@unkey/api 2.0.3 → 2.0.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +6 -3
- package/bin/mcp-server.js +461 -157
- package/bin/mcp-server.js.map +31 -23
- package/dist/commonjs/funcs/identitiesListIdentities.js +3 -0
- package/dist/commonjs/funcs/identitiesListIdentities.js.map +1 -1
- package/dist/commonjs/funcs/keysRerollKey.d.ts +49 -0
- package/dist/commonjs/funcs/keysRerollKey.d.ts.map +1 -0
- package/dist/commonjs/funcs/keysRerollKey.js +159 -0
- package/dist/commonjs/funcs/keysRerollKey.js.map +1 -0
- package/dist/commonjs/funcs/permissionsListPermissions.d.ts +2 -1
- package/dist/commonjs/funcs/permissionsListPermissions.d.ts.map +1 -1
- package/dist/commonjs/funcs/permissionsListPermissions.js +2 -1
- package/dist/commonjs/funcs/permissionsListPermissions.js.map +1 -1
- package/dist/commonjs/funcs/permissionsListRoles.d.ts +2 -1
- package/dist/commonjs/funcs/permissionsListRoles.d.ts.map +1 -1
- package/dist/commonjs/funcs/permissionsListRoles.js +2 -1
- package/dist/commonjs/funcs/permissionsListRoles.js.map +1 -1
- package/dist/commonjs/funcs/ratelimitLimit.d.ts +2 -2
- package/dist/commonjs/funcs/ratelimitLimit.d.ts.map +1 -1
- package/dist/commonjs/funcs/ratelimitLimit.js +3 -3
- package/dist/commonjs/funcs/ratelimitLimit.js.map +1 -1
- package/dist/commonjs/lib/config.d.ts +3 -3
- package/dist/commonjs/lib/config.js +3 -3
- package/dist/commonjs/lib/security.d.ts.map +1 -1
- package/dist/commonjs/lib/security.js.map +1 -1
- package/dist/commonjs/mcp-server/mcp-server.js +1 -1
- package/dist/commonjs/mcp-server/server.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/server.js +3 -1
- package/dist/commonjs/mcp-server/server.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts +8 -0
- package/dist/commonjs/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
- package/dist/commonjs/mcp-server/tools/keysRerollKey.js +96 -0
- package/dist/commonjs/mcp-server/tools/keysRerollKey.js.map +1 -0
- package/dist/commonjs/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js +2 -1
- package/dist/commonjs/mcp-server/tools/permissionsListPermissions.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
- package/dist/commonjs/mcp-server/tools/permissionsListRoles.js +2 -1
- package/dist/commonjs/mcp-server/tools/permissionsListRoles.js.map +1 -1
- package/dist/commonjs/mcp-server/tools/ratelimitLimit.js +1 -1
- package/dist/commonjs/models/components/index.d.ts +5 -0
- package/dist/commonjs/models/components/index.d.ts.map +1 -1
- package/dist/commonjs/models/components/index.js +5 -0
- package/dist/commonjs/models/components/index.js.map +1 -1
- package/dist/commonjs/models/components/keycreditsrefill.d.ts +8 -8
- package/dist/commonjs/models/components/keycreditsrefill.d.ts.map +1 -1
- package/dist/commonjs/models/components/keycreditsrefill.js +13 -14
- package/dist/commonjs/models/components/keycreditsrefill.js.map +1 -1
- package/dist/commonjs/models/components/updatekeycreditsdata.d.ts +41 -0
- package/dist/commonjs/models/components/updatekeycreditsdata.d.ts.map +1 -0
- package/dist/commonjs/models/components/updatekeycreditsdata.js +72 -0
- package/dist/commonjs/models/components/updatekeycreditsdata.js.map +1 -0
- package/dist/commonjs/models/components/updatekeycreditsrefill.d.ts +81 -0
- package/dist/commonjs/models/components/updatekeycreditsrefill.d.ts.map +1 -0
- package/dist/commonjs/models/components/updatekeycreditsrefill.js +95 -0
- package/dist/commonjs/models/components/updatekeycreditsrefill.js.map +1 -0
- package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysaddrolesresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysremoverolesresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.js +71 -0
- package/dist/commonjs/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js +73 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js +71 -0
- package/dist/commonjs/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
- package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
- package/dist/commonjs/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keyssetrolesresponsebody.js.map +1 -1
- package/dist/commonjs/models/components/v2keysupdatekeyrequestbody.d.ts +3 -3
- package/dist/commonjs/models/components/v2keysupdatekeyrequestbody.d.ts.map +1 -1
- package/dist/commonjs/models/components/v2keysupdatekeyrequestbody.js +3 -3
- package/dist/commonjs/models/components/v2keysupdatekeyrequestbody.js.map +1 -1
- package/dist/commonjs/models/errors/goneerrorresponse.d.ts +72 -0
- package/dist/commonjs/models/errors/goneerrorresponse.d.ts.map +1 -0
- package/dist/commonjs/models/errors/goneerrorresponse.js +99 -0
- package/dist/commonjs/models/errors/goneerrorresponse.js.map +1 -0
- package/dist/commonjs/models/errors/index.d.ts +1 -0
- package/dist/commonjs/models/errors/index.d.ts.map +1 -1
- package/dist/commonjs/models/errors/index.js +1 -0
- package/dist/commonjs/models/errors/index.js.map +1 -1
- package/dist/commonjs/sdk/keys.d.ts +38 -0
- package/dist/commonjs/sdk/keys.d.ts.map +1 -1
- package/dist/commonjs/sdk/keys.js +41 -0
- package/dist/commonjs/sdk/keys.js.map +1 -1
- package/dist/commonjs/sdk/permissions.d.ts +4 -2
- package/dist/commonjs/sdk/permissions.d.ts.map +1 -1
- package/dist/commonjs/sdk/permissions.js +4 -2
- package/dist/commonjs/sdk/permissions.js.map +1 -1
- package/dist/commonjs/sdk/ratelimit.d.ts +1 -1
- package/dist/commonjs/sdk/ratelimit.js +1 -1
- package/dist/esm/funcs/identitiesListIdentities.js +3 -0
- package/dist/esm/funcs/identitiesListIdentities.js.map +1 -1
- package/dist/esm/funcs/keysRerollKey.d.ts +49 -0
- package/dist/esm/funcs/keysRerollKey.d.ts.map +1 -0
- package/dist/esm/funcs/keysRerollKey.js +123 -0
- package/dist/esm/funcs/keysRerollKey.js.map +1 -0
- package/dist/esm/funcs/permissionsListPermissions.d.ts +2 -1
- package/dist/esm/funcs/permissionsListPermissions.d.ts.map +1 -1
- package/dist/esm/funcs/permissionsListPermissions.js +2 -1
- package/dist/esm/funcs/permissionsListPermissions.js.map +1 -1
- package/dist/esm/funcs/permissionsListRoles.d.ts +2 -1
- package/dist/esm/funcs/permissionsListRoles.d.ts.map +1 -1
- package/dist/esm/funcs/permissionsListRoles.js +2 -1
- package/dist/esm/funcs/permissionsListRoles.js.map +1 -1
- package/dist/esm/funcs/ratelimitLimit.d.ts +2 -2
- package/dist/esm/funcs/ratelimitLimit.d.ts.map +1 -1
- package/dist/esm/funcs/ratelimitLimit.js +3 -3
- package/dist/esm/funcs/ratelimitLimit.js.map +1 -1
- package/dist/esm/lib/config.d.ts +3 -3
- package/dist/esm/lib/config.js +3 -3
- package/dist/esm/lib/security.d.ts.map +1 -1
- package/dist/esm/lib/security.js.map +1 -1
- package/dist/esm/mcp-server/mcp-server.js +1 -1
- package/dist/esm/mcp-server/server.d.ts.map +1 -1
- package/dist/esm/mcp-server/server.js +3 -1
- package/dist/esm/mcp-server/server.js.map +1 -1
- package/dist/esm/mcp-server/tools/keysRerollKey.d.ts +8 -0
- package/dist/esm/mcp-server/tools/keysRerollKey.d.ts.map +1 -0
- package/dist/esm/mcp-server/tools/keysRerollKey.js +60 -0
- package/dist/esm/mcp-server/tools/keysRerollKey.js.map +1 -0
- package/dist/esm/mcp-server/tools/permissionsListPermissions.d.ts.map +1 -1
- package/dist/esm/mcp-server/tools/permissionsListPermissions.js +2 -1
- package/dist/esm/mcp-server/tools/permissionsListPermissions.js.map +1 -1
- package/dist/esm/mcp-server/tools/permissionsListRoles.d.ts.map +1 -1
- package/dist/esm/mcp-server/tools/permissionsListRoles.js +2 -1
- package/dist/esm/mcp-server/tools/permissionsListRoles.js.map +1 -1
- package/dist/esm/mcp-server/tools/ratelimitLimit.js +1 -1
- package/dist/esm/models/components/index.d.ts +5 -0
- package/dist/esm/models/components/index.d.ts.map +1 -1
- package/dist/esm/models/components/index.js +5 -0
- package/dist/esm/models/components/index.js.map +1 -1
- package/dist/esm/models/components/keycreditsrefill.d.ts +8 -8
- package/dist/esm/models/components/keycreditsrefill.d.ts.map +1 -1
- package/dist/esm/models/components/keycreditsrefill.js +12 -13
- package/dist/esm/models/components/keycreditsrefill.js.map +1 -1
- package/dist/esm/models/components/updatekeycreditsdata.d.ts +41 -0
- package/dist/esm/models/components/updatekeycreditsdata.d.ts.map +1 -0
- package/dist/esm/models/components/updatekeycreditsdata.js +34 -0
- package/dist/esm/models/components/updatekeycreditsdata.js.map +1 -0
- package/dist/esm/models/components/updatekeycreditsrefill.d.ts +81 -0
- package/dist/esm/models/components/updatekeycreditsrefill.d.ts.map +1 -0
- package/dist/esm/models/components/updatekeycreditsrefill.js +57 -0
- package/dist/esm/models/components/updatekeycreditsrefill.js.map +1 -0
- package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keysaddpermissionsresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysaddpermissionsresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keysaddrolesresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysaddrolesresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keysremoverolesresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysremoverolesresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts +60 -0
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.js +33 -0
- package/dist/esm/models/components/v2keysrerollkeyrequestbody.js.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts +36 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.js +35 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsebody.js.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts +62 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.d.ts.map +1 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.js +33 -0
- package/dist/esm/models/components/v2keysrerollkeyresponsedata.js.map +1 -0
- package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keyssetpermissionsresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keyssetpermissionsresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts +0 -1
- package/dist/esm/models/components/v2keyssetrolesresponsebody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keyssetrolesresponsebody.js.map +1 -1
- package/dist/esm/models/components/v2keysupdatekeyrequestbody.d.ts +3 -3
- package/dist/esm/models/components/v2keysupdatekeyrequestbody.d.ts.map +1 -1
- package/dist/esm/models/components/v2keysupdatekeyrequestbody.js +3 -3
- package/dist/esm/models/components/v2keysupdatekeyrequestbody.js.map +1 -1
- package/dist/esm/models/errors/goneerrorresponse.d.ts +72 -0
- package/dist/esm/models/errors/goneerrorresponse.d.ts.map +1 -0
- package/dist/esm/models/errors/goneerrorresponse.js +62 -0
- package/dist/esm/models/errors/goneerrorresponse.js.map +1 -0
- package/dist/esm/models/errors/index.d.ts +1 -0
- package/dist/esm/models/errors/index.d.ts.map +1 -1
- package/dist/esm/models/errors/index.js +1 -0
- package/dist/esm/models/errors/index.js.map +1 -1
- package/dist/esm/sdk/keys.d.ts +38 -0
- package/dist/esm/sdk/keys.d.ts.map +1 -1
- package/dist/esm/sdk/keys.js +41 -0
- package/dist/esm/sdk/keys.js.map +1 -1
- package/dist/esm/sdk/permissions.d.ts +4 -2
- package/dist/esm/sdk/permissions.d.ts.map +1 -1
- package/dist/esm/sdk/permissions.js +4 -2
- package/dist/esm/sdk/permissions.js.map +1 -1
- package/dist/esm/sdk/ratelimit.d.ts +1 -1
- package/dist/esm/sdk/ratelimit.js +1 -1
- package/docs/sdks/keys/README.md +113 -0
- package/docs/sdks/permissions/README.md +4 -2
- package/docs/sdks/ratelimit/README.md +2 -1
- package/examples/apisCreateApi.example.ts +2 -2
- package/examples/package-lock.json +3 -3
- package/jsr.json +1 -1
- package/package.json +3 -3
- package/src/funcs/identitiesListIdentities.ts +3 -0
- package/src/funcs/keysRerollKey.ts +227 -0
- package/src/funcs/permissionsListPermissions.ts +2 -1
- package/src/funcs/permissionsListRoles.ts +2 -1
- package/src/funcs/ratelimitLimit.ts +6 -2
- package/src/lib/config.ts +3 -3
- package/src/lib/security.ts +4 -1
- package/src/mcp-server/mcp-server.ts +1 -1
- package/src/mcp-server/server.ts +3 -1
- package/src/mcp-server/tools/keysRerollKey.ts +69 -0
- package/src/mcp-server/tools/permissionsListPermissions.ts +2 -1
- package/src/mcp-server/tools/permissionsListRoles.ts +2 -1
- package/src/mcp-server/tools/ratelimitLimit.ts +1 -1
- package/src/models/components/index.ts +5 -0
- package/src/models/components/keycreditsrefill.ts +18 -14
- package/src/models/components/updatekeycreditsdata.ts +85 -0
- package/src/models/components/updatekeycreditsrefill.ts +126 -0
- package/src/models/components/v2keysaddpermissionsresponsebody.ts +0 -1
- package/src/models/components/v2keysaddrolesresponsebody.ts +0 -1
- package/src/models/components/v2keysremoverolesresponsebody.ts +0 -1
- package/src/models/components/v2keysrerollkeyrequestbody.ts +99 -0
- package/src/models/components/v2keysrerollkeyresponsebody.ts +87 -0
- package/src/models/components/v2keysrerollkeyresponsedata.ts +103 -0
- package/src/models/components/v2keyssetpermissionsresponsebody.ts +0 -1
- package/src/models/components/v2keyssetrolesresponsebody.ts +0 -1
- package/src/models/components/v2keysupdatekeyrequestbody.ts +10 -10
- package/src/models/errors/goneerrorresponse.ts +118 -0
- package/src/models/errors/index.ts +1 -0
- package/src/sdk/keys.ts +49 -0
- package/src/sdk/permissions.ts +4 -2
- package/src/sdk/ratelimit.ts +1 -1
package/bin/mcp-server.js
CHANGED
|
@@ -34269,9 +34269,9 @@ var init_config = __esm(() => {
|
|
|
34269
34269
|
SDK_METADATA = {
|
|
34270
34270
|
language: "typescript",
|
|
34271
34271
|
openapiDocVersion: "2.0.0",
|
|
34272
|
-
sdkVersion: "2.0.
