@rasadov/lumoar-sdk 2.1.3 → 2.1.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/api.d.ts +102 -15
- package/dist/api.js +148 -10
- package/package.json +1 -1
package/dist/api.d.ts
CHANGED
|
@@ -13,6 +13,25 @@ import type { Configuration } from './configuration';
|
|
|
13
13
|
import type { AxiosPromise, AxiosInstance, RawAxiosRequestConfig } from 'axios';
|
|
14
14
|
import type { RequestArgs } from './base';
|
|
15
15
|
import { BaseAPI } from './base';
|
|
16
|
+
/**
|
|
17
|
+
* Response for AWS setup info: values the user must add to their IAM role trust policy for cross-account access. external_id is generated by the backend and stored briefly; the user must complete POST /aws/setup within the TTL window.
|
|
18
|
+
* @export
|
|
19
|
+
* @interface AWSSetupInfoResponse
|
|
20
|
+
*/
|
|
21
|
+
export interface AWSSetupInfoResponse {
|
|
22
|
+
/**
|
|
23
|
+
*
|
|
24
|
+
* @type {string}
|
|
25
|
+
* @memberof AWSSetupInfoResponse
|
|
26
|
+
*/
|
|
27
|
+
'lumoar_account_id': string;
|
|
28
|
+
/**
|
|
29
|
+
*
|
|
30
|
+
* @type {string}
|
|
31
|
+
* @memberof AWSSetupInfoResponse
|
|
32
|
+
*/
|
|
33
|
+
'external_id': string;
|
|
34
|
+
}
|
|
16
35
|
/**
|
|
17
36
|
* Schema for actor information in API responses.
|
|
18
37
|
* @export
|
|
@@ -410,6 +429,7 @@ export declare const AuditLogAction: {
|
|
|
410
429
|
readonly Create: "create";
|
|
411
430
|
readonly Update: "update";
|
|
412
431
|
readonly Delete: "delete";
|
|
432
|
+
readonly Revoke: "revoke";
|
|
413
433
|
};
|
|
414
434
|
export type AuditLogAction = typeof AuditLogAction[keyof typeof AuditLogAction];
|
|
415
435
|
/**
|
|
@@ -429,6 +449,7 @@ export declare const AuditLogEntity: {
|
|
|
429
449
|
readonly Assets: "assets";
|
|
430
450
|
readonly Risks: "risks";
|
|
431
451
|
readonly Integrations: "integrations";
|
|
452
|
+
readonly ApiKeys: "api_keys";
|
|
432
453
|
};
|
|
433
454
|
export type AuditLogEntity = typeof AuditLogEntity[keyof typeof AuditLogEntity];
|
|
434
455
|
/**
|
|
@@ -1073,7 +1094,7 @@ export interface ComplianceReportUploadConfirmRequest {
|
|
|
1073
1094
|
'period_end'?: string | null;
|
|
1074
1095
|
}
|
|
1075
1096
|
/**
|
|
1076
|
-
* Request to setup an AWS provider via cross-account IAM role access.
|
|
1097
|
+
* Request to setup an AWS provider via cross-account IAM role access. Users create an IAM role in their AWS account using lumoar_account_id and external_id from GET /aws/setup-info, then provide the role ARN here. External ID is supplied by the backend (from setup-info), not the client.
