775
|
+
* @example test@test.com
|
|
776
|
+
*/
|
|
777
|
+
email: string;
|
|
778
|
+
/**
|
|
779
|
+
* @description First name
|
|
780
|
+
* @example John
|
|
781
|
+
*/
|
|
782
|
+
firstName: string;
|
|
783
|
+
/**
|
|
784
|
+
* @description Last name
|
|
785
|
+
* @example Doe
|
|
786
|
+
*/
|
|
787
|
+
lastName: string;
|
|
788
|
+
/**
|
|
789
|
+
* @description Phone number
|
|
790
|
+
* @example +18048675309
|
|
791
|
+
*/
|
|
792
|
+
phoneNumber: string;
|
|
793
|
+
/**
|
|
794
|
+
* @description Organization ID
|
|
795
|
+
* @example 66e3367b141b81fb54ec4e1f
|
|
796
|
+
*/
|
|
797
|
+
organizationId: string;
|
|
798
|
+
/**
|
|
799
|
+
* @description Has Personal Access Token
|
|
800
|
+
* @example false
|
|
801
|
+
*/
|
|
802
|
+
hasPAT: boolean;
|
|
803
|
+
/**
|
|
804
|
+
* @description Permissions mapped to scopes
|
|
805
|
+
* @example {
|
|
806
|
+
* "lux:quote": {
|
|
807
|
+
* "read": "@org"
|
|
808
|
+
* }
|
|
809
|
+
* }
|
|
810
|
+
*/
|
|
811
|
+
permissions: {
|
|
812
|
+
[key: string]: {
|
|
813
|
+
[key: string]: "@deny" | "@self" | "@org" | "@admin";
|
|
814
|
+
};
|
|
815
|
+
};
|
|
816
|
+
};
|
|
576
817
|
/** Organization */
|
|
577
818
|
OrganizationDto: {
|
|
578
819
|
/** @example 66e25e72d10dfef2f9f6cc60 */
|
|
@@ -597,6 +838,7 @@ export interface components {
|
|
|
597
838
|
*/
|
|
598
839
|
name: string;
|
|
599
840
|
/**
|
|
841
|
+
* @deprecated
|
|
600
842
|
* @description Organization permissions
|
|
601
843
|
* @example {
|
|
602
844
|
* "photon:blueprint": [
|
|
@@ -622,17 +864,24 @@ export interface components {
|
|
|
622
864
|
*/
|
|
623
865
|
grants: {
|
|
624
866
|
/**
|
|
625
|
-
* @description
|
|
867
|
+
* @description The entity to grant access to
|
|
626
868
|
* @example photon:blueprint
|
|
627
869
|
*/
|
|
628
870
|
entity: string;
|
|
629
871
|
/**
|
|
630
|
-
* @description
|
|
872
|
+
* @description The operation on the entity to grant access to
|
|
631
873
|
* @example read
|
|
632
874
|
*/
|
|
633
875
|
operation: string;
|
|
634
876
|
/**
|
|
635
|
-
* @description
|
|
877
|
+
* @description The scope to apply to this grant to
|
|
878
|
+
* @default @self
|
|
879
|
+
* @enum {string}
|
|
880
|
+
*/
|
|
881
|
+
scope: "@deny" | "@self" | "@org" | "@admin";
|
|
882
|
+
/**
|
|
883
|
+
* @deprecated
|
|
884
|
+
* @description Deny this operation instead of granting it. Use scope = -1 instead of using this field.
