@rasadov/lumoar-sdk 2.1.3 → 2.1.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/dist/api.d.ts +102 -15
  2. package/dist/api.js +148 -10
  3. package/package.json +1 -1
package/dist/api.d.ts CHANGED
@@ -13,6 +13,25 @@ import type { Configuration } from './configuration';
13
13
  import type { AxiosPromise, AxiosInstance, RawAxiosRequestConfig } from 'axios';
14
14
  import type { RequestArgs } from './base';
15
15
  import { BaseAPI } from './base';
16
+ /**
17
+ * Response for AWS setup info: values the user must add to their IAM role trust policy for cross-account access. external_id is generated by the backend and stored briefly; the user must complete POST /aws/setup within the TTL window.
18
+ * @export
19
+ * @interface AWSSetupInfoResponse
20
+ */
21
+ export interface AWSSetupInfoResponse {
22
+ /**
23
+ *
24
+ * @type {string}
25
+ * @memberof AWSSetupInfoResponse
26
+ */
27
+ 'lumoar_account_id': string;
28
+ /**
29
+ *
30
+ * @type {string}
31
+ * @memberof AWSSetupInfoResponse
32
+ */
33
+ 'external_id': string;
34
+ }
16
35
  /**
17
36
  * Schema for actor information in API responses.
18
37
  * @export
@@ -410,6 +429,7 @@ export declare const AuditLogAction: {
410
429
  readonly Create: "create";
411
430
  readonly Update: "update";
412
431
  readonly Delete: "delete";
432
+ readonly Revoke: "revoke";
413
433
  };
414
434
  export type AuditLogAction = typeof AuditLogAction[keyof typeof AuditLogAction];
415
435
  /**
@@ -429,6 +449,7 @@ export declare const AuditLogEntity: {
429
449
  readonly Assets: "assets";
430
450
  readonly Risks: "risks";
431
451
  readonly Integrations: "integrations";
452
+ readonly ApiKeys: "api_keys";
432
453
  };
433
454
  export type AuditLogEntity = typeof AuditLogEntity[keyof typeof AuditLogEntity];
434
455
  /**
@@ -1073,7 +1094,7 @@ export interface ComplianceReportUploadConfirmRequest {
1073
1094
  'period_end'?: string | null;
1074
1095
  }
1075
1096
  /**
1076
- * Request to setup an AWS provider via cross-account IAM role access. This schema is used for configuring AWS cross-account access. Users create an IAM role in their AWS account and provide the role ARN and external ID. No AWS credentials are stored - only configuration for secure cross-account access.
1097
+ * Request to setup an AWS provider via cross-account IAM role access. Users create an IAM role in their AWS account using lumoar_account_id and external_id from GET /aws/setup-info, then provide the role ARN here. External ID is supplied by the backend (from setup-info), not the client.
1077
1098
  * @export
1078
1099
  * @interface ConnectAWSProviderRequest
1079
1100
  */
@@ -1096,12 +1117,6 @@ export interface ConnectAWSProviderRequest {
1096
1117
  * @memberof ConnectAWSProviderRequest
1097
1118
  */
1098
1119
  'role_arn': string;
1099
- /**
1100
- *
1101
- * @type {string}
1102
- * @memberof ConnectAWSProviderRequest
1103
- */
1104
- 'external_id': string;
1105
1120
  }
1106
1121
  /**
1107
1122
  *
@@ -2504,6 +2519,12 @@ export interface LinkProviderResponse {
2504
2519
  * @memberof LinkProviderResponse
2505
2520
  */
2506
2521
  'mappings_created': number;
2522
+ /**
2523
+ *
2524
+ * @type {string}
2525
+ * @memberof LinkProviderResponse
2526
+ */
2527
+ 'company_id'?: string | null;
2507
2528
  }
2508
2529
  /**
2509
2530
  * Response for listing audit logs
@@ -6869,6 +6890,14 @@ export declare const IntegrationsApiAxiosParamCreator: (configuration?: Configur
6869
6890
  * @throws {RequiredError}
6870
6891
  */
6871
6892
  integrationCreateSignalControlMapping: (xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
6893
+ /**
6894
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
6895
+ * @summary Get Aws Setup Info
6896
+ * @param {string} xCompanyId
6897
+ * @param {*} [options] Override http request option.