|
|
1077
1098
|
* @export
|
|
1078
1099
|
* @interface ConnectAWSProviderRequest
|
|
1079
1100
|
*/
|
|
@@ -1096,12 +1117,6 @@ export interface ConnectAWSProviderRequest {
|
|
|
1096
1117
|
* @memberof ConnectAWSProviderRequest
|
|
1097
1118
|
*/
|
|
1098
1119
|
'role_arn': string;
|
|
1099
|
-
/**
|
|
1100
|
-
*
|
|
1101
|
-
* @type {string}
|
|
1102
|
-
* @memberof ConnectAWSProviderRequest
|
|
1103
|
-
*/
|
|
1104
|
-
'external_id': string;
|
|
1105
1120
|
}
|
|
1106
1121
|
/**
|
|
1107
1122
|
*
|
|
@@ -2504,6 +2519,12 @@ export interface LinkProviderResponse {
|
|
|
2504
2519
|
* @memberof LinkProviderResponse
|
|
2505
2520
|
*/
|
|
2506
2521
|
'mappings_created': number;
|
|
2522
|
+
/**
|
|
2523
|
+
*
|
|
2524
|
+
* @type {string}
|
|
2525
|
+
* @memberof LinkProviderResponse
|
|
2526
|
+
*/
|
|
2527
|
+
'company_id'?: string | null;
|
|
2507
2528
|
}
|
|
2508
2529
|
/**
|
|
2509
2530
|
* Response for listing audit logs
|
|
@@ -6869,6 +6890,14 @@ export declare const IntegrationsApiAxiosParamCreator: (configuration?: Configur
|
|
|
6869
6890
|
* @throws {RequiredError}
|
|
6870
6891
|
*/
|
|
6871
6892
|
integrationCreateSignalControlMapping: (xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
6893
|
+
/**
|
|
6894
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
6895
|
+
* @summary Get Aws Setup Info
|
|
6896
|
+
* @param {string} xCompanyId
|
|
6897
|
+
* @param {*} [options] Override http request option.
|
|
6898
|
+
* @throws {RequiredError}
|
|
6899
|
+
*/
|
|
6900
|
+
integrationGetAwsSetupInfo: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
6872
6901
|
/**
|
|
6873
6902
|
* Get signal results for a specific control
|
|
6874
6903
|
* @summary Get Signal Results For Control
|
|
@@ -6945,7 +6974,7 @@ export declare const IntegrationsApiAxiosParamCreator: (configuration?: Configur
|
|
|
6945
6974
|
*/
|
|
6946
6975
|
integrationListSignals: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
6947
6976
|
/**
|
|
6948
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
6977
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
6949
6978
|
* @summary Setup Aws Provider
|
|
6950
6979
|
* @param {string} xCompanyId
|
|
6951
6980
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -7006,6 +7035,14 @@ export declare const IntegrationsApiFp: (configuration?: Configuration) => {
|
|
|
7006
7035
|
* @throws {RequiredError}
|
|
7007
7036
|
*/
|
|
7008
7037
|
integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SignalControlMappingResponse>>;
|
|
7038
|
+
/**
|
|
7039
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
7040
|
+
* @summary Get Aws Setup Info
|
|
7041
|
+
* @param {string} xCompanyId
|
|
7042
|
+
* @param {*} [options] Override http request option.
|
|
7043
|
+
* @throws {RequiredError}
|
|
7044
|
+
*/
|
|
7045
|
+
integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AWSSetupInfoResponse>>;
|
|
7009
7046
|
/**
|
|
7010
7047
|
* Get signal results for a specific control
|
|
7011
7048
|
* @summary Get Signal Results For Control
|
|
@@ -7082,7 +7119,7 @@ export declare const IntegrationsApiFp: (configuration?: Configuration) => {
|
|
|
7082
7119
|
*/
|
|
7083
7120
|
integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ListSignalsResponse>>;
|
|
7084
7121
|
/**
|
|
7085
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
7122
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
7086
7123
|
* @summary Setup Aws Provider
|
|
7087
7124
|
* @param {string} xCompanyId
|
|
7088
7125
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -7143,6 +7180,14 @@ export declare const IntegrationsApiFactory: (configuration?: Configuration, bas
|
|
|
7143
7180
|
* @throws {RequiredError}
|
|
7144
7181
|
*/
|
|
7145
7182
|
integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): AxiosPromise<SignalControlMappingResponse>;
|
|
7183
|
+
/**
|
|
7184
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
7185
|
+
* @summary Get Aws Setup Info
|
|
7186
|
+
* @param {string} xCompanyId
|
|
7187
|
+
* @param {*} [options] Override http request option.
