@greensecurity/javascript-sdk 0.31.17 → 0.35.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (626) hide show
  1. package/README.md +24 -0
  2. package/bin/mcp-server.js +1828 -641
  3. package/bin/mcp-server.js.map +78 -57
  4. package/dist/commonjs/__tests__/datarequests.test.d.ts +2 -0
  5. package/dist/commonjs/__tests__/datarequests.test.d.ts.map +1 -0
  6. package/dist/commonjs/__tests__/datarequests.test.js +56 -0
  7. package/dist/commonjs/__tests__/datarequests.test.js.map +1 -0
  8. package/dist/commonjs/__tests__/vendors.test.js +80 -6
  9. package/dist/commonjs/__tests__/vendors.test.js.map +1 -1
  10. package/dist/commonjs/__tests__/zones.test.js +30 -2
  11. package/dist/commonjs/__tests__/zones.test.js.map +1 -1
  12. package/dist/commonjs/admin-funcs/doAdmin.d.ts.map +1 -1
  13. package/dist/commonjs/admin-funcs/doAdmin.js +3 -3
  14. package/dist/commonjs/admin-funcs/doAdmin.js.map +1 -1
  15. package/dist/commonjs/funcs/companiesListOrSearchCompanies.js +2 -0
  16. package/dist/commonjs/funcs/companiesListOrSearchCompanies.js.map +1 -1
  17. package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.d.ts +17 -0
  18. package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  19. package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.js +124 -0
  20. package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.js.map +1 -0
  21. package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.d.ts +17 -0
  22. package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  23. package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.js +123 -0
  24. package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.js.map +1 -0
  25. package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.d.ts +17 -0
  26. package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  27. package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.js +124 -0
  28. package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.js.map +1 -0
  29. package/dist/commonjs/funcs/organizationsGetFacility.js +2 -0
  30. package/dist/commonjs/funcs/organizationsGetFacility.js.map +1 -1
  31. package/dist/commonjs/funcs/organizationsListOrSearchFacilities.js +2 -0
  32. package/dist/commonjs/funcs/organizationsListOrSearchFacilities.js.map +1 -1
  33. package/dist/commonjs/funcs/supportArticlesGetSupportArticle.js +2 -0
  34. package/dist/commonjs/funcs/supportArticlesGetSupportArticle.js.map +1 -1
  35. package/dist/commonjs/funcs/supportArticlesListOrSearchSupportArticles.js +2 -0
  36. package/dist/commonjs/funcs/supportArticlesListOrSearchSupportArticles.js.map +1 -1
  37. package/dist/commonjs/funcs/usersChangePassword.js +2 -0
  38. package/dist/commonjs/funcs/usersChangePassword.js.map +1 -1
  39. package/dist/commonjs/funcs/usersGetCurrentUser.js +2 -0
  40. package/dist/commonjs/funcs/usersGetCurrentUser.js.map +1 -1
  41. package/dist/commonjs/funcs/usersGetUserById.js +2 -0
  42. package/dist/commonjs/funcs/usersGetUserById.js.map +1 -1
  43. package/dist/commonjs/funcs/usersMagiclink.js +2 -0
  44. package/dist/commonjs/funcs/usersMagiclink.js.map +1 -1
  45. package/dist/commonjs/funcs/usersPassword.js +2 -0
  46. package/dist/commonjs/funcs/usersPassword.js.map +1 -1
  47. package/dist/commonjs/funcs/usersPasswordResetRequest.js +2 -0
  48. package/dist/commonjs/funcs/usersPasswordResetRequest.js.map +1 -1
  49. package/dist/commonjs/funcs/usersPostAuthenticate.js +2 -0
  50. package/dist/commonjs/funcs/usersPostAuthenticate.js.map +1 -1
  51. package/dist/commonjs/funcs/vendorScansVendorScanOut.js +2 -0
  52. package/dist/commonjs/funcs/vendorScansVendorScanOut.js.map +1 -1
  53. package/dist/commonjs/funcs/vendorsAddVendorCredentialFile.js +2 -0
  54. package/dist/commonjs/funcs/vendorsAddVendorCredentialFile.js.map +1 -1
  55. package/dist/commonjs/funcs/vendorsAddVendorManagedByCompany.js +2 -0
  56. package/dist/commonjs/funcs/vendorsAddVendorManagedByCompany.js.map +1 -1
  57. package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.d.ts +17 -0
  58. package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
  59. package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.js +118 -0
  60. package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
  61. package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.d.ts +17 -0
  62. package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
  63. package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.js +121 -0
  64. package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.js.map +1 -0
  65. package/dist/commonjs/funcs/vendorsCreateVendorCompany.js +2 -0
  66. package/dist/commonjs/funcs/vendorsCreateVendorCompany.js.map +1 -1
  67. package/dist/commonjs/funcs/vendorsCreateVendorRegistration.js +2 -0
  68. package/dist/commonjs/funcs/vendorsCreateVendorRegistration.js.map +1 -1
  69. package/dist/commonjs/funcs/vendorsDeclineVendorCredential.js +2 -0
  70. package/dist/commonjs/funcs/vendorsDeclineVendorCredential.js.map +1 -1
  71. package/dist/commonjs/funcs/vendorsDeleteVendorCredentialFile.js +2 -0
  72. package/dist/commonjs/funcs/vendorsDeleteVendorCredentialFile.js.map +1 -1
  73. package/dist/commonjs/funcs/vendorsDeleteVendorManagedByCompany.js +2 -0
  74. package/dist/commonjs/funcs/vendorsDeleteVendorManagedByCompany.js.map +1 -1
  75. package/dist/commonjs/funcs/vendorsExpediteTimeRemaining.js +2 -0
  76. package/dist/commonjs/funcs/vendorsExpediteTimeRemaining.js.map +1 -1
  77. package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.js +2 -0
  78. package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.js.map +1 -1
  79. package/dist/commonjs/funcs/vendorsGetVendorCredentialFile.js +2 -0
  80. package/dist/commonjs/funcs/vendorsGetVendorCredentialFile.js.map +1 -1
  81. package/dist/commonjs/funcs/vendorsGetVendorInvoiceDetails.js +2 -0
  82. package/dist/commonjs/funcs/vendorsGetVendorInvoiceDetails.js.map +1 -1
  83. package/dist/commonjs/funcs/vendorsGetVendorLegalName.d.ts +17 -0
  84. package/dist/commonjs/funcs/vendorsGetVendorLegalName.d.ts.map +1 -0
  85. package/dist/commonjs/funcs/vendorsGetVendorLegalName.js +122 -0
  86. package/dist/commonjs/funcs/vendorsGetVendorLegalName.js.map +1 -0
  87. package/dist/commonjs/funcs/vendorsGetVendorsDetails.js +2 -0
  88. package/dist/commonjs/funcs/vendorsGetVendorsDetails.js.map +1 -1
  89. package/dist/commonjs/funcs/vendorsListVendorAdditionalFacilityFields.js +2 -0
  90. package/dist/commonjs/funcs/vendorsListVendorAdditionalFacilityFields.js.map +1 -1
  91. package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.d.ts +23 -0
  92. package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
  93. package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.js +135 -0
  94. package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.js.map +1 -0
  95. package/dist/commonjs/funcs/vendorsListVendorCredentialFiles.js +2 -0
  96. package/dist/commonjs/funcs/vendorsListVendorCredentialFiles.js.map +1 -1
  97. package/dist/commonjs/funcs/vendorsListVendorCredentialHistory.js +2 -0
  98. package/dist/commonjs/funcs/vendorsListVendorCredentialHistory.js.map +1 -1
  99. package/dist/commonjs/funcs/vendorsListVendorCredentials.js +2 -0
  100. package/dist/commonjs/funcs/vendorsListVendorCredentials.js.map +1 -1
  101. package/dist/commonjs/funcs/vendorsListVendorCredits.js +2 -0
  102. package/dist/commonjs/funcs/vendorsListVendorCredits.js.map +1 -1
  103. package/dist/commonjs/funcs/vendorsListVendorFacilityStatuses.js +2 -0
  104. package/dist/commonjs/funcs/vendorsListVendorFacilityStatuses.js.map +1 -1
  105. package/dist/commonjs/funcs/vendorsListVendorInvoices.js +2 -0
  106. package/dist/commonjs/funcs/vendorsListVendorInvoices.js.map +1 -1
  107. package/dist/commonjs/funcs/vendorsListVendorJobTitles.js +2 -0
  108. package/dist/commonjs/funcs/vendorsListVendorJobTitles.js.map +1 -1
  109. package/dist/commonjs/funcs/vendorsListVendorManagedByCompanies.js +2 -0
  110. package/dist/commonjs/funcs/vendorsListVendorManagedByCompanies.js.map +1 -1
  111. package/dist/commonjs/funcs/vendorsListVendorScrubDetails.js +2 -0
  112. package/dist/commonjs/funcs/vendorsListVendorScrubDetails.js.map +1 -1
  113. package/dist/commonjs/funcs/vendorsListVendorScrubPackages.js +2 -0
  114. package/dist/commonjs/funcs/vendorsListVendorScrubPackages.js.map +1 -1
  115. package/dist/commonjs/funcs/vendorsListVendorScrubPurchases.js +2 -0
  116. package/dist/commonjs/funcs/vendorsListVendorScrubPurchases.js.map +1 -1
  117. package/dist/commonjs/funcs/vendorsPurchaseScrubCredits.js +2 -0
  118. package/dist/commonjs/funcs/vendorsPurchaseScrubCredits.js.map +1 -1
  119. package/dist/commonjs/funcs/vendorsSubmitVendorCredential.js +2 -0
  120. package/dist/commonjs/funcs/vendorsSubmitVendorCredential.js.map +1 -1
  121. package/dist/commonjs/funcs/vendorsUpdateVendorCredentialFile.js +2 -0
  122. package/dist/commonjs/funcs/vendorsUpdateVendorCredentialFile.js.map +1 -1
  123. package/dist/commonjs/funcs/vendorsUpdateVendorDetails.js +2 -0
  124. package/dist/commonjs/funcs/vendorsUpdateVendorDetails.js.map +1 -1
  125. package/dist/commonjs/funcs/vendorsUpdateVendorManagedByCompany.js +2 -0
  126. package/dist/commonjs/funcs/vendorsUpdateVendorManagedByCompany.js.map +1 -1
  127. package/dist/commonjs/funcs/vendorsUpdateVendorScrubDetails.js +2 -0
  128. package/dist/commonjs/funcs/vendorsUpdateVendorScrubDetails.js.map +1 -1
  129. package/dist/commonjs/funcs/webhooksGetWebhookEndpoint.js +2 -0
  130. package/dist/commonjs/funcs/webhooksGetWebhookEndpoint.js.map +1 -1
  131. package/dist/commonjs/funcs/webhooksListAllWebhookEndpoints.js +2 -0
  132. package/dist/commonjs/funcs/webhooksListAllWebhookEndpoints.js.map +1 -1
  133. package/dist/commonjs/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js +2 -0
  134. package/dist/commonjs/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js.map +1 -1
  135. package/dist/commonjs/funcs/zonesListOrSearchSecurityZones.js +2 -0
  136. package/dist/commonjs/funcs/zonesListOrSearchSecurityZones.js.map +1 -1
  137. package/dist/commonjs/funcs/zonesSecurityZoneCheckin.js +2 -0
  138. package/dist/commonjs/funcs/zonesSecurityZoneCheckin.js.map +1 -1
  139. package/dist/commonjs/hooks/types.d.ts +2 -0
  140. package/dist/commonjs/hooks/types.d.ts.map +1 -1
  141. package/dist/commonjs/index.d.ts +2 -0
  142. package/dist/commonjs/index.d.ts.map +1 -1
  143. package/dist/commonjs/index.extras.js +1 -2
  144. package/dist/commonjs/index.extras.js.map +1 -1
  145. package/dist/commonjs/index.js +3 -1
  146. package/dist/commonjs/index.js.map +1 -1
  147. package/dist/commonjs/lib/config.d.ts +7 -3
  148. package/dist/commonjs/lib/config.d.ts.map +1 -1
  149. package/dist/commonjs/lib/config.js +3 -3
  150. package/dist/commonjs/lib/config.js.map +1 -1
  151. package/dist/commonjs/lib/sdks.d.ts +1 -0
  152. package/dist/commonjs/lib/sdks.d.ts.map +1 -1
  153. package/dist/commonjs/lib/sdks.js +3 -3
  154. package/dist/commonjs/lib/sdks.js.map +1 -1
  155. package/dist/commonjs/mcp-server/mcp-server.js +1 -1
  156. package/dist/commonjs/mcp-server/mcp-server.js.map +1 -1
  157. package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
  158. package/dist/commonjs/mcp-server/server.js +15 -1
  159. package/dist/commonjs/mcp-server/server.js.map +1 -1
  160. package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts +8 -0
  161. package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  162. package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.js +64 -0
  163. package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.js.map +1 -0
  164. package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts +8 -0
  165. package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  166. package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.js +64 -0
  167. package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.js.map +1 -0
  168. package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts +8 -0
  169. package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  170. package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.js +64 -0
  171. package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.js.map +1 -0
  172. package/dist/commonjs/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.d.ts +8 -0
  173. package/dist/commonjs/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
  174. package/dist/commonjs/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.js +64 -0
  175. package/dist/commonjs/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
  176. package/dist/commonjs/mcp-server/tools/vendorsCreateOrUpdateBcr.d.ts +8 -0
  177. package/dist/commonjs/mcp-server/tools/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
  178. package/dist/commonjs/mcp-server/tools/vendorsCreateOrUpdateBcr.js +64 -0
  179. package/dist/commonjs/mcp-server/tools/vendorsCreateOrUpdateBcr.js.map +1 -0
  180. package/dist/commonjs/mcp-server/tools/vendorsGetVendorLegalName.d.ts +8 -0
  181. package/dist/commonjs/mcp-server/tools/vendorsGetVendorLegalName.d.ts.map +1 -0
  182. package/dist/commonjs/mcp-server/tools/vendorsGetVendorLegalName.js +64 -0
  183. package/dist/commonjs/mcp-server/tools/vendorsGetVendorLegalName.js.map +1 -0
  184. package/dist/commonjs/mcp-server/tools/vendorsListVendorCredentialDataRequests.d.ts +8 -0
  185. package/dist/commonjs/mcp-server/tools/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
  186. package/dist/commonjs/mcp-server/tools/vendorsListVendorCredentialDataRequests.js +69 -0
  187. package/dist/commonjs/mcp-server/tools/vendorsListVendorCredentialDataRequests.js.map +1 -0
  188. package/dist/commonjs/models/components/expand.d.ts +6 -0
  189. package/dist/commonjs/models/components/expand.d.ts.map +1 -1
  190. package/dist/commonjs/models/components/expand.js +2 -0
  191. package/dist/commonjs/models/components/expand.js.map +1 -1
  192. package/dist/commonjs/models/operations/adddatarequestfile.d.ts +67 -0
  193. package/dist/commonjs/models/operations/adddatarequestfile.d.ts.map +1 -0
  194. package/dist/commonjs/models/operations/adddatarequestfile.js +124 -0
  195. package/dist/commonjs/models/operations/adddatarequestfile.js.map +1 -0
  196. package/dist/commonjs/models/operations/createnewvendorcredentialversion.d.ts +59 -0
  197. package/dist/commonjs/models/operations/createnewvendorcredentialversion.d.ts.map +1 -0
  198. package/dist/commonjs/models/operations/createnewvendorcredentialversion.js +107 -0
  199. package/dist/commonjs/models/operations/createnewvendorcredentialversion.js.map +1 -0
  200. package/dist/commonjs/models/operations/createorupdatebcr.d.ts +103 -0
  201. package/dist/commonjs/models/operations/createorupdatebcr.d.ts.map +1 -0
  202. package/dist/commonjs/models/operations/createorupdatebcr.js +153 -0
  203. package/dist/commonjs/models/operations/createorupdatebcr.js.map +1 -0
  204. package/dist/commonjs/models/operations/deletedatarequestfile.d.ts +32 -0
  205. package/dist/commonjs/models/operations/deletedatarequestfile.d.ts.map +1 -0
  206. package/dist/commonjs/models/operations/deletedatarequestfile.js +69 -0
  207. package/dist/commonjs/models/operations/deletedatarequestfile.js.map +1 -0
  208. package/dist/commonjs/models/operations/getvendorlegalname.d.ts +64 -0
  209. package/dist/commonjs/models/operations/getvendorlegalname.d.ts.map +1 -0
  210. package/dist/commonjs/models/operations/getvendorlegalname.js +121 -0
  211. package/dist/commonjs/models/operations/getvendorlegalname.js.map +1 -0
  212. package/dist/commonjs/models/operations/index.d.ts +7 -0
  213. package/dist/commonjs/models/operations/index.d.ts.map +1 -1
  214. package/dist/commonjs/models/operations/index.js +7 -0
  215. package/dist/commonjs/models/operations/index.js.map +1 -1
  216. package/dist/commonjs/models/operations/listvendorcredentialdatarequests.d.ts +58 -0
  217. package/dist/commonjs/models/operations/listvendorcredentialdatarequests.d.ts.map +1 -0
  218. package/dist/commonjs/models/operations/listvendorcredentialdatarequests.js +91 -0
  219. package/dist/commonjs/models/operations/listvendorcredentialdatarequests.js.map +1 -0
  220. package/dist/commonjs/models/operations/updatedatarequest.d.ts +59 -0
  221. package/dist/commonjs/models/operations/updatedatarequest.d.ts.map +1 -0
  222. package/dist/commonjs/models/operations/updatedatarequest.js +107 -0
  223. package/dist/commonjs/models/operations/updatedatarequest.js.map +1 -0
  224. package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.d.ts +23 -0
  225. package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  226. package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.js +51 -0
  227. package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.js.map +1 -0
  228. package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.d.ts +23 -0
  229. package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  230. package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.js +51 -0
  231. package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.js.map +1 -0
  232. package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.d.ts +23 -0
  233. package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  234. package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.js +51 -0
  235. package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.js.map +1 -0
  236. package/dist/commonjs/react-query/index.d.ts +7 -0
  237. package/dist/commonjs/react-query/index.d.ts.map +1 -1
  238. package/dist/commonjs/react-query/index.js +7 -0
  239. package/dist/commonjs/react-query/index.js.map +1 -1
  240. package/dist/commonjs/react-query/vendorsCreateNewVendorCredentialVersion.d.ts +23 -0
  241. package/dist/commonjs/react-query/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
  242. package/dist/commonjs/react-query/vendorsCreateNewVendorCredentialVersion.js +51 -0
  243. package/dist/commonjs/react-query/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
  244. package/dist/commonjs/react-query/vendorsCreateOrUpdateBcr.d.ts +23 -0
  245. package/dist/commonjs/react-query/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
  246. package/dist/commonjs/react-query/vendorsCreateOrUpdateBcr.js +47 -0
  247. package/dist/commonjs/react-query/vendorsCreateOrUpdateBcr.js.map +1 -0
  248. package/dist/commonjs/react-query/vendorsGetVendorLegalName.d.ts +30 -0
  249. package/dist/commonjs/react-query/vendorsGetVendorLegalName.d.ts.map +1 -0
  250. package/dist/commonjs/react-query/vendorsGetVendorLegalName.js +96 -0
  251. package/dist/commonjs/react-query/vendorsGetVendorLegalName.js.map +1 -0
  252. package/dist/commonjs/react-query/vendorsListVendorCredentialDataRequests.d.ts +65 -0
  253. package/dist/commonjs/react-query/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
  254. package/dist/commonjs/react-query/vendorsListVendorCredentialDataRequests.js +113 -0
  255. package/dist/commonjs/react-query/vendorsListVendorCredentialDataRequests.js.map +1 -0
  256. package/dist/commonjs/sdk/datarequests.d.ts +26 -0
  257. package/dist/commonjs/sdk/datarequests.d.ts.map +1 -0
  258. package/dist/commonjs/sdk/datarequests.js +42 -0
  259. package/dist/commonjs/sdk/datarequests.js.map +1 -0
  260. package/dist/commonjs/sdk/sdk.d.ts +3 -0
  261. package/dist/commonjs/sdk/sdk.d.ts.map +1 -1
  262. package/dist/commonjs/sdk/sdk.js +4 -0
  263. package/dist/commonjs/sdk/sdk.js.map +1 -1
  264. package/dist/commonjs/sdk/vendors.d.ts +33 -0
  265. package/dist/commonjs/sdk/vendors.d.ts.map +1 -1
  266. package/dist/commonjs/sdk/vendors.js +45 -0
  267. package/dist/commonjs/sdk/vendors.js.map +1 -1
  268. package/dist/esm/__tests__/datarequests.test.d.ts +2 -0
  269. package/dist/esm/__tests__/datarequests.test.d.ts.map +1 -0
  270. package/dist/esm/__tests__/datarequests.test.js +54 -0
  271. package/dist/esm/__tests__/datarequests.test.js.map +1 -0
  272. package/dist/esm/__tests__/vendors.test.js +80 -6
  273. package/dist/esm/__tests__/vendors.test.js.map +1 -1
  274. package/dist/esm/__tests__/zones.test.js +30 -2
  275. package/dist/esm/__tests__/zones.test.js.map +1 -1
  276. package/dist/esm/admin-funcs/doAdmin.d.ts.map +1 -1
  277. package/dist/esm/admin-funcs/doAdmin.js +3 -3
  278. package/dist/esm/admin-funcs/doAdmin.js.map +1 -1
  279. package/dist/esm/funcs/companiesListOrSearchCompanies.js +2 -0
  280. package/dist/esm/funcs/companiesListOrSearchCompanies.js.map +1 -1
  281. package/dist/esm/funcs/dataRequestsAddDataRequestFile.d.ts +17 -0
  282. package/dist/esm/funcs/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  283. package/dist/esm/funcs/dataRequestsAddDataRequestFile.js +88 -0
  284. package/dist/esm/funcs/dataRequestsAddDataRequestFile.js.map +1 -0
  285. package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.d.ts +17 -0
  286. package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  287. package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.js +87 -0
  288. package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.js.map +1 -0
  289. package/dist/esm/funcs/dataRequestsUpdateDataRequest.d.ts +17 -0
  290. package/dist/esm/funcs/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  291. package/dist/esm/funcs/dataRequestsUpdateDataRequest.js +88 -0
  292. package/dist/esm/funcs/dataRequestsUpdateDataRequest.js.map +1 -0
  293. package/dist/esm/funcs/organizationsGetFacility.js +2 -0
  294. package/dist/esm/funcs/organizationsGetFacility.js.map +1 -1
  295. package/dist/esm/funcs/organizationsListOrSearchFacilities.js +2 -0
  296. package/dist/esm/funcs/organizationsListOrSearchFacilities.js.map +1 -1
  297. package/dist/esm/funcs/supportArticlesGetSupportArticle.js +2 -0
  298. package/dist/esm/funcs/supportArticlesGetSupportArticle.js.map +1 -1
  299. package/dist/esm/funcs/supportArticlesListOrSearchSupportArticles.js +2 -0
  300. package/dist/esm/funcs/supportArticlesListOrSearchSupportArticles.js.map +1 -1
  301. package/dist/esm/funcs/usersChangePassword.js +2 -0
  302. package/dist/esm/funcs/usersChangePassword.js.map +1 -1
  303. package/dist/esm/funcs/usersGetCurrentUser.js +2 -0
  304. package/dist/esm/funcs/usersGetCurrentUser.js.map +1 -1
  305. package/dist/esm/funcs/usersGetUserById.js +2 -0
  306. package/dist/esm/funcs/usersGetUserById.js.map +1 -1
  307. package/dist/esm/funcs/usersMagiclink.js +2 -0
  308. package/dist/esm/funcs/usersMagiclink.js.map +1 -1
  309. package/dist/esm/funcs/usersPassword.js +2 -0
  310. package/dist/esm/funcs/usersPassword.js.map +1 -1
  311. package/dist/esm/funcs/usersPasswordResetRequest.js +2 -0
  312. package/dist/esm/funcs/usersPasswordResetRequest.js.map +1 -1
  313. package/dist/esm/funcs/usersPostAuthenticate.js +2 -0
  314. package/dist/esm/funcs/usersPostAuthenticate.js.map +1 -1
  315. package/dist/esm/funcs/vendorScansVendorScanOut.js +2 -0
  316. package/dist/esm/funcs/vendorScansVendorScanOut.js.map +1 -1
  317. package/dist/esm/funcs/vendorsAddVendorCredentialFile.js +2 -0
  318. package/dist/esm/funcs/vendorsAddVendorCredentialFile.js.map +1 -1
  319. package/dist/esm/funcs/vendorsAddVendorManagedByCompany.js +2 -0
  320. package/dist/esm/funcs/vendorsAddVendorManagedByCompany.js.map +1 -1
  321. package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.d.ts +17 -0
  322. package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
  323. package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.js +82 -0
  324. package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
  325. package/dist/esm/funcs/vendorsCreateOrUpdateBcr.d.ts +17 -0
  326. package/dist/esm/funcs/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
  327. package/dist/esm/funcs/vendorsCreateOrUpdateBcr.js +85 -0
  328. package/dist/esm/funcs/vendorsCreateOrUpdateBcr.js.map +1 -0
  329. package/dist/esm/funcs/vendorsCreateVendorCompany.js +2 -0
  330. package/dist/esm/funcs/vendorsCreateVendorCompany.js.map +1 -1
  331. package/dist/esm/funcs/vendorsCreateVendorRegistration.js +2 -0
  332. package/dist/esm/funcs/vendorsCreateVendorRegistration.js.map +1 -1
  333. package/dist/esm/funcs/vendorsDeclineVendorCredential.js +2 -0
  334. package/dist/esm/funcs/vendorsDeclineVendorCredential.js.map +1 -1
  335. package/dist/esm/funcs/vendorsDeleteVendorCredentialFile.js +2 -0
  336. package/dist/esm/funcs/vendorsDeleteVendorCredentialFile.js.map +1 -1
  337. package/dist/esm/funcs/vendorsDeleteVendorManagedByCompany.js +2 -0
  338. package/dist/esm/funcs/vendorsDeleteVendorManagedByCompany.js.map +1 -1
  339. package/dist/esm/funcs/vendorsExpediteTimeRemaining.js +2 -0
  340. package/dist/esm/funcs/vendorsExpediteTimeRemaining.js.map +1 -1
  341. package/dist/esm/funcs/vendorsGetVendorCredentialDetails.js +2 -0
  342. package/dist/esm/funcs/vendorsGetVendorCredentialDetails.js.map +1 -1
  343. package/dist/esm/funcs/vendorsGetVendorCredentialFile.js +2 -0
  344. package/dist/esm/funcs/vendorsGetVendorCredentialFile.js.map +1 -1
  345. package/dist/esm/funcs/vendorsGetVendorInvoiceDetails.js +2 -0
  346. package/dist/esm/funcs/vendorsGetVendorInvoiceDetails.js.map +1 -1
  347. package/dist/esm/funcs/vendorsGetVendorLegalName.d.ts +17 -0
  348. package/dist/esm/funcs/vendorsGetVendorLegalName.d.ts.map +1 -0
  349. package/dist/esm/funcs/vendorsGetVendorLegalName.js +86 -0
  350. package/dist/esm/funcs/vendorsGetVendorLegalName.js.map +1 -0
  351. package/dist/esm/funcs/vendorsGetVendorsDetails.js +2 -0
  352. package/dist/esm/funcs/vendorsGetVendorsDetails.js.map +1 -1
  353. package/dist/esm/funcs/vendorsListVendorAdditionalFacilityFields.js +2 -0
  354. package/dist/esm/funcs/vendorsListVendorAdditionalFacilityFields.js.map +1 -1
  355. package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.d.ts +23 -0
  356. package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
  357. package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.js +99 -0
  358. package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.js.map +1 -0
  359. package/dist/esm/funcs/vendorsListVendorCredentialFiles.js +2 -0
  360. package/dist/esm/funcs/vendorsListVendorCredentialFiles.js.map +1 -1
  361. package/dist/esm/funcs/vendorsListVendorCredentialHistory.js +2 -0
  362. package/dist/esm/funcs/vendorsListVendorCredentialHistory.js.map +1 -1
  363. package/dist/esm/funcs/vendorsListVendorCredentials.js +2 -0
  364. package/dist/esm/funcs/vendorsListVendorCredentials.js.map +1 -1
  365. package/dist/esm/funcs/vendorsListVendorCredits.js +2 -0
  366. package/dist/esm/funcs/vendorsListVendorCredits.js.map +1 -1
  367. package/dist/esm/funcs/vendorsListVendorFacilityStatuses.js +2 -0
  368. package/dist/esm/funcs/vendorsListVendorFacilityStatuses.js.map +1 -1
  369. package/dist/esm/funcs/vendorsListVendorInvoices.js +2 -0
  370. package/dist/esm/funcs/vendorsListVendorInvoices.js.map +1 -1
  371. package/dist/esm/funcs/vendorsListVendorJobTitles.js +2 -0
  372. package/dist/esm/funcs/vendorsListVendorJobTitles.js.map +1 -1
  373. package/dist/esm/funcs/vendorsListVendorManagedByCompanies.js +2 -0
  374. package/dist/esm/funcs/vendorsListVendorManagedByCompanies.js.map +1 -1
  375. package/dist/esm/funcs/vendorsListVendorScrubDetails.js +2 -0
  376. package/dist/esm/funcs/vendorsListVendorScrubDetails.js.map +1 -1
  377. package/dist/esm/funcs/vendorsListVendorScrubPackages.js +2 -0
  378. package/dist/esm/funcs/vendorsListVendorScrubPackages.js.map +1 -1
  379. package/dist/esm/funcs/vendorsListVendorScrubPurchases.js +2 -0
  380. package/dist/esm/funcs/vendorsListVendorScrubPurchases.js.map +1 -1
  381. package/dist/esm/funcs/vendorsPurchaseScrubCredits.js +2 -0
  382. package/dist/esm/funcs/vendorsPurchaseScrubCredits.js.map +1 -1
  383. package/dist/esm/funcs/vendorsSubmitVendorCredential.js +2 -0
  384. package/dist/esm/funcs/vendorsSubmitVendorCredential.js.map +1 -1
  385. package/dist/esm/funcs/vendorsUpdateVendorCredentialFile.js +2 -0
  386. package/dist/esm/funcs/vendorsUpdateVendorCredentialFile.js.map +1 -1
  387. package/dist/esm/funcs/vendorsUpdateVendorDetails.js +2 -0
  388. package/dist/esm/funcs/vendorsUpdateVendorDetails.js.map +1 -1
  389. package/dist/esm/funcs/vendorsUpdateVendorManagedByCompany.js +2 -0
  390. package/dist/esm/funcs/vendorsUpdateVendorManagedByCompany.js.map +1 -1
  391. package/dist/esm/funcs/vendorsUpdateVendorScrubDetails.js +2 -0
  392. package/dist/esm/funcs/vendorsUpdateVendorScrubDetails.js.map +1 -1
  393. package/dist/esm/funcs/webhooksGetWebhookEndpoint.js +2 -0
  394. package/dist/esm/funcs/webhooksGetWebhookEndpoint.js.map +1 -1
  395. package/dist/esm/funcs/webhooksListAllWebhookEndpoints.js +2 -0
  396. package/dist/esm/funcs/webhooksListAllWebhookEndpoints.js.map +1 -1
  397. package/dist/esm/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js +2 -0
  398. package/dist/esm/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js.map +1 -1
  399. package/dist/esm/funcs/zonesListOrSearchSecurityZones.js +2 -0
  400. package/dist/esm/funcs/zonesListOrSearchSecurityZones.js.map +1 -1
  401. package/dist/esm/funcs/zonesSecurityZoneCheckin.js +2 -0
  402. package/dist/esm/funcs/zonesSecurityZoneCheckin.js.map +1 -1
  403. package/dist/esm/hooks/types.d.ts +2 -0
  404. package/dist/esm/hooks/types.d.ts.map +1 -1
  405. package/dist/esm/index.d.ts +2 -0
  406. package/dist/esm/index.d.ts.map +1 -1
  407. package/dist/esm/index.extras.js +1 -2
  408. package/dist/esm/index.extras.js.map +1 -1
  409. package/dist/esm/index.js +1 -0
  410. package/dist/esm/index.js.map +1 -1
  411. package/dist/esm/lib/config.d.ts +7 -3
  412. package/dist/esm/lib/config.d.ts.map +1 -1
  413. package/dist/esm/lib/config.js +3 -3
  414. package/dist/esm/lib/config.js.map +1 -1
  415. package/dist/esm/lib/sdks.d.ts +1 -0
  416. package/dist/esm/lib/sdks.d.ts.map +1 -1
  417. package/dist/esm/lib/sdks.js +3 -3
  418. package/dist/esm/lib/sdks.js.map +1 -1
  419. package/dist/esm/mcp-server/mcp-server.js +1 -1
  420. package/dist/esm/mcp-server/mcp-server.js.map +1 -1
  421. package/dist/esm/mcp-server/server.d.ts.map +1 -1
  422. package/dist/esm/mcp-server/server.js +15 -1
  423. package/dist/esm/mcp-server/server.js.map +1 -1
  424. package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts +8 -0
  425. package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  426. package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.js +28 -0
  427. package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.js.map +1 -0
  428. package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts +8 -0
  429. package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  430. package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.js +28 -0
  431. package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.js.map +1 -0
  432. package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts +8 -0
  433. package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  434. package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.js +28 -0
  435. package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.js.map +1 -0
  436. package/dist/esm/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.d.ts +8 -0
  437. package/dist/esm/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
  438. package/dist/esm/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.js +28 -0
  439. package/dist/esm/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
  440. package/dist/esm/mcp-server/tools/vendorsCreateOrUpdateBcr.d.ts +8 -0
  441. package/dist/esm/mcp-server/tools/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
  442. package/dist/esm/mcp-server/tools/vendorsCreateOrUpdateBcr.js +28 -0
  443. package/dist/esm/mcp-server/tools/vendorsCreateOrUpdateBcr.js.map +1 -0
  444. package/dist/esm/mcp-server/tools/vendorsGetVendorLegalName.d.ts +8 -0
  445. package/dist/esm/mcp-server/tools/vendorsGetVendorLegalName.d.ts.map +1 -0
  446. package/dist/esm/mcp-server/tools/vendorsGetVendorLegalName.js +28 -0
  447. package/dist/esm/mcp-server/tools/vendorsGetVendorLegalName.js.map +1 -0
  448. package/dist/esm/mcp-server/tools/vendorsListVendorCredentialDataRequests.d.ts +8 -0
  449. package/dist/esm/mcp-server/tools/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
  450. package/dist/esm/mcp-server/tools/vendorsListVendorCredentialDataRequests.js +33 -0
  451. package/dist/esm/mcp-server/tools/vendorsListVendorCredentialDataRequests.js.map +1 -0
  452. package/dist/esm/models/components/expand.d.ts +6 -0
  453. package/dist/esm/models/components/expand.d.ts.map +1 -1
  454. package/dist/esm/models/components/expand.js +2 -0
  455. package/dist/esm/models/components/expand.js.map +1 -1
  456. package/dist/esm/models/operations/adddatarequestfile.d.ts +67 -0
  457. package/dist/esm/models/operations/adddatarequestfile.d.ts.map +1 -0
  458. package/dist/esm/models/operations/adddatarequestfile.js +84 -0
  459. package/dist/esm/models/operations/adddatarequestfile.js.map +1 -0
  460. package/dist/esm/models/operations/createnewvendorcredentialversion.d.ts +59 -0
  461. package/dist/esm/models/operations/createnewvendorcredentialversion.d.ts.map +1 -0
  462. package/dist/esm/models/operations/createnewvendorcredentialversion.js +67 -0
  463. package/dist/esm/models/operations/createnewvendorcredentialversion.js.map +1 -0
  464. package/dist/esm/models/operations/createorupdatebcr.d.ts +103 -0
  465. package/dist/esm/models/operations/createorupdatebcr.d.ts.map +1 -0
  466. package/dist/esm/models/operations/createorupdatebcr.js +113 -0
  467. package/dist/esm/models/operations/createorupdatebcr.js.map +1 -0
  468. package/dist/esm/models/operations/deletedatarequestfile.d.ts +32 -0
  469. package/dist/esm/models/operations/deletedatarequestfile.d.ts.map +1 -0
  470. package/dist/esm/models/operations/deletedatarequestfile.js +31 -0
  471. package/dist/esm/models/operations/deletedatarequestfile.js.map +1 -0
  472. package/dist/esm/models/operations/getvendorlegalname.d.ts +64 -0
  473. package/dist/esm/models/operations/getvendorlegalname.d.ts.map +1 -0
  474. package/dist/esm/models/operations/getvendorlegalname.js +81 -0
  475. package/dist/esm/models/operations/getvendorlegalname.js.map +1 -0
  476. package/dist/esm/models/operations/index.d.ts +7 -0
  477. package/dist/esm/models/operations/index.d.ts.map +1 -1
  478. package/dist/esm/models/operations/index.js +7 -0
  479. package/dist/esm/models/operations/index.js.map +1 -1
  480. package/dist/esm/models/operations/listvendorcredentialdatarequests.d.ts +58 -0
  481. package/dist/esm/models/operations/listvendorcredentialdatarequests.d.ts.map +1 -0
  482. package/dist/esm/models/operations/listvendorcredentialdatarequests.js +53 -0
  483. package/dist/esm/models/operations/listvendorcredentialdatarequests.js.map +1 -0
  484. package/dist/esm/models/operations/updatedatarequest.d.ts +59 -0
  485. package/dist/esm/models/operations/updatedatarequest.d.ts.map +1 -0
  486. package/dist/esm/models/operations/updatedatarequest.js +67 -0
  487. package/dist/esm/models/operations/updatedatarequest.js.map +1 -0
  488. package/dist/esm/react-query/dataRequestsAddDataRequestFile.d.ts +23 -0
  489. package/dist/esm/react-query/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  490. package/dist/esm/react-query/dataRequestsAddDataRequestFile.js +46 -0
  491. package/dist/esm/react-query/dataRequestsAddDataRequestFile.js.map +1 -0
  492. package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.d.ts +23 -0
  493. package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  494. package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.js +46 -0
  495. package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.js.map +1 -0
  496. package/dist/esm/react-query/dataRequestsUpdateDataRequest.d.ts +23 -0
  497. package/dist/esm/react-query/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  498. package/dist/esm/react-query/dataRequestsUpdateDataRequest.js +46 -0
  499. package/dist/esm/react-query/dataRequestsUpdateDataRequest.js.map +1 -0
  500. package/dist/esm/react-query/index.d.ts +7 -0
  501. package/dist/esm/react-query/index.d.ts.map +1 -1
  502. package/dist/esm/react-query/index.js +7 -0
  503. package/dist/esm/react-query/index.js.map +1 -1
  504. package/dist/esm/react-query/vendorsCreateNewVendorCredentialVersion.d.ts +23 -0
  505. package/dist/esm/react-query/vendorsCreateNewVendorCredentialVersion.d.ts.map +1 -0
  506. package/dist/esm/react-query/vendorsCreateNewVendorCredentialVersion.js +46 -0
  507. package/dist/esm/react-query/vendorsCreateNewVendorCredentialVersion.js.map +1 -0
  508. package/dist/esm/react-query/vendorsCreateOrUpdateBcr.d.ts +23 -0
  509. package/dist/esm/react-query/vendorsCreateOrUpdateBcr.d.ts.map +1 -0
  510. package/dist/esm/react-query/vendorsCreateOrUpdateBcr.js +42 -0
  511. package/dist/esm/react-query/vendorsCreateOrUpdateBcr.js.map +1 -0
  512. package/dist/esm/react-query/vendorsGetVendorLegalName.d.ts +30 -0
  513. package/dist/esm/react-query/vendorsGetVendorLegalName.d.ts.map +1 -0
  514. package/dist/esm/react-query/vendorsGetVendorLegalName.js +86 -0
  515. package/dist/esm/react-query/vendorsGetVendorLegalName.js.map +1 -0
  516. package/dist/esm/react-query/vendorsListVendorCredentialDataRequests.d.ts +65 -0
  517. package/dist/esm/react-query/vendorsListVendorCredentialDataRequests.d.ts.map +1 -0
  518. package/dist/esm/react-query/vendorsListVendorCredentialDataRequests.js +103 -0
  519. package/dist/esm/react-query/vendorsListVendorCredentialDataRequests.js.map +1 -0
  520. package/dist/esm/sdk/datarequests.d.ts +26 -0
  521. package/dist/esm/sdk/datarequests.d.ts.map +1 -0
  522. package/dist/esm/sdk/datarequests.js +38 -0
  523. package/dist/esm/sdk/datarequests.js.map +1 -0
  524. package/dist/esm/sdk/sdk.d.ts +3 -0
  525. package/dist/esm/sdk/sdk.d.ts.map +1 -1
  526. package/dist/esm/sdk/sdk.js +4 -0
  527. package/dist/esm/sdk/sdk.js.map +1 -1
  528. package/dist/esm/sdk/vendors.d.ts +33 -0
  529. package/dist/esm/sdk/vendors.d.ts.map +1 -1
  530. package/dist/esm/sdk/vendors.js +45 -0
  531. package/dist/esm/sdk/vendors.js.map +1 -1
  532. package/jsr.json +1 -1
  533. package/package.json +1 -1
  534. package/src/__tests__/datarequests.test.ts +63 -0
  535. package/src/__tests__/vendors.test.ts +96 -6
  536. package/src/__tests__/zones.test.ts +30 -2
  537. package/src/admin-funcs/doAdmin.ts +3 -4
  538. package/src/funcs/companiesListOrSearchCompanies.ts +2 -0
  539. package/src/funcs/dataRequestsAddDataRequestFile.ts +176 -0
  540. package/src/funcs/dataRequestsDeleteDataRequestFile.ts +176 -0
  541. package/src/funcs/dataRequestsUpdateDataRequest.ts +176 -0
  542. package/src/funcs/organizationsGetFacility.ts +2 -0
  543. package/src/funcs/organizationsListOrSearchFacilities.ts +2 -0
  544. package/src/funcs/supportArticlesGetSupportArticle.ts +2 -0
  545. package/src/funcs/supportArticlesListOrSearchSupportArticles.ts +2 -0
  546. package/src/funcs/usersChangePassword.ts +2 -0
  547. package/src/funcs/usersGetCurrentUser.ts +2 -0
  548. package/src/funcs/usersGetUserById.ts +2 -0
  549. package/src/funcs/usersMagiclink.ts +2 -0
  550. package/src/funcs/usersPassword.ts +2 -0
  551. package/src/funcs/usersPasswordResetRequest.ts +2 -0
  552. package/src/funcs/usersPostAuthenticate.ts +2 -0
  553. package/src/funcs/vendorScansVendorScanOut.ts +2 -0
  554. package/src/funcs/vendorsAddVendorCredentialFile.ts +2 -0
  555. package/src/funcs/vendorsAddVendorManagedByCompany.ts +2 -0
  556. package/src/funcs/vendorsCreateNewVendorCredentialVersion.ts +173 -0
  557. package/src/funcs/vendorsCreateOrUpdateBcr.ts +179 -0
  558. package/src/funcs/vendorsCreateVendorCompany.ts +2 -0
  559. package/src/funcs/vendorsCreateVendorRegistration.ts +2 -0
  560. package/src/funcs/vendorsDeclineVendorCredential.ts +2 -0
  561. package/src/funcs/vendorsDeleteVendorCredentialFile.ts +2 -0
  562. package/src/funcs/vendorsDeleteVendorManagedByCompany.ts +2 -0
  563. package/src/funcs/vendorsExpediteTimeRemaining.ts +2 -0
  564. package/src/funcs/vendorsGetVendorCredentialDetails.ts +2 -0
  565. package/src/funcs/vendorsGetVendorCredentialFile.ts +2 -0
  566. package/src/funcs/vendorsGetVendorInvoiceDetails.ts +2 -0
  567. package/src/funcs/vendorsGetVendorLegalName.ts +174 -0
  568. package/src/funcs/vendorsGetVendorsDetails.ts +2 -0
  569. package/src/funcs/vendorsListVendorAdditionalFacilityFields.ts +2 -0
  570. package/src/funcs/vendorsListVendorCredentialDataRequests.ts +203 -0
  571. package/src/funcs/vendorsListVendorCredentialFiles.ts +2 -0
  572. package/src/funcs/vendorsListVendorCredentialHistory.ts +2 -0
  573. package/src/funcs/vendorsListVendorCredentials.ts +2 -0
  574. package/src/funcs/vendorsListVendorCredits.ts +2 -0
  575. package/src/funcs/vendorsListVendorFacilityStatuses.ts +2 -0
  576. package/src/funcs/vendorsListVendorInvoices.ts +2 -0
  577. package/src/funcs/vendorsListVendorJobTitles.ts +2 -0
  578. package/src/funcs/vendorsListVendorManagedByCompanies.ts +2 -0
  579. package/src/funcs/vendorsListVendorScrubDetails.ts +2 -0
  580. package/src/funcs/vendorsListVendorScrubPackages.ts +2 -0
  581. package/src/funcs/vendorsListVendorScrubPurchases.ts +2 -0
  582. package/src/funcs/vendorsPurchaseScrubCredits.ts +2 -0
  583. package/src/funcs/vendorsSubmitVendorCredential.ts +2 -0
  584. package/src/funcs/vendorsUpdateVendorCredentialFile.ts +2 -0
  585. package/src/funcs/vendorsUpdateVendorDetails.ts +2 -0
  586. package/src/funcs/vendorsUpdateVendorManagedByCompany.ts +2 -0
  587. package/src/funcs/vendorsUpdateVendorScrubDetails.ts +2 -0
  588. package/src/funcs/webhooksGetWebhookEndpoint.ts +2 -0
  589. package/src/funcs/webhooksListAllWebhookEndpoints.ts +2 -0
  590. package/src/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts +2 -0
  591. package/src/funcs/zonesListOrSearchSecurityZones.ts +2 -0
  592. package/src/funcs/zonesSecurityZoneCheckin.ts +2 -0
  593. package/src/hooks/types.ts +2 -0
  594. package/src/index.extras.ts +1 -3
  595. package/src/index.ts +2 -0
  596. package/src/lib/config.ts +7 -3
  597. package/src/lib/sdks.ts +10 -4
  598. package/src/mcp-server/mcp-server.ts +1 -1
  599. package/src/mcp-server/server.ts +15 -1
  600. package/src/mcp-server/tools/dataRequestsAddDataRequestFile.ts +38 -0
  601. package/src/mcp-server/tools/dataRequestsDeleteDataRequestFile.ts +39 -0
  602. package/src/mcp-server/tools/dataRequestsUpdateDataRequest.ts +37 -0
  603. package/src/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.ts +39 -0
  604. package/src/mcp-server/tools/vendorsCreateOrUpdateBcr.ts +37 -0
  605. package/src/mcp-server/tools/vendorsGetVendorLegalName.ts +37 -0
  606. package/src/mcp-server/tools/vendorsListVendorCredentialDataRequests.ts +44 -0
  607. package/src/models/components/expand.ts +4 -0
  608. package/src/models/operations/adddatarequestfile.ts +166 -0
  609. package/src/models/operations/createnewvendorcredentialversion.ts +166 -0
  610. package/src/models/operations/createorupdatebcr.ts +214 -0
  611. package/src/models/operations/deletedatarequestfile.ts +71 -0
  612. package/src/models/operations/getvendorlegalname.ts +161 -0
  613. package/src/models/operations/index.ts +7 -0
  614. package/src/models/operations/listvendorcredentialdatarequests.ts +127 -0
  615. package/src/models/operations/updatedatarequest.ts +142 -0
  616. package/src/react-query/dataRequestsAddDataRequestFile.ts +92 -0
  617. package/src/react-query/dataRequestsDeleteDataRequestFile.ts +92 -0
  618. package/src/react-query/dataRequestsUpdateDataRequest.ts +92 -0
  619. package/src/react-query/index.ts +7 -0
  620. package/src/react-query/vendorsCreateNewVendorCredentialVersion.ts +93 -0
  621. package/src/react-query/vendorsCreateOrUpdateBcr.ts +88 -0
  622. package/src/react-query/vendorsGetVendorLegalName.ts +165 -0
  623. package/src/react-query/vendorsListVendorCredentialDataRequests.ts +222 -0
  624. package/src/sdk/datarequests.ts +63 -0
  625. package/src/sdk/sdk.ts +6 -0
  626. package/src/sdk/vendors.ts +77 -0
package/bin/mcp-server.js CHANGED
@@ -34236,9 +34236,9 @@ var init_config = __esm(() => {
34236
34236
  SDK_METADATA = {
34237
34237
  language: "typescript",
34238
34238
  openapiDocVersion: "0.0.3",
34239
- sdkVersion: "0.31.17",
34240
- genVersion: "2.610.0",
34241
- userAgent: "speakeasy-sdk/typescript 0.31.17 2.610.0 0.0.3 @greensecurity/javascript-sdk"
34239
+ sdkVersion: "0.35.1",
34240
+ genVersion: "2.618.0",
34241
+ userAgent: "speakeasy-sdk/typescript 0.35.1 2.618.0 0.0.3 @greensecurity/javascript-sdk"
34242
34242
  };
34243
34243
  });
34244
34244
 
