@seekora-ai/admin-api 1.1.27 → 1.1.29

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/esm/api.js CHANGED
@@ -29181,6 +29181,73 @@ export const RolesApiAxiosParamCreator = function (configuration) {
29181
29181
  options: localVarRequestOptions,
29182
29182
  };
29183
29183
  }),
29184
+ /**
29185
+ * Retrieves role permissions separated by org-level and store-level menus/routes
29186
+ * @summary Get role permissions with org-level and store-level separation
29187
+ * @param {number} roleId Role ID
29188
+ * @param {*} [options] Override http request option.
29189
+ * @throws {RequiredError}
29190
+ */
29191
+ adminRolesRoleIdPermissionsGet: (roleId_1, ...args_1) => __awaiter(this, [roleId_1, ...args_1], void 0, function* (roleId, options = {}) {
29192
+ // verify required parameter 'roleId' is not null or undefined
29193
+ assertParamExists('adminRolesRoleIdPermissionsGet', 'roleId', roleId);
29194
+ const localVarPath = `/admin/roles/{roleId}/permissions`
29195
+ .replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
29196
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
29197
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
29198
+ let baseOptions;
29199
+ if (configuration) {
29200
+ baseOptions = configuration.baseOptions;
29201
+ }
29202
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
29203
+ const localVarHeaderParameter = {};
29204
+ const localVarQueryParameter = {};
29205
+ // authentication BearerAuth required
29206
+ yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
29207
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
29208
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
29209
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
29210
+ return {
29211
+ url: toPathString(localVarUrlObj),
29212
+ options: localVarRequestOptions,
29213
+ };
29214
+ }),
29215
+ /**
29216
+ * Updates role permissions with org-level and store-level separation
29217
+ * @summary Update role permissions
29218
+ * @param {number} roleId Role ID
29219
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
29220
+ * @param {*} [options] Override http request option.
29221
+ * @throws {RequiredError}
29222
+ */
29223
+ adminRolesRoleIdPermissionsPut: (roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1) => __awaiter(this, [roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1], void 0, function* (roleId, dataTypesUpdateRolePermissionsRequest, options = {}) {
29224
+ // verify required parameter 'roleId' is not null or undefined
29225
+ assertParamExists('adminRolesRoleIdPermissionsPut', 'roleId', roleId);
29226
+ // verify required parameter 'dataTypesUpdateRolePermissionsRequest' is not null or undefined
29227
+ assertParamExists('adminRolesRoleIdPermissionsPut', 'dataTypesUpdateRolePermissionsRequest', dataTypesUpdateRolePermissionsRequest);
29228
+ const localVarPath = `/admin/roles/{roleId}/permissions`
29229
+ .replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
29230
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
29231
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
29232
+ let baseOptions;
29233
+ if (configuration) {
29234
+ baseOptions = configuration.baseOptions;
29235
+ }
29236
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'PUT' }, baseOptions), options);
29237
+ const localVarHeaderParameter = {};
29238
+ const localVarQueryParameter = {};
29239
+ // authentication BearerAuth required
29240
+ yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
29241
+ localVarHeaderParameter['Content-Type'] = 'application/json';
29242
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
29243
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
29244
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
29245
+ localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateRolePermissionsRequest, localVarRequestOptions, configuration);
29246
+ return {
29247
+ url: toPathString(localVarUrlObj),
29248
+ options: localVarRequestOptions,
29249
+ };
29250
+ }),
29184
29251
  };
29185
29252
  };
29186
29253
  /**
@@ -29272,6 +29339,39 @@ export const RolesApiFp = function (configuration) {
29272
29339
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
29273
29340
  });
29274
29341
  },
29342
+ /**
29343
+ * Retrieves role permissions separated by org-level and store-level menus/routes
29344
+ * @summary Get role permissions with org-level and store-level separation
29345
+ * @param {number} roleId Role ID
29346
+ * @param {*} [options] Override http request option.
29347
+ * @throws {RequiredError}
29348
+ */
29349
+ adminRolesRoleIdPermissionsGet(roleId, options) {
29350
+ return __awaiter(this, void 0, void 0, function* () {
29351
+ var _a, _b, _c;
29352
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsGet(roleId, options);
29353
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
29354
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['RolesApi.adminRolesRoleIdPermissionsGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
29355
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
29356
+ });
29357
+ },
29358
+ /**
29359
+ * Updates role permissions with org-level and store-level separation
29360
+ * @summary Update role permissions
29361
+ * @param {number} roleId Role ID
29362
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
29363
+ * @param {*} [options] Override http request option.
