@smithery/api 0.13.0 → 0.15.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. package/CHANGELOG.md +30 -0
  2. package/client.d.mts +3 -0
  3. package/client.d.mts.map +1 -1
  4. package/client.d.ts +3 -0
  5. package/client.d.ts.map +1 -1
  6. package/client.js +3 -0
  7. package/client.js.map +1 -1
  8. package/client.mjs +3 -0
  9. package/client.mjs.map +1 -1
  10. package/package.json +1 -1
  11. package/resources/index.d.mts +1 -0
  12. package/resources/index.d.mts.map +1 -1
  13. package/resources/index.d.ts +1 -0
  14. package/resources/index.d.ts.map +1 -1
  15. package/resources/index.js +3 -1
  16. package/resources/index.js.map +1 -1
  17. package/resources/index.mjs +1 -0
  18. package/resources/index.mjs.map +1 -1
  19. package/resources/servers/deployments.d.mts +3 -0
  20. package/resources/servers/deployments.d.mts.map +1 -1
  21. package/resources/servers/deployments.d.ts +3 -0
  22. package/resources/servers/deployments.d.ts.map +1 -1
  23. package/resources/servers/secrets.d.mts +3 -4
  24. package/resources/servers/secrets.d.mts.map +1 -1
  25. package/resources/servers/secrets.d.ts +3 -4
  26. package/resources/servers/secrets.d.ts.map +1 -1
  27. package/resources/servers/secrets.js +3 -4
  28. package/resources/servers/secrets.js.map +1 -1
  29. package/resources/servers/secrets.mjs +3 -4
  30. package/resources/servers/secrets.mjs.map +1 -1
  31. package/resources/tokens.d.mts +117 -0
  32. package/resources/tokens.d.mts.map +1 -0
  33. package/resources/tokens.d.ts +117 -0
  34. package/resources/tokens.d.ts.map +1 -0
  35. package/resources/tokens.js +27 -0
  36. package/resources/tokens.js.map +1 -0
  37. package/resources/tokens.mjs +23 -0
  38. package/resources/tokens.mjs.map +1 -0
  39. package/src/client.ts +10 -0
  40. package/src/resources/index.ts +1 -0
  41. package/src/resources/servers/deployments.ts +2 -0
  42. package/src/resources/servers/secrets.ts +3 -4
  43. package/src/resources/tokens.ts +138 -0
  44. package/src/version.ts +1 -1
  45. package/version.d.mts +1 -1
  46. package/version.d.ts +1 -1
  47. package/version.js +1 -1
  48. package/version.mjs +1 -1
@@ -6,21 +6,20 @@ const resource_1 = require("../../core/resource.js");
6
6
  const path_1 = require("../../internal/utils/path.js");
7
7
  class Secrets extends resource_1.APIResource {
8
8
  /**
9
- * Fetch secret names for the server's deployed Worker (requires ownership). Values
10
- * are not returned.
9
+ * Fetch secret names for the server. Values are not returned.
11
10
  */
12
11
  list(qualifiedName, options) {
13
12
  return this._client.get((0, path_1.path) `/servers/${qualifiedName}/secrets`, options);
14
13
  }
15
14
  /**
16
- * Delete a secret by name from the server's deployed Worker (requires ownership).
15
+ * Delete a secret by name from the server.
17
16
  */
18
17
  delete(secretName, params, options) {
19
18
  const { qualifiedName } = params;
20
19
  return this._client.delete((0, path_1.path) `/servers/${qualifiedName}/secrets/${secretName}`, options);
21
20
  }
22
21
  /**
23
- * Set a secret value for the server's deployed Worker (requires ownership).
22
+ * Set a secret value for the server.
