@seekora-ai/admin-api 1.1.27 → 1.1.29
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +18 -2
- package/api.ts +872 -8
- package/dist/api.d.ts +707 -9
- package/dist/api.js +292 -4
- package/dist/esm/api.d.ts +707 -9
- package/dist/esm/api.js +292 -4
- package/package.json +1 -1
- package/seekora-ai-admin-api-1.1.29.tgz +0 -0
- package/seekora-ai-admin-api-1.1.27.tgz +0 -0
package/dist/api.js
CHANGED
|
@@ -29366,6 +29366,73 @@ const RolesApiAxiosParamCreator = function (configuration) {
|
|
|
29366
29366
|
options: localVarRequestOptions,
|
|
29367
29367
|
};
|
|
29368
29368
|
}),
|
|
29369
|
+
/**
|
|
29370
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29371
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29372
|
+
* @param {number} roleId Role ID
|
|
29373
|
+
* @param {*} [options] Override http request option.
|
|
29374
|
+
* @throws {RequiredError}
|
|
29375
|
+
*/
|
|
29376
|
+
adminRolesRoleIdPermissionsGet: (roleId_1, ...args_1) => __awaiter(this, [roleId_1, ...args_1], void 0, function* (roleId, options = {}) {
|
|
29377
|
+
// verify required parameter 'roleId' is not null or undefined
|
|
29378
|
+
(0, common_1.assertParamExists)('adminRolesRoleIdPermissionsGet', 'roleId', roleId);
|
|
29379
|
+
const localVarPath = `/admin/roles/{roleId}/permissions`
|
|
29380
|
+
.replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
|
|
29381
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
29382
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
29383
|
+
let baseOptions;
|
|
29384
|
+
if (configuration) {
|
|
29385
|
+
baseOptions = configuration.baseOptions;
|
|
29386
|
+
}
|
|
29387
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
|
|
29388
|
+
const localVarHeaderParameter = {};
|
|
29389
|
+
const localVarQueryParameter = {};
|
|
29390
|
+
// authentication BearerAuth required
|
|
29391
|
+
yield (0, common_1.setApiKeyToObject)(localVarHeaderParameter, "Authorization", configuration);
|
|
29392
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
29393
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
29394
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
29395
|
+
return {
|
|
29396
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
29397
|
+
options: localVarRequestOptions,
|
|
29398
|
+
};
|
|
29399
|
+
}),
|
|
29400
|
+
/**
|
|
29401
|
+
* Updates role permissions with org-level and store-level separation
|
|
29402
|
+
* @summary Update role permissions
|
|
29403
|
+
* @param {number} roleId Role ID
|
|
29404
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29405
|
+
* @param {*} [options] Override http request option.
|
|
29406
|
+
* @throws {RequiredError}
|
|
29407
|
+
*/
|
|
29408
|
+
adminRolesRoleIdPermissionsPut: (roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1) => __awaiter(this, [roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1], void 0, function* (roleId, dataTypesUpdateRolePermissionsRequest, options = {}) {
|
|
29409
|
+
// verify required parameter 'roleId' is not null or undefined
|
|
29410
|
+
(0, common_1.assertParamExists)('adminRolesRoleIdPermissionsPut', 'roleId', roleId);
|
|
29411
|
+
// verify required parameter 'dataTypesUpdateRolePermissionsRequest' is not null or undefined
|
|
29412
|
+
(0, common_1.assertParamExists)('adminRolesRoleIdPermissionsPut', 'dataTypesUpdateRolePermissionsRequest', dataTypesUpdateRolePermissionsRequest);
|
|
29413
|
+
const localVarPath = `/admin/roles/{roleId}/permissions`
|
|
29414
|
+
.replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
|
|
29415
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
29416
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
29417
|
+
let baseOptions;
|
|
29418
|
+
if (configuration) {
|
|
29419
|
+
baseOptions = configuration.baseOptions;
|
|
29420
|
+
}
|
|
29421
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'PUT' }, baseOptions), options);
|
|
29422
|
+
const localVarHeaderParameter = {};
|
|
29423
|
+
const localVarQueryParameter = {};
|
|
29424
|
+
// authentication BearerAuth required
|
|
29425
|
+
yield (0, common_1.setApiKeyToObject)(localVarHeaderParameter, "Authorization", configuration);
|
|
29426
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
29427
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
29428
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
29429
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
29430
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(dataTypesUpdateRolePermissionsRequest, localVarRequestOptions, configuration);
|
|
29431
|
+
return {
|
|
29432
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
29433
|
+
options: localVarRequestOptions,
|
|
29434
|
+
};
|
|
29435
|
+
}),
|
|
29369
29436
|
};
|
|
29370
29437
|
};
|
|
29371
29438
|
exports.RolesApiAxiosParamCreator = RolesApiAxiosParamCreator;
|
|
@@ -29458,6 +29525,39 @@ const RolesApiFp = function (configuration) {
|
|
|
29458
29525
|
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
29459
29526
|
});
|
|
29460
29527
|
},
|
|
29528
|
+
/**
|
|
29529
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29530
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29531
|
+
* @param {number} roleId Role ID
|
|
29532
|
+
* @param {*} [options] Override http request option.
