@seekora-ai/admin-api 1.1.27 → 1.1.28

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/esm/api.js CHANGED
@@ -29181,6 +29181,73 @@ export const RolesApiAxiosParamCreator = function (configuration) {
29181
29181
  options: localVarRequestOptions,
29182
29182
  };
29183
29183
  }),
29184
+ /**
29185
+ * Retrieves role permissions separated by org-level and store-level menus/routes
29186
+ * @summary Get role permissions with org-level and store-level separation
29187
+ * @param {number} roleId Role ID
29188
+ * @param {*} [options] Override http request option.
29189
+ * @throws {RequiredError}
29190
+ */
29191
+ adminRolesRoleIdPermissionsGet: (roleId_1, ...args_1) => __awaiter(this, [roleId_1, ...args_1], void 0, function* (roleId, options = {}) {
29192
+ // verify required parameter 'roleId' is not null or undefined
29193
+ assertParamExists('adminRolesRoleIdPermissionsGet', 'roleId', roleId);
29194
+ const localVarPath = `/admin/roles/{roleId}/permissions`
29195
+ .replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
29196
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
29197
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
29198
+ let baseOptions;
29199
+ if (configuration) {
29200
+ baseOptions = configuration.baseOptions;
29201
+ }
29202
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
29203
+ const localVarHeaderParameter = {};
29204
+ const localVarQueryParameter = {};
29205
+ // authentication BearerAuth required
29206
+ yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
29207
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
29208
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
29209
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
29210
+ return {
29211
+ url: toPathString(localVarUrlObj),
29212
+ options: localVarRequestOptions,
29213
+ };
29214
+ }),
29215
+ /**
29216
+ * Updates role permissions with org-level and store-level separation
29217
+ * @summary Update role permissions
29218
+ * @param {number} roleId Role ID
29219
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
29220
+ * @param {*} [options] Override http request option.
29221
+ * @throws {RequiredError}
29222
+ */
29223
+ adminRolesRoleIdPermissionsPut: (roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1) => __awaiter(this, [roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1], void 0, function* (roleId, dataTypesUpdateRolePermissionsRequest, options = {}) {
29224
+ // verify required parameter 'roleId' is not null or undefined
29225
+ assertParamExists('adminRolesRoleIdPermissionsPut', 'roleId', roleId);
29226
+ // verify required parameter 'dataTypesUpdateRolePermissionsRequest' is not null or undefined
29227
+ assertParamExists('adminRolesRoleIdPermissionsPut', 'dataTypesUpdateRolePermissionsRequest', dataTypesUpdateRolePermissionsRequest);
29228
+ const localVarPath = `/admin/roles/{roleId}/permissions`
29229
+ .replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
29230
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
29231
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
29232
+ let baseOptions;
29233
+ if (configuration) {
29234
+ baseOptions = configuration.baseOptions;
29235
+ }
29236
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'PUT' }, baseOptions), options);
29237
+ const localVarHeaderParameter = {};
29238
+ const localVarQueryParameter = {};
29239
+ // authentication BearerAuth required
29240
+ yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
29241
+ localVarHeaderParameter['Content-Type'] = 'application/json';
29242
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
29243
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
29244
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
29245
+ localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateRolePermissionsRequest, localVarRequestOptions, configuration);
29246
+ return {
29247
+ url: toPathString(localVarUrlObj),
29248
+ options: localVarRequestOptions,
29249
+ };
29250
+ }),
29184
29251
  };
29185
29252
  };
29186
29253
  /**
@@ -29272,6 +29339,39 @@ export const RolesApiFp = function (configuration) {
29272
29339
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
29273
29340
  });
29274
29341
  },
29342
+ /**
29343
+ * Retrieves role permissions separated by org-level and store-level menus/routes
29344
+ * @summary Get role permissions with org-level and store-level separation
29345
+ * @param {number} roleId Role ID
29346
+ * @param {*} [options] Override http request option.
29347
+ * @throws {RequiredError}
29348
+ */
29349
+ adminRolesRoleIdPermissionsGet(roleId, options) {
29350
+ return __awaiter(this, void 0, void 0, function* () {
29351
+ var _a, _b, _c;
29352
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsGet(roleId, options);
29353
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
29354
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['RolesApi.adminRolesRoleIdPermissionsGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
29355
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
29356
+ });
29357
+ },
29358
+ /**
29359
+ * Updates role permissions with org-level and store-level separation
29360
+ * @summary Update role permissions
29361
+ * @param {number} roleId Role ID
29362
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
29363
+ * @param {*} [options] Override http request option.