6898
+ * @throws {RequiredError}
6899
+ */
6900
+ integrationGetAwsSetupInfo: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
6872
6901
  /**
6873
6902
  * Get signal results for a specific control
6874
6903
  * @summary Get Signal Results For Control
@@ -6945,7 +6974,7 @@ export declare const IntegrationsApiAxiosParamCreator: (configuration?: Configur
6945
6974
  */
6946
6975
  integrationListSignals: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
6947
6976
  /**
6948
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
6977
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
6949
6978
  * @summary Setup Aws Provider
6950
6979
  * @param {string} xCompanyId
6951
6980
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -7006,6 +7035,14 @@ export declare const IntegrationsApiFp: (configuration?: Configuration) => {
7006
7035
  * @throws {RequiredError}
7007
7036
  */
7008
7037
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SignalControlMappingResponse>>;
7038
+ /**
7039
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
7040
+ * @summary Get Aws Setup Info
7041
+ * @param {string} xCompanyId
7042
+ * @param {*} [options] Override http request option.
7043
+ * @throws {RequiredError}
7044
+ */
7045
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AWSSetupInfoResponse>>;
7009
7046
  /**
7010
7047
  * Get signal results for a specific control
7011
7048
  * @summary Get Signal Results For Control
@@ -7082,7 +7119,7 @@ export declare const IntegrationsApiFp: (configuration?: Configuration) => {
7082
7119
  */
7083
7120
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ListSignalsResponse>>;
7084
7121
  /**
7085
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
7122
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
7086
7123
  * @summary Setup Aws Provider
7087
7124
  * @param {string} xCompanyId
7088
7125
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -7143,6 +7180,14 @@ export declare const IntegrationsApiFactory: (configuration?: Configuration, bas
7143
7180
  * @throws {RequiredError}
7144
7181
  */
7145
7182
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): AxiosPromise<SignalControlMappingResponse>;
7183
+ /**
7184
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
7185
+ * @summary Get Aws Setup Info
7186
+ * @param {string} xCompanyId
7187
+ * @param {*} [options] Override http request option.
7188
+ * @throws {RequiredError}
7189
+ */
7190
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<AWSSetupInfoResponse>;
7146
7191
  /**
7147
7192
  * Get signal results for a specific control
7148
7193
  * @summary Get Signal Results For Control
@@ -7219,7 +7264,7 @@ export declare const IntegrationsApiFactory: (configuration?: Configuration, bas
7219
7264
  */
7220
7265
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<ListSignalsResponse>;
7221
7266
  /**
7222
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
7267
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
7223
7268
  * @summary Setup Aws Provider
7224
7269
  * @param {string} xCompanyId
7225
7270
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -7283,6 +7328,15 @@ export declare class IntegrationsApi extends BaseAPI {
7283
7328
  * @memberof IntegrationsApi
7284
7329
  */
7285
7330
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SignalControlMappingResponse, any, {}>>;
7331
+ /**
7332
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
7333
+ * @summary Get Aws Setup Info
7334
+ * @param {string} xCompanyId
7335
+ * @param {*} [options] Override http request option.
7336
+ * @throws {RequiredError}
7337
+ * @memberof IntegrationsApi
7338
+ */
7339
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AWSSetupInfoResponse, any, {}>>;
7286
7340
  /**
7287
7341
  * Get signal results for a specific control
7288
7342
  * @summary Get Signal Results For Control
@@ -7367,7 +7421,7 @@ export declare class IntegrationsApi extends BaseAPI {
7367
7421
  */
7368
7422
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ListSignalsResponse, any, {}>>;
7369
7423
  /**
7370
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
7424
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
7371
7425
  * @summary Setup Aws Provider
7372
7426
  * @param {string} xCompanyId
7373
7427
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9135,6 +9189,14 @@ export declare const V2ApiAxiosParamCreator: (configuration?: Configuration) =>
9135
9189
  * @throws {RequiredError}
9136
9190
  */
9137
9191
  integrationCreateSignalControlMapping: (xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
9192
+ /**
9193
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9194
+ * @summary Get Aws Setup Info
9195
+ * @param {string} xCompanyId
9196
+ * @param {*} [options] Override http request option.
