@seekora-ai/admin-api 1.1.27 → 1.1.28
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +13 -2
- package/api.ts +723 -2
- package/dist/api.d.ts +557 -2
- package/dist/api.js +288 -0
- package/dist/esm/api.d.ts +557 -2
- package/dist/esm/api.js +288 -0
- package/package.json +1 -1
- package/seekora-ai-admin-api-1.1.28.tgz +0 -0
- package/seekora-ai-admin-api-1.1.27.tgz +0 -0
package/api.ts
CHANGED
|
@@ -11927,6 +11927,12 @@ export interface DataTypesGrantStoreAccessRequest {
|
|
|
11927
11927
|
* @memberof DataTypesGrantStoreAccessRequest
|
|
11928
11928
|
*/
|
|
11929
11929
|
'can_view'?: boolean;
|
|
11930
|
+
/**
|
|
11931
|
+
* Optional: if true, grants all CRUD permissions
|
|
11932
|
+
* @type {boolean}
|
|
11933
|
+
* @memberof DataTypesGrantStoreAccessRequest
|
|
11934
|
+
*/
|
|
11935
|
+
'full_access'?: boolean;
|
|
11930
11936
|
/**
|
|
11931
11937
|
*
|
|
11932
11938
|
* @type {number}
|
|
@@ -18392,6 +18398,61 @@ export interface DataTypesRole {
|
|
|
18392
18398
|
*/
|
|
18393
18399
|
'userId'?: number;
|
|
18394
18400
|
}
|
|
18401
|
+
/**
|
|
18402
|
+
*
|
|
18403
|
+
* @export
|
|
18404
|
+
* @interface DataTypesRolePermissionsResponse
|
|
18405
|
+
*/
|
|
18406
|
+
export interface DataTypesRolePermissionsResponse {
|
|
18407
|
+
/**
|
|
18408
|
+
* All menus available to modifying user
|
|
18409
|
+
* @type {Array<DataTypesMenu>}
|
|
18410
|
+
* @memberof DataTypesRolePermissionsResponse
|
|
18411
|
+
*/
|
|
18412
|
+
'availableMenus'?: Array<DataTypesMenu>;
|
|
18413
|
+
/**
|
|
18414
|
+
* All stores available to modifying user
|
|
18415
|
+
* @type {Array<DataTypesStore>}
|
|
18416
|
+
* @memberof DataTypesRolePermissionsResponse
|
|
18417
|
+
*/
|
|
18418
|
+
'availableStores'?: Array<DataTypesStore>;
|
|
18419
|
+
/**
|
|
18420
|
+
* Full access at role level
|
|
18421
|
+
* @type {boolean}
|
|
18422
|
+
* @memberof DataTypesRolePermissionsResponse
|
|
18423
|
+
*/
|
|
18424
|
+
'fullAccess'?: boolean;
|
|
18425
|
+
/**
|
|
18426
|
+
* Org-level menu/route permissions
|
|
18427
|
+
* @type {Array<DataTypesRoleRightWithMenu>}
|
|
18428
|
+
* @memberof DataTypesRolePermissionsResponse
|
|
18429
|
+
*/
|
|
18430
|
+
'orgLevelMenus'?: Array<DataTypesRoleRightWithMenu>;
|
|
18431
|
+
/**
|
|
18432
|
+
*
|
|
18433
|
+
* @type {number}
|
|
18434
|
+
* @memberof DataTypesRolePermissionsResponse
|
|
18435
|
+
*/
|
|
18436
|
+
'roleId'?: number;
|
|
18437
|
+
/**
|
|
18438
|
+
*
|
|
18439
|
+
* @type {string}
|
|
18440
|
+
* @memberof DataTypesRolePermissionsResponse
|
|
18441
|
+
*/
|
|
18442
|
+
'roleName'?: string;
|
|
18443
|
+
/**
|
|
18444
|
+
* Store access with full_access
|
|
18445
|
+
* @type {Array<DataTypesStoreAccessWithDetails>}
|
|
18446
|
+
* @memberof DataTypesRolePermissionsResponse
|
|
18447
|
+
*/
|
|
18448
|
+
'storeAccess'?: Array<DataTypesStoreAccessWithDetails>;
|
|
18449
|
+
/**
|
|
18450
|
+
* Store-level menu/route permissions
|
|
18451
|
+
* @type {Array<DataTypesStoreLevelMenuRightWithMenu>}
|
|
18452
|
+
* @memberof DataTypesRolePermissionsResponse
|
|
18453
|
+
*/
|
|
18454
|
+
'storeLevelMenus'?: Array<DataTypesStoreLevelMenuRightWithMenu>;
|
|
18455
|
+
}
|
|
18395
18456
|
/**
|
|
18396
18457
|
*
|
|
18397
18458
|
* @export
|
|
@@ -18424,7 +18485,7 @@ export interface DataTypesRoleResponse {
|
|
|
18424
18485
|
*/
|
|
18425
18486
|
export interface DataTypesRoleRight {
|
|
18426
18487
|
/**
|
|
18427
|
-
*
|
|
18488
|
+
* NULL for org-level, set for store-level
|
|
18428
18489
|
* @type {number}
|
|
18429
18490
|
* @memberof DataTypesRoleRight
|
|
18430
18491
|
*/
|
|
@@ -18471,6 +18532,18 @@ export interface DataTypesRoleRight {
|
|
|
18471
18532
|
* @memberof DataTypesRoleRight
|
|
18472
18533
|
*/
|
|
18473
18534
|
'createdUserId'?: number;
|
|
18535
|
+
/**
|
|
18536
|
+
* BOOLEAN, DEFAULT FALSE - Full access flag
|
|
18537
|
+
* @type {boolean}
|
|
18538
|
+
* @memberof DataTypesRoleRight
|
|
18539
|
+
*/
|
|
18540
|
+
'fullAccess'?: boolean;
|
|
18541
|
+
/**
|
|
18542
|
+
* BOOLEAN, DEFAULT TRUE - Enable/disable flag
|
|
18543
|
+
* @type {boolean}
|
|
18544
|
+
* @memberof DataTypesRoleRight
|
|
18545
|
+
*/
|
|
18546
|
+
'isEnabled'?: boolean;
|
|
18474
18547
|
/**
|
|
18475
18548
|
* INT, NOT NULL
|
|
18476
18549
|
* @type {number}
|
|
@@ -18515,7 +18588,7 @@ export interface DataTypesRoleRight {
|
|
|
18515
18588
|
*/
|
|
18516
18589
|
export interface DataTypesRoleRightRequestDto {
|
|
18517
18590
|
/**
|
|
18518
|
-
*
