sailpoint-api-client 1.5.0 → 1.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/beta/api.ts CHANGED
@@ -1341,6 +1341,12 @@ export interface AccessRequestBeta {
1341
1341
  * @memberof AccessRequestBeta
1342
1342
  */
1343
1343
  'clientMetadata'?: { [key: string]: string; };
1344
+ /**
1345
+ * Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
1346
+ * @type {Array<RequestedForDtoRefBeta>}
1347
+ * @memberof AccessRequestBeta
1348
+ */
1349
+ 'requestedForWithRequestedItems'?: Array<RequestedForDtoRefBeta> | null;
1344
1350
  }
1345
1351
 
1346
1352
 
@@ -1558,6 +1564,18 @@ export interface AccessRequestItemBeta {
1558
1564
  * @memberof AccessRequestItemBeta
1559
1565
  */
1560
1566
  'removeDate'?: string;
1567
+ /**
1568
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
1569
+ * @type {string}
1570
+ * @memberof AccessRequestItemBeta
1571
+ */
1572
+ 'assignmentId'?: string | null;
1573
+ /**
1574
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
1575
+ * @type {string}
1576
+ * @memberof AccessRequestItemBeta
1577
+ */
1578
+ 'nativeIdentity'?: string | null;
1561
1579
  }
1562
1580
 
1563
1581
  export const AccessRequestItemBetaTypeBeta = {
@@ -3258,6 +3276,25 @@ export interface AccountInfoDtoBeta {
3258
3276
  */
3259
3277
  'uuid'?: string;
3260
3278
  }
3279
+ /**
3280
+ *
3281
+ * @export
3282
+ * @interface AccountItemRefBeta
3283
+ */
3284
+ export interface AccountItemRefBeta {
3285
+ /**
3286
+ * The uuid for the account, available under the \'objectguid\' attribute
3287
+ * @type {string}
3288
+ * @memberof AccountItemRefBeta
3289
+ */
3290
+ 'accountUuid'?: string | null;
3291
+ /**
3292
+ * The \'distinguishedName\' attribute for the account
3293
+ * @type {string}
3294
+ * @memberof AccountItemRefBeta
3295
+ */
3296
+ 'nativeIdentity'?: string;
3297
+ }
3261
3298
  /**
3262
3299
  * If an account activity item is associated with an access request, captures details of that request.
3263
3300
  * @export
@@ -4830,7 +4867,7 @@ export interface AttributeDefinitionBeta {
4830
4867
  * @type {AttributeDefinitionSchemaBeta}
4831
4868
  * @memberof AttributeDefinitionBeta
4832
4869
  */
4833
- 'schema'?: AttributeDefinitionSchemaBeta;
4870
+ 'schema'?: AttributeDefinitionSchemaBeta | null;
4834
4871
  /**
4835
4872
  * A human-readable description of the attribute.
4836
4873
  * @type {string}
@@ -4900,7 +4937,8 @@ export const AttributeDefinitionTypeBeta = {
4900
4937
  String: 'STRING',
4901
4938
  Long: 'LONG',
4902
4939
  Int: 'INT',
4903
- Boolean: 'BOOLEAN'
4940
+ Boolean: 'BOOLEAN',
4941
+ Date: 'DATE'
4904
4942
  } as const;
4905
4943
 