24
23
  */
25
24
  set(qualifiedName, body, options) {
26
25
  return this._client.put((0, path_1.path) `/servers/${qualifiedName}/secrets`, { body, ...options });
@@ -1 +1 @@
1
- {"version":3,"file":"secrets.js","sourceRoot":"","sources":["../../src/resources/servers/secrets.ts"],"names":[],"mappings":";AAAA,sFAAsF;;;AAEtF,qDAAkD;AAGlD,uDAAiD;AAEjD,MAAa,OAAQ,SAAQ,sBAAW;IACtC;;;OAGG;IACH,IAAI,CAAC,aAAqB,EAAE,OAAwB;QAClD,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAA,WAAI,EAAA,YAAY,aAAa,UAAU,EAAE,OAAO,CAAC,CAAC;IAC5E,CAAC;IAED;;OAEG;IACH,MAAM,CACJ,UAAkB,EAClB,MAA0B,EAC1B,OAAwB;QAExB,MAAM,EAAE,aAAa,EAAE,GAAG,MAAM,CAAC;QACjC,OAAO,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,IAAA,WAAI,EAAA,YAAY,aAAa,YAAY,UAAU,EAAE,EAAE,OAAO,CAAC,CAAC;IAC7F,CAAC;IAED;;OAEG;IACH,GAAG,CAAC,aAAqB,EAAE,IAAqB,EAAE,OAAwB;QACxE,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAA,WAAI,EAAA,YAAY,aAAa,UAAU,EAAE,EAAE,IAAI,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;IACzF,CAAC;CACF;AA3BD,0BA2BC"}
1
+ {"version":3,"file":"secrets.js","sourceRoot":"","sources":["../../src/resources/servers/secrets.ts"],"names":[],"mappings":";AAAA,sFAAsF;;;AAEtF,qDAAkD;AAGlD,uDAAiD;AAEjD,MAAa,OAAQ,SAAQ,sBAAW;IACtC;;OAEG;IACH,IAAI,CAAC,aAAqB,EAAE,OAAwB;QAClD,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAA,WAAI,EAAA,YAAY,aAAa,UAAU,EAAE,OAAO,CAAC,CAAC;IAC5E,CAAC;IAED;;OAEG;IACH,MAAM,CACJ,UAAkB,EAClB,MAA0B,EAC1B,OAAwB;QAExB,MAAM,EAAE,aAAa,EAAE,GAAG,MAAM,CAAC;QACjC,OAAO,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,IAAA,WAAI,EAAA,YAAY,aAAa,YAAY,UAAU,EAAE,EAAE,OAAO,CAAC,CAAC;IAC7F,CAAC;IAED;;OAEG;IACH,GAAG,CAAC,aAAqB,EAAE,IAAqB,EAAE,OAAwB;QACxE,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAA,WAAI,EAAA,YAAY,aAAa,UAAU,EAAE,EAAE,IAAI,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;IACzF,CAAC;CACF;AA1BD,0BA0BC"}
@@ -3,21 +3,20 @@ import { APIResource } from "../../core/resource.mjs";
3
3
  import { path } from "../../internal/utils/path.mjs";
4
4
  export class Secrets extends APIResource {
5
5
  /**
6
- * Fetch secret names for the server's deployed Worker (requires ownership). Values
7
- * are not returned.
6
+ * Fetch secret names for the server. Values are not returned.
8
7
  */
9
8
  list(qualifiedName, options) {
10
9
  return this._client.get(path `/servers/${qualifiedName}/secrets`, options);
11
10
  }
12
11
  /**
13
- * Delete a secret by name from the server's deployed Worker (requires ownership).
12
+ * Delete a secret by name from the server.
14
13
  */
15
14
  delete(secretName, params, options) {
16
15
  const { qualifiedName } = params;
17
16
  return this._client.delete(path `/servers/${qualifiedName}/secrets/${secretName}`, options);
18
17
  }
19
18
  /**
20
- * Set a secret value for the server's deployed Worker (requires ownership).
19
+ * Set a secret value for the server.
21
20
  */
22
21
  set(qualifiedName, body, options) {
23
22
  return this._client.put(path `/servers/${qualifiedName}/secrets`, { body, ...options });
@@ -1 +1 @@
1
- {"version":3,"file":"secrets.mjs","sourceRoot":"","sources":["../../src/resources/servers/secrets.ts"],"names":[],"mappings":"AAAA,sFAAsF;OAE/E,EAAE,WAAW,EAAE;OAGf,EAAE,IAAI,EAAE;AAEf,MAAM,OAAO,OAAQ,SAAQ,WAAW;IACtC;;;OAGG;IACH,IAAI,CAAC,aAAqB,EAAE,OAAwB;QAClD,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAA,YAAY,aAAa,UAAU,EAAE,OAAO,CAAC,CAAC;IAC5E,CAAC;IAED;;OAEG;IACH,MAAM,CACJ,UAAkB,EAClB,MAA0B,EAC1B,OAAwB;QAExB,MAAM,EAAE,aAAa,EAAE,GAAG,MAAM,CAAC;QACjC,OAAO,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAA,YAAY,aAAa,YAAY,UAAU,EAAE,EAAE,OAAO,CAAC,CAAC;IAC7F,CAAC;IAED;;OAEG;IACH,GAAG,CAAC,aAAqB,EAAE,IAAqB,EAAE,OAAwB;QACxE,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAA,YAAY,aAAa,UAAU,EAAE,EAAE,IAAI,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;IACzF,CAAC;CACF"}
