@thelllabs/winehaus-sdk 0.0.23 → 0.0.24

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -314,6 +314,20 @@ var Api = /** @class */ (function (_super) {
314
314
  if (params === void 0) { params = {}; }
315
315
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/requests/").concat(requestId, "/cancel"), method: "PATCH", body: data, secure: true, type: ContentType.Json }, params));
316
316
  },
317
+ /**
318
+ * No description
319
+ *
320
+ * @tags Tenant Storage Plans
321
+ * @name CreateTenantStoragePlan
322
+ * @request POST:/tenants/{tenantId}/storage-plans
323
+ * @secure
324
+ * @response `201` `StoragePlanEntityDto`
325
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
326
+ */
327
+ createTenantStoragePlan: function (tenantId, data, params) {
328
+ if (params === void 0) { params = {}; }
329
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans"), method: "POST", body: data, secure: true, type: ContentType.Json, format: "json" }, params));
330
+ },
317
331
  /**
318
332
  * No description
319
333
  *
@@ -321,7 +335,7 @@ var Api = /** @class */ (function (_super) {
321
335
  * @name CreateTenantUser
322
336
  * @request POST:/tenants/{tenantId}/users
323
337
  * @secure
324
- * @response `200` `UserEntityDto`
338
+ * @response `201` `UserEntityDto`
325
339
  * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
326
340
  */
327
341
  createTenantUser: function (tenantId, data, params) {
@@ -342,6 +356,20 @@ var Api = /** @class */ (function (_super) {
342
356
  if (params === void 0) { params = {}; }
343
357
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/addresses"), method: "POST", body: data, secure: true, type: ContentType.Json, format: "json" }, params));
344
358
  },
359
+ /**
360
+ * No description
361
+ *
362
+ * @tags Tenant Storage Plans
363
+ * @name DeleteTenantStoragePlan
364
+ * @request DELETE:/tenants/{tenantId}/storage-plans/{id}
365
+ * @secure
366
+ * @response `204` `void`
367
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
368
+ */
369
+ deleteTenantStoragePlan: function (tenantId, id, params) {
370
+ if (params === void 0) { params = {}; }
371
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans/").concat(id), method: "DELETE", secure: true }, params));
372
+ },
345
373
  /**
346
374
  * No description
347
375
  *
@@ -384,6 +412,20 @@ var Api = /** @class */ (function (_super) {
384
412
  if (params === void 0) { params = {}; }
385
413
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/disable"), method: "PATCH", secure: true }, params));
386
414
  },
415
+ /**
416
+ * No description
417
+ *
418
+ * @tags Tenant Invoices Management
419
+ * @name DispatchTenantInvoicesGeneration
420
+ * @request PATCH:/tenants/{tenantId}/invoices
421
+ * @secure
422
+ * @response `204` `void`
423
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
424
+ */
425
+ dispatchTenantInvoicesGeneration: function (tenantId, data, params) {
426
+ if (params === void 0) { params = {}; }
427
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/invoices"), method: "PATCH", body: data, secure: true, type: ContentType.Json }, params));
428
+ },
387
429
  /**
388
430
  * No description
389
431
  *
@@ -398,6 +440,20 @@ var Api = /** @class */ (function (_super) {
398
440
  if (params === void 0) { params = {}; }
399
441
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/enable"), method: "PATCH", secure: true }, params));
400
442
  },
443
+ /**
444
+ * No description
445
+ *
446
+ * @tags Tenant Storage Plans
447
+ * @name GetTenantStoragePlan
448
+ * @request GET:/tenants/{tenantId}/storage-plans/{id}
449
+ * @secure
450
+ * @response `200` `StoragePlanEntityDto`
451
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin, operator
452
+ */
453
+ getTenantStoragePlan: function (tenantId, id, params) {
454
+ if (params === void 0) { params = {}; }
455
