@unkey/api 2.0.2 → 2.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (289) hide show
  1. package/README.md +4 -2
  2. package/bin/mcp-server.js +371 -222
  3. package/bin/mcp-server.js.map +33 -31
  4. package/dist/commonjs/funcs/apisDeleteApi.d.ts +4 -2
  5. package/dist/commonjs/funcs/apisDeleteApi.d.ts.map +1 -1
  6. package/dist/commonjs/funcs/apisDeleteApi.js +4 -2
  7. package/dist/commonjs/funcs/apisDeleteApi.js.map +1 -1
  8. package/dist/commonjs/funcs/identitiesCreateIdentity.d.ts +2 -2
  9. package/dist/commonjs/funcs/identitiesCreateIdentity.js +2 -2
  10. package/dist/commonjs/funcs/keysRerollKey.d.ts +49 -0
  11. package/dist/commonjs/funcs/keysRerollKey.d.ts.map +1 -0
  12. package/dist/commonjs/funcs/keysRerollKey.js +159 -0
  13. package/dist/commonjs/funcs/keysRerollKey.js.map +1 -0
  14. package/dist/commonjs/funcs/permissionsListPermissions.d.ts +2 -1
  15. package/dist/commonjs/funcs/permissionsListPermissions.d.ts.map +1 -1
  16. package/dist/commonjs/funcs/permissionsListPermissions.js +2 -1
  17. package/dist/commonjs/funcs/permissionsListPermissions.js.map +1 -1
  18. package/dist/commonjs/funcs/permissionsListRoles.d.ts +2 -1
  19. package/dist/commonjs/funcs/permissionsListRoles.d.ts.map +1 -1
  20. package/dist/commonjs/funcs/permissionsListRoles.js +2 -1
  21. package/dist/commonjs/funcs/permissionsListRoles.js.map +1 -1
  22. package/dist/commonjs/lib/config.d.ts +3 -3
  23. package/dist/commonjs/lib/config.js +3 -3
  24. package/dist/commonjs/mcp-server/mcp-server.js +1 -1
  25. package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
  26. package/dist/commonjs/mcp-server/server.js +3 -1
  27. package/dist/commonjs/mcp-server/server.js.map +1 -1
  28. package/dist/commonjs/mcp-server/tools/apisDeleteApi.d.ts.map +1 -1
  29. package/dist/commonjs/mcp-server/tools/apisDeleteApi.js +4 -2
  30. package/dist/commonjs/mcp-server/tools/apisDeleteApi.js.map +1 -1
  31. package/dist/commonjs/mcp-server/tools/identitiesCreateIdentity.js +2 -2
  32. package/dist/commonjs/mcp-server/tools/identitiesUpdateIdentity.js +2 -2
  33. package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts +8 -0
  34. package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
  35. package/dist/commonjs/mcp-server/tools/keysRerollKey.js +96 -0
  36. package/dist/commonjs/mcp-server/tools/keysRerollKey.js.map +1 -0
  37. package/dist/commonjs/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
  38. package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js +2 -1
  39. package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js.map +1 -1
  40. package/dist/commonjs/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
  41. package/dist/commonjs/mcp-server/tools/permissionsListRoles.js +2 -1
  42. package/dist/commonjs/mcp-server/tools/permissionsListRoles.js.map +1 -1
  43. package/dist/commonjs/models/components/identity.d.ts +8 -2
  44. package/dist/commonjs/models/components/identity.d.ts.map +1 -1
  45. package/dist/commonjs/models/components/identity.js +2 -2
  46. package/dist/commonjs/models/components/identity.js.map +1 -1
  47. package/dist/commonjs/models/components/index.d.ts +3 -3
  48. package/dist/commonjs/models/components/index.d.ts.map +1 -1
  49. package/dist/commonjs/models/components/index.js +3 -3
  50. package/dist/commonjs/models/components/index.js.map +1 -1
  51. package/dist/commonjs/models/components/keyresponsedata.d.ts +0 -5
  52. package/dist/commonjs/models/components/keyresponsedata.d.ts.map +1 -1
  53. package/dist/commonjs/models/components/keyresponsedata.js +0 -2
  54. package/dist/commonjs/models/components/keyresponsedata.js.map +1 -1
  55. package/dist/commonjs/models/components/permission.d.ts +1 -1
  56. package/dist/commonjs/models/components/v2identitiesgetidentityresponsebody.d.ts +3 -3
  57. package/dist/commonjs/models/components/v2identitiesgetidentityresponsebody.d.ts.map +1 -1
  58. package/dist/commonjs/models/components/v2identitiesgetidentityresponsebody.js +3 -3
  59. package/dist/commonjs/models/components/v2identitiesgetidentityresponsebody.js.map +1 -1
  60. package/dist/commonjs/models/components/v2identitiesupdateidentityrequestbody.d.ts +3 -7
  61. package/dist/commonjs/models/components/v2identitiesupdateidentityrequestbody.d.ts.map +1 -1
  62. package/dist/commonjs/models/components/v2identitiesupdateidentityrequestbody.js +2 -2
  63. package/dist/commonjs/models/components/v2identitiesupdateidentityrequestbody.js.map +1 -1
  64. package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
  65. package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
  66. package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
  67. package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
  68. package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
  69. package/dist/commonjs/models/components/v2keysaddrolesresponsebody.js.map +1 -1
  70. package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
  71. package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
  72. package/dist/commonjs/models/components/v2keysremoverolesresponsebody.js.map +1 -1
  73. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
  74. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
  75. package/dist/commonjs/models/components/{v2permissionsgetroleresponsedata.js → v2keysrerollkeyrequestbody.js} +21 -20
  76. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
  77. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
  78. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
  79. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js +73 -0
  80. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
  81. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
  82. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
  83. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js +71 -0
  84. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
  85. package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
  86. package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
  87. package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
  88. package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
  89. package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
  90. package/dist/commonjs/models/components/v2keyssetrolesresponsebody.js.map +1 -1
  91. package/dist/commonjs/models/components/v2permissionsgetpermissionresponsebody.d.ts +3 -6
  92. package/dist/commonjs/models/components/v2permissionsgetpermissionresponsebody.d.ts.map +1 -1
  93. package/dist/commonjs/models/components/v2permissionsgetpermissionresponsebody.js +3 -3
  94. package/dist/commonjs/models/components/v2permissionsgetpermissionresponsebody.js.map +1 -1
  95. package/dist/commonjs/models/components/v2permissionsgetroleresponsebody.d.ts +3 -6
  96. package/dist/commonjs/models/components/v2permissionsgetroleresponsebody.d.ts.map +1 -1
  97. package/dist/commonjs/models/components/v2permissionsgetroleresponsebody.js +3 -3
  98. package/dist/commonjs/models/components/v2permissionsgetroleresponsebody.js.map +1 -1
  99. package/dist/commonjs/sdk/apis.d.ts +4 -2
  100. package/dist/commonjs/sdk/apis.d.ts.map +1 -1
  101. package/dist/commonjs/sdk/apis.js +4 -2
  102. package/dist/commonjs/sdk/apis.js.map +1 -1
  103. package/dist/commonjs/sdk/identities.d.ts +2 -2
  104. package/dist/commonjs/sdk/identities.js +2 -2
  105. package/dist/commonjs/sdk/keys.d.ts +38 -0
  106. package/dist/commonjs/sdk/keys.d.ts.map +1 -1
  107. package/dist/commonjs/sdk/keys.js +41 -0
  108. package/dist/commonjs/sdk/keys.js.map +1 -1
  109. package/dist/commonjs/sdk/permissions.d.ts +4 -2
  110. package/dist/commonjs/sdk/permissions.d.ts.map +1 -1
  111. package/dist/commonjs/sdk/permissions.js +4 -2
  112. package/dist/commonjs/sdk/permissions.js.map +1 -1
  113. package/dist/esm/funcs/apisDeleteApi.d.ts +4 -2
  114. package/dist/esm/funcs/apisDeleteApi.d.ts.map +1 -1
  115. package/dist/esm/funcs/apisDeleteApi.js +4 -2
  116. package/dist/esm/funcs/apisDeleteApi.js.map +1 -1
  117. package/dist/esm/funcs/identitiesCreateIdentity.d.ts +2 -2
  118. package/dist/esm/funcs/identitiesCreateIdentity.js +2 -2
  119. package/dist/esm/funcs/keysRerollKey.d.ts +49 -0
  120. package/dist/esm/funcs/keysRerollKey.d.ts.map +1 -0
  121. package/dist/esm/funcs/keysRerollKey.js +123 -0
  122. package/dist/esm/funcs/keysRerollKey.js.map +1 -0
  123. package/dist/esm/funcs/permissionsListPermissions.d.ts +2 -1
  124. package/dist/esm/funcs/permissionsListPermissions.d.ts.map +1 -1
  125. package/dist/esm/funcs/permissionsListPermissions.js +2 -1
  126. package/dist/esm/funcs/permissionsListPermissions.js.map +1 -1
  127. package/dist/esm/funcs/permissionsListRoles.d.ts +2 -1
  128. package/dist/esm/funcs/permissionsListRoles.d.ts.map +1 -1
  129. package/dist/esm/funcs/permissionsListRoles.js +2 -1
  130. package/dist/esm/funcs/permissionsListRoles.js.map +1 -1
  131. package/dist/esm/lib/config.d.ts +3 -3
  132. package/dist/esm/lib/config.js +3 -3
  133. package/dist/esm/mcp-server/mcp-server.js +1 -1
  134. package/dist/esm/mcp-server/server.d.ts.map +1 -1
  135. package/dist/esm/mcp-server/server.js +3 -1
  136. package/dist/esm/mcp-server/server.js.map +1 -1
  137. package/dist/esm/mcp-server/tools/apisDeleteApi.d.ts.map +1 -1
  138. package/dist/esm/mcp-server/tools/apisDeleteApi.js +4 -2
  139. package/dist/esm/mcp-server/tools/apisDeleteApi.js.map +1 -1
  140. package/dist/esm/mcp-server/tools/identitiesCreateIdentity.js +2 -2
  141. package/dist/esm/mcp-server/tools/identitiesUpdateIdentity.js +2 -2
  142. package/dist/esm/mcp-server/tools/keysRerollKey.d.ts +8 -0
  143. package/dist/esm/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
  144. package/dist/esm/mcp-server/tools/keysRerollKey.js +60 -0
  145. package/dist/esm/mcp-server/tools/keysRerollKey.js.map +1 -0
  146. package/dist/esm/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
  147. package/dist/esm/mcp-server/tools/permissionsListPermissions.js +2 -1
  148. package/dist/esm/mcp-server/tools/permissionsListPermissions.js.map +1 -1
  149. package/dist/esm/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
  150. package/dist/esm/mcp-server/tools/permissionsListRoles.js +2 -1
  151. package/dist/esm/mcp-server/tools/permissionsListRoles.js.map +1 -1
  152. package/dist/esm/models/components/identity.d.ts +8 -2
  153. package/dist/esm/models/components/identity.d.ts.map +1 -1
  154. package/dist/esm/models/components/identity.js +2 -2
  155. package/dist/esm/models/components/identity.js.map +1 -1
  156. package/dist/esm/models/components/index.d.ts +3 -3
  157. package/dist/esm/models/components/index.d.ts.map +1 -1
  158. package/dist/esm/models/components/index.js +3 -3
  159. package/dist/esm/models/components/index.js.map +1 -1
  160. package/dist/esm/models/components/keyresponsedata.d.ts +0 -5
  161. package/dist/esm/models/components/keyresponsedata.d.ts.map +1 -1
  162. package/dist/esm/models/components/keyresponsedata.js +0 -2
  163. package/dist/esm/models/components/keyresponsedata.js.map +1 -1
  164. package/dist/esm/models/components/permission.d.ts +1 -1
  165. package/dist/esm/models/components/v2identitiesgetidentityresponsebody.d.ts +3 -3
  166. package/dist/esm/models/components/v2identitiesgetidentityresponsebody.d.ts.map +1 -1
  167. package/dist/esm/models/components/v2identitiesgetidentityresponsebody.js +3 -3
  168. package/dist/esm/models/components/v2identitiesgetidentityresponsebody.js.map +1 -1
  169. package/dist/esm/models/components/v2identitiesupdateidentityrequestbody.d.ts +3 -7
  170. package/dist/esm/models/components/v2identitiesupdateidentityrequestbody.d.ts.map +1 -1
  171. package/dist/esm/models/components/v2identitiesupdateidentityrequestbody.js +2 -2
  172. package/dist/esm/models/components/v2identitiesupdateidentityrequestbody.js.map +1 -1
  173. package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
  174. package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
  175. package/dist/esm/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
  176. package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
  177. package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
  178. package/dist/esm/models/components/v2keysaddrolesresponsebody.js.map +1 -1
  179. package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
  180. package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
  181. package/dist/esm/models/components/v2keysremoverolesresponsebody.js.map +1 -1
  182. package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
  183. package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
  184. package/dist/esm/models/components/v2keysrerollkeyrequestbody.js +33 -0
  185. package/dist/esm/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
  186. package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
  187. package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
  188. package/dist/esm/models/components/v2keysrerollkeyresponsebody.js +35 -0
  189. package/dist/esm/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
  190. package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
  191. package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
  192. package/dist/esm/models/components/v2keysrerollkeyresponsedata.js +33 -0
  193. package/dist/esm/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
  194. package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
  195. package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
  196. package/dist/esm/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
  197. package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
  198. package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
  199. package/dist/esm/models/components/v2keyssetrolesresponsebody.js.map +1 -1
  200. package/dist/esm/models/components/v2permissionsgetpermissionresponsebody.d.ts +3 -6
  201. package/dist/esm/models/components/v2permissionsgetpermissionresponsebody.d.ts.map +1 -1
  202. package/dist/esm/models/components/v2permissionsgetpermissionresponsebody.js +3 -3
  203. package/dist/esm/models/components/v2permissionsgetpermissionresponsebody.js.map +1 -1
  204. package/dist/esm/models/components/v2permissionsgetroleresponsebody.d.ts +3 -6
  205. package/dist/esm/models/components/v2permissionsgetroleresponsebody.d.ts.map +1 -1
  206. package/dist/esm/models/components/v2permissionsgetroleresponsebody.js +3 -3
  207. package/dist/esm/models/components/v2permissionsgetroleresponsebody.js.map +1 -1
  208. package/dist/esm/sdk/apis.d.ts +4 -2
  209. package/dist/esm/sdk/apis.d.ts.map +1 -1
  210. package/dist/esm/sdk/apis.js +4 -2
  211. package/dist/esm/sdk/apis.js.map +1 -1
  212. package/dist/esm/sdk/identities.d.ts +2 -2
  213. package/dist/esm/sdk/identities.js +2 -2
  214. package/dist/esm/sdk/keys.d.ts +38 -0
  215. package/dist/esm/sdk/keys.d.ts.map +1 -1
  216. package/dist/esm/sdk/keys.js +41 -0
  217. package/dist/esm/sdk/keys.js.map +1 -1
  218. package/dist/esm/sdk/permissions.d.ts +4 -2
  219. package/dist/esm/sdk/permissions.d.ts.map +1 -1
  220. package/dist/esm/sdk/permissions.js +4 -2
  221. package/dist/esm/sdk/permissions.js.map +1 -1
  222. package/docs/sdks/apis/README.md +6 -4
  223. package/docs/sdks/identities/README.md +6 -6
  224. package/docs/sdks/keys/README.md +113 -0
  225. package/docs/sdks/permissions/README.md +4 -2
  226. package/examples/apisCreateApi.example.ts +1 -1
  227. package/examples/package-lock.json +3 -3
  228. package/jsr.json +1 -1
  229. package/package.json +3 -3
  230. package/src/funcs/apisDeleteApi.ts +4 -2
  231. package/src/funcs/identitiesCreateIdentity.ts +2 -2
  232. package/src/funcs/keysRerollKey.ts +227 -0
  233. package/src/funcs/permissionsListPermissions.ts +2 -1
  234. package/src/funcs/permissionsListRoles.ts +2 -1
  235. package/src/lib/config.ts +3 -3
  236. package/src/mcp-server/mcp-server.ts +1 -1
  237. package/src/mcp-server/server.ts +3 -1
  238. package/src/mcp-server/tools/apisDeleteApi.ts +4 -2
  239. package/src/mcp-server/tools/identitiesCreateIdentity.ts +2 -2
  240. package/src/mcp-server/tools/identitiesUpdateIdentity.ts +2 -2
  241. package/src/mcp-server/tools/keysRerollKey.ts +69 -0
  242. package/src/mcp-server/tools/permissionsListPermissions.ts +2 -1
  243. package/src/mcp-server/tools/permissionsListRoles.ts +2 -1
  244. package/src/models/components/identity.ts +10 -4
  245. package/src/models/components/index.ts +3 -3
  246. package/src/models/components/keyresponsedata.ts +0 -7
  247. package/src/models/components/permission.ts +1 -1
  248. package/src/models/components/v2identitiesgetidentityresponsebody.ts +10 -10
  249. package/src/models/components/v2identitiesupdateidentityrequestbody.ts +5 -9
  250. package/src/models/components/v2keysaddpermissionsresponsebody.ts +0 -1
  251. package/src/models/components/v2keysaddrolesresponsebody.ts +0 -1
  252. package/src/models/components/v2keysremoverolesresponsebody.ts +0 -1
  253. package/src/models/components/v2keysrerollkeyrequestbody.ts +99 -0
  254. package/src/models/components/v2keysrerollkeyresponsebody.ts +87 -0
  255. package/src/models/components/v2keysrerollkeyresponsedata.ts +103 -0
  256. package/src/models/components/v2keyssetpermissionsresponsebody.ts +0 -1
  257. package/src/models/components/v2keyssetrolesresponsebody.ts +0 -1
  258. package/src/models/components/v2permissionsgetpermissionresponsebody.ts +9 -12
  259. package/src/models/components/v2permissionsgetroleresponsebody.ts +9 -12
  260. package/src/sdk/apis.ts +4 -2
  261. package/src/sdk/identities.ts +2 -2
  262. package/src/sdk/keys.ts +49 -0
  263. package/src/sdk/permissions.ts +4 -2
  264. package/dist/commonjs/models/components/v2identitiesgetidentityresponsedata.d.ts +0 -47
  265. package/dist/commonjs/models/components/v2identitiesgetidentityresponsedata.d.ts.map +0 -1
  266. package/dist/commonjs/models/components/v2identitiesgetidentityresponsedata.js +0 -74
  267. package/dist/commonjs/models/components/v2identitiesgetidentityresponsedata.js.map +0 -1
  268. package/dist/commonjs/models/components/v2permissionsgetpermissionresponsedata.d.ts +0 -33
  269. package/dist/commonjs/models/components/v2permissionsgetpermissionresponsedata.d.ts.map +0 -1
  270. package/dist/commonjs/models/components/v2permissionsgetpermissionresponsedata.js +0 -70
  271. package/dist/commonjs/models/components/v2permissionsgetpermissionresponsedata.js.map +0 -1
  272. package/dist/commonjs/models/components/v2permissionsgetroleresponsedata.d.ts +0 -33
  273. package/dist/commonjs/models/components/v2permissionsgetroleresponsedata.d.ts.map +0 -1
  274. package/dist/commonjs/models/components/v2permissionsgetroleresponsedata.js.map +0 -1
  275. package/dist/esm/models/components/v2identitiesgetidentityresponsedata.d.ts +0 -47
  276. package/dist/esm/models/components/v2identitiesgetidentityresponsedata.d.ts.map +0 -1
  277. package/dist/esm/models/components/v2identitiesgetidentityresponsedata.js +0 -36
  278. package/dist/esm/models/components/v2identitiesgetidentityresponsedata.js.map +0 -1
  279. package/dist/esm/models/components/v2permissionsgetpermissionresponsedata.d.ts +0 -33
  280. package/dist/esm/models/components/v2permissionsgetpermissionresponsedata.d.ts.map +0 -1
  281. package/dist/esm/models/components/v2permissionsgetpermissionresponsedata.js +0 -32
  282. package/dist/esm/models/components/v2permissionsgetpermissionresponsedata.js.map +0 -1
  283. package/dist/esm/models/components/v2permissionsgetroleresponsedata.d.ts +0 -33
  284. package/dist/esm/models/components/v2permissionsgetroleresponsedata.d.ts.map +0 -1
  285. package/dist/esm/models/components/v2permissionsgetroleresponsedata.js +0 -32
  286. package/dist/esm/models/components/v2permissionsgetroleresponsedata.js.map +0 -1
  287. package/src/models/components/v2identitiesgetidentityresponsedata.ts +0 -94
  288. package/src/models/components/v2permissionsgetpermissionresponsedata.ts +0 -81
  289. package/src/models/components/v2permissionsgetroleresponsedata.ts +0 -77
package/bin/mcp-server.js CHANGED
@@ -34269,9 +34269,9 @@ var init_config = __esm(() => {
34269
34269
  SDK_METADATA = {
34270
34270
  language: "typescript",
34271
34271
  openapiDocVersion: "2.0.0",
34272
- sdkVersion: "2.0.2",
34273
- genVersion: "2.672.0",
34274
- userAgent: "speakeasy-sdk/typescript 2.0.2 2.672.0 2.0.0 @unkey/api"
34272
+ sdkVersion: "2.0.4",
34273
+ genVersion: "2.683.1",
34274
+ userAgent: "speakeasy-sdk/typescript 2.0.4 2.683.1 2.0.0 @unkey/api"
34275
34275
  };
34276
34276
  });
34277
34277
 
