@rightbrain/brain-api-client 0.0.1-dev.144.719ee49 → 0.0.1-dev.146.3b495bf

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (4) hide show
  1. package/api.ts +1155 -4
  2. package/dist/api.d.ts +786 -4
  3. package/dist/api.js +1028 -76
  4. package/package.json +1 -1
package/api.ts CHANGED
@@ -4626,6 +4626,81 @@ export interface McpServerDiscoveryResponse {
4626
4626
  }
4627
4627
 
4628
4628
 
4629
+ /**
4630
+ *
4631
+ * @export
4632
+ * @interface McpServerIAMMemberRoleUpdate
4633
+ */
4634
+ export interface McpServerIAMMemberRoleUpdate {
4635
+ /**
4636
+ * A list of mcp_server roles to grant to the member. Roles in this list are applied to the member AFTER any removals specified in `remove`. This may be combined with `remove_all` to replace the member\'s entire role list.
4637
+ * @type {Array<string>}
4638
+ * @memberof McpServerIAMMemberRoleUpdate
4639
+ */
4640
+ 'add'?: Array<McpServerIAMMemberRoleUpdateAddEnum>;
4641
+ /**
4642
+ * A list of mcp_server roles to revoke from the member.
4643
+ * @type {Array<string>}
4644
+ * @memberof McpServerIAMMemberRoleUpdate
4645
+ */
4646
+ 'remove'?: Array<McpServerIAMMemberRoleUpdateRemoveEnum>;
4647
+ /**
4648
+ * Removes all existing roles from the member. This may be combined with `add` to replace all existing roles that the member holds.
4649
+ * @type {boolean}
4650
+ * @memberof McpServerIAMMemberRoleUpdate
4651
+ */
4652
+ 'remove_all'?: boolean | null;
4653
+ }
4654
+
4655
+ export const McpServerIAMMemberRoleUpdateAddEnum = {
4656
+ Editor: 'editor',
4657
+ Owner: 'owner',
4658
+ Viewer: 'viewer'
4659
+ } as const;
4660
+
4661
+ export type McpServerIAMMemberRoleUpdateAddEnum = typeof McpServerIAMMemberRoleUpdateAddEnum[keyof typeof McpServerIAMMemberRoleUpdateAddEnum];
4662
+ export const McpServerIAMMemberRoleUpdateRemoveEnum = {
4663
+ Editor: 'editor',
4664
+ Owner: 'owner',
4665
+ Viewer: 'viewer'
4666
+ } as const;
4667
+
4668
+ export type McpServerIAMMemberRoleUpdateRemoveEnum = typeof McpServerIAMMemberRoleUpdateRemoveEnum[keyof typeof McpServerIAMMemberRoleUpdateRemoveEnum];
4669
+
4670
+ /**
4671
+ *
4672
+ * @export
4673
+ * @interface McpServerIAMPermissionTest
4674
+ */
4675
+ export interface McpServerIAMPermissionTest {
4676
+ /**
4677
+ * A list of permissions to test on the mcp_server.
4678
+ * @type {Array<string>}
4679
+ * @memberof McpServerIAMPermissionTest
4680
+ */
4681
+ 'permissions': Array<McpServerIAMPermissionTestPermissionsEnum>;
4682
+ /**
4683
+ *
4684
+ * @type {string}
4685
+ * @memberof McpServerIAMPermissionTest
4686
+ */
4687
+ 'member'?: string | null;
4688
+ }
4689
+
4690
+ export const McpServerIAMPermissionTestPermissionsEnum = {
4691
+ AddEditor: 'add_editor',
4692
+ AddMember: 'add_member',
4693
+ AddOwner: 'add_owner',
4694
+ Edit: 'edit',
4695
+ RemoveEditor: 'remove_editor',
4696
+ RemoveMember: 'remove_member',
4697
+ RemoveOwner: 'remove_owner',
4698
+ View: 'view',
4699
+ ViewMembers: 'view_members'
4700
+ } as const;
4701
+
4702
+ export type McpServerIAMPermissionTestPermissionsEnum = typeof McpServerIAMPermissionTestPermissionsEnum[keyof typeof McpServerIAMPermissionTestPermissionsEnum];
4703
+
4629
4704
  /**
4630
4705
  *
4631
4706
  * @export
@@ -8350,6 +8425,18 @@ export type Response400DocumentIamOrgOrgIdProjectProjectIdDocumentDocumentIdIamT
8350
8425
  */
8351
8426
  export type Response400DocumentIamOrgOrgIdProjectProjectIdDocumentDocumentIdIamUpdateMemberRoles = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse | { reason: 'MULTIPLE_ROLES_NOT_ALLOWED' } & MultipleRolesNotAllowedErrorResponse;
8352
8427
 
8428
+ /**
8429
+ * @type Response400McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions
8430
+ * @export
8431
+ */
8432
+ export type Response400McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse;
8433
+
8434
+ /**
8435
+ * @type Response400McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles
8436
+ * @export
8437
+ */
8438
+ export type Response400McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse | { reason: 'MULTIPLE_ROLES_NOT_ALLOWED' } & MultipleRolesNotAllowedErrorResponse;
8439
+
8353
8440
  /**
8354
8441
  * @type Response400OrganizationIamTestPermissions
8355
8442
  * @export
@@ -8446,6 +8533,18 @@ export type Response400TaskIamOrgOrgIdProjectProjectIdTaskTaskIdIamTestPermissio
8446
8533
  */
8447
8534
  export type Response400TaskIamOrgOrgIdProjectProjectIdTaskTaskIdIamUpdateMemberRoles = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse | { reason: 'MULTIPLE_ROLES_NOT_ALLOWED' } & MultipleRolesNotAllowedErrorResponse;
8448
8535
 
8536
+ /**
8537
+ * @type Response400TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions
8538
+ * @export
8539
+ */
8540
+ export type Response400TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse;
8541
+
8542
+ /**
8543
+ * @type Response400TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles
8544
+ * @export
8545
+ */
8546
+ export type Response400TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles = { reason: 'INVALID_MEMBER' } & InvalidMemberErrorResponse | { reason: 'INVALID_ROLE' } & InvalidRoleErrorResponse | { reason: 'INVALID_SUBJECT_TYPE' } & InvalidSubjectTypeErrorResponse | { reason: 'MALFORMED_RESOURCE_IDENTIFIER' } & MalformedResourceIdentifierErrorResponse | { reason: 'MULTIPLE_ROLES_NOT_ALLOWED' } & MultipleRolesNotAllowedErrorResponse;
8547
+
8449
8548
  /**
8450
8549
  * @type Response403Addtoprojectcollection
8451
8550
  * @export
@@ -8962,6 +9061,30 @@ export type Response403Listtriggers = { reason: 'MISSING_AUTHENTICATION' } & Mis
8962
9061
  */
8963
9062
  export type Response403Listwebhooktriggerevents = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
8964
9063
 
9064
+ /**
9065
+ * @type Response403McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember
9066
+ * @export
9067
+ */
9068
+ export type Response403McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
9069
+
9070
+ /**
9071
+ * @type Response403McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers
9072
+ * @export
9073
+ */
9074
+ export type Response403McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
9075
+
9076
+ /**
9077
+ * @type Response403McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions
9078
+ * @export
9079
+ */
9080
+ export type Response403McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
9081
+
9082
+ /**
9083
+ * @type Response403McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles
9084
+ * @export
9085
+ */
9086
+ export type Response403McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
9087
+
8965
9088
  /**
8966
9089
  * @type Response403OrganizationIamGetMember
8967
9090
  * @export
@@ -9214,6 +9337,30 @@ export type Response403TaskIamOrgOrgIdProjectProjectIdTaskTaskIdIamTestPermissio
9214
9337
  */
9215
9338
  export type Response403TaskIamOrgOrgIdProjectProjectIdTaskTaskIdIamUpdateMemberRoles = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
9216
9339
 
