@unkey/api 2.0.2 → 2.0.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +4 -2
- package/bin/mcp-server.js +371 -222
- package/bin/mcp-server.js.map +33 -31
- package/dist/commonjs/funcs/apisDeleteApi.d.ts +4 -2
- package/dist/commonjs/funcs/apisDeleteApi.d.ts.map +1 -1
- package/dist/commonjs/funcs/apisDeleteApi.js +4 -2
- package/dist/commonjs/funcs/apisDeleteApi.js.map +1 -1
- package/dist/commonjs/funcs/identitiesCreateIdentity.d.ts +2 -2
- package/dist/commonjs/funcs/identitiesCreateIdentity.js +2 -2
- package/dist/commonjs/funcs/keysRerollKey.d.ts +49 -0
- package/dist/commonjs/funcs/keysRerollKey.d.ts.map +1 -0
- package/dist/commonjs/funcs/keysRerollKey.js +159 -0
- package/dist/commonjs/funcs/keysRerollKey.js.map +1 -0
- package/dist/commonjs/funcs/permissionsListPermissions.d.ts +2 -1
- package/dist/commonjs/funcs/permissionsListPermissions.d.ts.map +1 -1
- package/dist/commonjs/funcs/permissionsListPermissions.js +2 -1
- package/dist/commonjs/funcs/permissionsListPermissions.js.map +1 -1
- package/dist/commonjs/funcs/permissionsListRoles.d.ts +2 -1
- package/dist/commonjs/funcs/permissionsListRoles.d.ts.map +1 -1
- package/dist/commonjs/funcs/permissionsListRoles.js +2 -1
- package/dist/commonjs/funcs/permissionsListRoles.js.map +1 -1
- package/dist/commonjs/lib/config.d.ts +3 -3
- package/dist/commonjs/lib/config.js +3 -3
- package/dist/commonjs/mcp-server/mcp-server.js +1 -1
- package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/server.js +3 -1
- package/dist/commonjs/mcp-server/server.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/apisDeleteApi.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/tools/apisDeleteApi.js +4 -2
- package/dist/commonjs/mcp-server/tools/apisDeleteApi.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/identitiesCreateIdentity.js +2 -2
- package/dist/commonjs/mcp-server/tools/identitiesUpdateIdentity.js +2 -2
- package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/keysRerollKey.js +96 -0
- package/dist/commonjs/mcp-server/tools/keysRerollKey.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js +2 -1
- package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/tools/permissionsListRoles.js +2 -1
- package/dist/commonjs/mcp-server/tools/permissionsListRoles.js.map +1 -1
- package/dist/commonjs/models/components/identity.d.ts +8 -2
- package/dist/commonjs/models/components/identity.d.ts.map +1 -1
- package/dist/commonjs/models/components/identity.js +2 -2
- package/dist/commonjs/models/components/identity.js.map +1 -1
- package/dist/commonjs/models/components/index.d.ts +3 -3
- package/dist/commonjs/models/components/index.d.ts.map +1 -1
- package/dist/commonjs/models/components/index.js +3 -3
- package/dist/commonjs/models/components/index.js.map +1 -1
- package/dist/commonjs/models/components/keyresponsedata.d.ts +0 -5
- package/dist/commonjs/models/components/keyresponsedata.d.ts.map +1 -1
- package/dist/commonjs/models/components/keyresponsedata.js +0 -2
- package/dist/commonjs/models/components/keyresponsedata.js.map +1 -1
- package/dist/commonjs/models/components/permission.d.ts +1 -1
- package/dist/commonjs/models/components/v2identitiesgetidentityresponsebody.d.ts +3 -3
- package/dist/commonjs/models/components/v2identitiesgetidentityresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2identitiesgetidentityresponsebody.js +3 -3
- package/dist/commonjs/models/components/v2identitiesgetidentityresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2identitiesupdateidentityrequestbody.d.ts +3 -7
- package/dist/commonjs/models/components/v2identitiesupdateidentityrequestbody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2identitiesupdateidentityrequestbody.js +2 -2
- package/dist/commonjs/models/components/v2identitiesupdateidentityrequestbody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysaddrolesresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysremoverolesresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
- package/dist/commonjs/models/components/{v2permissionsgetroleresponsedata.js → v2keysrerollkeyrequestbody.js} +21 -20
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js +73 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js +71 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
- package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keyssetrolesresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2permissionsgetpermissionresponsebody.d.ts +3 -6
- package/dist/commonjs/models/components/v2permissionsgetpermissionresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2permissionsgetpermissionresponsebody.js +3 -3
- package/dist/commonjs/models/components/v2permissionsgetpermissionresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2permissionsgetroleresponsebody.d.ts +3 -6
- package/dist/commonjs/models/components/v2permissionsgetroleresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2permissionsgetroleresponsebody.js +3 -3
- package/dist/commonjs/models/components/v2permissionsgetroleresponsebody.js.map +1 -1
- package/dist/commonjs/sdk/apis.d.ts +4 -2
- package/dist/commonjs/sdk/apis.d.ts.map +1 -1
- package/dist/commonjs/sdk/apis.js +4 -2
- package/dist/commonjs/sdk/apis.js.map +1 -1
- package/dist/commonjs/sdk/identities.d.ts +2 -2
- package/dist/commonjs/sdk/identities.js +2 -2
- package/dist/commonjs/sdk/keys.d.ts +38 -0
- package/dist/commonjs/sdk/keys.d.ts.map +1 -1
- package/dist/commonjs/sdk/keys.js +41 -0
- package/dist/commonjs/sdk/keys.js.map +1 -1
- package/dist/commonjs/sdk/permissions.d.ts +4 -2
- package/dist/commonjs/sdk/permissions.d.ts.map +1 -1
- package/dist/commonjs/sdk/permissions.js +4 -2
- package/dist/commonjs/sdk/permissions.js.map +1 -1
- package/dist/esm/funcs/apisDeleteApi.d.ts +4 -2
- package/dist/esm/funcs/apisDeleteApi.d.ts.map +1 -1
- package/dist/esm/funcs/apisDeleteApi.js +4 -2
- package/dist/esm/funcs/apisDeleteApi.js.map +1 -1
- package/dist/esm/funcs/identitiesCreateIdentity.d.ts +2 -2
- package/dist/esm/funcs/identitiesCreateIdentity.js +2 -2
- package/dist/esm/funcs/keysRerollKey.d.ts +49 -0
- package/dist/esm/funcs/keysRerollKey.d.ts.map +1 -0
- package/dist/esm/funcs/keysRerollKey.js +123 -0
- package/dist/esm/funcs/keysRerollKey.js.map +1 -0
- package/dist/esm/funcs/permissionsListPermissions.d.ts +2 -1
- package/dist/esm/funcs/permissionsListPermissions.d.ts.map +1 -1
- package/dist/esm/funcs/permissionsListPermissions.js +2 -1
- package/dist/esm/funcs/permissionsListPermissions.js.map +1 -1
- package/dist/esm/funcs/permissionsListRoles.d.ts +2 -1
- package/dist/esm/funcs/permissionsListRoles.d.ts.map +1 -1
- package/dist/esm/funcs/permissionsListRoles.js +2 -1
- package/dist/esm/funcs/permissionsListRoles.js.map +1 -1
- package/dist/esm/lib/config.d.ts +3 -3
- package/dist/esm/lib/config.js +3 -3
- package/dist/esm/mcp-server/mcp-server.js +1 -1
- package/dist/esm/mcp-server/server.d.ts.map +1 -1
- package/dist/esm/mcp-server/server.js +3 -1
- package/dist/esm/mcp-server/server.js.map +1 -1
- package/dist/esm/mcp-server/tools/apisDeleteApi.d.ts.map +1 -1
- package/dist/esm/mcp-server/tools/apisDeleteApi.js +4 -2
- package/dist/esm/mcp-server/tools/apisDeleteApi.js.map +1 -1
- package/dist/esm/mcp-server/tools/identitiesCreateIdentity.js +2 -2
- package/dist/esm/mcp-server/tools/identitiesUpdateIdentity.js +2 -2
- package/dist/esm/mcp-server/tools/keysRerollKey.d.ts +8 -0
- package/dist/esm/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/keysRerollKey.js +60 -0
- package/dist/esm/mcp-server/tools/keysRerollKey.js.map +1 -0
- package/dist/esm/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
- package/dist/esm/mcp-server/tools/permissionsListPermissions.js +2 -1
- package/dist/esm/mcp-server/tools/permissionsListPermissions.js.map +1 -1
- package/dist/esm/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
- package/dist/esm/mcp-server/tools/permissionsListRoles.js +2 -1
- package/dist/esm/mcp-server/tools/permissionsListRoles.js.map +1 -1
- package/dist/esm/models/components/identity.d.ts +8 -2
- package/dist/esm/models/components/identity.d.ts.map +1 -1
- package/dist/esm/models/components/identity.js +2 -2
- package/dist/esm/models/components/identity.js.map +1 -1
- package/dist/esm/models/components/index.d.ts +3 -3
- package/dist/esm/models/components/index.d.ts.map +1 -1
- package/dist/esm/models/components/index.js +3 -3
- package/dist/esm/models/components/index.js.map +1 -1
- package/dist/esm/models/components/keyresponsedata.d.ts +0 -5
- package/dist/esm/models/components/keyresponsedata.d.ts.map +1 -1
- package/dist/esm/models/components/keyresponsedata.js +0 -2
- package/dist/esm/models/components/keyresponsedata.js.map +1 -1
- package/dist/esm/models/components/permission.d.ts +1 -1
- package/dist/esm/models/components/v2identitiesgetidentityresponsebody.d.ts +3 -3
- package/dist/esm/models/components/v2identitiesgetidentityresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2identitiesgetidentityresponsebody.js +3 -3
- package/dist/esm/models/components/v2identitiesgetidentityresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2identitiesupdateidentityrequestbody.d.ts +3 -7
- package/dist/esm/models/components/v2identitiesupdateidentityrequestbody.d.ts.map +1 -1
- package/dist/esm/models/components/v2identitiesupdateidentityrequestbody.js +2 -2
- package/dist/esm/models/components/v2identitiesupdateidentityrequestbody.js.map +1 -1
- package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysaddrolesresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysremoverolesresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.js +33 -0
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.js +35 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.js +33 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
- package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keyssetrolesresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2permissionsgetpermissionresponsebody.d.ts +3 -6
- package/dist/esm/models/components/v2permissionsgetpermissionresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2permissionsgetpermissionresponsebody.js +3 -3
- package/dist/esm/models/components/v2permissionsgetpermissionresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2permissionsgetroleresponsebody.d.ts +3 -6
- package/dist/esm/models/components/v2permissionsgetroleresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2permissionsgetroleresponsebody.js +3 -3
- package/dist/esm/models/components/v2permissionsgetroleresponsebody.js.map +1 -1
- package/dist/esm/sdk/apis.d.ts +4 -2