|
|
18591
|
+
* NULL for org-level, set for store-level
|
|
18519
18592
|
* @type {number}
|
|
18520
18593
|
* @memberof DataTypesRoleRightRequestDto
|
|
18521
18594
|
*/
|
|
@@ -18550,6 +18623,18 @@ export interface DataTypesRoleRightRequestDto {
|
|
|
18550
18623
|
* @memberof DataTypesRoleRightRequestDto
|
|
18551
18624
|
*/
|
|
18552
18625
|
'canView'?: boolean;
|
|
18626
|
+
/**
|
|
18627
|
+
* BOOLEAN, DEFAULT FALSE
|
|
18628
|
+
* @type {boolean}
|
|
18629
|
+
* @memberof DataTypesRoleRightRequestDto
|
|
18630
|
+
*/
|
|
18631
|
+
'fullAccess'?: boolean;
|
|
18632
|
+
/**
|
|
18633
|
+
* BOOLEAN, DEFAULT TRUE
|
|
18634
|
+
* @type {boolean}
|
|
18635
|
+
* @memberof DataTypesRoleRightRequestDto
|
|
18636
|
+
*/
|
|
18637
|
+
'isEnabled'?: boolean;
|
|
18553
18638
|
/**
|
|
18554
18639
|
* INT, NOT NULL
|
|
18555
18640
|
* @type {number}
|
|
@@ -18600,6 +18685,115 @@ export interface DataTypesRoleRightResponse {
|
|
|
18600
18685
|
*/
|
|
18601
18686
|
'status'?: number;
|
|
18602
18687
|
}
|
|
18688
|
+
/**
|
|
18689
|
+
*
|
|
18690
|
+
* @export
|
|
18691
|
+
* @interface DataTypesRoleRightWithMenu
|
|
18692
|
+
*/
|
|
18693
|
+
export interface DataTypesRoleRightWithMenu {
|
|
18694
|
+
/**
|
|
18695
|
+
* NULL for org-level, set for store-level
|
|
18696
|
+
* @type {number}
|
|
18697
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18698
|
+
*/
|
|
18699
|
+
'StoreID'?: number;
|
|
18700
|
+
/**
|
|
18701
|
+
* BOOLEAN, DEFAULT FALSE
|
|
18702
|
+
* @type {boolean}
|
|
18703
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18704
|
+
*/
|
|
18705
|
+
'canAdd'?: boolean;
|
|
18706
|
+
/**
|
|
18707
|
+
* BOOLEAN, DEFAULT FALSE
|
|
18708
|
+
* @type {boolean}
|
|
18709
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18710
|
+
*/
|
|
18711
|
+
'canApprove'?: boolean;
|
|
18712
|
+
/**
|
|
18713
|
+
* BOOLEAN, DEFAULT FALSE
|
|
18714
|
+
* @type {boolean}
|
|
18715
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18716
|
+
*/
|
|
18717
|
+
'canDelete'?: boolean;
|
|
18718
|
+
/**
|
|
18719
|
+
* BOOLEAN, DEFAULT FALSE
|
|
18720
|
+
* @type {boolean}
|
|
18721
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18722
|
+
*/
|
|
18723
|
+
'canModify'?: boolean;
|
|
18724
|
+
/**
|
|
18725
|
+
* BOOLEAN, DEFAULT FALSE
|
|
18726
|
+
* @type {boolean}
|
|
18727
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18728
|
+
*/
|
|
18729
|
+
'canView'?: boolean;
|
|
18730
|
+
/**
|
|
18731
|
+
* TIMESTAMP, NOT NULL
|
|
18732
|
+
* @type {string}
|
|
18733
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18734
|
+
*/
|
|
18735
|
+
'createdDatetime'?: string;
|
|
18736
|
+
/**
|
|
18737
|
+
* INT, NOT NULL
|
|
18738
|
+
* @type {number}
|
|
18739
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18740
|
+
*/
|
|
18741
|
+
'createdUserId'?: number;
|
|
18742
|
+
/**
|
|
18743
|
+
* BOOLEAN, DEFAULT FALSE - Full access flag
|
|
18744
|
+
* @type {boolean}
|
|
18745
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18746
|
+
*/
|
|
18747
|
+
'fullAccess'?: boolean;
|
|
18748
|
+
/**
|
|
18749
|
+
* BOOLEAN, DEFAULT TRUE - Enable/disable flag
|
|
18750
|
+
* @type {boolean}
|
|
18751
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18752
|
+
*/
|
|
18753
|
+
'isEnabled'?: boolean;
|
|
18754
|
+
/**
|
|
18755
|
+
*
|
|
18756
|
+
* @type {DataTypesMenu}
|
|
18757
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18758
|
+
*/
|
|
18759
|
+
'menu'?: DataTypesMenu;
|
|
18760
|
+
/**
|
|
18761
|
+
* INT, NOT NULL
|
|
18762
|
+
* @type {number}
|
|
18763
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18764
|
+
*/
|
|
18765
|
+
'menuId'?: number;
|
|
18766
|
+
/**
|
|
18767
|
+
* TIMESTAMP, NULL
|
|
18768
|
+
* @type {string}
|
|
18769
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18770
|
+
*/
|
|
18771
|
+
'modifiedDatetime'?: string;
|
|
18772
|
+
/**
|
|
18773
|
+
* INT, NULL
|
|
18774
|
+
* @type {number}
|
|
18775
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18776
|
+
*/
|
|
18777
|
+
'modifiedUserId'?: number;
|
|
18778
|
+
/**
|
|
18779
|
+
* INT, NOT NULL
|
|
18780
|
+
* @type {number}
|
|
18781
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18782
|
+
*/
|
|
18783
|
+
'orgId'?: number;
|
|
18784
|
+
/**
|
|
18785
|
+
* INT, NOT NULL
|
|
18786
|
+
* @type {number}
|
|
18787
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18788
|
+
*/
|
|
18789
|
+
'roleId'?: number;
|
|
18790
|
+
/**
|
|
18791
|
+
* SERIAL PRIMARY KEY
|