|
|
34273
|
-
genVersion: "2.
|
|
34274
|
-
userAgent: "speakeasy-sdk/typescript 2.0.
|
|
34272
|
+
sdkVersion: "2.0.5",
|
|
34273
|
+
genVersion: "2.698.4",
|
|
34274
|
+
userAgent: "speakeasy-sdk/typescript 2.0.5 2.698.4 2.0.0 @unkey/api"
|
|
34275
34275
|
};
|
|
34276
34276
|
});
|
|
34277
34277
|
|
|
@@ -35837,26 +35837,26 @@ var init_identity = __esm(() => {
|
|
|
35837
35837
|
});
|
|
35838
35838
|
|
|
35839
35839
|
// src/models/components/keycreditsrefill.ts
|
|
35840
|
-
var
|
|
35840
|
+
var KeyCreditsRefillInterval, KeyCreditsRefillInterval$inboundSchema, KeyCreditsRefillInterval$outboundSchema, KeyCreditsRefillInterval$, KeyCreditsRefill$inboundSchema, KeyCreditsRefill$outboundSchema, KeyCreditsRefill$;
|
|
35841
35841
|
var init_keycreditsrefill = __esm(() => {
|
|
35842
35842
|
init_zod();
|
|
35843
|
-
|
|
35843
|
+
KeyCreditsRefillInterval = {
|
|
35844
35844
|
Daily: "daily",
|
|
35845
35845
|
Monthly: "monthly"
|
|
35846
35846
|
};
|
|
35847
|
-
|
|
35848
|
-
|
|
35849
|
-
((
|
|
35850
|
-
|
|
35851
|
-
|
|
35852
|
-
})(
|
|
35847
|
+
KeyCreditsRefillInterval$inboundSchema = nativeEnumType(KeyCreditsRefillInterval);
|
|
35848
|
+
KeyCreditsRefillInterval$outboundSchema = KeyCreditsRefillInterval$inboundSchema;
|
|
35849
|
+
((KeyCreditsRefillInterval$) => {
|
|
35850
|
+
KeyCreditsRefillInterval$.inboundSchema = KeyCreditsRefillInterval$inboundSchema;
|
|
35851
|
+
KeyCreditsRefillInterval$.outboundSchema = KeyCreditsRefillInterval$outboundSchema;
|
|
35852
|
+
})(KeyCreditsRefillInterval$ ||= {});
|
|
35853
35853
|
KeyCreditsRefill$inboundSchema = objectType({
|
|
35854
|
-
interval:
|
|
35854
|
+
interval: KeyCreditsRefillInterval$inboundSchema,
|
|
35855
35855
|
amount: numberType().int(),
|
|
35856
35856
|
refillDay: numberType().int().optional()
|
|
35857
35857
|
});
|
|
35858
35858
|
KeyCreditsRefill$outboundSchema = objectType({
|
|
35859
|
-
interval:
|
|
35859
|
+
interval: KeyCreditsRefillInterval$outboundSchema,
|
|
35860
35860
|
amount: numberType().int(),
|
|
35861
35861
|
refillDay: numberType().int().optional()
|
|
35862
35862
|
});
|
|
@@ -36107,6 +36107,55 @@ var init_security2 = __esm(() => {
|
|
|
36107
36107
|
})(Security$ ||= {});
|
|
36108
36108
|
});
|
|
36109
36109
|
|
|
36110
|
+
// src/models/components/updatekeycreditsrefill.ts
|
|
36111
|
+
var UpdateKeyCreditsRefillInterval, UpdateKeyCreditsRefillInterval$inboundSchema, UpdateKeyCreditsRefillInterval$outboundSchema, UpdateKeyCreditsRefillInterval$, UpdateKeyCreditsRefill$inboundSchema, UpdateKeyCreditsRefill$outboundSchema, UpdateKeyCreditsRefill$;
|
|
36112
|
+
var init_updatekeycreditsrefill = __esm(() => {
|
|
36113
|
+
init_zod();
|
|
36114
|
+
UpdateKeyCreditsRefillInterval = {
|
|
36115
|
+
Daily: "daily",
|
|
36116
|
+
Monthly: "monthly"
|
|
36117
|
+
};
|
|
36118
|
+
UpdateKeyCreditsRefillInterval$inboundSchema = nativeEnumType(UpdateKeyCreditsRefillInterval);
|
|
36119
|
+
UpdateKeyCreditsRefillInterval$outboundSchema = UpdateKeyCreditsRefillInterval$inboundSchema;
|
|
36120
|
+
((UpdateKeyCreditsRefillInterval$) => {
|
|
36121
|
+
UpdateKeyCreditsRefillInterval$.inboundSchema = UpdateKeyCreditsRefillInterval$inboundSchema;
|
|
36122
|
+
UpdateKeyCreditsRefillInterval$.outboundSchema = UpdateKeyCreditsRefillInterval$outboundSchema;
|
|
36123
|
+
})(UpdateKeyCreditsRefillInterval$ ||= {});
|
|
36124
|
+
UpdateKeyCreditsRefill$inboundSchema = objectType({
|
|
36125
|
+
interval: UpdateKeyCreditsRefillInterval$inboundSchema,
|
|
36126
|
+
amount: numberType().int(),
|
|
36127
|
+
refillDay: numberType().int().optional()
|
|
36128
|
+
});
|
|
36129
|
+
UpdateKeyCreditsRefill$outboundSchema = objectType({
|
|
36130
|
+
interval: UpdateKeyCreditsRefillInterval$outboundSchema,
|
|
36131
|
+
amount: numberType().int(),
|
|
36132
|
+
refillDay: numberType().int().optional()
|
|
36133
|
+
});
|
|
36134
|
+
((UpdateKeyCreditsRefill$) => {
|
|
36135
|
+
UpdateKeyCreditsRefill$.inboundSchema = UpdateKeyCreditsRefill$inboundSchema;
|
|
36136
|
+
UpdateKeyCreditsRefill$.outboundSchema = UpdateKeyCreditsRefill$outboundSchema;
|
|
36137
|
+
})(UpdateKeyCreditsRefill$ ||= {});
|
|
36138
|
+
});
|
|
36139
|
+
|
|
36140
|
+
// src/models/components/updatekeycreditsdata.ts
|
|
36141
|
+
var UpdateKeyCreditsData$inboundSchema, UpdateKeyCreditsData$outboundSchema, UpdateKeyCreditsData$;
|
|
36142
|
+
var init_updatekeycreditsdata = __esm(() => {
|
|
36143
|
+
init_zod();
|
|
36144
|
+
init_updatekeycreditsrefill();
|
|
36145
|
+
UpdateKeyCreditsData$inboundSchema = objectType({
|
|
36146
|
+
remaining: nullableType(numberType().int()).optional(),
|
|
36147
|
+
refill: nullableType(UpdateKeyCreditsRefill$inboundSchema).optional()
|
|
36148
|
+
});
|
|
36149
|
+
UpdateKeyCreditsData$outboundSchema = objectType({
|
|
36150
|
+
remaining: nullableType(numberType().int()).optional(),
|
|
36151
|
+
refill: nullableType(UpdateKeyCreditsRefill$outboundSchema).optional()
|
|
36152
|
+
});
|
|
36153
|
+
((UpdateKeyCreditsData$) => {
|
|
36154
|
+
UpdateKeyCreditsData$.inboundSchema = UpdateKeyCreditsData$inboundSchema;
|
|
36155
|
+
UpdateKeyCreditsData$.outboundSchema = UpdateKeyCreditsData$outboundSchema;
|
|
36156
|
+
})(UpdateKeyCreditsData$ ||= {});
|
|
36157
|
+
});
|
|
36158
|
+
|
|
36110
36159
|
// src/models/components/v2apiscreateapirequestbody.ts
|
|
36111
36160
|
var V2ApisCreateApiRequestBody$inboundSchema, V2ApisCreateApiRequestBody$outboundSchema, V2ApisCreateApiRequestBody$;
|
|
36112
36161
|
var init_v2apiscreateapirequestbody = __esm(() => {
|
|
@@ -36814,6 +36863,62 @@ var init_v2keysremoverolesresponsebody = __esm(() => {
|
|
|
36814
36863
|
})(V2KeysRemoveRolesResponseBody$ ||= {});
|
|
36815
36864
|
});
|
|
36816
36865
|
|
|
36866
|
+
// src/models/components/v2keysrerollkeyrequestbody.ts
|
|
36867
|
+
var V2KeysRerollKeyRequestBody$inboundSchema, V2KeysRerollKeyRequestBody$outboundSchema, V2KeysRerollKeyRequestBody$;
|
|
36868
|
+
var init_v2keysrerollkeyrequestbody = __esm(() => {
|
|
36869
|
+
init_zod();
|
|
36870
|
+
V2KeysRerollKeyRequestBody$inboundSchema = objectType({
|
|
36871
|
+
keyId: stringType(),
|
|
36872
|
+
expiration: numberType().int()
|
|
36873
|
+
});
|
|
36874
|
+
V2KeysRerollKeyRequestBody$outboundSchema = objectType({
|
|
36875
|
+
keyId: stringType(),
|
|
36876
|
+
expiration: numberType().int()
|
|
36877
|
+
});
|
|
36878
|
+
((V2KeysRerollKeyRequestBody$) => {
|
|
36879
|
+
V2KeysRerollKeyRequestBody$.inboundSchema = V2KeysRerollKeyRequestBody$inboundSchema;
|
|
36880
|
+
V2KeysRerollKeyRequestBody$.outboundSchema = V2KeysRerollKeyRequestBody$outboundSchema;
|
|
36881
|
+
})(V2KeysRerollKeyRequestBody$ ||= {});
|
|
36882
|
+
});
|
|
36883
|
+
|
|
36884
|
+
// src/models/components/v2keysrerollkeyresponsedata.ts
|
|
36885
|
+
var V2KeysRerollKeyResponseData$inboundSchema, V2KeysRerollKeyResponseData$outboundSchema, V2KeysRerollKeyResponseData$;
|
|
36886
|
+
var init_v2keysrerollkeyresponsedata = __esm(() => {
|
|
36887
|
+
init_zod();
|
|
36888
|
+
V2KeysRerollKeyResponseData$inboundSchema = objectType({
|
|
36889
|
+
keyId: stringType(),
|
|
36890
|
+
key: stringType()
|
|
36891
|
+
});
|
|
36892
|
+
V2KeysRerollKeyResponseData$outboundSchema = objectType({
|
|
36893
|
+
keyId: stringType(),
|
|
36894
|
+
key: stringType()
|
|
36895
|
+
});
|
|
36896
|
+
((V2KeysRerollKeyResponseData$) => {
|
|
36897
|
+
V2KeysRerollKeyResponseData$.inboundSchema = V2KeysRerollKeyResponseData$inboundSchema;
|
|
36898
|
+
V2KeysRerollKeyResponseData$.outboundSchema = V2KeysRerollKeyResponseData$outboundSchema;
|
|
36899
|
+
})(V2KeysRerollKeyResponseData$ ||= {});
|
|
36900
|
+
});
|
|
36901
|
+
|
|
36902
|
+
// src/models/components/v2keysrerollkeyresponsebody.ts
|
|
36903
|
+
var V2KeysRerollKeyResponseBody$inboundSchema, V2KeysRerollKeyResponseBody$outboundSchema, V2KeysRerollKeyResponseBody$;
|
|
36904
|
+
var init_v2keysrerollkeyresponsebody = __esm(() => {
|
|
36905
|
+
init_zod();
|
|
36906
|
+
init_meta();
|
|
36907
|
+
init_v2keysrerollkeyresponsedata();
|
|
36908
|
+
V2KeysRerollKeyResponseBody$inboundSchema = objectType({
|
|
36909
|
+
meta: Meta$inboundSchema,
|
|
36910
|
+
data: V2KeysRerollKeyResponseData$inboundSchema
|
|
36911
|
+
});
|
|
36912
|
+
V2KeysRerollKeyResponseBody$outboundSchema = objectType({
|
|
36913
|
+
meta: Meta$outboundSchema,
|
|
36914
|
+
data: V2KeysRerollKeyResponseData$outboundSchema
