@tapis/tapis-typescript-sk 0.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.openapi-generator/FILES +67 -0
- package/.openapi-generator/VERSION +1 -0
- package/.openapi-generator-ignore +23 -0
- package/README.md +45 -0
- package/dist/apis/GeneralApi.d.ts +45 -0
- package/dist/apis/GeneralApi.js +199 -0
- package/dist/apis/RoleApi.d.ts +205 -0
- package/dist/apis/RoleApi.js +861 -0
- package/dist/apis/UserApi.d.ts +276 -0
- package/dist/apis/UserApi.js +1166 -0
- package/dist/apis/VaultApi.d.ts +195 -0
- package/dist/apis/VaultApi.js +740 -0
- package/dist/apis/index.d.ts +4 -0
- package/dist/apis/index.js +11 -0
- package/dist/index.d.ts +3 -0
- package/dist/index.js +10 -0
- package/dist/models/Options.d.ts +27 -0
- package/dist/models/Options.js +41 -0
- package/dist/models/ReqAddChildRole.d.ts +39 -0
- package/dist/models/ReqAddChildRole.js +45 -0
- package/dist/models/ReqAddRolePermission.d.ts +39 -0
- package/dist/models/ReqAddRolePermission.js +45 -0
- package/dist/models/ReqCreateRole.d.ts +39 -0
- package/dist/models/ReqCreateRole.js +45 -0
- package/dist/models/ReqGrantAdminRole.d.ts +33 -0
- package/dist/models/ReqGrantAdminRole.js +43 -0
- package/dist/models/ReqGrantUserPermission.d.ts +39 -0
- package/dist/models/ReqGrantUserPermission.js +45 -0
- package/dist/models/ReqGrantUserRole.d.ts +39 -0
- package/dist/models/ReqGrantUserRole.js +45 -0
- package/dist/models/ReqGrantUserRoleWithPermission.d.ts +45 -0
- package/dist/models/ReqGrantUserRoleWithPermission.js +47 -0
- package/dist/models/ReqPreviewPathPrefix.d.ts +63 -0
- package/dist/models/ReqPreviewPathPrefix.js +53 -0
- package/dist/models/ReqRemoveChildRole.d.ts +39 -0
- package/dist/models/ReqRemoveChildRole.js +45 -0
- package/dist/models/ReqRemoveRolePermission.d.ts +39 -0
- package/dist/models/ReqRemoveRolePermission.js +45 -0
- package/dist/models/ReqReplacePathPrefix.d.ts +63 -0
- package/dist/models/ReqReplacePathPrefix.js +53 -0
- package/dist/models/ReqRevokeAdminRole.d.ts +33 -0
- package/dist/models/ReqRevokeAdminRole.js +43 -0
- package/dist/models/ReqRevokeUserPermission.d.ts +39 -0
- package/dist/models/ReqRevokeUserPermission.js +45 -0
- package/dist/models/ReqRevokeUserRole.d.ts +39 -0
- package/dist/models/ReqRevokeUserRole.js +45 -0
- package/dist/models/ReqUpdateRoleDescription.d.ts +33 -0
- package/dist/models/ReqUpdateRoleDescription.js +43 -0
- package/dist/models/ReqUpdateRoleName.d.ts +33 -0
- package/dist/models/ReqUpdateRoleName.js +43 -0
- package/dist/models/ReqUpdateRoleOwner.d.ts +39 -0
- package/dist/models/ReqUpdateRoleOwner.js +45 -0
- package/dist/models/ReqUserHasRole.d.ts +45 -0
- package/dist/models/ReqUserHasRole.js +47 -0
- package/dist/models/ReqUserHasRoleMulti.d.ts +45 -0
- package/dist/models/ReqUserHasRoleMulti.js +47 -0
- package/dist/models/ReqUserIsAdmin.d.ts +33 -0
- package/dist/models/ReqUserIsAdmin.js +43 -0
- package/dist/models/ReqUserIsPermitted.d.ts +45 -0
- package/dist/models/ReqUserIsPermitted.js +47 -0
- package/dist/models/ReqUserIsPermittedMulti.d.ts +45 -0
- package/dist/models/ReqUserIsPermittedMulti.js +47 -0
- package/dist/models/ReqValidateServicePwd.d.ts +39 -0
- package/dist/models/ReqValidateServicePwd.js +45 -0
- package/dist/models/ReqVersions.d.ts +39 -0
- package/dist/models/ReqVersions.js +45 -0
- package/dist/models/ReqWriteSecret.d.ts +48 -0
- package/dist/models/ReqWriteSecret.js +48 -0
- package/dist/models/RespAuthorized.d.ts +46 -0
- package/dist/models/RespAuthorized.js +48 -0
- package/dist/models/RespBasic.d.ts +45 -0
- package/dist/models/RespBasic.js +47 -0
- package/dist/models/RespChangeCount.d.ts +46 -0
- package/dist/models/RespChangeCount.js +48 -0
- package/dist/models/RespName.d.ts +46 -0
- package/dist/models/RespName.js +48 -0
- package/dist/models/RespNameArray.d.ts +46 -0
- package/dist/models/RespNameArray.js +48 -0
- package/dist/models/RespPathPrefixes.d.ts +46 -0
- package/dist/models/RespPathPrefixes.js +48 -0
- package/dist/models/RespProbe.d.ts +46 -0
- package/dist/models/RespProbe.js +48 -0
- package/dist/models/RespResourceUrl.d.ts +46 -0
- package/dist/models/RespResourceUrl.js +48 -0
- package/dist/models/RespRole.d.ts +46 -0
- package/dist/models/RespRole.js +48 -0
- package/dist/models/RespSecret.d.ts +46 -0
- package/dist/models/RespSecret.js +48 -0
- package/dist/models/RespSecretList.d.ts +46 -0
- package/dist/models/RespSecretList.js +48 -0
- package/dist/models/RespSecretMeta.d.ts +46 -0
- package/dist/models/RespSecretMeta.js +48 -0
- package/dist/models/RespSecretVersionMetadata.d.ts +46 -0
- package/dist/models/RespSecretVersionMetadata.js +48 -0
- package/dist/models/RespVersions.d.ts +45 -0
- package/dist/models/RespVersions.js +47 -0
- package/dist/models/ResultAuthorized.d.ts +27 -0
- package/dist/models/ResultAuthorized.js +41 -0
- package/dist/models/ResultChangeCount.d.ts +27 -0
- package/dist/models/ResultChangeCount.js +41 -0
- package/dist/models/ResultName.d.ts +27 -0
- package/dist/models/ResultName.js +41 -0
- package/dist/models/ResultNameArray.d.ts +27 -0
- package/dist/models/ResultNameArray.js +41 -0
- package/dist/models/ResultResourceUrl.d.ts +27 -0
- package/dist/models/ResultResourceUrl.js +41 -0
- package/dist/models/SkProbe.d.ts +45 -0
- package/dist/models/SkProbe.js +47 -0
- package/dist/models/SkRole.d.ts +93 -0
- package/dist/models/SkRole.js +63 -0
- package/dist/models/SkSecret.d.ts +36 -0
- package/dist/models/SkSecret.js +44 -0
- package/dist/models/SkSecretList.d.ts +33 -0
- package/dist/models/SkSecretList.js +43 -0