|
|
29533
|
+
* @throws {RequiredError}
|
|
29534
|
+
*/
|
|
29535
|
+
adminRolesRoleIdPermissionsGet(roleId, options) {
|
|
29536
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
29537
|
+
var _a, _b, _c;
|
|
29538
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsGet(roleId, options);
|
|
29539
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
29540
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['RolesApi.adminRolesRoleIdPermissionsGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
29541
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
29542
|
+
});
|
|
29543
|
+
},
|
|
29544
|
+
/**
|
|
29545
|
+
* Updates role permissions with org-level and store-level separation
|
|
29546
|
+
* @summary Update role permissions
|
|
29547
|
+
* @param {number} roleId Role ID
|
|
29548
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29549
|
+
* @param {*} [options] Override http request option.
|
|
29550
|
+
* @throws {RequiredError}
|
|
29551
|
+
*/
|
|
29552
|
+
adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
|
|
29553
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
29554
|
+
var _a, _b, _c;
|
|
29555
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options);
|
|
29556
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
29557
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['RolesApi.adminRolesRoleIdPermissionsPut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
29558
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
29559
|
+
});
|
|
29560
|
+
},
|
|
29461
29561
|
};
|
|
29462
29562
|
};
|
|
29463
29563
|
exports.RolesApiFp = RolesApiFp;
|
|
@@ -29520,6 +29620,27 @@ const RolesApiFactory = function (configuration, basePath, axios) {
|
|
|
29520
29620
|
adminRolesPost(dataTypesCreateRoleRequestDto, options) {
|
|
29521
29621
|
return localVarFp.adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(axios, basePath));
|
|
29522
29622
|
},
|
|
29623
|
+
/**
|
|
29624
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29625
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29626
|
+
* @param {number} roleId Role ID
|
|
29627
|
+
* @param {*} [options] Override http request option.
|
|
29628
|
+
* @throws {RequiredError}
|
|
29629
|
+
*/
|
|
29630
|
+
adminRolesRoleIdPermissionsGet(roleId, options) {
|
|
29631
|
+
return localVarFp.adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(axios, basePath));
|
|
29632
|
+
},
|
|
29633
|
+
/**
|
|
29634
|
+
* Updates role permissions with org-level and store-level separation
|
|
29635
|
+
* @summary Update role permissions
|
|
29636
|
+
* @param {number} roleId Role ID
|
|
29637
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29638
|
+
* @param {*} [options] Override http request option.
|
|
29639
|
+
* @throws {RequiredError}
|
|
29640
|
+
*/
|
|
29641
|
+
adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
|
|
29642
|
+
return localVarFp.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(axios, basePath));
|
|
29643
|
+
},
|
|
29523
29644
|
};
|
|
29524
29645
|
};
|
|
29525
29646
|
exports.RolesApiFactory = RolesApiFactory;
|
|
@@ -29587,6 +29708,29 @@ class RolesApi extends base_1.BaseAPI {
|
|
|
29587
29708
|
adminRolesPost(dataTypesCreateRoleRequestDto, options) {
|
|
29588
29709
|
return (0, exports.RolesApiFp)(this.configuration).adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(this.axios, this.basePath));
|
|
29589
29710
|
}
|
|
29711
|
+
/**
|
|
29712
|
+
* Retrieves role permissions separated by org-level and store-level menus/routes
|
|
29713
|
+
* @summary Get role permissions with org-level and store-level separation
|
|
29714
|
+
* @param {number} roleId Role ID
|
|
29715
|
+
* @param {*} [options] Override http request option.