1
+ {"version":3,"file":"secrets.mjs","sourceRoot":"","sources":["../../src/resources/servers/secrets.ts"],"names":[],"mappings":"AAAA,sFAAsF;OAE/E,EAAE,WAAW,EAAE;OAGf,EAAE,IAAI,EAAE;AAEf,MAAM,OAAO,OAAQ,SAAQ,WAAW;IACtC;;OAEG;IACH,IAAI,CAAC,aAAqB,EAAE,OAAwB;QAClD,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAA,YAAY,aAAa,UAAU,EAAE,OAAO,CAAC,CAAC;IAC5E,CAAC;IAED;;OAEG;IACH,MAAM,CACJ,UAAkB,EAClB,MAA0B,EAC1B,OAAwB;QAExB,MAAM,EAAE,aAAa,EAAE,GAAG,MAAM,CAAC;QACjC,OAAO,IAAI,CAAC,OAAO,CAAC,MAAM,CAAC,IAAI,CAAA,YAAY,aAAa,YAAY,UAAU,EAAE,EAAE,OAAO,CAAC,CAAC;IAC7F,CAAC;IAED;;OAEG;IACH,GAAG,CAAC,aAAqB,EAAE,IAAqB,EAAE,OAAwB;QACxE,OAAO,IAAI,CAAC,OAAO,CAAC,GAAG,CAAC,IAAI,CAAA,YAAY,aAAa,UAAU,EAAE,EAAE,IAAI,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;IACzF,CAAC;CACF"}
@@ -0,0 +1,117 @@
1
+ import { APIResource } from "../core/resource.mjs";
2
+ import { APIPromise } from "../core/api-promise.mjs";
3
+ import { RequestOptions } from "../internal/request-options.mjs";
4
+ export declare class Tokens extends APIResource {
5
+ /**
6
+ * Create a service token for machine-to-machine authentication. Requires API key
7
+ * authentication.
8
+ *
9
+ * @example
10
+ * ```ts
11
+ * const createTokenResponse = await client.tokens.create({
12
+ * permissions: {
13
+ * connections: { can: ['read', 'write'] },
14
+ * 'connections.rpc': { can: ['write'] },
15
+ * },
16
+ * ttlSeconds: 3600,
17
+ * });
18
+ * ```
19
+ */
20
+ create(body: TokenCreateParams, options?: RequestOptions): APIPromise<CreateTokenResponse>;
21
+ }
22
+ export interface CreateTokenRequest {
23
+ /**
24
+ * Permissions to grant. Format: { [subject]: { can: [actions] } }
25
+ */
26
+ permissions: {
27
+ [key: string]: CreateTokenRequest.Permissions;
28
+ };
29
+ /**
30
+ * Token TTL in seconds. Required. Max 86400 (24 hours).
31
+ */
32
+ ttlSeconds: number;
33
+ /**
34
+ * Optional constraints to limit token access.
35
+ */
36
+ constraints?: CreateTokenRequest.Constraints;
37
+ /**
38
+ * Profile to scope the token to. If not provided, uses the default profile.
39
+ */
40
+ profileSlug?: string;
41
+ }
42
+ export declare namespace CreateTokenRequest {
43
+ interface Permissions {
44
+ /**
45
+ * Actions granted on this subject.
46
+ */
47
+ can: Array<'read' | 'write'>;
48
+ }
49
+ /**
50
+ * Optional constraints to limit token access.
51
+ */
52
+ interface Constraints {
53
+ /**
54
+ * Limit access to specific namespace IDs.
55
+ */
56
+ namespaceIds?: Array<string>;
57
+ /**
58
+ * Limit access to specific server qualified names.
59
+ */
60
+ serverQualifiedNames?: Array<string>;
61
+ }
62
+ }
63
+ export interface CreateTokenResponse {
64
+ /**
65
+ * The signed service token (PASETO v4).
66
+ */
67
+ token: string;
68
+ /**
69
+ * ISO 8601 timestamp when the token expires.
70
+ */
71
+ expiresAt: string;
72
+ }
73
+ export interface TokenCreateParams {
74
+ /**
75
+ * Permissions to grant. Format: { [subject]: { can: [actions] } }
76
+ */
77
+ permissions: {
78
+ [key: string]: TokenCreateParams.Permissions;
79
+ };
80
+ /**
81
+ * Token TTL in seconds. Required. Max 86400 (24 hours).
82
+ */
83
+ ttlSeconds: number;
84
+ /**
85
+ * Optional constraints to limit token access.
86
+ */
87
+ constraints?: TokenCreateParams.Constraints;
88
+ /**
89
+ * Profile to scope the token to. If not provided, uses the default profile.
90
+ */
91
+ profileSlug?: string;
92
+ }
93
+ export declare namespace TokenCreateParams {
94
+ interface Permissions {
95
+ /**
96
+ * Actions granted on this subject.
