@greensecurity/javascript-sdk 0.34.1 → 0.35.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +12 -0
- package/bin/mcp-server.js +1047 -501
- package/bin/mcp-server.js.map +69 -60
- package/dist/commonjs/__tests__/datarequests.test.d.ts +2 -0
- package/dist/commonjs/__tests__/datarequests.test.d.ts.map +1 -0
- package/dist/commonjs/__tests__/datarequests.test.js +56 -0
- package/dist/commonjs/__tests__/datarequests.test.js.map +1 -0
- package/dist/commonjs/__tests__/vendors.test.js +7 -10
- package/dist/commonjs/__tests__/vendors.test.js.map +1 -1
- package/dist/commonjs/__tests__/zones.test.js +7 -36
- package/dist/commonjs/__tests__/zones.test.js.map +1 -1
- package/dist/commonjs/admin-funcs/doAdmin.d.ts.map +1 -1
- package/dist/commonjs/admin-funcs/doAdmin.js +3 -3
- package/dist/commonjs/admin-funcs/doAdmin.js.map +1 -1
- package/dist/commonjs/funcs/companiesListOrSearchCompanies.js +2 -0
- package/dist/commonjs/funcs/companiesListOrSearchCompanies.js.map +1 -1
- package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.d.ts +17 -0
- package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.js +124 -0
- package/dist/commonjs/funcs/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.d.ts +17 -0
- package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.js +123 -0
- package/dist/commonjs/funcs/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.d.ts +17 -0
- package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.js +124 -0
- package/dist/commonjs/funcs/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/commonjs/funcs/organizationsGetFacility.js +2 -0
- package/dist/commonjs/funcs/organizationsGetFacility.js.map +1 -1
- package/dist/commonjs/funcs/organizationsListOrSearchFacilities.js +2 -0
- package/dist/commonjs/funcs/organizationsListOrSearchFacilities.js.map +1 -1
- package/dist/commonjs/funcs/supportArticlesGetSupportArticle.js +2 -0
- package/dist/commonjs/funcs/supportArticlesGetSupportArticle.js.map +1 -1
- package/dist/commonjs/funcs/supportArticlesListOrSearchSupportArticles.js +2 -0
- package/dist/commonjs/funcs/supportArticlesListOrSearchSupportArticles.js.map +1 -1
- package/dist/commonjs/funcs/usersChangePassword.js +2 -0
- package/dist/commonjs/funcs/usersChangePassword.js.map +1 -1
- package/dist/commonjs/funcs/usersGetCurrentUser.js +2 -0
- package/dist/commonjs/funcs/usersGetCurrentUser.js.map +1 -1
- package/dist/commonjs/funcs/usersGetUserById.js +2 -0
- package/dist/commonjs/funcs/usersGetUserById.js.map +1 -1
- package/dist/commonjs/funcs/usersMagiclink.js +2 -0
- package/dist/commonjs/funcs/usersMagiclink.js.map +1 -1
- package/dist/commonjs/funcs/usersPassword.js +2 -0
- package/dist/commonjs/funcs/usersPassword.js.map +1 -1
- package/dist/commonjs/funcs/usersPasswordResetRequest.js +2 -0
- package/dist/commonjs/funcs/usersPasswordResetRequest.js.map +1 -1
- package/dist/commonjs/funcs/usersPostAuthenticate.js +2 -0
- package/dist/commonjs/funcs/usersPostAuthenticate.js.map +1 -1
- package/dist/commonjs/funcs/vendorScansVendorScanOut.js +2 -0
- package/dist/commonjs/funcs/vendorScansVendorScanOut.js.map +1 -1
- package/dist/commonjs/funcs/vendorsAddVendorCredentialFile.js +2 -0
- package/dist/commonjs/funcs/vendorsAddVendorCredentialFile.js.map +1 -1
- package/dist/commonjs/funcs/vendorsAddVendorManagedByCompany.js +2 -0
- package/dist/commonjs/funcs/vendorsAddVendorManagedByCompany.js.map +1 -1
- package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.js +2 -0
- package/dist/commonjs/funcs/vendorsCreateNewVendorCredentialVersion.js.map +1 -1
- package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.js +2 -0
- package/dist/commonjs/funcs/vendorsCreateOrUpdateBcr.js.map +1 -1
- package/dist/commonjs/funcs/vendorsCreateVendorCompany.js +2 -0
- package/dist/commonjs/funcs/vendorsCreateVendorCompany.js.map +1 -1
- package/dist/commonjs/funcs/vendorsCreateVendorRegistration.js +2 -0
- package/dist/commonjs/funcs/vendorsCreateVendorRegistration.js.map +1 -1
- package/dist/commonjs/funcs/vendorsDeclineVendorCredential.js +2 -0
- package/dist/commonjs/funcs/vendorsDeclineVendorCredential.js.map +1 -1
- package/dist/commonjs/funcs/vendorsDeleteVendorCredentialFile.js +2 -0
- package/dist/commonjs/funcs/vendorsDeleteVendorCredentialFile.js.map +1 -1
- package/dist/commonjs/funcs/vendorsDeleteVendorManagedByCompany.js +2 -0
- package/dist/commonjs/funcs/vendorsDeleteVendorManagedByCompany.js.map +1 -1
- package/dist/commonjs/funcs/vendorsExpediteTimeRemaining.js +2 -0
- package/dist/commonjs/funcs/vendorsExpediteTimeRemaining.js.map +1 -1
- package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsGetVendorCredentialFile.js +2 -0
- package/dist/commonjs/funcs/vendorsGetVendorCredentialFile.js.map +1 -1
- package/dist/commonjs/funcs/vendorsGetVendorInvoiceDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsGetVendorInvoiceDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsGetVendorLegalName.js +2 -0
- package/dist/commonjs/funcs/vendorsGetVendorLegalName.js.map +1 -1
- package/dist/commonjs/funcs/vendorsGetVendorsDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsGetVendorsDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorAdditionalFacilityFields.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorAdditionalFacilityFields.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentialDataRequests.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorCredentialFiles.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentialFiles.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorCredentialHistory.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentialHistory.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorCredentials.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorCredentials.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorCredits.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorCredits.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorFacilityStatuses.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorFacilityStatuses.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorInvoices.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorInvoices.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorJobTitles.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorJobTitles.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorManagedByCompanies.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorManagedByCompanies.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorScrubDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorScrubDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorScrubPackages.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorScrubPackages.js.map +1 -1
- package/dist/commonjs/funcs/vendorsListVendorScrubPurchases.js +2 -0
- package/dist/commonjs/funcs/vendorsListVendorScrubPurchases.js.map +1 -1
- package/dist/commonjs/funcs/vendorsPurchaseScrubCredits.js +2 -0
- package/dist/commonjs/funcs/vendorsPurchaseScrubCredits.js.map +1 -1
- package/dist/commonjs/funcs/vendorsSubmitVendorCredential.js +2 -0
- package/dist/commonjs/funcs/vendorsSubmitVendorCredential.js.map +1 -1
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialFile.js +2 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialFile.js.map +1 -1
- package/dist/commonjs/funcs/vendorsUpdateVendorDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsUpdateVendorManagedByCompany.js +2 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorManagedByCompany.js.map +1 -1
- package/dist/commonjs/funcs/vendorsUpdateVendorScrubDetails.js +2 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorScrubDetails.js.map +1 -1
- package/dist/commonjs/funcs/webhooksGetWebhookEndpoint.js +2 -0
- package/dist/commonjs/funcs/webhooksGetWebhookEndpoint.js.map +1 -1
- package/dist/commonjs/funcs/webhooksListAllWebhookEndpoints.js +2 -0
- package/dist/commonjs/funcs/webhooksListAllWebhookEndpoints.js.map +1 -1
- package/dist/commonjs/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js +2 -0
- package/dist/commonjs/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js.map +1 -1
- package/dist/commonjs/funcs/zonesListOrSearchSecurityZones.js +2 -0
- package/dist/commonjs/funcs/zonesListOrSearchSecurityZones.js.map +1 -1
- package/dist/commonjs/funcs/zonesSecurityZoneCheckin.js +2 -0
- package/dist/commonjs/funcs/zonesSecurityZoneCheckin.js.map +1 -1
- package/dist/commonjs/hooks/types.d.ts +2 -0
- package/dist/commonjs/hooks/types.d.ts.map +1 -1
- package/dist/commonjs/index.d.ts +2 -0
- package/dist/commonjs/index.d.ts.map +1 -1
- package/dist/commonjs/index.js +3 -1
- package/dist/commonjs/index.js.map +1 -1
- package/dist/commonjs/lib/config.d.ts +7 -3
- package/dist/commonjs/lib/config.d.ts.map +1 -1
- package/dist/commonjs/lib/config.js +3 -3
- package/dist/commonjs/lib/config.js.map +1 -1
- package/dist/commonjs/lib/sdks.d.ts +1 -0
- package/dist/commonjs/lib/sdks.d.ts.map +1 -1
- package/dist/commonjs/lib/sdks.js +3 -3
- package/dist/commonjs/lib/sdks.js.map +1 -1
- package/dist/commonjs/mcp-server/mcp-server.js +1 -1
- package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/server.js +7 -1
- package/dist/commonjs/mcp-server/server.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.js +64 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.js +64 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.js +64 -0
- package/dist/commonjs/mcp-server/tools/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/commonjs/models/operations/adddatarequestfile.d.ts +67 -0
- package/dist/commonjs/models/operations/adddatarequestfile.d.ts.map +1 -0
- package/dist/commonjs/models/operations/adddatarequestfile.js +124 -0
- package/dist/commonjs/models/operations/adddatarequestfile.js.map +1 -0
- package/dist/commonjs/models/operations/deletedatarequestfile.d.ts +32 -0
- package/dist/commonjs/models/operations/deletedatarequestfile.d.ts.map +1 -0
- package/dist/commonjs/models/operations/deletedatarequestfile.js +69 -0
- package/dist/commonjs/models/operations/deletedatarequestfile.js.map +1 -0
- package/dist/commonjs/models/operations/index.d.ts +3 -0
- package/dist/commonjs/models/operations/index.d.ts.map +1 -1
- package/dist/commonjs/models/operations/index.js +3 -0
- package/dist/commonjs/models/operations/index.js.map +1 -1
- package/dist/commonjs/models/operations/updatedatarequest.d.ts +59 -0
- package/dist/commonjs/models/operations/updatedatarequest.d.ts.map +1 -0
- package/dist/commonjs/models/operations/updatedatarequest.js +107 -0
- package/dist/commonjs/models/operations/updatedatarequest.js.map +1 -0
- package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.d.ts +23 -0
- package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.js +51 -0
- package/dist/commonjs/react-query/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.d.ts +23 -0
- package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.js +51 -0
- package/dist/commonjs/react-query/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.d.ts +23 -0
- package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.js +51 -0
- package/dist/commonjs/react-query/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/commonjs/react-query/index.d.ts +3 -0
- package/dist/commonjs/react-query/index.d.ts.map +1 -1
- package/dist/commonjs/react-query/index.js +3 -0
- package/dist/commonjs/react-query/index.js.map +1 -1
- package/dist/commonjs/sdk/datarequests.d.ts +26 -0
- package/dist/commonjs/sdk/datarequests.d.ts.map +1 -0
- package/dist/commonjs/sdk/datarequests.js +42 -0
- package/dist/commonjs/sdk/datarequests.js.map +1 -0
- package/dist/commonjs/sdk/sdk.d.ts +3 -0
- package/dist/commonjs/sdk/sdk.d.ts.map +1 -1
- package/dist/commonjs/sdk/sdk.js +4 -0
- package/dist/commonjs/sdk/sdk.js.map +1 -1
- package/dist/esm/__tests__/datarequests.test.d.ts +2 -0
- package/dist/esm/__tests__/datarequests.test.d.ts.map +1 -0
- package/dist/esm/__tests__/datarequests.test.js +54 -0
- package/dist/esm/__tests__/datarequests.test.js.map +1 -0
- package/dist/esm/__tests__/vendors.test.js +7 -10
- package/dist/esm/__tests__/vendors.test.js.map +1 -1
- package/dist/esm/__tests__/zones.test.js +7 -36
- package/dist/esm/__tests__/zones.test.js.map +1 -1
- package/dist/esm/admin-funcs/doAdmin.d.ts.map +1 -1
- package/dist/esm/admin-funcs/doAdmin.js +3 -3
- package/dist/esm/admin-funcs/doAdmin.js.map +1 -1
- package/dist/esm/funcs/companiesListOrSearchCompanies.js +2 -0
- package/dist/esm/funcs/companiesListOrSearchCompanies.js.map +1 -1
- package/dist/esm/funcs/dataRequestsAddDataRequestFile.d.ts +17 -0
- package/dist/esm/funcs/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/esm/funcs/dataRequestsAddDataRequestFile.js +88 -0
- package/dist/esm/funcs/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.d.ts +17 -0
- package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.js +87 -0
- package/dist/esm/funcs/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/esm/funcs/dataRequestsUpdateDataRequest.d.ts +17 -0
- package/dist/esm/funcs/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/esm/funcs/dataRequestsUpdateDataRequest.js +88 -0
- package/dist/esm/funcs/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/esm/funcs/organizationsGetFacility.js +2 -0
- package/dist/esm/funcs/organizationsGetFacility.js.map +1 -1
- package/dist/esm/funcs/organizationsListOrSearchFacilities.js +2 -0
- package/dist/esm/funcs/organizationsListOrSearchFacilities.js.map +1 -1
- package/dist/esm/funcs/supportArticlesGetSupportArticle.js +2 -0
- package/dist/esm/funcs/supportArticlesGetSupportArticle.js.map +1 -1
- package/dist/esm/funcs/supportArticlesListOrSearchSupportArticles.js +2 -0
- package/dist/esm/funcs/supportArticlesListOrSearchSupportArticles.js.map +1 -1
- package/dist/esm/funcs/usersChangePassword.js +2 -0
- package/dist/esm/funcs/usersChangePassword.js.map +1 -1
- package/dist/esm/funcs/usersGetCurrentUser.js +2 -0
- package/dist/esm/funcs/usersGetCurrentUser.js.map +1 -1
- package/dist/esm/funcs/usersGetUserById.js +2 -0
- package/dist/esm/funcs/usersGetUserById.js.map +1 -1
- package/dist/esm/funcs/usersMagiclink.js +2 -0
- package/dist/esm/funcs/usersMagiclink.js.map +1 -1
- package/dist/esm/funcs/usersPassword.js +2 -0
- package/dist/esm/funcs/usersPassword.js.map +1 -1
- package/dist/esm/funcs/usersPasswordResetRequest.js +2 -0
- package/dist/esm/funcs/usersPasswordResetRequest.js.map +1 -1
- package/dist/esm/funcs/usersPostAuthenticate.js +2 -0
- package/dist/esm/funcs/usersPostAuthenticate.js.map +1 -1
- package/dist/esm/funcs/vendorScansVendorScanOut.js +2 -0
- package/dist/esm/funcs/vendorScansVendorScanOut.js.map +1 -1
- package/dist/esm/funcs/vendorsAddVendorCredentialFile.js +2 -0
- package/dist/esm/funcs/vendorsAddVendorCredentialFile.js.map +1 -1
- package/dist/esm/funcs/vendorsAddVendorManagedByCompany.js +2 -0
- package/dist/esm/funcs/vendorsAddVendorManagedByCompany.js.map +1 -1
- package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.js +2 -0
- package/dist/esm/funcs/vendorsCreateNewVendorCredentialVersion.js.map +1 -1
- package/dist/esm/funcs/vendorsCreateOrUpdateBcr.js +2 -0
- package/dist/esm/funcs/vendorsCreateOrUpdateBcr.js.map +1 -1
- package/dist/esm/funcs/vendorsCreateVendorCompany.js +2 -0
- package/dist/esm/funcs/vendorsCreateVendorCompany.js.map +1 -1
- package/dist/esm/funcs/vendorsCreateVendorRegistration.js +2 -0
- package/dist/esm/funcs/vendorsCreateVendorRegistration.js.map +1 -1
- package/dist/esm/funcs/vendorsDeclineVendorCredential.js +2 -0
- package/dist/esm/funcs/vendorsDeclineVendorCredential.js.map +1 -1
- package/dist/esm/funcs/vendorsDeleteVendorCredentialFile.js +2 -0
- package/dist/esm/funcs/vendorsDeleteVendorCredentialFile.js.map +1 -1
- package/dist/esm/funcs/vendorsDeleteVendorManagedByCompany.js +2 -0
- package/dist/esm/funcs/vendorsDeleteVendorManagedByCompany.js.map +1 -1
- package/dist/esm/funcs/vendorsExpediteTimeRemaining.js +2 -0
- package/dist/esm/funcs/vendorsExpediteTimeRemaining.js.map +1 -1
- package/dist/esm/funcs/vendorsGetVendorCredentialDetails.js +2 -0
- package/dist/esm/funcs/vendorsGetVendorCredentialDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsGetVendorCredentialFile.js +2 -0
- package/dist/esm/funcs/vendorsGetVendorCredentialFile.js.map +1 -1
- package/dist/esm/funcs/vendorsGetVendorInvoiceDetails.js +2 -0
- package/dist/esm/funcs/vendorsGetVendorInvoiceDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsGetVendorLegalName.js +2 -0
- package/dist/esm/funcs/vendorsGetVendorLegalName.js.map +1 -1
- package/dist/esm/funcs/vendorsGetVendorsDetails.js +2 -0
- package/dist/esm/funcs/vendorsGetVendorsDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorAdditionalFacilityFields.js +2 -0
- package/dist/esm/funcs/vendorsListVendorAdditionalFacilityFields.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.js +2 -0
- package/dist/esm/funcs/vendorsListVendorCredentialDataRequests.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorCredentialFiles.js +2 -0
- package/dist/esm/funcs/vendorsListVendorCredentialFiles.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorCredentialHistory.js +2 -0
- package/dist/esm/funcs/vendorsListVendorCredentialHistory.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorCredentials.js +2 -0
- package/dist/esm/funcs/vendorsListVendorCredentials.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorCredits.js +2 -0
- package/dist/esm/funcs/vendorsListVendorCredits.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorFacilityStatuses.js +2 -0
- package/dist/esm/funcs/vendorsListVendorFacilityStatuses.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorInvoices.js +2 -0
- package/dist/esm/funcs/vendorsListVendorInvoices.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorJobTitles.js +2 -0
- package/dist/esm/funcs/vendorsListVendorJobTitles.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorManagedByCompanies.js +2 -0
- package/dist/esm/funcs/vendorsListVendorManagedByCompanies.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorScrubDetails.js +2 -0
- package/dist/esm/funcs/vendorsListVendorScrubDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorScrubPackages.js +2 -0
- package/dist/esm/funcs/vendorsListVendorScrubPackages.js.map +1 -1
- package/dist/esm/funcs/vendorsListVendorScrubPurchases.js +2 -0
- package/dist/esm/funcs/vendorsListVendorScrubPurchases.js.map +1 -1
- package/dist/esm/funcs/vendorsPurchaseScrubCredits.js +2 -0
- package/dist/esm/funcs/vendorsPurchaseScrubCredits.js.map +1 -1
- package/dist/esm/funcs/vendorsSubmitVendorCredential.js +2 -0
- package/dist/esm/funcs/vendorsSubmitVendorCredential.js.map +1 -1
- package/dist/esm/funcs/vendorsUpdateVendorCredentialFile.js +2 -0
- package/dist/esm/funcs/vendorsUpdateVendorCredentialFile.js.map +1 -1
- package/dist/esm/funcs/vendorsUpdateVendorDetails.js +2 -0
- package/dist/esm/funcs/vendorsUpdateVendorDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsUpdateVendorManagedByCompany.js +2 -0
- package/dist/esm/funcs/vendorsUpdateVendorManagedByCompany.js.map +1 -1
- package/dist/esm/funcs/vendorsUpdateVendorScrubDetails.js +2 -0
- package/dist/esm/funcs/vendorsUpdateVendorScrubDetails.js.map +1 -1
- package/dist/esm/funcs/webhooksGetWebhookEndpoint.js +2 -0
- package/dist/esm/funcs/webhooksGetWebhookEndpoint.js.map +1 -1
- package/dist/esm/funcs/webhooksListAllWebhookEndpoints.js +2 -0
- package/dist/esm/funcs/webhooksListAllWebhookEndpoints.js.map +1 -1
- package/dist/esm/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js +2 -0
- package/dist/esm/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.js.map +1 -1
- package/dist/esm/funcs/zonesListOrSearchSecurityZones.js +2 -0
- package/dist/esm/funcs/zonesListOrSearchSecurityZones.js.map +1 -1
- package/dist/esm/funcs/zonesSecurityZoneCheckin.js +2 -0
- package/dist/esm/funcs/zonesSecurityZoneCheckin.js.map +1 -1
- package/dist/esm/hooks/types.d.ts +2 -0
- package/dist/esm/hooks/types.d.ts.map +1 -1
- package/dist/esm/index.d.ts +2 -0
- package/dist/esm/index.d.ts.map +1 -1
- package/dist/esm/index.js +1 -0
- package/dist/esm/index.js.map +1 -1
- package/dist/esm/lib/config.d.ts +7 -3
- package/dist/esm/lib/config.d.ts.map +1 -1
- package/dist/esm/lib/config.js +3 -3
- package/dist/esm/lib/config.js.map +1 -1
- package/dist/esm/lib/sdks.d.ts +1 -0
- package/dist/esm/lib/sdks.d.ts.map +1 -1
- package/dist/esm/lib/sdks.js +3 -3
- package/dist/esm/lib/sdks.js.map +1 -1
- package/dist/esm/mcp-server/mcp-server.js +1 -1
- package/dist/esm/mcp-server/server.d.ts.map +1 -1
- package/dist/esm/mcp-server/server.js +7 -1
- package/dist/esm/mcp-server/server.js.map +1 -1
- package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts +8 -0
- package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.js +28 -0
- package/dist/esm/mcp-server/tools/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts +8 -0
- package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.js +28 -0
- package/dist/esm/mcp-server/tools/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts +8 -0
- package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.js +28 -0
- package/dist/esm/mcp-server/tools/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/esm/models/operations/adddatarequestfile.d.ts +67 -0
- package/dist/esm/models/operations/adddatarequestfile.d.ts.map +1 -0
- package/dist/esm/models/operations/adddatarequestfile.js +84 -0
- package/dist/esm/models/operations/adddatarequestfile.js.map +1 -0
- package/dist/esm/models/operations/deletedatarequestfile.d.ts +32 -0
- package/dist/esm/models/operations/deletedatarequestfile.d.ts.map +1 -0
- package/dist/esm/models/operations/deletedatarequestfile.js +31 -0
- package/dist/esm/models/operations/deletedatarequestfile.js.map +1 -0
- package/dist/esm/models/operations/index.d.ts +3 -0
- package/dist/esm/models/operations/index.d.ts.map +1 -1
- package/dist/esm/models/operations/index.js +3 -0
- package/dist/esm/models/operations/index.js.map +1 -1
- package/dist/esm/models/operations/updatedatarequest.d.ts +59 -0
- package/dist/esm/models/operations/updatedatarequest.d.ts.map +1 -0
- package/dist/esm/models/operations/updatedatarequest.js +67 -0
- package/dist/esm/models/operations/updatedatarequest.js.map +1 -0
- package/dist/esm/react-query/dataRequestsAddDataRequestFile.d.ts +23 -0
- package/dist/esm/react-query/dataRequestsAddDataRequestFile.d.ts.map +1 -0
- package/dist/esm/react-query/dataRequestsAddDataRequestFile.js +46 -0
- package/dist/esm/react-query/dataRequestsAddDataRequestFile.js.map +1 -0
- package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.d.ts +23 -0
- package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.d.ts.map +1 -0
- package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.js +46 -0
- package/dist/esm/react-query/dataRequestsDeleteDataRequestFile.js.map +1 -0
- package/dist/esm/react-query/dataRequestsUpdateDataRequest.d.ts +23 -0
- package/dist/esm/react-query/dataRequestsUpdateDataRequest.d.ts.map +1 -0
- package/dist/esm/react-query/dataRequestsUpdateDataRequest.js +46 -0
- package/dist/esm/react-query/dataRequestsUpdateDataRequest.js.map +1 -0
- package/dist/esm/react-query/index.d.ts +3 -0
- package/dist/esm/react-query/index.d.ts.map +1 -1
- package/dist/esm/react-query/index.js +3 -0
- package/dist/esm/react-query/index.js.map +1 -1
- package/dist/esm/sdk/datarequests.d.ts +26 -0
- package/dist/esm/sdk/datarequests.d.ts.map +1 -0
- package/dist/esm/sdk/datarequests.js +38 -0
- package/dist/esm/sdk/datarequests.js.map +1 -0
- package/dist/esm/sdk/sdk.d.ts +3 -0
- package/dist/esm/sdk/sdk.d.ts.map +1 -1
- package/dist/esm/sdk/sdk.js +4 -0
- package/dist/esm/sdk/sdk.js.map +1 -1
- package/jsr.json +1 -1
- package/package.json +1 -1
- package/src/__tests__/datarequests.test.ts +63 -0
- package/src/__tests__/vendors.test.ts +7 -10
- package/src/__tests__/zones.test.ts +7 -36
- package/src/admin-funcs/doAdmin.ts +3 -4
- package/src/funcs/companiesListOrSearchCompanies.ts +2 -0
- package/src/funcs/dataRequestsAddDataRequestFile.ts +176 -0
- package/src/funcs/dataRequestsDeleteDataRequestFile.ts +176 -0
- package/src/funcs/dataRequestsUpdateDataRequest.ts +176 -0
- package/src/funcs/organizationsGetFacility.ts +2 -0
- package/src/funcs/organizationsListOrSearchFacilities.ts +2 -0
- package/src/funcs/supportArticlesGetSupportArticle.ts +2 -0
- package/src/funcs/supportArticlesListOrSearchSupportArticles.ts +2 -0
- package/src/funcs/usersChangePassword.ts +2 -0
- package/src/funcs/usersGetCurrentUser.ts +2 -0
- package/src/funcs/usersGetUserById.ts +2 -0
- package/src/funcs/usersMagiclink.ts +2 -0
- package/src/funcs/usersPassword.ts +2 -0
- package/src/funcs/usersPasswordResetRequest.ts +2 -0
- package/src/funcs/usersPostAuthenticate.ts +2 -0
- package/src/funcs/vendorScansVendorScanOut.ts +2 -0
- package/src/funcs/vendorsAddVendorCredentialFile.ts +2 -0
- package/src/funcs/vendorsAddVendorManagedByCompany.ts +2 -0
- package/src/funcs/vendorsCreateNewVendorCredentialVersion.ts +2 -0
- package/src/funcs/vendorsCreateOrUpdateBcr.ts +2 -0
- package/src/funcs/vendorsCreateVendorCompany.ts +2 -0
- package/src/funcs/vendorsCreateVendorRegistration.ts +2 -0
- package/src/funcs/vendorsDeclineVendorCredential.ts +2 -0
- package/src/funcs/vendorsDeleteVendorCredentialFile.ts +2 -0
- package/src/funcs/vendorsDeleteVendorManagedByCompany.ts +2 -0
- package/src/funcs/vendorsExpediteTimeRemaining.ts +2 -0
- package/src/funcs/vendorsGetVendorCredentialDetails.ts +2 -0
- package/src/funcs/vendorsGetVendorCredentialFile.ts +2 -0
- package/src/funcs/vendorsGetVendorInvoiceDetails.ts +2 -0
- package/src/funcs/vendorsGetVendorLegalName.ts +2 -0
- package/src/funcs/vendorsGetVendorsDetails.ts +2 -0
- package/src/funcs/vendorsListVendorAdditionalFacilityFields.ts +2 -0
- package/src/funcs/vendorsListVendorCredentialDataRequests.ts +2 -0
- package/src/funcs/vendorsListVendorCredentialFiles.ts +2 -0
- package/src/funcs/vendorsListVendorCredentialHistory.ts +2 -0
- package/src/funcs/vendorsListVendorCredentials.ts +2 -0
- package/src/funcs/vendorsListVendorCredits.ts +2 -0
- package/src/funcs/vendorsListVendorFacilityStatuses.ts +2 -0
- package/src/funcs/vendorsListVendorInvoices.ts +2 -0
- package/src/funcs/vendorsListVendorJobTitles.ts +2 -0
- package/src/funcs/vendorsListVendorManagedByCompanies.ts +2 -0
- package/src/funcs/vendorsListVendorScrubDetails.ts +2 -0
- package/src/funcs/vendorsListVendorScrubPackages.ts +2 -0
- package/src/funcs/vendorsListVendorScrubPurchases.ts +2 -0
- package/src/funcs/vendorsPurchaseScrubCredits.ts +2 -0
- package/src/funcs/vendorsSubmitVendorCredential.ts +2 -0
- package/src/funcs/vendorsUpdateVendorCredentialFile.ts +2 -0
- package/src/funcs/vendorsUpdateVendorDetails.ts +2 -0
- package/src/funcs/vendorsUpdateVendorManagedByCompany.ts +2 -0
- package/src/funcs/vendorsUpdateVendorScrubDetails.ts +2 -0
- package/src/funcs/webhooksGetWebhookEndpoint.ts +2 -0
- package/src/funcs/webhooksListAllWebhookEndpoints.ts +2 -0
- package/src/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts +2 -0
- package/src/funcs/zonesListOrSearchSecurityZones.ts +2 -0
- package/src/funcs/zonesSecurityZoneCheckin.ts +2 -0
- package/src/hooks/types.ts +2 -0
- package/src/index.ts +2 -0
- package/src/lib/config.ts +7 -3
- package/src/lib/sdks.ts +10 -4
- package/src/mcp-server/mcp-server.ts +1 -1
- package/src/mcp-server/server.ts +7 -1
- package/src/mcp-server/tools/dataRequestsAddDataRequestFile.ts +38 -0
- package/src/mcp-server/tools/dataRequestsDeleteDataRequestFile.ts +39 -0
- package/src/mcp-server/tools/dataRequestsUpdateDataRequest.ts +37 -0
- package/src/models/operations/adddatarequestfile.ts +166 -0
- package/src/models/operations/deletedatarequestfile.ts +71 -0
- package/src/models/operations/index.ts +3 -0
- package/src/models/operations/updatedatarequest.ts +142 -0
- package/src/react-query/dataRequestsAddDataRequestFile.ts +92 -0
- package/src/react-query/dataRequestsDeleteDataRequestFile.ts +92 -0
- package/src/react-query/dataRequestsUpdateDataRequest.ts +92 -0
- package/src/react-query/index.ts +3 -0
- package/src/sdk/datarequests.ts +63 -0
- package/src/sdk/sdk.ts +6 -0
package/bin/mcp-server.js
CHANGED
|
@@ -34236,9 +34236,9 @@ var init_config = __esm(() => {
|
|
|
34236
34236
|
SDK_METADATA = {
|
|
34237
34237
|
language: "typescript",
|
|
34238
34238
|
openapiDocVersion: "0.0.3",
|
|
34239
|
-
sdkVersion: "0.