- package/dist/models/SkSecretMetadata.d.ts +45 -0
- package/dist/models/SkSecretMetadata.js +47 -0
- package/dist/models/SkSecretVersion.d.ts +45 -0
- package/dist/models/SkSecretVersion.js +47 -0
- package/dist/models/SkSecretVersionMetadata.d.ts +58 -0
- package/dist/models/SkSecretVersionMetadata.js +52 -0
- package/dist/models/Transformation.d.ts +39 -0
- package/dist/models/Transformation.js +45 -0
- package/dist/models/index.d.ts +53 -0
- package/dist/models/index.js +60 -0
- package/dist/runtime.d.ts +140 -0
- package/dist/runtime.js +420 -0
- package/package.json +15 -0
- package/src/apis/GeneralApi.ts +117 -0
- package/src/apis/RoleApi.ts +782 -0
- package/src/apis/UserApi.ts +1047 -0
- package/src/apis/VaultApi.ts +802 -0
- package/src/apis/index.ts +6 -0
- package/src/index.ts +5 -0
- package/src/models/Options.ts +56 -0
- package/src/models/ReqAddChildRole.ts +72 -0
- package/src/models/ReqAddRolePermission.ts +72 -0
- package/src/models/ReqCreateRole.ts +72 -0
- package/src/models/ReqGrantAdminRole.ts +64 -0
- package/src/models/ReqGrantUserPermission.ts +72 -0
- package/src/models/ReqGrantUserRole.ts +72 -0
- package/src/models/ReqGrantUserRoleWithPermission.ts +80 -0
- package/src/models/ReqPreviewPathPrefix.ts +104 -0
- package/src/models/ReqRemoveChildRole.ts +72 -0
- package/src/models/ReqRemoveRolePermission.ts +72 -0
- package/src/models/ReqReplacePathPrefix.ts +104 -0
- package/src/models/ReqRevokeAdminRole.ts +64 -0
- package/src/models/ReqRevokeUserPermission.ts +72 -0
- package/src/models/ReqRevokeUserRole.ts +72 -0
- package/src/models/ReqUpdateRoleDescription.ts +64 -0
- package/src/models/ReqUpdateRoleName.ts +64 -0
- package/src/models/ReqUpdateRoleOwner.ts +72 -0
- package/src/models/ReqUserHasRole.ts +80 -0
- package/src/models/ReqUserHasRoleMulti.ts +80 -0
- package/src/models/ReqUserIsAdmin.ts +64 -0
- package/src/models/ReqUserIsPermitted.ts +80 -0
- package/src/models/ReqUserIsPermittedMulti.ts +80 -0
- package/src/models/ReqValidateServicePwd.ts +72 -0
- package/src/models/ReqVersions.ts +72 -0
- package/src/models/ReqWriteSecret.ts +87 -0
- package/src/models/RespAuthorized.ts +87 -0
- package/src/models/RespBasic.ts +80 -0
- package/src/models/RespChangeCount.ts +87 -0
- package/src/models/RespName.ts +87 -0
- package/src/models/RespNameArray.ts +87 -0
- package/src/models/RespPathPrefixes.ts +87 -0
- package/src/models/RespProbe.ts +87 -0
- package/src/models/RespResourceUrl.ts +87 -0
- package/src/models/RespRole.ts +87 -0
- package/src/models/RespSecret.ts +87 -0
- package/src/models/RespSecretList.ts +87 -0
- package/src/models/RespSecretMeta.ts +87 -0
- package/src/models/RespSecretVersionMetadata.ts +87 -0
- package/src/models/RespVersions.ts +80 -0
- package/src/models/ResultAuthorized.ts +56 -0
- package/src/models/ResultChangeCount.ts +56 -0
- package/src/models/ResultName.ts +56 -0
- package/src/models/ResultNameArray.ts +56 -0
- package/src/models/ResultResourceUrl.ts +56 -0
- package/src/models/SkProbe.ts +80 -0
- package/src/models/SkRole.ts +144 -0
- package/src/models/SkSecret.ts +71 -0
- package/src/models/SkSecretList.ts +64 -0
- package/src/models/SkSecretMetadata.ts +80 -0
- package/src/models/SkSecretVersion.ts +80 -0
- package/src/models/SkSecretVersionMetadata.ts +103 -0
- package/src/models/Transformation.ts +72 -0
- package/src/models/index.ts +55 -0
- package/src/runtime.ts +320 -0
- package/tsconfig.json +20 -0
|
@@ -0,0 +1,67 @@
|
|
|
1
|
+
.gitignore
|
|
2
|
+
.npmignore
|
|
3
|
+
.openapi-generator-ignore
|
|
4
|
+
README.md
|
|
5
|
+
package.json
|
|
6
|
+
src/apis/GeneralApi.ts
|
|
7
|
+
src/apis/RoleApi.ts
|
|
8
|
+
src/apis/UserApi.ts
|
|
9
|
+
src/apis/VaultApi.ts
|
|
10
|
+
src/apis/index.ts
|
|
11
|
+
src/index.ts
|
|
12
|
+
src/models/Options.ts
|
|
13
|
+
src/models/ReqAddChildRole.ts
|
|
14
|
+
src/models/ReqAddRolePermission.ts
|
|
15
|
+
src/models/ReqCreateRole.ts
|
|
16
|
+
src/models/ReqGrantAdminRole.ts
|
|
17
|
+
src/models/ReqGrantUserPermission.ts
|
|
18
|
+
src/models/ReqGrantUserRole.ts
|
|
19
|
+
src/models/ReqGrantUserRoleWithPermission.ts
|
|
20
|
+
src/models/ReqPreviewPathPrefix.ts
|
|
21
|
+
src/models/ReqRemoveChildRole.ts
|
|
22
|
+
src/models/ReqRemoveRolePermission.ts
|
|
23
|
+
src/models/ReqReplacePathPrefix.ts
|
|
24
|
+
src/models/ReqRevokeAdminRole.ts
|
|
25
|
+
src/models/ReqRevokeUserPermission.ts
|
|
26
|
+
src/models/ReqRevokeUserRole.ts
|
|
27
|
+
src/models/ReqUpdateRoleDescription.ts
|
|
28
|
+
src/models/ReqUpdateRoleName.ts
|
|
29
|
+
src/models/ReqUpdateRoleOwner.ts
|
|
30
|
+
src/models/ReqUserHasRole.ts
|
|
31
|
+
src/models/ReqUserHasRoleMulti.ts
|
|
32
|
+
src/models/ReqUserIsAdmin.ts
|
|
33
|
+
src/models/ReqUserIsPermitted.ts
|
|
34
|
+
src/models/ReqUserIsPermittedMulti.ts
|
|
35
|
+
src/models/ReqValidateServicePwd.ts
|
|
36
|
+
src/models/ReqVersions.ts
|
|
37
|
+
src/models/ReqWriteSecret.ts
|
|
38
|
+
src/models/RespAuthorized.ts
|
|
39
|
+
src/models/RespBasic.ts
|
|
40
|
+
src/models/RespChangeCount.ts
|
|
41
|
+
src/models/RespName.ts
|
|
42
|
+
src/models/RespNameArray.ts
|
|
43
|
+
src/models/RespPathPrefixes.ts
|
|
44
|
+
src/models/RespProbe.ts
|
|
45
|
+
src/models/RespResourceUrl.ts
|
|
46
|
+
src/models/RespRole.ts
|
|
47
|
+
src/models/RespSecret.ts
|
|
48
|
+
src/models/RespSecretList.ts
|
|
49
|
+
src/models/RespSecretMeta.ts
|
|
50
|
+
src/models/RespSecretVersionMetadata.ts
|
|
51
|
+
src/models/RespVersions.ts
|
|
52
|
+
src/models/ResultAuthorized.ts
|
|
53
|
+
src/models/ResultChangeCount.ts
|
|
54
|
+
src/models/ResultName.ts
|
|
