sailpoint-api-client 1.8.1 → 1.8.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +50 -11
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +47 -11
- package/dist/beta/api.js +26 -22
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +2 -2
- package/dist/nerm/common.js +2 -2
- package/dist/nermv2025/common.js +2 -2
- package/dist/v2024/api.d.ts +47 -11
- package/dist/v2024/api.js +29 -25
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +2 -2
- package/dist/v2025/api.d.ts +47 -11
- package/dist/v2025/api.js +31 -27
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +2 -2
- package/dist/v2026/api.d.ts +691 -0
- package/dist/v2026/api.js +635 -2
- package/dist/v2026/api.js.map +1 -1
- package/dist/v2026/common.js +2 -2
- package/dist/v3/api.d.ts +47 -11
- package/dist/v3/api.js +22 -18
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +2 -2
- package/nerm/README.md +2 -2
- package/nerm/common.ts +2 -2
- package/nerm/package.json +1 -1
- package/nermv2025/README.md +2 -2
- package/nermv2025/common.ts +2 -2
- package/nermv2025/package.json +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +50 -11
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +50 -11
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v2026/README.md +2 -2
- package/v2026/api.ts +1010 -0
- package/v2026/common.ts +2 -2
- package/v2026/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +50 -11
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/v2026/common.ts
CHANGED
|
@@ -146,14 +146,14 @@ export const toPathString = function (url: URL) {
|
|
|
146
146
|
export const createRequestFunction = function (axiosArgs: RequestArgs, globalAxios: AxiosInstance, BASE_PATH: string, configuration?: Configuration) {
|
|
147
147
|
return <T = unknown, R = AxiosResponse<T>>(axios: AxiosInstance = globalAxios, basePath: string = BASE_PATH) => {
|
|
148
148
|
axiosRetry(axios, configuration.retriesConfig)
|
|
149
|
-
let userAgent = `SailPoint-SDK-TypeScript/1.8.
|
|
149
|
+
let userAgent = `SailPoint-SDK-TypeScript/1.8.3`;
|
|
150
150
|
if (configuration?.consumerIdentifier && configuration?.consumerVersion) {
|
|
151
151
|
userAgent += ` (${configuration.consumerIdentifier}/${configuration.consumerVersion})`;
|
|
152
152
|
}
|
|
153
153
|
userAgent += ` (${process.platform}; ${process.arch}) Node/${process.versions.node} (openapi-generator/7.12.0)`;
|
|
154
154
|
const headers = {
|
|
155
155
|
...axiosArgs.axiosOptions.headers,
|
|
156
|
-
...{'X-SailPoint-SDK':'typescript-1.8.
|
|
156
|
+
...{'X-SailPoint-SDK':'typescript-1.8.3'},
|
|
157
157
|
...{'User-Agent': userAgent},
|
|
158
158
|
}
|
|
159
159
|
|
package/v2026/package.json
CHANGED
package/v3/README.md
CHANGED
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
## sailpoint-sdk@1.8.
|
|
1
|
+
## sailpoint-sdk@1.8.3
|
|
2
2
|
|
|
3
3
|
This generator creates TypeScript/JavaScript client that utilizes [axios](https://github.com/axios/axios). The generated Node module can be used in the following environments:
|
|
4
4
|
|
|
@@ -36,7 +36,7 @@ navigate to the folder of your consuming project and run one of the following co
|
|
|
36
36
|
_published:_
|
|
37
37
|
|
|
38
38
|
```
|
|
39
|
-
npm install sailpoint-sdk@1.8.
|
|
39
|
+
npm install sailpoint-sdk@1.8.3 --save
|
|
40
40
|
```
|
|
41
41
|
|
|
42
42
|
_unPublished (not recommended):_
|
package/v3/api.ts
CHANGED
|
@@ -561,11 +561,11 @@ export interface AccessProfile {
|
|
|
561
561
|
*/
|
|
562
562
|
'provisioningCriteria'?: ProvisioningCriteriaLevel1 | null;
|
|
563
563
|
/**
|
|
564
|
-
*
|
|
565
|
-
* @type {Array<
|
|
564
|
+
* List of additional owner references beyond the primary owner. Each entry may be an identity (IDENTITY) or a governance group (GOVERNANCE_GROUP).