|
|
36915
|
+
});
|
|
36916
|
+
((V2KeysRerollKeyResponseBody$) => {
|
|
36917
|
+
V2KeysRerollKeyResponseBody$.inboundSchema = V2KeysRerollKeyResponseBody$inboundSchema;
|
|
36918
|
+
V2KeysRerollKeyResponseBody$.outboundSchema = V2KeysRerollKeyResponseBody$outboundSchema;
|
|
36919
|
+
})(V2KeysRerollKeyResponseBody$ ||= {});
|
|
36920
|
+
});
|
|
36921
|
+
|
|
36817
36922
|
// src/models/components/v2keyssetpermissionsrequestbody.ts
|
|
36818
36923
|
var V2KeysSetPermissionsRequestBody$inboundSchema, V2KeysSetPermissionsRequestBody$outboundSchema, V2KeysSetPermissionsRequestBody$;
|
|
36819
36924
|
var init_v2keyssetpermissionsrequestbody = __esm(() => {
|
|
@@ -36945,15 +37050,15 @@ var init_v2keysupdatecreditsresponsebody = __esm(() => {
|
|
|
36945
37050
|
var V2KeysUpdateKeyRequestBody$inboundSchema, V2KeysUpdateKeyRequestBody$outboundSchema, V2KeysUpdateKeyRequestBody$;
|
|
36946
37051
|
var init_v2keysupdatekeyrequestbody = __esm(() => {
|
|
36947
37052
|
init_zod();
|
|
36948
|
-
init_keycreditsdata();
|
|
36949
37053
|
init_ratelimitrequest();
|
|
37054
|
+
init_updatekeycreditsdata();
|
|
36950
37055
|
V2KeysUpdateKeyRequestBody$inboundSchema = objectType({
|
|
36951
37056
|
keyId: stringType(),
|
|
36952
37057
|
name: nullableType(stringType()).optional(),
|
|
36953
37058
|
externalId: nullableType(stringType()).optional(),
|
|
36954
37059
|
meta: nullableType(recordType(anyType())).optional(),
|
|
36955
37060
|
expires: nullableType(numberType().int()).optional(),
|
|
36956
|
-
credits:
|
|
37061
|
+
credits: nullableType(UpdateKeyCreditsData$inboundSchema).optional(),
|
|
36957
37062
|
ratelimits: arrayType(RatelimitRequest$inboundSchema).optional(),
|
|
36958
37063
|
enabled: booleanType().optional(),
|
|
36959
37064
|
roles: arrayType(stringType()).optional(),
|
|
@@ -36965,7 +37070,7 @@ var init_v2keysupdatekeyrequestbody = __esm(() => {
|
|
|
36965
37070
|
externalId: nullableType(stringType()).optional(),
|
|
36966
37071
|
meta: nullableType(recordType(anyType())).optional(),
|
|
36967
37072
|
expires: nullableType(numberType().int()).optional(),
|
|
36968
|
-
credits:
|
|
37073
|
+
credits: nullableType(UpdateKeyCreditsData$outboundSchema).optional(),
|
|
36969
37074
|
ratelimits: arrayType(RatelimitRequest$outboundSchema).optional(),
|
|
36970
37075
|
enabled: booleanType().optional(),
|
|
36971
37076
|
roles: arrayType(stringType()).optional(),
|
|
@@ -37778,6 +37883,8 @@ var init_components = __esm(() => {
|
|
|
37778
37883
|
init_ratelimitresponse();
|
|
37779
37884
|
init_role();
|
|
37780
37885
|
init_security2();
|
|
37886
|
+
init_updatekeycreditsdata();
|
|
37887
|
+
init_updatekeycreditsrefill();
|
|
37781
37888
|
init_v2apiscreateapirequestbody();
|
|
37782
37889
|
init_v2apiscreateapiresponsebody();
|
|
37783
37890
|
init_v2apiscreateapiresponsedata();
|
|
@@ -37814,6 +37921,9 @@ var init_components = __esm(() => {
|
|
|
37814
37921
|
init_v2keysremovepermissionsresponsebody();
|
|
37815
37922
|
init_v2keysremoverolesrequestbody();
|
|
37816
37923
|
init_v2keysremoverolesresponsebody();
|
|
37924
|
+
init_v2keysrerollkeyrequestbody();
|
|
37925
|
+
init_v2keysrerollkeyresponsebody();
|
|
37926
|
+
init_v2keysrerollkeyresponsedata();
|
|
37817
37927
|
init_v2keyssetpermissionsrequestbody();
|
|
37818
37928
|
init_v2keyssetpermissionsresponsebody();
|
|
37819
37929
|
init_v2keyssetrolesrequestbody();
|
|
@@ -37988,6 +38098,48 @@ var init_forbiddenerrorresponse = __esm(() => {
|
|
|
37988
38098
|
})(ForbiddenErrorResponse$ ||= {});
|
|
37989
38099
|
});
|
|
37990
38100
|
|
|
38101
|
+
// src/models/errors/goneerrorresponse.ts
|
|
38102
|
+
var GoneErrorResponse, GoneErrorResponse$inboundSchema, GoneErrorResponse$outboundSchema, GoneErrorResponse$;
|
|
38103
|
+
var init_goneerrorresponse = __esm(() => {
|
|
38104
|
+
init_zod();
|
|
38105
|
+
init_components();
|
|
38106
|
+
init_unkeyerror();
|
|
38107
|
+
GoneErrorResponse = class GoneErrorResponse extends UnkeyError {
|
|
38108
|
+
meta;
|
|
38109
|
+
error;
|
|
38110
|
+
data$;
|
|
38111
|
+
constructor(err, httpMeta) {
|
|
38112
|
+
const message = "message" in err && typeof err.message === "string" ? err.message : `API error occurred: ${JSON.stringify(err)}`;
|
|
38113
|
+
super(message, httpMeta);
|
|
38114
|
+
this.data$ = err;
|
|
38115
|
+
this.meta = err.meta;
|
|
38116
|
+
this.error = err.error;
|
|
38117
|
+
this.name = "GoneErrorResponse";
|
|
38118
|
+
}
|
|
38119
|
+
};
|
|
38120
|
+
GoneErrorResponse$inboundSchema = objectType({
|
|
38121
|
+
meta: Meta$inboundSchema,
|
|
38122
|
+
error: BaseError$inboundSchema,
|
|
38123
|
+
request$: instanceOfType(Request),
|
|
38124
|
+
response$: instanceOfType(Response),
|
|
38125
|
+
body$: stringType()
|
|
38126
|
+
}).transform((v2) => {
|
|
38127
|
+
return new GoneErrorResponse(v2, {
|
|
38128
|
+
request: v2.request$,
|
|
38129
|
+
response: v2.response$,
|
|
38130
|
+
body: v2.body$
|
|
38131
|
+
});
|
|
38132
|
+
});
|
|
38133
|
+
GoneErrorResponse$outboundSchema = instanceOfType(GoneErrorResponse).transform((v2) => v2.data$).pipe(objectType({
|
|
38134
|
+
meta: Meta$outboundSchema,
|
|
38135
|
+
error: BaseError$outboundSchema
|
|
38136
|
+
}));
|
|
38137
|
+
((GoneErrorResponse$) => {
|
|
38138
|
+
GoneErrorResponse$.inboundSchema = GoneErrorResponse$inboundSchema;
|
|
38139
|
+
GoneErrorResponse$.outboundSchema = GoneErrorResponse$outboundSchema;
|
|
38140
|
+
})(GoneErrorResponse$ ||= {});
|
|
38141
|
+
});
|
|
38142
|
+
|
|
37991
38143
|
// src/models/errors/internalservererrorresponse.ts
|
|
37992
38144
|
var InternalServerErrorResponse, InternalServerErrorResponse$inboundSchema, InternalServerErrorResponse$outboundSchema, InternalServerErrorResponse$;
|
|
37993
38145
|
var init_internalservererrorresponse = __esm(() => {
|
|
@@ -38162,6 +38314,7 @@ var init_errors2 = __esm(() => {
|
|
|
38162
38314
|
init_badrequesterrorresponse();
|
|
38163
38315
|
init_conflicterrorresponse();
|
|
38164
38316
|
init_forbiddenerrorresponse();
|
|
38317
|
+
init_goneerrorresponse();
|
|
38165
38318
|
init_httpclienterrors();
|
|
38166
38319
|
init_internalservererrorresponse();
|
|
38167
38320
|
init_notfounderrorresponse();
|
|
@@ -39203,6 +39356,9 @@ async function $do8(client, request, options) {
|
|
|
39203
39356
|
if (typeof nextCursor !== "string") {
|
|
39204
39357
|
return { next: () => null };
|
|
39205
39358
|
}
|
|
39359
|
+
if (nextCursor.trim() === "") {
|
|
39360
|
+
return { next: () => null };
|
|
39361
|
+
}
|
|
39206
39362
|
const nextVal = () => identitiesListIdentities(client, {
|
|
39207
39363
|
...request,
|
|
39208
39364
|
cursor: nextCursor
|
|
@@ -40269,11 +40425,155 @@ Invalidates the key cache for immediate effect, and makes role changes available
|
|
|
40269
40425
|
};
|
|
40270
40426
|
});
|
|
40271
40427
|
|
|
40272
|
-
// src/funcs/
|
|
40273
|
-
function
|
|
40428
|
+
// src/funcs/keysRerollKey.ts
|
|
40429
|
+
function keysRerollKey(client, request, options) {
|
|
40274
40430
|
return new APIPromise($do17(client, request, options));
|
|
40275
40431
|
}
|
|
40276
40432
|
async function $do17(client, request, options) {
|
|
40433
|
+
const parsed = safeParse(request, (value) => V2KeysRerollKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40434
|
+
if (!parsed.ok) {
|
|
40435
|
+
return [parsed, { status: "invalid" }];
|
|
40436
|
+
}
|
|
40437
|
+
const payload = parsed.value;
|
|
40438
|
+
const body = encodeJSON("body", payload, { explode: true });
|
|
40439
|
+
const path = pathToFunc("/v2/keys.rerollKey")();
|
|
40440
|
+
const headers = new Headers(compactMap({
|
|
40441
|
+
"Content-Type": "application/json",
|
|
40442
|
+
Accept: "application/json"
|
|
40443
|
+
}));
|
|
40444
|
+
const secConfig = await extractSecurity(client._options.rootKey);
|
|
40445
|
+
const securityInput = secConfig == null ? {} : { rootKey: secConfig };
|
|
40446
|
+
const requestSecurity = resolveGlobalSecurity(securityInput);
|
|
40447
|
+
const context = {
|
|
40448
|
+
options: client._options,
|
|
40449
|
+
baseURL: options?.serverURL ?? client._baseURL ?? "",
|
|
40450
|
+
operationID: "rerollKey",
|
|
40451
|
+
oAuth2Scopes: [],
|
|
40452
|
+
resolvedSecurity: requestSecurity,
|
|
40453
|
+
securitySource: client._options.rootKey,
|
|
40454
|
+
retryConfig: options?.retries || client._options.retryConfig || {
|
|
40455
|
+
