@seekora-ai/admin-api 1.1.27 → 1.1.28
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +13 -2
- package/api.ts +723 -2
- package/dist/api.d.ts +557 -2
- package/dist/api.js +288 -0
- package/dist/esm/api.d.ts +557 -2
- package/dist/esm/api.js +288 -0
- package/package.json +1 -1
- package/seekora-ai-admin-api-1.1.28.tgz +0 -0
- package/seekora-ai-admin-api-1.1.27.tgz +0 -0
package/dist/api.js
CHANGED
|
@@ -29366,6 +29366,73 @@ const RolesApiAxiosParamCreator = function (configuration) {
|
|
|
29366
29366
|
options: localVarRequestOptions,
|
|
29367
29367
|
};
|
|
29368
29368
|
}),
|
|
29369
|
+
/**
|
|
29370
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29371
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29372
|
+
* @param {number} roleId Role ID
|
|
29373
|
+
* @param {*} [options] Override http request option.
|
|
29374
|
+
* @throws {RequiredError}
|
|
29375
|
+
*/
|
|
29376
|
+
adminRolesRoleIdPermissionsGet: (roleId_1, ...args_1) => __awaiter(this, [roleId_1, ...args_1], void 0, function* (roleId, options = {}) {
|
|
29377
|
+
// verify required parameter 'roleId' is not null or undefined
|
|
29378
|
+
(0, common_1.assertParamExists)('adminRolesRoleIdPermissionsGet', 'roleId', roleId);
|
|
29379
|
+
const localVarPath = `/admin/roles/{roleId}/permissions`
|
|
29380
|
+
.replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
|
|
29381
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
29382
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
29383
|
+
let baseOptions;
|
|
29384
|
+
if (configuration) {
|
|
29385
|
+
baseOptions = configuration.baseOptions;
|
|
29386
|
+
}
|
|
29387
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
|
|
29388
|
+
const localVarHeaderParameter = {};
|
|
29389
|
+
const localVarQueryParameter = {};
|
|
29390
|
+
// authentication BearerAuth required
|
|
29391
|
+
yield (0, common_1.setApiKeyToObject)(localVarHeaderParameter, "Authorization", configuration);
|
|
29392
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
29393
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
29394
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
29395
|
+
return {
|
|
29396
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
29397
|
+
options: localVarRequestOptions,
|
|
29398
|
+
};
|
|
29399
|
+
}),
|
|
29400
|
+
/**
|
|
29401
|
+
* Updates role permissions with org-level and store-level separation
|
|
29402
|
+
* @summary Update role permissions
|
|
29403
|
+
* @param {number} roleId Role ID
|
|
29404
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29405
|
+
* @param {*} [options] Override http request option.
|
|
29406
|
+
* @throws {RequiredError}
|
|
29407
|
+
*/
|
|
29408
|
+
adminRolesRoleIdPermissionsPut: (roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1) => __awaiter(this, [roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1], void 0, function* (roleId, dataTypesUpdateRolePermissionsRequest, options = {}) {
|
|
29409
|
+
// verify required parameter 'roleId' is not null or undefined
|
|
29410
|
+
(0, common_1.assertParamExists)('adminRolesRoleIdPermissionsPut', 'roleId', roleId);
|
|
29411
|
+
// verify required parameter 'dataTypesUpdateRolePermissionsRequest' is not null or undefined
|
|
29412
|
+
(0, common_1.assertParamExists)('adminRolesRoleIdPermissionsPut', 'dataTypesUpdateRolePermissionsRequest', dataTypesUpdateRolePermissionsRequest);
|
|
29413
|
+
const localVarPath = `/admin/roles/{roleId}/permissions`
|
|
29414
|
+
.replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
|
|
29415
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
29416
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
29417
|
+
let baseOptions;
|
|
29418
|
+
if (configuration) {
|
|
29419
|
+
baseOptions = configuration.baseOptions;
|
|
29420
|
+
}
|
|
29421
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'PUT' }, baseOptions), options);
|
|
29422
|
+
const localVarHeaderParameter = {};
|
|
29423
|
+
const localVarQueryParameter = {};
|
|
29424
|
+
// authentication BearerAuth required
|
|
29425
|
+
yield (0, common_1.setApiKeyToObject)(localVarHeaderParameter, "Authorization", configuration);
|
|
29426
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
29427
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
29428
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
29429
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
29430
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(dataTypesUpdateRolePermissionsRequest, localVarRequestOptions, configuration);
|
|
29431
|
+
return {
|
|
29432
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
29433
|
+
options: localVarRequestOptions,
|
|
29434
|
+
};
|
|
29435
|
+
}),
|
|
29369
29436
|
};
|
|
29370
29437
|
};
|
|
29371
29438
|
exports.RolesApiAxiosParamCreator = RolesApiAxiosParamCreator;
|
|
@@ -29458,6 +29525,39 @@ const RolesApiFp = function (configuration) {
|
|
|
29458
29525
|
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
29459
29526
|
});
|
|
29460
29527
|
},
|
|
29528
|
+
/**
|
|
29529
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29530
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29531
|
+
* @param {number} roleId Role ID
|
|
29532
|
+
* @param {*} [options] Override http request option.