@@ -34804,7 +34804,6 @@ class ClientSDK {
34804
34804
  } else {
34805
34805
  this.#hooks = new SDKHooks;
34806
34806
  }
34807
- this._options = { ...options, hooks: this.#hooks };
34808
34807
  const url = serverURLFromOptions(options);
34809
34808
  if (url) {
34810
34809
  url.pathname = url.pathname.replace(/\/+$/, "") + "/";
@@ -34815,7 +34814,8 @@ class ClientSDK {
34815
34814
  });
34816
34815
  this._baseURL = baseURL;
34817
34816
  this.#httpClient = client;
34818
- this.#logger = options.debugLogger;
34817
+ this._options = { ...options, hooks: this.#hooks };
34818
+ this.#logger = this._options.debugLogger;
34819
34819
  if (!this.#logger && env().GREEN_SECURITY_DEBUG) {
34820
34820
  this.#logger = console;
34821
34821
  }
@@ -34869,7 +34869,7 @@ class ClientSDK {
34869
34869
  headers.set(k2, v2);
34870
34870
  }
34871
34871
  if (!isBrowserLike) {
34872
- headers.set(conf.uaHeader ?? "user-agent", SDK_METADATA.userAgent);
34872
+ headers.set(conf.uaHeader ?? "user-agent", conf.userAgent ?? SDK_METADATA.userAgent);
34873
34873
  }
34874
34874
  const fetchOptions = {
34875
34875
  ...options?.fetchOptions,
@@ -36820,7 +36820,9 @@ var init_expand = __esm(() => {
36820
36820
  VendorCredentialCredentialVariants: "vendor_credential.credential_variants",
36821
36821
  VendorCredentialTargetsChop: "vendor_credential.targets_chop",
36822
36822
  VendorCredentialFileVendorCredential: "vendor_credential_file.vendor_credential",
36823
- VendorCredentialFileCredentialDocument: "vendor_credential_file.credential_document"
36823
+ VendorCredentialFileCredentialDocument: "vendor_credential_file.credential_document",
36824
+ VendorCredentialDataRequestVendorCredential: "vendor_credential_data_request.vendor_credential",
36825
+ VendorCredentialDataRequestDataRequest: "vendor_credential_data_request.data_request"
36824
36826
  };
36825
36827
  Expand$inboundSchema = nativeEnumType(Expand);
36826
36828
  Expand$outboundSchema = Expand$inboundSchema;
@@ -40175,6 +40177,60 @@ var init_components = __esm(() => {
40175
40177
  init_zoneconfig();
40176
40178
  });
40177
40179
 
40180
+ // src/models/operations/adddatarequestfile.ts
40181
+ var AddDataRequestFileRequestBody$inboundSchema, AddDataRequestFileRequestBody$outboundSchema, AddDataRequestFileRequestBody$, AddDataRequestFileRequest$inboundSchema, AddDataRequestFileRequest$outboundSchema, AddDataRequestFileRequest$;
40182
+ var init_adddatarequestfile = __esm(() => {
40183
+ init_esm();
40184
+ init_primitives();
40185
+ init_components();
40186
+ AddDataRequestFileRequestBody$inboundSchema = objectType({
40187
+ file_name: stringType().optional(),
40188
+ content_type: ContentType$inboundSchema.optional(),
40189
+ file_size: numberType().int().optional()
40190
+ }).transform((v2) => {
40191
+ return remap(v2, {
40192
+ file_name: "fileName",
40193
+ content_type: "contentType",
40194
+ file_size: "fileSize"
40195
+ });
40196
+ });
40197
+ AddDataRequestFileRequestBody$outboundSchema = objectType({
40198
+ fileName: stringType().optional(),
40199
+ contentType: ContentType$outboundSchema.optional(),
40200
+ fileSize: numberType().int().optional()
40201
+ }).transform((v2) => {
40202
+ return remap(v2, {
40203
+ fileName: "file_name",
40204
+ contentType: "content_type",
40205
+ fileSize: "file_size"
40206
+ });
40207
+ });
40208
+ ((AddDataRequestFileRequestBody$) => {
40209
+ AddDataRequestFileRequestBody$.inboundSchema = AddDataRequestFileRequestBody$inboundSchema;
40210
+ AddDataRequestFileRequestBody$.outboundSchema = AddDataRequestFileRequestBody$outboundSchema;
40211
+ })(AddDataRequestFileRequestBody$ ||= {});
40212
+ AddDataRequestFileRequest$inboundSchema = objectType({
40213
+ id: numberType().int(),
40214
+ RequestBody: lazyType(() => AddDataRequestFileRequestBody$inboundSchema)
40215
+ }).transform((v2) => {
40216
+ return remap(v2, {
40217
+ RequestBody: "requestBody"
40218
+ });
40219
+ });
40220
+ AddDataRequestFileRequest$outboundSchema = objectType({
40221
+ id: numberType().int(),
40222
+ requestBody: lazyType(() => AddDataRequestFileRequestBody$outboundSchema)
40223
+ }).transform((v2) => {
40224
+ return remap(v2, {
40225
+ requestBody: "RequestBody"
40226
+ });
40227
+ });
40228
+ ((AddDataRequestFileRequest$) => {
40229
+ AddDataRequestFileRequest$.inboundSchema = AddDataRequestFileRequest$inboundSchema;
40230
+ AddDataRequestFileRequest$.outboundSchema = AddDataRequestFileRequest$outboundSchema;
40231
+ })(AddDataRequestFileRequest$ ||= {});
40232
+ });
40233
+
40178
40234
  // src/models/operations/addvendorcredentialfile.ts
40179
40235
  var AddVendorCredentialFileRequestBody$inboundSchema, AddVendorCredentialFileRequestBody$outboundSchema, AddVendorCredentialFileRequestBody$, AddVendorCredentialFileRequest$inboundSchema, AddVendorCredentialFileRequest$outboundSchema, AddVendorCredentialFileRequest$, AddVendorCredentialFileResponseBody$inboundSchema, AddVendorCredentialFileResponseBody$outboundSchema, AddVendorCredentialFileResponseBody$;
40180
40236
  var init_addvendorcredentialfile = __esm(() => {
@@ -40365,6 +40421,117 @@ var init_changepassword = __esm(() => {
40365
40421
  })(ChangePasswordChangePasswordOk$ ||= {});
40366
40422
  });
40367
40423
 
40424
+ // src/models/operations/createnewvendorcredentialversion.ts
40425
+ var CreateNewVendorCredentialVersionRequestBody$inboundSchema, CreateNewVendorCredentialVersionRequestBody$outboundSchema, CreateNewVendorCredentialVersionRequestBody$, CreateNewVendorCredentialVersionResponseBody$inboundSchema, CreateNewVendorCredentialVersionResponseBody$outboundSchema, CreateNewVendorCredentialVersionResponseBody$;
40426
+ var init_createnewvendorcredentialversion = __esm(() => {
40427
+ init_esm();
40428
+ init_primitives();
40429
+ CreateNewVendorCredentialVersionRequestBody$inboundSchema = objectType({
40430
+ vendor_credential_id: numberType().int()
40431
+ }).transform((v2) => {
40432
+ return remap(v2, {
40433
+ vendor_credential_id: "vendorCredentialId"
40434
+ });
40435
+ });
40436
+ CreateNewVendorCredentialVersionRequestBody$outboundSchema = objectType({
40437
+ vendorCredentialId: numberType().int()
40438
+ }).transform((v2) => {
40439
+ return remap(v2, {
40440
+ vendorCredentialId: "vendor_credential_id"
40441
+ });
40442
+ });
40443
+ ((CreateNewVendorCredentialVersionRequestBody$) => {
40444
+ CreateNewVendorCredentialVersionRequestBody$.inboundSchema = CreateNewVendorCredentialVersionRequestBody$inboundSchema;
40445
+ CreateNewVendorCredentialVersionRequestBody$.outboundSchema = CreateNewVendorCredentialVersionRequestBody$outboundSchema;
40446
+ })(CreateNewVendorCredentialVersionRequestBody$ ||= {});
40447
+ CreateNewVendorCredentialVersionResponseBody$inboundSchema = objectType({
40448
+ id: numberType().int().optional(),
40449
+ success: booleanType().optional()
40450
+ });
40451
+ CreateNewVendorCredentialVersionResponseBody$outboundSchema = objectType({
40452
+ id: numberType().int().optional(),
40453
+ success: booleanType().optional()
40454
+ });
40455
+ ((CreateNewVendorCredentialVersionResponseBody$) => {
40456
+ CreateNewVendorCredentialVersionResponseBody$.inboundSchema = CreateNewVendorCredentialVersionResponseBody$inboundSchema;
40457
+ CreateNewVendorCredentialVersionResponseBody$.outboundSchema = CreateNewVendorCredentialVersionResponseBody$outboundSchema;
40458
+ })(CreateNewVendorCredentialVersionResponseBody$ ||= {});
40459
+ });
40460
+
40461
+ // src/models/operations/createorupdatebcr.ts
40462
+ var DeliveryMethod2, DeliveryMethod$inboundSchema2, DeliveryMethod$outboundSchema2, DeliveryMethod$2, CreateOrUpdateBcrRequestBody$inboundSchema, CreateOrUpdateBcrRequestBody$outboundSchema, CreateOrUpdateBcrRequestBody$, CreateOrUpdateBcrRequest$inboundSchema, CreateOrUpdateBcrRequest$outboundSchema, CreateOrUpdateBcrRequest$;
40463
+ var init_createorupdatebcr = __esm(() => {
40464
+ init_esm();
40465
+ init_primitives();
40466
+ init_components();
40467
+ DeliveryMethod2 = {
40468
+ Email: "email",
40469
+ Mail: "mail"
40470
+ };
40471
+ DeliveryMethod$inboundSchema2 = nativeEnumType(DeliveryMethod2);
40472
+ DeliveryMethod$outboundSchema2 = DeliveryMethod$inboundSchema2;
40473
+ ((DeliveryMethod$) => {
40474
+ DeliveryMethod$.inboundSchema = DeliveryMethod$inboundSchema2;
40475
+ DeliveryMethod$.outboundSchema = DeliveryMethod$outboundSchema2;
40476
+ })(DeliveryMethod$2 ||= {});
40477
+ CreateOrUpdateBcrRequestBody$inboundSchema = objectType({
40478
+ electronic_signature: stringType().optional(),
40479
+ delivery_method: DeliveryMethod$inboundSchema2.optional(),
40480
+ email: stringType().optional(),
40481
+ address1: stringType().optional(),
40482
+ address2: stringType().optional(),
40483
+ city: stringType().optional(),
40484
+ state: nullableType(State$inboundSchema).optional(),
40485
+ zip: stringType().optional()
40486
+ }).transform((v2) => {
40487
+ return remap(v2, {
40488
+ electronic_signature: "electronicSignature",
40489
+ delivery_method: "deliveryMethod"
40490
+ });
40491
+ });
40492
+ CreateOrUpdateBcrRequestBody$outboundSchema = objectType({
40493
+ electronicSignature: stringType().optional(),
40494
+ deliveryMethod: DeliveryMethod$outboundSchema2.optional(),
40495
+ email: stringType().optional(),
40496
+ address1: stringType().optional(),
40497
+ address2: stringType().optional(),
40498
+ city: stringType().optional(),
40499
+ state: nullableType(State$outboundSchema).optional(),
40500
+ zip: stringType().optional()
40501
+ }).transform((v2) => {
40502
+ return remap(v2, {
40503
+ electronicSignature: "electronic_signature",
40504
+ deliveryMethod: "delivery_method"
40505
+ });
40506
+ });
40507
+ ((CreateOrUpdateBcrRequestBody$) => {
40508
+ CreateOrUpdateBcrRequestBody$.inboundSchema = CreateOrUpdateBcrRequestBody$inboundSchema;
40509
+ CreateOrUpdateBcrRequestBody$.outboundSchema = CreateOrUpdateBcrRequestBody$outboundSchema;
40510
+ })(CreateOrUpdateBcrRequestBody$ ||= {});
40511
+ CreateOrUpdateBcrRequest$inboundSchema = objectType({
40512
+ vendor_credential_id: numberType().int(),
40513
+ RequestBody: lazyType(() => CreateOrUpdateBcrRequestBody$inboundSchema)
40514
+ }).transform((v2) => {
40515
+ return remap(v2, {
40516
+ vendor_credential_id: "vendorCredentialId",
40517
+ RequestBody: "requestBody"
40518
+ });
40519
+ });
40520
+ CreateOrUpdateBcrRequest$outboundSchema = objectType({
40521
+ vendorCredentialId: numberType().int(),
40522
+ requestBody: lazyType(() => CreateOrUpdateBcrRequestBody$outboundSchema)
40523
+ }).transform((v2) => {
40524
+ return remap(v2, {
40525
+ vendorCredentialId: "vendor_credential_id",
40526
+ requestBody: "RequestBody"
40527
+ });
40528
+ });
40529
+ ((CreateOrUpdateBcrRequest$) => {
40530
+ CreateOrUpdateBcrRequest$.inboundSchema = CreateOrUpdateBcrRequest$inboundSchema;
40531
+ CreateOrUpdateBcrRequest$.outboundSchema = CreateOrUpdateBcrRequest$outboundSchema;
40532
+ })(CreateOrUpdateBcrRequest$ ||= {});
40533
+ });
40534
+
40368
40535
  // src/models/operations/createvendorcompany.ts
40369
40536
  var CreateVendorCompanyRequestBody$inboundSchema, CreateVendorCompanyRequestBody$outboundSchema, CreateVendorCompanyRequestBody$, CreateVendorCompanyRequest$inboundSchema, CreateVendorCompanyRequest$outboundSchema, CreateVendorCompanyRequest$, CreateVendorCompanyResponseBody$inboundSchema, CreateVendorCompanyResponseBody$outboundSchema, CreateVendorCompanyResponseBody$;
40370
40537
  var init_createvendorcompany = __esm(() => {
@@ -40505,6 +40672,22 @@ var init_declinevendorcredential = __esm(() => {
40505
40672
  })(DeclineVendorCredentialRequest$ ||= {});
40506
40673
  });
40507
40674
 
40675
+ // src/models/operations/deletedatarequestfile.ts
40676
+ var DeleteDataRequestFileRequest$inboundSchema, DeleteDataRequestFileRequest$outboundSchema, DeleteDataRequestFileRequest$;
40677
+ var init_deletedatarequestfile = __esm(() => {
40678
+ init_esm();
40679
+ DeleteDataRequestFileRequest$inboundSchema = objectType({
40680
+ id: numberType().int()
40681
+ });
40682
+ DeleteDataRequestFileRequest$outboundSchema = objectType({
40683
+ id: numberType().int()
40684
+ });
40685
+ ((DeleteDataRequestFileRequest$) => {
40686
+ DeleteDataRequestFileRequest$.inboundSchema = DeleteDataRequestFileRequest$inboundSchema;
40687
+ DeleteDataRequestFileRequest$.outboundSchema = DeleteDataRequestFileRequest$outboundSchema;
40688
+ })(DeleteDataRequestFileRequest$ ||= {});
40689
+ });
40690
+
40508
40691
  // src/models/operations/deletevendorcredentialfile.ts
40509
40692
  var DeleteVendorCredentialFileRequest$inboundSchema, DeleteVendorCredentialFileRequest$outboundSchema, DeleteVendorCredentialFileRequest$;
40510
40693
  var init_deletevendorcredentialfile = __esm(() => {
@@ -40780,6 +40963,57 @@ var init_getvendorinvoicedetails = __esm(() => {
40780
40963
  })(GetVendorInvoiceDetailsRequest$ ||= {});
40781
40964
  });
40782
40965
 
40966
+ // src/models/operations/getvendorlegalname.ts
40967
+ var GetVendorLegalNameRequest$inboundSchema, GetVendorLegalNameRequest$outboundSchema, GetVendorLegalNameRequest$, GetVendorLegalNameResponseBody$inboundSchema, GetVendorLegalNameResponseBody$outboundSchema, GetVendorLegalNameResponseBody$;
40968
+ var init_getvendorlegalname = __esm(() => {
40969
+ init_esm();
40970
+ init_primitives();
40971
+ GetVendorLegalNameRequest$inboundSchema = objectType({
40972
+ vendor_id_or_me: stringType()
40973
+ }).transform((v2) => {
40974
+ return remap(v2, {
40975
+ vendor_id_or_me: "vendorIdOrMe"
40976
+ });
40977
+ });
40978
+ GetVendorLegalNameRequest$outboundSchema = objectType({
40979
+ vendorIdOrMe: stringType()
40980
+ }).transform((v2) => {
40981
+ return remap(v2, {
40982
+ vendorIdOrMe: "vendor_id_or_me"
40983
+ });
40984
+ });
40985
+ ((GetVendorLegalNameRequest$) => {
40986
+ GetVendorLegalNameRequest$.inboundSchema = GetVendorLegalNameRequest$inboundSchema;
40987
+ GetVendorLegalNameRequest$.outboundSchema = GetVendorLegalNameRequest$outboundSchema;
40988
+ })(GetVendorLegalNameRequest$ ||= {});
40989
+ GetVendorLegalNameResponseBody$inboundSchema = objectType({
40990
+ first_name: stringType().optional(),
40991
+ middle_name: nullableType(stringType()).optional(),
40992
+ last_name: stringType().optional()
40993
+ }).transform((v2) => {
40994
+ return remap(v2, {
40995
+ first_name: "firstName",
40996
+ middle_name: "middleName",
40997
+ last_name: "lastName"
40998
+ });
40999
+ });
41000
+ GetVendorLegalNameResponseBody$outboundSchema = objectType({
41001
+ firstName: stringType().optional(),
41002
+ middleName: nullableType(stringType()).optional(),
41003
+ lastName: stringType().optional()
41004
+ }).transform((v2) => {
41005
+ return remap(v2, {
41006
+ firstName: "first_name",
41007
+ middleName: "middle_name",
41008
+ lastName: "last_name"
41009
+ });
41010
+ });
41011
+ ((GetVendorLegalNameResponseBody$) => {
41012
+ GetVendorLegalNameResponseBody$.inboundSchema = GetVendorLegalNameResponseBody$inboundSchema;
41013
+ GetVendorLegalNameResponseBody$.outboundSchema = GetVendorLegalNameResponseBody$outboundSchema;
41014
+ })(GetVendorLegalNameResponseBody$ ||= {});
41015
+ });
41016
+
40783
41017
  // src/models/operations/getvendorsdetails.ts
40784
41018
  var GetVendorsDetailsRequest$inboundSchema, GetVendorsDetailsRequest$outboundSchema, GetVendorsDetailsRequest$;
40785
41019
  var init_getvendorsdetails = __esm(() => {
@@ -41232,6 +41466,44 @@ var init_listvendoradditionalfacilityfields = __esm(() => {
41232
41466
  })(ListVendorAdditionalFacilityFieldsResponse$ ||= {});
41233
41467
  });
41234
41468
 
41469
+ // src/models/operations/listvendorcredentialdatarequests.ts
41470
+ var ListVendorCredentialDataRequestsRequest$inboundSchema, ListVendorCredentialDataRequestsRequest$outboundSchema, ListVendorCredentialDataRequestsRequest$;
41471
+ var init_listvendorcredentialdatarequests = __esm(() => {
41472
+ init_esm();
41473
+ init_primitives();
41474
+ init_components();
41475
+ ListVendorCredentialDataRequestsRequest$inboundSchema = objectType({
41476
+ sort: nullableType(stringType()).optional(),
41477
+ desc: Desc$inboundSchema.optional(),
41478
+ page: numberType().int().optional(),
41479
+ items_per_page: numberType().int().optional(),
41480
+ vendor_credential_id: numberType().int(),
41481
+ expand: arrayType(Expand$inboundSchema).optional()
41482
+ }).transform((v2) => {
41483
+ return remap(v2, {
41484
+ items_per_page: "itemsPerPage",
41485
+ vendor_credential_id: "vendorCredentialId"
41486
+ });
41487
+ });
41488
+ ListVendorCredentialDataRequestsRequest$outboundSchema = objectType({
41489
+ sort: nullableType(stringType()).optional(),
41490
+ desc: Desc$outboundSchema.optional(),
41491
+ page: numberType().int().optional(),
41492
+ itemsPerPage: numberType().int().optional(),
41493
+ vendorCredentialId: numberType().int(),
41494
+ expand: arrayType(Expand$outboundSchema).optional()
41495
+ }).transform((v2) => {
41496
+ return remap(v2, {
41497
+ itemsPerPage: "items_per_page",
41498
+ vendorCredentialId: "vendor_credential_id"
41499
+ });
41500
+ });
41501
+ ((ListVendorCredentialDataRequestsRequest$) => {
41502
+ ListVendorCredentialDataRequestsRequest$.inboundSchema = ListVendorCredentialDataRequestsRequest$inboundSchema;
41503
+ ListVendorCredentialDataRequestsRequest$.outboundSchema = ListVendorCredentialDataRequestsRequest$outboundSchema;
41504
+ })(ListVendorCredentialDataRequestsRequest$ ||= {});
41505
+ });
41506
+
41235
41507
  // src/models/operations/listvendorcredentialfiles.ts
41236
41508
  var ListVendorCredentialFilesRequest$inboundSchema, ListVendorCredentialFilesRequest$outboundSchema, ListVendorCredentialFilesRequest$;
41237
41509
  var init_listvendorcredentialfiles = __esm(() => {
@@ -42517,6 +42789,43 @@ var init_submitvendorcredential = __esm(() => {
42517
42789
  })(SubmitVendorCredentialRequest$ ||= {});
42518
42790
  });
42519
42791
 