|
18792
|
+
* @type {number}
|
|
18793
|
+
* @memberof DataTypesRoleRightWithMenu
|
|
18794
|
+
*/
|
|
18795
|
+
'roleRightId'?: number;
|
|
18796
|
+
}
|
|
18603
18797
|
/**
|
|
18604
18798
|
*
|
|
18605
18799
|
* @export
|
|
@@ -19730,6 +19924,12 @@ export interface DataTypesStoreAccessRequest {
|
|
|
19730
19924
|
* @memberof DataTypesStoreAccessRequest
|
|
19731
19925
|
*/
|
|
19732
19926
|
'can_view'?: boolean;
|
|
19927
|
+
/**
|
|
19928
|
+
* Optional: if true, grants all CRUD permissions
|
|
19929
|
+
* @type {boolean}
|
|
19930
|
+
* @memberof DataTypesStoreAccessRequest
|
|
19931
|
+
*/
|
|
19932
|
+
'full_access'?: boolean;
|
|
19733
19933
|
/**
|
|
19734
19934
|
*
|
|
19735
19935
|
* @type {number}
|
|
@@ -19831,6 +20031,12 @@ export interface DataTypesStoreAccessWithDetails {
|
|
|
19831
20031
|
* @memberof DataTypesStoreAccessWithDetails
|
|
19832
20032
|
*/
|
|
19833
20033
|
'first_name'?: string;
|
|
20034
|
+
/**
|
|
20035
|
+
*
|
|
20036
|
+
* @type {boolean}
|
|
20037
|
+
* @memberof DataTypesStoreAccessWithDetails
|
|
20038
|
+
*/
|
|
20039
|
+
'full_access'?: boolean;
|
|
19834
20040
|
/**
|
|
19835
20041
|
*
|
|
19836
20042
|
* @type {string}
|
|
@@ -20073,6 +20279,50 @@ export interface DataTypesStoreKeyResponseWrapper {
|
|
|
20073
20279
|
*/
|
|
20074
20280
|
'status'?: number;
|
|
20075
20281
|
}
|
|
20282
|
+
/**
|
|
20283
|
+
*
|
|
20284
|
+
* @export
|
|
20285
|
+
* @interface DataTypesStoreLevelMenuRight
|
|
20286
|
+
*/
|
|
20287
|
+
export interface DataTypesStoreLevelMenuRight {
|
|
20288
|
+
/**
|
|
20289
|
+
*
|
|
20290
|
+
* @type {Array<DataTypesRoleRightRequestDto>}
|
|
20291
|
+
* @memberof DataTypesStoreLevelMenuRight
|
|
20292
|
+
*/
|
|
20293
|
+
'menuRights': Array<DataTypesRoleRightRequestDto>;
|
|
20294
|
+
/**
|
|
20295
|
+
*
|
|
20296
|
+
* @type {number}
|
|
20297
|
+
* @memberof DataTypesStoreLevelMenuRight
|
|
20298
|
+
*/
|
|
20299
|
+
'storeId': number;
|
|
20300
|
+
}
|
|
20301
|
+
/**
|
|
20302
|
+
*
|
|
20303
|
+
* @export
|
|
20304
|
+
* @interface DataTypesStoreLevelMenuRightWithMenu
|
|
20305
|
+
*/
|
|
20306
|
+
export interface DataTypesStoreLevelMenuRightWithMenu {
|
|
20307
|
+
/**
|
|
20308
|
+
*
|
|
20309
|
+
* @type {Array<DataTypesRoleRightWithMenu>}
|
|
20310
|
+
* @memberof DataTypesStoreLevelMenuRightWithMenu
|
|
20311
|
+
*/
|
|
20312
|
+
'menuRights'?: Array<DataTypesRoleRightWithMenu>;
|
|
20313
|
+
/**
|
|
20314
|
+
*
|
|
20315
|
+
* @type {number}
|
|
20316
|
+
* @memberof DataTypesStoreLevelMenuRightWithMenu
|
|
20317
|
+
*/
|
|
20318
|
+
'storeId'?: number;
|
|
20319
|
+
/**
|
|
20320
|
+
*
|
|
20321
|
+
* @type {string}
|
|
20322
|
+
* @memberof DataTypesStoreLevelMenuRightWithMenu
|
|
20323
|
+
*/
|
|
20324
|
+
'storeName'?: string;
|
|
20325
|
+
}
|
|
20076
20326
|
/**
|
|
20077
20327
|
*
|
|
20078
20328
|
* @export
|
|
@@ -21734,6 +21984,43 @@ export interface DataTypesUpdateProfileRequest {
|
|
|
21734
21984
|
*/
|
|
21735
21985
|
'userphone': string;
|
|
21736
21986
|
}
|
|
21987
|
+
/**
|
|
21988
|
+
*
|
|
21989
|
+
* @export
|
|
21990
|
+
* @interface DataTypesUpdateRolePermissionsRequest
|
|
21991
|
+
*/
|
|
21992
|
+
export interface DataTypesUpdateRolePermissionsRequest {
|
|
21993
|
+
/**
|
|
21994
|
+
* Full access at role level (applies to all stores)
|
|
21995
|
+
* @type {boolean}
|
|
21996
|
+
* @memberof DataTypesUpdateRolePermissionsRequest
|
|
21997
|
+
*/
|
|
21998
|
+
'fullAccess'?: boolean;
|
|
21999
|
+
/**
|
|
22000
|
+
* Org-level menu/route permissions
|
|
22001
|
+
* @type {Array<DataTypesRoleRightRequestDto>}
|
|
22002
|
+
* @memberof DataTypesUpdateRolePermissionsRequest
|
|
22003
|
+
*/
|
|
22004
|
+
'orgLevelMenus'?: Array<DataTypesRoleRightRequestDto>;
|
|
22005
|
+
/**
|
|
22006
|
+
*
|
|
22007
|
+
* @type {number}
|
|
22008
|
+
* @memberof DataTypesUpdateRolePermissionsRequest
|
|
22009
|
+
*/
|
|
22010
|
+
'roleId': number;
|
|
22011
|
+
/**
|
|
22012
|
+
* Store access with full_access flags
|
|
22013
|
+
* @type {Array<DataTypesStoreAccessRequest>}
|
|
22014
|
+
* @memberof DataTypesUpdateRolePermissionsRequest
|
|
22015
|
+
*/
|
|
22016
|
+
'storeAccess'?: Array<DataTypesStoreAccessRequest>;
|
|
22017
|
+
/**
|
|
22018
|
+
* Store-level menu/route permissions
|
|
22019
|
+
* @type {Array<DataTypesStoreLevelMenuRight>}
|
|
22020
|
+
* @memberof DataTypesUpdateRolePermissionsRequest
|
|
22021
|
+
*/
|
|
22022
|
+
'storeLevelMenus'?: Array<DataTypesStoreLevelMenuRight>;