4906
4944
  export type AttributeDefinitionTypeBeta = typeof AttributeDefinitionTypeBeta[keyof typeof AttributeDefinitionTypeBeta];
@@ -12090,10 +12128,186 @@ export interface GenerateRandomStringBeta {
12090
12128
  'requiresPeriodicRefresh'?: boolean;
12091
12129
  }
12092
12130
  /**
12093
- * @type GetActiveCampaigns200ResponseInnerBeta
12131
+ *
12094
12132
  * @export
12133
+ * @interface GetActiveCampaigns200ResponseInnerBeta
12095
12134
  */
12096
- export type GetActiveCampaigns200ResponseInnerBeta = CampaignBeta | SlimcampaignBeta;
12135
+ export interface GetActiveCampaigns200ResponseInnerBeta {
12136
+ /**
12137
+ * Id of the campaign
12138
+ * @type {string}
12139
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12140
+ */
12141
+ 'id'?: string;
12142
+ /**
12143
+ * The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
12144
+ * @type {string}
12145
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12146
+ */
12147
+ 'name': string;
12148
+ /**
12149
+ * The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
12150
+ * @type {string}
12151
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12152
+ */
12153
+ 'description': string;
12154
+ /**
12155
+ * The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
12156
+ * @type {string}
12157
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12158
+ */
12159
+ 'deadline'?: string;
12160
+ /**
12161
+ * The type of campaign. Could be extended in the future.
12162
+ * @type {string}
12163
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12164
+ */
12165
+ 'type': GetActiveCampaigns200ResponseInnerBetaTypeBeta;
12166
+ /**
12167
+ * Enables email notification for this campaign
12168
+ * @type {boolean}
12169
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12170
+ */
12171
+ 'emailNotificationEnabled'?: boolean;
12172
+ /**
12173
+ * Allows auto revoke for this campaign
12174
+ * @type {boolean}
12175
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12176
+ */
12177
+ 'autoRevokeAllowed'?: boolean;
12178
+ /**
12179
+ * Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
12180
+ * @type {boolean}
12181
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12182
+ */
12183
+ 'recommendationsEnabled'?: boolean;
12184
+ /**
12185
+ * The campaign\'s current status.
12186
+ * @type {string}
12187
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12188
+ */
12189
+ 'status'?: GetActiveCampaigns200ResponseInnerBetaStatusBeta;
12190
+ /**
12191
+ * The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
12192
+ * @type {string}
12193
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12194
+ */
12195
+ 'correlatedStatus'?: GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta;
12196
+ /**
12197
+ * Created time of the campaign
12198
+ * @type {string}
12199
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12200
+ */
12201
+ 'created'?: string;
12202
+ /**
12203
+ * The total number of certifications in this campaign.
12204
+ * @type {number}
12205
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12206
+ */
12207
+ 'totalCertifications'?: number;
12208
+ /**
12209
+ * The number of completed certifications in this campaign.
12210
+ * @type {number}
12211
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12212
+ */
12213
+ 'completedCertifications'?: number;
12214
+ /**
12215
+ * A list of errors and warnings that have accumulated.
12216
+ * @type {Array<CampaignAlertBeta>}
12217
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12218
+ */
12219
+ 'alerts'?: Array<CampaignAlertBeta>;
12220
+ /**
12221
+ * Modified time of the campaign
12222
+ * @type {string}
12223
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12224
+ */
12225
+ 'modified'?: string;
12226
+ /**
12227
+ *
12228
+ * @type {FullcampaignAllOfFilterBeta}
12229
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12230
+ */
12231
+ 'filter'?: FullcampaignAllOfFilterBeta;
12232
+ /**
12233
+ * Determines if comments on sunset date changes are required.
12234
+ * @type {boolean}
12235
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12236
+ */
12237
+ 'sunsetCommentsRequired'?: boolean;
12238
+ /**
12239
+ *
12240
+ * @type {FullcampaignAllOfSourceOwnerCampaignInfoBeta}
12241
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12242
+ */
12243
+ 'sourceOwnerCampaignInfo'?: FullcampaignAllOfSourceOwnerCampaignInfoBeta;
12244
+ /**
12245
+ *
12246
+ * @type {FullcampaignAllOfSearchCampaignInfoBeta}
12247
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12248
+ */
12249
+ 'searchCampaignInfo'?: FullcampaignAllOfSearchCampaignInfoBeta;
12250
+ /**
12251
+ *
12252
+ * @type {FullcampaignAllOfRoleCompositionCampaignInfoBeta}
12253
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12254
+ */
12255
+ 'roleCompositionCampaignInfo'?: FullcampaignAllOfRoleCompositionCampaignInfoBeta;
12256
+ /**
12257
+ *
12258
+ * @type {FullcampaignAllOfMachineAccountCampaignInfoBeta}
12259
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12260
+ */
12261
+ 'machineAccountCampaignInfo'?: FullcampaignAllOfMachineAccountCampaignInfoBeta;
12262
+ /**
12263
+ * A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
12264
+ * @type {Array<FullcampaignAllOfSourcesWithOrphanEntitlementsBeta>}
12265
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12266
+ */
12267
+ 'sourcesWithOrphanEntitlements'?: Array<FullcampaignAllOfSourcesWithOrphanEntitlementsBeta>;
12268
+ /**
12269
+ * Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
12270
+ * @type {string}
12271
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
12272
+ */
12273
+ 'mandatoryCommentRequirement'?: GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta;
12274
+ }
12275
+
12276
+ export const GetActiveCampaigns200ResponseInnerBetaTypeBeta = {
12277
+ Manager: 'MANAGER',
12278
+ SourceOwner: 'SOURCE_OWNER',
12279
+ Search: 'SEARCH',
12280
+ RoleComposition: 'ROLE_COMPOSITION',
12281
+ MachineAccount: 'MACHINE_ACCOUNT'
12282
+ } as const;
12283
+
12284
+ export type GetActiveCampaigns200ResponseInnerBetaTypeBeta = typeof GetActiveCampaigns200ResponseInnerBetaTypeBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaTypeBeta];
12285
+ export const GetActiveCampaigns200ResponseInnerBetaStatusBeta = {
12286
+ Pending: 'PENDING',
12287
+ Staged: 'STAGED',
12288
+ Canceling: 'CANCELING',
12289
+ Activating: 'ACTIVATING',
12290
+ Active: 'ACTIVE',
12291
+ Completing: 'COMPLETING',
12292
+ Completed: 'COMPLETED',
12293
+ Error: 'ERROR',
12294
+ Archived: 'ARCHIVED'
12295
+ } as const;
12296
+
12297
+ export type GetActiveCampaigns200ResponseInnerBetaStatusBeta = typeof GetActiveCampaigns200ResponseInnerBetaStatusBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaStatusBeta];
12298
+ export const GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta = {
12299
+ Correlated: 'CORRELATED',
12300
+ Uncorrelated: 'UNCORRELATED'
12301
+ } as const;
12302
+
12303
+ export type GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta = typeof GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta];
12304
+ export const GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta = {
12305
+ AllDecisions: 'ALL_DECISIONS',
12306
+ RevokeOnlyDecisions: 'REVOKE_ONLY_DECISIONS',
12307
+ NoDecisions: 'NO_DECISIONS'
12308
+ } as const;
12309
+
12310
+ export type GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta = typeof GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta];
12097
12311
 
12098
12312
  /**
12099
12313
  * @type GetDiscoveredApplications200ResponseInnerBeta
@@ -21313,7 +21527,7 @@ export interface ProvisioningPolicyDtoBeta {
21313
21527
  * @type {string}
21314
21528
  * @memberof ProvisioningPolicyDtoBeta
21315
21529
  */
21316
- 'name': string;
21530
+ 'name': string | null;
21317
21531
  /**
21318
21532
  * the description of the provisioning policy
21319
21533
  * @type {string}
@@ -22352,6 +22566,25 @@ export interface RequestedAccountRefBeta {
22352
22566
  }
22353
22567
 
22354
22568
 
22569
+ /**
22570
+ *
22571
+ * @export
22572
+ * @interface RequestedForDtoRefBeta
22573
+ */
22574
+ export interface RequestedForDtoRefBeta {
22575
+ /**
22576
+ * The identity id for which the access is requested
22577
+ * @type {string}
22578
+ * @memberof RequestedForDtoRefBeta
22579
+ */
22580
+ 'identityId': string;
22581
+ /**
22582
+ * the details for the access items that are requested for the identity
22583
+ * @type {Array<RequestedItemDtoRefBeta>}
22584
+ * @memberof RequestedForDtoRefBeta
22585
+ */
22586
+ 'requestedItems': Array<RequestedItemDtoRefBeta>;
22587
+ }
22355
22588
  /**
22356
22589
  *
22357
22590
  * @export
@@ -22380,6 +22613,70 @@ export const RequestedItemDetailsBetaTypeBeta = {
22380
22613
 
