@unkey/api 2.0.3 → 2.0.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +4 -2
- package/bin/mcp-server.js +348 -141
- package/bin/mcp-server.js.map +21 -16
- package/dist/commonjs/funcs/keysRerollKey.d.ts +49 -0
- package/dist/commonjs/funcs/keysRerollKey.d.ts.map +1 -0
- package/dist/commonjs/funcs/keysRerollKey.js +159 -0
- package/dist/commonjs/funcs/keysRerollKey.js.map +1 -0
- package/dist/commonjs/funcs/permissionsListPermissions.d.ts +2 -1
- package/dist/commonjs/funcs/permissionsListPermissions.d.ts.map +1 -1
- package/dist/commonjs/funcs/permissionsListPermissions.js +2 -1
- package/dist/commonjs/funcs/permissionsListPermissions.js.map +1 -1
- package/dist/commonjs/funcs/permissionsListRoles.d.ts +2 -1
- package/dist/commonjs/funcs/permissionsListRoles.d.ts.map +1 -1
- package/dist/commonjs/funcs/permissionsListRoles.js +2 -1
- package/dist/commonjs/funcs/permissionsListRoles.js.map +1 -1
- package/dist/commonjs/lib/config.d.ts +3 -3
- package/dist/commonjs/lib/config.js +3 -3
- package/dist/commonjs/mcp-server/mcp-server.js +1 -1
- package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/server.js +3 -1
- package/dist/commonjs/mcp-server/server.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/keysRerollKey.js +96 -0
- package/dist/commonjs/mcp-server/tools/keysRerollKey.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js +2 -1
- package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/tools/permissionsListRoles.js +2 -1
- package/dist/commonjs/mcp-server/tools/permissionsListRoles.js.map +1 -1
- package/dist/commonjs/models/components/index.d.ts +3 -0
- package/dist/commonjs/models/components/index.d.ts.map +1 -1
- package/dist/commonjs/models/components/index.js +3 -0
- package/dist/commonjs/models/components/index.js.map +1 -1
- package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysaddrolesresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysremoverolesresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.js +71 -0
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js +73 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js +71 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
- package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keyssetrolesresponsebody.js.map +1 -1
- package/dist/commonjs/sdk/keys.d.ts +38 -0
- package/dist/commonjs/sdk/keys.d.ts.map +1 -1
- package/dist/commonjs/sdk/keys.js +41 -0
- package/dist/commonjs/sdk/keys.js.map +1 -1
- package/dist/commonjs/sdk/permissions.d.ts +4 -2
- package/dist/commonjs/sdk/permissions.d.ts.map +1 -1
- package/dist/commonjs/sdk/permissions.js +4 -2
- package/dist/commonjs/sdk/permissions.js.map +1 -1
- package/dist/esm/funcs/keysRerollKey.d.ts +49 -0
- package/dist/esm/funcs/keysRerollKey.d.ts.map +1 -0
- package/dist/esm/funcs/keysRerollKey.js +123 -0
- package/dist/esm/funcs/keysRerollKey.js.map +1 -0
- package/dist/esm/funcs/permissionsListPermissions.d.ts +2 -1
- package/dist/esm/funcs/permissionsListPermissions.d.ts.map +1 -1
- package/dist/esm/funcs/permissionsListPermissions.js +2 -1
- package/dist/esm/funcs/permissionsListPermissions.js.map +1 -1
- package/dist/esm/funcs/permissionsListRoles.d.ts +2 -1
- package/dist/esm/funcs/permissionsListRoles.d.ts.map +1 -1
- package/dist/esm/funcs/permissionsListRoles.js +2 -1
- package/dist/esm/funcs/permissionsListRoles.js.map +1 -1
- package/dist/esm/lib/config.d.ts +3 -3
- package/dist/esm/lib/config.js +3 -3
- package/dist/esm/mcp-server/mcp-server.js +1 -1
- package/dist/esm/mcp-server/server.d.ts.map +1 -1
- package/dist/esm/mcp-server/server.js +3 -1
- package/dist/esm/mcp-server/server.js.map +1 -1
- package/dist/esm/mcp-server/tools/keysRerollKey.d.ts +8 -0
- package/dist/esm/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/keysRerollKey.js +60 -0
- package/dist/esm/mcp-server/tools/keysRerollKey.js.map +1 -0
- package/dist/esm/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
- package/dist/esm/mcp-server/tools/permissionsListPermissions.js +2 -1
- package/dist/esm/mcp-server/tools/permissionsListPermissions.js.map +1 -1
- package/dist/esm/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
- package/dist/esm/mcp-server/tools/permissionsListRoles.js +2 -1
- package/dist/esm/mcp-server/tools/permissionsListRoles.js.map +1 -1
- package/dist/esm/models/components/index.d.ts +3 -0
- package/dist/esm/models/components/index.d.ts.map +1 -1
- package/dist/esm/models/components/index.js +3 -0
- package/dist/esm/models/components/index.js.map +1 -1
- package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysaddrolesresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysremoverolesresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.js +33 -0
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.js +35 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.js +33 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
- package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keyssetrolesresponsebody.js.map +1 -1
- package/dist/esm/sdk/keys.d.ts +38 -0
- package/dist/esm/sdk/keys.d.ts.map +1 -1
- package/dist/esm/sdk/keys.js +41 -0
- package/dist/esm/sdk/keys.js.map +1 -1
- package/dist/esm/sdk/permissions.d.ts +4 -2
- package/dist/esm/sdk/permissions.d.ts.map +1 -1
- package/dist/esm/sdk/permissions.js +4 -2
- package/dist/esm/sdk/permissions.js.map +1 -1
- package/docs/sdks/keys/README.md +113 -0
- package/docs/sdks/permissions/README.md +4 -2
- package/examples/apisCreateApi.example.ts +1 -1
- package/examples/package-lock.json +3 -3
- package/jsr.json +1 -1
- package/package.json +3 -3
- package/src/funcs/keysRerollKey.ts +227 -0
- package/src/funcs/permissionsListPermissions.ts +2 -1
- package/src/funcs/permissionsListRoles.ts +2 -1
- package/src/lib/config.ts +3 -3
- package/src/mcp-server/mcp-server.ts +1 -1
- package/src/mcp-server/server.ts +3 -1
- package/src/mcp-server/tools/keysRerollKey.ts +69 -0
- package/src/mcp-server/tools/permissionsListPermissions.ts +2 -1
- package/src/mcp-server/tools/permissionsListRoles.ts +2 -1
- package/src/models/components/index.ts +3 -0
- package/src/models/components/v2keysaddpermissionsresponsebody.ts +0 -1
- package/src/models/components/v2keysaddrolesresponsebody.ts +0 -1
- package/src/models/components/v2keysremoverolesresponsebody.ts +0 -1
- package/src/models/components/v2keysrerollkeyrequestbody.ts +99 -0
- package/src/models/components/v2keysrerollkeyresponsebody.ts +87 -0
- package/src/models/components/v2keysrerollkeyresponsedata.ts +103 -0
- package/src/models/components/v2keyssetpermissionsresponsebody.ts +0 -1
- package/src/models/components/v2keyssetrolesresponsebody.ts +0 -1
- package/src/sdk/keys.ts +49 -0
- package/src/sdk/permissions.ts +4 -2
package/bin/mcp-server.js
CHANGED
|
@@ -34269,9 +34269,9 @@ var init_config = __esm(() => {
|
|
|
34269
34269
|
SDK_METADATA = {
|
|
34270
34270
|
language: "typescript",
|
|
34271
34271
|
openapiDocVersion: "2.0.0",
|
|
34272
|
-
sdkVersion: "2.0.
|
|
34273
|
-
genVersion: "2.
|
|
34274
|
-
userAgent: "speakeasy-sdk/typescript 2.0.