9197
+ * @throws {RequiredError}
9198
+ */
9199
+ integrationGetAwsSetupInfo: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
9138
9200
  /**
9139
9201
  * Get signal results for a specific control
9140
9202
  * @summary Get Signal Results For Control
@@ -9211,7 +9273,7 @@ export declare const V2ApiAxiosParamCreator: (configuration?: Configuration) =>
9211
9273
  */
9212
9274
  integrationListSignals: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
9213
9275
  /**
9214
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9276
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9215
9277
  * @summary Setup Aws Provider
9216
9278
  * @param {string} xCompanyId
9217
9279
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9307,6 +9369,14 @@ export declare const V2ApiFp: (configuration?: Configuration) => {
9307
9369
  * @throws {RequiredError}
9308
9370
  */
9309
9371
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SignalControlMappingResponse>>;
9372
+ /**
9373
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9374
+ * @summary Get Aws Setup Info
9375
+ * @param {string} xCompanyId
9376
+ * @param {*} [options] Override http request option.
9377
+ * @throws {RequiredError}
9378
+ */
9379
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AWSSetupInfoResponse>>;
9310
9380
  /**
9311
9381
  * Get signal results for a specific control
9312
9382
  * @summary Get Signal Results For Control
@@ -9383,7 +9453,7 @@ export declare const V2ApiFp: (configuration?: Configuration) => {
9383
9453
  */
9384
9454
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ListSignalsResponse>>;
9385
9455
  /**
9386
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9456
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9387
9457
  * @summary Setup Aws Provider
9388
9458
  * @param {string} xCompanyId
9389
9459
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9479,6 +9549,14 @@ export declare const V2ApiFactory: (configuration?: Configuration, basePath?: st
9479
9549
  * @throws {RequiredError}
9480
9550
  */
9481
9551
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): AxiosPromise<SignalControlMappingResponse>;
9552
+ /**
9553
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9554
+ * @summary Get Aws Setup Info
9555
+ * @param {string} xCompanyId
9556
+ * @param {*} [options] Override http request option.
9557
+ * @throws {RequiredError}
9558
+ */
9559
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<AWSSetupInfoResponse>;
9482
9560
  /**
9483
9561
  * Get signal results for a specific control
9484
9562
  * @summary Get Signal Results For Control
@@ -9555,7 +9633,7 @@ export declare const V2ApiFactory: (configuration?: Configuration, basePath?: st
9555
9633
  */
9556
9634
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<ListSignalsResponse>;
9557
9635
  /**
9558
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9636
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9559
9637
  * @summary Setup Aws Provider
9560
9638
  * @param {string} xCompanyId
9561
9639
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9654,6 +9732,15 @@ export declare class V2Api extends BaseAPI {
9654
9732
  * @memberof V2Api
9655
9733
  */
9656
9734
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SignalControlMappingResponse, any, {}>>;
9735
+ /**
9736
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9737
+ * @summary Get Aws Setup Info
9738
+ * @param {string} xCompanyId
9739
+ * @param {*} [options] Override http request option.