|
|
7188
|
+
* @throws {RequiredError}
|
|
7189
|
+
*/
|
|
7190
|
+
integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<AWSSetupInfoResponse>;
|
|
7146
7191
|
/**
|
|
7147
7192
|
* Get signal results for a specific control
|
|
7148
7193
|
* @summary Get Signal Results For Control
|
|
@@ -7219,7 +7264,7 @@ export declare const IntegrationsApiFactory: (configuration?: Configuration, bas
|
|
|
7219
7264
|
*/
|
|
7220
7265
|
integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<ListSignalsResponse>;
|
|
7221
7266
|
/**
|
|
7222
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
7267
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
7223
7268
|
* @summary Setup Aws Provider
|
|
7224
7269
|
* @param {string} xCompanyId
|
|
7225
7270
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -7283,6 +7328,15 @@ export declare class IntegrationsApi extends BaseAPI {
|
|
|
7283
7328
|
* @memberof IntegrationsApi
|
|
7284
7329
|
*/
|
|
7285
7330
|
integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SignalControlMappingResponse, any, {}>>;
|
|
7331
|
+
/**
|
|
7332
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
7333
|
+
* @summary Get Aws Setup Info
|
|
7334
|
+
* @param {string} xCompanyId
|
|
7335
|
+
* @param {*} [options] Override http request option.
|
|
7336
|
+
* @throws {RequiredError}
|
|
7337
|
+
* @memberof IntegrationsApi
|
|
7338
|
+
*/
|
|
7339
|
+
integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AWSSetupInfoResponse, any, {}>>;
|
|
7286
7340
|
/**
|
|
7287
7341
|
* Get signal results for a specific control
|
|
7288
7342
|
* @summary Get Signal Results For Control
|
|
@@ -7367,7 +7421,7 @@ export declare class IntegrationsApi extends BaseAPI {
|
|
|
7367
7421
|
*/
|
|
7368
7422
|
integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ListSignalsResponse, any, {}>>;
|
|
7369
7423
|
/**
|
|
7370
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
7424
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
7371
7425
|
* @summary Setup Aws Provider
|
|
7372
7426
|
* @param {string} xCompanyId
|
|
7373
7427
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -9135,6 +9189,14 @@ export declare const V2ApiAxiosParamCreator: (configuration?: Configuration) =>
|
|
|
9135
9189
|
* @throws {RequiredError}
|
|
9136
9190
|
*/
|
|
9137
9191
|
integrationCreateSignalControlMapping: (xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
9192
|
+
/**
|
|
9193
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
9194
|
+
* @summary Get Aws Setup Info
|
|
9195
|
+
* @param {string} xCompanyId
|
|
9196
|
+
* @param {*} [options] Override http request option.
|
|
9197
|
+
* @throws {RequiredError}
|
|
9198
|
+
*/
|
|
9199
|
+
integrationGetAwsSetupInfo: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
9138
9200
|
/**
|
|
9139
9201
|
* Get signal results for a specific control
|
|
9140
9202
|
* @summary Get Signal Results For Control
|
|
@@ -9211,7 +9273,7 @@ export declare const V2ApiAxiosParamCreator: (configuration?: Configuration) =>
|
|
|
9211
9273
|
*/
|
|
9212
9274
|
integrationListSignals: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
9213
9275
|
/**
|
|
9214
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
9276
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
9215
9277
|
* @summary Setup Aws Provider
|
|
9216
9278
|
* @param {string} xCompanyId
|
|
9217
9279
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -9307,6 +9369,14 @@ export declare const V2ApiFp: (configuration?: Configuration) => {
|
|
|
9307
9369
|
* @throws {RequiredError}
|
|
9308
9370
|
*/
|
|
9309
9371
|
integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SignalControlMappingResponse>>;
|
|
9372
|
+
/**
|
|
9373
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
9374
|
+
* @summary Get Aws Setup Info
|
|
9375
|
+
* @param {string} xCompanyId
|
|
9376
|
+
* @param {*} [options] Override http request option.