|
|
34240
|
-
genVersion: "2.
|
|
34241
|
-
userAgent: "speakeasy-sdk/typescript 0.
|
|
34239
|
+
sdkVersion: "0.35.1",
|
|
34240
|
+
genVersion: "2.618.0",
|
|
34241
|
+
userAgent: "speakeasy-sdk/typescript 0.35.1 2.618.0 0.0.3 @greensecurity/javascript-sdk"
|
|
34242
34242
|
};
|
|
34243
34243
|
});
|
|
34244
34244
|
|
|
@@ -34804,7 +34804,6 @@ class ClientSDK {
|
|
|
34804
34804
|
} else {
|
|
34805
34805
|
this.#hooks = new SDKHooks;
|
|
34806
34806
|
}
|
|
34807
|
-
this._options = { ...options, hooks: this.#hooks };
|
|
34808
34807
|
const url = serverURLFromOptions(options);
|
|
34809
34808
|
if (url) {
|
|
34810
34809
|
url.pathname = url.pathname.replace(/\/+$/, "") + "/";
|
|
@@ -34815,7 +34814,8 @@ class ClientSDK {
|
|
|
34815
34814
|
});
|
|
34816
34815
|
this._baseURL = baseURL;
|
|
34817
34816
|
this.#httpClient = client;
|
|
34818
|
-
this
|
|
34817
|
+
this._options = { ...options, hooks: this.#hooks };
|
|
34818
|
+
this.#logger = this._options.debugLogger;
|
|
34819
34819
|
if (!this.#logger && env().GREEN_SECURITY_DEBUG) {
|
|
34820
34820
|
this.#logger = console;
|
|
34821
34821
|
}
|
|
@@ -34869,7 +34869,7 @@ class ClientSDK {
|
|
|
34869
34869
|
headers.set(k2, v2);
|
|
34870
34870
|
}
|
|
34871
34871
|
if (!isBrowserLike) {
|
|
34872
|
-
headers.set(conf.uaHeader ?? "user-agent", SDK_METADATA.userAgent);
|
|
34872
|
+
headers.set(conf.uaHeader ?? "user-agent", conf.userAgent ?? SDK_METADATA.userAgent);
|
|
34873
34873
|
}
|
|
34874
34874
|
const fetchOptions = {
|
|
34875
34875
|
...options?.fetchOptions,
|
|
@@ -40177,6 +40177,60 @@ var init_components = __esm(() => {
|
|
|
40177
40177
|
init_zoneconfig();
|
|
40178
40178
|
});
|
|
40179
40179
|
|
|
40180
|
+
// src/models/operations/adddatarequestfile.ts
|
|
40181
|
+
var AddDataRequestFileRequestBody$inboundSchema, AddDataRequestFileRequestBody$outboundSchema, AddDataRequestFileRequestBody$, AddDataRequestFileRequest$inboundSchema, AddDataRequestFileRequest$outboundSchema, AddDataRequestFileRequest$;
|
|
40182
|
+
var init_adddatarequestfile = __esm(() => {
|
|
40183
|
+
init_esm();
|
|
40184
|
+
init_primitives();
|
|
40185
|
+
init_components();
|
|
40186
|
+
AddDataRequestFileRequestBody$inboundSchema = objectType({
|
|
40187
|
+
file_name: stringType().optional(),
|
|
40188
|
+
content_type: ContentType$inboundSchema.optional(),
|
|
40189
|
+
file_size: numberType().int().optional()
|
|
40190
|
+
}).transform((v2) => {
|
|
40191
|
+
return remap(v2, {
|
|
40192
|
+
file_name: "fileName",
|
|
40193
|
+
content_type: "contentType",
|
|
40194
|
+
file_size: "fileSize"
|
|
40195
|
+
});
|
|
40196
|
+
});
|
|
40197
|
+
AddDataRequestFileRequestBody$outboundSchema = objectType({
|
|
40198
|
+
fileName: stringType().optional(),
|
|
40199
|
+
contentType: ContentType$outboundSchema.optional(),
|
|
40200
|
+
fileSize: numberType().int().optional()
|
|
40201
|
+
}).transform((v2) => {
|
|
40202
|
+
return remap(v2, {
|
|
40203
|
+
fileName: "file_name",
|
|
40204
|
+
contentType: "content_type",
|
|
40205
|
+
fileSize: "file_size"
|
|
40206
|
+
});
|
|
40207
|
+
});
|
|
40208
|
+
((AddDataRequestFileRequestBody$) => {
|
|
40209
|
+
AddDataRequestFileRequestBody$.inboundSchema = AddDataRequestFileRequestBody$inboundSchema;
|
|
40210
|
+
AddDataRequestFileRequestBody$.outboundSchema = AddDataRequestFileRequestBody$outboundSchema;
|
|
40211
|
+
})(AddDataRequestFileRequestBody$ ||= {});
|
|
40212
|
+
AddDataRequestFileRequest$inboundSchema = objectType({
|
|
40213
|
+
id: numberType().int(),
|
|
40214
|
+
RequestBody: lazyType(() => AddDataRequestFileRequestBody$inboundSchema)
|
|
40215
|
+
}).transform((v2) => {
|
|
40216
|
+
return remap(v2, {
|
|
40217
|
+
RequestBody: "requestBody"
|
|
40218
|
+
});
|
|
40219
|
+
});
|
|
40220
|
+
AddDataRequestFileRequest$outboundSchema = objectType({
|
|
40221
|
+
id: numberType().int(),
|
|
40222
|
+
requestBody: lazyType(() => AddDataRequestFileRequestBody$outboundSchema)
|
|
40223
|
+
}).transform((v2) => {
|
|
40224
|
+
return remap(v2, {
|
|
40225
|
+
requestBody: "RequestBody"
|
|
40226
|
+
});
|
|
40227
|
+
});
|
|
40228
|
+
((AddDataRequestFileRequest$) => {
|
|
40229
|
+
AddDataRequestFileRequest$.inboundSchema = AddDataRequestFileRequest$inboundSchema;
|
|
40230
|
+
AddDataRequestFileRequest$.outboundSchema = AddDataRequestFileRequest$outboundSchema;
|
|
40231
|
+
})(AddDataRequestFileRequest$ ||= {});
|
|
40232
|
+
});
|
|
40233
|
+
|
|
40180
40234
|
// src/models/operations/addvendorcredentialfile.ts
|
|
40181
40235
|
var AddVendorCredentialFileRequestBody$inboundSchema, AddVendorCredentialFileRequestBody$outboundSchema, AddVendorCredentialFileRequestBody$, AddVendorCredentialFileRequest$inboundSchema, AddVendorCredentialFileRequest$outboundSchema, AddVendorCredentialFileRequest$, AddVendorCredentialFileResponseBody$inboundSchema, AddVendorCredentialFileResponseBody$outboundSchema, AddVendorCredentialFileResponseBody$;
|
|
40182
40236
|
var init_addvendorcredentialfile = __esm(() => {
|
|
@@ -40618,6 +40672,22 @@ var init_declinevendorcredential = __esm(() => {
|
|
|
40618
40672
|
})(DeclineVendorCredentialRequest$ ||= {});
|
|
40619
40673
|
});
|
|
40620
40674
|
|
|
40675
|
+
// src/models/operations/deletedatarequestfile.ts
|
|
40676
|
+
var DeleteDataRequestFileRequest$inboundSchema, DeleteDataRequestFileRequest$outboundSchema, DeleteDataRequestFileRequest$;
|
|
40677
|
+
var init_deletedatarequestfile = __esm(() => {
|
|
40678
|
+
init_esm();
|
|
40679
|
+
DeleteDataRequestFileRequest$inboundSchema = objectType({
|
|
40680
|
+
id: numberType().int()
|
|
40681
|
+
});
|
|
40682
|
+
DeleteDataRequestFileRequest$outboundSchema = objectType({
|
|
40683
|
+
id: numberType().int()
|
|
40684
|
+
});
|
|
40685
|
+
((DeleteDataRequestFileRequest$) => {
|
|
40686
|
+
DeleteDataRequestFileRequest$.inboundSchema = DeleteDataRequestFileRequest$inboundSchema;
|
|
40687
|
+
DeleteDataRequestFileRequest$.outboundSchema = DeleteDataRequestFileRequest$outboundSchema;
|
|
40688
|
+
})(DeleteDataRequestFileRequest$ ||= {});
|
|
40689
|
+
});
|
|
40690
|
+
|
|
40621
40691
|
// src/models/operations/deletevendorcredentialfile.ts
|
|
40622
40692
|
var DeleteVendorCredentialFileRequest$inboundSchema, DeleteVendorCredentialFileRequest$outboundSchema, DeleteVendorCredentialFileRequest$;
|
|
40623
40693
|
var init_deletevendorcredentialfile = __esm(() => {
|
|
@@ -42719,6 +42789,43 @@ var init_submitvendorcredential = __esm(() => {
|
|
|
42719
42789
|
})(SubmitVendorCredentialRequest$ ||= {});
|
|
42720
42790
|
});
|
|
42721
42791
|
|
|
42792
|
+
// src/models/operations/updatedatarequest.ts
|
|
42793
|
+
var UpdateDataRequestRequestBody$inboundSchema, UpdateDataRequestRequestBody$outboundSchema, UpdateDataRequestRequestBody$, UpdateDataRequestRequest$inboundSchema, UpdateDataRequestRequest$outboundSchema, UpdateDataRequestRequest$;
|
|
42794
|
+
var init_updatedatarequest = __esm(() => {
|
|
42795
|
+
init_esm();
|
|
42796
|
+
init_primitives();
|
|
42797
|
+
UpdateDataRequestRequestBody$inboundSchema = objectType({
|
|
42798
|
+
value: stringType().optional()
|
|
42799
|
+
});
|
|
42800
|
+
UpdateDataRequestRequestBody$outboundSchema = objectType({
|
|
42801
|
+
value: stringType().optional()
|
|
42802
|
+
});
|
|
42803
|
+
((UpdateDataRequestRequestBody$) => {
|
|
42804
|
+
UpdateDataRequestRequestBody$.inboundSchema = UpdateDataRequestRequestBody$inboundSchema;
|
|
42805
|
+
UpdateDataRequestRequestBody$.outboundSchema = UpdateDataRequestRequestBody$outboundSchema;
|
|
42806
|
+
})(UpdateDataRequestRequestBody$ ||= {});
|
|
42807
|
+
UpdateDataRequestRequest$inboundSchema = objectType({
|
|
42808
|
+
id: numberType().int(),
|
|
42809
|
+
RequestBody: lazyType(() => UpdateDataRequestRequestBody$inboundSchema)
|
|
42810
|
+
}).transform((v2) => {
|
|
42811
|
+
return remap(v2, {
|
|
42812
|
+
RequestBody: "requestBody"
|
|
42813
|
+
});
|
|
42814
|
+
});
|
|
42815
|
+
UpdateDataRequestRequest$outboundSchema = objectType({
|
|
42816
|
+
id: numberType().int(),
|
|
42817
|
+
requestBody: lazyType(() => UpdateDataRequestRequestBody$outboundSchema)
|
|
42818
|
+
}).transform((v2) => {
|
|
42819
|
+
return remap(v2, {
|
|
42820
|
+
requestBody: "RequestBody"
|
|
42821
|
+
});
|
|
42822
|
+
});
|
|
42823
|
+
((UpdateDataRequestRequest$) => {
|
|
42824
|
+
UpdateDataRequestRequest$.inboundSchema = UpdateDataRequestRequest$inboundSchema;
|
|
42825
|
+
UpdateDataRequestRequest$.outboundSchema = UpdateDataRequestRequest$outboundSchema;
|
|
42826
|
+
})(UpdateDataRequestRequest$ ||= {});
|
|
42827
|
+
});
|
|
42828
|
+
|
|
42722
42829
|
// src/models/operations/updatesthewebhookendpointwiththegivenid.ts
|
|
42723
42830
|
var UpdatesTheWebhookEndpointWithTheGivenIdRequest$inboundSchema, UpdatesTheWebhookEndpointWithTheGivenIdRequest$outboundSchema, UpdatesTheWebhookEndpointWithTheGivenIdRequest$;
|
|
42724
42831
|
var init_updatesthewebhookendpointwiththegivenid = __esm(() => {
|
|
@@ -43079,6 +43186,7 @@ var init_vendorscanout = __esm(() => {
|
|
|
43079
43186
|
|
|
43080
43187
|
// src/models/operations/index.ts
|
|
43081
43188
|
var init_operations = __esm(() => {
|
|
43189
|
+
init_adddatarequestfile();
|
|
43082
43190
|
init_addvendorcredentialfile();
|
|
43083
43191
|
init_addvendormanagedbycompany();
|
|
43084
43192
|
init_changepassword();
|
|
@@ -43087,6 +43195,7 @@ var init_operations = __esm(() => {
|
|
|
43087
43195
|
init_createvendorcompany();
|
|
43088
43196
|
init_createvendorregistration();
|
|
43089
43197
|
init_declinevendorcredential();
|
|
43198
|
+
init_deletedatarequestfile();
|
|
43090
43199
|
init_deletevendorcredentialfile();
|
|
43091
43200
|
init_deletevendormanagedbycompany();
|
|
43092
43201
|
init_expeditetimeremaining();
|
|
@@ -43124,6 +43233,7 @@ var init_operations = __esm(() => {
|
|
|
43124
43233
|
init_purchasescrubcredits();
|
|
43125
43234
|
init_securityzonecheckin();
|
|
43126
43235
|
init_submitvendorcredential();
|
|
43236
|
+
init_updatedatarequest();
|
|
43127
43237
|
init_updatesthewebhookendpointwiththegivenid();
|
|
43128
43238
|
init_updatevendorcredentialfile();
|
|
43129
43239
|
init_updatevendordetails();
|
|
@@ -43215,6 +43325,7 @@ async function $do(client, request, options) {
|
|
|
43215
43325
|
const securityInput = await extractSecurity(client._options.security);
|
|
43216
43326
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43217
43327
|
const context = {
|
|
43328
|
+
options: client._options,
|
|
43218
43329
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43219
43330
|
operationID: "listOrSearchCompanies",
|
|
43220
43331
|
oAuth2Scopes: [],
|
|
@@ -43231,6 +43342,7 @@ async function $do(client, request, options) {
|
|
|
43231
43342
|
headers,
|
|
43232
43343
|
query,
|
|
43233
43344
|
body,
|
|
43345
|
+
userAgent: client._options.userAgent,
|
|
43234
43346
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43235
43347
|
}, options);
|
|
43236
43348
|
if (!requestRes.ok) {
|
|
@@ -43329,32 +43441,34 @@ List or search companies.`,
|
|
|
43329
43441
|
};
|
|
43330
43442
|
});
|
|
43331
43443
|
|
|
43332
|
-
// src/funcs/
|
|
43333
|
-
function
|
|
43444
|
+
// src/funcs/dataRequestsAddDataRequestFile.ts
|
|
43445
|
+
function dataRequestsAddDataRequestFile(client, request, options) {
|
|
43334
43446
|
return new APIPromise($do2(client, request, options));
|
|
43335
43447
|
}
|
|
43336
43448
|
async function $do2(client, request, options) {
|
|
43337
|
-
const parsed = safeParse(request, (value) =>
|
|
43449
|
+
const parsed = safeParse(request, (value) => AddDataRequestFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43338
43450
|
if (!parsed.ok) {
|
|
43339
43451
|
return [parsed, { status: "invalid" }];
|
|
43340
43452
|
}
|
|
43341
43453
|
const payload = parsed.value;
|
|
43342
|
-
const body =
|
|
43454
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
43343
43455
|
const pathParams = {
|
|
43344
43456
|
id: encodeSimple("id", payload.id, {
|
|
43345
43457
|
explode: false,
|
|
43346
43458
|
charEncoding: "percent"
|
|
43347
43459
|
})
|
|
43348
43460
|
};
|
|
43349
|
-
const path = pathToFunc("/
|
|
43461
|
+
const path = pathToFunc("/data_requests/{id}/file")(pathParams);
|
|
43350
43462
|
const headers = new Headers(compactMap({
|
|
43463
|
+
"Content-Type": "application/json",
|
|
43351
43464
|
Accept: "application/json"
|
|
43352
43465
|
}));
|
|
43353
43466
|
const securityInput = await extractSecurity(client._options.security);
|
|
43354
43467
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43355
43468
|
const context = {
|
|
43469
|
+
options: client._options,
|
|
43356
43470
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43357
|
-
operationID: "
|
|
43471
|
+
operationID: "addDataRequestFile",
|
|
43358
43472
|
oAuth2Scopes: [],
|
|
43359
43473
|
resolvedSecurity: requestSecurity,
|
|
43360
43474
|
securitySource: client._options.security,
|
|
@@ -43363,11 +43477,12 @@ async function $do2(client, request, options) {
|
|
|
43363
43477
|
};
|
|
43364
43478
|
const requestRes = client._createRequest(context, {
|
|
43365
43479
|
security: requestSecurity,
|
|
43366
|
-
method: "
|
|
43480
|
+
method: "POST",
|
|
43367
43481
|
baseURL: options?.serverURL,
|
|
43368
43482
|
path,
|
|
43369
43483
|
headers,
|
|
43370
43484
|
body,
|
|
43485
|
+
userAgent: client._options.userAgent,
|
|
43371
43486
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43372
43487
|
}, options);
|
|
43373
43488
|
if (!requestRes.ok) {
|
|
@@ -43376,7 +43491,7 @@ async function $do2(client, request, options) {
|
|
|
43376
43491
|
const req = requestRes.value;
|
|
43377
43492
|
const doResult = await client._do(req, {
|
|
43378
43493
|
context,
|
|
43379
|
-
errorCodes: ["400", "401", "403", "
|
|
43494
|
+
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
43380
43495
|
retryConfig: context.retryConfig,
|
|
43381
43496
|
retryCodes: context.retryCodes
|
|
43382
43497
|
});
|
|
@@ -43387,42 +43502,42 @@ async function $do2(client, request, options) {
|
|
|
43387
43502
|
const responseFields = {
|
|
43388
43503
|
HttpMeta: { Response: response, Request: req }
|
|
43389
43504
|
};
|
|
43390
|
-
const [result] = await match(json(200,
|
|
43505
|
+
const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43391
43506
|
if (!result.ok) {
|
|
43392
43507
|
return [result, { status: "complete", request: req, response }];
|
|
43393
43508
|
}
|
|
43394
43509
|
return [result, { status: "complete", request: req, response }];
|
|
43395
43510
|
}
|
|
43396
|
-
var
|
|
43511
|
+
var init_dataRequestsAddDataRequestFile = __esm(() => {
|
|
43512
|
+
init_esm();
|
|
43397
43513
|
init_encodings();
|
|
43398
43514
|
init_matchers();
|
|
43399
43515
|
init_primitives();
|
|
43400
43516
|
init_schemas();
|
|
43401
43517
|
init_security();
|
|
43402
43518
|
init_url();
|
|
43403
|
-
init_components();
|
|
43404
43519
|
init_errors2();
|
|
43405
43520
|
init_operations();
|
|
43406
43521
|
init_async();
|
|
43407
43522
|
});
|
|
43408
43523
|
|
|
43409
|
-
// src/mcp-server/tools/
|
|
43410
|
-
var args2, tool$
|
|
43411
|
-
var
|
|
43412
|
-
|
|
43524
|
+
// src/mcp-server/tools/dataRequestsAddDataRequestFile.ts
|
|
43525
|
+
var args2, tool$dataRequestsAddDataRequestFile;
|
|
43526
|
+
var init_dataRequestsAddDataRequestFile2 = __esm(() => {
|
|
43527
|
+
init_dataRequestsAddDataRequestFile();
|
|
43413
43528
|
init_operations();
|
|
43414
43529
|
init_tools();
|
|
43415
43530
|
args2 = {
|
|
43416
|
-
request:
|
|
43531
|
+
request: AddDataRequestFileRequest$inboundSchema
|
|
43417
43532
|
};
|
|
43418
|
-
tool$
|
|
43419
|
-
name: "
|
|
43420
|
-
description: `
|
|
43533
|
+
tool$dataRequestsAddDataRequestFile = {
|
|
43534
|
+
name: "data-requests-add-data-request-file",
|
|
43535
|
+
description: `Add vendor credential data request
|
|
43421
43536
|
|
|
43422
|
-
|
|
43537
|
+
It will set the vendor credential data request file attributes`,
|
|
43423
43538
|
args: args2,
|
|
43424
43539
|
tool: async (client, args3, ctx) => {
|
|
43425
|
-
const [result, apiCall] = await
|
|
43540
|
+
const [result, apiCall] = await dataRequestsAddDataRequestFile(client, args3.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43426
43541
|
if (!result.ok) {
|
|
43427
43542
|
return {
|
|
43428
43543
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43435,40 +43550,33 @@ Retrieve an individual facility.`,
|
|
|
43435
43550
|
};
|
|
43436
43551
|
});
|
|
43437
43552
|
|
|
43438
|
-
// src/funcs/
|
|
43439
|
-
function
|
|
43553
|
+
// src/funcs/dataRequestsDeleteDataRequestFile.ts
|
|
43554
|
+
function dataRequestsDeleteDataRequestFile(client, request, options) {
|
|
43440
43555
|
return new APIPromise($do3(client, request, options));
|
|
43441
43556
|
}
|
|
43442
43557
|
async function $do3(client, request, options) {
|
|
43443
|
-
const parsed = safeParse(request, (value) =>
|
|
43558
|
+
const parsed = safeParse(request, (value) => DeleteDataRequestFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43444
43559
|
if (!parsed.ok) {
|
|
43445
|
-
return [
|
|
43560
|
+
return [parsed, { status: "invalid" }];
|
|
43446
43561
|
}
|
|
43447
43562
|
const payload = parsed.value;
|
|
43448
43563
|
const body = null;
|
|
43449
|
-
const
|
|
43450
|
-
|
|
43451
|
-
|
|
43452
|
-
|
|
43453
|
-
|
|
43454
|
-
|
|
43455
|
-
|
|
43456
|
-
latitude: payload.latitude,
|
|
43457
|
-
longitude: payload.longitude,
|
|
43458
|
-
name_like: payload.name_like,
|
|
43459
|
-
page: payload.page,
|
|
43460
|
-
sort: payload.sort,
|
|
43461
|
-
state_like: payload.state_like,
|
|
43462
|
-
system_id: payload.system_id
|
|
43463
|
-
}));
|
|
43564
|
+
const pathParams = {
|
|
43565
|
+
id: encodeSimple("id", payload.id, {
|
|
43566
|
+
explode: false,
|
|
43567
|
+
charEncoding: "percent"
|
|
43568
|
+
})
|
|
43569
|
+
};
|
|
43570
|
+
const path = pathToFunc("/data_requests/{id}/file")(pathParams);
|
|
43464
43571
|
const headers = new Headers(compactMap({
|
|
43465
43572
|
Accept: "application/json"
|
|
43466
43573
|
}));
|
|
43467
43574
|
const securityInput = await extractSecurity(client._options.security);
|
|
43468
43575
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43469
43576
|
const context = {
|
|
43577
|
+
options: client._options,
|
|
43470
43578
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43471
|
-
operationID: "
|
|
43579
|
+
operationID: "deleteDataRequestFile",
|
|
43472
43580
|
oAuth2Scopes: [],
|
|
43473
43581
|
resolvedSecurity: requestSecurity,
|
|
43474
43582
|
securitySource: client._options.security,
|
|
@@ -43477,16 +43585,16 @@ async function $do3(client, request, options) {
|
|
|
43477
43585
|
};
|
|
43478
43586
|
const requestRes = client._createRequest(context, {
|
|
43479
43587
|
security: requestSecurity,
|
|
43480
|
-
method: "
|
|
43588
|
+
method: "DELETE",
|
|
43481
43589
|
baseURL: options?.serverURL,
|
|
43482
43590
|
path,
|
|
43483
43591
|
headers,
|
|
43484
|
-
query,
|
|
43485
43592
|
body,
|
|
43593
|
+
userAgent: client._options.userAgent,
|
|
43486
43594
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43487
43595
|
}, options);
|
|
43488
43596
|
if (!requestRes.ok) {
|
|
43489
|
-
return [
|
|
43597
|
+
return [requestRes, { status: "invalid" }];
|
|
43490
43598
|
}
|
|
43491
43599
|
const req = requestRes.value;
|
|
43492
43600
|
const doResult = await client._do(req, {
|
|
@@ -43496,50 +43604,20 @@ async function $do3(client, request, options) {
|
|
|
43496
43604
|
retryCodes: context.retryCodes
|
|
43497
43605
|
});
|
|
43498
43606
|
if (!doResult.ok) {
|
|
43499
|
-
return [
|
|
43607
|
+
return [doResult, { status: "request-error", request: req }];
|
|
43500
43608
|
}
|
|
43501
43609
|
const response = doResult.value;
|
|
43502
43610
|
const responseFields = {
|
|
43503
43611
|
HttpMeta: { Response: response, Request: req }
|
|
43504
43612
|
};
|
|
43505
|
-
const [result
|
|
43506
|
-
key: "Result"
|
|
43507
|
-
}), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43613
|
+
const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43508
43614
|
if (!result.ok) {
|
|
43509
|
-
return [
|
|
43510
|
-
status: "complete",
|
|
43511
|
-
request: req,
|
|
43512
|
-
response
|
|
43513
|
-
}];
|
|
43615
|
+
return [result, { status: "complete", request: req, response }];
|
|
43514
43616
|
}
|
|
43515
|
-
|
|
43516
|
-
const page2 = request?.page ?? 1;
|
|
43517
|
-
const nextPage = page2 + 1;
|
|
43518
|
-
if (!responseData) {
|
|
43519
|
-
return { next: () => null };
|
|
43520
|
-
}
|
|
43521
|
-
const results = dlv(responseData, "items");
|
|
43522
|
-
if (!Array.isArray(results) || !results.length) {
|
|
43523
|
-
return { next: () => null };
|
|
43524
|
-
}
|
|
43525
|
-
const limit = request?.itemsPerPage ?? 0;
|
|
43526
|
-
if (results.length < limit) {
|
|
43527
|
-
return { next: () => null };
|
|
43528
|
-
}
|
|
43529
|
-
const nextVal = () => organizationsListOrSearchFacilities(client, {
|
|
43530
|
-
...request,
|
|
43531
|
-
page: nextPage
|
|
43532
|
-
}, options);
|
|
43533
|
-
return { next: nextVal, "~next": { page: nextPage } };
|
|
43534
|
-
};
|
|
43535
|
-
const page = { ...result, ...nextFunc(raw) };
|
|
43536
|
-
return [{ ...page, ...createPageIterator(page, (v2) => !v2.ok) }, {
|
|
43537
|
-
status: "complete",
|
|
43538
|
-
request: req,
|
|
43539
|
-
response
|
|
43540
|
-
}];
|
|
43617
|
+
return [result, { status: "complete", request: req, response }];
|
|
43541
43618
|
}
|
|
43542
|
-
var
|
|
43619
|
+
var init_dataRequestsDeleteDataRequestFile = __esm(() => {
|
|
43620
|
+
init_esm();
|
|
43543
43621
|
init_encodings();
|
|
43544
43622
|
init_matchers();
|
|
43545
43623
|
init_primitives();
|
|
@@ -43549,80 +43627,65 @@ var init_organizationsListOrSearchFacilities = __esm(() => {
|
|
|
43549
43627
|
init_errors2();
|
|
43550
43628
|
init_operations();
|
|
43551
43629
|
init_async();
|
|
43552
|
-
init_operations2();
|
|
43553
43630
|
});
|
|
43554
43631
|
|
|
43555
|
-
// src/mcp-server/tools/
|
|
43556
|
-
var args3, tool$
|
|
43557
|
-
var
|
|
43558
|
-
|
|
43632
|
+
// src/mcp-server/tools/dataRequestsDeleteDataRequestFile.ts
|
|
43633
|
+
var args3, tool$dataRequestsDeleteDataRequestFile;
|
|
43634
|
+
var init_dataRequestsDeleteDataRequestFile2 = __esm(() => {
|
|
43635
|
+
init_dataRequestsDeleteDataRequestFile();
|
|
43559
43636
|
init_operations();
|
|
43560
43637
|
init_tools();
|
|
43561
43638
|
args3 = {
|
|
43562
|
-
request:
|
|
43639
|
+
request: DeleteDataRequestFileRequest$inboundSchema
|
|
43563
43640
|
};
|
|
43564
|
-
tool$
|
|
43565
|
-
name: "
|
|
43566
|
-
description: `
|
|
43567
|
-
|
|
43568
|
-
List or search facilities.