97
+ */
98
+ can: Array<'read' | 'write'>;
99
+ }
100
+ /**
101
+ * Optional constraints to limit token access.
102
+ */
103
+ interface Constraints {
104
+ /**
105
+ * Limit access to specific namespace IDs.
106
+ */
107
+ namespaceIds?: Array<string>;
108
+ /**
109
+ * Limit access to specific server qualified names.
110
+ */
111
+ serverQualifiedNames?: Array<string>;
112
+ }
113
+ }
114
+ export declare namespace Tokens {
115
+ export { type CreateTokenRequest as CreateTokenRequest, type CreateTokenResponse as CreateTokenResponse, type TokenCreateParams as TokenCreateParams, };
116
+ }
117
+ //# sourceMappingURL=tokens.d.mts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"tokens.d.mts","sourceRoot":"","sources":["../src/resources/tokens.ts"],"names":[],"mappings":"OAEO,EAAE,WAAW,EAAE;OACf,EAAE,UAAU,EAAE;OACd,EAAE,cAAc,EAAE;AAEzB,qBAAa,MAAO,SAAQ,WAAW;IACrC;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,IAAI,EAAE,iBAAiB,EAAE,OAAO,CAAC,EAAE,cAAc,GAAG,UAAU,CAAC,mBAAmB,CAAC;CAG3F;AAED,MAAM,WAAW,kBAAkB;IACjC;;OAEG;IACH,WAAW,EAAE;QAAE,CAAC,GAAG,EAAE,MAAM,GAAG,kBAAkB,CAAC,WAAW,CAAA;KAAE,CAAC;IAE/D;;OAEG;IACH,UAAU,EAAE,MAAM,CAAC;IAEnB;;OAEG;IACH,WAAW,CAAC,EAAE,kBAAkB,CAAC,WAAW,CAAC;IAE7C;;OAEG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,yBAAiB,kBAAkB,CAAC;IAClC,UAAiB,WAAW;QAC1B;;WAEG;QACH,GAAG,EAAE,KAAK,CAAC,MAAM,GAAG,OAAO,CAAC,CAAC;KAC9B;IAED;;OAEG;IACH,UAAiB,WAAW;QAC1B;;WAEG;QACH,YAAY,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;QAE7B;;WAEG;QACH,oBAAoB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;KACtC;CACF;AAED,MAAM,WAAW,mBAAmB;IAClC;;OAEG;IACH,KAAK,EAAE,MAAM,CAAC;IAEd;;OAEG;IACH,SAAS,EAAE,MAAM,CAAC;CACnB;AAED,MAAM,WAAW,iBAAiB;IAChC;;OAEG;IACH,WAAW,EAAE;QAAE,CAAC,GAAG,EAAE,MAAM,GAAG,iBAAiB,CAAC,WAAW,CAAA;KAAE,CAAC;IAE9D;;OAEG;IACH,UAAU,EAAE,MAAM,CAAC;IAEnB;;OAEG;IACH,WAAW,CAAC,EAAE,iBAAiB,CAAC,WAAW,CAAC;IAE5C;;OAEG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,yBAAiB,iBAAiB,CAAC;IACjC,UAAiB,WAAW;QAC1B;;WAEG;QACH,GAAG,EAAE,KAAK,CAAC,MAAM,GAAG,OAAO,CAAC,CAAC;KAC9B;IAED;;OAEG;IACH,UAAiB,WAAW;QAC1B;;WAEG;QACH,YAAY,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;QAE7B;;WAEG;QACH,oBAAoB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;KACtC;CACF;AAED,MAAM,CAAC,OAAO,WAAW,MAAM,CAAC;IAC9B,OAAO,EACL,KAAK,kBAAkB,IAAI,kBAAkB,EAC7C,KAAK,mBAAmB,IAAI,mBAAmB,EAC/C,KAAK,iBAAiB,IAAI,iBAAiB,GAC5C,CAAC;CACH"}
@@ -0,0 +1,117 @@
1
+ import { APIResource } from "../core/resource.js";
2
+ import { APIPromise } from "../core/api-promise.js";
3
+ import { RequestOptions } from "../internal/request-options.js";
4
+ export declare class Tokens extends APIResource {
5
+ /**
6
+ * Create a service token for machine-to-machine authentication. Requires API key
7
+ * authentication.
8
+ *
9
+ * @example
10
+ * ```ts
11
+ * const createTokenResponse = await client.tokens.create({
12
+ * permissions: {
13
+ * connections: { can: ['read', 'write'] },
14
+ * 'connections.rpc': { can: ['write'] },
15
+ * },
16
+ * ttlSeconds: 3600,
17
+ * });
18
+ * ```
19
+ */
20
+ create(body: TokenCreateParams, options?: RequestOptions): APIPromise<CreateTokenResponse>;
21
+ }
22
+ export interface CreateTokenRequest {
23
+ /**
24
+ * Permissions to grant. Format: { [subject]: { can: [actions] } }
25
+ */
26
+ permissions: {
27
+ [key: string]: CreateTokenRequest.Permissions;
28
+ };
29
+ /**
30
+ * Token TTL in seconds. Required. Max 86400 (24 hours).