|
|
9377
|
+
* @throws {RequiredError}
|
|
9378
|
+
*/
|
|
9379
|
+
integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AWSSetupInfoResponse>>;
|
|
9310
9380
|
/**
|
|
9311
9381
|
* Get signal results for a specific control
|
|
9312
9382
|
* @summary Get Signal Results For Control
|
|
@@ -9383,7 +9453,7 @@ export declare const V2ApiFp: (configuration?: Configuration) => {
|
|
|
9383
9453
|
*/
|
|
9384
9454
|
integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ListSignalsResponse>>;
|
|
9385
9455
|
/**
|
|
9386
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
9456
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
9387
9457
|
* @summary Setup Aws Provider
|
|
9388
9458
|
* @param {string} xCompanyId
|
|
9389
9459
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -9479,6 +9549,14 @@ export declare const V2ApiFactory: (configuration?: Configuration, basePath?: st
|
|
|
9479
9549
|
* @throws {RequiredError}
|
|
9480
9550
|
*/
|
|
9481
9551
|
integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): AxiosPromise<SignalControlMappingResponse>;
|
|
9552
|
+
/**
|
|
9553
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
9554
|
+
* @summary Get Aws Setup Info
|
|
9555
|
+
* @param {string} xCompanyId
|
|
9556
|
+
* @param {*} [options] Override http request option.
|
|
9557
|
+
* @throws {RequiredError}
|
|
9558
|
+
*/
|
|
9559
|
+
integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<AWSSetupInfoResponse>;
|
|
9482
9560
|
/**
|
|
9483
9561
|
* Get signal results for a specific control
|
|
9484
9562
|
* @summary Get Signal Results For Control
|
|
@@ -9555,7 +9633,7 @@ export declare const V2ApiFactory: (configuration?: Configuration, basePath?: st
|
|
|
9555
9633
|
*/
|
|
9556
9634
|
integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<ListSignalsResponse>;
|
|
9557
9635
|
/**
|
|
9558
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
9636
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
9559
9637
|
* @summary Setup Aws Provider
|
|
9560
9638
|
* @param {string} xCompanyId
|
|
9561
9639
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -9654,6 +9732,15 @@ export declare class V2Api extends BaseAPI {
|
|
|
9654
9732
|
* @memberof V2Api
|
|
9655
9733
|
*/
|
|
9656
9734
|
integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SignalControlMappingResponse, any, {}>>;
|
|
9735
|
+
/**
|
|
9736
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
9737
|
+
* @summary Get Aws Setup Info
|
|
9738
|
+
* @param {string} xCompanyId
|
|
9739
|
+
* @param {*} [options] Override http request option.