9740
+ * @throws {RequiredError}
9741
+ * @memberof V2Api
9742
+ */
9743
+ integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AWSSetupInfoResponse, any, {}>>;
9657
9744
  /**
9658
9745
  * Get signal results for a specific control
9659
9746
  * @summary Get Signal Results For Control
@@ -9738,7 +9825,7 @@ export declare class V2Api extends BaseAPI {
9738
9825
  */
9739
9826
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ListSignalsResponse, any, {}>>;
9740
9827
  /**
9741
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9828
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9742
9829
  * @summary Setup Aws Provider
9743
9830
  * @param {string} xCompanyId
9744
9831
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
package/dist/api.js CHANGED
@@ -45,7 +45,8 @@ export const AuditLogAction = {
45
45
  Invite: 'invite',
46
46
  Create: 'create',
47
47
  Update: 'update',
48
- Delete: 'delete'
48
+ Delete: 'delete',
49
+ Revoke: 'revoke'
49
50
  };
50
51
  /**
51
52
  *
@@ -63,7 +64,8 @@ export const AuditLogEntity = {
63
64
  Vendors: 'vendors',
64
65
  Assets: 'assets',
65
66
  Risks: 'risks',
66
- Integrations: 'integrations'
67
+ Integrations: 'integrations',
68
+ ApiKeys: 'api_keys'
67
69
  };
68
70
  /**
69
71
  *
@@ -3809,6 +3811,37 @@ export const IntegrationsApiAxiosParamCreator = function (configuration) {
3809
3811
  options: localVarRequestOptions,
3810
3812
  };
3811
3813
  }),
3814
+ /**
3815
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
3816
+ * @summary Get Aws Setup Info
3817
+ * @param {string} xCompanyId
3818
+ * @param {*} [options] Override http request option.
3819
+ * @throws {RequiredError}
3820
+ */
3821
+ integrationGetAwsSetupInfo: (xCompanyId_1, ...args_1) => __awaiter(this, [xCompanyId_1, ...args_1], void 0, function* (xCompanyId, options = {}) {
3822
+ // verify required parameter 'xCompanyId' is not null or undefined
3823
+ assertParamExists('integrationGetAwsSetupInfo', 'xCompanyId', xCompanyId);
3824
+ const localVarPath = `/v2/integrations/providers/aws/setup-info`;
3825
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
3826
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
3827
+ let baseOptions;
3828
+ if (configuration) {
3829
+ baseOptions = configuration.baseOptions;
3830
+ }
3831
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
3832
+ const localVarHeaderParameter = {};
3833
+ const localVarQueryParameter = {};
3834
+ if (xCompanyId != null) {
3835
+ localVarHeaderParameter['X-Company-Id'] = String(xCompanyId);
3836
+ }
3837
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
3838
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
3839
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
3840
+ return {
3841
+ url: toPathString(localVarUrlObj),
3842
+ options: localVarRequestOptions,
3843
+ };
3844
+ }),
3812
3845
  /**
3813
3846
  * Get signal results for a specific control
3814
3847
  * @summary Get Signal Results For Control
@@ -4106,7 +4139,7 @@ export const IntegrationsApiAxiosParamCreator = function (configuration) {
4106
4139
  };
4107
4140
  }),
4108
4141
  /**
4109
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
4142
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4110
4143
  * @summary Setup Aws Provider
4111
4144
  * @param {string} xCompanyId
4112
4145
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -4319,6 +4352,22 @@ export const IntegrationsApiFp = function (configuration) {
4319
4352
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
4320
4353
  });
4321
4354
  },
4355
+ /**
4356
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
4357
+ * @summary Get Aws Setup Info
4358
+ * @param {string} xCompanyId
4359
+ * @param {*} [options] Override http request option.
4360
+ * @throws {RequiredError}
4361
+ */
4362
+ integrationGetAwsSetupInfo(xCompanyId, options) {
4363
+ return __awaiter(this, void 0, void 0, function* () {
4364
+ var _a, _b, _c;
4365
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.integrationGetAwsSetupInfo(xCompanyId, options);
4366
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
4367
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['IntegrationsApi.integrationGetAwsSetupInfo']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
4368
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
4369
+ });
4370
+ },
4322
4371
  /**
4323
4372
  * Get signal results for a specific control
4324
4373
  * @summary Get Signal Results For Control
@@ -4459,7 +4508,7 @@ export const IntegrationsApiFp = function (configuration) {
4459
4508
  });
4460
4509
  },
4461
4510
  /**
4462
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
4511
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4463
4512
  * @summary Setup Aws Provider
4464
4513
  * @param {string} xCompanyId
4465
4514
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -4565,6 +4614,16 @@ export const IntegrationsApiFactory = function (configuration, basePath, axios)
4565
4614
  integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
4566
4615
  return localVarFp.integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(axios, basePath));
4567
4616
  },
4617
+ /**
4618
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
4619
+ * @summary Get Aws Setup Info
4620
+ * @param {string} xCompanyId
4621
+ * @param {*} [options] Override http request option.