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans/").concat(id), method: "GET", secure: true, format: "json" }, params));
456
+ },
401
457
  /**
402
458
  * No description
403
459
  *
@@ -440,6 +496,20 @@ var Api = /** @class */ (function (_super) {
440
496
  if (params === void 0) { params = {}; }
441
497
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/requests/").concat(requestId), method: "GET", secure: true, format: "json" }, params));
442
498
  },
499
+ /**
500
+ * No description
501
+ *
502
+ * @tags Tenant Storage Plans
503
+ * @name ListTenantStoragePlans
504
+ * @request GET:/tenants/{tenantId}/storage-plans
505
+ * @secure
506
+ * @response `200` `StoragePlanEntityPaginatedDto`
507
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin, operator
508
+ */
509
+ listTenantStoragePlans: function (tenantId, query, params) {
510
+ if (params === void 0) { params = {}; }
511
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans"), method: "GET", query: query, secure: true, format: "json" }, params));
512
+ },
443
513
  /**
444
514
  * No description
445
515
  *
@@ -552,6 +622,20 @@ var Api = /** @class */ (function (_super) {
552
622
  if (params === void 0) { params = {}; }
553
623
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/notifications/batch-set-read"), method: "PATCH", body: data, secure: true, type: ContentType.Json }, params));
554
624
  },
625
+ /**
626
+ * No description
627
+ *
628
+ * @tags Tenant Storage Plans
629
+ * @name UpdateTenantStoragePlan
630
+ * @request PATCH:/tenants/{tenantId}/storage-plans/{id}
631
+ * @secure
632
+ * @response `200` `StoragePlanEntityDto`
633
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
634
+ */
635
+ updateTenantStoragePlan: function (tenantId, id, data, params) {
636
+ if (params === void 0) { params = {}; }
637
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans/").concat(id), method: "PATCH", body: data, secure: true, type: ContentType.Json, format: "json" }, params));
638
+ },
555
639
  /**
556
640
  * No description
557
641
  *
@@ -308,6 +308,20 @@ var Api = /** @class */ (function (_super) {
308
308
  if (params === void 0) { params = {}; }
309
309
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/requests/").concat(requestId, "/cancel"), method: "PATCH", body: data, secure: true, type: ContentType.Json }, params));
310
310
  },
311
+ /**
312
+ * No description
313
+ *
314
+ * @tags Tenant Storage Plans
315
+ * @name CreateTenantStoragePlan
316
+ * @request POST:/tenants/{tenantId}/storage-plans
317
+ * @secure
318
+ * @response `201` `StoragePlanEntityDto`
319
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
320
+ */
321
+ createTenantStoragePlan: function (tenantId, data, params) {
322
+ if (params === void 0) { params = {}; }
323
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans"), method: "POST", body: data, secure: true, type: ContentType.Json, format: "json" }, params));
324
+ },
311
325
  /**
312
326
  * No description
313
327
  *
@@ -315,7 +329,7 @@ var Api = /** @class */ (function (_super) {
315
329
  * @name CreateTenantUser
316
330
  * @request POST:/tenants/{tenantId}/users
317
331
  * @secure
318
- * @response `200` `UserEntityDto`
332
+ * @response `201` `UserEntityDto`
319
333
  * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
320
334
  */
321
335
  createTenantUser: function (tenantId, data, params) {
@@ -336,6 +350,20 @@ var Api = /** @class */ (function (_super) {
336
350
  if (params === void 0) { params = {}; }
337
351
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/addresses"), method: "POST", body: data, secure: true, type: ContentType.Json, format: "json" }, params));
338
352
  },
353
+ /**
354
+ * No description
355
+ *
356
+ * @tags Tenant Storage Plans
357
+ * @name DeleteTenantStoragePlan
358
+ * @request DELETE:/tenants/{tenantId}/storage-plans/{id}
359
+ * @secure
360