- package/dist/esm/sdk/apis.d.ts.map +1 -1
- package/dist/esm/sdk/apis.js +4 -2
- package/dist/esm/sdk/apis.js.map +1 -1
- package/dist/esm/sdk/identities.d.ts +2 -2
- package/dist/esm/sdk/identities.js +2 -2
- package/dist/esm/sdk/keys.d.ts +38 -0
- package/dist/esm/sdk/keys.d.ts.map +1 -1
- package/dist/esm/sdk/keys.js +41 -0
- package/dist/esm/sdk/keys.js.map +1 -1
- package/dist/esm/sdk/permissions.d.ts +4 -2
- package/dist/esm/sdk/permissions.d.ts.map +1 -1
- package/dist/esm/sdk/permissions.js +4 -2
- package/dist/esm/sdk/permissions.js.map +1 -1
- package/docs/sdks/apis/README.md +6 -4
- package/docs/sdks/identities/README.md +6 -6
- package/docs/sdks/keys/README.md +113 -0
- package/docs/sdks/permissions/README.md +4 -2
- package/examples/apisCreateApi.example.ts +1 -1
- package/examples/package-lock.json +3 -3
- package/jsr.json +1 -1
- package/package.json +3 -3
- package/src/funcs/apisDeleteApi.ts +4 -2
- package/src/funcs/identitiesCreateIdentity.ts +2 -2
- package/src/funcs/keysRerollKey.ts +227 -0
- package/src/funcs/permissionsListPermissions.ts +2 -1
- package/src/funcs/permissionsListRoles.ts +2 -1
- package/src/lib/config.ts +3 -3
- package/src/mcp-server/mcp-server.ts +1 -1
- package/src/mcp-server/server.ts +3 -1
- package/src/mcp-server/tools/apisDeleteApi.ts +4 -2
- package/src/mcp-server/tools/identitiesCreateIdentity.ts +2 -2
- package/src/mcp-server/tools/identitiesUpdateIdentity.ts +2 -2
- package/src/mcp-server/tools/keysRerollKey.ts +69 -0
- package/src/mcp-server/tools/permissionsListPermissions.ts +2 -1
- package/src/mcp-server/tools/permissionsListRoles.ts +2 -1
- package/src/models/components/identity.ts +10 -4
- package/src/models/components/index.ts +3 -3
- package/src/models/components/keyresponsedata.ts +0 -7
- package/src/models/components/permission.ts +1 -1
- package/src/models/components/v2identitiesgetidentityresponsebody.ts +10 -10
- package/src/models/components/v2identitiesupdateidentityrequestbody.ts +5 -9
- package/src/models/components/v2keysaddpermissionsresponsebody.ts +0 -1
- package/src/models/components/v2keysaddrolesresponsebody.ts +0 -1
- package/src/models/components/v2keysremoverolesresponsebody.ts +0 -1
- package/src/models/components/v2keysrerollkeyrequestbody.ts +99 -0
- package/src/models/components/v2keysrerollkeyresponsebody.ts +87 -0
- package/src/models/components/v2keysrerollkeyresponsedata.ts +103 -0
- package/src/models/components/v2keyssetpermissionsresponsebody.ts +0 -1
- package/src/models/components/v2keyssetrolesresponsebody.ts +0 -1
- package/src/models/components/v2permissionsgetpermissionresponsebody.ts +9 -12
- package/src/models/components/v2permissionsgetroleresponsebody.ts +9 -12
- package/src/sdk/apis.ts +4 -2
- package/src/sdk/identities.ts +2 -2
- package/src/sdk/keys.ts +49 -0
- package/src/sdk/permissions.ts +4 -2
- package/dist/commonjs/models/components/v2identitiesgetidentityresponsedata.d.ts +0 -47
- package/dist/commonjs/models/components/v2identitiesgetidentityresponsedata.d.ts.map +0 -1
- package/dist/commonjs/models/components/v2identitiesgetidentityresponsedata.js +0 -74
- package/dist/commonjs/models/components/v2identitiesgetidentityresponsedata.js.map +0 -1
- package/dist/commonjs/models/components/v2permissionsgetpermissionresponsedata.d.ts +0 -33
- package/dist/commonjs/models/components/v2permissionsgetpermissionresponsedata.d.ts.map +0 -1
- package/dist/commonjs/models/components/v2permissionsgetpermissionresponsedata.js +0 -70
- package/dist/commonjs/models/components/v2permissionsgetpermissionresponsedata.js.map +0 -1
- package/dist/commonjs/models/components/v2permissionsgetroleresponsedata.d.ts +0 -33
- package/dist/commonjs/models/components/v2permissionsgetroleresponsedata.d.ts.map +0 -1
- package/dist/commonjs/models/components/v2permissionsgetroleresponsedata.js.map +0 -1
- package/dist/esm/models/components/v2identitiesgetidentityresponsedata.d.ts +0 -47
- package/dist/esm/models/components/v2identitiesgetidentityresponsedata.d.ts.map +0 -1
- package/dist/esm/models/components/v2identitiesgetidentityresponsedata.js +0 -36
- package/dist/esm/models/components/v2identitiesgetidentityresponsedata.js.map +0 -1
- package/dist/esm/models/components/v2permissionsgetpermissionresponsedata.d.ts +0 -33
- package/dist/esm/models/components/v2permissionsgetpermissionresponsedata.d.ts.map +0 -1
- package/dist/esm/models/components/v2permissionsgetpermissionresponsedata.js +0 -32
- package/dist/esm/models/components/v2permissionsgetpermissionresponsedata.js.map +0 -1
- package/dist/esm/models/components/v2permissionsgetroleresponsedata.d.ts +0 -33
- package/dist/esm/models/components/v2permissionsgetroleresponsedata.d.ts.map +0 -1
- package/dist/esm/models/components/v2permissionsgetroleresponsedata.js +0 -32
- package/dist/esm/models/components/v2permissionsgetroleresponsedata.js.map +0 -1
- package/src/models/components/v2identitiesgetidentityresponsedata.ts +0 -94
- package/src/models/components/v2permissionsgetpermissionresponsedata.ts +0 -81
- package/src/models/components/v2permissionsgetroleresponsedata.ts +0 -77
package/bin/mcp-server.js
CHANGED
|
@@ -34269,9 +34269,9 @@ var init_config = __esm(() => {
|
|
|
34269
34269
|
SDK_METADATA = {
|
|
34270
34270
|
language: "typescript",
|
|
34271
34271
|
openapiDocVersion: "2.0.0",
|
|
34272
|
-
sdkVersion: "2.0.
|
|
34273
|
-
genVersion: "2.
|
|
34274
|
-
userAgent: "speakeasy-sdk/typescript 2.0.
|
|
34272
|
+
sdkVersion: "2.0.4",
|
|
34273
|
+
genVersion: "2.683.1",
|
|
34274
|
+
userAgent: "speakeasy-sdk/typescript 2.0.4 2.683.1 2.0.0 @unkey/api"
|
|
34275
34275
|
};
|
|
34276
34276
|
});
|
|
34277
34277
|
|
|
@@ -35819,16 +35819,16 @@ var init_identity = __esm(() => {
|
|
|
35819
35819
|
IdentityMeta$.outboundSchema = IdentityMeta$outboundSchema;
|
|
35820
35820
|
})(IdentityMeta$ ||= {});
|
|
35821
35821
|
Identity$inboundSchema = objectType({
|
|
35822
|
+
id: stringType(),
|
|
35822
35823
|
externalId: stringType(),
|
|
35823
35824
|
meta: lazyType(() => IdentityMeta$inboundSchema).optional(),
|
|
35824
|
-
ratelimits: arrayType(RatelimitResponse$inboundSchema).optional()
|
|
35825
|
-
description: anyType().optional()
|
|
35825
|
+
ratelimits: arrayType(RatelimitResponse$inboundSchema).optional()
|
|
35826
35826
|
});
|
|
35827
35827
|
Identity$outboundSchema = objectType({
|
|
35828
|
+
id: stringType(),
|
|
35828
35829
|
externalId: stringType(),
|
|
35829
35830
|
meta: lazyType(() => IdentityMeta$outboundSchema).optional(),
|
|
35830
|
-
ratelimits: arrayType(RatelimitResponse$outboundSchema).optional()
|
|
35831
|
-
description: anyType().optional()
|
|
35831
|
+
ratelimits: arrayType(RatelimitResponse$outboundSchema).optional()
|
|
35832
35832
|
});
|
|
35833
35833
|
((Identity$) => {
|
|
35834
35834
|
Identity$.inboundSchema = Identity$inboundSchema;
|
|
@@ -35901,7 +35901,6 @@ var init_keyresponsedata = __esm(() => {
|
|
|
35901
35901
|
createdAt: numberType().int(),
|
|
35902
35902
|
updatedAt: numberType().int().optional(),
|
|
35903
35903
|
expires: numberType().int().optional(),
|
|
35904
|
-
externalId: stringType().optional(),
|
|
35905
35904
|
permissions: arrayType(stringType()).optional(),
|
|
35906
35905
|
roles: arrayType(stringType()).optional(),
|
|
35907
35906
|
credits: KeyCreditsData$inboundSchema.optional(),
|
|
@@ -35918,7 +35917,6 @@ var init_keyresponsedata = __esm(() => {
|
|
|
35918
35917
|
createdAt: numberType().int(),
|
|
35919
35918
|
updatedAt: numberType().int().optional(),
|
|
35920
35919
|
expires: numberType().int().optional(),
|
|
35921
|
-
externalId: stringType().optional(),
|
|
35922
35920
|
permissions: arrayType(stringType()).optional(),
|
|
35923
35921
|
roles: arrayType(stringType()).optional(),
|
|
35924
35922
|
credits: KeyCreditsData$outboundSchema.optional(),
|
|
@@ -36406,40 +36404,19 @@ var init_v2identitiesgetidentityrequestbody = __esm(() => {
|
|
|
36406
36404
|
})(V2IdentitiesGetIdentityRequestBody$ ||= {});
|
|
36407
36405
|
});
|
|
36408
36406
|
|
|
36409
|
-
// src/models/components/v2identitiesgetidentityresponsedata.ts
|
|
36410
|
-
var V2IdentitiesGetIdentityResponseData$inboundSchema, V2IdentitiesGetIdentityResponseData$outboundSchema, V2IdentitiesGetIdentityResponseData$;
|
|
36411
|
-
var init_v2identitiesgetidentityresponsedata = __esm(() => {
|
|
36412
|
-
init_zod();
|
|
36413
|
-
init_ratelimitresponse();
|
|
36414
|
-
V2IdentitiesGetIdentityResponseData$inboundSchema = objectType({
|
|
36415
|
-
externalId: stringType(),
|
|
36416
|
-
meta: recordType(anyType()).optional(),
|
|
36417
|
-
ratelimits: arrayType(RatelimitResponse$inboundSchema).optional()
|
|
36418
|
-
});
|
|
36419
|
-
V2IdentitiesGetIdentityResponseData$outboundSchema = objectType({
|
|
36420
|
-
externalId: stringType(),
|
|
36421
|
-
meta: recordType(anyType()).optional(),
|
|
36422
|
-
ratelimits: arrayType(RatelimitResponse$outboundSchema).optional()
|
|
36423
|
-
});
|
|
36424
|
-
((V2IdentitiesGetIdentityResponseData$) => {
|
|
36425
|
-
V2IdentitiesGetIdentityResponseData$.inboundSchema = V2IdentitiesGetIdentityResponseData$inboundSchema;
|
|
36426
|
-
V2IdentitiesGetIdentityResponseData$.outboundSchema = V2IdentitiesGetIdentityResponseData$outboundSchema;
|
|
36427
|
-
})(V2IdentitiesGetIdentityResponseData$ ||= {});
|
|
36428
|
-
});
|
|
36429
|
-
|
|
36430
36407
|
// src/models/components/v2identitiesgetidentityresponsebody.ts
|
|
36431
36408
|
var V2IdentitiesGetIdentityResponseBody$inboundSchema, V2IdentitiesGetIdentityResponseBody$outboundSchema, V2IdentitiesGetIdentityResponseBody$;
|
|
36432
36409
|
var init_v2identitiesgetidentityresponsebody = __esm(() => {
|
|
36433
36410
|
init_zod();
|
|
36411
|
+
init_identity();
|
|
36434
36412
|
init_meta();
|
|
36435
|
-
init_v2identitiesgetidentityresponsedata();
|
|
36436
36413
|
V2IdentitiesGetIdentityResponseBody$inboundSchema = objectType({
|
|
36437
36414
|
meta: Meta$inboundSchema,
|
|
36438
|
-
data:
|
|
36415
|
+
data: Identity$inboundSchema
|
|
36439
36416
|
});
|
|
36440
36417
|
V2IdentitiesGetIdentityResponseBody$outboundSchema = objectType({
|
|
36441
36418
|
meta: Meta$outboundSchema,
|
|
36442
|
-
data:
|
|
36419
|
+
data: Identity$outboundSchema
|
|
36443
36420
|
});
|
|
36444
36421
|
((V2IdentitiesGetIdentityResponseBody$) => {
|
|
36445
36422
|
V2IdentitiesGetIdentityResponseBody$.inboundSchema = V2IdentitiesGetIdentityResponseBody$inboundSchema;
|
|
@@ -36494,12 +36471,12 @@ var init_v2identitiesupdateidentityrequestbody = __esm(() => {
|
|
|
36494
36471
|
init_zod();
|
|
36495
36472
|
init_ratelimitrequest();
|
|
36496
36473
|