|
|
34272
|
+
sdkVersion: "2.0.4",
|
|
34273
|
+
genVersion: "2.683.1",
|
|
34274
|
+
userAgent: "speakeasy-sdk/typescript 2.0.4 2.683.1 2.0.0 @unkey/api"
|
|
34275
34275
|
};
|
|
34276
34276
|
});
|
|
34277
34277
|
|
|
@@ -36814,6 +36814,62 @@ var init_v2keysremoverolesresponsebody = __esm(() => {
|
|
|
36814
36814
|
})(V2KeysRemoveRolesResponseBody$ ||= {});
|
|
36815
36815
|
});
|
|
36816
36816
|
|
|
36817
|
+
// src/models/components/v2keysrerollkeyrequestbody.ts
|
|
36818
|
+
var V2KeysRerollKeyRequestBody$inboundSchema, V2KeysRerollKeyRequestBody$outboundSchema, V2KeysRerollKeyRequestBody$;
|
|
36819
|
+
var init_v2keysrerollkeyrequestbody = __esm(() => {
|
|
36820
|
+
init_zod();
|
|
36821
|
+
V2KeysRerollKeyRequestBody$inboundSchema = objectType({
|
|
36822
|
+
keyId: stringType(),
|
|
36823
|
+
expiration: numberType().int()
|
|
36824
|
+
});
|
|
36825
|
+
V2KeysRerollKeyRequestBody$outboundSchema = objectType({
|
|
36826
|
+
keyId: stringType(),
|
|
36827
|
+
expiration: numberType().int()
|
|
36828
|
+
});
|
|
36829
|
+
((V2KeysRerollKeyRequestBody$) => {
|
|
36830
|
+
V2KeysRerollKeyRequestBody$.inboundSchema = V2KeysRerollKeyRequestBody$inboundSchema;
|
|
36831
|
+
V2KeysRerollKeyRequestBody$.outboundSchema = V2KeysRerollKeyRequestBody$outboundSchema;
|
|
36832
|
+
})(V2KeysRerollKeyRequestBody$ ||= {});
|
|
36833
|
+
});
|
|
36834
|
+
|
|
36835
|
+
// src/models/components/v2keysrerollkeyresponsedata.ts
|
|
36836
|
+
var V2KeysRerollKeyResponseData$inboundSchema, V2KeysRerollKeyResponseData$outboundSchema, V2KeysRerollKeyResponseData$;
|
|
36837
|
+
var init_v2keysrerollkeyresponsedata = __esm(() => {
|
|
36838
|
+
init_zod();
|
|
36839
|
+
V2KeysRerollKeyResponseData$inboundSchema = objectType({
|
|
36840
|
+
keyId: stringType(),
|
|
36841
|
+
key: stringType()
|
|
36842
|
+
});
|
|
36843
|
+
V2KeysRerollKeyResponseData$outboundSchema = objectType({
|
|
36844
|
+
keyId: stringType(),
|
|
36845
|
+
key: stringType()
|
|
36846
|
+
});
|
|
36847
|
+
((V2KeysRerollKeyResponseData$) => {
|
|
36848
|
+
V2KeysRerollKeyResponseData$.inboundSchema = V2KeysRerollKeyResponseData$inboundSchema;
|
|
36849
|
+
V2KeysRerollKeyResponseData$.outboundSchema = V2KeysRerollKeyResponseData$outboundSchema;
|
|
36850
|
+
})(V2KeysRerollKeyResponseData$ ||= {});
|
|
36851
|
+
});
|
|
36852
|
+
|
|
36853
|
+
// src/models/components/v2keysrerollkeyresponsebody.ts
|
|
36854
|
+
var V2KeysRerollKeyResponseBody$inboundSchema, V2KeysRerollKeyResponseBody$outboundSchema, V2KeysRerollKeyResponseBody$;
|
|
36855
|
+
var init_v2keysrerollkeyresponsebody = __esm(() => {
|
|
36856
|
+
init_zod();
|
|
36857
|
+
init_meta();
|
|
36858
|
+
init_v2keysrerollkeyresponsedata();
|
|
36859
|
+
V2KeysRerollKeyResponseBody$inboundSchema = objectType({
|
|
36860
|
+
meta: Meta$inboundSchema,
|
|
36861
|
+
data: V2KeysRerollKeyResponseData$inboundSchema
|
|
36862
|
+
});
|
|
36863
|
+
V2KeysRerollKeyResponseBody$outboundSchema = objectType({
|
|
36864
|
+
meta: Meta$outboundSchema,
|
|
36865
|
+
data: V2KeysRerollKeyResponseData$outboundSchema
|
|
36866
|
+
});
|
|
36867
|
+
((V2KeysRerollKeyResponseBody$) => {
|
|
36868
|
+
V2KeysRerollKeyResponseBody$.inboundSchema = V2KeysRerollKeyResponseBody$inboundSchema;
|
|
36869
|
+
V2KeysRerollKeyResponseBody$.outboundSchema = V2KeysRerollKeyResponseBody$outboundSchema;
|
|
36870
|
+
})(V2KeysRerollKeyResponseBody$ ||= {});
|
|
36871
|
+
});
|
|
36872
|
+
|
|
36817
36873
|
// src/models/components/v2keyssetpermissionsrequestbody.ts
|
|
36818
36874
|
var V2KeysSetPermissionsRequestBody$inboundSchema, V2KeysSetPermissionsRequestBody$outboundSchema, V2KeysSetPermissionsRequestBody$;
|
|
36819
36875
|
var init_v2keyssetpermissionsrequestbody = __esm(() => {
|
|
@@ -37814,6 +37870,9 @@ var init_components = __esm(() => {
|
|
|
37814
37870
|
init_v2keysremovepermissionsresponsebody();
|
|
37815
37871
|
init_v2keysremoverolesrequestbody();
|
|
37816
37872
|
init_v2keysremoverolesresponsebody();
|
|
37873
|
+
init_v2keysrerollkeyrequestbody();
|
|
37874
|
+
init_v2keysrerollkeyresponsebody();
|
|
37875
|
+
init_v2keysrerollkeyresponsedata();
|
|
37817
37876
|
init_v2keyssetpermissionsrequestbody();
|
|
37818
37877
|
init_v2keyssetpermissionsresponsebody();
|
|
37819
37878
|
init_v2keyssetrolesrequestbody();
|
|
@@ -40269,11 +40328,155 @@ Invalidates the key cache for immediate effect, and makes role changes available
|
|
|
40269
40328
|
};
|
|
40270
40329
|
});
|
|
40271
40330
|
|
|
40272
|
-
// src/funcs/
|
|
40273
|
-
function
|
|
40331
|
+
// src/funcs/keysRerollKey.ts
|
|
40332
|
+
function keysRerollKey(client, request, options) {
|
|
40274
40333
|
return new APIPromise($do17(client, request, options));
|
|
40275
40334
|
}
|
|
40276
40335
|
async function $do17(client, request, options) {
|
|
40336
|
+
const parsed = safeParse(request, (value) => V2KeysRerollKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40337
|
+
if (!parsed.ok) {
|
|
40338
|
+
return [parsed, { status: "invalid" }];
|
|
40339
|
+
}
|
|
40340
|
+
const payload = parsed.value;
|
|
40341
|
+
const body = encodeJSON("body", payload, { explode: true });
|
|
40342
|
+
const path = pathToFunc("/v2/keys.rerollKey")();
|
|
40343
|
+
const headers = new Headers(compactMap({
|
|
40344
|
+
"Content-Type": "application/json",
|
|
40345
|
+
Accept: "application/json"
|
|
40346
|
+
}));
|
|
40347
|
+
const secConfig = await extractSecurity(client._options.rootKey);
|
|
40348
|
+
const securityInput = secConfig == null ? {} : { rootKey: secConfig };
|
|
40349
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
40350
|
+
const context = {
|
|
40351
|
+
options: client._options,
|
|
40352
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
40353
|
+
operationID: "rerollKey",
|
|
40354
|
+
oAuth2Scopes: [],
|
|
40355
|
+
resolvedSecurity: requestSecurity,
|
|
40356
|
+
securitySource: client._options.rootKey,
|
|
40357
|
+
retryConfig: options?.retries || client._options.retryConfig || {
|
|
40358
|
+
strategy: "backoff",
|
|
40359
|
+
backoff: {
|
|
40360
|
+
initialInterval: 50,
|
|
40361
|
+
maxInterval: 1000,
|
|
40362
|
+
exponent: 1.5,
|
|
40363
|
+
maxElapsedTime: 1e4
|
|
40364
|
+
},
|
|
40365
|
+
retryConnectionErrors: true
|
|
40366
|
+
},
|
|
40367
|
+
retryCodes: options?.retryCodes || ["5XX"]
|
|
40368
|
+
};
|
|
40369
|
+
const requestRes = client._createRequest(context, {
|
|
40370
|
+
security: requestSecurity,
|
|
40371
|
+
method: "POST",
|
|
40372
|
+
baseURL: options?.serverURL,
|
|
40373
|
+
path,
|
|
40374
|
+
headers,
|
|
40375
|
+
body,
|
|
40376
|
+
userAgent: client._options.userAgent,
|
|
40377
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
40378
|
+
}, options);
|
|
40379
|
+
if (!requestRes.ok) {
|
|
40380
|
+
return [requestRes, { status: "invalid" }];
|
|
40381
|
+
}
|
|
40382
|
+
const req = requestRes.value;
|
|
40383
|
+
const doResult = await client._do(req, {
|
|
40384
|
+
context,
|
|
40385
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
40386
|
+
retryConfig: context.retryConfig,
|
|
40387
|
+
retryCodes: context.retryCodes
|
|
40388
|
+
});
|
|
40389
|
+
if (!doResult.ok) {
|
|
40390
|
+
return [doResult, { status: "request-error", request: req }];
|
|
40391
|
+
}
|
|
40392
|
+
const response = doResult.value;
|
|
40393
|
+
const responseFields = {
|
|
40394
|
+
HttpMeta: { Response: response, Request: req }
|
|
40395
|
+
};
|
|
40396
|
+
const [result] = await match(json(200, V2KeysRerollKeyResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
|
|
40397
|
+
if (!result.ok) {
|
|
40398
|
+
return [result, { status: "complete", request: req, response }];
|
|
40399
|
+
}
|
|
40400
|
+
return [result, { status: "complete", request: req, response }];
|
|
40401
|
+
}
|
|
40402
|
+
var init_keysRerollKey = __esm(() => {
|
|
40403
|
+
init_encodings();
|
|
40404
|
+
init_matchers();
|
|
40405
|
+
init_primitives();
|
|
40406
|
+
init_schemas();
|
|
40407
|
+
init_security();
|
|
40408
|
+
init_url();
|
|
40409
|
+
init_components();
|
|
40410
|
+
init_errors2();
|
|
40411
|
+
init_async();
|
|
40412
|
+
});
|
|
40413
|
+
|
|
40414
|
+
// src/mcp-server/tools/keysRerollKey.ts
|
|
40415
|
+
var args17, tool$keysRerollKey;
|
|
40416
|
+
var init_keysRerollKey2 = __esm(() => {
|
|
40417
|
+
init_keysRerollKey();
|
|
40418
|
+
init_components();
|
|
40419
|
+
init_tools();
|
|
40420
|
+
args17 = {
|
|
40421
|
+
request: V2KeysRerollKeyRequestBody$inboundSchema
|
|
40422
|
+
};
|
|
40423
|
+
tool$keysRerollKey = {
|
|
40424
|
+
name: "keys-reroll-key",
|
|
40425
|
+
description: `Reroll Key
|
|
40426
|
+
|
|
40427
|
+
Generate a new API key while preserving the configuration from an existing key.