|
|
29716
|
+
* @throws {RequiredError}
|
|
29717
|
+
* @memberof RolesApi
|
|
29718
|
+
*/
|
|
29719
|
+
adminRolesRoleIdPermissionsGet(roleId, options) {
|
|
29720
|
+
return (0, exports.RolesApiFp)(this.configuration).adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(this.axios, this.basePath));
|
|
29721
|
+
}
|
|
29722
|
+
/**
|
|
29723
|
+
* Updates role permissions with org-level and store-level separation
|
|
29724
|
+
* @summary Update role permissions
|
|
29725
|
+
* @param {number} roleId Role ID
|
|
29726
|
+
* @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
|
|
29727
|
+
* @param {*} [options] Override http request option.
|
|
29728
|
+
* @throws {RequiredError}
|
|
29729
|
+
* @memberof RolesApi
|
|
29730
|
+
*/
|
|
29731
|
+
adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
|
|
29732
|
+
return (0, exports.RolesApiFp)(this.configuration).adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
29733
|
+
}
|
|
29590
29734
|
}
|
|
29591
29735
|
exports.RolesApi = RolesApi;
|
|
29592
29736
|
/**
|
|
@@ -32164,7 +32308,7 @@ const StoresApiAxiosParamCreator = function (configuration) {
|
|
|
32164
32308
|
};
|
|
32165
32309
|
}),
|
|
32166
32310
|
/**
|
|
32167
|
-
* Retrieves the store configuration using x-store ID
|
|
32311
|
+
* Retrieves the store configuration using x-store ID, including onboarding status validation
|
|
32168
32312
|
* @summary Get Store Config
|
|
32169
32313
|
* @param {string} xStoreID X-Store ID
|
|
32170
32314
|
* @param {*} [options] Override http request option.
|
|
@@ -32636,7 +32780,7 @@ const StoresApiFp = function (configuration) {
|
|
|
32636
32780
|
});
|
|
32637
32781
|
},
|
|
32638
32782
|
/**
|
|
32639
|
-
* Retrieves the store configuration using x-store ID
|
|
32783
|
+
* Retrieves the store configuration using x-store ID, including onboarding status validation
|
|
32640
32784
|
* @summary Get Store Config
|
|
32641
32785
|
* @param {string} xStoreID X-Store ID
|
|
32642
32786
|
* @param {*} [options] Override http request option.
|
|
@@ -32899,7 +33043,7 @@ const StoresApiFactory = function (configuration, basePath, axios) {
|
|
|
32899
33043
|
return localVarFp.adminStoresXStoreIDApiUsageGet(xStoreID, startDate, endDate, method, path, page, perPage, options).then((request) => request(axios, basePath));
|
|
32900
33044
|
},
|
|
32901
33045
|
/**
|
|
32902
|
-
* Retrieves the store configuration using x-store ID
|
|
33046
|
+
* Retrieves the store configuration using x-store ID, including onboarding status validation
|
|
32903
33047
|
* @summary Get Store Config
|
|
32904
33048
|
* @param {string} xStoreID X-Store ID
|
|
32905
33049
|
* @param {*} [options] Override http request option.
|
|
@@ -33117,7 +33261,7 @@ class StoresApi extends base_1.BaseAPI {
|
|
|
33117
33261
|
return (0, exports.StoresApiFp)(this.configuration).adminStoresXStoreIDApiUsageGet(xStoreID, startDate, endDate, method, path, page, perPage, options).then((request) => request(this.axios, this.basePath));
|
|
33118
33262
|
}
|
|
33119
33263
|
/**
|
|
33120
|
-
* Retrieves the store configuration using x-store ID
|
|
33264
|
+
* Retrieves the store configuration using x-store ID, including onboarding status validation
|
|
33121
33265
|
* @summary Get Store Config
|
|
33122
33266
|
* @param {string} xStoreID X-Store ID
|
|
33123
33267
|
* @param {*} [options] Override http request option.
|
|
@@ -35300,6 +35444,73 @@ const UserApiAxiosParamCreator = function (configuration) {
|
|
|
35300
35444
|
options: localVarRequestOptions,
|
|
35301
35445
|
};
|
|
35302
35446
|
}),
|
|
35447
|
+
/**
|
|
35448
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35449
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35450
|
+
* @param {number} userId User ID
|
|
35451
|
+
* @param {*} [options] Override http request option.
