@rasadov/lumoar-sdk 2.1.2 → 2.1.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/dist/api.d.ts +150 -63
  2. package/dist/api.js +188 -70
  3. package/package.json +1 -1
package/dist/api.d.ts CHANGED
@@ -13,6 +13,25 @@ import type { Configuration } from './configuration';
13
13
  import type { AxiosPromise, AxiosInstance, RawAxiosRequestConfig } from 'axios';
14
14
  import type { RequestArgs } from './base';
15
15
  import { BaseAPI } from './base';
16
+ /**
17
+ * Response for AWS setup info: values the user must add to their IAM role trust policy for cross-account access. external_id is generated by the backend and stored briefly; the user must complete POST /aws/setup within the TTL window.
18
+ * @export
19
+ * @interface AWSSetupInfoResponse
20
+ */
21
+ export interface AWSSetupInfoResponse {
22
+ /**
23
+ *
24
+ * @type {string}
25
+ * @memberof AWSSetupInfoResponse
26
+ */
27
+ 'lumoar_account_id': string;
28
+ /**
29
+ *
30
+ * @type {string}
31
+ * @memberof AWSSetupInfoResponse
32
+ */
33
+ 'external_id': string;
34
+ }
16
35
  /**
17
36
  * Schema for actor information in API responses.
18
37
  * @export
@@ -410,6 +429,7 @@ export declare const AuditLogAction: {
410
429
  readonly Create: "create";
411
430
  readonly Update: "update";
412
431
  readonly Delete: "delete";
432
+ readonly Revoke: "revoke";
413
433
  };
414
434
  export type AuditLogAction = typeof AuditLogAction[keyof typeof AuditLogAction];
415
435
  /**
@@ -429,6 +449,7 @@ export declare const AuditLogEntity: {
429
449
  readonly Assets: "assets";
430
450
  readonly Risks: "risks";
431
451
  readonly Integrations: "integrations";
452
+ readonly ApiKeys: "api_keys";
432
453
  };
433
454
  export type AuditLogEntity = typeof AuditLogEntity[keyof typeof AuditLogEntity];
434
455
  /**
@@ -1073,7 +1094,7 @@ export interface ComplianceReportUploadConfirmRequest {
1073
1094
  'period_end'?: string | null;
1074
1095
  }
1075
1096
  /**
1076
- * Request to setup an AWS provider via cross-account IAM role access. This schema is used for configuring AWS cross-account access. Users create an IAM role in their AWS account and provide the role ARN and external ID. No AWS credentials are stored - only configuration for secure cross-account access.
1097
+ * Request to setup an AWS provider via cross-account IAM role access. Users create an IAM role in their AWS account using lumoar_account_id and external_id from GET /aws/setup-info, then provide the role ARN here. External ID is supplied by the backend (from setup-info), not the client.
1077
1098
  * @export
1078
1099
  * @interface ConnectAWSProviderRequest
1079
1100
  */
@@ -1096,12 +1117,6 @@ export interface ConnectAWSProviderRequest {
1096
1117
  * @memberof ConnectAWSProviderRequest
1097
1118
  */
1098
1119
  'role_arn': string;
1099
- /**
1100
- *
1101
- * @type {string}
1102
- * @memberof ConnectAWSProviderRequest
1103
- */
1104
- 'external_id': string;
1105
1120
  }
1106
1121
  /**
1107
1122
  *
@@ -2504,6 +2519,12 @@ export interface LinkProviderResponse {
2504
2519
  * @memberof LinkProviderResponse
2505
2520
  */
2506
2521
  'mappings_created': number;
2522
+ /**
2523
+ *
2524
+ * @type {string}
2525
+ * @memberof LinkProviderResponse
2526
+ */
2527
+ 'company_id'?: string | null;
2507
2528
  }
2508
2529
  /**
2509
2530
  * Response for listing audit logs
@@ -6869,6 +6890,14 @@ export declare const IntegrationsApiAxiosParamCreator: (configuration?: Configur
6869
6890
  * @throws {RequiredError}
6870
6891
  */
6871
6892
  integrationCreateSignalControlMapping: (xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
6893
+ /**
6894
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
6895
+ * @summary Get Aws Setup Info
6896
+ * @param {string} xCompanyId
6897
+ * @param {*} [options] Override http request option.
6898
+ * @throws {RequiredError}
6899
+ */
6900
+ integrationGetAwsSetupInfo: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
6872
6901
  /**
6873
6902
  * Get signal results for a specific control
6874
6903
  * @summary Get Signal Results For Control
@@ -6945,7 +6974,7 @@ export declare const IntegrationsApiAxiosParamCreator: (configuration?: Configur
6945
6974
  */
6946
6975
  integrationListSignals: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
6947
6976
  /**
6948
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
6977
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
6949
6978
  * @summary Setup Aws Provider
6950
6979
  * @param {string} xCompanyId
6951
6980
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -7006,6 +7035,14 @@ export declare const IntegrationsApiFp: (configuration?: Configuration) => {
7006
7035
  * @throws {RequiredError}
7007
7036
  */
7008
7037
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SignalControlMappingResponse>>;
7038
+ /**
7039
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
7040
+ * @summary Get Aws Setup Info
7041
+ * @param {string} xCompanyId
7042
+ * @param {*} [options] Override http request option.
7043
+ * @throws {RequiredError}
7044
+ */
7045
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AWSSetupInfoResponse>>;
7009
7046
  /**
7010
7047
  * Get signal results for a specific control
7011
7048
  * @summary Get Signal Results For Control
@@ -7082,7 +7119,7 @@ export declare const IntegrationsApiFp: (configuration?: Configuration) => {
7082
7119
  */
7083
7120
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ListSignalsResponse>>;
7084
7121
  /**
7085
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
7122
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
7086
7123
  * @summary Setup Aws Provider
7087
7124
  * @param {string} xCompanyId
7088
7125
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -7143,6 +7180,14 @@ export declare const IntegrationsApiFactory: (configuration?: Configuration, bas
7143
7180
  * @throws {RequiredError}
7144
7181
  */
7145
7182
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): AxiosPromise<SignalControlMappingResponse>;
7183
+ /**
7184
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
7185
+ * @summary Get Aws Setup Info
7186
+ * @param {string} xCompanyId
7187
+ * @param {*} [options] Override http request option.