|
|
40428
|
+
|
|
40429
|
+
This operation creates a fresh key with a new token while maintaining all settings from the original key:
|
|
40430
|
+
- Permissions and roles
|
|
40431
|
+
- Custom metadata
|
|
40432
|
+
- Rate limit configurations
|
|
40433
|
+
- Identity associations
|
|
40434
|
+
- Remaining credits
|
|
40435
|
+
- Recovery settings
|
|
40436
|
+
|
|
40437
|
+
**Key Generation:**
|
|
40438
|
+
- The system attempts to extract the prefix from the original key
|
|
40439
|
+
- If prefix extraction fails, the default API prefix is used
|
|
40440
|
+
- Key length follows the API's default byte configuration (or 16 bytes if not specified)
|
|
40441
|
+
|
|
40442
|
+
**Original Key Handling:**
|
|
40443
|
+
- The original key will be revoked after the duration specified in \`expiration\`
|
|
40444
|
+
- Set \`expiration\` to 0 to revoke immediately
|
|
40445
|
+
- This allows for graceful key rotation with an overlap period
|
|
40446
|
+
|
|
40447
|
+
Common use cases include:
|
|
40448
|
+
- Rotating keys for security compliance
|
|
40449
|
+
- Issuing replacement keys for compromised credentials
|
|
40450
|
+
- Creating backup keys with identical permissions
|
|
40451
|
+
|
|
40452
|
+
**Important:** Analytics and usage metrics are tracked at both the key level AND identity level. If the original key has an identity, the new key will inherit it, allowing you to track usage across both individual keys and the overall identity.
|
|
40453
|
+
|
|
40454
|
+
**Required Permissions**
|
|
40455
|
+
|
|
40456
|
+
Your root key must have:
|
|
40457
|
+
- \`api.*.create_key\` or \`api.<api_id>.create_key\`
|
|
40458
|
+
- \`api.*.encrypt_key\` or \`api.<api_id>.encrypt_key\` (only when the original key is recoverable)
|
|
40459
|
+
`,
|
|
40460
|
+
args: args17,
|
|
40461
|
+
tool: async (client, args18, ctx) => {
|
|
40462
|
+
const [result, apiCall] = await keysRerollKey(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40463
|
+
if (!result.ok) {
|
|
40464
|
+
return {
|
|
40465
|
+
content: [{ type: "text", text: result.error.message }],
|
|
40466
|
+
isError: true
|
|
40467
|
+
};
|
|
40468
|
+
}
|
|
40469
|
+
const value = result.value;
|
|
40470
|
+
return formatResult(value, apiCall);
|
|
40471
|
+
}
|
|
40472
|
+
};
|
|
40473
|
+
});
|
|
40474
|
+
|
|
40475
|
+
// src/funcs/keysSetPermissions.ts
|
|
40476
|
+
function keysSetPermissions(client, request, options) {
|
|
40477
|
+
return new APIPromise($do18(client, request, options));
|
|
40478
|
+
}
|
|
40479
|
+
async function $do18(client, request, options) {
|
|
40277
40480
|
const parsed = safeParse(request, (value) => V2KeysSetPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40278
40481
|
if (!parsed.ok) {
|
|
40279
40482
|
return [parsed, { status: "invalid" }];
|
|
@@ -40353,12 +40556,12 @@ var init_keysSetPermissions = __esm(() => {
|
|
|
40353
40556
|
});
|
|
40354
40557
|
|
|
40355
40558
|
// src/mcp-server/tools/keysSetPermissions.ts
|
|
40356
|
-
var
|
|
40559
|
+
var args18, tool$keysSetPermissions;
|
|
40357
40560
|
var init_keysSetPermissions2 = __esm(() => {
|
|
40358
40561
|
init_keysSetPermissions();
|
|
40359
40562
|
init_components();
|
|
40360
40563
|
init_tools();
|
|
40361
|
-
|
|
40564
|
+
args18 = {
|
|
40362
40565
|
request: V2KeysSetPermissionsRequestBody$inboundSchema
|
|
40363
40566
|
};
|
|
40364
40567
|
tool$keysSetPermissions = {
|
|
@@ -40381,9 +40584,9 @@ Your root key must have one of the following permissions:
|
|
|
40381
40584
|
|
|
40382
40585
|
Invalidates the key cache for immediate effect, and makes permission changes available for verification within 30 seconds across all regions.
|
|
40383
40586
|
`,
|
|
40384
|
-
args:
|
|
40385
|
-
tool: async (client,
|
|
40386
|
-
const [result, apiCall] = await keysSetPermissions(client,
|
|
40587
|
+
args: args18,
|
|
40588
|
+
tool: async (client, args19, ctx) => {
|
|
40589
|
+
const [result, apiCall] = await keysSetPermissions(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40387
40590
|
if (!result.ok) {
|
|
40388
40591
|
return {
|
|
40389
40592
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40398,9 +40601,9 @@ Invalidates the key cache for immediate effect, and makes permission changes ava
|
|
|
40398
40601
|
|
|
40399
40602
|
// src/funcs/keysSetRoles.ts
|
|
40400
40603
|
function keysSetRoles(client, request, options) {
|
|
40401
|
-
return new APIPromise($
|
|
40604
|
+
return new APIPromise($do19(client, request, options));
|
|
40402
40605
|
}
|
|
40403
|
-
async function $
|
|
40606
|
+
async function $do19(client, request, options) {
|
|
40404
40607
|
const parsed = safeParse(request, (value) => V2KeysSetRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40405
40608
|
if (!parsed.ok) {
|
|
40406
40609
|
return [parsed, { status: "invalid" }];
|
|
@@ -40480,12 +40683,12 @@ var init_keysSetRoles = __esm(() => {
|
|
|
40480
40683
|
});
|
|
40481
40684
|
|
|
40482
40685
|
// src/mcp-server/tools/keysSetRoles.ts
|
|
40483
|
-
var
|
|
40686
|
+
var args19, tool$keysSetRoles;
|
|
40484
40687
|
var init_keysSetRoles2 = __esm(() => {
|
|
40485
40688
|
init_keysSetRoles();
|
|
40486
40689
|
init_components();
|
|
40487
40690
|
init_tools();
|
|
40488
|
-
|
|
40691
|
+
args19 = {
|
|
40489
40692
|
request: V2KeysSetRolesRequestBody$inboundSchema
|
|
40490
40693
|
};
|
|
40491
40694
|
tool$keysSetRoles = {
|
|
@@ -40508,9 +40711,9 @@ Your root key must have one of the following permissions:
|
|
|
40508
40711
|
|
|
40509
40712
|
Invalidates the key cache for immediate effect, and makes role changes available for verification within 30 seconds across all regions.
