@rightbrain/brain-api-client 0.0.1-dev.135.b0b3ef9 → 0.0.1-dev.136.cf3a114

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (4) hide show
  1. package/api.ts +1781 -54
  2. package/dist/api.d.ts +1350 -75
  3. package/dist/api.js +1418 -253
  4. package/package.json +1 -1
package/api.ts CHANGED
@@ -347,6 +347,18 @@ export interface AvailableSkillRead {
347
347
  * @memberof AvailableSkillRead
348
348
  */
349
349
  'has_active_revision': boolean;
350
+ /**
351
+ *
352
+ * @type {boolean}
353
+ * @memberof AvailableSkillRead
354
+ */
355
+ 'has_capabilities': boolean;
356
+ /**
357
+ *
358
+ * @type {boolean}
359
+ * @memberof AvailableSkillRead
360
+ */
361
+ 'requires_prerequisites': boolean;
350
362
  /**
351
363
  *
352
364
  * @type {SkillRevisionSummary}
@@ -1325,6 +1337,12 @@ export const DatasourceSyncRunStatusEnum = {
1325
1337
 
1326
1338
  export type DatasourceSyncRunStatusEnum = typeof DatasourceSyncRunStatusEnum[keyof typeof DatasourceSyncRunStatusEnum];
1327
1339
 
1340
+ /**
1341
+ * @type DependenciesInner
1342
+ * @export
1343
+ */
1344
+ export type DependenciesInner = { type: 'integration' } & IntegrationSkillDependency | { type: 'mcp_server' } & McpServerSkillDependency | { type: 'mcp_tool' } & McpToolSkillDependency | { type: 'registered_tool' } & RegisteredToolSkillDependency;
1345
+
1328
1346
  /**
1329
1347
  *
1330
1348
  * @export
@@ -2758,6 +2776,25 @@ export const IntegrationAuthStatusReadAuthTypeEnum = {
2758
2776
 
2759
2777
  export type IntegrationAuthStatusReadAuthTypeEnum = typeof IntegrationAuthStatusReadAuthTypeEnum[keyof typeof IntegrationAuthStatusReadAuthTypeEnum];
2760
2778
 
2779
+ /**
2780
+ *
2781
+ * @export
2782
+ * @interface IntegrationCapabilitySelector
2783
+ */
2784
+ export interface IntegrationCapabilitySelector {
2785
+ /**
2786
+ * Stable integration type identifier required by the skill.
2787
+ * @type {string}
2788
+ * @memberof IntegrationCapabilitySelector
2789
+ */
2790
+ 'integration_type': string;
2791
+ /**
2792
+ * Integration tool name required by the skill.
2793
+ * @type {string}
2794
+ * @memberof IntegrationCapabilitySelector
2795
+ */
2796
+ 'tool_name': string;
2797
+ }
2761
2798
  /**
2762
2799
  *
2763
2800
  * @export
@@ -2837,6 +2874,37 @@ export interface IntegrationCatalogToolRead {
2837
2874
  */
2838
2875
  'description'?: string | null;
2839
2876
  }
2877
+ /**
2878
+ *
2879
+ * @export
2880
+ * @interface IntegrationSkillDependency
2881
+ */
2882
+ export interface IntegrationSkillDependency {
2883
+ /**
2884
+ * Stable identifier for this dependency within the capability set.
2885
+ * @type {string}
2886
+ * @memberof IntegrationSkillDependency
2887
+ */
2888
+ 'id': string;
2889
+ /**
2890
+ *
2891
+ * @type {string}
2892
+ * @memberof IntegrationSkillDependency
2893
+ */
2894
+ 'type': string;
2895
+ /**
2896
+ * Whether the dependency must be resolvable for the skill to function.
2897
+ * @type {boolean}
2898
+ * @memberof IntegrationSkillDependency
2899
+ */
2900
+ 'required': boolean;
2901
+ /**
2902
+ *
2903
+ * @type {IntegrationCapabilitySelector}
2904
+ * @memberof IntegrationSkillDependency
2905
+ */
2906
+ 'selector': IntegrationCapabilitySelector;
2907
+ }
2840
2908
  /**
2841
2909
  * Schema for an individual integration tool invocation during a run.
2842
2910
  * @export
@@ -4448,6 +4516,19 @@ export interface McpServer {
4448
4516
  */
4449
4517
  'modified': string;
4450
4518
  }
4519
+ /**
4520
+ *
4521
+ * @export
4522
+ * @interface McpServerCapabilitySelector
4523
+ */
4524
+ export interface McpServerCapabilitySelector {
4525
+ /**
4526
+ * Canonical MCP server slug required by the skill.
4527
+ * @type {string}
4528
+ * @memberof McpServerCapabilitySelector
4529
+ */
4530
+ 'mcp_server_slug': string;
4531
+ }
4451
4532
  /**
4452
4533
  * Attributes a user can submit to create an instance of McpServer.
4453
4534
  * @export
@@ -4545,6 +4626,37 @@ export interface McpServerDiscoveryResponse {
4545
4626
  }
4546
4627
 
4547
4628
 
4629
+ /**
4630
+ *
4631
+ * @export
4632
+ * @interface McpServerSkillDependency
4633
+ */
4634
+ export interface McpServerSkillDependency {
4635
+ /**
4636
+ * Stable identifier for this dependency within the capability set.
4637
+ * @type {string}
4638
+ * @memberof McpServerSkillDependency
4639
+ */
4640
+ 'id': string;
4641
+ /**
4642
+ *
4643
+ * @type {string}
4644
+ * @memberof McpServerSkillDependency
4645
+ */
4646
+ 'type': string;
4647
+ /**
4648
+ * Whether the dependency must be resolvable for the skill to function.
4649
+ * @type {boolean}
4650
+ * @memberof McpServerSkillDependency
4651
+ */
4652
+ 'required': boolean;
4653
+ /**
4654
+ *
4655
+ * @type {McpServerCapabilitySelector}
4656
+ * @memberof McpServerSkillDependency
4657
+ */
4658
+ 'selector': McpServerCapabilitySelector;
4659
+ }
4548
4660
  /**
4549
4661
  * Attributes a user can update.
4550
4662
  * @export
@@ -4570,6 +4682,25 @@ export interface McpServerUpdate {
4570
4682
  */
4571
4683
  'url'?: string | null;
4572
4684
  }
4685
+ /**
4686
+ *
4687
+ * @export
4688
+ * @interface McpToolCapabilitySelector
4689
+ */
4690
+ export interface McpToolCapabilitySelector {
4691
+ /**
4692
+ * Canonical MCP server slug required by the skill.
4693
+ * @type {string}
4694
+ * @memberof McpToolCapabilitySelector
4695
+ */
4696
+ 'mcp_server_slug': string;
4697
+ /**
4698
+ * MCP tool name required by the skill.
4699
+ * @type {string}
4700
+ * @memberof McpToolCapabilitySelector
4701
+ */
4702
+ 'tool_name': string;
4703
+ }
4573
4704
  /**
4574
4705
  * Schema for an individual MCP tool invocation during a run.
4575
4706
  * @export
@@ -4613,6 +4744,37 @@ export interface McpToolInvocationRead {
4613
4744
  */
4614
4745
  'error_message'?: string | null;
4615
4746
  }
4747
+ /**
4748
+ *
4749
+ * @export
4750
+ * @interface McpToolSkillDependency
4751
+ */
4752
+ export interface McpToolSkillDependency {
4753
+ /**
4754
+ * Stable identifier for this dependency within the capability set.
4755
+ * @type {string}
4756
+ * @memberof McpToolSkillDependency
4757
+ */
4758
+ 'id': string;
4759
+ /**
4760
+ *
4761
+ * @type {string}
4762
+ * @memberof McpToolSkillDependency
4763
+ */
4764
+ 'type': string;
4765
+ /**
4766
+ * Whether the dependency must be resolvable for the skill to function.
4767
+ * @type {boolean}
4768
+ * @memberof McpToolSkillDependency
4769
+ */
4770
+ 'required': boolean;
4771
+ /**
4772
+ *
4773
+ * @type {McpToolCapabilitySelector}
4774
+ * @memberof McpToolSkillDependency
4775
+ */
4776
+ 'selector': McpToolCapabilitySelector;
4777
+ }
4616
4778
  /**
4617
4779
  *
4618
4780
  * @export
@@ -7093,6 +7255,82 @@ export const ProjectIntegrationCreateTypeEnum = {
7093
7255
 
7094
7256
  export type ProjectIntegrationCreateTypeEnum = typeof ProjectIntegrationCreateTypeEnum[keyof typeof ProjectIntegrationCreateTypeEnum];
7095
7257
 
7258
+ /**
7259
+ *
7260
+ * @export
7261
+ * @interface ProjectIntegrationIAMMemberRoleUpdate
7262
+ */
7263
+ export interface ProjectIntegrationIAMMemberRoleUpdate {
7264
+ /**
7265
+ * A list of project_integration roles to grant to the member. Roles in this list are applied to the member AFTER any removals specified in `remove`. This may be combined with `remove_all` to replace the member\'s entire role list.
7266
+ * @type {Array<string>}
7267
+ * @memberof ProjectIntegrationIAMMemberRoleUpdate
7268
+ */
7269
+ 'add'?: Array<ProjectIntegrationIAMMemberRoleUpdateAddEnum>;
7270
+ /**
7271
+ * A list of project_integration roles to revoke from the member.
7272
+ * @type {Array<string>}
7273
+ * @memberof ProjectIntegrationIAMMemberRoleUpdate
7274
+ */
7275
+ 'remove'?: Array<ProjectIntegrationIAMMemberRoleUpdateRemoveEnum>;
7276
+ /**
7277
+ * Removes all existing roles from the member. This may be combined with `add` to replace all existing roles that the member holds.
7278
+ * @type {boolean}
7279
+ * @memberof ProjectIntegrationIAMMemberRoleUpdate
7280
+ */
7281
+ 'remove_all'?: boolean | null;
7282
+ }
7283
+
7284
+ export const ProjectIntegrationIAMMemberRoleUpdateAddEnum = {
7285
+ Editor: 'editor',
7286
+ Owner: 'owner',
7287
+ Viewer: 'viewer'
7288
+ } as const;
7289
+
7290
+ export type ProjectIntegrationIAMMemberRoleUpdateAddEnum = typeof ProjectIntegrationIAMMemberRoleUpdateAddEnum[keyof typeof ProjectIntegrationIAMMemberRoleUpdateAddEnum];
7291
+ export const ProjectIntegrationIAMMemberRoleUpdateRemoveEnum = {
7292
+ Editor: 'editor',
7293
+ Owner: 'owner',
7294
+ Viewer: 'viewer'
7295
+ } as const;
7296
+
7297
+ export type ProjectIntegrationIAMMemberRoleUpdateRemoveEnum = typeof ProjectIntegrationIAMMemberRoleUpdateRemoveEnum[keyof typeof ProjectIntegrationIAMMemberRoleUpdateRemoveEnum];
7298
+
7299
+ /**
7300
+ *
7301
+ * @export
7302
+ * @interface ProjectIntegrationIAMPermissionTest
7303
+ */
7304
+ export interface ProjectIntegrationIAMPermissionTest {
7305
+ /**
7306
+ * A list of permissions to test on the project_integration.
7307
+ * @type {Array<string>}
7308
+ * @memberof ProjectIntegrationIAMPermissionTest
7309
+ */
7310
+ 'permissions': Array<ProjectIntegrationIAMPermissionTestPermissionsEnum>;
7311
+ /**
7312
+ *
7313
+ * @type {string}
7314
+ * @memberof ProjectIntegrationIAMPermissionTest
7315
+ */
7316
+ 'member'?: string | null;
7317
+ }
7318
+
7319
+ export const ProjectIntegrationIAMPermissionTestPermissionsEnum = {
7320
+ AddEditor: 'add_editor',
7321
+ AddMember: 'add_member',
7322
+ AddOwner: 'add_owner',
7323
+ Delete: 'delete',
7324
+ Edit: 'edit',
7325
+ RemoveEditor: 'remove_editor',
7326
+ RemoveMember: 'remove_member',
7327
+ RemoveOwner: 'remove_owner',
7328
+ View: 'view',
7329
+ ViewMembers: 'view_members'
7330
+ } as const;
7331
+
7332
+ export type ProjectIntegrationIAMPermissionTestPermissionsEnum = typeof ProjectIntegrationIAMPermissionTestPermissionsEnum[keyof typeof ProjectIntegrationIAMPermissionTestPermissionsEnum];
7333
+
7096
7334
  /**
7097
7335
  *
7098
7336
  * @export
@@ -7183,12 +7421,6 @@ export type ProjectIntegrationReadAuthTypeEnum = typeof ProjectIntegrationReadAu
7183
7421
  * @interface ProjectSkillCreate
7184
7422
  */
7185
7423
  export interface ProjectSkillCreate {
7186
- /**
7187
- * Stable lowercase kebab-case identifier for the skill.
7188
- * @type {string}
7189
- * @memberof ProjectSkillCreate
7190
- */
7191
- 'slug': string;
7192
7424
  /**
7193
7425
  * Human-readable name of the skill.
7194
7426
  * @type {string}
@@ -7213,6 +7445,12 @@ export interface ProjectSkillCreate {
7213
7445
  * @memberof ProjectSkillCreate
7214
7446
  */
7215
7447
  'compatibility'?: string | null;
7448
+ /**
7449
+ * Stable lowercase kebab-case identifier for the skill.
7450
+ * @type {string}
7451
+ * @memberof ProjectSkillCreate
7452
+ */
7453
+ 'slug'?: string | null;
7216
7454
  /**
7217
7455
  * The primary instructions for this skill.
7218
7456
  * @type {string}
@@ -7237,6 +7475,12 @@ export interface ProjectSkillCreate {
7237
7475
  * @memberof ProjectSkillCreate
7238
7476
  */
7239
7477
  'skill_metadata'?: { [key: string]: any; } | null;
7478
+ /**
7479
+ *
7480
+ * @type {SkillCapabilitiesInput}
7481
+ * @memberof ProjectSkillCreate
7482
+ */
7483
+ 'capabilities'?: SkillCapabilitiesInput;
7240
7484
  }
7241
7485
  /**
7242
7486
  *
@@ -7298,6 +7542,18 @@ export interface ProjectSkillRead {
7298
7542
  * @memberof ProjectSkillRead
7299
7543
  */
7300
7544
  'has_active_revision': boolean;
7545
+ /**
7546
+ *
7547
+ * @type {boolean}
7548
+ * @memberof ProjectSkillRead
7549
+ */
7550
+ 'has_capabilities': boolean;
7551
+ /**
7552
+ *
7553
+ * @type {boolean}
7554
+ * @memberof ProjectSkillRead
7555
+ */
7556
+ 'requires_prerequisites': boolean;
7301
7557
  /**
7302
7558
  *
7303
7559
  * @type {SkillRevisionSummary}
@@ -7359,6 +7615,12 @@ export interface ProjectSkillRevisionCreate {
7359
7615
  * @memberof ProjectSkillRevisionCreate
7360
7616
  */
7361
7617
  'skill_metadata'?: { [key: string]: any; } | null;
7618
+ /**
7619
+ *
7620
+ * @type {SkillCapabilitiesInput}
7621
+ * @memberof ProjectSkillRevisionCreate
7622
+ */
7623
+ 'capabilities'?: SkillCapabilitiesInput;
7362
7624
  /**
7363
7625
  * Optional human note describing this revision.
7364
7626
  * @type {string}
@@ -7746,6 +8008,56 @@ export interface PurgeOrgCacheResponse {
7746
8008
  */
7747
8009
  'message': string;
7748
8010
  }
8011
+ /**
8012
+ *
8013
+ * @export
8014
+ * @interface RegisteredToolCapabilitySelector
8015
+ */
8016
+ export interface RegisteredToolCapabilitySelector {
8017
+ /**
8018
+ * Selector kind for a platform-registered tool capability.
8019
+ * @type {string}
8020
+ * @memberof RegisteredToolCapabilitySelector
8021
+ */
8022
+ 'kind'?: string;
8023
+ /**
8024
+ * Stable registered tool key for the required capability.
8025
+ * @type {string}
8026
+ * @memberof RegisteredToolCapabilitySelector
8027
+ */
8028
+ 'value': string;
8029
+ }
8030
+ /**
8031
+ *
8032
+ * @export
8033
+ * @interface RegisteredToolSkillDependency
8034
+ */
8035
+ export interface RegisteredToolSkillDependency {
8036
+ /**
8037
+ * Stable identifier for this dependency within the capability set.
8038
+ * @type {string}
8039
+ * @memberof RegisteredToolSkillDependency
8040
+ */
8041
+ 'id': string;
8042
+ /**
8043
+ *
8044
+ * @type {string}
8045
+ * @memberof RegisteredToolSkillDependency
8046
+ */
8047
+ 'type': string;
8048
+ /**
8049
+ * Whether the dependency must be resolvable for the skill to function.
8050
+ * @type {boolean}
8051
+ * @memberof RegisteredToolSkillDependency
8052
+ */
8053
+ 'required': boolean;
8054
+ /**
8055
+ *
8056
+ * @type {RegisteredToolCapabilitySelector}
8057
+ * @memberof RegisteredToolSkillDependency
8058
+ */
8059
+ 'selector': RegisteredToolCapabilitySelector;
8060
+ }
7749
8061
  /**
7750
8062
  * Schema for reporting group responses.
7751
8063
  * @export
@@ -7932,6 +8244,30 @@ export type Response400ProjectIamOrgOrgIdProjectProjectIdOauthClientOauthClientI
7932
8244
  */
7933
8245
  export type Response400ProjectIamOrgOrgIdProjectProjectIdOauthClientOauthClientIdIamUpdateMemberRoles = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse | { reason: 'MULTIPLE_ROLES_NOT_ALLOWED' } & MultipleRolesNotAllowedErrorResponse;
7934
8246
 
