@tapis/tapis-typescript-systems 0.0.3 → 0.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (183) hide show
  1. package/.openapi-generator/FILES +1 -0
  2. package/README.md +2 -2
  3. package/dist/apis/ChildSystemsApi.d.ts +5 -5
  4. package/dist/apis/ChildSystemsApi.js +5 -5
  5. package/dist/apis/CredentialsApi.d.ts +18 -15
  6. package/dist/apis/CredentialsApi.js +20 -17
  7. package/dist/apis/GeneralApi.d.ts +1 -1
  8. package/dist/apis/GeneralApi.js +1 -7
  9. package/dist/apis/PermissionsApi.d.ts +1 -1
  10. package/dist/apis/PermissionsApi.js +1 -1
  11. package/dist/apis/SchedulerProfilesApi.d.ts +1 -1
  12. package/dist/apis/SchedulerProfilesApi.js +1 -1
  13. package/dist/apis/SharingApi.d.ts +5 -5
  14. package/dist/apis/SharingApi.js +5 -5
  15. package/dist/apis/SystemsApi.d.ts +12 -11
  16. package/dist/apis/SystemsApi.js +14 -11
  17. package/dist/models/AuthnEnum.d.ts +1 -1
  18. package/dist/models/AuthnEnum.js +1 -1
  19. package/dist/models/Capability.d.ts +1 -1
  20. package/dist/models/Capability.js +1 -1
  21. package/dist/models/CategoryEnum.d.ts +1 -1
  22. package/dist/models/CategoryEnum.js +1 -1
  23. package/dist/models/Credential.d.ts +1 -1
  24. package/dist/models/Credential.js +1 -1
  25. package/dist/models/DatatypeEnum.d.ts +1 -1
  26. package/dist/models/DatatypeEnum.js +1 -1
  27. package/dist/models/JobRuntime.d.ts +1 -1
  28. package/dist/models/JobRuntime.js +1 -1
  29. package/dist/models/KeyValueInputModeEnum.d.ts +25 -0
  30. package/dist/models/KeyValueInputModeEnum.js +39 -0
  31. package/dist/models/KeyValuePair.d.ts +15 -2
  32. package/dist/models/KeyValuePair.js +6 -1
  33. package/dist/models/ListTypeEnum.d.ts +1 -1
  34. package/dist/models/ListTypeEnum.js +1 -1
  35. package/dist/models/LogicalQueue.d.ts +1 -1
  36. package/dist/models/LogicalQueue.js +1 -1
  37. package/dist/models/ModuleLoadSpec.d.ts +1 -1
  38. package/dist/models/ModuleLoadSpec.js +1 -1
  39. package/dist/models/OperationTypeEnum.d.ts +1 -1
  40. package/dist/models/OperationTypeEnum.js +1 -1
  41. package/dist/models/ReqMatchConstraints.d.ts +1 -1
  42. package/dist/models/ReqMatchConstraints.js +1 -1
  43. package/dist/models/ReqPatchSystem.d.ts +7 -25
  44. package/dist/models/ReqPatchSystem.js +1 -7
  45. package/dist/models/ReqPerms.d.ts +1 -1
  46. package/dist/models/ReqPerms.js +1 -1
  47. package/dist/models/ReqPostChildSystem.d.ts +4 -4
  48. package/dist/models/ReqPostChildSystem.js +1 -1
  49. package/dist/models/ReqPostPutCredential.d.ts +1 -1
  50. package/dist/models/ReqPostPutCredential.js +1 -1
  51. package/dist/models/ReqPostSchedulerProfile.d.ts +2 -2
  52. package/dist/models/ReqPostSchedulerProfile.js +1 -1
  53. package/dist/models/ReqPostSystem.d.ts +20 -38
  54. package/dist/models/ReqPostSystem.js +3 -9
  55. package/dist/models/ReqPutSystem.d.ts +11 -23
  56. package/dist/models/ReqPutSystem.js +3 -7
  57. package/dist/models/ReqSearchSystems.d.ts +1 -1
  58. package/dist/models/ReqSearchSystems.js +1 -1
  59. package/dist/models/ReqShareUpdate.d.ts +1 -1
  60. package/dist/models/ReqShareUpdate.js +1 -1
  61. package/dist/models/ReqUnlinkChildren.d.ts +1 -1
  62. package/dist/models/ReqUnlinkChildren.js +1 -1
  63. package/dist/models/ReqUpdateCredential.d.ts +1 -1
  64. package/dist/models/ReqUpdateCredential.js +1 -1
  65. package/dist/models/RespBasic.d.ts +1 -1
  66. package/dist/models/RespBasic.js +1 -1
  67. package/dist/models/RespBoolean.d.ts +1 -1
  68. package/dist/models/RespBoolean.js +1 -1
  69. package/dist/models/RespChangeCount.d.ts +1 -1
  70. package/dist/models/RespChangeCount.js +1 -1
  71. package/dist/models/RespCredential.d.ts +1 -1
  72. package/dist/models/RespCredential.js +1 -1
  73. package/dist/models/RespGlobusAuthUrl.d.ts +1 -1
  74. package/dist/models/RespGlobusAuthUrl.js +1 -1
  75. package/dist/models/RespNameArray.d.ts +1 -1
  76. package/dist/models/RespNameArray.js +1 -1
  77. package/dist/models/RespResourceUrl.d.ts +1 -1
  78. package/dist/models/RespResourceUrl.js +1 -1
  79. package/dist/models/RespSchedulerProfile.d.ts +1 -1
  80. package/dist/models/RespSchedulerProfile.js +1 -1
  81. package/dist/models/RespSchedulerProfiles.d.ts +1 -1
  82. package/dist/models/RespSchedulerProfiles.js +1 -1
  83. package/dist/models/RespShareInfo.d.ts +1 -1
  84. package/dist/models/RespShareInfo.js +1 -1
  85. package/dist/models/RespSystem.d.ts +1 -1
  86. package/dist/models/RespSystem.js +1 -1
  87. package/dist/models/RespSystemHistory.d.ts +1 -1
  88. package/dist/models/RespSystemHistory.js +1 -1
  89. package/dist/models/RespSystems.d.ts +1 -1
  90. package/dist/models/RespSystems.js +1 -1
  91. package/dist/models/RespSystemsMetadata.d.ts +1 -1
  92. package/dist/models/RespSystemsMetadata.js +1 -1
  93. package/dist/models/ResultBoolean.d.ts +1 -1
  94. package/dist/models/ResultBoolean.js +1 -1
  95. package/dist/models/ResultChangeCount.d.ts +1 -1
  96. package/dist/models/ResultChangeCount.js +1 -1
  97. package/dist/models/ResultGlobusAuthUrl.d.ts +7 -1
  98. package/dist/models/ResultGlobusAuthUrl.js +3 -1
  99. package/dist/models/ResultNameArray.d.ts +1 -1
  100. package/dist/models/ResultNameArray.js +1 -1
  101. package/dist/models/ResultResourceUrl.d.ts +1 -1
  102. package/dist/models/ResultResourceUrl.js +1 -1
  103. package/dist/models/RuntimeTypeEnum.d.ts +3 -2
  104. package/dist/models/RuntimeTypeEnum.js +2 -1
  105. package/dist/models/SchedulerHiddenOptionEnum.d.ts +1 -1
  106. package/dist/models/SchedulerHiddenOptionEnum.js +1 -1
  107. package/dist/models/SchedulerProfile.d.ts +2 -2
  108. package/dist/models/SchedulerProfile.js +1 -1
  109. package/dist/models/SchedulerTypeEnum.d.ts +1 -1
  110. package/dist/models/SchedulerTypeEnum.js +1 -1
  111. package/dist/models/ShareInfo.d.ts +1 -1
  112. package/dist/models/ShareInfo.js +1 -1
  113. package/dist/models/SystemHistory.d.ts +1 -1