V2IdentitiesUpdateIdentityRequestBody$inboundSchema = objectType({
|
|
36497
|
-
|
|
36474
|
+
identity: stringType(),
|
|
36498
36475
|
meta: recordType(anyType()).optional(),
|
|
36499
36476
|
ratelimits: arrayType(RatelimitRequest$inboundSchema).optional()
|
|
36500
36477
|
});
|
|
36501
36478
|
V2IdentitiesUpdateIdentityRequestBody$outboundSchema = objectType({
|
|
36502
|
-
|
|
36479
|
+
identity: stringType(),
|
|
36503
36480
|
meta: recordType(anyType()).optional(),
|
|
36504
36481
|
ratelimits: arrayType(RatelimitRequest$outboundSchema).optional()
|
|
36505
36482
|
});
|
|
@@ -36837,6 +36814,62 @@ var init_v2keysremoverolesresponsebody = __esm(() => {
|
|
|
36837
36814
|
})(V2KeysRemoveRolesResponseBody$ ||= {});
|
|
36838
36815
|
});
|
|
36839
36816
|
|
|
36817
|
+
// src/models/components/v2keysrerollkeyrequestbody.ts
|
|
36818
|
+
var V2KeysRerollKeyRequestBody$inboundSchema, V2KeysRerollKeyRequestBody$outboundSchema, V2KeysRerollKeyRequestBody$;
|
|
36819
|
+
var init_v2keysrerollkeyrequestbody = __esm(() => {
|
|
36820
|
+
init_zod();
|
|
36821
|
+
V2KeysRerollKeyRequestBody$inboundSchema = objectType({
|
|
36822
|
+
keyId: stringType(),
|
|
36823
|
+
expiration: numberType().int()
|
|
36824
|
+
});
|
|
36825
|
+
V2KeysRerollKeyRequestBody$outboundSchema = objectType({
|
|
36826
|
+
keyId: stringType(),
|
|
36827
|
+
expiration: numberType().int()
|
|
36828
|
+
});
|
|
36829
|
+
((V2KeysRerollKeyRequestBody$) => {
|
|
36830
|
+
V2KeysRerollKeyRequestBody$.inboundSchema = V2KeysRerollKeyRequestBody$inboundSchema;
|
|
36831
|
+
V2KeysRerollKeyRequestBody$.outboundSchema = V2KeysRerollKeyRequestBody$outboundSchema;
|
|
36832
|
+
})(V2KeysRerollKeyRequestBody$ ||= {});
|
|
36833
|
+
});
|
|
36834
|
+
|
|
36835
|
+
// src/models/components/v2keysrerollkeyresponsedata.ts
|
|
36836
|
+
var V2KeysRerollKeyResponseData$inboundSchema, V2KeysRerollKeyResponseData$outboundSchema, V2KeysRerollKeyResponseData$;
|
|
36837
|
+
var init_v2keysrerollkeyresponsedata = __esm(() => {
|
|
36838
|
+
init_zod();
|
|
36839
|
+
V2KeysRerollKeyResponseData$inboundSchema = objectType({
|
|
36840
|
+
keyId: stringType(),
|
|
36841
|
+
key: stringType()
|
|
36842
|
+
});
|
|
36843
|
+
V2KeysRerollKeyResponseData$outboundSchema = objectType({
|
|
36844
|
+
keyId: stringType(),
|
|
36845
|
+
key: stringType()
|
|
36846
|
+
});
|
|
36847
|
+
((V2KeysRerollKeyResponseData$) => {
|
|
36848
|
+
V2KeysRerollKeyResponseData$.inboundSchema = V2KeysRerollKeyResponseData$inboundSchema;
|
|
36849
|
+
V2KeysRerollKeyResponseData$.outboundSchema = V2KeysRerollKeyResponseData$outboundSchema;
|
|
36850
|
+
})(V2KeysRerollKeyResponseData$ ||= {});
|
|
36851
|
+
});
|
|
36852
|
+
|
|
36853
|
+
// src/models/components/v2keysrerollkeyresponsebody.ts
|
|
36854
|
+
var V2KeysRerollKeyResponseBody$inboundSchema, V2KeysRerollKeyResponseBody$outboundSchema, V2KeysRerollKeyResponseBody$;
|
|
36855
|
+
var init_v2keysrerollkeyresponsebody = __esm(() => {
|
|
36856
|
+
init_zod();
|
|
36857
|
+
init_meta();
|
|
36858
|
+
init_v2keysrerollkeyresponsedata();
|
|
36859
|
+
V2KeysRerollKeyResponseBody$inboundSchema = objectType({
|
|
36860
|
+
meta: Meta$inboundSchema,
|
|
36861
|
+
data: V2KeysRerollKeyResponseData$inboundSchema
|
|
36862
|
+
});
|
|
36863
|
+
V2KeysRerollKeyResponseBody$outboundSchema = objectType({
|
|
36864
|
+
meta: Meta$outboundSchema,
|
|
36865
|
+
data: V2KeysRerollKeyResponseData$outboundSchema
|
|
36866
|
+
});
|
|
36867
|
+
((V2KeysRerollKeyResponseBody$) => {
|
|
36868
|
+
V2KeysRerollKeyResponseBody$.inboundSchema = V2KeysRerollKeyResponseBody$inboundSchema;
|
|
36869
|
+
V2KeysRerollKeyResponseBody$.outboundSchema = V2KeysRerollKeyResponseBody$outboundSchema;
|
|
36870
|
+
})(V2KeysRerollKeyResponseBody$ ||= {});
|
|
36871
|
+
});
|
|
36872
|
+
|
|
36840
36873
|
// src/models/components/v2keyssetpermissionsrequestbody.ts
|
|
36841
36874
|
var V2KeysSetPermissionsRequestBody$inboundSchema, V2KeysSetPermissionsRequestBody$outboundSchema, V2KeysSetPermissionsRequestBody$;
|
|
36842
36875
|
var init_v2keyssetpermissionsrequestbody = __esm(() => {
|
|
@@ -37387,36 +37420,19 @@ var init_v2permissionsgetpermissionrequestbody = __esm(() => {
|
|
|
37387
37420
|
})(V2PermissionsGetPermissionRequestBody$ ||= {});
|
|
37388
37421
|
});
|
|
37389
37422
|
|
|
37390
|
-
// src/models/components/v2permissionsgetpermissionresponsedata.ts
|
|
37391
|
-
var V2PermissionsGetPermissionResponseData$inboundSchema, V2PermissionsGetPermissionResponseData$outboundSchema, V2PermissionsGetPermissionResponseData$;
|
|
37392
|
-
var init_v2permissionsgetpermissionresponsedata = __esm(() => {
|
|
37393
|
-
init_zod();
|
|
37394
|
-
init_permission();
|
|
37395
|
-
V2PermissionsGetPermissionResponseData$inboundSchema = objectType({
|
|
37396
|
-
permission: Permission$inboundSchema
|
|
37397
|
-
});
|
|
37398
|
-
V2PermissionsGetPermissionResponseData$outboundSchema = objectType({
|
|
37399
|
-
permission: Permission$outboundSchema
|
|
37400
|
-
});
|
|
37401
|
-
((V2PermissionsGetPermissionResponseData$) => {
|
|
37402
|
-
V2PermissionsGetPermissionResponseData$.inboundSchema = V2PermissionsGetPermissionResponseData$inboundSchema;
|
|
37403
|
-
V2PermissionsGetPermissionResponseData$.outboundSchema = V2PermissionsGetPermissionResponseData$outboundSchema;
|
|
37404
|
-
})(V2PermissionsGetPermissionResponseData$ ||= {});
|
|
37405
|
-
});
|
|
37406
|
-
|
|
37407
37423
|
// src/models/components/v2permissionsgetpermissionresponsebody.ts
|
|
37408
37424
|
var V2PermissionsGetPermissionResponseBody$inboundSchema, V2PermissionsGetPermissionResponseBody$outboundSchema, V2PermissionsGetPermissionResponseBody$;
|
|
37409
37425
|
var init_v2permissionsgetpermissionresponsebody = __esm(() => {
|
|
37410
37426
|
init_zod();
|
|
37411
37427
|
init_meta();
|
|
37412
|
-
|
|
37428
|
+
init_permission();
|
|
37413
37429
|
V2PermissionsGetPermissionResponseBody$inboundSchema = objectType({
|
|
37414
37430
|
meta: Meta$inboundSchema,
|
|
37415
|
-
data:
|
|
37431
|
+
data: Permission$inboundSchema
|
|
37416
37432
|
});
|
|
37417
37433
|
V2PermissionsGetPermissionResponseBody$outboundSchema = objectType({
|
|
37418
37434
|
meta: Meta$outboundSchema,
|
|
37419
|
-
data:
|
|
37435
|
+
data: Permission$outboundSchema
|
|
37420
37436
|
});
|
|
37421
37437
|
((V2PermissionsGetPermissionResponseBody$) => {
|
|
37422
37438
|
V2PermissionsGetPermissionResponseBody$.inboundSchema = V2PermissionsGetPermissionResponseBody$inboundSchema;
|
|
@@ -37440,36 +37456,19 @@ var init_v2permissionsgetrolerequestbody = __esm(() => {
|
|
|
37440
37456
|
})(V2PermissionsGetRoleRequestBody$ ||= {});
|
|
37441
37457
|
});
|
|
37442
37458
|
|
|
37443
|
-
// src/models/components/v2permissionsgetroleresponsedata.ts
|
|
37444
|
-
var V2PermissionsGetRoleResponseData$inboundSchema, V2PermissionsGetRoleResponseData$outboundSchema, V2PermissionsGetRoleResponseData$;
|
|
37445
|
-
var init_v2permissionsgetroleresponsedata = __esm(() => {
|
|
37446
|
-
init_zod();
|
|
37447
|
-
init_role();
|
|
37448
|
-
V2PermissionsGetRoleResponseData$inboundSchema = objectType({
|
|
37449
|
-
role: Role$inboundSchema
|
|
37450
|
-
});
|
|
37451
|
-
V2PermissionsGetRoleResponseData$outboundSchema = objectType({
|
|
37452
|
-
role: Role$outboundSchema
|
|
37453
|
-
});
|
|
37454
|
-
((V2PermissionsGetRoleResponseData$) => {
|
|
37455
|
-
V2PermissionsGetRoleResponseData$.inboundSchema = V2PermissionsGetRoleResponseData$inboundSchema;
|
|
37456
|
-
V2PermissionsGetRoleResponseData$.outboundSchema = V2PermissionsGetRoleResponseData$outboundSchema;
|
|
37457
|
-
})(V2PermissionsGetRoleResponseData$ ||= {});
|
|
37458
|
-
});
|
|
37459
|
-
|
|
37460
37459
|
// src/models/components/v2permissionsgetroleresponsebody.ts
|
|
37461
37460
|
var V2PermissionsGetRoleResponseBody$inboundSchema, V2PermissionsGetRoleResponseBody$outboundSchema, V2PermissionsGetRoleResponseBody$;
|
|
37462
37461
|
var init_v2permissionsgetroleresponsebody = __esm(() => {
|
|
37463
37462
|
init_zod();
|
|
37464
37463
|
init_meta();
|
|
37465
|
-
|
|
37464
|
+
init_role();
|
|
37466
37465
|
V2PermissionsGetRoleResponseBody$inboundSchema = objectType({
|
|
37467
37466
|
meta: Meta$inboundSchema,
|
|
37468
|
-
data:
|
|
37467
|
+
data: Role$inboundSchema
|
|
37469
37468
|
});
|
|
37470
37469
|
V2PermissionsGetRoleResponseBody$outboundSchema = objectType({
|
|
37471
37470
|
meta: Meta$outboundSchema,
|
|
37472
|
-
data:
|
|
37471
|
+
data: Role$outboundSchema
|
|
37473
37472
|
});
|
|
37474
37473
|
((V2PermissionsGetRoleResponseBody$) => {
|
|
37475
37474
|
V2PermissionsGetRoleResponseBody$.inboundSchema = V2PermissionsGetRoleResponseBody$inboundSchema;
|
|
@@ -37852,7 +37851,6 @@ var init_components = __esm(() => {
|
|
|
37852
37851
|
init_v2identitiesdeleteidentityresponsebody();
|
|
37853
37852
|
init_v2identitiesgetidentityrequestbody();
|
|
37854
37853
|
init_v2identitiesgetidentityresponsebody();
|
|
37855
|
-
init_v2identitiesgetidentityresponsedata();
|
|
37856
37854
|
init_v2identitieslistidentitiesrequestbody();
|
|
37857
37855
|
init_v2identitieslistidentitiesresponsebody();
|
|
37858
37856
|
init_v2identitiesupdateidentityrequestbody();
|
|
@@ -37872,6 +37870,9 @@ var init_components = __esm(() => {
|
|
|
37872
37870
|
init_v2keysremovepermissionsresponsebody();
|
|
37873
37871
|
init_v2keysremoverolesrequestbody();
|
|
37874
37872
|
init_v2keysremoverolesresponsebody();
|
|
37873
|
+
init_v2keysrerollkeyrequestbody();
|
|
37874
|
+
init_v2keysrerollkeyresponsebody();
|
|
37875
|
+
init_v2keysrerollkeyresponsedata();
|
|
37875
37876
|
init_v2keyssetpermissionsrequestbody();
|
|
37876
37877
|
init_v2keyssetpermissionsresponsebody();
|
|
37877
37878
|
init_v2keyssetrolesrequestbody();
|
|
@@ -37897,10 +37898,8 @@ var init_components = __esm(() => {
|
|
|
37897
37898
|
init_v2permissionsdeleteroleresponsebody();
|
|
37898
37899
|
init_v2permissionsgetpermissionrequestbody();
|
|
37899
37900
|
init_v2permissionsgetpermissionresponsebody();
|
|
37900
|
-
init_v2permissionsgetpermissionresponsedata();
|
|
37901
37901
|
init_v2permissionsgetrolerequestbody();
|
|
37902
37902
|
init_v2permissionsgetroleresponsebody();
|
|
37903
|
-
init_v2permissionsgetroleresponsedata();
|
|
37904
37903
|
init_v2permissionslistpermissionsrequestbody();
|
|
37905
37904
|
init_v2permissionslistpermissionsresponsebody();
|
|
37906
37905
|
init_v2permissionslistrolesrequestbody();
|
|
@@ -38477,9 +38476,11 @@ var init_apisDeleteApi2 = __esm(() => {
|
|
|
38477
38476
|
|
|
38478
38477
|
Permanently delete an API namespace and immediately invalidate all associated keys.