|
|
636
885
|
* @example false
|
|
637
886
|
*/
|
|
638
887
|
deny?: boolean;
|
|
@@ -646,6 +895,31 @@ export interface components {
|
|
|
646
895
|
*/
|
|
647
896
|
name: string;
|
|
648
897
|
};
|
|
898
|
+
/** CreateRole */
|
|
899
|
+
CreateRoleDto: {
|
|
900
|
+
/** @example 66e25e72d10dfef2f9f6cc60 */
|
|
901
|
+
organizationId?: string;
|
|
902
|
+
name: string;
|
|
903
|
+
/**
|
|
904
|
+
* @default @org
|
|
905
|
+
* @enum {string}
|
|
906
|
+
*/
|
|
907
|
+
requiredScope: "@org" | "@admin";
|
|
908
|
+
grants: {
|
|
909
|
+
/**
|
|
910
|
+
* @description The entity to grant access to
|
|
911
|
+
* @example photon:blueprint
|
|
912
|
+
*/
|
|
913
|
+
entity: string;
|
|
914
|
+
/**
|
|
915
|
+
* @description The operation on the entity to grant access to
|
|
916
|
+
* @example read
|
|
917
|
+
*/
|
|
918
|
+
operation: string;
|
|
919
|
+
/** @enum {string} */
|
|
920
|
+
scope: "@self" | "@org" | "@admin";
|
|
921
|
+
}[];
|
|
922
|
+
};
|
|
649
923
|
/** TokenInput */
|
|
650
924
|
TokenInputDto: {
|
|
651
925
|
/** @enum {string} */
|
|
@@ -735,7 +1009,8 @@ export interface components {
|
|
|
735
1009
|
updatedAt?: string;
|
|
736
1010
|
};
|
|
737
1011
|
/**
|
|
738
|
-
* @
|
|
1012
|
+
* @deprecated
|
|
1013
|
+
* @description Internal auth id
|
|
739
1014
|
* @example auth0|1234567890
|
|
740
1015
|
*/
|
|
741
1016
|
auth0Id: string | null;
|
|
@@ -1272,15 +1547,6 @@ export interface operations {
|
|
|
1272
1547
|
"application/json": components["schemas"]["UnauthorizedErrorDto"];
|
|
1273
1548
|
};
|
|
1274
1549
|
};
|
|
1275
|
-
/** @description When the requesting user is not allowed to perform this action */
|
|
1276
|
-
403: {
|
|
1277
|
-
headers: {
|
|
1278
|
-
[name: string]: unknown;
|
|
1279
|
-
};
|
|
1280
|
-
content: {
|
|
1281
|
-
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
1282
|
-
};
|
|
1283
|
-
};
|
|
1284
1550
|
/** @description When the user is not found */
|
|
1285
1551
|
404: {
|
|
1286
1552
|
headers: {
|
|
@@ -1292,7 +1558,7 @@ export interface operations {
|
|
|
1292
1558
|
};
|
|
1293
1559
|
};
|
|
1294
1560
|
};
|
|
1295
|
-
|
|
1561
|
+
UsersController_getRoles: {
|
|
1296
1562
|
parameters: {
|
|
1297
1563
|
query?: never;
|
|
1298
1564
|
header?: never;
|
|
@@ -1301,21 +1567,19 @@ export interface operations {
|
|
|
1301
1567
|
};
|
|
1302
1568
|
cookie?: never;
|
|
1303
1569
|
};
|
|
1304
|
-
requestBody
|
|
1305
|
-
content: {
|
|
1306
|
-
"application/json": components["schemas"]["GrantInputDto"];
|
|
1307
|
-
};
|
|
1308
|
-
};
|
|
1570
|
+
requestBody?: never;
|
|
1309
1571
|
responses: {
|
|
1310
|
-
|
|
1572
|
+
200: {
|
|
1311
1573
|
headers: {
|
|
1312
1574
|
[name: string]: unknown;
|
|
1313
1575
|
};
|
|
1314
1576
|
content: {
|
|
1315
|
-
"application/json":
|
|
1577
|
+
"application/json": {
|
|
1578
|
+
data: components["schemas"]["RoleDto"][];
|
|
1579
|
+
};
|
|
1316
1580
|
};
|
|
1317
1581
|
};
|
|
1318
|
-
/** @description When the
|
|
1582
|
+
/** @description When the request is invalid */