31
+ */
32
+ ttlSeconds: number;
33
+ /**
34
+ * Optional constraints to limit token access.
35
+ */
36
+ constraints?: CreateTokenRequest.Constraints;
37
+ /**
38
+ * Profile to scope the token to. If not provided, uses the default profile.
39
+ */
40
+ profileSlug?: string;
41
+ }
42
+ export declare namespace CreateTokenRequest {
43
+ interface Permissions {
44
+ /**
45
+ * Actions granted on this subject.
46
+ */
47
+ can: Array<'read' | 'write'>;
48
+ }
49
+ /**
50
+ * Optional constraints to limit token access.
51
+ */
52
+ interface Constraints {
53
+ /**
54
+ * Limit access to specific namespace IDs.
55
+ */
56
+ namespaceIds?: Array<string>;
57
+ /**
58
+ * Limit access to specific server qualified names.
59
+ */
60
+ serverQualifiedNames?: Array<string>;
61
+ }
62
+ }
63
+ export interface CreateTokenResponse {
64
+ /**
65
+ * The signed service token (PASETO v4).
66
+ */
67
+ token: string;
68
+ /**
69
+ * ISO 8601 timestamp when the token expires.
70
+ */
71
+ expiresAt: string;
72
+ }
73
+ export interface TokenCreateParams {
74
+ /**
75
+ * Permissions to grant. Format: { [subject]: { can: [actions] } }
76
+ */
77
+ permissions: {
78
+ [key: string]: TokenCreateParams.Permissions;
79
+ };
80
+ /**
81
+ * Token TTL in seconds. Required. Max 86400 (24 hours).
82
+ */
83
+ ttlSeconds: number;
84
+ /**
85
+ * Optional constraints to limit token access.
86
+ */
87
+ constraints?: TokenCreateParams.Constraints;
88
+ /**
89
+ * Profile to scope the token to. If not provided, uses the default profile.
90
+ */
91
+ profileSlug?: string;
92
+ }
93
+ export declare namespace TokenCreateParams {
94
+ interface Permissions {
95
+ /**
96
+ * Actions granted on this subject.
97
+ */
98
+ can: Array<'read' | 'write'>;
99
+ }
100
+ /**
101
+ * Optional constraints to limit token access.
102
+ */
103
+ interface Constraints {
104
+ /**
105
+ * Limit access to specific namespace IDs.
106
+ */
107
+ namespaceIds?: Array<string>;
108
+ /**
109
+ * Limit access to specific server qualified names.
110
+ */
111
+ serverQualifiedNames?: Array<string>;
112
+ }
113
+ }
114
+ export declare namespace Tokens {
115
+ export { type CreateTokenRequest as CreateTokenRequest, type CreateTokenResponse as CreateTokenResponse, type TokenCreateParams as TokenCreateParams, };
116
+ }
117
+ //# sourceMappingURL=tokens.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"tokens.d.ts","sourceRoot":"","sources":["../src/resources/tokens.ts"],"names":[],"mappings":"OAEO,EAAE,WAAW,EAAE;OACf,EAAE,UAAU,EAAE;OACd,EAAE,cAAc,EAAE;AAEzB,qBAAa,MAAO,SAAQ,WAAW;IACrC;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,IAAI,EAAE,iBAAiB,EAAE,OAAO,CAAC,EAAE,cAAc,GAAG,UAAU,CAAC,mBAAmB,CAAC;CAG3F;AAED,MAAM,WAAW,kBAAkB;IACjC;;OAEG;IACH,WAAW,EAAE;QAAE,CAAC,GAAG,EAAE,MAAM,GAAG,kBAAkB,CAAC,WAAW,CAAA;KAAE,CAAC;IAE/D;;OAEG;IACH,UAAU,EAAE,MAAM,CAAC