|
|
40510
40713
|
`,
|
|
40511
|
-
args:
|
|
40512
|
-
tool: async (client,
|
|
40513
|
-
const [result, apiCall] = await keysSetRoles(client,
|
|
40714
|
+
args: args19,
|
|
40715
|
+
tool: async (client, args20, ctx) => {
|
|
40716
|
+
const [result, apiCall] = await keysSetRoles(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40514
40717
|
if (!result.ok) {
|
|
40515
40718
|
return {
|
|
40516
40719
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40525,9 +40728,9 @@ Invalidates the key cache for immediate effect, and makes role changes available
|
|
|
40525
40728
|
|
|
40526
40729
|
// src/funcs/keysUpdateCredits.ts
|
|
40527
40730
|
function keysUpdateCredits(client, request, options) {
|
|
40528
|
-
return new APIPromise($
|
|
40731
|
+
return new APIPromise($do20(client, request, options));
|
|
40529
40732
|
}
|
|
40530
|
-
async function $
|
|
40733
|
+
async function $do20(client, request, options) {
|
|
40531
40734
|
const parsed = safeParse(request, (value) => V2KeysUpdateCreditsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40532
40735
|
if (!parsed.ok) {
|
|
40533
40736
|
return [parsed, { status: "invalid" }];
|
|
@@ -40607,12 +40810,12 @@ var init_keysUpdateCredits = __esm(() => {
|
|
|
40607
40810
|
});
|
|
40608
40811
|
|
|
40609
40812
|
// src/mcp-server/tools/keysUpdateCredits.ts
|
|
40610
|
-
var
|
|
40813
|
+
var args20, tool$keysUpdateCredits;
|
|
40611
40814
|
var init_keysUpdateCredits2 = __esm(() => {
|
|
40612
40815
|
init_keysUpdateCredits();
|
|
40613
40816
|
init_components();
|
|
40614
40817
|
init_tools();
|
|
40615
|
-
|
|
40818
|
+
args20 = {
|
|
40616
40819
|
request: V2KeysUpdateCreditsRequestBody$inboundSchema
|
|
40617
40820
|
};
|
|
40618
40821
|
tool$keysUpdateCredits = {
|
|
@@ -40635,9 +40838,9 @@ Your root key must have one of the following permissions:
|
|
|
40635
40838
|
|
|
40636
40839
|
Credit updates remove the key from cache immediately. Setting credits to unlimited automatically clears any existing refill settings. Changes take effect instantly but may take up to 30 seconds to propagate to all edge regions.
|
|
40637
40840
|
`,
|
|
40638
|
-
args:
|
|
40639
|
-
tool: async (client,
|
|
40640
|
-
const [result, apiCall] = await keysUpdateCredits(client,
|
|
40841
|
+
args: args20,
|
|
40842
|
+
tool: async (client, args21, ctx) => {
|
|
40843
|
+
const [result, apiCall] = await keysUpdateCredits(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40641
40844
|
if (!result.ok) {
|
|
40642
40845
|
return {
|
|
40643
40846
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40652,9 +40855,9 @@ Credit updates remove the key from cache immediately. Setting credits to unlimit
|
|
|
40652
40855
|
|
|
40653
40856
|
// src/funcs/keysUpdateKey.ts
|
|
40654
40857
|
function keysUpdateKey(client, request, options) {
|
|
40655
|
-
return new APIPromise($
|
|
40858
|
+
return new APIPromise($do21(client, request, options));
|
|
40656
40859
|
}
|
|
40657
|
-
async function $
|
|
40860
|
+
async function $do21(client, request, options) {
|
|
40658
40861
|
const parsed = safeParse(request, (value) => V2KeysUpdateKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40659
40862
|
if (!parsed.ok) {
|
|
40660
40863
|
return [parsed, { status: "invalid" }];
|
|
@@ -40734,12 +40937,12 @@ var init_keysUpdateKey = __esm(() => {
|
|
|
40734
40937
|
});
|
|
40735
40938
|
|
|
40736
40939
|
// src/mcp-server/tools/keysUpdateKey.ts
|
|
40737
|
-
var
|
|
40940
|
+
var args21, tool$keysUpdateKey;
|
|
40738
40941
|
var init_keysUpdateKey2 = __esm(() => {
|
|
40739
40942
|
init_keysUpdateKey();
|
|
40740
40943
|
init_components();
|
|
40741
40944
|
init_tools();
|
|
40742
|
-
|
|
40945
|
+
args21 = {
|
|
40743
40946
|
request: V2KeysUpdateKeyRequestBody$inboundSchema
|
|
40744
40947
|
};
|
|
40745
40948
|
tool$keysUpdateKey = {
|
|
@@ -40762,9 +40965,9 @@ Your root key must have one of the following permissions:
|
|
|
40762
40965
|
|
|
40763
40966
|
If you specify an \`externalId\` that doesn't exist, a new identity will be automatically created and linked to the key. Permission updates will auto-create any permissions that don't exist in your workspace. Changes take effect immediately but may take up to 30 seconds to propagate to all edge regions due to cache invalidation.
|
|
40764
40967
|
`,
|
|
40765
|
-
args:
|
|
40766
|
-
tool: async (client,
|
|
40767
|
-
const [result, apiCall] = await keysUpdateKey(client,
|
|
40968
|
+
args: args21,
|
|
40969
|
+
tool: async (client, args22, ctx) => {
|
|
40970
|
+
const [result, apiCall] = await keysUpdateKey(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40768
40971
|
if (!result.ok) {
|
|
40769
40972
|
return {
|
|
40770
40973
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40779,9 +40982,9 @@ If you specify an \`externalId\` that doesn't exist, a new identity will be auto
|
|
|
40779
40982
|
|
|
40780
40983
|
// src/funcs/keysVerifyKey.ts
|
|
40781
40984
|
function keysVerifyKey(client, request, options) {
|
|
40782
|
-
return new APIPromise($
|
|
40985
|
+
return new APIPromise($do22(client, request, options));
|
|
40783
40986
|
}
|
|
40784
|
-
async function $
|
|
40987
|
+
async function $do22(client, request, options) {
|
|
40785
40988
|
const parsed = safeParse(request, (value) => V2KeysVerifyKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40786
40989
|
if (!parsed.ok) {
|
|
40787
40990
|
return [parsed, { status: "invalid" }];
|
|
@@ -40861,12 +41064,12 @@ var init_keysVerifyKey = __esm(() => {
|
|
|
40861
41064
|
});
|
|
40862
41065
|
|
|
40863
41066
|
// src/mcp-server/tools/keysVerifyKey.ts
|
|
40864
|
-
var
|
|
41067
|
+
var args22, tool$keysVerifyKey;
|
|
40865
41068
|
var init_keysVerifyKey2 = __esm(() => {
|
|
40866
41069
|
init_keysVerifyKey();
|
|
40867
41070
|
init_components();
|
|
40868
41071
|
init_tools();
|
|
40869
|
-
|
|
41072
|
+
args22 = {
|
|
40870
41073
|
request: V2KeysVerifyKeyRequestBody$inboundSchema
|
|
40871
41074
|
};
|
|
40872
41075
|
tool$keysVerifyKey = {
|
|
@@ -40892,9 +41095,9 @@ Your root key needs one of:
|
|
|
40892
41095
|
|
|
40893
41096
|
If you are getting a NOT_FOUND error, ensure your root key has the required verify key permissions.
|
|
40894
41097
|
`,
|
|
40895
|
-
args:
|
|
40896
|
-
tool: async (client,
|
|
40897
|
-
const [result, apiCall] = await keysVerifyKey(client,
|
|
41098
|
+
args: args22,
|
|
41099
|
+
tool: async (client, args23, ctx) => {
|
|
41100
|
+
const [result, apiCall] = await keysVerifyKey(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40898
41101
|
if (!result.ok) {
|
|
40899
41102
|
return {
|
|
40900
41103
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40909,9 +41112,9 @@ If you are getting a NOT_FOUND error, ensure your root key has the required veri
|
|
|
40909
41112
|
|
|
40910
41113
|
// src/funcs/keysWhoami.ts
|
|
40911
41114
|
function keysWhoami(client, request, options) {
|
|
40912
|
-
return new APIPromise($
|
|
41115
|
+
return new APIPromise($do23(client, request, options));
|
|
40913
41116
|
}
|
|
40914
|
-
async function $
|
|
41117
|
+
async function $do23(client, request, options) {
|
|
40915
41118
|
const parsed = safeParse(request, (value) => V2KeysWhoamiRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40916
41119
|
if (!parsed.ok) {
|
|
40917
41120
|
return [parsed, { status: "invalid" }];
|
|
@@ -40991,12 +41194,12 @@ var init_keysWhoami = __esm(() => {
|
|
|
40991
41194
|
});
|
|
40992
41195
|
|
|
40993
41196
|
// src/mcp-server/tools/keysWhoami.ts
|
|
40994
|
-
var
|
|
41197
|
+
var args23, tool$keysWhoami;
|
|
40995
41198
|
var init_keysWhoami2 = __esm(() => {
|
|
40996
41199
|
init_keysWhoami();
|
|
40997
41200
|
init_components();
|
|
40998
41201
|
init_tools();
|
|
40999
|
-
|
|
41202
|
+
args23 = {
|
|
41000
41203
|
request: V2KeysWhoamiRequestBody$inboundSchema
|
|
41001
41204
|
};
|
|
41002
41205
|
tool$keysWhoami = {
|
|
@@ -41013,9 +41216,9 @@ Your root key must have one of the following permissions for basic key informati
|
|
|
41013
41216
|
|
|
41014
41217
|
If your rootkey lacks permissions but the key exists, we may return a 404 status here to prevent leaking the existance of a key to unauthorized clients. If you believe that a key should exist, but receive a 404, please double check your root key has the correct permissions.