|
|
38479
38478
|
|
|
38480
|
-
Use this for cleaning up development environments, retiring deprecated services, or removing unused resources.
|
|
38479
|
+
Use this for cleaning up development environments, retiring deprecated services, or removing unused resources.
|
|
38480
|
+
All keys in the namespace are immediately marked as deleted and will fail verification with \`code=NOT_FOUND\`.
|
|
38481
38481
|
|
|
38482
|
-
**Important**: This operation is immediate and permanent. Verify you have the correct API ID before deletion.
|
|
38482
|
+
**Important**: This operation is immediate and permanent. Verify you have the correct API ID before deletion.
|
|
38483
|
+
If delete protection is enabled, disable it first through the dashboard or API configuration.
|
|
38483
38484
|
|
|
38484
38485
|
**Required Permissions**
|
|
38485
38486
|
|
|
@@ -38852,8 +38853,8 @@ Create an identity to group multiple API keys under a single entity. Identities
|
|
|
38852
38853
|
|
|
38853
38854
|
Perfect for users with multiple devices, organizations with multiple API keys, or when you need unified rate limiting across different services.
|
|
38854
38855
|
|
|
38855
|
-
|
|
38856
|
-
|
|
38856
|
+
**Important**
|
|
38857
|
+
Requires \`identity.*.create_identity\` permission
|
|
38857
38858
|
`,
|
|
38858
38859
|
args: args5,
|
|
38859
38860
|
tool: async (client, args6, ctx) => {
|
|
@@ -39423,8 +39424,8 @@ Update an identity's metadata and rate limits. Only specified fields are modifie
|
|
|
39423
39424
|
|
|
39424
39425
|
Perfect for subscription changes, plan upgrades, or updating user information. Changes take effect immediately.
|
|
39425
39426
|
|
|
39426
|
-
> **Important**
|
|
39427
|
-
> Requires \`identity.*.update_identity\` permission
|
|
39427
|
+
> **Important**
|
|
39428
|
+
> Requires \`identity.*.update_identity\` permission
|
|
39428
39429
|
> Rate limit changes propagate within 30 seconds
|
|
39429
39430
|
`,
|
|
39430
39431
|
args: args9,
|
|
@@ -40327,11 +40328,155 @@ Invalidates the key cache for immediate effect, and makes role changes available
|
|
|
40327
40328
|
};
|
|
40328
40329
|
});
|
|
40329
40330
|
|
|
40330
|
-
// src/funcs/
|
|
40331
|
-
function
|
|
40331
|
+
// src/funcs/keysRerollKey.ts
|
|
40332
|
+
function keysRerollKey(client, request, options) {
|
|
40332
40333
|
return new APIPromise($do17(client, request, options));
|
|
40333
40334
|
}
|
|
40334
40335
|
async function $do17(client, request, options) {
|
|
40336
|
+
const parsed = safeParse(request, (value) => V2KeysRerollKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40337
|
+
if (!parsed.ok) {
|
|
40338
|
+
return [parsed, { status: "invalid" }];
|
|
40339
|
+
}
|
|
40340
|
+
const payload = parsed.value;
|
|
40341
|
+
const body = encodeJSON("body", payload, { explode: true });
|
|
40342
|
+
const path = pathToFunc("/v2/keys.rerollKey")();
|
|
40343
|
+
const headers = new Headers(compactMap({
|
|
40344
|
+
"Content-Type": "application/json",
|
|
40345
|
+
Accept: "application/json"
|
|
40346
|
+
}));
|
|
40347
|
+
const secConfig = await extractSecurity(client._options.rootKey);
|
|
40348
|
+
const securityInput = secConfig == null ? {} : { rootKey: secConfig };
|
|
40349
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
40350
|
+
const context = {
|
|
40351
|
+
options: client._options,
|
|
40352
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
40353
|
+
operationID: "rerollKey",
|
|
40354
|
+
oAuth2Scopes: [],
|
|
40355
|
+
resolvedSecurity: requestSecurity,
|
|
40356
|
+
securitySource: client._options.rootKey,
|
|
40357
|
+
retryConfig: options?.retries || client._options.retryConfig || {
|
|
40358
|
+
strategy: "backoff",
|
|
40359
|
+
backoff: {
|
|
40360
|
+
initialInterval: 50,
|
|
40361
|
+
maxInterval: 1000,
|
|
40362
|
+
exponent: 1.5,
|
|
40363
|
+
maxElapsedTime: 1e4
|
|
40364
|
+
},
|
|
40365
|
+
retryConnectionErrors: true
|
|
40366
|
+
},
|
|
40367
|
+
retryCodes: options?.retryCodes || ["5XX"]
|
|
40368
|
+
};
|
|
40369
|
+
const requestRes = client._createRequest(context, {
|
|
40370
|
+
security: requestSecurity,
|
|
40371
|
+
method: "POST",
|
|
40372
|
+
baseURL: options?.serverURL,
|
|
40373
|
+
path,
|
|
40374
|
+
headers,
|
|
40375
|
+
body,
|
|
40376
|
+
userAgent: client._options.userAgent,
|
|
40377
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
40378
|
+
}, options);
|
|
40379
|
+
if (!requestRes.ok) {
|
|
40380
|
+
return [requestRes, { status: "invalid" }];
|
|
40381
|
+
}
|
|
40382
|
+
const req = requestRes.value;
|
|
40383
|
+
const doResult = await client._do(req, {
|
|
40384
|
+
context,
|
|
40385
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
40386
|
+
retryConfig: context.retryConfig,
|
|
40387
|
+
retryCodes: context.retryCodes
|
|
40388
|
+
});
|
|
40389
|
+
if (!doResult.ok) {
|
|
40390
|
+
return [doResult, { status: "request-error", request: req }];
|
|
40391
|
+
}
|
|
40392
|
+
const response = doResult.value;
|
|
40393
|
+
const responseFields = {
|
|
40394
|
+
HttpMeta: { Response: response, Request: req }
|
|
40395
|
+
};
|
|
40396
|
+
const [result] = await match(json(200, V2KeysRerollKeyResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
|
|
40397
|
+
if (!result.ok) {
|
|
40398
|
+
return [result, { status: "complete", request: req, response }];
|
|
40399
|
+
}
|
|
40400
|
+
return [result, { status: "complete", request: req, response }];
|
|
40401
|
+
}
|
|
40402
|
+
var init_keysRerollKey = __esm(() => {
|
|
40403
|
+
init_encodings();
|
|
40404
|
+
init_matchers();
|
|
40405
|
+
init_primitives();
|
|
40406
|
+
init_schemas();
|
|
40407
|
+
init_security();
|
|
40408
|
+
init_url();
|
|
40409
|
+
init_components();
|
|
40410
|
+
init_errors2();
|
|
40411
|
+
init_async();
|
|
40412
|
+
});
|
|
40413
|
+
|
|
40414
|
+
// src/mcp-server/tools/keysRerollKey.ts
|
|
40415
|
+
var args17, tool$keysRerollKey;
|
|
40416
|
+
var init_keysRerollKey2 = __esm(() => {
|
|
40417
|
+
init_keysRerollKey();
|
|
40418
|
+
init_components();
|
|
40419
|
+
init_tools();
|
|
40420
|
+
args17 = {
|
|
40421
|
+
request: V2KeysRerollKeyRequestBody$inboundSchema
|
|
40422
|
+
};
|
|
40423
|
+
tool$keysRerollKey = {
|
|
40424
|
+
name: "keys-reroll-key",
|
|
40425
|
+
description: `Reroll Key
|
|
40426
|
+
|
|
40427
|
+
Generate a new API key while preserving the configuration from an existing key.
|
|
40428
|
+
|
|
40429
|
+
This operation creates a fresh key with a new token while maintaining all settings from the original key:
|
|
40430
|
+
- Permissions and roles
|
|
40431
|
+
- Custom metadata
|
|
40432
|
+
- Rate limit configurations
|
|
40433
|
+
- Identity associations
|
|
40434
|
+
- Remaining credits
|
|
40435
|
+
- Recovery settings
|
|
40436
|
+
|
|
40437
|
+
**Key Generation:**
|
|
40438
|
+
- The system attempts to extract the prefix from the original key
|
|
40439
|
+
- If prefix extraction fails, the default API prefix is used
|
|
40440
|
+
- Key length follows the API's default byte configuration (or 16 bytes if not specified)
|
|
40441
|
+
|
|
40442
|
+
**Original Key Handling:**
|
|
40443
|
+
- The original key will be revoked after the duration specified in \`expiration\`
|
|
40444
|
+
- Set \`expiration\` to 0 to revoke immediately
|
|
40445
|
+
- This allows for graceful key rotation with an overlap period
|
|
40446
|
+
|
|
40447
|
+
Common use cases include:
|
|
40448
|
+
- Rotating keys for security compliance
|
|
40449
|
+
- Issuing replacement keys for compromised credentials
|
|
40450
|
+
- Creating backup keys with identical permissions
|
|
40451
|
+
|
|
40452
|
+
**Important:** Analytics and usage metrics are tracked at both the key level AND identity level. If the original key has an identity, the new key will inherit it, allowing you to track usage across both individual keys and the overall identity.