29364
+ * @throws {RequiredError}
29365
+ */
29366
+ adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
29367
+ return __awaiter(this, void 0, void 0, function* () {
29368
+ var _a, _b, _c;
29369
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options);
29370
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
29371
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['RolesApi.adminRolesRoleIdPermissionsPut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
29372
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
29373
+ });
29374
+ },
29275
29375
  };
29276
29376
  };
29277
29377
  /**
@@ -29333,6 +29433,27 @@ export const RolesApiFactory = function (configuration, basePath, axios) {
29333
29433
  adminRolesPost(dataTypesCreateRoleRequestDto, options) {
29334
29434
  return localVarFp.adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(axios, basePath));
29335
29435
  },
29436
+ /**
29437
+ * Retrieves role permissions separated by org-level and store-level menus/routes
29438
+ * @summary Get role permissions with org-level and store-level separation
29439
+ * @param {number} roleId Role ID
29440
+ * @param {*} [options] Override http request option.
29441
+ * @throws {RequiredError}
29442
+ */
29443
+ adminRolesRoleIdPermissionsGet(roleId, options) {
29444
+ return localVarFp.adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(axios, basePath));
29445
+ },
29446
+ /**
29447
+ * Updates role permissions with org-level and store-level separation
29448
+ * @summary Update role permissions
29449
+ * @param {number} roleId Role ID
29450
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
29451
+ * @param {*} [options] Override http request option.
29452
+ * @throws {RequiredError}
29453
+ */
29454
+ adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
29455
+ return localVarFp.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(axios, basePath));
29456
+ },
29336
29457
  };
29337
29458
  };
29338
29459
  /**
@@ -29399,6 +29520,29 @@ export class RolesApi extends BaseAPI {
29399
29520
  adminRolesPost(dataTypesCreateRoleRequestDto, options) {
29400
29521
  return RolesApiFp(this.configuration).adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(this.axios, this.basePath));
29401
29522
  }
29523
+ /**
29524
+ * Retrieves role permissions separated by org-level and store-level menus/routes
29525
+ * @summary Get role permissions with org-level and store-level separation
29526
+ * @param {number} roleId Role ID
29527
+ * @param {*} [options] Override http request option.
29528
+ * @throws {RequiredError}
29529
+ * @memberof RolesApi
29530
+ */
29531
+ adminRolesRoleIdPermissionsGet(roleId, options) {
29532
+ return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(this.axios, this.basePath));
29533
+ }
29534
+ /**
29535
+ * Updates role permissions with org-level and store-level separation
29536
+ * @summary Update role permissions
29537
+ * @param {number} roleId Role ID
29538
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
29539
+ * @param {*} [options] Override http request option.
29540
+ * @throws {RequiredError}
29541
+ * @memberof RolesApi
29542
+ */
29543
+ adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
29544
+ return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
29545
+ }
29402
29546
  }
29403
29547
  /**
29404
29548
  * SearchApi - axios parameter creator
@@ -35079,6 +35223,73 @@ export const UserApiAxiosParamCreator = function (configuration) {
35079
35223
  options: localVarRequestOptions,
35080
35224
  };
35081
35225
  }),
35226
+ /**
35227
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
35228
+ * @summary Get user-specific role permissions with org-level and store-level separation
35229
+ * @param {number} userId User ID
35230
+ * @param {*} [options] Override http request option.
35231
+ * @throws {RequiredError}
35232
+ */
35233
+ adminUsersUserIdPermissionsRoleGet: (userId_1, ...args_1) => __awaiter(this, [userId_1, ...args_1], void 0, function* (userId, options = {}) {
35234
+ // verify required parameter 'userId' is not null or undefined
35235
+ assertParamExists('adminUsersUserIdPermissionsRoleGet', 'userId', userId);
35236
+ const localVarPath = `/admin/users/{userId}/permissions/role`
35237
+ .replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
35238
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
35239
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
35240
+ let baseOptions;
35241
+ if (configuration) {
35242
+ baseOptions = configuration.baseOptions;
35243
+ }
35244
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
35245
+ const localVarHeaderParameter = {};
35246
+ const localVarQueryParameter = {};
35247
+ // authentication BearerAuth required
35248
+ yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
35249
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
35250
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
35251
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
35252
+ return {
35253
+ url: toPathString(localVarUrlObj),
35254
+ options: localVarRequestOptions,
35255
+ };
35256
+ }),
35257
+ /**
35258
+ * Updates user-specific role permissions with org-level and store-level separation
35259
+ * @summary Update user-specific role permissions
35260
+ * @param {number} userId User ID
35261
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
35262
+ * @param {*} [options] Override http request option.
