@seekora-ai/admin-api 1.1.27 → 1.1.28

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/api.ts CHANGED
@@ -11927,6 +11927,12 @@ export interface DataTypesGrantStoreAccessRequest {
11927
11927
  * @memberof DataTypesGrantStoreAccessRequest
11928
11928
  */
11929
11929
  'can_view'?: boolean;
11930
+ /**
11931
+ * Optional: if true, grants all CRUD permissions
11932
+ * @type {boolean}
11933
+ * @memberof DataTypesGrantStoreAccessRequest
11934
+ */
11935
+ 'full_access'?: boolean;
11930
11936
  /**
11931
11937
  *
11932
11938
  * @type {number}
@@ -18392,6 +18398,61 @@ export interface DataTypesRole {
18392
18398
  */
18393
18399
  'userId'?: number;
18394
18400
  }
18401
+ /**
18402
+ *
18403
+ * @export
18404
+ * @interface DataTypesRolePermissionsResponse
18405
+ */
18406
+ export interface DataTypesRolePermissionsResponse {
18407
+ /**
18408
+ * All menus available to modifying user
18409
+ * @type {Array<DataTypesMenu>}
18410
+ * @memberof DataTypesRolePermissionsResponse
18411
+ */
18412
+ 'availableMenus'?: Array<DataTypesMenu>;
18413
+ /**
18414
+ * All stores available to modifying user
18415
+ * @type {Array<DataTypesStore>}
18416
+ * @memberof DataTypesRolePermissionsResponse
18417
+ */
18418
+ 'availableStores'?: Array<DataTypesStore>;
18419
+ /**
18420
+ * Full access at role level
18421
+ * @type {boolean}
18422
+ * @memberof DataTypesRolePermissionsResponse
18423
+ */
18424
+ 'fullAccess'?: boolean;
18425
+ /**
18426
+ * Org-level menu/route permissions
18427
+ * @type {Array<DataTypesRoleRightWithMenu>}
18428
+ * @memberof DataTypesRolePermissionsResponse
18429
+ */
18430
+ 'orgLevelMenus'?: Array<DataTypesRoleRightWithMenu>;
18431
+ /**
18432
+ *
18433
+ * @type {number}
18434
+ * @memberof DataTypesRolePermissionsResponse
18435
+ */
18436
+ 'roleId'?: number;
18437
+ /**
18438
+ *
18439
+ * @type {string}
18440
+ * @memberof DataTypesRolePermissionsResponse
18441
+ */
18442
+ 'roleName'?: string;
18443
+ /**
18444
+ * Store access with full_access
18445
+ * @type {Array<DataTypesStoreAccessWithDetails>}
18446
+ * @memberof DataTypesRolePermissionsResponse
18447
+ */
18448
+ 'storeAccess'?: Array<DataTypesStoreAccessWithDetails>;
18449
+ /**
18450
+ * Store-level menu/route permissions
18451
+ * @type {Array<DataTypesStoreLevelMenuRightWithMenu>}
18452
+ * @memberof DataTypesRolePermissionsResponse
18453
+ */
18454
+ 'storeLevelMenus'?: Array<DataTypesStoreLevelMenuRightWithMenu>;
18455
+ }
18395
18456
  /**
18396
18457
  *
18397
18458
  * @export
@@ -18424,7 +18485,7 @@ export interface DataTypesRoleResponse {
18424
18485
  */
18425
18486
  export interface DataTypesRoleRight {
18426
18487
  /**
18427
- *
18488
+ * NULL for org-level, set for store-level
18428
18489
  * @type {number}
18429
18490
  * @memberof DataTypesRoleRight
18430
18491
  */
@@ -18471,6 +18532,18 @@ export interface DataTypesRoleRight {
18471
18532
  * @memberof DataTypesRoleRight
18472
18533
  */
18473
18534
  'createdUserId'?: number;
18535
+ /**
18536
+ * BOOLEAN, DEFAULT FALSE - Full access flag
18537
+ * @type {boolean}
18538
+ * @memberof DataTypesRoleRight
18539
+ */
18540
+ 'fullAccess'?: boolean;
18541
+ /**
18542
+ * BOOLEAN, DEFAULT TRUE - Enable/disable flag
18543
+ * @type {boolean}
18544
+ * @memberof DataTypesRoleRight
18545
+ */
18546
+ 'isEnabled'?: boolean;
18474
18547
  /**
18475
18548
  * INT, NOT NULL
18476
18549
  * @type {number}
@@ -18515,7 +18588,7 @@ export interface DataTypesRoleRight {
18515
18588
  */
18516
18589
  export interface DataTypesRoleRightRequestDto {
18517
18590
  /**
18518
- *
18591
+ * NULL for org-level, set for store-level
18519
18592
  * @type {number}
18520
18593
  * @memberof DataTypesRoleRightRequestDto
18521
18594
  */
