@unkey/api 2.0.3 → 2.0.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (163) hide show
  1. package/README.md +4 -2
  2. package/bin/mcp-server.js +348 -141
  3. package/bin/mcp-server.js.map +21 -16
  4. package/dist/commonjs/funcs/keysRerollKey.d.ts +49 -0
  5. package/dist/commonjs/funcs/keysRerollKey.d.ts.map +1 -0
  6. package/dist/commonjs/funcs/keysRerollKey.js +159 -0
  7. package/dist/commonjs/funcs/keysRerollKey.js.map +1 -0
  8. package/dist/commonjs/funcs/permissionsListPermissions.d.ts +2 -1
  9. package/dist/commonjs/funcs/permissionsListPermissions.d.ts.map +1 -1
  10. package/dist/commonjs/funcs/permissionsListPermissions.js +2 -1
  11. package/dist/commonjs/funcs/permissionsListPermissions.js.map +1 -1
  12. package/dist/commonjs/funcs/permissionsListRoles.d.ts +2 -1
  13. package/dist/commonjs/funcs/permissionsListRoles.d.ts.map +1 -1
  14. package/dist/commonjs/funcs/permissionsListRoles.js +2 -1
  15. package/dist/commonjs/funcs/permissionsListRoles.js.map +1 -1
  16. package/dist/commonjs/lib/config.d.ts +3 -3
  17. package/dist/commonjs/lib/config.js +3 -3
  18. package/dist/commonjs/mcp-server/mcp-server.js +1 -1
  19. package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
  20. package/dist/commonjs/mcp-server/server.js +3 -1
  21. package/dist/commonjs/mcp-server/server.js.map +1 -1
  22. package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts +8 -0
  23. package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
  24. package/dist/commonjs/mcp-server/tools/keysRerollKey.js +96 -0
  25. package/dist/commonjs/mcp-server/tools/keysRerollKey.js.map +1 -0
  26. package/dist/commonjs/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
  27. package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js +2 -1
  28. package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js.map +1 -1
  29. package/dist/commonjs/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
  30. package/dist/commonjs/mcp-server/tools/permissionsListRoles.js +2 -1
  31. package/dist/commonjs/mcp-server/tools/permissionsListRoles.js.map +1 -1
  32. package/dist/commonjs/models/components/index.d.ts +3 -0
  33. package/dist/commonjs/models/components/index.d.ts.map +1 -1
  34. package/dist/commonjs/models/components/index.js +3 -0
  35. package/dist/commonjs/models/components/index.js.map +1 -1
  36. package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
  37. package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
  38. package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
  39. package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
  40. package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
  41. package/dist/commonjs/models/components/v2keysaddrolesresponsebody.js.map +1 -1
  42. package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
  43. package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
  44. package/dist/commonjs/models/components/v2keysremoverolesresponsebody.js.map +1 -1
  45. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
  46. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
  47. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.js +71 -0
  48. package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
  49. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
  50. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
  51. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js +73 -0
  52. package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
  53. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
  54. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
  55. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js +71 -0
  56. package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
  57. package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
  58. package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
  59. package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
  60. package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
  61. package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
  62. package/dist/commonjs/models/components/v2keyssetrolesresponsebody.js.map +1 -1
  63. package/dist/commonjs/sdk/keys.d.ts +38 -0
  64. package/dist/commonjs/sdk/keys.d.ts.map +1 -1
  65. package/dist/commonjs/sdk/keys.js +41 -0
  66. package/dist/commonjs/sdk/keys.js.map +1 -1
  67. package/dist/commonjs/sdk/permissions.d.ts +4 -2
  68. package/dist/commonjs/sdk/permissions.d.ts.map +1 -1
  69. package/dist/commonjs/sdk/permissions.js +4 -2
  70. package/dist/commonjs/sdk/permissions.js.map +1 -1
  71. package/dist/esm/funcs/keysRerollKey.d.ts +49 -0
  72. package/dist/esm/funcs/keysRerollKey.d.ts.map +1 -0
  73. package/dist/esm/funcs/keysRerollKey.js +123 -0
  74. package/dist/esm/funcs/keysRerollKey.js.map +1 -0
  75. package/dist/esm/funcs/permissionsListPermissions.d.ts +2 -1
  76. package/dist/esm/funcs/permissionsListPermissions.d.ts.map +1 -1
  77. package/dist/esm/funcs/permissionsListPermissions.js +2 -1
  78. package/dist/esm/funcs/permissionsListPermissions.js.map +1 -1
  79. package/dist/esm/funcs/permissionsListRoles.d.ts +2 -1
  80. package/dist/esm/funcs/permissionsListRoles.d.ts.map +1 -1
  81. package/dist/esm/funcs/permissionsListRoles.js +2 -1
  82. package/dist/esm/funcs/permissionsListRoles.js.map +1 -1
  83. package/dist/esm/lib/config.d.ts +3 -3
  84. package/dist/esm/lib/config.js +3 -3
  85. package/dist/esm/mcp-server/mcp-server.js +1 -1
  86. package/dist/esm/mcp-server/server.d.ts.map +1 -1
  87. package/dist/esm/mcp-server/server.js +3 -1
  88. package/dist/esm/mcp-server/server.js.map +1 -1
  89. package/dist/esm/mcp-server/tools/keysRerollKey.d.ts +8 -0
  90. package/dist/esm/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
  91. package/dist/esm/mcp-server/tools/keysRerollKey.js +60 -0
  92. package/dist/esm/mcp-server/tools/keysRerollKey.js.map +1 -0
  93. package/dist/esm/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
  94. package/dist/esm/mcp-server/tools/permissionsListPermissions.js +2 -1
  95. package/dist/esm/mcp-server/tools/permissionsListPermissions.js.map +1 -1
  96. package/dist/esm/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
  97. package/dist/esm/mcp-server/tools/permissionsListRoles.js +2 -1
  98. package/dist/esm/mcp-server/tools/permissionsListRoles.js.map +1 -1
  99. package/dist/esm/models/components/index.d.ts +3 -0
  100. package/dist/esm/models/components/index.d.ts.map +1 -1
  101. package/dist/esm/models/components/index.js +3 -0
  102. package/dist/esm/models/components/index.js.map +1 -1
  103. package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
  104. package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
  105. package/dist/esm/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
  106. package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
  107. package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
  108. package/dist/esm/models/components/v2keysaddrolesresponsebody.js.map +1 -1
  109. package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
  110. package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
  111. package/dist/esm/models/components/v2keysremoverolesresponsebody.js.map +1 -1
  112. package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
  113. package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
  114. package/dist/esm/models/components/v2keysrerollkeyrequestbody.js +33 -0
  115. package/dist/esm/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
  116. package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
  117. package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
  118. package/dist/esm/models/components/v2keysrerollkeyresponsebody.js +35 -0
  119. package/dist/esm/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
  120. package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
  121. package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
  122. package/dist/esm/models/components/v2keysrerollkeyresponsedata.js +33 -0
  123. package/dist/esm/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
  124. package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
  125. package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
  126. package/dist/esm/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
  127. package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
  128. package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
  129. package/dist/esm/models/components/v2keyssetrolesresponsebody.js.map +1 -1
  130. package/dist/esm/sdk/keys.d.ts +38 -0
  131. package/dist/esm/sdk/keys.d.ts.map +1 -1
  132. package/dist/esm/sdk/keys.js +41 -0
  133. package/dist/esm/sdk/keys.js.map +1 -1
  134. package/dist/esm/sdk/permissions.d.ts +4 -2
  135. package/dist/esm/sdk/permissions.d.ts.map +1 -1
  136. package/dist/esm/sdk/permissions.js +4 -2
  137. package/dist/esm/sdk/permissions.js.map +1 -1
  138. package/docs/sdks/keys/README.md +113 -0
  139. package/docs/sdks/permissions/README.md +4 -2
  140. package/examples/apisCreateApi.example.ts +1 -1
  141. package/examples/package-lock.json +3 -3
  142. package/jsr.json +1 -1
  143. package/package.json +3 -3
  144. package/src/funcs/keysRerollKey.ts +227 -0
  145. package/src/funcs/permissionsListPermissions.ts +2 -1
  146. package/src/funcs/permissionsListRoles.ts +2 -1
  147. package/src/lib/config.ts +3 -3
  148. package/src/mcp-server/mcp-server.ts +1 -1
  149. package/src/mcp-server/server.ts +3 -1
  150. package/src/mcp-server/tools/keysRerollKey.ts +69 -0
  151. package/src/mcp-server/tools/permissionsListPermissions.ts +2 -1
  152. package/src/mcp-server/tools/permissionsListRoles.ts +2 -1
  153. package/src/models/components/index.ts +3 -0
  154. package/src/models/components/v2keysaddpermissionsresponsebody.ts +0 -1
  155. package/src/models/components/v2keysaddrolesresponsebody.ts +0 -1
  156. package/src/models/components/v2keysremoverolesresponsebody.ts +0 -1
  157. package/src/models/components/v2keysrerollkeyrequestbody.ts +99 -0
  158. package/src/models/components/v2keysrerollkeyresponsebody.ts +87 -0
  159. package/src/models/components/v2keysrerollkeyresponsedata.ts +103 -0
  160. package/src/models/components/v2keyssetpermissionsresponsebody.ts +0 -1
  161. package/src/models/components/v2keyssetrolesresponsebody.ts +0 -1
  162. package/src/sdk/keys.ts +49 -0
  163. package/src/sdk/permissions.ts +4 -2
package/bin/mcp-server.js CHANGED
@@ -34269,9 +34269,9 @@ var init_config = __esm(() => {
34269
34269
  SDK_METADATA = {
34270
34270
  language: "typescript",
34271
34271
  openapiDocVersion: "2.0.0",
34272
- sdkVersion: "2.0.3",
34273
- genVersion: "2.672.0",
34274
- userAgent: "speakeasy-sdk/typescript 2.0.3 2.672.0 2.0.0 @unkey/api"
34272
+ sdkVersion: "2.0.4",
34273
+ genVersion: "2.683.1",
34274
+ userAgent: "speakeasy-sdk/typescript 2.0.4 2.683.1 2.0.0 @unkey/api"
34275
34275
  };
34276
34276
  });
34277
34277
 
