update swagger base path
All checks were successful
Release and Deploy / build (push) Successful in 1m48s
Release and Deploy / deploy (push) Successful in 22s

This commit is contained in:
Fran Jurmanović
2025-08-05 14:39:44 +02:00
parent ac61ba5223
commit 5324a41e05
12 changed files with 100 additions and 100 deletions

View File

@@ -11,7 +11,7 @@
// @license.url https://opensource.org/licenses/MIT
//
// @host https://acc.jurmanovic.com
// @BasePath /api/v1
// @BasePath /v1
// @schemes http https
//
// @securityDefinitions.apikey BearerAuth

View File

@@ -58,7 +58,7 @@ func NewConfigController(as *service.ConfigService, routeGroups *common.RouteGro
// @Failure 404 {object} error_handler.ErrorResponse "Server or config file not found"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server/{id}/config/{file} [put]
// @Router /server/{id}/config/{file} [put]
func (ac *ConfigController) UpdateConfig(c *fiber.Ctx) error {
restart := c.QueryBool("restart")
serverID := c.Params("id")
@@ -106,7 +106,7 @@ func (ac *ConfigController) UpdateConfig(c *fiber.Ctx) error {
// @Failure 404 {object} error_handler.ErrorResponse "Server or config file not found"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server/{id}/config/{file} [get]
// @Router /server/{id}/config/{file} [get]
func (ac *ConfigController) GetConfig(c *fiber.Ctx) error {
Model, err := ac.service.GetConfig(c)
if err != nil {
@@ -130,7 +130,7 @@ func (ac *ConfigController) GetConfig(c *fiber.Ctx) error {
// @Failure 404 {object} error_handler.ErrorResponse "Server not found"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server/{id}/config [get]
// @Router /server/{id}/config [get]
func (ac *ConfigController) GetConfigs(c *fiber.Ctx) error {
Model, err := ac.service.GetConfigs(c)
if err != nil {

View File

@@ -46,7 +46,7 @@ func NewLookupController(as *service.LookupService, routeGroups *common.RouteGro
// @Failure 401 {object} error_handler.ErrorResponse "Unauthorized"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/lookup/tracks [get]
// @Router /lookup/tracks [get]
func (ac *LookupController) GetTracks(c *fiber.Ctx) error {
result, err := ac.service.GetTracks(c)
if err != nil {
@@ -66,7 +66,7 @@ func (ac *LookupController) GetTracks(c *fiber.Ctx) error {
// @Failure 401 {object} error_handler.ErrorResponse "Unauthorized"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/lookup/car-models [get]
// @Router /lookup/car-models [get]
func (ac *LookupController) GetCarModels(c *fiber.Ctx) error {
result, err := ac.service.GetCarModels(c)
if err != nil {
@@ -86,7 +86,7 @@ func (ac *LookupController) GetCarModels(c *fiber.Ctx) error {
// @Failure 401 {object} error_handler.ErrorResponse "Unauthorized"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/lookup/driver-categories [get]
// @Router /lookup/driver-categories [get]
func (ac *LookupController) GetDriverCategories(c *fiber.Ctx) error {
result, err := ac.service.GetDriverCategories(c)
if err != nil {
@@ -106,7 +106,7 @@ func (ac *LookupController) GetDriverCategories(c *fiber.Ctx) error {
// @Failure 401 {object} error_handler.ErrorResponse "Unauthorized"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/lookup/cup-categories [get]
// @Router /lookup/cup-categories [get]
func (ac *LookupController) GetCupCategories(c *fiber.Ctx) error {
result, err := ac.service.GetCupCategories(c)
if err != nil {
@@ -126,7 +126,7 @@ func (ac *LookupController) GetCupCategories(c *fiber.Ctx) error {
// @Failure 401 {object} error_handler.ErrorResponse "Unauthorized"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/lookup/session-types [get]
// @Router /lookup/session-types [get]
func (ac *LookupController) GetSessionTypes(c *fiber.Ctx) error {
result, err := ac.service.GetSessionTypes(c)
if err != nil {