@@ -35819,16 +35819,16 @@ var init_identity = __esm(() => {
35819
35819
  IdentityMeta$.outboundSchema = IdentityMeta$outboundSchema;
35820
35820
  })(IdentityMeta$ ||= {});
35821
35821
  Identity$inboundSchema = objectType({
35822
+ id: stringType(),
35822
35823
  externalId: stringType(),
35823
35824
  meta: lazyType(() => IdentityMeta$inboundSchema).optional(),
35824
- ratelimits: arrayType(RatelimitResponse$inboundSchema).optional(),
35825
- description: anyType().optional()
35825
+ ratelimits: arrayType(RatelimitResponse$inboundSchema).optional()
35826
35826
  });
35827
35827
  Identity$outboundSchema = objectType({
35828
+ id: stringType(),
35828
35829
  externalId: stringType(),
35829
35830
  meta: lazyType(() => IdentityMeta$outboundSchema).optional(),
35830
- ratelimits: arrayType(RatelimitResponse$outboundSchema).optional(),
35831
- description: anyType().optional()
35831
+ ratelimits: arrayType(RatelimitResponse$outboundSchema).optional()
35832
35832
  });
35833
35833
  ((Identity$) => {
35834
35834
  Identity$.inboundSchema = Identity$inboundSchema;
@@ -35901,7 +35901,6 @@ var init_keyresponsedata = __esm(() => {
35901
35901
  createdAt: numberType().int(),
35902
35902
  updatedAt: numberType().int().optional(),
35903
35903
  expires: numberType().int().optional(),
35904
- externalId: stringType().optional(),
35905
35904
  permissions: arrayType(stringType()).optional(),
35906
35905
  roles: arrayType(stringType()).optional(),
35907
35906
  credits: KeyCreditsData$inboundSchema.optional(),
@@ -35918,7 +35917,6 @@ var init_keyresponsedata = __esm(() => {
35918
35917
  createdAt: numberType().int(),
35919
35918
  updatedAt: numberType().int().optional(),
35920
35919
  expires: numberType().int().optional(),
35921
- externalId: stringType().optional(),
35922
35920
  permissions: arrayType(stringType()).optional(),
35923
35921
  roles: arrayType(stringType()).optional(),
35924
35922
  credits: KeyCreditsData$outboundSchema.optional(),
@@ -36406,40 +36404,19 @@ var init_v2identitiesgetidentityrequestbody = __esm(() => {
36406
36404
  })(V2IdentitiesGetIdentityRequestBody$ ||= {});
36407
36405
  });
36408
36406
 