;IAEnB;;OAEG;IACH,WAAW,CAAC,EAAE,kBAAkB,CAAC,WAAW,CAAC;IAE7C;;OAEG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,yBAAiB,kBAAkB,CAAC;IAClC,UAAiB,WAAW;QAC1B;;WAEG;QACH,GAAG,EAAE,KAAK,CAAC,MAAM,GAAG,OAAO,CAAC,CAAC;KAC9B;IAED;;OAEG;IACH,UAAiB,WAAW;QAC1B;;WAEG;QACH,YAAY,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;QAE7B;;WAEG;QACH,oBAAoB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;KACtC;CACF;AAED,MAAM,WAAW,mBAAmB;IAClC;;OAEG;IACH,KAAK,EAAE,MAAM,CAAC;IAEd;;OAEG;IACH,SAAS,EAAE,MAAM,CAAC;CACnB;AAED,MAAM,WAAW,iBAAiB;IAChC;;OAEG;IACH,WAAW,EAAE;QAAE,CAAC,GAAG,EAAE,MAAM,GAAG,iBAAiB,CAAC,WAAW,CAAA;KAAE,CAAC;IAE9D;;OAEG;IACH,UAAU,EAAE,MAAM,CAAC;IAEnB;;OAEG;IACH,WAAW,CAAC,EAAE,iBAAiB,CAAC,WAAW,CAAC;IAE5C;;OAEG;IACH,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB;AAED,yBAAiB,iBAAiB,CAAC;IACjC,UAAiB,WAAW;QAC1B;;WAEG;QACH,GAAG,EAAE,KAAK,CAAC,MAAM,GAAG,OAAO,CAAC,CAAC;KAC9B;IAED;;OAEG;IACH,UAAiB,WAAW;QAC1B;;WAEG;QACH,YAAY,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;QAE7B;;WAEG;QACH,oBAAoB,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;KACtC;CACF;AAED,MAAM,CAAC,OAAO,WAAW,MAAM,CAAC;IAC9B,OAAO,EACL,KAAK,kBAAkB,IAAI,kBAAkB,EAC7C,KAAK,mBAAmB,IAAI,mBAAmB,EAC/C,KAAK,iBAAiB,IAAI,iBAAiB,GAC5C,CAAC;CACH"}
@@ -0,0 +1,27 @@
1
+ "use strict";
2
+ // File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
3
+ Object.defineProperty(exports, "__esModule", { value: true });
4
+ exports.Tokens = void 0;
5
+ const resource_1 = require("../core/resource.js");
6
+ class Tokens extends resource_1.APIResource {
7
+ /**
8
+ * Create a service token for machine-to-machine authentication. Requires API key
9
+ * authentication.
10
+ *
11
+ * @example
12
+ * ```ts
13
+ * const createTokenResponse = await client.tokens.create({
14
+ * permissions: {
15
+ * connections: { can: ['read', 'write'] },
16
+ * 'connections.rpc': { can: ['write'] },
17
+ * },
18
+ * ttlSeconds: 3600,
19
+ * });
20
+ * ```
21
+ */
22
+ create(body, options) {
23
+ return this._client.post('/tokens', { body, ...options });
24
+ }
25
+ }
26
+ exports.Tokens = Tokens;
27
+ //# sourceMappingURL=tokens.js.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"tokens.js","sourceRoot":"","sources":["../src/resources/tokens.ts"],"names":[],"mappings":";AAAA,sFAAsF;;;AAEtF,kDAA+C;AAI/C,MAAa,MAAO,SAAQ,sBAAW;IACrC;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,IAAuB,EAAE,OAAwB;QACtD,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,EAAE,EAAE,IAAI,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;IAC5D,CAAC;CACF;AAnBD,wBAmBC"}
@@ -0,0 +1,23 @@
1
+ // File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
2
+ import { APIResource } from "../core/resource.mjs";
3
+ export class Tokens extends APIResource {
4
+ /**
5
+ * Create a service token for machine-to-machine authentication. Requires API key
6
+ * authentication.
