@greensecurity/javascript-sdk 0.35.3 → 0.35.13
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +9 -0
- package/bin/mcp-server.js +795 -376
- package/bin/mcp-server.js.map +18 -12
- package/dist/commonjs/__tests__/invoices.test.d.ts +2 -0
- package/dist/commonjs/__tests__/invoices.test.d.ts.map +1 -0
- package/dist/commonjs/__tests__/invoices.test.js +25 -0
- package/dist/commonjs/__tests__/invoices.test.js.map +1 -0
- package/dist/commonjs/__tests__/vendors.test.js +17 -0
- package/dist/commonjs/__tests__/vendors.test.js.map +1 -1
- package/dist/commonjs/__tests__/webhooks.test.js +1 -1
- package/dist/commonjs/__tests__/webhooks.test.js.map +1 -1
- package/dist/commonjs/funcs/invoicesMakePayment.d.ts +17 -0
- package/dist/commonjs/funcs/invoicesMakePayment.d.ts.map +1 -0
- package/dist/commonjs/funcs/invoicesMakePayment.js +123 -0
- package/dist/commonjs/funcs/invoicesMakePayment.js.map +1 -0
- package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.d.ts +1 -0
- package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.d.ts.map +1 -1
- package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.js +1 -0
- package/dist/commonjs/funcs/vendorsGetVendorCredentialDetails.js.map +1 -1
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialData.d.ts +17 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialData.js +128 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/commonjs/lib/config.d.ts +2 -2
- package/dist/commonjs/lib/config.js +2 -2
- package/dist/commonjs/lib/config.js.map +1 -1
- package/dist/commonjs/mcp-server/mcp-server.js +1 -1
- package/dist/commonjs/mcp-server/mcp-server.js.map +1 -1
- package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/server.js +5 -1
- package/dist/commonjs/mcp-server/server.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/invoicesMakePayment.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/invoicesMakePayment.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/invoicesMakePayment.js +64 -0
- package/dist/commonjs/mcp-server/tools/invoicesMakePayment.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsGetVendorCredentialDetails.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/tools/vendorsGetVendorCredentialDetails.js +2 -1
- package/dist/commonjs/mcp-server/tools/vendorsGetVendorCredentialDetails.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/vendorsUpdateVendorCredentialData.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsUpdateVendorCredentialData.js +64 -0
- package/dist/commonjs/mcp-server/tools/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/commonjs/models/components/credential.d.ts +4 -0
- package/dist/commonjs/models/components/credential.d.ts.map +1 -1
- package/dist/commonjs/models/components/credential.js +8 -0
- package/dist/commonjs/models/components/credential.js.map +1 -1
- package/dist/commonjs/models/components/expand.d.ts +3 -0
- package/dist/commonjs/models/components/expand.d.ts.map +1 -1
- package/dist/commonjs/models/components/expand.js +1 -0
- package/dist/commonjs/models/components/expand.js.map +1 -1
- package/dist/commonjs/models/components/vendorcredentialsummary.d.ts +2 -0
- package/dist/commonjs/models/components/vendorcredentialsummary.d.ts.map +1 -1
- package/dist/commonjs/models/components/vendorcredentialsummary.js +4 -0
- package/dist/commonjs/models/components/vendorcredentialsummary.js.map +1 -1
- package/dist/commonjs/models/operations/index.d.ts +2 -0
- package/dist/commonjs/models/operations/index.d.ts.map +1 -1
- package/dist/commonjs/models/operations/index.js +2 -0
- package/dist/commonjs/models/operations/index.js.map +1 -1
- package/dist/commonjs/models/operations/makepayment.d.ts +91 -0
- package/dist/commonjs/models/operations/makepayment.d.ts.map +1 -0
- package/dist/commonjs/models/operations/makepayment.js +146 -0
- package/dist/commonjs/models/operations/makepayment.js.map +1 -0
- package/dist/commonjs/models/operations/updatevendorcredentialdata.d.ts +186 -0
- package/dist/commonjs/models/operations/updatevendorcredentialdata.d.ts.map +1 -0
- package/dist/commonjs/models/operations/updatevendorcredentialdata.js +217 -0
- package/dist/commonjs/models/operations/updatevendorcredentialdata.js.map +1 -0
- package/dist/commonjs/react-query/index.d.ts +2 -0
- package/dist/commonjs/react-query/index.d.ts.map +1 -1
- package/dist/commonjs/react-query/index.js +2 -0
- package/dist/commonjs/react-query/index.js.map +1 -1
- package/dist/commonjs/react-query/invoicesMakePayment.d.ts +23 -0
- package/dist/commonjs/react-query/invoicesMakePayment.d.ts.map +1 -0
- package/dist/commonjs/react-query/invoicesMakePayment.js +47 -0
- package/dist/commonjs/react-query/invoicesMakePayment.js.map +1 -0
- package/dist/commonjs/react-query/vendorsGetVendorCredentialDetails.d.ts +2 -0
- package/dist/commonjs/react-query/vendorsGetVendorCredentialDetails.d.ts.map +1 -1
- package/dist/commonjs/react-query/vendorsGetVendorCredentialDetails.js +2 -0
- package/dist/commonjs/react-query/vendorsGetVendorCredentialDetails.js.map +1 -1
- package/dist/commonjs/react-query/vendorsUpdateVendorCredentialData.d.ts +23 -0
- package/dist/commonjs/react-query/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/commonjs/react-query/vendorsUpdateVendorCredentialData.js +51 -0
- package/dist/commonjs/react-query/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/commonjs/sdk/invoices.d.ts +12 -0
- package/dist/commonjs/sdk/invoices.d.ts.map +1 -0
- package/dist/commonjs/sdk/invoices.js +22 -0
- package/dist/commonjs/sdk/invoices.js.map +1 -0
- package/dist/commonjs/sdk/sdk.d.ts +3 -0
- package/dist/commonjs/sdk/sdk.d.ts.map +1 -1
- package/dist/commonjs/sdk/sdk.js +4 -0
- package/dist/commonjs/sdk/sdk.js.map +1 -1
- package/dist/commonjs/sdk/vendors.d.ts +8 -0
- package/dist/commonjs/sdk/vendors.d.ts.map +1 -1
- package/dist/commonjs/sdk/vendors.js +11 -0
- package/dist/commonjs/sdk/vendors.js.map +1 -1
- package/dist/esm/__tests__/invoices.test.d.ts +2 -0
- package/dist/esm/__tests__/invoices.test.d.ts.map +1 -0
- package/dist/esm/__tests__/invoices.test.js +23 -0
- package/dist/esm/__tests__/invoices.test.js.map +1 -0
- package/dist/esm/__tests__/vendors.test.js +17 -0
- package/dist/esm/__tests__/vendors.test.js.map +1 -1
- package/dist/esm/__tests__/webhooks.test.js +1 -1
- package/dist/esm/__tests__/webhooks.test.js.map +1 -1
- package/dist/esm/funcs/invoicesMakePayment.d.ts +17 -0
- package/dist/esm/funcs/invoicesMakePayment.d.ts.map +1 -0
- package/dist/esm/funcs/invoicesMakePayment.js +87 -0
- package/dist/esm/funcs/invoicesMakePayment.js.map +1 -0
- package/dist/esm/funcs/vendorsGetVendorCredentialDetails.d.ts +1 -0
- package/dist/esm/funcs/vendorsGetVendorCredentialDetails.d.ts.map +1 -1
- package/dist/esm/funcs/vendorsGetVendorCredentialDetails.js +1 -0
- package/dist/esm/funcs/vendorsGetVendorCredentialDetails.js.map +1 -1
- package/dist/esm/funcs/vendorsUpdateVendorCredentialData.d.ts +17 -0
- package/dist/esm/funcs/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/esm/funcs/vendorsUpdateVendorCredentialData.js +92 -0
- package/dist/esm/funcs/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/esm/lib/config.d.ts +2 -2
- package/dist/esm/lib/config.js +2 -2
- package/dist/esm/lib/config.js.map +1 -1
- package/dist/esm/mcp-server/mcp-server.js +1 -1
- package/dist/esm/mcp-server/mcp-server.js.map +1 -1
- package/dist/esm/mcp-server/server.d.ts.map +1 -1
- package/dist/esm/mcp-server/server.js +5 -1
- package/dist/esm/mcp-server/server.js.map +1 -1
- package/dist/esm/mcp-server/tools/invoicesMakePayment.d.ts +8 -0
- package/dist/esm/mcp-server/tools/invoicesMakePayment.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/invoicesMakePayment.js +28 -0
- package/dist/esm/mcp-server/tools/invoicesMakePayment.js.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsGetVendorCredentialDetails.d.ts.map +1 -1
- package/dist/esm/mcp-server/tools/vendorsGetVendorCredentialDetails.js +2 -1
- package/dist/esm/mcp-server/tools/vendorsGetVendorCredentialDetails.js.map +1 -1
- package/dist/esm/mcp-server/tools/vendorsUpdateVendorCredentialData.d.ts +8 -0
- package/dist/esm/mcp-server/tools/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsUpdateVendorCredentialData.js +28 -0
- package/dist/esm/mcp-server/tools/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/esm/models/components/credential.d.ts +4 -0
- package/dist/esm/models/components/credential.d.ts.map +1 -1
- package/dist/esm/models/components/credential.js +8 -0
- package/dist/esm/models/components/credential.js.map +1 -1
- package/dist/esm/models/components/expand.d.ts +3 -0
- package/dist/esm/models/components/expand.d.ts.map +1 -1
- package/dist/esm/models/components/expand.js +1 -0
- package/dist/esm/models/components/expand.js.map +1 -1
- package/dist/esm/models/components/vendorcredentialsummary.d.ts +2 -0
- package/dist/esm/models/components/vendorcredentialsummary.d.ts.map +1 -1
- package/dist/esm/models/components/vendorcredentialsummary.js +4 -0
- package/dist/esm/models/components/vendorcredentialsummary.js.map +1 -1
- package/dist/esm/models/operations/index.d.ts +2 -0
- package/dist/esm/models/operations/index.d.ts.map +1 -1
- package/dist/esm/models/operations/index.js +2 -0
- package/dist/esm/models/operations/index.js.map +1 -1
- package/dist/esm/models/operations/makepayment.d.ts +91 -0
- package/dist/esm/models/operations/makepayment.d.ts.map +1 -0
- package/dist/esm/models/operations/makepayment.js +104 -0
- package/dist/esm/models/operations/makepayment.js.map +1 -0
- package/dist/esm/models/operations/updatevendorcredentialdata.d.ts +186 -0
- package/dist/esm/models/operations/updatevendorcredentialdata.d.ts.map +1 -0
- package/dist/esm/models/operations/updatevendorcredentialdata.js +177 -0
- package/dist/esm/models/operations/updatevendorcredentialdata.js.map +1 -0
- package/dist/esm/react-query/index.d.ts +2 -0
- package/dist/esm/react-query/index.d.ts.map +1 -1
- package/dist/esm/react-query/index.js +2 -0
- package/dist/esm/react-query/index.js.map +1 -1
- package/dist/esm/react-query/invoicesMakePayment.d.ts +23 -0
- package/dist/esm/react-query/invoicesMakePayment.d.ts.map +1 -0
- package/dist/esm/react-query/invoicesMakePayment.js +42 -0
- package/dist/esm/react-query/invoicesMakePayment.js.map +1 -0
- package/dist/esm/react-query/vendorsGetVendorCredentialDetails.d.ts +2 -0
- package/dist/esm/react-query/vendorsGetVendorCredentialDetails.d.ts.map +1 -1
- package/dist/esm/react-query/vendorsGetVendorCredentialDetails.js +2 -0
- package/dist/esm/react-query/vendorsGetVendorCredentialDetails.js.map +1 -1
- package/dist/esm/react-query/vendorsUpdateVendorCredentialData.d.ts +23 -0
- package/dist/esm/react-query/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/esm/react-query/vendorsUpdateVendorCredentialData.js +46 -0
- package/dist/esm/react-query/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/esm/sdk/invoices.d.ts +12 -0
- package/dist/esm/sdk/invoices.d.ts.map +1 -0
- package/dist/esm/sdk/invoices.js +18 -0
- package/dist/esm/sdk/invoices.js.map +1 -0
- package/dist/esm/sdk/sdk.d.ts +3 -0
- package/dist/esm/sdk/sdk.d.ts.map +1 -1
- package/dist/esm/sdk/sdk.js +4 -0
- package/dist/esm/sdk/sdk.js.map +1 -1
- package/dist/esm/sdk/vendors.d.ts +8 -0
- package/dist/esm/sdk/vendors.d.ts.map +1 -1
- package/dist/esm/sdk/vendors.js +11 -0
- package/dist/esm/sdk/vendors.js.map +1 -1
- package/jsr.json +1 -1
- package/package.json +1 -1
- package/src/__tests__/invoices.test.ts +26 -0
- package/src/__tests__/vendors.test.ts +20 -0
- package/src/__tests__/webhooks.test.ts +1 -1
- package/src/funcs/invoicesMakePayment.ts +172 -0
- package/src/funcs/vendorsGetVendorCredentialDetails.ts +1 -0
- package/src/funcs/vendorsUpdateVendorCredentialData.ts +180 -0
- package/src/lib/config.ts +2 -2
- package/src/mcp-server/mcp-server.ts +1 -1
- package/src/mcp-server/server.ts +5 -1
- package/src/mcp-server/tools/invoicesMakePayment.ts +37 -0
- package/src/mcp-server/tools/vendorsGetVendorCredentialDetails.ts +2 -1
- package/src/mcp-server/tools/vendorsUpdateVendorCredentialData.ts +39 -0
- package/src/models/components/credential.ts +12 -0
- package/src/models/components/expand.ts +2 -0
- package/src/models/components/vendorcredentialsummary.ts +6 -0
- package/src/models/operations/index.ts +2 -0
- package/src/models/operations/makepayment.ts +217 -0
- package/src/models/operations/updatevendorcredentialdata.ts +305 -0
- package/src/react-query/index.ts +2 -0
- package/src/react-query/invoicesMakePayment.ts +89 -0
- package/src/react-query/vendorsGetVendorCredentialDetails.ts +2 -0
- package/src/react-query/vendorsUpdateVendorCredentialData.ts +92 -0
- package/src/sdk/invoices.ts +27 -0
- package/src/sdk/sdk.ts +6 -0
- package/src/sdk/vendors.ts +19 -0
package/bin/mcp-server.js
CHANGED
|
@@ -34236,9 +34236,9 @@ var init_config = __esm(() => {
|
|
|
34236
34236
|
SDK_METADATA = {
|
|
34237
34237
|
language: "typescript",
|
|
34238
34238
|
openapiDocVersion: "0.0.3",
|
|
34239
|
-
sdkVersion: "0.35.
|
|
34239
|
+
sdkVersion: "0.35.13",
|
|
34240
34240
|
genVersion: "2.620.2",
|
|
34241
|
-
userAgent: "speakeasy-sdk/typescript 0.35.
|
|
34241
|
+
userAgent: "speakeasy-sdk/typescript 0.35.13 2.620.2 0.0.3 @greensecurity/javascript-sdk"
|
|
34242
34242
|
};
|
|
34243
34243
|
});
|
|
34244
34244
|
|
|
@@ -36494,6 +36494,8 @@ var init_credential = __esm(() => {
|
|
|
36494
36494
|
ui_schema: nullableType(stringType()).optional(),
|
|
36495
36495
|
behavior: nullableType(stringType()).optional(),
|
|
36496
36496
|
require_electronic_signature: booleanType().optional(),
|
|
36497
|
+
accept_text: nullableType(stringType()).optional(),
|
|
36498
|
+
accept_submitting_text: nullableType(stringType()).optional(),
|
|
36497
36499
|
decline_submitting_text: nullableType(stringType()).optional(),
|
|
36498
36500
|
decline_description: nullableType(stringType()).optional(),
|
|
36499
36501
|
require_decline_file: booleanType().optional(),
|
|
@@ -36509,6 +36511,8 @@ var init_credential = __esm(() => {
|
|
|
36509
36511
|
js_schema: "jsSchema",
|
|
36510
36512
|
ui_schema: "uiSchema",
|
|
36511
36513
|
require_electronic_signature: "requireElectronicSignature",
|
|
36514
|
+
accept_text: "acceptText",
|
|
36515
|
+
accept_submitting_text: "acceptSubmittingText",
|
|
36512
36516
|
decline_submitting_text: "declineSubmittingText",
|
|
36513
36517
|
decline_description: "declineDescription",
|
|
36514
36518
|
require_decline_file: "requireDeclineFile",
|
|
@@ -36530,6 +36534,8 @@ var init_credential = __esm(() => {
|
|
|
36530
36534
|
uiSchema: nullableType(stringType()).optional(),
|
|
36531
36535
|
behavior: nullableType(stringType()).optional(),
|
|
36532
36536
|
requireElectronicSignature: booleanType().optional(),
|
|
36537
|
+
acceptText: nullableType(stringType()).optional(),
|
|
36538
|
+
acceptSubmittingText: nullableType(stringType()).optional(),
|
|
36533
36539
|
declineSubmittingText: nullableType(stringType()).optional(),
|
|
36534
36540
|
declineDescription: nullableType(stringType()).optional(),
|
|
36535
36541
|
requireDeclineFile: booleanType().optional(),
|
|
@@ -36545,6 +36551,8 @@ var init_credential = __esm(() => {
|
|
|
36545
36551
|
jsSchema: "js_schema",
|
|
36546
36552
|
uiSchema: "ui_schema",
|
|
36547
36553
|
requireElectronicSignature: "require_electronic_signature",
|
|
36554
|
+
acceptText: "accept_text",
|
|
36555
|
+
acceptSubmittingText: "accept_submitting_text",
|
|
36548
36556
|
declineSubmittingText: "decline_submitting_text",
|
|
36549
36557
|
declineDescription: "decline_description",
|
|
36550
36558
|
requireDeclineFile: "require_decline_file",
|
|
@@ -36819,6 +36827,7 @@ var init_expand = __esm(() => {
|
|
|
36819
36827
|
VendorCredentialVendorCredentialDataRequests: "vendor_credential.vendor_credential_data_requests",
|
|
36820
36828
|
VendorCredentialCredentialVariants: "vendor_credential.credential_variants",
|
|
36821
36829
|
VendorCredentialTargetsChop: "vendor_credential.targets_chop",
|
|
36830
|
+
VendorCredentialTotalPendingCredentials: "vendor_credential.total_pending_credentials",
|
|
36822
36831
|
VendorCredentialFileVendorCredential: "vendor_credential_file.vendor_credential",
|
|
36823
36832
|
VendorCredentialFileCredentialDocument: "vendor_credential_file.credential_document",
|
|
36824
36833
|
VendorCredentialDataRequestVendorCredential: "vendor_credential_data_request.vendor_credential",
|
|
@@ -39517,7 +39526,8 @@ var init_vendorcredentialsummary = __esm(() => {
|
|
|
39517
39526
|
vendor_credential_default_status: nullableType(stringType()).optional(),
|
|
39518
39527
|
vendor_credential_data_requests: nullableType(arrayType(nullableType(lazyType(() => VendorCredentialDataRequest$inboundSchema)))).optional(),
|
|
39519
39528
|
credential_variants: nullableType(arrayType(anyType())).optional(),
|
|
39520
|
-
targets_chop: nullableType(booleanType()).optional()
|
|
39529
|
+
targets_chop: nullableType(booleanType()).optional(),
|
|
39530
|
+