36409
- // src/models/components/v2identitiesgetidentityresponsedata.ts
36410
- var V2IdentitiesGetIdentityResponseData$inboundSchema, V2IdentitiesGetIdentityResponseData$outboundSchema, V2IdentitiesGetIdentityResponseData$;
36411
- var init_v2identitiesgetidentityresponsedata = __esm(() => {
36412
- init_zod();
36413
- init_ratelimitresponse();
36414
- V2IdentitiesGetIdentityResponseData$inboundSchema = objectType({
36415
- externalId: stringType(),
36416
- meta: recordType(anyType()).optional(),
36417
- ratelimits: arrayType(RatelimitResponse$inboundSchema).optional()
36418
- });
36419
- V2IdentitiesGetIdentityResponseData$outboundSchema = objectType({
36420
- externalId: stringType(),
36421
- meta: recordType(anyType()).optional(),
36422
- ratelimits: arrayType(RatelimitResponse$outboundSchema).optional()
36423
- });
36424
- ((V2IdentitiesGetIdentityResponseData$) => {
36425
- V2IdentitiesGetIdentityResponseData$.inboundSchema = V2IdentitiesGetIdentityResponseData$inboundSchema;
36426
- V2IdentitiesGetIdentityResponseData$.outboundSchema = V2IdentitiesGetIdentityResponseData$outboundSchema;
36427
- })(V2IdentitiesGetIdentityResponseData$ ||= {});
36428
- });
36429
-
36430
36407
  // src/models/components/v2identitiesgetidentityresponsebody.ts
36431
36408
  var V2IdentitiesGetIdentityResponseBody$inboundSchema, V2IdentitiesGetIdentityResponseBody$outboundSchema, V2IdentitiesGetIdentityResponseBody$;
36432
36409
  var init_v2identitiesgetidentityresponsebody = __esm(() => {
36433
36410
  init_zod();
36411
+ init_identity();
36434
36412
  init_meta();
36435
- init_v2identitiesgetidentityresponsedata();
36436
36413
  V2IdentitiesGetIdentityResponseBody$inboundSchema = objectType({
36437
36414
  meta: Meta$inboundSchema,
36438
- data: V2IdentitiesGetIdentityResponseData$inboundSchema
36415
+ data: Identity$inboundSchema
36439
36416
  });
36440
36417
  V2IdentitiesGetIdentityResponseBody$outboundSchema = objectType({
36441
36418
  meta: Meta$outboundSchema,
36442
- data: V2IdentitiesGetIdentityResponseData$outboundSchema
36419
+ data: Identity$outboundSchema
36443
36420
  });
36444
36421
  ((V2IdentitiesGetIdentityResponseBody$) => {
36445
36422
  V2IdentitiesGetIdentityResponseBody$.inboundSchema = V2IdentitiesGetIdentityResponseBody$inboundSchema;
@@ -36494,12 +36471,12 @@ var init_v2identitiesupdateidentityrequestbody = __esm(() => {
36494
36471
  init_zod();
36495
36472
  init_ratelimitrequest();
36496
36473
  V2IdentitiesUpdateIdentityRequestBody$inboundSchema = objectType({
36497
- externalId: stringType(),
36474
+ identity: stringType(),
36498
36475
  meta: recordType(anyType()).optional(),
36499
36476
  ratelimits: arrayType(RatelimitRequest$inboundSchema).optional()
36500
36477
  });
36501
36478
  V2IdentitiesUpdateIdentityRequestBody$outboundSchema = objectType({
36502
- externalId: stringType(),
36479
+ identity: stringType(),
36503
36480
  meta: recordType(anyType()).optional(),
36504
36481
  ratelimits: arrayType(RatelimitRequest$outboundSchema).optional()
36505
36482
  });
@@ -36837,6 +36814,62 @@ var init_v2keysremoverolesresponsebody = __esm(() => {
36837
36814
  })(V2KeysRemoveRolesResponseBody$ ||= {});
36838
36815
  });
36839
36816
 
36817
+ // src/models/components/v2keysrerollkeyrequestbody.ts
36818
+ var V2KeysRerollKeyRequestBody$inboundSchema, V2KeysRerollKeyRequestBody$outboundSchema, V2KeysRerollKeyRequestBody$;
36819
+ var init_v2keysrerollkeyrequestbody = __esm(() => {
36820
+ init_zod();
36821
+ V2KeysRerollKeyRequestBody$inboundSchema = objectType({
36822
+ keyId: stringType(),
36823
+ expiration: numberType().int()
36824
+ });
36825
+ V2KeysRerollKeyRequestBody$outboundSchema = objectType({
36826
+ keyId: stringType(),
36827
+ expiration: numberType().int()
36828
+ });
36829
+ ((V2KeysRerollKeyRequestBody$) => {
36830
+ V2KeysRerollKeyRequestBody$.inboundSchema = V2KeysRerollKeyRequestBody$inboundSchema;
36831
+ V2KeysRerollKeyRequestBody$.outboundSchema = V2KeysRerollKeyRequestBody$outboundSchema;
36832
+ })(V2KeysRerollKeyRequestBody$ ||= {});
36833
+ });
36834
+
36835
+ // src/models/components/v2keysrerollkeyresponsedata.ts
36836
+ var V2KeysRerollKeyResponseData$inboundSchema, V2KeysRerollKeyResponseData$outboundSchema, V2KeysRerollKeyResponseData$;
36837
+ var init_v2keysrerollkeyresponsedata = __esm(() => {
36838
+ init_zod();
36839
+ V2KeysRerollKeyResponseData$inboundSchema = objectType({
36840
+ keyId: stringType(),
36841
+ key: stringType()
36842
+ });
36843
+ V2KeysRerollKeyResponseData$outboundSchema = objectType({
36844
+ keyId: stringType(),
36845
+ key: stringType()
36846
+ });
36847
+ ((V2KeysRerollKeyResponseData$) => {
36848
+ V2KeysRerollKeyResponseData$.inboundSchema = V2KeysRerollKeyResponseData$inboundSchema;
36849
+ V2KeysRerollKeyResponseData$.outboundSchema = V2KeysRerollKeyResponseData$outboundSchema;
36850
+ })(V2KeysRerollKeyResponseData$ ||= {});
36851
+ });
36852
+
36853
+ // src/models/components/v2keysrerollkeyresponsebody.ts
36854
+ var V2KeysRerollKeyResponseBody$inboundSchema, V2KeysRerollKeyResponseBody$outboundSchema, V2KeysRerollKeyResponseBody$;
36855
+ var init_v2keysrerollkeyresponsebody = __esm(() => {
36856
+ init_zod();
36857
+ init_meta();
36858
+ init_v2keysrerollkeyresponsedata();
36859
+ V2KeysRerollKeyResponseBody$inboundSchema = objectType({
36860
+ meta: Meta$inboundSchema,
36861
+ data: V2KeysRerollKeyResponseData$inboundSchema
36862
+ });
36863
+ V2KeysRerollKeyResponseBody$outboundSchema = objectType({
36864
+ meta: Meta$outboundSchema,
36865
+ data: V2KeysRerollKeyResponseData$outboundSchema
36866
+ });
36867
+ ((V2KeysRerollKeyResponseBody$) => {
36868
+ V2KeysRerollKeyResponseBody$.inboundSchema = V2KeysRerollKeyResponseBody$inboundSchema;
36869
+ V2KeysRerollKeyResponseBody$.outboundSchema = V2KeysRerollKeyResponseBody$outboundSchema;
36870
+ })(V2KeysRerollKeyResponseBody$ ||= {});
36871
+ });
36872
+
36840
36873
  // src/models/components/v2keyssetpermissionsrequestbody.ts
36841
36874
  var V2KeysSetPermissionsRequestBody$inboundSchema, V2KeysSetPermissionsRequestBody$outboundSchema, V2KeysSetPermissionsRequestBody$;
36842
36875
  var init_v2keyssetpermissionsrequestbody = __esm(() => {
@@ -37387,36 +37420,19 @@ var init_v2permissionsgetpermissionrequestbody = __esm(() => {
37387
37420
  })(V2PermissionsGetPermissionRequestBody$ ||= {});
37388
37421
  });
37389
37422
 