9340
+ /**
9341
+ * @type Response403TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember
9342
+ * @export
9343
+ */
9344
+ export type Response403TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
9345
+
9346
+ /**
9347
+ * @type Response403TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers
9348
+ * @export
9349
+ */
9350
+ export type Response403TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
9351
+
9352
+ /**
9353
+ * @type Response403TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions
9354
+ * @export
9355
+ */
9356
+ export type Response403TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
9357
+
9358
+ /**
9359
+ * @type Response403TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles
9360
+ * @export
9361
+ */
9362
+ export type Response403TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles = { reason: 'MISSING_AUTHENTICATION' } & MissingAuthenticationErrorResponse | { reason: 'PERMISSION_CHECK_FAILED' } & PermissionCheckFailedErrorResponse;
9363
+
9217
9364
  /**
9218
9365
  * @type Response403Updateevalset
9219
9366
  * @export
@@ -10988,6 +11135,12 @@ export interface TaskAgentCreate {
10988
11135
  * @memberof TaskAgentCreate
10989
11136
  */
10990
11137
  'llm_model_id': string;
11138
+ /**
11139
+ * Optional fallback LLM model to snapshot for future failover support.
11140
+ * @type {string}
11141
+ * @memberof TaskAgentCreate
11142
+ */
11143
+ 'fallback_llm_model_id'?: string | null;
10991
11144
  /**
10992
11145
  * Task tools to add. Order in array determines execution order (index 0 = order 0).
10993
11146
  * @type {Array<TaskAgentTaskToolInput>}
@@ -11554,6 +11707,18 @@ export interface TaskAgentRead {
11554
11707
  * @memberof TaskAgentRead
11555
11708
  */
11556
11709
  'llm_model': LLMModel;
11710
+ /**
11711
+ *
11712
+ * @type {string}
11713
+ * @memberof TaskAgentRead
11714
+ */
11715
+ 'fallback_llm_model_id': string | null;
11716
+ /**
11717
+ *
11718
+ * @type {LLMModel}
11719
+ * @memberof TaskAgentRead
11720
+ */
11721
+ 'fallback_llm_model': LLMModel;
11557
11722
  /**
11558
11723
  *
11559
11724
  * @type {Array<TaskAgentTaskToolRead>}
@@ -11748,6 +11913,87 @@ export interface TaskAgentRunEventsResponse {
11748
11913
  */
11749
11914
  'events'?: Array<TaskAgentEvent>;
11750
11915
  }
11916
+ /**
11917
+ * Schema for reading per-model TaskAgent run usage.
11918
+ * @export
11919
+ * @interface TaskAgentRunModelUsageRead
11920
+ */
11921
+ export interface TaskAgentRunModelUsageRead {
11922
+ /**
11923
+ *
11924
+ * @type {string}
11925
+ * @memberof TaskAgentRunModelUsageRead
11926
+ */
11927
+ 'id': string;
11928
+ /**
11929
+ *
11930
+ * @type {string}
11931
+ * @memberof TaskAgentRunModelUsageRead
11932
+ */
11933
+ 'task_agent_run_id': string;
11934
+ /**
11935
+ *
11936
+ * @type {string}
11937
+ * @memberof TaskAgentRunModelUsageRead
11938
+ */
11939
+ 'llm_model_id': string | null;
11940
+ /**
11941
+ *
11942
+ * @type {string}
11943
+ * @memberof TaskAgentRunModelUsageRead
11944
+ */
11945
+ 'usage_type': TaskAgentRunModelUsageReadUsageTypeEnum;
11946
+ /**
11947
+ *
11948
+ * @type {number}
11949
+ * @memberof TaskAgentRunModelUsageRead
11950
+ */
11951
+ 'input_tokens': number;
11952
+ /**
11953
+ *
11954
+ * @type {number}
11955
+ * @memberof TaskAgentRunModelUsageRead
11956
+ */
11957
+ 'output_tokens': number;
11958
+ /**
11959
+ *
11960
+ * @type {number}
11961
+ * @memberof TaskAgentRunModelUsageRead
11962
+ */
11963
+ 'total_tokens': number;
11964
+ /**
11965
+ *
11966
+ * @type {string}
11967
+ * @memberof TaskAgentRunModelUsageRead
11968
+ */
11969
+ 'charged_credits': string | null;
11970
+ /**
11971
+ *
11972
+ * @type {number}
11973
+ * @memberof TaskAgentRunModelUsageRead
11974
+ */
11975
+ 'call_count': number;
11976
+ /**
11977
+ *
11978
+ * @type {string}
11979
+ * @memberof TaskAgentRunModelUsageRead
11980
+ */
11981
+ 'created': string;
11982
+ /**
11983
+ *
11984
+ * @type {string}
11985
+ * @memberof TaskAgentRunModelUsageRead
11986
+ */
11987
+ 'modified': string | null;
11988
+ }
11989
+
11990
+ export const TaskAgentRunModelUsageReadUsageTypeEnum = {
11991
+ Primary: 'primary',
11992
+ Fallback: 'fallback'
11993
+ } as const;
11994
+
11995
+ export type TaskAgentRunModelUsageReadUsageTypeEnum = typeof TaskAgentRunModelUsageReadUsageTypeEnum[keyof typeof TaskAgentRunModelUsageReadUsageTypeEnum];
11996
+
11751
11997
  /**
11752
11998
  * Schema for reading a TaskAgentRun.
11753
11999
  * @export
@@ -11790,6 +12036,30 @@ export interface TaskAgentRunRead {
11790
12036
  * @memberof TaskAgentRunRead
11791
12037
  */
11792
12038
  'is_continuation'?: boolean;
12039
+ /**
12040
+ *
12041
+ * @type {string}
12042
+ * @memberof TaskAgentRunRead
12043
+ */
12044
+ 'primary_llm_model_id'?: string | null;
12045
+ /**
12046
+ *
12047
+ * @type {string}
12048
+ * @memberof TaskAgentRunRead
12049
+ */
12050
+ 'fallback_llm_model_id'?: string | null;
12051
+ /**
12052
+ *
12053
+ * @type {boolean}
12054
+ * @memberof TaskAgentRunRead
12055
+ */
12056
+ 'used_fallback_model'?: boolean;
12057
+ /**
12058
+ *
12059
+ * @type {string}
12060
+ * @memberof TaskAgentRunRead
12061
+ */
12062
+ 'primary_failure_reason'?: string | null;
11793
12063
  /**
11794
12064
  *
11795
12065
  * @type {number}
@@ -11910,6 +12180,12 @@ export interface TaskAgentRunRead {
11910
12180
  * @memberof TaskAgentRunRead
11911
12181
  */
11912
12182
  'last_activity_at'?: string | null;
12183
+ /**
12184
+ *
12185
+ * @type {Array<TaskAgentRunModelUsageRead>}
12186
+ * @memberof TaskAgentRunRead
12187
+ */
12188
+ 'model_usages'?: Array<TaskAgentRunModelUsageRead>;
11913
12189
  /**
11914
12190
  * Files associated with this agent run (both uploaded and generated by task tools)
11915
12191
  * @type {Array<TaskAgentFileMetadata>}
@@ -12305,6 +12581,12 @@ export interface TaskAgentUpdate {
12305
12581
  * @memberof TaskAgentUpdate
12306
12582
  */
12307
12583
  'llm_model_id'?: string | null;
12584
+ /**
12585
+ *
12586
+ * @type {string}
12587
+ * @memberof TaskAgentUpdate
12588
+ */
12589
+ 'fallback_llm_model_id'?: string | null;
12308
12590
  /**
12309
12591
  * Full replacement of task tools. Omit field to leave task tools unchanged. Pass empty list to remove all task tools.
12310
12592
  * @type {Array<TaskAgentTaskToolInput>}
@@ -13164,6 +13446,81 @@ export interface TaskMcpServerCreate {
13164
13446
  }
13165
13447
 