|
|
41015
41218
|
`,
|
|
41016
|
-
args:
|
|
41017
|
-
tool: async (client,
|
|
41018
|
-
const [result, apiCall] = await keysWhoami(client,
|
|
41219
|
+
args: args23,
|
|
41220
|
+
tool: async (client, args24, ctx) => {
|
|
41221
|
+
const [result, apiCall] = await keysWhoami(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41019
41222
|
if (!result.ok) {
|
|
41020
41223
|
return {
|
|
41021
41224
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41030,9 +41233,9 @@ If your rootkey lacks permissions but the key exists, we may return a 404 status
|
|
|
41030
41233
|
|
|
41031
41234
|
// src/funcs/permissionsCreatePermission.ts
|
|
41032
41235
|
function permissionsCreatePermission(client, request, options) {
|
|
41033
|
-
return new APIPromise($
|
|
41236
|
+
return new APIPromise($do24(client, request, options));
|
|
41034
41237
|
}
|
|
41035
|
-
async function $
|
|
41238
|
+
async function $do24(client, request, options) {
|
|
41036
41239
|
const parsed = safeParse(request, (value) => V2PermissionsCreatePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41037
41240
|
if (!parsed.ok) {
|
|
41038
41241
|
return [parsed, { status: "invalid" }];
|
|
@@ -41112,12 +41315,12 @@ var init_permissionsCreatePermission = __esm(() => {
|
|
|
41112
41315
|
});
|
|
41113
41316
|
|
|
41114
41317
|
// src/mcp-server/tools/permissionsCreatePermission.ts
|
|
41115
|
-
var
|
|
41318
|
+
var args24, tool$permissionsCreatePermission;
|
|
41116
41319
|
var init_permissionsCreatePermission2 = __esm(() => {
|
|
41117
41320
|
init_permissionsCreatePermission();
|
|
41118
41321
|
init_components();
|
|
41119
41322
|
init_tools();
|
|
41120
|
-
|
|
41323
|
+
args24 = {
|
|
41121
41324
|
request: V2PermissionsCreatePermissionRequestBody$inboundSchema
|
|
41122
41325
|
};
|
|
41123
41326
|
tool$permissionsCreatePermission = {
|
|
@@ -41135,9 +41338,9 @@ Use hierarchical naming patterns like \`documents.read\`, \`admin.users.delete\`
|
|
|
41135
41338
|
Your root key must have the following permission:
|
|
41136
41339
|
- \`rbac.*.create_permission\`
|
|
41137
41340
|
`,
|
|
41138
|
-
args:
|
|
41139
|
-
tool: async (client,
|
|
41140
|
-
const [result, apiCall] = await permissionsCreatePermission(client,
|
|
41341
|
+
args: args24,
|
|
41342
|
+
tool: async (client, args25, ctx) => {
|
|
41343
|
+
const [result, apiCall] = await permissionsCreatePermission(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41141
41344
|
if (!result.ok) {
|
|
41142
41345
|
return {
|
|
41143
41346
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41152,9 +41355,9 @@ Your root key must have the following permission:
|
|
|
41152
41355
|
|
|
41153
41356
|
// src/funcs/permissionsCreateRole.ts
|
|
41154
41357
|
function permissionsCreateRole(client, request, options) {
|
|
41155
|
-
return new APIPromise($
|
|
41358
|
+
return new APIPromise($do25(client, request, options));
|
|
41156
41359
|
}
|
|
41157
|
-
async function $
|
|
41360
|
+
async function $do25(client, request, options) {
|
|
41158
41361
|
const parsed = safeParse(request, (value) => V2PermissionsCreateRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41159
41362
|
if (!parsed.ok) {
|
|
41160
41363
|
return [parsed, { status: "invalid" }];
|
|
@@ -41234,12 +41437,12 @@ var init_permissionsCreateRole = __esm(() => {
|
|
|
41234
41437
|
});
|
|
41235
41438
|
|
|
41236
41439
|
// src/mcp-server/tools/permissionsCreateRole.ts
|
|
41237
|
-
var
|
|
41440
|
+
var args25, tool$permissionsCreateRole;
|
|
41238
41441
|
var init_permissionsCreateRole2 = __esm(() => {
|
|
41239
41442
|
init_permissionsCreateRole();
|
|
41240
41443
|
init_components();
|
|
41241
41444
|
init_tools();
|
|
41242
|
-
|
|
41445
|
+
args25 = {
|
|
41243
41446
|
request: V2PermissionsCreateRoleRequestBody$inboundSchema
|
|
41244
41447
|
};
|
|
41245
41448
|
tool$permissionsCreateRole = {
|
|
@@ -41255,9 +41458,9 @@ Create a new role to group related permissions for easier management. Roles enab
|
|
|
41255
41458
|
Your root key must have the following permission:
|
|
41256
41459
|
- \`rbac.*.create_role\`
|
|
41257
41460
|
`,
|
|
41258
|
-
args:
|
|
41259
|
-
tool: async (client,
|
|
41260
|
-
const [result, apiCall] = await permissionsCreateRole(client,
|
|
41461
|
+
args: args25,
|
|
41462
|
+
tool: async (client, args26, ctx) => {
|
|
41463
|
+
const [result, apiCall] = await permissionsCreateRole(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41261
41464
|
if (!result.ok) {
|
|
41262
41465
|
return {
|
|
41263
41466
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41272,9 +41475,9 @@ Your root key must have the following permission:
|
|
|
41272
41475
|
|
|
41273
41476
|
// src/funcs/permissionsDeletePermission.ts
|
|
41274
41477
|
function permissionsDeletePermission(client, request, options) {
|
|
41275
|
-
return new APIPromise($
|
|
41478
|
+
return new APIPromise($do26(client, request, options));
|
|
41276
41479
|
}
|
|
41277
|
-
async function $
|
|
41480
|
+
async function $do26(client, request, options) {
|
|
41278
41481
|
const parsed = safeParse(request, (value) => V2PermissionsDeletePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41279
41482
|
if (!parsed.ok) {
|
|
41280
41483
|
return [parsed, { status: "invalid" }];
|
|
@@ -41354,12 +41557,12 @@ var init_permissionsDeletePermission = __esm(() => {
|
|
|
41354
41557
|
});
|
|
41355
41558
|
|
|
41356
41559
|
// src/mcp-server/tools/permissionsDeletePermission.ts
|
|
41357
|
-
var
|
|
41560
|
+
var args26, tool$permissionsDeletePermission;
|
|
41358
41561
|
var init_permissionsDeletePermission2 = __esm(() => {
|
|
41359
41562
|
init_permissionsDeletePermission();
|
|
41360
41563
|
init_components();
|
|
41361
41564
|
init_tools();
|
|
41362
|
-
|
|
41565
|
+
args26 = {
|
|
41363
41566
|
request: V2PermissionsDeletePermissionRequestBody$inboundSchema
|
|
41364
41567
|
};
|
|
41365
41568
|
tool$permissionsDeletePermission = {
|
|
@@ -41375,9 +41578,9 @@ Remove a permission from your workspace. This also removes the permission from a
|
|
|
41375
41578
|
Your root key must have the following permission:
|
|
41376
41579
|
- \`rbac.*.delete_permission\`
|
|
41377
41580
|
`,
|
|
41378
|
-
args:
|
|
41379
|
-
tool: async (client,
|
|
41380
|
-
const [result, apiCall] = await permissionsDeletePermission(client,
|
|
41581
|
+
args: args26,
|
|
41582
|
+
tool: async (client, args27, ctx) => {
|
|
41583
|
+
const [result, apiCall] = await permissionsDeletePermission(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41381
41584
|
if (!result.ok) {
|
|
41382
41585
|
return {
|
|
41383
41586
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41392,9 +41595,9 @@ Your root key must have the following permission:
|
|
|
41392
41595
|
|
|
41393
41596
|
// src/funcs/permissionsDeleteRole.ts
|
|
41394
41597
|
function permissionsDeleteRole(client, request, options) {
|
|
41395
|
-
return new APIPromise($
|
|
41598
|
+
return new APIPromise($do27(client, request, options));
|
|
41396
41599
|
}
|
|
41397
|
-
async function $
|
|
41600
|
+
async function $do27(client, request, options) {
|
|
41398
41601
|