+ * @response `204` `void`
361
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
362
+ */
363
+ deleteTenantStoragePlan: function (tenantId, id, params) {
364
+ if (params === void 0) { params = {}; }
365
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans/").concat(id), method: "DELETE", secure: true }, params));
366
+ },
339
367
  /**
340
368
  * No description
341
369
  *
@@ -378,6 +406,20 @@ var Api = /** @class */ (function (_super) {
378
406
  if (params === void 0) { params = {}; }
379
407
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/disable"), method: "PATCH", secure: true }, params));
380
408
  },
409
+ /**
410
+ * No description
411
+ *
412
+ * @tags Tenant Invoices Management
413
+ * @name DispatchTenantInvoicesGeneration
414
+ * @request PATCH:/tenants/{tenantId}/invoices
415
+ * @secure
416
+ * @response `204` `void`
417
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
418
+ */
419
+ dispatchTenantInvoicesGeneration: function (tenantId, data, params) {
420
+ if (params === void 0) { params = {}; }
421
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/invoices"), method: "PATCH", body: data, secure: true, type: ContentType.Json }, params));
422
+ },
381
423
  /**
382
424
  * No description
383
425
  *
@@ -392,6 +434,20 @@ var Api = /** @class */ (function (_super) {
392
434
  if (params === void 0) { params = {}; }
393
435
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/enable"), method: "PATCH", secure: true }, params));
394
436
  },
437
+ /**
438
+ * No description
439
+ *
440
+ * @tags Tenant Storage Plans
441
+ * @name GetTenantStoragePlan
442
+ * @request GET:/tenants/{tenantId}/storage-plans/{id}
443
+ * @secure
444
+ * @response `200` `StoragePlanEntityDto`
445
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin, operator
446
+ */
447
+ getTenantStoragePlan: function (tenantId, id, params) {
448
+ if (params === void 0) { params = {}; }
449
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans/").concat(id), method: "GET", secure: true, format: "json" }, params));
450
+ },
395
451
  /**
396
452
  * No description
397
453
  *
@@ -434,6 +490,20 @@ var Api = /** @class */ (function (_super) {
434
490
  if (params === void 0) { params = {}; }
435
491
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/requests/").concat(requestId), method: "GET", secure: true, format: "json" }, params));
436
492
  },
493
+ /**
494
+ * No description
495
+ *
496
+ * @tags Tenant Storage Plans
497
+ * @name ListTenantStoragePlans
498
+ * @request GET:/tenants/{tenantId}/storage-plans
499
+ * @secure
500
+ * @response `200` `StoragePlanEntityPaginatedDto`
501
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin, operator
502
+ */
503
+ listTenantStoragePlans: function (tenantId, query, params) {
504
+ if (params === void 0) { params = {}; }
505
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans"), method: "GET", query: query, secure: true, format: "json" }, params));
506
+ },
437
507
  /**
438
508
  * No description
439
509
  *
@@ -546,6 +616,20 @@ var Api = /** @class */ (function (_super) {
546
616
  if (params === void 0) { params = {}; }
547
617
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/notifications/batch-set-read"), method: "PATCH", body: data, secure: true, type: ContentType.Json }, params));
548
618
  },
619
+ /**
620
+ * No description
621
+ *
622
+ * @tags Tenant Storage Plans
623
+ * @name UpdateTenantStoragePlan
624
+ * @request PATCH:/tenants/{tenantId}/storage-plans/{id}
625
+ * @secure
626
+ * @response `200` `StoragePlanEntityDto`
627
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
628
+ */
629
+ updateTenantStoragePlan: function (tenantId, id, data, params) {
630
+ if (params === void 0) { params = {}; }
631
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans/").concat(id), method: "PATCH", body: data, secure: true, type: ContentType.Json, format: "json" }, params));