22381
22614
  export type RequestedItemDetailsBetaTypeBeta = typeof RequestedItemDetailsBetaTypeBeta[keyof typeof RequestedItemDetailsBetaTypeBeta];
22382
22615
 
22616
+ /**
22617
+ *
22618
+ * @export
22619
+ * @interface RequestedItemDtoRefBeta
22620
+ */
22621
+ export interface RequestedItemDtoRefBeta {
22622
+ /**
22623
+ * The type of the item being requested.
22624
+ * @type {string}
22625
+ * @memberof RequestedItemDtoRefBeta
22626
+ */
22627
+ 'type': RequestedItemDtoRefBetaTypeBeta;
22628
+ /**
22629
+ * ID of Role, Access Profile or Entitlement being requested.
22630
+ * @type {string}
22631
+ * @memberof RequestedItemDtoRefBeta
22632
+ */
22633
+ 'id': string;
22634
+ /**
22635
+ * Comment provided by requester. * Comment is required when the request is of type Revoke Access.
22636
+ * @type {string}
22637
+ * @memberof RequestedItemDtoRefBeta
22638
+ */
22639
+ 'comment'?: string;
22640
+ /**
22641
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
22642
+ * @type {{ [key: string]: string; }}
22643
+ * @memberof RequestedItemDtoRefBeta
22644
+ */
22645
+ 'clientMetadata'?: { [key: string]: string; };
22646
+ /**
22647
+ * The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
22648
+ * @type {string}
22649
+ * @memberof RequestedItemDtoRefBeta
22650
+ */
22651
+ 'removeDate'?: string;
22652
+ /**
22653
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
22654
+ * @type {string}
22655
+ * @memberof RequestedItemDtoRefBeta
22656
+ */
22657
+ 'assignmentId'?: string | null;
22658
+ /**
22659
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
22660
+ * @type {string}
22661
+ * @memberof RequestedItemDtoRefBeta
22662
+ */
22663
+ 'nativeIdentity'?: string | null;
22664
+ /**
22665
+ * The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
22666
+ * @type {Array<SourceItemRefBeta>}
22667
+ * @memberof RequestedItemDtoRefBeta
22668
+ */
22669
+ 'accountSelection'?: Array<SourceItemRefBeta> | null;
22670
+ }
22671
+
22672
+ export const RequestedItemDtoRefBetaTypeBeta = {
22673
+ AccessProfile: 'ACCESS_PROFILE',
22674
+ Role: 'ROLE',
22675
+ Entitlement: 'ENTITLEMENT'
22676
+ } as const;
22677
+
22678
+ export type RequestedItemDtoRefBetaTypeBeta = typeof RequestedItemDtoRefBetaTypeBeta[keyof typeof RequestedItemDtoRefBetaTypeBeta];
22679
+
22383
22680
  /**
22384
22681
  *
22385
22682
  * @export
@@ -25433,7 +25730,7 @@ export interface SchemaBeta {
25433
25730
  * @type {string}
25434
25731
  * @memberof SchemaBeta
25435
25732
  */
25436
- 'hierarchyAttribute'?: string;
25733
+ 'hierarchyAttribute'?: string | null;
25437
25734
  /**
25438
25735
  * Flag indicating whether or not the include permissions with the object data when aggregating the schema.
25439
25736
  * @type {boolean}
@@ -25469,7 +25766,7 @@ export interface SchemaBeta {
25469
25766
  * @type {string}
25470
25767
  * @memberof SchemaBeta
25471
25768
  */
25472
- 'modified'?: string;
25769
+ 'modified'?: string | null;
25473
25770
  }
25474
25771
 
25475
25772
  export const SchemaBetaFeaturesBeta = {
@@ -28287,6 +28584,25 @@ export interface SourceEntitlementRequestConfigBeta {
28287
28584
  */
28288
28585
  'accessRequestConfig'?: EntitlementAccessRequestConfigBeta;
28289
28586
  }
28587
+ /**
28588
+ *
28589
+ * @export
28590
+ * @interface SourceItemRefBeta
28591
+ */
28592
+ export interface SourceItemRefBeta {
28593
+ /**
28594
+ * The id for the source on which account selections are made
28595
+ * @type {string}
28596
+ * @memberof SourceItemRefBeta
28597
+ */
28598
+ 'sourceId'?: string | null;
28599
+ /**
28600
+ * A list of account selections on the source. Currently, only one selection per source is supported.
28601
+ * @type {Array<AccountItemRefBeta>}
28602
+ * @memberof SourceItemRefBeta
28603
+ */
28604
+ 'accounts'?: Array<AccountItemRefBeta> | null;
28605
+ }
28290
28606
  /**
28291
28607
  *
28292
28608
  * @export
@@ -35621,7 +35937,7 @@ export const AccessRequestsBetaApiAxiosParamCreator = function (configuration?:
35621
35937
  };
35622
35938
  },
35623
35939
  /**
35624
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
35940
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
35625
35941
  * @summary Submit Access Request
35626
35942
  * @param {AccessRequestBeta} accessRequestBeta
35627
35943
  * @param {*} [axiosOptions] Override http request option.
@@ -35871,7 +36187,7 @@ export const AccessRequestsBetaApiFp = function(configuration?: Configuration) {
35871
36187
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
35872
36188
  },
35873
36189
  /**
35874
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
36190
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
35875
36191
  * @summary Submit Access Request
35876
36192
  * @param {AccessRequestBeta} accessRequestBeta
35877
36193
  * @param {*} [axiosOptions] Override http request option.
@@ -35961,7 +36277,7 @@ export const AccessRequestsBetaApiFactory = function (configuration?: Configurat
35961
36277
  return localVarFp.closeAccessRequest(requestParameters.closeAccessRequestBeta, axiosOptions).then((request) => request(axios, basePath));
35962
36278
  },
35963
36279
  /**
35964
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
36280
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
35965
36281
  * @summary Submit Access Request
35966
36282
  * @param {AccessRequestsBetaApiCreateAccessRequestRequest} requestParameters Request parameters.
35967
36283
  * @param {*} [axiosOptions] Override http request option.
@@ -36167,7 +36483,7 @@ export class AccessRequestsBetaApi extends BaseAPI {
36167
36483
  }
36168
36484
 
