@smithery/api 0.13.0 → 0.15.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +30 -0
- package/client.d.mts +3 -0
- package/client.d.mts.map +1 -1
- package/client.d.ts +3 -0
- package/client.d.ts.map +1 -1
- package/client.js +3 -0
- package/client.js.map +1 -1
- package/client.mjs +3 -0
- package/client.mjs.map +1 -1
- package/package.json +1 -1
- package/resources/index.d.mts +1 -0
- package/resources/index.d.mts.map +1 -1
- package/resources/index.d.ts +1 -0
- package/resources/index.d.ts.map +1 -1
- package/resources/index.js +3 -1
- package/resources/index.js.map +1 -1
- package/resources/index.mjs +1 -0
- package/resources/index.mjs.map +1 -1
- package/resources/servers/deployments.d.mts +3 -0
- package/resources/servers/deployments.d.mts.map +1 -1
- package/resources/servers/deployments.d.ts +3 -0
- package/resources/servers/deployments.d.ts.map +1 -1
- package/resources/servers/secrets.d.mts +3 -4
- package/resources/servers/secrets.d.mts.map +1 -1
- package/resources/servers/secrets.d.ts +3 -4
- package/resources/servers/secrets.d.ts.map +1 -1
- package/resources/servers/secrets.js +3 -4
- package/resources/servers/secrets.js.map +1 -1
- package/resources/servers/secrets.mjs +3 -4
- package/resources/servers/secrets.mjs.map +1 -1
- package/resources/tokens.d.mts +117 -0
- package/resources/tokens.d.mts.map +1 -0
- package/resources/tokens.d.ts +117 -0
- package/resources/tokens.d.ts.map +1 -0
- package/resources/tokens.js +27 -0
- package/resources/tokens.js.map +1 -0
- package/resources/tokens.mjs +23 -0
- package/resources/tokens.mjs.map +1 -0
- package/src/client.ts +10 -0
- package/src/resources/index.ts +1 -0
- package/src/resources/servers/deployments.ts +2 -0
- package/src/resources/servers/secrets.ts +3 -4
- package/src/resources/tokens.ts +138 -0
- package/src/version.ts +1 -1
- package/version.d.mts +1 -1
- package/version.d.ts +1 -1
- package/version.js +1 -1
- package/version.mjs +1 -1
|
@@ -6,21 +6,20 @@ const resource_1 = require("../../core/resource.js");
|
|
|
6
6
|
const path_1 = require("../../internal/utils/path.js");
|
|
7
7
|
class Secrets extends resource_1.APIResource {
|
|
8
8
|
/**
|
|
9
|
-
* Fetch secret names for the server
|
|
10
|
-
* are not returned.
|
|
9
|
+
* Fetch secret names for the server. Values are not returned.
|
|
11
10
|
*/
|
|
12
11
|
list(qualifiedName, options) {
|
|
13
12
|
return this._client.get((0, path_1.path) `/servers/${qualifiedName}/secrets`, options);
|
|
14
13
|
}
|
|
15
14
|
/**
|
|
16
|
-
* Delete a secret by name from the server
|
|
15
|
+
* Delete a secret by name from the server.
|
|
17
16
|
*/
|
|
18
17
|
delete(secretName, params, options) {
|
|
19
18
|
const { qualifiedName } = params;
|
|
20
19
|
return this._client.delete((0, path_1.path) `/servers/${qualifiedName}/secrets/${secretName}`, options);
|
|
21
20
|
}
|
|
22
21
|
/**
|
|
23
|
-
* Set a secret value for the server
|
|
22
|
+
* Set a secret value for the server.
|
|
24
23
|
*/
|
|
25
24
|
set(qualifiedName, body, options) {
|
|
26
25
|
return this._client.put((0, path_1.path) `/servers/${qualifiedName}/secrets`, { body, ...options });
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secrets.js","sourceRoot":"","sources":["../../src/resources/servers/secrets.ts"],"names":[],"mappings":";AAAA,sFAAsF;;;AAEtF,qDAAkD;AAGlD,uDAAiD;AAEjD,MAAa,OAAQ,SAAQ,sBAAW;IACtC
|
|
1
|
+
{"version":3,"file":"secrets.js","sourceRoot":"","sources":["../../src/resources/servers/secrets.ts"],"names":[],"mappings":";AAAA,sFAAsF;;;AAEtF,qDAAkD;AAGlD,uDAAiD;AAEjD,MAAa,OAAQ,SAAQ,sBAAW;IACtC;;OAEG;IACH,IAAI,CAAC,aAAqB,EAAE,OAAwB;QAClD,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAA,WAAI,EAAA,YAAY,aAAa,UAAU,EAAE,OAAO,CAAC,CAAC;IAC5E,CAAC;IAED;;OAEG;IACH,MAAM,CACJ,UAAkB,EAClB,MAA0B,EAC1B,OAAwB;QAExB,MAAM,EAAE,aAAa,EAAE,GAAG,MAAM,CAAC;QACjC,OAAO,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,IAAA,WAAI,EAAA,YAAY,aAAa,YAAY,UAAU,EAAE,EAAE,OAAO,CAAC,CAAC;IAC7F,CAAC;IAED;;OAEG;IACH,GAAG,CAAC,aAAqB,EAAE,IAAqB,EAAE,OAAwB;QACxE,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAA,WAAI,EAAA,YAAY,aAAa,UAAU,EAAE,EAAE,IAAI,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;IACzF,CAAC;CACF;AA1BD,0BA0BC"}
|
|
@@ -3,21 +3,20 @@ import { APIResource } from "../../core/resource.mjs";
|
|
|
3
3
|
import { path } from "../../internal/utils/path.mjs";
|
|
4
4
|
export class Secrets extends APIResource {
|
|
5
5
|
/**
|
|
6
|
-
* Fetch secret names for the server
|
|
7
|
-
* are not returned.
