@seekora-ai/admin-api 1.1.27 → 1.1.28
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +13 -2
- package/api.ts +723 -2
- package/dist/api.d.ts +557 -2
- package/dist/api.js +288 -0
- package/dist/esm/api.d.ts +557 -2
- package/dist/esm/api.js +288 -0
- package/package.json +1 -1
- package/seekora-ai-admin-api-1.1.28.tgz +0 -0
- package/seekora-ai-admin-api-1.1.27.tgz +0 -0
package/dist/esm/api.js
CHANGED
|
@@ -29181,6 +29181,73 @@ export const RolesApiAxiosParamCreator = function (configuration) {
|
|
|
29181
29181
|
options: localVarRequestOptions,
|
|
29182
29182
|
};
|
|
29183
29183
|
}),
|
|
29184
|
+
/**
|
|
29185
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29186
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29187
|
+
* @param {number} roleId Role ID
|
|
29188
|
+
* @param {*} [options] Override http request option.
|
|
29189
|
+
* @throws {RequiredError}
|
|
29190
|
+
*/
|
|
29191
|
+
adminRolesRoleIdPermissionsGet: (roleId_1, ...args_1) => __awaiter(this, [roleId_1, ...args_1], void 0, function* (roleId, options = {}) {
|
|
29192
|
+
// verify required parameter 'roleId' is not null or undefined
|
|
29193
|
+
assertParamExists('adminRolesRoleIdPermissionsGet', 'roleId', roleId);
|
|
29194
|
+
const localVarPath = `/admin/roles/{roleId}/permissions`
|
|
29195
|
+
.replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
|
|
29196
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
29197
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
29198
|
+
let baseOptions;
|
|
29199
|
+
if (configuration) {
|
|
29200
|
+
baseOptions = configuration.baseOptions;
|
|
29201
|
+
}
|
|
29202
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
|
|
29203
|
+
const localVarHeaderParameter = {};
|
|
29204
|
+
const localVarQueryParameter = {};
|
|
29205
|
+
// authentication BearerAuth required
|
|
29206
|
+
yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
|
|
29207
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
29208
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
29209
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
29210
|
+
return {
|
|
29211
|
+
url: toPathString(localVarUrlObj),
|
|
29212
|
+
options: localVarRequestOptions,
|
|
29213
|
+
};
|
|
29214
|
+
}),
|
|
29215
|
+
/**
|
|
29216
|
+
* Updates role permissions with org-level and store-level separation
|
|
29217
|
+
* @summary Update role permissions
|
|
29218
|
+
* @param {number} roleId Role ID
|
|
29219
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29220
|
+
* @param {*} [options] Override http request option.
|
|
29221
|
+
* @throws {RequiredError}
|
|
29222
|
+
*/
|
|
29223
|
+
adminRolesRoleIdPermissionsPut: (roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1) => __awaiter(this, [roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1], void 0, function* (roleId, dataTypesUpdateRolePermissionsRequest, options = {}) {
|
|
29224
|
+
// verify required parameter 'roleId' is not null or undefined
|
|
29225
|
+
assertParamExists('adminRolesRoleIdPermissionsPut', 'roleId', roleId);
|
|
29226
|
+
// verify required parameter 'dataTypesUpdateRolePermissionsRequest' is not null or undefined
|
|
29227
|
+
assertParamExists('adminRolesRoleIdPermissionsPut', 'dataTypesUpdateRolePermissionsRequest', dataTypesUpdateRolePermissionsRequest);
|
|
29228
|
+
const localVarPath = `/admin/roles/{roleId}/permissions`
|
|
29229
|
+
.replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
|
|
29230
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
29231
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
29232
|
+
let baseOptions;
|
|
29233
|
+
if (configuration) {
|
|
29234
|
+
baseOptions = configuration.baseOptions;
|
|
29235
|
+
}
|
|
29236
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'PUT' }, baseOptions), options);
|
|
29237
|
+
const localVarHeaderParameter = {};
|
|
29238
|
+
const localVarQueryParameter = {};
|
|
29239
|
+
// authentication BearerAuth required
|
|
29240
|
+
yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
|
|
29241
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
29242
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
29243
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
29244
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
29245
|
+
localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateRolePermissionsRequest, localVarRequestOptions, configuration);
|
|
29246
|
+
return {
|
|
29247
|
+
url: toPathString(localVarUrlObj),
|
|
29248
|
+
options: localVarRequestOptions,
|
|
29249
|
+
};
|
|
29250
|
+
}),
|
|
29184
29251
|
};
|
|
29185
29252
|
};
|
|
29186
29253
|
/**
|
|
@@ -29272,6 +29339,39 @@ export const RolesApiFp = function (configuration) {
|
|
|
29272
29339
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
29273
29340
|
});
|
|
29274
29341
|
},
|
|
29342
|
+
/**
|
|
29343
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29344
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29345
|
+
* @param {number} roleId Role ID
|
|
29346
|
+
* @param {*} [options] Override http request option.