8247
+ /**
8248
+ * @type Response400ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions
8249
+ * @export
8250
+ */
8251
+ export type Response400ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse;
8252
+
8253
+ /**
8254
+ * @type Response400ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles
8255
+ * @export
8256
+ */
8257
+ export type Response400ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse | { reason: 'MULTIPLE_ROLES_NOT_ALLOWED' } & MultipleRolesNotAllowedErrorResponse;
8258
+
8259
+ /**
8260
+ * @type Response400TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions
8261
+ * @export
8262
+ */
8263
+ export type Response400TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse;
8264
+
8265
+ /**
8266
+ * @type Response400TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles
8267
+ * @export
8268
+ */
8269
+ export type Response400TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse | { reason: 'MULTIPLE_ROLES_NOT_ALLOWED' } & MultipleRolesNotAllowedErrorResponse;
8270
+
7935
8271
  /**
7936
8272
  * @type Response400TaskForwarderIamOrgOrgIdProjectProjectIdTaskForwarderTaskForwarderIdIamTestPermissions
7937
8273
  * @export
@@ -8316,6 +8652,12 @@ export type Response403Gettaskcreditreport = { reason: 'MISSING_AUTHENTICATION'
8316
8652
  */
8317
8653
  export type Response403Gettaskmcpserver = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8318
8654
 
8655
+ /**
8656
+ * @type Response403Gettaskmcpservercatalog
8657
+ * @export
8658
+ */
8659
+ export type Response403Gettaskmcpservercatalog = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8660
+
8319
8661
  /**
8320
8662
  * @type Response403Gettaskmcptool
8321
8663
  * @export
@@ -8436,6 +8778,12 @@ export type Response403Listslackchannelmappings = { reason: 'MISSING_AUTHENTICAT
8436
8778
  */
8437
8779
  export type Response403Listslackinstallations = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8438
8780
 
8781
+ /**
8782
+ * @type Response403Listtaskmcpservercatalog
8783
+ * @export
8784
+ */
8785
+ export type Response403Listtaskmcpservercatalog = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8786
+
8439
8787
  /**
8440
8788
  * @type Response403Listtaskmcpservers
8441
8789
  * @export
@@ -8532,6 +8880,30 @@ export type Response403ProjectIamOrgOrgIdProjectProjectIdOauthClientOauthClientI
8532
8880
  */
8533
8881
  export type Response403ProjectIamOrgOrgIdProjectProjectIdOauthClientOauthClientIdIamUpdateMemberRoles = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8534
8882
 
8883
+ /**
8884
+ * @type Response403ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember
8885
+ * @export
8886
+ */
8887
+ export type Response403ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8888
+
8889
+ /**
8890
+ * @type Response403ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers
8891
+ * @export
8892
+ */
8893
+ export type Response403ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8894
+
8895
+ /**
8896
+ * @type Response403ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions
8897
+ * @export
8898
+ */
8899
+ export type Response403ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8900
+
8901
+ /**
8902
+ * @type Response403ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles
8903
+ * @export
8904
+ */
8905
+ export type Response403ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8906
+
8535
8907
  /**
8536
8908
  * @type Response403Queryprojectcollection
8537
8909
  * @export
@@ -8592,6 +8964,30 @@ export type Response403Rotatewebhooksecret = { reason: 'MISSING_AUTHENTICATION'
8592
8964
  */
8593
8965
  export type Response403Suggestprojecttopics = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8594
8966
 
8967
+ /**
8968
+ * @type Response403TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember
8969
+ * @export
8970
+ */
8971
+ export type Response403TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8972
+
8973
+ /**
8974
+ * @type Response403TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers
8975
+ * @export
8976
+ */
8977
+ export type Response403TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8978
+
8979
+ /**
8980
+ * @type Response403TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions
8981
+ * @export
8982
+ */
8983
+ export type Response403TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8984
+
8985
+ /**
8986
+ * @type Response403TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles
8987
+ * @export
8988
+ */
8989
+ export type Response403TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8990
+
8595
8991
  /**
8596
8992
  * @type Response403TaskForwarderIamOrgOrgIdProjectProjectIdTaskForwarderTaskForwarderIdIamGetMember
8597
8993
  * @export
@@ -9334,6 +9730,44 @@ export interface SkillActivationRead {
9334
9730
  */
9335
9731
  'activated': boolean;
9336
9732
  }
9733
+ /**
9734
+ *
9735
+ * @export
9736
+ * @interface SkillCapabilitiesInput
9737
+ */
9738
+ export interface SkillCapabilitiesInput {
9739
+ /**
9740
+ * Versioned schema identifier for the capability contract.
9741
+ * @type {string}
9742
+ * @memberof SkillCapabilitiesInput
9743
+ */
9744
+ 'schema_version': string;
9745
+ /**
9746
+ * Declarative dependency requirements for this skill revision.
9747
+ * @type {Array<DependenciesInner>}
9748
+ * @memberof SkillCapabilitiesInput
9749
+ */
9750
+ 'dependencies': Array<DependenciesInner>;
9751
+ }
9752
+ /**
9753
+ *
9754
+ * @export
9755
+ * @interface SkillCapabilitiesOutput
9756
+ */
9757
+ export interface SkillCapabilitiesOutput {
9758
+ /**
9759
+ * Versioned schema identifier for the capability contract.
9760
+ * @type {string}
9761
+ * @memberof SkillCapabilitiesOutput
9762
+ */
9763
+ 'schema_version': string;
9764
+ /**
9765
+ * Declarative dependency requirements for this skill revision.
9766
+ * @type {Array<DependenciesInner>}
9767
+ * @memberof SkillCapabilitiesOutput
9768
+ */
9769
+ 'dependencies': Array<DependenciesInner>;
9770
+ }
9337
9771
  /**
9338
9772
  *
9339
9773
  * @export
@@ -9455,6 +9889,18 @@ export interface SkillRead {
9455
9889
  * @memberof SkillRead
9456
9890
  */
9457
9891
  'has_active_revision': boolean;
9892
+ /**
9893
+ *
9894
+ * @type {boolean}
9895
+ * @memberof SkillRead
9896
+ */
9897
+ 'has_capabilities': boolean;
9898
+ /**
9899
+ *
9900
+ * @type {boolean}
9901
+ * @memberof SkillRead
9902
+ */
9903
+ 'requires_prerequisites': boolean;
9458
9904
  /**
9459
9905
  *
9460
9906
  * @type {SkillRevisionSummary}
@@ -9504,6 +9950,12 @@ export interface SkillRevisionContent {
9504
9950
  * @memberof SkillRevisionContent
9505
9951
  */
9506
9952
  'skill_metadata': { [key: string]: any; } | null;
9953
+ /**
9954
+ *
9955
+ * @type {SkillCapabilitiesOutput}
9956
+ * @memberof SkillRevisionContent
9957
+ */
9958
+ 'capabilities': SkillCapabilitiesOutput;
9507
9959
  /**
9508
9960
  *
9509
9961
  * @type {string}
@@ -10205,7 +10657,7 @@ export interface TaskActiveRevision {
10205
10657
  'weight'?: number | null;
10206
10658
  }
10207
10659
  /**
10208
- * Schema for creating a TaskAgent.
10660
+ * Schema for creating a TaskAgent. ``registered_tools`` are intentionally omitted from the public write contract. They remain skill-managed and internal-only.
10209
10661
  * @export
10210
10662
  * @interface TaskAgentCreate
10211
10663
  */
@@ -10453,6 +10905,82 @@ export const TaskAgentFileMetadataSourceEnum = {
10453
10905
 
10454
10906
  export type TaskAgentFileMetadataSourceEnum = typeof TaskAgentFileMetadataSourceEnum[keyof typeof TaskAgentFileMetadataSourceEnum];
10455
10907
 