|
|
6
|
+
* Fetch secret names for the server. Values are not returned.
|
|
8
7
|
*/
|
|
9
8
|
list(qualifiedName, options) {
|
|
10
9
|
return this._client.get(path `/servers/${qualifiedName}/secrets`, options);
|
|
11
10
|
}
|
|
12
11
|
/**
|
|
13
|
-
* Delete a secret by name from the server
|
|
12
|
+
* Delete a secret by name from the server.
|
|
14
13
|
*/
|
|
15
14
|
delete(secretName, params, options) {
|
|
16
15
|
const { qualifiedName } = params;
|
|
17
16
|
return this._client.delete(path `/servers/${qualifiedName}/secrets/${secretName}`, options);
|
|
18
17
|
}
|
|
19
18
|
/**
|
|
20
|
-
* Set a secret value for the server
|
|
19
|
+
* Set a secret value for the server.
|
|
21
20
|
*/
|
|
22
21
|
set(qualifiedName, body, options) {
|
|
23
22
|
return this._client.put(path `/servers/${qualifiedName}/secrets`, { body, ...options });
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"secrets.mjs","sourceRoot":"","sources":["../../src/resources/servers/secrets.ts"],"names":[],"mappings":"AAAA,sFAAsF;OAE/E,EAAE,WAAW,EAAE;OAGf,EAAE,IAAI,EAAE;AAEf,MAAM,OAAO,OAAQ,SAAQ,WAAW;IACtC
|
|
1
|
+
{"version":3,"file":"secrets.mjs","sourceRoot":"","sources":["../../src/resources/servers/secrets.ts"],"names":[],"mappings":"AAAA,sFAAsF;OAE/E,EAAE,WAAW,EAAE;OAGf,EAAE,IAAI,EAAE;AAEf,MAAM,OAAO,OAAQ,SAAQ,WAAW;IACtC;;OAEG;IACH,IAAI,CAAC,aAAqB,EAAE,OAAwB;QAClD,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAA,YAAY,aAAa,UAAU,EAAE,OAAO,CAAC,CAAC;IAC5E,CAAC;IAED;;OAEG;IACH,MAAM,CACJ,UAAkB,EAClB,MAA0B,EAC1B,OAAwB;QAExB,MAAM,EAAE,aAAa,EAAE,GAAG,MAAM,CAAC;QACjC,OAAO,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAA,YAAY,aAAa,YAAY,UAAU,EAAE,EAAE,OAAO,CAAC,CAAC;IAC7F,CAAC;IAED;;OAEG;IACH,GAAG,CAAC,aAAqB,EAAE,IAAqB,EAAE,OAAwB;QACxE,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAA,YAAY,aAAa,UAAU,EAAE,EAAE,IAAI,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;IACzF,CAAC;CACF"}
|
|
@@ -0,0 +1,117 @@
|
|
|
1
|
+
import { APIResource } from "../core/resource.mjs";
|
|
2
|
+
import { APIPromise } from "../core/api-promise.mjs";
|
|
3
|
+
import { RequestOptions } from "../internal/request-options.mjs";
|
|
4
|
+
export declare class Tokens extends APIResource {
|
|
5
|
+
/**
|
|
6
|
+
* Create a service token for machine-to-machine authentication. Requires API key
|
|
7
|
+
* authentication.
|
|
8
|
+
*
|
|
9
|
+
* @example
|
|
10
|
+
* ```ts
|
|
11
|
+
* const createTokenResponse = await client.tokens.create({
|
|
12
|
+
* permissions: {
|
|
13
|
+
* connections: { can: ['read', 'write'] },
|
|
14
|
+
* 'connections.rpc': { can: ['write'] },
|
|
15
|
+
* },
|
|
16
|
+
* ttlSeconds: 3600,
|
|
17
|
+
* });
|
|
18
|
+
* ```
|
|
19
|
+
*/
|
|
20
|
+
create(body: TokenCreateParams, options?: RequestOptions): APIPromise<CreateTokenResponse>;
|
|
21
|
+
}
|
|
22
|
+
export interface CreateTokenRequest {
|
|
23
|
+
/**
|
|
24
|
+
* Permissions to grant. Format: { [subject]: { can: [actions] } }
|
|
25
|
+
*/
|
|
26
|
+
permissions: {
|
|
27
|
+
[key: string]: CreateTokenRequest.Permissions;
|
|
28
|
+
};
|
|
29
|
+
/**
|
|
30
|
+
* Token TTL in seconds. Required. Max 86400 (24 hours).