|
|
1319
1583
|
400: {
|
|
1320
1584
|
headers: {
|
|
1321
1585
|
[name: string]: unknown;
|
|
@@ -1342,33 +1606,21 @@ export interface operations {
|
|
|
1342
1606
|
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
1343
1607
|
};
|
|
1344
1608
|
};
|
|
1345
|
-
/** @description When the user is not found */
|
|
1346
|
-
404: {
|
|
1347
|
-
headers: {
|
|
1348
|
-
[name: string]: unknown;
|
|
1349
|
-
};
|
|
1350
|
-
content: {
|
|
1351
|
-
"application/json": components["schemas"]["NotFoundErrorDto"];
|
|
1352
|
-
};
|
|
1353
|
-
};
|
|
1354
1609
|
};
|
|
1355
1610
|
};
|
|
1356
|
-
|
|
1611
|
+
UsersController_addRole: {
|
|
1357
1612
|
parameters: {
|
|
1358
1613
|
query?: never;
|
|
1359
1614
|
header?: never;
|
|
1360
1615
|
path: {
|
|
1361
1616
|
id: string;
|
|
1617
|
+
roleId: string;
|
|
1362
1618
|
};
|
|
1363
1619
|
cookie?: never;
|
|
1364
1620
|
};
|
|
1365
|
-
requestBody
|
|
1366
|
-
content: {
|
|
1367
|
-
"application/json": components["schemas"]["GrantInputDto"];
|
|
1368
|
-
};
|
|
1369
|
-
};
|
|
1621
|
+
requestBody?: never;
|
|
1370
1622
|
responses: {
|
|
1371
|
-
|
|
1623
|
+
201: {
|
|
1372
1624
|
headers: {
|
|
1373
1625
|
[name: string]: unknown;
|
|
1374
1626
|
};
|
|
@@ -1376,7 +1628,7 @@ export interface operations {
|
|
|
1376
1628
|
"application/json": components["schemas"]["UserDto"];
|
|
1377
1629
|
};
|
|
1378
1630
|
};
|
|
1379
|
-
/** @description When the
|
|
1631
|
+
/** @description When the request is invalid */
|
|
1380
1632
|
400: {
|
|
1381
1633
|
headers: {
|
|
1382
1634
|
[name: string]: unknown;
|
|
@@ -1403,7 +1655,7 @@ export interface operations {
|
|
|
1403
1655
|
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
1404
1656
|
};
|
|
1405
1657
|
};
|
|
1406
|
-
/** @description When the user is not found */
|
|
1658
|
+
/** @description When the user or role is not found */
|
|
1407
1659
|
404: {
|
|
1408
1660
|
headers: {
|
|
1409
1661
|
[name: string]: unknown;
|
|
@@ -1414,12 +1666,13 @@ export interface operations {
|
|
|
1414
1666
|
};
|
|
1415
1667
|
};
|
|
1416
1668
|
};
|
|
1417
|
-
|
|
1669
|
+
UsersController_removeRole: {
|
|
1418
1670
|
parameters: {
|
|
1419
1671
|
query?: never;
|
|
1420
1672
|
header?: never;
|
|
1421
1673
|
path: {
|
|
1422
1674
|
id: string;
|
|
1675
|
+
roleId: string;
|
|
1423
1676
|
};
|
|
1424
1677
|
cookie?: never;
|
|
1425
1678
|
};
|
|
@@ -1430,10 +1683,10 @@ export interface operations {
|
|
|
1430
1683
|
[name: string]: unknown;
|
|
1431
1684
|
};
|
|
1432
1685
|
content: {
|
|
1433
|
-
"application/json": components["schemas"]["
|
|
1686
|
+
"application/json": components["schemas"]["UserDto"];
|
|
1434
1687
|
};
|
|
1435
1688
|
};
|
|
1436
|
-
/** @description When the
|
|
1689
|
+
/** @description When the request is invalid */
|
|
1437
1690
|
400: {
|
|
1438
1691
|
headers: {
|
|
1439
1692
|
[name: string]: unknown;
|
|
@@ -1460,7 +1713,7 @@ export interface operations {
|
|
|
1460
1713
|
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
1461
1714
|
};
|
