Skip to content

Commit

Permalink
Automated build 'Automated commit 'Merge pull request #1915 from sail…
Browse files Browse the repository at this point in the history
…point/DEVREL-1757

Added entitlements as patchable' by github action: 12321210384' go sdk: 12321222640
  • Loading branch information
developer-relations-sp committed Dec 13, 2024
1 parent 33aca19 commit a5b6eac
Show file tree
Hide file tree
Showing 8 changed files with 109 additions and 96 deletions.
54 changes: 40 additions & 14 deletions api_beta/api/openapi.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -36108,14 +36108,18 @@ paths:
description: Internal Server Error - Returned if there is an unexpected
error.
security:
- UserContextAuth:
- userAuth:
- idn:role-unchecked:read
- idn:role-unchecked:manage
- idn:role-checked:manage
- idn:role-checked:read
summary: List Roles
tags:
- Roles
x-sailpoint-userLevels:
- ORG_ADMIN
- ROLE_ADMIN
- ROLE_SUBADMIN
post:
description: "This API creates a role.\n\nYou must have a token with API, ORG_ADMIN,\
\ ROLE_ADMIN, or ROLE_SUBADMIN authority to call this API. \n\nIn addition,\
Expand Down Expand Up @@ -36196,12 +36200,16 @@ paths:
description: Internal Server Error - Returned if there is an unexpected
error.
security:
- UserContextAuth:
- userAuth:
- idn:role-unchecked:manage
- idn:role-checked:manage
summary: Create a Role
tags:
- Roles
x-sailpoint-userLevels:
- ORG_ADMIN
- ROLE_ADMIN
- ROLE_SUBADMIN
/roles/{id}:
delete:
description: |-
Expand Down Expand Up @@ -36380,17 +36388,18 @@ paths:
patch:
description: "This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902)\
\ syntax.\n\nThe following fields are patchable:\n\n* name\n* description\n\
* enabled\n* owner\n* accessProfiles\n* membership\n* requestable\n* accessRequestConfig\n\
* revokeRequestConfig\n* segments\n* accessModelMetadata \nA token with\
\ API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority is required to call\
\ this API. In addition, a token with ROLE_SUBADMIN authority may only call\
\ this API if all access profiles included in the role are associated to Sources\
\ with management workgroups of which the ROLE_SUBADMIN is a member.\n\nThe\
\ maximum supported length for the description field is 2000 characters. Longer\
\ descriptions will be preserved for existing roles, however, any new roles\
\ as well as any updates to existing descriptions will be limited to 2000\
\ characters.\n\nWhen you use this API to modify a role's membership identities,\
\ you can only modify up to a limit of 500 membership identities at a time. "
* enabled\n* owner\n* accessProfiles\n* entitlements\n* membership\n* requestable\n\
* accessRequestConfig\n* revokeRequestConfig\n* segments\n* accessModelMetadata\
\ \nA token with API, ORG_ADMIN, ROLE_ADMIN, or ROLE_SUBADMIN authority\
\ is required to call this API. In addition, a token with ROLE_SUBADMIN authority\
\ may only call this API if all access profiles included in the role are associated\
\ to Sources with management workgroups of which the ROLE_SUBADMIN is a member.\n\
\nThe maximum supported length for the description field is 2000 characters.\
\ Longer descriptions will be preserved for existing roles, however, any new\
\ roles as well as any updates to existing descriptions will be limited to\
\ 2000 characters.\n\nWhen you use this API to modify a role's membership\
\ identities, you can only modify up to a limit of 500 membership identities\
\ at a time. "
operationId: patchRole
parameters:
- description: ID of the Role to patch
Expand Down Expand Up @@ -36464,7 +36473,7 @@ paths:
type: IDENTITY
property: attribute.email
stringValue: '@identitynow.com'
Assign a Access Model Metadata to a role:
Assign a Access Model Metadata to a Role:
description: This example shows how to assign a existing metadata
to a role.
value:
Expand All @@ -36481,6 +36490,23 @@ paths:
- op: replace
path: /dimensional
value: true
Add an Access Profile to a Role:
description: This example shows how to add an access profile to a
role.
value:
- op: add
path: /accessProfiles/-
value:
id: 1de104e1f9024b1289b3a31e22d28cd1
type: ACCESS_PROFILE
Add an Entitlement to a Role:
description: This example shows how to add an entitlement to a role.
value:
- op: add
path: /entitlements/-
value:
id: 0fb2f8051e48421b8f1f8a64aee3b205
type: ENTITLEMENT
schema:
items:
$ref: '#/components/schemas/JsonPatchOperation'
Expand Down
1 change: 1 addition & 0 deletions api_beta/api_roles.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