13166
13448
 
13449
+ /**
13450
+ *
13451
+ * @export
13452
+ * @interface TaskMcpServerIAMMemberRoleUpdate
13453
+ */
13454
+ export interface TaskMcpServerIAMMemberRoleUpdate {
13455
+ /**
13456
+ * A list of task_mcp_server roles to grant to the member. Roles in this list are applied to the member AFTER any removals specified in `remove`. This may be combined with `remove_all` to replace the member\'s entire role list.
13457
+ * @type {Array<string>}
13458
+ * @memberof TaskMcpServerIAMMemberRoleUpdate
13459
+ */
13460
+ 'add'?: Array<TaskMcpServerIAMMemberRoleUpdateAddEnum>;
13461
+ /**
13462
+ * A list of task_mcp_server roles to revoke from the member.
13463
+ * @type {Array<string>}
13464
+ * @memberof TaskMcpServerIAMMemberRoleUpdate
13465
+ */
13466
+ 'remove'?: Array<TaskMcpServerIAMMemberRoleUpdateRemoveEnum>;
13467
+ /**
13468
+ * Removes all existing roles from the member. This may be combined with `add` to replace all existing roles that the member holds.
13469
+ * @type {boolean}
13470
+ * @memberof TaskMcpServerIAMMemberRoleUpdate
13471
+ */
13472
+ 'remove_all'?: boolean | null;
13473
+ }
13474
+
13475
+ export const TaskMcpServerIAMMemberRoleUpdateAddEnum = {
13476
+ Editor: 'editor',
13477
+ Owner: 'owner',
13478
+ Viewer: 'viewer'
13479
+ } as const;
13480
+
13481
+ export type TaskMcpServerIAMMemberRoleUpdateAddEnum = typeof TaskMcpServerIAMMemberRoleUpdateAddEnum[keyof typeof TaskMcpServerIAMMemberRoleUpdateAddEnum];
13482
+ export const TaskMcpServerIAMMemberRoleUpdateRemoveEnum = {
13483
+ Editor: 'editor',
13484
+ Owner: 'owner',
13485
+ Viewer: 'viewer'
13486
+ } as const;
13487
+
13488
+ export type TaskMcpServerIAMMemberRoleUpdateRemoveEnum = typeof TaskMcpServerIAMMemberRoleUpdateRemoveEnum[keyof typeof TaskMcpServerIAMMemberRoleUpdateRemoveEnum];
13489
+
13490
+ /**
13491
+ *
13492
+ * @export
13493
+ * @interface TaskMcpServerIAMPermissionTest
13494
+ */
13495
+ export interface TaskMcpServerIAMPermissionTest {
13496
+ /**
13497
+ * A list of permissions to test on the task_mcp_server.
13498
+ * @type {Array<string>}
13499
+ * @memberof TaskMcpServerIAMPermissionTest
13500
+ */
13501
+ 'permissions': Array<TaskMcpServerIAMPermissionTestPermissionsEnum>;
13502
+ /**
13503
+ *
13504
+ * @type {string}
13505
+ * @memberof TaskMcpServerIAMPermissionTest
13506
+ */
13507
+ 'member'?: string | null;
13508
+ }
13509
+
13510
+ export const TaskMcpServerIAMPermissionTestPermissionsEnum = {
13511
+ AddEditor: 'add_editor',
13512
+ AddMember: 'add_member',
13513
+ AddOwner: 'add_owner',
13514
+ Edit: 'edit',
13515
+ RemoveEditor: 'remove_editor',
13516
+ RemoveMember: 'remove_member',
13517
+ RemoveOwner: 'remove_owner',
13518
+ View: 'view',
13519
+ ViewMembers: 'view_members'
13520
+ } as const;
13521
+
13522
+ export type TaskMcpServerIAMPermissionTestPermissionsEnum = typeof TaskMcpServerIAMPermissionTestPermissionsEnum[keyof typeof TaskMcpServerIAMPermissionTestPermissionsEnum];
13523
+
13167
13524
  /**
13168
13525
  *
13169
13526
  * @export
@@ -28055,6 +28412,215 @@ export const MCPServersApiAxiosParamCreator = function (configuration?: Configur
28055
28412
  options: localVarRequestOptions,
28056
28413
  };
28057
28414
  },
28415
+ /**
28416
+ * Retrieve a specific member that has been granted direct access to the mcp_server.
28417
+ * @summary IAM - Lookup Mcp Server Member
28418
+ * @param {string} mcpServerId
28419
+ * @param {string} member
28420
+ * @param {string} orgId The org id
28421
+ * @param {string} projectId The project id
28422
+ * @param {*} [options] Override http request option.
28423
+ * @throws {RequiredError}
28424
+ */
28425
+ mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember: async (mcpServerId: string, member: string, orgId: string, projectId: string, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
28426
+ // verify required parameter 'mcpServerId' is not null or undefined
28427
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember', 'mcpServerId', mcpServerId)
28428
+ // verify required parameter 'member' is not null or undefined
28429
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember', 'member', member)
28430
+ // verify required parameter 'orgId' is not null or undefined
28431
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember', 'orgId', orgId)
28432
+ // verify required parameter 'projectId' is not null or undefined
28433
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember', 'projectId', projectId)
28434
+ const localVarPath = `/org/{org_id}/project/{project_id}/mcp_server/{mcp_server_id}/iam/members/{member}`
28435
+ .replace(`{${"mcp_server_id"}}`, encodeURIComponent(String(mcpServerId)))
28436
+ .replace(`{${"member"}}`, encodeURIComponent(String(member)))
28437
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
28438
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
28439
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
28440
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
28441
+ let baseOptions;
28442
+ if (configuration) {
28443
+ baseOptions = configuration.baseOptions;
28444
+ }
28445
+
28446
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
28447
+ const localVarHeaderParameter = {} as any;
28448
+ const localVarQueryParameter = {} as any;
28449
+
28450
+ // authentication HTTPBearer required
28451
+ // http bearer authentication required
28452
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
28453
+
28454
+
28455
+
28456
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
28457
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
28458
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
28459
+
28460
+ return {
28461
+ url: toPathString(localVarUrlObj),
28462
+ options: localVarRequestOptions,
28463
+ };
28464
+ },
28465
+ /**
28466
+ * Lists all members that have been granted direct access to the mcp_server.
28467
+ * @summary IAM - List Mcp Server Members
28468
+ * @param {string} mcpServerId
28469
+ * @param {string} orgId The org id
28470
+ * @param {string} projectId The project id
28471
+ * @param {McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum} [type]
28472
+ * @param {*} [options] Override http request option.
28473
+ * @throws {RequiredError}
28474
+ */
28475
+ mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers: async (mcpServerId: string, orgId: string, projectId: string, type?: McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
28476
+ // verify required parameter 'mcpServerId' is not null or undefined
28477
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers', 'mcpServerId', mcpServerId)
28478
+ // verify required parameter 'orgId' is not null or undefined
28479
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers', 'orgId', orgId)
28480
+ // verify required parameter 'projectId' is not null or undefined
28481
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers', 'projectId', projectId)
28482
+ const localVarPath = `/org/{org_id}/project/{project_id}/mcp_server/{mcp_server_id}/iam/members`
28483
+ .replace(`{${"mcp_server_id"}}`, encodeURIComponent(String(mcpServerId)))
28484
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
28485
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
28486
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
28487
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
28488
+ let baseOptions;
28489
+ if (configuration) {
28490
+ baseOptions = configuration.baseOptions;
28491
+ }
28492
+
28493
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
28494
+ const localVarHeaderParameter = {} as any;
28495
+ const localVarQueryParameter = {} as any;
28496
+
28497
+ // authentication HTTPBearer required
28498
+ // http bearer authentication required
28499
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
28500
+
28501
+ if (type !== undefined) {
28502
+ localVarQueryParameter['type'] = type;
28503
+ }
28504
+
28505
+
28506
+
28507
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
28508
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
28509
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
28510
+
28511
+ return {
28512
+ url: toPathString(localVarUrlObj),
28513
+ options: localVarRequestOptions,
28514
+ };
28515
+ },
28516
+ /**
28517
+ * Test the permissions that the caller (or another subject) holds on the mcp_server.
28518
+ * @summary IAM - Test Mcp Server Permissions
28519
+ * @param {string} mcpServerId
28520
+ * @param {string} orgId The org id
28521
+ * @param {string} projectId The project id
28522
+ * @param {McpServerIAMPermissionTest} mcpServerIAMPermissionTest
28523
+ * @param {*} [options] Override http request option.
28524
+ * @throws {RequiredError}
28525
+ */
28526
+ mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions: async (mcpServerId: string, orgId: string, projectId: string, mcpServerIAMPermissionTest: McpServerIAMPermissionTest, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
28527
+ // verify required parameter 'mcpServerId' is not null or undefined
28528
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions', 'mcpServerId', mcpServerId)
28529
+ // verify required parameter 'orgId' is not null or undefined
28530
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions', 'orgId', orgId)
28531
+ // verify required parameter 'projectId' is not null or undefined
28532
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions', 'projectId', projectId)
28533
+ // verify required parameter 'mcpServerIAMPermissionTest' is not null or undefined
28534
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions', 'mcpServerIAMPermissionTest', mcpServerIAMPermissionTest)
28535
+ const localVarPath = `/org/{org_id}/project/{project_id}/mcp_server/{mcp_server_id}/iam/test`
28536
+ .replace(`{${"mcp_server_id"}}`, encodeURIComponent(String(mcpServerId)))
28537
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
28538
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
28539
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
28540
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
28541
+ let baseOptions;
28542
+ if (configuration) {
28543
+ baseOptions = configuration.baseOptions;
28544
+ }
28545
+
28546
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options};
28547
+ const localVarHeaderParameter = {} as any;
28548
+ const localVarQueryParameter = {} as any;
28549
+
28550
+ // authentication HTTPBearer required
28551
+ // http bearer authentication required
28552
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
28553
+
28554
+
28555
+
28556
+ localVarHeaderParameter['Content-Type'] = 'application/json';
28557
+
28558
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
28559
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
28560
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
28561
+ localVarRequestOptions.data = serializeDataIfNeeded(mcpServerIAMPermissionTest, localVarRequestOptions, configuration)
28562
+
28563
+ return {
28564
+ url: toPathString(localVarUrlObj),
28565
+ options: localVarRequestOptions,
28566
+ };
28567
+ },
28568
+ /**
28569
+ * Update the roles that a member holds on the mcp_server.
28570
+ * @summary IAM - Update Mcp Server Member
28571
+ * @param {string} mcpServerId
28572
+ * @param {string} member
28573
+ * @param {string} orgId The org id
28574
+ * @param {string} projectId The project id
28575
+ * @param {McpServerIAMMemberRoleUpdate} mcpServerIAMMemberRoleUpdate
28576
+ * @param {*} [options] Override http request option.
28577
+ * @throws {RequiredError}
28578
+ */
28579
+ mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles: async (mcpServerId: string, member: string, orgId: string, projectId: string, mcpServerIAMMemberRoleUpdate: McpServerIAMMemberRoleUpdate, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
28580
+ // verify required parameter 'mcpServerId' is not null or undefined
28581
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles', 'mcpServerId', mcpServerId)
28582
+ // verify required parameter 'member' is not null or undefined
28583
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles', 'member', member)
28584
+ // verify required parameter 'orgId' is not null or undefined