632
+ },
549
633
  /**
550
634
  * No description
551
635
  *
@@ -263,6 +263,12 @@ export interface CreateOperationGroupDto {
263
263
  /** @example "processed" */
264
264
  status?: CreateOnlyOperationGroupStatusEnum;
265
265
  }
266
+ export interface CreateStoragePlanDto {
267
+ monthlyCyclePrice: boolean;
268
+ name: string;
269
+ /** @example 100 */
270
+ price: number;
271
+ }
266
272
  export interface CreateUserDto {
267
273
  email: string;
268
274
  firstName: string;
@@ -456,6 +462,14 @@ export interface HttpExceptionDto {
456
462
  /** @example "2022-07-25T17:24:07.042Z" */
457
463
  timestamp: string;
458
464
  }
465
+ export interface InvoicesDispatchDto {
466
+ /** @minItems 1 */
467
+ caseIds?: string[];
468
+ /** @minItems 1 */
469
+ customerIds?: string[];
470
+ /** @minItems 1 */
471
+ operationGroupIds?: string[];
472
+ }
459
473
  export interface OperationExtraEntityDto {
460
474
  /**
461
475
  * @min 0
@@ -719,6 +733,7 @@ export interface StoragePlanEntityDto {
719
733
  createdAt: string;
720
734
  /** @format uuid */
721
735
  id: string;
736
+ monthlyCyclePrice: boolean;
722
737
  name: string;
723
738
  /**
724
739
  * @min 0
@@ -730,6 +745,11 @@ export interface StoragePlanEntityDto {
730
745
  /** @format date-time */
731
746
  updatedAt: string;
732
747
  }
748
+ export interface StoragePlanEntityPaginatedDto {
749
+ items: StoragePlanEntityDto[];
750
+ links?: PaginationLinksDto;
751
+ meta: PaginationMetaDto;
752
+ }
733
753
  export interface SyncOperationGroupWithSnapshotDto {
734
754
  /** @minItems 0 */
735
755
  extras?: UpdateOperationExtraDto[];
@@ -811,6 +831,12 @@ export interface UpdateOperationExtraTemplateDto {
811
831
  /** @example 100 */
812
832
  pricePerItem: number;
813
833
  }
834
+ export interface UpdateStoragePlanDto {
835
+ monthlyCyclePrice?: boolean;
836
+ name?: string;
837
+ /** @example 100 */
838
+ price?: number;
839
+ }
814
840
  export interface UpdateUserDto {
815
841
  /** @example "user@example.com" */
816
842
  email?: string;
@@ -1245,13 +1271,31 @@ export declare namespace Tenants {
1245
1271
  type RequestHeaders = {};
1246
1272
  type ResponseBody = void;
1247
1273
  }
1274
+ /**
1275
+ * No description
1276
+ * @tags Tenant Storage Plans
1277
+ * @name CreateTenantStoragePlan
1278
+ * @request POST:/tenants/{tenantId}/storage-plans
1279
+ * @secure
1280
+ * @response `201` `StoragePlanEntityDto`
1281
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
1282
+ */
1283
+ namespace CreateTenantStoragePlan {
1284
+ type RequestParams = {
1285
+ tenantId: string;
1286
+ };
1287
+ type RequestQuery = {};
1288
+ type RequestBody = CreateStoragePlanDto;
1289
+ type RequestHeaders = {};
1290
+ type ResponseBody = StoragePlanEntityDto;
1291
+ }
1248
1292
  /**
1249
1293
  * No description
1250
1294
  * @tags Tenant Users
1251
1295
  * @name CreateTenantUser
1252
1296
  * @request POST:/tenants/{tenantId}/users
1253
1297
  * @secure
1254
- * @response `200` `UserEntityDto`
1298
+ * @response `201` `UserEntityDto`
1255
1299
  * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
1256
1300
  */
1257
1301
  namespace CreateTenantUser {
@@ -1282,6 +1326,25 @@ export declare namespace Tenants {
1282
1326
  type RequestHeaders = {};
1283
1327
  type ResponseBody = AddressEntityDto;
1284
1328
  }
1329
+ /**
1330
+ * No description
1331
+ * @tags Tenant Storage Plans
1332
+ * @name DeleteTenantStoragePlan
1333
+ * @request DELETE:/tenants/{tenantId}/storage-plans/{id}
1334
+ * @secure
1335
+ * @response `204` `void`
1336
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
1337
+ */
1338
+ namespace DeleteTenantStoragePlan {
1339
+ type RequestParams = {
1340
+ id: string;
1341
+ tenantId: string;
1342
+ };
1343
+ type RequestQuery = {};
1344
+ type RequestBody = never;
1345
+ type RequestHeaders = {};
1346