36169
36485
  /**
36170
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
36486
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
36171
36487
  * @summary Submit Access Request
36172
36488
  * @param {AccessRequestsBetaApiCreateAccessRequestRequest} requestParameters Request parameters.
36173
36489
  * @param {*} [axiosOptions] Override http request option.
@@ -94085,10 +94401,11 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94085
94401
  * Get a single workflow by id.
94086
94402
  * @summary Get Workflow By Id
94087
94403
  * @param {string} id Id of the workflow
94404
+ * @param {boolean} [workflowMetrics] disable workflow metrics
94088
94405
  * @param {*} [axiosOptions] Override http request option.
94089
94406
  * @throws {RequiredError}
94090
94407
  */
94091
- getWorkflow: async (id: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
94408
+ getWorkflow: async (id: string, workflowMetrics?: boolean, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
94092
94409
  // verify required parameter 'id' is not null or undefined
94093
94410
  assertParamExists('getWorkflow', 'id', id)
94094
94411
  const localVarPath = `/workflows/{id}`
@@ -94112,6 +94429,10 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94112
94429
  // oauth required
94113
94430
  await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
94114
94431
 
94432
+ if (workflowMetrics !== undefined) {
94433
+ localVarQueryParameter['workflowMetrics'] = workflowMetrics;
94434
+ }
94435
+
94115
94436
 
94116
94437
 
94117
94438
  setSearchParams(localVarUrlObj, localVarQueryParameter);
@@ -94464,10 +94785,14 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94464
94785
  /**
94465
94786
  * List all workflows in the tenant.
94466
94787
  * @summary List Workflows
94788
+ * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
94789
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
94790
+ * @param {string} [triggerId] Trigger ID
94791
+ * @param {string} [connectorInstanceId] Connector Instance ID
94467
94792
  * @param {*} [axiosOptions] Override http request option.
94468
94793
  * @throws {RequiredError}
94469
94794
  */
94470
- listWorkflows: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
94795
+ listWorkflows: async (limit?: number, offset?: number, triggerId?: string, connectorInstanceId?: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
94471
94796
  const localVarPath = `/workflows`;
94472
94797
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
94473
94798
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
@@ -94488,6 +94813,22 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94488
94813
  // oauth required
94489
94814
  await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
94490
94815
 
94816
+ if (limit !== undefined) {
94817
+ localVarQueryParameter['limit'] = limit;
94818
+ }
94819
+
94820
+ if (offset !== undefined) {
94821
+ localVarQueryParameter['offset'] = offset;
94822
+ }
94823
+
94824
+ if (triggerId !== undefined) {
94825
+ localVarQueryParameter['triggerId'] = triggerId;
94826
+ }
94827
+
94828
+ if (connectorInstanceId !== undefined) {
94829
+ localVarQueryParameter['connectorInstanceId'] = connectorInstanceId;
94830
+ }
94831
+
94491
94832
 
94492
94833
 
94493
94834
  setSearchParams(localVarUrlObj, localVarQueryParameter);
@@ -94636,17 +94977,19 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94636
94977
  };
94637
94978
  },
94638
94979
  /**
94639
- * Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
94640
- * @summary Test Workflow via External Trigger
94641
- * @param {string} id Id of the workflow
94642
- * @param {TestExternalExecuteWorkflowRequestBeta} [testExternalExecuteWorkflowRequestBeta]
94980
+ * Perform a full update of a workflow. The updated workflow object is returned in the response.
94981
+ * @summary Update Workflow
94982
+ * @param {string} id Id of the Workflow
94983
+ * @param {WorkflowBodyBeta} workflowBodyBeta
94643
94984
  * @param {*} [axiosOptions] Override http request option.
94644
94985
  * @throws {RequiredError}
94645
94986
  */
94646
- testExternalExecuteWorkflow: async (id: string, testExternalExecuteWorkflowRequestBeta?: TestExternalExecuteWorkflowRequestBeta, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
94987
+ putWorkflow: async (id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
94647
94988
  // verify required parameter 'id' is not null or undefined
94648
- assertParamExists('testExternalExecuteWorkflow', 'id', id)
94649
- const localVarPath = `/workflows/execute/external/{id}/test`
94989
+ assertParamExists('putWorkflow', 'id', id)
94990
+ // verify required parameter 'workflowBodyBeta' is not null or undefined
94991
+ assertParamExists('putWorkflow', 'workflowBodyBeta', workflowBodyBeta)
94992
+ const localVarPath = `/workflows/{id}`
94650
94993
  .replace(`{${"id"}}`, encodeURIComponent(String(id)));
94651
94994
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
94652
94995
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
@@ -94655,7 +94998,7 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94655
94998
  baseOptions = configuration.baseOptions;
94656
94999
  }
94657
95000
 
94658
- const localVarRequestOptions = { method: 'POST', ...baseOptions, ...axiosOptions};
95001
+ const localVarRequestOptions = { method: 'PUT', ...baseOptions, ...axiosOptions};
94659
95002
  const localVarHeaderParameter = {} as any;
94660
95003
  const localVarQueryParameter = {} as any;
94661
95004
 
@@ -94674,7 +95017,7 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94674
95017
  setSearchParams(localVarUrlObj, localVarQueryParameter);
94675
95018
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
94676
95019
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
94677
- localVarRequestOptions.data = serializeDataIfNeeded(testExternalExecuteWorkflowRequestBeta, localVarRequestOptions, configuration)
95020
+ localVarRequestOptions.data = serializeDataIfNeeded(workflowBodyBeta, localVarRequestOptions, configuration)
94678
95021
 