28585
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles', 'orgId', orgId)
28586
+ // verify required parameter 'projectId' is not null or undefined
28587
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles', 'projectId', projectId)
28588
+ // verify required parameter 'mcpServerIAMMemberRoleUpdate' is not null or undefined
28589
+ assertParamExists('mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles', 'mcpServerIAMMemberRoleUpdate', mcpServerIAMMemberRoleUpdate)
28590
+ const localVarPath = `/org/{org_id}/project/{project_id}/mcp_server/{mcp_server_id}/iam/members/{member}`
28591
+ .replace(`{${"mcp_server_id"}}`, encodeURIComponent(String(mcpServerId)))
28592
+ .replace(`{${"member"}}`, encodeURIComponent(String(member)))
28593
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
28594
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
28595
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
28596
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
28597
+ let baseOptions;
28598
+ if (configuration) {
28599
+ baseOptions = configuration.baseOptions;
28600
+ }
28601
+
28602
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options};
28603
+ const localVarHeaderParameter = {} as any;
28604
+ const localVarQueryParameter = {} as any;
28605
+
28606
+ // authentication HTTPBearer required
28607
+ // http bearer authentication required
28608
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
28609
+
28610
+
28611
+
28612
+ localVarHeaderParameter['Content-Type'] = 'application/json';
28613
+
28614
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
28615
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
28616
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
28617
+ localVarRequestOptions.data = serializeDataIfNeeded(mcpServerIAMMemberRoleUpdate, localVarRequestOptions, configuration)
28618
+
28619
+ return {
28620
+ url: toPathString(localVarUrlObj),
28621
+ options: localVarRequestOptions,
28622
+ };
28623
+ },
28058
28624
  /**
28059
28625
  * Update MCP server configuration. Modifiable fields: - Name and description - Environment variables - Connection parameters - Tool availability Note: Updating server configuration may trigger re-synchronization.
28060
28626
  * @summary Update MCP Server
@@ -28193,6 +28759,71 @@ export const MCPServersApiFp = function(configuration?: Configuration) {
28193
28759
  const localVarOperationServerBasePath = operationServerMap['MCPServersApi.markMcpServerSynced']?.[localVarOperationServerIndex]?.url;
28194
28760
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
28195
28761
  },
28762
+ /**
28763
+ * Retrieve a specific member that has been granted direct access to the mcp_server.
28764
+ * @summary IAM - Lookup Mcp Server Member
28765
+ * @param {string} mcpServerId
28766
+ * @param {string} member
28767
+ * @param {string} orgId The org id
28768
+ * @param {string} projectId The project id
28769
+ * @param {*} [options] Override http request option.
28770
+ * @throws {RequiredError}
28771
+ */
28772
+ async mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember(mcpServerId: string, member: string, orgId: string, projectId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMMember>> {
28773
+ const localVarAxiosArgs = await localVarAxiosParamCreator.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember(mcpServerId, member, orgId, projectId, options);
28774
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
28775
+ const localVarOperationServerBasePath = operationServerMap['MCPServersApi.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember']?.[localVarOperationServerIndex]?.url;
28776
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
28777
+ },
28778
+ /**
28779
+ * Lists all members that have been granted direct access to the mcp_server.
28780
+ * @summary IAM - List Mcp Server Members
28781
+ * @param {string} mcpServerId
28782
+ * @param {string} orgId The org id
28783
+ * @param {string} projectId The project id
28784
+ * @param {McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum} [type]
28785
+ * @param {*} [options] Override http request option.
28786
+ * @throws {RequiredError}
28787
+ */
28788
+ async mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers(mcpServerId: string, orgId: string, projectId: string, type?: McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PaginatedResultSetIAMMember>> {
28789
+ const localVarAxiosArgs = await localVarAxiosParamCreator.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers(mcpServerId, orgId, projectId, type, options);
28790
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
28791
+ const localVarOperationServerBasePath = operationServerMap['MCPServersApi.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers']?.[localVarOperationServerIndex]?.url;
28792
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
28793
+ },
28794
+ /**
28795
+ * Test the permissions that the caller (or another subject) holds on the mcp_server.
28796
+ * @summary IAM - Test Mcp Server Permissions
28797
+ * @param {string} mcpServerId
28798
+ * @param {string} orgId The org id
28799
+ * @param {string} projectId The project id
28800
+ * @param {McpServerIAMPermissionTest} mcpServerIAMPermissionTest
28801
+ * @param {*} [options] Override http request option.
28802
+ * @throws {RequiredError}
28803
+ */
28804
+ async mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions(mcpServerId: string, orgId: string, projectId: string, mcpServerIAMPermissionTest: McpServerIAMPermissionTest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMPermissionTest>> {
28805
+ const localVarAxiosArgs = await localVarAxiosParamCreator.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions(mcpServerId, orgId, projectId, mcpServerIAMPermissionTest, options);
28806
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
28807
+ const localVarOperationServerBasePath = operationServerMap['MCPServersApi.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions']?.[localVarOperationServerIndex]?.url;
28808
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
28809
+ },
28810
+ /**
28811
+ * Update the roles that a member holds on the mcp_server.
28812
+ * @summary IAM - Update Mcp Server Member
28813
+ * @param {string} mcpServerId
28814
+ * @param {string} member
28815
+ * @param {string} orgId The org id
28816
+ * @param {string} projectId The project id
28817
+ * @param {McpServerIAMMemberRoleUpdate} mcpServerIAMMemberRoleUpdate
28818
+ * @param {*} [options] Override http request option.
28819
+ * @throws {RequiredError}
28820
+ */
28821
+ async mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles(mcpServerId: string, member: string, orgId: string, projectId: string, mcpServerIAMMemberRoleUpdate: McpServerIAMMemberRoleUpdate, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMMember>> {
28822
+ const localVarAxiosArgs = await localVarAxiosParamCreator.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles(mcpServerId, member, orgId, projectId, mcpServerIAMMemberRoleUpdate, options);
28823
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
28824
+ const localVarOperationServerBasePath = operationServerMap['MCPServersApi.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles']?.[localVarOperationServerIndex]?.url;
28825
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
28826
+ },
28196
28827
  /**
28197
28828
  * Update MCP server configuration. Modifiable fields: - Name and description - Environment variables - Connection parameters - Tool availability Note: Updating server configuration may trigger re-synchronization.
28198
28829
  * @summary Update MCP Server
@@ -28280,6 +28911,59 @@ export const MCPServersApiFactory = function (configuration?: Configuration, bas
28280
28911
  markMcpServerSynced(mcpServerId: string, orgId: string, projectId: string, options?: any): AxiosPromise<McpServer> {
28281
28912
  return localVarFp.markMcpServerSynced(mcpServerId, orgId, projectId, options).then((request) => request(axios, basePath));
28282
28913
  },
28914
+ /**
28915
+ * Retrieve a specific member that has been granted direct access to the mcp_server.
28916
+ * @summary IAM - Lookup Mcp Server Member
28917
+ * @param {string} mcpServerId
28918
+ * @param {string} member
28919
+ * @param {string} orgId The org id
28920
+ * @param {string} projectId The project id
28921
+ * @param {*} [options] Override http request option.
28922
+ * @throws {RequiredError}
28923
+ */
28924
+ mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember(mcpServerId: string, member: string, orgId: string, projectId: string, options?: any): AxiosPromise<IAMMember> {
28925
+ return localVarFp.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember(mcpServerId, member, orgId, projectId, options).then((request) => request(axios, basePath));
28926
+ },
28927
+ /**
28928
+ * Lists all members that have been granted direct access to the mcp_server.
28929
+ * @summary IAM - List Mcp Server Members
28930
+ * @param {string} mcpServerId
28931
+ * @param {string} orgId The org id
28932
+ * @param {string} projectId The project id
28933
+ * @param {McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum} [type]
28934
+ * @param {*} [options] Override http request option.
28935
+ * @throws {RequiredError}
28936
+ */
28937
+ mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers(mcpServerId: string, orgId: string, projectId: string, type?: McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum, options?: any): AxiosPromise<PaginatedResultSetIAMMember> {
28938
+ return localVarFp.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers(mcpServerId, orgId, projectId, type, options).then((request) => request(axios, basePath));
28939
+ },
28940
+ /**
28941
+ * Test the permissions that the caller (or another subject) holds on the mcp_server.
28942
+ * @summary IAM - Test Mcp Server Permissions
28943
+ * @param {string} mcpServerId
28944
+ * @param {string} orgId The org id
28945
+ * @param {string} projectId The project id
28946
+ * @param {McpServerIAMPermissionTest} mcpServerIAMPermissionTest
28947
+ * @param {*} [options] Override http request option.
28948
+ * @throws {RequiredError}
28949
+ */
28950
+ mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions(mcpServerId: string, orgId: string, projectId: string, mcpServerIAMPermissionTest: McpServerIAMPermissionTest, options?: any): AxiosPromise<IAMPermissionTest> {
28951
+ return localVarFp.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions(mcpServerId, orgId, projectId, mcpServerIAMPermissionTest, options).then((request) => request(axios, basePath));
28952
+ },
28953
+ /**
28954
+ * Update the roles that a member holds on the mcp_server.
28955
+ * @summary IAM - Update Mcp Server Member
28956
+ * @param {string} mcpServerId
28957
+ * @param {string} member
28958
+ * @param {string} orgId The org id
28959
+ * @param {string} projectId The project id
28960
+ * @param {McpServerIAMMemberRoleUpdate} mcpServerIAMMemberRoleUpdate
28961
+ * @param {*} [options] Override http request option.
28962
+ * @throws {RequiredError}
28963
+ */
28964
+ mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles(mcpServerId: string, member: string, orgId: string, projectId: string, mcpServerIAMMemberRoleUpdate: McpServerIAMMemberRoleUpdate, options?: any): AxiosPromise<IAMMember> {
28965
+ return localVarFp.mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles(mcpServerId, member, orgId, projectId, mcpServerIAMMemberRoleUpdate, options).then((request) => request(axios, basePath));
28966
+ },
28283
28967
  /**
28284
28968
  * Update MCP server configuration. Modifiable fields: - Name and description - Environment variables - Connection parameters - Tool availability Note: Updating server configuration may trigger re-synchronization.
28285
28969
  * @summary Update MCP Server
@@ -28374,6 +29058,67 @@ export class MCPServersApi extends BaseAPI {
28374
29058
  return MCPServersApiFp(this.configuration).markMcpServerSynced(mcpServerId, orgId, projectId, options).then((request) => request(this.axios, this.basePath));
28375
29059
  }
28376
29060
 