+ type ResponseBody = void;
1347
+ }
1285
1348
  /**
1286
1349
  * No description
1287
1350
  * @tags Tenant Users
@@ -1340,6 +1403,24 @@ export declare namespace Tenants {
1340
1403
  type RequestHeaders = {};
1341
1404
  type ResponseBody = void;
1342
1405
  }
1406
+ /**
1407
+ * No description
1408
+ * @tags Tenant Invoices Management
1409
+ * @name DispatchTenantInvoicesGeneration
1410
+ * @request PATCH:/tenants/{tenantId}/invoices
1411
+ * @secure
1412
+ * @response `204` `void`
1413
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
1414
+ */
1415
+ namespace DispatchTenantInvoicesGeneration {
1416
+ type RequestParams = {
1417
+ tenantId: string;
1418
+ };
1419
+ type RequestQuery = {};
1420
+ type RequestBody = InvoicesDispatchDto;
1421
+ type RequestHeaders = {};
1422
+ type ResponseBody = void;
1423
+ }
1343
1424
  /**
1344
1425
  * No description
1345
1426
  * @tags Tenant Users
@@ -1359,6 +1440,25 @@ export declare namespace Tenants {
1359
1440
  type RequestHeaders = {};
1360
1441
  type ResponseBody = void;
1361
1442
  }
1443
+ /**
1444
+ * No description
1445
+ * @tags Tenant Storage Plans
1446
+ * @name GetTenantStoragePlan
1447
+ * @request GET:/tenants/{tenantId}/storage-plans/{id}
1448
+ * @secure
1449
+ * @response `200` `StoragePlanEntityDto`
1450
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin, operator
1451
+ */
1452
+ namespace GetTenantStoragePlan {
1453
+ type RequestParams = {
1454
+ id: string;
1455
+ tenantId: string;
1456
+ };
1457
+ type RequestQuery = {};
1458
+ type RequestBody = never;
1459
+ type RequestHeaders = {};
1460
+ type ResponseBody = StoragePlanEntityDto;
1461
+ }
1362
1462
  /**
1363
1463
  * No description
1364
1464
  * @tags Tenant Users
@@ -1418,6 +1518,39 @@ export declare namespace Tenants {
1418
1518
  type RequestHeaders = {};
1419
1519
  type ResponseBody = FullOperationRequestEntityDto;
1420
1520
  }
1521
+ /**
1522
+ * No description
1523
+ * @tags Tenant Storage Plans
1524
+ * @name ListTenantStoragePlans
1525
+ * @request GET:/tenants/{tenantId}/storage-plans
1526
+ * @secure
1527
+ * @response `200` `StoragePlanEntityPaginatedDto`
1528
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin, operator
1529
+ */
1530
+ namespace ListTenantStoragePlans {
1531
+ type RequestParams = {
1532
+ tenantId: string;
1533
+ };
1534
+ type RequestQuery = {
1535
+ createdAt?: string;
1536
+ /**
1537
+ * @default 10
1538
+ * @example 10
1539
+ */
1540
+ limit?: number;
1541
+ orderBy?: OrderByEnum;
1542
+ /**
1543
+ * @default 1
1544
+ * @example 1
1545
+ */
1546
+ page?: number;
1547
+ search?: string;
1548
+ sortBy?: string[];
1549
+ };
1550
+ type RequestBody = never;
1551
+ type RequestHeaders = {};
1552
+ type ResponseBody = StoragePlanEntityPaginatedDto;
1553
+ }
1421
1554
  /**
1422
1555
  * No description
1423
1556
  * @tags Tenant Users
@@ -1653,6 +1786,25 @@ export declare namespace Tenants {
1653
1786
  type RequestHeaders = {};
1654
1787
  type ResponseBody = void;
1655
1788
  }
1789
+ /**
1790
+ * No description
1791
+ * @tags Tenant Storage Plans
1792
+ * @name UpdateTenantStoragePlan
1793
+ * @request PATCH:/tenants/{tenantId}/storage-plans/{id}
1794
+ * @secure
1795
+ * @response `200` `StoragePlanEntityDto`
1796
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
1797
+ */
1798
+ namespace UpdateTenantStoragePlan {
1799
+ type RequestParams = {
1800
+ id: string;
1801
+ tenantId: string;
1802
+ };
1803
+ type RequestQuery = {};
1804
+ type RequestBody = UpdateStoragePlanDto;
1805
+ type RequestHeaders = {};
1806
+ type ResponseBody = StoragePlanEntityDto;
1807
+ }
1656
1808
  /**
1657
1809
  * No description
1658
1810
  * @tags Tenant Users
@@ -3782,6 +3934,17 @@ export declare class Api<SecurityDataType extends unknown> extends HttpClient<Se
3782
3934
  * @response `403` `HttpExceptionDto` You're not enabled to make this operation.