|
|
43641
|
+
tool$dataRequestsDeleteDataRequestFile = {
|
|
43642
|
+
name: "data-requests-delete-data-request-file",
|
|
43643
|
+
description: `Delete vendor credential data request file
|
|
43569
43644
|
|
|
43570
|
-
|
|
43571
|
-
|
|
43572
|
-
- facility.appointment_policy
|
|
43573
|
-
- facility.contacts
|
|
43574
|
-
- facility.vendor_counts
|
|
43575
|
-
- facility.flu_credential
|
|
43576
|
-
- facility.scrubs_policy
|
|
43577
|
-
- facility.system
|
|
43578
|
-
- facility.vendor_guest_policy
|
|
43579
|
-
- facility.vendor_policy
|
|
43580
|
-
- facility.visitor_policy
|
|
43581
|
-
- facility.workflow`,
|
|
43645
|
+
It will delete the vendor credential data request file`,
|
|
43582
43646
|
args: args3,
|
|
43583
43647
|
tool: async (client, args4, ctx) => {
|
|
43584
|
-
const [result, apiCall] = await
|
|
43648
|
+
const [result, apiCall] = await dataRequestsDeleteDataRequestFile(client, args4.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43585
43649
|
if (!result.ok) {
|
|
43586
43650
|
return {
|
|
43587
43651
|
content: [{ type: "text", text: result.error.message }],
|
|
43588
43652
|
isError: true
|
|
43589
43653
|
};
|
|
43590
43654
|
}
|
|
43591
|
-
const value = result.value
|
|
43655
|
+
const value = result.value;
|
|
43592
43656
|
return formatResult(value, apiCall);
|
|
43593
43657
|
}
|
|
43594
43658
|
};
|
|
43595
43659
|
});
|
|
43596
43660
|
|
|
43597
|
-
// src/funcs/
|
|
43598
|
-
function
|
|
43661
|
+
// src/funcs/dataRequestsUpdateDataRequest.ts
|
|
43662
|
+
function dataRequestsUpdateDataRequest(client, request, options) {
|
|
43599
43663
|
return new APIPromise($do4(client, request, options));
|
|
43600
43664
|
}
|
|
43601
43665
|
async function $do4(client, request, options) {
|
|
43602
|
-
const parsed = safeParse(request, (value) =>
|
|
43666
|
+
const parsed = safeParse(request, (value) => UpdateDataRequestRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43603
43667
|
if (!parsed.ok) {
|
|
43604
43668
|
return [parsed, { status: "invalid" }];
|
|
43605
43669
|
}
|
|
43606
43670
|
const payload = parsed.value;
|
|
43607
|
-
const body =
|
|
43671
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
43608
43672
|
const pathParams = {
|
|
43609
43673
|
id: encodeSimple("id", payload.id, {
|
|
43610
43674
|
explode: false,
|
|
43611
43675
|
charEncoding: "percent"
|
|
43612
43676
|
})
|
|
43613
43677
|
};
|
|
43614
|
-
const path = pathToFunc("/
|
|
43615
|
-
const query = encodeFormQuery({
|
|
43616
|
-
expand: payload.expand
|
|
43617
|
-
}, { explode: false });
|
|
43678
|
+
const path = pathToFunc("/data_requests/{id}")(pathParams);
|
|
43618
43679
|
const headers = new Headers(compactMap({
|
|
43680
|
+
"Content-Type": "application/json",
|
|
43619
43681
|
Accept: "application/json"
|
|
43620
43682
|
}));
|
|
43621
43683
|
const securityInput = await extractSecurity(client._options.security);
|
|
43622
43684
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43623
43685
|
const context = {
|
|
43686
|
+
options: client._options,
|
|
43624
43687
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43625
|
-
operationID: "
|
|
43688
|
+
operationID: "updateDataRequest",
|
|
43626
43689
|
oAuth2Scopes: [],
|
|
43627
43690
|
resolvedSecurity: requestSecurity,
|
|
43628
43691
|
securitySource: client._options.security,
|
|
@@ -43631,12 +43694,12 @@ async function $do4(client, request, options) {
|
|
|
43631
43694
|
};
|
|
43632
43695
|
const requestRes = client._createRequest(context, {
|
|
43633
43696
|
security: requestSecurity,
|
|
43634
|
-
method: "
|
|
43697
|
+
method: "PUT",
|
|
43635
43698
|
baseURL: options?.serverURL,
|
|
43636
43699
|
path,
|
|
43637
43700
|
headers,
|
|
43638
|
-
query,
|
|
43639
43701
|
body,
|
|
43702
|
+
userAgent: client._options.userAgent,
|
|
43640
43703
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43641
43704
|
}, options);
|
|
43642
43705
|
if (!requestRes.ok) {
|
|
@@ -43645,7 +43708,7 @@ async function $do4(client, request, options) {
|
|
|
43645
43708
|
const req = requestRes.value;
|
|
43646
43709
|
const doResult = await client._do(req, {
|
|
43647
43710
|
context,
|
|
43648
|
-
errorCodes: ["400", "401", "403", "
|
|
43711
|
+
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
43649
43712
|
retryConfig: context.retryConfig,
|
|
43650
43713
|
retryCodes: context.retryCodes
|
|
43651
43714
|
});
|
|
@@ -43656,49 +43719,42 @@ async function $do4(client, request, options) {
|
|
|
43656
43719
|
const responseFields = {
|
|
43657
43720
|
HttpMeta: { Response: response, Request: req }
|
|
43658
43721
|
};
|
|
43659
|
-
const [result] = await match(json(200,
|
|
43722
|
+
const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43660
43723
|
if (!result.ok) {
|
|
43661
43724
|
return [result, { status: "complete", request: req, response }];
|
|
43662
43725
|
}
|
|
43663
43726
|
return [result, { status: "complete", request: req, response }];
|
|
43664
43727
|
}
|
|
43665
|
-
var
|
|
43728
|
+
var init_dataRequestsUpdateDataRequest = __esm(() => {
|
|
43729
|
+
init_esm();
|
|
43666
43730
|
init_encodings();
|
|
43667
43731
|
init_matchers();
|
|
43668
43732
|
init_primitives();
|
|
43669
43733
|
init_schemas();
|
|
43670
43734
|
init_security();
|
|
43671
43735
|
init_url();
|
|
43672
|
-
init_components();
|
|
43673
43736
|
init_errors2();
|
|
43674
43737
|
init_operations();
|
|
43675
43738
|
init_async();
|
|
43676
43739
|
});
|
|
43677
43740
|
|
|
43678
|
-
// src/mcp-server/tools/
|
|
43679
|
-
var args4, tool$
|
|
43680
|
-
var
|
|
43681
|
-
|
|
43741
|
+
// src/mcp-server/tools/dataRequestsUpdateDataRequest.ts
|
|
43742
|
+
var args4, tool$dataRequestsUpdateDataRequest;
|
|
43743
|
+
var init_dataRequestsUpdateDataRequest2 = __esm(() => {
|
|
43744
|
+
init_dataRequestsUpdateDataRequest();
|
|
43682
43745
|
init_operations();
|
|
43683
43746
|
init_tools();
|
|
43684
43747
|
args4 = {
|
|
43685
|
-
request:
|
|
43748
|
+
request: UpdateDataRequestRequest$inboundSchema
|
|
43686
43749
|
};
|
|
43687
|
-
tool$
|
|
43688
|
-
name: "
|
|
43689
|
-
description: `
|
|
43690
|
-
|
|
43691
|
-
Retrieve an individual support article.
|
|
43692
|
-
|
|
43693
|
-
Available \`expand\` scopes are:
|
|
43750
|
+
tool$dataRequestsUpdateDataRequest = {
|
|
43751
|
+
name: "data-requests-update-data-request",
|
|
43752
|
+
description: `Update vendor credential data request
|
|
43694
43753
|
|
|
43695
|
-
|
|
43696
|
-
- support_article.published
|
|
43697
|
-
- support_article.notes
|
|
43698
|
-
- support_article.support_category`,
|
|
43754
|
+
It will update the vendor credential data request attributes`,
|
|
43699
43755
|
args: args4,
|
|
43700
43756
|
tool: async (client, args5, ctx) => {
|
|
43701
|
-
const [result, apiCall] = await
|
|
43757
|
+
const [result, apiCall] = await dataRequestsUpdateDataRequest(client, args5.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43702
43758
|
if (!result.ok) {
|
|
43703
43759
|
return {
|
|
43704
43760
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43711,34 +43767,33 @@ Available \`expand\` scopes are:
|
|
|
43711
43767
|
};
|
|
43712
43768
|
});
|
|
43713
43769
|
|
|
43714
|
-
// src/funcs/
|
|
43715
|
-
function
|
|
43770
|
+
// src/funcs/organizationsGetFacility.ts
|
|
43771
|
+
function organizationsGetFacility(client, request, options) {
|
|
43716
43772
|
return new APIPromise($do5(client, request, options));
|
|
43717
43773
|
}
|
|
43718
43774
|
async function $do5(client, request, options) {
|
|
43719
|
-
const parsed = safeParse(request, (value) =>
|
|
43775
|
+
const parsed = safeParse(request, (value) => GetFacilityRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43720
43776
|
if (!parsed.ok) {
|
|
43721
|
-
return [
|
|
43777
|
+
return [parsed, { status: "invalid" }];
|
|
43722
43778
|
}
|
|
43723
43779
|
const payload = parsed.value;
|
|
43724
43780
|
const body = null;
|
|
43725
|
-
const
|
|
43726
|
-
|
|
43727
|
-
|
|
43728
|
-
|
|
43729
|
-
|
|
43730
|
-
|
|
43731
|
-
|
|
43732
|
-
sort: payload.sort
|
|
43733
|
-
});
|
|
43781
|
+
const pathParams = {
|
|
43782
|
+
id: encodeSimple("id", payload.id, {
|
|
43783
|
+
explode: false,
|
|
43784
|
+
charEncoding: "percent"
|
|
43785
|
+
})
|
|
43786
|
+
};
|
|
43787
|
+
const path = pathToFunc("/facilities/{id}")(pathParams);
|
|
43734
43788
|
const headers = new Headers(compactMap({
|
|
43735
43789
|
Accept: "application/json"
|
|
43736
43790
|
}));
|
|
43737
43791
|
const securityInput = await extractSecurity(client._options.security);
|
|
43738
43792
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43739
43793
|
const context = {
|
|
43794
|
+
options: client._options,
|
|
43740
43795
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43741
|
-
operationID: "
|
|
43796
|
+
operationID: "getFacility",
|
|
43742
43797
|
oAuth2Scopes: [],
|
|
43743
43798
|
resolvedSecurity: requestSecurity,
|
|
43744
43799
|
securitySource: client._options.security,
|
|
@@ -43751,36 +43806,427 @@ async function $do5(client, request, options) {
|
|
|
43751
43806
|
baseURL: options?.serverURL,
|
|
43752
43807
|
path,
|
|
43753
43808
|
headers,
|
|
43754
|
-
query,
|
|
43755
43809
|
body,
|
|
43810
|
+
userAgent: client._options.userAgent,
|
|
43756
43811
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43757
43812
|
}, options);
|
|
43758
43813
|
if (!requestRes.ok) {
|
|
43759
|
-
return [
|
|
43814
|
+
return [requestRes, { status: "invalid" }];
|
|
43760
43815
|
}
|
|
43761
43816
|
const req = requestRes.value;
|
|
43762
43817
|
const doResult = await client._do(req, {
|
|
43763
43818
|
context,
|
|
43764
|
-
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
43819
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
43765
43820
|
retryConfig: context.retryConfig,
|
|
43766
43821
|
retryCodes: context.retryCodes
|
|
43767
43822
|
});
|
|
43768
43823
|
if (!doResult.ok) {
|
|
43769
|
-
return [
|
|
43824
|
+
return [doResult, { status: "request-error", request: req }];
|
|
43770
43825
|
}
|
|
43771
43826
|
const response = doResult.value;
|
|
43772
43827
|
const responseFields = {
|
|
43773
43828
|
HttpMeta: { Response: response, Request: req }
|
|
43774
43829
|
};
|
|
43775
|
-
const [result
|
|
43776
|
-
key: "Result"
|
|
43777
|
-
}), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43830
|
+
const [result] = await match(json(200, Facility$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43778
43831
|
if (!result.ok) {
|
|
43779
|
-
return [
|
|
43780
|
-
|
|
43781
|
-
|
|
43782
|
-
|
|
43783
|
-
|
|
43832
|
+
return [result, { status: "complete", request: req, response }];
|
|
43833
|
+
}
|
|
43834
|
+
return [result, { status: "complete", request: req, response }];
|
|
43835
|
+
}
|
|
43836
|
+
var init_organizationsGetFacility = __esm(() => {
|
|
43837
|
+
init_encodings();
|
|
43838
|
+
init_matchers();
|
|
43839
|
+
init_primitives();
|
|
43840
|
+
init_schemas();
|
|
43841
|
+
init_security();
|
|
43842
|
+
init_url();
|
|
43843
|
+
init_components();
|
|
43844
|
+
init_errors2();
|
|
43845
|
+
init_operations();
|
|
43846
|
+
init_async();
|
|
43847
|
+
});
|
|
43848
|
+
|
|
43849
|
+
// src/mcp-server/tools/organizationsGetFacility.ts
|
|
43850
|
+
var args5, tool$organizationsGetFacility;
|
|
43851
|
+
var init_organizationsGetFacility2 = __esm(() => {
|
|
43852
|
+
init_organizationsGetFacility();
|
|
43853
|
+
init_operations();
|
|
43854
|
+
init_tools();
|
|
43855
|
+
args5 = {
|
|
43856
|
+
request: GetFacilityRequest$inboundSchema
|
|
43857
|
+
};
|
|
43858
|
+
tool$organizationsGetFacility = {
|
|
43859
|
+
name: "organizations-get-facility",
|
|
43860
|
+
description: `Get facility
|
|
43861
|
+
|
|
43862
|
+
Retrieve an individual facility.`,
|
|
43863
|
+
args: args5,
|
|
43864
|
+
tool: async (client, args6, ctx) => {
|
|
43865
|
+
const [result, apiCall] = await organizationsGetFacility(client, args6.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43866
|
+
if (!result.ok) {
|
|
43867
|
+
return {
|
|
43868
|
+
content: [{ type: "text", text: result.error.message }],
|
|
43869
|
+
isError: true
|
|
43870
|
+
};
|
|
43871
|
+
}
|
|
43872
|
+
const value = result.value;
|
|
43873
|
+
return formatResult(value, apiCall);
|
|
43874
|
+
}
|
|
43875
|
+
};
|
|
43876
|
+
});
|
|
43877
|
+
|
|
43878
|
+
// src/funcs/organizationsListOrSearchFacilities.ts
|
|
43879
|
+
function organizationsListOrSearchFacilities(client, request, options) {
|
|
43880
|
+
return new APIPromise($do6(client, request, options));
|
|
43881
|
+
}
|
|
43882
|
+
async function $do6(client, request, options) {
|
|
43883
|
+
const parsed = safeParse(request, (value) => ListOrSearchFacilitiesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43884
|
+
if (!parsed.ok) {
|
|
43885
|
+
return [haltIterator(parsed), { status: "invalid" }];
|
|
43886
|
+
}
|
|
43887
|
+
const payload = parsed.value;
|
|
43888
|
+
const body = null;
|
|
43889
|
+
const path = pathToFunc("/facilities")();
|
|
43890
|
+
const query = queryJoin(encodeFormQuery({
|
|
43891
|
+
expand: payload.expand
|
|
43892
|
+
}, { explode: false }), encodeFormQuery({
|
|
43893
|
+
active_status: payload.active_status,
|
|
43894
|
+
desc: payload.desc,
|
|
43895
|
+
items_per_page: payload.items_per_page,
|
|
43896
|
+
latitude: payload.latitude,
|
|
43897
|
+
longitude: payload.longitude,
|
|
43898
|
+
name_like: payload.name_like,
|
|
43899
|
+
page: payload.page,
|
|
43900
|
+
sort: payload.sort,
|
|
43901
|
+
state_like: payload.state_like,
|
|
43902
|
+
system_id: payload.system_id
|
|
43903
|
+
}));
|
|
43904
|
+
const headers = new Headers(compactMap({
|
|
43905
|
+
Accept: "application/json"
|
|
43906
|
+
}));
|
|
43907
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
43908
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43909
|
+
const context = {
|
|
43910
|
+
options: client._options,
|
|
43911
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43912
|
+
operationID: "listOrSearchFacilities",
|
|
43913
|
+
oAuth2Scopes: [],
|
|
43914
|
+
resolvedSecurity: requestSecurity,
|
|
43915
|
+
securitySource: client._options.security,
|
|
43916
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
43917
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
43918
|
+
};
|
|
43919
|
+
const requestRes = client._createRequest(context, {
|
|
43920
|
+
security: requestSecurity,
|
|
43921
|
+
method: "GET",
|
|
43922
|
+
baseURL: options?.serverURL,
|
|
43923
|
+
path,
|
|
43924
|
+
headers,
|
|
43925
|
+
query,
|
|
43926
|
+
body,
|
|
43927
|
+
userAgent: client._options.userAgent,
|
|
43928
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43929
|
+
}, options);
|
|
43930
|
+
if (!requestRes.ok) {
|
|
43931
|
+
return [haltIterator(requestRes), { status: "invalid" }];
|
|
43932
|
+
}
|
|
43933
|
+
const req = requestRes.value;
|
|
43934
|
+
const doResult = await client._do(req, {
|
|
43935
|
+
context,
|
|
43936
|
+
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
43937
|
+
retryConfig: context.retryConfig,
|
|
43938
|
+
retryCodes: context.retryCodes
|
|
43939
|
+
});
|
|
43940
|
+
if (!doResult.ok) {
|
|
43941
|
+
return [haltIterator(doResult), { status: "request-error", request: req }];
|
|
43942
|
+
}
|
|
43943
|
+
const response = doResult.value;
|
|
43944
|
+
const responseFields = {
|
|
43945
|
+
HttpMeta: { Response: response, Request: req }
|
|
43946
|
+
};
|
|
43947
|
+
const [result, raw] = await match(json(200, ListOrSearchFacilitiesResponse$inboundSchema, {
|
|
43948
|
+
key: "Result"
|
|
43949
|
+
}), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
43950
|
+
if (!result.ok) {
|
|
43951
|
+
return [haltIterator(result), {
|
|
43952
|
+
status: "complete",
|
|
43953
|
+
request: req,
|
|
43954
|
+
response
|
|
43955
|
+
}];
|
|
43956
|
+
}
|
|
43957
|
+
const nextFunc = (responseData) => {
|
|
43958
|
+
const page2 = request?.page ?? 1;
|
|
43959
|
+
const nextPage = page2 + 1;
|
|
43960
|
+
if (!responseData) {
|
|
43961
|
+
return { next: () => null };
|
|
43962
|
+
}
|
|
43963
|
+
const results = dlv(responseData, "items");
|
|
43964
|
+
if (!Array.isArray(results) || !results.length) {
|
|
43965
|
+
return { next: () => null };
|
|
43966
|
+
}
|
|
43967
|
+
const limit = request?.itemsPerPage ?? 0;
|
|
43968
|
+
if (results.length < limit) {
|
|
43969
|
+
return { next: () => null };
|
|
43970
|
+
}
|
|
43971
|
+
const nextVal = () => organizationsListOrSearchFacilities(client, {
|
|
43972
|
+
...request,
|
|
43973
|
+
page: nextPage
|
|
43974
|
+
}, options);
|
|
43975
|
+
return { next: nextVal, "~next": { page: nextPage } };
|
|
43976
|
+
};
|
|
43977
|
+
const page = { ...result, ...nextFunc(raw) };
|
|
43978
|
+
return [{ ...page, ...createPageIterator(page, (v2) => !v2.ok) }, {
|
|
43979
|
+
status: "complete",
|
|
43980
|
+
request: req,
|
|
43981
|
+
response
|
|
43982
|
+
}];
|
|
43983
|
+
}
|
|
43984
|
+
var init_organizationsListOrSearchFacilities = __esm(() => {
|
|
43985
|
+
init_encodings();
|
|
43986
|
+
init_matchers();
|
|
43987
|
+
init_primitives();
|
|
43988
|
+
init_schemas();
|
|
43989
|
+
init_security();
|
|
43990
|
+
init_url();
|
|
43991
|
+
init_errors2();
|
|
43992
|
+
init_operations();
|
|
43993
|
+
init_async();
|
|
43994
|
+
init_operations2();
|
|
43995
|
+
});
|
|
43996
|
+
|
|
43997
|
+
// src/mcp-server/tools/organizationsListOrSearchFacilities.ts
|
|
43998
|
+
var args6, tool$organizationsListOrSearchFacilities;
|
|
43999
|
+
var init_organizationsListOrSearchFacilities2 = __esm(() => {
|
|
44000
|
+
init_organizationsListOrSearchFacilities();
|
|
44001
|
+
init_operations();
|
|
44002
|
+
init_tools();
|
|
44003
|
+
args6 = {
|
|
44004
|
+
request: ListOrSearchFacilitiesRequest$inboundSchema
|
|
44005
|
+
};
|
|
44006
|
+
tool$organizationsListOrSearchFacilities = {
|
|
44007
|
+
name: "organizations-list-or-search-facilities",
|
|
44008
|
+
description: `List or search facilities
|
|
44009
|
+
|
|
44010
|
+
List or search facilities.
|
|
44011
|
+
|
|
44012
|
+
Available \`expand\` scopes are:
|
|
44013
|
+
|
|
44014
|
+
- facility.appointment_policy
|
|
44015
|
+
- facility.contacts
|
|
44016
|
+
- facility.vendor_counts
|
|
44017
|
+
- facility.flu_credential
|
|
44018
|
+
- facility.scrubs_policy
|
|
44019
|
+
- facility.system
|
|
44020
|
+
- facility.vendor_guest_policy
|
|
44021
|
+
- facility.vendor_policy
|
|
44022
|
+
- facility.visitor_policy
|
|
44023
|
+
- facility.workflow`,
|
|
44024
|
+
args: args6,
|
|
44025
|
+
tool: async (client, args7, ctx) => {
|
|
44026
|
+
const [result, apiCall] = await organizationsListOrSearchFacilities(client, args7.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44027
|
+
if (!result.ok) {
|
|
44028
|
+
return {
|
|
44029
|
+
content: [{ type: "text", text: result.error.message }],
|
|
44030
|
+
isError: true
|
|
44031
|
+
};
|
|
44032
|
+
}
|
|
44033
|
+
const value = result.value.result;
|
|
44034
|
+
return formatResult(value, apiCall);
|
|
44035
|
+
}
|
|
44036
|
+
};
|
|
44037
|
+
});
|
|
44038
|
+
|
|
44039
|
+
// src/funcs/supportArticlesGetSupportArticle.ts
|
|
44040
|
+
function supportArticlesGetSupportArticle(client, request, options) {
|
|
44041
|
+
return new APIPromise($do7(client, request, options));
|
|
44042
|
+
}
|
|
44043
|
+
async function $do7(client, request, options) {
|
|
44044
|
+
const parsed = safeParse(request, (value) => GetSupportArticleRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44045
|
+
if (!parsed.ok) {
|
|
44046
|
+
return [parsed, { status: "invalid" }];
|
|
44047
|
+
}
|
|
44048
|
+
const payload = parsed.value;
|
|
44049
|
+
const body = null;
|
|
44050
|
+
const pathParams = {
|
|
44051
|
+
id: encodeSimple("id", payload.id, {
|
|
44052
|
+
explode: false,
|
|
44053
|
+
charEncoding: "percent"
|
|
44054
|
+
})
|
|
44055
|
+
};
|
|
44056
|
+
const path = pathToFunc("/support_articles/{id}")(pathParams);
|
|
44057
|
+
const query = encodeFormQuery({
|
|
44058
|
+
expand: payload.expand
|
|
44059
|
+
}, { explode: false });
|
|
44060
|
+
const headers = new Headers(compactMap({
|
|
44061
|
+
Accept: "application/json"
|
|
44062
|
+
}));
|
|
44063
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
44064
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44065
|
+
const context = {
|
|
44066
|
+
options: client._options,
|
|
44067
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44068
|
+
operationID: "getSupportArticle",
|
|
44069
|
+
oAuth2Scopes: [],
|
|
44070
|
+
resolvedSecurity: requestSecurity,
|
|
44071
|
+
securitySource: client._options.security,
|
|
44072
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
44073
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
44074
|
+
};
|
|
44075
|
+
const requestRes = client._createRequest(context, {
|
|
44076
|
+
security: requestSecurity,
|
|
44077
|
+
method: "GET",
|
|
44078
|
+
baseURL: options?.serverURL,
|
|
44079
|
+
path,
|
|
44080
|
+
headers,
|
|
44081
|
+
query,
|
|
44082
|
+
body,
|
|
44083
|
+
userAgent: client._options.userAgent,
|
|
44084
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44085
|
+
}, options);
|
|
44086
|
+
if (!requestRes.ok) {
|
|
44087
|
+
return [requestRes, { status: "invalid" }];
|
|
44088
|
+
}
|
|
44089
|
+
const req = requestRes.value;
|
|
44090
|
+
const doResult = await client._do(req, {
|
|
44091
|
+
context,
|
|
44092
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
44093
|
+
retryConfig: context.retryConfig,
|
|
44094
|
+
retryCodes: context.retryCodes
|
|
44095
|
+
});
|
|
44096
|
+
if (!doResult.ok) {
|
|
44097
|
+
return [doResult, { status: "request-error", request: req }];
|
|
44098
|
+
}
|
|
44099
|
+
const response = doResult.value;
|
|
44100
|
+
const responseFields = {
|
|
44101
|
+
HttpMeta: { Response: response, Request: req }
|
|
44102
|
+
};
|
|
44103
|
+
const [result] = await match(json(200, SupportArticle$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44104
|
+
if (!result.ok) {
|
|
44105
|
+
return [result, { status: "complete", request: req, response }];
|
|
44106
|
+
}
|
|
44107
|
+
return [result, { status: "complete", request: req, response }];
|
|
44108
|
+
}
|
|
44109
|
+
var init_supportArticlesGetSupportArticle = __esm(() => {
|
|
44110
|
+
init_encodings();
|
|
44111
|
+
init_matchers();
|
|
44112
|
+
init_primitives();
|
|
44113
|
+
init_schemas();
|
|
44114
|
+
init_security();
|
|
44115
|
+
init_url();
|
|
44116
|
+
init_components();
|
|
44117
|
+
init_errors2();
|
|
44118
|
+
init_operations();
|
|
44119
|
+
init_async();
|
|
44120
|
+
});
|
|
44121
|
+
|
|
44122
|
+
// src/mcp-server/tools/supportArticlesGetSupportArticle.ts
|
|
44123
|
+
var args7, tool$supportArticlesGetSupportArticle;
|
|
44124
|
+
var init_supportArticlesGetSupportArticle2 = __esm(() => {
|
|
44125
|
+
init_supportArticlesGetSupportArticle();
|
|
44126
|
+
init_operations();
|
|
44127
|
+
init_tools();
|
|
44128
|
+
args7 = {
|
|
44129
|
+
request: GetSupportArticleRequest$inboundSchema
|
|
44130
|
+
};
|
|
44131
|
+
tool$supportArticlesGetSupportArticle = {
|
|
44132
|
+
name: "support-articles-get-support-article",
|
|
44133
|
+
description: `Get support article
|
|
44134
|
+
|
|
44135
|
+
Retrieve an individual support article.