94679
95022
  return {
94680
95023
  url: toPathString(localVarUrlObj),
@@ -94682,19 +95025,17 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94682
95025
  };
94683
95026
  },
94684
95027
  /**
94685
- * Test a workflow with the provided input data. The input data should resemble the input that the trigger will send the workflow. See the [event trigger documentation](https://developer.sailpoint.com/idn/docs/event-triggers/available) for an example input for the trigger that initiates this workflow. This endpoint will return an execution ID, which can be used to lookup more information about the execution using the `Get a Workflow Execution` endpoint. **This will cause a live run of the workflow, which could result in unintended modifications to your IDN tenant.**
94686
- * @summary Test Workflow By Id
95028
+ * Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
95029
+ * @summary Test Workflow via External Trigger
94687
95030
  * @param {string} id Id of the workflow
94688
- * @param {TestWorkflowRequestBeta} testWorkflowRequestBeta
95031
+ * @param {TestExternalExecuteWorkflowRequestBeta} [testExternalExecuteWorkflowRequestBeta]
94689
95032
  * @param {*} [axiosOptions] Override http request option.
94690
95033
  * @throws {RequiredError}
94691
95034
  */
94692
- testWorkflow: async (id: string, testWorkflowRequestBeta: TestWorkflowRequestBeta, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
95035
+ testExternalExecuteWorkflow: async (id: string, testExternalExecuteWorkflowRequestBeta?: TestExternalExecuteWorkflowRequestBeta, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
94693
95036
  // verify required parameter 'id' is not null or undefined
94694
- assertParamExists('testWorkflow', 'id', id)
94695
- // verify required parameter 'testWorkflowRequestBeta' is not null or undefined
94696
- assertParamExists('testWorkflow', 'testWorkflowRequestBeta', testWorkflowRequestBeta)
94697
- const localVarPath = `/workflows/{id}/test`
95037
+ assertParamExists('testExternalExecuteWorkflow', 'id', id)
95038
+ const localVarPath = `/workflows/execute/external/{id}/test`
94698
95039
  .replace(`{${"id"}}`, encodeURIComponent(String(id)));
94699
95040
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
94700
95041
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
@@ -94722,7 +95063,7 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94722
95063
  setSearchParams(localVarUrlObj, localVarQueryParameter);
94723
95064
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
94724
95065
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
94725
- localVarRequestOptions.data = serializeDataIfNeeded(testWorkflowRequestBeta, localVarRequestOptions, configuration)
95066
+ localVarRequestOptions.data = serializeDataIfNeeded(testExternalExecuteWorkflowRequestBeta, localVarRequestOptions, configuration)
94726
95067
 
94727
95068
  return {
94728
95069
  url: toPathString(localVarUrlObj),
@@ -94730,19 +95071,19 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94730
95071
  };
94731
95072
  },
94732
95073
  /**
94733
- * Perform a full update of a workflow. The updated workflow object is returned in the response.
94734
- * @summary Update Workflow
94735
- * @param {string} id Id of the Workflow
94736
- * @param {WorkflowBodyBeta} workflowBodyBeta
95074
+ * Test a workflow with the provided input data. The input data should resemble the input that the trigger will send the workflow. See the [event trigger documentation](https://developer.sailpoint.com/idn/docs/event-triggers/available) for an example input for the trigger that initiates this workflow. This endpoint will return an execution ID, which can be used to lookup more information about the execution using the `Get a Workflow Execution` endpoint. **This will cause a live run of the workflow, which could result in unintended modifications to your IDN tenant.**
95075
+ * @summary Test Workflow By Id
95076
+ * @param {string} id Id of the workflow
95077
+ * @param {TestWorkflowRequestBeta} testWorkflowRequestBeta
94737
95078
  * @param {*} [axiosOptions] Override http request option.
94738
95079
  * @throws {RequiredError}
94739
95080
  */
94740
- updateWorkflow: async (id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
95081
+ testWorkflow: async (id: string, testWorkflowRequestBeta: TestWorkflowRequestBeta, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
94741
95082
  // verify required parameter 'id' is not null or undefined
94742
- assertParamExists('updateWorkflow', 'id', id)
94743
- // verify required parameter 'workflowBodyBeta' is not null or undefined
94744
- assertParamExists('updateWorkflow', 'workflowBodyBeta', workflowBodyBeta)
94745
- const localVarPath = `/workflows/{id}`
95083
+ assertParamExists('testWorkflow', 'id', id)
95084
+ // verify required parameter 'testWorkflowRequestBeta' is not null or undefined
95085
+ assertParamExists('testWorkflow', 'testWorkflowRequestBeta', testWorkflowRequestBeta)
95086
+ const localVarPath = `/workflows/{id}/test`
94746
95087
  .replace(`{${"id"}}`, encodeURIComponent(String(id)));
94747
95088
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
94748
95089
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
@@ -94751,7 +95092,7 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94751
95092
  baseOptions = configuration.baseOptions;
94752
95093
  }
94753
95094
 
94754
- const localVarRequestOptions = { method: 'PUT', ...baseOptions, ...axiosOptions};
95095
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...axiosOptions};
94755
95096
  const localVarHeaderParameter = {} as any;
94756
95097
  const localVarQueryParameter = {} as any;
94757
95098
 
@@ -94770,7 +95111,7 @@ export const WorkflowsBetaApiAxiosParamCreator = function (configuration?: Confi
94770
95111
  setSearchParams(localVarUrlObj, localVarQueryParameter);
94771
95112
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
94772
95113
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
94773
- localVarRequestOptions.data = serializeDataIfNeeded(workflowBodyBeta, localVarRequestOptions, configuration)
95114
+ localVarRequestOptions.data = serializeDataIfNeeded(testWorkflowRequestBeta, localVarRequestOptions, configuration)
94774
95115
 