29364
+ * @throws {RequiredError}
29365
+ */
29366
+ adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
29367
+ return __awaiter(this, void 0, void 0, function* () {
29368
+ var _a, _b, _c;
29369
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options);
29370
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
29371
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['RolesApi.adminRolesRoleIdPermissionsPut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
29372
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
29373
+ });
29374
+ },
29275
29375
  };
29276
29376
  };
29277
29377
  /**
@@ -29333,6 +29433,27 @@ export const RolesApiFactory = function (configuration, basePath, axios) {
29333
29433
  adminRolesPost(dataTypesCreateRoleRequestDto, options) {
29334
29434
  return localVarFp.adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(axios, basePath));
29335
29435
  },
29436
+ /**
29437
+ * Retrieves role permissions separated by org-level and store-level menus/routes
29438
+ * @summary Get role permissions with org-level and store-level separation
29439
+ * @param {number} roleId Role ID
29440
+ * @param {*} [options] Override http request option.
29441
+ * @throws {RequiredError}
29442
+ */
29443
+ adminRolesRoleIdPermissionsGet(roleId, options) {
29444
+ return localVarFp.adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(axios, basePath));
29445
+ },
29446
+ /**
29447
+ * Updates role permissions with org-level and store-level separation
29448
+ * @summary Update role permissions
29449
+ * @param {number} roleId Role ID
29450
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
29451
+ * @param {*} [options] Override http request option.
29452
+ * @throws {RequiredError}
29453
+ */
29454
+ adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
29455
+ return localVarFp.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(axios, basePath));
29456
+ },
29336
29457
  };
29337
29458
  };
29338
29459
  /**
@@ -29399,6 +29520,29 @@ export class RolesApi extends BaseAPI {
29399
29520
  adminRolesPost(dataTypesCreateRoleRequestDto, options) {
29400
29521
  return RolesApiFp(this.configuration).adminRolesPost(dataTypesCreateRoleRequestDto, options).then((request) => request(this.axios, this.basePath));
29401
29522
  }
29523
+ /**
29524
+ * Retrieves role permissions separated by org-level and store-level menus/routes
29525
+ * @summary Get role permissions with org-level and store-level separation
29526
+ * @param {number} roleId Role ID
29527
+ * @param {*} [options] Override http request option.
29528
+ * @throws {RequiredError}
29529
+ * @memberof RolesApi
29530
+ */
29531
+ adminRolesRoleIdPermissionsGet(roleId, options) {
29532
+ return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsGet(roleId, options).then((request) => request(this.axios, this.basePath));
29533
+ }
29534
+ /**
29535
+ * Updates role permissions with org-level and store-level separation
29536
+ * @summary Update role permissions
29537
+ * @param {number} roleId Role ID
29538
+ * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
29539
+ * @param {*} [options] Override http request option.
29540
+ * @throws {RequiredError}
29541
+ * @memberof RolesApi
29542
+ */
29543
+ adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
29544
+ return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
29545
+ }
29402
29546
  }
29403
29547
  /**
29404
29548
  * SearchApi - axios parameter creator
@@ -31959,7 +32103,7 @@ export const StoresApiAxiosParamCreator = function (configuration) {
31959
32103
  };
31960
32104
  }),
31961
32105
  /**
31962
- * Retrieves the store configuration using x-store ID
32106
+ * Retrieves the store configuration using x-store ID, including onboarding status validation
31963
32107
  * @summary Get Store Config
31964
32108
  * @param {string} xStoreID X-Store ID
31965
32109
  * @param {*} [options] Override http request option.
@@ -32430,7 +32574,7 @@ export const StoresApiFp = function (configuration) {
32430
32574
  });
32431
32575
  },
32432
32576
  /**
32433
- * Retrieves the store configuration using x-store ID
32577
+ * Retrieves the store configuration using x-store ID, including onboarding status validation
32434
32578
  * @summary Get Store Config
32435
32579
  * @param {string} xStoreID X-Store ID
32436
32580
  * @param {*} [options] Override http request option.
@@ -32692,7 +32836,7 @@ export const StoresApiFactory = function (configuration, basePath, axios) {
32692
32836
  return localVarFp.adminStoresXStoreIDApiUsageGet(xStoreID, startDate, endDate, method, path, page, perPage, options).then((request) => request(axios, basePath));
32693
32837
  },
32694
32838
  /**
32695
- * Retrieves the store configuration using x-store ID
32839
+ * Retrieves the store configuration using x-store ID, including onboarding status validation
32696
32840
  * @summary Get Store Config
32697
32841
  * @param {string} xStoreID X-Store ID
32698
32842
  * @param {*} [options] Override http request option.