|
|
40453
|
+
|
|
40454
|
+
**Required Permissions**
|
|
40455
|
+
|
|
40456
|
+
Your root key must have:
|
|
40457
|
+
- \`api.*.create_key\` or \`api.<api_id>.create_key\`
|
|
40458
|
+
- \`api.*.encrypt_key\` or \`api.<api_id>.encrypt_key\` (only when the original key is recoverable)
|
|
40459
|
+
`,
|
|
40460
|
+
args: args17,
|
|
40461
|
+
tool: async (client, args18, ctx) => {
|
|
40462
|
+
const [result, apiCall] = await keysRerollKey(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40463
|
+
if (!result.ok) {
|
|
40464
|
+
return {
|
|
40465
|
+
content: [{ type: "text", text: result.error.message }],
|
|
40466
|
+
isError: true
|
|
40467
|
+
};
|
|
40468
|
+
}
|
|
40469
|
+
const value = result.value;
|
|
40470
|
+
return formatResult(value, apiCall);
|
|
40471
|
+
}
|
|
40472
|
+
};
|
|
40473
|
+
});
|
|
40474
|
+
|
|
40475
|
+
// src/funcs/keysSetPermissions.ts
|
|
40476
|
+
function keysSetPermissions(client, request, options) {
|
|
40477
|
+
return new APIPromise($do18(client, request, options));
|
|
40478
|
+
}
|
|
40479
|
+
async function $do18(client, request, options) {
|
|
40335
40480
|
const parsed = safeParse(request, (value) => V2KeysSetPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40336
40481
|
if (!parsed.ok) {
|
|
40337
40482
|
return [parsed, { status: "invalid" }];
|
|
@@ -40411,12 +40556,12 @@ var init_keysSetPermissions = __esm(() => {
|
|
|
40411
40556
|
});
|
|
40412
40557
|
|
|
40413
40558
|
// src/mcp-server/tools/keysSetPermissions.ts
|
|
40414
|
-
var
|
|
40559
|
+
var args18, tool$keysSetPermissions;
|
|
40415
40560
|
var init_keysSetPermissions2 = __esm(() => {
|
|
40416
40561
|
init_keysSetPermissions();
|
|
40417
40562
|
init_components();
|
|
40418
40563
|
init_tools();
|
|
40419
|
-
|
|
40564
|
+
args18 = {
|
|
40420
40565
|
request: V2KeysSetPermissionsRequestBody$inboundSchema
|
|
40421
40566
|
};
|
|
40422
40567
|
tool$keysSetPermissions = {
|
|
@@ -40439,9 +40584,9 @@ Your root key must have one of the following permissions:
|
|
|
40439
40584
|
|
|
40440
40585
|
Invalidates the key cache for immediate effect, and makes permission changes available for verification within 30 seconds across all regions.
|
|
40441
40586
|
`,
|
|
40442
|
-
args:
|
|
40443
|
-
tool: async (client,
|
|
40444
|
-
const [result, apiCall] = await keysSetPermissions(client,
|
|
40587
|
+
args: args18,
|
|
40588
|
+
tool: async (client, args19, ctx) => {
|
|
40589
|
+
const [result, apiCall] = await keysSetPermissions(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40445
40590
|
if (!result.ok) {
|
|
40446
40591
|
return {
|
|
40447
40592
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40456,9 +40601,9 @@ Invalidates the key cache for immediate effect, and makes permission changes ava
|
|
|
40456
40601
|
|
|
40457
40602
|
// src/funcs/keysSetRoles.ts
|
|
40458
40603
|
function keysSetRoles(client, request, options) {
|
|
40459
|
-
return new APIPromise($
|
|
40604
|
+
return new APIPromise($do19(client, request, options));
|
|
40460
40605
|
}
|
|
40461
|
-
async function $
|
|
40606
|
+
async function $do19(client, request, options) {
|
|
40462
40607
|
const parsed = safeParse(request, (value) => V2KeysSetRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40463
40608
|
if (!parsed.ok) {
|
|
40464
40609
|
return [parsed, { status: "invalid" }];
|
|
@@ -40538,12 +40683,12 @@ var init_keysSetRoles = __esm(() => {
|
|
|
40538
40683
|
});
|
|
40539
40684
|
|
|
40540
40685
|
// src/mcp-server/tools/keysSetRoles.ts
|
|
40541
|
-
var
|
|
40686
|
+
var args19, tool$keysSetRoles;
|
|
40542
40687
|
var init_keysSetRoles2 = __esm(() => {
|
|
40543
40688
|
init_keysSetRoles();
|
|
40544
40689
|
init_components();
|
|
40545
40690
|
init_tools();
|
|
40546
|
-
|
|
40691
|
+
args19 = {
|
|
40547
40692
|
request: V2KeysSetRolesRequestBody$inboundSchema
|
|
40548
40693
|
};
|
|
40549
40694
|
tool$keysSetRoles = {
|
|
@@ -40566,9 +40711,9 @@ Your root key must have one of the following permissions:
|
|
|
40566
40711
|
|
|
40567
40712
|
Invalidates the key cache for immediate effect, and makes role changes available for verification within 30 seconds across all regions.
|
|
40568
40713
|
`,
|
|
40569
|
-
args:
|
|
40570
|
-
tool: async (client,
|
|
40571
|
-
const [result, apiCall] = await keysSetRoles(client,
|
|
40714
|
+
args: args19,
|
|
40715
|
+
tool: async (client, args20, ctx) => {
|
|
40716
|
+
const [result, apiCall] = await keysSetRoles(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40572
40717
|
if (!result.ok) {
|
|
40573
40718
|
return {
|
|
40574
40719
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40583,9 +40728,9 @@ Invalidates the key cache for immediate effect, and makes role changes available
|
|
|
40583
40728
|
|
|
40584
40729
|
// src/funcs/keysUpdateCredits.ts
|
|
40585
40730
|
function keysUpdateCredits(client, request, options) {
|
|
40586
|
-
return new APIPromise($
|
|
40731
|
+
return new APIPromise($do20(client, request, options));
|
|
40587
40732
|
}
|
|
40588
|
-
async function $
|
|
40733
|
+
async function $do20(client, request, options) {
|
|
40589
40734
|
const parsed = safeParse(request, (value) => V2KeysUpdateCreditsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40590
40735
|
if (!parsed.ok) {
|
|
40591
40736
|
return [parsed, { status: "invalid" }];
|
|
@@ -40665,12 +40810,12 @@ var init_keysUpdateCredits = __esm(() => {
|
|
|
40665
40810
|
});
|
|
40666
40811
|
|
|
40667
40812
|
// src/mcp-server/tools/keysUpdateCredits.ts
|
|
40668
|
-
var
|
|
40813
|
+
var args20, tool$keysUpdateCredits;
|
|
40669
40814
|
var init_keysUpdateCredits2 = __esm(() => {
|
|
40670
40815
|
init_keysUpdateCredits();
|
|
40671
40816
|
init_components();
|
|
40672
40817
|
init_tools();
|
|
40673
|
-
|
|
40818
|
+
args20 = {
|
|
40674
40819
|
request: V2KeysUpdateCreditsRequestBody$inboundSchema
|
|
40675
40820
|
};
|
|
40676
40821
|
tool$keysUpdateCredits = {
|
|
@@ -40693,9 +40838,9 @@ Your root key must have one of the following permissions:
|
|
|
40693
40838
|
|
|
40694
40839
|
Credit updates remove the key from cache immediately. Setting credits to unlimited automatically clears any existing refill settings. Changes take effect instantly but may take up to 30 seconds to propagate to all edge regions.
|
|
40695
40840
|
`,
|
|
40696
|
-
args:
|
|
40697
|
-
tool: async (client,
|
|
40698
|
-
const [result, apiCall] = await keysUpdateCredits(client,
|
|
40841
|
+
args: args20,
|
|
40842
|
+
tool: async (client, args21, ctx) => {
|
|
40843
|
+
const [result, apiCall] = await keysUpdateCredits(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40699
40844
|
if (!result.ok) {
|
|
40700
40845
|
return {
|
|
40701
40846
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40710,9 +40855,9 @@ Credit updates remove the key from cache immediately. Setting credits to unlimit
|
|
|
40710
40855
|
|
|
40711
40856
|
// src/funcs/keysUpdateKey.ts
|
|
40712
40857
|
function keysUpdateKey(client, request, options) {
|
|
40713
|
-
return new APIPromise($
|
|
40858
|
+
return new APIPromise($do21(client, request, options));
|
|
40714
40859
|
}
|
|
40715
|
-
async function $
|
|
40860
|
+
async function $do21(client, request, options) {
|
|
40716
40861
|
const parsed = safeParse(request, (value) => V2KeysUpdateKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40717
40862
|
if (!parsed.ok) {
|
|
40718
40863
|
return [parsed, { status: "invalid" }];
|
|
@@ -40792,12 +40937,12 @@ var init_keysUpdateKey = __esm(() => {
|
|
|
40792
40937
|
});
|
|
40793
40938
|
|
|
40794
40939
|
// src/mcp-server/tools/keysUpdateKey.ts
|
|
40795
|
-
var
|
|
40940
|
+
var args21, tool$keysUpdateKey;
|
|
40796
40941
|
var init_keysUpdateKey2 = __esm(() => {
|
|
40797
40942
|
init_keysUpdateKey();
|
|
40798
40943
|
init_components();
|
|
40799
40944
|
init_tools();
|
|
40800
|
-
|
|
40945
|
+
args21 = {
|
|
40801
40946
|
request: V2KeysUpdateKeyRequestBody$inboundSchema
|
|
40802
40947
|
};
|
|
40803
40948
|
tool$keysUpdateKey = {
|
|
@@ -40820,9 +40965,9 @@ Your root key must have one of the following permissions:
|
|
|
40820
40965
|
|
|
40821
40966
|
If you specify an \`externalId\` that doesn't exist, a new identity will be automatically created and linked to the key. Permission updates will auto-create any permissions that don't exist in your workspace. Changes take effect immediately but may take up to 30 seconds to propagate to all edge regions due to cache invalidation.
|
|
40822
40967
|
`,
|
|
40823
|
-
args:
|
|
40824
|
-
tool: async (client,
|
|
40825
|
-
const [result, apiCall] = await keysUpdateKey(client,
|
|
40968
|
+
args: args21,
|
|
40969
|
+
tool: async (client, args22, ctx) => {
|
|
40970
|
+
const [result, apiCall] = await keysUpdateKey(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40826
40971
|
if (!result.ok) {
|
|
40827
40972
|
return {
|
|
40828
40973
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40837,9 +40982,9 @@ If you specify an \`externalId\` that doesn't exist, a new identity will be auto
|
|
|
40837
40982
|
|
|
40838
40983
|
// src/funcs/keysVerifyKey.ts
|
|
40839
40984
|
function keysVerifyKey(client, request, options) {
|
|
40840
|
-
return new APIPromise($
|
|
40985
|
+
return new APIPromise($do22(client, request, options));
|
|
40841
40986
|
}
|
|
40842
|
-
async function $
|
|
40987
|
+
async function $do22(client, request, options) {
|
|
40843
40988
|
const parsed = safeParse(request, (value) => V2KeysVerifyKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40844
40989
|
if (!parsed.ok) {
|
|
40845
40990
|
return [parsed, { status: "invalid" }];
|
|
@@ -40919,12 +41064,12 @@ var init_keysVerifyKey = __esm(() => {
|
|
|
40919
41064
|
});
|
|
40920
41065
|
|
|
40921
41066
|
// src/mcp-server/tools/keysVerifyKey.ts
|
|
40922
|
-
var
|
|
41067
|
+
var args22, tool$keysVerifyKey;
|
|
40923
41068
|
var init_keysVerifyKey2 = __esm(() => {
|
|
40924
41069
|
init_keysVerifyKey();
|
|
40925
41070
|
init_components();
|
|
40926
41071
|
init_tools();
|
|
40927
|
-
|
|
41072
|
+
args22 = {
|
|
40928
41073
|
request: V2KeysVerifyKeyRequestBody$inboundSchema
|
|
40929
41074
|
};
|
|
40930
41075
|
tool$keysVerifyKey = {
|
|
@@ -40950,9 +41095,9 @@ Your root key needs one of:
|
|
|
40950
41095
|
|
|
40951
41096
|
If you are getting a NOT_FOUND error, ensure your root key has the required verify key permissions.