64 changes: 28 additions & 36 deletions api_v2024/api/openapi.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -24476,11 +24476,6 @@ paths:
- idn:role-unchecked:manage
- idn:role-checked:manage
- idn:role-checked:read
- applicationAuth:
- idn:role-unchecked:read
- idn:role-unchecked:manage
- idn:role-checked:manage
- idn:role-checked:read
summary: List Roles
tags:
- Roles
Expand Down Expand Up @@ -24570,11 +24565,6 @@ paths:
- userAuth:
- idn:role-unchecked:manage
- idn:role-checked:manage
- applicationAuth:
- idn:role-unchecked:read
- idn:role-unchecked:manage
- idn:role-checked:manage
- idn:role-checked:read
summary: Create a Role
tags:
- Roles
Expand Down Expand Up @@ -24661,11 +24651,6 @@ paths:
- userAuth:
- idn:role-unchecked:manage
- idn:role-checked:manage
- applicationAuth:
- idn:role-unchecked:read
- idn:role-unchecked:manage
- idn:role-checked:manage
- idn:role-checked:read
summary: Delete a Role
tags:
- Roles
Expand Down Expand Up @@ -24755,11 +24740,6 @@ paths:
- idn:role-unchecked:manage
- idn:role-checked:manage
- idn:role-checked:read
- applicationAuth:
- idn:role-unchecked:read
- idn:role-unchecked:manage
- idn:role-checked:manage
- idn:role-checked:read
summary: Get a Role
tags:
- Roles
Expand All @@ -24770,16 +24750,16 @@ paths:
patch:
description: "This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902)\
\ syntax.\nThe following fields are patchable:\n* name\n* description\n* enabled\n\
* owner\n* accessProfiles\n* membership\n* requestable\n* accessRequestConfig\n\
* revokeRequestConfig\n* segments\n* accessModelMetadata\n\nA user with ROLE_SUBADMIN\
\ authority may only call this API if all access profiles included in the\
\ role are associated to Sources with management workgroups of which the ROLE_SUBADMIN\
\ is a member.\n\nThe maximum supported length for the description field is\
\ 2000 characters. Longer descriptions will be preserved for existing roles,\
\ however, any new roles as well as any updates to existing descriptions will\
\ be limited to 2000 characters.\n\nWhen you use this API to modify a role's\
\ membership identities, you can only modify up to a limit of 500 membership\
\ identities at a time. "
* owner\n* accessProfiles\n* entitlements\n* membership\n* requestable\n*\
\ accessRequestConfig\n* revokeRequestConfig\n* segments\n* accessModelMetadata\n\
\nA user with ROLE_SUBADMIN authority may only call this API if all access\
\ profiles included in the role are associated to Sources with management\
\ workgroups of which the ROLE_SUBADMIN is a member.\n\nThe maximum supported\
\ length for the description field is 2000 characters. Longer descriptions\
\ will be preserved for existing roles, however, any new roles as well as\
\ any updates to existing descriptions will be limited to 2000 characters.\n\
\nWhen you use this API to modify a role's membership identities, you can\
\ only modify up to a limit of 500 membership identities at a time. "
operationId: patchRole
parameters:
- description: ID of the Role to patch
Expand Down Expand Up @@ -24853,7 +24833,7 @@ paths:
type: IDENTITY
property: attribute.email
stringValue: '@identitynow.com'
Assign a Access Model Metadata to a role:
Assign a Access Model Metadata to a Role:
description: This example shows how to assign a existing metadata
to a role.
value:
Expand All @@ -24863,6 +24843,23 @@ paths:
key: iscFederalClassifications
values:
- value: secret
Add an Access Profile to a Role:
description: This example shows how to add an access profile to a
role.
value:
- op: add
path: /accessProfiles/-
value:
id: 1de104e1f9024b1289b3a31e22d28cd1
type: ACCESS_PROFILE
Add an Entitlement to a Role:
description: This example shows how to add an entitlement to a role.
value:
- op: add
path: /entitlements/-
value:
id: 0fb2f8051e48421b8f1f8a64aee3b205
type: ENTITLEMENT
schema:
items:
$ref: '#/components/schemas/JsonPatchOperation'
Expand Down Expand Up @@ -24935,11 +24932,6 @@ paths:
- userAuth:
- idn:role-unchecked:manage
- idn:role-checked:manage
- applicationAuth:
- idn:role-unchecked:read
- idn:role-unchecked:manage
- idn:role-checked:manage
- idn:role-checked:read
summary: Patch a specified Role
tags:
- Roles
Expand Down
1 change: 1 addition & 0 deletions api_v2024/api_roles.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

10 changes: 5 additions & 5 deletions api_v2024/docs/RolesAPI.md
Original file line number Diff line number Diff line change
Expand Up @@ -77,7 +77,7 @@ Name | Type | Description | Notes

### Authorization

[userAuth](../README.md#userAuth), [userAuth](../README.md#userAuth), [applicationAuth](../README.md#applicationAuth)
[userAuth](../README.md#userAuth), [userAuth](../README.md#userAuth)

### HTTP request headers

Expand Down Expand Up @@ -285,7 +285,7 @@ Name | Type | Description | Notes

### Authorization

[userAuth](../README.md#userAuth), [userAuth](../README.md#userAuth), [applicationAuth](../README.md#applicationAuth)
[userAuth](../README.md#userAuth), [userAuth](../README.md#userAuth)

### HTTP request headers

Expand Down Expand Up @@ -486,7 +486,7 @@ Name | Type | Description | Notes

### Authorization

[userAuth](../README.md#userAuth), [userAuth](../README.md#userAuth), [applicationAuth](../README.md#applicationAuth)
[userAuth](../README.md#userAuth), [userAuth](../README.md#userAuth)

### HTTP request headers

Expand Down Expand Up @@ -726,7 +726,7 @@ Name | Type | Description | Notes

### Authorization

[userAuth](../README.md#userAuth), [userAuth](../README.md#userAuth), [applicationAuth](../README.md#applicationAuth)
[userAuth](../README.md#userAuth), [userAuth](../README.md#userAuth)

### HTTP request headers

Expand Down Expand Up @@ -798,7 +798,7 @@ Name | Type | Description | Notes

### Authorization

[userAuth](../README.md#userAuth), [userAuth](../README.md#userAuth), [applicationAuth](../README.md#applicationAuth)
[userAuth](../README.md#userAuth), [userAuth](../README.md#userAuth)

### HTTP request headers

Expand Down
Loading

0 comments on commit a5b6eac

Please sign in to comment.