37390
- // src/models/components/v2permissionsgetpermissionresponsedata.ts
37391
- var V2PermissionsGetPermissionResponseData$inboundSchema, V2PermissionsGetPermissionResponseData$outboundSchema, V2PermissionsGetPermissionResponseData$;
37392
- var init_v2permissionsgetpermissionresponsedata = __esm(() => {
37393
- init_zod();
37394
- init_permission();
37395
- V2PermissionsGetPermissionResponseData$inboundSchema = objectType({
37396
- permission: Permission$inboundSchema
37397
- });
37398
- V2PermissionsGetPermissionResponseData$outboundSchema = objectType({
37399
- permission: Permission$outboundSchema
37400
- });
37401
- ((V2PermissionsGetPermissionResponseData$) => {
37402
- V2PermissionsGetPermissionResponseData$.inboundSchema = V2PermissionsGetPermissionResponseData$inboundSchema;
37403
- V2PermissionsGetPermissionResponseData$.outboundSchema = V2PermissionsGetPermissionResponseData$outboundSchema;
37404
- })(V2PermissionsGetPermissionResponseData$ ||= {});
37405
- });
37406
-
37407
37423
  // src/models/components/v2permissionsgetpermissionresponsebody.ts
37408
37424
  var V2PermissionsGetPermissionResponseBody$inboundSchema, V2PermissionsGetPermissionResponseBody$outboundSchema, V2PermissionsGetPermissionResponseBody$;
37409
37425
  var init_v2permissionsgetpermissionresponsebody = __esm(() => {
37410
37426
  init_zod();
37411
37427
  init_meta();
37412
- init_v2permissionsgetpermissionresponsedata();
37428
+ init_permission();
37413
37429
  V2PermissionsGetPermissionResponseBody$inboundSchema = objectType({
37414
37430
  meta: Meta$inboundSchema,
37415
- data: V2PermissionsGetPermissionResponseData$inboundSchema
37431
+ data: Permission$inboundSchema
37416
37432
  });
37417
37433
  V2PermissionsGetPermissionResponseBody$outboundSchema = objectType({
37418
37434
  meta: Meta$outboundSchema,
37419
- data: V2PermissionsGetPermissionResponseData$outboundSchema
37435
+ data: Permission$outboundSchema
37420
37436
  });
37421
37437
  ((V2PermissionsGetPermissionResponseBody$) => {
37422
37438
  V2PermissionsGetPermissionResponseBody$.inboundSchema = V2PermissionsGetPermissionResponseBody$inboundSchema;
@@ -37440,36 +37456,19 @@ var init_v2permissionsgetrolerequestbody = __esm(() => {
37440
37456
  })(V2PermissionsGetRoleRequestBody$ ||= {});
37441
37457
  });
37442
37458
 
37443
- // src/models/components/v2permissionsgetroleresponsedata.ts
37444
- var V2PermissionsGetRoleResponseData$inboundSchema, V2PermissionsGetRoleResponseData$outboundSchema, V2PermissionsGetRoleResponseData$;
37445
- var init_v2permissionsgetroleresponsedata = __esm(() => {
37446
- init_zod();
37447
- init_role();
37448
- V2PermissionsGetRoleResponseData$inboundSchema = objectType({
37449
- role: Role$inboundSchema
37450
- });
37451
- V2PermissionsGetRoleResponseData$outboundSchema = objectType({
37452
- role: Role$outboundSchema
37453
- });
37454
- ((V2PermissionsGetRoleResponseData$) => {
37455
- V2PermissionsGetRoleResponseData$.inboundSchema = V2PermissionsGetRoleResponseData$inboundSchema;
37456
- V2PermissionsGetRoleResponseData$.outboundSchema = V2PermissionsGetRoleResponseData$outboundSchema;
37457
- })(V2PermissionsGetRoleResponseData$ ||= {});
37458
- });
37459
-
37460
37459
  // src/models/components/v2permissionsgetroleresponsebody.ts
37461
37460
  var V2PermissionsGetRoleResponseBody$inboundSchema, V2PermissionsGetRoleResponseBody$outboundSchema, V2PermissionsGetRoleResponseBody$;
37462
37461
  var init_v2permissionsgetroleresponsebody = __esm(() => {
37463
37462
  init_zod();
37464
37463
  init_meta();
37465
- init_v2permissionsgetroleresponsedata();
37464
+ init_role();
37466
37465
  V2PermissionsGetRoleResponseBody$inboundSchema = objectType({
37467
37466
  meta: Meta$inboundSchema,
37468
- data: V2PermissionsGetRoleResponseData$inboundSchema
37467
+ data: Role$inboundSchema
37469
37468
  });
37470
37469
  V2PermissionsGetRoleResponseBody$outboundSchema = objectType({
37471
37470
  meta: Meta$outboundSchema,
37472
- data: V2PermissionsGetRoleResponseData$outboundSchema
37471
+ data: Role$outboundSchema
37473
37472
  });
37474
37473
  ((V2PermissionsGetRoleResponseBody$) => {
37475
37474
  V2PermissionsGetRoleResponseBody$.inboundSchema = V2PermissionsGetRoleResponseBody$inboundSchema;
@@ -37852,7 +37851,6 @@ var init_components = __esm(() => {
37852
37851
  init_v2identitiesdeleteidentityresponsebody();
37853
37852
  init_v2identitiesgetidentityrequestbody();
37854
37853
  init_v2identitiesgetidentityresponsebody();
37855
- init_v2identitiesgetidentityresponsedata();
37856
37854
  init_v2identitieslistidentitiesrequestbody();
37857
37855
  init_v2identitieslistidentitiesresponsebody();
37858
37856
  init_v2identitiesupdateidentityrequestbody();
@@ -37872,6 +37870,9 @@ var init_components = __esm(() => {
37872
37870
  init_v2keysremovepermissionsresponsebody();
37873
37871
  init_v2keysremoverolesrequestbody();
37874
37872
  init_v2keysremoverolesresponsebody();
37873
+ init_v2keysrerollkeyrequestbody();
37874
+ init_v2keysrerollkeyresponsebody();
37875
+ init_v2keysrerollkeyresponsedata();
37875
37876
  init_v2keyssetpermissionsrequestbody();
37876
37877
  init_v2keyssetpermissionsresponsebody();
37877
37878
  init_v2keyssetrolesrequestbody();
@@ -37897,10 +37898,8 @@ var init_components = __esm(() => {
37897
37898
  init_v2permissionsdeleteroleresponsebody();
37898
37899
  init_v2permissionsgetpermissionrequestbody();
37899
37900
  init_v2permissionsgetpermissionresponsebody();
37900
- init_v2permissionsgetpermissionresponsedata();
37901
37901
  init_v2permissionsgetrolerequestbody();
37902
37902
  init_v2permissionsgetroleresponsebody();
37903
- init_v2permissionsgetroleresponsedata();
37904
37903
  init_v2permissionslistpermissionsrequestbody();
37905
37904
  init_v2permissionslistpermissionsresponsebody();
37906
37905
  init_v2permissionslistrolesrequestbody();
@@ -38477,9 +38476,11 @@ var init_apisDeleteApi2 = __esm(() => {
38477
38476
 
38478
38477
  Permanently delete an API namespace and immediately invalidate all associated keys.
38479
38478
 
38480
- Use this for cleaning up development environments, retiring deprecated services, or removing unused resources. All keys in the namespace are immediately marked as deleted and will fail verification with \`code=NOT_FOUND\`.
38479
+ Use this for cleaning up development environments, retiring deprecated services, or removing unused resources.
38480
+ All keys in the namespace are immediately marked as deleted and will fail verification with \`code=NOT_FOUND\`.
38481
38481
 
38482
- **Important**: This operation is immediate and permanent. Verify you have the correct API ID before deletion. If delete protection is enabled, disable it first through the dashboard or API configuration.
38482
+ **Important**: This operation is immediate and permanent. Verify you have the correct API ID before deletion.
38483
+ If delete protection is enabled, disable it first through the dashboard or API configuration.
38483
38484
 
38484
38485
  **Required Permissions**
38485
38486
 
@@ -38852,8 +38853,8 @@ Create an identity to group multiple API keys under a single entity. Identities
38852
38853
 
38853
38854
  Perfect for users with multiple devices, organizations with multiple API keys, or when you need unified rate limiting across different services.
38854
38855
 
38855
- > **Important**
38856
- > Requires \`identity.*.create_identity\` permission
38856
+ **Important**
38857
+ Requires \`identity.*.create_identity\` permission
38857
38858
  `,
38858
38859
  args: args5,
38859
38860
  tool: async (client, args6, ctx) => {
@@ -39423,8 +39424,8 @@ Update an identity's metadata and rate limits. Only specified fields are modifie
39423
39424
 
39424
39425
  Perfect for subscription changes, plan upgrades, or updating user information. Changes take effect immediately.
39425
39426
 
39426
- > **Important**
39427
- > Requires \`identity.*.update_identity\` permission
39427
+ > **Important**
39428
+ > Requires \`identity.*.update_identity\` permission
39428
39429
  > Rate limit changes propagate within 30 seconds
39429
39430
  `,
39430
39431
  args: args9,
@@ -40327,11 +40328,155 @@ Invalidates the key cache for immediate effect, and makes role changes available
40327
40328
  };
40328
40329
  });
40329
40330
 