|
|
29347
|
+
* @throws {RequiredError}
|
|
29348
|
+
*/
|
|
29349
|
+
adminRolesRoleIdPermissionsGet(roleId, options) {
|
|
29350
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
29351
|
+
var _a, _b, _c;
|
|
29352
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsGet(roleId, options);
|
|
29353
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
29354
|
+
const localVarOperationServerBasePath = (_c = (_b = operationServerMap['RolesApi.adminRolesRoleIdPermissionsGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
29355
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
29356
|
+
});
|
|
29357
|
+
},
|
|
29358
|
+
/**
|
|
29359
|
+
* Updates role permissions with org-level and store-level separation
|
|
29360
|
+
* @summary Update role permissions
|
|
29361
|
+
* @param {number} roleId Role ID
|
|
29362
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29363
|
+
* @param {*} [options] Override http request option.
|
|
29364
|
+
* @throws {RequiredError}
|
|
29365
|
+
*/
|
|
29366
|
+
adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
|
|
29367
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
29368
|
+
var _a, _b, _c;
|
|
29369
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options);
|
|
29370
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
29371
|
+
const localVarOperationServerBasePath = (_c = (_b = operationServerMap['RolesApi.adminRolesRoleIdPermissionsPut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
29372
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
29373
|
+
});
|
|
29374
|
+
},
|
|
29275
29375
|
};
|
|
29276
29376
|
};
|
|
29277
29377
|
/**
|
|
@@ -29333,6 +29433,27 @@ export const RolesApiFactory = function (configuration, basePath, axios) {
|
|
|
29333
29433
|
adminRolesPost(dataTypesCreateRoleRequestDto, options) {
|
|
29334
29434
|
return localVarFp.adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(axios, basePath));
|
|
29335
29435
|
},
|
|
29436
|
+
/**
|
|
29437
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29438
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29439
|
+
* @param {number} roleId Role ID
|
|
29440
|
+
* @param {*} [options] Override http request option.
|
|
29441
|
+
* @throws {RequiredError}
|
|
29442
|
+
*/
|
|
29443
|
+
adminRolesRoleIdPermissionsGet(roleId, options) {
|
|
29444
|
+
return localVarFp.adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(axios, basePath));
|
|
29445
|
+
},
|
|
29446
|
+
/**
|
|
29447
|
+
* Updates role permissions with org-level and store-level separation
|
|
29448
|
+
* @summary Update role permissions
|
|
29449
|
+
* @param {number} roleId Role ID
|
|
29450
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29451
|
+
* @param {*} [options] Override http request option.
|
|
29452
|
+
* @throws {RequiredError}
|
|
29453
|
+
*/
|
|
29454
|
+
adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
|
|
29455
|
+
return localVarFp.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(axios, basePath));
|
|
29456
|
+
},
|
|
29336
29457
|
};
|
|
29337
29458
|
};
|
|
29338
29459
|
/**
|
|
@@ -29399,6 +29520,29 @@ export class RolesApi extends BaseAPI {
|
|
|
29399
29520
|
adminRolesPost(dataTypesCreateRoleRequestDto, options) {
|
|
29400
29521
|
return RolesApiFp(this.configuration).adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(this.axios, this.basePath));
|
|
29401
29522
|
}
|
|
29523
|
+
/**
|
|
29524
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29525
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29526
|
+
* @param {number} roleId Role ID
|
|
29527
|
+
* @param {*} [options] Override http request option.
|
|
29528
|
+
* @throws {RequiredError}
|
|
29529
|
+
* @memberof RolesApi
|
|
29530
|
+
*/
|
|
29531
|
+
adminRolesRoleIdPermissionsGet(roleId, options) {
|
|
29532
|
+
return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(this.axios, this.basePath));
|
|
29533
|
+
}
|
|
29534
|
+
/**
|
|
29535
|
+
* Updates role permissions with org-level and store-level separation
|
|
29536
|
+
* @summary Update role permissions
|
|
29537
|
+
* @param {number} roleId Role ID
|
|
29538
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29539
|
+
* @param {*} [options] Override http request option.