|
1462
1715
|
};
|
|
1463
|
-
/** @description When the
|
|
1716
|
+
/** @description When the user is not found */
|
|
1464
1717
|
404: {
|
|
1465
1718
|
headers: {
|
|
1466
1719
|
[name: string]: unknown;
|
|
@@ -1471,7 +1724,7 @@ export interface operations {
|
|
|
1471
1724
|
};
|
|
1472
1725
|
};
|
|
1473
1726
|
};
|
|
1474
|
-
|
|
1727
|
+
UsersController_addGrant: {
|
|
1475
1728
|
parameters: {
|
|
1476
1729
|
query?: never;
|
|
1477
1730
|
header?: never;
|
|
@@ -1482,11 +1735,268 @@ export interface operations {
|
|
|
1482
1735
|
};
|
|
1483
1736
|
requestBody: {
|
|
1484
1737
|
content: {
|
|
1485
|
-
"application/json": components["schemas"]["
|
|
1738
|
+
"application/json": components["schemas"]["CreateGrantDto"];
|
|
1486
1739
|
};
|
|
1487
1740
|
};
|
|
1488
1741
|
responses: {
|
|
1489
|
-
|
|
1742
|
+
201: {
|
|
1743
|
+
headers: {
|
|
1744
|
+
[name: string]: unknown;
|
|
1745
|
+
};
|
|
1746
|
+
content: {
|
|
1747
|
+
"application/json": components["schemas"]["UserDto"];
|
|
1748
|
+
};
|
|
1749
|
+
};
|
|
1750
|
+
/** @description When the ID or body request is invalid */
|
|
1751
|
+
400: {
|
|
1752
|
+
headers: {
|
|
1753
|
+
[name: string]: unknown;
|
|
1754
|
+
};
|
|
1755
|
+
content: {
|
|
1756
|
+
"application/json": components["schemas"]["BadRequestErrorDto"];
|
|
1757
|
+
};
|
|
1758
|
+
};
|
|
1759
|
+
/** @description When authentication fails */
|
|
1760
|
+
401: {
|
|
1761
|
+
headers: {
|
|
1762
|
+
[name: string]: unknown;
|
|
1763
|
+
};
|
|
1764
|
+
content: {
|
|
1765
|
+
"application/json": components["schemas"]["UnauthorizedErrorDto"];
|
|
1766
|
+
};
|
|
1767
|
+
};
|
|
1768
|
+
/** @description When the requesting user is not allowed to perform this action */
|
|
1769
|
+
403: {
|
|
1770
|
+
headers: {
|
|
1771
|
+
[name: string]: unknown;
|
|
1772
|
+
};
|
|
1773
|
+
content: {
|
|
1774
|
+
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
1775
|
+
};
|
|
1776
|
+
};
|
|
1777
|
+
/** @description When the user is not found */
|
|
1778
|
+
404: {
|
|
1779
|
+
headers: {
|
|
1780
|
+
[name: string]: unknown;
|
|
1781
|
+
};
|
|
1782
|
+
content: {
|
|
1783
|
+
"application/json": components["schemas"]["NotFoundErrorDto"];
|
|
1784
|
+
};
|
|
1785
|
+
};
|
|
1786
|
+
};
|
|
1787
|
+
};
|
|
1788
|
+
UsersController_removeGrant: {
|
|
1789
|
+
parameters: {
|
|
1790
|
+
query?: never;
|
|
1791
|
+
header?: never;
|
|
1792
|
+
path: {
|
|
1793
|
+
id: string;
|
|
1794
|
+
};
|
|
1795
|
+
cookie?: never;
|
|
1796
|
+
};
|
|
1797
|
+
requestBody: {
|
|
1798
|
+
content: {
|
|
1799
|
+
"application/json": components["schemas"]["RemoveGrantInputDto"];
|
|
1800
|
+
};
|
|
1801
|
+
};
|
|
1802
|
+
responses: {
|
|
1803
|
+
200: {
|
|
1804
|
+
headers: {
|
|
1805
|
+
[name: string]: unknown;
|
|
1806
|
+
};
|
|
1807
|
+
content: {
|
|
1808
|
+
"application/json": components["schemas"]["UserDto"];
|
|
1809
|
+
};
|
|
1810
|
+
};
|
|
1811
|
+
/** @description When the ID or body request is invalid */
|
|
1812
|
+
400: {
|
|
1813
