@greensecurity/javascript-sdk 0.31.17 → 0.35.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +24 -0
- package/bin/mcp-server.js +1828 -641
- package/bin/mcp-server.js.map +78 -57
- package/dist/commonjs/__tests__/datarequests.test.d.ts +2 -0
- package/dist/commonjs/__tests__/datarequests.test.d.ts.map +1 -0
- package/dist/commonjs/__tests__/datarequests.test.js +56 -0
- package/dist/commonjs/__tests__/datarequests.test.js.map +1 -0
- package/dist/commonjs/__tests__/vendors.test.js +80 -6
- package/dist/commonjs/__tests__/vendors.test.js.map +1 -1
- package/dist/commonjs/__tests__/zones.test.js +30 -2
- package/dist/commonjs/__tests__/zones.test.js.map +1 -1
- package/dist/commonjs/admin-funcs/doAdmin.d.ts.map +1 -1
- package/dist/commonjs/admin-funcs/doAdmin.js +3 -3
- package/dist/commonjs/admin-funcs/doAdmin.js.map +1 -1
- package/dist/commonjs/funcs/companiesListOrSearchCompanies.js +2 -0
- package/dist/commonjs/funcs/companiesListOrSearchCompanies.js.map +1 -1
- package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.d.ts +17 -0
- package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.js +124 -0
- package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.d.ts +17 -0
- package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.js +123 -0
- package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.d.ts +17 -0
- package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.js +124 -0
- package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/commonjs/funcs/organizationsGetFacility.js +2 -0
- package/dist/commonjs/funcs/organizationsGetFacility.js.map +1 -1
- package/dist/commonjs/funcs/organizationsListOrSearchFacilities.js +2 -0
- package/dist/commonjs/funcs/organizationsListOrSearchFacilities.js.map +1 -1
- package/dist/commonjs/funcs/supportArticlesGetSupportArticle.js +2 -0
- package/dist/commonjs/funcs/supportArticlesGetSupportArticle.js.map +1 -1
- package/dist/commonjs/funcs/supportArticlesListOrSearchSupportArticles.js +2 -0
- package/dist/commonjs/funcs/supportArticlesListOrSearchSupportArticles.js.map +1 -1
- package/dist/commonjs/funcs/usersChangePassword.js +2 -0
- package/dist/commonjs/funcs/usersChangePassword.js.map +1 -1
- package/dist/commonjs/funcs/usersGetCurrentUser.js +2 -0
- package/dist/commonjs/funcs/usersGetCurrentUser.js.map +1 -1
- package/dist/commonjs/funcs/usersGetUserById.js +2 -0
- package/dist/commonjs/funcs/usersGetUserById.js.map +1 -1
- package/dist/commonjs/funcs/usersMagiclink.js +2 -0
- package/dist/commonjs/funcs/usersMagiclink.js.map +1 -1
- package/dist/commonjs/funcs/usersPassword.js +2 -0
- package/dist/commonjs/funcs/usersPassword.js.map +1 -1
- package/dist/commonjs/funcs/usersPasswordResetRequest.js +2 -0
- package/dist/commonjs/funcs/usersPasswordResetRequest.js.map +1 -1
- package/dist/commonjs/funcs/usersPostAuthenticate.js +2 -0
- package/dist/commonjs/funcs/usersPostAuthenticate.js.map +1 -1
- package/dist/commonjs/funcs/vendorScansVendorScanOut.js +2 -0
- package/dist/commonjs/funcs/vendorScansVendorScanOut.js.map +1 -1
- package/dist/commonjs/funcs/vendorsAddVendorCredentialFile.js +2 -0
- package/dist/commonjs/funcs/vendorsAddVendorCredentialFile.js.map +1 -1
- package/dist/commonjs/funcs/vendorsAddVendorManagedByCompany.js +2 -0
- package/dist/commonjs/funcs/vendorsAddVendorManagedByCompany.js.map +1 -1
- package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.d.ts +17 -0
- package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
- package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.js +118 -0
- package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
- package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.d.ts +17 -0
- package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
- package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.js +121 -0
- package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.js.map +1 -0
- package/dist/commonjs/funcs/vendorsCreateVendorCompany.js +2 -0
- package/dist/commonjs/funcs/vendorsCreateVendorCompany.js.map +1 -1
- package/dist/commonjs/funcs/vendorsCreateVendorRegistration.js +2 -0
- package/dist/commonjs/funcs/vendorsCreateVendorRegistration.js.map +1 -1
- package/dist/commonjs/funcs/vendorsDeclineVendorCredential.js +2 -0
- package/dist/commonjs/funcs/vendorsDeclineVendorCredential.js.map +1 -1
- package/dist/commonjs/funcs/vendorsDeleteVendorCredentialFile.js +2 -0
- package/dist/commonjs/funcs/vendorsDeleteVendorCredentialFile.js.map +1 -1
- package/dist/commonjs/funcs/vendorsDeleteVendorManagedByCompany.js +2 -0
- package/dist/commonjs/funcs/vendorsDeleteVendorManagedByCompany.js.map +1 -1
- package/dist/commonjs/funcs/vendorsExpediteTimeRemaining.js +2 -0
- package/dist/commonjs/funcs/vendorsExpediteTimeRemaining.js.map +1 -1
- package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsGetVendorCredentialFile.js +2 -0
- package/dist/commonjs/funcs/vendorsGetVendorCredentialFile.js.map +1 -1
- package/dist/commonjs/funcs/vendorsGetVendorInvoiceDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsGetVendorInvoiceDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsGetVendorLegalName.d.ts +17 -0
- package/dist/commonjs/funcs/vendorsGetVendorLegalName.d.ts.map +1 -0
- package/dist/commonjs/funcs/vendorsGetVendorLegalName.js +122 -0
- package/dist/commonjs/funcs/vendorsGetVendorLegalName.js.map +1 -0
- package/dist/commonjs/funcs/vendorsGetVendorsDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsGetVendorsDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorAdditionalFacilityFields.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorAdditionalFacilityFields.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.d.ts +23 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.js +135 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.js.map +1 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentialFiles.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentialFiles.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorCredentialHistory.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentialHistory.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorCredentials.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentials.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorCredits.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorCredits.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorFacilityStatuses.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorFacilityStatuses.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorInvoices.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorInvoices.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorJobTitles.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorJobTitles.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorManagedByCompanies.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorManagedByCompanies.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorScrubDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorScrubDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorScrubPackages.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorScrubPackages.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorScrubPurchases.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorScrubPurchases.js.map +1 -1
- package/dist/commonjs/funcs/vendorsPurchaseScrubCredits.js +2 -0
- package/dist/commonjs/funcs/vendorsPurchaseScrubCredits.js.map +1 -1
- package/dist/commonjs/funcs/vendorsSubmitVendorCredential.js +2 -0
- package/dist/commonjs/funcs/vendorsSubmitVendorCredential.js.map +1 -1
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialFile.js +2 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialFile.js.map +1 -1
- package/dist/commonjs/funcs/vendorsUpdateVendorDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsUpdateVendorManagedByCompany.js +2 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorManagedByCompany.js.map +1 -1
- package/dist/commonjs/funcs/vendorsUpdateVendorScrubDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorScrubDetails.js.map +1 -1
- package/dist/commonjs/funcs/webhooksGetWebhookEndpoint.js +2 -0
- package/dist/commonjs/funcs/webhooksGetWebhookEndpoint.js.map +1 -1
- package/dist/commonjs/funcs/webhooksListAllWebhookEndpoints.js +2 -0
- package/dist/commonjs/funcs/webhooksListAllWebhookEndpoints.js.map +1 -1
- package/dist/commonjs/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js +2 -0
- package/dist/commonjs/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js.map +1 -1
- package/dist/commonjs/funcs/zonesListOrSearchSecurityZones.js +2 -0
- package/dist/commonjs/funcs/zonesListOrSearchSecurityZones.js.map +1 -1
- package/dist/commonjs/funcs/zonesSecurityZoneCheckin.js +2 -0
- package/dist/commonjs/funcs/zonesSecurityZoneCheckin.js.map +1 -1
- package/dist/commonjs/hooks/types.d.ts +2 -0
- package/dist/commonjs/hooks/types.d.ts.map +1 -1
- package/dist/commonjs/index.d.ts +2 -0
- package/dist/commonjs/index.d.ts.map +1 -1
- package/dist/commonjs/index.extras.js +1 -2
- package/dist/commonjs/index.extras.js.map +1 -1
- package/dist/commonjs/index.js +3 -1
- package/dist/commonjs/index.js.map +1 -1
- package/dist/commonjs/lib/config.d.ts +7 -3
- package/dist/commonjs/lib/config.d.ts.map +1 -1
- package/dist/commonjs/lib/config.js +3 -3
- package/dist/commonjs/lib/config.js.map +1 -1
- package/dist/commonjs/lib/sdks.d.ts +1 -0
- package/dist/commonjs/lib/sdks.d.ts.map +1 -1
- package/dist/commonjs/lib/sdks.js +3 -3
- package/dist/commonjs/lib/sdks.js.map +1 -1
- package/dist/commonjs/mcp-server/mcp-server.js +1 -1
- package/dist/commonjs/mcp-server/mcp-server.js.map +1 -1
- package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/server.js +15 -1
- package/dist/commonjs/mcp-server/server.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.js +64 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.js +64 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.js +64 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.js +64 -0
- package/dist/commonjs/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsCreateOrUpdateBcr.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsCreateOrUpdateBcr.js +64 -0
- package/dist/commonjs/mcp-server/tools/vendorsCreateOrUpdateBcr.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsGetVendorLegalName.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/vendorsGetVendorLegalName.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsGetVendorLegalName.js +64 -0
- package/dist/commonjs/mcp-server/tools/vendorsGetVendorLegalName.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsListVendorCredentialDataRequests.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsListVendorCredentialDataRequests.js +69 -0
- package/dist/commonjs/mcp-server/tools/vendorsListVendorCredentialDataRequests.js.map +1 -0
- package/dist/commonjs/models/components/expand.d.ts +6 -0
- package/dist/commonjs/models/components/expand.d.ts.map +1 -1
- package/dist/commonjs/models/components/expand.js +2 -0
- package/dist/commonjs/models/components/expand.js.map +1 -1
- package/dist/commonjs/models/operations/adddatarequestfile.d.ts +67 -0
- package/dist/commonjs/models/operations/adddatarequestfile.d.ts.map +1 -0
- package/dist/commonjs/models/operations/adddatarequestfile.js +124 -0
- package/dist/commonjs/models/operations/adddatarequestfile.js.map +1 -0
- package/dist/commonjs/models/operations/createnewvendorcredentialversion.d.ts +59 -0
- package/dist/commonjs/models/operations/createnewvendorcredentialversion.d.ts.map +1 -0
- package/dist/commonjs/models/operations/createnewvendorcredentialversion.js +107 -0
- package/dist/commonjs/models/operations/createnewvendorcredentialversion.js.map +1 -0
- package/dist/commonjs/models/operations/createorupdatebcr.d.ts +103 -0
- package/dist/commonjs/models/operations/createorupdatebcr.d.ts.map +1 -0
- package/dist/commonjs/models/operations/createorupdatebcr.js +153 -0
- package/dist/commonjs/models/operations/createorupdatebcr.js.map +1 -0
- package/dist/commonjs/models/operations/deletedatarequestfile.d.ts +32 -0
- package/dist/commonjs/models/operations/deletedatarequestfile.d.ts.map +1 -0
- package/dist/commonjs/models/operations/deletedatarequestfile.js +69 -0
- package/dist/commonjs/models/operations/deletedatarequestfile.js.map +1 -0
- package/dist/commonjs/models/operations/getvendorlegalname.d.ts +64 -0
- package/dist/commonjs/models/operations/getvendorlegalname.d.ts.map +1 -0
- package/dist/commonjs/models/operations/getvendorlegalname.js +121 -0
- package/dist/commonjs/models/operations/getvendorlegalname.js.map +1 -0
- package/dist/commonjs/models/operations/index.d.ts +7 -0
- package/dist/commonjs/models/operations/index.d.ts.map +1 -1
- package/dist/commonjs/models/operations/index.js +7 -0
- package/dist/commonjs/models/operations/index.js.map +1 -1
- package/dist/commonjs/models/operations/listvendorcredentialdatarequests.d.ts +58 -0
- package/dist/commonjs/models/operations/listvendorcredentialdatarequests.d.ts.map +1 -0
- package/dist/commonjs/models/operations/listvendorcredentialdatarequests.js +91 -0
- package/dist/commonjs/models/operations/listvendorcredentialdatarequests.js.map +1 -0
- package/dist/commonjs/models/operations/updatedatarequest.d.ts +59 -0
- package/dist/commonjs/models/operations/updatedatarequest.d.ts.map +1 -0
- package/dist/commonjs/models/operations/updatedatarequest.js +107 -0
- package/dist/commonjs/models/operations/updatedatarequest.js.map +1 -0
- package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.d.ts +23 -0
- package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.js +51 -0
- package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.d.ts +23 -0
- package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.js +51 -0
- package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.d.ts +23 -0
- package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.js +51 -0
- package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/commonjs/react-query/index.d.ts +7 -0
- package/dist/commonjs/react-query/index.d.ts.map +1 -1
- package/dist/commonjs/react-query/index.js +7 -0
- package/dist/commonjs/react-query/index.js.map +1 -1
- package/dist/commonjs/react-query/vendorsCreateNewVendorCredentialVersion.d.ts +23 -0
- package/dist/commonjs/react-query/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
- package/dist/commonjs/react-query/vendorsCreateNewVendorCredentialVersion.js +51 -0
- package/dist/commonjs/react-query/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
- package/dist/commonjs/react-query/vendorsCreateOrUpdateBcr.d.ts +23 -0
- package/dist/commonjs/react-query/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
- package/dist/commonjs/react-query/vendorsCreateOrUpdateBcr.js +47 -0
- package/dist/commonjs/react-query/vendorsCreateOrUpdateBcr.js.map +1 -0
- package/dist/commonjs/react-query/vendorsGetVendorLegalName.d.ts +30 -0
- package/dist/commonjs/react-query/vendorsGetVendorLegalName.d.ts.map +1 -0
- package/dist/commonjs/react-query/vendorsGetVendorLegalName.js +96 -0
- package/dist/commonjs/react-query/vendorsGetVendorLegalName.js.map +1 -0
- package/dist/commonjs/react-query/vendorsListVendorCredentialDataRequests.d.ts +65 -0
- package/dist/commonjs/react-query/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
- package/dist/commonjs/react-query/vendorsListVendorCredentialDataRequests.js +113 -0
- package/dist/commonjs/react-query/vendorsListVendorCredentialDataRequests.js.map +1 -0
- package/dist/commonjs/sdk/datarequests.d.ts +26 -0
- package/dist/commonjs/sdk/datarequests.d.ts.map +1 -0
- package/dist/commonjs/sdk/datarequests.js +42 -0
- package/dist/commonjs/sdk/datarequests.js.map +1 -0
- package/dist/commonjs/sdk/sdk.d.ts +3 -0
- package/dist/commonjs/sdk/sdk.d.ts.map +1 -1
- package/dist/commonjs/sdk/sdk.js +4 -0
- package/dist/commonjs/sdk/sdk.js.map +1 -1
- package/dist/commonjs/sdk/vendors.d.ts +33 -0
- package/dist/commonjs/sdk/vendors.d.ts.map +1 -1
- package/dist/commonjs/sdk/vendors.js +45 -0
- package/dist/commonjs/sdk/vendors.js.map +1 -1
- package/dist/esm/__tests__/datarequests.test.d.ts +2 -0
- package/dist/esm/__tests__/datarequests.test.d.ts.map +1 -0
- package/dist/esm/__tests__/datarequests.test.js +54 -0
- package/dist/esm/__tests__/datarequests.test.js.map +1 -0
- package/dist/esm/__tests__/vendors.test.js +80 -6
- package/dist/esm/__tests__/vendors.test.js.map +1 -1
- package/dist/esm/__tests__/zones.test.js +30 -2
- package/dist/esm/__tests__/zones.test.js.map +1 -1
- package/dist/esm/admin-funcs/doAdmin.d.ts.map +1 -1
- package/dist/esm/admin-funcs/doAdmin.js +3 -3
- package/dist/esm/admin-funcs/doAdmin.js.map +1 -1
- package/dist/esm/funcs/companiesListOrSearchCompanies.js +2 -0
- package/dist/esm/funcs/companiesListOrSearchCompanies.js.map +1 -1
- package/dist/esm/funcs/dataRequestsAddDataRequestFile.d.ts +17 -0
- package/dist/esm/funcs/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/esm/funcs/dataRequestsAddDataRequestFile.js +88 -0
- package/dist/esm/funcs/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.d.ts +17 -0
- package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.js +87 -0
- package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/esm/funcs/dataRequestsUpdateDataRequest.d.ts +17 -0
- package/dist/esm/funcs/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/esm/funcs/dataRequestsUpdateDataRequest.js +88 -0
- package/dist/esm/funcs/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/esm/funcs/organizationsGetFacility.js +2 -0
- package/dist/esm/funcs/organizationsGetFacility.js.map +1 -1
- package/dist/esm/funcs/organizationsListOrSearchFacilities.js +2 -0
- package/dist/esm/funcs/organizationsListOrSearchFacilities.js.map +1 -1
- package/dist/esm/funcs/supportArticlesGetSupportArticle.js +2 -0
- package/dist/esm/funcs/supportArticlesGetSupportArticle.js.map +1 -1
- package/dist/esm/funcs/supportArticlesListOrSearchSupportArticles.js +2 -0
- package/dist/esm/funcs/supportArticlesListOrSearchSupportArticles.js.map +1 -1
- package/dist/esm/funcs/usersChangePassword.js +2 -0
- package/dist/esm/funcs/usersChangePassword.js.map +1 -1
- package/dist/esm/funcs/usersGetCurrentUser.js +2 -0
- package/dist/esm/funcs/usersGetCurrentUser.js.map +1 -1
- package/dist/esm/funcs/usersGetUserById.js +2 -0
- package/dist/esm/funcs/usersGetUserById.js.map +1 -1
- package/dist/esm/funcs/usersMagiclink.js +2 -0
- package/dist/esm/funcs/usersMagiclink.js.map +1 -1
- package/dist/esm/funcs/usersPassword.js +2 -0
- package/dist/esm/funcs/usersPassword.js.map +1 -1
- package/dist/esm/funcs/usersPasswordResetRequest.js +2 -0
- package/dist/esm/funcs/usersPasswordResetRequest.js.map +1 -1
- package/dist/esm/funcs/usersPostAuthenticate.js +2 -0
- package/dist/esm/funcs/usersPostAuthenticate.js.map +1 -1
- package/dist/esm/funcs/vendorScansVendorScanOut.js +2 -0
- package/dist/esm/funcs/vendorScansVendorScanOut.js.map +1 -1
- package/dist/esm/funcs/vendorsAddVendorCredentialFile.js +2 -0
- package/dist/esm/funcs/vendorsAddVendorCredentialFile.js.map +1 -1
- package/dist/esm/funcs/vendorsAddVendorManagedByCompany.js +2 -0
- package/dist/esm/funcs/vendorsAddVendorManagedByCompany.js.map +1 -1
- package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.d.ts +17 -0
- package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
- package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.js +82 -0
- package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
- package/dist/esm/funcs/vendorsCreateOrUpdateBcr.d.ts +17 -0
- package/dist/esm/funcs/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
- package/dist/esm/funcs/vendorsCreateOrUpdateBcr.js +85 -0
- package/dist/esm/funcs/vendorsCreateOrUpdateBcr.js.map +1 -0
- package/dist/esm/funcs/vendorsCreateVendorCompany.js +2 -0
- package/dist/esm/funcs/vendorsCreateVendorCompany.js.map +1 -1
- package/dist/esm/funcs/vendorsCreateVendorRegistration.js +2 -0
- package/dist/esm/funcs/vendorsCreateVendorRegistration.js.map +1 -1
- package/dist/esm/funcs/vendorsDeclineVendorCredential.js +2 -0
- package/dist/esm/funcs/vendorsDeclineVendorCredential.js.map +1 -1
- package/dist/esm/funcs/vendorsDeleteVendorCredentialFile.js +2 -0
- package/dist/esm/funcs/vendorsDeleteVendorCredentialFile.js.map +1 -1
- package/dist/esm/funcs/vendorsDeleteVendorManagedByCompany.js +2 -0
- package/dist/esm/funcs/vendorsDeleteVendorManagedByCompany.js.map +1 -1
- package/dist/esm/funcs/vendorsExpediteTimeRemaining.js +2 -0
- package/dist/esm/funcs/vendorsExpediteTimeRemaining.js.map +1 -1
- package/dist/esm/funcs/vendorsGetVendorCredentialDetails.js +2 -0
- package/dist/esm/funcs/vendorsGetVendorCredentialDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsGetVendorCredentialFile.js +2 -0
- package/dist/esm/funcs/vendorsGetVendorCredentialFile.js.map +1 -1
- package/dist/esm/funcs/vendorsGetVendorInvoiceDetails.js +2 -0
- package/dist/esm/funcs/vendorsGetVendorInvoiceDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsGetVendorLegalName.d.ts +17 -0
- package/dist/esm/funcs/vendorsGetVendorLegalName.d.ts.map +1 -0
- package/dist/esm/funcs/vendorsGetVendorLegalName.js +86 -0
- package/dist/esm/funcs/vendorsGetVendorLegalName.js.map +1 -0
- package/dist/esm/funcs/vendorsGetVendorsDetails.js +2 -0
- package/dist/esm/funcs/vendorsGetVendorsDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorAdditionalFacilityFields.js +2 -0
- package/dist/esm/funcs/vendorsListVendorAdditionalFacilityFields.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.d.ts +23 -0
- package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
- package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.js +99 -0
- package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.js.map +1 -0
- package/dist/esm/funcs/vendorsListVendorCredentialFiles.js +2 -0
- package/dist/esm/funcs/vendorsListVendorCredentialFiles.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorCredentialHistory.js +2 -0
- package/dist/esm/funcs/vendorsListVendorCredentialHistory.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorCredentials.js +2 -0
- package/dist/esm/funcs/vendorsListVendorCredentials.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorCredits.js +2 -0
- package/dist/esm/funcs/vendorsListVendorCredits.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorFacilityStatuses.js +2 -0
- package/dist/esm/funcs/vendorsListVendorFacilityStatuses.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorInvoices.js +2 -0
- package/dist/esm/funcs/vendorsListVendorInvoices.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorJobTitles.js +2 -0
- package/dist/esm/funcs/vendorsListVendorJobTitles.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorManagedByCompanies.js +2 -0
- package/dist/esm/funcs/vendorsListVendorManagedByCompanies.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorScrubDetails.js +2 -0
- package/dist/esm/funcs/vendorsListVendorScrubDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorScrubPackages.js +2 -0
- package/dist/esm/funcs/vendorsListVendorScrubPackages.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorScrubPurchases.js +2 -0
- package/dist/esm/funcs/vendorsListVendorScrubPurchases.js.map +1 -1
- package/dist/esm/funcs/vendorsPurchaseScrubCredits.js +2 -0
- package/dist/esm/funcs/vendorsPurchaseScrubCredits.js.map +1 -1
- package/dist/esm/funcs/vendorsSubmitVendorCredential.js +2 -0
- package/dist/esm/funcs/vendorsSubmitVendorCredential.js.map +1 -1
- package/dist/esm/funcs/vendorsUpdateVendorCredentialFile.js +2 -0
- package/dist/esm/funcs/vendorsUpdateVendorCredentialFile.js.map +1 -1
- package/dist/esm/funcs/vendorsUpdateVendorDetails.js +2 -0
- package/dist/esm/funcs/vendorsUpdateVendorDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsUpdateVendorManagedByCompany.js +2 -0
- package/dist/esm/funcs/vendorsUpdateVendorManagedByCompany.js.map +1 -1
- package/dist/esm/funcs/vendorsUpdateVendorScrubDetails.js +2 -0
- package/dist/esm/funcs/vendorsUpdateVendorScrubDetails.js.map +1 -1
- package/dist/esm/funcs/webhooksGetWebhookEndpoint.js +2 -0
- package/dist/esm/funcs/webhooksGetWebhookEndpoint.js.map +1 -1
- package/dist/esm/funcs/webhooksListAllWebhookEndpoints.js +2 -0
- package/dist/esm/funcs/webhooksListAllWebhookEndpoints.js.map +1 -1
- package/dist/esm/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js +2 -0
- package/dist/esm/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js.map +1 -1
- package/dist/esm/funcs/zonesListOrSearchSecurityZones.js +2 -0
- package/dist/esm/funcs/zonesListOrSearchSecurityZones.js.map +1 -1
- package/dist/esm/funcs/zonesSecurityZoneCheckin.js +2 -0
- package/dist/esm/funcs/zonesSecurityZoneCheckin.js.map +1 -1
- package/dist/esm/hooks/types.d.ts +2 -0
- package/dist/esm/hooks/types.d.ts.map +1 -1
- package/dist/esm/index.d.ts +2 -0
- package/dist/esm/index.d.ts.map +1 -1
- package/dist/esm/index.extras.js +1 -2
- package/dist/esm/index.extras.js.map +1 -1
- package/dist/esm/index.js +1 -0
- package/dist/esm/index.js.map +1 -1
- package/dist/esm/lib/config.d.ts +7 -3
- package/dist/esm/lib/config.d.ts.map +1 -1
- package/dist/esm/lib/config.js +3 -3
- package/dist/esm/lib/config.js.map +1 -1
- package/dist/esm/lib/sdks.d.ts +1 -0
- package/dist/esm/lib/sdks.d.ts.map +1 -1
- package/dist/esm/lib/sdks.js +3 -3
- package/dist/esm/lib/sdks.js.map +1 -1
- package/dist/esm/mcp-server/mcp-server.js +1 -1
- package/dist/esm/mcp-server/mcp-server.js.map +1 -1
- package/dist/esm/mcp-server/server.d.ts.map +1 -1
- package/dist/esm/mcp-server/server.js +15 -1
- package/dist/esm/mcp-server/server.js.map +1 -1
- package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts +8 -0
- package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.js +28 -0
- package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts +8 -0
- package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.js +28 -0
- package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts +8 -0
- package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.js +28 -0
- package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.d.ts +8 -0
- package/dist/esm/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.js +28 -0
- package/dist/esm/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsCreateOrUpdateBcr.d.ts +8 -0
- package/dist/esm/mcp-server/tools/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsCreateOrUpdateBcr.js +28 -0
- package/dist/esm/mcp-server/tools/vendorsCreateOrUpdateBcr.js.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsGetVendorLegalName.d.ts +8 -0
- package/dist/esm/mcp-server/tools/vendorsGetVendorLegalName.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsGetVendorLegalName.js +28 -0
- package/dist/esm/mcp-server/tools/vendorsGetVendorLegalName.js.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsListVendorCredentialDataRequests.d.ts +8 -0
- package/dist/esm/mcp-server/tools/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsListVendorCredentialDataRequests.js +33 -0
- package/dist/esm/mcp-server/tools/vendorsListVendorCredentialDataRequests.js.map +1 -0
- package/dist/esm/models/components/expand.d.ts +6 -0
- package/dist/esm/models/components/expand.d.ts.map +1 -1
- package/dist/esm/models/components/expand.js +2 -0
- package/dist/esm/models/components/expand.js.map +1 -1
- package/dist/esm/models/operations/adddatarequestfile.d.ts +67 -0
- package/dist/esm/models/operations/adddatarequestfile.d.ts.map +1 -0
- package/dist/esm/models/operations/adddatarequestfile.js +84 -0
- package/dist/esm/models/operations/adddatarequestfile.js.map +1 -0
- package/dist/esm/models/operations/createnewvendorcredentialversion.d.ts +59 -0
- package/dist/esm/models/operations/createnewvendorcredentialversion.d.ts.map +1 -0
- package/dist/esm/models/operations/createnewvendorcredentialversion.js +67 -0
- package/dist/esm/models/operations/createnewvendorcredentialversion.js.map +1 -0
- package/dist/esm/models/operations/createorupdatebcr.d.ts +103 -0
- package/dist/esm/models/operations/createorupdatebcr.d.ts.map +1 -0
- package/dist/esm/models/operations/createorupdatebcr.js +113 -0
- package/dist/esm/models/operations/createorupdatebcr.js.map +1 -0
- package/dist/esm/models/operations/deletedatarequestfile.d.ts +32 -0
- package/dist/esm/models/operations/deletedatarequestfile.d.ts.map +1 -0
- package/dist/esm/models/operations/deletedatarequestfile.js +31 -0
- package/dist/esm/models/operations/deletedatarequestfile.js.map +1 -0
- package/dist/esm/models/operations/getvendorlegalname.d.ts +64 -0
- package/dist/esm/models/operations/getvendorlegalname.d.ts.map +1 -0
- package/dist/esm/models/operations/getvendorlegalname.js +81 -0
- package/dist/esm/models/operations/getvendorlegalname.js.map +1 -0
- package/dist/esm/models/operations/index.d.ts +7 -0
- package/dist/esm/models/operations/index.d.ts.map +1 -1
- package/dist/esm/models/operations/index.js +7 -0
- package/dist/esm/models/operations/index.js.map +1 -1
- package/dist/esm/models/operations/listvendorcredentialdatarequests.d.ts +58 -0
- package/dist/esm/models/operations/listvendorcredentialdatarequests.d.ts.map +1 -0
- package/dist/esm/models/operations/listvendorcredentialdatarequests.js +53 -0
- package/dist/esm/models/operations/listvendorcredentialdatarequests.js.map +1 -0
- package/dist/esm/models/operations/updatedatarequest.d.ts +59 -0
- package/dist/esm/models/operations/updatedatarequest.d.ts.map +1 -0
- package/dist/esm/models/operations/updatedatarequest.js +67 -0
- package/dist/esm/models/operations/updatedatarequest.js.map +1 -0
- package/dist/esm/react-query/dataRequestsAddDataRequestFile.d.ts +23 -0
- package/dist/esm/react-query/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/esm/react-query/dataRequestsAddDataRequestFile.js +46 -0
- package/dist/esm/react-query/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.d.ts +23 -0
- package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.js +46 -0
- package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/esm/react-query/dataRequestsUpdateDataRequest.d.ts +23 -0
- package/dist/esm/react-query/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/esm/react-query/dataRequestsUpdateDataRequest.js +46 -0
- package/dist/esm/react-query/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/esm/react-query/index.d.ts +7 -0
- package/dist/esm/react-query/index.d.ts.map +1 -1
- package/dist/esm/react-query/index.js +7 -0
- package/dist/esm/react-query/index.js.map +1 -1
- package/dist/esm/react-query/vendorsCreateNewVendorCredentialVersion.d.ts +23 -0
- package/dist/esm/react-query/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
- package/dist/esm/react-query/vendorsCreateNewVendorCredentialVersion.js +46 -0
- package/dist/esm/react-query/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
- package/dist/esm/react-query/vendorsCreateOrUpdateBcr.d.ts +23 -0
- package/dist/esm/react-query/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
- package/dist/esm/react-query/vendorsCreateOrUpdateBcr.js +42 -0
- package/dist/esm/react-query/vendorsCreateOrUpdateBcr.js.map +1 -0
- package/dist/esm/react-query/vendorsGetVendorLegalName.d.ts +30 -0
- package/dist/esm/react-query/vendorsGetVendorLegalName.d.ts.map +1 -0
- package/dist/esm/react-query/vendorsGetVendorLegalName.js +86 -0
- package/dist/esm/react-query/vendorsGetVendorLegalName.js.map +1 -0
- package/dist/esm/react-query/vendorsListVendorCredentialDataRequests.d.ts +65 -0
- package/dist/esm/react-query/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
- package/dist/esm/react-query/vendorsListVendorCredentialDataRequests.js +103 -0
- package/dist/esm/react-query/vendorsListVendorCredentialDataRequests.js.map +1 -0
- package/dist/esm/sdk/datarequests.d.ts +26 -0
- package/dist/esm/sdk/datarequests.d.ts.map +1 -0
- package/dist/esm/sdk/datarequests.js +38 -0
- package/dist/esm/sdk/datarequests.js.map +1 -0
- package/dist/esm/sdk/sdk.d.ts +3 -0
- package/dist/esm/sdk/sdk.d.ts.map +1 -1
- package/dist/esm/sdk/sdk.js +4 -0
- package/dist/esm/sdk/sdk.js.map +1 -1
- package/dist/esm/sdk/vendors.d.ts +33 -0
- package/dist/esm/sdk/vendors.d.ts.map +1 -1
- package/dist/esm/sdk/vendors.js +45 -0
- package/dist/esm/sdk/vendors.js.map +1 -1
- package/jsr.json +1 -1
- package/package.json +1 -1
- package/src/__tests__/datarequests.test.ts +63 -0
- package/src/__tests__/vendors.test.ts +96 -6
- package/src/__tests__/zones.test.ts +30 -2
- package/src/admin-funcs/doAdmin.ts +3 -4
- package/src/funcs/companiesListOrSearchCompanies.ts +2 -0
- package/src/funcs/dataRequestsAddDataRequestFile.ts +176 -0
- package/src/funcs/dataRequestsDeleteDataRequestFile.ts +176 -0
- package/src/funcs/dataRequestsUpdateDataRequest.ts +176 -0
- package/src/funcs/organizationsGetFacility.ts +2 -0
- package/src/funcs/organizationsListOrSearchFacilities.ts +2 -0
- package/src/funcs/supportArticlesGetSupportArticle.ts +2 -0
- package/src/funcs/supportArticlesListOrSearchSupportArticles.ts +2 -0
- package/src/funcs/usersChangePassword.ts +2 -0
- package/src/funcs/usersGetCurrentUser.ts +2 -0
- package/src/funcs/usersGetUserById.ts +2 -0
- package/src/funcs/usersMagiclink.ts +2 -0
- package/src/funcs/usersPassword.ts +2 -0
- package/src/funcs/usersPasswordResetRequest.ts +2 -0
- package/src/funcs/usersPostAuthenticate.ts +2 -0
- package/src/funcs/vendorScansVendorScanOut.ts +2 -0
- package/src/funcs/vendorsAddVendorCredentialFile.ts +2 -0
- package/src/funcs/vendorsAddVendorManagedByCompany.ts +2 -0
- package/src/funcs/vendorsCreateNewVendorCredentialVersion.ts +173 -0
- package/src/funcs/vendorsCreateOrUpdateBcr.ts +179 -0
- package/src/funcs/vendorsCreateVendorCompany.ts +2 -0
- package/src/funcs/vendorsCreateVendorRegistration.ts +2 -0
- package/src/funcs/vendorsDeclineVendorCredential.ts +2 -0
- package/src/funcs/vendorsDeleteVendorCredentialFile.ts +2 -0
- package/src/funcs/vendorsDeleteVendorManagedByCompany.ts +2 -0
- package/src/funcs/vendorsExpediteTimeRemaining.ts +2 -0
- package/src/funcs/vendorsGetVendorCredentialDetails.ts +2 -0
- package/src/funcs/vendorsGetVendorCredentialFile.ts +2 -0
- package/src/funcs/vendorsGetVendorInvoiceDetails.ts +2 -0
- package/src/funcs/vendorsGetVendorLegalName.ts +174 -0
- package/src/funcs/vendorsGetVendorsDetails.ts +2 -0
- package/src/funcs/vendorsListVendorAdditionalFacilityFields.ts +2 -0
- package/src/funcs/vendorsListVendorCredentialDataRequests.ts +203 -0
- package/src/funcs/vendorsListVendorCredentialFiles.ts +2 -0
- package/src/funcs/vendorsListVendorCredentialHistory.ts +2 -0
- package/src/funcs/vendorsListVendorCredentials.ts +2 -0
- package/src/funcs/vendorsListVendorCredits.ts +2 -0
- package/src/funcs/vendorsListVendorFacilityStatuses.ts +2 -0
- package/src/funcs/vendorsListVendorInvoices.ts +2 -0
- package/src/funcs/vendorsListVendorJobTitles.ts +2 -0
- package/src/funcs/vendorsListVendorManagedByCompanies.ts +2 -0
- package/src/funcs/vendorsListVendorScrubDetails.ts +2 -0
- package/src/funcs/vendorsListVendorScrubPackages.ts +2 -0
- package/src/funcs/vendorsListVendorScrubPurchases.ts +2 -0
- package/src/funcs/vendorsPurchaseScrubCredits.ts +2 -0
- package/src/funcs/vendorsSubmitVendorCredential.ts +2 -0
- package/src/funcs/vendorsUpdateVendorCredentialFile.ts +2 -0
- package/src/funcs/vendorsUpdateVendorDetails.ts +2 -0
- package/src/funcs/vendorsUpdateVendorManagedByCompany.ts +2 -0
- package/src/funcs/vendorsUpdateVendorScrubDetails.ts +2 -0
- package/src/funcs/webhooksGetWebhookEndpoint.ts +2 -0
- package/src/funcs/webhooksListAllWebhookEndpoints.ts +2 -0
- package/src/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts +2 -0
- package/src/funcs/zonesListOrSearchSecurityZones.ts +2 -0
- package/src/funcs/zonesSecurityZoneCheckin.ts +2 -0
- package/src/hooks/types.ts +2 -0
- package/src/index.extras.ts +1 -3
- package/src/index.ts +2 -0
- package/src/lib/config.ts +7 -3
- package/src/lib/sdks.ts +10 -4
- package/src/mcp-server/mcp-server.ts +1 -1
- package/src/mcp-server/server.ts +15 -1
- package/src/mcp-server/tools/dataRequestsAddDataRequestFile.ts +38 -0
- package/src/mcp-server/tools/dataRequestsDeleteDataRequestFile.ts +39 -0
- package/src/mcp-server/tools/dataRequestsUpdateDataRequest.ts +37 -0
- package/src/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.ts +39 -0
- package/src/mcp-server/tools/vendorsCreateOrUpdateBcr.ts +37 -0
- package/src/mcp-server/tools/vendorsGetVendorLegalName.ts +37 -0
- package/src/mcp-server/tools/vendorsListVendorCredentialDataRequests.ts +44 -0
- package/src/models/components/expand.ts +4 -0
- package/src/models/operations/adddatarequestfile.ts +166 -0
- package/src/models/operations/createnewvendorcredentialversion.ts +166 -0
- package/src/models/operations/createorupdatebcr.ts +214 -0
- package/src/models/operations/deletedatarequestfile.ts +71 -0
- package/src/models/operations/getvendorlegalname.ts +161 -0
- package/src/models/operations/index.ts +7 -0
- package/src/models/operations/listvendorcredentialdatarequests.ts +127 -0
- package/src/models/operations/updatedatarequest.ts +142 -0
- package/src/react-query/dataRequestsAddDataRequestFile.ts +92 -0
- package/src/react-query/dataRequestsDeleteDataRequestFile.ts +92 -0
- package/src/react-query/dataRequestsUpdateDataRequest.ts +92 -0
- package/src/react-query/index.ts +7 -0
- package/src/react-query/vendorsCreateNewVendorCredentialVersion.ts +93 -0
- package/src/react-query/vendorsCreateOrUpdateBcr.ts +88 -0
- package/src/react-query/vendorsGetVendorLegalName.ts +165 -0
- package/src/react-query/vendorsListVendorCredentialDataRequests.ts +222 -0
- package/src/sdk/datarequests.ts +63 -0
- package/src/sdk/sdk.ts +6 -0
- package/src/sdk/vendors.ts +77 -0
package/bin/mcp-server.js
CHANGED
|
@@ -34236,9 +34236,9 @@ var init_config = __esm(() => {
|
|
|
34236
34236
|
SDK_METADATA = {
|
|
34237
34237
|
language: "typescript",
|
|
34238
34238
|
openapiDocVersion: "0.0.3",
|
|
34239
|
-
sdkVersion: "0.