|
|
29533
|
+
* @throws {RequiredError}
|
|
29534
|
+
*/
|
|
29535
|
+
adminRolesRoleIdPermissionsGet(roleId, options) {
|
|
29536
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
29537
|
+
var _a, _b, _c;
|
|
29538
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsGet(roleId, options);
|
|
29539
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
29540
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['RolesApi.adminRolesRoleIdPermissionsGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
29541
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
29542
|
+
});
|
|
29543
|
+
},
|
|
29544
|
+
/**
|
|
29545
|
+
* Updates role permissions with org-level and store-level separation
|
|
29546
|
+
* @summary Update role permissions
|
|
29547
|
+
* @param {number} roleId Role ID
|
|
29548
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29549
|
+
* @param {*} [options] Override http request option.
|
|
29550
|
+
* @throws {RequiredError}
|
|
29551
|
+
*/
|
|
29552
|
+
adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
|
|
29553
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
29554
|
+
var _a, _b, _c;
|
|
29555
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options);
|
|
29556
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
29557
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['RolesApi.adminRolesRoleIdPermissionsPut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
29558
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
29559
|
+
});
|
|
29560
|
+
},
|
|
29461
29561
|
};
|
|
29462
29562
|
};
|
|
29463
29563
|
exports.RolesApiFp = RolesApiFp;
|
|
@@ -29520,6 +29620,27 @@ const RolesApiFactory = function (configuration, basePath, axios) {
|
|
|
29520
29620
|
adminRolesPost(dataTypesCreateRoleRequestDto, options) {
|
|
29521
29621
|
return localVarFp.adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(axios, basePath));
|
|
29522
29622
|
},
|
|
29623
|
+
/**
|
|
29624
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29625
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29626
|
+
* @param {number} roleId Role ID
|
|
29627
|
+
* @param {*} [options] Override http request option.
|
|
29628
|
+
* @throws {RequiredError}
|
|
29629
|
+
*/
|
|
29630
|
+
adminRolesRoleIdPermissionsGet(roleId, options) {
|
|
29631
|
+
return localVarFp.adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(axios, basePath));
|
|
29632
|
+
},
|
|
29633
|
+
/**
|
|
29634
|
+
* Updates role permissions with org-level and store-level separation
|
|
29635
|
+
* @summary Update role permissions
|
|
29636
|
+
* @param {number} roleId Role ID
|
|
29637
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29638
|
+
* @param {*} [options] Override http request option.
|
|
29639
|
+
* @throws {RequiredError}
|
|
29640
|
+
*/
|
|
29641
|
+
adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
|
|
29642
|
+
return localVarFp.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(axios, basePath));
|
|
29643
|
+
},
|
|
29523
29644
|
};
|
|
29524
29645
|
};
|
|
29525
29646
|
exports.RolesApiFactory = RolesApiFactory;
|
|
@@ -29587,6 +29708,29 @@ class RolesApi extends base_1.BaseAPI {
|
|
|
29587
29708
|
adminRolesPost(dataTypesCreateRoleRequestDto, options) {
|
|
29588
29709
|
return (0, exports.RolesApiFp)(this.configuration).adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(this.axios, this.basePath));
|
|
29589
29710
|
}
|
|
29711
|
+
/**
|
|
29712
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29713
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29714
|
+
* @param {number} roleId Role ID
|
|
29715
|
+
* @param {*} [options] Override http request option.
|
|
29716
|
+
* @throws {RequiredError}
|
|
29717
|
+
* @memberof RolesApi
|
|
29718
|
+
*/
|
|
29719
|
+
adminRolesRoleIdPermissionsGet(roleId, options) {
|
|
29720
|
+
return (0, exports.RolesApiFp)(this.configuration).adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(this.axios, this.basePath));
|
|
29721
|
+
}
|
|
29722
|
+
/**
|
|
29723
|
+
* Updates role permissions with org-level and store-level separation
|
|
29724
|
+
* @summary Update role permissions
|
|
29725
|
+
* @param {number} roleId Role ID
|
|
29726
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29727
|
+
* @param {*} [options] Override http request option.