55
|
+
src/models/ResultNameArray.ts
|
|
56
|
+
src/models/ResultResourceUrl.ts
|
|
57
|
+
src/models/SkProbe.ts
|
|
58
|
+
src/models/SkRole.ts
|
|
59
|
+
src/models/SkSecret.ts
|
|
60
|
+
src/models/SkSecretList.ts
|
|
61
|
+
src/models/SkSecretMetadata.ts
|
|
62
|
+
src/models/SkSecretVersion.ts
|
|
63
|
+
src/models/SkSecretVersionMetadata.ts
|
|
64
|
+
src/models/Transformation.ts
|
|
65
|
+
src/models/index.ts
|
|
66
|
+
src/runtime.ts
|
|
67
|
+
tsconfig.json
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
5.3.0
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
# OpenAPI Generator Ignore
|
|
2
|
+
# Generated by openapi-generator https://github.com/openapitools/openapi-generator
|
|
3
|
+
|
|
4
|
+
# Use this file to prevent files from being overwritten by the generator.
|
|
5
|
+
# The patterns follow closely to .gitignore or .dockerignore.
|
|
6
|
+
|
|
7
|
+
# As an example, the C# client generator defines ApiClient.cs.
|
|
8
|
+
# You can make changes and tell OpenAPI Generator to ignore just this file by uncommenting the following line:
|
|
9
|
+
#ApiClient.cs
|
|
10
|
+
|
|
11
|
+
# You can match any string of characters against a directory, file or extension with a single asterisk (*):
|
|
12
|
+
#foo/*/qux
|
|
13
|
+
# The above matches foo/bar/qux and foo/baz/qux, but not foo/bar/baz/qux
|
|
14
|
+
|
|
15
|
+
# You can recursively match patterns against a directory, file or extension with a double asterisk (**):
|
|
16
|
+
#foo/**/qux
|
|
17
|
+
# This matches foo/bar/qux, foo/baz/qux, and foo/bar/baz/qux
|
|
18
|
+
|
|
19
|
+
# You can also negate patterns with an exclamation (!).
|
|
20
|
+
# For example, you can ignore all files in a docs folder with the file extension .md:
|
|
21
|
+
#docs/*.md
|
|
22
|
+
# Then explicitly reverse the ignore rule for a single file:
|
|
23
|
+
#!docs/README.md
|
package/README.md
ADDED
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
## @tapis/tapis-typescript-sk@0.0.2
|
|
2
|
+
|
|
3
|
+
This generator creates TypeScript/JavaScript client that utilizes [Fetch API](https://fetch.spec.whatwg.org/). The generated Node module can be used in the following environments:
|
|
4
|
+
|
|
5
|
+
Environment
|
|
6
|
+
* Node.js
|
|
7
|
+
* Webpack
|
|
8
|
+
* Browserify
|
|
9
|
+
|
|
10
|
+
Language level
|
|
11
|
+
* ES5 - you must have a Promises/A+ library installed
|
|
12
|
+
* ES6
|
|
13
|
+
|
|
14
|
+
Module system
|
|
15
|
+
* CommonJS
|
|
16
|
+
* ES6 module system
|
|
17
|
+
|
|
18
|
+
It can be used in both TypeScript and JavaScript. In TypeScript, the definition should be automatically resolved via `package.json`. ([Reference](http://www.typescriptlang.org/docs/handbook/typings-for-npm-packages.html))
|
|
19
|
+
|
|
20
|
+
### Building
|
|
21
|
+
|
|
22
|
+
To build and compile the typescript sources to javascript use:
|
|
23
|
+
```
|
|
24
|
+
npm install
|
|
25
|
+
npm run build
|
|
26
|
+
```
|
|
27
|
+
|
|
28
|
+
### Publishing
|
|
29
|
+
|
|
30
|
+
First build the package then run ```npm publish```
|
|
31
|
+
|
|
32
|
+
### Consuming
|
|
33
|
+
|
|
34
|
+
navigate to the folder of your consuming project and run one of the following commands.
|
|
35
|
+
|
|
36
|
+
_published:_
|
|
37
|
+
|
|
38
|
+
```
|
|
39
|
+
npm install @tapis/tapis-typescript-sk@0.0.2 --save
|
|
40
|
+
```
|
|
41
|
+
|
|
42
|
+
_unPublished (not recommended):_
|
|
43
|
+
|
|
44
|
+
```
|
|
45
|
+
npm install PATH_TO_GENERATED_PACKAGE --save
|
|
@@ -0,0 +1,45 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Tapis Security API
|
|
3
|
+
* The Tapis Security API provides access to the Tapis Security Kernel authorization and secrets facilities.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 0.1
|
|
6
|
+
* Contact: cicsupport@tacc.utexas.edu
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import * as runtime from '../runtime';
|
|
13
|
+
import { RespBasic, RespProbe } from '../models';
|
|
14
|
+
export interface SayHelloRequest {
|
|
15
|
+
pretty?: boolean;
|
|
16
|
+
}
|
|
17
|
+
/**
|
|
18
|
+
*
|
|
19
|
+
*/
|
|
20
|
+
export declare class GeneralApi extends runtime.BaseAPI {
|
|
21
|
+
/**
|
|
22
|
+
* Lightwieght health check for liveness. No authorization required.
|
|
23
|
+
*/
|
|
24
|
+
checkHealthRaw(initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespProbe>>;
|
|
25
|
+
/**
|
|
26
|
+
* Lightwieght health check for liveness. No authorization required.
|
|
27
|
+
*/
|
|
28
|
+
checkHealth(initOverrides?: RequestInit): Promise<RespProbe>;
|
|
29
|
+
/**
|
|
30
|
+
* Lightwieght readiness check. No authorization required.
|
|
31
|
+
*/
|
|
32
|
+
readyRaw(initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespProbe>>;
|
|
33
|
+
/**
|
|
34
|
+
* Lightwieght readiness check. No authorization required.
|
|
35
|
+
*/
|
|
36
|
+
ready(initOverrides?: RequestInit): Promise<RespProbe>;
|
|
37
|
+
/**
|
|
38
|
+
* Logged connectivity test. No authorization required.
|
|
39
|
+
*/
|
|
40
|
+
sayHelloRaw(requestParameters: SayHelloRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespBasic>>;
|
|
41
|
+
/**
|
|
42
|
+
* Logged connectivity test. No authorization required.
|
|
43
|
+
*/
|
|
44
|
+
sayHello(requestParameters: SayHelloRequest, initOverrides?: RequestInit): Promise<RespBasic>;
|
|
45
|
+
}
|
|
@@ -0,0 +1,199 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
/* tslint:disable */
|
|
3
|
+
/* eslint-disable */
|
|
4
|
+
/**
|
|
5
|
+
* Tapis Security API
|
|
6
|
+
* The Tapis Security API provides access to the Tapis Security Kernel authorization and secrets facilities.