@@ -36814,6 +36814,62 @@ var init_v2keysremoverolesresponsebody = __esm(() => {
36814
36814
  })(V2KeysRemoveRolesResponseBody$ ||= {});
36815
36815
  });
36816
36816
 
36817
+ // src/models/components/v2keysrerollkeyrequestbody.ts
36818
+ var V2KeysRerollKeyRequestBody$inboundSchema, V2KeysRerollKeyRequestBody$outboundSchema, V2KeysRerollKeyRequestBody$;
36819
+ var init_v2keysrerollkeyrequestbody = __esm(() => {
36820
+ init_zod();
36821
+ V2KeysRerollKeyRequestBody$inboundSchema = objectType({
36822
+ keyId: stringType(),
36823
+ expiration: numberType().int()
36824
+ });
36825
+ V2KeysRerollKeyRequestBody$outboundSchema = objectType({
36826
+ keyId: stringType(),
36827
+ expiration: numberType().int()
36828
+ });
36829
+ ((V2KeysRerollKeyRequestBody$) => {
36830
+ V2KeysRerollKeyRequestBody$.inboundSchema = V2KeysRerollKeyRequestBody$inboundSchema;
36831
+ V2KeysRerollKeyRequestBody$.outboundSchema = V2KeysRerollKeyRequestBody$outboundSchema;
36832
+ })(V2KeysRerollKeyRequestBody$ ||= {});
36833
+ });
36834
+
36835
+ // src/models/components/v2keysrerollkeyresponsedata.ts
36836
+ var V2KeysRerollKeyResponseData$inboundSchema, V2KeysRerollKeyResponseData$outboundSchema, V2KeysRerollKeyResponseData$;
36837
+ var init_v2keysrerollkeyresponsedata = __esm(() => {
36838
+ init_zod();
36839
+ V2KeysRerollKeyResponseData$inboundSchema = objectType({
36840
+ keyId: stringType(),
36841
+ key: stringType()
36842
+ });
36843
+ V2KeysRerollKeyResponseData$outboundSchema = objectType({
36844
+ keyId: stringType(),
36845
+ key: stringType()
36846
+ });
36847
+ ((V2KeysRerollKeyResponseData$) => {
36848
+ V2KeysRerollKeyResponseData$.inboundSchema = V2KeysRerollKeyResponseData$inboundSchema;
36849
+ V2KeysRerollKeyResponseData$.outboundSchema = V2KeysRerollKeyResponseData$outboundSchema;
36850
+ })(V2KeysRerollKeyResponseData$ ||= {});
36851
+ });
36852
+
36853
+ // src/models/components/v2keysrerollkeyresponsebody.ts
36854
+ var V2KeysRerollKeyResponseBody$inboundSchema, V2KeysRerollKeyResponseBody$outboundSchema, V2KeysRerollKeyResponseBody$;
36855
+ var init_v2keysrerollkeyresponsebody = __esm(() => {
36856
+ init_zod();
36857
+ init_meta();
36858
+ init_v2keysrerollkeyresponsedata();
36859
+ V2KeysRerollKeyResponseBody$inboundSchema = objectType({
36860
+ meta: Meta$inboundSchema,
36861
+ data: V2KeysRerollKeyResponseData$inboundSchema
36862
+ });
36863
+ V2KeysRerollKeyResponseBody$outboundSchema = objectType({
36864
+ meta: Meta$outboundSchema,
36865
+ data: V2KeysRerollKeyResponseData$outboundSchema
36866
+ });
36867
+ ((V2KeysRerollKeyResponseBody$) => {
36868
+ V2KeysRerollKeyResponseBody$.inboundSchema = V2KeysRerollKeyResponseBody$inboundSchema;
36869
+ V2KeysRerollKeyResponseBody$.outboundSchema = V2KeysRerollKeyResponseBody$outboundSchema;
36870
+ })(V2KeysRerollKeyResponseBody$ ||= {});
36871
+ });
36872
+
36817
36873
  // src/models/components/v2keyssetpermissionsrequestbody.ts
36818
36874
  var V2KeysSetPermissionsRequestBody$inboundSchema, V2KeysSetPermissionsRequestBody$outboundSchema, V2KeysSetPermissionsRequestBody$;
36819
36875
  var init_v2keyssetpermissionsrequestbody = __esm(() => {
@@ -37814,6 +37870,9 @@ var init_components = __esm(() => {
37814
37870
  init_v2keysremovepermissionsresponsebody();
37815
37871
  init_v2keysremoverolesrequestbody();
37816
37872
  init_v2keysremoverolesresponsebody();
37873
+ init_v2keysrerollkeyrequestbody();
37874
+ init_v2keysrerollkeyresponsebody();
37875
+ init_v2keysrerollkeyresponsedata();
37817
37876
  init_v2keyssetpermissionsrequestbody();
37818
37877
  init_v2keyssetpermissionsresponsebody();
37819
37878
  init_v2keyssetrolesrequestbody();
@@ -40269,11 +40328,155 @@ Invalidates the key cache for immediate effect, and makes role changes available
40269
40328
  };
40270
40329
  });
40271
40330
 