strategy: "backoff",
|
|
40456
|
+
backoff: {
|
|
40457
|
+
initialInterval: 50,
|
|
40458
|
+
maxInterval: 1000,
|
|
40459
|
+
exponent: 1.5,
|
|
40460
|
+
maxElapsedTime: 1e4
|
|
40461
|
+
},
|
|
40462
|
+
retryConnectionErrors: true
|
|
40463
|
+
},
|
|
40464
|
+
retryCodes: options?.retryCodes || ["5XX"]
|
|
40465
|
+
};
|
|
40466
|
+
const requestRes = client._createRequest(context, {
|
|
40467
|
+
security: requestSecurity,
|
|
40468
|
+
method: "POST",
|
|
40469
|
+
baseURL: options?.serverURL,
|
|
40470
|
+
path,
|
|
40471
|
+
headers,
|
|
40472
|
+
body,
|
|
40473
|
+
userAgent: client._options.userAgent,
|
|
40474
|
+
timeoutMs: options?.timeoutMs || client._options.timeoutMs || -1
|
|
40475
|
+
}, options);
|
|
40476
|
+
if (!requestRes.ok) {
|
|
40477
|
+
return [requestRes, { status: "invalid" }];
|
|
40478
|
+
}
|
|
40479
|
+
const req = requestRes.value;
|
|
40480
|
+
const doResult = await client._do(req, {
|
|
40481
|
+
context,
|
|
40482
|
+
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
40483
|
+
retryConfig: context.retryConfig,
|
|
40484
|
+
retryCodes: context.retryCodes
|
|
40485
|
+
});
|
|
40486
|
+
if (!doResult.ok) {
|
|
40487
|
+
return [doResult, { status: "request-error", request: req }];
|
|
40488
|
+
}
|
|
40489
|
+
const response = doResult.value;
|
|
40490
|
+
const responseFields = {
|
|
40491
|
+
HttpMeta: { Response: response, Request: req }
|
|
40492
|
+
};
|
|
40493
|
+
const [result] = await match(json(200, V2KeysRerollKeyResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
|
|
40494
|
+
if (!result.ok) {
|
|
40495
|
+
return [result, { status: "complete", request: req, response }];
|
|
40496
|
+
}
|
|
40497
|
+
return [result, { status: "complete", request: req, response }];
|
|
40498
|
+
}
|
|
40499
|
+
var init_keysRerollKey = __esm(() => {
|
|
40500
|
+
init_encodings();
|
|
40501
|
+
init_matchers();
|
|
40502
|
+
init_primitives();
|
|
40503
|
+
init_schemas();
|
|
40504
|
+
init_security();
|
|
40505
|
+
init_url();
|
|
40506
|
+
init_components();
|
|
40507
|
+
init_errors2();
|
|
40508
|
+
init_async();
|
|
40509
|
+
});
|
|
40510
|
+
|
|
40511
|
+
// src/mcp-server/tools/keysRerollKey.ts
|
|
40512
|
+
var args17, tool$keysRerollKey;
|
|
40513
|
+
var init_keysRerollKey2 = __esm(() => {
|
|
40514
|
+
init_keysRerollKey();
|
|
40515
|
+
init_components();
|
|
40516
|
+
init_tools();
|
|
40517
|
+
args17 = {
|
|
40518
|
+
request: V2KeysRerollKeyRequestBody$inboundSchema
|
|
40519
|
+
};
|
|
40520
|
+
tool$keysRerollKey = {
|
|
40521
|
+
name: "keys-reroll-key",
|
|
40522
|
+
description: `Reroll Key
|
|
40523
|
+
|
|
40524
|
+
Generate a new API key while preserving the configuration from an existing key.
|
|
40525
|
+
|
|
40526
|
+
This operation creates a fresh key with a new token while maintaining all settings from the original key:
|
|
40527
|
+
- Permissions and roles
|
|
40528
|
+
- Custom metadata
|
|
40529
|
+
- Rate limit configurations
|
|
40530
|
+
- Identity associations
|
|
40531
|
+
- Remaining credits
|
|
40532
|
+
- Recovery settings
|
|
40533
|
+
|
|
40534
|
+
**Key Generation:**
|
|
40535
|
+
- The system attempts to extract the prefix from the original key
|
|
40536
|
+
- If prefix extraction fails, the default API prefix is used
|
|
40537
|
+
- Key length follows the API's default byte configuration (or 16 bytes if not specified)
|
|
40538
|
+
|
|
40539
|
+
**Original Key Handling:**
|
|
40540
|
+
- The original key will be revoked after the duration specified in \`expiration\`
|
|
40541
|
+
- Set \`expiration\` to 0 to revoke immediately
|
|
40542
|
+
- This allows for graceful key rotation with an overlap period
|
|
40543
|
+
|
|
40544
|
+
Common use cases include:
|
|
40545
|
+
- Rotating keys for security compliance
|
|
40546
|
+
- Issuing replacement keys for compromised credentials
|
|
40547
|
+
- Creating backup keys with identical permissions
|
|
40548
|
+
|
|
40549
|
+
**Important:** Analytics and usage metrics are tracked at both the key level AND identity level. If the original key has an identity, the new key will inherit it, allowing you to track usage across both individual keys and the overall identity.
|
|
40550
|
+
|
|
40551
|
+
**Required Permissions**
|
|
40552
|
+
|
|
40553
|
+
Your root key must have:
|
|
40554
|
+
- \`api.*.create_key\` or \`api.<api_id>.create_key\`
|
|
40555
|
+
- \`api.*.encrypt_key\` or \`api.<api_id>.encrypt_key\` (only when the original key is recoverable)
|
|
40556
|
+
`,
|
|
40557
|
+
args: args17,
|
|
40558
|
+
tool: async (client, args18, ctx) => {
|
|
40559
|
+
const [result, apiCall] = await keysRerollKey(client, args18.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40560
|
+
if (!result.ok) {
|
|
40561
|
+
return {
|
|
40562
|
+
content: [{ type: "text", text: result.error.message }],
|
|
40563
|
+
isError: true
|
|
40564
|
+
};
|
|
40565
|
+
}
|
|
40566
|
+
const value = result.value;
|
|
40567
|
+
return formatResult(value, apiCall);
|
|
40568
|
+
}
|
|
40569
|
+
};
|
|
40570
|
+
});
|
|
40571
|
+
|
|
40572
|
+
// src/funcs/keysSetPermissions.ts
|
|
40573
|
+
function keysSetPermissions(client, request, options) {
|
|
40574
|
+
return new APIPromise($do18(client, request, options));
|
|
40575
|
+
}
|
|
40576
|
+
async function $do18(client, request, options) {
|
|
40277
40577
|
const parsed = safeParse(request, (value) => V2KeysSetPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40278
40578
|
if (!parsed.ok) {
|
|
40279
40579
|
return [parsed, { status: "invalid" }];
|
|
@@ -40353,12 +40653,12 @@ var init_keysSetPermissions = __esm(() => {
|
|
|
40353
40653
|
});
|
|
40354
40654
|
|
|
40355
40655
|
// src/mcp-server/tools/keysSetPermissions.ts
|
|
40356
|
-
var
|
|
40656
|
+
var args18, tool$keysSetPermissions;
|
|
40357
40657
|
var init_keysSetPermissions2 = __esm(() => {
|
|
40358
40658
|
init_keysSetPermissions();
|
|
40359
40659
|
init_components();
|
|
40360
40660
|
init_tools();
|
|
40361
|
-
|
|
40661
|
+
args18 = {
|
|
40362
40662
|
request: V2KeysSetPermissionsRequestBody$inboundSchema
|
|
40363
40663
|
};
|
|
40364
40664
|
tool$keysSetPermissions = {
|
|
@@ -40381,9 +40681,9 @@ Your root key must have one of the following permissions:
|
|
|
40381
40681
|
|
|
40382
40682
|
Invalidates the key cache for immediate effect, and makes permission changes available for verification within 30 seconds across all regions.
|
|
40383
40683
|
`,
|
|
40384
|
-
args:
|
|
40385
|
-
tool: async (client,
|
|
40386
|
-
const [result, apiCall] = await keysSetPermissions(client,
|
|
40684
|
+
args: args18,
|
|
40685
|
+
tool: async (client, args19, ctx) => {
|
|
40686
|
+
const [result, apiCall] = await keysSetPermissions(client, args19.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40387
40687
|
if (!result.ok) {
|
|
40388
40688
|
return {
|
|
40389
40689
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40398,9 +40698,9 @@ Invalidates the key cache for immediate effect, and makes permission changes ava
|
|
|
40398
40698
|
|
|
40399
40699
|
// src/funcs/keysSetRoles.ts
|
|
40400
40700
|
function keysSetRoles(client, request, options) {
|
|
40401
|
-
return new APIPromise($
|
|
40701
|
+
return new APIPromise($do19(client, request, options));
|
|
40402
40702
|
}
|
|
40403
|
-
async function $
|
|
40703
|
+
async function $do19(client, request, options) {
|
|
40404
40704
|
const parsed = safeParse(request, (value) => V2KeysSetRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40405
40705
|
if (!parsed.ok) {
|
|
40406
40706
|
return [parsed, { status: "invalid" }];
|
|
@@ -40480,12 +40780,12 @@ var init_keysSetRoles = __esm(() => {
|
|
|
40480
40780
|
});
|
|
40481
40781
|
|
|
40482
40782
|
// src/mcp-server/tools/keysSetRoles.ts
|
|
40483
|
-
var
|
|
40783
|
+
var args19, tool$keysSetRoles;
|
|
40484
40784
|
var init_keysSetRoles2 = __esm(() => {
|
|
40485
40785
|
init_keysSetRoles();
|
|
40486
40786
|
init_components();
|
|
40487
40787
|
init_tools();
|
|
40488
|
-
|
|
40788
|
+
args19 = {
|
|
40489
40789
|
request: V2KeysSetRolesRequestBody$inboundSchema
|
|
40490
40790
|
};
|
|
40491
40791
|
tool$keysSetRoles = {
|
|
@@ -40508,9 +40808,9 @@ Your root key must have one of the following permissions:
|
|
|
40508
40808
|
|
|
40509
40809
|
Invalidates the key cache for immediate effect, and makes role changes available for verification within 30 seconds across all regions.