@@ -18550,6 +18623,18 @@ export interface DataTypesRoleRightRequestDto {
18550
18623
  * @memberof DataTypesRoleRightRequestDto
18551
18624
  */
18552
18625
  'canView'?: boolean;
18626
+ /**
18627
+ * BOOLEAN, DEFAULT FALSE
18628
+ * @type {boolean}
18629
+ * @memberof DataTypesRoleRightRequestDto
18630
+ */
18631
+ 'fullAccess'?: boolean;
18632
+ /**
18633
+ * BOOLEAN, DEFAULT TRUE
18634
+ * @type {boolean}
18635
+ * @memberof DataTypesRoleRightRequestDto
18636
+ */
18637
+ 'isEnabled'?: boolean;
18553
18638
  /**
18554
18639
  * INT, NOT NULL
18555
18640
  * @type {number}
@@ -18600,6 +18685,115 @@ export interface DataTypesRoleRightResponse {
18600
18685
  */
18601
18686
  'status'?: number;
18602
18687
  }
18688
+ /**
18689
+ *
18690
+ * @export
18691
+ * @interface DataTypesRoleRightWithMenu
18692
+ */
18693
+ export interface DataTypesRoleRightWithMenu {
18694
+ /**
18695
+ * NULL for org-level, set for store-level
18696
+ * @type {number}
18697
+ * @memberof DataTypesRoleRightWithMenu
18698
+ */
18699
+ 'StoreID'?: number;
18700
+ /**
18701
+ * BOOLEAN, DEFAULT FALSE
18702
+ * @type {boolean}
18703
+ * @memberof DataTypesRoleRightWithMenu
18704
+ */
18705
+ 'canAdd'?: boolean;
18706
+ /**
18707
+ * BOOLEAN, DEFAULT FALSE
18708
+ * @type {boolean}
18709
+ * @memberof DataTypesRoleRightWithMenu
18710
+ */
18711
+ 'canApprove'?: boolean;
18712
+ /**
18713
+ * BOOLEAN, DEFAULT FALSE
18714
+ * @type {boolean}
18715
+ * @memberof DataTypesRoleRightWithMenu
18716
+ */
18717
+ 'canDelete'?: boolean;
18718
+ /**
18719
+ * BOOLEAN, DEFAULT FALSE
18720
+ * @type {boolean}
18721
+ * @memberof DataTypesRoleRightWithMenu
18722
+ */
18723
+ 'canModify'?: boolean;
18724
+ /**
18725
+ * BOOLEAN, DEFAULT FALSE
18726
+ * @type {boolean}
18727
+ * @memberof DataTypesRoleRightWithMenu
18728
+ */
18729
+ 'canView'?: boolean;
18730
+ /**
18731
+ * TIMESTAMP, NOT NULL
18732
+ * @type {string}
18733
+ * @memberof DataTypesRoleRightWithMenu
18734
+ */
18735
+ 'createdDatetime'?: string;
18736
+ /**
18737
+ * INT, NOT NULL
18738
+ * @type {number}
18739
+ * @memberof DataTypesRoleRightWithMenu
18740
+ */
18741
+ 'createdUserId'?: number;
18742
+ /**
18743
+ * BOOLEAN, DEFAULT FALSE - Full access flag
18744
+ * @type {boolean}
18745
+ * @memberof DataTypesRoleRightWithMenu
18746
+ */
18747
+ 'fullAccess'?: boolean;
18748
+ /**
18749
+ * BOOLEAN, DEFAULT TRUE - Enable/disable flag
18750
+ * @type {boolean}
18751
+ * @memberof DataTypesRoleRightWithMenu
18752
+ */
18753
+ 'isEnabled'?: boolean;
18754
+ /**
18755
+ *
18756
+ * @type {DataTypesMenu}
18757
+ * @memberof DataTypesRoleRightWithMenu
18758
+ */
18759
+ 'menu'?: DataTypesMenu;
18760
+ /**
18761
+ * INT, NOT NULL
18762
+ * @type {number}
18763
+ * @memberof DataTypesRoleRightWithMenu
18764
+ */
18765
+ 'menuId'?: number;
18766
+ /**
18767
+ * TIMESTAMP, NULL
18768
+ * @type {string}
18769
+ * @memberof DataTypesRoleRightWithMenu
18770
+ */
18771
+ 'modifiedDatetime'?: string;
18772
+ /**
18773
+ * INT, NULL
18774
+ * @type {number}
18775
+ * @memberof DataTypesRoleRightWithMenu
18776
+ */
18777
+ 'modifiedUserId'?: number;
18778
+ /**
18779
+ * INT, NOT NULL
18780
+ * @type {number}
18781
+ * @memberof DataTypesRoleRightWithMenu
18782
+ */
18783
+ 'orgId'?: number;
18784
+ /**
18785
+ * INT, NOT NULL
18786
+ * @type {number}
18787
+ * @memberof DataTypesRoleRightWithMenu
18788
+ */
18789
+ 'roleId'?: number;
18790
+ /**
18791
+ * SERIAL PRIMARY KEY
18792
+ * @type {number}
18793
+ * @memberof DataTypesRoleRightWithMenu
18794
+ */
18795
+ 'roleRightId'?: number;
18796
+ }
18603
18797
  /**
18604
18798
  *
18605
18799
  * @export
@@ -19730,6 +19924,12 @@ export interface DataTypesStoreAccessRequest {
19730
19924
  * @memberof DataTypesStoreAccessRequest
19731
19925
  */