|
|
29728
|
+
* @throws {RequiredError}
|
|
29729
|
+
* @memberof RolesApi
|
|
29730
|
+
*/
|
|
29731
|
+
adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
|
|
29732
|
+
return (0, exports.RolesApiFp)(this.configuration).adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
29733
|
+
}
|
|
29590
29734
|
}
|
|
29591
29735
|
exports.RolesApi = RolesApi;
|
|
29592
29736
|
/**
|
|
@@ -35300,6 +35444,73 @@ const UserApiAxiosParamCreator = function (configuration) {
|
|
|
35300
35444
|
options: localVarRequestOptions,
|
|
35301
35445
|
};
|
|
35302
35446
|
}),
|
|
35447
|
+
/**
|
|
35448
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35449
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35450
|
+
* @param {number} userId User ID
|
|
35451
|
+
* @param {*} [options] Override http request option.
|
|
35452
|
+
* @throws {RequiredError}
|
|
35453
|
+
*/
|
|
35454
|
+
adminUsersUserIdPermissionsRoleGet: (userId_1, ...args_1) => __awaiter(this, [userId_1, ...args_1], void 0, function* (userId, options = {}) {
|
|
35455
|
+
// verify required parameter 'userId' is not null or undefined
|
|
35456
|
+
(0, common_1.assertParamExists)('adminUsersUserIdPermissionsRoleGet', 'userId', userId);
|
|
35457
|
+
const localVarPath = `/admin/users/{userId}/permissions/role`
|
|
35458
|
+
.replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
|
|
35459
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
35460
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
35461
|
+
let baseOptions;
|
|
35462
|
+
if (configuration) {
|
|
35463
|
+
baseOptions = configuration.baseOptions;
|
|
35464
|
+
}
|
|
35465
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
|
|
35466
|
+
const localVarHeaderParameter = {};
|
|
35467
|
+
const localVarQueryParameter = {};
|
|
35468
|
+
// authentication BearerAuth required
|
|
35469
|
+
yield (0, common_1.setApiKeyToObject)(localVarHeaderParameter, "Authorization", configuration);
|
|
35470
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
35471
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
35472
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
35473
|
+
return {
|
|
35474
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
35475
|
+
options: localVarRequestOptions,
|
|
35476
|
+
};
|
|
35477
|
+
}),
|
|
35478
|
+
/**
|
|
35479
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35480
|
+
* @summary Update user-specific role permissions
|
|
35481
|
+
* @param {number} userId User ID
|
|
35482
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35483
|
+
* @param {*} [options] Override http request option.
|
|
35484
|
+
* @throws {RequiredError}
|
|
35485
|
+
*/
|
|
35486
|
+
adminUsersUserIdPermissionsRolePut: (userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1) => __awaiter(this, [userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1], void 0, function* (userId, dataTypesUpdateUserRolePermissionsRequest, options = {}) {
|
|
35487
|
+
// verify required parameter 'userId' is not null or undefined
|
|
35488
|
+
(0, common_1.assertParamExists)('adminUsersUserIdPermissionsRolePut', 'userId', userId);
|
|
35489
|
+
// verify required parameter 'dataTypesUpdateUserRolePermissionsRequest' is not null or undefined
|
|
35490
|
+
(0, common_1.assertParamExists)('adminUsersUserIdPermissionsRolePut', 'dataTypesUpdateUserRolePermissionsRequest', dataTypesUpdateUserRolePermissionsRequest);
|
|
35491
|
+
const localVarPath = `/admin/users/{userId}/permissions/role`
|
|
35492
|
+
.replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
|
|
35493
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
35494
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
35495
|
+
let baseOptions;
|
|
35496
|
+
if (configuration) {
|
|
35497
|
+
baseOptions = configuration.baseOptions;
|
|
35498
|
+
}
|
|
35499
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'PUT' }, baseOptions), options);
|
|
35500
|
+
const localVarHeaderParameter = {};
|
|
35501
|
+
const localVarQueryParameter = {};
|
|
35502
|
+
// authentication BearerAuth required
|
|
35503
|
+
yield (0, common_1.setApiKeyToObject)(localVarHeaderParameter, "Authorization", configuration);
|
|
35504
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
35505
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
35506
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
35507
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
35508
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(dataTypesUpdateUserRolePermissionsRequest, localVarRequestOptions, configuration);
|
|
35509
|
+
return {
|
|
35510
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
35511
|
+
options: localVarRequestOptions,
|
|
35512
|
+
};
|
|
35513
|
+
}),
|
|
35303
35514
|
};
|
|
35304
35515
|
};
|
|
35305
35516
|
exports.UserApiAxiosParamCreator = UserApiAxiosParamCreator;
|
|
@@ -35473,6 +35684,39 @@ const UserApiFp = function (configuration) {
|
|
|
35473
35684
|
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
35474
35685
|
});
|
|
35475
35686
|
},
|
|
35687
|
+
/**
|
|
35688
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35689
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35690
|
+
* @param {number} userId User ID
|
|
35691
|
+
* @param {*} [options] Override http request option.