|
|
565
|
+
* @type {Array<AdditionalOwnerRef>}
|
|
566
566
|
* @memberof AccessProfile
|
|
567
567
|
*/
|
|
568
|
-
'additionalOwners'?: Array<
|
|
568
|
+
'additionalOwners'?: Array<AdditionalOwnerRef> | null;
|
|
569
569
|
}
|
|
570
570
|
/**
|
|
571
571
|
*
|
|
@@ -2956,6 +2956,39 @@ export const ActivityInsightsUsageDaysStateV3 = {
|
|
|
2956
2956
|
|
|
2957
2957
|
export type ActivityInsightsUsageDaysStateV3 = typeof ActivityInsightsUsageDaysStateV3[keyof typeof ActivityInsightsUsageDaysStateV3];
|
|
2958
2958
|
|
|
2959
|
+
/**
|
|
2960
|
+
* Reference to an additional owner (identity or governance group).
|
|
2961
|
+
* @export
|
|
2962
|
+
* @interface AdditionalOwnerRef
|
|
2963
|
+
*/
|
|
2964
|
+
export interface AdditionalOwnerRef {
|
|
2965
|
+
/**
|
|
2966
|
+
* Type of the additional owner; IDENTITY for an identity, GOVERNANCE_GROUP for a governance group.
|
|
2967
|
+
* @type {string}
|
|
2968
|
+
* @memberof AdditionalOwnerRef
|
|
2969
|
+
*/
|
|
2970
|
+
'type'?: AdditionalOwnerRefTypeV3;
|
|
2971
|
+
/**
|
|
2972
|
+
* ID of the identity or governance group.
|
|
2973
|
+
* @type {string}
|
|
2974
|
+
* @memberof AdditionalOwnerRef
|
|
2975
|
+
*/
|
|
2976
|
+
'id'?: string;
|
|
2977
|
+
/**
|
|
2978
|
+
* Display name. It may be left null or omitted on input. If set, it must match the current display name of the identity or governance group, otherwise a 400 Bad Request error may result.
|
|
2979
|
+
* @type {string}
|
|
2980
|
+
* @memberof AdditionalOwnerRef
|
|
2981
|
+
*/
|
|
2982
|
+
'name'?: string | null;
|
|
2983
|
+
}
|
|
2984
|
+
|
|
2985
|
+
export const AdditionalOwnerRefTypeV3 = {
|
|
2986
|
+
Identity: 'IDENTITY',
|
|
2987
|
+
GovernanceGroup: 'GOVERNANCE_GROUP'
|
|
2988
|
+
} as const;
|
|
2989
|
+
|
|
2990
|
+
export type AdditionalOwnerRefTypeV3 = typeof AdditionalOwnerRefTypeV3[keyof typeof AdditionalOwnerRefTypeV3];
|
|
2991
|
+
|
|
2959
2992
|
/**
|
|
2960
2993
|
*
|
|
2961
2994
|
* @export
|
|
@@ -18767,6 +18800,12 @@ export interface Role {
|
|
|
18767
18800
|
* @memberof Role
|
|
18768
18801
|
*/
|
|
18769
18802
|
'owner': OwnerReference;
|
|
18803
|
+
/**
|
|
18804
|
+
* List of additional owner references beyond the primary owner. Each entry may be an identity (IDENTITY) or a governance group (GOVERNANCE_GROUP).
|
|
18805
|
+
* @type {Array<AdditionalOwnerRef>}
|
|
18806
|
+
* @memberof Role
|
|
18807
|
+
*/
|
|
18808
|
+
'additionalOwners'?: Array<AdditionalOwnerRef> | null;
|
|
18770
18809
|
/**
|
|
18771
18810
|
*
|
|
18772
18811
|
* @type {Array<AccessProfileRef>}
|
|
@@ -26017,7 +26056,7 @@ export const AccessProfilesApiAxiosParamCreator = function (configuration?: Conf
|
|
|
26017
26056
|
};
|
|
26018
26057
|
},
|
|
26019
26058
|
/**
|
|
26020
|
-
* This API updates an existing Access Profile. The following fields are patchable: **name** **description** **enabled** **owner** **requestable** **accessRequestConfig** **revokeRequestConfig** **segments** **entitlements** **provisioningCriteria** **source** (must be updated with entitlements belonging to new source in the same API call) If you need to change the `source` of the access profile, you can do so only if you update the `entitlements` in the same API call. The new entitlements can only come from the target source that you want to change to. Look for the example \"Replace Source\" in the examples dropdown. A user with SOURCE_SUBADMIN may only use this API to patch Access Profiles which are associated with Sources they are able to administer. > The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles, however, any new access profiles as well as any updates to existing descriptions will be limited to 2000 characters. > You can only add or replace **entitlements** that exist on the source that the access profile is attached to. You can use the **list entitlements** endpoint with the **filters** query parameter to get a list of available entitlements on the access profile\'s source.