@@ -32909,7 +33053,7 @@ export class StoresApi extends BaseAPI {
32909
33053
  return StoresApiFp(this.configuration).adminStoresXStoreIDApiUsageGet(xStoreID, startDate, endDate, method, path, page, perPage, options).then((request) => request(this.axios, this.basePath));
32910
33054
  }
32911
33055
  /**
32912
- * Retrieves the store configuration using x-store ID
33056
+ * Retrieves the store configuration using x-store ID, including onboarding status validation
32913
33057
  * @summary Get Store Config
32914
33058
  * @param {string} xStoreID X-Store ID
32915
33059
  * @param {*} [options] Override http request option.
@@ -35079,6 +35223,73 @@ export const UserApiAxiosParamCreator = function (configuration) {
35079
35223
  options: localVarRequestOptions,
35080
35224
  };
35081
35225
  }),
35226
+ /**
35227
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
35228
+ * @summary Get user-specific role permissions with org-level and store-level separation
35229
+ * @param {number} userId User ID
35230
+ * @param {*} [options] Override http request option.
35231
+ * @throws {RequiredError}
35232
+ */
35233
+ adminUsersUserIdPermissionsRoleGet: (userId_1, ...args_1) => __awaiter(this, [userId_1, ...args_1], void 0, function* (userId, options = {}) {
35234
+ // verify required parameter 'userId' is not null or undefined
35235
+ assertParamExists('adminUsersUserIdPermissionsRoleGet', 'userId', userId);
35236
+ const localVarPath = `/admin/users/{userId}/permissions/role`
35237
+ .replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
35238
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
35239
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
35240
+ let baseOptions;
35241
+ if (configuration) {
35242
+ baseOptions = configuration.baseOptions;
35243
+ }
35244
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'GET' }, baseOptions), options);
35245
+ const localVarHeaderParameter = {};
35246
+ const localVarQueryParameter = {};
35247
+ // authentication BearerAuth required
35248
+ yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
35249
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
35250
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
35251
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
35252
+ return {
35253
+ url: toPathString(localVarUrlObj),
35254
+ options: localVarRequestOptions,
35255
+ };
35256
+ }),
35257
+ /**
35258
+ * Updates user-specific role permissions with org-level and store-level separation
35259
+ * @summary Update user-specific role permissions
35260
+ * @param {number} userId User ID
35261
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
35262
+ * @param {*} [options] Override http request option.
35263
+ * @throws {RequiredError}
35264
+ */
35265
+ adminUsersUserIdPermissionsRolePut: (userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1) => __awaiter(this, [userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1], void 0, function* (userId, dataTypesUpdateUserRolePermissionsRequest, options = {}) {
35266
+ // verify required parameter 'userId' is not null or undefined
35267
+ assertParamExists('adminUsersUserIdPermissionsRolePut', 'userId', userId);
35268
+ // verify required parameter 'dataTypesUpdateUserRolePermissionsRequest' is not null or undefined
35269
+ assertParamExists('adminUsersUserIdPermissionsRolePut', 'dataTypesUpdateUserRolePermissionsRequest', dataTypesUpdateUserRolePermissionsRequest);
35270
+ const localVarPath = `/admin/users/{userId}/permissions/role`
35271
+ .replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
35272
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
35273
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
35274
+ let baseOptions;
35275
+ if (configuration) {
35276
+ baseOptions = configuration.baseOptions;
35277
+ }
35278
+ const localVarRequestOptions = Object.assign(Object.assign({ method: 'PUT' }, baseOptions), options);
35279
+ const localVarHeaderParameter = {};
35280
+ const localVarQueryParameter = {};
35281
+ // authentication BearerAuth required
35282
+ yield setApiKeyToObject(localVarHeaderParameter, "Authorization", configuration);
35283
+ localVarHeaderParameter['Content-Type'] = 'application/json';
35284
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
35285
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
35286
+ localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
35287
+ localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateUserRolePermissionsRequest, localVarRequestOptions, configuration);
35288
+ return {
35289
+ url: toPathString(localVarUrlObj),
35290
+ options: localVarRequestOptions,
35291
+ };
35292
+ }),
35082
35293
  };
35083
35294
  };
35084
35295
  /**
@@ -35251,6 +35462,39 @@ export const UserApiFp = function (configuration) {
35251
35462
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
35252
35463
  });
35253
35464
  },
35465
+ /**
35466
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
35467
+ * @summary Get user-specific role permissions with org-level and store-level separation
35468
+ * @param {number} userId User ID
35469
+ * @param {*} [options] Override http request option.