35263
+ * @throws {RequiredError}
35264
+ */
35265
+ adminUsersUserIdPermissionsRolePut: (userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1) => __awaiter(this, [userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1], void 0, function* (userId, dataTypesUpdateUserRolePermissionsRequest, options = {}) {
35266
+ // verify required parameter 'userId' is not null or undefined
35267
+ assertParamExists('adminUsersUserIdPermissionsRolePut', 'userId', userId);
35268
+ // verify required parameter 'dataTypesUpdateUserRolePermissionsRequest' is not null or undefined
35269
+ assertParamExists('adminUsersUserIdPermissionsRolePut', 'dataTypesUpdateUserRolePermissionsRequest', dataTypesUpdateUserRolePermissionsRequest);
35270
+ const localVarPath = `/admin/users/{userId}/permissions/role`
35271
+ .replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
35272
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
35273
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
35274
+ let baseOptions;
35275
+ if (configuration) {
35276
+ baseOptions = configuration.baseOptions;
35277
+ }
35278
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'PUT' }, baseOptions), options);
35279
+ const localVarHeaderParameter = {};
35280
+ const localVarQueryParameter = {};
35281
+ // authentication BearerAuth required
35282
+ yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
35283
+ localVarHeaderParameter['Content-Type'] = 'application/json';
35284
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
35285
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
35286
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
35287
+ localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateUserRolePermissionsRequest, localVarRequestOptions, configuration);
35288
+ return {
35289
+ url: toPathString(localVarUrlObj),
35290
+ options: localVarRequestOptions,
35291
+ };
35292
+ }),
35082
35293
  };
35083
35294
  };
35084
35295
  /**
@@ -35251,6 +35462,39 @@ export const UserApiFp = function (configuration) {
35251
35462
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
35252
35463
  });
35253
35464
  },
35465
+ /**
35466
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
35467
+ * @summary Get user-specific role permissions with org-level and store-level separation
35468
+ * @param {number} userId User ID
35469
+ * @param {*} [options] Override http request option.
35470
+ * @throws {RequiredError}
35471
+ */
35472
+ adminUsersUserIdPermissionsRoleGet(userId, options) {
35473
+ return __awaiter(this, void 0, void 0, function* () {
35474
+ var _a, _b, _c;
35475
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRoleGet(userId, options);
35476
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
35477
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['UserApi.adminUsersUserIdPermissionsRoleGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
35478
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
35479
+ });
35480
+ },
35481
+ /**
35482
+ * Updates user-specific role permissions with org-level and store-level separation
35483
+ * @summary Update user-specific role permissions
35484
+ * @param {number} userId User ID
35485
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
35486
+ * @param {*} [options] Override http request option.
35487
+ * @throws {RequiredError}
35488
+ */
35489
+ adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
35490
+ return __awaiter(this, void 0, void 0, function* () {
35491
+ var _a, _b, _c;
35492
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options);
35493
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
35494
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['UserApi.adminUsersUserIdPermissionsRolePut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
35495
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
35496
+ });
35497
+ },
35254
35498
  };
35255
35499
  };
35256
35500
  /**
@@ -35363,6 +35607,27 @@ export const UserApiFactory = function (configuration, basePath, axios) {
35363
35607
  adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options) {
35364
35608
  return localVarFp.adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(axios, basePath));
35365
35609
  },
35610
+ /**
35611
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
35612
+ * @summary Get user-specific role permissions with org-level and store-level separation
35613
+ * @param {number} userId User ID
35614
+ * @param {*} [options] Override http request option.
35615
+ * @throws {RequiredError}
35616
+ */
35617
+ adminUsersUserIdPermissionsRoleGet(userId, options) {
35618
+ return localVarFp.adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(axios, basePath));
35619
+ },
35620
+ /**
35621
+ * Updates user-specific role permissions with org-level and store-level separation
35622
+ * @summary Update user-specific role permissions
35623
+ * @param {number} userId User ID
35624
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
35625
+ * @param {*} [options] Override http request option.
35626
+ * @throws {RequiredError}
35627
+ */
35628
+ adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
35629
+ return localVarFp.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(axios, basePath));
35630
+ },
35366
35631
  };
35367
35632
  };
35368
35633
  /**
@@ -35485,4 +35750,27 @@ export class UserApi extends BaseAPI {
35485
35750
  adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options) {
35486
35751
  return UserApiFp(this.configuration).adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(this.axios, this.basePath));
35487
35752
  }
35753
+ /**
35754
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
35755
+ * @summary Get user-specific role permissions with org-level and store-level separation
35756
+ * @param {number} userId User ID
35757
+ * @param {*} [options] Override http request option.
35758
+ * @throws {RequiredError}
35759
+ * @memberof UserApi
35760
+ */
35761
+ adminUsersUserIdPermissionsRoleGet(userId, options) {
35762
+ return UserApiFp(this.configuration).adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(this.axios, this.basePath));
35763
+ }
35764
+ /**
35765
+ * Updates user-specific role permissions with org-level and store-level separation
35766
+ * @summary Update user-specific role permissions
35767
+ * @param {number} userId User ID
35768
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
35769
+ * @param {*} [options] Override http request option.
35770
+ * @throws {RequiredError}
35771
+ * @memberof UserApi
35772
+ */
35773
+ adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
35774
+ return UserApiFp(this.configuration).adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
35775
+ }
35488
35776
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@seekora-ai/admin-api",
3
- "version": "1.1.27",
3
+ "version": "1.1.28",
4
4
  "description": "OpenAPI client for @seekora-ai/admin-api",
5
5
  "author": "OpenAPI-Generator Contributors",
6
6
  "repository": {
Binary file
Binary file