@rasadov/lumoar-sdk 2.1.4 → 2.1.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (3) hide show
  1. package/dist/api.d.ts +24 -18
  2. package/dist/api.js +16 -16
  3. package/package.json +1 -1
package/dist/api.d.ts CHANGED
@@ -14,7 +14,7 @@ import type { AxiosPromise, AxiosInstance, RawAxiosRequestConfig } from 'axios';
14
14
  import type { RequestArgs } from './base';
15
15
  import { BaseAPI } from './base';
16
16
  /**
17
- * Response for AWS setup info: values the user must add to their IAM role trust policy for cross-account access. external_id is generated by the backend and stored briefly; the user must complete POST /aws/setup within the TTL window.
17
+ * Response for AWS setup info: values for cross-account IAM trust policy. User gets quick_connect_url to deploy the CloudFormation stack, then completes POST /aws/setup with account_id and role_arn. external_id is stored briefly; complete POST /aws/setup within the TTL.
18
18
  * @export
19
19
  * @interface AWSSetupInfoResponse
20
20
  */
@@ -31,6 +31,12 @@ export interface AWSSetupInfoResponse {
31
31
  * @memberof AWSSetupInfoResponse
32
32
  */
33
33
  'external_id': string;
34
+ /**
35
+ *
36
+ * @type {string}
37
+ * @memberof AWSSetupInfoResponse
38
+ */
39
+ 'quick_connect_url'?: string | null;
34
40
  }
35
41
  /**
36
42
  * Schema for actor information in API responses.
@@ -1094,7 +1100,7 @@ export interface ComplianceReportUploadConfirmRequest {
1094
1100
  'period_end'?: string | null;
1095
1101
  }
1096
1102
  /**
1097
- * Request to setup an AWS provider via cross-account IAM role access. Users create an IAM role in their AWS account using lumoar_account_id and external_id from GET /aws/setup-info, then provide the role ARN here. External ID is supplied by the backend (from setup-info), not the client.
1103
+ * Request to setup an AWS provider via cross-account IAM role access. One-click: create an IAM role that trusts Lumoar\'s account ID and submit the role ARN here. Optional: call GET /aws/setup-info and add the returned external_id to your trust policy for stronger security.
1098
1104
  * @export
1099
1105
  * @interface ConnectAWSProviderRequest
1100
1106
  */
@@ -6891,7 +6897,7 @@ export declare const IntegrationsApiAxiosParamCreator: (configuration?: Configur
6891
6897
  */
6892
6898
  integrationCreateSignalControlMapping: (xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
6893
6899
  /**
6894
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
6900
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
6895
6901
  * @summary Get Aws Setup Info
6896
6902
  * @param {string} xCompanyId
6897
6903
  * @param {*} [options] Override http request option.
@@ -6974,7 +6980,7 @@ export declare const IntegrationsApiAxiosParamCreator: (configuration?: Configur
6974
6980
  */
6975
6981
  integrationListSignals: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
6976
6982
  /**
6977
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
6983
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
6978
6984
  * @summary Setup Aws Provider
6979
6985
  * @param {string} xCompanyId
6980
6986
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -7036,7 +7042,7 @@ export declare const IntegrationsApiFp: (configuration?: Configuration) => {
7036
7042
  */
7037
7043
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SignalControlMappingResponse>>;
7038
7044
  /**
7039
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
7045
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
7040
7046
  * @summary Get Aws Setup Info
7041
7047
  * @param {string} xCompanyId
7042
7048
  * @param {*} [options] Override http request option.
@@ -7119,7 +7125,7 @@ export declare const IntegrationsApiFp: (configuration?: Configuration) => {
7119
7125
  */
7120
7126
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ListSignalsResponse>>;
7121
7127
  /**
7122
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
7128
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
7123
7129
  * @summary Setup Aws Provider
7124
7130
  * @param {string} xCompanyId
7125
7131
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -7181,7 +7187,7 @@ export declare const IntegrationsApiFactory: (configuration?: Configuration, bas
7181
7187
  */
7182
7188
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): AxiosPromise<SignalControlMappingResponse>;
7183
7189
  /**
7184
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
7190
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
7185
7191
  * @summary Get Aws Setup Info
7186
7192
  * @param {string} xCompanyId
7187
7193
  * @param {*} [options] Override http request option.