|
|
9740
|
+
* @throws {RequiredError}
|
|
9741
|
+
* @memberof V2Api
|
|
9742
|
+
*/
|
|
9743
|
+
integrationGetAwsSetupInfo(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AWSSetupInfoResponse, any, {}>>;
|
|
9657
9744
|
/**
|
|
9658
9745
|
* Get signal results for a specific control
|
|
9659
9746
|
* @summary Get Signal Results For Control
|
|
@@ -9738,7 +9825,7 @@ export declare class V2Api extends BaseAPI {
|
|
|
9738
9825
|
*/
|
|
9739
9826
|
integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ListSignalsResponse, any, {}>>;
|
|
9740
9827
|
/**
|
|
9741
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
9828
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
9742
9829
|
* @summary Setup Aws Provider
|
|
9743
9830
|
* @param {string} xCompanyId
|
|
9744
9831
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
package/dist/api.js
CHANGED
|
@@ -45,7 +45,8 @@ export const AuditLogAction = {
|
|
|
45
45
|
Invite: 'invite',
|
|
46
46
|
Create: 'create',
|
|
47
47
|
Update: 'update',
|
|
48
|
-
Delete: 'delete'
|
|
48
|
+
Delete: 'delete',
|
|
49
|
+
Revoke: 'revoke'
|
|
49
50
|
};
|
|
50
51
|
/**
|
|
51
52
|
*
|
|
@@ -63,7 +64,8 @@ export const AuditLogEntity = {
|
|
|
63
64
|
Vendors: 'vendors',
|
|
64
65
|
Assets: 'assets',
|
|
65
66
|
Risks: 'risks',
|
|
66
|
-
Integrations: 'integrations'
|
|
67
|
+
Integrations: 'integrations',
|
|
68
|
+
ApiKeys: 'api_keys'
|
|
67
69
|
};
|
|
68
70
|
/**
|
|
69
71
|
*
|
|
@@ -3809,6 +3811,37 @@ export const IntegrationsApiAxiosParamCreator = function (configuration) {
|
|
|
3809
3811
|
options: localVarRequestOptions,
|
|
3810
3812
|
};
|
|
3811
3813
|
}),
|
|
3814
|
+
/**
|
|
3815
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
3816
|
+
* @summary Get Aws Setup Info
|
|
3817
|
+
* @param {string} xCompanyId
|
|
3818
|
+
* @param {*} [options] Override http request option.
|
|
3819
|
+
* @throws {RequiredError}
|
|
3820
|
+
*/
|
|
3821
|
+
integrationGetAwsSetupInfo: (xCompanyId_1, ...args_1) => __awaiter(this, [xCompanyId_1, ...args_1], void 0, function* (xCompanyId, options = {}) {
|
|
3822
|
+
// verify required parameter 'xCompanyId' is not null or undefined
|
|
3823
|
+
assertParamExists('integrationGetAwsSetupInfo', 'xCompanyId', xCompanyId);
|
|
3824
|
+
const localVarPath = `/v2/integrations/providers/aws/setup-info`;
|
|
3825
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
3826
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
3827
|
+
let baseOptions;
|
|
3828
|
+
if (configuration) {
|
|
3829
|
+
baseOptions = configuration.baseOptions;
|
|
3830
|
+
}
|
|
3831
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
|
|
3832
|
+
const localVarHeaderParameter = {};
|
|
3833
|
+
const localVarQueryParameter = {};
|
|
3834
|
+
if (xCompanyId != null) {
|
|
3835
|
+
localVarHeaderParameter['X-Company-Id'] = String(xCompanyId);
|
|
3836
|
+
}
|
|
3837
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
3838
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
3839
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
3840
|
+
return {
|
|
3841
|
+
url: toPathString(localVarUrlObj),
|
|
3842
|
+
options: localVarRequestOptions,
|
|
3843
|
+
};
|
|
3844
|
+
}),
|
|
3812
3845
|
/**
|
|
3813
3846
|
* Get signal results for a specific control
|
|
3814
3847
|
* @summary Get Signal Results For Control
|
|
@@ -4106,7 +4139,7 @@ export const IntegrationsApiAxiosParamCreator = function (configuration) {
|
|
|
4106
4139
|
};
|
|
4107
4140
|
}),
|
|
4108
4141
|
/**
|
|
4109
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
4142
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
4110
4143
|
* @summary Setup Aws Provider
|
|
4111
4144
|
* @param {string} xCompanyId
|
|
4112
4145
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -4319,6 +4352,22 @@ export const IntegrationsApiFp = function (configuration) {
|
|
|
4319
4352
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
4320
4353
|
});
|
|
4321
4354
|
},
|
|
4355
|
+
/**
|
|
4356
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
4357
|
+
* @summary Get Aws Setup Info
|
|
4358
|
+
* @param {string} xCompanyId
|
|
4359
|
+
* @param {*} [options] Override http request option.