19732
19926
  'can_view'?: boolean;
19927
+ /**
19928
+ * Optional: if true, grants all CRUD permissions
19929
+ * @type {boolean}
19930
+ * @memberof DataTypesStoreAccessRequest
19931
+ */
19932
+ 'full_access'?: boolean;
19733
19933
  /**
19734
19934
  *
19735
19935
  * @type {number}
@@ -19831,6 +20031,12 @@ export interface DataTypesStoreAccessWithDetails {
19831
20031
  * @memberof DataTypesStoreAccessWithDetails
19832
20032
  */
19833
20033
  'first_name'?: string;
20034
+ /**
20035
+ *
20036
+ * @type {boolean}
20037
+ * @memberof DataTypesStoreAccessWithDetails
20038
+ */
20039
+ 'full_access'?: boolean;
19834
20040
  /**
19835
20041
  *
19836
20042
  * @type {string}
@@ -20073,6 +20279,50 @@ export interface DataTypesStoreKeyResponseWrapper {
20073
20279
  */
20074
20280
  'status'?: number;
20075
20281
  }
20282
+ /**
20283
+ *
20284
+ * @export
20285
+ * @interface DataTypesStoreLevelMenuRight
20286
+ */
20287
+ export interface DataTypesStoreLevelMenuRight {
20288
+ /**
20289
+ *
20290
+ * @type {Array<DataTypesRoleRightRequestDto>}
20291
+ * @memberof DataTypesStoreLevelMenuRight
20292
+ */
20293
+ 'menuRights': Array<DataTypesRoleRightRequestDto>;
20294
+ /**
20295
+ *
20296
+ * @type {number}
20297
+ * @memberof DataTypesStoreLevelMenuRight
20298
+ */
20299
+ 'storeId': number;
20300
+ }
20301
+ /**
20302
+ *
20303
+ * @export
20304
+ * @interface DataTypesStoreLevelMenuRightWithMenu
20305
+ */
20306
+ export interface DataTypesStoreLevelMenuRightWithMenu {
20307
+ /**
20308
+ *
20309
+ * @type {Array<DataTypesRoleRightWithMenu>}
20310
+ * @memberof DataTypesStoreLevelMenuRightWithMenu
20311
+ */
20312
+ 'menuRights'?: Array<DataTypesRoleRightWithMenu>;
20313
+ /**
20314
+ *
20315
+ * @type {number}
20316
+ * @memberof DataTypesStoreLevelMenuRightWithMenu
20317
+ */
20318
+ 'storeId'?: number;
20319
+ /**
20320
+ *
20321
+ * @type {string}
20322
+ * @memberof DataTypesStoreLevelMenuRightWithMenu
20323
+ */
20324
+ 'storeName'?: string;
20325
+ }
20076
20326
  /**
20077
20327
  *
20078
20328
  * @export
@@ -21734,6 +21984,43 @@ export interface DataTypesUpdateProfileRequest {
21734
21984
  */
21735
21985
  'userphone': string;
21736
21986
  }
21987
+ /**
21988
+ *
21989
+ * @export
21990
+ * @interface DataTypesUpdateRolePermissionsRequest
21991
+ */
21992
+ export interface DataTypesUpdateRolePermissionsRequest {
21993
+ /**
21994
+ * Full access at role level (applies to all stores)
21995
+ * @type {boolean}
21996
+ * @memberof DataTypesUpdateRolePermissionsRequest
21997
+ */
21998
+ 'fullAccess'?: boolean;
21999
+ /**
22000
+ * Org-level menu/route permissions
22001
+ * @type {Array<DataTypesRoleRightRequestDto>}
22002
+ * @memberof DataTypesUpdateRolePermissionsRequest
22003
+ */
22004
+ 'orgLevelMenus'?: Array<DataTypesRoleRightRequestDto>;
22005
+ /**
22006
+ *
22007
+ * @type {number}
22008
+ * @memberof DataTypesUpdateRolePermissionsRequest
22009
+ */
22010
+ 'roleId': number;
22011
+ /**
22012
+ * Store access with full_access flags
22013
+ * @type {Array<DataTypesStoreAccessRequest>}
22014
+ * @memberof DataTypesUpdateRolePermissionsRequest
22015
+ */
22016
+ 'storeAccess'?: Array<DataTypesStoreAccessRequest>;
22017
+ /**
22018
+ * Store-level menu/route permissions
22019
+ * @type {Array<DataTypesStoreLevelMenuRight>}
22020
+ * @memberof DataTypesUpdateRolePermissionsRequest
22021
+ */
22022
+ 'storeLevelMenus'?: Array<DataTypesStoreLevelMenuRight>;
22023
+ }
21737
22024
  /**
21738
22025
  *
21739
22026
  * @export
@@ -21826,6 +22113,12 @@ export interface DataTypesUpdateStoreAccessRequest {
21826
22113
  * @memberof DataTypesUpdateStoreAccessRequest
21827
22114
  */
21828
22115
  'can_view'?: boolean;
22116
+ /**
22117
+ * Optional: if true, grants all CRUD permissions
