@greensecurity/javascript-sdk 0.34.1 → 0.35.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (477) hide show
  1. package/README.md +12 -0
  2. package/bin/mcp-server.js +1047 -501
  3. package/bin/mcp-server.js.map +69 -60
  4. package/dist/commonjs/__tests__/datarequests.test.d.ts +2 -0
  5. package/dist/commonjs/__tests__/datarequests.test.d.ts.map +1 -0
  6. package/dist/commonjs/__tests__/datarequests.test.js +56 -0
  7. package/dist/commonjs/__tests__/datarequests.test.js.map +1 -0
  8. package/dist/commonjs/__tests__/vendors.test.js +7 -10
  9. package/dist/commonjs/__tests__/vendors.test.js.map +1 -1
  10. package/dist/commonjs/__tests__/zones.test.js +7 -36
  11. package/dist/commonjs/__tests__/zones.test.js.map +1 -1
  12. package/dist/commonjs/admin-funcs/doAdmin.d.ts.map +1 -1
  13. package/dist/commonjs/admin-funcs/doAdmin.js +3 -3
  14. package/dist/commonjs/admin-funcs/doAdmin.js.map +1 -1
  15. package/dist/commonjs/funcs/companiesListOrSearchCompanies.js +2 -0
  16. package/dist/commonjs/funcs/companiesListOrSearchCompanies.js.map +1 -1
  17. package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.d.ts +17 -0
  18. package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  19. package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.js +124 -0
  20. package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.js.map +1 -0
  21. package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.d.ts +17 -0
  22. package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  23. package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.js +123 -0
  24. package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.js.map +1 -0
  25. package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.d.ts +17 -0
  26. package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  27. package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.js +124 -0
  28. package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.js.map +1 -0
  29. package/dist/commonjs/funcs/organizationsGetFacility.js +2 -0
  30. package/dist/commonjs/funcs/organizationsGetFacility.js.map +1 -1
  31. package/dist/commonjs/funcs/organizationsListOrSearchFacilities.js +2 -0
  32. package/dist/commonjs/funcs/organizationsListOrSearchFacilities.js.map +1 -1
  33. package/dist/commonjs/funcs/supportArticlesGetSupportArticle.js +2 -0
  34. package/dist/commonjs/funcs/supportArticlesGetSupportArticle.js.map +1 -1
  35. package/dist/commonjs/funcs/supportArticlesListOrSearchSupportArticles.js +2 -0
  36. package/dist/commonjs/funcs/supportArticlesListOrSearchSupportArticles.js.map +1 -1
  37. package/dist/commonjs/funcs/usersChangePassword.js +2 -0
  38. package/dist/commonjs/funcs/usersChangePassword.js.map +1 -1
  39. package/dist/commonjs/funcs/usersGetCurrentUser.js +2 -0
  40. package/dist/commonjs/funcs/usersGetCurrentUser.js.map +1 -1
  41. package/dist/commonjs/funcs/usersGetUserById.js +2 -0
  42. package/dist/commonjs/funcs/usersGetUserById.js.map +1 -1
  43. package/dist/commonjs/funcs/usersMagiclink.js +2 -0
  44. package/dist/commonjs/funcs/usersMagiclink.js.map +1 -1
  45. package/dist/commonjs/funcs/usersPassword.js +2 -0
  46. package/dist/commonjs/funcs/usersPassword.js.map +1 -1
  47. package/dist/commonjs/funcs/usersPasswordResetRequest.js +2 -0
  48. package/dist/commonjs/funcs/usersPasswordResetRequest.js.map +1 -1
  49. package/dist/commonjs/funcs/usersPostAuthenticate.js +2 -0
  50. package/dist/commonjs/funcs/usersPostAuthenticate.js.map +1 -1
  51. package/dist/commonjs/funcs/vendorScansVendorScanOut.js +2 -0
  52. package/dist/commonjs/funcs/vendorScansVendorScanOut.js.map +1 -1
  53. package/dist/commonjs/funcs/vendorsAddVendorCredentialFile.js +2 -0
  54. package/dist/commonjs/funcs/vendorsAddVendorCredentialFile.js.map +1 -1
  55. package/dist/commonjs/funcs/vendorsAddVendorManagedByCompany.js +2 -0
  56. package/dist/commonjs/funcs/vendorsAddVendorManagedByCompany.js.map +1 -1
  57. package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.js +2 -0
  58. package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.js.map +1 -1
  59. package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.js +2 -0
  60. package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.js.map +1 -1
  61. package/dist/commonjs/funcs/vendorsCreateVendorCompany.js +2 -0
  62. package/dist/commonjs/funcs/vendorsCreateVendorCompany.js.map +1 -1
  63. package/dist/commonjs/funcs/vendorsCreateVendorRegistration.js +2 -0
  64. package/dist/commonjs/funcs/vendorsCreateVendorRegistration.js.map +1 -1
  65. package/dist/commonjs/funcs/vendorsDeclineVendorCredential.js +2 -0
  66. package/dist/commonjs/funcs/vendorsDeclineVendorCredential.js.map +1 -1
  67. package/dist/commonjs/funcs/vendorsDeleteVendorCredentialFile.js +2 -0
  68. package/dist/commonjs/funcs/vendorsDeleteVendorCredentialFile.js.map +1 -1
  69. package/dist/commonjs/funcs/vendorsDeleteVendorManagedByCompany.js +2 -0
  70. package/dist/commonjs/funcs/vendorsDeleteVendorManagedByCompany.js.map +1 -1
  71. package/dist/commonjs/funcs/vendorsExpediteTimeRemaining.js +2 -0
  72. package/dist/commonjs/funcs/vendorsExpediteTimeRemaining.js.map +1 -1
  73. package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.js +2 -0
  74. package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.js.map +1 -1
  75. package/dist/commonjs/funcs/vendorsGetVendorCredentialFile.js +2 -0
  76. package/dist/commonjs/funcs/vendorsGetVendorCredentialFile.js.map +1 -1
  77. package/dist/commonjs/funcs/vendorsGetVendorInvoiceDetails.js +2 -0
  78. package/dist/commonjs/funcs/vendorsGetVendorInvoiceDetails.js.map +1 -1
  79. package/dist/commonjs/funcs/vendorsGetVendorLegalName.js +2 -0
  80. package/dist/commonjs/funcs/vendorsGetVendorLegalName.js.map +1 -1
  81. package/dist/commonjs/funcs/vendorsGetVendorsDetails.js +2 -0
  82. package/dist/commonjs/funcs/vendorsGetVendorsDetails.js.map +1 -1
  83. package/dist/commonjs/funcs/vendorsListVendorAdditionalFacilityFields.js +2 -0
  84. package/dist/commonjs/funcs/vendorsListVendorAdditionalFacilityFields.js.map +1 -1
  85. package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.js +2 -0
  86. package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.js.map +1 -1
  87. package/dist/commonjs/funcs/vendorsListVendorCredentialFiles.js +2 -0
  88. package/dist/commonjs/funcs/vendorsListVendorCredentialFiles.js.map +1 -1
  89. package/dist/commonjs/funcs/vendorsListVendorCredentialHistory.js +2 -0
  90. package/dist/commonjs/funcs/vendorsListVendorCredentialHistory.js.map +1 -1
  91. package/dist/commonjs/funcs/vendorsListVendorCredentials.js +2 -0
  92. package/dist/commonjs/funcs/vendorsListVendorCredentials.js.map +1 -1
  93. package/dist/commonjs/funcs/vendorsListVendorCredits.js +2 -0
  94. package/dist/commonjs/funcs/vendorsListVendorCredits.js.map +1 -1
  95. package/dist/commonjs/funcs/vendorsListVendorFacilityStatuses.js +2 -0
  96. package/dist/commonjs/funcs/vendorsListVendorFacilityStatuses.js.map +1 -1
  97. package/dist/commonjs/funcs/vendorsListVendorInvoices.js +2 -0
  98. package/dist/commonjs/funcs/vendorsListVendorInvoices.js.map +1 -1
  99. package/dist/commonjs/funcs/vendorsListVendorJobTitles.js +2 -0
  100. package/dist/commonjs/funcs/vendorsListVendorJobTitles.js.map +1 -1
  101. package/dist/commonjs/funcs/vendorsListVendorManagedByCompanies.js +2 -0
  102. package/dist/commonjs/funcs/vendorsListVendorManagedByCompanies.js.map +1 -1
  103. package/dist/commonjs/funcs/vendorsListVendorScrubDetails.js +2 -0
  104. package/dist/commonjs/funcs/vendorsListVendorScrubDetails.js.map +1 -1
  105. package/dist/commonjs/funcs/vendorsListVendorScrubPackages.js +2 -0
  106. package/dist/commonjs/funcs/vendorsListVendorScrubPackages.js.map +1 -1
  107. package/dist/commonjs/funcs/vendorsListVendorScrubPurchases.js +2 -0
  108. package/dist/commonjs/funcs/vendorsListVendorScrubPurchases.js.map +1 -1
  109. package/dist/commonjs/funcs/vendorsPurchaseScrubCredits.js +2 -0
  110. package/dist/commonjs/funcs/vendorsPurchaseScrubCredits.js.map +1 -1
  111. package/dist/commonjs/funcs/vendorsSubmitVendorCredential.js +2 -0
  112. package/dist/commonjs/funcs/vendorsSubmitVendorCredential.js.map +1 -1
  113. package/dist/commonjs/funcs/vendorsUpdateVendorCredentialFile.js +2 -0
  114. package/dist/commonjs/funcs/vendorsUpdateVendorCredentialFile.js.map +1 -1
  115. package/dist/commonjs/funcs/vendorsUpdateVendorDetails.js +2 -0
  116. package/dist/commonjs/funcs/vendorsUpdateVendorDetails.js.map +1 -1
  117. package/dist/commonjs/funcs/vendorsUpdateVendorManagedByCompany.js +2 -0
  118. package/dist/commonjs/funcs/vendorsUpdateVendorManagedByCompany.js.map +1 -1
  119. package/dist/commonjs/funcs/vendorsUpdateVendorScrubDetails.js +2 -0
  120. package/dist/commonjs/funcs/vendorsUpdateVendorScrubDetails.js.map +1 -1
  121. package/dist/commonjs/funcs/webhooksGetWebhookEndpoint.js +2 -0
  122. package/dist/commonjs/funcs/webhooksGetWebhookEndpoint.js.map +1 -1
  123. package/dist/commonjs/funcs/webhooksListAllWebhookEndpoints.js +2 -0
  124. package/dist/commonjs/funcs/webhooksListAllWebhookEndpoints.js.map +1 -1
  125. package/dist/commonjs/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js +2 -0
  126. package/dist/commonjs/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js.map +1 -1
  127. package/dist/commonjs/funcs/zonesListOrSearchSecurityZones.js +2 -0
  128. package/dist/commonjs/funcs/zonesListOrSearchSecurityZones.js.map +1 -1
  129. package/dist/commonjs/funcs/zonesSecurityZoneCheckin.js +2 -0
  130. package/dist/commonjs/funcs/zonesSecurityZoneCheckin.js.map +1 -1
  131. package/dist/commonjs/hooks/types.d.ts +2 -0
  132. package/dist/commonjs/hooks/types.d.ts.map +1 -1
  133. package/dist/commonjs/index.d.ts +2 -0
  134. package/dist/commonjs/index.d.ts.map +1 -1
  135. package/dist/commonjs/index.js +3 -1
  136. package/dist/commonjs/index.js.map +1 -1
  137. package/dist/commonjs/lib/config.d.ts +7 -3
  138. package/dist/commonjs/lib/config.d.ts.map +1 -1
  139. package/dist/commonjs/lib/config.js +3 -3
  140. package/dist/commonjs/lib/config.js.map +1 -1
  141. package/dist/commonjs/lib/sdks.d.ts +1 -0
  142. package/dist/commonjs/lib/sdks.d.ts.map +1 -1
  143. package/dist/commonjs/lib/sdks.js +3 -3
  144. package/dist/commonjs/lib/sdks.js.map +1 -1
  145. package/dist/commonjs/mcp-server/mcp-server.js +1 -1
  146. package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
  147. package/dist/commonjs/mcp-server/server.js +7 -1
  148. package/dist/commonjs/mcp-server/server.js.map +1 -1
  149. package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts +8 -0
  150. package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  151. package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.js +64 -0
  152. package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.js.map +1 -0
  153. package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts +8 -0
  154. package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  155. package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.js +64 -0
  156. package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.js.map +1 -0
  157. package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts +8 -0
  158. package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  159. package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.js +64 -0
  160. package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.js.map +1 -0
  161. package/dist/commonjs/models/operations/adddatarequestfile.d.ts +67 -0
  162. package/dist/commonjs/models/operations/adddatarequestfile.d.ts.map +1 -0
  163. package/dist/commonjs/models/operations/adddatarequestfile.js +124 -0
  164. package/dist/commonjs/models/operations/adddatarequestfile.js.map +1 -0
  165. package/dist/commonjs/models/operations/deletedatarequestfile.d.ts +32 -0
  166. package/dist/commonjs/models/operations/deletedatarequestfile.d.ts.map +1 -0
  167. package/dist/commonjs/models/operations/deletedatarequestfile.js +69 -0
  168. package/dist/commonjs/models/operations/deletedatarequestfile.js.map +1 -0
  169. package/dist/commonjs/models/operations/index.d.ts +3 -0
  170. package/dist/commonjs/models/operations/index.d.ts.map +1 -1
  171. package/dist/commonjs/models/operations/index.js +3 -0
  172. package/dist/commonjs/models/operations/index.js.map +1 -1
  173. package/dist/commonjs/models/operations/updatedatarequest.d.ts +59 -0
  174. package/dist/commonjs/models/operations/updatedatarequest.d.ts.map +1 -0
  175. package/dist/commonjs/models/operations/updatedatarequest.js +107 -0
  176. package/dist/commonjs/models/operations/updatedatarequest.js.map +1 -0
  177. package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.d.ts +23 -0
  178. package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  179. package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.js +51 -0
  180. package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.js.map +1 -0
  181. package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.d.ts +23 -0
  182. package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  183. package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.js +51 -0
  184. package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.js.map +1 -0
  185. package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.d.ts +23 -0
  186. package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  187. package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.js +51 -0
  188. package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.js.map +1 -0
  189. package/dist/commonjs/react-query/index.d.ts +3 -0
  190. package/dist/commonjs/react-query/index.d.ts.map +1 -1
  191. package/dist/commonjs/react-query/index.js +3 -0
  192. package/dist/commonjs/react-query/index.js.map +1 -1
  193. package/dist/commonjs/sdk/datarequests.d.ts +26 -0
  194. package/dist/commonjs/sdk/datarequests.d.ts.map +1 -0
  195. package/dist/commonjs/sdk/datarequests.js +42 -0
  196. package/dist/commonjs/sdk/datarequests.js.map +1 -0
  197. package/dist/commonjs/sdk/sdk.d.ts +3 -0
  198. package/dist/commonjs/sdk/sdk.d.ts.map +1 -1
  199. package/dist/commonjs/sdk/sdk.js +4 -0
  200. package/dist/commonjs/sdk/sdk.js.map +1 -1
  201. package/dist/esm/__tests__/datarequests.test.d.ts +2 -0
  202. package/dist/esm/__tests__/datarequests.test.d.ts.map +1 -0
  203. package/dist/esm/__tests__/datarequests.test.js +54 -0
  204. package/dist/esm/__tests__/datarequests.test.js.map +1 -0
  205. package/dist/esm/__tests__/vendors.test.js +7 -10
  206. package/dist/esm/__tests__/vendors.test.js.map +1 -1
  207. package/dist/esm/__tests__/zones.test.js +7 -36
  208. package/dist/esm/__tests__/zones.test.js.map +1 -1
  209. package/dist/esm/admin-funcs/doAdmin.d.ts.map +1 -1
  210. package/dist/esm/admin-funcs/doAdmin.js +3 -3
  211. package/dist/esm/admin-funcs/doAdmin.js.map +1 -1
  212. package/dist/esm/funcs/companiesListOrSearchCompanies.js +2 -0
  213. package/dist/esm/funcs/companiesListOrSearchCompanies.js.map +1 -1
  214. package/dist/esm/funcs/dataRequestsAddDataRequestFile.d.ts +17 -0
  215. package/dist/esm/funcs/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  216. package/dist/esm/funcs/dataRequestsAddDataRequestFile.js +88 -0
  217. package/dist/esm/funcs/dataRequestsAddDataRequestFile.js.map +1 -0
  218. package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.d.ts +17 -0
  219. package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  220. package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.js +87 -0
  221. package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.js.map +1 -0
  222. package/dist/esm/funcs/dataRequestsUpdateDataRequest.d.ts +17 -0
  223. package/dist/esm/funcs/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  224. package/dist/esm/funcs/dataRequestsUpdateDataRequest.js +88 -0
  225. package/dist/esm/funcs/dataRequestsUpdateDataRequest.js.map +1 -0
  226. package/dist/esm/funcs/organizationsGetFacility.js +2 -0
  227. package/dist/esm/funcs/organizationsGetFacility.js.map +1 -1
  228. package/dist/esm/funcs/organizationsListOrSearchFacilities.js +2 -0
  229. package/dist/esm/funcs/organizationsListOrSearchFacilities.js.map +1 -1
  230. package/dist/esm/funcs/supportArticlesGetSupportArticle.js +2 -0
  231. package/dist/esm/funcs/supportArticlesGetSupportArticle.js.map +1 -1
  232. package/dist/esm/funcs/supportArticlesListOrSearchSupportArticles.js +2 -0
  233. package/dist/esm/funcs/supportArticlesListOrSearchSupportArticles.js.map +1 -1
  234. package/dist/esm/funcs/usersChangePassword.js +2 -0
  235. package/dist/esm/funcs/usersChangePassword.js.map +1 -1
  236. package/dist/esm/funcs/usersGetCurrentUser.js +2 -0
  237. package/dist/esm/funcs/usersGetCurrentUser.js.map +1 -1
  238. package/dist/esm/funcs/usersGetUserById.js +2 -0
  239. package/dist/esm/funcs/usersGetUserById.js.map +1 -1
  240. package/dist/esm/funcs/usersMagiclink.js +2 -0
  241. package/dist/esm/funcs/usersMagiclink.js.map +1 -1
  242. package/dist/esm/funcs/usersPassword.js +2 -0
  243. package/dist/esm/funcs/usersPassword.js.map +1 -1
  244. package/dist/esm/funcs/usersPasswordResetRequest.js +2 -0
  245. package/dist/esm/funcs/usersPasswordResetRequest.js.map +1 -1
  246. package/dist/esm/funcs/usersPostAuthenticate.js +2 -0
  247. package/dist/esm/funcs/usersPostAuthenticate.js.map +1 -1
  248. package/dist/esm/funcs/vendorScansVendorScanOut.js +2 -0
  249. package/dist/esm/funcs/vendorScansVendorScanOut.js.map +1 -1
  250. package/dist/esm/funcs/vendorsAddVendorCredentialFile.js +2 -0
  251. package/dist/esm/funcs/vendorsAddVendorCredentialFile.js.map +1 -1
  252. package/dist/esm/funcs/vendorsAddVendorManagedByCompany.js +2 -0
  253. package/dist/esm/funcs/vendorsAddVendorManagedByCompany.js.map +1 -1
  254. package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.js +2 -0
  255. package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.js.map +1 -1
  256. package/dist/esm/funcs/vendorsCreateOrUpdateBcr.js +2 -0
  257. package/dist/esm/funcs/vendorsCreateOrUpdateBcr.js.map +1 -1
  258. package/dist/esm/funcs/vendorsCreateVendorCompany.js +2 -0
  259. package/dist/esm/funcs/vendorsCreateVendorCompany.js.map +1 -1
  260. package/dist/esm/funcs/vendorsCreateVendorRegistration.js +2 -0
  261. package/dist/esm/funcs/vendorsCreateVendorRegistration.js.map +1 -1
  262. package/dist/esm/funcs/vendorsDeclineVendorCredential.js +2 -0
  263. package/dist/esm/funcs/vendorsDeclineVendorCredential.js.map +1 -1
  264. package/dist/esm/funcs/vendorsDeleteVendorCredentialFile.js +2 -0
  265. package/dist/esm/funcs/vendorsDeleteVendorCredentialFile.js.map +1 -1
  266. package/dist/esm/funcs/vendorsDeleteVendorManagedByCompany.js +2 -0
  267. package/dist/esm/funcs/vendorsDeleteVendorManagedByCompany.js.map +1 -1
  268. package/dist/esm/funcs/vendorsExpediteTimeRemaining.js +2 -0
  269. package/dist/esm/funcs/vendorsExpediteTimeRemaining.js.map +1 -1
  270. package/dist/esm/funcs/vendorsGetVendorCredentialDetails.js +2 -0
  271. package/dist/esm/funcs/vendorsGetVendorCredentialDetails.js.map +1 -1
  272. package/dist/esm/funcs/vendorsGetVendorCredentialFile.js +2 -0
  273. package/dist/esm/funcs/vendorsGetVendorCredentialFile.js.map +1 -1
  274. package/dist/esm/funcs/vendorsGetVendorInvoiceDetails.js +2 -0
  275. package/dist/esm/funcs/vendorsGetVendorInvoiceDetails.js.map +1 -1
  276. package/dist/esm/funcs/vendorsGetVendorLegalName.js +2 -0
  277. package/dist/esm/funcs/vendorsGetVendorLegalName.js.map +1 -1
  278. package/dist/esm/funcs/vendorsGetVendorsDetails.js +2 -0
  279. package/dist/esm/funcs/vendorsGetVendorsDetails.js.map +1 -1
  280. package/dist/esm/funcs/vendorsListVendorAdditionalFacilityFields.js +2 -0
  281. package/dist/esm/funcs/vendorsListVendorAdditionalFacilityFields.js.map +1 -1
  282. package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.js +2 -0
  283. package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.js.map +1 -1
  284. package/dist/esm/funcs/vendorsListVendorCredentialFiles.js +2 -0
  285. package/dist/esm/funcs/vendorsListVendorCredentialFiles.js.map +1 -1
  286. package/dist/esm/funcs/vendorsListVendorCredentialHistory.js +2 -0
  287. package/dist/esm/funcs/vendorsListVendorCredentialHistory.js.map +1 -1
  288. package/dist/esm/funcs/vendorsListVendorCredentials.js +2 -0
  289. package/dist/esm/funcs/vendorsListVendorCredentials.js.map +1 -1
  290. package/dist/esm/funcs/vendorsListVendorCredits.js +2 -0
  291. package/dist/esm/funcs/vendorsListVendorCredits.js.map +1 -1
  292. package/dist/esm/funcs/vendorsListVendorFacilityStatuses.js +2 -0
  293. package/dist/esm/funcs/vendorsListVendorFacilityStatuses.js.map +1 -1
  294. package/dist/esm/funcs/vendorsListVendorInvoices.js +2 -0
  295. package/dist/esm/funcs/vendorsListVendorInvoices.js.map +1 -1
  296. package/dist/esm/funcs/vendorsListVendorJobTitles.js +2 -0
  297. package/dist/esm/funcs/vendorsListVendorJobTitles.js.map +1 -1
  298. package/dist/esm/funcs/vendorsListVendorManagedByCompanies.js +2 -0
  299. package/dist/esm/funcs/vendorsListVendorManagedByCompanies.js.map +1 -1
  300. package/dist/esm/funcs/vendorsListVendorScrubDetails.js +2 -0
  301. package/dist/esm/funcs/vendorsListVendorScrubDetails.js.map +1 -1
  302. package/dist/esm/funcs/vendorsListVendorScrubPackages.js +2 -0
  303. package/dist/esm/funcs/vendorsListVendorScrubPackages.js.map +1 -1
  304. package/dist/esm/funcs/vendorsListVendorScrubPurchases.js +2 -0
  305. package/dist/esm/funcs/vendorsListVendorScrubPurchases.js.map +1 -1
  306. package/dist/esm/funcs/vendorsPurchaseScrubCredits.js +2 -0
  307. package/dist/esm/funcs/vendorsPurchaseScrubCredits.js.map +1 -1
  308. package/dist/esm/funcs/vendorsSubmitVendorCredential.js +2 -0
  309. package/dist/esm/funcs/vendorsSubmitVendorCredential.js.map +1 -1
  310. package/dist/esm/funcs/vendorsUpdateVendorCredentialFile.js +2 -0
  311. package/dist/esm/funcs/vendorsUpdateVendorCredentialFile.js.map +1 -1
  312. package/dist/esm/funcs/vendorsUpdateVendorDetails.js +2 -0
  313. package/dist/esm/funcs/vendorsUpdateVendorDetails.js.map +1 -1
  314. package/dist/esm/funcs/vendorsUpdateVendorManagedByCompany.js +2 -0
  315. package/dist/esm/funcs/vendorsUpdateVendorManagedByCompany.js.map +1 -1
  316. package/dist/esm/funcs/vendorsUpdateVendorScrubDetails.js +2 -0
  317. package/dist/esm/funcs/vendorsUpdateVendorScrubDetails.js.map +1 -1
  318. package/dist/esm/funcs/webhooksGetWebhookEndpoint.js +2 -0
  319. package/dist/esm/funcs/webhooksGetWebhookEndpoint.js.map +1 -1
  320. package/dist/esm/funcs/webhooksListAllWebhookEndpoints.js +2 -0
  321. package/dist/esm/funcs/webhooksListAllWebhookEndpoints.js.map +1 -1
  322. package/dist/esm/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js +2 -0
  323. package/dist/esm/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js.map +1 -1
  324. package/dist/esm/funcs/zonesListOrSearchSecurityZones.js +2 -0
  325. package/dist/esm/funcs/zonesListOrSearchSecurityZones.js.map +1 -1
  326. package/dist/esm/funcs/zonesSecurityZoneCheckin.js +2 -0
  327. package/dist/esm/funcs/zonesSecurityZoneCheckin.js.map +1 -1
  328. package/dist/esm/hooks/types.d.ts +2 -0
  329. package/dist/esm/hooks/types.d.ts.map +1 -1
  330. package/dist/esm/index.d.ts +2 -0
  331. package/dist/esm/index.d.ts.map +1 -1
  332. package/dist/esm/index.js +1 -0
  333. package/dist/esm/index.js.map +1 -1
  334. package/dist/esm/lib/config.d.ts +7 -3
  335. package/dist/esm/lib/config.d.ts.map +1 -1
  336. package/dist/esm/lib/config.js +3 -3
  337. package/dist/esm/lib/config.js.map +1 -1
  338. package/dist/esm/lib/sdks.d.ts +1 -0
  339. package/dist/esm/lib/sdks.d.ts.map +1 -1
  340. package/dist/esm/lib/sdks.js +3 -3
  341. package/dist/esm/lib/sdks.js.map +1 -1
  342. package/dist/esm/mcp-server/mcp-server.js +1 -1
  343. package/dist/esm/mcp-server/server.d.ts.map +1 -1
  344. package/dist/esm/mcp-server/server.js +7 -1
  345. package/dist/esm/mcp-server/server.js.map +1 -1
  346. package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts +8 -0
  347. package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  348. package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.js +28 -0
  349. package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.js.map +1 -0
  350. package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts +8 -0
  351. package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  352. package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.js +28 -0
  353. package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.js.map +1 -0
  354. package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts +8 -0
  355. package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  356. package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.js +28 -0
  357. package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.js.map +1 -0
  358. package/dist/esm/models/operations/adddatarequestfile.d.ts +67 -0
  359. package/dist/esm/models/operations/adddatarequestfile.d.ts.map +1 -0
  360. package/dist/esm/models/operations/adddatarequestfile.js +84 -0
  361. package/dist/esm/models/operations/adddatarequestfile.js.map +1 -0
  362. package/dist/esm/models/operations/deletedatarequestfile.d.ts +32 -0
  363. package/dist/esm/models/operations/deletedatarequestfile.d.ts.map +1 -0
  364. package/dist/esm/models/operations/deletedatarequestfile.js +31 -0
  365. package/dist/esm/models/operations/deletedatarequestfile.js.map +1 -0
  366. package/dist/esm/models/operations/index.d.ts +3 -0
  367. package/dist/esm/models/operations/index.d.ts.map +1 -1
  368. package/dist/esm/models/operations/index.js +3 -0
  369. package/dist/esm/models/operations/index.js.map +1 -1
  370. package/dist/esm/models/operations/updatedatarequest.d.ts +59 -0
  371. package/dist/esm/models/operations/updatedatarequest.d.ts.map +1 -0
  372. package/dist/esm/models/operations/updatedatarequest.js +67 -0
  373. package/dist/esm/models/operations/updatedatarequest.js.map +1 -0
  374. package/dist/esm/react-query/dataRequestsAddDataRequestFile.d.ts +23 -0
  375. package/dist/esm/react-query/dataRequestsAddDataRequestFile.d.ts.map +1 -0
  376. package/dist/esm/react-query/dataRequestsAddDataRequestFile.js +46 -0
  377. package/dist/esm/react-query/dataRequestsAddDataRequestFile.js.map +1 -0
  378. package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.d.ts +23 -0
  379. package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
  380. package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.js +46 -0
  381. package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.js.map +1 -0
  382. package/dist/esm/react-query/dataRequestsUpdateDataRequest.d.ts +23 -0
  383. package/dist/esm/react-query/dataRequestsUpdateDataRequest.d.ts.map +1 -0
  384. package/dist/esm/react-query/dataRequestsUpdateDataRequest.js +46 -0
  385. package/dist/esm/react-query/dataRequestsUpdateDataRequest.js.map +1 -0
  386. package/dist/esm/react-query/index.d.ts +3 -0
  387. package/dist/esm/react-query/index.d.ts.map +1 -1
  388. package/dist/esm/react-query/index.js +3 -0
  389. package/dist/esm/react-query/index.js.map +1 -1
  390. package/dist/esm/sdk/datarequests.d.ts +26 -0
  391. package/dist/esm/sdk/datarequests.d.ts.map +1 -0
  392. package/dist/esm/sdk/datarequests.js +38 -0
  393. package/dist/esm/sdk/datarequests.js.map +1 -0
  394. package/dist/esm/sdk/sdk.d.ts +3 -0
  395. package/dist/esm/sdk/sdk.d.ts.map +1 -1
  396. package/dist/esm/sdk/sdk.js +4 -0
  397. package/dist/esm/sdk/sdk.js.map +1 -1
  398. package/jsr.json +1 -1
  399. package/package.json +1 -1
  400. package/src/__tests__/datarequests.test.ts +63 -0
  401. package/src/__tests__/vendors.test.ts +7 -10
  402. package/src/__tests__/zones.test.ts +7 -36
  403. package/src/admin-funcs/doAdmin.ts +3 -4
  404. package/src/funcs/companiesListOrSearchCompanies.ts +2 -0
  405. package/src/funcs/dataRequestsAddDataRequestFile.ts +176 -0
  406. package/src/funcs/dataRequestsDeleteDataRequestFile.ts +176 -0
  407. package/src/funcs/dataRequestsUpdateDataRequest.ts +176 -0
  408. package/src/funcs/organizationsGetFacility.ts +2 -0
  409. package/src/funcs/organizationsListOrSearchFacilities.ts +2 -0
  410. package/src/funcs/supportArticlesGetSupportArticle.ts +2 -0
  411. package/src/funcs/supportArticlesListOrSearchSupportArticles.ts +2 -0
  412. package/src/funcs/usersChangePassword.ts +2 -0
  413. package/src/funcs/usersGetCurrentUser.ts +2 -0
  414. package/src/funcs/usersGetUserById.ts +2 -0
  415. package/src/funcs/usersMagiclink.ts +2 -0
  416. package/src/funcs/usersPassword.ts +2 -0
  417. package/src/funcs/usersPasswordResetRequest.ts +2 -0
  418. package/src/funcs/usersPostAuthenticate.ts +2 -0
  419. package/src/funcs/vendorScansVendorScanOut.ts +2 -0
  420. package/src/funcs/vendorsAddVendorCredentialFile.ts +2 -0
  421. package/src/funcs/vendorsAddVendorManagedByCompany.ts +2 -0
  422. package/src/funcs/vendorsCreateNewVendorCredentialVersion.ts +2 -0
  423. package/src/funcs/vendorsCreateOrUpdateBcr.ts +2 -0
  424. package/src/funcs/vendorsCreateVendorCompany.ts +2 -0
  425. package/src/funcs/vendorsCreateVendorRegistration.ts +2 -0
  426. package/src/funcs/vendorsDeclineVendorCredential.ts +2 -0
  427. package/src/funcs/vendorsDeleteVendorCredentialFile.ts +2 -0
  428. package/src/funcs/vendorsDeleteVendorManagedByCompany.ts +2 -0
  429. package/src/funcs/vendorsExpediteTimeRemaining.ts +2 -0
  430. package/src/funcs/vendorsGetVendorCredentialDetails.ts +2 -0
  431. package/src/funcs/vendorsGetVendorCredentialFile.ts +2 -0
  432. package/src/funcs/vendorsGetVendorInvoiceDetails.ts +2 -0
  433. package/src/funcs/vendorsGetVendorLegalName.ts +2 -0
  434. package/src/funcs/vendorsGetVendorsDetails.ts +2 -0
  435. package/src/funcs/vendorsListVendorAdditionalFacilityFields.ts +2 -0
  436. package/src/funcs/vendorsListVendorCredentialDataRequests.ts +2 -0
  437. package/src/funcs/vendorsListVendorCredentialFiles.ts +2 -0
  438. package/src/funcs/vendorsListVendorCredentialHistory.ts +2 -0
  439. package/src/funcs/vendorsListVendorCredentials.ts +2 -0
  440. package/src/funcs/vendorsListVendorCredits.ts +2 -0
  441. package/src/funcs/vendorsListVendorFacilityStatuses.ts +2 -0
  442. package/src/funcs/vendorsListVendorInvoices.ts +2 -0
  443. package/src/funcs/vendorsListVendorJobTitles.ts +2 -0
  444. package/src/funcs/vendorsListVendorManagedByCompanies.ts +2 -0
  445. package/src/funcs/vendorsListVendorScrubDetails.ts +2 -0
  446. package/src/funcs/vendorsListVendorScrubPackages.ts +2 -0
  447. package/src/funcs/vendorsListVendorScrubPurchases.ts +2 -0
  448. package/src/funcs/vendorsPurchaseScrubCredits.ts +2 -0
  449. package/src/funcs/vendorsSubmitVendorCredential.ts +2 -0
  450. package/src/funcs/vendorsUpdateVendorCredentialFile.ts +2 -0
  451. package/src/funcs/vendorsUpdateVendorDetails.ts +2 -0
  452. package/src/funcs/vendorsUpdateVendorManagedByCompany.ts +2 -0
  453. package/src/funcs/vendorsUpdateVendorScrubDetails.ts +2 -0
  454. package/src/funcs/webhooksGetWebhookEndpoint.ts +2 -0
  455. package/src/funcs/webhooksListAllWebhookEndpoints.ts +2 -0
  456. package/src/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts +2 -0
  457. package/src/funcs/zonesListOrSearchSecurityZones.ts +2 -0
  458. package/src/funcs/zonesSecurityZoneCheckin.ts +2 -0
  459. package/src/hooks/types.ts +2 -0
  460. package/src/index.ts +2 -0
  461. package/src/lib/config.ts +7 -3
  462. package/src/lib/sdks.ts +10 -4
  463. package/src/mcp-server/mcp-server.ts +1 -1
  464. package/src/mcp-server/server.ts +7 -1
  465. package/src/mcp-server/tools/dataRequestsAddDataRequestFile.ts +38 -0
  466. package/src/mcp-server/tools/dataRequestsDeleteDataRequestFile.ts +39 -0
  467. package/src/mcp-server/tools/dataRequestsUpdateDataRequest.ts +37 -0
  468. package/src/models/operations/adddatarequestfile.ts +166 -0
  469. package/src/models/operations/deletedatarequestfile.ts +71 -0
  470. package/src/models/operations/index.ts +3 -0
  471. package/src/models/operations/updatedatarequest.ts +142 -0
  472. package/src/react-query/dataRequestsAddDataRequestFile.ts +92 -0
  473. package/src/react-query/dataRequestsDeleteDataRequestFile.ts +92 -0
  474. package/src/react-query/dataRequestsUpdateDataRequest.ts +92 -0
  475. package/src/react-query/index.ts +3 -0
  476. package/src/sdk/datarequests.ts +63 -0
  477. package/src/sdk/sdk.ts +6 -0
package/bin/mcp-server.js CHANGED
@@ -34236,9 +34236,9 @@ var init_config = __esm(() => {
34236
34236
  SDK_METADATA = {
34237
34237
  language: "typescript",
34238
34238
  openapiDocVersion: "0.0.3",
34239
- sdkVersion: "0.34.1",
34240
- genVersion: "2.610.0",
34241
- userAgent: "speakeasy-sdk/typescript 0.34.1 2.610.0 0.0.3 @greensecurity/javascript-sdk"
34239
+ sdkVersion: "0.35.1",
34240
+ genVersion: "2.618.0",
34241
+ userAgent: "speakeasy-sdk/typescript 0.35.1 2.618.0 0.0.3 @greensecurity/javascript-sdk"
34242
34242
  };
34243
34243
  });
34244
34244
 