|
+
headers: {
|
|
1814
|
+
[name: string]: unknown;
|
|
1815
|
+
};
|
|
1816
|
+
content: {
|
|
1817
|
+
"application/json": components["schemas"]["BadRequestErrorDto"];
|
|
1818
|
+
};
|
|
1819
|
+
};
|
|
1820
|
+
/** @description When authentication fails */
|
|
1821
|
+
401: {
|
|
1822
|
+
headers: {
|
|
1823
|
+
[name: string]: unknown;
|
|
1824
|
+
};
|
|
1825
|
+
content: {
|
|
1826
|
+
"application/json": components["schemas"]["UnauthorizedErrorDto"];
|
|
1827
|
+
};
|
|
1828
|
+
};
|
|
1829
|
+
/** @description When the requesting user is not allowed to perform this action */
|
|
1830
|
+
403: {
|
|
1831
|
+
headers: {
|
|
1832
|
+
[name: string]: unknown;
|
|
1833
|
+
};
|
|
1834
|
+
content: {
|
|
1835
|
+
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
1836
|
+
};
|
|
1837
|
+
};
|
|
1838
|
+
/** @description When the user is not found */
|
|
1839
|
+
404: {
|
|
1840
|
+
headers: {
|
|
1841
|
+
[name: string]: unknown;
|
|
1842
|
+
};
|
|
1843
|
+
content: {
|
|
1844
|
+
"application/json": components["schemas"]["NotFoundErrorDto"];
|
|
1845
|
+
};
|
|
1846
|
+
};
|
|
1847
|
+
};
|
|
1848
|
+
};
|
|
1849
|
+
UsersV2Controller_getMe: {
|
|
1850
|
+
parameters: {
|
|
1851
|
+
query?: never;
|
|
1852
|
+
header?: never;
|
|
1853
|
+
path?: never;
|
|
1854
|
+
cookie?: never;
|
|
1855
|
+
};
|
|
1856
|
+
requestBody?: never;
|
|
1857
|
+
responses: {
|
|
1858
|
+
200: {
|
|
1859
|
+
headers: {
|
|
1860
|
+
[name: string]: unknown;
|
|
1861
|
+
};
|
|
1862
|
+
content: {
|
|
1863
|
+
"application/json": components["schemas"]["MeDto"];
|
|
1864
|
+
};
|
|
1865
|
+
};
|
|
1866
|
+
/** @description When authentication fails */
|
|
1867
|
+
401: {
|
|
1868
|
+
headers: {
|
|
1869
|
+
[name: string]: unknown;
|
|
1870
|
+
};
|
|
1871
|
+
content: {
|
|
1872
|
+
"application/json": components["schemas"]["UnauthorizedErrorDto"];
|
|
1873
|
+
};
|
|
1874
|
+
};
|
|
1875
|
+
/** @description When the user does not have permission to access this resource */
|
|
1876
|
+
403: {
|
|
1877
|
+
headers: {
|
|
1878
|
+
[name: string]: unknown;
|
|
1879
|
+
};
|
|
1880
|
+
content: {
|
|
1881
|
+
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
1882
|
+
};
|
|
1883
|
+
};
|
|
1884
|
+
};
|
|
1885
|
+
};
|
|
1886
|
+
UsersV2Controller_updateMe: {
|
|
1887
|
+
parameters: {
|
|
1888
|
+
query?: never;
|
|
1889
|
+
header?: never;
|
|
1890
|
+
path?: never;
|
|
1891
|
+
cookie?: never;
|
|
1892
|
+
};
|
|
1893
|
+
requestBody: {
|
|
1894
|
+
content: {
|
|
1895
|
+
"application/json": components["schemas"]["UpdateUserDto"];
|
|
1896
|
+
};
|
|
1897
|
+
};
|
|
1898
|
+
responses: {
|
|
1899
|
+
200: {
|
|
1900
|
+
headers: {
|
|
1901
|
+
[name: string]: unknown;
|
|
1902
|
+
};
|
|
1903
|
+
content: {
|
|
1904
|
+
"application/json": components["schemas"]["MeDto"];
|
|
1905
|
+
};
|
|
1906
|
+
};
|
|
1907
|
+
/** @description When the body request is invalid */
|
|
1908
|
+
400: {
|
|
1909
|
+
headers: {
|
|
1910
|
+
[name: string]: unknown;
|
|
1911
|
+
};
|
|
1912