94775
95116
  return {
94776
95117
  url: toPathString(localVarUrlObj),
@@ -94830,11 +95171,12 @@ export const WorkflowsBetaApiFp = function(configuration?: Configuration) {
94830
95171
  * Get a single workflow by id.
94831
95172
  * @summary Get Workflow By Id
94832
95173
  * @param {string} id Id of the workflow
95174
+ * @param {boolean} [workflowMetrics] disable workflow metrics
94833
95175
  * @param {*} [axiosOptions] Override http request option.
94834
95176
  * @throws {RequiredError}
94835
95177
  */
94836
- async getWorkflow(id: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>> {
94837
- const localVarAxiosArgs = await localVarAxiosParamCreator.getWorkflow(id, axiosOptions);
95178
+ async getWorkflow(id: string, workflowMetrics?: boolean, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>> {
95179
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getWorkflow(id, workflowMetrics, axiosOptions);
94838
95180
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
94839
95181
  const localVarOperationServerBasePath = operationServerMap['WorkflowsBetaApi.getWorkflow']?.[localVarOperationServerIndex]?.url;
94840
95182
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
@@ -94941,11 +95283,15 @@ export const WorkflowsBetaApiFp = function(configuration?: Configuration) {
94941
95283
  /**
94942
95284
  * List all workflows in the tenant.
94943
95285
  * @summary List Workflows
95286
+ * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
95287
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
95288
+ * @param {string} [triggerId] Trigger ID
95289
+ * @param {string} [connectorInstanceId] Connector Instance ID
94944
95290
  * @param {*} [axiosOptions] Override http request option.
94945
95291
  * @throws {RequiredError}
94946
95292
  */
94947
- async listWorkflows(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<WorkflowBeta>>> {
94948
- const localVarAxiosArgs = await localVarAxiosParamCreator.listWorkflows(axiosOptions);
95293
+ async listWorkflows(limit?: number, offset?: number, triggerId?: string, connectorInstanceId?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<WorkflowBeta>>> {
95294
+ const localVarAxiosArgs = await localVarAxiosParamCreator.listWorkflows(limit, offset, triggerId, connectorInstanceId, axiosOptions);
94949
95295
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
94950
95296
  const localVarOperationServerBasePath = operationServerMap['WorkflowsBetaApi.listWorkflows']?.[localVarOperationServerIndex]?.url;
94951
95297
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
@@ -94991,6 +95337,20 @@ export const WorkflowsBetaApiFp = function(configuration?: Configuration) {
94991
95337
  const localVarOperationServerBasePath = operationServerMap['WorkflowsBetaApi.postWorkflowExternalTrigger']?.[localVarOperationServerIndex]?.url;
94992
95338
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
94993
95339
  },
95340
+ /**
95341
+ * Perform a full update of a workflow. The updated workflow object is returned in the response.
95342
+ * @summary Update Workflow
95343
+ * @param {string} id Id of the Workflow
95344
+ * @param {WorkflowBodyBeta} workflowBodyBeta
95345
+ * @param {*} [axiosOptions] Override http request option.
95346
+ * @throws {RequiredError}
95347
+ */
95348
+ async putWorkflow(id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>> {
95349
+ const localVarAxiosArgs = await localVarAxiosParamCreator.putWorkflow(id, workflowBodyBeta, axiosOptions);
95350
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
95351
+ const localVarOperationServerBasePath = operationServerMap['WorkflowsBetaApi.putWorkflow']?.[localVarOperationServerIndex]?.url;
95352
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
95353
+ },
94994
95354
  /**
94995
95355
  * Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
94996
95356
  * @summary Test Workflow via External Trigger
@@ -95019,20 +95379,6 @@ export const WorkflowsBetaApiFp = function(configuration?: Configuration) {
95019
95379
  const localVarOperationServerBasePath = operationServerMap['WorkflowsBetaApi.testWorkflow']?.[localVarOperationServerIndex]?.url;
95020
95380
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
95021
95381
  },
95022
- /**
95023
- * Perform a full update of a workflow. The updated workflow object is returned in the response.
95024
- * @summary Update Workflow
95025
- * @param {string} id Id of the Workflow
95026
- * @param {WorkflowBodyBeta} workflowBodyBeta
95027
- * @param {*} [axiosOptions] Override http request option.
95028
- * @throws {RequiredError}
95029
- */
95030
- async updateWorkflow(id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>> {
95031
- const localVarAxiosArgs = await localVarAxiosParamCreator.updateWorkflow(id, workflowBodyBeta, axiosOptions);
95032
- const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
95033
- const localVarOperationServerBasePath = operationServerMap['WorkflowsBetaApi.updateWorkflow']?.[localVarOperationServerIndex]?.url;
95034
- return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
95035
- },
95036
95382
  }
95037
95383
  };
95038
95384
 