|
|
34240
|
-
genVersion: "2.
|
|
34241
|
-
userAgent: "speakeasy-sdk/typescript 0.
|
|
34239
|
+
sdkVersion: "0.35.1",
|
|
34240
|
+
genVersion: "2.618.0",
|
|
34241
|
+
userAgent: "speakeasy-sdk/typescript 0.35.1 2.618.0 0.0.3 @greensecurity/javascript-sdk"
|
|
34242
34242
|
};
|
|
34243
34243
|
});
|
|
34244
34244
|
|
|
@@ -34804,7 +34804,6 @@ class ClientSDK {
|
|
|
34804
34804
|
} else {
|
|
34805
34805
|
this.#hooks = new SDKHooks;
|
|
34806
34806
|
}
|
|
34807
|
-
this._options = { ...options, hooks: this.#hooks };
|
|
34808
34807
|
const url = serverURLFromOptions(options);
|
|
34809
34808
|
if (url) {
|
|
34810
34809
|
url.pathname = url.pathname.replace(/\/+$/, "") + "/";
|
|
@@ -34815,7 +34814,8 @@ class ClientSDK {
|
|
|
34815
34814
|
});
|
|
34816
34815
|
this._baseURL = baseURL;
|
|
34817
34816
|
this.#httpClient = client;
|
|
34818
|
-
this
|
|
34817
|
+
this._options = { ...options, hooks: this.#hooks };
|
|
34818
|
+
this.#logger = this._options.debugLogger;
|
|
34819
34819
|
if (!this.#logger && env().GREEN_SECURITY_DEBUG) {
|
|
34820
34820
|
this.#logger = console;
|
|
34821
34821
|
}
|
|
@@ -34869,7 +34869,7 @@ class ClientSDK {
|
|
|
34869
34869
|
headers.set(k2, v2);
|
|
34870
34870
|
}
|
|
34871
34871
|
if (!isBrowserLike) {
|
|
34872
|
-
headers.set(conf.uaHeader ?? "user-agent", SDK_METADATA.userAgent);
|
|
34872
|
+
headers.set(conf.uaHeader ?? "user-agent", conf.userAgent ?? SDK_METADATA.userAgent);
|
|
34873
34873
|
}
|
|
34874
34874
|
const fetchOptions = {
|
|
34875
34875
|
...options?.fetchOptions,
|
|
@@ -36820,7 +36820,9 @@ var init_expand = __esm(() => {
|
|
|
36820
36820
|
VendorCredentialCredentialVariants: "vendor_credential.credential_variants",
|
|
36821
36821
|
VendorCredentialTargetsChop: "vendor_credential.targets_chop",
|
|
36822
36822
|
VendorCredentialFileVendorCredential: "vendor_credential_file.vendor_credential",
|
|
36823
|
-
VendorCredentialFileCredentialDocument: "vendor_credential_file.credential_document"
|
|
36823
|
+
VendorCredentialFileCredentialDocument: "vendor_credential_file.credential_document",
|
|
36824
|
+
VendorCredentialDataRequestVendorCredential: "vendor_credential_data_request.vendor_credential",
|
|
36825
|
+
VendorCredentialDataRequestDataRequest: "vendor_credential_data_request.data_request"
|
|
36824
36826
|
};
|
|
36825
36827
|
Expand$inboundSchema = nativeEnumType(Expand);
|
|
36826
36828
|
Expand$outboundSchema = Expand$inboundSchema;
|
|
@@ -40175,6 +40177,60 @@ var init_components = __esm(() => {
|
|
|
40175
40177
|
init_zoneconfig();
|
|
40176
40178
|
});
|
|
40177
40179
|
|
|
40180
|
+
// src/models/operations/adddatarequestfile.ts
|
|
40181
|
+
var AddDataRequestFileRequestBody$inboundSchema, AddDataRequestFileRequestBody$outboundSchema, AddDataRequestFileRequestBody$, AddDataRequestFileRequest$inboundSchema, AddDataRequestFileRequest$outboundSchema, AddDataRequestFileRequest$;
|
|
40182
|
+
var init_adddatarequestfile = __esm(() => {
|
|
40183
|
+
init_esm();
|
|
40184
|
+
init_primitives();
|
|
40185
|
+
init_components();
|
|
40186
|
+
AddDataRequestFileRequestBody$inboundSchema = objectType({
|
|
40187
|
+
file_name: stringType().optional(),
|
|
40188
|
+
content_type: ContentType$inboundSchema.optional(),
|
|
40189
|
+
file_size: numberType().int().optional()
|
|
40190
|
+
}).transform((v2) => {
|
|
40191
|
+
return remap(v2, {
|
|
40192
|
+
file_name: "fileName",
|
|
40193
|
+
content_type: "contentType",
|
|
40194
|
+
file_size: "fileSize"
|
|
40195
|
+
});
|
|
40196
|
+
});
|
|
40197
|
+
AddDataRequestFileRequestBody$outboundSchema = objectType({
|
|
40198
|
+
fileName: stringType().optional(),
|
|
40199
|
+
contentType: ContentType$outboundSchema.optional(),
|
|
40200
|
+
fileSize: numberType().int().optional()
|
|
40201
|
+
}).transform((v2) => {
|
|
40202
|
+
return remap(v2, {
|
|
40203
|
+
fileName: "file_name",
|
|
40204
|
+
contentType: "content_type",
|
|
40205
|
+
fileSize: "file_size"
|
|
40206
|
+
});
|
|
40207
|
+
});
|
|
40208
|
+
((AddDataRequestFileRequestBody$) => {
|
|
40209
|
+
AddDataRequestFileRequestBody$.inboundSchema = AddDataRequestFileRequestBody$inboundSchema;
|
|
40210
|
+
AddDataRequestFileRequestBody$.outboundSchema = AddDataRequestFileRequestBody$outboundSchema;
|
|
40211
|
+
})(AddDataRequestFileRequestBody$ ||= {});
|
|
40212
|
+
AddDataRequestFileRequest$inboundSchema = objectType({
|
|
40213
|
+
id: numberType().int(),
|
|
40214
|
+
RequestBody: lazyType(() => AddDataRequestFileRequestBody$inboundSchema)
|
|
40215
|
+
}).transform((v2) => {
|
|
40216
|
+
return remap(v2, {
|
|
40217
|
+
RequestBody: "requestBody"
|
|
40218
|
+
});
|
|
40219
|
+
});
|
|
40220
|
+
AddDataRequestFileRequest$outboundSchema = objectType({
|
|
40221
|
+
id: numberType().int(),
|
|
40222
|
+
requestBody: lazyType(() => AddDataRequestFileRequestBody$outboundSchema)
|
|
40223
|
+
}).transform((v2) => {
|
|
40224
|
+
return remap(v2, {
|
|
40225
|
+
requestBody: "RequestBody"
|
|
40226
|
+
});
|
|
40227
|
+
});
|
|
40228
|
+
((AddDataRequestFileRequest$) => {
|
|
40229
|
+
AddDataRequestFileRequest$.inboundSchema = AddDataRequestFileRequest$inboundSchema;
|
|
40230
|
+
AddDataRequestFileRequest$.outboundSchema = AddDataRequestFileRequest$outboundSchema;
|
|
40231
|
+
})(AddDataRequestFileRequest$ ||= {});
|
|
40232
|
+
});
|
|
40233
|
+
|
|
40178
40234
|
// src/models/operations/addvendorcredentialfile.ts
|
|
40179
40235
|
var AddVendorCredentialFileRequestBody$inboundSchema, AddVendorCredentialFileRequestBody$outboundSchema, AddVendorCredentialFileRequestBody$, AddVendorCredentialFileRequest$inboundSchema, AddVendorCredentialFileRequest$outboundSchema, AddVendorCredentialFileRequest$, AddVendorCredentialFileResponseBody$inboundSchema, AddVendorCredentialFileResponseBody$outboundSchema, AddVendorCredentialFileResponseBody$;
|
|
40180
40236
|
var init_addvendorcredentialfile = __esm(() => {
|
|
@@ -40365,6 +40421,117 @@ var init_changepassword = __esm(() => {
|
|
|
40365
40421
|
})(ChangePasswordChangePasswordOk$ ||= {});
|
|
40366
40422
|
});
|
|
40367
40423
|
|
|
40424
|
+
// src/models/operations/createnewvendorcredentialversion.ts
|
|
40425
|
+
var CreateNewVendorCredentialVersionRequestBody$inboundSchema, CreateNewVendorCredentialVersionRequestBody$outboundSchema, CreateNewVendorCredentialVersionRequestBody$, CreateNewVendorCredentialVersionResponseBody$inboundSchema, CreateNewVendorCredentialVersionResponseBody$outboundSchema, CreateNewVendorCredentialVersionResponseBody$;
|
|
40426
|
+
var init_createnewvendorcredentialversion = __esm(() => {
|
|
40427
|
+
init_esm();
|
|
40428
|
+
init_primitives();
|
|
40429
|
+
CreateNewVendorCredentialVersionRequestBody$inboundSchema = objectType({
|
|
40430
|
+
vendor_credential_id: numberType().int()
|
|
40431
|
+
}).transform((v2) => {
|
|
40432
|
+
return remap(v2, {
|
|
40433
|
+
vendor_credential_id: "vendorCredentialId"
|
|
40434
|
+
});
|
|
40435
|
+
});
|
|
40436
|
+
CreateNewVendorCredentialVersionRequestBody$outboundSchema = objectType({
|
|
40437
|
+
vendorCredentialId: numberType().int()
|
|
40438
|
+
}).transform((v2) => {
|
|
40439
|
+
return remap(v2, {
|
|
40440
|
+
vendorCredentialId: "vendor_credential_id"
|
|
40441
|
+
});
|
|
40442
|
+
});
|
|
40443
|
+
((CreateNewVendorCredentialVersionRequestBody$) => {
|
|
40444
|
+
CreateNewVendorCredentialVersionRequestBody$.inboundSchema = CreateNewVendorCredentialVersionRequestBody$inboundSchema;
|
|
40445
|
+
CreateNewVendorCredentialVersionRequestBody$.outboundSchema = CreateNewVendorCredentialVersionRequestBody$outboundSchema;
|
|
40446
|
+
})(CreateNewVendorCredentialVersionRequestBody$ ||= {});
|
|
40447
|
+
CreateNewVendorCredentialVersionResponseBody$inboundSchema = objectType({
|
|
40448
|
+
id: numberType().int().optional(),
|
|
40449
|
+
success: booleanType().optional()
|
|
40450
|
+
});
|
|
40451
|
+
CreateNewVendorCredentialVersionResponseBody$outboundSchema = objectType({
|
|
40452
|
+
id: numberType().int().optional(),
|
|
40453
|
+
success: booleanType().optional()
|
|
40454
|
+
});
|
|
40455
|
+
((CreateNewVendorCredentialVersionResponseBody$) => {
|
|
40456
|
+
CreateNewVendorCredentialVersionResponseBody$.inboundSchema = CreateNewVendorCredentialVersionResponseBody$inboundSchema;
|
|
40457
|
+
CreateNewVendorCredentialVersionResponseBody$.outboundSchema = CreateNewVendorCredentialVersionResponseBody$outboundSchema;
|
|
40458
|
+
})(CreateNewVendorCredentialVersionResponseBody$ ||= {});
|
|
40459
|
+
});
|
|
40460
|
+
|
|
40461
|
+
// src/models/operations/createorupdatebcr.ts
|
|
40462
|
+
var DeliveryMethod2, DeliveryMethod$inboundSchema2, DeliveryMethod$outboundSchema2, DeliveryMethod$2, CreateOrUpdateBcrRequestBody$inboundSchema, CreateOrUpdateBcrRequestBody$outboundSchema, CreateOrUpdateBcrRequestBody$, CreateOrUpdateBcrRequest$inboundSchema, CreateOrUpdateBcrRequest$outboundSchema, CreateOrUpdateBcrRequest$;
|
|
40463
|
+
var init_createorupdatebcr = __esm(() => {
|
|
40464
|
+
init_esm();
|
|
40465
|
+
init_primitives();
|
|
40466
|
+
init_components();
|
|
40467
|
+
DeliveryMethod2 = {
|
|
40468
|
+
Email: "email",
|
|
40469
|
+
Mail: "mail"
|
|
40470
|
+
};
|
|
40471
|
+
DeliveryMethod$inboundSchema2 = nativeEnumType(DeliveryMethod2);
|
|
40472
|
+
DeliveryMethod$outboundSchema2 = DeliveryMethod$inboundSchema2;
|
|
40473
|
+
((DeliveryMethod$) => {
|
|
40474
|
+
DeliveryMethod$.inboundSchema = DeliveryMethod$inboundSchema2;
|
|
40475
|
+
DeliveryMethod$.outboundSchema = DeliveryMethod$outboundSchema2;
|
|
40476
|
+
})(DeliveryMethod$2 ||= {});
|
|
40477
|
+
CreateOrUpdateBcrRequestBody$inboundSchema = objectType({
|
|
40478
|
+
electronic_signature: stringType().optional(),
|
|
40479
|
+
delivery_method: DeliveryMethod$inboundSchema2.optional(),
|
|
40480
|
+
email: stringType().optional(),
|
|
40481
|
+
address1: stringType().optional(),
|
|
40482
|
+
address2: stringType().optional(),
|
|
40483
|
+
city: stringType().optional(),
|
|
40484
|
+
state: nullableType(State$inboundSchema).optional(),
|
|
40485
|
+
zip: stringType().optional()
|
|
40486
|
+
}).transform((v2) => {
|
|
40487
|
+
return remap(v2, {
|
|
40488
|
+
electronic_signature: "electronicSignature",
|
|
40489
|
+
delivery_method: "deliveryMethod"
|
|
40490
|
+
});
|
|
40491
|
+
});
|
|
40492
|
+
CreateOrUpdateBcrRequestBody$outboundSchema = objectType({
|
|
40493
|
+
electronicSignature: stringType().optional(),
|
|
40494
|
+
deliveryMethod: DeliveryMethod$outboundSchema2.optional(),
|
|
40495
|
+
email: stringType().optional(),
|
|
40496
|
+
address1: stringType().optional(),
|
|
40497
|
+
address2: stringType().optional(),
|
|
40498
|
+
city: stringType().optional(),
|
|
40499
|
+
state: nullableType(State$outboundSchema).optional(),
|
|
40500
|
+
zip: stringType().optional()
|
|
40501
|
+
}).transform((v2) => {
|
|
40502
|
+
return remap(v2, {
|
|
40503
|
+
electronicSignature: "electronic_signature",
|
|
40504
|
+
deliveryMethod: "delivery_method"
|
|
40505
|
+
});
|
|
40506
|
+
});
|
|
40507
|
+
((CreateOrUpdateBcrRequestBody$) => {
|
|
40508
|
+
CreateOrUpdateBcrRequestBody$.inboundSchema = CreateOrUpdateBcrRequestBody$inboundSchema;
|
|
40509
|
+
CreateOrUpdateBcrRequestBody$.outboundSchema = CreateOrUpdateBcrRequestBody$outboundSchema;
|
|
40510
|
+
})(CreateOrUpdateBcrRequestBody$ ||= {});
|
|
40511
|
+
CreateOrUpdateBcrRequest$inboundSchema = objectType({
|
|
40512
|
+
vendor_credential_id: numberType().int(),
|
|
40513
|
+
RequestBody: lazyType(() => CreateOrUpdateBcrRequestBody$inboundSchema)
|
|
40514
|
+
}).transform((v2) => {
|
|
40515
|
+
return remap(v2, {
|
|
40516
|
+
vendor_credential_id: "vendorCredentialId",
|
|
40517
|
+
RequestBody: "requestBody"
|
|
40518
|
+
});
|
|
40519
|
+
});
|
|
40520
|
+
CreateOrUpdateBcrRequest$outboundSchema = objectType({
|
|
40521
|
+
vendorCredentialId: numberType().int(),
|
|
40522
|
+
requestBody: lazyType(() => CreateOrUpdateBcrRequestBody$outboundSchema)
|
|
40523
|
+
}).transform((v2) => {
|
|
40524
|
+
return remap(v2, {
|
|
40525
|
+
vendorCredentialId: "vendor_credential_id",
|
|
40526
|
+
requestBody: "RequestBody"
|
|
40527
|
+
});
|
|
40528
|
+
});
|
|
40529
|
+
((CreateOrUpdateBcrRequest$) => {
|
|
40530
|
+
CreateOrUpdateBcrRequest$.inboundSchema = CreateOrUpdateBcrRequest$inboundSchema;
|
|
40531
|
+
CreateOrUpdateBcrRequest$.outboundSchema = CreateOrUpdateBcrRequest$outboundSchema;
|
|
40532
|
+
})(CreateOrUpdateBcrRequest$ ||= {});
|
|
40533
|
+
});
|
|
40534
|
+
|
|
40368
40535
|
// src/models/operations/createvendorcompany.ts
|
|
40369
40536
|
var CreateVendorCompanyRequestBody$inboundSchema, CreateVendorCompanyRequestBody$outboundSchema, CreateVendorCompanyRequestBody$, CreateVendorCompanyRequest$inboundSchema, CreateVendorCompanyRequest$outboundSchema, CreateVendorCompanyRequest$, CreateVendorCompanyResponseBody$inboundSchema, CreateVendorCompanyResponseBody$outboundSchema, CreateVendorCompanyResponseBody$;
|
|
40370
40537
|
var init_createvendorcompany = __esm(() => {
|
|
@@ -40505,6 +40672,22 @@ var init_declinevendorcredential = __esm(() => {
|
|
|
40505
40672
|
})(DeclineVendorCredentialRequest$ ||= {});
|
|
40506
40673
|
});
|
|
40507
40674
|
|
|
40675
|
+
// src/models/operations/deletedatarequestfile.ts
|
|
40676
|
+
var DeleteDataRequestFileRequest$inboundSchema, DeleteDataRequestFileRequest$outboundSchema, DeleteDataRequestFileRequest$;
|
|
40677
|
+
var init_deletedatarequestfile = __esm(() => {
|
|
40678
|
+
init_esm();
|
|
40679
|
+
DeleteDataRequestFileRequest$inboundSchema = objectType({
|
|
40680
|
+
id: numberType().int()
|
|
40681
|
+
});
|
|
40682
|
+
DeleteDataRequestFileRequest$outboundSchema = objectType({
|
|
40683
|
+
id: numberType().int()
|
|
40684
|
+
});
|
|
40685
|
+
((DeleteDataRequestFileRequest$) => {
|
|
40686
|
+
DeleteDataRequestFileRequest$.inboundSchema = DeleteDataRequestFileRequest$inboundSchema;
|
|
40687
|
+
DeleteDataRequestFileRequest$.outboundSchema = DeleteDataRequestFileRequest$outboundSchema;
|
|
40688
|
+
})(DeleteDataRequestFileRequest$ ||= {});
|
|
40689
|
+
});
|
|
40690
|
+
|
|
40508
40691
|
// src/models/operations/deletevendorcredentialfile.ts
|
|
40509
40692
|
var DeleteVendorCredentialFileRequest$inboundSchema, DeleteVendorCredentialFileRequest$outboundSchema, DeleteVendorCredentialFileRequest$;
|
|
40510
40693
|
var init_deletevendorcredentialfile = __esm(() => {
|
|
@@ -40780,6 +40963,57 @@ var init_getvendorinvoicedetails = __esm(() => {
|
|
|
40780
40963
|
})(GetVendorInvoiceDetailsRequest$ ||= {});
|
|
40781
40964
|
});
|
|
40782
40965
|
|
|
40966
|
+
// src/models/operations/getvendorlegalname.ts
|
|
40967
|
+
var GetVendorLegalNameRequest$inboundSchema, GetVendorLegalNameRequest$outboundSchema, GetVendorLegalNameRequest$, GetVendorLegalNameResponseBody$inboundSchema, GetVendorLegalNameResponseBody$outboundSchema, GetVendorLegalNameResponseBody$;
|
|
40968
|
+
var init_getvendorlegalname = __esm(() => {
|
|
40969
|
+
init_esm();
|
|
40970
|
+
init_primitives();
|
|
40971
|
+
GetVendorLegalNameRequest$inboundSchema = objectType({
|
|
40972
|
+
vendor_id_or_me: stringType()
|
|
40973
|
+
}).transform((v2) => {
|
|
40974
|
+
return remap(v2, {
|
|
40975
|
+
vendor_id_or_me: "vendorIdOrMe"
|
|
40976
|
+
});
|
|
40977
|
+
});
|
|
40978
|
+
GetVendorLegalNameRequest$outboundSchema = objectType({
|
|
40979
|
+
vendorIdOrMe: stringType()
|
|
40980
|
+
}).transform((v2) => {
|
|
40981
|
+
return remap(v2, {
|
|
40982
|
+
vendorIdOrMe: "vendor_id_or_me"
|
|
40983
|
+
});
|
|
40984
|
+
});
|
|
40985
|
+
((GetVendorLegalNameRequest$) => {
|
|
40986
|
+
GetVendorLegalNameRequest$.inboundSchema = GetVendorLegalNameRequest$inboundSchema;
|
|
40987
|
+
GetVendorLegalNameRequest$.outboundSchema = GetVendorLegalNameRequest$outboundSchema;
|
|
40988
|
+
})(GetVendorLegalNameRequest$ ||= {});
|
|
40989
|
+
GetVendorLegalNameResponseBody$inboundSchema = objectType({
|
|
40990
|
+
first_name: stringType().optional(),
|
|
40991
|
+
middle_name: nullableType(stringType()).optional(),
|
|
40992
|
+
last_name: stringType().optional()
|
|
40993
|
+
}).transform((v2) => {
|
|
40994
|
+
return remap(v2, {
|
|
40995
|
+
first_name: "firstName",
|
|
40996
|
+
middle_name: "middleName",
|
|
40997
|
+
last_name: "lastName"
|
|
40998
|
+
});
|
|
40999
|
+
});
|
|
41000
|
+
GetVendorLegalNameResponseBody$outboundSchema = objectType({
|
|
41001
|
+
firstName: stringType().optional(),
|
|
41002
|
+
middleName: nullableType(stringType()).optional(),
|
|
41003
|
+
lastName: stringType().optional()
|
|
41004
|
+
}).transform((v2) => {
|
|
41005
|
+
return remap(v2, {
|
|
41006
|
+
firstName: "first_name",
|
|
41007
|
+
middleName: "middle_name",
|
|
41008
|
+
lastName: "last_name"
|
|
41009
|
+
});
|
|
41010
|
+
});
|
|
41011
|
+
((GetVendorLegalNameResponseBody$) => {
|
|
41012
|
+
GetVendorLegalNameResponseBody$.inboundSchema = GetVendorLegalNameResponseBody$inboundSchema;
|
|
41013
|
+
GetVendorLegalNameResponseBody$.outboundSchema = GetVendorLegalNameResponseBody$outboundSchema;
|
|
41014
|
+
})(GetVendorLegalNameResponseBody$ ||= {});
|
|
41015
|
+
});
|
|
41016
|
+
|
|
40783
41017
|
// src/models/operations/getvendorsdetails.ts
|
|
40784
41018
|
var GetVendorsDetailsRequest$inboundSchema, GetVendorsDetailsRequest$outboundSchema, GetVendorsDetailsRequest$;
|
|
40785
41019
|
var init_getvendorsdetails = __esm(() => {
|
|
@@ -41232,6 +41466,44 @@ var init_listvendoradditionalfacilityfields = __esm(() => {
|
|
|
41232
41466
|
})(ListVendorAdditionalFacilityFieldsResponse$ ||= {});
|
|
41233
41467
|
});
|
|
41234
41468
|
|
|
41469
|
+
// src/models/operations/listvendorcredentialdatarequests.ts
|
|
41470
|
+
var ListVendorCredentialDataRequestsRequest$inboundSchema, ListVendorCredentialDataRequestsRequest$outboundSchema, ListVendorCredentialDataRequestsRequest$;
|
|
41471
|
+
var init_listvendorcredentialdatarequests = __esm(() => {
|
|
41472
|
+
init_esm();
|
|
41473
|
+
init_primitives();
|
|
41474
|
+
init_components();
|
|
41475
|
+
ListVendorCredentialDataRequestsRequest$inboundSchema = objectType({
|
|
41476
|
+
sort: nullableType(stringType()).optional(),
|
|
41477
|
+
desc: Desc$inboundSchema.optional(),
|
|
41478
|
+
page: numberType().int().optional(),
|
|
41479
|
+
items_per_page: numberType().int().optional(),
|
|
41480
|
+
vendor_credential_id: numberType().int(),
|
|
41481
|
+
expand: arrayType(Expand$inboundSchema).optional()
|
|
41482
|
+
}).transform((v2) => {
|
|
41483
|
+
return remap(v2, {
|
|
41484
|
+
items_per_page: "itemsPerPage",
|
|
41485
|
+
vendor_credential_id: "vendorCredentialId"
|
|
41486
|
+
});
|
|
41487
|
+
});
|
|
41488
|
+
ListVendorCredentialDataRequestsRequest$outboundSchema = objectType({
|
|
41489
|
+
sort: nullableType(stringType()).optional(),
|
|
41490
|
+
desc: Desc$outboundSchema.optional(),
|
|
41491
|
+
page: numberType().int().optional(),
|
|
41492
|
+
itemsPerPage: numberType().int().optional(),
|
|
41493
|
+
vendorCredentialId: numberType().int(),
|
|
41494
|
+
expand: arrayType(Expand$outboundSchema).optional()
|
|
41495
|
+
}).transform((v2) => {
|
|
41496
|
+
return remap(v2, {
|
|
41497
|
+
itemsPerPage: "items_per_page",
|
|
41498
|
+
vendorCredentialId: "vendor_credential_id"
|
|
41499
|
+
});
|
|
41500
|
+
});
|
|
41501
|
+
((ListVendorCredentialDataRequestsRequest$) => {
|
|
41502
|
+
ListVendorCredentialDataRequestsRequest$.inboundSchema = ListVendorCredentialDataRequestsRequest$inboundSchema;
|
|
41503
|
+
ListVendorCredentialDataRequestsRequest$.outboundSchema = ListVendorCredentialDataRequestsRequest$outboundSchema;
|
|
41504
|
+
})(ListVendorCredentialDataRequestsRequest$ ||= {});
|
|
41505
|
+
});
|
|
41506
|
+
|
|
41235
41507
|
// src/models/operations/listvendorcredentialfiles.ts
|
|
41236
41508
|
var ListVendorCredentialFilesRequest$inboundSchema, ListVendorCredentialFilesRequest$outboundSchema, ListVendorCredentialFilesRequest$;
|
|
41237
41509
|
var init_listvendorcredentialfiles = __esm(() => {
|
|
@@ -42517,6 +42789,43 @@ var init_submitvendorcredential = __esm(() => {
|
|
|
42517
42789
|
})(SubmitVendorCredentialRequest$ ||= {});
|
|
42518
42790
|
});
|
|
42519
42791
|
|
|
42792
|
+
// src/models/operations/updatedatarequest.ts
|
|
42793
|
+
var UpdateDataRequestRequestBody$inboundSchema, UpdateDataRequestRequestBody$outboundSchema, UpdateDataRequestRequestBody$, UpdateDataRequestRequest$inboundSchema, UpdateDataRequestRequest$outboundSchema, UpdateDataRequestRequest$;
|
|
42794
|
+
var init_updatedatarequest = __esm(() => {
|
|
42795
|
+
init_esm();
|
|
42796
|
+
init_primitives();
|
|
42797
|
+
UpdateDataRequestRequestBody$inboundSchema = objectType({
|
|
42798
|
+
value: stringType().optional()
|
|
42799
|
+
});
|
|
42800
|
+
UpdateDataRequestRequestBody$outboundSchema = objectType({
|
|
42801
|
+
value: stringType().optional()
|
|
42802
|
+
});
|
|
42803
|
+
((UpdateDataRequestRequestBody$) => {
|
|
42804
|
+
UpdateDataRequestRequestBody$.inboundSchema = UpdateDataRequestRequestBody$inboundSchema;
|
|
42805
|
+
UpdateDataRequestRequestBody$.outboundSchema = UpdateDataRequestRequestBody$outboundSchema;
|
|
42806
|
+
})(UpdateDataRequestRequestBody$ ||= {});
|
|
42807
|
+
UpdateDataRequestRequest$inboundSchema = objectType({
|
|
42808
|
+
id: numberType().int(),
|
|
42809
|
+
RequestBody: lazyType(() => UpdateDataRequestRequestBody$inboundSchema)
|
|
42810
|
+
}).transform((v2) => {
|
|
42811
|
+
return remap(v2, {
|
|
42812
|
+
RequestBody: "requestBody"
|
|
42813
|
+
});
|
|
42814
|
+
});
|
|
42815
|
+
UpdateDataRequestRequest$outboundSchema = objectType({
|
|
42816
|
+
id: numberType().int(),
|
|
42817
|
+
requestBody: lazyType(() => UpdateDataRequestRequestBody$outboundSchema)
|
|
42818
|
+
}).transform((v2) => {
|
|
42819
|
+
return remap(v2, {
|
|
42820
|
+
requestBody: "RequestBody"
|
|
42821
|
+
});
|
|
42822
|
+
});
|
|
42823
|
+
((UpdateDataRequestRequest$) => {
|
|
42824
|
+
UpdateDataRequestRequest$.inboundSchema = UpdateDataRequestRequest$inboundSchema;
|
|
42825
|
+
UpdateDataRequestRequest$.outboundSchema = UpdateDataRequestRequest$outboundSchema;
|
|
42826
|
+
})(UpdateDataRequestRequest$ ||= {});
|
|
42827
|
+
});
|
|
42828
|
+
|
|
42520
42829
|
// src/models/operations/updatesthewebhookendpointwiththegivenid.ts
|
|
42521
42830
|
var UpdatesTheWebhookEndpointWithTheGivenIdRequest$inboundSchema, UpdatesTheWebhookEndpointWithTheGivenIdRequest$outboundSchema, UpdatesTheWebhookEndpointWithTheGivenIdRequest$;
|
|
42522
42831
|
var init_updatesthewebhookendpointwiththegivenid = __esm(() => {
|
|
@@ -42877,12 +43186,16 @@ var init_vendorscanout = __esm(() => {
|
|
|
42877
43186
|
|
|
42878
43187
|
// src/models/operations/index.ts
|
|
42879
43188
|
var init_operations = __esm(() => {
|
|
43189
|
+
init_adddatarequestfile();
|
|
42880
43190
|
init_addvendorcredentialfile();
|
|
42881
43191
|
init_addvendormanagedbycompany();
|
|
42882
43192
|
init_changepassword();
|
|
43193
|
+
init_createnewvendorcredentialversion();
|
|
43194
|
+
init_createorupdatebcr();
|
|
42883
43195
|
init_createvendorcompany();
|
|
42884
43196
|
init_createvendorregistration();
|
|
42885
43197
|
init_declinevendorcredential();
|
|
43198
|
+
init_deletedatarequestfile();
|
|
42886
43199
|
init_deletevendorcredentialfile();
|
|
42887
43200
|
init_deletevendormanagedbycompany();
|
|
42888
43201
|
init_expeditetimeremaining();
|
|
@@ -42892,6 +43205,7 @@ var init_operations = __esm(() => {
|
|
|
42892
43205
|
init_getvendorcredentialdetails();
|
|
42893
43206
|
init_getvendorcredentialfile();
|
|
42894
43207
|
init_getvendorinvoicedetails();
|
|
43208
|
+
init_getvendorlegalname();
|
|
42895
43209
|
init_getvendorsdetails();
|
|
42896
43210
|
init_getwebhookendpoint();
|
|
42897
43211
|
init_listallwebhookendpoints();
|
|
@@ -42900,6 +43214,7 @@ var init_operations = __esm(() => {
|
|
|
42900
43214
|
init_listorsearchsecurityzones();
|
|
42901
43215
|
init_listorsearchsupportarticles();
|
|
42902
43216
|
init_listvendoradditionalfacilityfields();
|
|
43217
|
+
init_listvendorcredentialdatarequests();
|
|
42903
43218
|
init_listvendorcredentialfiles();
|
|
42904
43219
|
init_listvendorcredentialhistory();
|
|
42905
43220
|
init_listvendorcredentials();
|
|
@@ -42918,6 +43233,7 @@ var init_operations = __esm(() => {
|
|
|
42918
43233
|
init_purchasescrubcredits();
|
|
42919
43234
|
init_securityzonecheckin();
|
|
42920
43235
|
init_submitvendorcredential();
|
|
43236
|
+
init_updatedatarequest();
|
|
42921
43237
|
init_updatesthewebhookendpointwiththegivenid();
|
|
42922
43238
|
init_updatevendorcredentialfile();
|
|
42923
43239
|
init_updatevendordetails();
|
|
@@ -43009,6 +43325,7 @@ async function $do(client, request, options) {
|
|
|
43009
43325
|
const securityInput = await extractSecurity(client._options.security);
|
|
43010
43326
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43011
43327
|
const context = {
|
|
43328
|
+
options: client._options,
|
|
43012
43329
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43013
43330
|
operationID: "listOrSearchCompanies",
|
|
43014
43331
|
oAuth2Scopes: [],
|
|
@@ -43025,6 +43342,7 @@ async function $do(client, request, options) {
|
|
|
43025
43342
|
headers,
|
|
43026
43343
|
query,
|
|
43027
43344
|
body,
|
|
43345
|
+
userAgent: client._options.userAgent,
|
|
43028
43346
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43029
43347
|
}, options);
|
|
43030
43348
|
if (!requestRes.ok) {
|
|
@@ -43123,32 +43441,34 @@ List or search companies.`,
|
|
|
43123
43441
|
};
|
|
43124
43442
|
});
|
|
43125
43443
|
|
|
43126
|
-
// src/funcs/
|
|
43127
|
-
function
|
|
43444
|
+
// src/funcs/dataRequestsAddDataRequestFile.ts
|
|
43445
|
+
function dataRequestsAddDataRequestFile(client, request, options) {
|
|
43128
43446
|
return new APIPromise($do2(client, request, options));
|
|
43129
43447
|
}
|
|
43130
43448
|
async function $do2(client, request, options) {
|
|
43131
|
-
const parsed = safeParse(request, (value) =>
|
|
43449
|
+
const parsed = safeParse(request, (value) => AddDataRequestFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43132
43450
|
if (!parsed.ok) {
|
|
43133
43451
|
return [parsed, { status: "invalid" }];
|
|
43134
43452
|
}
|
|
43135
43453
|
const payload = parsed.value;
|
|
43136
|
-
const body =
|
|
43454
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
43137
43455
|
const pathParams = {
|
|
43138
43456
|
id: encodeSimple("id", payload.id, {
|
|
43139
43457
|
explode: false,
|
|
43140
43458
|
charEncoding: "percent"
|
|
43141
43459
|
})
|
|
43142
43460
|
};
|
|
43143
|
-
const path = pathToFunc("/
|
|
43461
|
+
const path = pathToFunc("/data_requests/{id}/file")(pathParams);
|
|
43144
43462
|
const headers = new Headers(compactMap({
|
|
43463
|
+
"Content-Type": "application/json",
|
|
43145
43464
|
Accept: "application/json"
|
|
43146
43465
|
}));
|
|
43147
43466
|
const securityInput = await extractSecurity(client._options.security);
|
|
43148
43467
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43149
43468
|
const context = {
|
|
43469
|
+
options: client._options,
|
|
43150
43470
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43151
|
-
operationID: "
|
|
43471
|
+
operationID: "addDataRequestFile",
|
|
43152
43472
|
oAuth2Scopes: [],
|
|
43153
43473
|
resolvedSecurity: requestSecurity,
|
|
43154
43474
|
securitySource: client._options.security,
|
|
@@ -43157,11 +43477,12 @@ async function $do2(client, request, options) {
|
|
|
43157
43477
|
};
|
|
43158
43478
|
const requestRes = client._createRequest(context, {
|
|
43159
43479
|
security: requestSecurity,
|
|
43160
|
-
method: "
|
|
43480
|
+
method: "POST",
|
|
43161
43481
|
baseURL: options?.serverURL,
|
|
43162
43482
|
path,
|
|
43163
43483
|
headers,
|
|
43164
43484
|
body,
|
|
43485
|
+
userAgent: client._options.userAgent,
|
|
43165
43486
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43166
43487
|
}, options);
|
|
43167
43488
|
if (!requestRes.ok) {
|
|
@@ -43170,7 +43491,7 @@ async function $do2(client, request, options) {
|
|
|
43170
43491
|
const req = requestRes.value;
|
|
43171
43492
|
const doResult = await client._do(req, {
|
|
43172
43493
|
context,
|
|
43173
|
-
errorCodes: ["400", "401", "403", "
|
|
43494
|
+
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
43174
43495
|
retryConfig: context.retryConfig,
|
|
43175
43496
|
retryCodes: context.retryCodes
|
|
43176
43497
|
});
|
|
@@ -43181,42 +43502,42 @@ async function $do2(client, request, options) {
|
|
|
43181
43502
|
const responseFields = {
|
|
43182
43503
|
HttpMeta: { Response: response, Request: req }
|
|
43183
43504
|
};
|
|
43184
|
-
const [result] = await match(json(200,
|
|
43505
|
+
const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43185
43506
|
if (!result.ok) {
|
|
43186
43507
|
return [result, { status: "complete", request: req, response }];
|
|
43187
43508
|
}
|
|
43188
43509
|
return [result, { status: "complete", request: req, response }];
|
|
43189
43510
|
}
|
|
43190
|
-
var
|
|
43511
|
+
var init_dataRequestsAddDataRequestFile = __esm(() => {
|
|
43512
|
+
init_esm();
|
|
43191
43513
|
init_encodings();
|
|
43192
43514
|
init_matchers();
|
|
43193
43515
|
init_primitives();
|
|
43194
43516
|
init_schemas();
|
|
43195
43517
|
init_security();
|
|
43196
43518
|
init_url();
|
|
43197
|
-
init_components();
|
|
43198
43519
|
init_errors2();
|
|
43199
43520
|
init_operations();
|
|
43200
43521
|
init_async();
|
|
43201
43522
|
});
|
|
43202
43523
|
|
|
43203
|
-
// src/mcp-server/tools/
|
|
43204
|
-
var args2, tool$
|
|
43205
|
-
var
|
|
43206
|
-
|
|
43524
|
+
// src/mcp-server/tools/dataRequestsAddDataRequestFile.ts
|
|
43525
|
+
var args2, tool$dataRequestsAddDataRequestFile;
|
|
43526
|
+
var init_dataRequestsAddDataRequestFile2 = __esm(() => {
|
|
43527
|
+
init_dataRequestsAddDataRequestFile();
|
|
43207
43528
|
init_operations();
|
|
43208
43529
|
init_tools();
|
|
43209
43530
|
args2 = {
|
|
43210
|
-
request:
|
|
43531
|
+
request: AddDataRequestFileRequest$inboundSchema
|
|
43211
43532
|
};
|
|
43212
|
-
tool$
|
|
43213
|
-
name: "
|
|
43214
|
-
description: `
|
|
43533
|
+
tool$dataRequestsAddDataRequestFile = {
|
|
43534
|
+
name: "data-requests-add-data-request-file",
|
|
43535
|
+
description: `Add vendor credential data request
|
|
43215
43536
|
|
|
43216
|
-
|
|
43537
|
+
It will set the vendor credential data request file attributes`,
|
|
43217
43538
|
args: args2,
|
|
43218
43539
|
tool: async (client, args3, ctx) => {
|
|
43219
|
-
const [result, apiCall] = await
|
|
43540
|
+
const [result, apiCall] = await dataRequestsAddDataRequestFile(client, args3.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43220
43541
|
if (!result.ok) {
|
|
43221
43542
|
return {
|
|
43222
43543
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43229,40 +43550,33 @@ Retrieve an individual facility.`,
|
|
|
43229
43550
|
};
|
|
43230
43551
|
});
|
|
43231
43552
|
|
|
43232
|
-
// src/funcs/
|
|
43233
|
-
function
|
|
43553
|
+
// src/funcs/dataRequestsDeleteDataRequestFile.ts
|
|
43554
|
+
function dataRequestsDeleteDataRequestFile(client, request, options) {
|
|
43234
43555
|
return new APIPromise($do3(client, request, options));
|
|
43235
43556
|
}
|
|
43236
43557
|
async function $do3(client, request, options) {
|
|
43237
|
-
const parsed = safeParse(request, (value) =>
|
|
43558
|
+
const parsed = safeParse(request, (value) => DeleteDataRequestFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43238
43559
|
if (!parsed.ok) {
|
|
43239
|
-
return [
|
|
43560
|
+
return [parsed, { status: "invalid" }];
|
|
43240
43561
|
}
|
|
43241
43562
|
const payload = parsed.value;
|
|
43242
43563
|
const body = null;
|
|
43243
|
-
const
|
|
43244
|
-
|
|
43245
|
-
|
|
43246
|
-
|
|
43247
|
-
|
|
43248
|
-
|
|
43249
|
-
|
|
43250
|
-
latitude: payload.latitude,
|
|
43251
|
-
longitude: payload.longitude,
|
|
43252
|
-
name_like: payload.name_like,
|
|
43253
|
-
page: payload.page,
|
|
43254
|
-
sort: payload.sort,
|
|
43255
|
-
state_like: payload.state_like,
|
|
43256
|
-
system_id: payload.system_id
|
|
43257
|
-
}));
|
|
43564
|
+
const pathParams = {
|
|
43565
|
+
id: encodeSimple("id", payload.id, {
|
|
43566
|
+
explode: false,
|
|
43567
|
+
charEncoding: "percent"
|
|
43568
|
+
})
|
|
43569
|
+
};
|
|
43570
|
+
const path = pathToFunc("/data_requests/{id}/file")(pathParams);
|
|
43258
43571
|
const headers = new Headers(compactMap({
|
|
43259
43572
|
Accept: "application/json"
|
|
43260
43573
|
}));
|
|
43261
43574
|
const securityInput = await extractSecurity(client._options.security);
|
|
43262
43575
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43263
43576
|
const context = {
|
|
43577
|
+
options: client._options,
|
|
43264
43578
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43265
|
-
operationID: "
|
|
43579
|
+
operationID: "deleteDataRequestFile",
|
|
43266
43580
|
oAuth2Scopes: [],
|
|
43267
43581
|
resolvedSecurity: requestSecurity,
|
|
43268
43582
|
securitySource: client._options.security,
|
|
@@ -43271,16 +43585,16 @@ async function $do3(client, request, options) {
|
|
|
43271
43585
|
};
|
|
43272
43586
|
const requestRes = client._createRequest(context, {