|
|
44136
|
+
|
|
44137
|
+
Available \`expand\` scopes are:
|
|
44138
|
+
|
|
44139
|
+
- support_article.description
|
|
44140
|
+
- support_article.published
|
|
44141
|
+
- support_article.notes
|
|
44142
|
+
- support_article.support_category`,
|
|
44143
|
+
args: args7,
|
|
44144
|
+
tool: async (client, args8, ctx) => {
|
|
44145
|
+
const [result, apiCall] = await supportArticlesGetSupportArticle(client, args8.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44146
|
+
if (!result.ok) {
|
|
44147
|
+
return {
|
|
44148
|
+
content: [{ type: "text", text: result.error.message }],
|
|
44149
|
+
isError: true
|
|
44150
|
+
};
|
|
44151
|
+
}
|
|
44152
|
+
const value = result.value;
|
|
44153
|
+
return formatResult(value, apiCall);
|
|
44154
|
+
}
|
|
44155
|
+
};
|
|
44156
|
+
});
|
|
44157
|
+
|
|
44158
|
+
// src/funcs/supportArticlesListOrSearchSupportArticles.ts
|
|
44159
|
+
function supportArticlesListOrSearchSupportArticles(client, request, options) {
|
|
44160
|
+
return new APIPromise($do8(client, request, options));
|
|
44161
|
+
}
|
|
44162
|
+
async function $do8(client, request, options) {
|
|
44163
|
+
const parsed = safeParse(request, (value) => ListOrSearchSupportArticlesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44164
|
+
if (!parsed.ok) {
|
|
44165
|
+
return [haltIterator(parsed), { status: "invalid" }];
|
|
44166
|
+
}
|
|
44167
|
+
const payload = parsed.value;
|
|
44168
|
+
const body = null;
|
|
44169
|
+
const path = pathToFunc("/support_articles")();
|
|
44170
|
+
const query = encodeFormQuery({
|
|
44171
|
+
category: payload.category,
|
|
44172
|
+
desc: payload.desc,
|
|
44173
|
+
items_per_page: payload.items_per_page,
|
|
44174
|
+
page: payload.page,
|
|
44175
|
+
search: payload.search,
|
|
44176
|
+
sort: payload.sort
|
|
44177
|
+
});
|
|
44178
|
+
const headers = new Headers(compactMap({
|
|
44179
|
+
Accept: "application/json"
|
|
44180
|
+
}));
|
|
44181
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
44182
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44183
|
+
const context = {
|
|
44184
|
+
options: client._options,
|
|
44185
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44186
|
+
operationID: "listOrSearchSupportArticles",
|
|
44187
|
+
oAuth2Scopes: [],
|
|
44188
|
+
resolvedSecurity: requestSecurity,
|
|
44189
|
+
securitySource: client._options.security,
|
|
44190
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
44191
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
44192
|
+
};
|
|
44193
|
+
const requestRes = client._createRequest(context, {
|
|
44194
|
+
security: requestSecurity,
|
|
44195
|
+
method: "GET",
|
|
44196
|
+
baseURL: options?.serverURL,
|
|
44197
|
+
path,
|
|
44198
|
+
headers,
|
|
44199
|
+
query,
|
|
44200
|
+
body,
|
|
44201
|
+
userAgent: client._options.userAgent,
|
|
44202
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44203
|
+
}, options);
|
|
44204
|
+
if (!requestRes.ok) {
|
|
44205
|
+
return [haltIterator(requestRes), { status: "invalid" }];
|
|
44206
|
+
}
|
|
44207
|
+
const req = requestRes.value;
|
|
44208
|
+
const doResult = await client._do(req, {
|
|
44209
|
+
context,
|
|
44210
|
+
errorCodes: ["400", "401", "403", "4XX", "500", "5XX"],
|
|
44211
|
+
retryConfig: context.retryConfig,
|
|
44212
|
+
retryCodes: context.retryCodes
|
|
44213
|
+
});
|
|
44214
|
+
if (!doResult.ok) {
|
|
44215
|
+
return [haltIterator(doResult), { status: "request-error", request: req }];
|
|
44216
|
+
}
|
|
44217
|
+
const response = doResult.value;
|
|
44218
|
+
const responseFields = {
|
|
44219
|
+
HttpMeta: { Response: response, Request: req }
|
|
44220
|
+
};
|
|
44221
|
+
const [result, raw] = await match(json(200, ListOrSearchSupportArticlesResponse$inboundSchema, {
|
|
44222
|
+
key: "Result"
|
|
44223
|
+
}), jsonErr([400, 401, 403], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44224
|
+
if (!result.ok) {
|
|
44225
|
+
return [haltIterator(result), {
|
|
44226
|
+
status: "complete",
|
|
44227
|
+
request: req,
|
|
44228
|
+
response
|
|
44229
|
+
}];
|
|
43784
44230
|
}
|
|
43785
44231
|
const nextFunc = (responseData) => {
|
|
43786
44232
|
const page2 = request?.page ?? 1;
|
|
@@ -43823,12 +44269,12 @@ var init_supportArticlesListOrSearchSupportArticles = __esm(() => {
|
|
|
43823
44269
|
});
|
|
43824
44270
|
|
|
43825
44271
|
// src/mcp-server/tools/supportArticlesListOrSearchSupportArticles.ts
|
|
43826
|
-
var
|
|
44272
|
+
var args8, tool$supportArticlesListOrSearchSupportArticles;
|
|
43827
44273
|
var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
|
|
43828
44274
|
init_supportArticlesListOrSearchSupportArticles();
|
|
43829
44275
|
init_operations();
|
|
43830
44276
|
init_tools();
|
|
43831
|
-
|
|
44277
|
+
args8 = {
|
|
43832
44278
|
request: ListOrSearchSupportArticlesRequest$inboundSchema
|
|
43833
44279
|
};
|
|
43834
44280
|
tool$supportArticlesListOrSearchSupportArticles = {
|
|
@@ -43836,9 +44282,9 @@ var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
|
|
|
43836
44282
|
description: `List or search support articles
|
|
43837
44283
|
|
|
43838
44284
|
List or search support articles for FAQ.`,
|
|
43839
|
-
args:
|
|
43840
|
-
tool: async (client,
|
|
43841
|
-
const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client,
|
|
44285
|
+
args: args8,
|
|
44286
|
+
tool: async (client, args9, ctx) => {
|
|
44287
|
+
const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client, args9.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43842
44288
|
if (!result.ok) {
|
|
43843
44289
|
return {
|
|
43844
44290
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43853,9 +44299,9 @@ List or search support articles for FAQ.`,
|
|
|
43853
44299
|
|
|
43854
44300
|
// src/funcs/usersChangePassword.ts
|
|
43855
44301
|
function usersChangePassword(client, request, options) {
|
|
43856
|
-
return new APIPromise($
|
|
44302
|
+
return new APIPromise($do9(client, request, options));
|
|
43857
44303
|
}
|
|
43858
|
-
async function $
|
|
44304
|
+
async function $do9(client, request, options) {
|
|
43859
44305
|
const parsed = safeParse(request, (value) => ChangePasswordRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43860
44306
|
if (!parsed.ok) {
|
|
43861
44307
|
return [parsed, { status: "invalid" }];
|
|
@@ -43876,6 +44322,7 @@ async function $do6(client, request, options) {
|
|
|
43876
44322
|
const securityInput = await extractSecurity(client._options.security);
|
|
43877
44323
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43878
44324
|
const context = {
|
|
44325
|
+
options: client._options,
|
|
43879
44326
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43880
44327
|
operationID: "changePassword",
|
|
43881
44328
|
oAuth2Scopes: [],
|
|
@@ -43891,6 +44338,7 @@ async function $do6(client, request, options) {
|
|
|
43891
44338
|
path,
|
|
43892
44339
|
headers,
|
|
43893
44340
|
body,
|
|
44341
|
+
userAgent: client._options.userAgent,
|
|
43894
44342
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43895
44343
|
}, options);
|
|
43896
44344
|
if (!requestRes.ok) {
|
|
@@ -43929,12 +44377,12 @@ var init_usersChangePassword = __esm(() => {
|
|
|
43929
44377
|
});
|
|
43930
44378
|
|
|
43931
44379
|
// src/mcp-server/tools/usersChangePassword.ts
|
|
43932
|
-
var
|
|
44380
|
+
var args9, tool$usersChangePassword;
|
|
43933
44381
|
var init_usersChangePassword2 = __esm(() => {
|
|
43934
44382
|
init_usersChangePassword();
|
|
43935
44383
|
init_operations();
|
|
43936
44384
|
init_tools();
|
|
43937
|
-
|
|
44385
|
+
args9 = {
|
|
43938
44386
|
request: ChangePasswordRequest$inboundSchema
|
|
43939
44387
|
};
|
|
43940
44388
|
tool$usersChangePassword = {
|
|
@@ -43942,9 +44390,9 @@ var init_usersChangePassword2 = __esm(() => {
|
|
|
43942
44390
|
description: `Change password
|
|
43943
44391
|
|
|
43944
44392
|
Change the user's password to the new passed as parameter`,
|
|
43945
|
-
args:
|
|
43946
|
-
tool: async (client,
|
|
43947
|
-
const [result, apiCall] = await usersChangePassword(client,
|
|
44393
|
+
args: args9,
|
|
44394
|
+
tool: async (client, args10, ctx) => {
|
|
44395
|
+
const [result, apiCall] = await usersChangePassword(client, args10.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43948
44396
|
if (!result.ok) {
|
|
43949
44397
|
return {
|
|
43950
44398
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43959,9 +44407,9 @@ Change the user's password to the new passed as parameter`,
|
|
|
43959
44407
|
|
|
43960
44408
|
// src/funcs/usersGetCurrentUser.ts
|
|
43961
44409
|
function usersGetCurrentUser(client, options) {
|
|
43962
|
-
return new APIPromise($
|
|
44410
|
+
return new APIPromise($do10(client, options));
|
|
43963
44411
|
}
|
|
43964
|
-
async function $
|
|
44412
|
+
async function $do10(client, options) {
|
|
43965
44413
|
const path = pathToFunc("/users/me")();
|
|
43966
44414
|
const headers = new Headers(compactMap({
|
|
43967
44415
|
Accept: "application/json"
|
|
@@ -43969,6 +44417,7 @@ async function $do7(client, options) {
|
|
|
43969
44417
|
const securityInput = await extractSecurity(client._options.security);
|
|
43970
44418
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
43971
44419
|
const context = {
|
|
44420
|
+
options: client._options,
|
|
43972
44421
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
43973
44422
|
operationID: "getCurrentUser",
|
|
43974
44423
|
oAuth2Scopes: [],
|
|
@@ -43983,6 +44432,7 @@ async function $do7(client, options) {
|
|
|
43983
44432
|
baseURL: options?.serverURL,
|
|
43984
44433
|
path,
|
|
43985
44434
|
headers,
|
|
44435
|
+
userAgent: client._options.userAgent,
|
|
43986
44436
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
43987
44437
|
}, options);
|
|
43988
44438
|
if (!requestRes.ok) {
|
|
@@ -44044,9 +44494,9 @@ Returns a user object for the user represented by the authorization token`,
|
|
|
44044
44494
|
|
|
44045
44495
|
// src/funcs/usersGetUserById.ts
|
|
44046
44496
|
function usersGetUserById(client, request, options) {
|
|
44047
|
-
return new APIPromise($
|
|
44497
|
+
return new APIPromise($do11(client, request, options));
|
|
44048
44498
|
}
|
|
44049
|
-
async function $
|
|
44499
|
+
async function $do11(client, request, options) {
|
|
44050
44500
|
const parsed = safeParse(request, (value) => GetUserByIdRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44051
44501
|
if (!parsed.ok) {
|
|
44052
44502
|
return [parsed, { status: "invalid" }];
|
|
@@ -44066,6 +44516,7 @@ async function $do8(client, request, options) {
|
|
|
44066
44516
|
const securityInput = await extractSecurity(client._options.security);
|
|
44067
44517
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44068
44518
|
const context = {
|
|
44519
|
+
options: client._options,
|
|
44069
44520
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44070
44521
|
operationID: "getUserById",
|
|
44071
44522
|
oAuth2Scopes: [],
|
|
@@ -44081,6 +44532,7 @@ async function $do8(client, request, options) {
|
|
|
44081
44532
|
path,
|
|
44082
44533
|
headers,
|
|
44083
44534
|
body,
|
|
44535
|
+
userAgent: client._options.userAgent,
|
|
44084
44536
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44085
44537
|
}, options);
|
|
44086
44538
|
if (!requestRes.ok) {
|
|
@@ -44120,12 +44572,12 @@ var init_usersGetUserById = __esm(() => {
|
|
|
44120
44572
|
});
|
|
44121
44573
|
|
|
44122
44574
|
// src/mcp-server/tools/usersGetUserById.ts
|
|
44123
|
-
var
|
|
44575
|
+
var args10, tool$usersGetUserById;
|
|
44124
44576
|
var init_usersGetUserById2 = __esm(() => {
|
|
44125
44577
|
init_usersGetUserById();
|
|
44126
44578
|
init_operations();
|
|
44127
44579
|
init_tools();
|
|
44128
|
-
|
|
44580
|
+
args10 = {
|
|
44129
44581
|
request: GetUserByIdRequest$inboundSchema
|
|
44130
44582
|
};
|
|
44131
44583
|
tool$usersGetUserById = {
|
|
@@ -44133,9 +44585,9 @@ var init_usersGetUserById2 = __esm(() => {
|
|
|
44133
44585
|
description: `Get user by id
|
|
44134
44586
|
|
|
44135
44587
|
Returns a user object for the user represented by the identifier in the path.`,
|
|
44136
|
-
args:
|
|
44137
|
-
tool: async (client,
|
|
44138
|
-
const [result, apiCall] = await usersGetUserById(client,
|
|
44588
|
+
args: args10,
|
|
44589
|
+
tool: async (client, args11, ctx) => {
|
|
44590
|
+
const [result, apiCall] = await usersGetUserById(client, args11.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44139
44591
|
if (!result.ok) {
|
|
44140
44592
|
return {
|
|
44141
44593
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44150,9 +44602,9 @@ Returns a user object for the user represented by the identifier in the path.`,
|
|
|
44150
44602
|
|
|
44151
44603
|
// src/funcs/usersMagiclink.ts
|
|
44152
44604
|
function usersMagiclink(client, request, options) {
|
|
44153
|
-
return new APIPromise($
|
|
44605
|
+
return new APIPromise($do12(client, request, options));
|
|
44154
44606
|
}
|
|
44155
|
-
async function $
|
|
44607
|
+
async function $do12(client, request, options) {
|
|
44156
44608
|
const parsed = safeParse(request, (value) => MagiclinkRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44157
44609
|
if (!parsed.ok) {
|
|
44158
44610
|
return [parsed, { status: "invalid" }];
|
|
@@ -44167,6 +44619,7 @@ async function $do9(client, request, options) {
|
|
|
44167
44619
|
const securityInput = await extractSecurity(client._options.security);
|
|
44168
44620
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44169
44621
|
const context = {
|
|
44622
|
+
options: client._options,
|
|
44170
44623
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44171
44624
|
operationID: "magiclink",
|
|
44172
44625
|
oAuth2Scopes: [],
|
|
@@ -44182,6 +44635,7 @@ async function $do9(client, request, options) {
|
|
|
44182
44635
|
path,
|
|
44183
44636
|
headers,
|
|
44184
44637
|
body,
|
|
44638
|
+
userAgent: client._options.userAgent,
|
|
44185
44639
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44186
44640
|
}, options);
|
|
44187
44641
|
if (!requestRes.ok) {
|
|
@@ -44220,12 +44674,12 @@ var init_usersMagiclink = __esm(() => {
|
|
|
44220
44674
|
});
|
|
44221
44675
|
|
|
44222
44676
|
// src/mcp-server/tools/usersMagiclink.ts
|
|
44223
|
-
var
|
|
44677
|
+
var args11, tool$usersMagiclink;
|
|
44224
44678
|
var init_usersMagiclink2 = __esm(() => {
|
|
44225
44679
|
init_usersMagiclink();
|
|
44226
44680
|
init_operations();
|
|
44227
44681
|
init_tools();
|
|
44228
|
-
|
|
44682
|
+
args11 = {
|
|
44229
44683
|
request: MagiclinkRequestBody$inboundSchema
|
|
44230
44684
|
};
|
|
44231
44685
|
tool$usersMagiclink = {
|
|
@@ -44233,9 +44687,9 @@ var init_usersMagiclink2 = __esm(() => {
|
|
|
44233
44687
|
description: `Magic link
|
|
44234
44688
|
|
|
44235
44689
|
It sends an email with a magic link to allow the user to log in.`,
|
|
44236
|
-
args:
|
|
44237
|
-
tool: async (client,
|
|
44238
|
-
const [result, apiCall] = await usersMagiclink(client,
|
|
44690
|
+
args: args11,
|
|
44691
|
+
tool: async (client, args12, ctx) => {
|
|
44692
|
+
const [result, apiCall] = await usersMagiclink(client, args12.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44239
44693
|
if (!result.ok) {
|
|
44240
44694
|
return {
|
|
44241
44695
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44250,9 +44704,9 @@ It sends an email with a magic link to allow the user to log in.`,
|
|
|
44250
44704
|
|
|
44251
44705
|
// src/funcs/usersPassword.ts
|
|
44252
44706
|
function usersPassword(client, request, options) {
|
|
44253
|
-
return new APIPromise($
|
|
44707
|
+
return new APIPromise($do13(client, request, options));
|
|
44254
44708
|
}
|
|
44255
|
-
async function $
|
|
44709
|
+
async function $do13(client, request, options) {
|
|
44256
44710
|
const parsed = safeParse(request, (value) => PasswordRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44257
44711
|
if (!parsed.ok) {
|
|
44258
44712
|
return [parsed, { status: "invalid" }];
|
|
@@ -44267,6 +44721,7 @@ async function $do10(client, request, options) {
|
|
|
44267
44721
|
const securityInput = await extractSecurity(client._options.security);
|
|
44268
44722
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44269
44723
|
const context = {
|
|
44724
|
+
options: client._options,
|
|
44270
44725
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44271
44726
|
operationID: "password",
|
|
44272
44727
|
oAuth2Scopes: [],
|
|
@@ -44282,6 +44737,7 @@ async function $do10(client, request, options) {
|
|
|
44282
44737
|
path,
|
|
44283
44738
|
headers,
|
|
44284
44739
|
body,
|
|
44740
|
+
userAgent: client._options.userAgent,
|
|
44285
44741
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44286
44742
|
}, options);
|
|
44287
44743
|
if (!requestRes.ok) {
|
|
@@ -44320,12 +44776,12 @@ var init_usersPassword = __esm(() => {
|
|
|
44320
44776
|
});
|
|
44321
44777
|
|
|
44322
44778
|
// src/mcp-server/tools/usersPassword.ts
|
|
44323
|
-
var
|
|
44779
|
+
var args12, tool$usersPassword;
|
|
44324
44780
|
var init_usersPassword2 = __esm(() => {
|
|
44325
44781
|
init_usersPassword();
|
|
44326
44782
|
init_operations();
|
|
44327
44783
|
init_tools();
|
|
44328
|
-
|
|
44784
|
+
args12 = {
|
|
44329
44785
|
request: PasswordRequestBody$inboundSchema
|
|
44330
44786
|
};
|
|
44331
44787
|
tool$usersPassword = {
|
|
@@ -44334,9 +44790,9 @@ var init_usersPassword2 = __esm(() => {
|
|
|
44334
44790
|
|
|
44335
44791
|
Resets the a user's password using a password_reset_id that was sent to them via email.
|
|
44336
44792
|
See /users/passwordresetrequest to initiate a password reset flow.`,
|
|
44337
|
-
args:
|
|
44338
|
-
tool: async (client,
|
|
44339
|
-
const [result, apiCall] = await usersPassword(client,
|
|
44793
|
+
args: args12,
|
|
44794
|
+
tool: async (client, args13, ctx) => {
|
|
44795
|
+
const [result, apiCall] = await usersPassword(client, args13.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44340
44796
|
if (!result.ok) {
|
|
44341
44797
|
return {
|
|
44342
44798
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44351,9 +44807,9 @@ See /users/passwordresetrequest to initiate a password reset flow.`,
|
|
|
44351
44807
|
|
|
44352
44808
|
// src/funcs/usersPasswordResetRequest.ts
|
|
44353
44809
|
function usersPasswordResetRequest(client, request, options) {
|
|
44354
|
-
return new APIPromise($
|
|
44810
|
+
return new APIPromise($do14(client, request, options));
|
|
44355
44811
|
}
|
|
44356
|
-
async function $
|
|
44812
|
+
async function $do14(client, request, options) {
|
|
44357
44813
|
const parsed = safeParse(request, (value) => PasswordResetRequestRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44358
44814
|
if (!parsed.ok) {
|
|
44359
44815
|
return [parsed, { status: "invalid" }];
|
|
@@ -44368,6 +44824,7 @@ async function $do11(client, request, options) {
|
|
|
44368
44824
|
const securityInput = await extractSecurity(client._options.security);
|
|
44369
44825
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44370
44826
|
const context = {
|
|
44827
|
+
options: client._options,
|
|
44371
44828
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44372
44829
|
operationID: "passwordResetRequest",
|
|
44373
44830
|
oAuth2Scopes: [],
|
|
@@ -44383,6 +44840,7 @@ async function $do11(client, request, options) {
|
|
|
44383
44840
|
path,
|
|
44384
44841
|
headers,
|
|
44385
44842
|
body,
|
|
44843
|
+
userAgent: client._options.userAgent,
|
|
44386
44844
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44387
44845
|
}, options);
|
|
44388
44846
|
if (!requestRes.ok) {
|
|
@@ -44421,12 +44879,12 @@ var init_usersPasswordResetRequest = __esm(() => {
|
|
|
44421
44879
|
});
|
|
44422
44880
|
|
|
44423
44881
|
// src/mcp-server/tools/usersPasswordResetRequest.ts
|
|
44424
|
-
var
|
|
44882
|
+
var args13, tool$usersPasswordResetRequest;
|
|
44425
44883
|
var init_usersPasswordResetRequest2 = __esm(() => {
|
|
44426
44884
|
init_usersPasswordResetRequest();
|
|
44427
44885
|
init_operations();
|
|
44428
44886
|
init_tools();
|
|
44429
|
-
|
|
44887
|
+
args13 = {
|
|
44430
44888
|
request: PasswordResetRequestRequestBody$inboundSchema
|
|
44431
44889
|
};
|
|
44432
44890
|
tool$usersPasswordResetRequest = {
|
|
@@ -44434,9 +44892,9 @@ var init_usersPasswordResetRequest2 = __esm(() => {
|
|
|
44434
44892
|
description: `Password reset request
|
|
44435
44893
|
|
|
44436
44894
|
It sends an email with a link for resetting a user's password.`,
|
|
44437
|
-
args:
|
|
44438
|
-
tool: async (client,
|
|
44439
|
-
const [result, apiCall] = await usersPasswordResetRequest(client,
|
|
44895
|
+
args: args13,
|
|
44896
|
+
tool: async (client, args14, ctx) => {
|
|
44897
|
+
const [result, apiCall] = await usersPasswordResetRequest(client, args14.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44440
44898
|
if (!result.ok) {
|
|
44441
44899
|
return {
|
|
44442
44900
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44451,9 +44909,9 @@ It sends an email with a link for resetting a user's password.`,
|
|
|
44451
44909
|
|
|
44452
44910
|
// src/funcs/usersPostAuthenticate.ts
|
|
44453
44911
|
function usersPostAuthenticate(client, request, options) {
|
|
44454
|
-
return new APIPromise($
|
|
44912
|
+
return new APIPromise($do15(client, request, options));
|
|
44455
44913
|
}
|
|
44456
|
-
async function $
|
|
44914
|
+
async function $do15(client, request, options) {
|
|
44457
44915
|
const parsed = safeParse(request, (value) => PostAuthenticateRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44458
44916
|
if (!parsed.ok) {
|
|
44459
44917
|
return [parsed, { status: "invalid" }];
|
|
@@ -44466,6 +44924,7 @@ async function $do12(client, request, options) {
|
|
|
44466
44924
|
Accept: "application/json"
|
|
44467
44925
|
}));
|
|
44468
44926
|
const context = {
|
|
44927
|
+
options: client._options,
|
|
44469
44928
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44470
44929
|
operationID: "postAuthenticate",
|
|
44471
44930
|
oAuth2Scopes: [],
|
|
@@ -44480,6 +44939,7 @@ async function $do12(client, request, options) {
|
|
|
44480
44939
|
path,
|
|
44481
44940
|
headers,
|
|
44482
44941
|
body,
|
|
44942
|
+
userAgent: client._options.userAgent,
|
|
44483
44943
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44484
44944
|
}, options);
|
|
44485
44945
|
if (!requestRes.ok) {
|
|
@@ -44517,12 +44977,12 @@ var init_usersPostAuthenticate = __esm(() => {
|
|
|
44517
44977
|
});
|
|
44518
44978
|
|
|
44519
44979
|
// src/mcp-server/tools/usersPostAuthenticate.ts
|
|
44520
|
-
var
|
|
44980
|
+
var args14, tool$usersPostAuthenticate;
|
|
44521
44981
|
var init_usersPostAuthenticate2 = __esm(() => {
|
|
44522
44982
|
init_usersPostAuthenticate();
|
|
44523
44983
|
init_operations();
|
|
44524
44984
|
init_tools();
|
|
44525
|
-
|
|
44985
|
+
args14 = {
|
|
44526
44986
|
request: PostAuthenticateRequestBody$inboundSchema
|
|
44527
44987
|
};
|
|
44528
44988
|
tool$usersPostAuthenticate = {
|
|
@@ -44560,9 +45020,9 @@ Requires: \`saml_login\`
|
|
|
44560
45020
|
3. Site redirects to your selected \`return_url\`
|
|
44561
45021
|
4. The \`user_token\` will be appended as a query string parameter to your \`return_url\` - you must parse this token and store it
|
|
44562
45022
|
5. Fetch the user object from \`/users/me\` using the token`,
|
|
44563
|
-
args:
|
|
44564
|
-
tool: async (client,
|
|
44565
|
-
const [result, apiCall] = await usersPostAuthenticate(client,
|
|
45023
|
+
args: args14,
|
|
45024
|
+
tool: async (client, args15, ctx) => {
|
|
45025
|
+
const [result, apiCall] = await usersPostAuthenticate(client, args15.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44566
45026
|
if (!result.ok) {
|
|
44567
45027
|
return {
|
|
44568
45028
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44577,9 +45037,9 @@ Requires: \`saml_login\`
|
|
|
44577
45037
|
|
|
44578
45038
|
// src/funcs/vendorsAddVendorCredentialFile.ts
|
|
44579
45039
|
function vendorsAddVendorCredentialFile(client, request, options) {
|
|
44580
|
-
return new APIPromise($
|
|
45040
|
+
return new APIPromise($do16(client, request, options));
|
|
44581
45041
|
}
|
|
44582
|
-
async function $
|
|
45042
|
+
async function $do16(client, request, options) {
|
|
44583
45043
|
const parsed = safeParse(request, (value) => AddVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44584
45044
|
if (!parsed.ok) {
|
|
44585
45045
|
return [parsed, { status: "invalid" }];
|
|
@@ -44597,6 +45057,7 @@ async function $do13(client, request, options) {
|
|
|
44597
45057
|
const securityInput = await extractSecurity(client._options.security);
|
|
44598
45058
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44599
45059
|
const context = {
|
|
45060
|
+
options: client._options,
|
|
44600
45061
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44601
45062
|
operationID: "addVendorCredentialFile",
|
|
44602
45063
|
oAuth2Scopes: [],
|
|
@@ -44612,6 +45073,7 @@ async function $do13(client, request, options) {
|
|
|
44612
45073
|
path,
|
|
44613
45074
|
headers,
|
|
44614
45075
|
body,
|
|
45076
|
+
userAgent: client._options.userAgent,
|
|
44615
45077
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44616
45078
|
}, options);
|
|
44617
45079
|
if (!requestRes.ok) {
|
|
@@ -44650,12 +45112,12 @@ var init_vendorsAddVendorCredentialFile = __esm(() => {
|
|
|
44650
45112
|
});
|
|
44651
45113
|
|
|
44652
45114
|
// src/mcp-server/tools/vendorsAddVendorCredentialFile.ts
|
|
44653
|
-
var
|
|
45115
|
+
var args15, tool$vendorsAddVendorCredentialFile;
|
|
44654
45116
|
var init_vendorsAddVendorCredentialFile2 = __esm(() => {
|
|
44655
45117
|
init_vendorsAddVendorCredentialFile();
|
|
44656
45118
|
init_operations();
|
|
44657
45119
|
init_tools();
|
|
44658
|
-
|
|
45120
|
+
args15 = {
|
|
44659
45121
|
request: AddVendorCredentialFileRequest$inboundSchema
|
|
44660
45122
|
};
|
|
44661
45123
|
tool$vendorsAddVendorCredentialFile = {
|
|
@@ -44663,9 +45125,9 @@ var init_vendorsAddVendorCredentialFile2 = __esm(() => {
|
|
|
44663
45125
|
description: `Add vendor credential file
|
|
44664
45126
|
|
|
44665
45127
|
It will add a new vendor credential file`,
|
|
44666
|
-
args:
|
|
44667
|
-
tool: async (client,
|
|
44668
|
-
const [result, apiCall] = await vendorsAddVendorCredentialFile(client,
|
|
45128
|
+
args: args15,
|
|
45129
|
+
tool: async (client, args16, ctx) => {
|
|
45130
|
+
const [result, apiCall] = await vendorsAddVendorCredentialFile(client, args16.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44669
45131
|
if (!result.ok) {
|
|
44670
45132
|
return {
|
|
44671
45133
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44680,9 +45142,9 @@ It will add a new vendor credential file`,
|
|
|
44680
45142
|
|
|
44681
45143
|
// src/funcs/vendorsAddVendorManagedByCompany.ts
|
|
44682
45144
|
function vendorsAddVendorManagedByCompany(client, request, options) {
|
|
44683
|
-
return new APIPromise($
|
|
45145
|
+
return new APIPromise($do17(client, request, options));
|
|
44684
45146
|
}
|
|
44685
|
-
async function $
|
|
45147
|
+
async function $do17(client, request, options) {
|
|
44686
45148
|
const parsed = safeParse(request, (value) => AddVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44687
45149
|
if (!parsed.ok) {
|
|
44688
45150
|
return [parsed, { status: "invalid" }];
|
|
@@ -44703,6 +45165,7 @@ async function $do14(client, request, options) {
|
|
|
44703
45165
|
const securityInput = await extractSecurity(client._options.security);
|
|
44704
45166
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44705
45167
|
const context = {
|
|
45168
|
+
options: client._options,
|
|
44706
45169
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44707
45170
|
operationID: "addVendorManagedByCompany",
|
|
44708
45171
|
oAuth2Scopes: [],
|
|
@@ -44718,6 +45181,7 @@ async function $do14(client, request, options) {
|
|
|
44718
45181
|
path,
|
|
44719
45182
|
headers,
|
|
44720
45183
|
body,
|
|
45184
|
+
userAgent: client._options.userAgent,
|
|
44721
45185
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44722
45186
|
}, options);
|
|
44723
45187
|
if (!requestRes.ok) {
|
|