@@ -34804,7 +34804,6 @@ class ClientSDK {
34804
34804
  } else {
34805
34805
  this.#hooks = new SDKHooks;
34806
34806
  }
34807
- this._options = { ...options, hooks: this.#hooks };
34808
34807
  const url = serverURLFromOptions(options);
34809
34808
  if (url) {
34810
34809
  url.pathname = url.pathname.replace(/\/+$/, "") + "/";
@@ -34815,7 +34814,8 @@ class ClientSDK {
34815
34814
  });
34816
34815
  this._baseURL = baseURL;
34817
34816
  this.#httpClient = client;
34818
- this.#logger = options.debugLogger;
34817
+ this._options = { ...options, hooks: this.#hooks };
34818
+ this.#logger = this._options.debugLogger;
34819
34819
  if (!this.#logger && env().GREEN_SECURITY_DEBUG) {
34820
34820
  this.#logger = console;
34821
34821
  }
@@ -34869,7 +34869,7 @@ class ClientSDK {
34869
34869
  headers.set(k2, v2);
34870
34870
  }
34871
34871
  if (!isBrowserLike) {
34872
- headers.set(conf.uaHeader ?? "user-agent", SDK_METADATA.userAgent);
34872
+ headers.set(conf.uaHeader ?? "user-agent", conf.userAgent ?? SDK_METADATA.userAgent);
34873
34873
  }
34874
34874
  const fetchOptions = {
34875
34875
  ...options?.fetchOptions,
@@ -40177,6 +40177,60 @@ var init_components = __esm(() => {
40177
40177
  init_zoneconfig();
40178
40178
  });
40179
40179
 
40180
+ // src/models/operations/adddatarequestfile.ts
40181
+ var AddDataRequestFileRequestBody$inboundSchema, AddDataRequestFileRequestBody$outboundSchema, AddDataRequestFileRequestBody$, AddDataRequestFileRequest$inboundSchema, AddDataRequestFileRequest$outboundSchema, AddDataRequestFileRequest$;
40182
+ var init_adddatarequestfile = __esm(() => {
40183
+ init_esm();
40184
+ init_primitives();
40185
+ init_components();
40186
+ AddDataRequestFileRequestBody$inboundSchema = objectType({
40187
+ file_name: stringType().optional(),
40188
+ content_type: ContentType$inboundSchema.optional(),
40189
+ file_size: numberType().int().optional()
40190
+ }).transform((v2) => {
40191
+ return remap(v2, {
40192
+ file_name: "fileName",
40193
+ content_type: "contentType",
40194
+ file_size: "fileSize"
40195
+ });
40196
+ });
40197
+ AddDataRequestFileRequestBody$outboundSchema = objectType({
40198
+ fileName: stringType().optional(),
40199
+ contentType: ContentType$outboundSchema.optional(),
40200
+ fileSize: numberType().int().optional()
40201
+ }).transform((v2) => {
40202
+ return remap(v2, {
40203
+ fileName: "file_name",
40204
+ contentType: "content_type",
40205
+ fileSize: "file_size"
40206
+ });
40207
+ });
40208
+ ((AddDataRequestFileRequestBody$) => {
40209
+ AddDataRequestFileRequestBody$.inboundSchema = AddDataRequestFileRequestBody$inboundSchema;
40210
+ AddDataRequestFileRequestBody$.outboundSchema = AddDataRequestFileRequestBody$outboundSchema;
40211
+ })(AddDataRequestFileRequestBody$ ||= {});
40212
+ AddDataRequestFileRequest$inboundSchema = objectType({
40213
+ id: numberType().int(),
40214
+ RequestBody: lazyType(() => AddDataRequestFileRequestBody$inboundSchema)
40215
+ }).transform((v2) => {
40216
+ return remap(v2, {
40217
+ RequestBody: "requestBody"
40218
+ });
40219
+ });
40220
+ AddDataRequestFileRequest$outboundSchema = objectType({
40221
+ id: numberType().int(),
40222
+ requestBody: lazyType(() => AddDataRequestFileRequestBody$outboundSchema)
40223
+ }).transform((v2) => {
40224
+ return remap(v2, {
40225
+ requestBody: "RequestBody"
40226
+ });
40227
+ });
40228
+ ((AddDataRequestFileRequest$) => {
40229
+ AddDataRequestFileRequest$.inboundSchema = AddDataRequestFileRequest$inboundSchema;
40230
+ AddDataRequestFileRequest$.outboundSchema = AddDataRequestFileRequest$outboundSchema;
40231
+ })(AddDataRequestFileRequest$ ||= {});
40232
+ });
40233
+
40180
40234
  // src/models/operations/addvendorcredentialfile.ts
40181
40235
  var AddVendorCredentialFileRequestBody$inboundSchema, AddVendorCredentialFileRequestBody$outboundSchema, AddVendorCredentialFileRequestBody$, AddVendorCredentialFileRequest$inboundSchema, AddVendorCredentialFileRequest$outboundSchema, AddVendorCredentialFileRequest$, AddVendorCredentialFileResponseBody$inboundSchema, AddVendorCredentialFileResponseBody$outboundSchema, AddVendorCredentialFileResponseBody$;
40182
40236
  var init_addvendorcredentialfile = __esm(() => {
@@ -40618,6 +40672,22 @@ var init_declinevendorcredential = __esm(() => {
40618
40672
  })(DeclineVendorCredentialRequest$ ||= {});
40619
40673
  });
40620
40674
 
40675
+ // src/models/operations/deletedatarequestfile.ts
40676
+ var DeleteDataRequestFileRequest$inboundSchema, DeleteDataRequestFileRequest$outboundSchema, DeleteDataRequestFileRequest$;
40677
+ var init_deletedatarequestfile = __esm(() => {
40678
+ init_esm();
40679
+ DeleteDataRequestFileRequest$inboundSchema = objectType({
40680
+ id: numberType().int()
40681
+ });
40682
+ DeleteDataRequestFileRequest$outboundSchema = objectType({
40683
+ id: numberType().int()
40684
+ });
40685
+ ((DeleteDataRequestFileRequest$) => {
40686
+ DeleteDataRequestFileRequest$.inboundSchema = DeleteDataRequestFileRequest$inboundSchema;
40687
+ DeleteDataRequestFileRequest$.outboundSchema = DeleteDataRequestFileRequest$outboundSchema;
40688
+ })(DeleteDataRequestFileRequest$ ||= {});
40689
+ });
40690
+
40621
40691
  // src/models/operations/deletevendorcredentialfile.ts
40622
40692
  var DeleteVendorCredentialFileRequest$inboundSchema, DeleteVendorCredentialFileRequest$outboundSchema, DeleteVendorCredentialFileRequest$;
40623
40693
  var init_deletevendorcredentialfile = __esm(() => {
@@ -42719,6 +42789,43 @@ var init_submitvendorcredential = __esm(() => {
42719
42789
  })(SubmitVendorCredentialRequest$ ||= {});
42720
42790
  });
42721
42791
 
42792
+ // src/models/operations/updatedatarequest.ts
42793
+ var UpdateDataRequestRequestBody$inboundSchema, UpdateDataRequestRequestBody$outboundSchema, UpdateDataRequestRequestBody$, UpdateDataRequestRequest$inboundSchema, UpdateDataRequestRequest$outboundSchema, UpdateDataRequestRequest$;
42794
+ var init_updatedatarequest = __esm(() => {
42795
+ init_esm();
42796
+ init_primitives();
42797
+ UpdateDataRequestRequestBody$inboundSchema = objectType({
42798
+ value: stringType().optional()
42799
+ });
42800
+ UpdateDataRequestRequestBody$outboundSchema = objectType({
42801
+ value: stringType().optional()
42802
+ });
42803
+ ((UpdateDataRequestRequestBody$) => {
42804
+ UpdateDataRequestRequestBody$.inboundSchema = UpdateDataRequestRequestBody$inboundSchema;
42805
+ UpdateDataRequestRequestBody$.outboundSchema = UpdateDataRequestRequestBody$outboundSchema;
42806
+ })(UpdateDataRequestRequestBody$ ||= {});
42807
+ UpdateDataRequestRequest$inboundSchema = objectType({
42808
+ id: numberType().int(),
42809
+ RequestBody: lazyType(() => UpdateDataRequestRequestBody$inboundSchema)
42810
+ }).transform((v2) => {
42811
+ return remap(v2, {
42812
+ RequestBody: "requestBody"
42813
+ });
42814
+ });
42815
+ UpdateDataRequestRequest$outboundSchema = objectType({
42816
+ id: numberType().int(),
42817
+ requestBody: lazyType(() => UpdateDataRequestRequestBody$outboundSchema)
42818
+ }).transform((v2) => {
42819
+ return remap(v2, {
42820
+ requestBody: "RequestBody"
42821
+ });
42822
+ });
42823
+ ((UpdateDataRequestRequest$) => {
42824
+ UpdateDataRequestRequest$.inboundSchema = UpdateDataRequestRequest$inboundSchema;
42825
+ UpdateDataRequestRequest$.outboundSchema = UpdateDataRequestRequest$outboundSchema;
42826
+ })(UpdateDataRequestRequest$ ||= {});
42827
+ });
42828
+
42722
42829
  // src/models/operations/updatesthewebhookendpointwiththegivenid.ts
42723
42830
  var UpdatesTheWebhookEndpointWithTheGivenIdRequest$inboundSchema, UpdatesTheWebhookEndpointWithTheGivenIdRequest$outboundSchema, UpdatesTheWebhookEndpointWithTheGivenIdRequest$;
42724
42831
  var init_updatesthewebhookendpointwiththegivenid = __esm(() => {
@@ -43079,6 +43186,7 @@ var init_vendorscanout = __esm(() => {
43079
43186
 
43080
43187
  // src/models/operations/index.ts
43081
43188
  var init_operations = __esm(() => {
43189
+ init_adddatarequestfile();
43082
43190
  init_addvendorcredentialfile();
43083
43191
  init_addvendormanagedbycompany();
43084
43192
  init_changepassword();
@@ -43087,6 +43195,7 @@ var init_operations = __esm(() => {
43087
43195
  init_createvendorcompany();
43088
43196
  init_createvendorregistration();
43089
43197
  init_declinevendorcredential();
43198
+ init_deletedatarequestfile();
43090
43199
  init_deletevendorcredentialfile();
43091
43200
  init_deletevendormanagedbycompany();
43092
43201
  init_expeditetimeremaining();
@@ -43124,6 +43233,7 @@ var init_operations = __esm(() => {
43124
43233
  init_purchasescrubcredits();
43125
43234
  init_securityzonecheckin();
43126
43235
  init_submitvendorcredential();
43236
+ init_updatedatarequest();
43127
43237
  init_updatesthewebhookendpointwiththegivenid();
43128
43238
  init_updatevendorcredentialfile();
43129
43239
  init_updatevendordetails();
@@ -43215,6 +43325,7 @@ async function $do(client, request, options) {
43215
43325
  const securityInput = await extractSecurity(client._options.security);
43216
43326
  const requestSecurity = resolveGlobalSecurity(securityInput);
43217
43327
  const context = {
43328
+ options: client._options,
43218
43329
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43219
43330
  operationID: "listOrSearchCompanies",
43220
43331
  oAuth2Scopes: [],
@@ -43231,6 +43342,7 @@ async function $do(client, request, options) {
43231
43342
  headers,
43232
43343
  query,
43233
43344
  body,
43345
+ userAgent: client._options.userAgent,
43234
43346
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43235
43347
  }, options);
43236
43348
  if (!requestRes.ok) {
@@ -43329,32 +43441,34 @@ List or search companies.`,
43329
43441
  };
43330
43442
  });
43331
43443
 
43332
- // src/funcs/organizationsGetFacility.ts
43333
- function organizationsGetFacility(client, request, options) {
43444
+ // src/funcs/dataRequestsAddDataRequestFile.ts
43445
+ function dataRequestsAddDataRequestFile(client, request, options) {
43334
43446
  return new APIPromise($do2(client, request, options));
43335
43447
  }
43336
43448
  async function $do2(client, request, options) {
43337
- const parsed = safeParse(request, (value) => GetFacilityRequest$outboundSchema.parse(value), "Input validation failed");
43449
+ const parsed = safeParse(request, (value) => AddDataRequestFileRequest$outboundSchema.parse(value), "Input validation failed");
43338
43450
  if (!parsed.ok) {
43339
43451
  return [parsed, { status: "invalid" }];
43340
43452
  }
43341
43453
  const payload = parsed.value;
43342
- const body = null;
43454
+ const body = encodeJSON("body", payload.RequestBody, { explode: true });
43343
43455
  const pathParams = {
43344
43456
  id: encodeSimple("id", payload.id, {
43345
43457
  explode: false,
43346
43458
  charEncoding: "percent"
43347
43459
  })
43348
43460
  };
43349
- const path = pathToFunc("/facilities/{id}")(pathParams);
43461
+ const path = pathToFunc("/data_requests/{id}/file")(pathParams);
43350
43462
  const headers = new Headers(compactMap({
43463
+ "Content-Type": "application/json",
43351
43464
  Accept: "application/json"
43352
43465
  }));
43353
43466
  const securityInput = await extractSecurity(client._options.security);
43354
43467
  const requestSecurity = resolveGlobalSecurity(securityInput);
43355
43468
  const context = {
43469
+ options: client._options,
43356
43470
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43357
- operationID: "getFacility",
43471
+ operationID: "addDataRequestFile",
43358
43472
  oAuth2Scopes: [],
43359
43473
  resolvedSecurity: requestSecurity,
43360
43474
  securitySource: client._options.security,
@@ -43363,11 +43477,12 @@ async function $do2(client, request, options) {
43363
43477
  };
43364
43478
  const requestRes = client._createRequest(context, {
43365
43479
  security: requestSecurity,
43366
- method: "GET",
43480
+ method: "POST",
43367
43481
  baseURL: options?.serverURL,
43368
43482
  path,
43369
43483
  headers,
43370
43484
  body,
43485
+ userAgent: client._options.userAgent,
43371
43486
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43372
43487
  }, options);
43373
43488
  if (!requestRes.ok) {
@@ -43376,7 +43491,7 @@ async function $do2(client, request, options) {
43376
43491
  const req = requestRes.value;
43377
43492
  const doResult = await client._do(req, {
43378
43493
  context,
43379
- errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
43494
+ errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
43380
43495
  retryConfig: context.retryConfig,
43381
43496
  retryCodes: context.retryCodes
43382
43497
  });
@@ -43387,42 +43502,42 @@ async function $do2(client, request, options) {
43387
43502
  const responseFields = {
43388
43503
  HttpMeta: { Response: response, Request: req }
43389
43504
  };
43390
- const [result] = await match(json(200, Facility$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43505
+ const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43391
43506
  if (!result.ok) {
43392
43507
  return [result, { status: "complete", request: req, response }];
43393
43508
  }
43394
43509
  return [result, { status: "complete", request: req, response }];
43395
43510
  }
43396
- var init_organizationsGetFacility = __esm(() => {
43511
+ var init_dataRequestsAddDataRequestFile = __esm(() => {
43512
+ init_esm();
43397
43513
  init_encodings();
43398
43514
  init_matchers();
43399
43515
  init_primitives();
43400
43516
  init_schemas();
43401
43517
  init_security();
43402
43518
  init_url();
43403
- init_components();
43404
43519
  init_errors2();
43405
43520
  init_operations();
43406
43521
  init_async();
43407
43522
  });
43408
43523
 
43409
- // src/mcp-server/tools/organizationsGetFacility.ts
43410
- var args2, tool$organizationsGetFacility;
43411
- var init_organizationsGetFacility2 = __esm(() => {
43412
- init_organizationsGetFacility();
43524
+ // src/mcp-server/tools/dataRequestsAddDataRequestFile.ts
43525
+ var args2, tool$dataRequestsAddDataRequestFile;
43526
+ var init_dataRequestsAddDataRequestFile2 = __esm(() => {
43527
+ init_dataRequestsAddDataRequestFile();
43413
43528
  init_operations();
43414
43529
  init_tools();
43415
43530
  args2 = {
43416
- request: GetFacilityRequest$inboundSchema
43531
+ request: AddDataRequestFileRequest$inboundSchema
43417
43532
  };
43418
- tool$organizationsGetFacility = {
43419
- name: "organizations-get-facility",
43420
- description: `Get facility
43533
+ tool$dataRequestsAddDataRequestFile = {
43534
+ name: "data-requests-add-data-request-file",
43535
+ description: `Add vendor credential data request
43421
43536
 
43422
- Retrieve an individual facility.`,
43537
+ It will set the vendor credential data request file attributes`,
43423
43538
  args: args2,
43424
43539
  tool: async (client, args3, ctx) => {
43425
- const [result, apiCall] = await organizationsGetFacility(client, args3.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43540
+ const [result, apiCall] = await dataRequestsAddDataRequestFile(client, args3.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43426
43541
  if (!result.ok) {
43427
43542
  return {
43428
43543
  content: [{ type: "text", text: result.error.message }],
@@ -43435,40 +43550,33 @@ Retrieve an individual facility.`,
43435
43550
  };
43436
43551
  });
43437
43552
 