  114. package/dist/models/SystemHistory.js +1 -1
  115. package/dist/models/SystemTypeEnum.d.ts +2 -2
  116. package/dist/models/SystemTypeEnum.js +2 -2
  117. package/dist/models/TapisSystem.d.ts +22 -34
  118. package/dist/models/TapisSystem.js +5 -9
  119. package/dist/models/index.d.ts +1 -0
  120. package/dist/models/index.js +1 -0
  121. package/dist/runtime.d.ts +1 -1
  122. package/dist/runtime.js +1 -1
  123. package/package.json +1 -1
  124. package/src/apis/ChildSystemsApi.ts +5 -5
  125. package/src/apis/CredentialsApi.ts +25 -17
  126. package/src/apis/GeneralApi.ts +1 -9
  127. package/src/apis/PermissionsApi.ts +1 -1
  128. package/src/apis/SchedulerProfilesApi.ts +1 -1
  129. package/src/apis/SharingApi.ts +5 -5
  130. package/src/apis/SystemsApi.ts +16 -11
  131. package/src/models/AuthnEnum.ts +1 -1
  132. package/src/models/Capability.ts +1 -1
  133. package/src/models/CategoryEnum.ts +1 -1
  134. package/src/models/Credential.ts +1 -1
  135. package/src/models/DatatypeEnum.ts +1 -1
  136. package/src/models/JobRuntime.ts +1 -1
  137. package/src/models/KeyValueInputModeEnum.ts +38 -0
  138. package/src/models/KeyValuePair.ts +25 -2
  139. package/src/models/ListTypeEnum.ts +1 -1
  140. package/src/models/LogicalQueue.ts +1 -1
  141. package/src/models/ModuleLoadSpec.ts +1 -1
  142. package/src/models/OperationTypeEnum.ts +1 -1
  143. package/src/models/ReqMatchConstraints.ts +1 -1
  144. package/src/models/ReqPatchSystem.ts +7 -31
  145. package/src/models/ReqPerms.ts +1 -1
  146. package/src/models/ReqPostChildSystem.ts +4 -4
  147. package/src/models/ReqPostPutCredential.ts +1 -1
  148. package/src/models/ReqPostSchedulerProfile.ts +2 -2
  149. package/src/models/ReqPostSystem.ts +22 -46
  150. package/src/models/ReqPutSystem.ts +13 -29
  151. package/src/models/ReqSearchSystems.ts +1 -1
  152. package/src/models/ReqShareUpdate.ts +1 -1
  153. package/src/models/ReqUnlinkChildren.ts +1 -1
  154. package/src/models/ReqUpdateCredential.ts +1 -1
  155. package/src/models/RespBasic.ts +1 -1
  156. package/src/models/RespBoolean.ts +1 -1
  157. package/src/models/RespChangeCount.ts +1 -1
  158. package/src/models/RespCredential.ts +1 -1
  159. package/src/models/RespGlobusAuthUrl.ts +1 -1
  160. package/src/models/RespNameArray.ts +1 -1
  161. package/src/models/RespResourceUrl.ts +1 -1
  162. package/src/models/RespSchedulerProfile.ts +1 -1
  163. package/src/models/RespSchedulerProfiles.ts +1 -1
  164. package/src/models/RespShareInfo.ts +1 -1
  165. package/src/models/RespSystem.ts +1 -1
  166. package/src/models/RespSystemHistory.ts +1 -1
  167. package/src/models/RespSystems.ts +1 -1
  168. package/src/models/RespSystemsMetadata.ts +1 -1
  169. package/src/models/ResultBoolean.ts +1 -1
  170. package/src/models/ResultChangeCount.ts +1 -1
  171. package/src/models/ResultGlobusAuthUrl.ts +9 -1
  172. package/src/models/ResultNameArray.ts +1 -1
  173. package/src/models/ResultResourceUrl.ts +1 -1
  174. package/src/models/RuntimeTypeEnum.ts +3 -2
  175. package/src/models/SchedulerHiddenOptionEnum.ts +1 -1
  176. package/src/models/SchedulerProfile.ts +2 -2
  177. package/src/models/SchedulerTypeEnum.ts +1 -1
  178. package/src/models/ShareInfo.ts +1 -1
  179. package/src/models/SystemHistory.ts +1 -1
  180. package/src/models/SystemTypeEnum.ts +2 -2
  181. package/src/models/TapisSystem.ts +26 -42
  182. package/src/models/index.ts +1 -0
  183. package/src/runtime.ts +1 -1
@@ -18,6 +18,7 @@ src/models/CategoryEnum.ts
18
18
  src/models/Credential.ts
19
19
  src/models/DatatypeEnum.ts
20
20
  src/models/JobRuntime.ts
21
+ src/models/KeyValueInputModeEnum.ts
21
22
  src/models/KeyValuePair.ts
22
23
  src/models/ListTypeEnum.ts
23
24
  src/models/LogicalQueue.ts
package/README.md CHANGED
@@ -1,4 +1,4 @@
1
- ## @tapis/tapis-typescript-systems@0.0.3
1
+ ## @tapis/tapis-typescript-systems@0.0.4
2
2
 
3
3
  This generator creates TypeScript/JavaScript client that utilizes [Fetch API](https://fetch.spec.whatwg.org/). The generated Node module can be used in the following environments:
4
4
 
@@ -36,7 +36,7 @@ navigate to the folder of your consuming project and run one of the following co
36
36
  _published:_
37
37
 
38
38
  ```
39
- npm install @tapis/tapis-typescript-systems@0.0.3 --save
39
+ npm install @tapis/tapis-typescript-systems@0.0.4 --save
40
40
  ```
41
41
 
42
42
  _unPublished (not recommended):_
@@ -2,7 +2,7 @@
2
2
  * Tapis Systems API
3
3
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
4
4
  *
5
- * The version of the OpenAPI document: 1.3.3
5
+ * The version of the OpenAPI document: 1.6.3
6
6
  * Contact: cicsupport@tacc.utexas.edu
7
7
  *
8
8
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -28,11 +28,11 @@ export interface UnlinkFromParentRequest {
28
28
  */
29
29
  export declare class ChildSystemsApi extends runtime.BaseAPI {
30
30
  /**
31
- * Create a child system. The child system gets all of it\'s attributes from it\'s parent except for the following fields: - *id* - *effectiveUserId* - *rootDir* - *owner* The owner will be the user who is creating the system. The caller must have read permission to the parent system.
31
+ * Create a child system based on a parent system. The child system inherits most attributes from the parent. The following fields are filled in when the child system is created: - *id* - *effectiveUserId* - *rootDir* - *owner* The owner will be the user who is creating the system. The caller must have read permission on the parent system.
32
32
  */
33
33
  createChildSystemRaw(requestParameters: CreateChildSystemRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespResourceUrl>>;
34
34
  /**
35
- * Create a child system. The child system gets all of it\'s attributes from it\'s parent except for the following fields: - *id* - *effectiveUserId* - *rootDir* - *owner* The owner will be the user who is creating the system. The caller must have read permission to the parent system.