29061
+ /**
29062
+ * Retrieve a specific member that has been granted direct access to the mcp_server.
29063
+ * @summary IAM - Lookup Mcp Server Member
29064
+ * @param {string} mcpServerId
29065
+ * @param {string} member
29066
+ * @param {string} orgId The org id
29067
+ * @param {string} projectId The project id
29068
+ * @param {*} [options] Override http request option.
29069
+ * @throws {RequiredError}
29070
+ * @memberof MCPServersApi
29071
+ */
29072
+ public mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember(mcpServerId: string, member: string, orgId: string, projectId: string, options?: RawAxiosRequestConfig) {
29073
+ return MCPServersApiFp(this.configuration).mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamGetMember(mcpServerId, member, orgId, projectId, options).then((request) => request(this.axios, this.basePath));
29074
+ }
29075
+
29076
+ /**
29077
+ * Lists all members that have been granted direct access to the mcp_server.
29078
+ * @summary IAM - List Mcp Server Members
29079
+ * @param {string} mcpServerId
29080
+ * @param {string} orgId The org id
29081
+ * @param {string} projectId The project id
29082
+ * @param {McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum} [type]
29083
+ * @param {*} [options] Override http request option.
29084
+ * @throws {RequiredError}
29085
+ * @memberof MCPServersApi
29086
+ */
29087
+ public mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers(mcpServerId: string, orgId: string, projectId: string, type?: McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum, options?: RawAxiosRequestConfig) {
29088
+ return MCPServersApiFp(this.configuration).mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembers(mcpServerId, orgId, projectId, type, options).then((request) => request(this.axios, this.basePath));
29089
+ }
29090
+
29091
+ /**
29092
+ * Test the permissions that the caller (or another subject) holds on the mcp_server.
29093
+ * @summary IAM - Test Mcp Server Permissions
29094
+ * @param {string} mcpServerId
29095
+ * @param {string} orgId The org id
29096
+ * @param {string} projectId The project id
29097
+ * @param {McpServerIAMPermissionTest} mcpServerIAMPermissionTest
29098
+ * @param {*} [options] Override http request option.
29099
+ * @throws {RequiredError}
29100
+ * @memberof MCPServersApi
29101
+ */
29102
+ public mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions(mcpServerId: string, orgId: string, projectId: string, mcpServerIAMPermissionTest: McpServerIAMPermissionTest, options?: RawAxiosRequestConfig) {
29103
+ return MCPServersApiFp(this.configuration).mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamTestPermissions(mcpServerId, orgId, projectId, mcpServerIAMPermissionTest, options).then((request) => request(this.axios, this.basePath));
29104
+ }
29105
+
29106
+ /**
29107
+ * Update the roles that a member holds on the mcp_server.
29108
+ * @summary IAM - Update Mcp Server Member
29109
+ * @param {string} mcpServerId
29110
+ * @param {string} member
29111
+ * @param {string} orgId The org id
29112
+ * @param {string} projectId The project id
29113
+ * @param {McpServerIAMMemberRoleUpdate} mcpServerIAMMemberRoleUpdate
29114
+ * @param {*} [options] Override http request option.
29115
+ * @throws {RequiredError}
29116
+ * @memberof MCPServersApi
29117
+ */
29118
+ public mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles(mcpServerId: string, member: string, orgId: string, projectId: string, mcpServerIAMMemberRoleUpdate: McpServerIAMMemberRoleUpdate, options?: RawAxiosRequestConfig) {
29119
+ return MCPServersApiFp(this.configuration).mcpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamUpdateMemberRoles(mcpServerId, member, orgId, projectId, mcpServerIAMMemberRoleUpdate, options).then((request) => request(this.axios, this.basePath));
29120
+ }
29121
+
28377
29122
  /**
28378
29123
  * Update MCP server configuration. Modifiable fields: - Name and description - Environment variables - Connection parameters - Tool availability Note: Updating server configuration may trigger re-synchronization.
28379
29124
  * @summary Update MCP Server
@@ -28390,6 +29135,15 @@ export class MCPServersApi extends BaseAPI {
28390
29135
  }
28391
29136
  }
28392
29137
 
29138
+ /**
29139
+ * @export
29140
+ */
29141
+ export const McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum = {
29142
+ User: 'user',
29143
+ Organization: 'organization',
29144
+ Project: 'project'
29145
+ } as const;
29146
+ export type McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum = typeof McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum[keyof typeof McpServerIamOrgOrgIdProjectProjectIdMcpServerMcpServerIdIamListMembersTypeEnum];
28393
29147
 