|
|
31
|
+
*/
|
|
32
|
+
ttlSeconds: number;
|
|
33
|
+
/**
|
|
34
|
+
* Optional constraints to limit token access.
|
|
35
|
+
*/
|
|
36
|
+
constraints?: CreateTokenRequest.Constraints;
|
|
37
|
+
/**
|
|
38
|
+
* Profile to scope the token to. If not provided, uses the default profile.
|
|
39
|
+
*/
|
|
40
|
+
profileSlug?: string;
|
|
41
|
+
}
|
|
42
|
+
export declare namespace CreateTokenRequest {
|
|
43
|
+
interface Permissions {
|
|
44
|
+
/**
|
|
45
|
+
* Actions granted on this subject.
|
|
46
|
+
*/
|
|
47
|
+
can: Array<'read' | 'write'>;
|
|
48
|
+
}
|
|
49
|
+
/**
|
|
50
|
+
* Optional constraints to limit token access.
|
|
51
|
+
*/
|
|
52
|
+
interface Constraints {
|
|
53
|
+
/**
|
|
54
|
+
* Limit access to specific namespace IDs.
|
|
55
|
+
*/
|
|
56
|
+
namespaceIds?: Array<string>;
|
|
57
|
+
/**
|
|
58
|
+
* Limit access to specific server qualified names.
|
|
59
|
+
*/
|
|
60
|
+
serverQualifiedNames?: Array<string>;
|
|
61
|
+
}
|
|
62
|
+
}
|
|
63
|
+
export interface CreateTokenResponse {
|
|
64
|
+
/**
|
|
65
|
+
* The signed service token (PASETO v4).
|
|
66
|
+
*/
|
|
67
|
+
token: string;
|
|
68
|
+
/**
|
|
69
|
+
* ISO 8601 timestamp when the token expires.
|
|
70
|
+
*/
|
|
71
|
+
expiresAt: string;
|
|
72
|
+
}
|
|
73
|
+
export interface TokenCreateParams {
|
|
74
|
+
/**
|
|
75
|
+
* Permissions to grant. Format: { [subject]: { can: [actions] } }
|
|
76
|
+
*/
|
|
77
|
+
permissions: {
|
|
78
|
+
[key: string]: TokenCreateParams.Permissions;
|
|
79
|
+
};
|
|
80
|
+
/**
|
|
81
|
+
* Token TTL in seconds. Required. Max 86400 (24 hours).
|
|
82
|
+
*/
|
|
83
|
+
ttlSeconds: number;
|
|
84
|
+
/**
|
|
85
|
+
* Optional constraints to limit token access.
|
|
86
|
+
*/
|
|
87
|
+
constraints?: TokenCreateParams.Constraints;
|
|
88
|
+
/**
|
|
89
|
+
* Profile to scope the token to. If not provided, uses the default profile.
|
|
90
|
+
*/
|
|
91
|
+
profileSlug?: string;
|
|
92
|
+
}
|
|
93
|
+
export declare namespace TokenCreateParams {
|
|
94
|
+
interface Permissions {
|
|
95
|
+
/**
|
|
96
|
+
* Actions granted on this subject.
|
|
97
|
+
*/
|
|
98
|
+
can: Array<'read' | 'write'>;
|
|
99
|
+
}
|
|
100
|
+
/**
|
|
101
|
+
* Optional constraints to limit token access.
|
|
102
|
+
*/
|
|
103
|
+
interface Constraints {
|
|
104
|
+
/**
|
|
105
|
+
* Limit access to specific namespace IDs.
|
|
106
|
+
*/
|
|
107
|
+
namespaceIds?: Array<string>;
|
|
108
|
+
/**
|
|
109
|
+
* Limit access to specific server qualified names.
|
|
110
|
+
*/
|
|
111
|
+
serverQualifiedNames?: Array<string>;
|
|
112
|
+
}
|
|
113
|
+
}
|
|
114
|
+
export declare namespace Tokens {
|
|
115
|
+
export { type CreateTokenRequest as CreateTokenRequest, type CreateTokenResponse as CreateTokenResponse, type TokenCreateParams as TokenCreateParams, };
|
|
116
|
+
}
|
|
117
|
+
//# sourceMappingURL=tokens.d.mts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"tokens.d.mts","sourceRoot":"","sources":["../src/resources/tokens.ts"],"names":[],"mappings":"OAEO,EAAE,WAAW,EAAE;OACf,EAAE,UAAU,EAAE;OACd,EAAE,cAAc,EAAE;AAEzB,qBAAa,MAAO,SAAQ,WAAW;IACrC;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,IAAI,EAAE,iBAAiB,EAAE,OAAO,CAAC,EAAE,cAAc,GAAG,UAAU,CAAC,mBAAmB,CAAC;CAG3F;AAED,MAAM,WAAW,kBAAkB;IACjC;;OAEG;IACH,WAAW,EAAE;QAAE,CAAC,GAAG,EAAE,MAAM,GAAG,kBAAkB,CAAC,WAAW,CAAA;KAAE,CAAC;IAE/D;;OAEG;IACH,UAAU,EAAE,MAAM,CAAC;IAEnB;;OAEG;IACH,WAAW,CAAC,EAAE,kBAAkB,CAAC,WAAW,CAAC;IAE7C;;OAEG