@@ -44756,12 +45220,12 @@ var init_vendorsAddVendorManagedByCompany = __esm(() => {
|
|
|
44756
45220
|
});
|
|
44757
45221
|
|
|
44758
45222
|
// src/mcp-server/tools/vendorsAddVendorManagedByCompany.ts
|
|
44759
|
-
var
|
|
45223
|
+
var args16, tool$vendorsAddVendorManagedByCompany;
|
|
44760
45224
|
var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
|
|
44761
45225
|
init_vendorsAddVendorManagedByCompany();
|
|
44762
45226
|
init_operations();
|
|
44763
45227
|
init_tools();
|
|
44764
|
-
|
|
45228
|
+
args16 = {
|
|
44765
45229
|
request: AddVendorManagedByCompanyRequest$inboundSchema
|
|
44766
45230
|
};
|
|
44767
45231
|
tool$vendorsAddVendorManagedByCompany = {
|
|
@@ -44769,9 +45233,9 @@ var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
|
|
|
44769
45233
|
description: `Add vendor managed by company
|
|
44770
45234
|
|
|
44771
45235
|
It will add a vendor managed by company`,
|
|
44772
|
-
args:
|
|
44773
|
-
tool: async (client,
|
|
44774
|
-
const [result, apiCall] = await vendorsAddVendorManagedByCompany(client,
|
|
45236
|
+
args: args16,
|
|
45237
|
+
tool: async (client, args17, ctx) => {
|
|
45238
|
+
const [result, apiCall] = await vendorsAddVendorManagedByCompany(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44775
45239
|
if (!result.ok) {
|
|
44776
45240
|
return {
|
|
44777
45241
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44786,9 +45250,9 @@ It will add a vendor managed by company`,
|
|
|
44786
45250
|
|
|
44787
45251
|
// src/funcs/vendorScansVendorScanOut.ts
|
|
44788
45252
|
function vendorScansVendorScanOut(client, request, options) {
|
|
44789
|
-
return new APIPromise($
|
|
45253
|
+
return new APIPromise($do18(client, request, options));
|
|
44790
45254
|
}
|
|
44791
|
-
async function $
|
|
45255
|
+
async function $do18(client, request, options) {
|
|
44792
45256
|
const parsed = safeParse(request, (value) => VendorScanOutRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44793
45257
|
if (!parsed.ok) {
|
|
44794
45258
|
return [parsed, { status: "invalid" }];
|
|
@@ -44808,6 +45272,7 @@ async function $do15(client, request, options) {
|
|
|
44808
45272
|
const securityInput = await extractSecurity(client._options.security);
|
|
44809
45273
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44810
45274
|
const context = {
|
|
45275
|
+
options: client._options,
|
|
44811
45276
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44812
45277
|
operationID: "vendorScanOut",
|
|
44813
45278
|
oAuth2Scopes: [],
|
|
@@ -44823,6 +45288,7 @@ async function $do15(client, request, options) {
|
|
|
44823
45288
|
path,
|
|
44824
45289
|
headers,
|
|
44825
45290
|
body,
|
|
45291
|
+
userAgent: client._options.userAgent,
|
|
44826
45292
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44827
45293
|
}, options);
|
|
44828
45294
|
if (!requestRes.ok) {
|
|
@@ -44861,12 +45327,12 @@ var init_vendorScansVendorScanOut = __esm(() => {
|
|
|
44861
45327
|
});
|
|
44862
45328
|
|
|
44863
45329
|
// src/mcp-server/tools/vendorScansVendorScanOut.ts
|
|
44864
|
-
var
|
|
45330
|
+
var args17, tool$vendorScansVendorScanOut;
|
|
44865
45331
|
var init_vendorScansVendorScanOut2 = __esm(() => {
|
|
44866
45332
|
init_vendorScansVendorScanOut();
|
|
44867
45333
|
init_operations();
|
|
44868
45334
|
init_tools();
|
|
44869
|
-
|
|
45335
|
+
args17 = {
|
|
44870
45336
|
request: VendorScanOutRequest$inboundSchema
|
|
44871
45337
|
};
|
|
44872
45338
|
tool$vendorScansVendorScanOut = {
|
|
@@ -44874,9 +45340,9 @@ var init_vendorScansVendorScanOut2 = __esm(() => {
|
|
|
44874
45340
|
description: `Vendor scan out
|
|
44875
45341
|
|
|
44876
45342
|
It scans out vendor from facility`,
|
|
44877
|
-
args:
|
|
44878
|
-
tool: async (client,
|
|
44879
|
-
const [result, apiCall] = await vendorScansVendorScanOut(client,
|
|
45343
|
+
args: args17,
|
|
45344
|
+
tool: async (client, args18, ctx) => {
|
|
45345
|
+
const [result, apiCall] = await vendorScansVendorScanOut(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44880
45346
|
if (!result.ok) {
|
|
44881
45347
|
return {
|
|
44882
45348
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44891,9 +45357,9 @@ It scans out vendor from facility`,
|
|
|
44891
45357
|
|
|
44892
45358
|
// src/funcs/vendorsCreateNewVendorCredentialVersion.ts
|
|
44893
45359
|
function vendorsCreateNewVendorCredentialVersion(client, request, options) {
|
|
44894
|
-
return new APIPromise($
|
|
45360
|
+
return new APIPromise($do19(client, request, options));
|
|
44895
45361
|
}
|
|
44896
|
-
async function $
|
|
45362
|
+
async function $do19(client, request, options) {
|
|
44897
45363
|
const parsed = safeParse(request, (value) => CreateNewVendorCredentialVersionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44898
45364
|
if (!parsed.ok) {
|
|
44899
45365
|
return [parsed, { status: "invalid" }];
|
|
@@ -44908,6 +45374,7 @@ async function $do16(client, request, options) {
|
|
|
44908
45374
|
const securityInput = await extractSecurity(client._options.security);
|
|
44909
45375
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44910
45376
|
const context = {
|
|
45377
|
+
options: client._options,
|
|
44911
45378
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44912
45379
|
operationID: "createNewVendorCredentialVersion",
|
|
44913
45380
|
oAuth2Scopes: [],
|
|
@@ -44923,6 +45390,7 @@ async function $do16(client, request, options) {
|
|
|
44923
45390
|
path,
|
|
44924
45391
|
headers,
|
|
44925
45392
|
body,
|
|
45393
|
+
userAgent: client._options.userAgent,
|
|
44926
45394
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44927
45395
|
}, options);
|
|
44928
45396
|
if (!requestRes.ok) {
|
|
@@ -44961,12 +45429,12 @@ var init_vendorsCreateNewVendorCredentialVersion = __esm(() => {
|
|
|
44961
45429
|
});
|
|
44962
45430
|
|
|
44963
45431
|
// src/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.ts
|
|
44964
|
-
var
|
|
45432
|
+
var args18, tool$vendorsCreateNewVendorCredentialVersion;
|
|
44965
45433
|
var init_vendorsCreateNewVendorCredentialVersion2 = __esm(() => {
|
|
44966
45434
|
init_vendorsCreateNewVendorCredentialVersion();
|
|
44967
45435
|
init_operations();
|
|
44968
45436
|
init_tools();
|
|
44969
|
-
|
|
45437
|
+
args18 = {
|
|
44970
45438
|
request: CreateNewVendorCredentialVersionRequestBody$inboundSchema
|
|
44971
45439
|
};
|
|
44972
45440
|
tool$vendorsCreateNewVendorCredentialVersion = {
|
|
@@ -44974,9 +45442,9 @@ var init_vendorsCreateNewVendorCredentialVersion2 = __esm(() => {
|
|
|
44974
45442
|
description: `Create new vendor credential version
|
|
44975
45443
|
|
|
44976
45444
|
It will submit vendor credential`,
|
|
44977
|
-
args:
|
|
44978
|
-
tool: async (client,
|
|
44979
|
-
const [result, apiCall] = await vendorsCreateNewVendorCredentialVersion(client,
|
|
45445
|
+
args: args18,
|
|
45446
|
+
tool: async (client, args19, ctx) => {
|
|
45447
|
+
const [result, apiCall] = await vendorsCreateNewVendorCredentialVersion(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44980
45448
|
if (!result.ok) {
|
|
44981
45449
|
return {
|
|
44982
45450
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44991,9 +45459,9 @@ It will submit vendor credential`,
|
|
|
44991
45459
|
|
|
44992
45460
|
// src/funcs/vendorsCreateOrUpdateBcr.ts
|
|
44993
45461
|
function vendorsCreateOrUpdateBcr(client, request, options) {
|
|
44994
|
-
return new APIPromise($
|
|
45462
|
+
return new APIPromise($do20(client, request, options));
|
|
44995
45463
|
}
|
|
44996
|
-
async function $
|
|
45464
|
+
async function $do20(client, request, options) {
|
|
44997
45465
|
const parsed = safeParse(request, (value) => CreateOrUpdateBcrRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44998
45466
|
if (!parsed.ok) {
|
|
44999
45467
|
return [parsed, { status: "invalid" }];
|
|
@@ -45011,6 +45479,7 @@ async function $do17(client, request, options) {
|
|
|
45011
45479
|
const securityInput = await extractSecurity(client._options.security);
|
|
45012
45480
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45013
45481
|
const context = {
|
|
45482
|
+
options: client._options,
|
|
45014
45483
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45015
45484
|
operationID: "createOrUpdateBcr",
|
|
45016
45485
|
oAuth2Scopes: [],
|
|
@@ -45026,6 +45495,7 @@ async function $do17(client, request, options) {
|
|
|
45026
45495
|
path,
|
|
45027
45496
|
headers,
|
|
45028
45497
|
body,
|
|
45498
|
+
userAgent: client._options.userAgent,
|
|
45029
45499
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45030
45500
|
}, options);
|
|
45031
45501
|
if (!requestRes.ok) {
|
|
@@ -45065,12 +45535,12 @@ var init_vendorsCreateOrUpdateBcr = __esm(() => {
|
|
|
45065
45535
|
});
|
|
45066
45536
|
|
|
45067
45537
|
// src/mcp-server/tools/vendorsCreateOrUpdateBcr.ts
|
|
45068
|
-
var
|
|
45538
|
+
var args19, tool$vendorsCreateOrUpdateBcr;
|
|
45069
45539
|
var init_vendorsCreateOrUpdateBcr2 = __esm(() => {
|
|
45070
45540
|
init_vendorsCreateOrUpdateBcr();
|
|
45071
45541
|
init_operations();
|
|
45072
45542
|
init_tools();
|
|
45073
|
-
|
|
45543
|
+
args19 = {
|
|
45074
45544
|
request: CreateOrUpdateBcrRequest$inboundSchema
|
|
45075
45545
|
};
|
|
45076
45546
|
tool$vendorsCreateOrUpdateBcr = {
|
|
@@ -45078,9 +45548,9 @@ var init_vendorsCreateOrUpdateBcr2 = __esm(() => {
|
|
|
45078
45548
|
description: `Create or update BackgroundCheckResults
|
|
45079
45549
|
|
|
45080
45550
|
It will create or update BackgroundCheckResults`,
|
|
45081
|
-
args:
|
|
45082
|
-
tool: async (client,
|
|
45083
|
-
const [result, apiCall] = await vendorsCreateOrUpdateBcr(client,
|
|
45551
|
+
args: args19,
|
|
45552
|
+
tool: async (client, args20, ctx) => {
|
|
45553
|
+
const [result, apiCall] = await vendorsCreateOrUpdateBcr(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45084
45554
|
if (!result.ok) {
|
|
45085
45555
|
return {
|
|
45086
45556
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45095,9 +45565,9 @@ It will create or update BackgroundCheckResults`,
|
|
|
45095
45565
|
|
|
45096
45566
|
// src/funcs/vendorsCreateVendorCompany.ts
|
|
45097
45567
|
function vendorsCreateVendorCompany(client, request, options) {
|
|
45098
|
-
return new APIPromise($
|
|
45568
|
+
return new APIPromise($do21(client, request, options));
|
|
45099
45569
|
}
|
|
45100
|
-
async function $
|
|
45570
|
+
async function $do21(client, request, options) {
|
|
45101
45571
|
const parsed = safeParse(request, (value) => CreateVendorCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45102
45572
|
if (!parsed.ok) {
|
|
45103
45573
|
return [parsed, { status: "invalid" }];
|
|
@@ -45118,6 +45588,7 @@ async function $do18(client, request, options) {
|
|
|
45118
45588
|
const securityInput = await extractSecurity(client._options.security);
|
|
45119
45589
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45120
45590
|
const context = {
|
|
45591
|
+
options: client._options,
|
|
45121
45592
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45122
45593
|
operationID: "createVendorCompany",
|
|
45123
45594
|
oAuth2Scopes: [],
|
|
@@ -45133,6 +45604,7 @@ async function $do18(client, request, options) {
|
|
|
45133
45604
|
path,
|
|
45134
45605
|
headers,
|
|
45135
45606
|
body,
|
|
45607
|
+
userAgent: client._options.userAgent,
|
|
45136
45608
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45137
45609
|
}, options);
|
|
45138
45610
|
if (!requestRes.ok) {
|
|
@@ -45171,12 +45643,12 @@ var init_vendorsCreateVendorCompany = __esm(() => {
|
|
|
45171
45643
|
});
|
|
45172
45644
|
|
|
45173
45645
|
// src/mcp-server/tools/vendorsCreateVendorCompany.ts
|
|
45174
|
-
var
|
|
45646
|
+
var args20, tool$vendorsCreateVendorCompany;
|
|
45175
45647
|
var init_vendorsCreateVendorCompany2 = __esm(() => {
|
|
45176
45648
|
init_vendorsCreateVendorCompany();
|
|
45177
45649
|
init_operations();
|
|
45178
45650
|
init_tools();
|
|
45179
|
-
|
|
45651
|
+
args20 = {
|
|
45180
45652
|
request: CreateVendorCompanyRequest$inboundSchema
|
|
45181
45653
|
};
|
|
45182
45654
|
tool$vendorsCreateVendorCompany = {
|
|
@@ -45184,9 +45656,9 @@ var init_vendorsCreateVendorCompany2 = __esm(() => {
|
|
|
45184
45656
|
description: `Create vendor company
|
|
45185
45657
|
|
|
45186
45658
|
Create vendor company`,
|
|
45187
|
-
args:
|
|
45188
|
-
tool: async (client,
|
|
45189
|
-
const [result, apiCall] = await vendorsCreateVendorCompany(client,
|
|
45659
|
+
args: args20,
|
|
45660
|
+
tool: async (client, args21, ctx) => {
|
|
45661
|
+
const [result, apiCall] = await vendorsCreateVendorCompany(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45190
45662
|
if (!result.ok) {
|
|
45191
45663
|
return {
|
|
45192
45664
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45201,9 +45673,9 @@ Create vendor company`,
|
|
|
45201
45673
|
|
|
45202
45674
|
// src/funcs/vendorsCreateVendorRegistration.ts
|
|
45203
45675
|
function vendorsCreateVendorRegistration(client, request, options) {
|
|
45204
|
-
return new APIPromise($
|
|
45676
|
+
return new APIPromise($do22(client, request, options));
|
|
45205
45677
|
}
|
|
45206
|
-
async function $
|
|
45678
|
+
async function $do22(client, request, options) {
|
|
45207
45679
|
const parsed = safeParse(request, (value) => CreateVendorRegistrationRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
45208
45680
|
if (!parsed.ok) {
|
|
45209
45681
|
return [parsed, { status: "invalid" }];
|
|
@@ -45216,6 +45688,7 @@ async function $do19(client, request, options) {
|
|
|
45216
45688
|
Accept: "application/json"
|
|
45217
45689
|
}));
|
|
45218
45690
|
const context = {
|
|
45691
|
+
options: client._options,
|
|
45219
45692
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45220
45693
|
operationID: "createVendorRegistration",
|
|
45221
45694
|
oAuth2Scopes: [],
|
|
@@ -45230,6 +45703,7 @@ async function $do19(client, request, options) {
|
|
|
45230
45703
|
path,
|
|
45231
45704
|
headers,
|
|
45232
45705
|
body,
|
|
45706
|
+
userAgent: client._options.userAgent,
|
|
45233
45707
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45234
45708
|
}, options);
|
|
45235
45709
|
if (!requestRes.ok) {
|
|
@@ -45268,12 +45742,12 @@ var init_vendorsCreateVendorRegistration = __esm(() => {
|
|
|
45268
45742
|
});
|
|
45269
45743
|
|
|
45270
45744
|
// src/mcp-server/tools/vendorsCreateVendorRegistration.ts
|
|
45271
|
-
var
|
|
45745
|
+
var args21, tool$vendorsCreateVendorRegistration;
|
|
45272
45746
|
var init_vendorsCreateVendorRegistration2 = __esm(() => {
|
|
45273
45747
|
init_vendorsCreateVendorRegistration();
|
|
45274
45748
|
init_operations();
|
|
45275
45749
|
init_tools();
|
|
45276
|
-
|
|
45750
|
+
args21 = {
|
|
45277
45751
|
request: CreateVendorRegistrationRequestBody$inboundSchema
|
|
45278
45752
|
};
|
|
45279
45753
|
tool$vendorsCreateVendorRegistration = {
|
|
@@ -45281,9 +45755,9 @@ var init_vendorsCreateVendorRegistration2 = __esm(() => {
|
|
|
45281
45755
|
description: `Create vendor registration
|
|
45282
45756
|
|
|
45283
45757
|
Create an initial vendor registration. Once successful, the vendor will be able to continue to filling out the rest of their onboarding profile.`,
|
|
45284
|
-
args:
|
|
45285
|
-
tool: async (client,
|
|
45286
|
-
const [result, apiCall] = await vendorsCreateVendorRegistration(client,
|
|
45758
|
+
args: args21,
|
|
45759
|
+
tool: async (client, args22, ctx) => {
|
|
45760
|
+
const [result, apiCall] = await vendorsCreateVendorRegistration(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45287
45761
|
if (!result.ok) {
|
|
45288
45762
|
return {
|
|
45289
45763
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45298,9 +45772,9 @@ Create an initial vendor registration. Once successful, the vendor will be able
|
|
|
45298
45772
|
|
|
45299
45773
|
// src/funcs/vendorsDeclineVendorCredential.ts
|
|
45300
45774
|
function vendorsDeclineVendorCredential(client, request, options) {
|
|
45301
|
-
return new APIPromise($
|
|
45775
|
+
return new APIPromise($do23(client, request, options));
|
|
45302
45776
|
}
|
|
45303
|
-
async function $
|
|
45777
|
+
async function $do23(client, request, options) {
|
|
45304
45778
|
const parsed = safeParse(request, (value) => DeclineVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45305
45779
|
if (!parsed.ok) {
|
|
45306
45780
|
return [parsed, { status: "invalid" }];
|
|
@@ -45317,6 +45791,7 @@ async function $do20(client, request, options) {
|
|
|
45317
45791
|
const securityInput = await extractSecurity(client._options.security);
|
|
45318
45792
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45319
45793
|
const context = {
|
|
45794
|
+
options: client._options,
|
|
45320
45795
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45321
45796
|
operationID: "declineVendorCredential",
|
|
45322
45797
|
oAuth2Scopes: [],
|
|
@@ -45332,6 +45807,7 @@ async function $do20(client, request, options) {
|
|
|
45332
45807
|
path,
|
|
45333
45808
|
headers,
|
|
45334
45809
|
body,
|
|
45810
|
+
userAgent: client._options.userAgent,
|
|
45335
45811
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45336
45812
|
}, options);
|
|
45337
45813
|
if (!requestRes.ok) {
|
|
@@ -45371,12 +45847,12 @@ var init_vendorsDeclineVendorCredential = __esm(() => {
|
|
|
45371
45847
|
});
|
|
45372
45848
|
|
|
45373
45849
|
// src/mcp-server/tools/vendorsDeclineVendorCredential.ts
|
|
45374
|
-
var
|
|
45850
|
+
var args22, tool$vendorsDeclineVendorCredential;
|
|
45375
45851
|
var init_vendorsDeclineVendorCredential2 = __esm(() => {
|
|
45376
45852
|
init_vendorsDeclineVendorCredential();
|
|
45377
45853
|
init_operations();
|
|
45378
45854
|
init_tools();
|
|
45379
|
-
|
|
45855
|
+
args22 = {
|
|
45380
45856
|
request: DeclineVendorCredentialRequest$inboundSchema
|
|
45381
45857
|
};
|
|
45382
45858
|
tool$vendorsDeclineVendorCredential = {
|
|
@@ -45384,9 +45860,9 @@ var init_vendorsDeclineVendorCredential2 = __esm(() => {
|
|
|
45384
45860
|
description: `Decline vendor credential
|
|
45385
45861
|
|
|
45386
45862
|
It will decline vendor credential`,
|
|
45387
|
-
args:
|
|
45388
|
-
tool: async (client,
|
|
45389
|
-
const [result, apiCall] = await vendorsDeclineVendorCredential(client,
|
|
45863
|
+
args: args22,
|
|
45864
|
+
tool: async (client, args23, ctx) => {
|
|
45865
|
+
const [result, apiCall] = await vendorsDeclineVendorCredential(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45390
45866
|
if (!result.ok) {
|
|
45391
45867
|
return {
|
|
45392
45868
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45401,9 +45877,9 @@ It will decline vendor credential`,
|
|
|
45401
45877
|
|
|
45402
45878
|
// src/funcs/vendorsDeleteVendorCredentialFile.ts
|
|
45403
45879
|
function vendorsDeleteVendorCredentialFile(client, request, options) {
|
|
45404
|
-
return new APIPromise($
|
|
45880
|
+
return new APIPromise($do24(client, request, options));
|
|
45405
45881
|
}
|
|
45406
|
-
async function $
|
|
45882
|
+
async function $do24(client, request, options) {
|
|
45407
45883
|
const parsed = safeParse(request, (value) => DeleteVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45408
45884
|
if (!parsed.ok) {
|
|
45409
45885
|
return [parsed, { status: "invalid" }];
|
|
@@ -45424,6 +45900,7 @@ async function $do21(client, request, options) {
|
|
|
45424
45900
|
const securityInput = await extractSecurity(client._options.security);
|
|
45425
45901
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45426
45902
|
const context = {
|
|
45903
|
+
options: client._options,
|
|
45427
45904
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45428
45905
|
operationID: "deleteVendorCredentialFile",
|
|
45429
45906
|
oAuth2Scopes: [],
|
|
@@ -45439,6 +45916,7 @@ async function $do21(client, request, options) {
|
|
|
45439
45916
|
path,
|
|
45440
45917
|
headers,
|
|
45441
45918
|
body,
|
|
45919
|
+
userAgent: client._options.userAgent,
|
|
45442
45920
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45443
45921
|
}, options);
|
|
45444
45922
|
if (!requestRes.ok) {
|
|
@@ -45478,12 +45956,12 @@ var init_vendorsDeleteVendorCredentialFile = __esm(() => {
|
|
|
45478
45956
|
});
|
|
45479
45957
|
|
|
45480
45958
|
// src/mcp-server/tools/vendorsDeleteVendorCredentialFile.ts
|
|
45481
|
-
var
|
|
45959
|
+
var args23, tool$vendorsDeleteVendorCredentialFile;
|
|
45482
45960
|
var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
|
|
45483
45961
|
init_vendorsDeleteVendorCredentialFile();
|
|
45484
45962
|
init_operations();
|
|
45485
45963
|
init_tools();
|
|
45486
|
-
|
|
45964
|
+
args23 = {
|
|
45487
45965
|
request: DeleteVendorCredentialFileRequest$inboundSchema
|
|
45488
45966
|
};
|
|
45489
45967
|
tool$vendorsDeleteVendorCredentialFile = {
|
|
@@ -45491,9 +45969,9 @@ var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
|
|
|
45491
45969
|
description: `Delete vendor credential file
|
|
45492
45970
|
|
|
45493
45971
|
It will delete the vendor credential file`,
|
|
45494
|
-
args:
|
|
45495
|
-
tool: async (client,
|
|
45496
|
-
const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client,
|
|
45972
|
+
args: args23,
|
|
45973
|
+
tool: async (client, args24, ctx) => {
|
|
45974
|
+
const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45497
45975
|
if (!result.ok) {
|
|
45498
45976
|
return {
|
|
45499
45977
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45508,9 +45986,9 @@ It will delete the vendor credential file`,
|
|
|
45508
45986
|
|
|
45509
45987
|
// src/funcs/vendorsDeleteVendorManagedByCompany.ts
|
|
45510
45988
|
function vendorsDeleteVendorManagedByCompany(client, request, options) {
|
|
45511
|
-
return new APIPromise($
|
|
45989
|
+
return new APIPromise($do25(client, request, options));
|
|
45512
45990
|
}
|
|
45513
|
-
async function $
|
|
45991
|
+
async function $do25(client, request, options) {
|
|
45514
45992
|
const parsed = safeParse(request, (value) => DeleteVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45515
45993
|
if (!parsed.ok) {
|
|
45516
45994
|
return [parsed, { status: "invalid" }];
|
|
@@ -45531,6 +46009,7 @@ async function $do22(client, request, options) {
|
|
|
45531
46009
|
const securityInput = await extractSecurity(client._options.security);
|
|
45532
46010
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45533
46011
|
const context = {
|
|
46012
|
+
options: client._options,
|
|
45534
46013
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45535
46014
|
operationID: "deleteVendorManagedByCompany",
|
|
45536
46015
|
oAuth2Scopes: [],
|
|
@@ -45546,6 +46025,7 @@ async function $do22(client, request, options) {
|
|
|
45546
46025
|
path,
|
|
45547
46026
|
headers,
|
|
45548
46027
|
body,
|
|
46028
|
+
userAgent: client._options.userAgent,
|
|
45549
46029
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45550
46030
|
}, options);
|
|
45551
46031
|
if (!requestRes.ok) {
|
|
@@ -45584,12 +46064,12 @@ var init_vendorsDeleteVendorManagedByCompany = __esm(() => {
|
|
|
45584
46064
|
});
|
|
45585
46065
|
|
|
45586
46066
|
// src/mcp-server/tools/vendorsDeleteVendorManagedByCompany.ts
|
|
45587
|
-
var
|
|
46067
|
+
var args24, tool$vendorsDeleteVendorManagedByCompany;
|
|
45588
46068
|
var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
|
|
45589
46069
|
init_vendorsDeleteVendorManagedByCompany();
|
|
45590
46070
|
init_operations();
|
|
45591
46071
|
init_tools();
|
|
45592
|
-
|
|
46072
|
+
args24 = {
|
|
45593
46073
|
request: DeleteVendorManagedByCompanyRequest$inboundSchema
|
|
45594
46074
|
};
|
|
45595
46075
|
tool$vendorsDeleteVendorManagedByCompany = {
|
|
@@ -45597,9 +46077,9 @@ var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
|
|
|
45597
46077
|
description: `Delete vendor managed by company
|
|
45598
46078
|
|
|
45599
46079
|
It will delete the vendor managed by company`,
|
|
45600
|
-
args:
|
|
45601
|
-
tool: async (client,
|
|
45602
|
-
const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client,
|
|
46080
|
+
args: args24,
|
|
46081
|
+
tool: async (client, args25, ctx) => {
|
|
46082
|
+
const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45603
46083
|
if (!result.ok) {
|
|
45604
46084
|
return {
|
|
45605
46085
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45614,9 +46094,9 @@ It will delete the vendor managed by company`,
|
|
|
45614
46094
|
|
|
45615
46095
|
// src/funcs/vendorsExpediteTimeRemaining.ts
|
|
45616
46096
|
function vendorsExpediteTimeRemaining(client, request, options) {
|
|
45617
|
-
return new APIPromise($
|
|
46097
|
+
return new APIPromise($do26(client, request, options));
|
|
45618
46098
|
}
|
|
45619
|
-
async function $
|
|
46099
|
+
async function $do26(client, request, options) {
|
|
45620
46100
|
const parsed = safeParse(request, (value) => ExpediteTimeRemainingRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45621
46101
|
if (!parsed.ok) {
|
|
45622
46102
|
return [parsed, { status: "invalid" }];
|
|
@@ -45636,6 +46116,7 @@ async function $do23(client, request, options) {
|
|
|
45636
46116
|
const securityInput = await extractSecurity(client._options.security);
|
|
45637
46117
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45638
46118
|
const context = {
|
|
46119
|
+
options: client._options,
|
|
45639
46120
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45640
46121
|
operationID: "expediteTimeRemaining",
|
|
45641
46122
|
oAuth2Scopes: [],
|
|
@@ -45651,6 +46132,7 @@ async function $do23(client, request, options) {
|
|
|
45651
46132
|
path,
|
|
45652
46133
|
headers,
|
|
45653
46134
|
body,
|
|
46135
|
+
userAgent: client._options.userAgent,
|
|
45654
46136
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45655
46137
|
}, options);
|
|
45656
46138
|
if (!requestRes.ok) {
|
|
@@ -45689,12 +46171,12 @@ var init_vendorsExpediteTimeRemaining = __esm(() => {
|
|
|
45689
46171
|
});
|
|
45690
46172
|
|
|
45691
46173
|
// src/mcp-server/tools/vendorsExpediteTimeRemaining.ts
|
|
45692
|
-
var
|
|
46174
|
+
var args25, tool$vendorsExpediteTimeRemaining;
|
|
45693
46175
|
var init_vendorsExpediteTimeRemaining2 = __esm(() => {
|
|
45694
46176
|
init_vendorsExpediteTimeRemaining();
|
|
45695
46177
|
init_operations();
|
|
45696
46178
|
init_tools();
|
|
45697
|
-
|
|
46179
|
+
args25 = {
|
|
45698
46180
|
request: ExpediteTimeRemainingRequest$inboundSchema
|
|
45699
46181
|
};
|
|
45700
46182
|
tool$vendorsExpediteTimeRemaining = {
|
|
@@ -45702,9 +46184,9 @@ var init_vendorsExpediteTimeRemaining2 = __esm(() => {
|
|
|
45702
46184
|
description: `Expedite time remaining
|
|
45703
46185
|
|
|
45704
46186
|
For vendors who have a paid 24-hour expedite credentials invoice, get the remaining time (in seconds) for which submitted credentials will be expedited.`,
|
|
45705
|
-
args:
|
|
45706
|
-
tool: async (client,
|
|
45707
|
-
const [result, apiCall] = await vendorsExpediteTimeRemaining(client,
|
|
46187
|
+
args: args25,
|
|
46188
|
+
tool: async (client, args26, ctx) => {
|
|
46189
|
+
const [result, apiCall] = await vendorsExpediteTimeRemaining(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45708
46190
|
if (!result.ok) {
|
|
45709
46191
|
return {
|
|
45710
46192
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45719,9 +46201,9 @@ For vendors who have a paid 24-hour expedite credentials invoice, get the remain
|
|
|
45719
46201
|
|
|
45720
46202
|
// src/funcs/vendorsGetVendorCredentialDetails.ts
|
|
45721
46203
|
function vendorsGetVendorCredentialDetails(client, request, options) {
|
|
45722
|
-
return new APIPromise($
|
|
46204
|
+
return new APIPromise($do27(client, request, options));
|
|
45723
46205
|
}
|
|
45724
|
-
async function $
|
|
46206
|
+
async function $do27(client, request, options) {
|
|
45725
46207
|
const parsed = safeParse(request, (value) => GetVendorCredentialDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45726
46208
|
if (!parsed.ok) {
|
|
45727
46209
|
return [parsed, { status: "invalid" }];
|
|
@@ -45748,6 +46230,7 @@ async function $do24(client, request, options) {
|
|
|
45748
46230
|
const securityInput = await extractSecurity(client._options.security);
|
|
45749
46231
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45750
46232
|
const context = {