|
|
22023
|
+
}
|
|
21737
22024
|
/**
|
|
21738
22025
|
*
|
|
21739
22026
|
* @export
|
|
@@ -21826,6 +22113,12 @@ export interface DataTypesUpdateStoreAccessRequest {
|
|
|
21826
22113
|
* @memberof DataTypesUpdateStoreAccessRequest
|
|
21827
22114
|
*/
|
|
21828
22115
|
'can_view'?: boolean;
|
|
22116
|
+
/**
|
|
22117
|
+
* Optional: if true, grants all CRUD permissions
|
|
22118
|
+
* @type {boolean}
|
|
22119
|
+
* @memberof DataTypesUpdateStoreAccessRequest
|
|
22120
|
+
*/
|
|
22121
|
+
'full_access'?: boolean;
|
|
21829
22122
|
}
|
|
21830
22123
|
|
|
21831
22124
|
export const DataTypesUpdateStoreAccessRequestAccessLevelEnum = {
|
|
@@ -21836,6 +22129,43 @@ export const DataTypesUpdateStoreAccessRequestAccessLevelEnum = {
|
|
|
21836
22129
|
|
|
21837
22130
|
export type DataTypesUpdateStoreAccessRequestAccessLevelEnum = typeof DataTypesUpdateStoreAccessRequestAccessLevelEnum[keyof typeof DataTypesUpdateStoreAccessRequestAccessLevelEnum];
|
|
21838
22131
|
|
|
22132
|
+
/**
|
|
22133
|
+
*
|
|
22134
|
+
* @export
|
|
22135
|
+
* @interface DataTypesUpdateUserRolePermissionsRequest
|
|
22136
|
+
*/
|
|
22137
|
+
export interface DataTypesUpdateUserRolePermissionsRequest {
|
|
22138
|
+
/**
|
|
22139
|
+
* Full access at user-specific role level
|
|
22140
|
+
* @type {boolean}
|
|
22141
|
+
* @memberof DataTypesUpdateUserRolePermissionsRequest
|
|
22142
|
+
*/
|
|
22143
|
+
'fullAccess'?: boolean;
|
|
22144
|
+
/**
|
|
22145
|
+
* Org-level menu/route permissions
|
|
22146
|
+
* @type {Array<DataTypesRoleRightRequestDto>}
|
|
22147
|
+
* @memberof DataTypesUpdateUserRolePermissionsRequest
|
|
22148
|
+
*/
|
|
22149
|
+
'orgLevelMenus'?: Array<DataTypesRoleRightRequestDto>;
|
|
22150
|
+
/**
|
|
22151
|
+
* Store access with full_access flags
|
|
22152
|
+
* @type {Array<DataTypesStoreAccessRequest>}
|
|
22153
|
+
* @memberof DataTypesUpdateUserRolePermissionsRequest
|
|
22154
|
+
*/
|
|
22155
|
+
'storeAccess'?: Array<DataTypesStoreAccessRequest>;
|
|
22156
|
+
/**
|
|
22157
|
+
* Store-level menu/route permissions
|
|
22158
|
+
* @type {Array<DataTypesStoreLevelMenuRight>}
|
|
22159
|
+
* @memberof DataTypesUpdateUserRolePermissionsRequest
|
|
22160
|
+
*/
|
|
22161
|
+
'storeLevelMenus'?: Array<DataTypesStoreLevelMenuRight>;
|
|
22162
|
+
/**
|
|
22163
|
+
*
|
|
22164
|
+
* @type {number}
|
|
22165
|
+
* @memberof DataTypesUpdateUserRolePermissionsRequest
|
|
22166
|
+
*/
|
|
22167
|
+
'userId': number;
|
|
22168
|
+
}
|
|
21839
22169
|
/**
|
|
21840
22170
|
*
|
|
21841
22171
|
* @export
|
|
@@ -22329,6 +22659,79 @@ export interface DataTypesUserResponse {
|
|
|
22329
22659
|
*/
|
|
22330
22660
|
'status'?: number;
|
|
22331
22661
|
}
|
|
22662
|
+
/**
|
|
22663
|
+
*
|
|
22664
|
+
* @export
|
|
22665
|
+
* @interface DataTypesUserRolePermissionsResponse
|
|
22666
|
+
*/
|
|
22667
|
+
export interface DataTypesUserRolePermissionsResponse {
|
|
22668
|
+
/**
|
|
22669
|
+
* All menus available to modifying user
|
|
22670
|
+
* @type {Array<DataTypesMenu>}
|
|
22671
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22672
|
+
*/
|
|
22673
|
+
'availableMenus'?: Array<DataTypesMenu>;
|
|
22674
|
+
/**
|
|
22675
|
+
* All stores available to modifying user
|
|
22676
|
+
* @type {Array<DataTypesStore>}
|
|
22677
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22678
|
+
*/
|
|
22679
|
+
'availableStores'?: Array<DataTypesStore>;
|
|
22680
|
+
/**
|
|
22681
|
+
* Full access at user-specific role level
|
|
22682
|
+
* @type {boolean}
|
|
22683
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22684
|
+
*/
|
|
22685
|
+
'fullAccess'?: boolean;
|
|
22686
|
+
/**
|
|
22687
|
+
* Org-level menu/route permissions
|
|
22688
|
+
* @type {Array<DataTypesRoleRightWithMenu>}
|
|
22689
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22690
|
+
*/
|
|
22691
|
+
'orgLevelMenus'?: Array<DataTypesRoleRightWithMenu>;
|
|
22692
|
+
/**
|
|
22693
|
+
*
|
|
22694
|
+
* @type {number}
|
|
22695
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22696
|
+
*/
|
|
22697
|
+
'roleId'?: number;
|
|
22698
|
+
/**
|
|
22699
|
+
*
|
|
22700
|
+
* @type {string}
|
|
22701
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22702
|
+
*/
|
|
22703
|
+
'roleName'?: string;
|
|
22704
|
+
/**
|
|
22705
|
+
* Store access with full_access
|
|
22706
|
+
* @type {Array<DataTypesStoreAccessWithDetails>}
|
|
22707
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22708
|
+
*/
|
|
22709
|
+