3783
3935
  */
3784
3936
  cancelUserOperationRequest: (tenantId: string, userId: string, requestId: string, data: ChangeOperationRequestWithReasonDto, params?: RequestParams) => Promise<void>;
3937
+ /**
3938
+ * No description
3939
+ *
3940
+ * @tags Tenant Storage Plans
3941
+ * @name CreateTenantStoragePlan
3942
+ * @request POST:/tenants/{tenantId}/storage-plans
3943
+ * @secure
3944
+ * @response `201` `StoragePlanEntityDto`
3945
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
3946
+ */
3947
+ createTenantStoragePlan: (tenantId: string, data: CreateStoragePlanDto, params?: RequestParams) => Promise<StoragePlanEntityDto>;
3785
3948
  /**
3786
3949
  * No description
3787
3950
  *
@@ -3789,7 +3952,7 @@ export declare class Api<SecurityDataType extends unknown> extends HttpClient<Se
3789
3952
  * @name CreateTenantUser
3790
3953
  * @request POST:/tenants/{tenantId}/users
3791
3954
  * @secure
3792
- * @response `200` `UserEntityDto`
3955
+ * @response `201` `UserEntityDto`
3793
3956
  * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
3794
3957
  */
3795
3958
  createTenantUser: (tenantId: string, data: CreateUserDto, params?: RequestParams) => Promise<UserEntityDto>;
@@ -3804,6 +3967,17 @@ export declare class Api<SecurityDataType extends unknown> extends HttpClient<Se
3804
3967
  * @response `403` `HttpExceptionDto` You're not enabled to make this operation.
3805
3968
  */
3806
3969
  createUserAddress: (tenantId: string, userId: string, data: CreateAddressDto, params?: RequestParams) => Promise<AddressEntityDto>;
3970
+ /**
3971
+ * No description
3972
+ *
3973
+ * @tags Tenant Storage Plans
3974
+ * @name DeleteTenantStoragePlan
3975
+ * @request DELETE:/tenants/{tenantId}/storage-plans/{id}
3976
+ * @secure
3977
+ * @response `204` `void`
3978
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
3979
+ */
3980
+ deleteTenantStoragePlan: (tenantId: string, id: string, params?: RequestParams) => Promise<void>;
3807
3981
  /**
3808
3982
  * No description
3809
3983
  *
@@ -3837,6 +4011,17 @@ export declare class Api<SecurityDataType extends unknown> extends HttpClient<Se
3837
4011
  * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
3838
4012
  */
3839
4013
  disableTenantUser: (tenantId: string, userId: string, params?: RequestParams) => Promise<void>;
4014
+ /**
4015
+ * No description
4016
+ *
4017
+ * @tags Tenant Invoices Management
4018
+ * @name DispatchTenantInvoicesGeneration
4019
+ * @request PATCH:/tenants/{tenantId}/invoices
4020
+ * @secure
4021
+ * @response `204` `void`
4022
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
4023
+ */
4024
+ dispatchTenantInvoicesGeneration: (tenantId: string, data: InvoicesDispatchDto, params?: RequestParams) => Promise<void>;
3840
4025
  /**
3841
4026
  * No description
3842
4027
  *
@@ -3848,6 +4033,17 @@ export declare class Api<SecurityDataType extends unknown> extends HttpClient<Se
3848
4033
  * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
3849
4034
  */
3850
4035
  enableTenantUser: (tenantId: string, userId: string, params?: RequestParams) => Promise<void>;
4036
+ /**
4037
+ * No description
4038
+ *
4039
+ * @tags Tenant Storage Plans
4040
+ * @name GetTenantStoragePlan
4041
+ * @request GET:/tenants/{tenantId}/storage-plans/{id}
4042
+ * @secure
4043
+ * @response `200` `StoragePlanEntityDto`
4044
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin, operator
4045
+ */
4046
+ getTenantStoragePlan: (tenantId: string, id: string, params?: RequestParams) => Promise<StoragePlanEntityDto>;
3851
4047
  /**
3852
4048
  * No description
3853
4049
  *
@@ -3881,6 +4077,32 @@ export declare class Api<SecurityDataType extends unknown> extends HttpClient<Se
3881
4077
  * @response `403` `HttpExceptionDto` You're not enabled to make this operation.