22118
+ * @type {boolean}
22119
+ * @memberof DataTypesUpdateStoreAccessRequest
22120
+ */
22121
+ 'full_access'?: boolean;
21829
22122
  }
21830
22123
 
21831
22124
  export const DataTypesUpdateStoreAccessRequestAccessLevelEnum = {
@@ -21836,6 +22129,43 @@ export const DataTypesUpdateStoreAccessRequestAccessLevelEnum = {
21836
22129
 
21837
22130
  export type DataTypesUpdateStoreAccessRequestAccessLevelEnum = typeof DataTypesUpdateStoreAccessRequestAccessLevelEnum[keyof typeof DataTypesUpdateStoreAccessRequestAccessLevelEnum];
21838
22131
 
22132
+ /**
22133
+ *
22134
+ * @export
22135
+ * @interface DataTypesUpdateUserRolePermissionsRequest
22136
+ */
22137
+ export interface DataTypesUpdateUserRolePermissionsRequest {
22138
+ /**
22139
+ * Full access at user-specific role level
22140
+ * @type {boolean}
22141
+ * @memberof DataTypesUpdateUserRolePermissionsRequest
22142
+ */
22143
+ 'fullAccess'?: boolean;
22144
+ /**
22145
+ * Org-level menu/route permissions
22146
+ * @type {Array<DataTypesRoleRightRequestDto>}
22147
+ * @memberof DataTypesUpdateUserRolePermissionsRequest
22148
+ */
22149
+ 'orgLevelMenus'?: Array<DataTypesRoleRightRequestDto>;
22150
+ /**
22151
+ * Store access with full_access flags
22152
+ * @type {Array<DataTypesStoreAccessRequest>}
22153
+ * @memberof DataTypesUpdateUserRolePermissionsRequest
22154
+ */
22155
+ 'storeAccess'?: Array<DataTypesStoreAccessRequest>;
22156
+ /**
22157
+ * Store-level menu/route permissions
22158
+ * @type {Array<DataTypesStoreLevelMenuRight>}
22159
+ * @memberof DataTypesUpdateUserRolePermissionsRequest
22160
+ */
22161
+ 'storeLevelMenus'?: Array<DataTypesStoreLevelMenuRight>;
22162
+ /**
22163
+ *
22164
+ * @type {number}
22165
+ * @memberof DataTypesUpdateUserRolePermissionsRequest
22166
+ */
22167
+ 'userId': number;
22168
+ }
21839
22169
  /**
21840
22170
  *
21841
22171
  * @export
@@ -22329,6 +22659,79 @@ export interface DataTypesUserResponse {
22329
22659
  */
22330
22660
  'status'?: number;
22331
22661
  }
22662
+ /**
22663
+ *
22664
+ * @export
22665
+ * @interface DataTypesUserRolePermissionsResponse
22666
+ */
22667
+ export interface DataTypesUserRolePermissionsResponse {
22668
+ /**
22669
+ * All menus available to modifying user
22670
+ * @type {Array<DataTypesMenu>}
22671
+ * @memberof DataTypesUserRolePermissionsResponse
22672
+ */
22673
+ 'availableMenus'?: Array<DataTypesMenu>;
22674
+ /**
22675
+ * All stores available to modifying user
22676
+ * @type {Array<DataTypesStore>}
22677
+ * @memberof DataTypesUserRolePermissionsResponse
22678
+ */
22679
+ 'availableStores'?: Array<DataTypesStore>;
22680
+ /**
22681
+ * Full access at user-specific role level
22682
+ * @type {boolean}
22683
+ * @memberof DataTypesUserRolePermissionsResponse
22684
+ */
22685
+ 'fullAccess'?: boolean;
22686
+ /**
22687
+ * Org-level menu/route permissions
22688
+ * @type {Array<DataTypesRoleRightWithMenu>}
22689
+ * @memberof DataTypesUserRolePermissionsResponse
22690
+ */
22691
+ 'orgLevelMenus'?: Array<DataTypesRoleRightWithMenu>;
22692
+ /**
22693
+ *
22694
+ * @type {number}
22695
+ * @memberof DataTypesUserRolePermissionsResponse
22696
+ */
22697
+ 'roleId'?: number;
22698
+ /**
22699
+ *
22700
+ * @type {string}
22701
+ * @memberof DataTypesUserRolePermissionsResponse
22702
+ */
22703
+ 'roleName'?: string;
22704
+ /**
22705
+ * Store access with full_access
22706
+ * @type {Array<DataTypesStoreAccessWithDetails>}
22707
+ * @memberof DataTypesUserRolePermissionsResponse
22708
+ */
22709
+ 'storeAccess'?: Array<DataTypesStoreAccessWithDetails>;
22710
+ /**
22711
+ * Store-level menu/route permissions
22712
+ * @type {Array<DataTypesStoreLevelMenuRightWithMenu>}
22713
+ * @memberof DataTypesUserRolePermissionsResponse