7188
+ * @throws {RequiredError}
7189
+ */
7190
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<AWSSetupInfoResponse>;
7146
7191
  /**
7147
7192
  * Get signal results for a specific control
7148
7193
  * @summary Get Signal Results For Control
@@ -7219,7 +7264,7 @@ export declare const IntegrationsApiFactory: (configuration?: Configuration, bas
7219
7264
  */
7220
7265
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<ListSignalsResponse>;
7221
7266
  /**
7222
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
7267
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
7223
7268
  * @summary Setup Aws Provider
7224
7269
  * @param {string} xCompanyId
7225
7270
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -7283,6 +7328,15 @@ export declare class IntegrationsApi extends BaseAPI {
7283
7328
  * @memberof IntegrationsApi
7284
7329
  */
7285
7330
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SignalControlMappingResponse, any, {}>>;
7331
+ /**
7332
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
7333
+ * @summary Get Aws Setup Info
7334
+ * @param {string} xCompanyId
7335
+ * @param {*} [options] Override http request option.
7336
+ * @throws {RequiredError}
7337
+ * @memberof IntegrationsApi
7338
+ */
7339
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AWSSetupInfoResponse, any, {}>>;
7286
7340
  /**
7287
7341
  * Get signal results for a specific control
7288
7342
  * @summary Get Signal Results For Control
@@ -7367,7 +7421,7 @@ export declare class IntegrationsApi extends BaseAPI {
7367
7421
  */
7368
7422
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ListSignalsResponse, any, {}>>;
7369
7423
  /**
7370
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
7424
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
7371
7425
  * @summary Setup Aws Provider
7372
7426
  * @param {string} xCompanyId
7373
7427
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -8370,33 +8424,33 @@ export declare const TasksApiAxiosParamCreator: (configuration?: Configuration)
8370
8424
  * @summary List Tasks For Company
8371
8425
  * @param {number} page
8372
8426
  * @param {number} elements
8373
- * @param {string | null} dueDateFrom
8374
- * @param {string | null} dueDateTo
8375
- * @param {TaskPriority | null} priority
8376
- * @param {TaskStatus | null} status
8377
- * @param {OrderBy | null} orderBy
8427
+ * @param {string | null} [dueDateFrom]
8428
+ * @param {string | null} [dueDateTo]
8429
+ * @param {TaskPriority | null} [priority]
8430
+ * @param {TaskStatus | null} [status]
8431
+ * @param {OrderBy | null} [orderBy]
8378
8432
  * @param {TasksListTasksForCompanyOrderEnum} [order]
8379
8433
  * @param {string | null} [xCompanyId]
8380
8434
  * @param {*} [options] Override http request option.
8381
8435
  * @throws {RequiredError}
8382
8436
  */
8383
- tasksListTasksForCompany: (page: number, elements: number, dueDateFrom: string | null, dueDateTo: string | null, priority: TaskPriority | null, status: TaskStatus | null, orderBy: OrderBy | null, order?: TasksListTasksForCompanyOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
8437
+ tasksListTasksForCompany: (page: number, elements: number, dueDateFrom?: string | null, dueDateTo?: string | null, priority?: TaskPriority | null, status?: TaskStatus | null, orderBy?: OrderBy | null, order?: TasksListTasksForCompanyOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
8384
8438
  /**
8385
8439
  *
8386
8440
  * @summary List Tasks For User
8387
8441
  * @param {number} page
8388
8442
  * @param {number} elements
8389
- * @param {string | null} dueDateFrom
8390
- * @param {string | null} dueDateTo
8391
- * @param {TaskPriority | null} priority
8392
- * @param {TaskStatus | null} status
8393
- * @param {OrderBy | null} orderBy
8443
+ * @param {string | null} [dueDateFrom]
8444
+ * @param {string | null} [dueDateTo]
8445
+ * @param {TaskPriority | null} [priority]
8446
+ * @param {TaskStatus | null} [status]
8447
+ * @param {OrderBy | null} [orderBy]
8394
8448
  * @param {TasksListTasksForUserOrderEnum} [order]
8395
8449
  * @param {string | null} [xCompanyId]
8396
8450
  * @param {*} [options] Override http request option.
8397
8451
  * @throws {RequiredError}
8398
8452
  */
8399
- tasksListTasksForUser: (page: number, elements: number, dueDateFrom: string | null, dueDateTo: string | null, priority: TaskPriority | null, status: TaskStatus | null, orderBy: OrderBy | null, order?: TasksListTasksForUserOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
8453
+ tasksListTasksForUser: (page: number, elements: number, dueDateFrom?: string | null, dueDateTo?: string | null, priority?: TaskPriority | null, status?: TaskStatus | null, orderBy?: OrderBy | null, order?: TasksListTasksForUserOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
8400
8454
  /**
8401
8455
  *
8402
8456
  * @summary Request Task Scheduling
@@ -8470,33 +8524,33 @@ export declare const TasksApiFp: (configuration?: Configuration) => {
8470
8524
  * @summary List Tasks For Company
8471
8525
  * @param {number} page
8472
8526
  * @param {number} elements
8473
- * @param {string | null} dueDateFrom
8474
- * @param {string | null} dueDateTo
8475
- * @param {TaskPriority | null} priority
8476
- * @param {TaskStatus | null} status
8477
- * @param {OrderBy | null} orderBy
8527
+ * @param {string | null} [dueDateFrom]
8528
+ * @param {string | null} [dueDateTo]
8529
+ * @param {TaskPriority | null} [priority]
8530
+ * @param {TaskStatus | null} [status]
8531
+ * @param {OrderBy | null} [orderBy]
8478
8532
  * @param {TasksListTasksForCompanyOrderEnum} [order]
8479
8533
  * @param {string | null} [xCompanyId]
8480
8534
  * @param {*} [options] Override http request option.