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,yBAAiB,kBAAkB,CAAC;IAClC,UAAiB,WAAW;QAC1B;;WAEG;QACH,GAAG,EAAE,KAAK,CAAC,MAAM,GAAG,OAAO,CAAC,CAAC;KAC9B;IAED;;OAEG;IACH,UAAiB,WAAW;QAC1B;;WAEG;QACH,YAAY,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;QAE7B;;WAEG;QACH,oBAAoB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;KACtC;CACF;AAED,MAAM,WAAW,mBAAmB;IAClC;;OAEG;IACH,KAAK,EAAE,MAAM,CAAC;IAEd;;OAEG;IACH,SAAS,EAAE,MAAM,CAAC;CACnB;AAED,MAAM,WAAW,iBAAiB;IAChC;;OAEG;IACH,WAAW,EAAE;QAAE,CAAC,GAAG,EAAE,MAAM,GAAG,iBAAiB,CAAC,WAAW,CAAA;KAAE,CAAC;IAE9D;;OAEG;IACH,UAAU,EAAE,MAAM,CAAC;IAEnB;;OAEG;IACH,WAAW,CAAC,EAAE,iBAAiB,CAAC,WAAW,CAAC;IAE5C;;OAEG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,yBAAiB,iBAAiB,CAAC;IACjC,UAAiB,WAAW;QAC1B;;WAEG;QACH,GAAG,EAAE,KAAK,CAAC,MAAM,GAAG,OAAO,CAAC,CAAC;KAC9B;IAED;;OAEG;IACH,UAAiB,WAAW;QAC1B;;WAEG;QACH,YAAY,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;QAE7B;;WAEG;QACH,oBAAoB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;KACtC;CACF;AAED,MAAM,CAAC,OAAO,WAAW,MAAM,CAAC;IAC9B,OAAO,EACL,KAAK,kBAAkB,IAAI,kBAAkB,EAC7C,KAAK,mBAAmB,IAAI,mBAAmB,EAC/C,KAAK,iBAAiB,IAAI,iBAAiB,GAC5C,CAAC;CACH"}
|
|
@@ -0,0 +1,117 @@
|
|
|
1
|
+
import { APIResource } from "../core/resource.js";
|
|
2
|
+
import { APIPromise } from "../core/api-promise.js";
|
|
3
|
+
import { RequestOptions } from "../internal/request-options.js";
|
|
4
|
+
export declare class Tokens extends APIResource {
|
|
5
|
+
/**
|
|
6
|
+
* Create a service token for machine-to-machine authentication. Requires API key
|
|
7
|
+
* authentication.
|
|
8
|
+
*
|
|
9
|
+
* @example
|
|
10
|
+
* ```ts
|
|
11
|
+
* const createTokenResponse = await client.tokens.create({
|
|
12
|
+
* permissions: {
|
|
13
|
+
* connections: { can: ['read', 'write'] },
|
|
14
|
+
* 'connections.rpc': { can: ['write'] },
|
|
15
|
+
* },
|
|
16
|
+
* ttlSeconds: 3600,
|
|
17
|
+
* });
|
|
18
|
+
* ```
|
|
19
|
+
*/
|
|
20
|
+
create(body: TokenCreateParams, options?: RequestOptions): APIPromise<CreateTokenResponse>;
|
|
21
|
+
}
|
|
22
|
+
export interface CreateTokenRequest {
|
|
23
|
+
/**
|
|
24
|
+
* Permissions to grant. Format: { [subject]: { can: [actions] } }
|
|
25
|
+
*/
|
|
26
|
+
permissions: {
|
|
27
|
+
[key: string]: CreateTokenRequest.Permissions;
|
|
28
|
+
};
|
|
29
|
+
/**
|
|
30
|
+
* Token TTL in seconds. Required. Max 86400 (24 hours).
|
|
31
|
+
*/
|
|
32
|
+
ttlSeconds: number;
|
|
33
|
+
/**
|
|
34
|
+
* Optional constraints to limit token access.
|
|
35
|
+
*/
|
|
36
|
+
constraints?: CreateTokenRequest.Constraints;
|
|
37
|
+
/**
|
|
38
|
+
* Profile to scope the token to. If not provided, uses the default profile.
|
|
39
|
+
*/
|
|
40
|
+
profileSlug?: string;
|
|
41
|
+
}
|
|
42
|
+
export declare namespace CreateTokenRequest {
|
|
43
|
+
interface Permissions {
|
|
44
|
+
/**
|
|
45
|
+
* Actions granted on this subject.
|
|
46
|
+
*/
|
|
47
|
+
can: Array<'read' | 'write'>;
|
|
48
|
+
}
|
|
49
|
+
/**
|
|
50
|
+
* Optional constraints to limit token access.
|
|
51
|
+
*/
|
|
52
|
+
interface Constraints {
|
|
53
|
+
/**
|
|
54
|
+
* Limit access to specific namespace IDs.
|
|
55
|
+
*/
|
|
56
|
+
namespaceIds?: Array<string>;
|
|
57
|
+
/**
|
|
58
|
+
* Limit access to specific server qualified names.
|
|
59
|
+
*/
|
|
60
|
+
serverQualifiedNames?: Array<string>;
|
|
61
|
+
}
|
|
62
|
+
}
|
|
63
|
+
export interface CreateTokenResponse {
|
|
64
|
+
/**
|
|
65
|
+
* The signed service token (PASETO v4).