|
|
29540
|
+
* @throws {RequiredError}
|
|
29541
|
+
* @memberof RolesApi
|
|
29542
|
+
*/
|
|
29543
|
+
adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
|
|
29544
|
+
return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
29545
|
+
}
|
|
29402
29546
|
}
|
|
29403
29547
|
/**
|
|
29404
29548
|
* SearchApi - axios parameter creator
|
|
@@ -35079,6 +35223,73 @@ export const UserApiAxiosParamCreator = function (configuration) {
|
|
|
35079
35223
|
options: localVarRequestOptions,
|
|
35080
35224
|
};
|
|
35081
35225
|
}),
|
|
35226
|
+
/**
|
|
35227
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35228
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35229
|
+
* @param {number} userId User ID
|
|
35230
|
+
* @param {*} [options] Override http request option.
|
|
35231
|
+
* @throws {RequiredError}
|
|
35232
|
+
*/
|
|
35233
|
+
adminUsersUserIdPermissionsRoleGet: (userId_1, ...args_1) => __awaiter(this, [userId_1, ...args_1], void 0, function* (userId, options = {}) {
|
|
35234
|
+
// verify required parameter 'userId' is not null or undefined
|
|
35235
|
+
assertParamExists('adminUsersUserIdPermissionsRoleGet', 'userId', userId);
|
|
35236
|
+
const localVarPath = `/admin/users/{userId}/permissions/role`
|
|
35237
|
+
.replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
|
|
35238
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
35239
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
35240
|
+
let baseOptions;
|
|
35241
|
+
if (configuration) {
|
|
35242
|
+
baseOptions = configuration.baseOptions;
|
|
35243
|
+
}
|
|
35244
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
|
|
35245
|
+
const localVarHeaderParameter = {};
|
|
35246
|
+
const localVarQueryParameter = {};
|
|
35247
|
+
// authentication BearerAuth required
|
|
35248
|
+
yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
|
|
35249
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
35250
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
35251
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
35252
|
+
return {
|
|
35253
|
+
url: toPathString(localVarUrlObj),
|
|
35254
|
+
options: localVarRequestOptions,
|
|
35255
|
+
};
|
|
35256
|
+
}),
|
|
35257
|
+
/**
|
|
35258
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35259
|
+
* @summary Update user-specific role permissions
|
|
35260
|
+
* @param {number} userId User ID
|
|
35261
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35262
|
+
* @param {*} [options] Override http request option.
|
|
35263
|
+
* @throws {RequiredError}
|
|
35264
|
+
*/
|
|
35265
|
+
adminUsersUserIdPermissionsRolePut: (userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1) => __awaiter(this, [userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1], void 0, function* (userId, dataTypesUpdateUserRolePermissionsRequest, options = {}) {
|
|
35266
|
+
// verify required parameter 'userId' is not null or undefined
|
|
35267
|
+
assertParamExists('adminUsersUserIdPermissionsRolePut', 'userId', userId);
|
|
35268
|
+
// verify required parameter 'dataTypesUpdateUserRolePermissionsRequest' is not null or undefined
|
|
35269
|
+
assertParamExists('adminUsersUserIdPermissionsRolePut', 'dataTypesUpdateUserRolePermissionsRequest', dataTypesUpdateUserRolePermissionsRequest);
|
|
35270
|
+
const localVarPath = `/admin/users/{userId}/permissions/role`
|
|
35271
|
+
.replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
|
|
35272
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
35273
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
35274
|
+
let baseOptions;
|
|
35275
|
+
if (configuration) {
|
|
35276
|
+
baseOptions = configuration.baseOptions;
|
|
35277
|
+
}
|
|
35278
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'PUT' }, baseOptions), options);
|
|
35279
|
+
const localVarHeaderParameter = {};
|
|
35280
|
+
const localVarQueryParameter = {};
|
|
35281
|
+
// authentication BearerAuth required
|
|
35282
|
+
yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
|
|
35283
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
35284
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
35285
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
35286
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
35287
|
+
localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateUserRolePermissionsRequest, localVarRequestOptions, configuration);
|
|
35288
|
+
return {
|
|
35289
|
+
url: toPathString(localVarUrlObj),
|
|
35290
|
+
options: localVarRequestOptions,
|
|
35291
|
+
};
|
|
35292
|
+
}),
|
|
35082
35293
|
};
|
|
35083
35294
|
};
|
|
35084
35295
|
/**
|
|
@@ -35251,6 +35462,39 @@ export const UserApiFp = function (configuration) {
|
|
|
35251
35462
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
35252
35463
|
});
|
|
35253
35464
|
},
|
|
35465
|
+
/**
|
|
35466
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35467
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35468
|
+
* @param {number} userId User ID
|
|
35469
|
+
* @param {*} [options] Override http request option.