3882
4078
  */
3883
4079
  getUserOperationRequestById: (tenantId: string, userId: string, requestId: string, params?: RequestParams) => Promise<FullOperationRequestEntityDto>;
4080
+ /**
4081
+ * No description
4082
+ *
4083
+ * @tags Tenant Storage Plans
4084
+ * @name ListTenantStoragePlans
4085
+ * @request GET:/tenants/{tenantId}/storage-plans
4086
+ * @secure
4087
+ * @response `200` `StoragePlanEntityPaginatedDto`
4088
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin, operator
4089
+ */
4090
+ listTenantStoragePlans: (tenantId: string, query?: {
4091
+ createdAt?: string;
4092
+ /**
4093
+ * @default 10
4094
+ * @example 10
4095
+ */
4096
+ limit?: number;
4097
+ orderBy?: OrderByEnum;
4098
+ /**
4099
+ * @default 1
4100
+ * @example 1
4101
+ */
4102
+ page?: number;
4103
+ search?: string;
4104
+ sortBy?: string[];
4105
+ }, params?: RequestParams) => Promise<StoragePlanEntityPaginatedDto>;
3884
4106
  /**
3885
4107
  * No description
3886
4108
  *
@@ -4053,6 +4275,17 @@ export declare class Api<SecurityDataType extends unknown> extends HttpClient<Se
4053
4275
  * @response `403` `HttpExceptionDto` You're not enabled to make this operation.
4054
4276
  */
4055
4277
  setUserNotificationsAsRead: (tenantId: string, userId: string, data: SetNotificationsReadDto, params?: RequestParams) => Promise<void>;
4278
+ /**
4279
+ * No description
4280
+ *
4281
+ * @tags Tenant Storage Plans
4282
+ * @name UpdateTenantStoragePlan
4283
+ * @request PATCH:/tenants/{tenantId}/storage-plans/{id}
4284
+ * @secure
4285
+ * @response `200` `StoragePlanEntityDto`
4286
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
4287
+ */
4288
+ updateTenantStoragePlan: (tenantId: string, id: string, data: UpdateStoragePlanDto, params?: RequestParams) => Promise<StoragePlanEntityDto>;
4056
4289
  /**
4057
4290
  * No description
4058
4291
  *
package/dist/umd/index.ts CHANGED
@@ -18639,6 +18639,20 @@ var Api = /** @class */ (function (_super) {
18639
18639
  if (params === void 0) { params = {}; }
18640
18640
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/requests/").concat(requestId, "/cancel"), method: "PATCH", body: data, secure: true, type: ContentType.Json }, params));
18641
18641
  },
18642
+ /**
18643
+ * No description
18644
+ *
18645
+ * @tags Tenant Storage Plans
18646
+ * @name CreateTenantStoragePlan
18647
+ * @request POST:/tenants/{tenantId}/storage-plans
18648
+ * @secure
18649
+ * @response `201` `StoragePlanEntityDto`
18650
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
18651
+ */
18652
+ createTenantStoragePlan: function (tenantId, data, params) {
18653
+ if (params === void 0) { params = {}; }
18654
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans"), method: "POST", body: data, secure: true, type: ContentType.Json, format: "json" }, params));
18655
+ },
18642
18656
  /**
18643
18657
  * No description
18644
18658
  *
@@ -18646,7 +18660,7 @@ var Api = /** @class */ (function (_super) {
18646
18660
  * @name CreateTenantUser
18647
18661
  * @request POST:/tenants/{tenantId}/users
18648
18662
  * @secure
18649
- * @response `200` `UserEntityDto`
18663
+ * @response `201` `UserEntityDto`
18650
18664
  * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
18651
18665
  */
18652
18666
  createTenantUser: function (tenantId, data, params) {
@@ -18667,6 +18681,20 @@ var Api = /** @class */ (function (_super) {
18667
18681
  if (params === void 0) { params = {}; }
18668
18682
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/addresses"), method: "POST", body: data, secure: true, type: ContentType.Json, format: "json" }, params));
18669
18683
  },
18684
+ /**
18685
+ * No description
18686
+ *
18687
+ * @tags Tenant Storage Plans
18688
+ * @name DeleteTenantStoragePlan
18689
+ * @request DELETE:/tenants/{tenantId}/storage-plans/{id}
18690
+ * @secure
18691
+ * @response `204` `void`
18692
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
18693
+ */
18694
+ deleteTenantStoragePlan: function (tenantId, id, params) {
18695
+ if (params === void 0) { params = {}; }
18696
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans/").concat(id), method: "DELETE", secure: true }, params));
18697
+ },
18670
18698