|
|
43273
43587
|
security: requestSecurity,
|
|
43274
|
-
method: "
|
|
43588
|
+
method: "DELETE",
|
|
43275
43589
|
baseURL: options?.serverURL,
|
|
43276
43590
|
path,
|
|
43277
43591
|
headers,
|
|
43278
|
-
query,
|
|
43279
43592
|
body,
|
|
43593
|
+
userAgent: client._options.userAgent,
|
|
43280
43594
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43281
43595
|
}, options);
|
|
43282
43596
|
if (!requestRes.ok) {
|
|
43283
|
-
return [
|
|
43597
|
+
return [requestRes, { status: "invalid" }];
|
|
43284
43598
|
}
|
|
43285
43599
|
const req = requestRes.value;
|
|
43286
43600
|
const doResult = await client._do(req, {
|
|
@@ -43290,41 +43604,375 @@ async function $do3(client, request, options) {
|
|
|
43290
43604
|
retryCodes: context.retryCodes
|
|
43291
43605
|
});
|
|
43292
43606
|
if (!doResult.ok) {
|
|
43293
|
-
return [
|
|
43607
|
+
return [doResult, { status: "request-error", request: req }];
|
|
43294
43608
|
}
|
|
43295
43609
|
const response = doResult.value;
|
|
43296
43610
|
const responseFields = {
|
|
43297
43611
|
HttpMeta: { Response: response, Request: req }
|
|
43298
43612
|
};
|
|
43299
|
-
const [result
|
|
43300
|
-
key: "Result"
|
|
43301
|
-
}), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43613
|
+
const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43302
43614
|
if (!result.ok) {
|
|
43303
|
-
return [
|
|
43304
|
-
status: "complete",
|
|
43305
|
-
request: req,
|
|
43306
|
-
response
|
|
43307
|
-
}];
|
|
43615
|
+
return [result, { status: "complete", request: req, response }];
|
|
43308
43616
|
}
|
|
43309
|
-
|
|
43310
|
-
|
|
43311
|
-
|
|
43312
|
-
|
|
43313
|
-
|
|
43314
|
-
|
|
43315
|
-
|
|
43316
|
-
|
|
43317
|
-
|
|
43318
|
-
|
|
43319
|
-
|
|
43320
|
-
|
|
43321
|
-
|
|
43322
|
-
|
|
43323
|
-
|
|
43324
|
-
|
|
43325
|
-
|
|
43326
|
-
|
|
43327
|
-
|
|
43617
|
+
return [result, { status: "complete", request: req, response }];
|
|
43618
|
+
}
|
|
43619
|
+
var init_dataRequestsDeleteDataRequestFile = __esm(() => {
|
|
43620
|
+
init_esm();
|
|
43621
|
+
init_encodings();
|
|
43622
|
+
init_matchers();
|
|
43623
|
+
init_primitives();
|
|
43624
|
+
init_schemas();
|
|
43625
|
+
init_security();
|
|
43626
|
+
init_url();
|
|
43627
|
+
init_errors2();
|
|
43628
|
+
init_operations();
|
|
43629
|
+
init_async();
|
|
43630
|
+
});
|
|
43631
|
+
|
|
43632
|
+
// src/mcp-server/tools/dataRequestsDeleteDataRequestFile.ts
|
|
43633
|
+
var args3, tool$dataRequestsDeleteDataRequestFile;
|
|
43634
|
+
var init_dataRequestsDeleteDataRequestFile2 = __esm(() => {
|
|
43635
|
+
init_dataRequestsDeleteDataRequestFile();
|
|
43636
|
+
init_operations();
|
|
43637
|
+
init_tools();
|
|
43638
|
+
args3 = {
|
|
43639
|
+
request: DeleteDataRequestFileRequest$inboundSchema
|
|
43640
|
+
};
|
|
43641
|
+
tool$dataRequestsDeleteDataRequestFile = {
|
|
43642
|
+
name: "data-requests-delete-data-request-file",
|
|
43643
|
+
description: `Delete vendor credential data request file
|
|
43644
|
+
|
|
43645
|
+
It will delete the vendor credential data request file`,
|
|
43646
|
+
args: args3,
|
|
43647
|
+
tool: async (client, args4, ctx) => {
|
|
43648
|
+
const [result, apiCall] = await dataRequestsDeleteDataRequestFile(client, args4.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43649
|
+
if (!result.ok) {
|
|
43650
|
+
return {
|
|
43651
|
+
content: [{ type: "text", text: result.error.message }],
|
|
43652
|
+
isError: true
|
|
43653
|
+
};
|
|
43654
|
+
}
|
|
43655
|
+
const value = result.value;
|
|
43656
|
+
return formatResult(value, apiCall);
|
|
43657
|
+
}
|
|
43658
|
+
};
|
|
43659
|
+
});
|
|
43660
|
+
|
|
43661
|
+
// src/funcs/dataRequestsUpdateDataRequest.ts
|
|
43662
|
+
function dataRequestsUpdateDataRequest(client, request, options) {
|
|
43663
|
+
return new APIPromise($do4(client, request, options));
|
|
43664
|
+
}
|
|
43665
|
+
async function $do4(client, request, options) {
|
|
43666
|
+
const parsed = safeParse(request, (value) => UpdateDataRequestRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43667
|
+
if (!parsed.ok) {
|
|
43668
|
+
return [parsed, { status: "invalid" }];
|
|
43669
|
+
}
|
|
43670
|
+
const payload = parsed.value;
|
|
43671
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
43672
|
+
const pathParams = {
|
|
43673
|
+
id: encodeSimple("id", payload.id, {
|
|
43674
|
+
explode: false,
|
|
43675
|
+
charEncoding: "percent"
|
|
43676
|
+
})
|
|
43677
|
+
};
|
|
43678
|
+
const path = pathToFunc("/data_requests/{id}")(pathParams);
|
|
43679
|
+
const headers = new Headers(compactMap({
|
|
43680
|
+
"Content-Type": "application/json",
|
|
43681
|
+
Accept: "application/json"
|
|
43682
|
+
}));
|
|
43683
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
43684
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43685
|
+
const context = {
|
|
43686
|
+
options: client._options,
|
|
43687
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43688
|
+
operationID: "updateDataRequest",
|
|
43689
|
+
oAuth2Scopes: [],
|
|
43690
|
+
resolvedSecurity: requestSecurity,
|
|
43691
|
+
securitySource: client._options.security,
|
|
43692
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
43693
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
43694
|
+
};
|
|
43695
|
+
const requestRes = client._createRequest(context, {
|
|
43696
|
+
security: requestSecurity,
|
|
43697
|
+
method: "PUT",
|
|
43698
|
+
baseURL: options?.serverURL,
|
|
43699
|
+
path,
|
|
43700
|
+
headers,
|
|
43701
|
+
body,
|
|
43702
|
+
userAgent: client._options.userAgent,
|
|
43703
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43704
|
+
}, options);
|
|
43705
|
+
if (!requestRes.ok) {
|
|
43706
|
+
return [requestRes, { status: "invalid" }];
|
|
43707
|
+
}
|
|
43708
|
+
const req = requestRes.value;
|
|
43709
|
+
const doResult = await client._do(req, {
|
|
43710
|
+
context,
|
|
43711
|
+
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
43712
|
+
retryConfig: context.retryConfig,
|
|
43713
|
+
retryCodes: context.retryCodes
|
|
43714
|
+
});
|
|
43715
|
+
if (!doResult.ok) {
|
|
43716
|
+
return [doResult, { status: "request-error", request: req }];
|
|
43717
|
+
}
|
|
43718
|
+
const response = doResult.value;
|
|
43719
|
+
const responseFields = {
|
|
43720
|
+
HttpMeta: { Response: response, Request: req }
|
|
43721
|
+
};
|
|
43722
|
+
const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43723
|
+
if (!result.ok) {
|
|
43724
|
+
return [result, { status: "complete", request: req, response }];
|
|
43725
|
+
}
|
|
43726
|
+
return [result, { status: "complete", request: req, response }];
|
|
43727
|
+
}
|
|
43728
|
+
var init_dataRequestsUpdateDataRequest = __esm(() => {
|
|
43729
|
+
init_esm();
|
|
43730
|
+
init_encodings();
|
|
43731
|
+
init_matchers();
|
|
43732
|
+
init_primitives();
|
|
43733
|
+
init_schemas();
|
|
43734
|
+
init_security();
|
|
43735
|
+
init_url();
|
|
43736
|
+
init_errors2();
|
|
43737
|
+
init_operations();
|
|
43738
|
+
init_async();
|
|
43739
|
+
});
|
|
43740
|
+
|
|
43741
|
+
// src/mcp-server/tools/dataRequestsUpdateDataRequest.ts
|
|
43742
|
+
var args4, tool$dataRequestsUpdateDataRequest;
|
|
43743
|
+
var init_dataRequestsUpdateDataRequest2 = __esm(() => {
|
|
43744
|
+
init_dataRequestsUpdateDataRequest();
|
|
43745
|
+
init_operations();
|
|
43746
|
+
init_tools();
|
|
43747
|
+
args4 = {
|
|
43748
|
+
request: UpdateDataRequestRequest$inboundSchema
|
|
43749
|
+
};
|
|
43750
|
+
tool$dataRequestsUpdateDataRequest = {
|
|
43751
|
+
name: "data-requests-update-data-request",
|
|
43752
|
+
description: `Update vendor credential data request
|
|
43753
|
+
|
|
43754
|
+
It will update the vendor credential data request attributes`,
|
|
43755
|
+
args: args4,
|
|
43756
|
+
tool: async (client, args5, ctx) => {
|
|
43757
|
+
const [result, apiCall] = await dataRequestsUpdateDataRequest(client, args5.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43758
|
+
if (!result.ok) {
|
|
43759
|
+
return {
|
|
43760
|
+
content: [{ type: "text", text: result.error.message }],
|
|
43761
|
+
isError: true
|
|
43762
|
+
};
|
|
43763
|
+
}
|
|
43764
|
+
const value = result.value;
|
|
43765
|
+
return formatResult(value, apiCall);
|
|
43766
|
+
}
|
|
43767
|
+
};
|
|
43768
|
+
});
|
|
43769
|
+
|
|
43770
|
+
// src/funcs/organizationsGetFacility.ts
|
|
43771
|
+
function organizationsGetFacility(client, request, options) {
|
|
43772
|
+
return new APIPromise($do5(client, request, options));
|
|
43773
|
+
}
|
|
43774
|
+
async function $do5(client, request, options) {
|
|
43775
|
+
const parsed = safeParse(request, (value) => GetFacilityRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43776
|
+
if (!parsed.ok) {
|
|
43777
|
+
return [parsed, { status: "invalid" }];
|
|
43778
|
+
}
|
|
43779
|
+
const payload = parsed.value;
|
|
43780
|
+
const body = null;
|
|
43781
|
+
const pathParams = {
|
|
43782
|
+
id: encodeSimple("id", payload.id, {
|
|
43783
|
+
explode: false,
|
|
43784
|
+
charEncoding: "percent"
|
|
43785
|
+
})
|
|
43786
|
+
};
|
|
43787
|
+
const path = pathToFunc("/facilities/{id}")(pathParams);
|
|
43788
|
+
const headers = new Headers(compactMap({
|
|
43789
|
+
Accept: "application/json"
|
|
43790
|
+
}));
|
|
43791
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
43792
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43793
|
+
const context = {
|
|
43794
|
+
options: client._options,
|
|
43795
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43796
|
+
operationID: "getFacility",
|
|
43797
|
+
oAuth2Scopes: [],
|
|
43798
|
+
resolvedSecurity: requestSecurity,
|
|
43799
|
+
securitySource: client._options.security,
|
|
43800
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
43801
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
43802
|
+
};
|
|
43803
|
+
const requestRes = client._createRequest(context, {
|
|
43804
|
+
security: requestSecurity,
|
|
43805
|
+
method: "GET",
|
|
43806
|
+
baseURL: options?.serverURL,
|
|
43807
|
+
path,
|
|
43808
|
+
headers,
|
|
43809
|
+
body,
|
|
43810
|
+
userAgent: client._options.userAgent,
|
|
43811
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43812
|
+
}, options);
|
|
43813
|
+
if (!requestRes.ok) {
|
|
43814
|
+
return [requestRes, { status: "invalid" }];
|
|
43815
|
+
}
|
|
43816
|
+
const req = requestRes.value;
|
|
43817
|
+
const doResult = await client._do(req, {
|
|
43818
|
+
context,
|
|
43819
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
43820
|
+
retryConfig: context.retryConfig,
|
|
43821
|
+
retryCodes: context.retryCodes
|
|
43822
|
+
});
|
|
43823
|
+
if (!doResult.ok) {
|
|
43824
|
+
return [doResult, { status: "request-error", request: req }];
|
|
43825
|
+
}
|
|
43826
|
+
const response = doResult.value;
|
|
43827
|
+
const responseFields = {
|
|
43828
|
+
HttpMeta: { Response: response, Request: req }
|
|
43829
|
+
};
|
|
43830
|
+
const [result] = await match(json(200, Facility$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43831
|
+
if (!result.ok) {
|
|
43832
|
+
return [result, { status: "complete", request: req, response }];
|
|
43833
|
+
}
|
|
43834
|
+
return [result, { status: "complete", request: req, response }];
|
|
43835
|
+
}
|
|
43836
|
+
var init_organizationsGetFacility = __esm(() => {
|
|
43837
|
+
init_encodings();
|
|
43838
|
+
init_matchers();
|
|
43839
|
+
init_primitives();
|
|
43840
|
+
init_schemas();
|
|
43841
|
+
init_security();
|
|
43842
|
+
init_url();
|
|
43843
|
+
init_components();
|
|
43844
|
+
init_errors2();
|
|
43845
|
+
init_operations();
|
|
43846
|
+
init_async();
|
|
43847
|
+
});
|
|
43848
|
+
|
|
43849
|
+
// src/mcp-server/tools/organizationsGetFacility.ts
|
|
43850
|
+
var args5, tool$organizationsGetFacility;
|
|
43851
|
+
var init_organizationsGetFacility2 = __esm(() => {
|
|
43852
|
+
init_organizationsGetFacility();
|
|
43853
|
+
init_operations();
|
|
43854
|
+
init_tools();
|
|
43855
|
+
args5 = {
|
|
43856
|
+
request: GetFacilityRequest$inboundSchema
|
|
43857
|
+
};
|
|
43858
|
+
tool$organizationsGetFacility = {
|
|
43859
|
+
name: "organizations-get-facility",
|
|
43860
|
+
description: `Get facility
|
|
43861
|
+
|
|
43862
|
+
Retrieve an individual facility.`,
|
|
43863
|
+
args: args5,
|
|
43864
|
+
tool: async (client, args6, ctx) => {
|
|
43865
|
+
const [result, apiCall] = await organizationsGetFacility(client, args6.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43866
|
+
if (!result.ok) {
|
|
43867
|
+
return {
|
|
43868
|
+
content: [{ type: "text", text: result.error.message }],
|
|
43869
|
+
isError: true
|
|
43870
|
+
};
|
|
43871
|
+
}
|
|
43872
|
+
const value = result.value;
|
|
43873
|
+
return formatResult(value, apiCall);
|
|
43874
|
+
}
|
|
43875
|
+
};
|
|
43876
|
+
});
|
|
43877
|
+
|
|
43878
|
+
// src/funcs/organizationsListOrSearchFacilities.ts
|
|
43879
|
+
function organizationsListOrSearchFacilities(client, request, options) {
|
|
43880
|
+
return new APIPromise($do6(client, request, options));
|
|
43881
|
+
}
|
|
43882
|
+
async function $do6(client, request, options) {
|
|
43883
|
+
const parsed = safeParse(request, (value) => ListOrSearchFacilitiesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43884
|
+
if (!parsed.ok) {
|
|
43885
|
+
return [haltIterator(parsed), { status: "invalid" }];
|
|
43886
|
+
}
|
|
43887
|
+
const payload = parsed.value;
|
|
43888
|
+
const body = null;
|
|
43889
|
+
const path = pathToFunc("/facilities")();
|
|
43890
|
+
const query = queryJoin(encodeFormQuery({
|
|
43891
|
+
expand: payload.expand
|
|
43892
|
+
}, { explode: false }), encodeFormQuery({
|
|
43893
|
+
active_status: payload.active_status,
|
|
43894
|
+
desc: payload.desc,
|
|
43895
|
+
items_per_page: payload.items_per_page,
|
|
43896
|
+
latitude: payload.latitude,
|
|
43897
|
+
longitude: payload.longitude,
|
|
43898
|
+
name_like: payload.name_like,
|
|
43899
|
+
page: payload.page,
|
|
43900
|
+
sort: payload.sort,
|
|
43901
|
+
state_like: payload.state_like,
|
|
43902
|
+
system_id: payload.system_id
|
|
43903
|
+
}));
|
|
43904
|
+
const headers = new Headers(compactMap({
|
|
43905
|
+
Accept: "application/json"
|
|
43906
|
+
}));
|
|
43907
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
43908
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43909
|
+
const context = {
|
|
43910
|
+
options: client._options,
|
|
43911
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43912
|
+
operationID: "listOrSearchFacilities",
|
|
43913
|
+
oAuth2Scopes: [],
|
|
43914
|
+
resolvedSecurity: requestSecurity,
|
|
43915
|
+
securitySource: client._options.security,
|
|
43916
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
43917
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
43918
|
+
};
|
|
43919
|
+
const requestRes = client._createRequest(context, {
|
|
43920
|
+
security: requestSecurity,
|
|
43921
|
+
method: "GET",
|
|
43922
|
+
baseURL: options?.serverURL,
|
|
43923
|
+
path,
|
|
43924
|
+
headers,
|
|
43925
|
+
query,
|
|
43926
|
+
body,
|
|
43927
|
+
userAgent: client._options.userAgent,
|
|
43928
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43929
|
+
}, options);
|
|
43930
|
+
if (!requestRes.ok) {
|
|
43931
|
+
return [haltIterator(requestRes), { status: "invalid" }];
|
|
43932
|
+
}
|
|
43933
|
+
const req = requestRes.value;
|
|
43934
|
+
const doResult = await client._do(req, {
|
|
43935
|
+
context,
|
|
43936
|
+
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
43937
|
+
retryConfig: context.retryConfig,
|
|
43938
|
+
retryCodes: context.retryCodes
|
|
43939
|
+
});
|
|
43940
|
+
if (!doResult.ok) {
|
|
43941
|
+
return [haltIterator(doResult), { status: "request-error", request: req }];
|
|
43942
|
+
}
|
|
43943
|
+
const response = doResult.value;
|
|
43944
|
+
const responseFields = {
|
|
43945
|
+
HttpMeta: { Response: response, Request: req }
|
|
43946
|
+
};
|
|
43947
|
+
const [result, raw] = await match(json(200, ListOrSearchFacilitiesResponse$inboundSchema, {
|
|
43948
|
+
key: "Result"
|
|
43949
|
+
}), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43950
|
+
if (!result.ok) {
|
|
43951
|
+
return [haltIterator(result), {
|
|
43952
|
+
status: "complete",
|
|
43953
|
+
request: req,
|
|
43954
|
+
response
|
|
43955
|
+
}];
|
|
43956
|
+
}
|
|
43957
|
+
const nextFunc = (responseData) => {
|
|
43958
|
+
const page2 = request?.page ?? 1;
|
|
43959
|
+
const nextPage = page2 + 1;
|
|
43960
|
+
if (!responseData) {
|
|
43961
|
+
return { next: () => null };
|
|
43962
|
+
}
|
|
43963
|
+
const results = dlv(responseData, "items");
|
|
43964
|
+
if (!Array.isArray(results) || !results.length) {
|
|
43965
|
+
return { next: () => null };
|
|
43966
|
+
}
|
|
43967
|
+
const limit = request?.itemsPerPage ?? 0;
|
|
43968
|
+
if (results.length < limit) {
|
|
43969
|
+
return { next: () => null };
|
|
43970
|
+
}
|
|
43971
|
+
const nextVal = () => organizationsListOrSearchFacilities(client, {
|
|
43972
|
+
...request,
|
|
43973
|
+
page: nextPage
|
|
43974
|
+
}, options);
|
|
43975
|
+
return { next: nextVal, "~next": { page: nextPage } };
|
|
43328
43976
|
};
|
|
43329
43977
|
const page = { ...result, ...nextFunc(raw) };
|
|
43330
43978
|
return [{ ...page, ...createPageIterator(page, (v2) => !v2.ok) }, {
|
|
@@ -43347,12 +43995,12 @@ var init_organizationsListOrSearchFacilities = __esm(() => {
|
|
|
43347
43995
|
});
|
|
43348
43996
|
|
|
43349
43997
|
// src/mcp-server/tools/organizationsListOrSearchFacilities.ts
|
|
43350
|
-
var
|
|
43998
|
+
var args6, tool$organizationsListOrSearchFacilities;
|
|
43351
43999
|
var init_organizationsListOrSearchFacilities2 = __esm(() => {
|
|
43352
44000
|
init_organizationsListOrSearchFacilities();
|
|
43353
44001
|
init_operations();
|
|
43354
44002
|
init_tools();
|
|
43355
|
-
|
|
44003
|
+
args6 = {
|
|
43356
44004
|
request: ListOrSearchFacilitiesRequest$inboundSchema
|
|
43357
44005
|
};
|
|
43358
44006
|
tool$organizationsListOrSearchFacilities = {
|
|
@@ -43373,9 +44021,9 @@ Available \`expand\` scopes are:
|
|
|
43373
44021
|
- facility.vendor_policy
|
|
43374
44022
|
- facility.visitor_policy
|
|
43375
44023
|
- facility.workflow`,
|
|
43376
|
-
args:
|
|
43377
|
-
tool: async (client,
|
|
43378
|
-
const [result, apiCall] = await organizationsListOrSearchFacilities(client,
|
|
44024
|
+
args: args6,
|
|
44025
|
+
tool: async (client, args7, ctx) => {
|
|
44026
|
+
const [result, apiCall] = await organizationsListOrSearchFacilities(client, args7.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43379
44027
|
if (!result.ok) {
|
|
43380
44028
|
return {
|
|
43381
44029
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43390,9 +44038,9 @@ Available \`expand\` scopes are:
|
|
|
43390
44038
|
|
|
43391
44039
|
// src/funcs/supportArticlesGetSupportArticle.ts
|
|
43392
44040
|
function supportArticlesGetSupportArticle(client, request, options) {
|
|
43393
|
-
return new APIPromise($
|
|
44041
|
+
return new APIPromise($do7(client, request, options));
|
|
43394
44042
|
}
|
|
43395
|
-
async function $
|
|
44043
|
+
async function $do7(client, request, options) {
|
|
43396
44044
|
const parsed = safeParse(request, (value) => GetSupportArticleRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43397
44045
|
if (!parsed.ok) {
|
|
43398
44046
|
return [parsed, { status: "invalid" }];
|
|
@@ -43415,6 +44063,7 @@ async function $do4(client, request, options) {
|
|
|
43415
44063
|
const securityInput = await extractSecurity(client._options.security);
|
|
43416
44064
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43417
44065
|
const context = {
|
|
44066
|
+
options: client._options,
|
|
43418
44067
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43419
44068
|
operationID: "getSupportArticle",
|
|
43420
44069
|
oAuth2Scopes: [],
|
|
@@ -43431,6 +44080,7 @@ async function $do4(client, request, options) {
|
|
|
43431
44080
|
headers,
|
|
43432
44081
|
query,
|
|
43433
44082
|
body,
|
|
44083
|
+
userAgent: client._options.userAgent,
|
|
43434
44084
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43435
44085
|
}, options);
|
|
43436
44086
|
if (!requestRes.ok) {
|
|
@@ -43470,12 +44120,12 @@ var init_supportArticlesGetSupportArticle = __esm(() => {
|
|
|
43470
44120
|
});
|
|
43471
44121
|
|
|
43472
44122
|
// src/mcp-server/tools/supportArticlesGetSupportArticle.ts
|
|
43473
|
-
var
|
|
44123
|
+
var args7, tool$supportArticlesGetSupportArticle;
|
|
43474
44124
|
var init_supportArticlesGetSupportArticle2 = __esm(() => {
|
|
43475
44125
|
init_supportArticlesGetSupportArticle();
|
|
43476
44126
|
init_operations();
|
|
43477
44127
|
init_tools();
|
|
43478
|
-
|
|
44128
|
+
args7 = {
|
|
43479
44129
|
request: GetSupportArticleRequest$inboundSchema
|
|
43480
44130
|
};
|
|
43481
44131
|
tool$supportArticlesGetSupportArticle = {
|
|
@@ -43490,9 +44140,9 @@ Available \`expand\` scopes are:
|
|
|
43490
44140
|
- support_article.published
|
|
43491
44141
|
- support_article.notes
|
|
43492
44142
|
- support_article.support_category`,
|
|
43493
|
-
args:
|
|
43494
|
-
tool: async (client,
|
|
43495
|
-
const [result, apiCall] = await supportArticlesGetSupportArticle(client,
|
|
44143
|
+
args: args7,
|
|
44144
|
+
tool: async (client, args8, ctx) => {
|
|
44145
|
+
const [result, apiCall] = await supportArticlesGetSupportArticle(client, args8.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43496
44146
|
if (!result.ok) {
|
|
43497
44147
|
return {
|
|
43498
44148
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43507,9 +44157,9 @@ Available \`expand\` scopes are:
|
|
|
43507
44157
|
|
|
43508
44158
|
// src/funcs/supportArticlesListOrSearchSupportArticles.ts
|
|
43509
44159
|
function supportArticlesListOrSearchSupportArticles(client, request, options) {
|
|
43510
|
-
return new APIPromise($
|
|
44160
|
+
return new APIPromise($do8(client, request, options));
|
|
43511
44161
|
}
|
|
43512
|
-
async function $
|
|
44162
|
+
async function $do8(client, request, options) {
|
|
43513
44163
|
const parsed = safeParse(request, (value) => ListOrSearchSupportArticlesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43514
44164
|
if (!parsed.ok) {
|
|
43515
44165
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -43531,6 +44181,7 @@ async function $do5(client, request, options) {
|
|
|
43531
44181
|
const securityInput = await extractSecurity(client._options.security);
|
|
43532
44182
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43533
44183
|
const context = {
|
|
44184
|
+
options: client._options,
|
|
43534
44185
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43535
44186
|
operationID: "listOrSearchSupportArticles",
|
|
43536
44187
|
oAuth2Scopes: [],
|
|
@@ -43547,6 +44198,7 @@ async function $do5(client, request, options) {
|
|
|
43547
44198
|
headers,
|
|
43548
44199
|
query,
|
|
43549
44200
|
body,
|
|
44201
|
+
userAgent: client._options.userAgent,
|
|
43550
44202
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43551
44203
|
}, options);
|
|
43552
44204
|
if (!requestRes.ok) {
|
|
@@ -43617,12 +44269,12 @@ var init_supportArticlesListOrSearchSupportArticles = __esm(() => {
|
|
|
43617
44269
|
});
|
|
43618
44270
|
|
|
43619
44271
|
// src/mcp-server/tools/supportArticlesListOrSearchSupportArticles.ts
|
|
43620
|
-
var
|
|
44272
|
+
var args8, tool$supportArticlesListOrSearchSupportArticles;
|
|
43621
44273
|
var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
|
|
43622
44274
|
init_supportArticlesListOrSearchSupportArticles();
|
|
43623
44275
|
init_operations();
|
|
43624
44276
|
init_tools();
|
|
43625
|
-
|
|
44277
|
+
args8 = {
|
|
43626
44278
|
request: ListOrSearchSupportArticlesRequest$inboundSchema
|
|
43627
44279
|
};
|
|
43628
44280
|
tool$supportArticlesListOrSearchSupportArticles = {
|
|
@@ -43630,9 +44282,9 @@ var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
|
|
|
43630
44282
|
description: `List or search support articles
|
|
43631
44283
|
|
|
43632
44284
|
List or search support articles for FAQ.`,
|
|
43633
|
-
args:
|
|
43634
|
-
tool: async (client,
|
|
43635
|
-
const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client,
|
|
44285
|
+
args: args8,
|
|
44286
|
+
tool: async (client, args9, ctx) => {
|
|
44287
|
+
const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client, args9.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43636
44288
|
if (!result.ok) {
|
|
43637
44289
|
return {
|
|
43638
44290
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43647,9 +44299,9 @@ List or search support articles for FAQ.`,
|
|
|
43647
44299
|
|
|
43648
44300
|
// src/funcs/usersChangePassword.ts
|
|
43649
44301
|
function usersChangePassword(client, request, options) {
|
|
43650
|
-
return new APIPromise($
|
|
44302
|
+
return new APIPromise($do9(client, request, options));
|
|
43651
44303
|
}
|
|
43652
|
-
async function $
|
|
44304
|
+
async function $do9(client, request, options) {
|
|
43653
44305
|
const parsed = safeParse(request, (value) => ChangePasswordRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43654
44306
|
if (!parsed.ok) {
|
|
43655
44307
|
return [parsed, { status: "invalid" }];
|
|
@@ -43670,6 +44322,7 @@ async function $do6(client, request, options) {
|
|
|
43670
44322
|
const securityInput = await extractSecurity(client._options.security);
|
|
43671
44323
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43672
44324
|
const context = {
|
|
44325
|
+
options: client._options,
|
|
43673
44326
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43674
44327
|
operationID: "changePassword",
|
|
43675
44328
|
oAuth2Scopes: [],
|
|
@@ -43685,6 +44338,7 @@ async function $do6(client, request, options) {
|
|
|
43685
44338
|
path,
|
|
43686
44339
|
headers,
|
|
43687
44340
|
body,
|
|
44341
|
+
userAgent: client._options.userAgent,
|
|
43688
44342
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43689
44343
|
}, options);
|
|
43690
44344
|
if (!requestRes.ok) {
|
|
@@ -43723,12 +44377,12 @@ var init_usersChangePassword = __esm(() => {
|
|
|
43723
44377
|
});
|
|
43724
44378
|
|
|
43725
44379
|
// src/mcp-server/tools/usersChangePassword.ts
|
|
43726
|
-
var
|
|
44380
|
+
var args9, tool$usersChangePassword;
|
|
43727
44381
|
var init_usersChangePassword2 = __esm(() => {
|
|
43728
44382
|
init_usersChangePassword();
|
|
43729
44383
|
init_operations();
|
|
43730
44384
|
init_tools();
|
|
43731
|
-
|
|
44385
|
+
args9 = {
|
|
43732
44386
|
request: ChangePasswordRequest$inboundSchema
|
|
43733
44387
|
};
|
|
43734
44388
|
tool$usersChangePassword = {
|
|
@@ -43736,9 +44390,9 @@ var init_usersChangePassword2 = __esm(() => {
|
|
|
43736
44390
|
description: `Change password
|
|
43737
44391
|
|
|
43738
44392
|
Change the user's password to the new passed as parameter`,
|
|
43739
|
-
args:
|
|
43740
|
-
tool: async (client,
|
|
43741
|
-
const [result, apiCall] = await usersChangePassword(client,
|
|
44393
|
+
args: args9,
|
|
44394
|
+
tool: async (client, args10, ctx) => {
|
|
44395
|
+
const [result, apiCall] = await usersChangePassword(client, args10.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43742
44396
|
if (!result.ok) {
|
|
43743
44397
|
return {
|
|
43744
44398
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43753,9 +44407,9 @@ Change the user's password to the new passed as parameter`,
|
|
|
43753
44407
|
|
|
43754
44408
|
// src/funcs/usersGetCurrentUser.ts
|
|
43755
44409
|
function usersGetCurrentUser(client, options) {
|
|
43756
|
-
return new APIPromise($
|
|
44410
|
+
return new APIPromise($do10(client, options));
|
|
43757
44411
|
}
|
|
43758
|
-
async function $
|
|
44412
|
+
async function $do10(client, options) {
|
|
43759
44413
|
const path = pathToFunc("/users/me")();
|
|
43760
44414
|
const headers = new Headers(compactMap({
|
|
43761
44415
|
Accept: "application/json"
|
|
@@ -43763,6 +44417,7 @@ async function $do7(client, options) {
|
|
|
43763
44417
|
const securityInput = await extractSecurity(client._options.security);
|
|
43764
44418
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43765
44419
|
const context = {
|
|
44420
|
+
options: client._options,
|
|
43766
44421
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43767
44422
|
operationID: "getCurrentUser",
|
|
43768
44423
|
oAuth2Scopes: [],
|
|
@@ -43777,6 +44432,7 @@ async function $do7(client, options) {
|
|
|
43777
44432
|
baseURL: options?.serverURL,
|
|
43778
44433
|
path,
|
|
43779
44434
|
headers,
|
|
44435
|
+
userAgent: client._options.userAgent,
|
|
43780
44436
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43781
44437
|
}, options);
|
|
43782
44438
|
if (!requestRes.ok) {
|
|
@@ -43817,13 +44473,223 @@ var tool$usersGetCurrentUser;
|
|
|
43817
44473
|
var init_usersGetCurrentUser2 = __esm(() => {
|
|
43818
44474
|
init_usersGetCurrentUser();
|
|
43819
44475
|
init_tools();
|
|
43820
|
-
tool$usersGetCurrentUser = {
|
|
43821
|
-
name: "users-get-current-user",
|
|
43822
|
-
description: `Get current user
|
|
44476
|
+
tool$usersGetCurrentUser = {
|
|
44477
|
+
name: "users-get-current-user",
|
|
44478
|
+
description: `Get current user
|
|
44479
|
+
|
|
44480
|
+
Returns a user object for the user represented by the authorization token`,
|
|
44481
|
+
tool: async (client, ctx) => {
|
|
44482
|
+
const [result, apiCall] = await usersGetCurrentUser(client, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44483
|
+
if (!result.ok) {
|
|
44484
|
+
return {
|
|
44485
|
+
content: [{ type: "text", text: result.error.message }],
|
|
44486
|
+
isError: true
|
|
44487
|
+
};
|
|
44488
|
+
}
|
|
44489
|
+
const value = result.value;
|
|
44490
|
+
return formatResult(value, apiCall);
|
|
44491
|
+
}
|
|
44492
|
+
};
|
|
44493
|
+
});
|
|
44494
|
+
|
|
44495
|
+
// src/funcs/usersGetUserById.ts
|
|
44496
|
+
function usersGetUserById(client, request, options) {
|
|
44497
|
+
return new APIPromise($do11(client, request, options));
|
|
44498
|
+
}
|
|
44499
|
+
async function $do11(client, request, options) {
|
|
44500
|
+
const parsed = safeParse(request, (value) => GetUserByIdRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44501
|
+
if (!parsed.ok) {
|
|
44502
|
+
return [parsed, { status: "invalid" }];
|
|
44503
|
+
}
|
|
44504
|
+
const payload = parsed.value;
|
|
44505
|
+
const body = null;
|
|
44506
|
+
const pathParams = {
|
|
44507
|
+
id: encodeSimple("id", payload.id, {
|
|
44508
|
+
explode: false,
|
|
44509
|
+
charEncoding: "percent"
|
|
44510
|
+
})
|
|
44511
|
+
};
|
|
44512
|
+
const path = pathToFunc("/users/{id}")(pathParams);
|
|
44513
|
+
const headers = new Headers(compactMap({
|
|
44514
|
+
Accept: "application/json"
|
|
44515
|
+
}));
|
|
44516
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
44517
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44518
|
+
const context = {
|
|
44519
|
+
options: client._options,
|
|
44520
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44521
|
+
operationID: "getUserById",
|
|
44522
|
+
oAuth2Scopes: [],
|
|
44523
|
+
resolvedSecurity: requestSecurity,
|
|
44524
|
+
securitySource: client._options.security,
|
|
44525
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
44526
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
44527
|
+
};
|
|
44528
|
+
const requestRes = client._createRequest(context, {
|
|
44529
|
+
security: requestSecurity,
|
|
44530
|
+
method: "GET",
|
|
44531
|
+
baseURL: options?.serverURL,
|
|
44532
|
+
path,
|
|
44533
|
+
headers,
|
|
44534
|
+
body,
|
|
44535
|
+
userAgent: client._options.userAgent,
|
|
44536
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44537
|
+
}, options);
|
|
44538
|
+
if (!requestRes.ok) {
|
|
44539
|
+
return [requestRes, { status: "invalid" }];
|
|
44540
|
+
}
|
|
44541
|
+
const req = requestRes.value;
|
|
44542
|
+
const doResult = await client._do(req, {
|
|
44543
|
+
context,
|
|
44544
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
44545
|
+
retryConfig: context.retryConfig,
|
|
44546
|
+
retryCodes: context.retryCodes
|
|
44547
|
+
});
|
|
44548
|
+
if (!doResult.ok) {
|
|
44549
|
+
return [doResult, { status: "request-error", request: req }];
|
|
44550
|
+
}
|
|
44551
|
+
const response = doResult.value;
|
|
44552
|
+
const responseFields = {
|
|
44553
|
+
HttpMeta: { Response: response, Request: req }
|
|
44554
|
+
};
|
|
44555
|
+
const [result] = await match(json(200, User$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44556
|
+
if (!result.ok) {
|
|
44557
|
+
return [result, { status: "complete", request: req, response }];
|
|
44558
|
+
}
|
|
44559
|
+
return [result, { status: "complete", request: req, response }];
|
|
44560
|
+
}
|
|
44561
|
+
var init_usersGetUserById = __esm(() => {
|
|
44562
|
+
init_encodings();
|
|
44563
|
+
init_matchers();
|
|
44564
|
+
init_primitives();
|
|
44565
|
+
init_schemas();
|
|
44566
|
+
init_security();
|
|
44567
|
+
init_url();
|
|
44568
|
+
init_components();
|
|
44569
|
+
init_errors2();
|
|
44570
|
+
init_operations();
|
|
44571
|
+
init_async();
|
|
44572
|
+
});
|
|
44573
|
+
|
|
44574
|
+
// src/mcp-server/tools/usersGetUserById.ts
|
|
44575
|
+
var args10, tool$usersGetUserById;
|
|
44576
|
+