4622
+ * @throws {RequiredError}
4623
+ */
4624
+ integrationGetAwsSetupInfo(xCompanyId, options) {
4625
+ return localVarFp.integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(axios, basePath));
4626
+ },
4568
4627
  /**
4569
4628
  * Get signal results for a specific control
4570
4629
  * @summary Get Signal Results For Control
@@ -4657,7 +4716,7 @@ export const IntegrationsApiFactory = function (configuration, basePath, axios)
4657
4716
  return localVarFp.integrationListSignals(xCompanyId, options).then((request) => request(axios, basePath));
4658
4717
  },
4659
4718
  /**
4660
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
4719
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4661
4720
  * @summary Setup Aws Provider
4662
4721
  * @param {string} xCompanyId
4663
4722
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -4734,6 +4793,17 @@ export class IntegrationsApi extends BaseAPI {
4734
4793
  integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
4735
4794
  return IntegrationsApiFp(this.configuration).integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(this.axios, this.basePath));
4736
4795
  }
4796
+ /**
4797
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
4798
+ * @summary Get Aws Setup Info
4799
+ * @param {string} xCompanyId
4800
+ * @param {*} [options] Override http request option.
4801
+ * @throws {RequiredError}
4802
+ * @memberof IntegrationsApi
4803
+ */
4804
+ integrationGetAwsSetupInfo(xCompanyId, options) {
4805
+ return IntegrationsApiFp(this.configuration).integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(this.axios, this.basePath));
4806
+ }
4737
4807
  /**
4738
4808
  * Get signal results for a specific control
4739
4809
  * @summary Get Signal Results For Control
@@ -4834,7 +4904,7 @@ export class IntegrationsApi extends BaseAPI {
4834
4904
  return IntegrationsApiFp(this.configuration).integrationListSignals(xCompanyId, options).then((request) => request(this.axios, this.basePath));
4835
4905
  }
4836
4906
  /**
4837
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
4907
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4838
4908
  * @summary Setup Aws Provider
4839
4909
  * @param {string} xCompanyId
4840
4910
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -8236,6 +8306,37 @@ export const V2ApiAxiosParamCreator = function (configuration) {
8236
8306
  options: localVarRequestOptions,
8237
8307
  };
8238
8308
  }),
8309
+ /**
8310
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
8311
+ * @summary Get Aws Setup Info
8312
+ * @param {string} xCompanyId
8313
+ * @param {*} [options] Override http request option.
8314
+ * @throws {RequiredError}
8315
+ */
8316
+ integrationGetAwsSetupInfo: (xCompanyId_1, ...args_1) => __awaiter(this, [xCompanyId_1, ...args_1], void 0, function* (xCompanyId, options = {}) {
8317
+ // verify required parameter 'xCompanyId' is not null or undefined
8318
+ assertParamExists('integrationGetAwsSetupInfo', 'xCompanyId', xCompanyId);
8319
+ const localVarPath = `/v2/integrations/providers/aws/setup-info`;
8320
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
8321
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
8322
+ let baseOptions;
8323
+ if (configuration) {
8324
+ baseOptions = configuration.baseOptions;
8325
+ }
8326
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
8327
+ const localVarHeaderParameter = {};
8328
+ const localVarQueryParameter = {};
8329
+ if (xCompanyId != null) {
8330
+ localVarHeaderParameter['X-Company-Id'] = String(xCompanyId);
8331
+ }
8332
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
8333
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
8334
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
8335
+ return {
8336
+ url: toPathString(localVarUrlObj),
8337
+ options: localVarRequestOptions,
8338
+ };
8339
+ }),
8239
8340
  /**
8240
8341
  * Get signal results for a specific control
8241
8342
  * @summary Get Signal Results For Control
@@ -8533,7 +8634,7 @@ export const V2ApiAxiosParamCreator = function (configuration) {
8533
8634
  };
8534
8635
  }),
8535
8636
  /**
8536
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
8637
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
8537
8638
  * @summary Setup Aws Provider
8538
8639
  * @param {string} xCompanyId
8539
8640
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -8883,6 +8984,22 @@ export const V2ApiFp = function (configuration) {
8883
8984
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
8884
8985
  });
8885
8986
  },
8987
+ /**
8988
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
8989
+ * @summary Get Aws Setup Info
8990
+ * @param {string} xCompanyId
8991
+ * @param {*} [options] Override http request option.