42792
+ // src/models/operations/updatedatarequest.ts
42793
+ var UpdateDataRequestRequestBody$inboundSchema, UpdateDataRequestRequestBody$outboundSchema, UpdateDataRequestRequestBody$, UpdateDataRequestRequest$inboundSchema, UpdateDataRequestRequest$outboundSchema, UpdateDataRequestRequest$;
42794
+ var init_updatedatarequest = __esm(() => {
42795
+ init_esm();
42796
+ init_primitives();
42797
+ UpdateDataRequestRequestBody$inboundSchema = objectType({
42798
+ value: stringType().optional()
42799
+ });
42800
+ UpdateDataRequestRequestBody$outboundSchema = objectType({
42801
+ value: stringType().optional()
42802
+ });
42803
+ ((UpdateDataRequestRequestBody$) => {
42804
+ UpdateDataRequestRequestBody$.inboundSchema = UpdateDataRequestRequestBody$inboundSchema;
42805
+ UpdateDataRequestRequestBody$.outboundSchema = UpdateDataRequestRequestBody$outboundSchema;
42806
+ })(UpdateDataRequestRequestBody$ ||= {});
42807
+ UpdateDataRequestRequest$inboundSchema = objectType({
42808
+ id: numberType().int(),
42809
+ RequestBody: lazyType(() => UpdateDataRequestRequestBody$inboundSchema)
42810
+ }).transform((v2) => {
42811
+ return remap(v2, {
42812
+ RequestBody: "requestBody"
42813
+ });
42814
+ });
42815
+ UpdateDataRequestRequest$outboundSchema = objectType({
42816
+ id: numberType().int(),
42817
+ requestBody: lazyType(() => UpdateDataRequestRequestBody$outboundSchema)
42818
+ }).transform((v2) => {
42819
+ return remap(v2, {
42820
+ requestBody: "RequestBody"
42821
+ });
42822
+ });
42823
+ ((UpdateDataRequestRequest$) => {
42824
+ UpdateDataRequestRequest$.inboundSchema = UpdateDataRequestRequest$inboundSchema;
42825
+ UpdateDataRequestRequest$.outboundSchema = UpdateDataRequestRequest$outboundSchema;
42826
+ })(UpdateDataRequestRequest$ ||= {});
42827
+ });
42828
+
42520
42829
  // src/models/operations/updatesthewebhookendpointwiththegivenid.ts
42521
42830
  var UpdatesTheWebhookEndpointWithTheGivenIdRequest$inboundSchema, UpdatesTheWebhookEndpointWithTheGivenIdRequest$outboundSchema, UpdatesTheWebhookEndpointWithTheGivenIdRequest$;
42522
42831
  var init_updatesthewebhookendpointwiththegivenid = __esm(() => {
@@ -42877,12 +43186,16 @@ var init_vendorscanout = __esm(() => {
42877
43186
 
42878
43187
  // src/models/operations/index.ts
42879
43188
  var init_operations = __esm(() => {
43189
+ init_adddatarequestfile();
42880
43190
  init_addvendorcredentialfile();
42881
43191
  init_addvendormanagedbycompany();
42882
43192
  init_changepassword();
43193
+ init_createnewvendorcredentialversion();
43194
+ init_createorupdatebcr();
42883
43195
  init_createvendorcompany();
42884
43196
  init_createvendorregistration();
42885
43197
  init_declinevendorcredential();
43198
+ init_deletedatarequestfile();
42886
43199
  init_deletevendorcredentialfile();
42887
43200
  init_deletevendormanagedbycompany();
42888
43201
  init_expeditetimeremaining();
@@ -42892,6 +43205,7 @@ var init_operations = __esm(() => {
42892
43205
  init_getvendorcredentialdetails();
42893
43206
  init_getvendorcredentialfile();
42894
43207
  init_getvendorinvoicedetails();
43208
+ init_getvendorlegalname();
42895
43209
  init_getvendorsdetails();
42896
43210
  init_getwebhookendpoint();
42897
43211
  init_listallwebhookendpoints();
@@ -42900,6 +43214,7 @@ var init_operations = __esm(() => {
42900
43214
  init_listorsearchsecurityzones();
42901
43215
  init_listorsearchsupportarticles();
42902
43216
  init_listvendoradditionalfacilityfields();
43217
+ init_listvendorcredentialdatarequests();
42903
43218
  init_listvendorcredentialfiles();
42904
43219
  init_listvendorcredentialhistory();
42905
43220
  init_listvendorcredentials();
@@ -42918,6 +43233,7 @@ var init_operations = __esm(() => {
42918
43233
  init_purchasescrubcredits();
42919
43234
  init_securityzonecheckin();
42920
43235
  init_submitvendorcredential();
43236
+ init_updatedatarequest();
42921
43237
  init_updatesthewebhookendpointwiththegivenid();
42922
43238
  init_updatevendorcredentialfile();
42923
43239
  init_updatevendordetails();
@@ -43009,6 +43325,7 @@ async function $do(client, request, options) {
43009
43325
  const securityInput = await extractSecurity(client._options.security);
43010
43326
  const requestSecurity = resolveGlobalSecurity(securityInput);
43011
43327
  const context = {
43328
+ options: client._options,
43012
43329
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43013
43330
  operationID: "listOrSearchCompanies",
43014
43331
  oAuth2Scopes: [],
@@ -43025,6 +43342,7 @@ async function $do(client, request, options) {
43025
43342
  headers,
43026
43343
  query,
43027
43344
  body,
43345
+ userAgent: client._options.userAgent,
43028
43346
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43029
43347
  }, options);
43030
43348
  if (!requestRes.ok) {
@@ -43123,32 +43441,34 @@ List or search companies.`,
43123
43441
  };
43124
43442
  });
43125
43443
 
43126
- // src/funcs/organizationsGetFacility.ts
43127
- function organizationsGetFacility(client, request, options) {
43444
+ // src/funcs/dataRequestsAddDataRequestFile.ts
43445
+ function dataRequestsAddDataRequestFile(client, request, options) {
43128
43446
  return new APIPromise($do2(client, request, options));
43129
43447
  }
43130
43448
  async function $do2(client, request, options) {
43131
- const parsed = safeParse(request, (value) => GetFacilityRequest$outboundSchema.parse(value), "Input validation failed");
43449
+ const parsed = safeParse(request, (value) => AddDataRequestFileRequest$outboundSchema.parse(value), "Input validation failed");
43132
43450
  if (!parsed.ok) {
43133
43451
  return [parsed, { status: "invalid" }];
43134
43452
  }
43135
43453
  const payload = parsed.value;
43136
- const body = null;
43454
+ const body = encodeJSON("body", payload.RequestBody, { explode: true });
43137
43455
  const pathParams = {
43138
43456
  id: encodeSimple("id", payload.id, {
43139
43457
  explode: false,
43140
43458
  charEncoding: "percent"
43141
43459
  })
43142
43460
  };
43143
- const path = pathToFunc("/facilities/{id}")(pathParams);
43461
+ const path = pathToFunc("/data_requests/{id}/file")(pathParams);
43144
43462
  const headers = new Headers(compactMap({
43463
+ "Content-Type": "application/json",
43145
43464
  Accept: "application/json"
43146
43465
  }));
43147
43466
  const securityInput = await extractSecurity(client._options.security);
43148
43467
  const requestSecurity = resolveGlobalSecurity(securityInput);
43149
43468
  const context = {
43469
+ options: client._options,
43150
43470
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43151
- operationID: "getFacility",
43471
+ operationID: "addDataRequestFile",
43152
43472
  oAuth2Scopes: [],
43153
43473
  resolvedSecurity: requestSecurity,
43154
43474
  securitySource: client._options.security,
@@ -43157,11 +43477,12 @@ async function $do2(client, request, options) {
43157
43477
  };
43158
43478
  const requestRes = client._createRequest(context, {
43159
43479
  security: requestSecurity,
43160
- method: "GET",
43480
+ method: "POST",
43161
43481
  baseURL: options?.serverURL,
43162
43482
  path,
43163
43483
  headers,
43164
43484
  body,
43485
+ userAgent: client._options.userAgent,
43165
43486
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43166
43487
  }, options);
43167
43488
  if (!requestRes.ok) {
@@ -43170,7 +43491,7 @@ async function $do2(client, request, options) {
43170
43491
  const req = requestRes.value;
43171
43492
  const doResult = await client._do(req, {
43172
43493
  context,
43173
- errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
43494
+ errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
43174
43495
  retryConfig: context.retryConfig,
43175
43496
  retryCodes: context.retryCodes
43176
43497
  });
@@ -43181,42 +43502,42 @@ async function $do2(client, request, options) {
43181
43502
  const responseFields = {
43182
43503
  HttpMeta: { Response: response, Request: req }
43183
43504
  };
43184
- const [result] = await match(json(200, Facility$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43505
+ const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43185
43506
  if (!result.ok) {
43186
43507
  return [result, { status: "complete", request: req, response }];
43187
43508
  }
43188
43509
  return [result, { status: "complete", request: req, response }];
43189
43510
  }
43190
- var init_organizationsGetFacility = __esm(() => {
43511
+ var init_dataRequestsAddDataRequestFile = __esm(() => {
43512
+ init_esm();
43191
43513
  init_encodings();
43192
43514
  init_matchers();
43193
43515
  init_primitives();
43194
43516
  init_schemas();
43195
43517
  init_security();
43196
43518
  init_url();
43197
- init_components();
43198
43519
  init_errors2();
43199
43520
  init_operations();
43200
43521
  init_async();
43201
43522
  });
43202
43523
 
43203
- // src/mcp-server/tools/organizationsGetFacility.ts
43204
- var args2, tool$organizationsGetFacility;
43205
- var init_organizationsGetFacility2 = __esm(() => {
43206
- init_organizationsGetFacility();
43524
+ // src/mcp-server/tools/dataRequestsAddDataRequestFile.ts
43525
+ var args2, tool$dataRequestsAddDataRequestFile;
43526
+ var init_dataRequestsAddDataRequestFile2 = __esm(() => {
43527
+ init_dataRequestsAddDataRequestFile();
43207
43528
  init_operations();
43208
43529
  init_tools();
43209
43530
  args2 = {
43210
- request: GetFacilityRequest$inboundSchema
43531
+ request: AddDataRequestFileRequest$inboundSchema
43211
43532
  };
43212
- tool$organizationsGetFacility = {
43213
- name: "organizations-get-facility",
43214
- description: `Get facility
43533
+ tool$dataRequestsAddDataRequestFile = {
43534
+ name: "data-requests-add-data-request-file",
43535
+ description: `Add vendor credential data request
43215
43536
 
43216
- Retrieve an individual facility.`,
43537
+ It will set the vendor credential data request file attributes`,
43217
43538
  args: args2,
43218
43539
  tool: async (client, args3, ctx) => {
43219
- const [result, apiCall] = await organizationsGetFacility(client, args3.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43540
+ const [result, apiCall] = await dataRequestsAddDataRequestFile(client, args3.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43220
43541
  if (!result.ok) {
43221
43542
  return {
43222
43543
  content: [{ type: "text", text: result.error.message }],
@@ -43229,40 +43550,33 @@ Retrieve an individual facility.`,
43229
43550
  };
43230
43551
  });
43231
43552
 
43232
- // src/funcs/organizationsListOrSearchFacilities.ts
43233
- function organizationsListOrSearchFacilities(client, request, options) {
43553
+ // src/funcs/dataRequestsDeleteDataRequestFile.ts
43554
+ function dataRequestsDeleteDataRequestFile(client, request, options) {
43234
43555
  return new APIPromise($do3(client, request, options));
43235
43556
  }
43236
43557
  async function $do3(client, request, options) {
43237
- const parsed = safeParse(request, (value) => ListOrSearchFacilitiesRequest$outboundSchema.parse(value), "Input validation failed");
43558
+ const parsed = safeParse(request, (value) => DeleteDataRequestFileRequest$outboundSchema.parse(value), "Input validation failed");
43238
43559
  if (!parsed.ok) {
43239
- return [haltIterator(parsed), { status: "invalid" }];
43560
+ return [parsed, { status: "invalid" }];
43240
43561
  }
43241
43562
  const payload = parsed.value;
43242
43563
  const body = null;
43243
- const path = pathToFunc("/facilities")();
43244
- const query = queryJoin(encodeFormQuery({
43245
- expand: payload.expand
43246
- }, { explode: false }), encodeFormQuery({
43247
- active_status: payload.active_status,
43248
- desc: payload.desc,
43249
- items_per_page: payload.items_per_page,
43250
- latitude: payload.latitude,
43251
- longitude: payload.longitude,
43252
- name_like: payload.name_like,
43253
- page: payload.page,
43254
- sort: payload.sort,
43255
- state_like: payload.state_like,
43256
- system_id: payload.system_id
43257
- }));
43564
+ const pathParams = {
43565
+ id: encodeSimple("id", payload.id, {
43566
+ explode: false,
43567
+ charEncoding: "percent"
43568
+ })
43569
+ };
43570
+ const path = pathToFunc("/data_requests/{id}/file")(pathParams);
43258
43571
  const headers = new Headers(compactMap({
43259
43572
  Accept: "application/json"
43260
43573
  }));
43261
43574
  const securityInput = await extractSecurity(client._options.security);
43262
43575
  const requestSecurity = resolveGlobalSecurity(securityInput);
43263
43576
  const context = {
43577
+ options: client._options,
43264
43578
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43265
- operationID: "listOrSearchFacilities",
43579
+ operationID: "deleteDataRequestFile",
43266
43580
  oAuth2Scopes: [],
43267
43581
  resolvedSecurity: requestSecurity,
43268
43582
  securitySource: client._options.security,
@@ -43271,16 +43585,16 @@ async function $do3(client, request, options) {
43271
43585
  };
43272
43586
  const requestRes = client._createRequest(context, {
43273
43587
  security: requestSecurity,
43274
- method: "GET",
43588
+ method: "DELETE",
43275
43589
  baseURL: options?.serverURL,
43276
43590
  path,
43277
43591
  headers,
43278
- query,
43279
43592
  body,
43593
+ userAgent: client._options.userAgent,
43280
43594
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43281
43595
  }, options);
43282
43596
  if (!requestRes.ok) {
43283
- return [haltIterator(requestRes), { status: "invalid" }];
43597
+ return [requestRes, { status: "invalid" }];
43284
43598
  }
43285
43599
  const req = requestRes.value;
43286
43600
  const doResult = await client._do(req, {
@@ -43290,41 +43604,375 @@ async function $do3(client, request, options) {
43290
43604
  retryCodes: context.retryCodes
43291
43605
  });
43292
43606
  if (!doResult.ok) {
43293
- return [haltIterator(doResult), { status: "request-error", request: req }];
43607
+ return [doResult, { status: "request-error", request: req }];
43294
43608
  }
43295
43609
  const response = doResult.value;
43296
43610
  const responseFields = {
43297
43611
  HttpMeta: { Response: response, Request: req }
43298
43612
  };
43299
- const [result, raw] = await match(json(200, ListOrSearchFacilitiesResponse$inboundSchema, {
43300
- key: "Result"
43301
- }), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43613
+ const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43302
43614
  if (!result.ok) {
43303
- return [haltIterator(result), {
43304
- status: "complete",
43305
- request: req,
43306
- response
43307
- }];
43615
+ return [result, { status: "complete", request: req, response }];
43308
43616
  }
43309
- const nextFunc = (responseData) => {
43310
- const page2 = request?.page ?? 1;
43311
- const nextPage = page2 + 1;
43312
- if (!responseData) {
43313
- return { next: () => null };
43314
- }
43315
- const results = dlv(responseData, "items");
43316
- if (!Array.isArray(results) || !results.length) {
43317
- return { next: () => null };
43318
- }
43319
- const limit = request?.itemsPerPage ?? 0;
43320
- if (results.length < limit) {
43321
- return { next: () => null };
43322
- }
43323
- const nextVal = () => organizationsListOrSearchFacilities(client, {
43324
- ...request,
43325
- page: nextPage
43326
- }, options);
43327
- return { next: nextVal, "~next": { page: nextPage } };
43617
+ return [result, { status: "complete", request: req, response }];
43618
+ }
43619
+ var init_dataRequestsDeleteDataRequestFile = __esm(() => {
43620
+ init_esm();
43621
+ init_encodings();
43622
+ init_matchers();
43623
+ init_primitives();
43624
+ init_schemas();
43625
+ init_security();
43626
+ init_url();
43627
+ init_errors2();
43628
+ init_operations();
43629
+ init_async();
43630
+ });
43631
+
43632
+ // src/mcp-server/tools/dataRequestsDeleteDataRequestFile.ts
43633
+ var args3, tool$dataRequestsDeleteDataRequestFile;
43634
+ var init_dataRequestsDeleteDataRequestFile2 = __esm(() => {
43635
+ init_dataRequestsDeleteDataRequestFile();
43636
+ init_operations();
43637
+ init_tools();
43638
+ args3 = {
43639
+ request: DeleteDataRequestFileRequest$inboundSchema
43640
+ };
43641
+ tool$dataRequestsDeleteDataRequestFile = {
43642
+ name: "data-requests-delete-data-request-file",
43643
+ description: `Delete vendor credential data request file
43644
+
43645
+ It will delete the vendor credential data request file`,
43646
+ args: args3,
43647
+ tool: async (client, args4, ctx) => {
43648
+ const [result, apiCall] = await dataRequestsDeleteDataRequestFile(client, args4.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43649
+ if (!result.ok) {
43650
+ return {
43651
+ content: [{ type: "text", text: result.error.message }],
43652
+ isError: true
43653
+ };
43654
+ }
43655
+ const value = result.value;
43656
+ return formatResult(value, apiCall);
43657
+ }
43658
+ };
43659
+ });
43660
+
43661
+ // src/funcs/dataRequestsUpdateDataRequest.ts
43662
+ function dataRequestsUpdateDataRequest(client, request, options) {
43663
+ return new APIPromise($do4(client, request, options));
43664
+ }
43665
+ async function $do4(client, request, options) {
43666
+ const parsed = safeParse(request, (value) => UpdateDataRequestRequest$outboundSchema.parse(value), "Input validation failed");
43667
+ if (!parsed.ok) {
43668
+ return [parsed, { status: "invalid" }];
43669
+ }
43670
+ const payload = parsed.value;
43671
+ const body = encodeJSON("body", payload.RequestBody, { explode: true });
43672
+ const pathParams = {
43673
+ id: encodeSimple("id", payload.id, {
43674
+ explode: false,
43675
+ charEncoding: "percent"
43676
+ })
43677
+ };
43678
+ const path = pathToFunc("/data_requests/{id}")(pathParams);
43679
+ const headers = new Headers(compactMap({
43680
+ "Content-Type": "application/json",
43681
+ Accept: "application/json"
43682
+ }));
43683
+ const securityInput = await extractSecurity(client._options.security);
43684
+ const requestSecurity = resolveGlobalSecurity(securityInput);
43685
+ const context = {
43686
+ options: client._options,
43687
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
43688
+ operationID: "updateDataRequest",
43689
+ oAuth2Scopes: [],
43690
+ resolvedSecurity: requestSecurity,
43691
+ securitySource: client._options.security,
43692
+ retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
43693
+ retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
43694
+ };
43695
+ const requestRes = client._createRequest(context, {
43696
+ security: requestSecurity,
43697
+ method: "PUT",
43698
+ baseURL: options?.serverURL,
43699
+ path,
43700
+ headers,
43701
+ body,
43702
+ userAgent: client._options.userAgent,
43703
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43704
+ }, options);
43705
+ if (!requestRes.ok) {
43706
+ return [requestRes, { status: "invalid" }];
43707
+ }
43708
+ const req = requestRes.value;
43709
+ const doResult = await client._do(req, {
43710
+ context,
43711
+ errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
43712
+ retryConfig: context.retryConfig,
43713
+ retryCodes: context.retryCodes
43714
+ });
43715
+ if (!doResult.ok) {
43716
+ return [doResult, { status: "request-error", request: req }];
43717
+ }
43718
+ const response = doResult.value;
43719
+ const responseFields = {
43720
+ HttpMeta: { Response: response, Request: req }
43721
+ };
43722
+ const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43723
+ if (!result.ok) {
43724
+ return [result, { status: "complete", request: req, response }];
43725
+ }
43726
+ return [result, { status: "complete", request: req, response }];
43727
+ }
43728
+ var init_dataRequestsUpdateDataRequest = __esm(() => {
43729
+ init_esm();
43730
+ init_encodings();
43731
+ init_matchers();
43732
+ init_primitives();
43733
+ init_schemas();
43734
+ init_security();
43735
+ init_url();
43736
+ init_errors2();
43737
+ init_operations();
43738
+ init_async();
43739
+ });
43740
+
43741
+ // src/mcp-server/tools/dataRequestsUpdateDataRequest.ts
43742
+ var args4, tool$dataRequestsUpdateDataRequest;
43743
+ var init_dataRequestsUpdateDataRequest2 = __esm(() => {
43744
+ init_dataRequestsUpdateDataRequest();
43745
+ init_operations();
43746
+ init_tools();
43747
+ args4 = {
43748
+ request: UpdateDataRequestRequest$inboundSchema
43749
+ };
43750
+ tool$dataRequestsUpdateDataRequest = {
43751
+ name: "data-requests-update-data-request",
43752
+ description: `Update vendor credential data request
43753
+
43754
+ It will update the vendor credential data request attributes`,
43755
+ args: args4,
43756
+ tool: async (client, args5, ctx) => {
43757
+ const [result, apiCall] = await dataRequestsUpdateDataRequest(client, args5.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43758
+ if (!result.ok) {
43759
+ return {
43760
+ content: [{ type: "text", text: result.error.message }],
43761
+ isError: true
43762
+ };
43763
+ }
43764
+ const value = result.value;
43765
+ return formatResult(value, apiCall);
43766
+ }
43767
+ };
43768
+ });
43769
+
43770
+ // src/funcs/organizationsGetFacility.ts
43771
+ function organizationsGetFacility(client, request, options) {
43772
+ return new APIPromise($do5(client, request, options));
43773
+ }
43774
+ async function $do5(client, request, options) {
43775
+ const parsed = safeParse(request, (value) => GetFacilityRequest$outboundSchema.parse(value), "Input validation failed");
43776
+ if (!parsed.ok) {
43777
+ return [parsed, { status: "invalid" }];
43778
+ }
43779
+ const payload = parsed.value;
43780
+ const body = null;
43781
+ const pathParams = {
43782
+ id: encodeSimple("id", payload.id, {
43783
+ explode: false,
43784
+ charEncoding: "percent"
43785
+ })
43786
+ };
43787
+ const path = pathToFunc("/facilities/{id}")(pathParams);
43788
+ const headers = new Headers(compactMap({
43789
+ Accept: "application/json"
43790
+ }));
43791
+ const securityInput = await extractSecurity(client._options.security);
43792
+ const requestSecurity = resolveGlobalSecurity(securityInput);
43793
+ const context = {
43794
+ options: client._options,
43795
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
43796
+ operationID: "getFacility",
43797
+ oAuth2Scopes: [],
43798
+ resolvedSecurity: requestSecurity,
43799
+ securitySource: client._options.security,
43800
+ retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
43801
+ retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
43802
+ };
43803
+ const requestRes = client._createRequest(context, {
43804
+ security: requestSecurity,
43805
+ method: "GET",
43806
+ baseURL: options?.serverURL,
43807
+ path,
43808
+ headers,
43809
+ body,
43810
+ userAgent: client._options.userAgent,
43811
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43812
+ }, options);
43813
+ if (!requestRes.ok) {
43814
+ return [requestRes, { status: "invalid" }];
43815
+ }
43816
+ const req = requestRes.value;
43817
+ const doResult = await client._do(req, {
43818
+ context,
43819
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
43820
+ retryConfig: context.retryConfig,
43821
+ retryCodes: context.retryCodes
43822
+ });
43823
+ if (!doResult.ok) {
43824
+ return [doResult, { status: "request-error", request: req }];
43825
+ }
43826
+ const response = doResult.value;
43827
+ const responseFields = {
43828
+ HttpMeta: { Response: response, Request: req }
43829
+ };
43830
+ const [result] = await match(json(200, Facility$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43831
+ if (!result.ok) {
43832
+ return [result, { status: "complete", request: req, response }];
43833
+ }
43834
+ return [result, { status: "complete", request: req, response }];
43835
+ }
43836
+ var init_organizationsGetFacility = __esm(() => {
43837
+ init_encodings();
43838
+ init_matchers();
43839
+ init_primitives();
43840
+ init_schemas();
43841
+ init_security();
43842
+ init_url();
43843
+ init_components();
43844
+ init_errors2();
43845
+ init_operations();
43846
+ init_async();
43847
+ });
43848
+
43849
+ // src/mcp-server/tools/organizationsGetFacility.ts
43850
+ var args5, tool$organizationsGetFacility;
43851
+ var init_organizationsGetFacility2 = __esm(() => {
43852
+ init_organizationsGetFacility();
43853
+ init_operations();
43854
+ init_tools();
43855
+ args5 = {
43856
+ request: GetFacilityRequest$inboundSchema
43857
+ };
43858
+ tool$organizationsGetFacility = {
43859
+ name: "organizations-get-facility",
43860
+ description: `Get facility
43861
+
43862
+ Retrieve an individual facility.`,
43863
+ args: args5,
43864
+ tool: async (client, args6, ctx) => {
43865
+ const [result, apiCall] = await organizationsGetFacility(client, args6.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43866
+ if (!result.ok) {
43867
+ return {
43868
+ content: [{ type: "text", text: result.error.message }],
43869
+ isError: true
43870
+ };
43871
+ }
43872
+ const value = result.value;
43873
+ return formatResult(value, apiCall);
43874
+ }
43875
+ };
43876
+ });
43877
+
43878
+ // src/funcs/organizationsListOrSearchFacilities.ts
43879
+ function organizationsListOrSearchFacilities(client, request, options) {
43880
+ return new APIPromise($do6(client, request, options));
43881
+ }
43882
+ async function $do6(client, request, options) {
43883
+ const parsed = safeParse(request, (value) => ListOrSearchFacilitiesRequest$outboundSchema.parse(value), "Input validation failed");
43884
+ if (!parsed.ok) {
43885
+ return [haltIterator(parsed), { status: "invalid" }];
43886
+ }
43887
+ const payload = parsed.value;
43888
+ const body = null;
43889
+ const path = pathToFunc("/facilities")();
43890
+ const query = queryJoin(encodeFormQuery({
43891
+ expand: payload.expand
43892
+ }, { explode: false }), encodeFormQuery({
43893
+ active_status: payload.active_status,
43894
+ desc: payload.desc,
43895
+ items_per_page: payload.items_per_page,
43896
+ latitude: payload.latitude,
43897
+ longitude: payload.longitude,
43898
+ name_like: payload.name_like,
43899
+ page: payload.page,
43900
+ sort: payload.sort,
43901
+ state_like: payload.state_like,
43902
+ system_id: payload.system_id
43903
+ }));
43904
+ const headers = new Headers(compactMap({
43905
+ Accept: "application/json"
43906
+ }));
43907
+ const securityInput = await extractSecurity(client._options.security);
43908
+ const requestSecurity = resolveGlobalSecurity(securityInput);
43909
+ const context = {
43910
+ options: client._options,
43911
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
43912
+ operationID: "listOrSearchFacilities",
43913
+ oAuth2Scopes: [],
43914
+ resolvedSecurity: requestSecurity,
43915
+ securitySource: client._options.security,
43916
+ retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
43917
+ retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
43918
+ };
43919
+ const requestRes = client._createRequest(context, {
43920
+ security: requestSecurity,
43921
+ method: "GET",
43922
+ baseURL: options?.serverURL,
43923
+ path,
43924
+ headers,
43925
+ query,
43926
+ body,
43927
+ userAgent: client._options.userAgent,
43928
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43929
+ }, options);
43930
+ if (!requestRes.ok) {
43931
+ return [haltIterator(requestRes), { status: "invalid" }];
43932
+ }
43933
+ const req = requestRes.value;
43934
+ const doResult = await client._do(req, {
43935
+ context,
43936
+ errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
43937
+ retryConfig: context.retryConfig,
43938
+ retryCodes: context.retryCodes
43939
+ });
43940
+ if (!doResult.ok) {
43941
+ return [haltIterator(doResult), { status: "request-error", request: req }];
43942
+ }
43943
+ const response = doResult.value;
43944
+ const responseFields = {
43945
+ HttpMeta: { Response: response, Request: req }
43946
+ };
43947
+ const [result, raw] = await match(json(200, ListOrSearchFacilitiesResponse$inboundSchema, {
43948
+ key: "Result"
43949
+ }), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43950
+ if (!result.ok) {
43951
+ return [haltIterator(result), {
43952
+ status: "complete",
43953
+ request: req,
43954
+ response
43955
+ }];
43956
+ }
43957
+ const nextFunc = (responseData) => {
43958
+ const page2 = request?.page ?? 1;
43959
+ const nextPage = page2 + 1;
43960
+ if (!responseData) {
43961
+ return { next: () => null };
43962
+ }
43963
+ const results = dlv(responseData, "items");
43964
+ if (!Array.isArray(results) || !results.length) {
43965
+ return { next: () => null };
43966
+ }
43967
+ const limit = request?.itemsPerPage ?? 0;
43968
+ if (results.length < limit) {
43969
+ return { next: () => null };
43970
+ }
43971
+ const nextVal = () => organizationsListOrSearchFacilities(client, {
43972
+ ...request,
43973
+ page: nextPage
43974
+ }, options);
43975
+ return { next: nextVal, "~next": { page: nextPage } };
43328
43976
  };
43329
43977
  const page = { ...result, ...nextFunc(raw) };
43330
43978
  return [{ ...page, ...createPageIterator(page, (v2) => !v2.ok) }, {
@@ -43347,12 +43995,12 @@ var init_organizationsListOrSearchFacilities = __esm(() => {
43347
43995
  });
43348
43996
 
43349
43997
  // src/mcp-server/tools/organizationsListOrSearchFacilities.ts
43350
- var args3, tool$organizationsListOrSearchFacilities;
43998
+ var args6, tool$organizationsListOrSearchFacilities;
43351
43999
  var init_organizationsListOrSearchFacilities2 = __esm(() => {
43352
44000
  init_organizationsListOrSearchFacilities();
43353
44001
  init_operations();
43354
44002
  init_tools();
43355
- args3 = {
44003
+ args6 = {
43356
44004
  request: ListOrSearchFacilitiesRequest$inboundSchema
43357
44005
  };
43358
44006
  tool$organizationsListOrSearchFacilities = {
@@ -43373,9 +44021,9 @@ Available \`expand\` scopes are:
43373
44021
  - facility.vendor_policy
43374
44022
  - facility.visitor_policy
43375
44023
  - facility.workflow`,
43376
- args: args3,
43377
- tool: async (client, args4, ctx) => {
43378
- const [result, apiCall] = await organizationsListOrSearchFacilities(client, args4.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44024
+ args: args6,
44025
+ tool: async (client, args7, ctx) => {
44026
+ const [result, apiCall] = await organizationsListOrSearchFacilities(client, args7.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43379
44027
  if (!result.ok) {
43380
44028
  return {
43381
44029
  content: [{ type: "text", text: result.error.message }],
@@ -43390,9 +44038,9 @@ Available \`expand\` scopes are:
43390
44038
 
43391
44039
  // src/funcs/supportArticlesGetSupportArticle.ts
43392
44040
  function supportArticlesGetSupportArticle(client, request, options) {
43393
- return new APIPromise($do4(client, request, options));
44041
+ return new APIPromise($do7(client, request, options));
43394
44042
  }
43395
- async function $do4(client, request, options) {
44043
+ async function $do7(client, request, options) {
43396
44044
  const parsed = safeParse(request, (value) => GetSupportArticleRequest$outboundSchema.parse(value), "Input validation failed");
43397
44045
  if (!parsed.ok) {
43398
44046
  return [parsed, { status: "invalid" }];
@@ -43415,6 +44063,7 @@ async function $do4(client, request, options) {
43415
44063
  const securityInput = await extractSecurity(client._options.security);
43416
44064
  const requestSecurity = resolveGlobalSecurity(securityInput);
43417
44065
  const context = {
44066
+ options: client._options,
43418
44067
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43419
44068
  operationID: "getSupportArticle",
43420
44069
  oAuth2Scopes: [],
@@ -43431,6 +44080,7 @@ async function $do4(client, request, options) {
43431
44080
  headers,
43432
44081
  query,
43433
44082
  body,
44083
+ userAgent: client._options.userAgent,
43434
44084
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43435
44085
  }, options);
43436
44086
  if (!requestRes.ok) {
@@ -43470,12 +44120,12 @@ var init_supportArticlesGetSupportArticle = __esm(() => {
43470
44120
  });
43471
44121
 
43472
44122
  // src/mcp-server/tools/supportArticlesGetSupportArticle.ts
43473
- var args4, tool$supportArticlesGetSupportArticle;
44123
+ var args7, tool$supportArticlesGetSupportArticle;
43474
44124
  var init_supportArticlesGetSupportArticle2 = __esm(() => {
43475
44125
  init_supportArticlesGetSupportArticle();
43476
44126
  init_operations();
43477
44127
  init_tools();
43478
- args4 = {
44128
+ args7 = {
43479
44129
  request: GetSupportArticleRequest$inboundSchema
43480
44130
  };
43481
44131
  tool$supportArticlesGetSupportArticle = {
@@ -43490,9 +44140,9 @@ Available \`expand\` scopes are:
43490
44140
  - support_article.published
43491
44141
  - support_article.notes
43492
44142
  - support_article.support_category`,
43493
- args: args4,
43494
- tool: async (client, args5, ctx) => {
43495
- const [result, apiCall] = await supportArticlesGetSupportArticle(client, args5.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44143
+ args: args7,
44144
+ tool: async (client, args8, ctx) => {
44145
+ const [result, apiCall] = await supportArticlesGetSupportArticle(client, args8.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43496
44146
  if (!result.ok) {
43497
44147
  return {
43498
44148
  content: [{ type: "text", text: result.error.message }],
@@ -43507,9 +44157,9 @@ Available \`expand\` scopes are:
43507
44157
 