'storeAccess'?: Array<DataTypesStoreAccessWithDetails>;
|
|
22710
|
+
/**
|
|
22711
|
+
* Store-level menu/route permissions
|
|
22712
|
+
* @type {Array<DataTypesStoreLevelMenuRightWithMenu>}
|
|
22713
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22714
|
+
*/
|
|
22715
|
+
'storeLevelMenus'?: Array<DataTypesStoreLevelMenuRightWithMenu>;
|
|
22716
|
+
/**
|
|
22717
|
+
*
|
|
22718
|
+
* @type {boolean}
|
|
22719
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22720
|
+
*/
|
|
22721
|
+
'useCustomPermissions'?: boolean;
|
|
22722
|
+
/**
|
|
22723
|
+
*
|
|
22724
|
+
* @type {number}
|
|
22725
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22726
|
+
*/
|
|
22727
|
+
'userId'?: number;
|
|
22728
|
+
/**
|
|
22729
|
+
*
|
|
22730
|
+
* @type {number}
|
|
22731
|
+
* @memberof DataTypesUserRolePermissionsResponse
|
|
22732
|
+
*/
|
|
22733
|
+
'userSpecificRoleId'?: number;
|
|
22734
|
+
}
|
|
22332
22735
|
/**
|
|
22333
22736
|
*
|
|
22334
22737
|
* @export
|
|
@@ -22371,6 +22774,12 @@ export interface DataTypesUserStoreAccess {
|
|
|
22371
22774
|
* @memberof DataTypesUserStoreAccess
|
|
22372
22775
|
*/
|
|
22373
22776
|
'can_view'?: boolean;
|
|
22777
|
+
/**
|
|
22778
|
+
*
|
|
22779
|
+
* @type {boolean}
|
|
22780
|
+
* @memberof DataTypesUserStoreAccess
|
|
22781
|
+
*/
|
|
22782
|
+
'full_access'?: boolean;
|
|
22374
22783
|
/**
|
|
22375
22784
|
*
|
|
22376
22785
|
* @type {number}
|
|
@@ -22444,6 +22853,12 @@ export interface DataTypesUserStoreAccessWithPermissions {
|
|
|
22444
22853
|
* @memberof DataTypesUserStoreAccessWithPermissions
|
|
22445
22854
|
*/
|
|
22446
22855
|
'can_view'?: boolean;
|
|
22856
|
+
/**
|
|
22857
|
+
*
|
|
22858
|
+
* @type {boolean}
|
|
22859
|
+
* @memberof DataTypesUserStoreAccessWithPermissions
|
|
22860
|
+
*/
|
|
22861
|
+
'full_access'?: boolean;
|
|
22447
22862
|
/**
|
|
22448
22863
|
*
|
|
22449
22864
|
* @type {number}
|
|
@@ -55483,6 +55898,86 @@ export const RolesApiAxiosParamCreator = function (configuration?: Configuration
|
|
|
55483
55898
|
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
|
|
55484
55899
|
localVarRequestOptions.data = serializeDataIfNeeded(dataTypesCreateRoleRequestDto, localVarRequestOptions, configuration)
|
|
55485
55900
|
|
|
55901
|
+
return {
|
|
55902
|
+
url: toPathString(localVarUrlObj),
|
|
55903
|
+
options: localVarRequestOptions,
|
|
55904
|
+
};
|
|
55905
|
+
},
|
|
55906
|
+
/**
|
|
55907
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
55908
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
55909
|
+
* @param {number} roleId Role ID
|
|
55910
|
+
* @param {*} [options] Override http request option.
|
|
55911
|
+
* @throws {RequiredError}
|
|
55912
|
+
*/
|
|
55913
|
+
adminRolesRoleIdPermissionsGet: async (roleId: number, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
55914
|
+
// verify required parameter 'roleId' is not null or undefined
|
|
55915
|
+
assertParamExists('adminRolesRoleIdPermissionsGet', 'roleId', roleId)
|
|
55916
|
+
const localVarPath = `/admin/roles/{roleId}/permissions`
|
|
55917
|
+
.replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
|
|
55918
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
55919
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
55920
|
+
let baseOptions;
|
|
55921
|
+
if (configuration) {
|
|
55922
|
+
baseOptions = configuration.baseOptions;
|
|
55923
|
+
}
|
|
55924
|
+
|
|
55925
|
+
const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
|
|
55926
|
+
const localVarHeaderParameter = {} as any;
|
|
55927
|
+
const localVarQueryParameter = {} as any;
|
|
55928
|
+
|
|
55929
|
+
// authentication BearerAuth required
|
|
55930
|
+
await setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration)
|
|
55931
|
+
|
|
55932
|
+
|
|
55933
|
+
|
|
55934
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
55935
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
55936
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
|
|
55937
|
+
|
|
55938
|
+
return {
|
|
55939
|
+
url: toPathString(localVarUrlObj),
|
|
55940
|
+
options: localVarRequestOptions,
|
|
55941
|
+
};
|
|
55942
|
+
},
|
|
55943
|
+
/**
|
|
55944
|
+
* Updates role permissions with org-level and store-level separation
|
|
55945
|
+
* @summary Update role permissions
|
|
55946
|
+
* @param {number} roleId Role ID
|
|
55947
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
55948
|
+
* @param {*} [options] Override http request option.