8481
8535
  * @throws {RequiredError}
8482
8536
  */
8483
- tasksListTasksForCompany(page: number, elements: number, dueDateFrom: string | null, dueDateTo: string | null, priority: TaskPriority | null, status: TaskStatus | null, orderBy: OrderBy | null, order?: TasksListTasksForCompanyOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PaginationResponseTaskWithUser>>;
8537
+ tasksListTasksForCompany(page: number, elements: number, dueDateFrom?: string | null, dueDateTo?: string | null, priority?: TaskPriority | null, status?: TaskStatus | null, orderBy?: OrderBy | null, order?: TasksListTasksForCompanyOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PaginationResponseTaskWithUser>>;
8484
8538
  /**
8485
8539
  *
8486
8540
  * @summary List Tasks For User
8487
8541
  * @param {number} page
8488
8542
  * @param {number} elements
8489
- * @param {string | null} dueDateFrom
8490
- * @param {string | null} dueDateTo
8491
- * @param {TaskPriority | null} priority
8492
- * @param {TaskStatus | null} status
8493
- * @param {OrderBy | null} orderBy
8543
+ * @param {string | null} [dueDateFrom]
8544
+ * @param {string | null} [dueDateTo]
8545
+ * @param {TaskPriority | null} [priority]
8546
+ * @param {TaskStatus | null} [status]
8547
+ * @param {OrderBy | null} [orderBy]
8494
8548
  * @param {TasksListTasksForUserOrderEnum} [order]
8495
8549
  * @param {string | null} [xCompanyId]
8496
8550
  * @param {*} [options] Override http request option.
8497
8551
  * @throws {RequiredError}
8498
8552
  */
8499
- tasksListTasksForUser(page: number, elements: number, dueDateFrom: string | null, dueDateTo: string | null, priority: TaskPriority | null, status: TaskStatus | null, orderBy: OrderBy | null, order?: TasksListTasksForUserOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PaginationResponseTaskRead>>;
8553
+ tasksListTasksForUser(page: number, elements: number, dueDateFrom?: string | null, dueDateTo?: string | null, priority?: TaskPriority | null, status?: TaskStatus | null, orderBy?: OrderBy | null, order?: TasksListTasksForUserOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PaginationResponseTaskRead>>;
8500
8554
  /**
8501
8555
  *
8502
8556
  * @summary Request Task Scheduling
@@ -8570,33 +8624,33 @@ export declare const TasksApiFactory: (configuration?: Configuration, basePath?:
8570
8624
  * @summary List Tasks For Company
8571
8625
  * @param {number} page
8572
8626
  * @param {number} elements
8573
- * @param {string | null} dueDateFrom
8574
- * @param {string | null} dueDateTo
8575
- * @param {TaskPriority | null} priority
8576
- * @param {TaskStatus | null} status
8577
- * @param {OrderBy | null} orderBy
8627
+ * @param {string | null} [dueDateFrom]
8628
+ * @param {string | null} [dueDateTo]
8629
+ * @param {TaskPriority | null} [priority]
8630
+ * @param {TaskStatus | null} [status]
8631
+ * @param {OrderBy | null} [orderBy]
8578
8632
  * @param {TasksListTasksForCompanyOrderEnum} [order]
8579
8633
  * @param {string | null} [xCompanyId]
8580
8634
  * @param {*} [options] Override http request option.
8581
8635
  * @throws {RequiredError}
8582
8636
  */
8583
- tasksListTasksForCompany(page: number, elements: number, dueDateFrom: string | null, dueDateTo: string | null, priority: TaskPriority | null, status: TaskStatus | null, orderBy: OrderBy | null, order?: TasksListTasksForCompanyOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): AxiosPromise<PaginationResponseTaskWithUser>;
8637
+ tasksListTasksForCompany(page: number, elements: number, dueDateFrom?: string | null, dueDateTo?: string | null, priority?: TaskPriority | null, status?: TaskStatus | null, orderBy?: OrderBy | null, order?: TasksListTasksForCompanyOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): AxiosPromise<PaginationResponseTaskWithUser>;
8584
8638
  /**
8585
8639
  *
8586
8640
  * @summary List Tasks For User
8587
8641
  * @param {number} page
8588
8642
  * @param {number} elements
8589
- * @param {string | null} dueDateFrom
8590
- * @param {string | null} dueDateTo
8591
- * @param {TaskPriority | null} priority
8592
- * @param {TaskStatus | null} status
8593
- * @param {OrderBy | null} orderBy
8643
+ * @param {string | null} [dueDateFrom]
8644
+ * @param {string | null} [dueDateTo]
8645
+ * @param {TaskPriority | null} [priority]
8646
+ * @param {TaskStatus | null} [status]
8647
+ * @param {OrderBy | null} [orderBy]
8594
8648
  * @param {TasksListTasksForUserOrderEnum} [order]
8595
8649
  * @param {string | null} [xCompanyId]
8596
8650
  * @param {*} [options] Override http request option.