|
|
40510
40810
|
`,
|
|
40511
|
-
args:
|
|
40512
|
-
tool: async (client,
|
|
40513
|
-
const [result, apiCall] = await keysSetRoles(client,
|
|
40811
|
+
args: args19,
|
|
40812
|
+
tool: async (client, args20, ctx) => {
|
|
40813
|
+
const [result, apiCall] = await keysSetRoles(client, args20.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40514
40814
|
if (!result.ok) {
|
|
40515
40815
|
return {
|
|
40516
40816
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40525,9 +40825,9 @@ Invalidates the key cache for immediate effect, and makes role changes available
|
|
|
40525
40825
|
|
|
40526
40826
|
// src/funcs/keysUpdateCredits.ts
|
|
40527
40827
|
function keysUpdateCredits(client, request, options) {
|
|
40528
|
-
return new APIPromise($
|
|
40828
|
+
return new APIPromise($do20(client, request, options));
|
|
40529
40829
|
}
|
|
40530
|
-
async function $
|
|
40830
|
+
async function $do20(client, request, options) {
|
|
40531
40831
|
const parsed = safeParse(request, (value) => V2KeysUpdateCreditsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40532
40832
|
if (!parsed.ok) {
|
|
40533
40833
|
return [parsed, { status: "invalid" }];
|
|
@@ -40607,12 +40907,12 @@ var init_keysUpdateCredits = __esm(() => {
|
|
|
40607
40907
|
});
|
|
40608
40908
|
|
|
40609
40909
|
// src/mcp-server/tools/keysUpdateCredits.ts
|
|
40610
|
-
var
|
|
40910
|
+
var args20, tool$keysUpdateCredits;
|
|
40611
40911
|
var init_keysUpdateCredits2 = __esm(() => {
|
|
40612
40912
|
init_keysUpdateCredits();
|
|
40613
40913
|
init_components();
|
|
40614
40914
|
init_tools();
|
|
40615
|
-
|
|
40915
|
+
args20 = {
|
|
40616
40916
|
request: V2KeysUpdateCreditsRequestBody$inboundSchema
|
|
40617
40917
|
};
|
|
40618
40918
|
tool$keysUpdateCredits = {
|
|
@@ -40635,9 +40935,9 @@ Your root key must have one of the following permissions:
|
|
|
40635
40935
|
|
|
40636
40936
|
Credit updates remove the key from cache immediately. Setting credits to unlimited automatically clears any existing refill settings. Changes take effect instantly but may take up to 30 seconds to propagate to all edge regions.
|
|
40637
40937
|
`,
|
|
40638
|
-
args:
|
|
40639
|
-
tool: async (client,
|
|
40640
|
-
const [result, apiCall] = await keysUpdateCredits(client,
|
|
40938
|
+
args: args20,
|
|
40939
|
+
tool: async (client, args21, ctx) => {
|
|
40940
|
+
const [result, apiCall] = await keysUpdateCredits(client, args21.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40641
40941
|
if (!result.ok) {
|
|
40642
40942
|
return {
|
|
40643
40943
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40652,9 +40952,9 @@ Credit updates remove the key from cache immediately. Setting credits to unlimit
|
|
|
40652
40952
|
|
|
40653
40953
|
// src/funcs/keysUpdateKey.ts
|
|
40654
40954
|
function keysUpdateKey(client, request, options) {
|
|
40655
|
-
return new APIPromise($
|
|
40955
|
+
return new APIPromise($do21(client, request, options));
|
|
40656
40956
|
}
|
|
40657
|
-
async function $
|
|
40957
|
+
async function $do21(client, request, options) {
|
|
40658
40958
|
const parsed = safeParse(request, (value) => V2KeysUpdateKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40659
40959
|
if (!parsed.ok) {
|
|
40660
40960
|
return [parsed, { status: "invalid" }];
|
|
@@ -40734,12 +41034,12 @@ var init_keysUpdateKey = __esm(() => {
|
|
|
40734
41034
|
});
|
|
40735
41035
|
|
|
40736
41036
|
// src/mcp-server/tools/keysUpdateKey.ts
|
|
40737
|
-
var
|
|
41037
|
+
var args21, tool$keysUpdateKey;
|
|
40738
41038
|
var init_keysUpdateKey2 = __esm(() => {
|
|
40739
41039
|
init_keysUpdateKey();
|
|
40740
41040
|
init_components();
|
|
40741
41041
|
init_tools();
|
|
40742
|
-
|
|
41042
|
+
args21 = {
|
|
40743
41043
|
request: V2KeysUpdateKeyRequestBody$inboundSchema
|
|
40744
41044
|
};
|
|
40745
41045
|
tool$keysUpdateKey = {
|
|
@@ -40762,9 +41062,9 @@ Your root key must have one of the following permissions:
|
|
|
40762
41062
|
|
|
40763
41063
|
If you specify an \`externalId\` that doesn't exist, a new identity will be automatically created and linked to the key. Permission updates will auto-create any permissions that don't exist in your workspace. Changes take effect immediately but may take up to 30 seconds to propagate to all edge regions due to cache invalidation.
|
|
40764
41064
|
`,
|
|
40765
|
-
args:
|
|
40766
|
-
tool: async (client,
|
|
40767
|
-
const [result, apiCall] = await keysUpdateKey(client,
|
|
41065
|
+
args: args21,
|
|
41066
|
+
tool: async (client, args22, ctx) => {
|
|
41067
|
+
const [result, apiCall] = await keysUpdateKey(client, args22.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40768
41068
|
if (!result.ok) {
|
|
40769
41069
|
return {
|
|
40770
41070
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40779,9 +41079,9 @@ If you specify an \`externalId\` that doesn't exist, a new identity will be auto
|
|
|
40779
41079
|
|
|
40780
41080
|
// src/funcs/keysVerifyKey.ts
|
|
40781
41081
|
function keysVerifyKey(client, request, options) {
|
|
40782
|
-
return new APIPromise($
|
|
41082
|
+
return new APIPromise($do22(client, request, options));
|
|
40783
41083
|
}
|
|
40784
|
-
async function $
|
|
41084
|
+
async function $do22(client, request, options) {
|
|
40785
41085
|
const parsed = safeParse(request, (value) => V2KeysVerifyKeyRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40786
41086
|
if (!parsed.ok) {
|
|
40787
41087
|
return [parsed, { status: "invalid" }];
|
|
@@ -40861,12 +41161,12 @@ var init_keysVerifyKey = __esm(() => {
|
|
|
40861
41161
|
});
|
|
40862
41162
|
|
|
40863
41163
|
// src/mcp-server/tools/keysVerifyKey.ts
|
|
40864
|
-
var
|
|
41164
|
+
var args22, tool$keysVerifyKey;
|
|
40865
41165
|
var init_keysVerifyKey2 = __esm(() => {
|
|
40866
41166
|
init_keysVerifyKey();
|
|
40867
41167
|
init_components();
|
|
40868
41168
|
init_tools();
|
|
40869
|
-
|
|
41169
|
+
args22 = {
|
|
40870
41170
|
request: V2KeysVerifyKeyRequestBody$inboundSchema
|
|
40871
41171
|
};
|
|
40872
41172
|
tool$keysVerifyKey = {
|
|
@@ -40892,9 +41192,9 @@ Your root key needs one of:
|
|
|
40892
41192
|
|
|
40893
41193
|
If you are getting a NOT_FOUND error, ensure your root key has the required verify key permissions.
|
|
40894
41194
|
`,
|
|
40895
|
-
args:
|
|
40896
|
-
tool: async (client,
|
|
40897
|
-
const [result, apiCall] = await keysVerifyKey(client,
|
|
41195
|
+
args: args22,
|
|
41196
|
+
tool: async (client, args23, ctx) => {
|
|
41197
|
+
const [result, apiCall] = await keysVerifyKey(client, args23.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
40898
41198
|
if (!result.ok) {
|
|
40899
41199
|
return {
|
|
40900
41200
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -40909,9 +41209,9 @@ If you are getting a NOT_FOUND error, ensure your root key has the required veri
|
|
|
40909
41209
|
|
|
40910
41210
|
// src/funcs/keysWhoami.ts
|
|
40911
41211
|
function keysWhoami(client, request, options) {
|
|
40912
|
-
return new APIPromise($
|
|
41212
|
+
return new APIPromise($do23(client, request, options));
|
|
40913
41213
|
}
|
|
40914
|
-
async function $
|
|
41214
|
+
async function $do23(client, request, options) {
|
|
40915
41215
|
const parsed = safeParse(request, (value) => V2KeysWhoamiRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
40916
41216
|
if (!parsed.ok) {
|
|
40917
41217
|
return [parsed, { status: "invalid" }];
|
|
@@ -40991,12 +41291,12 @@ var init_keysWhoami = __esm(() => {
|
|
|
40991
41291
|
});
|
|
40992
41292
|
|
|
40993
41293
|
// src/mcp-server/tools/keysWhoami.ts
|
|
40994
|
-
var
|
|
41294
|
+
var args23, tool$keysWhoami;
|
|
40995
41295
|
var init_keysWhoami2 = __esm(() => {
|
|
40996
41296
|
init_keysWhoami();
|
|
40997
41297
|
init_components();
|
|
40998
41298
|
init_tools();
|
|
40999
|
-
|
|
41299
|
+
args23 = {
|
|
41000
41300
|
request: V2KeysWhoamiRequestBody$inboundSchema
|
|
41001
41301
|
};
|
|
41002
41302
|
tool$keysWhoami = {
|
|
@@ -41013,9 +41313,9 @@ Your root key must have one of the following permissions for basic key informati
|
|
|
41013
41313
|
|
|
41014
41314
|
If your rootkey lacks permissions but the key exists, we may return a 404 status here to prevent leaking the existance of a key to unauthorized clients. If you believe that a key should exist, but receive a 404, please double check your root key has the correct permissions.