|
+
content: {
|
|
1913
|
+
"application/json": components["schemas"]["BadRequestErrorDto"];
|
|
1914
|
+
};
|
|
1915
|
+
};
|
|
1916
|
+
/** @description When authentication fails */
|
|
1917
|
+
401: {
|
|
1918
|
+
headers: {
|
|
1919
|
+
[name: string]: unknown;
|
|
1920
|
+
};
|
|
1921
|
+
content: {
|
|
1922
|
+
"application/json": components["schemas"]["UnauthorizedErrorDto"];
|
|
1923
|
+
};
|
|
1924
|
+
};
|
|
1925
|
+
};
|
|
1926
|
+
};
|
|
1927
|
+
OrganizationsController_getOrganization: {
|
|
1928
|
+
parameters: {
|
|
1929
|
+
query?: never;
|
|
1930
|
+
header?: never;
|
|
1931
|
+
path: {
|
|
1932
|
+
id: string;
|
|
1933
|
+
};
|
|
1934
|
+
cookie?: never;
|
|
1935
|
+
};
|
|
1936
|
+
requestBody?: never;
|
|
1937
|
+
responses: {
|
|
1938
|
+
200: {
|
|
1939
|
+
headers: {
|
|
1940
|
+
[name: string]: unknown;
|
|
1941
|
+
};
|
|
1942
|
+
content: {
|
|
1943
|
+
"application/json": components["schemas"]["OrganizationDto"];
|
|
1944
|
+
};
|
|
1945
|
+
};
|
|
1946
|
+
/** @description When the provided ID is invalid */
|
|
1947
|
+
400: {
|
|
1948
|
+
headers: {
|
|
1949
|
+
[name: string]: unknown;
|
|
1950
|
+
};
|
|
1951
|
+
content: {
|
|
1952
|
+
"application/json": components["schemas"]["BadRequestErrorDto"];
|
|
1953
|
+
};
|
|
1954
|
+
};
|
|
1955
|
+
/** @description When authentication fails */
|
|
1956
|
+
401: {
|
|
1957
|
+
headers: {
|
|
1958
|
+
[name: string]: unknown;
|
|
1959
|
+
};
|
|
1960
|
+
content: {
|
|
1961
|
+
"application/json": components["schemas"]["UnauthorizedErrorDto"];
|
|
1962
|
+
};
|
|
1963
|
+
};
|
|
1964
|
+
/** @description When the requesting user is not allowed to perform this action */
|
|
1965
|
+
403: {
|
|
1966
|
+
headers: {
|
|
1967
|
+
[name: string]: unknown;
|
|
1968
|
+
};
|
|
1969
|
+
content: {
|
|
1970
|
+
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
1971
|
+
};
|
|
1972
|
+
};
|
|
1973
|
+
/** @description When the organization is not found */
|
|
1974
|
+
404: {
|
|
1975
|
+
headers: {
|
|
1976
|
+
[name: string]: unknown;
|
|
1977
|
+
};
|
|
1978
|
+
content: {
|
|
1979
|
+
"application/json": components["schemas"]["NotFoundErrorDto"];
|
|
1980
|
+
};
|
|
1981
|
+
};
|
|
1982
|
+
};
|
|
1983
|
+
};
|
|
1984
|
+
OrganizationsController_update: {
|
|
1985
|
+
parameters: {
|
|
1986
|
+
query?: never;
|
|
1987
|
+
header?: never;
|
|
1988
|
+
path: {
|
|
1989
|
+
id: string;
|
|
1990
|
+
};
|
|
1991
|
+
cookie?: never;
|
|
1992
|
+
};
|
|
1993
|
+
requestBody: {
|
|
1994
|
+
content: {
|
|
1995
|
+
"application/json": components["schemas"]["UpdateOrganizationDto"];
|
|
1996
|
+
};
|
|
1997
|
+
};
|
|
1998
|
+
responses: {
|
|
1999
|
+
200: {
|
|
1490
2000
|
headers: {
|
|
1491
2001
|
[name: string]: unknown;
|
|
1492
2002
|
};
|
|
@@ -1582,6 +2092,166 @@ export interface operations {
|
|
|
1582
2092
|
};
|
|
1583
2093
|
};
|
|
1584
2094
|
};
|
|
2095
|
+
RolesController_findAll: {
|
|
2096
|
+
parameters: {
|
|
2097
|
+
query?: {
|
|
2098
|
+
page?: number;
|
|
2099
|
+
limit?: number;