View File

@@ -61,7 +61,7 @@ func NewMembershipController(service *service.MembershipService, auth *middlewar
// @Failure 400 {object} error_handler.ErrorResponse "Invalid request body"
// @Failure 401 {object} error_handler.ErrorResponse "Invalid credentials"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Router /v1/auth/login [post]
// @Router /auth/login [post]
func (c *MembershipController) Login(ctx *fiber.Ctx) error {
type request struct {
Username string `json:"username"`
@@ -96,7 +96,7 @@ func (c *MembershipController) Login(ctx *fiber.Ctx) error {
// @Failure 409 {object} error_handler.ErrorResponse "User already exists"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/membership [post]
// @Router /membership [post]
func (mc *MembershipController) CreateUser(c *fiber.Ctx) error {
type request struct {
Username string `json:"username"`
@@ -128,7 +128,7 @@ func (mc *MembershipController) CreateUser(c *fiber.Ctx) error {
// @Failure 403 {object} error_handler.ErrorResponse "Insufficient permissions"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/membership [get]
// @Router /membership [get]
func (mc *MembershipController) ListUsers(c *fiber.Ctx) error {
users, err := mc.service.ListUsers(c.UserContext())
if err != nil {
@@ -150,7 +150,7 @@ func (mc *MembershipController) ListUsers(c *fiber.Ctx) error {
// @Failure 401 {object} error_handler.ErrorResponse "Unauthorized"
// @Failure 404 {object} error_handler.ErrorResponse "User not found"
// @Security BearerAuth
// @Router /v1/membership/{id} [get]
// @Router /membership/{id} [get]
func (mc *MembershipController) GetUser(c *fiber.Ctx) error {
id, err := uuid.Parse(c.Params("id"))
if err != nil {
@@ -175,7 +175,7 @@ func (mc *MembershipController) GetUser(c *fiber.Ctx) error {
// @Failure 401 {object} error_handler.ErrorResponse "Unauthorized"
// @Failure 404 {object} error_handler.ErrorResponse "User not found"
// @Security BearerAuth
// @Router /v1/auth/me [get]
// @Router /auth/me [get]
func (mc *MembershipController) GetMe(c *fiber.Ctx) error {
userID, ok := c.Locals("userID").(string)
if !ok || userID == "" {
@@ -206,7 +206,7 @@ func (mc *MembershipController) GetMe(c *fiber.Ctx) error {
// @Failure 403 {object} error_handler.ErrorResponse "Insufficient permissions"
// @Failure 404 {object} error_handler.ErrorResponse "User not found"
// @Security BearerAuth
// @Router /v1/membership/{id} [delete]
// @Router /membership/{id} [delete]
func (mc *MembershipController) DeleteUser(c *fiber.Ctx) error {
id, err := uuid.Parse(c.Params("id"))
if err != nil {
@@ -235,7 +235,7 @@ func (mc *MembershipController) DeleteUser(c *fiber.Ctx) error {
// @Failure 403 {object} error_handler.ErrorResponse "Insufficient permissions"
// @Failure 404 {object} error_handler.ErrorResponse "User not found"
// @Security BearerAuth
// @Router /v1/membership/{id} [put]
// @Router /membership/{id} [put]
func (mc *MembershipController) UpdateUser(c *fiber.Ctx) error {
id, err := uuid.Parse(c.Params("id"))
if err != nil {
@@ -266,7 +266,7 @@ func (mc *MembershipController) UpdateUser(c *fiber.Ctx) error {
// @Failure 403 {object} error_handler.ErrorResponse "Insufficient permissions"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/membership/roles [get]
// @Router /membership/roles [get]
func (mc *MembershipController) GetRoles(c *fiber.Ctx) error {
roles, err := mc.service.GetAllRoles(c.UserContext())
if err != nil {