40330
- // src/funcs/keysSetPermissions.ts
40331
- function keysSetPermissions(client, request, options) {
40331
+ // src/funcs/keysRerollKey.ts
40332
+ function keysRerollKey(client, request, options) {
40332
40333
  return new APIPromise($do17(client, request, options));
40333
40334
  }
40334
40335
  async function $do17(client, request, options) {
40336
+ const parsed = safeParse(request, (value) => V2KeysRerollKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40337
+ if (!parsed.ok) {
40338
+ return [parsed, { status: "invalid" }];
40339
+ }
40340
+ const payload = parsed.value;
40341
+ const body = encodeJSON("body", payload, { explode: true });
40342
+ const path = pathToFunc("/v2/keys.rerollKey")();
40343
+ const headers = new Headers(compactMap({
40344
+ "Content-Type": "application/json",
40345
+ Accept: "application/json"
40346
+ }));
40347
+ const secConfig = await extractSecurity(client._options.rootKey);
40348
+ const securityInput = secConfig == null ? {} : { rootKey: secConfig };
40349
+ const requestSecurity = resolveGlobalSecurity(securityInput);
40350
+ const context = {
40351
+ options: client._options,
40352
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
40353
+ operationID: "rerollKey",
40354
+ oAuth2Scopes: [],
40355
+ resolvedSecurity: requestSecurity,
40356
+ securitySource: client._options.rootKey,
40357
+ retryConfig: options?.retries || client._options.retryConfig || {
40358
+ strategy: "backoff",
40359
+ backoff: {
40360
+ initialInterval: 50,
40361
+ maxInterval: 1000,
40362
+ exponent: 1.5,
40363
+ maxElapsedTime: 1e4
40364
+ },
40365
+ retryConnectionErrors: true
40366
+ },
40367
+ retryCodes: options?.retryCodes || ["5XX"]
40368
+ };
40369
+ const requestRes = client._createRequest(context, {
40370
+ security: requestSecurity,
40371
+ method: "POST",
40372
+ baseURL: options?.serverURL,
40373
+ path,
40374
+ headers,
40375
+ body,
40376
+ userAgent: client._options.userAgent,
40377
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
40378
+ }, options);
40379
+ if (!requestRes.ok) {
40380
+ return [requestRes, { status: "invalid" }];
40381
+ }
40382
+ const req = requestRes.value;
40383
+ const doResult = await client._do(req, {
40384
+ context,
40385
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
40386
+ retryConfig: context.retryConfig,
40387
+ retryCodes: context.retryCodes
40388
+ });
40389
+ if (!doResult.ok) {
40390
+ return [doResult, { status: "request-error", request: req }];
40391
+ }
40392
+ const response = doResult.value;
40393
+ const responseFields = {
40394
+ HttpMeta: { Response: response, Request: req }
40395
+ };
40396
+ const [result] = await match(json(200, V2KeysRerollKeyResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
40397
+ if (!result.ok) {
40398
+ return [result, { status: "complete", request: req, response }];
40399
+ }
40400
+ return [result, { status: "complete", request: req, response }];
40401
+ }
40402
+ var init_keysRerollKey = __esm(() => {
40403
+ init_encodings();
40404
+ init_matchers();
40405
+ init_primitives();
40406
+ init_schemas();
40407
+ init_security();
40408
+ init_url();
40409
+ init_components();
40410
+ init_errors2();
40411
+ init_async();
40412
+ });
40413
+
40414
+ // src/mcp-server/tools/keysRerollKey.ts
40415
+ var args17, tool$keysRerollKey;
40416
+ var init_keysRerollKey2 = __esm(() => {
40417
+ init_keysRerollKey();
40418
+ init_components();
40419
+ init_tools();
40420
+ args17 = {
40421
+ request: V2KeysRerollKeyRequestBody$inboundSchema
40422
+ };
40423
+ tool$keysRerollKey = {
40424
+ name: "keys-reroll-key",
40425
+ description: `Reroll Key
40426
+
40427
+ Generate a new API key while preserving the configuration from an existing key.
40428
+
40429
+ This operation creates a fresh key with a new token while maintaining all settings from the original key:
40430
+ - Permissions and roles
40431
+ - Custom metadata
40432
+ - Rate limit configurations
40433
+ - Identity associations
40434
+ - Remaining credits
40435
+ - Recovery settings
40436
+
40437
+ **Key Generation:**
40438
+ - The system attempts to extract the prefix from the original key
40439
+ - If prefix extraction fails, the default API prefix is used
40440
+ - Key length follows the API's default byte configuration (or 16 bytes if not specified)
40441
+
40442
+ **Original Key Handling:**
40443
+ - The original key will be revoked after the duration specified in \`expiration\`
40444
+ - Set \`expiration\` to 0 to revoke immediately
40445
+ - This allows for graceful key rotation with an overlap period
40446
+
40447
+ Common use cases include:
40448
+ - Rotating keys for security compliance
40449
+ - Issuing replacement keys for compromised credentials
40450
+ - Creating backup keys with identical permissions
40451
+
40452
+ **Important:** Analytics and usage metrics are tracked at both the key level AND identity level. If the original key has an identity, the new key will inherit it, allowing you to track usage across both individual keys and the overall identity.
40453
+
40454
+ **Required Permissions**
40455
+
40456
+ Your root key must have:
40457
+ - \`api.*.create_key\` or \`api.<api_id>.create_key\`
40458
+ - \`api.*.encrypt_key\` or \`api.<api_id>.encrypt_key\` (only when the original key is recoverable)
40459
+ `,
40460
+ args: args17,
40461
+ tool: async (client, args18, ctx) => {
40462
+ const [result, apiCall] = await keysRerollKey(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40463
+ if (!result.ok) {
40464
+ return {
40465
+ content: [{ type: "text", text: result.error.message }],
40466
+ isError: true
40467
+ };
40468
+ }
40469
+ const value = result.value;
40470
+ return formatResult(value, apiCall);
40471
+ }
40472
+ };
40473
+ });
40474
+
40475
+ // src/funcs/keysSetPermissions.ts
40476
+ function keysSetPermissions(client, request, options) {
40477
+ return new APIPromise($do18(client, request, options));
40478
+ }
40479
+ async function $do18(client, request, options) {
40335
40480
  const parsed = safeParse(request, (value) => V2KeysSetPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
40336
40481
  if (!parsed.ok) {
40337
40482
  return [parsed, { status: "invalid" }];
@@ -40411,12 +40556,12 @@ var init_keysSetPermissions = __esm(() => {
40411
40556
  });
40412
40557
 
40413
40558
  // src/mcp-server/tools/keysSetPermissions.ts
40414
- var args17, tool$keysSetPermissions;
40559
+ var args18, tool$keysSetPermissions;
40415
40560
  var init_keysSetPermissions2 = __esm(() => {
40416
40561
  init_keysSetPermissions();
40417
40562
  init_components();
40418
40563
  init_tools();
40419
- args17 = {
40564
+ args18 = {
40420
40565
  request: V2KeysSetPermissionsRequestBody$inboundSchema
40421
40566
  };
40422
40567
  tool$keysSetPermissions = {
@@ -40439,9 +40584,9 @@ Your root key must have one of the following permissions:
40439
40584
 
40440
40585
  Invalidates the key cache for immediate effect, and makes permission changes available for verification within 30 seconds across all regions.
40441
40586
  `,
40442
- args: args17,
40443
- tool: async (client, args18, ctx) => {
40444
- const [result, apiCall] = await keysSetPermissions(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40587
+ args: args18,
40588
+ tool: async (client, args19, ctx) => {
40589
+ const [result, apiCall] = await keysSetPermissions(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40445
40590
  if (!result.ok) {
40446
40591
  return {
40447
40592
  content: [{ type: "text", text: result.error.message }],
@@ -40456,9 +40601,9 @@ Invalidates the key cache for immediate effect, and makes permission changes ava
40456
40601
 
40457
40602
  // src/funcs/keysSetRoles.ts
40458
40603
  function keysSetRoles(client, request, options) {
40459
- return new APIPromise($do18(client, request, options));
40604
+ return new APIPromise($do19(client, request, options));
40460
40605
  }
40461
- async function $do18(client, request, options) {
40606
+ async function $do19(client, request, options) {
40462
40607
  const parsed = safeParse(request, (value) => V2KeysSetRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
40463
40608
  if (!parsed.ok) {
40464
40609
  return [parsed, { status: "invalid" }];
@@ -40538,12 +40683,12 @@ var init_keysSetRoles = __esm(() => {
40538
40683
  });
40539
40684
 
40540
40685
  // src/mcp-server/tools/keysSetRoles.ts
40541
- var args18, tool$keysSetRoles;
40686
+ var args19, tool$keysSetRoles;
40542
40687
  var init_keysSetRoles2 = __esm(() => {
40543
40688
  init_keysSetRoles();
40544
40689
  init_components();
40545
40690
  init_tools();
40546
- args18 = {
40691
+ args19 = {
40547
40692
  request: V2KeysSetRolesRequestBody$inboundSchema
40548
40693
  };
40549
40694
  tool$keysSetRoles = {
@@ -40566,9 +40711,9 @@ Your root key must have one of the following permissions:
40566
40711
 
40567
40712
  Invalidates the key cache for immediate effect, and makes role changes available for verification within 30 seconds across all regions.
40568
40713
  `,
40569
- args: args18,
40570
- tool: async (client, args19, ctx) => {
40571
- const [result, apiCall] = await keysSetRoles(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40714
+ args: args19,
40715
+ tool: async (client, args20, ctx) => {
40716
+ const [result, apiCall] = await keysSetRoles(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40572
40717
  if (!result.ok) {
40573
40718
  return {
40574
40719
  content: [{ type: "text", text: result.error.message }],
@@ -40583,9 +40728,9 @@ Invalidates the key cache for immediate effect, and makes role changes available
40583
40728
 
40584
40729
  // src/funcs/keysUpdateCredits.ts
40585
40730
  function keysUpdateCredits(client, request, options) {
40586
- return new APIPromise($do19(client, request, options));
40731
+ return new APIPromise($do20(client, request, options));
40587
40732
  }
40588
- async function $do19(client, request, options) {
40733
+ async function $do20(client, request, options) {
40589
40734
  const parsed = safeParse(request, (value) => V2KeysUpdateCreditsRequestBody$outboundSchema.parse(value), "Input validation failed");
40590
40735
  if (!parsed.ok) {
40591
40736
  return [parsed, { status: "invalid" }];
@@ -40665,12 +40810,12 @@ var init_keysUpdateCredits = __esm(() => {
40665
40810
  });
40666
40811
 
40667
40812
  // src/mcp-server/tools/keysUpdateCredits.ts
40668
- var args19, tool$keysUpdateCredits;
40813
+ var args20, tool$keysUpdateCredits;
40669
40814
  var init_keysUpdateCredits2 = __esm(() => {
40670
40815
  init_keysUpdateCredits();
40671
40816
  init_components();
40672
40817
  init_tools();
40673
- args19 = {
40818
+ args20 = {
40674
40819
  request: V2KeysUpdateCreditsRequestBody$inboundSchema
40675
40820
  };
40676
40821
  tool$keysUpdateCredits = {
@@ -40693,9 +40838,9 @@ Your root key must have one of the following permissions:
40693
40838
 
40694
40839
  Credit updates remove the key from cache immediately. Setting credits to unlimited automatically clears any existing refill settings. Changes take effect instantly but may take up to 30 seconds to propagate to all edge regions.
40695
40840
  `,
40696
- args: args19,
40697
- tool: async (client, args20, ctx) => {
40698
- const [result, apiCall] = await keysUpdateCredits(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40841
+ args: args20,
40842
+ tool: async (client, args21, ctx) => {
40843
+ const [result, apiCall] = await keysUpdateCredits(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40699
40844
  if (!result.ok) {
40700
40845
  return {
40701
40846
  content: [{ type: "text", text: result.error.message }],
@@ -40710,9 +40855,9 @@ Credit updates remove the key from cache immediately. Setting credits to unlimit
40710
40855
 
40711
40856
  // src/funcs/keysUpdateKey.ts
40712
40857
  function keysUpdateKey(client, request, options) {
40713
- return new APIPromise($do20(client, request, options));
40858
+ return new APIPromise($do21(client, request, options));
40714
40859
  }
40715
- async function $do20(client, request, options) {
40860
+ async function $do21(client, request, options) {
40716
40861
  const parsed = safeParse(request, (value) => V2KeysUpdateKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40717
40862
  if (!parsed.ok) {
40718
40863
  return [parsed, { status: "invalid" }];
@@ -40792,12 +40937,12 @@ var init_keysUpdateKey = __esm(() => {
40792
40937
  });
40793
40938
 
40794
40939
  // src/mcp-server/tools/keysUpdateKey.ts
40795
- var args20, tool$keysUpdateKey;
40940
+ var args21, tool$keysUpdateKey;
40796
40941
  var init_keysUpdateKey2 = __esm(() => {
40797
40942
  init_keysUpdateKey();
40798
40943
  init_components();
40799
40944
  init_tools();
40800
- args20 = {
40945
+ args21 = {
40801
40946
  request: V2KeysUpdateKeyRequestBody$inboundSchema
40802
40947
  };
40803
40948
  tool$keysUpdateKey = {
@@ -40820,9 +40965,9 @@ Your root key must have one of the following permissions:
40820
40965
 
40821
40966
  If you specify an \`externalId\` that doesn't exist, a new identity will be automatically created and linked to the key. Permission updates will auto-create any permissions that don't exist in your workspace. Changes take effect immediately but may take up to 30 seconds to propagate to all edge regions due to cache invalidation.
40822
40967
  `,
40823
- args: args20,
40824
- tool: async (client, args21, ctx) => {
40825
- const [result, apiCall] = await keysUpdateKey(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40968
+ args: args21,
40969
+ tool: async (client, args22, ctx) => {
40970
+ const [result, apiCall] = await keysUpdateKey(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40826
40971
  if (!result.ok) {
40827
40972
  return {
40828
40973
  content: [{ type: "text", text: result.error.message }],
@@ -40837,9 +40982,9 @@ If you specify an \`externalId\` that doesn't exist, a new identity will be auto
40837
40982
 
