Huge News!Announcing our $40M Series B led by Abstract Ventures.Learn More
Socket
Sign inDemoInstall
Socket

@equisoft/equisoft-connect-sdk-typescript

Package Overview
Dependencies
Maintainers
11
Versions
375
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@equisoft/equisoft-connect-sdk-typescript - npm Package Compare versions

Comparing version 11.0.8-snapshot.20230106151005 to 11.0.8

12

dist/models/GatewaysCredentials.d.ts

@@ -31,14 +31,2 @@ /**

/**
* FirstName
* @type {string}
* @memberof GatewaysCredentials
*/
firstName?: string | null;
/**
* LastName
* @type {string}
* @memberof GatewaysCredentials
*/
lastName?: string | null;
/**
* Rep code

@@ -45,0 +33,0 @@ * @type {string}

4

dist/models/GatewaysCredentials.js

@@ -39,4 +39,2 @@ "use strict";

'password': json['password'],
'firstName': !runtime_1.exists(json, 'firstName') ? undefined : json['firstName'],
'lastName': !runtime_1.exists(json, 'lastName') ? undefined : json['lastName'],
'repcode': !runtime_1.exists(json, 'repcode') ? undefined : json['repcode'],

@@ -58,4 +56,2 @@ 'isADealerCode': !runtime_1.exists(json, 'isADealerCode') ? undefined : json['isADealerCode'],

'password': value.password,
'firstName': value.firstName,
'lastName': value.lastName,
'repcode': value.repcode,

@@ -62,0 +58,0 @@ 'isADealerCode': value.isADealerCode,

@@ -31,14 +31,2 @@ /**

/**
* FirstName
* @type {string}
* @memberof GatewaysCredentialsWithSsn
*/
firstName?: string | null;
/**
* LastName
* @type {string}
* @memberof GatewaysCredentialsWithSsn
*/
lastName?: string | null;
/**
* Rep code

@@ -45,0 +33,0 @@ * @type {string}

@@ -39,4 +39,2 @@ "use strict";

'password': json['password'],
'firstName': !runtime_1.exists(json, 'firstName') ? undefined : json['firstName'],
'lastName': !runtime_1.exists(json, 'lastName') ? undefined : json['lastName'],
'repcode': !runtime_1.exists(json, 'repcode') ? undefined : json['repcode'],

@@ -59,4 +57,2 @@ 'isADealerCode': !runtime_1.exists(json, 'isADealerCode') ? undefined : json['isADealerCode'],

'password': value.password,
'firstName': value.firstName,
'lastName': value.lastName,
'repcode': value.repcode,

@@ -63,0 +59,0 @@ 'isADealerCode': value.isADealerCode,

@@ -188,2 +188,1 @@ export * from './AccessRights';

export * from './UsersUser';
export * from './UsersUserGroup';

@@ -202,2 +202,1 @@ "use strict";

__exportStar(require("./UsersUser"), exports);
__exportStar(require("./UsersUserGroup"), exports);

23

dist/models/LegacyProvisioningUserPayload.d.ts

@@ -13,2 +13,3 @@ /**

import type { LegacyContactAddress } from './LegacyContactAddress';
import type { LegacyProvisioningUserIdentifier } from './LegacyProvisioningUserIdentifier';
/**

@@ -61,3 +62,4 @@ *

/**
* DEPRECATED this option does nothing
* User initial password.
* A random password will be set if none is specified and noPassword option is not used.
* @type {string}

@@ -68,3 +70,5 @@ * @memberof LegacyProvisioningUserPayload

/**
* DEPRECATED this option does nothing
* Disable password authentication.
* Accepts true or false.
* Default false
* @type {string}

@@ -75,3 +79,5 @@ * @memberof LegacyProvisioningUserPayload

/**
* DEPRECATED this option does nothing
* The user will be ask to define a new password on the first login
* Accepts true or false.
* Default true
* @type {string}

@@ -82,3 +88,6 @@ * @memberof LegacyProvisioningUserPayload

/**
* DEPRECATED this option does nothing
* Enable Mobile version.
* Deprecated: the mobile is not enabled per user anymore.
* Accepts true or false.
* Default false
* @type {string}

@@ -89,2 +98,8 @@ * @memberof LegacyProvisioningUserPayload

/**
* List of identifier to uniquely identify the user.
* @type {Array<LegacyProvisioningUserIdentifier>}
* @memberof LegacyProvisioningUserPayload
*/
externalIdentifiers?: Array<LegacyProvisioningUserIdentifier>;
/**
* Allow the user to delegate access to his data

@@ -91,0 +106,0 @@ * Accepts true or false.