View File

@@ -50,7 +50,7 @@ func NewServerController(ss *service.ServerService, routeGroups *common.RouteGro
// @Failure 401 {object} error_handler.ErrorResponse "Unauthorized"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/api/server [get]
// @Router /api/server [get]
func (ac *ServerController) GetAllApi(c *fiber.Ctx) error {
var filter model.ServerFilter
if err := common.ParseQueryFilter(c, &filter); err != nil {
@@ -79,7 +79,7 @@ func (ac *ServerController) GetAllApi(c *fiber.Ctx) error {
// @Failure 401 {object} error_handler.ErrorResponse "Unauthorized"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server [get]
// @Router /server [get]
func (ac *ServerController) GetAll(c *fiber.Ctx) error {
var filter model.ServerFilter
if err := common.ParseQueryFilter(c, &filter); err != nil {
@@ -105,7 +105,7 @@ func (ac *ServerController) GetAll(c *fiber.Ctx) error {
// @Failure 404 {object} error_handler.ErrorResponse "Server not found"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server/{id} [get]
// @Router /server/{id} [get]
func (ac *ServerController) GetById(c *fiber.Ctx) error {
serverIDStr := c.Params("id")
serverID, err := uuid.Parse(serverIDStr)
@@ -133,7 +133,7 @@ func (ac *ServerController) GetById(c *fiber.Ctx) error {
// @Failure 403 {object} error_handler.ErrorResponse "Insufficient permissions"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server [post]
// @Router /server [post]
func (ac *ServerController) CreateServer(c *fiber.Ctx) error {
server := new(model.Server)
if err := c.BodyParser(server); err != nil {
@@ -161,7 +161,7 @@ func (ac *ServerController) CreateServer(c *fiber.Ctx) error {
// @Failure 404 {object} error_handler.ErrorResponse "Server not found"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server/{id} [put]
// @Router /server/{id} [put]
func (ac *ServerController) UpdateServer(c *fiber.Ctx) error {
serverIDStr := c.Params("id")
serverID, err := uuid.Parse(serverIDStr)
@@ -195,7 +195,7 @@ func (ac *ServerController) UpdateServer(c *fiber.Ctx) error {
// @Failure 404 {object} error_handler.ErrorResponse "Server not found"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server/{id} [delete]
// @Router /server/{id} [delete]
func (ac *ServerController) DeleteServer(c *fiber.Ctx) error {
serverIDStr := c.Params("id")
serverID, err := uuid.Parse(serverIDStr)

View File

@@ -51,7 +51,7 @@ func NewServiceControlController(as *service.ServiceControlService, routeGroups
// @Failure 404 {object} error_handler.ErrorResponse "Service not found"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server/{id}/service/{service} [get]
// @Router /server/{id}/service/{service} [get]
func (ac *ServiceControlController) getStatus(c *fiber.Ctx) error {
id := c.Params("id")
c.Locals("serverId", id)
@@ -78,7 +78,7 @@ func (ac *ServiceControlController) getStatus(c *fiber.Ctx) error {
// @Failure 409 {object} error_handler.ErrorResponse "Service already running"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server/{id}/service/start [post]
// @Router /server/{id}/service/start [post]
func (ac *ServiceControlController) startServer(c *fiber.Ctx) error {
id := c.Params("id")
c.Locals("serverId", id)
@@ -105,7 +105,7 @@ func (ac *ServiceControlController) startServer(c *fiber.Ctx) error {
// @Failure 409 {object} error_handler.ErrorResponse "Service already stopped"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server/{id}/service/stop [post]
// @Router /server/{id}/service/stop [post]
func (ac *ServiceControlController) stopServer(c *fiber.Ctx) error {
id := c.Params("id")
c.Locals("serverId", id)
@@ -131,7 +131,7 @@ func (ac *ServiceControlController) stopServer(c *fiber.Ctx) error {
// @Failure 404 {object} error_handler.ErrorResponse "Service not found"
// @Failure 500 {object} error_handler.ErrorResponse "Internal server error"
// @Security BearerAuth
// @Router /v1/server/{id}/service/restart [post]
// @Router /server/{id}/service/restart [post]
func (ac *ServiceControlController) restartServer(c *fiber.Ctx) error {
id := c.Params("id")
c.Locals("serverId", id)

View File

@@ -42,7 +42,7 @@ func NewStateHistoryController(as *service.StateHistoryService, routeGroups *com
// @Description Return StateHistorys
// @Tags StateHistory
// @Success 200 {array} string
// @Router /v1/state-history [get]
// @Router /state-history [get]
func (ac *StateHistoryController) GetAll(c *fiber.Ctx) error {
var filter model.StateHistoryFilter
if err := common.ParseQueryFilter(c, &filter); err != nil {
@@ -63,7 +63,7 @@ func (ac *StateHistoryController) GetAll(c *fiber.Ctx) error {
// @Description Return StateHistorys
// @Tags StateHistory
// @Success 200 {array} string
// @Router /v1/state-history/statistics [get]
// @Router /state-history/statistics [get]
func (ac *StateHistoryController) GetStatistics(c *fiber.Ctx) error {
var filter model.StateHistoryFilter
if err := common.ParseQueryFilter(c, &filter); err != nil {