40838
40983
  // src/funcs/keysVerifyKey.ts
40839
40984
  function keysVerifyKey(client, request, options) {
40840
- return new APIPromise($do21(client, request, options));
40985
+ return new APIPromise($do22(client, request, options));
40841
40986
  }
40842
- async function $do21(client, request, options) {
40987
+ async function $do22(client, request, options) {
40843
40988
  const parsed = safeParse(request, (value) => V2KeysVerifyKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40844
40989
  if (!parsed.ok) {
40845
40990
  return [parsed, { status: "invalid" }];
@@ -40919,12 +41064,12 @@ var init_keysVerifyKey = __esm(() => {
40919
41064
  });
40920
41065
 
40921
41066
  // src/mcp-server/tools/keysVerifyKey.ts
40922
- var args21, tool$keysVerifyKey;
41067
+ var args22, tool$keysVerifyKey;
40923
41068
  var init_keysVerifyKey2 = __esm(() => {
40924
41069
  init_keysVerifyKey();
40925
41070
  init_components();
40926
41071
  init_tools();
40927
- args21 = {
41072
+ args22 = {
40928
41073
  request: V2KeysVerifyKeyRequestBody$inboundSchema
40929
41074
  };
40930
41075
  tool$keysVerifyKey = {
@@ -40950,9 +41095,9 @@ Your root key needs one of:
40950
41095
 
40951
41096
  If you are getting a NOT_FOUND error, ensure your root key has the required verify key permissions.
40952
41097
  `,
40953
- args: args21,
40954
- tool: async (client, args22, ctx) => {
40955
- const [result, apiCall] = await keysVerifyKey(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41098
+ args: args22,
41099
+ tool: async (client, args23, ctx) => {
41100
+ const [result, apiCall] = await keysVerifyKey(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40956
41101
  if (!result.ok) {
40957
41102
  return {
40958
41103
  content: [{ type: "text", text: result.error.message }],
@@ -40967,9 +41112,9 @@ If you are getting a NOT_FOUND error, ensure your root key has the required veri
40967
41112
 
40968
41113
  // src/funcs/keysWhoami.ts
40969
41114
  function keysWhoami(client, request, options) {
40970
- return new APIPromise($do22(client, request, options));
41115
+ return new APIPromise($do23(client, request, options));
40971
41116
  }
40972
- async function $do22(client, request, options) {
41117
+ async function $do23(client, request, options) {
40973
41118
  const parsed = safeParse(request, (value) => V2KeysWhoamiRequestBody$outboundSchema.parse(value), "Input validation failed");
40974
41119
  if (!parsed.ok) {
40975
41120
  return [parsed, { status: "invalid" }];
@@ -41049,12 +41194,12 @@ var init_keysWhoami = __esm(() => {
41049
41194
  });
41050
41195
 
41051
41196
  // src/mcp-server/tools/keysWhoami.ts
41052
- var args22, tool$keysWhoami;
41197
+ var args23, tool$keysWhoami;
41053
41198
  var init_keysWhoami2 = __esm(() => {
41054
41199
  init_keysWhoami();
41055
41200
  init_components();
41056
41201
  init_tools();
41057
- args22 = {
41202
+ args23 = {
41058
41203
  request: V2KeysWhoamiRequestBody$inboundSchema
41059
41204
  };
41060
41205
  tool$keysWhoami = {
@@ -41071,9 +41216,9 @@ Your root key must have one of the following permissions for basic key informati
41071
41216
 
41072
41217
  If your rootkey lacks permissions but the key exists, we may return a 404 status here to prevent leaking the existance of a key to unauthorized clients. If you believe that a key should exist, but receive a 404, please double check your root key has the correct permissions.
41073
41218
  `,
41074
- args: args22,
41075
- tool: async (client, args23, ctx) => {
41076
- const [result, apiCall] = await keysWhoami(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41219
+ args: args23,
41220
+ tool: async (client, args24, ctx) => {
41221
+ const [result, apiCall] = await keysWhoami(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41077
41222
  if (!result.ok) {
41078
41223
  return {
41079
41224
  content: [{ type: "text", text: result.error.message }],
@@ -41088,9 +41233,9 @@ If your rootkey lacks permissions but the key exists, we may return a 404 status
41088
41233
 
41089
41234
  // src/funcs/permissionsCreatePermission.ts
41090
41235
  function permissionsCreatePermission(client, request, options) {
41091
- return new APIPromise($do23(client, request, options));
41236
+ return new APIPromise($do24(client, request, options));
41092
41237
  }
41093
- async function $do23(client, request, options) {
41238
+ async function $do24(client, request, options) {
41094
41239
  const parsed = safeParse(request, (value) => V2PermissionsCreatePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41095
41240
  if (!parsed.ok) {
41096
41241
  return [parsed, { status: "invalid" }];
@@ -41170,12 +41315,12 @@ var init_permissionsCreatePermission = __esm(() => {
41170
41315
  });
41171
41316
 
41172
41317
  // src/mcp-server/tools/permissionsCreatePermission.ts
41173
- var args23, tool$permissionsCreatePermission;
41318
+ var args24, tool$permissionsCreatePermission;
41174
41319
  var init_permissionsCreatePermission2 = __esm(() => {
41175
41320
  init_permissionsCreatePermission();
41176
41321
  init_components();
41177
41322
  init_tools();
41178
- args23 = {
41323
+ args24 = {
41179
41324
  request: V2PermissionsCreatePermissionRequestBody$inboundSchema
41180
41325
  };
41181
41326
  tool$permissionsCreatePermission = {
@@ -41193,9 +41338,9 @@ Use hierarchical naming patterns like \`documents.read\`, \`admin.users.delete\`
41193
41338
  Your root key must have the following permission:
41194
41339
  - \`rbac.*.create_permission\`
41195
41340
  `,
41196
- args: args23,
41197
- tool: async (client, args24, ctx) => {
41198
- const [result, apiCall] = await permissionsCreatePermission(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41341
+ args: args24,
41342
+ tool: async (client, args25, ctx) => {
41343
+ const [result, apiCall] = await permissionsCreatePermission(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41199
41344
  if (!result.ok) {
41200
41345
  return {
41201
41346
  content: [{ type: "text", text: result.error.message }],
@@ -41210,9 +41355,9 @@ Your root key must have the following permission:
41210
41355
 
41211
41356
  // src/funcs/permissionsCreateRole.ts
41212
41357
  function permissionsCreateRole(client, request, options) {
41213
- return new APIPromise($do24(client, request, options));
41358
+ return new APIPromise($do25(client, request, options));
41214
41359
  }
41215
- async function $do24(client, request, options) {
41360
+ async function $do25(client, request, options) {
41216
41361
  const parsed = safeParse(request, (value) => V2PermissionsCreateRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41217
41362
  if (!parsed.ok) {
41218
41363
  return [parsed, { status: "invalid" }];
@@ -41292,12 +41437,12 @@ var init_permissionsCreateRole = __esm(() => {
41292
41437
  });
41293
41438
 
41294
41439
  // src/mcp-server/tools/permissionsCreateRole.ts
41295
- var args24, tool$permissionsCreateRole;
41440
+ var args25, tool$permissionsCreateRole;
41296
41441
  var init_permissionsCreateRole2 = __esm(() => {
41297
41442
  init_permissionsCreateRole();
41298
41443
  init_components();
41299
41444
  init_tools();
41300
- args24 = {
41445
+ args25 = {
41301
41446
  request: V2PermissionsCreateRoleRequestBody$inboundSchema
41302
41447
  };
41303
41448
  tool$permissionsCreateRole = {
@@ -41313,9 +41458,9 @@ Create a new role to group related permissions for easier management. Roles enab
41313
41458
  Your root key must have the following permission:
41314
41459
  - \`rbac.*.create_role\`
41315
41460
  `,
41316
- args: args24,
41317
- tool: async (client, args25, ctx) => {
41318
- const [result, apiCall] = await permissionsCreateRole(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41461
+ args: args25,
41462
+ tool: async (client, args26, ctx) => {
41463
+ const [result, apiCall] = await permissionsCreateRole(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41319
41464
  if (!result.ok) {
41320
41465
  return {
41321
41466
  content: [{ type: "text", text: result.error.message }],
@@ -41330,9 +41475,9 @@ Your root key must have the following permission:
41330
41475
 
41331
41476
  // src/funcs/permissionsDeletePermission.ts
41332
41477
  function permissionsDeletePermission(client, request, options) {
41333
- return new APIPromise($do25(client, request, options));
41478
+ return new APIPromise($do26(client, request, options));
41334
41479
  }
41335
- async function $do25(client, request, options) {
41480
+ async function $do26(client, request, options) {
41336
41481
  const parsed = safeParse(request, (value) => V2PermissionsDeletePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41337
41482
  if (!parsed.ok) {
41338
41483
  return [parsed, { status: "invalid" }];
@@ -41412,12 +41557,12 @@ var init_permissionsDeletePermission = __esm(() => {
41412
41557
  });
41413
41558
 
41414
41559
  // src/mcp-server/tools/permissionsDeletePermission.ts
41415
- var args25, tool$permissionsDeletePermission;
41560
+ var args26, tool$permissionsDeletePermission;
41416
41561
  var init_permissionsDeletePermission2 = __esm(() => {
41417
41562
  init_permissionsDeletePermission();
41418
41563
  init_components();
41419
41564
  init_tools();
41420
- args25 = {
41565
+ args26 = {
41421
41566
  request: V2PermissionsDeletePermissionRequestBody$inboundSchema
41422
41567
  };
41423
41568
  tool$permissionsDeletePermission = {
@@ -41433,9 +41578,9 @@ Remove a permission from your workspace. This also removes the permission from a
41433
41578
  Your root key must have the following permission:
41434
41579
  - \`rbac.*.delete_permission\`
41435
41580
  `,
41436
- args: args25,
41437
- tool: async (client, args26, ctx) => {
41438
- const [result, apiCall] = await permissionsDeletePermission(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41581
+ args: args26,
41582
+ tool: async (client, args27, ctx) => {
41583
+ const [result, apiCall] = await permissionsDeletePermission(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41439
41584
  if (!result.ok) {
41440
41585
  return {
41441
41586
  content: [{ type: "text", text: result.error.message }],
@@ -41450,9 +41595,9 @@ Your root key must have the following permission:
41450
41595
 
41451
41596
  // src/funcs/permissionsDeleteRole.ts
41452
41597
  function permissionsDeleteRole(client, request, options) {
41453
- return new APIPromise($do26(client, request, options));
41598
+ return new APIPromise($do27(client, request, options));
41454
41599
  }
41455
- async function $do26(client, request, options) {
41600
+ async function $do27(client, request, options) {
41456
41601
  const parsed = safeParse(request, (value) => V2PermissionsDeleteRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41457
41602
  if (!parsed.ok) {
41458
41603
  return [parsed, { status: "invalid" }];
@@ -41532,12 +41677,12 @@ var init_permissionsDeleteRole = __esm(() => {
41532
41677
  });
41533
41678
 