40272
- // src/funcs/keysSetPermissions.ts
40273
- function keysSetPermissions(client, request, options) {
40331
+ // src/funcs/keysRerollKey.ts
40332
+ function keysRerollKey(client, request, options) {
40274
40333
  return new APIPromise($do17(client, request, options));
40275
40334
  }
40276
40335
  async function $do17(client, request, options) {
40336
+ const parsed = safeParse(request, (value) => V2KeysRerollKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40337
+ if (!parsed.ok) {
40338
+ return [parsed, { status: "invalid" }];
40339
+ }
40340
+ const payload = parsed.value;
40341
+ const body = encodeJSON("body", payload, { explode: true });
40342
+ const path = pathToFunc("/v2/keys.rerollKey")();
40343
+ const headers = new Headers(compactMap({
40344
+ "Content-Type": "application/json",
40345
+ Accept: "application/json"
40346
+ }));
40347
+ const secConfig = await extractSecurity(client._options.rootKey);
40348
+ const securityInput = secConfig == null ? {} : { rootKey: secConfig };
40349
+ const requestSecurity = resolveGlobalSecurity(securityInput);
40350
+ const context = {
40351
+ options: client._options,
40352
+ baseURL: options?.serverURL ?? client._baseURL ?? "",
40353
+ operationID: "rerollKey",
40354
+ oAuth2Scopes: [],
40355
+ resolvedSecurity: requestSecurity,
40356
+ securitySource: client._options.rootKey,
40357
+ retryConfig: options?.retries || client._options.retryConfig || {
40358
+ strategy: "backoff",
40359
+ backoff: {
40360
+ initialInterval: 50,
40361
+ maxInterval: 1000,
40362
+ exponent: 1.5,
40363
+ maxElapsedTime: 1e4
40364
+ },
40365
+ retryConnectionErrors: true
40366
+ },
40367
+ retryCodes: options?.retryCodes || ["5XX"]
40368
+ };
40369
+ const requestRes = client._createRequest(context, {
40370
+ security: requestSecurity,
40371
+ method: "POST",
40372
+ baseURL: options?.serverURL,
40373
+ path,
40374
+ headers,
40375
+ body,
40376
+ userAgent: client._options.userAgent,
40377
+ timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
40378
+ }, options);
40379
+ if (!requestRes.ok) {
40380
+ return [requestRes, { status: "invalid" }];
40381
+ }
40382
+ const req = requestRes.value;
40383
+ const doResult = await client._do(req, {
40384
+ context,
40385
+ errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
40386
+ retryConfig: context.retryConfig,
40387
+ retryCodes: context.retryCodes
40388
+ });
40389
+ if (!doResult.ok) {
40390
+ return [doResult, { status: "request-error", request: req }];
40391
+ }
40392
+ const response = doResult.value;
40393
+ const responseFields = {
40394
+ HttpMeta: { Response: response, Request: req }
40395
+ };
40396
+ const [result] = await match(json(200, V2KeysRerollKeyResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
40397
+ if (!result.ok) {
40398
+ return [result, { status: "complete", request: req, response }];
40399
+ }
40400
+ return [result, { status: "complete", request: req, response }];
40401
+ }
40402
+ var init_keysRerollKey = __esm(() => {
40403
+ init_encodings();
40404
+ init_matchers();
40405
+ init_primitives();
40406
+ init_schemas();
40407
+ init_security();
40408
+ init_url();
40409
+ init_components();
40410
+ init_errors2();
40411
+ init_async();
40412
+ });
40413
+
40414
+ // src/mcp-server/tools/keysRerollKey.ts
40415
+ var args17, tool$keysRerollKey;
40416
+ var init_keysRerollKey2 = __esm(() => {
40417
+ init_keysRerollKey();
40418
+ init_components();
40419
+ init_tools();
40420
+ args17 = {
40421
+ request: V2KeysRerollKeyRequestBody$inboundSchema
40422
+ };
40423
+ tool$keysRerollKey = {
40424
+ name: "keys-reroll-key",
40425
+ description: `Reroll Key
40426
+
40427
+ Generate a new API key while preserving the configuration from an existing key.
40428
+
40429
+ This operation creates a fresh key with a new token while maintaining all settings from the original key:
40430
+ - Permissions and roles
40431
+ - Custom metadata
40432
+ - Rate limit configurations
40433
+ - Identity associations
40434
+ - Remaining credits
40435
+ - Recovery settings
40436
+
40437
+ **Key Generation:**
40438
+ - The system attempts to extract the prefix from the original key
40439
+ - If prefix extraction fails, the default API prefix is used
40440
+ - Key length follows the API's default byte configuration (or 16 bytes if not specified)
40441
+
40442
+ **Original Key Handling:**
40443
+ - The original key will be revoked after the duration specified in \`expiration\`
40444
+ - Set \`expiration\` to 0 to revoke immediately
40445
+ - This allows for graceful key rotation with an overlap period
40446
+
40447
+ Common use cases include:
40448
+ - Rotating keys for security compliance
40449
+ - Issuing replacement keys for compromised credentials
40450
+ - Creating backup keys with identical permissions
40451
+
40452
+ **Important:** Analytics and usage metrics are tracked at both the key level AND identity level. If the original key has an identity, the new key will inherit it, allowing you to track usage across both individual keys and the overall identity.
40453
+
40454
+ **Required Permissions**
40455
+
40456
+ Your root key must have:
40457
+ - \`api.*.create_key\` or \`api.<api_id>.create_key\`
40458
+ - \`api.*.encrypt_key\` or \`api.<api_id>.encrypt_key\` (only when the original key is recoverable)
40459
+ `,
40460
+ args: args17,
40461
+ tool: async (client, args18, ctx) => {
40462
+ const [result, apiCall] = await keysRerollKey(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40463
+ if (!result.ok) {
40464
+ return {
40465
+ content: [{ type: "text", text: result.error.message }],
40466
+ isError: true
40467
+ };
40468
+ }
40469
+ const value = result.value;
40470
+ return formatResult(value, apiCall);
40471
+ }
40472
+ };
40473
+ });
40474
+
40475
+ // src/funcs/keysSetPermissions.ts
40476
+ function keysSetPermissions(client, request, options) {
40477
+ return new APIPromise($do18(client, request, options));
40478
+ }
40479
+ async function $do18(client, request, options) {
40277
40480
  const parsed = safeParse(request, (value) => V2KeysSetPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
40278
40481
  if (!parsed.ok) {
40279
40482
  return [parsed, { status: "invalid" }];
@@ -40353,12 +40556,12 @@ var init_keysSetPermissions = __esm(() => {
40353
40556
  });
40354
40557
 
40355
40558
  // src/mcp-server/tools/keysSetPermissions.ts
40356
- var args17, tool$keysSetPermissions;
40559
+ var args18, tool$keysSetPermissions;
40357
40560
  var init_keysSetPermissions2 = __esm(() => {
40358
40561
  init_keysSetPermissions();
40359
40562
  init_components();
40360
40563
  init_tools();
40361
- args17 = {
40564
+ args18 = {
40362
40565
  request: V2KeysSetPermissionsRequestBody$inboundSchema
40363
40566
  };
40364
40567
  tool$keysSetPermissions = {
@@ -40381,9 +40584,9 @@ Your root key must have one of the following permissions:
40381
40584
 
40382
40585
  Invalidates the key cache for immediate effect, and makes permission changes available for verification within 30 seconds across all regions.
40383
40586
  `,
40384
- args: args17,
40385
- tool: async (client, args18, ctx) => {
40386
- const [result, apiCall] = await keysSetPermissions(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40587
+ args: args18,
40588
+ tool: async (client, args19, ctx) => {
40589
+ const [result, apiCall] = await keysSetPermissions(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40387
40590
  if (!result.ok) {
40388
40591
  return {
40389
40592
  content: [{ type: "text", text: result.error.message }],
@@ -40398,9 +40601,9 @@ Invalidates the key cache for immediate effect, and makes permission changes ava
40398
40601
 