10908
+ /**
10909
+ *
10910
+ * @export
10911
+ * @interface TaskAgentIAMMemberRoleUpdate
10912
+ */
10913
+ export interface TaskAgentIAMMemberRoleUpdate {
10914
+ /**
10915
+ * A list of task_agent roles to grant to the member. Roles in this list are applied to the member AFTER any removals specified in `remove`. This may be combined with `remove_all` to replace the member\'s entire role list.
10916
+ * @type {Array<string>}
10917
+ * @memberof TaskAgentIAMMemberRoleUpdate
10918
+ */
10919
+ 'add'?: Array<TaskAgentIAMMemberRoleUpdateAddEnum>;
10920
+ /**
10921
+ * A list of task_agent roles to revoke from the member.
10922
+ * @type {Array<string>}
10923
+ * @memberof TaskAgentIAMMemberRoleUpdate
10924
+ */
10925
+ 'remove'?: Array<TaskAgentIAMMemberRoleUpdateRemoveEnum>;
10926
+ /**
10927
+ * Removes all existing roles from the member. This may be combined with `add` to replace all existing roles that the member holds.
10928
+ * @type {boolean}
10929
+ * @memberof TaskAgentIAMMemberRoleUpdate
10930
+ */
10931
+ 'remove_all'?: boolean | null;
10932
+ }
10933
+
10934
+ export const TaskAgentIAMMemberRoleUpdateAddEnum = {
10935
+ Editor: 'editor',
10936
+ Owner: 'owner',
10937
+ Viewer: 'viewer'
10938
+ } as const;
10939
+
10940
+ export type TaskAgentIAMMemberRoleUpdateAddEnum = typeof TaskAgentIAMMemberRoleUpdateAddEnum[keyof typeof TaskAgentIAMMemberRoleUpdateAddEnum];
10941
+ export const TaskAgentIAMMemberRoleUpdateRemoveEnum = {
10942
+ Editor: 'editor',
10943
+ Owner: 'owner',
10944
+ Viewer: 'viewer'
10945
+ } as const;
10946
+
10947
+ export type TaskAgentIAMMemberRoleUpdateRemoveEnum = typeof TaskAgentIAMMemberRoleUpdateRemoveEnum[keyof typeof TaskAgentIAMMemberRoleUpdateRemoveEnum];
10948
+
10949
+ /**
10950
+ *
10951
+ * @export
10952
+ * @interface TaskAgentIAMPermissionTest
10953
+ */
10954
+ export interface TaskAgentIAMPermissionTest {
10955
+ /**
10956
+ * A list of permissions to test on the task_agent.
10957
+ * @type {Array<string>}
10958
+ * @memberof TaskAgentIAMPermissionTest
10959
+ */
10960
+ 'permissions': Array<TaskAgentIAMPermissionTestPermissionsEnum>;
10961
+ /**
10962
+ *
10963
+ * @type {string}
10964
+ * @memberof TaskAgentIAMPermissionTest
10965
+ */
10966
+ 'member'?: string | null;
10967
+ }
10968
+
10969
+ export const TaskAgentIAMPermissionTestPermissionsEnum = {
10970
+ AddEditor: 'add_editor',
10971
+ AddMember: 'add_member',
10972
+ AddOwner: 'add_owner',
10973
+ Edit: 'edit',
10974
+ RemoveEditor: 'remove_editor',
10975
+ RemoveMember: 'remove_member',
10976
+ RemoveOwner: 'remove_owner',
10977
+ Run: 'run',
10978
+ View: 'view',
10979
+ ViewMembers: 'view_members'
10980
+ } as const;
10981
+
10982
+ export type TaskAgentIAMPermissionTestPermissionsEnum = typeof TaskAgentIAMPermissionTestPermissionsEnum[keyof typeof TaskAgentIAMPermissionTestPermissionsEnum];
10983
+
10456
10984
  /**
10457
10985
  *
10458
10986
  * @export
@@ -10526,6 +11054,30 @@ export interface TaskAgentIntegrationRead {
10526
11054
  * @memberof TaskAgentIntegrationRead
10527
11055
  */
10528
11056
  'tool_count': number;
11057
+ /**
11058
+ *
11059
+ * @type {string}
11060
+ * @memberof TaskAgentIntegrationRead
11061
+ */
11062
+ 'provision_source': TaskAgentIntegrationReadProvisionSourceEnum;
11063
+ /**
11064
+ *
11065
+ * @type {string}
11066
+ * @memberof TaskAgentIntegrationRead
11067
+ */
11068
+ 'source_skill_id'?: string | null;
11069
+ /**
11070
+ *
11071
+ * @type {string}
11072
+ * @memberof TaskAgentIntegrationRead
11073
+ */
11074
+ 'source_skill_revision_id'?: string | null;
11075
+ /**
11076
+ *
11077
+ * @type {string}
11078
+ * @memberof TaskAgentIntegrationRead
11079
+ */
11080
+ 'source_capability_id'?: string | null;
10529
11081
  }
10530
11082
 
10531
11083
  export const TaskAgentIntegrationReadIntegrationTypeEnum = {
@@ -10537,6 +11089,12 @@ export const TaskAgentIntegrationReadIntegrationTypeEnum = {
10537
11089
  } as const;
10538
11090
 
10539
11091
  export type TaskAgentIntegrationReadIntegrationTypeEnum = typeof TaskAgentIntegrationReadIntegrationTypeEnum[keyof typeof TaskAgentIntegrationReadIntegrationTypeEnum];
11092
+ export const TaskAgentIntegrationReadProvisionSourceEnum = {
11093
+ Manual: 'manual',
11094
+ SkillCapability: 'skill_capability'
11095
+ } as const;
11096
+
11097
+ export type TaskAgentIntegrationReadProvisionSourceEnum = typeof TaskAgentIntegrationReadProvisionSourceEnum[keyof typeof TaskAgentIntegrationReadProvisionSourceEnum];
10540
11098
 
10541
11099
  /**
10542
11100
  * MCP server to attach to a TaskAgent.
@@ -10605,7 +11163,39 @@ export interface TaskAgentMcpServerRead {
10605
11163
  * @memberof TaskAgentMcpServerRead
10606
11164
  */
10607
11165
  'tool_count': number;
11166
+ /**
11167
+ *
11168
+ * @type {string}
11169
+ * @memberof TaskAgentMcpServerRead
11170
+ */
11171
+ 'provision_source': TaskAgentMcpServerReadProvisionSourceEnum;
11172
+ /**
11173
+ *
11174
+ * @type {string}
11175
+ * @memberof TaskAgentMcpServerRead
11176
+ */
11177
+ 'source_skill_id'?: string | null;
11178
+ /**
11179
+ *
11180
+ * @type {string}
11181
+ * @memberof TaskAgentMcpServerRead
11182
+ */
11183
+ 'source_skill_revision_id'?: string | null;
11184
+ /**
11185
+ *
11186
+ * @type {string}
11187
+ * @memberof TaskAgentMcpServerRead
11188
+ */
11189
+ 'source_capability_id'?: string | null;
10608
11190
  }
11191
+
11192
+ export const TaskAgentMcpServerReadProvisionSourceEnum = {
11193
+ Manual: 'manual',
11194
+ SkillCapability: 'skill_capability'
11195
+ } as const;
11196
+
11197
+ export type TaskAgentMcpServerReadProvisionSourceEnum = typeof TaskAgentMcpServerReadProvisionSourceEnum[keyof typeof TaskAgentMcpServerReadProvisionSourceEnum];
11198
+
10609
11199
  /**
10610
11200
  * Execution mode for TaskAgent.
10611
11201
  * @export
@@ -10692,6 +11282,12 @@ export interface TaskAgentRead {
10692
11282
  * @memberof TaskAgentRead
10693
11283
  */
10694
11284
  'mcp_servers'?: Array<TaskAgentMcpServerRead>;
11285
+ /**
11286
+ *
11287
+ * @type {Array<TaskAgentRegisteredToolRead>}
11288
+ * @memberof TaskAgentRead
11289
+ */
11290
+ 'registered_tools'?: Array<TaskAgentRegisteredToolRead>;
10695
11291
  /**
10696
11292
  *
10697
11293
  * @type {string}
@@ -10744,6 +11340,93 @@ export const TaskAgentReadTaskAgentRunVisibilityEnum = {
10744
11340
 
10745
11341
  export type TaskAgentReadTaskAgentRunVisibilityEnum = typeof TaskAgentReadTaskAgentRunVisibilityEnum[keyof typeof TaskAgentReadTaskAgentRunVisibilityEnum];
10746
11342
 
11343
+ /**
11344
+ * Registered first-party tool association in a TaskAgent read response.
11345
+ * @export
11346
+ * @interface TaskAgentRegisteredToolRead
11347
+ */
11348
+ export interface TaskAgentRegisteredToolRead {
11349
+ /**
11350
+ *
11351
+ * @type {string}
11352
+ * @memberof TaskAgentRegisteredToolRead
11353
+ */
11354
+ 'id': string;
11355
+ /**
11356
+ *
11357
+ * @type {string}
11358
+ * @memberof TaskAgentRegisteredToolRead
11359
+ */
11360
+ 'registered_tool_key': string;
11361
+ /**
11362
+ * Pinned immutable runtime implementation version.
11363
+ * @type {string}
11364
+ * @memberof TaskAgentRegisteredToolRead
11365
+ */
11366
+ 'registered_tool_version': string;
11367
+ /**
11368
+ * Human-readable name of the registered first-party tool.
11369
+ * @type {string}
11370
+ * @memberof TaskAgentRegisteredToolRead
11371
+ */
11372
+ 'name': string;
11373
+ /**
11374
+ * Attachment order (0-indexed).
11375
+ * @type {number}
11376
+ * @memberof TaskAgentRegisteredToolRead
11377
+ */
11378
+ 'order': number;
11379
+ /**
11380
+ * Whether this registered tool is enabled.
11381
+ * @type {boolean}
11382
+ * @memberof TaskAgentRegisteredToolRead
11383
+ */
11384
+ 'enabled': boolean;
11385
+ /**
11386
+ * Concrete tool names reserved by this registered tool.
11387
+ * @type {Array<string>}
11388
+ * @memberof TaskAgentRegisteredToolRead
11389
+ */
11390
+ 'tool_names'?: Array<string>;
11391
+ /**
11392
+ * Optional description of the registered tool capability.
11393
+ * @type {string}
11394
+ * @memberof TaskAgentRegisteredToolRead
11395
+ */
11396
+ 'description'?: string | null;
11397
+ /**
11398
+ *
11399
+ * @type {string}
11400
+ * @memberof TaskAgentRegisteredToolRead
11401
+ */
11402
+ 'provision_source': TaskAgentRegisteredToolReadProvisionSourceEnum;
11403
+ /**
11404
+ *
11405
+ * @type {string}
11406
+ * @memberof TaskAgentRegisteredToolRead
11407
+ */
11408
+ 'source_skill_id'?: string | null;
11409
+ /**
11410
+ *
11411
+ * @type {string}
11412
+ * @memberof TaskAgentRegisteredToolRead
11413
+ */
11414
+ 'source_skill_revision_id'?: string | null;
11415
+ /**
11416
+ *
11417
+ * @type {string}
11418
+ * @memberof TaskAgentRegisteredToolRead
11419
+ */
11420
+ 'source_capability_id'?: string | null;
11421
+ }
11422
+
11423
+ export const TaskAgentRegisteredToolReadProvisionSourceEnum = {
11424
+ Manual: 'manual',
11425
+ SkillCapability: 'skill_capability'
11426
+ } as const;
11427
+
11428
+ export type TaskAgentRegisteredToolReadProvisionSourceEnum = typeof TaskAgentRegisteredToolReadProvisionSourceEnum[keyof typeof TaskAgentRegisteredToolReadProvisionSourceEnum];
11429
+
10747
11430
  /**
10748
11431
  * Response containing events for a TaskAgentRun.
10749
11432
  * @export
@@ -11072,7 +11755,7 @@ export interface TaskAgentSkillInput {
11072
11755
  */
11073
11756
  'skill_id': string;
11074
11757
  /**
11075
- * Pinned skill revision. None uses the skill\'s active revision at runtime.
11758
+ * Pinned skill revision. None is only valid for non-capability skills; skills with capabilities must be pinned to a concrete revision.
11076
11759
  * @type {string}
11077
11760
  * @memberof TaskAgentSkillInput
11078
11761
  */
@@ -11109,7 +11792,7 @@ export interface TaskAgentSkillRead {
11109
11792
  */
11110
11793
  'skill_display_name': string;
11111
11794
  /**
11112
- * Pinned revision ID, or None when the agent follows the active revision.
11795
+ * Pinned revision ID. None is only valid for non-capability skills; skills with capabilities must be pinned to a concrete revision.
11113
11796
  * @type {string}
11114
11797
  * @memberof TaskAgentSkillRead
11115
11798
  */
@@ -11291,7 +11974,7 @@ export interface TaskAgentTokenReport {
11291
11974
  'total_runs': number;
11292
11975
  }
11293
11976
  /**
11294
- * Schema for updating a TaskAgent.
11977
+ * Schema for updating a TaskAgent. ``registered_tools`` are intentionally omitted from the public write contract. They remain skill-managed and internal-only.
11295
11978
  * @export
11296
11979
  * @interface TaskAgentUpdate
11297
11980
  */
@@ -11960,6 +12643,18 @@ export interface TaskMcpServer {
11960
12643
  * @memberof TaskMcpServer
11961
12644
  */
11962
12645
  'id': string;
12646
+ /**
12647
+ *
12648
+ * @type {string}
12649
+ * @memberof TaskMcpServer
12650
+ */
12651
+ 'catalog_server_id'?: string | null;
12652
+ /**
12653
+ *
12654
+ * @type {string}
12655
+ * @memberof TaskMcpServer
12656
+ */
12657
+ 'catalog_server_slug'?: string | null;
11963
12658
  /**
11964
12659
  *
11965
12660
  * @type {string}
@@ -12039,6 +12734,77 @@ export const TaskMcpServerAuthStateReasonEnum = {
12039
12734
 
12040
12735
  export type TaskMcpServerAuthStateReasonEnum = typeof TaskMcpServerAuthStateReasonEnum[keyof typeof TaskMcpServerAuthStateReasonEnum];
12041
12736
 