22714
+ */
22715
+ 'storeLevelMenus'?: Array<DataTypesStoreLevelMenuRightWithMenu>;
22716
+ /**
22717
+ *
22718
+ * @type {boolean}
22719
+ * @memberof DataTypesUserRolePermissionsResponse
22720
+ */
22721
+ 'useCustomPermissions'?: boolean;
22722
+ /**
22723
+ *
22724
+ * @type {number}
22725
+ * @memberof DataTypesUserRolePermissionsResponse
22726
+ */
22727
+ 'userId'?: number;
22728
+ /**
22729
+ *
22730
+ * @type {number}
22731
+ * @memberof DataTypesUserRolePermissionsResponse
22732
+ */
22733
+ 'userSpecificRoleId'?: number;
22734
+ }
22332
22735
  /**
22333
22736
  *
22334
22737
  * @export
@@ -22371,6 +22774,12 @@ export interface DataTypesUserStoreAccess {
22371
22774
  * @memberof DataTypesUserStoreAccess
22372
22775
  */
22373
22776
  'can_view'?: boolean;
22777
+ /**
22778
+ *
22779
+ * @type {boolean}
22780
+ * @memberof DataTypesUserStoreAccess
22781
+ */
22782
+ 'full_access'?: boolean;
22374
22783
  /**
22375
22784
  *
22376
22785
  * @type {number}
@@ -22444,6 +22853,12 @@ export interface DataTypesUserStoreAccessWithPermissions {
22444
22853
  * @memberof DataTypesUserStoreAccessWithPermissions
22445
22854
  */
22446
22855
  'can_view'?: boolean;
22856
+ /**
22857
+ *
22858
+ * @type {boolean}
22859
+ * @memberof DataTypesUserStoreAccessWithPermissions
22860
+ */
22861
+ 'full_access'?: boolean;
22447
22862
  /**
22448
22863
  *
22449
22864
  * @type {number}
@@ -55483,6 +55898,86 @@ export const RolesApiAxiosParamCreator = function (configuration?: Configuration
55483
55898
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
55484
55899
  localVarRequestOptions.data = serializeDataIfNeeded(dataTypesCreateRoleRequestDto, localVarRequestOptions, configuration)
55485
55900
 
55901
+ return {
55902
+ url: toPathString(localVarUrlObj),
55903
+ options: localVarRequestOptions,
55904
+ };
55905
+ },
55906
+ /**
55907
+ * Retrieves role permissions separated by org-level and store-level menus/routes
55908
+ * @summary Get role permissions with org-level and store-level separation
55909
+ * @param {number} roleId Role ID
55910
+ * @param {*} [options] Override http request option.
55911
+ * @throws {RequiredError}
55912
+ */
55913
+ adminRolesRoleIdPermissionsGet: async (roleId: number, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
55914
+ // verify required parameter 'roleId' is not null or undefined
55915
+ assertParamExists('adminRolesRoleIdPermissionsGet', 'roleId', roleId)
55916
+ const localVarPath = `/admin/roles/{roleId}/permissions`
55917
+ .replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
55918
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
55919
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
55920
+ let baseOptions;
55921
+ if (configuration) {
55922
+ baseOptions = configuration.baseOptions;
55923
+ }
55924
+
55925
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
55926
+ const localVarHeaderParameter = {} as any;
55927
+ const localVarQueryParameter = {} as any;
55928
+
55929
+ // authentication BearerAuth required
55930
+ await setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration)
55931
+
55932
+
55933
+
55934
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
55935
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
55936
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
55937
+
55938
+ return {
55939
+ url: toPathString(localVarUrlObj),
55940
+ options: localVarRequestOptions,
55941
+ };
55942
+ },
55943
+ /**
55944
+ * Updates role permissions with org-level and store-level separation
55945
+ * @summary Update role permissions
55946
+ * @param {number} roleId Role ID
55947
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
55948
+ * @param {*} [options] Override http request option.
