@seekora-ai/admin-api 1.1.82 → 1.1.84

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/esm/api.js CHANGED
@@ -61,7 +61,6 @@ export const DataTypesAcceptInvitationWithOAuthRequestTypeEnum = {
61
61
  };
62
62
  export const DataTypesBillingAlertRequestAlertTypeEnum = {
63
63
  LowBalance: 'low_balance',
64
- ExpiringCredits: 'expiring_credits',
65
64
  DaysRemaining: 'days_remaining'
66
65
  };
67
66
  export const DataTypesBillingAlertRequestThresholdUnitEnum = {
@@ -40231,15 +40230,15 @@ export const RolesApiAxiosParamCreator = function (configuration) {
40231
40230
  * Updates role permissions with org-level and store-level separation
40232
40231
  * @summary Update role permissions
40233
40232
  * @param {number} roleId Role ID
40234
- * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
40233
+ * @param {DataTypesSlimUpdateRolePermissionsRequest} dataTypesSlimUpdateRolePermissionsRequest Permission configuration (slim). Also accepts DataTypes.UpdateRolePermissionsRequest (legacy)
40235
40234
  * @param {*} [options] Override http request option.
40236
40235
  * @throws {RequiredError}
40237
40236
  */
40238
- adminRolesRoleIdPermissionsPut: (roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1) => __awaiter(this, [roleId_1, dataTypesUpdateRolePermissionsRequest_1, ...args_1], void 0, function* (roleId, dataTypesUpdateRolePermissionsRequest, options = {}) {
40237
+ adminRolesRoleIdPermissionsPut: (roleId_1, dataTypesSlimUpdateRolePermissionsRequest_1, ...args_1) => __awaiter(this, [roleId_1, dataTypesSlimUpdateRolePermissionsRequest_1, ...args_1], void 0, function* (roleId, dataTypesSlimUpdateRolePermissionsRequest, options = {}) {
40239
40238
  // verify required parameter 'roleId' is not null or undefined
40240
40239
  assertParamExists('adminRolesRoleIdPermissionsPut', 'roleId', roleId);
40241
- // verify required parameter 'dataTypesUpdateRolePermissionsRequest' is not null or undefined
40242
- assertParamExists('adminRolesRoleIdPermissionsPut', 'dataTypesUpdateRolePermissionsRequest', dataTypesUpdateRolePermissionsRequest);
40240
+ // verify required parameter 'dataTypesSlimUpdateRolePermissionsRequest' is not null or undefined
40241
+ assertParamExists('adminRolesRoleIdPermissionsPut', 'dataTypesSlimUpdateRolePermissionsRequest', dataTypesSlimUpdateRolePermissionsRequest);
40243
40242
  const localVarPath = `/admin/roles/{roleId}/permissions`
40244
40243
  .replace(`{${"roleId"}}`, encodeURIComponent(String(roleId)));
40245
40244
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
@@ -40257,7 +40256,7 @@ export const RolesApiAxiosParamCreator = function (configuration) {
40257
40256
  setSearchParams(localVarUrlObj, localVarQueryParameter);
40258
40257
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
40259
40258
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
40260
- localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateRolePermissionsRequest, localVarRequestOptions, configuration);
40259
+ localVarRequestOptions.data = serializeDataIfNeeded(dataTypesSlimUpdateRolePermissionsRequest, localVarRequestOptions, configuration);
40261
40260
  return {
40262
40261
  url: toPathString(localVarUrlObj),
40263
40262
  options: localVarRequestOptions,
@@ -40388,14 +40387,14 @@ export const RolesApiFp = function (configuration) {
40388
40387
  * Updates role permissions with org-level and store-level separation
40389
40388
  * @summary Update role permissions
40390
40389
  * @param {number} roleId Role ID
40391
- * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
40390
+ * @param {DataTypesSlimUpdateRolePermissionsRequest} dataTypesSlimUpdateRolePermissionsRequest Permission configuration (slim). Also accepts DataTypes.UpdateRolePermissionsRequest (legacy)
40392
40391
  * @param {*} [options] Override http request option.
40393
40392
  * @throws {RequiredError}
40394
40393
  */
40395
- adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
40394
+ adminRolesRoleIdPermissionsPut(roleId, dataTypesSlimUpdateRolePermissionsRequest, options) {
40396
40395
  return __awaiter(this, void 0, void 0, function* () {
40397
40396
  var _a, _b, _c;
40398
- const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options);
40397
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.adminRolesRoleIdPermissionsPut(roleId, dataTypesSlimUpdateRolePermissionsRequest, options);
40399
40398
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
40400
40399
  const localVarOperationServerBasePath = (_c = (_b = operationServerMap['RolesApi.adminRolesRoleIdPermissionsPut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
40401
40400
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
@@ -40484,12 +40483,12 @@ export const RolesApiFactory = function (configuration, basePath, axios) {
40484
40483
  * Updates role permissions with org-level and store-level separation
40485
40484
  * @summary Update role permissions
40486
40485
  * @param {number} roleId Role ID
40487
- * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
40486
+ * @param {DataTypesSlimUpdateRolePermissionsRequest} dataTypesSlimUpdateRolePermissionsRequest Permission configuration (slim). Also accepts DataTypes.UpdateRolePermissionsRequest (legacy)
40488
40487
  * @param {*} [options] Override http request option.