|
|
4360
|
+
* @throws {RequiredError}
|
|
4361
|
+
*/
|
|
4362
|
+
integrationGetAwsSetupInfo(xCompanyId, options) {
|
|
4363
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
4364
|
+
var _a, _b, _c;
|
|
4365
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.integrationGetAwsSetupInfo(xCompanyId, options);
|
|
4366
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
4367
|
+
const localVarOperationServerBasePath = (_c = (_b = operationServerMap['IntegrationsApi.integrationGetAwsSetupInfo']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
4368
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
4369
|
+
});
|
|
4370
|
+
},
|
|
4322
4371
|
/**
|
|
4323
4372
|
* Get signal results for a specific control
|
|
4324
4373
|
* @summary Get Signal Results For Control
|
|
@@ -4459,7 +4508,7 @@ export const IntegrationsApiFp = function (configuration) {
|
|
|
4459
4508
|
});
|
|
4460
4509
|
},
|
|
4461
4510
|
/**
|
|
4462
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
4511
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
4463
4512
|
* @summary Setup Aws Provider
|
|
4464
4513
|
* @param {string} xCompanyId
|
|
4465
4514
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -4565,6 +4614,16 @@ export const IntegrationsApiFactory = function (configuration, basePath, axios)
|
|
|
4565
4614
|
integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
|
|
4566
4615
|
return localVarFp.integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(axios, basePath));
|
|
4567
4616
|
},
|
|
4617
|
+
/**
|
|
4618
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
4619
|
+
* @summary Get Aws Setup Info
|
|
4620
|
+
* @param {string} xCompanyId
|
|
4621
|
+
* @param {*} [options] Override http request option.
|
|
4622
|
+
* @throws {RequiredError}
|
|
4623
|
+
*/
|
|
4624
|
+
integrationGetAwsSetupInfo(xCompanyId, options) {
|
|
4625
|
+
return localVarFp.integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(axios, basePath));
|
|
4626
|
+
},
|
|
4568
4627
|
/**
|
|
4569
4628
|
* Get signal results for a specific control
|
|
4570
4629
|
* @summary Get Signal Results For Control
|
|
@@ -4657,7 +4716,7 @@ export const IntegrationsApiFactory = function (configuration, basePath, axios)
|
|
|
4657
4716
|
return localVarFp.integrationListSignals(xCompanyId, options).then((request) => request(axios, basePath));
|
|
4658
4717
|
},
|
|
4659
4718
|
/**
|
|
4660
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
4719
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
4661
4720
|
* @summary Setup Aws Provider
|
|
4662
4721
|
* @param {string} xCompanyId
|
|
4663
4722
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -4734,6 +4793,17 @@ export class IntegrationsApi extends BaseAPI {
|
|
|
4734
4793
|
integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
|
|
4735
4794
|
return IntegrationsApiFp(this.configuration).integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(this.axios, this.basePath));
|
|
4736
4795
|
}
|
|
4796
|
+
/**
|
|
4797
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
4798
|
+
* @summary Get Aws Setup Info
|
|
4799
|
+
* @param {string} xCompanyId
|
|
4800
|
+
* @param {*} [options] Override http request option.