35
+ * Create a child system based on a parent system. The child system inherits most attributes from the parent. The following fields are filled in when the child system is created: - *id* - *effectiveUserId* - *rootDir* - *owner* The owner will be the user who is creating the system. The caller must have read permission on the parent system.
36
36
  */
37
37
  createChildSystem(requestParameters: CreateChildSystemRequest, initOverrides?: RequestInit): Promise<RespResourceUrl>;
38
38
  /**
@@ -44,11 +44,11 @@ export declare class ChildSystemsApi extends runtime.BaseAPI {
44
44
  */
45
45
  unlinkChildren(requestParameters: UnlinkChildrenRequest, initOverrides?: RequestInit): Promise<RespChangeCount>;
46
46
  /**
47
- * Make a child system a standalone system. This will break the connection with it\'s parent, and from this point on, the child system will not be connected to the parent. Warning, this cannot be undone.
47
+ * Make a child system a standalone system. This will break the connection with it\'s parent. From this point on, the child system will not be connected to the parent. **WARNING** This cannot be undone.
48
48
  */
49
49
  unlinkFromParentRaw(requestParameters: UnlinkFromParentRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespChangeCount>>;
50
50
  /**
51
- * Make a child system a standalone system. This will break the connection with it\'s parent, and from this point on, the child system will not be connected to the parent. Warning, this cannot be undone.
51
+ * Make a child system a standalone system. This will break the connection with it\'s parent. From this point on, the child system will not be connected to the parent. **WARNING** This cannot be undone.
52
52
  */
53
53
  unlinkFromParent(requestParameters: UnlinkFromParentRequest, initOverrides?: RequestInit): Promise<RespChangeCount>;
54
54
  }
@@ -5,7 +5,7 @@
5
5
  * Tapis Systems API
6
6
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
7
7
  *
8
- * The version of the OpenAPI document: 1.3.3
8
+ * The version of the OpenAPI document: 1.6.3
9
9
  * Contact: cicsupport@tacc.utexas.edu
10
10
  *
11
11
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -69,7 +69,7 @@ var ChildSystemsApi = /** @class */ (function (_super) {
69
69
  return _super !== null && _super.apply(this, arguments) || this;
70
70
  }
71
71
  /**
72
- * Create a child system. The child system gets all of it\'s attributes from it\'s parent except for the following fields: - *id* - *effectiveUserId* - *rootDir* - *owner* The owner will be the user who is creating the system. The caller must have read permission to the parent system.
72
+ * Create a child system based on a parent system. The child system inherits most attributes from the parent. The following fields are filled in when the child system is created: - *id* - *effectiveUserId* - *rootDir* - *owner* The owner will be the user who is creating the system. The caller must have read permission on the parent system.
73
73
  */
74
74
  ChildSystemsApi.prototype.createChildSystemRaw = function (requestParameters, initOverrides) {
75
75
  return __awaiter(this, void 0, void 0, function () {
@@ -104,7 +104,7 @@ var ChildSystemsApi = /** @class */ (function (_super) {
104
104
  });
105
105
  };
106
106
  /**
107
- * Create a child system. The child system gets all of it\'s attributes from it\'s parent except for the following fields: - *id* - *effectiveUserId* - *rootDir* - *owner* The owner will be the user who is creating the system. The caller must have read permission to the parent system.
107
+ * Create a child system based on a parent system. The child system inherits most attributes from the parent. The following fields are filled in when the child system is created: - *id* - *effectiveUserId* - *rootDir* - *owner* The owner will be the user who is creating the system. The caller must have read permission on the parent system.
108
108
  */
109
109
  ChildSystemsApi.prototype.createChildSystem = function (requestParameters, initOverrides) {
110
110
  return __awaiter(this, void 0, void 0, function () {
@@ -173,7 +173,7 @@ var ChildSystemsApi = /** @class */ (function (_super) {
173
173
  });
174
174
  };
175
175
  /**
176
- * Make a child system a standalone system. This will break the connection with it\'s parent, and from this point on, the child system will not be connected to the parent. Warning, this cannot be undone.
176
+ * Make a child system a standalone system. This will break the connection with it\'s parent. From this point on, the child system will not be connected to the parent. **WARNING** This cannot be undone.
177
177
  */
178
178
  ChildSystemsApi.prototype.unlinkFromParentRaw = function (requestParameters, initOverrides) {
179
179
  return __awaiter(this, void 0, void 0, function () {
@@ -203,7 +203,7 @@ var ChildSystemsApi = /** @class */ (function (_super) {
203
203
  });
204
204
  };
205
205
  /**
206
- * Make a child system a standalone system. This will break the connection with it\'s parent, and from this point on, the child system will not be connected to the parent. Warning, this cannot be undone.
206
+ * Make a child system a standalone system. This will break the connection with it\'s parent. From this point on, the child system will not be connected to the parent. **WARNING** This cannot be undone.
207
207
  */
208
208
  ChildSystemsApi.prototype.unlinkFromParent = function (requestParameters, initOverrides) {
209
209
  return __awaiter(this, void 0, void 0, function () {
@@ -2,7 +2,7 @@
2
2
  * Tapis Systems API
3
3
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
4
4
  *
5
- * The version of the OpenAPI document: 1.3.3
5
+ * The version of the OpenAPI document: 1.6.3
6
6
  * Contact: cicsupport@tacc.utexas.edu
7
7
  *
8
8
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -28,6 +28,9 @@ export interface GenerateGlobusTokensRequest {
28
28
  authCode: string;
29
29
  sessionId: string;
30
30
  }
31
+ export interface GetGlobusAuthUrlRequest {
32
+ systemId: string;
33
+ }
31
34
  export interface GetUserCredentialRequest {
32
35
  systemId: string;
33
36
  userName: string;
@@ -42,55 +45,55 @@ export interface RemoveUserCredentialRequest {
42
45
  */
43
46
  export declare class CredentialsApi extends runtime.BaseAPI {
44
47
  /**
45
- * Check user credentials by connecting to the system host. Not supported for all system types. Currently supported for LINUX and S3 type systems. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and a search is made for credentials associated with *{userName}*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is ignored and a search is made for credentials associated with *effectiveUserId*. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. Desired authentication method may be specified using query parameter authnMethod=<method>. If not specified then credentials for the system\'s default authentication method are verified.
48
+ * Check user credentials by connecting to the system host. Not supported for all system types. Currently supported for LINUX and S3 type systems. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and a search is made for credentials associated with *{userName}*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Note that this would typically be the current *effectiveUserId* defined for the system, but that is not a requirement. This allows for registering and checking credentials for a login user prior to updating the system definition. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. Desired authentication method may be specified using query parameter *authnMethod*. If not specified, then credentials for the system\'s default authentication method are verified.
46
49
  */
47
50
  checkUserCredentialRaw(requestParameters: CheckUserCredentialRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespBasic>>;
48
51
  /**
49
- * Check user credentials by connecting to the system host. Not supported for all system types. Currently supported for LINUX and S3 type systems. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and a search is made for credentials associated with *{userName}*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is ignored and a search is made for credentials associated with *effectiveUserId*. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. Desired authentication method may be specified using query parameter authnMethod=<method>. If not specified then credentials for the system\'s default authentication method are verified.