@@ -19,2 +19,3 @@ "use strict";

const LegacyContactAddress_1 = require("./LegacyContactAddress");
const LegacyProvisioningUserIdentifier_1 = require("./LegacyProvisioningUserIdentifier");
/**

@@ -47,2 +48,3 @@ * Check if a given object implements the LegacyProvisioningUserPayload interface.

'enableMobile': !runtime_1.exists(json, 'enableMobile') ? undefined : json['enableMobile'],
'externalIdentifiers': !runtime_1.exists(json, 'externalIdentifiers') ? undefined : (json['externalIdentifiers'].map(LegacyProvisioningUserIdentifier_1.LegacyProvisioningUserIdentifierFromJSON)),
'allowDelegation': !runtime_1.exists(json, 'allowDelegation') ? undefined : json['allowDelegation'],

@@ -79,2 +81,3 @@ 'gender': !runtime_1.exists(json, 'gender') ? undefined : json['gender'],

'enableMobile': value.enableMobile,
'externalIdentifiers': value.externalIdentifiers === undefined ? undefined : (value.externalIdentifiers.map(LegacyProvisioningUserIdentifier_1.LegacyProvisioningUserIdentifierToJSON)),
'allowDelegation': value.allowDelegation,

@@ -81,0 +84,0 @@ 'gender': value.gender,

@@ -12,3 +12,2 @@ /**

*/
import type { UsersUserGroup } from './UsersUserGroup';
/**

@@ -33,2 +32,8 @@ *

/**
* The user's eMail address.
* @type {string}
* @memberof UsersUser
*/
email: string;
/**
* The user's first name.

@@ -46,8 +51,2 @@ * @type {string}

/**
* The user's initials.
* @type {string}
* @memberof UsersUser
*/
initials?: string;
/**
* The user's preferred locale.

@@ -59,8 +58,2 @@ * @type {string}

/**
* The user's eMail address.
* @type {string}
* @memberof UsersUser
*/
email: string;
/**
* The user's role.

@@ -71,14 +64,2 @@ * @type {string}

role: string;
/**
* Whether the user can delegate ACL to other users
* @type {boolean}
* @memberof UsersUser
*/
aclDelegationAllowed?: boolean;
/**
* User groups
* @type {Array<UsersUserGroup>}
* @memberof UsersUser
*/
groups?: Array<UsersUserGroup>;
}

@@ -85,0 +66,0 @@ /**

@@ -17,4 +17,2 @@ "use strict";

exports.UsersUserToJSON = exports.UsersUserFromJSONTyped = exports.UsersUserFromJSON = exports.instanceOfUsersUser = void 0;
const runtime_1 = require("../runtime");
const UsersUserGroup_1 = require("./UsersUserGroup");
/**

@@ -27,6 +25,6 @@ * Check if a given object implements the UsersUser interface.

isInstance = isInstance && "displayName" in value;
isInstance = isInstance && "email" in value;
isInstance = isInstance && "firstName" in value;
isInstance = isInstance && "lastName" in value;
isInstance = isInstance && "locale" in value;
isInstance = isInstance && "email" in value;
isInstance = isInstance && "role" in value;

@@ -47,10 +45,7 @@ return isInstance;

'displayName': json['displayName'],
'email': json['email'],
'firstName': json['firstName'],
'lastName': json['lastName'],
'initials': !runtime_1.exists(json, 'initials') ? undefined : json['initials'],
'locale': json['locale'],
'email': json['email'],
'role': json['role'],
'aclDelegationAllowed': !runtime_1.exists(json, 'aclDelegationAllowed') ? undefined : json['aclDelegationAllowed'],
'groups': !runtime_1.exists(json, 'groups') ? undefined : (json['groups'].map(UsersUserGroup_1.UsersUserGroupFromJSON)),
};