var init_usersGetUserById2 = __esm(() => {
|
|
44577
|
+
init_usersGetUserById();
|
|
44578
|
+
init_operations();
|
|
44579
|
+
init_tools();
|
|
44580
|
+
args10 = {
|
|
44581
|
+
request: GetUserByIdRequest$inboundSchema
|
|
44582
|
+
};
|
|
44583
|
+
tool$usersGetUserById = {
|
|
44584
|
+
name: "users-get-user-by-id",
|
|
44585
|
+
description: `Get user by id
|
|
44586
|
+
|
|
44587
|
+
Returns a user object for the user represented by the identifier in the path.`,
|
|
44588
|
+
args: args10,
|
|
44589
|
+
tool: async (client, args11, ctx) => {
|
|
44590
|
+
const [result, apiCall] = await usersGetUserById(client, args11.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44591
|
+
if (!result.ok) {
|
|
44592
|
+
return {
|
|
44593
|
+
content: [{ type: "text", text: result.error.message }],
|
|
44594
|
+
isError: true
|
|
44595
|
+
};
|
|
44596
|
+
}
|
|
44597
|
+
const value = result.value;
|
|
44598
|
+
return formatResult(value, apiCall);
|
|
44599
|
+
}
|
|
44600
|
+
};
|
|
44601
|
+
});
|
|
44602
|
+
|
|
44603
|
+
// src/funcs/usersMagiclink.ts
|
|
44604
|
+
function usersMagiclink(client, request, options) {
|
|
44605
|
+
return new APIPromise($do12(client, request, options));
|
|
44606
|
+
}
|
|
44607
|
+
async function $do12(client, request, options) {
|
|
44608
|
+
const parsed = safeParse(request, (value) => MagiclinkRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44609
|
+
if (!parsed.ok) {
|
|
44610
|
+
return [parsed, { status: "invalid" }];
|
|
44611
|
+
}
|
|
44612
|
+
const payload = parsed.value;
|
|
44613
|
+
const body = encodeJSON("body", payload, { explode: true });
|
|
44614
|
+
const path = pathToFunc("/users/magiclink")();
|
|
44615
|
+
const headers = new Headers(compactMap({
|
|
44616
|
+
"Content-Type": "application/json",
|
|
44617
|
+
Accept: "application/json"
|
|
44618
|
+
}));
|
|
44619
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
44620
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44621
|
+
const context = {
|
|
44622
|
+
options: client._options,
|
|
44623
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44624
|
+
operationID: "magiclink",
|
|
44625
|
+
oAuth2Scopes: [],
|
|
44626
|
+
resolvedSecurity: requestSecurity,
|
|
44627
|
+
securitySource: client._options.security,
|
|
44628
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
44629
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
44630
|
+
};
|
|
44631
|
+
const requestRes = client._createRequest(context, {
|
|
44632
|
+
security: requestSecurity,
|
|
44633
|
+
method: "POST",
|
|
44634
|
+
baseURL: options?.serverURL,
|
|
44635
|
+
path,
|
|
44636
|
+
headers,
|
|
44637
|
+
body,
|
|
44638
|
+
userAgent: client._options.userAgent,
|
|
44639
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44640
|
+
}, options);
|
|
44641
|
+
if (!requestRes.ok) {
|
|
44642
|
+
return [requestRes, { status: "invalid" }];
|
|
44643
|
+
}
|
|
44644
|
+
const req = requestRes.value;
|
|
44645
|
+
const doResult = await client._do(req, {
|
|
44646
|
+
context,
|
|
44647
|
+
errorCodes: ["404", "4XX", "500", "5XX"],
|
|
44648
|
+
retryConfig: context.retryConfig,
|
|
44649
|
+
retryCodes: context.retryCodes
|
|
44650
|
+
});
|
|
44651
|
+
if (!doResult.ok) {
|
|
44652
|
+
return [doResult, { status: "request-error", request: req }];
|
|
44653
|
+
}
|
|
44654
|
+
const response = doResult.value;
|
|
44655
|
+
const responseFields = {
|
|
44656
|
+
HttpMeta: { Response: response, Request: req }
|
|
44657
|
+
};
|
|
44658
|
+
const [result] = await match(json(200, MagiclinkMagiclinkOk$inboundSchema), jsonErr(404, ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44659
|
+
if (!result.ok) {
|
|
44660
|
+
return [result, { status: "complete", request: req, response }];
|
|
44661
|
+
}
|
|
44662
|
+
return [result, { status: "complete", request: req, response }];
|
|
44663
|
+
}
|
|
44664
|
+
var init_usersMagiclink = __esm(() => {
|
|
44665
|
+
init_encodings();
|
|
44666
|
+
init_matchers();
|
|
44667
|
+
init_primitives();
|
|
44668
|
+
init_schemas();
|
|
44669
|
+
init_security();
|
|
44670
|
+
init_url();
|
|
44671
|
+
init_errors2();
|
|
44672
|
+
init_operations();
|
|
44673
|
+
init_async();
|
|
44674
|
+
});
|
|
44675
|
+
|
|
44676
|
+
// src/mcp-server/tools/usersMagiclink.ts
|
|
44677
|
+
var args11, tool$usersMagiclink;
|
|
44678
|
+
var init_usersMagiclink2 = __esm(() => {
|
|
44679
|
+
init_usersMagiclink();
|
|
44680
|
+
init_operations();
|
|
44681
|
+
init_tools();
|
|
44682
|
+
args11 = {
|
|
44683
|
+
request: MagiclinkRequestBody$inboundSchema
|
|
44684
|
+
};
|
|
44685
|
+
tool$usersMagiclink = {
|
|
44686
|
+
name: "users-magiclink",
|
|
44687
|
+
description: `Magic link
|
|
43823
44688
|
|
|
43824
|
-
|
|
43825
|
-
|
|
43826
|
-
|
|
44689
|
+
It sends an email with a magic link to allow the user to log in.`,
|
|
44690
|
+
args: args11,
|
|
44691
|
+
tool: async (client, args12, ctx) => {
|
|
44692
|
+
const [result, apiCall] = await usersMagiclink(client, args12.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43827
44693
|
if (!result.ok) {
|
|
43828
44694
|
return {
|
|
43829
44695
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43836,32 +44702,28 @@ Returns a user object for the user represented by the authorization token`,
|
|
|
43836
44702
|
};
|
|
43837
44703
|
});
|
|
43838
44704
|
|
|
43839
|
-
// src/funcs/
|
|
43840
|
-
function
|
|
43841
|
-
return new APIPromise($
|
|
44705
|
+
// src/funcs/usersPassword.ts
|
|
44706
|
+
function usersPassword(client, request, options) {
|
|
44707
|
+
return new APIPromise($do13(client, request, options));
|
|
43842
44708
|
}
|
|
43843
|
-
async function $
|
|
43844
|
-
const parsed = safeParse(request, (value) =>
|
|
44709
|
+
async function $do13(client, request, options) {
|
|
44710
|
+
const parsed = safeParse(request, (value) => PasswordRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
43845
44711
|
if (!parsed.ok) {
|
|
43846
44712
|
return [parsed, { status: "invalid" }];
|
|
43847
44713
|
}
|
|
43848
44714
|
const payload = parsed.value;
|
|
43849
|
-
const body =
|
|
43850
|
-
const
|
|
43851
|
-
id: encodeSimple("id", payload.id, {
|
|
43852
|
-
explode: false,
|
|
43853
|
-
charEncoding: "percent"
|
|
43854
|
-
})
|
|
43855
|
-
};
|
|
43856
|
-
const path = pathToFunc("/users/{id}")(pathParams);
|
|
44715
|
+
const body = encodeJSON("body", payload, { explode: true });
|
|
44716
|
+
const path = pathToFunc("/users/password")();
|
|
43857
44717
|
const headers = new Headers(compactMap({
|
|
44718
|
+
"Content-Type": "application/json",
|
|
43858
44719
|
Accept: "application/json"
|
|
43859
44720
|
}));
|
|
43860
44721
|
const securityInput = await extractSecurity(client._options.security);
|
|
43861
44722
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43862
44723
|
const context = {
|
|
44724
|
+
options: client._options,
|
|
43863
44725
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43864
|
-
operationID: "
|
|
44726
|
+
operationID: "password",
|
|
43865
44727
|
oAuth2Scopes: [],
|
|
43866
44728
|
resolvedSecurity: requestSecurity,
|
|
43867
44729
|
securitySource: client._options.security,
|
|
@@ -43870,11 +44732,12 @@ async function $do8(client, request, options) {
|
|
|
43870
44732
|
};
|
|
43871
44733
|
const requestRes = client._createRequest(context, {
|
|
43872
44734
|
security: requestSecurity,
|
|
43873
|
-
method: "
|
|
44735
|
+
method: "POST",
|
|
43874
44736
|
baseURL: options?.serverURL,
|
|
43875
44737
|
path,
|
|
43876
44738
|
headers,
|
|
43877
44739
|
body,
|
|
44740
|
+
userAgent: client._options.userAgent,
|
|
43878
44741
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43879
44742
|
}, options);
|
|
43880
44743
|
if (!requestRes.ok) {
|
|
@@ -43883,7 +44746,7 @@ async function $do8(client, request, options) {
|
|
|
43883
44746
|
const req = requestRes.value;
|
|
43884
44747
|
const doResult = await client._do(req, {
|
|
43885
44748
|
context,
|
|
43886
|
-
errorCodes: ["400", "401", "403", "
|
|
44749
|
+
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
43887
44750
|
retryConfig: context.retryConfig,
|
|
43888
44751
|
retryCodes: context.retryCodes
|
|
43889
44752
|
});
|
|
@@ -43894,42 +44757,42 @@ async function $do8(client, request, options) {
|
|
|
43894
44757
|
const responseFields = {
|
|
43895
44758
|
HttpMeta: { Response: response, Request: req }
|
|
43896
44759
|
};
|
|
43897
|
-
const [result] = await match(json(200,
|
|
44760
|
+
const [result] = await match(json(200, PasswordPasswordOk$inboundSchema), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43898
44761
|
if (!result.ok) {
|
|
43899
44762
|
return [result, { status: "complete", request: req, response }];
|
|
43900
44763
|
}
|
|
43901
44764
|
return [result, { status: "complete", request: req, response }];
|
|
43902
44765
|
}
|
|
43903
|
-
var
|
|
44766
|
+
var init_usersPassword = __esm(() => {
|
|
43904
44767
|
init_encodings();
|
|
43905
44768
|
init_matchers();
|
|
43906
44769
|
init_primitives();
|
|
43907
44770
|
init_schemas();
|
|
43908
44771
|
init_security();
|
|
43909
44772
|
init_url();
|
|
43910
|
-
init_components();
|
|
43911
44773
|
init_errors2();
|
|
43912
44774
|
init_operations();
|
|
43913
44775
|
init_async();
|
|
43914
44776
|
});
|
|
43915
44777
|
|
|
43916
|
-
// src/mcp-server/tools/
|
|
43917
|
-
var
|
|
43918
|
-
var
|
|
43919
|
-
|
|
44778
|
+
// src/mcp-server/tools/usersPassword.ts
|
|
44779
|
+
var args12, tool$usersPassword;
|
|
44780
|
+
var init_usersPassword2 = __esm(() => {
|
|
44781
|
+
init_usersPassword();
|
|
43920
44782
|
init_operations();
|
|
43921
44783
|
init_tools();
|
|
43922
|
-
|
|
43923
|
-
request:
|
|
44784
|
+
args12 = {
|
|
44785
|
+
request: PasswordRequestBody$inboundSchema
|
|
43924
44786
|
};
|
|
43925
|
-
tool$
|
|
43926
|
-
name: "users-
|
|
43927
|
-
description: `
|
|
44787
|
+
tool$usersPassword = {
|
|
44788
|
+
name: "users-password",
|
|
44789
|
+
description: `Password reset
|
|
43928
44790
|
|
|
43929
|
-
|
|
43930
|
-
|
|
43931
|
-
|
|
43932
|
-
|
|
44791
|
+
Resets the a user's password using a password_reset_id that was sent to them via email.
|
|
44792
|
+
See /users/passwordresetrequest to initiate a password reset flow.`,
|
|
44793
|
+
args: args12,
|
|
44794
|
+
tool: async (client, args13, ctx) => {
|
|
44795
|
+
const [result, apiCall] = await usersPassword(client, args13.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43933
44796
|
if (!result.ok) {
|
|
43934
44797
|
return {
|
|
43935
44798
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43942,18 +44805,18 @@ Returns a user object for the user represented by the identifier in the path.`,
|
|
|
43942
44805
|
};
|
|
43943
44806
|
});
|
|
43944
44807
|
|
|
43945
|
-
// src/funcs/
|
|
43946
|
-
function
|
|
43947
|
-
return new APIPromise($
|
|
44808
|
+
// src/funcs/usersPasswordResetRequest.ts
|
|
44809
|
+
function usersPasswordResetRequest(client, request, options) {
|
|
44810
|
+
return new APIPromise($do14(client, request, options));
|
|
43948
44811
|
}
|
|
43949
|
-
async function $
|
|
43950
|
-
const parsed = safeParse(request, (value) =>
|
|
44812
|
+
async function $do14(client, request, options) {
|
|
44813
|
+
const parsed = safeParse(request, (value) => PasswordResetRequestRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
43951
44814
|
if (!parsed.ok) {
|
|
43952
44815
|
return [parsed, { status: "invalid" }];
|
|
43953
44816
|
}
|
|
43954
44817
|
const payload = parsed.value;
|
|
43955
44818
|
const body = encodeJSON("body", payload, { explode: true });
|
|
43956
|
-
const path = pathToFunc("/users/
|
|
44819
|
+
const path = pathToFunc("/users/passwordresetrequest")();
|
|
43957
44820
|
const headers = new Headers(compactMap({
|
|
43958
44821
|
"Content-Type": "application/json",
|
|
43959
44822
|
Accept: "application/json"
|
|
@@ -43961,8 +44824,9 @@ async function $do9(client, request, options) {
|
|
|
43961
44824
|
const securityInput = await extractSecurity(client._options.security);
|
|
43962
44825
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43963
44826
|
const context = {
|
|
44827
|
+
options: client._options,
|
|
43964
44828
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43965
|
-
operationID: "
|
|
44829
|
+
operationID: "passwordResetRequest",
|
|
43966
44830
|
oAuth2Scopes: [],
|
|
43967
44831
|
resolvedSecurity: requestSecurity,
|
|
43968
44832
|
securitySource: client._options.security,
|
|
@@ -43976,6 +44840,7 @@ async function $do9(client, request, options) {
|
|
|
43976
44840
|
path,
|
|
43977
44841
|
headers,
|
|
43978
44842
|
body,
|
|
44843
|
+
userAgent: client._options.userAgent,
|
|
43979
44844
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43980
44845
|
}, options);
|
|
43981
44846
|
if (!requestRes.ok) {
|
|
@@ -43984,7 +44849,7 @@ async function $do9(client, request, options) {
|
|
|
43984
44849
|
const req = requestRes.value;
|
|
43985
44850
|
const doResult = await client._do(req, {
|
|
43986
44851
|
context,
|
|
43987
|
-
errorCodes: ["404", "4XX", "500", "5XX"],
|
|
44852
|
+
errorCodes: ["400", "404", "4XX", "500", "5XX"],
|
|
43988
44853
|
retryConfig: context.retryConfig,
|
|
43989
44854
|
retryCodes: context.retryCodes
|
|
43990
44855
|
});
|
|
@@ -43995,13 +44860,13 @@ async function $do9(client, request, options) {
|
|
|
43995
44860
|
const responseFields = {
|
|
43996
44861
|
HttpMeta: { Response: response, Request: req }
|
|
43997
44862
|
};
|
|
43998
|
-
const [result] = await match(json(200,
|
|
44863
|
+
const [result] = await match(json(200, PasswordResetRequestPasswordResetRequestOk$inboundSchema), jsonErr([400, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43999
44864
|
if (!result.ok) {
|
|
44000
44865
|
return [result, { status: "complete", request: req, response }];
|
|
44001
44866
|
}
|
|
44002
44867
|
return [result, { status: "complete", request: req, response }];
|
|
44003
44868
|
}
|
|
44004
|
-
var
|
|
44869
|
+
var init_usersPasswordResetRequest = __esm(() => {
|
|
44005
44870
|
init_encodings();
|
|
44006
44871
|
init_matchers();
|
|
44007
44872
|
init_primitives();
|
|
@@ -44013,23 +44878,23 @@ var init_usersMagiclink = __esm(() => {
|
|
|
44013
44878
|
init_async();
|
|
44014
44879
|
});
|
|
44015
44880
|
|
|
44016
|
-
// src/mcp-server/tools/
|
|
44017
|
-
var
|
|
44018
|
-
var
|
|
44019
|
-
|
|
44881
|
+
// src/mcp-server/tools/usersPasswordResetRequest.ts
|
|
44882
|
+
var args13, tool$usersPasswordResetRequest;
|
|
44883
|
+
var init_usersPasswordResetRequest2 = __esm(() => {
|
|
44884
|
+
init_usersPasswordResetRequest();
|
|
44020
44885
|
init_operations();
|
|
44021
44886
|
init_tools();
|
|
44022
|
-
|
|
44023
|
-
request:
|
|
44887
|
+
args13 = {
|
|
44888
|
+
request: PasswordResetRequestRequestBody$inboundSchema
|
|
44024
44889
|
};
|
|
44025
|
-
tool$
|
|
44026
|
-
name: "users-
|
|
44027
|
-
description: `
|
|
44890
|
+
tool$usersPasswordResetRequest = {
|
|
44891
|
+
name: "users-password-reset-request",
|
|
44892
|
+
description: `Password reset request
|
|
44028
44893
|
|
|
44029
|
-
It sends an email with a
|
|
44030
|
-
args:
|
|
44031
|
-
tool: async (client,
|
|
44032
|
-
const [result, apiCall] = await
|
|
44894
|
+
It sends an email with a link for resetting a user's password.`,
|
|
44895
|
+
args: args13,
|
|
44896
|
+
tool: async (client, args14, ctx) => {
|
|
44897
|
+
const [result, apiCall] = await usersPasswordResetRequest(client, args14.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44033
44898
|
if (!result.ok) {
|
|
44034
44899
|
return {
|
|
44035
44900
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44042,40 +44907,39 @@ It sends an email with a magic link to allow the user to log in.`,
|
|
|
44042
44907
|
};
|
|
44043
44908
|
});
|
|
44044
44909
|
|
|
44045
|
-
// src/funcs/
|
|
44046
|
-
function
|
|
44047
|
-
return new APIPromise($
|
|
44910
|
+
// src/funcs/usersPostAuthenticate.ts
|
|
44911
|
+
function usersPostAuthenticate(client, request, options) {
|
|
44912
|
+
return new APIPromise($do15(client, request, options));
|
|
44048
44913
|
}
|
|
44049
|
-
async function $
|
|
44050
|
-
const parsed = safeParse(request, (value) =>
|
|
44914
|
+
async function $do15(client, request, options) {
|
|
44915
|
+
const parsed = safeParse(request, (value) => PostAuthenticateRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44051
44916
|
if (!parsed.ok) {
|
|
44052
44917
|
return [parsed, { status: "invalid" }];
|
|
44053
44918
|
}
|
|
44054
44919
|
const payload = parsed.value;
|
|
44055
44920
|
const body = encodeJSON("body", payload, { explode: true });
|
|
44056
|
-
const path = pathToFunc("/users/
|
|
44921
|
+
const path = pathToFunc("/users/authenticate")();
|
|
44057
44922
|
const headers = new Headers(compactMap({
|
|
44058
44923
|
"Content-Type": "application/json",
|
|
44059
44924
|
Accept: "application/json"
|
|
44060
44925
|
}));
|
|
44061
|
-
const securityInput = await extractSecurity(client._options.security);
|
|
44062
|
-
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44063
44926
|
const context = {
|
|
44927
|
+
options: client._options,
|
|
44064
44928
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44065
|
-
operationID: "
|
|
44929
|
+
operationID: "postAuthenticate",
|
|
44066
44930
|
oAuth2Scopes: [],
|
|
44067
|
-
resolvedSecurity:
|
|
44068
|
-
securitySource:
|
|
44931
|
+
resolvedSecurity: null,
|
|
44932
|
+
securitySource: null,
|
|
44069
44933
|
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
44070
44934
|
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
44071
44935
|
};
|
|
44072
44936
|
const requestRes = client._createRequest(context, {
|
|
44073
|
-
security: requestSecurity,
|
|
44074
44937
|
method: "POST",
|
|
44075
44938
|
baseURL: options?.serverURL,
|
|
44076
44939
|
path,
|
|
44077
44940
|
headers,
|
|
44078
44941
|
body,
|
|
44942
|
+
userAgent: client._options.userAgent,
|
|
44079
44943
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44080
44944
|
}, options);
|
|
44081
44945
|
if (!requestRes.ok) {
|
|
@@ -44084,7 +44948,7 @@ async function $do10(client, request, options) {
|
|
|
44084
44948
|
const req = requestRes.value;
|
|
44085
44949
|
const doResult = await client._do(req, {
|
|
44086
44950
|
context,
|
|
44087
|
-
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
44951
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
44088
44952
|
retryConfig: context.retryConfig,
|
|
44089
44953
|
retryCodes: context.retryCodes
|
|
44090
44954
|
});
|
|
@@ -44095,42 +44959,70 @@ async function $do10(client, request, options) {
|
|
|
44095
44959
|
const responseFields = {
|
|
44096
44960
|
HttpMeta: { Response: response, Request: req }
|
|
44097
44961
|
};
|
|
44098
|
-
const [result] = await match(json(200,
|
|
44962
|
+
const [result] = await match(json(200, PostAuthenticateResponse$inboundSchema), json(202, PostAuthenticateResponse$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44099
44963
|
if (!result.ok) {
|
|
44100
44964
|
return [result, { status: "complete", request: req, response }];
|
|
44101
44965
|
}
|
|
44102
44966
|
return [result, { status: "complete", request: req, response }];
|
|
44103
44967
|
}
|
|
44104
|
-
var
|
|
44968
|
+
var init_usersPostAuthenticate = __esm(() => {
|
|
44105
44969
|
init_encodings();
|
|
44106
44970
|
init_matchers();
|
|
44107
44971
|
init_primitives();
|
|
44108
44972
|
init_schemas();
|
|
44109
|
-
init_security();
|
|
44110
44973
|
init_url();
|
|
44111
44974
|
init_errors2();
|
|
44112
44975
|
init_operations();
|
|
44113
44976
|
init_async();
|
|
44114
44977
|
});
|
|
44115
44978
|
|
|
44116
|
-
// src/mcp-server/tools/
|
|
44117
|
-
var
|
|
44118
|
-
var
|
|
44119
|
-
|
|
44979
|
+
// src/mcp-server/tools/usersPostAuthenticate.ts
|
|
44980
|
+
var args14, tool$usersPostAuthenticate;
|
|
44981
|
+
var init_usersPostAuthenticate2 = __esm(() => {
|
|
44982
|
+
init_usersPostAuthenticate();
|
|
44120
44983
|
init_operations();
|
|
44121
44984
|
init_tools();
|
|
44122
|
-
|
|
44123
|
-
request:
|
|
44985
|
+
args14 = {
|
|
44986
|
+
request: PostAuthenticateRequestBody$inboundSchema
|
|
44124
44987
|
};
|
|
44125
|
-
tool$
|
|
44126
|
-
name: "users-
|
|
44127
|
-
description: `
|
|
44988
|
+
tool$usersPostAuthenticate = {
|
|
44989
|
+
name: "users-post-authenticate",
|
|
44990
|
+
description: `Logs user into the system
|
|
44128
44991
|
|
|
44129
|
-
|
|
44130
|
-
|
|
44131
|
-
|
|
44132
|
-
|
|
44133
|
-
|
|
44992
|
+
This endpoint allows a user to authenticate themselves and retrieve a permanent token for access.
|
|
44993
|
+
|
|
44994
|
+
Permanent tokens should only ever be stored in an encrypted storage because they represent a fully logged in user.
|
|
44995
|
+
|
|
44996
|
+
Users may log in with \`email/password\`, \`SAML\`, \`magic link\` or \`mfa\`. The application should handle all of the above as equally valid login methods.
|
|
44997
|
+
|
|
44998
|
+
The most common way to authenticate a user is to log in with an email and password. If the user provides valid credentials, the server will either respond with a full user object including the token.
|
|
44999
|
+
|
|
45000
|
+
When the user's account is protected via MFA, the server will send a 6 digit code to the user via their default MFA provider. You should collect that code and resend the email, password and mfa_code together to get a successful authentication.
|
|
45001
|
+
|
|
45002
|
+
The ideal flow for a login sequence is the following:
|
|
45003
|
+
|
|
45004
|
+
1. Present an email address field only and allow the user to submit
|
|
45005
|
+
2. Send \`email\` and \`return_url\` payload to this endpoint
|
|
45006
|
+
3. Follow the flow based on the response \`requires\` field
|
|
45007
|
+
|
|
45008
|
+
Requires: \`password\`
|
|
45009
|
+
|
|
45010
|
+
1. Show a password field for the user to fill out
|
|
45011
|
+
2. Submit the \`email\` and \`password\` to this endpoint
|
|
45012
|
+
3. If the response is \`200\`, the login is done. If the response is \`201\`, then check if \`requires: mfa_code\` is returned and show MFA flow
|
|
45013
|
+
4. Submit \`email\`, \`password\`, \`mfa_code\` to this endpoint
|
|
45014
|
+
5. If the response is \`200\`, the login is done. Otherwise, show the appropriate error to the user and go back to step 1 or 3 depending on the error.
|
|
45015
|
+
|
|
45016
|
+
Requires: \`saml_login\`
|
|
45017
|
+
|
|
45018
|
+
1. [Open a browser](https://docs.expo.dev/versions/latest/sdk/webbrowser/#webbrowseropenauthsessionasyncurl-redirecturl-options) to the url returned in \`sso_url\`
|
|
45019
|
+
2. User completes sign-in using their configured SAML IdP
|
|
45020
|
+
3. Site redirects to your selected \`return_url\`
|
|
45021
|
+
4. The \`user_token\` will be appended as a query string parameter to your \`return_url\` - you must parse this token and store it
|
|
45022
|
+
5. Fetch the user object from \`/users/me\` using the token`,
|
|
45023
|
+
args: args14,
|
|
45024
|
+
tool: async (client, args15, ctx) => {
|
|
45025
|
+
const [result, apiCall] = await usersPostAuthenticate(client, args15.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44134
45026
|
if (!result.ok) {
|
|
44135
45027
|
return {
|
|
44136
45028
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44143,18 +45035,21 @@ See /users/passwordresetrequest to initiate a password reset flow.`,
|
|
|
44143
45035
|
};
|
|
44144
45036
|
});
|
|
44145
45037
|
|
|
44146
|
-
// src/funcs/
|
|
44147
|
-
function
|
|
44148
|
-
return new APIPromise($
|
|
45038
|
+
// src/funcs/vendorsAddVendorCredentialFile.ts
|
|
45039
|
+
function vendorsAddVendorCredentialFile(client, request, options) {
|
|
45040
|
+
return new APIPromise($do16(client, request, options));
|
|
44149
45041
|
}
|
|
44150
|
-
async function $
|
|
44151
|
-
const parsed = safeParse(request, (value) =>
|
|
45042
|
+
async function $do16(client, request, options) {
|
|
45043
|
+
const parsed = safeParse(request, (value) => AddVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44152
45044
|
if (!parsed.ok) {
|
|
44153
45045
|
return [parsed, { status: "invalid" }];
|
|
44154
45046
|
}
|
|
44155
45047
|
const payload = parsed.value;
|
|
44156
|
-
const body = encodeJSON("body", payload, { explode: true });
|
|
44157
|
-
const
|
|
45048
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
45049
|
+
const pathParams = {
|
|
45050
|
+
vendor_credential_id: encodeSimple("vendor_credential_id", payload.vendor_credential_id, { explode: false, charEncoding: "percent" })
|
|
45051
|
+
};
|
|
45052
|
+
const path = pathToFunc("/vendors/credentials/{vendor_credential_id}/files")(pathParams);
|
|
44158
45053
|
const headers = new Headers(compactMap({
|
|
44159
45054
|
"Content-Type": "application/json",
|
|
44160
45055
|
Accept: "application/json"
|
|
@@ -44162,8 +45057,9 @@ async function $do11(client, request, options) {
|
|
|
44162
45057
|
const securityInput = await extractSecurity(client._options.security);
|
|
44163
45058
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44164
45059
|
const context = {
|
|
45060
|
+
options: client._options,
|
|
44165
45061
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44166
|
-
operationID: "
|
|
45062
|
+
operationID: "addVendorCredentialFile",
|
|
44167
45063
|
oAuth2Scopes: [],
|
|
44168
45064
|
resolvedSecurity: requestSecurity,
|
|
44169
45065
|
securitySource: client._options.security,
|
|
@@ -44177,6 +45073,7 @@ async function $do11(client, request, options) {
|
|
|
44177
45073
|
path,
|
|
44178
45074
|
headers,
|
|
44179
45075
|
body,
|
|
45076
|
+
userAgent: client._options.userAgent,
|
|
44180
45077
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44181
45078
|
}, options);
|
|
44182
45079
|
if (!requestRes.ok) {
|
|
@@ -44185,7 +45082,7 @@ async function $do11(client, request, options) {
|
|
|
44185
45082
|
const req = requestRes.value;
|
|
44186
45083
|
const doResult = await client._do(req, {
|
|
44187
45084
|
context,
|
|
44188
|
-
errorCodes: ["400", "404", "4XX", "500", "5XX"],
|
|
45085
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
44189
45086
|
retryConfig: context.retryConfig,
|
|
44190
45087
|
retryCodes: context.retryCodes
|
|
44191
45088
|
});
|
|
@@ -44196,13 +45093,13 @@ async function $do11(client, request, options) {
|
|
|
44196
45093
|
const responseFields = {
|
|
44197
45094
|
HttpMeta: { Response: response, Request: req }
|
|
44198
45095
|
};
|
|
44199
|
-
const [result] = await match(json(200,
|
|
45096
|
+
const [result] = await match(json(200, AddVendorCredentialFileResponseBody$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44200
45097
|
if (!result.ok) {
|
|
44201
45098
|
return [result, { status: "complete", request: req, response }];
|
|
44202
45099
|
}
|
|
44203
45100
|
return [result, { status: "complete", request: req, response }];
|
|
44204
45101
|
}
|
|
44205
|
-
var
|
|
45102
|
+
var init_vendorsAddVendorCredentialFile = __esm(() => {
|
|
44206
45103
|
init_encodings();
|
|
44207
45104
|
init_matchers();
|
|
44208
45105
|
init_primitives();
|
|
@@ -44214,23 +45111,23 @@ var init_usersPasswordResetRequest = __esm(() => {
|
|
|
44214
45111
|
init_async();
|
|
44215
45112
|
});
|
|
44216
45113
|
|
|
44217
|
-
// src/mcp-server/tools/
|
|
44218
|
-
var
|
|
44219
|
-
var
|
|
44220
|
-
|
|
45114
|
+
// src/mcp-server/tools/vendorsAddVendorCredentialFile.ts
|
|
45115
|
+
var args15, tool$vendorsAddVendorCredentialFile;
|
|
45116
|
+
var init_vendorsAddVendorCredentialFile2 = __esm(() => {
|
|
45117
|
+
init_vendorsAddVendorCredentialFile();
|
|
44221
45118
|
init_operations();
|
|
44222
45119
|
init_tools();
|
|
44223
|
-
|
|
44224
|
-
request:
|
|
45120
|
+
args15 = {
|
|
45121
|
+
request: AddVendorCredentialFileRequest$inboundSchema
|
|
44225
45122
|
};
|
|
44226
|
-
tool$
|
|
44227
|
-
name: "
|
|
44228
|
-
description: `
|
|
45123
|
+
tool$vendorsAddVendorCredentialFile = {
|
|
45124
|
+
name: "vendors-add-vendor-credential-file",
|
|
45125
|
+
description: `Add vendor credential file
|
|
44229
45126
|
|
|
44230
|
-
It
|
|
44231
|
-
args:
|
|
44232
|
-
tool: async (client,
|
|
44233
|
-
const [result, apiCall] = await
|
|
45127
|
+
It will add a new vendor credential file`,
|
|
45128
|
+
args: args15,
|
|
45129
|
+
tool: async (client, args16, ctx) => {
|
|
45130
|
+
const [result, apiCall] = await vendorsAddVendorCredentialFile(client, args16.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44234
45131
|
if (!result.ok) {
|
|
44235
45132
|
return {
|
|
44236
45133
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44243,37 +45140,48 @@ It sends an email with a link for resetting a user's password.`,
|
|
|
44243
45140
|
};
|
|
44244
45141
|
});
|
|
44245
45142
|
|
|
44246
|
-
// src/funcs/
|
|
44247
|
-
function
|
|
44248
|
-
return new APIPromise($
|
|
45143
|
+
// src/funcs/vendorsAddVendorManagedByCompany.ts
|
|
45144
|
+
function vendorsAddVendorManagedByCompany(client, request, options) {
|
|
45145
|
+
return new APIPromise($do17(client, request, options));
|
|
44249
45146
|
}
|
|
44250
|
-
async function $
|
|
44251
|
-
const parsed = safeParse(request, (value) =>
|
|
45147
|
+
async function $do17(client, request, options) {
|
|
45148
|
+
const parsed = safeParse(request, (value) => AddVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44252
45149
|
if (!parsed.ok) {
|
|
44253
45150
|
return [parsed, { status: "invalid" }];
|
|
44254
45151
|
}
|
|
44255
45152
|
const payload = parsed.value;
|
|
44256
|
-
const body = encodeJSON("body", payload, { explode: true });
|
|
44257
|
-
const
|
|
45153
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
45154
|
+
const pathParams = {
|
|
45155
|
+
vendor_id_or_me: encodeSimple("vendor_id_or_me", payload.vendor_id_or_me, {
|
|
45156
|
+
explode: false,
|
|
45157
|
+
charEncoding: "percent"
|
|
45158
|
+
})
|
|
45159
|
+
};
|
|
45160
|
+
const path = pathToFunc("/vendors/{vendor_id_or_me}/managed-by-companies")(pathParams);
|
|
44258
45161
|
const headers = new Headers(compactMap({
|
|
44259
45162
|
"Content-Type": "application/json",
|
|
44260
45163
|
Accept: "application/json"
|
|
44261
45164
|
}));
|
|
45165
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
45166
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44262
45167
|
const context = {
|
|
45168
|
+
options: client._options,
|
|
44263
45169
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44264
|
-
operationID: "
|
|
45170
|
+
operationID: "addVendorManagedByCompany",
|
|
44265
45171
|
oAuth2Scopes: [],
|
|
44266
|
-
resolvedSecurity:
|
|
44267
|
-
securitySource:
|
|
45172
|
+
resolvedSecurity: requestSecurity,
|
|
45173
|
+
securitySource: client._options.security,
|
|
44268
45174
|
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
44269
45175
|
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
44270
45176
|
};
|
|
44271
45177
|
const requestRes = client._createRequest(context, {
|
|
45178
|
+
security: requestSecurity,
|
|
44272
45179
|
method: "POST",
|
|
44273
45180
|
baseURL: options?.serverURL,
|
|
44274
45181
|
path,
|
|
44275
45182
|
headers,
|
|
44276
45183
|
body,
|
|
45184
|
+
userAgent: client._options.userAgent,
|
|
44277
45185
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44278
45186
|
}, options);
|
|
44279
45187
|
if (!requestRes.ok) {
|
|
@@ -44293,70 +45201,41 @@ async function $do12(client, request, options) {
|
|
|
44293
45201
|
const responseFields = {
|
|
44294
45202
|
HttpMeta: { Response: response, Request: req }
|
|
44295
45203
|
};
|
|
44296
|
-
const [result] = await match(json(200,
|
|
45204
|
+
const [result] = await match(json(200, AddVendorManagedByCompanyAddVendorManagedByCompanyOk$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44297
45205
|
if (!result.ok) {
|
|
44298
45206
|
return [result, { status: "complete", request: req, response }];
|
|
44299
45207
|
}
|
|
44300
45208
|
return [result, { status: "complete", request: req, response }];
|
|
44301
45209
|
}
|
|
44302
|
-
var
|
|
45210
|
+
var init_vendorsAddVendorManagedByCompany = __esm(() => {
|
|
44303
45211
|
init_encodings();
|
|
44304
45212
|
init_matchers();
|
|
44305
45213
|
init_primitives();
|
|
44306
45214
|
init_schemas();
|
|
45215
|
+
init_security();
|
|
44307
45216
|
init_url();
|
|
44308
45217
|
init_errors2();
|
|
44309
45218
|
init_operations();
|
|
44310
45219
|
init_async();
|
|
44311
45220
|
});
|
|
44312
45221
|
|
|
44313
|
-
// src/mcp-server/tools/
|
|
44314
|
-
var
|
|
44315
|
-
var
|
|
44316
|
-
|
|
45222
|
+
// src/mcp-server/tools/vendorsAddVendorManagedByCompany.ts
|
|
45223
|
+
var args16, tool$vendorsAddVendorManagedByCompany;
|
|
45224
|
+
var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
|
|
45225
|
+
init_vendorsAddVendorManagedByCompany();
|
|
44317
45226
|
init_operations();
|
|
44318
45227
|
init_tools();
|
|
44319
|
-
|
|
44320
|
-
request:
|
|
45228
|
+
args16 = {
|
|
45229
|
+
request: AddVendorManagedByCompanyRequest$inboundSchema
|
|
44321
45230
|
};
|
|
44322
|
-
tool$
|
|
44323
|
-
name: "
|
|
44324
|
-
description: `
|
|
44325
|
-
|
|
44326
|
-
This endpoint allows a user to authenticate themselves and retrieve a permanent token for access.