28394
29148
 
28395
29149
  /**
@@ -37927,7 +38681,7 @@ export const TaskAgentsApiAxiosParamCreator = function (configuration?: Configur
37927
38681
  };
37928
38682
  },
37929
38683
  /**
37930
- * Execute the Task Agent with a user message. The agent will: 1. Process the message using the configured LLM 2. Reason about which task tools to invoke 3. Execute relevant Tasks as needed 4. Return a streaming response Responses are streamed using Server-Sent Events (SSE).
38684
+ * Execute the Task Agent with a user message. The agent will: 1. Process the message using the configured LLM 2. Reason about which task tools to invoke 3. Execute relevant Tasks as needed 4. Return a streaming response Responses are streamed using Server-Sent Events (SSE). The first SSE event emitted after successful stream setup is: - `event_type: \"session_id\"` with the resolved `session_id` in `metadata` Subsequent events include tool calls/results, text responses, and the terminal `done` or `error` event.
37931
38685
  * @summary Run Task Agent
37932
38686
  * @param {string} orgId The unique identifier of the organization.
37933
38687
  * @param {string} projectId The unique identifier of the project.
@@ -38499,7 +39253,7 @@ export const TaskAgentsApiFp = function(configuration?: Configuration) {
38499
39253
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
38500
39254
  },
38501
39255
  /**
38502
- * Execute the Task Agent with a user message. The agent will: 1. Process the message using the configured LLM 2. Reason about which task tools to invoke 3. Execute relevant Tasks as needed 4. Return a streaming response Responses are streamed using Server-Sent Events (SSE).
39256
+ * Execute the Task Agent with a user message. The agent will: 1. Process the message using the configured LLM 2. Reason about which task tools to invoke 3. Execute relevant Tasks as needed 4. Return a streaming response Responses are streamed using Server-Sent Events (SSE). The first SSE event emitted after successful stream setup is: - `event_type: \"session_id\"` with the resolved `session_id` in `metadata` Subsequent events include tool calls/results, text responses, and the terminal `done` or `error` event.
38503
39257
  * @summary Run Task Agent
38504
39258
  * @param {string} orgId The unique identifier of the organization.
38505
39259
  * @param {string} projectId The unique identifier of the project.
@@ -38815,7 +39569,7 @@ export const TaskAgentsApiFactory = function (configuration?: Configuration, bas
38815
39569
  return localVarFp.listTaskAgents(orgId, projectId, cursor, pageLimit, options).then((request) => request(axios, basePath));
38816
39570
  },
38817
39571
  /**
38818
- * Execute the Task Agent with a user message. The agent will: 1. Process the message using the configured LLM 2. Reason about which task tools to invoke 3. Execute relevant Tasks as needed 4. Return a streaming response Responses are streamed using Server-Sent Events (SSE).
39572
+ * Execute the Task Agent with a user message. The agent will: 1. Process the message using the configured LLM 2. Reason about which task tools to invoke 3. Execute relevant Tasks as needed 4. Return a streaming response Responses are streamed using Server-Sent Events (SSE). The first SSE event emitted after successful stream setup is: - `event_type: \"session_id\"` with the resolved `session_id` in `metadata` Subsequent events include tool calls/results, text responses, and the terminal `done` or `error` event.
38819
39573
  * @summary Run Task Agent
38820
39574
  * @param {string} orgId The unique identifier of the organization.
38821
39575
  * @param {string} projectId The unique identifier of the project.
@@ -39143,7 +39897,7 @@ export class TaskAgentsApi extends BaseAPI {
39143
39897
  }
39144
39898
 