View File

@@ -33,7 +33,7 @@ func NewSystemController(routeGroups *common.RouteGroups) *SystemController {
// @Description Return service control status
// @Tags system
// @Success 200 {array} string
// @Router /v1/system/health [get]
// @Router /system/health [get]
func (ac *SystemController) getFirst(c *fiber.Ctx) error {
return c.SendString(configs.Version)
}

View File

@@ -8,7 +8,7 @@ import (
)
var (
Version = "0.10.2"
Version = "0.10.3"
Prefix = "v1"
Secret string
SecretCode string

View File

@@ -22,7 +22,7 @@ const docTemplate = `{
"host": "{{.Host}}",
"basePath": "{{.BasePath}}",
"paths": {
"/v1/api/server": {
"/api/server": {
"get": {
"security": [
{
@@ -113,7 +113,7 @@ const docTemplate = `{
}
}
},
"/v1/auth/login": {
"/auth/login": {
"post": {
"description": "Authenticate a user and receive a JWT token",
"consumes": [
@@ -178,7 +178,7 @@ const docTemplate = `{
}
}
},
"/v1/auth/me": {
"/auth/me": {
"get": {
"security": [
{
@@ -218,7 +218,7 @@ const docTemplate = `{
}
}
},
"/v1/lookup/car-models": {
"/lookup/car-models": {
"get": {
"security": [
{
@@ -272,7 +272,7 @@ const docTemplate = `{
}
}
},
"/v1/lookup/cup-categories": {
"/lookup/cup-categories": {
"get": {
"security": [
{
@@ -323,7 +323,7 @@ const docTemplate = `{
}
}
},
"/v1/lookup/driver-categories": {
"/lookup/driver-categories": {
"get": {
"security": [
{
@@ -377,7 +377,7 @@ const docTemplate = `{
}
}
},
"/v1/lookup/session-types": {
"/lookup/session-types": {
"get": {
"security": [
{
@@ -431,7 +431,7 @@ const docTemplate = `{
}
}
},
"/v1/lookup/tracks": {
"/lookup/tracks": {
"get": {
"security": [
{
@@ -482,7 +482,7 @@ const docTemplate = `{
}
}
},
"/v1/membership": {
"/membership": {
"get": {
"security": [
{
@@ -609,7 +609,7 @@ const docTemplate = `{
}
}
},
"/v1/membership/roles": {
"/membership/roles": {
"get": {
"security": [
{
@@ -658,7 +658,7 @@ const docTemplate = `{
}
}
},
"/v1/membership/{id}": {
"/membership/{id}": {
"get": {
"security": [
{
@@ -837,7 +837,7 @@ const docTemplate = `{
}
}
},
"/v1/server": {
"/server": {
"get": {
"security": [
{
@@ -989,7 +989,7 @@ const docTemplate = `{
}
}
},
"/v1/server/{id}": {
"/server/{id}": {
"get": {
"security": [
{
@@ -1189,7 +1189,7 @@ const docTemplate = `{
}
}
},
"/v1/server/{id}/config": {
"/server/{id}/config": {
"get": {
"security": [
{
@@ -1259,7 +1259,7 @@ const docTemplate = `{
}
}
},
"/v1/server/{id}/config/{file}": {
"/server/{id}/config/{file}": {
"get": {
"security": [
{
@@ -1419,7 +1419,7 @@ const docTemplate = `{
}
}
},
"/v1/server/{id}/service/restart": {
"/server/{id}/service/restart": {
"post": {
"security": [
{
@@ -1498,7 +1498,7 @@ const docTemplate = `{
}
}
},
"/v1/server/{id}/service/start": {
"/server/{id}/service/start": {
"post": {
"security": [
{
@@ -1583,7 +1583,7 @@ const docTemplate = `{
}
}
},
"/v1/server/{id}/service/stop": {
"/server/{id}/service/stop": {
"post": {
"security": [
{
@@ -1668,7 +1668,7 @@ const docTemplate = `{
}
}
},
"/v1/server/{id}/service/{service}": {
"/server/{id}/service/{service}": {
"get": {
"security": [
{
@@ -1737,7 +1737,7 @@ const docTemplate = `{
}
}
},
"/v1/state-history": {
"/state-history": {
"get": {
"description": "Return StateHistorys",
"tags": [
@@ -1757,7 +1757,7 @@ const docTemplate = `{
}
}
},
"/v1/state-history/statistics": {
"/state-history/statistics": {
"get": {
"description": "Return StateHistorys",
"tags": [
@@ -1777,7 +1777,7 @@ const docTemplate = `{
}
}
},
"/v1/system/health": {
"/system/health": {
"get": {
"description": "Return service control status",
"tags": [
@@ -1980,7 +1980,7 @@ const docTemplate = `{
var SwaggerInfo = &swag.Spec{
Version: "1.0",
Host: "https://acc.jurmanovic.com",
BasePath: "/api/v1",
BasePath: "/v1",
Schemes: []string{"http", "https"},
Title: "ACC Server Manager API",
Description: "API for managing Assetto Corsa Competizione dedicated servers",