total_pending_credentials: numberType().int().optional()
|
|
39521
39531
|
}).transform((v2) => {
|
|
39522
39532
|
return remap(v2, {
|
|
39523
39533
|
date_due: "dateDue",
|
|
@@ -39537,7 +39547,8 @@ var init_vendorcredentialsummary = __esm(() => {
|
|
|
39537
39547
|
vendor_credential_default_status: "vendorCredentialDefaultStatus",
|
|
39538
39548
|
vendor_credential_data_requests: "vendorCredentialDataRequests",
|
|
39539
39549
|
credential_variants: "credentialVariants",
|
|
39540
|
-
targets_chop: "targetsChop"
|
|
39550
|
+
targets_chop: "targetsChop",
|
|
39551
|
+
total_pending_credentials: "totalPendingCredentials"
|
|
39541
39552
|
});
|
|
39542
39553
|
});
|
|
39543
39554
|
VendorCredentialSummary$outboundSchema = objectType({
|
|
@@ -39567,7 +39578,8 @@ var init_vendorcredentialsummary = __esm(() => {
|
|
|
39567
39578
|
vendorCredentialDefaultStatus: nullableType(stringType()).optional(),
|
|
39568
39579
|
vendorCredentialDataRequests: nullableType(arrayType(nullableType(lazyType(() => VendorCredentialDataRequest$outboundSchema)))).optional(),
|
|
39569
39580
|
credentialVariants: nullableType(arrayType(anyType())).optional(),
|
|
39570
|
-
targetsChop: nullableType(booleanType()).optional()
|
|
39581
|
+
targetsChop: nullableType(booleanType()).optional(),
|
|
39582
|
+
totalPendingCredentials: numberType().int().optional()
|
|
39571
39583
|
}).transform((v2) => {
|
|
39572
39584
|
return remap(v2, {
|
|
39573
39585
|
dateDue: "date_due",
|
|
@@ -39587,7 +39599,8 @@ var init_vendorcredentialsummary = __esm(() => {
|
|
|
39587
39599
|
vendorCredentialDefaultStatus: "vendor_credential_default_status",
|
|
39588
39600
|
vendorCredentialDataRequests: "vendor_credential_data_requests",
|
|
39589
39601
|
credentialVariants: "credential_variants",
|
|
39590
|
-
targetsChop: "targets_chop"
|
|
39602
|
+
targetsChop: "targets_chop",
|
|
39603
|
+
totalPendingCredentials: "total_pending_credentials"
|
|
39591
39604
|
});
|
|
39592
39605
|
});
|
|
39593
39606
|
((VendorCredentialSummary$) => {
|
|
@@ -42310,6 +42323,65 @@ var init_magiclink = __esm(() => {
|
|
|
42310
42323
|
})(MagiclinkMagiclinkOk$ ||= {});
|
|
42311
42324
|
});
|
|
42312
42325
|
|
|
42326
|
+
// src/models/operations/makepayment.ts
|
|
42327
|
+
var MakePaymentRequestBody$inboundSchema, MakePaymentRequestBody$outboundSchema, MakePaymentRequestBody$, MakePaymentRequest$inboundSchema, MakePaymentRequest$outboundSchema, MakePaymentRequest$, MakePaymentResponseBody$inboundSchema, MakePaymentResponseBody$outboundSchema, MakePaymentResponseBody$;
|
|
42328
|
+
var init_makepayment = __esm(() => {
|
|
42329
|
+
init_esm();
|
|
42330
|
+
init_primitives();
|
|
42331
|
+
MakePaymentRequestBody$inboundSchema = objectType({
|
|
42332
|
+
amount: numberType().optional(),
|
|
42333
|
+
use_credits: booleanType().optional()
|
|
42334
|
+
}).transform((v2) => {
|
|
42335
|
+
return remap(v2, {
|
|
42336
|
+
use_credits: "useCredits"
|
|
42337
|
+
});
|
|
42338
|
+
});
|
|
42339
|
+
MakePaymentRequestBody$outboundSchema = objectType({
|
|
42340
|
+
amount: numberType().optional(),
|
|
42341
|
+
useCredits: booleanType().optional()
|
|
42342
|
+
}).transform((v2) => {
|
|
42343
|
+
return remap(v2, {
|
|
42344
|
+
useCredits: "use_credits"
|
|
42345
|
+
});
|
|
42346
|
+
});
|
|
42347
|
+
((MakePaymentRequestBody$) => {
|
|
42348
|
+
MakePaymentRequestBody$.inboundSchema = MakePaymentRequestBody$inboundSchema;
|
|
42349
|
+
MakePaymentRequestBody$.outboundSchema = MakePaymentRequestBody$outboundSchema;
|
|
42350
|
+
})(MakePaymentRequestBody$ ||= {});
|
|
42351
|
+
MakePaymentRequest$inboundSchema = objectType({
|
|
42352
|
+
id: numberType().int(),
|
|
42353
|
+
RequestBody: lazyType(() => MakePaymentRequestBody$inboundSchema)
|
|
42354
|
+
}).transform((v2) => {
|
|
42355
|
+
return remap(v2, {
|
|
42356
|
+
RequestBody: "requestBody"
|
|
42357
|
+
});
|
|
42358
|
+
});
|
|
42359
|
+
MakePaymentRequest$outboundSchema = objectType({
|
|
42360
|
+
id: numberType().int(),
|
|
42361
|
+
requestBody: lazyType(() => MakePaymentRequestBody$outboundSchema)
|
|
42362
|
+
}).transform((v2) => {
|
|
42363
|
+
return remap(v2, {
|
|
42364
|
+
requestBody: "RequestBody"
|
|
42365
|
+
});
|
|
42366
|
+
});
|
|
42367
|
+
((MakePaymentRequest$) => {
|
|
42368
|
+
MakePaymentRequest$.inboundSchema = MakePaymentRequest$inboundSchema;
|
|
42369
|
+
MakePaymentRequest$.outboundSchema = MakePaymentRequest$outboundSchema;
|
|
42370
|
+
})(MakePaymentRequest$ ||= {});
|
|
42371
|
+
MakePaymentResponseBody$inboundSchema = objectType({
|
|
42372
|
+
success: booleanType().optional(),
|
|
42373
|
+
error: stringType().optional()
|
|
42374
|
+
});
|
|
42375
|
+
MakePaymentResponseBody$outboundSchema = objectType({
|
|
42376
|
+
success: booleanType().optional(),
|
|
42377
|
+
error: stringType().optional()
|
|
42378
|
+
});
|
|
42379
|
+
((MakePaymentResponseBody$) => {
|
|
42380
|
+
MakePaymentResponseBody$.inboundSchema = MakePaymentResponseBody$inboundSchema;
|
|
42381
|
+
MakePaymentResponseBody$.outboundSchema = MakePaymentResponseBody$outboundSchema;
|
|
42382
|
+
})(MakePaymentResponseBody$ ||= {});
|
|
42383
|
+
});
|
|
42384
|
+
|
|
42313
42385
|
// src/models/operations/password.ts
|
|
42314
42386
|
var PasswordRequestBody$inboundSchema, PasswordRequestBody$outboundSchema, PasswordRequestBody$, PasswordPasswordOk$inboundSchema, PasswordPasswordOk$outboundSchema, PasswordPasswordOk$;
|
|
42315
42387
|
var init_password = __esm(() => {
|
|
@@ -42940,6 +43012,125 @@ var init_updatesthewebhookendpointwiththegivenid = __esm(() => {
|
|
|
42940
43012
|
})(UpdatesTheWebhookEndpointWithTheGivenIdRequest$ ||= {});
|
|
42941
43013
|
});
|
|
42942
43014
|
|
|
43015
|
+
// src/models/operations/updatevendorcredentialdata.ts
|
|
43016
|
+
var Status2, BcpOrderStatus, BcpResultStatus, Status$inboundSchema2, Status$outboundSchema2, Status$2, BcpOrderStatus$inboundSchema, BcpOrderStatus$outboundSchema, BcpOrderStatus$, BcpResultStatus$inboundSchema, BcpResultStatus$outboundSchema, BcpResultStatus$, UpdateVendorCredentialDataRequestBody$inboundSchema, UpdateVendorCredentialDataRequestBody$outboundSchema, UpdateVendorCredentialDataRequestBody$, UpdateVendorCredentialDataRequest$inboundSchema, UpdateVendorCredentialDataRequest$outboundSchema, UpdateVendorCredentialDataRequest$;
|
|
43017
|
+
var init_updatevendorcredentialdata = __esm(() => {
|
|
43018
|
+
init_esm();
|
|
43019
|
+
init_primitives();
|
|
43020
|
+
Status2 = {
|
|
43021
|
+
PendingVendor: "Pending Vendor",
|
|
43022
|
+
PendingApproval: "Pending Approval",
|
|
43023
|
+
Approved: "Approved",
|
|
43024
|
+
Declined: "Declined",
|
|
43025
|
+
Denied: "Denied",
|
|
43026
|
+
Expired: "Expired",
|
|
43027
|
+
Suspended: "Suspended"
|
|
43028
|
+
};
|
|
43029
|
+
BcpOrderStatus = {
|
|
43030
|
+
PendingGreen: "Pending Green",
|
|
43031
|
+
PendingBCP: "Pending BCP",
|
|
43032
|
+
Processed: "Processed"
|
|
43033
|
+
};
|
|
43034
|
+
BcpResultStatus = {
|
|
43035
|
+
Pending: "Pending",
|
|
43036
|
+
Processing: "Processing",
|
|
43037
|
+
Clear: "Clear",
|
|
43038
|
+
Hit: "Hit",
|
|
43039
|
+
Unknown: "Unknown",
|
|
43040
|
+
Review: "Review"
|
|
43041
|
+
};
|
|
43042
|
+
Status$inboundSchema2 = nativeEnumType(Status2);
|
|
43043
|
+
Status$outboundSchema2 = Status$inboundSchema2;
|
|
43044
|
+
((Status$) => {
|
|
43045
|
+
Status$.inboundSchema = Status$inboundSchema2;
|
|
43046
|
+
Status$.outboundSchema = Status$outboundSchema2;
|
|
43047
|
+
})(Status$2 ||= {});
|
|
43048
|
+
BcpOrderStatus$inboundSchema = nativeEnumType(BcpOrderStatus);
|
|
43049
|
+
BcpOrderStatus$outboundSchema = BcpOrderStatus$inboundSchema;
|
|
43050
|
+
((BcpOrderStatus$) => {
|
|
43051
|
+
BcpOrderStatus$.inboundSchema = BcpOrderStatus$inboundSchema;
|
|
43052
|
+
BcpOrderStatus$.outboundSchema = BcpOrderStatus$outboundSchema;
|
|
43053
|
+
})(BcpOrderStatus$ ||= {});
|
|
43054
|
+
BcpResultStatus$inboundSchema = nativeEnumType(BcpResultStatus);
|
|
43055
|
+
BcpResultStatus$outboundSchema = BcpResultStatus$inboundSchema;
|
|
43056
|
+
((BcpResultStatus$) => {
|
|
43057
|
+
BcpResultStatus$.inboundSchema = BcpResultStatus$inboundSchema;
|
|
43058
|
+
BcpResultStatus$.outboundSchema = BcpResultStatus$outboundSchema;
|
|
43059
|
+
})(BcpResultStatus$ ||= {});
|
|
43060
|
+
UpdateVendorCredentialDataRequestBody$inboundSchema = objectType({
|
|
43061
|
+
json_data: stringType().optional(),
|
|
43062
|
+
auto_approve: booleanType().optional(),
|
|
43063
|
+
status: Status$inboundSchema2.optional(),
|
|
43064
|
+
bcp_order_id: stringType().optional(),
|
|
43065
|
+
bcp_order_status: BcpOrderStatus$inboundSchema.optional(),
|
|
43066
|
+
bcp_result_status: BcpResultStatus$inboundSchema.optional(),
|
|
43067
|
+
bcp_notes: stringType().optional(),
|
|
43068
|
+
background_check_provider_id: numberType().int().optional(),
|
|
43069
|
+
bcp_turnaround_time: numberType().int().optional()
|
|
43070
|
+
}).transform((v2) => {
|
|
43071
|
+
return remap(v2, {
|
|
43072
|
+
json_data: "jsonData",
|
|
43073
|
+
auto_approve: "autoApprove",
|
|
43074
|
+
bcp_order_id: "bcpOrderId",
|
|
43075
|
+
bcp_order_status: "bcpOrderStatus",
|
|
43076
|
+
bcp_result_status: "bcpResultStatus",
|
|
43077
|
+
bcp_notes: "bcpNotes",
|
|
43078
|
+
background_check_provider_id: "backgroundCheckProviderId",
|
|
43079
|
+
bcp_turnaround_time: "bcpTurnaroundTime"
|
|
43080
|
+
});
|
|
43081
|
+
});
|
|
43082
|
+
UpdateVendorCredentialDataRequestBody$outboundSchema = objectType({
|
|
43083
|
+
jsonData: stringType().optional(),
|
|
43084
|
+
autoApprove: booleanType().optional(),
|
|
43085
|
+
status: Status$outboundSchema2.optional(),
|
|
43086
|
+
bcpOrderId: stringType().optional(),
|
|
43087
|
+
bcpOrderStatus: BcpOrderStatus$outboundSchema.optional(),
|
|
43088
|
+
bcpResultStatus: BcpResultStatus$outboundSchema.optional(),
|
|
43089
|
+
bcpNotes: stringType().optional(),
|
|
43090
|
+
backgroundCheckProviderId: numberType().int().optional(),
|
|
43091
|
+
bcpTurnaroundTime: numberType().int().optional()
|
|
43092
|
+
}).transform((v2) => {
|
|
43093
|
+
return remap(v2, {
|
|
43094
|
+
jsonData: "json_data",
|
|
43095
|
+
autoApprove: "auto_approve",
|
|
43096
|
+
bcpOrderId: "bcp_order_id",
|
|
43097
|
+
bcpOrderStatus: "bcp_order_status",
|
|
43098
|
+
bcpResultStatus: "bcp_result_status",
|
|
43099
|
+
bcpNotes: "bcp_notes",
|
|
43100
|
+
backgroundCheckProviderId: "background_check_provider_id",
|
|
43101
|
+
bcpTurnaroundTime: "bcp_turnaround_time"
|
|
43102
|
+
});
|
|
43103
|
+
});
|
|
43104
|
+
((UpdateVendorCredentialDataRequestBody$) => {
|
|
43105
|
+
UpdateVendorCredentialDataRequestBody$.inboundSchema = UpdateVendorCredentialDataRequestBody$inboundSchema;
|
|
43106
|
+
UpdateVendorCredentialDataRequestBody$.outboundSchema = UpdateVendorCredentialDataRequestBody$outboundSchema;
|
|
43107
|
+
})(UpdateVendorCredentialDataRequestBody$ ||= {});
|
|
43108
|
+
UpdateVendorCredentialDataRequest$inboundSchema = objectType({
|
|
43109
|
+
vendor_id_or_me: stringType(),
|
|
43110
|
+
id: numberType().int(),
|
|
43111
|
+
RequestBody: lazyType(() => UpdateVendorCredentialDataRequestBody$inboundSchema)
|
|
43112
|
+
}).transform((v2) => {
|
|
43113
|
+
return remap(v2, {
|
|
43114
|
+
vendor_id_or_me: "vendorIdOrMe",
|
|
43115
|
+
RequestBody: "requestBody"
|
|
43116
|
+
});
|
|
43117
|
+
});
|
|
43118
|
+
UpdateVendorCredentialDataRequest$outboundSchema = objectType({
|
|
43119
|
+
vendorIdOrMe: stringType(),
|
|
43120
|
+
id: numberType().int(),
|
|
43121
|
+
requestBody: lazyType(() => UpdateVendorCredentialDataRequestBody$outboundSchema)
|
|
43122
|
+
}).transform((v2) => {
|
|
43123
|
+
return remap(v2, {
|
|
43124
|
+
vendorIdOrMe: "vendor_id_or_me",
|
|
43125
|
+
requestBody: "RequestBody"
|
|
43126
|
+
});
|
|
43127
|
+
});
|
|
43128
|
+
((UpdateVendorCredentialDataRequest$) => {
|
|
43129
|
+
UpdateVendorCredentialDataRequest$.inboundSchema = UpdateVendorCredentialDataRequest$inboundSchema;
|
|
43130
|
+
UpdateVendorCredentialDataRequest$.outboundSchema = UpdateVendorCredentialDataRequest$outboundSchema;
|
|
43131
|
+
})(UpdateVendorCredentialDataRequest$ ||= {});
|
|
43132
|
+
});
|
|
43133
|
+
|
|
42943
43134
|
// src/models/operations/updatevendorcredentialfile.ts
|
|
42944
43135
|
var UpdateVendorCredentialFileRequestBody$inboundSchema, UpdateVendorCredentialFileRequestBody$outboundSchema, UpdateVendorCredentialFileRequestBody$, UpdateVendorCredentialFileRequest$inboundSchema, UpdateVendorCredentialFileRequest$outboundSchema, UpdateVendorCredentialFileRequest$;
|
|
42945
43136
|
var init_updatevendorcredentialfile = __esm(() => {
|
|
@@ -43314,6 +43505,7 @@ var init_operations = __esm(() => {
|
|
|
43314
43505
|
init_listvendorscrubpackages();
|
|
43315
43506
|
init_listvendorscrubpurchases();
|
|
43316
43507
|
init_magiclink();
|
|
43508
|
+
init_makepayment();
|
|
43317
43509
|
init_password();
|
|
43318
43510
|
init_passwordresetrequest();
|
|
43319
43511
|
init_postauthenticate();
|
|
@@ -43323,6 +43515,7 @@ var init_operations = __esm(() => {
|
|
|
43323
43515
|
init_submitvendorcredential();
|
|
43324
43516
|
init_updatedatarequest();
|
|
43325
43517
|
init_updatesthewebhookendpointwiththegivenid();
|
|
43518
|
+
init_updatevendorcredentialdata();
|
|
43326
43519
|
init_updatevendorcredentialfile();
|
|
43327
43520
|
init_updatevendordetails();
|
|
43328
43521
|
init_updatevendormanagedbycompany();
|
|
@@ -43855,11 +44048,119 @@ It will update the vendor credential data request attributes`,
|
|
|
43855
44048
|
};
|
|
43856
44049
|
});
|
|
43857
44050
|
|
|
43858
|
-
// src/funcs/
|
|
43859
|
-
function
|
|
44051
|
+
// src/funcs/invoicesMakePayment.ts
|
|
44052
|
+
function invoicesMakePayment(client, request, options) {
|
|
43860
44053
|
return new APIPromise($do5(client, request, options));
|
|
43861
44054
|
}
|
|
43862
44055
|
async function $do5(client, request, options) {
|
|
44056
|
+
const parsed = safeParse(request, (value) => MakePaymentRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44057
|
+
if (!parsed.ok) {
|
|
44058
|
+
return [parsed, { status: "invalid" }];
|
|
44059
|
+
}
|
|
44060
|
+
const payload = parsed.value;
|
|
44061
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
44062
|
+
const pathParams = {
|
|
44063
|
+
id: encodeSimple("id", payload.id, {
|
|
44064
|
+
explode: false,
|
|
44065
|
+
charEncoding: "percent"
|
|
44066
|
+
})
|
|
44067
|
+
};
|
|
44068
|
+
const path = pathToFunc("/invoices/{id}/payment")(pathParams);
|
|
44069
|
+
const headers = new Headers(compactMap({
|
|
44070
|
+
"Content-Type": "application/json",
|
|
44071
|
+
Accept: "application/json"
|
|
44072
|
+
}));
|
|
44073
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
44074
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44075
|
+
const context = {
|
|
44076
|
+
options: client._options,
|
|
44077
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44078
|
+
operationID: "makePayment",
|
|
44079
|
+
oAuth2Scopes: [],
|
|
44080
|
+
resolvedSecurity: requestSecurity,
|
|
44081
|
+
securitySource: client._options.security,
|
|
44082
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
44083
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
44084
|
+
};
|
|
44085
|
+
const requestRes = client._createRequest(context, {
|
|
44086
|
+
security: requestSecurity,
|
|
44087
|
+
method: "POST",
|
|
44088
|
+
baseURL: options?.serverURL,
|
|
44089
|
+
path,
|
|
44090
|
+
headers,
|
|
44091
|
+
body,
|
|
44092
|
+
userAgent: client._options.userAgent,
|
|
44093
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44094
|
+
}, options);
|
|
44095
|
+
if (!requestRes.ok) {
|
|
44096
|
+
return [requestRes, { status: "invalid" }];
|
|
44097
|
+
}
|
|
44098
|
+
const req = requestRes.value;
|
|
44099
|
+
const doResult = await client._do(req, {
|
|
44100
|
+
context,
|
|
44101
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
44102
|
+
retryConfig: context.retryConfig,
|
|
44103
|
+
retryCodes: context.retryCodes
|
|
44104
|
+
});
|
|
44105
|
+
if (!doResult.ok) {
|
|
44106
|
+
return [doResult, { status: "request-error", request: req }];
|
|
44107
|
+
}
|
|
44108
|
+
const response = doResult.value;
|
|
44109
|
+
const responseFields = {
|
|
44110
|
+
HttpMeta: { Response: response, Request: req }
|
|
44111
|
+
};
|
|
44112
|
+
const [result] = await match(json(200, MakePaymentResponseBody$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44113
|
+
if (!result.ok) {
|
|
44114
|
+
return [result, { status: "complete", request: req, response }];
|
|
44115
|
+
}
|
|
44116
|
+
return [result, { status: "complete", request: req, response }];
|
|
44117
|
+
}
|
|
44118
|
+
var init_invoicesMakePayment = __esm(() => {
|
|
44119
|
+
init_encodings();
|
|
44120
|
+
init_matchers();
|
|
44121
|
+
init_primitives();
|
|
44122
|
+
init_schemas();
|
|
44123
|
+
init_security();
|
|
44124
|
+
init_url();
|
|
44125
|
+
init_errors2();
|
|
44126
|
+
init_operations();
|
|
44127
|
+
init_async();
|
|
44128
|
+
});
|
|
44129
|
+
|
|
44130
|
+
// src/mcp-server/tools/invoicesMakePayment.ts