@@ -7264,7 +7270,7 @@ export declare const IntegrationsApiFactory: (configuration?: Configuration, bas
7264
7270
  */
7265
7271
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<ListSignalsResponse>;
7266
7272
  /**
7267
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
7273
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
7268
7274
  * @summary Setup Aws Provider
7269
7275
  * @param {string} xCompanyId
7270
7276
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -7329,7 +7335,7 @@ export declare class IntegrationsApi extends BaseAPI {
7329
7335
  */
7330
7336
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SignalControlMappingResponse, any, {}>>;
7331
7337
  /**
7332
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
7338
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
7333
7339
  * @summary Get Aws Setup Info
7334
7340
  * @param {string} xCompanyId
7335
7341
  * @param {*} [options] Override http request option.
@@ -7421,7 +7427,7 @@ export declare class IntegrationsApi extends BaseAPI {
7421
7427
  */
7422
7428
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ListSignalsResponse, any, {}>>;
7423
7429
  /**
7424
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
7430
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
7425
7431
  * @summary Setup Aws Provider
7426
7432
  * @param {string} xCompanyId
7427
7433
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9190,7 +9196,7 @@ export declare const V2ApiAxiosParamCreator: (configuration?: Configuration) =>
9190
9196
  */
9191
9197
  integrationCreateSignalControlMapping: (xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
9192
9198
  /**
9193
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9199
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
9194
9200
  * @summary Get Aws Setup Info
9195
9201
  * @param {string} xCompanyId
9196
9202
  * @param {*} [options] Override http request option.
@@ -9273,7 +9279,7 @@ export declare const V2ApiAxiosParamCreator: (configuration?: Configuration) =>
9273
9279
  */
9274
9280
  integrationListSignals: (xCompanyId: string, options?: RawAxiosRequestConfig) => Promise<RequestArgs>;
9275
9281
  /**
9276
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9282
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
9277
9283
  * @summary Setup Aws Provider
9278
9284
  * @param {string} xCompanyId
9279
9285
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9370,7 +9376,7 @@ export declare const V2ApiFp: (configuration?: Configuration) => {
9370
9376
  */
9371
9377
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SignalControlMappingResponse>>;
9372
9378
  /**
9373
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9379
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
9374
9380
  * @summary Get Aws Setup Info
9375
9381
  * @param {string} xCompanyId
9376
9382
  * @param {*} [options] Override http request option.
@@ -9453,7 +9459,7 @@ export declare const V2ApiFp: (configuration?: Configuration) => {
9453
9459
  */
9454
9460
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ListSignalsResponse>>;
9455
9461
  /**
9456
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9462
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
9457
9463
  * @summary Setup Aws Provider
9458
9464
  * @param {string} xCompanyId
9459
9465
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9550,7 +9556,7 @@ export declare const V2ApiFactory: (configuration?: Configuration, basePath?: st
9550
9556
  */
9551
9557
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): AxiosPromise<SignalControlMappingResponse>;
9552
9558
  /**
9553
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9559
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
9554
9560
  * @summary Get Aws Setup Info
9555
9561
  * @param {string} xCompanyId
9556
9562
  * @param {*} [options] Override http request option.
@@ -9633,7 +9639,7 @@ export declare const V2ApiFactory: (configuration?: Configuration, basePath?: st
9633
9639
  */
9634
9640
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): AxiosPromise<ListSignalsResponse>;
9635
9641
  /**
9636
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9642
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
9637
9643
  * @summary Setup Aws Provider
9638
9644
  * @param {string} xCompanyId
9639
9645
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9733,7 +9739,7 @@ export declare class V2Api extends BaseAPI {
9733
9739
  */
9734
9740
  integrationCreateSignalControlMapping(xCompanyId: string, createSignalControlMappingRequest: CreateSignalControlMappingRequest, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SignalControlMappingResponse, any, {}>>;
9735
9741
  /**
9736
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9742
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
9737
9743
  * @summary Get Aws Setup Info
9738
9744
  * @param {string} xCompanyId
9739
9745
  * @param {*} [options] Override http request option.