7
+ *
8
+ * @example
9
+ * ```ts
10
+ * const createTokenResponse = await client.tokens.create({
11
+ * permissions: {
12
+ * connections: { can: ['read', 'write'] },
13
+ * 'connections.rpc': { can: ['write'] },
14
+ * },
15
+ * ttlSeconds: 3600,
16
+ * });
17
+ * ```
18
+ */
19
+ create(body, options) {
20
+ return this._client.post('/tokens', { body, ...options });
21
+ }
22
+ }
23
+ //# sourceMappingURL=tokens.mjs.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"tokens.mjs","sourceRoot":"","sources":["../src/resources/tokens.ts"],"names":[],"mappings":"AAAA,sFAAsF;OAE/E,EAAE,WAAW,EAAE;AAItB,MAAM,OAAO,MAAO,SAAQ,WAAW;IACrC;;;;;;;;;;;;;;OAcG;IACH,MAAM,CAAC,IAAuB,EAAE,OAAwB;QACtD,OAAO,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,SAAS,EAAE,EAAE,IAAI,EAAE,GAAG,OAAO,EAAE,CAAC,CAAC;IAC5D,CAAC;CACF"}
package/src/client.ts CHANGED
@@ -35,6 +35,7 @@ import {
35
35
  Namespaces,
36
36
  } from './resources/namespaces';
37
37
  import { SkillListParams, SkillListResponse, SkillListResponsesSkillsPage, Skills } from './resources/skills';
38
+ import { CreateTokenRequest, CreateTokenResponse, TokenCreateParams, Tokens } from './resources/tokens';
38
39
  import { Uplink, UplinkCreateTokenResponse } from './resources/uplink';
39
40
  import { Beta } from './resources/beta/beta';
40
41
  import {
@@ -753,6 +754,7 @@ export class Smithery {
753
754
  uplink: API.Uplink = new API.Uplink(this);
754
755
  skills: API.Skills = new API.Skills(this);
755
756
  namespaces: API.Namespaces = new API.Namespaces(this);
757
+ tokens: API.Tokens = new API.Tokens(this);
756
758
  beta: API.Beta = new API.Beta(this);
757
759
  }
758
760
 
@@ -761,6 +763,7 @@ Smithery.Servers = Servers;
761
763
  Smithery.Uplink = Uplink;
762
764
  Smithery.Skills = Skills;
763
765
  Smithery.Namespaces = Namespaces;
766
+ Smithery.Tokens = Tokens;
764
767
  Smithery.Beta = Beta;
765
768
 
766
769
  export declare namespace Smithery {
@@ -805,5 +808,12 @@ export declare namespace Smithery {
805
808
  type NamespaceCreateParams as NamespaceCreateParams,
806
809
  };
807
810
 
811
+ export {
812
+ Tokens as Tokens,
813
+ type CreateTokenRequest as CreateTokenRequest,
814
+ type CreateTokenResponse as CreateTokenResponse,
815
+ type TokenCreateParams as TokenCreateParams,
816
+ };
817
+
808
818
  export { Beta as Beta };
809
819
  }
@@ -25,4 +25,5 @@ export {
25
25
  type SkillListParams,
26
26
  type SkillListResponsesSkillsPage,
27
27
  } from './skills';
28
+ export { Tokens, type CreateTokenRequest, type CreateTokenResponse, type TokenCreateParams } from './tokens';
28
29
  export { Uplink, type UplinkCreateTokenResponse } from './uplink';
@@ -70,6 +70,8 @@ export interface ExternalDeployPayload {
70
70
  type: 'external';
71
71
 
72
72
  upstreamUrl: string;
73
+
74
+ configSchema?: { [key: string]: unknown };
73
75
  }
74
76
 
75
77
  export interface HostedDeployPayload {
@@ -7,15 +7,14 @@ import { path } from '../../internal/utils/path';
7
7
 
8
8
  export class Secrets extends APIResource {
9
9
  /**
10
- * Fetch secret names for the server's deployed Worker (requires ownership). Values
11
- * are not returned.
10
+ * Fetch secret names for the server. Values are not returned.
12
11
  */
13
12
  list(qualifiedName: string, options?: RequestOptions): APIPromise<SecretListResponse> {
14
13
  return this._client.get(path`/servers/${qualifiedName}/secrets`, options);
15
14
  }
16
15
 
17
16
  /**
18
- * Delete a secret by name from the server's deployed Worker (requires ownership).
17
+ * Delete a secret by name from the server.
19
18
  */
20
19
  delete(
21
20
  secretName: string,
@@ -27,7 +26,7 @@ export class Secrets extends APIResource {
27
26
  }
28
27
 
29
28
  /**
30
- * Set a secret value for the server's deployed Worker (requires ownership).
29
+ * Set a secret value for the server.
31
30
  */
32
31
  set(qualifiedName: string, body: SecretSetParams, options?: RequestOptions): APIPromise<SecretSetResponse> {
33
32
  return this._client.put(path`/servers/${qualifiedName}/secrets`, { body, ...options });
@@ -0,0 +1,138 @@
1
+ // File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details.
2
+
3
+ import { APIResource } from '../core/resource';
4
+ import { APIPromise } from '../core/api-promise';
5
+ import { RequestOptions } from '../internal/request-options';
6
+
7
+ export class Tokens extends APIResource {
8
+ /**
9
+ * Create a service token for machine-to-machine authentication. Requires API key
10
+ * authentication.
11
+ *
12
+ * @example
13
+ * ```ts
14
+ * const createTokenResponse = await client.tokens.create({
15
+ * permissions: {
16
+ * connections: { can: ['read', 'write'] },
17
+ * 'connections.rpc': { can: ['write'] },
18
+ * },
19
+ * ttlSeconds: 3600,
20
+ * });
21
+ * ```
22
+ */
23
+ create(body: TokenCreateParams, options?: RequestOptions): APIPromise<CreateTokenResponse> {
24
+ return this._client.post('/tokens', { body, ...options });
25
+ }
26
+ }
27
+
28
+ export interface CreateTokenRequest {
29
+ /**
30
+ * Permissions to grant. Format: { [subject]: { can: [actions] } }
31
+ */
32
+ permissions: { [key: string]: CreateTokenRequest.Permissions };
33
+
34
+ /**
35
+ * Token TTL in seconds. Required. Max 86400 (24 hours).