8597
8651
  * @throws {RequiredError}
8598
8652
  */
8599
- tasksListTasksForUser(page: number, elements: number, dueDateFrom: string | null, dueDateTo: string | null, priority: TaskPriority | null, status: TaskStatus | null, orderBy: OrderBy | null, order?: TasksListTasksForUserOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): AxiosPromise<PaginationResponseTaskRead>;
8653
+ tasksListTasksForUser(page: number, elements: number, dueDateFrom?: string | null, dueDateTo?: string | null, priority?: TaskPriority | null, status?: TaskStatus | null, orderBy?: OrderBy | null, order?: TasksListTasksForUserOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): AxiosPromise<PaginationResponseTaskRead>;
8600
8654
  /**
8601
8655
  *
8602
8656
  * @summary Request Task Scheduling
@@ -8676,35 +8730,35 @@ export declare class TasksApi extends BaseAPI {
8676
8730
  * @summary List Tasks For Company
8677
8731
  * @param {number} page
8678
8732
  * @param {number} elements
8679
- * @param {string | null} dueDateFrom
8680
- * @param {string | null} dueDateTo
8681
- * @param {TaskPriority | null} priority
8682
- * @param {TaskStatus | null} status
8683
- * @param {OrderBy | null} orderBy
8733
+ * @param {string | null} [dueDateFrom]
8734
+ * @param {string | null} [dueDateTo]
8735
+ * @param {TaskPriority | null} [priority]
8736
+ * @param {TaskStatus | null} [status]
8737
+ * @param {OrderBy | null} [orderBy]
8684
8738
  * @param {TasksListTasksForCompanyOrderEnum} [order]
8685
8739
  * @param {string | null} [xCompanyId]
8686
8740
  * @param {*} [options] Override http request option.
8687
8741
  * @throws {RequiredError}
8688
8742
  * @memberof TasksApi
8689
8743
  */
8690
- tasksListTasksForCompany(page: number, elements: number, dueDateFrom: string | null, dueDateTo: string | null, priority: TaskPriority | null, status: TaskStatus | null, orderBy: OrderBy | null, order?: TasksListTasksForCompanyOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PaginationResponseTaskWithUser, any, {}>>;
8744
+ tasksListTasksForCompany(page: number, elements: number, dueDateFrom?: string | null, dueDateTo?: string | null, priority?: TaskPriority | null, status?: TaskStatus | null, orderBy?: OrderBy | null, order?: TasksListTasksForCompanyOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PaginationResponseTaskWithUser, any, {}>>;
8691
8745
  /**
8692
8746
  *
8693
8747
  * @summary List Tasks For User
8694
8748
  * @param {number} page
8695
8749
  * @param {number} elements
8696
- * @param {string | null} dueDateFrom
8697
- * @param {string | null} dueDateTo
8698
- * @param {TaskPriority | null} priority
8699
- * @param {TaskStatus | null} status
8700
- * @param {OrderBy | null} orderBy
8750
+ * @param {string | null} [dueDateFrom]
8751
+ * @param {string | null} [dueDateTo]
8752
+ * @param {TaskPriority | null} [priority]
8753
+ * @param {TaskStatus | null} [status]
8754
+ * @param {OrderBy | null} [orderBy]
8701
8755
  * @param {TasksListTasksForUserOrderEnum} [order]
8702
8756
  * @param {string | null} [xCompanyId]
8703
8757
  * @param {*} [options] Override http request option.
8704
8758
  * @throws {RequiredError}
8705
8759
  * @memberof TasksApi
8706
8760
  */
8707
- tasksListTasksForUser(page: number, elements: number, dueDateFrom: string | null, dueDateTo: string | null, priority: TaskPriority | null, status: TaskStatus | null, orderBy: OrderBy | null, order?: TasksListTasksForUserOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PaginationResponseTaskRead, any, {}>>;
8761
+ tasksListTasksForUser(page: number, elements: number, dueDateFrom?: string | null, dueDateTo?: string | null, priority?: TaskPriority | null, status?: TaskStatus | null, orderBy?: OrderBy | null, order?: TasksListTasksForUserOrderEnum, xCompanyId?: string | null, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<PaginationResponseTaskRead, any, {}>>;
8708
8762
  /**
8709
8763
  *
8710
8764
  * @summary Request Task Scheduling
@@ -9135,6 +9189,14 @@ export declare const V2ApiAxiosParamCreator: (configuration?: Configuration) =>
9135
9189
  * @throws {RequiredError}
9136
9190
  */
9137
9191
  integrationCreateSignalControlMapping: (xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
9192
+ /**
9193
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9194
+ * @summary Get Aws Setup Info
9195
+ * @param {string} xCompanyId
9196
+ * @param {*} [options] Override http request option.
9197
+ * @throws {RequiredError}
9198
+ */
9199
+ integrationGetAwsSetupInfo: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
9138
9200
  /**
9139
9201
  * Get signal results for a specific control
9140
9202
  * @summary Get Signal Results For Control
@@ -9211,7 +9273,7 @@ export declare const V2ApiAxiosParamCreator: (configuration?: Configuration) =>
9211
9273
  */
9212
9274
  integrationListSignals: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
9213
9275
  /**
9214
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9276
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9215
9277
  * @summary Setup Aws Provider
9216
9278
  * @param {string} xCompanyId
9217
9279
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9307,6 +9369,14 @@ export declare const V2ApiFp: (configuration?: Configuration) => {
9307
9369
  * @throws {RequiredError}
9308
9370
  */
9309
9371
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SignalControlMappingResponse>>;
9372
+ /**
9373
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9374
+ * @summary Get Aws Setup Info
9375
+ * @param {string} xCompanyId
9376
+ * @param {*} [options] Override http request option.
9377
+ * @throws {RequiredError}
9378
+ */
9379
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AWSSetupInfoResponse>>;
9310
9380
  /**
9311
9381
  * Get signal results for a specific control
9312
9382
  * @summary Get Signal Results For Control
@@ -9383,7 +9453,7 @@ export declare const V2ApiFp: (configuration?: Configuration) => {
9383
9453
  */
9384
9454
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ListSignalsResponse>>;
9385
9455
  /**
9386
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9456
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9387
9457
  * @summary Setup Aws Provider
9388
9458
  * @param {string} xCompanyId
9389
9459
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9479,6 +9549,14 @@ export declare const V2ApiFactory: (configuration?: Configuration, basePath?: st
9479
9549
  * @throws {RequiredError}
9480
9550
  */
9481
9551
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): AxiosPromise<SignalControlMappingResponse>;
9552
+ /**
9553
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9554
+ * @summary Get Aws Setup Info
9555
+ * @param {string} xCompanyId
9556
+ * @param {*} [options] Override http request option.