const parsed = safeParse(request, (value) => V2PermissionsDeleteRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41399
41602
|
if (!parsed.ok) {
|
|
41400
41603
|
return [parsed, { status: "invalid" }];
|
|
@@ -41474,12 +41677,12 @@ var init_permissionsDeleteRole = __esm(() => {
|
|
|
41474
41677
|
});
|
|
41475
41678
|
|
|
41476
41679
|
// src/mcp-server/tools/permissionsDeleteRole.ts
|
|
41477
|
-
var
|
|
41680
|
+
var args27, tool$permissionsDeleteRole;
|
|
41478
41681
|
var init_permissionsDeleteRole2 = __esm(() => {
|
|
41479
41682
|
init_permissionsDeleteRole();
|
|
41480
41683
|
init_components();
|
|
41481
41684
|
init_tools();
|
|
41482
|
-
|
|
41685
|
+
args27 = {
|
|
41483
41686
|
request: V2PermissionsDeleteRoleRequestBody$inboundSchema
|
|
41484
41687
|
};
|
|
41485
41688
|
tool$permissionsDeleteRole = {
|
|
@@ -41495,9 +41698,9 @@ Remove a role from your workspace. This also removes the role from all assigned
|
|
|
41495
41698
|
Your root key must have the following permission:
|
|
41496
41699
|
- \`rbac.*.delete_role\`
|
|
41497
41700
|
`,
|
|
41498
|
-
args:
|
|
41499
|
-
tool: async (client,
|
|
41500
|
-
const [result, apiCall] = await permissionsDeleteRole(client,
|
|
41701
|
+
args: args27,
|
|
41702
|
+
tool: async (client, args28, ctx) => {
|
|
41703
|
+
const [result, apiCall] = await permissionsDeleteRole(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41501
41704
|
if (!result.ok) {
|
|
41502
41705
|
return {
|
|
41503
41706
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41512,9 +41715,9 @@ Your root key must have the following permission:
|
|
|
41512
41715
|
|
|
41513
41716
|
// src/funcs/permissionsGetPermission.ts
|
|
41514
41717
|
function permissionsGetPermission(client, request, options) {
|
|
41515
|
-
return new APIPromise($
|
|
41718
|
+
return new APIPromise($do28(client, request, options));
|
|
41516
41719
|
}
|
|
41517
|
-
async function $
|
|
41720
|
+
async function $do28(client, request, options) {
|
|
41518
41721
|
const parsed = safeParse(request, (value) => V2PermissionsGetPermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41519
41722
|
if (!parsed.ok) {
|
|
41520
41723
|
return [parsed, { status: "invalid" }];
|
|
@@ -41594,12 +41797,12 @@ var init_permissionsGetPermission = __esm(() => {
|
|
|
41594
41797
|
});
|
|
41595
41798
|
|
|
41596
41799
|
// src/mcp-server/tools/permissionsGetPermission.ts
|
|
41597
|
-
var
|
|
41800
|
+
var args28, tool$permissionsGetPermission;
|
|
41598
41801
|
var init_permissionsGetPermission2 = __esm(() => {
|
|
41599
41802
|
init_permissionsGetPermission();
|
|
41600
41803
|
init_components();
|
|
41601
41804
|
init_tools();
|
|
41602
|
-
|
|
41805
|
+
args28 = {
|
|
41603
41806
|
request: V2PermissionsGetPermissionRequestBody$inboundSchema
|
|
41604
41807
|
};
|
|
41605
41808
|
tool$permissionsGetPermission = {
|
|
@@ -41613,9 +41816,9 @@ Retrieve details about a specific permission including its name, description, an
|
|
|
41613
41816
|
Your root key must have the following permission:
|
|
41614
41817
|
- \`rbac.*.read_permission\`
|
|
41615
41818
|
`,
|
|
41616
|
-
args:
|
|
41617
|
-
tool: async (client,
|
|
41618
|
-
const [result, apiCall] = await permissionsGetPermission(client,
|
|
41819
|
+
args: args28,
|
|
41820
|
+
tool: async (client, args29, ctx) => {
|
|
41821
|
+
const [result, apiCall] = await permissionsGetPermission(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41619
41822
|
if (!result.ok) {
|
|
41620
41823
|
return {
|
|
41621
41824
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41630,9 +41833,9 @@ Your root key must have the following permission:
|
|
|
41630
41833
|
|
|
41631
41834
|
// src/funcs/permissionsGetRole.ts
|
|
41632
41835
|
function permissionsGetRole(client, request, options) {
|
|
41633
|
-
return new APIPromise($
|
|
41836
|
+
return new APIPromise($do29(client, request, options));
|
|
41634
41837
|
}
|
|
41635
|
-
async function $
|
|
41838
|
+
async function $do29(client, request, options) {
|
|
41636
41839
|
const parsed = safeParse(request, (value) => V2PermissionsGetRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41637
41840
|
if (!parsed.ok) {
|
|
41638
41841
|
return [parsed, { status: "invalid" }];
|
|
@@ -41712,12 +41915,12 @@ var init_permissionsGetRole = __esm(() => {
|
|
|
41712
41915
|
});
|
|
41713
41916
|
|
|
41714
41917
|
// src/mcp-server/tools/permissionsGetRole.ts
|
|
41715
|
-
var
|
|
41918
|
+
var args29, tool$permissionsGetRole;
|
|
41716
41919
|
var init_permissionsGetRole2 = __esm(() => {
|
|
41717
41920
|
init_permissionsGetRole();
|
|
41718
41921
|
init_components();
|
|
41719
41922
|
init_tools();
|
|
41720
|
-
|
|
41923
|
+
args29 = {
|
|
41721
41924
|
request: V2PermissionsGetRoleRequestBody$inboundSchema
|
|
41722
41925
|
};
|
|
41723
41926
|
tool$permissionsGetRole = {
|
|
@@ -41731,9 +41934,9 @@ Retrieve details about a specific role including its assigned permissions.
|
|
|
41731
41934
|
Your root key must have the following permission:
|
|
41732
41935
|
- \`rbac.*.read_role\`
|
|
41733
41936
|
`,
|
|
41734
|
-
args:
|
|
41735
|
-
tool: async (client,
|
|
41736
|
-
const [result, apiCall] = await permissionsGetRole(client,
|
|
41937
|
+
args: args29,
|
|
41938
|
+
tool: async (client, args30, ctx) => {
|
|
41939
|
+
const [result, apiCall] = await permissionsGetRole(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41737
41940
|
if (!result.ok) {
|
|
41738
41941
|
return {
|
|
41739
41942
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41748,9 +41951,9 @@ Your root key must have the following permission:
|
|
|
41748
41951
|
|
|
41749
41952
|
// src/funcs/permissionsListPermissions.ts
|
|
41750
41953
|
function permissionsListPermissions(client, request, options) {
|
|
41751
|
-
return new APIPromise($
|
|
41954
|
+
return new APIPromise($do30(client, request, options));
|
|
41752
41955
|
}
|
|
41753
|
-
async function $
|
|
41956
|
+
async function $do30(client, request, options) {
|
|
41754
41957
|
const parsed = safeParse(request, (value) => V2PermissionsListPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41755
41958
|
if (!parsed.ok) {
|
|
41756
41959
|
return [parsed, { status: "invalid" }];
|
|
@@ -41830,28 +42033,29 @@ var init_permissionsListPermissions = __esm(() => {
|
|
|
41830
42033
|
});
|
|
41831
42034
|
|
|
41832
42035
|
// src/mcp-server/tools/permissionsListPermissions.ts
|
|
41833
|
-
var
|
|
42036
|
+
var args30, tool$permissionsListPermissions;
|
|
41834
42037
|
var init_permissionsListPermissions2 = __esm(() => {
|
|
41835
42038
|
init_permissionsListPermissions();
|
|
41836
42039
|
init_components();
|
|
41837
42040
|
init_tools();
|
|
41838
|
-
|
|
42041
|
+
args30 = {
|
|
41839
42042
|
request: V2PermissionsListPermissionsRequestBody$inboundSchema
|
|
41840
42043
|
};
|
|
41841
42044
|
tool$permissionsListPermissions = {
|
|
41842
42045
|
name: "permissions-list-permissions",
|
|
41843
42046
|
description: `List permissions
|
|
41844
42047
|
|
|
41845
|
-
Retrieve all permissions in your workspace.
|
|
42048
|
+
Retrieve all permissions in your workspace.
|
|
42049
|
+
Results are paginated and sorted by their id.