|
|
55949
|
+
* @throws {RequiredError}
|
|
55950
|
+
*/
|
|
55951
|
+
adminRolesRoleIdPermissionsPut: async (roleId: number, dataTypesUpdateRolePermissionsRequest: DataTypesUpdateRolePermissionsRequest, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
55952
|
+
// verify required parameter 'roleId' is not null or undefined
|
|
55953
|
+
assertParamExists('adminRolesRoleIdPermissionsPut', 'roleId', roleId)
|
|
55954
|
+
// verify required parameter 'dataTypesUpdateRolePermissionsRequest' is not null or undefined
|
|
55955
|
+
assertParamExists('adminRolesRoleIdPermissionsPut', 'dataTypesUpdateRolePermissionsRequest', dataTypesUpdateRolePermissionsRequest)
|
|
55956
|
+
const localVarPath = `/admin/roles/{roleId}/permissions`
|
|
55957
|
+
.replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
|
|
55958
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
55959
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
55960
|
+
let baseOptions;
|
|
55961
|
+
if (configuration) {
|
|
55962
|
+
baseOptions = configuration.baseOptions;
|
|
55963
|
+
}
|
|
55964
|
+
|
|
55965
|
+
const localVarRequestOptions = { method: 'PUT', ...baseOptions, ...options};
|
|
55966
|
+
const localVarHeaderParameter = {} as any;
|
|
55967
|
+
const localVarQueryParameter = {} as any;
|
|
55968
|
+
|
|
55969
|
+
// authentication BearerAuth required
|
|
55970
|
+
await setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration)
|
|
55971
|
+
|
|
55972
|
+
|
|
55973
|
+
|
|
55974
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
55975
|
+
|
|
55976
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
55977
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
55978
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
|
|
55979
|
+
localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateRolePermissionsRequest, localVarRequestOptions, configuration)
|
|
55980
|
+
|
|
55486
55981
|
return {
|
|
55487
55982
|
url: toPathString(localVarUrlObj),
|
|
55488
55983
|
options: localVarRequestOptions,
|
|
@@ -55565,6 +56060,33 @@ export const RolesApiFp = function(configuration?: Configuration) {
|
|
|
55565
56060
|
const localVarOperationServerBasePath = operationServerMap['RolesApi.adminRolesPost']?.[localVarOperationServerIndex]?.url;
|
|
55566
56061
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
55567
56062
|
},
|
|
56063
|
+
/**
|
|
56064
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
56065
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
56066
|
+
* @param {number} roleId Role ID
|
|
56067
|
+
* @param {*} [options] Override http request option.
|
|
56068
|
+
* @throws {RequiredError}
|
|
56069
|
+
*/
|
|
56070
|
+
async adminRolesRoleIdPermissionsGet(roleId: number, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<DataTypesRolePermissionsResponse>> {
|
|
56071
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.adminRolesRoleIdPermissionsGet(roleId, options);
|
|
56072
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
56073
|
+
const localVarOperationServerBasePath = operationServerMap['RolesApi.adminRolesRoleIdPermissionsGet']?.[localVarOperationServerIndex]?.url;
|
|
56074
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
56075
|
+
},
|
|
56076
|
+
/**
|
|
56077
|
+
* Updates role permissions with org-level and store-level separation
|
|
56078
|
+
* @summary Update role permissions
|
|
56079
|
+
* @param {number} roleId Role ID
|
|
56080
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
56081
|
+
* @param {*} [options] Override http request option.
|
|
56082
|
+
* @throws {RequiredError}
|
|
56083
|
+
*/
|
|
56084
|
+
async adminRolesRoleIdPermissionsPut(roleId: number, dataTypesUpdateRolePermissionsRequest: DataTypesUpdateRolePermissionsRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<DataTypesResponse>> {
|
|
56085
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options);
|
|
56086
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
56087
|
+
const localVarOperationServerBasePath = operationServerMap['RolesApi.adminRolesRoleIdPermissionsPut']?.[localVarOperationServerIndex]?.url;
|
|
56088
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
56089
|
+
},
|
|
55568
56090
|
}
|
|
55569
56091
|
};
|
|
55570
56092
|
|
|
@@ -55627,6 +56149,27 @@ export const RolesApiFactory = function (configuration?: Configuration, basePath
|
|
|
55627
56149
|
adminRolesPost(dataTypesCreateRoleRequestDto: DataTypesCreateRoleRequestDto, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesResponse> {
|
|
55628
56150
|
return localVarFp.adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(axios, basePath));
|
|
55629
56151
|
},
|
|
56152
|
+
/**
|
|
56153
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
56154
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
56155
|
+
* @param {number} roleId Role ID
|
|
56156
|
+
* @param {*} [options] Override http request option.
|
|
56157
|
+
* @throws {RequiredError}
|
|
56158
|
+
*/
|
|
56159
|
+
adminRolesRoleIdPermissionsGet(roleId: number, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesRolePermissionsResponse> {
|
|
56160
|
+
return localVarFp.adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(axios, basePath));
|
|
56161
|
+
},
|
|
56162
|
+
/**
|
|
56163
|
+
* Updates role permissions with org-level and store-level separation
|
|
56164
|
+
* @summary Update role permissions
|
|
56165
|
+
* @param {number} roleId Role ID
|
|
56166
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
56167
|
+
* @param {*} [options] Override http request option.