|
|
44327
|
-
|
|
44328
|
-
Permanent tokens should only ever be stored in an encrypted storage because they represent a fully logged in user.
|
|
44329
|
-
|
|
44330
|
-
Users may log in with \`email/password\`, \`SAML\`, \`magic link\` or \`mfa\`. The application should handle all of the above as equally valid login methods.
|
|
44331
|
-
|
|
44332
|
-
The most common way to authenticate a user is to log in with an email and password. If the user provides valid credentials, the server will either respond with a full user object including the token.
|
|
44333
|
-
|
|
44334
|
-
When the user's account is protected via MFA, the server will send a 6 digit code to the user via their default MFA provider. You should collect that code and resend the email, password and mfa_code together to get a successful authentication.
|
|
44335
|
-
|
|
44336
|
-
The ideal flow for a login sequence is the following:
|
|
44337
|
-
|
|
44338
|
-
1. Present an email address field only and allow the user to submit
|
|
44339
|
-
2. Send \`email\` and \`return_url\` payload to this endpoint
|
|
44340
|
-
3. Follow the flow based on the response \`requires\` field
|
|
44341
|
-
|
|
44342
|
-
Requires: \`password\`
|
|
44343
|
-
|
|
44344
|
-
1. Show a password field for the user to fill out
|
|
44345
|
-
2. Submit the \`email\` and \`password\` to this endpoint
|
|
44346
|
-
3. If the response is \`200\`, the login is done. If the response is \`201\`, then check if \`requires: mfa_code\` is returned and show MFA flow
|
|
44347
|
-
4. Submit \`email\`, \`password\`, \`mfa_code\` to this endpoint
|
|
44348
|
-
5. If the response is \`200\`, the login is done. Otherwise, show the appropriate error to the user and go back to step 1 or 3 depending on the error.
|
|
44349
|
-
|
|
44350
|
-
Requires: \`saml_login\`
|
|
45231
|
+
tool$vendorsAddVendorManagedByCompany = {
|
|
45232
|
+
name: "vendors-add-vendor-managed-by-company",
|
|
45233
|
+
description: `Add vendor managed by company
|
|
44351
45234
|
|
|
44352
|
-
|
|
44353
|
-
|
|
44354
|
-
|
|
44355
|
-
|
|
44356
|
-
5. Fetch the user object from \`/users/me\` using the token`,
|
|
44357
|
-
args: args11,
|
|
44358
|
-
tool: async (client, args12, ctx) => {
|
|
44359
|
-
const [result, apiCall] = await usersPostAuthenticate(client, args12.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45235
|
+
It will add a vendor managed by company`,
|
|
45236
|
+
args: args16,
|
|
45237
|
+
tool: async (client, args17, ctx) => {
|
|
45238
|
+
const [result, apiCall] = await vendorsAddVendorManagedByCompany(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44360
45239
|
if (!result.ok) {
|
|
44361
45240
|
return {
|
|
44362
45241
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44369,30 +45248,33 @@ Requires: \`saml_login\`
|
|
|
44369
45248
|
};
|
|
44370
45249
|
});
|
|
44371
45250
|
|
|
44372
|
-
// src/funcs/
|
|
44373
|
-
function
|
|
44374
|
-
return new APIPromise($
|
|
45251
|
+
// src/funcs/vendorScansVendorScanOut.ts
|
|
45252
|
+
function vendorScansVendorScanOut(client, request, options) {
|
|
45253
|
+
return new APIPromise($do18(client, request, options));
|
|
44375
45254
|
}
|
|
44376
|
-
async function $
|
|
44377
|
-
const parsed = safeParse(request, (value) =>
|
|
45255
|
+
async function $do18(client, request, options) {
|
|
45256
|
+
const parsed = safeParse(request, (value) => VendorScanOutRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44378
45257
|
if (!parsed.ok) {
|
|
44379
45258
|
return [parsed, { status: "invalid" }];
|
|
44380
45259
|
}
|
|
44381
45260
|
const payload = parsed.value;
|
|
44382
|
-
const body =
|
|
45261
|
+
const body = null;
|
|
44383
45262
|
const pathParams = {
|
|
44384
|
-
|
|
45263
|
+
id: encodeSimple("id", payload.id, {
|
|
45264
|
+
explode: false,
|
|
45265
|
+
charEncoding: "percent"
|
|
45266
|
+
})
|
|
44385
45267
|
};
|
|
44386
|
-
const path = pathToFunc("/
|
|
45268
|
+
const path = pathToFunc("/vendor-scans/{id}/scan-out")(pathParams);
|
|
44387
45269
|
const headers = new Headers(compactMap({
|
|
44388
|
-
"Content-Type": "application/json",
|
|
44389
45270
|
Accept: "application/json"
|
|
44390
45271
|
}));
|
|
44391
45272
|
const securityInput = await extractSecurity(client._options.security);
|
|
44392
45273
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44393
45274
|
const context = {
|
|
45275
|
+
options: client._options,
|
|
44394
45276
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44395
|
-
operationID: "
|
|
45277
|
+
operationID: "vendorScanOut",
|
|
44396
45278
|
oAuth2Scopes: [],
|
|
44397
45279
|
resolvedSecurity: requestSecurity,
|
|
44398
45280
|
securitySource: client._options.security,
|
|
@@ -44406,6 +45288,7 @@ async function $do13(client, request, options) {
|
|
|
44406
45288
|
path,
|
|
44407
45289
|
headers,
|
|
44408
45290
|
body,
|
|
45291
|
+
userAgent: client._options.userAgent,
|
|
44409
45292
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44410
45293
|
}, options);
|
|
44411
45294
|
if (!requestRes.ok) {
|
|
@@ -44425,13 +45308,13 @@ async function $do13(client, request, options) {
|
|
|
44425
45308
|
const responseFields = {
|
|
44426
45309
|
HttpMeta: { Response: response, Request: req }
|
|
44427
45310
|
};
|
|
44428
|
-
const [result] = await match(json(200,
|
|
45311
|
+
const [result] = await match(json(200, VendorScanOutVendorScanOutOk$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44429
45312
|
if (!result.ok) {
|
|
44430
45313
|
return [result, { status: "complete", request: req, response }];
|
|
44431
45314
|
}
|
|
44432
45315
|
return [result, { status: "complete", request: req, response }];
|
|
44433
45316
|
}
|
|
44434
|
-
var
|
|
45317
|
+
var init_vendorScansVendorScanOut = __esm(() => {
|
|
44435
45318
|
init_encodings();
|
|
44436
45319
|
init_matchers();
|
|
44437
45320
|
init_primitives();
|
|
@@ -44443,23 +45326,23 @@ var init_vendorsAddVendorCredentialFile = __esm(() => {
|
|
|
44443
45326
|
init_async();
|
|
44444
45327
|
});
|
|
44445
45328
|
|
|
44446
|
-
// src/mcp-server/tools/
|
|
44447
|
-
var
|
|
44448
|
-
var
|
|
44449
|
-
|
|
45329
|
+
// src/mcp-server/tools/vendorScansVendorScanOut.ts
|
|
45330
|
+
var args17, tool$vendorScansVendorScanOut;
|
|
45331
|
+
var init_vendorScansVendorScanOut2 = __esm(() => {
|
|
45332
|
+
init_vendorScansVendorScanOut();
|
|
44450
45333
|
init_operations();
|
|
44451
45334
|
init_tools();
|
|
44452
|
-
|
|
44453
|
-
request:
|
|
45335
|
+
args17 = {
|
|
45336
|
+
request: VendorScanOutRequest$inboundSchema
|
|
44454
45337
|
};
|
|
44455
|
-
tool$
|
|
44456
|
-
name: "
|
|
44457
|
-
description: `
|
|
45338
|
+
tool$vendorScansVendorScanOut = {
|
|
45339
|
+
name: "vendor-scans-vendor-scan-out",
|
|
45340
|
+
description: `Vendor scan out
|
|
44458
45341
|
|
|
44459
|
-
It
|
|
44460
|
-
args:
|
|
44461
|
-
tool: async (client,
|
|
44462
|
-
const [result, apiCall] = await
|
|
45342
|
+
It scans out vendor from facility`,
|
|
45343
|
+
args: args17,
|
|
45344
|
+
tool: async (client, args18, ctx) => {
|
|
45345
|
+
const [result, apiCall] = await vendorScansVendorScanOut(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44463
45346
|
if (!result.ok) {
|
|
44464
45347
|
return {
|
|
44465
45348
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44472,24 +45355,18 @@ It will add a new vendor credential file`,
|
|
|
44472
45355
|
};
|
|
44473
45356
|
});
|
|
44474
45357
|
|
|
44475
|
-
// src/funcs/
|
|
44476
|
-
function
|
|
44477
|
-
return new APIPromise($
|
|
45358
|
+
// src/funcs/vendorsCreateNewVendorCredentialVersion.ts
|
|
45359
|
+
function vendorsCreateNewVendorCredentialVersion(client, request, options) {
|
|
45360
|
+
return new APIPromise($do19(client, request, options));
|
|
44478
45361
|
}
|
|
44479
|
-
async function $
|
|
44480
|
-
const parsed = safeParse(request, (value) =>
|
|
45362
|
+
async function $do19(client, request, options) {
|
|
45363
|
+
const parsed = safeParse(request, (value) => CreateNewVendorCredentialVersionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44481
45364
|
if (!parsed.ok) {
|
|
44482
45365
|
return [parsed, { status: "invalid" }];
|
|
44483
45366
|
}
|
|
44484
45367
|
const payload = parsed.value;
|
|
44485
|
-
const body = encodeJSON("body", payload
|
|
44486
|
-
const
|
|
44487
|
-
vendor_id_or_me: encodeSimple("vendor_id_or_me", payload.vendor_id_or_me, {
|
|
44488
|
-
explode: false,
|
|
44489
|
-
charEncoding: "percent"
|
|
44490
|
-
})
|
|
44491
|
-
};
|
|
44492
|
-
const path = pathToFunc("/vendors/{vendor_id_or_me}/managed-by-companies")(pathParams);
|
|
45368
|
+
const body = encodeJSON("body", payload, { explode: true });
|
|
45369
|
+
const path = pathToFunc("/vendors/credentials")();
|
|
44493
45370
|
const headers = new Headers(compactMap({
|
|
44494
45371
|
"Content-Type": "application/json",
|
|
44495
45372
|
Accept: "application/json"
|
|
@@ -44497,8 +45374,9 @@ async function $do14(client, request, options) {
|
|
|
44497
45374
|
const securityInput = await extractSecurity(client._options.security);
|
|
44498
45375
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44499
45376
|
const context = {
|
|
45377
|
+
options: client._options,
|
|
44500
45378
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44501
|
-
operationID: "
|
|
45379
|
+
operationID: "createNewVendorCredentialVersion",
|
|
44502
45380
|
oAuth2Scopes: [],
|
|
44503
45381
|
resolvedSecurity: requestSecurity,
|
|
44504
45382
|
securitySource: client._options.security,
|
|
@@ -44512,6 +45390,7 @@ async function $do14(client, request, options) {
|
|
|
44512
45390
|
path,
|
|
44513
45391
|
headers,
|
|
44514
45392
|
body,
|
|
45393
|
+
userAgent: client._options.userAgent,
|
|
44515
45394
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44516
45395
|
}, options);
|
|
44517
45396
|
if (!requestRes.ok) {
|
|
@@ -44531,13 +45410,13 @@ async function $do14(client, request, options) {
|
|
|
44531
45410
|
const responseFields = {
|
|
44532
45411
|
HttpMeta: { Response: response, Request: req }
|
|
44533
45412
|
};
|
|
44534
|
-
const [result] = await match(json(200,
|
|
45413
|
+
const [result] = await match(json(200, CreateNewVendorCredentialVersionResponseBody$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44535
45414
|
if (!result.ok) {
|
|
44536
45415
|
return [result, { status: "complete", request: req, response }];
|
|
44537
45416
|
}
|
|
44538
45417
|
return [result, { status: "complete", request: req, response }];
|
|
44539
45418
|
}
|
|
44540
|
-
var
|
|
45419
|
+
var init_vendorsCreateNewVendorCredentialVersion = __esm(() => {
|
|
44541
45420
|
init_encodings();
|
|
44542
45421
|
init_matchers();
|
|
44543
45422
|
init_primitives();
|
|
@@ -44549,23 +45428,23 @@ var init_vendorsAddVendorManagedByCompany = __esm(() => {
|
|
|
44549
45428
|
init_async();
|
|
44550
45429
|
});
|
|
44551
45430
|
|
|
44552
|
-
// src/mcp-server/tools/
|
|
44553
|
-
var
|
|
44554
|
-
var
|
|
44555
|
-
|
|
45431
|
+
// src/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.ts
|
|
45432
|
+
var args18, tool$vendorsCreateNewVendorCredentialVersion;
|
|
45433
|
+
var init_vendorsCreateNewVendorCredentialVersion2 = __esm(() => {
|
|
45434
|
+
init_vendorsCreateNewVendorCredentialVersion();
|
|
44556
45435
|
init_operations();
|
|
44557
45436
|
init_tools();
|
|
44558
|
-
|
|
44559
|
-
request:
|
|
45437
|
+
args18 = {
|
|
45438
|
+
request: CreateNewVendorCredentialVersionRequestBody$inboundSchema
|
|
44560
45439
|
};
|
|
44561
|
-
tool$
|
|
44562
|
-
name: "vendors-
|
|
44563
|
-
description: `
|
|
45440
|
+
tool$vendorsCreateNewVendorCredentialVersion = {
|
|
45441
|
+
name: "vendors-create-new-vendor-credential-version",
|
|
45442
|
+
description: `Create new vendor credential version
|
|
44564
45443
|
|
|
44565
|
-
It will
|
|
44566
|
-
args:
|
|
44567
|
-
tool: async (client,
|
|
44568
|
-
const [result, apiCall] = await
|
|
45444
|
+
It will submit vendor credential`,
|
|
45445
|
+
args: args18,
|
|
45446
|
+
tool: async (client, args19, ctx) => {
|
|
45447
|
+
const [result, apiCall] = await vendorsCreateNewVendorCredentialVersion(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44569
45448
|
if (!result.ok) {
|
|
44570
45449
|
return {
|
|
44571
45450
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44578,32 +45457,31 @@ It will add a vendor managed by company`,
|
|
|
44578
45457
|
};
|
|
44579
45458
|
});
|
|
44580
45459
|
|
|
44581
|
-
// src/funcs/
|
|
44582
|
-
function
|
|
44583
|
-
return new APIPromise($
|
|
45460
|
+
// src/funcs/vendorsCreateOrUpdateBcr.ts
|
|
45461
|
+
function vendorsCreateOrUpdateBcr(client, request, options) {
|
|
45462
|
+
return new APIPromise($do20(client, request, options));
|
|
44584
45463
|
}
|
|
44585
|
-
async function $
|
|
44586
|
-
const parsed = safeParse(request, (value) =>
|
|
45464
|
+
async function $do20(client, request, options) {
|
|
45465
|
+
const parsed = safeParse(request, (value) => CreateOrUpdateBcrRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44587
45466
|
if (!parsed.ok) {
|
|
44588
45467
|
return [parsed, { status: "invalid" }];
|
|
44589
45468
|
}
|
|
44590
45469
|
const payload = parsed.value;
|
|
44591
|
-
const body =
|
|
45470
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
44592
45471
|
const pathParams = {
|
|
44593
|
-
|
|
44594
|
-
explode: false,
|
|
44595
|
-
charEncoding: "percent"
|
|
44596
|
-
})
|
|
45472
|
+
vendor_credential_id: encodeSimple("vendor_credential_id", payload.vendor_credential_id, { explode: false, charEncoding: "percent" })
|
|
44597
45473
|
};
|
|
44598
|
-
const path = pathToFunc("/
|
|
45474
|
+
const path = pathToFunc("/vendors/credentials/{vendor_credential_id}/bcr")(pathParams);
|
|
44599
45475
|
const headers = new Headers(compactMap({
|
|
45476
|
+
"Content-Type": "application/json",
|
|
44600
45477
|
Accept: "application/json"
|
|
44601
45478
|
}));
|
|
44602
45479
|
const securityInput = await extractSecurity(client._options.security);
|
|
44603
45480
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44604
45481
|
const context = {
|
|
45482
|
+
options: client._options,
|
|
44605
45483
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44606
|
-
operationID: "
|
|
45484
|
+
operationID: "createOrUpdateBcr",
|
|
44607
45485
|
oAuth2Scopes: [],
|
|
44608
45486
|
resolvedSecurity: requestSecurity,
|
|
44609
45487
|
securitySource: client._options.security,
|
|
@@ -44617,6 +45495,7 @@ async function $do15(client, request, options) {
|
|
|
44617
45495
|
path,
|
|
44618
45496
|
headers,
|
|
44619
45497
|
body,
|
|
45498
|
+
userAgent: client._options.userAgent,
|
|
44620
45499
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44621
45500
|
}, options);
|
|
44622
45501
|
if (!requestRes.ok) {
|
|
@@ -44636,13 +45515,14 @@ async function $do15(client, request, options) {
|
|
|
44636
45515
|
const responseFields = {
|
|
44637
45516
|
HttpMeta: { Response: response, Request: req }
|
|
44638
45517
|
};
|
|
44639
|
-
const [result] = await match(json(200,
|
|
45518
|
+
const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44640
45519
|
if (!result.ok) {
|
|
44641
45520
|
return [result, { status: "complete", request: req, response }];
|
|
44642
45521
|
}
|
|
44643
45522
|
return [result, { status: "complete", request: req, response }];
|
|
44644
45523
|
}
|
|
44645
|
-
var
|
|
45524
|
+
var init_vendorsCreateOrUpdateBcr = __esm(() => {
|
|
45525
|
+
init_esm();
|
|
44646
45526
|
init_encodings();
|
|
44647
45527
|
init_matchers();
|
|
44648
45528
|
init_primitives();
|
|
@@ -44654,23 +45534,23 @@ var init_vendorScansVendorScanOut = __esm(() => {
|
|
|
44654
45534
|
init_async();
|
|
44655
45535
|
});
|
|
44656
45536
|
|
|
44657
|
-
// src/mcp-server/tools/
|
|
44658
|
-
var
|
|
44659
|
-
var
|
|
44660
|
-
|
|
45537
|
+
// src/mcp-server/tools/vendorsCreateOrUpdateBcr.ts
|
|
45538
|
+
var args19, tool$vendorsCreateOrUpdateBcr;
|
|
45539
|
+
var init_vendorsCreateOrUpdateBcr2 = __esm(() => {
|
|
45540
|
+
init_vendorsCreateOrUpdateBcr();
|
|
44661
45541
|
init_operations();
|
|
44662
45542
|
init_tools();
|
|
44663
|
-
|
|
44664
|
-
request:
|
|
45543
|
+
args19 = {
|
|
45544
|
+
request: CreateOrUpdateBcrRequest$inboundSchema
|
|
44665
45545
|
};
|
|
44666
|
-
tool$
|
|
44667
|
-
name: "
|
|
44668
|
-
description: `
|
|
45546
|
+
tool$vendorsCreateOrUpdateBcr = {
|
|
45547
|
+
name: "vendors-create-or-update-bcr",
|
|
45548
|
+
description: `Create or update BackgroundCheckResults
|
|
44669
45549
|
|
|
44670
|
-
It
|
|
44671
|
-
args:
|
|
44672
|
-
tool: async (client,
|
|
44673
|
-
const [result, apiCall] = await
|
|
45550
|
+
It will create or update BackgroundCheckResults`,
|
|
45551
|
+
args: args19,
|
|
45552
|
+
tool: async (client, args20, ctx) => {
|
|
45553
|
+
const [result, apiCall] = await vendorsCreateOrUpdateBcr(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44674
45554
|
if (!result.ok) {
|
|
44675
45555
|
return {
|
|
44676
45556
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44685,9 +45565,9 @@ It scans out vendor from facility`,
|
|
|
44685
45565
|
|
|
44686
45566
|
// src/funcs/vendorsCreateVendorCompany.ts
|
|
44687
45567
|
function vendorsCreateVendorCompany(client, request, options) {
|
|
44688
|
-
return new APIPromise($
|
|
45568
|
+
return new APIPromise($do21(client, request, options));
|
|
44689
45569
|
}
|
|
44690
|
-
async function $
|
|
45570
|
+
async function $do21(client, request, options) {
|
|
44691
45571
|
const parsed = safeParse(request, (value) => CreateVendorCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44692
45572
|
if (!parsed.ok) {
|
|
44693
45573
|
return [parsed, { status: "invalid" }];
|
|
@@ -44708,6 +45588,7 @@ async function $do16(client, request, options) {
|
|
|
44708
45588
|
const securityInput = await extractSecurity(client._options.security);
|
|
44709
45589
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44710
45590
|
const context = {
|
|
45591
|
+
options: client._options,
|
|
44711
45592
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44712
45593
|
operationID: "createVendorCompany",
|
|
44713
45594
|
oAuth2Scopes: [],
|
|
@@ -44723,6 +45604,7 @@ async function $do16(client, request, options) {
|
|
|
44723
45604
|
path,
|
|
44724
45605
|
headers,
|
|
44725
45606
|
body,
|
|
45607
|
+
userAgent: client._options.userAgent,
|
|
44726
45608
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44727
45609
|
}, options);
|
|
44728
45610
|
if (!requestRes.ok) {
|
|
@@ -44761,12 +45643,12 @@ var init_vendorsCreateVendorCompany = __esm(() => {
|
|
|
44761
45643
|
});
|
|
44762
45644
|
|
|
44763
45645
|
// src/mcp-server/tools/vendorsCreateVendorCompany.ts
|
|
44764
|
-
var
|
|
45646
|
+
var args20, tool$vendorsCreateVendorCompany;
|
|
44765
45647
|
var init_vendorsCreateVendorCompany2 = __esm(() => {
|
|
44766
45648
|
init_vendorsCreateVendorCompany();
|
|
44767
45649
|
init_operations();
|
|
44768
45650
|
init_tools();
|
|
44769
|
-
|
|
45651
|
+
args20 = {
|
|
44770
45652
|
request: CreateVendorCompanyRequest$inboundSchema
|
|
44771
45653
|
};
|
|
44772
45654
|
tool$vendorsCreateVendorCompany = {
|
|
@@ -44774,9 +45656,9 @@ var init_vendorsCreateVendorCompany2 = __esm(() => {
|
|
|
44774
45656
|
description: `Create vendor company
|
|
44775
45657
|
|
|
44776
45658
|
Create vendor company`,
|
|
44777
|
-
args:
|
|
44778
|
-
tool: async (client,
|
|
44779
|
-
const [result, apiCall] = await vendorsCreateVendorCompany(client,
|
|
45659
|
+
args: args20,
|
|
45660
|
+
tool: async (client, args21, ctx) => {
|
|
45661
|
+
const [result, apiCall] = await vendorsCreateVendorCompany(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44780
45662
|
if (!result.ok) {
|
|
44781
45663
|
return {
|
|
44782
45664
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44791,9 +45673,9 @@ Create vendor company`,
|
|
|
44791
45673
|
|
|
44792
45674
|
// src/funcs/vendorsCreateVendorRegistration.ts
|
|
44793
45675
|
function vendorsCreateVendorRegistration(client, request, options) {
|
|
44794
|
-
return new APIPromise($
|
|
45676
|
+
return new APIPromise($do22(client, request, options));
|
|
44795
45677
|
}
|
|
44796
|
-
async function $
|
|
45678
|
+
async function $do22(client, request, options) {
|
|
44797
45679
|
const parsed = safeParse(request, (value) => CreateVendorRegistrationRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44798
45680
|
if (!parsed.ok) {
|
|
44799
45681
|
return [parsed, { status: "invalid" }];
|
|
@@ -44806,6 +45688,7 @@ async function $do17(client, request, options) {
|
|
|
44806
45688
|
Accept: "application/json"
|
|
44807
45689
|
}));
|
|
44808
45690
|
const context = {
|
|
45691
|
+
options: client._options,
|
|
44809
45692
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44810
45693
|
operationID: "createVendorRegistration",
|
|
44811
45694
|
oAuth2Scopes: [],
|
|
@@ -44820,6 +45703,7 @@ async function $do17(client, request, options) {
|
|
|
44820
45703
|
path,
|
|
44821
45704
|
headers,
|
|
44822
45705
|
body,
|
|
45706
|
+
userAgent: client._options.userAgent,
|
|
44823
45707
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44824
45708
|
}, options);
|
|
44825
45709
|
if (!requestRes.ok) {
|
|
@@ -44858,12 +45742,12 @@ var init_vendorsCreateVendorRegistration = __esm(() => {
|
|
|
44858
45742
|
});
|
|
44859
45743
|
|
|
44860
45744
|
// src/mcp-server/tools/vendorsCreateVendorRegistration.ts
|
|
44861
|
-
var
|
|
45745
|
+
var args21, tool$vendorsCreateVendorRegistration;
|
|
44862
45746
|
var init_vendorsCreateVendorRegistration2 = __esm(() => {
|
|
44863
45747
|
init_vendorsCreateVendorRegistration();
|
|
44864
45748
|
init_operations();
|
|
44865
45749
|
init_tools();
|
|
44866
|
-
|
|
45750
|
+
args21 = {
|
|
44867
45751
|
request: CreateVendorRegistrationRequestBody$inboundSchema
|
|
44868
45752
|
};
|
|
44869
45753
|
tool$vendorsCreateVendorRegistration = {
|
|
@@ -44871,9 +45755,9 @@ var init_vendorsCreateVendorRegistration2 = __esm(() => {
|
|
|
44871
45755
|
description: `Create vendor registration
|
|
44872
45756
|
|
|
44873
45757
|
Create an initial vendor registration. Once successful, the vendor will be able to continue to filling out the rest of their onboarding profile.`,
|
|
44874
|
-
args:
|
|
44875
|
-
tool: async (client,
|
|
44876
|
-
const [result, apiCall] = await vendorsCreateVendorRegistration(client,
|
|
45758
|
+
args: args21,
|
|
45759
|
+
tool: async (client, args22, ctx) => {
|
|
45760
|
+
const [result, apiCall] = await vendorsCreateVendorRegistration(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44877
45761
|
if (!result.ok) {
|
|
44878
45762
|
return {
|
|
44879
45763
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44888,9 +45772,9 @@ Create an initial vendor registration. Once successful, the vendor will be able
|
|
|
44888
45772
|
|
|
44889
45773
|
// src/funcs/vendorsDeclineVendorCredential.ts
|
|
44890
45774
|
function vendorsDeclineVendorCredential(client, request, options) {
|
|
44891
|
-
return new APIPromise($
|
|
45775
|
+
return new APIPromise($do23(client, request, options));
|
|
44892
45776
|
}
|
|
44893
|
-
async function $
|
|
45777
|
+
async function $do23(client, request, options) {
|
|
44894
45778
|
const parsed = safeParse(request, (value) => DeclineVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44895
45779
|
if (!parsed.ok) {
|
|
44896
45780
|
return [parsed, { status: "invalid" }];
|
|
@@ -44907,6 +45791,7 @@ async function $do18(client, request, options) {
|
|
|
44907
45791
|
const securityInput = await extractSecurity(client._options.security);
|
|
44908
45792
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44909
45793
|
const context = {
|
|
45794
|
+
options: client._options,
|
|
44910
45795
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44911
45796
|
operationID: "declineVendorCredential",
|
|
44912
45797
|
oAuth2Scopes: [],
|
|
@@ -44922,6 +45807,7 @@ async function $do18(client, request, options) {
|
|
|
44922
45807
|
path,
|
|
44923
45808
|
headers,
|
|
44924
45809
|
body,
|
|
45810
|
+
userAgent: client._options.userAgent,
|
|
44925
45811
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44926
45812
|
}, options);
|
|
44927
45813
|
if (!requestRes.ok) {
|
|
@@ -44961,12 +45847,12 @@ var init_vendorsDeclineVendorCredential = __esm(() => {
|
|
|
44961
45847
|
});
|
|
44962
45848
|
|
|
44963
45849
|
// src/mcp-server/tools/vendorsDeclineVendorCredential.ts
|
|
44964
|
-
var
|
|
45850
|
+
var args22, tool$vendorsDeclineVendorCredential;
|
|
44965
45851
|
var init_vendorsDeclineVendorCredential2 = __esm(() => {
|
|
44966
45852
|
init_vendorsDeclineVendorCredential();
|
|
44967
45853
|
init_operations();
|
|
44968
45854
|
init_tools();
|
|
44969
|
-
|
|
45855
|
+
args22 = {
|
|
44970
45856
|
request: DeclineVendorCredentialRequest$inboundSchema
|
|
44971
45857
|
};
|
|
44972
45858
|
tool$vendorsDeclineVendorCredential = {
|
|
@@ -44974,9 +45860,9 @@ var init_vendorsDeclineVendorCredential2 = __esm(() => {
|
|
|
44974
45860
|
description: `Decline vendor credential
|
|
44975
45861
|
|
|
44976
45862
|
It will decline vendor credential`,
|
|
44977
|
-
args:
|
|
44978
|
-
tool: async (client,
|
|
44979
|
-
const [result, apiCall] = await vendorsDeclineVendorCredential(client,
|
|
45863
|
+
args: args22,
|
|
45864
|
+
tool: async (client, args23, ctx) => {
|
|
45865
|
+
const [result, apiCall] = await vendorsDeclineVendorCredential(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44980
45866
|
if (!result.ok) {
|
|
44981
45867
|
return {
|
|
44982
45868
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44991,9 +45877,9 @@ It will decline vendor credential`,
|
|
|
44991
45877
|
|
|
44992
45878
|
// src/funcs/vendorsDeleteVendorCredentialFile.ts
|
|
44993
45879
|
function vendorsDeleteVendorCredentialFile(client, request, options) {
|
|
44994
|
-
return new APIPromise($
|
|
45880
|
+
return new APIPromise($do24(client, request, options));
|
|
44995
45881
|
}
|
|
44996
|
-
async function $
|
|
45882
|
+
async function $do24(client, request, options) {
|
|
44997
45883
|
const parsed = safeParse(request, (value) => DeleteVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44998
45884
|
if (!parsed.ok) {
|
|
44999
45885
|
return [parsed, { status: "invalid" }];
|
|
@@ -45014,6 +45900,7 @@ async function $do19(client, request, options) {
|
|
|
45014
45900
|
const securityInput = await extractSecurity(client._options.security);
|
|
45015
45901
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45016
45902
|
const context = {
|
|
45903
|
+
options: client._options,
|
|
45017
45904
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45018
45905
|
operationID: "deleteVendorCredentialFile",
|
|
45019
45906
|
oAuth2Scopes: [],
|
|
@@ -45029,6 +45916,7 @@ async function $do19(client, request, options) {
|
|
|
45029
45916
|
path,
|
|
45030
45917
|
headers,
|
|
45031
45918
|
body,
|
|
45919
|
+
userAgent: client._options.userAgent,
|
|
45032
45920
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45033
45921
|
}, options);
|
|
45034
45922
|
if (!requestRes.ok) {
|
|
@@ -45068,12 +45956,12 @@ var init_vendorsDeleteVendorCredentialFile = __esm(() => {
|
|
|
45068
45956
|
});
|
|
45069
45957
|
|
|
45070
45958
|
// src/mcp-server/tools/vendorsDeleteVendorCredentialFile.ts
|
|
45071
|
-
var
|
|
45959
|
+
var args23, tool$vendorsDeleteVendorCredentialFile;
|
|
45072
45960
|
var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
|
|
45073
45961
|
init_vendorsDeleteVendorCredentialFile();
|
|
45074
45962
|
init_operations();
|
|
45075
45963
|
init_tools();
|
|
45076
|
-
|
|
45964
|
+
args23 = {
|
|
45077
45965
|
request: DeleteVendorCredentialFileRequest$inboundSchema
|
|
45078
45966
|
};
|
|
45079
45967
|
tool$vendorsDeleteVendorCredentialFile = {
|
|
@@ -45081,9 +45969,9 @@ var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
|
|
|
45081
45969
|
description: `Delete vendor credential file
|
|
45082
45970
|
|
|
45083
45971
|
It will delete the vendor credential file`,
|
|
45084
|
-
args:
|
|
45085
|
-
tool: async (client,
|
|
45086
|
-
const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client,
|
|
45972
|
+
args: args23,
|
|
45973
|
+
tool: async (client, args24, ctx) => {
|
|
45974
|
+
const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45087
45975
|
if (!result.ok) {
|
|
45088
45976
|
return {
|
|
45089
45977
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45098,9 +45986,9 @@ It will delete the vendor credential file`,
|
|
|
45098
45986
|
|
|
45099
45987
|
// src/funcs/vendorsDeleteVendorManagedByCompany.ts
|
|
45100
45988
|
function vendorsDeleteVendorManagedByCompany(client, request, options) {
|
|
45101
|
-
return new APIPromise($
|
|
45989
|
+
return new APIPromise($do25(client, request, options));
|
|
45102
45990
|
}
|
|
45103
|
-
async function $
|
|
45991
|
+
async function $do25(client, request, options) {
|
|
45104
45992
|
const parsed = safeParse(request, (value) => DeleteVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45105
45993
|
if (!parsed.ok) {
|
|
45106
45994
|
return [parsed, { status: "invalid" }];
|
|
@@ -45121,6 +46009,7 @@ async function $do20(client, request, options) {
|
|
|
45121
46009
|
const securityInput = await extractSecurity(client._options.security);
|
|
45122
46010
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45123
46011
|
const context = {
|
|
46012
|
+
options: client._options,
|
|
45124
46013
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45125
46014
|
operationID: "deleteVendorManagedByCompany",
|
|
45126
46015
|
oAuth2Scopes: [],
|
|
@@ -45136,6 +46025,7 @@ async function $do20(client, request, options) {
|
|
|
45136
46025
|
path,
|
|
45137
46026
|
headers,
|
|
45138
46027
|
body,
|
|
46028
|
+
userAgent: client._options.userAgent,
|
|
45139
46029
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45140
46030
|
}, options);
|
|
45141
46031
|
if (!requestRes.ok) {
|
|
@@ -45174,12 +46064,12 @@ var init_vendorsDeleteVendorManagedByCompany = __esm(() => {
|
|
|
45174
46064
|
});
|
|
45175
46065
|
|
|
45176
46066
|
// src/mcp-server/tools/vendorsDeleteVendorManagedByCompany.ts
|
|
45177
|
-
var
|
|
46067
|
+
var args24, tool$vendorsDeleteVendorManagedByCompany;
|
|
45178
46068
|
var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
|
|
45179
46069
|
init_vendorsDeleteVendorManagedByCompany();
|
|
45180
46070
|
init_operations();
|
|
45181
46071
|
init_tools();
|
|
45182
|
-
|
|
46072
|
+
args24 = {
|
|
45183
46073
|
request: DeleteVendorManagedByCompanyRequest$inboundSchema
|
|
45184
46074
|
};
|
|
45185
46075
|
tool$vendorsDeleteVendorManagedByCompany = {
|
|
@@ -45187,9 +46077,9 @@ var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
|
|
|
45187
46077
|
description: `Delete vendor managed by company
|
|
45188
46078
|
|
|
45189
46079
|
It will delete the vendor managed by company`,
|
|
45190
|
-
args:
|
|
45191
|
-
tool: async (client,
|
|
45192
|
-
const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client,
|
|
46080
|
+
args: args24,
|
|
46081
|
+
tool: async (client, args25, ctx) => {
|
|
46082
|
+
const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45193
46083
|
if (!result.ok) {
|
|
45194
46084
|
return {
|
|
45195
46085
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45204,9 +46094,9 @@ It will delete the vendor managed by company`,