|
|
41015
41315
|
`,
|
|
41016
|
-
args:
|
|
41017
|
-
tool: async (client,
|
|
41018
|
-
const [result, apiCall] = await keysWhoami(client,
|
|
41316
|
+
args: args23,
|
|
41317
|
+
tool: async (client, args24, ctx) => {
|
|
41318
|
+
const [result, apiCall] = await keysWhoami(client, args24.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41019
41319
|
if (!result.ok) {
|
|
41020
41320
|
return {
|
|
41021
41321
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41030,9 +41330,9 @@ If your rootkey lacks permissions but the key exists, we may return a 404 status
|
|
|
41030
41330
|
|
|
41031
41331
|
// src/funcs/permissionsCreatePermission.ts
|
|
41032
41332
|
function permissionsCreatePermission(client, request, options) {
|
|
41033
|
-
return new APIPromise($
|
|
41333
|
+
return new APIPromise($do24(client, request, options));
|
|
41034
41334
|
}
|
|
41035
|
-
async function $
|
|
41335
|
+
async function $do24(client, request, options) {
|
|
41036
41336
|
const parsed = safeParse(request, (value) => V2PermissionsCreatePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41037
41337
|
if (!parsed.ok) {
|
|
41038
41338
|
return [parsed, { status: "invalid" }];
|
|
@@ -41112,12 +41412,12 @@ var init_permissionsCreatePermission = __esm(() => {
|
|
|
41112
41412
|
});
|
|
41113
41413
|
|
|
41114
41414
|
// src/mcp-server/tools/permissionsCreatePermission.ts
|
|
41115
|
-
var
|
|
41415
|
+
var args24, tool$permissionsCreatePermission;
|
|
41116
41416
|
var init_permissionsCreatePermission2 = __esm(() => {
|
|
41117
41417
|
init_permissionsCreatePermission();
|
|
41118
41418
|
init_components();
|
|
41119
41419
|
init_tools();
|
|
41120
|
-
|
|
41420
|
+
args24 = {
|
|
41121
41421
|
request: V2PermissionsCreatePermissionRequestBody$inboundSchema
|
|
41122
41422
|
};
|
|
41123
41423
|
tool$permissionsCreatePermission = {
|
|
@@ -41135,9 +41435,9 @@ Use hierarchical naming patterns like \`documents.read\`, \`admin.users.delete\`
|
|
|
41135
41435
|
Your root key must have the following permission:
|
|
41136
41436
|
- \`rbac.*.create_permission\`
|
|
41137
41437
|
`,
|
|
41138
|
-
args:
|
|
41139
|
-
tool: async (client,
|
|
41140
|
-
const [result, apiCall] = await permissionsCreatePermission(client,
|
|
41438
|
+
args: args24,
|
|
41439
|
+
tool: async (client, args25, ctx) => {
|
|
41440
|
+
const [result, apiCall] = await permissionsCreatePermission(client, args25.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41141
41441
|
if (!result.ok) {
|
|
41142
41442
|
return {
|
|
41143
41443
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41152,9 +41452,9 @@ Your root key must have the following permission:
|
|
|
41152
41452
|
|
|
41153
41453
|
// src/funcs/permissionsCreateRole.ts
|
|
41154
41454
|
function permissionsCreateRole(client, request, options) {
|
|
41155
|
-
return new APIPromise($
|
|
41455
|
+
return new APIPromise($do25(client, request, options));
|
|
41156
41456
|
}
|
|
41157
|
-
async function $
|
|
41457
|
+
async function $do25(client, request, options) {
|
|
41158
41458
|
const parsed = safeParse(request, (value) => V2PermissionsCreateRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41159
41459
|
if (!parsed.ok) {
|
|
41160
41460
|
return [parsed, { status: "invalid" }];
|
|
@@ -41234,12 +41534,12 @@ var init_permissionsCreateRole = __esm(() => {
|
|
|
41234
41534
|
});
|
|
41235
41535
|
|
|
41236
41536
|
// src/mcp-server/tools/permissionsCreateRole.ts
|
|
41237
|
-
var
|
|
41537
|
+
var args25, tool$permissionsCreateRole;
|
|
41238
41538
|
var init_permissionsCreateRole2 = __esm(() => {
|
|
41239
41539
|
init_permissionsCreateRole();
|
|
41240
41540
|
init_components();
|
|
41241
41541
|
init_tools();
|
|
41242
|
-
|
|
41542
|
+
args25 = {
|
|
41243
41543
|
request: V2PermissionsCreateRoleRequestBody$inboundSchema
|
|
41244
41544
|
};
|
|
41245
41545
|
tool$permissionsCreateRole = {
|
|
@@ -41255,9 +41555,9 @@ Create a new role to group related permissions for easier management. Roles enab
|
|
|
41255
41555
|
Your root key must have the following permission:
|
|
41256
41556
|
- \`rbac.*.create_role\`
|
|
41257
41557
|
`,
|
|
41258
|
-
args:
|
|
41259
|
-
tool: async (client,
|
|
41260
|
-
const [result, apiCall] = await permissionsCreateRole(client,
|
|
41558
|
+
args: args25,
|
|
41559
|
+
tool: async (client, args26, ctx) => {
|
|
41560
|
+
const [result, apiCall] = await permissionsCreateRole(client, args26.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41261
41561
|
if (!result.ok) {
|
|
41262
41562
|
return {
|
|
41263
41563
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41272,9 +41572,9 @@ Your root key must have the following permission:
|
|
|
41272
41572
|
|
|
41273
41573
|
// src/funcs/permissionsDeletePermission.ts
|
|
41274
41574
|
function permissionsDeletePermission(client, request, options) {
|
|
41275
|
-
return new APIPromise($
|
|
41575
|
+
return new APIPromise($do26(client, request, options));
|
|
41276
41576
|
}
|
|
41277
|
-
async function $
|
|
41577
|
+
async function $do26(client, request, options) {
|
|
41278
41578
|
const parsed = safeParse(request, (value) => V2PermissionsDeletePermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41279
41579
|
if (!parsed.ok) {
|
|
41280
41580
|
return [parsed, { status: "invalid" }];
|
|
@@ -41354,12 +41654,12 @@ var init_permissionsDeletePermission = __esm(() => {
|
|
|
41354
41654
|
});
|
|
41355
41655
|
|
|
41356
41656
|
// src/mcp-server/tools/permissionsDeletePermission.ts
|
|
41357
|
-
var
|
|
41657
|
+
var args26, tool$permissionsDeletePermission;
|
|
41358
41658
|
var init_permissionsDeletePermission2 = __esm(() => {
|
|
41359
41659
|
init_permissionsDeletePermission();
|
|
41360
41660
|
init_components();
|
|
41361
41661
|
init_tools();
|
|
41362
|
-
|
|
41662
|
+
args26 = {
|
|
41363
41663
|
request: V2PermissionsDeletePermissionRequestBody$inboundSchema
|
|
41364
41664
|
};
|
|
41365
41665
|
tool$permissionsDeletePermission = {
|
|
@@ -41375,9 +41675,9 @@ Remove a permission from your workspace. This also removes the permission from a
|
|
|
41375
41675
|
Your root key must have the following permission:
|
|
41376
41676
|
- \`rbac.*.delete_permission\`
|
|
41377
41677
|
`,
|
|
41378
|
-
args:
|
|
41379
|
-
tool: async (client,
|
|
41380
|
-
const [result, apiCall] = await permissionsDeletePermission(client,
|
|
41678
|
+
args: args26,
|
|
41679
|
+
tool: async (client, args27, ctx) => {
|
|
41680
|
+
const [result, apiCall] = await permissionsDeletePermission(client, args27.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41381
41681
|
if (!result.ok) {
|
|
41382
41682
|
return {
|
|
41383
41683
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41392,9 +41692,9 @@ Your root key must have the following permission:
|
|
|
41392
41692
|
|
|
41393
41693
|
// src/funcs/permissionsDeleteRole.ts
|
|
41394
41694
|
function permissionsDeleteRole(client, request, options) {
|
|
41395
|
-
return new APIPromise($
|
|
41695
|
+
return new APIPromise($do27(client, request, options));
|
|
41396
41696
|
}
|
|
41397
|
-
async function $
|
|
41697
|
+
async function $do27(client, request, options) {
|
|
41398
41698
|
const parsed = safeParse(request, (value) => V2PermissionsDeleteRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41399
41699
|
if (!parsed.ok) {
|
|
41400
41700
|
return [parsed, { status: "invalid" }];
|
|
@@ -41474,12 +41774,12 @@ var init_permissionsDeleteRole = __esm(() => {
|
|
|
41474
41774
|
});
|
|
41475
41775
|
|
|
41476
41776
|
// src/mcp-server/tools/permissionsDeleteRole.ts
|
|
41477
|
-
var
|
|
41777
|
+
var args27, tool$permissionsDeleteRole;
|
|
41478
41778
|
var init_permissionsDeleteRole2 = __esm(() => {
|
|
41479
41779
|
init_permissionsDeleteRole();
|
|
41480
41780
|
init_components();
|
|
41481
41781
|
init_tools();
|
|
41482
|
-
|
|
41782
|
+
args27 = {
|
|
41483
41783
|
request: V2PermissionsDeleteRoleRequestBody$inboundSchema
|
|
41484
41784
|
};
|
|
41485
41785
|
tool$permissionsDeleteRole = {
|
|
@@ -41495,9 +41795,9 @@ Remove a role from your workspace. This also removes the role from all assigned
|
|
|
41495
41795
|
Your root key must have the following permission:
|
|
41496
41796
|
- \`rbac.*.delete_role\`
|
|
41497
41797
|
`,
|
|
41498
|
-
args:
|
|
41499
|
-
tool: async (client,
|
|
41500
|
-
const [result, apiCall] = await permissionsDeleteRole(client,
|
|
41798
|
+
args: args27,
|
|
41799
|
+
tool: async (client, args28, ctx) => {
|
|
41800
|
+
const [result, apiCall] = await permissionsDeleteRole(client, args28.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41501
41801
|
if (!result.ok) {
|
|
41502
41802
|
return {
|
|
41503
41803
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41512,9 +41812,9 @@ Your root key must have the following permission:
|
|
|
41512
41812
|
|
|
41513
41813
|
// src/funcs/permissionsGetPermission.ts
|
|
41514
41814
|
function permissionsGetPermission(client, request, options) {
|
|
41515
|
-
return new APIPromise($
|
|
41815
|
+
return new APIPromise($do28(client, request, options));
|
|
41516
41816
|
}
|
|
41517
|
-
async function $
|
|
41817
|
+
async function $do28(client, request, options) {
|
|
41518
41818
|
const parsed = safeParse(request, (value) => V2PermissionsGetPermissionRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41519
41819
|
if (!parsed.ok) {
|
|
41520
41820
|
return [parsed, { status: "invalid" }];
|
|
@@ -41594,12 +41894,12 @@ var init_permissionsGetPermission = __esm(() => {
|
|
|
41594
41894
|
});
|
|
41595
41895
|
|
|
41596
41896
|
// src/mcp-server/tools/permissionsGetPermission.ts
|
|
41597
|
-
var
|
|
41897
|
+
var args28, tool$permissionsGetPermission;
|
|
41598
41898
|
var init_permissionsGetPermission2 = __esm(() => {
|
|
41599
41899
|
init_permissionsGetPermission();
|
|
41600
41900
|
init_components();
|
|
41601
41901
|
init_tools();
|
|
41602
|
-
|
|
41902
|
+
args28 = {
|
|
41603
41903
|
request: V2PermissionsGetPermissionRequestBody$inboundSchema
|
|
41604
41904
|
};
|
|
41605
41905
|
tool$permissionsGetPermission = {
|
|
@@ -41613,9 +41913,9 @@ Retrieve details about a specific permission including its name, description, an
|
|
|
41613
41913
|
Your root key must have the following permission:
|
|
41614
41914
|
- \`rbac.*.read_permission\`
|
|
41615
41915
|
`,
|
|
41616
|
-
args:
|
|
41617
|
-
tool: async (client,
|
|
41618
|
-
const [result, apiCall] = await permissionsGetPermission(client,
|
|
41916
|
+
args: args28,
|
|
41917
|
+
tool: async (client, args29, ctx) => {
|
|
41918
|
+
const [result, apiCall] = await permissionsGetPermission(client, args29.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41619
41919
|
if (!result.ok) {
|
|
41620
41920
|
return {
|
|
41621
41921
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41630,9 +41930,9 @@ Your root key must have the following permission:
|
|
|
41630
41930
|
|
|
41631
41931
|
// src/funcs/permissionsGetRole.ts
|
|
41632
41932
|
function permissionsGetRole(client, request, options) {
|
|
41633
|
-
return new APIPromise($
|
|
41933
|
+
return new APIPromise($do29(client, request, options));
|
|
41634
41934
|
}
|
|
41635
|
-
async function $
|
|
41935
|
+
async function $do29(client, request, options) {
|
|
41636
41936
|
const parsed = safeParse(request, (value) => V2PermissionsGetRoleRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41637
41937
|
if (!parsed.ok) {
|
|
41638
41938
|
return [parsed, { status: "invalid" }];
|
|
@@ -41712,12 +42012,12 @@ var init_permissionsGetRole = __esm(() => {
|
|
|
41712
42012
|
});
|
|
41713
42013
|
|
|
41714
42014
|
// src/mcp-server/tools/permissionsGetRole.ts
|
|
41715
|
-
var
|
|
42015
|
+
var args29, tool$permissionsGetRole;
|
|
41716
42016
|
var init_permissionsGetRole2 = __esm(() => {
|
|
41717
42017
|
init_permissionsGetRole();
|
|
41718
42018
|
init_components();
|
|
41719
42019
|
init_tools();
|
|
41720
|
-
|
|
42020
|
+
args29 = {
|
|
41721
42021
|
request: V2PermissionsGetRoleRequestBody$inboundSchema
|
|
41722
42022
|
};
|
|
41723
42023
|
tool$permissionsGetRole = {
|
|
@@ -41731,9 +42031,9 @@ Retrieve details about a specific role including its assigned permissions.