|
|
66
|
+
*/
|
|
67
|
+
token: string;
|
|
68
|
+
/**
|
|
69
|
+
* ISO 8601 timestamp when the token expires.
|
|
70
|
+
*/
|
|
71
|
+
expiresAt: string;
|
|
72
|
+
}
|
|
73
|
+
export interface TokenCreateParams {
|
|
74
|
+
/**
|
|
75
|
+
* Permissions to grant. Format: { [subject]: { can: [actions] } }
|
|
76
|
+
*/
|
|
77
|
+
permissions: {
|
|
78
|
+
[key: string]: TokenCreateParams.Permissions;
|
|
79
|
+
};
|
|
80
|
+
/**
|
|
81
|
+
* Token TTL in seconds. Required. Max 86400 (24 hours).
|
|
82
|
+
*/
|
|
83
|
+
ttlSeconds: number;
|
|
84
|
+
/**
|
|
85
|
+
* Optional constraints to limit token access.
|
|
86
|
+
*/
|
|
87
|
+
constraints?: TokenCreateParams.Constraints;
|
|
88
|
+
/**
|
|
89
|
+
* Profile to scope the token to. If not provided, uses the default profile.
|
|
90
|
+
*/
|
|
91
|
+
profileSlug?: string;
|
|
92
|
+
}
|
|
93
|
+
export declare namespace TokenCreateParams {
|
|
94
|
+
interface Permissions {
|
|
95
|
+
/**
|
|
96
|
+
* Actions granted on this subject.
|
|
97
|
+
*/
|
|
98
|
+
can: Array<'read' | 'write'>;
|
|
99
|
+
}
|
|
100
|
+
/**
|
|
101
|
+
* Optional constraints to limit token access.
|
|
102
|
+
*/
|
|
103
|
+
interface Constraints {
|
|
104
|
+
/**
|
|
105
|
+
* Limit access to specific namespace IDs.
|
|
106
|
+
*/
|
|
107
|
+
namespaceIds?: Array<string>;
|
|
108
|
+
/**
|
|
109
|
+
* Limit access to specific server qualified names.
|
|
110
|
+
*/
|
|
111
|
+
serverQualifiedNames?: Array<string>;
|
|
112
|
+
}
|
|
113
|
+
}
|
|
114
|
+
export declare namespace Tokens {
|
|
115
|
+
export { type CreateTokenRequest as CreateTokenRequest, type CreateTokenResponse as CreateTokenResponse, type TokenCreateParams as TokenCreateParams, };
|
|
116
|
+
}
|
|
117
|
+
//# sourceMappingURL=tokens.d.ts.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"tokens.d.ts","sourceRoot":"","sources":["../src/resources/tokens.ts"],"names":[],"mappings":"OAEO,EAAE,WAAW,EAAE;OACf,EAAE,UAAU,EAAE;OACd,EAAE,cAAc,EAAE;AAEzB,qBAAa,MAAO,SAAQ,WAAW;IACrC;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,IAAI,EAAE,iBAAiB,EAAE,OAAO,CAAC,EAAE,cAAc,GAAG,UAAU,CAAC,mBAAmB,CAAC;CAG3F;AAED,MAAM,WAAW,kBAAkB;IACjC;;OAEG;IACH,WAAW,EAAE;QAAE,CAAC,GAAG,EAAE,MAAM,GAAG,kBAAkB,CAAC,WAAW,CAAA;KAAE,CAAC;IAE/D;;OAEG;IACH,UAAU,EAAE,MAAM,CAAC;IAEnB;;OAEG;IACH,WAAW,CAAC,EAAE,kBAAkB,CAAC,WAAW,CAAC;IAE7C;;OAEG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,yBAAiB,kBAAkB,CAAC;IAClC,UAAiB,WAAW;QAC1B;;WAEG;QACH,GAAG,EAAE,KAAK,CAAC,MAAM,GAAG,OAAO,CAAC,CAAC;KAC9B;IAED;;OAEG;IACH,UAAiB,WAAW;QAC1B;;WAEG;QACH,YAAY,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;QAE7B;;WAEG;QACH,oBAAoB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;KACtC;CACF;AAED,MAAM,WAAW,mBAAmB;IAClC;;OAEG;IACH,KAAK,EAAE,MAAM,CAAC;IAEd;;OAEG;IACH,SAAS,EAAE,MAAM,CAAC;CACnB;AAED,MAAM,WAAW,iBAAiB;IAChC;;OAEG;IACH,WAAW,EAAE;QAAE,CAAC,GAAG,EAAE,MAAM,GAAG,iBAAiB,CAAC,WAAW,CAAA;KAAE,CAAC;IAE9D;;OAEG;IACH,UAAU,EAAE,MAAM,CAAC;IAEnB;;OAEG;IACH,WAAW,CAAC,EAAE,iBAAiB,CAAC,WAAW,CAAC;IAE5C;;OAEG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,yBAAiB,iBAAiB,CAAC;IACjC,UAAiB,WAAW;QAC1B;;WAEG;QACH,GAAG,EAAE,KAAK,CAAC,MAAM,GAAG,OAAO,CAAC,CAAC;KAC9B;IAED;;OAEG;IACH,UAAiB,WAAW;QAC1B;;WAEG;QACH,YAAY,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;QAE7B;;WAEG;QACH,oBAAoB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;KACtC;CACF;AAED,MAAM,CAAC,OAAO,WAAW,MAAM,CAAC;IAC9B,OAAO,EACL,KAAK,kBAAkB,IAAI,kBAAkB,EAC7C,KAAK,mBAAmB,IAAI,mBAAmB,EAC/C,KAAK,iBAAiB,IAAI,iBAAiB,GAC5C,CAAC;CACH"}
|
|
@@ -0,0 +1,27 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
|
|
3
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
4
|
+
exports.Tokens = void 0;
|
|
5
|
+
const resource_1 = require("../core/resource.js");
|
|
6
|
+
class Tokens extends resource_1.APIResource {
|
|
7
|
+
/**
|
|
8
|
+
* Create a service token for machine-to-machine authentication. Requires API key
|
|
9
|
+
* authentication.