|
|
46233
|
+
options: client._options,
|
|
45751
46234
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45752
46235
|
operationID: "getVendorCredentialDetails",
|
|
45753
46236
|
oAuth2Scopes: [],
|
|
@@ -45764,6 +46247,7 @@ async function $do24(client, request, options) {
|
|
|
45764
46247
|
headers,
|
|
45765
46248
|
query,
|
|
45766
46249
|
body,
|
|
46250
|
+
userAgent: client._options.userAgent,
|
|
45767
46251
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45768
46252
|
}, options);
|
|
45769
46253
|
if (!requestRes.ok) {
|
|
@@ -45802,12 +46286,12 @@ var init_vendorsGetVendorCredentialDetails = __esm(() => {
|
|
|
45802
46286
|
});
|
|
45803
46287
|
|
|
45804
46288
|
// src/mcp-server/tools/vendorsGetVendorCredentialDetails.ts
|
|
45805
|
-
var
|
|
46289
|
+
var args26, tool$vendorsGetVendorCredentialDetails;
|
|
45806
46290
|
var init_vendorsGetVendorCredentialDetails2 = __esm(() => {
|
|
45807
46291
|
init_vendorsGetVendorCredentialDetails();
|
|
45808
46292
|
init_operations();
|
|
45809
46293
|
init_tools();
|
|
45810
|
-
|
|
46294
|
+
args26 = {
|
|
45811
46295
|
request: GetVendorCredentialDetailsRequest$inboundSchema
|
|
45812
46296
|
};
|
|
45813
46297
|
tool$vendorsGetVendorCredentialDetails = {
|
|
@@ -45832,9 +46316,9 @@ Available \`expand\` scopes are:
|
|
|
45832
46316
|
- vendor_credential.vendor_credential_data_requests
|
|
45833
46317
|
- vendor_credential.credential_variants
|
|
45834
46318
|
- vendor_credential.targets_chop`,
|
|
45835
|
-
args:
|
|
45836
|
-
tool: async (client,
|
|
45837
|
-
const [result, apiCall] = await vendorsGetVendorCredentialDetails(client,
|
|
46319
|
+
args: args26,
|
|
46320
|
+
tool: async (client, args27, ctx) => {
|
|
46321
|
+
const [result, apiCall] = await vendorsGetVendorCredentialDetails(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45838
46322
|
if (!result.ok) {
|
|
45839
46323
|
return {
|
|
45840
46324
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45849,9 +46333,9 @@ Available \`expand\` scopes are:
|
|
|
45849
46333
|
|
|
45850
46334
|
// src/funcs/vendorsGetVendorCredentialFile.ts
|
|
45851
46335
|
function vendorsGetVendorCredentialFile(client, request, options) {
|
|
45852
|
-
return new APIPromise($
|
|
46336
|
+
return new APIPromise($do28(client, request, options));
|
|
45853
46337
|
}
|
|
45854
|
-
async function $
|
|
46338
|
+
async function $do28(client, request, options) {
|
|
45855
46339
|
const parsed = safeParse(request, (value) => GetVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45856
46340
|
if (!parsed.ok) {
|
|
45857
46341
|
return [parsed, { status: "invalid" }];
|
|
@@ -45875,6 +46359,7 @@ async function $do25(client, request, options) {
|
|
|
45875
46359
|
const securityInput = await extractSecurity(client._options.security);
|
|
45876
46360
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45877
46361
|
const context = {
|
|
46362
|
+
options: client._options,
|
|
45878
46363
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45879
46364
|
operationID: "getVendorCredentialFile",
|
|
45880
46365
|
oAuth2Scopes: [],
|
|
@@ -45891,6 +46376,7 @@ async function $do25(client, request, options) {
|
|
|
45891
46376
|
headers,
|
|
45892
46377
|
query,
|
|
45893
46378
|
body,
|
|
46379
|
+
userAgent: client._options.userAgent,
|
|
45894
46380
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
45895
46381
|
}, options);
|
|
45896
46382
|
if (!requestRes.ok) {
|
|
@@ -45930,12 +46416,12 @@ var init_vendorsGetVendorCredentialFile = __esm(() => {
|
|
|
45930
46416
|
});
|
|
45931
46417
|
|
|
45932
46418
|
// src/mcp-server/tools/vendorsGetVendorCredentialFile.ts
|
|
45933
|
-
var
|
|
46419
|
+
var args27, tool$vendorsGetVendorCredentialFile;
|
|
45934
46420
|
var init_vendorsGetVendorCredentialFile2 = __esm(() => {
|
|
45935
46421
|
init_vendorsGetVendorCredentialFile();
|
|
45936
46422
|
init_operations();
|
|
45937
46423
|
init_tools();
|
|
45938
|
-
|
|
46424
|
+
args27 = {
|
|
45939
46425
|
request: GetVendorCredentialFileRequest$inboundSchema
|
|
45940
46426
|
};
|
|
45941
46427
|
tool$vendorsGetVendorCredentialFile = {
|
|
@@ -45948,9 +46434,9 @@ Available \`expand\` scopes are:
|
|
|
45948
46434
|
|
|
45949
46435
|
- vendor_credential_file.vendor_credential
|
|
45950
46436
|
- vendor_credential_file.credential_document`,
|
|
45951
|
-
args:
|
|
45952
|
-
tool: async (client,
|
|
45953
|
-
const [result, apiCall] = await vendorsGetVendorCredentialFile(client,
|
|
46437
|
+
args: args27,
|
|
46438
|
+
tool: async (client, args28, ctx) => {
|
|
46439
|
+
const [result, apiCall] = await vendorsGetVendorCredentialFile(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45954
46440
|
if (!result.ok) {
|
|
45955
46441
|
return {
|
|
45956
46442
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45965,9 +46451,9 @@ Available \`expand\` scopes are:
|
|
|
45965
46451
|
|
|
45966
46452
|
// src/funcs/vendorsGetVendorInvoiceDetails.ts
|
|
45967
46453
|
function vendorsGetVendorInvoiceDetails(client, request, options) {
|
|
45968
|
-
return new APIPromise($
|
|
46454
|
+
return new APIPromise($do29(client, request, options));
|
|
45969
46455
|
}
|
|
45970
|
-
async function $
|
|
46456
|
+
async function $do29(client, request, options) {
|
|
45971
46457
|
const parsed = safeParse(request, (value) => GetVendorInvoiceDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45972
46458
|
if (!parsed.ok) {
|
|
45973
46459
|
return [parsed, { status: "invalid" }];
|
|
@@ -45990,6 +46476,7 @@ async function $do26(client, request, options) {
|
|
|
45990
46476
|
const securityInput = await extractSecurity(client._options.security);
|
|
45991
46477
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
45992
46478
|
const context = {
|
|
46479
|
+
options: client._options,
|
|
45993
46480
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
45994
46481
|
operationID: "getVendorInvoiceDetails",
|
|
45995
46482
|
oAuth2Scopes: [],
|
|
@@ -46006,6 +46493,7 @@ async function $do26(client, request, options) {
|
|
|
46006
46493
|
headers,
|
|
46007
46494
|
query,
|
|
46008
46495
|
body,
|
|
46496
|
+
userAgent: client._options.userAgent,
|
|
46009
46497
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46010
46498
|
}, options);
|
|
46011
46499
|
if (!requestRes.ok) {
|
|
@@ -46045,12 +46533,12 @@ var init_vendorsGetVendorInvoiceDetails = __esm(() => {
|
|
|
46045
46533
|
});
|
|
46046
46534
|
|
|
46047
46535
|
// src/mcp-server/tools/vendorsGetVendorInvoiceDetails.ts
|
|
46048
|
-
var
|
|
46536
|
+
var args28, tool$vendorsGetVendorInvoiceDetails;
|
|
46049
46537
|
var init_vendorsGetVendorInvoiceDetails2 = __esm(() => {
|
|
46050
46538
|
init_vendorsGetVendorInvoiceDetails();
|
|
46051
46539
|
init_operations();
|
|
46052
46540
|
init_tools();
|
|
46053
|
-
|
|
46541
|
+
args28 = {
|
|
46054
46542
|
request: GetVendorInvoiceDetailsRequest$inboundSchema
|
|
46055
46543
|
};
|
|
46056
46544
|
tool$vendorsGetVendorInvoiceDetails = {
|
|
@@ -46063,9 +46551,9 @@ Available \`expand\` scopes are:
|
|
|
46063
46551
|
|
|
46064
46552
|
invoice.line_items
|
|
46065
46553
|
invoice.invoice_transactions`,
|
|
46066
|
-
args:
|
|
46067
|
-
tool: async (client,
|
|
46068
|
-
const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client,
|
|
46554
|
+
args: args28,
|
|
46555
|
+
tool: async (client, args29, ctx) => {
|
|
46556
|
+
const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46069
46557
|
if (!result.ok) {
|
|
46070
46558
|
return {
|
|
46071
46559
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46080,9 +46568,9 @@ invoice.invoice_transactions`,
|
|
|
46080
46568
|
|
|
46081
46569
|
// src/funcs/vendorsGetVendorLegalName.ts
|
|
46082
46570
|
function vendorsGetVendorLegalName(client, request, options) {
|
|
46083
|
-
return new APIPromise($
|
|
46571
|
+
return new APIPromise($do30(client, request, options));
|
|
46084
46572
|
}
|
|
46085
|
-
async function $
|
|
46573
|
+
async function $do30(client, request, options) {
|
|
46086
46574
|
const parsed = safeParse(request, (value) => GetVendorLegalNameRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46087
46575
|
if (!parsed.ok) {
|
|
46088
46576
|
return [parsed, { status: "invalid" }];
|
|
@@ -46102,6 +46590,7 @@ async function $do27(client, request, options) {
|
|
|
46102
46590
|
const securityInput = await extractSecurity(client._options.security);
|
|
46103
46591
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46104
46592
|
const context = {
|
|
46593
|
+
options: client._options,
|
|
46105
46594
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46106
46595
|
operationID: "getVendorLegalName",
|
|
46107
46596
|
oAuth2Scopes: [],
|
|
@@ -46117,6 +46606,7 @@ async function $do27(client, request, options) {
|
|
|
46117
46606
|
path,
|
|
46118
46607
|
headers,
|
|
46119
46608
|
body,
|
|
46609
|
+
userAgent: client._options.userAgent,
|
|
46120
46610
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46121
46611
|
}, options);
|
|
46122
46612
|
if (!requestRes.ok) {
|
|
@@ -46155,12 +46645,12 @@ var init_vendorsGetVendorLegalName = __esm(() => {
|
|
|
46155
46645
|
});
|
|
46156
46646
|
|
|
46157
46647
|
// src/mcp-server/tools/vendorsGetVendorLegalName.ts
|
|
46158
|
-
var
|
|
46648
|
+
var args29, tool$vendorsGetVendorLegalName;
|
|
46159
46649
|
var init_vendorsGetVendorLegalName2 = __esm(() => {
|
|
46160
46650
|
init_vendorsGetVendorLegalName();
|
|
46161
46651
|
init_operations();
|
|
46162
46652
|
init_tools();
|
|
46163
|
-
|
|
46653
|
+
args29 = {
|
|
46164
46654
|
request: GetVendorLegalNameRequest$inboundSchema
|
|
46165
46655
|
};
|
|
46166
46656
|
tool$vendorsGetVendorLegalName = {
|
|
@@ -46168,9 +46658,9 @@ var init_vendorsGetVendorLegalName2 = __esm(() => {
|
|
|
46168
46658
|
description: `Get Vendor legal name
|
|
46169
46659
|
|
|
46170
46660
|
Get vendor legal name`,
|
|
46171
|
-
args:
|
|
46172
|
-
tool: async (client,
|
|
46173
|
-
const [result, apiCall] = await vendorsGetVendorLegalName(client,
|
|
46661
|
+
args: args29,
|
|
46662
|
+
tool: async (client, args30, ctx) => {
|
|
46663
|
+
const [result, apiCall] = await vendorsGetVendorLegalName(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46174
46664
|
if (!result.ok) {
|
|
46175
46665
|
return {
|
|
46176
46666
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46185,9 +46675,9 @@ Get vendor legal name`,
|
|
|
46185
46675
|
|
|
46186
46676
|
// src/funcs/vendorsGetVendorsDetails.ts
|
|
46187
46677
|
function vendorsGetVendorsDetails(client, request, options) {
|
|
46188
|
-
return new APIPromise($
|
|
46678
|
+
return new APIPromise($do31(client, request, options));
|
|
46189
46679
|
}
|
|
46190
|
-
async function $
|
|
46680
|
+
async function $do31(client, request, options) {
|
|
46191
46681
|
const parsed = safeParse(request, (value) => GetVendorsDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46192
46682
|
if (!parsed.ok) {
|
|
46193
46683
|
return [parsed, { status: "invalid" }];
|
|
@@ -46210,6 +46700,7 @@ async function $do28(client, request, options) {
|
|
|
46210
46700
|
const securityInput = await extractSecurity(client._options.security);
|
|
46211
46701
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46212
46702
|
const context = {
|
|
46703
|
+
options: client._options,
|
|
46213
46704
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46214
46705
|
operationID: "getVendorsDetails",
|
|
46215
46706
|
oAuth2Scopes: [],
|
|
@@ -46226,6 +46717,7 @@ async function $do28(client, request, options) {
|
|
|
46226
46717
|
headers,
|
|
46227
46718
|
query,
|
|
46228
46719
|
body,
|
|
46720
|
+
userAgent: client._options.userAgent,
|
|
46229
46721
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46230
46722
|
}, options);
|
|
46231
46723
|
if (!requestRes.ok) {
|
|
@@ -46265,12 +46757,12 @@ var init_vendorsGetVendorsDetails = __esm(() => {
|
|
|
46265
46757
|
});
|
|
46266
46758
|
|
|
46267
46759
|
// src/mcp-server/tools/vendorsGetVendorsDetails.ts
|
|
46268
|
-
var
|
|
46760
|
+
var args30, tool$vendorsGetVendorsDetails;
|
|
46269
46761
|
var init_vendorsGetVendorsDetails2 = __esm(() => {
|
|
46270
46762
|
init_vendorsGetVendorsDetails();
|
|
46271
46763
|
init_operations();
|
|
46272
46764
|
init_tools();
|
|
46273
|
-
|
|
46765
|
+
args30 = {
|
|
46274
46766
|
request: GetVendorsDetailsRequest$inboundSchema
|
|
46275
46767
|
};
|
|
46276
46768
|
tool$vendorsGetVendorsDetails = {
|
|
@@ -46295,9 +46787,9 @@ vendor.payment_responsibility
|
|
|
46295
46787
|
vendor.background_check_date_expires
|
|
46296
46788
|
vendor.registration_data
|
|
46297
46789
|
vendor.registration_finished`,
|
|
46298
|
-
args:
|
|
46299
|
-
tool: async (client,
|
|
46300
|
-
const [result, apiCall] = await vendorsGetVendorsDetails(client,
|
|
46790
|
+
args: args30,
|
|
46791
|
+
tool: async (client, args31, ctx) => {
|
|
46792
|
+
const [result, apiCall] = await vendorsGetVendorsDetails(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46301
46793
|
if (!result.ok) {
|
|
46302
46794
|
return {
|
|
46303
46795
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46312,9 +46804,9 @@ vendor.registration_finished`,
|
|
|
46312
46804
|
|
|
46313
46805
|
// src/funcs/vendorsListVendorAdditionalFacilityFields.ts
|
|
46314
46806
|
function vendorsListVendorAdditionalFacilityFields(client, request, options) {
|
|
46315
|
-
return new APIPromise($
|
|
46807
|
+
return new APIPromise($do32(client, request, options));
|
|
46316
46808
|
}
|
|
46317
|
-
async function $
|
|
46809
|
+
async function $do32(client, request, options) {
|
|
46318
46810
|
const parsed = safeParse(request, (value) => ListVendorAdditionalFacilityFieldsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46319
46811
|
if (!parsed.ok) {
|
|
46320
46812
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -46340,6 +46832,7 @@ async function $do29(client, request, options) {
|
|
|
46340
46832
|
const securityInput = await extractSecurity(client._options.security);
|
|
46341
46833
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46342
46834
|
const context = {
|
|
46835
|
+
options: client._options,
|
|
46343
46836
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46344
46837
|
operationID: "listVendorAdditionalFacilityFields",
|
|
46345
46838
|
oAuth2Scopes: [],
|
|
@@ -46356,6 +46849,7 @@ async function $do29(client, request, options) {
|
|
|
46356
46849
|
headers,
|
|
46357
46850
|
query,
|
|
46358
46851
|
body,
|
|
46852
|
+
userAgent: client._options.userAgent,
|
|
46359
46853
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46360
46854
|
}, options);
|
|
46361
46855
|
if (!requestRes.ok) {
|
|
@@ -46424,12 +46918,12 @@ var init_vendorsListVendorAdditionalFacilityFields = __esm(() => {
|
|
|
46424
46918
|
});
|
|
46425
46919
|
|
|
46426
46920
|
// src/mcp-server/tools/vendorsListVendorAdditionalFacilityFields.ts
|
|
46427
|
-
var
|
|
46921
|
+
var args31, tool$vendorsListVendorAdditionalFacilityFields;
|
|
46428
46922
|
var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
|
|
46429
46923
|
init_vendorsListVendorAdditionalFacilityFields();
|
|
46430
46924
|
init_operations();
|
|
46431
46925
|
init_tools();
|
|
46432
|
-
|
|
46926
|
+
args31 = {
|
|
46433
46927
|
request: ListVendorAdditionalFacilityFieldsRequest$inboundSchema
|
|
46434
46928
|
};
|
|
46435
46929
|
tool$vendorsListVendorAdditionalFacilityFields = {
|
|
@@ -46437,9 +46931,9 @@ var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
|
|
|
46437
46931
|
description: `List of vendor's additional facility fields
|
|
46438
46932
|
|
|
46439
46933
|
List of vendor's additional facility fields`,
|
|
46440
|
-
args:
|
|
46441
|
-
tool: async (client,
|
|
46442
|
-
const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client,
|
|
46934
|
+
args: args31,
|
|
46935
|
+
tool: async (client, args32, ctx) => {
|
|
46936
|
+
const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46443
46937
|
if (!result.ok) {
|
|
46444
46938
|
return {
|
|
46445
46939
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46454,9 +46948,9 @@ List of vendor's additional facility fields`,
|
|
|
46454
46948
|
|
|
46455
46949
|
// src/funcs/vendorsListVendorCredentialDataRequests.ts
|
|
46456
46950
|
function vendorsListVendorCredentialDataRequests(client, request, options) {
|
|
46457
|
-
return new APIPromise($
|
|
46951
|
+
return new APIPromise($do33(client, request, options));
|
|
46458
46952
|
}
|
|
46459
|
-
async function $
|
|
46953
|
+
async function $do33(client, request, options) {
|
|
46460
46954
|
const parsed = safeParse(request, (value) => ListVendorCredentialDataRequestsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46461
46955
|
if (!parsed.ok) {
|
|
46462
46956
|
return [parsed, { status: "invalid" }];
|
|
@@ -46481,6 +46975,7 @@ async function $do30(client, request, options) {
|
|
|
46481
46975
|
const securityInput = await extractSecurity(client._options.security);
|
|
46482
46976
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46483
46977
|
const context = {
|
|
46978
|
+
options: client._options,
|
|
46484
46979
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46485
46980
|
operationID: "listVendorCredentialDataRequests",
|
|
46486
46981
|
oAuth2Scopes: [],
|
|
@@ -46497,6 +46992,7 @@ async function $do30(client, request, options) {
|
|
|
46497
46992
|
headers,
|
|
46498
46993
|
query,
|
|
46499
46994
|
body,
|
|
46995
|
+
userAgent: client._options.userAgent,
|
|
46500
46996
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46501
46997
|
}, options);
|
|
46502
46998
|
if (!requestRes.ok) {
|
|
@@ -46537,12 +47033,12 @@ var init_vendorsListVendorCredentialDataRequests = __esm(() => {
|
|
|
46537
47033
|
});
|
|
46538
47034
|
|
|
46539
47035
|
// src/mcp-server/tools/vendorsListVendorCredentialDataRequests.ts
|
|
46540
|
-
var
|
|
47036
|
+
var args32, tool$vendorsListVendorCredentialDataRequests;
|
|
46541
47037
|
var init_vendorsListVendorCredentialDataRequests2 = __esm(() => {
|
|
46542
47038
|
init_vendorsListVendorCredentialDataRequests();
|
|
46543
47039
|
init_operations();
|
|
46544
47040
|
init_tools();
|
|
46545
|
-
|
|
47041
|
+
args32 = {
|
|
46546
47042
|
request: ListVendorCredentialDataRequestsRequest$inboundSchema
|
|
46547
47043
|
};
|
|
46548
47044
|
tool$vendorsListVendorCredentialDataRequests = {
|
|
@@ -46555,9 +47051,9 @@ Available \`expand\` scopes are:
|
|
|
46555
47051
|
|
|
46556
47052
|
- vendor_credential_data_request.vendor_credential
|
|
46557
47053
|
- vendor_credential_data_request.data_request`,
|
|
46558
|
-
args:
|
|
46559
|
-
tool: async (client,
|
|
46560
|
-
const [result, apiCall] = await vendorsListVendorCredentialDataRequests(client,
|
|
47054
|
+
args: args32,
|
|
47055
|
+
tool: async (client, args33, ctx) => {
|
|
47056
|
+
const [result, apiCall] = await vendorsListVendorCredentialDataRequests(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46561
47057
|
if (!result.ok) {
|
|
46562
47058
|
return {
|
|
46563
47059
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46572,9 +47068,9 @@ Available \`expand\` scopes are:
|
|
|
46572
47068
|
|
|
46573
47069
|
// src/funcs/vendorsListVendorCredentialFiles.ts
|
|
46574
47070
|
function vendorsListVendorCredentialFiles(client, request, options) {
|
|
46575
|
-
return new APIPromise($
|
|
47071
|
+
return new APIPromise($do34(client, request, options));
|
|
46576
47072
|
}
|
|
46577
|
-
async function $
|
|
47073
|
+
async function $do34(client, request, options) {
|
|
46578
47074
|
const parsed = safeParse(request, (value) => ListVendorCredentialFilesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46579
47075
|
if (!parsed.ok) {
|
|
46580
47076
|
return [parsed, { status: "invalid" }];
|
|
@@ -46599,6 +47095,7 @@ async function $do31(client, request, options) {
|
|
|
46599
47095
|
const securityInput = await extractSecurity(client._options.security);
|
|
46600
47096
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46601
47097
|
const context = {
|
|
47098
|
+
options: client._options,
|
|
46602
47099
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46603
47100
|
operationID: "listVendorCredentialFiles",
|
|
46604
47101
|
oAuth2Scopes: [],
|
|
@@ -46615,6 +47112,7 @@ async function $do31(client, request, options) {
|
|
|
46615
47112
|
headers,
|
|
46616
47113
|
query,
|
|
46617
47114
|
body,
|
|
47115
|
+
userAgent: client._options.userAgent,
|
|
46618
47116
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46619
47117
|
}, options);
|
|
46620
47118
|
if (!requestRes.ok) {
|
|
@@ -46655,12 +47153,12 @@ var init_vendorsListVendorCredentialFiles = __esm(() => {
|
|
|
46655
47153
|
});
|
|
46656
47154
|
|
|
46657
47155
|
// src/mcp-server/tools/vendorsListVendorCredentialFiles.ts
|
|
46658
|
-
var
|
|
47156
|
+
var args33, tool$vendorsListVendorCredentialFiles;
|
|
46659
47157
|
var init_vendorsListVendorCredentialFiles2 = __esm(() => {
|
|
46660
47158
|
init_vendorsListVendorCredentialFiles();
|
|
46661
47159
|
init_operations();
|
|
46662
47160
|
init_tools();
|
|
46663
|
-
|
|
47161
|
+
args33 = {
|
|
46664
47162
|
request: ListVendorCredentialFilesRequest$inboundSchema
|
|
46665
47163
|
};
|
|
46666
47164
|
tool$vendorsListVendorCredentialFiles = {
|
|
@@ -46673,9 +47171,9 @@ Available \`expand\` scopes are:
|
|
|
46673
47171
|
|
|
46674
47172
|
- vendor_credential_file.vendor_credential
|
|
46675
47173
|
- vendor_credential_file.credential_document`,
|
|
46676
|
-
args:
|
|
46677
|
-
tool: async (client,
|
|
46678
|
-
const [result, apiCall] = await vendorsListVendorCredentialFiles(client,
|
|
47174
|
+
args: args33,
|
|
47175
|
+
tool: async (client, args34, ctx) => {
|
|
47176
|
+
const [result, apiCall] = await vendorsListVendorCredentialFiles(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46679
47177
|
if (!result.ok) {
|
|
46680
47178
|
return {
|
|
46681
47179
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46690,9 +47188,9 @@ Available \`expand\` scopes are:
|
|
|
46690
47188
|
|
|
46691
47189
|
// src/funcs/vendorsListVendorCredentialHistory.ts
|
|
46692
47190
|
function vendorsListVendorCredentialHistory(client, request, options) {
|
|
46693
|
-
return new APIPromise($
|
|
47191
|
+
return new APIPromise($do35(client, request, options));
|
|
46694
47192
|
}
|
|
46695
|
-
async function $
|
|
47193
|
+
async function $do35(client, request, options) {
|
|
46696
47194
|
const parsed = safeParse(request, (value) => ListVendorCredentialHistoryRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46697
47195
|
if (!parsed.ok) {
|
|
46698
47196
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -46719,6 +47217,7 @@ async function $do32(client, request, options) {
|
|
|
46719
47217
|
const securityInput = await extractSecurity(client._options.security);
|
|
46720
47218
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46721
47219
|
const context = {
|
|
47220
|
+
options: client._options,
|
|
46722
47221
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46723
47222
|
operationID: "listVendorCredentialHistory",
|
|
46724
47223
|
oAuth2Scopes: [],
|
|
@@ -46735,6 +47234,7 @@ async function $do32(client, request, options) {
|
|
|
46735
47234
|
headers,
|
|
46736
47235
|
query,
|
|
46737
47236
|
body,
|
|
47237
|
+
userAgent: client._options.userAgent,
|
|
46738
47238
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46739
47239
|
}, options);
|
|
46740
47240
|
if (!requestRes.ok) {
|
|
@@ -46805,12 +47305,12 @@ var init_vendorsListVendorCredentialHistory = __esm(() => {
|
|
|
46805
47305
|
});
|
|
46806
47306
|
|
|
46807
47307
|
// src/mcp-server/tools/vendorsListVendorCredentialHistory.ts
|
|
46808
|
-
var
|
|
47308
|
+
var args34, tool$vendorsListVendorCredentialHistory;
|
|
46809
47309
|
var init_vendorsListVendorCredentialHistory2 = __esm(() => {
|
|
46810
47310
|
init_vendorsListVendorCredentialHistory();
|
|
46811
47311
|
init_operations();
|
|
46812
47312
|
init_tools();
|
|
46813
|
-
|
|
47313
|
+
args34 = {
|
|
46814
47314
|
request: ListVendorCredentialHistoryRequest$inboundSchema
|
|
46815
47315
|
};
|
|
46816
47316
|
tool$vendorsListVendorCredentialHistory = {
|
|
@@ -46818,9 +47318,9 @@ var init_vendorsListVendorCredentialHistory2 = __esm(() => {
|
|
|
46818
47318
|
description: `List Vendor Credential History
|
|
46819
47319
|
|
|
46820
47320
|
Lists vendor credentials history`,
|
|
46821
|
-
args:
|
|
46822
|
-
tool: async (client,
|
|
46823
|
-
const [result, apiCall] = await vendorsListVendorCredentialHistory(client,
|
|
47321
|
+
args: args34,
|
|
47322
|
+
tool: async (client, args35, ctx) => {
|
|
47323
|
+
const [result, apiCall] = await vendorsListVendorCredentialHistory(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46824
47324
|
if (!result.ok) {
|
|
46825
47325
|
return {
|
|
46826
47326
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46835,9 +47335,9 @@ Lists vendor credentials history`,
|
|
|
46835
47335
|
|
|
46836
47336
|
// src/funcs/vendorsListVendorCredentials.ts
|
|
46837
47337
|
function vendorsListVendorCredentials(client, request, options) {
|
|
46838
|
-
return new APIPromise($
|
|
47338
|
+
return new APIPromise($do36(client, request, options));
|
|
46839
47339
|
}
|
|
46840
|
-
async function $
|
|
47340
|
+
async function $do36(client, request, options) {
|
|
46841
47341
|
const parsed = safeParse(request, (value) => ListVendorCredentialsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46842
47342
|
if (!parsed.ok) {
|
|
46843
47343
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -46869,6 +47369,7 @@ async function $do33(client, request, options) {
|
|
|
46869
47369
|
const securityInput = await extractSecurity(client._options.security);
|
|
46870
47370
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
46871
47371
|
const context = {
|
|
47372
|
+
options: client._options,
|
|
46872
47373
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
46873
47374
|
operationID: "listVendorCredentials",
|
|
46874
47375
|
oAuth2Scopes: [],
|
|
@@ -46885,6 +47386,7 @@ async function $do33(client, request, options) {
|
|
|
46885
47386
|
headers,
|
|
46886
47387
|
query,
|
|
46887
47388
|
body,
|
|
47389
|
+
userAgent: client._options.userAgent,
|
|
46888
47390
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
46889
47391
|
}, options);
|
|
46890
47392
|
if (!requestRes.ok) {
|
|
@@ -46955,12 +47457,12 @@ var init_vendorsListVendorCredentials = __esm(() => {
|
|
|
46955
47457
|
});
|
|
46956
47458
|
|
|
46957
47459
|
// src/mcp-server/tools/vendorsListVendorCredentials.ts
|
|
46958
|
-
var
|
|
47460
|
+
var args35, tool$vendorsListVendorCredentials;
|
|
46959
47461
|
var init_vendorsListVendorCredentials2 = __esm(() => {
|
|
46960
47462
|
init_vendorsListVendorCredentials();
|
|
46961
47463
|
init_operations();
|
|
46962
47464
|
init_tools();
|
|
46963
|
-
|
|
47465
|
+
args35 = {
|
|
46964
47466
|
request: ListVendorCredentialsRequest$inboundSchema
|
|
46965
47467
|
};
|
|
46966
47468
|
tool$vendorsListVendorCredentials = {
|
|
@@ -46968,9 +47470,9 @@ var init_vendorsListVendorCredentials2 = __esm(() => {
|
|
|
46968
47470
|
description: `List Vendor Credentials
|
|
46969
47471
|
|
|
46970
47472
|
Lists vendor credentials, required credentials, and company credentials. Utilized in Vendor Dashboard.`,
|
|
46971
|
-
args:
|
|
46972
|
-
tool: async (client,
|
|
46973
|
-
const [result, apiCall] = await vendorsListVendorCredentials(client,
|
|
47473
|
+
args: args35,
|
|
47474
|
+
tool: async (client, args36, ctx) => {
|
|
47475
|
+
const [result, apiCall] = await vendorsListVendorCredentials(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46974
47476
|
if (!result.ok) {
|
|
46975
47477
|
return {
|
|
46976
47478
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46985,9 +47487,9 @@ Lists vendor credentials, required credentials, and company credentials. Utilize
|
|
|
46985
47487
|
|
|
46986
47488
|
// src/funcs/vendorsListVendorCredits.ts
|
|
46987
47489
|
function vendorsListVendorCredits(client, request, options) {
|
|
46988
|
-
return new APIPromise($
|
|
47490
|
+
return new APIPromise($do37(client, request, options));
|
|
46989
47491
|
}
|
|
46990
|
-
async function $