|
|
|
41731
42031
|
Your root key must have the following permission:
|
|
41732
42032
|
- \`rbac.*.read_role\`
|
|
41733
42033
|
`,
|
|
41734
|
-
args:
|
|
41735
|
-
tool: async (client,
|
|
41736
|
-
const [result, apiCall] = await permissionsGetRole(client,
|
|
42034
|
+
args: args29,
|
|
42035
|
+
tool: async (client, args30, ctx) => {
|
|
42036
|
+
const [result, apiCall] = await permissionsGetRole(client, args30.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41737
42037
|
if (!result.ok) {
|
|
41738
42038
|
return {
|
|
41739
42039
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41748,9 +42048,9 @@ Your root key must have the following permission:
|
|
|
41748
42048
|
|
|
41749
42049
|
// src/funcs/permissionsListPermissions.ts
|
|
41750
42050
|
function permissionsListPermissions(client, request, options) {
|
|
41751
|
-
return new APIPromise($
|
|
42051
|
+
return new APIPromise($do30(client, request, options));
|
|
41752
42052
|
}
|
|
41753
|
-
async function $
|
|
42053
|
+
async function $do30(client, request, options) {
|
|
41754
42054
|
const parsed = safeParse(request, (value) => V2PermissionsListPermissionsRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41755
42055
|
if (!parsed.ok) {
|
|
41756
42056
|
return [parsed, { status: "invalid" }];
|
|
@@ -41830,28 +42130,29 @@ var init_permissionsListPermissions = __esm(() => {
|
|
|
41830
42130
|
});
|
|
41831
42131
|
|
|
41832
42132
|
// src/mcp-server/tools/permissionsListPermissions.ts
|
|
41833
|
-
var
|
|
42133
|
+
var args30, tool$permissionsListPermissions;
|
|
41834
42134
|
var init_permissionsListPermissions2 = __esm(() => {
|
|
41835
42135
|
init_permissionsListPermissions();
|
|
41836
42136
|
init_components();
|
|
41837
42137
|
init_tools();
|
|
41838
|
-
|
|
42138
|
+
args30 = {
|
|
41839
42139
|
request: V2PermissionsListPermissionsRequestBody$inboundSchema
|
|
41840
42140
|
};
|
|
41841
42141
|
tool$permissionsListPermissions = {
|
|
41842
42142
|
name: "permissions-list-permissions",
|
|
41843
42143
|
description: `List permissions
|
|
41844
42144
|
|
|
41845
|
-
Retrieve all permissions in your workspace.
|
|
42145
|
+
Retrieve all permissions in your workspace.
|
|
42146
|
+
Results are paginated and sorted by their id.
|
|
41846
42147
|
|
|
41847
42148
|
**Required Permissions**
|
|
41848
42149
|
|
|
41849
42150
|
Your root key must have the following permission:
|
|
41850
42151
|
- \`rbac.*.read_permission\`
|
|
41851
42152
|
`,
|
|
41852
|
-
args:
|
|
41853
|
-
tool: async (client,
|
|
41854
|
-
const [result, apiCall] = await permissionsListPermissions(client,
|
|
42153
|
+
args: args30,
|
|
42154
|
+
tool: async (client, args31, ctx) => {
|
|
42155
|
+
const [result, apiCall] = await permissionsListPermissions(client, args31.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41855
42156
|
if (!result.ok) {
|
|
41856
42157
|
return {
|
|
41857
42158
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41866,9 +42167,9 @@ Your root key must have the following permission:
|
|
|
41866
42167
|
|
|
41867
42168
|
// src/funcs/permissionsListRoles.ts
|
|
41868
42169
|
function permissionsListRoles(client, request, options) {
|
|
41869
|
-
return new APIPromise($
|
|
42170
|
+
return new APIPromise($do31(client, request, options));
|
|
41870
42171
|
}
|
|
41871
|
-
async function $
|
|
42172
|
+
async function $do31(client, request, options) {
|
|
41872
42173
|
const parsed = safeParse(request, (value) => V2PermissionsListRolesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41873
42174
|
if (!parsed.ok) {
|
|
41874
42175
|
return [parsed, { status: "invalid" }];
|
|
@@ -41948,28 +42249,29 @@ var init_permissionsListRoles = __esm(() => {
|
|
|
41948
42249
|
});
|
|
41949
42250
|
|
|
41950
42251
|
// src/mcp-server/tools/permissionsListRoles.ts
|
|
41951
|
-
var
|
|
42252
|
+
var args31, tool$permissionsListRoles;
|
|
41952
42253
|
var init_permissionsListRoles2 = __esm(() => {
|
|
41953
42254
|
init_permissionsListRoles();
|
|
41954
42255
|
init_components();
|
|
41955
42256
|
init_tools();
|
|
41956
|
-
|
|
42257
|
+
args31 = {
|
|
41957
42258
|
request: V2PermissionsListRolesRequestBody$inboundSchema
|
|
41958
42259
|
};
|
|
41959
42260
|
tool$permissionsListRoles = {
|
|
41960
42261
|
name: "permissions-list-roles",
|
|
41961
42262
|
description: `List roles
|
|
41962
42263
|
|
|
41963
|
-
Retrieve all roles in your workspace including their assigned permissions.
|
|
42264
|
+
Retrieve all roles in your workspace including their assigned permissions.
|
|
42265
|
+
Results are paginated and sorted by their id.
|
|
41964
42266
|
|
|
41965
42267
|
**Required Permissions**
|
|
41966
42268
|
|
|
41967
42269
|
Your root key must have the following permission:
|
|
41968
42270
|
- \`rbac.*.read_role\`
|
|
41969
42271
|
`,
|
|
41970
|
-
args:
|
|
41971
|
-
tool: async (client,
|
|
41972
|
-
const [result, apiCall] = await permissionsListRoles(client,
|
|
42272
|
+
args: args31,
|
|
42273
|
+
tool: async (client, args32, ctx) => {
|
|
42274
|
+
const [result, apiCall] = await permissionsListRoles(client, args32.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
41973
42275
|
if (!result.ok) {
|
|
41974
42276
|
return {
|
|
41975
42277
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -41984,9 +42286,9 @@ Your root key must have the following permission:
|
|
|
41984
42286
|
|
|
41985
42287
|
// src/funcs/ratelimitDeleteOverride.ts
|
|
41986
42288
|
function ratelimitDeleteOverride(client, request, options) {
|
|
41987
|
-
return new APIPromise($
|
|
42289
|
+
return new APIPromise($do32(client, request, options));
|
|
41988
42290
|
}
|
|
41989
|
-
async function $
|
|
42291
|
+
async function $do32(client, request, options) {
|
|
41990
42292
|
const parsed = safeParse(request, (value) => V2RatelimitDeleteOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
41991
42293
|
if (!parsed.ok) {
|
|
41992
42294
|
return [parsed, { status: "invalid" }];
|
|
@@ -42066,12 +42368,12 @@ var init_ratelimitDeleteOverride = __esm(() => {
|
|
|
42066
42368
|
});
|
|
42067
42369
|
|
|
42068
42370
|
// src/mcp-server/tools/ratelimitDeleteOverride.ts
|
|
42069
|
-
var
|
|
42371
|
+
var args32, tool$ratelimitDeleteOverride;
|
|
42070
42372
|
var init_ratelimitDeleteOverride2 = __esm(() => {
|
|
42071
42373
|
init_ratelimitDeleteOverride();
|
|
42072
42374
|
init_components();
|
|
42073
42375
|
init_tools();
|
|
42074
|
-
|
|
42376
|
+
args32 = {
|
|
42075
42377
|
request: V2RatelimitDeleteOverrideRequestBody$inboundSchema
|
|
42076
42378
|
};
|
|
42077
42379
|
tool$ratelimitDeleteOverride = {
|
|
@@ -42086,9 +42388,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
|
|
|
42086
42388
|
|
|
42087
42389
|
**Permissions:** Requires \`ratelimit.*.delete_override\` or \`ratelimit.<namespace_id>.delete_override\`
|
|
42088
42390
|
`,
|
|
42089
|
-
args:
|
|
42090
|
-
tool: async (client,
|
|
42091
|
-
const [result, apiCall] = await ratelimitDeleteOverride(client,
|
|
42391
|
+
args: args32,
|
|
42392
|
+
tool: async (client, args33, ctx) => {
|
|
42393
|
+
const [result, apiCall] = await ratelimitDeleteOverride(client, args33.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42092
42394
|
if (!result.ok) {
|
|
42093
42395
|
return {
|
|
42094
42396
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42103,9 +42405,9 @@ Use this to remove temporary overrides, reset identifiers to standard limits, or
|
|
|
42103
42405
|
|
|
42104
42406
|
// src/funcs/ratelimitGetOverride.ts
|
|
42105
42407
|
function ratelimitGetOverride(client, request, options) {
|
|
42106
|
-
return new APIPromise($
|
|
42408
|
+
return new APIPromise($do33(client, request, options));
|
|
42107
42409
|
}
|
|
42108
|
-
async function $
|
|
42410
|
+
async function $do33(client, request, options) {
|
|
42109
42411
|
const parsed = safeParse(request, (value) => V2RatelimitGetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42110
42412
|
if (!parsed.ok) {
|
|
42111
42413
|
return [parsed, { status: "invalid" }];
|
|
@@ -42185,12 +42487,12 @@ var init_ratelimitGetOverride = __esm(() => {
|
|
|
42185
42487
|
});
|
|
42186
42488
|
|
|
42187
42489
|
// src/mcp-server/tools/ratelimitGetOverride.ts
|
|
42188
|
-
var
|
|
42490
|
+
var args33, tool$ratelimitGetOverride;
|
|
42189
42491
|
var init_ratelimitGetOverride2 = __esm(() => {
|
|
42190
42492
|
init_ratelimitGetOverride();
|
|
42191
42493
|
init_components();
|
|
42192
42494
|
init_tools();
|
|
42193
|
-
|
|
42495
|
+
args33 = {
|
|
42194
42496
|
request: V2RatelimitGetOverrideRequestBody$inboundSchema
|
|
42195
42497
|
};
|
|
42196
42498
|
tool$ratelimitGetOverride = {
|
|
@@ -42205,9 +42507,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
|
|
|
42205
42507
|
|
|
42206
42508
|
**Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
|
|
42207
42509
|
`,
|
|
42208
|
-
args:
|
|
42209
|
-
tool: async (client,
|
|
42210
|
-
const [result, apiCall] = await ratelimitGetOverride(client,
|
|
42510
|
+
args: args33,
|
|
42511
|
+
tool: async (client, args34, ctx) => {
|
|
42512
|
+
const [result, apiCall] = await ratelimitGetOverride(client, args34.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42211
42513
|
if (!result.ok) {
|
|
42212
42514
|
return {
|
|
42213
42515
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42222,9 +42524,9 @@ Use this to inspect override configurations, audit rate limiting policies, or de
|
|
|
42222
42524
|
|
|
42223
42525
|
// src/funcs/ratelimitLimit.ts
|
|
42224
42526
|
function ratelimitLimit(client, request, options) {
|
|
42225
|
-
return new APIPromise($
|
|
42527
|
+
return new APIPromise($do34(client, request, options));
|
|
42226
42528
|
}
|
|
42227
|
-
async function $
|
|
42529
|
+
async function $do34(client, request, options) {
|
|
42228
42530
|
const parsed = safeParse(request, (value) => V2RatelimitLimitRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42229
42531
|
if (!parsed.ok) {
|
|
42230
42532
|
return [parsed, { status: "invalid" }];
|
|
@@ -42274,7 +42576,7 @@ async function $do33(client, request, options) {
|
|
|
42274
42576
|
const req = requestRes.value;
|
|
42275
42577
|
const doResult = await client._do(req, {
|
|
42276
42578
|
context,
|
|
42277
|
-
errorCodes: ["400", "401", "403", "404", "4XX", "500", "5XX"],
|
|
42579
|
+
errorCodes: ["400", "401", "403", "404", "410", "4XX", "500", "5XX"],
|
|
42278
42580
|
retryConfig: context.retryConfig,
|
|
42279
42581
|
retryCodes: context.retryCodes
|
|
42280
42582
|
});
|
|
@@ -42285,7 +42587,7 @@ async function $do33(client, request, options) {
|
|
|
42285
42587
|
const responseFields = {
|
|
42286
42588
|
HttpMeta: { Response: response, Request: req }
|
|
42287
42589
|
};
|
|
42288
|
-
const [result] = await match(json(200, V2RatelimitLimitResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
|
|
42590
|
+
const [result] = await match(json(200, V2RatelimitLimitResponseBody$inboundSchema), jsonErr(400, BadRequestErrorResponse$inboundSchema), jsonErr(401, UnauthorizedErrorResponse$inboundSchema), jsonErr(403, ForbiddenErrorResponse$inboundSchema), jsonErr(404, NotFoundErrorResponse$inboundSchema), jsonErr(410, GoneErrorResponse$inboundSchema), jsonErr(500, InternalServerErrorResponse$inboundSchema), fail("4XX"), fail("5XX"))(response, req, { extraFields: responseFields });
|
|
42289
42591
|
if (!result.ok) {
|
|
42290
42592
|
return [result, { status: "complete", request: req, response }];
|
|
42291
42593
|
}
|
|
@@ -42304,12 +42606,12 @@ var init_ratelimitLimit = __esm(() => {
|
|
|
42304
42606
|
});
|
|
42305
42607
|
|
|
42306
42608
|
// src/mcp-server/tools/ratelimitLimit.ts
|
|
42307
|
-
var
|
|
42609
|
+
var args34, tool$ratelimitLimit;
|
|
42308
42610
|
var init_ratelimitLimit2 = __esm(() => {
|
|
42309
42611
|
init_ratelimitLimit();
|
|
42310
42612
|
init_components();
|
|
42311
42613
|
init_tools();
|
|
42312
|
-
|
|
42614
|
+
args34 = {
|
|
42313
42615
|
request: V2RatelimitLimitRequestBody$inboundSchema
|
|
42314
42616
|
};
|
|
42315
42617
|
tool$ratelimitLimit = {
|
|
@@ -42320,7 +42622,7 @@ Check and enforce rate limits for any identifier (user ID, IP address, API clien
|
|
|
42320
42622
|
|
|
42321
42623
|
Use this for rate limiting beyond API keys - limit users by ID, IPs by address, or any custom identifier. Supports namespace organization, variable costs, and custom overrides.