|
|
26059
|
+
* This API updates an existing Access Profile. The following fields are patchable: **name** **description** **enabled** **owner** **additionalOwners** **requestable** **accessRequestConfig** **revokeRequestConfig** **segments** **entitlements** **provisioningCriteria** **source** (must be updated with entitlements belonging to new source in the same API call) If you need to change the `source` of the access profile, you can do so only if you update the `entitlements` in the same API call. The new entitlements can only come from the target source that you want to change to. Look for the example \"Replace Source\" in the examples dropdown. A user with SOURCE_SUBADMIN may only use this API to patch Access Profiles which are associated with Sources they are able to administer. > The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles, however, any new access profiles as well as any updates to existing descriptions will be limited to 2000 characters. > You can only add or replace **entitlements** that exist on the source that the access profile is attached to. You can use the **list entitlements** endpoint with the **filters** query parameter to get a list of available entitlements on the access profile\'s source.
|
|
26021
26060
|
* @summary Patch a specified access profile
|
|
26022
26061
|
* @param {string} id ID of the Access Profile to patch
|
|
26023
26062
|
* @param {Array<JsonPatchOperation>} jsonPatchOperation
|
|
@@ -26165,7 +26204,7 @@ export const AccessProfilesApiFp = function(configuration?: Configuration) {
|
|
|
26165
26204
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
26166
26205
|
},
|
|
26167
26206
|
/**
|
|
26168
|
-
* This API updates an existing Access Profile. The following fields are patchable: **name** **description** **enabled** **owner** **requestable** **accessRequestConfig** **revokeRequestConfig** **segments** **entitlements** **provisioningCriteria** **source** (must be updated with entitlements belonging to new source in the same API call) If you need to change the `source` of the access profile, you can do so only if you update the `entitlements` in the same API call. The new entitlements can only come from the target source that you want to change to. Look for the example \"Replace Source\" in the examples dropdown. A user with SOURCE_SUBADMIN may only use this API to patch Access Profiles which are associated with Sources they are able to administer. > The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles, however, any new access profiles as well as any updates to existing descriptions will be limited to 2000 characters. > You can only add or replace **entitlements** that exist on the source that the access profile is attached to. You can use the **list entitlements** endpoint with the **filters** query parameter to get a list of available entitlements on the access profile\'s source.
|
|
26207
|
+
* This API updates an existing Access Profile. The following fields are patchable: **name** **description** **enabled** **owner** **additionalOwners** **requestable** **accessRequestConfig** **revokeRequestConfig** **segments** **entitlements** **provisioningCriteria** **source** (must be updated with entitlements belonging to new source in the same API call) If you need to change the `source` of the access profile, you can do so only if you update the `entitlements` in the same API call. The new entitlements can only come from the target source that you want to change to. Look for the example \"Replace Source\" in the examples dropdown. A user with SOURCE_SUBADMIN may only use this API to patch Access Profiles which are associated with Sources they are able to administer. > The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles, however, any new access profiles as well as any updates to existing descriptions will be limited to 2000 characters. > You can only add or replace **entitlements** that exist on the source that the access profile is attached to. You can use the **list entitlements** endpoint with the **filters** query parameter to get a list of available entitlements on the access profile\'s source.