40399
40602
  // src/funcs/keysSetRoles.ts
40400
40603
  function keysSetRoles(client, request, options) {
40401
- return new APIPromise($do18(client, request, options));
40604
+ return new APIPromise($do19(client, request, options));
40402
40605
  }
40403
- async function $do18(client, request, options) {
40606
+ async function $do19(client, request, options) {
40404
40607
  const parsed = safeParse(request, (value) => V2KeysSetRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
40405
40608
  if (!parsed.ok) {
40406
40609
  return [parsed, { status: "invalid" }];
@@ -40480,12 +40683,12 @@ var init_keysSetRoles = __esm(() => {
40480
40683
  });
40481
40684
 
40482
40685
  // src/mcp-server/tools/keysSetRoles.ts
40483
- var args18, tool$keysSetRoles;
40686
+ var args19, tool$keysSetRoles;
40484
40687
  var init_keysSetRoles2 = __esm(() => {
40485
40688
  init_keysSetRoles();
40486
40689
  init_components();
40487
40690
  init_tools();
40488
- args18 = {
40691
+ args19 = {
40489
40692
  request: V2KeysSetRolesRequestBody$inboundSchema
40490
40693
  };
40491
40694
  tool$keysSetRoles = {
@@ -40508,9 +40711,9 @@ Your root key must have one of the following permissions:
40508
40711
 
40509
40712
  Invalidates the key cache for immediate effect, and makes role changes available for verification within 30 seconds across all regions.
40510
40713
  `,
40511
- args: args18,
40512
- tool: async (client, args19, ctx) => {
40513
- const [result, apiCall] = await keysSetRoles(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40714
+ args: args19,
40715
+ tool: async (client, args20, ctx) => {
40716
+ const [result, apiCall] = await keysSetRoles(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40514
40717
  if (!result.ok) {
40515
40718
  return {
40516
40719
  content: [{ type: "text", text: result.error.message }],
@@ -40525,9 +40728,9 @@ Invalidates the key cache for immediate effect, and makes role changes available
40525
40728
 
40526
40729
  // src/funcs/keysUpdateCredits.ts
40527
40730
  function keysUpdateCredits(client, request, options) {
40528
- return new APIPromise($do19(client, request, options));
40731
+ return new APIPromise($do20(client, request, options));
40529
40732
  }
40530
- async function $do19(client, request, options) {
40733
+ async function $do20(client, request, options) {
40531
40734
  const parsed = safeParse(request, (value) => V2KeysUpdateCreditsRequestBody$outboundSchema.parse(value), "Input validation failed");
40532
40735
  if (!parsed.ok) {
40533
40736
  return [parsed, { status: "invalid" }];
@@ -40607,12 +40810,12 @@ var init_keysUpdateCredits = __esm(() => {
40607
40810
  });
40608
40811
 
40609
40812
  // src/mcp-server/tools/keysUpdateCredits.ts
40610
- var args19, tool$keysUpdateCredits;
40813
+ var args20, tool$keysUpdateCredits;
40611
40814
  var init_keysUpdateCredits2 = __esm(() => {
40612
40815
  init_keysUpdateCredits();
40613
40816
  init_components();
40614
40817
  init_tools();
40615
- args19 = {
40818
+ args20 = {
40616
40819
  request: V2KeysUpdateCreditsRequestBody$inboundSchema
40617
40820
  };
40618
40821
  tool$keysUpdateCredits = {
@@ -40635,9 +40838,9 @@ Your root key must have one of the following permissions:
40635
40838
 
40636
40839
  Credit updates remove the key from cache immediately. Setting credits to unlimited automatically clears any existing refill settings. Changes take effect instantly but may take up to 30 seconds to propagate to all edge regions.
40637
40840
  `,
40638
- args: args19,
40639
- tool: async (client, args20, ctx) => {
40640
- const [result, apiCall] = await keysUpdateCredits(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40841
+ args: args20,
40842
+ tool: async (client, args21, ctx) => {
40843
+ const [result, apiCall] = await keysUpdateCredits(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40641
40844
  if (!result.ok) {
40642
40845
  return {
40643
40846
  content: [{ type: "text", text: result.error.message }],
@@ -40652,9 +40855,9 @@ Credit updates remove the key from cache immediately. Setting credits to unlimit
40652
40855
 
40653
40856
  // src/funcs/keysUpdateKey.ts
40654
40857
  function keysUpdateKey(client, request, options) {
40655
- return new APIPromise($do20(client, request, options));
40858
+ return new APIPromise($do21(client, request, options));
40656
40859
  }
40657
- async function $do20(client, request, options) {
40860
+ async function $do21(client, request, options) {
40658
40861
  const parsed = safeParse(request, (value) => V2KeysUpdateKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40659
40862
  if (!parsed.ok) {
40660
40863
  return [parsed, { status: "invalid" }];
@@ -40734,12 +40937,12 @@ var init_keysUpdateKey = __esm(() => {
40734
40937
  });
40735
40938
 
40736
40939
  // src/mcp-server/tools/keysUpdateKey.ts
40737
- var args20, tool$keysUpdateKey;
40940
+ var args21, tool$keysUpdateKey;
40738
40941
  var init_keysUpdateKey2 = __esm(() => {
40739
40942
  init_keysUpdateKey();
40740
40943
  init_components();
40741
40944
  init_tools();
40742
- args20 = {
40945
+ args21 = {
40743
40946
  request: V2KeysUpdateKeyRequestBody$inboundSchema
40744
40947
  };
40745
40948
  tool$keysUpdateKey = {
@@ -40762,9 +40965,9 @@ Your root key must have one of the following permissions:
40762
40965
 
40763
40966
  If you specify an \`externalId\` that doesn't exist, a new identity will be automatically created and linked to the key. Permission updates will auto-create any permissions that don't exist in your workspace. Changes take effect immediately but may take up to 30 seconds to propagate to all edge regions due to cache invalidation.
40764
40967
  `,
40765
- args: args20,
40766
- tool: async (client, args21, ctx) => {
40767
- const [result, apiCall] = await keysUpdateKey(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40968
+ args: args21,
40969
+ tool: async (client, args22, ctx) => {
40970
+ const [result, apiCall] = await keysUpdateKey(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40768
40971
  if (!result.ok) {
40769
40972
  return {
40770
40973
  content: [{ type: "text", text: result.error.message }],
@@ -40779,9 +40982,9 @@ If you specify an \`externalId\` that doesn't exist, a new identity will be auto
40779
40982
 
40780
40983
  // src/funcs/keysVerifyKey.ts
40781
40984
  function keysVerifyKey(client, request, options) {
40782
- return new APIPromise($do21(client, request, options));
40985
+ return new APIPromise($do22(client, request, options));
40783
40986
  }
40784
- async function $do21(client, request, options) {
40987
+ async function $do22(client, request, options) {
40785
40988
  const parsed = safeParse(request, (value) => V2KeysVerifyKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
40786
40989
  if (!parsed.ok) {
40787
40990
  return [parsed, { status: "invalid" }];
@@ -40861,12 +41064,12 @@ var init_keysVerifyKey = __esm(() => {
40861
41064
  });
40862
41065
 
40863
41066
  // src/mcp-server/tools/keysVerifyKey.ts
40864
- var args21, tool$keysVerifyKey;
41067
+ var args22, tool$keysVerifyKey;
40865
41068
  var init_keysVerifyKey2 = __esm(() => {
40866
41069
  init_keysVerifyKey();
40867
41070
  init_components();
40868
41071
  init_tools();
40869
- args21 = {
41072
+ args22 = {
40870
41073
  request: V2KeysVerifyKeyRequestBody$inboundSchema
40871
41074
  };
40872
41075
  tool$keysVerifyKey = {
@@ -40892,9 +41095,9 @@ Your root key needs one of:
40892
41095
 
40893
41096
  If you are getting a NOT_FOUND error, ensure your root key has the required verify key permissions.
40894
41097
  `,
40895
- args: args21,
40896
- tool: async (client, args22, ctx) => {
40897
- const [result, apiCall] = await keysVerifyKey(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41098
+ args: args22,
41099
+ tool: async (client, args23, ctx) => {
41100
+ const [result, apiCall] = await keysVerifyKey(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
40898
41101
  if (!result.ok) {
40899
41102
  return {
40900
41103
  content: [{ type: "text", text: result.error.message }],
@@ -40909,9 +41112,9 @@ If you are getting a NOT_FOUND error, ensure your root key has the required veri
40909
41112
 