|
|
7
|
+
*
|
|
8
|
+
* The version of the OpenAPI document: 0.1
|
|
9
|
+
* Contact: cicsupport@tacc.utexas.edu
|
|
10
|
+
*
|
|
11
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
12
|
+
* https://openapi-generator.tech
|
|
13
|
+
* Do not edit the class manually.
|
|
14
|
+
*/
|
|
15
|
+
var __extends = (this && this.__extends) || (function () {
|
|
16
|
+
var extendStatics = Object.setPrototypeOf ||
|
|
17
|
+
({ __proto__: [] } instanceof Array && function (d, b) { d.__proto__ = b; }) ||
|
|
18
|
+
function (d, b) { for (var p in b) if (b.hasOwnProperty(p)) d[p] = b[p]; };
|
|
19
|
+
return function (d, b) {
|
|
20
|
+
extendStatics(d, b);
|
|
21
|
+
function __() { this.constructor = d; }
|
|
22
|
+
d.prototype = b === null ? Object.create(b) : (__.prototype = b.prototype, new __());
|
|
23
|
+
};
|
|
24
|
+
})();
|
|
25
|
+
var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
|
|
26
|
+
return new (P || (P = Promise))(function (resolve, reject) {
|
|
27
|
+
function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
|
|
28
|
+
function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
|
|
29
|
+
function step(result) { result.done ? resolve(result.value) : new P(function (resolve) { resolve(result.value); }).then(fulfilled, rejected); }
|
|
30
|
+
step((generator = generator.apply(thisArg, _arguments || [])).next());
|
|
31
|
+
});
|
|
32
|
+
};
|
|
33
|
+
var __generator = (this && this.__generator) || function (thisArg, body) {
|
|
34
|
+
var _ = { label: 0, sent: function() { if (t[0] & 1) throw t[1]; return t[1]; }, trys: [], ops: [] }, f, y, t, g;
|
|
35
|
+
return g = { next: verb(0), "throw": verb(1), "return": verb(2) }, typeof Symbol === "function" && (g[Symbol.iterator] = function() { return this; }), g;
|
|
36
|
+
function verb(n) { return function (v) { return step([n, v]); }; }
|
|
37
|
+
function step(op) {
|
|
38
|
+
if (f) throw new TypeError("Generator is already executing.");
|
|
39
|
+
while (_) try {
|
|
40
|
+
if (f = 1, y && (t = op[0] & 2 ? y["return"] : op[0] ? y["throw"] || ((t = y["return"]) && t.call(y), 0) : y.next) && !(t = t.call(y, op[1])).done) return t;
|
|
41
|
+
if (y = 0, t) op = [op[0] & 2, t.value];
|
|
42
|
+
switch (op[0]) {
|
|
43
|
+
case 0: case 1: t = op; break;
|
|
44
|
+
case 4: _.label++; return { value: op[1], done: false };
|
|
45
|
+
case 5: _.label++; y = op[1]; op = [0]; continue;
|
|
46
|
+
case 7: op = _.ops.pop(); _.trys.pop(); continue;
|
|
47
|
+
default:
|
|
48
|
+
if (!(t = _.trys, t = t.length > 0 && t[t.length - 1]) && (op[0] === 6 || op[0] === 2)) { _ = 0; continue; }
|
|
49
|
+
if (op[0] === 3 && (!t || (op[1] > t[0] && op[1] < t[3]))) { _.label = op[1]; break; }
|
|
50
|
+
if (op[0] === 6 && _.label < t[1]) { _.label = t[1]; t = op; break; }
|
|
51
|
+
if (t && _.label < t[2]) { _.label = t[2]; _.ops.push(op); break; }
|
|
52
|
+
if (t[2]) _.ops.pop();
|
|
53
|
+
_.trys.pop(); continue;
|
|
54
|
+
}
|
|
55
|
+
op = body.call(thisArg, _);
|
|
56
|
+
} catch (e) { op = [6, e]; y = 0; } finally { f = t = 0; }
|
|
57
|
+
if (op[0] & 5) throw op[1]; return { value: op[0] ? op[1] : void 0, done: true };
|
|
58
|
+
}
|
|
59
|
+
};
|
|
60
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
61
|
+
var runtime = require("../runtime");
|
|
62
|
+
var models_1 = require("../models");
|
|
63
|
+
/**
|
|
64
|
+
*
|
|
65
|
+
*/
|
|
66
|
+
var GeneralApi = /** @class */ (function (_super) {
|
|
67
|
+
__extends(GeneralApi, _super);
|
|
68
|
+
function GeneralApi() {
|
|
69
|
+
return _super !== null && _super.apply(this, arguments) || this;
|
|
70
|
+
}
|
|
71
|
+
/**
|
|
72
|
+
* Lightwieght health check for liveness. No authorization required.
|
|
73
|
+
*/
|
|
74
|
+
GeneralApi.prototype.checkHealthRaw = function (initOverrides) {
|
|
75
|
+
return __awaiter(this, void 0, void 0, function () {
|
|
76
|
+
var queryParameters, headerParameters, response;
|
|
77
|
+
return __generator(this, function (_a) {
|
|
78
|
+
switch (_a.label) {
|
|
79
|
+
case 0:
|
|
80
|
+
queryParameters = {};
|
|
81
|
+
headerParameters = {};
|
|
82
|
+
return [4 /*yield*/, this.request({
|
|
83
|
+
path: "/security/healthcheck",
|
|
84
|
+
method: 'GET',
|
|
85
|
+
headers: headerParameters,
|
|
86
|
+
query: queryParameters,
|
|
87
|
+
}, initOverrides)];
|
|
88
|
+
case 1:
|
|
89
|
+
response = _a.sent();
|
|
90
|
+
return [2 /*return*/, new runtime.JSONApiResponse(response, function (jsonValue) { return models_1.RespProbeFromJSON(jsonValue); })];
|
|
91
|
+
}
|
|
92
|
+
});
|
|
93
|
+
});
|
|
94
|
+
};
|
|
95
|
+
/**
|
|
96
|
+
* Lightwieght health check for liveness. No authorization required.
|
|
97
|
+
*/
|
|
98
|
+
GeneralApi.prototype.checkHealth = function (initOverrides) {
|
|
99
|
+
return __awaiter(this, void 0, void 0, function () {
|
|
100
|
+
var response;
|
|
101
|
+
return __generator(this, function (_a) {
|
|
102
|
+
switch (_a.label) {
|
|
103
|
+
case 0: return [4 /*yield*/, this.checkHealthRaw(initOverrides)];
|
|
104
|
+
case 1:
|
|
105
|
+
response = _a.sent();
|
|
106
|
+
return [4 /*yield*/, response.value()];
|
|
107
|
+
case 2: return [2 /*return*/, _a.sent()];
|
|
108
|
+
}
|
|
109
|
+
});
|
|
110
|
+
});
|
|
111
|
+
};
|
|
112
|
+
/**
|
|
113
|
+
* Lightwieght readiness check. No authorization required.