|
|
41846
42050
|
|
|
41847
42051
|
**Required Permissions**
|
|
41848
42052
|
|
|
41849
42053
|
Your root key must have the following permission:
|
|
41850
42054
|
- \`rbac.*.read_permission\`
|
|
41851
42055
|
`,
|
|
41852
|
-
args:
|
|
41853
|
-
tool: async (client,
|
|
41854
|
-
const [result, apiCall] = await permissionsListPermissions(client,
|
|
42056
|
+
args: args30,
|
|
42057
|
+
tool: async (client, args31, ctx) => {
|
|
42058
|
+
const [result, apiCall] = await permissionsListPermissions(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41855
42059
|
if (!result.ok) {
|
|
41856
42060
|
return {
|
|
41857
42061
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41866,9 +42070,9 @@ Your root key must have the following permission:
|
|
|
41866
42070
|
|
|
41867
42071
|
// src/funcs/permissionsListRoles.ts
|
|
41868
42072
|
function permissionsListRoles(client, request, options) {
|
|
41869
|
-
return new APIPromise($
|
|
42073
|
+
return new APIPromise($do31(client, request, options));
|
|
41870
42074
|
}
|
|
41871
|
-
async function $
|
|
42075
|
+
async function $do31(client, request, options) {
|
|
41872
42076
|
const parsed = safeParse(request, (value) => V2PermissionsListRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41873
42077
|
if (!parsed.ok) {
|
|
41874
42078
|
return [parsed, { status: "invalid" }];
|
|
@@ -41948,28 +42152,29 @@ var init_permissionsListRoles = __esm(() => {
|
|
|
41948
42152
|
});
|
|
41949
42153
|
|
|
41950
42154
|
// src/mcp-server/tools/permissionsListRoles.ts
|
|
41951
|
-
var
|
|
42155
|
+
var args31, tool$permissionsListRoles;
|
|
41952
42156
|
var init_permissionsListRoles2 = __esm(() => {
|
|
41953
42157
|
init_permissionsListRoles();
|
|
41954
42158
|
init_components();
|
|
41955
42159
|
init_tools();
|
|
41956
|
-
|
|
42160
|
+
args31 = {
|
|
41957
42161
|
request: V2PermissionsListRolesRequestBody$inboundSchema
|
|
41958
42162
|
};
|
|
41959
42163
|
tool$permissionsListRoles = {
|
|
41960
42164
|
name: "permissions-list-roles",
|
|
41961
42165
|
description: `List roles
|
|
41962
42166
|
|
|
41963
|
-
Retrieve all roles in your workspace including their assigned permissions.
|
|
42167
|
+
Retrieve all roles in your workspace including their assigned permissions.
|
|
42168
|
+
Results are paginated and sorted by their id.
|
|
41964
42169
|
|
|
41965
42170
|
**Required Permissions**
|
|
41966
42171
|
|
|
41967
42172
|
Your root key must have the following permission:
|
|
41968
42173
|
- \`rbac.*.read_role\`
|
|
41969
42174
|
`,
|
|
41970
|
-
args:
|
|
41971
|
-
tool: async (client,
|
|
41972
|
-
const [result, apiCall] = await permissionsListRoles(client,
|
|
42175
|
+
args: args31,
|
|
42176
|
+
tool: async (client, args32, ctx) => {
|
|
42177
|
+
const [result, apiCall] = await permissionsListRoles(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41973
42178
|
if (!result.ok) {
|
|
41974
42179
|
return {
|
|
41975
42180
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41984,9 +42189,9 @@ Your root key must have the following permission:
|
|
|
41984
42189
|
|
|
41985
42190
|
// src/funcs/ratelimitDeleteOverride.ts
|
|
41986
42191
|
function ratelimitDeleteOverride(client, request, options) {
|
|
41987
|
-
return new APIPromise($
|
|
42192
|
+
return new APIPromise($do32(client, request, options));
|
|
41988
42193
|
}
|
|
41989
|
-
async function $
|
|
42194
|
+
async function $do32(client, request, options) {
|
|
41990
42195
|
const parsed = safeParse(request, (value) => V2RatelimitDeleteOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41991
42196
|
if (!parsed.ok) {
|
|
41992
42197
|
return [parsed, { status: "invalid" }];
|
|
@@ -42066,12 +42271,12 @@ var init_ratelimitDeleteOverride = __esm(() => {
|
|
|
42066
42271
|
});
|
|
42067
42272
|
|
|
42068
42273
|
// src/mcp-server/tools/ratelimitDeleteOverride.ts
|
|
42069
|
-
var
|
|
42274
|
+
var args32, tool$ratelimitDeleteOverride;
|
|
42070
42275
|
var init_ratelimitDeleteOverride2 = __esm(() => {
|
|
42071
42276
|
init_ratelimitDeleteOverride();
|
|
42072
42277
|
init_components();
|
|
42073
42278
|
init_tools();
|
|
42074
|
-
|
|
42279
|
+
args32 = {
|
|
42075
42280
|
request: V2RatelimitDeleteOverrideRequestBody$inboundSchema
|
|
42076
42281
|
};
|
|
42077
42282
|
tool$ratelimitDeleteOverride = {
|
|
@@ -42086,9 +42291,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
|
|
|
42086
42291
|
|
|
42087
42292
|
**Permissions:** Requires \`ratelimit.*.delete_override\` or \`ratelimit.<namespace_id>.delete_override\`
|
|
42088
42293
|
`,
|
|
42089
|
-
args:
|
|
42090
|
-
tool: async (client,
|
|
42091
|
-
const [result, apiCall] = await ratelimitDeleteOverride(client,
|
|
42294
|
+
args: args32,
|
|
42295
|
+
tool: async (client, args33, ctx) => {
|
|
42296
|
+
const [result, apiCall] = await ratelimitDeleteOverride(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42092
42297
|
if (!result.ok) {
|
|
42093
42298
|
return {
|
|
42094
42299
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42103,9 +42308,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
|
|
|
42103
42308
|
|
|
42104
42309
|
// src/funcs/ratelimitGetOverride.ts
|
|
42105
42310
|
function ratelimitGetOverride(client, request, options) {
|
|
42106
|
-
return new APIPromise($
|
|
42311
|
+
return new APIPromise($do33(client, request, options));
|
|
42107
42312
|
}
|
|
42108
|
-
async function $
|
|
42313
|
+
async function $do33(client, request, options) {
|
|
42109
42314
|
const parsed = safeParse(request, (value) => V2RatelimitGetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42110
42315
|
if (!parsed.ok) {
|
|
42111
42316
|
return [parsed, { status: "invalid" }];
|
|
@@ -42185,12 +42390,12 @@ var init_ratelimitGetOverride = __esm(() => {
|
|
|
42185
42390
|
});
|
|
42186
42391
|
|
|
42187
42392
|
// src/mcp-server/tools/ratelimitGetOverride.ts
|
|
42188
|
-
var
|
|
42393
|
+
var args33, tool$ratelimitGetOverride;
|
|
42189
42394
|
var init_ratelimitGetOverride2 = __esm(() => {
|
|
42190
42395
|
init_ratelimitGetOverride();
|
|
42191
42396
|
init_components();
|
|
42192
42397
|
init_tools();
|
|
42193
|
-
|
|
42398
|
+
args33 = {
|
|
42194
42399
|
request: V2RatelimitGetOverrideRequestBody$inboundSchema
|
|
42195
42400
|
};
|
|
42196
42401
|
tool$ratelimitGetOverride = {
|
|
@@ -42205,9 +42410,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
|
|
|
42205
42410
|
|
|
42206
42411
|
**Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
|
|
42207
42412
|
`,
|
|
42208
|
-
args:
|
|
42209
|
-
tool: async (client,
|
|
42210
|
-
const [result, apiCall] = await ratelimitGetOverride(client,
|
|
42413
|
+
args: args33,
|
|
42414
|
+
tool: async (client, args34, ctx) => {
|
|
42415
|
+
const [result, apiCall] = await ratelimitGetOverride(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42211
42416
|
if (!result.ok) {
|
|
42212
42417
|
return {
|
|
42213
42418
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42222,9 +42427,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
|
|
|
42222
42427
|
|
|
42223
42428
|
// src/funcs/ratelimitLimit.ts
|
|
42224
42429
|
function ratelimitLimit(client, request, options) {
|
|
42225
|
-
return new APIPromise($
|
|
42430
|
+
return new APIPromise($do34(client, request, options));
|
|
42226
42431
|
}
|
|
42227
|
-
async function $
|
|
42432
|
+
async function $do34(client, request, options) {
|
|
42228
42433
|
const parsed = safeParse(request, (value) => V2RatelimitLimitRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42229
42434
|
if (!parsed.ok) {
|
|
42230
42435
|
return [parsed, { status: "invalid" }];
|
|
@@ -42304,12 +42509,12 @@ var init_ratelimitLimit = __esm(() => {
|
|
|
42304
42509
|
});
|
|
42305
42510
|
|
|
42306
42511
|
// src/mcp-server/tools/ratelimitLimit.ts
|
|
42307
|
-
var
|
|
42512
|
+
var args34, tool$ratelimitLimit;
|
|
42308
42513
|
var init_ratelimitLimit2 = __esm(() => {
|
|
42309
42514
|
init_ratelimitLimit();
|
|
42310
42515
|
init_components();
|
|
42311
42516
|
init_tools();
|
|
42312
|
-
|
|
42517
|
+
args34 = {
|
|
42313
42518
|
request: V2RatelimitLimitRequestBody$inboundSchema
|
|
42314
42519
|
};
|
|
42315
42520
|
tool$ratelimitLimit = {
|
|
@@ -42332,9 +42537,9 @@ Your root key must have one of the following permissions:
|
|
|
42332
42537
|
|
|
42333
42538
|
Records rate limit metrics for analytics and monitoring, updates rate limit counters with sliding window algorithm, and optionally triggers override matching for custom limits.