40910
41113
  // src/funcs/keysWhoami.ts
40911
41114
  function keysWhoami(client, request, options) {
40912
- return new APIPromise($do22(client, request, options));
41115
+ return new APIPromise($do23(client, request, options));
40913
41116
  }
40914
- async function $do22(client, request, options) {
41117
+ async function $do23(client, request, options) {
40915
41118
  const parsed = safeParse(request, (value) => V2KeysWhoamiRequestBody$outboundSchema.parse(value), "Input validation failed");
40916
41119
  if (!parsed.ok) {
40917
41120
  return [parsed, { status: "invalid" }];
@@ -40991,12 +41194,12 @@ var init_keysWhoami = __esm(() => {
40991
41194
  });
40992
41195
 
40993
41196
  // src/mcp-server/tools/keysWhoami.ts
40994
- var args22, tool$keysWhoami;
41197
+ var args23, tool$keysWhoami;
40995
41198
  var init_keysWhoami2 = __esm(() => {
40996
41199
  init_keysWhoami();
40997
41200
  init_components();
40998
41201
  init_tools();
40999
- args22 = {
41202
+ args23 = {
41000
41203
  request: V2KeysWhoamiRequestBody$inboundSchema
41001
41204
  };
41002
41205
  tool$keysWhoami = {
@@ -41013,9 +41216,9 @@ Your root key must have one of the following permissions for basic key informati
41013
41216
 
41014
41217
  If your rootkey lacks permissions but the key exists, we may return a 404 status here to prevent leaking the existance of a key to unauthorized clients. If you believe that a key should exist, but receive a 404, please double check your root key has the correct permissions.
41015
41218
  `,
41016
- args: args22,
41017
- tool: async (client, args23, ctx) => {
41018
- const [result, apiCall] = await keysWhoami(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41219
+ args: args23,
41220
+ tool: async (client, args24, ctx) => {
41221
+ const [result, apiCall] = await keysWhoami(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41019
41222
  if (!result.ok) {
41020
41223
  return {
41021
41224
  content: [{ type: "text", text: result.error.message }],
@@ -41030,9 +41233,9 @@ If your rootkey lacks permissions but the key exists, we may return a 404 status
41030
41233
 
41031
41234
  // src/funcs/permissionsCreatePermission.ts
41032
41235
  function permissionsCreatePermission(client, request, options) {
41033
- return new APIPromise($do23(client, request, options));
41236
+ return new APIPromise($do24(client, request, options));
41034
41237
  }
41035
- async function $do23(client, request, options) {
41238
+ async function $do24(client, request, options) {
41036
41239
  const parsed = safeParse(request, (value) => V2PermissionsCreatePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41037
41240
  if (!parsed.ok) {
41038
41241
  return [parsed, { status: "invalid" }];
@@ -41112,12 +41315,12 @@ var init_permissionsCreatePermission = __esm(() => {
41112
41315
  });
41113
41316
 
41114
41317
  // src/mcp-server/tools/permissionsCreatePermission.ts
41115
- var args23, tool$permissionsCreatePermission;
41318
+ var args24, tool$permissionsCreatePermission;
41116
41319
  var init_permissionsCreatePermission2 = __esm(() => {
41117
41320
  init_permissionsCreatePermission();
41118
41321
  init_components();
41119
41322
  init_tools();
41120
- args23 = {
41323
+ args24 = {
41121
41324
  request: V2PermissionsCreatePermissionRequestBody$inboundSchema
41122
41325
  };
41123
41326
  tool$permissionsCreatePermission = {
@@ -41135,9 +41338,9 @@ Use hierarchical naming patterns like \`documents.read\`, \`admin.users.delete\`
41135
41338
  Your root key must have the following permission:
41136
41339
  - \`rbac.*.create_permission\`
41137
41340
  `,
41138
- args: args23,
41139
- tool: async (client, args24, ctx) => {
41140
- const [result, apiCall] = await permissionsCreatePermission(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41341
+ args: args24,
41342
+ tool: async (client, args25, ctx) => {
41343
+ const [result, apiCall] = await permissionsCreatePermission(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41141
41344
  if (!result.ok) {
41142
41345
  return {
41143
41346
  content: [{ type: "text", text: result.error.message }],
@@ -41152,9 +41355,9 @@ Your root key must have the following permission:
41152
41355
 
41153
41356
  // src/funcs/permissionsCreateRole.ts
41154
41357
  function permissionsCreateRole(client, request, options) {
41155
- return new APIPromise($do24(client, request, options));
41358
+ return new APIPromise($do25(client, request, options));
41156
41359
  }
41157
- async function $do24(client, request, options) {
41360
+ async function $do25(client, request, options) {
41158
41361
  const parsed = safeParse(request, (value) => V2PermissionsCreateRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41159
41362
  if (!parsed.ok) {
41160
41363
  return [parsed, { status: "invalid" }];
@@ -41234,12 +41437,12 @@ var init_permissionsCreateRole = __esm(() => {
41234
41437
  });
41235
41438
 
41236
41439
  // src/mcp-server/tools/permissionsCreateRole.ts
41237
- var args24, tool$permissionsCreateRole;
41440
+ var args25, tool$permissionsCreateRole;
41238
41441
  var init_permissionsCreateRole2 = __esm(() => {
41239
41442
  init_permissionsCreateRole();
41240
41443
  init_components();
41241
41444
  init_tools();
41242
- args24 = {
41445
+ args25 = {
41243
41446
  request: V2PermissionsCreateRoleRequestBody$inboundSchema
41244
41447
  };
41245
41448
  tool$permissionsCreateRole = {
@@ -41255,9 +41458,9 @@ Create a new role to group related permissions for easier management. Roles enab
41255
41458
  Your root key must have the following permission:
41256
41459
  - \`rbac.*.create_role\`
41257
41460
  `,
41258
- args: args24,
41259
- tool: async (client, args25, ctx) => {
41260
- const [result, apiCall] = await permissionsCreateRole(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41461
+ args: args25,
41462
+ tool: async (client, args26, ctx) => {
41463
+ const [result, apiCall] = await permissionsCreateRole(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41261
41464
  if (!result.ok) {
41262
41465
  return {
41263
41466
  content: [{ type: "text", text: result.error.message }],
@@ -41272,9 +41475,9 @@ Your root key must have the following permission:
41272
41475
 
41273
41476
  // src/funcs/permissionsDeletePermission.ts
41274
41477
  function permissionsDeletePermission(client, request, options) {
41275
- return new APIPromise($do25(client, request, options));
41478
+ return new APIPromise($do26(client, request, options));
41276
41479
  }
41277
- async function $do25(client, request, options) {
41480
+ async function $do26(client, request, options) {
41278
41481
  const parsed = safeParse(request, (value) => V2PermissionsDeletePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41279
41482
  if (!parsed.ok) {
41280
41483
  return [parsed, { status: "invalid" }];
@@ -41354,12 +41557,12 @@ var init_permissionsDeletePermission = __esm(() => {
41354
41557
  });
41355
41558
 
