@propelauth/node-apis
Advanced tools
Comparing version 2.1.9 to 2.1.10
@@ -172,8 +172,10 @@ type CreateAccessTokenRequest = { | ||
readonly urlSafeOrgName: string; | ||
readonly orgRoleStructure: OrgRoleStructure; | ||
readonly userAssignedRole: string; | ||
readonly userInheritedRolesPlusCurrentRole: string[]; | ||
readonly userPermissions: string[]; | ||
readonly userAssignedAdditionalRoles: string[]; | ||
constructor(orgId: string, orgName: string, orgMetadata: { | ||
[key: string]: any; | ||
}, urlSafeOrgName: string, userAssignedRole: string, userInheritedRolesPlusCurrentRole: string[], userPermissions: string[]); | ||
}, urlSafeOrgName: string, userAssignedRole: string, userInheritedRolesPlusCurrentRole: string[], userPermissions: string[], orgRoleStructure?: OrgRoleStructure, userAssignedAdditionalRoles?: string[]); | ||
get assignedRole(): string; | ||
@@ -195,2 +197,6 @@ get permissions(): string[]; | ||
}; | ||
declare enum OrgRoleStructure { | ||
SingleRole = "single_role_in_hierarchy", | ||
MultiRole = "multi_role" | ||
} | ||
type InternalOrgMemberInfo = { | ||
@@ -203,5 +209,7 @@ org_id: string; | ||
url_safe_org_name: string; | ||
org_role_structure: OrgRoleStructure; | ||
user_role: string; | ||
inherited_user_roles_plus_current_role: string[]; | ||
user_permissions: string[]; | ||
additional_roles: string[]; | ||
}; | ||
@@ -300,2 +308,3 @@ type InternalUser = { | ||
role: string; | ||
additionalRoles?: string[]; | ||
}; | ||
@@ -306,2 +315,3 @@ type ChangeUserRoleInOrgRequest = { | ||
role: string; | ||
additionalRoles?: string[]; | ||
}; | ||
@@ -368,2 +378,3 @@ type RemoveUserFromOrgRequest = { | ||
role: string; | ||
additionalRoles?: string[]; | ||
}; | ||
@@ -370,0 +381,0 @@ type UpdateUserMetadataRequest = { |
@@ -325,3 +325,3 @@ "use strict"; | ||
var OrgMemberInfo = class _OrgMemberInfo { | ||
constructor(orgId, orgName, orgMetadata, urlSafeOrgName, userAssignedRole, userInheritedRolesPlusCurrentRole, userPermissions) { | ||
constructor(orgId, orgName, orgMetadata, urlSafeOrgName, userAssignedRole, userInheritedRolesPlusCurrentRole, userPermissions, orgRoleStructure, userAssignedAdditionalRoles) { | ||
this.orgId = orgId; | ||
@@ -331,5 +331,7 @@ this.orgName = orgName; | ||
this.urlSafeOrgName = urlSafeOrgName; | ||
this.orgRoleStructure = orgRoleStructure != null ? orgRoleStructure : "single_role_in_hierarchy" /* SingleRole */; | ||
this.userAssignedRole = userAssignedRole; | ||
this.userInheritedRolesPlusCurrentRole = userInheritedRolesPlusCurrentRole; | ||
this.userPermissions = userPermissions; | ||
this.userAssignedAdditionalRoles = userAssignedAdditionalRoles != null ? userAssignedAdditionalRoles : []; | ||
} | ||
@@ -348,6 +350,14 @@ // getters | ||
isRole(role) { | ||
return this.userAssignedRole === role; | ||
if (this.orgRoleStructure === "multi_role" /* MultiRole */) { | ||
return this.userAssignedRole === role || this.userAssignedAdditionalRoles.includes(role); | ||
} else { | ||
return this.userAssignedRole === role; | ||
} | ||
} | ||
isAtLeastRole(role) { | ||
return this.userInheritedRolesPlusCurrentRole.includes(role); | ||
if (this.orgRoleStructure === "multi_role" /* MultiRole */) { | ||
return this.userAssignedRole === role || this.userAssignedAdditionalRoles.includes(role); | ||
} else { | ||
return this.userInheritedRolesPlusCurrentRole.includes(role); | ||
} | ||
} | ||
@@ -370,3 +380,5 @@ hasPermission(permission) { | ||
obj.userInheritedRolesPlusCurrentRole, | ||
obj.userPermissions | ||
obj.userPermissions, | ||
obj.orgRoleStructure, | ||
obj.userAssignedAdditionalRoles | ||
); | ||
@@ -425,3 +437,5 @@ } catch (e) { | ||