43508
44158
  // src/funcs/supportArticlesListOrSearchSupportArticles.ts
43509
44159
  function supportArticlesListOrSearchSupportArticles(client, request, options) {
43510
- return new APIPromise($do5(client, request, options));
44160
+ return new APIPromise($do8(client, request, options));
43511
44161
  }
43512
- async function $do5(client, request, options) {
44162
+ async function $do8(client, request, options) {
43513
44163
  const parsed = safeParse(request, (value) => ListOrSearchSupportArticlesRequest$outboundSchema.parse(value), "Input validation failed");
43514
44164
  if (!parsed.ok) {
43515
44165
  return [haltIterator(parsed), { status: "invalid" }];
@@ -43531,6 +44181,7 @@ async function $do5(client, request, options) {
43531
44181
  const securityInput = await extractSecurity(client._options.security);
43532
44182
  const requestSecurity = resolveGlobalSecurity(securityInput);
43533
44183
  const context = {
44184
+ options: client._options,
43534
44185
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43535
44186
  operationID: "listOrSearchSupportArticles",
43536
44187
  oAuth2Scopes: [],
@@ -43547,6 +44198,7 @@ async function $do5(client, request, options) {
43547
44198
  headers,
43548
44199
  query,
43549
44200
  body,
44201
+ userAgent: client._options.userAgent,
43550
44202
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43551
44203
  }, options);
43552
44204
  if (!requestRes.ok) {
@@ -43617,12 +44269,12 @@ var init_supportArticlesListOrSearchSupportArticles = __esm(() => {
43617
44269
  });
43618
44270
 
43619
44271
  // src/mcp-server/tools/supportArticlesListOrSearchSupportArticles.ts
43620
- var args5, tool$supportArticlesListOrSearchSupportArticles;
44272
+ var args8, tool$supportArticlesListOrSearchSupportArticles;
43621
44273
  var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
43622
44274
  init_supportArticlesListOrSearchSupportArticles();
43623
44275
  init_operations();
43624
44276
  init_tools();
43625
- args5 = {
44277
+ args8 = {
43626
44278
  request: ListOrSearchSupportArticlesRequest$inboundSchema
43627
44279
  };
43628
44280
  tool$supportArticlesListOrSearchSupportArticles = {
@@ -43630,9 +44282,9 @@ var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
43630
44282
  description: `List or search support articles
43631
44283
 
43632
44284
  List or search support articles for FAQ.`,
43633
- args: args5,
43634
- tool: async (client, args6, ctx) => {
43635
- const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client, args6.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44285
+ args: args8,
44286
+ tool: async (client, args9, ctx) => {
44287
+ const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client, args9.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43636
44288
  if (!result.ok) {
43637
44289
  return {
43638
44290
  content: [{ type: "text", text: result.error.message }],
@@ -43647,9 +44299,9 @@ List or search support articles for FAQ.`,
43647
44299
 
43648
44300
  // src/funcs/usersChangePassword.ts
43649
44301
  function usersChangePassword(client, request, options) {
43650
- return new APIPromise($do6(client, request, options));
44302
+ return new APIPromise($do9(client, request, options));
43651
44303
  }
43652
- async function $do6(client, request, options) {
44304
+ async function $do9(client, request, options) {
43653
44305
  const parsed = safeParse(request, (value) => ChangePasswordRequest$outboundSchema.parse(value), "Input validation failed");
43654
44306
  if (!parsed.ok) {
43655
44307
  return [parsed, { status: "invalid" }];
@@ -43670,6 +44322,7 @@ async function $do6(client, request, options) {
43670
44322
  const securityInput = await extractSecurity(client._options.security);
43671
44323
  const requestSecurity = resolveGlobalSecurity(securityInput);
43672
44324
  const context = {
44325
+ options: client._options,
43673
44326
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43674
44327
  operationID: "changePassword",
43675
44328
  oAuth2Scopes: [],
@@ -43685,6 +44338,7 @@ async function $do6(client, request, options) {
43685
44338
  path,
43686
44339
  headers,
43687
44340
  body,
44341
+ userAgent: client._options.userAgent,
43688
44342
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43689
44343
  }, options);
43690
44344
  if (!requestRes.ok) {
@@ -43723,12 +44377,12 @@ var init_usersChangePassword = __esm(() => {
43723
44377
  });
43724
44378
 
43725
44379
  // src/mcp-server/tools/usersChangePassword.ts
43726
- var args6, tool$usersChangePassword;
44380
+ var args9, tool$usersChangePassword;
43727
44381
  var init_usersChangePassword2 = __esm(() => {
43728
44382
  init_usersChangePassword();
43729
44383
  init_operations();
43730
44384
  init_tools();
43731
- args6 = {
44385
+ args9 = {
43732
44386
  request: ChangePasswordRequest$inboundSchema
43733
44387
  };
43734
44388
  tool$usersChangePassword = {
@@ -43736,9 +44390,9 @@ var init_usersChangePassword2 = __esm(() => {
43736
44390
  description: `Change password
43737
44391
 
43738
44392
  Change the user's password to the new passed as parameter`,
43739
- args: args6,
43740
- tool: async (client, args7, ctx) => {
43741
- const [result, apiCall] = await usersChangePassword(client, args7.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44393
+ args: args9,
44394
+ tool: async (client, args10, ctx) => {
44395
+ const [result, apiCall] = await usersChangePassword(client, args10.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43742
44396
  if (!result.ok) {
43743
44397
  return {
43744
44398
  content: [{ type: "text", text: result.error.message }],
@@ -43753,9 +44407,9 @@ Change the user's password to the new passed as parameter`,
43753
44407
 
43754
44408
  // src/funcs/usersGetCurrentUser.ts
43755
44409
  function usersGetCurrentUser(client, options) {
43756
- return new APIPromise($do7(client, options));
44410
+ return new APIPromise($do10(client, options));
43757
44411
  }
43758
- async function $do7(client, options) {
44412
+ async function $do10(client, options) {
43759
44413
  const path = pathToFunc("/users/me")();
43760
44414
  const headers = new Headers(compactMap({
43761
44415
  Accept: "application/json"
@@ -43763,6 +44417,7 @@ async function $do7(client, options) {
43763
44417
  const securityInput = await extractSecurity(client._options.security);
43764
44418
  const requestSecurity = resolveGlobalSecurity(securityInput);
43765
44419
  const context = {
44420
+ options: client._options,
43766
44421
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43767
44422
  operationID: "getCurrentUser",
43768
44423
  oAuth2Scopes: [],
@@ -43777,6 +44432,7 @@ async function $do7(client, options) {
43777
44432
  baseURL: options?.serverURL,
43778
44433
  path,
43779
44434
  headers,
44435
+ userAgent: client._options.userAgent,
43780
44436
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43781
44437
  }, options);
43782
44438
  if (!requestRes.ok) {
@@ -43817,13 +44473,223 @@ var tool$usersGetCurrentUser;
43817
44473
  var init_usersGetCurrentUser2 = __esm(() => {
43818
44474
  init_usersGetCurrentUser();
43819
44475
  init_tools();
43820
- tool$usersGetCurrentUser = {
43821
- name: "users-get-current-user",
43822
- description: `Get current user
44476
+ tool$usersGetCurrentUser = {
44477
+ name: "users-get-current-user",
44478
+ description: `Get current user
44479
+
44480
+ Returns a user object for the user represented by the authorization token`,
44481
+ tool: async (client, ctx) => {
44482
+ const [result, apiCall] = await usersGetCurrentUser(client, { fetchOptions: { signal: ctx.signal } }).$inspect();
44483
+ if (!result.ok) {
44484
+ return {
44485
+ content: [{ type: "text", text: result.error.message }],
44486
+ isError: true
44487
+ };
44488
+ }
44489
+ const value = result.value;
44490
+ return formatResult(value, apiCall);
44491
+ }
44492
+ };
44493
+ });
44494
+
44495
+ // src/funcs/usersGetUserById.ts
44496
+ function usersGetUserById(client, request, options) {
44497
+ return new APIPromise($do11(client, request, options));
44498
+ }
44499
+ async function $do11(client, request, options) {
44500
+ const parsed = safeParse(request, (value) => GetUserByIdRequest$outboundSchema.parse(value), "Input validation failed");
44501
+ if (!parsed.ok) {
44502
+ return [parsed, { status: "invalid" }];
44503
+ }
44504
+ const payload = parsed.value;
44505
+ const body = null;
44506
+ const pathParams = {
44507
+ id: encodeSimple("id", payload.id, {
44508
+ explode: false,
44509
+ charEncoding: "percent"
44510
+ })
44511
+ };
44512
+ const path = pathToFunc("/users/{id}")(pathParams);
44513
+ const headers = new Headers(compactMap({
44514
+ Accept: "application/json"
44515
+ }));
44516
+ const securityInput = await extractSecurity(client._options.security);
44517
+ const requestSecurity = resolveGlobalSecurity(securityInput);
44518
+ const context = {
44519
+ options: client._options,
44520
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
44521
+ operationID: "getUserById",
44522
+ oAuth2Scopes: [],
44523
+ resolvedSecurity: requestSecurity,
44524
+ securitySource: client._options.security,
44525
+ retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
44526
+ retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
44527
+ };
44528
+ const requestRes = client._createRequest(context, {
44529
+ security: requestSecurity,
44530
+ method: "GET",
44531
+ baseURL: options?.serverURL,
44532
+ path,
44533
+ headers,
44534
+ body,
44535
+ userAgent: client._options.userAgent,
44536
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44537
+ }, options);
44538
+ if (!requestRes.ok) {
44539
+ return [requestRes, { status: "invalid" }];
44540
+ }
44541
+ const req = requestRes.value;
44542
+ const doResult = await client._do(req, {
44543
+ context,
44544
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
44545
+ retryConfig: context.retryConfig,
44546
+ retryCodes: context.retryCodes
44547
+ });
44548
+ if (!doResult.ok) {
44549
+ return [doResult, { status: "request-error", request: req }];
44550
+ }
44551
+ const response = doResult.value;
44552
+ const responseFields = {
44553
+ HttpMeta: { Response: response, Request: req }
44554
+ };
44555
+ const [result] = await match(json(200, User$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44556
+ if (!result.ok) {
44557
+ return [result, { status: "complete", request: req, response }];
44558
+ }
44559
+ return [result, { status: "complete", request: req, response }];
44560
+ }
44561
+ var init_usersGetUserById = __esm(() => {
44562
+ init_encodings();
44563
+ init_matchers();
44564
+ init_primitives();
44565
+ init_schemas();
44566
+ init_security();
44567
+ init_url();
44568
+ init_components();
44569
+ init_errors2();
44570
+ init_operations();
44571
+ init_async();
44572
+ });
44573
+
44574
+ // src/mcp-server/tools/usersGetUserById.ts
44575
+ var args10, tool$usersGetUserById;
44576
+ var init_usersGetUserById2 = __esm(() => {
44577
+ init_usersGetUserById();
44578
+ init_operations();
44579
+ init_tools();
44580
+ args10 = {
44581
+ request: GetUserByIdRequest$inboundSchema
44582
+ };
44583
+ tool$usersGetUserById = {
44584
+ name: "users-get-user-by-id",
44585
+ description: `Get user by id
44586
+
44587
+ Returns a user object for the user represented by the identifier in the path.`,
44588
+ args: args10,
44589
+ tool: async (client, args11, ctx) => {
44590
+ const [result, apiCall] = await usersGetUserById(client, args11.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44591
+ if (!result.ok) {
44592
+ return {
44593
+ content: [{ type: "text", text: result.error.message }],
44594
+ isError: true
44595
+ };
44596
+ }
44597
+ const value = result.value;
44598
+ return formatResult(value, apiCall);
44599
+ }
44600
+ };
44601
+ });
44602
+
44603
+ // src/funcs/usersMagiclink.ts
44604
+ function usersMagiclink(client, request, options) {
44605
+ return new APIPromise($do12(client, request, options));
44606
+ }
44607
+ async function $do12(client, request, options) {
44608
+ const parsed = safeParse(request, (value) => MagiclinkRequestBody$outboundSchema.parse(value), "Input validation failed");
44609
+ if (!parsed.ok) {
44610
+ return [parsed, { status: "invalid" }];
44611
+ }
44612
+ const payload = parsed.value;
44613
+ const body = encodeJSON("body", payload, { explode: true });
44614
+ const path = pathToFunc("/users/magiclink")();
44615
+ const headers = new Headers(compactMap({
44616
+ "Content-Type": "application/json",
44617
+ Accept: "application/json"
44618
+ }));
44619
+ const securityInput = await extractSecurity(client._options.security);
44620
+ const requestSecurity = resolveGlobalSecurity(securityInput);
44621
+ const context = {
44622
+ options: client._options,
44623
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
44624
+ operationID: "magiclink",
44625
+ oAuth2Scopes: [],
44626
+ resolvedSecurity: requestSecurity,
44627
+ securitySource: client._options.security,
44628
+ retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
44629
+ retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
44630
+ };
44631
+ const requestRes = client._createRequest(context, {
44632
+ security: requestSecurity,
44633
+ method: "POST",
44634
+ baseURL: options?.serverURL,
44635
+ path,
44636
+ headers,
44637
+ body,
44638
+ userAgent: client._options.userAgent,
44639
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44640
+ }, options);
44641
+ if (!requestRes.ok) {
44642
+ return [requestRes, { status: "invalid" }];
44643
+ }
44644
+ const req = requestRes.value;
44645
+ const doResult = await client._do(req, {
44646
+ context,
44647
+ errorCodes: ["404", "4XX", "500", "5XX"],
44648
+ retryConfig: context.retryConfig,
44649
+ retryCodes: context.retryCodes
44650
+ });
44651
+ if (!doResult.ok) {
44652
+ return [doResult, { status: "request-error", request: req }];
44653
+ }
44654
+ const response = doResult.value;
44655
+ const responseFields = {
44656
+ HttpMeta: { Response: response, Request: req }
44657
+ };
44658
+ const [result] = await match(json(200, MagiclinkMagiclinkOk$inboundSchema), jsonErr(404, ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44659
+ if (!result.ok) {
44660
+ return [result, { status: "complete", request: req, response }];
44661
+ }
44662
+ return [result, { status: "complete", request: req, response }];
44663
+ }
44664
+ var init_usersMagiclink = __esm(() => {
44665
+ init_encodings();
44666
+ init_matchers();
44667
+ init_primitives();
44668
+ init_schemas();
44669
+ init_security();
44670
+ init_url();
44671
+ init_errors2();
44672
+ init_operations();
44673
+ init_async();
44674
+ });
44675
+
44676
+ // src/mcp-server/tools/usersMagiclink.ts
44677
+ var args11, tool$usersMagiclink;
44678
+ var init_usersMagiclink2 = __esm(() => {
44679
+ init_usersMagiclink();
44680
+ init_operations();
44681
+ init_tools();
44682
+ args11 = {
44683
+ request: MagiclinkRequestBody$inboundSchema
44684
+ };
44685
+ tool$usersMagiclink = {
44686
+ name: "users-magiclink",
44687
+ description: `Magic link
43823
44688
 
43824
- Returns a user object for the user represented by the authorization token`,
43825
- tool: async (client, ctx) => {
43826
- const [result, apiCall] = await usersGetCurrentUser(client, { fetchOptions: { signal: ctx.signal } }).$inspect();
44689
+ It sends an email with a magic link to allow the user to log in.`,
44690
+ args: args11,
44691
+ tool: async (client, args12, ctx) => {
44692
+ const [result, apiCall] = await usersMagiclink(client, args12.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43827
44693
  if (!result.ok) {
43828
44694
  return {
43829
44695
  content: [{ type: "text", text: result.error.message }],
@@ -43836,32 +44702,28 @@ Returns a user object for the user represented by the authorization token`,
43836
44702
  };
43837
44703
  });
43838
44704
 
43839
- // src/funcs/usersGetUserById.ts
43840
- function usersGetUserById(client, request, options) {
43841
- return new APIPromise($do8(client, request, options));
44705
+ // src/funcs/usersPassword.ts
44706
+ function usersPassword(client, request, options) {
44707
+ return new APIPromise($do13(client, request, options));
43842
44708
  }
43843
- async function $do8(client, request, options) {
43844
- const parsed = safeParse(request, (value) => GetUserByIdRequest$outboundSchema.parse(value), "Input validation failed");
44709
+ async function $do13(client, request, options) {
44710
+ const parsed = safeParse(request, (value) => PasswordRequestBody$outboundSchema.parse(value), "Input validation failed");
43845
44711
  if (!parsed.ok) {
43846
44712
  return [parsed, { status: "invalid" }];
43847
44713
  }
43848
44714
  const payload = parsed.value;
43849
- const body = null;
43850
- const pathParams = {
43851
- id: encodeSimple("id", payload.id, {
43852
- explode: false,
43853
- charEncoding: "percent"
43854
- })
43855
- };
43856
- const path = pathToFunc("/users/{id}")(pathParams);
44715
+ const body = encodeJSON("body", payload, { explode: true });
44716
+ const path = pathToFunc("/users/password")();
43857
44717
  const headers = new Headers(compactMap({
44718
+ "Content-Type": "application/json",
43858
44719
  Accept: "application/json"
43859
44720
  }));
43860
44721
  const securityInput = await extractSecurity(client._options.security);
43861
44722
  const requestSecurity = resolveGlobalSecurity(securityInput);
43862
44723
  const context = {
44724
+ options: client._options,
43863
44725
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43864
- operationID: "getUserById",
44726
+ operationID: "password",
43865
44727
  oAuth2Scopes: [],
43866
44728
  resolvedSecurity: requestSecurity,
43867
44729
  securitySource: client._options.security,
@@ -43870,11 +44732,12 @@ async function $do8(client, request, options) {
43870
44732
  };
43871
44733
  const requestRes = client._createRequest(context, {
43872
44734
  security: requestSecurity,
43873
- method: "GET",
44735
+ method: "POST",
43874
44736
  baseURL: options?.serverURL,
43875
44737
  path,
43876
44738
  headers,
43877
44739
  body,
44740
+ userAgent: client._options.userAgent,
43878
44741
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43879
44742
  }, options);
43880
44743
  if (!requestRes.ok) {
@@ -43883,7 +44746,7 @@ async function $do8(client, request, options) {
43883
44746
  const req = requestRes.value;
43884
44747
  const doResult = await client._do(req, {
43885
44748
  context,
43886
- errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
44749
+ errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
43887
44750
  retryConfig: context.retryConfig,
43888
44751
  retryCodes: context.retryCodes
43889
44752
  });
@@ -43894,42 +44757,42 @@ async function $do8(client, request, options) {
43894
44757
  const responseFields = {
43895
44758
  HttpMeta: { Response: response, Request: req }
43896
44759
  };
43897
- const [result] = await match(json(200, User$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44760
+ const [result] = await match(json(200, PasswordPasswordOk$inboundSchema), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43898
44761
  if (!result.ok) {
43899
44762
  return [result, { status: "complete", request: req, response }];
43900
44763
  }
43901
44764
  return [result, { status: "complete", request: req, response }];
43902
44765
  }
43903
- var init_usersGetUserById = __esm(() => {
44766
+ var init_usersPassword = __esm(() => {
43904
44767
  init_encodings();
43905
44768
  init_matchers();
43906
44769
  init_primitives();
43907
44770
  init_schemas();
43908
44771
  init_security();
43909
44772
  init_url();
43910
- init_components();
43911
44773
  init_errors2();
43912
44774
  init_operations();
43913
44775
  init_async();
43914
44776
  });
43915
44777
 
43916
- // src/mcp-server/tools/usersGetUserById.ts
43917
- var args7, tool$usersGetUserById;
43918
- var init_usersGetUserById2 = __esm(() => {
43919
- init_usersGetUserById();
44778
+ // src/mcp-server/tools/usersPassword.ts
44779
+ var args12, tool$usersPassword;
44780
+ var init_usersPassword2 = __esm(() => {
44781
+ init_usersPassword();
43920
44782
  init_operations();
43921
44783
  init_tools();
43922
- args7 = {
43923
- request: GetUserByIdRequest$inboundSchema
44784
+ args12 = {
44785
+ request: PasswordRequestBody$inboundSchema
43924
44786
  };
43925
- tool$usersGetUserById = {
43926
- name: "users-get-user-by-id",
43927
- description: `Get user by id
44787
+ tool$usersPassword = {
44788
+ name: "users-password",
44789
+ description: `Password reset
43928
44790
 
43929
- Returns a user object for the user represented by the identifier in the path.`,
43930
- args: args7,
43931
- tool: async (client, args8, ctx) => {
43932
- const [result, apiCall] = await usersGetUserById(client, args8.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44791
+ Resets the a user's password using a password_reset_id that was sent to them via email.
44792
+ See /users/passwordresetrequest to initiate a password reset flow.`,
44793
+ args: args12,
44794
+ tool: async (client, args13, ctx) => {
44795
+ const [result, apiCall] = await usersPassword(client, args13.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43933
44796
  if (!result.ok) {
43934
44797
  return {
43935
44798
  content: [{ type: "text", text: result.error.message }],
@@ -43942,18 +44805,18 @@ Returns a user object for the user represented by the identifier in the path.`,
43942
44805
  };
43943
44806
  });
43944
44807
 
43945
- // src/funcs/usersMagiclink.ts
43946
- function usersMagiclink(client, request, options) {
43947
- return new APIPromise($do9(client, request, options));
44808
+ // src/funcs/usersPasswordResetRequest.ts
44809
+ function usersPasswordResetRequest(client, request, options) {
44810
+ return new APIPromise($do14(client, request, options));
43948
44811
  }
43949
- async function $do9(client, request, options) {
43950
- const parsed = safeParse(request, (value) => MagiclinkRequestBody$outboundSchema.parse(value), "Input validation failed");
44812
+ async function $do14(client, request, options) {
44813
+ const parsed = safeParse(request, (value) => PasswordResetRequestRequestBody$outboundSchema.parse(value), "Input validation failed");
43951
44814
  if (!parsed.ok) {
43952
44815
  return [parsed, { status: "invalid" }];
43953
44816
  }
43954
44817
  const payload = parsed.value;
43955
44818
  const body = encodeJSON("body", payload, { explode: true });
43956
- const path = pathToFunc("/users/magiclink")();
44819
+ const path = pathToFunc("/users/passwordresetrequest")();
43957
44820
  const headers = new Headers(compactMap({
43958
44821
  "Content-Type": "application/json",
43959
44822
  Accept: "application/json"
@@ -43961,8 +44824,9 @@ async function $do9(client, request, options) {
43961
44824
  const securityInput = await extractSecurity(client._options.security);
43962
44825
  const requestSecurity = resolveGlobalSecurity(securityInput);
43963
44826
  const context = {
44827
+ options: client._options,
43964
44828
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43965
- operationID: "magiclink",
44829
+ operationID: "passwordResetRequest",
43966
44830
  oAuth2Scopes: [],
43967
44831
  resolvedSecurity: requestSecurity,
43968
44832
  securitySource: client._options.security,
@@ -43976,6 +44840,7 @@ async function $do9(client, request, options) {
43976
44840
  path,
43977
44841
  headers,
43978
44842
  body,
44843
+ userAgent: client._options.userAgent,
43979
44844
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43980
44845
  }, options);
43981
44846
  if (!requestRes.ok) {
@@ -43984,7 +44849,7 @@ async function $do9(client, request, options) {
43984
44849
  const req = requestRes.value;
43985
44850
  const doResult = await client._do(req, {
43986
44851
  context,
43987
- errorCodes: ["404", "4XX", "500", "5XX"],
44852
+ errorCodes: ["400", "404", "4XX", "500", "5XX"],
43988
44853
  retryConfig: context.retryConfig,
43989
44854
  retryCodes: context.retryCodes
43990
44855
  });
@@ -43995,13 +44860,13 @@ async function $do9(client, request, options) {
43995
44860
  const responseFields = {
43996
44861
  HttpMeta: { Response: response, Request: req }
43997
44862
  };
43998
- const [result] = await match(json(200, MagiclinkMagiclinkOk$inboundSchema), jsonErr(404, ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44863
+ const [result] = await match(json(200, PasswordResetRequestPasswordResetRequestOk$inboundSchema), jsonErr([400, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43999
44864
  if (!result.ok) {
44000
44865
  return [result, { status: "complete", request: req, response }];
44001
44866
  }
44002
44867
  return [result, { status: "complete", request: req, response }];
44003
44868
  }
44004
- var init_usersMagiclink = __esm(() => {
44869
+ var init_usersPasswordResetRequest = __esm(() => {
44005
44870
  init_encodings();
44006
44871
  init_matchers();
44007
44872
  init_primitives();
@@ -44013,23 +44878,23 @@ var init_usersMagiclink = __esm(() => {
44013
44878
  init_async();
44014
44879
  });
44015
44880
 
44016
- // src/mcp-server/tools/usersMagiclink.ts
44017
- var args8, tool$usersMagiclink;
44018
- var init_usersMagiclink2 = __esm(() => {
44019
- init_usersMagiclink();
44881
+ // src/mcp-server/tools/usersPasswordResetRequest.ts
44882
+ var args13, tool$usersPasswordResetRequest;
44883
+ var init_usersPasswordResetRequest2 = __esm(() => {
44884
+ init_usersPasswordResetRequest();
44020
44885
  init_operations();
44021
44886
  init_tools();
44022
- args8 = {
44023
- request: MagiclinkRequestBody$inboundSchema
44887
+ args13 = {
44888
+ request: PasswordResetRequestRequestBody$inboundSchema
44024
44889
  };
44025
- tool$usersMagiclink = {
44026
- name: "users-magiclink",
44027
- description: `Magic link
44890
+ tool$usersPasswordResetRequest = {
44891
+ name: "users-password-reset-request",
44892
+ description: `Password reset request
44028
44893
 
44029
- It sends an email with a magic link to allow the user to log in.`,
44030
- args: args8,
44031
- tool: async (client, args9, ctx) => {
44032
- const [result, apiCall] = await usersMagiclink(client, args9.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44894
+ It sends an email with a link for resetting a user's password.`,
44895
+ args: args13,
44896
+ tool: async (client, args14, ctx) => {
44897
+ const [result, apiCall] = await usersPasswordResetRequest(client, args14.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44033
44898
  if (!result.ok) {
44034
44899
  return {
44035
44900
  content: [{ type: "text", text: result.error.message }],
@@ -44042,40 +44907,39 @@ It sends an email with a magic link to allow the user to log in.`,
44042
44907
  };
44043
44908
  });
44044
44909
 
44045
- // src/funcs/usersPassword.ts
44046
- function usersPassword(client, request, options) {
44047
- return new APIPromise($do10(client, request, options));
44910
+ // src/funcs/usersPostAuthenticate.ts
44911
+ function usersPostAuthenticate(client, request, options) {
44912
+ return new APIPromise($do15(client, request, options));
44048
44913
  }
44049
- async function $do10(client, request, options) {
44050
- const parsed = safeParse(request, (value) => PasswordRequestBody$outboundSchema.parse(value), "Input validation failed");
44914
+ async function $do15(client, request, options) {
44915
+ const parsed = safeParse(request, (value) => PostAuthenticateRequestBody$outboundSchema.parse(value), "Input validation failed");
44051
44916
  if (!parsed.ok) {
44052
44917
  return [parsed, { status: "invalid" }];
44053
44918
  }
44054
44919
  const payload = parsed.value;
44055
44920
  const body = encodeJSON("body", payload, { explode: true });
44056
- const path = pathToFunc("/users/password")();
44921
+ const path = pathToFunc("/users/authenticate")();
44057
44922
  const headers = new Headers(compactMap({
44058
44923
  "Content-Type": "application/json",
44059
44924
  Accept: "application/json"
44060
44925
  }));
44061
- const securityInput = await extractSecurity(client._options.security);
44062
- const requestSecurity = resolveGlobalSecurity(securityInput);
44063
44926
  const context = {
44927
+ options: client._options,
44064
44928
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44065
- operationID: "password",
44929
+ operationID: "postAuthenticate",
44066
44930
  oAuth2Scopes: [],
44067
- resolvedSecurity: requestSecurity,
44068
- securitySource: client._options.security,
44931
+ resolvedSecurity: null,
44932
+ securitySource: null,
44069
44933
  retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
44070
44934
  retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
44071
44935
  };
44072
44936
  const requestRes = client._createRequest(context, {
44073
- security: requestSecurity,
44074
44937
  method: "POST",
44075
44938
  baseURL: options?.serverURL,
44076
44939
  path,
44077
44940
  headers,
44078
44941
  body,
44942
+ userAgent: client._options.userAgent,
44079
44943
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44080
44944
  }, options);
44081
44945
  if (!requestRes.ok) {
@@ -44084,7 +44948,7 @@ async function $do10(client, request, options) {
44084
44948
  const req = requestRes.value;
44085
44949
  const doResult = await client._do(req, {
44086
44950
  context,
44087
- errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
44951
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
44088
44952
  retryConfig: context.retryConfig,
44089
44953
  retryCodes: context.retryCodes
44090
44954
  });
@@ -44095,42 +44959,70 @@ async function $do10(client, request, options) {
44095
44959
  const responseFields = {
44096
44960
  HttpMeta: { Response: response, Request: req }
44097
44961
  };
44098
- const [result] = await match(json(200, PasswordPasswordOk$inboundSchema), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44962
+ const [result] = await match(json(200, PostAuthenticateResponse$inboundSchema), json(202, PostAuthenticateResponse$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44099
44963
  if (!result.ok) {
44100
44964
  return [result, { status: "complete", request: req, response }];
44101
44965
  }
44102
44966
  return [result, { status: "complete", request: req, response }];
44103
44967
  }
44104
- var init_usersPassword = __esm(() => {
44968
+ var init_usersPostAuthenticate = __esm(() => {
44105
44969
  init_encodings();
44106
44970
  init_matchers();
44107
44971
  init_primitives();
44108
44972
  init_schemas();
44109
- init_security();
44110
44973
  init_url();
44111
44974
  init_errors2();
44112
44975
  init_operations();
44113
44976
  init_async();
44114
44977
  });
44115
44978
 
44116
- // src/mcp-server/tools/usersPassword.ts
44117
- var args9, tool$usersPassword;
44118
- var init_usersPassword2 = __esm(() => {
44119
- init_usersPassword();
44979
+ // src/mcp-server/tools/usersPostAuthenticate.ts
44980
+ var args14, tool$usersPostAuthenticate;
44981
+ var init_usersPostAuthenticate2 = __esm(() => {
44982
+ init_usersPostAuthenticate();
44120
44983
  init_operations();
44121
44984
  init_tools();
44122
- args9 = {
44123
- request: PasswordRequestBody$inboundSchema
44985
+ args14 = {
44986
+ request: PostAuthenticateRequestBody$inboundSchema
44124
44987
  };
44125
- tool$usersPassword = {
44126
- name: "users-password",
44127
- description: `Password reset
44988
+ tool$usersPostAuthenticate = {
44989
+ name: "users-post-authenticate",
44990
+ description: `Logs user into the system
44128
44991
 
44129
- Resets the a user's password using a password_reset_id that was sent to them via email.
44130
- See /users/passwordresetrequest to initiate a password reset flow.`,
44131
- args: args9,
44132
- tool: async (client, args10, ctx) => {
44133
- const [result, apiCall] = await usersPassword(client, args10.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44992
+ This endpoint allows a user to authenticate themselves and retrieve a permanent token for access.
44993
+
44994
+ Permanent tokens should only ever be stored in an encrypted storage because they represent a fully logged in user.
44995
+
44996
+ Users may log in with \`email/password\`, \`SAML\`, \`magic link\` or \`mfa\`. The application should handle all of the above as equally valid login methods.
44997
+
44998
+ The most common way to authenticate a user is to log in with an email and password. If the user provides valid credentials, the server will either respond with a full user object including the token.
44999
+
45000
+ When the user's account is protected via MFA, the server will send a 6 digit code to the user via their default MFA provider. You should collect that code and resend the email, password and mfa_code together to get a successful authentication.
45001
+
45002
+ The ideal flow for a login sequence is the following:
45003
+
45004
+ 1. Present an email address field only and allow the user to submit
45005
+ 2. Send \`email\` and \`return_url\` payload to this endpoint
45006
+ 3. Follow the flow based on the response \`requires\` field
45007
+
45008
+ Requires: \`password\`
45009
+
45010
+ 1. Show a password field for the user to fill out
45011
+ 2. Submit the \`email\` and \`password\` to this endpoint
45012
+ 3. If the response is \`200\`, the login is done. If the response is \`201\`, then check if \`requires: mfa_code\` is returned and show MFA flow
45013
+ 4. Submit \`email\`, \`password\`, \`mfa_code\` to this endpoint
45014
+ 5. If the response is \`200\`, the login is done. Otherwise, show the appropriate error to the user and go back to step 1 or 3 depending on the error.
45015
+
45016
+ Requires: \`saml_login\`
45017
+
45018
+ 1. [Open a browser](https://docs.expo.dev/versions/latest/sdk/webbrowser/#webbrowseropenauthsessionasyncurl-redirecturl-options) to the url returned in \`sso_url\`
45019
+ 2. User completes sign-in using their configured SAML IdP
45020
+ 3. Site redirects to your selected \`return_url\`
45021
+ 4. The \`user_token\` will be appended as a query string parameter to your \`return_url\` - you must parse this token and store it
45022
+ 5. Fetch the user object from \`/users/me\` using the token`,
45023
+ args: args14,
45024
+ tool: async (client, args15, ctx) => {
45025
+ const [result, apiCall] = await usersPostAuthenticate(client, args15.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44134
45026
  if (!result.ok) {
44135
45027
  return {
44136
45028
  content: [{ type: "text", text: result.error.message }],
@@ -44143,18 +45035,21 @@ See /users/passwordresetrequest to initiate a password reset flow.`,
44143
45035
  };
44144
45036
  });
44145
45037
 