41356
41559
  // src/mcp-server/tools/permissionsDeletePermission.ts
41357
- var args25, tool$permissionsDeletePermission;
41560
+ var args26, tool$permissionsDeletePermission;
41358
41561
  var init_permissionsDeletePermission2 = __esm(() => {
41359
41562
  init_permissionsDeletePermission();
41360
41563
  init_components();
41361
41564
  init_tools();
41362
- args25 = {
41565
+ args26 = {
41363
41566
  request: V2PermissionsDeletePermissionRequestBody$inboundSchema
41364
41567
  };
41365
41568
  tool$permissionsDeletePermission = {
@@ -41375,9 +41578,9 @@ Remove a permission from your workspace. This also removes the permission from a
41375
41578
  Your root key must have the following permission:
41376
41579
  - \`rbac.*.delete_permission\`
41377
41580
  `,
41378
- args: args25,
41379
- tool: async (client, args26, ctx) => {
41380
- const [result, apiCall] = await permissionsDeletePermission(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41581
+ args: args26,
41582
+ tool: async (client, args27, ctx) => {
41583
+ const [result, apiCall] = await permissionsDeletePermission(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41381
41584
  if (!result.ok) {
41382
41585
  return {
41383
41586
  content: [{ type: "text", text: result.error.message }],
@@ -41392,9 +41595,9 @@ Your root key must have the following permission:
41392
41595
 
41393
41596
  // src/funcs/permissionsDeleteRole.ts
41394
41597
  function permissionsDeleteRole(client, request, options) {
41395
- return new APIPromise($do26(client, request, options));
41598
+ return new APIPromise($do27(client, request, options));
41396
41599
  }
41397
- async function $do26(client, request, options) {
41600
+ async function $do27(client, request, options) {
41398
41601
  const parsed = safeParse(request, (value) => V2PermissionsDeleteRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41399
41602
  if (!parsed.ok) {
41400
41603
  return [parsed, { status: "invalid" }];
@@ -41474,12 +41677,12 @@ var init_permissionsDeleteRole = __esm(() => {
41474
41677
  });
41475
41678
 
41476
41679
  // src/mcp-server/tools/permissionsDeleteRole.ts
41477
- var args26, tool$permissionsDeleteRole;
41680
+ var args27, tool$permissionsDeleteRole;
41478
41681
  var init_permissionsDeleteRole2 = __esm(() => {
41479
41682
  init_permissionsDeleteRole();
41480
41683
  init_components();
41481
41684
  init_tools();
41482
- args26 = {
41685
+ args27 = {
41483
41686
  request: V2PermissionsDeleteRoleRequestBody$inboundSchema
41484
41687
  };
41485
41688
  tool$permissionsDeleteRole = {
@@ -41495,9 +41698,9 @@ Remove a role from your workspace. This also removes the role from all assigned
41495
41698
  Your root key must have the following permission:
41496
41699
  - \`rbac.*.delete_role\`
41497
41700
  `,
41498
- args: args26,
41499
- tool: async (client, args27, ctx) => {
41500
- const [result, apiCall] = await permissionsDeleteRole(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41701
+ args: args27,
41702
+ tool: async (client, args28, ctx) => {
41703
+ const [result, apiCall] = await permissionsDeleteRole(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41501
41704
  if (!result.ok) {
41502
41705
  return {
41503
41706
  content: [{ type: "text", text: result.error.message }],
@@ -41512,9 +41715,9 @@ Your root key must have the following permission:
41512
41715
 
41513
41716
  // src/funcs/permissionsGetPermission.ts
41514
41717
  function permissionsGetPermission(client, request, options) {
41515
- return new APIPromise($do27(client, request, options));
41718
+ return new APIPromise($do28(client, request, options));
41516
41719
  }
41517
- async function $do27(client, request, options) {
41720
+ async function $do28(client, request, options) {
41518
41721
  const parsed = safeParse(request, (value) => V2PermissionsGetPermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
41519
41722
  if (!parsed.ok) {
41520
41723
  return [parsed, { status: "invalid" }];
@@ -41594,12 +41797,12 @@ var init_permissionsGetPermission = __esm(() => {
41594
41797
  });
41595
41798
 
41596
41799
  // src/mcp-server/tools/permissionsGetPermission.ts
41597
- var args27, tool$permissionsGetPermission;
41800
+ var args28, tool$permissionsGetPermission;
41598
41801
  var init_permissionsGetPermission2 = __esm(() => {
41599
41802
  init_permissionsGetPermission();
41600
41803
  init_components();
41601
41804
  init_tools();
41602
- args27 = {
41805
+ args28 = {
41603
41806
  request: V2PermissionsGetPermissionRequestBody$inboundSchema
41604
41807
  };
41605
41808
  tool$permissionsGetPermission = {
@@ -41613,9 +41816,9 @@ Retrieve details about a specific permission including its name, description, an
41613
41816
  Your root key must have the following permission:
41614
41817
  - \`rbac.*.read_permission\`
41615
41818
  `,
41616
- args: args27,
41617
- tool: async (client, args28, ctx) => {
41618
- const [result, apiCall] = await permissionsGetPermission(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41819
+ args: args28,
41820
+ tool: async (client, args29, ctx) => {
41821
+ const [result, apiCall] = await permissionsGetPermission(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41619
41822
  if (!result.ok) {
41620
41823
  return {
41621
41824
  content: [{ type: "text", text: result.error.message }],
@@ -41630,9 +41833,9 @@ Your root key must have the following permission:
41630
41833
 
41631
41834
  // src/funcs/permissionsGetRole.ts
41632
41835
  function permissionsGetRole(client, request, options) {
41633
- return new APIPromise($do28(client, request, options));
41836
+ return new APIPromise($do29(client, request, options));
41634
41837
  }
41635
- async function $do28(client, request, options) {
41838
+ async function $do29(client, request, options) {
41636
41839
  const parsed = safeParse(request, (value) => V2PermissionsGetRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
41637
41840
  if (!parsed.ok) {
41638
41841
  return [parsed, { status: "invalid" }];
@@ -41712,12 +41915,12 @@ var init_permissionsGetRole = __esm(() => {
41712
41915
  });
41713
41916
 
41714
41917
  // src/mcp-server/tools/permissionsGetRole.ts
41715
- var args28, tool$permissionsGetRole;
41918
+ var args29, tool$permissionsGetRole;
41716
41919
  var init_permissionsGetRole2 = __esm(() => {
41717
41920
  init_permissionsGetRole();
41718
41921
  init_components();
41719
41922
  init_tools();
41720
- args28 = {
41923
+ args29 = {
41721
41924
  request: V2PermissionsGetRoleRequestBody$inboundSchema
41722
41925
  };
41723
41926
  tool$permissionsGetRole = {
@@ -41731,9 +41934,9 @@ Retrieve details about a specific role including its assigned permissions.
41731
41934
  Your root key must have the following permission:
41732
41935
  - \`rbac.*.read_role\`
41733
41936
  `,
41734
- args: args28,
41735
- tool: async (client, args29, ctx) => {
41736
- const [result, apiCall] = await permissionsGetRole(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41937
+ args: args29,
41938
+ tool: async (client, args30, ctx) => {
41939
+ const [result, apiCall] = await permissionsGetRole(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41737
41940
  if (!result.ok) {
41738
41941
  return {
41739
41942
  content: [{ type: "text", text: result.error.message }],
@@ -41748,9 +41951,9 @@ Your root key must have the following permission:
41748
41951
 
41749
41952
  // src/funcs/permissionsListPermissions.ts
41750
41953
  function permissionsListPermissions(client, request, options) {
41751
- return new APIPromise($do29(client, request, options));
41954
+ return new APIPromise($do30(client, request, options));
41752
41955
  }
41753
- async function $do29(client, request, options) {
41956
+ async function $do30(client, request, options) {
41754
41957
  const parsed = safeParse(request, (value) => V2PermissionsListPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
41755
41958
  if (!parsed.ok) {
41756
41959
  return [parsed, { status: "invalid" }];
@@ -41830,28 +42033,29 @@ var init_permissionsListPermissions = __esm(() => {
41830
42033
  });
41831
42034
 