|
|
114
|
+
*/
|
|
115
|
+
GeneralApi.prototype.readyRaw = function (initOverrides) {
|
|
116
|
+
return __awaiter(this, void 0, void 0, function () {
|
|
117
|
+
var queryParameters, headerParameters, response;
|
|
118
|
+
return __generator(this, function (_a) {
|
|
119
|
+
switch (_a.label) {
|
|
120
|
+
case 0:
|
|
121
|
+
queryParameters = {};
|
|
122
|
+
headerParameters = {};
|
|
123
|
+
return [4 /*yield*/, this.request({
|
|
124
|
+
path: "/security/ready",
|
|
125
|
+
method: 'GET',
|
|
126
|
+
headers: headerParameters,
|
|
127
|
+
query: queryParameters,
|
|
128
|
+
}, initOverrides)];
|
|
129
|
+
case 1:
|
|
130
|
+
response = _a.sent();
|
|
131
|
+
return [2 /*return*/, new runtime.JSONApiResponse(response, function (jsonValue) { return models_1.RespProbeFromJSON(jsonValue); })];
|
|
132
|
+
}
|
|
133
|
+
});
|
|
134
|
+
});
|
|
135
|
+
};
|
|
136
|
+
/**
|
|
137
|
+
* Lightwieght readiness check. No authorization required.
|
|
138
|
+
*/
|
|
139
|
+
GeneralApi.prototype.ready = function (initOverrides) {
|
|
140
|
+
return __awaiter(this, void 0, void 0, function () {
|
|
141
|
+
var response;
|
|
142
|
+
return __generator(this, function (_a) {
|
|
143
|
+
switch (_a.label) {
|
|
144
|
+
case 0: return [4 /*yield*/, this.readyRaw(initOverrides)];
|
|
145
|
+
case 1:
|
|
146
|
+
response = _a.sent();
|
|
147
|
+
return [4 /*yield*/, response.value()];
|
|
148
|
+
case 2: return [2 /*return*/, _a.sent()];
|
|
149
|
+
}
|
|
150
|
+
});
|
|
151
|
+
});
|
|
152
|
+
};
|
|
153
|
+
/**
|
|
154
|
+
* Logged connectivity test. No authorization required.
|
|
155
|
+
*/
|
|
156
|
+
GeneralApi.prototype.sayHelloRaw = function (requestParameters, initOverrides) {
|
|
157
|
+
return __awaiter(this, void 0, void 0, function () {
|
|
158
|
+
var queryParameters, headerParameters, response;
|
|
159
|
+
return __generator(this, function (_a) {
|
|
160
|
+
switch (_a.label) {
|
|
161
|
+
case 0:
|
|
162
|
+
queryParameters = {};
|
|
163
|
+
if (requestParameters.pretty !== undefined) {
|
|
164
|
+
queryParameters['pretty'] = requestParameters.pretty;
|
|
165
|
+
}
|
|
166
|
+
headerParameters = {};
|
|
167
|
+
return [4 /*yield*/, this.request({
|
|
168
|
+
path: "/security/hello",
|
|
169
|
+
method: 'GET',
|
|
170
|
+
headers: headerParameters,
|
|
171
|
+
query: queryParameters,
|
|
172
|
+
}, initOverrides)];
|
|
173
|
+
case 1:
|
|
174
|
+
response = _a.sent();
|
|
175
|
+
return [2 /*return*/, new runtime.JSONApiResponse(response, function (jsonValue) { return models_1.RespBasicFromJSON(jsonValue); })];
|
|
176
|
+
}
|
|
177
|
+
});
|
|
178
|
+
});
|
|
179
|
+
};
|
|
180
|
+
/**
|
|
181
|
+
* Logged connectivity test. No authorization required.
|
|
182
|
+
*/
|
|
183
|
+
GeneralApi.prototype.sayHello = function (requestParameters, initOverrides) {
|
|
184
|
+
return __awaiter(this, void 0, void 0, function () {
|
|
185
|
+
var response;
|
|
186
|
+
return __generator(this, function (_a) {
|
|
187
|
+
switch (_a.label) {
|
|
188
|
+
case 0: return [4 /*yield*/, this.sayHelloRaw(requestParameters, initOverrides)];
|
|
189
|
+
case 1:
|
|
190
|
+
response = _a.sent();
|
|
191
|
+
return [4 /*yield*/, response.value()];
|
|
192
|
+
case 2: return [2 /*return*/, _a.sent()];
|
|
193
|
+
}
|
|
194
|
+
});
|
|
195
|
+
});
|
|
196
|
+
};
|
|
197
|
+
return GeneralApi;
|
|
198
|
+
}(runtime.BaseAPI));
|
|
199
|
+
exports.GeneralApi = GeneralApi;
|
|
@@ -0,0 +1,205 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Tapis Security API
|
|
3
|
+
* The Tapis Security API provides access to the Tapis Security Kernel authorization and secrets facilities.
|
|
4
|
+
*
|
|
5
|
+
* The version of the OpenAPI document: 0.1
|
|
6
|
+
* Contact: cicsupport@tacc.utexas.edu
|
|
7
|
+
*
|
|
8
|
+
* NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
|
|
9
|
+
* https://openapi-generator.tech
|
|
10
|
+
* Do not edit the class manually.
|
|
11
|
+
*/
|
|
12
|
+
import * as runtime from '../runtime';
|
|
13
|
+
import { ReqAddChildRole, ReqAddRolePermission, ReqCreateRole, ReqPreviewPathPrefix, ReqRemoveChildRole, ReqRemoveRolePermission, ReqReplacePathPrefix, ReqUpdateRoleDescription, ReqUpdateRoleName, ReqUpdateRoleOwner, RespBasic, RespChangeCount, RespName, RespNameArray, RespPathPrefixes, RespResourceUrl, RespRole } from '../models';
|
|
14
|
+
export interface AddChildRoleRequest {
|
|
15
|
+
reqAddChildRole: ReqAddChildRole;
|
|
16
|
+
pretty?: boolean;
|
|
17
|
+
}
|
|
18
|
+
export interface AddRolePermissionRequest {
|
|
19
|
+
reqAddRolePermission: ReqAddRolePermission;
|
|
20
|
+
pretty?: boolean;
|
|
21
|
+
}
|
|
22
|
+
export interface CreateRoleRequest {
|
|
23
|
+
reqCreateRole: ReqCreateRole;
|
|
24
|
+
pretty?: boolean;
|
|
25
|
+
}
|
|
26
|
+
export interface DeleteRoleByNameRequest {
|
|
27
|
+
roleName: string;
|
|
28
|
+
tenant?: string;
|
|
29
|
+
pretty?: boolean;
|
|
30
|
+
}
|
|
31
|
+
export interface GetDefaultUserRoleRequest {
|
|
32
|
+
user: string;
|
|
33
|
+
pretty?: boolean;
|
|
34
|
+
}
|
|
35
|
+
export interface GetRoleByNameRequest {
|
|
36
|
+
roleName: string;
|
|
37
|
+
tenant?: string;
|
|
38
|
+
pretty?: boolean;
|
|
39
|
+
}
|
|
40
|
+
export interface GetRoleNamesRequest {
|
|
41
|
+
tenant?: string;
|
|
42
|
+
pretty?: boolean;
|
|
43
|
+
}
|
|
44
|
+
export interface GetRolePermissionsRequest {
|
|
45
|
+
roleName: string;
|
|
46
|
+
tenant?: string;
|
|
47
|
+
immediate?: boolean;
|
|
48
|
+
pretty?: boolean;
|
|
49
|
+
}
|
|
50
|
+
export interface PreviewPathPrefixRequest {
|
|
51
|
+
reqPreviewPathPrefix: ReqPreviewPathPrefix;
|
|
52
|
+
pretty?: boolean;
|
|
53
|
+
}
|
|
54
|
+
export interface RemoveChildRoleRequest {
|
|
55
|
+
reqRemoveChildRole: ReqRemoveChildRole;
|
|
56
|
+
pretty?: boolean;
|
|
57
|
+
}
|
|
58
|
+
export interface RemoveRolePermissionRequest {
|
|
59
|
+
reqRemoveRolePermission: ReqRemoveRolePermission;
|
|
60
|
+
pretty?: boolean;
|
|
61
|
+
}
|
|
62
|
+
export interface ReplacePathPrefixRequest {
|
|
63
|
+
reqReplacePathPrefix: ReqReplacePathPrefix;
|
|
64
|
+
pretty?: boolean;
|
|
65
|
+
}
|
|
66
|
+
export interface UpdateRoleDescriptionRequest {
|
|
67
|
+
roleName: string;
|
|
68
|
+
reqUpdateRoleDescription: ReqUpdateRoleDescription;
|
|
69
|
+
pretty?: boolean;
|
|
70
|
+
}
|
|
71
|
+
export interface UpdateRoleNameRequest {
|
|
72
|
+
roleName: string;
|
|
73
|
+
reqUpdateRoleName: ReqUpdateRoleName;
|
|
74
|
+
pretty?: boolean;
|
|
75
|
+
}
|
|
76
|
+
export interface UpdateRoleOwnerRequest {
|
|
77
|
+
roleName: string;
|
|
78
|
+