39145
39899
  /**
39146
- * Execute the Task Agent with a user message. The agent will: 1. Process the message using the configured LLM 2. Reason about which task tools to invoke 3. Execute relevant Tasks as needed 4. Return a streaming response Responses are streamed using Server-Sent Events (SSE).
39900
+ * Execute the Task Agent with a user message. The agent will: 1. Process the message using the configured LLM 2. Reason about which task tools to invoke 3. Execute relevant Tasks as needed 4. Return a streaming response Responses are streamed using Server-Sent Events (SSE). The first SSE event emitted after successful stream setup is: - `event_type: \"session_id\"` with the resolved `session_id` in `metadata` Subsequent events include tool calls/results, text responses, and the terminal `done` or `error` event.
39147
39901
  * @summary Run Task Agent
39148
39902
  * @param {string} orgId The unique identifier of the organization.
39149
39903
  * @param {string} projectId The unique identifier of the project.
@@ -41511,6 +42265,215 @@ export const TaskMCPServersApiAxiosParamCreator = function (configuration?: Conf
41511
42265
  options: localVarRequestOptions,
41512
42266
  };
41513
42267
  },
42268
+ /**
42269
+ * Retrieve a specific member that has been granted direct access to the task_mcp_server.
42270
+ * @summary IAM - Lookup Task Mcp Server Member
42271
+ * @param {string} taskMcpServerId
42272
+ * @param {string} member
42273
+ * @param {string} orgId The org id
42274
+ * @param {string} projectId The project id
42275
+ * @param {*} [options] Override http request option.
42276
+ * @throws {RequiredError}
42277
+ */
42278
+ taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember: async (taskMcpServerId: string, member: string, orgId: string, projectId: string, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
42279
+ // verify required parameter 'taskMcpServerId' is not null or undefined
42280
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember', 'taskMcpServerId', taskMcpServerId)
42281
+ // verify required parameter 'member' is not null or undefined
42282
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember', 'member', member)
42283
+ // verify required parameter 'orgId' is not null or undefined
42284
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember', 'orgId', orgId)
42285
+ // verify required parameter 'projectId' is not null or undefined
42286
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember', 'projectId', projectId)
42287
+ const localVarPath = `/org/{org_id}/project/{project_id}/task_mcp_server/{task_mcp_server_id}/iam/members/{member}`
42288
+ .replace(`{${"task_mcp_server_id"}}`, encodeURIComponent(String(taskMcpServerId)))
42289
+ .replace(`{${"member"}}`, encodeURIComponent(String(member)))
42290
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
42291
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
42292
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
42293
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
42294
+ let baseOptions;
42295
+ if (configuration) {
42296
+ baseOptions = configuration.baseOptions;
42297
+ }
42298
+
42299
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
42300
+ const localVarHeaderParameter = {} as any;
42301
+ const localVarQueryParameter = {} as any;
42302
+
42303
+ // authentication HTTPBearer required
42304
+ // http bearer authentication required
42305
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
42306
+
42307
+
42308
+
42309
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
42310
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
42311
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
42312
+
42313
+ return {
42314
+ url: toPathString(localVarUrlObj),
42315
+ options: localVarRequestOptions,
42316
+ };
42317
+ },
42318
+ /**
42319
+ * Lists all members that have been granted direct access to the task_mcp_server.
42320
+ * @summary IAM - List Task Mcp Server Members
42321
+ * @param {string} taskMcpServerId
42322
+ * @param {string} orgId The org id
42323
+ * @param {string} projectId The project id
42324
+ * @param {TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum} [type]
42325
+ * @param {*} [options] Override http request option.
42326
+ * @throws {RequiredError}
42327
+ */
42328
+ taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers: async (taskMcpServerId: string, orgId: string, projectId: string, type?: TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
42329
+ // verify required parameter 'taskMcpServerId' is not null or undefined
42330
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers', 'taskMcpServerId', taskMcpServerId)
42331
+ // verify required parameter 'orgId' is not null or undefined
42332
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers', 'orgId', orgId)
42333
+ // verify required parameter 'projectId' is not null or undefined
42334
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers', 'projectId', projectId)
42335
+ const localVarPath = `/org/{org_id}/project/{project_id}/task_mcp_server/{task_mcp_server_id}/iam/members`
42336
+ .replace(`{${"task_mcp_server_id"}}`, encodeURIComponent(String(taskMcpServerId)))
42337
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
42338
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
42339
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
42340
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
42341
+ let baseOptions;
42342
+ if (configuration) {
42343
+ baseOptions = configuration.baseOptions;
42344
+ }
42345
+
42346
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...options};
42347
+ const localVarHeaderParameter = {} as any;
42348
+ const localVarQueryParameter = {} as any;
42349
+
42350
+ // authentication HTTPBearer required
42351
+ // http bearer authentication required
42352
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
42353
+
42354
+ if (type !== undefined) {
42355
+ localVarQueryParameter['type'] = type;
42356
+ }
42357
+
42358
+
42359
+
42360
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
42361
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
42362
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
42363
+
42364
+ return {
42365
+ url: toPathString(localVarUrlObj),
42366
+ options: localVarRequestOptions,
42367
+ };
42368
+ },
42369
+ /**
42370
+ * Test the permissions that the caller (or another subject) holds on the task_mcp_server.
42371
+ * @summary IAM - Test Task Mcp Server Permissions
42372
+ * @param {string} taskMcpServerId
42373
+ * @param {string} orgId The org id
42374
+ * @param {string} projectId The project id
42375
+ * @param {TaskMcpServerIAMPermissionTest} taskMcpServerIAMPermissionTest
42376
+ * @param {*} [options] Override http request option.
42377
+ * @throws {RequiredError}
42378
+ */
42379
+ taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions: async (taskMcpServerId: string, orgId: string, projectId: string, taskMcpServerIAMPermissionTest: TaskMcpServerIAMPermissionTest, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
42380
+ // verify required parameter 'taskMcpServerId' is not null or undefined
42381
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions', 'taskMcpServerId', taskMcpServerId)
42382
+ // verify required parameter 'orgId' is not null or undefined
42383
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions', 'orgId', orgId)
42384
+ // verify required parameter 'projectId' is not null or undefined
42385
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions', 'projectId', projectId)
42386
+ // verify required parameter 'taskMcpServerIAMPermissionTest' is not null or undefined
42387
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions', 'taskMcpServerIAMPermissionTest', taskMcpServerIAMPermissionTest)
42388
+ const localVarPath = `/org/{org_id}/project/{project_id}/task_mcp_server/{task_mcp_server_id}/iam/test`
42389
+ .replace(`{${"task_mcp_server_id"}}`, encodeURIComponent(String(taskMcpServerId)))
42390
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
42391
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
42392
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
42393
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
42394
+ let baseOptions;
42395
+ if (configuration) {
42396
+ baseOptions = configuration.baseOptions;
42397
+ }
42398
+
42399
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options};
42400
+ const localVarHeaderParameter = {} as any;
42401
+ const localVarQueryParameter = {} as any;
42402
+
42403
+ // authentication HTTPBearer required
42404
+ // http bearer authentication required
42405
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
42406
+
42407
+
42408
+
42409
+ localVarHeaderParameter['Content-Type'] = 'application/json';
42410
+
42411
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
42412
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
42413
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
42414
+ localVarRequestOptions.data = serializeDataIfNeeded(taskMcpServerIAMPermissionTest, localVarRequestOptions, configuration)
42415
+
42416
+ return {
42417
+ url: toPathString(localVarUrlObj),
42418
+ options: localVarRequestOptions,
42419
+ };
42420
+ },
42421
+ /**
42422
+ * Update the roles that a member holds on the task_mcp_server.
42423
+ * @summary IAM - Update Task Mcp Server Member
42424
+ * @param {string} taskMcpServerId
42425
+ * @param {string} member
42426
+ * @param {string} orgId The org id
42427
+ * @param {string} projectId The project id
42428
+ * @param {TaskMcpServerIAMMemberRoleUpdate} taskMcpServerIAMMemberRoleUpdate
42429
+ * @param {*} [options] Override http request option.
42430
+ * @throws {RequiredError}
42431
+ */
42432
+ taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles: async (taskMcpServerId: string, member: string, orgId: string, projectId: string, taskMcpServerIAMMemberRoleUpdate: TaskMcpServerIAMMemberRoleUpdate, options: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
42433
+ // verify required parameter 'taskMcpServerId' is not null or undefined
42434
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles', 'taskMcpServerId', taskMcpServerId)
42435
+ // verify required parameter 'member' is not null or undefined
42436
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles', 'member', member)
42437
+ // verify required parameter 'orgId' is not null or undefined
42438
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles', 'orgId', orgId)
42439
+ // verify required parameter 'projectId' is not null or undefined
42440
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles', 'projectId', projectId)
42441
+ // verify required parameter 'taskMcpServerIAMMemberRoleUpdate' is not null or undefined
42442
+ assertParamExists('taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles', 'taskMcpServerIAMMemberRoleUpdate', taskMcpServerIAMMemberRoleUpdate)
42443
+ const localVarPath = `/org/{org_id}/project/{project_id}/task_mcp_server/{task_mcp_server_id}/iam/members/{member}`
42444
+ .replace(`{${"task_mcp_server_id"}}`, encodeURIComponent(String(taskMcpServerId)))
42445
+ .replace(`{${"member"}}`, encodeURIComponent(String(member)))
42446
+ .replace(`{${"org_id"}}`, encodeURIComponent(String(orgId)))
42447
+ .replace(`{${"project_id"}}`, encodeURIComponent(String(projectId)));
42448
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
42449
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
42450
+ let baseOptions;
42451
+ if (configuration) {
42452
+ baseOptions = configuration.baseOptions;
42453
+ }
42454
+
42455
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...options};
42456
+ const localVarHeaderParameter = {} as any;
42457
+ const localVarQueryParameter = {} as any;
42458
+
42459
+ // authentication HTTPBearer required
42460
+ // http bearer authentication required
42461
+ await setBearerAuthToObject(localVarHeaderParameter, configuration)
42462
+
42463
+
42464
+
42465
+ localVarHeaderParameter['Content-Type'] = 'application/json';
42466
+
42467
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
42468
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
42469
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...options.headers};
42470
+ localVarRequestOptions.data = serializeDataIfNeeded(taskMcpServerIAMMemberRoleUpdate, localVarRequestOptions, configuration)
42471
+
42472
+ return {
42473
+ url: toPathString(localVarUrlObj),
42474
+ options: localVarRequestOptions,
42475
+ };
42476
+ },
41514
42477
  /**
41515
42478
  *
41516
42479
  * @summary Update Task Mcp Server
@@ -41739,6 +42702,71 @@ export const TaskMCPServersApiFp = function(configuration?: Configuration) {
41739
42702
  const localVarOperationServerBasePath = operationServerMap['TaskMCPServersApi.refreshTaskMcpServer']?.[localVarOperationServerIndex]?.url;
41740
42703
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
41741
42704
  },
42705
+ /**
42706
+ * Retrieve a specific member that has been granted direct access to the task_mcp_server.
42707
+ * @summary IAM - Lookup Task Mcp Server Member
42708
+ * @param {string} taskMcpServerId
42709
+ * @param {string} member
42710
+ * @param {string} orgId The org id
42711
+ * @param {string} projectId The project id
42712
+ * @param {*} [options] Override http request option.
42713
+ * @throws {RequiredError}
42714
+ */
42715
+ async taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember(taskMcpServerId: string, member: string, orgId: string, projectId: string, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMMember>> {
42716
+ const localVarAxiosArgs = await localVarAxiosParamCreator.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember(taskMcpServerId, member, orgId, projectId, options);
42717
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
42718
+ const localVarOperationServerBasePath = operationServerMap['TaskMCPServersApi.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember']?.[localVarOperationServerIndex]?.url;
42719
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
42720
+ },
42721
+ /**
42722
+ * Lists all members that have been granted direct access to the task_mcp_server.
42723
+ * @summary IAM - List Task Mcp Server Members
42724
+ * @param {string} taskMcpServerId
42725
+ * @param {string} orgId The org id
42726
+ * @param {string} projectId The project id
42727
+ * @param {TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum} [type]
42728
+ * @param {*} [options] Override http request option.
42729
+ * @throws {RequiredError}
42730
+ */
42731
+ async taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers(taskMcpServerId: string, orgId: string, projectId: string, type?: TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<PaginatedResultSetIAMMember>> {
42732
+ const localVarAxiosArgs = await localVarAxiosParamCreator.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers(taskMcpServerId, orgId, projectId, type, options);
42733
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
42734
+ const localVarOperationServerBasePath = operationServerMap['TaskMCPServersApi.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers']?.[localVarOperationServerIndex]?.url;
42735
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
42736
+ },
42737
+ /**
42738
+ * Test the permissions that the caller (or another subject) holds on the task_mcp_server.
42739
+ * @summary IAM - Test Task Mcp Server Permissions
42740
+ * @param {string} taskMcpServerId
42741
+ * @param {string} orgId The org id
42742
+ * @param {string} projectId The project id
42743
+ * @param {TaskMcpServerIAMPermissionTest} taskMcpServerIAMPermissionTest
42744
+ * @param {*} [options] Override http request option.
42745
+ * @throws {RequiredError}
42746
+ */
42747
+ async taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions(taskMcpServerId: string, orgId: string, projectId: string, taskMcpServerIAMPermissionTest: TaskMcpServerIAMPermissionTest, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMPermissionTest>> {
42748
+ const localVarAxiosArgs = await localVarAxiosParamCreator.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions(taskMcpServerId, orgId, projectId, taskMcpServerIAMPermissionTest, options);
42749
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
42750
+ const localVarOperationServerBasePath = operationServerMap['TaskMCPServersApi.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions']?.[localVarOperationServerIndex]?.url;
42751
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
42752
+ },
42753
+ /**
42754
+ * Update the roles that a member holds on the task_mcp_server.
42755
+ * @summary IAM - Update Task Mcp Server Member
42756
+ * @param {string} taskMcpServerId
42757
+ * @param {string} member
42758
+ * @param {string} orgId The org id
42759
+ * @param {string} projectId The project id
42760
+ * @param {TaskMcpServerIAMMemberRoleUpdate} taskMcpServerIAMMemberRoleUpdate
42761
+ * @param {*} [options] Override http request option.
42762
+ * @throws {RequiredError}
42763
+ */
42764
+ async taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles(taskMcpServerId: string, member: string, orgId: string, projectId: string, taskMcpServerIAMMemberRoleUpdate: TaskMcpServerIAMMemberRoleUpdate, options?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IAMMember>> {
42765
+ const localVarAxiosArgs = await localVarAxiosParamCreator.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles(taskMcpServerId, member, orgId, projectId, taskMcpServerIAMMemberRoleUpdate, options);
42766
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
42767
+ const localVarOperationServerBasePath = operationServerMap['TaskMCPServersApi.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles']?.[localVarOperationServerIndex]?.url;
42768
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
42769
+ },
41742
42770
  /**
41743
42771
  *
41744
42772
  * @summary Update Task Mcp Server
@@ -41898,6 +42926,59 @@ export const TaskMCPServersApiFactory = function (configuration?: Configuration,
41898
42926
  refreshTaskMcpServer(taskMcpServerId: string, orgId: string, projectId: string, options?: any): AxiosPromise<TaskMcpServer> {
41899
42927
  return localVarFp.refreshTaskMcpServer(taskMcpServerId, orgId, projectId, options).then((request) => request(axios, basePath));
41900
42928
  },
42929
+ /**
42930
+ * Retrieve a specific member that has been granted direct access to the task_mcp_server.
42931
+ * @summary IAM - Lookup Task Mcp Server Member
42932
+ * @param {string} taskMcpServerId
42933
+ * @param {string} member
42934
+ * @param {string} orgId The org id
42935
+ * @param {string} projectId The project id
42936
+ * @param {*} [options] Override http request option.
42937
+ * @throws {RequiredError}
42938
+ */
42939
+ taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember(taskMcpServerId: string, member: string, orgId: string, projectId: string, options?: any): AxiosPromise<IAMMember> {
42940
+ return localVarFp.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember(taskMcpServerId, member, orgId, projectId, options).then((request) => request(axios, basePath));
42941
+ },
42942
+ /**
42943
+ * Lists all members that have been granted direct access to the task_mcp_server.
42944
+ * @summary IAM - List Task Mcp Server Members
42945
+ * @param {string} taskMcpServerId
42946
+ * @param {string} orgId The org id
42947
+ * @param {string} projectId The project id
42948
+ * @param {TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum} [type]
42949
+ * @param {*} [options] Override http request option.
42950
+ * @throws {RequiredError}
42951
+ */
42952
+ taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers(taskMcpServerId: string, orgId: string, projectId: string, type?: TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum, options?: any): AxiosPromise<PaginatedResultSetIAMMember> {
42953
+ return localVarFp.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers(taskMcpServerId, orgId, projectId, type, options).then((request) => request(axios, basePath));
42954
+ },
42955
+ /**
42956
+ * Test the permissions that the caller (or another subject) holds on the task_mcp_server.
42957
+ * @summary IAM - Test Task Mcp Server Permissions
42958
+ * @param {string} taskMcpServerId
42959
+ * @param {string} orgId The org id
42960
+ * @param {string} projectId The project id
42961
+ * @param {TaskMcpServerIAMPermissionTest} taskMcpServerIAMPermissionTest
42962
+ * @param {*} [options] Override http request option.
42963
+ * @throws {RequiredError}
42964
+ */
42965
+ taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions(taskMcpServerId: string, orgId: string, projectId: string, taskMcpServerIAMPermissionTest: TaskMcpServerIAMPermissionTest, options?: any): AxiosPromise<IAMPermissionTest> {
42966
+ return localVarFp.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions(taskMcpServerId, orgId, projectId, taskMcpServerIAMPermissionTest, options).then((request) => request(axios, basePath));
42967
+ },
42968
+ /**
42969
+ * Update the roles that a member holds on the task_mcp_server.
42970
+ * @summary IAM - Update Task Mcp Server Member
42971
+ * @param {string} taskMcpServerId
42972
+ * @param {string} member
42973
+ * @param {string} orgId The org id
42974
+ * @param {string} projectId The project id
42975
+ * @param {TaskMcpServerIAMMemberRoleUpdate} taskMcpServerIAMMemberRoleUpdate
42976
+ * @param {*} [options] Override http request option.
42977
+ * @throws {RequiredError}
42978
+ */
42979
+ taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles(taskMcpServerId: string, member: string, orgId: string, projectId: string, taskMcpServerIAMMemberRoleUpdate: TaskMcpServerIAMMemberRoleUpdate, options?: any): AxiosPromise<IAMMember> {
42980
+ return localVarFp.taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles(taskMcpServerId, member, orgId, projectId, taskMcpServerIAMMemberRoleUpdate, options).then((request) => request(axios, basePath));
42981
+ },
41901
42982
  /**
41902
42983
  *
41903
42984
  * @summary Update Task Mcp Server
@@ -42076,6 +43157,67 @@ export class TaskMCPServersApi extends BaseAPI {
42076
43157
  return TaskMCPServersApiFp(this.configuration).refreshTaskMcpServer(taskMcpServerId, orgId, projectId, options).then((request) => request(this.axios, this.basePath));
42077
43158
  }
42078
43159
 