snakeCaseValue.inherited_user_roles_plus_current_role, | ||
snakeCaseValue.user_permissions | ||
snakeCaseValue.user_permissions, | ||
snakeCaseValue.org_role_structure, | ||
snakeCaseValue.additional_roles | ||
); | ||
@@ -486,3 +500,3 @@ } | ||
function isOrgMemberInfo(value) { | ||
return value && typeof value === "object" && value.hasOwnProperty("orgId") && value.hasOwnProperty("orgName") && value.hasOwnProperty("urlSafeOrgName") && value.hasOwnProperty("orgMetadata") && value.hasOwnProperty("userAssignedRole") && value.hasOwnProperty("userRoles") && value.hasOwnProperty("userPermissions"); | ||
return value && typeof value === "object" && value.hasOwnProperty("orgId") && value.hasOwnProperty("orgName") && value.hasOwnProperty("urlSafeOrgName") && value.hasOwnProperty("orgMetadata") && value.hasOwnProperty("userAssignedRole") && value.hasOwnProperty("userInheritedRolesPlusCurrentRole") && value.hasOwnProperty("userPermissions"); | ||
} | ||
@@ -507,4 +521,6 @@ function processKeys(obj) { | ||
value["userAssignedRole"], | ||
value["userRoles"], | ||
value["userPermissions"] | ||
value["userInheritedRolesPlusCurrentRole"], | ||
value["userPermissions"], | ||
value["orgRoleStructure"], | ||
value["userAssignedAdditionalRoles"] | ||
); | ||
@@ -516,3 +532,5 @@ } | ||
} else if (key === "inherited_user_roles_plus_current_role") { | ||
newKey = "userRoles"; | ||
newKey = "userInheritedRolesPlusCurrentRole"; | ||
} else if (key === "additional_roles") { | ||
newKey = "userAssignedAdditionalRoles"; | ||
} else { | ||
@@ -706,6 +724,8 @@ newKey = camelCase(key); | ||
function inviteUserToOrg(authUrl, integrationApiKey, inviteUserToOrgRequest) { | ||
var _a; | ||
const body = { | ||
org_id: inviteUserToOrgRequest.orgId, | ||
email: inviteUserToOrgRequest.email, | ||
role: inviteUserToOrgRequest.role | ||
role: inviteUserToOrgRequest.role, | ||
additional_roles: (_a = inviteUserToOrgRequest.additionalRoles) != null ? _a : [] | ||
}; | ||
@@ -996,6 +1016,8 @@ return httpRequest(authUrl, integrationApiKey, `/api/backend/v1/invite_user`, "POST", JSON.stringify(body)).then( | ||
function addUserToOrg(authUrl, integrationApiKey, addUserToOrgRequest) { | ||
var _a; | ||
const request = { | ||
user_id: addUserToOrgRequest.userId, | ||
org_id: addUserToOrgRequest.orgId, | ||
role: addUserToOrgRequest.role | ||
role: addUserToOrgRequest.role, | ||
additional_roles: (_a = addUserToOrgRequest.additionalRoles) != null ? _a : [] | ||
}; | ||
@@ -1018,6 +1040,8 @@ return httpRequest(authUrl, integrationApiKey, `${ENDPOINT_PATH2}/add_user`, "POST", JSON.stringify(request)).then( | ||
function changeUserRoleInOrg(authUrl, integrationApiKey, changeUserRoleInOrgRequest) { | ||
var _a; | ||
const request = { | ||
user_id: changeUserRoleInOrgRequest.userId, | ||
org_id: changeUserRoleInOrgRequest.orgId, | ||
role: changeUserRoleInOrgRequest.role | ||
role: changeUserRoleInOrgRequest.role, | ||
additional_roles: (_a = changeUserRoleInOrgRequest.additionalRoles) != null ? _a : [] | ||
}; | ||
@@ -1024,0 +1048,0 @@ return httpRequest( |
@@ -7,3 +7,3 @@ { | ||
}, | ||
"version": "v2.1.9", | ||
"version": "v2.1.10", | ||
"license": "MIT", | ||
@@ -10,0 +10,0 @@ "keywords": [ |
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Sorry, the diff of this file is not supported yet
Manifest confusion
Supply chain riskThis package has inconsistent metadata. This could be malicious or caused by an error when publishing the package.
Found 1 instance in 1 package
Manifest confusion
Supply chain riskThis package has inconsistent metadata. This could be malicious or caused by an error when publishing the package.
Found 1 instance in 1 package
406033
3882