43438
- // src/funcs/organizationsListOrSearchFacilities.ts
43439
- function organizationsListOrSearchFacilities(client, request, options) {
43553
+ // src/funcs/dataRequestsDeleteDataRequestFile.ts
43554
+ function dataRequestsDeleteDataRequestFile(client, request, options) {
43440
43555
  return new APIPromise($do3(client, request, options));
43441
43556
  }
43442
43557
  async function $do3(client, request, options) {
43443
- const parsed = safeParse(request, (value) => ListOrSearchFacilitiesRequest$outboundSchema.parse(value), "Input validation failed");
43558
+ const parsed = safeParse(request, (value) => DeleteDataRequestFileRequest$outboundSchema.parse(value), "Input validation failed");
43444
43559
  if (!parsed.ok) {
43445
- return [haltIterator(parsed), { status: "invalid" }];
43560
+ return [parsed, { status: "invalid" }];
43446
43561
  }
43447
43562
  const payload = parsed.value;
43448
43563
  const body = null;
43449
- const path = pathToFunc("/facilities")();
43450
- const query = queryJoin(encodeFormQuery({
43451
- expand: payload.expand
43452
- }, { explode: false }), encodeFormQuery({
43453
- active_status: payload.active_status,
43454
- desc: payload.desc,
43455
- items_per_page: payload.items_per_page,
43456
- latitude: payload.latitude,
43457
- longitude: payload.longitude,
43458
- name_like: payload.name_like,
43459
- page: payload.page,
43460
- sort: payload.sort,
43461
- state_like: payload.state_like,
43462
- system_id: payload.system_id
43463
- }));
43564
+ const pathParams = {
43565
+ id: encodeSimple("id", payload.id, {
43566
+ explode: false,
43567
+ charEncoding: "percent"
43568
+ })
43569
+ };
43570
+ const path = pathToFunc("/data_requests/{id}/file")(pathParams);
43464
43571
  const headers = new Headers(compactMap({
43465
43572
  Accept: "application/json"
43466
43573
  }));
43467
43574
  const securityInput = await extractSecurity(client._options.security);
43468
43575
  const requestSecurity = resolveGlobalSecurity(securityInput);
43469
43576
  const context = {
43577
+ options: client._options,
43470
43578
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43471
- operationID: "listOrSearchFacilities",
43579
+ operationID: "deleteDataRequestFile",
43472
43580
  oAuth2Scopes: [],
43473
43581
  resolvedSecurity: requestSecurity,
43474
43582
  securitySource: client._options.security,
@@ -43477,16 +43585,16 @@ async function $do3(client, request, options) {
43477
43585
  };
43478
43586
  const requestRes = client._createRequest(context, {
43479
43587
  security: requestSecurity,
43480
- method: "GET",
43588
+ method: "DELETE",
43481
43589
  baseURL: options?.serverURL,
43482
43590
  path,
43483
43591
  headers,
43484
- query,
43485
43592
  body,
43593
+ userAgent: client._options.userAgent,
43486
43594
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43487
43595
  }, options);
43488
43596
  if (!requestRes.ok) {
43489
- return [haltIterator(requestRes), { status: "invalid" }];
43597
+ return [requestRes, { status: "invalid" }];
43490
43598
  }
43491
43599
  const req = requestRes.value;
43492
43600
  const doResult = await client._do(req, {
@@ -43496,50 +43604,20 @@ async function $do3(client, request, options) {
43496
43604
  retryCodes: context.retryCodes
43497
43605
  });
43498
43606
  if (!doResult.ok) {
43499
- return [haltIterator(doResult), { status: "request-error", request: req }];
43607
+ return [doResult, { status: "request-error", request: req }];
43500
43608
  }
43501
43609
  const response = doResult.value;
43502
43610
  const responseFields = {
43503
43611
  HttpMeta: { Response: response, Request: req }
43504
43612
  };
43505
- const [result, raw] = await match(json(200, ListOrSearchFacilitiesResponse$inboundSchema, {
43506
- key: "Result"
43507
- }), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43613
+ const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43508
43614
  if (!result.ok) {
43509
- return [haltIterator(result), {
43510
- status: "complete",
43511
- request: req,
43512
- response
43513
- }];
43615
+ return [result, { status: "complete", request: req, response }];
43514
43616
  }
43515
- const nextFunc = (responseData) => {
43516
- const page2 = request?.page ?? 1;
43517
- const nextPage = page2 + 1;
43518
- if (!responseData) {
43519
- return { next: () => null };
43520
- }
43521
- const results = dlv(responseData, "items");
43522
- if (!Array.isArray(results) || !results.length) {
43523
- return { next: () => null };
43524
- }
43525
- const limit = request?.itemsPerPage ?? 0;
43526
- if (results.length < limit) {
43527
- return { next: () => null };
43528
- }
43529
- const nextVal = () => organizationsListOrSearchFacilities(client, {
43530
- ...request,
43531
- page: nextPage
43532
- }, options);
43533
- return { next: nextVal, "~next": { page: nextPage } };
43534
- };
43535
- const page = { ...result, ...nextFunc(raw) };
43536
- return [{ ...page, ...createPageIterator(page, (v2) => !v2.ok) }, {
43537
- status: "complete",
43538
- request: req,
43539
- response
43540
- }];
43617
+ return [result, { status: "complete", request: req, response }];
43541
43618
  }
43542
- var init_organizationsListOrSearchFacilities = __esm(() => {
43619
+ var init_dataRequestsDeleteDataRequestFile = __esm(() => {
43620
+ init_esm();
43543
43621
  init_encodings();
43544
43622
  init_matchers();
43545
43623
  init_primitives();
@@ -43549,80 +43627,65 @@ var init_organizationsListOrSearchFacilities = __esm(() => {
43549
43627
  init_errors2();
43550
43628
  init_operations();
43551
43629
  init_async();
43552
- init_operations2();
43553
43630
  });
43554
43631
 
43555
- // src/mcp-server/tools/organizationsListOrSearchFacilities.ts
43556
- var args3, tool$organizationsListOrSearchFacilities;
43557
- var init_organizationsListOrSearchFacilities2 = __esm(() => {
43558
- init_organizationsListOrSearchFacilities();
43632
+ // src/mcp-server/tools/dataRequestsDeleteDataRequestFile.ts
43633
+ var args3, tool$dataRequestsDeleteDataRequestFile;
43634
+ var init_dataRequestsDeleteDataRequestFile2 = __esm(() => {
43635
+ init_dataRequestsDeleteDataRequestFile();
43559
43636
  init_operations();
43560
43637
  init_tools();
43561
43638
  args3 = {
43562
- request: ListOrSearchFacilitiesRequest$inboundSchema
43639
+ request: DeleteDataRequestFileRequest$inboundSchema
43563
43640
  };
43564
- tool$organizationsListOrSearchFacilities = {
43565
- name: "organizations-list-or-search-facilities",
43566
- description: `List or search facilities
43567
-
43568
- List or search facilities.
43641
+ tool$dataRequestsDeleteDataRequestFile = {
43642
+ name: "data-requests-delete-data-request-file",
43643
+ description: `Delete vendor credential data request file
43569
43644
 
43570
- Available \`expand\` scopes are:
43571
-
43572
- - facility.appointment_policy
43573
- - facility.contacts
43574
- - facility.vendor_counts
43575
- - facility.flu_credential
43576
- - facility.scrubs_policy
43577
- - facility.system
43578
- - facility.vendor_guest_policy
43579
- - facility.vendor_policy
43580
- - facility.visitor_policy
43581
- - facility.workflow`,
43645
+ It will delete the vendor credential data request file`,
43582
43646
  args: args3,
43583
43647
  tool: async (client, args4, ctx) => {
43584
- const [result, apiCall] = await organizationsListOrSearchFacilities(client, args4.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43648
+ const [result, apiCall] = await dataRequestsDeleteDataRequestFile(client, args4.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43585
43649
  if (!result.ok) {
43586
43650
  return {
43587
43651
  content: [{ type: "text", text: result.error.message }],
43588
43652
  isError: true
43589
43653
  };
43590
43654
  }
43591
- const value = result.value.result;
43655
+ const value = result.value;
43592
43656
  return formatResult(value, apiCall);
43593
43657
  }
43594
43658
  };
43595
43659
  });
43596
43660
 
43597
- // src/funcs/supportArticlesGetSupportArticle.ts
43598
- function supportArticlesGetSupportArticle(client, request, options) {
43661
+ // src/funcs/dataRequestsUpdateDataRequest.ts
43662
+ function dataRequestsUpdateDataRequest(client, request, options) {
43599
43663
  return new APIPromise($do4(client, request, options));
43600
43664
  }
43601
43665
  async function $do4(client, request, options) {
43602
- const parsed = safeParse(request, (value) => GetSupportArticleRequest$outboundSchema.parse(value), "Input validation failed");
43666
+ const parsed = safeParse(request, (value) => UpdateDataRequestRequest$outboundSchema.parse(value), "Input validation failed");
43603
43667
  if (!parsed.ok) {
43604
43668
  return [parsed, { status: "invalid" }];
43605
43669
  }
43606
43670
  const payload = parsed.value;
43607
- const body = null;
43671
+ const body = encodeJSON("body", payload.RequestBody, { explode: true });
43608
43672
  const pathParams = {
43609
43673
  id: encodeSimple("id", payload.id, {
43610
43674
  explode: false,
43611
43675
  charEncoding: "percent"
43612
43676
  })
43613
43677
  };
43614
- const path = pathToFunc("/support_articles/{id}")(pathParams);
43615
- const query = encodeFormQuery({
43616
- expand: payload.expand
43617
- }, { explode: false });
43678
+ const path = pathToFunc("/data_requests/{id}")(pathParams);
43618
43679
  const headers = new Headers(compactMap({
43680
+ "Content-Type": "application/json",
43619
43681
  Accept: "application/json"
43620
43682
  }));
43621
43683
  const securityInput = await extractSecurity(client._options.security);
43622
43684
  const requestSecurity = resolveGlobalSecurity(securityInput);
43623
43685
  const context = {
43686
+ options: client._options,
43624
43687
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43625
- operationID: "getSupportArticle",
43688
+ operationID: "updateDataRequest",
43626
43689
  oAuth2Scopes: [],
43627
43690
  resolvedSecurity: requestSecurity,
43628
43691
  securitySource: client._options.security,
@@ -43631,12 +43694,12 @@ async function $do4(client, request, options) {
43631
43694
  };
43632
43695
  const requestRes = client._createRequest(context, {
43633
43696
  security: requestSecurity,
43634
- method: "GET",
43697
+ method: "PUT",
43635
43698
  baseURL: options?.serverURL,
43636
43699
  path,
43637
43700
  headers,
43638
- query,
43639
43701
  body,
43702
+ userAgent: client._options.userAgent,
43640
43703
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43641
43704
  }, options);
43642
43705
  if (!requestRes.ok) {
@@ -43645,7 +43708,7 @@ async function $do4(client, request, options) {
43645
43708
  const req = requestRes.value;
43646
43709
  const doResult = await client._do(req, {
43647
43710
  context,
43648
- errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
43711
+ errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
43649
43712
  retryConfig: context.retryConfig,
43650
43713
  retryCodes: context.retryCodes
43651
43714
  });
@@ -43656,49 +43719,42 @@ async function $do4(client, request, options) {
43656
43719
  const responseFields = {
43657
43720
  HttpMeta: { Response: response, Request: req }
43658
43721
  };
43659
- const [result] = await match(json(200, SupportArticle$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43722
+ const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43660
43723
  if (!result.ok) {
43661
43724
  return [result, { status: "complete", request: req, response }];
43662
43725
  }
43663
43726
  return [result, { status: "complete", request: req, response }];
43664
43727
  }
43665
- var init_supportArticlesGetSupportArticle = __esm(() => {
43728
+ var init_dataRequestsUpdateDataRequest = __esm(() => {
43729
+ init_esm();
43666
43730
  init_encodings();
43667
43731
  init_matchers();
43668
43732
  init_primitives();
43669
43733
  init_schemas();
43670
43734
  init_security();
43671
43735
  init_url();
43672
- init_components();
43673
43736
  init_errors2();
43674
43737
  init_operations();
43675
43738
  init_async();
43676
43739
  });
43677
43740
 
43678
- // src/mcp-server/tools/supportArticlesGetSupportArticle.ts
43679
- var args4, tool$supportArticlesGetSupportArticle;
43680
- var init_supportArticlesGetSupportArticle2 = __esm(() => {
43681
- init_supportArticlesGetSupportArticle();
43741
+ // src/mcp-server/tools/dataRequestsUpdateDataRequest.ts
43742
+ var args4, tool$dataRequestsUpdateDataRequest;
43743
+ var init_dataRequestsUpdateDataRequest2 = __esm(() => {
43744
+ init_dataRequestsUpdateDataRequest();
43682
43745
  init_operations();
43683
43746
  init_tools();
43684
43747
  args4 = {
43685
- request: GetSupportArticleRequest$inboundSchema
43748
+ request: UpdateDataRequestRequest$inboundSchema
43686
43749
  };
43687
- tool$supportArticlesGetSupportArticle = {
43688
- name: "support-articles-get-support-article",
43689
- description: `Get support article
43690
-
43691
- Retrieve an individual support article.
43692
-
43693
- Available \`expand\` scopes are:
43750
+ tool$dataRequestsUpdateDataRequest = {
43751
+ name: "data-requests-update-data-request",
43752
+ description: `Update vendor credential data request
43694
43753
 
43695
- - support_article.description
43696
- - support_article.published
43697
- - support_article.notes
43698
- - support_article.support_category`,
43754
+ It will update the vendor credential data request attributes`,
43699
43755
  args: args4,
43700
43756
  tool: async (client, args5, ctx) => {
43701
- const [result, apiCall] = await supportArticlesGetSupportArticle(client, args5.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43757
+ const [result, apiCall] = await dataRequestsUpdateDataRequest(client, args5.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43702
43758
  if (!result.ok) {
43703
43759
  return {
43704
43760
  content: [{ type: "text", text: result.error.message }],
@@ -43711,34 +43767,33 @@ Available \`expand\` scopes are:
43711
43767
  };
43712
43768
  });
43713
43769
 
43714
- // src/funcs/supportArticlesListOrSearchSupportArticles.ts
43715
- function supportArticlesListOrSearchSupportArticles(client, request, options) {
43770
+ // src/funcs/organizationsGetFacility.ts
43771
+ function organizationsGetFacility(client, request, options) {
43716
43772
  return new APIPromise($do5(client, request, options));
43717
43773
  }
43718
43774
  async function $do5(client, request, options) {
43719
- const parsed = safeParse(request, (value) => ListOrSearchSupportArticlesRequest$outboundSchema.parse(value), "Input validation failed");
43775
+ const parsed = safeParse(request, (value) => GetFacilityRequest$outboundSchema.parse(value), "Input validation failed");
43720
43776
  if (!parsed.ok) {
43721
- return [haltIterator(parsed), { status: "invalid" }];
43777
+ return [parsed, { status: "invalid" }];
43722
43778
  }
43723
43779
  const payload = parsed.value;
43724
43780
  const body = null;
43725
- const path = pathToFunc("/support_articles")();
43726
- const query = encodeFormQuery({
43727
- category: payload.category,
43728
- desc: payload.desc,
43729
- items_per_page: payload.items_per_page,
43730
- page: payload.page,
43731
- search: payload.search,
43732
- sort: payload.sort
43733
- });
43781
+ const pathParams = {
43782
+ id: encodeSimple("id", payload.id, {
43783
+ explode: false,
43784
+ charEncoding: "percent"
43785
+ })
43786
+ };
43787
+ const path = pathToFunc("/facilities/{id}")(pathParams);
43734
43788
  const headers = new Headers(compactMap({
43735
43789
  Accept: "application/json"
43736
43790
  }));
43737
43791
  const securityInput = await extractSecurity(client._options.security);
43738
43792
  const requestSecurity = resolveGlobalSecurity(securityInput);
43739
43793
  const context = {
43794
+ options: client._options,
43740
43795
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43741
- operationID: "listOrSearchSupportArticles",
43796
+ operationID: "getFacility",
43742
43797
  oAuth2Scopes: [],
43743
43798
  resolvedSecurity: requestSecurity,
43744
43799
  securitySource: client._options.security,
@@ -43751,36 +43806,427 @@ async function $do5(client, request, options) {
43751
43806
  baseURL: options?.serverURL,
43752
43807
  path,
43753
43808
  headers,
43754
- query,
43755
43809
  body,
43810
+ userAgent: client._options.userAgent,
43756
43811
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43757
43812
  }, options);
43758
43813
  if (!requestRes.ok) {
43759
- return [haltIterator(requestRes), { status: "invalid" }];
43814
+ return [requestRes, { status: "invalid" }];
43760
43815
  }
43761
43816
  const req = requestRes.value;
43762
43817
  const doResult = await client._do(req, {
43763
43818
  context,
43764
- errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
43819
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
43765
43820
  retryConfig: context.retryConfig,
43766
43821
  retryCodes: context.retryCodes
43767
43822
  });
43768
43823
  if (!doResult.ok) {
43769
- return [haltIterator(doResult), { status: "request-error", request: req }];
43824
+ return [doResult, { status: "request-error", request: req }];
43770
43825
  }
43771
43826
  const response = doResult.value;
43772
43827
  const responseFields = {
43773
43828
  HttpMeta: { Response: response, Request: req }
43774
43829
  };
43775
- const [result, raw] = await match(json(200, ListOrSearchSupportArticlesResponse$inboundSchema, {
43776
- key: "Result"
43777
- }), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43830
+ const [result] = await match(json(200, Facility$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43778
43831
  if (!result.ok) {
43779
- return [haltIterator(result), {
43780
- status: "complete",
43781
- request: req,
43782
- response
43783
- }];
43832
+ return [result, { status: "complete", request: req, response }];
43833
+ }
43834
+ return [result, { status: "complete", request: req, response }];
43835
+ }
43836
+ var init_organizationsGetFacility = __esm(() => {
43837
+ init_encodings();
43838
+ init_matchers();
43839
+ init_primitives();
43840
+ init_schemas();
43841
+ init_security();
43842
+ init_url();
43843
+ init_components();
43844
+ init_errors2();
43845
+ init_operations();
43846
+ init_async();
43847
+ });
43848
+
43849
+ // src/mcp-server/tools/organizationsGetFacility.ts
43850
+ var args5, tool$organizationsGetFacility;
43851
+ var init_organizationsGetFacility2 = __esm(() => {
43852
+ init_organizationsGetFacility();
43853
+ init_operations();
43854
+ init_tools();
43855
+ args5 = {
43856
+ request: GetFacilityRequest$inboundSchema
43857
+ };
43858
+ tool$organizationsGetFacility = {
43859
+ name: "organizations-get-facility",
43860
+ description: `Get facility
43861
+
43862
+ Retrieve an individual facility.`,
43863
+ args: args5,
43864
+ tool: async (client, args6, ctx) => {
43865
+ const [result, apiCall] = await organizationsGetFacility(client, args6.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43866
+ if (!result.ok) {
43867
+ return {
43868
+ content: [{ type: "text", text: result.error.message }],
43869
+ isError: true
43870
+ };
43871
+ }
43872
+ const value = result.value;
43873
+ return formatResult(value, apiCall);
43874
+ }
43875
+ };
43876
+ });
43877
+
43878
+ // src/funcs/organizationsListOrSearchFacilities.ts
43879
+ function organizationsListOrSearchFacilities(client, request, options) {
43880
+ return new APIPromise($do6(client, request, options));
43881
+ }
43882
+ async function $do6(client, request, options) {
43883
+ const parsed = safeParse(request, (value) => ListOrSearchFacilitiesRequest$outboundSchema.parse(value), "Input validation failed");
43884
+ if (!parsed.ok) {
43885
+ return [haltIterator(parsed), { status: "invalid" }];
43886
+ }
43887
+ const payload = parsed.value;
43888
+ const body = null;
43889
+ const path = pathToFunc("/facilities")();
43890
+ const query = queryJoin(encodeFormQuery({
43891
+ expand: payload.expand
43892
+ }, { explode: false }), encodeFormQuery({
43893
+ active_status: payload.active_status,
43894
+ desc: payload.desc,
43895
+ items_per_page: payload.items_per_page,
43896
+ latitude: payload.latitude,
43897
+ longitude: payload.longitude,
43898
+ name_like: payload.name_like,
43899
+ page: payload.page,
43900
+ sort: payload.sort,
43901
+ state_like: payload.state_like,
43902
+ system_id: payload.system_id
43903
+ }));
43904
+ const headers = new Headers(compactMap({
43905
+ Accept: "application/json"
43906
+ }));
43907
+ const securityInput = await extractSecurity(client._options.security);
43908
+ const requestSecurity = resolveGlobalSecurity(securityInput);
43909
+ const context = {
43910
+ options: client._options,
43911
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
43912
+ operationID: "listOrSearchFacilities",
43913
+ oAuth2Scopes: [],
43914
+ resolvedSecurity: requestSecurity,
43915
+ securitySource: client._options.security,
43916
+ retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
43917
+ retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
43918
+ };
43919
+ const requestRes = client._createRequest(context, {
43920
+ security: requestSecurity,
43921
+ method: "GET",
43922
+ baseURL: options?.serverURL,
43923
+ path,
43924
+ headers,
43925
+ query,
43926
+ body,
43927
+ userAgent: client._options.userAgent,
43928
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43929
+ }, options);
43930
+ if (!requestRes.ok) {
43931
+ return [haltIterator(requestRes), { status: "invalid" }];
43932
+ }
43933
+ const req = requestRes.value;
43934
+ const doResult = await client._do(req, {
43935
+ context,
43936
+ errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
43937
+ retryConfig: context.retryConfig,
43938
+ retryCodes: context.retryCodes
43939
+ });
43940
+ if (!doResult.ok) {
43941
+ return [haltIterator(doResult), { status: "request-error", request: req }];
43942
+ }
43943
+ const response = doResult.value;
43944
+ const responseFields = {
43945
+ HttpMeta: { Response: response, Request: req }
43946
+ };
43947
+ const [result, raw] = await match(json(200, ListOrSearchFacilitiesResponse$inboundSchema, {
43948
+ key: "Result"
43949
+ }), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
43950
+ if (!result.ok) {
43951
+ return [haltIterator(result), {
43952
+ status: "complete",
43953
+ request: req,
43954
+ response
43955
+ }];
43956
+ }
43957
+ const nextFunc = (responseData) => {
43958
+ const page2 = request?.page ?? 1;
43959
+ const nextPage = page2 + 1;
43960
+ if (!responseData) {
43961
+ return { next: () => null };
43962
+ }
43963
+ const results = dlv(responseData, "items");
43964
+ if (!Array.isArray(results) || !results.length) {
43965
+ return { next: () => null };
43966
+ }
43967
+ const limit = request?.itemsPerPage ?? 0;
43968
+ if (results.length < limit) {
43969
+ return { next: () => null };
43970
+ }
43971
+ const nextVal = () => organizationsListOrSearchFacilities(client, {
43972
+ ...request,
43973
+ page: nextPage
43974
+ }, options);
43975
+ return { next: nextVal, "~next": { page: nextPage } };
43976
+ };
43977
+ const page = { ...result, ...nextFunc(raw) };
43978
+ return [{ ...page, ...createPageIterator(page, (v2) => !v2.ok) }, {
43979
+ status: "complete",
43980
+ request: req,
43981
+ response
43982
+ }];
43983
+ }
43984
+ var init_organizationsListOrSearchFacilities = __esm(() => {
43985
+ init_encodings();
43986
+ init_matchers();
43987
+ init_primitives();
43988
+ init_schemas();
43989
+ init_security();
43990
+ init_url();
43991
+ init_errors2();
43992
+ init_operations();
43993
+ init_async();
43994
+ init_operations2();
43995
+ });
43996
+
43997
+ // src/mcp-server/tools/organizationsListOrSearchFacilities.ts
43998
+ var args6, tool$organizationsListOrSearchFacilities;
43999
+ var init_organizationsListOrSearchFacilities2 = __esm(() => {
44000
+ init_organizationsListOrSearchFacilities();
44001
+ init_operations();
44002
+ init_tools();
44003
+ args6 = {
44004
+ request: ListOrSearchFacilitiesRequest$inboundSchema
44005
+ };
44006
+ tool$organizationsListOrSearchFacilities = {
44007
+ name: "organizations-list-or-search-facilities",
44008
+ description: `List or search facilities
44009
+
44010
+ List or search facilities.
44011
+
44012
+ Available \`expand\` scopes are:
44013
+
44014
+ - facility.appointment_policy
44015
+ - facility.contacts
44016
+ - facility.vendor_counts
44017
+ - facility.flu_credential
44018
+ - facility.scrubs_policy
44019
+ - facility.system
44020
+ - facility.vendor_guest_policy
44021
+ - facility.vendor_policy
44022
+ - facility.visitor_policy
44023
+ - facility.workflow`,
44024
+ args: args6,
44025
+ tool: async (client, args7, ctx) => {
44026
+ const [result, apiCall] = await organizationsListOrSearchFacilities(client, args7.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44027
+ if (!result.ok) {
44028
+ return {
44029
+ content: [{ type: "text", text: result.error.message }],
44030
+ isError: true
44031
+ };
44032
+ }
44033
+ const value = result.value.result;
44034
+ return formatResult(value, apiCall);
44035
+ }
44036
+ };
44037
+ });
44038
+
44039
+ // src/funcs/supportArticlesGetSupportArticle.ts
44040
+ function supportArticlesGetSupportArticle(client, request, options) {
44041
+ return new APIPromise($do7(client, request, options));
44042
+ }
44043
+ async function $do7(client, request, options) {
44044
+ const parsed = safeParse(request, (value) => GetSupportArticleRequest$outboundSchema.parse(value), "Input validation failed");
44045
+ if (!parsed.ok) {
44046
+ return [parsed, { status: "invalid" }];
44047
+ }
44048
+ const payload = parsed.value;
44049
+ const body = null;
44050
+ const pathParams = {
44051
+ id: encodeSimple("id", payload.id, {
44052
+ explode: false,
44053
+ charEncoding: "percent"
44054
+ })
44055
+ };
44056
+ const path = pathToFunc("/support_articles/{id}")(pathParams);
44057
+ const query = encodeFormQuery({
44058
+ expand: payload.expand
44059
+ }, { explode: false });
44060
+ const headers = new Headers(compactMap({
44061
+ Accept: "application/json"
44062
+ }));
44063
+ const securityInput = await extractSecurity(client._options.security);
44064
+ const requestSecurity = resolveGlobalSecurity(securityInput);
44065
+ const context = {
44066
+ options: client._options,
44067
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
44068
+ operationID: "getSupportArticle",
44069
+ oAuth2Scopes: [],
44070
+ resolvedSecurity: requestSecurity,
44071
+ securitySource: client._options.security,
44072
+ retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
44073
+ retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
44074
+ };
44075
+ const requestRes = client._createRequest(context, {
44076
+ security: requestSecurity,
44077
+ method: "GET",
44078
+ baseURL: options?.serverURL,
44079
+ path,
44080
+ headers,
44081
+ query,
44082
+ body,
44083
+ userAgent: client._options.userAgent,
44084
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44085
+ }, options);
44086
+ if (!requestRes.ok) {
44087
+ return [requestRes, { status: "invalid" }];
44088
+ }
44089
+ const req = requestRes.value;
44090
+ const doResult = await client._do(req, {
44091
+ context,
44092
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
44093
+ retryConfig: context.retryConfig,
44094
+ retryCodes: context.retryCodes
44095
+ });
44096
+ if (!doResult.ok) {
44097
+ return [doResult, { status: "request-error", request: req }];
44098
+ }
44099
+ const response = doResult.value;
44100
+ const responseFields = {
44101
+ HttpMeta: { Response: response, Request: req }
44102
+ };
44103
+ const [result] = await match(json(200, SupportArticle$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44104
+ if (!result.ok) {
44105
+ return [result, { status: "complete", request: req, response }];
44106
+ }
44107
+ return [result, { status: "complete", request: req, response }];
44108
+ }
44109
+ var init_supportArticlesGetSupportArticle = __esm(() => {
44110
+ init_encodings();
44111
+ init_matchers();
44112
+ init_primitives();
44113
+ init_schemas();
44114
+ init_security();
44115
+ init_url();
44116
+ init_components();
44117
+ init_errors2();
44118
+ init_operations();
44119
+ init_async();
44120
+ });
44121
+
44122
+ // src/mcp-server/tools/supportArticlesGetSupportArticle.ts
44123
+ var args7, tool$supportArticlesGetSupportArticle;
44124
+ var init_supportArticlesGetSupportArticle2 = __esm(() => {
44125
+ init_supportArticlesGetSupportArticle();
44126
+ init_operations();
44127
+ init_tools();
44128
+ args7 = {
44129
+ request: GetSupportArticleRequest$inboundSchema
44130
+ };
44131
+ tool$supportArticlesGetSupportArticle = {
44132
+ name: "support-articles-get-support-article",
44133
+ description: `Get support article
44134
+
44135
+ Retrieve an individual support article.
44136
+
44137
+ Available \`expand\` scopes are:
44138
+
44139
+ - support_article.description
44140
+ - support_article.published
44141
+ - support_article.notes
44142
+ - support_article.support_category`,
44143
+ args: args7,
44144
+ tool: async (client, args8, ctx) => {
44145
+ const [result, apiCall] = await supportArticlesGetSupportArticle(client, args8.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44146
+ if (!result.ok) {
44147
+ return {
44148
+ content: [{ type: "text", text: result.error.message }],
44149
+ isError: true
44150
+ };
44151
+ }
44152
+ const value = result.value;
44153
+ return formatResult(value, apiCall);
44154
+ }
44155
+ };
44156
+ });
44157
+
44158
+ // src/funcs/supportArticlesListOrSearchSupportArticles.ts
44159
+ function supportArticlesListOrSearchSupportArticles(client, request, options) {
44160
+ return new APIPromise($do8(client, request, options));
44161
+ }
44162
+ async function $do8(client, request, options) {
44163
+ const parsed = safeParse(request, (value) => ListOrSearchSupportArticlesRequest$outboundSchema.parse(value), "Input validation failed");
44164
+ if (!parsed.ok) {
44165
+ return [haltIterator(parsed), { status: "invalid" }];
44166
+ }
44167
+ const payload = parsed.value;
44168
+ const body = null;
44169
+ const path = pathToFunc("/support_articles")();
44170
+ const query = encodeFormQuery({
44171
+ category: payload.category,
44172
+ desc: payload.desc,
44173
+ items_per_page: payload.items_per_page,
44174
+ page: payload.page,
44175
+ search: payload.search,
44176
+ sort: payload.sort
44177
+ });
44178
+ const headers = new Headers(compactMap({
44179
+ Accept: "application/json"
44180
+ }));
44181
+ const securityInput = await extractSecurity(client._options.security);
44182
+ const requestSecurity = resolveGlobalSecurity(securityInput);
44183
+ const context = {
44184
+ options: client._options,
44185
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
44186
+ operationID: "listOrSearchSupportArticles",
44187
+ oAuth2Scopes: [],
44188
+ resolvedSecurity: requestSecurity,
44189
+ securitySource: client._options.security,
44190
+ retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
44191
+ retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
44192
+ };
44193
+ const requestRes = client._createRequest(context, {
44194
+ security: requestSecurity,
44195
+ method: "GET",
44196
+ baseURL: options?.serverURL,
44197
+ path,
44198
+ headers,
44199
+ query,
44200
+ body,
44201
+ userAgent: client._options.userAgent,
44202
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44203
+ }, options);
44204
+ if (!requestRes.ok) {
44205
+ return [haltIterator(requestRes), { status: "invalid" }];
44206
+ }
44207
+ const req = requestRes.value;
44208
+ const doResult = await client._do(req, {
44209
+ context,
44210
+ errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
44211
+ retryConfig: context.retryConfig,
44212
+ retryCodes: context.retryCodes
44213
+ });
44214
+ if (!doResult.ok) {
44215
+ return [haltIterator(doResult), { status: "request-error", request: req }];
44216
+ }
44217
+ const response = doResult.value;
44218
+ const responseFields = {
44219
+ HttpMeta: { Response: response, Request: req }
44220
+ };
44221
+ const [result, raw] = await match(json(200, ListOrSearchSupportArticlesResponse$inboundSchema, {
44222
+ key: "Result"
44223
+ }), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
44224
+ if (!result.ok) {
44225
+ return [haltIterator(result), {
44226
+ status: "complete",
44227
+ request: req,
44228
+ response
44229
+ }];
43784
44230
  }
43785
44231
  const nextFunc = (responseData) => {
43786
44232
  const page2 = request?.page ?? 1;
@@ -43823,12 +44269,12 @@ var init_supportArticlesListOrSearchSupportArticles = __esm(() => {
43823
44269
  });
43824
44270
 