|
|
35470
|
+
* @throws {RequiredError}
|
|
35471
|
+
*/
|
|
35472
|
+
adminUsersUserIdPermissionsRoleGet(userId, options) {
|
|
35473
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
35474
|
+
var _a, _b, _c;
|
|
35475
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRoleGet(userId, options);
|
|
35476
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
35477
|
+
const localVarOperationServerBasePath = (_c = (_b = operationServerMap['UserApi.adminUsersUserIdPermissionsRoleGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
35478
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
35479
|
+
});
|
|
35480
|
+
},
|
|
35481
|
+
/**
|
|
35482
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35483
|
+
* @summary Update user-specific role permissions
|
|
35484
|
+
* @param {number} userId User ID
|
|
35485
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35486
|
+
* @param {*} [options] Override http request option.
|
|
35487
|
+
* @throws {RequiredError}
|
|
35488
|
+
*/
|
|
35489
|
+
adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
|
|
35490
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
35491
|
+
var _a, _b, _c;
|
|
35492
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options);
|
|
35493
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
35494
|
+
const localVarOperationServerBasePath = (_c = (_b = operationServerMap['UserApi.adminUsersUserIdPermissionsRolePut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
35495
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
35496
|
+
});
|
|
35497
|
+
},
|
|
35254
35498
|
};
|
|
35255
35499
|
};
|
|
35256
35500
|
/**
|
|
@@ -35363,6 +35607,27 @@ export const UserApiFactory = function (configuration, basePath, axios) {
|
|
|
35363
35607
|
adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options) {
|
|
35364
35608
|
return localVarFp.adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(axios, basePath));
|
|
35365
35609
|
},
|
|
35610
|
+
/**
|
|
35611
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35612
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35613
|
+
* @param {number} userId User ID
|
|
35614
|
+
* @param {*} [options] Override http request option.
|
|
35615
|
+
* @throws {RequiredError}
|
|
35616
|
+
*/
|
|
35617
|
+
adminUsersUserIdPermissionsRoleGet(userId, options) {
|
|
35618
|
+
return localVarFp.adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(axios, basePath));
|
|
35619
|
+
},
|
|
35620
|
+
/**
|
|
35621
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35622
|
+
* @summary Update user-specific role permissions
|
|
35623
|
+
* @param {number} userId User ID
|
|
35624
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35625
|
+
* @param {*} [options] Override http request option.
|
|
35626
|
+
* @throws {RequiredError}
|
|
35627
|
+
*/
|
|
35628
|
+
adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
|
|
35629
|
+
return localVarFp.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(axios, basePath));
|
|
35630
|
+
},
|
|
35366
35631
|
};
|
|
35367
35632
|
};
|
|
35368
35633
|
/**
|
|
@@ -35485,4 +35750,27 @@ export class UserApi extends BaseAPI {
|
|
|
35485
35750
|
adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options) {
|
|
35486
35751
|
return UserApiFp(this.configuration).adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
35487
35752
|
}
|
|
35753
|
+
/**
|
|
35754
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35755
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35756
|
+
* @param {number} userId User ID
|
|
35757
|
+
* @param {*} [options] Override http request option.
|
|
35758
|
+
* @throws {RequiredError}
|
|
35759
|
+
* @memberof UserApi
|
|
35760
|
+
*/
|
|
35761
|
+
adminUsersUserIdPermissionsRoleGet(userId, options) {
|
|
35762
|
+
return UserApiFp(this.configuration).adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(this.axios, this.basePath));
|
|
35763
|
+
}
|
|
35764
|
+
/**
|
|
35765
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35766
|
+
* @summary Update user-specific role permissions
|
|
35767
|
+
* @param {number} userId User ID
|
|
35768
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35769
|
+
* @param {*} [options] Override http request option.
|
|
35770
|
+
* @throws {RequiredError}
|
|
35771
|
+
* @memberof UserApi
|
|
35772
|
+
*/
|
|
35773
|
+
adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
|
|
35774
|
+
return UserApiFp(this.configuration).adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
35775
|
+
}
|
|
35488
35776
|
}
|
package/package.json
CHANGED
|
Binary file
|
|
Binary file
|