|
|
35692
|
+
* @throws {RequiredError}
|
|
35693
|
+
*/
|
|
35694
|
+
adminUsersUserIdPermissionsRoleGet(userId, options) {
|
|
35695
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
35696
|
+
var _a, _b, _c;
|
|
35697
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRoleGet(userId, options);
|
|
35698
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
35699
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['UserApi.adminUsersUserIdPermissionsRoleGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
35700
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
35701
|
+
});
|
|
35702
|
+
},
|
|
35703
|
+
/**
|
|
35704
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35705
|
+
* @summary Update user-specific role permissions
|
|
35706
|
+
* @param {number} userId User ID
|
|
35707
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35708
|
+
* @param {*} [options] Override http request option.
|
|
35709
|
+
* @throws {RequiredError}
|
|
35710
|
+
*/
|
|
35711
|
+
adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
|
|
35712
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
35713
|
+
var _a, _b, _c;
|
|
35714
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options);
|
|
35715
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
35716
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['UserApi.adminUsersUserIdPermissionsRolePut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
35717
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
35718
|
+
});
|
|
35719
|
+
},
|
|
35476
35720
|
};
|
|
35477
35721
|
};
|
|
35478
35722
|
exports.UserApiFp = UserApiFp;
|
|
@@ -35586,6 +35830,27 @@ const UserApiFactory = function (configuration, basePath, axios) {
|
|
|
35586
35830
|
adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options) {
|
|
35587
35831
|
return localVarFp.adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(axios, basePath));
|
|
35588
35832
|
},
|
|
35833
|
+
/**
|
|
35834
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35835
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35836
|
+
* @param {number} userId User ID
|
|
35837
|
+
* @param {*} [options] Override http request option.
|
|
35838
|
+
* @throws {RequiredError}
|
|
35839
|
+
*/
|
|
35840
|
+
adminUsersUserIdPermissionsRoleGet(userId, options) {
|
|
35841
|
+
return localVarFp.adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(axios, basePath));
|
|
35842
|
+
},
|
|
35843
|
+
/**
|
|
35844
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35845
|
+
* @summary Update user-specific role permissions
|
|
35846
|
+
* @param {number} userId User ID
|
|
35847
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35848
|
+
* @param {*} [options] Override http request option.
|
|
35849
|
+
* @throws {RequiredError}
|
|
35850
|
+
*/
|
|
35851
|
+
adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
|
|
35852
|
+
return localVarFp.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(axios, basePath));
|
|
35853
|
+
},
|
|
35589
35854
|
};
|
|
35590
35855
|
};
|
|
35591
35856
|
exports.UserApiFactory = UserApiFactory;
|
|
@@ -35709,5 +35974,28 @@ class UserApi extends base_1.BaseAPI {
|
|
|
35709
35974
|
adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options) {
|
|
35710
35975
|
return (0, exports.UserApiFp)(this.configuration).adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
35711
35976
|
}
|
|
35977
|
+
/**
|
|
35978
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35979
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35980
|
+
* @param {number} userId User ID
|
|
35981
|
+
* @param {*} [options] Override http request option.
|
|
35982
|
+
* @throws {RequiredError}
|
|
35983
|
+
* @memberof UserApi
|
|
35984
|
+
*/
|
|
35985
|
+
adminUsersUserIdPermissionsRoleGet(userId, options) {
|
|
35986
|
+
return (0, exports.UserApiFp)(this.configuration).adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(this.axios, this.basePath));
|
|
35987
|
+
}
|
|
35988
|
+
/**
|
|
35989
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35990
|
+
* @summary Update user-specific role permissions
|
|
35991
|
+
* @param {number} userId User ID
|
|
35992
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35993
|
+
* @param {*} [options] Override http request option.
|
|
35994
|
+
* @throws {RequiredError}
|
|
35995
|
+
* @memberof UserApi
|
|
35996
|
+
*/
|
|
35997
|
+
adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
|
|
35998
|
+
return (0, exports.UserApiFp)(this.configuration).adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
35999
|
+
}
|
|
35712
36000
|
}
|
|
35713
36001
|
exports.UserApi = UserApi;
|