|
|
44131
|
+
var args5, tool$invoicesMakePayment;
|
|
44132
|
+
var init_invoicesMakePayment2 = __esm(() => {
|
|
44133
|
+
init_invoicesMakePayment();
|
|
44134
|
+
init_operations();
|
|
44135
|
+
init_tools();
|
|
44136
|
+
args5 = {
|
|
44137
|
+
request: MakePaymentRequest$inboundSchema
|
|
44138
|
+
};
|
|
44139
|
+
tool$invoicesMakePayment = {
|
|
44140
|
+
name: "invoices-make-payment",
|
|
44141
|
+
description: `Make payment for the invoice
|
|
44142
|
+
|
|
44143
|
+
Make payment for the invoice`,
|
|
44144
|
+
args: args5,
|
|
44145
|
+
tool: async (client, args6, ctx) => {
|
|
44146
|
+
const [result, apiCall] = await invoicesMakePayment(client, args6.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44147
|
+
if (!result.ok) {
|
|
44148
|
+
return {
|
|
44149
|
+
content: [{ type: "text", text: result.error.message }],
|
|
44150
|
+
isError: true
|
|
44151
|
+
};
|
|
44152
|
+
}
|
|
44153
|
+
const value = result.value;
|
|
44154
|
+
return formatResult(value, apiCall);
|
|
44155
|
+
}
|
|
44156
|
+
};
|
|
44157
|
+
});
|
|
44158
|
+
|
|
44159
|
+
// src/funcs/organizationsGetFacility.ts
|
|
44160
|
+
function organizationsGetFacility(client, request, options) {
|
|
44161
|
+
return new APIPromise($do6(client, request, options));
|
|
44162
|
+
}
|
|
44163
|
+
async function $do6(client, request, options) {
|
|
43863
44164
|
const parsed = safeParse(request, (value) => GetFacilityRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43864
44165
|
if (!parsed.ok) {
|
|
43865
44166
|
return [parsed, { status: "invalid" }];
|
|
@@ -43935,12 +44236,12 @@ var init_organizationsGetFacility = __esm(() => {
|
|
|
43935
44236
|
});
|
|
43936
44237
|
|
|
43937
44238
|
// src/mcp-server/tools/organizationsGetFacility.ts
|
|
43938
|
-
var
|
|
44239
|
+
var args6, tool$organizationsGetFacility;
|
|
43939
44240
|
var init_organizationsGetFacility2 = __esm(() => {
|
|
43940
44241
|
init_organizationsGetFacility();
|
|
43941
44242
|
init_operations();
|
|
43942
44243
|
init_tools();
|
|
43943
|
-
|
|
44244
|
+
args6 = {
|
|
43944
44245
|
request: GetFacilityRequest$inboundSchema
|
|
43945
44246
|
};
|
|
43946
44247
|
tool$organizationsGetFacility = {
|
|
@@ -43948,9 +44249,9 @@ var init_organizationsGetFacility2 = __esm(() => {
|
|
|
43948
44249
|
description: `Get facility
|
|
43949
44250
|
|
|
43950
44251
|
Retrieve an individual facility.`,
|
|
43951
|
-
args:
|
|
43952
|
-
tool: async (client,
|
|
43953
|
-
const [result, apiCall] = await organizationsGetFacility(client,
|
|
44252
|
+
args: args6,
|
|
44253
|
+
tool: async (client, args7, ctx) => {
|
|
44254
|
+
const [result, apiCall] = await organizationsGetFacility(client, args7.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43954
44255
|
if (!result.ok) {
|
|
43955
44256
|
return {
|
|
43956
44257
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43965,9 +44266,9 @@ Retrieve an individual facility.`,
|
|
|
43965
44266
|
|
|
43966
44267
|
// src/funcs/organizationsListOrSearchFacilities.ts
|
|
43967
44268
|
function organizationsListOrSearchFacilities(client, request, options) {
|
|
43968
|
-
return new APIPromise($
|
|
44269
|
+
return new APIPromise($do7(client, request, options));
|
|
43969
44270
|
}
|
|
43970
|
-
async function $
|
|
44271
|
+
async function $do7(client, request, options) {
|
|
43971
44272
|
const parsed = safeParse(request, (value) => ListOrSearchFacilitiesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43972
44273
|
if (!parsed.ok) {
|
|
43973
44274
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -44083,12 +44384,12 @@ var init_organizationsListOrSearchFacilities = __esm(() => {
|
|
|
44083
44384
|
});
|
|
44084
44385
|
|
|
44085
44386
|
// src/mcp-server/tools/organizationsListOrSearchFacilities.ts
|
|
44086
|
-
var
|
|
44387
|
+
var args7, tool$organizationsListOrSearchFacilities;
|
|
44087
44388
|
var init_organizationsListOrSearchFacilities2 = __esm(() => {
|
|
44088
44389
|
init_organizationsListOrSearchFacilities();
|
|
44089
44390
|
init_operations();
|
|
44090
44391
|
init_tools();
|
|
44091
|
-
|
|
44392
|
+
args7 = {
|
|
44092
44393
|
request: ListOrSearchFacilitiesRequest$inboundSchema
|
|
44093
44394
|
};
|
|
44094
44395
|
tool$organizationsListOrSearchFacilities = {
|
|
@@ -44109,9 +44410,9 @@ Available \`expand\` scopes are:
|
|
|
44109
44410
|
- facility.vendor_policy
|
|
44110
44411
|
- facility.visitor_policy
|
|
44111
44412
|
- facility.workflow`,
|
|
44112
|
-
args:
|
|
44113
|
-
tool: async (client,
|
|
44114
|
-
const [result, apiCall] = await organizationsListOrSearchFacilities(client,
|
|
44413
|
+
args: args7,
|
|
44414
|
+
tool: async (client, args8, ctx) => {
|
|
44415
|
+
const [result, apiCall] = await organizationsListOrSearchFacilities(client, args8.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44115
44416
|
if (!result.ok) {
|
|
44116
44417
|
return {
|
|
44117
44418
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44126,9 +44427,9 @@ Available \`expand\` scopes are:
|
|
|
44126
44427
|
|
|
44127
44428
|
// src/funcs/supportArticlesGetSupportArticle.ts
|
|
44128
44429
|
function supportArticlesGetSupportArticle(client, request, options) {
|
|
44129
|
-
return new APIPromise($
|
|
44430
|
+
return new APIPromise($do8(client, request, options));
|
|
44130
44431
|
}
|
|
44131
|
-
async function $
|
|
44432
|
+
async function $do8(client, request, options) {
|
|
44132
44433
|
const parsed = safeParse(request, (value) => GetSupportArticleRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44133
44434
|
if (!parsed.ok) {
|
|
44134
44435
|
return [parsed, { status: "invalid" }];
|
|
@@ -44208,12 +44509,12 @@ var init_supportArticlesGetSupportArticle = __esm(() => {
|
|
|
44208
44509
|
});
|
|
44209
44510
|
|
|
44210
44511
|
// src/mcp-server/tools/supportArticlesGetSupportArticle.ts
|
|
44211
|
-
var
|
|
44512
|
+
var args8, tool$supportArticlesGetSupportArticle;
|
|
44212
44513
|
var init_supportArticlesGetSupportArticle2 = __esm(() => {
|
|
44213
44514
|
init_supportArticlesGetSupportArticle();
|
|
44214
44515
|
init_operations();
|
|
44215
44516
|
init_tools();
|
|
44216
|
-
|
|
44517
|
+
args8 = {
|
|
44217
44518
|
request: GetSupportArticleRequest$inboundSchema
|
|
44218
44519
|
};
|
|
44219
44520
|
tool$supportArticlesGetSupportArticle = {
|
|
@@ -44228,9 +44529,9 @@ Available \`expand\` scopes are:
|
|
|
44228
44529
|
- support_article.published
|
|
44229
44530
|
- support_article.notes
|
|
44230
44531
|
- support_article.support_category`,
|
|
44231
|
-
args:
|
|
44232
|
-
tool: async (client,
|
|
44233
|
-
const [result, apiCall] = await supportArticlesGetSupportArticle(client,
|
|
44532
|
+
args: args8,
|
|
44533
|
+
tool: async (client, args9, ctx) => {
|
|
44534
|
+
const [result, apiCall] = await supportArticlesGetSupportArticle(client, args9.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44234
44535
|
if (!result.ok) {
|
|
44235
44536
|
return {
|
|
44236
44537
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44245,9 +44546,9 @@ Available \`expand\` scopes are:
|
|
|
44245
44546
|
|
|
44246
44547
|
// src/funcs/supportArticlesListOrSearchSupportArticles.ts
|
|
44247
44548
|
function supportArticlesListOrSearchSupportArticles(client, request, options) {
|
|
44248
|
-
return new APIPromise($
|
|
44549
|
+
return new APIPromise($do9(client, request, options));
|
|
44249
44550
|
}
|
|
44250
|
-
async function $
|
|
44551
|
+
async function $do9(client, request, options) {
|
|
44251
44552
|
const parsed = safeParse(request, (value) => ListOrSearchSupportArticlesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44252
44553
|
if (!parsed.ok) {
|
|
44253
44554
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -44357,12 +44658,12 @@ var init_supportArticlesListOrSearchSupportArticles = __esm(() => {
|
|
|
44357
44658
|
});
|
|
44358
44659
|
|
|
44359
44660
|
// src/mcp-server/tools/supportArticlesListOrSearchSupportArticles.ts
|
|
44360
|
-
var
|
|
44661
|
+
var args9, tool$supportArticlesListOrSearchSupportArticles;
|
|
44361
44662
|
var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
|
|
44362
44663
|
init_supportArticlesListOrSearchSupportArticles();
|
|
44363
44664
|
init_operations();
|
|
44364
44665
|
init_tools();
|
|
44365
|
-
|
|
44666
|
+
args9 = {
|
|
44366
44667
|
request: ListOrSearchSupportArticlesRequest$inboundSchema
|
|
44367
44668
|
};
|
|
44368
44669
|
tool$supportArticlesListOrSearchSupportArticles = {
|
|
@@ -44370,9 +44671,9 @@ var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
|
|
|
44370
44671
|
description: `List or search support articles
|
|
44371
44672
|
|
|
44372
44673
|
List or search support articles for FAQ.`,
|
|
44373
|
-
args:
|
|
44374
|
-
tool: async (client,
|
|
44375
|
-
const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client,
|
|
44674
|
+
args: args9,
|
|
44675
|
+
tool: async (client, args10, ctx) => {
|
|
44676
|
+
const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client, args10.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44376
44677
|
if (!result.ok) {
|
|
44377
44678
|
return {
|
|
44378
44679
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44387,9 +44688,9 @@ List or search support articles for FAQ.`,
|
|
|
44387
44688
|
|
|
44388
44689
|
// src/funcs/usersChangePassword.ts
|
|
44389
44690
|
function usersChangePassword(client, request, options) {
|
|
44390
|
-
return new APIPromise($
|
|
44691
|
+
return new APIPromise($do10(client, request, options));
|
|
44391
44692
|
}
|
|
44392
|
-
async function $
|
|
44693
|
+
async function $do10(client, request, options) {
|
|
44393
44694
|
const parsed = safeParse(request, (value) => ChangePasswordRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44394
44695
|
if (!parsed.ok) {
|
|
44395
44696
|
return [parsed, { status: "invalid" }];
|
|
@@ -44465,12 +44766,12 @@ var init_usersChangePassword = __esm(() => {
|
|
|
44465
44766
|
});
|
|
44466
44767
|
|
|
44467
44768
|
// src/mcp-server/tools/usersChangePassword.ts
|
|
44468
|
-
var
|
|
44769
|
+
var args10, tool$usersChangePassword;
|
|
44469
44770
|
var init_usersChangePassword2 = __esm(() => {
|
|
44470
44771
|
init_usersChangePassword();
|
|
44471
44772
|
init_operations();
|
|
44472
44773
|
init_tools();
|
|
44473
|
-
|
|
44774
|
+
args10 = {
|
|
44474
44775
|
request: ChangePasswordRequest$inboundSchema
|
|
44475
44776
|
};
|
|
44476
44777
|
tool$usersChangePassword = {
|
|
@@ -44478,9 +44779,9 @@ var init_usersChangePassword2 = __esm(() => {
|
|
|
44478
44779
|
description: `Change password
|
|
44479
44780
|
|
|
44480
44781
|
Change the user's password to the new passed as parameter`,
|
|
44481
|
-
args:
|
|
44482
|
-
tool: async (client,
|
|
44483
|
-
const [result, apiCall] = await usersChangePassword(client,
|
|
44782
|
+
args: args10,
|
|
44783
|
+
tool: async (client, args11, ctx) => {
|
|
44784
|
+
const [result, apiCall] = await usersChangePassword(client, args11.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44484
44785
|
if (!result.ok) {
|
|
44485
44786
|
return {
|
|
44486
44787
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44495,9 +44796,9 @@ Change the user's password to the new passed as parameter`,
|
|
|
44495
44796
|
|
|
44496
44797
|
// src/funcs/usersGetCurrentUser.ts
|
|
44497
44798
|
function usersGetCurrentUser(client, options) {
|
|
44498
|
-
return new APIPromise($
|
|
44799
|
+
return new APIPromise($do11(client, options));
|
|
44499
44800
|
}
|
|
44500
|
-
async function $
|
|
44801
|
+
async function $do11(client, options) {
|
|
44501
44802
|
const path = pathToFunc("/users/me")();
|
|
44502
44803
|
const headers = new Headers(compactMap({
|
|
44503
44804
|
Accept: "application/json"
|
|
@@ -44582,9 +44883,9 @@ Returns a user object for the user represented by the authorization token`,
|
|
|
44582
44883
|
|
|
44583
44884
|
// src/funcs/usersGetUserById.ts
|
|
44584
44885
|
function usersGetUserById(client, request, options) {
|
|
44585
|
-
return new APIPromise($
|
|
44886
|
+
return new APIPromise($do12(client, request, options));
|
|
44586
44887
|
}
|
|
44587
|
-
async function $
|
|
44888
|
+
async function $do12(client, request, options) {
|
|
44588
44889
|
const parsed = safeParse(request, (value) => GetUserByIdRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44589
44890
|
if (!parsed.ok) {
|
|
44590
44891
|
return [parsed, { status: "invalid" }];
|
|
@@ -44660,12 +44961,12 @@ var init_usersGetUserById = __esm(() => {
|
|
|
44660
44961
|
});
|
|
44661
44962
|
|
|
44662
44963
|
// src/mcp-server/tools/usersGetUserById.ts
|
|
44663
|
-
var
|
|
44964
|
+
var args11, tool$usersGetUserById;
|
|
44664
44965
|
var init_usersGetUserById2 = __esm(() => {
|
|
44665
44966
|
init_usersGetUserById();
|
|
44666
44967
|
init_operations();
|
|
44667
44968
|
init_tools();
|
|
44668
|
-
|
|
44969
|
+
args11 = {
|
|
44669
44970
|
request: GetUserByIdRequest$inboundSchema
|
|
44670
44971
|
};
|
|
44671
44972
|
tool$usersGetUserById = {
|
|
@@ -44673,9 +44974,9 @@ var init_usersGetUserById2 = __esm(() => {
|
|
|
44673
44974
|
description: `Get user by id
|
|
44674
44975
|
|
|
44675
44976
|
Returns a user object for the user represented by the identifier in the path.`,
|
|
44676
|
-
args:
|
|
44677
|
-
tool: async (client,
|
|
44678
|
-
const [result, apiCall] = await usersGetUserById(client,
|
|
44977
|
+
args: args11,
|
|
44978
|
+
tool: async (client, args12, ctx) => {
|
|
44979
|
+
const [result, apiCall] = await usersGetUserById(client, args12.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44679
44980
|
if (!result.ok) {
|
|
44680
44981
|
return {
|
|
44681
44982
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44690,9 +44991,9 @@ Returns a user object for the user represented by the identifier in the path.`,
|
|
|
44690
44991
|
|
|
44691
44992
|
// src/funcs/usersMagiclink.ts
|
|
44692
44993
|
function usersMagiclink(client, request, options) {
|
|
44693
|
-
return new APIPromise($
|
|
44994
|
+
return new APIPromise($do13(client, request, options));
|
|
44694
44995
|
}
|
|
44695
|
-
async function $
|
|
44996
|
+
async function $do13(client, request, options) {
|
|
44696
44997
|
const parsed = safeParse(request, (value) => MagiclinkRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44697
44998
|
if (!parsed.ok) {
|
|
44698
44999
|
return [parsed, { status: "invalid" }];
|
|
@@ -44762,12 +45063,12 @@ var init_usersMagiclink = __esm(() => {
|
|
|
44762
45063
|
});
|
|
44763
45064
|
|
|
44764
45065
|
// src/mcp-server/tools/usersMagiclink.ts
|
|
44765
|
-
var
|
|
45066
|
+
var args12, tool$usersMagiclink;
|
|
44766
45067
|
var init_usersMagiclink2 = __esm(() => {
|
|
44767
45068
|
init_usersMagiclink();
|
|
44768
45069
|
init_operations();
|
|
44769
45070
|
init_tools();
|
|
44770
|
-
|
|
45071
|
+
args12 = {
|
|
44771
45072
|
request: MagiclinkRequestBody$inboundSchema
|
|
44772
45073
|
};
|
|
44773
45074
|
tool$usersMagiclink = {
|
|
@@ -44775,9 +45076,9 @@ var init_usersMagiclink2 = __esm(() => {
|
|
|
44775
45076
|
description: `Magic link
|
|
44776
45077
|
|
|
44777
45078
|
It sends an email with a magic link to allow the user to log in.`,
|
|
44778
|
-
args:
|
|
44779
|
-
tool: async (client,
|
|
44780
|
-
const [result, apiCall] = await usersMagiclink(client,
|
|
45079
|
+
args: args12,
|
|
45080
|
+
tool: async (client, args13, ctx) => {
|
|
45081
|
+
const [result, apiCall] = await usersMagiclink(client, args13.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44781
45082
|
if (!result.ok) {
|
|
44782
45083
|
return {
|
|
44783
45084
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44792,9 +45093,9 @@ It sends an email with a magic link to allow the user to log in.`,
|
|
|
44792
45093
|
|
|
44793
45094
|
// src/funcs/usersPassword.ts
|
|
44794
45095
|
function usersPassword(client, request, options) {
|
|
44795
|
-
return new APIPromise($
|
|
45096
|
+
return new APIPromise($do14(client, request, options));
|
|
44796
45097
|
}
|
|
44797
|
-
async function $
|
|
45098
|
+
async function $do14(client, request, options) {
|
|
44798
45099
|
const parsed = safeParse(request, (value) => PasswordRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44799
45100
|
if (!parsed.ok) {
|
|
44800
45101
|
return [parsed, { status: "invalid" }];
|
|
@@ -44864,12 +45165,12 @@ var init_usersPassword = __esm(() => {
|
|
|
44864
45165
|
});
|
|
44865
45166
|
|
|
44866
45167
|
// src/mcp-server/tools/usersPassword.ts
|
|
44867
|
-
var
|
|
45168
|
+
var args13, tool$usersPassword;
|
|
44868
45169
|
var init_usersPassword2 = __esm(() => {
|
|
44869
45170
|
init_usersPassword();
|
|
44870
45171
|
init_operations();
|
|
44871
45172
|
init_tools();
|
|
44872
|
-
|
|
45173
|
+
args13 = {
|
|
44873
45174
|
request: PasswordRequestBody$inboundSchema
|
|
44874
45175
|
};
|
|
44875
45176
|
tool$usersPassword = {
|
|
@@ -44878,9 +45179,9 @@ var init_usersPassword2 = __esm(() => {
|
|
|
44878
45179
|
|
|
44879
45180
|
Resets the a user's password using a password_reset_id that was sent to them via email.