|
|
40952
41097
|
`,
|
|
40953
|
-
args:
|
|
40954
|
-
tool: async (client,
|
|
40955
|
-
const [result, apiCall] = await keysVerifyKey(client,
|
|
41098
|
+
args: args22,
|
|
41099
|
+
tool: async (client, args23, ctx) => {
|
|
41100
|
+
const [result, apiCall] = await keysVerifyKey(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40956
41101
|
if (!result.ok) {
|
|
40957
41102
|
return {
|
|
40958
41103
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40967,9 +41112,9 @@ If you are getting a NOT_FOUND error, ensure your root key has the required veri
|
|
|
40967
41112
|
|
|
40968
41113
|
// src/funcs/keysWhoami.ts
|
|
40969
41114
|
function keysWhoami(client, request, options) {
|
|
40970
|
-
return new APIPromise($
|
|
41115
|
+
return new APIPromise($do23(client, request, options));
|
|
40971
41116
|
}
|
|
40972
|
-
async function $
|
|
41117
|
+
async function $do23(client, request, options) {
|
|
40973
41118
|
const parsed = safeParse(request, (value) => V2KeysWhoamiRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40974
41119
|
if (!parsed.ok) {
|
|
40975
41120
|
return [parsed, { status: "invalid" }];
|
|
@@ -41049,12 +41194,12 @@ var init_keysWhoami = __esm(() => {
|
|
|
41049
41194
|
});
|
|
41050
41195
|
|
|
41051
41196
|
// src/mcp-server/tools/keysWhoami.ts
|
|
41052
|
-
var
|
|
41197
|
+
var args23, tool$keysWhoami;
|
|
41053
41198
|
var init_keysWhoami2 = __esm(() => {
|
|
41054
41199
|
init_keysWhoami();
|
|
41055
41200
|
init_components();
|
|
41056
41201
|
init_tools();
|
|
41057
|
-
|
|
41202
|
+
args23 = {
|
|
41058
41203
|
request: V2KeysWhoamiRequestBody$inboundSchema
|
|
41059
41204
|
};
|
|
41060
41205
|
tool$keysWhoami = {
|
|
@@ -41071,9 +41216,9 @@ Your root key must have one of the following permissions for basic key informati
|
|
|
41071
41216
|
|
|
41072
41217
|
If your rootkey lacks permissions but the key exists, we may return a 404 status here to prevent leaking the existance of a key to unauthorized clients. If you believe that a key should exist, but receive a 404, please double check your root key has the correct permissions.
|
|
41073
41218
|
`,
|
|
41074
|
-
args:
|
|
41075
|
-
tool: async (client,
|
|
41076
|
-
const [result, apiCall] = await keysWhoami(client,
|
|
41219
|
+
args: args23,
|
|
41220
|
+
tool: async (client, args24, ctx) => {
|
|
41221
|
+
const [result, apiCall] = await keysWhoami(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41077
41222
|
if (!result.ok) {
|
|
41078
41223
|
return {
|
|
41079
41224
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41088,9 +41233,9 @@ If your rootkey lacks permissions but the key exists, we may return a 404 status
|
|
|
41088
41233
|
|
|
41089
41234
|
// src/funcs/permissionsCreatePermission.ts
|
|
41090
41235
|
function permissionsCreatePermission(client, request, options) {
|
|
41091
|
-
return new APIPromise($
|
|
41236
|
+
return new APIPromise($do24(client, request, options));
|
|
41092
41237
|
}
|
|
41093
|
-
async function $
|
|
41238
|
+
async function $do24(client, request, options) {
|
|
41094
41239
|
const parsed = safeParse(request, (value) => V2PermissionsCreatePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41095
41240
|
if (!parsed.ok) {
|
|
41096
41241
|
return [parsed, { status: "invalid" }];
|
|
@@ -41170,12 +41315,12 @@ var init_permissionsCreatePermission = __esm(() => {
|
|
|
41170
41315
|
});
|
|
41171
41316
|
|
|
41172
41317
|
// src/mcp-server/tools/permissionsCreatePermission.ts
|
|
41173
|
-
var
|
|
41318
|
+
var args24, tool$permissionsCreatePermission;
|
|
41174
41319
|
var init_permissionsCreatePermission2 = __esm(() => {
|
|
41175
41320
|
init_permissionsCreatePermission();
|
|
41176
41321
|
init_components();
|
|
41177
41322
|
init_tools();
|
|
41178
|
-
|
|
41323
|
+
args24 = {
|
|
41179
41324
|
request: V2PermissionsCreatePermissionRequestBody$inboundSchema
|
|
41180
41325
|
};
|
|
41181
41326
|
tool$permissionsCreatePermission = {
|
|
@@ -41193,9 +41338,9 @@ Use hierarchical naming patterns like \`documents.read\`, \`admin.users.delete\`
|
|
|
41193
41338
|
Your root key must have the following permission:
|
|
41194
41339
|
- \`rbac.*.create_permission\`
|
|
41195
41340
|
`,
|
|
41196
|
-
args:
|
|
41197
|
-
tool: async (client,
|
|
41198
|
-
const [result, apiCall] = await permissionsCreatePermission(client,
|
|
41341
|
+
args: args24,
|
|
41342
|
+
tool: async (client, args25, ctx) => {
|
|
41343
|
+
const [result, apiCall] = await permissionsCreatePermission(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41199
41344
|
if (!result.ok) {
|
|
41200
41345
|
return {
|
|
41201
41346
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41210,9 +41355,9 @@ Your root key must have the following permission:
|
|
|
41210
41355
|
|
|
41211
41356
|
// src/funcs/permissionsCreateRole.ts
|
|
41212
41357
|
function permissionsCreateRole(client, request, options) {
|
|
41213
|
-
return new APIPromise($
|
|
41358
|
+
return new APIPromise($do25(client, request, options));
|
|
41214
41359
|
}
|
|
41215
|
-
async function $
|
|
41360
|
+
async function $do25(client, request, options) {
|
|
41216
41361
|
const parsed = safeParse(request, (value) => V2PermissionsCreateRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41217
41362
|
if (!parsed.ok) {
|
|
41218
41363
|
return [parsed, { status: "invalid" }];
|
|
@@ -41292,12 +41437,12 @@ var init_permissionsCreateRole = __esm(() => {
|
|
|
41292
41437
|
});
|
|
41293
41438
|
|
|
41294
41439
|
// src/mcp-server/tools/permissionsCreateRole.ts
|
|
41295
|
-
var
|
|
41440
|
+
var args25, tool$permissionsCreateRole;
|
|
41296
41441
|
var init_permissionsCreateRole2 = __esm(() => {
|
|
41297
41442
|
init_permissionsCreateRole();
|
|
41298
41443
|
init_components();
|
|
41299
41444
|
init_tools();
|
|
41300
|
-
|
|
41445
|
+
args25 = {
|
|
41301
41446
|
request: V2PermissionsCreateRoleRequestBody$inboundSchema
|
|
41302
41447
|
};
|
|
41303
41448
|
tool$permissionsCreateRole = {
|
|
@@ -41313,9 +41458,9 @@ Create a new role to group related permissions for easier management. Roles enab
|
|
|
41313
41458
|
Your root key must have the following permission:
|
|
41314
41459
|
- \`rbac.*.create_role\`
|
|
41315
41460
|
`,
|
|
41316
|
-
args:
|
|
41317
|
-
tool: async (client,
|
|
41318
|
-
const [result, apiCall] = await permissionsCreateRole(client,
|
|
41461
|
+
args: args25,
|
|
41462
|
+
tool: async (client, args26, ctx) => {
|
|
41463
|
+
const [result, apiCall] = await permissionsCreateRole(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41319
41464
|
if (!result.ok) {
|
|
41320
41465
|
return {
|
|
41321
41466
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41330,9 +41475,9 @@ Your root key must have the following permission:
|
|
|
41330
41475
|
|
|
41331
41476
|
// src/funcs/permissionsDeletePermission.ts
|
|
41332
41477
|
function permissionsDeletePermission(client, request, options) {
|
|
41333
|
-
return new APIPromise($
|
|
41478
|
+
return new APIPromise($do26(client, request, options));
|
|
41334
41479
|
}
|
|
41335
|
-
async function $
|
|
41480
|
+
async function $do26(client, request, options) {
|
|
41336
41481
|
const parsed = safeParse(request, (value) => V2PermissionsDeletePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41337
41482
|
if (!parsed.ok) {
|
|
41338
41483
|
return [parsed, { status: "invalid" }];
|
|
@@ -41412,12 +41557,12 @@ var init_permissionsDeletePermission = __esm(() => {
|
|
|
41412
41557
|
});
|
|
41413
41558
|
|
|
41414
41559
|
// src/mcp-server/tools/permissionsDeletePermission.ts
|
|
41415
|
-
var
|
|
41560
|
+
var args26, tool$permissionsDeletePermission;
|
|
41416
41561
|
var init_permissionsDeletePermission2 = __esm(() => {
|
|
41417
41562
|
init_permissionsDeletePermission();
|
|
41418
41563
|
init_components();
|
|
41419
41564
|
init_tools();
|
|
41420
|
-
|
|
41565
|
+
args26 = {
|
|
41421
41566
|
request: V2PermissionsDeletePermissionRequestBody$inboundSchema
|
|
41422
41567
|
};
|
|
41423
41568
|
tool$permissionsDeletePermission = {
|
|
@@ -41433,9 +41578,9 @@ Remove a permission from your workspace. This also removes the permission from a
|
|
|
41433
41578
|
Your root key must have the following permission:
|
|
41434
41579
|
- \`rbac.*.delete_permission\`
|
|
41435
41580
|
`,
|
|
41436
|
-
args:
|
|
41437
|
-
tool: async (client,
|
|
41438
|
-
const [result, apiCall] = await permissionsDeletePermission(client,
|
|
41581
|
+
args: args26,
|
|
41582
|
+
tool: async (client, args27, ctx) => {
|
|
41583
|
+
const [result, apiCall] = await permissionsDeletePermission(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41439
41584
|
if (!result.ok) {
|
|
41440
41585
|
return {
|
|
41441
41586
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41450,9 +41595,9 @@ Your root key must have the following permission:
|
|
|
41450
41595
|
|
|
41451
41596
|
// src/funcs/permissionsDeleteRole.ts
|
|
41452
41597
|
function permissionsDeleteRole(client, request, options) {
|
|
41453
|
-
return new APIPromise($
|
|
41598
|
+
return new APIPromise($do27(client, request, options));
|
|
41454
41599
|
}
|
|
41455
|
-
async function $
|
|
41600
|
+
async function $do27(client, request, options) {
|
|
41456
41601
|
const parsed = safeParse(request, (value) => V2PermissionsDeleteRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41457
41602
|