43825
44271
  // src/mcp-server/tools/supportArticlesListOrSearchSupportArticles.ts
43826
- var args5, tool$supportArticlesListOrSearchSupportArticles;
44272
+ var args8, tool$supportArticlesListOrSearchSupportArticles;
43827
44273
  var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
43828
44274
  init_supportArticlesListOrSearchSupportArticles();
43829
44275
  init_operations();
43830
44276
  init_tools();
43831
- args5 = {
44277
+ args8 = {
43832
44278
  request: ListOrSearchSupportArticlesRequest$inboundSchema
43833
44279
  };
43834
44280
  tool$supportArticlesListOrSearchSupportArticles = {
@@ -43836,9 +44282,9 @@ var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
43836
44282
  description: `List or search support articles
43837
44283
 
43838
44284
  List or search support articles for FAQ.`,
43839
- args: args5,
43840
- tool: async (client, args6, ctx) => {
43841
- const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client, args6.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44285
+ args: args8,
44286
+ tool: async (client, args9, ctx) => {
44287
+ const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client, args9.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43842
44288
  if (!result.ok) {
43843
44289
  return {
43844
44290
  content: [{ type: "text", text: result.error.message }],
@@ -43853,9 +44299,9 @@ List or search support articles for FAQ.`,
43853
44299
 
43854
44300
  // src/funcs/usersChangePassword.ts
43855
44301
  function usersChangePassword(client, request, options) {
43856
- return new APIPromise($do6(client, request, options));
44302
+ return new APIPromise($do9(client, request, options));
43857
44303
  }
43858
- async function $do6(client, request, options) {
44304
+ async function $do9(client, request, options) {
43859
44305
  const parsed = safeParse(request, (value) => ChangePasswordRequest$outboundSchema.parse(value), "Input validation failed");
43860
44306
  if (!parsed.ok) {
43861
44307
  return [parsed, { status: "invalid" }];
@@ -43876,6 +44322,7 @@ async function $do6(client, request, options) {
43876
44322
  const securityInput = await extractSecurity(client._options.security);
43877
44323
  const requestSecurity = resolveGlobalSecurity(securityInput);
43878
44324
  const context = {
44325
+ options: client._options,
43879
44326
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43880
44327
  operationID: "changePassword",
43881
44328
  oAuth2Scopes: [],
@@ -43891,6 +44338,7 @@ async function $do6(client, request, options) {
43891
44338
  path,
43892
44339
  headers,
43893
44340
  body,
44341
+ userAgent: client._options.userAgent,
43894
44342
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43895
44343
  }, options);
43896
44344
  if (!requestRes.ok) {
@@ -43929,12 +44377,12 @@ var init_usersChangePassword = __esm(() => {
43929
44377
  });
43930
44378
 
43931
44379
  // src/mcp-server/tools/usersChangePassword.ts
43932
- var args6, tool$usersChangePassword;
44380
+ var args9, tool$usersChangePassword;
43933
44381
  var init_usersChangePassword2 = __esm(() => {
43934
44382
  init_usersChangePassword();
43935
44383
  init_operations();
43936
44384
  init_tools();
43937
- args6 = {
44385
+ args9 = {
43938
44386
  request: ChangePasswordRequest$inboundSchema
43939
44387
  };
43940
44388
  tool$usersChangePassword = {
@@ -43942,9 +44390,9 @@ var init_usersChangePassword2 = __esm(() => {
43942
44390
  description: `Change password
43943
44391
 
43944
44392
  Change the user's password to the new passed as parameter`,
43945
- args: args6,
43946
- tool: async (client, args7, ctx) => {
43947
- const [result, apiCall] = await usersChangePassword(client, args7.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44393
+ args: args9,
44394
+ tool: async (client, args10, ctx) => {
44395
+ const [result, apiCall] = await usersChangePassword(client, args10.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
43948
44396
  if (!result.ok) {
43949
44397
  return {
43950
44398
  content: [{ type: "text", text: result.error.message }],
@@ -43959,9 +44407,9 @@ Change the user's password to the new passed as parameter`,
43959
44407
 
43960
44408
  // src/funcs/usersGetCurrentUser.ts
43961
44409
  function usersGetCurrentUser(client, options) {
43962
- return new APIPromise($do7(client, options));
44410
+ return new APIPromise($do10(client, options));
43963
44411
  }
43964
- async function $do7(client, options) {
44412
+ async function $do10(client, options) {
43965
44413
  const path = pathToFunc("/users/me")();
43966
44414
  const headers = new Headers(compactMap({
43967
44415
  Accept: "application/json"
@@ -43969,6 +44417,7 @@ async function $do7(client, options) {
43969
44417
  const securityInput = await extractSecurity(client._options.security);
43970
44418
  const requestSecurity = resolveGlobalSecurity(securityInput);
43971
44419
  const context = {
44420
+ options: client._options,
43972
44421
  baseURL: options?.serverURL ?? client._baseURL ?? "",
43973
44422
  operationID: "getCurrentUser",
43974
44423
  oAuth2Scopes: [],
@@ -43983,6 +44432,7 @@ async function $do7(client, options) {
43983
44432
  baseURL: options?.serverURL,
43984
44433
  path,
43985
44434
  headers,
44435
+ userAgent: client._options.userAgent,
43986
44436
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
43987
44437
  }, options);
43988
44438
  if (!requestRes.ok) {
@@ -44044,9 +44494,9 @@ Returns a user object for the user represented by the authorization token`,
44044
44494
 
44045
44495
  // src/funcs/usersGetUserById.ts
44046
44496
  function usersGetUserById(client, request, options) {
44047
- return new APIPromise($do8(client, request, options));
44497
+ return new APIPromise($do11(client, request, options));
44048
44498
  }
44049
- async function $do8(client, request, options) {
44499
+ async function $do11(client, request, options) {
44050
44500
  const parsed = safeParse(request, (value) => GetUserByIdRequest$outboundSchema.parse(value), "Input validation failed");
44051
44501
  if (!parsed.ok) {
44052
44502
  return [parsed, { status: "invalid" }];
@@ -44066,6 +44516,7 @@ async function $do8(client, request, options) {
44066
44516
  const securityInput = await extractSecurity(client._options.security);
44067
44517
  const requestSecurity = resolveGlobalSecurity(securityInput);
44068
44518
  const context = {
44519
+ options: client._options,
44069
44520
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44070
44521
  operationID: "getUserById",
44071
44522
  oAuth2Scopes: [],
@@ -44081,6 +44532,7 @@ async function $do8(client, request, options) {
44081
44532
  path,
44082
44533
  headers,
44083
44534
  body,
44535
+ userAgent: client._options.userAgent,
44084
44536
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44085
44537
  }, options);
44086
44538
  if (!requestRes.ok) {
@@ -44120,12 +44572,12 @@ var init_usersGetUserById = __esm(() => {
44120
44572
  });
44121
44573
 
44122
44574
  // src/mcp-server/tools/usersGetUserById.ts
44123
- var args7, tool$usersGetUserById;
44575
+ var args10, tool$usersGetUserById;
44124
44576
  var init_usersGetUserById2 = __esm(() => {
44125
44577
  init_usersGetUserById();
44126
44578
  init_operations();
44127
44579
  init_tools();
44128
- args7 = {
44580
+ args10 = {
44129
44581
  request: GetUserByIdRequest$inboundSchema
44130
44582
  };
44131
44583
  tool$usersGetUserById = {
@@ -44133,9 +44585,9 @@ var init_usersGetUserById2 = __esm(() => {
44133
44585
  description: `Get user by id
44134
44586
 
44135
44587
  Returns a user object for the user represented by the identifier in the path.`,
44136
- args: args7,
44137
- tool: async (client, args8, ctx) => {
44138
- const [result, apiCall] = await usersGetUserById(client, args8.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44588
+ args: args10,
44589
+ tool: async (client, args11, ctx) => {
44590
+ const [result, apiCall] = await usersGetUserById(client, args11.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44139
44591
  if (!result.ok) {
44140
44592
  return {
44141
44593
  content: [{ type: "text", text: result.error.message }],
@@ -44150,9 +44602,9 @@ Returns a user object for the user represented by the identifier in the path.`,
44150
44602
 
44151
44603
  // src/funcs/usersMagiclink.ts
44152
44604
  function usersMagiclink(client, request, options) {
44153
- return new APIPromise($do9(client, request, options));
44605
+ return new APIPromise($do12(client, request, options));
44154
44606
  }
44155
- async function $do9(client, request, options) {
44607
+ async function $do12(client, request, options) {
44156
44608
  const parsed = safeParse(request, (value) => MagiclinkRequestBody$outboundSchema.parse(value), "Input validation failed");
44157
44609
  if (!parsed.ok) {
44158
44610
  return [parsed, { status: "invalid" }];
@@ -44167,6 +44619,7 @@ async function $do9(client, request, options) {
44167
44619
  const securityInput = await extractSecurity(client._options.security);
44168
44620
  const requestSecurity = resolveGlobalSecurity(securityInput);
44169
44621
  const context = {
44622
+ options: client._options,
44170
44623
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44171
44624
  operationID: "magiclink",
44172
44625
  oAuth2Scopes: [],
@@ -44182,6 +44635,7 @@ async function $do9(client, request, options) {
44182
44635
  path,
44183
44636
  headers,
44184
44637
  body,
44638
+ userAgent: client._options.userAgent,
44185
44639
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44186
44640
  }, options);
44187
44641
  if (!requestRes.ok) {
@@ -44220,12 +44674,12 @@ var init_usersMagiclink = __esm(() => {
44220
44674
  });
44221
44675
 
44222
44676
  // src/mcp-server/tools/usersMagiclink.ts
44223
- var args8, tool$usersMagiclink;
44677
+ var args11, tool$usersMagiclink;
44224
44678
  var init_usersMagiclink2 = __esm(() => {
44225
44679
  init_usersMagiclink();
44226
44680
  init_operations();
44227
44681
  init_tools();
44228
- args8 = {
44682
+ args11 = {
44229
44683
  request: MagiclinkRequestBody$inboundSchema
44230
44684
  };
44231
44685
  tool$usersMagiclink = {
@@ -44233,9 +44687,9 @@ var init_usersMagiclink2 = __esm(() => {
44233
44687
  description: `Magic link
44234
44688
 
44235
44689
  It sends an email with a magic link to allow the user to log in.`,
44236
- args: args8,
44237
- tool: async (client, args9, ctx) => {
44238
- const [result, apiCall] = await usersMagiclink(client, args9.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44690
+ args: args11,
44691
+ tool: async (client, args12, ctx) => {
44692
+ const [result, apiCall] = await usersMagiclink(client, args12.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44239
44693
  if (!result.ok) {
44240
44694
  return {
44241
44695
  content: [{ type: "text", text: result.error.message }],
@@ -44250,9 +44704,9 @@ It sends an email with a magic link to allow the user to log in.`,
44250
44704
 
44251
44705
  // src/funcs/usersPassword.ts
44252
44706
  function usersPassword(client, request, options) {
44253
- return new APIPromise($do10(client, request, options));
44707
+ return new APIPromise($do13(client, request, options));
44254
44708
  }
44255
- async function $do10(client, request, options) {
44709
+ async function $do13(client, request, options) {
44256
44710
  const parsed = safeParse(request, (value) => PasswordRequestBody$outboundSchema.parse(value), "Input validation failed");
44257
44711
  if (!parsed.ok) {
44258
44712
  return [parsed, { status: "invalid" }];
@@ -44267,6 +44721,7 @@ async function $do10(client, request, options) {
44267
44721
  const securityInput = await extractSecurity(client._options.security);
44268
44722
  const requestSecurity = resolveGlobalSecurity(securityInput);
44269
44723
  const context = {
44724
+ options: client._options,
44270
44725
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44271
44726
  operationID: "password",
44272
44727
  oAuth2Scopes: [],
@@ -44282,6 +44737,7 @@ async function $do10(client, request, options) {
44282
44737
  path,
44283
44738
  headers,
44284
44739
  body,
44740
+ userAgent: client._options.userAgent,
44285
44741
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44286
44742
  }, options);
44287
44743
  if (!requestRes.ok) {
@@ -44320,12 +44776,12 @@ var init_usersPassword = __esm(() => {
44320
44776
  });
44321
44777
 
44322
44778
  // src/mcp-server/tools/usersPassword.ts
44323
- var args9, tool$usersPassword;
44779
+ var args12, tool$usersPassword;
44324
44780
  var init_usersPassword2 = __esm(() => {
44325
44781
  init_usersPassword();
44326
44782
  init_operations();
44327
44783
  init_tools();
44328
- args9 = {
44784
+ args12 = {
44329
44785
  request: PasswordRequestBody$inboundSchema
44330
44786
  };
44331
44787
  tool$usersPassword = {
@@ -44334,9 +44790,9 @@ var init_usersPassword2 = __esm(() => {
44334
44790
 
44335
44791
  Resets the a user's password using a password_reset_id that was sent to them via email.
44336
44792
  See /users/passwordresetrequest to initiate a password reset flow.`,
44337
- args: args9,
44338
- tool: async (client, args10, ctx) => {
44339
- const [result, apiCall] = await usersPassword(client, args10.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44793
+ args: args12,
44794
+ tool: async (client, args13, ctx) => {
44795
+ const [result, apiCall] = await usersPassword(client, args13.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44340
44796
  if (!result.ok) {
44341
44797
  return {
44342
44798
  content: [{ type: "text", text: result.error.message }],
@@ -44351,9 +44807,9 @@ See /users/passwordresetrequest to initiate a password reset flow.`,
44351
44807
 
44352
44808
  // src/funcs/usersPasswordResetRequest.ts
44353
44809
  function usersPasswordResetRequest(client, request, options) {
44354
- return new APIPromise($do11(client, request, options));
44810
+ return new APIPromise($do14(client, request, options));
44355
44811
  }
44356
- async function $do11(client, request, options) {
44812
+ async function $do14(client, request, options) {
44357
44813
  const parsed = safeParse(request, (value) => PasswordResetRequestRequestBody$outboundSchema.parse(value), "Input validation failed");
44358
44814
  if (!parsed.ok) {
44359
44815
  return [parsed, { status: "invalid" }];
@@ -44368,6 +44824,7 @@ async function $do11(client, request, options) {
44368
44824
  const securityInput = await extractSecurity(client._options.security);
44369
44825
  const requestSecurity = resolveGlobalSecurity(securityInput);
44370
44826
  const context = {
44827
+ options: client._options,
44371
44828
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44372
44829
  operationID: "passwordResetRequest",
44373
44830
  oAuth2Scopes: [],
@@ -44383,6 +44840,7 @@ async function $do11(client, request, options) {
44383
44840
  path,
44384
44841
  headers,
44385
44842
  body,
44843
+ userAgent: client._options.userAgent,
44386
44844
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44387
44845
  }, options);
44388
44846
  if (!requestRes.ok) {
@@ -44421,12 +44879,12 @@ var init_usersPasswordResetRequest = __esm(() => {
44421
44879
  });
44422
44880
 
44423
44881
  // src/mcp-server/tools/usersPasswordResetRequest.ts
44424
- var args10, tool$usersPasswordResetRequest;
44882
+ var args13, tool$usersPasswordResetRequest;
44425
44883
  var init_usersPasswordResetRequest2 = __esm(() => {
44426
44884
  init_usersPasswordResetRequest();
44427
44885
  init_operations();
44428
44886
  init_tools();
44429
- args10 = {
44887
+ args13 = {
44430
44888
  request: PasswordResetRequestRequestBody$inboundSchema
44431
44889
  };
44432
44890
  tool$usersPasswordResetRequest = {
@@ -44434,9 +44892,9 @@ var init_usersPasswordResetRequest2 = __esm(() => {
44434
44892
  description: `Password reset request
44435
44893
 
44436
44894
  It sends an email with a link for resetting a user's password.`,
44437
- args: args10,
44438
- tool: async (client, args11, ctx) => {
44439
- const [result, apiCall] = await usersPasswordResetRequest(client, args11.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44895
+ args: args13,
44896
+ tool: async (client, args14, ctx) => {
44897
+ const [result, apiCall] = await usersPasswordResetRequest(client, args14.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44440
44898
  if (!result.ok) {
44441
44899
  return {
44442
44900
  content: [{ type: "text", text: result.error.message }],
@@ -44451,9 +44909,9 @@ It sends an email with a link for resetting a user's password.`,
44451
44909
 
44452
44910
  // src/funcs/usersPostAuthenticate.ts
44453
44911
  function usersPostAuthenticate(client, request, options) {
44454
- return new APIPromise($do12(client, request, options));
44912
+ return new APIPromise($do15(client, request, options));
44455
44913
  }
44456
- async function $do12(client, request, options) {
44914
+ async function $do15(client, request, options) {
44457
44915
  const parsed = safeParse(request, (value) => PostAuthenticateRequestBody$outboundSchema.parse(value), "Input validation failed");
44458
44916
  if (!parsed.ok) {
44459
44917
  return [parsed, { status: "invalid" }];
@@ -44466,6 +44924,7 @@ async function $do12(client, request, options) {
44466
44924
  Accept: "application/json"
44467
44925
  }));
44468
44926
  const context = {
44927
+ options: client._options,
44469
44928
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44470
44929
  operationID: "postAuthenticate",
44471
44930
  oAuth2Scopes: [],
@@ -44480,6 +44939,7 @@ async function $do12(client, request, options) {
44480
44939
  path,
44481
44940
  headers,
44482
44941
  body,
44942
+ userAgent: client._options.userAgent,
44483
44943
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44484
44944
  }, options);
44485
44945
  if (!requestRes.ok) {
@@ -44517,12 +44977,12 @@ var init_usersPostAuthenticate = __esm(() => {
44517
44977
  });
44518
44978
 
44519
44979
  // src/mcp-server/tools/usersPostAuthenticate.ts
44520
- var args11, tool$usersPostAuthenticate;
44980
+ var args14, tool$usersPostAuthenticate;
44521
44981
  var init_usersPostAuthenticate2 = __esm(() => {
44522
44982
  init_usersPostAuthenticate();
44523
44983
  init_operations();
44524
44984
  init_tools();
44525
- args11 = {
44985
+ args14 = {
44526
44986
  request: PostAuthenticateRequestBody$inboundSchema
44527
44987
  };
44528
44988
  tool$usersPostAuthenticate = {
@@ -44560,9 +45020,9 @@ Requires: \`saml_login\`
44560
45020
  3. Site redirects to your selected \`return_url\`
44561
45021
  4. The \`user_token\` will be appended as a query string parameter to your \`return_url\` - you must parse this token and store it
44562
45022
  5. Fetch the user object from \`/users/me\` using the token`,
44563
- args: args11,
44564
- tool: async (client, args12, ctx) => {
44565
- const [result, apiCall] = await usersPostAuthenticate(client, args12.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45023
+ args: args14,
45024
+ tool: async (client, args15, ctx) => {
45025
+ const [result, apiCall] = await usersPostAuthenticate(client, args15.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44566
45026
  if (!result.ok) {
44567
45027
  return {
44568
45028
  content: [{ type: "text", text: result.error.message }],
@@ -44577,9 +45037,9 @@ Requires: \`saml_login\`
44577
45037
 
44578
45038
  // src/funcs/vendorsAddVendorCredentialFile.ts
44579
45039
  function vendorsAddVendorCredentialFile(client, request, options) {
44580
- return new APIPromise($do13(client, request, options));
45040
+ return new APIPromise($do16(client, request, options));
44581
45041
  }
44582
- async function $do13(client, request, options) {
45042
+ async function $do16(client, request, options) {
44583
45043
  const parsed = safeParse(request, (value) => AddVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
44584
45044
  if (!parsed.ok) {
44585
45045
  return [parsed, { status: "invalid" }];
@@ -44597,6 +45057,7 @@ async function $do13(client, request, options) {
44597
45057
  const securityInput = await extractSecurity(client._options.security);
44598
45058
  const requestSecurity = resolveGlobalSecurity(securityInput);
44599
45059
  const context = {
45060
+ options: client._options,
44600
45061
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44601
45062
  operationID: "addVendorCredentialFile",
44602
45063
  oAuth2Scopes: [],
@@ -44612,6 +45073,7 @@ async function $do13(client, request, options) {
44612
45073
  path,
44613
45074
  headers,
44614
45075
  body,
45076
+ userAgent: client._options.userAgent,
44615
45077
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44616
45078
  }, options);
44617
45079
  if (!requestRes.ok) {
@@ -44650,12 +45112,12 @@ var init_vendorsAddVendorCredentialFile = __esm(() => {
44650
45112
  });
44651
45113
 
44652
45114
  // src/mcp-server/tools/vendorsAddVendorCredentialFile.ts
44653
- var args12, tool$vendorsAddVendorCredentialFile;
45115
+ var args15, tool$vendorsAddVendorCredentialFile;
44654
45116
  var init_vendorsAddVendorCredentialFile2 = __esm(() => {
44655
45117
  init_vendorsAddVendorCredentialFile();
44656
45118
  init_operations();
44657
45119
  init_tools();
44658
- args12 = {
45120
+ args15 = {
44659
45121
  request: AddVendorCredentialFileRequest$inboundSchema
44660
45122
  };
44661
45123
  tool$vendorsAddVendorCredentialFile = {
@@ -44663,9 +45125,9 @@ var init_vendorsAddVendorCredentialFile2 = __esm(() => {
44663
45125
  description: `Add vendor credential file
44664
45126
 
44665
45127
  It will add a new vendor credential file`,
44666
- args: args12,
44667
- tool: async (client, args13, ctx) => {
44668
- const [result, apiCall] = await vendorsAddVendorCredentialFile(client, args13.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45128
+ args: args15,
45129
+ tool: async (client, args16, ctx) => {
45130
+ const [result, apiCall] = await vendorsAddVendorCredentialFile(client, args16.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44669
45131
  if (!result.ok) {
44670
45132
  return {
44671
45133
  content: [{ type: "text", text: result.error.message }],
@@ -44680,9 +45142,9 @@ It will add a new vendor credential file`,
44680
45142
 
44681
45143
  // src/funcs/vendorsAddVendorManagedByCompany.ts
44682
45144
  function vendorsAddVendorManagedByCompany(client, request, options) {
44683
- return new APIPromise($do14(client, request, options));
45145
+ return new APIPromise($do17(client, request, options));
44684
45146
  }
44685
- async function $do14(client, request, options) {
45147
+ async function $do17(client, request, options) {
44686
45148
  const parsed = safeParse(request, (value) => AddVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
44687
45149
  if (!parsed.ok) {
44688
45150
  return [parsed, { status: "invalid" }];
@@ -44703,6 +45165,7 @@ async function $do14(client, request, options) {
44703
45165
  const securityInput = await extractSecurity(client._options.security);
44704
45166
  const requestSecurity = resolveGlobalSecurity(securityInput);
44705
45167
  const context = {
45168
+ options: client._options,
44706
45169
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44707
45170
  operationID: "addVendorManagedByCompany",
44708
45171
  oAuth2Scopes: [],
@@ -44718,6 +45181,7 @@ async function $do14(client, request, options) {
44718
45181
  path,
44719
45182
  headers,
44720
45183
  body,
45184
+ userAgent: client._options.userAgent,
44721
45185
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44722
45186
  }, options);
44723
45187
  if (!requestRes.ok) {
@@ -44756,12 +45220,12 @@ var init_vendorsAddVendorManagedByCompany = __esm(() => {
44756
45220
  });
44757
45221
 
44758
45222
  // src/mcp-server/tools/vendorsAddVendorManagedByCompany.ts
44759
- var args13, tool$vendorsAddVendorManagedByCompany;
45223
+ var args16, tool$vendorsAddVendorManagedByCompany;
44760
45224
  var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
44761
45225
  init_vendorsAddVendorManagedByCompany();
44762
45226
  init_operations();
44763
45227
  init_tools();
44764
- args13 = {
45228
+ args16 = {
44765
45229
  request: AddVendorManagedByCompanyRequest$inboundSchema
44766
45230
  };
44767
45231
  tool$vendorsAddVendorManagedByCompany = {
@@ -44769,9 +45233,9 @@ var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
44769
45233
  description: `Add vendor managed by company
44770
45234
 