|
|
2100
|
+
/** @example 66e25e72d10dfef2f9f6cc60 */
|
|
2101
|
+
organizationId?: string;
|
|
2102
|
+
};
|
|
2103
|
+
header?: never;
|
|
2104
|
+
path?: never;
|
|
2105
|
+
cookie?: never;
|
|
2106
|
+
};
|
|
2107
|
+
requestBody?: never;
|
|
2108
|
+
responses: {
|
|
2109
|
+
200: {
|
|
2110
|
+
headers: {
|
|
2111
|
+
[name: string]: unknown;
|
|
2112
|
+
};
|
|
2113
|
+
content: {
|
|
2114
|
+
"application/json": {
|
|
2115
|
+
data: components["schemas"]["RoleDto"][];
|
|
2116
|
+
} & components["schemas"]["PaginatedListDto"];
|
|
2117
|
+
};
|
|
2118
|
+
};
|
|
2119
|
+
/** @description When the request is invalid */
|
|
2120
|
+
400: {
|
|
2121
|
+
headers: {
|
|
2122
|
+
[name: string]: unknown;
|
|
2123
|
+
};
|
|
2124
|
+
content: {
|
|
2125
|
+
"application/json": components["schemas"]["BadRequestErrorDto"];
|
|
2126
|
+
};
|
|
2127
|
+
};
|
|
2128
|
+
/** @description When authentication fails */
|
|
2129
|
+
401: {
|
|
2130
|
+
headers: {
|
|
2131
|
+
[name: string]: unknown;
|
|
2132
|
+
};
|
|
2133
|
+
content: {
|
|
2134
|
+
"application/json": components["schemas"]["UnauthorizedErrorDto"];
|
|
2135
|
+
};
|
|
2136
|
+
};
|
|
2137
|
+
/** @description When the requesting user is not allowed to perform this action */
|
|
2138
|
+
403: {
|
|
2139
|
+
headers: {
|
|
2140
|
+
[name: string]: unknown;
|
|
2141
|
+
};
|
|
2142
|
+
content: {
|
|
2143
|
+
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
2144
|
+
};
|
|
2145
|
+
};
|
|
2146
|
+
};
|
|
2147
|
+
};
|
|
2148
|
+
RolesController_create: {
|
|
2149
|
+
parameters: {
|
|
2150
|
+
query?: never;
|
|
2151
|
+
header?: never;
|
|
2152
|
+
path?: never;
|
|
2153
|
+
cookie?: never;
|
|
2154
|
+
};
|
|
2155
|
+
requestBody: {
|
|
2156
|
+
content: {
|
|
2157
|
+
"application/json": components["schemas"]["CreateRoleDto"];
|
|
2158
|
+
};
|
|
2159
|
+
};
|
|
2160
|
+
responses: {
|
|
2161
|
+
201: {
|
|
2162
|
+
headers: {
|
|
2163
|
+
[name: string]: unknown;
|
|
2164
|
+
};
|
|
2165
|
+
content: {
|
|
2166
|
+
"application/json": components["schemas"]["RoleDto"];
|
|
2167
|
+
};
|
|
2168
|
+
};
|
|
2169
|
+
/** @description When the request is invalid */
|
|
2170
|
+
400: {
|
|
2171
|
+
headers: {
|
|
2172
|
+
[name: string]: unknown;
|
|
2173
|
+
};
|
|
2174
|
+
content: {
|
|
2175
|
+
"application/json": components["schemas"]["BadRequestErrorDto"];
|
|
2176
|
+
};
|
|
2177
|
+
};
|
|
2178
|
+
/** @description When authentication fails */
|
|
2179
|
+
401: {
|
|
2180
|
+
headers: {
|
|
2181
|
+
[name: string]: unknown;
|
|
2182
|
+
};
|
|
2183
|
+
content: {
|
|
2184
|
+
"application/json": components["schemas"]["UnauthorizedErrorDto"];
|
|
2185
|
+
};
|
|
2186
|
+
};
|
|
2187
|
+
/** @description When the requesting user is not allowed to perform this action */
|
|
2188
|
+
403: {
|
|
2189
|
+
headers: {
|
|
2190
|
+
[name: string]: unknown;
|
|
2191
|
+
};
|
|
2192
|
+
content: {
|
|
2193
|
+
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
2194
|
+
};
|
|
2195
|
+
};
|
|
2196
|
+