44146
- // src/funcs/usersPasswordResetRequest.ts
44147
- function usersPasswordResetRequest(client, request, options) {
44148
- return new APIPromise($do11(client, request, options));
45038
+ // src/funcs/vendorsAddVendorCredentialFile.ts
45039
+ function vendorsAddVendorCredentialFile(client, request, options) {
45040
+ return new APIPromise($do16(client, request, options));
44149
45041
  }
44150
- async function $do11(client, request, options) {
44151
- const parsed = safeParse(request, (value) => PasswordResetRequestRequestBody$outboundSchema.parse(value), "Input validation failed");
45042
+ async function $do16(client, request, options) {
45043
+ const parsed = safeParse(request, (value) => AddVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
44152
45044
  if (!parsed.ok) {
44153
45045
  return [parsed, { status: "invalid" }];
44154
45046
  }
44155
45047
  const payload = parsed.value;
44156
- const body = encodeJSON("body", payload, { explode: true });
44157
- const path = pathToFunc("/users/passwordresetrequest")();
45048
+ const body = encodeJSON("body", payload.RequestBody, { explode: true });
45049
+ const pathParams = {
45050
+ vendor_credential_id: encodeSimple("vendor_credential_id", payload.vendor_credential_id, { explode: false, charEncoding: "percent" })
45051
+ };
45052
+ const path = pathToFunc("/vendors/credentials/{vendor_credential_id}/files")(pathParams);
44158
45053
  const headers = new Headers(compactMap({
44159
45054
  "Content-Type": "application/json",
44160
45055
  Accept: "application/json"
@@ -44162,8 +45057,9 @@ async function $do11(client, request, options) {
44162
45057
  const securityInput = await extractSecurity(client._options.security);
44163
45058
  const requestSecurity = resolveGlobalSecurity(securityInput);
44164
45059
  const context = {
45060
+ options: client._options,
44165
45061
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44166
- operationID: "passwordResetRequest",
45062
+ operationID: "addVendorCredentialFile",
44167
45063
  oAuth2Scopes: [],
44168
45064
  resolvedSecurity: requestSecurity,
44169
45065
  securitySource: client._options.security,
@@ -44177,6 +45073,7 @@ async function $do11(client, request, options) {
44177
45073
  path,
44178
45074
  headers,
44179
45075
  body,
45076
+ userAgent: client._options.userAgent,
44180
45077
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44181
45078
  }, options);
44182
45079
  if (!requestRes.ok) {
@@ -44185,7 +45082,7 @@ async function $do11(client, request, options) {
44185
45082
  const req = requestRes.value;
44186
45083
  const doResult = await client._do(req, {
44187
45084
  context,
44188
- errorCodes: ["400", "404", "4XX", "500", "5XX"],
45085
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
44189
45086
  retryConfig: context.retryConfig,
44190
45087
  retryCodes: context.retryCodes
44191
45088
  });
@@ -44196,13 +45093,13 @@ async function $do11(client, request, options) {
44196
45093
  const responseFields = {
44197
45094
  HttpMeta: { Response: response, Request: req }
44198
45095
  };
44199
- const [result] = await match(json(200, PasswordResetRequestPasswordResetRequestOk$inboundSchema), jsonErr([400, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
45096
+ const [result] = await match(json(200, AddVendorCredentialFileResponseBody$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44200
45097
  if (!result.ok) {
44201
45098
  return [result, { status: "complete", request: req, response }];
44202
45099
  }
44203
45100
  return [result, { status: "complete", request: req, response }];
44204
45101
  }
44205
- var init_usersPasswordResetRequest = __esm(() => {
45102
+ var init_vendorsAddVendorCredentialFile = __esm(() => {
44206
45103
  init_encodings();
44207
45104
  init_matchers();
44208
45105
  init_primitives();
@@ -44214,23 +45111,23 @@ var init_usersPasswordResetRequest = __esm(() => {
44214
45111
  init_async();
44215
45112
  });
44216
45113
 
44217
- // src/mcp-server/tools/usersPasswordResetRequest.ts
44218
- var args10, tool$usersPasswordResetRequest;
44219
- var init_usersPasswordResetRequest2 = __esm(() => {
44220
- init_usersPasswordResetRequest();
45114
+ // src/mcp-server/tools/vendorsAddVendorCredentialFile.ts
45115
+ var args15, tool$vendorsAddVendorCredentialFile;
45116
+ var init_vendorsAddVendorCredentialFile2 = __esm(() => {
45117
+ init_vendorsAddVendorCredentialFile();
44221
45118
  init_operations();
44222
45119
  init_tools();
44223
- args10 = {
44224
- request: PasswordResetRequestRequestBody$inboundSchema
45120
+ args15 = {
45121
+ request: AddVendorCredentialFileRequest$inboundSchema
44225
45122
  };
44226
- tool$usersPasswordResetRequest = {
44227
- name: "users-password-reset-request",
44228
- description: `Password reset request
45123
+ tool$vendorsAddVendorCredentialFile = {
45124
+ name: "vendors-add-vendor-credential-file",
45125
+ description: `Add vendor credential file
44229
45126
 
44230
- It sends an email with a link for resetting a user's password.`,
44231
- args: args10,
44232
- tool: async (client, args11, ctx) => {
44233
- const [result, apiCall] = await usersPasswordResetRequest(client, args11.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45127
+ It will add a new vendor credential file`,
45128
+ args: args15,
45129
+ tool: async (client, args16, ctx) => {
45130
+ const [result, apiCall] = await vendorsAddVendorCredentialFile(client, args16.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44234
45131
  if (!result.ok) {
44235
45132
  return {
44236
45133
  content: [{ type: "text", text: result.error.message }],
@@ -44243,37 +45140,48 @@ It sends an email with a link for resetting a user's password.`,
44243
45140
  };
44244
45141
  });
44245
45142
 
44246
- // src/funcs/usersPostAuthenticate.ts
44247
- function usersPostAuthenticate(client, request, options) {
44248
- return new APIPromise($do12(client, request, options));
45143
+ // src/funcs/vendorsAddVendorManagedByCompany.ts
45144
+ function vendorsAddVendorManagedByCompany(client, request, options) {
45145
+ return new APIPromise($do17(client, request, options));
44249
45146
  }
44250
- async function $do12(client, request, options) {
44251
- const parsed = safeParse(request, (value) => PostAuthenticateRequestBody$outboundSchema.parse(value), "Input validation failed");
45147
+ async function $do17(client, request, options) {
45148
+ const parsed = safeParse(request, (value) => AddVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
44252
45149
  if (!parsed.ok) {
44253
45150
  return [parsed, { status: "invalid" }];
44254
45151
  }
44255
45152
  const payload = parsed.value;
44256
- const body = encodeJSON("body", payload, { explode: true });
44257
- const path = pathToFunc("/users/authenticate")();
45153
+ const body = encodeJSON("body", payload.RequestBody, { explode: true });
45154
+ const pathParams = {
45155
+ vendor_id_or_me: encodeSimple("vendor_id_or_me", payload.vendor_id_or_me, {
45156
+ explode: false,
45157
+ charEncoding: "percent"
45158
+ })
45159
+ };
45160
+ const path = pathToFunc("/vendors/{vendor_id_or_me}/managed-by-companies")(pathParams);
44258
45161
  const headers = new Headers(compactMap({
44259
45162
  "Content-Type": "application/json",
44260
45163
  Accept: "application/json"
44261
45164
  }));
45165
+ const securityInput = await extractSecurity(client._options.security);
45166
+ const requestSecurity = resolveGlobalSecurity(securityInput);
44262
45167
  const context = {
45168
+ options: client._options,
44263
45169
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44264
- operationID: "postAuthenticate",
45170
+ operationID: "addVendorManagedByCompany",
44265
45171
  oAuth2Scopes: [],
44266
- resolvedSecurity: null,
44267
- securitySource: null,
45172
+ resolvedSecurity: requestSecurity,
45173
+ securitySource: client._options.security,
44268
45174
  retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
44269
45175
  retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
44270
45176
  };
44271
45177
  const requestRes = client._createRequest(context, {
45178
+ security: requestSecurity,
44272
45179
  method: "POST",
44273
45180
  baseURL: options?.serverURL,
44274
45181
  path,
44275
45182
  headers,
44276
45183
  body,
45184
+ userAgent: client._options.userAgent,
44277
45185
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44278
45186
  }, options);
44279
45187
  if (!requestRes.ok) {
@@ -44293,70 +45201,41 @@ async function $do12(client, request, options) {
44293
45201
  const responseFields = {
44294
45202
  HttpMeta: { Response: response, Request: req }
44295
45203
  };
44296
- const [result] = await match(json(200, PostAuthenticateResponse$inboundSchema), json(202, PostAuthenticateResponse$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
45204
+ const [result] = await match(json(200, AddVendorManagedByCompanyAddVendorManagedByCompanyOk$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44297
45205
  if (!result.ok) {
44298
45206
  return [result, { status: "complete", request: req, response }];
44299
45207
  }
44300
45208
  return [result, { status: "complete", request: req, response }];
44301
45209
  }
44302
- var init_usersPostAuthenticate = __esm(() => {
45210
+ var init_vendorsAddVendorManagedByCompany = __esm(() => {
44303
45211
  init_encodings();
44304
45212
  init_matchers();
44305
45213
  init_primitives();
44306
45214
  init_schemas();
45215
+ init_security();
44307
45216
  init_url();
44308
45217
  init_errors2();
44309
45218
  init_operations();
44310
45219
  init_async();
44311
45220
  });
44312
45221
 
44313
- // src/mcp-server/tools/usersPostAuthenticate.ts
44314
- var args11, tool$usersPostAuthenticate;
44315
- var init_usersPostAuthenticate2 = __esm(() => {
44316
- init_usersPostAuthenticate();
45222
+ // src/mcp-server/tools/vendorsAddVendorManagedByCompany.ts
45223
+ var args16, tool$vendorsAddVendorManagedByCompany;
45224
+ var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
45225
+ init_vendorsAddVendorManagedByCompany();
44317
45226
  init_operations();
44318
45227
  init_tools();
44319
- args11 = {
44320
- request: PostAuthenticateRequestBody$inboundSchema
45228
+ args16 = {
45229
+ request: AddVendorManagedByCompanyRequest$inboundSchema
44321
45230
  };
44322
- tool$usersPostAuthenticate = {
44323
- name: "users-post-authenticate",
44324
- description: `Logs user into the system
44325
-
44326
- This endpoint allows a user to authenticate themselves and retrieve a permanent token for access.
44327
-
44328
- Permanent tokens should only ever be stored in an encrypted storage because they represent a fully logged in user.
44329
-
44330
- Users may log in with \`email/password\`, \`SAML\`, \`magic link\` or \`mfa\`. The application should handle all of the above as equally valid login methods.
44331
-
44332
- The most common way to authenticate a user is to log in with an email and password. If the user provides valid credentials, the server will either respond with a full user object including the token.
44333
-
44334
- When the user's account is protected via MFA, the server will send a 6 digit code to the user via their default MFA provider. You should collect that code and resend the email, password and mfa_code together to get a successful authentication.
44335
-
44336
- The ideal flow for a login sequence is the following:
44337
-
44338
- 1. Present an email address field only and allow the user to submit
44339
- 2. Send \`email\` and \`return_url\` payload to this endpoint
44340
- 3. Follow the flow based on the response \`requires\` field
44341
-
44342
- Requires: \`password\`
44343
-
44344
- 1. Show a password field for the user to fill out
44345
- 2. Submit the \`email\` and \`password\` to this endpoint
44346
- 3. If the response is \`200\`, the login is done. If the response is \`201\`, then check if \`requires: mfa_code\` is returned and show MFA flow
44347
- 4. Submit \`email\`, \`password\`, \`mfa_code\` to this endpoint
44348
- 5. If the response is \`200\`, the login is done. Otherwise, show the appropriate error to the user and go back to step 1 or 3 depending on the error.
44349
-
44350
- Requires: \`saml_login\`
45231
+ tool$vendorsAddVendorManagedByCompany = {
45232
+ name: "vendors-add-vendor-managed-by-company",
45233
+ description: `Add vendor managed by company
44351
45234
 
44352
- 1. [Open a browser](https://docs.expo.dev/versions/latest/sdk/webbrowser/#webbrowseropenauthsessionasyncurl-redirecturl-options) to the url returned in \`sso_url\`
44353
- 2. User completes sign-in using their configured SAML IdP
44354
- 3. Site redirects to your selected \`return_url\`
44355
- 4. The \`user_token\` will be appended as a query string parameter to your \`return_url\` - you must parse this token and store it
44356
- 5. Fetch the user object from \`/users/me\` using the token`,
44357
- args: args11,
44358
- tool: async (client, args12, ctx) => {
44359
- const [result, apiCall] = await usersPostAuthenticate(client, args12.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45235
+ It will add a vendor managed by company`,
45236
+ args: args16,
45237
+ tool: async (client, args17, ctx) => {
45238
+ const [result, apiCall] = await vendorsAddVendorManagedByCompany(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44360
45239
  if (!result.ok) {
44361
45240
  return {
44362
45241
  content: [{ type: "text", text: result.error.message }],
@@ -44369,30 +45248,33 @@ Requires: \`saml_login\`
44369
45248
  };
44370
45249
  });
44371
45250
 
44372
- // src/funcs/vendorsAddVendorCredentialFile.ts
44373
- function vendorsAddVendorCredentialFile(client, request, options) {
44374
- return new APIPromise($do13(client, request, options));
45251
+ // src/funcs/vendorScansVendorScanOut.ts
45252
+ function vendorScansVendorScanOut(client, request, options) {
45253
+ return new APIPromise($do18(client, request, options));
44375
45254
  }
44376
- async function $do13(client, request, options) {
44377
- const parsed = safeParse(request, (value) => AddVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
45255
+ async function $do18(client, request, options) {
45256
+ const parsed = safeParse(request, (value) => VendorScanOutRequest$outboundSchema.parse(value), "Input validation failed");
44378
45257
  if (!parsed.ok) {
44379
45258
  return [parsed, { status: "invalid" }];
44380
45259
  }
44381
45260
  const payload = parsed.value;
44382
- const body = encodeJSON("body", payload.RequestBody, { explode: true });
45261
+ const body = null;
44383
45262
  const pathParams = {
44384
- vendor_credential_id: encodeSimple("vendor_credential_id", payload.vendor_credential_id, { explode: false, charEncoding: "percent" })
45263
+ id: encodeSimple("id", payload.id, {
45264
+ explode: false,
45265
+ charEncoding: "percent"
45266
+ })
44385
45267
  };
44386
- const path = pathToFunc("/vendors/credentials/{vendor_credential_id}/files")(pathParams);
45268
+ const path = pathToFunc("/vendor-scans/{id}/scan-out")(pathParams);
44387
45269
  const headers = new Headers(compactMap({
44388
- "Content-Type": "application/json",
44389
45270
  Accept: "application/json"
44390
45271
  }));
44391
45272
  const securityInput = await extractSecurity(client._options.security);
44392
45273
  const requestSecurity = resolveGlobalSecurity(securityInput);
44393
45274
  const context = {
45275
+ options: client._options,
44394
45276
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44395
- operationID: "addVendorCredentialFile",
45277
+ operationID: "vendorScanOut",
44396
45278
  oAuth2Scopes: [],
44397
45279
  resolvedSecurity: requestSecurity,
44398
45280
  securitySource: client._options.security,
@@ -44406,6 +45288,7 @@ async function $do13(client, request, options) {
44406
45288
  path,
44407
45289
  headers,
44408
45290
  body,
45291
+ userAgent: client._options.userAgent,
44409
45292
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44410
45293
  }, options);
44411
45294
  if (!requestRes.ok) {
@@ -44425,13 +45308,13 @@ async function $do13(client, request, options) {
44425
45308
  const responseFields = {
44426
45309
  HttpMeta: { Response: response, Request: req }
44427
45310
  };
44428
- const [result] = await match(json(200, AddVendorCredentialFileResponseBody$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
45311
+ const [result] = await match(json(200, VendorScanOutVendorScanOutOk$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44429
45312
  if (!result.ok) {
44430
45313
  return [result, { status: "complete", request: req, response }];
44431
45314
  }
44432
45315
  return [result, { status: "complete", request: req, response }];
44433
45316
  }
44434
- var init_vendorsAddVendorCredentialFile = __esm(() => {
45317
+ var init_vendorScansVendorScanOut = __esm(() => {
44435
45318
  init_encodings();
44436
45319
  init_matchers();
44437
45320
  init_primitives();
@@ -44443,23 +45326,23 @@ var init_vendorsAddVendorCredentialFile = __esm(() => {
44443
45326
  init_async();
44444
45327
  });
44445
45328
 
44446
- // src/mcp-server/tools/vendorsAddVendorCredentialFile.ts
44447
- var args12, tool$vendorsAddVendorCredentialFile;
44448
- var init_vendorsAddVendorCredentialFile2 = __esm(() => {
44449
- init_vendorsAddVendorCredentialFile();
45329
+ // src/mcp-server/tools/vendorScansVendorScanOut.ts
45330
+ var args17, tool$vendorScansVendorScanOut;
45331
+ var init_vendorScansVendorScanOut2 = __esm(() => {
45332
+ init_vendorScansVendorScanOut();
44450
45333
  init_operations();
44451
45334
  init_tools();
44452
- args12 = {
44453
- request: AddVendorCredentialFileRequest$inboundSchema
45335
+ args17 = {
45336
+ request: VendorScanOutRequest$inboundSchema
44454
45337
  };
44455
- tool$vendorsAddVendorCredentialFile = {
44456
- name: "vendors-add-vendor-credential-file",
44457
- description: `Add vendor credential file
45338
+ tool$vendorScansVendorScanOut = {
45339
+ name: "vendor-scans-vendor-scan-out",
45340
+ description: `Vendor scan out
44458
45341
 
44459
- It will add a new vendor credential file`,
44460
- args: args12,
44461
- tool: async (client, args13, ctx) => {
44462
- const [result, apiCall] = await vendorsAddVendorCredentialFile(client, args13.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45342
+ It scans out vendor from facility`,
45343
+ args: args17,
45344
+ tool: async (client, args18, ctx) => {
45345
+ const [result, apiCall] = await vendorScansVendorScanOut(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44463
45346
  if (!result.ok) {
44464
45347
  return {
44465
45348
  content: [{ type: "text", text: result.error.message }],
@@ -44472,24 +45355,18 @@ It will add a new vendor credential file`,
44472
45355
  };
44473
45356
  });
44474
45357
 
44475
- // src/funcs/vendorsAddVendorManagedByCompany.ts
44476
- function vendorsAddVendorManagedByCompany(client, request, options) {
44477
- return new APIPromise($do14(client, request, options));
45358
+ // src/funcs/vendorsCreateNewVendorCredentialVersion.ts
45359
+ function vendorsCreateNewVendorCredentialVersion(client, request, options) {
45360
+ return new APIPromise($do19(client, request, options));
44478
45361
  }
44479
- async function $do14(client, request, options) {
44480
- const parsed = safeParse(request, (value) => AddVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
45362
+ async function $do19(client, request, options) {
45363
+ const parsed = safeParse(request, (value) => CreateNewVendorCredentialVersionRequestBody$outboundSchema.parse(value), "Input validation failed");
44481
45364
  if (!parsed.ok) {
44482
45365
  return [parsed, { status: "invalid" }];
44483
45366
  }
44484
45367
  const payload = parsed.value;
44485
- const body = encodeJSON("body", payload.RequestBody, { explode: true });
44486
- const pathParams = {
44487
- vendor_id_or_me: encodeSimple("vendor_id_or_me", payload.vendor_id_or_me, {
44488
- explode: false,
44489
- charEncoding: "percent"
44490
- })
44491
- };
44492
- const path = pathToFunc("/vendors/{vendor_id_or_me}/managed-by-companies")(pathParams);
45368
+ const body = encodeJSON("body", payload, { explode: true });
45369
+ const path = pathToFunc("/vendors/credentials")();
44493
45370
  const headers = new Headers(compactMap({
44494
45371
  "Content-Type": "application/json",
44495
45372
  Accept: "application/json"
@@ -44497,8 +45374,9 @@ async function $do14(client, request, options) {
44497
45374
  const securityInput = await extractSecurity(client._options.security);
44498
45375
  const requestSecurity = resolveGlobalSecurity(securityInput);
44499
45376
  const context = {
45377
+ options: client._options,
44500
45378
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44501
- operationID: "addVendorManagedByCompany",
45379
+ operationID: "createNewVendorCredentialVersion",
44502
45380
  oAuth2Scopes: [],
44503
45381
  resolvedSecurity: requestSecurity,
44504
45382
  securitySource: client._options.security,
@@ -44512,6 +45390,7 @@ async function $do14(client, request, options) {
44512
45390
  path,
44513
45391
  headers,
44514
45392
  body,
45393
+ userAgent: client._options.userAgent,
44515
45394
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44516
45395
  }, options);
44517
45396
  if (!requestRes.ok) {
@@ -44531,13 +45410,13 @@ async function $do14(client, request, options) {
44531
45410
  const responseFields = {
44532
45411
  HttpMeta: { Response: response, Request: req }
44533
45412
  };
44534
- const [result] = await match(json(200, AddVendorManagedByCompanyAddVendorManagedByCompanyOk$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
45413
+ const [result] = await match(json(200, CreateNewVendorCredentialVersionResponseBody$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44535
45414
  if (!result.ok) {
44536
45415
  return [result, { status: "complete", request: req, response }];
44537
45416
  }
44538
45417
  return [result, { status: "complete", request: req, response }];
44539
45418
  }
44540
- var init_vendorsAddVendorManagedByCompany = __esm(() => {
45419
+ var init_vendorsCreateNewVendorCredentialVersion = __esm(() => {
44541
45420
  init_encodings();
44542
45421
  init_matchers();
44543
45422
  init_primitives();
@@ -44549,23 +45428,23 @@ var init_vendorsAddVendorManagedByCompany = __esm(() => {
44549
45428
  init_async();
44550
45429
  });
44551
45430
 
44552
- // src/mcp-server/tools/vendorsAddVendorManagedByCompany.ts
44553
- var args13, tool$vendorsAddVendorManagedByCompany;
44554
- var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
44555
- init_vendorsAddVendorManagedByCompany();
45431
+ // src/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.ts
45432
+ var args18, tool$vendorsCreateNewVendorCredentialVersion;
45433
+ var init_vendorsCreateNewVendorCredentialVersion2 = __esm(() => {
45434
+ init_vendorsCreateNewVendorCredentialVersion();
44556
45435
  init_operations();
44557
45436
  init_tools();
44558
- args13 = {
44559
- request: AddVendorManagedByCompanyRequest$inboundSchema
45437
+ args18 = {
45438
+ request: CreateNewVendorCredentialVersionRequestBody$inboundSchema
44560
45439
  };
44561
- tool$vendorsAddVendorManagedByCompany = {
44562
- name: "vendors-add-vendor-managed-by-company",
44563
- description: `Add vendor managed by company
45440
+ tool$vendorsCreateNewVendorCredentialVersion = {
45441
+ name: "vendors-create-new-vendor-credential-version",
45442
+ description: `Create new vendor credential version
44564
45443
 
44565
- It will add a vendor managed by company`,
44566
- args: args13,
44567
- tool: async (client, args14, ctx) => {
44568
- const [result, apiCall] = await vendorsAddVendorManagedByCompany(client, args14.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45444
+ It will submit vendor credential`,
45445
+ args: args18,
45446
+ tool: async (client, args19, ctx) => {
45447
+ const [result, apiCall] = await vendorsCreateNewVendorCredentialVersion(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44569
45448
  if (!result.ok) {
44570
45449
  return {
44571
45450
  content: [{ type: "text", text: result.error.message }],
@@ -44578,32 +45457,31 @@ It will add a vendor managed by company`,
44578
45457
  };
44579
45458
  });
44580
45459
 
44581
- // src/funcs/vendorScansVendorScanOut.ts
44582
- function vendorScansVendorScanOut(client, request, options) {
44583
- return new APIPromise($do15(client, request, options));
45460
+ // src/funcs/vendorsCreateOrUpdateBcr.ts
45461
+ function vendorsCreateOrUpdateBcr(client, request, options) {
45462
+ return new APIPromise($do20(client, request, options));
44584
45463
  }
44585
- async function $do15(client, request, options) {
44586
- const parsed = safeParse(request, (value) => VendorScanOutRequest$outboundSchema.parse(value), "Input validation failed");
45464
+ async function $do20(client, request, options) {
45465
+ const parsed = safeParse(request, (value) => CreateOrUpdateBcrRequest$outboundSchema.parse(value), "Input validation failed");
44587
45466
  if (!parsed.ok) {
44588
45467
  return [parsed, { status: "invalid" }];
44589
45468
  }
44590
45469
  const payload = parsed.value;
44591
- const body = null;
45470
+ const body = encodeJSON("body", payload.RequestBody, { explode: true });
44592
45471
  const pathParams = {
44593
- id: encodeSimple("id", payload.id, {
44594
- explode: false,
44595
- charEncoding: "percent"
44596
- })
45472
+ vendor_credential_id: encodeSimple("vendor_credential_id", payload.vendor_credential_id, { explode: false, charEncoding: "percent" })
44597
45473
  };
44598
- const path = pathToFunc("/vendor-scans/{id}/scan-out")(pathParams);
45474
+ const path = pathToFunc("/vendors/credentials/{vendor_credential_id}/bcr")(pathParams);
44599
45475
  const headers = new Headers(compactMap({
45476
+ "Content-Type": "application/json",
44600
45477
  Accept: "application/json"
44601
45478
  }));
44602
45479
  const securityInput = await extractSecurity(client._options.security);
44603
45480
  const requestSecurity = resolveGlobalSecurity(securityInput);
44604
45481
  const context = {
45482
+ options: client._options,
44605
45483
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44606
- operationID: "vendorScanOut",
45484
+ operationID: "createOrUpdateBcr",
44607
45485
  oAuth2Scopes: [],
44608
45486
  resolvedSecurity: requestSecurity,
44609
45487
  securitySource: client._options.security,
@@ -44617,6 +45495,7 @@ async function $do15(client, request, options) {
44617
45495
  path,
44618
45496
  headers,
44619
45497
  body,
45498
+ userAgent: client._options.userAgent,
44620
45499
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44621
45500
  }, options);
44622
45501
  if (!requestRes.ok) {
@@ -44636,13 +45515,14 @@ async function $do15(client, request, options) {
44636
45515
  const responseFields = {
44637
45516
  HttpMeta: { Response: response, Request: req }
44638
45517
  };
44639
- const [result] = await match(json(200, VendorScanOutVendorScanOutOk$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
45518
+ const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44640
45519
  if (!result.ok) {
44641
45520
  return [result, { status: "complete", request: req, response }];
44642
45521
  }
44643
45522
  return [result, { status: "complete", request: req, response }];
44644
45523
  }
44645
- var init_vendorScansVendorScanOut = __esm(() => {
45524
+ var init_vendorsCreateOrUpdateBcr = __esm(() => {
45525
+ init_esm();
44646
45526
  init_encodings();
44647
45527
  init_matchers();
44648
45528
  init_primitives();
@@ -44654,23 +45534,23 @@ var init_vendorScansVendorScanOut = __esm(() => {
44654
45534
  init_async();
44655
45535
  });
44656
45536
 
44657
- // src/mcp-server/tools/vendorScansVendorScanOut.ts
44658
- var args14, tool$vendorScansVendorScanOut;
44659
- var init_vendorScansVendorScanOut2 = __esm(() => {
44660
- init_vendorScansVendorScanOut();
45537
+ // src/mcp-server/tools/vendorsCreateOrUpdateBcr.ts
45538
+ var args19, tool$vendorsCreateOrUpdateBcr;
45539
+ var init_vendorsCreateOrUpdateBcr2 = __esm(() => {
45540
+ init_vendorsCreateOrUpdateBcr();
44661
45541
  init_operations();
44662
45542
  init_tools();
44663
- args14 = {
44664
- request: VendorScanOutRequest$inboundSchema
45543
+ args19 = {
45544
+ request: CreateOrUpdateBcrRequest$inboundSchema
44665
45545
  };
44666
- tool$vendorScansVendorScanOut = {
44667
- name: "vendor-scans-vendor-scan-out",
44668
- description: `Vendor scan out
45546
+ tool$vendorsCreateOrUpdateBcr = {
45547
+ name: "vendors-create-or-update-bcr",
45548
+ description: `Create or update BackgroundCheckResults
44669
45549
 
44670
- It scans out vendor from facility`,
44671
- args: args14,
44672
- tool: async (client, args15, ctx) => {
44673
- const [result, apiCall] = await vendorScansVendorScanOut(client, args15.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45550
+ It will create or update BackgroundCheckResults`,
45551
+ args: args19,
45552
+ tool: async (client, args20, ctx) => {
45553
+ const [result, apiCall] = await vendorsCreateOrUpdateBcr(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44674
45554
  if (!result.ok) {
44675
45555
  return {
44676
45556
  content: [{ type: "text", text: result.error.message }],
@@ -44685,9 +45565,9 @@ It scans out vendor from facility`,
44685
45565
 
44686
45566
  // src/funcs/vendorsCreateVendorCompany.ts
44687
45567
  function vendorsCreateVendorCompany(client, request, options) {
44688
- return new APIPromise($do16(client, request, options));
45568
+ return new APIPromise($do21(client, request, options));
44689
45569
  }
44690
- async function $do16(client, request, options) {
45570
+ async function $do21(client, request, options) {
44691
45571
  const parsed = safeParse(request, (value) => CreateVendorCompanyRequest$outboundSchema.parse(value), "Input validation failed");
44692
45572
  if (!parsed.ok) {
44693
45573
  return [parsed, { status: "invalid" }];
@@ -44708,6 +45588,7 @@ async function $do16(client, request, options) {
44708
45588
  const securityInput = await extractSecurity(client._options.security);
44709
45589
  const requestSecurity = resolveGlobalSecurity(securityInput);
44710
45590
  const context = {
45591
+ options: client._options,
44711
45592
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44712
45593
  operationID: "createVendorCompany",
44713
45594
  oAuth2Scopes: [],
@@ -44723,6 +45604,7 @@ async function $do16(client, request, options) {
44723
45604
  path,
44724
45605
  headers,
44725
45606
  body,
45607
+ userAgent: client._options.userAgent,
44726
45608
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44727
45609
  }, options);
44728
45610
  if (!requestRes.ok) {
@@ -44761,12 +45643,12 @@ var init_vendorsCreateVendorCompany = __esm(() => {
44761
45643
  });
44762
45644
 
44763
45645
  // src/mcp-server/tools/vendorsCreateVendorCompany.ts
44764
- var args15, tool$vendorsCreateVendorCompany;
45646
+ var args20, tool$vendorsCreateVendorCompany;
44765
45647
  var init_vendorsCreateVendorCompany2 = __esm(() => {
44766
45648
  init_vendorsCreateVendorCompany();
44767
45649
  init_operations();
44768
45650
  init_tools();
44769
- args15 = {
45651
+ args20 = {
44770
45652
  request: CreateVendorCompanyRequest$inboundSchema
44771
45653
  };
44772
45654
  tool$vendorsCreateVendorCompany = {
@@ -44774,9 +45656,9 @@ var init_vendorsCreateVendorCompany2 = __esm(() => {
44774
45656
  description: `Create vendor company
44775
45657
 
44776
45658
  Create vendor company`,
44777
- args: args15,
44778
- tool: async (client, args16, ctx) => {
44779
- const [result, apiCall] = await vendorsCreateVendorCompany(client, args16.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45659
+ args: args20,
45660
+ tool: async (client, args21, ctx) => {
45661
+ const [result, apiCall] = await vendorsCreateVendorCompany(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44780
45662
  if (!result.ok) {
44781
45663
  return {
44782
45664
  content: [{ type: "text", text: result.error.message }],
@@ -44791,9 +45673,9 @@ Create vendor company`,
44791
45673
 
44792
45674
  // src/funcs/vendorsCreateVendorRegistration.ts
44793
45675
  function vendorsCreateVendorRegistration(client, request, options) {
44794
- return new APIPromise($do17(client, request, options));
45676
+ return new APIPromise($do22(client, request, options));
44795
45677
  }
44796
- async function $do17(client, request, options) {
45678
+ async function $do22(client, request, options) {
44797
45679
  const parsed = safeParse(request, (value) => CreateVendorRegistrationRequestBody$outboundSchema.parse(value), "Input validation failed");
44798
45680
  if (!parsed.ok) {
44799
45681
  return [parsed, { status: "invalid" }];
@@ -44806,6 +45688,7 @@ async function $do17(client, request, options) {
44806
45688
  Accept: "application/json"
44807
45689
  }));
44808
45690
  const context = {
45691
+ options: client._options,
44809
45692
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44810
45693
  operationID: "createVendorRegistration",
44811
45694
  oAuth2Scopes: [],
@@ -44820,6 +45703,7 @@ async function $do17(client, request, options) {
44820
45703
  path,
44821
45704
  headers,
44822
45705
  body,
45706
+ userAgent: client._options.userAgent,
44823
45707
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44824
45708
  }, options);
44825
45709
  if (!requestRes.ok) {
@@ -44858,12 +45742,12 @@ var init_vendorsCreateVendorRegistration = __esm(() => {
44858
45742
  });
44859
45743
 
44860
45744
  // src/mcp-server/tools/vendorsCreateVendorRegistration.ts
44861
- var args16, tool$vendorsCreateVendorRegistration;
45745
+ var args21, tool$vendorsCreateVendorRegistration;
44862
45746
  var init_vendorsCreateVendorRegistration2 = __esm(() => {
44863
45747
  init_vendorsCreateVendorRegistration();
44864
45748
  init_operations();
44865
45749
  init_tools();
44866
- args16 = {
45750
+ args21 = {
44867
45751
  request: CreateVendorRegistrationRequestBody$inboundSchema
44868
45752
  };
44869
45753
  tool$vendorsCreateVendorRegistration = {
@@ -44871,9 +45755,9 @@ var init_vendorsCreateVendorRegistration2 = __esm(() => {
44871
45755
  description: `Create vendor registration
44872
45756
 
44873
45757
  Create an initial vendor registration. Once successful, the vendor will be able to continue to filling out the rest of their onboarding profile.`,
44874
- args: args16,
44875
- tool: async (client, args17, ctx) => {
44876
- const [result, apiCall] = await vendorsCreateVendorRegistration(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45758
+ args: args21,
45759
+ tool: async (client, args22, ctx) => {
45760
+ const [result, apiCall] = await vendorsCreateVendorRegistration(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44877
45761
  if (!result.ok) {
44878
45762
  return {
44879
45763
  content: [{ type: "text", text: result.error.message }],
@@ -44888,9 +45772,9 @@ Create an initial vendor registration. Once successful, the vendor will be able
44888
45772
 
44889
45773
  // src/funcs/vendorsDeclineVendorCredential.ts
44890
45774
  function vendorsDeclineVendorCredential(client, request, options) {
44891
- return new APIPromise($do18(client, request, options));
45775
+ return new APIPromise($do23(client, request, options));
44892
45776
  }
44893
- async function $do18(client, request, options) {
45777
+ async function $do23(client, request, options) {
44894
45778
  const parsed = safeParse(request, (value) => DeclineVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
44895
45779
  if (!parsed.ok) {
44896
45780
  return [parsed, { status: "invalid" }];
@@ -44907,6 +45791,7 @@ async function $do18(client, request, options) {
44907
45791
  const securityInput = await extractSecurity(client._options.security);
44908
45792
  const requestSecurity = resolveGlobalSecurity(securityInput);
44909
45793
  const context = {
45794
+ options: client._options,
44910
45795
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44911
45796
  operationID: "declineVendorCredential",
44912
45797
  oAuth2Scopes: [],
@@ -44922,6 +45807,7 @@ async function $do18(client, request, options) {
44922
45807
  path,
44923
45808
  headers,
44924
45809
  body,
45810
+ userAgent: client._options.userAgent,
44925
45811
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44926
45812
  }, options);
44927
45813
  if (!requestRes.ok) {
@@ -44961,12 +45847,12 @@ var init_vendorsDeclineVendorCredential = __esm(() => {
44961
45847
  });
44962
45848
 