8992
+ * @throws {RequiredError}
8993
+ */
8994
+ integrationGetAwsSetupInfo(xCompanyId, options) {
8995
+ return __awaiter(this, void 0, void 0, function* () {
8996
+ var _a, _b, _c;
8997
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.integrationGetAwsSetupInfo(xCompanyId, options);
8998
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
8999
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['V2Api.integrationGetAwsSetupInfo']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
9000
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
9001
+ });
9002
+ },
8886
9003
  /**
8887
9004
  * Get signal results for a specific control
8888
9005
  * @summary Get Signal Results For Control
@@ -9023,7 +9140,7 @@ export const V2ApiFp = function (configuration) {
9023
9140
  });
9024
9141
  },
9025
9142
  /**
9026
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9143
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9027
9144
  * @summary Setup Aws Provider
9028
9145
  * @param {string} xCompanyId
9029
9146
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9196,6 +9313,16 @@ export const V2ApiFactory = function (configuration, basePath, axios) {
9196
9313
  integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
9197
9314
  return localVarFp.integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(axios, basePath));
9198
9315
  },
9316
+ /**
9317
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9318
+ * @summary Get Aws Setup Info
9319
+ * @param {string} xCompanyId
9320
+ * @param {*} [options] Override http request option.
9321
+ * @throws {RequiredError}
9322
+ */
9323
+ integrationGetAwsSetupInfo(xCompanyId, options) {
9324
+ return localVarFp.integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(axios, basePath));
9325
+ },
9199
9326
  /**
9200
9327
  * Get signal results for a specific control
9201
9328
  * @summary Get Signal Results For Control
@@ -9288,7 +9415,7 @@ export const V2ApiFactory = function (configuration, basePath, axios) {
9288
9415
  return localVarFp.integrationListSignals(xCompanyId, options).then((request) => request(axios, basePath));
9289
9416
  },
9290
9417
  /**
9291
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9418
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9292
9419
  * @summary Setup Aws Provider
9293
9420
  * @param {string} xCompanyId
9294
9421
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9408,6 +9535,17 @@ export class V2Api extends BaseAPI {
9408
9535
  integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
9409
9536
  return V2ApiFp(this.configuration).integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(this.axios, this.basePath));
9410
9537
  }
9538
+ /**
9539
+ * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9540
+ * @summary Get Aws Setup Info
9541
+ * @param {string} xCompanyId
9542
+ * @param {*} [options] Override http request option.
9543
+ * @throws {RequiredError}
9544
+ * @memberof V2Api
9545
+ */
9546
+ integrationGetAwsSetupInfo(xCompanyId, options) {
9547
+ return V2ApiFp(this.configuration).integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(this.axios, this.basePath));
9548
+ }
9411
9549
  /**
9412
9550
  * Get signal results for a specific control
9413
9551
  * @summary Get Signal Results For Control
@@ -9508,7 +9646,7 @@ export class V2Api extends BaseAPI {
9508
9646
  return V2ApiFp(this.configuration).integrationListSignals(xCompanyId, options).then((request) => request(this.axios, this.basePath));
9509
9647
  }
9510
9648
  /**
9511
- * Setup AWS provider via cross-account IAM role access. This endpoint accepts AWS account configuration for cross-account access. Users should create an IAM role in their AWS account with a trust relationship that allows your service to assume the role using the provided external_id. No AWS credentials are stored - only the role ARN and external ID for secure cross-account access.
9649
+ * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9512
9650
  * @summary Setup Aws Provider
9513
9651
  * @param {string} xCompanyId
9514
9652
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@rasadov/lumoar-sdk",
3
- "version": "2.1.3",
3
+ "version": "2.1.4",
4
4
  "description": "Lumoar API SDK for dashboard use (session-based authentication)",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/index.d.ts",