|
|
56168
|
+
* @throws {RequiredError}
|
|
56169
|
+
*/
|
|
56170
|
+
adminRolesRoleIdPermissionsPut(roleId: number, dataTypesUpdateRolePermissionsRequest: DataTypesUpdateRolePermissionsRequest, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesResponse> {
|
|
56171
|
+
return localVarFp.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(axios, basePath));
|
|
56172
|
+
},
|
|
55630
56173
|
};
|
|
55631
56174
|
};
|
|
55632
56175
|
|
|
@@ -55698,6 +56241,31 @@ export class RolesApi extends BaseAPI {
|
|
|
55698
56241
|
public adminRolesPost(dataTypesCreateRoleRequestDto: DataTypesCreateRoleRequestDto, options?: RawAxiosRequestConfig) {
|
|
55699
56242
|
return RolesApiFp(this.configuration).adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(this.axios, this.basePath));
|
|
55700
56243
|
}
|
|
56244
|
+
|
|
56245
|
+
/**
|
|
56246
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
56247
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
56248
|
+
* @param {number} roleId Role ID
|
|
56249
|
+
* @param {*} [options] Override http request option.
|
|
56250
|
+
* @throws {RequiredError}
|
|
56251
|
+
* @memberof RolesApi
|
|
56252
|
+
*/
|
|
56253
|
+
public adminRolesRoleIdPermissionsGet(roleId: number, options?: RawAxiosRequestConfig) {
|
|
56254
|
+
return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(this.axios, this.basePath));
|
|
56255
|
+
}
|
|
56256
|
+
|
|
56257
|
+
/**
|
|
56258
|
+
* Updates role permissions with org-level and store-level separation
|
|
56259
|
+
* @summary Update role permissions
|
|
56260
|
+
* @param {number} roleId Role ID
|
|
56261
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
56262
|
+
* @param {*} [options] Override http request option.
|
|
56263
|
+
* @throws {RequiredError}
|
|
56264
|
+
* @memberof RolesApi
|
|
56265
|
+
*/
|
|
56266
|
+
public adminRolesRoleIdPermissionsPut(roleId: number, dataTypesUpdateRolePermissionsRequest: DataTypesUpdateRolePermissionsRequest, options?: RawAxiosRequestConfig) {
|
|
56267
|
+
return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
56268
|
+
}
|
|
55701
56269
|
}
|
|
55702
56270
|
|
|
55703
56271
|
|
|
@@ -61809,6 +62377,86 @@ export const UserApiAxiosParamCreator = function (configuration?: Configuration)
|
|
|
61809
62377
|
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
|
|
61810
62378
|
localVarRequestOptions.data = serializeDataIfNeeded(dataTypesSetUserCustomPermissionsRequest, localVarRequestOptions, configuration)
|
|
61811
62379
|
|
|
62380
|
+
return {
|
|
62381
|
+
url: toPathString(localVarUrlObj),
|
|
62382
|
+
options: localVarRequestOptions,
|
|
62383
|
+
};
|
|
62384
|
+
},
|
|
62385
|
+
/**
|
|
62386
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
62387
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
62388
|
+
* @param {number} userId User ID
|
|
62389
|
+
* @param {*} [options] Override http request option.
|
|
62390
|
+
* @throws {RequiredError}
|
|
62391
|
+
*/
|
|
62392
|
+
adminUsersUserIdPermissionsRoleGet: async (userId: number, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
62393
|
+
// verify required parameter 'userId' is not null or undefined
|
|
62394
|
+
assertParamExists('adminUsersUserIdPermissionsRoleGet', 'userId', userId)
|
|
62395
|
+
const localVarPath = `/admin/users/{userId}/permissions/role`
|
|
62396
|
+
.replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
|
|
62397
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
62398
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
62399
|
+
let baseOptions;
|
|
62400
|
+
if (configuration) {
|
|
62401
|
+
baseOptions = configuration.baseOptions;
|
|
62402
|
+
}
|
|
62403
|
+
|
|
62404
|
+
const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
|
|
62405
|
+
const localVarHeaderParameter = {} as any;
|
|
62406
|
+
const localVarQueryParameter = {} as any;
|
|
62407
|
+
|
|
62408
|
+
// authentication BearerAuth required
|
|
62409
|
+
await setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration)
|
|
62410
|
+
|
|
62411
|
+
|
|
62412
|
+
|
|
62413
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
62414
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
62415
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
|
|
62416
|
+
|
|
62417
|
+
return {
|
|
62418
|
+
url: toPathString(localVarUrlObj),
|
|
62419
|
+
options: localVarRequestOptions,
|
|
62420
|
+
};
|
|
62421
|
+
},
|
|
62422
|
+
/**
|
|
62423
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
62424
|
+
* @summary Update user-specific role permissions
|
|
62425
|
+
* @param {number} userId User ID
|
|
62426
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
62427
|
+
* @param {*} [options] Override http request option.
|
|
62428
|
+
* @throws {RequiredError}
|
|
62429
|
+
*/
|
|
62430
|
+
adminUsersUserIdPermissionsRolePut: async (userId: number, dataTypesUpdateUserRolePermissionsRequest: DataTypesUpdateUserRolePermissionsRequest, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
62431
|
+
// verify required parameter 'userId' is not null or undefined
|
|
62432
|
+
assertParamExists('adminUsersUserIdPermissionsRolePut', 'userId', userId)
|
|
62433
|
+
// verify required parameter 'dataTypesUpdateUserRolePermissionsRequest' is not null or undefined
|
|
62434
|
+
assertParamExists('adminUsersUserIdPermissionsRolePut', 'dataTypesUpdateUserRolePermissionsRequest', dataTypesUpdateUserRolePermissionsRequest)
|
|
62435
|
+
const localVarPath = `/admin/users/{userId}/permissions/role`
|
|
62436
|
+
.replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
|
|
62437
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
62438
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
62439
|
+
let baseOptions;
|
|
62440
|
+
if (configuration) {
|
|
62441
|
+
baseOptions = configuration.baseOptions;
|
|
62442
|
+
}
|
|
62443
|
+
|
|
62444
|
+
const localVarRequestOptions = { method: 'PUT', ...baseOptions, ...options};
|
|
62445
|
+
const localVarHeaderParameter = {} as any;
|
|
62446
|
+
const localVarQueryParameter = {} as any;
|
|
62447
|
+
|
|
62448
|
+
// authentication BearerAuth required
|
|
62449
|
+
await setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration)
|
|
62450
|
+
|
|
62451
|
+
|
|
62452
|
+
|
|
62453
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
62454
|
+
|
|
62455
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
62456
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
62457
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
|
|
62458
|
+
localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateUserRolePermissionsRequest, localVarRequestOptions, configuration)
|
|
62459
|
+
|
|
61812
62460
|
return {
|
|
61813
62461
|
url: toPathString(localVarUrlObj),
|
|
61814
62462
|
options: localVarRequestOptions,
|
|
@@ -61957,6 +62605,33 @@ export const UserApiFp = function(configuration?: Configuration) {
|
|
|
61957
62605
|
const localVarOperationServerBasePath = operationServerMap['UserApi.adminUsersUserIdPermissionsPut']?.[localVarOperationServerIndex]?.url;
|
|
61958
62606
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
61959
62607
|
},
|
|
62608
|
+
/**
|
|
62609
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
62610
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
62611
|
+
* @param {number} userId User ID
|
|
62612
|
+
* @param {*} [options] Override http request option.