|
|
|
45204
46094
|
|
|
45205
46095
|
// src/funcs/vendorsExpediteTimeRemaining.ts
|
|
45206
46096
|
function vendorsExpediteTimeRemaining(client, request, options) {
|
|
45207
|
-
return new APIPromise($
|
|
46097
|
+
return new APIPromise($do26(client, request, options));
|
|
45208
46098
|
}
|
|
45209
|
-
async function $
|
|
46099
|
+
async function $do26(client, request, options) {
|
|
45210
46100
|
const parsed = safeParse(request, (value) => ExpediteTimeRemainingRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45211
46101
|
if (!parsed.ok) {
|
|
45212
46102
|
return [parsed, { status: "invalid" }];
|
|
@@ -45226,6 +46116,7 @@ async function $do21(client, request, options) {
|
|
|
45226
46116
|
const securityInput = await extractSecurity(client._options.security);
|
|
45227
46117
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45228
46118
|
const context = {
|
|
46119
|
+
options: client._options,
|
|
45229
46120
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45230
46121
|
operationID: "expediteTimeRemaining",
|
|
45231
46122
|
oAuth2Scopes: [],
|
|
@@ -45241,6 +46132,7 @@ async function $do21(client, request, options) {
|
|
|
45241
46132
|
path,
|
|
45242
46133
|
headers,
|
|
45243
46134
|
body,
|
|
46135
|
+
userAgent: client._options.userAgent,
|
|
45244
46136
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45245
46137
|
}, options);
|
|
45246
46138
|
if (!requestRes.ok) {
|
|
@@ -45279,12 +46171,12 @@ var init_vendorsExpediteTimeRemaining = __esm(() => {
|
|
|
45279
46171
|
});
|
|
45280
46172
|
|
|
45281
46173
|
// src/mcp-server/tools/vendorsExpediteTimeRemaining.ts
|
|
45282
|
-
var
|
|
46174
|
+
var args25, tool$vendorsExpediteTimeRemaining;
|
|
45283
46175
|
var init_vendorsExpediteTimeRemaining2 = __esm(() => {
|
|
45284
46176
|
init_vendorsExpediteTimeRemaining();
|
|
45285
46177
|
init_operations();
|
|
45286
46178
|
init_tools();
|
|
45287
|
-
|
|
46179
|
+
args25 = {
|
|
45288
46180
|
request: ExpediteTimeRemainingRequest$inboundSchema
|
|
45289
46181
|
};
|
|
45290
46182
|
tool$vendorsExpediteTimeRemaining = {
|
|
@@ -45292,9 +46184,9 @@ var init_vendorsExpediteTimeRemaining2 = __esm(() => {
|
|
|
45292
46184
|
description: `Expedite time remaining
|
|
45293
46185
|
|
|
45294
46186
|
For vendors who have a paid 24-hour expedite credentials invoice, get the remaining time (in seconds) for which submitted credentials will be expedited.`,
|
|
45295
|
-
args:
|
|
45296
|
-
tool: async (client,
|
|
45297
|
-
const [result, apiCall] = await vendorsExpediteTimeRemaining(client,
|
|
46187
|
+
args: args25,
|
|
46188
|
+
tool: async (client, args26, ctx) => {
|
|
46189
|
+
const [result, apiCall] = await vendorsExpediteTimeRemaining(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45298
46190
|
if (!result.ok) {
|
|
45299
46191
|
return {
|
|
45300
46192
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45309,9 +46201,9 @@ For vendors who have a paid 24-hour expedite credentials invoice, get the remain
|
|
|
45309
46201
|
|
|
45310
46202
|
// src/funcs/vendorsGetVendorCredentialDetails.ts
|
|
45311
46203
|
function vendorsGetVendorCredentialDetails(client, request, options) {
|
|
45312
|
-
return new APIPromise($
|
|
46204
|
+
return new APIPromise($do27(client, request, options));
|
|
45313
46205
|
}
|
|
45314
|
-
async function $
|
|
46206
|
+
async function $do27(client, request, options) {
|
|
45315
46207
|
const parsed = safeParse(request, (value) => GetVendorCredentialDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45316
46208
|
if (!parsed.ok) {
|
|
45317
46209
|
return [parsed, { status: "invalid" }];
|
|
@@ -45338,6 +46230,7 @@ async function $do22(client, request, options) {
|
|
|
45338
46230
|
const securityInput = await extractSecurity(client._options.security);
|
|
45339
46231
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45340
46232
|
const context = {
|
|
46233
|
+
options: client._options,
|
|
45341
46234
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45342
46235
|
operationID: "getVendorCredentialDetails",
|
|
45343
46236
|
oAuth2Scopes: [],
|
|
@@ -45354,6 +46247,7 @@ async function $do22(client, request, options) {
|
|
|
45354
46247
|
headers,
|
|
45355
46248
|
query,
|
|
45356
46249
|
body,
|
|
46250
|
+
userAgent: client._options.userAgent,
|
|
45357
46251
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45358
46252
|
}, options);
|
|
45359
46253
|
if (!requestRes.ok) {
|
|
@@ -45392,12 +46286,12 @@ var init_vendorsGetVendorCredentialDetails = __esm(() => {
|
|
|
45392
46286
|
});
|
|
45393
46287
|
|
|
45394
46288
|
// src/mcp-server/tools/vendorsGetVendorCredentialDetails.ts
|
|
45395
|
-
var
|
|
46289
|
+
var args26, tool$vendorsGetVendorCredentialDetails;
|
|
45396
46290
|
var init_vendorsGetVendorCredentialDetails2 = __esm(() => {
|
|
45397
46291
|
init_vendorsGetVendorCredentialDetails();
|
|
45398
46292
|
init_operations();
|
|
45399
46293
|
init_tools();
|
|
45400
|
-
|
|
46294
|
+
args26 = {
|
|
45401
46295
|
request: GetVendorCredentialDetailsRequest$inboundSchema
|
|
45402
46296
|
};
|
|
45403
46297
|
tool$vendorsGetVendorCredentialDetails = {
|
|
@@ -45422,9 +46316,9 @@ Available \`expand\` scopes are:
|
|
|
45422
46316
|
- vendor_credential.vendor_credential_data_requests
|
|
45423
46317
|
- vendor_credential.credential_variants
|
|
45424
46318
|
- vendor_credential.targets_chop`,
|
|
45425
|
-
args:
|
|
45426
|
-
tool: async (client,
|
|
45427
|
-
const [result, apiCall] = await vendorsGetVendorCredentialDetails(client,
|
|
46319
|
+
args: args26,
|
|
46320
|
+
tool: async (client, args27, ctx) => {
|
|
46321
|
+
const [result, apiCall] = await vendorsGetVendorCredentialDetails(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45428
46322
|
if (!result.ok) {
|
|
45429
46323
|
return {
|
|
45430
46324
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45439,9 +46333,9 @@ Available \`expand\` scopes are:
|
|
|
45439
46333
|
|
|
45440
46334
|
// src/funcs/vendorsGetVendorCredentialFile.ts
|
|
45441
46335
|
function vendorsGetVendorCredentialFile(client, request, options) {
|
|
45442
|
-
return new APIPromise($
|
|
46336
|
+
return new APIPromise($do28(client, request, options));
|
|
45443
46337
|
}
|
|
45444
|
-
async function $
|
|
46338
|
+
async function $do28(client, request, options) {
|
|
45445
46339
|
const parsed = safeParse(request, (value) => GetVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45446
46340
|
if (!parsed.ok) {
|
|
45447
46341
|
return [parsed, { status: "invalid" }];
|
|
@@ -45465,6 +46359,7 @@ async function $do23(client, request, options) {
|
|
|
45465
46359
|
const securityInput = await extractSecurity(client._options.security);
|
|
45466
46360
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45467
46361
|
const context = {
|
|
46362
|
+
options: client._options,
|
|
45468
46363
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45469
46364
|
operationID: "getVendorCredentialFile",
|
|
45470
46365
|
oAuth2Scopes: [],
|
|
@@ -45481,6 +46376,7 @@ async function $do23(client, request, options) {
|
|
|
45481
46376
|
headers,
|
|
45482
46377
|
query,
|
|
45483
46378
|
body,
|
|
46379
|
+
userAgent: client._options.userAgent,
|
|
45484
46380
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45485
46381
|
}, options);
|
|
45486
46382
|
if (!requestRes.ok) {
|
|
@@ -45520,12 +46416,12 @@ var init_vendorsGetVendorCredentialFile = __esm(() => {
|
|
|
45520
46416
|
});
|
|
45521
46417
|
|
|
45522
46418
|
// src/mcp-server/tools/vendorsGetVendorCredentialFile.ts
|
|
45523
|
-
var
|
|
46419
|
+
var args27, tool$vendorsGetVendorCredentialFile;
|
|
45524
46420
|
var init_vendorsGetVendorCredentialFile2 = __esm(() => {
|
|
45525
46421
|
init_vendorsGetVendorCredentialFile();
|
|
45526
46422
|
init_operations();
|
|
45527
46423
|
init_tools();
|
|
45528
|
-
|
|
46424
|
+
args27 = {
|
|
45529
46425
|
request: GetVendorCredentialFileRequest$inboundSchema
|
|
45530
46426
|
};
|
|
45531
46427
|
tool$vendorsGetVendorCredentialFile = {
|
|
@@ -45538,9 +46434,9 @@ Available \`expand\` scopes are:
|
|
|
45538
46434
|
|
|
45539
46435
|
- vendor_credential_file.vendor_credential
|
|
45540
46436
|
- vendor_credential_file.credential_document`,
|
|
45541
|
-
args:
|
|
45542
|
-
tool: async (client,
|
|
45543
|
-
const [result, apiCall] = await vendorsGetVendorCredentialFile(client,
|
|
46437
|
+
args: args27,
|
|
46438
|
+
tool: async (client, args28, ctx) => {
|
|
46439
|
+
const [result, apiCall] = await vendorsGetVendorCredentialFile(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45544
46440
|
if (!result.ok) {
|
|
45545
46441
|
return {
|
|
45546
46442
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45555,9 +46451,9 @@ Available \`expand\` scopes are:
|
|
|
45555
46451
|
|
|
45556
46452
|
// src/funcs/vendorsGetVendorInvoiceDetails.ts
|
|
45557
46453
|
function vendorsGetVendorInvoiceDetails(client, request, options) {
|
|
45558
|
-
return new APIPromise($
|
|
46454
|
+
return new APIPromise($do29(client, request, options));
|
|
45559
46455
|
}
|
|
45560
|
-
async function $
|
|
46456
|
+
async function $do29(client, request, options) {
|
|
45561
46457
|
const parsed = safeParse(request, (value) => GetVendorInvoiceDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45562
46458
|
if (!parsed.ok) {
|
|
45563
46459
|
return [parsed, { status: "invalid" }];
|
|
@@ -45580,6 +46476,7 @@ async function $do24(client, request, options) {
|
|
|
45580
46476
|
const securityInput = await extractSecurity(client._options.security);
|
|
45581
46477
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45582
46478
|
const context = {
|
|
46479
|
+
options: client._options,
|
|
45583
46480
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45584
46481
|
operationID: "getVendorInvoiceDetails",
|
|
45585
46482
|
oAuth2Scopes: [],
|
|
@@ -45596,6 +46493,7 @@ async function $do24(client, request, options) {
|
|
|
45596
46493
|
headers,
|
|
45597
46494
|
query,
|
|
45598
46495
|
body,
|
|
46496
|
+
userAgent: client._options.userAgent,
|
|
45599
46497
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45600
46498
|
}, options);
|
|
45601
46499
|
if (!requestRes.ok) {
|
|
@@ -45635,12 +46533,12 @@ var init_vendorsGetVendorInvoiceDetails = __esm(() => {
|
|
|
45635
46533
|
});
|
|
45636
46534
|
|
|
45637
46535
|
// src/mcp-server/tools/vendorsGetVendorInvoiceDetails.ts
|
|
45638
|
-
var
|
|
46536
|
+
var args28, tool$vendorsGetVendorInvoiceDetails;
|
|
45639
46537
|
var init_vendorsGetVendorInvoiceDetails2 = __esm(() => {
|
|
45640
46538
|
init_vendorsGetVendorInvoiceDetails();
|
|
45641
46539
|
init_operations();
|
|
45642
46540
|
init_tools();
|
|
45643
|
-
|
|
46541
|
+
args28 = {
|
|
45644
46542
|
request: GetVendorInvoiceDetailsRequest$inboundSchema
|
|
45645
46543
|
};
|
|
45646
46544
|
tool$vendorsGetVendorInvoiceDetails = {
|
|
@@ -45653,9 +46551,116 @@ Available \`expand\` scopes are:
|
|
|
45653
46551
|
|
|
45654
46552
|
invoice.line_items
|
|
45655
46553
|
invoice.invoice_transactions`,
|
|
45656
|
-
args:
|
|
45657
|
-
tool: async (client,
|
|
45658
|
-
const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client,
|
|
46554
|
+
args: args28,
|
|
46555
|
+
tool: async (client, args29, ctx) => {
|
|
46556
|
+
const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46557
|
+
if (!result.ok) {
|
|
46558
|
+
return {
|
|
46559
|
+
content: [{ type: "text", text: result.error.message }],
|
|
46560
|
+
isError: true
|
|
46561
|
+
};
|
|
46562
|
+
}
|
|
46563
|
+
const value = result.value;
|
|
46564
|
+
return formatResult(value, apiCall);
|
|
46565
|
+
}
|
|
46566
|
+
};
|
|
46567
|
+
});
|
|
46568
|
+
|
|
46569
|
+
// src/funcs/vendorsGetVendorLegalName.ts
|
|
46570
|
+
function vendorsGetVendorLegalName(client, request, options) {
|
|
46571
|
+
return new APIPromise($do30(client, request, options));
|
|
46572
|
+
}
|
|
46573
|
+
async function $do30(client, request, options) {
|
|
46574
|
+
const parsed = safeParse(request, (value) => GetVendorLegalNameRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46575
|
+
if (!parsed.ok) {
|
|
46576
|
+
return [parsed, { status: "invalid" }];
|
|
46577
|
+
}
|
|
46578
|
+
const payload = parsed.value;
|
|
46579
|
+
const body = null;
|
|
46580
|
+
const pathParams = {
|
|
46581
|
+
vendor_id_or_me: encodeSimple("vendor_id_or_me", payload.vendor_id_or_me, {
|
|
46582
|
+
explode: false,
|
|
46583
|
+
charEncoding: "percent"
|
|
46584
|
+
})
|
|
46585
|
+
};
|
|
46586
|
+
const path = pathToFunc("/vendors/{vendor_id_or_me}/legal-name")(pathParams);
|
|
46587
|
+
const headers = new Headers(compactMap({
|
|
46588
|
+
Accept: "application/json"
|
|
46589
|
+
}));
|
|
46590
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
46591
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46592
|
+
const context = {
|
|
46593
|
+
options: client._options,
|
|
46594
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46595
|
+
operationID: "getVendorLegalName",
|
|
46596
|
+
oAuth2Scopes: [],
|
|
46597
|
+
resolvedSecurity: requestSecurity,
|
|
46598
|
+
securitySource: client._options.security,
|
|
46599
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
46600
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
46601
|
+
};
|
|
46602
|
+
const requestRes = client._createRequest(context, {
|
|
46603
|
+
security: requestSecurity,
|
|
46604
|
+
method: "GET",
|
|
46605
|
+
baseURL: options?.serverURL,
|
|
46606
|
+
path,
|
|
46607
|
+
headers,
|
|
46608
|
+
body,
|
|
46609
|
+
userAgent: client._options.userAgent,
|
|
46610
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46611
|
+
}, options);
|
|
46612
|
+
if (!requestRes.ok) {
|
|
46613
|
+
return [requestRes, { status: "invalid" }];
|
|
46614
|
+
}
|
|
46615
|
+
const req = requestRes.value;
|
|
46616
|
+
const doResult = await client._do(req, {
|
|
46617
|
+
context,
|
|
46618
|
+
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
46619
|
+
retryConfig: context.retryConfig,
|
|
46620
|
+
retryCodes: context.retryCodes
|
|
46621
|
+
});
|
|
46622
|
+
if (!doResult.ok) {
|
|
46623
|
+
return [doResult, { status: "request-error", request: req }];
|
|
46624
|
+
}
|
|
46625
|
+
const response = doResult.value;
|
|
46626
|
+
const responseFields = {
|
|
46627
|
+
HttpMeta: { Response: response, Request: req }
|
|
46628
|
+
};
|
|
46629
|
+
const [result] = await match(json(200, GetVendorLegalNameResponseBody$inboundSchema), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
46630
|
+
if (!result.ok) {
|
|
46631
|
+
return [result, { status: "complete", request: req, response }];
|
|
46632
|
+
}
|
|
46633
|
+
return [result, { status: "complete", request: req, response }];
|
|
46634
|
+
}
|
|
46635
|
+
var init_vendorsGetVendorLegalName = __esm(() => {
|
|
46636
|
+
init_encodings();
|
|
46637
|
+
init_matchers();
|
|
46638
|
+
init_primitives();
|
|
46639
|
+
init_schemas();
|
|
46640
|
+
init_security();
|
|
46641
|
+
init_url();
|
|
46642
|
+
init_errors2();
|
|
46643
|
+
init_operations();
|
|
46644
|
+
init_async();
|
|
46645
|
+
});
|
|
46646
|
+
|
|
46647
|
+
// src/mcp-server/tools/vendorsGetVendorLegalName.ts
|
|
46648
|
+
var args29, tool$vendorsGetVendorLegalName;
|
|
46649
|
+
var init_vendorsGetVendorLegalName2 = __esm(() => {
|
|
46650
|
+
init_vendorsGetVendorLegalName();
|
|
46651
|
+
init_operations();
|
|
46652
|
+
init_tools();
|
|
46653
|
+
args29 = {
|
|
46654
|
+
request: GetVendorLegalNameRequest$inboundSchema
|
|
46655
|
+
};
|
|
46656
|
+
tool$vendorsGetVendorLegalName = {
|
|
46657
|
+
name: "vendors-get-vendor-legal-name",
|
|
46658
|
+
description: `Get Vendor legal name
|
|
46659
|
+
|
|
46660
|
+
Get vendor legal name`,
|
|
46661
|
+
args: args29,
|
|
46662
|
+
tool: async (client, args30, ctx) => {
|
|
46663
|
+
const [result, apiCall] = await vendorsGetVendorLegalName(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45659
46664
|
if (!result.ok) {
|
|
45660
46665
|
return {
|
|
45661
46666
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45670,9 +46675,9 @@ invoice.invoice_transactions`,
|
|
|
45670
46675
|
|
|
45671
46676
|
// src/funcs/vendorsGetVendorsDetails.ts
|
|
45672
46677
|
function vendorsGetVendorsDetails(client, request, options) {
|
|
45673
|
-
return new APIPromise($
|
|
46678
|
+
return new APIPromise($do31(client, request, options));
|
|
45674
46679
|
}
|
|
45675
|
-
async function $
|
|
46680
|
+
async function $do31(client, request, options) {
|
|
45676
46681
|
const parsed = safeParse(request, (value) => GetVendorsDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45677
46682
|
if (!parsed.ok) {
|
|
45678
46683
|
return [parsed, { status: "invalid" }];
|
|
@@ -45695,6 +46700,7 @@ async function $do25(client, request, options) {
|
|
|
45695
46700
|
const securityInput = await extractSecurity(client._options.security);
|
|
45696
46701
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45697
46702
|
const context = {
|
|
46703
|
+
options: client._options,
|
|
45698
46704
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45699
46705
|
operationID: "getVendorsDetails",
|
|
45700
46706
|
oAuth2Scopes: [],
|
|
@@ -45711,6 +46717,7 @@ async function $do25(client, request, options) {
|
|
|
45711
46717
|
headers,
|
|
45712
46718
|
query,
|
|
45713
46719
|
body,
|
|
46720
|
+
userAgent: client._options.userAgent,
|
|
45714
46721
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45715
46722
|
}, options);
|
|
45716
46723
|
if (!requestRes.ok) {
|
|
@@ -45750,12 +46757,12 @@ var init_vendorsGetVendorsDetails = __esm(() => {
|
|
|
45750
46757
|
});
|
|
45751
46758
|
|
|
45752
46759
|
// src/mcp-server/tools/vendorsGetVendorsDetails.ts
|
|
45753
|
-
var
|
|
46760
|
+
var args30, tool$vendorsGetVendorsDetails;
|
|
45754
46761
|
var init_vendorsGetVendorsDetails2 = __esm(() => {
|
|
45755
46762
|
init_vendorsGetVendorsDetails();
|
|
45756
46763
|
init_operations();
|
|
45757
46764
|
init_tools();
|
|
45758
|
-
|
|
46765
|
+
args30 = {
|
|
45759
46766
|
request: GetVendorsDetailsRequest$inboundSchema
|
|
45760
46767
|
};
|
|
45761
46768
|
tool$vendorsGetVendorsDetails = {
|
|
@@ -45780,9 +46787,9 @@ vendor.payment_responsibility
|
|
|
45780
46787
|
vendor.background_check_date_expires
|
|
45781
46788
|
vendor.registration_data
|
|
45782
46789
|
vendor.registration_finished`,
|
|
45783
|
-
args:
|
|
45784
|
-
tool: async (client,
|
|
45785
|
-
const [result, apiCall] = await vendorsGetVendorsDetails(client,
|
|
46790
|
+
args: args30,
|
|
46791
|
+
tool: async (client, args31, ctx) => {
|
|
46792
|
+
const [result, apiCall] = await vendorsGetVendorsDetails(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45786
46793
|
if (!result.ok) {
|
|
45787
46794
|
return {
|
|
45788
46795
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45797,9 +46804,9 @@ vendor.registration_finished`,
|
|
|
45797
46804
|
|
|
45798
46805
|
// src/funcs/vendorsListVendorAdditionalFacilityFields.ts
|
|
45799
46806
|
function vendorsListVendorAdditionalFacilityFields(client, request, options) {
|
|
45800
|
-
return new APIPromise($
|
|
46807
|
+
return new APIPromise($do32(client, request, options));
|
|
45801
46808
|
}
|
|
45802
|
-
async function $
|
|
46809
|
+
async function $do32(client, request, options) {
|
|
45803
46810
|
const parsed = safeParse(request, (value) => ListVendorAdditionalFacilityFieldsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45804
46811
|
if (!parsed.ok) {
|
|
45805
46812
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -45812,21 +46819,165 @@ async function $do26(client, request, options) {
|
|
|
45812
46819
|
charEncoding: "percent"
|
|
45813
46820
|
})
|
|
45814
46821
|
};
|
|
45815
|
-
const path = pathToFunc("/vendors/{vendor_id_or_me}/additional-facility-fields")(pathParams);
|
|
45816
|
-
const query = encodeFormQuery({
|
|
46822
|
+
const path = pathToFunc("/vendors/{vendor_id_or_me}/additional-facility-fields")(pathParams);
|
|
46823
|
+
const query = encodeFormQuery({
|
|
46824
|
+
desc: payload.desc,
|
|
46825
|
+
items_per_page: payload.items_per_page,
|
|
46826
|
+
page: payload.page,
|
|
46827
|
+
sort: payload.sort
|
|
46828
|
+
});
|
|
46829
|
+
const headers = new Headers(compactMap({
|
|
46830
|
+
Accept: "application/json"
|
|
46831
|
+
}));
|
|
46832
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
46833
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46834
|
+
const context = {
|
|
46835
|
+
options: client._options,
|
|
46836
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46837
|
+
operationID: "listVendorAdditionalFacilityFields",
|
|
46838
|
+
oAuth2Scopes: [],
|
|
46839
|
+
resolvedSecurity: requestSecurity,
|
|
46840
|
+
securitySource: client._options.security,
|
|
46841
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
46842
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
46843
|
+
};
|
|
46844
|
+
const requestRes = client._createRequest(context, {
|
|
46845
|
+
security: requestSecurity,
|
|
46846
|
+
method: "GET",
|
|
46847
|
+
baseURL: options?.serverURL,
|
|
46848
|
+
path,
|
|
46849
|
+
headers,
|
|
46850
|
+
query,
|
|
46851
|
+
body,
|
|
46852
|
+
userAgent: client._options.userAgent,
|
|
46853
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46854
|
+
}, options);
|
|
46855
|
+
if (!requestRes.ok) {
|
|
46856
|
+
return [haltIterator(requestRes), { status: "invalid" }];
|
|
46857
|
+
}
|
|
46858
|
+
const req = requestRes.value;
|
|
46859
|
+
const doResult = await client._do(req, {
|
|
46860
|
+
context,
|
|
46861
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
46862
|
+
retryConfig: context.retryConfig,
|
|
46863
|
+
retryCodes: context.retryCodes
|
|
46864
|
+
});
|
|
46865
|
+
if (!doResult.ok) {
|
|
46866
|
+
return [haltIterator(doResult), { status: "request-error", request: req }];
|
|
46867
|
+
}
|
|
46868
|
+
const response = doResult.value;
|
|
46869
|
+
const responseFields = {
|
|
46870
|
+
HttpMeta: { Response: response, Request: req }
|
|
46871
|
+
};
|
|
46872
|
+
const [result, raw] = await match(json(200, ListVendorAdditionalFacilityFieldsResponse$inboundSchema, { key: "Result" }), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
46873
|
+
if (!result.ok) {
|
|
46874
|
+
return [haltIterator(result), {
|
|
46875
|
+
status: "complete",
|
|
46876
|
+
request: req,
|
|
46877
|
+
response
|
|
46878
|
+
}];
|
|
46879
|
+
}
|
|
46880
|
+
const nextFunc = (responseData) => {
|
|
46881
|
+
const page2 = request?.page ?? 1;
|
|
46882
|
+
const nextPage = page2 + 1;
|
|
46883
|
+
if (!responseData) {
|
|
46884
|
+
return { next: () => null };
|
|
46885
|
+
}
|
|
46886
|
+
const results = dlv(responseData, "items");
|
|
46887
|
+
if (!Array.isArray(results) || !results.length) {
|
|
46888
|
+
return { next: () => null };
|
|
46889
|
+
}
|
|
46890
|
+
const limit = request?.itemsPerPage ?? 0;
|
|
46891
|
+
if (results.length < limit) {
|
|
46892
|
+
return { next: () => null };
|
|
46893
|
+
}
|
|
46894
|
+
const nextVal = () => vendorsListVendorAdditionalFacilityFields(client, {
|
|
46895
|
+
...request,
|
|
46896
|
+
page: nextPage
|
|
46897
|
+
}, options);
|
|
46898
|
+
return { next: nextVal, "~next": { page: nextPage } };
|
|
46899
|
+
};
|
|
46900
|
+
const page = { ...result, ...nextFunc(raw) };
|
|
46901
|
+
return [{ ...page, ...createPageIterator(page, (v2) => !v2.ok) }, {
|
|
46902
|
+
status: "complete",
|
|
46903
|
+
request: req,
|
|
46904
|
+
response
|
|
46905
|
+
}];
|
|
46906
|
+
}
|
|
46907
|
+
var init_vendorsListVendorAdditionalFacilityFields = __esm(() => {
|
|
46908
|
+
init_encodings();
|
|
46909
|
+
init_matchers();
|
|
46910
|
+
init_primitives();
|
|
46911
|
+
init_schemas();
|
|
46912
|
+
init_security();
|
|
46913
|
+
init_url();
|
|
46914
|
+
init_errors2();
|
|
46915
|
+
init_operations();
|
|
46916
|
+
init_async();
|
|
46917
|
+
init_operations2();
|
|
46918
|
+
});
|
|
46919
|
+
|
|
46920
|
+
// src/mcp-server/tools/vendorsListVendorAdditionalFacilityFields.ts
|
|
46921
|
+
var args31, tool$vendorsListVendorAdditionalFacilityFields;
|
|
46922
|
+
var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
|
|
46923
|
+
init_vendorsListVendorAdditionalFacilityFields();
|
|
46924
|
+
init_operations();
|
|
46925
|
+
init_tools();
|
|
46926
|
+
args31 = {
|
|
46927
|
+
request: ListVendorAdditionalFacilityFieldsRequest$inboundSchema
|
|
46928
|
+
};
|
|
46929
|
+
tool$vendorsListVendorAdditionalFacilityFields = {
|
|
46930
|
+
name: "vendors-list-vendor-additional-facility-fields",
|
|
46931
|
+
description: `List of vendor's additional facility fields
|
|
46932
|
+
|
|
46933
|
+
List of vendor's additional facility fields`,
|
|
46934
|
+
args: args31,
|
|
46935
|
+
tool: async (client, args32, ctx) => {
|
|
46936
|
+
const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46937
|
+
if (!result.ok) {
|
|
46938
|
+
return {
|
|
46939
|
+
content: [{ type: "text", text: result.error.message }],
|
|
46940
|
+
isError: true
|
|
46941
|
+
};
|
|
46942
|
+
}
|
|
46943
|
+
const value = result.value.result;
|
|
46944
|
+
return formatResult(value, apiCall);
|
|
46945
|
+
}
|
|
46946
|
+
};
|
|
46947
|
+
});
|
|
46948
|
+
|
|
46949
|
+
// src/funcs/vendorsListVendorCredentialDataRequests.ts
|
|
46950
|
+
function vendorsListVendorCredentialDataRequests(client, request, options) {
|
|
46951
|
+
return new APIPromise($do33(client, request, options));
|
|
46952
|
+
}
|
|
46953
|
+
async function $do33(client, request, options) {
|
|
46954
|
+
const parsed = safeParse(request, (value) => ListVendorCredentialDataRequestsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46955
|
+
if (!parsed.ok) {
|
|
46956
|
+
return [parsed, { status: "invalid" }];
|
|
46957
|
+
}
|
|
46958
|
+
const payload = parsed.value;
|
|
46959
|
+
const body = null;
|
|
46960
|
+
const pathParams = {
|
|
46961
|
+
vendor_credential_id: encodeSimple("vendor_credential_id", payload.vendor_credential_id, { explode: false, charEncoding: "percent" })
|
|
46962
|
+
};
|
|
46963
|
+
const path = pathToFunc("/vendors/credentials/{vendor_credential_id}/data_requests")(pathParams);
|
|
46964
|
+
const query = queryJoin(encodeFormQuery({
|
|
46965
|
+
expand: payload.expand
|
|
46966
|
+
}, { explode: false }), encodeFormQuery({
|
|
45817
46967
|
desc: payload.desc,
|
|
45818
46968
|
items_per_page: payload.items_per_page,
|
|
45819
46969
|
page: payload.page,
|
|
45820
46970
|
sort: payload.sort
|
|
45821
|
-
});
|
|
46971
|
+
}));
|
|
45822
46972
|
const headers = new Headers(compactMap({
|
|
45823
46973
|
Accept: "application/json"
|
|
45824
46974
|
}));
|
|
45825
46975
|
const securityInput = await extractSecurity(client._options.security);
|
|
45826
46976
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45827
46977
|
const context = {
|
|
46978
|
+
options: client._options,
|
|
45828
46979
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45829
|
-
operationID: "
|
|
46980
|
+
operationID: "listVendorCredentialDataRequests",
|
|
45830
46981
|
oAuth2Scopes: [],
|
|
45831
46982
|
resolvedSecurity: requestSecurity,
|
|
45832
46983
|
securitySource: client._options.security,
|
|
@@ -45841,10 +46992,11 @@ async function $do26(client, request, options) {
|
|
|
45841
46992
|
headers,
|
|
45842
46993
|
query,
|
|
45843
46994
|
body,
|
|
46995
|
+
userAgent: client._options.userAgent,
|
|
45844
46996
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45845
46997
|
}, options);
|
|
45846
46998
|
if (!requestRes.ok) {
|
|
45847
|
-
return [
|
|
46999
|
+
return [requestRes, { status: "invalid" }];
|
|
45848
47000
|
}
|
|
45849
47001
|
const req = requestRes.value;
|
|
45850
47002
|
const doResult = await client._do(req, {
|
|
@@ -45854,84 +47006,61 @@ async function $do26(client, request, options) {
|
|
|
45854
47006
|
retryCodes: context.retryCodes
|
|
45855
47007
|
});
|
|
45856
47008
|
if (!doResult.ok) {
|
|
45857
|
-
return [
|
|
47009
|
+
return [doResult, { status: "request-error", request: req }];
|
|
45858
47010
|
}
|
|
45859
47011
|
const response = doResult.value;
|
|
45860
47012
|
const responseFields = {
|
|
45861
47013
|
HttpMeta: { Response: response, Request: req }
|
|
45862
47014
|
};
|
|
45863
|
-
const [result
|
|
47015
|
+
const [result] = await match(json(200, arrayType(nullableType(VendorCredentialDataRequest$inboundSchema))), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
45864
47016
|
if (!result.ok) {
|
|
45865
|
-
return [
|
|
45866
|
-
status: "complete",
|
|
45867
|
-
request: req,
|
|
45868
|
-
response
|
|
45869
|
-
}];
|
|
47017
|
+
return [result, { status: "complete", request: req, response }];
|
|
45870
47018
|
}
|
|
45871
|
-
|
|
45872
|
-
const page2 = request?.page ?? 1;
|
|
45873
|
-
const nextPage = page2 + 1;
|
|
45874
|
-
if (!responseData) {
|
|
45875
|
-
return { next: () => null };
|
|
45876
|
-
}
|
|
45877
|
-
const results = dlv(responseData, "items");
|
|
45878
|
-
if (!Array.isArray(results) || !results.length) {
|
|
45879
|
-
return { next: () => null };
|
|
45880
|
-
}
|
|
45881
|
-
const limit = request?.itemsPerPage ?? 0;
|
|
45882
|
-
if (results.length < limit) {
|
|
45883
|
-
return { next: () => null };
|
|
45884
|
-
}
|
|
45885
|
-
const nextVal = () => vendorsListVendorAdditionalFacilityFields(client, {
|
|
45886
|
-
...request,
|
|
45887
|
-
page: nextPage
|
|
45888
|
-
}, options);
|
|
45889
|
-
return { next: nextVal, "~next": { page: nextPage } };
|
|
45890
|
-
};
|
|
45891
|
-
const page = { ...result, ...nextFunc(raw) };
|
|
45892
|
-
return [{ ...page, ...createPageIterator(page, (v2) => !v2.ok) }, {
|
|
45893
|
-
status: "complete",
|
|
45894
|
-
request: req,
|
|
45895
|
-
response
|
|
45896
|
-
}];
|
|
47019
|
+
return [result, { status: "complete", request: req, response }];
|
|
45897
47020
|
}
|
|
45898
|
-
var
|
|
47021
|
+
var init_vendorsListVendorCredentialDataRequests = __esm(() => {
|
|
47022
|
+
init_esm();
|
|
45899
47023
|
init_encodings();
|
|
45900
47024
|
init_matchers();
|
|
45901
47025
|
init_primitives();
|
|
45902
47026
|
init_schemas();
|
|
45903
47027
|
init_security();
|
|
45904
47028
|
init_url();
|
|
47029
|
+
init_components();
|
|
45905
47030
|
init_errors2();
|
|
45906
47031
|
init_operations();
|
|
45907
47032
|
init_async();
|
|
45908
|
-
init_operations2();
|
|
45909
47033
|
});
|
|
45910
47034
|
|
|
45911
|
-
// src/mcp-server/tools/
|
|
45912
|
-
var
|
|
45913
|
-
var
|
|
45914
|
-
|
|
47035
|
+
// src/mcp-server/tools/vendorsListVendorCredentialDataRequests.ts
|
|
47036
|
+
var args32, tool$vendorsListVendorCredentialDataRequests;
|
|
47037
|
+
var init_vendorsListVendorCredentialDataRequests2 = __esm(() => {
|
|
47038
|
+
init_vendorsListVendorCredentialDataRequests();
|
|
45915
47039
|
init_operations();
|
|
45916
47040
|
init_tools();
|
|
45917
|
-
|
|
45918
|
-
request:
|
|
47041
|
+
args32 = {
|
|
47042
|
+
request: ListVendorCredentialDataRequestsRequest$inboundSchema
|
|
45919
47043
|
};
|
|
45920
|
-
tool$
|
|
45921
|
-
name: "vendors-list-vendor-
|
|
45922
|
-
description: `List
|
|
47044
|
+
tool$vendorsListVendorCredentialDataRequests = {
|
|
47045
|
+
name: "vendors-list-vendor-credential-data-requests",
|
|
47046
|
+
description: `List vendor credential data requests
|
|
45923
47047
|
|
|
45924
|
-
|
|
45925
|
-
|
|
45926
|
-
|
|
45927
|
-
|
|
47048
|
+
Retrieve an vendor credential data requests.