@@ -9825,7 +9831,7 @@ export declare class V2Api extends BaseAPI {
9825
9831
  */
9826
9832
  integrationListSignals(xCompanyId: string, options?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ListSignalsResponse, any, {}>>;
9827
9833
  /**
9828
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9834
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
9829
9835
  * @summary Setup Aws Provider
9830
9836
  * @param {string} xCompanyId
9831
9837
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
package/dist/api.js CHANGED
@@ -3812,7 +3812,7 @@ export const IntegrationsApiAxiosParamCreator = function (configuration) {
3812
3812
  };
3813
3813
  }),
3814
3814
  /**
3815
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
3815
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
3816
3816
  * @summary Get Aws Setup Info
3817
3817
  * @param {string} xCompanyId
3818
3818
  * @param {*} [options] Override http request option.
@@ -4139,7 +4139,7 @@ export const IntegrationsApiAxiosParamCreator = function (configuration) {
4139
4139
  };
4140
4140
  }),
4141
4141
  /**
4142
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4142
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
4143
4143
  * @summary Setup Aws Provider
4144
4144
  * @param {string} xCompanyId
4145
4145
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -4353,7 +4353,7 @@ export const IntegrationsApiFp = function (configuration) {
4353
4353
  });
4354
4354
  },
4355
4355
  /**
4356
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
4356
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
4357
4357
  * @summary Get Aws Setup Info
4358
4358
  * @param {string} xCompanyId
4359
4359
  * @param {*} [options] Override http request option.
@@ -4508,7 +4508,7 @@ export const IntegrationsApiFp = function (configuration) {
4508
4508
  });
4509
4509
  },
4510
4510
  /**
4511
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4511
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
4512
4512
  * @summary Setup Aws Provider
4513
4513
  * @param {string} xCompanyId
4514
4514
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -4615,7 +4615,7 @@ export const IntegrationsApiFactory = function (configuration, basePath, axios)
4615
4615
  return localVarFp.integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(axios, basePath));
4616
4616
  },
4617
4617
  /**
4618
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
4618
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
4619
4619
  * @summary Get Aws Setup Info
4620
4620
  * @param {string} xCompanyId
4621
4621
  * @param {*} [options] Override http request option.
@@ -4716,7 +4716,7 @@ export const IntegrationsApiFactory = function (configuration, basePath, axios)
4716
4716
  return localVarFp.integrationListSignals(xCompanyId, options).then((request) => request(axios, basePath));
4717
4717
  },
4718
4718
  /**
4719
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4719
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
4720
4720
  * @summary Setup Aws Provider
4721
4721
  * @param {string} xCompanyId
4722
4722
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -4794,7 +4794,7 @@ export class IntegrationsApi extends BaseAPI {
4794
4794
  return IntegrationsApiFp(this.configuration).integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(this.axios, this.basePath));
4795
4795
  }
4796
4796
  /**
4797
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
4797
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
4798
4798
  * @summary Get Aws Setup Info
4799
4799
  * @param {string} xCompanyId
4800
4800
  * @param {*} [options] Override http request option.
@@ -4904,7 +4904,7 @@ export class IntegrationsApi extends BaseAPI {
4904
4904
  return IntegrationsApiFp(this.configuration).integrationListSignals(xCompanyId, options).then((request) => request(this.axios, this.basePath));
4905
4905
  }
4906
4906
  /**
4907
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
4907
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
4908
4908
  * @summary Setup Aws Provider
4909
4909
  * @param {string} xCompanyId
4910
4910
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -8307,7 +8307,7 @@ export const V2ApiAxiosParamCreator = function (configuration) {
8307
8307
  };
8308
8308
  }),
8309
8309
  /**
8310
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
8310
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
8311
8311
  * @summary Get Aws Setup Info
8312
8312
  * @param {string} xCompanyId
8313
8313
  * @param {*} [options] Override http request option.