43160
+ /**
43161
+ * Retrieve a specific member that has been granted direct access to the task_mcp_server.
43162
+ * @summary IAM - Lookup Task Mcp Server Member
43163
+ * @param {string} taskMcpServerId
43164
+ * @param {string} member
43165
+ * @param {string} orgId The org id
43166
+ * @param {string} projectId The project id
43167
+ * @param {*} [options] Override http request option.
43168
+ * @throws {RequiredError}
43169
+ * @memberof TaskMCPServersApi
43170
+ */
43171
+ public taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember(taskMcpServerId: string, member: string, orgId: string, projectId: string, options?: RawAxiosRequestConfig) {
43172
+ return TaskMCPServersApiFp(this.configuration).taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamGetMember(taskMcpServerId, member, orgId, projectId, options).then((request) => request(this.axios, this.basePath));
43173
+ }
43174
+
43175
+ /**
43176
+ * Lists all members that have been granted direct access to the task_mcp_server.
43177
+ * @summary IAM - List Task Mcp Server Members
43178
+ * @param {string} taskMcpServerId
43179
+ * @param {string} orgId The org id
43180
+ * @param {string} projectId The project id
43181
+ * @param {TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum} [type]
43182
+ * @param {*} [options] Override http request option.
43183
+ * @throws {RequiredError}
43184
+ * @memberof TaskMCPServersApi
43185
+ */
43186
+ public taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers(taskMcpServerId: string, orgId: string, projectId: string, type?: TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum, options?: RawAxiosRequestConfig) {
43187
+ return TaskMCPServersApiFp(this.configuration).taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembers(taskMcpServerId, orgId, projectId, type, options).then((request) => request(this.axios, this.basePath));
43188
+ }
43189
+
43190
+ /**
43191
+ * Test the permissions that the caller (or another subject) holds on the task_mcp_server.
43192
+ * @summary IAM - Test Task Mcp Server Permissions
43193
+ * @param {string} taskMcpServerId
43194
+ * @param {string} orgId The org id
43195
+ * @param {string} projectId The project id
43196
+ * @param {TaskMcpServerIAMPermissionTest} taskMcpServerIAMPermissionTest
43197
+ * @param {*} [options] Override http request option.
43198
+ * @throws {RequiredError}
43199
+ * @memberof TaskMCPServersApi
43200
+ */
43201
+ public taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions(taskMcpServerId: string, orgId: string, projectId: string, taskMcpServerIAMPermissionTest: TaskMcpServerIAMPermissionTest, options?: RawAxiosRequestConfig) {
43202
+ return TaskMCPServersApiFp(this.configuration).taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamTestPermissions(taskMcpServerId, orgId, projectId, taskMcpServerIAMPermissionTest, options).then((request) => request(this.axios, this.basePath));
43203
+ }
43204
+
43205
+ /**
43206
+ * Update the roles that a member holds on the task_mcp_server.
43207
+ * @summary IAM - Update Task Mcp Server Member
43208
+ * @param {string} taskMcpServerId
43209
+ * @param {string} member
43210
+ * @param {string} orgId The org id
43211
+ * @param {string} projectId The project id
43212
+ * @param {TaskMcpServerIAMMemberRoleUpdate} taskMcpServerIAMMemberRoleUpdate
43213
+ * @param {*} [options] Override http request option.
43214
+ * @throws {RequiredError}
43215
+ * @memberof TaskMCPServersApi
43216
+ */
43217
+ public taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles(taskMcpServerId: string, member: string, orgId: string, projectId: string, taskMcpServerIAMMemberRoleUpdate: TaskMcpServerIAMMemberRoleUpdate, options?: RawAxiosRequestConfig) {
43218
+ return TaskMCPServersApiFp(this.configuration).taskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamUpdateMemberRoles(taskMcpServerId, member, orgId, projectId, taskMcpServerIAMMemberRoleUpdate, options).then((request) => request(this.axios, this.basePath));
43219
+ }
43220
+
42079
43221
  /**
42080
43222
  *
42081
43223
  * @summary Update Task Mcp Server
@@ -42092,6 +43234,15 @@ export class TaskMCPServersApi extends BaseAPI {
42092
43234
  }
42093
43235
  }
42094
43236
 
43237
+ /**
43238
+ * @export
43239
+ */
43240
+ export const TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum = {
43241
+ User: 'user',
43242
+ Organization: 'organization',
43243
+ Project: 'project'
43244
+ } as const;
43245
+ export type TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum = typeof TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum[keyof typeof TaskMcpServerIamOrgOrgIdProjectProjectIdTaskMcpServerTaskMcpServerIdIamListMembersTypeEnum];
42095
43246
 
42096
43247
 
42097
43248
  /**