44963
45849
  // src/mcp-server/tools/vendorsDeclineVendorCredential.ts
44964
- var args17, tool$vendorsDeclineVendorCredential;
45850
+ var args22, tool$vendorsDeclineVendorCredential;
44965
45851
  var init_vendorsDeclineVendorCredential2 = __esm(() => {
44966
45852
  init_vendorsDeclineVendorCredential();
44967
45853
  init_operations();
44968
45854
  init_tools();
44969
- args17 = {
45855
+ args22 = {
44970
45856
  request: DeclineVendorCredentialRequest$inboundSchema
44971
45857
  };
44972
45858
  tool$vendorsDeclineVendorCredential = {
@@ -44974,9 +45860,9 @@ var init_vendorsDeclineVendorCredential2 = __esm(() => {
44974
45860
  description: `Decline vendor credential
44975
45861
 
44976
45862
  It will decline vendor credential`,
44977
- args: args17,
44978
- tool: async (client, args18, ctx) => {
44979
- const [result, apiCall] = await vendorsDeclineVendorCredential(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45863
+ args: args22,
45864
+ tool: async (client, args23, ctx) => {
45865
+ const [result, apiCall] = await vendorsDeclineVendorCredential(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44980
45866
  if (!result.ok) {
44981
45867
  return {
44982
45868
  content: [{ type: "text", text: result.error.message }],
@@ -44991,9 +45877,9 @@ It will decline vendor credential`,
44991
45877
 
44992
45878
  // src/funcs/vendorsDeleteVendorCredentialFile.ts
44993
45879
  function vendorsDeleteVendorCredentialFile(client, request, options) {
44994
- return new APIPromise($do19(client, request, options));
45880
+ return new APIPromise($do24(client, request, options));
44995
45881
  }
44996
- async function $do19(client, request, options) {
45882
+ async function $do24(client, request, options) {
44997
45883
  const parsed = safeParse(request, (value) => DeleteVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
44998
45884
  if (!parsed.ok) {
44999
45885
  return [parsed, { status: "invalid" }];
@@ -45014,6 +45900,7 @@ async function $do19(client, request, options) {
45014
45900
  const securityInput = await extractSecurity(client._options.security);
45015
45901
  const requestSecurity = resolveGlobalSecurity(securityInput);
45016
45902
  const context = {
45903
+ options: client._options,
45017
45904
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45018
45905
  operationID: "deleteVendorCredentialFile",
45019
45906
  oAuth2Scopes: [],
@@ -45029,6 +45916,7 @@ async function $do19(client, request, options) {
45029
45916
  path,
45030
45917
  headers,
45031
45918
  body,
45919
+ userAgent: client._options.userAgent,
45032
45920
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45033
45921
  }, options);
45034
45922
  if (!requestRes.ok) {
@@ -45068,12 +45956,12 @@ var init_vendorsDeleteVendorCredentialFile = __esm(() => {
45068
45956
  });
45069
45957
 
45070
45958
  // src/mcp-server/tools/vendorsDeleteVendorCredentialFile.ts
45071
- var args18, tool$vendorsDeleteVendorCredentialFile;
45959
+ var args23, tool$vendorsDeleteVendorCredentialFile;
45072
45960
  var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
45073
45961
  init_vendorsDeleteVendorCredentialFile();
45074
45962
  init_operations();
45075
45963
  init_tools();
45076
- args18 = {
45964
+ args23 = {
45077
45965
  request: DeleteVendorCredentialFileRequest$inboundSchema
45078
45966
  };
45079
45967
  tool$vendorsDeleteVendorCredentialFile = {
@@ -45081,9 +45969,9 @@ var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
45081
45969
  description: `Delete vendor credential file
45082
45970
 
45083
45971
  It will delete the vendor credential file`,
45084
- args: args18,
45085
- tool: async (client, args19, ctx) => {
45086
- const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45972
+ args: args23,
45973
+ tool: async (client, args24, ctx) => {
45974
+ const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45087
45975
  if (!result.ok) {
45088
45976
  return {
45089
45977
  content: [{ type: "text", text: result.error.message }],
@@ -45098,9 +45986,9 @@ It will delete the vendor credential file`,
45098
45986
 
45099
45987
  // src/funcs/vendorsDeleteVendorManagedByCompany.ts
45100
45988
  function vendorsDeleteVendorManagedByCompany(client, request, options) {
45101
- return new APIPromise($do20(client, request, options));
45989
+ return new APIPromise($do25(client, request, options));
45102
45990
  }
45103
- async function $do20(client, request, options) {
45991
+ async function $do25(client, request, options) {
45104
45992
  const parsed = safeParse(request, (value) => DeleteVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
45105
45993
  if (!parsed.ok) {
45106
45994
  return [parsed, { status: "invalid" }];
@@ -45121,6 +46009,7 @@ async function $do20(client, request, options) {
45121
46009
  const securityInput = await extractSecurity(client._options.security);
45122
46010
  const requestSecurity = resolveGlobalSecurity(securityInput);
45123
46011
  const context = {
46012
+ options: client._options,
45124
46013
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45125
46014
  operationID: "deleteVendorManagedByCompany",
45126
46015
  oAuth2Scopes: [],
@@ -45136,6 +46025,7 @@ async function $do20(client, request, options) {
45136
46025
  path,
45137
46026
  headers,
45138
46027
  body,
46028
+ userAgent: client._options.userAgent,
45139
46029
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45140
46030
  }, options);
45141
46031
  if (!requestRes.ok) {
@@ -45174,12 +46064,12 @@ var init_vendorsDeleteVendorManagedByCompany = __esm(() => {
45174
46064
  });
45175
46065
 
45176
46066
  // src/mcp-server/tools/vendorsDeleteVendorManagedByCompany.ts
45177
- var args19, tool$vendorsDeleteVendorManagedByCompany;
46067
+ var args24, tool$vendorsDeleteVendorManagedByCompany;
45178
46068
  var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
45179
46069
  init_vendorsDeleteVendorManagedByCompany();
45180
46070
  init_operations();
45181
46071
  init_tools();
45182
- args19 = {
46072
+ args24 = {
45183
46073
  request: DeleteVendorManagedByCompanyRequest$inboundSchema
45184
46074
  };
45185
46075
  tool$vendorsDeleteVendorManagedByCompany = {
@@ -45187,9 +46077,9 @@ var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
45187
46077
  description: `Delete vendor managed by company
45188
46078
 
45189
46079
  It will delete the vendor managed by company`,
45190
- args: args19,
45191
- tool: async (client, args20, ctx) => {
45192
- const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46080
+ args: args24,
46081
+ tool: async (client, args25, ctx) => {
46082
+ const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45193
46083
  if (!result.ok) {
45194
46084
  return {
45195
46085
  content: [{ type: "text", text: result.error.message }],
@@ -45204,9 +46094,9 @@ It will delete the vendor managed by company`,
45204
46094
 
45205
46095
  // src/funcs/vendorsExpediteTimeRemaining.ts
45206
46096
  function vendorsExpediteTimeRemaining(client, request, options) {
45207
- return new APIPromise($do21(client, request, options));
46097
+ return new APIPromise($do26(client, request, options));
45208
46098
  }
45209
- async function $do21(client, request, options) {
46099
+ async function $do26(client, request, options) {
45210
46100
  const parsed = safeParse(request, (value) => ExpediteTimeRemainingRequest$outboundSchema.parse(value), "Input validation failed");
45211
46101
  if (!parsed.ok) {
45212
46102
  return [parsed, { status: "invalid" }];
@@ -45226,6 +46116,7 @@ async function $do21(client, request, options) {
45226
46116
  const securityInput = await extractSecurity(client._options.security);
45227
46117
  const requestSecurity = resolveGlobalSecurity(securityInput);
45228
46118
  const context = {
46119
+ options: client._options,
45229
46120
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45230
46121
  operationID: "expediteTimeRemaining",
45231
46122
  oAuth2Scopes: [],
@@ -45241,6 +46132,7 @@ async function $do21(client, request, options) {
45241
46132
  path,
45242
46133
  headers,
45243
46134
  body,
46135
+ userAgent: client._options.userAgent,
45244
46136
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45245
46137
  }, options);
45246
46138
  if (!requestRes.ok) {
@@ -45279,12 +46171,12 @@ var init_vendorsExpediteTimeRemaining = __esm(() => {
45279
46171
  });
45280
46172
 
45281
46173
  // src/mcp-server/tools/vendorsExpediteTimeRemaining.ts
45282
- var args20, tool$vendorsExpediteTimeRemaining;
46174
+ var args25, tool$vendorsExpediteTimeRemaining;
45283
46175
  var init_vendorsExpediteTimeRemaining2 = __esm(() => {
45284
46176
  init_vendorsExpediteTimeRemaining();
45285
46177
  init_operations();
45286
46178
  init_tools();
45287
- args20 = {
46179
+ args25 = {
45288
46180
  request: ExpediteTimeRemainingRequest$inboundSchema
45289
46181
  };
45290
46182
  tool$vendorsExpediteTimeRemaining = {
@@ -45292,9 +46184,9 @@ var init_vendorsExpediteTimeRemaining2 = __esm(() => {
45292
46184
  description: `Expedite time remaining
45293
46185
 
45294
46186
  For vendors who have a paid 24-hour expedite credentials invoice, get the remaining time (in seconds) for which submitted credentials will be expedited.`,
45295
- args: args20,
45296
- tool: async (client, args21, ctx) => {
45297
- const [result, apiCall] = await vendorsExpediteTimeRemaining(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46187
+ args: args25,
46188
+ tool: async (client, args26, ctx) => {
46189
+ const [result, apiCall] = await vendorsExpediteTimeRemaining(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45298
46190
  if (!result.ok) {
45299
46191
  return {
45300
46192
  content: [{ type: "text", text: result.error.message }],
@@ -45309,9 +46201,9 @@ For vendors who have a paid 24-hour expedite credentials invoice, get the remain
45309
46201
 
45310
46202
  // src/funcs/vendorsGetVendorCredentialDetails.ts
45311
46203
  function vendorsGetVendorCredentialDetails(client, request, options) {
45312
- return new APIPromise($do22(client, request, options));
46204
+ return new APIPromise($do27(client, request, options));
45313
46205
  }
45314
- async function $do22(client, request, options) {
46206
+ async function $do27(client, request, options) {
45315
46207
  const parsed = safeParse(request, (value) => GetVendorCredentialDetailsRequest$outboundSchema.parse(value), "Input validation failed");
45316
46208
  if (!parsed.ok) {
45317
46209
  return [parsed, { status: "invalid" }];
@@ -45338,6 +46230,7 @@ async function $do22(client, request, options) {
45338
46230
  const securityInput = await extractSecurity(client._options.security);
45339
46231
  const requestSecurity = resolveGlobalSecurity(securityInput);
45340
46232
  const context = {
46233
+ options: client._options,
45341
46234
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45342
46235
  operationID: "getVendorCredentialDetails",
45343
46236
  oAuth2Scopes: [],
@@ -45354,6 +46247,7 @@ async function $do22(client, request, options) {
45354
46247
  headers,
45355
46248
  query,
45356
46249
  body,
46250
+ userAgent: client._options.userAgent,
45357
46251
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45358
46252
  }, options);
45359
46253
  if (!requestRes.ok) {
@@ -45392,12 +46286,12 @@ var init_vendorsGetVendorCredentialDetails = __esm(() => {
45392
46286
  });
45393
46287
 
45394
46288
  // src/mcp-server/tools/vendorsGetVendorCredentialDetails.ts
45395
- var args21, tool$vendorsGetVendorCredentialDetails;
46289
+ var args26, tool$vendorsGetVendorCredentialDetails;
45396
46290
  var init_vendorsGetVendorCredentialDetails2 = __esm(() => {
45397
46291
  init_vendorsGetVendorCredentialDetails();
45398
46292
  init_operations();
45399
46293
  init_tools();
45400
- args21 = {
46294
+ args26 = {
45401
46295
  request: GetVendorCredentialDetailsRequest$inboundSchema
45402
46296
  };
45403
46297
  tool$vendorsGetVendorCredentialDetails = {
@@ -45422,9 +46316,9 @@ Available \`expand\` scopes are:
45422
46316
  - vendor_credential.vendor_credential_data_requests
45423
46317
  - vendor_credential.credential_variants
45424
46318
  - vendor_credential.targets_chop`,
45425
- args: args21,
45426
- tool: async (client, args22, ctx) => {
45427
- const [result, apiCall] = await vendorsGetVendorCredentialDetails(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46319
+ args: args26,
46320
+ tool: async (client, args27, ctx) => {
46321
+ const [result, apiCall] = await vendorsGetVendorCredentialDetails(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45428
46322
  if (!result.ok) {
45429
46323
  return {
45430
46324
  content: [{ type: "text", text: result.error.message }],
@@ -45439,9 +46333,9 @@ Available \`expand\` scopes are:
45439
46333
 
45440
46334
  // src/funcs/vendorsGetVendorCredentialFile.ts
45441
46335
  function vendorsGetVendorCredentialFile(client, request, options) {
45442
- return new APIPromise($do23(client, request, options));
46336
+ return new APIPromise($do28(client, request, options));
45443
46337
  }
45444
- async function $do23(client, request, options) {
46338
+ async function $do28(client, request, options) {
45445
46339
  const parsed = safeParse(request, (value) => GetVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
45446
46340
  if (!parsed.ok) {
45447
46341
  return [parsed, { status: "invalid" }];
@@ -45465,6 +46359,7 @@ async function $do23(client, request, options) {
45465
46359
  const securityInput = await extractSecurity(client._options.security);
45466
46360
  const requestSecurity = resolveGlobalSecurity(securityInput);
45467
46361
  const context = {
46362
+ options: client._options,
45468
46363
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45469
46364
  operationID: "getVendorCredentialFile",
45470
46365
  oAuth2Scopes: [],
@@ -45481,6 +46376,7 @@ async function $do23(client, request, options) {
45481
46376
  headers,
45482
46377
  query,
45483
46378
  body,
46379
+ userAgent: client._options.userAgent,
45484
46380
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45485
46381
  }, options);
45486
46382
  if (!requestRes.ok) {
@@ -45520,12 +46416,12 @@ var init_vendorsGetVendorCredentialFile = __esm(() => {
45520
46416
  });
45521
46417
 
45522
46418
  // src/mcp-server/tools/vendorsGetVendorCredentialFile.ts
45523
- var args22, tool$vendorsGetVendorCredentialFile;
46419
+ var args27, tool$vendorsGetVendorCredentialFile;
45524
46420
  var init_vendorsGetVendorCredentialFile2 = __esm(() => {
45525
46421
  init_vendorsGetVendorCredentialFile();
45526
46422
  init_operations();
45527
46423
  init_tools();
45528
- args22 = {
46424
+ args27 = {
45529
46425
  request: GetVendorCredentialFileRequest$inboundSchema
45530
46426
  };
45531
46427
  tool$vendorsGetVendorCredentialFile = {
@@ -45538,9 +46434,9 @@ Available \`expand\` scopes are:
45538
46434
 
45539
46435
  - vendor_credential_file.vendor_credential
45540
46436
  - vendor_credential_file.credential_document`,
45541
- args: args22,
45542
- tool: async (client, args23, ctx) => {
45543
- const [result, apiCall] = await vendorsGetVendorCredentialFile(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46437
+ args: args27,
46438
+ tool: async (client, args28, ctx) => {
46439
+ const [result, apiCall] = await vendorsGetVendorCredentialFile(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45544
46440
  if (!result.ok) {
45545
46441
  return {
45546
46442
  content: [{ type: "text", text: result.error.message }],
@@ -45555,9 +46451,9 @@ Available \`expand\` scopes are:
45555
46451
 
45556
46452
  // src/funcs/vendorsGetVendorInvoiceDetails.ts
45557
46453
  function vendorsGetVendorInvoiceDetails(client, request, options) {
45558
- return new APIPromise($do24(client, request, options));
46454
+ return new APIPromise($do29(client, request, options));
45559
46455
  }
45560
- async function $do24(client, request, options) {
46456
+ async function $do29(client, request, options) {
45561
46457
  const parsed = safeParse(request, (value) => GetVendorInvoiceDetailsRequest$outboundSchema.parse(value), "Input validation failed");
45562
46458
  if (!parsed.ok) {
45563
46459
  return [parsed, { status: "invalid" }];
@@ -45580,6 +46476,7 @@ async function $do24(client, request, options) {
45580
46476
  const securityInput = await extractSecurity(client._options.security);
45581
46477
  const requestSecurity = resolveGlobalSecurity(securityInput);
45582
46478
  const context = {
46479
+ options: client._options,
45583
46480
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45584
46481
  operationID: "getVendorInvoiceDetails",
45585
46482
  oAuth2Scopes: [],
@@ -45596,6 +46493,7 @@ async function $do24(client, request, options) {
45596
46493
  headers,
45597
46494
  query,
45598
46495
  body,
46496
+ userAgent: client._options.userAgent,
45599
46497
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45600
46498
  }, options);
45601
46499
  if (!requestRes.ok) {
@@ -45635,12 +46533,12 @@ var init_vendorsGetVendorInvoiceDetails = __esm(() => {
45635
46533
  });
45636
46534
 
45637
46535
  // src/mcp-server/tools/vendorsGetVendorInvoiceDetails.ts
45638
- var args23, tool$vendorsGetVendorInvoiceDetails;
46536
+ var args28, tool$vendorsGetVendorInvoiceDetails;
45639
46537
  var init_vendorsGetVendorInvoiceDetails2 = __esm(() => {
45640
46538
  init_vendorsGetVendorInvoiceDetails();
45641
46539
  init_operations();
45642
46540
  init_tools();
45643
- args23 = {
46541
+ args28 = {
45644
46542
  request: GetVendorInvoiceDetailsRequest$inboundSchema
45645
46543
  };
45646
46544
  tool$vendorsGetVendorInvoiceDetails = {
@@ -45653,9 +46551,116 @@ Available \`expand\` scopes are:
45653
46551
 
45654
46552
  invoice.line_items
45655
46553
  invoice.invoice_transactions`,
45656
- args: args23,
45657
- tool: async (client, args24, ctx) => {
45658
- const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46554
+ args: args28,
46555
+ tool: async (client, args29, ctx) => {
46556
+ const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46557
+ if (!result.ok) {
46558
+ return {
46559
+ content: [{ type: "text", text: result.error.message }],
46560
+ isError: true
46561
+ };
46562
+ }
46563
+ const value = result.value;
46564
+ return formatResult(value, apiCall);
46565
+ }
46566
+ };
46567
+ });
46568
+
46569
+ // src/funcs/vendorsGetVendorLegalName.ts
46570
+ function vendorsGetVendorLegalName(client, request, options) {
46571
+ return new APIPromise($do30(client, request, options));
46572
+ }
46573
+ async function $do30(client, request, options) {
46574
+ const parsed = safeParse(request, (value) => GetVendorLegalNameRequest$outboundSchema.parse(value), "Input validation failed");
46575
+ if (!parsed.ok) {
46576
+ return [parsed, { status: "invalid" }];
46577
+ }
46578
+ const payload = parsed.value;
46579
+ const body = null;
46580
+ const pathParams = {
46581
+ vendor_id_or_me: encodeSimple("vendor_id_or_me", payload.vendor_id_or_me, {
46582
+ explode: false,
46583
+ charEncoding: "percent"
46584
+ })
46585
+ };
46586
+ const path = pathToFunc("/vendors/{vendor_id_or_me}/legal-name")(pathParams);
46587
+ const headers = new Headers(compactMap({
46588
+ Accept: "application/json"
46589
+ }));
46590
+ const securityInput = await extractSecurity(client._options.security);
46591
+ const requestSecurity = resolveGlobalSecurity(securityInput);
46592
+ const context = {
46593
+ options: client._options,
46594
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
46595
+ operationID: "getVendorLegalName",
46596
+ oAuth2Scopes: [],
46597
+ resolvedSecurity: requestSecurity,
46598
+ securitySource: client._options.security,
46599
+ retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
46600
+ retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
46601
+ };
46602
+ const requestRes = client._createRequest(context, {
46603
+ security: requestSecurity,
46604
+ method: "GET",
46605
+ baseURL: options?.serverURL,
46606
+ path,
46607
+ headers,
46608
+ body,
46609
+ userAgent: client._options.userAgent,
46610
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46611
+ }, options);
46612
+ if (!requestRes.ok) {
46613
+ return [requestRes, { status: "invalid" }];
46614
+ }
46615
+ const req = requestRes.value;
46616
+ const doResult = await client._do(req, {
46617
+ context,
46618
+ errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
46619
+ retryConfig: context.retryConfig,
46620
+ retryCodes: context.retryCodes
46621
+ });
46622
+ if (!doResult.ok) {
46623
+ return [doResult, { status: "request-error", request: req }];
46624
+ }
46625
+ const response = doResult.value;
46626
+ const responseFields = {
46627
+ HttpMeta: { Response: response, Request: req }
46628
+ };
46629
+ const [result] = await match(json(200, GetVendorLegalNameResponseBody$inboundSchema), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
46630
+ if (!result.ok) {
46631
+ return [result, { status: "complete", request: req, response }];
46632
+ }
46633
+ return [result, { status: "complete", request: req, response }];
46634
+ }
46635
+ var init_vendorsGetVendorLegalName = __esm(() => {
46636
+ init_encodings();
46637
+ init_matchers();
46638
+ init_primitives();
46639
+ init_schemas();
46640
+ init_security();
46641
+ init_url();
46642
+ init_errors2();
46643
+ init_operations();
46644
+ init_async();
46645
+ });
46646
+
46647
+ // src/mcp-server/tools/vendorsGetVendorLegalName.ts
46648
+ var args29, tool$vendorsGetVendorLegalName;
46649
+ var init_vendorsGetVendorLegalName2 = __esm(() => {
46650
+ init_vendorsGetVendorLegalName();
46651
+ init_operations();
46652
+ init_tools();
46653
+ args29 = {
46654
+ request: GetVendorLegalNameRequest$inboundSchema
46655
+ };
46656
+ tool$vendorsGetVendorLegalName = {
46657
+ name: "vendors-get-vendor-legal-name",
46658
+ description: `Get Vendor legal name
46659
+
46660
+ Get vendor legal name`,
46661
+ args: args29,
46662
+ tool: async (client, args30, ctx) => {
46663
+ const [result, apiCall] = await vendorsGetVendorLegalName(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45659
46664
  if (!result.ok) {
45660
46665
  return {
45661
46666
  content: [{ type: "text", text: result.error.message }],
@@ -45670,9 +46675,9 @@ invoice.invoice_transactions`,
45670
46675
 
45671
46676
  // src/funcs/vendorsGetVendorsDetails.ts
45672
46677
  function vendorsGetVendorsDetails(client, request, options) {
45673
- return new APIPromise($do25(client, request, options));
46678
+ return new APIPromise($do31(client, request, options));
45674
46679
  }
45675
- async function $do25(client, request, options) {
46680
+ async function $do31(client, request, options) {
45676
46681
  const parsed = safeParse(request, (value) => GetVendorsDetailsRequest$outboundSchema.parse(value), "Input validation failed");
45677
46682
  if (!parsed.ok) {
45678
46683
  return [parsed, { status: "invalid" }];
@@ -45695,6 +46700,7 @@ async function $do25(client, request, options) {
45695
46700
  const securityInput = await extractSecurity(client._options.security);
45696
46701
  const requestSecurity = resolveGlobalSecurity(securityInput);
45697
46702
  const context = {
46703
+ options: client._options,
45698
46704
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45699
46705
  operationID: "getVendorsDetails",
45700
46706
  oAuth2Scopes: [],
@@ -45711,6 +46717,7 @@ async function $do25(client, request, options) {
45711
46717
  headers,
45712
46718
  query,
45713
46719
  body,
46720
+ userAgent: client._options.userAgent,
45714
46721
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45715
46722
  }, options);
45716
46723
  if (!requestRes.ok) {
@@ -45750,12 +46757,12 @@ var init_vendorsGetVendorsDetails = __esm(() => {
45750
46757
  });
45751
46758
 
45752
46759
  // src/mcp-server/tools/vendorsGetVendorsDetails.ts
45753
- var args24, tool$vendorsGetVendorsDetails;
46760
+ var args30, tool$vendorsGetVendorsDetails;
45754
46761
  var init_vendorsGetVendorsDetails2 = __esm(() => {
45755
46762
  init_vendorsGetVendorsDetails();
45756
46763
  init_operations();
45757
46764
  init_tools();
45758
- args24 = {
46765
+ args30 = {
45759
46766
  request: GetVendorsDetailsRequest$inboundSchema
45760
46767
  };
45761
46768
  tool$vendorsGetVendorsDetails = {
@@ -45780,9 +46787,9 @@ vendor.payment_responsibility
45780
46787
  vendor.background_check_date_expires
45781
46788
  vendor.registration_data
45782
46789
  vendor.registration_finished`,
45783
- args: args24,
45784
- tool: async (client, args25, ctx) => {
45785
- const [result, apiCall] = await vendorsGetVendorsDetails(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46790
+ args: args30,
46791
+ tool: async (client, args31, ctx) => {
46792
+ const [result, apiCall] = await vendorsGetVendorsDetails(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45786
46793
  if (!result.ok) {
45787
46794
  return {
45788
46795
  content: [{ type: "text", text: result.error.message }],
@@ -45797,9 +46804,9 @@ vendor.registration_finished`,
45797
46804
 
45798
46805
  // src/funcs/vendorsListVendorAdditionalFacilityFields.ts
45799
46806
  function vendorsListVendorAdditionalFacilityFields(client, request, options) {
45800
- return new APIPromise($do26(client, request, options));
46807
+ return new APIPromise($do32(client, request, options));
45801
46808
  }
45802
- async function $do26(client, request, options) {
46809
+ async function $do32(client, request, options) {
45803
46810
  const parsed = safeParse(request, (value) => ListVendorAdditionalFacilityFieldsRequest$outboundSchema.parse(value), "Input validation failed");
45804
46811
  if (!parsed.ok) {
45805
46812
  return [haltIterator(parsed), { status: "invalid" }];
@@ -45812,21 +46819,165 @@ async function $do26(client, request, options) {
45812
46819
  charEncoding: "percent"
45813
46820
  })
45814
46821
  };
45815
- const path = pathToFunc("/vendors/{vendor_id_or_me}/additional-facility-fields")(pathParams);
45816
- const query = encodeFormQuery({
46822
+ const path = pathToFunc("/vendors/{vendor_id_or_me}/additional-facility-fields")(pathParams);
46823
+ const query = encodeFormQuery({
46824
+ desc: payload.desc,
46825
+ items_per_page: payload.items_per_page,
46826
+ page: payload.page,
46827
+ sort: payload.sort
46828
+ });
46829
+ const headers = new Headers(compactMap({
46830
+ Accept: "application/json"
46831
+ }));
46832
+ const securityInput = await extractSecurity(client._options.security);
46833
+ const requestSecurity = resolveGlobalSecurity(securityInput);
46834
+ const context = {
46835
+ options: client._options,
46836
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
46837
+ operationID: "listVendorAdditionalFacilityFields",
46838
+ oAuth2Scopes: [],
46839
+ resolvedSecurity: requestSecurity,
46840
+ securitySource: client._options.security,
46841
+ retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
46842
+ retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
46843
+ };
46844
+ const requestRes = client._createRequest(context, {
46845
+ security: requestSecurity,
46846
+ method: "GET",
46847
+ baseURL: options?.serverURL,
46848
+ path,
46849
+ headers,
46850
+ query,
46851
+ body,
46852
+ userAgent: client._options.userAgent,
46853
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46854
+ }, options);
46855
+ if (!requestRes.ok) {
46856
+ return [haltIterator(requestRes), { status: "invalid" }];
46857
+ }
46858
+ const req = requestRes.value;
46859
+ const doResult = await client._do(req, {
46860
+ context,
46861
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
46862
+ retryConfig: context.retryConfig,
46863
+ retryCodes: context.retryCodes
46864
+ });
46865
+ if (!doResult.ok) {
46866
+ return [haltIterator(doResult), { status: "request-error", request: req }];
46867
+ }
46868
+ const response = doResult.value;
46869
+ const responseFields = {
46870
+ HttpMeta: { Response: response, Request: req }
46871
+ };
46872
+ const [result, raw] = await match(json(200, ListVendorAdditionalFacilityFieldsResponse$inboundSchema, { key: "Result" }), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
46873
+ if (!result.ok) {
46874
+ return [haltIterator(result), {
46875
+ status: "complete",
46876
+ request: req,
46877
+ response
46878
+ }];
46879
+ }
46880
+ const nextFunc = (responseData) => {
46881
+ const page2 = request?.page ?? 1;
46882
+ const nextPage = page2 + 1;
46883
+ if (!responseData) {
46884
+ return { next: () => null };
46885
+ }
46886
+ const results = dlv(responseData, "items");
46887
+ if (!Array.isArray(results) || !results.length) {
46888
+ return { next: () => null };
46889
+ }
46890
+ const limit = request?.itemsPerPage ?? 0;
46891
+ if (results.length < limit) {
46892
+ return { next: () => null };
46893
+ }
46894
+ const nextVal = () => vendorsListVendorAdditionalFacilityFields(client, {
46895
+ ...request,
46896
+ page: nextPage
46897
+ }, options);
46898
+ return { next: nextVal, "~next": { page: nextPage } };
46899
+ };
46900
+ const page = { ...result, ...nextFunc(raw) };
46901
+ return [{ ...page, ...createPageIterator(page, (v2) => !v2.ok) }, {
46902
+ status: "complete",
46903
+ request: req,
46904
+ response
46905
+ }];
46906
+ }
46907
+ var init_vendorsListVendorAdditionalFacilityFields = __esm(() => {
46908
+ init_encodings();
46909
+ init_matchers();
46910
+ init_primitives();
46911
+ init_schemas();
46912
+ init_security();
46913
+ init_url();
46914
+ init_errors2();
46915
+ init_operations();
46916
+ init_async();
46917
+ init_operations2();
46918
+ });
46919
+
46920
+ // src/mcp-server/tools/vendorsListVendorAdditionalFacilityFields.ts
46921
+ var args31, tool$vendorsListVendorAdditionalFacilityFields;
46922
+ var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
46923
+ init_vendorsListVendorAdditionalFacilityFields();
46924
+ init_operations();
46925
+ init_tools();
46926
+ args31 = {
46927
+ request: ListVendorAdditionalFacilityFieldsRequest$inboundSchema
46928
+ };
46929
+ tool$vendorsListVendorAdditionalFacilityFields = {
46930
+ name: "vendors-list-vendor-additional-facility-fields",
46931
+ description: `List of vendor's additional facility fields
46932
+
46933
+ List of vendor's additional facility fields`,
46934
+ args: args31,
46935
+ tool: async (client, args32, ctx) => {
46936
+ const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46937
+ if (!result.ok) {
46938
+ return {
46939
+ content: [{ type: "text", text: result.error.message }],
46940
+ isError: true
46941
+ };
46942
+ }
46943
+ const value = result.value.result;
46944
+ return formatResult(value, apiCall);
46945
+ }
46946
+ };
46947
+ });
46948
+
46949
+ // src/funcs/vendorsListVendorCredentialDataRequests.ts
46950
+ function vendorsListVendorCredentialDataRequests(client, request, options) {
46951
+ return new APIPromise($do33(client, request, options));
46952
+ }
46953
+ async function $do33(client, request, options) {
46954
+ const parsed = safeParse(request, (value) => ListVendorCredentialDataRequestsRequest$outboundSchema.parse(value), "Input validation failed");
46955
+ if (!parsed.ok) {
46956
+ return [parsed, { status: "invalid" }];
46957
+ }
46958
+ const payload = parsed.value;
46959
+ const body = null;
46960
+ const pathParams = {
46961
+ vendor_credential_id: encodeSimple("vendor_credential_id", payload.vendor_credential_id, { explode: false, charEncoding: "percent" })
46962
+ };
46963
+ const path = pathToFunc("/vendors/credentials/{vendor_credential_id}/data_requests")(pathParams);
46964
+ const query = queryJoin(encodeFormQuery({
46965
+ expand: payload.expand
46966
+ }, { explode: false }), encodeFormQuery({
45817
46967
  desc: payload.desc,
45818
46968
  items_per_page: payload.items_per_page,
45819
46969
  page: payload.page,
45820
46970
  sort: payload.sort
45821
- });
46971
+ }));
45822
46972
  const headers = new Headers(compactMap({
45823
46973
  Accept: "application/json"
45824
46974
  }));
45825
46975
  const securityInput = await extractSecurity(client._options.security);
45826
46976
  const requestSecurity = resolveGlobalSecurity(securityInput);
45827
46977
  const context = {
46978
+ options: client._options,
45828
46979
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45829
- operationID: "listVendorAdditionalFacilityFields",
46980
+ operationID: "listVendorCredentialDataRequests",
45830
46981
  oAuth2Scopes: [],
45831
46982
  resolvedSecurity: requestSecurity,
45832
46983
  securitySource: client._options.security,
@@ -45841,10 +46992,11 @@ async function $do26(client, request, options) {
45841
46992
  headers,
45842
46993
  query,
45843
46994
  body,
46995
+ userAgent: client._options.userAgent,
45844
46996
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45845
46997
  }, options);
45846
46998
  if (!requestRes.ok) {
45847
- return [haltIterator(requestRes), { status: "invalid" }];
46999
+ return [requestRes, { status: "invalid" }];
45848
47000
  }
45849
47001
  const req = requestRes.value;
45850
47002
  const doResult = await client._do(req, {
@@ -45854,84 +47006,61 @@ async function $do26(client, request, options) {
45854
47006
  retryCodes: context.retryCodes
45855
47007
  });
45856
47008
  if (!doResult.ok) {
45857
- return [haltIterator(doResult), { status: "request-error", request: req }];
47009
+ return [doResult, { status: "request-error", request: req }];
45858
47010
  }
45859
47011
  const response = doResult.value;
45860
47012
  const responseFields = {
45861
47013
  HttpMeta: { Response: response, Request: req }
45862
47014
  };
45863
- const [result, raw] = await match(json(200, ListVendorAdditionalFacilityFieldsResponse$inboundSchema, { key: "Result" }), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
47015
+ const [result] = await match(json(200, arrayType(nullableType(VendorCredentialDataRequest$inboundSchema))), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
45864
47016
  if (!result.ok) {
45865
- return [haltIterator(result), {
45866
- status: "complete",
45867
- request: req,
45868
- response
45869
- }];
47017
+ return [result, { status: "complete", request: req, response }];
45870
47018
  }
45871
- const nextFunc = (responseData) => {
45872
- const page2 = request?.page ?? 1;
45873
- const nextPage = page2 + 1;
45874
- if (!responseData) {
45875
- return { next: () => null };
45876
- }
45877
- const results = dlv(responseData, "items");
45878
- if (!Array.isArray(results) || !results.length) {
45879
- return { next: () => null };
45880
- }
45881
- const limit = request?.itemsPerPage ?? 0;
45882
- if (results.length < limit) {
45883
- return { next: () => null };
45884
- }
45885
- const nextVal = () => vendorsListVendorAdditionalFacilityFields(client, {
45886
- ...request,
45887
- page: nextPage
45888
- }, options);
45889
- return { next: nextVal, "~next": { page: nextPage } };
45890
- };
45891
- const page = { ...result, ...nextFunc(raw) };
45892
- return [{ ...page, ...createPageIterator(page, (v2) => !v2.ok) }, {
45893
- status: "complete",
45894
- request: req,
45895
- response
45896
- }];
47019
+ return [result, { status: "complete", request: req, response }];
45897
47020
  }
45898
- var init_vendorsListVendorAdditionalFacilityFields = __esm(() => {
47021
+ var init_vendorsListVendorCredentialDataRequests = __esm(() => {
47022
+ init_esm();
45899
47023
  init_encodings();
45900
47024
  init_matchers();
45901
47025
  init_primitives();
45902
47026
  init_schemas();
45903
47027
  init_security();
45904
47028
  init_url();
47029
+ init_components();
45905
47030
  init_errors2();
45906
47031
  init_operations();
45907
47032
  init_async();
45908
- init_operations2();
45909
47033
  });
45910
47034
 