|
|
47492
|
+
async function $do37(client, request, options) {
|
|
46991
47493
|
const parsed = safeParse(request, (value) => ListVendorCreditsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46992
47494
|
if (!parsed.ok) {
|
|
46993
47495
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47013,6 +47515,7 @@ async function $do34(client, request, options) {
|
|
|
47013
47515
|
const securityInput = await extractSecurity(client._options.security);
|
|
47014
47516
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47015
47517
|
const context = {
|
|
47518
|
+
options: client._options,
|
|
47016
47519
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47017
47520
|
operationID: "listVendorCredits",
|
|
47018
47521
|
oAuth2Scopes: [],
|
|
@@ -47029,6 +47532,7 @@ async function $do34(client, request, options) {
|
|
|
47029
47532
|
headers,
|
|
47030
47533
|
query,
|
|
47031
47534
|
body,
|
|
47535
|
+
userAgent: client._options.userAgent,
|
|
47032
47536
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47033
47537
|
}, options);
|
|
47034
47538
|
if (!requestRes.ok) {
|
|
@@ -47099,12 +47603,12 @@ var init_vendorsListVendorCredits = __esm(() => {
|
|
|
47099
47603
|
});
|
|
47100
47604
|
|
|
47101
47605
|
// src/mcp-server/tools/vendorsListVendorCredits.ts
|
|
47102
|
-
var
|
|
47606
|
+
var args36, tool$vendorsListVendorCredits;
|
|
47103
47607
|
var init_vendorsListVendorCredits2 = __esm(() => {
|
|
47104
47608
|
init_vendorsListVendorCredits();
|
|
47105
47609
|
init_operations();
|
|
47106
47610
|
init_tools();
|
|
47107
|
-
|
|
47611
|
+
args36 = {
|
|
47108
47612
|
request: ListVendorCreditsRequest$inboundSchema
|
|
47109
47613
|
};
|
|
47110
47614
|
tool$vendorsListVendorCredits = {
|
|
@@ -47112,9 +47616,9 @@ var init_vendorsListVendorCredits2 = __esm(() => {
|
|
|
47112
47616
|
description: `List vendor credits
|
|
47113
47617
|
|
|
47114
47618
|
List the credits for the vendor`,
|
|
47115
|
-
args:
|
|
47116
|
-
tool: async (client,
|
|
47117
|
-
const [result, apiCall] = await vendorsListVendorCredits(client,
|
|
47619
|
+
args: args36,
|
|
47620
|
+
tool: async (client, args37, ctx) => {
|
|
47621
|
+
const [result, apiCall] = await vendorsListVendorCredits(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47118
47622
|
if (!result.ok) {
|
|
47119
47623
|
return {
|
|
47120
47624
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47129,9 +47633,9 @@ List the credits for the vendor`,
|
|
|
47129
47633
|
|
|
47130
47634
|
// src/funcs/vendorsListVendorFacilityStatuses.ts
|
|
47131
47635
|
function vendorsListVendorFacilityStatuses(client, request, options) {
|
|
47132
|
-
return new APIPromise($
|
|
47636
|
+
return new APIPromise($do38(client, request, options));
|
|
47133
47637
|
}
|
|
47134
|
-
async function $
|
|
47638
|
+
async function $do38(client, request, options) {
|
|
47135
47639
|
const parsed = safeParse(request, (value) => ListVendorFacilityStatusesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47136
47640
|
if (!parsed.ok) {
|
|
47137
47641
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47153,6 +47657,7 @@ async function $do35(client, request, options) {
|
|
|
47153
47657
|
const securityInput = await extractSecurity(client._options.security);
|
|
47154
47658
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47155
47659
|
const context = {
|
|
47660
|
+
options: client._options,
|
|
47156
47661
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47157
47662
|
operationID: "listVendorFacilityStatuses",
|
|
47158
47663
|
oAuth2Scopes: [],
|
|
@@ -47169,6 +47674,7 @@ async function $do35(client, request, options) {
|
|
|
47169
47674
|
headers,
|
|
47170
47675
|
query,
|
|
47171
47676
|
body,
|
|
47677
|
+
userAgent: client._options.userAgent,
|
|
47172
47678
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47173
47679
|
}, options);
|
|
47174
47680
|
if (!requestRes.ok) {
|
|
@@ -47239,12 +47745,12 @@ var init_vendorsListVendorFacilityStatuses = __esm(() => {
|
|
|
47239
47745
|
});
|
|
47240
47746
|
|
|
47241
47747
|
// src/mcp-server/tools/vendorsListVendorFacilityStatuses.ts
|
|
47242
|
-
var
|
|
47748
|
+
var args37, tool$vendorsListVendorFacilityStatuses;
|
|
47243
47749
|
var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
|
|
47244
47750
|
init_vendorsListVendorFacilityStatuses();
|
|
47245
47751
|
init_operations();
|
|
47246
47752
|
init_tools();
|
|
47247
|
-
|
|
47753
|
+
args37 = {
|
|
47248
47754
|
request: ListVendorFacilityStatusesRequest$inboundSchema
|
|
47249
47755
|
};
|
|
47250
47756
|
tool$vendorsListVendorFacilityStatuses = {
|
|
@@ -47252,9 +47758,9 @@ var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
|
|
|
47252
47758
|
description: `List vendor facility statuses
|
|
47253
47759
|
|
|
47254
47760
|
List the facilities for the vendor`,
|
|
47255
|
-
args:
|
|
47256
|
-
tool: async (client,
|
|
47257
|
-
const [result, apiCall] = await vendorsListVendorFacilityStatuses(client,
|
|
47761
|
+
args: args37,
|
|
47762
|
+
tool: async (client, args38, ctx) => {
|
|
47763
|
+
const [result, apiCall] = await vendorsListVendorFacilityStatuses(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47258
47764
|
if (!result.ok) {
|
|
47259
47765
|
return {
|
|
47260
47766
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47269,9 +47775,9 @@ List the facilities for the vendor`,
|
|
|
47269
47775
|
|
|
47270
47776
|
// src/funcs/vendorsListVendorInvoices.ts
|
|
47271
47777
|
function vendorsListVendorInvoices(client, request, options) {
|
|
47272
|
-
return new APIPromise($
|
|
47778
|
+
return new APIPromise($do39(client, request, options));
|
|
47273
47779
|
}
|
|
47274
|
-
async function $
|
|
47780
|
+
async function $do39(client, request, options) {
|
|
47275
47781
|
const parsed = safeParse(request, (value) => ListVendorInvoicesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47276
47782
|
if (!parsed.ok) {
|
|
47277
47783
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47301,6 +47807,7 @@ async function $do36(client, request, options) {
|
|
|
47301
47807
|
const securityInput = await extractSecurity(client._options.security);
|
|
47302
47808
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47303
47809
|
const context = {
|
|
47810
|
+
options: client._options,
|
|
47304
47811
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47305
47812
|
operationID: "listVendorInvoices",
|
|
47306
47813
|
oAuth2Scopes: [],
|
|
@@ -47317,6 +47824,7 @@ async function $do36(client, request, options) {
|
|
|
47317
47824
|
headers,
|
|
47318
47825
|
query,
|
|
47319
47826
|
body,
|
|
47827
|
+
userAgent: client._options.userAgent,
|
|
47320
47828
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47321
47829
|
}, options);
|
|
47322
47830
|
if (!requestRes.ok) {
|
|
@@ -47387,12 +47895,12 @@ var init_vendorsListVendorInvoices = __esm(() => {
|
|
|
47387
47895
|
});
|
|
47388
47896
|
|
|
47389
47897
|
// src/mcp-server/tools/vendorsListVendorInvoices.ts
|
|
47390
|
-
var
|
|
47898
|
+
var args38, tool$vendorsListVendorInvoices;
|
|
47391
47899
|
var init_vendorsListVendorInvoices2 = __esm(() => {
|
|
47392
47900
|
init_vendorsListVendorInvoices();
|
|
47393
47901
|
init_operations();
|
|
47394
47902
|
init_tools();
|
|
47395
|
-
|
|
47903
|
+
args38 = {
|
|
47396
47904
|
request: ListVendorInvoicesRequest$inboundSchema
|
|
47397
47905
|
};
|
|
47398
47906
|
tool$vendorsListVendorInvoices = {
|
|
@@ -47404,9 +47912,9 @@ List invoices for Vendors
|
|
|
47404
47912
|
Available \`expand\` scopes are:
|
|
47405
47913
|
|
|
47406
47914
|
invoice.line_items`,
|
|
47407
|
-
args:
|
|
47408
|
-
tool: async (client,
|
|
47409
|
-
const [result, apiCall] = await vendorsListVendorInvoices(client,
|
|
47915
|
+
args: args38,
|
|
47916
|
+
tool: async (client, args39, ctx) => {
|
|
47917
|
+
const [result, apiCall] = await vendorsListVendorInvoices(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47410
47918
|
if (!result.ok) {
|
|
47411
47919
|
return {
|
|
47412
47920
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47421,9 +47929,9 @@ invoice.line_items`,
|
|
|
47421
47929
|
|
|
47422
47930
|
// src/funcs/vendorsListVendorJobTitles.ts
|
|
47423
47931
|
function vendorsListVendorJobTitles(client, request, options) {
|
|
47424
|
-
return new APIPromise($
|
|
47932
|
+
return new APIPromise($do40(client, request, options));
|
|
47425
47933
|
}
|
|
47426
|
-
async function $
|
|
47934
|
+
async function $do40(client, request, options) {
|
|
47427
47935
|
const parsed = safeParse(request, (value) => ListVendorJobTitlesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47428
47936
|
if (!parsed.ok) {
|
|
47429
47937
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47444,6 +47952,7 @@ async function $do37(client, request, options) {
|
|
|
47444
47952
|
const securityInput = await extractSecurity(client._options.security);
|
|
47445
47953
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47446
47954
|
const context = {
|
|
47955
|
+
options: client._options,
|
|
47447
47956
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47448
47957
|
operationID: "listVendorJobTitles",
|
|
47449
47958
|
oAuth2Scopes: [],
|
|
@@ -47460,6 +47969,7 @@ async function $do37(client, request, options) {
|
|
|
47460
47969
|
headers,
|
|
47461
47970
|
query,
|
|
47462
47971
|
body,
|
|
47972
|
+
userAgent: client._options.userAgent,
|
|
47463
47973
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47464
47974
|
}, options);
|
|
47465
47975
|
if (!requestRes.ok) {
|
|
@@ -47530,12 +48040,12 @@ var init_vendorsListVendorJobTitles = __esm(() => {
|
|
|
47530
48040
|
});
|
|
47531
48041
|
|
|
47532
48042
|
// src/mcp-server/tools/vendorsListVendorJobTitles.ts
|
|
47533
|
-
var
|
|
48043
|
+
var args39, tool$vendorsListVendorJobTitles;
|
|
47534
48044
|
var init_vendorsListVendorJobTitles2 = __esm(() => {
|
|
47535
48045
|
init_vendorsListVendorJobTitles();
|
|
47536
48046
|
init_operations();
|
|
47537
48047
|
init_tools();
|
|
47538
|
-
|
|
48048
|
+
args39 = {
|
|
47539
48049
|
request: ListVendorJobTitlesRequest$inboundSchema
|
|
47540
48050
|
};
|
|
47541
48051
|
tool$vendorsListVendorJobTitles = {
|
|
@@ -47543,9 +48053,9 @@ var init_vendorsListVendorJobTitles2 = __esm(() => {
|
|
|
47543
48053
|
description: `List vendor job titles
|
|
47544
48054
|
|
|
47545
48055
|
List valid job titles for Vendors. This can be used during sign up or in a filter.`,
|
|
47546
|
-
args:
|
|
47547
|
-
tool: async (client,
|
|
47548
|
-
const [result, apiCall] = await vendorsListVendorJobTitles(client,
|
|
48056
|
+
args: args39,
|
|
48057
|
+
tool: async (client, args40, ctx) => {
|
|
48058
|
+
const [result, apiCall] = await vendorsListVendorJobTitles(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47549
48059
|
if (!result.ok) {
|
|
47550
48060
|
return {
|
|
47551
48061
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47560,9 +48070,9 @@ List valid job titles for Vendors. This can be used during sign up or in a filte
|
|
|
47560
48070
|
|
|
47561
48071
|
// src/funcs/vendorsListVendorManagedByCompanies.ts
|
|
47562
48072
|
function vendorsListVendorManagedByCompanies(client, request, options) {
|
|
47563
|
-
return new APIPromise($
|
|
48073
|
+
return new APIPromise($do41(client, request, options));
|
|
47564
48074
|
}
|
|
47565
|
-
async function $
|
|
48075
|
+
async function $do41(client, request, options) {
|
|
47566
48076
|
const parsed = safeParse(request, (value) => ListVendorManagedByCompaniesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47567
48077
|
if (!parsed.ok) {
|
|
47568
48078
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47588,6 +48098,7 @@ async function $do38(client, request, options) {
|
|
|
47588
48098
|
const securityInput = await extractSecurity(client._options.security);
|
|
47589
48099
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47590
48100
|
const context = {
|
|
48101
|
+
options: client._options,
|
|
47591
48102
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47592
48103
|
operationID: "listVendorManagedByCompanies",
|
|
47593
48104
|
oAuth2Scopes: [],
|
|
@@ -47604,6 +48115,7 @@ async function $do38(client, request, options) {
|
|
|
47604
48115
|
headers,
|
|
47605
48116
|
query,
|
|
47606
48117
|
body,
|
|
48118
|
+
userAgent: client._options.userAgent,
|
|
47607
48119
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47608
48120
|
}, options);
|
|
47609
48121
|
if (!requestRes.ok) {
|
|
@@ -47674,12 +48186,12 @@ var init_vendorsListVendorManagedByCompanies = __esm(() => {
|
|
|
47674
48186
|
});
|
|
47675
48187
|
|
|
47676
48188
|
// src/mcp-server/tools/vendorsListVendorManagedByCompanies.ts
|
|
47677
|
-
var
|
|
48189
|
+
var args40, tool$vendorsListVendorManagedByCompanies;
|
|
47678
48190
|
var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
|
|
47679
48191
|
init_vendorsListVendorManagedByCompanies();
|
|
47680
48192
|
init_operations();
|
|
47681
48193
|
init_tools();
|
|
47682
|
-
|
|
48194
|
+
args40 = {
|
|
47683
48195
|
request: ListVendorManagedByCompaniesRequest$inboundSchema
|
|
47684
48196
|
};
|
|
47685
48197
|
tool$vendorsListVendorManagedByCompanies = {
|
|
@@ -47687,9 +48199,9 @@ var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
|
|
|
47687
48199
|
description: `List of companies managing the vendor
|
|
47688
48200
|
|
|
47689
48201
|
List of companies managing the vendor`,
|
|
47690
|
-
args:
|
|
47691
|
-
tool: async (client,
|
|
47692
|
-
const [result, apiCall] = await vendorsListVendorManagedByCompanies(client,
|
|
48202
|
+
args: args40,
|
|
48203
|
+
tool: async (client, args41, ctx) => {
|
|
48204
|
+
const [result, apiCall] = await vendorsListVendorManagedByCompanies(client, args41.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47693
48205
|
if (!result.ok) {
|
|
47694
48206
|
return {
|
|
47695
48207
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47704,9 +48216,9 @@ List of companies managing the vendor`,
|
|
|
47704
48216
|
|
|
47705
48217
|
// src/funcs/vendorsListVendorScrubDetails.ts
|
|
47706
48218
|
function vendorsListVendorScrubDetails(client, request, options) {
|
|
47707
|
-
return new APIPromise($
|
|
48219
|
+
return new APIPromise($do42(client, request, options));
|
|
47708
48220
|
}
|
|
47709
|
-
async function $
|
|
48221
|
+
async function $do42(client, request, options) {
|
|
47710
48222
|
const parsed = safeParse(request, (value) => ListVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47711
48223
|
if (!parsed.ok) {
|
|
47712
48224
|
return [parsed, { status: "invalid" }];
|
|
@@ -47726,6 +48238,7 @@ async function $do39(client, request, options) {
|
|
|
47726
48238
|
const securityInput = await extractSecurity(client._options.security);
|
|
47727
48239
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47728
48240
|
const context = {
|
|
48241
|
+
options: client._options,
|
|
47729
48242
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47730
48243
|
operationID: "listVendorScrubDetails",
|
|
47731
48244
|
oAuth2Scopes: [],
|
|
@@ -47741,6 +48254,7 @@ async function $do39(client, request, options) {
|
|
|
47741
48254
|
path,
|
|
47742
48255
|
headers,
|
|
47743
48256
|
body,
|
|
48257
|
+
userAgent: client._options.userAgent,
|
|
47744
48258
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47745
48259
|
}, options);
|
|
47746
48260
|
if (!requestRes.ok) {
|
|
@@ -47780,12 +48294,12 @@ var init_vendorsListVendorScrubDetails = __esm(() => {
|
|
|
47780
48294
|
});
|
|
47781
48295
|
|
|
47782
48296
|
// src/mcp-server/tools/vendorsListVendorScrubDetails.ts
|
|
47783
|
-
var
|
|
48297
|
+
var args41, tool$vendorsListVendorScrubDetails;
|
|
47784
48298
|
var init_vendorsListVendorScrubDetails2 = __esm(() => {
|
|
47785
48299
|
init_vendorsListVendorScrubDetails();
|
|
47786
48300
|
init_operations();
|
|
47787
48301
|
init_tools();
|
|
47788
|
-
|
|
48302
|
+
args41 = {
|
|
47789
48303
|
request: ListVendorScrubDetailsRequest$inboundSchema
|
|
47790
48304
|
};
|
|
47791
48305
|
tool$vendorsListVendorScrubDetails = {
|
|
@@ -47793,9 +48307,9 @@ var init_vendorsListVendorScrubDetails2 = __esm(() => {
|
|
|
47793
48307
|
description: `List vendor scrub details
|
|
47794
48308
|
|
|
47795
48309
|
List vendor scrub details`,
|
|
47796
|
-
args:
|
|
47797
|
-
tool: async (client,
|
|
47798
|
-
const [result, apiCall] = await vendorsListVendorScrubDetails(client,
|
|
48310
|
+
args: args41,
|
|
48311
|
+
tool: async (client, args42, ctx) => {
|
|
48312
|
+
const [result, apiCall] = await vendorsListVendorScrubDetails(client, args42.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47799
48313
|
if (!result.ok) {
|
|
47800
48314
|
return {
|
|
47801
48315
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47810,9 +48324,9 @@ List vendor scrub details`,
|
|
|
47810
48324
|
|
|
47811
48325
|
// src/funcs/vendorsListVendorScrubPackages.ts
|
|
47812
48326
|
function vendorsListVendorScrubPackages(client, request, options) {
|
|
47813
|
-
return new APIPromise($
|
|
48327
|
+
return new APIPromise($do43(client, request, options));
|
|
47814
48328
|
}
|
|
47815
|
-
async function $
|
|
48329
|
+
async function $do43(client, request, options) {
|
|
47816
48330
|
const parsed = safeParse(request, (value) => ListVendorScrubPackagesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47817
48331
|
if (!parsed.ok) {
|
|
47818
48332
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47838,6 +48352,7 @@ async function $do40(client, request, options) {
|
|
|
47838
48352
|
const securityInput = await extractSecurity(client._options.security);
|
|
47839
48353
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47840
48354
|
const context = {
|
|
48355
|
+
options: client._options,
|
|
47841
48356
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47842
48357
|
operationID: "listVendorScrubPackages",
|
|
47843
48358
|
oAuth2Scopes: [],
|
|
@@ -47854,6 +48369,7 @@ async function $do40(client, request, options) {
|
|
|
47854
48369
|
headers,
|
|
47855
48370
|
query,
|
|
47856
48371
|
body,
|
|
48372
|
+
userAgent: client._options.userAgent,
|
|
47857
48373
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
47858
48374
|
}, options);
|
|
47859
48375
|
if (!requestRes.ok) {
|
|
@@ -47924,12 +48440,12 @@ var init_vendorsListVendorScrubPackages = __esm(() => {
|
|
|
47924
48440
|
});
|
|
47925
48441
|
|
|
47926
48442
|
// src/mcp-server/tools/vendorsListVendorScrubPackages.ts
|
|
47927
|
-
var
|
|
48443
|
+
var args42, tool$vendorsListVendorScrubPackages;
|
|
47928
48444
|
var init_vendorsListVendorScrubPackages2 = __esm(() => {
|
|
47929
48445
|
init_vendorsListVendorScrubPackages();
|
|
47930
48446
|
init_operations();
|
|
47931
48447
|
init_tools();
|
|
47932
|
-
|
|
48448
|
+
args42 = {
|
|
47933
48449
|
request: ListVendorScrubPackagesRequest$inboundSchema
|
|
47934
48450
|
};
|
|
47935
48451
|
tool$vendorsListVendorScrubPackages = {
|
|
@@ -47937,9 +48453,9 @@ var init_vendorsListVendorScrubPackages2 = __esm(() => {
|
|
|
47937
48453
|
description: `List vendor scrub packages
|
|
47938
48454
|
|
|
47939
48455
|
List vendor scrub packages`,
|
|
47940
|
-
args:
|
|
47941
|
-
tool: async (client,
|
|
47942
|
-
const [result, apiCall] = await vendorsListVendorScrubPackages(client,
|
|
48456
|
+
args: args42,
|
|
48457
|
+
tool: async (client, args43, ctx) => {
|
|
48458
|
+
const [result, apiCall] = await vendorsListVendorScrubPackages(client, args43.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47943
48459
|
if (!result.ok) {
|
|
47944
48460
|
return {
|
|
47945
48461
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47954,9 +48470,9 @@ List vendor scrub packages`,
|
|
|
47954
48470
|
|
|
47955
48471
|
// src/funcs/vendorsListVendorScrubPurchases.ts
|
|
47956
48472
|
function vendorsListVendorScrubPurchases(client, request, options) {
|
|
47957
|
-
return new APIPromise($
|
|
48473
|
+
return new APIPromise($do44(client, request, options));
|
|
47958
48474
|
}
|
|
47959
|
-
async function $
|
|
48475
|
+
async function $do44(client, request, options) {
|
|
47960
48476
|
const parsed = safeParse(request, (value) => ListVendorScrubPurchasesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47961
48477
|
if (!parsed.ok) {
|
|
47962
48478
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47982,6 +48498,7 @@ async function $do41(client, request, options) {
|
|
|
47982
48498
|
const securityInput = await extractSecurity(client._options.security);
|
|
47983
48499
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
47984
48500
|
const context = {
|
|
48501
|
+
options: client._options,
|
|
47985
48502
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
47986
48503
|
operationID: "listVendorScrubPurchases",
|
|
47987
48504
|
oAuth2Scopes: [],
|
|
@@ -47998,6 +48515,7 @@ async function $do41(client, request, options) {
|
|
|
47998
48515
|
headers,
|
|
47999
48516
|
query,
|
|
48000
48517
|
body,
|
|
48518
|
+
userAgent: client._options.userAgent,
|
|
48001
48519
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48002
48520
|
}, options);
|
|
48003
48521
|
if (!requestRes.ok) {
|
|
@@ -48068,12 +48586,12 @@ var init_vendorsListVendorScrubPurchases = __esm(() => {
|
|
|
48068
48586
|
});
|
|
48069
48587
|
|
|
48070
48588
|
// src/mcp-server/tools/vendorsListVendorScrubPurchases.ts
|
|
48071
|
-
var
|
|
48589
|
+
var args43, tool$vendorsListVendorScrubPurchases;
|
|
48072
48590
|
var init_vendorsListVendorScrubPurchases2 = __esm(() => {
|
|
48073
48591
|
init_vendorsListVendorScrubPurchases();
|
|
48074
48592
|
init_operations();
|
|
48075
48593
|
init_tools();
|
|
48076
|
-
|
|
48594
|
+
args43 = {
|
|
48077
48595
|
request: ListVendorScrubPurchasesRequest$inboundSchema
|
|
48078
48596
|
};
|
|
48079
48597
|
tool$vendorsListVendorScrubPurchases = {
|
|
@@ -48081,9 +48599,9 @@ var init_vendorsListVendorScrubPurchases2 = __esm(() => {
|
|
|
48081
48599
|
description: `List vendor scrub purchases
|
|
48082
48600
|
|
|
48083
48601
|
List vendor scrub purchases`,
|
|
48084
|
-
args:
|
|
48085
|
-
tool: async (client,
|
|
48086
|
-
const [result, apiCall] = await vendorsListVendorScrubPurchases(client,
|
|
48602
|
+
args: args43,
|
|
48603
|
+
tool: async (client, args44, ctx) => {
|
|
48604
|
+
const [result, apiCall] = await vendorsListVendorScrubPurchases(client, args44.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48087
48605
|
if (!result.ok) {
|
|
48088
48606
|
return {
|
|
48089
48607
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48098,9 +48616,9 @@ List vendor scrub purchases`,
|
|
|
48098
48616
|
|
|
48099
48617
|
// src/funcs/vendorsPurchaseScrubCredits.ts
|
|
48100
48618
|
function vendorsPurchaseScrubCredits(client, request, options) {
|
|
48101
|
-
return new APIPromise($
|
|
48619
|
+
return new APIPromise($do45(client, request, options));
|
|
48102
48620
|
}
|
|
48103
|
-
async function $
|
|
48621
|
+
async function $do45(client, request, options) {
|
|
48104
48622
|
const parsed = safeParse(request, (value) => PurchaseScrubCreditsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48105
48623
|
if (!parsed.ok) {
|
|
48106
48624
|
return [parsed, { status: "invalid" }];
|
|
@@ -48121,6 +48639,7 @@ async function $do42(client, request, options) {
|
|
|
48121
48639
|
const securityInput = await extractSecurity(client._options.security);
|
|
48122
48640
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48123
48641
|
const context = {
|
|
48642
|
+
options: client._options,
|
|
48124
48643
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48125
48644
|
operationID: "purchaseScrubCredits",
|
|
48126
48645
|
oAuth2Scopes: [],
|
|
@@ -48136,6 +48655,7 @@ async function $do42(client, request, options) {
|
|
|
48136
48655
|
path,
|
|
48137
48656
|
headers,
|
|
48138
48657
|
body,
|
|
48658
|
+
userAgent: client._options.userAgent,
|
|
48139
48659
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48140
48660
|
}, options);
|
|
48141
48661
|
if (!requestRes.ok) {
|
|
@@ -48174,12 +48694,12 @@ var init_vendorsPurchaseScrubCredits = __esm(() => {
|
|
|
48174
48694
|
});
|
|
48175
48695
|
|
|
48176
48696
|
// src/mcp-server/tools/vendorsPurchaseScrubCredits.ts
|
|
48177
|
-
var
|
|
48697
|
+
var args44, tool$vendorsPurchaseScrubCredits;
|
|
48178
48698
|
var init_vendorsPurchaseScrubCredits2 = __esm(() => {
|
|
48179
48699
|
init_vendorsPurchaseScrubCredits();
|
|
48180
48700
|
init_operations();
|
|
48181
48701
|
init_tools();
|
|
48182
|
-
|
|
48702
|
+
args44 = {
|
|
48183
48703
|
request: PurchaseScrubCreditsRequest$inboundSchema
|
|
48184
48704
|
};
|
|
48185
48705
|
tool$vendorsPurchaseScrubCredits = {
|
|
@@ -48187,9 +48707,9 @@ var init_vendorsPurchaseScrubCredits2 = __esm(() => {
|
|
|
48187
48707
|
description: `Purchase scrub credits
|
|
48188
48708
|
|
|
48189
48709
|
Purchase scrub credits`,
|
|
48190
|
-
args:
|
|
48191
|
-
tool: async (client,
|
|
48192
|
-
const [result, apiCall] = await vendorsPurchaseScrubCredits(client,
|
|
48710
|
+
args: args44,
|
|
48711
|
+
tool: async (client, args45, ctx) => {
|
|
48712
|
+
const [result, apiCall] = await vendorsPurchaseScrubCredits(client, args45.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48193
48713
|
if (!result.ok) {
|
|
48194
48714
|
return {
|
|
48195
48715
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48204,9 +48724,9 @@ Purchase scrub credits`,
|
|
|
48204
48724
|
|
|
48205
48725
|
// src/funcs/vendorsSubmitVendorCredential.ts
|
|
48206
48726
|
function vendorsSubmitVendorCredential(client, request, options) {
|
|
48207
|
-
return new APIPromise($
|
|
48727
|
+
return new APIPromise($do46(client, request, options));
|
|
48208
48728
|
}
|
|
48209
|
-
async function $
|
|
48729
|
+
async function $do46(client, request, options) {
|
|
48210
48730
|
const parsed = safeParse(request, (value) => SubmitVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48211
48731
|
if (!parsed.ok) {
|
|
48212
48732
|
return [parsed, { status: "invalid" }];
|
|
@@ -48224,6 +48744,7 @@ async function $do43(client, request, options) {
|
|
|
48224
48744
|
const securityInput = await extractSecurity(client._options.security);
|
|
48225
48745
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48226
48746
|
const context = {
|
|
48747
|
+
options: client._options,
|
|
48227
48748
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48228
48749
|
operationID: "submitVendorCredential",
|
|
48229
48750
|
oAuth2Scopes: [],
|
|
@@ -48239,6 +48760,7 @@ async function $do43(client, request, options) {
|
|
|
48239
48760
|
path,
|
|
48240
48761
|
headers,
|
|
48241
48762
|
body,
|
|
48763
|
+
userAgent: client._options.userAgent,
|
|
48242
48764
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48243
48765
|
}, options);
|
|
48244
48766
|
if (!requestRes.ok) {
|
|
@@ -48278,12 +48800,12 @@ var init_vendorsSubmitVendorCredential = __esm(() => {
|
|
|
48278
48800
|
});
|
|
48279
48801
|
|
|
48280
48802
|
// src/mcp-server/tools/vendorsSubmitVendorCredential.ts
|
|
48281
|
-
var
|
|
48803
|
+
var args45, tool$vendorsSubmitVendorCredential;
|
|
48282
48804
|
var init_vendorsSubmitVendorCredential2 = __esm(() => {
|
|
48283
48805
|
init_vendorsSubmitVendorCredential();
|
|
48284
48806
|
init_operations();
|
|
48285
48807
|
init_tools();
|
|
48286
|
-
|
|
48808
|
+
args45 = {
|
|
48287
48809
|
request: SubmitVendorCredentialRequest$inboundSchema
|
|
48288
48810
|
};
|
|
48289
48811
|
tool$vendorsSubmitVendorCredential = {
|
|
@@ -48291,9 +48813,9 @@ var init_vendorsSubmitVendorCredential2 = __esm(() => {
|
|
|
48291
48813
|
description: `Submit vendor credential
|
|
48292
48814
|
|
|
48293
48815
|
It will submit vendor credential`,
|
|
48294
|
-
args:
|
|
48295
|
-
tool: async (client,
|
|
48296
|
-
const [result, apiCall] = await vendorsSubmitVendorCredential(client,
|
|
48816
|
+
args: args45,
|
|
48817
|
+
tool: async (client, args46, ctx) => {
|
|
48818
|
+
const [result, apiCall] = await vendorsSubmitVendorCredential(client, args46.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48297
48819
|
if (!result.ok) {
|
|
48298
48820
|
return {
|
|
48299
48821