reqUpdateRoleOwner: ReqUpdateRoleOwner;
|
|
79
|
+
pretty?: boolean;
|
|
80
|
+
}
|
|
81
|
+
/**
|
|
82
|
+
*
|
|
83
|
+
*/
|
|
84
|
+
export declare class RoleApi extends runtime.BaseAPI {
|
|
85
|
+
/**
|
|
86
|
+
* Add a child role to another role using a request body. If the child already exists, then the request has no effect and the change count returned is zero. Otherwise, the child is added and the change count is one. The user@tenant identity specified in JWT is authorized to make this request only if that user is an administrator or if the user owns both the parent and child roles.
|
|
87
|
+
*/
|
|
88
|
+
addChildRoleRaw(requestParameters: AddChildRoleRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespChangeCount>>;
|
|
89
|
+
/**
|
|
90
|
+
* Add a child role to another role using a request body. If the child already exists, then the request has no effect and the change count returned is zero. Otherwise, the child is added and the change count is one. The user@tenant identity specified in JWT is authorized to make this request only if that user is an administrator or if the user owns both the parent and child roles.
|
|
91
|
+
*/
|
|
92
|
+
addChildRole(requestParameters: AddChildRoleRequest, initOverrides?: RequestInit): Promise<RespChangeCount>;
|
|
93
|
+
/**
|
|
94
|
+
* Add a permission to an existing role using a request body. If the permission already exists, then the request has no effect and the change count returned is zero. Otherwise, the permission is added and the change count is one. Permissions are case-sensitive strings that follow the format defined by Apache Shiro (https://shiro.apache.org/permissions.html). This format defines any number of colon-separated (:) parts, with the possible use of asterisks (*) as wildcards and commas (,) as aggregators. Here are two example permission strings: system:MyTenant:read,write:system1 system:MyTenant:create,read,write,delete:* See the Shiro documentation for further details. Note that the three reserved characters, [: * ,], cannot appear in the text of any part. It\'s the application\'s responsibility to escape those characters in a manner that is safe in the application\'s domain. This request is authorized only if the authenticated user is either the role owner or an administrator.
|
|
95
|
+
*/
|
|
96
|
+
addRolePermissionRaw(requestParameters: AddRolePermissionRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespChangeCount>>;
|
|
97
|
+
/**
|
|
98
|
+
* Add a permission to an existing role using a request body. If the permission already exists, then the request has no effect and the change count returned is zero. Otherwise, the permission is added and the change count is one. Permissions are case-sensitive strings that follow the format defined by Apache Shiro (https://shiro.apache.org/permissions.html). This format defines any number of colon-separated (:) parts, with the possible use of asterisks (*) as wildcards and commas (,) as aggregators. Here are two example permission strings: system:MyTenant:read,write:system1 system:MyTenant:create,read,write,delete:* See the Shiro documentation for further details. Note that the three reserved characters, [: * ,], cannot appear in the text of any part. It\'s the application\'s responsibility to escape those characters in a manner that is safe in the application\'s domain. This request is authorized only if the authenticated user is either the role owner or an administrator.
|
|
99
|
+
*/
|
|
100
|
+
addRolePermission(requestParameters: AddRolePermissionRequest, initOverrides?: RequestInit): Promise<RespChangeCount>;
|
|
101
|
+
/**
|
|
102
|
+
* Create a role using a request body. Role names are case sensitive, alpha-numeric strings that can also contain underscores. Role names must start with an alphbetic character and can be no more than 58 characters in length. The desciption can be no more than 2048 characters long. If the role already exists, this request has no effect. For the request to be authorized, the requestor must be either an administrator or a service allowed to perform updates in the new role\'s tenant.
|
|
103
|
+
*/
|
|
104
|
+
createRoleRaw(requestParameters: CreateRoleRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespResourceUrl>>;
|
|
105
|
+
/**
|
|
106
|
+
* Create a role using a request body. Role names are case sensitive, alpha-numeric strings that can also contain underscores. Role names must start with an alphbetic character and can be no more than 58 characters in length. The desciption can be no more than 2048 characters long. If the role already exists, this request has no effect. For the request to be authorized, the requestor must be either an administrator or a service allowed to perform updates in the new role\'s tenant.
|
|
107
|
+
*/
|
|
108
|
+
createRole(requestParameters: CreateRoleRequest, initOverrides?: RequestInit): Promise<RespResourceUrl>;
|
|
109
|
+
/**
|
|
110
|
+
* Delete the named role. A valid tenant and user must be specified as query parameters. This request is authorized only if the authenticated user is either the role owner or an administrator.
|
|
111
|
+
*/
|
|
112
|
+
deleteRoleByNameRaw(requestParameters: DeleteRoleByNameRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespChangeCount>>;
|
|
113
|
+
/**
|
|
114
|
+
* Delete the named role. A valid tenant and user must be specified as query parameters. This request is authorized only if the authenticated user is either the role owner or an administrator.
|
|
115
|
+
*/
|
|
116
|
+
deleteRoleByName(requestParameters: DeleteRoleByNameRequest, initOverrides?: RequestInit): Promise<RespChangeCount>;
|
|
117
|
+
/**
|
|
118
|
+
* Get a user\'s default role. The default role is implicitly created by the system when needed if it doesn\'t already exist. No authorization required. A user\'s default role is constructed by prepending \'$$\' to the user\'s name. This implies the maximum length of a user name is 58 since role names are limited to 60 characters.
|
|
119
|
+
*/
|
|
120
|
+
getDefaultUserRoleRaw(requestParameters: GetDefaultUserRoleRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespName>>;
|
|
121
|
+
/**
|
|
122
|
+
* Get a user\'s default role. The default role is implicitly created by the system when needed if it doesn\'t already exist. No authorization required. A user\'s default role is constructed by prepending \'$$\' to the user\'s name. This implies the maximum length of a user name is 58 since role names are limited to 60 characters.