@@ -8634,7 +8634,7 @@ export const V2ApiAxiosParamCreator = function (configuration) {
8634
8634
  };
8635
8635
  }),
8636
8636
  /**
8637
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
8637
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
8638
8638
  * @summary Setup Aws Provider
8639
8639
  * @param {string} xCompanyId
8640
8640
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -8985,7 +8985,7 @@ export const V2ApiFp = function (configuration) {
8985
8985
  });
8986
8986
  },
8987
8987
  /**
8988
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
8988
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
8989
8989
  * @summary Get Aws Setup Info
8990
8990
  * @param {string} xCompanyId
8991
8991
  * @param {*} [options] Override http request option.
@@ -9140,7 +9140,7 @@ export const V2ApiFp = function (configuration) {
9140
9140
  });
9141
9141
  },
9142
9142
  /**
9143
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9143
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
9144
9144
  * @summary Setup Aws Provider
9145
9145
  * @param {string} xCompanyId
9146
9146
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9314,7 +9314,7 @@ export const V2ApiFactory = function (configuration, basePath, axios) {
9314
9314
  return localVarFp.integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(axios, basePath));
9315
9315
  },
9316
9316
  /**
9317
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9317
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
9318
9318
  * @summary Get Aws Setup Info
9319
9319
  * @param {string} xCompanyId
9320
9320
  * @param {*} [options] Override http request option.
@@ -9415,7 +9415,7 @@ export const V2ApiFactory = function (configuration, basePath, axios) {
9415
9415
  return localVarFp.integrationListSignals(xCompanyId, options).then((request) => request(axios, basePath));
9416
9416
  },
9417
9417
  /**
9418
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9418
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
9419
9419
  * @summary Setup Aws Provider
9420
9420
  * @param {string} xCompanyId
9421
9421
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
@@ -9536,7 +9536,7 @@ export class V2Api extends BaseAPI {
9536
9536
  return V2ApiFp(this.configuration).integrationCreateSignalControlMapping(xCompanyId, createSignalControlMappingRequest, options).then((request) => request(this.axios, this.basePath));
9537
9537
  }
9538
9538
  /**
9539
- * Get values required for AWS cross-account IAM trust policy. Returns Lumoar\'s AWS account ID and a backend-generated external ID. Add these to your IAM role trust policy, then call POST /aws/setup with the role ARN. The external_id is valid for a limited time; complete setup within that window.
9539
+ * Get the CloudFormation link and values for AWS setup. Returns quick_connect_url (link to deploy the audit stack with ExternalID pre-filled), Lumoar\'s account ID, and a short-lived external_id. User deploys the stack in AWS, then completes setup by calling POST /aws/setup with their account_id and role_arn.
9540
9540
  * @summary Get Aws Setup Info
9541
9541
  * @param {string} xCompanyId
9542
9542
  * @param {*} [options] Override http request option.
@@ -9646,7 +9646,7 @@ export class V2Api extends BaseAPI {
9646
9646
  return V2ApiFp(this.configuration).integrationListSignals(xCompanyId, options).then((request) => request(this.axios, this.basePath));
9647
9647
  }
9648
9648
  /**
9649
- * Setup AWS provider via cross-account IAM role access. Call GET /aws/setup-info first to get the external_id and add it (with lumoar_account_id) to your IAM role trust policy. Then submit the role ARN here. External ID is supplied by the backend from that prior step.
9649
+ * Complete AWS provider setup after deploying the CloudFormation stack. User should have deployed the stack from the link in GET /aws/setup-info, then provide the AWS account_id and the created role\'s role_arn here.
9650
9650
  * @summary Setup Aws Provider
9651
9651
  * @param {string} xCompanyId
9652
9652
  * @param {ConnectAWSProviderRequest} connectAWSProviderRequest
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@rasadov/lumoar-sdk",
3
- "version": "2.1.4",
3
+ "version": "2.1.5",
4
4
  "description": "Lumoar API SDK for dashboard use (session-based authentication)",
5
5
  "main": "dist/index.js",
6
6
  "types": "dist/index.d.ts",