55949
+ * @throws {RequiredError}
55950
+ */
55951
+ adminRolesRoleIdPermissionsPut: async (roleId: number, dataTypesUpdateRolePermissionsRequest: DataTypesUpdateRolePermissionsRequest, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
55952
+ // verify required parameter 'roleId' is not null or undefined
55953
+ assertParamExists('adminRolesRoleIdPermissionsPut', 'roleId', roleId)
55954
+ // verify required parameter 'dataTypesUpdateRolePermissionsRequest' is not null or undefined
55955
+ assertParamExists('adminRolesRoleIdPermissionsPut', 'dataTypesUpdateRolePermissionsRequest', dataTypesUpdateRolePermissionsRequest)
55956
+ const localVarPath = `/admin/roles/{roleId}/permissions`
55957
+ .replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
55958
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
55959
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
55960
+ let baseOptions;
55961
+ if (configuration) {
55962
+ baseOptions = configuration.baseOptions;
55963
+ }
55964
+
55965
+ const localVarRequestOptions = { method: 'PUT', ...baseOptions, ...options};
55966
+ const localVarHeaderParameter = {} as any;
55967
+ const localVarQueryParameter = {} as any;
55968
+
55969
+ // authentication BearerAuth required
55970
+ await setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration)
55971
+
55972
+
55973
+
55974
+ localVarHeaderParameter['Content-Type'] = 'application/json';
55975
+
55976
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
55977
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
55978
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
55979
+ localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateRolePermissionsRequest, localVarRequestOptions, configuration)
55980
+
55486
55981
  return {
55487
55982
  url: toPathString(localVarUrlObj),
55488
55983
  options: localVarRequestOptions,
@@ -55565,6 +56060,33 @@ export const RolesApiFp = function(configuration?: Configuration) {
55565
56060
  const localVarOperationServerBasePath = operationServerMap['RolesApi.adminRolesPost']?.[localVarOperationServerIndex]?.url;
55566
56061
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
55567
56062
  },
56063
+ /**
56064
+ * Retrieves role permissions separated by org-level and store-level menus/routes
56065
+ * @summary Get role permissions with org-level and store-level separation
56066
+ * @param {number} roleId Role ID
56067
+ * @param {*} [options] Override http request option.
56068
+ * @throws {RequiredError}
56069
+ */
56070
+ async adminRolesRoleIdPermissionsGet(roleId: number, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<DataTypesRolePermissionsResponse>> {
56071
+ const localVarAxiosArgs = await localVarAxiosParamCreator.adminRolesRoleIdPermissionsGet(roleId, options);
56072
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
56073
+ const localVarOperationServerBasePath = operationServerMap['RolesApi.adminRolesRoleIdPermissionsGet']?.[localVarOperationServerIndex]?.url;
56074
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
56075
+ },
56076
+ /**
56077
+ * Updates role permissions with org-level and store-level separation
56078
+ * @summary Update role permissions
56079
+ * @param {number} roleId Role ID
56080
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
56081
+ * @param {*} [options] Override http request option.
56082
+ * @throws {RequiredError}
56083
+ */
56084
+ async adminRolesRoleIdPermissionsPut(roleId: number, dataTypesUpdateRolePermissionsRequest: DataTypesUpdateRolePermissionsRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<DataTypesResponse>> {
56085
+ const localVarAxiosArgs = await localVarAxiosParamCreator.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options);
56086
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
56087
+ const localVarOperationServerBasePath = operationServerMap['RolesApi.adminRolesRoleIdPermissionsPut']?.[localVarOperationServerIndex]?.url;
56088
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
56089
+ },
55568
56090
  }
55569
56091
  };
55570
56092
 
@@ -55627,6 +56149,27 @@ export const RolesApiFactory = function (configuration?: Configuration, basePath
55627
56149
  adminRolesPost(dataTypesCreateRoleRequestDto: DataTypesCreateRoleRequestDto, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesResponse> {
55628
56150
  return localVarFp.adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(axios, basePath));
55629
56151
  },
56152
+ /**
56153
+ * Retrieves role permissions separated by org-level and store-level menus/routes
56154
+ * @summary Get role permissions with org-level and store-level separation
56155
+ * @param {number} roleId Role ID
56156
+ * @param {*} [options] Override http request option.
56157
+ * @throws {RequiredError}
56158
+ */
56159
+ adminRolesRoleIdPermissionsGet(roleId: number, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesRolePermissionsResponse> {
56160
+ return localVarFp.adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(axios, basePath));
56161
+ },
56162
+ /**
56163
+ * Updates role permissions with org-level and store-level separation
56164
+ * @summary Update role permissions
56165
+ * @param {number} roleId Role ID
56166
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
56167
+ * @param {*} [options] Override http request option.
56168
+ * @throws {RequiredError}
56169
+ */
56170
+ adminRolesRoleIdPermissionsPut(roleId: number, dataTypesUpdateRolePermissionsRequest: DataTypesUpdateRolePermissionsRequest, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesResponse> {
56171
+ return localVarFp.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(axios, basePath));
56172
+ },
55630
56173
  };
55631
56174
  };
55632
56175
 
@@ -55698,6 +56241,31 @@ export class RolesApi extends BaseAPI {
55698
56241
  public adminRolesPost(dataTypesCreateRoleRequestDto: DataTypesCreateRoleRequestDto, options?: RawAxiosRequestConfig) {
55699
56242
  return RolesApiFp(this.configuration).adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(this.axios, this.basePath));
55700
56243
  }
56244
+
56245
+ /**
56246
+ * Retrieves role permissions separated by org-level and store-level menus/routes
56247
+ * @summary Get role permissions with org-level and store-level separation
56248
+ * @param {number} roleId Role ID
56249
+ * @param {*} [options] Override http request option.