9557
+ * @throws {RequiredError}
9558
+ */
9559
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<AWSSetupInfoResponse>;
9482
9560
  /**
9483
9561
  * Get signal results for a specific control
9484
9562
  * @summary Get Signal Results For Control
@@ -9555,7 +9633,7 @@ export declare const V2ApiFactory: (configuration?: Configuration, basePath?: st
9555
9633
  */
9556
9634
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<ListSignalsResponse>;
9557
9635
  /**
9558
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9636
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9559
9637
  * @summary Setup Aws Provider
9560
9638
  * @param {string} xCompanyId
9561
9639
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9654,6 +9732,15 @@ export declare class V2Api extends BaseAPI {
9654
9732
  * @memberof V2Api
9655
9733
  */
9656
9734
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SignalControlMappingResponse, any, {}>>;
9735
+ /**
9736
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9737
+ * @summary Get Aws Setup Info
9738
+ * @param {string} xCompanyId
9739
+ * @param {*} [options] Override http request option.
9740
+ * @throws {RequiredError}
9741
+ * @memberof V2Api
9742
+ */
9743
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AWSSetupInfoResponse, any, {}>>;
9657
9744
  /**
9658
9745
  * Get signal results for a specific control
9659
9746
  * @summary Get Signal Results For Control
@@ -9738,7 +9825,7 @@ export declare class V2Api extends BaseAPI {
9738
9825
  */
9739
9826
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ListSignalsResponse, any, {}>>;
9740
9827
  /**
9741
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9828
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9742
9829
  * @summary Setup Aws Provider
9743
9830
  * @param {string} xCompanyId
9744
9831
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
package/dist/api.js CHANGED
@@ -45,7 +45,8 @@ export const AuditLogAction = {
45
45
  Invite: 'invite',
46
46
  Create: 'create',
47
47
  Update: 'update',
48
- Delete: 'delete'
48
+ Delete: 'delete',
49
+ Revoke: 'revoke'
49
50
  };
50
51
  /**
51
52
  *
@@ -63,7 +64,8 @@ export const AuditLogEntity = {
63
64
  Vendors: 'vendors',
64
65
  Assets: 'assets',
65
66
  Risks: 'risks',
66
- Integrations: 'integrations'
67
+ Integrations: 'integrations',
68
+ ApiKeys: 'api_keys'
67
69
  };
68
70
  /**
69
71
  *
@@ -3809,6 +3811,37 @@ export const IntegrationsApiAxiosParamCreator = function (configuration) {
3809
3811
  options: localVarRequestOptions,
3810
3812
  };
3811
3813
  }),
3814
+ /**
3815
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
3816
+ * @summary Get Aws Setup Info
3817
+ * @param {string} xCompanyId
3818
+ * @param {*} [options] Override http request option.
3819
+ * @throws {RequiredError}
3820
+ */
3821
+ integrationGetAwsSetupInfo: (xCompanyId_1, ...args_1) => __awaiter(this, [xCompanyId_1, ...args_1], void 0, function* (xCompanyId, options = {}) {
3822
+ // verify required parameter 'xCompanyId' is not null or undefined
3823
+ assertParamExists('integrationGetAwsSetupInfo', 'xCompanyId', xCompanyId);
3824
+ const localVarPath = `/v2/integrations/providers/aws/setup-info`;
3825
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
3826
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
3827
+ let baseOptions;
3828
+ if (configuration) {
3829
+ baseOptions = configuration.baseOptions;
3830
+ }
3831
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
3832
+ const localVarHeaderParameter = {};
3833
+ const localVarQueryParameter = {};
3834
+ if (xCompanyId != null) {
3835
+ localVarHeaderParameter['X-Company-Id'] = String(xCompanyId);
3836
+ }
3837
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
3838
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
3839
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
3840
+ return {
3841
+ url: toPathString(localVarUrlObj),
3842
+ options: localVarRequestOptions,
3843
+ };
3844
+ }),
3812
3845
  /**
3813
3846
  * Get signal results for a specific control
3814
3847
  * @summary Get Signal Results For Control
@@ -4106,7 +4139,7 @@ export const IntegrationsApiAxiosParamCreator = function (configuration) {
4106
4139
  };
4107
4140
  }),
4108
4141
  /**
4109
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
4142
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4110
4143
  * @summary Setup Aws Provider
4111
4144
  * @param {string} xCompanyId
4112
4145
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -4319,6 +4352,22 @@ export const IntegrationsApiFp = function (configuration) {
4319
4352
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
4320
4353
  });
4321
4354
  },
4355
+ /**
4356
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
4357
+ * @summary Get Aws Setup Info
4358
+ * @param {string} xCompanyId
4359
+ * @param {*} [options] Override http request option.
4360
+ * @throws {RequiredError}
4361
+ */
4362
+ integrationGetAwsSetupInfo(xCompanyId, options) {
4363
+ return __awaiter(this, void 0, void 0, function* () {
4364
+ var _a, _b, _c;
4365
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.integrationGetAwsSetupInfo(xCompanyId, options);
4366
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
4367
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['IntegrationsApi.integrationGetAwsSetupInfo']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
4368
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
4369
+ });
4370
+ },
4322
4371
  /**
4323
4372
  * Get signal results for a specific control
4324
4373
  * @summary Get Signal Results For Control
@@ -4459,7 +4508,7 @@ export const IntegrationsApiFp = function (configuration) {
4459
4508
  });
4460
4509
  },
4461
4510
  /**
4462
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
4511
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4463
4512
  * @summary Setup Aws Provider
4464
4513
  * @param {string} xCompanyId
4465
4514
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -4565,6 +4614,16 @@ export const IntegrationsApiFactory = function (configuration, basePath, axios)
4565
4614
  integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
4566
4615
  return localVarFp.integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(axios, basePath));
4567
4616
  },
4617
+ /**
4618
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
4619
+ * @summary Get Aws Setup Info
4620
+ * @param {string} xCompanyId
4621
+ * @param {*} [options] Override http request option.