12737
+ /**
12738
+ *
12739
+ * @export
12740
+ * @interface TaskMcpServerCatalogRead
12741
+ */
12742
+ export interface TaskMcpServerCatalogRead {
12743
+ /**
12744
+ *
12745
+ * @type {string}
12746
+ * @memberof TaskMcpServerCatalogRead
12747
+ */
12748
+ 'id': string;
12749
+ /**
12750
+ *
12751
+ * @type {string}
12752
+ * @memberof TaskMcpServerCatalogRead
12753
+ */
12754
+ 'slug': string;
12755
+ /**
12756
+ *
12757
+ * @type {string}
12758
+ * @memberof TaskMcpServerCatalogRead
12759
+ */
12760
+ 'display_name': string;
12761
+ /**
12762
+ *
12763
+ * @type {string}
12764
+ * @memberof TaskMcpServerCatalogRead
12765
+ */
12766
+ 'description'?: string | null;
12767
+ /**
12768
+ *
12769
+ * @type {string}
12770
+ * @memberof TaskMcpServerCatalogRead
12771
+ */
12772
+ 'canonical_resource': string;
12773
+ /**
12774
+ *
12775
+ * @type {string}
12776
+ * @memberof TaskMcpServerCatalogRead
12777
+ */
12778
+ 'default_server_url': string;
12779
+ /**
12780
+ *
12781
+ * @type {TaskMcpTransport}
12782
+ * @memberof TaskMcpServerCatalogRead
12783
+ */
12784
+ 'default_transport': TaskMcpTransport;
12785
+ /**
12786
+ *
12787
+ * @type {string}
12788
+ * @memberof TaskMcpServerCatalogRead
12789
+ */
12790
+ 'auth_mode': TaskMcpServerCatalogReadAuthModeEnum;
12791
+ /**
12792
+ *
12793
+ * @type {boolean}
12794
+ * @memberof TaskMcpServerCatalogRead
12795
+ */
12796
+ 'enabled': boolean;
12797
+ }
12798
+
12799
+ export const TaskMcpServerCatalogReadAuthModeEnum = {
12800
+ None: 'none',
12801
+ Oauth: 'oauth',
12802
+ ApiKey: 'api_key',
12803
+ OauthOrApiKey: 'oauth_or_api_key'
12804
+ } as const;
12805
+
12806
+ export type TaskMcpServerCatalogReadAuthModeEnum = typeof TaskMcpServerCatalogReadAuthModeEnum[keyof typeof TaskMcpServerCatalogReadAuthModeEnum];
12807
+
12042
12808
  /**
12043
12809
  *
12044
12810
  * @export
@@ -15455,8 +16221,8 @@ export const AuditEventsApiAxiosParamCreator = function (configuration?: Configu
15455
16221
  /**
15456
16222
  * Export project audit events as NDJSON. Each line is a full audit event detail record, including the decrypted payload.
15457
16223
  * @summary Export Project Audit Events
15458
- * @param {string} orgId The unique identifier of the organization.
15459
- * @param {string} projectId The unique identifier of the project.
16224
+ * @param {string} orgId The organization ID
16225
+ * @param {string} projectId The project ID
15460
16226
  * @param {Array<string> | null} [eventType] Filter by one or more audit event types.
15461
16227
  * @param {string | null} [actorUserId] Filter by the acting user.
15462
16228
  * @param {string | null} [resourceType] Filter by resource type.
@@ -15532,8 +16298,8 @@ export const AuditEventsApiAxiosParamCreator = function (configuration?: Configu
15532
16298
  * Retrieve a single audit event for the project. The detail response includes the decrypted payload captured for the event.
15533
16299
  * @summary Get Project Audit Event
15534
16300
  * @param {string} auditEventId
15535
- * @param {string} orgId The unique identifier of the organization.
15536
- * @param {string} projectId The unique identifier of the project.
16301
+ * @param {string} orgId The organization ID
16302
+ * @param {string} projectId The project ID
15537
16303
  * @param {*} [options] Override http request option.
15538
16304
  * @throws {RequiredError}
15539
16305
  */
@@ -15577,8 +16343,8 @@ export const AuditEventsApiAxiosParamCreator = function (configuration?: Configu
15577
16343
  /**
15578
16344
  * List immutable audit events recorded for a project. Results are ordered by `occurred_at` descending, then `id` descending. The `cursor` parameter is an opaque pagination token and must be treated as an unreadable value by clients. Use the filters to narrow the feed by event type, actor, or resource identifiers.
15579
16345
  * @summary List Project Audit Events
15580
- * @param {string} orgId The unique identifier of the organization.
15581
- * @param {string} projectId The unique identifier of the project.
16346
+ * @param {string} orgId The organization ID
16347
+ * @param {string} projectId The project ID
15582
16348
  * @param {string | null} [cursor] A cursor for pagination. Use the &#x60;next_cursor&#x60; value from the previous response to get the next page of results.
15583
16349
  * @param {number} [pageLimit] The maximum number of items to return per page. Defaults to &#x60;100&#x60; if not specified.
15584
16350
  * @param {Array<string> | null} [eventType] Filter by one or more audit event types.
@@ -15673,8 +16439,8 @@ export const AuditEventsApiFp = function(configuration?: Configuration) {
15673
16439
  /**
15674
16440
  * Export project audit events as NDJSON. Each line is a full audit event detail record, including the decrypted payload.
15675
16441
  * @summary Export Project Audit Events
15676
- * @param {string} orgId The unique identifier of the organization.
15677
- * @param {string} projectId The unique identifier of the project.
16442
+ * @param {string} orgId The organization ID
16443
+ * @param {string} projectId The project ID
15678
16444
  * @param {Array<string> | null} [eventType] Filter by one or more audit event types.
15679
16445
  * @param {string | null} [actorUserId] Filter by the acting user.
15680
16446
  * @param {string | null} [resourceType] Filter by resource type.
@@ -15694,8 +16460,8 @@ export const AuditEventsApiFp = function(configuration?: Configuration) {
15694
16460
  * Retrieve a single audit event for the project. The detail response includes the decrypted payload captured for the event.
15695
16461
  * @summary Get Project Audit Event
15696
16462
  * @param {string} auditEventId
15697
- * @param {string} orgId The unique identifier of the organization.
15698
- * @param {string} projectId The unique identifier of the project.
16463
+ * @param {string} orgId The organization ID
16464
+ * @param {string} projectId The project ID
15699
16465
  * @param {*} [options] Override http request option.
15700
16466
  * @throws {RequiredError}
15701
16467
  */
@@ -15708,8 +16474,8 @@ export const AuditEventsApiFp = function(configuration?: Configuration) {
15708
16474
  /**
15709
16475
  * List immutable audit events recorded for a project. Results are ordered by `occurred_at` descending, then `id` descending. The `cursor` parameter is an opaque pagination token and must be treated as an unreadable value by clients. Use the filters to narrow the feed by event type, actor, or resource identifiers.
15710
16476
  * @summary List Project Audit Events
15711
- * @param {string} orgId The unique identifier of the organization.
15712
- * @param {string} projectId The unique identifier of the project.
16477
+ * @param {string} orgId The organization ID
16478
+ * @param {string} projectId The project ID
15713
16479
  * @param {string | null} [cursor] A cursor for pagination. Use the &#x60;next_cursor&#x60; value from the previous response to get the next page of results.
15714
16480
  * @param {number} [pageLimit] The maximum number of items to return per page. Defaults to &#x60;100&#x60; if not specified.
15715
16481
  * @param {Array<string> | null} [eventType] Filter by one or more audit event types.
@@ -15740,8 +16506,8 @@ export const AuditEventsApiFactory = function (configuration?: Configuration, ba
15740
16506
  /**
15741
16507
  * Export project audit events as NDJSON. Each line is a full audit event detail record, including the decrypted payload.
15742
16508
  * @summary Export Project Audit Events
15743
- * @param {string} orgId The unique identifier of the organization.
15744
- * @param {string} projectId The unique identifier of the project.
16509
+ * @param {string} orgId The organization ID
16510
+ * @param {string} projectId The project ID
15745
16511
  * @param {Array<string> | null} [eventType] Filter by one or more audit event types.
15746
16512
  * @param {string | null} [actorUserId] Filter by the acting user.
15747
16513
  * @param {string | null} [resourceType] Filter by resource type.
@@ -15758,8 +16524,8 @@ export const AuditEventsApiFactory = function (configuration?: Configuration, ba
15758
16524
  * Retrieve a single audit event for the project. The detail response includes the decrypted payload captured for the event.
15759
16525
  * @summary Get Project Audit Event
15760
16526
  * @param {string} auditEventId
15761
- * @param {string} orgId The unique identifier of the organization.
15762
- * @param {string} projectId The unique identifier of the project.
16527
+ * @param {string} orgId The organization ID
16528
+ * @param {string} projectId The project ID
15763
16529
  * @param {*} [options] Override http request option.
15764
16530
  * @throws {RequiredError}
15765
16531
  */
@@ -15769,8 +16535,8 @@ export const AuditEventsApiFactory = function (configuration?: Configuration, ba
15769
16535
  /**
15770
16536
  * List immutable audit events recorded for a project. Results are ordered by `occurred_at` descending, then `id` descending. The `cursor` parameter is an opaque pagination token and must be treated as an unreadable value by clients. Use the filters to narrow the feed by event type, actor, or resource identifiers.
15771
16537
  * @summary List Project Audit Events
15772
- * @param {string} orgId The unique identifier of the organization.
15773
- * @param {string} projectId The unique identifier of the project.
16538
+ * @param {string} orgId The organization ID
16539
+ * @param {string} projectId The project ID
15774
16540
  * @param {string | null} [cursor] A cursor for pagination. Use the &#x60;next_cursor&#x60; value from the previous response to get the next page of results.
15775
16541
  * @param {number} [pageLimit] The maximum number of items to return per page. Defaults to &#x60;100&#x60; if not specified.
15776
16542
  * @param {Array<string> | null} [eventType] Filter by one or more audit event types.
@@ -15798,8 +16564,8 @@ export class AuditEventsApi extends BaseAPI {
15798
16564
  /**
15799
16565
  * Export project audit events as NDJSON. Each line is a full audit event detail record, including the decrypted payload.
15800
16566
  * @summary Export Project Audit Events
15801
- * @param {string} orgId The unique identifier of the organization.
15802
- * @param {string} projectId The unique identifier of the project.
16567
+ * @param {string} orgId The organization ID
16568
+ * @param {string} projectId The project ID
15803
16569
  * @param {Array<string> | null} [eventType] Filter by one or more audit event types.
15804
16570
  * @param {string | null} [actorUserId] Filter by the acting user.
15805
16571
  * @param {string | null} [resourceType] Filter by resource type.
@@ -15818,8 +16584,8 @@ export class AuditEventsApi extends BaseAPI {
15818
16584
  * Retrieve a single audit event for the project. The detail response includes the decrypted payload captured for the event.
15819
16585
  * @summary Get Project Audit Event
15820
16586
  * @param {string} auditEventId
15821
- * @param {string} orgId The unique identifier of the organization.
15822
- * @param {string} projectId The unique identifier of the project.
16587
+ * @param {string} orgId The organization ID
16588
+ * @param {string} projectId The project ID
15823
16589
  * @param {*} [options] Override http request option.
15824
16590
  * @throws {RequiredError}
15825
16591
  * @memberof AuditEventsApi
@@ -15831,8 +16597,8 @@ export class AuditEventsApi extends BaseAPI {
15831
16597
  /**
15832
16598
  * List immutable audit events recorded for a project. Results are ordered by `occurred_at` descending, then `id` descending. The `cursor` parameter is an opaque pagination token and must be treated as an unreadable value by clients. Use the filters to narrow the feed by event type, actor, or resource identifiers.
15833
16599
  * @summary List Project Audit Events
15834
- * @param {string} orgId The unique identifier of the organization.
15835
- * @param {string} projectId The unique identifier of the project.
16600
+ * @param {string} orgId The organization ID
16601
+ * @param {string} projectId The project ID
15836
16602
  * @param {string | null} [cursor] A cursor for pagination. Use the &#x60;next_cursor&#x60; value from the previous response to get the next page of results.
15837
16603
  * @param {number} [pageLimit] The maximum number of items to return per page. Defaults to &#x60;100&#x60; if not specified.
15838
16604
  * @param {Array<string> | null} [eventType] Filter by one or more audit event types.
@@ -21625,6 +22391,215 @@ export const IntegrationsApiAxiosParamCreator = function (configuration?: Config
21625
22391
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
21626
22392
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
21627
22393
 