52
+ * Check user credentials by connecting to the system host. Not supported for all system types. Currently supported for LINUX and S3 type systems. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and a search is made for credentials associated with *{userName}*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Note that this would typically be the current *effectiveUserId* defined for the system, but that is not a requirement. This allows for registering and checking credentials for a login user prior to updating the system definition. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. Desired authentication method may be specified using query parameter *authnMethod*. If not specified, then credentials for the system\'s default authentication method are verified.
50
53
  */
51
54
  checkUserCredential(requestParameters: CheckUserCredentialRequest, initOverrides?: RequestInit): Promise<RespBasic>;
52
55
  /**
53
- * Create or update credentials in the Security Kernel for given system and target *userName* using a request body. Credentials for multiple authentication methods may be provided. The Systems service does not store the secrets in its database, they are persisted in the Security Kernel. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and the request body may contain the optional attribute *loginUser* which will be used to map the Tapis user to a username to be used when accessing the system. If the login user is not provided then there is no mapping and the Tapis user is always used when accessing the system. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. By default credentials for LINUX and S3 type systems are verified. Use query parameter *skipCredentialCheck=true* to bypass initial credential validation.
56
+ * Create or update credentials in the Security Kernel for given system and target *userName* using a request body. Credentials for multiple authentication methods may be provided. Note that there is support for only one set of credentials per user per system. Updating credentials overwrites previously registered data. The Systems service does not store the secrets in its database, they are persisted in the Security Kernel. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and the request body may contain the optional attribute *loginUser* which will be used to map the Tapis user to a username to be used when accessing the system. If the login user is not provided then there is no mapping and the Tapis user is always used when accessing the system. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. By default credentials for LINUX and S3 type systems are verified. Use query parameter *skipCredentialCheck=true* to bypass initial credential validation.
54
57
  */
55
58
  createUserCredentialRaw(requestParameters: CreateUserCredentialRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespBasic>>;
56
59
  /**
57
- * Create or update credentials in the Security Kernel for given system and target *userName* using a request body. Credentials for multiple authentication methods may be provided. The Systems service does not store the secrets in its database, they are persisted in the Security Kernel. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and the request body may contain the optional attribute *loginUser* which will be used to map the Tapis user to a username to be used when accessing the system. If the login user is not provided then there is no mapping and the Tapis user is always used when accessing the system. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. By default credentials for LINUX and S3 type systems are verified. Use query parameter *skipCredentialCheck=true* to bypass initial credential validation.
60
+ * Create or update credentials in the Security Kernel for given system and target *userName* using a request body. Credentials for multiple authentication methods may be provided. Note that there is support for only one set of credentials per user per system. Updating credentials overwrites previously registered data. The Systems service does not store the secrets in its database, they are persisted in the Security Kernel. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and the request body may contain the optional attribute *loginUser* which will be used to map the Tapis user to a username to be used when accessing the system. If the login user is not provided then there is no mapping and the Tapis user is always used when accessing the system. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. By default credentials for LINUX and S3 type systems are verified. Use query parameter *skipCredentialCheck=true* to bypass initial credential validation.
58
61
  */
59
62
  createUserCredential(requestParameters: CreateUserCredentialRequest, initOverrides?: RequestInit): Promise<RespBasic>;
60
63
  /**
61
- * Use a Globus *Native App Authorization Code* and a Tapis session Id to generate a pair of access and refresh tokens. The Systems service will use the Tapis Security Kernel to store the tokens for the given system and user. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when a call to the getGlobusAuthUrl endpoint is made. Note that the authorization code as per Globus documentation is valid for 10 minutes.
64
+ * Use a Globus *Native App Authorization Code* and a Tapis session Id to generate a pair of access and refresh tokens. The Systems service will use the Tapis Security Kernel to store the tokens for the given system and user. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when a call to the getGlobusAuthUrl endpoint is made. The authorization code, as per Globus documentation, is valid for 10 minutes. Please note that the Tapis installation for your site must be configured by the site administrator to support systems of type GLOBUS.
62
65
  * Use a Globus authorization code + Tapis session Id to generate tokens
63
66
  */
64
67
  generateGlobusTokensRaw(requestParameters: GenerateGlobusTokensRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespBasic>>;
65
68
  /**
66
- * Use a Globus *Native App Authorization Code* and a Tapis session Id to generate a pair of access and refresh tokens. The Systems service will use the Tapis Security Kernel to store the tokens for the given system and user. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when a call to the getGlobusAuthUrl endpoint is made. Note that the authorization code as per Globus documentation is valid for 10 minutes.
69
+ * Use a Globus *Native App Authorization Code* and a Tapis session Id to generate a pair of access and refresh tokens. The Systems service will use the Tapis Security Kernel to store the tokens for the given system and user. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when a call to the getGlobusAuthUrl endpoint is made. The authorization code, as per Globus documentation, is valid for 10 minutes. Please note that the Tapis installation for your site must be configured by the site administrator to support systems of type GLOBUS.
67
70
  * Use a Globus authorization code + Tapis session Id to generate tokens
68
71
  */
69
72
  generateGlobusTokens(requestParameters: GenerateGlobusTokensRequest, initOverrides?: RequestInit): Promise<RespBasic>;
70
73
  /**
71
- * Retrieve a Globus URL + Session Id that can be used to generate an oauth2 authorization code. In Globus the code is referred to as a *Native App Authorization Code*. The host property of the system is used as the Endpoint Id. Once a user has obtained an authorization code the corresponding Systems endpoint for generating Globus tokens should be called to exchange the code + sessionId for a pair of access and refresh tokens. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when this call is made. Note that the authorization code as per Globus documentation is valid for 10 minutes.
74
+ * Retrieve a Globus URL + Session Id that can be used to generate an oauth2 authorization code associated with the given system. In Globus, the code is referred to as a *Native App Authorization Code*. The host property of the system is used as the Globus Endpoint Id or Globus Collection Id. Once a user has obtained an authorization code, the corresponding Systems endpoint for generating Globus tokens should be called to exchange the code + sessionId for a pair of access and refresh tokens. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when this call is made. The authorization code, as per Globus documentation, is valid for 10 minutes. Please note that the Tapis installation for your site must be configured by the site administrator to support systems of type GLOBUS.
72
75
  * Retrieve a Globus URL that can be used to generate an authorization code for an OAuth2 flow.
73
76
  */
74
- getGlobusAuthUrlRaw(initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespGlobusAuthUrl>>;
77
+ getGlobusAuthUrlRaw(requestParameters: GetGlobusAuthUrlRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespGlobusAuthUrl>>;
75
78
  /**
76
- * Retrieve a Globus URL + Session Id that can be used to generate an oauth2 authorization code. In Globus the code is referred to as a *Native App Authorization Code*. The host property of the system is used as the Endpoint Id. Once a user has obtained an authorization code the corresponding Systems endpoint for generating Globus tokens should be called to exchange the code + sessionId for a pair of access and refresh tokens. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when this call is made. Note that the authorization code as per Globus documentation is valid for 10 minutes.
79
+ * Retrieve a Globus URL + Session Id that can be used to generate an oauth2 authorization code associated with the given system. In Globus, the code is referred to as a *Native App Authorization Code*. The host property of the system is used as the Globus Endpoint Id or Globus Collection Id. Once a user has obtained an authorization code, the corresponding Systems endpoint for generating Globus tokens should be called to exchange the code + sessionId for a pair of access and refresh tokens. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when this call is made. The authorization code, as per Globus documentation, is valid for 10 minutes. Please note that the Tapis installation for your site must be configured by the site administrator to support systems of type GLOBUS.