4622
+ * @throws {RequiredError}
4623
+ */
4624
+ integrationGetAwsSetupInfo(xCompanyId, options) {
4625
+ return localVarFp.integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(axios, basePath));
4626
+ },
4568
4627
  /**
4569
4628
  * Get signal results for a specific control
4570
4629
  * @summary Get Signal Results For Control
@@ -4657,7 +4716,7 @@ export const IntegrationsApiFactory = function (configuration, basePath, axios)
4657
4716
  return localVarFp.integrationListSignals(xCompanyId, options).then((request) => request(axios, basePath));
4658
4717
  },
4659
4718
  /**
4660
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
4719
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4661
4720
  * @summary Setup Aws Provider
4662
4721
  * @param {string} xCompanyId
4663
4722
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -4734,6 +4793,17 @@ export class IntegrationsApi extends BaseAPI {
4734
4793
  integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
4735
4794
  return IntegrationsApiFp(this.configuration).integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(this.axios, this.basePath));
4736
4795
  }
4796
+ /**
4797
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
4798
+ * @summary Get Aws Setup Info
4799
+ * @param {string} xCompanyId
4800
+ * @param {*} [options] Override http request option.
4801
+ * @throws {RequiredError}
4802
+ * @memberof IntegrationsApi
4803
+ */
4804
+ integrationGetAwsSetupInfo(xCompanyId, options) {
4805
+ return IntegrationsApiFp(this.configuration).integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(this.axios, this.basePath));
4806
+ }
4737
4807
  /**
4738
4808
  * Get signal results for a specific control
4739
4809
  * @summary Get Signal Results For Control
@@ -4834,7 +4904,7 @@ export class IntegrationsApi extends BaseAPI {
4834
4904
  return IntegrationsApiFp(this.configuration).integrationListSignals(xCompanyId, options).then((request) => request(this.axios, this.basePath));
4835
4905
  }
4836
4906
  /**
4837
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
4907
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4838
4908
  * @summary Setup Aws Provider
4839
4909
  * @param {string} xCompanyId
4840
4910
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -6786,11 +6856,11 @@ export const TasksApiAxiosParamCreator = function (configuration) {
6786
6856
  * @summary List Tasks For Company
6787
6857
  * @param {number} page
6788
6858
  * @param {number} elements
6789
- * @param {string | null} dueDateFrom
6790
- * @param {string | null} dueDateTo
6791
- * @param {TaskPriority | null} priority
6792
- * @param {TaskStatus | null} status
6793
- * @param {OrderBy | null} orderBy
6859
+ * @param {string | null} [dueDateFrom]
6860
+ * @param {string | null} [dueDateTo]
6861
+ * @param {TaskPriority | null} [priority]
6862
+ * @param {TaskStatus | null} [status]
6863
+ * @param {OrderBy | null} [orderBy]
6794
6864
  * @param {TasksListTasksForCompanyOrderEnum} [order]
6795
6865
  * @param {string | null} [xCompanyId]
6796
6866
  * @param {*} [options] Override http request option.
@@ -6801,16 +6871,6 @@ export const TasksApiAxiosParamCreator = function (configuration) {
6801
6871
  assertParamExists('tasksListTasksForCompany', 'page', page);
6802
6872
  // verify required parameter 'elements' is not null or undefined
6803
6873
  assertParamExists('tasksListTasksForCompany', 'elements', elements);
6804
- // verify required parameter 'dueDateFrom' is not null or undefined
6805
- assertParamExists('tasksListTasksForCompany', 'dueDateFrom', dueDateFrom);
6806
- // verify required parameter 'dueDateTo' is not null or undefined
6807
- assertParamExists('tasksListTasksForCompany', 'dueDateTo', dueDateTo);
6808
- // verify required parameter 'priority' is not null or undefined
6809
- assertParamExists('tasksListTasksForCompany', 'priority', priority);
6810
- // verify required parameter 'status' is not null or undefined
6811
- assertParamExists('tasksListTasksForCompany', 'status', status);
6812
- // verify required parameter 'orderBy' is not null or undefined
6813
- assertParamExists('tasksListTasksForCompany', 'orderBy', orderBy);
6814
6874
  const localVarPath = `/v1/tasks/company`;
6815
6875
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
6816
6876
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
@@ -6865,11 +6925,11 @@ export const TasksApiAxiosParamCreator = function (configuration) {
6865
6925
  * @summary List Tasks For User
6866
6926
  * @param {number} page
6867
6927
  * @param {number} elements
6868
- * @param {string | null} dueDateFrom
6869
- * @param {string | null} dueDateTo
6870
- * @param {TaskPriority | null} priority
6871
- * @param {TaskStatus | null} status
6872
- * @param {OrderBy | null} orderBy
6928
+ * @param {string | null} [dueDateFrom]
6929
+ * @param {string | null} [dueDateTo]
6930
+ * @param {TaskPriority | null} [priority]
6931
+ * @param {TaskStatus | null} [status]
6932
+ * @param {OrderBy | null} [orderBy]
6873
6933
  * @param {TasksListTasksForUserOrderEnum} [order]
6874
6934
  * @param {string | null} [xCompanyId]
6875
6935
  * @param {*} [options] Override http request option.