@@ -95081,7 +95427,7 @@ export const WorkflowsBetaApiFactory = function (configuration?: Configuration,
95081
95427
  * @throws {RequiredError}
95082
95428
  */
95083
95429
  getWorkflow(requestParameters: WorkflowsBetaApiGetWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<WorkflowBeta> {
95084
- return localVarFp.getWorkflow(requestParameters.id, axiosOptions).then((request) => request(axios, basePath));
95430
+ return localVarFp.getWorkflow(requestParameters.id, requestParameters.workflowMetrics, axiosOptions).then((request) => request(axios, basePath));
95085
95431
  },
95086
95432
  /**
95087
95433
  * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
@@ -95155,11 +95501,12 @@ export const WorkflowsBetaApiFactory = function (configuration?: Configuration,
95155
95501
  /**
95156
95502
  * List all workflows in the tenant.
95157
95503
  * @summary List Workflows
95504
+ * @param {WorkflowsBetaApiListWorkflowsRequest} requestParameters Request parameters.
95158
95505
  * @param {*} [axiosOptions] Override http request option.
95159
95506
  * @throws {RequiredError}
95160
95507
  */
95161
- listWorkflows(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<WorkflowBeta>> {
95162
- return localVarFp.listWorkflows(axiosOptions).then((request) => request(axios, basePath));
95508
+ listWorkflows(requestParameters: WorkflowsBetaApiListWorkflowsRequest = {}, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<WorkflowBeta>> {
95509
+ return localVarFp.listWorkflows(requestParameters.limit, requestParameters.offset, requestParameters.triggerId, requestParameters.connectorInstanceId, axiosOptions).then((request) => request(axios, basePath));
95163
95510
  },
95164
95511
  /**
95165
95512
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
@@ -95191,6 +95538,16 @@ export const WorkflowsBetaApiFactory = function (configuration?: Configuration,
95191
95538
  postWorkflowExternalTrigger(requestParameters: WorkflowsBetaApiPostWorkflowExternalTriggerRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<WorkflowOAuthClientBeta> {
95192
95539
  return localVarFp.postWorkflowExternalTrigger(requestParameters.id, axiosOptions).then((request) => request(axios, basePath));
95193
95540
  },
95541
+ /**
95542
+ * Perform a full update of a workflow. The updated workflow object is returned in the response.
95543
+ * @summary Update Workflow
95544
+ * @param {WorkflowsBetaApiPutWorkflowRequest} requestParameters Request parameters.
95545
+ * @param {*} [axiosOptions] Override http request option.
95546
+ * @throws {RequiredError}
95547
+ */
95548
+ putWorkflow(requestParameters: WorkflowsBetaApiPutWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<WorkflowBeta> {
95549
+ return localVarFp.putWorkflow(requestParameters.id, requestParameters.workflowBodyBeta, axiosOptions).then((request) => request(axios, basePath));
95550
+ },
95194
95551
  /**
95195
95552
  * Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
95196
95553
  * @summary Test Workflow via External Trigger
@@ -95211,16 +95568,6 @@ export const WorkflowsBetaApiFactory = function (configuration?: Configuration,
95211
95568
  testWorkflow(requestParameters: WorkflowsBetaApiTestWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<TestWorkflow200ResponseBeta> {
95212
95569
  return localVarFp.testWorkflow(requestParameters.id, requestParameters.testWorkflowRequestBeta, axiosOptions).then((request) => request(axios, basePath));
95213
95570
  },
95214
- /**
95215
- * Perform a full update of a workflow. The updated workflow object is returned in the response.
95216
- * @summary Update Workflow
95217
- * @param {WorkflowsBetaApiUpdateWorkflowRequest} requestParameters Request parameters.
95218
- * @param {*} [axiosOptions] Override http request option.
95219
- * @throws {RequiredError}
95220
- */
95221
- updateWorkflow(requestParameters: WorkflowsBetaApiUpdateWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<WorkflowBeta> {
95222
- return localVarFp.updateWorkflow(requestParameters.id, requestParameters.workflowBodyBeta, axiosOptions).then((request) => request(axios, basePath));
95223
- },
95224
95571
  };
95225
95572
  };
95226
95573
 
@@ -95278,6 +95625,13 @@ export interface WorkflowsBetaApiGetWorkflowRequest {
95278
95625
  * @memberof WorkflowsBetaApiGetWorkflow
95279
95626
  */
95280
95627
  readonly id: string
95628
+
95629
+ /**
95630
+ * disable workflow metrics
95631
+ * @type {boolean}
95632
+ * @memberof WorkflowsBetaApiGetWorkflow
95633
+ */
95634
+ readonly workflowMetrics?: boolean
95281
95635
  }
95282
95636
 
95283
95637
  /**
@@ -95427,6 +95781,41 @@ export interface WorkflowsBetaApiListWorkflowLibraryTriggersRequest {
95427
95781
  readonly filters?: string
95428
95782
  }
95429
95783
 
95784
+ /**
95785
+ * Request parameters for listWorkflows operation in WorkflowsBetaApi.
95786
+ * @export
95787
+ * @interface WorkflowsBetaApiListWorkflowsRequest
95788
+ */
95789
+ export interface WorkflowsBetaApiListWorkflowsRequest {
95790
+ /**
95791
+ * Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
95792
+ * @type {number}
95793
+ * @memberof WorkflowsBetaApiListWorkflows
95794
+ */
95795
+ readonly limit?: number
95796
+
95797
+ /**
95798
+ * Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
95799
+ * @type {number}
95800
+ * @memberof WorkflowsBetaApiListWorkflows
95801
+ */
95802
+ readonly offset?: number
95803
+
95804
+ /**
95805
+ * Trigger ID
95806
+ * @type {string}
95807
+ * @memberof WorkflowsBetaApiListWorkflows
95808
+ */
95809
+ readonly triggerId?: string
95810
+
95811
+ /**
95812
+ * Connector Instance ID
95813
+ * @type {string}
95814
+ * @memberof WorkflowsBetaApiListWorkflows
95815
+ */
95816
+ readonly connectorInstanceId?: string
95817
+ }
95818
+
95430
95819
  /**
95431
95820
  * Request parameters for patchWorkflow operation in WorkflowsBetaApi.
95432
95821
  * @export
@@ -95483,6 +95872,27 @@ export interface WorkflowsBetaApiPostWorkflowExternalTriggerRequest {
95483
95872
  readonly id: string
95484
95873
  }
95485
95874
 
95875
+ /**
95876
+ * Request parameters for putWorkflow operation in WorkflowsBetaApi.
95877
+ * @export
95878
+ * @interface WorkflowsBetaApiPutWorkflowRequest
95879
+ */
95880
+ export interface WorkflowsBetaApiPutWorkflowRequest {
95881
+ /**
95882
+ * Id of the Workflow
95883
+ * @type {string}
95884
+ * @memberof WorkflowsBetaApiPutWorkflow
95885
+ */
95886
+ readonly id: string
95887
+
95888
+ /**
95889
+ *
95890
+ * @type {WorkflowBodyBeta}
95891
+ * @memberof WorkflowsBetaApiPutWorkflow
95892
+ */
95893
+ readonly workflowBodyBeta: WorkflowBodyBeta
95894
+ }
95895
+
95486
95896
  /**
95487
95897
  * Request parameters for testExternalExecuteWorkflow operation in WorkflowsBetaApi.
95488
95898
  * @export
@@ -95525,27 +95935,6 @@ export interface WorkflowsBetaApiTestWorkflowRequest {
95525
95935
  readonly testWorkflowRequestBeta: TestWorkflowRequestBeta
95526
95936
  }
95527
95937
 