44771
45235
  It will add a vendor managed by company`,
44772
- args: args13,
44773
- tool: async (client, args14, ctx) => {
44774
- const [result, apiCall] = await vendorsAddVendorManagedByCompany(client, args14.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45236
+ args: args16,
45237
+ tool: async (client, args17, ctx) => {
45238
+ const [result, apiCall] = await vendorsAddVendorManagedByCompany(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44775
45239
  if (!result.ok) {
44776
45240
  return {
44777
45241
  content: [{ type: "text", text: result.error.message }],
@@ -44786,9 +45250,9 @@ It will add a vendor managed by company`,
44786
45250
 
44787
45251
  // src/funcs/vendorScansVendorScanOut.ts
44788
45252
  function vendorScansVendorScanOut(client, request, options) {
44789
- return new APIPromise($do15(client, request, options));
45253
+ return new APIPromise($do18(client, request, options));
44790
45254
  }
44791
- async function $do15(client, request, options) {
45255
+ async function $do18(client, request, options) {
44792
45256
  const parsed = safeParse(request, (value) => VendorScanOutRequest$outboundSchema.parse(value), "Input validation failed");
44793
45257
  if (!parsed.ok) {
44794
45258
  return [parsed, { status: "invalid" }];
@@ -44808,6 +45272,7 @@ async function $do15(client, request, options) {
44808
45272
  const securityInput = await extractSecurity(client._options.security);
44809
45273
  const requestSecurity = resolveGlobalSecurity(securityInput);
44810
45274
  const context = {
45275
+ options: client._options,
44811
45276
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44812
45277
  operationID: "vendorScanOut",
44813
45278
  oAuth2Scopes: [],
@@ -44823,6 +45288,7 @@ async function $do15(client, request, options) {
44823
45288
  path,
44824
45289
  headers,
44825
45290
  body,
45291
+ userAgent: client._options.userAgent,
44826
45292
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44827
45293
  }, options);
44828
45294
  if (!requestRes.ok) {
@@ -44861,12 +45327,12 @@ var init_vendorScansVendorScanOut = __esm(() => {
44861
45327
  });
44862
45328
 
44863
45329
  // src/mcp-server/tools/vendorScansVendorScanOut.ts
44864
- var args14, tool$vendorScansVendorScanOut;
45330
+ var args17, tool$vendorScansVendorScanOut;
44865
45331
  var init_vendorScansVendorScanOut2 = __esm(() => {
44866
45332
  init_vendorScansVendorScanOut();
44867
45333
  init_operations();
44868
45334
  init_tools();
44869
- args14 = {
45335
+ args17 = {
44870
45336
  request: VendorScanOutRequest$inboundSchema
44871
45337
  };
44872
45338
  tool$vendorScansVendorScanOut = {
@@ -44874,9 +45340,9 @@ var init_vendorScansVendorScanOut2 = __esm(() => {
44874
45340
  description: `Vendor scan out
44875
45341
 
44876
45342
  It scans out vendor from facility`,
44877
- args: args14,
44878
- tool: async (client, args15, ctx) => {
44879
- const [result, apiCall] = await vendorScansVendorScanOut(client, args15.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45343
+ args: args17,
45344
+ tool: async (client, args18, ctx) => {
45345
+ const [result, apiCall] = await vendorScansVendorScanOut(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44880
45346
  if (!result.ok) {
44881
45347
  return {
44882
45348
  content: [{ type: "text", text: result.error.message }],
@@ -44891,9 +45357,9 @@ It scans out vendor from facility`,
44891
45357
 
44892
45358
  // src/funcs/vendorsCreateNewVendorCredentialVersion.ts
44893
45359
  function vendorsCreateNewVendorCredentialVersion(client, request, options) {
44894
- return new APIPromise($do16(client, request, options));
45360
+ return new APIPromise($do19(client, request, options));
44895
45361
  }
44896
- async function $do16(client, request, options) {
45362
+ async function $do19(client, request, options) {
44897
45363
  const parsed = safeParse(request, (value) => CreateNewVendorCredentialVersionRequestBody$outboundSchema.parse(value), "Input validation failed");
44898
45364
  if (!parsed.ok) {
44899
45365
  return [parsed, { status: "invalid" }];
@@ -44908,6 +45374,7 @@ async function $do16(client, request, options) {
44908
45374
  const securityInput = await extractSecurity(client._options.security);
44909
45375
  const requestSecurity = resolveGlobalSecurity(securityInput);
44910
45376
  const context = {
45377
+ options: client._options,
44911
45378
  baseURL: options?.serverURL ?? client._baseURL ?? "",
44912
45379
  operationID: "createNewVendorCredentialVersion",
44913
45380
  oAuth2Scopes: [],
@@ -44923,6 +45390,7 @@ async function $do16(client, request, options) {
44923
45390
  path,
44924
45391
  headers,
44925
45392
  body,
45393
+ userAgent: client._options.userAgent,
44926
45394
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
44927
45395
  }, options);
44928
45396
  if (!requestRes.ok) {
@@ -44961,12 +45429,12 @@ var init_vendorsCreateNewVendorCredentialVersion = __esm(() => {
44961
45429
  });
44962
45430
 
44963
45431
  // src/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.ts
44964
- var args15, tool$vendorsCreateNewVendorCredentialVersion;
45432
+ var args18, tool$vendorsCreateNewVendorCredentialVersion;
44965
45433
  var init_vendorsCreateNewVendorCredentialVersion2 = __esm(() => {
44966
45434
  init_vendorsCreateNewVendorCredentialVersion();
44967
45435
  init_operations();
44968
45436
  init_tools();
44969
- args15 = {
45437
+ args18 = {
44970
45438
  request: CreateNewVendorCredentialVersionRequestBody$inboundSchema
44971
45439
  };
44972
45440
  tool$vendorsCreateNewVendorCredentialVersion = {
@@ -44974,9 +45442,9 @@ var init_vendorsCreateNewVendorCredentialVersion2 = __esm(() => {
44974
45442
  description: `Create new vendor credential version
44975
45443
 
44976
45444
  It will submit vendor credential`,
44977
- args: args15,
44978
- tool: async (client, args16, ctx) => {
44979
- const [result, apiCall] = await vendorsCreateNewVendorCredentialVersion(client, args16.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45445
+ args: args18,
45446
+ tool: async (client, args19, ctx) => {
45447
+ const [result, apiCall] = await vendorsCreateNewVendorCredentialVersion(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
44980
45448
  if (!result.ok) {
44981
45449
  return {
44982
45450
  content: [{ type: "text", text: result.error.message }],
@@ -44991,9 +45459,9 @@ It will submit vendor credential`,
44991
45459
 
44992
45460
  // src/funcs/vendorsCreateOrUpdateBcr.ts
44993
45461
  function vendorsCreateOrUpdateBcr(client, request, options) {
44994
- return new APIPromise($do17(client, request, options));
45462
+ return new APIPromise($do20(client, request, options));
44995
45463
  }
44996
- async function $do17(client, request, options) {
45464
+ async function $do20(client, request, options) {
44997
45465
  const parsed = safeParse(request, (value) => CreateOrUpdateBcrRequest$outboundSchema.parse(value), "Input validation failed");
44998
45466
  if (!parsed.ok) {
44999
45467
  return [parsed, { status: "invalid" }];
@@ -45011,6 +45479,7 @@ async function $do17(client, request, options) {
45011
45479
  const securityInput = await extractSecurity(client._options.security);
45012
45480
  const requestSecurity = resolveGlobalSecurity(securityInput);
45013
45481
  const context = {
45482
+ options: client._options,
45014
45483
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45015
45484
  operationID: "createOrUpdateBcr",
45016
45485
  oAuth2Scopes: [],
@@ -45026,6 +45495,7 @@ async function $do17(client, request, options) {
45026
45495
  path,
45027
45496
  headers,
45028
45497
  body,
45498
+ userAgent: client._options.userAgent,
45029
45499
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45030
45500
  }, options);
45031
45501
  if (!requestRes.ok) {
@@ -45065,12 +45535,12 @@ var init_vendorsCreateOrUpdateBcr = __esm(() => {
45065
45535
  });
45066
45536
 
45067
45537
  // src/mcp-server/tools/vendorsCreateOrUpdateBcr.ts
45068
- var args16, tool$vendorsCreateOrUpdateBcr;
45538
+ var args19, tool$vendorsCreateOrUpdateBcr;
45069
45539
  var init_vendorsCreateOrUpdateBcr2 = __esm(() => {
45070
45540
  init_vendorsCreateOrUpdateBcr();
45071
45541
  init_operations();
45072
45542
  init_tools();
45073
- args16 = {
45543
+ args19 = {
45074
45544
  request: CreateOrUpdateBcrRequest$inboundSchema
45075
45545
  };
45076
45546
  tool$vendorsCreateOrUpdateBcr = {
@@ -45078,9 +45548,9 @@ var init_vendorsCreateOrUpdateBcr2 = __esm(() => {
45078
45548
  description: `Create or update BackgroundCheckResults
45079
45549
 
45080
45550
  It will create or update BackgroundCheckResults`,
45081
- args: args16,
45082
- tool: async (client, args17, ctx) => {
45083
- const [result, apiCall] = await vendorsCreateOrUpdateBcr(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45551
+ args: args19,
45552
+ tool: async (client, args20, ctx) => {
45553
+ const [result, apiCall] = await vendorsCreateOrUpdateBcr(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45084
45554
  if (!result.ok) {
45085
45555
  return {
45086
45556
  content: [{ type: "text", text: result.error.message }],
@@ -45095,9 +45565,9 @@ It will create or update BackgroundCheckResults`,
45095
45565
 
45096
45566
  // src/funcs/vendorsCreateVendorCompany.ts
45097
45567
  function vendorsCreateVendorCompany(client, request, options) {
45098
- return new APIPromise($do18(client, request, options));
45568
+ return new APIPromise($do21(client, request, options));
45099
45569
  }
45100
- async function $do18(client, request, options) {
45570
+ async function $do21(client, request, options) {
45101
45571
  const parsed = safeParse(request, (value) => CreateVendorCompanyRequest$outboundSchema.parse(value), "Input validation failed");
45102
45572
  if (!parsed.ok) {
45103
45573
  return [parsed, { status: "invalid" }];
@@ -45118,6 +45588,7 @@ async function $do18(client, request, options) {
45118
45588
  const securityInput = await extractSecurity(client._options.security);
45119
45589
  const requestSecurity = resolveGlobalSecurity(securityInput);
45120
45590
  const context = {
45591
+ options: client._options,
45121
45592
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45122
45593
  operationID: "createVendorCompany",
45123
45594
  oAuth2Scopes: [],
@@ -45133,6 +45604,7 @@ async function $do18(client, request, options) {
45133
45604
  path,
45134
45605
  headers,
45135
45606
  body,
45607
+ userAgent: client._options.userAgent,
45136
45608
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45137
45609
  }, options);
45138
45610
  if (!requestRes.ok) {
@@ -45171,12 +45643,12 @@ var init_vendorsCreateVendorCompany = __esm(() => {
45171
45643
  });
45172
45644
 
45173
45645
  // src/mcp-server/tools/vendorsCreateVendorCompany.ts
45174
- var args17, tool$vendorsCreateVendorCompany;
45646
+ var args20, tool$vendorsCreateVendorCompany;
45175
45647
  var init_vendorsCreateVendorCompany2 = __esm(() => {
45176
45648
  init_vendorsCreateVendorCompany();
45177
45649
  init_operations();
45178
45650
  init_tools();
45179
- args17 = {
45651
+ args20 = {
45180
45652
  request: CreateVendorCompanyRequest$inboundSchema
45181
45653
  };
45182
45654
  tool$vendorsCreateVendorCompany = {
@@ -45184,9 +45656,9 @@ var init_vendorsCreateVendorCompany2 = __esm(() => {
45184
45656
  description: `Create vendor company
45185
45657
 
45186
45658
  Create vendor company`,
45187
- args: args17,
45188
- tool: async (client, args18, ctx) => {
45189
- const [result, apiCall] = await vendorsCreateVendorCompany(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45659
+ args: args20,
45660
+ tool: async (client, args21, ctx) => {
45661
+ const [result, apiCall] = await vendorsCreateVendorCompany(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45190
45662
  if (!result.ok) {
45191
45663
  return {
45192
45664
  content: [{ type: "text", text: result.error.message }],
@@ -45201,9 +45673,9 @@ Create vendor company`,
45201
45673
 
45202
45674
  // src/funcs/vendorsCreateVendorRegistration.ts
45203
45675
  function vendorsCreateVendorRegistration(client, request, options) {
45204
- return new APIPromise($do19(client, request, options));
45676
+ return new APIPromise($do22(client, request, options));
45205
45677
  }
45206
- async function $do19(client, request, options) {
45678
+ async function $do22(client, request, options) {
45207
45679
  const parsed = safeParse(request, (value) => CreateVendorRegistrationRequestBody$outboundSchema.parse(value), "Input validation failed");
45208
45680
  if (!parsed.ok) {
45209
45681
  return [parsed, { status: "invalid" }];
@@ -45216,6 +45688,7 @@ async function $do19(client, request, options) {
45216
45688
  Accept: "application/json"
45217
45689
  }));
45218
45690
  const context = {
45691
+ options: client._options,
45219
45692
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45220
45693
  operationID: "createVendorRegistration",
45221
45694
  oAuth2Scopes: [],
@@ -45230,6 +45703,7 @@ async function $do19(client, request, options) {
45230
45703
  path,
45231
45704
  headers,
45232
45705
  body,
45706
+ userAgent: client._options.userAgent,
45233
45707
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45234
45708
  }, options);
45235
45709
  if (!requestRes.ok) {
@@ -45268,12 +45742,12 @@ var init_vendorsCreateVendorRegistration = __esm(() => {
45268
45742
  });
45269
45743
 
45270
45744
  // src/mcp-server/tools/vendorsCreateVendorRegistration.ts
45271
- var args18, tool$vendorsCreateVendorRegistration;
45745
+ var args21, tool$vendorsCreateVendorRegistration;
45272
45746
  var init_vendorsCreateVendorRegistration2 = __esm(() => {
45273
45747
  init_vendorsCreateVendorRegistration();
45274
45748
  init_operations();
45275
45749
  init_tools();
45276
- args18 = {
45750
+ args21 = {
45277
45751
  request: CreateVendorRegistrationRequestBody$inboundSchema
45278
45752
  };
45279
45753
  tool$vendorsCreateVendorRegistration = {
@@ -45281,9 +45755,9 @@ var init_vendorsCreateVendorRegistration2 = __esm(() => {
45281
45755
  description: `Create vendor registration
45282
45756
 
45283
45757
  Create an initial vendor registration. Once successful, the vendor will be able to continue to filling out the rest of their onboarding profile.`,
45284
- args: args18,
45285
- tool: async (client, args19, ctx) => {
45286
- const [result, apiCall] = await vendorsCreateVendorRegistration(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45758
+ args: args21,
45759
+ tool: async (client, args22, ctx) => {
45760
+ const [result, apiCall] = await vendorsCreateVendorRegistration(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45287
45761
  if (!result.ok) {
45288
45762
  return {
45289
45763
  content: [{ type: "text", text: result.error.message }],
@@ -45298,9 +45772,9 @@ Create an initial vendor registration. Once successful, the vendor will be able
45298
45772
 
45299
45773
  // src/funcs/vendorsDeclineVendorCredential.ts
45300
45774
  function vendorsDeclineVendorCredential(client, request, options) {
45301
- return new APIPromise($do20(client, request, options));
45775
+ return new APIPromise($do23(client, request, options));
45302
45776
  }
45303
- async function $do20(client, request, options) {
45777
+ async function $do23(client, request, options) {
45304
45778
  const parsed = safeParse(request, (value) => DeclineVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
45305
45779
  if (!parsed.ok) {
45306
45780
  return [parsed, { status: "invalid" }];
@@ -45317,6 +45791,7 @@ async function $do20(client, request, options) {
45317
45791
  const securityInput = await extractSecurity(client._options.security);
45318
45792
  const requestSecurity = resolveGlobalSecurity(securityInput);
45319
45793
  const context = {
45794
+ options: client._options,
45320
45795
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45321
45796
  operationID: "declineVendorCredential",
45322
45797
  oAuth2Scopes: [],
@@ -45332,6 +45807,7 @@ async function $do20(client, request, options) {
45332
45807
  path,
45333
45808
  headers,
45334
45809
  body,
45810
+ userAgent: client._options.userAgent,
45335
45811
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45336
45812
  }, options);
45337
45813
  if (!requestRes.ok) {
@@ -45371,12 +45847,12 @@ var init_vendorsDeclineVendorCredential = __esm(() => {
45371
45847
  });
45372
45848
 
45373
45849
  // src/mcp-server/tools/vendorsDeclineVendorCredential.ts
45374
- var args19, tool$vendorsDeclineVendorCredential;
45850
+ var args22, tool$vendorsDeclineVendorCredential;
45375
45851
  var init_vendorsDeclineVendorCredential2 = __esm(() => {
45376
45852
  init_vendorsDeclineVendorCredential();
45377
45853
  init_operations();
45378
45854
  init_tools();
45379
- args19 = {
45855
+ args22 = {
45380
45856
  request: DeclineVendorCredentialRequest$inboundSchema
45381
45857
  };
45382
45858
  tool$vendorsDeclineVendorCredential = {
@@ -45384,9 +45860,9 @@ var init_vendorsDeclineVendorCredential2 = __esm(() => {
45384
45860
  description: `Decline vendor credential
45385
45861
 
45386
45862
  It will decline vendor credential`,
45387
- args: args19,
45388
- tool: async (client, args20, ctx) => {
45389
- const [result, apiCall] = await vendorsDeclineVendorCredential(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45863
+ args: args22,
45864
+ tool: async (client, args23, ctx) => {
45865
+ const [result, apiCall] = await vendorsDeclineVendorCredential(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45390
45866
  if (!result.ok) {
45391
45867
  return {
45392
45868
  content: [{ type: "text", text: result.error.message }],
@@ -45401,9 +45877,9 @@ It will decline vendor credential`,
45401
45877
 
45402
45878
  // src/funcs/vendorsDeleteVendorCredentialFile.ts
45403
45879
  function vendorsDeleteVendorCredentialFile(client, request, options) {
45404
- return new APIPromise($do21(client, request, options));
45880
+ return new APIPromise($do24(client, request, options));
45405
45881
  }
45406
- async function $do21(client, request, options) {
45882
+ async function $do24(client, request, options) {
45407
45883
  const parsed = safeParse(request, (value) => DeleteVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
45408
45884
  if (!parsed.ok) {
45409
45885
  return [parsed, { status: "invalid" }];
@@ -45424,6 +45900,7 @@ async function $do21(client, request, options) {
45424
45900
  const securityInput = await extractSecurity(client._options.security);
45425
45901
  const requestSecurity = resolveGlobalSecurity(securityInput);
45426
45902
  const context = {
45903
+ options: client._options,
45427
45904
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45428
45905
  operationID: "deleteVendorCredentialFile",
45429
45906
  oAuth2Scopes: [],
@@ -45439,6 +45916,7 @@ async function $do21(client, request, options) {
45439
45916
  path,
45440
45917
  headers,
45441
45918
  body,
45919
+ userAgent: client._options.userAgent,
45442
45920
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45443
45921
  }, options);
45444
45922
  if (!requestRes.ok) {
@@ -45478,12 +45956,12 @@ var init_vendorsDeleteVendorCredentialFile = __esm(() => {
45478
45956
  });
45479
45957
 
45480
45958
  // src/mcp-server/tools/vendorsDeleteVendorCredentialFile.ts
45481
- var args20, tool$vendorsDeleteVendorCredentialFile;
45959
+ var args23, tool$vendorsDeleteVendorCredentialFile;
45482
45960
  var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
45483
45961
  init_vendorsDeleteVendorCredentialFile();
45484
45962
  init_operations();
45485
45963
  init_tools();
45486
- args20 = {
45964
+ args23 = {
45487
45965
  request: DeleteVendorCredentialFileRequest$inboundSchema
45488
45966
  };
45489
45967
  tool$vendorsDeleteVendorCredentialFile = {
@@ -45491,9 +45969,9 @@ var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
45491
45969
  description: `Delete vendor credential file
45492
45970
 
45493
45971
  It will delete the vendor credential file`,
45494
- args: args20,
45495
- tool: async (client, args21, ctx) => {
45496
- const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45972
+ args: args23,
45973
+ tool: async (client, args24, ctx) => {
45974
+ const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45497
45975
  if (!result.ok) {
45498
45976
  return {
45499
45977
  content: [{ type: "text", text: result.error.message }],
@@ -45508,9 +45986,9 @@ It will delete the vendor credential file`,
45508
45986
 
45509
45987
  // src/funcs/vendorsDeleteVendorManagedByCompany.ts
45510
45988
  function vendorsDeleteVendorManagedByCompany(client, request, options) {
45511
- return new APIPromise($do22(client, request, options));
45989
+ return new APIPromise($do25(client, request, options));
45512
45990
  }
45513
- async function $do22(client, request, options) {
45991
+ async function $do25(client, request, options) {
45514
45992
  const parsed = safeParse(request, (value) => DeleteVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
45515
45993
  if (!parsed.ok) {
45516
45994
  return [parsed, { status: "invalid" }];
@@ -45531,6 +46009,7 @@ async function $do22(client, request, options) {
45531
46009
  const securityInput = await extractSecurity(client._options.security);
45532
46010
  const requestSecurity = resolveGlobalSecurity(securityInput);
45533
46011
  const context = {
46012
+ options: client._options,
45534
46013
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45535
46014
  operationID: "deleteVendorManagedByCompany",
45536
46015
  oAuth2Scopes: [],
@@ -45546,6 +46025,7 @@ async function $do22(client, request, options) {
45546
46025
  path,
45547
46026
  headers,
45548
46027
  body,
46028
+ userAgent: client._options.userAgent,
45549
46029
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45550
46030
  }, options);
45551
46031
  if (!requestRes.ok) {
@@ -45584,12 +46064,12 @@ var init_vendorsDeleteVendorManagedByCompany = __esm(() => {
45584
46064
  });
45585
46065
 
45586
46066
  // src/mcp-server/tools/vendorsDeleteVendorManagedByCompany.ts
45587
- var args21, tool$vendorsDeleteVendorManagedByCompany;
46067
+ var args24, tool$vendorsDeleteVendorManagedByCompany;
45588
46068
  var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
45589
46069
  init_vendorsDeleteVendorManagedByCompany();
45590
46070
  init_operations();
45591
46071
  init_tools();
45592
- args21 = {
46072
+ args24 = {
45593
46073
  request: DeleteVendorManagedByCompanyRequest$inboundSchema
45594
46074
  };
45595
46075
  tool$vendorsDeleteVendorManagedByCompany = {
@@ -45597,9 +46077,9 @@ var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
45597
46077
  description: `Delete vendor managed by company
45598
46078
 
45599
46079
  It will delete the vendor managed by company`,
45600
- args: args21,
45601
- tool: async (client, args22, ctx) => {
45602
- const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46080
+ args: args24,
46081
+ tool: async (client, args25, ctx) => {
46082
+ const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45603
46083
  if (!result.ok) {
45604
46084
  return {
45605
46085
  content: [{ type: "text", text: result.error.message }],
@@ -45614,9 +46094,9 @@ It will delete the vendor managed by company`,
45614
46094
 
45615
46095
  // src/funcs/vendorsExpediteTimeRemaining.ts
45616
46096
  function vendorsExpediteTimeRemaining(client, request, options) {
45617
- return new APIPromise($do23(client, request, options));
46097
+ return new APIPromise($do26(client, request, options));
45618
46098
  }
45619
- async function $do23(client, request, options) {
46099
+ async function $do26(client, request, options) {
45620
46100
  const parsed = safeParse(request, (value) => ExpediteTimeRemainingRequest$outboundSchema.parse(value), "Input validation failed");
45621
46101
  if (!parsed.ok) {
45622
46102
  return [parsed, { status: "invalid" }];
@@ -45636,6 +46116,7 @@ async function $do23(client, request, options) {
45636
46116
  const securityInput = await extractSecurity(client._options.security);
45637
46117
  const requestSecurity = resolveGlobalSecurity(securityInput);
45638
46118
  const context = {
46119
+ options: client._options,
45639
46120
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45640
46121
  operationID: "expediteTimeRemaining",
45641
46122
  oAuth2Scopes: [],
@@ -45651,6 +46132,7 @@ async function $do23(client, request, options) {
45651
46132
  path,
45652
46133
  headers,
45653
46134
  body,
46135
+ userAgent: client._options.userAgent,
45654
46136
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45655
46137
  }, options);
45656
46138
  if (!requestRes.ok) {
@@ -45689,12 +46171,12 @@ var init_vendorsExpediteTimeRemaining = __esm(() => {
45689
46171
  });
45690
46172
 
45691
46173
  // src/mcp-server/tools/vendorsExpediteTimeRemaining.ts
45692
- var args22, tool$vendorsExpediteTimeRemaining;
46174
+ var args25, tool$vendorsExpediteTimeRemaining;
45693
46175
  var init_vendorsExpediteTimeRemaining2 = __esm(() => {
45694
46176
  init_vendorsExpediteTimeRemaining();
45695
46177
  init_operations();
45696
46178
  init_tools();
45697
- args22 = {
46179
+ args25 = {
45698
46180
  request: ExpediteTimeRemainingRequest$inboundSchema
45699
46181
  };
45700
46182
  tool$vendorsExpediteTimeRemaining = {
@@ -45702,9 +46184,9 @@ var init_vendorsExpediteTimeRemaining2 = __esm(() => {
45702
46184
  description: `Expedite time remaining
45703
46185
 
45704
46186
  For vendors who have a paid 24-hour expedite credentials invoice, get the remaining time (in seconds) for which submitted credentials will be expedited.`,
45705
- args: args22,
45706
- tool: async (client, args23, ctx) => {
45707
- const [result, apiCall] = await vendorsExpediteTimeRemaining(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46187
+ args: args25,
46188
+ tool: async (client, args26, ctx) => {
46189
+ const [result, apiCall] = await vendorsExpediteTimeRemaining(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45708
46190
  if (!result.ok) {
45709
46191
  return {
45710
46192
  content: [{ type: "text", text: result.error.message }],
@@ -45719,9 +46201,9 @@ For vendors who have a paid 24-hour expedite credentials invoice, get the remain
45719
46201
 
45720
46202
  // src/funcs/vendorsGetVendorCredentialDetails.ts
45721
46203
  function vendorsGetVendorCredentialDetails(client, request, options) {
45722
- return new APIPromise($do24(client, request, options));
46204
+ return new APIPromise($do27(client, request, options));
45723
46205
  }
45724
- async function $do24(client, request, options) {
46206
+ async function $do27(client, request, options) {
45725
46207
  const parsed = safeParse(request, (value) => GetVendorCredentialDetailsRequest$outboundSchema.parse(value), "Input validation failed");
45726
46208
  if (!parsed.ok) {
45727
46209
  return [parsed, { status: "invalid" }];
@@ -45748,6 +46230,7 @@ async function $do24(client, request, options) {
45748
46230
  const securityInput = await extractSecurity(client._options.security);
45749
46231
  const requestSecurity = resolveGlobalSecurity(securityInput);
45750
46232
  const context = {
46233
+ options: client._options,
45751
46234
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45752
46235
  operationID: "getVendorCredentialDetails",
45753
46236
  oAuth2Scopes: [],
@@ -45764,6 +46247,7 @@ async function $do24(client, request, options) {
45764
46247
  headers,
45765
46248
  query,
45766
46249
  body,
46250
+ userAgent: client._options.userAgent,
45767
46251
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45768
46252
  }, options);
45769
46253
  if (!requestRes.ok) {
@@ -45802,12 +46286,12 @@ var init_vendorsGetVendorCredentialDetails = __esm(() => {
45802
46286
  });
45803
46287
 