|
|
44880
45181
|
See /users/passwordresetrequest to initiate a password reset flow.`,
|
|
44881
|
-
args:
|
|
44882
|
-
tool: async (client,
|
|
44883
|
-
const [result, apiCall] = await usersPassword(client,
|
|
45182
|
+
args: args13,
|
|
45183
|
+
tool: async (client, args14, ctx) => {
|
|
45184
|
+
const [result, apiCall] = await usersPassword(client, args14.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44884
45185
|
if (!result.ok) {
|
|
44885
45186
|
return {
|
|
44886
45187
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44895,9 +45196,9 @@ See /users/passwordresetrequest to initiate a password reset flow.`,
|
|
|
44895
45196
|
|
|
44896
45197
|
// src/funcs/usersPasswordResetRequest.ts
|
|
44897
45198
|
function usersPasswordResetRequest(client, request, options) {
|
|
44898
|
-
return new APIPromise($
|
|
45199
|
+
return new APIPromise($do15(client, request, options));
|
|
44899
45200
|
}
|
|
44900
|
-
async function $
|
|
45201
|
+
async function $do15(client, request, options) {
|
|
44901
45202
|
const parsed = safeParse(request, (value) => PasswordResetRequestRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44902
45203
|
if (!parsed.ok) {
|
|
44903
45204
|
return [parsed, { status: "invalid" }];
|
|
@@ -44967,12 +45268,12 @@ var init_usersPasswordResetRequest = __esm(() => {
|
|
|
44967
45268
|
});
|
|
44968
45269
|
|
|
44969
45270
|
// src/mcp-server/tools/usersPasswordResetRequest.ts
|
|
44970
|
-
var
|
|
45271
|
+
var args14, tool$usersPasswordResetRequest;
|
|
44971
45272
|
var init_usersPasswordResetRequest2 = __esm(() => {
|
|
44972
45273
|
init_usersPasswordResetRequest();
|
|
44973
45274
|
init_operations();
|
|
44974
45275
|
init_tools();
|
|
44975
|
-
|
|
45276
|
+
args14 = {
|
|
44976
45277
|
request: PasswordResetRequestRequestBody$inboundSchema
|
|
44977
45278
|
};
|
|
44978
45279
|
tool$usersPasswordResetRequest = {
|
|
@@ -44980,9 +45281,9 @@ var init_usersPasswordResetRequest2 = __esm(() => {
|
|
|
44980
45281
|
description: `Password reset request
|
|
44981
45282
|
|
|
44982
45283
|
It sends an email with a link for resetting a user's password.`,
|
|
44983
|
-
args:
|
|
44984
|
-
tool: async (client,
|
|
44985
|
-
const [result, apiCall] = await usersPasswordResetRequest(client,
|
|
45284
|
+
args: args14,
|
|
45285
|
+
tool: async (client, args15, ctx) => {
|
|
45286
|
+
const [result, apiCall] = await usersPasswordResetRequest(client, args15.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44986
45287
|
if (!result.ok) {
|
|
44987
45288
|
return {
|
|
44988
45289
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44997,9 +45298,9 @@ It sends an email with a link for resetting a user's password.`,
|
|
|
44997
45298
|
|
|
44998
45299
|
// src/funcs/usersPostAuthenticate.ts
|
|
44999
45300
|
function usersPostAuthenticate(client, request, options) {
|
|
45000
|
-
return new APIPromise($
|
|
45301
|
+
return new APIPromise($do16(client, request, options));
|
|
45001
45302
|
}
|
|
45002
|
-
async function $
|
|
45303
|
+
async function $do16(client, request, options) {
|
|
45003
45304
|
const parsed = safeParse(request, (value) => PostAuthenticateRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
45004
45305
|
if (!parsed.ok) {
|
|
45005
45306
|
return [parsed, { status: "invalid" }];
|
|
@@ -45065,12 +45366,12 @@ var init_usersPostAuthenticate = __esm(() => {
|
|
|
45065
45366
|
});
|
|
45066
45367
|
|
|
45067
45368
|
// src/mcp-server/tools/usersPostAuthenticate.ts
|
|
45068
|
-
var
|
|
45369
|
+
var args15, tool$usersPostAuthenticate;
|
|
45069
45370
|
var init_usersPostAuthenticate2 = __esm(() => {
|
|
45070
45371
|
init_usersPostAuthenticate();
|
|
45071
45372
|
init_operations();
|
|
45072
45373
|
init_tools();
|
|
45073
|
-
|
|
45374
|
+
args15 = {
|
|
45074
45375
|
request: PostAuthenticateRequestBody$inboundSchema
|
|
45075
45376
|
};
|
|
45076
45377
|
tool$usersPostAuthenticate = {
|
|
@@ -45108,9 +45409,9 @@ Requires: \`saml_login\`
|
|
|
45108
45409
|
3. Site redirects to your selected \`return_url\`
|
|
45109
45410
|
4. The \`user_token\` will be appended as a query string parameter to your \`return_url\` - you must parse this token and store it
|
|
45110
45411
|
5. Fetch the user object from \`/users/me\` using the token`,
|
|
45111
|
-
args:
|
|
45112
|
-
tool: async (client,
|
|
45113
|
-
const [result, apiCall] = await usersPostAuthenticate(client,
|
|
45412
|
+
args: args15,
|
|
45413
|
+
tool: async (client, args16, ctx) => {
|
|
45414
|
+
const [result, apiCall] = await usersPostAuthenticate(client, args16.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45114
45415
|
if (!result.ok) {
|
|
45115
45416
|
return {
|
|
45116
45417
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45125,9 +45426,9 @@ Requires: \`saml_login\`
|
|
|
45125
45426
|
|
|
45126
45427
|
// src/funcs/vendorsAddVendorCredentialFile.ts
|
|
45127
45428
|
function vendorsAddVendorCredentialFile(client, request, options) {
|
|
45128
|
-
return new APIPromise($
|
|
45429
|
+
return new APIPromise($do17(client, request, options));
|
|
45129
45430
|
}
|
|
45130
|
-
async function $
|
|
45431
|
+
async function $do17(client, request, options) {
|
|
45131
45432
|
const parsed = safeParse(request, (value) => AddVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45132
45433
|
if (!parsed.ok) {
|
|
45133
45434
|
return [parsed, { status: "invalid" }];
|
|
@@ -45200,12 +45501,12 @@ var init_vendorsAddVendorCredentialFile = __esm(() => {
|
|
|
45200
45501
|
});
|
|
45201
45502
|
|
|
45202
45503
|
// src/mcp-server/tools/vendorsAddVendorCredentialFile.ts
|
|
45203
|
-
var
|
|
45504
|
+
var args16, tool$vendorsAddVendorCredentialFile;
|
|
45204
45505
|
var init_vendorsAddVendorCredentialFile2 = __esm(() => {
|
|
45205
45506
|
init_vendorsAddVendorCredentialFile();
|
|
45206
45507
|
init_operations();
|
|
45207
45508
|
init_tools();
|
|
45208
|
-
|
|
45509
|
+
args16 = {
|
|
45209
45510
|
request: AddVendorCredentialFileRequest$inboundSchema
|
|
45210
45511
|
};
|
|
45211
45512
|
tool$vendorsAddVendorCredentialFile = {
|
|
@@ -45213,9 +45514,9 @@ var init_vendorsAddVendorCredentialFile2 = __esm(() => {
|
|
|
45213
45514
|
description: `Add vendor credential file
|
|
45214
45515
|
|
|
45215
45516
|
It will add a new vendor credential file`,
|
|
45216
|
-
args:
|
|
45217
|
-
tool: async (client,
|
|
45218
|
-
const [result, apiCall] = await vendorsAddVendorCredentialFile(client,
|
|
45517
|
+
args: args16,
|
|
45518
|
+
tool: async (client, args17, ctx) => {
|
|
45519
|
+
const [result, apiCall] = await vendorsAddVendorCredentialFile(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45219
45520
|
if (!result.ok) {
|
|
45220
45521
|
return {
|
|
45221
45522
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45230,9 +45531,9 @@ It will add a new vendor credential file`,
|
|
|
45230
45531
|
|
|
45231
45532
|
// src/funcs/vendorsAddVendorManagedByCompany.ts
|
|
45232
45533
|
function vendorsAddVendorManagedByCompany(client, request, options) {
|
|
45233
|
-
return new APIPromise($
|
|
45534
|
+
return new APIPromise($do18(client, request, options));
|
|
45234
45535
|
}
|
|
45235
|
-
async function $
|
|
45536
|
+
async function $do18(client, request, options) {
|
|
45236
45537
|
const parsed = safeParse(request, (value) => AddVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45237
45538
|
if (!parsed.ok) {
|
|
45238
45539
|
return [parsed, { status: "invalid" }];
|
|
@@ -45308,12 +45609,12 @@ var init_vendorsAddVendorManagedByCompany = __esm(() => {
|
|
|
45308
45609
|
});
|
|
45309
45610
|
|
|
45310
45611
|
// src/mcp-server/tools/vendorsAddVendorManagedByCompany.ts
|
|
45311
|
-
var
|
|
45612
|
+
var args17, tool$vendorsAddVendorManagedByCompany;
|
|
45312
45613
|
var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
|
|
45313
45614
|
init_vendorsAddVendorManagedByCompany();
|
|
45314
45615
|
init_operations();
|
|
45315
45616
|
init_tools();
|
|
45316
|
-
|
|
45617
|
+
args17 = {
|
|
45317
45618
|
request: AddVendorManagedByCompanyRequest$inboundSchema
|
|
45318
45619
|
};
|
|
45319
45620
|
tool$vendorsAddVendorManagedByCompany = {
|
|
@@ -45321,9 +45622,9 @@ var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
|
|
|
45321
45622
|
description: `Add vendor managed by company
|
|
45322
45623
|
|
|
45323
45624
|
It will add a vendor managed by company`,
|
|
45324
|
-
args:
|
|
45325
|
-
tool: async (client,
|
|
45326
|
-
const [result, apiCall] = await vendorsAddVendorManagedByCompany(client,
|
|
45625
|
+
args: args17,
|
|
45626
|
+
tool: async (client, args18, ctx) => {
|
|
45627
|
+
const [result, apiCall] = await vendorsAddVendorManagedByCompany(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45327
45628
|
if (!result.ok) {
|
|
45328
45629
|
return {
|
|
45329
45630
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45338,9 +45639,9 @@ It will add a vendor managed by company`,
|
|
|
45338
45639
|
|
|
45339
45640
|
// src/funcs/vendorScansVendorScanOut.ts
|
|
45340
45641
|
function vendorScansVendorScanOut(client, request, options) {
|
|
45341
|
-
return new APIPromise($
|
|
45642
|
+
return new APIPromise($do19(client, request, options));
|
|
45342
45643
|
}
|
|
45343
|
-
async function $
|
|
45644
|
+
async function $do19(client, request, options) {
|
|
45344
45645
|
const parsed = safeParse(request, (value) => VendorScanOutRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45345
45646
|
if (!parsed.ok) {
|
|
45346
45647
|
return [parsed, { status: "invalid" }];
|
|
@@ -45415,12 +45716,12 @@ var init_vendorScansVendorScanOut = __esm(() => {
|
|
|
45415
45716
|
});
|
|
45416
45717
|
|
|
45417
45718
|
// src/mcp-server/tools/vendorScansVendorScanOut.ts
|
|
45418
|
-
var
|
|
45719
|
+
var args18, tool$vendorScansVendorScanOut;
|
|
45419
45720
|
var init_vendorScansVendorScanOut2 = __esm(() => {
|
|
45420
45721
|
init_vendorScansVendorScanOut();
|
|
45421
45722
|
init_operations();
|
|
45422
45723
|
init_tools();
|
|
45423
|
-
|
|
45724
|
+
args18 = {
|
|
45424
45725
|
request: VendorScanOutRequest$inboundSchema
|
|
45425
45726
|
};
|
|
45426
45727
|
tool$vendorScansVendorScanOut = {
|
|
@@ -45428,9 +45729,9 @@ var init_vendorScansVendorScanOut2 = __esm(() => {
|
|
|
45428
45729
|
description: `Vendor scan out
|
|
45429
45730
|
|
|
45430
45731
|
It scans out vendor from facility`,
|
|
45431
|
-
args:
|
|
45432
|
-
tool: async (client,
|
|
45433
|
-
const [result, apiCall] = await vendorScansVendorScanOut(client,
|
|
45732
|
+
args: args18,
|
|
45733
|
+
tool: async (client, args19, ctx) => {
|
|
45734
|
+
const [result, apiCall] = await vendorScansVendorScanOut(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45434
45735
|
if (!result.ok) {
|
|
45435
45736
|
return {
|
|
45436
45737
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45445,9 +45746,9 @@ It scans out vendor from facility`,
|
|
|
45445
45746
|
|
|
45446
45747
|
// src/funcs/vendorsCheckDownloadCode.ts
|
|
45447
45748
|
function vendorsCheckDownloadCode(client, request, options) {
|
|
45448
|
-
return new APIPromise($
|
|
45749
|
+
return new APIPromise($do20(client, request, options));
|
|
45449
45750
|
}
|
|
45450
|
-
async function $
|
|
45751
|
+
async function $do20(client, request, options) {
|
|
45451
45752
|
const parsed = safeParse(request, (value) => CheckDownloadCodeRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45452
45753
|
if (!parsed.ok) {
|
|
45453
45754
|
return [parsed, { status: "invalid" }];
|
|
@@ -45523,12 +45824,12 @@ var init_vendorsCheckDownloadCode = __esm(() => {
|
|
|
45523
45824
|
});
|
|
45524
45825
|
|
|
45525
45826
|
// src/mcp-server/tools/vendorsCheckDownloadCode.ts
|
|
45526
|
-
var
|
|
45827
|
+
var args19, tool$vendorsCheckDownloadCode;
|
|
45527
45828
|
var init_vendorsCheckDownloadCode2 = __esm(() => {
|
|
45528
45829
|
init_vendorsCheckDownloadCode();
|
|
45529
45830
|
init_operations();
|
|
45530
45831
|
init_tools();
|
|
45531
|
-
|
|
45832
|
+
args19 = {
|
|
45532
45833
|
request: CheckDownloadCodeRequest$inboundSchema
|
|
45533
45834
|
};
|
|
45534
45835
|
tool$vendorsCheckDownloadCode = {
|
|
@@ -45536,9 +45837,9 @@ var init_vendorsCheckDownloadCode2 = __esm(() => {
|
|
|
45536
45837
|
description: `Check download code for vendor credential
|
|
45537
45838
|
|
|
45538
45839
|
It will check download code for vendor credential`,
|
|
45539
|
-
args:
|
|
45540
|
-
tool: async (client,
|
|
45541
|
-
const [result, apiCall] = await vendorsCheckDownloadCode(client,
|
|
45840
|
+
args: args19,
|
|
45841
|
+
tool: async (client, args20, ctx) => {
|
|
45842
|
+
const [result, apiCall] = await vendorsCheckDownloadCode(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45542
45843
|
if (!result.ok) {
|
|
45543
45844
|
return {
|
|
45544
45845
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45553,9 +45854,9 @@ It will check download code for vendor credential`,
|
|
|
45553
45854
|
|
|
45554
45855
|
// src/funcs/vendorsCreateNewVendorCredentialVersion.ts
|
|
45555
45856
|
function vendorsCreateNewVendorCredentialVersion(client, request, options) {
|
|
45556
|
-
return new APIPromise($
|
|
45857
|
+
return new APIPromise($do21(client, request, options));
|
|
45557
45858
|
}
|
|
45558
|
-
async function $
|
|
45859
|
+
async function $do21(client, request, options) {
|
|
45559
45860
|
const parsed = safeParse(request, (value) => CreateNewVendorCredentialVersionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
45560
45861
|
if (!parsed.ok) {
|
|
45561
45862
|
return [parsed, { status: "invalid" }];
|
|
@@ -45625,12 +45926,12 @@ var init_vendorsCreateNewVendorCredentialVersion = __esm(() => {
|
|
|
45625
45926
|
});
|
|
45626
45927
|
|
|
45627
45928
|
// src/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.ts
|
|
45628
|
-
var
|
|
45929
|
+
var args20, tool$vendorsCreateNewVendorCredentialVersion;
|
|
45629
45930
|
var init_vendorsCreateNewVendorCredentialVersion2 = __esm(() => {
|
|
45630
45931
|
init_vendorsCreateNewVendorCredentialVersion();
|
|
45631
45932
|
init_operations();
|
|
45632
45933
|
init_tools();
|
|
45633
|
-
|
|
45934
|
+
args20 = {
|
|
45634
45935
|
request: CreateNewVendorCredentialVersionRequestBody$inboundSchema
|
|
45635
45936
|
};
|
|
45636
45937
|
tool$vendorsCreateNewVendorCredentialVersion = {
|
|
@@ -45638,9 +45939,9 @@ var init_vendorsCreateNewVendorCredentialVersion2 = __esm(() => {
|
|
|
45638
45939
|
description: `Create new vendor credential version
|
|
45639
45940
|
|
|
45640
45941
|
It will submit vendor credential`,
|
|
45641
|
-
args:
|
|
45642
|
-
tool: async (client,
|
|
45643
|
-
const [result, apiCall] = await vendorsCreateNewVendorCredentialVersion(client,
|
|
45942
|
+
args: args20,
|
|
45943
|
+
tool: async (client, args21, ctx) => {
|
|
45944
|
+
const [result, apiCall] = await vendorsCreateNewVendorCredentialVersion(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45644
45945
|
if (!result.ok) {
|
|
45645
45946
|
return {
|
|
45646
45947
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45655,9 +45956,9 @@ It will submit vendor credential`,
|
|
|
45655
45956
|
|
|
45656
45957
|
// src/funcs/vendorsCreateOrUpdateBcr.ts
|
|
45657
45958
|
function vendorsCreateOrUpdateBcr(client, request, options) {
|
|
45658
|
-
return new APIPromise($
|
|
45959
|
+
return new APIPromise($do22(client, request, options));
|
|
45659
45960
|
}
|
|
45660
|
-
async function $
|
|
45961
|
+
async function $do22(client, request, options) {
|
|
45661
45962
|
const parsed = safeParse(request, (value) => CreateOrUpdateBcrRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45662
45963
|
if (!parsed.ok) {
|
|
45663
45964
|
return [parsed, { status: "invalid" }];
|
|
@@ -45731,12 +46032,12 @@ var init_vendorsCreateOrUpdateBcr = __esm(() => {
|
|
|
45731
46032
|
});
|
|
45732
46033
|
|
|
45733
46034
|
// src/mcp-server/tools/vendorsCreateOrUpdateBcr.ts
|
|
45734
|
-
var
|
|
46035
|
+
var args21, tool$vendorsCreateOrUpdateBcr;
|
|
45735
46036
|
var init_vendorsCreateOrUpdateBcr2 = __esm(() => {
|
|
45736
46037
|
init_vendorsCreateOrUpdateBcr();
|
|
45737
46038
|
init_operations();
|
|
45738
46039
|
init_tools();
|
|
45739
|
-
|
|
46040
|
+
args21 = {
|
|
45740
46041
|
request: CreateOrUpdateBcrRequest$inboundSchema
|
|
45741
46042
|
};
|
|
45742
46043
|
tool$vendorsCreateOrUpdateBcr = {
|
|
@@ -45744,9 +46045,9 @@ var init_vendorsCreateOrUpdateBcr2 = __esm(() => {
|
|
|
45744
46045
|
description: `Create or update BackgroundCheckResults
|
|
45745
46046
|
|
|
45746
46047
|
It will create or update BackgroundCheckResults`,
|
|
45747
|
-
args:
|
|
45748
|
-
tool: async (client,
|
|
45749
|
-
const [result, apiCall] = await vendorsCreateOrUpdateBcr(client,
|
|
46048
|
+
args: args21,
|
|
46049
|
+
tool: async (client, args22, ctx) => {
|
|
46050
|
+
const [result, apiCall] = await vendorsCreateOrUpdateBcr(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45750
46051
|
if (!result.ok) {
|
|
45751
46052
|
return {
|
|
45752
46053
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45761,9 +46062,9 @@ It will create or update BackgroundCheckResults`,
|
|
|
45761
46062
|
|
|
45762
46063
|
// src/funcs/vendorsCreateVendorCompany.ts
|
|
45763
46064
|
function vendorsCreateVendorCompany(client, request, options) {
|
|
45764
|
-
return new APIPromise($
|
|
46065
|
+
return new APIPromise($do23(client, request, options));
|
|
45765
46066
|
}
|
|
45766
|
-
async function $
|
|
46067
|
+
async function $do23(client, request, options) {
|
|
45767
46068
|
const parsed = safeParse(request, (value) => CreateVendorCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45768
46069
|
if (!parsed.ok) {
|
|
45769
46070
|
return [parsed, { status: "invalid" }];
|
|
@@ -45839,12 +46140,12 @@ var init_vendorsCreateVendorCompany = __esm(() => {
|
|
|
45839
46140
|
});
|
|
45840
46141
|
|
|
45841
46142
|
// src/mcp-server/tools/vendorsCreateVendorCompany.ts
|
|
45842
|
-
var
|
|
46143
|
+
var args22, tool$vendorsCreateVendorCompany;
|
|
45843
46144
|
var init_vendorsCreateVendorCompany2 = __esm(() => {
|
|
45844
46145
|
init_vendorsCreateVendorCompany();
|
|
45845
46146
|
init_operations();
|
|
45846
46147
|
init_tools();
|
|
45847
|
-
|
|
46148
|
+
args22 = {
|
|
45848
46149
|
request: CreateVendorCompanyRequest$inboundSchema
|
|
45849
46150
|
};
|
|
45850
46151
|
tool$vendorsCreateVendorCompany = {
|
|
@@ -45852,9 +46153,9 @@ var init_vendorsCreateVendorCompany2 = __esm(() => {
|
|
|
45852
46153
|
description: `Create vendor company
|
|
45853
46154
|
|
|
45854
46155
|
Create vendor company`,
|
|
45855
|
-
args:
|
|
45856
|
-
tool: async (client,
|
|
45857
|
-
const [result, apiCall] = await vendorsCreateVendorCompany(client,
|
|
46156
|
+
args: args22,
|
|
46157
|
+
tool: async (client, args23, ctx) => {
|
|
46158
|
+
const [result, apiCall] = await vendorsCreateVendorCompany(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45858
46159
|
if (!result.ok) {
|
|
45859
46160
|
return {
|
|
45860
46161
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45869,9 +46170,9 @@ Create vendor company`,
|
|
|
45869
46170
|
|
|
45870
46171
|
// src/funcs/vendorsCreateVendorRegistration.ts
|
|
45871
46172
|
function vendorsCreateVendorRegistration(client, request, options) {
|
|
45872
|
-
return new APIPromise($
|
|
46173
|
+
return new APIPromise($do24(client, request, options));
|
|
45873
46174
|
}
|
|
45874
|
-
async function $
|
|
46175
|
+
async function $do24(client, request, options) {
|
|
45875
46176
|
const parsed = safeParse(request, (value) => CreateVendorRegistrationRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
45876
46177
|
if (!parsed.ok) {
|
|
45877
46178
|
return [parsed, { status: "invalid" }];
|
|
@@ -45938,12 +46239,12 @@ var init_vendorsCreateVendorRegistration = __esm(() => {
|
|
|
45938
46239
|
});
|
|
45939
46240
|
|
|
45940
46241
|
// src/mcp-server/tools/vendorsCreateVendorRegistration.ts
|
|
45941
|
-
var
|
|
46242
|
+
var args23, tool$vendorsCreateVendorRegistration;
|
|
45942
46243
|
var init_vendorsCreateVendorRegistration2 = __esm(() => {
|
|
45943
46244
|
init_vendorsCreateVendorRegistration();
|
|
45944
46245
|
init_operations();
|
|
45945
46246
|
init_tools();
|
|
45946
|
-
|
|
46247
|
+
args23 = {
|
|
45947
46248
|
request: CreateVendorRegistrationRequestBody$inboundSchema
|
|
45948
46249
|
};
|
|
45949
46250
|
tool$vendorsCreateVendorRegistration = {
|
|
@@ -45951,9 +46252,9 @@ var init_vendorsCreateVendorRegistration2 = __esm(() => {
|
|
|
45951
46252
|
description: `Create vendor registration
|
|
45952
46253
|
|
|
45953
46254
|
Create an initial vendor registration. Once successful, the vendor will be able to continue to filling out the rest of their onboarding profile.`,
|
|
45954
|
-
args:
|
|
45955
|
-
tool: async (client,
|
|
45956
|
-
const [result, apiCall] = await vendorsCreateVendorRegistration(client,
|
|
46255
|
+
args: args23,
|
|
46256
|
+
tool: async (client, args24, ctx) => {
|
|
46257
|
+
const [result, apiCall] = await vendorsCreateVendorRegistration(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45957
46258
|
if (!result.ok) {
|
|
45958
46259
|
return {
|
|
45959
46260
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45968,9 +46269,9 @@ Create an initial vendor registration. Once successful, the vendor will be able
|
|
|
45968
46269
|
|
|
45969
46270
|
// src/funcs/vendorsDeclineVendorCredential.ts
|
|
45970
46271
|
function vendorsDeclineVendorCredential(client, request, options) {
|
|
45971
|
-
return new APIPromise($
|
|
46272
|
+
return new APIPromise($do25(client, request, options));
|
|
45972
46273
|
}
|
|
45973
|
-
async function $
|
|
46274
|
+
async function $do25(client, request, options) {
|
|
45974
46275
|
const parsed = safeParse(request, (value) => DeclineVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45975
46276
|
if (!parsed.ok) {
|
|
45976
46277
|
return [parsed, { status: "invalid" }];
|
|
@@ -46043,12 +46344,12 @@ var init_vendorsDeclineVendorCredential = __esm(() => {
|
|
|
46043
46344
|
});
|
|
46044
46345
|
|
|
46045
46346
|
// src/mcp-server/tools/vendorsDeclineVendorCredential.ts
|
|
46046
|
-
var
|
|
46347
|
+
var args24, tool$vendorsDeclineVendorCredential;
|
|
46047
46348
|
var init_vendorsDeclineVendorCredential2 = __esm(() => {
|
|
46048
46349
|
init_vendorsDeclineVendorCredential();
|
|
46049
46350
|
init_operations();
|
|
46050
46351
|
init_tools();
|
|
46051
|
-
|
|
46352
|
+
args24 = {
|
|
46052
46353
|
request: DeclineVendorCredentialRequest$inboundSchema
|
|
46053
46354
|
};
|
|
46054
46355
|
tool$vendorsDeclineVendorCredential = {
|
|
@@ -46056,9 +46357,9 @@ var init_vendorsDeclineVendorCredential2 = __esm(() => {
|
|
|
46056
46357
|
description: `Decline vendor credential
|
|
46057
46358
|
|
|
46058
46359
|
It will decline vendor credential`,
|
|
46059
|
-
args:
|
|
46060
|
-
tool: async (client,
|
|
46061
|
-
const [result, apiCall] = await vendorsDeclineVendorCredential(client,
|
|
46360
|
+
args: args24,
|
|
46361
|
+
tool: async (client, args25, ctx) => {
|
|
46362
|
+
const [result, apiCall] = await vendorsDeclineVendorCredential(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46062
46363
|
if (!result.ok) {
|
|
46063
46364
|
return {
|
|
46064
46365
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46073,9 +46374,9 @@ It will decline vendor credential`,
|
|
|
46073
46374
|
|
|
46074
46375
|
// src/funcs/vendorsDeleteVendorCredentialFile.ts
|
|
46075
46376
|
function vendorsDeleteVendorCredentialFile(client, request, options) {
|
|
46076
|
-
return new APIPromise($
|
|
46377
|
+
return new APIPromise($do26(client, request, options));
|
|
46077
46378
|
}
|
|
46078
|
-
async function $
|
|
46379
|
+
async function $do26(client, request, options) {
|
|
46079
46380
|
const parsed = safeParse(request, (value) => DeleteVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46080
46381
|
if (!parsed.ok) {
|
|
46081
46382
|
return [parsed, { status: "invalid" }];
|
|
@@ -46152,12 +46453,12 @@ var init_vendorsDeleteVendorCredentialFile = __esm(() => {
|
|
|
46152
46453
|
});
|
|
46153
46454
|
|
|
46154
46455
|
// src/mcp-server/tools/vendorsDeleteVendorCredentialFile.ts
|
|
46155
|
-
var
|
|
46456
|
+
var args25, tool$vendorsDeleteVendorCredentialFile;
|
|
46156
46457
|
var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
|
|
46157
46458
|
init_vendorsDeleteVendorCredentialFile();
|
|
46158
46459
|
init_operations();
|
|
46159
46460
|
init_tools();
|
|
46160
|
-
|
|
46461
|
+
args25 = {
|
|
46161
46462
|
request: DeleteVendorCredentialFileRequest$inboundSchema
|
|
46162
46463
|
};
|
|
46163
46464
|
tool$vendorsDeleteVendorCredentialFile = {
|
|
@@ -46165,9 +46466,9 @@ var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
|
|
|
46165
46466
|
description: `Delete vendor credential file
|
|
46166
46467
|
|
|
46167
46468
|
It will delete the vendor credential file`,
|
|
46168
|
-
args:
|
|
46169
|
-
tool: async (client,
|
|
46170
|
-
const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client,
|
|
46469
|
+
args: args25,
|
|
46470
|
+
tool: async (client, args26, ctx) => {
|
|
46471
|
+
const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46171
46472
|
if (!result.ok) {
|
|
46172
46473
|
return {
|
|
46173
46474
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46182,9 +46483,9 @@ It will delete the vendor credential file`,
|
|
|
46182
46483
|
|
|
46183
46484
|
// src/funcs/vendorsDeleteVendorManagedByCompany.ts
|
|
46184
46485
|
function vendorsDeleteVendorManagedByCompany(client, request, options) {
|
|
46185
|
-
return new APIPromise($
|
|
46486
|
+
return new APIPromise($do27(client, request, options));
|
|
46186
46487
|
}
|
|
46187
|
-
async function $
|
|
46488
|
+
async function $do27(client, request, options) {
|
|
46188
46489
|
const parsed = safeParse(request, (value) => DeleteVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46189
46490
|
if (!parsed.ok) {
|
|
46190
46491
|
return [parsed, { status: "invalid" }];
|
|
@@ -46260,12 +46561,12 @@ var init_vendorsDeleteVendorManagedByCompany = __esm(() => {
|
|
|
46260
46561
|
});
|
|
46261
46562
|
|
|
46262
46563
|
// src/mcp-server/tools/vendorsDeleteVendorManagedByCompany.ts
|
|
46263
|
-
var
|
|
46564
|
+
var args26, tool$vendorsDeleteVendorManagedByCompany;
|
|
46264
46565
|
var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
|
|
46265
46566
|
init_vendorsDeleteVendorManagedByCompany();
|
|
46266
46567
|
init_operations();
|
|
46267
46568
|
init_tools();
|
|
46268
|
-
|
|
46569
|
+
args26 = {
|
|
46269
46570
|
request: DeleteVendorManagedByCompanyRequest$inboundSchema
|
|
46270
46571
|
};
|
|
46271
46572
|
tool$vendorsDeleteVendorManagedByCompany = {
|
|
@@ -46273,9 +46574,9 @@ var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
|
|
|
46273
46574
|
description: `Delete vendor managed by company
|
|
46274
46575
|
|
|
46275
46576
|
It will delete the vendor managed by company`,
|
|
46276
|
-
args:
|
|
46277
|
-
tool: async (client,
|
|
46278
|
-
const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client,
|
|
46577
|
+
args: args26,
|
|
46578
|
+
tool: async (client, args27, ctx) => {
|
|
46579
|
+
const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46279
46580
|
if (!result.ok) {
|
|
46280
46581
|
return {
|
|
46281
46582
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46290,9 +46591,9 @@ It will delete the vendor managed by company`,
|
|
|
46290
46591
|
|
|
46291
46592
|
// src/funcs/vendorsExpediteTimeRemaining.ts
|
|
46292
46593
|
function vendorsExpediteTimeRemaining(client, request, options) {
|
|
46293
|
-
return new APIPromise($
|
|
46594
|
+
return new APIPromise($do28(client, request, options));
|
|
46294
46595
|
}
|
|
46295
|
-
async function $
|
|
46596
|
+
async function $do28(client, request, options) {
|
|
46296
46597
|
const parsed = safeParse(request, (value) => ExpediteTimeRemainingRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46297
46598
|
if (!parsed.ok) {
|
|
46298
46599
|
return [parsed, { status: "invalid" }];
|
|
@@ -46367,12 +46668,12 @@ var init_vendorsExpediteTimeRemaining = __esm(() => {
|
|
|
46367
46668
|
});
|
|
46368
46669
|
|
|
46369
46670
|
// src/mcp-server/tools/vendorsExpediteTimeRemaining.ts
|
|
46370
|
-
var
|
|
46671
|
+
var args27, tool$vendorsExpediteTimeRemaining;
|
|
46371
46672
|
var init_vendorsExpediteTimeRemaining2 = __esm(() => {
|
|
46372
46673
|
init_vendorsExpediteTimeRemaining();
|
|
46373
46674
|
init_operations();
|
|
46374
46675
|
init_tools();
|
|
46375
|
-
|
|
46676
|
+
args27 = {
|
|
46376
46677
|
request: ExpediteTimeRemainingRequest$inboundSchema
|
|
46377
46678
|
};
|
|
46378
46679
|
tool$vendorsExpediteTimeRemaining = {
|
|
@@ -46380,9 +46681,9 @@ var init_vendorsExpediteTimeRemaining2 = __esm(() => {
|
|
|
46380
46681
|
description: `Expedite time remaining
|
|
46381
46682
|
|
|
46382
46683
|
For vendors who have a paid 24-hour expedite credentials invoice, get the remaining time (in seconds) for which submitted credentials will be expedited.`,
|
|
46383
|
-
args:
|
|
46384
|
-
tool: async (client,
|
|
46385
|
-
const [result, apiCall] = await vendorsExpediteTimeRemaining(client,
|
|
46684
|
+
args: args27,
|
|
46685
|
+
tool: async (client, args28, ctx) => {
|
|
46686
|
+
const [result, apiCall] = await vendorsExpediteTimeRemaining(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46386
46687
|
if (!result.ok) {
|
|
46387
46688
|
return {
|
|
46388
46689
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46397,9 +46698,9 @@ For vendors who have a paid 24-hour expedite credentials invoice, get the remain
|
|
|
46397
46698
|
|
|
46398
46699
|
// src/funcs/vendorsGetVendorCredentialDetails.ts
|
|
46399
46700
|
function vendorsGetVendorCredentialDetails(client, request, options) {
|
|
46400
|
-
return new APIPromise($
|
|
46701
|
+
return new APIPromise($do29(client, request, options));
|
|
46401
46702
|
}
|
|
46402
|
-
async function $
|
|
46703
|
+
async function $do29(client, request, options) {
|
|
46403
46704
|
const parsed = safeParse(request, (value) => GetVendorCredentialDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46404
46705
|
if (!parsed.ok) {
|
|
46405
46706
|
return [parsed, { status: "invalid" }];
|
|
@@ -46482,12 +46783,12 @@ var init_vendorsGetVendorCredentialDetails = __esm(() => {
|
|
|
46482
46783
|
});
|
|
46483
46784
|
|
|
46484
46785
|
// src/mcp-server/tools/vendorsGetVendorCredentialDetails.ts
|
|
46485
|
-
var
|
|
46786
|
+
var args28, tool$vendorsGetVendorCredentialDetails;
|
|
46486
46787
|
var init_vendorsGetVendorCredentialDetails2 = __esm(() => {
|
|
46487
46788
|
init_vendorsGetVendorCredentialDetails();
|
|
46488
46789
|
init_operations();
|
|
46489
46790
|
init_tools();
|
|
46490
|
-
|
|
46791
|
+
args28 = {
|
|
46491
46792
|
request: GetVendorCredentialDetailsRequest$inboundSchema
|
|
46492
46793
|
};
|
|
46493
46794
|
tool$vendorsGetVendorCredentialDetails = {
|
|
@@ -46511,10 +46812,11 @@ Available \`expand\` scopes are:
|
|
|
46511
46812
|
- vendor_credential.vendor_credential_default_status
|
|
46512
46813
|
- vendor_credential.vendor_credential_data_requests
|
|
46513
46814
|
- vendor_credential.credential_variants
|
|
46514
|
-
- vendor_credential.targets_chop
|
|
46515
|
-
|
|
46516
|
-
|
|
46517
|
-
|
|
46815
|
+
- vendor_credential.targets_chop
|
|
46816
|
+
- vendor_credential.total_pending_credentials`,
|
|
46817
|
+
args: args28,
|
|
46818
|
+
tool: async (client, args29, ctx) => {
|
|
46819
|
+
const [result, apiCall] = await vendorsGetVendorCredentialDetails(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46518
46820
|
if (!result.ok) {
|
|
46519
46821
|
return {
|
|
46520
46822
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46529,9 +46831,9 @@ Available \`expand\` scopes are:
|
|
|
46529
46831
|
|
|
46530
46832
|
// src/funcs/vendorsGetVendorCredentialFile.ts
|
|
46531
46833
|
function vendorsGetVendorCredentialFile(client, request, options) {
|
|
46532
|
-
return new APIPromise($
|
|
46834
|
+
return new APIPromise($do30(client, request, options));
|
|
46533
46835
|
}
|
|
46534
|
-
async function $
|
|
46836
|
+
async function $do30(client, request, options) {
|
|
46535
46837
|
const parsed = safeParse(request, (value) => GetVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46536
46838
|
if (!parsed.ok) {
|
|
46537
46839
|
return [parsed, { status: "invalid" }];
|
|
@@ -46612,12 +46914,12 @@ var init_vendorsGetVendorCredentialFile = __esm(() => {
|
|
|
46612
46914
|
});
|
|
46613
46915
|
|
|
46614
46916
|
// src/mcp-server/tools/vendorsGetVendorCredentialFile.ts
|
|
46615
|
-
var
|
|
46917
|
+
var args29, tool$vendorsGetVendorCredentialFile;
|
|
46616
46918
|
var init_vendorsGetVendorCredentialFile2 = __esm(() => {
|
|
46617
46919
|
init_vendorsGetVendorCredentialFile();
|
|
46618
46920
|
init_operations();
|
|
46619
46921
|
init_tools();
|
|
46620
|
-
|
|
46922
|
+
args29 = {
|
|
46621
46923
|
request: GetVendorCredentialFileRequest$inboundSchema
|
|
46622
46924
|
};
|
|
46623
46925
|
tool$vendorsGetVendorCredentialFile = {
|
|
@@ -46630,9 +46932,9 @@ Available \`expand\` scopes are:
|
|
|
46630
46932
|
|
|
46631
46933
|
- vendor_credential_file.vendor_credential
|
|
46632
46934
|
- vendor_credential_file.credential_document`,
|
|
46633
|
-
args:
|
|
46634
|
-
tool: async (client,
|
|
46635
|
-
const [result, apiCall] = await vendorsGetVendorCredentialFile(client,
|
|
46935
|
+
args: args29,
|
|
46936
|
+
tool: async (client, args30, ctx) => {
|
|
46937
|
+
const [result, apiCall] = await vendorsGetVendorCredentialFile(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46636
46938
|
if (!result.ok) {
|
|
46637
46939
|
return {
|
|
46638
46940
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46647,9 +46949,9 @@ Available \`expand\` scopes are:
|
|
|
46647
46949
|
|
|
46648
46950
|
// src/funcs/vendorsGetVendorInvoiceDetails.ts
|
|
46649
46951
|
function vendorsGetVendorInvoiceDetails(client, request, options) {
|
|
46650
|
-
return new APIPromise($
|
|
46952
|
+
return new APIPromise($do31(client, request, options));
|
|
46651
46953
|
}
|
|
46652
|
-
async function $
|
|
46954
|
+
async function $do31(client, request, options) {
|
|
46653
46955
|
const parsed = safeParse(request, (value) => GetVendorInvoiceDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46654
46956
|
if (!parsed.ok) {
|
|
46655
46957
|
return [parsed, { status: "invalid" }];
|
|
@@ -46729,12 +47031,12 @@ var init_vendorsGetVendorInvoiceDetails = __esm(() => {
|
|
|
46729
47031
|
});
|
|
46730
47032
|
|
|
46731
47033
|
// src/mcp-server/tools/vendorsGetVendorInvoiceDetails.ts
|
|
46732
|
-
var
|
|
47034
|
+
var args30, tool$vendorsGetVendorInvoiceDetails;
|
|
46733
47035
|
var init_vendorsGetVendorInvoiceDetails2 = __esm(() => {
|
|
46734
47036
|
init_vendorsGetVendorInvoiceDetails();
|
|
46735
47037
|
init_operations();
|
|
46736
47038
|
init_tools();
|
|
46737
|
-
|
|
47039
|
+
args30 = {
|
|
46738
47040
|
request: GetVendorInvoiceDetailsRequest$inboundSchema
|
|
46739
47041
|
};
|
|
46740
47042
|
tool$vendorsGetVendorInvoiceDetails = {
|
|
@@ -46747,9 +47049,9 @@ Available \`expand\` scopes are:
|
|
|
46747
47049
|
|
|
46748
47050
|
invoice.line_items
|
|
46749
47051
|
invoice.invoice_transactions`,
|
|
46750
|
-
args:
|
|
46751
|
-
tool: async (client,
|
|
46752
|
-
const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client,
|
|
47052
|
+
args: args30,
|
|
47053
|
+
tool: async (client, args31, ctx) => {
|
|
47054
|
+
const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46753
47055
|
if (!result.ok) {
|
|
46754
47056
|
return {
|
|
46755
47057
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46764,9 +47066,9 @@ invoice.invoice_transactions`,
|
|
|
46764
47066
|
|
|
46765
47067
|
// src/funcs/vendorsGetVendorLegalName.ts
|
|
46766
47068
|
function vendorsGetVendorLegalName(client, request, options) {
|
|
46767
|
-
return new APIPromise($
|
|
47069
|
+
return new APIPromise($do32(client, request, options));
|
|
46768
47070
|
}
|
|
46769
|
-
async function $
|
|
47071
|
+
async function $do32(client, request, options) {
|
|
46770
47072
|
const parsed = safeParse(request, (value) => GetVendorLegalNameRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46771
47073
|
if (!parsed.ok) {
|
|
46772
47074
|
return [parsed, { status: "invalid" }];
|
|
@@ -46841,12 +47143,12 @@ var init_vendorsGetVendorLegalName = __esm(() => {
|
|
|
46841
47143
|
});
|
|
46842
47144
|
|
|
46843
47145
|
// src/mcp-server/tools/vendorsGetVendorLegalName.ts
|
|
46844
|
-
var
|
|
47146
|
+
var args31, tool$vendorsGetVendorLegalName;
|
|
46845
47147
|
var init_vendorsGetVendorLegalName2 = __esm(() => {
|
|
46846
47148
|
init_vendorsGetVendorLegalName();
|
|
46847
47149
|
init_operations();
|
|
46848
47150
|
init_tools();
|
|
46849
|
-
|
|
47151
|
+
args31 = {
|
|
46850
47152
|
request: GetVendorLegalNameRequest$inboundSchema
|
|
46851
47153
|
};
|
|
46852
47154
|
tool$vendorsGetVendorLegalName = {
|
|
@@ -46854,9 +47156,9 @@ var init_vendorsGetVendorLegalName2 = __esm(() => {
|
|
|
46854
47156
|
description: `Get Vendor legal name
|
|
46855
47157
|
|
|
46856
47158
|
Get vendor legal name`,
|
|
46857
|
-
args:
|
|
46858
|
-
tool: async (client,
|
|
46859
|
-
const [result, apiCall] = await vendorsGetVendorLegalName(client,
|
|
47159
|
+
args: args31,
|
|
47160
|
+
tool: async (client, args32, ctx) => {
|
|
47161
|
+
const [result, apiCall] = await vendorsGetVendorLegalName(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46860
47162
|
if (!result.ok) {
|
|
46861
47163
|
return {
|
|
46862
47164
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46871,9 +47173,9 @@ Get vendor legal name`,
|
|
|
46871
47173
|
|
|
46872
47174
|
// src/funcs/vendorsGetVendorsDetails.ts
|
|
46873
47175
|
function vendorsGetVendorsDetails(client, request, options) {
|
|
46874
|
-
return new APIPromise($
|
|
47176
|
+
return new APIPromise($do33(client, request, options));
|
|
46875
47177
|
}
|
|
46876
|
-
async function $
|
|
47178
|
+
async function $do33(client, request, options) {
|
|
46877
47179
|
const parsed = safeParse(request, (value) => GetVendorsDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46878
47180
|
if (!parsed.ok) {
|
|
46879
47181
|
return [parsed, { status: "invalid" }];
|
|
@@ -46953,12 +47255,12 @@ var init_vendorsGetVendorsDetails = __esm(() => {
|
|
|
46953
47255
|
});
|
|
46954
47256
|
|
|
46955
47257
|
// src/mcp-server/tools/vendorsGetVendorsDetails.ts
|
|
46956
|
-
var
|
|
47258
|
+
var args32, tool$vendorsGetVendorsDetails;
|
|
46957
47259
|
var init_vendorsGetVendorsDetails2 = __esm(() => {
|
|
46958
47260
|
init_vendorsGetVendorsDetails();
|
|
46959
47261
|
init_operations();
|
|
46960
47262
|
init_tools();
|
|
46961
|
-
|
|
47263
|
+
args32 = {
|
|
46962
47264
|
request: GetVendorsDetailsRequest$inboundSchema
|
|
46963
47265
|
};
|
|
46964
47266
|
tool$vendorsGetVendorsDetails = {
|
|
@@ -46983,9 +47285,9 @@ vendor.payment_responsibility
|
|
|
46983
47285
|
vendor.background_check_date_expires
|
|
46984
47286
|
vendor.registration_data
|
|
46985
47287
|
vendor.registration_finished`,
|
|
46986
|
-
args:
|
|
46987
|
-
tool: async (client,
|
|
46988
|
-
const [result, apiCall] = await vendorsGetVendorsDetails(client,
|
|
47288
|
+
args: args32,
|
|
47289
|
+
tool: async (client, args33, ctx) => {
|
|
47290
|
+
const [result, apiCall] = await vendorsGetVendorsDetails(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46989
47291
|
if (!result.ok) {
|
|
46990
47292
|
return {
|
|
46991
47293
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47000,9 +47302,9 @@ vendor.registration_finished`,
|
|
|
47000
47302
|
|
|
47001
47303
|
// src/funcs/vendorsListVendorAdditionalFacilityFields.ts
|
|
47002
47304
|
function vendorsListVendorAdditionalFacilityFields(client, request, options) {
|
|
47003
|
-
return new APIPromise($
|
|
47305
|
+
return new APIPromise($do34(client, request, options));
|
|
47004
47306
|
}
|
|
47005
|
-
async function $
|
|
47307
|
+
async function $do34(client, request, options) {
|
|
47006
47308
|
const parsed = safeParse(request, (value) => ListVendorAdditionalFacilityFieldsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47007
47309
|
if (!parsed.ok) {
|
|
47008
47310
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47114,12 +47416,12 @@ var init_vendorsListVendorAdditionalFacilityFields = __esm(() => {
|
|
|
47114
47416
|
});
|
|
47115
47417
|
|
|
47116
47418
|
// src/mcp-server/tools/vendorsListVendorAdditionalFacilityFields.ts
|
|
47117
|
-
var
|
|
47419
|
+
var args33, tool$vendorsListVendorAdditionalFacilityFields;
|
|
47118
47420
|
var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
|
|
47119
47421
|
init_vendorsListVendorAdditionalFacilityFields();
|
|
47120
47422
|
init_operations();
|
|
47121
47423
|
init_tools();
|
|
47122
|
-
|
|
47424
|
+
args33 = {
|
|
47123
47425
|
request: ListVendorAdditionalFacilityFieldsRequest$inboundSchema
|
|
47124
47426
|
};
|
|
47125
47427
|
tool$vendorsListVendorAdditionalFacilityFields = {
|
|
@@ -47127,9 +47429,9 @@ var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
|
|
|
47127
47429
|
description: `List of vendor's additional facility fields
|
|
47128
47430
|
|
|
47129
47431
|
List of vendor's additional facility fields`,
|
|
47130
|
-
args:
|
|
47131
|
-
tool: async (client,
|
|
47132
|
-
const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client,
|
|
47432
|
+
args: args33,
|
|
47433
|
+
tool: async (client, args34, ctx) => {
|
|
47434
|
+
const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47133
47435
|
if (!result.ok) {
|
|
47134
47436
|
return {
|
|
47135
47437
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47144,9 +47446,9 @@ List of vendor's additional facility fields`,
|
|
|
47144
47446
|
|
|
47145
47447
|
// src/funcs/vendorsListVendorCredentialDataRequests.ts
|
|
47146
47448
|
function vendorsListVendorCredentialDataRequests(client, request, options) {
|
|
47147
|
-
return new APIPromise($
|
|
47449
|
+
return new APIPromise($do35(client, request, options));
|
|
47148
47450
|
}
|
|
47149
|
-
async function $
|
|
47451
|
+
async function $do35(client, request, options) {
|
|
47150
47452
|
const parsed = safeParse(request, (value) => ListVendorCredentialDataRequestsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47151
47453
|
if (!parsed.ok) {
|
|
47152
47454
|
return [parsed, { status: "invalid" }];
|
|
@@ -47229,12 +47531,12 @@ var init_vendorsListVendorCredentialDataRequests = __esm(() => {
|
|
|
47229
47531
|
});
|
|
47230
47532
|
|
|
47231
47533
|
// src/mcp-server/tools/vendorsListVendorCredentialDataRequests.ts
|
|
47232
|
-
var
|
|
47534
|
+
var args34, tool$vendorsListVendorCredentialDataRequests;
|
|
47233
47535
|
var init_vendorsListVendorCredentialDataRequests2 = __esm(() => {
|
|
47234
47536
|
init_vendorsListVendorCredentialDataRequests();
|
|
47235
47537
|
init_operations();
|
|
47236
47538
|
init_tools();
|
|
47237
|
-
|
|
47539
|
+
args34 = {
|
|
47238
47540
|
request: ListVendorCredentialDataRequestsRequest$inboundSchema
|
|
47239
47541
|
};
|
|
47240
47542
|
tool$vendorsListVendorCredentialDataRequests = {
|
|
@@ -47247,9 +47549,9 @@ Available \`expand\` scopes are:
|
|
|
47247
47549
|
|
|
47248
47550
|
- vendor_credential_data_request.vendor_credential
|
|
47249
47551
|
- vendor_credential_data_request.data_request`,
|
|
47250
|
-
args:
|
|
47251
|
-
tool: async (client,
|
|
47252
|
-
const [result, apiCall] = await vendorsListVendorCredentialDataRequests(client,
|
|
47552
|
+
args: args34,
|
|
47553
|
+
tool: async (client, args35, ctx) => {
|
|
47554
|
+
const [result, apiCall] = await vendorsListVendorCredentialDataRequests(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47253
47555
|
if (!result.ok) {
|
|
47254
47556
|
return {
|
|
47255
47557
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47264,9 +47566,9 @@ Available \`expand\` scopes are:
|
|
|
47264
47566
|
|
|
47265
47567
|
// src/funcs/vendorsListVendorCredentialFiles.ts
|
|
47266
47568
|
function vendorsListVendorCredentialFiles(client, request, options) {
|
|
47267
|
-
return new APIPromise($
|
|
47569
|
+
return new APIPromise($do36(client, request, options));
|
|
47268
47570
|
}
|
|
47269
|
-
async function $
|
|
47571
|
+
async function $do36(client, request, options) {
|
|
47270
47572
|
const parsed = safeParse(request, (value) => ListVendorCredentialFilesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47271
47573
|
if (!parsed.ok) {
|
|
47272
47574
|
return [parsed, { status: "invalid" }];
|
|
@@ -47349,12 +47651,12 @@ var init_vendorsListVendorCredentialFiles = __esm(() => {
|
|
|
47349
47651
|
});
|
|
47350
47652
|
|
|
47351
47653
|
// src/mcp-server/tools/vendorsListVendorCredentialFiles.ts
|
|
47352
|
-
var
|
|
47654
|
+
var args35, tool$vendorsListVendorCredentialFiles;
|
|
47353
47655
|
var init_vendorsListVendorCredentialFiles2 = __esm(() => {
|
|
47354
47656
|
init_vendorsListVendorCredentialFiles();
|
|
47355
47657
|
init_operations();
|
|
47356
47658
|
init_tools();
|
|
47357
|
-
|
|
47659
|
+
args35 = {
|
|
47358
47660
|
request: ListVendorCredentialFilesRequest$inboundSchema
|
|
47359
47661
|
};
|
|
47360
47662
|
tool$vendorsListVendorCredentialFiles = {
|
|
@@ -47367,9 +47669,9 @@ Available \`expand\` scopes are:
|
|
|
47367
47669
|
|
|
47368
47670
|
- vendor_credential_file.vendor_credential
|
|
47369
47671
|
- vendor_credential_file.credential_document`,
|
|
47370
|
-
args:
|
|
47371
|
-
tool: async (client,
|
|
47372
|
-
const [result, apiCall] = await vendorsListVendorCredentialFiles(client,
|
|
47672
|
+
args: args35,
|
|
47673
|
+
tool: async (client, args36, ctx) => {
|
|
47674
|
+
const [result, apiCall] = await vendorsListVendorCredentialFiles(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47373
47675
|
if (!result.ok) {
|
|
47374
47676
|
return {
|
|
47375
47677
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47384,9 +47686,9 @@ Available \`expand\` scopes are:
|
|
|
47384
47686
|
|
|
47385
47687
|
// src/funcs/vendorsListVendorCredentialHistory.ts
|
|
47386
47688
|
function vendorsListVendorCredentialHistory(client, request, options) {
|
|
47387
|
-
return new APIPromise($
|
|
47689
|
+
return new APIPromise($do37(client, request, options));
|
|
47388
47690
|
}
|
|
47389
|
-
async function $
|
|
47691
|
+
async function $do37(client, request, options) {
|
|
47390
47692
|
const parsed = safeParse(request, (value) => ListVendorCredentialHistoryRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47391
47693
|
if (!parsed.ok) {
|
|
47392
47694
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47501,12 +47803,12 @@ var init_vendorsListVendorCredentialHistory = __esm(() => {
|
|
|
47501
47803
|
});
|
|
47502
47804
|
|
|
47503
47805
|
// src/mcp-server/tools/vendorsListVendorCredentialHistory.ts
|
|
47504
|
-
var
|
|
47806
|
+
var args36, tool$vendorsListVendorCredentialHistory;
|
|
47505
47807
|
var init_vendorsListVendorCredentialHistory2 = __esm(() => {
|
|
47506
47808
|
init_vendorsListVendorCredentialHistory();
|
|
47507
47809
|
init_operations();
|
|
47508
47810
|
init_tools();
|
|
47509
|
-
|
|
47811
|
+
args36 = {
|
|
47510
47812
|
request: ListVendorCredentialHistoryRequest$inboundSchema
|
|
47511
47813
|
};
|
|
47512
47814
|
tool$vendorsListVendorCredentialHistory = {
|
|
@@ -47514,9 +47816,9 @@ var init_vendorsListVendorCredentialHistory2 = __esm(() => {
|
|
|
47514
47816
|
description: `List Vendor Credential History
|
|
47515
47817
|
|
|
47516
47818
|
Lists vendor credentials history`,
|
|
47517
|
-
args:
|
|
47518
|
-
tool: async (client,
|
|
47519
|
-
const [result, apiCall] = await vendorsListVendorCredentialHistory(client,
|
|
47819
|
+
args: args36,
|
|
47820
|
+
tool: async (client, args37, ctx) => {
|
|
47821
|
+
const [result, apiCall] = await vendorsListVendorCredentialHistory(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47520
47822
|
if (!result.ok) {
|
|
47521
47823
|
return {
|
|
47522
47824
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47531,9 +47833,9 @@ Lists vendor credentials history`,
|
|
|
47531
47833
|
|
|
47532
47834
|
// src/funcs/vendorsListVendorCredentials.ts
|
|
47533
47835
|
function vendorsListVendorCredentials(client, request, options) {
|
|
47534
|
-
return new APIPromise($
|
|
47836
|
+
return new APIPromise($do38(client, request, options));
|
|
47535
47837
|
}
|
|
47536
|
-
async function $
|
|
47838
|
+
async function $do38(client, request, options) {
|
|
47537
47839
|
const parsed = safeParse(request, (value) => ListVendorCredentialsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47538
47840
|
if (!parsed.ok) {
|
|
47539
47841
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47653,12 +47955,12 @@ var init_vendorsListVendorCredentials = __esm(() => {
|
|
|
47653
47955
|
});
|
|
47654
47956
|
|
|
47655
47957
|
// src/mcp-server/tools/vendorsListVendorCredentials.ts
|
|
47656
|
-
var
|
|
47958
|
+
var args37, tool$vendorsListVendorCredentials;
|
|
47657
47959
|
var init_vendorsListVendorCredentials2 = __esm(() => {
|
|
47658
47960
|
init_vendorsListVendorCredentials();
|
|
47659
47961
|
init_operations();
|
|
47660
47962
|
init_tools();
|
|
47661
|
-
|
|
47963
|
+
args37 = {
|
|
47662
47964
|
request: ListVendorCredentialsRequest$inboundSchema
|
|
47663
47965
|
};
|
|
47664
47966
|
tool$vendorsListVendorCredentials = {
|
|
@@ -47666,9 +47968,9 @@ var init_vendorsListVendorCredentials2 = __esm(() => {
|
|
|
47666
47968
|
description: `List Vendor Credentials
|
|
47667
47969
|
|
|
47668
47970
|
Lists vendor credentials, required credentials, and company credentials. Utilized in Vendor Dashboard.`,
|
|
47669
|
-
args:
|
|
47670
|
-
tool: async (client,
|
|
47671
|
-
const [result, apiCall] = await vendorsListVendorCredentials(client,
|
|
47971
|
+
args: args37,
|
|
47972
|
+
tool: async (client, args38, ctx) => {
|
|
47973
|
+
const [result, apiCall] = await vendorsListVendorCredentials(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47672
47974
|
if (!result.ok) {
|
|
47673
47975
|
return {
|
|
47674
47976
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47683,9 +47985,9 @@ Lists vendor credentials, required credentials, and company credentials. Utilize
|
|
|
47683
47985
|
|
|
47684
47986
|
// src/funcs/vendorsListVendorCredits.ts
|
|
47685
47987
|
function vendorsListVendorCredits(client, request, options) {
|
|
47686
|
-
return new APIPromise($
|
|
47988
|
+
return new APIPromise($do39(client, request, options));
|
|
47687
47989
|
}
|
|
47688
|
-
async function $
|
|
47990
|
+
async function $do39(client, request, options) {
|
|
47689
47991
|
const parsed = safeParse(request, (value) => ListVendorCreditsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47690
47992
|
if (!parsed.ok) {
|
|
47691
47993
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47799,12 +48101,12 @@ var init_vendorsListVendorCredits = __esm(() => {
|
|
|
47799
48101
|
});
|
|
47800
48102
|
|
|
47801
48103
|
// src/mcp-server/tools/vendorsListVendorCredits.ts
|
|
47802
|
-
var
|
|
48104
|
+
var args38, tool$vendorsListVendorCredits;
|
|
47803
48105
|
var init_vendorsListVendorCredits2 = __esm(() => {
|
|
47804
48106
|
init_vendorsListVendorCredits();
|
|
47805
48107
|
init_operations();
|
|
47806
48108
|
init_tools();
|
|
47807
|
-
|
|
48109
|
+
args38 = {
|
|
47808
48110
|
request: ListVendorCreditsRequest$inboundSchema
|
|
47809
48111
|
};
|
|
47810
48112
|
tool$vendorsListVendorCredits = {
|
|
@@ -47812,9 +48114,9 @@ var init_vendorsListVendorCredits2 = __esm(() => {
|
|
|
47812
48114
|
description: `List vendor credits
|
|
47813
48115
|
|
|
47814
48116
|
List the credits for the vendor`,
|
|
47815
|
-
args:
|
|
47816
|
-
tool: async (client,
|
|
47817
|
-
const [result, apiCall] = await vendorsListVendorCredits(client,
|
|
48117
|
+
args: args38,
|
|
48118
|
+
tool: async (client, args39, ctx) => {
|
|
48119
|
+
const [result, apiCall] = await vendorsListVendorCredits(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47818
48120
|
if (!result.ok) {
|
|
47819
48121
|
return {
|
|
47820
48122
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47829,9 +48131,9 @@ List the credits for the vendor`,
|
|
|
47829
48131
|
|
|
47830
48132
|
// src/funcs/vendorsListVendorFacilityStatuses.ts
|
|
47831
48133
|
function vendorsListVendorFacilityStatuses(client, request, options) {
|
|
47832
|
-
return new APIPromise($
|
|
48134
|
+
return new APIPromise($do40(client, request, options));
|
|
47833
48135
|
}
|
|
47834
|
-
async function $
|
|
48136
|
+
async function $do40(client, request, options) {
|
|
47835
48137
|
const parsed = safeParse(request, (value) => ListVendorFacilityStatusesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47836
48138
|
if (!parsed.ok) {
|
|
47837
48139
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47941,12 +48243,12 @@ var init_vendorsListVendorFacilityStatuses = __esm(() => {
|
|
|
47941
48243
|
});
|
|
47942
48244
|
|
|
47943
48245
|
// src/mcp-server/tools/vendorsListVendorFacilityStatuses.ts
|
|
47944
|
-
var
|
|
48246
|
+
var args39, tool$vendorsListVendorFacilityStatuses;
|
|
47945
48247
|
var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
|
|
47946
48248
|
init_vendorsListVendorFacilityStatuses();
|
|
47947
48249
|
init_operations();
|
|
47948
48250
|
init_tools();
|
|
47949
|
-
|
|
48251
|
+
args39 = {
|
|
47950
48252
|
request: ListVendorFacilityStatusesRequest$inboundSchema
|
|
47951
48253
|
};
|
|
47952
48254
|
tool$vendorsListVendorFacilityStatuses = {
|
|
@@ -47954,9 +48256,9 @@ var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
|
|
|
47954
48256
|
description: `List vendor facility statuses
|
|
47955
48257
|
|
|
47956
48258
|
List the facilities for the vendor`,
|
|
47957
|
-
args:
|
|
47958
|
-
tool: async (client,
|
|
47959
|
-
const [result, apiCall] = await vendorsListVendorFacilityStatuses(client,
|
|
48259
|
+
args: args39,
|
|
48260
|
+
tool: async (client, args40, ctx) => {
|
|
48261
|
+
const [result, apiCall] = await vendorsListVendorFacilityStatuses(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47960
48262
|
if (!result.ok) {
|
|
47961
48263
|
return {
|
|
47962
48264
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47971,9 +48273,9 @@ List the facilities for the vendor`,
|
|
|
47971
48273
|
|
|
47972
48274
|
// src/funcs/vendorsListVendorInvoices.ts
|
|
47973
48275
|
function vendorsListVendorInvoices(client, request, options) {
|
|
47974
|
-
return new APIPromise($
|
|
48276
|
+
return new APIPromise($do41(client, request, options));
|
|
47975
48277
|
}
|
|
47976
|
-
async function $
|
|
48278
|
+
async function $do41(client, request, options) {
|
|
47977
48279
|
const parsed = safeParse(request, (value) => ListVendorInvoicesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47978
48280
|
if (!parsed.ok) {
|
|
47979
48281
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48091,12 +48393,12 @@ var init_vendorsListVendorInvoices = __esm(() => {
|
|
|
48091
48393
|
});
|
|
48092
48394
|
|
|
48093
48395
|
// src/mcp-server/tools/vendorsListVendorInvoices.ts
|
|
48094
|
-
var
|
|
48396
|
+
var args40, tool$vendorsListVendorInvoices;
|
|
48095
48397
|
var init_vendorsListVendorInvoices2 = __esm(() => {
|
|
48096
48398
|
init_vendorsListVendorInvoices();
|
|
48097
48399
|
init_operations();
|
|
48098
48400
|
init_tools();
|
|
48099
|
-
|
|
48401
|
+
args40 = {
|
|
48100
48402
|
request: ListVendorInvoicesRequest$inboundSchema
|
|
48101
48403
|
};
|
|
48102
48404
|
tool$vendorsListVendorInvoices = {
|
|
@@ -48108,9 +48410,9 @@ List invoices for Vendors
|
|
|
48108
48410
|
Available \`expand\` scopes are:
|
|
48109
48411
|
|
|
48110
48412
|
invoice.line_items`,
|
|
48111
|
-
args:
|
|
48112
|
-
tool: async (client,
|
|
48113
|
-
const [result, apiCall] = await vendorsListVendorInvoices(client,
|
|
48413
|
+
args: args40,
|
|
48414
|
+
tool: async (client, args41, ctx) => {
|
|
48415
|
+
const [result, apiCall] = await vendorsListVendorInvoices(client, args41.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48114
48416
|
if (!result.ok) {
|
|
48115
48417
|
return {
|
|
48116
48418
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48125,9 +48427,9 @@ invoice.line_items`,
|
|
|
48125
48427
|
|
|
48126
48428
|
// src/funcs/vendorsListVendorJobTitles.ts
|
|
48127
48429
|
function vendorsListVendorJobTitles(client, request, options) {
|
|
48128
|
-
return new APIPromise($
|
|
48430
|
+
return new APIPromise($do42(client, request, options));
|
|
48129
48431
|
}
|
|
48130
|
-
async function $
|
|
48432
|
+
async function $do42(client, request, options) {
|
|
48131
48433
|
const parsed = safeParse(request, (value) => ListVendorJobTitlesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48132
48434
|
if (!parsed.ok) {
|
|
48133
48435
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48236,12 +48538,12 @@ var init_vendorsListVendorJobTitles = __esm(() => {
|
|
|
48236
48538
|
});
|
|
48237
48539
|
|
|
48238
48540
|
// src/mcp-server/tools/vendorsListVendorJobTitles.ts
|
|
48239
|
-
var
|
|
48541
|
+
var args41, tool$vendorsListVendorJobTitles;
|
|
48240
48542
|
var init_vendorsListVendorJobTitles2 = __esm(() => {
|
|
48241
48543
|
init_vendorsListVendorJobTitles();
|
|
48242
48544
|
init_operations();
|
|
48243
48545
|
init_tools();
|
|
48244
|
-
|
|
48546
|
+
args41 = {
|
|
48245
48547
|
request: ListVendorJobTitlesRequest$inboundSchema
|
|
48246
48548
|
};
|
|
48247
48549
|
tool$vendorsListVendorJobTitles = {
|
|
@@ -48249,9 +48551,9 @@ var init_vendorsListVendorJobTitles2 = __esm(() => {
|
|
|
48249
48551
|
description: `List vendor job titles
|
|
48250
48552
|
|
|
48251
48553
|
List valid job titles for Vendors. This can be used during sign up or in a filter.`,
|
|
48252
|
-
args:
|
|
48253
|
-
tool: async (client,
|
|
48254
|
-
const [result, apiCall] = await vendorsListVendorJobTitles(client,
|
|
48554
|
+
args: args41,
|
|
48555
|
+
tool: async (client, args42, ctx) => {
|
|
48556
|
+
const [result, apiCall] = await vendorsListVendorJobTitles(client, args42.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48255
48557
|
if (!result.ok) {
|
|
48256
48558
|
return {
|
|
48257
48559
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48266,9 +48568,9 @@ List valid job titles for Vendors. This can be used during sign up or in a filte
|
|
|
48266
48568
|
|
|
48267
48569
|
// src/funcs/vendorsListVendorManagedByCompanies.ts
|
|
48268
48570
|
function vendorsListVendorManagedByCompanies(client, request, options) {
|
|
48269
|
-
return new APIPromise($
|
|
48571
|
+
return new APIPromise($do43(client, request, options));
|
|
48270
48572
|
}
|
|
48271
|
-
async function $
|
|
48573
|
+
async function $do43(client, request, options) {
|
|
48272
48574
|
const parsed = safeParse(request, (value) => ListVendorManagedByCompaniesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48273
48575
|
if (!parsed.ok) {
|
|
48274
48576
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48382,12 +48684,12 @@ var init_vendorsListVendorManagedByCompanies = __esm(() => {
|
|
|
48382
48684
|
});
|
|
48383
48685
|
|
|
48384
48686
|
// src/mcp-server/tools/vendorsListVendorManagedByCompanies.ts
|
|
48385
|
-
var
|
|
48687
|
+
var args42, tool$vendorsListVendorManagedByCompanies;
|
|
48386
48688
|
var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
|
|
48387
48689
|
init_vendorsListVendorManagedByCompanies();
|
|
48388
48690
|
init_operations();
|
|
48389
48691
|
init_tools();
|
|
48390
|
-
|
|
48692
|
+
args42 = {
|
|
48391
48693
|
request: ListVendorManagedByCompaniesRequest$inboundSchema
|
|
48392
48694
|
};
|
|
48393
48695
|
tool$vendorsListVendorManagedByCompanies = {
|
|
@@ -48395,9 +48697,9 @@ var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
|
|
|
48395
48697
|
description: `List of companies managing the vendor
|
|
48396
48698
|
|
|
48397
48699
|
List of companies managing the vendor`,
|
|
48398
|
-
args:
|
|
48399
|
-
tool: async (client,
|
|
48400
|
-
const [result, apiCall] = await vendorsListVendorManagedByCompanies(client,
|
|
48700
|
+
args: args42,
|
|
48701
|
+
tool: async (client, args43, ctx) => {
|
|
48702
|
+
const [result, apiCall] = await vendorsListVendorManagedByCompanies(client, args43.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48401
48703
|
if (!result.ok) {
|
|
48402
48704
|
return {
|
|
48403
48705
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48412,9 +48714,9 @@ List of companies managing the vendor`,
|
|
|
48412
48714
|
|
|
48413
48715
|
// src/funcs/vendorsListVendorScrubDetails.ts
|
|
48414
48716
|
function vendorsListVendorScrubDetails(client, request, options) {
|
|
48415
|
-
return new APIPromise($
|
|
48717
|
+
return new APIPromise($do44(client, request, options));
|
|
48416
48718
|
}
|
|
48417
|
-
async function $
|
|
48719
|
+
async function $do44(client, request, options) {
|
|
48418
48720
|
const parsed = safeParse(request, (value) => ListVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48419
48721
|
if (!parsed.ok) {
|
|
48420
48722
|
return [parsed, { status: "invalid" }];
|
|
@@ -48490,12 +48792,12 @@ var init_vendorsListVendorScrubDetails = __esm(() => {
|
|
|
48490
48792
|
});
|
|
48491
48793
|
|
|
48492
48794
|
// src/mcp-server/tools/vendorsListVendorScrubDetails.ts
|
|
48493
|
-
var
|
|
48795
|
+
var args43, tool$vendorsListVendorScrubDetails;
|
|
48494
48796
|
var init_vendorsListVendorScrubDetails2 = __esm(() => {
|
|
48495
48797
|
init_vendorsListVendorScrubDetails();
|
|
48496
48798
|
init_operations();
|
|
48497
48799
|
init_tools();
|
|
48498
|
-
|
|
48800
|
+
args43 = {
|
|
48499
48801
|
request: ListVendorScrubDetailsRequest$inboundSchema
|
|
48500
48802
|
};
|
|
48501
48803
|
tool$vendorsListVendorScrubDetails = {
|
|
@@ -48503,9 +48805,9 @@ var init_vendorsListVendorScrubDetails2 = __esm(() => {
|
|
|
48503
48805
|
description: `List vendor scrub details
|
|
48504
48806
|
|
|
48505
48807
|
List vendor scrub details`,
|
|
48506
|
-
args:
|
|
48507
|
-
tool: async (client,
|
|
48508
|
-
const [result, apiCall] = await vendorsListVendorScrubDetails(client,
|
|
48808
|
+
args: args43,
|
|
48809
|
+
tool: async (client, args44, ctx) => {
|
|
48810
|
+
const [result, apiCall] = await vendorsListVendorScrubDetails(client, args44.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48509
48811
|
if (!result.ok) {
|
|
48510
48812
|
return {
|
|
48511
48813
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48520,9 +48822,9 @@ List vendor scrub details`,
|
|
|
48520
48822
|
|
|
48521
48823
|
// src/funcs/vendorsListVendorScrubPackages.ts
|
|
48522
48824
|
function vendorsListVendorScrubPackages(client, request, options) {
|
|
48523
|
-
return new APIPromise($
|
|
48825
|
+
return new APIPromise($do45(client, request, options));
|
|
48524
48826
|
}
|
|
48525
|
-
async function $
|
|
48827
|
+
async function $do45(client, request, options) {
|
|
48526
48828
|
const parsed = safeParse(request, (value) => ListVendorScrubPackagesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48527
48829
|
if (!parsed.ok) {
|
|
48528
48830
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48636,12 +48938,12 @@ var init_vendorsListVendorScrubPackages = __esm(() => {
|
|
|
48636
48938
|
});
|
|
48637
48939
|
|
|
48638
48940
|
// src/mcp-server/tools/vendorsListVendorScrubPackages.ts
|
|
48639
|
-
var
|
|
48941
|
+
var args44, tool$vendorsListVendorScrubPackages;
|
|
48640
48942
|
var init_vendorsListVendorScrubPackages2 = __esm(() => {
|
|
48641
48943
|
init_vendorsListVendorScrubPackages();
|
|
48642
48944
|
init_operations();
|
|
48643
48945
|
init_tools();
|
|
48644
|
-
|
|
48946
|
+
args44 = {
|
|
48645
48947
|
request: ListVendorScrubPackagesRequest$inboundSchema
|
|
48646
48948
|
};
|
|
48647
48949
|
tool$vendorsListVendorScrubPackages = {
|
|
@@ -48649,9 +48951,9 @@ var init_vendorsListVendorScrubPackages2 = __esm(() => {
|
|
|
48649
48951
|
description: `List vendor scrub packages
|
|
48650
48952
|
|
|
48651
48953
|
List vendor scrub packages`,
|
|
48652
|
-
args:
|
|
48653
|
-
tool: async (client,
|
|
48654
|
-
const [result, apiCall] = await vendorsListVendorScrubPackages(client,
|
|
48954
|
+
args: args44,
|
|
48955
|
+
tool: async (client, args45, ctx) => {
|
|
48956
|
+
const [result, apiCall] = await vendorsListVendorScrubPackages(client, args45.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48655
48957
|
if (!result.ok) {
|
|
48656
48958
|
return {
|
|
48657
48959
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48666,9 +48968,9 @@ List vendor scrub packages`,
|
|
|
48666
48968
|
|
|
48667
48969
|
// src/funcs/vendorsListVendorScrubPurchases.ts
|
|
48668
48970
|
function vendorsListVendorScrubPurchases(client, request, options) {
|
|
48669
|
-
return new APIPromise($
|
|
48971
|
+
return new APIPromise($do46(client, request, options));
|
|
48670
48972
|
}
|
|
48671
|
-
async function $
|
|
48973
|
+
async function $do46(client, request, options) {
|
|
48672
48974
|
const parsed = safeParse(request, (value) => ListVendorScrubPurchasesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48673
48975
|
if (!parsed.ok) {
|
|
48674
48976
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48782,12 +49084,12 @@ var init_vendorsListVendorScrubPurchases = __esm(() => {
|
|
|
48782
49084
|
});
|
|
48783
49085
|
|
|
48784
49086
|
// src/mcp-server/tools/vendorsListVendorScrubPurchases.ts
|
|
48785
|
-
var
|
|
49087
|
+
var args45, tool$vendorsListVendorScrubPurchases;
|
|
48786
49088
|
var init_vendorsListVendorScrubPurchases2 = __esm(() => {
|
|
48787
49089
|
init_vendorsListVendorScrubPurchases();
|
|
48788
49090
|
init_operations();
|
|
48789
49091
|
init_tools();
|
|
48790
|
-
|
|
49092
|
+
args45 = {
|
|
48791
49093
|
request: ListVendorScrubPurchasesRequest$inboundSchema
|
|
48792
49094
|
};
|
|
48793
49095
|
tool$vendorsListVendorScrubPurchases = {
|
|
@@ -48795,9 +49097,9 @@ var init_vendorsListVendorScrubPurchases2 = __esm(() => {
|
|
|
48795
49097
|
description: `List vendor scrub purchases
|
|
48796
49098
|
|
|
48797
49099
|
List vendor scrub purchases`,
|
|
48798
|
-
args:
|
|
48799
|
-
tool: async (client,
|
|
48800
|
-
const [result, apiCall] = await vendorsListVendorScrubPurchases(client,
|
|
49100
|
+
args: args45,
|
|
49101
|
+
tool: async (client, args46, ctx) => {
|
|
49102
|
+
const [result, apiCall] = await vendorsListVendorScrubPurchases(client, args46.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48801
49103
|
if (!result.ok) {
|
|
48802
49104
|
return {
|
|
48803
49105
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48812,9 +49114,9 @@ List vendor scrub purchases`,
|
|
|
48812
49114
|
|
|
48813
49115
|
// src/funcs/vendorsPurchaseScrubCredits.ts
|
|
48814
49116
|
function vendorsPurchaseScrubCredits(client, request, options) {
|
|
48815
|
-
return new APIPromise($
|
|
49117
|
+
return new APIPromise($do47(client, request, options));
|
|
48816
49118
|
}
|
|
48817
|
-
async function $
|
|
49119
|
+
async function $do47(client, request, options) {
|
|
48818
49120
|
const parsed = safeParse(request, (value) => PurchaseScrubCreditsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48819
49121
|
if (!parsed.ok) {
|
|
48820
49122
|
return [parsed, { status: "invalid" }];
|
|
@@ -48890,12 +49192,12 @@ var init_vendorsPurchaseScrubCredits = __esm(() => {
|
|
|
48890
49192
|
});
|
|
48891
49193
|
|
|
48892
49194
|
// src/mcp-server/tools/vendorsPurchaseScrubCredits.ts
|
|
48893
|
-
var
|
|
49195
|
+
var args46, tool$vendorsPurchaseScrubCredits;
|
|
48894
49196
|
var init_vendorsPurchaseScrubCredits2 = __esm(() => {
|
|
48895
49197
|
init_vendorsPurchaseScrubCredits();
|
|
48896
49198
|
init_operations();
|
|
48897
49199
|
init_tools();
|
|
48898
|
-
|
|
49200
|
+
args46 = {
|
|
48899
49201
|
request: PurchaseScrubCreditsRequest$inboundSchema
|
|
48900
49202
|
};
|
|
48901
49203
|
tool$vendorsPurchaseScrubCredits = {
|
|
@@ -48903,9 +49205,9 @@ var init_vendorsPurchaseScrubCredits2 = __esm(() => {
|
|
|
48903
49205
|
description: `Purchase scrub credits
|
|
48904
49206
|
|
|
48905
49207
|
Purchase scrub credits`,
|
|
48906
|
-
args:
|
|
48907
|
-
tool: async (client,
|
|
48908
|
-
const [result, apiCall] = await vendorsPurchaseScrubCredits(client,
|
|
49208
|
+
args: args46,
|
|
49209
|
+
tool: async (client, args47, ctx) => {
|
|
49210
|
+
const [result, apiCall] = await vendorsPurchaseScrubCredits(client, args47.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48909
49211
|
if (!result.ok) {
|
|
48910
49212
|
return {
|
|
48911
49213
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48920,9 +49222,9 @@ Purchase scrub credits`,
|
|
|
48920
49222
|
|
|
48921
49223
|
// src/funcs/vendorsSendDownloadCode.ts
|
|
48922
49224
|
function vendorsSendDownloadCode(client, request, options) {
|
|
48923
|
-
return new APIPromise($
|
|
49225
|
+
return new APIPromise($do48(client, request, options));
|
|
48924
49226
|
}
|
|
48925
|
-
async function $
|
|
49227
|
+
async function $do48(client, request, options) {
|
|
48926
49228
|
const parsed = safeParse(request, (value) => SendDownloadCodeRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48927
49229
|
if (!parsed.ok) {
|
|
48928
49230
|
return [parsed, { status: "invalid" }];
|
|
@@ -48996,12 +49298,12 @@ var init_vendorsSendDownloadCode = __esm(() => {
|
|
|
48996
49298
|
});
|
|
48997
49299
|
|
|
48998
49300
|
// src/mcp-server/tools/vendorsSendDownloadCode.ts
|
|
48999
|
-
var
|
|
49301
|
+
var args47, tool$vendorsSendDownloadCode;
|
|
49000
49302
|
var init_vendorsSendDownloadCode2 = __esm(() => {
|
|
49001
49303
|
init_vendorsSendDownloadCode();
|
|
49002
49304
|
init_operations();
|
|
49003
49305
|
init_tools();
|
|
49004
|
-
|
|
49306
|
+
args47 = {
|
|
49005
49307
|
request: SendDownloadCodeRequest$inboundSchema
|
|
49006
49308
|
};
|
|
49007
49309
|
tool$vendorsSendDownloadCode = {
|
|
@@ -49009,9 +49311,9 @@ var init_vendorsSendDownloadCode2 = __esm(() => {
|
|
|
49009
49311
|
description: `Send download code for vendor credential
|
|
49010
49312
|
|
|
49011
49313
|
It will send download code for vendor credential`,
|
|
49012
|
-
args:
|
|
49013
|
-
tool: async (client,
|
|
49014
|
-
const [result, apiCall] = await vendorsSendDownloadCode(client,
|
|
49314
|
+
args: args47,
|
|
49315
|
+
tool: async (client, args48, ctx) => {
|
|
49316
|
+
const [result, apiCall] = await vendorsSendDownloadCode(client, args48.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49015
49317
|
if (!result.ok) {
|
|
49016
49318
|
return {
|
|
49017
49319
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49026,9 +49328,9 @@ It will send download code for vendor credential`,
|
|
|
49026
49328
|
|
|
49027
49329
|
// src/funcs/vendorsSubmitVendorCredential.ts
|
|
49028
49330
|
function vendorsSubmitVendorCredential(client, request, options) {
|
|
49029
|
-
return new APIPromise($
|
|
49331
|
+
return new APIPromise($do49(client, request, options));
|
|
49030
49332
|
}
|
|
49031
|
-
async function $
|
|
49333
|
+
async function $do49(client, request, options) {
|
|
49032
49334
|
const parsed = safeParse(request, (value) => SubmitVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49033
49335
|
if (!parsed.ok) {
|
|
49034
49336
|
return [parsed, { status: "invalid" }];
|
|
@@ -49102,12 +49404,12 @@ var init_vendorsSubmitVendorCredential = __esm(() => {
|
|
|
49102
49404
|
});
|
|
49103
49405
|
|
|
49104
49406
|
// src/mcp-server/tools/vendorsSubmitVendorCredential.ts
|
|
49105
|
-
var
|
|
49407
|
+
var args48, tool$vendorsSubmitVendorCredential;
|
|
49106
49408
|
var init_vendorsSubmitVendorCredential2 = __esm(() => {
|
|
49107
49409
|
init_vendorsSubmitVendorCredential();
|
|
49108
49410
|
init_operations();
|
|
49109
49411
|
init_tools();
|
|
49110
|
-
|
|
49412
|
+
args48 = {
|
|
49111
49413
|
request: SubmitVendorCredentialRequest$inboundSchema
|
|
49112
49414
|
};
|
|
49113
49415
|
tool$vendorsSubmitVendorCredential = {
|
|
@@ -49115,9 +49417,122 @@ var init_vendorsSubmitVendorCredential2 = __esm(() => {
|
|
|
49115
49417
|
description: `Submit vendor credential
|
|
49116
49418
|
|
|
49117
49419
|
It will submit vendor credential`,
|
|
49118
|
-
args:
|
|
49119
|
-
tool: async (client,
|
|
49120
|
-
const [result, apiCall] = await vendorsSubmitVendorCredential(client,
|
|
49420
|
+
args: args48,
|
|
49421
|
+
tool: async (client, args49, ctx) => {
|
|
49422
|
+
const [result, apiCall] = await vendorsSubmitVendorCredential(client, args49.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49423
|
+
if (!result.ok) {
|
|
49424
|
+
return {
|
|
49425
|
+
content: [{ type: "text", text: result.error.message }],
|
|
49426
|
+
isError: true
|
|
49427
|
+
};
|
|
49428
|
+
}
|
|
49429
|
+
const value = result.value;
|
|
49430
|
+
return formatResult(value, apiCall);
|
|
49431
|
+
}
|
|
49432
|
+
};
|
|
49433
|
+
});
|
|
49434
|
+
|
|
49435
|
+
// src/funcs/vendorsUpdateVendorCredentialData.ts
|
|
49436
|
+
function vendorsUpdateVendorCredentialData(client, request, options) {
|
|
49437
|
+
return new APIPromise($do50(client, request, options));
|
|
49438
|
+
}
|
|
49439
|
+
async function $do50(client, request, options) {
|
|
49440
|
+
const parsed = safeParse(request, (value) => UpdateVendorCredentialDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49441
|
+
if (!parsed.ok) {
|
|
49442
|
+
return [parsed, { status: "invalid" }];
|
|
49443
|
+
}
|
|
49444
|
+
const payload = parsed.value;
|
|
49445
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
49446
|
+
const pathParams = {
|
|
49447
|
+
id: encodeSimple("id", payload.id, {
|
|
49448
|
+
explode: false,
|
|
49449
|
+
charEncoding: "percent"
|
|
49450
|
+
}),
|
|
49451
|
+
vendor_id_or_me: encodeSimple("vendor_id_or_me", payload.vendor_id_or_me, {
|
|
49452
|
+
explode: false,
|
|
49453
|
+
charEncoding: "percent"
|
|
49454
|
+
})
|
|
49455
|
+
};
|
|
49456
|
+
const path = pathToFunc("/vendors/{vendor_id_or_me}/credentials/{id}")(pathParams);
|
|
49457
|
+
const headers = new Headers(compactMap({
|
|
49458
|
+
"Content-Type": "application/json",
|
|
49459
|
+
Accept: "application/json"
|
|
49460
|
+
}));
|
|
49461
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
49462
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
49463
|
+
const context = {
|
|
49464
|
+
options: client._options,
|
|
49465
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
49466
|
+
operationID: "updateVendorCredentialData",
|
|
49467
|
+
oAuth2Scopes: [],
|
|
49468
|
+
resolvedSecurity: requestSecurity,
|
|
49469
|
+
securitySource: client._options.security,
|
|
49470
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
49471
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
49472
|
+
};
|
|
49473
|
+
const requestRes = client._createRequest(context, {
|
|
49474
|
+
security: requestSecurity,
|
|
49475
|
+
method: "PUT",
|
|
49476
|
+
baseURL: options?.serverURL,
|
|
49477
|
+
path,
|
|
49478
|
+
headers,
|
|
49479
|
+
body,
|
|
49480
|
+
userAgent: client._options.userAgent,
|
|
49481
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
49482
|
+
}, options);
|
|
49483
|
+
if (!requestRes.ok) {
|
|
49484
|
+
return [requestRes, { status: "invalid" }];
|
|
49485
|
+
}
|
|
49486
|
+
const req = requestRes.value;
|
|
49487
|
+
const doResult = await client._do(req, {
|
|
49488
|
+
context,
|
|
49489
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
49490
|
+
retryConfig: context.retryConfig,
|
|
49491
|
+
retryCodes: context.retryCodes
|
|
49492
|
+
});
|
|
49493
|
+
if (!doResult.ok) {
|
|
49494
|
+
return [doResult, { status: "request-error", request: req }];
|
|
49495
|
+
}
|
|
49496
|
+
const response = doResult.value;
|
|
49497
|
+
const responseFields = {
|
|
49498
|
+
HttpMeta: { Response: response, Request: req }
|
|
49499
|
+
};
|
|
49500
|
+
const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
49501
|
+
if (!result.ok) {
|
|
49502
|
+
return [result, { status: "complete", request: req, response }];
|
|
49503
|
+
}
|
|
49504
|
+
return [result, { status: "complete", request: req, response }];
|
|
49505
|
+
}
|
|
49506
|
+
var init_vendorsUpdateVendorCredentialData = __esm(() => {
|
|
49507
|
+
init_esm();
|
|
49508
|
+
init_encodings();
|
|
49509
|
+
init_matchers();
|
|
49510
|
+
init_primitives();
|
|
49511
|
+
init_schemas();
|
|
49512
|
+
init_security();
|
|
49513
|
+
init_url();
|
|
49514
|
+
init_errors2();
|
|
49515
|
+
init_operations();
|
|
49516
|
+
init_async();
|
|
49517
|
+
});
|
|
49518
|
+
|
|
49519
|
+
// src/mcp-server/tools/vendorsUpdateVendorCredentialData.ts
|
|
49520
|
+
var args49, tool$vendorsUpdateVendorCredentialData;
|
|
49521
|
+
var init_vendorsUpdateVendorCredentialData2 = __esm(() => {
|
|
49522
|
+
init_vendorsUpdateVendorCredentialData();
|
|
49523
|
+
init_operations();
|
|
49524
|
+
init_tools();
|
|
49525
|
+
args49 = {
|
|
49526
|
+
request: UpdateVendorCredentialDataRequest$inboundSchema
|
|
49527
|
+
};
|
|
49528
|
+
tool$vendorsUpdateVendorCredentialData = {
|
|
49529
|
+
name: "vendors-update-vendor-credential-data",
|
|
49530
|
+
description: `Update vendor credential data
|
|
49531
|
+
|
|
49532
|
+
Update vendor credential data`,
|
|
49533
|
+
args: args49,
|
|
49534
|
+
tool: async (client, args50, ctx) => {
|
|
49535
|
+
const [result, apiCall] = await vendorsUpdateVendorCredentialData(client, args50.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49121
49536
|
if (!result.ok) {
|
|
49122
49537
|
return {
|
|
49123
49538
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49132,9 +49547,9 @@ It will submit vendor credential`,
|
|
|
49132
49547
|
|
|
49133
49548
|
// src/funcs/vendorsUpdateVendorCredentialFile.ts
|
|
49134
49549
|
function vendorsUpdateVendorCredentialFile(client, request, options) {
|
|
49135
|
-
return new APIPromise($
|
|
49550
|
+
return new APIPromise($do51(client, request, options));
|
|
49136
49551
|
}
|
|
49137
|
-
async function $
|
|
49552
|
+
async function $do51(client, request, options) {
|
|
49138
49553
|
const parsed = safeParse(request, (value) => UpdateVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49139
49554
|
if (!parsed.ok) {
|
|
49140
49555
|
return [parsed, { status: "invalid" }];
|
|
@@ -49212,12 +49627,12 @@ var init_vendorsUpdateVendorCredentialFile = __esm(() => {
|
|
|
49212
49627
|
});
|
|
49213
49628
|
|
|
49214
49629
|
// src/mcp-server/tools/vendorsUpdateVendorCredentialFile.ts
|
|
49215
|
-
var
|
|
49630
|
+
var args50, tool$vendorsUpdateVendorCredentialFile;
|
|
49216
49631
|
var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
|
|
49217
49632
|
init_vendorsUpdateVendorCredentialFile();
|
|
49218
49633
|
init_operations();
|
|
49219
49634
|
init_tools();
|
|
49220
|
-
|
|
49635
|
+
args50 = {
|
|
49221
49636
|
request: UpdateVendorCredentialFileRequest$inboundSchema
|
|
49222
49637
|
};
|
|
49223
49638
|
tool$vendorsUpdateVendorCredentialFile = {
|
|
@@ -49225,9 +49640,9 @@ var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
|
|
|
49225
49640
|
description: `Update vendor credential file
|
|
49226
49641
|
|
|
49227
49642
|
It will update the vendor credential file properties`,
|
|
49228
|
-
args:
|
|
49229
|
-
tool: async (client,
|
|
49230
|
-
const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client,
|
|
49643
|
+
args: args50,
|
|
49644
|
+
tool: async (client, args51, ctx) => {
|
|
49645
|
+
const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client, args51.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49231
49646
|
if (!result.ok) {
|
|
49232
49647
|
return {
|
|
49233
49648
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49242,9 +49657,9 @@ It will update the vendor credential file properties`,
|
|
|
49242
49657
|
|
|
49243
49658
|
// src/funcs/vendorsUpdateVendorDetails.ts
|
|
49244
49659
|
function vendorsUpdateVendorDetails(client, request, options) {
|
|
49245
|
-
return new APIPromise($
|
|
49660
|
+
return new APIPromise($do52(client, request, options));
|
|
49246
49661
|
}
|
|
49247
|
-
async function $
|
|
49662
|
+
async function $do52(client, request, options) {
|
|
49248
49663
|
const parsed = safeParse(request, (value) => UpdateVendorDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49249
49664
|
if (!parsed.ok) {
|
|
49250
49665
|
return [parsed, { status: "invalid" }];
|
|
@@ -49321,12 +49736,12 @@ var init_vendorsUpdateVendorDetails = __esm(() => {
|
|
|
49321
49736
|
});
|
|
49322
49737
|
|
|
49323
49738
|
// src/mcp-server/tools/vendorsUpdateVendorDetails.ts
|
|
49324
|
-
var
|
|
49739
|
+
var args51, tool$vendorsUpdateVendorDetails;
|
|
49325
49740
|
var init_vendorsUpdateVendorDetails2 = __esm(() => {
|
|
49326
49741
|
init_vendorsUpdateVendorDetails();
|
|
49327
49742
|
init_operations();
|
|
49328
49743
|
init_tools();
|
|
49329
|
-
|
|
49744
|
+
args51 = {
|
|
49330
49745
|
request: UpdateVendorDetailsRequest$inboundSchema
|
|
49331
49746
|
};
|
|
49332
49747
|
tool$vendorsUpdateVendorDetails = {
|
|
@@ -49334,9 +49749,9 @@ var init_vendorsUpdateVendorDetails2 = __esm(() => {
|
|
|
49334
49749
|
description: `Update vendor details
|
|
49335
49750
|
|
|
49336
49751
|
It will update the vendor details`,
|
|
49337
|
-
args:
|
|
49338
|
-
tool: async (client,
|
|
49339
|
-
const [result, apiCall] = await vendorsUpdateVendorDetails(client,
|
|
49752
|
+
args: args51,
|
|
49753
|
+
tool: async (client, args52, ctx) => {
|
|
49754
|
+
const [result, apiCall] = await vendorsUpdateVendorDetails(client, args52.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49340
49755
|
if (!result.ok) {
|
|
49341
49756
|
return {
|
|
49342
49757
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49351,9 +49766,9 @@ It will update the vendor details`,
|
|
|
49351
49766
|
|
|
49352
49767
|
// src/funcs/vendorsUpdateVendorManagedByCompany.ts
|
|
49353
49768
|
function vendorsUpdateVendorManagedByCompany(client, request, options) {
|
|
49354
|
-
return new APIPromise($
|
|
49769
|
+
return new APIPromise($do53(client, request, options));
|
|
49355
49770
|
}
|
|
49356
|
-
async function $
|
|
49771
|
+
async function $do53(client, request, options) {
|
|
49357
49772
|
const parsed = safeParse(request, (value) => UpdateVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49358
49773
|
if (!parsed.ok) {
|
|
49359
49774
|
return [parsed, { status: "invalid" }];
|
|
@@ -49429,12 +49844,12 @@ var init_vendorsUpdateVendorManagedByCompany = __esm(() => {
|
|
|
49429
49844
|
});
|
|
49430
49845
|
|
|
49431
49846
|
// src/mcp-server/tools/vendorsUpdateVendorManagedByCompany.ts
|
|
49432
|
-
var
|
|
49847
|
+
var args52, tool$vendorsUpdateVendorManagedByCompany;
|
|
49433
49848
|
var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
|
|
49434
49849
|
init_vendorsUpdateVendorManagedByCompany();
|
|
49435
49850
|
init_operations();
|
|
49436
49851
|
init_tools();
|
|
49437
|
-
|
|
49852
|
+
args52 = {
|
|
49438
49853
|
request: UpdateVendorManagedByCompanyRequest$inboundSchema
|
|
49439
49854
|
};
|
|
49440
49855
|
tool$vendorsUpdateVendorManagedByCompany = {
|
|
@@ -49442,9 +49857,9 @@ var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
|
|
|
49442
49857
|
description: `Update vendor managed by company access rights
|
|
49443
49858
|
|
|
49444
49859
|
It will update the vendor managed by company access rights`,
|
|
49445
|
-
args:
|
|
49446
|
-
tool: async (client,
|
|
49447
|
-
const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client,
|
|
49860
|
+
args: args52,
|
|
49861
|
+
tool: async (client, args53, ctx) => {
|
|
49862
|
+
const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client, args53.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49448
49863
|
if (!result.ok) {
|
|
49449
49864
|
return {
|
|
49450
49865
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49459,9 +49874,9 @@ It will update the vendor managed by company access rights`,
|
|
|
49459
49874
|
|
|
49460
49875
|
// src/funcs/vendorsUpdateVendorScrubDetails.ts
|
|
49461
49876
|
function vendorsUpdateVendorScrubDetails(client, request, options) {
|
|
49462
|
-
return new APIPromise($
|
|
49877
|
+
return new APIPromise($do54(client, request, options));
|
|
49463
49878
|
}
|
|
49464
|
-
async function $
|
|
49879
|
+
async function $do54(client, request, options) {
|
|
49465
49880
|
const parsed = safeParse(request, (value) => UpdateVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49466
49881
|
if (!parsed.ok) {
|
|
49467
49882
|
return [parsed, { status: "invalid" }];
|
|
@@ -49538,12 +49953,12 @@ var init_vendorsUpdateVendorScrubDetails = __esm(() => {
|
|
|
49538
49953
|
});
|
|
49539
49954
|
|
|
49540
49955
|
// src/mcp-server/tools/vendorsUpdateVendorScrubDetails.ts
|
|
49541
|
-
var
|
|
49956
|
+
var args53, tool$vendorsUpdateVendorScrubDetails;
|
|
49542
49957
|
var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
|
|
49543
49958
|
init_vendorsUpdateVendorScrubDetails();
|
|
49544
49959
|
init_operations();
|
|
49545
49960
|
init_tools();
|
|
49546
|
-
|
|
49961
|
+
args53 = {
|
|
49547
49962
|
request: UpdateVendorScrubDetailsRequest$inboundSchema
|
|
49548
49963
|
};
|
|
49549
49964
|
tool$vendorsUpdateVendorScrubDetails = {
|
|
@@ -49551,9 +49966,9 @@ var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
|
|
|
49551
49966
|
description: `Update vendor scrub details
|
|
49552
49967
|
|
|
49553
49968
|
Update vendor scrub details`,
|
|
49554
|
-
args:
|
|
49555
|
-
tool: async (client,
|
|
49556
|
-
const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client,
|
|
49969
|
+
args: args53,
|
|
49970
|
+
tool: async (client, args54, ctx) => {
|
|
49971
|
+
const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client, args54.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49557
49972
|
if (!result.ok) {
|
|
49558
49973
|
return {
|
|
49559
49974
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49568,9 +49983,9 @@ Update vendor scrub details`,
|
|
|
49568
49983
|
|
|
49569
49984
|
// src/funcs/webhooksGetWebhookEndpoint.ts
|
|
49570
49985
|
function webhooksGetWebhookEndpoint(client, request, options) {
|
|
49571
|
-
return new APIPromise($
|
|
49986
|
+
return new APIPromise($do55(client, request, options));
|
|
49572
49987
|
}
|
|
49573
|
-
async function $
|
|
49988
|
+
async function $do55(client, request, options) {
|
|
49574
49989
|
const parsed = safeParse(request, (value) => GetWebhookEndpointRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49575
49990
|
if (!parsed.ok) {
|
|
49576
49991
|
return [parsed, { status: "invalid" }];
|
|
@@ -49646,12 +50061,12 @@ var init_webhooksGetWebhookEndpoint = __esm(() => {
|
|
|
49646
50061
|
});
|
|
49647
50062
|
|
|
49648
50063
|
// src/mcp-server/tools/webhooksGetWebhookEndpoint.ts
|
|
49649
|
-
var
|
|
50064
|
+
var args54, tool$webhooksGetWebhookEndpoint;
|
|
49650
50065
|
var init_webhooksGetWebhookEndpoint2 = __esm(() => {
|
|
49651
50066
|
init_webhooksGetWebhookEndpoint();
|
|
49652
50067
|
init_operations();
|
|
49653
50068
|
init_tools();
|
|
49654
|
-
|
|
50069
|
+
args54 = {
|
|
49655
50070
|
request: GetWebhookEndpointRequest$inboundSchema
|
|
49656
50071
|
};
|
|
49657
50072
|
tool$webhooksGetWebhookEndpoint = {
|
|
@@ -49659,9 +50074,9 @@ var init_webhooksGetWebhookEndpoint2 = __esm(() => {
|
|
|
49659
50074
|
description: `Retrieves the webhook endpoint with the given ID.
|
|
49660
50075
|
|
|
49661
50076
|
Returns the definition of a webhook endpoint by ID.`,
|
|
49662
|
-
args:
|
|
49663
|
-
tool: async (client,
|
|
49664
|
-
const [result, apiCall] = await webhooksGetWebhookEndpoint(client,
|
|
50077
|
+
args: args54,
|
|
50078
|
+
tool: async (client, args55, ctx) => {
|
|
50079
|
+
const [result, apiCall] = await webhooksGetWebhookEndpoint(client, args55.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49665
50080
|
if (!result.ok) {
|
|
49666
50081
|
return {
|
|
49667
50082
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49676,9 +50091,9 @@ Returns the definition of a webhook endpoint by ID.`,
|
|
|
49676
50091
|
|
|
49677
50092
|
// src/funcs/webhooksListAllWebhookEndpoints.ts
|
|
49678
50093
|
function webhooksListAllWebhookEndpoints(client, request, options) {
|
|
49679
|
-
return new APIPromise($
|
|
50094
|
+
return new APIPromise($do56(client, request, options));
|
|
49680
50095
|
}
|
|
49681
|
-
async function $
|
|
50096
|
+
async function $do56(client, request, options) {
|
|
49682
50097
|
const parsed = safeParse(request, (value) => ListAllWebhookEndpointsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49683
50098
|
if (!parsed.ok) {
|
|
49684
50099
|
return [parsed, { status: "invalid" }];
|
|
@@ -49754,12 +50169,12 @@ var init_webhooksListAllWebhookEndpoints = __esm(() => {
|
|
|
49754
50169
|
});
|
|
49755
50170
|
|
|
49756
50171
|
// src/mcp-server/tools/webhooksListAllWebhookEndpoints.ts
|
|
49757
|
-
var
|
|
50172
|
+
var args55, tool$webhooksListAllWebhookEndpoints;
|
|
49758
50173
|
var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
|
|
49759
50174
|
init_webhooksListAllWebhookEndpoints();
|
|
49760
50175
|
init_operations();
|
|
49761
50176
|
init_tools();
|
|
49762
|
-
|
|
50177
|
+
args55 = {
|
|
49763
50178
|
request: ListAllWebhookEndpointsRequest$inboundSchema
|
|
49764
50179
|
};
|
|
49765
50180
|
tool$webhooksListAllWebhookEndpoints = {
|
|
@@ -49767,9 +50182,9 @@ var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
|
|
|
49767
50182
|
description: `List all webhook endpoints
|
|
49768
50183
|
|
|
49769
50184
|
Returns a list of your webhook endpoints.`,
|
|
49770
|
-
args:
|
|
49771
|
-
tool: async (client,
|
|
49772
|
-
const [result, apiCall] = await webhooksListAllWebhookEndpoints(client,
|
|
50185
|
+
args: args55,
|
|
50186
|
+
tool: async (client, args56, ctx) => {
|
|
50187
|
+
const [result, apiCall] = await webhooksListAllWebhookEndpoints(client, args56.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49773
50188
|
if (!result.ok) {
|
|
49774
50189
|
return {
|
|
49775
50190
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49784,9 +50199,9 @@ Returns a list of your webhook endpoints.`,
|
|
|
49784
50199
|
|
|
49785
50200
|
// src/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
|
|
49786
50201
|
function webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, request, options) {
|
|
49787
|
-
return new APIPromise($
|
|
50202
|
+
return new APIPromise($do57(client, request, options));
|
|
49788
50203
|
}
|
|
49789
|
-
async function $
|
|
50204
|
+
async function $do57(client, request, options) {
|
|
49790
50205
|
const parsed = safeParse(request, (value) => UpdatesTheWebhookEndpointWithTheGivenIdRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49791
50206
|
if (!parsed.ok) {
|
|
49792
50207
|
return [parsed, { status: "invalid" }];
|
|
@@ -49863,12 +50278,12 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId = __esm(() => {
|
|
|
49863
50278
|
});
|
|
49864
50279
|
|
|
49865
50280
|
// src/mcp-server/tools/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
|
|
49866
|
-
var
|
|
50281
|
+
var args56, tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId;
|
|
49867
50282
|
var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
|
|
49868
50283
|
init_webhooksUpdatesTheWebhookEndpointWithTheGivenId();
|
|
49869
50284
|
init_operations();
|
|
49870
50285
|
init_tools();
|
|
49871
|
-
|
|
50286
|
+
args56 = {
|
|
49872
50287
|
request: UpdatesTheWebhookEndpointWithTheGivenIdRequest$inboundSchema
|
|
49873
50288
|
};
|
|
49874
50289
|
tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId = {
|
|
@@ -49876,9 +50291,9 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
|
|
|
49876
50291
|
description: `Updates the webhook endpoint with the given ID.
|
|
49877
50292
|
|
|
49878
50293
|
Updates the webhook endpoint with the given ID.`,
|
|
49879
|
-
args:
|
|
49880
|
-
tool: async (client,
|
|
49881
|
-
const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client,
|
|
50294
|
+
args: args56,
|
|
50295
|
+
tool: async (client, args57, ctx) => {
|
|
50296
|
+
const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, args57.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49882
50297
|
if (!result.ok) {
|
|
49883
50298
|
return {
|
|
49884
50299
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49893,9 +50308,9 @@ Updates the webhook endpoint with the given ID.`,
|
|
|
49893
50308
|
|
|
49894
50309
|
// src/funcs/zonesListOrSearchSecurityZones.ts
|
|
49895
50310
|
function zonesListOrSearchSecurityZones(client, request, options) {
|
|
49896
|
-
return new APIPromise($
|
|
50311
|
+
return new APIPromise($do58(client, request, options));
|
|
49897
50312
|
}
|
|
49898
|
-
async function $
|
|
50313
|
+
async function $do58(client, request, options) {
|
|
49899
50314
|
const parsed = safeParse(request, (value) => ListOrSearchSecurityZonesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49900
50315
|
if (!parsed.ok) {
|
|
49901
50316
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -50009,12 +50424,12 @@ var init_zonesListOrSearchSecurityZones = __esm(() => {
|
|
|
50009
50424
|
});
|
|
50010
50425
|
|
|
50011
50426
|
// src/mcp-server/tools/zonesListOrSearchSecurityZones.ts
|
|
50012
|
-
var
|
|
50427
|
+
var args57, tool$zonesListOrSearchSecurityZones;
|
|
50013
50428
|
var init_zonesListOrSearchSecurityZones2 = __esm(() => {
|
|
50014
50429
|
init_zonesListOrSearchSecurityZones();
|
|
50015
50430
|
init_operations();
|
|
50016
50431
|
init_tools();
|
|
50017
|
-
|
|
50432
|
+
args57 = {
|
|
50018
50433
|
request: ListOrSearchSecurityZonesRequest$inboundSchema
|
|
50019
50434
|
};
|
|
50020
50435
|
tool$zonesListOrSearchSecurityZones = {
|
|
@@ -50022,9 +50437,9 @@ var init_zonesListOrSearchSecurityZones2 = __esm(() => {
|
|
|
50022
50437
|
description: `List or search security zones
|
|
50023
50438
|
|
|
50024
50439
|
List or search security zones`,
|
|
50025
|
-
args:
|
|
50026
|
-
tool: async (client,
|
|
50027
|
-
const [result, apiCall] = await zonesListOrSearchSecurityZones(client,
|
|
50440
|
+
args: args57,
|
|
50441
|
+
tool: async (client, args58, ctx) => {
|
|
50442
|
+
const [result, apiCall] = await zonesListOrSearchSecurityZones(client, args58.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
50028
50443
|
if (!result.ok) {
|
|
50029
50444
|
return {
|
|
50030
50445
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -50039,9 +50454,9 @@ List or search security zones`,
|
|
|
50039
50454
|
|
|
50040
50455
|
// src/funcs/zonesSecurityZoneCheckin.ts
|
|
50041
50456
|
function zonesSecurityZoneCheckin(client, request, options) {
|
|
50042
|
-
return new APIPromise($
|
|
50457
|
+
return new APIPromise($do59(client, request, options));
|
|
50043
50458
|
}
|
|
50044
|
-
async function $
|
|
50459
|
+
async function $do59(client, request, options) {
|
|
50045
50460
|
const parsed = safeParse(request, (value) => SecurityZoneCheckinRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
50046
50461
|
if (!parsed.ok) {
|
|
50047
50462
|
return [parsed, { status: "invalid" }];
|
|
@@ -50111,12 +50526,12 @@ var init_zonesSecurityZoneCheckin = __esm(() => {
|
|
|
50111
50526
|
});
|
|
50112
50527
|
|
|
50113
50528
|
// src/mcp-server/tools/zonesSecurityZoneCheckin.ts
|
|
50114
|
-
var
|
|
50529
|
+
var args58, tool$zonesSecurityZoneCheckin;
|
|
50115
50530
|
var init_zonesSecurityZoneCheckin2 = __esm(() => {
|
|
50116
50531
|
init_zonesSecurityZoneCheckin();
|
|
50117
50532
|
init_operations();
|
|
50118
50533
|
init_tools();
|
|
50119
|
-
|
|
50534
|
+
args58 = {
|
|
50120
50535
|
request: SecurityZoneCheckinRequestBody$inboundSchema
|
|
50121
50536
|
};
|
|
50122
50537
|
tool$zonesSecurityZoneCheckin = {
|
|
@@ -50124,9 +50539,9 @@ var init_zonesSecurityZoneCheckin2 = __esm(() => {
|
|
|
50124
50539
|
description: `Security zone checkin request
|
|
50125
50540
|
|
|
50126
50541
|
Security zone checkin request`,
|
|
50127
|
-
args:
|
|
50128
|
-
tool: async (client,
|
|
50129
|
-
const [result, apiCall] = await zonesSecurityZoneCheckin(client,
|
|
50542
|
+
args: args58,
|
|
50543
|
+
tool: async (client, args59, ctx) => {
|
|
50544
|
+
const [result, apiCall] = await zonesSecurityZoneCheckin(client, args59.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
50130
50545
|
if (!result.ok) {
|
|
50131
50546
|
return {
|
|
50132
50547
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -50143,7 +50558,7 @@ Security zone checkin request`,
|
|
|
50143
50558
|
function createMCPServer(deps) {
|
|
50144
50559
|
const server = new McpServer({
|
|
50145
50560
|
name: "GreenSecurity",
|
|
50146
|
-
version: "0.35.
|
|
50561
|
+
version: "0.35.13"
|
|
50147
50562
|
});
|
|
50148
50563
|
const client = new GreenSecurityCore({
|
|
50149
50564
|
security: deps.security,
|
|
@@ -50161,6 +50576,7 @@ function createMCPServer(deps) {
|
|
|
50161
50576
|
tool(tool$vendorsListVendorJobTitles);
|
|
50162
50577
|
tool(tool$vendorsListVendorCredentials);
|
|
50163
50578
|
tool(tool$vendorsGetVendorCredentialDetails);
|
|
50579
|
+
tool(tool$vendorsUpdateVendorCredentialData);
|
|
50164
50580
|
tool(tool$vendorsGetVendorCredentialFile);
|
|
50165
50581
|
tool(tool$vendorsUpdateVendorCredentialFile);
|
|
50166
50582
|
tool(tool$vendorsDeleteVendorCredentialFile);
|
|
@@ -50214,6 +50630,7 @@ function createMCPServer(deps) {
|
|
|
50214
50630
|
tool(tool$dataRequestsAddDataRequestFile);
|
|
50215
50631
|
tool(tool$dataRequestsDeleteDataRequestFile);
|
|
50216
50632
|
tool(tool$dataRequestsUpdateDataRequest);
|
|
50633
|
+
tool(tool$invoicesMakePayment);
|
|
50217
50634
|
return server;
|
|
50218
50635
|
}
|
|
50219
50636
|
var init_server2 = __esm(() => {
|
|
@@ -50225,6 +50642,7 @@ var init_server2 = __esm(() => {
|
|
|
50225
50642
|
init_dataRequestsAddDataRequestFile2();
|
|
50226
50643
|
init_dataRequestsDeleteDataRequestFile2();
|
|
50227
50644
|
init_dataRequestsUpdateDataRequest2();
|
|
50645
|
+
init_invoicesMakePayment2();
|
|
50228
50646
|
init_organizationsGetFacility2();
|
|
50229
50647
|
init_organizationsListOrSearchFacilities2();
|
|
50230
50648
|
init_supportArticlesGetSupportArticle2();
|
|
@@ -50269,6 +50687,7 @@ var init_server2 = __esm(() => {
|
|
|
50269
50687
|
init_vendorsPurchaseScrubCredits2();
|
|
50270
50688
|
init_vendorsSendDownloadCode2();
|
|
50271
50689
|
init_vendorsSubmitVendorCredential2();
|
|
50690
|
+
init_vendorsUpdateVendorCredentialData2();
|
|
50272
50691
|
init_vendorsUpdateVendorCredentialFile2();
|
|
50273
50692
|
init_vendorsUpdateVendorDetails2();
|
|
50274
50693
|
init_vendorsUpdateVendorManagedByCompany2();
|
|
@@ -51482,7 +51901,7 @@ var routes = an({
|
|
|
51482
51901
|
var app = He(routes, {
|
|
51483
51902
|
name: "mcp",
|
|
51484
51903
|
versionInfo: {
|
|
51485
|
-
currentVersion: "0.35.
|
|
51904
|
+
currentVersion: "0.35.13"
|
|
51486
51905
|
}
|
|
51487
51906
|
});
|
|
51488
51907
|
zt(app, process3.argv.slice(2), buildContext(process3));
|
|
@@ -51490,5 +51909,5 @@ export {
|
|
|
51490
51909
|
app
|
|
51491
51910
|
};
|
|
51492
51911
|
|
|
51493
|
-
//# debugId=
|
|
51912
|
+
//# debugId=7738372AD9AF981D64756E2164756E21
|
|
51494
51913
|
//# sourceMappingURL=mcp-server.js.map
|