45911
- // src/mcp-server/tools/vendorsListVendorAdditionalFacilityFields.ts
45912
- var args25, tool$vendorsListVendorAdditionalFacilityFields;
45913
- var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
45914
- init_vendorsListVendorAdditionalFacilityFields();
47035
+ // src/mcp-server/tools/vendorsListVendorCredentialDataRequests.ts
47036
+ var args32, tool$vendorsListVendorCredentialDataRequests;
47037
+ var init_vendorsListVendorCredentialDataRequests2 = __esm(() => {
47038
+ init_vendorsListVendorCredentialDataRequests();
45915
47039
  init_operations();
45916
47040
  init_tools();
45917
- args25 = {
45918
- request: ListVendorAdditionalFacilityFieldsRequest$inboundSchema
47041
+ args32 = {
47042
+ request: ListVendorCredentialDataRequestsRequest$inboundSchema
45919
47043
  };
45920
- tool$vendorsListVendorAdditionalFacilityFields = {
45921
- name: "vendors-list-vendor-additional-facility-fields",
45922
- description: `List of vendor's additional facility fields
47044
+ tool$vendorsListVendorCredentialDataRequests = {
47045
+ name: "vendors-list-vendor-credential-data-requests",
47046
+ description: `List vendor credential data requests
45923
47047
 
45924
- List of vendor's additional facility fields`,
45925
- args: args25,
45926
- tool: async (client, args26, ctx) => {
45927
- const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47048
+ Retrieve an vendor credential data requests.
47049
+
47050
+ Available \`expand\` scopes are:
47051
+
47052
+ - vendor_credential_data_request.vendor_credential
47053
+ - vendor_credential_data_request.data_request`,
47054
+ args: args32,
47055
+ tool: async (client, args33, ctx) => {
47056
+ const [result, apiCall] = await vendorsListVendorCredentialDataRequests(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45928
47057
  if (!result.ok) {
45929
47058
  return {
45930
47059
  content: [{ type: "text", text: result.error.message }],
45931
47060
  isError: true
45932
47061
  };
45933
47062
  }
45934
- const value = result.value.result;
47063
+ const value = result.value;
45935
47064
  return formatResult(value, apiCall);
45936
47065
  }
45937
47066
  };
@@ -45939,9 +47068,9 @@ List of vendor's additional facility fields`,
45939
47068
 
45940
47069
  // src/funcs/vendorsListVendorCredentialFiles.ts
45941
47070
  function vendorsListVendorCredentialFiles(client, request, options) {
45942
- return new APIPromise($do27(client, request, options));
47071
+ return new APIPromise($do34(client, request, options));
45943
47072
  }
45944
- async function $do27(client, request, options) {
47073
+ async function $do34(client, request, options) {
45945
47074
  const parsed = safeParse(request, (value) => ListVendorCredentialFilesRequest$outboundSchema.parse(value), "Input validation failed");
45946
47075
  if (!parsed.ok) {
45947
47076
  return [parsed, { status: "invalid" }];
@@ -45966,6 +47095,7 @@ async function $do27(client, request, options) {
45966
47095
  const securityInput = await extractSecurity(client._options.security);
45967
47096
  const requestSecurity = resolveGlobalSecurity(securityInput);
45968
47097
  const context = {
47098
+ options: client._options,
45969
47099
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45970
47100
  operationID: "listVendorCredentialFiles",
45971
47101
  oAuth2Scopes: [],
@@ -45982,6 +47112,7 @@ async function $do27(client, request, options) {
45982
47112
  headers,
45983
47113
  query,
45984
47114
  body,
47115
+ userAgent: client._options.userAgent,
45985
47116
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45986
47117
  }, options);
45987
47118
  if (!requestRes.ok) {
@@ -46022,12 +47153,12 @@ var init_vendorsListVendorCredentialFiles = __esm(() => {
46022
47153
  });
46023
47154
 
46024
47155
  // src/mcp-server/tools/vendorsListVendorCredentialFiles.ts
46025
- var args26, tool$vendorsListVendorCredentialFiles;
47156
+ var args33, tool$vendorsListVendorCredentialFiles;
46026
47157
  var init_vendorsListVendorCredentialFiles2 = __esm(() => {
46027
47158
  init_vendorsListVendorCredentialFiles();
46028
47159
  init_operations();
46029
47160
  init_tools();
46030
- args26 = {
47161
+ args33 = {
46031
47162
  request: ListVendorCredentialFilesRequest$inboundSchema
46032
47163
  };
46033
47164
  tool$vendorsListVendorCredentialFiles = {
@@ -46040,9 +47171,9 @@ Available \`expand\` scopes are:
46040
47171
 
46041
47172
  - vendor_credential_file.vendor_credential
46042
47173
  - vendor_credential_file.credential_document`,
46043
- args: args26,
46044
- tool: async (client, args27, ctx) => {
46045
- const [result, apiCall] = await vendorsListVendorCredentialFiles(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47174
+ args: args33,
47175
+ tool: async (client, args34, ctx) => {
47176
+ const [result, apiCall] = await vendorsListVendorCredentialFiles(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46046
47177
  if (!result.ok) {
46047
47178
  return {
46048
47179
  content: [{ type: "text", text: result.error.message }],
@@ -46057,9 +47188,9 @@ Available \`expand\` scopes are:
46057
47188
 
46058
47189
  // src/funcs/vendorsListVendorCredentialHistory.ts
46059
47190
  function vendorsListVendorCredentialHistory(client, request, options) {
46060
- return new APIPromise($do28(client, request, options));
47191
+ return new APIPromise($do35(client, request, options));
46061
47192
  }
46062
- async function $do28(client, request, options) {
47193
+ async function $do35(client, request, options) {
46063
47194
  const parsed = safeParse(request, (value) => ListVendorCredentialHistoryRequest$outboundSchema.parse(value), "Input validation failed");
46064
47195
  if (!parsed.ok) {
46065
47196
  return [haltIterator(parsed), { status: "invalid" }];
@@ -46086,6 +47217,7 @@ async function $do28(client, request, options) {
46086
47217
  const securityInput = await extractSecurity(client._options.security);
46087
47218
  const requestSecurity = resolveGlobalSecurity(securityInput);
46088
47219
  const context = {
47220
+ options: client._options,
46089
47221
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46090
47222
  operationID: "listVendorCredentialHistory",
46091
47223
  oAuth2Scopes: [],
@@ -46102,6 +47234,7 @@ async function $do28(client, request, options) {
46102
47234
  headers,
46103
47235
  query,
46104
47236
  body,
47237
+ userAgent: client._options.userAgent,
46105
47238
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46106
47239
  }, options);
46107
47240
  if (!requestRes.ok) {
@@ -46172,12 +47305,12 @@ var init_vendorsListVendorCredentialHistory = __esm(() => {
46172
47305
  });
46173
47306
 
46174
47307
  // src/mcp-server/tools/vendorsListVendorCredentialHistory.ts
46175
- var args27, tool$vendorsListVendorCredentialHistory;
47308
+ var args34, tool$vendorsListVendorCredentialHistory;
46176
47309
  var init_vendorsListVendorCredentialHistory2 = __esm(() => {
46177
47310
  init_vendorsListVendorCredentialHistory();
46178
47311
  init_operations();
46179
47312
  init_tools();
46180
- args27 = {
47313
+ args34 = {
46181
47314
  request: ListVendorCredentialHistoryRequest$inboundSchema
46182
47315
  };
46183
47316
  tool$vendorsListVendorCredentialHistory = {
@@ -46185,9 +47318,9 @@ var init_vendorsListVendorCredentialHistory2 = __esm(() => {
46185
47318
  description: `List Vendor Credential History
46186
47319
 
46187
47320
  Lists vendor credentials history`,
46188
- args: args27,
46189
- tool: async (client, args28, ctx) => {
46190
- const [result, apiCall] = await vendorsListVendorCredentialHistory(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47321
+ args: args34,
47322
+ tool: async (client, args35, ctx) => {
47323
+ const [result, apiCall] = await vendorsListVendorCredentialHistory(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46191
47324
  if (!result.ok) {
46192
47325
  return {
46193
47326
  content: [{ type: "text", text: result.error.message }],
@@ -46202,9 +47335,9 @@ Lists vendor credentials history`,
46202
47335
 
46203
47336
  // src/funcs/vendorsListVendorCredentials.ts
46204
47337
  function vendorsListVendorCredentials(client, request, options) {
46205
- return new APIPromise($do29(client, request, options));
47338
+ return new APIPromise($do36(client, request, options));
46206
47339
  }
46207
- async function $do29(client, request, options) {
47340
+ async function $do36(client, request, options) {
46208
47341
  const parsed = safeParse(request, (value) => ListVendorCredentialsRequest$outboundSchema.parse(value), "Input validation failed");
46209
47342
  if (!parsed.ok) {
46210
47343
  return [haltIterator(parsed), { status: "invalid" }];
@@ -46236,6 +47369,7 @@ async function $do29(client, request, options) {
46236
47369
  const securityInput = await extractSecurity(client._options.security);
46237
47370
  const requestSecurity = resolveGlobalSecurity(securityInput);
46238
47371
  const context = {
47372
+ options: client._options,
46239
47373
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46240
47374
  operationID: "listVendorCredentials",
46241
47375
  oAuth2Scopes: [],
@@ -46252,6 +47386,7 @@ async function $do29(client, request, options) {
46252
47386
  headers,
46253
47387
  query,
46254
47388
  body,
47389
+ userAgent: client._options.userAgent,
46255
47390
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46256
47391
  }, options);
46257
47392
  if (!requestRes.ok) {
@@ -46322,12 +47457,12 @@ var init_vendorsListVendorCredentials = __esm(() => {
46322
47457
  });
46323
47458
 
46324
47459
  // src/mcp-server/tools/vendorsListVendorCredentials.ts
46325
- var args28, tool$vendorsListVendorCredentials;
47460
+ var args35, tool$vendorsListVendorCredentials;
46326
47461
  var init_vendorsListVendorCredentials2 = __esm(() => {
46327
47462
  init_vendorsListVendorCredentials();
46328
47463
  init_operations();
46329
47464
  init_tools();
46330
- args28 = {
47465
+ args35 = {
46331
47466
  request: ListVendorCredentialsRequest$inboundSchema
46332
47467
  };
46333
47468
  tool$vendorsListVendorCredentials = {
@@ -46335,9 +47470,9 @@ var init_vendorsListVendorCredentials2 = __esm(() => {
46335
47470
  description: `List Vendor Credentials
46336
47471
 
46337
47472
  Lists vendor credentials, required credentials, and company credentials. Utilized in Vendor Dashboard.`,
46338
- args: args28,
46339
- tool: async (client, args29, ctx) => {
46340
- const [result, apiCall] = await vendorsListVendorCredentials(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47473
+ args: args35,
47474
+ tool: async (client, args36, ctx) => {
47475
+ const [result, apiCall] = await vendorsListVendorCredentials(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46341
47476
  if (!result.ok) {
46342
47477
  return {
46343
47478
  content: [{ type: "text", text: result.error.message }],
@@ -46352,9 +47487,9 @@ Lists vendor credentials, required credentials, and company credentials. Utilize
46352
47487
 
46353
47488
  // src/funcs/vendorsListVendorCredits.ts
46354
47489
  function vendorsListVendorCredits(client, request, options) {
46355
- return new APIPromise($do30(client, request, options));
47490
+ return new APIPromise($do37(client, request, options));
46356
47491
  }
46357
- async function $do30(client, request, options) {
47492
+ async function $do37(client, request, options) {
46358
47493
  const parsed = safeParse(request, (value) => ListVendorCreditsRequest$outboundSchema.parse(value), "Input validation failed");
46359
47494
  if (!parsed.ok) {
46360
47495
  return [haltIterator(parsed), { status: "invalid" }];
@@ -46380,6 +47515,7 @@ async function $do30(client, request, options) {
46380
47515
  const securityInput = await extractSecurity(client._options.security);
46381
47516
  const requestSecurity = resolveGlobalSecurity(securityInput);
46382
47517
  const context = {
47518
+ options: client._options,
46383
47519
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46384
47520
  operationID: "listVendorCredits",
46385
47521
  oAuth2Scopes: [],
@@ -46396,6 +47532,7 @@ async function $do30(client, request, options) {
46396
47532
  headers,
46397
47533
  query,
46398
47534
  body,
47535
+ userAgent: client._options.userAgent,
46399
47536
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46400
47537
  }, options);
46401
47538
  if (!requestRes.ok) {
@@ -46466,12 +47603,12 @@ var init_vendorsListVendorCredits = __esm(() => {
46466
47603
  });
46467
47604
 
46468
47605
  // src/mcp-server/tools/vendorsListVendorCredits.ts
46469
- var args29, tool$vendorsListVendorCredits;
47606
+ var args36, tool$vendorsListVendorCredits;
46470
47607
  var init_vendorsListVendorCredits2 = __esm(() => {
46471
47608
  init_vendorsListVendorCredits();
46472
47609
  init_operations();
46473
47610
  init_tools();
46474
- args29 = {
47611
+ args36 = {
46475
47612
  request: ListVendorCreditsRequest$inboundSchema
46476
47613
  };
46477
47614
  tool$vendorsListVendorCredits = {
@@ -46479,9 +47616,9 @@ var init_vendorsListVendorCredits2 = __esm(() => {
46479
47616
  description: `List vendor credits
46480
47617
 
46481
47618
  List the credits for the vendor`,
46482
- args: args29,
46483
- tool: async (client, args30, ctx) => {
46484
- const [result, apiCall] = await vendorsListVendorCredits(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47619
+ args: args36,
47620
+ tool: async (client, args37, ctx) => {
47621
+ const [result, apiCall] = await vendorsListVendorCredits(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46485
47622
  if (!result.ok) {
46486
47623
  return {
46487
47624
  content: [{ type: "text", text: result.error.message }],
@@ -46496,9 +47633,9 @@ List the credits for the vendor`,
46496
47633
 
46497
47634
  // src/funcs/vendorsListVendorFacilityStatuses.ts
46498
47635
  function vendorsListVendorFacilityStatuses(client, request, options) {
46499
- return new APIPromise($do31(client, request, options));
47636
+ return new APIPromise($do38(client, request, options));
46500
47637
  }
46501
- async function $do31(client, request, options) {
47638
+ async function $do38(client, request, options) {
46502
47639
  const parsed = safeParse(request, (value) => ListVendorFacilityStatusesRequest$outboundSchema.parse(value), "Input validation failed");
46503
47640
  if (!parsed.ok) {
46504
47641
  return [haltIterator(parsed), { status: "invalid" }];
@@ -46520,6 +47657,7 @@ async function $do31(client, request, options) {
46520
47657
  const securityInput = await extractSecurity(client._options.security);
46521
47658
  const requestSecurity = resolveGlobalSecurity(securityInput);
46522
47659
  const context = {
47660
+ options: client._options,
46523
47661
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46524
47662
  operationID: "listVendorFacilityStatuses",
46525
47663
  oAuth2Scopes: [],
@@ -46536,6 +47674,7 @@ async function $do31(client, request, options) {
46536
47674
  headers,
46537
47675
  query,
46538
47676
  body,
47677
+ userAgent: client._options.userAgent,
46539
47678
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46540
47679
  }, options);
46541
47680
  if (!requestRes.ok) {
@@ -46606,12 +47745,12 @@ var init_vendorsListVendorFacilityStatuses = __esm(() => {
46606
47745
  });
46607
47746
 
46608
47747
  // src/mcp-server/tools/vendorsListVendorFacilityStatuses.ts
46609
- var args30, tool$vendorsListVendorFacilityStatuses;
47748
+ var args37, tool$vendorsListVendorFacilityStatuses;
46610
47749
  var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
46611
47750
  init_vendorsListVendorFacilityStatuses();
46612
47751
  init_operations();
46613
47752
  init_tools();
46614
- args30 = {
47753
+ args37 = {
46615
47754
  request: ListVendorFacilityStatusesRequest$inboundSchema
46616
47755
  };
46617
47756
  tool$vendorsListVendorFacilityStatuses = {
@@ -46619,9 +47758,9 @@ var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
46619
47758
  description: `List vendor facility statuses
46620
47759
 
46621
47760
  List the facilities for the vendor`,
46622
- args: args30,
46623
- tool: async (client, args31, ctx) => {
46624
- const [result, apiCall] = await vendorsListVendorFacilityStatuses(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47761
+ args: args37,
47762
+ tool: async (client, args38, ctx) => {
47763
+ const [result, apiCall] = await vendorsListVendorFacilityStatuses(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46625
47764
  if (!result.ok) {
46626
47765
  return {
46627
47766
  content: [{ type: "text", text: result.error.message }],
@@ -46636,9 +47775,9 @@ List the facilities for the vendor`,
46636
47775
 
46637
47776
  // src/funcs/vendorsListVendorInvoices.ts
46638
47777
  function vendorsListVendorInvoices(client, request, options) {
46639
- return new APIPromise($do32(client, request, options));
47778
+ return new APIPromise($do39(client, request, options));
46640
47779
  }
46641
- async function $do32(client, request, options) {
47780
+ async function $do39(client, request, options) {
46642
47781
  const parsed = safeParse(request, (value) => ListVendorInvoicesRequest$outboundSchema.parse(value), "Input validation failed");
46643
47782
  if (!parsed.ok) {
46644
47783
  return [haltIterator(parsed), { status: "invalid" }];
@@ -46668,6 +47807,7 @@ async function $do32(client, request, options) {
46668
47807
  const securityInput = await extractSecurity(client._options.security);
46669
47808
  const requestSecurity = resolveGlobalSecurity(securityInput);
46670
47809
  const context = {
47810
+ options: client._options,
46671
47811
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46672
47812
  operationID: "listVendorInvoices",
46673
47813
  oAuth2Scopes: [],
@@ -46684,6 +47824,7 @@ async function $do32(client, request, options) {
46684
47824
  headers,
46685
47825
  query,
46686
47826
  body,
47827
+ userAgent: client._options.userAgent,
46687
47828
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46688
47829
  }, options);
46689
47830
  if (!requestRes.ok) {
@@ -46754,12 +47895,12 @@ var init_vendorsListVendorInvoices = __esm(() => {
46754
47895
  });
46755
47896
 
46756
47897
  // src/mcp-server/tools/vendorsListVendorInvoices.ts
46757
- var args31, tool$vendorsListVendorInvoices;
47898
+ var args38, tool$vendorsListVendorInvoices;
46758
47899
  var init_vendorsListVendorInvoices2 = __esm(() => {
46759
47900
  init_vendorsListVendorInvoices();
46760
47901
  init_operations();
46761
47902
  init_tools();
46762
- args31 = {
47903
+ args38 = {
46763
47904
  request: ListVendorInvoicesRequest$inboundSchema
46764
47905
  };
46765
47906
  tool$vendorsListVendorInvoices = {
@@ -46771,9 +47912,9 @@ List invoices for Vendors
46771
47912
  Available \`expand\` scopes are:
46772
47913
 
46773
47914
  invoice.line_items`,
46774
- args: args31,
46775
- tool: async (client, args32, ctx) => {
46776
- const [result, apiCall] = await vendorsListVendorInvoices(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47915
+ args: args38,
47916
+ tool: async (client, args39, ctx) => {
47917
+ const [result, apiCall] = await vendorsListVendorInvoices(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46777
47918
  if (!result.ok) {
46778
47919
  return {
46779
47920
  content: [{ type: "text", text: result.error.message }],
@@ -46788,9 +47929,9 @@ invoice.line_items`,
46788
47929
 
46789
47930
  // src/funcs/vendorsListVendorJobTitles.ts
46790
47931
  function vendorsListVendorJobTitles(client, request, options) {
46791
- return new APIPromise($do33(client, request, options));
47932
+ return new APIPromise($do40(client, request, options));
46792
47933
  }
46793
- async function $do33(client, request, options) {
47934
+ async function $do40(client, request, options) {
46794
47935
  const parsed = safeParse(request, (value) => ListVendorJobTitlesRequest$outboundSchema.parse(value), "Input validation failed");
46795
47936
  if (!parsed.ok) {
46796
47937
  return [haltIterator(parsed), { status: "invalid" }];
@@ -46811,6 +47952,7 @@ async function $do33(client, request, options) {
46811
47952
  const securityInput = await extractSecurity(client._options.security);
46812
47953
  const requestSecurity = resolveGlobalSecurity(securityInput);
46813
47954
  const context = {
47955
+ options: client._options,
46814
47956
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46815
47957
  operationID: "listVendorJobTitles",
46816
47958
  oAuth2Scopes: [],
@@ -46827,6 +47969,7 @@ async function $do33(client, request, options) {
46827
47969
  headers,
46828
47970
  query,
46829
47971
  body,
47972
+ userAgent: client._options.userAgent,
46830
47973
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46831
47974
  }, options);
46832
47975
  if (!requestRes.ok) {
@@ -46897,12 +48040,12 @@ var init_vendorsListVendorJobTitles = __esm(() => {
46897
48040
  });
46898
48041
 
46899
48042
  // src/mcp-server/tools/vendorsListVendorJobTitles.ts
46900
- var args32, tool$vendorsListVendorJobTitles;
48043
+ var args39, tool$vendorsListVendorJobTitles;
46901
48044
  var init_vendorsListVendorJobTitles2 = __esm(() => {
46902
48045
  init_vendorsListVendorJobTitles();
46903
48046
  init_operations();
46904
48047
  init_tools();
46905
- args32 = {
48048
+ args39 = {
46906
48049
  request: ListVendorJobTitlesRequest$inboundSchema
46907
48050
  };
46908
48051
  tool$vendorsListVendorJobTitles = {
@@ -46910,9 +48053,9 @@ var init_vendorsListVendorJobTitles2 = __esm(() => {
46910
48053
  description: `List vendor job titles
46911
48054
 
46912
48055
  List valid job titles for Vendors. This can be used during sign up or in a filter.`,
46913
- args: args32,
46914
- tool: async (client, args33, ctx) => {
46915
- const [result, apiCall] = await vendorsListVendorJobTitles(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48056
+ args: args39,
48057
+ tool: async (client, args40, ctx) => {
48058
+ const [result, apiCall] = await vendorsListVendorJobTitles(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46916
48059
  if (!result.ok) {
46917
48060
  return {
46918
48061
  content: [{ type: "text", text: result.error.message }],
@@ -46927,9 +48070,9 @@ List valid job titles for Vendors. This can be used during sign up or in a filte
46927
48070
 
46928
48071
  // src/funcs/vendorsListVendorManagedByCompanies.ts
46929
48072
  function vendorsListVendorManagedByCompanies(client, request, options) {
46930
- return new APIPromise($do34(client, request, options));
48073
+ return new APIPromise($do41(client, request, options));
46931
48074
  }
46932
- async function $do34(client, request, options) {
48075
+ async function $do41(client, request, options) {
46933
48076
  const parsed = safeParse(request, (value) => ListVendorManagedByCompaniesRequest$outboundSchema.parse(value), "Input validation failed");
46934
48077
  if (!parsed.ok) {
46935
48078
  return [haltIterator(parsed), { status: "invalid" }];
@@ -46955,6 +48098,7 @@ async function $do34(client, request, options) {
46955
48098
  const securityInput = await extractSecurity(client._options.security);
46956
48099
  const requestSecurity = resolveGlobalSecurity(securityInput);
46957
48100
  const context = {
48101
+ options: client._options,
46958
48102
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46959
48103
  operationID: "listVendorManagedByCompanies",
46960
48104
  oAuth2Scopes: [],
@@ -46971,6 +48115,7 @@ async function $do34(client, request, options) {
46971
48115
  headers,
46972
48116
  query,
46973
48117
  body,
48118
+ userAgent: client._options.userAgent,
46974
48119
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46975
48120
  }, options);
46976
48121
  if (!requestRes.ok) {
@@ -47041,12 +48186,12 @@ var init_vendorsListVendorManagedByCompanies = __esm(() => {
47041
48186
  });
47042
48187
 
47043
48188
  // src/mcp-server/tools/vendorsListVendorManagedByCompanies.ts
47044
- var args33, tool$vendorsListVendorManagedByCompanies;
48189
+ var args40, tool$vendorsListVendorManagedByCompanies;
47045
48190
  var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
47046
48191
  init_vendorsListVendorManagedByCompanies();
47047
48192
  init_operations();
47048
48193
  init_tools();
47049
- args33 = {
48194
+ args40 = {
47050
48195
  request: ListVendorManagedByCompaniesRequest$inboundSchema
47051
48196
  };
47052
48197
  tool$vendorsListVendorManagedByCompanies = {
@@ -47054,9 +48199,9 @@ var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
47054
48199
  description: `List of companies managing the vendor
47055
48200
 
47056
48201
  List of companies managing the vendor`,
47057
- args: args33,
47058
- tool: async (client, args34, ctx) => {
47059
- const [result, apiCall] = await vendorsListVendorManagedByCompanies(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48202
+ args: args40,
48203
+ tool: async (client, args41, ctx) => {
48204
+ const [result, apiCall] = await vendorsListVendorManagedByCompanies(client, args41.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47060
48205
  if (!result.ok) {
47061
48206
  return {
47062
48207
  content: [{ type: "text", text: result.error.message }],
@@ -47071,9 +48216,9 @@ List of companies managing the vendor`,
47071
48216
 
47072
48217
  // src/funcs/vendorsListVendorScrubDetails.ts
47073
48218
  function vendorsListVendorScrubDetails(client, request, options) {
47074
- return new APIPromise($do35(client, request, options));
48219
+ return new APIPromise($do42(client, request, options));
47075
48220
  }
47076
- async function $do35(client, request, options) {
48221
+ async function $do42(client, request, options) {
47077
48222
  const parsed = safeParse(request, (value) => ListVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
47078
48223
  if (!parsed.ok) {
47079
48224
  return [parsed, { status: "invalid" }];
@@ -47093,6 +48238,7 @@ async function $do35(client, request, options) {
47093
48238
  const securityInput = await extractSecurity(client._options.security);
47094
48239
  const requestSecurity = resolveGlobalSecurity(securityInput);
47095
48240
  const context = {
48241
+ options: client._options,
47096
48242
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47097
48243
  operationID: "listVendorScrubDetails",
47098
48244
  oAuth2Scopes: [],
@@ -47108,6 +48254,7 @@ async function $do35(client, request, options) {
47108
48254
  path,
47109
48255
  headers,
47110
48256
  body,
48257
+ userAgent: client._options.userAgent,
47111
48258
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47112
48259
  }, options);
47113
48260
  if (!requestRes.ok) {
@@ -47147,12 +48294,12 @@ var init_vendorsListVendorScrubDetails = __esm(() => {
47147
48294
  });
47148
48295
 
47149
48296
  // src/mcp-server/tools/vendorsListVendorScrubDetails.ts
47150
- var args34, tool$vendorsListVendorScrubDetails;
48297
+ var args41, tool$vendorsListVendorScrubDetails;
47151
48298
  var init_vendorsListVendorScrubDetails2 = __esm(() => {
47152
48299
  init_vendorsListVendorScrubDetails();
47153
48300
  init_operations();
47154
48301
  init_tools();
47155
- args34 = {
48302
+ args41 = {
47156
48303
  request: ListVendorScrubDetailsRequest$inboundSchema
47157
48304
  };
47158
48305
  tool$vendorsListVendorScrubDetails = {
@@ -47160,9 +48307,9 @@ var init_vendorsListVendorScrubDetails2 = __esm(() => {
47160
48307
  description: `List vendor scrub details
47161
48308
 
47162
48309
  List vendor scrub details`,
47163
- args: args34,
47164
- tool: async (client, args35, ctx) => {
47165
- const [result, apiCall] = await vendorsListVendorScrubDetails(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48310
+ args: args41,
48311
+ tool: async (client, args42, ctx) => {
48312
+ const [result, apiCall] = await vendorsListVendorScrubDetails(client, args42.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47166
48313
  if (!result.ok) {
47167
48314
  return {
47168
48315
  content: [{ type: "text", text: result.error.message }],
@@ -47177,9 +48324,9 @@ List vendor scrub details`,
47177
48324
 
47178
48325
  // src/funcs/vendorsListVendorScrubPackages.ts
47179
48326
  function vendorsListVendorScrubPackages(client, request, options) {
47180
- return new APIPromise($do36(client, request, options));
48327
+ return new APIPromise($do43(client, request, options));
47181
48328
  }
47182
- async function $do36(client, request, options) {
48329
+ async function $do43(client, request, options) {
47183
48330
  const parsed = safeParse(request, (value) => ListVendorScrubPackagesRequest$outboundSchema.parse(value), "Input validation failed");
47184
48331
  if (!parsed.ok) {
47185
48332
  return [haltIterator(parsed), { status: "invalid" }];
@@ -47205,6 +48352,7 @@ async function $do36(client, request, options) {
47205
48352
  const securityInput = await extractSecurity(client._options.security);
47206
48353
  const requestSecurity = resolveGlobalSecurity(securityInput);
47207
48354
  const context = {
48355
+ options: client._options,
47208
48356
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47209
48357
  operationID: "listVendorScrubPackages",
47210
48358
  oAuth2Scopes: [],
@@ -47221,6 +48369,7 @@ async function $do36(client, request, options) {
47221
48369
  headers,
47222
48370
  query,
47223
48371
  body,
48372
+ userAgent: client._options.userAgent,
47224
48373
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47225
48374
  }, options);
47226
48375
  if (!requestRes.ok) {
@@ -47291,12 +48440,12 @@ var init_vendorsListVendorScrubPackages = __esm(() => {
47291
48440
  });
47292
48441
 
47293
48442
  // src/mcp-server/tools/vendorsListVendorScrubPackages.ts
47294
- var args35, tool$vendorsListVendorScrubPackages;
48443
+ var args42, tool$vendorsListVendorScrubPackages;
47295
48444
  var init_vendorsListVendorScrubPackages2 = __esm(() => {
47296
48445
  init_vendorsListVendorScrubPackages();
47297
48446
  init_operations();
47298
48447
  init_tools();
47299
- args35 = {
48448
+ args42 = {
47300
48449
  request: ListVendorScrubPackagesRequest$inboundSchema
47301
48450
  };
47302
48451
  tool$vendorsListVendorScrubPackages = {
@@ -47304,9 +48453,9 @@ var init_vendorsListVendorScrubPackages2 = __esm(() => {
47304
48453
  description: `List vendor scrub packages
47305
48454
 
47306
48455
  List vendor scrub packages`,
47307
- args: args35,
47308
- tool: async (client, args36, ctx) => {
47309
- const [result, apiCall] = await vendorsListVendorScrubPackages(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48456
+ args: args42,
48457
+ tool: async (client, args43, ctx) => {
48458
+ const [result, apiCall] = await vendorsListVendorScrubPackages(client, args43.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47310
48459
  if (!result.ok) {
47311
48460
  return {
47312
48461
  content: [{ type: "text", text: result.error.message }],
@@ -47321,9 +48470,9 @@ List vendor scrub packages`,
47321
48470
 
47322
48471
  // src/funcs/vendorsListVendorScrubPurchases.ts
47323
48472
  function vendorsListVendorScrubPurchases(client, request, options) {
47324
- return new APIPromise($do37(client, request, options));
48473
+ return new APIPromise($do44(client, request, options));
47325
48474
  }
47326
- async function $do37(client, request, options) {
48475
+ async function $do44(client, request, options) {
47327
48476
  const parsed = safeParse(request, (value) => ListVendorScrubPurchasesRequest$outboundSchema.parse(value), "Input validation failed");
47328
48477
  if (!parsed.ok) {
47329
48478
  return [haltIterator(parsed), { status: "invalid" }];
@@ -47349,6 +48498,7 @@ async function $do37(client, request, options) {
47349
48498
  const securityInput = await extractSecurity(client._options.security);
47350
48499
  const requestSecurity = resolveGlobalSecurity(securityInput);
47351
48500
  const context = {
48501
+ options: client._options,
47352
48502
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47353
48503
  operationID: "listVendorScrubPurchases",
47354
48504
  oAuth2Scopes: [],
@@ -47365,6 +48515,7 @@ async function $do37(client, request, options) {
47365
48515
  headers,
47366
48516
  query,
47367
48517
  body,
48518
+ userAgent: client._options.userAgent,
47368
48519
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47369
48520
  }, options);
47370
48521
  if (!requestRes.ok) {
@@ -47435,12 +48586,12 @@ var init_vendorsListVendorScrubPurchases = __esm(() => {
47435
48586
  });
47436
48587
 
47437
48588
  // src/mcp-server/tools/vendorsListVendorScrubPurchases.ts
47438
- var args36, tool$vendorsListVendorScrubPurchases;
48589
+ var args43, tool$vendorsListVendorScrubPurchases;
47439
48590
  var init_vendorsListVendorScrubPurchases2 = __esm(() => {
47440
48591
  init_vendorsListVendorScrubPurchases();
47441
48592
  init_operations();
47442
48593
  init_tools();
47443
- args36 = {
48594
+ args43 = {
47444
48595
  request: ListVendorScrubPurchasesRequest$inboundSchema
47445
48596
  };
47446
48597
  tool$vendorsListVendorScrubPurchases = {
@@ -47448,9 +48599,9 @@ var init_vendorsListVendorScrubPurchases2 = __esm(() => {
47448
48599
  description: `List vendor scrub purchases
47449
48600
 
47450
48601
  List vendor scrub purchases`,
47451
- args: args36,
47452
- tool: async (client, args37, ctx) => {
47453
- const [result, apiCall] = await vendorsListVendorScrubPurchases(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48602
+ args: args43,
48603
+ tool: async (client, args44, ctx) => {
48604
+ const [result, apiCall] = await vendorsListVendorScrubPurchases(client, args44.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47454
48605
  if (!result.ok) {
47455
48606
  return {
47456
48607
  content: [{ type: "text", text: result.error.message }],
@@ -47465,9 +48616,9 @@ List vendor scrub purchases`,
47465
48616
 