45804
46288
  // src/mcp-server/tools/vendorsGetVendorCredentialDetails.ts
45805
- var args23, tool$vendorsGetVendorCredentialDetails;
46289
+ var args26, tool$vendorsGetVendorCredentialDetails;
45806
46290
  var init_vendorsGetVendorCredentialDetails2 = __esm(() => {
45807
46291
  init_vendorsGetVendorCredentialDetails();
45808
46292
  init_operations();
45809
46293
  init_tools();
45810
- args23 = {
46294
+ args26 = {
45811
46295
  request: GetVendorCredentialDetailsRequest$inboundSchema
45812
46296
  };
45813
46297
  tool$vendorsGetVendorCredentialDetails = {
@@ -45832,9 +46316,9 @@ Available \`expand\` scopes are:
45832
46316
  - vendor_credential.vendor_credential_data_requests
45833
46317
  - vendor_credential.credential_variants
45834
46318
  - vendor_credential.targets_chop`,
45835
- args: args23,
45836
- tool: async (client, args24, ctx) => {
45837
- const [result, apiCall] = await vendorsGetVendorCredentialDetails(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46319
+ args: args26,
46320
+ tool: async (client, args27, ctx) => {
46321
+ const [result, apiCall] = await vendorsGetVendorCredentialDetails(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45838
46322
  if (!result.ok) {
45839
46323
  return {
45840
46324
  content: [{ type: "text", text: result.error.message }],
@@ -45849,9 +46333,9 @@ Available \`expand\` scopes are:
45849
46333
 
45850
46334
  // src/funcs/vendorsGetVendorCredentialFile.ts
45851
46335
  function vendorsGetVendorCredentialFile(client, request, options) {
45852
- return new APIPromise($do25(client, request, options));
46336
+ return new APIPromise($do28(client, request, options));
45853
46337
  }
45854
- async function $do25(client, request, options) {
46338
+ async function $do28(client, request, options) {
45855
46339
  const parsed = safeParse(request, (value) => GetVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
45856
46340
  if (!parsed.ok) {
45857
46341
  return [parsed, { status: "invalid" }];
@@ -45875,6 +46359,7 @@ async function $do25(client, request, options) {
45875
46359
  const securityInput = await extractSecurity(client._options.security);
45876
46360
  const requestSecurity = resolveGlobalSecurity(securityInput);
45877
46361
  const context = {
46362
+ options: client._options,
45878
46363
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45879
46364
  operationID: "getVendorCredentialFile",
45880
46365
  oAuth2Scopes: [],
@@ -45891,6 +46376,7 @@ async function $do25(client, request, options) {
45891
46376
  headers,
45892
46377
  query,
45893
46378
  body,
46379
+ userAgent: client._options.userAgent,
45894
46380
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
45895
46381
  }, options);
45896
46382
  if (!requestRes.ok) {
@@ -45930,12 +46416,12 @@ var init_vendorsGetVendorCredentialFile = __esm(() => {
45930
46416
  });
45931
46417
 
45932
46418
  // src/mcp-server/tools/vendorsGetVendorCredentialFile.ts
45933
- var args24, tool$vendorsGetVendorCredentialFile;
46419
+ var args27, tool$vendorsGetVendorCredentialFile;
45934
46420
  var init_vendorsGetVendorCredentialFile2 = __esm(() => {
45935
46421
  init_vendorsGetVendorCredentialFile();
45936
46422
  init_operations();
45937
46423
  init_tools();
45938
- args24 = {
46424
+ args27 = {
45939
46425
  request: GetVendorCredentialFileRequest$inboundSchema
45940
46426
  };
45941
46427
  tool$vendorsGetVendorCredentialFile = {
@@ -45948,9 +46434,9 @@ Available \`expand\` scopes are:
45948
46434
 
45949
46435
  - vendor_credential_file.vendor_credential
45950
46436
  - vendor_credential_file.credential_document`,
45951
- args: args24,
45952
- tool: async (client, args25, ctx) => {
45953
- const [result, apiCall] = await vendorsGetVendorCredentialFile(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46437
+ args: args27,
46438
+ tool: async (client, args28, ctx) => {
46439
+ const [result, apiCall] = await vendorsGetVendorCredentialFile(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
45954
46440
  if (!result.ok) {
45955
46441
  return {
45956
46442
  content: [{ type: "text", text: result.error.message }],
@@ -45965,9 +46451,9 @@ Available \`expand\` scopes are:
45965
46451
 
45966
46452
  // src/funcs/vendorsGetVendorInvoiceDetails.ts
45967
46453
  function vendorsGetVendorInvoiceDetails(client, request, options) {
45968
- return new APIPromise($do26(client, request, options));
46454
+ return new APIPromise($do29(client, request, options));
45969
46455
  }
45970
- async function $do26(client, request, options) {
46456
+ async function $do29(client, request, options) {
45971
46457
  const parsed = safeParse(request, (value) => GetVendorInvoiceDetailsRequest$outboundSchema.parse(value), "Input validation failed");
45972
46458
  if (!parsed.ok) {
45973
46459
  return [parsed, { status: "invalid" }];
@@ -45990,6 +46476,7 @@ async function $do26(client, request, options) {
45990
46476
  const securityInput = await extractSecurity(client._options.security);
45991
46477
  const requestSecurity = resolveGlobalSecurity(securityInput);
45992
46478
  const context = {
46479
+ options: client._options,
45993
46480
  baseURL: options?.serverURL ?? client._baseURL ?? "",
45994
46481
  operationID: "getVendorInvoiceDetails",
45995
46482
  oAuth2Scopes: [],
@@ -46006,6 +46493,7 @@ async function $do26(client, request, options) {
46006
46493
  headers,
46007
46494
  query,
46008
46495
  body,
46496
+ userAgent: client._options.userAgent,
46009
46497
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46010
46498
  }, options);
46011
46499
  if (!requestRes.ok) {
@@ -46045,12 +46533,12 @@ var init_vendorsGetVendorInvoiceDetails = __esm(() => {
46045
46533
  });
46046
46534
 
46047
46535
  // src/mcp-server/tools/vendorsGetVendorInvoiceDetails.ts
46048
- var args25, tool$vendorsGetVendorInvoiceDetails;
46536
+ var args28, tool$vendorsGetVendorInvoiceDetails;
46049
46537
  var init_vendorsGetVendorInvoiceDetails2 = __esm(() => {
46050
46538
  init_vendorsGetVendorInvoiceDetails();
46051
46539
  init_operations();
46052
46540
  init_tools();
46053
- args25 = {
46541
+ args28 = {
46054
46542
  request: GetVendorInvoiceDetailsRequest$inboundSchema
46055
46543
  };
46056
46544
  tool$vendorsGetVendorInvoiceDetails = {
@@ -46063,9 +46551,9 @@ Available \`expand\` scopes are:
46063
46551
 
46064
46552
  invoice.line_items
46065
46553
  invoice.invoice_transactions`,
46066
- args: args25,
46067
- tool: async (client, args26, ctx) => {
46068
- const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46554
+ args: args28,
46555
+ tool: async (client, args29, ctx) => {
46556
+ const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46069
46557
  if (!result.ok) {
46070
46558
  return {
46071
46559
  content: [{ type: "text", text: result.error.message }],
@@ -46080,9 +46568,9 @@ invoice.invoice_transactions`,
46080
46568
 
46081
46569
  // src/funcs/vendorsGetVendorLegalName.ts
46082
46570
  function vendorsGetVendorLegalName(client, request, options) {
46083
- return new APIPromise($do27(client, request, options));
46571
+ return new APIPromise($do30(client, request, options));
46084
46572
  }
46085
- async function $do27(client, request, options) {
46573
+ async function $do30(client, request, options) {
46086
46574
  const parsed = safeParse(request, (value) => GetVendorLegalNameRequest$outboundSchema.parse(value), "Input validation failed");
46087
46575
  if (!parsed.ok) {
46088
46576
  return [parsed, { status: "invalid" }];
@@ -46102,6 +46590,7 @@ async function $do27(client, request, options) {
46102
46590
  const securityInput = await extractSecurity(client._options.security);
46103
46591
  const requestSecurity = resolveGlobalSecurity(securityInput);
46104
46592
  const context = {
46593
+ options: client._options,
46105
46594
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46106
46595
  operationID: "getVendorLegalName",
46107
46596
  oAuth2Scopes: [],
@@ -46117,6 +46606,7 @@ async function $do27(client, request, options) {
46117
46606
  path,
46118
46607
  headers,
46119
46608
  body,
46609
+ userAgent: client._options.userAgent,
46120
46610
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46121
46611
  }, options);
46122
46612
  if (!requestRes.ok) {
@@ -46155,12 +46645,12 @@ var init_vendorsGetVendorLegalName = __esm(() => {
46155
46645
  });
46156
46646
 
46157
46647
  // src/mcp-server/tools/vendorsGetVendorLegalName.ts
46158
- var args26, tool$vendorsGetVendorLegalName;
46648
+ var args29, tool$vendorsGetVendorLegalName;
46159
46649
  var init_vendorsGetVendorLegalName2 = __esm(() => {
46160
46650
  init_vendorsGetVendorLegalName();
46161
46651
  init_operations();
46162
46652
  init_tools();
46163
- args26 = {
46653
+ args29 = {
46164
46654
  request: GetVendorLegalNameRequest$inboundSchema
46165
46655
  };
46166
46656
  tool$vendorsGetVendorLegalName = {
@@ -46168,9 +46658,9 @@ var init_vendorsGetVendorLegalName2 = __esm(() => {
46168
46658
  description: `Get Vendor legal name
46169
46659
 
46170
46660
  Get vendor legal name`,
46171
- args: args26,
46172
- tool: async (client, args27, ctx) => {
46173
- const [result, apiCall] = await vendorsGetVendorLegalName(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46661
+ args: args29,
46662
+ tool: async (client, args30, ctx) => {
46663
+ const [result, apiCall] = await vendorsGetVendorLegalName(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46174
46664
  if (!result.ok) {
46175
46665
  return {
46176
46666
  content: [{ type: "text", text: result.error.message }],
@@ -46185,9 +46675,9 @@ Get vendor legal name`,
46185
46675
 
46186
46676
  // src/funcs/vendorsGetVendorsDetails.ts
46187
46677
  function vendorsGetVendorsDetails(client, request, options) {
46188
- return new APIPromise($do28(client, request, options));
46678
+ return new APIPromise($do31(client, request, options));
46189
46679
  }
46190
- async function $do28(client, request, options) {
46680
+ async function $do31(client, request, options) {
46191
46681
  const parsed = safeParse(request, (value) => GetVendorsDetailsRequest$outboundSchema.parse(value), "Input validation failed");
46192
46682
  if (!parsed.ok) {
46193
46683
  return [parsed, { status: "invalid" }];
@@ -46210,6 +46700,7 @@ async function $do28(client, request, options) {
46210
46700
  const securityInput = await extractSecurity(client._options.security);
46211
46701
  const requestSecurity = resolveGlobalSecurity(securityInput);
46212
46702
  const context = {
46703
+ options: client._options,
46213
46704
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46214
46705
  operationID: "getVendorsDetails",
46215
46706
  oAuth2Scopes: [],
@@ -46226,6 +46717,7 @@ async function $do28(client, request, options) {
46226
46717
  headers,
46227
46718
  query,
46228
46719
  body,
46720
+ userAgent: client._options.userAgent,
46229
46721
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46230
46722
  }, options);
46231
46723
  if (!requestRes.ok) {
@@ -46265,12 +46757,12 @@ var init_vendorsGetVendorsDetails = __esm(() => {
46265
46757
  });
46266
46758
 
46267
46759
  // src/mcp-server/tools/vendorsGetVendorsDetails.ts
46268
- var args27, tool$vendorsGetVendorsDetails;
46760
+ var args30, tool$vendorsGetVendorsDetails;
46269
46761
  var init_vendorsGetVendorsDetails2 = __esm(() => {
46270
46762
  init_vendorsGetVendorsDetails();
46271
46763
  init_operations();
46272
46764
  init_tools();
46273
- args27 = {
46765
+ args30 = {
46274
46766
  request: GetVendorsDetailsRequest$inboundSchema
46275
46767
  };
46276
46768
  tool$vendorsGetVendorsDetails = {
@@ -46295,9 +46787,9 @@ vendor.payment_responsibility
46295
46787
  vendor.background_check_date_expires
46296
46788
  vendor.registration_data
46297
46789
  vendor.registration_finished`,
46298
- args: args27,
46299
- tool: async (client, args28, ctx) => {
46300
- const [result, apiCall] = await vendorsGetVendorsDetails(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46790
+ args: args30,
46791
+ tool: async (client, args31, ctx) => {
46792
+ const [result, apiCall] = await vendorsGetVendorsDetails(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46301
46793
  if (!result.ok) {
46302
46794
  return {
46303
46795
  content: [{ type: "text", text: result.error.message }],
@@ -46312,9 +46804,9 @@ vendor.registration_finished`,
46312
46804
 
46313
46805
  // src/funcs/vendorsListVendorAdditionalFacilityFields.ts
46314
46806
  function vendorsListVendorAdditionalFacilityFields(client, request, options) {
46315
- return new APIPromise($do29(client, request, options));
46807
+ return new APIPromise($do32(client, request, options));
46316
46808
  }
46317
- async function $do29(client, request, options) {
46809
+ async function $do32(client, request, options) {
46318
46810
  const parsed = safeParse(request, (value) => ListVendorAdditionalFacilityFieldsRequest$outboundSchema.parse(value), "Input validation failed");
46319
46811
  if (!parsed.ok) {
46320
46812
  return [haltIterator(parsed), { status: "invalid" }];
@@ -46340,6 +46832,7 @@ async function $do29(client, request, options) {
46340
46832
  const securityInput = await extractSecurity(client._options.security);
46341
46833
  const requestSecurity = resolveGlobalSecurity(securityInput);
46342
46834
  const context = {
46835
+ options: client._options,
46343
46836
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46344
46837
  operationID: "listVendorAdditionalFacilityFields",
46345
46838
  oAuth2Scopes: [],
@@ -46356,6 +46849,7 @@ async function $do29(client, request, options) {
46356
46849
  headers,
46357
46850
  query,
46358
46851
  body,
46852
+ userAgent: client._options.userAgent,
46359
46853
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46360
46854
  }, options);
46361
46855
  if (!requestRes.ok) {
@@ -46424,12 +46918,12 @@ var init_vendorsListVendorAdditionalFacilityFields = __esm(() => {
46424
46918
  });
46425
46919
 
46426
46920
  // src/mcp-server/tools/vendorsListVendorAdditionalFacilityFields.ts
46427
- var args28, tool$vendorsListVendorAdditionalFacilityFields;
46921
+ var args31, tool$vendorsListVendorAdditionalFacilityFields;
46428
46922
  var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
46429
46923
  init_vendorsListVendorAdditionalFacilityFields();
46430
46924
  init_operations();
46431
46925
  init_tools();
46432
- args28 = {
46926
+ args31 = {
46433
46927
  request: ListVendorAdditionalFacilityFieldsRequest$inboundSchema
46434
46928
  };
46435
46929
  tool$vendorsListVendorAdditionalFacilityFields = {
@@ -46437,9 +46931,9 @@ var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
46437
46931
  description: `List of vendor's additional facility fields
46438
46932
 
46439
46933
  List of vendor's additional facility fields`,
46440
- args: args28,
46441
- tool: async (client, args29, ctx) => {
46442
- const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46934
+ args: args31,
46935
+ tool: async (client, args32, ctx) => {
46936
+ const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46443
46937
  if (!result.ok) {
46444
46938
  return {
46445
46939
  content: [{ type: "text", text: result.error.message }],
@@ -46454,9 +46948,9 @@ List of vendor's additional facility fields`,
46454
46948
 
46455
46949
  // src/funcs/vendorsListVendorCredentialDataRequests.ts
46456
46950
  function vendorsListVendorCredentialDataRequests(client, request, options) {
46457
- return new APIPromise($do30(client, request, options));
46951
+ return new APIPromise($do33(client, request, options));
46458
46952
  }
46459
- async function $do30(client, request, options) {
46953
+ async function $do33(client, request, options) {
46460
46954
  const parsed = safeParse(request, (value) => ListVendorCredentialDataRequestsRequest$outboundSchema.parse(value), "Input validation failed");
46461
46955
  if (!parsed.ok) {
46462
46956
  return [parsed, { status: "invalid" }];
@@ -46481,6 +46975,7 @@ async function $do30(client, request, options) {
46481
46975
  const securityInput = await extractSecurity(client._options.security);
46482
46976
  const requestSecurity = resolveGlobalSecurity(securityInput);
46483
46977
  const context = {
46978
+ options: client._options,
46484
46979
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46485
46980
  operationID: "listVendorCredentialDataRequests",
46486
46981
  oAuth2Scopes: [],
@@ -46497,6 +46992,7 @@ async function $do30(client, request, options) {
46497
46992
  headers,
46498
46993
  query,
46499
46994
  body,
46995
+ userAgent: client._options.userAgent,
46500
46996
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46501
46997
  }, options);
46502
46998
  if (!requestRes.ok) {
@@ -46537,12 +47033,12 @@ var init_vendorsListVendorCredentialDataRequests = __esm(() => {
46537
47033
  });
46538
47034
 
46539
47035
  // src/mcp-server/tools/vendorsListVendorCredentialDataRequests.ts
46540
- var args29, tool$vendorsListVendorCredentialDataRequests;
47036
+ var args32, tool$vendorsListVendorCredentialDataRequests;
46541
47037
  var init_vendorsListVendorCredentialDataRequests2 = __esm(() => {
46542
47038
  init_vendorsListVendorCredentialDataRequests();
46543
47039
  init_operations();
46544
47040
  init_tools();
46545
- args29 = {
47041
+ args32 = {
46546
47042
  request: ListVendorCredentialDataRequestsRequest$inboundSchema
46547
47043
  };
46548
47044
  tool$vendorsListVendorCredentialDataRequests = {
@@ -46555,9 +47051,9 @@ Available \`expand\` scopes are:
46555
47051
 
46556
47052
  - vendor_credential_data_request.vendor_credential
46557
47053
  - vendor_credential_data_request.data_request`,
46558
- args: args29,
46559
- tool: async (client, args30, ctx) => {
46560
- const [result, apiCall] = await vendorsListVendorCredentialDataRequests(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47054
+ args: args32,
47055
+ tool: async (client, args33, ctx) => {
47056
+ const [result, apiCall] = await vendorsListVendorCredentialDataRequests(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46561
47057
  if (!result.ok) {
46562
47058
  return {
46563
47059
  content: [{ type: "text", text: result.error.message }],
@@ -46572,9 +47068,9 @@ Available \`expand\` scopes are:
46572
47068
 
46573
47069
  // src/funcs/vendorsListVendorCredentialFiles.ts
46574
47070
  function vendorsListVendorCredentialFiles(client, request, options) {
46575
- return new APIPromise($do31(client, request, options));
47071
+ return new APIPromise($do34(client, request, options));
46576
47072
  }
46577
- async function $do31(client, request, options) {
47073
+ async function $do34(client, request, options) {
46578
47074
  const parsed = safeParse(request, (value) => ListVendorCredentialFilesRequest$outboundSchema.parse(value), "Input validation failed");
46579
47075
  if (!parsed.ok) {
46580
47076
  return [parsed, { status: "invalid" }];
@@ -46599,6 +47095,7 @@ async function $do31(client, request, options) {
46599
47095
  const securityInput = await extractSecurity(client._options.security);
46600
47096
  const requestSecurity = resolveGlobalSecurity(securityInput);
46601
47097
  const context = {
47098
+ options: client._options,
46602
47099
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46603
47100
  operationID: "listVendorCredentialFiles",
46604
47101
  oAuth2Scopes: [],
@@ -46615,6 +47112,7 @@ async function $do31(client, request, options) {
46615
47112
  headers,
46616
47113
  query,
46617
47114
  body,
47115
+ userAgent: client._options.userAgent,
46618
47116
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46619
47117
  }, options);
46620
47118
  if (!requestRes.ok) {
@@ -46655,12 +47153,12 @@ var init_vendorsListVendorCredentialFiles = __esm(() => {
46655
47153
  });
46656
47154
 
46657
47155
  // src/mcp-server/tools/vendorsListVendorCredentialFiles.ts
46658
- var args30, tool$vendorsListVendorCredentialFiles;
47156
+ var args33, tool$vendorsListVendorCredentialFiles;
46659
47157
  var init_vendorsListVendorCredentialFiles2 = __esm(() => {
46660
47158
  init_vendorsListVendorCredentialFiles();
46661
47159
  init_operations();
46662
47160
  init_tools();
46663
- args30 = {
47161
+ args33 = {
46664
47162
  request: ListVendorCredentialFilesRequest$inboundSchema
46665
47163
  };
46666
47164
  tool$vendorsListVendorCredentialFiles = {
@@ -46673,9 +47171,9 @@ Available \`expand\` scopes are:
46673
47171
 
46674
47172
  - vendor_credential_file.vendor_credential
46675
47173
  - vendor_credential_file.credential_document`,
46676
- args: args30,
46677
- tool: async (client, args31, ctx) => {
46678
- const [result, apiCall] = await vendorsListVendorCredentialFiles(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47174
+ args: args33,
47175
+ tool: async (client, args34, ctx) => {
47176
+ const [result, apiCall] = await vendorsListVendorCredentialFiles(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46679
47177
  if (!result.ok) {
46680
47178
  return {
46681
47179
  content: [{ type: "text", text: result.error.message }],
@@ -46690,9 +47188,9 @@ Available \`expand\` scopes are:
46690
47188
 
46691
47189
  // src/funcs/vendorsListVendorCredentialHistory.ts
46692
47190
  function vendorsListVendorCredentialHistory(client, request, options) {
46693
- return new APIPromise($do32(client, request, options));
47191
+ return new APIPromise($do35(client, request, options));
46694
47192
  }
46695
- async function $do32(client, request, options) {
47193
+ async function $do35(client, request, options) {
46696
47194
  const parsed = safeParse(request, (value) => ListVendorCredentialHistoryRequest$outboundSchema.parse(value), "Input validation failed");
46697
47195
  if (!parsed.ok) {
46698
47196
  return [haltIterator(parsed), { status: "invalid" }];
@@ -46719,6 +47217,7 @@ async function $do32(client, request, options) {
46719
47217
  const securityInput = await extractSecurity(client._options.security);
46720
47218
  const requestSecurity = resolveGlobalSecurity(securityInput);
46721
47219
  const context = {
47220
+ options: client._options,
46722
47221
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46723
47222
  operationID: "listVendorCredentialHistory",
46724
47223
  oAuth2Scopes: [],
@@ -46735,6 +47234,7 @@ async function $do32(client, request, options) {
46735
47234
  headers,
46736
47235
  query,
46737
47236
  body,
47237
+ userAgent: client._options.userAgent,
46738
47238
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46739
47239
  }, options);
46740
47240
  if (!requestRes.ok) {
@@ -46805,12 +47305,12 @@ var init_vendorsListVendorCredentialHistory = __esm(() => {
46805
47305
  });
46806
47306
 
46807
47307
  // src/mcp-server/tools/vendorsListVendorCredentialHistory.ts
46808
- var args31, tool$vendorsListVendorCredentialHistory;
47308
+ var args34, tool$vendorsListVendorCredentialHistory;
46809
47309
  var init_vendorsListVendorCredentialHistory2 = __esm(() => {
46810
47310
  init_vendorsListVendorCredentialHistory();
46811
47311
  init_operations();
46812
47312
  init_tools();
46813
- args31 = {
47313
+ args34 = {
46814
47314
  request: ListVendorCredentialHistoryRequest$inboundSchema
46815
47315
  };
46816
47316
  tool$vendorsListVendorCredentialHistory = {
@@ -46818,9 +47318,9 @@ var init_vendorsListVendorCredentialHistory2 = __esm(() => {
46818
47318
  description: `List Vendor Credential History
46819
47319
 
46820
47320
  Lists vendor credentials history`,
46821
- args: args31,
46822
- tool: async (client, args32, ctx) => {
46823
- const [result, apiCall] = await vendorsListVendorCredentialHistory(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47321
+ args: args34,
47322
+ tool: async (client, args35, ctx) => {
47323
+ const [result, apiCall] = await vendorsListVendorCredentialHistory(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46824
47324
  if (!result.ok) {
46825
47325
  return {
46826
47326
  content: [{ type: "text", text: result.error.message }],
@@ -46835,9 +47335,9 @@ Lists vendor credentials history`,
46835
47335
 
46836
47336
  // src/funcs/vendorsListVendorCredentials.ts
46837
47337
  function vendorsListVendorCredentials(client, request, options) {
46838
- return new APIPromise($do33(client, request, options));
47338
+ return new APIPromise($do36(client, request, options));
46839
47339
  }
46840
- async function $do33(client, request, options) {
47340
+ async function $do36(client, request, options) {
46841
47341
  const parsed = safeParse(request, (value) => ListVendorCredentialsRequest$outboundSchema.parse(value), "Input validation failed");
46842
47342
  if (!parsed.ok) {
46843
47343
  return [haltIterator(parsed), { status: "invalid" }];
@@ -46869,6 +47369,7 @@ async function $do33(client, request, options) {
46869
47369
  const securityInput = await extractSecurity(client._options.security);
46870
47370
  const requestSecurity = resolveGlobalSecurity(securityInput);
46871
47371
  const context = {
47372
+ options: client._options,
46872
47373
  baseURL: options?.serverURL ?? client._baseURL ?? "",
46873
47374
  operationID: "listVendorCredentials",
46874
47375
  oAuth2Scopes: [],
@@ -46885,6 +47386,7 @@ async function $do33(client, request, options) {
46885
47386
  headers,
46886
47387
  query,
46887
47388
  body,
47389
+ userAgent: client._options.userAgent,
46888
47390
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
46889
47391
  }, options);
46890
47392
  if (!requestRes.ok) {
@@ -46955,12 +47457,12 @@ var init_vendorsListVendorCredentials = __esm(() => {
46955
47457
  });
46956
47458
 
46957
47459
  // src/mcp-server/tools/vendorsListVendorCredentials.ts
46958
- var args32, tool$vendorsListVendorCredentials;
47460
+ var args35, tool$vendorsListVendorCredentials;
46959
47461
  var init_vendorsListVendorCredentials2 = __esm(() => {
46960
47462
  init_vendorsListVendorCredentials();
46961
47463
  init_operations();
46962
47464
  init_tools();
46963
- args32 = {
47465
+ args35 = {
46964
47466
  request: ListVendorCredentialsRequest$inboundSchema
46965
47467
  };
46966
47468
  tool$vendorsListVendorCredentials = {
@@ -46968,9 +47470,9 @@ var init_vendorsListVendorCredentials2 = __esm(() => {
46968
47470
  description: `List Vendor Credentials
46969
47471
 
46970
47472
  Lists vendor credentials, required credentials, and company credentials. Utilized in Vendor Dashboard.`,
46971
- args: args32,
46972
- tool: async (client, args33, ctx) => {
46973
- const [result, apiCall] = await vendorsListVendorCredentials(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47473
+ args: args35,
47474
+ tool: async (client, args36, ctx) => {
47475
+ const [result, apiCall] = await vendorsListVendorCredentials(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
46974
47476
  if (!result.ok) {
46975
47477
  return {
46976
47478
  content: [{ type: "text", text: result.error.message }],
@@ -46985,9 +47487,9 @@ Lists vendor credentials, required credentials, and company credentials. Utilize
46985
47487
 