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48308,9 +48830,9 @@ It will submit vendor credential`,
|
|
|
48308
48830
|
|
|
48309
48831
|
// src/funcs/vendorsUpdateVendorCredentialFile.ts
|
|
48310
48832
|
function vendorsUpdateVendorCredentialFile(client, request, options) {
|
|
48311
|
-
return new APIPromise($
|
|
48833
|
+
return new APIPromise($do47(client, request, options));
|
|
48312
48834
|
}
|
|
48313
|
-
async function $
|
|
48835
|
+
async function $do47(client, request, options) {
|
|
48314
48836
|
const parsed = safeParse(request, (value) => UpdateVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48315
48837
|
if (!parsed.ok) {
|
|
48316
48838
|
return [parsed, { status: "invalid" }];
|
|
@@ -48332,6 +48854,7 @@ async function $do44(client, request, options) {
|
|
|
48332
48854
|
const securityInput = await extractSecurity(client._options.security);
|
|
48333
48855
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48334
48856
|
const context = {
|
|
48857
|
+
options: client._options,
|
|
48335
48858
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48336
48859
|
operationID: "updateVendorCredentialFile",
|
|
48337
48860
|
oAuth2Scopes: [],
|
|
@@ -48347,6 +48870,7 @@ async function $do44(client, request, options) {
|
|
|
48347
48870
|
path,
|
|
48348
48871
|
headers,
|
|
48349
48872
|
body,
|
|
48873
|
+
userAgent: client._options.userAgent,
|
|
48350
48874
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48351
48875
|
}, options);
|
|
48352
48876
|
if (!requestRes.ok) {
|
|
@@ -48386,12 +48910,12 @@ var init_vendorsUpdateVendorCredentialFile = __esm(() => {
|
|
|
48386
48910
|
});
|
|
48387
48911
|
|
|
48388
48912
|
// src/mcp-server/tools/vendorsUpdateVendorCredentialFile.ts
|
|
48389
|
-
var
|
|
48913
|
+
var args46, tool$vendorsUpdateVendorCredentialFile;
|
|
48390
48914
|
var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
|
|
48391
48915
|
init_vendorsUpdateVendorCredentialFile();
|
|
48392
48916
|
init_operations();
|
|
48393
48917
|
init_tools();
|
|
48394
|
-
|
|
48918
|
+
args46 = {
|
|
48395
48919
|
request: UpdateVendorCredentialFileRequest$inboundSchema
|
|
48396
48920
|
};
|
|
48397
48921
|
tool$vendorsUpdateVendorCredentialFile = {
|
|
@@ -48399,9 +48923,9 @@ var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
|
|
|
48399
48923
|
description: `Update vendor credential file
|
|
48400
48924
|
|
|
48401
48925
|
It will update the vendor credential file properties`,
|
|
48402
|
-
args:
|
|
48403
|
-
tool: async (client,
|
|
48404
|
-
const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client,
|
|
48926
|
+
args: args46,
|
|
48927
|
+
tool: async (client, args47, ctx) => {
|
|
48928
|
+
const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client, args47.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48405
48929
|
if (!result.ok) {
|
|
48406
48930
|
return {
|
|
48407
48931
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48416,9 +48940,9 @@ It will update the vendor credential file properties`,
|
|
|
48416
48940
|
|
|
48417
48941
|
// src/funcs/vendorsUpdateVendorDetails.ts
|
|
48418
48942
|
function vendorsUpdateVendorDetails(client, request, options) {
|
|
48419
|
-
return new APIPromise($
|
|
48943
|
+
return new APIPromise($do48(client, request, options));
|
|
48420
48944
|
}
|
|
48421
|
-
async function $
|
|
48945
|
+
async function $do48(client, request, options) {
|
|
48422
48946
|
const parsed = safeParse(request, (value) => UpdateVendorDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48423
48947
|
if (!parsed.ok) {
|
|
48424
48948
|
return [parsed, { status: "invalid" }];
|
|
@@ -48439,6 +48963,7 @@ async function $do45(client, request, options) {
|
|
|
48439
48963
|
const securityInput = await extractSecurity(client._options.security);
|
|
48440
48964
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48441
48965
|
const context = {
|
|
48966
|
+
options: client._options,
|
|
48442
48967
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48443
48968
|
operationID: "updateVendorDetails",
|
|
48444
48969
|
oAuth2Scopes: [],
|
|
@@ -48454,6 +48979,7 @@ async function $do45(client, request, options) {
|
|
|
48454
48979
|
path,
|
|
48455
48980
|
headers,
|
|
48456
48981
|
body,
|
|
48982
|
+
userAgent: client._options.userAgent,
|
|
48457
48983
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48458
48984
|
}, options);
|
|
48459
48985
|
if (!requestRes.ok) {
|
|
@@ -48493,12 +49019,12 @@ var init_vendorsUpdateVendorDetails = __esm(() => {
|
|
|
48493
49019
|
});
|
|
48494
49020
|
|
|
48495
49021
|
// src/mcp-server/tools/vendorsUpdateVendorDetails.ts
|
|
48496
|
-
var
|
|
49022
|
+
var args47, tool$vendorsUpdateVendorDetails;
|
|
48497
49023
|
var init_vendorsUpdateVendorDetails2 = __esm(() => {
|
|
48498
49024
|
init_vendorsUpdateVendorDetails();
|
|
48499
49025
|
init_operations();
|
|
48500
49026
|
init_tools();
|
|
48501
|
-
|
|
49027
|
+
args47 = {
|
|
48502
49028
|
request: UpdateVendorDetailsRequest$inboundSchema
|
|
48503
49029
|
};
|
|
48504
49030
|
tool$vendorsUpdateVendorDetails = {
|
|
@@ -48506,9 +49032,9 @@ var init_vendorsUpdateVendorDetails2 = __esm(() => {
|
|
|
48506
49032
|
description: `Update vendor details
|
|
48507
49033
|
|
|
48508
49034
|
It will update the vendor details`,
|
|
48509
|
-
args:
|
|
48510
|
-
tool: async (client,
|
|
48511
|
-
const [result, apiCall] = await vendorsUpdateVendorDetails(client,
|
|
49035
|
+
args: args47,
|
|
49036
|
+
tool: async (client, args48, ctx) => {
|
|
49037
|
+
const [result, apiCall] = await vendorsUpdateVendorDetails(client, args48.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48512
49038
|
if (!result.ok) {
|
|
48513
49039
|
return {
|
|
48514
49040
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48523,9 +49049,9 @@ It will update the vendor details`,
|
|
|
48523
49049
|
|
|
48524
49050
|
// src/funcs/vendorsUpdateVendorManagedByCompany.ts
|
|
48525
49051
|
function vendorsUpdateVendorManagedByCompany(client, request, options) {
|
|
48526
|
-
return new APIPromise($
|
|
49052
|
+
return new APIPromise($do49(client, request, options));
|
|
48527
49053
|
}
|
|
48528
|
-
async function $
|
|
49054
|
+
async function $do49(client, request, options) {
|
|
48529
49055
|
const parsed = safeParse(request, (value) => UpdateVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48530
49056
|
if (!parsed.ok) {
|
|
48531
49057
|
return [parsed, { status: "invalid" }];
|
|
@@ -48546,6 +49072,7 @@ async function $do46(client, request, options) {
|
|
|
48546
49072
|
const securityInput = await extractSecurity(client._options.security);
|
|
48547
49073
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48548
49074
|
const context = {
|
|
49075
|
+
options: client._options,
|
|
48549
49076
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48550
49077
|
operationID: "updateVendorManagedByCompany",
|
|
48551
49078
|
oAuth2Scopes: [],
|
|
@@ -48561,6 +49088,7 @@ async function $do46(client, request, options) {
|
|
|
48561
49088
|
path,
|
|
48562
49089
|
headers,
|
|
48563
49090
|
body,
|
|
49091
|
+
userAgent: client._options.userAgent,
|
|
48564
49092
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48565
49093
|
}, options);
|
|
48566
49094
|
if (!requestRes.ok) {
|
|
@@ -48599,12 +49127,12 @@ var init_vendorsUpdateVendorManagedByCompany = __esm(() => {
|
|
|
48599
49127
|
});
|
|
48600
49128
|
|
|
48601
49129
|
// src/mcp-server/tools/vendorsUpdateVendorManagedByCompany.ts
|
|
48602
|
-
var
|
|
49130
|
+
var args48, tool$vendorsUpdateVendorManagedByCompany;
|
|
48603
49131
|
var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
|
|
48604
49132
|
init_vendorsUpdateVendorManagedByCompany();
|
|
48605
49133
|
init_operations();
|
|
48606
49134
|
init_tools();
|
|
48607
|
-
|
|
49135
|
+
args48 = {
|
|
48608
49136
|
request: UpdateVendorManagedByCompanyRequest$inboundSchema
|
|
48609
49137
|
};
|
|
48610
49138
|
tool$vendorsUpdateVendorManagedByCompany = {
|
|
@@ -48612,9 +49140,9 @@ var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
|
|
|
48612
49140
|
description: `Update vendor managed by company access rights
|
|
48613
49141
|
|
|
48614
49142
|
It will update the vendor managed by company access rights`,
|
|
48615
|
-
args:
|
|
48616
|
-
tool: async (client,
|
|
48617
|
-
const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client,
|
|
49143
|
+
args: args48,
|
|
49144
|
+
tool: async (client, args49, ctx) => {
|
|
49145
|
+
const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client, args49.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48618
49146
|
if (!result.ok) {
|
|
48619
49147
|
return {
|
|
48620
49148
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48629,9 +49157,9 @@ It will update the vendor managed by company access rights`,
|
|
|
48629
49157
|
|
|
48630
49158
|
// src/funcs/vendorsUpdateVendorScrubDetails.ts
|
|
48631
49159
|
function vendorsUpdateVendorScrubDetails(client, request, options) {
|
|
48632
|
-
return new APIPromise($
|
|
49160
|
+
return new APIPromise($do50(client, request, options));
|
|
48633
49161
|
}
|
|
48634
|
-
async function $
|
|
49162
|
+
async function $do50(client, request, options) {
|
|
48635
49163
|
const parsed = safeParse(request, (value) => UpdateVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48636
49164
|
if (!parsed.ok) {
|
|
48637
49165
|
return [parsed, { status: "invalid" }];
|
|
@@ -48652,6 +49180,7 @@ async function $do47(client, request, options) {
|
|
|
48652
49180
|
const securityInput = await extractSecurity(client._options.security);
|
|
48653
49181
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48654
49182
|
const context = {
|
|
49183
|
+
options: client._options,
|
|
48655
49184
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48656
49185
|
operationID: "updateVendorScrubDetails",
|
|
48657
49186
|
oAuth2Scopes: [],
|
|
@@ -48667,6 +49196,7 @@ async function $do47(client, request, options) {
|
|
|
48667
49196
|
path,
|
|
48668
49197
|
headers,
|
|
48669
49198
|
body,
|
|
49199
|
+
userAgent: client._options.userAgent,
|
|
48670
49200
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48671
49201
|
}, options);
|
|
48672
49202
|
if (!requestRes.ok) {
|
|
@@ -48706,12 +49236,12 @@ var init_vendorsUpdateVendorScrubDetails = __esm(() => {
|
|
|
48706
49236
|
});
|
|
48707
49237
|
|
|
48708
49238
|
// src/mcp-server/tools/vendorsUpdateVendorScrubDetails.ts
|
|
48709
|
-
var
|
|
49239
|
+
var args49, tool$vendorsUpdateVendorScrubDetails;
|
|
48710
49240
|
var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
|
|
48711
49241
|
init_vendorsUpdateVendorScrubDetails();
|
|
48712
49242
|
init_operations();
|
|
48713
49243
|
init_tools();
|
|
48714
|
-
|
|
49244
|
+
args49 = {
|
|
48715
49245
|
request: UpdateVendorScrubDetailsRequest$inboundSchema
|
|
48716
49246
|
};
|
|
48717
49247
|
tool$vendorsUpdateVendorScrubDetails = {
|
|
@@ -48719,9 +49249,9 @@ var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
|
|
|
48719
49249
|
description: `Update vendor scrub details
|
|
48720
49250
|
|
|
48721
49251
|
Update vendor scrub details`,
|
|
48722
|
-
args:
|
|
48723
|
-
tool: async (client,
|
|
48724
|
-
const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client,
|
|
49252
|
+
args: args49,
|
|
49253
|
+
tool: async (client, args50, ctx) => {
|
|
49254
|
+
const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client, args50.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48725
49255
|
if (!result.ok) {
|
|
48726
49256
|
return {
|
|
48727
49257
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48736,9 +49266,9 @@ Update vendor scrub details`,
|
|
|
48736
49266
|
|
|
48737
49267
|
// src/funcs/webhooksGetWebhookEndpoint.ts
|
|
48738
49268
|
function webhooksGetWebhookEndpoint(client, request, options) {
|
|
48739
|
-
return new APIPromise($
|
|
49269
|
+
return new APIPromise($do51(client, request, options));
|
|
48740
49270
|
}
|
|
48741
|
-
async function $
|
|
49271
|
+
async function $do51(client, request, options) {
|
|
48742
49272
|
const parsed = safeParse(request, (value) => GetWebhookEndpointRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48743
49273
|
if (!parsed.ok) {
|
|
48744
49274
|
return [parsed, { status: "invalid" }];
|
|
@@ -48758,6 +49288,7 @@ async function $do48(client, request, options) {
|
|
|
48758
49288
|
const securityInput = await extractSecurity(client._options.security);
|
|
48759
49289
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48760
49290
|
const context = {
|
|
49291
|
+
options: client._options,
|
|
48761
49292
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48762
49293
|
operationID: "getWebhookEndpoint",
|
|
48763
49294
|
oAuth2Scopes: [],
|
|
@@ -48773,6 +49304,7 @@ async function $do48(client, request, options) {
|
|
|
48773
49304
|
path,
|
|
48774
49305
|
headers,
|
|
48775
49306
|
body,
|
|
49307
|
+
userAgent: client._options.userAgent,
|
|
48776
49308
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48777
49309
|
}, options);
|
|
48778
49310
|
if (!requestRes.ok) {
|
|
@@ -48812,12 +49344,12 @@ var init_webhooksGetWebhookEndpoint = __esm(() => {
|
|
|
48812
49344
|
});
|
|
48813
49345
|
|
|
48814
49346
|
// src/mcp-server/tools/webhooksGetWebhookEndpoint.ts
|
|
48815
|
-
var
|
|
49347
|
+
var args50, tool$webhooksGetWebhookEndpoint;
|
|
48816
49348
|
var init_webhooksGetWebhookEndpoint2 = __esm(() => {
|
|
48817
49349
|
init_webhooksGetWebhookEndpoint();
|
|
48818
49350
|
init_operations();
|
|
48819
49351
|
init_tools();
|
|
48820
|
-
|
|
49352
|
+
args50 = {
|
|
48821
49353
|
request: GetWebhookEndpointRequest$inboundSchema
|
|
48822
49354
|
};
|
|
48823
49355
|
tool$webhooksGetWebhookEndpoint = {
|
|
@@ -48825,9 +49357,9 @@ var init_webhooksGetWebhookEndpoint2 = __esm(() => {
|
|
|
48825
49357
|
description: `Retrieves the webhook endpoint with the given ID.
|
|
48826
49358
|
|
|
48827
49359
|
Returns the definition of a webhook endpoint by ID.`,
|
|
48828
|
-
args:
|
|
48829
|
-
tool: async (client,
|
|
48830
|
-
const [result, apiCall] = await webhooksGetWebhookEndpoint(client,
|
|
49360
|
+
args: args50,
|
|
49361
|
+
tool: async (client, args51, ctx) => {
|
|
49362
|
+
const [result, apiCall] = await webhooksGetWebhookEndpoint(client, args51.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48831
49363
|
if (!result.ok) {
|
|
48832
49364
|
return {
|
|
48833
49365
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48842,9 +49374,9 @@ Returns the definition of a webhook endpoint by ID.`,
|
|
|
48842
49374
|
|
|
48843
49375
|
// src/funcs/webhooksListAllWebhookEndpoints.ts
|
|
48844
49376
|
function webhooksListAllWebhookEndpoints(client, request, options) {
|
|
48845
|
-
return new APIPromise($
|
|
49377
|
+
return new APIPromise($do52(client, request, options));
|
|
48846
49378
|
}
|
|
48847
|
-
async function $
|
|
49379
|
+
async function $do52(client, request, options) {
|
|
48848
49380
|
const parsed = safeParse(request, (value) => ListAllWebhookEndpointsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48849
49381
|
if (!parsed.ok) {
|
|
48850
49382
|
return [parsed, { status: "invalid" }];
|
|
@@ -48864,6 +49396,7 @@ async function $do49(client, request, options) {
|
|
|
48864
49396
|
const securityInput = await extractSecurity(client._options.security);
|
|
48865
49397
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48866
49398
|
const context = {
|
|
49399
|
+
options: client._options,
|
|
48867
49400
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48868
49401
|
operationID: "listAllWebhookEndpoints",
|
|
48869
49402
|
oAuth2Scopes: [],
|
|
@@ -48880,6 +49413,7 @@ async function $do49(client, request, options) {
|
|
|
48880
49413
|
headers,
|
|
48881
49414
|
query,
|
|
48882
49415
|
body,
|
|
49416
|
+
userAgent: client._options.userAgent,
|
|
48883
49417
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48884
49418
|
}, options);
|
|
48885
49419
|
if (!requestRes.ok) {
|
|
@@ -48918,12 +49452,12 @@ var init_webhooksListAllWebhookEndpoints = __esm(() => {
|
|
|
48918
49452
|
});
|
|
48919
49453
|
|
|
48920
49454
|
// src/mcp-server/tools/webhooksListAllWebhookEndpoints.ts
|
|
48921
|
-
var
|
|
49455
|
+
var args51, tool$webhooksListAllWebhookEndpoints;
|
|
48922
49456
|
var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
|
|
48923
49457
|
init_webhooksListAllWebhookEndpoints();
|
|
48924
49458
|
init_operations();
|
|
48925
49459
|
init_tools();
|
|
48926
|
-
|
|
49460
|
+
args51 = {
|
|
48927
49461
|
request: ListAllWebhookEndpointsRequest$inboundSchema
|
|
48928
49462
|
};
|
|
48929
49463
|
tool$webhooksListAllWebhookEndpoints = {
|
|
@@ -48931,9 +49465,9 @@ var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
|
|
|
48931
49465
|
description: `List all webhook endpoints
|
|
48932
49466
|
|
|
48933
49467
|
Returns a list of your webhook endpoints.`,
|
|
48934
|
-
args:
|
|
48935
|
-
tool: async (client,
|
|
48936
|
-
const [result, apiCall] = await webhooksListAllWebhookEndpoints(client,
|
|
49468
|
+
args: args51,
|
|
49469
|
+
tool: async (client, args52, ctx) => {
|
|
49470
|
+
const [result, apiCall] = await webhooksListAllWebhookEndpoints(client, args52.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48937
49471
|
if (!result.ok) {
|
|
48938
49472
|
return {
|
|
48939
49473
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48948,9 +49482,9 @@ Returns a list of your webhook endpoints.`,
|
|
|
48948
49482
|
|
|
48949
49483
|
// src/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
|
|
48950
49484
|
function webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, request, options) {
|
|
48951
|
-
return new APIPromise($
|
|
49485
|
+
return new APIPromise($do53(client, request, options));
|
|
48952
49486
|
}
|
|
48953
|
-
async function $
|
|
49487
|
+
async function $do53(client, request, options) {
|
|
48954
49488
|
const parsed = safeParse(request, (value) => UpdatesTheWebhookEndpointWithTheGivenIdRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48955
49489
|
if (!parsed.ok) {
|
|
48956
49490
|
return [parsed, { status: "invalid" }];
|
|
@@ -48971,6 +49505,7 @@ async function $do50(client, request, options) {
|
|
|
48971
49505
|
const securityInput = await extractSecurity(client._options.security);
|
|
48972
49506
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
48973
49507
|
const context = {
|
|
49508
|
+
options: client._options,
|
|
48974
49509
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
48975
49510
|
operationID: "updatesTheWebhookEndpointWithTheGivenId",
|
|
48976
49511
|
oAuth2Scopes: [],
|
|
@@ -48986,6 +49521,7 @@ async function $do50(client, request, options) {
|
|
|
48986
49521
|
path,
|
|
48987
49522
|
headers,
|
|
48988
49523
|
body,
|
|
49524
|
+
userAgent: client._options.userAgent,
|
|
48989
49525
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
48990
49526
|
}, options);
|
|
48991
49527
|
if (!requestRes.ok) {
|
|
@@ -49025,12 +49561,12 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId = __esm(() => {
|
|
|
49025
49561
|
});
|
|
49026
49562
|
|
|
49027
49563
|
// src/mcp-server/tools/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
|
|
49028
|
-
var
|
|
49564
|
+
var args52, tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId;
|
|
49029
49565
|
var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
|
|
49030
49566
|
init_webhooksUpdatesTheWebhookEndpointWithTheGivenId();
|
|
49031
49567
|
init_operations();
|
|
49032
49568
|
init_tools();
|
|
49033
|
-
|
|
49569
|
+
args52 = {
|
|
49034
49570
|
request: UpdatesTheWebhookEndpointWithTheGivenIdRequest$inboundSchema
|
|
49035
49571
|
};
|
|
49036
49572
|
tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId = {
|
|
@@ -49038,9 +49574,9 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
|
|
|
49038
49574
|
description: `Updates the webhook endpoint with the given ID.
|
|
49039
49575
|
|
|
49040
49576
|
Updates the webhook endpoint with the given ID.`,
|
|
49041
|
-
args:
|
|
49042
|
-
tool: async (client,
|
|
49043
|
-
const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client,
|
|
49577
|
+
args: args52,
|
|
49578
|
+
tool: async (client, args53, ctx) => {
|
|
49579
|
+
const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, args53.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49044
49580
|
if (!result.ok) {
|
|
49045
49581
|
return {
|
|
49046
49582
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49055,9 +49591,9 @@ Updates the webhook endpoint with the given ID.`,
|
|
|
49055
49591
|
|
|
49056
49592
|
// src/funcs/zonesListOrSearchSecurityZones.ts
|
|
49057
49593
|
function zonesListOrSearchSecurityZones(client, request, options) {
|
|
49058
|
-
return new APIPromise($
|
|
49594
|
+
return new APIPromise($do54(client, request, options));
|
|
49059
49595
|
}
|
|
49060
|
-
async function $
|
|
49596
|
+
async function $do54(client, request, options) {
|
|
49061
49597
|
const parsed = safeParse(request, (value) => ListOrSearchSecurityZonesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49062
49598
|
if (!parsed.ok) {
|
|
49063
49599
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -49083,6 +49619,7 @@ async function $do51(client, request, options) {
|
|
|
49083
49619
|
const securityInput = await extractSecurity(client._options.security);
|
|
49084
49620
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
49085
49621
|
const context = {
|
|
49622
|
+
options: client._options,
|
|
49086
49623
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
49087
49624
|
operationID: "listOrSearchSecurityZones",
|
|
49088
49625
|
oAuth2Scopes: [],
|
|
@@ -49099,6 +49636,7 @@ async function $do51(client, request, options) {
|
|
|
49099
49636
|
headers,
|
|
49100
49637
|
query,
|
|
49101
49638
|
body,
|
|
49639
|
+
userAgent: client._options.userAgent,
|
|
49102
49640
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
49103
49641
|
}, options);
|
|
49104
49642
|
if (!requestRes.ok) {
|
|
@@ -49169,12 +49707,12 @@ var init_zonesListOrSearchSecurityZones = __esm(() => {
|
|
|
49169
49707
|
});
|
|
49170
49708
|
|
|
49171
49709
|
// src/mcp-server/tools/zonesListOrSearchSecurityZones.ts
|
|
49172
|
-
var
|
|
49710
|
+
var args53, tool$zonesListOrSearchSecurityZones;
|
|
49173
49711
|
var init_zonesListOrSearchSecurityZones2 = __esm(() => {
|
|
49174
49712
|
init_zonesListOrSearchSecurityZones();
|
|
49175
49713
|
init_operations();
|
|
49176
49714
|
init_tools();
|
|
49177
|
-
|
|
49715
|
+
args53 = {
|
|
49178
49716
|
request: ListOrSearchSecurityZonesRequest$inboundSchema
|
|
49179
49717
|
};
|
|
49180
49718
|
tool$zonesListOrSearchSecurityZones = {
|
|
@@ -49182,9 +49720,9 @@ var init_zonesListOrSearchSecurityZones2 = __esm(() => {
|
|
|
49182
49720
|
description: `List or search security zones
|
|
49183
49721
|
|
|
49184
49722
|
List or search security zones`,
|
|
49185
|
-
args:
|
|
49186
|
-
tool: async (client,
|
|
49187
|
-
const [result, apiCall] = await zonesListOrSearchSecurityZones(client,
|
|
49723
|
+
args: args53,
|
|
49724
|
+
tool: async (client, args54, ctx) => {
|
|
49725
|
+
const [result, apiCall] = await zonesListOrSearchSecurityZones(client, args54.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49188
49726
|
if (!result.ok) {
|
|
49189
49727
|
return {
|
|
49190
49728
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49199,9 +49737,9 @@ List or search security zones`,
|
|
|
49199
49737
|
|
|
49200
49738
|
// src/funcs/zonesSecurityZoneCheckin.ts
|
|
49201
49739
|
function zonesSecurityZoneCheckin(client, request, options) {
|
|
49202
|
-
return new APIPromise($
|
|
49740
|
+
return new APIPromise($do55(client, request, options));
|
|
49203
49741
|
}
|
|
49204
|
-
async function $
|
|
49742
|
+
async function $do55(client, request, options) {
|
|
49205
49743
|
const parsed = safeParse(request, (value) => SecurityZoneCheckinRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
49206
49744
|
if (!parsed.ok) {
|
|
49207
49745
|
return [parsed, { status: "invalid" }];
|
|
@@ -49216,6 +49754,7 @@ async function $do52(client, request, options) {
|
|
|
49216
49754
|
const securityInput = await extractSecurity(client._options.security);
|
|
49217
49755
|
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
49218
49756
|
const context = {
|
|
49757
|
+
options: client._options,
|
|
49219
49758
|
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
49220
49759
|
operationID: "securityZoneCheckin",
|
|
49221
49760
|
oAuth2Scopes: [],
|
|
@@ -49231,6 +49770,7 @@ async function $do52(client, request, options) {
|
|
|
49231
49770
|
path,
|
|
49232
49771
|
headers,
|
|
49233
49772
|
body,
|
|
49773
|
+
userAgent: client._options.userAgent,
|
|
49234
49774
|
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
49235
49775
|
}, options);
|
|
49236
49776
|
if (!requestRes.ok) {
|
|
@@ -49269,12 +49809,12 @@ var init_zonesSecurityZoneCheckin = __esm(() => {
|
|
|
49269
49809
|
});
|
|
49270
49810
|
|
|
49271
49811
|
// src/mcp-server/tools/zonesSecurityZoneCheckin.ts
|
|
49272
|
-
var
|
|
49812
|
+
var args54, tool$zonesSecurityZoneCheckin;
|
|
49273
49813
|
var init_zonesSecurityZoneCheckin2 = __esm(() => {
|
|
49274
49814
|
init_zonesSecurityZoneCheckin();
|
|
49275
49815
|
init_operations();
|
|
49276
49816
|
init_tools();
|
|
49277
|
-
|
|
49817
|
+
args54 = {
|
|
49278
49818
|
request: SecurityZoneCheckinRequestBody$inboundSchema
|
|
49279
49819
|
};
|
|
49280
49820
|
tool$zonesSecurityZoneCheckin = {
|
|
@@ -49282,9 +49822,9 @@ var init_zonesSecurityZoneCheckin2 = __esm(() => {
|
|
|
49282
49822
|
description: `Security zone checkin request
|
|
49283
49823
|
|
|
49284
49824
|
Security zone checkin request`,
|
|
49285
|
-
args:
|
|
49286
|
-
tool: async (client,
|
|
49287
|
-
const [result, apiCall] = await zonesSecurityZoneCheckin(client,
|
|
49825
|
+
args: args54,
|
|
49826
|
+
tool: async (client, args55, ctx) => {
|
|
49827
|
+
const [result, apiCall] = await zonesSecurityZoneCheckin(client, args55.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49288
49828
|
if (!result.ok) {
|
|
49289
49829
|
return {
|
|
49290
49830
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49301,7 +49841,7 @@ Security zone checkin request`,
|
|
|
49301
49841
|
function createMCPServer(deps) {
|
|
49302
49842
|
const server = new McpServer({
|
|
49303
49843
|
name: "GreenSecurity",
|
|
49304
|
-
version: "0.
|
|
49844
|
+
version: "0.35.1"
|
|
49305
49845
|
});
|
|
49306
49846
|
const client = new GreenSecurityCore({
|
|
49307
49847
|
security: deps.security,
|
|
@@ -49367,6 +49907,9 @@ function createMCPServer(deps) {
|
|
|
49367
49907
|
tool(tool$companiesListOrSearchCompanies);
|
|
49368
49908
|
tool(tool$zonesListOrSearchSecurityZones);
|
|
49369
49909
|
tool(tool$zonesSecurityZoneCheckin);
|
|
49910
|
+
tool(tool$dataRequestsAddDataRequestFile);
|
|
49911
|
+
tool(tool$dataRequestsDeleteDataRequestFile);
|
|
49912
|
+
tool(tool$dataRequestsUpdateDataRequest);
|
|
49370
49913
|
return server;
|
|
49371
49914
|
}
|
|
49372
49915
|
var init_server2 = __esm(() => {
|
|
@@ -49375,6 +49918,9 @@ var init_server2 = __esm(() => {
|
|
|
49375
49918
|
init_resources();
|
|
49376
49919
|
init_tools();
|
|
49377
49920
|
init_companiesListOrSearchCompanies2();
|
|
49921
|
+
init_dataRequestsAddDataRequestFile2();
|
|
49922
|
+
init_dataRequestsDeleteDataRequestFile2();
|
|
49923
|
+
init_dataRequestsUpdateDataRequest2();
|
|
49378
49924
|
init_organizationsGetFacility2();
|
|
49379
49925
|
init_organizationsListOrSearchFacilities2();
|
|
49380
49926
|
init_supportArticlesGetSupportArticle2();
|
|
@@ -50630,7 +51176,7 @@ var routes = an({
|
|
|
50630
51176
|
var app = He(routes, {
|
|
50631
51177
|
name: "mcp",
|
|
50632
51178
|
versionInfo: {
|
|
50633
|
-
currentVersion: "0.
|
|
51179
|
+
currentVersion: "0.35.1"
|
|
50634
51180
|
}
|
|
50635
51181
|
});
|
|
50636
51182
|
zt(app, process3.argv.slice(2), buildContext(process3));
|
|
@@ -50638,5 +51184,5 @@ export {
|
|
|
50638
51184
|
app
|
|
50639
51185
|
};
|
|
50640
51186
|
|
|
50641
|
-
//# debugId=
|
|
51187
|
+
//# debugId=932350E8F54D5FE864756E2164756E21
|
|
50642
51188
|
//# sourceMappingURL=mcp-server.js.map
|