  /**
18671
18699
  * No description
18672
18700
  *
@@ -18709,6 +18737,20 @@ var Api = /** @class */ (function (_super) {
18709
18737
  if (params === void 0) { params = {}; }
18710
18738
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/disable"), method: "PATCH", secure: true }, params));
18711
18739
  },
18740
+ /**
18741
+ * No description
18742
+ *
18743
+ * @tags Tenant Invoices Management
18744
+ * @name DispatchTenantInvoicesGeneration
18745
+ * @request PATCH:/tenants/{tenantId}/invoices
18746
+ * @secure
18747
+ * @response `204` `void`
18748
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner
18749
+ */
18750
+ dispatchTenantInvoicesGeneration: function (tenantId, data, params) {
18751
+ if (params === void 0) { params = {}; }
18752
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/invoices"), method: "PATCH", body: data, secure: true, type: ContentType.Json }, params));
18753
+ },
18712
18754
  /**
18713
18755
  * No description
18714
18756
  *
@@ -18723,6 +18765,20 @@ var Api = /** @class */ (function (_super) {
18723
18765
  if (params === void 0) { params = {}; }
18724
18766
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/enable"), method: "PATCH", secure: true }, params));
18725
18767
  },
18768
+ /**
18769
+ * No description
18770
+ *
18771
+ * @tags Tenant Storage Plans
18772
+ * @name GetTenantStoragePlan
18773
+ * @request GET:/tenants/{tenantId}/storage-plans/{id}
18774
+ * @secure
18775
+ * @response `200` `StoragePlanEntityDto`
18776
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin, operator
18777
+ */
18778
+ getTenantStoragePlan: function (tenantId, id, params) {
18779
+ if (params === void 0) { params = {}; }
18780
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans/").concat(id), method: "GET", secure: true, format: "json" }, params));
18781
+ },
18726
18782
  /**
18727
18783
  * No description
18728
18784
  *
@@ -18765,6 +18821,20 @@ var Api = /** @class */ (function (_super) {
18765
18821
  if (params === void 0) { params = {}; }
18766
18822
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/requests/").concat(requestId), method: "GET", secure: true, format: "json" }, params));
18767
18823
  },
18824
+ /**
18825
+ * No description
18826
+ *
18827
+ * @tags Tenant Storage Plans
18828
+ * @name ListTenantStoragePlans
18829
+ * @request GET:/tenants/{tenantId}/storage-plans
18830
+ * @secure
18831
+ * @response `200` `StoragePlanEntityPaginatedDto`
18832
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin, operator
18833
+ */
18834
+ listTenantStoragePlans: function (tenantId, query, params) {
18835
+ if (params === void 0) { params = {}; }
18836
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans"), method: "GET", query: query, secure: true, format: "json" }, params));
18837
+ },
18768
18838
  /**
18769
18839
  * No description
18770
18840
  *
@@ -18877,6 +18947,20 @@ var Api = /** @class */ (function (_super) {
18877
18947
  if (params === void 0) { params = {}; }
18878
18948
  return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/users/").concat(userId, "/notifications/batch-set-read"), method: "PATCH", body: data, secure: true, type: ContentType.Json }, params));
18879
18949
  },
18950
+ /**
18951
+ * No description
18952
+ *
18953
+ * @tags Tenant Storage Plans
18954
+ * @name UpdateTenantStoragePlan
18955
+ * @request PATCH:/tenants/{tenantId}/storage-plans/{id}
18956
+ * @secure
18957
+ * @response `200` `StoragePlanEntityDto`
18958
+ * @response `403` `HttpExceptionDto` Need user with one of these roles: owner, admin
18959
+ */
18960
+ updateTenantStoragePlan: function (tenantId, id, data, params) {
18961
+ if (params === void 0) { params = {}; }
18962
+ return _this.request(__assign({ path: "/tenants/".concat(tenantId, "/storage-plans/").concat(id), method: "PATCH", body: data, secure: true, type: ContentType.Json, format: "json" }, params));
18963
+ },
18880
18964
  /**
18881
18965
  * No description
18882
18966
  *
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@thelllabs/winehaus-sdk",
3
- "version": "0.0.23",
3
+ "version": "0.0.24",
4
4
  "description": "Winehaus SDK",
5
5
  "main": "dist/cjs/index.js",
6
6
  "module": "dist/esm/index.js",