|
|
10
|
+
*
|
|
11
|
+
* @example
|
|
12
|
+
* ```ts
|
|
13
|
+
* const createTokenResponse = await client.tokens.create({
|
|
14
|
+
* permissions: {
|
|
15
|
+
* connections: { can: ['read', 'write'] },
|
|
16
|
+
* 'connections.rpc': { can: ['write'] },
|
|
17
|
+
* },
|
|
18
|
+
* ttlSeconds: 3600,
|
|
19
|
+
* });
|
|
20
|
+
* ```
|
|
21
|
+
*/
|
|
22
|
+
create(body, options) {
|
|
23
|
+
return this._client.post('/tokens', { body, ...options });
|
|
24
|
+
}
|
|
25
|
+
}
|
|
26
|
+
exports.Tokens = Tokens;
|
|
27
|
+
//# sourceMappingURL=tokens.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"tokens.js","sourceRoot":"","sources":["../src/resources/tokens.ts"],"names":[],"mappings":";AAAA,sFAAsF;;;AAEtF,kDAA+C;AAI/C,MAAa,MAAO,SAAQ,sBAAW;IACrC;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,IAAuB,EAAE,OAAwB;QACtD,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,EAAE,EAAE,IAAI,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;IAC5D,CAAC;CACF;AAnBD,wBAmBC"}
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
// File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
|
|
2
|
+
import { APIResource } from "../core/resource.mjs";
|
|
3
|
+
export class Tokens extends APIResource {
|
|
4
|
+
/**
|
|
5
|
+
* Create a service token for machine-to-machine authentication. Requires API key
|
|
6
|
+
* authentication.
|
|
7
|
+
*
|
|
8
|
+
* @example
|
|
9
|
+
* ```ts
|
|
10
|
+
* const createTokenResponse = await client.tokens.create({
|
|
11
|
+
* permissions: {
|
|
12
|
+
* connections: { can: ['read', 'write'] },
|
|
13
|
+
* 'connections.rpc': { can: ['write'] },
|
|
14
|
+
* },
|
|
15
|
+
* ttlSeconds: 3600,
|
|
16
|
+
* });
|
|
17
|
+
* ```
|
|
18
|
+
*/
|
|
19
|
+
create(body, options) {
|
|
20
|
+
return this._client.post('/tokens', { body, ...options });
|
|
21
|
+
}
|
|
22
|
+
}
|
|
23
|
+
//# sourceMappingURL=tokens.mjs.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"tokens.mjs","sourceRoot":"","sources":["../src/resources/tokens.ts"],"names":[],"mappings":"AAAA,sFAAsF;OAE/E,EAAE,WAAW,EAAE;AAItB,MAAM,OAAO,MAAO,SAAQ,WAAW;IACrC;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,IAAuB,EAAE,OAAwB;QACtD,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,EAAE,EAAE,IAAI,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;IAC5D,CAAC;CACF"}
|
package/src/client.ts
CHANGED
|
@@ -35,6 +35,7 @@ import {
|
|
|
35
35
|
Namespaces,
|
|
36
36
|
} from './resources/namespaces';
|
|
37
37
|
import { SkillListParams, SkillListResponse, SkillListResponsesSkillsPage, Skills } from './resources/skills';
|
|
38
|
+
import { CreateTokenRequest, CreateTokenResponse, TokenCreateParams, Tokens } from './resources/tokens';
|
|
38
39
|
import { Uplink, UplinkCreateTokenResponse } from './resources/uplink';
|
|
39
40
|
import { Beta } from './resources/beta/beta';
|
|
40
41
|
import {
|
|
@@ -753,6 +754,7 @@ export class Smithery {
|
|
|
753
754
|
uplink: API.Uplink = new API.Uplink(this);
|
|
754
755
|
skills: API.Skills = new API.Skills(this);
|
|
755
756
|
namespaces: API.Namespaces = new API.Namespaces(this);
|
|
757
|
+
tokens: API.Tokens = new API.Tokens(this);
|
|
756
758
|
beta: API.Beta = new API.Beta(this);
|
|
757
759
|
}
|
|
758
760
|
|
|
@@ -761,6 +763,7 @@ Smithery.Servers = Servers;
|
|
|
761
763
|
Smithery.Uplink = Uplink;
|
|
762
764
|
Smithery.Skills = Skills;
|
|
763
765
|
Smithery.Namespaces = Namespaces;
|
|
766
|
+
Smithery.Tokens = Tokens;
|
|
764
767
|
Smithery.Beta = Beta;
|
|
765
768
|
|
|
766
769
|
export declare namespace Smithery {