22394
+ return {
22395
+ url: toPathString(localVarUrlObj),
22396
+ options: localVarRequestOptions,
22397
+ };
22398
+ },
22399
+ /**
22400
+ * Retrieve a specific member that has been granted direct access to the project_integration.
22401
+ * @summary IAM - Lookup Project Integration Member
22402
+ * @param {string} integrationId
22403
+ * @param {string} member
22404
+ * @param {string} orgId The org id
22405
+ * @param {string} projectId The project id
22406
+ * @param {*} [options] Override http request option.
22407
+ * @throws {RequiredError}
22408
+ */
22409
+ projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember: async (integrationId: string, member: string, orgId: string, projectId: string, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
22410
+ // verify required parameter 'integrationId' is not null or undefined
22411
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember', 'integrationId', integrationId)
22412
+ // verify required parameter 'member' is not null or undefined
22413
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember', 'member', member)
22414
+ // verify required parameter 'orgId' is not null or undefined
22415
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember', 'orgId', orgId)
22416
+ // verify required parameter 'projectId' is not null or undefined
22417
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember', 'projectId', projectId)
22418
+ const localVarPath = `/org/{org_id}/project/{project_id}/integration/{integration_id}/iam/members/{member}`
22419
+ .replace(`{${"integration_id"}}`, encodeURIComponent(String(integrationId)))
22420
+ .replace(`{${"member"}}`, encodeURIComponent(String(member)))
22421
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
22422
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
22423
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
22424
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
22425
+ let baseOptions;
22426
+ if (configuration) {
22427
+ baseOptions = configuration.baseOptions;
22428
+ }
22429
+
22430
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
22431
+ const localVarHeaderParameter = {} as any;
22432
+ const localVarQueryParameter = {} as any;
22433
+
22434
+ // authentication HTTPBearer required
22435
+ // http bearer authentication required
22436
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
22437
+
22438
+
22439
+
22440
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
22441
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
22442
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
22443
+
22444
+ return {
22445
+ url: toPathString(localVarUrlObj),
22446
+ options: localVarRequestOptions,
22447
+ };
22448
+ },
22449
+ /**
22450
+ * Lists all members that have been granted direct access to the project_integration.
22451
+ * @summary IAM - List Project Integration Members
22452
+ * @param {string} integrationId
22453
+ * @param {string} orgId The org id
22454
+ * @param {string} projectId The project id
22455
+ * @param {ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum} [type]
22456
+ * @param {*} [options] Override http request option.
22457
+ * @throws {RequiredError}
22458
+ */
22459
+ projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers: async (integrationId: string, orgId: string, projectId: string, type?: ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
22460
+ // verify required parameter 'integrationId' is not null or undefined
22461
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers', 'integrationId', integrationId)
22462
+ // verify required parameter 'orgId' is not null or undefined
22463
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers', 'orgId', orgId)
22464
+ // verify required parameter 'projectId' is not null or undefined
22465
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers', 'projectId', projectId)
22466
+ const localVarPath = `/org/{org_id}/project/{project_id}/integration/{integration_id}/iam/members`
22467
+ .replace(`{${"integration_id"}}`, encodeURIComponent(String(integrationId)))
22468
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
22469
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
22470
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
22471
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
22472
+ let baseOptions;
22473
+ if (configuration) {
22474
+ baseOptions = configuration.baseOptions;
22475
+ }
22476
+
22477
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
22478
+ const localVarHeaderParameter = {} as any;
22479
+ const localVarQueryParameter = {} as any;
22480
+
22481
+ // authentication HTTPBearer required
22482
+ // http bearer authentication required
22483
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
22484
+
22485
+ if (type !== undefined) {
22486
+ localVarQueryParameter['type'] = type;
22487
+ }
22488
+
22489
+
22490
+
22491
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
22492
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
22493
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
22494
+
22495
+ return {
22496
+ url: toPathString(localVarUrlObj),
22497
+ options: localVarRequestOptions,
22498
+ };
22499
+ },
22500
+ /**
22501
+ * Test the permissions that the caller (or another subject) holds on the project_integration.
22502
+ * @summary IAM - Test Project Integration Permissions
22503
+ * @param {string} integrationId
22504
+ * @param {string} orgId The org id
22505
+ * @param {string} projectId The project id
22506
+ * @param {ProjectIntegrationIAMPermissionTest} projectIntegrationIAMPermissionTest
22507
+ * @param {*} [options] Override http request option.
22508
+ * @throws {RequiredError}
22509
+ */
22510
+ projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions: async (integrationId: string, orgId: string, projectId: string, projectIntegrationIAMPermissionTest: ProjectIntegrationIAMPermissionTest, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
22511
+ // verify required parameter 'integrationId' is not null or undefined
22512
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions', 'integrationId', integrationId)
22513
+ // verify required parameter 'orgId' is not null or undefined
22514
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions', 'orgId', orgId)
22515
+ // verify required parameter 'projectId' is not null or undefined
22516
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions', 'projectId', projectId)
22517
+ // verify required parameter 'projectIntegrationIAMPermissionTest' is not null or undefined
22518
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions', 'projectIntegrationIAMPermissionTest', projectIntegrationIAMPermissionTest)
22519
+ const localVarPath = `/org/{org_id}/project/{project_id}/integration/{integration_id}/iam/test`
22520
+ .replace(`{${"integration_id"}}`, encodeURIComponent(String(integrationId)))
22521
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
22522
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
22523
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
22524
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
22525
+ let baseOptions;
22526
+ if (configuration) {
22527
+ baseOptions = configuration.baseOptions;
22528
+ }
22529
+
22530
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options};
22531
+ const localVarHeaderParameter = {} as any;
22532
+ const localVarQueryParameter = {} as any;
22533
+
22534
+ // authentication HTTPBearer required
22535
+ // http bearer authentication required
22536
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
22537
+
22538
+
22539
+
22540
+ localVarHeaderParameter['Content-Type'] = 'application/json';
22541
+
22542
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
22543
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
22544
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
22545
+ localVarRequestOptions.data = serializeDataIfNeeded(projectIntegrationIAMPermissionTest, localVarRequestOptions, configuration)
22546
+
22547
+ return {
22548
+ url: toPathString(localVarUrlObj),
22549
+ options: localVarRequestOptions,
22550
+ };
22551
+ },
22552
+ /**
22553
+ * Update the roles that a member holds on the project_integration.
22554
+ * @summary IAM - Update Project Integration Member
22555
+ * @param {string} integrationId
22556
+ * @param {string} member
22557
+ * @param {string} orgId The org id
22558
+ * @param {string} projectId The project id
22559
+ * @param {ProjectIntegrationIAMMemberRoleUpdate} projectIntegrationIAMMemberRoleUpdate
22560
+ * @param {*} [options] Override http request option.
22561
+ * @throws {RequiredError}
22562
+ */
22563
+ projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles: async (integrationId: string, member: string, orgId: string, projectId: string, projectIntegrationIAMMemberRoleUpdate: ProjectIntegrationIAMMemberRoleUpdate, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
22564
+ // verify required parameter 'integrationId' is not null or undefined
22565
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles', 'integrationId', integrationId)
22566
+ // verify required parameter 'member' is not null or undefined
22567
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles', 'member', member)
22568
+ // verify required parameter 'orgId' is not null or undefined
22569
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles', 'orgId', orgId)
22570
+ // verify required parameter 'projectId' is not null or undefined
22571
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles', 'projectId', projectId)
22572
+ // verify required parameter 'projectIntegrationIAMMemberRoleUpdate' is not null or undefined
22573
+ assertParamExists('projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles', 'projectIntegrationIAMMemberRoleUpdate', projectIntegrationIAMMemberRoleUpdate)
22574
+ const localVarPath = `/org/{org_id}/project/{project_id}/integration/{integration_id}/iam/members/{member}`
22575
+ .replace(`{${"integration_id"}}`, encodeURIComponent(String(integrationId)))
22576
+ .replace(`{${"member"}}`, encodeURIComponent(String(member)))
22577
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
22578
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
22579
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
22580
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
22581
+ let baseOptions;
22582
+ if (configuration) {
22583
+ baseOptions = configuration.baseOptions;
22584
+ }
22585
+
22586
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options};
22587
+ const localVarHeaderParameter = {} as any;
22588
+ const localVarQueryParameter = {} as any;
22589
+
22590
+ // authentication HTTPBearer required
22591
+ // http bearer authentication required
22592
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
22593
+
22594
+
22595
+
22596
+ localVarHeaderParameter['Content-Type'] = 'application/json';
22597
+
22598
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
22599
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
22600
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
22601
+ localVarRequestOptions.data = serializeDataIfNeeded(projectIntegrationIAMMemberRoleUpdate, localVarRequestOptions, configuration)
22602
+
21628
22603
  return {
21629
22604
  url: toPathString(localVarUrlObj),
21630
22605
  options: localVarRequestOptions,
@@ -21773,6 +22748,71 @@ export const IntegrationsApiFp = function(configuration?: Configuration) {
21773
22748
  const localVarOperationServerBasePath = operationServerMap['IntegrationsApi.listIntegrations']?.[localVarOperationServerIndex]?.url;
21774
22749
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
21775
22750
  },
22751
+ /**
22752
+ * Retrieve a specific member that has been granted direct access to the project_integration.
22753
+ * @summary IAM - Lookup Project Integration Member
22754
+ * @param {string} integrationId
22755
+ * @param {string} member
22756
+ * @param {string} orgId The org id
22757
+ * @param {string} projectId The project id
22758
+ * @param {*} [options] Override http request option.
22759
+ * @throws {RequiredError}
22760
+ */
22761
+ async projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember(integrationId: string, member: string, orgId: string, projectId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMMember>> {
22762
+ const localVarAxiosArgs = await localVarAxiosParamCreator.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember(integrationId, member, orgId, projectId, options);
22763
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
22764
+ const localVarOperationServerBasePath = operationServerMap['IntegrationsApi.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember']?.[localVarOperationServerIndex]?.url;
22765
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
22766
+ },
22767
+ /**
22768
+ * Lists all members that have been granted direct access to the project_integration.
22769
+ * @summary IAM - List Project Integration Members
22770
+ * @param {string} integrationId
22771
+ * @param {string} orgId The org id
22772
+ * @param {string} projectId The project id
22773
+ * @param {ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum} [type]
22774
+ * @param {*} [options] Override http request option.
22775
+ * @throws {RequiredError}
22776
+ */
22777
+ async projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers(integrationId: string, orgId: string, projectId: string, type?: ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PaginatedResultSetIAMMember>> {
22778
+ const localVarAxiosArgs = await localVarAxiosParamCreator.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers(integrationId, orgId, projectId, type, options);
22779
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
22780
+ const localVarOperationServerBasePath = operationServerMap['IntegrationsApi.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers']?.[localVarOperationServerIndex]?.url;
22781
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
22782
+ },
22783
+ /**
22784
+ * Test the permissions that the caller (or another subject) holds on the project_integration.
22785
+ * @summary IAM - Test Project Integration Permissions
22786
+ * @param {string} integrationId
22787
+ * @param {string} orgId The org id
22788
+ * @param {string} projectId The project id
22789
+ * @param {ProjectIntegrationIAMPermissionTest} projectIntegrationIAMPermissionTest
22790
+ * @param {*} [options] Override http request option.
22791
+ * @throws {RequiredError}
22792
+ */
22793
+ async projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions(integrationId: string, orgId: string, projectId: string, projectIntegrationIAMPermissionTest: ProjectIntegrationIAMPermissionTest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMPermissionTest>> {
22794
+ const localVarAxiosArgs = await localVarAxiosParamCreator.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions(integrationId, orgId, projectId, projectIntegrationIAMPermissionTest, options);
22795
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
22796
+ const localVarOperationServerBasePath = operationServerMap['IntegrationsApi.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions']?.[localVarOperationServerIndex]?.url;
22797
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
22798
+ },
22799
+ /**
22800
+ * Update the roles that a member holds on the project_integration.
22801
+ * @summary IAM - Update Project Integration Member
22802
+ * @param {string} integrationId
22803
+ * @param {string} member
22804
+ * @param {string} orgId The org id
22805
+ * @param {string} projectId The project id
22806
+ * @param {ProjectIntegrationIAMMemberRoleUpdate} projectIntegrationIAMMemberRoleUpdate
22807
+ * @param {*} [options] Override http request option.
22808
+ * @throws {RequiredError}
22809
+ */
22810
+ async projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles(integrationId: string, member: string, orgId: string, projectId: string, projectIntegrationIAMMemberRoleUpdate: ProjectIntegrationIAMMemberRoleUpdate, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMMember>> {
22811
+ const localVarAxiosArgs = await localVarAxiosParamCreator.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles(integrationId, member, orgId, projectId, projectIntegrationIAMMemberRoleUpdate, options);
22812
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
22813
+ const localVarOperationServerBasePath = operationServerMap['IntegrationsApi.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles']?.[localVarOperationServerIndex]?.url;
22814
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
22815
+ },
21776
22816
  }
21777
22817
  };
21778
22818
 
@@ -21889,6 +22929,59 @@ export const IntegrationsApiFactory = function (configuration?: Configuration, b
21889
22929
  listIntegrations(orgId: string, projectId: string, options?: any): AxiosPromise<Array<ProjectIntegrationRead>> {
21890
22930
  return localVarFp.listIntegrations(orgId, projectId, options).then((request) => request(axios, basePath));
21891
22931
  },
22932
+ /**
22933
+ * Retrieve a specific member that has been granted direct access to the project_integration.
22934
+ * @summary IAM - Lookup Project Integration Member
22935
+ * @param {string} integrationId
22936
+ * @param {string} member
22937
+ * @param {string} orgId The org id
22938
+ * @param {string} projectId The project id
22939
+ * @param {*} [options] Override http request option.
22940
+ * @throws {RequiredError}
22941
+ */
22942
+ projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember(integrationId: string, member: string, orgId: string, projectId: string, options?: any): AxiosPromise<IAMMember> {
22943
+ return localVarFp.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember(integrationId, member, orgId, projectId, options).then((request) => request(axios, basePath));
22944
+ },
22945
+ /**
22946
+ * Lists all members that have been granted direct access to the project_integration.
22947
+ * @summary IAM - List Project Integration Members
22948
+ * @param {string} integrationId
22949
+ * @param {string} orgId The org id
22950
+ * @param {string} projectId The project id
22951
+ * @param {ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum} [type]
22952
+ * @param {*} [options] Override http request option.
22953
+ * @throws {RequiredError}
22954
+ */
22955
+ projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers(integrationId: string, orgId: string, projectId: string, type?: ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum, options?: any): AxiosPromise<PaginatedResultSetIAMMember> {
22956
+ return localVarFp.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers(integrationId, orgId, projectId, type, options).then((request) => request(axios, basePath));
22957
+ },
22958
+ /**
22959
+ * Test the permissions that the caller (or another subject) holds on the project_integration.
22960
+ * @summary IAM - Test Project Integration Permissions
22961
+ * @param {string} integrationId
22962
+ * @param {string} orgId The org id
22963
+ * @param {string} projectId The project id
22964
+ * @param {ProjectIntegrationIAMPermissionTest} projectIntegrationIAMPermissionTest
22965
+ * @param {*} [options] Override http request option.
22966
+ * @throws {RequiredError}
22967
+ */
22968
+ projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions(integrationId: string, orgId: string, projectId: string, projectIntegrationIAMPermissionTest: ProjectIntegrationIAMPermissionTest, options?: any): AxiosPromise<IAMPermissionTest> {
22969
+ return localVarFp.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions(integrationId, orgId, projectId, projectIntegrationIAMPermissionTest, options).then((request) => request(axios, basePath));
22970
+ },
22971
+ /**
22972
+ * Update the roles that a member holds on the project_integration.
22973
+ * @summary IAM - Update Project Integration Member
22974
+ * @param {string} integrationId
22975
+ * @param {string} member
22976
+ * @param {string} orgId The org id
22977
+ * @param {string} projectId The project id
22978
+ * @param {ProjectIntegrationIAMMemberRoleUpdate} projectIntegrationIAMMemberRoleUpdate
22979
+ * @param {*} [options] Override http request option.
22980
+ * @throws {RequiredError}
22981
+ */
22982
+ projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles(integrationId: string, member: string, orgId: string, projectId: string, projectIntegrationIAMMemberRoleUpdate: ProjectIntegrationIAMMemberRoleUpdate, options?: any): AxiosPromise<IAMMember> {
22983
+ return localVarFp.projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles(integrationId, member, orgId, projectId, projectIntegrationIAMMemberRoleUpdate, options).then((request) => request(axios, basePath));
22984
+ },
21892
22985
  };
21893
22986
  };
21894
22987
 