47466
48617
  // src/funcs/vendorsPurchaseScrubCredits.ts
47467
48618
  function vendorsPurchaseScrubCredits(client, request, options) {
47468
- return new APIPromise($do38(client, request, options));
48619
+ return new APIPromise($do45(client, request, options));
47469
48620
  }
47470
- async function $do38(client, request, options) {
48621
+ async function $do45(client, request, options) {
47471
48622
  const parsed = safeParse(request, (value) => PurchaseScrubCreditsRequest$outboundSchema.parse(value), "Input validation failed");
47472
48623
  if (!parsed.ok) {
47473
48624
  return [parsed, { status: "invalid" }];
@@ -47488,6 +48639,7 @@ async function $do38(client, request, options) {
47488
48639
  const securityInput = await extractSecurity(client._options.security);
47489
48640
  const requestSecurity = resolveGlobalSecurity(securityInput);
47490
48641
  const context = {
48642
+ options: client._options,
47491
48643
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47492
48644
  operationID: "purchaseScrubCredits",
47493
48645
  oAuth2Scopes: [],
@@ -47503,6 +48655,7 @@ async function $do38(client, request, options) {
47503
48655
  path,
47504
48656
  headers,
47505
48657
  body,
48658
+ userAgent: client._options.userAgent,
47506
48659
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47507
48660
  }, options);
47508
48661
  if (!requestRes.ok) {
@@ -47541,12 +48694,12 @@ var init_vendorsPurchaseScrubCredits = __esm(() => {
47541
48694
  });
47542
48695
 
47543
48696
  // src/mcp-server/tools/vendorsPurchaseScrubCredits.ts
47544
- var args37, tool$vendorsPurchaseScrubCredits;
48697
+ var args44, tool$vendorsPurchaseScrubCredits;
47545
48698
  var init_vendorsPurchaseScrubCredits2 = __esm(() => {
47546
48699
  init_vendorsPurchaseScrubCredits();
47547
48700
  init_operations();
47548
48701
  init_tools();
47549
- args37 = {
48702
+ args44 = {
47550
48703
  request: PurchaseScrubCreditsRequest$inboundSchema
47551
48704
  };
47552
48705
  tool$vendorsPurchaseScrubCredits = {
@@ -47554,9 +48707,9 @@ var init_vendorsPurchaseScrubCredits2 = __esm(() => {
47554
48707
  description: `Purchase scrub credits
47555
48708
 
47556
48709
  Purchase scrub credits`,
47557
- args: args37,
47558
- tool: async (client, args38, ctx) => {
47559
- const [result, apiCall] = await vendorsPurchaseScrubCredits(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48710
+ args: args44,
48711
+ tool: async (client, args45, ctx) => {
48712
+ const [result, apiCall] = await vendorsPurchaseScrubCredits(client, args45.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47560
48713
  if (!result.ok) {
47561
48714
  return {
47562
48715
  content: [{ type: "text", text: result.error.message }],
@@ -47571,9 +48724,9 @@ Purchase scrub credits`,
47571
48724
 
47572
48725
  // src/funcs/vendorsSubmitVendorCredential.ts
47573
48726
  function vendorsSubmitVendorCredential(client, request, options) {
47574
- return new APIPromise($do39(client, request, options));
48727
+ return new APIPromise($do46(client, request, options));
47575
48728
  }
47576
- async function $do39(client, request, options) {
48729
+ async function $do46(client, request, options) {
47577
48730
  const parsed = safeParse(request, (value) => SubmitVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
47578
48731
  if (!parsed.ok) {
47579
48732
  return [parsed, { status: "invalid" }];
@@ -47591,6 +48744,7 @@ async function $do39(client, request, options) {
47591
48744
  const securityInput = await extractSecurity(client._options.security);
47592
48745
  const requestSecurity = resolveGlobalSecurity(securityInput);
47593
48746
  const context = {
48747
+ options: client._options,
47594
48748
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47595
48749
  operationID: "submitVendorCredential",
47596
48750
  oAuth2Scopes: [],
@@ -47606,6 +48760,7 @@ async function $do39(client, request, options) {
47606
48760
  path,
47607
48761
  headers,
47608
48762
  body,
48763
+ userAgent: client._options.userAgent,
47609
48764
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47610
48765
  }, options);
47611
48766
  if (!requestRes.ok) {
@@ -47645,12 +48800,12 @@ var init_vendorsSubmitVendorCredential = __esm(() => {
47645
48800
  });
47646
48801
 
47647
48802
  // src/mcp-server/tools/vendorsSubmitVendorCredential.ts
47648
- var args38, tool$vendorsSubmitVendorCredential;
48803
+ var args45, tool$vendorsSubmitVendorCredential;
47649
48804
  var init_vendorsSubmitVendorCredential2 = __esm(() => {
47650
48805
  init_vendorsSubmitVendorCredential();
47651
48806
  init_operations();
47652
48807
  init_tools();
47653
- args38 = {
48808
+ args45 = {
47654
48809
  request: SubmitVendorCredentialRequest$inboundSchema
47655
48810
  };
47656
48811
  tool$vendorsSubmitVendorCredential = {
@@ -47658,9 +48813,9 @@ var init_vendorsSubmitVendorCredential2 = __esm(() => {
47658
48813
  description: `Submit vendor credential
47659
48814
 
47660
48815
  It will submit vendor credential`,
47661
- args: args38,
47662
- tool: async (client, args39, ctx) => {
47663
- const [result, apiCall] = await vendorsSubmitVendorCredential(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48816
+ args: args45,
48817
+ tool: async (client, args46, ctx) => {
48818
+ const [result, apiCall] = await vendorsSubmitVendorCredential(client, args46.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47664
48819
  if (!result.ok) {
47665
48820
  return {
47666
48821
  content: [{ type: "text", text: result.error.message }],
@@ -47675,9 +48830,9 @@ It will submit vendor credential`,
47675
48830
 
47676
48831
  // src/funcs/vendorsUpdateVendorCredentialFile.ts
47677
48832
  function vendorsUpdateVendorCredentialFile(client, request, options) {
47678
- return new APIPromise($do40(client, request, options));
48833
+ return new APIPromise($do47(client, request, options));
47679
48834
  }
47680
- async function $do40(client, request, options) {
48835
+ async function $do47(client, request, options) {
47681
48836
  const parsed = safeParse(request, (value) => UpdateVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
47682
48837
  if (!parsed.ok) {
47683
48838
  return [parsed, { status: "invalid" }];
@@ -47699,6 +48854,7 @@ async function $do40(client, request, options) {
47699
48854
  const securityInput = await extractSecurity(client._options.security);
47700
48855
  const requestSecurity = resolveGlobalSecurity(securityInput);
47701
48856
  const context = {
48857
+ options: client._options,
47702
48858
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47703
48859
  operationID: "updateVendorCredentialFile",
47704
48860
  oAuth2Scopes: [],
@@ -47714,6 +48870,7 @@ async function $do40(client, request, options) {
47714
48870
  path,
47715
48871
  headers,
47716
48872
  body,
48873
+ userAgent: client._options.userAgent,
47717
48874
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47718
48875
  }, options);
47719
48876
  if (!requestRes.ok) {
@@ -47753,12 +48910,12 @@ var init_vendorsUpdateVendorCredentialFile = __esm(() => {
47753
48910
  });
47754
48911
 
47755
48912
  // src/mcp-server/tools/vendorsUpdateVendorCredentialFile.ts
47756
- var args39, tool$vendorsUpdateVendorCredentialFile;
48913
+ var args46, tool$vendorsUpdateVendorCredentialFile;
47757
48914
  var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
47758
48915
  init_vendorsUpdateVendorCredentialFile();
47759
48916
  init_operations();
47760
48917
  init_tools();
47761
- args39 = {
48918
+ args46 = {
47762
48919
  request: UpdateVendorCredentialFileRequest$inboundSchema
47763
48920
  };
47764
48921
  tool$vendorsUpdateVendorCredentialFile = {
@@ -47766,9 +48923,9 @@ var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
47766
48923
  description: `Update vendor credential file
47767
48924
 
47768
48925
  It will update the vendor credential file properties`,
47769
- args: args39,
47770
- tool: async (client, args40, ctx) => {
47771
- const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48926
+ args: args46,
48927
+ tool: async (client, args47, ctx) => {
48928
+ const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client, args47.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47772
48929
  if (!result.ok) {
47773
48930
  return {
47774
48931
  content: [{ type: "text", text: result.error.message }],
@@ -47783,9 +48940,9 @@ It will update the vendor credential file properties`,
47783
48940
 
47784
48941
  // src/funcs/vendorsUpdateVendorDetails.ts
47785
48942
  function vendorsUpdateVendorDetails(client, request, options) {
47786
- return new APIPromise($do41(client, request, options));
48943
+ return new APIPromise($do48(client, request, options));
47787
48944
  }
47788
- async function $do41(client, request, options) {
48945
+ async function $do48(client, request, options) {
47789
48946
  const parsed = safeParse(request, (value) => UpdateVendorDetailsRequest$outboundSchema.parse(value), "Input validation failed");
47790
48947
  if (!parsed.ok) {
47791
48948
  return [parsed, { status: "invalid" }];
@@ -47806,6 +48963,7 @@ async function $do41(client, request, options) {
47806
48963
  const securityInput = await extractSecurity(client._options.security);
47807
48964
  const requestSecurity = resolveGlobalSecurity(securityInput);
47808
48965
  const context = {
48966
+ options: client._options,
47809
48967
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47810
48968
  operationID: "updateVendorDetails",
47811
48969
  oAuth2Scopes: [],
@@ -47821,6 +48979,7 @@ async function $do41(client, request, options) {
47821
48979
  path,
47822
48980
  headers,
47823
48981
  body,
48982
+ userAgent: client._options.userAgent,
47824
48983
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47825
48984
  }, options);
47826
48985
  if (!requestRes.ok) {
@@ -47860,12 +49019,12 @@ var init_vendorsUpdateVendorDetails = __esm(() => {
47860
49019
  });
47861
49020
 
47862
49021
  // src/mcp-server/tools/vendorsUpdateVendorDetails.ts
47863
- var args40, tool$vendorsUpdateVendorDetails;
49022
+ var args47, tool$vendorsUpdateVendorDetails;
47864
49023
  var init_vendorsUpdateVendorDetails2 = __esm(() => {
47865
49024
  init_vendorsUpdateVendorDetails();
47866
49025
  init_operations();
47867
49026
  init_tools();
47868
- args40 = {
49027
+ args47 = {
47869
49028
  request: UpdateVendorDetailsRequest$inboundSchema
47870
49029
  };
47871
49030
  tool$vendorsUpdateVendorDetails = {
@@ -47873,9 +49032,9 @@ var init_vendorsUpdateVendorDetails2 = __esm(() => {
47873
49032
  description: `Update vendor details
47874
49033
 
47875
49034
  It will update the vendor details`,
47876
- args: args40,
47877
- tool: async (client, args41, ctx) => {
47878
- const [result, apiCall] = await vendorsUpdateVendorDetails(client, args41.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49035
+ args: args47,
49036
+ tool: async (client, args48, ctx) => {
49037
+ const [result, apiCall] = await vendorsUpdateVendorDetails(client, args48.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47879
49038
  if (!result.ok) {
47880
49039
  return {
47881
49040
  content: [{ type: "text", text: result.error.message }],
@@ -47890,9 +49049,9 @@ It will update the vendor details`,
47890
49049
 
47891
49050
  // src/funcs/vendorsUpdateVendorManagedByCompany.ts
47892
49051
  function vendorsUpdateVendorManagedByCompany(client, request, options) {
47893
- return new APIPromise($do42(client, request, options));
49052
+ return new APIPromise($do49(client, request, options));
47894
49053
  }
47895
- async function $do42(client, request, options) {
49054
+ async function $do49(client, request, options) {
47896
49055
  const parsed = safeParse(request, (value) => UpdateVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
47897
49056
  if (!parsed.ok) {
47898
49057
  return [parsed, { status: "invalid" }];
@@ -47913,6 +49072,7 @@ async function $do42(client, request, options) {
47913
49072
  const securityInput = await extractSecurity(client._options.security);
47914
49073
  const requestSecurity = resolveGlobalSecurity(securityInput);
47915
49074
  const context = {
49075
+ options: client._options,
47916
49076
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47917
49077
  operationID: "updateVendorManagedByCompany",
47918
49078
  oAuth2Scopes: [],
@@ -47928,6 +49088,7 @@ async function $do42(client, request, options) {
47928
49088
  path,
47929
49089
  headers,
47930
49090
  body,
49091
+ userAgent: client._options.userAgent,
47931
49092
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47932
49093
  }, options);
47933
49094
  if (!requestRes.ok) {
@@ -47966,12 +49127,12 @@ var init_vendorsUpdateVendorManagedByCompany = __esm(() => {
47966
49127
  });
47967
49128
 
47968
49129
  // src/mcp-server/tools/vendorsUpdateVendorManagedByCompany.ts
47969
- var args41, tool$vendorsUpdateVendorManagedByCompany;
49130
+ var args48, tool$vendorsUpdateVendorManagedByCompany;
47970
49131
  var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
47971
49132
  init_vendorsUpdateVendorManagedByCompany();
47972
49133
  init_operations();
47973
49134
  init_tools();
47974
- args41 = {
49135
+ args48 = {
47975
49136
  request: UpdateVendorManagedByCompanyRequest$inboundSchema
47976
49137
  };
47977
49138
  tool$vendorsUpdateVendorManagedByCompany = {
@@ -47979,9 +49140,9 @@ var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
47979
49140
  description: `Update vendor managed by company access rights
47980
49141
 
47981
49142
  It will update the vendor managed by company access rights`,
47982
- args: args41,
47983
- tool: async (client, args42, ctx) => {
47984
- const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client, args42.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49143
+ args: args48,
49144
+ tool: async (client, args49, ctx) => {
49145
+ const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client, args49.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47985
49146
  if (!result.ok) {
47986
49147
  return {
47987
49148
  content: [{ type: "text", text: result.error.message }],
@@ -47996,9 +49157,9 @@ It will update the vendor managed by company access rights`,
47996
49157
 
47997
49158
  // src/funcs/vendorsUpdateVendorScrubDetails.ts
47998
49159
  function vendorsUpdateVendorScrubDetails(client, request, options) {
47999
- return new APIPromise($do43(client, request, options));
49160
+ return new APIPromise($do50(client, request, options));
48000
49161
  }
48001
- async function $do43(client, request, options) {
49162
+ async function $do50(client, request, options) {
48002
49163
  const parsed = safeParse(request, (value) => UpdateVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
48003
49164
  if (!parsed.ok) {
48004
49165
  return [parsed, { status: "invalid" }];
@@ -48019,6 +49180,7 @@ async function $do43(client, request, options) {
48019
49180
  const securityInput = await extractSecurity(client._options.security);
48020
49181
  const requestSecurity = resolveGlobalSecurity(securityInput);
48021
49182
  const context = {
49183
+ options: client._options,
48022
49184
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48023
49185
  operationID: "updateVendorScrubDetails",
48024
49186
  oAuth2Scopes: [],
@@ -48034,6 +49196,7 @@ async function $do43(client, request, options) {
48034
49196
  path,
48035
49197
  headers,
48036
49198
  body,
49199
+ userAgent: client._options.userAgent,
48037
49200
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48038
49201
  }, options);
48039
49202
  if (!requestRes.ok) {
@@ -48073,12 +49236,12 @@ var init_vendorsUpdateVendorScrubDetails = __esm(() => {
48073
49236
  });
48074
49237
 
48075
49238
  // src/mcp-server/tools/vendorsUpdateVendorScrubDetails.ts
48076
- var args42, tool$vendorsUpdateVendorScrubDetails;
49239
+ var args49, tool$vendorsUpdateVendorScrubDetails;
48077
49240
  var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
48078
49241
  init_vendorsUpdateVendorScrubDetails();
48079
49242
  init_operations();
48080
49243
  init_tools();
48081
- args42 = {
49244
+ args49 = {
48082
49245
  request: UpdateVendorScrubDetailsRequest$inboundSchema
48083
49246
  };
48084
49247
  tool$vendorsUpdateVendorScrubDetails = {
@@ -48086,9 +49249,9 @@ var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
48086
49249
  description: `Update vendor scrub details
48087
49250
 
48088
49251
  Update vendor scrub details`,
48089
- args: args42,
48090
- tool: async (client, args43, ctx) => {
48091
- const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client, args43.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49252
+ args: args49,
49253
+ tool: async (client, args50, ctx) => {
49254
+ const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client, args50.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48092
49255
  if (!result.ok) {
48093
49256
  return {
48094
49257
  content: [{ type: "text", text: result.error.message }],
@@ -48103,9 +49266,9 @@ Update vendor scrub details`,
48103
49266
 
48104
49267
  // src/funcs/webhooksGetWebhookEndpoint.ts
48105
49268
  function webhooksGetWebhookEndpoint(client, request, options) {
48106
- return new APIPromise($do44(client, request, options));
49269
+ return new APIPromise($do51(client, request, options));
48107
49270
  }
48108
- async function $do44(client, request, options) {
49271
+ async function $do51(client, request, options) {
48109
49272
  const parsed = safeParse(request, (value) => GetWebhookEndpointRequest$outboundSchema.parse(value), "Input validation failed");
48110
49273
  if (!parsed.ok) {
48111
49274
  return [parsed, { status: "invalid" }];
@@ -48125,6 +49288,7 @@ async function $do44(client, request, options) {
48125
49288
  const securityInput = await extractSecurity(client._options.security);
48126
49289
  const requestSecurity = resolveGlobalSecurity(securityInput);
48127
49290
  const context = {
49291
+ options: client._options,
48128
49292
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48129
49293
  operationID: "getWebhookEndpoint",
48130
49294
  oAuth2Scopes: [],
@@ -48140,6 +49304,7 @@ async function $do44(client, request, options) {
48140
49304
  path,
48141
49305
  headers,
48142
49306
  body,
49307
+ userAgent: client._options.userAgent,
48143
49308
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48144
49309
  }, options);
48145
49310
  if (!requestRes.ok) {
@@ -48179,12 +49344,12 @@ var init_webhooksGetWebhookEndpoint = __esm(() => {
48179
49344
  });
48180
49345
 
48181
49346
  // src/mcp-server/tools/webhooksGetWebhookEndpoint.ts
48182
- var args43, tool$webhooksGetWebhookEndpoint;
49347
+ var args50, tool$webhooksGetWebhookEndpoint;
48183
49348
  var init_webhooksGetWebhookEndpoint2 = __esm(() => {
48184
49349
  init_webhooksGetWebhookEndpoint();
48185
49350
  init_operations();
48186
49351
  init_tools();
48187
- args43 = {
49352
+ args50 = {
48188
49353
  request: GetWebhookEndpointRequest$inboundSchema
48189
49354
  };
48190
49355
  tool$webhooksGetWebhookEndpoint = {
@@ -48192,9 +49357,9 @@ var init_webhooksGetWebhookEndpoint2 = __esm(() => {
48192
49357
  description: `Retrieves the webhook endpoint with the given ID.
48193
49358
 
48194
49359
  Returns the definition of a webhook endpoint by ID.`,
48195
- args: args43,
48196
- tool: async (client, args44, ctx) => {
48197
- const [result, apiCall] = await webhooksGetWebhookEndpoint(client, args44.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49360
+ args: args50,
49361
+ tool: async (client, args51, ctx) => {
49362
+ const [result, apiCall] = await webhooksGetWebhookEndpoint(client, args51.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48198
49363
  if (!result.ok) {
48199
49364
  return {
48200
49365
  content: [{ type: "text", text: result.error.message }],
@@ -48209,9 +49374,9 @@ Returns the definition of a webhook endpoint by ID.`,
48209
49374
 
48210
49375
  // src/funcs/webhooksListAllWebhookEndpoints.ts
48211
49376
  function webhooksListAllWebhookEndpoints(client, request, options) {
48212
- return new APIPromise($do45(client, request, options));
49377
+ return new APIPromise($do52(client, request, options));
48213
49378
  }
48214
- async function $do45(client, request, options) {
49379
+ async function $do52(client, request, options) {
48215
49380
  const parsed = safeParse(request, (value) => ListAllWebhookEndpointsRequest$outboundSchema.parse(value), "Input validation failed");
48216
49381
  if (!parsed.ok) {
48217
49382
  return [parsed, { status: "invalid" }];
@@ -48231,6 +49396,7 @@ async function $do45(client, request, options) {
48231
49396
  const securityInput = await extractSecurity(client._options.security);
48232
49397
  const requestSecurity = resolveGlobalSecurity(securityInput);
48233
49398
  const context = {
49399
+ options: client._options,
48234
49400
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48235
49401
  operationID: "listAllWebhookEndpoints",
48236
49402
  oAuth2Scopes: [],
@@ -48247,6 +49413,7 @@ async function $do45(client, request, options) {
48247
49413
  headers,
48248
49414
  query,
48249
49415
  body,
49416
+ userAgent: client._options.userAgent,
48250
49417
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48251
49418
  }, options);
48252
49419
  if (!requestRes.ok) {
@@ -48285,12 +49452,12 @@ var init_webhooksListAllWebhookEndpoints = __esm(() => {
48285
49452
  });
48286
49453
 
48287
49454
  // src/mcp-server/tools/webhooksListAllWebhookEndpoints.ts
48288
- var args44, tool$webhooksListAllWebhookEndpoints;
49455
+ var args51, tool$webhooksListAllWebhookEndpoints;
48289
49456
  var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
48290
49457
  init_webhooksListAllWebhookEndpoints();
48291
49458
  init_operations();
48292
49459
  init_tools();
48293
- args44 = {
49460
+ args51 = {
48294
49461
  request: ListAllWebhookEndpointsRequest$inboundSchema
48295
49462
  };
48296
49463
  tool$webhooksListAllWebhookEndpoints = {
@@ -48298,9 +49465,9 @@ var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
48298
49465
  description: `List all webhook endpoints
48299
49466
 
48300
49467
  Returns a list of your webhook endpoints.`,
48301
- args: args44,
48302
- tool: async (client, args45, ctx) => {
48303
- const [result, apiCall] = await webhooksListAllWebhookEndpoints(client, args45.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49468
+ args: args51,
49469
+ tool: async (client, args52, ctx) => {
49470
+ const [result, apiCall] = await webhooksListAllWebhookEndpoints(client, args52.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48304
49471
  if (!result.ok) {
48305
49472
  return {
48306
49473
  content: [{ type: "text", text: result.error.message }],
@@ -48315,9 +49482,9 @@ Returns a list of your webhook endpoints.`,
48315
49482
 
48316
49483
  // src/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
48317
49484
  function webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, request, options) {
48318
- return new APIPromise($do46(client, request, options));
49485
+ return new APIPromise($do53(client, request, options));
48319
49486
  }
48320
- async function $do46(client, request, options) {
49487
+ async function $do53(client, request, options) {
48321
49488
  const parsed = safeParse(request, (value) => UpdatesTheWebhookEndpointWithTheGivenIdRequest$outboundSchema.parse(value), "Input validation failed");
48322
49489
  if (!parsed.ok) {
48323
49490
  return [parsed, { status: "invalid" }];
@@ -48338,6 +49505,7 @@ async function $do46(client, request, options) {
48338
49505
  const securityInput = await extractSecurity(client._options.security);
48339
49506
  const requestSecurity = resolveGlobalSecurity(securityInput);
48340
49507
  const context = {
49508
+ options: client._options,
48341
49509
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48342
49510
  operationID: "updatesTheWebhookEndpointWithTheGivenId",
48343
49511
  oAuth2Scopes: [],
@@ -48353,6 +49521,7 @@ async function $do46(client, request, options) {
48353
49521
  path,
48354
49522
  headers,
48355
49523
  body,
49524
+ userAgent: client._options.userAgent,
48356
49525
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48357
49526
  }, options);
48358
49527
  if (!requestRes.ok) {
@@ -48392,12 +49561,12 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId = __esm(() => {
48392
49561
  });
48393
49562
 
48394
49563
  // src/mcp-server/tools/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
48395
- var args45, tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId;
49564
+ var args52, tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId;
48396
49565
  var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
48397
49566
  init_webhooksUpdatesTheWebhookEndpointWithTheGivenId();
48398
49567
  init_operations();
48399
49568
  init_tools();
48400
- args45 = {
49569
+ args52 = {
48401
49570
  request: UpdatesTheWebhookEndpointWithTheGivenIdRequest$inboundSchema
48402
49571
  };
48403
49572
  tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId = {
@@ -48405,9 +49574,9 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
48405
49574
  description: `Updates the webhook endpoint with the given ID.
48406
49575
 
48407
49576
  Updates the webhook endpoint with the given ID.`,
48408
- args: args45,
48409
- tool: async (client, args46, ctx) => {
48410
- const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, args46.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49577
+ args: args52,
49578
+ tool: async (client, args53, ctx) => {
49579
+ const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, args53.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48411
49580
  if (!result.ok) {
48412
49581
  return {
48413
49582
  content: [{ type: "text", text: result.error.message }],
@@ -48422,9 +49591,9 @@ Updates the webhook endpoint with the given ID.`,
48422
49591
 
48423
49592
  // src/funcs/zonesListOrSearchSecurityZones.ts
48424
49593
  function zonesListOrSearchSecurityZones(client, request, options) {
48425
- return new APIPromise($do47(client, request, options));
49594
+ return new APIPromise($do54(client, request, options));
48426
49595
  }
48427
- async function $do47(client, request, options) {
49596
+ async function $do54(client, request, options) {
48428
49597
  const parsed = safeParse(request, (value) => ListOrSearchSecurityZonesRequest$outboundSchema.parse(value), "Input validation failed");
48429
49598
  if (!parsed.ok) {
48430
49599
  return [haltIterator(parsed), { status: "invalid" }];
@@ -48450,6 +49619,7 @@ async function $do47(client, request, options) {
48450
49619
  const securityInput = await extractSecurity(client._options.security);
48451
49620
  const requestSecurity = resolveGlobalSecurity(securityInput);
48452
49621
  const context = {
49622
+ options: client._options,
48453
49623
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48454
49624
  operationID: "listOrSearchSecurityZones",
48455
49625
  oAuth2Scopes: [],
@@ -48466,6 +49636,7 @@ async function $do47(client, request, options) {
48466
49636
  headers,
48467
49637
  query,
48468
49638
  body,
49639
+ userAgent: client._options.userAgent,
48469
49640
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48470
49641
  }, options);
48471
49642
  if (!requestRes.ok) {
@@ -48536,12 +49707,12 @@ var init_zonesListOrSearchSecurityZones = __esm(() => {
48536
49707
  });
48537
49708
 
48538
49709
  // src/mcp-server/tools/zonesListOrSearchSecurityZones.ts
48539
- var args46, tool$zonesListOrSearchSecurityZones;
49710
+ var args53, tool$zonesListOrSearchSecurityZones;
48540
49711
  var init_zonesListOrSearchSecurityZones2 = __esm(() => {
48541
49712
  init_zonesListOrSearchSecurityZones();
48542
49713
  init_operations();
48543
49714
  init_tools();
48544
- args46 = {
49715
+ args53 = {
48545
49716
  request: ListOrSearchSecurityZonesRequest$inboundSchema
48546
49717
  };
48547
49718
  tool$zonesListOrSearchSecurityZones = {
@@ -48549,9 +49720,9 @@ var init_zonesListOrSearchSecurityZones2 = __esm(() => {
48549
49720
  description: `List or search security zones
48550
49721
 
48551
49722
  List or search security zones`,
48552
- args: args46,
48553
- tool: async (client, args47, ctx) => {
48554
- const [result, apiCall] = await zonesListOrSearchSecurityZones(client, args47.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49723
+ args: args53,
49724
+ tool: async (client, args54, ctx) => {
49725
+ const [result, apiCall] = await zonesListOrSearchSecurityZones(client, args54.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48555
49726
  if (!result.ok) {
48556
49727
  return {
48557
49728
  content: [{ type: "text", text: result.error.message }],
@@ -48566,9 +49737,9 @@ List or search security zones`,
48566
49737
 
48567
49738
  // src/funcs/zonesSecurityZoneCheckin.ts
48568
49739
  function zonesSecurityZoneCheckin(client, request, options) {
48569
- return new APIPromise($do48(client, request, options));
49740
+ return new APIPromise($do55(client, request, options));
48570
49741
  }
48571
- async function $do48(client, request, options) {
49742
+ async function $do55(client, request, options) {
48572
49743
  const parsed = safeParse(request, (value) => SecurityZoneCheckinRequestBody$outboundSchema.parse(value), "Input validation failed");
48573
49744
  if (!parsed.ok) {
48574
49745
  return [parsed, { status: "invalid" }];
@@ -48583,6 +49754,7 @@ async function $do48(client, request, options) {
48583
49754
  const securityInput = await extractSecurity(client._options.security);
48584
49755
  const requestSecurity = resolveGlobalSecurity(securityInput);
48585
49756
  const context = {
49757
+ options: client._options,
48586
49758
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48587
49759
  operationID: "securityZoneCheckin",
48588
49760
  oAuth2Scopes: [],
@@ -48598,6 +49770,7 @@ async function $do48(client, request, options) {
48598
49770
  path,
48599
49771
  headers,
48600
49772
  body,
49773
+ userAgent: client._options.userAgent,
48601
49774
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48602
49775
  }, options);
48603
49776
  if (!requestRes.ok) {
@@ -48636,12 +49809,12 @@ var init_zonesSecurityZoneCheckin = __esm(() => {
48636
49809
  });
48637
49810
 
48638
49811
  // src/mcp-server/tools/zonesSecurityZoneCheckin.ts
48639
- var args47, tool$zonesSecurityZoneCheckin;
49812
+ var args54, tool$zonesSecurityZoneCheckin;
48640
49813
  var init_zonesSecurityZoneCheckin2 = __esm(() => {
48641
49814
  init_zonesSecurityZoneCheckin();
48642
49815
  init_operations();
48643
49816
  init_tools();
48644
- args47 = {
49817
+ args54 = {
48645
49818
  request: SecurityZoneCheckinRequestBody$inboundSchema
48646
49819
  };
48647
49820
  tool$zonesSecurityZoneCheckin = {
@@ -48649,9 +49822,9 @@ var init_zonesSecurityZoneCheckin2 = __esm(() => {
48649
49822
  description: `Security zone checkin request
48650
49823
 
48651
49824
  Security zone checkin request`,
48652
- args: args47,
48653
- tool: async (client, args48, ctx) => {
48654
- const [result, apiCall] = await zonesSecurityZoneCheckin(client, args48.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49825
+ args: args54,
49826
+ tool: async (client, args55, ctx) => {
49827
+ const [result, apiCall] = await zonesSecurityZoneCheckin(client, args55.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48655
49828
  if (!result.ok) {
48656
49829
  return {
48657
49830
  content: [{ type: "text", text: result.error.message }],
@@ -48668,7 +49841,7 @@ Security zone checkin request`,
48668
49841
  function createMCPServer(deps) {
48669
49842
  const server = new McpServer({
48670
49843
  name: "GreenSecurity",
48671
- version: "0.31.17"
49844
+ version: "0.35.1"
48672
49845
  });
48673
49846
  const client = new GreenSecurityCore({
48674
49847
  security: deps.security,
@@ -48689,11 +49862,15 @@ function createMCPServer(deps) {
48689
49862
  tool(tool$vendorsGetVendorCredentialFile);
48690
49863
  tool(tool$vendorsUpdateVendorCredentialFile);
48691
49864
  tool(tool$vendorsDeleteVendorCredentialFile);
49865
+ tool(tool$vendorsGetVendorLegalName);
48692
49866
  tool(tool$vendorsDeclineVendorCredential);
48693
49867
  tool(tool$vendorsListVendorCredentialFiles);
48694
49868
  tool(tool$vendorsAddVendorCredentialFile);
48695
49869
  tool(tool$vendorsSubmitVendorCredential);
49870
+ tool(tool$vendorsCreateOrUpdateBcr);
49871
+ tool(tool$vendorsCreateNewVendorCredentialVersion);
48696
49872
  tool(tool$vendorsListVendorCredentialHistory);
49873
+ tool(tool$vendorsListVendorCredentialDataRequests);
48697
49874
  tool(tool$vendorsExpediteTimeRemaining);
48698
49875
  tool(tool$vendorsListVendorInvoices);
48699
49876
  tool(tool$vendorsGetVendorInvoiceDetails);
@@ -48730,6 +49907,9 @@ function createMCPServer(deps) {
48730
49907
  tool(tool$companiesListOrSearchCompanies);
48731
49908
  tool(tool$zonesListOrSearchSecurityZones);
48732
49909
  tool(tool$zonesSecurityZoneCheckin);
49910
+ tool(tool$dataRequestsAddDataRequestFile);
49911
+ tool(tool$dataRequestsDeleteDataRequestFile);
49912
+ tool(tool$dataRequestsUpdateDataRequest);
48733
49913
  return server;
48734
49914
  }
48735
49915
  var init_server2 = __esm(() => {
@@ -48738,6 +49918,9 @@ var init_server2 = __esm(() => {
48738
49918
  init_resources();
48739
49919
  init_tools();
48740
49920
  init_companiesListOrSearchCompanies2();
49921
+ init_dataRequestsAddDataRequestFile2();
49922
+ init_dataRequestsDeleteDataRequestFile2();
49923
+ init_dataRequestsUpdateDataRequest2();
48741
49924
  init_organizationsGetFacility2();
48742
49925
  init_organizationsListOrSearchFacilities2();
48743
49926
  init_supportArticlesGetSupportArticle2();
@@ -48752,6 +49935,8 @@ var init_server2 = __esm(() => {
48752
49935
  init_vendorsAddVendorCredentialFile2();
48753
49936
  init_vendorsAddVendorManagedByCompany2();
48754
49937
  init_vendorScansVendorScanOut2();
49938
+ init_vendorsCreateNewVendorCredentialVersion2();
49939
+ init_vendorsCreateOrUpdateBcr2();
48755
49940
  init_vendorsCreateVendorCompany2();
48756
49941
  init_vendorsCreateVendorRegistration2();
48757
49942
  init_vendorsDeclineVendorCredential2();
@@ -48761,8 +49946,10 @@ var init_server2 = __esm(() => {
48761
49946
  init_vendorsGetVendorCredentialDetails2();
48762
49947
  init_vendorsGetVendorCredentialFile2();
48763
49948
  init_vendorsGetVendorInvoiceDetails2();
49949
+ init_vendorsGetVendorLegalName2();
48764
49950
  init_vendorsGetVendorsDetails2();
48765
49951
  init_vendorsListVendorAdditionalFacilityFields2();
49952
+ init_vendorsListVendorCredentialDataRequests2();
48766
49953
  init_vendorsListVendorCredentialFiles2();
48767
49954
  init_vendorsListVendorCredentialHistory2();
48768
49955
  init_vendorsListVendorCredentials2();
@@ -49989,7 +51176,7 @@ var routes = an({
49989
51176
  var app = He(routes, {
49990
51177
  name: "mcp",
49991
51178
  versionInfo: {
49992
- currentVersion: "0.31.17"
51179
+ currentVersion: "0.35.1"
49993
51180
  }
49994
51181
  });
49995
51182
  zt(app, process3.argv.slice(2), buildContext(process3));
@@ -49997,5 +51184,5 @@ export {
49997
51184
  app
49998
51185
  };
49999
51186
 
50000
- //# debugId=958A713E4BDC7AC364756E2164756E21
51187
+ //# debugId=932350E8F54D5FE864756E2164756E21
50001
51188
  //# sourceMappingURL=mcp-server.js.map