40489
40488
  * @throws {RequiredError}
40490
40489
  */
40491
- adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
40492
- return localVarFp.adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(axios, basePath));
40490
+ adminRolesRoleIdPermissionsPut(roleId, dataTypesSlimUpdateRolePermissionsRequest, options) {
40491
+ return localVarFp.adminRolesRoleIdPermissionsPut(roleId, dataTypesSlimUpdateRolePermissionsRequest, options).then((request) => request(axios, basePath));
40493
40492
  },
40494
40493
  };
40495
40494
  };
@@ -40581,13 +40580,13 @@ export class RolesApi extends BaseAPI {
40581
40580
  * Updates role permissions with org-level and store-level separation
40582
40581
  * @summary Update role permissions
40583
40582
  * @param {number} roleId Role ID
40584
- * @param {DataTypesUpdateRolePermissionsRequest} dataTypesUpdateRolePermissionsRequest Permission configuration
40583
+ * @param {DataTypesSlimUpdateRolePermissionsRequest} dataTypesSlimUpdateRolePermissionsRequest Permission configuration (slim). Also accepts DataTypes.UpdateRolePermissionsRequest (legacy)
40585
40584
  * @param {*} [options] Override http request option.
40586
40585
  * @throws {RequiredError}
40587
40586
  * @memberof RolesApi
40588
40587
  */
40589
- adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options) {
40590
- return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsPut(roleId, dataTypesUpdateRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
40588
+ adminRolesRoleIdPermissionsPut(roleId, dataTypesSlimUpdateRolePermissionsRequest, options) {
40589
+ return RolesApiFp(this.configuration).adminRolesRoleIdPermissionsPut(roleId, dataTypesSlimUpdateRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
40591
40590
  }
40592
40591
  }
40593
40592
  /**
@@ -49744,15 +49743,15 @@ export const UserApiAxiosParamCreator = function (configuration) {
49744
49743
  * Updates user-specific role permissions with org-level and store-level separation
49745
49744
  * @summary Update user-specific role permissions
49746
49745
  * @param {number} userId User ID
49747
- * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
49746
+ * @param {DataTypesSlimUpdateUserRolePermissionsRequest} dataTypesSlimUpdateUserRolePermissionsRequest Permission configuration (slim). Also accepts DataTypes.UpdateUserRolePermissionsRequest (legacy)
49748
49747
  * @param {*} [options] Override http request option.
49749
49748
  * @throws {RequiredError}
49750
49749
  */
49751
- adminUsersUserIdPermissionsRolePut: (userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1) => __awaiter(this, [userId_1, dataTypesUpdateUserRolePermissionsRequest_1, ...args_1], void 0, function* (userId, dataTypesUpdateUserRolePermissionsRequest, options = {}) {
49750
+ adminUsersUserIdPermissionsRolePut: (userId_1, dataTypesSlimUpdateUserRolePermissionsRequest_1, ...args_1) => __awaiter(this, [userId_1, dataTypesSlimUpdateUserRolePermissionsRequest_1, ...args_1], void 0, function* (userId, dataTypesSlimUpdateUserRolePermissionsRequest, options = {}) {
49752
49751
  // verify required parameter 'userId' is not null or undefined
49753
49752
  assertParamExists('adminUsersUserIdPermissionsRolePut', 'userId', userId);
49754
- // verify required parameter 'dataTypesUpdateUserRolePermissionsRequest' is not null or undefined
49755
- assertParamExists('adminUsersUserIdPermissionsRolePut', 'dataTypesUpdateUserRolePermissionsRequest', dataTypesUpdateUserRolePermissionsRequest);
49753
+ // verify required parameter 'dataTypesSlimUpdateUserRolePermissionsRequest' is not null or undefined
49754
+ assertParamExists('adminUsersUserIdPermissionsRolePut', 'dataTypesSlimUpdateUserRolePermissionsRequest', dataTypesSlimUpdateUserRolePermissionsRequest);
49756
49755
  const localVarPath = `/admin/users/{userId}/permissions/role`
49757
49756
  .replace(`{${"userId"}}`, encodeURIComponent(String(userId)));
49758
49757
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
@@ -49770,7 +49769,7 @@ export const UserApiAxiosParamCreator = function (configuration) {
49770
49769
  setSearchParams(localVarUrlObj, localVarQueryParameter);
49771
49770
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
49772
49771
  localVarRequestOptions.headers = Object.assign(Object.assign(Object.assign({}, localVarHeaderParameter), headersFromBaseOptions), options.headers);
49773
- localVarRequestOptions.data = serializeDataIfNeeded(dataTypesUpdateUserRolePermissionsRequest, localVarRequestOptions, configuration);
49772
+ localVarRequestOptions.data = serializeDataIfNeeded(dataTypesSlimUpdateUserRolePermissionsRequest, localVarRequestOptions, configuration);
49774
49773
  return {
49775
49774
  url: toPathString(localVarUrlObj),
49776
49775
  options: localVarRequestOptions,
@@ -49968,14 +49967,14 @@ export const UserApiFp = function (configuration) {
49968
49967
  * Updates user-specific role permissions with org-level and store-level separation
49969
49968
  * @summary Update user-specific role permissions
49970
49969
  * @param {number} userId User ID
49971
- * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
49970
+ * @param {DataTypesSlimUpdateUserRolePermissionsRequest} dataTypesSlimUpdateUserRolePermissionsRequest Permission configuration (slim). Also accepts DataTypes.UpdateUserRolePermissionsRequest (legacy)
49972
49971
  * @param {*} [options] Override http request option.