|
|
@@ -805,5 +808,12 @@ export declare namespace Smithery {
|
|
|
805
808
|
type NamespaceCreateParams as NamespaceCreateParams,
|
|
806
809
|
};
|
|
807
810
|
|
|
811
|
+
export {
|
|
812
|
+
Tokens as Tokens,
|
|
813
|
+
type CreateTokenRequest as CreateTokenRequest,
|
|
814
|
+
type CreateTokenResponse as CreateTokenResponse,
|
|
815
|
+
type TokenCreateParams as TokenCreateParams,
|
|
816
|
+
};
|
|
817
|
+
|
|
808
818
|
export { Beta as Beta };
|
|
809
819
|
}
|
package/src/resources/index.ts
CHANGED
|
@@ -25,4 +25,5 @@ export {
|
|
|
25
25
|
type SkillListParams,
|
|
26
26
|
type SkillListResponsesSkillsPage,
|
|
27
27
|
} from './skills';
|
|
28
|
+
export { Tokens, type CreateTokenRequest, type CreateTokenResponse, type TokenCreateParams } from './tokens';
|
|
28
29
|
export { Uplink, type UplinkCreateTokenResponse } from './uplink';
|
|
@@ -7,15 +7,14 @@ import { path } from '../../internal/utils/path';
|
|
|
7
7
|
|
|
8
8
|
export class Secrets extends APIResource {
|
|
9
9
|
/**
|
|
10
|
-
* Fetch secret names for the server
|
|
11
|
-
* are not returned.
|
|
10
|
+
* Fetch secret names for the server. Values are not returned.
|
|
12
11
|
*/
|
|
13
12
|
list(qualifiedName: string, options?: RequestOptions): APIPromise<SecretListResponse> {
|
|
14
13
|
return this._client.get(path`/servers/${qualifiedName}/secrets`, options);
|
|
15
14
|
}
|
|
16
15
|
|
|
17
16
|
/**
|
|
18
|
-
* Delete a secret by name from the server
|
|
17
|
+
* Delete a secret by name from the server.
|
|
19
18
|
*/
|
|
20
19
|
delete(
|
|
21
20
|
secretName: string,
|
|
@@ -27,7 +26,7 @@ export class Secrets extends APIResource {
|
|
|
27
26
|
}
|
|
28
27
|
|
|
29
28
|
/**
|
|
30
|
-
* Set a secret value for the server
|
|
29
|
+
* Set a secret value for the server.
|
|
31
30
|
*/
|
|
32
31
|
set(qualifiedName: string, body: SecretSetParams, options?: RequestOptions): APIPromise<SecretSetResponse> {
|
|
33
32
|
return this._client.put(path`/servers/${qualifiedName}/secrets`, { body, ...options });
|
|
@@ -0,0 +1,138 @@
|
|
|
1
|
+
// File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
|
|
2
|
+
|
|
3
|
+
import { APIResource } from '../core/resource';
|
|
4
|
+
import { APIPromise } from '../core/api-promise';
|
|
5
|
+
import { RequestOptions } from '../internal/request-options';
|
|
6
|
+
|
|
7
|
+
export class Tokens extends APIResource {
|
|
8
|
+
/**
|
|
9
|
+
* Create a service token for machine-to-machine authentication. Requires API key
|
|
10
|
+
* authentication.
|
|
11
|
+
*
|
|
12
|
+
* @example
|
|
13
|
+
* ```ts
|
|
14
|
+
* const createTokenResponse = await client.tokens.create({
|
|
15
|
+
* permissions: {
|
|
16
|
+
* connections: { can: ['read', 'write'] },
|
|
17
|
+
* 'connections.rpc': { can: ['write'] },
|
|
18
|
+
* },
|
|
19
|
+
* ttlSeconds: 3600,
|
|
20
|
+
* });
|
|
21
|
+
* ```
|
|
22
|
+
*/
|
|
23
|
+
create(body: TokenCreateParams, options?: RequestOptions): APIPromise<CreateTokenResponse> {
|
|
24
|
+
return this._client.post('/tokens', { body, ...options });
|
|
25
|
+
}
|
|
26
|
+
}
|
|
27
|
+
|
|
28
|
+
export interface CreateTokenRequest {
|
|
29
|
+
/**
|
|
30
|
+
* Permissions to grant. Format: { [subject]: { can: [actions] } }
|
|
31
|
+
*/
|
|
32
|
+
permissions: { [key: string]: CreateTokenRequest.Permissions };
|
|
33
|
+
|
|
34
|
+
/**
|
|
35
|
+
* Token TTL in seconds. Required. Max 86400 (24 hours).
|
|
36
|
+
*/
|
|
37
|
+
ttlSeconds: number;
|
|
38
|
+
|
|
39
|
+
/**
|
|
40
|
+
* Optional constraints to limit token access.