|
|
62613
|
+
* @throws {RequiredError}
|
|
62614
|
+
*/
|
|
62615
|
+
async adminUsersUserIdPermissionsRoleGet(userId: number, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<DataTypesUserRolePermissionsResponse>> {
|
|
62616
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.adminUsersUserIdPermissionsRoleGet(userId, options);
|
|
62617
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
62618
|
+
const localVarOperationServerBasePath = operationServerMap['UserApi.adminUsersUserIdPermissionsRoleGet']?.[localVarOperationServerIndex]?.url;
|
|
62619
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
62620
|
+
},
|
|
62621
|
+
/**
|
|
62622
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
62623
|
+
* @summary Update user-specific role permissions
|
|
62624
|
+
* @param {number} userId User ID
|
|
62625
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
62626
|
+
* @param {*} [options] Override http request option.
|
|
62627
|
+
* @throws {RequiredError}
|
|
62628
|
+
*/
|
|
62629
|
+
async adminUsersUserIdPermissionsRolePut(userId: number, dataTypesUpdateUserRolePermissionsRequest: DataTypesUpdateUserRolePermissionsRequest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<DataTypesResponse>> {
|
|
62630
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options);
|
|
62631
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
62632
|
+
const localVarOperationServerBasePath = operationServerMap['UserApi.adminUsersUserIdPermissionsRolePut']?.[localVarOperationServerIndex]?.url;
|
|
62633
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
62634
|
+
},
|
|
61960
62635
|
}
|
|
61961
62636
|
};
|
|
61962
62637
|
|
|
@@ -62070,6 +62745,27 @@ export const UserApiFactory = function (configuration?: Configuration, basePath?
|
|
|
62070
62745
|
adminUsersUserIdPermissionsPut(userId: number, dataTypesSetUserCustomPermissionsRequest: DataTypesSetUserCustomPermissionsRequest, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesResponse> {
|
|
62071
62746
|
return localVarFp.adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(axios, basePath));
|
|
62072
62747
|
},
|
|
62748
|
+
/**
|
|
62749
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
62750
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
62751
|
+
* @param {number} userId User ID
|
|
62752
|
+
* @param {*} [options] Override http request option.
|
|
62753
|
+
* @throws {RequiredError}
|
|
62754
|
+
*/
|
|
62755
|
+
adminUsersUserIdPermissionsRoleGet(userId: number, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesUserRolePermissionsResponse> {
|
|
62756
|
+
return localVarFp.adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(axios, basePath));
|
|
62757
|
+
},
|
|
62758
|
+
/**
|
|
62759
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
62760
|
+
* @summary Update user-specific role permissions
|
|
62761
|
+
* @param {number} userId User ID
|
|
62762
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
62763
|
+
* @param {*} [options] Override http request option.
|
|
62764
|
+
* @throws {RequiredError}
|
|
62765
|
+
*/
|
|
62766
|
+
adminUsersUserIdPermissionsRolePut(userId: number, dataTypesUpdateUserRolePermissionsRequest: DataTypesUpdateUserRolePermissionsRequest, options?: RawAxiosRequestConfig): AxiosPromise<DataTypesResponse> {
|
|
62767
|
+
return localVarFp.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(axios, basePath));
|
|
62768
|
+
},
|
|
62073
62769
|
};
|
|
62074
62770
|
};
|
|
62075
62771
|
|
|
@@ -62202,6 +62898,31 @@ export class UserApi extends BaseAPI {
|
|
|
62202
62898
|
public adminUsersUserIdPermissionsPut(userId: number, dataTypesSetUserCustomPermissionsRequest: DataTypesSetUserCustomPermissionsRequest, options?: RawAxiosRequestConfig) {
|
|
62203
62899
|
return UserApiFp(this.configuration).adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
62204
62900
|
}
|
|
62901
|
+
|
|
62902
|
+
/**
|
|
62903
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
62904
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
62905
|
+
* @param {number} userId User ID
|
|
62906
|
+
* @param {*} [options] Override http request option.
|
|
62907
|
+
* @throws {RequiredError}
|
|
62908
|
+
* @memberof UserApi
|
|
62909
|
+
*/
|
|
62910
|
+
public adminUsersUserIdPermissionsRoleGet(userId: number, options?: RawAxiosRequestConfig) {
|
|
62911
|
+
return UserApiFp(this.configuration).adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(this.axios, this.basePath));
|
|
62912
|
+
}
|
|
62913
|
+
|
|
62914
|
+
/**
|
|
62915
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
62916
|
+
* @summary Update user-specific role permissions
|
|
62917
|
+
* @param {number} userId User ID
|
|
62918
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
62919
|
+
* @param {*} [options] Override http request option.
|
|
62920
|
+
* @throws {RequiredError}
|
|
62921
|
+
* @memberof UserApi
|
|
62922
|
+
*/
|
|
62923
|
+
public adminUsersUserIdPermissionsRolePut(userId: number, dataTypesUpdateUserRolePermissionsRequest: DataTypesUpdateUserRolePermissionsRequest, options?: RawAxiosRequestConfig) {
|
|
62924
|
+
return UserApiFp(this.configuration).adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
62925
|
+
}
|
|
62205
62926
|
}
|
|
62206
62927
|
|
|
62207
62928
|
|