56250
+ * @throws {RequiredError}
56251
+ * @memberof RolesApi
56252
+ */
56253
+ public adminRolesRoleIdPermissionsGet(roleId: number, options?: RawAxiosRequestConfig) {
56254
+ return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(this.axios, this.basePath));
56255
+ }
56256
+
56257
+ /**
56258
+ * Updates role permissions with org-level and store-level separation
56259
+ * @summary Update role permissions
56260
+ * @param {number} roleId Role ID
56261
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
56262
+ * @param {*} [options] Override http request option.
56263
+ * @throws {RequiredError}
56264
+ * @memberof RolesApi
56265
+ */
56266
+ public adminRolesRoleIdPermissionsPut(roleId: number, dataTypesUpdateRolePermissionsRequest: DataTypesUpdateRolePermissionsRequest, options?: RawAxiosRequestConfig) {
56267
+ return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
56268
+ }
55701
56269
  }
55702
56270
 
55703
56271
 
@@ -61809,6 +62377,86 @@ export const UserApiAxiosParamCreator = function (configuration?: Configuration)
61809
62377
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
61810
62378
  localVarRequestOptions.data = serializeDataIfNeeded(dataTypesSetUserCustomPermissionsRequest, localVarRequestOptions, configuration)
61811
62379
 
62380
+ return {
62381
+ url: toPathString(localVarUrlObj),
62382
+ options: localVarRequestOptions,
62383
+ };
62384
+ },
62385
+ /**
62386
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
62387
+ * @summary Get user-specific role permissions with org-level and store-level separation
62388
+ * @param {number} userId User ID
62389
+ * @param {*} [options] Override http request option.
62390
+ * @throws {RequiredError}
62391
+ */
62392
+ adminUsersUserIdPermissionsRoleGet: async (userId: number, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
62393
+ // verify required parameter 'userId' is not null or undefined
62394
+ assertParamExists('adminUsersUserIdPermissionsRoleGet', 'userId', userId)
62395
+ const localVarPath = `/admin/users/{userId}/permissions/role`
62396
+ .replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
62397
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
62398
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
62399
+ let baseOptions;
62400
+ if (configuration) {
62401
+ baseOptions = configuration.baseOptions;
62402
+ }
62403
+
62404
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
62405
+ const localVarHeaderParameter = {} as any;
62406
+ const localVarQueryParameter = {} as any;
62407
+
62408
+ // authentication BearerAuth required
62409
+ await setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration)
62410
+
62411
+
62412
+
62413
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
62414
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
62415
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
62416
+
62417
+ return {
62418
+ url: toPathString(localVarUrlObj),
62419
+ options: localVarRequestOptions,
62420
+ };
62421
+ },
62422
+ /**
62423
+ * Updates user-specific role permissions with org-level and store-level separation
62424
+ * @summary Update user-specific role permissions
62425
+ * @param {number} userId User ID
62426
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
62427
+ * @param {*} [options] Override http request option.
62428
+ * @throws {RequiredError}
62429
+ */
62430
+ adminUsersUserIdPermissionsRolePut: async (userId: number, dataTypesUpdateUserRolePermissionsRequest: DataTypesUpdateUserRolePermissionsRequest, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
62431
+ // verify required parameter 'userId' is not null or undefined
62432
+ assertParamExists('adminUsersUserIdPermissionsRolePut', 'userId', userId)
62433
+ // verify required parameter 'dataTypesUpdateUserRolePermissionsRequest' is not null or undefined
62434
+ assertParamExists('adminUsersUserIdPermissionsRolePut', 'dataTypesUpdateUserRolePermissionsRequest', dataTypesUpdateUserRolePermissionsRequest)
62435
+ const localVarPath = `/admin/users/{userId}/permissions/role`
62436
+ .replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
62437
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
62438
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
62439
+ let baseOptions;
62440
+ if (configuration) {
62441
+ baseOptions = configuration.baseOptions;
62442
+ }
62443
+
62444
+ const localVarRequestOptions = { method: 'PUT', ...baseOptions, ...options};
62445
+ const localVarHeaderParameter = {} as any;
62446
+ const localVarQueryParameter = {} as any;
62447
+
62448
+ // authentication BearerAuth required
62449
+ await setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration)
62450
+
62451
+
62452
+
62453
+ localVarHeaderParameter['Content-Type'] = 'application/json';
62454
+
62455
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
62456
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
62457
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
62458
+ localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateUserRolePermissionsRequest, localVarRequestOptions, configuration)
62459
+
61812
62460
  return {
61813
62461
  url: toPathString(localVarUrlObj),
61814
62462
  options: localVarRequestOptions,
@@ -61957,6 +62605,33 @@ export const UserApiFp = function(configuration?: Configuration) {
61957
62605
  const localVarOperationServerBasePath = operationServerMap['UserApi.adminUsersUserIdPermissionsPut']?.[localVarOperationServerIndex]?.url;
61958
62606
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
61959
62607
  },
62608
+ /**
62609
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
62610
+ * @summary Get user-specific role permissions with org-level and store-level separation
62611
+ * @param {number} userId User ID
62612
+ * @param {*} [options] Override http request option.