|
|
42334
42539
|
`,
|
|
42335
|
-
args:
|
|
42336
|
-
tool: async (client,
|
|
42337
|
-
const [result, apiCall] = await ratelimitLimit(client,
|
|
42540
|
+
args: args34,
|
|
42541
|
+
tool: async (client, args35, ctx) => {
|
|
42542
|
+
const [result, apiCall] = await ratelimitLimit(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42338
42543
|
if (!result.ok) {
|
|
42339
42544
|
return {
|
|
42340
42545
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42349,9 +42554,9 @@ Records rate limit metrics for analytics and monitoring, updates rate limit coun
|
|
|
42349
42554
|
|
|
42350
42555
|
// src/funcs/ratelimitListOverrides.ts
|
|
42351
42556
|
function ratelimitListOverrides(client, request, options) {
|
|
42352
|
-
return new APIPromise($
|
|
42557
|
+
return new APIPromise($do35(client, request, options));
|
|
42353
42558
|
}
|
|
42354
|
-
async function $
|
|
42559
|
+
async function $do35(client, request, options) {
|
|
42355
42560
|
const parsed = safeParse(request, (value) => V2RatelimitListOverridesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42356
42561
|
if (!parsed.ok) {
|
|
42357
42562
|
return [parsed, { status: "invalid" }];
|
|
@@ -42431,12 +42636,12 @@ var init_ratelimitListOverrides = __esm(() => {
|
|
|
42431
42636
|
});
|
|
42432
42637
|
|
|
42433
42638
|
// src/mcp-server/tools/ratelimitListOverrides.ts
|
|
42434
|
-
var
|
|
42639
|
+
var args35, tool$ratelimitListOverrides;
|
|
42435
42640
|
var init_ratelimitListOverrides2 = __esm(() => {
|
|
42436
42641
|
init_ratelimitListOverrides();
|
|
42437
42642
|
init_components();
|
|
42438
42643
|
init_tools();
|
|
42439
|
-
|
|
42644
|
+
args35 = {
|
|
42440
42645
|
request: V2RatelimitListOverridesRequestBody$inboundSchema
|
|
42441
42646
|
};
|
|
42442
42647
|
tool$ratelimitListOverrides = {
|
|
@@ -42451,9 +42656,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
|
|
|
42451
42656
|
|
|
42452
42657
|
**Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
|
|
42453
42658
|
`,
|
|
42454
|
-
args:
|
|
42455
|
-
tool: async (client,
|
|
42456
|
-
const [result, apiCall] = await ratelimitListOverrides(client,
|
|
42659
|
+
args: args35,
|
|
42660
|
+
tool: async (client, args36, ctx) => {
|
|
42661
|
+
const [result, apiCall] = await ratelimitListOverrides(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42457
42662
|
if (!result.ok) {
|
|
42458
42663
|
return {
|
|
42459
42664
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42468,9 +42673,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
|
|
|
42468
42673
|
|
|
42469
42674
|
// src/funcs/ratelimitSetOverride.ts
|
|
42470
42675
|
function ratelimitSetOverride(client, request, options) {
|
|
42471
|
-
return new APIPromise($
|
|
42676
|
+
return new APIPromise($do36(client, request, options));
|
|
42472
42677
|
}
|
|
42473
|
-
async function $
|
|
42678
|
+
async function $do36(client, request, options) {
|
|
42474
42679
|
const parsed = safeParse(request, (value) => V2RatelimitSetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42475
42680
|
if (!parsed.ok) {
|
|
42476
42681
|
return [parsed, { status: "invalid" }];
|
|
@@ -42550,12 +42755,12 @@ var init_ratelimitSetOverride = __esm(() => {
|
|
|
42550
42755
|
});
|
|
42551
42756
|
|
|
42552
42757
|
// src/mcp-server/tools/ratelimitSetOverride.ts
|
|
42553
|
-
var
|
|
42758
|
+
var args36, tool$ratelimitSetOverride;
|
|
42554
42759
|
var init_ratelimitSetOverride2 = __esm(() => {
|
|
42555
42760
|
init_ratelimitSetOverride();
|
|
42556
42761
|
init_components();
|
|
42557
42762
|
init_tools();
|
|
42558
|
-
|
|
42763
|
+
args36 = {
|
|
42559
42764
|
request: V2RatelimitSetOverrideRequestBody$inboundSchema
|
|
42560
42765
|
};
|
|
42561
42766
|
tool$ratelimitSetOverride = {
|
|
@@ -42570,9 +42775,9 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
|
|
|
42570
42775
|
|
|
42571
42776
|
**Permissions:** Requires \`ratelimit.*.set_override\` or \`ratelimit.<namespace_id>.set_override\`
|
|
42572
42777
|
`,
|
|
42573
|
-
args:
|
|
42574
|
-
tool: async (client,
|
|
42575
|
-
const [result, apiCall] = await ratelimitSetOverride(client,
|
|
42778
|
+
args: args36,
|
|
42779
|
+
tool: async (client, args37, ctx) => {
|
|
42780
|
+
const [result, apiCall] = await ratelimitSetOverride(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42576
42781
|
if (!result.ok) {
|
|
42577
42782
|
return {
|
|
42578
42783
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42589,7 +42794,7 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
|
|
|
42589
42794
|
function createMCPServer(deps) {
|
|
42590
42795
|
const server = new McpServer({
|
|
42591
42796
|
name: "Unkey",
|
|
42592
|
-
version: "2.0.
|
|
42797
|
+
version: "2.0.4"
|
|
42593
42798
|
});
|
|
42594
42799
|
const client = new UnkeyCore({
|
|
42595
42800
|
rootKey: deps.rootKey,
|
|
@@ -42619,6 +42824,7 @@ function createMCPServer(deps) {
|
|
|
42619
42824
|
tool(tool$keysGetKey);
|
|
42620
42825
|
tool(tool$keysRemovePermissions);
|
|
42621
42826
|
tool(tool$keysRemoveRoles);
|
|
42827
|
+
tool(tool$keysRerollKey);
|
|
42622
42828
|
tool(tool$keysSetPermissions);
|
|
42623
42829
|
tool(tool$keysSetRoles);
|
|
42624
42830
|
tool(tool$keysUpdateCredits);
|
|
@@ -42661,6 +42867,7 @@ var init_server2 = __esm(() => {
|
|
|
42661
42867
|
init_keysGetKey2();
|
|
42662
42868
|
init_keysRemovePermissions2();
|
|
42663
42869
|
init_keysRemoveRoles2();
|
|
42870
|
+
init_keysRerollKey2();
|
|
42664
42871
|
init_keysSetPermissions2();
|
|
42665
42872
|
init_keysSetRoles2();
|
|
42666
42873
|
init_keysUpdateCredits2();
|
|
@@ -43875,7 +44082,7 @@ var routes = ln({
|
|
|
43875
44082
|
var app = _e(routes, {
|
|
43876
44083
|
name: "mcp",
|
|
43877
44084
|
versionInfo: {
|
|
43878
|
-
currentVersion: "2.0.
|
|
44085
|
+
currentVersion: "2.0.4"
|
|
43879
44086
|
}
|
|
43880
44087
|
});
|
|
43881
44088
|
Yt(app, process3.argv.slice(2), buildContext(process3));
|
|
@@ -43883,5 +44090,5 @@ export {
|
|
|
43883
44090
|
app
|
|
43884
44091
|
};
|
|
43885
44092
|
|
|
43886
|
-
//# debugId=
|
|
44093
|
+
//# debugId=99890DFCB79E3EA364756E2164756E21
|
|
43887
44094
|
//# sourceMappingURL=mcp-server.js.map
|