@@ -22022,8 +23115,78 @@ export class IntegrationsApi extends BaseAPI {
22022
23115
  public listIntegrations(orgId: string, projectId: string, options?: RawAxiosRequestConfig) {
22023
23116
  return IntegrationsApiFp(this.configuration).listIntegrations(orgId, projectId, options).then((request) => request(this.axios, this.basePath));
22024
23117
  }
23118
+
23119
+ /**
23120
+ * Retrieve a specific member that has been granted direct access to the project_integration.
23121
+ * @summary IAM - Lookup Project Integration Member
23122
+ * @param {string} integrationId
23123
+ * @param {string} member
23124
+ * @param {string} orgId The org id
23125
+ * @param {string} projectId The project id
23126
+ * @param {*} [options] Override http request option.
23127
+ * @throws {RequiredError}
23128
+ * @memberof IntegrationsApi
23129
+ */
23130
+ public projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember(integrationId: string, member: string, orgId: string, projectId: string, options?: RawAxiosRequestConfig) {
23131
+ return IntegrationsApiFp(this.configuration).projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamGetMember(integrationId, member, orgId, projectId, options).then((request) => request(this.axios, this.basePath));
23132
+ }
23133
+
23134
+ /**
23135
+ * Lists all members that have been granted direct access to the project_integration.
23136
+ * @summary IAM - List Project Integration Members
23137
+ * @param {string} integrationId
23138
+ * @param {string} orgId The org id
23139
+ * @param {string} projectId The project id
23140
+ * @param {ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum} [type]
23141
+ * @param {*} [options] Override http request option.
23142
+ * @throws {RequiredError}
23143
+ * @memberof IntegrationsApi
23144
+ */
23145
+ public projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers(integrationId: string, orgId: string, projectId: string, type?: ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum, options?: RawAxiosRequestConfig) {
23146
+ return IntegrationsApiFp(this.configuration).projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembers(integrationId, orgId, projectId, type, options).then((request) => request(this.axios, this.basePath));
23147
+ }
23148
+
23149
+ /**
23150
+ * Test the permissions that the caller (or another subject) holds on the project_integration.
23151
+ * @summary IAM - Test Project Integration Permissions
23152
+ * @param {string} integrationId
23153
+ * @param {string} orgId The org id
23154
+ * @param {string} projectId The project id
23155
+ * @param {ProjectIntegrationIAMPermissionTest} projectIntegrationIAMPermissionTest
23156
+ * @param {*} [options] Override http request option.
23157
+ * @throws {RequiredError}
23158
+ * @memberof IntegrationsApi
23159
+ */
23160
+ public projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions(integrationId: string, orgId: string, projectId: string, projectIntegrationIAMPermissionTest: ProjectIntegrationIAMPermissionTest, options?: RawAxiosRequestConfig) {
23161
+ return IntegrationsApiFp(this.configuration).projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamTestPermissions(integrationId, orgId, projectId, projectIntegrationIAMPermissionTest, options).then((request) => request(this.axios, this.basePath));
23162
+ }
23163
+
23164
+ /**
23165
+ * Update the roles that a member holds on the project_integration.
23166
+ * @summary IAM - Update Project Integration Member
23167
+ * @param {string} integrationId
23168
+ * @param {string} member
23169
+ * @param {string} orgId The org id
23170
+ * @param {string} projectId The project id
23171
+ * @param {ProjectIntegrationIAMMemberRoleUpdate} projectIntegrationIAMMemberRoleUpdate
23172
+ * @param {*} [options] Override http request option.
23173
+ * @throws {RequiredError}
23174
+ * @memberof IntegrationsApi
23175
+ */
23176
+ public projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles(integrationId: string, member: string, orgId: string, projectId: string, projectIntegrationIAMMemberRoleUpdate: ProjectIntegrationIAMMemberRoleUpdate, options?: RawAxiosRequestConfig) {
23177
+ return IntegrationsApiFp(this.configuration).projectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamUpdateMemberRoles(integrationId, member, orgId, projectId, projectIntegrationIAMMemberRoleUpdate, options).then((request) => request(this.axios, this.basePath));
23178
+ }
22025
23179
  }
22026
23180
 
23181
+ /**
23182
+ * @export
23183
+ */
23184
+ export const ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum = {
23185
+ User: 'user',
23186
+ Organization: 'organization',
23187
+ Project: 'project'
23188
+ } as const;
23189
+ export type ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum = typeof ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum[keyof typeof ProjectIntegrationIamOrgOrgIdProjectProjectIdIntegrationIntegrationIdIamListMembersTypeEnum];
22027
23190
 