|
|
26169
26208
|
* @summary Patch a specified access profile
|
|
26170
26209
|
* @param {string} id ID of the Access Profile to patch
|
|
26171
26210
|
* @param {Array<JsonPatchOperation>} jsonPatchOperation
|
|
@@ -26249,7 +26288,7 @@ export const AccessProfilesApiFactory = function (configuration?: Configuration,
|
|
|
26249
26288
|
return localVarFp.listAccessProfiles(requestParameters.forSubadmin, requestParameters.limit, requestParameters.offset, requestParameters.count, requestParameters.filters, requestParameters.sorters, requestParameters.forSegmentIds, requestParameters.includeUnsegmented, axiosOptions).then((request) => request(axios, basePath));
|
|
26250
26289
|
},
|
|
26251
26290
|
/**
|
|
26252
|
-
* This API updates an existing Access Profile. The following fields are patchable: **name** **description** **enabled** **owner** **requestable** **accessRequestConfig** **revokeRequestConfig** **segments** **entitlements** **provisioningCriteria** **source** (must be updated with entitlements belonging to new source in the same API call) If you need to change the `source` of the access profile, you can do so only if you update the `entitlements` in the same API call. The new entitlements can only come from the target source that you want to change to. Look for the example \"Replace Source\" in the examples dropdown. A user with SOURCE_SUBADMIN may only use this API to patch Access Profiles which are associated with Sources they are able to administer. > The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles, however, any new access profiles as well as any updates to existing descriptions will be limited to 2000 characters. > You can only add or replace **entitlements** that exist on the source that the access profile is attached to. You can use the **list entitlements** endpoint with the **filters** query parameter to get a list of available entitlements on the access profile\'s source.
|
|
26291
|
+
* This API updates an existing Access Profile. The following fields are patchable: **name** **description** **enabled** **owner** **additionalOwners** **requestable** **accessRequestConfig** **revokeRequestConfig** **segments** **entitlements** **provisioningCriteria** **source** (must be updated with entitlements belonging to new source in the same API call) If you need to change the `source` of the access profile, you can do so only if you update the `entitlements` in the same API call. The new entitlements can only come from the target source that you want to change to. Look for the example \"Replace Source\" in the examples dropdown. A user with SOURCE_SUBADMIN may only use this API to patch Access Profiles which are associated with Sources they are able to administer. > The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles, however, any new access profiles as well as any updates to existing descriptions will be limited to 2000 characters. > You can only add or replace **entitlements** that exist on the source that the access profile is attached to. You can use the **list entitlements** endpoint with the **filters** query parameter to get a list of available entitlements on the access profile\'s source.
|
|
26253
26292
|
* @summary Patch a specified access profile
|
|
26254
26293
|
* @param {AccessProfilesApiPatchAccessProfileRequest} requestParameters Request parameters.
|
|
26255
26294
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -26530,7 +26569,7 @@ export class AccessProfilesApi extends BaseAPI {
|
|
|
26530
26569
|
}
|
|
26531
26570
|
|
|
26532
26571
|
/**
|
|
26533
|
-
* This API updates an existing Access Profile. The following fields are patchable: **name** **description** **enabled** **owner** **requestable** **accessRequestConfig** **revokeRequestConfig** **segments** **entitlements** **provisioningCriteria** **source** (must be updated with entitlements belonging to new source in the same API call) If you need to change the `source` of the access profile, you can do so only if you update the `entitlements` in the same API call. The new entitlements can only come from the target source that you want to change to. Look for the example \"Replace Source\" in the examples dropdown. A user with SOURCE_SUBADMIN may only use this API to patch Access Profiles which are associated with Sources they are able to administer. > The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles, however, any new access profiles as well as any updates to existing descriptions will be limited to 2000 characters. > You can only add or replace **entitlements** that exist on the source that the access profile is attached to. You can use the **list entitlements** endpoint with the **filters** query parameter to get a list of available entitlements on the access profile\'s source.
|
|
26572
|
+
* This API updates an existing Access Profile. The following fields are patchable: **name** **description** **enabled** **owner** **additionalOwners** **requestable** **accessRequestConfig** **revokeRequestConfig** **segments** **entitlements** **provisioningCriteria** **source** (must be updated with entitlements belonging to new source in the same API call) If you need to change the `source` of the access profile, you can do so only if you update the `entitlements` in the same API call. The new entitlements can only come from the target source that you want to change to. Look for the example \"Replace Source\" in the examples dropdown. A user with SOURCE_SUBADMIN may only use this API to patch Access Profiles which are associated with Sources they are able to administer. > The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles, however, any new access profiles as well as any updates to existing descriptions will be limited to 2000 characters. > You can only add or replace **entitlements** that exist on the source that the access profile is attached to. You can use the **list entitlements** endpoint with the **filters** query parameter to get a list of available entitlements on the access profile\'s source.