77
80
  * Retrieve a Globus URL that can be used to generate an authorization code for an OAuth2 flow.
78
81
  */
79
- getGlobusAuthUrl(initOverrides?: RequestInit): Promise<RespGlobusAuthUrl>;
82
+ getGlobusAuthUrl(requestParameters: GetGlobusAuthUrlRequest, initOverrides?: RequestInit): Promise<RespGlobusAuthUrl>;
80
83
  /**
81
- * Restricted. Only certain Tapis services authorized. Retrieve credentials for given system, target *userName* and authentication method. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user. Note that their may me a mapping of the Tapis user to a host *loginUser*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the host *loginUser* that is used when accessing the host. Desired authentication method may be specified using query parameter authnMethod=<method>. If desired authentication method not specified then credentials for the system\'s default authentication method are returned. The result includes the attribute *authnMethod* indicating the authentication method associated with the returned credentials.
84
+ * Restricted. Only certain Tapis services authorized. Retrieve credentials for given system, target *userName* and authentication method. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user. Note that there may me a mapping of the Tapis user to a host *loginUser*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the host *loginUser* that is used when accessing the host. Desired authentication method may be specified using query parameter *authnMethod*. If desired authentication method not specified then credentials for the system\'s default authentication method are returned. The result includes the attribute *authnMethod* indicating the authentication method associated with the returned credentials.
82
85
  */
83
86
  getUserCredentialRaw(requestParameters: GetUserCredentialRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespCredential>>;
84
87
  /**
85
- * Restricted. Only certain Tapis services authorized. Retrieve credentials for given system, target *userName* and authentication method. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user. Note that their may me a mapping of the Tapis user to a host *loginUser*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the host *loginUser* that is used when accessing the host. Desired authentication method may be specified using query parameter authnMethod=<method>. If desired authentication method not specified then credentials for the system\'s default authentication method are returned. The result includes the attribute *authnMethod* indicating the authentication method associated with the returned credentials.
88
+ * Restricted. Only certain Tapis services authorized. Retrieve credentials for given system, target *userName* and authentication method. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user. Note that there may me a mapping of the Tapis user to a host *loginUser*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the host *loginUser* that is used when accessing the host. Desired authentication method may be specified using query parameter *authnMethod*. If desired authentication method not specified then credentials for the system\'s default authentication method are returned. The result includes the attribute *authnMethod* indicating the authentication method associated with the returned credentials.
86
89
  */
87
90
  getUserCredential(requestParameters: GetUserCredentialRequest, initOverrides?: RequestInit): Promise<RespCredential>;
88
91
  /**
89
- * Remove credentials from the Security Kernel for given system and *target user*. Requester must be owner of the system. Operation is allowed if requester the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request.
92
+ * Remove credentials from the Security Kernel for given system and *target user*. Requester must be owner of the system. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request.
90
93
  */
91
94
  removeUserCredentialRaw(requestParameters: RemoveUserCredentialRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespBasic>>;
92
95
  /**
93
- * Remove credentials from the Security Kernel for given system and *target user*. Requester must be owner of the system. Operation is allowed if requester the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request.
96
+ * Remove credentials from the Security Kernel for given system and *target user*. Requester must be owner of the system. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request.
94
97
  */
95
98
  removeUserCredential(requestParameters: RemoveUserCredentialRequest, initOverrides?: RequestInit): Promise<RespBasic>;
96
99
  }
@@ -5,7 +5,7 @@
5
5
  * Tapis Systems API
6
6
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
7
7
  *
8
- * The version of the OpenAPI document: 1.3.3
8
+ * The version of the OpenAPI document: 1.6.3
9
9
  * Contact: cicsupport@tacc.utexas.edu
10
10
  *
11
11
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -69,7 +69,7 @@ var CredentialsApi = /** @class */ (function (_super) {
69
69
  return _super !== null && _super.apply(this, arguments) || this;
70
70
  }
71
71
  /**
72
- * Check user credentials by connecting to the system host. Not supported for all system types. Currently supported for LINUX and S3 type systems. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and a search is made for credentials associated with *{userName}*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is ignored and a search is made for credentials associated with *effectiveUserId*. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. Desired authentication method may be specified using query parameter authnMethod=<method>. If not specified then credentials for the system\'s default authentication method are verified.
72
+ * Check user credentials by connecting to the system host. Not supported for all system types. Currently supported for LINUX and S3 type systems. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and a search is made for credentials associated with *{userName}*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Note that this would typically be the current *effectiveUserId* defined for the system, but that is not a requirement. This allows for registering and checking credentials for a login user prior to updating the system definition. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. Desired authentication method may be specified using query parameter *authnMethod*. If not specified, then credentials for the system\'s default authentication method are verified.
73
73
  */
74
74
  CredentialsApi.prototype.checkUserCredentialRaw = function (requestParameters, initOverrides) {
75
75
  return __awaiter(this, void 0, void 0, function () {
@@ -105,7 +105,7 @@ var CredentialsApi = /** @class */ (function (_super) {
105
105
  });
106
106
  };
107
107
  /**
108
- * Check user credentials by connecting to the system host. Not supported for all system types. Currently supported for LINUX and S3 type systems. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and a search is made for credentials associated with *{userName}*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is ignored and a search is made for credentials associated with *effectiveUserId*. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. Desired authentication method may be specified using query parameter authnMethod=<method>. If not specified then credentials for the system\'s default authentication method are verified.
108
+ * Check user credentials by connecting to the system host. Not supported for all system types. Currently supported for LINUX and S3 type systems. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and a search is made for credentials associated with *{userName}*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Note that this would typically be the current *effectiveUserId* defined for the system, but that is not a requirement. This allows for registering and checking credentials for a login user prior to updating the system definition. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. Desired authentication method may be specified using query parameter *authnMethod*. If not specified, then credentials for the system\'s default authentication method are verified.
109
109
  */
110
110
  CredentialsApi.prototype.checkUserCredential = function (requestParameters, initOverrides) {
111
111
  return __awaiter(this, void 0, void 0, function () {
@@ -122,7 +122,7 @@ var CredentialsApi = /** @class */ (function (_super) {
122
122
  });
123
123
  };
124
124
  /**
125
- * Create or update credentials in the Security Kernel for given system and target *userName* using a request body. Credentials for multiple authentication methods may be provided. The Systems service does not store the secrets in its database, they are persisted in the Security Kernel. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and the request body may contain the optional attribute *loginUser* which will be used to map the Tapis user to a username to be used when accessing the system. If the login user is not provided then there is no mapping and the Tapis user is always used when accessing the system. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. By default credentials for LINUX and S3 type systems are verified. Use query parameter *skipCredentialCheck=true* to bypass initial credential validation.
125
+ * Create or update credentials in the Security Kernel for given system and target *userName* using a request body. Credentials for multiple authentication methods may be provided. Note that there is support for only one set of credentials per user per system. Updating credentials overwrites previously registered data. The Systems service does not store the secrets in its database, they are persisted in the Security Kernel. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and the request body may contain the optional attribute *loginUser* which will be used to map the Tapis user to a username to be used when accessing the system. If the login user is not provided then there is no mapping and the Tapis user is always used when accessing the system. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. By default credentials for LINUX and S3 type systems are verified. Use query parameter *skipCredentialCheck=true* to bypass initial credential validation.