@@ -6880,16 +6940,6 @@ export const TasksApiAxiosParamCreator = function (configuration) {
6880
6940
  assertParamExists('tasksListTasksForUser', 'page', page);
6881
6941
  // verify required parameter 'elements' is not null or undefined
6882
6942
  assertParamExists('tasksListTasksForUser', 'elements', elements);
6883
- // verify required parameter 'dueDateFrom' is not null or undefined
6884
- assertParamExists('tasksListTasksForUser', 'dueDateFrom', dueDateFrom);
6885
- // verify required parameter 'dueDateTo' is not null or undefined
6886
- assertParamExists('tasksListTasksForUser', 'dueDateTo', dueDateTo);
6887
- // verify required parameter 'priority' is not null or undefined
6888
- assertParamExists('tasksListTasksForUser', 'priority', priority);
6889
- // verify required parameter 'status' is not null or undefined
6890
- assertParamExists('tasksListTasksForUser', 'status', status);
6891
- // verify required parameter 'orderBy' is not null or undefined
6892
- assertParamExists('tasksListTasksForUser', 'orderBy', orderBy);
6893
6943
  const localVarPath = `/v1/tasks/me`;
6894
6944
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
6895
6945
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
@@ -7122,11 +7172,11 @@ export const TasksApiFp = function (configuration) {
7122
7172
  * @summary List Tasks For Company
7123
7173
  * @param {number} page
7124
7174
  * @param {number} elements
7125
- * @param {string | null} dueDateFrom
7126
- * @param {string | null} dueDateTo
7127
- * @param {TaskPriority | null} priority
7128
- * @param {TaskStatus | null} status
7129
- * @param {OrderBy | null} orderBy
7175
+ * @param {string | null} [dueDateFrom]
7176
+ * @param {string | null} [dueDateTo]
7177
+ * @param {TaskPriority | null} [priority]
7178
+ * @param {TaskStatus | null} [status]
7179
+ * @param {OrderBy | null} [orderBy]
7130
7180
  * @param {TasksListTasksForCompanyOrderEnum} [order]
7131
7181
  * @param {string | null} [xCompanyId]
7132
7182
  * @param {*} [options] Override http request option.
@@ -7146,11 +7196,11 @@ export const TasksApiFp = function (configuration) {
7146
7196
  * @summary List Tasks For User
7147
7197
  * @param {number} page
7148
7198
  * @param {number} elements
7149
- * @param {string | null} dueDateFrom
7150
- * @param {string | null} dueDateTo
7151
- * @param {TaskPriority | null} priority
7152
- * @param {TaskStatus | null} status
7153
- * @param {OrderBy | null} orderBy
7199
+ * @param {string | null} [dueDateFrom]
7200
+ * @param {string | null} [dueDateTo]
7201
+ * @param {TaskPriority | null} [priority]
7202
+ * @param {TaskStatus | null} [status]
7203
+ * @param {OrderBy | null} [orderBy]
7154
7204
  * @param {TasksListTasksForUserOrderEnum} [order]
7155
7205
  * @param {string | null} [xCompanyId]
7156
7206
  * @param {*} [options] Override http request option.
@@ -7273,11 +7323,11 @@ export const TasksApiFactory = function (configuration, basePath, axios) {
7273
7323
  * @summary List Tasks For Company
7274
7324
  * @param {number} page
7275
7325
  * @param {number} elements
7276
- * @param {string | null} dueDateFrom
7277
- * @param {string | null} dueDateTo
7278
- * @param {TaskPriority | null} priority
7279
- * @param {TaskStatus | null} status
7280
- * @param {OrderBy | null} orderBy
7326
+ * @param {string | null} [dueDateFrom]
7327
+ * @param {string | null} [dueDateTo]
7328
+ * @param {TaskPriority | null} [priority]
7329
+ * @param {TaskStatus | null} [status]
7330
+ * @param {OrderBy | null} [orderBy]
7281
7331
  * @param {TasksListTasksForCompanyOrderEnum} [order]
7282
7332
  * @param {string | null} [xCompanyId]
7283
7333
  * @param {*} [options] Override http request option.
@@ -7291,11 +7341,11 @@ export const TasksApiFactory = function (configuration, basePath, axios) {
7291
7341
  * @summary List Tasks For User
7292
7342
  * @param {number} page
7293
7343
  * @param {number} elements
7294
- * @param {string | null} dueDateFrom
7295
- * @param {string | null} dueDateTo
7296
- * @param {TaskPriority | null} priority
7297
- * @param {TaskStatus | null} status
7298
- * @param {OrderBy | null} orderBy
7344
+ * @param {string | null} [dueDateFrom]
7345
+ * @param {string | null} [dueDateTo]
7346
+ * @param {TaskPriority | null} [priority]
7347
+ * @param {TaskStatus | null} [status]
7348
+ * @param {OrderBy | null} [orderBy]
7299
7349
  * @param {TasksListTasksForUserOrderEnum} [order]
7300
7350
  * @param {string | null} [xCompanyId]
7301
7351
  * @param {*} [options] Override http request option.
@@ -7398,11 +7448,11 @@ export class TasksApi extends BaseAPI {
7398
7448
  * @summary List Tasks For Company
7399
7449
  * @param {number} page
7400
7450
  * @param {number} elements
7401
- * @param {string | null} dueDateFrom
7402
- * @param {string | null} dueDateTo
7403
- * @param {TaskPriority | null} priority
7404
- * @param {TaskStatus | null} status
7405
- * @param {OrderBy | null} orderBy
7451
+ * @param {string | null} [dueDateFrom]
7452
+ * @param {string | null} [dueDateTo]
7453
+ * @param {TaskPriority | null} [priority]
7454
+ * @param {TaskStatus | null} [status]
7455
+ * @param {OrderBy | null} [orderBy]
7406
7456
  * @param {TasksListTasksForCompanyOrderEnum} [order]
7407
7457
  * @param {string | null} [xCompanyId]
7408
7458
  * @param {*} [options] Override http request option.
@@ -7417,11 +7467,11 @@ export class TasksApi extends BaseAPI {
7417
7467
  * @summary List Tasks For User
7418
7468
  * @param {number} page
7419
7469
  * @param {number} elements
7420
- * @param {string | null} dueDateFrom
7421
- * @param {string | null} dueDateTo
7422
- * @param {TaskPriority | null} priority
7423
- * @param {TaskStatus | null} status
7424
- * @param {OrderBy | null} orderBy
7470
+ * @param {string | null} [dueDateFrom]
7471
+ * @param {string | null} [dueDateTo]
7472
+ * @param {TaskPriority | null} [priority]
7473
+ * @param {TaskStatus | null} [status]
7474
+ * @param {OrderBy | null} [orderBy]
7425
7475
  * @param {TasksListTasksForUserOrderEnum} [order]
7426
7476
  * @param {string | null} [xCompanyId]
7427
7477
  * @param {*} [options] Override http request option.