62613
+ * @throws {RequiredError}
62614
+ */
62615
+ async adminUsersUserIdPermissionsRoleGet(userId: number, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<DataTypesUserRolePermissionsResponse>> {
62616
+ const localVarAxiosArgs = await localVarAxiosParamCreator.adminUsersUserIdPermissionsRoleGet(userId, options);
62617
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
62618
+ const localVarOperationServerBasePath = operationServerMap['UserApi.adminUsersUserIdPermissionsRoleGet']?.[localVarOperationServerIndex]?.url;
62619
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
62620
+ },
62621
+ /**
62622
+ * Updates user-specific role permissions with org-level and store-level separation
62623
+ * @summary Update user-specific role permissions
62624
+ * @param {number} userId User ID
62625
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
62626
+ * @param {*} [options] Override http request option.
62627
+ * @throws {RequiredError}
62628
+ */
62629
+ async adminUsersUserIdPermissionsRolePut(userId: number, dataTypesUpdateUserRolePermissionsRequest: DataTypesUpdateUserRolePermissionsRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<DataTypesResponse>> {
62630
+ const localVarAxiosArgs = await localVarAxiosParamCreator.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options);
62631
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
62632
+ const localVarOperationServerBasePath = operationServerMap['UserApi.adminUsersUserIdPermissionsRolePut']?.[localVarOperationServerIndex]?.url;
62633
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
62634
+ },
61960
62635
  }
61961
62636
  };
61962
62637
 
@@ -62070,6 +62745,27 @@ export const UserApiFactory = function (configuration?: Configuration, basePath?
62070
62745
  adminUsersUserIdPermissionsPut(userId: number, dataTypesSetUserCustomPermissionsRequest: DataTypesSetUserCustomPermissionsRequest, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesResponse> {
62071
62746
  return localVarFp.adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(axios, basePath));
62072
62747
  },
62748
+ /**
62749
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
62750
+ * @summary Get user-specific role permissions with org-level and store-level separation
62751
+ * @param {number} userId User ID
62752
+ * @param {*} [options] Override http request option.
62753
+ * @throws {RequiredError}
62754
+ */
62755
+ adminUsersUserIdPermissionsRoleGet(userId: number, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesUserRolePermissionsResponse> {
62756
+ return localVarFp.adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(axios, basePath));
62757
+ },
62758
+ /**
62759
+ * Updates user-specific role permissions with org-level and store-level separation
62760
+ * @summary Update user-specific role permissions
62761
+ * @param {number} userId User ID
62762
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
62763
+ * @param {*} [options] Override http request option.
62764
+ * @throws {RequiredError}
62765
+ */
62766
+ adminUsersUserIdPermissionsRolePut(userId: number, dataTypesUpdateUserRolePermissionsRequest: DataTypesUpdateUserRolePermissionsRequest, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesResponse> {
62767
+ return localVarFp.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(axios, basePath));
62768
+ },
62073
62769
  };
62074
62770
  };
62075
62771
 
@@ -62202,6 +62898,31 @@ export class UserApi extends BaseAPI {
62202
62898
  public adminUsersUserIdPermissionsPut(userId: number, dataTypesSetUserCustomPermissionsRequest: DataTypesSetUserCustomPermissionsRequest, options?: RawAxiosRequestConfig) {
62203
62899
  return UserApiFp(this.configuration).adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(this.axios, this.basePath));
62204
62900
  }
62901
+
62902
+ /**
62903
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
62904
+ * @summary Get user-specific role permissions with org-level and store-level separation
62905
+ * @param {number} userId User ID
62906
+ * @param {*} [options] Override http request option.
62907
+ * @throws {RequiredError}
62908
+ * @memberof UserApi
62909
+ */
62910
+ public adminUsersUserIdPermissionsRoleGet(userId: number, options?: RawAxiosRequestConfig) {
62911
+ return UserApiFp(this.configuration).adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(this.axios, this.basePath));
62912
+ }
62913
+
62914
+ /**
62915
+ * Updates user-specific role permissions with org-level and store-level separation
62916
+ * @summary Update user-specific role permissions
62917
+ * @param {number} userId User ID
62918
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
62919
+ * @param {*} [options] Override http request option.
62920
+ * @throws {RequiredError}
62921
+ * @memberof UserApi
62922
+ */
62923
+ public adminUsersUserIdPermissionsRolePut(userId: number, dataTypesUpdateUserRolePermissionsRequest: DataTypesUpdateUserRolePermissionsRequest, options?: RawAxiosRequestConfig) {
62924
+ return UserApiFp(this.configuration).adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
62925
+ }
62205
62926
  }
62206
62927
 
62207
62928