126
126
  */
127
127
  CredentialsApi.prototype.createUserCredentialRaw = function (requestParameters, initOverrides) {
128
128
  return __awaiter(this, void 0, void 0, function () {
@@ -163,7 +163,7 @@ var CredentialsApi = /** @class */ (function (_super) {
163
163
  });
164
164
  };
165
165
  /**
166
- * Create or update credentials in the Security Kernel for given system and target *userName* using a request body. Credentials for multiple authentication methods may be provided. The Systems service does not store the secrets in its database, they are persisted in the Security Kernel. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and the request body may contain the optional attribute *loginUser* which will be used to map the Tapis user to a username to be used when accessing the system. If the login user is not provided then there is no mapping and the Tapis user is always used when accessing the system. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. By default credentials for LINUX and S3 type systems are verified. Use query parameter *skipCredentialCheck=true* to bypass initial credential validation.
166
+ * Create or update credentials in the Security Kernel for given system and target *userName* using a request body. Credentials for multiple authentication methods may be provided. Note that there is support for only one set of credentials per user per system. Updating credentials overwrites previously registered data. The Systems service does not store the secrets in its database, they are persisted in the Security Kernel. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user and the request body may contain the optional attribute *loginUser* which will be used to map the Tapis user to a username to be used when accessing the system. If the login user is not provided then there is no mapping and the Tapis user is always used when accessing the system. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the login user to be used when accessing the host. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request. By default credentials for LINUX and S3 type systems are verified. Use query parameter *skipCredentialCheck=true* to bypass initial credential validation.
167
167
  */
168
168
  CredentialsApi.prototype.createUserCredential = function (requestParameters, initOverrides) {
169
169
  return __awaiter(this, void 0, void 0, function () {
@@ -180,7 +180,7 @@ var CredentialsApi = /** @class */ (function (_super) {
180
180
  });
181
181
  };
182
182
  /**
183
- * Use a Globus *Native App Authorization Code* and a Tapis session Id to generate a pair of access and refresh tokens. The Systems service will use the Tapis Security Kernel to store the tokens for the given system and user. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when a call to the getGlobusAuthUrl endpoint is made. Note that the authorization code as per Globus documentation is valid for 10 minutes.
183
+ * Use a Globus *Native App Authorization Code* and a Tapis session Id to generate a pair of access and refresh tokens. The Systems service will use the Tapis Security Kernel to store the tokens for the given system and user. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when a call to the getGlobusAuthUrl endpoint is made. The authorization code, as per Globus documentation, is valid for 10 minutes. Please note that the Tapis installation for your site must be configured by the site administrator to support systems of type GLOBUS.
184
184
  * Use a Globus authorization code + Tapis session Id to generate tokens
185
185
  */
186
186
  CredentialsApi.prototype.generateGlobusTokensRaw = function (requestParameters, initOverrides) {
@@ -220,7 +220,7 @@ var CredentialsApi = /** @class */ (function (_super) {
220
220
  });
221
221
  };
222
222
  /**
223
- * Use a Globus *Native App Authorization Code* and a Tapis session Id to generate a pair of access and refresh tokens. The Systems service will use the Tapis Security Kernel to store the tokens for the given system and user. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when a call to the getGlobusAuthUrl endpoint is made. Note that the authorization code as per Globus documentation is valid for 10 minutes.
223
+ * Use a Globus *Native App Authorization Code* and a Tapis session Id to generate a pair of access and refresh tokens. The Systems service will use the Tapis Security Kernel to store the tokens for the given system and user. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when a call to the getGlobusAuthUrl endpoint is made. The authorization code, as per Globus documentation, is valid for 10 minutes. Please note that the Tapis installation for your site must be configured by the site administrator to support systems of type GLOBUS.
224
224
  * Use a Globus authorization code + Tapis session Id to generate tokens
225
225
  */
226
226
  CredentialsApi.prototype.generateGlobusTokens = function (requestParameters, initOverrides) {
@@ -238,22 +238,25 @@ var CredentialsApi = /** @class */ (function (_super) {
238
238
  });
239
239
  };
240
240
  /**
241
- * Retrieve a Globus URL + Session Id that can be used to generate an oauth2 authorization code. In Globus the code is referred to as a *Native App Authorization Code*. The host property of the system is used as the Endpoint Id. Once a user has obtained an authorization code the corresponding Systems endpoint for generating Globus tokens should be called to exchange the code + sessionId for a pair of access and refresh tokens. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when this call is made. Note that the authorization code as per Globus documentation is valid for 10 minutes.
241
+ * Retrieve a Globus URL + Session Id that can be used to generate an oauth2 authorization code associated with the given system. In Globus, the code is referred to as a *Native App Authorization Code*. The host property of the system is used as the Globus Endpoint Id or Globus Collection Id. Once a user has obtained an authorization code, the corresponding Systems endpoint for generating Globus tokens should be called to exchange the code + sessionId for a pair of access and refresh tokens. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when this call is made. The authorization code, as per Globus documentation, is valid for 10 minutes. Please note that the Tapis installation for your site must be configured by the site administrator to support systems of type GLOBUS.
242
242
  * Retrieve a Globus URL that can be used to generate an authorization code for an OAuth2 flow.
243
243
  */
244
- CredentialsApi.prototype.getGlobusAuthUrlRaw = function (initOverrides) {
244
+ CredentialsApi.prototype.getGlobusAuthUrlRaw = function (requestParameters, initOverrides) {
245
245
  return __awaiter(this, void 0, void 0, function () {
246
246
  var queryParameters, headerParameters, response;
247
247
  return __generator(this, function (_a) {
248
248
  switch (_a.label) {
249
249
  case 0:
250
+ if (requestParameters.systemId === null || requestParameters.systemId === undefined) {
251
+ throw new runtime.RequiredError('systemId', 'Required parameter requestParameters.systemId was null or undefined when calling getGlobusAuthUrl.');
252
+ }
250
253
  queryParameters = {};
251
254
  headerParameters = {};
252
255
  if (this.configuration && this.configuration.apiKey) {
253
256
  headerParameters["X-Tapis-Token"] = this.configuration.apiKey("X-Tapis-Token"); // TapisJWT authentication
254
257
  }
255
258
  return [4 /*yield*/, this.request({
256
- path: "/v3/systems/credential/globus/authUrl",
259
+ path: "/v3/systems/credential/{systemId}/globus/authUrl".replace("{" + "systemId" + "}", encodeURIComponent(String(requestParameters.systemId))),
257
260
  method: 'GET',
258
261
  headers: headerParameters,
259
262
  query: queryParameters,
@@ -266,15 +269,15 @@ var CredentialsApi = /** @class */ (function (_super) {
266
269
  });
267
270
  };
268
271
  /**
269
- * Retrieve a Globus URL + Session Id that can be used to generate an oauth2 authorization code. In Globus the code is referred to as a *Native App Authorization Code*. The host property of the system is used as the Endpoint Id. Once a user has obtained an authorization code the corresponding Systems endpoint for generating Globus tokens should be called to exchange the code + sessionId for a pair of access and refresh tokens. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when this call is made. Note that the authorization code as per Globus documentation is valid for 10 minutes.