41534
41679
  // src/mcp-server/tools/permissionsDeleteRole.ts
41535
- var args26, tool$permissionsDeleteRole;
41680
+ var args27, tool$permissionsDeleteRole;
41536
41681
  var init_permissionsDeleteRole2 = __esm(() => {
41537
41682
  init_permissionsDeleteRole();
41538
41683
  init_components();
41539
41684
  init_tools();
41540
- args26 = {
41685
+ args27 = {
41541
41686
  request: V2PermissionsDeleteRoleRequestBody$inboundSchema
41542
41687
  };
41543
41688
  tool$permissionsDeleteRole = {
@@ -41553,9 +41698,9 @@ Remove a role from your workspace. This also removes the role from all assigned
41553
41698
  Your root key must have the following permission:
41554
41699
  - \`rbac.*.delete_role\`
41555
41700
  `,
41556
- args: args26,
41557
- tool: async (client, args27, ctx) => {
41558
- const [result, apiCall] = await permissionsDeleteRole(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41701
+ args: args27,
41702
+ tool: async (client, args28, ctx) => {
41703
+ const [result, apiCall] = await permissionsDeleteRole(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41559
41704
  if (!result.ok) {
41560
41705
  return {
41561
41706
  content: [{ type: "text", text: result.error.message }],
@@ -41570,9 +41715,9 @@ Your root key must have the following permission:
41570
41715
 
41571
41716
  // src/funcs/permissionsGetPermission.ts
41572
41717
  function permissionsGetPermission(client, request, options) {
41573
- return new APIPromise($do27(client, request, options));
41718
+ return new APIPromise($do28(client, request, options));
41574
41719
  }
41575
- async function $do27(client, request, options) {
41720
+ async function $do28(client, request, options) {
41576
41721
  const parsed = safeParse(request, (value) => V2PermissionsGetPermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41577
41722
  if (!parsed.ok) {
41578
41723
  return [parsed, { status: "invalid" }];
@@ -41652,12 +41797,12 @@ var init_permissionsGetPermission = __esm(() => {
41652
41797
  });
41653
41798
 
41654
41799
  // src/mcp-server/tools/permissionsGetPermission.ts
41655
- var args27, tool$permissionsGetPermission;
41800
+ var args28, tool$permissionsGetPermission;
41656
41801
  var init_permissionsGetPermission2 = __esm(() => {
41657
41802
  init_permissionsGetPermission();
41658
41803
  init_components();
41659
41804
  init_tools();
41660
- args27 = {
41805
+ args28 = {
41661
41806
  request: V2PermissionsGetPermissionRequestBody$inboundSchema
41662
41807
  };
41663
41808
  tool$permissionsGetPermission = {
@@ -41671,9 +41816,9 @@ Retrieve details about a specific permission including its name, description, an
41671
41816
  Your root key must have the following permission:
41672
41817
  - \`rbac.*.read_permission\`
41673
41818
  `,
41674
- args: args27,
41675
- tool: async (client, args28, ctx) => {
41676
- const [result, apiCall] = await permissionsGetPermission(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41819
+ args: args28,
41820
+ tool: async (client, args29, ctx) => {
41821
+ const [result, apiCall] = await permissionsGetPermission(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41677
41822
  if (!result.ok) {
41678
41823
  return {
41679
41824
  content: [{ type: "text", text: result.error.message }],
@@ -41688,9 +41833,9 @@ Your root key must have the following permission:
41688
41833
 
41689
41834
  // src/funcs/permissionsGetRole.ts
41690
41835
  function permissionsGetRole(client, request, options) {
41691
- return new APIPromise($do28(client, request, options));
41836
+ return new APIPromise($do29(client, request, options));
41692
41837
  }
41693
- async function $do28(client, request, options) {
41838
+ async function $do29(client, request, options) {
41694
41839
  const parsed = safeParse(request, (value) => V2PermissionsGetRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41695
41840
  if (!parsed.ok) {
41696
41841
  return [parsed, { status: "invalid" }];
@@ -41770,12 +41915,12 @@ var init_permissionsGetRole = __esm(() => {
41770
41915
  });
41771
41916
 
41772
41917
  // src/mcp-server/tools/permissionsGetRole.ts
41773
- var args28, tool$permissionsGetRole;
41918
+ var args29, tool$permissionsGetRole;
41774
41919
  var init_permissionsGetRole2 = __esm(() => {
41775
41920
  init_permissionsGetRole();
41776
41921
  init_components();
41777
41922
  init_tools();
41778
- args28 = {
41923
+ args29 = {
41779
41924
  request: V2PermissionsGetRoleRequestBody$inboundSchema
41780
41925
  };
41781
41926
  tool$permissionsGetRole = {
@@ -41789,9 +41934,9 @@ Retrieve details about a specific role including its assigned permissions.
41789
41934
  Your root key must have the following permission:
41790
41935
  - \`rbac.*.read_role\`
41791
41936
  `,
41792
- args: args28,
41793
- tool: async (client, args29, ctx) => {
41794
- const [result, apiCall] = await permissionsGetRole(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41937
+ args: args29,
41938
+ tool: async (client, args30, ctx) => {
41939
+ const [result, apiCall] = await permissionsGetRole(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41795
41940
  if (!result.ok) {
41796
41941
  return {
41797
41942
  content: [{ type: "text", text: result.error.message }],
@@ -41806,9 +41951,9 @@ Your root key must have the following permission:
41806
41951
 
41807
41952
  // src/funcs/permissionsListPermissions.ts
41808
41953
  function permissionsListPermissions(client, request, options) {
41809
- return new APIPromise($do29(client, request, options));
41954
+ return new APIPromise($do30(client, request, options));
41810
41955
  }
41811
- async function $do29(client, request, options) {
41956
+ async function $do30(client, request, options) {
41812
41957
  const parsed = safeParse(request, (value) => V2PermissionsListPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
41813
41958
  if (!parsed.ok) {
41814
41959
  return [parsed, { status: "invalid" }];
@@ -41888,28 +42033,29 @@ var init_permissionsListPermissions = __esm(() => {
41888
42033
  });
41889
42034
 
41890
42035
  // src/mcp-server/tools/permissionsListPermissions.ts
41891
- var args29, tool$permissionsListPermissions;
42036
+ var args30, tool$permissionsListPermissions;
41892
42037
  var init_permissionsListPermissions2 = __esm(() => {
41893
42038
  init_permissionsListPermissions();
41894
42039
  init_components();
41895
42040
  init_tools();
41896
- args29 = {
42041
+ args30 = {
41897
42042
  request: V2PermissionsListPermissionsRequestBody$inboundSchema
41898
42043
  };
41899
42044
  tool$permissionsListPermissions = {
41900
42045
  name: "permissions-list-permissions",
41901
42046
  description: `List permissions
41902
42047
 
41903
- Retrieve all permissions in your workspace. Results are paginated and sorted alphabetically by permission name.
42048
+ Retrieve all permissions in your workspace.
42049
+ Results are paginated and sorted by their id.
41904
42050
 
41905
42051
  **Required Permissions**
41906
42052
 
41907
42053
  Your root key must have the following permission:
41908
42054
  - \`rbac.*.read_permission\`
41909
42055
  `,
41910
- args: args29,
41911
- tool: async (client, args30, ctx) => {
41912
- const [result, apiCall] = await permissionsListPermissions(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42056
+ args: args30,
42057
+ tool: async (client, args31, ctx) => {
42058
+ const [result, apiCall] = await permissionsListPermissions(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41913
42059
  if (!result.ok) {
41914
42060
  return {
41915
42061
  content: [{ type: "text", text: result.error.message }],
@@ -41924,9 +42070,9 @@ Your root key must have the following permission:
41924
42070
 
41925
42071
  // src/funcs/permissionsListRoles.ts
41926
42072
  function permissionsListRoles(client, request, options) {
41927
- return new APIPromise($do30(client, request, options));
42073
+ return new APIPromise($do31(client, request, options));
41928
42074
  }
41929
- async function $do30(client, request, options) {
42075
+ async function $do31(client, request, options) {
41930
42076
  const parsed = safeParse(request, (value) => V2PermissionsListRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
41931
42077
  if (!parsed.ok) {
41932
42078
  return [parsed, { status: "invalid" }];
@@ -42006,28 +42152,29 @@ var init_permissionsListRoles = __esm(() => {
42006
42152
  });
42007
42153
 
42008
42154
  // src/mcp-server/tools/permissionsListRoles.ts
42009
- var args30, tool$permissionsListRoles;
42155
+ var args31, tool$permissionsListRoles;
42010
42156
  var init_permissionsListRoles2 = __esm(() => {
42011
42157
  init_permissionsListRoles();
42012
42158
  init_components();
42013
42159
  init_tools();
42014
- args30 = {
42160
+ args31 = {
42015
42161
  request: V2PermissionsListRolesRequestBody$inboundSchema
42016
42162
  };
42017
42163
  tool$permissionsListRoles = {
42018
42164
  name: "permissions-list-roles",
42019
42165
  description: `List roles
42020
42166
 
42021
- Retrieve all roles in your workspace including their assigned permissions. Results are paginated and sorted alphabetically by role name.
42167
+ Retrieve all roles in your workspace including their assigned permissions.
42168
+ Results are paginated and sorted by their id.
42022
42169
 
42023
42170
  **Required Permissions**
42024
42171
 
42025
42172
  Your root key must have the following permission:
42026
42173
  - \`rbac.*.read_role\`
42027
42174
  `,
42028
- args: args30,
42029
- tool: async (client, args31, ctx) => {
42030
- const [result, apiCall] = await permissionsListRoles(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42175
+ args: args31,
42176
+ tool: async (client, args32, ctx) => {
42177
+ const [result, apiCall] = await permissionsListRoles(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42031
42178
  if (!result.ok) {
42032
42179
  return {
42033
42180
  content: [{ type: "text", text: result.error.message }],
@@ -42042,9 +42189,9 @@ Your root key must have the following permission:
42042
42189
 
42043
42190
  // src/funcs/ratelimitDeleteOverride.ts
42044
42191
  function ratelimitDeleteOverride(client, request, options) {
42045
- return new APIPromise($do31(client, request, options));
42192
+ return new APIPromise($do32(client, request, options));
42046
42193
  }
42047
- async function $do31(client, request, options) {
42194
+ async function $do32(client, request, options) {
42048
42195
  const parsed = safeParse(request, (value) => V2RatelimitDeleteOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
42049
42196
  if (!parsed.ok) {
42050
42197
  return [parsed, { status: "invalid" }];
@@ -42124,12 +42271,12 @@ var init_ratelimitDeleteOverride = __esm(() => {
42124
42271
  });
42125
42272
 