36
+ */
37
+ ttlSeconds: number;
38
+
39
+ /**
40
+ * Optional constraints to limit token access.
41
+ */
42
+ constraints?: CreateTokenRequest.Constraints;
43
+
44
+ /**
45
+ * Profile to scope the token to. If not provided, uses the default profile.
46
+ */
47
+ profileSlug?: string;
48
+ }
49
+
50
+ export namespace CreateTokenRequest {
51
+ export interface Permissions {
52
+ /**
53
+ * Actions granted on this subject.
54
+ */
55
+ can: Array<'read' | 'write'>;
56
+ }
57
+
58
+ /**
59
+ * Optional constraints to limit token access.
60
+ */
61
+ export interface Constraints {
62
+ /**
63
+ * Limit access to specific namespace IDs.
64
+ */
65
+ namespaceIds?: Array<string>;
66
+
67
+ /**
68
+ * Limit access to specific server qualified names.
69
+ */
70
+ serverQualifiedNames?: Array<string>;
71
+ }
72
+ }
73
+
74
+ export interface CreateTokenResponse {
75
+ /**
76
+ * The signed service token (PASETO v4).
77
+ */
78
+ token: string;
79
+
80
+ /**
81
+ * ISO 8601 timestamp when the token expires.
82
+ */
83
+ expiresAt: string;
84
+ }
85
+
86
+ export interface TokenCreateParams {
87
+ /**
88
+ * Permissions to grant. Format: { [subject]: { can: [actions] } }
89
+ */
90
+ permissions: { [key: string]: TokenCreateParams.Permissions };
91
+
92
+ /**
93
+ * Token TTL in seconds. Required. Max 86400 (24 hours).
94
+ */
95
+ ttlSeconds: number;
96
+
97
+ /**
98
+ * Optional constraints to limit token access.
99
+ */
100
+ constraints?: TokenCreateParams.Constraints;
101
+
102
+ /**
103
+ * Profile to scope the token to. If not provided, uses the default profile.
104
+ */
105
+ profileSlug?: string;
106
+ }
107
+
108
+ export namespace TokenCreateParams {
109
+ export interface Permissions {
110
+ /**
111
+ * Actions granted on this subject.
112
+ */
113
+ can: Array<'read' | 'write'>;
114
+ }
115
+
116
+ /**
117
+ * Optional constraints to limit token access.
118
+ */
119
+ export interface Constraints {
120
+ /**
121
+ * Limit access to specific namespace IDs.
122
+ */
123
+ namespaceIds?: Array<string>;
124
+
125
+ /**
126
+ * Limit access to specific server qualified names.
127
+ */
128
+ serverQualifiedNames?: Array<string>;
129
+ }
130
+ }
131
+
132
+ export declare namespace Tokens {
133
+ export {
134
+ type CreateTokenRequest as CreateTokenRequest,
135
+ type CreateTokenResponse as CreateTokenResponse,
136
+ type TokenCreateParams as TokenCreateParams,
137
+ };
138
+ }
package/src/version.ts CHANGED
@@ -1 +1 @@
1
- export const VERSION = '0.13.0'; // x-release-please-version
1
+ export const VERSION = '0.15.0'; // x-release-please-version
package/version.d.mts CHANGED
@@ -1,2 +1,2 @@
1
- export declare const VERSION = "0.13.0";
1
+ export declare const VERSION = "0.15.0";
2
2
  //# sourceMappingURL=version.d.mts.map
package/version.d.ts CHANGED
@@ -1,2 +1,2 @@
1
- export declare const VERSION = "0.13.0";
1
+ export declare const VERSION = "0.15.0";
2
2
  //# sourceMappingURL=version.d.ts.map
package/version.js CHANGED
@@ -1,5 +1,5 @@
1
1
  "use strict";
2
2
  Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.VERSION = void 0;
4
- exports.VERSION = '0.13.0'; // x-release-please-version
4
+ exports.VERSION = '0.15.0'; // x-release-please-version
5
5
  //# sourceMappingURL=version.js.map
package/version.mjs CHANGED
@@ -1,2 +1,2 @@
1
- export const VERSION = '0.13.0'; // x-release-please-version
1
+ export const VERSION = '0.15.0'; // x-release-please-version
2
2
  //# sourceMappingURL=version.mjs.map