@@ -69,12 +64,9 @@ }

'displayName': value.displayName,
'email': value.email,
'firstName': value.firstName,
'lastName': value.lastName,
'initials': value.initials,
'locale': value.locale,
'email': value.email,
'role': value.role,
'aclDelegationAllowed': value.aclDelegationAllowed,
'groups': value.groups === undefined ? undefined : (value.groups.map(UsersUserGroup_1.UsersUserGroupToJSON)),
};
}
exports.UsersUserToJSON = UsersUserToJSON;
{
"name": "@equisoft/equisoft-connect-sdk-typescript",
"version": "11.0.8-snapshot.20230106151005",
"version": "11.0.8",
"description": "OpenAPI client for @equisoft/equisoft-connect-sdk-typescript",

@@ -5,0 +5,0 @@ "author": "OpenAPI-Generator",

@@ -35,14 +35,2 @@ /* tslint:disable */

/**
* FirstName
* @type {string}
* @memberof GatewaysCredentials
*/
firstName?: string | null;
/**
* LastName
* @type {string}
* @memberof GatewaysCredentials
*/
lastName?: string | null;
/**
* Rep code

@@ -90,4 +78,2 @@ * @type {string}

'password': json['password'],
'firstName': !exists(json, 'firstName') ? undefined : json['firstName'],
'lastName': !exists(json, 'lastName') ? undefined : json['lastName'],
'repcode': !exists(json, 'repcode') ? undefined : json['repcode'],

@@ -110,4 +96,2 @@ 'isADealerCode': !exists(json, 'isADealerCode') ? undefined : json['isADealerCode'],

'password': value.password,
'firstName': value.firstName,
'lastName': value.lastName,
'repcode': value.repcode,

@@ -114,0 +98,0 @@ 'isADealerCode': value.isADealerCode,

@@ -48,14 +48,2 @@ /* tslint:disable */

/**
* FirstName
* @type {string}
* @memberof GatewaysCredentialsWithSsn
*/
firstName?: string | null;
/**
* LastName
* @type {string}
* @memberof GatewaysCredentialsWithSsn
*/
lastName?: string | null;
/**
* Rep code

@@ -109,4 +97,2 @@ * @type {string}

'password': json['password'],
'firstName': !exists(json, 'firstName') ? undefined : json['firstName'],
'lastName': !exists(json, 'lastName') ? undefined : json['lastName'],
'repcode': !exists(json, 'repcode') ? undefined : json['repcode'],

@@ -130,4 +116,2 @@ 'isADealerCode': !exists(json, 'isADealerCode') ? undefined : json['isADealerCode'],

'password': value.password,
'firstName': value.firstName,
'lastName': value.lastName,
'repcode': value.repcode,

@@ -134,0 +118,0 @@ 'isADealerCode': value.isADealerCode,

@@ -190,2 +190,1 @@ /* tslint:disable */

export * from './UsersUser';
export * from './UsersUserGroup';

@@ -22,2 +22,8 @@ /* tslint:disable */

} from './LegacyContactAddress';
import type { LegacyProvisioningUserIdentifier } from './LegacyProvisioningUserIdentifier';
import {
LegacyProvisioningUserIdentifierFromJSON,
LegacyProvisioningUserIdentifierFromJSONTyped,
LegacyProvisioningUserIdentifierToJSON,
} from './LegacyProvisioningUserIdentifier';

@@ -71,3 +77,4 @@ /**

/**
* DEPRECATED this option does nothing
* User initial password.
* A random password will be set if none is specified and noPassword option is not used.
* @type {string}

@@ -78,3 +85,5 @@ * @memberof LegacyProvisioningUserPayload

/**
* DEPRECATED this option does nothing
* Disable password authentication.
* Accepts true or false.
* Default false
* @type {string}

@@ -85,3 +94,5 @@ * @memberof LegacyProvisioningUserPayload

/**
* DEPRECATED this option does nothing
* The user will be ask to define a new password on the first login
* Accepts true or false.
* Default true
* @type {string}

@@ -92,3 +103,6 @@ * @memberof LegacyProvisioningUserPayload

/**
* DEPRECATED this option does nothing
* Enable Mobile version.
* Deprecated: the mobile is not enabled per user anymore.
* Accepts true or false.
* Default false
* @type {string}

@@ -99,2 +113,8 @@ * @memberof LegacyProvisioningUserPayload

/**
* List of identifier to uniquely identify the user.
* @type {Array<LegacyProvisioningUserIdentifier>}
* @memberof LegacyProvisioningUserPayload
*/
externalIdentifiers?: Array<LegacyProvisioningUserIdentifier>;
/**
* Allow the user to delegate access to his data

@@ -196,2 +216,3 @@ * Accepts true or false.