42126
42273
  // src/mcp-server/tools/ratelimitDeleteOverride.ts
42127
- var args31, tool$ratelimitDeleteOverride;
42274
+ var args32, tool$ratelimitDeleteOverride;
42128
42275
  var init_ratelimitDeleteOverride2 = __esm(() => {
42129
42276
  init_ratelimitDeleteOverride();
42130
42277
  init_components();
42131
42278
  init_tools();
42132
- args31 = {
42279
+ args32 = {
42133
42280
  request: V2RatelimitDeleteOverrideRequestBody$inboundSchema
42134
42281
  };
42135
42282
  tool$ratelimitDeleteOverride = {
@@ -42144,9 +42291,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
42144
42291
 
42145
42292
  **Permissions:** Requires \`ratelimit.*.delete_override\` or \`ratelimit.<namespace_id>.delete_override\`
42146
42293
  `,
42147
- args: args31,
42148
- tool: async (client, args32, ctx) => {
42149
- const [result, apiCall] = await ratelimitDeleteOverride(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42294
+ args: args32,
42295
+ tool: async (client, args33, ctx) => {
42296
+ const [result, apiCall] = await ratelimitDeleteOverride(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42150
42297
  if (!result.ok) {
42151
42298
  return {
42152
42299
  content: [{ type: "text", text: result.error.message }],
@@ -42161,9 +42308,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
42161
42308
 
42162
42309
  // src/funcs/ratelimitGetOverride.ts
42163
42310
  function ratelimitGetOverride(client, request, options) {
42164
- return new APIPromise($do32(client, request, options));
42311
+ return new APIPromise($do33(client, request, options));
42165
42312
  }
42166
- async function $do32(client, request, options) {
42313
+ async function $do33(client, request, options) {
42167
42314
  const parsed = safeParse(request, (value) => V2RatelimitGetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
42168
42315
  if (!parsed.ok) {
42169
42316
  return [parsed, { status: "invalid" }];
@@ -42243,12 +42390,12 @@ var init_ratelimitGetOverride = __esm(() => {
42243
42390
  });
42244
42391
 
42245
42392
  // src/mcp-server/tools/ratelimitGetOverride.ts
42246
- var args32, tool$ratelimitGetOverride;
42393
+ var args33, tool$ratelimitGetOverride;
42247
42394
  var init_ratelimitGetOverride2 = __esm(() => {
42248
42395
  init_ratelimitGetOverride();
42249
42396
  init_components();
42250
42397
  init_tools();
42251
- args32 = {
42398
+ args33 = {
42252
42399
  request: V2RatelimitGetOverrideRequestBody$inboundSchema
42253
42400
  };
42254
42401
  tool$ratelimitGetOverride = {
@@ -42263,9 +42410,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
42263
42410
 
42264
42411
  **Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
42265
42412
  `,
42266
- args: args32,
42267
- tool: async (client, args33, ctx) => {
42268
- const [result, apiCall] = await ratelimitGetOverride(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42413
+ args: args33,
42414
+ tool: async (client, args34, ctx) => {
42415
+ const [result, apiCall] = await ratelimitGetOverride(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42269
42416
  if (!result.ok) {
42270
42417
  return {
42271
42418
  content: [{ type: "text", text: result.error.message }],
@@ -42280,9 +42427,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
42280
42427
 
42281
42428
  // src/funcs/ratelimitLimit.ts
42282
42429
  function ratelimitLimit(client, request, options) {
42283
- return new APIPromise($do33(client, request, options));
42430
+ return new APIPromise($do34(client, request, options));
42284
42431
  }
42285
- async function $do33(client, request, options) {
42432
+ async function $do34(client, request, options) {
42286
42433
  const parsed = safeParse(request, (value) => V2RatelimitLimitRequestBody$outboundSchema.parse(value), "Input validation failed");
42287
42434
  if (!parsed.ok) {
42288
42435
  return [parsed, { status: "invalid" }];
@@ -42362,12 +42509,12 @@ var init_ratelimitLimit = __esm(() => {
42362
42509
  });
42363
42510
 
42364
42511
  // src/mcp-server/tools/ratelimitLimit.ts
42365
- var args33, tool$ratelimitLimit;
42512
+ var args34, tool$ratelimitLimit;
42366
42513
  var init_ratelimitLimit2 = __esm(() => {
42367
42514
  init_ratelimitLimit();
42368
42515
  init_components();
42369
42516
  init_tools();
42370
- args33 = {
42517
+ args34 = {
42371
42518
  request: V2RatelimitLimitRequestBody$inboundSchema
42372
42519
  };
42373
42520
  tool$ratelimitLimit = {
@@ -42390,9 +42537,9 @@ Your root key must have one of the following permissions:
42390
42537
 
42391
42538
  Records rate limit metrics for analytics and monitoring, updates rate limit counters with sliding window algorithm, and optionally triggers override matching for custom limits.
42392
42539
  `,
42393
- args: args33,
42394
- tool: async (client, args34, ctx) => {
42395
- const [result, apiCall] = await ratelimitLimit(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42540
+ args: args34,
42541
+ tool: async (client, args35, ctx) => {
42542
+ const [result, apiCall] = await ratelimitLimit(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42396
42543
  if (!result.ok) {
42397
42544
  return {
42398
42545
  content: [{ type: "text", text: result.error.message }],
@@ -42407,9 +42554,9 @@ Records rate limit metrics for analytics and monitoring, updates rate limit coun
42407
42554
 
42408
42555
  // src/funcs/ratelimitListOverrides.ts
42409
42556
  function ratelimitListOverrides(client, request, options) {
42410
- return new APIPromise($do34(client, request, options));
42557
+ return new APIPromise($do35(client, request, options));
42411
42558
  }
42412
- async function $do34(client, request, options) {
42559
+ async function $do35(client, request, options) {
42413
42560
  const parsed = safeParse(request, (value) => V2RatelimitListOverridesRequestBody$outboundSchema.parse(value), "Input validation failed");
42414
42561
  if (!parsed.ok) {
42415
42562
  return [parsed, { status: "invalid" }];
@@ -42489,12 +42636,12 @@ var init_ratelimitListOverrides = __esm(() => {
42489
42636
  });
42490
42637
 
42491
42638
  // src/mcp-server/tools/ratelimitListOverrides.ts
42492
- var args34, tool$ratelimitListOverrides;
42639
+ var args35, tool$ratelimitListOverrides;
42493
42640
  var init_ratelimitListOverrides2 = __esm(() => {
42494
42641
  init_ratelimitListOverrides();
42495
42642
  init_components();
42496
42643
  init_tools();
42497
- args34 = {
42644
+ args35 = {
42498
42645
  request: V2RatelimitListOverridesRequestBody$inboundSchema
42499
42646
  };
42500
42647
  tool$ratelimitListOverrides = {
@@ -42509,9 +42656,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
42509
42656
 
42510
42657
  **Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
42511
42658
  `,
42512
- args: args34,
42513
- tool: async (client, args35, ctx) => {
42514
- const [result, apiCall] = await ratelimitListOverrides(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42659
+ args: args35,
42660
+ tool: async (client, args36, ctx) => {
42661
+ const [result, apiCall] = await ratelimitListOverrides(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42515
42662
  if (!result.ok) {
42516
42663
  return {
42517
42664
  content: [{ type: "text", text: result.error.message }],
@@ -42526,9 +42673,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
42526
42673
 
42527
42674
  // src/funcs/ratelimitSetOverride.ts
42528
42675
  function ratelimitSetOverride(client, request, options) {
42529
- return new APIPromise($do35(client, request, options));
42676
+ return new APIPromise($do36(client, request, options));
42530
42677
  }
42531
- async function $do35(client, request, options) {
42678
+ async function $do36(client, request, options) {
42532
42679
  const parsed = safeParse(request, (value) => V2RatelimitSetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
42533
42680
  if (!parsed.ok) {
42534
42681
  return [parsed, { status: "invalid" }];
@@ -42608,12 +42755,12 @@ var init_ratelimitSetOverride = __esm(() => {
42608
42755
  });
42609
42756
 
42610
42757
  // src/mcp-server/tools/ratelimitSetOverride.ts
42611
- var args35, tool$ratelimitSetOverride;
42758
+ var args36, tool$ratelimitSetOverride;
42612
42759
  var init_ratelimitSetOverride2 = __esm(() => {
42613
42760
  init_ratelimitSetOverride();
42614
42761
  init_components();
42615
42762
  init_tools();
42616
- args35 = {
42763
+ args36 = {
42617
42764
  request: V2RatelimitSetOverrideRequestBody$inboundSchema
42618
42765
  };
42619
42766
  tool$ratelimitSetOverride = {
@@ -42628,9 +42775,9 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
42628
42775
 
42629
42776
  **Permissions:** Requires \`ratelimit.*.set_override\` or \`ratelimit.<namespace_id>.set_override\`
42630
42777
  `,
42631
- args: args35,
42632
- tool: async (client, args36, ctx) => {
42633
- const [result, apiCall] = await ratelimitSetOverride(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42778
+ args: args36,
42779
+ tool: async (client, args37, ctx) => {
42780
+ const [result, apiCall] = await ratelimitSetOverride(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42634
42781
  if (!result.ok) {
42635
42782
  return {
42636
42783
  content: [{ type: "text", text: result.error.message }],
@@ -42647,7 +42794,7 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
42647
42794
  function createMCPServer(deps) {
42648
42795
  const server = new McpServer({
42649
42796
  name: "Unkey",
42650
- version: "2.0.2"
42797
+ version: "2.0.4"
42651
42798
  });
42652
42799
  const client = new UnkeyCore({
42653
42800
  rootKey: deps.rootKey,
@@ -42677,6 +42824,7 @@ function createMCPServer(deps) {
42677
42824
  tool(tool$keysGetKey);
42678
42825
  tool(tool$keysRemovePermissions);
42679
42826
  tool(tool$keysRemoveRoles);
42827
+ tool(tool$keysRerollKey);
42680
42828
  tool(tool$keysSetPermissions);
42681
42829
  tool(tool$keysSetRoles);
42682
42830
  tool(tool$keysUpdateCredits);
@@ -42719,6 +42867,7 @@ var init_server2 = __esm(() => {
42719
42867
  init_keysGetKey2();
42720
42868
  init_keysRemovePermissions2();
42721
42869
  init_keysRemoveRoles2();
42870
+ init_keysRerollKey2();
42722
42871
  init_keysSetPermissions2();
42723
42872
  init_keysSetRoles2();
42724
42873
  init_keysUpdateCredits2();
@@ -43933,7 +44082,7 @@ var routes = ln({
43933
44082
  var app = _e(routes, {
43934
44083
  name: "mcp",
43935
44084
  versionInfo: {
43936
- currentVersion: "2.0.2"
44085
+ currentVersion: "2.0.4"
43937
44086
  }
43938
44087
  });
43939
44088
  Yt(app, process3.argv.slice(2), buildContext(process3));
@@ -43941,5 +44090,5 @@ export {
43941
44090
  app
43942
44091
  };
43943
44092
 
43944
- //# debugId=51ECC4F5750F7C2E64756E2164756E21
44093
+ //# debugId=99890DFCB79E3EA364756E2164756E21
43945
44094
  //# sourceMappingURL=mcp-server.js.map