272
+ * Retrieve a Globus URL + Session Id that can be used to generate an oauth2 authorization code associated with the given system. In Globus, the code is referred to as a *Native App Authorization Code*. The host property of the system is used as the Globus Endpoint Id or Globus Collection Id. Once a user has obtained an authorization code, the corresponding Systems endpoint for generating Globus tokens should be called to exchange the code + sessionId for a pair of access and refresh tokens. The session Id is a Tapis Id that is used to track the oauth2 flow that is started when this call is made. The authorization code, as per Globus documentation, is valid for 10 minutes. Please note that the Tapis installation for your site must be configured by the site administrator to support systems of type GLOBUS.
270
273
  * Retrieve a Globus URL that can be used to generate an authorization code for an OAuth2 flow.
271
274
  */
272
- CredentialsApi.prototype.getGlobusAuthUrl = function (initOverrides) {
275
+ CredentialsApi.prototype.getGlobusAuthUrl = function (requestParameters, initOverrides) {
273
276
  return __awaiter(this, void 0, void 0, function () {
274
277
  var response;
275
278
  return __generator(this, function (_a) {
276
279
  switch (_a.label) {
277
- case 0: return [4 /*yield*/, this.getGlobusAuthUrlRaw(initOverrides)];
280
+ case 0: return [4 /*yield*/, this.getGlobusAuthUrlRaw(requestParameters, initOverrides)];
278
281
  case 1:
279
282
  response = _a.sent();
280
283
  return [4 /*yield*/, response.value()];
@@ -284,7 +287,7 @@ var CredentialsApi = /** @class */ (function (_super) {
284
287
  });
285
288
  };
286
289
  /**
287
- * Restricted. Only certain Tapis services authorized. Retrieve credentials for given system, target *userName* and authentication method. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user. Note that their may me a mapping of the Tapis user to a host *loginUser*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the host *loginUser* that is used when accessing the host. Desired authentication method may be specified using query parameter authnMethod=<method>. If desired authentication method not specified then credentials for the system\'s default authentication method are returned. The result includes the attribute *authnMethod* indicating the authentication method associated with the returned credentials.
290
+ * Restricted. Only certain Tapis services authorized. Retrieve credentials for given system, target *userName* and authentication method. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user. Note that there may me a mapping of the Tapis user to a host *loginUser*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the host *loginUser* that is used when accessing the host. Desired authentication method may be specified using query parameter *authnMethod*. If desired authentication method not specified then credentials for the system\'s default authentication method are returned. The result includes the attribute *authnMethod* indicating the authentication method associated with the returned credentials.
288
291
  */
289
292
  CredentialsApi.prototype.getUserCredentialRaw = function (requestParameters, initOverrides) {
290
293
  return __awaiter(this, void 0, void 0, function () {
@@ -320,7 +323,7 @@ var CredentialsApi = /** @class */ (function (_super) {
320
323
  });
321
324
  };
322
325
  /**
323
- * Restricted. Only certain Tapis services authorized. Retrieve credentials for given system, target *userName* and authentication method. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user. Note that their may me a mapping of the Tapis user to a host *loginUser*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the host *loginUser* that is used when accessing the host. Desired authentication method may be specified using query parameter authnMethod=<method>. If desired authentication method not specified then credentials for the system\'s default authentication method are returned. The result includes the attribute *authnMethod* indicating the authentication method associated with the returned credentials.
326
+ * Restricted. Only certain Tapis services authorized. Retrieve credentials for given system, target *userName* and authentication method. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then *{userName}* is interpreted as a Tapis user. Note that there may me a mapping of the Tapis user to a host *loginUser*. If the *effectiveUserId* for the system is static (i.e. not *${apiUserId}*) then *{userName}* is interpreted as the host *loginUser* that is used when accessing the host. Desired authentication method may be specified using query parameter *authnMethod*. If desired authentication method not specified then credentials for the system\'s default authentication method are returned. The result includes the attribute *authnMethod* indicating the authentication method associated with the returned credentials.
324
327
  */
325
328
  CredentialsApi.prototype.getUserCredential = function (requestParameters, initOverrides) {
326
329
  return __awaiter(this, void 0, void 0, function () {
@@ -337,7 +340,7 @@ var CredentialsApi = /** @class */ (function (_super) {
337
340
  });
338
341
  };
339
342
  /**
340
- * Remove credentials from the Security Kernel for given system and *target user*. Requester must be owner of the system. Operation is allowed if requester the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request.
343
+ * Remove credentials from the Security Kernel for given system and *target user*. Requester must be owner of the system. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request.
341
344
  */
342
345
  CredentialsApi.prototype.removeUserCredentialRaw = function (requestParameters, initOverrides) {
343
346
  return __awaiter(this, void 0, void 0, function () {
@@ -370,7 +373,7 @@ var CredentialsApi = /** @class */ (function (_super) {
370
373
  });
371
374
  };
372
375
  /**
373
- * Remove credentials from the Security Kernel for given system and *target user*. Requester must be owner of the system. Operation is allowed if requester the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request.
376
+ * Remove credentials from the Security Kernel for given system and *target user*. Requester must be owner of the system. Operation is allowed if requester is the system owner or a tenant administrator. If the *effectiveUserId* for the system is dynamic (i.e. equal to *${apiUserId}*) then the operation is allowed if *{userName}* is the Tapis user making the request.
374
377
  */
375
378
  CredentialsApi.prototype.removeUserCredential = function (requestParameters, initOverrides) {
376
379
  return __awaiter(this, void 0, void 0, function () {
@@ -2,7 +2,7 @@
2
2
  * Tapis Systems API
3
3
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
4
4
  *
5
- * The version of the OpenAPI document: 1.3.3
5
+ * The version of the OpenAPI document: 1.6.3
6
6
  * Contact: cicsupport@tacc.utexas.edu
7
7
  *
8
8
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -5,7 +5,7 @@
5
5
  * Tapis Systems API
6
6
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
7
7
  *
8
- * The version of the OpenAPI document: 1.3.3
8
+ * The version of the OpenAPI document: 1.6.3
9
9
  * Contact: cicsupport@tacc.utexas.edu
10
10
  *
11
11
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -79,9 +79,6 @@ var GeneralApi = /** @class */ (function (_super) {
79
79
  case 0:
80
80
  queryParameters = {};
81
81
  headerParameters = {};
82
- if (this.configuration && this.configuration.apiKey) {
83
- headerParameters["X-Tapis-Token"] = this.configuration.apiKey("X-Tapis-Token"); // TapisJWT authentication
84
- }
85
82
  return [4 /*yield*/, this.request({
86
83
  path: "/v3/systems/healthcheck",
87
84
  method: 'GET',
@@ -123,9 +120,6 @@ var GeneralApi = /** @class */ (function (_super) {
123
120
  case 0:
124
121
  queryParameters = {};
125
122
  headerParameters = {};
126
- if (this.configuration && this.configuration.apiKey) {
127
- headerParameters["X-Tapis-Token"] = this.configuration.apiKey("X-Tapis-Token"); // TapisJWT authentication
128
- }
129
123
  return [4 /*yield*/, this.request({
130
124
  path: "/v3/systems/readycheck",
131
125
  method: 'GET',
@@ -2,7 +2,7 @@
2
2
  * Tapis Systems API
3
3
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
4
4
  *
5
- * The version of the OpenAPI document: 1.3.3
5
+ * The version of the OpenAPI document: 1.6.3
6
6
  * Contact: cicsupport@tacc.utexas.edu
7
7
  *
8
8
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -5,7 +5,7 @@
5
5
  * Tapis Systems API
6
6
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
7
7
  *
8
- * The version of the OpenAPI document: 1.3.3
8
+ * The version of the OpenAPI document: 1.6.3
9
9
  * Contact: cicsupport@tacc.utexas.edu
10
10
  *
11
11
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -2,7 +2,7 @@
2
2
  * Tapis Systems API
3
3
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
4
4
  *
5
- * The version of the OpenAPI document: 1.3.3
5
+ * The version of the OpenAPI document: 1.6.3
6
6
  * Contact: cicsupport@tacc.utexas.edu
7
7
  *
8
8
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -5,7 +5,7 @@
5
5
  * Tapis Systems API
6
6
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
7
7
  *
8
- * The version of the OpenAPI document: 1.3.3
8
+ * The version of the OpenAPI document: 1.6.3
9
9
  * Contact: cicsupport@tacc.utexas.edu
10
10
  *
11
11
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -2,7 +2,7 @@
2
2
  * Tapis Systems API
3
3
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
4
4
  *
5
- * The version of the OpenAPI document: 1.3.3
5
+ * The version of the OpenAPI document: 1.6.3
6
6
  * Contact: cicsupport@tacc.utexas.edu
7
7
  *
8
8
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -43,22 +43,22 @@ export declare class SharingApi extends runtime.BaseAPI {
43
43
  */
44
44
  getShareInfo(requestParameters: GetShareInfoRequest, initOverrides?: RequestInit): Promise<RespShareInfo>;
45
45
  /**
46
- * Create or update sharing information for a system. The system will be shared with the list of users provided in the request body. Sharing allows READ and EXECUTE access. Requester must be owner of the system.