|
|
47049
|
+
|
|
47050
|
+
Available \`expand\` scopes are:
|
|
47051
|
+
|
|
47052
|
+
- vendor_credential_data_request.vendor_credential
|
|
47053
|
+
- vendor_credential_data_request.data_request`,
|
|
47054
|
+
args: args32,
|
|
47055
|
+
tool: async (client, args33, ctx) => {
|
|
47056
|
+
const [result, apiCall] = await vendorsListVendorCredentialDataRequests(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45928
47057
|
if (!result.ok) {
|
|
45929
47058
|
return {
|
|
45930
47059
|
content: [{ type: "text", text: result.error.message }],
|
|
45931
47060
|
isError: true
|
|
45932
47061
|
};
|
|
45933
47062
|
}
|
|
45934
|
-
const value = result.value
|
|
47063
|
+
const value = result.value;
|
|
45935
47064
|
return formatResult(value, apiCall);
|
|
45936
47065
|
}
|
|
45937
47066
|
};
|
|
@@ -45939,9 +47068,9 @@ List of vendor's additional facility fields`,
|
|
|
45939
47068
|
|
|
45940
47069
|
// src/funcs/vendorsListVendorCredentialFiles.ts
|
|
45941
47070
|
function vendorsListVendorCredentialFiles(client, request, options) {
|
|
45942
|
-
return new APIPromise($
|
|
47071
|
+
return new APIPromise($do34(client, request, options));
|
|
45943
47072
|
}
|
|
45944
|
-
async function $
|
|
47073
|
+
async function $do34(client, request, options) {
|
|
45945
47074
|
const parsed = safeParse(request, (value) => ListVendorCredentialFilesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45946
47075
|
if (!parsed.ok) {
|
|
45947
47076
|
return [parsed, { status: "invalid" }];
|
|
@@ -45966,6 +47095,7 @@ async function $do27(client, request, options) {
|
|
|
45966
47095
|
const securityInput = await extractSecurity(client._options.security);
|
|
45967
47096
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45968
47097
|
const context = {
|
|
47098
|
+
options: client._options,
|
|
45969
47099
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45970
47100
|
operationID: "listVendorCredentialFiles",
|
|
45971
47101
|
oAuth2Scopes: [],
|
|
@@ -45982,6 +47112,7 @@ async function $do27(client, request, options) {
|
|
|
45982
47112
|
headers,
|
|
45983
47113
|
query,
|
|
45984
47114
|
body,
|
|
47115
|
+
userAgent: client._options.userAgent,
|
|
45985
47116
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45986
47117
|
}, options);
|
|
45987
47118
|
if (!requestRes.ok) {
|
|
@@ -46022,12 +47153,12 @@ var init_vendorsListVendorCredentialFiles = __esm(() => {
|
|
|
46022
47153
|
});
|
|
46023
47154
|
|
|
46024
47155
|
// src/mcp-server/tools/vendorsListVendorCredentialFiles.ts
|
|
46025
|
-
var
|
|
47156
|
+
var args33, tool$vendorsListVendorCredentialFiles;
|
|
46026
47157
|
var init_vendorsListVendorCredentialFiles2 = __esm(() => {
|
|
46027
47158
|
init_vendorsListVendorCredentialFiles();
|
|
46028
47159
|
init_operations();
|
|
46029
47160
|
init_tools();
|
|
46030
|
-
|
|
47161
|
+
args33 = {
|
|
46031
47162
|
request: ListVendorCredentialFilesRequest$inboundSchema
|
|
46032
47163
|
};
|
|
46033
47164
|
tool$vendorsListVendorCredentialFiles = {
|
|
@@ -46040,9 +47171,9 @@ Available \`expand\` scopes are:
|
|
|
46040
47171
|
|
|
46041
47172
|
- vendor_credential_file.vendor_credential
|
|
46042
47173
|
- vendor_credential_file.credential_document`,
|
|
46043
|
-
args:
|
|
46044
|
-
tool: async (client,
|
|
46045
|
-
const [result, apiCall] = await vendorsListVendorCredentialFiles(client,
|
|
47174
|
+
args: args33,
|
|
47175
|
+
tool: async (client, args34, ctx) => {
|
|
47176
|
+
const [result, apiCall] = await vendorsListVendorCredentialFiles(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46046
47177
|
if (!result.ok) {
|
|
46047
47178
|
return {
|
|
46048
47179
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46057,9 +47188,9 @@ Available \`expand\` scopes are:
|
|
|
46057
47188
|
|
|
46058
47189
|
// src/funcs/vendorsListVendorCredentialHistory.ts
|
|
46059
47190
|
function vendorsListVendorCredentialHistory(client, request, options) {
|
|
46060
|
-
return new APIPromise($
|
|
47191
|
+
return new APIPromise($do35(client, request, options));
|
|
46061
47192
|
}
|
|
46062
|
-
async function $
|
|
47193
|
+
async function $do35(client, request, options) {
|
|
46063
47194
|
const parsed = safeParse(request, (value) => ListVendorCredentialHistoryRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46064
47195
|
if (!parsed.ok) {
|
|
46065
47196
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -46086,6 +47217,7 @@ async function $do28(client, request, options) {
|
|
|
46086
47217
|
const securityInput = await extractSecurity(client._options.security);
|
|
46087
47218
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46088
47219
|
const context = {
|
|
47220
|
+
options: client._options,
|
|
46089
47221
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46090
47222
|
operationID: "listVendorCredentialHistory",
|
|
46091
47223
|
oAuth2Scopes: [],
|
|
@@ -46102,6 +47234,7 @@ async function $do28(client, request, options) {
|
|
|
46102
47234
|
headers,
|
|
46103
47235
|
query,
|
|
46104
47236
|
body,
|
|
47237
|
+
userAgent: client._options.userAgent,
|
|
46105
47238
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46106
47239
|
}, options);
|
|
46107
47240
|
if (!requestRes.ok) {
|
|
@@ -46172,12 +47305,12 @@ var init_vendorsListVendorCredentialHistory = __esm(() => {
|
|
|
46172
47305
|
});
|
|
46173
47306
|
|
|
46174
47307
|
// src/mcp-server/tools/vendorsListVendorCredentialHistory.ts
|
|
46175
|
-
var
|
|
47308
|
+
var args34, tool$vendorsListVendorCredentialHistory;
|
|
46176
47309
|
var init_vendorsListVendorCredentialHistory2 = __esm(() => {
|
|
46177
47310
|
init_vendorsListVendorCredentialHistory();
|
|
46178
47311
|
init_operations();
|
|
46179
47312
|
init_tools();
|
|
46180
|
-
|
|
47313
|
+
args34 = {
|
|
46181
47314
|
request: ListVendorCredentialHistoryRequest$inboundSchema
|
|
46182
47315
|
};
|
|
46183
47316
|
tool$vendorsListVendorCredentialHistory = {
|
|
@@ -46185,9 +47318,9 @@ var init_vendorsListVendorCredentialHistory2 = __esm(() => {
|
|
|
46185
47318
|
description: `List Vendor Credential History
|
|
46186
47319
|
|
|
46187
47320
|
Lists vendor credentials history`,
|
|
46188
|
-
args:
|
|
46189
|
-
tool: async (client,
|
|
46190
|
-
const [result, apiCall] = await vendorsListVendorCredentialHistory(client,
|
|
47321
|
+
args: args34,
|
|
47322
|
+
tool: async (client, args35, ctx) => {
|
|
47323
|
+
const [result, apiCall] = await vendorsListVendorCredentialHistory(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46191
47324
|
if (!result.ok) {
|
|
46192
47325
|
return {
|
|
46193
47326
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46202,9 +47335,9 @@ Lists vendor credentials history`,
|
|
|
46202
47335
|
|
|
46203
47336
|
// src/funcs/vendorsListVendorCredentials.ts
|
|
46204
47337
|
function vendorsListVendorCredentials(client, request, options) {
|
|
46205
|
-
return new APIPromise($
|
|
47338
|
+
return new APIPromise($do36(client, request, options));
|
|
46206
47339
|
}
|
|
46207
|
-
async function $
|
|
47340
|
+
async function $do36(client, request, options) {
|
|
46208
47341
|
const parsed = safeParse(request, (value) => ListVendorCredentialsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46209
47342
|
if (!parsed.ok) {
|
|
46210
47343
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -46236,6 +47369,7 @@ async function $do29(client, request, options) {
|
|
|
46236
47369
|
const securityInput = await extractSecurity(client._options.security);
|
|
46237
47370
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46238
47371
|
const context = {
|
|
47372
|
+
options: client._options,
|
|
46239
47373
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46240
47374
|
operationID: "listVendorCredentials",
|
|
46241
47375
|
oAuth2Scopes: [],
|
|
@@ -46252,6 +47386,7 @@ async function $do29(client, request, options) {
|
|
|
46252
47386
|
headers,
|
|
46253
47387
|
query,
|
|
46254
47388
|
body,
|
|
47389
|
+
userAgent: client._options.userAgent,
|
|
46255
47390
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46256
47391
|
}, options);
|
|
46257
47392
|
if (!requestRes.ok) {
|
|
@@ -46322,12 +47457,12 @@ var init_vendorsListVendorCredentials = __esm(() => {
|
|
|
46322
47457
|
});
|
|
46323
47458
|
|
|
46324
47459
|
// src/mcp-server/tools/vendorsListVendorCredentials.ts
|
|
46325
|
-
var
|
|
47460
|
+
var args35, tool$vendorsListVendorCredentials;
|
|
46326
47461
|
var init_vendorsListVendorCredentials2 = __esm(() => {
|
|
46327
47462
|
init_vendorsListVendorCredentials();
|
|
46328
47463
|
init_operations();
|
|
46329
47464
|
init_tools();
|
|
46330
|
-
|
|
47465
|
+
args35 = {
|
|
46331
47466
|
request: ListVendorCredentialsRequest$inboundSchema
|
|
46332
47467
|
};
|
|
46333
47468
|
tool$vendorsListVendorCredentials = {
|
|
@@ -46335,9 +47470,9 @@ var init_vendorsListVendorCredentials2 = __esm(() => {
|
|
|
46335
47470
|
description: `List Vendor Credentials
|
|
46336
47471
|
|
|
46337
47472
|
Lists vendor credentials, required credentials, and company credentials. Utilized in Vendor Dashboard.`,
|
|
46338
|
-
args:
|
|
46339
|
-
tool: async (client,
|
|
46340
|
-
const [result, apiCall] = await vendorsListVendorCredentials(client,
|
|
47473
|
+
args: args35,
|
|
47474
|
+
tool: async (client, args36, ctx) => {
|
|
47475
|
+
const [result, apiCall] = await vendorsListVendorCredentials(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46341
47476
|
if (!result.ok) {
|
|
46342
47477
|
return {
|
|
46343
47478
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46352,9 +47487,9 @@ Lists vendor credentials, required credentials, and company credentials. Utilize
|
|
|
46352
47487
|
|
|
46353
47488
|
// src/funcs/vendorsListVendorCredits.ts
|
|
46354
47489
|
function vendorsListVendorCredits(client, request, options) {
|
|
46355
|
-
return new APIPromise($
|
|
47490
|
+
return new APIPromise($do37(client, request, options));
|
|
46356
47491
|
}
|
|
46357
|
-
async function $
|
|
47492
|
+
async function $do37(client, request, options) {
|
|
46358
47493
|
const parsed = safeParse(request, (value) => ListVendorCreditsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46359
47494
|
if (!parsed.ok) {
|
|
46360
47495
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -46380,6 +47515,7 @@ async function $do30(client, request, options) {
|
|
|
46380
47515
|
const securityInput = await extractSecurity(client._options.security);
|
|
46381
47516
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46382
47517
|
const context = {
|
|
47518
|
+
options: client._options,
|
|
46383
47519
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46384
47520
|
operationID: "listVendorCredits",
|
|
46385
47521
|
oAuth2Scopes: [],
|
|
@@ -46396,6 +47532,7 @@ async function $do30(client, request, options) {
|
|
|
46396
47532
|
headers,
|
|
46397
47533
|
query,
|
|
46398
47534
|
body,
|
|
47535
|
+
userAgent: client._options.userAgent,
|
|
46399
47536
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46400
47537
|
}, options);
|
|
46401
47538
|
if (!requestRes.ok) {
|
|
@@ -46466,12 +47603,12 @@ var init_vendorsListVendorCredits = __esm(() => {
|
|
|
46466
47603
|
});
|
|
46467
47604
|
|
|
46468
47605
|
// src/mcp-server/tools/vendorsListVendorCredits.ts
|
|
46469
|
-
var
|
|
47606
|
+
var args36, tool$vendorsListVendorCredits;
|
|
46470
47607
|
var init_vendorsListVendorCredits2 = __esm(() => {
|
|
46471
47608
|
init_vendorsListVendorCredits();
|
|
46472
47609
|
init_operations();
|
|
46473
47610
|
init_tools();
|
|
46474
|
-
|
|
47611
|
+
args36 = {
|
|
46475
47612
|
request: ListVendorCreditsRequest$inboundSchema
|
|
46476
47613
|
};
|
|
46477
47614
|
tool$vendorsListVendorCredits = {
|
|
@@ -46479,9 +47616,9 @@ var init_vendorsListVendorCredits2 = __esm(() => {
|
|
|
46479
47616
|
description: `List vendor credits
|
|
46480
47617
|
|
|
46481
47618
|
List the credits for the vendor`,
|
|
46482
|
-
args:
|
|
46483
|
-
tool: async (client,
|
|
46484
|
-
const [result, apiCall] = await vendorsListVendorCredits(client,
|
|
47619
|
+
args: args36,
|
|
47620
|
+
tool: async (client, args37, ctx) => {
|
|
47621
|
+
const [result, apiCall] = await vendorsListVendorCredits(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46485
47622
|
if (!result.ok) {
|
|
46486
47623
|
return {
|
|
46487
47624
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46496,9 +47633,9 @@ List the credits for the vendor`,
|
|
|
46496
47633
|
|
|
46497
47634
|
// src/funcs/vendorsListVendorFacilityStatuses.ts
|
|
46498
47635
|
function vendorsListVendorFacilityStatuses(client, request, options) {
|
|
46499
|
-
return new APIPromise($
|
|
47636
|
+
return new APIPromise($do38(client, request, options));
|
|
46500
47637
|
}
|
|
46501
|
-
async function $
|
|
47638
|
+
async function $do38(client, request, options) {
|
|
46502
47639
|
const parsed = safeParse(request, (value) => ListVendorFacilityStatusesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46503
47640
|
if (!parsed.ok) {
|
|
46504
47641
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -46520,6 +47657,7 @@ async function $do31(client, request, options) {
|
|
|
46520
47657
|
const securityInput = await extractSecurity(client._options.security);
|
|
46521
47658
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46522
47659
|
const context = {
|
|
47660
|
+
options: client._options,
|
|
46523
47661
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46524
47662
|
operationID: "listVendorFacilityStatuses",
|
|
46525
47663
|
oAuth2Scopes: [],
|
|
@@ -46536,6 +47674,7 @@ async function $do31(client, request, options) {
|
|
|
46536
47674
|
headers,
|
|
46537
47675
|
query,
|
|
46538
47676
|
body,
|
|
47677
|
+
userAgent: client._options.userAgent,
|
|
46539
47678
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46540
47679
|
}, options);
|
|
46541
47680
|
if (!requestRes.ok) {
|
|
@@ -46606,12 +47745,12 @@ var init_vendorsListVendorFacilityStatuses = __esm(() => {
|
|
|
46606
47745
|
});
|
|
46607
47746
|
|
|
46608
47747
|
// src/mcp-server/tools/vendorsListVendorFacilityStatuses.ts
|
|
46609
|
-
var
|
|
47748
|
+
var args37, tool$vendorsListVendorFacilityStatuses;
|
|
46610
47749
|
var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
|
|
46611
47750
|
init_vendorsListVendorFacilityStatuses();
|
|
46612
47751
|
init_operations();
|
|
46613
47752
|
init_tools();
|
|
46614
|
-
|
|
47753
|
+
args37 = {
|
|
46615
47754
|
request: ListVendorFacilityStatusesRequest$inboundSchema
|
|
46616
47755
|
};
|
|
46617
47756
|
tool$vendorsListVendorFacilityStatuses = {
|
|
@@ -46619,9 +47758,9 @@ var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
|
|
|
46619
47758
|
description: `List vendor facility statuses
|
|
46620
47759
|
|
|
46621
47760
|
List the facilities for the vendor`,
|
|
46622
|
-
args:
|
|
46623
|
-
tool: async (client,
|
|
46624
|
-
const [result, apiCall] = await vendorsListVendorFacilityStatuses(client,
|
|
47761
|
+
args: args37,
|
|
47762
|
+
tool: async (client, args38, ctx) => {
|
|
47763
|
+
const [result, apiCall] = await vendorsListVendorFacilityStatuses(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46625
47764
|
if (!result.ok) {
|
|
46626
47765
|
return {
|
|
46627
47766
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46636,9 +47775,9 @@ List the facilities for the vendor`,
|
|
|
46636
47775
|
|
|
46637
47776
|
// src/funcs/vendorsListVendorInvoices.ts
|
|
46638
47777
|
function vendorsListVendorInvoices(client, request, options) {
|
|
46639
|
-
return new APIPromise($
|
|
47778
|
+
return new APIPromise($do39(client, request, options));
|
|
46640
47779
|
}
|
|
46641
|
-
async function $
|
|
47780
|
+
async function $do39(client, request, options) {
|
|
46642
47781
|
const parsed = safeParse(request, (value) => ListVendorInvoicesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46643
47782
|
if (!parsed.ok) {
|
|
46644
47783
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -46668,6 +47807,7 @@ async function $do32(client, request, options) {
|
|
|
46668
47807
|
const securityInput = await extractSecurity(client._options.security);
|
|
46669
47808
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46670
47809
|
const context = {
|
|
47810
|
+
options: client._options,
|
|
46671
47811
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46672
47812
|
operationID: "listVendorInvoices",
|
|
46673
47813
|
oAuth2Scopes: [],
|
|
@@ -46684,6 +47824,7 @@ async function $do32(client, request, options) {
|
|
|
46684
47824
|
headers,
|
|
46685
47825
|
query,
|
|
46686
47826
|
body,
|
|
47827
|
+
userAgent: client._options.userAgent,
|
|
46687
47828
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46688
47829
|
}, options);
|
|
46689
47830
|
if (!requestRes.ok) {
|
|
@@ -46754,12 +47895,12 @@ var init_vendorsListVendorInvoices = __esm(() => {
|
|
|
46754
47895
|
});
|
|
46755
47896
|
|
|
46756
47897
|
// src/mcp-server/tools/vendorsListVendorInvoices.ts
|
|
46757
|
-
var
|
|
47898
|
+
var args38, tool$vendorsListVendorInvoices;
|
|
46758
47899
|
var init_vendorsListVendorInvoices2 = __esm(() => {
|
|
46759
47900
|
init_vendorsListVendorInvoices();
|
|
46760
47901
|
init_operations();
|
|
46761
47902
|
init_tools();
|
|
46762
|
-
|
|
47903
|
+
args38 = {
|
|
46763
47904
|
request: ListVendorInvoicesRequest$inboundSchema
|
|
46764
47905
|
};
|
|
46765
47906
|
tool$vendorsListVendorInvoices = {
|
|
@@ -46771,9 +47912,9 @@ List invoices for Vendors
|
|
|
46771
47912
|
Available \`expand\` scopes are:
|
|
46772
47913
|
|
|
46773
47914
|
invoice.line_items`,
|
|
46774
|
-
args:
|
|
46775
|
-
tool: async (client,
|
|
46776
|
-
const [result, apiCall] = await vendorsListVendorInvoices(client,
|
|
47915
|
+
args: args38,
|
|
47916
|
+
tool: async (client, args39, ctx) => {
|
|
47917
|
+
const [result, apiCall] = await vendorsListVendorInvoices(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46777
47918
|
if (!result.ok) {
|
|
46778
47919
|
return {
|
|
46779
47920
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46788,9 +47929,9 @@ invoice.line_items`,
|
|
|
46788
47929
|
|
|
46789
47930
|
// src/funcs/vendorsListVendorJobTitles.ts
|
|
46790
47931
|
function vendorsListVendorJobTitles(client, request, options) {
|
|
46791
|
-
return new APIPromise($
|
|
47932
|
+
return new APIPromise($do40(client, request, options));
|
|
46792
47933
|
}
|
|
46793
|
-
async function $
|
|
47934
|
+
async function $do40(client, request, options) {
|
|
46794
47935
|
const parsed = safeParse(request, (value) => ListVendorJobTitlesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46795
47936
|
if (!parsed.ok) {
|
|
46796
47937
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -46811,6 +47952,7 @@ async function $do33(client, request, options) {
|
|
|
46811
47952
|
const securityInput = await extractSecurity(client._options.security);
|
|
46812
47953
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46813
47954
|
const context = {
|
|
47955
|
+
options: client._options,
|
|
46814
47956
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46815
47957
|
operationID: "listVendorJobTitles",
|
|
46816
47958
|
oAuth2Scopes: [],
|
|
@@ -46827,6 +47969,7 @@ async function $do33(client, request, options) {
|
|
|
46827
47969
|
headers,
|
|
46828
47970
|
query,
|
|
46829
47971
|
body,
|
|
47972
|
+
userAgent: client._options.userAgent,
|
|
46830
47973
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46831
47974
|
}, options);
|
|
46832
47975
|
if (!requestRes.ok) {
|
|
@@ -46897,12 +48040,12 @@ var init_vendorsListVendorJobTitles = __esm(() => {
|
|
|
46897
48040
|
});
|
|
46898
48041
|
|
|
46899
48042
|
// src/mcp-server/tools/vendorsListVendorJobTitles.ts
|
|
46900
|
-
var
|
|
48043
|
+
var args39, tool$vendorsListVendorJobTitles;
|
|
46901
48044
|
var init_vendorsListVendorJobTitles2 = __esm(() => {
|
|
46902
48045
|
init_vendorsListVendorJobTitles();
|
|
46903
48046
|
init_operations();
|
|
46904
48047
|
init_tools();
|
|
46905
|
-
|
|
48048
|
+
args39 = {
|
|
46906
48049
|
request: ListVendorJobTitlesRequest$inboundSchema
|
|
46907
48050
|
};
|
|
46908
48051
|
tool$vendorsListVendorJobTitles = {
|
|
@@ -46910,9 +48053,9 @@ var init_vendorsListVendorJobTitles2 = __esm(() => {
|
|
|
46910
48053
|
description: `List vendor job titles
|
|
46911
48054
|
|
|
46912
48055
|
List valid job titles for Vendors. This can be used during sign up or in a filter.`,
|
|
46913
|
-
args:
|
|
46914
|
-
tool: async (client,
|
|
46915
|
-
const [result, apiCall] = await vendorsListVendorJobTitles(client,
|
|
48056
|
+
args: args39,
|
|
48057
|
+
tool: async (client, args40, ctx) => {
|
|
48058
|
+
const [result, apiCall] = await vendorsListVendorJobTitles(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46916
48059
|
if (!result.ok) {
|
|
46917
48060
|
return {
|
|
46918
48061
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46927,9 +48070,9 @@ List valid job titles for Vendors. This can be used during sign up or in a filte
|
|
|
46927
48070
|
|
|
46928
48071
|
// src/funcs/vendorsListVendorManagedByCompanies.ts
|
|
46929
48072
|
function vendorsListVendorManagedByCompanies(client, request, options) {
|
|
46930
|
-
return new APIPromise($
|
|
48073
|
+
return new APIPromise($do41(client, request, options));
|
|
46931
48074
|
}
|
|
46932
|
-
async function $
|
|
48075
|
+
async function $do41(client, request, options) {
|
|
46933
48076
|
const parsed = safeParse(request, (value) => ListVendorManagedByCompaniesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46934
48077
|
if (!parsed.ok) {
|
|
46935
48078
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -46955,6 +48098,7 @@ async function $do34(client, request, options) {
|
|
|
46955
48098
|
const securityInput = await extractSecurity(client._options.security);
|
|
46956
48099
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46957
48100
|
const context = {
|
|
48101
|
+
options: client._options,
|
|
46958
48102
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46959
48103
|
operationID: "listVendorManagedByCompanies",
|
|
46960
48104
|
oAuth2Scopes: [],
|
|
@@ -46971,6 +48115,7 @@ async function $do34(client, request, options) {
|
|
|
46971
48115
|
headers,
|
|
46972
48116
|
query,
|
|
46973
48117
|
body,
|
|
48118
|
+
userAgent: client._options.userAgent,
|
|
46974
48119
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46975
48120
|
}, options);
|
|
46976
48121
|
if (!requestRes.ok) {
|
|
@@ -47041,12 +48186,12 @@ var init_vendorsListVendorManagedByCompanies = __esm(() => {
|
|
|
47041
48186
|
});
|
|
47042
48187
|
|
|
47043
48188
|
// src/mcp-server/tools/vendorsListVendorManagedByCompanies.ts
|
|
47044
|
-
var
|
|
48189
|
+
var args40, tool$vendorsListVendorManagedByCompanies;
|
|
47045
48190
|
var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
|
|
47046
48191
|
init_vendorsListVendorManagedByCompanies();
|
|
47047
48192
|
init_operations();
|
|
47048
48193
|
init_tools();
|
|
47049
|
-
|
|
48194
|
+
args40 = {
|
|
47050
48195
|
request: ListVendorManagedByCompaniesRequest$inboundSchema
|
|
47051
48196
|
};
|
|
47052
48197
|
tool$vendorsListVendorManagedByCompanies = {
|
|
@@ -47054,9 +48199,9 @@ var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
|
|
|
47054
48199
|
description: `List of companies managing the vendor
|
|
47055
48200
|
|
|
47056
48201
|
List of companies managing the vendor`,
|
|
47057
|
-
args:
|
|
47058
|
-
tool: async (client,
|
|
47059
|
-
const [result, apiCall] = await vendorsListVendorManagedByCompanies(client,
|
|
48202
|
+
args: args40,
|
|
48203
|
+
tool: async (client, args41, ctx) => {
|
|
48204
|
+
const [result, apiCall] = await vendorsListVendorManagedByCompanies(client, args41.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47060
48205
|
if (!result.ok) {
|
|
47061
48206
|
return {
|
|
47062
48207
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47071,9 +48216,9 @@ List of companies managing the vendor`,
|
|
|
47071
48216
|
|
|
47072
48217
|
// src/funcs/vendorsListVendorScrubDetails.ts
|
|
47073
48218
|
function vendorsListVendorScrubDetails(client, request, options) {
|
|
47074
|
-
return new APIPromise($
|
|
48219
|
+
return new APIPromise($do42(client, request, options));
|
|
47075
48220
|
}
|
|
47076
|
-
async function $
|
|
48221
|
+
async function $do42(client, request, options) {
|
|
47077
48222
|
const parsed = safeParse(request, (value) => ListVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47078
48223
|
if (!parsed.ok) {
|
|
47079
48224
|
return [parsed, { status: "invalid" }];
|
|
@@ -47093,6 +48238,7 @@ async function $do35(client, request, options) {
|
|
|
47093
48238
|
const securityInput = await extractSecurity(client._options.security);
|
|
47094
48239
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47095
48240
|
const context = {
|
|
48241
|
+
options: client._options,
|
|
47096
48242
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47097
48243
|
operationID: "listVendorScrubDetails",
|
|
47098
48244
|
oAuth2Scopes: [],
|
|
@@ -47108,6 +48254,7 @@ async function $do35(client, request, options) {
|
|
|
47108
48254
|
path,
|
|
47109
48255
|
headers,
|
|
47110
48256
|
body,
|
|
48257
|
+
userAgent: client._options.userAgent,
|
|
47111
48258
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47112
48259
|
}, options);
|
|
47113
48260
|
if (!requestRes.ok) {
|
|
@@ -47147,12 +48294,12 @@ var init_vendorsListVendorScrubDetails = __esm(() => {
|
|
|
47147
48294
|
});
|
|
47148
48295
|
|
|
47149
48296
|
// src/mcp-server/tools/vendorsListVendorScrubDetails.ts
|
|
47150
|
-
var
|
|
48297
|
+
var args41, tool$vendorsListVendorScrubDetails;
|
|
47151
48298
|
var init_vendorsListVendorScrubDetails2 = __esm(() => {
|
|
47152
48299
|
init_vendorsListVendorScrubDetails();
|
|
47153
48300
|
init_operations();
|
|
47154
48301
|
init_tools();
|
|
47155
|
-
|
|
48302
|
+
args41 = {
|
|
47156
48303
|
request: ListVendorScrubDetailsRequest$inboundSchema
|
|
47157
48304
|
};
|
|
47158
48305
|
tool$vendorsListVendorScrubDetails = {
|
|
@@ -47160,9 +48307,9 @@ var init_vendorsListVendorScrubDetails2 = __esm(() => {
|
|
|
47160
48307
|
description: `List vendor scrub details
|
|
47161
48308
|
|
|
47162
48309
|
List vendor scrub details`,
|
|
47163
|
-
args:
|
|
47164
|
-
tool: async (client,
|
|
47165
|
-
const [result, apiCall] = await vendorsListVendorScrubDetails(client,
|
|
48310
|
+
args: args41,
|
|
48311
|
+
tool: async (client, args42, ctx) => {
|
|
48312
|
+
const [result, apiCall] = await vendorsListVendorScrubDetails(client, args42.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47166
48313
|
if (!result.ok) {
|
|
47167
48314
|
return {
|
|
47168
48315
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47177,9 +48324,9 @@ List vendor scrub details`,
|
|
|
47177
48324
|
|
|
47178
48325
|
// src/funcs/vendorsListVendorScrubPackages.ts
|
|
47179
48326
|
function vendorsListVendorScrubPackages(client, request, options) {
|
|
47180
|
-
return new APIPromise($
|
|
48327
|
+
return new APIPromise($do43(client, request, options));
|
|
47181
48328
|
}
|
|
47182
|
-
async function $
|
|
48329
|
+
async function $do43(client, request, options) {
|
|
47183
48330
|
const parsed = safeParse(request, (value) => ListVendorScrubPackagesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47184
48331
|
if (!parsed.ok) {
|
|
47185
48332
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47205,6 +48352,7 @@ async function $do36(client, request, options) {
|
|
|
47205
48352
|
const securityInput = await extractSecurity(client._options.security);
|
|
47206
48353
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47207
48354
|
const context = {
|
|
48355
|
+
options: client._options,
|
|
47208
48356
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47209
48357
|
operationID: "listVendorScrubPackages",
|
|
47210
48358
|
oAuth2Scopes: [],
|
|
@@ -47221,6 +48369,7 @@ async function $do36(client, request, options) {
|
|
|
47221
48369
|
headers,
|
|
47222
48370
|
query,
|
|
47223
48371
|
body,
|
|
48372
|
+
userAgent: client._options.userAgent,
|
|
47224
48373
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47225
48374
|
}, options);
|
|
47226
48375
|
if (!requestRes.ok) {
|
|
@@ -47291,12 +48440,12 @@ var init_vendorsListVendorScrubPackages = __esm(() => {
|
|
|
47291
48440
|
});
|
|
47292
48441
|
|
|
47293
48442
|
// src/mcp-server/tools/vendorsListVendorScrubPackages.ts
|
|
47294
|
-
var
|
|
48443
|
+
var args42, tool$vendorsListVendorScrubPackages;
|
|
47295
48444
|
var init_vendorsListVendorScrubPackages2 = __esm(() => {
|
|
47296
48445
|
init_vendorsListVendorScrubPackages();
|
|
47297
48446
|
init_operations();
|
|
47298
48447
|
init_tools();
|
|
47299
|
-
|
|
48448
|
+
args42 = {
|
|
47300
48449
|
request: ListVendorScrubPackagesRequest$inboundSchema
|
|
47301
48450
|
};
|
|
47302
48451
|
tool$vendorsListVendorScrubPackages = {
|
|
@@ -47304,9 +48453,9 @@ var init_vendorsListVendorScrubPackages2 = __esm(() => {
|
|
|
47304
48453
|
description: `List vendor scrub packages
|
|
47305
48454
|
|
|
47306
48455
|
List vendor scrub packages`,
|
|
47307
|
-
args:
|
|
47308
|
-
tool: async (client,
|
|
47309
|
-
const [result, apiCall] = await vendorsListVendorScrubPackages(client,
|
|
48456
|
+
args: args42,
|
|
48457
|
+
tool: async (client, args43, ctx) => {
|
|
48458
|
+
const [result, apiCall] = await vendorsListVendorScrubPackages(client, args43.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47310
48459
|
if (!result.ok) {
|
|
47311
48460
|
return {
|
|
47312
48461
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47321,9 +48470,9 @@ List vendor scrub packages`,
|
|
|
47321
48470
|
|
|
47322
48471
|
// src/funcs/vendorsListVendorScrubPurchases.ts
|
|
47323
48472
|
function vendorsListVendorScrubPurchases(client, request, options) {
|
|
47324
|
-
return new APIPromise($
|
|
48473
|
+
return new APIPromise($do44(client, request, options));
|
|
47325
48474
|
}
|
|
47326
|
-
async function $
|
|
48475
|
+
async function $do44(client, request, options) {
|
|
47327
48476
|
const parsed = safeParse(request, (value) => ListVendorScrubPurchasesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47328
48477
|
if (!parsed.ok) {
|
|
47329
48478
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47349,6 +48498,7 @@ async function $do37(client, request, options) {
|
|
|
47349
48498
|
const securityInput = await extractSecurity(client._options.security);
|
|
47350
48499
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47351
48500
|
const context = {
|
|
48501
|
+
options: client._options,
|
|
47352
48502
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47353
48503
|
operationID: "listVendorScrubPurchases",
|
|
47354
48504
|
oAuth2Scopes: [],
|
|
@@ -47365,6 +48515,7 @@ async function $do37(client, request, options) {
|
|
|
47365
48515
|
headers,
|
|
47366
48516
|
query,
|
|
47367
48517
|
body,
|
|
48518
|
+
userAgent: client._options.userAgent,
|
|
47368
48519
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47369
48520
|
}, options);
|
|
47370
48521
|
if (!requestRes.ok) {
|
|
@@ -47435,12 +48586,12 @@ var init_vendorsListVendorScrubPurchases = __esm(() => {
|
|
|
47435
48586
|
});
|
|
47436
48587
|
|
|
47437
48588
|
// src/mcp-server/tools/vendorsListVendorScrubPurchases.ts
|
|
47438
|
-
var
|
|
48589
|
+
var args43, tool$vendorsListVendorScrubPurchases;
|
|
47439
48590
|
var init_vendorsListVendorScrubPurchases2 = __esm(() => {
|
|
47440
48591
|
init_vendorsListVendorScrubPurchases();
|
|
47441
48592
|
init_operations();
|
|
47442
48593
|
init_tools();
|
|
47443
|
-
|
|
48594
|
+
args43 = {
|
|
47444
48595
|
request: ListVendorScrubPurchasesRequest$inboundSchema
|
|
47445
48596
|
};
|
|
47446
48597
|
tool$vendorsListVendorScrubPurchases = {
|
|
@@ -47448,9 +48599,9 @@ var init_vendorsListVendorScrubPurchases2 = __esm(() => {
|
|
|
47448
48599
|
description: `List vendor scrub purchases
|
|
47449
48600
|
|
|
47450
48601
|
List vendor scrub purchases`,
|
|
47451
|
-
args:
|
|
47452
|
-
tool: async (client,
|
|
47453
|
-
const [result, apiCall] = await vendorsListVendorScrubPurchases(client,
|
|
48602
|
+
args: args43,
|
|
48603
|
+
tool: async (client, args44, ctx) => {
|
|
48604
|
+
const [result, apiCall] = await vendorsListVendorScrubPurchases(client, args44.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47454
48605
|
if (!result.ok) {
|
|
47455
48606
|
return {
|
|
47456
48607
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47465,9 +48616,9 @@ List vendor scrub purchases`,
|
|
|
47465
48616
|
|
|
47466
48617
|
// src/funcs/vendorsPurchaseScrubCredits.ts
|
|
47467
48618
|
function vendorsPurchaseScrubCredits(client, request, options) {
|
|
47468
|
-
return new APIPromise($
|
|
48619
|
+
return new APIPromise($do45(client, request, options));
|
|
47469
48620
|
}
|
|
47470
|
-
async function $
|
|
48621
|
+
async function $do45(client, request, options) {
|
|
47471
48622
|
const parsed = safeParse(request, (value) => PurchaseScrubCreditsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47472
48623
|
if (!parsed.ok) {
|
|
47473
48624
|
return [parsed, { status: "invalid" }];
|
|
@@ -47488,6 +48639,7 @@ async function $do38(client, request, options) {
|
|
|
47488
48639
|
const securityInput = await extractSecurity(client._options.security);
|
|
47489
48640
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47490
48641
|
const context = {
|
|
48642
|
+
options: client._options,
|
|
47491
48643
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47492
48644
|
operationID: "purchaseScrubCredits",
|
|
47493
48645
|
oAuth2Scopes: [],
|
|
@@ -47503,6 +48655,7 @@ async function $do38(client, request, options) {
|
|
|
47503
48655
|
path,
|
|
47504
48656
|
headers,
|
|
47505
48657
|
body,
|
|
48658
|
+
userAgent: client._options.userAgent,
|
|
47506
48659
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47507
48660
|
}, options);
|
|
47508
48661
|
if (!requestRes.ok) {
|
|
@@ -47541,12 +48694,12 @@ var init_vendorsPurchaseScrubCredits = __esm(() => {
|
|
|
47541
48694
|
});
|
|
47542
48695
|
|
|
47543
48696
|
// src/mcp-server/tools/vendorsPurchaseScrubCredits.ts
|
|
47544
|
-
var
|
|
48697
|
+
var args44, tool$vendorsPurchaseScrubCredits;