'enableMobile': !exists(json, 'enableMobile') ? undefined : json['enableMobile'],
'externalIdentifiers': !exists(json, 'externalIdentifiers') ? undefined : ((json['externalIdentifiers'] as Array<any>).map(LegacyProvisioningUserIdentifierFromJSON)),
'allowDelegation': !exists(json, 'allowDelegation') ? undefined : json['allowDelegation'],

@@ -229,2 +250,3 @@ 'gender': !exists(json, 'gender') ? undefined : json['gender'],

'enableMobile': value.enableMobile,
'externalIdentifiers': value.externalIdentifiers === undefined ? undefined : ((value.externalIdentifiers as Array<any>).map(LegacyProvisioningUserIdentifierToJSON)),
'allowDelegation': value.allowDelegation,

@@ -231,0 +253,0 @@ 'gender': value.gender,

@@ -16,9 +16,2 @@ /* tslint:disable */

import { exists, mapValues } from '../runtime';
import type { UsersUserGroup } from './UsersUserGroup';
import {
UsersUserGroupFromJSON,
UsersUserGroupFromJSONTyped,
UsersUserGroupToJSON,
} from './UsersUserGroup';
/**

@@ -43,2 +36,8 @@ *

/**
* The user's eMail address.
* @type {string}
* @memberof UsersUser
*/
email: string;
/**
* The user's first name.

@@ -56,8 +55,2 @@ * @type {string}

/**
* The user's initials.
* @type {string}
* @memberof UsersUser
*/
initials?: string;
/**
* The user's preferred locale.

@@ -69,8 +62,2 @@ * @type {string}

/**
* The user's eMail address.
* @type {string}
* @memberof UsersUser
*/
email: string;
/**
* The user's role.

@@ -81,14 +68,2 @@ * @type {string}

role: string;
/**
* Whether the user can delegate ACL to other users
* @type {boolean}
* @memberof UsersUser
*/
aclDelegationAllowed?: boolean;
/**
* User groups
* @type {Array<UsersUserGroup>}
* @memberof UsersUser
*/
groups?: Array<UsersUserGroup>;
}

@@ -103,6 +78,6 @@

isInstance = isInstance && "displayName" in value;
isInstance = isInstance && "email" in value;
isInstance = isInstance && "firstName" in value;
isInstance = isInstance && "lastName" in value;
isInstance = isInstance && "locale" in value;
isInstance = isInstance && "email" in value;
isInstance = isInstance && "role" in value;

@@ -125,10 +100,7 @@

'displayName': json['displayName'],
'email': json['email'],
'firstName': json['firstName'],
'lastName': json['lastName'],
'initials': !exists(json, 'initials') ? undefined : json['initials'],
'locale': json['locale'],
'email': json['email'],
'role': json['role'],
'aclDelegationAllowed': !exists(json, 'aclDelegationAllowed') ? undefined : json['aclDelegationAllowed'],
'groups': !exists(json, 'groups') ? undefined : ((json['groups'] as Array<any>).map(UsersUserGroupFromJSON)),
};

@@ -148,12 +120,9 @@ }

'displayName': value.displayName,
'email': value.email,
'firstName': value.firstName,
'lastName': value.lastName,
'initials': value.initials,
'locale': value.locale,
'email': value.email,
'role': value.role,
'aclDelegationAllowed': value.aclDelegationAllowed,
'groups': value.groups === undefined ? undefined : ((value.groups as Array<any>).map(UsersUserGroupToJSON)),
};
}

Sorry, the diff of this file is not supported yet

SocketSocket SOC 2 Logo

Product

  • Package Alerts
  • Integrations
  • Docs
  • Pricing
  • FAQ
  • Roadmap
  • Changelog

Packages

npm

Stay in touch

Get open source security insights delivered straight into your inbox.


  • Terms
  • Privacy
  • Security

Made with ⚡️ by Socket Inc