35470
+ * @throws {RequiredError}
35471
+ */
35472
+ adminUsersUserIdPermissionsRoleGet(userId, options) {
35473
+ return __awaiter(this, void 0, void 0, function* () {
35474
+ var _a, _b, _c;
35475
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRoleGet(userId, options);
35476
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
35477
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['UserApi.adminUsersUserIdPermissionsRoleGet']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
35478
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
35479
+ });
35480
+ },
35481
+ /**
35482
+ * Updates user-specific role permissions with org-level and store-level separation
35483
+ * @summary Update user-specific role permissions
35484
+ * @param {number} userId User ID
35485
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
35486
+ * @param {*} [options] Override http request option.
35487
+ * @throws {RequiredError}
35488
+ */
35489
+ adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
35490
+ return __awaiter(this, void 0, void 0, function* () {
35491
+ var _a, _b, _c;
35492
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options);
35493
+ const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
35494
+ const localVarOperationServerBasePath = (_c = (_b = operationServerMap['UserApi.adminUsersUserIdPermissionsRolePut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
35495
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
35496
+ });
35497
+ },
35254
35498
  };
35255
35499
  };
35256
35500
  /**
@@ -35363,6 +35607,27 @@ export const UserApiFactory = function (configuration, basePath, axios) {
35363
35607
  adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options) {
35364
35608
  return localVarFp.adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(axios, basePath));
35365
35609
  },
35610
+ /**
35611
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
35612
+ * @summary Get user-specific role permissions with org-level and store-level separation
35613
+ * @param {number} userId User ID
35614
+ * @param {*} [options] Override http request option.
35615
+ * @throws {RequiredError}
35616
+ */
35617
+ adminUsersUserIdPermissionsRoleGet(userId, options) {
35618
+ return localVarFp.adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(axios, basePath));
35619
+ },
35620
+ /**
35621
+ * Updates user-specific role permissions with org-level and store-level separation
35622
+ * @summary Update user-specific role permissions
35623
+ * @param {number} userId User ID
35624
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
35625
+ * @param {*} [options] Override http request option.
35626
+ * @throws {RequiredError}
35627
+ */
35628
+ adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
35629
+ return localVarFp.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(axios, basePath));
35630
+ },
35366
35631
  };
35367
35632
  };
35368
35633
  /**
@@ -35485,4 +35750,27 @@ export class UserApi extends BaseAPI {
35485
35750
  adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options) {
35486
35751
  return UserApiFp(this.configuration).adminUsersUserIdPermissionsPut(userId, dataTypesSetUserCustomPermissionsRequest, options).then((request) => request(this.axios, this.basePath));
35487
35752
  }
35753
+ /**
35754
+ * Retrieves user-specific role permissions separated by org-level and store-level menus/routes
35755
+ * @summary Get user-specific role permissions with org-level and store-level separation
35756
+ * @param {number} userId User ID
35757
+ * @param {*} [options] Override http request option.
35758
+ * @throws {RequiredError}
35759
+ * @memberof UserApi
35760
+ */
35761
+ adminUsersUserIdPermissionsRoleGet(userId, options) {
35762
+ return UserApiFp(this.configuration).adminUsersUserIdPermissionsRoleGet(userId, options).then((request) => request(this.axios, this.basePath));
35763
+ }
35764
+ /**
35765
+ * Updates user-specific role permissions with org-level and store-level separation
35766
+ * @summary Update user-specific role permissions
35767
+ * @param {number} userId User ID
35768
+ * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
35769
+ * @param {*} [options] Override http request option.
35770
+ * @throws {RequiredError}
35771
+ * @memberof UserApi
35772
+ */
35773
+ adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
35774
+ return UserApiFp(this.configuration).adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
35775
+ }
35488
35776
  }
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@seekora-ai/admin-api",
3
- "version": "1.1.27",
3
+ "version": "1.1.29",
4
4
  "description": "OpenAPI client for @seekora-ai/admin-api",
5
5
  "author": "OpenAPI-Generator Contributors",
6
6
  "repository": {
Binary file
Binary file