|
|
47545
48698
|
var init_vendorsPurchaseScrubCredits2 = __esm(() => {
|
|
47546
48699
|
init_vendorsPurchaseScrubCredits();
|
|
47547
48700
|
init_operations();
|
|
47548
48701
|
init_tools();
|
|
47549
|
-
|
|
48702
|
+
args44 = {
|
|
47550
48703
|
request: PurchaseScrubCreditsRequest$inboundSchema
|
|
47551
48704
|
};
|
|
47552
48705
|
tool$vendorsPurchaseScrubCredits = {
|
|
@@ -47554,9 +48707,9 @@ var init_vendorsPurchaseScrubCredits2 = __esm(() => {
|
|
|
47554
48707
|
description: `Purchase scrub credits
|
|
47555
48708
|
|
|
47556
48709
|
Purchase scrub credits`,
|
|
47557
|
-
args:
|
|
47558
|
-
tool: async (client,
|
|
47559
|
-
const [result, apiCall] = await vendorsPurchaseScrubCredits(client,
|
|
48710
|
+
args: args44,
|
|
48711
|
+
tool: async (client, args45, ctx) => {
|
|
48712
|
+
const [result, apiCall] = await vendorsPurchaseScrubCredits(client, args45.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47560
48713
|
if (!result.ok) {
|
|
47561
48714
|
return {
|
|
47562
48715
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47571,9 +48724,9 @@ Purchase scrub credits`,
|
|
|
47571
48724
|
|
|
47572
48725
|
// src/funcs/vendorsSubmitVendorCredential.ts
|
|
47573
48726
|
function vendorsSubmitVendorCredential(client, request, options) {
|
|
47574
|
-
return new APIPromise($
|
|
48727
|
+
return new APIPromise($do46(client, request, options));
|
|
47575
48728
|
}
|
|
47576
|
-
async function $
|
|
48729
|
+
async function $do46(client, request, options) {
|
|
47577
48730
|
const parsed = safeParse(request, (value) => SubmitVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47578
48731
|
if (!parsed.ok) {
|
|
47579
48732
|
return [parsed, { status: "invalid" }];
|
|
@@ -47591,6 +48744,7 @@ async function $do39(client, request, options) {
|
|
|
47591
48744
|
const securityInput = await extractSecurity(client._options.security);
|
|
47592
48745
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47593
48746
|
const context = {
|
|
48747
|
+
options: client._options,
|
|
47594
48748
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47595
48749
|
operationID: "submitVendorCredential",
|
|
47596
48750
|
oAuth2Scopes: [],
|
|
@@ -47606,6 +48760,7 @@ async function $do39(client, request, options) {
|
|
|
47606
48760
|
path,
|
|
47607
48761
|
headers,
|
|
47608
48762
|
body,
|
|
48763
|
+
userAgent: client._options.userAgent,
|
|
47609
48764
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47610
48765
|
}, options);
|
|
47611
48766
|
if (!requestRes.ok) {
|
|
@@ -47645,12 +48800,12 @@ var init_vendorsSubmitVendorCredential = __esm(() => {
|
|
|
47645
48800
|
});
|
|
47646
48801
|
|
|
47647
48802
|
// src/mcp-server/tools/vendorsSubmitVendorCredential.ts
|
|
47648
|
-
var
|
|
48803
|
+
var args45, tool$vendorsSubmitVendorCredential;
|
|
47649
48804
|
var init_vendorsSubmitVendorCredential2 = __esm(() => {
|
|
47650
48805
|
init_vendorsSubmitVendorCredential();
|
|
47651
48806
|
init_operations();
|
|
47652
48807
|
init_tools();
|
|
47653
|
-
|
|
48808
|
+
args45 = {
|
|
47654
48809
|
request: SubmitVendorCredentialRequest$inboundSchema
|
|
47655
48810
|
};
|
|
47656
48811
|
tool$vendorsSubmitVendorCredential = {
|
|
@@ -47658,9 +48813,9 @@ var init_vendorsSubmitVendorCredential2 = __esm(() => {
|
|
|
47658
48813
|
description: `Submit vendor credential
|
|
47659
48814
|
|
|
47660
48815
|
It will submit vendor credential`,
|
|
47661
|
-
args:
|
|
47662
|
-
tool: async (client,
|
|
47663
|
-
const [result, apiCall] = await vendorsSubmitVendorCredential(client,
|
|
48816
|
+
args: args45,
|
|
48817
|
+
tool: async (client, args46, ctx) => {
|
|
48818
|
+
const [result, apiCall] = await vendorsSubmitVendorCredential(client, args46.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47664
48819
|
if (!result.ok) {
|
|
47665
48820
|
return {
|
|
47666
48821
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47675,9 +48830,9 @@ It will submit vendor credential`,
|
|
|
47675
48830
|
|
|
47676
48831
|
// src/funcs/vendorsUpdateVendorCredentialFile.ts
|
|
47677
48832
|
function vendorsUpdateVendorCredentialFile(client, request, options) {
|
|
47678
|
-
return new APIPromise($
|
|
48833
|
+
return new APIPromise($do47(client, request, options));
|
|
47679
48834
|
}
|
|
47680
|
-
async function $
|
|
48835
|
+
async function $do47(client, request, options) {
|
|
47681
48836
|
const parsed = safeParse(request, (value) => UpdateVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47682
48837
|
if (!parsed.ok) {
|
|
47683
48838
|
return [parsed, { status: "invalid" }];
|
|
@@ -47699,6 +48854,7 @@ async function $do40(client, request, options) {
|
|
|
47699
48854
|
const securityInput = await extractSecurity(client._options.security);
|
|
47700
48855
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47701
48856
|
const context = {
|
|
48857
|
+
options: client._options,
|
|
47702
48858
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47703
48859
|
operationID: "updateVendorCredentialFile",
|
|
47704
48860
|
oAuth2Scopes: [],
|
|
@@ -47714,6 +48870,7 @@ async function $do40(client, request, options) {
|
|
|
47714
48870
|
path,
|
|
47715
48871
|
headers,
|
|
47716
48872
|
body,
|
|
48873
|
+
userAgent: client._options.userAgent,
|
|
47717
48874
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47718
48875
|
}, options);
|
|
47719
48876
|
if (!requestRes.ok) {
|
|
@@ -47753,12 +48910,12 @@ var init_vendorsUpdateVendorCredentialFile = __esm(() => {
|
|
|
47753
48910
|
});
|
|
47754
48911
|
|
|
47755
48912
|
// src/mcp-server/tools/vendorsUpdateVendorCredentialFile.ts
|
|
47756
|
-
var
|
|
48913
|
+
var args46, tool$vendorsUpdateVendorCredentialFile;
|
|
47757
48914
|
var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
|
|
47758
48915
|
init_vendorsUpdateVendorCredentialFile();
|
|
47759
48916
|
init_operations();
|
|
47760
48917
|
init_tools();
|
|
47761
|
-
|
|
48918
|
+
args46 = {
|
|
47762
48919
|
request: UpdateVendorCredentialFileRequest$inboundSchema
|
|
47763
48920
|
};
|
|
47764
48921
|
tool$vendorsUpdateVendorCredentialFile = {
|
|
@@ -47766,9 +48923,9 @@ var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
|
|
|
47766
48923
|
description: `Update vendor credential file
|
|
47767
48924
|
|
|
47768
48925
|
It will update the vendor credential file properties`,
|
|
47769
|
-
args:
|
|
47770
|
-
tool: async (client,
|
|
47771
|
-
const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client,
|
|
48926
|
+
args: args46,
|
|
48927
|
+
tool: async (client, args47, ctx) => {
|
|
48928
|
+
const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client, args47.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47772
48929
|
if (!result.ok) {
|
|
47773
48930
|
return {
|
|
47774
48931
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47783,9 +48940,9 @@ It will update the vendor credential file properties`,
|
|
|
47783
48940
|
|
|
47784
48941
|
// src/funcs/vendorsUpdateVendorDetails.ts
|
|
47785
48942
|
function vendorsUpdateVendorDetails(client, request, options) {
|
|
47786
|
-
return new APIPromise($
|
|
48943
|
+
return new APIPromise($do48(client, request, options));
|
|
47787
48944
|
}
|
|
47788
|
-
async function $
|
|
48945
|
+
async function $do48(client, request, options) {
|
|
47789
48946
|
const parsed = safeParse(request, (value) => UpdateVendorDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47790
48947
|
if (!parsed.ok) {
|
|
47791
48948
|
return [parsed, { status: "invalid" }];
|
|
@@ -47806,6 +48963,7 @@ async function $do41(client, request, options) {
|
|
|
47806
48963
|
const securityInput = await extractSecurity(client._options.security);
|
|
47807
48964
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47808
48965
|
const context = {
|
|
48966
|
+
options: client._options,
|
|
47809
48967
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47810
48968
|
operationID: "updateVendorDetails",
|
|
47811
48969
|
oAuth2Scopes: [],
|
|
@@ -47821,6 +48979,7 @@ async function $do41(client, request, options) {
|
|
|
47821
48979
|
path,
|
|
47822
48980
|
headers,
|
|
47823
48981
|
body,
|
|
48982
|
+
userAgent: client._options.userAgent,
|
|
47824
48983
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47825
48984
|
}, options);
|
|
47826
48985
|
if (!requestRes.ok) {
|
|
@@ -47860,12 +49019,12 @@ var init_vendorsUpdateVendorDetails = __esm(() => {
|
|
|
47860
49019
|
});
|
|
47861
49020
|
|
|
47862
49021
|
// src/mcp-server/tools/vendorsUpdateVendorDetails.ts
|
|
47863
|
-
var
|
|
49022
|
+
var args47, tool$vendorsUpdateVendorDetails;
|
|
47864
49023
|
var init_vendorsUpdateVendorDetails2 = __esm(() => {
|
|
47865
49024
|
init_vendorsUpdateVendorDetails();
|
|
47866
49025
|
init_operations();
|
|
47867
49026
|
init_tools();
|
|
47868
|
-
|
|
49027
|
+
args47 = {
|
|
47869
49028
|
request: UpdateVendorDetailsRequest$inboundSchema
|
|
47870
49029
|
};
|
|
47871
49030
|
tool$vendorsUpdateVendorDetails = {
|
|
@@ -47873,9 +49032,9 @@ var init_vendorsUpdateVendorDetails2 = __esm(() => {
|
|
|
47873
49032
|
description: `Update vendor details
|
|
47874
49033
|
|
|
47875
49034
|
It will update the vendor details`,
|
|
47876
|
-
args:
|
|
47877
|
-
tool: async (client,
|
|
47878
|
-
const [result, apiCall] = await vendorsUpdateVendorDetails(client,
|
|
49035
|
+
args: args47,
|
|
49036
|
+
tool: async (client, args48, ctx) => {
|
|
49037
|
+
const [result, apiCall] = await vendorsUpdateVendorDetails(client, args48.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47879
49038
|
if (!result.ok) {
|
|
47880
49039
|
return {
|
|
47881
49040
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47890,9 +49049,9 @@ It will update the vendor details`,
|
|
|
47890
49049
|
|
|
47891
49050
|
// src/funcs/vendorsUpdateVendorManagedByCompany.ts
|
|
47892
49051
|
function vendorsUpdateVendorManagedByCompany(client, request, options) {
|
|
47893
|
-
return new APIPromise($
|
|
49052
|
+
return new APIPromise($do49(client, request, options));
|
|
47894
49053
|
}
|
|
47895
|
-
async function $
|
|
49054
|
+
async function $do49(client, request, options) {
|
|
47896
49055
|
const parsed = safeParse(request, (value) => UpdateVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47897
49056
|
if (!parsed.ok) {
|
|
47898
49057
|
return [parsed, { status: "invalid" }];
|
|
@@ -47913,6 +49072,7 @@ async function $do42(client, request, options) {
|
|
|
47913
49072
|
const securityInput = await extractSecurity(client._options.security);
|
|
47914
49073
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47915
49074
|
const context = {
|
|
49075
|
+
options: client._options,
|
|
47916
49076
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47917
49077
|
operationID: "updateVendorManagedByCompany",
|
|
47918
49078
|
oAuth2Scopes: [],
|
|
@@ -47928,6 +49088,7 @@ async function $do42(client, request, options) {
|
|
|
47928
49088
|
path,
|
|
47929
49089
|
headers,
|
|
47930
49090
|
body,
|
|
49091
|
+
userAgent: client._options.userAgent,
|
|
47931
49092
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47932
49093
|
}, options);
|
|
47933
49094
|
if (!requestRes.ok) {
|
|
@@ -47966,12 +49127,12 @@ var init_vendorsUpdateVendorManagedByCompany = __esm(() => {
|
|
|
47966
49127
|
});
|
|
47967
49128
|
|
|
47968
49129
|
// src/mcp-server/tools/vendorsUpdateVendorManagedByCompany.ts
|
|
47969
|
-
var
|
|
49130
|
+
var args48, tool$vendorsUpdateVendorManagedByCompany;
|
|
47970
49131
|
var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
|
|
47971
49132
|
init_vendorsUpdateVendorManagedByCompany();
|
|
47972
49133
|
init_operations();
|
|
47973
49134
|
init_tools();
|
|
47974
|
-
|
|
49135
|
+
args48 = {
|
|
47975
49136
|
request: UpdateVendorManagedByCompanyRequest$inboundSchema
|
|
47976
49137
|
};
|
|
47977
49138
|
tool$vendorsUpdateVendorManagedByCompany = {
|
|
@@ -47979,9 +49140,9 @@ var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
|
|
|
47979
49140
|
description: `Update vendor managed by company access rights
|
|
47980
49141
|
|
|
47981
49142
|
It will update the vendor managed by company access rights`,
|
|
47982
|
-
args:
|
|
47983
|
-
tool: async (client,
|
|
47984
|
-
const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client,
|
|
49143
|
+
args: args48,
|
|
49144
|
+
tool: async (client, args49, ctx) => {
|
|
49145
|
+
const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client, args49.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47985
49146
|
if (!result.ok) {
|
|
47986
49147
|
return {
|
|
47987
49148
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47996,9 +49157,9 @@ It will update the vendor managed by company access rights`,
|
|
|
47996
49157
|
|
|
47997
49158
|
// src/funcs/vendorsUpdateVendorScrubDetails.ts
|
|
47998
49159
|
function vendorsUpdateVendorScrubDetails(client, request, options) {
|
|
47999
|
-
return new APIPromise($
|
|
49160
|
+
return new APIPromise($do50(client, request, options));
|
|
48000
49161
|
}
|
|
48001
|
-
async function $
|
|
49162
|
+
async function $do50(client, request, options) {
|
|
48002
49163
|
const parsed = safeParse(request, (value) => UpdateVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48003
49164
|
if (!parsed.ok) {
|
|
48004
49165
|
return [parsed, { status: "invalid" }];
|
|
@@ -48019,6 +49180,7 @@ async function $do43(client, request, options) {
|
|
|
48019
49180
|
const securityInput = await extractSecurity(client._options.security);
|
|
48020
49181
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48021
49182
|
const context = {
|
|
49183
|
+
options: client._options,
|
|
48022
49184
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48023
49185
|
operationID: "updateVendorScrubDetails",
|
|
48024
49186
|
oAuth2Scopes: [],
|
|
@@ -48034,6 +49196,7 @@ async function $do43(client, request, options) {
|
|
|
48034
49196
|
path,
|
|
48035
49197
|
headers,
|
|
48036
49198
|
body,
|
|
49199
|
+
userAgent: client._options.userAgent,
|
|
48037
49200
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48038
49201
|
}, options);
|
|
48039
49202
|
if (!requestRes.ok) {
|
|
@@ -48073,12 +49236,12 @@ var init_vendorsUpdateVendorScrubDetails = __esm(() => {
|
|
|
48073
49236
|
});
|
|
48074
49237
|
|
|
48075
49238
|
// src/mcp-server/tools/vendorsUpdateVendorScrubDetails.ts
|
|
48076
|
-
var
|
|
49239
|
+
var args49, tool$vendorsUpdateVendorScrubDetails;
|
|
48077
49240
|
var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
|
|
48078
49241
|
init_vendorsUpdateVendorScrubDetails();
|
|
48079
49242
|
init_operations();
|
|
48080
49243
|
init_tools();
|
|
48081
|
-
|
|
49244
|
+
args49 = {
|
|
48082
49245
|
request: UpdateVendorScrubDetailsRequest$inboundSchema
|
|
48083
49246
|
};
|
|
48084
49247
|
tool$vendorsUpdateVendorScrubDetails = {
|
|
@@ -48086,9 +49249,9 @@ var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
|
|
|
48086
49249
|
description: `Update vendor scrub details
|
|
48087
49250
|
|
|
48088
49251
|
Update vendor scrub details`,
|
|
48089
|
-
args:
|
|
48090
|
-
tool: async (client,
|
|
48091
|
-
const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client,
|
|
49252
|
+
args: args49,
|
|
49253
|
+
tool: async (client, args50, ctx) => {
|
|
49254
|
+
const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client, args50.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48092
49255
|
if (!result.ok) {
|
|
48093
49256
|
return {
|
|
48094
49257
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48103,9 +49266,9 @@ Update vendor scrub details`,
|
|
|
48103
49266
|
|
|
48104
49267
|
// src/funcs/webhooksGetWebhookEndpoint.ts
|
|
48105
49268
|
function webhooksGetWebhookEndpoint(client, request, options) {
|
|
48106
|
-
return new APIPromise($
|
|
49269
|
+
return new APIPromise($do51(client, request, options));
|
|
48107
49270
|
}
|
|
48108
|
-
async function $
|
|
49271
|
+
async function $do51(client, request, options) {
|
|
48109
49272
|
const parsed = safeParse(request, (value) => GetWebhookEndpointRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48110
49273
|
if (!parsed.ok) {
|
|
48111
49274
|
return [parsed, { status: "invalid" }];
|
|
@@ -48125,6 +49288,7 @@ async function $do44(client, request, options) {
|
|
|
48125
49288
|
const securityInput = await extractSecurity(client._options.security);
|
|
48126
49289
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48127
49290
|
const context = {
|
|
49291
|
+
options: client._options,
|
|
48128
49292
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48129
49293
|
operationID: "getWebhookEndpoint",
|
|
48130
49294
|
oAuth2Scopes: [],
|
|
@@ -48140,6 +49304,7 @@ async function $do44(client, request, options) {
|
|
|
48140
49304
|
path,
|
|
48141
49305
|
headers,
|
|
48142
49306
|
body,
|
|
49307
|
+
userAgent: client._options.userAgent,
|
|
48143
49308
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48144
49309
|
}, options);
|
|
48145
49310
|
if (!requestRes.ok) {
|
|
@@ -48179,12 +49344,12 @@ var init_webhooksGetWebhookEndpoint = __esm(() => {
|
|
|
48179
49344
|
});
|
|
48180
49345
|
|
|
48181
49346
|
// src/mcp-server/tools/webhooksGetWebhookEndpoint.ts
|
|
48182
|
-
var
|
|
49347
|
+
var args50, tool$webhooksGetWebhookEndpoint;
|
|
48183
49348
|
var init_webhooksGetWebhookEndpoint2 = __esm(() => {
|
|
48184
49349
|
init_webhooksGetWebhookEndpoint();
|
|
48185
49350
|
init_operations();
|
|
48186
49351
|
init_tools();
|
|
48187
|
-
|
|
49352
|
+
args50 = {
|
|
48188
49353
|
request: GetWebhookEndpointRequest$inboundSchema
|
|
48189
49354
|
};
|
|
48190
49355
|
tool$webhooksGetWebhookEndpoint = {
|
|
@@ -48192,9 +49357,9 @@ var init_webhooksGetWebhookEndpoint2 = __esm(() => {
|
|
|
48192
49357
|
description: `Retrieves the webhook endpoint with the given ID.
|
|
48193
49358
|
|
|
48194
49359
|
Returns the definition of a webhook endpoint by ID.`,
|
|
48195
|
-
args:
|
|
48196
|
-
tool: async (client,
|
|
48197
|
-
const [result, apiCall] = await webhooksGetWebhookEndpoint(client,
|
|
49360
|
+
args: args50,
|
|
49361
|
+
tool: async (client, args51, ctx) => {
|
|
49362
|
+
const [result, apiCall] = await webhooksGetWebhookEndpoint(client, args51.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48198
49363
|
if (!result.ok) {
|
|
48199
49364
|
return {
|
|
48200
49365
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48209,9 +49374,9 @@ Returns the definition of a webhook endpoint by ID.`,
|
|
|
48209
49374
|
|
|
48210
49375
|
// src/funcs/webhooksListAllWebhookEndpoints.ts
|
|
48211
49376
|
function webhooksListAllWebhookEndpoints(client, request, options) {
|
|
48212
|
-
return new APIPromise($
|
|
49377
|
+
return new APIPromise($do52(client, request, options));
|
|
48213
49378
|
}
|
|
48214
|
-
async function $
|
|
49379
|
+
async function $do52(client, request, options) {
|
|
48215
49380
|
const parsed = safeParse(request, (value) => ListAllWebhookEndpointsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48216
49381
|
if (!parsed.ok) {
|
|
48217
49382
|
return [parsed, { status: "invalid" }];
|
|
@@ -48231,6 +49396,7 @@ async function $do45(client, request, options) {
|
|
|
48231
49396
|
const securityInput = await extractSecurity(client._options.security);
|
|
48232
49397
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48233
49398
|
const context = {
|
|
49399
|
+
options: client._options,
|
|
48234
49400
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48235
49401
|
operationID: "listAllWebhookEndpoints",
|
|
48236
49402
|
oAuth2Scopes: [],
|
|
@@ -48247,6 +49413,7 @@ async function $do45(client, request, options) {
|
|
|
48247
49413
|
headers,
|
|
48248
49414
|
query,
|
|
48249
49415
|
body,
|
|
49416
|
+
userAgent: client._options.userAgent,
|
|
48250
49417
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48251
49418
|
}, options);
|
|
48252
49419
|
if (!requestRes.ok) {
|
|
@@ -48285,12 +49452,12 @@ var init_webhooksListAllWebhookEndpoints = __esm(() => {
|
|
|
48285
49452
|
});
|
|
48286
49453
|
|
|
48287
49454
|
// src/mcp-server/tools/webhooksListAllWebhookEndpoints.ts
|
|
48288
|
-
var
|
|
49455
|
+
var args51, tool$webhooksListAllWebhookEndpoints;
|
|
48289
49456
|
var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
|
|
48290
49457
|
init_webhooksListAllWebhookEndpoints();
|
|
48291
49458
|
init_operations();
|
|
48292
49459
|
init_tools();
|
|
48293
|
-
|
|
49460
|
+
args51 = {
|
|
48294
49461
|
request: ListAllWebhookEndpointsRequest$inboundSchema
|
|
48295
49462
|
};
|
|
48296
49463
|
tool$webhooksListAllWebhookEndpoints = {
|
|
@@ -48298,9 +49465,9 @@ var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
|
|
|
48298
49465
|
description: `List all webhook endpoints
|
|
48299
49466
|
|
|
48300
49467
|
Returns a list of your webhook endpoints.`,
|
|
48301
|
-
args:
|
|
48302
|
-
tool: async (client,
|
|
48303
|
-
const [result, apiCall] = await webhooksListAllWebhookEndpoints(client,
|
|
49468
|
+
args: args51,
|
|
49469
|
+
tool: async (client, args52, ctx) => {
|
|
49470
|
+
const [result, apiCall] = await webhooksListAllWebhookEndpoints(client, args52.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48304
49471
|
if (!result.ok) {
|
|
48305
49472
|
return {
|
|
48306
49473
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48315,9 +49482,9 @@ Returns a list of your webhook endpoints.`,
|
|
|
48315
49482
|
|
|
48316
49483
|
// src/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
|
|
48317
49484
|
function webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, request, options) {
|
|
48318
|
-
return new APIPromise($
|
|
49485
|
+
return new APIPromise($do53(client, request, options));
|
|
48319
49486
|
}
|
|
48320
|
-
async function $
|
|
49487
|
+
async function $do53(client, request, options) {
|
|
48321
49488
|
const parsed = safeParse(request, (value) => UpdatesTheWebhookEndpointWithTheGivenIdRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48322
49489
|
if (!parsed.ok) {
|
|
48323
49490
|
return [parsed, { status: "invalid" }];
|
|
@@ -48338,6 +49505,7 @@ async function $do46(client, request, options) {
|
|
|
48338
49505
|
const securityInput = await extractSecurity(client._options.security);
|
|
48339
49506
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48340
49507
|
const context = {
|
|
49508
|
+
options: client._options,
|
|
48341
49509
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48342
49510
|
operationID: "updatesTheWebhookEndpointWithTheGivenId",
|
|
48343
49511
|
oAuth2Scopes: [],
|
|
@@ -48353,6 +49521,7 @@ async function $do46(client, request, options) {
|
|
|
48353
49521
|
path,
|
|
48354
49522
|
headers,
|
|
48355
49523
|
body,
|
|
49524
|
+
userAgent: client._options.userAgent,
|
|
48356
49525
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48357
49526
|
}, options);
|
|
48358
49527
|
if (!requestRes.ok) {
|
|
@@ -48392,12 +49561,12 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId = __esm(() => {
|
|
|
48392
49561
|
});
|
|
48393
49562
|
|
|
48394
49563
|
// src/mcp-server/tools/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
|
|
48395
|
-
var
|
|
49564
|
+
var args52, tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId;
|
|
48396
49565
|
var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
|
|
48397
49566
|
init_webhooksUpdatesTheWebhookEndpointWithTheGivenId();
|
|
48398
49567
|
init_operations();
|
|
48399
49568
|
init_tools();
|
|
48400
|
-
|
|
49569
|
+
args52 = {
|
|
48401
49570
|
request: UpdatesTheWebhookEndpointWithTheGivenIdRequest$inboundSchema
|
|
48402
49571
|
};
|
|
48403
49572
|
tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId = {
|
|
@@ -48405,9 +49574,9 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
|
|
|
48405
49574
|
description: `Updates the webhook endpoint with the given ID.
|
|
48406
49575
|
|
|
48407
49576
|
Updates the webhook endpoint with the given ID.`,
|
|
48408
|
-
args:
|
|
48409
|
-
tool: async (client,
|
|
48410
|
-
const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client,
|
|
49577
|
+
args: args52,
|
|
49578
|
+
tool: async (client, args53, ctx) => {
|
|
49579
|
+
const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, args53.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48411
49580
|
if (!result.ok) {
|
|
48412
49581
|
return {
|
|
48413
49582
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48422,9 +49591,9 @@ Updates the webhook endpoint with the given ID.`,
|
|
|
48422
49591
|
|
|
48423
49592
|
// src/funcs/zonesListOrSearchSecurityZones.ts
|
|
48424
49593
|
function zonesListOrSearchSecurityZones(client, request, options) {
|
|
48425
|
-
return new APIPromise($
|
|
49594
|
+
return new APIPromise($do54(client, request, options));
|
|
48426
49595
|
}
|
|
48427
|
-
async function $
|
|
49596
|
+
async function $do54(client, request, options) {
|
|
48428
49597
|
const parsed = safeParse(request, (value) => ListOrSearchSecurityZonesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48429
49598
|
if (!parsed.ok) {
|
|
48430
49599
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48450,6 +49619,7 @@ async function $do47(client, request, options) {
|
|
|
48450
49619
|
const securityInput = await extractSecurity(client._options.security);
|
|
48451
49620
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48452
49621
|
const context = {
|
|
49622
|
+
options: client._options,
|
|
48453
49623
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48454
49624
|
operationID: "listOrSearchSecurityZones",
|
|
48455
49625
|
oAuth2Scopes: [],
|
|
@@ -48466,6 +49636,7 @@ async function $do47(client, request, options) {
|
|
|
48466
49636
|
headers,
|
|
48467
49637
|
query,
|
|
48468
49638
|
body,
|
|
49639
|
+
userAgent: client._options.userAgent,
|
|
48469
49640
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48470
49641
|
}, options);
|
|
48471
49642
|
if (!requestRes.ok) {
|
|
@@ -48536,12 +49707,12 @@ var init_zonesListOrSearchSecurityZones = __esm(() => {
|
|
|
48536
49707
|
});
|
|
48537
49708
|
|
|
48538
49709
|
// src/mcp-server/tools/zonesListOrSearchSecurityZones.ts
|
|
48539
|
-
var
|
|
49710
|
+
var args53, tool$zonesListOrSearchSecurityZones;
|
|
48540
49711
|
var init_zonesListOrSearchSecurityZones2 = __esm(() => {
|
|
48541
49712
|
init_zonesListOrSearchSecurityZones();
|
|
48542
49713
|
init_operations();
|
|
48543
49714
|
init_tools();
|
|
48544
|
-
|
|
49715
|
+
args53 = {
|
|
48545
49716
|
request: ListOrSearchSecurityZonesRequest$inboundSchema
|
|
48546
49717
|
};
|
|
48547
49718
|
tool$zonesListOrSearchSecurityZones = {
|
|
@@ -48549,9 +49720,9 @@ var init_zonesListOrSearchSecurityZones2 = __esm(() => {
|
|
|
48549
49720
|
description: `List or search security zones
|
|
48550
49721
|
|
|
48551
49722
|
List or search security zones`,
|
|
48552
|
-
args:
|
|
48553
|
-
tool: async (client,
|
|
48554
|
-
const [result, apiCall] = await zonesListOrSearchSecurityZones(client,
|
|
49723
|
+
args: args53,
|
|
49724
|
+
tool: async (client, args54, ctx) => {
|
|
49725
|
+
const [result, apiCall] = await zonesListOrSearchSecurityZones(client, args54.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48555
49726
|
if (!result.ok) {
|
|
48556
49727
|
return {
|
|
48557
49728
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48566,9 +49737,9 @@ List or search security zones`,
|
|
|
48566
49737
|
|
|
48567
49738
|
// src/funcs/zonesSecurityZoneCheckin.ts
|
|
48568
49739
|
function zonesSecurityZoneCheckin(client, request, options) {
|
|
48569
|
-
return new APIPromise($
|
|
49740
|
+
return new APIPromise($do55(client, request, options));
|
|
48570
49741
|
}
|
|
48571
|
-
async function $
|
|
49742
|
+
async function $do55(client, request, options) {
|
|
48572
49743
|
const parsed = safeParse(request, (value) => SecurityZoneCheckinRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
48573
49744
|
if (!parsed.ok) {
|
|
48574
49745
|
return [parsed, { status: "invalid" }];
|
|
@@ -48583,6 +49754,7 @@ async function $do48(client, request, options) {
|
|
|
48583
49754
|
const securityInput = await extractSecurity(client._options.security);
|
|
48584
49755
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48585
49756
|
const context = {
|
|
49757
|
+
options: client._options,
|
|
48586
49758
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48587
49759
|
operationID: "securityZoneCheckin",
|
|
48588
49760
|
oAuth2Scopes: [],
|
|
@@ -48598,6 +49770,7 @@ async function $do48(client, request, options) {
|
|
|
48598
49770
|
path,
|
|
48599
49771
|
headers,
|
|
48600
49772
|
body,
|
|
49773
|
+
userAgent: client._options.userAgent,
|
|
48601
49774
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48602
49775
|
}, options);
|
|
48603
49776
|
if (!requestRes.ok) {
|
|
@@ -48636,12 +49809,12 @@ var init_zonesSecurityZoneCheckin = __esm(() => {
|
|
|
48636
49809
|
});
|
|
48637
49810
|
|
|
48638
49811
|
// src/mcp-server/tools/zonesSecurityZoneCheckin.ts
|
|
48639
|
-
var
|
|
49812
|
+
var args54, tool$zonesSecurityZoneCheckin;
|
|
48640
49813
|
var init_zonesSecurityZoneCheckin2 = __esm(() => {
|
|
48641
49814
|
init_zonesSecurityZoneCheckin();
|
|
48642
49815
|
init_operations();
|
|
48643
49816
|
init_tools();
|
|
48644
|
-
|
|
49817
|
+
args54 = {
|
|
48645
49818
|
request: SecurityZoneCheckinRequestBody$inboundSchema
|
|
48646
49819
|
};
|
|
48647
49820
|
tool$zonesSecurityZoneCheckin = {
|
|
@@ -48649,9 +49822,9 @@ var init_zonesSecurityZoneCheckin2 = __esm(() => {
|
|
|
48649
49822
|
description: `Security zone checkin request
|
|
48650
49823
|
|
|
48651
49824
|
Security zone checkin request`,
|
|
48652
|
-
args:
|
|
48653
|
-
tool: async (client,
|
|
48654
|
-
const [result, apiCall] = await zonesSecurityZoneCheckin(client,
|
|
49825
|
+
args: args54,
|
|
49826
|
+
tool: async (client, args55, ctx) => {
|
|
49827
|
+
const [result, apiCall] = await zonesSecurityZoneCheckin(client, args55.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48655
49828
|
if (!result.ok) {
|
|
48656
49829
|
return {
|
|
48657
49830
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48668,7 +49841,7 @@ Security zone checkin request`,
|
|
|
48668
49841
|
function createMCPServer(deps) {
|
|
48669
49842
|
const server = new McpServer({
|
|
48670
49843
|
name: "GreenSecurity",
|
|
48671
|
-
version: "0.
|
|
49844
|
+
version: "0.35.1"
|
|
48672
49845
|
});
|
|
48673
49846
|
const client = new GreenSecurityCore({
|
|
48674
49847
|
security: deps.security,
|
|
@@ -48689,11 +49862,15 @@ function createMCPServer(deps) {
|
|
|
48689
49862
|
tool(tool$vendorsGetVendorCredentialFile);
|
|
48690
49863
|
tool(tool$vendorsUpdateVendorCredentialFile);
|
|
48691
49864
|
tool(tool$vendorsDeleteVendorCredentialFile);
|
|
49865
|
+
tool(tool$vendorsGetVendorLegalName);
|
|
48692
49866
|
tool(tool$vendorsDeclineVendorCredential);
|
|
48693
49867
|
tool(tool$vendorsListVendorCredentialFiles);
|
|
48694
49868
|
tool(tool$vendorsAddVendorCredentialFile);
|
|
48695
49869
|
tool(tool$vendorsSubmitVendorCredential);
|
|
49870
|
+
tool(tool$vendorsCreateOrUpdateBcr);
|
|
49871
|
+
tool(tool$vendorsCreateNewVendorCredentialVersion);
|
|
48696
49872
|
tool(tool$vendorsListVendorCredentialHistory);
|
|
49873
|
+
tool(tool$vendorsListVendorCredentialDataRequests);
|
|
48697
49874
|
tool(tool$vendorsExpediteTimeRemaining);
|
|
48698
49875
|
tool(tool$vendorsListVendorInvoices);
|
|
48699
49876
|
tool(tool$vendorsGetVendorInvoiceDetails);
|
|
@@ -48730,6 +49907,9 @@ function createMCPServer(deps) {
|
|
|
48730
49907
|
tool(tool$companiesListOrSearchCompanies);
|
|
48731
49908
|
tool(tool$zonesListOrSearchSecurityZones);
|
|
48732
49909
|
tool(tool$zonesSecurityZoneCheckin);
|
|
49910
|
+
tool(tool$dataRequestsAddDataRequestFile);
|
|
49911
|
+
tool(tool$dataRequestsDeleteDataRequestFile);
|
|
49912
|
+
tool(tool$dataRequestsUpdateDataRequest);
|
|
48733
49913
|
return server;
|
|
48734
49914
|
}
|
|
48735
49915
|
var init_server2 = __esm(() => {
|
|
@@ -48738,6 +49918,9 @@ var init_server2 = __esm(() => {
|
|
|
48738
49918
|
init_resources();
|
|
48739
49919
|
init_tools();
|
|
48740
49920
|
init_companiesListOrSearchCompanies2();
|
|
49921
|
+
init_dataRequestsAddDataRequestFile2();
|
|
49922
|
+
init_dataRequestsDeleteDataRequestFile2();
|
|
49923
|
+
init_dataRequestsUpdateDataRequest2();
|
|
48741
49924
|
init_organizationsGetFacility2();
|
|
48742
49925
|
init_organizationsListOrSearchFacilities2();
|
|
48743
49926
|
init_supportArticlesGetSupportArticle2();
|
|
@@ -48752,6 +49935,8 @@ var init_server2 = __esm(() => {
|
|
|
48752
49935
|
init_vendorsAddVendorCredentialFile2();
|
|
48753
49936
|
init_vendorsAddVendorManagedByCompany2();
|
|
48754
49937
|
init_vendorScansVendorScanOut2();
|
|
49938
|
+
init_vendorsCreateNewVendorCredentialVersion2();
|
|
49939
|
+
init_vendorsCreateOrUpdateBcr2();
|
|
48755
49940
|
init_vendorsCreateVendorCompany2();
|
|
48756
49941
|
init_vendorsCreateVendorRegistration2();
|
|
48757
49942
|
init_vendorsDeclineVendorCredential2();
|
|
@@ -48761,8 +49946,10 @@ var init_server2 = __esm(() => {
|
|
|
48761
49946
|
init_vendorsGetVendorCredentialDetails2();
|
|
48762
49947
|
init_vendorsGetVendorCredentialFile2();
|
|
48763
49948
|
init_vendorsGetVendorInvoiceDetails2();
|
|
49949
|
+
init_vendorsGetVendorLegalName2();
|
|
48764
49950
|
init_vendorsGetVendorsDetails2();
|
|
48765
49951
|
init_vendorsListVendorAdditionalFacilityFields2();
|
|
49952
|
+
init_vendorsListVendorCredentialDataRequests2();
|
|
48766
49953
|
init_vendorsListVendorCredentialFiles2();
|
|
48767
49954
|
init_vendorsListVendorCredentialHistory2();
|
|
48768
49955
|
init_vendorsListVendorCredentials2();
|
|
@@ -49989,7 +51176,7 @@ var routes = an({
|
|
|
49989
51176
|
var app = He(routes, {
|
|
49990
51177
|
name: "mcp",
|
|
49991
51178
|
versionInfo: {
|
|
49992
|
-
currentVersion: "0.
|
|
51179
|
+
currentVersion: "0.35.1"
|
|
49993
51180
|
}
|
|
49994
51181
|
});
|
|
49995
51182
|
zt(app, process3.argv.slice(2), buildContext(process3));
|
|
@@ -49997,5 +51184,5 @@ export {
|
|
|
49997
51184
|
app
|
|
49998
51185
|
};
|
|
49999
51186
|
|
|
50000
|
-
//# debugId=
|
|
51187
|
+
//# debugId=932350E8F54D5FE864756E2164756E21
|
|
50001
51188
|
//# sourceMappingURL=mcp-server.js.map
|