46986
47488
  // src/funcs/vendorsListVendorCredits.ts
46987
47489
  function vendorsListVendorCredits(client, request, options) {
46988
- return new APIPromise($do34(client, request, options));
47490
+ return new APIPromise($do37(client, request, options));
46989
47491
  }
46990
- async function $do34(client, request, options) {
47492
+ async function $do37(client, request, options) {
46991
47493
  const parsed = safeParse(request, (value) => ListVendorCreditsRequest$outboundSchema.parse(value), "Input validation failed");
46992
47494
  if (!parsed.ok) {
46993
47495
  return [haltIterator(parsed), { status: "invalid" }];
@@ -47013,6 +47515,7 @@ async function $do34(client, request, options) {
47013
47515
  const securityInput = await extractSecurity(client._options.security);
47014
47516
  const requestSecurity = resolveGlobalSecurity(securityInput);
47015
47517
  const context = {
47518
+ options: client._options,
47016
47519
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47017
47520
  operationID: "listVendorCredits",
47018
47521
  oAuth2Scopes: [],
@@ -47029,6 +47532,7 @@ async function $do34(client, request, options) {
47029
47532
  headers,
47030
47533
  query,
47031
47534
  body,
47535
+ userAgent: client._options.userAgent,
47032
47536
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47033
47537
  }, options);
47034
47538
  if (!requestRes.ok) {
@@ -47099,12 +47603,12 @@ var init_vendorsListVendorCredits = __esm(() => {
47099
47603
  });
47100
47604
 
47101
47605
  // src/mcp-server/tools/vendorsListVendorCredits.ts
47102
- var args33, tool$vendorsListVendorCredits;
47606
+ var args36, tool$vendorsListVendorCredits;
47103
47607
  var init_vendorsListVendorCredits2 = __esm(() => {
47104
47608
  init_vendorsListVendorCredits();
47105
47609
  init_operations();
47106
47610
  init_tools();
47107
- args33 = {
47611
+ args36 = {
47108
47612
  request: ListVendorCreditsRequest$inboundSchema
47109
47613
  };
47110
47614
  tool$vendorsListVendorCredits = {
@@ -47112,9 +47616,9 @@ var init_vendorsListVendorCredits2 = __esm(() => {
47112
47616
  description: `List vendor credits
47113
47617
 
47114
47618
  List the credits for the vendor`,
47115
- args: args33,
47116
- tool: async (client, args34, ctx) => {
47117
- const [result, apiCall] = await vendorsListVendorCredits(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47619
+ args: args36,
47620
+ tool: async (client, args37, ctx) => {
47621
+ const [result, apiCall] = await vendorsListVendorCredits(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47118
47622
  if (!result.ok) {
47119
47623
  return {
47120
47624
  content: [{ type: "text", text: result.error.message }],
@@ -47129,9 +47633,9 @@ List the credits for the vendor`,
47129
47633
 
47130
47634
  // src/funcs/vendorsListVendorFacilityStatuses.ts
47131
47635
  function vendorsListVendorFacilityStatuses(client, request, options) {
47132
- return new APIPromise($do35(client, request, options));
47636
+ return new APIPromise($do38(client, request, options));
47133
47637
  }
47134
- async function $do35(client, request, options) {
47638
+ async function $do38(client, request, options) {
47135
47639
  const parsed = safeParse(request, (value) => ListVendorFacilityStatusesRequest$outboundSchema.parse(value), "Input validation failed");
47136
47640
  if (!parsed.ok) {
47137
47641
  return [haltIterator(parsed), { status: "invalid" }];
@@ -47153,6 +47657,7 @@ async function $do35(client, request, options) {
47153
47657
  const securityInput = await extractSecurity(client._options.security);
47154
47658
  const requestSecurity = resolveGlobalSecurity(securityInput);
47155
47659
  const context = {
47660
+ options: client._options,
47156
47661
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47157
47662
  operationID: "listVendorFacilityStatuses",
47158
47663
  oAuth2Scopes: [],
@@ -47169,6 +47674,7 @@ async function $do35(client, request, options) {
47169
47674
  headers,
47170
47675
  query,
47171
47676
  body,
47677
+ userAgent: client._options.userAgent,
47172
47678
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47173
47679
  }, options);
47174
47680
  if (!requestRes.ok) {
@@ -47239,12 +47745,12 @@ var init_vendorsListVendorFacilityStatuses = __esm(() => {
47239
47745
  });
47240
47746
 
47241
47747
  // src/mcp-server/tools/vendorsListVendorFacilityStatuses.ts
47242
- var args34, tool$vendorsListVendorFacilityStatuses;
47748
+ var args37, tool$vendorsListVendorFacilityStatuses;
47243
47749
  var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
47244
47750
  init_vendorsListVendorFacilityStatuses();
47245
47751
  init_operations();
47246
47752
  init_tools();
47247
- args34 = {
47753
+ args37 = {
47248
47754
  request: ListVendorFacilityStatusesRequest$inboundSchema
47249
47755
  };
47250
47756
  tool$vendorsListVendorFacilityStatuses = {
@@ -47252,9 +47758,9 @@ var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
47252
47758
  description: `List vendor facility statuses
47253
47759
 
47254
47760
  List the facilities for the vendor`,
47255
- args: args34,
47256
- tool: async (client, args35, ctx) => {
47257
- const [result, apiCall] = await vendorsListVendorFacilityStatuses(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47761
+ args: args37,
47762
+ tool: async (client, args38, ctx) => {
47763
+ const [result, apiCall] = await vendorsListVendorFacilityStatuses(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47258
47764
  if (!result.ok) {
47259
47765
  return {
47260
47766
  content: [{ type: "text", text: result.error.message }],
@@ -47269,9 +47775,9 @@ List the facilities for the vendor`,
47269
47775
 
47270
47776
  // src/funcs/vendorsListVendorInvoices.ts
47271
47777
  function vendorsListVendorInvoices(client, request, options) {
47272
- return new APIPromise($do36(client, request, options));
47778
+ return new APIPromise($do39(client, request, options));
47273
47779
  }
47274
- async function $do36(client, request, options) {
47780
+ async function $do39(client, request, options) {
47275
47781
  const parsed = safeParse(request, (value) => ListVendorInvoicesRequest$outboundSchema.parse(value), "Input validation failed");
47276
47782
  if (!parsed.ok) {
47277
47783
  return [haltIterator(parsed), { status: "invalid" }];
@@ -47301,6 +47807,7 @@ async function $do36(client, request, options) {
47301
47807
  const securityInput = await extractSecurity(client._options.security);
47302
47808
  const requestSecurity = resolveGlobalSecurity(securityInput);
47303
47809
  const context = {
47810
+ options: client._options,
47304
47811
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47305
47812
  operationID: "listVendorInvoices",
47306
47813
  oAuth2Scopes: [],
@@ -47317,6 +47824,7 @@ async function $do36(client, request, options) {
47317
47824
  headers,
47318
47825
  query,
47319
47826
  body,
47827
+ userAgent: client._options.userAgent,
47320
47828
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47321
47829
  }, options);
47322
47830
  if (!requestRes.ok) {
@@ -47387,12 +47895,12 @@ var init_vendorsListVendorInvoices = __esm(() => {
47387
47895
  });
47388
47896
 
47389
47897
  // src/mcp-server/tools/vendorsListVendorInvoices.ts
47390
- var args35, tool$vendorsListVendorInvoices;
47898
+ var args38, tool$vendorsListVendorInvoices;
47391
47899
  var init_vendorsListVendorInvoices2 = __esm(() => {
47392
47900
  init_vendorsListVendorInvoices();
47393
47901
  init_operations();
47394
47902
  init_tools();
47395
- args35 = {
47903
+ args38 = {
47396
47904
  request: ListVendorInvoicesRequest$inboundSchema
47397
47905
  };
47398
47906
  tool$vendorsListVendorInvoices = {
@@ -47404,9 +47912,9 @@ List invoices for Vendors
47404
47912
  Available \`expand\` scopes are:
47405
47913
 
47406
47914
  invoice.line_items`,
47407
- args: args35,
47408
- tool: async (client, args36, ctx) => {
47409
- const [result, apiCall] = await vendorsListVendorInvoices(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47915
+ args: args38,
47916
+ tool: async (client, args39, ctx) => {
47917
+ const [result, apiCall] = await vendorsListVendorInvoices(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47410
47918
  if (!result.ok) {
47411
47919
  return {
47412
47920
  content: [{ type: "text", text: result.error.message }],
@@ -47421,9 +47929,9 @@ invoice.line_items`,
47421
47929
 
47422
47930
  // src/funcs/vendorsListVendorJobTitles.ts
47423
47931
  function vendorsListVendorJobTitles(client, request, options) {
47424
- return new APIPromise($do37(client, request, options));
47932
+ return new APIPromise($do40(client, request, options));
47425
47933
  }
47426
- async function $do37(client, request, options) {
47934
+ async function $do40(client, request, options) {
47427
47935
  const parsed = safeParse(request, (value) => ListVendorJobTitlesRequest$outboundSchema.parse(value), "Input validation failed");
47428
47936
  if (!parsed.ok) {
47429
47937
  return [haltIterator(parsed), { status: "invalid" }];
@@ -47444,6 +47952,7 @@ async function $do37(client, request, options) {
47444
47952
  const securityInput = await extractSecurity(client._options.security);
47445
47953
  const requestSecurity = resolveGlobalSecurity(securityInput);
47446
47954
  const context = {
47955
+ options: client._options,
47447
47956
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47448
47957
  operationID: "listVendorJobTitles",
47449
47958
  oAuth2Scopes: [],
@@ -47460,6 +47969,7 @@ async function $do37(client, request, options) {
47460
47969
  headers,
47461
47970
  query,
47462
47971
  body,
47972
+ userAgent: client._options.userAgent,
47463
47973
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47464
47974
  }, options);
47465
47975
  if (!requestRes.ok) {
@@ -47530,12 +48040,12 @@ var init_vendorsListVendorJobTitles = __esm(() => {
47530
48040
  });
47531
48041
 
47532
48042
  // src/mcp-server/tools/vendorsListVendorJobTitles.ts
47533
- var args36, tool$vendorsListVendorJobTitles;
48043
+ var args39, tool$vendorsListVendorJobTitles;
47534
48044
  var init_vendorsListVendorJobTitles2 = __esm(() => {
47535
48045
  init_vendorsListVendorJobTitles();
47536
48046
  init_operations();
47537
48047
  init_tools();
47538
- args36 = {
48048
+ args39 = {
47539
48049
  request: ListVendorJobTitlesRequest$inboundSchema
47540
48050
  };
47541
48051
  tool$vendorsListVendorJobTitles = {
@@ -47543,9 +48053,9 @@ var init_vendorsListVendorJobTitles2 = __esm(() => {
47543
48053
  description: `List vendor job titles
47544
48054
 
47545
48055
  List valid job titles for Vendors. This can be used during sign up or in a filter.`,
47546
- args: args36,
47547
- tool: async (client, args37, ctx) => {
47548
- const [result, apiCall] = await vendorsListVendorJobTitles(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48056
+ args: args39,
48057
+ tool: async (client, args40, ctx) => {
48058
+ const [result, apiCall] = await vendorsListVendorJobTitles(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47549
48059
  if (!result.ok) {
47550
48060
  return {
47551
48061
  content: [{ type: "text", text: result.error.message }],
@@ -47560,9 +48070,9 @@ List valid job titles for Vendors. This can be used during sign up or in a filte
47560
48070
 
47561
48071
  // src/funcs/vendorsListVendorManagedByCompanies.ts
47562
48072
  function vendorsListVendorManagedByCompanies(client, request, options) {
47563
- return new APIPromise($do38(client, request, options));
48073
+ return new APIPromise($do41(client, request, options));
47564
48074
  }
47565
- async function $do38(client, request, options) {
48075
+ async function $do41(client, request, options) {
47566
48076
  const parsed = safeParse(request, (value) => ListVendorManagedByCompaniesRequest$outboundSchema.parse(value), "Input validation failed");
47567
48077
  if (!parsed.ok) {
47568
48078
  return [haltIterator(parsed), { status: "invalid" }];
@@ -47588,6 +48098,7 @@ async function $do38(client, request, options) {
47588
48098
  const securityInput = await extractSecurity(client._options.security);
47589
48099
  const requestSecurity = resolveGlobalSecurity(securityInput);
47590
48100
  const context = {
48101
+ options: client._options,
47591
48102
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47592
48103
  operationID: "listVendorManagedByCompanies",
47593
48104
  oAuth2Scopes: [],
@@ -47604,6 +48115,7 @@ async function $do38(client, request, options) {
47604
48115
  headers,
47605
48116
  query,
47606
48117
  body,
48118
+ userAgent: client._options.userAgent,
47607
48119
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47608
48120
  }, options);
47609
48121
  if (!requestRes.ok) {
@@ -47674,12 +48186,12 @@ var init_vendorsListVendorManagedByCompanies = __esm(() => {
47674
48186
  });
47675
48187
 
47676
48188
  // src/mcp-server/tools/vendorsListVendorManagedByCompanies.ts
47677
- var args37, tool$vendorsListVendorManagedByCompanies;
48189
+ var args40, tool$vendorsListVendorManagedByCompanies;
47678
48190
  var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
47679
48191
  init_vendorsListVendorManagedByCompanies();
47680
48192
  init_operations();
47681
48193
  init_tools();
47682
- args37 = {
48194
+ args40 = {
47683
48195
  request: ListVendorManagedByCompaniesRequest$inboundSchema
47684
48196
  };
47685
48197
  tool$vendorsListVendorManagedByCompanies = {
@@ -47687,9 +48199,9 @@ var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
47687
48199
  description: `List of companies managing the vendor
47688
48200
 
47689
48201
  List of companies managing the vendor`,
47690
- args: args37,
47691
- tool: async (client, args38, ctx) => {
47692
- const [result, apiCall] = await vendorsListVendorManagedByCompanies(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48202
+ args: args40,
48203
+ tool: async (client, args41, ctx) => {
48204
+ const [result, apiCall] = await vendorsListVendorManagedByCompanies(client, args41.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47693
48205
  if (!result.ok) {
47694
48206
  return {
47695
48207
  content: [{ type: "text", text: result.error.message }],
@@ -47704,9 +48216,9 @@ List of companies managing the vendor`,
47704
48216
 
47705
48217
  // src/funcs/vendorsListVendorScrubDetails.ts
47706
48218
  function vendorsListVendorScrubDetails(client, request, options) {
47707
- return new APIPromise($do39(client, request, options));
48219
+ return new APIPromise($do42(client, request, options));
47708
48220
  }
47709
- async function $do39(client, request, options) {
48221
+ async function $do42(client, request, options) {
47710
48222
  const parsed = safeParse(request, (value) => ListVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
47711
48223
  if (!parsed.ok) {
47712
48224
  return [parsed, { status: "invalid" }];
@@ -47726,6 +48238,7 @@ async function $do39(client, request, options) {
47726
48238
  const securityInput = await extractSecurity(client._options.security);
47727
48239
  const requestSecurity = resolveGlobalSecurity(securityInput);
47728
48240
  const context = {
48241
+ options: client._options,
47729
48242
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47730
48243
  operationID: "listVendorScrubDetails",
47731
48244
  oAuth2Scopes: [],
@@ -47741,6 +48254,7 @@ async function $do39(client, request, options) {
47741
48254
  path,
47742
48255
  headers,
47743
48256
  body,
48257
+ userAgent: client._options.userAgent,
47744
48258
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47745
48259
  }, options);
47746
48260
  if (!requestRes.ok) {
@@ -47780,12 +48294,12 @@ var init_vendorsListVendorScrubDetails = __esm(() => {
47780
48294
  });
47781
48295
 
47782
48296
  // src/mcp-server/tools/vendorsListVendorScrubDetails.ts
47783
- var args38, tool$vendorsListVendorScrubDetails;
48297
+ var args41, tool$vendorsListVendorScrubDetails;
47784
48298
  var init_vendorsListVendorScrubDetails2 = __esm(() => {
47785
48299
  init_vendorsListVendorScrubDetails();
47786
48300
  init_operations();
47787
48301
  init_tools();
47788
- args38 = {
48302
+ args41 = {
47789
48303
  request: ListVendorScrubDetailsRequest$inboundSchema
47790
48304
  };
47791
48305
  tool$vendorsListVendorScrubDetails = {
@@ -47793,9 +48307,9 @@ var init_vendorsListVendorScrubDetails2 = __esm(() => {
47793
48307
  description: `List vendor scrub details
47794
48308
 
47795
48309
  List vendor scrub details`,
47796
- args: args38,
47797
- tool: async (client, args39, ctx) => {
47798
- const [result, apiCall] = await vendorsListVendorScrubDetails(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48310
+ args: args41,
48311
+ tool: async (client, args42, ctx) => {
48312
+ const [result, apiCall] = await vendorsListVendorScrubDetails(client, args42.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47799
48313
  if (!result.ok) {
47800
48314
  return {
47801
48315
  content: [{ type: "text", text: result.error.message }],
@@ -47810,9 +48324,9 @@ List vendor scrub details`,
47810
48324
 
47811
48325
  // src/funcs/vendorsListVendorScrubPackages.ts
47812
48326
  function vendorsListVendorScrubPackages(client, request, options) {
47813
- return new APIPromise($do40(client, request, options));
48327
+ return new APIPromise($do43(client, request, options));
47814
48328
  }
47815
- async function $do40(client, request, options) {
48329
+ async function $do43(client, request, options) {
47816
48330
  const parsed = safeParse(request, (value) => ListVendorScrubPackagesRequest$outboundSchema.parse(value), "Input validation failed");
47817
48331
  if (!parsed.ok) {
47818
48332
  return [haltIterator(parsed), { status: "invalid" }];
@@ -47838,6 +48352,7 @@ async function $do40(client, request, options) {
47838
48352
  const securityInput = await extractSecurity(client._options.security);
47839
48353
  const requestSecurity = resolveGlobalSecurity(securityInput);
47840
48354
  const context = {
48355
+ options: client._options,
47841
48356
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47842
48357
  operationID: "listVendorScrubPackages",
47843
48358
  oAuth2Scopes: [],
@@ -47854,6 +48369,7 @@ async function $do40(client, request, options) {
47854
48369
  headers,
47855
48370
  query,
47856
48371
  body,
48372
+ userAgent: client._options.userAgent,
47857
48373
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
47858
48374
  }, options);
47859
48375
  if (!requestRes.ok) {
@@ -47924,12 +48440,12 @@ var init_vendorsListVendorScrubPackages = __esm(() => {
47924
48440
  });
47925
48441
 
47926
48442
  // src/mcp-server/tools/vendorsListVendorScrubPackages.ts
47927
- var args39, tool$vendorsListVendorScrubPackages;
48443
+ var args42, tool$vendorsListVendorScrubPackages;
47928
48444
  var init_vendorsListVendorScrubPackages2 = __esm(() => {
47929
48445
  init_vendorsListVendorScrubPackages();
47930
48446
  init_operations();
47931
48447
  init_tools();
47932
- args39 = {
48448
+ args42 = {
47933
48449
  request: ListVendorScrubPackagesRequest$inboundSchema
47934
48450
  };
47935
48451
  tool$vendorsListVendorScrubPackages = {
@@ -47937,9 +48453,9 @@ var init_vendorsListVendorScrubPackages2 = __esm(() => {
47937
48453
  description: `List vendor scrub packages
47938
48454
 
47939
48455
  List vendor scrub packages`,
47940
- args: args39,
47941
- tool: async (client, args40, ctx) => {
47942
- const [result, apiCall] = await vendorsListVendorScrubPackages(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48456
+ args: args42,
48457
+ tool: async (client, args43, ctx) => {
48458
+ const [result, apiCall] = await vendorsListVendorScrubPackages(client, args43.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
47943
48459
  if (!result.ok) {
47944
48460
  return {
47945
48461
  content: [{ type: "text", text: result.error.message }],
@@ -47954,9 +48470,9 @@ List vendor scrub packages`,
47954
48470
 
47955
48471
  // src/funcs/vendorsListVendorScrubPurchases.ts
47956
48472
  function vendorsListVendorScrubPurchases(client, request, options) {
47957
- return new APIPromise($do41(client, request, options));
48473
+ return new APIPromise($do44(client, request, options));
47958
48474
  }
47959
- async function $do41(client, request, options) {
48475
+ async function $do44(client, request, options) {
47960
48476
  const parsed = safeParse(request, (value) => ListVendorScrubPurchasesRequest$outboundSchema.parse(value), "Input validation failed");
47961
48477
  if (!parsed.ok) {
47962
48478
  return [haltIterator(parsed), { status: "invalid" }];
@@ -47982,6 +48498,7 @@ async function $do41(client, request, options) {
47982
48498
  const securityInput = await extractSecurity(client._options.security);
47983
48499
  const requestSecurity = resolveGlobalSecurity(securityInput);
47984
48500
  const context = {
48501
+ options: client._options,
47985
48502
  baseURL: options?.serverURL ?? client._baseURL ?? "",
47986
48503
  operationID: "listVendorScrubPurchases",
47987
48504
  oAuth2Scopes: [],
@@ -47998,6 +48515,7 @@ async function $do41(client, request, options) {
47998
48515
  headers,
47999
48516
  query,
48000
48517
  body,
48518
+ userAgent: client._options.userAgent,
48001
48519
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48002
48520
  }, options);
48003
48521
  if (!requestRes.ok) {
@@ -48068,12 +48586,12 @@ var init_vendorsListVendorScrubPurchases = __esm(() => {
48068
48586
  });
48069
48587
 
48070
48588
  // src/mcp-server/tools/vendorsListVendorScrubPurchases.ts
48071
- var args40, tool$vendorsListVendorScrubPurchases;
48589
+ var args43, tool$vendorsListVendorScrubPurchases;
48072
48590
  var init_vendorsListVendorScrubPurchases2 = __esm(() => {
48073
48591
  init_vendorsListVendorScrubPurchases();
48074
48592
  init_operations();
48075
48593
  init_tools();
48076
- args40 = {
48594
+ args43 = {
48077
48595
  request: ListVendorScrubPurchasesRequest$inboundSchema
48078
48596
  };
48079
48597
  tool$vendorsListVendorScrubPurchases = {
@@ -48081,9 +48599,9 @@ var init_vendorsListVendorScrubPurchases2 = __esm(() => {
48081
48599
  description: `List vendor scrub purchases
48082
48600
 
48083
48601
  List vendor scrub purchases`,
48084
- args: args40,
48085
- tool: async (client, args41, ctx) => {
48086
- const [result, apiCall] = await vendorsListVendorScrubPurchases(client, args41.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48602
+ args: args43,
48603
+ tool: async (client, args44, ctx) => {
48604
+ const [result, apiCall] = await vendorsListVendorScrubPurchases(client, args44.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48087
48605
  if (!result.ok) {
48088
48606
  return {
48089
48607
  content: [{ type: "text", text: result.error.message }],
@@ -48098,9 +48616,9 @@ List vendor scrub purchases`,
48098
48616
 
48099
48617
  // src/funcs/vendorsPurchaseScrubCredits.ts
48100
48618
  function vendorsPurchaseScrubCredits(client, request, options) {
48101
- return new APIPromise($do42(client, request, options));
48619
+ return new APIPromise($do45(client, request, options));
48102
48620
  }
48103
- async function $do42(client, request, options) {
48621
+ async function $do45(client, request, options) {
48104
48622
  const parsed = safeParse(request, (value) => PurchaseScrubCreditsRequest$outboundSchema.parse(value), "Input validation failed");
48105
48623
  if (!parsed.ok) {
48106
48624
  return [parsed, { status: "invalid" }];
@@ -48121,6 +48639,7 @@ async function $do42(client, request, options) {
48121
48639
  const securityInput = await extractSecurity(client._options.security);
48122
48640
  const requestSecurity = resolveGlobalSecurity(securityInput);
48123
48641
  const context = {
48642
+ options: client._options,
48124
48643
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48125
48644
  operationID: "purchaseScrubCredits",
48126
48645
  oAuth2Scopes: [],
@@ -48136,6 +48655,7 @@ async function $do42(client, request, options) {
48136
48655
  path,
48137
48656
  headers,
48138
48657
  body,
48658
+ userAgent: client._options.userAgent,
48139
48659
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48140
48660
  }, options);
48141
48661
  if (!requestRes.ok) {
@@ -48174,12 +48694,12 @@ var init_vendorsPurchaseScrubCredits = __esm(() => {
48174
48694
  });
48175
48695
 
48176
48696
  // src/mcp-server/tools/vendorsPurchaseScrubCredits.ts
48177
- var args41, tool$vendorsPurchaseScrubCredits;
48697
+ var args44, tool$vendorsPurchaseScrubCredits;
48178
48698
  var init_vendorsPurchaseScrubCredits2 = __esm(() => {
48179
48699
  init_vendorsPurchaseScrubCredits();
48180
48700
  init_operations();
48181
48701
  init_tools();
48182
- args41 = {
48702
+ args44 = {
48183
48703
  request: PurchaseScrubCreditsRequest$inboundSchema
48184
48704
  };
48185
48705
  tool$vendorsPurchaseScrubCredits = {
@@ -48187,9 +48707,9 @@ var init_vendorsPurchaseScrubCredits2 = __esm(() => {
48187
48707
  description: `Purchase scrub credits
48188
48708
 
48189
48709
  Purchase scrub credits`,
48190
- args: args41,
48191
- tool: async (client, args42, ctx) => {
48192
- const [result, apiCall] = await vendorsPurchaseScrubCredits(client, args42.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48710
+ args: args44,
48711
+ tool: async (client, args45, ctx) => {
48712
+ const [result, apiCall] = await vendorsPurchaseScrubCredits(client, args45.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48193
48713
  if (!result.ok) {
48194
48714
  return {
48195
48715
  content: [{ type: "text", text: result.error.message }],
@@ -48204,9 +48724,9 @@ Purchase scrub credits`,
48204
48724
 
48205
48725
  // src/funcs/vendorsSubmitVendorCredential.ts
48206
48726
  function vendorsSubmitVendorCredential(client, request, options) {
48207
- return new APIPromise($do43(client, request, options));
48727
+ return new APIPromise($do46(client, request, options));
48208
48728
  }
48209
- async function $do43(client, request, options) {
48729
+ async function $do46(client, request, options) {
48210
48730
  const parsed = safeParse(request, (value) => SubmitVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
48211
48731
  if (!parsed.ok) {
48212
48732
  return [parsed, { status: "invalid" }];
@@ -48224,6 +48744,7 @@ async function $do43(client, request, options) {
48224
48744
  const securityInput = await extractSecurity(client._options.security);
48225
48745
  const requestSecurity = resolveGlobalSecurity(securityInput);
48226
48746
  const context = {
48747
+ options: client._options,
48227
48748
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48228
48749
  operationID: "submitVendorCredential",
48229
48750
  oAuth2Scopes: [],
@@ -48239,6 +48760,7 @@ async function $do43(client, request, options) {
48239
48760
  path,
48240
48761
  headers,
48241
48762
  body,
48763
+ userAgent: client._options.userAgent,
48242
48764
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48243
48765
  }, options);
48244
48766
  if (!requestRes.ok) {
@@ -48278,12 +48800,12 @@ var init_vendorsSubmitVendorCredential = __esm(() => {
48278
48800
  });
48279
48801
 
48280
48802
  // src/mcp-server/tools/vendorsSubmitVendorCredential.ts
48281
- var args42, tool$vendorsSubmitVendorCredential;
48803
+ var args45, tool$vendorsSubmitVendorCredential;
48282
48804
  var init_vendorsSubmitVendorCredential2 = __esm(() => {
48283
48805
  init_vendorsSubmitVendorCredential();
48284
48806
  init_operations();
48285
48807
  init_tools();
48286
- args42 = {
48808
+ args45 = {
48287
48809
  request: SubmitVendorCredentialRequest$inboundSchema
48288
48810
  };
48289
48811
  tool$vendorsSubmitVendorCredential = {
@@ -48291,9 +48813,9 @@ var init_vendorsSubmitVendorCredential2 = __esm(() => {
48291
48813
  description: `Submit vendor credential
48292
48814
 
48293
48815
  It will submit vendor credential`,
48294
- args: args42,
48295
- tool: async (client, args43, ctx) => {
48296
- const [result, apiCall] = await vendorsSubmitVendorCredential(client, args43.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48816
+ args: args45,
48817
+ tool: async (client, args46, ctx) => {
48818
+ const [result, apiCall] = await vendorsSubmitVendorCredential(client, args46.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48297
48819
  if (!result.ok) {
48298
48820
  return {
48299
48821
  content: [{ type: "text", text: result.error.message }],
@@ -48308,9 +48830,9 @@ It will submit vendor credential`,
48308
48830
 