95528
- /**
95529
- * Request parameters for updateWorkflow operation in WorkflowsBetaApi.
95530
- * @export
95531
- * @interface WorkflowsBetaApiUpdateWorkflowRequest
95532
- */
95533
- export interface WorkflowsBetaApiUpdateWorkflowRequest {
95534
- /**
95535
- * Id of the Workflow
95536
- * @type {string}
95537
- * @memberof WorkflowsBetaApiUpdateWorkflow
95538
- */
95539
- readonly id: string
95540
-
95541
- /**
95542
- *
95543
- * @type {WorkflowBodyBeta}
95544
- * @memberof WorkflowsBetaApiUpdateWorkflow
95545
- */
95546
- readonly workflowBodyBeta: WorkflowBodyBeta
95547
- }
95548
-
95549
95938
  /**
95550
95939
  * WorkflowsBetaApi - object-oriented interface
95551
95940
  * @export
@@ -95598,7 +95987,7 @@ export class WorkflowsBetaApi extends BaseAPI {
95598
95987
  * @memberof WorkflowsBetaApi
95599
95988
  */
95600
95989
  public getWorkflow(requestParameters: WorkflowsBetaApiGetWorkflowRequest, axiosOptions?: RawAxiosRequestConfig) {
95601
- return WorkflowsBetaApiFp(this.configuration).getWorkflow(requestParameters.id, axiosOptions).then((request) => request(this.axios, this.basePath));
95990
+ return WorkflowsBetaApiFp(this.configuration).getWorkflow(requestParameters.id, requestParameters.workflowMetrics, axiosOptions).then((request) => request(this.axios, this.basePath));
95602
95991
  }
95603
95992
 
95604
95993
  /**
@@ -95687,12 +96076,13 @@ export class WorkflowsBetaApi extends BaseAPI {
95687
96076
  /**
95688
96077
  * List all workflows in the tenant.
95689
96078
  * @summary List Workflows
96079
+ * @param {WorkflowsBetaApiListWorkflowsRequest} requestParameters Request parameters.
95690
96080
  * @param {*} [axiosOptions] Override http request option.
95691
96081
  * @throws {RequiredError}
95692
96082
  * @memberof WorkflowsBetaApi
95693
96083
  */
95694
- public listWorkflows(axiosOptions?: RawAxiosRequestConfig) {
95695
- return WorkflowsBetaApiFp(this.configuration).listWorkflows(axiosOptions).then((request) => request(this.axios, this.basePath));
96084
+ public listWorkflows(requestParameters: WorkflowsBetaApiListWorkflowsRequest = {}, axiosOptions?: RawAxiosRequestConfig) {
96085
+ return WorkflowsBetaApiFp(this.configuration).listWorkflows(requestParameters.limit, requestParameters.offset, requestParameters.triggerId, requestParameters.connectorInstanceId, axiosOptions).then((request) => request(this.axios, this.basePath));
95696
96086
  }
95697
96087
 
95698
96088
  /**
@@ -95731,6 +96121,18 @@ export class WorkflowsBetaApi extends BaseAPI {
95731
96121
  return WorkflowsBetaApiFp(this.configuration).postWorkflowExternalTrigger(requestParameters.id, axiosOptions).then((request) => request(this.axios, this.basePath));
95732
96122
  }
95733
96123
 
96124
+ /**
96125
+ * Perform a full update of a workflow. The updated workflow object is returned in the response.
96126
+ * @summary Update Workflow
96127
+ * @param {WorkflowsBetaApiPutWorkflowRequest} requestParameters Request parameters.
96128
+ * @param {*} [axiosOptions] Override http request option.
96129
+ * @throws {RequiredError}
96130
+ * @memberof WorkflowsBetaApi
96131
+ */
96132
+ public putWorkflow(requestParameters: WorkflowsBetaApiPutWorkflowRequest, axiosOptions?: RawAxiosRequestConfig) {
96133
+ return WorkflowsBetaApiFp(this.configuration).putWorkflow(requestParameters.id, requestParameters.workflowBodyBeta, axiosOptions).then((request) => request(this.axios, this.basePath));
96134
+ }
96135
+
95734
96136
  /**
95735
96137
  * Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
95736
96138
  * @summary Test Workflow via External Trigger
@@ -95754,18 +96156,6 @@ export class WorkflowsBetaApi extends BaseAPI {
95754
96156
  public testWorkflow(requestParameters: WorkflowsBetaApiTestWorkflowRequest, axiosOptions?: RawAxiosRequestConfig) {
95755
96157
  return WorkflowsBetaApiFp(this.configuration).testWorkflow(requestParameters.id, requestParameters.testWorkflowRequestBeta, axiosOptions).then((request) => request(this.axios, this.basePath));
95756
96158
  }
95757
-
95758
- /**
95759
- * Perform a full update of a workflow. The updated workflow object is returned in the response.
95760
- * @summary Update Workflow
95761
- * @param {WorkflowsBetaApiUpdateWorkflowRequest} requestParameters Request parameters.
95762
- * @param {*} [axiosOptions] Override http request option.
95763
- * @throws {RequiredError}
95764
- * @memberof WorkflowsBetaApi
95765
- */
95766
- public updateWorkflow(requestParameters: WorkflowsBetaApiUpdateWorkflowRequest, axiosOptions?: RawAxiosRequestConfig) {
95767
- return WorkflowsBetaApiFp(this.configuration).updateWorkflow(requestParameters.id, requestParameters.workflowBodyBeta, axiosOptions).then((request) => request(this.axios, this.basePath));
95768
- }
95769
96159
  }
95770
96160
 
95771
96161