};
|
|
2197
|
+
};
|
|
2198
|
+
RolesController_findOne: {
|
|
2199
|
+
parameters: {
|
|
2200
|
+
query?: never;
|
|
2201
|
+
header?: never;
|
|
2202
|
+
path: {
|
|
2203
|
+
id: string;
|
|
2204
|
+
};
|
|
2205
|
+
cookie?: never;
|
|
2206
|
+
};
|
|
2207
|
+
requestBody?: never;
|
|
2208
|
+
responses: {
|
|
2209
|
+
200: {
|
|
2210
|
+
headers: {
|
|
2211
|
+
[name: string]: unknown;
|
|
2212
|
+
};
|
|
2213
|
+
content: {
|
|
2214
|
+
"application/json": components["schemas"]["RoleDto"];
|
|
2215
|
+
};
|
|
2216
|
+
};
|
|
2217
|
+
/** @description When the request is invalid */
|
|
2218
|
+
400: {
|
|
2219
|
+
headers: {
|
|
2220
|
+
[name: string]: unknown;
|
|
2221
|
+
};
|
|
2222
|
+
content: {
|
|
2223
|
+
"application/json": components["schemas"]["BadRequestErrorDto"];
|
|
2224
|
+
};
|
|
2225
|
+
};
|
|
2226
|
+
/** @description When authentication fails */
|
|
2227
|
+
401: {
|
|
2228
|
+
headers: {
|
|
2229
|
+
[name: string]: unknown;
|
|
2230
|
+
};
|
|
2231
|
+
content: {
|
|
2232
|
+
"application/json": components["schemas"]["UnauthorizedErrorDto"];
|
|
2233
|
+
};
|
|
2234
|
+
};
|
|
2235
|
+
/** @description When the requesting user is not allowed to perform this action */
|
|
2236
|
+
403: {
|
|
2237
|
+
headers: {
|
|
2238
|
+
[name: string]: unknown;
|
|
2239
|
+
};
|
|
2240
|
+
content: {
|
|
2241
|
+
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
2242
|
+
};
|
|
2243
|
+
};
|
|
2244
|
+
/** @description When the Role is not found */
|
|
2245
|
+
404: {
|
|
2246
|
+
headers: {
|
|
2247
|
+
[name: string]: unknown;
|
|
2248
|
+
};
|
|
2249
|
+
content: {
|
|
2250
|
+
"application/json": components["schemas"]["NotFoundErrorDto"];
|
|
2251
|
+
};
|
|
2252
|
+
};
|
|
2253
|
+
};
|
|
2254
|
+
};
|
|
1585
2255
|
AuthController_generateToken: {
|
|
1586
2256
|
parameters: {
|
|
1587
2257
|
query?: never;
|
|
@@ -1680,7 +2350,7 @@ export interface operations {
|
|
|
1680
2350
|
};
|
|
1681
2351
|
};
|
|
1682
2352
|
responses: {
|
|
1683
|
-
|
|
2353
|
+
201: {
|
|
1684
2354
|
headers: {
|
|
1685
2355
|
[name: string]: unknown;
|
|
1686
2356
|
};
|
|
@@ -1706,6 +2376,15 @@ export interface operations {
|
|
|
1706
2376
|
"application/json": components["schemas"]["UnauthorizedErrorDto"];
|
|
1707
2377
|
};
|
|
1708
2378
|
};
|
|
2379
|
+
/** @description When the requesting user is not allowed to perform this action */
|
|
2380
|
+
403: {
|
|
2381
|
+
headers: {
|
|
2382
|
+
[name: string]: unknown;
|
|
2383
|
+
};
|
|
2384
|
+
content: {
|
|
2385
|
+
"application/json": components["schemas"]["ForbiddenErrorDto"];
|
|
2386
|
+
};
|
|
2387
|
+
};
|
|
1709
2388
|
};
|
|
1710
2389
|
};
|
|
1711
2390
|
SignUpsController_findOne: {
|
|
@@ -1826,7 +2505,7 @@ export interface operations {
|
|
|
1826
2505
|
};
|
|
1827
2506
|
content?: never;
|
|
1828
2507
|
};
|
|
1829
|
-
/** @description When the
|
|
2508
|
+
/** @description When the request is invalid */
|
|
1830
2509
|
400: {
|
|
1831
2510
|
headers: {
|
|
1832
2511
|
[name: string]: unknown;
|