48309
48831
  // src/funcs/vendorsUpdateVendorCredentialFile.ts
48310
48832
  function vendorsUpdateVendorCredentialFile(client, request, options) {
48311
- return new APIPromise($do44(client, request, options));
48833
+ return new APIPromise($do47(client, request, options));
48312
48834
  }
48313
- async function $do44(client, request, options) {
48835
+ async function $do47(client, request, options) {
48314
48836
  const parsed = safeParse(request, (value) => UpdateVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
48315
48837
  if (!parsed.ok) {
48316
48838
  return [parsed, { status: "invalid" }];
@@ -48332,6 +48854,7 @@ async function $do44(client, request, options) {
48332
48854
  const securityInput = await extractSecurity(client._options.security);
48333
48855
  const requestSecurity = resolveGlobalSecurity(securityInput);
48334
48856
  const context = {
48857
+ options: client._options,
48335
48858
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48336
48859
  operationID: "updateVendorCredentialFile",
48337
48860
  oAuth2Scopes: [],
@@ -48347,6 +48870,7 @@ async function $do44(client, request, options) {
48347
48870
  path,
48348
48871
  headers,
48349
48872
  body,
48873
+ userAgent: client._options.userAgent,
48350
48874
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48351
48875
  }, options);
48352
48876
  if (!requestRes.ok) {
@@ -48386,12 +48910,12 @@ var init_vendorsUpdateVendorCredentialFile = __esm(() => {
48386
48910
  });
48387
48911
 
48388
48912
  // src/mcp-server/tools/vendorsUpdateVendorCredentialFile.ts
48389
- var args43, tool$vendorsUpdateVendorCredentialFile;
48913
+ var args46, tool$vendorsUpdateVendorCredentialFile;
48390
48914
  var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
48391
48915
  init_vendorsUpdateVendorCredentialFile();
48392
48916
  init_operations();
48393
48917
  init_tools();
48394
- args43 = {
48918
+ args46 = {
48395
48919
  request: UpdateVendorCredentialFileRequest$inboundSchema
48396
48920
  };
48397
48921
  tool$vendorsUpdateVendorCredentialFile = {
@@ -48399,9 +48923,9 @@ var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
48399
48923
  description: `Update vendor credential file
48400
48924
 
48401
48925
  It will update the vendor credential file properties`,
48402
- args: args43,
48403
- tool: async (client, args44, ctx) => {
48404
- const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client, args44.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48926
+ args: args46,
48927
+ tool: async (client, args47, ctx) => {
48928
+ const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client, args47.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48405
48929
  if (!result.ok) {
48406
48930
  return {
48407
48931
  content: [{ type: "text", text: result.error.message }],
@@ -48416,9 +48940,9 @@ It will update the vendor credential file properties`,
48416
48940
 
48417
48941
  // src/funcs/vendorsUpdateVendorDetails.ts
48418
48942
  function vendorsUpdateVendorDetails(client, request, options) {
48419
- return new APIPromise($do45(client, request, options));
48943
+ return new APIPromise($do48(client, request, options));
48420
48944
  }
48421
- async function $do45(client, request, options) {
48945
+ async function $do48(client, request, options) {
48422
48946
  const parsed = safeParse(request, (value) => UpdateVendorDetailsRequest$outboundSchema.parse(value), "Input validation failed");
48423
48947
  if (!parsed.ok) {
48424
48948
  return [parsed, { status: "invalid" }];
@@ -48439,6 +48963,7 @@ async function $do45(client, request, options) {
48439
48963
  const securityInput = await extractSecurity(client._options.security);
48440
48964
  const requestSecurity = resolveGlobalSecurity(securityInput);
48441
48965
  const context = {
48966
+ options: client._options,
48442
48967
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48443
48968
  operationID: "updateVendorDetails",
48444
48969
  oAuth2Scopes: [],
@@ -48454,6 +48979,7 @@ async function $do45(client, request, options) {
48454
48979
  path,
48455
48980
  headers,
48456
48981
  body,
48982
+ userAgent: client._options.userAgent,
48457
48983
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48458
48984
  }, options);
48459
48985
  if (!requestRes.ok) {
@@ -48493,12 +49019,12 @@ var init_vendorsUpdateVendorDetails = __esm(() => {
48493
49019
  });
48494
49020
 
48495
49021
  // src/mcp-server/tools/vendorsUpdateVendorDetails.ts
48496
- var args44, tool$vendorsUpdateVendorDetails;
49022
+ var args47, tool$vendorsUpdateVendorDetails;
48497
49023
  var init_vendorsUpdateVendorDetails2 = __esm(() => {
48498
49024
  init_vendorsUpdateVendorDetails();
48499
49025
  init_operations();
48500
49026
  init_tools();
48501
- args44 = {
49027
+ args47 = {
48502
49028
  request: UpdateVendorDetailsRequest$inboundSchema
48503
49029
  };
48504
49030
  tool$vendorsUpdateVendorDetails = {
@@ -48506,9 +49032,9 @@ var init_vendorsUpdateVendorDetails2 = __esm(() => {
48506
49032
  description: `Update vendor details
48507
49033
 
48508
49034
  It will update the vendor details`,
48509
- args: args44,
48510
- tool: async (client, args45, ctx) => {
48511
- const [result, apiCall] = await vendorsUpdateVendorDetails(client, args45.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49035
+ args: args47,
49036
+ tool: async (client, args48, ctx) => {
49037
+ const [result, apiCall] = await vendorsUpdateVendorDetails(client, args48.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48512
49038
  if (!result.ok) {
48513
49039
  return {
48514
49040
  content: [{ type: "text", text: result.error.message }],
@@ -48523,9 +49049,9 @@ It will update the vendor details`,
48523
49049
 
48524
49050
  // src/funcs/vendorsUpdateVendorManagedByCompany.ts
48525
49051
  function vendorsUpdateVendorManagedByCompany(client, request, options) {
48526
- return new APIPromise($do46(client, request, options));
49052
+ return new APIPromise($do49(client, request, options));
48527
49053
  }
48528
- async function $do46(client, request, options) {
49054
+ async function $do49(client, request, options) {
48529
49055
  const parsed = safeParse(request, (value) => UpdateVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
48530
49056
  if (!parsed.ok) {
48531
49057
  return [parsed, { status: "invalid" }];
@@ -48546,6 +49072,7 @@ async function $do46(client, request, options) {
48546
49072
  const securityInput = await extractSecurity(client._options.security);
48547
49073
  const requestSecurity = resolveGlobalSecurity(securityInput);
48548
49074
  const context = {
49075
+ options: client._options,
48549
49076
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48550
49077
  operationID: "updateVendorManagedByCompany",
48551
49078
  oAuth2Scopes: [],
@@ -48561,6 +49088,7 @@ async function $do46(client, request, options) {
48561
49088
  path,
48562
49089
  headers,
48563
49090
  body,
49091
+ userAgent: client._options.userAgent,
48564
49092
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48565
49093
  }, options);
48566
49094
  if (!requestRes.ok) {
@@ -48599,12 +49127,12 @@ var init_vendorsUpdateVendorManagedByCompany = __esm(() => {
48599
49127
  });
48600
49128
 
48601
49129
  // src/mcp-server/tools/vendorsUpdateVendorManagedByCompany.ts
48602
- var args45, tool$vendorsUpdateVendorManagedByCompany;
49130
+ var args48, tool$vendorsUpdateVendorManagedByCompany;
48603
49131
  var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
48604
49132
  init_vendorsUpdateVendorManagedByCompany();
48605
49133
  init_operations();
48606
49134
  init_tools();
48607
- args45 = {
49135
+ args48 = {
48608
49136
  request: UpdateVendorManagedByCompanyRequest$inboundSchema
48609
49137
  };
48610
49138
  tool$vendorsUpdateVendorManagedByCompany = {
@@ -48612,9 +49140,9 @@ var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
48612
49140
  description: `Update vendor managed by company access rights
48613
49141
 
48614
49142
  It will update the vendor managed by company access rights`,
48615
- args: args45,
48616
- tool: async (client, args46, ctx) => {
48617
- const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client, args46.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49143
+ args: args48,
49144
+ tool: async (client, args49, ctx) => {
49145
+ const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client, args49.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48618
49146
  if (!result.ok) {
48619
49147
  return {
48620
49148
  content: [{ type: "text", text: result.error.message }],
@@ -48629,9 +49157,9 @@ It will update the vendor managed by company access rights`,
48629
49157
 
48630
49158
  // src/funcs/vendorsUpdateVendorScrubDetails.ts
48631
49159
  function vendorsUpdateVendorScrubDetails(client, request, options) {
48632
- return new APIPromise($do47(client, request, options));
49160
+ return new APIPromise($do50(client, request, options));
48633
49161
  }
48634
- async function $do47(client, request, options) {
49162
+ async function $do50(client, request, options) {
48635
49163
  const parsed = safeParse(request, (value) => UpdateVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
48636
49164
  if (!parsed.ok) {
48637
49165
  return [parsed, { status: "invalid" }];
@@ -48652,6 +49180,7 @@ async function $do47(client, request, options) {
48652
49180
  const securityInput = await extractSecurity(client._options.security);
48653
49181
  const requestSecurity = resolveGlobalSecurity(securityInput);
48654
49182
  const context = {
49183
+ options: client._options,
48655
49184
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48656
49185
  operationID: "updateVendorScrubDetails",
48657
49186
  oAuth2Scopes: [],
@@ -48667,6 +49196,7 @@ async function $do47(client, request, options) {
48667
49196
  path,
48668
49197
  headers,
48669
49198
  body,
49199
+ userAgent: client._options.userAgent,
48670
49200
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48671
49201
  }, options);
48672
49202
  if (!requestRes.ok) {
@@ -48706,12 +49236,12 @@ var init_vendorsUpdateVendorScrubDetails = __esm(() => {
48706
49236
  });
48707
49237
 
48708
49238
  // src/mcp-server/tools/vendorsUpdateVendorScrubDetails.ts
48709
- var args46, tool$vendorsUpdateVendorScrubDetails;
49239
+ var args49, tool$vendorsUpdateVendorScrubDetails;
48710
49240
  var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
48711
49241
  init_vendorsUpdateVendorScrubDetails();
48712
49242
  init_operations();
48713
49243
  init_tools();
48714
- args46 = {
49244
+ args49 = {
48715
49245
  request: UpdateVendorScrubDetailsRequest$inboundSchema
48716
49246
  };
48717
49247
  tool$vendorsUpdateVendorScrubDetails = {
@@ -48719,9 +49249,9 @@ var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
48719
49249
  description: `Update vendor scrub details
48720
49250
 
48721
49251
  Update vendor scrub details`,
48722
- args: args46,
48723
- tool: async (client, args47, ctx) => {
48724
- const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client, args47.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49252
+ args: args49,
49253
+ tool: async (client, args50, ctx) => {
49254
+ const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client, args50.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48725
49255
  if (!result.ok) {
48726
49256
  return {
48727
49257
  content: [{ type: "text", text: result.error.message }],
@@ -48736,9 +49266,9 @@ Update vendor scrub details`,
48736
49266
 
48737
49267
  // src/funcs/webhooksGetWebhookEndpoint.ts
48738
49268
  function webhooksGetWebhookEndpoint(client, request, options) {
48739
- return new APIPromise($do48(client, request, options));
49269
+ return new APIPromise($do51(client, request, options));
48740
49270
  }
48741
- async function $do48(client, request, options) {
49271
+ async function $do51(client, request, options) {
48742
49272
  const parsed = safeParse(request, (value) => GetWebhookEndpointRequest$outboundSchema.parse(value), "Input validation failed");
48743
49273
  if (!parsed.ok) {
48744
49274
  return [parsed, { status: "invalid" }];
@@ -48758,6 +49288,7 @@ async function $do48(client, request, options) {
48758
49288
  const securityInput = await extractSecurity(client._options.security);
48759
49289
  const requestSecurity = resolveGlobalSecurity(securityInput);
48760
49290
  const context = {
49291
+ options: client._options,
48761
49292
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48762
49293
  operationID: "getWebhookEndpoint",
48763
49294
  oAuth2Scopes: [],
@@ -48773,6 +49304,7 @@ async function $do48(client, request, options) {
48773
49304
  path,
48774
49305
  headers,
48775
49306
  body,
49307
+ userAgent: client._options.userAgent,
48776
49308
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48777
49309
  }, options);
48778
49310
  if (!requestRes.ok) {
@@ -48812,12 +49344,12 @@ var init_webhooksGetWebhookEndpoint = __esm(() => {
48812
49344
  });
48813
49345
 
48814
49346
  // src/mcp-server/tools/webhooksGetWebhookEndpoint.ts
48815
- var args47, tool$webhooksGetWebhookEndpoint;
49347
+ var args50, tool$webhooksGetWebhookEndpoint;
48816
49348
  var init_webhooksGetWebhookEndpoint2 = __esm(() => {
48817
49349
  init_webhooksGetWebhookEndpoint();
48818
49350
  init_operations();
48819
49351
  init_tools();
48820
- args47 = {
49352
+ args50 = {
48821
49353
  request: GetWebhookEndpointRequest$inboundSchema
48822
49354
  };
48823
49355
  tool$webhooksGetWebhookEndpoint = {
@@ -48825,9 +49357,9 @@ var init_webhooksGetWebhookEndpoint2 = __esm(() => {
48825
49357
  description: `Retrieves the webhook endpoint with the given ID.
48826
49358
 
48827
49359
  Returns the definition of a webhook endpoint by ID.`,
48828
- args: args47,
48829
- tool: async (client, args48, ctx) => {
48830
- const [result, apiCall] = await webhooksGetWebhookEndpoint(client, args48.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49360
+ args: args50,
49361
+ tool: async (client, args51, ctx) => {
49362
+ const [result, apiCall] = await webhooksGetWebhookEndpoint(client, args51.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48831
49363
  if (!result.ok) {
48832
49364
  return {
48833
49365
  content: [{ type: "text", text: result.error.message }],
@@ -48842,9 +49374,9 @@ Returns the definition of a webhook endpoint by ID.`,
48842
49374
 
48843
49375
  // src/funcs/webhooksListAllWebhookEndpoints.ts
48844
49376
  function webhooksListAllWebhookEndpoints(client, request, options) {
48845
- return new APIPromise($do49(client, request, options));
49377
+ return new APIPromise($do52(client, request, options));
48846
49378
  }
48847
- async function $do49(client, request, options) {
49379
+ async function $do52(client, request, options) {
48848
49380
  const parsed = safeParse(request, (value) => ListAllWebhookEndpointsRequest$outboundSchema.parse(value), "Input validation failed");
48849
49381
  if (!parsed.ok) {
48850
49382
  return [parsed, { status: "invalid" }];
@@ -48864,6 +49396,7 @@ async function $do49(client, request, options) {
48864
49396
  const securityInput = await extractSecurity(client._options.security);
48865
49397
  const requestSecurity = resolveGlobalSecurity(securityInput);
48866
49398
  const context = {
49399
+ options: client._options,
48867
49400
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48868
49401
  operationID: "listAllWebhookEndpoints",
48869
49402
  oAuth2Scopes: [],
@@ -48880,6 +49413,7 @@ async function $do49(client, request, options) {
48880
49413
  headers,
48881
49414
  query,
48882
49415
  body,
49416
+ userAgent: client._options.userAgent,
48883
49417
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48884
49418
  }, options);
48885
49419
  if (!requestRes.ok) {
@@ -48918,12 +49452,12 @@ var init_webhooksListAllWebhookEndpoints = __esm(() => {
48918
49452
  });
48919
49453
 
48920
49454
  // src/mcp-server/tools/webhooksListAllWebhookEndpoints.ts
48921
- var args48, tool$webhooksListAllWebhookEndpoints;
49455
+ var args51, tool$webhooksListAllWebhookEndpoints;
48922
49456
  var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
48923
49457
  init_webhooksListAllWebhookEndpoints();
48924
49458
  init_operations();
48925
49459
  init_tools();
48926
- args48 = {
49460
+ args51 = {
48927
49461
  request: ListAllWebhookEndpointsRequest$inboundSchema
48928
49462
  };
48929
49463
  tool$webhooksListAllWebhookEndpoints = {
@@ -48931,9 +49465,9 @@ var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
48931
49465
  description: `List all webhook endpoints
48932
49466
 
48933
49467
  Returns a list of your webhook endpoints.`,
48934
- args: args48,
48935
- tool: async (client, args49, ctx) => {
48936
- const [result, apiCall] = await webhooksListAllWebhookEndpoints(client, args49.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49468
+ args: args51,
49469
+ tool: async (client, args52, ctx) => {
49470
+ const [result, apiCall] = await webhooksListAllWebhookEndpoints(client, args52.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
48937
49471
  if (!result.ok) {
48938
49472
  return {
48939
49473
  content: [{ type: "text", text: result.error.message }],
@@ -48948,9 +49482,9 @@ Returns a list of your webhook endpoints.`,
48948
49482
 
48949
49483
  // src/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
48950
49484
  function webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, request, options) {
48951
- return new APIPromise($do50(client, request, options));
49485
+ return new APIPromise($do53(client, request, options));
48952
49486
  }
48953
- async function $do50(client, request, options) {
49487
+ async function $do53(client, request, options) {
48954
49488
  const parsed = safeParse(request, (value) => UpdatesTheWebhookEndpointWithTheGivenIdRequest$outboundSchema.parse(value), "Input validation failed");
48955
49489
  if (!parsed.ok) {
48956
49490
  return [parsed, { status: "invalid" }];
@@ -48971,6 +49505,7 @@ async function $do50(client, request, options) {
48971
49505
  const securityInput = await extractSecurity(client._options.security);
48972
49506
  const requestSecurity = resolveGlobalSecurity(securityInput);
48973
49507
  const context = {
49508
+ options: client._options,
48974
49509
  baseURL: options?.serverURL ?? client._baseURL ?? "",
48975
49510
  operationID: "updatesTheWebhookEndpointWithTheGivenId",
48976
49511
  oAuth2Scopes: [],
@@ -48986,6 +49521,7 @@ async function $do50(client, request, options) {
48986
49521
  path,
48987
49522
  headers,
48988
49523
  body,
49524
+ userAgent: client._options.userAgent,
48989
49525
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
48990
49526
  }, options);
48991
49527
  if (!requestRes.ok) {
@@ -49025,12 +49561,12 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId = __esm(() => {
49025
49561
  });
49026
49562
 
49027
49563
  // src/mcp-server/tools/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
49028
- var args49, tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId;
49564
+ var args52, tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId;
49029
49565
  var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
49030
49566
  init_webhooksUpdatesTheWebhookEndpointWithTheGivenId();
49031
49567
  init_operations();
49032
49568
  init_tools();
49033
- args49 = {
49569
+ args52 = {
49034
49570
  request: UpdatesTheWebhookEndpointWithTheGivenIdRequest$inboundSchema
49035
49571
  };
49036
49572
  tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId = {
@@ -49038,9 +49574,9 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
49038
49574
  description: `Updates the webhook endpoint with the given ID.
49039
49575
 
49040
49576
  Updates the webhook endpoint with the given ID.`,
49041
- args: args49,
49042
- tool: async (client, args50, ctx) => {
49043
- const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, args50.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49577
+ args: args52,
49578
+ tool: async (client, args53, ctx) => {
49579
+ const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, args53.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49044
49580
  if (!result.ok) {
49045
49581
  return {
49046
49582
  content: [{ type: "text", text: result.error.message }],
@@ -49055,9 +49591,9 @@ Updates the webhook endpoint with the given ID.`,
49055
49591
 
49056
49592
  // src/funcs/zonesListOrSearchSecurityZones.ts
49057
49593
  function zonesListOrSearchSecurityZones(client, request, options) {
49058
- return new APIPromise($do51(client, request, options));
49594
+ return new APIPromise($do54(client, request, options));
49059
49595
  }
49060
- async function $do51(client, request, options) {
49596
+ async function $do54(client, request, options) {
49061
49597
  const parsed = safeParse(request, (value) => ListOrSearchSecurityZonesRequest$outboundSchema.parse(value), "Input validation failed");
49062
49598
  if (!parsed.ok) {
49063
49599
  return [haltIterator(parsed), { status: "invalid" }];
@@ -49083,6 +49619,7 @@ async function $do51(client, request, options) {
49083
49619
  const securityInput = await extractSecurity(client._options.security);
49084
49620
  const requestSecurity = resolveGlobalSecurity(securityInput);
49085
49621
  const context = {
49622
+ options: client._options,
49086
49623
  baseURL: options?.serverURL ?? client._baseURL ?? "",
49087
49624
  operationID: "listOrSearchSecurityZones",
49088
49625
  oAuth2Scopes: [],
@@ -49099,6 +49636,7 @@ async function $do51(client, request, options) {
49099
49636
  headers,
49100
49637
  query,
49101
49638
  body,
49639
+ userAgent: client._options.userAgent,
49102
49640
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
49103
49641
  }, options);
49104
49642
  if (!requestRes.ok) {
@@ -49169,12 +49707,12 @@ var init_zonesListOrSearchSecurityZones = __esm(() => {
49169
49707
  });
49170
49708
 
49171
49709
  // src/mcp-server/tools/zonesListOrSearchSecurityZones.ts
49172
- var args50, tool$zonesListOrSearchSecurityZones;
49710
+ var args53, tool$zonesListOrSearchSecurityZones;
49173
49711
  var init_zonesListOrSearchSecurityZones2 = __esm(() => {
49174
49712
  init_zonesListOrSearchSecurityZones();
49175
49713
  init_operations();
49176
49714
  init_tools();
49177
- args50 = {
49715
+ args53 = {
49178
49716
  request: ListOrSearchSecurityZonesRequest$inboundSchema
49179
49717
  };
49180
49718
  tool$zonesListOrSearchSecurityZones = {
@@ -49182,9 +49720,9 @@ var init_zonesListOrSearchSecurityZones2 = __esm(() => {
49182
49720
  description: `List or search security zones
49183
49721
 
49184
49722
  List or search security zones`,
49185
- args: args50,
49186
- tool: async (client, args51, ctx) => {
49187
- const [result, apiCall] = await zonesListOrSearchSecurityZones(client, args51.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49723
+ args: args53,
49724
+ tool: async (client, args54, ctx) => {
49725
+ const [result, apiCall] = await zonesListOrSearchSecurityZones(client, args54.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49188
49726
  if (!result.ok) {
49189
49727
  return {
49190
49728
  content: [{ type: "text", text: result.error.message }],
@@ -49199,9 +49737,9 @@ List or search security zones`,
49199
49737
 
49200
49738
  // src/funcs/zonesSecurityZoneCheckin.ts
49201
49739
  function zonesSecurityZoneCheckin(client, request, options) {
49202
- return new APIPromise($do52(client, request, options));
49740
+ return new APIPromise($do55(client, request, options));
49203
49741
  }
49204
- async function $do52(client, request, options) {
49742
+ async function $do55(client, request, options) {
49205
49743
  const parsed = safeParse(request, (value) => SecurityZoneCheckinRequestBody$outboundSchema.parse(value), "Input validation failed");
49206
49744
  if (!parsed.ok) {
49207
49745
  return [parsed, { status: "invalid" }];
@@ -49216,6 +49754,7 @@ async function $do52(client, request, options) {
49216
49754
  const securityInput = await extractSecurity(client._options.security);
49217
49755
  const requestSecurity = resolveGlobalSecurity(securityInput);
49218
49756
  const context = {
49757
+ options: client._options,
49219
49758
  baseURL: options?.serverURL ?? client._baseURL ?? "",
49220
49759
  operationID: "securityZoneCheckin",
49221
49760
  oAuth2Scopes: [],
@@ -49231,6 +49770,7 @@ async function $do52(client, request, options) {
49231
49770
  path,
49232
49771
  headers,
49233
49772
  body,
49773
+ userAgent: client._options.userAgent,
49234
49774
  timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
49235
49775
  }, options);
49236
49776
  if (!requestRes.ok) {
@@ -49269,12 +49809,12 @@ var init_zonesSecurityZoneCheckin = __esm(() => {
49269
49809
  });
49270
49810
 
49271
49811
  // src/mcp-server/tools/zonesSecurityZoneCheckin.ts
49272
- var args51, tool$zonesSecurityZoneCheckin;
49812
+ var args54, tool$zonesSecurityZoneCheckin;
49273
49813
  var init_zonesSecurityZoneCheckin2 = __esm(() => {
49274
49814
  init_zonesSecurityZoneCheckin();
49275
49815
  init_operations();
49276
49816
  init_tools();
49277
- args51 = {
49817
+ args54 = {
49278
49818
  request: SecurityZoneCheckinRequestBody$inboundSchema
49279
49819
  };
49280
49820
  tool$zonesSecurityZoneCheckin = {
@@ -49282,9 +49822,9 @@ var init_zonesSecurityZoneCheckin2 = __esm(() => {
49282
49822
  description: `Security zone checkin request
49283
49823
 
49284
49824
  Security zone checkin request`,
49285
- args: args51,
49286
- tool: async (client, args52, ctx) => {
49287
- const [result, apiCall] = await zonesSecurityZoneCheckin(client, args52.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49825
+ args: args54,
49826
+ tool: async (client, args55, ctx) => {
49827
+ const [result, apiCall] = await zonesSecurityZoneCheckin(client, args55.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
49288
49828
  if (!result.ok) {
49289
49829
  return {
49290
49830
  content: [{ type: "text", text: result.error.message }],
@@ -49301,7 +49841,7 @@ Security zone checkin request`,
49301
49841
  function createMCPServer(deps) {
49302
49842
  const server = new McpServer({
49303
49843
  name: "GreenSecurity",
49304
- version: "0.34.1"
49844
+ version: "0.35.1"
49305
49845
  });
49306
49846
  const client = new GreenSecurityCore({
49307
49847
  security: deps.security,
@@ -49367,6 +49907,9 @@ function createMCPServer(deps) {
49367
49907
  tool(tool$companiesListOrSearchCompanies);
49368
49908
  tool(tool$zonesListOrSearchSecurityZones);
49369
49909
  tool(tool$zonesSecurityZoneCheckin);
49910
+ tool(tool$dataRequestsAddDataRequestFile);
49911
+ tool(tool$dataRequestsDeleteDataRequestFile);
49912
+ tool(tool$dataRequestsUpdateDataRequest);
49370
49913
  return server;
49371
49914
  }
49372
49915
  var init_server2 = __esm(() => {
@@ -49375,6 +49918,9 @@ var init_server2 = __esm(() => {
49375
49918
  init_resources();
49376
49919
  init_tools();
49377
49920
  init_companiesListOrSearchCompanies2();
49921
+ init_dataRequestsAddDataRequestFile2();
49922
+ init_dataRequestsDeleteDataRequestFile2();
49923
+ init_dataRequestsUpdateDataRequest2();
49378
49924
  init_organizationsGetFacility2();
49379
49925
  init_organizationsListOrSearchFacilities2();
49380
49926
  init_supportArticlesGetSupportArticle2();
@@ -50630,7 +51176,7 @@ var routes = an({
50630
51176
  var app = He(routes, {
50631
51177
  name: "mcp",
50632
51178
  versionInfo: {
50633
- currentVersion: "0.34.1"
51179
+ currentVersion: "0.35.1"
50634
51180
  }
50635
51181
  });
50636
51182
  zt(app, process3.argv.slice(2), buildContext(process3));
@@ -50638,5 +51184,5 @@ export {
50638
51184
  app
50639
51185
  };
50640
51186
 
50641
- //# debugId=5566DF4098E2F63664756E2164756E21
51187
+ //# debugId=932350E8F54D5FE864756E2164756E21
50642
51188
  //# sourceMappingURL=mcp-server.js.map