|
|
26534
26573
|
* @summary Patch a specified access profile
|
|
26535
26574
|
* @param {AccessProfilesApiPatchAccessProfileRequest} requestParameters Request parameters.
|
|
26536
26575
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -51378,7 +51417,7 @@ export const RolesApiAxiosParamCreator = function (configuration?: Configuration
|
|
|
51378
51417
|
};
|
|
51379
51418
|
},
|
|
51380
51419
|
/**
|
|
51381
|
-
* Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
|
|
51420
|
+
* Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * additionalOwners * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
|
|
51382
51421
|
* @summary Patch role
|
|
51383
51422
|
* @param {string} id Role ID to patch
|
|
51384
51423
|
* @param {Array<JsonPatchOperation>} jsonPatchOperation
|
|
@@ -51526,7 +51565,7 @@ export const RolesApiFp = function(configuration?: Configuration) {
|
|
|
51526
51565
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
51527
51566
|
},
|
|
51528
51567
|
/**
|
|
51529
|
-
* Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
|
|
51568
|
+
* Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * additionalOwners * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
|
|
51530
51569
|
* @summary Patch role
|
|
51531
51570
|
* @param {string} id Role ID to patch
|
|
51532
51571
|
* @param {Array<JsonPatchOperation>} jsonPatchOperation
|
|
@@ -51610,7 +51649,7 @@ export const RolesApiFactory = function (configuration?: Configuration, basePath
|
|
|
51610
51649
|
return localVarFp.listRoles(requestParameters.forSubadmin, requestParameters.limit, requestParameters.offset, requestParameters.count, requestParameters.filters, requestParameters.sorters, requestParameters.forSegmentIds, requestParameters.includeUnsegmented, axiosOptions).then((request) => request(axios, basePath));
|
|
51611
51650
|
},
|
|
51612
51651
|
/**
|
|
51613
|
-
* Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
|
|
51652
|
+
* Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * additionalOwners * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
|
|
51614
51653
|
* @summary Patch role
|
|
51615
51654
|
* @param {RolesApiPatchRoleRequest} requestParameters Request parameters.
|
|
51616
51655
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -51891,7 +51930,7 @@ export class RolesApi extends BaseAPI {
|
|
|
51891
51930
|
}
|
|
51892
51931
|
|
|
51893
51932
|
/**
|
|
51894
|
-
* Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
|
|
51933
|
+
* Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * additionalOwners * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
|
|
51895
51934
|
* @summary Patch role
|
|
51896
51935
|
* @param {RolesApiPatchRoleRequest} requestParameters Request parameters.
|
|
51897
51936
|
* @param {*} [axiosOptions] Override http request option.
|
package/v3/common.ts
CHANGED
|
@@ -146,14 +146,14 @@ export const toPathString = function (url: URL) {
|
|
|
146
146
|
export const createRequestFunction = function (axiosArgs: RequestArgs, globalAxios: AxiosInstance, BASE_PATH: string, configuration?: Configuration) {
|
|
147
147
|
return <T = unknown, R = AxiosResponse<T>>(axios: AxiosInstance = globalAxios, basePath: string = BASE_PATH) => {
|
|
148
148
|
axiosRetry(axios, configuration.retriesConfig)
|
|
149
|
-
let userAgent = `SailPoint-SDK-TypeScript/1.8.
|
|
149
|
+
let userAgent = `SailPoint-SDK-TypeScript/1.8.3`;
|
|
150
150
|
if (configuration?.consumerIdentifier && configuration?.consumerVersion) {
|
|
151
151
|
userAgent += ` (${configuration.consumerIdentifier}/${configuration.consumerVersion})`;
|
|
152
152
|
}
|
|
153
153
|
userAgent += ` (${process.platform}; ${process.arch}) Node/${process.versions.node} (openapi-generator/7.12.0)`;
|
|
154
154
|
const headers = {
|
|
155
155
|
...axiosArgs.axiosOptions.headers,
|
|
156
|
-
...{'X-SailPoint-SDK':'typescript-1.8.
|
|
156
|
+
...{'X-SailPoint-SDK':'typescript-1.8.3'},
|
|
157
157
|
...{'User-Agent': userAgent},
|
|
158
158
|
}
|
|
159
159
|
|