46
+ * Create or update sharing information for a system. The system will be shared with the list of users provided in the request body. Sharing allows READ and EXECUTE access. When the system has a dynamic *effectiveUserId*, sharing also allows for MODIFY access to all paths for calls made through the Files service. Requester must be owner of the system.
47
47
  * Share a system with one or more users.
48
48
  */
49
49
  shareSystemRaw(requestParameters: ShareSystemRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespBasic>>;
50
50
  /**
51
- * Create or update sharing information for a system. The system will be shared with the list of users provided in the request body. Sharing allows READ and EXECUTE access. Requester must be owner of the system.
51
+ * Create or update sharing information for a system. The system will be shared with the list of users provided in the request body. Sharing allows READ and EXECUTE access. When the system has a dynamic *effectiveUserId*, sharing also allows for MODIFY access to all paths for calls made through the Files service. Requester must be owner of the system.
52
52
  * Share a system with one or more users.
53
53
  */
54
54
  shareSystem(requestParameters: ShareSystemRequest, initOverrides?: RequestInit): Promise<RespBasic>;
55
55
  /**
56
- * Share a system with all users in the tenant. Sharing allows READ and EXECUTE access. Requester must be owner of the system.
56
+ * Share a system with all users in the tenant. Sharing allows READ and EXECUTE access. When the system has a dynamic *effectiveUserId*, sharing also allows for MODIFY access to all paths for calls made through the Files service. Requester must be owner of the system.
57
57
  * Share a system publicly with all users in the tenant.
58
58
  */
59
59
  shareSystemPublicRaw(requestParameters: ShareSystemPublicRequest, initOverrides?: RequestInit): Promise<runtime.ApiResponse<RespBasic>>;
60
60
  /**
61
- * Share a system with all users in the tenant. Sharing allows READ and EXECUTE access. Requester must be owner of the system.
61
+ * Share a system with all users in the tenant. Sharing allows READ and EXECUTE access. When the system has a dynamic *effectiveUserId*, sharing also allows for MODIFY access to all paths for calls made through the Files service. Requester must be owner of the system.
62
62
  * Share a system publicly with all users in the tenant.
63
63
  */
64
64
  shareSystemPublic(requestParameters: ShareSystemPublicRequest, initOverrides?: RequestInit): Promise<RespBasic>;
@@ -5,7 +5,7 @@
5
5
  * Tapis Systems API
6
6
  * The Tapis Systems API provides for management of Tapis Systems including permissions, credentials and Scheduler Profiles.
7
7
  *
8
- * The version of the OpenAPI document: 1.3.3
8
+ * The version of the OpenAPI document: 1.6.3
9
9
  * Contact: cicsupport@tacc.utexas.edu
10
10
  *
11
11
  * NOTE: This class is auto generated by OpenAPI Generator (https://openapi-generator.tech).
@@ -118,7 +118,7 @@ var SharingApi = /** @class */ (function (_super) {
118
118
  });
119
119
  };
120
120
  /**
121
- * Create or update sharing information for a system. The system will be shared with the list of users provided in the request body. Sharing allows READ and EXECUTE access. Requester must be owner of the system.
121
+ * Create or update sharing information for a system. The system will be shared with the list of users provided in the request body. Sharing allows READ and EXECUTE access. When the system has a dynamic *effectiveUserId*, sharing also allows for MODIFY access to all paths for calls made through the Files service. Requester must be owner of the system.
122
122
  * Share a system with one or more users.
123
123
  */
124
124
  SharingApi.prototype.shareSystemRaw = function (requestParameters, initOverrides) {
@@ -154,7 +154,7 @@ var SharingApi = /** @class */ (function (_super) {
154
154
  });
155
155
  };
156
156
  /**
157
- * Create or update sharing information for a system. The system will be shared with the list of users provided in the request body. Sharing allows READ and EXECUTE access. Requester must be owner of the system.
157
+ * Create or update sharing information for a system. The system will be shared with the list of users provided in the request body. Sharing allows READ and EXECUTE access. When the system has a dynamic *effectiveUserId*, sharing also allows for MODIFY access to all paths for calls made through the Files service. Requester must be owner of the system.
158
158
  * Share a system with one or more users.
159
159
  */
160
160
  SharingApi.prototype.shareSystem = function (requestParameters, initOverrides) {
@@ -172,7 +172,7 @@ var SharingApi = /** @class */ (function (_super) {
172
172
  });
173
173
  };
174
174
  /**
175
- * Share a system with all users in the tenant. Sharing allows READ and EXECUTE access. Requester must be owner of the system.
175
+ * Share a system with all users in the tenant. Sharing allows READ and EXECUTE access. When the system has a dynamic *effectiveUserId*, sharing also allows for MODIFY access to all paths for calls made through the Files service. Requester must be owner of the system.
176
176
  * Share a system publicly with all users in the tenant.
177
177
  */
178
178
  SharingApi.prototype.shareSystemPublicRaw = function (requestParameters, initOverrides) {
@@ -203,7 +203,7 @@ var SharingApi = /** @class */ (function (_super) {
203
203
  });
204
204
  };
205
205
  /**
206
- * Share a system with all users in the tenant. Sharing allows READ and EXECUTE access. Requester must be owner of the system.
206
+ * Share a system with all users in the tenant. Sharing allows READ and EXECUTE access. When the system has a dynamic *effectiveUserId*, sharing also allows for MODIFY access to all paths for calls made through the Files service. Requester must be owner of the system.
207
207
  * Share a system publicly with all users in the tenant.
208
208
  */
209
209
  SharingApi.prototype.shareSystemPublic = function (requestParameters, initOverrides) {