|
|
35452
|
+
* @throws {RequiredError}
|
|
35453
|
+
*/
|
|
35454
|
+
adminUsersUserIdPermissionsRoleGet: (userId_1, ...args_1) => __awaiter(this, [userId_1, ...args_1], void 0, function* (userId, options = {}) {
|
|
35455
|
+
// verify required parameter 'userId' is not null or undefined
|
|
35456
|
+
(0, common_1.assertParamExists)('adminUsersUserIdPermissionsRoleGet', 'userId', userId);
|
|
35457
|
+
const localVarPath = `/admin/users/{userId}/permissions/role`
|
|
35458
|
+
.replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
|
|
35459
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
35460
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
35461
|
+
let baseOptions;
|
|
35462
|
+
if (configuration) {
|
|
35463
|
+
baseOptions = configuration.baseOptions;
|
|
35464
|
+
}
|
|
35465
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
|
|
35466
|
+
const localVarHeaderParameter = {};
|
|
35467
|
+
const localVarQueryParameter = {};
|
|
35468
|
+
// authentication BearerAuth required
|
|
35469
|
+
yield (0, common_1.setApiKeyToObject)(localVarHeaderParameter, "Authorization", configuration);
|
|
35470
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
35471
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
35472
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
35473
|
+
return {
|
|
35474
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
35475
|
+
options: localVarRequestOptions,
|
|
35476
|
+
};
|
|
35477
|
+
}),
|
|
35478
|
+
/**
|
|
35479
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35480
|
+
* @summary Update user-specific role permissions
|
|
35481
|
+
* @param {number} userId User ID
|
|
35482
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35483
|
+
* @param {*} [options] Override http request option.
|
|
35484
|
+
* @throws {RequiredError}
|
|
35485
|
+
*/
|
|
35486
|
+
adminUsersUserIdPermissionsRolePut: (userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1) => __awaiter(this, [userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1], void 0, function* (userId, dataTypesUpdateUserRolePermissionsRequest, options = {}) {
|
|
35487
|
+
// verify required parameter 'userId' is not null or undefined
|
|
35488
|
+
(0, common_1.assertParamExists)('adminUsersUserIdPermissionsRolePut', 'userId', userId);
|
|
35489
|
+
// verify required parameter 'dataTypesUpdateUserRolePermissionsRequest' is not null or undefined
|
|
35490
|
+
(0, common_1.assertParamExists)('adminUsersUserIdPermissionsRolePut', 'dataTypesUpdateUserRolePermissionsRequest', dataTypesUpdateUserRolePermissionsRequest);
|
|
35491
|
+
const localVarPath = `/admin/users/{userId}/permissions/role`
|
|
35492
|
+
.replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
|
|
35493
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
35494
|
+
const localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
35495
|
+
let baseOptions;
|
|
35496
|
+
if (configuration) {
|
|
35497
|
+
baseOptions = configuration.baseOptions;
|
|
35498
|
+
}
|
|
35499
|
+
const localVarRequestOptions = Object.assign(Object.assign({ method: 'PUT' }, baseOptions), options);
|
|
35500
|
+
const localVarHeaderParameter = {};
|
|
35501
|
+
const localVarQueryParameter = {};
|
|
35502
|
+
// authentication BearerAuth required
|
|
35503
|
+
yield (0, common_1.setApiKeyToObject)(localVarHeaderParameter, "Authorization", configuration);
|
|
35504
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
35505
|
+
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
35506
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
35507
|
+
localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
|
|
35508
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(dataTypesUpdateUserRolePermissionsRequest, localVarRequestOptions, configuration);
|
|
35509
|
+
return {
|
|
35510
|
+
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
35511
|
+
options: localVarRequestOptions,
|
|
35512
|
+
};
|
|
35513
|
+
}),
|
|
35303
35514
|
};
|
|
35304
35515
|
};
|
|
35305
35516
|
exports.UserApiAxiosParamCreator = UserApiAxiosParamCreator;
|
|
@@ -35473,6 +35684,39 @@ const UserApiFp = function (configuration) {
|
|
|
35473
35684
|
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
35474
35685
|
});
|
|
35475
35686
|
},
|
|
35687
|
+
/**
|
|
35688
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35689
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35690
|
+
* @param {number} userId User ID
|
|
35691
|
+
* @param {*} [options] Override http request option.