22028
23191
 
22029
23192
  /**
@@ -35223,8 +36386,8 @@ export const TaskAgentsApiAxiosParamCreator = function (configuration?: Configur
35223
36386
  /**
35224
36387
  * Create a new Task Agent for the project. Task Agents orchestrate multiple Tasks as task tools using LLM-powered reasoning. Configure: - System instruction (prompt) - LLM model for reasoning - Initial task tools (Tasks to add) - Optional MCP server bindings - Execution mode (agentic/sequential)
35225
36388
  * @summary Create Task Agent
35226
- * @param {string} orgId The unique identifier of the organization.
35227
- * @param {string} projectId The unique identifier of the project.
36389
+ * @param {string} orgId The organization ID
36390
+ * @param {string} projectId The project ID
35228
36391
  * @param {TaskAgentCreate} taskAgentCreate
35229
36392
  * @param {*} [options] Override http request option.
35230
36393
  * @throws {RequiredError}
@@ -36116,12 +37279,221 @@ export const TaskAgentsApiAxiosParamCreator = function (configuration?: Configur
36116
37279
  options: localVarRequestOptions,
36117
37280
  };
36118
37281
  },
37282
+ /**
37283
+ * Retrieve a specific member that has been granted direct access to the task_agent.
37284
+ * @summary IAM - Lookup Task Agent Member
37285
+ * @param {string} taskAgentId
37286
+ * @param {string} member
37287
+ * @param {string} orgId The org id
37288
+ * @param {string} projectId The project id
37289
+ * @param {*} [options] Override http request option.
37290
+ * @throws {RequiredError}
37291
+ */
37292
+ taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember: async (taskAgentId: string, member: string, orgId: string, projectId: string, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
37293
+ // verify required parameter 'taskAgentId' is not null or undefined
37294
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember', 'taskAgentId', taskAgentId)
37295
+ // verify required parameter 'member' is not null or undefined
37296
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember', 'member', member)
37297
+ // verify required parameter 'orgId' is not null or undefined
37298
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember', 'orgId', orgId)
37299
+ // verify required parameter 'projectId' is not null or undefined
37300
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember', 'projectId', projectId)
37301
+ const localVarPath = `/org/{org_id}/project/{project_id}/task-agent/{task_agent_id}/iam/members/{member}`
37302
+ .replace(`{${"task_agent_id"}}`, encodeURIComponent(String(taskAgentId)))
37303
+ .replace(`{${"member"}}`, encodeURIComponent(String(member)))
37304
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
37305
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
37306
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
37307
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
37308
+ let baseOptions;
37309
+ if (configuration) {
37310
+ baseOptions = configuration.baseOptions;
37311
+ }
37312
+
37313
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
37314
+ const localVarHeaderParameter = {} as any;
37315
+ const localVarQueryParameter = {} as any;
37316
+
37317
+ // authentication HTTPBearer required
37318
+ // http bearer authentication required
37319
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
37320
+
37321
+
37322
+
37323
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
37324
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
37325
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
37326
+
37327
+ return {
37328
+ url: toPathString(localVarUrlObj),
37329
+ options: localVarRequestOptions,
37330
+ };
37331
+ },
37332
+ /**
37333
+ * Lists all members that have been granted direct access to the task_agent.
37334
+ * @summary IAM - List Task Agent Members
37335
+ * @param {string} taskAgentId
37336
+ * @param {string} orgId The org id
37337
+ * @param {string} projectId The project id
37338
+ * @param {TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum} [type]
37339
+ * @param {*} [options] Override http request option.
37340
+ * @throws {RequiredError}
37341
+ */
37342
+ taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers: async (taskAgentId: string, orgId: string, projectId: string, type?: TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
37343
+ // verify required parameter 'taskAgentId' is not null or undefined
37344
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers', 'taskAgentId', taskAgentId)
37345
+ // verify required parameter 'orgId' is not null or undefined
37346
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers', 'orgId', orgId)
37347
+ // verify required parameter 'projectId' is not null or undefined
37348
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers', 'projectId', projectId)
37349
+ const localVarPath = `/org/{org_id}/project/{project_id}/task-agent/{task_agent_id}/iam/members`
37350
+ .replace(`{${"task_agent_id"}}`, encodeURIComponent(String(taskAgentId)))
37351
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
37352
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
37353
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
37354
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
37355
+ let baseOptions;
37356
+ if (configuration) {
37357
+ baseOptions = configuration.baseOptions;
37358
+ }
37359
+
37360
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
37361
+ const localVarHeaderParameter = {} as any;
37362
+ const localVarQueryParameter = {} as any;
37363
+
37364
+ // authentication HTTPBearer required
37365
+ // http bearer authentication required
37366
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
37367
+
37368
+ if (type !== undefined) {
37369
+ localVarQueryParameter['type'] = type;
37370
+ }
37371
+
37372
+
37373
+
37374
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
37375
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
37376
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
37377
+
37378
+ return {
37379
+ url: toPathString(localVarUrlObj),
37380
+ options: localVarRequestOptions,
37381
+ };
37382
+ },
37383
+ /**
37384
+ * Test the permissions that the caller (or another subject) holds on the task_agent.
37385
+ * @summary IAM - Test Task Agent Permissions
37386
+ * @param {string} taskAgentId
37387
+ * @param {string} orgId The org id
37388
+ * @param {string} projectId The project id
37389
+ * @param {TaskAgentIAMPermissionTest} taskAgentIAMPermissionTest
37390
+ * @param {*} [options] Override http request option.
37391
+ * @throws {RequiredError}
37392
+ */
37393
+ taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions: async (taskAgentId: string, orgId: string, projectId: string, taskAgentIAMPermissionTest: TaskAgentIAMPermissionTest, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
37394
+ // verify required parameter 'taskAgentId' is not null or undefined
37395
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions', 'taskAgentId', taskAgentId)
37396
+ // verify required parameter 'orgId' is not null or undefined
37397
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions', 'orgId', orgId)
37398
+ // verify required parameter 'projectId' is not null or undefined
37399
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions', 'projectId', projectId)
37400
+ // verify required parameter 'taskAgentIAMPermissionTest' is not null or undefined
37401
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions', 'taskAgentIAMPermissionTest', taskAgentIAMPermissionTest)
37402
+ const localVarPath = `/org/{org_id}/project/{project_id}/task-agent/{task_agent_id}/iam/test`
37403
+ .replace(`{${"task_agent_id"}}`, encodeURIComponent(String(taskAgentId)))
37404
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
37405
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
37406
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
37407
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
37408
+ let baseOptions;
37409
+ if (configuration) {
37410
+ baseOptions = configuration.baseOptions;
37411
+ }
37412
+
37413
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options};
37414
+ const localVarHeaderParameter = {} as any;
37415
+ const localVarQueryParameter = {} as any;
37416
+
37417
+ // authentication HTTPBearer required
37418
+ // http bearer authentication required
37419
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
37420
+
37421
+
37422
+
37423
+ localVarHeaderParameter['Content-Type'] = 'application/json';
37424
+
37425
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
37426
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
37427
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
37428
+ localVarRequestOptions.data = serializeDataIfNeeded(taskAgentIAMPermissionTest, localVarRequestOptions, configuration)
37429
+
37430
+ return {
37431
+ url: toPathString(localVarUrlObj),
37432
+ options: localVarRequestOptions,
37433
+ };
37434
+ },
37435
+ /**
37436
+ * Update the roles that a member holds on the task_agent.
37437
+ * @summary IAM - Update Task Agent Member
37438
+ * @param {string} taskAgentId
37439
+ * @param {string} member
37440
+ * @param {string} orgId The org id
37441
+ * @param {string} projectId The project id
37442
+ * @param {TaskAgentIAMMemberRoleUpdate} taskAgentIAMMemberRoleUpdate
37443
+ * @param {*} [options] Override http request option.
37444
+ * @throws {RequiredError}
37445
+ */
37446
+ taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles: async (taskAgentId: string, member: string, orgId: string, projectId: string, taskAgentIAMMemberRoleUpdate: TaskAgentIAMMemberRoleUpdate, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
37447
+ // verify required parameter 'taskAgentId' is not null or undefined
37448
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles', 'taskAgentId', taskAgentId)
37449
+ // verify required parameter 'member' is not null or undefined
37450
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles', 'member', member)
37451
+ // verify required parameter 'orgId' is not null or undefined
37452
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles', 'orgId', orgId)
37453
+ // verify required parameter 'projectId' is not null or undefined
37454
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles', 'projectId', projectId)
37455
+ // verify required parameter 'taskAgentIAMMemberRoleUpdate' is not null or undefined
37456
+ assertParamExists('taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles', 'taskAgentIAMMemberRoleUpdate', taskAgentIAMMemberRoleUpdate)
37457
+ const localVarPath = `/org/{org_id}/project/{project_id}/task-agent/{task_agent_id}/iam/members/{member}`
37458
+ .replace(`{${"task_agent_id"}}`, encodeURIComponent(String(taskAgentId)))
37459
+ .replace(`{${"member"}}`, encodeURIComponent(String(member)))
37460
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
37461
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
37462
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
37463
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
37464
+ let baseOptions;
37465
+ if (configuration) {
37466
+ baseOptions = configuration.baseOptions;
37467
+ }
37468
+
37469
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options};
37470
+ const localVarHeaderParameter = {} as any;
37471
+ const localVarQueryParameter = {} as any;
37472
+
37473
+ // authentication HTTPBearer required
37474
+ // http bearer authentication required
37475
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
37476
+
37477
+
37478
+
37479
+ localVarHeaderParameter['Content-Type'] = 'application/json';
37480
+
37481
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
37482
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
37483
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
37484
+ localVarRequestOptions.data = serializeDataIfNeeded(taskAgentIAMMemberRoleUpdate, localVarRequestOptions, configuration)
37485
+
37486
+ return {
37487
+ url: toPathString(localVarUrlObj),
37488
+ options: localVarRequestOptions,
37489
+ };
37490
+ },
36119
37491
  /**
36120
37492
  * Update Task Agent configuration. Modifiable fields: - Name and description - System instruction - LLM model - Execution mode - Task tools (full replacement) - MCP servers (full replacement) To update task tools, pass a `task_tools` array. This performs a full replacement: - Omit the field to leave task tools unchanged - Pass an empty array to remove all task tools - Pass a new array to replace all task tools (array order = execution order)
36121
37493
  * @summary Update Task Agent
36122
- * @param {string} orgId The unique identifier of the organization.
36123
- * @param {string} projectId The unique identifier of the project.
36124
- * @param {string} taskAgentId The specific Task Agent to reference.
37494
+ * @param {string} orgId The organization ID
37495
+ * @param {string} projectId The project ID
37496
+ * @param {string} taskAgentId The task agent ID
36125
37497
  * @param {TaskAgentUpdate} taskAgentUpdate
36126
37498
  * @param {*} [options] Override http request option.
36127
37499
  * @throws {RequiredError}
@@ -36181,8 +37553,8 @@ export const TaskAgentsApiFp = function(configuration?: Configuration) {
36181
37553
  /**
36182
37554
  * Create a new Task Agent for the project. Task Agents orchestrate multiple Tasks as task tools using LLM-powered reasoning. Configure: - System instruction (prompt) - LLM model for reasoning - Initial task tools (Tasks to add) - Optional MCP server bindings - Execution mode (agentic/sequential)
36183
37555
  * @summary Create Task Agent
36184
- * @param {string} orgId The unique identifier of the organization.
36185
- * @param {string} projectId The unique identifier of the project.
37556
+ * @param {string} orgId The organization ID
37557
+ * @param {string} projectId The project ID
36186
37558
  * @param {TaskAgentCreate} taskAgentCreate
36187
37559
  * @param {*} [options] Override http request option.
36188
37560
  * @throws {RequiredError}
@@ -36448,12 +37820,77 @@ export const TaskAgentsApiFp = function(configuration?: Configuration) {
36448
37820
  const localVarOperationServerBasePath = operationServerMap['TaskAgentsApi.runTaskAgent']?.[localVarOperationServerIndex]?.url;
36449
37821
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
36450
37822
  },
37823
+ /**
37824
+ * Retrieve a specific member that has been granted direct access to the task_agent.
37825
+ * @summary IAM - Lookup Task Agent Member
37826
+ * @param {string} taskAgentId
37827
+ * @param {string} member
37828
+ * @param {string} orgId The org id
37829
+ * @param {string} projectId The project id
37830
+ * @param {*} [options] Override http request option.
37831
+ * @throws {RequiredError}
37832
+ */
37833
+ async taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember(taskAgentId: string, member: string, orgId: string, projectId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMMember>> {
37834
+ const localVarAxiosArgs = await localVarAxiosParamCreator.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember(taskAgentId, member, orgId, projectId, options);
37835
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
37836
+ const localVarOperationServerBasePath = operationServerMap['TaskAgentsApi.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember']?.[localVarOperationServerIndex]?.url;
37837
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
37838
+ },
37839
+ /**
37840
+ * Lists all members that have been granted direct access to the task_agent.
37841
+ * @summary IAM - List Task Agent Members
37842
+ * @param {string} taskAgentId
37843
+ * @param {string} orgId The org id
37844
+ * @param {string} projectId The project id
37845
+ * @param {TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum} [type]
37846
+ * @param {*} [options] Override http request option.
37847
+ * @throws {RequiredError}
37848
+ */
37849
+ async taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers(taskAgentId: string, orgId: string, projectId: string, type?: TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PaginatedResultSetIAMMember>> {
37850
+ const localVarAxiosArgs = await localVarAxiosParamCreator.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers(taskAgentId, orgId, projectId, type, options);
37851
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
37852
+ const localVarOperationServerBasePath = operationServerMap['TaskAgentsApi.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers']?.[localVarOperationServerIndex]?.url;
37853
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
37854
+ },
37855
+ /**
37856
+ * Test the permissions that the caller (or another subject) holds on the task_agent.
37857
+ * @summary IAM - Test Task Agent Permissions
37858
+ * @param {string} taskAgentId
37859
+ * @param {string} orgId The org id
37860
+ * @param {string} projectId The project id
37861
+ * @param {TaskAgentIAMPermissionTest} taskAgentIAMPermissionTest
37862
+ * @param {*} [options] Override http request option.
37863
+ * @throws {RequiredError}
37864
+ */
37865
+ async taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions(taskAgentId: string, orgId: string, projectId: string, taskAgentIAMPermissionTest: TaskAgentIAMPermissionTest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMPermissionTest>> {
37866
+ const localVarAxiosArgs = await localVarAxiosParamCreator.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions(taskAgentId, orgId, projectId, taskAgentIAMPermissionTest, options);
37867
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
37868
+ const localVarOperationServerBasePath = operationServerMap['TaskAgentsApi.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions']?.[localVarOperationServerIndex]?.url;
37869
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
37870
+ },
37871
+ /**
37872
+ * Update the roles that a member holds on the task_agent.
37873
+ * @summary IAM - Update Task Agent Member
37874
+ * @param {string} taskAgentId
37875
+ * @param {string} member
37876
+ * @param {string} orgId The org id
37877
+ * @param {string} projectId The project id
37878
+ * @param {TaskAgentIAMMemberRoleUpdate} taskAgentIAMMemberRoleUpdate
37879
+ * @param {*} [options] Override http request option.
37880
+ * @throws {RequiredError}
37881
+ */
37882
+ async taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles(taskAgentId: string, member: string, orgId: string, projectId: string, taskAgentIAMMemberRoleUpdate: TaskAgentIAMMemberRoleUpdate, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMMember>> {
37883
+ const localVarAxiosArgs = await localVarAxiosParamCreator.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles(taskAgentId, member, orgId, projectId, taskAgentIAMMemberRoleUpdate, options);
37884
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
37885
+ const localVarOperationServerBasePath = operationServerMap['TaskAgentsApi.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles']?.[localVarOperationServerIndex]?.url;
37886
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
37887
+ },
36451
37888
  /**
36452
37889
  * Update Task Agent configuration. Modifiable fields: - Name and description - System instruction - LLM model - Execution mode - Task tools (full replacement) - MCP servers (full replacement) To update task tools, pass a `task_tools` array. This performs a full replacement: - Omit the field to leave task tools unchanged - Pass an empty array to remove all task tools - Pass a new array to replace all task tools (array order = execution order)
36453
37890
  * @summary Update Task Agent
36454
- * @param {string} orgId The unique identifier of the organization.
36455
- * @param {string} projectId The unique identifier of the project.
36456
- * @param {string} taskAgentId The specific Task Agent to reference.
37891
+ * @param {string} orgId The organization ID
37892
+ * @param {string} projectId The project ID
37893
+ * @param {string} taskAgentId The task agent ID
36457
37894
  * @param {TaskAgentUpdate} taskAgentUpdate
36458
37895
  * @param {*} [options] Override http request option.
36459
37896
  * @throws {RequiredError}
@@ -36477,8 +37914,8 @@ export const TaskAgentsApiFactory = function (configuration?: Configuration, bas
36477
37914
  /**
36478
37915
  * Create a new Task Agent for the project. Task Agents orchestrate multiple Tasks as task tools using LLM-powered reasoning. Configure: - System instruction (prompt) - LLM model for reasoning - Initial task tools (Tasks to add) - Optional MCP server bindings - Execution mode (agentic/sequential)
36479
37916
  * @summary Create Task Agent
36480
- * @param {string} orgId The unique identifier of the organization.
36481
- * @param {string} projectId The unique identifier of the project.
37917
+ * @param {string} orgId The organization ID
37918
+ * @param {string} projectId The project ID
36482
37919
  * @param {TaskAgentCreate} taskAgentCreate
36483
37920
  * @param {*} [options] Override http request option.
36484
37921
  * @throws {RequiredError}
@@ -36696,12 +38133,65 @@ export const TaskAgentsApiFactory = function (configuration?: Configuration, bas
36696
38133
  runTaskAgent(orgId: string, projectId: string, taskAgentId: string, options?: any): AxiosPromise<any> {
36697
38134
  return localVarFp.runTaskAgent(orgId, projectId, taskAgentId, options).then((request) => request(axios, basePath));
36698
38135
  },
38136
+ /**
38137
+ * Retrieve a specific member that has been granted direct access to the task_agent.
38138
+ * @summary IAM - Lookup Task Agent Member
38139
+ * @param {string} taskAgentId
38140
+ * @param {string} member
38141
+ * @param {string} orgId The org id
38142
+ * @param {string} projectId The project id
38143
+ * @param {*} [options] Override http request option.
38144
+ * @throws {RequiredError}
38145
+ */
38146
+ taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember(taskAgentId: string, member: string, orgId: string, projectId: string, options?: any): AxiosPromise<IAMMember> {
38147
+ return localVarFp.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember(taskAgentId, member, orgId, projectId, options).then((request) => request(axios, basePath));
38148
+ },
38149
+ /**
38150
+ * Lists all members that have been granted direct access to the task_agent.
38151
+ * @summary IAM - List Task Agent Members
38152
+ * @param {string} taskAgentId
38153
+ * @param {string} orgId The org id
38154
+ * @param {string} projectId The project id
38155
+ * @param {TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum} [type]
38156
+ * @param {*} [options] Override http request option.
38157
+ * @throws {RequiredError}
38158
+ */
38159
+ taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers(taskAgentId: string, orgId: string, projectId: string, type?: TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum, options?: any): AxiosPromise<PaginatedResultSetIAMMember> {
38160
+ return localVarFp.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers(taskAgentId, orgId, projectId, type, options).then((request) => request(axios, basePath));
38161
+ },
38162
+ /**
38163
+ * Test the permissions that the caller (or another subject) holds on the task_agent.
38164
+ * @summary IAM - Test Task Agent Permissions
38165
+ * @param {string} taskAgentId
38166
+ * @param {string} orgId The org id
38167
+ * @param {string} projectId The project id
38168
+ * @param {TaskAgentIAMPermissionTest} taskAgentIAMPermissionTest
38169
+ * @param {*} [options] Override http request option.
38170
+ * @throws {RequiredError}
38171
+ */
38172
+ taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions(taskAgentId: string, orgId: string, projectId: string, taskAgentIAMPermissionTest: TaskAgentIAMPermissionTest, options?: any): AxiosPromise<IAMPermissionTest> {
38173
+ return localVarFp.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions(taskAgentId, orgId, projectId, taskAgentIAMPermissionTest, options).then((request) => request(axios, basePath));
38174
+ },
38175
+ /**
38176
+ * Update the roles that a member holds on the task_agent.
38177
+ * @summary IAM - Update Task Agent Member
38178
+ * @param {string} taskAgentId
38179
+ * @param {string} member
38180
+ * @param {string} orgId The org id
38181
+ * @param {string} projectId The project id
38182
+ * @param {TaskAgentIAMMemberRoleUpdate} taskAgentIAMMemberRoleUpdate
38183
+ * @param {*} [options] Override http request option.
38184
+ * @throws {RequiredError}
38185
+ */
38186
+ taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles(taskAgentId: string, member: string, orgId: string, projectId: string, taskAgentIAMMemberRoleUpdate: TaskAgentIAMMemberRoleUpdate, options?: any): AxiosPromise<IAMMember> {
38187
+ return localVarFp.taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles(taskAgentId, member, orgId, projectId, taskAgentIAMMemberRoleUpdate, options).then((request) => request(axios, basePath));
38188
+ },
36699
38189
  /**
36700
38190
  * Update Task Agent configuration. Modifiable fields: - Name and description - System instruction - LLM model - Execution mode - Task tools (full replacement) - MCP servers (full replacement) To update task tools, pass a `task_tools` array. This performs a full replacement: - Omit the field to leave task tools unchanged - Pass an empty array to remove all task tools - Pass a new array to replace all task tools (array order = execution order)
36701
38191
  * @summary Update Task Agent
36702
- * @param {string} orgId The unique identifier of the organization.
36703
- * @param {string} projectId The unique identifier of the project.
36704
- * @param {string} taskAgentId The specific Task Agent to reference.
38192
+ * @param {string} orgId The organization ID
38193
+ * @param {string} projectId The project ID
38194
+ * @param {string} taskAgentId The task agent ID
36705
38195
  * @param {TaskAgentUpdate} taskAgentUpdate
36706
38196
  * @param {*} [options] Override http request option.
36707
38197
  * @throws {RequiredError}
@@ -36722,8 +38212,8 @@ export class TaskAgentsApi extends BaseAPI {
36722
38212
  /**
36723
38213
  * Create a new Task Agent for the project. Task Agents orchestrate multiple Tasks as task tools using LLM-powered reasoning. Configure: - System instruction (prompt) - LLM model for reasoning - Initial task tools (Tasks to add) - Optional MCP server bindings - Execution mode (agentic/sequential)
36724
38214
  * @summary Create Task Agent
36725
- * @param {string} orgId The unique identifier of the organization.
36726
- * @param {string} projectId The unique identifier of the project.
38215
+ * @param {string} orgId The organization ID
38216
+ * @param {string} projectId The project ID
36727
38217
  * @param {TaskAgentCreate} taskAgentCreate
36728
38218
  * @param {*} [options] Override http request option.
36729
38219
  * @throws {RequiredError}
@@ -36973,12 +38463,73 @@ export class TaskAgentsApi extends BaseAPI {
36973
38463
  return TaskAgentsApiFp(this.configuration).runTaskAgent(orgId, projectId, taskAgentId, options).then((request) => request(this.axios, this.basePath));
36974
38464
  }
36975
38465
 