View File

@@ -18,9 +18,9 @@
"version": "1.0"
},
"host": "https://acc.jurmanovic.com",
"basePath": "/api/v1",
"basePath": "/v1",
"paths": {
"/v1/api/server": {
"/api/server": {
"get": {
"security": [
{
@@ -111,7 +111,7 @@
}
}
},
"/v1/auth/login": {
"/auth/login": {
"post": {
"description": "Authenticate a user and receive a JWT token",
"consumes": [
@@ -176,7 +176,7 @@
}
}
},
"/v1/auth/me": {
"/auth/me": {
"get": {
"security": [
{
@@ -216,7 +216,7 @@
}
}
},
"/v1/lookup/car-models": {
"/lookup/car-models": {
"get": {
"security": [
{
@@ -270,7 +270,7 @@
}
}
},
"/v1/lookup/cup-categories": {
"/lookup/cup-categories": {
"get": {
"security": [
{
@@ -321,7 +321,7 @@
}
}
},
"/v1/lookup/driver-categories": {
"/lookup/driver-categories": {
"get": {
"security": [
{
@@ -375,7 +375,7 @@
}
}
},
"/v1/lookup/session-types": {
"/lookup/session-types": {
"get": {
"security": [
{
@@ -429,7 +429,7 @@
}
}
},
"/v1/lookup/tracks": {
"/lookup/tracks": {
"get": {
"security": [
{
@@ -480,7 +480,7 @@
}
}
},
"/v1/membership": {
"/membership": {
"get": {
"security": [
{
@@ -607,7 +607,7 @@
}
}
},
"/v1/membership/roles": {
"/membership/roles": {
"get": {
"security": [
{
@@ -656,7 +656,7 @@
}
}
},
"/v1/membership/{id}": {
"/membership/{id}": {
"get": {
"security": [
{
@@ -835,7 +835,7 @@
}
}
},
"/v1/server": {
"/server": {
"get": {
"security": [
{
@@ -987,7 +987,7 @@
}
}
},
"/v1/server/{id}": {
"/server/{id}": {
"get": {
"security": [
{
@@ -1187,7 +1187,7 @@
}
}
},
"/v1/server/{id}/config": {
"/server/{id}/config": {
"get": {
"security": [
{
@@ -1257,7 +1257,7 @@
}
}
},
"/v1/server/{id}/config/{file}": {
"/server/{id}/config/{file}": {
"get": {
"security": [
{
@@ -1417,7 +1417,7 @@
}
}
},
"/v1/server/{id}/service/restart": {
"/server/{id}/service/restart": {
"post": {
"security": [
{
@@ -1496,7 +1496,7 @@
}
}
},
"/v1/server/{id}/service/start": {
"/server/{id}/service/start": {
"post": {
"security": [
{
@@ -1581,7 +1581,7 @@
}
}
},
"/v1/server/{id}/service/stop": {
"/server/{id}/service/stop": {
"post": {
"security": [
{
@@ -1666,7 +1666,7 @@
}
}
},
"/v1/server/{id}/service/{service}": {
"/server/{id}/service/{service}": {
"get": {
"security": [
{
@@ -1735,7 +1735,7 @@
}
}
},
"/v1/state-history": {
"/state-history": {
"get": {
"description": "Return StateHistorys",
"tags": [
@@ -1755,7 +1755,7 @@
}
}
},
"/v1/state-history/statistics": {
"/state-history/statistics": {
"get": {
"description": "Return StateHistorys",
"tags": [
@@ -1775,7 +1775,7 @@
}
}
},
"/v1/system/health": {
"/system/health": {
"get": {
"description": "Return service control status",
"tags": [