if (!parsed.ok) {
|
|
41458
41603
|
return [parsed, { status: "invalid" }];
|
|
@@ -41532,12 +41677,12 @@ var init_permissionsDeleteRole = __esm(() => {
|
|
|
41532
41677
|
});
|
|
41533
41678
|
|
|
41534
41679
|
// src/mcp-server/tools/permissionsDeleteRole.ts
|
|
41535
|
-
var
|
|
41680
|
+
var args27, tool$permissionsDeleteRole;
|
|
41536
41681
|
var init_permissionsDeleteRole2 = __esm(() => {
|
|
41537
41682
|
init_permissionsDeleteRole();
|
|
41538
41683
|
init_components();
|
|
41539
41684
|
init_tools();
|
|
41540
|
-
|
|
41685
|
+
args27 = {
|
|
41541
41686
|
request: V2PermissionsDeleteRoleRequestBody$inboundSchema
|
|
41542
41687
|
};
|
|
41543
41688
|
tool$permissionsDeleteRole = {
|
|
@@ -41553,9 +41698,9 @@ Remove a role from your workspace. This also removes the role from all assigned
|
|
|
41553
41698
|
Your root key must have the following permission:
|
|
41554
41699
|
- \`rbac.*.delete_role\`
|
|
41555
41700
|
`,
|
|
41556
|
-
args:
|
|
41557
|
-
tool: async (client,
|
|
41558
|
-
const [result, apiCall] = await permissionsDeleteRole(client,
|
|
41701
|
+
args: args27,
|
|
41702
|
+
tool: async (client, args28, ctx) => {
|
|
41703
|
+
const [result, apiCall] = await permissionsDeleteRole(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41559
41704
|
if (!result.ok) {
|
|
41560
41705
|
return {
|
|
41561
41706
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41570,9 +41715,9 @@ Your root key must have the following permission:
|
|
|
41570
41715
|
|
|
41571
41716
|
// src/funcs/permissionsGetPermission.ts
|
|
41572
41717
|
function permissionsGetPermission(client, request, options) {
|
|
41573
|
-
return new APIPromise($
|
|
41718
|
+
return new APIPromise($do28(client, request, options));
|
|
41574
41719
|
}
|
|
41575
|
-
async function $
|
|
41720
|
+
async function $do28(client, request, options) {
|
|
41576
41721
|
const parsed = safeParse(request, (value) => V2PermissionsGetPermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41577
41722
|
if (!parsed.ok) {
|
|
41578
41723
|
return [parsed, { status: "invalid" }];
|
|
@@ -41652,12 +41797,12 @@ var init_permissionsGetPermission = __esm(() => {
|
|
|
41652
41797
|
});
|
|
41653
41798
|
|
|
41654
41799
|
// src/mcp-server/tools/permissionsGetPermission.ts
|
|
41655
|
-
var
|
|
41800
|
+
var args28, tool$permissionsGetPermission;
|
|
41656
41801
|
var init_permissionsGetPermission2 = __esm(() => {
|
|
41657
41802
|
init_permissionsGetPermission();
|
|
41658
41803
|
init_components();
|
|
41659
41804
|
init_tools();
|
|
41660
|
-
|
|
41805
|
+
args28 = {
|
|
41661
41806
|
request: V2PermissionsGetPermissionRequestBody$inboundSchema
|
|
41662
41807
|
};
|
|
41663
41808
|
tool$permissionsGetPermission = {
|
|
@@ -41671,9 +41816,9 @@ Retrieve details about a specific permission including its name, description, an
|
|
|
41671
41816
|
Your root key must have the following permission:
|
|
41672
41817
|
- \`rbac.*.read_permission\`
|
|
41673
41818
|
`,
|
|
41674
|
-
args:
|
|
41675
|
-
tool: async (client,
|
|
41676
|
-
const [result, apiCall] = await permissionsGetPermission(client,
|
|
41819
|
+
args: args28,
|
|
41820
|
+
tool: async (client, args29, ctx) => {
|
|
41821
|
+
const [result, apiCall] = await permissionsGetPermission(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41677
41822
|
if (!result.ok) {
|
|
41678
41823
|
return {
|
|
41679
41824
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41688,9 +41833,9 @@ Your root key must have the following permission:
|
|
|
41688
41833
|
|
|
41689
41834
|
// src/funcs/permissionsGetRole.ts
|
|
41690
41835
|
function permissionsGetRole(client, request, options) {
|
|
41691
|
-
return new APIPromise($
|
|
41836
|
+
return new APIPromise($do29(client, request, options));
|
|
41692
41837
|
}
|
|
41693
|
-
async function $
|
|
41838
|
+
async function $do29(client, request, options) {
|
|
41694
41839
|
const parsed = safeParse(request, (value) => V2PermissionsGetRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41695
41840
|
if (!parsed.ok) {
|
|
41696
41841
|
return [parsed, { status: "invalid" }];
|
|
@@ -41770,12 +41915,12 @@ var init_permissionsGetRole = __esm(() => {
|
|
|
41770
41915
|
});
|
|
41771
41916
|
|
|
41772
41917
|
// src/mcp-server/tools/permissionsGetRole.ts
|
|
41773
|
-
var
|
|
41918
|
+
var args29, tool$permissionsGetRole;
|
|
41774
41919
|
var init_permissionsGetRole2 = __esm(() => {
|
|
41775
41920
|
init_permissionsGetRole();
|
|
41776
41921
|
init_components();
|
|
41777
41922
|
init_tools();
|
|
41778
|
-
|
|
41923
|
+
args29 = {
|
|
41779
41924
|
request: V2PermissionsGetRoleRequestBody$inboundSchema
|
|
41780
41925
|
};
|
|
41781
41926
|
tool$permissionsGetRole = {
|
|
@@ -41789,9 +41934,9 @@ Retrieve details about a specific role including its assigned permissions.
|
|
|
41789
41934
|
Your root key must have the following permission:
|
|
41790
41935
|
- \`rbac.*.read_role\`
|
|
41791
41936
|
`,
|
|
41792
|
-
args:
|
|
41793
|
-
tool: async (client,
|
|
41794
|
-
const [result, apiCall] = await permissionsGetRole(client,
|
|
41937
|
+
args: args29,
|
|
41938
|
+
tool: async (client, args30, ctx) => {
|
|
41939
|
+
const [result, apiCall] = await permissionsGetRole(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41795
41940
|
if (!result.ok) {
|
|
41796
41941
|
return {
|
|
41797
41942
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41806,9 +41951,9 @@ Your root key must have the following permission:
|
|
|
41806
41951
|
|
|
41807
41952
|
// src/funcs/permissionsListPermissions.ts
|
|
41808
41953
|
function permissionsListPermissions(client, request, options) {
|
|
41809
|
-
return new APIPromise($
|
|
41954
|
+
return new APIPromise($do30(client, request, options));
|
|
41810
41955
|
}
|
|
41811
|
-
async function $
|
|
41956
|
+
async function $do30(client, request, options) {
|
|
41812
41957
|
const parsed = safeParse(request, (value) => V2PermissionsListPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41813
41958
|
if (!parsed.ok) {
|
|
41814
41959
|
return [parsed, { status: "invalid" }];
|
|
@@ -41888,28 +42033,29 @@ var init_permissionsListPermissions = __esm(() => {
|
|
|
41888
42033
|
});
|
|
41889
42034
|
|
|
41890
42035
|
// src/mcp-server/tools/permissionsListPermissions.ts
|
|
41891
|
-
var
|
|
42036
|
+
var args30, tool$permissionsListPermissions;
|
|
41892
42037
|
var init_permissionsListPermissions2 = __esm(() => {
|
|
41893
42038
|
init_permissionsListPermissions();
|
|
41894
42039
|
init_components();
|
|
41895
42040
|
init_tools();
|
|
41896
|
-
|
|
42041
|
+
args30 = {
|
|
41897
42042
|
request: V2PermissionsListPermissionsRequestBody$inboundSchema
|
|
41898
42043
|
};
|
|
41899
42044
|
tool$permissionsListPermissions = {
|
|
41900
42045
|
name: "permissions-list-permissions",
|
|
41901
42046
|
description: `List permissions
|
|
41902
42047
|
|
|
41903
|
-
Retrieve all permissions in your workspace.
|
|
42048
|
+
Retrieve all permissions in your workspace.
|
|
42049
|
+
Results are paginated and sorted by their id.
|
|
41904
42050
|
|
|
41905
42051
|
**Required Permissions**
|
|
41906
42052
|
|
|
41907
42053
|
Your root key must have the following permission:
|
|
41908
42054
|
- \`rbac.*.read_permission\`
|
|
41909
42055
|
`,
|
|
41910
|
-
args:
|
|
41911
|
-
tool: async (client,
|
|
41912
|
-
const [result, apiCall] = await permissionsListPermissions(client,
|
|
42056
|
+
args: args30,
|
|
42057
|
+
tool: async (client, args31, ctx) => {
|
|
42058
|
+
const [result, apiCall] = await permissionsListPermissions(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41913
42059
|
if (!result.ok) {
|
|
41914
42060
|
return {
|
|
41915
42061
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41924,9 +42070,9 @@ Your root key must have the following permission:
|
|
|
41924
42070
|
|
|
41925
42071
|
// src/funcs/permissionsListRoles.ts
|
|
41926
42072
|
function permissionsListRoles(client, request, options) {
|
|
41927
|
-
return new APIPromise($
|
|
42073
|
+
return new APIPromise($do31(client, request, options));
|
|
41928
42074
|
}
|
|
41929
|
-
async function $
|
|
42075
|
+
async function $do31(client, request, options) {
|
|
41930
42076
|
const parsed = safeParse(request, (value) => V2PermissionsListRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41931
42077
|
if (!parsed.ok) {
|
|
41932
42078
|
return [parsed, { status: "invalid" }];
|
|
@@ -42006,28 +42152,29 @@ var init_permissionsListRoles = __esm(() => {
|
|
|
42006
42152
|
});
|
|
42007
42153
|
|
|
42008
42154
|
// src/mcp-server/tools/permissionsListRoles.ts
|
|
42009
|
-
var
|
|
42155
|
+
var args31, tool$permissionsListRoles;
|
|
42010
42156
|
var init_permissionsListRoles2 = __esm(() => {
|
|
42011
42157
|
init_permissionsListRoles();
|
|
42012
42158
|
init_components();
|
|
42013
42159
|
init_tools();
|
|
42014
|
-
|
|
42160
|
+
args31 = {
|
|
42015
42161
|
request: V2PermissionsListRolesRequestBody$inboundSchema
|
|
42016
42162
|
};
|
|
42017
42163
|
tool$permissionsListRoles = {
|
|
42018
42164
|
name: "permissions-list-roles",
|
|
42019
42165
|
description: `List roles
|
|
42020
42166
|
|
|
42021
|
-
Retrieve all roles in your workspace including their assigned permissions.
|
|
42167
|
+
Retrieve all roles in your workspace including their assigned permissions.
|
|
42168
|
+
Results are paginated and sorted by their id.