@@ -8256,6 +8306,37 @@ export const V2ApiAxiosParamCreator = function (configuration) {
8256
8306
  options: localVarRequestOptions,
8257
8307
  };
8258
8308
  }),
8309
+ /**
8310
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
8311
+ * @summary Get Aws Setup Info
8312
+ * @param {string} xCompanyId
8313
+ * @param {*} [options] Override http request option.
8314
+ * @throws {RequiredError}
8315
+ */
8316
+ integrationGetAwsSetupInfo: (xCompanyId_1, ...args_1) => __awaiter(this, [xCompanyId_1, ...args_1], void 0, function* (xCompanyId, options = {}) {
8317
+ // verify required parameter 'xCompanyId' is not null or undefined
8318
+ assertParamExists('integrationGetAwsSetupInfo', 'xCompanyId', xCompanyId);
8319
+ const localVarPath = `/v2/integrations/providers/aws/setup-info`;
8320
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
8321
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
8322
+ let baseOptions;
8323
+ if (configuration) {
8324
+ baseOptions = configuration.baseOptions;
8325
+ }
8326
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
8327
+ const localVarHeaderParameter = {};
8328
+ const localVarQueryParameter = {};
8329
+ if (xCompanyId != null) {
8330
+ localVarHeaderParameter['X-Company-Id'] = String(xCompanyId);
8331
+ }
8332
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
8333
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
8334
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
8335
+ return {
8336
+ url: toPathString(localVarUrlObj),
8337
+ options: localVarRequestOptions,
8338
+ };
8339
+ }),
8259
8340
  /**
8260
8341
  * Get signal results for a specific control
8261
8342
  * @summary Get Signal Results For Control
@@ -8553,7 +8634,7 @@ export const V2ApiAxiosParamCreator = function (configuration) {
8553
8634
  };
8554
8635
  }),
8555
8636
  /**
8556
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
8637
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
8557
8638
  * @summary Setup Aws Provider
8558
8639
  * @param {string} xCompanyId
8559
8640
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -8903,6 +8984,22 @@ export const V2ApiFp = function (configuration) {
8903
8984
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
8904
8985
  });
8905
8986
  },
8987
+ /**
8988
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
8989
+ * @summary Get Aws Setup Info
8990
+ * @param {string} xCompanyId
8991
+ * @param {*} [options] Override http request option.
8992
+ * @throws {RequiredError}
8993
+ */
8994
+ integrationGetAwsSetupInfo(xCompanyId, options) {
8995
+ return __awaiter(this, void 0, void 0, function* () {
8996
+ var _a, _b, _c;
8997
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.integrationGetAwsSetupInfo(xCompanyId, options);
8998
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
8999
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['V2Api.integrationGetAwsSetupInfo']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
9000
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
9001
+ });
9002
+ },
8906
9003
  /**
8907
9004
  * Get signal results for a specific control
8908
9005
  * @summary Get Signal Results For Control
@@ -9043,7 +9140,7 @@ export const V2ApiFp = function (configuration) {
9043
9140
  });
9044
9141
  },
9045
9142
  /**
9046
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9143
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9047
9144
  * @summary Setup Aws Provider
9048
9145
  * @param {string} xCompanyId
9049
9146
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9216,6 +9313,16 @@ export const V2ApiFactory = function (configuration, basePath, axios) {
9216
9313
  integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
9217
9314
  return localVarFp.integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(axios, basePath));
9218
9315
  },
9316
+ /**
9317
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9318
+ * @summary Get Aws Setup Info
9319
+ * @param {string} xCompanyId
9320
+ * @param {*} [options] Override http request option.
9321
+ * @throws {RequiredError}
9322
+ */
9323
+ integrationGetAwsSetupInfo(xCompanyId, options) {
9324
+ return localVarFp.integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(axios, basePath));
9325
+ },
9219
9326
  /**
9220
9327
  * Get signal results for a specific control
9221
9328
  * @summary Get Signal Results For Control
@@ -9308,7 +9415,7 @@ export const V2ApiFactory = function (configuration, basePath, axios) {
9308
9415
  return localVarFp.integrationListSignals(xCompanyId, options).then((request) => request(axios, basePath));
9309
9416
  },
9310
9417
  /**
9311
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9418
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9312
9419
  * @summary Setup Aws Provider
9313
9420
  * @param {string} xCompanyId
9314
9421
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9428,6 +9535,17 @@ export class V2Api extends BaseAPI {
9428
9535
  integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
9429
9536
  return V2ApiFp(this.configuration).integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(this.axios, this.basePath));
9430
9537
  }
9538
+ /**
9539
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9540
+ * @summary Get Aws Setup Info
9541
+ * @param {string} xCompanyId
9542
+ * @param {*} [options] Override http request option.
9543
+ * @throws {RequiredError}
9544
+ * @memberof V2Api
9545
+ */
9546
+ integrationGetAwsSetupInfo(xCompanyId, options) {
9547
+ return V2ApiFp(this.configuration).integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(this.axios, this.basePath));
9548
+ }
9431
9549
  /**
9432
9550
  * Get signal results for a specific control
9433
9551
  * @summary Get Signal Results For Control
@@ -9528,7 +9646,7 @@ export class V2Api extends BaseAPI {
9528
9646
  return V2ApiFp(this.configuration).integrationListSignals(xCompanyId, options).then((request) => request(this.axios, this.basePath));
9529
9647
  }
9530
9648
  /**
9531
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9649
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9532
9650
  * @summary Setup Aws Provider
9533
9651
  * @param {string} xCompanyId
9534
9652
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@rasadov/lumoar-sdk",
3
- "version": "2.1.2",
3
+ "version": "2.1.4",
4
4
  "description": "Lumoar API SDK for dashboard use (session-based authentication)",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/index.d.ts",