|
|
35692
|
+
* @throws {RequiredError}
|
|
35693
|
+
*/
|
|
35694
|
+
adminUsersUserIdPermissionsRoleGet(userId, options) {
|
|
35695
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
35696
|
+
var _a, _b, _c;
|
|
35697
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRoleGet(userId, options);
|
|
35698
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
35699
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['UserApi.adminUsersUserIdPermissionsRoleGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
35700
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
35701
|
+
});
|
|
35702
|
+
},
|
|
35703
|
+
/**
|
|
35704
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35705
|
+
* @summary Update user-specific role permissions
|
|
35706
|
+
* @param {number} userId User ID
|
|
35707
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35708
|
+
* @param {*} [options] Override http request option.
|
|
35709
|
+
* @throws {RequiredError}
|
|
35710
|
+
*/
|
|
35711
|
+
adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
|
|
35712
|
+
return __awaiter(this, void 0, void 0, function* () {
|
|
35713
|
+
var _a, _b, _c;
|
|
35714
|
+
const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options);
|
|
35715
|
+
const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
35716
|
+
const localVarOperationServerBasePath = (_c = (_b = base_1.operationServerMap['UserApi.adminUsersUserIdPermissionsRolePut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
|
|
35717
|
+
return (axios, basePath) => (0, common_1.createRequestFunction)(localVarAxiosArgs, axios_1.default, base_1.BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
35718
|
+
});
|
|
35719
|
+
},
|
|
35476
35720
|
};
|
|
35477
35721
|
};
|
|
35478
35722
|
exports.UserApiFp = UserApiFp;
|
|
@@ -35586,6 +35830,27 @@ const UserApiFactory = function (configuration, basePath, axios) {
|
|
|
35586
35830
|
adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options) {
|
|
35587
35831
|
return localVarFp.adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(axios, basePath));
|
|
35588
35832
|
},
|
|
35833
|
+
/**
|
|
35834
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35835
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35836
|
+
* @param {number} userId User ID
|
|
35837
|
+
* @param {*} [options] Override http request option.
|
|
35838
|
+
* @throws {RequiredError}
|
|
35839
|
+
*/
|
|
35840
|
+
adminUsersUserIdPermissionsRoleGet(userId, options) {
|
|
35841
|
+
return localVarFp.adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(axios, basePath));
|
|
35842
|
+
},
|
|
35843
|
+
/**
|
|
35844
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35845
|
+
* @summary Update user-specific role permissions
|
|
35846
|
+
* @param {number} userId User ID
|
|
35847
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35848
|
+
* @param {*} [options] Override http request option.
|
|
35849
|
+
* @throws {RequiredError}
|
|
35850
|
+
*/
|
|
35851
|
+
adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
|
|
35852
|
+
return localVarFp.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(axios, basePath));
|
|
35853
|
+
},
|
|
35589
35854
|
};
|
|
35590
35855
|
};
|
|
35591
35856
|
exports.UserApiFactory = UserApiFactory;
|
|
@@ -35709,5 +35974,28 @@ class UserApi extends base_1.BaseAPI {
|
|
|
35709
35974
|
adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options) {
|
|
35710
35975
|
return (0, exports.UserApiFp)(this.configuration).adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
35711
35976
|
}
|
|
35977
|
+
/**
|
|
35978
|
+
* Retrieves user-specific role permissions separated by org-level and store-level menus/routes
|
|
35979
|
+
* @summary Get user-specific role permissions with org-level and store-level separation
|
|
35980
|
+
* @param {number} userId User ID
|
|
35981
|
+
* @param {*} [options] Override http request option.
|
|
35982
|
+
* @throws {RequiredError}
|
|
35983
|
+
* @memberof UserApi
|
|
35984
|
+
*/
|
|
35985
|
+
adminUsersUserIdPermissionsRoleGet(userId, options) {
|
|
35986
|
+
return (0, exports.UserApiFp)(this.configuration).adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(this.axios, this.basePath));
|
|
35987
|
+
}
|
|
35988
|
+
/**
|
|
35989
|
+
* Updates user-specific role permissions with org-level and store-level separation
|
|
35990
|
+
* @summary Update user-specific role permissions
|
|
35991
|
+
* @param {number} userId User ID
|
|
35992
|
+
* @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
|
|
35993
|
+
* @param {*} [options] Override http request option.
|
|
35994
|
+
* @throws {RequiredError}
|
|
35995
|
+
* @memberof UserApi
|
|
35996
|
+
*/
|
|
35997
|
+
adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
|
|
35998
|
+
return (0, exports.UserApiFp)(this.configuration).adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
|
|
35999
|
+
}
|
|
35712
36000
|
}
|
|
35713
36001
|
exports.UserApi = UserApi;
|