@trackunit/iris-app-api 1.15.12 → 1.15.14
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +8 -0
- package/package.json +1 -1
- package/src/types/scopes.d.ts +0 -1
- package/src/types/scopes.js +15 -14
package/CHANGELOG.md
CHANGED
|
@@ -1,3 +1,11 @@
|
|
|
1
|
+
## 1.15.14 (2026-03-27)
|
|
2
|
+
|
|
3
|
+
This was a version bump only for iris-app-api to align it with other projects, there were no code changes.
|
|
4
|
+
|
|
5
|
+
## 1.15.13 (2026-03-26)
|
|
6
|
+
|
|
7
|
+
This was a version bump only for iris-app-api to align it with other projects, there were no code changes.
|
|
8
|
+
|
|
1
9
|
## 1.15.12 (2026-03-26)
|
|
2
10
|
|
|
3
11
|
This was a version bump only for iris-app-api to align it with other projects, there were no code changes.
|
package/package.json
CHANGED
package/src/types/scopes.d.ts
CHANGED
package/src/types/scopes.js
CHANGED
|
@@ -1,6 +1,20 @@
|
|
|
1
1
|
"use strict";
|
|
2
|
+
/*
|
|
3
|
+
* Public scopes are typically derived from the TAS permission name together with the
|
|
4
|
+
* securable type prefix, for example:
|
|
5
|
+
* - ACCOUNT + group.manage -> account.group.manage
|
|
6
|
+
* - ACCOUNT + manage -> account.manage
|
|
7
|
+
* - ASSET + view -> asset.view
|
|
8
|
+
*
|
|
9
|
+
* When adding a new public scope here, keep the public definitions aligned with TAS,
|
|
10
|
+
* the Okta scope definitions in `trackunit-terraform/app/okta/`, and
|
|
11
|
+
* `developers-trackunit-com/docs/guides/apps-and-extensions/overview/public-apis/app-tokens.md`.
|
|
12
|
+
*
|
|
13
|
+
* For more information see:
|
|
14
|
+
* https://trackunit.atlassian.net/wiki/spaces/EN/pages/4364599297/Adding+Permissions+to+TAS
|
|
15
|
+
*/
|
|
2
16
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
3
|
-
exports.
|
|
17
|
+
exports.allScopes = exports.siteScope = exports.assetScope = exports.accountScope = void 0;
|
|
4
18
|
exports.accountScope = {
|
|
5
19
|
ACCOUNT_ACCESS_MANAGEMENT_MANAGE: "account.access-management.manage",
|
|
6
20
|
ACCOUNT_ALERT_MANAGE: "account.alert.manage",
|
|
@@ -43,17 +57,4 @@ exports.siteScope = {
|
|
|
43
57
|
SITE_VIEW: "site.view",
|
|
44
58
|
};
|
|
45
59
|
exports.allScopes = { ...exports.accountScope, ...exports.assetScope, ...exports.siteScope };
|
|
46
|
-
exports.readOnlyScopes = [
|
|
47
|
-
exports.accountScope.ACCOUNT_ALERT_VIEW,
|
|
48
|
-
exports.accountScope.ACCOUNT_AUDIT_LOG_VIEW,
|
|
49
|
-
exports.accountScope.ACCOUNT_REMOTE_COMMAND_CONFIGURATION_VIEW,
|
|
50
|
-
exports.accountScope.ACCOUNT_RENTAL_VIEW,
|
|
51
|
-
exports.accountScope.ACCOUNT_SERVICE_MANAGEMENT_NETWORK_VIEW,
|
|
52
|
-
exports.accountScope.ACCOUNT_SERVICE_MANAGEMENT_SERVICE_PLAN_ASSIGNMENT_VIEW,
|
|
53
|
-
exports.accountScope.ACCOUNT_SERVICE_MANAGEMENT_SERVICE_PLAN_VIEW,
|
|
54
|
-
exports.accountScope.ACCOUNT_VIEW,
|
|
55
|
-
exports.assetScope.ASSET_VIEW,
|
|
56
|
-
exports.siteScope.SITE_VIEW,
|
|
57
|
-
exports.accountScope.ACCOUNT_ACCESS_MANAGEMENT_MANAGE, // Needed for operators read query. Adding here for now, but the read only query should have a lesser permission.
|
|
58
|
-
];
|
|
59
60
|
//# sourceMappingURL=scopes.js.map
|