|
|
123
|
+
*/
|
|
124
|
+
getDefaultUserRole(requestParameters: GetDefaultUserRoleRequest, initOverrides?: RequestInit): Promise<RespName>;
|
|
125
|
+
/**
|
|
126
|
+
* Get the named role\'s definition. A valid tenant must be specified as a query parameter. This request is authorized if the requestor is a user that has access to the specified tenant or if the requestor is a service.
|
|
127
|
+
*/
|
|
128
|
+
getRoleByNameRaw(requestParameters: GetRoleByNameRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespRole>>;
|
|
129
|
+
/**
|
|
130
|
+
* Get the named role\'s definition. A valid tenant must be specified as a query parameter. This request is authorized if the requestor is a user that has access to the specified tenant or if the requestor is a service.
|
|
131
|
+
*/
|
|
132
|
+
getRoleByName(requestParameters: GetRoleByNameRequest, initOverrides?: RequestInit): Promise<RespRole>;
|
|
133
|
+
/**
|
|
134
|
+
* Get the names of all roles in the tenant in alphabetic order. Future enhancements will include search filtering. A valid tenant must be specified as a query parameter. This request is authorized if the requestor is a user that has access to the specified tenant or if the requestor is a service.
|
|
135
|
+
*/
|
|
136
|
+
getRoleNamesRaw(requestParameters: GetRoleNamesRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespNameArray>>;
|
|
137
|
+
/**
|
|
138
|
+
* Get the names of all roles in the tenant in alphabetic order. Future enhancements will include search filtering. A valid tenant must be specified as a query parameter. This request is authorized if the requestor is a user that has access to the specified tenant or if the requestor is a service.
|
|
139
|
+
*/
|
|
140
|
+
getRoleNames(requestParameters: GetRoleNamesRequest, initOverrides?: RequestInit): Promise<RespNameArray>;
|
|
141
|
+
/**
|
|
142
|
+
* Get the named role\'s permissions. By default, all permissions assigned to the role, whether directly and transitively through child roles, are returned. Set the immediate query parameter to only retrieve permissions directly assigned to the role. A valid tenant must be specified. This request is authorized if the requestor is a user that has access to the specified tenant or if the requestor is a service.
|
|
143
|
+
*/
|
|
144
|
+
getRolePermissionsRaw(requestParameters: GetRolePermissionsRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespNameArray>>;
|
|
145
|
+
/**
|
|
146
|
+
* Get the named role\'s permissions. By default, all permissions assigned to the role, whether directly and transitively through child roles, are returned. Set the immediate query parameter to only retrieve permissions directly assigned to the role. A valid tenant must be specified. This request is authorized if the requestor is a user that has access to the specified tenant or if the requestor is a service.
|
|
147
|
+
*/
|
|
148
|
+
getRolePermissions(requestParameters: GetRolePermissionsRequest, initOverrides?: RequestInit): Promise<RespNameArray>;
|
|
149
|
+
/**
|
|
150
|
+
* This read-only endpoint previews the transformations that would take place if the same input was used on a replacePathPrefix POST call. This call is also implemented as a POST so that the same input as used on replacePathPrefix can be used here, but this call changes nothing. This endpoint can be used to get an accounting of existing system/path combinations that match the input specification. Such information is useful when trying to duplicate a set of permissions. For example, one may want to copy a file subtree to another location and assign the same permissions to the new subtree as currently exist on the original subtree. One could use this call to calculate the users that should be granted permission on the new subtree. The optional parameters are roleName, oldPrefix and newPrefix. No wildcards are defined for the path prefix parameters. When roleName is specified then only permissions assigned to that role are considered. When the oldPrefix parameter is provided, it\'s used to filter out permissions whose paths do not begin with the specified string; when not provided, no path prefix filtering occurs. When the newPrefix parameter is not provided no new characters are prepended to the new path, effectively just removing the oldPrefix from the new path. When neither oldPrefix nor newPrefix are provided, no path transformation occurs, though system IDs can still be transformed. The result object contains an array of transformation objects, each of which contains the unique permission sequence number, the existing permission that matched the search criteria and the new permission if the specified transformations were applied. A valid tenant and user must be specified in the request body. This request is authorized if the requestor is a user that has access to the specified tenant or if the requestor is a service.
|
|
151
|
+
*/
|
|
152
|
+
previewPathPrefixRaw(requestParameters: PreviewPathPrefixRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespPathPrefixes>>;
|
|
153
|
+
/**
|
|
154
|
+
* This read-only endpoint previews the transformations that would take place if the same input was used on a replacePathPrefix POST call. This call is also implemented as a POST so that the same input as used on replacePathPrefix can be used here, but this call changes nothing. This endpoint can be used to get an accounting of existing system/path combinations that match the input specification. Such information is useful when trying to duplicate a set of permissions. For example, one may want to copy a file subtree to another location and assign the same permissions to the new subtree as currently exist on the original subtree. One could use this call to calculate the users that should be granted permission on the new subtree. The optional parameters are roleName, oldPrefix and newPrefix. No wildcards are defined for the path prefix parameters. When roleName is specified then only permissions assigned to that role are considered. When the oldPrefix parameter is provided, it\'s used to filter out permissions whose paths do not begin with the specified string; when not provided, no path prefix filtering occurs. When the newPrefix parameter is not provided no new characters are prepended to the new path, effectively just removing the oldPrefix from the new path. When neither oldPrefix nor newPrefix are provided, no path transformation occurs, though system IDs can still be transformed. The result object contains an array of transformation objects, each of which contains the unique permission sequence number, the existing permission that matched the search criteria and the new permission if the specified transformations were applied. A valid tenant and user must be specified in the request body. This request is authorized if the requestor is a user that has access to the specified tenant or if the requestor is a service.
|
|
155
|
+
*/
|
|
156
|
+
previewPathPrefix(requestParameters: PreviewPathPrefixRequest, initOverrides?: RequestInit): Promise<RespPathPrefixes>;
|
|
157
|
+
/**
|
|
158
|
+
* Remove a child role from a parent role using a request body. A valid tenant and user must be specified in the request body. The user@tenant identity specified in JWT is authorized to make this request only if that user is an administrator or if they own the parent role.
|
|
159
|
+
*/
|
|
160
|
+
removeChildRoleRaw(requestParameters: RemoveChildRoleRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespChangeCount>>;
|
|
161
|
+
/**
|
|
162
|
+
* Remove a child role from a parent role using a request body. A valid tenant and user must be specified in the request body. The user@tenant identity specified in JWT is authorized to make this request only if that user is an administrator or if they own the parent role.
|
|
163
|
+
*/
|
|
164
|
+
removeChildRole(requestParameters: RemoveChildRoleRequest, initOverrides?: RequestInit): Promise<RespChangeCount>;
|
|
165
|
+
/**
|
|
166
|
+
* Remove a permission from a role using a request body. A valid role, roleTenant and permission must be specified in the request body. Only the role owner or administrators are authorized to make this call.
|
|
167
|
+
*/
|
|
168
|
+
removeRolePermissionRaw(requestParameters: RemoveRolePermissionRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespChangeCount>>;
|
|
169
|
+
/**
|
|
170
|
+
* Remove a permission from a role using a request body. A valid role, roleTenant and permission must be specified in the request body. Only the role owner or administrators are authorized to make this call.
