Search form entries with filtering criteria
Search form entries based on various criteria. Only form entries that the authenticated user has permission to view are included. Supports filtering by form_id, entry_status, user_id, date ranges, and other fields.
Path parameters
-
The ID that is previous to the one to start from e.g. if IDs are 1,2,3 fromthisid as 1 will return 2,3
POST
/formentries/search/{fromthisid}
curl \
--request POST 'https://YOURSITE.infoodle.com/apiv2/formentries/search/4' \
--header "Authorization: Bearer $ACCESS_TOKEN" \
--header "Content-Type: application/json" \
--data '{"search":[{"by":"form_id","value":67},{"by":"entry_status","type":"greater","value":2}]}'
Request examples
{
"search": [
{
"by": "form_id",
"value": 67
},
{
"by": "entry_status",
"type": "greater",
"value": 2
}
]
}
Response examples (200)
[
{
"id": 12345,
"form_id": 67,
"date_time_entered_utc": "2023-10-15T14:30:00Z",
"entry_status": 2,
"user_id": 42,
"approved_by": 42,
"approved_datetime_utc": "2023-10-16T09:15:00Z",
"paid_in_full": 1,
"total_required": "150.00",
"total_paid": "150.00",
"presented_id": 9876,
"reconciled_presented_id": 9876,
"invoice_number": "INV-2023-001234",
"invoice_public_url": "https://in.xero.com/abcdef1234567890",
"payment_fees": "3.50",
"nett_of_fees": "146.50",
"spam_score": "0.2",
"spam_message": "string",
"client_ipaddress": "192.168.1.100",
"validation_messages": "string",
"event_id": 789,
"event_instance": "2023-10-15"
}
]
Response examples (400)
{
"error": "Invalid field contents",
"errors": {
"errorfield": [
{
"code": 400,
"message": "Invalid value supplied for field"
}
]
}
}
Response examples (401)
{
"error": "Unauthorised"
}
Response examples (403)
{
"error": "Invalid Permission"
}