41832
42035
  // src/mcp-server/tools/permissionsListPermissions.ts
41833
- var args29, tool$permissionsListPermissions;
42036
+ var args30, tool$permissionsListPermissions;
41834
42037
  var init_permissionsListPermissions2 = __esm(() => {
41835
42038
  init_permissionsListPermissions();
41836
42039
  init_components();
41837
42040
  init_tools();
41838
- args29 = {
42041
+ args30 = {
41839
42042
  request: V2PermissionsListPermissionsRequestBody$inboundSchema
41840
42043
  };
41841
42044
  tool$permissionsListPermissions = {
41842
42045
  name: "permissions-list-permissions",
41843
42046
  description: `List permissions
41844
42047
 
41845
- Retrieve all permissions in your workspace. Results are paginated and sorted alphabetically by permission name.
42048
+ Retrieve all permissions in your workspace.
42049
+ Results are paginated and sorted by their id.
41846
42050
 
41847
42051
  **Required Permissions**
41848
42052
 
41849
42053
  Your root key must have the following permission:
41850
42054
  - \`rbac.*.read_permission\`
41851
42055
  `,
41852
- args: args29,
41853
- tool: async (client, args30, ctx) => {
41854
- const [result, apiCall] = await permissionsListPermissions(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42056
+ args: args30,
42057
+ tool: async (client, args31, ctx) => {
42058
+ const [result, apiCall] = await permissionsListPermissions(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41855
42059
  if (!result.ok) {
41856
42060
  return {
41857
42061
  content: [{ type: "text", text: result.error.message }],
@@ -41866,9 +42070,9 @@ Your root key must have the following permission:
41866
42070
 
41867
42071
  // src/funcs/permissionsListRoles.ts
41868
42072
  function permissionsListRoles(client, request, options) {
41869
- return new APIPromise($do30(client, request, options));
42073
+ return new APIPromise($do31(client, request, options));
41870
42074
  }
41871
- async function $do30(client, request, options) {
42075
+ async function $do31(client, request, options) {
41872
42076
  const parsed = safeParse(request, (value) => V2PermissionsListRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
41873
42077
  if (!parsed.ok) {
41874
42078
  return [parsed, { status: "invalid" }];
@@ -41948,28 +42152,29 @@ var init_permissionsListRoles = __esm(() => {
41948
42152
  });
41949
42153
 
41950
42154
  // src/mcp-server/tools/permissionsListRoles.ts
41951
- var args30, tool$permissionsListRoles;
42155
+ var args31, tool$permissionsListRoles;
41952
42156
  var init_permissionsListRoles2 = __esm(() => {
41953
42157
  init_permissionsListRoles();
41954
42158
  init_components();
41955
42159
  init_tools();
41956
- args30 = {
42160
+ args31 = {
41957
42161
  request: V2PermissionsListRolesRequestBody$inboundSchema
41958
42162
  };
41959
42163
  tool$permissionsListRoles = {
41960
42164
  name: "permissions-list-roles",
41961
42165
  description: `List roles
41962
42166
 
41963
- Retrieve all roles in your workspace including their assigned permissions. Results are paginated and sorted alphabetically by role name.
42167
+ Retrieve all roles in your workspace including their assigned permissions.
42168
+ Results are paginated and sorted by their id.
41964
42169
 
41965
42170
  **Required Permissions**
41966
42171
 
41967
42172
  Your root key must have the following permission:
41968
42173
  - \`rbac.*.read_role\`
41969
42174
  `,
41970
- args: args30,
41971
- tool: async (client, args31, ctx) => {
41972
- const [result, apiCall] = await permissionsListRoles(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42175
+ args: args31,
42176
+ tool: async (client, args32, ctx) => {
42177
+ const [result, apiCall] = await permissionsListRoles(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
41973
42178
  if (!result.ok) {
41974
42179
  return {
41975
42180
  content: [{ type: "text", text: result.error.message }],
@@ -41984,9 +42189,9 @@ Your root key must have the following permission:
41984
42189
 
41985
42190
  // src/funcs/ratelimitDeleteOverride.ts
41986
42191
  function ratelimitDeleteOverride(client, request, options) {
41987
- return new APIPromise($do31(client, request, options));
42192
+ return new APIPromise($do32(client, request, options));
41988
42193
  }
41989
- async function $do31(client, request, options) {
42194
+ async function $do32(client, request, options) {
41990
42195
  const parsed = safeParse(request, (value) => V2RatelimitDeleteOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
41991
42196
  if (!parsed.ok) {
41992
42197
  return [parsed, { status: "invalid" }];
@@ -42066,12 +42271,12 @@ var init_ratelimitDeleteOverride = __esm(() => {
42066
42271
  });
42067
42272
 
42068
42273
  // src/mcp-server/tools/ratelimitDeleteOverride.ts
42069
- var args31, tool$ratelimitDeleteOverride;
42274
+ var args32, tool$ratelimitDeleteOverride;
42070
42275
  var init_ratelimitDeleteOverride2 = __esm(() => {
42071
42276
  init_ratelimitDeleteOverride();
42072
42277
  init_components();
42073
42278
  init_tools();
42074
- args31 = {
42279
+ args32 = {
42075
42280
  request: V2RatelimitDeleteOverrideRequestBody$inboundSchema
42076
42281
  };
42077
42282
  tool$ratelimitDeleteOverride = {
@@ -42086,9 +42291,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
42086
42291
 
42087
42292
  **Permissions:** Requires \`ratelimit.*.delete_override\` or \`ratelimit.<namespace_id>.delete_override\`
42088
42293
  `,
42089
- args: args31,
42090
- tool: async (client, args32, ctx) => {
42091
- const [result, apiCall] = await ratelimitDeleteOverride(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42294
+ args: args32,
42295
+ tool: async (client, args33, ctx) => {
42296
+ const [result, apiCall] = await ratelimitDeleteOverride(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42092
42297
  if (!result.ok) {
42093
42298
  return {
42094
42299
  content: [{ type: "text", text: result.error.message }],
@@ -42103,9 +42308,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
42103
42308
 
42104
42309
  // src/funcs/ratelimitGetOverride.ts
42105
42310
  function ratelimitGetOverride(client, request, options) {
42106
- return new APIPromise($do32(client, request, options));
42311
+ return new APIPromise($do33(client, request, options));
42107
42312
  }
42108
- async function $do32(client, request, options) {
42313
+ async function $do33(client, request, options) {
42109
42314
  const parsed = safeParse(request, (value) => V2RatelimitGetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
42110
42315
  if (!parsed.ok) {
42111
42316
  return [parsed, { status: "invalid" }];
@@ -42185,12 +42390,12 @@ var init_ratelimitGetOverride = __esm(() => {
42185
42390
  });
42186
42391
 
42187
42392
  // src/mcp-server/tools/ratelimitGetOverride.ts
42188
- var args32, tool$ratelimitGetOverride;
42393
+ var args33, tool$ratelimitGetOverride;
42189
42394
  var init_ratelimitGetOverride2 = __esm(() => {
42190
42395
  init_ratelimitGetOverride();
42191
42396
  init_components();
42192
42397
  init_tools();
42193
- args32 = {
42398
+ args33 = {
42194
42399
  request: V2RatelimitGetOverrideRequestBody$inboundSchema
42195
42400
  };
42196
42401
  tool$ratelimitGetOverride = {
@@ -42205,9 +42410,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
42205
42410
 
42206
42411
  **Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
42207
42412
  `,
42208
- args: args32,
42209
- tool: async (client, args33, ctx) => {
42210
- const [result, apiCall] = await ratelimitGetOverride(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42413
+ args: args33,
42414
+ tool: async (client, args34, ctx) => {
42415
+ const [result, apiCall] = await ratelimitGetOverride(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42211
42416
  if (!result.ok) {
42212
42417
  return {
42213
42418
  content: [{ type: "text", text: result.error.message }],
@@ -42222,9 +42427,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
42222
42427
 