|
|
4801
|
+
* @throws {RequiredError}
|
|
4802
|
+
* @memberof IntegrationsApi
|
|
4803
|
+
*/
|
|
4804
|
+
integrationGetAwsSetupInfo(xCompanyId, options) {
|
|
4805
|
+
return IntegrationsApiFp(this.configuration).integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(this.axios, this.basePath));
|
|
4806
|
+
}
|
|
4737
4807
|
/**
|
|
4738
4808
|
* Get signal results for a specific control
|
|
4739
4809
|
* @summary Get Signal Results For Control
|
|
@@ -4834,7 +4904,7 @@ export class IntegrationsApi extends BaseAPI {
|
|
|
4834
4904
|
return IntegrationsApiFp(this.configuration).integrationListSignals(xCompanyId, options).then((request) => request(this.axios, this.basePath));
|
|
4835
4905
|
}
|
|
4836
4906
|
/**
|
|
4837
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
4907
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
4838
4908
|
* @summary Setup Aws Provider
|
|
4839
4909
|
* @param {string} xCompanyId
|
|
4840
4910
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -8236,6 +8306,37 @@ export const V2ApiAxiosParamCreator = function (configuration) {
|
|
|
8236
8306
|
options: localVarRequestOptions,
|
|
8237
8307
|
};
|
|
8238
8308
|
}),
|
|
8309
|
+
/**
|
|
8310
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
8311
|
+
* @summary Get Aws Setup Info
|
|
8312
|
+
* @param {string} xCompanyId
|
|
8313
|
+
* @param {*} [options] Override http request option.
|
|
8314
|
+
* @throws {RequiredError}
|
|
8315
|
+
*/
|
|
8316
|
+
integrationGetAwsSetupInfo: (xCompanyId_1, ...args_1) => __awaiter(this, [xCompanyId_1, ...args_1], void 0, function* (xCompanyId, options = {}) {
|
|
8317
|
+
// verify required parameter 'xCompanyId' is not null or undefined
|
|
8318
|
+
assertParamExists('integrationGetAwsSetupInfo', 'xCompanyId', xCompanyId);
|
|
8319
|
+
const localVarPath = `/v2/integrations/providers/aws/setup-info`;
|
|
8320
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
8321
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
8322
|
+
let baseOptions;
|
|
8323
|
+
if (configuration) {
|
|
8324
|
+
baseOptions = configuration.baseOptions;
|
|
8325
|
+
}
|
|
8326
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
|
|
8327
|
+
const localVarHeaderParameter = {};
|
|
8328
|
+
const localVarQueryParameter = {};
|
|
8329
|
+
if (xCompanyId != null) {
|
|
8330
|
+
localVarHeaderParameter['X-Company-Id'] = String(xCompanyId);
|
|
8331
|
+
}
|
|
8332
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
8333
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
8334
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
8335
|
+
return {
|
|
8336
|
+
url: toPathString(localVarUrlObj),
|
|
8337
|
+
options: localVarRequestOptions,
|
|
8338
|
+
};
|
|
8339
|
+
}),
|
|
8239
8340
|
/**
|
|
8240
8341
|
* Get signal results for a specific control
|
|
8241
8342
|
* @summary Get Signal Results For Control
|
|
@@ -8533,7 +8634,7 @@ export const V2ApiAxiosParamCreator = function (configuration) {
|
|
|
8533
8634
|
};
|
|
8534
8635
|
}),
|
|
8535
8636
|
/**
|
|
8536
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
8637
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
8537
8638
|
* @summary Setup Aws Provider
|
|
8538
8639
|
* @param {string} xCompanyId
|
|
8539
8640
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -8883,6 +8984,22 @@ export const V2ApiFp = function (configuration) {
|
|
|
8883
8984
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
8884
8985
|
});
|
|
8885
8986
|
},
|
|
8987
|
+
/**
|
|
8988
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
8989
|
+
* @summary Get Aws Setup Info
|
|
8990
|
+
* @param {string} xCompanyId
|
|
8991
|
+
* @param {*} [options] Override http request option.