49973
49972
  * @throws {RequiredError}
49974
49973
  */
49975
- adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
49974
+ adminUsersUserIdPermissionsRolePut(userId, dataTypesSlimUpdateUserRolePermissionsRequest, options) {
49976
49975
  return __awaiter(this, void 0, void 0, function* () {
49977
49976
  var _a, _b, _c;
49978
- const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options);
49977
+ const localVarAxiosArgs = yield localVarAxiosParamCreator.adminUsersUserIdPermissionsRolePut(userId, dataTypesSlimUpdateUserRolePermissionsRequest, options);
49979
49978
  const localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
49980
49979
  const localVarOperationServerBasePath = (_c = (_b = operationServerMap['UserApi.adminUsersUserIdPermissionsRolePut']) === null || _b === void 0 ? void 0 : _b[localVarOperationServerIndex]) === null || _c === void 0 ? void 0 : _c.url;
49981
49980
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
@@ -50107,12 +50106,12 @@ export const UserApiFactory = function (configuration, basePath, axios) {
50107
50106
  * Updates user-specific role permissions with org-level and store-level separation
50108
50107
  * @summary Update user-specific role permissions
50109
50108
  * @param {number} userId User ID
50110
- * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
50109
+ * @param {DataTypesSlimUpdateUserRolePermissionsRequest} dataTypesSlimUpdateUserRolePermissionsRequest Permission configuration (slim). Also accepts DataTypes.UpdateUserRolePermissionsRequest (legacy)
50111
50110
  * @param {*} [options] Override http request option.
50112
50111
  * @throws {RequiredError}
50113
50112
  */
50114
- adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
50115
- return localVarFp.adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(axios, basePath));
50113
+ adminUsersUserIdPermissionsRolePut(userId, dataTypesSlimUpdateUserRolePermissionsRequest, options) {
50114
+ return localVarFp.adminUsersUserIdPermissionsRolePut(userId, dataTypesSlimUpdateUserRolePermissionsRequest, options).then((request) => request(axios, basePath));
50116
50115
  },
50117
50116
  };
50118
50117
  };
@@ -50251,13 +50250,13 @@ export class UserApi extends BaseAPI {
50251
50250
  * Updates user-specific role permissions with org-level and store-level separation
50252
50251
  * @summary Update user-specific role permissions
50253
50252
  * @param {number} userId User ID
50254
- * @param {DataTypesUpdateUserRolePermissionsRequest} dataTypesUpdateUserRolePermissionsRequest Permission configuration
50253
+ * @param {DataTypesSlimUpdateUserRolePermissionsRequest} dataTypesSlimUpdateUserRolePermissionsRequest Permission configuration (slim). Also accepts DataTypes.UpdateUserRolePermissionsRequest (legacy)
50255
50254
  * @param {*} [options] Override http request option.
50256
50255
  * @throws {RequiredError}
50257
50256
  * @memberof UserApi
50258
50257
  */
50259
- adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options) {
50260
- return UserApiFp(this.configuration).adminUsersUserIdPermissionsRolePut(userId, dataTypesUpdateUserRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
50258
+ adminUsersUserIdPermissionsRolePut(userId, dataTypesSlimUpdateUserRolePermissionsRequest, options) {
50259
+ return UserApiFp(this.configuration).adminUsersUserIdPermissionsRolePut(userId, dataTypesSlimUpdateUserRolePermissionsRequest, options).then((request) => request(this.axios, this.basePath));
50261
50260
  }
50262
50261
  }
50263
50262
  /**
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@seekora-ai/admin-api",
3
- "version": "1.1.82",
3
+ "version": "1.1.84",
4
4
  "description": "OpenAPI client for @seekora-ai/admin-api",
5
5
  "author": "OpenAPI-Generator Contributors",
6
6
  "repository": {
Binary file
Binary file