View File

@@ -1,4 +1,4 @@
basePath: /api/v1
basePath: /v1
definitions:
error_handler.ErrorResponse:
properties:
@@ -124,7 +124,7 @@ info:
title: ACC Server Manager API
version: "1.0"
paths:
/v1/api/server:
/api/server:
get:
consumes:
- application/json
@@ -180,7 +180,7 @@ paths:
summary: List all servers (API format)
tags:
- Server
/v1/auth/login:
/auth/login:
post:
consumes:
- application/json
@@ -222,7 +222,7 @@ paths:
summary: User login
tags:
- Authentication
/v1/auth/me:
/auth/me:
get:
consumes:
- application/json
@@ -247,7 +247,7 @@ paths:
summary: Get current user details
tags:
- Authentication
/v1/lookup/car-models:
/lookup/car-models:
get:
consumes:
- application/json
@@ -281,7 +281,7 @@ paths:
summary: Get available car models
tags:
- Lookups
/v1/lookup/cup-categories:
/lookup/cup-categories:
get:
consumes:
- application/json
@@ -313,7 +313,7 @@ paths:
summary: Get cup categories
tags:
- Lookups
/v1/lookup/driver-categories:
/lookup/driver-categories:
get:
consumes:
- application/json
@@ -347,7 +347,7 @@ paths:
summary: Get driver categories
tags:
- Lookups
/v1/lookup/session-types:
/lookup/session-types:
get:
consumes:
- application/json
@@ -382,7 +382,7 @@ paths:
summary: Get session types
tags:
- Lookups
/v1/lookup/tracks:
/lookup/tracks:
get:
consumes:
- application/json
@@ -414,7 +414,7 @@ paths:
summary: Get available tracks
tags:
- Lookups
/v1/membership:
/membership:
get:
consumes:
- application/json
@@ -495,7 +495,7 @@ paths:
summary: Create a new user
tags:
- User Management
/v1/membership/{id}:
/membership/{id}:
delete:
consumes:
- application/json
@@ -610,7 +610,7 @@ paths:
summary: Update user
tags:
- User Management
/v1/membership/roles:
/membership/roles:
get:
consumes:
- application/json
@@ -641,7 +641,7 @@ paths:
summary: Get all roles
tags:
- User Management
/v1/server:
/server:
get:
consumes:
- application/json
@@ -736,7 +736,7 @@ paths:
summary: Create a new ACC server
tags:
- Server
/v1/server/{id}:
/server/{id}:
delete:
consumes:
- application/json
@@ -865,7 +865,7 @@ paths:
summary: Update an ACC server
tags:
- Server
/v1/server/{id}/config:
/server/{id}/config:
get:
consumes:
- application/json
@@ -910,7 +910,7 @@ paths:
summary: List available configuration files
tags:
- Server Configuration
/v1/server/{id}/config/{file}:
/server/{id}/config/{file}:
get:
consumes:
- application/json
@@ -1014,7 +1014,7 @@ paths:
summary: Update server configuration file
tags:
- Server Configuration
/v1/server/{id}/service/{service}:
/server/{id}/service/{service}:
get:
consumes:
- application/json
@@ -1058,7 +1058,7 @@ paths:
summary: Get service status
tags:
- Service Control
/v1/server/{id}/service/restart:
/server/{id}/service/restart:
post:
consumes:
- application/json
@@ -1108,7 +1108,7 @@ paths:
summary: Restart a Windows service
tags:
- Service Control
/v1/server/{id}/service/start:
/server/{id}/service/start:
post:
consumes:
- application/json
@@ -1162,7 +1162,7 @@ paths:
summary: Start a Windows service
tags:
- Service Control
/v1/server/{id}/service/stop:
/server/{id}/service/stop:
post:
consumes:
- application/json
@@ -1216,7 +1216,7 @@ paths:
summary: Stop a Windows service
tags:
- Service Control
/v1/state-history:
/state-history:
get:
description: Return StateHistorys
responses:
@@ -1229,7 +1229,7 @@ paths:
summary: Return StateHistorys
tags:
- StateHistory
/v1/state-history/statistics:
/state-history/statistics:
get:
description: Return StateHistorys
responses:
@@ -1242,7 +1242,7 @@ paths:
summary: Return StateHistorys
tags:
- StateHistory
/v1/system/health:
/system/health:
get:
description: Return service control status
responses: