@greensecurity/javascript-sdk 0.35.3 → 0.35.7
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +9 -0
- package/bin/mcp-server.js +784 -371
- package/bin/mcp-server.js.map +14 -8
- package/dist/commonjs/__tests__/invoices.test.d.ts +2 -0
- package/dist/commonjs/__tests__/invoices.test.d.ts.map +1 -0
- package/dist/commonjs/__tests__/invoices.test.js +25 -0
- package/dist/commonjs/__tests__/invoices.test.js.map +1 -0
- package/dist/commonjs/__tests__/vendors.test.js +17 -0
- package/dist/commonjs/__tests__/vendors.test.js.map +1 -1
- package/dist/commonjs/__tests__/webhooks.test.js +1 -1
- package/dist/commonjs/__tests__/webhooks.test.js.map +1 -1
- package/dist/commonjs/__tests__/zones.test.js +33 -7
- package/dist/commonjs/__tests__/zones.test.js.map +1 -1
- package/dist/commonjs/funcs/invoicesMakePayment.d.ts +17 -0
- package/dist/commonjs/funcs/invoicesMakePayment.d.ts.map +1 -0
- package/dist/commonjs/funcs/invoicesMakePayment.js +123 -0
- package/dist/commonjs/funcs/invoicesMakePayment.js.map +1 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialData.d.ts +17 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialData.js +128 -0
- package/dist/commonjs/funcs/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/commonjs/lib/config.d.ts +2 -2
- package/dist/commonjs/lib/config.js +2 -2
- package/dist/commonjs/mcp-server/mcp-server.js +1 -1
- package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/server.js +5 -1
- package/dist/commonjs/mcp-server/server.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/invoicesMakePayment.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/invoicesMakePayment.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/invoicesMakePayment.js +64 -0
- package/dist/commonjs/mcp-server/tools/invoicesMakePayment.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsUpdateVendorCredentialData.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/vendorsUpdateVendorCredentialData.js +64 -0
- package/dist/commonjs/mcp-server/tools/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/commonjs/models/components/credential.d.ts +4 -0
- package/dist/commonjs/models/components/credential.d.ts.map +1 -1
- package/dist/commonjs/models/components/credential.js +8 -0
- package/dist/commonjs/models/components/credential.js.map +1 -1
- package/dist/commonjs/models/operations/index.d.ts +2 -0
- package/dist/commonjs/models/operations/index.d.ts.map +1 -1
- package/dist/commonjs/models/operations/index.js +2 -0
- package/dist/commonjs/models/operations/index.js.map +1 -1
- package/dist/commonjs/models/operations/makepayment.d.ts +91 -0
- package/dist/commonjs/models/operations/makepayment.d.ts.map +1 -0
- package/dist/commonjs/models/operations/makepayment.js +146 -0
- package/dist/commonjs/models/operations/makepayment.js.map +1 -0
- package/dist/commonjs/models/operations/updatevendorcredentialdata.d.ts +186 -0
- package/dist/commonjs/models/operations/updatevendorcredentialdata.d.ts.map +1 -0
- package/dist/commonjs/models/operations/updatevendorcredentialdata.js +217 -0
- package/dist/commonjs/models/operations/updatevendorcredentialdata.js.map +1 -0
- package/dist/commonjs/react-query/index.d.ts +2 -0
- package/dist/commonjs/react-query/index.d.ts.map +1 -1
- package/dist/commonjs/react-query/index.js +2 -0
- package/dist/commonjs/react-query/index.js.map +1 -1
- package/dist/commonjs/react-query/invoicesMakePayment.d.ts +23 -0
- package/dist/commonjs/react-query/invoicesMakePayment.d.ts.map +1 -0
- package/dist/commonjs/react-query/invoicesMakePayment.js +47 -0
- package/dist/commonjs/react-query/invoicesMakePayment.js.map +1 -0
- package/dist/commonjs/react-query/vendorsUpdateVendorCredentialData.d.ts +23 -0
- package/dist/commonjs/react-query/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/commonjs/react-query/vendorsUpdateVendorCredentialData.js +51 -0
- package/dist/commonjs/react-query/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/commonjs/sdk/invoices.d.ts +12 -0
- package/dist/commonjs/sdk/invoices.d.ts.map +1 -0
- package/dist/commonjs/sdk/invoices.js +22 -0
- package/dist/commonjs/sdk/invoices.js.map +1 -0
- package/dist/commonjs/sdk/sdk.d.ts +3 -0
- package/dist/commonjs/sdk/sdk.d.ts.map +1 -1
- package/dist/commonjs/sdk/sdk.js +4 -0
- package/dist/commonjs/sdk/sdk.js.map +1 -1
- package/dist/commonjs/sdk/vendors.d.ts +7 -0
- package/dist/commonjs/sdk/vendors.d.ts.map +1 -1
- package/dist/commonjs/sdk/vendors.js +10 -0
- package/dist/commonjs/sdk/vendors.js.map +1 -1
- package/dist/esm/__tests__/invoices.test.d.ts +2 -0
- package/dist/esm/__tests__/invoices.test.d.ts.map +1 -0
- package/dist/esm/__tests__/invoices.test.js +23 -0
- package/dist/esm/__tests__/invoices.test.js.map +1 -0
- package/dist/esm/__tests__/vendors.test.js +17 -0
- package/dist/esm/__tests__/vendors.test.js.map +1 -1
- package/dist/esm/__tests__/webhooks.test.js +1 -1
- package/dist/esm/__tests__/webhooks.test.js.map +1 -1
- package/dist/esm/__tests__/zones.test.js +33 -7
- package/dist/esm/__tests__/zones.test.js.map +1 -1
- package/dist/esm/funcs/invoicesMakePayment.d.ts +17 -0
- package/dist/esm/funcs/invoicesMakePayment.d.ts.map +1 -0
- package/dist/esm/funcs/invoicesMakePayment.js +87 -0
- package/dist/esm/funcs/invoicesMakePayment.js.map +1 -0
- package/dist/esm/funcs/vendorsUpdateVendorCredentialData.d.ts +17 -0
- package/dist/esm/funcs/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/esm/funcs/vendorsUpdateVendorCredentialData.js +92 -0
- package/dist/esm/funcs/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/esm/lib/config.d.ts +2 -2
- package/dist/esm/lib/config.js +2 -2
- package/dist/esm/mcp-server/mcp-server.js +1 -1
- package/dist/esm/mcp-server/server.d.ts.map +1 -1
- package/dist/esm/mcp-server/server.js +5 -1
- package/dist/esm/mcp-server/server.js.map +1 -1
- package/dist/esm/mcp-server/tools/invoicesMakePayment.d.ts +8 -0
- package/dist/esm/mcp-server/tools/invoicesMakePayment.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/invoicesMakePayment.js +28 -0
- package/dist/esm/mcp-server/tools/invoicesMakePayment.js.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsUpdateVendorCredentialData.d.ts +8 -0
- package/dist/esm/mcp-server/tools/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/vendorsUpdateVendorCredentialData.js +28 -0
- package/dist/esm/mcp-server/tools/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/esm/models/components/credential.d.ts +4 -0
- package/dist/esm/models/components/credential.d.ts.map +1 -1
- package/dist/esm/models/components/credential.js +8 -0
- package/dist/esm/models/components/credential.js.map +1 -1
- package/dist/esm/models/operations/index.d.ts +2 -0
- package/dist/esm/models/operations/index.d.ts.map +1 -1
- package/dist/esm/models/operations/index.js +2 -0
- package/dist/esm/models/operations/index.js.map +1 -1
- package/dist/esm/models/operations/makepayment.d.ts +91 -0
- package/dist/esm/models/operations/makepayment.d.ts.map +1 -0
- package/dist/esm/models/operations/makepayment.js +104 -0
- package/dist/esm/models/operations/makepayment.js.map +1 -0
- package/dist/esm/models/operations/updatevendorcredentialdata.d.ts +186 -0
- package/dist/esm/models/operations/updatevendorcredentialdata.d.ts.map +1 -0
- package/dist/esm/models/operations/updatevendorcredentialdata.js +177 -0
- package/dist/esm/models/operations/updatevendorcredentialdata.js.map +1 -0
- package/dist/esm/react-query/index.d.ts +2 -0
- package/dist/esm/react-query/index.d.ts.map +1 -1
- package/dist/esm/react-query/index.js +2 -0
- package/dist/esm/react-query/index.js.map +1 -1
- package/dist/esm/react-query/invoicesMakePayment.d.ts +23 -0
- package/dist/esm/react-query/invoicesMakePayment.d.ts.map +1 -0
- package/dist/esm/react-query/invoicesMakePayment.js +42 -0
- package/dist/esm/react-query/invoicesMakePayment.js.map +1 -0
- package/dist/esm/react-query/vendorsUpdateVendorCredentialData.d.ts +23 -0
- package/dist/esm/react-query/vendorsUpdateVendorCredentialData.d.ts.map +1 -0
- package/dist/esm/react-query/vendorsUpdateVendorCredentialData.js +46 -0
- package/dist/esm/react-query/vendorsUpdateVendorCredentialData.js.map +1 -0
- package/dist/esm/sdk/invoices.d.ts +12 -0
- package/dist/esm/sdk/invoices.d.ts.map +1 -0
- package/dist/esm/sdk/invoices.js +18 -0
- package/dist/esm/sdk/invoices.js.map +1 -0
- package/dist/esm/sdk/sdk.d.ts +3 -0
- package/dist/esm/sdk/sdk.d.ts.map +1 -1
- package/dist/esm/sdk/sdk.js +4 -0
- package/dist/esm/sdk/sdk.js.map +1 -1
- package/dist/esm/sdk/vendors.d.ts +7 -0
- package/dist/esm/sdk/vendors.d.ts.map +1 -1
- package/dist/esm/sdk/vendors.js +10 -0
- package/dist/esm/sdk/vendors.js.map +1 -1
- package/jsr.json +1 -1
- package/package.json +1 -1
- package/src/__tests__/invoices.test.ts +26 -0
- package/src/__tests__/vendors.test.ts +20 -0
- package/src/__tests__/webhooks.test.ts +1 -1
- package/src/__tests__/zones.test.ts +33 -7
- package/src/funcs/invoicesMakePayment.ts +172 -0
- package/src/funcs/vendorsUpdateVendorCredentialData.ts +180 -0
- package/src/lib/config.ts +2 -2
- package/src/mcp-server/mcp-server.ts +1 -1
- package/src/mcp-server/server.ts +5 -1
- package/src/mcp-server/tools/invoicesMakePayment.ts +37 -0
- package/src/mcp-server/tools/vendorsUpdateVendorCredentialData.ts +39 -0
- package/src/models/components/credential.ts +12 -0
- package/src/models/operations/index.ts +2 -0
- package/src/models/operations/makepayment.ts +217 -0
- package/src/models/operations/updatevendorcredentialdata.ts +305 -0
- package/src/react-query/index.ts +2 -0
- package/src/react-query/invoicesMakePayment.ts +89 -0
- package/src/react-query/vendorsUpdateVendorCredentialData.ts +92 -0
- package/src/sdk/invoices.ts +27 -0
- package/src/sdk/sdk.ts +6 -0
- package/src/sdk/vendors.ts +18 -0
package/bin/mcp-server.js
CHANGED
|
@@ -34236,9 +34236,9 @@ var init_config = __esm(() => {
|
|
|
34236
34236
|
SDK_METADATA = {
|
|
34237
34237
|
language: "typescript",
|
|
34238
34238
|
openapiDocVersion: "0.0.3",
|
|
34239
|
-
sdkVersion: "0.35.
|
|
34239
|
+
sdkVersion: "0.35.7",
|
|
34240
34240
|
genVersion: "2.620.2",
|
|
34241
|
-
userAgent: "speakeasy-sdk/typescript 0.35.
|
|
34241
|
+
userAgent: "speakeasy-sdk/typescript 0.35.7 2.620.2 0.0.3 @greensecurity/javascript-sdk"
|
|
34242
34242
|
};
|
|
34243
34243
|
});
|
|
34244
34244
|
|
|
@@ -36494,6 +36494,8 @@ var init_credential = __esm(() => {
|
|
|
36494
36494
|
ui_schema: nullableType(stringType()).optional(),
|
|
36495
36495
|
behavior: nullableType(stringType()).optional(),
|
|
36496
36496
|
require_electronic_signature: booleanType().optional(),
|
|
36497
|
+
accept_text: nullableType(stringType()).optional(),
|
|
36498
|
+
accept_submitting_text: nullableType(stringType()).optional(),
|
|
36497
36499
|
decline_submitting_text: nullableType(stringType()).optional(),
|
|
36498
36500
|
decline_description: nullableType(stringType()).optional(),
|
|
36499
36501
|
require_decline_file: booleanType().optional(),
|
|
@@ -36509,6 +36511,8 @@ var init_credential = __esm(() => {
|
|
|
36509
36511
|
js_schema: "jsSchema",
|
|
36510
36512
|
ui_schema: "uiSchema",
|
|
36511
36513
|
require_electronic_signature: "requireElectronicSignature",
|
|
36514
|
+
accept_text: "acceptText",
|
|
36515
|
+
accept_submitting_text: "acceptSubmittingText",
|
|
36512
36516
|
decline_submitting_text: "declineSubmittingText",
|
|
36513
36517
|
decline_description: "declineDescription",
|
|
36514
36518
|
require_decline_file: "requireDeclineFile",
|
|
@@ -36530,6 +36534,8 @@ var init_credential = __esm(() => {
|
|
|
36530
36534
|
uiSchema: nullableType(stringType()).optional(),
|
|
36531
36535
|
behavior: nullableType(stringType()).optional(),
|
|
36532
36536
|
requireElectronicSignature: booleanType().optional(),
|
|
36537
|
+
acceptText: nullableType(stringType()).optional(),
|
|
36538
|
+
acceptSubmittingText: nullableType(stringType()).optional(),
|
|
36533
36539
|
declineSubmittingText: nullableType(stringType()).optional(),
|
|
36534
36540
|
declineDescription: nullableType(stringType()).optional(),
|
|
36535
36541
|
requireDeclineFile: booleanType().optional(),
|
|
@@ -36545,6 +36551,8 @@ var init_credential = __esm(() => {
|
|
|
36545
36551
|
jsSchema: "js_schema",
|
|
36546
36552
|
uiSchema: "ui_schema",
|
|
36547
36553
|
requireElectronicSignature: "require_electronic_signature",
|
|
36554
|
+
acceptText: "accept_text",
|
|
36555
|
+
acceptSubmittingText: "accept_submitting_text",
|
|
36548
36556
|
declineSubmittingText: "decline_submitting_text",
|
|
36549
36557
|
declineDescription: "decline_description",
|
|
36550
36558
|
requireDeclineFile: "require_decline_file",
|
|
@@ -42310,6 +42318,65 @@ var init_magiclink = __esm(() => {
|
|
|
42310
42318
|
})(MagiclinkMagiclinkOk$ ||= {});
|
|
42311
42319
|
});
|
|
42312
42320
|
|
|
42321
|
+
// src/models/operations/makepayment.ts
|
|
42322
|
+
var MakePaymentRequestBody$inboundSchema, MakePaymentRequestBody$outboundSchema, MakePaymentRequestBody$, MakePaymentRequest$inboundSchema, MakePaymentRequest$outboundSchema, MakePaymentRequest$, MakePaymentResponseBody$inboundSchema, MakePaymentResponseBody$outboundSchema, MakePaymentResponseBody$;
|
|
42323
|
+
var init_makepayment = __esm(() => {
|
|
42324
|
+
init_esm();
|
|
42325
|
+
init_primitives();
|
|
42326
|
+
MakePaymentRequestBody$inboundSchema = objectType({
|
|
42327
|
+
amount: numberType().optional(),
|
|
42328
|
+
use_credits: booleanType().optional()
|
|
42329
|
+
}).transform((v2) => {
|
|
42330
|
+
return remap(v2, {
|
|
42331
|
+
use_credits: "useCredits"
|
|
42332
|
+
});
|
|
42333
|
+
});
|
|
42334
|
+
MakePaymentRequestBody$outboundSchema = objectType({
|
|
42335
|
+
amount: numberType().optional(),
|
|
42336
|
+
useCredits: booleanType().optional()
|
|
42337
|
+
}).transform((v2) => {
|
|
42338
|
+
return remap(v2, {
|
|
42339
|
+
useCredits: "use_credits"
|
|
42340
|
+
});
|
|
42341
|
+
});
|
|
42342
|
+
((MakePaymentRequestBody$) => {
|
|
42343
|
+
MakePaymentRequestBody$.inboundSchema = MakePaymentRequestBody$inboundSchema;
|
|
42344
|
+
MakePaymentRequestBody$.outboundSchema = MakePaymentRequestBody$outboundSchema;
|
|
42345
|
+
})(MakePaymentRequestBody$ ||= {});
|
|
42346
|
+
MakePaymentRequest$inboundSchema = objectType({
|
|
42347
|
+
id: numberType().int(),
|
|
42348
|
+
RequestBody: lazyType(() => MakePaymentRequestBody$inboundSchema)
|
|
42349
|
+
}).transform((v2) => {
|
|
42350
|
+
return remap(v2, {
|
|
42351
|
+
RequestBody: "requestBody"
|
|
42352
|
+
});
|
|
42353
|
+
});
|
|
42354
|
+
MakePaymentRequest$outboundSchema = objectType({
|
|
42355
|
+
id: numberType().int(),
|
|
42356
|
+
requestBody: lazyType(() => MakePaymentRequestBody$outboundSchema)
|
|
42357
|
+
}).transform((v2) => {
|
|
42358
|
+
return remap(v2, {
|
|
42359
|
+
requestBody: "RequestBody"
|
|
42360
|
+
});
|
|
42361
|
+
});
|
|
42362
|
+
((MakePaymentRequest$) => {
|
|
42363
|
+
MakePaymentRequest$.inboundSchema = MakePaymentRequest$inboundSchema;
|
|
42364
|
+
MakePaymentRequest$.outboundSchema = MakePaymentRequest$outboundSchema;
|
|
42365
|
+
})(MakePaymentRequest$ ||= {});
|
|
42366
|
+
MakePaymentResponseBody$inboundSchema = objectType({
|
|
42367
|
+
success: booleanType().optional(),
|
|
42368
|
+
error: stringType().optional()
|
|
42369
|
+
});
|
|
42370
|
+
MakePaymentResponseBody$outboundSchema = objectType({
|
|
42371
|
+
success: booleanType().optional(),
|
|
42372
|
+
error: stringType().optional()
|
|
42373
|
+
});
|
|
42374
|
+
((MakePaymentResponseBody$) => {
|
|
42375
|
+
MakePaymentResponseBody$.inboundSchema = MakePaymentResponseBody$inboundSchema;
|
|
42376
|
+
MakePaymentResponseBody$.outboundSchema = MakePaymentResponseBody$outboundSchema;
|
|
42377
|
+
})(MakePaymentResponseBody$ ||= {});
|
|
42378
|
+
});
|
|
42379
|
+
|
|
42313
42380
|
// src/models/operations/password.ts
|
|
42314
42381
|
var PasswordRequestBody$inboundSchema, PasswordRequestBody$outboundSchema, PasswordRequestBody$, PasswordPasswordOk$inboundSchema, PasswordPasswordOk$outboundSchema, PasswordPasswordOk$;
|
|
42315
42382
|
var init_password = __esm(() => {
|
|
@@ -42940,6 +43007,125 @@ var init_updatesthewebhookendpointwiththegivenid = __esm(() => {
|
|
|
42940
43007
|
})(UpdatesTheWebhookEndpointWithTheGivenIdRequest$ ||= {});
|
|
42941
43008
|
});
|
|
42942
43009
|
|
|
43010
|
+
// src/models/operations/updatevendorcredentialdata.ts
|
|
43011
|
+
var Status2, BcpOrderStatus, BcpResultStatus, Status$inboundSchema2, Status$outboundSchema2, Status$2, BcpOrderStatus$inboundSchema, BcpOrderStatus$outboundSchema, BcpOrderStatus$, BcpResultStatus$inboundSchema, BcpResultStatus$outboundSchema, BcpResultStatus$, UpdateVendorCredentialDataRequestBody$inboundSchema, UpdateVendorCredentialDataRequestBody$outboundSchema, UpdateVendorCredentialDataRequestBody$, UpdateVendorCredentialDataRequest$inboundSchema, UpdateVendorCredentialDataRequest$outboundSchema, UpdateVendorCredentialDataRequest$;
|
|
43012
|
+
var init_updatevendorcredentialdata = __esm(() => {
|
|
43013
|
+
init_esm();
|
|
43014
|
+
init_primitives();
|
|
43015
|
+
Status2 = {
|
|
43016
|
+
PendingVendor: "Pending Vendor",
|
|
43017
|
+
PendingApproval: "Pending Approval",
|
|
43018
|
+
Approved: "Approved",
|
|
43019
|
+
Declined: "Declined",
|
|
43020
|
+
Denied: "Denied",
|
|
43021
|
+
Expired: "Expired",
|
|
43022
|
+
Suspended: "Suspended"
|
|
43023
|
+
};
|
|
43024
|
+
BcpOrderStatus = {
|
|
43025
|
+
PendingGreen: "Pending Green",
|
|
43026
|
+
PendingBCP: "Pending BCP",
|
|
43027
|
+
Processed: "Processed"
|
|
43028
|
+
};
|
|
43029
|
+
BcpResultStatus = {
|
|
43030
|
+
Pending: "Pending",
|
|
43031
|
+
Processing: "Processing",
|
|
43032
|
+
Clear: "Clear",
|
|
43033
|
+
Hit: "Hit",
|
|
43034
|
+
Unknown: "Unknown",
|
|
43035
|
+
Review: "Review"
|
|
43036
|
+
};
|
|
43037
|
+
Status$inboundSchema2 = nativeEnumType(Status2);
|
|
43038
|
+
Status$outboundSchema2 = Status$inboundSchema2;
|
|
43039
|
+
((Status$) => {
|
|
43040
|
+
Status$.inboundSchema = Status$inboundSchema2;
|
|
43041
|
+
Status$.outboundSchema = Status$outboundSchema2;
|
|
43042
|
+
})(Status$2 ||= {});
|
|
43043
|
+
BcpOrderStatus$inboundSchema = nativeEnumType(BcpOrderStatus);
|
|
43044
|
+
BcpOrderStatus$outboundSchema = BcpOrderStatus$inboundSchema;
|
|
43045
|
+
((BcpOrderStatus$) => {
|
|
43046
|
+
BcpOrderStatus$.inboundSchema = BcpOrderStatus$inboundSchema;
|
|
43047
|
+
BcpOrderStatus$.outboundSchema = BcpOrderStatus$outboundSchema;
|
|
43048
|
+
})(BcpOrderStatus$ ||= {});
|
|
43049
|
+
BcpResultStatus$inboundSchema = nativeEnumType(BcpResultStatus);
|
|
43050
|
+
BcpResultStatus$outboundSchema = BcpResultStatus$inboundSchema;
|
|
43051
|
+
((BcpResultStatus$) => {
|
|
43052
|
+
BcpResultStatus$.inboundSchema = BcpResultStatus$inboundSchema;
|
|
43053
|
+
BcpResultStatus$.outboundSchema = BcpResultStatus$outboundSchema;
|
|
43054
|
+
})(BcpResultStatus$ ||= {});
|
|
43055
|
+
UpdateVendorCredentialDataRequestBody$inboundSchema = objectType({
|
|
43056
|
+
json_data: stringType().optional(),
|
|
43057
|
+
auto_approve: booleanType().optional(),
|
|
43058
|
+
status: Status$inboundSchema2.optional(),
|
|
43059
|
+
bcp_order_id: stringType().optional(),
|
|
43060
|
+
bcp_order_status: BcpOrderStatus$inboundSchema.optional(),
|
|
43061
|
+
bcp_result_status: BcpResultStatus$inboundSchema.optional(),
|
|
43062
|
+
bcp_notes: stringType().optional(),
|
|
43063
|
+
background_check_provider_id: numberType().int().optional(),
|
|
43064
|
+
bcp_turnaround_time: numberType().int().optional()
|
|
43065
|
+
}).transform((v2) => {
|
|
43066
|
+
return remap(v2, {
|
|
43067
|
+
json_data: "jsonData",
|
|
43068
|
+
auto_approve: "autoApprove",
|
|
43069
|
+
bcp_order_id: "bcpOrderId",
|
|
43070
|
+
bcp_order_status: "bcpOrderStatus",
|
|
43071
|
+
bcp_result_status: "bcpResultStatus",
|
|
43072
|
+
bcp_notes: "bcpNotes",
|
|
43073
|
+
background_check_provider_id: "backgroundCheckProviderId",
|
|
43074
|
+
bcp_turnaround_time: "bcpTurnaroundTime"
|
|
43075
|
+
});
|
|
43076
|
+
});
|
|
43077
|
+
UpdateVendorCredentialDataRequestBody$outboundSchema = objectType({
|
|
43078
|
+
jsonData: stringType().optional(),
|
|
43079
|
+
autoApprove: booleanType().optional(),
|
|
43080
|
+
status: Status$outboundSchema2.optional(),
|
|
43081
|
+
bcpOrderId: stringType().optional(),
|
|
43082
|
+
bcpOrderStatus: BcpOrderStatus$outboundSchema.optional(),
|
|
43083
|
+
bcpResultStatus: BcpResultStatus$outboundSchema.optional(),
|
|
43084
|
+
bcpNotes: stringType().optional(),
|
|
43085
|
+
backgroundCheckProviderId: numberType().int().optional(),
|
|
43086
|
+
bcpTurnaroundTime: numberType().int().optional()
|
|
43087
|
+
}).transform((v2) => {
|
|
43088
|
+
return remap(v2, {
|
|
43089
|
+
jsonData: "json_data",
|
|
43090
|
+
autoApprove: "auto_approve",
|
|
43091
|
+
bcpOrderId: "bcp_order_id",
|
|
43092
|
+
bcpOrderStatus: "bcp_order_status",
|
|
43093
|
+
bcpResultStatus: "bcp_result_status",
|
|
43094
|
+
bcpNotes: "bcp_notes",
|
|
43095
|
+
backgroundCheckProviderId: "background_check_provider_id",
|
|
43096
|
+
bcpTurnaroundTime: "bcp_turnaround_time"
|
|
43097
|
+
});
|
|
43098
|
+
});
|
|
43099
|
+
((UpdateVendorCredentialDataRequestBody$) => {
|
|
43100
|
+
UpdateVendorCredentialDataRequestBody$.inboundSchema = UpdateVendorCredentialDataRequestBody$inboundSchema;
|
|
43101
|
+
UpdateVendorCredentialDataRequestBody$.outboundSchema = UpdateVendorCredentialDataRequestBody$outboundSchema;
|
|
43102
|
+
})(UpdateVendorCredentialDataRequestBody$ ||= {});
|
|
43103
|
+
UpdateVendorCredentialDataRequest$inboundSchema = objectType({
|
|
43104
|
+
vendor_id_or_me: stringType(),
|
|
43105
|
+
id: numberType().int(),
|
|
43106
|
+
RequestBody: lazyType(() => UpdateVendorCredentialDataRequestBody$inboundSchema)
|
|
43107
|
+
}).transform((v2) => {
|
|
43108
|
+
return remap(v2, {
|
|
43109
|
+
vendor_id_or_me: "vendorIdOrMe",
|
|
43110
|
+
RequestBody: "requestBody"
|
|
43111
|
+
});
|
|
43112
|
+
});
|
|
43113
|
+
UpdateVendorCredentialDataRequest$outboundSchema = objectType({
|
|
43114
|
+
vendorIdOrMe: stringType(),
|
|
43115
|
+
id: numberType().int(),
|
|
43116
|
+
requestBody: lazyType(() => UpdateVendorCredentialDataRequestBody$outboundSchema)
|
|
43117
|
+
}).transform((v2) => {
|
|
43118
|
+
return remap(v2, {
|
|
43119
|
+
vendorIdOrMe: "vendor_id_or_me",
|
|
43120
|
+
requestBody: "RequestBody"
|
|
43121
|
+
});
|
|
43122
|
+
});
|
|
43123
|
+
((UpdateVendorCredentialDataRequest$) => {
|
|
43124
|
+
UpdateVendorCredentialDataRequest$.inboundSchema = UpdateVendorCredentialDataRequest$inboundSchema;
|
|
43125
|
+
UpdateVendorCredentialDataRequest$.outboundSchema = UpdateVendorCredentialDataRequest$outboundSchema;
|
|
43126
|
+
})(UpdateVendorCredentialDataRequest$ ||= {});
|
|
43127
|
+
});
|
|
43128
|
+
|
|
42943
43129
|
// src/models/operations/updatevendorcredentialfile.ts
|
|
42944
43130
|
var UpdateVendorCredentialFileRequestBody$inboundSchema, UpdateVendorCredentialFileRequestBody$outboundSchema, UpdateVendorCredentialFileRequestBody$, UpdateVendorCredentialFileRequest$inboundSchema, UpdateVendorCredentialFileRequest$outboundSchema, UpdateVendorCredentialFileRequest$;
|
|
42945
43131
|
var init_updatevendorcredentialfile = __esm(() => {
|
|
@@ -43314,6 +43500,7 @@ var init_operations = __esm(() => {
|
|
|
43314
43500
|
init_listvendorscrubpackages();
|
|
43315
43501
|
init_listvendorscrubpurchases();
|
|
43316
43502
|
init_magiclink();
|
|
43503
|
+
init_makepayment();
|
|
43317
43504
|
init_password();
|
|
43318
43505
|
init_passwordresetrequest();
|
|
43319
43506
|
init_postauthenticate();
|
|
@@ -43323,6 +43510,7 @@ var init_operations = __esm(() => {
|
|
|
43323
43510
|
init_submitvendorcredential();
|
|
43324
43511
|
init_updatedatarequest();
|
|
43325
43512
|
init_updatesthewebhookendpointwiththegivenid();
|
|
43513
|
+
init_updatevendorcredentialdata();
|
|
43326
43514
|
init_updatevendorcredentialfile();
|
|
43327
43515
|
init_updatevendordetails();
|
|
43328
43516
|
init_updatevendormanagedbycompany();
|
|
@@ -43855,11 +44043,119 @@ It will update the vendor credential data request attributes`,
|
|
|
43855
44043
|
};
|
|
43856
44044
|
});
|
|
43857
44045
|
|
|
43858
|
-
// src/funcs/
|
|
43859
|
-
function
|
|
44046
|
+
// src/funcs/invoicesMakePayment.ts
|
|
44047
|
+
function invoicesMakePayment(client, request, options) {
|
|
43860
44048
|
return new APIPromise($do5(client, request, options));
|
|
43861
44049
|
}
|
|
43862
44050
|
async function $do5(client, request, options) {
|
|
44051
|
+
const parsed = safeParse(request, (value) => MakePaymentRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44052
|
+
if (!parsed.ok) {
|
|
44053
|
+
return [parsed, { status: "invalid" }];
|
|
44054
|
+
}
|
|
44055
|
+
const payload = parsed.value;
|
|
44056
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
44057
|
+
const pathParams = {
|
|
44058
|
+
id: encodeSimple("id", payload.id, {
|
|
44059
|
+
explode: false,
|
|
44060
|
+
charEncoding: "percent"
|
|
44061
|
+
})
|
|
44062
|
+
};
|
|
44063
|
+
const path = pathToFunc("/invoices/{id}/payment")(pathParams);
|
|
44064
|
+
const headers = new Headers(compactMap({
|
|
44065
|
+
"Content-Type": "application/json",
|
|
44066
|
+
Accept: "application/json"
|
|
44067
|
+
}));
|
|
44068
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
44069
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
44070
|
+
const context = {
|
|
44071
|
+
options: client._options,
|
|
44072
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
44073
|
+
operationID: "makePayment",
|
|
44074
|
+
oAuth2Scopes: [],
|
|
44075
|
+
resolvedSecurity: requestSecurity,
|
|
44076
|
+
securitySource: client._options.security,
|
|
44077
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
44078
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
44079
|
+
};
|
|
44080
|
+
const requestRes = client._createRequest(context, {
|
|
44081
|
+
security: requestSecurity,
|
|
44082
|
+
method: "POST",
|
|
44083
|
+
baseURL: options?.serverURL,
|
|
44084
|
+
path,
|
|
44085
|
+
headers,
|
|
44086
|
+
body,
|
|
44087
|
+
userAgent: client._options.userAgent,
|
|
44088
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
44089
|
+
}, options);
|
|
44090
|
+
if (!requestRes.ok) {
|
|
44091
|
+
return [requestRes, { status: "invalid" }];
|
|
44092
|
+
}
|
|
44093
|
+
const req = requestRes.value;
|
|
44094
|
+
const doResult = await client._do(req, {
|
|
44095
|
+
context,
|
|
44096
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
44097
|
+
retryConfig: context.retryConfig,
|
|
44098
|
+
retryCodes: context.retryCodes
|
|
44099
|
+
});
|
|
44100
|
+
if (!doResult.ok) {
|
|
44101
|
+
return [doResult, { status: "request-error", request: req }];
|
|
44102
|
+
}
|
|
44103
|
+
const response = doResult.value;
|
|
44104
|
+
const responseFields = {
|
|
44105
|
+
HttpMeta: { Response: response, Request: req }
|
|
44106
|
+
};
|
|
44107
|
+
const [result] = await match(json(200, MakePaymentResponseBody$inboundSchema), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
44108
|
+
if (!result.ok) {
|
|
44109
|
+
return [result, { status: "complete", request: req, response }];
|
|
44110
|
+
}
|
|
44111
|
+
return [result, { status: "complete", request: req, response }];
|
|
44112
|
+
}
|
|
44113
|
+
var init_invoicesMakePayment = __esm(() => {
|
|
44114
|
+
init_encodings();
|
|
44115
|
+
init_matchers();
|
|
44116
|
+
init_primitives();
|
|
44117
|
+
init_schemas();
|
|
44118
|
+
init_security();
|
|
44119
|
+
init_url();
|
|
44120
|
+
init_errors2();
|
|
44121
|
+
init_operations();
|
|
44122
|
+
init_async();
|
|
44123
|
+
});
|
|
44124
|
+
|
|
44125
|
+
// src/mcp-server/tools/invoicesMakePayment.ts
|
|
44126
|
+
var args5, tool$invoicesMakePayment;
|
|
44127
|
+
var init_invoicesMakePayment2 = __esm(() => {
|
|
44128
|
+
init_invoicesMakePayment();
|
|
44129
|
+
init_operations();
|
|
44130
|
+
init_tools();
|
|
44131
|
+
args5 = {
|
|
44132
|
+
request: MakePaymentRequest$inboundSchema
|
|
44133
|
+
};
|
|
44134
|
+
tool$invoicesMakePayment = {
|
|
44135
|
+
name: "invoices-make-payment",
|
|
44136
|
+
description: `Make payment for the invoice
|
|
44137
|
+
|
|
44138
|
+
Make payment for the invoice`,
|
|
44139
|
+
args: args5,
|
|
44140
|
+
tool: async (client, args6, ctx) => {
|
|
44141
|
+
const [result, apiCall] = await invoicesMakePayment(client, args6.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44142
|
+
if (!result.ok) {
|
|
44143
|
+
return {
|
|
44144
|
+
content: [{ type: "text", text: result.error.message }],
|
|
44145
|
+
isError: true
|
|
44146
|
+
};
|
|
44147
|
+
}
|
|
44148
|
+
const value = result.value;
|
|
44149
|
+
return formatResult(value, apiCall);
|
|
44150
|
+
}
|
|
44151
|
+
};
|
|
44152
|
+
});
|
|
44153
|
+
|
|
44154
|
+
// src/funcs/organizationsGetFacility.ts
|
|
44155
|
+
function organizationsGetFacility(client, request, options) {
|
|
44156
|
+
return new APIPromise($do6(client, request, options));
|
|
44157
|
+
}
|
|
44158
|
+
async function $do6(client, request, options) {
|
|
43863
44159
|
const parsed = safeParse(request, (value) => GetFacilityRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43864
44160
|
if (!parsed.ok) {
|
|
43865
44161
|
return [parsed, { status: "invalid" }];
|
|
@@ -43935,12 +44231,12 @@ var init_organizationsGetFacility = __esm(() => {
|
|
|
43935
44231
|
});
|
|
43936
44232
|
|
|
43937
44233
|
// src/mcp-server/tools/organizationsGetFacility.ts
|
|
43938
|
-
var
|
|
44234
|
+
var args6, tool$organizationsGetFacility;
|
|
43939
44235
|
var init_organizationsGetFacility2 = __esm(() => {
|
|
43940
44236
|
init_organizationsGetFacility();
|
|
43941
44237
|
init_operations();
|
|
43942
44238
|
init_tools();
|
|
43943
|
-
|
|
44239
|
+
args6 = {
|
|
43944
44240
|
request: GetFacilityRequest$inboundSchema
|
|
43945
44241
|
};
|
|
43946
44242
|
tool$organizationsGetFacility = {
|
|
@@ -43948,9 +44244,9 @@ var init_organizationsGetFacility2 = __esm(() => {
|
|
|
43948
44244
|
description: `Get facility
|
|
43949
44245
|
|
|
43950
44246
|
Retrieve an individual facility.`,
|
|
43951
|
-
args:
|
|
43952
|
-
tool: async (client,
|
|
43953
|
-
const [result, apiCall] = await organizationsGetFacility(client,
|
|
44247
|
+
args: args6,
|
|
44248
|
+
tool: async (client, args7, ctx) => {
|
|
44249
|
+
const [result, apiCall] = await organizationsGetFacility(client, args7.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
43954
44250
|
if (!result.ok) {
|
|
43955
44251
|
return {
|
|
43956
44252
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -43965,9 +44261,9 @@ Retrieve an individual facility.`,
|
|
|
43965
44261
|
|
|
43966
44262
|
// src/funcs/organizationsListOrSearchFacilities.ts
|
|
43967
44263
|
function organizationsListOrSearchFacilities(client, request, options) {
|
|
43968
|
-
return new APIPromise($
|
|
44264
|
+
return new APIPromise($do7(client, request, options));
|
|
43969
44265
|
}
|
|
43970
|
-
async function $
|
|
44266
|
+
async function $do7(client, request, options) {
|
|
43971
44267
|
const parsed = safeParse(request, (value) => ListOrSearchFacilitiesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
43972
44268
|
if (!parsed.ok) {
|
|
43973
44269
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -44083,12 +44379,12 @@ var init_organizationsListOrSearchFacilities = __esm(() => {
|
|
|
44083
44379
|
});
|
|
44084
44380
|
|
|
44085
44381
|
// src/mcp-server/tools/organizationsListOrSearchFacilities.ts
|
|
44086
|
-
var
|
|
44382
|
+
var args7, tool$organizationsListOrSearchFacilities;
|
|
44087
44383
|
var init_organizationsListOrSearchFacilities2 = __esm(() => {
|
|
44088
44384
|
init_organizationsListOrSearchFacilities();
|
|
44089
44385
|
init_operations();
|
|
44090
44386
|
init_tools();
|
|
44091
|
-
|
|
44387
|
+
args7 = {
|
|
44092
44388
|
request: ListOrSearchFacilitiesRequest$inboundSchema
|
|
44093
44389
|
};
|
|
44094
44390
|
tool$organizationsListOrSearchFacilities = {
|
|
@@ -44109,9 +44405,9 @@ Available \`expand\` scopes are:
|
|
|
44109
44405
|
- facility.vendor_policy
|
|
44110
44406
|
- facility.visitor_policy
|
|
44111
44407
|
- facility.workflow`,
|
|
44112
|
-
args:
|
|
44113
|
-
tool: async (client,
|
|
44114
|
-
const [result, apiCall] = await organizationsListOrSearchFacilities(client,
|
|
44408
|
+
args: args7,
|
|
44409
|
+
tool: async (client, args8, ctx) => {
|
|
44410
|
+
const [result, apiCall] = await organizationsListOrSearchFacilities(client, args8.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44115
44411
|
if (!result.ok) {
|
|
44116
44412
|
return {
|
|
44117
44413
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44126,9 +44422,9 @@ Available \`expand\` scopes are:
|
|
|
44126
44422
|
|
|
44127
44423
|
// src/funcs/supportArticlesGetSupportArticle.ts
|
|
44128
44424
|
function supportArticlesGetSupportArticle(client, request, options) {
|
|
44129
|
-
return new APIPromise($
|
|
44425
|
+
return new APIPromise($do8(client, request, options));
|
|
44130
44426
|
}
|
|
44131
|
-
async function $
|
|
44427
|
+
async function $do8(client, request, options) {
|
|
44132
44428
|
const parsed = safeParse(request, (value) => GetSupportArticleRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44133
44429
|
if (!parsed.ok) {
|
|
44134
44430
|
return [parsed, { status: "invalid" }];
|
|
@@ -44208,12 +44504,12 @@ var init_supportArticlesGetSupportArticle = __esm(() => {
|
|
|
44208
44504
|
});
|
|
44209
44505
|
|
|
44210
44506
|
// src/mcp-server/tools/supportArticlesGetSupportArticle.ts
|
|
44211
|
-
var
|
|
44507
|
+
var args8, tool$supportArticlesGetSupportArticle;
|
|
44212
44508
|
var init_supportArticlesGetSupportArticle2 = __esm(() => {
|
|
44213
44509
|
init_supportArticlesGetSupportArticle();
|
|
44214
44510
|
init_operations();
|
|
44215
44511
|
init_tools();
|
|
44216
|
-
|
|
44512
|
+
args8 = {
|
|
44217
44513
|
request: GetSupportArticleRequest$inboundSchema
|
|
44218
44514
|
};
|
|
44219
44515
|
tool$supportArticlesGetSupportArticle = {
|
|
@@ -44228,9 +44524,9 @@ Available \`expand\` scopes are:
|
|
|
44228
44524
|
- support_article.published
|
|
44229
44525
|
- support_article.notes
|
|
44230
44526
|
- support_article.support_category`,
|
|
44231
|
-
args:
|
|
44232
|
-
tool: async (client,
|
|
44233
|
-
const [result, apiCall] = await supportArticlesGetSupportArticle(client,
|
|
44527
|
+
args: args8,
|
|
44528
|
+
tool: async (client, args9, ctx) => {
|
|
44529
|
+
const [result, apiCall] = await supportArticlesGetSupportArticle(client, args9.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44234
44530
|
if (!result.ok) {
|
|
44235
44531
|
return {
|
|
44236
44532
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44245,9 +44541,9 @@ Available \`expand\` scopes are:
|
|
|
44245
44541
|
|
|
44246
44542
|
// src/funcs/supportArticlesListOrSearchSupportArticles.ts
|
|
44247
44543
|
function supportArticlesListOrSearchSupportArticles(client, request, options) {
|
|
44248
|
-
return new APIPromise($
|
|
44544
|
+
return new APIPromise($do9(client, request, options));
|
|
44249
44545
|
}
|
|
44250
|
-
async function $
|
|
44546
|
+
async function $do9(client, request, options) {
|
|
44251
44547
|
const parsed = safeParse(request, (value) => ListOrSearchSupportArticlesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44252
44548
|
if (!parsed.ok) {
|
|
44253
44549
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -44357,12 +44653,12 @@ var init_supportArticlesListOrSearchSupportArticles = __esm(() => {
|
|
|
44357
44653
|
});
|
|
44358
44654
|
|
|
44359
44655
|
// src/mcp-server/tools/supportArticlesListOrSearchSupportArticles.ts
|
|
44360
|
-
var
|
|
44656
|
+
var args9, tool$supportArticlesListOrSearchSupportArticles;
|
|
44361
44657
|
var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
|
|
44362
44658
|
init_supportArticlesListOrSearchSupportArticles();
|
|
44363
44659
|
init_operations();
|
|
44364
44660
|
init_tools();
|
|
44365
|
-
|
|
44661
|
+
args9 = {
|
|
44366
44662
|
request: ListOrSearchSupportArticlesRequest$inboundSchema
|
|
44367
44663
|
};
|
|
44368
44664
|
tool$supportArticlesListOrSearchSupportArticles = {
|
|
@@ -44370,9 +44666,9 @@ var init_supportArticlesListOrSearchSupportArticles2 = __esm(() => {
|
|
|
44370
44666
|
description: `List or search support articles
|
|
44371
44667
|
|
|
44372
44668
|
List or search support articles for FAQ.`,
|
|
44373
|
-
args:
|
|
44374
|
-
tool: async (client,
|
|
44375
|
-
const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client,
|
|
44669
|
+
args: args9,
|
|
44670
|
+
tool: async (client, args10, ctx) => {
|
|
44671
|
+
const [result, apiCall] = await supportArticlesListOrSearchSupportArticles(client, args10.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44376
44672
|
if (!result.ok) {
|
|
44377
44673
|
return {
|
|
44378
44674
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44387,9 +44683,9 @@ List or search support articles for FAQ.`,
|
|
|
44387
44683
|
|
|
44388
44684
|
// src/funcs/usersChangePassword.ts
|
|
44389
44685
|
function usersChangePassword(client, request, options) {
|
|
44390
|
-
return new APIPromise($
|
|
44686
|
+
return new APIPromise($do10(client, request, options));
|
|
44391
44687
|
}
|
|
44392
|
-
async function $
|
|
44688
|
+
async function $do10(client, request, options) {
|
|
44393
44689
|
const parsed = safeParse(request, (value) => ChangePasswordRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44394
44690
|
if (!parsed.ok) {
|
|
44395
44691
|
return [parsed, { status: "invalid" }];
|
|
@@ -44465,12 +44761,12 @@ var init_usersChangePassword = __esm(() => {
|
|
|
44465
44761
|
});
|
|
44466
44762
|
|
|
44467
44763
|
// src/mcp-server/tools/usersChangePassword.ts
|
|
44468
|
-
var
|
|
44764
|
+
var args10, tool$usersChangePassword;
|
|
44469
44765
|
var init_usersChangePassword2 = __esm(() => {
|
|
44470
44766
|
init_usersChangePassword();
|
|
44471
44767
|
init_operations();
|
|
44472
44768
|
init_tools();
|
|
44473
|
-
|
|
44769
|
+
args10 = {
|
|
44474
44770
|
request: ChangePasswordRequest$inboundSchema
|
|
44475
44771
|
};
|
|
44476
44772
|
tool$usersChangePassword = {
|
|
@@ -44478,9 +44774,9 @@ var init_usersChangePassword2 = __esm(() => {
|
|
|
44478
44774
|
description: `Change password
|
|
44479
44775
|
|
|
44480
44776
|
Change the user's password to the new passed as parameter`,
|
|
44481
|
-
args:
|
|
44482
|
-
tool: async (client,
|
|
44483
|
-
const [result, apiCall] = await usersChangePassword(client,
|
|
44777
|
+
args: args10,
|
|
44778
|
+
tool: async (client, args11, ctx) => {
|
|
44779
|
+
const [result, apiCall] = await usersChangePassword(client, args11.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44484
44780
|
if (!result.ok) {
|
|
44485
44781
|
return {
|
|
44486
44782
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44495,9 +44791,9 @@ Change the user's password to the new passed as parameter`,
|
|
|
44495
44791
|
|
|
44496
44792
|
// src/funcs/usersGetCurrentUser.ts
|
|
44497
44793
|
function usersGetCurrentUser(client, options) {
|
|
44498
|
-
return new APIPromise($
|
|
44794
|
+
return new APIPromise($do11(client, options));
|
|
44499
44795
|
}
|
|
44500
|
-
async function $
|
|
44796
|
+
async function $do11(client, options) {
|
|
44501
44797
|
const path = pathToFunc("/users/me")();
|
|
44502
44798
|
const headers = new Headers(compactMap({
|
|
44503
44799
|
Accept: "application/json"
|
|
@@ -44582,9 +44878,9 @@ Returns a user object for the user represented by the authorization token`,
|
|
|
44582
44878
|
|
|
44583
44879
|
// src/funcs/usersGetUserById.ts
|
|
44584
44880
|
function usersGetUserById(client, request, options) {
|
|
44585
|
-
return new APIPromise($
|
|
44881
|
+
return new APIPromise($do12(client, request, options));
|
|
44586
44882
|
}
|
|
44587
|
-
async function $
|
|
44883
|
+
async function $do12(client, request, options) {
|
|
44588
44884
|
const parsed = safeParse(request, (value) => GetUserByIdRequest$outboundSchema.parse(value), "Input validation failed");
|
|
44589
44885
|
if (!parsed.ok) {
|
|
44590
44886
|
return [parsed, { status: "invalid" }];
|
|
@@ -44660,12 +44956,12 @@ var init_usersGetUserById = __esm(() => {
|
|
|
44660
44956
|
});
|
|
44661
44957
|
|
|
44662
44958
|
// src/mcp-server/tools/usersGetUserById.ts
|
|
44663
|
-
var
|
|
44959
|
+
var args11, tool$usersGetUserById;
|
|
44664
44960
|
var init_usersGetUserById2 = __esm(() => {
|
|
44665
44961
|
init_usersGetUserById();
|
|
44666
44962
|
init_operations();
|
|
44667
44963
|
init_tools();
|
|
44668
|
-
|
|
44964
|
+
args11 = {
|
|
44669
44965
|
request: GetUserByIdRequest$inboundSchema
|
|
44670
44966
|
};
|
|
44671
44967
|
tool$usersGetUserById = {
|
|
@@ -44673,9 +44969,9 @@ var init_usersGetUserById2 = __esm(() => {
|
|
|
44673
44969
|
description: `Get user by id
|
|
44674
44970
|
|
|
44675
44971
|
Returns a user object for the user represented by the identifier in the path.`,
|
|
44676
|
-
args:
|
|
44677
|
-
tool: async (client,
|
|
44678
|
-
const [result, apiCall] = await usersGetUserById(client,
|
|
44972
|
+
args: args11,
|
|
44973
|
+
tool: async (client, args12, ctx) => {
|
|
44974
|
+
const [result, apiCall] = await usersGetUserById(client, args12.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44679
44975
|
if (!result.ok) {
|
|
44680
44976
|
return {
|
|
44681
44977
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44690,9 +44986,9 @@ Returns a user object for the user represented by the identifier in the path.`,
|
|
|
44690
44986
|
|
|
44691
44987
|
// src/funcs/usersMagiclink.ts
|
|
44692
44988
|
function usersMagiclink(client, request, options) {
|
|
44693
|
-
return new APIPromise($
|
|
44989
|
+
return new APIPromise($do13(client, request, options));
|
|
44694
44990
|
}
|
|
44695
|
-
async function $
|
|
44991
|
+
async function $do13(client, request, options) {
|
|
44696
44992
|
const parsed = safeParse(request, (value) => MagiclinkRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44697
44993
|
if (!parsed.ok) {
|
|
44698
44994
|
return [parsed, { status: "invalid" }];
|
|
@@ -44762,12 +45058,12 @@ var init_usersMagiclink = __esm(() => {
|
|
|
44762
45058
|
});
|
|
44763
45059
|
|
|
44764
45060
|
// src/mcp-server/tools/usersMagiclink.ts
|
|
44765
|
-
var
|
|
45061
|
+
var args12, tool$usersMagiclink;
|
|
44766
45062
|
var init_usersMagiclink2 = __esm(() => {
|
|
44767
45063
|
init_usersMagiclink();
|
|
44768
45064
|
init_operations();
|
|
44769
45065
|
init_tools();
|
|
44770
|
-
|
|
45066
|
+
args12 = {
|
|
44771
45067
|
request: MagiclinkRequestBody$inboundSchema
|
|
44772
45068
|
};
|
|
44773
45069
|
tool$usersMagiclink = {
|
|
@@ -44775,9 +45071,9 @@ var init_usersMagiclink2 = __esm(() => {
|
|
|
44775
45071
|
description: `Magic link
|
|
44776
45072
|
|
|
44777
45073
|
It sends an email with a magic link to allow the user to log in.`,
|
|
44778
|
-
args:
|
|
44779
|
-
tool: async (client,
|
|
44780
|
-
const [result, apiCall] = await usersMagiclink(client,
|
|
45074
|
+
args: args12,
|
|
45075
|
+
tool: async (client, args13, ctx) => {
|
|
45076
|
+
const [result, apiCall] = await usersMagiclink(client, args13.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44781
45077
|
if (!result.ok) {
|
|
44782
45078
|
return {
|
|
44783
45079
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44792,9 +45088,9 @@ It sends an email with a magic link to allow the user to log in.`,
|
|
|
44792
45088
|
|
|
44793
45089
|
// src/funcs/usersPassword.ts
|
|
44794
45090
|
function usersPassword(client, request, options) {
|
|
44795
|
-
return new APIPromise($
|
|
45091
|
+
return new APIPromise($do14(client, request, options));
|
|
44796
45092
|
}
|
|
44797
|
-
async function $
|
|
45093
|
+
async function $do14(client, request, options) {
|
|
44798
45094
|
const parsed = safeParse(request, (value) => PasswordRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44799
45095
|
if (!parsed.ok) {
|
|
44800
45096
|
return [parsed, { status: "invalid" }];
|
|
@@ -44864,12 +45160,12 @@ var init_usersPassword = __esm(() => {
|
|
|
44864
45160
|
});
|
|
44865
45161
|
|
|
44866
45162
|
// src/mcp-server/tools/usersPassword.ts
|
|
44867
|
-
var
|
|
45163
|
+
var args13, tool$usersPassword;
|
|
44868
45164
|
var init_usersPassword2 = __esm(() => {
|
|
44869
45165
|
init_usersPassword();
|
|
44870
45166
|
init_operations();
|
|
44871
45167
|
init_tools();
|
|
44872
|
-
|
|
45168
|
+
args13 = {
|
|
44873
45169
|
request: PasswordRequestBody$inboundSchema
|
|
44874
45170
|
};
|
|
44875
45171
|
tool$usersPassword = {
|
|
@@ -44878,9 +45174,9 @@ var init_usersPassword2 = __esm(() => {
|
|
|
44878
45174
|
|
|
44879
45175
|
Resets the a user's password using a password_reset_id that was sent to them via email.
|
|
44880
45176
|
See /users/passwordresetrequest to initiate a password reset flow.`,
|
|
44881
|
-
args:
|
|
44882
|
-
tool: async (client,
|
|
44883
|
-
const [result, apiCall] = await usersPassword(client,
|
|
45177
|
+
args: args13,
|
|
45178
|
+
tool: async (client, args14, ctx) => {
|
|
45179
|
+
const [result, apiCall] = await usersPassword(client, args14.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44884
45180
|
if (!result.ok) {
|
|
44885
45181
|
return {
|
|
44886
45182
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44895,9 +45191,9 @@ See /users/passwordresetrequest to initiate a password reset flow.`,
|
|
|
44895
45191
|
|
|
44896
45192
|
// src/funcs/usersPasswordResetRequest.ts
|
|
44897
45193
|
function usersPasswordResetRequest(client, request, options) {
|
|
44898
|
-
return new APIPromise($
|
|
45194
|
+
return new APIPromise($do15(client, request, options));
|
|
44899
45195
|
}
|
|
44900
|
-
async function $
|
|
45196
|
+
async function $do15(client, request, options) {
|
|
44901
45197
|
const parsed = safeParse(request, (value) => PasswordResetRequestRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
44902
45198
|
if (!parsed.ok) {
|
|
44903
45199
|
return [parsed, { status: "invalid" }];
|
|
@@ -44967,12 +45263,12 @@ var init_usersPasswordResetRequest = __esm(() => {
|
|
|
44967
45263
|
});
|
|
44968
45264
|
|
|
44969
45265
|
// src/mcp-server/tools/usersPasswordResetRequest.ts
|
|
44970
|
-
var
|
|
45266
|
+
var args14, tool$usersPasswordResetRequest;
|
|
44971
45267
|
var init_usersPasswordResetRequest2 = __esm(() => {
|
|
44972
45268
|
init_usersPasswordResetRequest();
|
|
44973
45269
|
init_operations();
|
|
44974
45270
|
init_tools();
|
|
44975
|
-
|
|
45271
|
+
args14 = {
|
|
44976
45272
|
request: PasswordResetRequestRequestBody$inboundSchema
|
|
44977
45273
|
};
|
|
44978
45274
|
tool$usersPasswordResetRequest = {
|
|
@@ -44980,9 +45276,9 @@ var init_usersPasswordResetRequest2 = __esm(() => {
|
|
|
44980
45276
|
description: `Password reset request
|
|
44981
45277
|
|
|
44982
45278
|
It sends an email with a link for resetting a user's password.`,
|
|
44983
|
-
args:
|
|
44984
|
-
tool: async (client,
|
|
44985
|
-
const [result, apiCall] = await usersPasswordResetRequest(client,
|
|
45279
|
+
args: args14,
|
|
45280
|
+
tool: async (client, args15, ctx) => {
|
|
45281
|
+
const [result, apiCall] = await usersPasswordResetRequest(client, args15.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
44986
45282
|
if (!result.ok) {
|
|
44987
45283
|
return {
|
|
44988
45284
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -44997,9 +45293,9 @@ It sends an email with a link for resetting a user's password.`,
|
|
|
44997
45293
|
|
|
44998
45294
|
// src/funcs/usersPostAuthenticate.ts
|
|
44999
45295
|
function usersPostAuthenticate(client, request, options) {
|
|
45000
|
-
return new APIPromise($
|
|
45296
|
+
return new APIPromise($do16(client, request, options));
|
|
45001
45297
|
}
|
|
45002
|
-
async function $
|
|
45298
|
+
async function $do16(client, request, options) {
|
|
45003
45299
|
const parsed = safeParse(request, (value) => PostAuthenticateRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
45004
45300
|
if (!parsed.ok) {
|
|
45005
45301
|
return [parsed, { status: "invalid" }];
|
|
@@ -45065,12 +45361,12 @@ var init_usersPostAuthenticate = __esm(() => {
|
|
|
45065
45361
|
});
|
|
45066
45362
|
|
|
45067
45363
|
// src/mcp-server/tools/usersPostAuthenticate.ts
|
|
45068
|
-
var
|
|
45364
|
+
var args15, tool$usersPostAuthenticate;
|
|
45069
45365
|
var init_usersPostAuthenticate2 = __esm(() => {
|
|
45070
45366
|
init_usersPostAuthenticate();
|
|
45071
45367
|
init_operations();
|
|
45072
45368
|
init_tools();
|
|
45073
|
-
|
|
45369
|
+
args15 = {
|
|
45074
45370
|
request: PostAuthenticateRequestBody$inboundSchema
|
|
45075
45371
|
};
|
|
45076
45372
|
tool$usersPostAuthenticate = {
|
|
@@ -45108,9 +45404,9 @@ Requires: \`saml_login\`
|
|
|
45108
45404
|
3. Site redirects to your selected \`return_url\`
|
|
45109
45405
|
4. The \`user_token\` will be appended as a query string parameter to your \`return_url\` - you must parse this token and store it
|
|
45110
45406
|
5. Fetch the user object from \`/users/me\` using the token`,
|
|
45111
|
-
args:
|
|
45112
|
-
tool: async (client,
|
|
45113
|
-
const [result, apiCall] = await usersPostAuthenticate(client,
|
|
45407
|
+
args: args15,
|
|
45408
|
+
tool: async (client, args16, ctx) => {
|
|
45409
|
+
const [result, apiCall] = await usersPostAuthenticate(client, args16.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45114
45410
|
if (!result.ok) {
|
|
45115
45411
|
return {
|
|
45116
45412
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45125,9 +45421,9 @@ Requires: \`saml_login\`
|
|
|
45125
45421
|
|
|
45126
45422
|
// src/funcs/vendorsAddVendorCredentialFile.ts
|
|
45127
45423
|
function vendorsAddVendorCredentialFile(client, request, options) {
|
|
45128
|
-
return new APIPromise($
|
|
45424
|
+
return new APIPromise($do17(client, request, options));
|
|
45129
45425
|
}
|
|
45130
|
-
async function $
|
|
45426
|
+
async function $do17(client, request, options) {
|
|
45131
45427
|
const parsed = safeParse(request, (value) => AddVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45132
45428
|
if (!parsed.ok) {
|
|
45133
45429
|
return [parsed, { status: "invalid" }];
|
|
@@ -45200,12 +45496,12 @@ var init_vendorsAddVendorCredentialFile = __esm(() => {
|
|
|
45200
45496
|
});
|
|
45201
45497
|
|
|
45202
45498
|
// src/mcp-server/tools/vendorsAddVendorCredentialFile.ts
|
|
45203
|
-
var
|
|
45499
|
+
var args16, tool$vendorsAddVendorCredentialFile;
|
|
45204
45500
|
var init_vendorsAddVendorCredentialFile2 = __esm(() => {
|
|
45205
45501
|
init_vendorsAddVendorCredentialFile();
|
|
45206
45502
|
init_operations();
|
|
45207
45503
|
init_tools();
|
|
45208
|
-
|
|
45504
|
+
args16 = {
|
|
45209
45505
|
request: AddVendorCredentialFileRequest$inboundSchema
|
|
45210
45506
|
};
|
|
45211
45507
|
tool$vendorsAddVendorCredentialFile = {
|
|
@@ -45213,9 +45509,9 @@ var init_vendorsAddVendorCredentialFile2 = __esm(() => {
|
|
|
45213
45509
|
description: `Add vendor credential file
|
|
45214
45510
|
|
|
45215
45511
|
It will add a new vendor credential file`,
|
|
45216
|
-
args:
|
|
45217
|
-
tool: async (client,
|
|
45218
|
-
const [result, apiCall] = await vendorsAddVendorCredentialFile(client,
|
|
45512
|
+
args: args16,
|
|
45513
|
+
tool: async (client, args17, ctx) => {
|
|
45514
|
+
const [result, apiCall] = await vendorsAddVendorCredentialFile(client, args17.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45219
45515
|
if (!result.ok) {
|
|
45220
45516
|
return {
|
|
45221
45517
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45230,9 +45526,9 @@ It will add a new vendor credential file`,
|
|
|
45230
45526
|
|
|
45231
45527
|
// src/funcs/vendorsAddVendorManagedByCompany.ts
|
|
45232
45528
|
function vendorsAddVendorManagedByCompany(client, request, options) {
|
|
45233
|
-
return new APIPromise($
|
|
45529
|
+
return new APIPromise($do18(client, request, options));
|
|
45234
45530
|
}
|
|
45235
|
-
async function $
|
|
45531
|
+
async function $do18(client, request, options) {
|
|
45236
45532
|
const parsed = safeParse(request, (value) => AddVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45237
45533
|
if (!parsed.ok) {
|
|
45238
45534
|
return [parsed, { status: "invalid" }];
|
|
@@ -45308,12 +45604,12 @@ var init_vendorsAddVendorManagedByCompany = __esm(() => {
|
|
|
45308
45604
|
});
|
|
45309
45605
|
|
|
45310
45606
|
// src/mcp-server/tools/vendorsAddVendorManagedByCompany.ts
|
|
45311
|
-
var
|
|
45607
|
+
var args17, tool$vendorsAddVendorManagedByCompany;
|
|
45312
45608
|
var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
|
|
45313
45609
|
init_vendorsAddVendorManagedByCompany();
|
|
45314
45610
|
init_operations();
|
|
45315
45611
|
init_tools();
|
|
45316
|
-
|
|
45612
|
+
args17 = {
|
|
45317
45613
|
request: AddVendorManagedByCompanyRequest$inboundSchema
|
|
45318
45614
|
};
|
|
45319
45615
|
tool$vendorsAddVendorManagedByCompany = {
|
|
@@ -45321,9 +45617,9 @@ var init_vendorsAddVendorManagedByCompany2 = __esm(() => {
|
|
|
45321
45617
|
description: `Add vendor managed by company
|
|
45322
45618
|
|
|
45323
45619
|
It will add a vendor managed by company`,
|
|
45324
|
-
args:
|
|
45325
|
-
tool: async (client,
|
|
45326
|
-
const [result, apiCall] = await vendorsAddVendorManagedByCompany(client,
|
|
45620
|
+
args: args17,
|
|
45621
|
+
tool: async (client, args18, ctx) => {
|
|
45622
|
+
const [result, apiCall] = await vendorsAddVendorManagedByCompany(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45327
45623
|
if (!result.ok) {
|
|
45328
45624
|
return {
|
|
45329
45625
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45338,9 +45634,9 @@ It will add a vendor managed by company`,
|
|
|
45338
45634
|
|
|
45339
45635
|
// src/funcs/vendorScansVendorScanOut.ts
|
|
45340
45636
|
function vendorScansVendorScanOut(client, request, options) {
|
|
45341
|
-
return new APIPromise($
|
|
45637
|
+
return new APIPromise($do19(client, request, options));
|
|
45342
45638
|
}
|
|
45343
|
-
async function $
|
|
45639
|
+
async function $do19(client, request, options) {
|
|
45344
45640
|
const parsed = safeParse(request, (value) => VendorScanOutRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45345
45641
|
if (!parsed.ok) {
|
|
45346
45642
|
return [parsed, { status: "invalid" }];
|
|
@@ -45415,12 +45711,12 @@ var init_vendorScansVendorScanOut = __esm(() => {
|
|
|
45415
45711
|
});
|
|
45416
45712
|
|
|
45417
45713
|
// src/mcp-server/tools/vendorScansVendorScanOut.ts
|
|
45418
|
-
var
|
|
45714
|
+
var args18, tool$vendorScansVendorScanOut;
|
|
45419
45715
|
var init_vendorScansVendorScanOut2 = __esm(() => {
|
|
45420
45716
|
init_vendorScansVendorScanOut();
|
|
45421
45717
|
init_operations();
|
|
45422
45718
|
init_tools();
|
|
45423
|
-
|
|
45719
|
+
args18 = {
|
|
45424
45720
|
request: VendorScanOutRequest$inboundSchema
|
|
45425
45721
|
};
|
|
45426
45722
|
tool$vendorScansVendorScanOut = {
|
|
@@ -45428,9 +45724,9 @@ var init_vendorScansVendorScanOut2 = __esm(() => {
|
|
|
45428
45724
|
description: `Vendor scan out
|
|
45429
45725
|
|
|
45430
45726
|
It scans out vendor from facility`,
|
|
45431
|
-
args:
|
|
45432
|
-
tool: async (client,
|
|
45433
|
-
const [result, apiCall] = await vendorScansVendorScanOut(client,
|
|
45727
|
+
args: args18,
|
|
45728
|
+
tool: async (client, args19, ctx) => {
|
|
45729
|
+
const [result, apiCall] = await vendorScansVendorScanOut(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45434
45730
|
if (!result.ok) {
|
|
45435
45731
|
return {
|
|
45436
45732
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45445,9 +45741,9 @@ It scans out vendor from facility`,
|
|
|
45445
45741
|
|
|
45446
45742
|
// src/funcs/vendorsCheckDownloadCode.ts
|
|
45447
45743
|
function vendorsCheckDownloadCode(client, request, options) {
|
|
45448
|
-
return new APIPromise($
|
|
45744
|
+
return new APIPromise($do20(client, request, options));
|
|
45449
45745
|
}
|
|
45450
|
-
async function $
|
|
45746
|
+
async function $do20(client, request, options) {
|
|
45451
45747
|
const parsed = safeParse(request, (value) => CheckDownloadCodeRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45452
45748
|
if (!parsed.ok) {
|
|
45453
45749
|
return [parsed, { status: "invalid" }];
|
|
@@ -45523,12 +45819,12 @@ var init_vendorsCheckDownloadCode = __esm(() => {
|
|
|
45523
45819
|
});
|
|
45524
45820
|
|
|
45525
45821
|
// src/mcp-server/tools/vendorsCheckDownloadCode.ts
|
|
45526
|
-
var
|
|
45822
|
+
var args19, tool$vendorsCheckDownloadCode;
|
|
45527
45823
|
var init_vendorsCheckDownloadCode2 = __esm(() => {
|
|
45528
45824
|
init_vendorsCheckDownloadCode();
|
|
45529
45825
|
init_operations();
|
|
45530
45826
|
init_tools();
|
|
45531
|
-
|
|
45827
|
+
args19 = {
|
|
45532
45828
|
request: CheckDownloadCodeRequest$inboundSchema
|
|
45533
45829
|
};
|
|
45534
45830
|
tool$vendorsCheckDownloadCode = {
|
|
@@ -45536,9 +45832,9 @@ var init_vendorsCheckDownloadCode2 = __esm(() => {
|
|
|
45536
45832
|
description: `Check download code for vendor credential
|
|
45537
45833
|
|
|
45538
45834
|
It will check download code for vendor credential`,
|
|
45539
|
-
args:
|
|
45540
|
-
tool: async (client,
|
|
45541
|
-
const [result, apiCall] = await vendorsCheckDownloadCode(client,
|
|
45835
|
+
args: args19,
|
|
45836
|
+
tool: async (client, args20, ctx) => {
|
|
45837
|
+
const [result, apiCall] = await vendorsCheckDownloadCode(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45542
45838
|
if (!result.ok) {
|
|
45543
45839
|
return {
|
|
45544
45840
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45553,9 +45849,9 @@ It will check download code for vendor credential`,
|
|
|
45553
45849
|
|
|
45554
45850
|
// src/funcs/vendorsCreateNewVendorCredentialVersion.ts
|
|
45555
45851
|
function vendorsCreateNewVendorCredentialVersion(client, request, options) {
|
|
45556
|
-
return new APIPromise($
|
|
45852
|
+
return new APIPromise($do21(client, request, options));
|
|
45557
45853
|
}
|
|
45558
|
-
async function $
|
|
45854
|
+
async function $do21(client, request, options) {
|
|
45559
45855
|
const parsed = safeParse(request, (value) => CreateNewVendorCredentialVersionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
45560
45856
|
if (!parsed.ok) {
|
|
45561
45857
|
return [parsed, { status: "invalid" }];
|
|
@@ -45625,12 +45921,12 @@ var init_vendorsCreateNewVendorCredentialVersion = __esm(() => {
|
|
|
45625
45921
|
});
|
|
45626
45922
|
|
|
45627
45923
|
// src/mcp-server/tools/vendorsCreateNewVendorCredentialVersion.ts
|
|
45628
|
-
var
|
|
45924
|
+
var args20, tool$vendorsCreateNewVendorCredentialVersion;
|
|
45629
45925
|
var init_vendorsCreateNewVendorCredentialVersion2 = __esm(() => {
|
|
45630
45926
|
init_vendorsCreateNewVendorCredentialVersion();
|
|
45631
45927
|
init_operations();
|
|
45632
45928
|
init_tools();
|
|
45633
|
-
|
|
45929
|
+
args20 = {
|
|
45634
45930
|
request: CreateNewVendorCredentialVersionRequestBody$inboundSchema
|
|
45635
45931
|
};
|
|
45636
45932
|
tool$vendorsCreateNewVendorCredentialVersion = {
|
|
@@ -45638,9 +45934,9 @@ var init_vendorsCreateNewVendorCredentialVersion2 = __esm(() => {
|
|
|
45638
45934
|
description: `Create new vendor credential version
|
|
45639
45935
|
|
|
45640
45936
|
It will submit vendor credential`,
|
|
45641
|
-
args:
|
|
45642
|
-
tool: async (client,
|
|
45643
|
-
const [result, apiCall] = await vendorsCreateNewVendorCredentialVersion(client,
|
|
45937
|
+
args: args20,
|
|
45938
|
+
tool: async (client, args21, ctx) => {
|
|
45939
|
+
const [result, apiCall] = await vendorsCreateNewVendorCredentialVersion(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45644
45940
|
if (!result.ok) {
|
|
45645
45941
|
return {
|
|
45646
45942
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45655,9 +45951,9 @@ It will submit vendor credential`,
|
|
|
45655
45951
|
|
|
45656
45952
|
// src/funcs/vendorsCreateOrUpdateBcr.ts
|
|
45657
45953
|
function vendorsCreateOrUpdateBcr(client, request, options) {
|
|
45658
|
-
return new APIPromise($
|
|
45954
|
+
return new APIPromise($do22(client, request, options));
|
|
45659
45955
|
}
|
|
45660
|
-
async function $
|
|
45956
|
+
async function $do22(client, request, options) {
|
|
45661
45957
|
const parsed = safeParse(request, (value) => CreateOrUpdateBcrRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45662
45958
|
if (!parsed.ok) {
|
|
45663
45959
|
return [parsed, { status: "invalid" }];
|
|
@@ -45731,12 +46027,12 @@ var init_vendorsCreateOrUpdateBcr = __esm(() => {
|
|
|
45731
46027
|
});
|
|
45732
46028
|
|
|
45733
46029
|
// src/mcp-server/tools/vendorsCreateOrUpdateBcr.ts
|
|
45734
|
-
var
|
|
46030
|
+
var args21, tool$vendorsCreateOrUpdateBcr;
|
|
45735
46031
|
var init_vendorsCreateOrUpdateBcr2 = __esm(() => {
|
|
45736
46032
|
init_vendorsCreateOrUpdateBcr();
|
|
45737
46033
|
init_operations();
|
|
45738
46034
|
init_tools();
|
|
45739
|
-
|
|
46035
|
+
args21 = {
|
|
45740
46036
|
request: CreateOrUpdateBcrRequest$inboundSchema
|
|
45741
46037
|
};
|
|
45742
46038
|
tool$vendorsCreateOrUpdateBcr = {
|
|
@@ -45744,9 +46040,9 @@ var init_vendorsCreateOrUpdateBcr2 = __esm(() => {
|
|
|
45744
46040
|
description: `Create or update BackgroundCheckResults
|
|
45745
46041
|
|
|
45746
46042
|
It will create or update BackgroundCheckResults`,
|
|
45747
|
-
args:
|
|
45748
|
-
tool: async (client,
|
|
45749
|
-
const [result, apiCall] = await vendorsCreateOrUpdateBcr(client,
|
|
46043
|
+
args: args21,
|
|
46044
|
+
tool: async (client, args22, ctx) => {
|
|
46045
|
+
const [result, apiCall] = await vendorsCreateOrUpdateBcr(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45750
46046
|
if (!result.ok) {
|
|
45751
46047
|
return {
|
|
45752
46048
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45761,9 +46057,9 @@ It will create or update BackgroundCheckResults`,
|
|
|
45761
46057
|
|
|
45762
46058
|
// src/funcs/vendorsCreateVendorCompany.ts
|
|
45763
46059
|
function vendorsCreateVendorCompany(client, request, options) {
|
|
45764
|
-
return new APIPromise($
|
|
46060
|
+
return new APIPromise($do23(client, request, options));
|
|
45765
46061
|
}
|
|
45766
|
-
async function $
|
|
46062
|
+
async function $do23(client, request, options) {
|
|
45767
46063
|
const parsed = safeParse(request, (value) => CreateVendorCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45768
46064
|
if (!parsed.ok) {
|
|
45769
46065
|
return [parsed, { status: "invalid" }];
|
|
@@ -45839,12 +46135,12 @@ var init_vendorsCreateVendorCompany = __esm(() => {
|
|
|
45839
46135
|
});
|
|
45840
46136
|
|
|
45841
46137
|
// src/mcp-server/tools/vendorsCreateVendorCompany.ts
|
|
45842
|
-
var
|
|
46138
|
+
var args22, tool$vendorsCreateVendorCompany;
|
|
45843
46139
|
var init_vendorsCreateVendorCompany2 = __esm(() => {
|
|
45844
46140
|
init_vendorsCreateVendorCompany();
|
|
45845
46141
|
init_operations();
|
|
45846
46142
|
init_tools();
|
|
45847
|
-
|
|
46143
|
+
args22 = {
|
|
45848
46144
|
request: CreateVendorCompanyRequest$inboundSchema
|
|
45849
46145
|
};
|
|
45850
46146
|
tool$vendorsCreateVendorCompany = {
|
|
@@ -45852,9 +46148,9 @@ var init_vendorsCreateVendorCompany2 = __esm(() => {
|
|
|
45852
46148
|
description: `Create vendor company
|
|
45853
46149
|
|
|
45854
46150
|
Create vendor company`,
|
|
45855
|
-
args:
|
|
45856
|
-
tool: async (client,
|
|
45857
|
-
const [result, apiCall] = await vendorsCreateVendorCompany(client,
|
|
46151
|
+
args: args22,
|
|
46152
|
+
tool: async (client, args23, ctx) => {
|
|
46153
|
+
const [result, apiCall] = await vendorsCreateVendorCompany(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45858
46154
|
if (!result.ok) {
|
|
45859
46155
|
return {
|
|
45860
46156
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45869,9 +46165,9 @@ Create vendor company`,
|
|
|
45869
46165
|
|
|
45870
46166
|
// src/funcs/vendorsCreateVendorRegistration.ts
|
|
45871
46167
|
function vendorsCreateVendorRegistration(client, request, options) {
|
|
45872
|
-
return new APIPromise($
|
|
46168
|
+
return new APIPromise($do24(client, request, options));
|
|
45873
46169
|
}
|
|
45874
|
-
async function $
|
|
46170
|
+
async function $do24(client, request, options) {
|
|
45875
46171
|
const parsed = safeParse(request, (value) => CreateVendorRegistrationRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
45876
46172
|
if (!parsed.ok) {
|
|
45877
46173
|
return [parsed, { status: "invalid" }];
|
|
@@ -45938,12 +46234,12 @@ var init_vendorsCreateVendorRegistration = __esm(() => {
|
|
|
45938
46234
|
});
|
|
45939
46235
|
|
|
45940
46236
|
// src/mcp-server/tools/vendorsCreateVendorRegistration.ts
|
|
45941
|
-
var
|
|
46237
|
+
var args23, tool$vendorsCreateVendorRegistration;
|
|
45942
46238
|
var init_vendorsCreateVendorRegistration2 = __esm(() => {
|
|
45943
46239
|
init_vendorsCreateVendorRegistration();
|
|
45944
46240
|
init_operations();
|
|
45945
46241
|
init_tools();
|
|
45946
|
-
|
|
46242
|
+
args23 = {
|
|
45947
46243
|
request: CreateVendorRegistrationRequestBody$inboundSchema
|
|
45948
46244
|
};
|
|
45949
46245
|
tool$vendorsCreateVendorRegistration = {
|
|
@@ -45951,9 +46247,9 @@ var init_vendorsCreateVendorRegistration2 = __esm(() => {
|
|
|
45951
46247
|
description: `Create vendor registration
|
|
45952
46248
|
|
|
45953
46249
|
Create an initial vendor registration. Once successful, the vendor will be able to continue to filling out the rest of their onboarding profile.`,
|
|
45954
|
-
args:
|
|
45955
|
-
tool: async (client,
|
|
45956
|
-
const [result, apiCall] = await vendorsCreateVendorRegistration(client,
|
|
46250
|
+
args: args23,
|
|
46251
|
+
tool: async (client, args24, ctx) => {
|
|
46252
|
+
const [result, apiCall] = await vendorsCreateVendorRegistration(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
45957
46253
|
if (!result.ok) {
|
|
45958
46254
|
return {
|
|
45959
46255
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -45968,9 +46264,9 @@ Create an initial vendor registration. Once successful, the vendor will be able
|
|
|
45968
46264
|
|
|
45969
46265
|
// src/funcs/vendorsDeclineVendorCredential.ts
|
|
45970
46266
|
function vendorsDeclineVendorCredential(client, request, options) {
|
|
45971
|
-
return new APIPromise($
|
|
46267
|
+
return new APIPromise($do25(client, request, options));
|
|
45972
46268
|
}
|
|
45973
|
-
async function $
|
|
46269
|
+
async function $do25(client, request, options) {
|
|
45974
46270
|
const parsed = safeParse(request, (value) => DeclineVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
|
|
45975
46271
|
if (!parsed.ok) {
|
|
45976
46272
|
return [parsed, { status: "invalid" }];
|
|
@@ -46043,12 +46339,12 @@ var init_vendorsDeclineVendorCredential = __esm(() => {
|
|
|
46043
46339
|
});
|
|
46044
46340
|
|
|
46045
46341
|
// src/mcp-server/tools/vendorsDeclineVendorCredential.ts
|
|
46046
|
-
var
|
|
46342
|
+
var args24, tool$vendorsDeclineVendorCredential;
|
|
46047
46343
|
var init_vendorsDeclineVendorCredential2 = __esm(() => {
|
|
46048
46344
|
init_vendorsDeclineVendorCredential();
|
|
46049
46345
|
init_operations();
|
|
46050
46346
|
init_tools();
|
|
46051
|
-
|
|
46347
|
+
args24 = {
|
|
46052
46348
|
request: DeclineVendorCredentialRequest$inboundSchema
|
|
46053
46349
|
};
|
|
46054
46350
|
tool$vendorsDeclineVendorCredential = {
|
|
@@ -46056,9 +46352,9 @@ var init_vendorsDeclineVendorCredential2 = __esm(() => {
|
|
|
46056
46352
|
description: `Decline vendor credential
|
|
46057
46353
|
|
|
46058
46354
|
It will decline vendor credential`,
|
|
46059
|
-
args:
|
|
46060
|
-
tool: async (client,
|
|
46061
|
-
const [result, apiCall] = await vendorsDeclineVendorCredential(client,
|
|
46355
|
+
args: args24,
|
|
46356
|
+
tool: async (client, args25, ctx) => {
|
|
46357
|
+
const [result, apiCall] = await vendorsDeclineVendorCredential(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46062
46358
|
if (!result.ok) {
|
|
46063
46359
|
return {
|
|
46064
46360
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46073,9 +46369,9 @@ It will decline vendor credential`,
|
|
|
46073
46369
|
|
|
46074
46370
|
// src/funcs/vendorsDeleteVendorCredentialFile.ts
|
|
46075
46371
|
function vendorsDeleteVendorCredentialFile(client, request, options) {
|
|
46076
|
-
return new APIPromise($
|
|
46372
|
+
return new APIPromise($do26(client, request, options));
|
|
46077
46373
|
}
|
|
46078
|
-
async function $
|
|
46374
|
+
async function $do26(client, request, options) {
|
|
46079
46375
|
const parsed = safeParse(request, (value) => DeleteVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46080
46376
|
if (!parsed.ok) {
|
|
46081
46377
|
return [parsed, { status: "invalid" }];
|
|
@@ -46152,12 +46448,12 @@ var init_vendorsDeleteVendorCredentialFile = __esm(() => {
|
|
|
46152
46448
|
});
|
|
46153
46449
|
|
|
46154
46450
|
// src/mcp-server/tools/vendorsDeleteVendorCredentialFile.ts
|
|
46155
|
-
var
|
|
46451
|
+
var args25, tool$vendorsDeleteVendorCredentialFile;
|
|
46156
46452
|
var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
|
|
46157
46453
|
init_vendorsDeleteVendorCredentialFile();
|
|
46158
46454
|
init_operations();
|
|
46159
46455
|
init_tools();
|
|
46160
|
-
|
|
46456
|
+
args25 = {
|
|
46161
46457
|
request: DeleteVendorCredentialFileRequest$inboundSchema
|
|
46162
46458
|
};
|
|
46163
46459
|
tool$vendorsDeleteVendorCredentialFile = {
|
|
@@ -46165,9 +46461,9 @@ var init_vendorsDeleteVendorCredentialFile2 = __esm(() => {
|
|
|
46165
46461
|
description: `Delete vendor credential file
|
|
46166
46462
|
|
|
46167
46463
|
It will delete the vendor credential file`,
|
|
46168
|
-
args:
|
|
46169
|
-
tool: async (client,
|
|
46170
|
-
const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client,
|
|
46464
|
+
args: args25,
|
|
46465
|
+
tool: async (client, args26, ctx) => {
|
|
46466
|
+
const [result, apiCall] = await vendorsDeleteVendorCredentialFile(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46171
46467
|
if (!result.ok) {
|
|
46172
46468
|
return {
|
|
46173
46469
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46182,9 +46478,9 @@ It will delete the vendor credential file`,
|
|
|
46182
46478
|
|
|
46183
46479
|
// src/funcs/vendorsDeleteVendorManagedByCompany.ts
|
|
46184
46480
|
function vendorsDeleteVendorManagedByCompany(client, request, options) {
|
|
46185
|
-
return new APIPromise($
|
|
46481
|
+
return new APIPromise($do27(client, request, options));
|
|
46186
46482
|
}
|
|
46187
|
-
async function $
|
|
46483
|
+
async function $do27(client, request, options) {
|
|
46188
46484
|
const parsed = safeParse(request, (value) => DeleteVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46189
46485
|
if (!parsed.ok) {
|
|
46190
46486
|
return [parsed, { status: "invalid" }];
|
|
@@ -46260,12 +46556,12 @@ var init_vendorsDeleteVendorManagedByCompany = __esm(() => {
|
|
|
46260
46556
|
});
|
|
46261
46557
|
|
|
46262
46558
|
// src/mcp-server/tools/vendorsDeleteVendorManagedByCompany.ts
|
|
46263
|
-
var
|
|
46559
|
+
var args26, tool$vendorsDeleteVendorManagedByCompany;
|
|
46264
46560
|
var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
|
|
46265
46561
|
init_vendorsDeleteVendorManagedByCompany();
|
|
46266
46562
|
init_operations();
|
|
46267
46563
|
init_tools();
|
|
46268
|
-
|
|
46564
|
+
args26 = {
|
|
46269
46565
|
request: DeleteVendorManagedByCompanyRequest$inboundSchema
|
|
46270
46566
|
};
|
|
46271
46567
|
tool$vendorsDeleteVendorManagedByCompany = {
|
|
@@ -46273,9 +46569,9 @@ var init_vendorsDeleteVendorManagedByCompany2 = __esm(() => {
|
|
|
46273
46569
|
description: `Delete vendor managed by company
|
|
46274
46570
|
|
|
46275
46571
|
It will delete the vendor managed by company`,
|
|
46276
|
-
args:
|
|
46277
|
-
tool: async (client,
|
|
46278
|
-
const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client,
|
|
46572
|
+
args: args26,
|
|
46573
|
+
tool: async (client, args27, ctx) => {
|
|
46574
|
+
const [result, apiCall] = await vendorsDeleteVendorManagedByCompany(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46279
46575
|
if (!result.ok) {
|
|
46280
46576
|
return {
|
|
46281
46577
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46290,9 +46586,9 @@ It will delete the vendor managed by company`,
|
|
|
46290
46586
|
|
|
46291
46587
|
// src/funcs/vendorsExpediteTimeRemaining.ts
|
|
46292
46588
|
function vendorsExpediteTimeRemaining(client, request, options) {
|
|
46293
|
-
return new APIPromise($
|
|
46589
|
+
return new APIPromise($do28(client, request, options));
|
|
46294
46590
|
}
|
|
46295
|
-
async function $
|
|
46591
|
+
async function $do28(client, request, options) {
|
|
46296
46592
|
const parsed = safeParse(request, (value) => ExpediteTimeRemainingRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46297
46593
|
if (!parsed.ok) {
|
|
46298
46594
|
return [parsed, { status: "invalid" }];
|
|
@@ -46367,12 +46663,12 @@ var init_vendorsExpediteTimeRemaining = __esm(() => {
|
|
|
46367
46663
|
});
|
|
46368
46664
|
|
|
46369
46665
|
// src/mcp-server/tools/vendorsExpediteTimeRemaining.ts
|
|
46370
|
-
var
|
|
46666
|
+
var args27, tool$vendorsExpediteTimeRemaining;
|
|
46371
46667
|
var init_vendorsExpediteTimeRemaining2 = __esm(() => {
|
|
46372
46668
|
init_vendorsExpediteTimeRemaining();
|
|
46373
46669
|
init_operations();
|
|
46374
46670
|
init_tools();
|
|
46375
|
-
|
|
46671
|
+
args27 = {
|
|
46376
46672
|
request: ExpediteTimeRemainingRequest$inboundSchema
|
|
46377
46673
|
};
|
|
46378
46674
|
tool$vendorsExpediteTimeRemaining = {
|
|
@@ -46380,9 +46676,9 @@ var init_vendorsExpediteTimeRemaining2 = __esm(() => {
|
|
|
46380
46676
|
description: `Expedite time remaining
|
|
46381
46677
|
|
|
46382
46678
|
For vendors who have a paid 24-hour expedite credentials invoice, get the remaining time (in seconds) for which submitted credentials will be expedited.`,
|
|
46383
|
-
args:
|
|
46384
|
-
tool: async (client,
|
|
46385
|
-
const [result, apiCall] = await vendorsExpediteTimeRemaining(client,
|
|
46679
|
+
args: args27,
|
|
46680
|
+
tool: async (client, args28, ctx) => {
|
|
46681
|
+
const [result, apiCall] = await vendorsExpediteTimeRemaining(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46386
46682
|
if (!result.ok) {
|
|
46387
46683
|
return {
|
|
46388
46684
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46397,9 +46693,9 @@ For vendors who have a paid 24-hour expedite credentials invoice, get the remain
|
|
|
46397
46693
|
|
|
46398
46694
|
// src/funcs/vendorsGetVendorCredentialDetails.ts
|
|
46399
46695
|
function vendorsGetVendorCredentialDetails(client, request, options) {
|
|
46400
|
-
return new APIPromise($
|
|
46696
|
+
return new APIPromise($do29(client, request, options));
|
|
46401
46697
|
}
|
|
46402
|
-
async function $
|
|
46698
|
+
async function $do29(client, request, options) {
|
|
46403
46699
|
const parsed = safeParse(request, (value) => GetVendorCredentialDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46404
46700
|
if (!parsed.ok) {
|
|
46405
46701
|
return [parsed, { status: "invalid" }];
|
|
@@ -46482,12 +46778,12 @@ var init_vendorsGetVendorCredentialDetails = __esm(() => {
|
|
|
46482
46778
|
});
|
|
46483
46779
|
|
|
46484
46780
|
// src/mcp-server/tools/vendorsGetVendorCredentialDetails.ts
|
|
46485
|
-
var
|
|
46781
|
+
var args28, tool$vendorsGetVendorCredentialDetails;
|
|
46486
46782
|
var init_vendorsGetVendorCredentialDetails2 = __esm(() => {
|
|
46487
46783
|
init_vendorsGetVendorCredentialDetails();
|
|
46488
46784
|
init_operations();
|
|
46489
46785
|
init_tools();
|
|
46490
|
-
|
|
46786
|
+
args28 = {
|
|
46491
46787
|
request: GetVendorCredentialDetailsRequest$inboundSchema
|
|
46492
46788
|
};
|
|
46493
46789
|
tool$vendorsGetVendorCredentialDetails = {
|
|
@@ -46512,9 +46808,9 @@ Available \`expand\` scopes are:
|
|
|
46512
46808
|
- vendor_credential.vendor_credential_data_requests
|
|
46513
46809
|
- vendor_credential.credential_variants
|
|
46514
46810
|
- vendor_credential.targets_chop`,
|
|
46515
|
-
args:
|
|
46516
|
-
tool: async (client,
|
|
46517
|
-
const [result, apiCall] = await vendorsGetVendorCredentialDetails(client,
|
|
46811
|
+
args: args28,
|
|
46812
|
+
tool: async (client, args29, ctx) => {
|
|
46813
|
+
const [result, apiCall] = await vendorsGetVendorCredentialDetails(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46518
46814
|
if (!result.ok) {
|
|
46519
46815
|
return {
|
|
46520
46816
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46529,9 +46825,9 @@ Available \`expand\` scopes are:
|
|
|
46529
46825
|
|
|
46530
46826
|
// src/funcs/vendorsGetVendorCredentialFile.ts
|
|
46531
46827
|
function vendorsGetVendorCredentialFile(client, request, options) {
|
|
46532
|
-
return new APIPromise($
|
|
46828
|
+
return new APIPromise($do30(client, request, options));
|
|
46533
46829
|
}
|
|
46534
|
-
async function $
|
|
46830
|
+
async function $do30(client, request, options) {
|
|
46535
46831
|
const parsed = safeParse(request, (value) => GetVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46536
46832
|
if (!parsed.ok) {
|
|
46537
46833
|
return [parsed, { status: "invalid" }];
|
|
@@ -46612,12 +46908,12 @@ var init_vendorsGetVendorCredentialFile = __esm(() => {
|
|
|
46612
46908
|
});
|
|
46613
46909
|
|
|
46614
46910
|
// src/mcp-server/tools/vendorsGetVendorCredentialFile.ts
|
|
46615
|
-
var
|
|
46911
|
+
var args29, tool$vendorsGetVendorCredentialFile;
|
|
46616
46912
|
var init_vendorsGetVendorCredentialFile2 = __esm(() => {
|
|
46617
46913
|
init_vendorsGetVendorCredentialFile();
|
|
46618
46914
|
init_operations();
|
|
46619
46915
|
init_tools();
|
|
46620
|
-
|
|
46916
|
+
args29 = {
|
|
46621
46917
|
request: GetVendorCredentialFileRequest$inboundSchema
|
|
46622
46918
|
};
|
|
46623
46919
|
tool$vendorsGetVendorCredentialFile = {
|
|
@@ -46630,9 +46926,9 @@ Available \`expand\` scopes are:
|
|
|
46630
46926
|
|
|
46631
46927
|
- vendor_credential_file.vendor_credential
|
|
46632
46928
|
- vendor_credential_file.credential_document`,
|
|
46633
|
-
args:
|
|
46634
|
-
tool: async (client,
|
|
46635
|
-
const [result, apiCall] = await vendorsGetVendorCredentialFile(client,
|
|
46929
|
+
args: args29,
|
|
46930
|
+
tool: async (client, args30, ctx) => {
|
|
46931
|
+
const [result, apiCall] = await vendorsGetVendorCredentialFile(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46636
46932
|
if (!result.ok) {
|
|
46637
46933
|
return {
|
|
46638
46934
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46647,9 +46943,9 @@ Available \`expand\` scopes are:
|
|
|
46647
46943
|
|
|
46648
46944
|
// src/funcs/vendorsGetVendorInvoiceDetails.ts
|
|
46649
46945
|
function vendorsGetVendorInvoiceDetails(client, request, options) {
|
|
46650
|
-
return new APIPromise($
|
|
46946
|
+
return new APIPromise($do31(client, request, options));
|
|
46651
46947
|
}
|
|
46652
|
-
async function $
|
|
46948
|
+
async function $do31(client, request, options) {
|
|
46653
46949
|
const parsed = safeParse(request, (value) => GetVendorInvoiceDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46654
46950
|
if (!parsed.ok) {
|
|
46655
46951
|
return [parsed, { status: "invalid" }];
|
|
@@ -46729,12 +47025,12 @@ var init_vendorsGetVendorInvoiceDetails = __esm(() => {
|
|
|
46729
47025
|
});
|
|
46730
47026
|
|
|
46731
47027
|
// src/mcp-server/tools/vendorsGetVendorInvoiceDetails.ts
|
|
46732
|
-
var
|
|
47028
|
+
var args30, tool$vendorsGetVendorInvoiceDetails;
|
|
46733
47029
|
var init_vendorsGetVendorInvoiceDetails2 = __esm(() => {
|
|
46734
47030
|
init_vendorsGetVendorInvoiceDetails();
|
|
46735
47031
|
init_operations();
|
|
46736
47032
|
init_tools();
|
|
46737
|
-
|
|
47033
|
+
args30 = {
|
|
46738
47034
|
request: GetVendorInvoiceDetailsRequest$inboundSchema
|
|
46739
47035
|
};
|
|
46740
47036
|
tool$vendorsGetVendorInvoiceDetails = {
|
|
@@ -46747,9 +47043,9 @@ Available \`expand\` scopes are:
|
|
|
46747
47043
|
|
|
46748
47044
|
invoice.line_items
|
|
46749
47045
|
invoice.invoice_transactions`,
|
|
46750
|
-
args:
|
|
46751
|
-
tool: async (client,
|
|
46752
|
-
const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client,
|
|
47046
|
+
args: args30,
|
|
47047
|
+
tool: async (client, args31, ctx) => {
|
|
47048
|
+
const [result, apiCall] = await vendorsGetVendorInvoiceDetails(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46753
47049
|
if (!result.ok) {
|
|
46754
47050
|
return {
|
|
46755
47051
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46764,9 +47060,9 @@ invoice.invoice_transactions`,
|
|
|
46764
47060
|
|
|
46765
47061
|
// src/funcs/vendorsGetVendorLegalName.ts
|
|
46766
47062
|
function vendorsGetVendorLegalName(client, request, options) {
|
|
46767
|
-
return new APIPromise($
|
|
47063
|
+
return new APIPromise($do32(client, request, options));
|
|
46768
47064
|
}
|
|
46769
|
-
async function $
|
|
47065
|
+
async function $do32(client, request, options) {
|
|
46770
47066
|
const parsed = safeParse(request, (value) => GetVendorLegalNameRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46771
47067
|
if (!parsed.ok) {
|
|
46772
47068
|
return [parsed, { status: "invalid" }];
|
|
@@ -46841,12 +47137,12 @@ var init_vendorsGetVendorLegalName = __esm(() => {
|
|
|
46841
47137
|
});
|
|
46842
47138
|
|
|
46843
47139
|
// src/mcp-server/tools/vendorsGetVendorLegalName.ts
|
|
46844
|
-
var
|
|
47140
|
+
var args31, tool$vendorsGetVendorLegalName;
|
|
46845
47141
|
var init_vendorsGetVendorLegalName2 = __esm(() => {
|
|
46846
47142
|
init_vendorsGetVendorLegalName();
|
|
46847
47143
|
init_operations();
|
|
46848
47144
|
init_tools();
|
|
46849
|
-
|
|
47145
|
+
args31 = {
|
|
46850
47146
|
request: GetVendorLegalNameRequest$inboundSchema
|
|
46851
47147
|
};
|
|
46852
47148
|
tool$vendorsGetVendorLegalName = {
|
|
@@ -46854,9 +47150,9 @@ var init_vendorsGetVendorLegalName2 = __esm(() => {
|
|
|
46854
47150
|
description: `Get Vendor legal name
|
|
46855
47151
|
|
|
46856
47152
|
Get vendor legal name`,
|
|
46857
|
-
args:
|
|
46858
|
-
tool: async (client,
|
|
46859
|
-
const [result, apiCall] = await vendorsGetVendorLegalName(client,
|
|
47153
|
+
args: args31,
|
|
47154
|
+
tool: async (client, args32, ctx) => {
|
|
47155
|
+
const [result, apiCall] = await vendorsGetVendorLegalName(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46860
47156
|
if (!result.ok) {
|
|
46861
47157
|
return {
|
|
46862
47158
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -46871,9 +47167,9 @@ Get vendor legal name`,
|
|
|
46871
47167
|
|
|
46872
47168
|
// src/funcs/vendorsGetVendorsDetails.ts
|
|
46873
47169
|
function vendorsGetVendorsDetails(client, request, options) {
|
|
46874
|
-
return new APIPromise($
|
|
47170
|
+
return new APIPromise($do33(client, request, options));
|
|
46875
47171
|
}
|
|
46876
|
-
async function $
|
|
47172
|
+
async function $do33(client, request, options) {
|
|
46877
47173
|
const parsed = safeParse(request, (value) => GetVendorsDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
46878
47174
|
if (!parsed.ok) {
|
|
46879
47175
|
return [parsed, { status: "invalid" }];
|
|
@@ -46953,12 +47249,12 @@ var init_vendorsGetVendorsDetails = __esm(() => {
|
|
|
46953
47249
|
});
|
|
46954
47250
|
|
|
46955
47251
|
// src/mcp-server/tools/vendorsGetVendorsDetails.ts
|
|
46956
|
-
var
|
|
47252
|
+
var args32, tool$vendorsGetVendorsDetails;
|
|
46957
47253
|
var init_vendorsGetVendorsDetails2 = __esm(() => {
|
|
46958
47254
|
init_vendorsGetVendorsDetails();
|
|
46959
47255
|
init_operations();
|
|
46960
47256
|
init_tools();
|
|
46961
|
-
|
|
47257
|
+
args32 = {
|
|
46962
47258
|
request: GetVendorsDetailsRequest$inboundSchema
|
|
46963
47259
|
};
|
|
46964
47260
|
tool$vendorsGetVendorsDetails = {
|
|
@@ -46983,9 +47279,9 @@ vendor.payment_responsibility
|
|
|
46983
47279
|
vendor.background_check_date_expires
|
|
46984
47280
|
vendor.registration_data
|
|
46985
47281
|
vendor.registration_finished`,
|
|
46986
|
-
args:
|
|
46987
|
-
tool: async (client,
|
|
46988
|
-
const [result, apiCall] = await vendorsGetVendorsDetails(client,
|
|
47282
|
+
args: args32,
|
|
47283
|
+
tool: async (client, args33, ctx) => {
|
|
47284
|
+
const [result, apiCall] = await vendorsGetVendorsDetails(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
46989
47285
|
if (!result.ok) {
|
|
46990
47286
|
return {
|
|
46991
47287
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47000,9 +47296,9 @@ vendor.registration_finished`,
|
|
|
47000
47296
|
|
|
47001
47297
|
// src/funcs/vendorsListVendorAdditionalFacilityFields.ts
|
|
47002
47298
|
function vendorsListVendorAdditionalFacilityFields(client, request, options) {
|
|
47003
|
-
return new APIPromise($
|
|
47299
|
+
return new APIPromise($do34(client, request, options));
|
|
47004
47300
|
}
|
|
47005
|
-
async function $
|
|
47301
|
+
async function $do34(client, request, options) {
|
|
47006
47302
|
const parsed = safeParse(request, (value) => ListVendorAdditionalFacilityFieldsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47007
47303
|
if (!parsed.ok) {
|
|
47008
47304
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47114,12 +47410,12 @@ var init_vendorsListVendorAdditionalFacilityFields = __esm(() => {
|
|
|
47114
47410
|
});
|
|
47115
47411
|
|
|
47116
47412
|
// src/mcp-server/tools/vendorsListVendorAdditionalFacilityFields.ts
|
|
47117
|
-
var
|
|
47413
|
+
var args33, tool$vendorsListVendorAdditionalFacilityFields;
|
|
47118
47414
|
var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
|
|
47119
47415
|
init_vendorsListVendorAdditionalFacilityFields();
|
|
47120
47416
|
init_operations();
|
|
47121
47417
|
init_tools();
|
|
47122
|
-
|
|
47418
|
+
args33 = {
|
|
47123
47419
|
request: ListVendorAdditionalFacilityFieldsRequest$inboundSchema
|
|
47124
47420
|
};
|
|
47125
47421
|
tool$vendorsListVendorAdditionalFacilityFields = {
|
|
@@ -47127,9 +47423,9 @@ var init_vendorsListVendorAdditionalFacilityFields2 = __esm(() => {
|
|
|
47127
47423
|
description: `List of vendor's additional facility fields
|
|
47128
47424
|
|
|
47129
47425
|
List of vendor's additional facility fields`,
|
|
47130
|
-
args:
|
|
47131
|
-
tool: async (client,
|
|
47132
|
-
const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client,
|
|
47426
|
+
args: args33,
|
|
47427
|
+
tool: async (client, args34, ctx) => {
|
|
47428
|
+
const [result, apiCall] = await vendorsListVendorAdditionalFacilityFields(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47133
47429
|
if (!result.ok) {
|
|
47134
47430
|
return {
|
|
47135
47431
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47144,9 +47440,9 @@ List of vendor's additional facility fields`,
|
|
|
47144
47440
|
|
|
47145
47441
|
// src/funcs/vendorsListVendorCredentialDataRequests.ts
|
|
47146
47442
|
function vendorsListVendorCredentialDataRequests(client, request, options) {
|
|
47147
|
-
return new APIPromise($
|
|
47443
|
+
return new APIPromise($do35(client, request, options));
|
|
47148
47444
|
}
|
|
47149
|
-
async function $
|
|
47445
|
+
async function $do35(client, request, options) {
|
|
47150
47446
|
const parsed = safeParse(request, (value) => ListVendorCredentialDataRequestsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47151
47447
|
if (!parsed.ok) {
|
|
47152
47448
|
return [parsed, { status: "invalid" }];
|
|
@@ -47229,12 +47525,12 @@ var init_vendorsListVendorCredentialDataRequests = __esm(() => {
|
|
|
47229
47525
|
});
|
|
47230
47526
|
|
|
47231
47527
|
// src/mcp-server/tools/vendorsListVendorCredentialDataRequests.ts
|
|
47232
|
-
var
|
|
47528
|
+
var args34, tool$vendorsListVendorCredentialDataRequests;
|
|
47233
47529
|
var init_vendorsListVendorCredentialDataRequests2 = __esm(() => {
|
|
47234
47530
|
init_vendorsListVendorCredentialDataRequests();
|
|
47235
47531
|
init_operations();
|
|
47236
47532
|
init_tools();
|
|
47237
|
-
|
|
47533
|
+
args34 = {
|
|
47238
47534
|
request: ListVendorCredentialDataRequestsRequest$inboundSchema
|
|
47239
47535
|
};
|
|
47240
47536
|
tool$vendorsListVendorCredentialDataRequests = {
|
|
@@ -47247,9 +47543,9 @@ Available \`expand\` scopes are:
|
|
|
47247
47543
|
|
|
47248
47544
|
- vendor_credential_data_request.vendor_credential
|
|
47249
47545
|
- vendor_credential_data_request.data_request`,
|
|
47250
|
-
args:
|
|
47251
|
-
tool: async (client,
|
|
47252
|
-
const [result, apiCall] = await vendorsListVendorCredentialDataRequests(client,
|
|
47546
|
+
args: args34,
|
|
47547
|
+
tool: async (client, args35, ctx) => {
|
|
47548
|
+
const [result, apiCall] = await vendorsListVendorCredentialDataRequests(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47253
47549
|
if (!result.ok) {
|
|
47254
47550
|
return {
|
|
47255
47551
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47264,9 +47560,9 @@ Available \`expand\` scopes are:
|
|
|
47264
47560
|
|
|
47265
47561
|
// src/funcs/vendorsListVendorCredentialFiles.ts
|
|
47266
47562
|
function vendorsListVendorCredentialFiles(client, request, options) {
|
|
47267
|
-
return new APIPromise($
|
|
47563
|
+
return new APIPromise($do36(client, request, options));
|
|
47268
47564
|
}
|
|
47269
|
-
async function $
|
|
47565
|
+
async function $do36(client, request, options) {
|
|
47270
47566
|
const parsed = safeParse(request, (value) => ListVendorCredentialFilesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47271
47567
|
if (!parsed.ok) {
|
|
47272
47568
|
return [parsed, { status: "invalid" }];
|
|
@@ -47349,12 +47645,12 @@ var init_vendorsListVendorCredentialFiles = __esm(() => {
|
|
|
47349
47645
|
});
|
|
47350
47646
|
|
|
47351
47647
|
// src/mcp-server/tools/vendorsListVendorCredentialFiles.ts
|
|
47352
|
-
var
|
|
47648
|
+
var args35, tool$vendorsListVendorCredentialFiles;
|
|
47353
47649
|
var init_vendorsListVendorCredentialFiles2 = __esm(() => {
|
|
47354
47650
|
init_vendorsListVendorCredentialFiles();
|
|
47355
47651
|
init_operations();
|
|
47356
47652
|
init_tools();
|
|
47357
|
-
|
|
47653
|
+
args35 = {
|
|
47358
47654
|
request: ListVendorCredentialFilesRequest$inboundSchema
|
|
47359
47655
|
};
|
|
47360
47656
|
tool$vendorsListVendorCredentialFiles = {
|
|
@@ -47367,9 +47663,9 @@ Available \`expand\` scopes are:
|
|
|
47367
47663
|
|
|
47368
47664
|
- vendor_credential_file.vendor_credential
|
|
47369
47665
|
- vendor_credential_file.credential_document`,
|
|
47370
|
-
args:
|
|
47371
|
-
tool: async (client,
|
|
47372
|
-
const [result, apiCall] = await vendorsListVendorCredentialFiles(client,
|
|
47666
|
+
args: args35,
|
|
47667
|
+
tool: async (client, args36, ctx) => {
|
|
47668
|
+
const [result, apiCall] = await vendorsListVendorCredentialFiles(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47373
47669
|
if (!result.ok) {
|
|
47374
47670
|
return {
|
|
47375
47671
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47384,9 +47680,9 @@ Available \`expand\` scopes are:
|
|
|
47384
47680
|
|
|
47385
47681
|
// src/funcs/vendorsListVendorCredentialHistory.ts
|
|
47386
47682
|
function vendorsListVendorCredentialHistory(client, request, options) {
|
|
47387
|
-
return new APIPromise($
|
|
47683
|
+
return new APIPromise($do37(client, request, options));
|
|
47388
47684
|
}
|
|
47389
|
-
async function $
|
|
47685
|
+
async function $do37(client, request, options) {
|
|
47390
47686
|
const parsed = safeParse(request, (value) => ListVendorCredentialHistoryRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47391
47687
|
if (!parsed.ok) {
|
|
47392
47688
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47501,12 +47797,12 @@ var init_vendorsListVendorCredentialHistory = __esm(() => {
|
|
|
47501
47797
|
});
|
|
47502
47798
|
|
|
47503
47799
|
// src/mcp-server/tools/vendorsListVendorCredentialHistory.ts
|
|
47504
|
-
var
|
|
47800
|
+
var args36, tool$vendorsListVendorCredentialHistory;
|
|
47505
47801
|
var init_vendorsListVendorCredentialHistory2 = __esm(() => {
|
|
47506
47802
|
init_vendorsListVendorCredentialHistory();
|
|
47507
47803
|
init_operations();
|
|
47508
47804
|
init_tools();
|
|
47509
|
-
|
|
47805
|
+
args36 = {
|
|
47510
47806
|
request: ListVendorCredentialHistoryRequest$inboundSchema
|
|
47511
47807
|
};
|
|
47512
47808
|
tool$vendorsListVendorCredentialHistory = {
|
|
@@ -47514,9 +47810,9 @@ var init_vendorsListVendorCredentialHistory2 = __esm(() => {
|
|
|
47514
47810
|
description: `List Vendor Credential History
|
|
47515
47811
|
|
|
47516
47812
|
Lists vendor credentials history`,
|
|
47517
|
-
args:
|
|
47518
|
-
tool: async (client,
|
|
47519
|
-
const [result, apiCall] = await vendorsListVendorCredentialHistory(client,
|
|
47813
|
+
args: args36,
|
|
47814
|
+
tool: async (client, args37, ctx) => {
|
|
47815
|
+
const [result, apiCall] = await vendorsListVendorCredentialHistory(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47520
47816
|
if (!result.ok) {
|
|
47521
47817
|
return {
|
|
47522
47818
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47531,9 +47827,9 @@ Lists vendor credentials history`,
|
|
|
47531
47827
|
|
|
47532
47828
|
// src/funcs/vendorsListVendorCredentials.ts
|
|
47533
47829
|
function vendorsListVendorCredentials(client, request, options) {
|
|
47534
|
-
return new APIPromise($
|
|
47830
|
+
return new APIPromise($do38(client, request, options));
|
|
47535
47831
|
}
|
|
47536
|
-
async function $
|
|
47832
|
+
async function $do38(client, request, options) {
|
|
47537
47833
|
const parsed = safeParse(request, (value) => ListVendorCredentialsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47538
47834
|
if (!parsed.ok) {
|
|
47539
47835
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47653,12 +47949,12 @@ var init_vendorsListVendorCredentials = __esm(() => {
|
|
|
47653
47949
|
});
|
|
47654
47950
|
|
|
47655
47951
|
// src/mcp-server/tools/vendorsListVendorCredentials.ts
|
|
47656
|
-
var
|
|
47952
|
+
var args37, tool$vendorsListVendorCredentials;
|
|
47657
47953
|
var init_vendorsListVendorCredentials2 = __esm(() => {
|
|
47658
47954
|
init_vendorsListVendorCredentials();
|
|
47659
47955
|
init_operations();
|
|
47660
47956
|
init_tools();
|
|
47661
|
-
|
|
47957
|
+
args37 = {
|
|
47662
47958
|
request: ListVendorCredentialsRequest$inboundSchema
|
|
47663
47959
|
};
|
|
47664
47960
|
tool$vendorsListVendorCredentials = {
|
|
@@ -47666,9 +47962,9 @@ var init_vendorsListVendorCredentials2 = __esm(() => {
|
|
|
47666
47962
|
description: `List Vendor Credentials
|
|
47667
47963
|
|
|
47668
47964
|
Lists vendor credentials, required credentials, and company credentials. Utilized in Vendor Dashboard.`,
|
|
47669
|
-
args:
|
|
47670
|
-
tool: async (client,
|
|
47671
|
-
const [result, apiCall] = await vendorsListVendorCredentials(client,
|
|
47965
|
+
args: args37,
|
|
47966
|
+
tool: async (client, args38, ctx) => {
|
|
47967
|
+
const [result, apiCall] = await vendorsListVendorCredentials(client, args38.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47672
47968
|
if (!result.ok) {
|
|
47673
47969
|
return {
|
|
47674
47970
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47683,9 +47979,9 @@ Lists vendor credentials, required credentials, and company credentials. Utilize
|
|
|
47683
47979
|
|
|
47684
47980
|
// src/funcs/vendorsListVendorCredits.ts
|
|
47685
47981
|
function vendorsListVendorCredits(client, request, options) {
|
|
47686
|
-
return new APIPromise($
|
|
47982
|
+
return new APIPromise($do39(client, request, options));
|
|
47687
47983
|
}
|
|
47688
|
-
async function $
|
|
47984
|
+
async function $do39(client, request, options) {
|
|
47689
47985
|
const parsed = safeParse(request, (value) => ListVendorCreditsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47690
47986
|
if (!parsed.ok) {
|
|
47691
47987
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47799,12 +48095,12 @@ var init_vendorsListVendorCredits = __esm(() => {
|
|
|
47799
48095
|
});
|
|
47800
48096
|
|
|
47801
48097
|
// src/mcp-server/tools/vendorsListVendorCredits.ts
|
|
47802
|
-
var
|
|
48098
|
+
var args38, tool$vendorsListVendorCredits;
|
|
47803
48099
|
var init_vendorsListVendorCredits2 = __esm(() => {
|
|
47804
48100
|
init_vendorsListVendorCredits();
|
|
47805
48101
|
init_operations();
|
|
47806
48102
|
init_tools();
|
|
47807
|
-
|
|
48103
|
+
args38 = {
|
|
47808
48104
|
request: ListVendorCreditsRequest$inboundSchema
|
|
47809
48105
|
};
|
|
47810
48106
|
tool$vendorsListVendorCredits = {
|
|
@@ -47812,9 +48108,9 @@ var init_vendorsListVendorCredits2 = __esm(() => {
|
|
|
47812
48108
|
description: `List vendor credits
|
|
47813
48109
|
|
|
47814
48110
|
List the credits for the vendor`,
|
|
47815
|
-
args:
|
|
47816
|
-
tool: async (client,
|
|
47817
|
-
const [result, apiCall] = await vendorsListVendorCredits(client,
|
|
48111
|
+
args: args38,
|
|
48112
|
+
tool: async (client, args39, ctx) => {
|
|
48113
|
+
const [result, apiCall] = await vendorsListVendorCredits(client, args39.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47818
48114
|
if (!result.ok) {
|
|
47819
48115
|
return {
|
|
47820
48116
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47829,9 +48125,9 @@ List the credits for the vendor`,
|
|
|
47829
48125
|
|
|
47830
48126
|
// src/funcs/vendorsListVendorFacilityStatuses.ts
|
|
47831
48127
|
function vendorsListVendorFacilityStatuses(client, request, options) {
|
|
47832
|
-
return new APIPromise($
|
|
48128
|
+
return new APIPromise($do40(client, request, options));
|
|
47833
48129
|
}
|
|
47834
|
-
async function $
|
|
48130
|
+
async function $do40(client, request, options) {
|
|
47835
48131
|
const parsed = safeParse(request, (value) => ListVendorFacilityStatusesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47836
48132
|
if (!parsed.ok) {
|
|
47837
48133
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -47941,12 +48237,12 @@ var init_vendorsListVendorFacilityStatuses = __esm(() => {
|
|
|
47941
48237
|
});
|
|
47942
48238
|
|
|
47943
48239
|
// src/mcp-server/tools/vendorsListVendorFacilityStatuses.ts
|
|
47944
|
-
var
|
|
48240
|
+
var args39, tool$vendorsListVendorFacilityStatuses;
|
|
47945
48241
|
var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
|
|
47946
48242
|
init_vendorsListVendorFacilityStatuses();
|
|
47947
48243
|
init_operations();
|
|
47948
48244
|
init_tools();
|
|
47949
|
-
|
|
48245
|
+
args39 = {
|
|
47950
48246
|
request: ListVendorFacilityStatusesRequest$inboundSchema
|
|
47951
48247
|
};
|
|
47952
48248
|
tool$vendorsListVendorFacilityStatuses = {
|
|
@@ -47954,9 +48250,9 @@ var init_vendorsListVendorFacilityStatuses2 = __esm(() => {
|
|
|
47954
48250
|
description: `List vendor facility statuses
|
|
47955
48251
|
|
|
47956
48252
|
List the facilities for the vendor`,
|
|
47957
|
-
args:
|
|
47958
|
-
tool: async (client,
|
|
47959
|
-
const [result, apiCall] = await vendorsListVendorFacilityStatuses(client,
|
|
48253
|
+
args: args39,
|
|
48254
|
+
tool: async (client, args40, ctx) => {
|
|
48255
|
+
const [result, apiCall] = await vendorsListVendorFacilityStatuses(client, args40.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
47960
48256
|
if (!result.ok) {
|
|
47961
48257
|
return {
|
|
47962
48258
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -47971,9 +48267,9 @@ List the facilities for the vendor`,
|
|
|
47971
48267
|
|
|
47972
48268
|
// src/funcs/vendorsListVendorInvoices.ts
|
|
47973
48269
|
function vendorsListVendorInvoices(client, request, options) {
|
|
47974
|
-
return new APIPromise($
|
|
48270
|
+
return new APIPromise($do41(client, request, options));
|
|
47975
48271
|
}
|
|
47976
|
-
async function $
|
|
48272
|
+
async function $do41(client, request, options) {
|
|
47977
48273
|
const parsed = safeParse(request, (value) => ListVendorInvoicesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
47978
48274
|
if (!parsed.ok) {
|
|
47979
48275
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48091,12 +48387,12 @@ var init_vendorsListVendorInvoices = __esm(() => {
|
|
|
48091
48387
|
});
|
|
48092
48388
|
|
|
48093
48389
|
// src/mcp-server/tools/vendorsListVendorInvoices.ts
|
|
48094
|
-
var
|
|
48390
|
+
var args40, tool$vendorsListVendorInvoices;
|
|
48095
48391
|
var init_vendorsListVendorInvoices2 = __esm(() => {
|
|
48096
48392
|
init_vendorsListVendorInvoices();
|
|
48097
48393
|
init_operations();
|
|
48098
48394
|
init_tools();
|
|
48099
|
-
|
|
48395
|
+
args40 = {
|
|
48100
48396
|
request: ListVendorInvoicesRequest$inboundSchema
|
|
48101
48397
|
};
|
|
48102
48398
|
tool$vendorsListVendorInvoices = {
|
|
@@ -48108,9 +48404,9 @@ List invoices for Vendors
|
|
|
48108
48404
|
Available \`expand\` scopes are:
|
|
48109
48405
|
|
|
48110
48406
|
invoice.line_items`,
|
|
48111
|
-
args:
|
|
48112
|
-
tool: async (client,
|
|
48113
|
-
const [result, apiCall] = await vendorsListVendorInvoices(client,
|
|
48407
|
+
args: args40,
|
|
48408
|
+
tool: async (client, args41, ctx) => {
|
|
48409
|
+
const [result, apiCall] = await vendorsListVendorInvoices(client, args41.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48114
48410
|
if (!result.ok) {
|
|
48115
48411
|
return {
|
|
48116
48412
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48125,9 +48421,9 @@ invoice.line_items`,
|
|
|
48125
48421
|
|
|
48126
48422
|
// src/funcs/vendorsListVendorJobTitles.ts
|
|
48127
48423
|
function vendorsListVendorJobTitles(client, request, options) {
|
|
48128
|
-
return new APIPromise($
|
|
48424
|
+
return new APIPromise($do42(client, request, options));
|
|
48129
48425
|
}
|
|
48130
|
-
async function $
|
|
48426
|
+
async function $do42(client, request, options) {
|
|
48131
48427
|
const parsed = safeParse(request, (value) => ListVendorJobTitlesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48132
48428
|
if (!parsed.ok) {
|
|
48133
48429
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48236,12 +48532,12 @@ var init_vendorsListVendorJobTitles = __esm(() => {
|
|
|
48236
48532
|
});
|
|
48237
48533
|
|
|
48238
48534
|
// src/mcp-server/tools/vendorsListVendorJobTitles.ts
|
|
48239
|
-
var
|
|
48535
|
+
var args41, tool$vendorsListVendorJobTitles;
|
|
48240
48536
|
var init_vendorsListVendorJobTitles2 = __esm(() => {
|
|
48241
48537
|
init_vendorsListVendorJobTitles();
|
|
48242
48538
|
init_operations();
|
|
48243
48539
|
init_tools();
|
|
48244
|
-
|
|
48540
|
+
args41 = {
|
|
48245
48541
|
request: ListVendorJobTitlesRequest$inboundSchema
|
|
48246
48542
|
};
|
|
48247
48543
|
tool$vendorsListVendorJobTitles = {
|
|
@@ -48249,9 +48545,9 @@ var init_vendorsListVendorJobTitles2 = __esm(() => {
|
|
|
48249
48545
|
description: `List vendor job titles
|
|
48250
48546
|
|
|
48251
48547
|
List valid job titles for Vendors. This can be used during sign up or in a filter.`,
|
|
48252
|
-
args:
|
|
48253
|
-
tool: async (client,
|
|
48254
|
-
const [result, apiCall] = await vendorsListVendorJobTitles(client,
|
|
48548
|
+
args: args41,
|
|
48549
|
+
tool: async (client, args42, ctx) => {
|
|
48550
|
+
const [result, apiCall] = await vendorsListVendorJobTitles(client, args42.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48255
48551
|
if (!result.ok) {
|
|
48256
48552
|
return {
|
|
48257
48553
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48266,9 +48562,9 @@ List valid job titles for Vendors. This can be used during sign up or in a filte
|
|
|
48266
48562
|
|
|
48267
48563
|
// src/funcs/vendorsListVendorManagedByCompanies.ts
|
|
48268
48564
|
function vendorsListVendorManagedByCompanies(client, request, options) {
|
|
48269
|
-
return new APIPromise($
|
|
48565
|
+
return new APIPromise($do43(client, request, options));
|
|
48270
48566
|
}
|
|
48271
|
-
async function $
|
|
48567
|
+
async function $do43(client, request, options) {
|
|
48272
48568
|
const parsed = safeParse(request, (value) => ListVendorManagedByCompaniesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48273
48569
|
if (!parsed.ok) {
|
|
48274
48570
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48382,12 +48678,12 @@ var init_vendorsListVendorManagedByCompanies = __esm(() => {
|
|
|
48382
48678
|
});
|
|
48383
48679
|
|
|
48384
48680
|
// src/mcp-server/tools/vendorsListVendorManagedByCompanies.ts
|
|
48385
|
-
var
|
|
48681
|
+
var args42, tool$vendorsListVendorManagedByCompanies;
|
|
48386
48682
|
var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
|
|
48387
48683
|
init_vendorsListVendorManagedByCompanies();
|
|
48388
48684
|
init_operations();
|
|
48389
48685
|
init_tools();
|
|
48390
|
-
|
|
48686
|
+
args42 = {
|
|
48391
48687
|
request: ListVendorManagedByCompaniesRequest$inboundSchema
|
|
48392
48688
|
};
|
|
48393
48689
|
tool$vendorsListVendorManagedByCompanies = {
|
|
@@ -48395,9 +48691,9 @@ var init_vendorsListVendorManagedByCompanies2 = __esm(() => {
|
|
|
48395
48691
|
description: `List of companies managing the vendor
|
|
48396
48692
|
|
|
48397
48693
|
List of companies managing the vendor`,
|
|
48398
|
-
args:
|
|
48399
|
-
tool: async (client,
|
|
48400
|
-
const [result, apiCall] = await vendorsListVendorManagedByCompanies(client,
|
|
48694
|
+
args: args42,
|
|
48695
|
+
tool: async (client, args43, ctx) => {
|
|
48696
|
+
const [result, apiCall] = await vendorsListVendorManagedByCompanies(client, args43.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48401
48697
|
if (!result.ok) {
|
|
48402
48698
|
return {
|
|
48403
48699
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48412,9 +48708,9 @@ List of companies managing the vendor`,
|
|
|
48412
48708
|
|
|
48413
48709
|
// src/funcs/vendorsListVendorScrubDetails.ts
|
|
48414
48710
|
function vendorsListVendorScrubDetails(client, request, options) {
|
|
48415
|
-
return new APIPromise($
|
|
48711
|
+
return new APIPromise($do44(client, request, options));
|
|
48416
48712
|
}
|
|
48417
|
-
async function $
|
|
48713
|
+
async function $do44(client, request, options) {
|
|
48418
48714
|
const parsed = safeParse(request, (value) => ListVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48419
48715
|
if (!parsed.ok) {
|
|
48420
48716
|
return [parsed, { status: "invalid" }];
|
|
@@ -48490,12 +48786,12 @@ var init_vendorsListVendorScrubDetails = __esm(() => {
|
|
|
48490
48786
|
});
|
|
48491
48787
|
|
|
48492
48788
|
// src/mcp-server/tools/vendorsListVendorScrubDetails.ts
|
|
48493
|
-
var
|
|
48789
|
+
var args43, tool$vendorsListVendorScrubDetails;
|
|
48494
48790
|
var init_vendorsListVendorScrubDetails2 = __esm(() => {
|
|
48495
48791
|
init_vendorsListVendorScrubDetails();
|
|
48496
48792
|
init_operations();
|
|
48497
48793
|
init_tools();
|
|
48498
|
-
|
|
48794
|
+
args43 = {
|
|
48499
48795
|
request: ListVendorScrubDetailsRequest$inboundSchema
|
|
48500
48796
|
};
|
|
48501
48797
|
tool$vendorsListVendorScrubDetails = {
|
|
@@ -48503,9 +48799,9 @@ var init_vendorsListVendorScrubDetails2 = __esm(() => {
|
|
|
48503
48799
|
description: `List vendor scrub details
|
|
48504
48800
|
|
|
48505
48801
|
List vendor scrub details`,
|
|
48506
|
-
args:
|
|
48507
|
-
tool: async (client,
|
|
48508
|
-
const [result, apiCall] = await vendorsListVendorScrubDetails(client,
|
|
48802
|
+
args: args43,
|
|
48803
|
+
tool: async (client, args44, ctx) => {
|
|
48804
|
+
const [result, apiCall] = await vendorsListVendorScrubDetails(client, args44.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48509
48805
|
if (!result.ok) {
|
|
48510
48806
|
return {
|
|
48511
48807
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48520,9 +48816,9 @@ List vendor scrub details`,
|
|
|
48520
48816
|
|
|
48521
48817
|
// src/funcs/vendorsListVendorScrubPackages.ts
|
|
48522
48818
|
function vendorsListVendorScrubPackages(client, request, options) {
|
|
48523
|
-
return new APIPromise($
|
|
48819
|
+
return new APIPromise($do45(client, request, options));
|
|
48524
48820
|
}
|
|
48525
|
-
async function $
|
|
48821
|
+
async function $do45(client, request, options) {
|
|
48526
48822
|
const parsed = safeParse(request, (value) => ListVendorScrubPackagesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48527
48823
|
if (!parsed.ok) {
|
|
48528
48824
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48636,12 +48932,12 @@ var init_vendorsListVendorScrubPackages = __esm(() => {
|
|
|
48636
48932
|
});
|
|
48637
48933
|
|
|
48638
48934
|
// src/mcp-server/tools/vendorsListVendorScrubPackages.ts
|
|
48639
|
-
var
|
|
48935
|
+
var args44, tool$vendorsListVendorScrubPackages;
|
|
48640
48936
|
var init_vendorsListVendorScrubPackages2 = __esm(() => {
|
|
48641
48937
|
init_vendorsListVendorScrubPackages();
|
|
48642
48938
|
init_operations();
|
|
48643
48939
|
init_tools();
|
|
48644
|
-
|
|
48940
|
+
args44 = {
|
|
48645
48941
|
request: ListVendorScrubPackagesRequest$inboundSchema
|
|
48646
48942
|
};
|
|
48647
48943
|
tool$vendorsListVendorScrubPackages = {
|
|
@@ -48649,9 +48945,9 @@ var init_vendorsListVendorScrubPackages2 = __esm(() => {
|
|
|
48649
48945
|
description: `List vendor scrub packages
|
|
48650
48946
|
|
|
48651
48947
|
List vendor scrub packages`,
|
|
48652
|
-
args:
|
|
48653
|
-
tool: async (client,
|
|
48654
|
-
const [result, apiCall] = await vendorsListVendorScrubPackages(client,
|
|
48948
|
+
args: args44,
|
|
48949
|
+
tool: async (client, args45, ctx) => {
|
|
48950
|
+
const [result, apiCall] = await vendorsListVendorScrubPackages(client, args45.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48655
48951
|
if (!result.ok) {
|
|
48656
48952
|
return {
|
|
48657
48953
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48666,9 +48962,9 @@ List vendor scrub packages`,
|
|
|
48666
48962
|
|
|
48667
48963
|
// src/funcs/vendorsListVendorScrubPurchases.ts
|
|
48668
48964
|
function vendorsListVendorScrubPurchases(client, request, options) {
|
|
48669
|
-
return new APIPromise($
|
|
48965
|
+
return new APIPromise($do46(client, request, options));
|
|
48670
48966
|
}
|
|
48671
|
-
async function $
|
|
48967
|
+
async function $do46(client, request, options) {
|
|
48672
48968
|
const parsed = safeParse(request, (value) => ListVendorScrubPurchasesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48673
48969
|
if (!parsed.ok) {
|
|
48674
48970
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -48782,12 +49078,12 @@ var init_vendorsListVendorScrubPurchases = __esm(() => {
|
|
|
48782
49078
|
});
|
|
48783
49079
|
|
|
48784
49080
|
// src/mcp-server/tools/vendorsListVendorScrubPurchases.ts
|
|
48785
|
-
var
|
|
49081
|
+
var args45, tool$vendorsListVendorScrubPurchases;
|
|
48786
49082
|
var init_vendorsListVendorScrubPurchases2 = __esm(() => {
|
|
48787
49083
|
init_vendorsListVendorScrubPurchases();
|
|
48788
49084
|
init_operations();
|
|
48789
49085
|
init_tools();
|
|
48790
|
-
|
|
49086
|
+
args45 = {
|
|
48791
49087
|
request: ListVendorScrubPurchasesRequest$inboundSchema
|
|
48792
49088
|
};
|
|
48793
49089
|
tool$vendorsListVendorScrubPurchases = {
|
|
@@ -48795,9 +49091,9 @@ var init_vendorsListVendorScrubPurchases2 = __esm(() => {
|
|
|
48795
49091
|
description: `List vendor scrub purchases
|
|
48796
49092
|
|
|
48797
49093
|
List vendor scrub purchases`,
|
|
48798
|
-
args:
|
|
48799
|
-
tool: async (client,
|
|
48800
|
-
const [result, apiCall] = await vendorsListVendorScrubPurchases(client,
|
|
49094
|
+
args: args45,
|
|
49095
|
+
tool: async (client, args46, ctx) => {
|
|
49096
|
+
const [result, apiCall] = await vendorsListVendorScrubPurchases(client, args46.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48801
49097
|
if (!result.ok) {
|
|
48802
49098
|
return {
|
|
48803
49099
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48812,9 +49108,9 @@ List vendor scrub purchases`,
|
|
|
48812
49108
|
|
|
48813
49109
|
// src/funcs/vendorsPurchaseScrubCredits.ts
|
|
48814
49110
|
function vendorsPurchaseScrubCredits(client, request, options) {
|
|
48815
|
-
return new APIPromise($
|
|
49111
|
+
return new APIPromise($do47(client, request, options));
|
|
48816
49112
|
}
|
|
48817
|
-
async function $
|
|
49113
|
+
async function $do47(client, request, options) {
|
|
48818
49114
|
const parsed = safeParse(request, (value) => PurchaseScrubCreditsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48819
49115
|
if (!parsed.ok) {
|
|
48820
49116
|
return [parsed, { status: "invalid" }];
|
|
@@ -48890,12 +49186,12 @@ var init_vendorsPurchaseScrubCredits = __esm(() => {
|
|
|
48890
49186
|
});
|
|
48891
49187
|
|
|
48892
49188
|
// src/mcp-server/tools/vendorsPurchaseScrubCredits.ts
|
|
48893
|
-
var
|
|
49189
|
+
var args46, tool$vendorsPurchaseScrubCredits;
|
|
48894
49190
|
var init_vendorsPurchaseScrubCredits2 = __esm(() => {
|
|
48895
49191
|
init_vendorsPurchaseScrubCredits();
|
|
48896
49192
|
init_operations();
|
|
48897
49193
|
init_tools();
|
|
48898
|
-
|
|
49194
|
+
args46 = {
|
|
48899
49195
|
request: PurchaseScrubCreditsRequest$inboundSchema
|
|
48900
49196
|
};
|
|
48901
49197
|
tool$vendorsPurchaseScrubCredits = {
|
|
@@ -48903,9 +49199,9 @@ var init_vendorsPurchaseScrubCredits2 = __esm(() => {
|
|
|
48903
49199
|
description: `Purchase scrub credits
|
|
48904
49200
|
|
|
48905
49201
|
Purchase scrub credits`,
|
|
48906
|
-
args:
|
|
48907
|
-
tool: async (client,
|
|
48908
|
-
const [result, apiCall] = await vendorsPurchaseScrubCredits(client,
|
|
49202
|
+
args: args46,
|
|
49203
|
+
tool: async (client, args47, ctx) => {
|
|
49204
|
+
const [result, apiCall] = await vendorsPurchaseScrubCredits(client, args47.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
48909
49205
|
if (!result.ok) {
|
|
48910
49206
|
return {
|
|
48911
49207
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -48920,9 +49216,9 @@ Purchase scrub credits`,
|
|
|
48920
49216
|
|
|
48921
49217
|
// src/funcs/vendorsSendDownloadCode.ts
|
|
48922
49218
|
function vendorsSendDownloadCode(client, request, options) {
|
|
48923
|
-
return new APIPromise($
|
|
49219
|
+
return new APIPromise($do48(client, request, options));
|
|
48924
49220
|
}
|
|
48925
|
-
async function $
|
|
49221
|
+
async function $do48(client, request, options) {
|
|
48926
49222
|
const parsed = safeParse(request, (value) => SendDownloadCodeRequest$outboundSchema.parse(value), "Input validation failed");
|
|
48927
49223
|
if (!parsed.ok) {
|
|
48928
49224
|
return [parsed, { status: "invalid" }];
|
|
@@ -48996,12 +49292,12 @@ var init_vendorsSendDownloadCode = __esm(() => {
|
|
|
48996
49292
|
});
|
|
48997
49293
|
|
|
48998
49294
|
// src/mcp-server/tools/vendorsSendDownloadCode.ts
|
|
48999
|
-
var
|
|
49295
|
+
var args47, tool$vendorsSendDownloadCode;
|
|
49000
49296
|
var init_vendorsSendDownloadCode2 = __esm(() => {
|
|
49001
49297
|
init_vendorsSendDownloadCode();
|
|
49002
49298
|
init_operations();
|
|
49003
49299
|
init_tools();
|
|
49004
|
-
|
|
49300
|
+
args47 = {
|
|
49005
49301
|
request: SendDownloadCodeRequest$inboundSchema
|
|
49006
49302
|
};
|
|
49007
49303
|
tool$vendorsSendDownloadCode = {
|
|
@@ -49009,9 +49305,9 @@ var init_vendorsSendDownloadCode2 = __esm(() => {
|
|
|
49009
49305
|
description: `Send download code for vendor credential
|
|
49010
49306
|
|
|
49011
49307
|
It will send download code for vendor credential`,
|
|
49012
|
-
args:
|
|
49013
|
-
tool: async (client,
|
|
49014
|
-
const [result, apiCall] = await vendorsSendDownloadCode(client,
|
|
49308
|
+
args: args47,
|
|
49309
|
+
tool: async (client, args48, ctx) => {
|
|
49310
|
+
const [result, apiCall] = await vendorsSendDownloadCode(client, args48.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49015
49311
|
if (!result.ok) {
|
|
49016
49312
|
return {
|
|
49017
49313
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49026,9 +49322,9 @@ It will send download code for vendor credential`,
|
|
|
49026
49322
|
|
|
49027
49323
|
// src/funcs/vendorsSubmitVendorCredential.ts
|
|
49028
49324
|
function vendorsSubmitVendorCredential(client, request, options) {
|
|
49029
|
-
return new APIPromise($
|
|
49325
|
+
return new APIPromise($do49(client, request, options));
|
|
49030
49326
|
}
|
|
49031
|
-
async function $
|
|
49327
|
+
async function $do49(client, request, options) {
|
|
49032
49328
|
const parsed = safeParse(request, (value) => SubmitVendorCredentialRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49033
49329
|
if (!parsed.ok) {
|
|
49034
49330
|
return [parsed, { status: "invalid" }];
|
|
@@ -49102,12 +49398,12 @@ var init_vendorsSubmitVendorCredential = __esm(() => {
|
|
|
49102
49398
|
});
|
|
49103
49399
|
|
|
49104
49400
|
// src/mcp-server/tools/vendorsSubmitVendorCredential.ts
|
|
49105
|
-
var
|
|
49401
|
+
var args48, tool$vendorsSubmitVendorCredential;
|
|
49106
49402
|
var init_vendorsSubmitVendorCredential2 = __esm(() => {
|
|
49107
49403
|
init_vendorsSubmitVendorCredential();
|
|
49108
49404
|
init_operations();
|
|
49109
49405
|
init_tools();
|
|
49110
|
-
|
|
49406
|
+
args48 = {
|
|
49111
49407
|
request: SubmitVendorCredentialRequest$inboundSchema
|
|
49112
49408
|
};
|
|
49113
49409
|
tool$vendorsSubmitVendorCredential = {
|
|
@@ -49115,9 +49411,122 @@ var init_vendorsSubmitVendorCredential2 = __esm(() => {
|
|
|
49115
49411
|
description: `Submit vendor credential
|
|
49116
49412
|
|
|
49117
49413
|
It will submit vendor credential`,
|
|
49118
|
-
args:
|
|
49119
|
-
tool: async (client,
|
|
49120
|
-
const [result, apiCall] = await vendorsSubmitVendorCredential(client,
|
|
49414
|
+
args: args48,
|
|
49415
|
+
tool: async (client, args49, ctx) => {
|
|
49416
|
+
const [result, apiCall] = await vendorsSubmitVendorCredential(client, args49.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49417
|
+
if (!result.ok) {
|
|
49418
|
+
return {
|
|
49419
|
+
content: [{ type: "text", text: result.error.message }],
|
|
49420
|
+
isError: true
|
|
49421
|
+
};
|
|
49422
|
+
}
|
|
49423
|
+
const value = result.value;
|
|
49424
|
+
return formatResult(value, apiCall);
|
|
49425
|
+
}
|
|
49426
|
+
};
|
|
49427
|
+
});
|
|
49428
|
+
|
|
49429
|
+
// src/funcs/vendorsUpdateVendorCredentialData.ts
|
|
49430
|
+
function vendorsUpdateVendorCredentialData(client, request, options) {
|
|
49431
|
+
return new APIPromise($do50(client, request, options));
|
|
49432
|
+
}
|
|
49433
|
+
async function $do50(client, request, options) {
|
|
49434
|
+
const parsed = safeParse(request, (value) => UpdateVendorCredentialDataRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49435
|
+
if (!parsed.ok) {
|
|
49436
|
+
return [parsed, { status: "invalid" }];
|
|
49437
|
+
}
|
|
49438
|
+
const payload = parsed.value;
|
|
49439
|
+
const body = encodeJSON("body", payload.RequestBody, { explode: true });
|
|
49440
|
+
const pathParams = {
|
|
49441
|
+
id: encodeSimple("id", payload.id, {
|
|
49442
|
+
explode: false,
|
|
49443
|
+
charEncoding: "percent"
|
|
49444
|
+
}),
|
|
49445
|
+
vendor_id_or_me: encodeSimple("vendor_id_or_me", payload.vendor_id_or_me, {
|
|
49446
|
+
explode: false,
|
|
49447
|
+
charEncoding: "percent"
|
|
49448
|
+
})
|
|
49449
|
+
};
|
|
49450
|
+
const path = pathToFunc("/vendors/{vendor_id_or_me}/credentials/{id}")(pathParams);
|
|
49451
|
+
const headers = new Headers(compactMap({
|
|
49452
|
+
"Content-Type": "application/json",
|
|
49453
|
+
Accept: "application/json"
|
|
49454
|
+
}));
|
|
49455
|
+
const securityInput = await extractSecurity(client._options.security);
|
|
49456
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
49457
|
+
const context = {
|
|
49458
|
+
options: client._options,
|
|
49459
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
49460
|
+
operationID: "updateVendorCredentialData",
|
|
49461
|
+
oAuth2Scopes: [],
|
|
49462
|
+
resolvedSecurity: requestSecurity,
|
|
49463
|
+
securitySource: client._options.security,
|
|
49464
|
+
retryConfig: options?.retries || client._options.retryConfig || { strategy: "none" },
|
|
49465
|
+
retryCodes: options?.retryCodes || ["429", "500", "502", "503", "504"]
|
|
49466
|
+
};
|
|
49467
|
+
const requestRes = client._createRequest(context, {
|
|
49468
|
+
security: requestSecurity,
|
|
49469
|
+
method: "PUT",
|
|
49470
|
+
baseURL: options?.serverURL,
|
|
49471
|
+
path,
|
|
49472
|
+
headers,
|
|
49473
|
+
body,
|
|
49474
|
+
userAgent: client._options.userAgent,
|
|
49475
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
49476
|
+
}, options);
|
|
49477
|
+
if (!requestRes.ok) {
|
|
49478
|
+
return [requestRes, { status: "invalid" }];
|
|
49479
|
+
}
|
|
49480
|
+
const req = requestRes.value;
|
|
49481
|
+
const doResult = await client._do(req, {
|
|
49482
|
+
context,
|
|
49483
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
49484
|
+
retryConfig: context.retryConfig,
|
|
49485
|
+
retryCodes: context.retryCodes
|
|
49486
|
+
});
|
|
49487
|
+
if (!doResult.ok) {
|
|
49488
|
+
return [doResult, { status: "request-error", request: req }];
|
|
49489
|
+
}
|
|
49490
|
+
const response = doResult.value;
|
|
49491
|
+
const responseFields = {
|
|
49492
|
+
HttpMeta: { Response: response, Request: req }
|
|
49493
|
+
};
|
|
49494
|
+
const [result] = await match(json(200, booleanType()), jsonErr([400, 401, 403, 404], ApiErrorResponse$inboundSchema), jsonErr(500, ApiErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, { extraFields: responseFields });
|
|
49495
|
+
if (!result.ok) {
|
|
49496
|
+
return [result, { status: "complete", request: req, response }];
|
|
49497
|
+
}
|
|
49498
|
+
return [result, { status: "complete", request: req, response }];
|
|
49499
|
+
}
|
|
49500
|
+
var init_vendorsUpdateVendorCredentialData = __esm(() => {
|
|
49501
|
+
init_esm();
|
|
49502
|
+
init_encodings();
|
|
49503
|
+
init_matchers();
|
|
49504
|
+
init_primitives();
|
|
49505
|
+
init_schemas();
|
|
49506
|
+
init_security();
|
|
49507
|
+
init_url();
|
|
49508
|
+
init_errors2();
|
|
49509
|
+
init_operations();
|
|
49510
|
+
init_async();
|
|
49511
|
+
});
|
|
49512
|
+
|
|
49513
|
+
// src/mcp-server/tools/vendorsUpdateVendorCredentialData.ts
|
|
49514
|
+
var args49, tool$vendorsUpdateVendorCredentialData;
|
|
49515
|
+
var init_vendorsUpdateVendorCredentialData2 = __esm(() => {
|
|
49516
|
+
init_vendorsUpdateVendorCredentialData();
|
|
49517
|
+
init_operations();
|
|
49518
|
+
init_tools();
|
|
49519
|
+
args49 = {
|
|
49520
|
+
request: UpdateVendorCredentialDataRequest$inboundSchema
|
|
49521
|
+
};
|
|
49522
|
+
tool$vendorsUpdateVendorCredentialData = {
|
|
49523
|
+
name: "vendors-update-vendor-credential-data",
|
|
49524
|
+
description: `Update vendor credential data
|
|
49525
|
+
|
|
49526
|
+
Update vendor credential data`,
|
|
49527
|
+
args: args49,
|
|
49528
|
+
tool: async (client, args50, ctx) => {
|
|
49529
|
+
const [result, apiCall] = await vendorsUpdateVendorCredentialData(client, args50.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49121
49530
|
if (!result.ok) {
|
|
49122
49531
|
return {
|
|
49123
49532
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49132,9 +49541,9 @@ It will submit vendor credential`,
|
|
|
49132
49541
|
|
|
49133
49542
|
// src/funcs/vendorsUpdateVendorCredentialFile.ts
|
|
49134
49543
|
function vendorsUpdateVendorCredentialFile(client, request, options) {
|
|
49135
|
-
return new APIPromise($
|
|
49544
|
+
return new APIPromise($do51(client, request, options));
|
|
49136
49545
|
}
|
|
49137
|
-
async function $
|
|
49546
|
+
async function $do51(client, request, options) {
|
|
49138
49547
|
const parsed = safeParse(request, (value) => UpdateVendorCredentialFileRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49139
49548
|
if (!parsed.ok) {
|
|
49140
49549
|
return [parsed, { status: "invalid" }];
|
|
@@ -49212,12 +49621,12 @@ var init_vendorsUpdateVendorCredentialFile = __esm(() => {
|
|
|
49212
49621
|
});
|
|
49213
49622
|
|
|
49214
49623
|
// src/mcp-server/tools/vendorsUpdateVendorCredentialFile.ts
|
|
49215
|
-
var
|
|
49624
|
+
var args50, tool$vendorsUpdateVendorCredentialFile;
|
|
49216
49625
|
var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
|
|
49217
49626
|
init_vendorsUpdateVendorCredentialFile();
|
|
49218
49627
|
init_operations();
|
|
49219
49628
|
init_tools();
|
|
49220
|
-
|
|
49629
|
+
args50 = {
|
|
49221
49630
|
request: UpdateVendorCredentialFileRequest$inboundSchema
|
|
49222
49631
|
};
|
|
49223
49632
|
tool$vendorsUpdateVendorCredentialFile = {
|
|
@@ -49225,9 +49634,9 @@ var init_vendorsUpdateVendorCredentialFile2 = __esm(() => {
|
|
|
49225
49634
|
description: `Update vendor credential file
|
|
49226
49635
|
|
|
49227
49636
|
It will update the vendor credential file properties`,
|
|
49228
|
-
args:
|
|
49229
|
-
tool: async (client,
|
|
49230
|
-
const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client,
|
|
49637
|
+
args: args50,
|
|
49638
|
+
tool: async (client, args51, ctx) => {
|
|
49639
|
+
const [result, apiCall] = await vendorsUpdateVendorCredentialFile(client, args51.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49231
49640
|
if (!result.ok) {
|
|
49232
49641
|
return {
|
|
49233
49642
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49242,9 +49651,9 @@ It will update the vendor credential file properties`,
|
|
|
49242
49651
|
|
|
49243
49652
|
// src/funcs/vendorsUpdateVendorDetails.ts
|
|
49244
49653
|
function vendorsUpdateVendorDetails(client, request, options) {
|
|
49245
|
-
return new APIPromise($
|
|
49654
|
+
return new APIPromise($do52(client, request, options));
|
|
49246
49655
|
}
|
|
49247
|
-
async function $
|
|
49656
|
+
async function $do52(client, request, options) {
|
|
49248
49657
|
const parsed = safeParse(request, (value) => UpdateVendorDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49249
49658
|
if (!parsed.ok) {
|
|
49250
49659
|
return [parsed, { status: "invalid" }];
|
|
@@ -49321,12 +49730,12 @@ var init_vendorsUpdateVendorDetails = __esm(() => {
|
|
|
49321
49730
|
});
|
|
49322
49731
|
|
|
49323
49732
|
// src/mcp-server/tools/vendorsUpdateVendorDetails.ts
|
|
49324
|
-
var
|
|
49733
|
+
var args51, tool$vendorsUpdateVendorDetails;
|
|
49325
49734
|
var init_vendorsUpdateVendorDetails2 = __esm(() => {
|
|
49326
49735
|
init_vendorsUpdateVendorDetails();
|
|
49327
49736
|
init_operations();
|
|
49328
49737
|
init_tools();
|
|
49329
|
-
|
|
49738
|
+
args51 = {
|
|
49330
49739
|
request: UpdateVendorDetailsRequest$inboundSchema
|
|
49331
49740
|
};
|
|
49332
49741
|
tool$vendorsUpdateVendorDetails = {
|
|
@@ -49334,9 +49743,9 @@ var init_vendorsUpdateVendorDetails2 = __esm(() => {
|
|
|
49334
49743
|
description: `Update vendor details
|
|
49335
49744
|
|
|
49336
49745
|
It will update the vendor details`,
|
|
49337
|
-
args:
|
|
49338
|
-
tool: async (client,
|
|
49339
|
-
const [result, apiCall] = await vendorsUpdateVendorDetails(client,
|
|
49746
|
+
args: args51,
|
|
49747
|
+
tool: async (client, args52, ctx) => {
|
|
49748
|
+
const [result, apiCall] = await vendorsUpdateVendorDetails(client, args52.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49340
49749
|
if (!result.ok) {
|
|
49341
49750
|
return {
|
|
49342
49751
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49351,9 +49760,9 @@ It will update the vendor details`,
|
|
|
49351
49760
|
|
|
49352
49761
|
// src/funcs/vendorsUpdateVendorManagedByCompany.ts
|
|
49353
49762
|
function vendorsUpdateVendorManagedByCompany(client, request, options) {
|
|
49354
|
-
return new APIPromise($
|
|
49763
|
+
return new APIPromise($do53(client, request, options));
|
|
49355
49764
|
}
|
|
49356
|
-
async function $
|
|
49765
|
+
async function $do53(client, request, options) {
|
|
49357
49766
|
const parsed = safeParse(request, (value) => UpdateVendorManagedByCompanyRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49358
49767
|
if (!parsed.ok) {
|
|
49359
49768
|
return [parsed, { status: "invalid" }];
|
|
@@ -49429,12 +49838,12 @@ var init_vendorsUpdateVendorManagedByCompany = __esm(() => {
|
|
|
49429
49838
|
});
|
|
49430
49839
|
|
|
49431
49840
|
// src/mcp-server/tools/vendorsUpdateVendorManagedByCompany.ts
|
|
49432
|
-
var
|
|
49841
|
+
var args52, tool$vendorsUpdateVendorManagedByCompany;
|
|
49433
49842
|
var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
|
|
49434
49843
|
init_vendorsUpdateVendorManagedByCompany();
|
|
49435
49844
|
init_operations();
|
|
49436
49845
|
init_tools();
|
|
49437
|
-
|
|
49846
|
+
args52 = {
|
|
49438
49847
|
request: UpdateVendorManagedByCompanyRequest$inboundSchema
|
|
49439
49848
|
};
|
|
49440
49849
|
tool$vendorsUpdateVendorManagedByCompany = {
|
|
@@ -49442,9 +49851,9 @@ var init_vendorsUpdateVendorManagedByCompany2 = __esm(() => {
|
|
|
49442
49851
|
description: `Update vendor managed by company access rights
|
|
49443
49852
|
|
|
49444
49853
|
It will update the vendor managed by company access rights`,
|
|
49445
|
-
args:
|
|
49446
|
-
tool: async (client,
|
|
49447
|
-
const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client,
|
|
49854
|
+
args: args52,
|
|
49855
|
+
tool: async (client, args53, ctx) => {
|
|
49856
|
+
const [result, apiCall] = await vendorsUpdateVendorManagedByCompany(client, args53.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49448
49857
|
if (!result.ok) {
|
|
49449
49858
|
return {
|
|
49450
49859
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49459,9 +49868,9 @@ It will update the vendor managed by company access rights`,
|
|
|
49459
49868
|
|
|
49460
49869
|
// src/funcs/vendorsUpdateVendorScrubDetails.ts
|
|
49461
49870
|
function vendorsUpdateVendorScrubDetails(client, request, options) {
|
|
49462
|
-
return new APIPromise($
|
|
49871
|
+
return new APIPromise($do54(client, request, options));
|
|
49463
49872
|
}
|
|
49464
|
-
async function $
|
|
49873
|
+
async function $do54(client, request, options) {
|
|
49465
49874
|
const parsed = safeParse(request, (value) => UpdateVendorScrubDetailsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49466
49875
|
if (!parsed.ok) {
|
|
49467
49876
|
return [parsed, { status: "invalid" }];
|
|
@@ -49538,12 +49947,12 @@ var init_vendorsUpdateVendorScrubDetails = __esm(() => {
|
|
|
49538
49947
|
});
|
|
49539
49948
|
|
|
49540
49949
|
// src/mcp-server/tools/vendorsUpdateVendorScrubDetails.ts
|
|
49541
|
-
var
|
|
49950
|
+
var args53, tool$vendorsUpdateVendorScrubDetails;
|
|
49542
49951
|
var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
|
|
49543
49952
|
init_vendorsUpdateVendorScrubDetails();
|
|
49544
49953
|
init_operations();
|
|
49545
49954
|
init_tools();
|
|
49546
|
-
|
|
49955
|
+
args53 = {
|
|
49547
49956
|
request: UpdateVendorScrubDetailsRequest$inboundSchema
|
|
49548
49957
|
};
|
|
49549
49958
|
tool$vendorsUpdateVendorScrubDetails = {
|
|
@@ -49551,9 +49960,9 @@ var init_vendorsUpdateVendorScrubDetails2 = __esm(() => {
|
|
|
49551
49960
|
description: `Update vendor scrub details
|
|
49552
49961
|
|
|
49553
49962
|
Update vendor scrub details`,
|
|
49554
|
-
args:
|
|
49555
|
-
tool: async (client,
|
|
49556
|
-
const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client,
|
|
49963
|
+
args: args53,
|
|
49964
|
+
tool: async (client, args54, ctx) => {
|
|
49965
|
+
const [result, apiCall] = await vendorsUpdateVendorScrubDetails(client, args54.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49557
49966
|
if (!result.ok) {
|
|
49558
49967
|
return {
|
|
49559
49968
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49568,9 +49977,9 @@ Update vendor scrub details`,
|
|
|
49568
49977
|
|
|
49569
49978
|
// src/funcs/webhooksGetWebhookEndpoint.ts
|
|
49570
49979
|
function webhooksGetWebhookEndpoint(client, request, options) {
|
|
49571
|
-
return new APIPromise($
|
|
49980
|
+
return new APIPromise($do55(client, request, options));
|
|
49572
49981
|
}
|
|
49573
|
-
async function $
|
|
49982
|
+
async function $do55(client, request, options) {
|
|
49574
49983
|
const parsed = safeParse(request, (value) => GetWebhookEndpointRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49575
49984
|
if (!parsed.ok) {
|
|
49576
49985
|
return [parsed, { status: "invalid" }];
|
|
@@ -49646,12 +50055,12 @@ var init_webhooksGetWebhookEndpoint = __esm(() => {
|
|
|
49646
50055
|
});
|
|
49647
50056
|
|
|
49648
50057
|
// src/mcp-server/tools/webhooksGetWebhookEndpoint.ts
|
|
49649
|
-
var
|
|
50058
|
+
var args54, tool$webhooksGetWebhookEndpoint;
|
|
49650
50059
|
var init_webhooksGetWebhookEndpoint2 = __esm(() => {
|
|
49651
50060
|
init_webhooksGetWebhookEndpoint();
|
|
49652
50061
|
init_operations();
|
|
49653
50062
|
init_tools();
|
|
49654
|
-
|
|
50063
|
+
args54 = {
|
|
49655
50064
|
request: GetWebhookEndpointRequest$inboundSchema
|
|
49656
50065
|
};
|
|
49657
50066
|
tool$webhooksGetWebhookEndpoint = {
|
|
@@ -49659,9 +50068,9 @@ var init_webhooksGetWebhookEndpoint2 = __esm(() => {
|
|
|
49659
50068
|
description: `Retrieves the webhook endpoint with the given ID.
|
|
49660
50069
|
|
|
49661
50070
|
Returns the definition of a webhook endpoint by ID.`,
|
|
49662
|
-
args:
|
|
49663
|
-
tool: async (client,
|
|
49664
|
-
const [result, apiCall] = await webhooksGetWebhookEndpoint(client,
|
|
50071
|
+
args: args54,
|
|
50072
|
+
tool: async (client, args55, ctx) => {
|
|
50073
|
+
const [result, apiCall] = await webhooksGetWebhookEndpoint(client, args55.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49665
50074
|
if (!result.ok) {
|
|
49666
50075
|
return {
|
|
49667
50076
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49676,9 +50085,9 @@ Returns the definition of a webhook endpoint by ID.`,
|
|
|
49676
50085
|
|
|
49677
50086
|
// src/funcs/webhooksListAllWebhookEndpoints.ts
|
|
49678
50087
|
function webhooksListAllWebhookEndpoints(client, request, options) {
|
|
49679
|
-
return new APIPromise($
|
|
50088
|
+
return new APIPromise($do56(client, request, options));
|
|
49680
50089
|
}
|
|
49681
|
-
async function $
|
|
50090
|
+
async function $do56(client, request, options) {
|
|
49682
50091
|
const parsed = safeParse(request, (value) => ListAllWebhookEndpointsRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49683
50092
|
if (!parsed.ok) {
|
|
49684
50093
|
return [parsed, { status: "invalid" }];
|
|
@@ -49754,12 +50163,12 @@ var init_webhooksListAllWebhookEndpoints = __esm(() => {
|
|
|
49754
50163
|
});
|
|
49755
50164
|
|
|
49756
50165
|
// src/mcp-server/tools/webhooksListAllWebhookEndpoints.ts
|
|
49757
|
-
var
|
|
50166
|
+
var args55, tool$webhooksListAllWebhookEndpoints;
|
|
49758
50167
|
var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
|
|
49759
50168
|
init_webhooksListAllWebhookEndpoints();
|
|
49760
50169
|
init_operations();
|
|
49761
50170
|
init_tools();
|
|
49762
|
-
|
|
50171
|
+
args55 = {
|
|
49763
50172
|
request: ListAllWebhookEndpointsRequest$inboundSchema
|
|
49764
50173
|
};
|
|
49765
50174
|
tool$webhooksListAllWebhookEndpoints = {
|
|
@@ -49767,9 +50176,9 @@ var init_webhooksListAllWebhookEndpoints2 = __esm(() => {
|
|
|
49767
50176
|
description: `List all webhook endpoints
|
|
49768
50177
|
|
|
49769
50178
|
Returns a list of your webhook endpoints.`,
|
|
49770
|
-
args:
|
|
49771
|
-
tool: async (client,
|
|
49772
|
-
const [result, apiCall] = await webhooksListAllWebhookEndpoints(client,
|
|
50179
|
+
args: args55,
|
|
50180
|
+
tool: async (client, args56, ctx) => {
|
|
50181
|
+
const [result, apiCall] = await webhooksListAllWebhookEndpoints(client, args56.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49773
50182
|
if (!result.ok) {
|
|
49774
50183
|
return {
|
|
49775
50184
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49784,9 +50193,9 @@ Returns a list of your webhook endpoints.`,
|
|
|
49784
50193
|
|
|
49785
50194
|
// src/funcs/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
|
|
49786
50195
|
function webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, request, options) {
|
|
49787
|
-
return new APIPromise($
|
|
50196
|
+
return new APIPromise($do57(client, request, options));
|
|
49788
50197
|
}
|
|
49789
|
-
async function $
|
|
50198
|
+
async function $do57(client, request, options) {
|
|
49790
50199
|
const parsed = safeParse(request, (value) => UpdatesTheWebhookEndpointWithTheGivenIdRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49791
50200
|
if (!parsed.ok) {
|
|
49792
50201
|
return [parsed, { status: "invalid" }];
|
|
@@ -49863,12 +50272,12 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId = __esm(() => {
|
|
|
49863
50272
|
});
|
|
49864
50273
|
|
|
49865
50274
|
// src/mcp-server/tools/webhooksUpdatesTheWebhookEndpointWithTheGivenId.ts
|
|
49866
|
-
var
|
|
50275
|
+
var args56, tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId;
|
|
49867
50276
|
var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
|
|
49868
50277
|
init_webhooksUpdatesTheWebhookEndpointWithTheGivenId();
|
|
49869
50278
|
init_operations();
|
|
49870
50279
|
init_tools();
|
|
49871
|
-
|
|
50280
|
+
args56 = {
|
|
49872
50281
|
request: UpdatesTheWebhookEndpointWithTheGivenIdRequest$inboundSchema
|
|
49873
50282
|
};
|
|
49874
50283
|
tool$webhooksUpdatesTheWebhookEndpointWithTheGivenId = {
|
|
@@ -49876,9 +50285,9 @@ var init_webhooksUpdatesTheWebhookEndpointWithTheGivenId2 = __esm(() => {
|
|
|
49876
50285
|
description: `Updates the webhook endpoint with the given ID.
|
|
49877
50286
|
|
|
49878
50287
|
Updates the webhook endpoint with the given ID.`,
|
|
49879
|
-
args:
|
|
49880
|
-
tool: async (client,
|
|
49881
|
-
const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client,
|
|
50288
|
+
args: args56,
|
|
50289
|
+
tool: async (client, args57, ctx) => {
|
|
50290
|
+
const [result, apiCall] = await webhooksUpdatesTheWebhookEndpointWithTheGivenId(client, args57.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
49882
50291
|
if (!result.ok) {
|
|
49883
50292
|
return {
|
|
49884
50293
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -49893,9 +50302,9 @@ Updates the webhook endpoint with the given ID.`,
|
|
|
49893
50302
|
|
|
49894
50303
|
// src/funcs/zonesListOrSearchSecurityZones.ts
|
|
49895
50304
|
function zonesListOrSearchSecurityZones(client, request, options) {
|
|
49896
|
-
return new APIPromise($
|
|
50305
|
+
return new APIPromise($do58(client, request, options));
|
|
49897
50306
|
}
|
|
49898
|
-
async function $
|
|
50307
|
+
async function $do58(client, request, options) {
|
|
49899
50308
|
const parsed = safeParse(request, (value) => ListOrSearchSecurityZonesRequest$outboundSchema.parse(value), "Input validation failed");
|
|
49900
50309
|
if (!parsed.ok) {
|
|
49901
50310
|
return [haltIterator(parsed), { status: "invalid" }];
|
|
@@ -50009,12 +50418,12 @@ var init_zonesListOrSearchSecurityZones = __esm(() => {
|
|
|
50009
50418
|
});
|
|
50010
50419
|
|
|
50011
50420
|
// src/mcp-server/tools/zonesListOrSearchSecurityZones.ts
|
|
50012
|
-
var
|
|
50421
|
+
var args57, tool$zonesListOrSearchSecurityZones;
|
|
50013
50422
|
var init_zonesListOrSearchSecurityZones2 = __esm(() => {
|
|
50014
50423
|
init_zonesListOrSearchSecurityZones();
|
|
50015
50424
|
init_operations();
|
|
50016
50425
|
init_tools();
|
|
50017
|
-
|
|
50426
|
+
args57 = {
|
|
50018
50427
|
request: ListOrSearchSecurityZonesRequest$inboundSchema
|
|
50019
50428
|
};
|
|
50020
50429
|
tool$zonesListOrSearchSecurityZones = {
|
|
@@ -50022,9 +50431,9 @@ var init_zonesListOrSearchSecurityZones2 = __esm(() => {
|
|
|
50022
50431
|
description: `List or search security zones
|
|
50023
50432
|
|
|
50024
50433
|
List or search security zones`,
|
|
50025
|
-
args:
|
|
50026
|
-
tool: async (client,
|
|
50027
|
-
const [result, apiCall] = await zonesListOrSearchSecurityZones(client,
|
|
50434
|
+
args: args57,
|
|
50435
|
+
tool: async (client, args58, ctx) => {
|
|
50436
|
+
const [result, apiCall] = await zonesListOrSearchSecurityZones(client, args58.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
50028
50437
|
if (!result.ok) {
|
|
50029
50438
|
return {
|
|
50030
50439
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -50039,9 +50448,9 @@ List or search security zones`,
|
|
|
50039
50448
|
|
|
50040
50449
|
// src/funcs/zonesSecurityZoneCheckin.ts
|
|
50041
50450
|
function zonesSecurityZoneCheckin(client, request, options) {
|
|
50042
|
-
return new APIPromise($
|
|
50451
|
+
return new APIPromise($do59(client, request, options));
|
|
50043
50452
|
}
|
|
50044
|
-
async function $
|
|
50453
|
+
async function $do59(client, request, options) {
|
|
50045
50454
|
const parsed = safeParse(request, (value) => SecurityZoneCheckinRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
50046
50455
|
if (!parsed.ok) {
|
|
50047
50456
|
return [parsed, { status: "invalid" }];
|
|
@@ -50111,12 +50520,12 @@ var init_zonesSecurityZoneCheckin = __esm(() => {
|
|
|
50111
50520
|
});
|
|
50112
50521
|
|
|
50113
50522
|
// src/mcp-server/tools/zonesSecurityZoneCheckin.ts
|
|
50114
|
-
var
|
|
50523
|
+
var args58, tool$zonesSecurityZoneCheckin;
|
|
50115
50524
|
var init_zonesSecurityZoneCheckin2 = __esm(() => {
|
|
50116
50525
|
init_zonesSecurityZoneCheckin();
|
|
50117
50526
|
init_operations();
|
|
50118
50527
|
init_tools();
|
|
50119
|
-
|
|
50528
|
+
args58 = {
|
|
50120
50529
|
request: SecurityZoneCheckinRequestBody$inboundSchema
|
|
50121
50530
|
};
|
|
50122
50531
|
tool$zonesSecurityZoneCheckin = {
|
|
@@ -50124,9 +50533,9 @@ var init_zonesSecurityZoneCheckin2 = __esm(() => {
|
|
|
50124
50533
|
description: `Security zone checkin request
|
|
50125
50534
|
|
|
50126
50535
|
Security zone checkin request`,
|
|
50127
|
-
args:
|
|
50128
|
-
tool: async (client,
|
|
50129
|
-
const [result, apiCall] = await zonesSecurityZoneCheckin(client,
|
|
50536
|
+
args: args58,
|
|
50537
|
+
tool: async (client, args59, ctx) => {
|
|
50538
|
+
const [result, apiCall] = await zonesSecurityZoneCheckin(client, args59.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
50130
50539
|
if (!result.ok) {
|
|
50131
50540
|
return {
|
|
50132
50541
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -50143,7 +50552,7 @@ Security zone checkin request`,
|
|
|
50143
50552
|
function createMCPServer(deps) {
|
|
50144
50553
|
const server = new McpServer({
|
|
50145
50554
|
name: "GreenSecurity",
|
|
50146
|
-
version: "0.35.
|
|
50555
|
+
version: "0.35.7"
|
|
50147
50556
|
});
|
|
50148
50557
|
const client = new GreenSecurityCore({
|
|
50149
50558
|
security: deps.security,
|
|
@@ -50161,6 +50570,7 @@ function createMCPServer(deps) {
|
|
|
50161
50570
|
tool(tool$vendorsListVendorJobTitles);
|
|
50162
50571
|
tool(tool$vendorsListVendorCredentials);
|
|
50163
50572
|
tool(tool$vendorsGetVendorCredentialDetails);
|
|
50573
|
+
tool(tool$vendorsUpdateVendorCredentialData);
|
|
50164
50574
|
tool(tool$vendorsGetVendorCredentialFile);
|
|
50165
50575
|
tool(tool$vendorsUpdateVendorCredentialFile);
|
|
50166
50576
|
tool(tool$vendorsDeleteVendorCredentialFile);
|
|
@@ -50214,6 +50624,7 @@ function createMCPServer(deps) {
|
|
|
50214
50624
|
tool(tool$dataRequestsAddDataRequestFile);
|
|
50215
50625
|
tool(tool$dataRequestsDeleteDataRequestFile);
|
|
50216
50626
|
tool(tool$dataRequestsUpdateDataRequest);
|
|
50627
|
+
tool(tool$invoicesMakePayment);
|
|
50217
50628
|
return server;
|
|
50218
50629
|
}
|
|
50219
50630
|
var init_server2 = __esm(() => {
|
|
@@ -50225,6 +50636,7 @@ var init_server2 = __esm(() => {
|
|
|
50225
50636
|
init_dataRequestsAddDataRequestFile2();
|
|
50226
50637
|
init_dataRequestsDeleteDataRequestFile2();
|
|
50227
50638
|
init_dataRequestsUpdateDataRequest2();
|
|
50639
|
+
init_invoicesMakePayment2();
|
|
50228
50640
|
init_organizationsGetFacility2();
|
|
50229
50641
|
init_organizationsListOrSearchFacilities2();
|
|
50230
50642
|
init_supportArticlesGetSupportArticle2();
|
|
@@ -50269,6 +50681,7 @@ var init_server2 = __esm(() => {
|
|
|
50269
50681
|
init_vendorsPurchaseScrubCredits2();
|
|
50270
50682
|
init_vendorsSendDownloadCode2();
|
|
50271
50683
|
init_vendorsSubmitVendorCredential2();
|
|
50684
|
+
init_vendorsUpdateVendorCredentialData2();
|
|
50272
50685
|
init_vendorsUpdateVendorCredentialFile2();
|
|
50273
50686
|
init_vendorsUpdateVendorDetails2();
|
|
50274
50687
|
init_vendorsUpdateVendorManagedByCompany2();
|
|
@@ -51482,7 +51895,7 @@ var routes = an({
|
|
|
51482
51895
|
var app = He(routes, {
|
|
51483
51896
|
name: "mcp",
|
|
51484
51897
|
versionInfo: {
|
|
51485
|
-
currentVersion: "0.35.
|
|
51898
|
+
currentVersion: "0.35.7"
|
|
51486
51899
|
}
|
|
51487
51900
|
});
|
|
51488
51901
|
zt(app, process3.argv.slice(2), buildContext(process3));
|
|
@@ -51490,5 +51903,5 @@ export {
|
|
|
51490
51903
|
app
|
|
51491
51904
|
};
|
|
51492
51905
|
|
|
51493
|
-
//# debugId=
|
|
51906
|
+
//# debugId=F940261BBB1F88AB64756E2164756E21
|
|
51494
51907
|
//# sourceMappingURL=mcp-server.js.map
|