38466
+ /**
38467
+ * Retrieve a specific member that has been granted direct access to the task_agent.
38468
+ * @summary IAM - Lookup Task Agent Member
38469
+ * @param {string} taskAgentId
38470
+ * @param {string} member
38471
+ * @param {string} orgId The org id
38472
+ * @param {string} projectId The project id
38473
+ * @param {*} [options] Override http request option.
38474
+ * @throws {RequiredError}
38475
+ * @memberof TaskAgentsApi
38476
+ */
38477
+ public taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember(taskAgentId: string, member: string, orgId: string, projectId: string, options?: RawAxiosRequestConfig) {
38478
+ return TaskAgentsApiFp(this.configuration).taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamGetMember(taskAgentId, member, orgId, projectId, options).then((request) => request(this.axios, this.basePath));
38479
+ }
38480
+
38481
+ /**
38482
+ * Lists all members that have been granted direct access to the task_agent.
38483
+ * @summary IAM - List Task Agent Members
38484
+ * @param {string} taskAgentId
38485
+ * @param {string} orgId The org id
38486
+ * @param {string} projectId The project id
38487
+ * @param {TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum} [type]
38488
+ * @param {*} [options] Override http request option.
38489
+ * @throws {RequiredError}
38490
+ * @memberof TaskAgentsApi
38491
+ */
38492
+ public taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers(taskAgentId: string, orgId: string, projectId: string, type?: TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum, options?: RawAxiosRequestConfig) {
38493
+ return TaskAgentsApiFp(this.configuration).taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembers(taskAgentId, orgId, projectId, type, options).then((request) => request(this.axios, this.basePath));
38494
+ }
38495
+
38496
+ /**
38497
+ * Test the permissions that the caller (or another subject) holds on the task_agent.
38498
+ * @summary IAM - Test Task Agent Permissions
38499
+ * @param {string} taskAgentId
38500
+ * @param {string} orgId The org id
38501
+ * @param {string} projectId The project id
38502
+ * @param {TaskAgentIAMPermissionTest} taskAgentIAMPermissionTest
38503
+ * @param {*} [options] Override http request option.
38504
+ * @throws {RequiredError}
38505
+ * @memberof TaskAgentsApi
38506
+ */
38507
+ public taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions(taskAgentId: string, orgId: string, projectId: string, taskAgentIAMPermissionTest: TaskAgentIAMPermissionTest, options?: RawAxiosRequestConfig) {
38508
+ return TaskAgentsApiFp(this.configuration).taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamTestPermissions(taskAgentId, orgId, projectId, taskAgentIAMPermissionTest, options).then((request) => request(this.axios, this.basePath));
38509
+ }
38510
+
38511
+ /**
38512
+ * Update the roles that a member holds on the task_agent.
38513
+ * @summary IAM - Update Task Agent Member
38514
+ * @param {string} taskAgentId
38515
+ * @param {string} member
38516
+ * @param {string} orgId The org id
38517
+ * @param {string} projectId The project id
38518
+ * @param {TaskAgentIAMMemberRoleUpdate} taskAgentIAMMemberRoleUpdate
38519
+ * @param {*} [options] Override http request option.
38520
+ * @throws {RequiredError}
38521
+ * @memberof TaskAgentsApi
38522
+ */
38523
+ public taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles(taskAgentId: string, member: string, orgId: string, projectId: string, taskAgentIAMMemberRoleUpdate: TaskAgentIAMMemberRoleUpdate, options?: RawAxiosRequestConfig) {
38524
+ return TaskAgentsApiFp(this.configuration).taskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamUpdateMemberRoles(taskAgentId, member, orgId, projectId, taskAgentIAMMemberRoleUpdate, options).then((request) => request(this.axios, this.basePath));
38525
+ }
38526
+
36976
38527
  /**
36977
38528
  * Update Task Agent configuration. Modifiable fields: - Name and description - System instruction - LLM model - Execution mode - Task tools (full replacement) - MCP servers (full replacement) To update task tools, pass a `task_tools` array. This performs a full replacement: - Omit the field to leave task tools unchanged - Pass an empty array to remove all task tools - Pass a new array to replace all task tools (array order = execution order)
36978
38529
  * @summary Update Task Agent
36979
- * @param {string} orgId The unique identifier of the organization.
36980
- * @param {string} projectId The unique identifier of the project.
36981
- * @param {string} taskAgentId The specific Task Agent to reference.
38530
+ * @param {string} orgId The organization ID
38531
+ * @param {string} projectId The project ID
38532
+ * @param {string} taskAgentId The task agent ID
36982
38533
  * @param {TaskAgentUpdate} taskAgentUpdate
36983
38534
  * @param {*} [options] Override http request option.
36984
38535
  * @throws {RequiredError}
@@ -37021,6 +38572,15 @@ export const GetTaskAgentUsageReportAggregationEnum = {
37021
38572
  Week: 'week'
37022
38573
  } as const;
37023
38574
  export type GetTaskAgentUsageReportAggregationEnum = typeof GetTaskAgentUsageReportAggregationEnum[keyof typeof GetTaskAgentUsageReportAggregationEnum];
38575
+ /**
38576
+ * @export
38577
+ */
38578
+ export const TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum = {
38579
+ User: 'user',
38580
+ Organization: 'organization',
38581
+ Project: 'project'
38582
+ } as const;
38583
+ export type TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum = typeof TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum[keyof typeof TaskAgentIamOrgOrgIdProjectProjectIdTaskAgentTaskAgentIdIamListMembersTypeEnum];
37024
38584
 
37025
38585
 
37026
38586
  /**
@@ -39012,6 +40572,94 @@ export const TaskMCPServersApiAxiosParamCreator = function (configuration?: Conf
39012
40572
 
39013
40573
 
39014
40574
 
40575
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
40576
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
40577
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
40578
+
40579
+ return {
40580
+ url: toPathString(localVarUrlObj),
40581
+ options: localVarRequestOptions,
40582
+ };
40583
+ },
40584
+ /**
40585
+ *
40586
+ * @summary Get Task Mcp Server Catalog
40587
+ * @param {string} slug The canonical MCP server catalog slug
40588
+ * @param {string} orgId The organization ID
40589
+ * @param {string} projectId The project ID
40590
+ * @param {*} [options] Override http request option.
40591
+ * @throws {RequiredError}
40592
+ */
40593
+ getTaskMcpServerCatalog: async (slug: string, orgId: string, projectId: string, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
40594
+ // verify required parameter 'slug' is not null or undefined
40595
+ assertParamExists('getTaskMcpServerCatalog', 'slug', slug)
40596
+ // verify required parameter 'orgId' is not null or undefined
40597
+ assertParamExists('getTaskMcpServerCatalog', 'orgId', orgId)
40598
+ // verify required parameter 'projectId' is not null or undefined
40599
+ assertParamExists('getTaskMcpServerCatalog', 'projectId', projectId)
40600
+ const localVarPath = `/org/{org_id}/project/{project_id}/task_mcp_server/catalog/{slug}`
40601
+ .replace(`{${"slug"}}`, encodeURIComponent(String(slug)))
40602
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
40603
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
40604
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
40605
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
40606
+ let baseOptions;
40607
+ if (configuration) {
40608
+ baseOptions = configuration.baseOptions;
40609
+ }
40610
+
40611
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
40612
+ const localVarHeaderParameter = {} as any;
40613
+ const localVarQueryParameter = {} as any;
40614
+
40615
+ // authentication HTTPBearer required
40616
+ // http bearer authentication required
40617
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
40618
+
40619
+
40620
+
40621
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
40622
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
40623
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
40624
+
40625
+ return {
40626
+ url: toPathString(localVarUrlObj),
40627
+ options: localVarRequestOptions,
40628
+ };
40629
+ },
40630
+ /**
40631
+ *
40632
+ * @summary List Task Mcp Server Catalog
40633
+ * @param {string} orgId The organization ID
40634
+ * @param {string} projectId The project ID
40635
+ * @param {*} [options] Override http request option.
40636
+ * @throws {RequiredError}
40637
+ */
40638
+ listTaskMcpServerCatalog: async (orgId: string, projectId: string, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
40639
+ // verify required parameter 'orgId' is not null or undefined
40640
+ assertParamExists('listTaskMcpServerCatalog', 'orgId', orgId)
40641
+ // verify required parameter 'projectId' is not null or undefined
40642
+ assertParamExists('listTaskMcpServerCatalog', 'projectId', projectId)
40643
+ const localVarPath = `/org/{org_id}/project/{project_id}/task_mcp_server/catalog`
40644
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
40645
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
40646
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
40647
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
40648
+ let baseOptions;
40649
+ if (configuration) {
40650
+ baseOptions = configuration.baseOptions;
40651
+ }
40652
+
40653
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
40654
+ const localVarHeaderParameter = {} as any;
40655
+ const localVarQueryParameter = {} as any;
40656
+
40657
+ // authentication HTTPBearer required
40658
+ // http bearer authentication required
40659
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
40660
+
40661
+
40662
+
39015
40663
  setSearchParams(localVarUrlObj, localVarQueryParameter);
39016
40664
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
39017
40665
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
@@ -39322,6 +40970,35 @@ export const TaskMCPServersApiFp = function(configuration?: Configuration) {
39322
40970
  const localVarOperationServerBasePath = operationServerMap['TaskMCPServersApi.getTaskMcpServer']?.[localVarOperationServerIndex]?.url;
39323
40971
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
39324
40972
  },
40973
+ /**
40974
+ *
40975
+ * @summary Get Task Mcp Server Catalog
40976
+ * @param {string} slug The canonical MCP server catalog slug
40977
+ * @param {string} orgId The organization ID
40978
+ * @param {string} projectId The project ID
40979
+ * @param {*} [options] Override http request option.
40980
+ * @throws {RequiredError}
40981
+ */
40982
+ async getTaskMcpServerCatalog(slug: string, orgId: string, projectId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<TaskMcpServerCatalogRead>> {
40983
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getTaskMcpServerCatalog(slug, orgId, projectId, options);
40984
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
40985
+ const localVarOperationServerBasePath = operationServerMap['TaskMCPServersApi.getTaskMcpServerCatalog']?.[localVarOperationServerIndex]?.url;
40986
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
40987
+ },
40988
+ /**
40989
+ *
40990
+ * @summary List Task Mcp Server Catalog
40991
+ * @param {string} orgId The organization ID
40992
+ * @param {string} projectId The project ID
40993
+ * @param {*} [options] Override http request option.
40994
+ * @throws {RequiredError}
40995
+ */
40996
+ async listTaskMcpServerCatalog(orgId: string, projectId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<TaskMcpServerCatalogRead>>> {
40997
+ const localVarAxiosArgs = await localVarAxiosParamCreator.listTaskMcpServerCatalog(orgId, projectId, options);
40998
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
40999
+ const localVarOperationServerBasePath = operationServerMap['TaskMCPServersApi.listTaskMcpServerCatalog']?.[localVarOperationServerIndex]?.url;
41000
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
41001
+ },
39325
41002
  /**
39326
41003
  *
39327
41004
  * @summary List Task Mcp Servers
@@ -39467,6 +41144,29 @@ export const TaskMCPServersApiFactory = function (configuration?: Configuration,
39467
41144
  getTaskMcpServer(taskMcpServerId: string, orgId: string, projectId: string, options?: any): AxiosPromise<TaskMcpServer> {
39468
41145
  return localVarFp.getTaskMcpServer(taskMcpServerId, orgId, projectId, options).then((request) => request(axios, basePath));
39469
41146
  },
41147
+ /**
41148
+ *
41149
+ * @summary Get Task Mcp Server Catalog
41150
+ * @param {string} slug The canonical MCP server catalog slug
41151
+ * @param {string} orgId The organization ID
41152
+ * @param {string} projectId The project ID
41153
+ * @param {*} [options] Override http request option.
41154
+ * @throws {RequiredError}
41155
+ */
41156
+ getTaskMcpServerCatalog(slug: string, orgId: string, projectId: string, options?: any): AxiosPromise<TaskMcpServerCatalogRead> {
41157
+ return localVarFp.getTaskMcpServerCatalog(slug, orgId, projectId, options).then((request) => request(axios, basePath));
41158
+ },
41159
+ /**
41160
+ *
41161
+ * @summary List Task Mcp Server Catalog
41162
+ * @param {string} orgId The organization ID
41163
+ * @param {string} projectId The project ID
41164
+ * @param {*} [options] Override http request option.
41165
+ * @throws {RequiredError}
41166
+ */
41167
+ listTaskMcpServerCatalog(orgId: string, projectId: string, options?: any): AxiosPromise<Array<TaskMcpServerCatalogRead>> {
41168
+ return localVarFp.listTaskMcpServerCatalog(orgId, projectId, options).then((request) => request(axios, basePath));
41169
+ },
39470
41170
  /**
39471
41171
  *
39472
41172
  * @summary List Task Mcp Servers
@@ -39612,6 +41312,33 @@ export class TaskMCPServersApi extends BaseAPI {
39612
41312
  return TaskMCPServersApiFp(this.configuration).getTaskMcpServer(taskMcpServerId, orgId, projectId, options).then((request) => request(this.axios, this.basePath));
39613
41313
  }
39614
41314
 
41315
+ /**
41316
+ *
41317
+ * @summary Get Task Mcp Server Catalog
41318
+ * @param {string} slug The canonical MCP server catalog slug
41319
+ * @param {string} orgId The organization ID
41320
+ * @param {string} projectId The project ID
41321
+ * @param {*} [options] Override http request option.
41322
+ * @throws {RequiredError}
41323
+ * @memberof TaskMCPServersApi
41324
+ */
41325
+ public getTaskMcpServerCatalog(slug: string, orgId: string, projectId: string, options?: RawAxiosRequestConfig) {
41326
+ return TaskMCPServersApiFp(this.configuration).getTaskMcpServerCatalog(slug, orgId, projectId, options).then((request) => request(this.axios, this.basePath));
41327
+ }
41328
+
41329
+ /**
41330
+ *
41331
+ * @summary List Task Mcp Server Catalog
41332
+ * @param {string} orgId The organization ID
41333
+ * @param {string} projectId The project ID
41334
+ * @param {*} [options] Override http request option.
41335
+ * @throws {RequiredError}
41336
+ * @memberof TaskMCPServersApi
41337
+ */
41338
+ public listTaskMcpServerCatalog(orgId: string, projectId: string, options?: RawAxiosRequestConfig) {
41339
+ return TaskMCPServersApiFp(this.configuration).listTaskMcpServerCatalog(orgId, projectId, options).then((request) => request(this.axios, this.basePath));
41340
+ }
41341
+
39615
41342
  /**
39616
41343
  *
39617
41344
  * @summary List Task Mcp Servers