|
|
41
|
+
*/
|
|
42
|
+
constraints?: CreateTokenRequest.Constraints;
|
|
43
|
+
|
|
44
|
+
/**
|
|
45
|
+
* Profile to scope the token to. If not provided, uses the default profile.
|
|
46
|
+
*/
|
|
47
|
+
profileSlug?: string;
|
|
48
|
+
}
|
|
49
|
+
|
|
50
|
+
export namespace CreateTokenRequest {
|
|
51
|
+
export interface Permissions {
|
|
52
|
+
/**
|
|
53
|
+
* Actions granted on this subject.
|
|
54
|
+
*/
|
|
55
|
+
can: Array<'read' | 'write'>;
|
|
56
|
+
}
|
|
57
|
+
|
|
58
|
+
/**
|
|
59
|
+
* Optional constraints to limit token access.
|
|
60
|
+
*/
|
|
61
|
+
export interface Constraints {
|
|
62
|
+
/**
|
|
63
|
+
* Limit access to specific namespace IDs.
|
|
64
|
+
*/
|
|
65
|
+
namespaceIds?: Array<string>;
|
|
66
|
+
|
|
67
|
+
/**
|
|
68
|
+
* Limit access to specific server qualified names.
|
|
69
|
+
*/
|
|
70
|
+
serverQualifiedNames?: Array<string>;
|
|
71
|
+
}
|
|
72
|
+
}
|
|
73
|
+
|
|
74
|
+
export interface CreateTokenResponse {
|
|
75
|
+
/**
|
|
76
|
+
* The signed service token (PASETO v4).
|
|
77
|
+
*/
|
|
78
|
+
token: string;
|
|
79
|
+
|
|
80
|
+
/**
|
|
81
|
+
* ISO 8601 timestamp when the token expires.
|
|
82
|
+
*/
|
|
83
|
+
expiresAt: string;
|
|
84
|
+
}
|
|
85
|
+
|
|
86
|
+
export interface TokenCreateParams {
|
|
87
|
+
/**
|
|
88
|
+
* Permissions to grant. Format: { [subject]: { can: [actions] } }
|
|
89
|
+
*/
|
|
90
|
+
permissions: { [key: string]: TokenCreateParams.Permissions };
|
|
91
|
+
|
|
92
|
+
/**
|
|
93
|
+
* Token TTL in seconds. Required. Max 86400 (24 hours).
|
|
94
|
+
*/
|
|
95
|
+
ttlSeconds: number;
|
|
96
|
+
|
|
97
|
+
/**
|
|
98
|
+
* Optional constraints to limit token access.
|
|
99
|
+
*/
|
|
100
|
+
constraints?: TokenCreateParams.Constraints;
|
|
101
|
+
|
|
102
|
+
/**
|
|
103
|
+
* Profile to scope the token to. If not provided, uses the default profile.
|
|
104
|
+
*/
|
|
105
|
+
profileSlug?: string;
|
|
106
|
+
}
|
|
107
|
+
|
|
108
|
+
export namespace TokenCreateParams {
|
|
109
|
+
export interface Permissions {
|
|
110
|
+
/**
|
|
111
|
+
* Actions granted on this subject.
|
|
112
|
+
*/
|
|
113
|
+
can: Array<'read' | 'write'>;
|
|
114
|
+
}
|
|
115
|
+
|
|
116
|
+
/**
|
|
117
|
+
* Optional constraints to limit token access.
|
|
118
|
+
*/
|
|
119
|
+
export interface Constraints {
|
|
120
|
+
/**
|
|
121
|
+
* Limit access to specific namespace IDs.
|
|
122
|
+
*/
|
|
123
|
+
namespaceIds?: Array<string>;
|
|
124
|
+
|
|
125
|
+
/**
|
|
126
|
+
* Limit access to specific server qualified names.
|
|
127
|
+
*/
|
|
128
|
+
serverQualifiedNames?: Array<string>;
|
|
129
|
+
}
|
|
130
|
+
}
|
|
131
|
+
|
|
132
|
+
export declare namespace Tokens {
|
|
133
|
+
export {
|
|
134
|
+
type CreateTokenRequest as CreateTokenRequest,
|
|
135
|
+
type CreateTokenResponse as CreateTokenResponse,
|
|
136
|
+
type TokenCreateParams as TokenCreateParams,
|
|
137
|
+
};
|
|
138
|
+
}
|
package/src/version.ts
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
export const VERSION = '0.
|
|
1
|
+
export const VERSION = '0.15.0'; // x-release-please-version
|
package/version.d.mts
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
export declare const VERSION = "0.
|
|
1
|
+
export declare const VERSION = "0.15.0";
|
|
2
2
|
//# sourceMappingURL=version.d.mts.map
|
package/version.d.ts
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
export declare const VERSION = "0.
|
|
1
|
+
export declare const VERSION = "0.15.0";
|
|
2
2
|
//# sourceMappingURL=version.d.ts.map
|
package/version.js
CHANGED
package/version.mjs
CHANGED
|
@@ -1,2 +1,2 @@
|
|
|
1
|
-
export const VERSION = '0.
|
|
1
|
+
export const VERSION = '0.15.0'; // x-release-please-version
|
|
2
2
|
//# sourceMappingURL=version.mjs.map
|