|
|
42022
42169
|
|
|
42023
42170
|
**Required Permissions**
|
|
42024
42171
|
|
|
42025
42172
|
Your root key must have the following permission:
|
|
42026
42173
|
- \`rbac.*.read_role\`
|
|
42027
42174
|
`,
|
|
42028
|
-
args:
|
|
42029
|
-
tool: async (client,
|
|
42030
|
-
const [result, apiCall] = await permissionsListRoles(client,
|
|
42175
|
+
args: args31,
|
|
42176
|
+
tool: async (client, args32, ctx) => {
|
|
42177
|
+
const [result, apiCall] = await permissionsListRoles(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42031
42178
|
if (!result.ok) {
|
|
42032
42179
|
return {
|
|
42033
42180
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42042,9 +42189,9 @@ Your root key must have the following permission:
|
|
|
42042
42189
|
|
|
42043
42190
|
// src/funcs/ratelimitDeleteOverride.ts
|
|
42044
42191
|
function ratelimitDeleteOverride(client, request, options) {
|
|
42045
|
-
return new APIPromise($
|
|
42192
|
+
return new APIPromise($do32(client, request, options));
|
|
42046
42193
|
}
|
|
42047
|
-
async function $
|
|
42194
|
+
async function $do32(client, request, options) {
|
|
42048
42195
|
const parsed = safeParse(request, (value) => V2RatelimitDeleteOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42049
42196
|
if (!parsed.ok) {
|
|
42050
42197
|
return [parsed, { status: "invalid" }];
|
|
@@ -42124,12 +42271,12 @@ var init_ratelimitDeleteOverride = __esm(() => {
|
|
|
42124
42271
|
});
|
|
42125
42272
|
|
|
42126
42273
|
// src/mcp-server/tools/ratelimitDeleteOverride.ts
|
|
42127
|
-
var
|
|
42274
|
+
var args32, tool$ratelimitDeleteOverride;
|
|
42128
42275
|
var init_ratelimitDeleteOverride2 = __esm(() => {
|
|
42129
42276
|
init_ratelimitDeleteOverride();
|
|
42130
42277
|
init_components();
|
|
42131
42278
|
init_tools();
|
|
42132
|
-
|
|
42279
|
+
args32 = {
|
|
42133
42280
|
request: V2RatelimitDeleteOverrideRequestBody$inboundSchema
|
|
42134
42281
|
};
|
|
42135
42282
|
tool$ratelimitDeleteOverride = {
|
|
@@ -42144,9 +42291,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
|
|
|
42144
42291
|
|
|
42145
42292
|
**Permissions:** Requires \`ratelimit.*.delete_override\` or \`ratelimit.<namespace_id>.delete_override\`
|
|
42146
42293
|
`,
|
|
42147
|
-
args:
|
|
42148
|
-
tool: async (client,
|
|
42149
|
-
const [result, apiCall] = await ratelimitDeleteOverride(client,
|
|
42294
|
+
args: args32,
|
|
42295
|
+
tool: async (client, args33, ctx) => {
|
|
42296
|
+
const [result, apiCall] = await ratelimitDeleteOverride(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42150
42297
|
if (!result.ok) {
|
|
42151
42298
|
return {
|
|
42152
42299
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42161,9 +42308,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
|
|
|
42161
42308
|
|
|
42162
42309
|
// src/funcs/ratelimitGetOverride.ts
|
|
42163
42310
|
function ratelimitGetOverride(client, request, options) {
|
|
42164
|
-
return new APIPromise($
|
|
42311
|
+
return new APIPromise($do33(client, request, options));
|
|
42165
42312
|
}
|
|
42166
|
-
async function $
|
|
42313
|
+
async function $do33(client, request, options) {
|
|
42167
42314
|
const parsed = safeParse(request, (value) => V2RatelimitGetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42168
42315
|
if (!parsed.ok) {
|
|
42169
42316
|
return [parsed, { status: "invalid" }];
|
|
@@ -42243,12 +42390,12 @@ var init_ratelimitGetOverride = __esm(() => {
|
|
|
42243
42390
|
});
|
|
42244
42391
|
|
|
42245
42392
|
// src/mcp-server/tools/ratelimitGetOverride.ts
|
|
42246
|
-
var
|
|
42393
|
+
var args33, tool$ratelimitGetOverride;
|
|
42247
42394
|
var init_ratelimitGetOverride2 = __esm(() => {
|
|
42248
42395
|
init_ratelimitGetOverride();
|
|
42249
42396
|
init_components();
|
|
42250
42397
|
init_tools();
|
|
42251
|
-
|
|
42398
|
+
args33 = {
|
|
42252
42399
|
request: V2RatelimitGetOverrideRequestBody$inboundSchema
|
|
42253
42400
|
};
|
|
42254
42401
|
tool$ratelimitGetOverride = {
|
|
@@ -42263,9 +42410,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
|
|
|
42263
42410
|
|
|
42264
42411
|
**Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
|
|
42265
42412
|
`,
|
|
42266
|
-
args:
|
|
42267
|
-
tool: async (client,
|
|
42268
|
-
const [result, apiCall] = await ratelimitGetOverride(client,
|
|
42413
|
+
args: args33,
|
|
42414
|
+
tool: async (client, args34, ctx) => {
|
|
42415
|
+
const [result, apiCall] = await ratelimitGetOverride(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42269
42416
|
if (!result.ok) {
|
|
42270
42417
|
return {
|
|
42271
42418
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42280,9 +42427,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
|
|
|
42280
42427
|
|
|
42281
42428
|
// src/funcs/ratelimitLimit.ts
|
|
42282
42429
|
function ratelimitLimit(client, request, options) {
|
|
42283
|
-
return new APIPromise($
|
|
42430
|
+
return new APIPromise($do34(client, request, options));
|
|
42284
42431
|
}
|
|
42285
|
-
async function $
|
|
42432
|
+
async function $do34(client, request, options) {
|
|
42286
42433
|
const parsed = safeParse(request, (value) => V2RatelimitLimitRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42287
42434
|
if (!parsed.ok) {
|
|
42288
42435
|
return [parsed, { status: "invalid" }];
|
|
@@ -42362,12 +42509,12 @@ var init_ratelimitLimit = __esm(() => {
|
|
|
42362
42509
|
});
|
|
42363
42510
|
|
|
42364
42511
|
// src/mcp-server/tools/ratelimitLimit.ts
|
|
42365
|
-
var
|
|
42512
|
+
var args34, tool$ratelimitLimit;
|
|
42366
42513
|
var init_ratelimitLimit2 = __esm(() => {
|
|
42367
42514
|
init_ratelimitLimit();
|
|
42368
42515
|
init_components();
|
|
42369
42516
|
init_tools();
|
|
42370
|
-
|
|
42517
|
+
args34 = {
|
|
42371
42518
|
request: V2RatelimitLimitRequestBody$inboundSchema
|
|
42372
42519
|
};
|
|
42373
42520
|
tool$ratelimitLimit = {
|
|
@@ -42390,9 +42537,9 @@ Your root key must have one of the following permissions:
|
|
|
42390
42537
|
|
|
42391
42538
|
Records rate limit metrics for analytics and monitoring, updates rate limit counters with sliding window algorithm, and optionally triggers override matching for custom limits.
|
|
42392
42539
|
`,
|
|
42393
|
-
args:
|
|
42394
|
-
tool: async (client,
|
|
42395
|
-
const [result, apiCall] = await ratelimitLimit(client,
|
|
42540
|
+
args: args34,
|
|
42541
|
+
tool: async (client, args35, ctx) => {
|
|
42542
|
+
const [result, apiCall] = await ratelimitLimit(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42396
42543
|
if (!result.ok) {
|
|
42397
42544
|
return {
|
|
42398
42545
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42407,9 +42554,9 @@ Records rate limit metrics for analytics and monitoring, updates rate limit coun
|
|
|
42407
42554
|
|
|
42408
42555
|
// src/funcs/ratelimitListOverrides.ts
|
|
42409
42556
|
function ratelimitListOverrides(client, request, options) {
|
|
42410
|
-
return new APIPromise($
|
|
42557
|
+
return new APIPromise($do35(client, request, options));
|
|
42411
42558
|
}
|
|
42412
|
-
async function $
|
|
42559
|
+
async function $do35(client, request, options) {
|
|
42413
42560
|
const parsed = safeParse(request, (value) => V2RatelimitListOverridesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42414
42561
|
if (!parsed.ok) {
|
|
42415
42562
|
return [parsed, { status: "invalid" }];
|
|
@@ -42489,12 +42636,12 @@ var init_ratelimitListOverrides = __esm(() => {
|
|
|
42489
42636
|
});
|
|
42490
42637
|
|
|
42491
42638
|
// src/mcp-server/tools/ratelimitListOverrides.ts
|
|
42492
|
-
var
|
|
42639
|
+
var args35, tool$ratelimitListOverrides;
|
|
42493
42640
|
var init_ratelimitListOverrides2 = __esm(() => {
|
|
42494
42641
|
init_ratelimitListOverrides();
|
|
42495
42642
|
init_components();
|
|
42496
42643
|
init_tools();
|
|
42497
|
-
|
|
42644
|
+
args35 = {
|
|
42498
42645
|
request: V2RatelimitListOverridesRequestBody$inboundSchema
|
|
42499
42646
|
};
|
|
42500
42647
|
tool$ratelimitListOverrides = {
|
|
@@ -42509,9 +42656,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
|
|
|
42509
42656
|
|
|
42510
42657
|
**Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
|
|
42511
42658
|
`,
|
|
42512
|
-
args:
|
|
42513
|
-
tool: async (client,
|
|
42514
|
-
const [result, apiCall] = await ratelimitListOverrides(client,
|
|
42659
|
+
args: args35,
|
|
42660
|
+
tool: async (client, args36, ctx) => {
|
|
42661
|
+
const [result, apiCall] = await ratelimitListOverrides(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42515
42662
|
if (!result.ok) {
|
|
42516
42663
|
return {
|
|
42517
42664
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42526,9 +42673,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
|
|
|
42526
42673
|
|
|
42527
42674
|
// src/funcs/ratelimitSetOverride.ts
|
|
42528
42675
|
function ratelimitSetOverride(client, request, options) {
|
|
42529
|
-
return new APIPromise($
|
|
42676
|
+
return new APIPromise($do36(client, request, options));
|
|
42530
42677
|
}
|
|
42531
|
-
async function $
|
|
42678
|
+
async function $do36(client, request, options) {
|
|
42532
42679
|
const parsed = safeParse(request, (value) => V2RatelimitSetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42533
42680
|
if (!parsed.ok) {
|
|
42534
42681
|
return [parsed, { status: "invalid" }];
|
|
@@ -42608,12 +42755,12 @@ var init_ratelimitSetOverride = __esm(() => {
|
|
|
42608
42755
|
});
|
|
42609
42756
|
|
|
42610
42757
|
// src/mcp-server/tools/ratelimitSetOverride.ts
|
|
42611
|
-
var
|
|
42758
|
+
var args36, tool$ratelimitSetOverride;
|
|
42612
42759
|
var init_ratelimitSetOverride2 = __esm(() => {
|
|
42613
42760
|
init_ratelimitSetOverride();
|
|
42614
42761
|
init_components();
|
|
42615
42762
|
init_tools();
|
|
42616
|
-
|
|
42763
|
+
args36 = {
|
|
42617
42764
|
request: V2RatelimitSetOverrideRequestBody$inboundSchema
|
|
42618
42765
|
};
|
|
42619
42766
|
tool$ratelimitSetOverride = {
|
|
@@ -42628,9 +42775,9 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
|
|
|
42628
42775
|
|
|
42629
42776
|
**Permissions:** Requires \`ratelimit.*.set_override\` or \`ratelimit.<namespace_id>.set_override\`
|
|
42630
42777
|
`,
|
|
42631
|
-
args:
|
|
42632
|
-
tool: async (client,
|
|
42633
|
-
const [result, apiCall] = await ratelimitSetOverride(client,
|
|
42778
|
+
args: args36,
|
|
42779
|
+
tool: async (client, args37, ctx) => {
|
|
42780
|
+
const [result, apiCall] = await ratelimitSetOverride(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42634
42781
|
if (!result.ok) {
|
|
42635
42782
|
return {
|
|
42636
42783
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42647,7 +42794,7 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
|
|
|
42647
42794
|
function createMCPServer(deps) {
|
|
42648
42795
|
const server = new McpServer({
|
|
42649
42796
|
name: "Unkey",
|
|
42650
|
-
version: "2.0.
|
|
42797
|
+
version: "2.0.4"
|
|
42651
42798
|
});
|
|
42652
42799
|
const client = new UnkeyCore({
|
|
42653
42800
|
rootKey: deps.rootKey,
|
|
@@ -42677,6 +42824,7 @@ function createMCPServer(deps) {
|
|
|
42677
42824
|
tool(tool$keysGetKey);
|
|
42678
42825
|
tool(tool$keysRemovePermissions);
|
|
42679
42826
|
tool(tool$keysRemoveRoles);
|
|
42827
|
+
tool(tool$keysRerollKey);
|
|
42680
42828
|
tool(tool$keysSetPermissions);
|
|
42681
42829
|
tool(tool$keysSetRoles);
|
|
42682
42830
|
tool(tool$keysUpdateCredits);
|
|
@@ -42719,6 +42867,7 @@ var init_server2 = __esm(() => {
|
|
|
42719
42867
|
init_keysGetKey2();
|
|
42720
42868
|
init_keysRemovePermissions2();
|
|
42721
42869
|
init_keysRemoveRoles2();
|
|
42870
|
+
init_keysRerollKey2();
|
|
42722
42871
|
init_keysSetPermissions2();
|
|
42723
42872
|
init_keysSetRoles2();
|
|
42724
42873
|
init_keysUpdateCredits2();
|
|
@@ -43933,7 +44082,7 @@ var routes = ln({
|
|
|
43933
44082
|
var app = _e(routes, {
|
|
43934
44083
|
name: "mcp",
|
|
43935
44084
|
versionInfo: {
|
|
43936
|
-
currentVersion: "2.0.
|
|
44085
|
+
currentVersion: "2.0.4"
|
|
43937
44086
|
}
|
|
43938
44087
|
});
|
|
43939
44088
|
Yt(app, process3.argv.slice(2), buildContext(process3));
|
|
@@ -43941,5 +44090,5 @@ export {
|
|
|
43941
44090
|
app
|
|
43942
44091
|
};
|
|
43943
44092
|
|
|
43944
|
-
//# debugId=
|
|
44093
|
+
//# debugId=99890DFCB79E3EA364756E2164756E21
|
|
43945
44094
|
//# sourceMappingURL=mcp-server.js.map
|