|
|
8992
|
+
* @throws {RequiredError}
|
|
8993
|
+
*/
|
|
8994
|
+
integrationGetAwsSetupInfo(xCompanyId, options) {
|
|
8995
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
8996
|
+
var _a, _b, _c;
|
|
8997
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.integrationGetAwsSetupInfo(xCompanyId, options);
|
|
8998
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
8999
|
+
const localVarOperationServerBasePath = (_c = (_b = operationServerMap['V2Api.integrationGetAwsSetupInfo']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
9000
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
9001
|
+
});
|
|
9002
|
+
},
|
|
8886
9003
|
/**
|
|
8887
9004
|
* Get signal results for a specific control
|
|
8888
9005
|
* @summary Get Signal Results For Control
|
|
@@ -9023,7 +9140,7 @@ export const V2ApiFp = function (configuration) {
|
|
|
9023
9140
|
});
|
|
9024
9141
|
},
|
|
9025
9142
|
/**
|
|
9026
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
9143
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
9027
9144
|
* @summary Setup Aws Provider
|
|
9028
9145
|
* @param {string} xCompanyId
|
|
9029
9146
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -9196,6 +9313,16 @@ export const V2ApiFactory = function (configuration, basePath, axios) {
|
|
|
9196
9313
|
integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
|
|
9197
9314
|
return localVarFp.integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(axios, basePath));
|
|
9198
9315
|
},
|
|
9316
|
+
/**
|
|
9317
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
9318
|
+
* @summary Get Aws Setup Info
|
|
9319
|
+
* @param {string} xCompanyId
|
|
9320
|
+
* @param {*} [options] Override http request option.
|
|
9321
|
+
* @throws {RequiredError}
|
|
9322
|
+
*/
|
|
9323
|
+
integrationGetAwsSetupInfo(xCompanyId, options) {
|
|
9324
|
+
return localVarFp.integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(axios, basePath));
|
|
9325
|
+
},
|
|
9199
9326
|
/**
|
|
9200
9327
|
* Get signal results for a specific control
|
|
9201
9328
|
* @summary Get Signal Results For Control
|
|
@@ -9288,7 +9415,7 @@ export const V2ApiFactory = function (configuration, basePath, axios) {
|
|
|
9288
9415
|
return localVarFp.integrationListSignals(xCompanyId, options).then((request) => request(axios, basePath));
|
|
9289
9416
|
},
|
|
9290
9417
|
/**
|
|
9291
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
9418
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
9292
9419
|
* @summary Setup Aws Provider
|
|
9293
9420
|
* @param {string} xCompanyId
|
|
9294
9421
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|
|
@@ -9408,6 +9535,17 @@ export class V2Api extends BaseAPI {
|
|
|
9408
9535
|
integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options) {
|
|
9409
9536
|
return V2ApiFp(this.configuration).integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(this.axios, this.basePath));
|
|
9410
9537
|
}
|
|
9538
|
+
/**
|
|
9539
|
+
* Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
|
|
9540
|
+
* @summary Get Aws Setup Info
|
|
9541
|
+
* @param {string} xCompanyId
|
|
9542
|
+
* @param {*} [options] Override http request option.
|
|
9543
|
+
* @throws {RequiredError}
|
|
9544
|
+
* @memberof V2Api
|
|
9545
|
+
*/
|
|
9546
|
+
integrationGetAwsSetupInfo(xCompanyId, options) {
|
|
9547
|
+
return V2ApiFp(this.configuration).integrationGetAwsSetupInfo(xCompanyId, options).then((request) => request(this.axios, this.basePath));
|
|
9548
|
+
}
|
|
9411
9549
|
/**
|
|
9412
9550
|
* Get signal results for a specific control
|
|
9413
9551
|
* @summary Get Signal Results For Control
|
|
@@ -9508,7 +9646,7 @@ export class V2Api extends BaseAPI {
|
|
|
9508
9646
|
return V2ApiFp(this.configuration).integrationListSignals(xCompanyId, options).then((request) => request(this.axios, this.basePath));
|
|
9509
9647
|
}
|
|
9510
9648
|
/**
|
|
9511
|
-
* Setup AWS provider via cross-account IAM role access.
|
|
9649
|
+
* Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
|
|
9512
9650
|
* @summary Setup Aws Provider
|
|
9513
9651
|
* @param {string} xCompanyId
|
|
9514
9652
|
* @param {ConnectAWSProviderRequest} connectAWSProviderRequest
|