|
|
171
|
+
*/
|
|
172
|
+
removeRolePermission(requestParameters: RemoveRolePermissionRequest, initOverrides?: RequestInit): Promise<RespChangeCount>;
|
|
173
|
+
/**
|
|
174
|
+
* Replace the text in a permission specification when its last component defines an *extended path attribute*. Extended path attributes enhance the standard Shiro matching algorithm with one that treats designated components in a permission specification as a path name, such as a posix file or directory path name. This request is useful when files or directories have been renamed or moved and their authorizations need to be adjusted. Consider, for example, permissions that conform to the following specification: files:tenantId:op:systemId:path By definition, the last component is an extended path attribute whose content can be changed by replacePathPrefix requests. Specifically, paths that begin with the oldPrefix will have that prefix replaced with the newPrefix value. Replacement only occurs on permissions that also match the schema and oldSystemId parameter values. The systemId attribute is required to immediately precede the path attribute, which must be the last attribute. Additionally, the oldSystemId is replaced with the newSystemId when a match is found. If a roleName is provided, then replacement is limited to permissions defined only in that role. Otherwise, permissions in all roles that meet the other matching criteria will be considered. The optional parameters are roleName, oldPrefix and newPrefix. No wildcards are defined for the path prefix parameters. When roleName is specified then only permissions assigned to that role are considered. When the oldPrefix parameter is provided, it\'s used to filter out permissions whose paths do not begin with the specified string; when not provided, no path prefix filtering occurs. When the newPrefix parameter is not provided no new characters are prepended to the new path, effectively just removing the oldPrefix from the new path. When neither oldPrefix nor newPrefix are provided, no path transformation occurs, though system IDs can still be transformed. The previewPathPrefix request provides a way to do a dry run using the same input as this request. The preview call calculates the permissions that would change and what their new values would be, but it does not actually change those permissions as replacePathPrefix does. The input parameters are passed in the payload of this request. The response indicates the number of changed permission specifications. The path prefix replacement operation is authorized if the user@tenant in the JWT represents a tenant administrator or the Files service.
|
|
175
|
+
*/
|
|
176
|
+
replacePathPrefixRaw(requestParameters: ReplacePathPrefixRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespChangeCount>>;
|
|
177
|
+
/**
|
|
178
|
+
* Replace the text in a permission specification when its last component defines an *extended path attribute*. Extended path attributes enhance the standard Shiro matching algorithm with one that treats designated components in a permission specification as a path name, such as a posix file or directory path name. This request is useful when files or directories have been renamed or moved and their authorizations need to be adjusted. Consider, for example, permissions that conform to the following specification: files:tenantId:op:systemId:path By definition, the last component is an extended path attribute whose content can be changed by replacePathPrefix requests. Specifically, paths that begin with the oldPrefix will have that prefix replaced with the newPrefix value. Replacement only occurs on permissions that also match the schema and oldSystemId parameter values. The systemId attribute is required to immediately precede the path attribute, which must be the last attribute. Additionally, the oldSystemId is replaced with the newSystemId when a match is found. If a roleName is provided, then replacement is limited to permissions defined only in that role. Otherwise, permissions in all roles that meet the other matching criteria will be considered. The optional parameters are roleName, oldPrefix and newPrefix. No wildcards are defined for the path prefix parameters. When roleName is specified then only permissions assigned to that role are considered. When the oldPrefix parameter is provided, it\'s used to filter out permissions whose paths do not begin with the specified string; when not provided, no path prefix filtering occurs. When the newPrefix parameter is not provided no new characters are prepended to the new path, effectively just removing the oldPrefix from the new path. When neither oldPrefix nor newPrefix are provided, no path transformation occurs, though system IDs can still be transformed. The previewPathPrefix request provides a way to do a dry run using the same input as this request. The preview call calculates the permissions that would change and what their new values would be, but it does not actually change those permissions as replacePathPrefix does. The input parameters are passed in the payload of this request. The response indicates the number of changed permission specifications. The path prefix replacement operation is authorized if the user@tenant in the JWT represents a tenant administrator or the Files service.
|
|
179
|
+
*/
|
|
180
|
+
replacePathPrefix(requestParameters: ReplacePathPrefixRequest, initOverrides?: RequestInit): Promise<RespChangeCount>;
|
|
181
|
+
/**
|
|
182
|
+
* Update an existing role\'s decription using a request body. The size limit on a description is 2048 characters. This request is authorized if the requestor is the role owner or an administrator.
|
|
183
|
+
*/
|
|
184
|
+
updateRoleDescriptionRaw(requestParameters: UpdateRoleDescriptionRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespBasic>>;
|
|
185
|
+
/**
|
|
186
|
+
* Update an existing role\'s decription using a request body. The size limit on a description is 2048 characters. This request is authorized if the requestor is the role owner or an administrator.
|
|
187
|
+
*/
|
|
188
|
+
updateRoleDescription(requestParameters: UpdateRoleDescriptionRequest, initOverrides?: RequestInit): Promise<RespBasic>;
|
|
189
|
+
/**
|
|
190
|
+
* Update an existing role\'s name using a request body. Role names are case sensitive, alphanumeric strings that can contain underscores but must begin with an alphabetic character. The limit on role name is 58 characters. This request is authorized if the requestor is the role owner or an administrator.
|
|
191
|
+
*/
|
|
192
|
+
updateRoleNameRaw(requestParameters: UpdateRoleNameRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespBasic>>;
|
|
193
|
+
/**
|
|
194
|
+
* Update an existing role\'s name using a request body. Role names are case sensitive, alphanumeric strings that can contain underscores but must begin with an alphabetic character. The limit on role name is 58 characters. This request is authorized if the requestor is the role owner or an administrator.
|
|
195
|
+
*/
|
|
196
|
+
updateRoleName(requestParameters: UpdateRoleNameRequest, initOverrides?: RequestInit): Promise<RespBasic>;
|
|
197
|
+
/**
|
|
198
|
+
* Update an existing role\'s owner using a request body. Required parameters in the payload are the *roleTenant*, which is the tenant of named role, and *newOwner*, which is the user to which role ownership is being transferred. The *newTenant* payload parameter is optional and only needed when the new owner resides in a different tenant than that of the current owner. This request is authorized if the requestor is the role owner or an administrator. If a new tenant is specified, then the requestor must also be allowed to act in the new tenant.
|
|
199
|
+
*/
|
|
200
|
+
updateRoleOwnerRaw(requestParameters: UpdateRoleOwnerRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespBasic>>;
|
|
201
|
+
/**
|
|
202
|
+
* Update an existing role\'s owner using a request body. Required parameters in the payload are the *roleTenant*, which is the tenant of named role, and *newOwner*, which is the user to which role ownership is being transferred. The *newTenant* payload parameter is optional and only needed when the new owner resides in a different tenant than that of the current owner. This request is authorized if the requestor is the role owner or an administrator. If a new tenant is specified, then the requestor must also be allowed to act in the new tenant.
|
|
203
|
+
*/
|
|
204
|
+
updateRoleOwner(requestParameters: UpdateRoleOwnerRequest, initOverrides?: RequestInit): Promise<RespBasic>;
|
|
205
|
+
}
|