|
|
42322
42624
|
|
|
42323
|
-
**
|
|
42625
|
+
**Response Codes**: Rate limit checks return HTTP 200 regardless of whether the limit is exceeded - check the \`success\` field in the response to determine if the request should be allowed. 4xx responses indicate auth, namespace existence/deletion, or validation errors (e.g., 410 Gone for deleted namespaces). 5xx responses indicate server errors.
|
|
42324
42626
|
|
|
42325
42627
|
**Required Permissions**
|
|
42326
42628
|
|
|
@@ -42332,9 +42634,9 @@ Your root key must have one of the following permissions:
|
|
|
42332
42634
|
|
|
42333
42635
|
Records rate limit metrics for analytics and monitoring, updates rate limit counters with sliding window algorithm, and optionally triggers override matching for custom limits.
|
|
42334
42636
|
`,
|
|
42335
|
-
args:
|
|
42336
|
-
tool: async (client,
|
|
42337
|
-
const [result, apiCall] = await ratelimitLimit(client,
|
|
42637
|
+
args: args34,
|
|
42638
|
+
tool: async (client, args35, ctx) => {
|
|
42639
|
+
const [result, apiCall] = await ratelimitLimit(client, args35.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42338
42640
|
if (!result.ok) {
|
|
42339
42641
|
return {
|
|
42340
42642
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42349,9 +42651,9 @@ Records rate limit metrics for analytics and monitoring, updates rate limit coun
|
|
|
42349
42651
|
|
|
42350
42652
|
// src/funcs/ratelimitListOverrides.ts
|
|
42351
42653
|
function ratelimitListOverrides(client, request, options) {
|
|
42352
|
-
return new APIPromise($
|
|
42654
|
+
return new APIPromise($do35(client, request, options));
|
|
42353
42655
|
}
|
|
42354
|
-
async function $
|
|
42656
|
+
async function $do35(client, request, options) {
|
|
42355
42657
|
const parsed = safeParse(request, (value) => V2RatelimitListOverridesRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42356
42658
|
if (!parsed.ok) {
|
|
42357
42659
|
return [parsed, { status: "invalid" }];
|
|
@@ -42431,12 +42733,12 @@ var init_ratelimitListOverrides = __esm(() => {
|
|
|
42431
42733
|
});
|
|
42432
42734
|
|
|
42433
42735
|
// src/mcp-server/tools/ratelimitListOverrides.ts
|
|
42434
|
-
var
|
|
42736
|
+
var args35, tool$ratelimitListOverrides;
|
|
42435
42737
|
var init_ratelimitListOverrides2 = __esm(() => {
|
|
42436
42738
|
init_ratelimitListOverrides();
|
|
42437
42739
|
init_components();
|
|
42438
42740
|
init_tools();
|
|
42439
|
-
|
|
42741
|
+
args35 = {
|
|
42440
42742
|
request: V2RatelimitListOverridesRequestBody$inboundSchema
|
|
42441
42743
|
};
|
|
42442
42744
|
tool$ratelimitListOverrides = {
|
|
@@ -42451,9 +42753,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
|
|
|
42451
42753
|
|
|
42452
42754
|
**Permissions:** Requires \`ratelimit.*.read_override\` or \`ratelimit.<namespace_id>.read_override\`
|
|
42453
42755
|
`,
|
|
42454
|
-
args:
|
|
42455
|
-
tool: async (client,
|
|
42456
|
-
const [result, apiCall] = await ratelimitListOverrides(client,
|
|
42756
|
+
args: args35,
|
|
42757
|
+
tool: async (client, args36, ctx) => {
|
|
42758
|
+
const [result, apiCall] = await ratelimitListOverrides(client, args36.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42457
42759
|
if (!result.ok) {
|
|
42458
42760
|
return {
|
|
42459
42761
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42468,9 +42770,9 @@ Use this to audit rate limiting policies, build admin dashboards, or manage over
|
|
|
42468
42770
|
|
|
42469
42771
|
// src/funcs/ratelimitSetOverride.ts
|
|
42470
42772
|
function ratelimitSetOverride(client, request, options) {
|
|
42471
|
-
return new APIPromise($
|
|
42773
|
+
return new APIPromise($do36(client, request, options));
|
|
42472
42774
|
}
|
|
42473
|
-
async function $
|
|
42775
|
+
async function $do36(client, request, options) {
|
|
42474
42776
|
const parsed = safeParse(request, (value) => V2RatelimitSetOverrideRequestBody$outboundSchema.parse(value), "Input validation failed");
|
|
42475
42777
|
if (!parsed.ok) {
|
|
42476
42778
|
return [parsed, { status: "invalid" }];
|
|
@@ -42550,12 +42852,12 @@ var init_ratelimitSetOverride = __esm(() => {
|
|
|
42550
42852
|
});
|
|
42551
42853
|
|
|
42552
42854
|
// src/mcp-server/tools/ratelimitSetOverride.ts
|
|
42553
|
-
var
|
|
42855
|
+
var args36, tool$ratelimitSetOverride;
|
|
42554
42856
|
var init_ratelimitSetOverride2 = __esm(() => {
|
|
42555
42857
|
init_ratelimitSetOverride();
|
|
42556
42858
|
init_components();
|
|
42557
42859
|
init_tools();
|
|
42558
|
-
|
|
42860
|
+
args36 = {
|
|
42559
42861
|
request: V2RatelimitSetOverrideRequestBody$inboundSchema
|
|
42560
42862
|
};
|
|
42561
42863
|
tool$ratelimitSetOverride = {
|
|
@@ -42570,9 +42872,9 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
|
|
|
42570
42872
|
|
|
42571
42873
|
**Permissions:** Requires \`ratelimit.*.set_override\` or \`ratelimit.<namespace_id>.set_override\`
|
|
42572
42874
|
`,
|
|
42573
|
-
args:
|
|
42574
|
-
tool: async (client,
|
|
42575
|
-
const [result, apiCall] = await ratelimitSetOverride(client,
|
|
42875
|
+
args: args36,
|
|
42876
|
+
tool: async (client, args37, ctx) => {
|
|
42877
|
+
const [result, apiCall] = await ratelimitSetOverride(client, args37.request, { fetchOptions: { signal: ctx.signal } }).$inspect();
|
|
42576
42878
|
if (!result.ok) {
|
|
42577
42879
|
return {
|
|
42578
42880
|
content: [{ type: "text", text: result.error.message }],
|
|
@@ -42589,7 +42891,7 @@ Use this to create premium tiers with higher limits, apply stricter limits to sp
|
|
|
42589
42891
|
function createMCPServer(deps) {
|
|
42590
42892
|
const server = new McpServer({
|
|
42591
42893
|
name: "Unkey",
|
|
42592
|
-
version: "2.0.
|
|
42894
|
+
version: "2.0.5"
|
|
42593
42895
|
});
|
|
42594
42896
|
const client = new UnkeyCore({
|
|
42595
42897
|
rootKey: deps.rootKey,
|
|
@@ -42619,6 +42921,7 @@ function createMCPServer(deps) {
|
|
|
42619
42921
|
tool(tool$keysGetKey);
|
|
42620
42922
|
tool(tool$keysRemovePermissions);
|
|
42621
42923
|
tool(tool$keysRemoveRoles);
|
|
42924
|
+
tool(tool$keysRerollKey);
|
|
42622
42925
|
tool(tool$keysSetPermissions);
|
|
42623
42926
|
tool(tool$keysSetRoles);
|
|
42624
42927
|
tool(tool$keysUpdateCredits);
|
|
@@ -42661,6 +42964,7 @@ var init_server2 = __esm(() => {
|
|
|
42661
42964
|
init_keysGetKey2();
|
|
42662
42965
|
init_keysRemovePermissions2();
|
|
42663
42966
|
init_keysRemoveRoles2();
|
|
42967
|
+
init_keysRerollKey2();
|
|
42664
42968
|
init_keysSetPermissions2();
|
|
42665
42969
|
init_keysSetRoles2();
|
|
42666
42970
|
init_keysUpdateCredits2();
|
|
@@ -43875,7 +44179,7 @@ var routes = ln({
|
|
|
43875
44179
|
var app = _e(routes, {
|
|
43876
44180
|
name: "mcp",
|
|
43877
44181
|
versionInfo: {
|
|
43878
|
-
currentVersion: "2.0.
|
|
44182
|
+
currentVersion: "2.0.5"
|
|
43879
44183
|
}
|
|
43880
44184
|
});
|
|
43881
44185
|
Yt(app, process3.argv.slice(2), buildContext(process3));
|
|
@@ -43883,5 +44187,5 @@ export {
|
|
|
43883
44187
|
app
|
|
43884
44188
|
};
|
|
43885
44189
|
|
|
43886
|
-
//# debugId=
|
|
44190
|
+
//# debugId=F5367D37EBBC8D0864756E2164756E21
|
|
43887
44191
|
//# sourceMappingURL=mcp-server.js.map
|