42223
42428
  // src/funcs/ratelimitLimit.ts
42224
42429
  function ratelimitLimit(client, request, options) {
42225
- return new APIPromise($do33(client, request, options));
42430
+ return new APIPromise($do34(client, request, options));
42226
42431
  }
42227
- async function $do33(client, request, options) {
42432
+ async function $do34(client, request, options) {
42228
42433
  const parsed = safeParse(request, (value) => V2RatelimitLimitRequestBody$outboundSchema.parse(value), "Input validation failed");
42229
42434
  if (!parsed.ok) {
42230
42435
  return [parsed, { status: "invalid" }];
@@ -42304,12 +42509,12 @@ var init_ratelimitLimit = __esm(() => {
42304
42509
  });
42305
42510
 
42306
42511
  // src/mcp-server/tools/ratelimitLimit.ts
42307
- var args33, tool$ratelimitLimit;
42512
+ var args34, tool$ratelimitLimit;
42308
42513
  var init_ratelimitLimit2 = __esm(() => {
42309
42514
  init_ratelimitLimit();
42310
42515
  init_components();
42311
42516
  init_tools();
42312
- args33 = {
42517
+ args34 = {
42313
42518
  request: V2RatelimitLimitRequestBody$inboundSchema
42314
42519
  };
42315
42520
  tool$ratelimitLimit = {
@@ -42332,9 +42537,9 @@ Your root key must have one of the following permissions:
42332
42537
 
42333
42538
  Records rate limit metrics for analytics and monitoring, updates rate limit counters with sliding window algorithm, and optionally triggers override matching for custom limits.
42334
42539
  `,
42335
- args: args33,
42336
- tool: async (client, args34, ctx) => {
42337
- const [result, apiCall] = await ratelimitLimit(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42540
+ args: args34,
42541
+ tool: async (client, args35, ctx) => {
42542
+ const [result, apiCall] = await ratelimitLimit(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42338
42543
  if (!result.ok) {
42339
42544
  return {
42340
42545
  content: [{ type: "text", text: result.error.message }],
@@ -42349,9 +42554,9 @@ Records rate limit metrics for analytics and monitoring, updates rate limit coun
42349
42554
 
42350
42555
  // src/funcs/ratelimitListOverrides.ts
42351
42556
  function ratelimitListOverrides(client, request, options) {
42352
- return new APIPromise($do34(client, request, options));
42557
+ return new APIPromise($do35(client, request, options));
42353
42558
  }
42354
- async function $do34(client, request, options) {
42559
+ async function $do35(client, request, options) {
42355
42560
  const parsed = safeParse(request, (value) => V2RatelimitListOverridesRequestBody$outboundSchema.parse(value), "Input validation failed");
42356
42561
  if (!parsed.ok) {
42357
42562
  return [parsed, { status: "invalid" }];
@@ -42431,12 +42636,12 @@ var init_ratelimitListOverrides = __esm(() => {
42431
42636
  });
42432
42637
 
42433
42638
  // src/mcp-server/tools/ratelimitListOverrides.ts
42434
- var args34, tool$ratelimitListOverrides;
42639
+ var args35, tool$ratelimitListOverrides;
42435
42640
  var init_ratelimitListOverrides2 = __esm(() => {
42436
42641
  init_ratelimitListOverrides();
42437
42642
  init_components();
42438
42643
  init_tools();
42439
- args34 = {
42644
+ args35 = {
42440
42645
  request: V2RatelimitListOverridesRequestBody$inboundSchema
42441
42646
  };
42442
42647
  tool$ratelimitListOverrides = {
@@ -42451,9 +42656,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
42451
42656
 
42452
42657
  **Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
42453
42658
  `,
42454
- args: args34,
42455
- tool: async (client, args35, ctx) => {
42456
- const [result, apiCall] = await ratelimitListOverrides(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42659
+ args: args35,
42660
+ tool: async (client, args36, ctx) => {
42661
+ const [result, apiCall] = await ratelimitListOverrides(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42457
42662
  if (!result.ok) {
42458
42663
  return {
42459
42664
  content: [{ type: "text", text: result.error.message }],
@@ -42468,9 +42673,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
42468
42673
 
42469
42674
  // src/funcs/ratelimitSetOverride.ts
42470
42675
  function ratelimitSetOverride(client, request, options) {
42471
- return new APIPromise($do35(client, request, options));
42676
+ return new APIPromise($do36(client, request, options));
42472
42677
  }
42473
- async function $do35(client, request, options) {
42678
+ async function $do36(client, request, options) {
42474
42679
  const parsed = safeParse(request, (value) => V2RatelimitSetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
42475
42680
  if (!parsed.ok) {
42476
42681
  return [parsed, { status: "invalid" }];
@@ -42550,12 +42755,12 @@ var init_ratelimitSetOverride = __esm(() => {
42550
42755
  });
42551
42756
 
42552
42757
  // src/mcp-server/tools/ratelimitSetOverride.ts
42553
- var args35, tool$ratelimitSetOverride;
42758
+ var args36, tool$ratelimitSetOverride;
42554
42759
  var init_ratelimitSetOverride2 = __esm(() => {
42555
42760
  init_ratelimitSetOverride();
42556
42761
  init_components();
42557
42762
  init_tools();
42558
- args35 = {
42763
+ args36 = {
42559
42764
  request: V2RatelimitSetOverrideRequestBody$inboundSchema
42560
42765
  };
42561
42766
  tool$ratelimitSetOverride = {
@@ -42570,9 +42775,9 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
42570
42775
 
42571
42776
  **Permissions:** Requires \`ratelimit.*.set_override\` or \`ratelimit.<namespace_id>.set_override\`
42572
42777
  `,
42573
- args: args35,
42574
- tool: async (client, args36, ctx) => {
42575
- const [result, apiCall] = await ratelimitSetOverride(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42778
+ args: args36,
42779
+ tool: async (client, args37, ctx) => {
42780
+ const [result, apiCall] = await ratelimitSetOverride(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
42576
42781
  if (!result.ok) {
42577
42782
  return {
42578
42783
  content: [{ type: "text", text: result.error.message }],
@@ -42589,7 +42794,7 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
42589
42794
  function createMCPServer(deps) {
42590
42795
  const server = new McpServer({
42591
42796
  name: "Unkey",
42592
- version: "2.0.3"
42797
+ version: "2.0.4"
42593
42798
  });
42594
42799
  const client = new UnkeyCore({
42595
42800
  rootKey: deps.rootKey,
@@ -42619,6 +42824,7 @@ function createMCPServer(deps) {
42619
42824
  tool(tool$keysGetKey);
42620
42825
  tool(tool$keysRemovePermissions);
42621
42826
  tool(tool$keysRemoveRoles);
42827
+ tool(tool$keysRerollKey);
42622
42828
  tool(tool$keysSetPermissions);
42623
42829
  tool(tool$keysSetRoles);
42624
42830
  tool(tool$keysUpdateCredits);
@@ -42661,6 +42867,7 @@ var init_server2 = __esm(() => {
42661
42867
  init_keysGetKey2();
42662
42868
  init_keysRemovePermissions2();
42663
42869
  init_keysRemoveRoles2();
42870
+ init_keysRerollKey2();
42664
42871
  init_keysSetPermissions2();
42665
42872
  init_keysSetRoles2();
42666
42873
  init_keysUpdateCredits2();
@@ -43875,7 +44082,7 @@ var routes = ln({
43875
44082
  var app = _e(routes, {
43876
44083
  name: "mcp",
43877
44084
  versionInfo: {
43878
- currentVersion: "2.0.3"
44085
+ currentVersion: "2.0.4"
43879
44086
  }
43880
44087
  });
43881
44088
  Yt(app, process3.argv.slice(2), buildContext(process3));
@@ -43883,5 +44090,5 @@ export {
43883
44090
  app
43884
44091
  };
43885
44092
 
43886
- //# debugId=3661F440CC19596D64756E2164756E21
44093
+ //# debugId=99890DFCB79E3EA364756E2164756E21
43887
44094
  //# sourceMappingURL=mcp-server.js.map